x0, 0x0, &(0x7f0000000540)={[{@uid={'uid', 0x3d, 0xffffffffffffffff}}]}) 04:07:46 executing program 0: r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0x4}}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x30, r2, 0x805, 0x0, 0x0, {{0x1, 0x40030000000000, 0xffffff7f00000000}, 0x0, 0x6, 0x0, {0x14}}}, 0x30}}, 0x0) 04:07:46 executing program 1: r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f0000000000)="24032e001e0025eaa87865f51ef6bce90a04000200bff20182a9000c080009000d000000", 0x24) 04:07:46 executing program 3: r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0x4}}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x30, r2, 0x805, 0x0, 0x0, {{0x1, 0x40030000000000}, 0x2, 0x6, 0x0, {0x14}}}, 0x30}}, 0x0) 04:07:46 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup2(r2, r0) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000080)={0x0}, &(0x7f0000000100)=0xc) ioctl$KDSKBMETA(r3, 0x4b63, &(0x7f0000000040)=0xc2) sendmsg$netlink(r3, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@cred={{0x1c, 0x1, 0x2, {r4}}}], 0x20}, 0x0) recvmmsg(r1, &(0x7f0000000140)=[{{&(0x7f0000000200)=@l2, 0x80, &(0x7f00000005c0), 0x0, &(0x7f0000000280)=""/84, 0x54}}, {{&(0x7f0000000680)=@l2, 0x80, &(0x7f0000000a40), 0x0, &(0x7f0000000ac0)=""/147, 0x93}}], 0x4000000000001ae, 0x62, 0x0) 04:07:46 executing program 5: r0 = socket$inet_sctp(0x2, 0x5, 0x84) sendmsg$inet_sctp(r0, &(0x7f0000000400)={&(0x7f0000000000)=@in={0x2, 0x0, @remote}, 0x10, &(0x7f0000000080)=[{&(0x7f0000000040)='H', 0x1}], 0x1, &(0x7f00000003c0)=[@sndinfo={0x20, 0x84, 0x2, {0x0, 0x2}}], 0x20}, 0x80fe) 04:07:47 executing program 1: r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f0000000000)="24002f001e0025eaa87865f51ef6bce90a04000200bff20182a9000c080009000d000000", 0x24) 04:07:47 executing program 5: r0 = socket$inet_sctp(0x2, 0x5, 0x84) sendmsg$inet_sctp(r0, &(0x7f0000000400)={&(0x7f0000000000)=@in={0x2, 0x0, @remote}, 0x10, &(0x7f0000000080)=[{&(0x7f0000000040)='H', 0x1}], 0x1, &(0x7f00000003c0)=[@sndinfo={0x20, 0x84, 0x2, {0x0, 0x2}}], 0x20}, 0xc0fe) 04:07:47 executing program 3: r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0x4}}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x30, r2, 0x805, 0x0, 0x0, {{0x1, 0x40030000000000}, 0x3, 0x6, 0x0, {0x14}}}, 0x30}}, 0x0) 04:07:47 executing program 0: r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0x4}}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x30, r2, 0x805, 0x0, 0x0, {{0x1, 0x40030000000000, 0xffffffff00000000}, 0x0, 0x6, 0x0, {0x14}}}, 0x30}}, 0x0) 04:07:47 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup2(r2, r0) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000080)={0x0}, &(0x7f0000000100)=0xc) sendmsg$netlink(r3, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@cred={{0x1c, 0x1, 0x2, {r4}}}], 0x20}, 0x0) recvmmsg(r1, &(0x7f0000000140)=[{{&(0x7f0000000200)=@l2, 0x80, &(0x7f00000005c0), 0x0, &(0x7f0000000280)=""/84, 0x54}}, {{&(0x7f0000000680)=@l2, 0x80, &(0x7f0000000a40), 0x0, &(0x7f0000000ac0)=""/147, 0x93}}], 0x4000000000001ae, 0x62, 0x0) ioctl$KVM_SET_REGS(r3, 0x4090ae82, &(0x7f0000000300)={[0x1, 0x6, 0x7, 0x8, 0x1909, 0x7fff, 0x65, 0x9, 0x81, 0x5, 0x8, 0x0, 0x84e, 0x7ff, 0x1f, 0xffffffffffff8000], 0x7000, 0x40000}) [ 598.369055][T29985] FAULT_INJECTION: forcing a failure. [ 598.369055][T29985] name failslab, interval 1, probability 0, space 0, times 0 [ 598.440830][T29985] CPU: 0 PID: 29985 Comm: syz-executor.2 Not tainted 5.3.0-rc5-next-20190823 #72 [ 598.449969][T29985] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 598.460026][T29985] Call Trace: [ 598.463338][T29985] dump_stack+0x172/0x1f0 [ 598.467700][T29985] should_fail.cold+0xa/0x15 [ 598.472332][T29985] ? fault_create_debugfs_attr+0x180/0x180 [ 598.478155][T29985] ? ___might_sleep+0x163/0x280 [ 598.483193][T29985] __should_failslab+0x121/0x190 [ 598.488144][T29985] should_failslab+0x9/0x14 [ 598.492660][T29985] kmem_cache_alloc_trace+0x2d3/0x790 [ 598.498137][T29985] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 598.504135][T29985] __memcg_init_list_lru_node+0x8a/0x1e0 [ 598.509777][T29985] __list_lru_init+0x3fe/0x710 [ 598.514572][T29985] alloc_super+0x78d/0x890 [ 598.519013][T29985] ? test_bdev_super_fc+0x80/0x80 [ 598.524050][T29985] sget+0x117/0x560 [ 598.527866][T29985] ? set_bdev_super_fc+0x210/0x210 [ 598.532996][T29985] mount_bdev+0xff/0x3c0 [ 598.537244][T29985] ? hfs_show_options+0x630/0x630 [ 598.542283][T29985] hfs_mount+0x35/0x40 [ 598.546362][T29985] ? hfs_statfs+0x4b0/0x4b0 [ 598.550877][T29985] legacy_get_tree+0x113/0x220 [ 598.555644][T29985] ? ns_capable_common+0x93/0x100 [ 598.560678][T29985] vfs_get_tree+0x8f/0x380 [ 598.565749][T29985] do_mount+0x13b3/0x1c30 [ 598.570099][T29985] ? copy_mount_string+0x40/0x40 [ 598.575056][T29985] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 598.581311][T29985] ? copy_mount_options+0x2e8/0x3f0 [ 598.586528][T29985] ksys_mount+0xdb/0x150 04:07:47 executing program 5: r0 = socket$inet_sctp(0x2, 0x5, 0x84) sendmsg$inet_sctp(r0, &(0x7f0000000400)={&(0x7f0000000000)=@in={0x2, 0x0, @remote}, 0x10, &(0x7f0000000080)=[{&(0x7f0000000040)='H', 0x1}], 0x1, &(0x7f00000003c0)=[@sndinfo={0x20, 0x84, 0x2, {0x0, 0x2}}], 0x20}, 0xe803) [ 598.590785][T29985] __x64_sys_mount+0xbe/0x150 [ 598.595488][T29985] do_syscall_64+0xfa/0x760 [ 598.600010][T29985] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 598.605918][T29985] RIP: 0033:0x45c2ca [ 598.609822][T29985] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 9d 8d fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 7a 8d fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 598.629430][T29985] RSP: 002b:00007fc0353f2a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 598.637854][T29985] RAX: ffffffffffffffda RBX: 00007fc0353f2b40 RCX: 000000000045c2ca [ 598.645833][T29985] RDX: 00007fc0353f2ae0 RSI: 0000000020000140 RDI: 00007fc0353f2b00 [ 598.653839][T29985] RBP: 0000000000000000 R08: 00007fc0353f2b40 R09: 00007fc0353f2ae0 [ 598.661811][T29985] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 598.661826][T29985] R13: 00000000004c8a15 R14: 00000000004df940 R15: 0000000000000003 04:07:47 executing program 2 (fault-call:0 fault-nth:99): syz_mount_image$hfs(&(0x7f00000000c0)='hfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000540)={[{@uid={'uid', 0x3d, 0xffffffffffffffff}}]}) 04:07:47 executing program 3: r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0x4}}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x30, r2, 0x805, 0x0, 0x0, {{0x1, 0x40030000000000}, 0x4, 0x6, 0x0, {0x14}}}, 0x30}}, 0x0) 04:07:47 executing program 0: r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0x4}}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x30, r2, 0x805, 0x0, 0x0, {{0x1, 0x40030000000000, 0xfffffffffffff000}, 0x0, 0x6, 0x0, {0x14}}}, 0x30}}, 0x0) 04:07:47 executing program 4: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r3 = dup2(r1, r0) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000080)={0x0}, &(0x7f0000000100)=0xc) sendmsg$netlink(r3, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@cred={{0x1c, 0x1, 0x2, {r4}}}], 0x20}, 0x0) recvmmsg(r2, &(0x7f0000000140)=[{{&(0x7f0000000200)=@l2, 0x80, &(0x7f00000005c0), 0x0, &(0x7f0000000280)=""/84, 0x54}}, {{&(0x7f0000000680)=@l2, 0x80, &(0x7f0000000a40), 0x0, &(0x7f0000000ac0)=""/147, 0x93}}], 0x4000000000001ae, 0x62, 0x0) 04:07:47 executing program 5: r0 = socket$inet_sctp(0x2, 0x5, 0x84) sendmsg$inet_sctp(r0, &(0x7f0000000400)={&(0x7f0000000000)=@in={0x2, 0x0, @remote}, 0x10, &(0x7f0000000080)=[{&(0x7f0000000040)='H', 0x1}], 0x1, &(0x7f00000003c0)=[@sndinfo={0x20, 0x84, 0x2, {0x0, 0x2}}], 0x20}, 0xf401) 04:07:47 executing program 1: r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f0000000000)="24012f001e0025eaa87865f51ef6bce90a04000200bff20182a9000c080009000d000000", 0x24) 04:07:47 executing program 3: r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0x4}}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x30, r2, 0x805, 0x0, 0x0, {{0x1, 0x40030000000000}, 0x5, 0x6, 0x0, {0x14}}}, 0x30}}, 0x0) 04:07:47 executing program 1: r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f0000000000)="24022f001e0025eaa87865f51ef6bce90a04000200bff20182a9000c080009000d000000", 0x24) 04:07:47 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup2(r2, r0) getsockname$netlink(r3, &(0x7f0000000280), &(0x7f00000002c0)=0xc) ioctl$SG_GET_COMMAND_Q(r0, 0x2270, &(0x7f0000000240)) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r0, 0x84, 0x6, &(0x7f0000000140)={0x0, @in={{0x2, 0x4e24, @remote}}}, &(0x7f00000000c0)=0x84) setsockopt$inet_sctp6_SCTP_AUTH_DEACTIVATE_KEY(r0, 0x84, 0x23, &(0x7f0000000200)={r4, 0x33cac5f2}, 0x8) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000080)={0x0}, &(0x7f0000000100)=0xc) setsockopt$inet_sctp_SCTP_RECVRCVINFO(r3, 0x84, 0x20, &(0x7f0000000040), 0x4) sendmsg$netlink(r3, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@cred={{0x1c, 0x1, 0x2, {r5}}}], 0x20}, 0x0) recvmmsg(r1, &(0x7f0000000300), 0x4df, 0x62, 0x0) 04:07:47 executing program 5: r0 = socket$inet_sctp(0x2, 0x5, 0x84) sendmsg$inet_sctp(r0, &(0x7f0000000400)={&(0x7f0000000000)=@in={0x2, 0x0, @remote}, 0x10, &(0x7f0000000080)=[{&(0x7f0000000040)='H', 0x1}], 0x1, &(0x7f00000003c0)=[@sndinfo={0x20, 0x84, 0x2, {0x0, 0x2}}], 0x20}, 0xfc00) [ 598.920479][T30024] FAULT_INJECTION: forcing a failure. [ 598.920479][T30024] name failslab, interval 1, probability 0, space 0, times 0 [ 599.001038][T30024] CPU: 1 PID: 30024 Comm: syz-executor.2 Not tainted 5.3.0-rc5-next-20190823 #72 [ 599.010186][T30024] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 599.020246][T30024] Call Trace: [ 599.023555][T30024] dump_stack+0x172/0x1f0 [ 599.027902][T30024] should_fail.cold+0xa/0x15 [ 599.032511][T30024] ? fault_create_debugfs_attr+0x180/0x180 [ 599.038331][T30024] ? ___might_sleep+0x163/0x280 [ 599.043188][T30024] __should_failslab+0x121/0x190 [ 599.048131][T30024] should_failslab+0x9/0x14 [ 599.052642][T30024] kmem_cache_alloc_node_trace+0x274/0x750 [ 599.058453][T30024] ? kmem_cache_alloc_trace+0x397/0x790 [ 599.064008][T30024] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 599.069819][T30024] __kmalloc_node+0x3d/0x70 [ 599.074331][T30024] kvmalloc_node+0x68/0x100 [ 599.078832][T30024] __list_lru_init+0x4d5/0x710 [ 599.083603][T30024] alloc_super+0x78d/0x890 [ 599.088024][T30024] ? test_bdev_super_fc+0x80/0x80 [ 599.093056][T30024] sget+0x117/0x560 [ 599.096869][T30024] ? set_bdev_super_fc+0x210/0x210 [ 599.101988][T30024] mount_bdev+0xff/0x3c0 [ 599.106236][T30024] ? hfs_show_options+0x630/0x630 [ 599.111285][T30024] hfs_mount+0x35/0x40 [ 599.115353][T30024] ? hfs_statfs+0x4b0/0x4b0 [ 599.119855][T30024] legacy_get_tree+0x113/0x220 [ 599.124616][T30024] ? ns_capable_common+0x93/0x100 [ 599.129644][T30024] vfs_get_tree+0x8f/0x380 [ 599.134066][T30024] do_mount+0x13b3/0x1c30 [ 599.138404][T30024] ? copy_mount_string+0x40/0x40 [ 599.143350][T30024] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 599.149592][T30024] ? copy_mount_options+0x2e8/0x3f0 [ 599.154790][T30024] ksys_mount+0xdb/0x150 [ 599.159033][T30024] __x64_sys_mount+0xbe/0x150 [ 599.163710][T30024] do_syscall_64+0xfa/0x760 [ 599.168226][T30024] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 599.174116][T30024] RIP: 0033:0x45c2ca [ 599.178005][T30024] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 9d 8d fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 7a 8d fb ff c3 66 0f 1f 84 00 00 00 00 00 04:07:48 executing program 5: r0 = socket$inet_sctp(0x2, 0x5, 0x84) sendmsg$inet_sctp(r0, &(0x7f0000000400)={&(0x7f0000000000)=@in={0x2, 0x0, @remote}, 0x10, &(0x7f0000000080)=[{&(0x7f0000000040)='H', 0x1}], 0x1, &(0x7f00000003c0)=[@sndinfo={0x20, 0x84, 0x2, {0x0, 0x2}}], 0x20}, 0xfcff) 04:07:48 executing program 0: r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0x4}}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x30, r2, 0x805, 0x0, 0x0, {{0x1, 0x40030000000000}, 0x2, 0x6, 0x0, {0x14}}}, 0x30}}, 0x0) [ 599.197603][T30024] RSP: 002b:00007fc0353f2a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 599.206016][T30024] RAX: ffffffffffffffda RBX: 00007fc0353f2b40 RCX: 000000000045c2ca [ 599.213989][T30024] RDX: 00007fc0353f2ae0 RSI: 0000000020000140 RDI: 00007fc0353f2b00 [ 599.221959][T30024] RBP: 0000000000000000 R08: 00007fc0353f2b40 R09: 00007fc0353f2ae0 [ 599.229928][T30024] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 599.237897][T30024] R13: 00000000004c8a15 R14: 00000000004df940 R15: 0000000000000003 04:07:48 executing program 2: syz_mount_image$hfs(&(0x7f00000000c0)='hfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000540)={[{@uid={'uid', 0x3d, 0xffffffffffffffff}}]}) 04:07:48 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup2(r2, r0) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000080)={0x0}, &(0x7f0000000100)=0xc) sendmsg$netlink(r3, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@cred={{0x1c, 0x1, 0x2, {r4}}}], 0x20}, 0x0) ioctl$KVM_GET_MSR_INDEX_LIST(r0, 0xc004ae02, &(0x7f0000000040)={0x7, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) recvmmsg(r1, &(0x7f0000000140)=[{{&(0x7f0000000200)=@l2, 0x80, &(0x7f00000005c0), 0x0, &(0x7f0000000280)=""/84, 0x54}}, {{&(0x7f0000000680)=@l2, 0x80, &(0x7f0000000a40), 0x0, &(0x7f0000000ac0)=""/147, 0x93}}], 0x4000000000001ae, 0x62, 0x0) 04:07:48 executing program 5: r0 = socket$inet_sctp(0x2, 0x5, 0x84) sendmsg$inet_sctp(r0, &(0x7f0000000400)={&(0x7f0000000000)=@in={0x2, 0x0, @remote}, 0x10, &(0x7f0000000080)=[{&(0x7f0000000040)='H', 0x1}], 0x1, &(0x7f00000003c0)=[@sndinfo={0x20, 0x84, 0x2, {0x0, 0x2}}], 0x20}, 0xfe80) 04:07:48 executing program 0: r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0x4}}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x30, r2, 0x805, 0x0, 0x0, {{0x1, 0x40030000000000}, 0x3, 0x6, 0x0, {0x14}}}, 0x30}}, 0x0) 04:07:48 executing program 1: r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f0000000000)="24032f001e0025eaa87865f51ef6bce90a04000200bff20182a9000c080009000d000000", 0x24) 04:07:48 executing program 3: r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0x4}}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x30, r2, 0x805, 0x0, 0x0, {{0x1, 0x40030000000000}, 0x6, 0x6, 0x0, {0x14}}}, 0x30}}, 0x0) 04:07:48 executing program 5: r0 = socket$inet_sctp(0x2, 0x5, 0x84) sendmsg$inet_sctp(r0, &(0x7f0000000400)={&(0x7f0000000000)=@in={0x2, 0x0, @remote}, 0x10, &(0x7f0000000080)=[{&(0x7f0000000040)='H', 0x1}], 0x1, &(0x7f00000003c0)=[@sndinfo={0x20, 0x84, 0x2, {0x0, 0x2}}], 0x20}, 0xfec0) 04:07:48 executing program 1: r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f0000000000)="240030001e0025eaa87865f51ef6bce90a04000200bff20182a9000c080009000d000000", 0x24) 04:07:48 executing program 3: r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0x4}}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x30, r2, 0x805, 0x0, 0x0, {{0x1, 0x40030000000000}, 0x7, 0x6, 0x0, {0x14}}}, 0x30}}, 0x0) [ 599.570353][T30065] hfs: invalid uid -1 [ 599.582568][T30065] hfs: unable to parse mount options 04:07:48 executing program 4: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f00000005c0)=[{&(0x7f0000000200)='C', 0x1}, {&(0x7f0000000280)='M', 0x1}], 0x2, 0x0) close(r1) r2 = socket$inet_udp(0x2, 0x2, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") bind$inet(r2, &(0x7f0000000140)={0x2, 0x0, @loopback}, 0x10) connect$inet(r1, &(0x7f0000000100)={0x2, 0x0, @multicast1}, 0x10) splice(r0, 0x0, r1, 0x0, 0x10000, 0x0) 04:07:48 executing program 0: r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0x4}}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x30, r2, 0x805, 0x0, 0x0, {{0x1, 0x40030000000000}, 0x4, 0x6, 0x0, {0x14}}}, 0x30}}, 0x0) 04:07:48 executing program 5: r0 = socket$inet_sctp(0x2, 0x5, 0x84) sendmsg$inet_sctp(r0, &(0x7f0000000400)={&(0x7f0000000000)=@in={0x2, 0x0, @remote}, 0x10, &(0x7f0000000080)=[{&(0x7f0000000040)='H', 0x1}], 0x1, &(0x7f00000003c0)=[@sndinfo={0x20, 0x84, 0x2, {0x0, 0x2}}], 0x20}, 0xff00) 04:07:48 executing program 2: syz_mount_image$hfs(&(0x7f00000000c0)='\nfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000540)={[{@uid={'uid', 0x3d, 0xffffffffffffffff}}]}) 04:07:48 executing program 1: r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f0000000000)="240130001e0025eaa87865f51ef6bce90a04000200bff20182a9000c080009000d000000", 0x24) 04:07:48 executing program 3: r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0x4}}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x30, r2, 0x805, 0x0, 0x0, {{0x1, 0x40030000000000}, 0xa, 0x6, 0x0, {0x14}}}, 0x30}}, 0x0) 04:07:48 executing program 0: r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0x4}}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x30, r2, 0x805, 0x0, 0x0, {{0x1, 0x40030000000000}, 0x5, 0x6, 0x0, {0x14}}}, 0x30}}, 0x0) 04:07:48 executing program 4: unshare(0x2040400) r0 = syz_open_dev$media(&(0x7f0000000080)='/dev/media#\x00', 0x0, 0x0) ioctl$SG_GET_RESERVED_SIZE(r0, 0x5421, 0x0) 04:07:48 executing program 5: r0 = socket$inet_sctp(0x2, 0x5, 0x84) sendmsg$inet_sctp(r0, &(0x7f0000000400)={&(0x7f0000000000)=@in={0x2, 0x0, @remote}, 0x10, &(0x7f0000000080)=[{&(0x7f0000000040)='H', 0x1}], 0x1, &(0x7f00000003c0)=[@sndinfo={0x20, 0x84, 0x2, {0x0, 0x2}}], 0x20}, 0xfffc) 04:07:48 executing program 1: r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f0000000000)="240230001e0025eaa87865f51ef6bce90a04000200bff20182a9000c080009000d000000", 0x24) 04:07:48 executing program 3: r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0x4}}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x30, r2, 0x805, 0x0, 0x0, {{0x1, 0x40030000000000}, 0xe, 0x6, 0x0, {0x14}}}, 0x30}}, 0x0) 04:07:48 executing program 4: unshare(0x2040400) r0 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000080)='/dev/cachefiles\x00', 0x220201, 0x0) fremovexattr(r0, 0x0) 04:07:48 executing program 5: r0 = socket$inet_sctp(0x2, 0x5, 0x84) sendmsg$inet_sctp(r0, &(0x7f0000000400)={&(0x7f0000000000)=@in={0x2, 0x0, @remote}, 0x10, &(0x7f0000000080)=[{&(0x7f0000000040)='H', 0x1}], 0x1, &(0x7f00000003c0)=[@sndinfo={0x20, 0x84, 0x2, {0x0, 0x2}}], 0x20}, 0x1000000) 04:07:49 executing program 0: r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0x4}}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x30, r2, 0x805, 0x0, 0x0, {{0x1, 0x40030000000000}, 0x6, 0x6, 0x0, {0x14}}}, 0x30}}, 0x0) 04:07:49 executing program 2: syz_mount_image$hfs(&(0x7f00000000c0)='%fs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000540)={[{@uid={'uid', 0x3d, 0xffffffffffffffff}}]}) 04:07:49 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_SREGS(r2, 0x4138ae84, &(0x7f0000000100)={{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, 0x0, 0x0, 0x0, 0x420000}) 04:07:49 executing program 1: r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f0000000000)="240330001e0025eaa87865f51ef6bce90a04000200bff20182a9000c080009000d000000", 0x24) 04:07:49 executing program 3: r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0x4}}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x30, r2, 0x805, 0x0, 0x0, {{0x1, 0x40030000000000}, 0xf, 0x6, 0x0, {0x14}}}, 0x30}}, 0x0) 04:07:49 executing program 5: r0 = socket$inet_sctp(0x2, 0x5, 0x84) sendmsg$inet_sctp(r0, &(0x7f0000000400)={&(0x7f0000000000)=@in={0x2, 0x0, @remote}, 0x10, &(0x7f0000000080)=[{&(0x7f0000000040)='H', 0x1}], 0x1, &(0x7f00000003c0)=[@sndinfo={0x20, 0x84, 0x2, {0x0, 0x2}}], 0x20}, 0x2000000) 04:07:49 executing program 1: r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f0000000000)="240031001e0025eaa87865f51ef6bce90a04000200bff20182a9000c080009000d000000", 0x24) 04:07:49 executing program 0: r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0x4}}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x30, r2, 0x805, 0x0, 0x0, {{0x1, 0x40030000000000}, 0x7, 0x6, 0x0, {0x14}}}, 0x30}}, 0x0) 04:07:49 executing program 3: r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0x4}}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x30, r2, 0x805, 0x0, 0x0, {{0x1, 0x40030000000000}, 0x48, 0x6, 0x0, {0x14}}}, 0x30}}, 0x0) 04:07:49 executing program 4: unshare(0x2040400) r0 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000080)='/dev/cachefiles\x00', 0x220201, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000040)={r0, 0x0, 0x0}, 0x10) 04:07:49 executing program 0: r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0x4}}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x30, r2, 0x805, 0x0, 0x0, {{0x1, 0x40030000000000}, 0xa, 0x6, 0x0, {0x14}}}, 0x30}}, 0x0) 04:07:49 executing program 4: open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) mincore(&(0x7f0000004000/0x1000)=nil, 0x1000, &(0x7f00000002c0)=""/91) 04:07:49 executing program 2: syz_mount_image$hfs(&(0x7f00000000c0)='\\fs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000540)={[{@uid={'uid', 0x3d, 0xffffffffffffffff}}]}) 04:07:49 executing program 5: r0 = socket$inet_sctp(0x2, 0x5, 0x84) sendmsg$inet_sctp(r0, &(0x7f0000000400)={&(0x7f0000000000)=@in={0x2, 0x0, @remote}, 0x10, &(0x7f0000000080)=[{&(0x7f0000000040)='H', 0x1}], 0x1, &(0x7f00000003c0)=[@sndinfo={0x20, 0x84, 0x2, {0x0, 0x2}}], 0x20}, 0x3000000) 04:07:49 executing program 1: r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f0000000000)="240131001e0025eaa87865f51ef6bce90a04000200bff20182a9000c080009000d000000", 0x24) 04:07:49 executing program 3: r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0x4}}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x30, r2, 0x805, 0x0, 0x0, {{0x1, 0x40030000000000}, 0x4c, 0x6, 0x0, {0x14}}}, 0x30}}, 0x0) 04:07:49 executing program 0: r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0x4}}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x30, r2, 0x805, 0x0, 0x0, {{0x1, 0x40030000000000}, 0xe, 0x6, 0x0, {0x14}}}, 0x30}}, 0x0) 04:07:49 executing program 4: unshare(0x2040400) r0 = syz_open_dev$media(&(0x7f0000000080)='/dev/media#\x00', 0x0, 0x0) connect$netrom(r0, 0x0, 0x0) 04:07:49 executing program 2: syz_mount_image$hfs(&(0x7f00000000c0)='h\ns\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000540)={[{@uid={'uid', 0x3d, 0xffffffffffffffff}}]}) 04:07:49 executing program 5: r0 = socket$inet_sctp(0x2, 0x5, 0x84) sendmsg$inet_sctp(r0, &(0x7f0000000400)={&(0x7f0000000000)=@in={0x2, 0x0, @remote}, 0x10, &(0x7f0000000080)=[{&(0x7f0000000040)='H', 0x1}], 0x1, &(0x7f00000003c0)=[@sndinfo={0x20, 0x84, 0x2, {0x0, 0x2}}], 0x20}, 0x4000000) 04:07:49 executing program 1: r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f0000000000)="240231001e0025eaa87865f51ef6bce90a04000200bff20182a9000c080009000d000000", 0x24) 04:07:49 executing program 0: r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0x4}}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x30, r2, 0x805, 0x0, 0x0, {{0x1, 0x40030000000000}, 0xf, 0x6, 0x0, {0x14}}}, 0x30}}, 0x0) 04:07:49 executing program 4: r0 = syz_open_dev$swradio(&(0x7f0000000300)='/dev/swradio#\x00', 0x1, 0x2) ioctl$VIDIOC_QUERYCTRL(r0, 0xc0445624, &(0x7f0000000000)={0x0, 0x0, "fc7e7cc8336beef42b06b0fee5007803dac4dc9d21ed726ac9450364b54445db"}) 04:07:49 executing program 3: r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0x4}}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x30, r2, 0x805, 0x0, 0x0, {{0x1, 0x40030000000000}, 0x60, 0x6, 0x0, {0x14}}}, 0x30}}, 0x0) 04:07:49 executing program 5: r0 = socket$inet_sctp(0x2, 0x5, 0x84) sendmsg$inet_sctp(r0, &(0x7f0000000400)={&(0x7f0000000000)=@in={0x2, 0x0, @remote}, 0x10, &(0x7f0000000080)=[{&(0x7f0000000040)='H', 0x1}], 0x1, &(0x7f00000003c0)=[@sndinfo={0x20, 0x84, 0x2, {0x0, 0x2}}], 0x20}, 0x5000000) 04:07:50 executing program 1: r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f0000000000)="240331001e0025eaa87865f51ef6bce90a04000200bff20182a9000c080009000d000000", 0x24) 04:07:50 executing program 4: r0 = syz_open_dev$swradio(&(0x7f0000000000)='/dev/swradio#\x00', 0x1, 0x2) ppoll(&(0x7f00000000c0)=[{r0, 0x1}, {r0, 0x4005}], 0x2, &(0x7f0000000180), 0x0, 0x0) 04:07:50 executing program 0: r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0x4}}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x30, r2, 0x805, 0x0, 0x0, {{0x1, 0x40030000000000}, 0x48, 0x6, 0x0, {0x14}}}, 0x30}}, 0x0) 04:07:50 executing program 2: syz_mount_image$hfs(&(0x7f00000000c0)='h%s\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000540)={[{@uid={'uid', 0x3d, 0xffffffffffffffff}}]}) 04:07:50 executing program 3: r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0x4}}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x30, r2, 0x805, 0x0, 0x0, {{0x1, 0x40030000000000}, 0x68, 0x6, 0x0, {0x14}}}, 0x30}}, 0x0) 04:07:50 executing program 5: r0 = socket$inet_sctp(0x2, 0x5, 0x84) sendmsg$inet_sctp(r0, &(0x7f0000000400)={&(0x7f0000000000)=@in={0x2, 0x0, @remote}, 0x10, &(0x7f0000000080)=[{&(0x7f0000000040)='H', 0x1}], 0x1, &(0x7f00000003c0)=[@sndinfo={0x20, 0x84, 0x2, {0x0, 0x2}}], 0x20}, 0x6000000) 04:07:50 executing program 1: r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f0000000000)="240032001e0025eaa87865f51ef6bce90a04000200bff20182a9000c080009000d000000", 0x24) 04:07:50 executing program 4: r0 = openat$udambuf(0xffffffffffffff9c, &(0x7f0000000080)='/dev/udmabuf\x00', 0x2) ioctl$UDMABUF_CREATE(r0, 0x40187542, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0xfffffffff0000000}) 04:07:50 executing program 0: r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0x4}}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x30, r2, 0x805, 0x0, 0x0, {{0x1, 0x40030000000000}, 0x4c, 0x6, 0x0, {0x14}}}, 0x30}}, 0x0) 04:07:50 executing program 3: r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0x4}}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x30, r2, 0x805, 0x0, 0x0, {{0x1, 0x40030000000000}, 0x6c, 0x6, 0x0, {0x14}}}, 0x30}}, 0x0) 04:07:50 executing program 1: r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f0000000000)="240132001e0025eaa87865f51ef6bce90a04000200bff20182a9000c080009000d000000", 0x24) 04:07:50 executing program 5: r0 = socket$inet_sctp(0x2, 0x5, 0x84) sendmsg$inet_sctp(r0, &(0x7f0000000400)={&(0x7f0000000000)=@in={0x2, 0x0, @remote}, 0x10, &(0x7f0000000080)=[{&(0x7f0000000040)='H', 0x1}], 0x1, &(0x7f00000003c0)=[@sndinfo={0x20, 0x84, 0x2, {0x0, 0x2}}], 0x20}, 0x7000000) 04:07:50 executing program 4: unshare(0x2040400) r0 = syz_open_dev$swradio(&(0x7f0000000300)='/dev/swradio#\x00', 0x1, 0x2) fcntl$setpipe(r0, 0x407, 0x0) 04:07:50 executing program 3: r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0x4}}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x30, r2, 0x805, 0x0, 0x0, {{0x1, 0x40030000000000}, 0x74, 0x6, 0x0, {0x14}}}, 0x30}}, 0x0) 04:07:50 executing program 2: syz_mount_image$hfs(&(0x7f00000000c0)='h.s\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000540)={[{@uid={'uid', 0x3d, 0xffffffffffffffff}}]}) 04:07:50 executing program 0: r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0x4}}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x30, r2, 0x805, 0x0, 0x0, {{0x1, 0x40030000000000}, 0x60, 0x6, 0x0, {0x14}}}, 0x30}}, 0x0) 04:07:50 executing program 1: r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f0000000000)="240232001e0025eaa87865f51ef6bce90a04000200bff20182a9000c080009000d000000", 0x24) 04:07:50 executing program 4: unshare(0x2040400) r0 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000080)='/dev/cachefiles\x00', 0x0, 0x0) read$rfkill(r0, 0x0, 0x0) 04:07:50 executing program 5: r0 = socket$inet_sctp(0x2, 0x5, 0x84) sendmsg$inet_sctp(r0, &(0x7f0000000400)={&(0x7f0000000000)=@in={0x2, 0x0, @remote}, 0x10, &(0x7f0000000080)=[{&(0x7f0000000040)='H', 0x1}], 0x1, &(0x7f00000003c0)=[@sndinfo={0x20, 0x84, 0x2, {0x0, 0x2}}], 0x20}, 0x8000000) 04:07:50 executing program 0: r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0x4}}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x30, r2, 0x805, 0x0, 0x0, {{0x1, 0x40030000000000}, 0x68, 0x6, 0x0, {0x14}}}, 0x30}}, 0x0) 04:07:50 executing program 4: unshare(0x2040400) r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x0, 0x0) sendmmsg$inet(r0, 0x0, 0x0, 0x0) 04:07:50 executing program 5: r0 = socket$inet_sctp(0x2, 0x5, 0x84) sendmsg$inet_sctp(r0, &(0x7f0000000400)={&(0x7f0000000000)=@in={0x2, 0x0, @remote}, 0x10, &(0x7f0000000080)=[{&(0x7f0000000040)='H', 0x1}], 0x1, &(0x7f00000003c0)=[@sndinfo={0x20, 0x84, 0x2, {0x0, 0x2}}], 0x20}, 0x9000000) 04:07:50 executing program 3: r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0x4}}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x30, r2, 0x805, 0x0, 0x0, {{0x1, 0x40030000000000}, 0x7a, 0x6, 0x0, {0x14}}}, 0x30}}, 0x0) 04:07:50 executing program 1: r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f0000000000)="240332001e0025eaa87865f51ef6bce90a04000200bff20182a9000c080009000d000000", 0x24) 04:07:50 executing program 2: syz_mount_image$hfs(&(0x7f00000000c0)='h/s\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000540)={[{@uid={'uid', 0x3d, 0xffffffffffffffff}}]}) 04:07:50 executing program 4: unshare(0x2040400) r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/audio\x00', 0x0, 0x0) getpeername$netlink(r0, 0x0, 0x0) 04:07:51 executing program 5: r0 = socket$inet_sctp(0x2, 0x5, 0x84) sendmsg$inet_sctp(r0, &(0x7f0000000400)={&(0x7f0000000000)=@in={0x2, 0x0, @remote}, 0x10, &(0x7f0000000080)=[{&(0x7f0000000040)='H', 0x1}], 0x1, &(0x7f00000003c0)=[@sndinfo={0x20, 0x84, 0x2, {0x0, 0x2}}], 0x20}, 0xa000000) 04:07:51 executing program 0: r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0x4}}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x30, r2, 0x805, 0x0, 0x0, {{0x1, 0x40030000000000}, 0x6c, 0x6, 0x0, {0x14}}}, 0x30}}, 0x0) 04:07:51 executing program 3: r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0x4}}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x30, r2, 0x805, 0x0, 0x0, {{0x1, 0x40030000000000}, 0xf0, 0x6, 0x0, {0x14}}}, 0x30}}, 0x0) 04:07:51 executing program 4: open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) write$UHID_INPUT(0xffffffffffffffff, 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 04:07:51 executing program 1: r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f0000000000)="240033001e0025eaa87865f51ef6bce90a04000200bff20182a9000c080009000d000000", 0x24) 04:07:51 executing program 0: r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0x4}}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x30, r2, 0x805, 0x0, 0x0, {{0x1, 0x40030000000000}, 0x74, 0x6, 0x0, {0x14}}}, 0x30}}, 0x0) 04:07:51 executing program 5: r0 = socket$inet_sctp(0x2, 0x5, 0x84) sendmsg$inet_sctp(r0, &(0x7f0000000400)={&(0x7f0000000000)=@in={0x2, 0x0, @remote}, 0x10, &(0x7f0000000080)=[{&(0x7f0000000040)='H', 0x1}], 0x1, &(0x7f00000003c0)=[@sndinfo={0x20, 0x84, 0x2, {0x0, 0x2}}], 0x20}, 0xe000000) 04:07:51 executing program 2: syz_mount_image$hfs(&(0x7f00000000c0)='h\\s\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000540)={[{@uid={'uid', 0x3d, 0xffffffffffffffff}}]}) 04:07:51 executing program 3: r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0x4}}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x30, r2, 0x805, 0x0, 0x0, {{0x1, 0x40030000000000}, 0x22f, 0x6, 0x0, {0x14}}}, 0x30}}, 0x0) 04:07:51 executing program 5: r0 = socket$inet_sctp(0x2, 0x5, 0x84) sendmsg$inet_sctp(r0, &(0x7f0000000400)={&(0x7f0000000000)=@in={0x2, 0x0, @remote}, 0x10, &(0x7f0000000080)=[{&(0x7f0000000040)='H', 0x1}], 0x1, &(0x7f00000003c0)=[@sndinfo={0x20, 0x84, 0x2, {0x0, 0x2}}], 0x20}, 0x11000000) 04:07:51 executing program 3: r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0x4}}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x30, r2, 0x805, 0x0, 0x0, {{0x1, 0x40030000000000}, 0x300, 0x6, 0x0, {0x14}}}, 0x30}}, 0x0) 04:07:51 executing program 1: r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f0000000000)="240133001e0025eaa87865f51ef6bce90a04000200bff20182a9000c080009000d000000", 0x24) 04:07:51 executing program 0: r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0x4}}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x30, r2, 0x805, 0x0, 0x0, {{0x1, 0x40030000000000}, 0x7a, 0x6, 0x0, {0x14}}}, 0x30}}, 0x0) 04:07:51 executing program 5: r0 = socket$inet_sctp(0x2, 0x5, 0x84) sendmsg$inet_sctp(r0, &(0x7f0000000400)={&(0x7f0000000000)=@in={0x2, 0x0, @remote}, 0x10, &(0x7f0000000080)=[{&(0x7f0000000040)='H', 0x1}], 0x1, &(0x7f00000003c0)=[@sndinfo={0x20, 0x84, 0x2, {0x0, 0x2}}], 0x20}, 0x20000000) 04:07:51 executing program 1: r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f0000000000)="240233001e0025eaa87865f51ef6bce90a04000200bff20182a9000c080009000d000000", 0x24) 04:07:52 executing program 4: futex(&(0x7f000000cffc), 0x80000000000b, 0x4, 0x0, &(0x7f0000048000), 0x0) 04:07:52 executing program 3: r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0x4}}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x30, r2, 0x805, 0x0, 0x0, {{0x1, 0x40030000000000}, 0x500, 0x6, 0x0, {0x14}}}, 0x30}}, 0x0) 04:07:52 executing program 2: syz_mount_image$hfs(&(0x7f00000000c0)='hf\n\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000540)={[{@uid={'uid', 0x3d, 0xffffffffffffffff}}]}) 04:07:52 executing program 0: r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0x4}}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x30, r2, 0x805, 0x0, 0x0, {{0x1, 0x40030000000000}, 0xf0, 0x6, 0x0, {0x14}}}, 0x30}}, 0x0) 04:07:52 executing program 1: r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f0000000000)="240333001e0025eaa87865f51ef6bce90a04000200bff20182a9000c080009000d000000", 0x24) 04:07:52 executing program 5: r0 = socket$inet_sctp(0x2, 0x5, 0x84) sendmsg$inet_sctp(r0, &(0x7f0000000400)={&(0x7f0000000000)=@in={0x2, 0x0, @remote}, 0x10, &(0x7f0000000080)=[{&(0x7f0000000040)='H', 0x1}], 0x1, &(0x7f00000003c0)=[@sndinfo={0x20, 0x84, 0x2, {0x0, 0x2}}], 0x20}, 0x2c010000) 04:07:52 executing program 1: r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f0000000000)="240034001e0025eaa87865f51ef6bce90a04000200bff20182a9000c080009000d000000", 0x24) 04:07:52 executing program 3: r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0x4}}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x30, r2, 0x805, 0x0, 0x0, {{0x1, 0x40030000000000}, 0x600, 0x6, 0x0, {0x14}}}, 0x30}}, 0x0) 04:07:52 executing program 0: r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0x4}}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x30, r2, 0x805, 0x0, 0x0, {{0x1, 0x40030000000000}, 0x287, 0x6, 0x0, {0x14}}}, 0x30}}, 0x0) 04:07:52 executing program 5: r0 = socket$inet_sctp(0x2, 0x5, 0x84) sendmsg$inet_sctp(r0, &(0x7f0000000400)={&(0x7f0000000000)=@in={0x2, 0x0, @remote}, 0x10, &(0x7f0000000080)=[{&(0x7f0000000040)='H', 0x1}], 0x1, &(0x7f00000003c0)=[@sndinfo={0x20, 0x84, 0x2, {0x0, 0x2}}], 0x20}, 0x40000000) 04:07:52 executing program 4: getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) getresuid(&(0x7f00000061c0), 0x0, 0x0) getegid() fcntl$getown(0xffffffffffffffff, 0x9) openat$dlm_control(0xffffffffffffff9c, 0x0, 0x101100, 0x0) lstat(0x0, 0x0) getpgrp(0xffffffffffffffff) sendmmsg$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) fstat(r0, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setgid(r1) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000440)='cgroup2\x00', 0x0, 0x0) rmdir(0x0) mkdir(&(0x7f0000000000)='./file0//ile0\x00', 0x108) 04:07:52 executing program 1: r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f0000000000)="240134001e0025eaa87865f51ef6bce90a04000200bff20182a9000c080009000d000000", 0x24) 04:07:52 executing program 2: syz_mount_image$hfs(&(0x7f00000000c0)='hf#\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000540)={[{@uid={'uid', 0x3d, 0xffffffffffffffff}}]}) 04:07:52 executing program 3: r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0x4}}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x30, r2, 0x805, 0x0, 0x0, {{0x1, 0x40030000000000}, 0x700, 0x6, 0x0, {0x14}}}, 0x30}}, 0x0) 04:07:52 executing program 5: r0 = socket$inet_sctp(0x2, 0x5, 0x84) sendmsg$inet_sctp(r0, &(0x7f0000000400)={&(0x7f0000000000)=@in={0x2, 0x0, @remote}, 0x10, &(0x7f0000000080)=[{&(0x7f0000000040)='H', 0x1}], 0x1, &(0x7f00000003c0)=[@sndinfo={0x20, 0x84, 0x2, {0x0, 0x2}}], 0x20}, 0x44010000) 04:07:52 executing program 0: r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0x4}}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x30, r2, 0x805, 0x0, 0x0, {{0x1, 0x40030000000000}, 0x300, 0x6, 0x0, {0x14}}}, 0x30}}, 0x0) 04:07:52 executing program 3: r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0x4}}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x30, r2, 0x805, 0x0, 0x0, {{0x1, 0x40030000000000}, 0xa00, 0x6, 0x0, {0x14}}}, 0x30}}, 0x0) 04:07:52 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") open_tree(0xffffffffffffff9c, 0x0, 0x0) 04:07:52 executing program 5: r0 = socket$inet_sctp(0x2, 0x5, 0x84) sendmsg$inet_sctp(r0, &(0x7f0000000400)={&(0x7f0000000000)=@in={0x2, 0x0, @remote}, 0x10, &(0x7f0000000080)=[{&(0x7f0000000040)='H', 0x1}], 0x1, &(0x7f00000003c0)=[@sndinfo={0x20, 0x84, 0x2, {0x0, 0x2}}], 0x20}, 0xe8030000) 04:07:52 executing program 1: r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f0000000000)="240234001e0025eaa87865f51ef6bce90a04000200bff20182a9000c080009000d000000", 0x24) 04:07:52 executing program 0: r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0x4}}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x30, r2, 0x805, 0x0, 0x0, {{0x1, 0x40030000000000}, 0x500, 0x6, 0x0, {0x14}}}, 0x30}}, 0x0) 04:07:52 executing program 1: r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f0000000000)="240334001e0025eaa87865f51ef6bce90a04000200bff20182a9000c080009000d000000", 0x24) 04:07:52 executing program 5: r0 = socket$inet_sctp(0x2, 0x5, 0x84) sendmsg$inet_sctp(r0, &(0x7f0000000400)={&(0x7f0000000000)=@in={0x2, 0x0, @remote}, 0x10, &(0x7f0000000080)=[{&(0x7f0000000040)='H', 0x1}], 0x1, &(0x7f00000003c0)=[@sndinfo={0x20, 0x84, 0x2, {0x0, 0x2}}], 0x20}, 0xf4010000) 04:07:52 executing program 4: unshare(0x2040400) r0 = creat(&(0x7f0000000640)='./file0\x00', 0x0) ioctl$GIO_CMAP(r0, 0x4b70, 0x0) 04:07:52 executing program 2: syz_mount_image$hfs(&(0x7f00000000c0)='hf%\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000540)={[{@uid={'uid', 0x3d, 0xffffffffffffffff}}]}) 04:07:52 executing program 3: r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0x4}}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x30, r2, 0x805, 0x0, 0x0, {{0x1, 0x40030000000000}, 0xe00, 0x6, 0x0, {0x14}}}, 0x30}}, 0x0) 04:07:52 executing program 0: r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0x4}}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x30, r2, 0x805, 0x0, 0x0, {{0x1, 0x40030000000000}, 0x600, 0x6, 0x0, {0x14}}}, 0x30}}, 0x0) 04:07:53 executing program 5: r0 = socket$inet_sctp(0x2, 0x5, 0x84) sendmsg$inet_sctp(r0, &(0x7f0000000400)={&(0x7f0000000000)=@in={0x2, 0x0, @remote}, 0x10, &(0x7f0000000080)=[{&(0x7f0000000040)='H', 0x1}], 0x1, &(0x7f00000003c0)=[@sndinfo={0x20, 0x84, 0x2, {0x0, 0x2}}], 0x20}, 0xfc000000) 04:07:53 executing program 4: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = add_key$user(&(0x7f0000000340)='user\x00', &(0x7f0000000300)={'syz', 0x3}, &(0x7f0000000580)="62f41ed7fa6ad54d8a8e8e5b262feb5fb25688bdbe6158100b88574dd841614bfaa0c34d501336f51df772b3aaa3e4bfe9ab0a759e2a8f59a09eb1e0761eea36bcf2af5b6a576aa38296fae994dc55e7676212801e7e01e7407a37a7b6972800008092de9e40fadb8d4b874b66904172b4b412ddca5e7555bcd5a93ceefa60fb77e589d6f6e60a159d636bc3207db9ce802fd6df77aa2b7c2ec06dfabbc937987c", 0xa1, 0xfffffffffffffffe) r2 = add_key$user(&(0x7f00000003c0)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0x439, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000000)={r1, r2, r1}, 0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000040)={'nhpoly1305-avx2\x00'}}) 04:07:53 executing program 1: r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f0000000000)="240035001e0025eaa87865f51ef6bce90a04000200bff20182a9000c080009000d000000", 0x24) 04:07:53 executing program 3: r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0x4}}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x30, r2, 0x805, 0x0, 0x0, {{0x1, 0x40030000000000}, 0xf00, 0x6, 0x0, {0x14}}}, 0x30}}, 0x0) 04:07:53 executing program 0: r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0x4}}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x30, r2, 0x805, 0x0, 0x0, {{0x1, 0x40030000000000}, 0x700, 0x6, 0x0, {0x14}}}, 0x30}}, 0x0) 04:07:53 executing program 5: r0 = socket$inet_sctp(0x2, 0x5, 0x84) sendmsg$inet_sctp(r0, &(0x7f0000000400)={&(0x7f0000000000)=@in={0x2, 0x0, @remote}, 0x10, &(0x7f0000000080)=[{&(0x7f0000000040)='H', 0x1}], 0x1, &(0x7f00000003c0)=[@sndinfo={0x20, 0x84, 0x2, {0x0, 0x2}}], 0x20}, 0xfcff0000) 04:07:53 executing program 2: syz_mount_image$hfs(&(0x7f00000000c0)='hf*\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000540)={[{@uid={'uid', 0x3d, 0xffffffffffffffff}}]}) 04:07:53 executing program 3: r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0x4}}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x30, r2, 0x805, 0x0, 0x0, {{0x1, 0x40030000000000}, 0x2f02, 0x6, 0x0, {0x14}}}, 0x30}}, 0x0) 04:07:53 executing program 1: r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f0000000000)="240135001e0025eaa87865f51ef6bce90a04000200bff20182a9000c080009000d000000", 0x24) 04:07:53 executing program 0: r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0x4}}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x30, r2, 0x805, 0x0, 0x0, {{0x1, 0x40030000000000}, 0xa00, 0x6, 0x0, {0x14}}}, 0x30}}, 0x0) 04:07:53 executing program 5: r0 = socket$inet_sctp(0x2, 0x5, 0x84) sendmsg$inet_sctp(r0, &(0x7f0000000400)={&(0x7f0000000000)=@in={0x2, 0x0, @remote}, 0x10, &(0x7f0000000080)=[{&(0x7f0000000040)='H', 0x1}], 0x1, &(0x7f00000003c0)=[@sndinfo={0x20, 0x84, 0x2, {0x0, 0x2}}], 0x20}, 0xfe800000) 04:07:53 executing program 1: r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f0000000000)="240235001e0025eaa87865f51ef6bce90a04000200bff20182a9000c080009000d000000", 0x24) 04:07:53 executing program 3: r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0x4}}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x30, r2, 0x805, 0x0, 0x0, {{0x1, 0x40030000000000}, 0x3f00, 0x6, 0x0, {0x14}}}, 0x30}}, 0x0) 04:07:54 executing program 4: unshare(0x2040400) r0 = syz_open_dev$media(&(0x7f0000000080)='/dev/media#\x00', 0x0, 0x0) fcntl$F_GET_RW_HINT(r0, 0x40b, &(0x7f0000000000)) 04:07:54 executing program 0: r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0x4}}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x30, r2, 0x805, 0x0, 0x0, {{0x1, 0x40030000000000}, 0xe00, 0x6, 0x0, {0x14}}}, 0x30}}, 0x0) 04:07:54 executing program 5: r0 = socket$inet_sctp(0x2, 0x5, 0x84) sendmsg$inet_sctp(r0, &(0x7f0000000400)={&(0x7f0000000000)=@in={0x2, 0x0, @remote}, 0x10, &(0x7f0000000080)=[{&(0x7f0000000040)='H', 0x1}], 0x1, &(0x7f00000003c0)=[@sndinfo={0x20, 0x84, 0x2, {0x0, 0x2}}], 0x20}, 0xfec00000) 04:07:54 executing program 1: r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f0000000000)="240335001e0025eaa87865f51ef6bce90a04000200bff20182a9000c080009000d000000", 0x24) 04:07:54 executing program 2: syz_mount_image$hfs(&(0x7f00000000c0)='hf+\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000540)={[{@uid={'uid', 0x3d, 0xffffffffffffffff}}]}) 04:07:54 executing program 3: r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0x4}}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x30, r2, 0x805, 0x0, 0x0, {{0x1, 0x40030000000000}, 0x4000, 0x6, 0x0, {0x14}}}, 0x30}}, 0x0) 04:07:54 executing program 1: r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f0000000000)="240036001e0025eaa87865f51ef6bce90a04000200bff20182a9000c080009000d000000", 0x24) 04:07:54 executing program 5: r0 = socket$inet_sctp(0x2, 0x5, 0x84) sendmsg$inet_sctp(r0, &(0x7f0000000400)={&(0x7f0000000000)=@in={0x2, 0x0, @remote}, 0x10, &(0x7f0000000080)=[{&(0x7f0000000040)='H', 0x1}], 0x1, &(0x7f00000003c0)=[@sndinfo={0x20, 0x84, 0x2, {0x0, 0x2}}], 0x20}, 0xfeffffff) 04:07:54 executing program 0: r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0x4}}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x30, r2, 0x805, 0x0, 0x0, {{0x1, 0x40030000000000}, 0xf00, 0x6, 0x0, {0x14}}}, 0x30}}, 0x0) 04:07:54 executing program 3: r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0x4}}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x30, r2, 0x805, 0x0, 0x0, {{0x1, 0x40030000000000}, 0x4800, 0x6, 0x0, {0x14}}}, 0x30}}, 0x0) 04:07:55 executing program 2: syz_mount_image$hfs(&(0x7f00000000c0)='hf-\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000540)={[{@uid={'uid', 0x3d, 0xffffffffffffffff}}]}) 04:07:55 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) clock_nanosleep(0x0, 0x0, &(0x7f0000000000)={0x77359400}, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") 04:07:55 executing program 0: r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0x4}}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x30, r2, 0x805, 0x0, 0x0, {{0x1, 0x40030000000000}, 0x3f00, 0x6, 0x0, {0x14}}}, 0x30}}, 0x0) 04:07:55 executing program 1: r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f0000000000)="240136001e0025eaa87865f51ef6bce90a04000200bff20182a9000c080009000d000000", 0x24) 04:07:55 executing program 5: r0 = socket$inet_sctp(0x2, 0x5, 0x84) sendmsg$inet_sctp(r0, &(0x7f0000000400)={&(0x7f0000000000)=@in={0x2, 0x0, @remote}, 0x10, &(0x7f0000000080)=[{&(0x7f0000000040)='H', 0x1}], 0x1, &(0x7f00000003c0)=[@sndinfo={0x20, 0x84, 0x2, {0x0, 0x2}}], 0x20}, 0xff000000) 04:07:55 executing program 3: r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0x4}}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x30, r2, 0x805, 0x0, 0x0, {{0x1, 0x40030000000000}, 0x4c00, 0x6, 0x0, {0x14}}}, 0x30}}, 0x0) 04:07:55 executing program 1: r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f0000000000)="240236001e0025eaa87865f51ef6bce90a04000200bff20182a9000c080009000d000000", 0x24) 04:07:55 executing program 0: r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0x4}}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x30, r2, 0x805, 0x0, 0x0, {{0x1, 0x40030000000000}, 0x4000, 0x6, 0x0, {0x14}}}, 0x30}}, 0x0) 04:07:55 executing program 2: syz_mount_image$hfs(&(0x7f00000000c0)='hf.\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000540)={[{@uid={'uid', 0x3d, 0xffffffffffffffff}}]}) 04:07:55 executing program 0: r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0x4}}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x30, r2, 0x805, 0x0, 0x0, {{0x1, 0x40030000000000}, 0x4800, 0x6, 0x0, {0x14}}}, 0x30}}, 0x0) 04:07:55 executing program 3: r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0x4}}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x30, r2, 0x805, 0x0, 0x0, {{0x1, 0x40030000000000}, 0x6000, 0x6, 0x0, {0x14}}}, 0x30}}, 0x0) 04:07:55 executing program 5: r0 = socket$inet_sctp(0x2, 0x5, 0x84) sendmsg$inet_sctp(r0, &(0x7f0000000400)={&(0x7f0000000000)=@in={0x2, 0x0, @remote}, 0x10, &(0x7f0000000080)=[{&(0x7f0000000040)='H', 0x1}], 0x1, &(0x7f00000003c0)=[@sndinfo={0x20, 0x84, 0x2, {0x0, 0x2}}], 0x20}, 0xfffffffe) 04:07:55 executing program 1: r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f0000000000)="240336001e0025eaa87865f51ef6bce90a04000200bff20182a9000c080009000d000000", 0x24) 04:07:55 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_SREGS(r2, 0x4138ae84, &(0x7f0000000100)={{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}}) 04:07:55 executing program 0: r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0x4}}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x30, r2, 0x805, 0x0, 0x0, {{0x1, 0x40030000000000}, 0x4c00, 0x6, 0x0, {0x14}}}, 0x30}}, 0x0) 04:07:55 executing program 1: r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f0000000000)="240037001e0025eaa87865f51ef6bce90a04000200bff20182a9000c080009000d000000", 0x24) 04:07:55 executing program 5: r0 = socket$inet_sctp(0x2, 0x5, 0x84) sendmsg$inet_sctp(r0, &(0x7f0000000400)={&(0x7f0000000000)=@in={0x2, 0x0, @remote}, 0x10, &(0x7f0000000080)=[{&(0x7f0000000040)='H', 0x1}], 0x1, &(0x7f00000003c0)=[@sndinfo={0x20, 0x84, 0x2, {0x0, 0x2}}], 0x20}, 0x8000000000) 04:07:55 executing program 3: r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0x4}}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x30, r2, 0x805, 0x0, 0x0, {{0x1, 0x40030000000000}, 0x6800, 0x6, 0x0, {0x14}}}, 0x30}}, 0x0) 04:07:55 executing program 2: syz_mount_image$hfs(&(0x7f00000000c0)='hf/\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000540)={[{@uid={'uid', 0x3d, 0xffffffffffffffff}}]}) 04:07:56 executing program 5: r0 = socket$inet_sctp(0x2, 0x5, 0x84) sendmsg$inet_sctp(r0, &(0x7f0000000400)={&(0x7f0000000000)=@in={0x2, 0x0, @remote}, 0x10, &(0x7f0000000080)=[{&(0x7f0000000040)='H', 0x1}], 0x1, &(0x7f00000003c0)=[@sndinfo={0x20, 0x84, 0x2, {0x0, 0x2}}], 0x20}, 0x100000000000000) 04:07:56 executing program 4: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000001bc0)={'nr0\x00', {0x2, 0x4e1e, @broadcast}}) 04:07:56 executing program 1: r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f0000000000)="240137001e0025eaa87865f51ef6bce90a04000200bff20182a9000c080009000d000000", 0x24) 04:07:56 executing program 3: r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0x4}}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x30, r2, 0x805, 0x0, 0x0, {{0x1, 0x40030000000000}, 0x6c00, 0x6, 0x0, {0x14}}}, 0x30}}, 0x0) 04:07:56 executing program 0: r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0x4}}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x30, r2, 0x805, 0x0, 0x0, {{0x1, 0x40030000000000}, 0x6000, 0x6, 0x0, {0x14}}}, 0x30}}, 0x0) 04:07:56 executing program 4: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000340)='/dev/nullb0\x00', 0x0, 0x0) ioctl$BLKIOOPT(r0, 0x1279, &(0x7f0000000380)) 04:07:56 executing program 2: syz_mount_image$hfs(&(0x7f00000000c0)='hf0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000540)={[{@uid={'uid', 0x3d, 0xffffffffffffffff}}]}) 04:07:56 executing program 5: r0 = socket$inet_sctp(0x2, 0x5, 0x84) sendmsg$inet_sctp(r0, &(0x7f0000000400)={&(0x7f0000000000)=@in={0x2, 0x0, @remote}, 0x10, &(0x7f0000000080)=[{&(0x7f0000000040)='H', 0x1}], 0x1, &(0x7f00000003c0)=[@sndinfo={0x20, 0x84, 0x2, {0x0, 0x2}}], 0x20}, 0x200000000000000) 04:07:56 executing program 1: r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f0000000000)="240237001e0025eaa87865f51ef6bce90a04000200bff20182a9000c080009000d000000", 0x24) 04:07:56 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = syz_open_dev$swradio(&(0x7f0000000000)='/dev/swradio#\x00', 0x1, 0x2) r2 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/sys/net/ipv4/vs/backup_only\x00', 0x2, 0x0) clock_gettime(0x0, &(0x7f0000000140)={0x0, 0x0}) ppoll(&(0x7f00000000c0)=[{0xffffffffffffffff, 0x4000}, {r2}, {}, {}, {r1, 0x1}], 0x5, &(0x7f0000000180)={r3, r4+10000000}, 0x0, 0x0) 04:07:56 executing program 0: r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0x4}}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x30, r2, 0x805, 0x0, 0x0, {{0x1, 0x40030000000000}, 0x6800, 0x6, 0x0, {0x14}}}, 0x30}}, 0x0) 04:07:56 executing program 3: r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0x4}}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x30, r2, 0x805, 0x0, 0x0, {{0x1, 0x40030000000000}, 0x7400, 0x6, 0x0, {0x14}}}, 0x30}}, 0x0) 04:07:56 executing program 5: r0 = socket$inet_sctp(0x2, 0x5, 0x84) sendmsg$inet_sctp(r0, &(0x7f0000000400)={&(0x7f0000000000)=@in={0x2, 0x0, @remote}, 0x10, &(0x7f0000000080)=[{&(0x7f0000000040)='H', 0x1}], 0x1, &(0x7f00000003c0)=[@sndinfo={0x20, 0x84, 0x2, {0x0, 0x2}}], 0x20}, 0x300000000000000) 04:07:56 executing program 1: r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f0000000000)="240337001e0025eaa87865f51ef6bce90a04000200bff20182a9000c080009000d000000", 0x24) 04:07:56 executing program 0: r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0x4}}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x30, r2, 0x805, 0x0, 0x0, {{0x1, 0x40030000000000}, 0x6c00, 0x6, 0x0, {0x14}}}, 0x30}}, 0x0) 04:07:56 executing program 3: r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0x4}}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x30, r2, 0x805, 0x0, 0x0, {{0x1, 0x40030000000000}, 0x7a00, 0x6, 0x0, {0x14}}}, 0x30}}, 0x0) 04:07:56 executing program 2: syz_mount_image$hfs(&(0x7f00000000c0)='hfX\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000540)={[{@uid={'uid', 0x3d, 0xffffffffffffffff}}]}) 04:07:56 executing program 1: r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f0000000000)="240038001e0025eaa87865f51ef6bce90a04000200bff20182a9000c080009000d000000", 0x24) 04:07:56 executing program 5: r0 = socket$inet_sctp(0x2, 0x5, 0x84) sendmsg$inet_sctp(r0, &(0x7f0000000400)={&(0x7f0000000000)=@in={0x2, 0x0, @remote}, 0x10, &(0x7f0000000080)=[{&(0x7f0000000040)='H', 0x1}], 0x1, &(0x7f00000003c0)=[@sndinfo={0x20, 0x84, 0x2, {0x0, 0x2}}], 0x20}, 0x400000000000000) 04:07:56 executing program 1: r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f0000000000)="240138001e0025eaa87865f51ef6bce90a04000200bff20182a9000c080009000d000000", 0x24) 04:07:56 executing program 3: r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0x4}}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x30, r2, 0x805, 0x0, 0x0, {{0x1, 0x40030000000000}, 0xf000, 0x6, 0x0, {0x14}}}, 0x30}}, 0x0) 04:07:57 executing program 4: unshare(0x2040400) r0 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ubi_ctrl\x00', 0x0, 0x0) ioctl$KVM_S390_INTERRUPT_CPU(r0, 0x4010ae94, 0x0) 04:07:57 executing program 0: r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0x4}}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x30, r2, 0x805, 0x0, 0x0, {{0x1, 0x40030000000000}, 0x7400, 0x6, 0x0, {0x14}}}, 0x30}}, 0x0) 04:07:57 executing program 5: r0 = socket$inet_sctp(0x2, 0x5, 0x84) sendmsg$inet_sctp(r0, &(0x7f0000000400)={&(0x7f0000000000)=@in={0x2, 0x0, @remote}, 0x10, &(0x7f0000000080)=[{&(0x7f0000000040)='H', 0x1}], 0x1, &(0x7f00000003c0)=[@sndinfo={0x20, 0x84, 0x2, {0x0, 0x2}}], 0x20}, 0x500000000000000) 04:07:57 executing program 2: syz_mount_image$hfs(&(0x7f00000000c0)='hf\\\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000540)={[{@uid={'uid', 0x3d, 0xffffffffffffffff}}]}) 04:07:57 executing program 1: r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f0000000000)="240238001e0025eaa87865f51ef6bce90a04000200bff20182a9000c080009000d000000", 0x24) 04:07:57 executing program 3: r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0x4}}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x30, r2, 0x805, 0x0, 0x0, {{0x1, 0x40030000000000}, 0x30000, 0x6, 0x0, {0x14}}}, 0x30}}, 0x0) 04:07:57 executing program 1: r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f0000000000)="240338001e0025eaa87865f51ef6bce90a04000200bff20182a9000c080009000d000000", 0x24) 04:07:57 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d6c0bcfe47bf070") lseek(0xffffffffffffffff, 0x0, 0x0) 04:07:57 executing program 0: r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0x4}}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x30, r2, 0x805, 0x0, 0x0, {{0x1, 0x40030000000000}, 0x7a00, 0x6, 0x0, {0x14}}}, 0x30}}, 0x0) 04:07:57 executing program 5: r0 = socket$inet_sctp(0x2, 0x5, 0x84) sendmsg$inet_sctp(r0, &(0x7f0000000400)={&(0x7f0000000000)=@in={0x2, 0x0, @remote}, 0x10, &(0x7f0000000080)=[{&(0x7f0000000040)='H', 0x1}], 0x1, &(0x7f00000003c0)=[@sndinfo={0x20, 0x84, 0x2, {0x0, 0x2}}], 0x20}, 0x600000000000000) 04:07:57 executing program 3: r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0x4}}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x30, r2, 0x805, 0x0, 0x0, {{0x1, 0x40030000000000}, 0x34000, 0x6, 0x0, {0x14}}}, 0x30}}, 0x0) 04:07:57 executing program 2: syz_mount_image$hfs(&(0x7f00000000c0)='hfc\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000540)={[{@uid={'uid', 0x3d, 0xffffffffffffffff}}]}) 04:07:57 executing program 1: r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f0000000000)="240039001e0025eaa87865f51ef6bce90a04000200bff20182a9000c080009000d000000", 0x24) 04:07:57 executing program 3: r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0x4}}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x30, r2, 0x805, 0x0, 0x0, {{0x1, 0x40030000000000}, 0x400300, 0x6, 0x0, {0x14}}}, 0x30}}, 0x0) 04:07:57 executing program 4: unshare(0x2040400) r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/audio\x00', 0x0, 0x0) ioctl$SIOCRSACCEPT(r0, 0x89e3) 04:07:57 executing program 0: r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0x4}}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x30, r2, 0x805, 0x0, 0x0, {{0x1, 0x40030000000000}, 0x8702, 0x6, 0x0, {0x14}}}, 0x30}}, 0x0) 04:07:57 executing program 5: r0 = socket$inet_sctp(0x2, 0x5, 0x84) sendmsg$inet_sctp(r0, &(0x7f0000000400)={&(0x7f0000000000)=@in={0x2, 0x0, @remote}, 0x10, &(0x7f0000000080)=[{&(0x7f0000000040)='H', 0x1}], 0x1, &(0x7f00000003c0)=[@sndinfo={0x20, 0x84, 0x2, {0x0, 0x2}}], 0x20}, 0x700000000000000) 04:07:57 executing program 4: r0 = openat$udambuf(0xffffffffffffff9c, &(0x7f0000000080)='/dev/udmabuf\x00', 0x2) fchown(r0, 0x0, 0x0) 04:07:57 executing program 3: r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0x4}}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x30, r2, 0x805, 0x0, 0x0, {{0x1, 0x40030000000000}, 0xf0ffff, 0x6, 0x0, {0x14}}}, 0x30}}, 0x0) 04:07:57 executing program 1: r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f0000000000)="240139001e0025eaa87865f51ef6bce90a04000200bff20182a9000c080009000d000000", 0x24) 04:07:57 executing program 0: r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0x4}}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x30, r2, 0x805, 0x0, 0x0, {{0x1, 0x40030000000000}, 0xf000, 0x6, 0x0, {0x14}}}, 0x30}}, 0x0) 04:07:57 executing program 5: r0 = socket$inet_sctp(0x2, 0x5, 0x84) sendmsg$inet_sctp(r0, &(0x7f0000000400)={&(0x7f0000000000)=@in={0x2, 0x0, @remote}, 0x10, &(0x7f0000000080)=[{&(0x7f0000000040)='H', 0x1}], 0x1, &(0x7f00000003c0)=[@sndinfo={0x20, 0x84, 0x2, {0x0, 0x2}}], 0x20}, 0x800000000000000) 04:07:57 executing program 4: unshare(0x2040400) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$BLKGETSIZE64(r0, 0x80081272, 0x0) 04:07:57 executing program 2: syz_mount_image$hfs(&(0x7f00000000c0)='hfd\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000540)={[{@uid={'uid', 0x3d, 0xffffffffffffffff}}]}) 04:07:58 executing program 3: r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0x4}}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x30, r2, 0x805, 0x0, 0x0, {{0x1, 0x40030000000000}, 0x1000000, 0x6, 0x0, {0x14}}}, 0x30}}, 0x0) 04:07:58 executing program 1: r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f0000000000)="240239001e0025eaa87865f51ef6bce90a04000200bff20182a9000c080009000d000000", 0x24) 04:07:58 executing program 5: r0 = socket$inet_sctp(0x2, 0x5, 0x84) sendmsg$inet_sctp(r0, &(0x7f0000000400)={&(0x7f0000000000)=@in={0x2, 0x0, @remote}, 0x10, &(0x7f0000000080)=[{&(0x7f0000000040)='H', 0x1}], 0x1, &(0x7f00000003c0)=[@sndinfo={0x20, 0x84, 0x2, {0x0, 0x2}}], 0x20}, 0x900000000000000) 04:07:58 executing program 0: r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0x4}}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x30, r2, 0x805, 0x0, 0x0, {{0x1, 0x40030000000000}, 0x30000, 0x6, 0x0, {0x14}}}, 0x30}}, 0x0) 04:07:58 executing program 4: unshare(0x2040400) r0 = syz_open_dev$swradio(&(0x7f0000000300)='/dev/swradio#\x00', 0x1, 0x2) inotify_add_watch(r0, 0x0, 0x100) 04:07:58 executing program 2: syz_mount_image$hfs(&(0x7f00000000c0)='hfi\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000540)={[{@uid={'uid', 0x3d, 0xffffffffffffffff}}]}) 04:07:58 executing program 3: r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0x4}}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x30, r2, 0x805, 0x0, 0x0, {{0x1, 0x40030000000000}, 0x2000000, 0x6, 0x0, {0x14}}}, 0x30}}, 0x0) 04:07:58 executing program 4: r0 = syz_open_dev$sndtimer(&(0x7f0000000000)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_NEXT_DEVICE(r0, 0xc0145401, &(0x7f00000002c0)={0x2}) 04:07:58 executing program 1: r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f0000000000)="240339001e0025eaa87865f51ef6bce90a04000200bff20182a9000c080009000d000000", 0x24) 04:07:58 executing program 5: r0 = socket$inet_sctp(0x2, 0x5, 0x84) sendmsg$inet_sctp(r0, &(0x7f0000000400)={&(0x7f0000000000)=@in={0x2, 0x0, @remote}, 0x10, &(0x7f0000000080)=[{&(0x7f0000000040)='H', 0x1}], 0x1, &(0x7f00000003c0)=[@sndinfo={0x20, 0x84, 0x2, {0x0, 0x2}}], 0x20}, 0xa00000000000000) 04:07:58 executing program 0: r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0x4}}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x30, r2, 0x805, 0x0, 0x0, {{0x1, 0x40030000000000}, 0x34000, 0x6, 0x0, {0x14}}}, 0x30}}, 0x0) 04:07:58 executing program 4: r0 = socket(0x42000000015, 0x805, 0x0) sendmmsg(r0, &(0x7f0000001500)=[{{0x0, 0x0, 0x0}}], 0x1, 0x4008001) 04:07:58 executing program 1: r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f0000000000)="24003a001e0025eaa87865f51ef6bce90a04000200bff20182a9000c080009000d000000", 0x24) 04:07:58 executing program 5: r0 = socket$inet_sctp(0x2, 0x5, 0x84) sendmsg$inet_sctp(r0, &(0x7f0000000400)={&(0x7f0000000000)=@in={0x2, 0x0, @remote}, 0x10, &(0x7f0000000080)=[{&(0x7f0000000040)='H', 0x1}], 0x1, &(0x7f00000003c0)=[@sndinfo={0x20, 0x84, 0x2, {0x0, 0x2}}], 0x20}, 0xe00000000000000) 04:07:58 executing program 2: syz_mount_image$hfs(&(0x7f00000000c0)='hfl\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000540)={[{@uid={'uid', 0x3d, 0xffffffffffffffff}}]}) 04:07:58 executing program 3: r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0x4}}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x30, r2, 0x805, 0x0, 0x0, {{0x1, 0x40030000000000}, 0x3000000, 0x6, 0x0, {0x14}}}, 0x30}}, 0x0) 04:07:58 executing program 4: mincore(&(0x7f0000004000/0x1000)=nil, 0x1000, 0x0) 04:07:58 executing program 0: r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0x4}}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x30, r2, 0x805, 0x0, 0x0, {{0x1, 0x40030000000000}, 0x400300, 0x6, 0x0, {0x14}}}, 0x30}}, 0x0) 04:07:58 executing program 1: r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f0000000000)="24013a001e0025eaa87865f51ef6bce90a04000200bff20182a9000c080009000d000000", 0x24) 04:07:58 executing program 3: r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0x4}}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x30, r2, 0x805, 0x0, 0x0, {{0x1, 0x40030000000000}, 0x4000000, 0x6, 0x0, {0x14}}}, 0x30}}, 0x0) 04:07:58 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)) pipe(&(0x7f0000000440)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$sndtimer(&(0x7f0000000040)='/dev/snd/timer\x00', 0x0, 0x0) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1ff}, 0x0, 0x0) 04:07:58 executing program 5: r0 = socket$inet_sctp(0x2, 0x5, 0x84) sendmsg$inet_sctp(r0, &(0x7f0000000400)={&(0x7f0000000000)=@in={0x2, 0x0, @remote}, 0x10, &(0x7f0000000080)=[{&(0x7f0000000040)='H', 0x1}], 0x1, &(0x7f00000003c0)=[@sndinfo={0x20, 0x84, 0x2, {0x0, 0x2}}], 0x20}, 0x1100000000000000) 04:07:59 executing program 0: r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0x4}}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x30, r2, 0x805, 0x0, 0x0, {{0x1, 0x40030000000000}, 0xf0ffff, 0x6, 0x0, {0x14}}}, 0x30}}, 0x0) 04:07:59 executing program 2: syz_mount_image$hfs(&(0x7f00000000c0)='hfo\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000540)={[{@uid={'uid', 0x3d, 0xffffffffffffffff}}]}) 04:07:59 executing program 4: timer_create(0x3, 0x0, &(0x7f0000000380)) timer_gettime(0x0, &(0x7f00000003c0)) 04:07:59 executing program 1: r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f0000000000)="24023a001e0025eaa87865f51ef6bce90a04000200bff20182a9000c080009000d000000", 0x24) 04:07:59 executing program 5: r0 = socket$inet_sctp(0x2, 0x5, 0x84) sendmsg$inet_sctp(r0, &(0x7f0000000400)={&(0x7f0000000000)=@in={0x2, 0x0, @remote}, 0x10, &(0x7f0000000080)=[{&(0x7f0000000040)='H', 0x1}], 0x1, &(0x7f00000003c0)=[@sndinfo={0x20, 0x84, 0x2, {0x0, 0x2}}], 0x20}, 0x2000000000000000) 04:07:59 executing program 4: openat$null(0xffffffffffffff9c, 0x0, 0x640, 0x0) open(0x0, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = memfd_create(&(0x7f00000004c0)='/dev/snd/seq\x00', 0x0) r1 = memfd_create(&(0x7f0000000140)='lotrusted\x1a\x00', 0x0) r2 = syz_open_dev$sndseq(&(0x7f00000003c0)='/dev/snd/seq\x00', 0x0, 0x1) r3 = dup2(r2, r1) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r3, 0xc08c5332, &(0x7f0000000280)={0x0, 0x0, 0x0, 'queue1\x00\x00\x00\x00\x00\x00\x00\x001;\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x06\x00\x00\x00\x00\x00\xcc\xbf}\xdd\x00'}) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_INFO(0xffffffffffffffff, 0xc08c5334, &(0x7f00000001c0)={0xf48b, 0x0, 0x0, 'queue0\x00'}) write$sndseq(r1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @connect}], 0xffffff76) fstatfs(r0, &(0x7f0000005200)=""/4096) ioctl$DRM_IOCTL_ADD_MAP(0xffffffffffffffff, 0xc0286415, 0x0) close(0xffffffffffffffff) 04:07:59 executing program 3: r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0x4}}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x30, r2, 0x805, 0x0, 0x0, {{0x1, 0x40030000000000}, 0x5000000, 0x6, 0x0, {0x14}}}, 0x30}}, 0x0) 04:07:59 executing program 0: r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0x4}}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x30, r2, 0x805, 0x0, 0x0, {{0x1, 0x40030000000000}, 0x1000000, 0x6, 0x0, {0x14}}}, 0x30}}, 0x0) 04:07:59 executing program 1: r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f0000000000)="24033a001e0025eaa87865f51ef6bce90a04000200bff20182a9000c080009000d000000", 0x24) 04:07:59 executing program 5: r0 = socket$inet_sctp(0x2, 0x5, 0x84) sendmsg$inet_sctp(r0, &(0x7f0000000400)={&(0x7f0000000000)=@in={0x2, 0x0, @remote}, 0x10, &(0x7f0000000080)=[{&(0x7f0000000040)='H', 0x1}], 0x1, &(0x7f00000003c0)=[@sndinfo={0x20, 0x84, 0x2, {0x0, 0x2}}], 0x20}, 0x2c01000000000000) 04:07:59 executing program 3: r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0x4}}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x30, r2, 0x805, 0x0, 0x0, {{0x1, 0x40030000000000}, 0x6000000, 0x6, 0x0, {0x14}}}, 0x30}}, 0x0) 04:07:59 executing program 2: syz_mount_image$hfs(&(0x7f00000000c0)='hfp\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000540)={[{@uid={'uid', 0x3d, 0xffffffffffffffff}}]}) 04:07:59 executing program 1: r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f0000000000)="24003b001e0025eaa87865f51ef6bce90a04000200bff20182a9000c080009000d000000", 0x24) 04:07:59 executing program 0: r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0x4}}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x30, r2, 0x805, 0x0, 0x0, {{0x1, 0x40030000000000}, 0x2000000, 0x6, 0x0, {0x14}}}, 0x30}}, 0x0) 04:07:59 executing program 3: r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0x4}}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x30, r2, 0x805, 0x0, 0x0, {{0x1, 0x40030000000000}, 0x7000000, 0x6, 0x0, {0x14}}}, 0x30}}, 0x0) 04:07:59 executing program 5: r0 = socket$inet_sctp(0x2, 0x5, 0x84) sendmsg$inet_sctp(r0, &(0x7f0000000400)={&(0x7f0000000000)=@in={0x2, 0x0, @remote}, 0x10, &(0x7f0000000080)=[{&(0x7f0000000040)='H', 0x1}], 0x1, &(0x7f00000003c0)=[@sndinfo={0x20, 0x84, 0x2, {0x0, 0x2}}], 0x20}, 0x4000000000000000) 04:07:59 executing program 1: r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f0000000000)="24013b001e0025eaa87865f51ef6bce90a04000200bff20182a9000c080009000d000000", 0x24) 04:08:00 executing program 4: unshare(0x2040400) r0 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000080)='/dev/cachefiles\x00', 0x220201, 0x0) finit_module(r0, 0x0, 0x0) 04:08:00 executing program 2: syz_mount_image$hfs(&(0x7f00000000c0)='hfu\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000540)={[{@uid={'uid', 0x3d, 0xffffffffffffffff}}]}) 04:08:00 executing program 0: r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0x4}}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x30, r2, 0x805, 0x0, 0x0, {{0x1, 0x40030000000000}, 0x3000000, 0x6, 0x0, {0x14}}}, 0x30}}, 0x0) 04:08:00 executing program 3: r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0x4}}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x30, r2, 0x805, 0x0, 0x0, {{0x1, 0x40030000000000}, 0xa000000, 0x6, 0x0, {0x14}}}, 0x30}}, 0x0) 04:08:00 executing program 5: r0 = socket$inet_sctp(0x2, 0x5, 0x84) sendmsg$inet_sctp(r0, &(0x7f0000000400)={&(0x7f0000000000)=@in={0x2, 0x0, @remote}, 0x10, &(0x7f0000000080)=[{&(0x7f0000000040)='H', 0x1}], 0x1, &(0x7f00000003c0)=[@sndinfo={0x20, 0x84, 0x2, {0x0, 0x2}}], 0x20}, 0x4401000000000000) 04:08:00 executing program 1: r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f0000000000)="24023b001e0025eaa87865f51ef6bce90a04000200bff20182a9000c080009000d000000", 0x24) 04:08:00 executing program 5: r0 = socket$inet_sctp(0x2, 0x5, 0x84) sendmsg$inet_sctp(r0, &(0x7f0000000400)={&(0x7f0000000000)=@in={0x2, 0x0, @remote}, 0x10, &(0x7f0000000080)=[{&(0x7f0000000040)='H', 0x1}], 0x1, &(0x7f00000003c0)=[@sndinfo={0x20, 0x84, 0x2, {0x0, 0x2}}], 0x20}, 0xe803000000000000) 04:08:00 executing program 1: r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f0000000000)="24033b001e0025eaa87865f51ef6bce90a04000200bff20182a9000c080009000d000000", 0x24) 04:08:00 executing program 3: r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0x4}}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x30, r2, 0x805, 0x0, 0x0, {{0x1, 0x40030000000000}, 0xe000000, 0x6, 0x0, {0x14}}}, 0x30}}, 0x0) 04:08:00 executing program 4: unshare(0x2040400) r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x0, 0x0) recvmsg(r0, 0x0, 0x0) 04:08:00 executing program 0: r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0x4}}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x30, r2, 0x805, 0x0, 0x0, {{0x1, 0x40030000000000}, 0x4000000, 0x6, 0x0, {0x14}}}, 0x30}}, 0x0) 04:08:00 executing program 2: syz_mount_image$hfs(&(0x7f00000000c0)='hfx\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000540)={[{@uid={'uid', 0x3d, 0xffffffffffffffff}}]}) 04:08:00 executing program 1: r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f0000000000)="24003c001e0025eaa87865f51ef6bce90a04000200bff20182a9000c080009000d000000", 0x24) 04:08:00 executing program 5: r0 = socket$inet_sctp(0x2, 0x5, 0x84) sendmsg$inet_sctp(r0, &(0x7f0000000400)={&(0x7f0000000000)=@in={0x2, 0x0, @remote}, 0x10, &(0x7f0000000080)=[{&(0x7f0000000040)='H', 0x1}], 0x1, &(0x7f00000003c0)=[@sndinfo={0x20, 0x84, 0x2, {0x0, 0x2}}], 0x20}, 0xf401000000000000) 04:08:00 executing program 3: r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0x4}}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x30, r2, 0x805, 0x0, 0x0, {{0x1, 0x40030000000000}, 0xf000000, 0x6, 0x0, {0x14}}}, 0x30}}, 0x0) 04:08:00 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000001200)={0x9, 0x1, &(0x7f0000001280)=ANY=[@ANYBLOB="1800000002000000"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x7, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) 04:08:00 executing program 0: r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0x4}}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x30, r2, 0x805, 0x0, 0x0, {{0x1, 0x40030000000000}, 0x5000000, 0x6, 0x0, {0x14}}}, 0x30}}, 0x0) 04:08:00 executing program 5: r0 = socket$inet_sctp(0x2, 0x5, 0x84) sendmsg$inet_sctp(r0, &(0x7f0000000400)={&(0x7f0000000000)=@in={0x2, 0x0, @remote}, 0x10, &(0x7f0000000080)=[{&(0x7f0000000040)='H', 0x1}], 0x1, &(0x7f00000003c0)=[@sndinfo={0x20, 0x84, 0x2, {0x0, 0x2}}], 0x20}, 0xfc00000000000000) 04:08:00 executing program 4: unshare(0x2040400) r0 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000080)='/dev/cachefiles\x00', 0x220201, 0x0) recvmsg(r0, 0x0, 0x0) 04:08:00 executing program 1: r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f0000000000)="24013c001e0025eaa87865f51ef6bce90a04000200bff20182a9000c080009000d000000", 0x24) 04:08:00 executing program 3: r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0x4}}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x30, r2, 0x805, 0x0, 0x0, {{0x1, 0x40030000000000}, 0x2f020000, 0x6, 0x0, {0x14}}}, 0x30}}, 0x0) 04:08:00 executing program 0: r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0x4}}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x30, r2, 0x805, 0x0, 0x0, {{0x1, 0x40030000000000}, 0x6000000, 0x6, 0x0, {0x14}}}, 0x30}}, 0x0) 04:08:00 executing program 2: syz_mount_image$hfs(&(0x7f00000000c0)='hfs\x02', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000540)={[{@uid={'uid', 0x3d, 0xffffffffffffffff}}]}) 04:08:00 executing program 5: r0 = socket$inet_sctp(0x2, 0x5, 0x84) sendmsg$inet_sctp(r0, &(0x7f0000000400)={&(0x7f0000000000)=@in={0x2, 0x0, @remote}, 0x10, &(0x7f0000000080)=[{&(0x7f0000000040)='H', 0x1}], 0x1, &(0x7f00000003c0)=[@sndinfo={0x20, 0x84, 0x2, {0x0, 0x2}}], 0x20}, 0xfcff000000000000) 04:08:01 executing program 4: unshare(0x2040400) recvmsg(0xffffffffffffffff, 0x0, 0x0) 04:08:01 executing program 1: r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f0000000000)="24023c001e0025eaa87865f51ef6bce90a04000200bff20182a9000c080009000d000000", 0x24) 04:08:01 executing program 5: r0 = socket$inet_sctp(0x2, 0x5, 0x84) sendmsg$inet_sctp(r0, &(0x7f0000000400)={&(0x7f0000000000)=@in={0x2, 0x0, @remote}, 0x10, &(0x7f0000000080)=[{&(0x7f0000000040)='H', 0x1}], 0x1, &(0x7f00000003c0)=[@sndinfo={0x20, 0x84, 0x2, {0x0, 0x2}}], 0x20}, 0xfe80000000000000) 04:08:01 executing program 0: r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0x4}}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x30, r2, 0x805, 0x0, 0x0, {{0x1, 0x40030000000000}, 0x7000000, 0x6, 0x0, {0x14}}}, 0x30}}, 0x0) 04:08:01 executing program 1: r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f0000000000)="24033c001e0025eaa87865f51ef6bce90a04000200bff20182a9000c080009000d000000", 0x24) 04:08:01 executing program 4: unshare(0x2040400) r0 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000000)='/proc/capi/capi20\x00', 0x0, 0x0) ioctl$TUNDETACHFILTER(r0, 0x401054d6, 0x0) 04:08:01 executing program 3: r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0x4}}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x30, r2, 0x805, 0x0, 0x0, {{0x1, 0x40030000000000}, 0x3f000000, 0x6, 0x0, {0x14}}}, 0x30}}, 0x0) 04:08:01 executing program 5: r0 = socket$inet_sctp(0x2, 0x5, 0x84) sendmsg$inet_sctp(r0, &(0x7f0000000400)={&(0x7f0000000000)=@in={0x2, 0x0, @remote}, 0x10, &(0x7f0000000080)=[{&(0x7f0000000040)='H', 0x1}], 0x1, &(0x7f00000003c0)=[@sndinfo={0x20, 0x84, 0x2, {0x0, 0x2}}], 0x20}, 0xfec0000000000000) 04:08:01 executing program 2: syz_mount_image$hfs(&(0x7f00000000c0)='hfs\x03', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000540)={[{@uid={'uid', 0x3d, 0xffffffffffffffff}}]}) 04:08:01 executing program 1: r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f0000000000)="24003d001e0025eaa87865f51ef6bce90a04000200bff20182a9000c080009000d000000", 0x24) 04:08:01 executing program 3: r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0x4}}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x30, r2, 0x805, 0x0, 0x0, {{0x1, 0x40030000000000}, 0x40000000, 0x6, 0x0, {0x14}}}, 0x30}}, 0x0) 04:08:01 executing program 4: unshare(0x2040400) r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000001600)='/dev/zero\x00', 0x2, 0x0) write$FUSE_NOTIFY_RETRIEVE(r0, 0x0, 0x0) 04:08:01 executing program 5: r0 = socket$inet_sctp(0x2, 0x5, 0x84) sendmsg$inet_sctp(r0, &(0x7f0000000400)={&(0x7f0000000000)=@in={0x2, 0x0, @remote}, 0x10, &(0x7f0000000080)=[{&(0x7f0000000040)='H', 0x1}], 0x1, &(0x7f00000003c0)=[@sndinfo={0x20, 0x84, 0x2, {0x0, 0x2}}], 0x20}, 0xfeffffff00000000) 04:08:01 executing program 0: r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0x4}}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x30, r2, 0x805, 0x0, 0x0, {{0x1, 0x40030000000000}, 0xa000000, 0x6, 0x0, {0x14}}}, 0x30}}, 0x0) 04:08:01 executing program 1: r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f0000000000)="24013d001e0025eaa87865f51ef6bce90a04000200bff20182a9000c080009000d000000", 0x24) 04:08:01 executing program 4: r0 = socket(0x42000000015, 0x805, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000080)={'sit0\x00', &(0x7f0000000040)=@ethtool_rxfh={0x46, 0x0, 0x0, 0x0, 0x0, "fd248c"}}) 04:08:01 executing program 3: r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0x4}}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x30, r2, 0x805, 0x0, 0x0, {{0x1, 0x40030000000000}, 0x48000000, 0x6, 0x0, {0x14}}}, 0x30}}, 0x0) 04:08:01 executing program 5: r0 = socket$inet_sctp(0x2, 0x5, 0x84) sendmsg$inet_sctp(r0, &(0x7f0000000400)={&(0x7f0000000000)=@in={0x2, 0x0, @remote}, 0x10, &(0x7f0000000080)=[{&(0x7f0000000040)='H', 0x1}], 0x1, &(0x7f00000003c0)=[@sndinfo={0x20, 0x84, 0x2, {0x0, 0x2}}], 0x20}, 0xff00000000000000) 04:08:01 executing program 2: syz_mount_image$hfs(&(0x7f00000000c0)='hfs\x04', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000540)={[{@uid={'uid', 0x3d, 0xffffffffffffffff}}]}) 04:08:01 executing program 4: unshare(0x2040400) r0 = syz_open_dev$media(&(0x7f0000000080)='/dev/media#\x00', 0x0, 0x0) ioctl$SG_GET_RESERVED_SIZE(r0, 0x40049409, 0x0) 04:08:01 executing program 1: r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f0000000000)="24023d001e0025eaa87865f51ef6bce90a04000200bff20182a9000c080009000d000000", 0x24) 04:08:01 executing program 0: r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0x4}}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x30, r2, 0x805, 0x0, 0x0, {{0x1, 0x40030000000000}, 0xe000000, 0x6, 0x0, {0x14}}}, 0x30}}, 0x0) 04:08:01 executing program 5: r0 = socket$inet_sctp(0x2, 0x5, 0x84) sendmsg$inet_sctp(r0, &(0x7f0000000400)={&(0x7f0000000000)=@in={0x2, 0x0, @remote}, 0x10, &(0x7f0000000080)=[{&(0x7f0000000040)='H', 0x1}], 0x1, &(0x7f00000003c0)=[@sndinfo={0x20, 0x84, 0x2, {0x0, 0x2}}], 0x20}, 0xffffffff00000000) 04:08:01 executing program 3: r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0x4}}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x30, r2, 0x805, 0x0, 0x0, {{0x1, 0x40030000000000}, 0x4c000000, 0x6, 0x0, {0x14}}}, 0x30}}, 0x0) 04:08:02 executing program 4: unshare(0x2040400) r0 = syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_DOORLOCK(r0, 0x5380) 04:08:02 executing program 1: r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f0000000000)="24033d001e0025eaa87865f51ef6bce90a04000200bff20182a9000c080009000d000000", 0x24) 04:08:02 executing program 5: r0 = socket$inet_sctp(0x2, 0x5, 0x84) semget(0x1, 0x1, 0x9840169435d69335) sendmsg$inet_sctp(r0, &(0x7f0000000400)={&(0x7f0000000000)=@in={0x2, 0x0, @remote}, 0x10, &(0x7f0000000080)=[{&(0x7f0000000040)='H', 0x1}], 0x1, &(0x7f00000003c0)=ANY=[@ANYBLOB="200000000000000084000001020000000000", @ANYRES32=0x0], 0x20}, 0x0) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/snapshot\x00', 0x20800, 0x0) ioctl$SIOCAX25OPTRT(r1, 0x89e7, &(0x7f0000000100)={@default, @default, 0x2, 0x56}) 04:08:02 executing program 3: r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0x4}}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x30, r2, 0x805, 0x0, 0x0, {{0x1, 0x40030000000000}, 0x60000000, 0x6, 0x0, {0x14}}}, 0x30}}, 0x0) 04:08:02 executing program 0: r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0x4}}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x30, r2, 0x805, 0x0, 0x0, {{0x1, 0x40030000000000}, 0xf000000, 0x6, 0x0, {0x14}}}, 0x30}}, 0x0) 04:08:02 executing program 2: syz_mount_image$hfs(&(0x7f00000000c0)='hfs\x05', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000540)={[{@uid={'uid', 0x3d, 0xffffffffffffffff}}]}) 04:08:02 executing program 4: unshare(0x2040400) r0 = syz_open_dev$swradio(&(0x7f0000000300)='/dev/swradio#\x00', 0x1, 0x2) ioctl$int_in(r0, 0x5421, &(0x7f0000000000)) 04:08:02 executing program 1: r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f0000000000)="24003e001e0025eaa87865f51ef6bce90a04000200bff20182a9000c080009000d000000", 0x24) 04:08:02 executing program 3: r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0x4}}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x30, r2, 0x805, 0x0, 0x0, {{0x1, 0x40030000000000}, 0x68000000, 0x6, 0x0, {0x14}}}, 0x30}}, 0x0) 04:08:02 executing program 4: r0 = syz_open_dev$swradio(&(0x7f0000000000)='/dev/swradio#\x00', 0x1, 0x2) clock_gettime(0x0, &(0x7f0000000140)={0x0, 0x0}) ppoll(&(0x7f00000000c0)=[{r0, 0x4000}, {}, {}, {r0, 0x4005}], 0x4, &(0x7f0000000180)={r1, r2+10000000}, 0x0, 0x0) 04:08:02 executing program 5: r0 = socket$inet_sctp(0x2, 0x5, 0x84) ioctl$sock_SIOCGSKNS(r0, 0x894c, &(0x7f00000000c0)=0x40) sendmsg$inet_sctp(r0, &(0x7f0000000400)={&(0x7f0000000000)=@in={0x2, 0x0, @remote}, 0x10, &(0x7f0000000080)=[{&(0x7f0000000040)='H', 0x1}], 0x1, &(0x7f00000003c0)=[@sndinfo={0x20, 0x84, 0x2, {0x0, 0x2}}], 0x20}, 0x0) 04:08:02 executing program 0: r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0x4}}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x30, r2, 0x805, 0x0, 0x0, {{0x1, 0x40030000000000}, 0x3f000000, 0x6, 0x0, {0x14}}}, 0x30}}, 0x0) 04:08:02 executing program 1: r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f0000000000)="24013e001e0025eaa87865f51ef6bce90a04000200bff20182a9000c080009000d000000", 0x24) 04:08:02 executing program 2: syz_mount_image$hfs(&(0x7f00000000c0)='hfs\x06', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000540)={[{@uid={'uid', 0x3d, 0xffffffffffffffff}}]}) 04:08:02 executing program 3: r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0x4}}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x30, r2, 0x805, 0x0, 0x0, {{0x1, 0x40030000000000}, 0x6c000000, 0x6, 0x0, {0x14}}}, 0x30}}, 0x0) 04:08:02 executing program 5: r0 = socket$inet_sctp(0x2, 0x5, 0x84) r1 = syz_open_procfs(0x0, &(0x7f0000000380)='task\x00') fstat(r1, &(0x7f0000000100)) ioctl$IMDELTIMER(r1, 0x80044941, &(0x7f00000000c0)=0x2) sendmsg$inet_sctp(r0, &(0x7f0000000400)={&(0x7f0000000000)=@in={0x2, 0x0, @remote}, 0x10, &(0x7f0000000080)=[{&(0x7f0000000040)='H', 0x1}], 0x1, &(0x7f00000003c0)=[@sndinfo={0x20, 0x84, 0x2, {0x0, 0x2}}], 0x20}, 0x0) 04:08:02 executing program 0: r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0x4}}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x30, r2, 0x805, 0x0, 0x0, {{0x1, 0x40030000000000}, 0x40000000, 0x6, 0x0, {0x14}}}, 0x30}}, 0x0) 04:08:02 executing program 1: r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f0000000000)="24023e001e0025eaa87865f51ef6bce90a04000200bff20182a9000c080009000d000000", 0x24) 04:08:02 executing program 3: r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0x4}}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x30, r2, 0x805, 0x0, 0x0, {{0x1, 0x40030000000000}, 0x74000000, 0x6, 0x0, {0x14}}}, 0x30}}, 0x0) 04:08:02 executing program 5: r0 = socket$inet_sctp(0x2, 0x5, 0x84) r1 = dup(r0) r2 = syz_genetlink_get_family_id$team(&(0x7f0000000200)='team\x00') getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x1c, &(0x7f0000000240)={@loopback, 0x0}, &(0x7f0000000280)=0x14) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000002c0)={{{@in6=@remote, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@broadcast}, 0x0, @in=@local}}, &(0x7f0000000440)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000540)={{{@in6=@dev, @in=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@dev}, 0x0, @in=@multicast1}}, &(0x7f0000000640)=0xe8) accept$packet(0xffffffffffffffff, &(0x7f00000006c0)={0x11, 0x0, 0x0}, &(0x7f0000000700)=0x14) accept4$packet(0xffffffffffffffff, &(0x7f0000002c00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000002c40)=0x14, 0x80000) accept$packet(0xffffffffffffffff, &(0x7f0000002cc0)={0x11, 0x0, 0x0}, &(0x7f0000002d00)=0x14) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x14, &(0x7f0000002f80)={@empty, 0x0}, &(0x7f0000002fc0)=0x14) sendmsg$TEAM_CMD_OPTIONS_GET(r1, &(0x7f0000003300)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x10800000}, 0xc, &(0x7f00000032c0)={&(0x7f0000003000)={0x2b4, r2, 0x400, 0x70bd28, 0x25dfdbfb, {}, [{{0x8, 0x1, r3}, {0x1ac, 0x2, [{0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x8}, {0x8, 0x4, r4}}}, {0x38, 0x1, @notify_peers_interval={{0x24, 0x1, 'notify_peers_interval\x00'}, {0x8}, {0x8, 0x4, 0x866e}}}, {0x40, 0x1, @priority={{{0x24, 0x1, 'priority\x00'}, {0x8}, {0x8, 0x4, 0xc8c}}, {0x8, 0x6, r5}}}, {0x40, 0x1, @lb_port_stats={{{0x24, 0x1, 'lb_port_stats\x00'}, {0x8}, {0x8, 0x4, 0x6}}, {0x8, 0x6, r6}}}, {0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x8}, {0x8, 0x4, r7}}}, {0x40, 0x1, @queue_id={{{0x24, 0x1, 'queue_id\x00'}, {0x8}, {0x8}}, {0x8, 0x6, r8}}}, {0x40, 0x1, @lb_hash_stats={{{0x24, 0x1, 'lb_hash_stats\x00'}, {0x8}, {0x8, 0x4, 0xde5d}}, {0x8}}}]}}, {{0x8, 0x1, r9}, {0xe4, 0x2, [{0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x8, 0x4, 0x8001}}}, {0x38, 0x1, @notify_peers_count={{0x24, 0x1, 'notify_peers_count\x00'}, {0x8}, {0x8, 0x4, 0x100000001}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x8}, {0x8, 0x4, 0xffff}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x8, 0x4, 0x4}}}]}}]}, 0x2b4}, 0x1, 0x0, 0x0, 0x800}, 0x4000) r10 = accept$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x0, 0x0, @dev}, &(0x7f0000000100)=0x1c) prctl$PR_SET_KEEPCAPS(0x8, 0x1) getsockopt$IP6T_SO_GET_REVISION_TARGET(r10, 0x29, 0x45, &(0x7f0000000140)={'HL\x00'}, &(0x7f0000000180)=0x1e) sendmsg$inet_sctp(r0, &(0x7f0000000400)={&(0x7f0000000000)=@in={0x2, 0x0, @remote}, 0x10, &(0x7f0000000080)=[{&(0x7f0000000040)='H', 0x1}], 0x1, &(0x7f00000003c0)=[@sndinfo={0x20, 0x84, 0x2, {0x0, 0x2}}], 0x20}, 0x0) 04:08:03 executing program 2: syz_mount_image$hfs(&(0x7f00000000c0)='hfs\a', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000540)={[{@uid={'uid', 0x3d, 0xffffffffffffffff}}]}) 04:08:03 executing program 4: syz_open_dev$mouse(0x0, 0x0, 0x20000) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCLINUX7(0xffffffffffffffff, 0x541c, &(0x7f00000003c0)={0x7, 0xfffffffffffff7a6}) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000200)='/dev/snapshot\x00', 0x20000, 0x0) 04:08:03 executing program 0: r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0x4}}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x30, r2, 0x805, 0x0, 0x0, {{0x1, 0x40030000000000}, 0x48000000, 0x6, 0x0, {0x14}}}, 0x30}}, 0x0) 04:08:03 executing program 1: r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f0000000000)="24033e001e0025eaa87865f51ef6bce90a04000200bff20182a9000c080009000d000000", 0x24) 04:08:03 executing program 3: r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0x4}}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x30, r2, 0x805, 0x0, 0x0, {{0x1, 0x40030000000000}, 0x7a000000, 0x6, 0x0, {0x14}}}, 0x30}}, 0x0) 04:08:03 executing program 5: r0 = socket$inet_sctp(0x2, 0x4deccf9adbe273c7, 0x84) sendmsg$inet_sctp(r0, &(0x7f0000000400)={&(0x7f0000000000)=@in={0x2, 0x0, @remote}, 0x10, &(0x7f0000000080)=[{&(0x7f0000000040)='H', 0x1}], 0x1, &(0x7f00000003c0)=[@sndinfo={0x20, 0x84, 0x2, {0x0, 0x2}}], 0x20}, 0x0) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer2\x00', 0x0, 0x0) r2 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000140)='TIPCv2\x00') sendmsg$TIPC_NL_BEARER_GET(r1, &(0x7f0000000300)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f00000002c0)={&(0x7f0000000180)={0x13c, r2, 0x800, 0x70bd2a, 0x25dfdbfb, {}, [@TIPC_NLA_MON={0x14, 0x9, [@TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x1086}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x8b}]}, @TIPC_NLA_BEARER={0x84, 0x1, [@TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x1}, @TIPC_NLA_BEARER_UDP_OPTS={0x2c, 0x4, {{0x14, 0x1, @in={0x2, 0x4e23, @broadcast}}, {0x14, 0x2, @in={0x2, 0x4e20, @loopback}}}}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x8a6580000000000}, @TIPC_NLA_BEARER_NAME={0x10, 0x1, @udp='udp:syz0\x00'}, @TIPC_NLA_BEARER_PROP={0x2c, 0x2, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x40}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x831}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x1}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x6}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x9}]}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x1ff}]}, @TIPC_NLA_NET={0x18, 0x7, [@TIPC_NLA_NET_NODEID_W1={0xc}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x9}]}, @TIPC_NLA_SOCK={0x14, 0x2, [@TIPC_NLA_SOCK_REF={0x8, 0x2, 0xfff}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}]}, @TIPC_NLA_MEDIA={0x64, 0x5, [@TIPC_NLA_MEDIA_PROP={0x34, 0x2, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x6}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x3}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0xf0}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x100}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x10}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x58}]}, @TIPC_NLA_MEDIA_PROP={0x2c, 0x2, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x1}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x7f}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x4}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x9}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x5f}]}]}]}, 0x13c}, 0x1, 0x0, 0x0, 0x10}, 0x10) 04:08:03 executing program 2: syz_mount_image$hfs(&(0x7f00000000c0)='hfs\b', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000540)={[{@uid={'uid', 0x3d, 0xffffffffffffffff}}]}) 04:08:03 executing program 3: r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0x4}}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x30, r2, 0x805, 0x0, 0x0, {{0x1, 0x40030000000000}, 0x9effffff, 0x6, 0x0, {0x14}}}, 0x30}}, 0x0) 04:08:03 executing program 0: r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0x4}}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x30, r2, 0x805, 0x0, 0x0, {{0x1, 0x40030000000000}, 0x4c000000, 0x6, 0x0, {0x14}}}, 0x30}}, 0x0) 04:08:03 executing program 1: r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f0000000000)="24003f001e0025eaa87865f51ef6bce90a04000200bff20182a9000c080009000d000000", 0x24) 04:08:03 executing program 5: r0 = socket$inet_sctp(0x2, 0x5, 0x84) sendmsg$inet_sctp(r0, &(0x7f0000000400)={&(0x7f0000000000)=@in={0x2, 0x0, @remote}, 0x10, &(0x7f0000000080), 0x0, &(0x7f0000006380)=ANY=[@ANYBLOB="200000000000000084c0d1c4fe23250000000336000000190200000000f8ff000000", @ANYRES32=0x0], 0x26}, 0x0) getsockopt$inet_sctp_SCTP_PR_SUPPORTED(r0, 0x84, 0x71, &(0x7f0000000040)={0x0, 0x8}, &(0x7f0000000080)=0x8) getsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(r0, 0x84, 0x72, &(0x7f00000003c0)={r1, 0x6}, &(0x7f00000063c0)=0xc) recvmmsg(r0, &(0x7f0000006180)=[{{&(0x7f00000000c0)=@can, 0x80, &(0x7f0000001440)=[{&(0x7f0000000140)=""/219, 0xdb}, {&(0x7f0000000240)=""/63, 0x3f}, {&(0x7f0000000280)=""/32, 0x20}, {&(0x7f0000000440)=""/4096, 0x1000}, {&(0x7f00000002c0)=""/158, 0x9e}], 0x5, &(0x7f00000014c0)=""/4096, 0x1000}, 0x2}, {{0x0, 0x0, &(0x7f0000002800)=[{&(0x7f00000024c0)=""/249, 0xf9}, {&(0x7f00000025c0)=""/84, 0x54}, {&(0x7f0000002640)=""/192, 0xc0}, {&(0x7f0000000380)=""/61, 0x3d}, {&(0x7f0000002700)=""/26, 0x1a}, {&(0x7f0000002740)=""/134, 0x86}], 0x6, &(0x7f0000002880)=""/77, 0x4d}, 0x5}, {{&(0x7f0000002900)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff}}, 0x80, &(0x7f0000003980)=[{&(0x7f0000002980)=""/4096, 0x1000}], 0x1, &(0x7f00000039c0)=""/4096, 0x1000}, 0x5}, {{&(0x7f00000049c0)=@nl=@proc, 0x80, &(0x7f0000004dc0)=[{&(0x7f0000004a40)=""/245, 0xf5}, {&(0x7f0000004b40)=""/102, 0x66}, {&(0x7f0000004bc0)=""/42, 0x2a}, {&(0x7f0000004c00)=""/156, 0x9c}, {&(0x7f0000004cc0)=""/216, 0xd8}], 0x5, &(0x7f0000004e40)=""/138, 0x8a}, 0x40}, {{&(0x7f0000004f00)=@in6, 0x80, &(0x7f0000006080)=[{&(0x7f0000004f80)=""/4096, 0x1000}, {&(0x7f0000005f80)=""/222, 0xde}], 0x2, &(0x7f00000060c0)=""/182, 0xb6}, 0x101}], 0x5, 0x100, &(0x7f00000062c0)={0x0, 0x989680}) getsockopt$inet6_udp_int(r2, 0x11, 0x66, &(0x7f0000006300), &(0x7f0000006340)=0x4) 04:08:03 executing program 4: r0 = syz_open_dev$radio(&(0x7f0000000000)='/dev/radio#\x00', 0x3, 0x2) ioctl$VIDIOC_SUBSCRIBE_EVENT(r0, 0x4020565a, &(0x7f0000000100)) 04:08:03 executing program 2: syz_mount_image$hfs(&(0x7f00000000c0)='hfs\t', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000540)={[{@uid={'uid', 0x3d, 0xffffffffffffffff}}]}) 04:08:03 executing program 5: r0 = socket$inet_sctp(0x2, 0x5, 0x84) sendmsg$inet_sctp(r0, &(0x7f0000000400)={&(0x7f0000000000)=@in={0x2, 0x0, @remote}, 0x10, &(0x7f0000000080)=[{&(0x7f0000000040)='H', 0x1}], 0x1, &(0x7f00000003c0)=ANY=[@ANYBLOB="20f2ffff220100000000100000", @ANYRES32=0x0], 0x20}, 0x0) 04:08:03 executing program 1: r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f0000000000)="24013f001e0025eaa87865f51ef6bce90a04000200bff20182a9000c080009000d000000", 0x24) 04:08:03 executing program 3: r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0x4}}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x30, r2, 0x805, 0x0, 0x0, {{0x1, 0x40030000000000}, 0xa1ffffff, 0x6, 0x0, {0x14}}}, 0x30}}, 0x0) 04:08:03 executing program 4: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000380)=ANY=[@ANYBLOB="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"], 0xa0}}, 0x0) 04:08:03 executing program 0: r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0x4}}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x30, r2, 0x805, 0x0, 0x0, {{0x1, 0x40030000000000}, 0x60000000, 0x6, 0x0, {0x14}}}, 0x30}}, 0x0) 04:08:04 executing program 5: r0 = socket$inet_sctp(0x2, 0x5, 0x84) sendmsg$inet_sctp(r0, &(0x7f0000000400)={&(0x7f0000000000)=@in={0x2, 0x0, @remote}, 0x10, &(0x7f0000000080)=[{&(0x7f0000000040)='H', 0x1}], 0x1, &(0x7f00000003c0)=[@sndinfo={0x20, 0x84, 0x2, {0x0, 0x2}}], 0x20}, 0x0) r1 = syz_open_dev$mouse(&(0x7f00000000c0)='/dev/input/mouse#\x00', 0x80000000, 0x200800) r2 = creat(&(0x7f0000000100)='./file0\x00', 0x1) io_uring_register$IORING_REGISTER_EVENTFD(r1, 0x4, &(0x7f0000000140)=r2, 0x1) 04:08:04 executing program 1: r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f0000000000)="24023f001e0025eaa87865f51ef6bce90a04000200bff20182a9000c080009000d000000", 0x24) 04:08:04 executing program 0: r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0x4}}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x30, r2, 0x805, 0x0, 0x0, {{0x1, 0x40030000000000}, 0x68000000, 0x6, 0x0, {0x14}}}, 0x30}}, 0x0) 04:08:04 executing program 3: r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0x4}}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x30, r2, 0x805, 0x0, 0x0, {{0x1, 0x40030000000000}, 0xeaffffff, 0x6, 0x0, {0x14}}}, 0x30}}, 0x0) 04:08:04 executing program 4: r0 = socket(0x42000000015, 0x805, 0x0) getsockname(r0, 0x0, &(0x7f00000000c0)) 04:08:04 executing program 2: syz_mount_image$hfs(&(0x7f00000000c0)='hfs\n', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000540)={[{@uid={'uid', 0x3d, 0xffffffffffffffff}}]}) 04:08:04 executing program 0: r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0x4}}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x30, r2, 0x805, 0x0, 0x0, {{0x1, 0x40030000000000}, 0x6c000000, 0x6, 0x0, {0x14}}}, 0x30}}, 0x0) 04:08:04 executing program 5: r0 = socket$inet_sctp(0x2, 0x5, 0x84) sendmsg$inet_sctp(r0, &(0x7f0000000400)={&(0x7f0000000000)=@in={0x2, 0x0, @remote}, 0x10, &(0x7f0000000080)=[{&(0x7f0000000040)='H', 0x1}], 0x1, &(0x7f00000000c0)=ANY=[@ANYBLOB="2000000000560000000000000000000000000267f4715cc8e112af3f4600", @ANYRES32=0x0], 0x20}, 0x0) 04:08:04 executing program 3: r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0x4}}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x30, r2, 0x805, 0x0, 0x0, {{0x1, 0x40030000000000}, 0xf0ffffff, 0x6, 0x0, {0x14}}}, 0x30}}, 0x0) 04:08:04 executing program 1: r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f0000000000)="24033f001e0025eaa87865f51ef6bce90a04000200bff20182a9000c080009000d000000", 0x24) 04:08:04 executing program 4: unshare(0x2040400) r0 = syz_open_dev$media(&(0x7f0000000080)='/dev/media#\x00', 0x0, 0x0) ioctl$SG_GET_RESERVED_SIZE(r0, 0x80047c05, 0x0) 04:08:04 executing program 5: r0 = socket$inet_sctp(0x2, 0x5, 0x84) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$TIPC_CONN_TIMEOUT(r1, 0x10f, 0x82, &(0x7f0000000100)=0x2e48, 0x4) sendmsg$inet_sctp(r0, &(0x7f0000000400)={&(0x7f0000000140)=@in6={0xa, 0x4e23, 0x8, @dev={0xfe, 0x80, [], 0x1f}, 0x11dea0000000000}, 0x1c, &(0x7f0000000080)=[{&(0x7f0000000040)='H', 0x1}], 0x1, &(0x7f00000003c0)=[@sndinfo={0x20, 0x84, 0x2, {0x0, 0x2}}], 0x20}, 0x0) 04:08:04 executing program 0: r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0x4}}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x30, r2, 0x805, 0x0, 0x0, {{0x1, 0x40030000000000}, 0x74000000, 0x6, 0x0, {0x14}}}, 0x30}}, 0x0) 04:08:04 executing program 5: r0 = socket$inet_sctp(0x2, 0x5, 0x84) sendmsg$inet_sctp(r0, &(0x7f0000000400)={&(0x7f0000000000)=@in={0x2, 0x0, @remote}, 0x10, &(0x7f0000000080)=[{&(0x7f0000000040)='H', 0x1}], 0x1, &(0x7f00000003c0)=ANY=[@ANYBLOB="20000000940a1e6e8400000002000001000002000000000000000000", @ANYRES32=0x0], 0x20}, 0x0) 04:08:04 executing program 1: r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f0000000000)="240040001e0025eaa87865f51ef6bce90a04000200bff20182a9000c080009000d000000", 0x24) 04:08:04 executing program 4: unshare(0x2040400) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc0\x00', 0x0, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r0, 0x400c6615, 0x0) 04:08:04 executing program 2: syz_mount_image$hfs(&(0x7f00000000c0)='hfs\v', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000540)={[{@uid={'uid', 0x3d, 0xffffffffffffffff}}]}) 04:08:04 executing program 3: r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0x4}}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x30, r2, 0x805, 0x0, 0x0, {{0x1, 0x40030000000000}, 0xfcffffff, 0x6, 0x0, {0x14}}}, 0x30}}, 0x0) 04:08:04 executing program 0: r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0x4}}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x30, r2, 0x805, 0x0, 0x0, {{0x1, 0x40030000000000}, 0x7a000000, 0x6, 0x0, {0x14}}}, 0x30}}, 0x0) 04:08:04 executing program 5: socket$inet_sctp(0x2, 0x5, 0x84) 04:08:04 executing program 4: unshare(0x2040400) r0 = syz_open_dev$swradio(&(0x7f0000000300)='/dev/swradio#\x00', 0x1, 0x2) bind$alg(r0, 0x0, 0x0) 04:08:04 executing program 1: r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f0000000000)="240140001e0025eaa87865f51ef6bce90a04000200bff20182a9000c080009000d000000", 0x24) 04:08:04 executing program 5: r0 = socket$inet_sctp(0x2, 0x5, 0x84) sendmsg$inet_sctp(r0, &(0x7f0000000400)={&(0x7f0000000100)=@in={0x2, 0x4e24, @multicast1}, 0x10, &(0x7f0000000080)=[{&(0x7f00000000c0)='H', 0xfffffffffffffe91}], 0x1, &(0x7f00000003c0)=[@sndinfo={0x20, 0x84, 0x2, {0x0, 0x2}}], 0xffffffffffffffe2, 0x40000}, 0x0) 04:08:04 executing program 0: r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0x4}}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x30, r2, 0x805, 0x0, 0x0, {{0x1, 0x40030000000000}, 0x87020000, 0x6, 0x0, {0x14}}}, 0x30}}, 0x0) 04:08:05 executing program 3: r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0x4}}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x30, r2, 0x805, 0x0, 0x0, {{0x1, 0x40030000000000}, 0xfffff000, 0x6, 0x0, {0x14}}}, 0x30}}, 0x0) 04:08:05 executing program 4: unshare(0x2040400) r0 = socket$alg(0x26, 0x5, 0x0) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) close(r0) syz_open_dev$video(&(0x7f0000000000)='/dev/video#\x00', 0x0, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r0, r3, &(0x7f0000000000/0x18000)=nil, 0x0, 0x356, 0x0, 0x0, 0x0) 04:08:05 executing program 1: r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f0000000000)="240240001e0025eaa87865f51ef6bce90a04000200bff20182a9000c080009000d000000", 0x24) 04:08:05 executing program 2: syz_mount_image$hfs(&(0x7f00000000c0)='hfs\x10', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000540)={[{@uid={'uid', 0x3d, 0xffffffffffffffff}}]}) 04:08:05 executing program 5: r0 = socket$inet_sctp(0x2, 0x5, 0x84) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vcs\x00', 0x400, 0x0) io_uring_enter(r1, 0x7, 0x6, 0x1, &(0x7f0000000140)={0x3}, 0xffffffffffffff4d) sendmsg$inet_sctp(r0, &(0x7f0000000400)={&(0x7f0000000000)=@in={0x2, 0x0, @remote}, 0x10, &(0x7f0000000080)=[{&(0x7f0000000040)='H', 0x1}], 0x1, &(0x7f00000003c0)=[@sndinfo={0x20, 0x84, 0x2, {0x0, 0x2}}], 0x20}, 0x0) 04:08:05 executing program 0: r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0x4}}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x30, r2, 0x805, 0x0, 0x0, {{0x1, 0x40030000000000}, 0x9effffff, 0x6, 0x0, {0x14}}}, 0x30}}, 0x0) 04:08:05 executing program 3: r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0x4}}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x30, r2, 0x805, 0x0, 0x0, {{0x1, 0x40030000000000}, 0xffffff7f, 0x6, 0x0, {0x14}}}, 0x30}}, 0x0) 04:08:05 executing program 4: unshare(0x2040400) r0 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000080)='/dev/cachefiles\x00', 0x0, 0x0) finit_module(r0, 0x0, 0x0) 04:08:05 executing program 1: r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f0000000000)="240340001e0025eaa87865f51ef6bce90a04000200bff20182a9000c080009000d000000", 0x24) 04:08:05 executing program 5: r0 = socket$inet_sctp(0x2, 0x1, 0x84) sendmsg$inet_sctp(r0, &(0x7f0000000400)={&(0x7f0000000000)=@in={0x2, 0x0, @remote}, 0x10, &(0x7f0000000080)=[{&(0x7f0000000040)='H', 0x1}], 0x1, &(0x7f00000003c0)=[@sndinfo={0x20, 0x84, 0x2, {0x0, 0x2}}], 0x20}, 0x0) 04:08:05 executing program 0: r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0x4}}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x30, r2, 0x805, 0x0, 0x0, {{0x1, 0x40030000000000}, 0xa1ffffff, 0x6, 0x0, {0x14}}}, 0x30}}, 0x0) 04:08:05 executing program 4: unshare(0x2040400) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, 0x0, 0x356, 0x0, 0x0, 0x0) 04:08:05 executing program 2: syz_mount_image$hfs(&(0x7f00000000c0)='hfsH', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000540)={[{@uid={'uid', 0x3d, 0xffffffffffffffff}}]}) 04:08:05 executing program 1: r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f0000000000)="240041001e0025eaa87865f51ef6bce90a04000200bff20182a9000c080009000d000000", 0x24) 04:08:05 executing program 5: r0 = socket$inet_sctp(0x2, 0x5, 0x84) sendmsg$inet_sctp(r0, &(0x7f0000000400)={&(0x7f0000000000)=@in={0x2, 0x0, @remote}, 0x10, &(0x7f0000000080)=[{&(0x7f0000000040)='H', 0x1}], 0x1, &(0x7f00000003c0)=[@sndinfo={0x20, 0x84, 0x2, {0x0, 0x2}}], 0x20}, 0x0) r1 = syz_open_dev$sndpcmp(&(0x7f00000000c0)='/dev/snd/pcmC#D#p\x00', 0x9, 0x80000) ioctl$VIDIOC_S_PARM(r1, 0xc0cc5616, &(0x7f0000000100)={0xf, @capture={0x1000, 0x1, {0x9, 0x4}, 0x5, 0x6}}) 04:08:05 executing program 3: r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0x4}}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x30, r2, 0x805, 0x0, 0x0, {{0x1, 0x40030000000000}, 0xffffff9e, 0x6, 0x0, {0x14}}}, 0x30}}, 0x0) 04:08:05 executing program 4: r0 = socket(0x42000000015, 0x805, 0x0) getsockopt(r0, 0x114, 0x2721, 0x0, &(0x7f0000000000)=0xf0ff7f) 04:08:05 executing program 0: r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0x4}}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x30, r2, 0x805, 0x0, 0x0, {{0x1, 0x40030000000000}, 0xeaffffff, 0x6, 0x0, {0x14}}}, 0x30}}, 0x0) 04:08:05 executing program 1: r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f0000000000)="240141001e0025eaa87865f51ef6bce90a04000200bff20182a9000c080009000d000000", 0x24) 04:08:05 executing program 5: r0 = socket$inet_sctp(0x2, 0x5, 0x84) sendmsg$inet_sctp(r0, &(0x7f0000000400)={&(0x7f0000000000)=@in={0x2, 0x0, @remote}, 0x10, &(0x7f0000000080)=[{&(0x7f0000000040)='H', 0x1}], 0x1, &(0x7f00000000c0)=ANY=[@ANYBLOB="2000000000000000487e86d03eed1884000000020000160000020000db2aebfa3942e9027d6738fa99f1e4829f93634d7ba98688bda98580bb947018b5054f2aead358011b6015a18be036f9975416ff0dada18565c7a836fdd4133b92039f0c502799d373815d8ee7202f6c0ef33928fea3d2fb2ac417ec4190a36faa7a8c1fb4b903590a0505f0948401e6d8607fc2d44d60b83210f90a0aa308eb08780c1ee5b674b3853a1c7a30f707e8a9701ab867fd22697b9b22245fb6e38b5c98af7d6b4aa37b51f03c11c1", @ANYRES32=0x0], 0xcd, 0x800}, 0x0) 04:08:05 executing program 3: r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0x4}}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x30, r2, 0x805, 0x0, 0x0, {{0x1, 0x40030000000000}, 0xffffffa1, 0x6, 0x0, {0x14}}}, 0x30}}, 0x0) 04:08:05 executing program 1: r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f0000000000)="240241001e0025eaa87865f51ef6bce90a04000200bff20182a9000c080009000d000000", 0x24) 04:08:05 executing program 4: r0 = socket$inet(0x2, 0x2, 0x0) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000480)={{{@in=@dev, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x2}}, {{@in=@broadcast, 0x0, 0x3c}, 0x0, @in=@initdev}}, 0xe8) 04:08:05 executing program 2: syz_mount_image$hfs(&(0x7f00000000c0)='hfsL', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000540)={[{@uid={'uid', 0x3d, 0xffffffffffffffff}}]}) 04:08:05 executing program 0: r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0x4}}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x30, r2, 0x805, 0x0, 0x0, {{0x1, 0x40030000000000}, 0xf0ffffff, 0x6, 0x0, {0x14}}}, 0x30}}, 0x0) 04:08:06 executing program 5: r0 = socket$inet_sctp(0x2, 0x5, 0x84) sendmsg$inet_sctp(r0, &(0x7f0000000400)={&(0x7f0000000000)=@in={0x2, 0x0, @remote}, 0x10, &(0x7f0000000080)=[{&(0x7f0000000040)='H', 0x1}], 0x1, &(0x7f00000003c0)=ANY=[@ANYBLOB="c58b21e5ee83d2eeabbe37e8b90d0000000000000084000000020000", @ANYRES32=0x0], 0x20}, 0x0) getresuid(&(0x7f0000000140)=0x0, &(0x7f0000000180), &(0x7f00000001c0)) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000200)={{{@in6=@rand_addr="4d5dcac36b897febf29d95ca53ad6d66", @in6=@initdev={0xfe, 0x88, [], 0x4, 0x0}, 0x4e24, 0x0, 0x4e22, 0x8, 0xa, 0x80, 0x80, 0x5c, 0x0, r1}, {0x10000, 0x8, 0x8, 0x5, 0x10000, 0x6, 0x3, 0x1f}, {0x8, 0x0, 0x2, 0x1f}, 0x1f, 0x6e6bbb, 0x2, 0x0, 0x3, 0x2}, {{@in6=@dev={0xfe, 0x80, [], 0x23}, 0x4d6, 0x32}, 0xa, @in6=@rand_addr="dc7c080edb06327a3275f81665ef7502", 0x0, 0x1d945a4db5f38324, 0x3, 0xfffffffffffffbff, 0x80000000, 0x5, 0x3f}}, 0xe8) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SG_SET_DEBUG(r2, 0x227e, &(0x7f0000000100)=0x1) 04:08:06 executing program 1: r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f0000000000)="240341001e0025eaa87865f51ef6bce90a04000200bff20182a9000c080009000d000000", 0x24) 04:08:06 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_SREGS(r2, 0x4138ae84, &(0x7f0000000100)={{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, 0xa0000010, 0x0, 0x0, 0x420000}) 04:08:06 executing program 3: r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0x4}}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x30, r2, 0x805, 0x0, 0x0, {{0x1, 0x40030000000000}, 0xffffffea, 0x6, 0x0, {0x14}}}, 0x30}}, 0x0) 04:08:06 executing program 0: r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0x4}}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x30, r2, 0x805, 0x0, 0x0, {{0x1, 0x40030000000000}, 0xfcffffff, 0x6, 0x0, {0x14}}}, 0x30}}, 0x0) 04:08:06 executing program 5: r0 = socket$inet_sctp(0x2, 0x5, 0x84) sendmsg$inet_sctp(r0, &(0x7f0000000400)={&(0x7f0000000000)=@in={0x2, 0x0, @remote}, 0x10, &(0x7f0000000080)=[{&(0x7f0000000040)='H', 0x1}], 0x1, &(0x7f00000003c0)=[@sndinfo={0x20, 0x84, 0x2, {0x0, 0x2}}], 0x20}, 0x0) openat$uhid(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uhid\x00', 0x802, 0x0) 04:08:06 executing program 1: r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f0000000000)="240042001e0025eaa87865f51ef6bce90a04000200bff20182a9000c080009000d000000", 0x24) 04:08:06 executing program 4: unshare(0x2040400) r0 = syz_open_dev$media(&(0x7f0000000080)='/dev/media#\x00', 0x0, 0x0) ioctl$SG_GET_RESERVED_SIZE(r0, 0x2205, 0x0) 04:08:06 executing program 2: syz_mount_image$hfs(&(0x7f00000000c0)='hfs`', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000540)={[{@uid={'uid', 0x3d, 0xffffffffffffffff}}]}) 04:08:06 executing program 3: r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0x4}}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x30, r2, 0x805, 0x0, 0x0, {{0x1, 0x40030000000000}, 0xfffffff0, 0x6, 0x0, {0x14}}}, 0x30}}, 0x0) 04:08:06 executing program 0: r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0x4}}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x30, r2, 0x805, 0x0, 0x0, {{0x1, 0x40030000000000}, 0xfffff000, 0x6, 0x0, {0x14}}}, 0x30}}, 0x0) 04:08:06 executing program 4: r0 = syz_open_dev$usb(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x1, 0x309000) getsockopt$inet_sctp_SCTP_PR_SUPPORTED(0xffffffffffffffff, 0x84, 0x71, &(0x7f0000000040)={0x0, 0x1ff}, &(0x7f0000000080)=0x8) getsockopt$inet_sctp_SCTP_MAXSEG(r0, 0x84, 0xd, &(0x7f00000000c0)=@assoc_id=r1, &(0x7f0000000100)=0x4) r3 = gettid() r4 = syz_open_procfs(r3, &(0x7f0000000140)='comm\x00') ioctl$DRM_IOCTL_GET_UNIQUE(r0, 0xc0106401, &(0x7f00000001c0)={0x2c, &(0x7f0000000180)=""/44}) futimesat(r4, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)={{0x77359400}, {0x77359400}}) socket$can_bcm(0x1d, 0x2, 0x2) ioctl$sock_bt_cmtp_CMTPCONNDEL(r0, 0x400443c9, &(0x7f0000000280)={{0x8000, 0x100000001, 0x1, 0x1, 0xffff, 0x200}}) ioctl$LOOP_CHANGE_FD(r4, 0x4c06, r4) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r4, 0x84, 0x9, &(0x7f00000002c0)={r2, @in={{0x2, 0x4e24, @dev={0xac, 0x14, 0x14, 0x24}}}, 0xe68, 0x200, 0x9f24, 0x1, 0x4}, &(0x7f0000000380)=0x98) linkat(r4, &(0x7f00000003c0)='./file0\x00', r0, &(0x7f0000000400)='./file0\x00', 0x400) ioctl$KVM_GET_MSR_INDEX_LIST(r0, 0xc004ae02, &(0x7f0000000440)={0x1, [0x0]}) r6 = syz_open_dev$sndpcmc(&(0x7f0000000480)='/dev/snd/pcmC#D#c\x00', 0x40000, 0x202000) ioctl$VIDIOC_QUERYSTD(r4, 0x8008563f, &(0x7f00000004c0)) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r6, 0x84, 0x9, &(0x7f0000000500)={r1, @in={{0x2, 0x4e20, @remote}}, 0xcb, 0xffffffff, 0x6, 0x7ff, 0x52}, 0x98) setsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r6, 0x84, 0x76, &(0x7f00000005c0)={r1, 0x2}, 0x8) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, &(0x7f0000000600)={0x7fff, 0xc9, 0x4, 0x101, 0x40000000, 0x8, 0x0, 0x0, r5}, 0x20) ioctl$UI_DEV_CREATE(r4, 0x5501) shmget(0x0, 0x2000, 0x2, &(0x7f0000ffe000/0x2000)=nil) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000000640)={{{@in6=@local, @in=@empty}}, {{@in=@multicast1}, 0x0, @in6=@loopback}}, &(0x7f0000000740)=0xe8) stat(&(0x7f0000000780)='./file0\x00', &(0x7f00000007c0)) 04:08:06 executing program 1: r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f0000000000)="240142001e0025eaa87865f51ef6bce90a04000200bff20182a9000c080009000d000000", 0x24) 04:08:06 executing program 5: r0 = syz_open_dev$media(&(0x7f00000000c0)='/dev/media#\x00', 0x100000000, 0x400000) write$FUSE_NOTIFY_STORE(r0, &(0x7f0000000100)={0x2e, 0x4, 0x0, {0x5, 0x1000, 0x6, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}}, 0x2e) r1 = socket$inet_sctp(0x2, 0x5, 0x84) sendmsg$inet_sctp(r1, &(0x7f0000000400)={&(0x7f0000000000)=@in={0x2, 0x0, @remote}, 0x10, &(0x7f0000000080)=[{&(0x7f0000000040)='H', 0x1}], 0x1, &(0x7f00000003c0)=ANY=[@ANYBLOB="2000020000000000020000f900"/28, @ANYRES32=0x0], 0x20}, 0x0) 04:08:06 executing program 4: unshare(0x2040400) r0 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000080)='/dev/cachefiles\x00', 0x220201, 0x0) fsetxattr$system_posix_acl(r0, 0x0, 0x0, 0x0, 0x0) 04:08:06 executing program 0: r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0x4}}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x30, r2, 0x805, 0x0, 0x0, {{0x1, 0x40030000000000}, 0xffffff7f, 0x6, 0x0, {0x14}}}, 0x30}}, 0x0) 04:08:06 executing program 1: r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f0000000000)="240242001e0025eaa87865f51ef6bce90a04000200bff20182a9000c080009000d000000", 0x24) 04:08:06 executing program 4: unshare(0x2040400) r0 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000080)='/dev/cachefiles\x00', 0x220201, 0x0) getsockname$packet(r0, 0x0, 0x0) 04:08:06 executing program 3: r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0x4}}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x30, r2, 0x805, 0x0, 0x0, {{0x1, 0x40030000000000}, 0xfffffffc, 0x6, 0x0, {0x14}}}, 0x30}}, 0x0) 04:08:06 executing program 5: r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000100)='/dev/audio\x00', 0x101000, 0x0) getsockopt$inet_sctp6_SCTP_MAX_BURST(r0, 0x84, 0x14, &(0x7f0000000140), &(0x7f0000000180)=0x4) r1 = socket$inet_sctp(0x2, 0x5, 0x84) sendmsg$inet_sctp(r1, &(0x7f0000000400)={&(0x7f0000000000)=@in={0x2, 0x0, @remote}, 0x10, &(0x7f0000000080)=[{&(0x7f0000000040)='H', 0x1}], 0x1, &(0x7f00000003c0)=[@sndinfo={0x20, 0x84, 0x2, {0x0, 0x2}}], 0x20}, 0x0) r2 = socket$caif_seqpacket(0x25, 0x5, 0x4) connect$caif(r2, &(0x7f00000000c0), 0x18) 04:08:06 executing program 2: syz_mount_image$hfs(&(0x7f00000000c0)='hfsh', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000540)={[{@uid={'uid', 0x3d, 0xffffffffffffffff}}]}) 04:08:06 executing program 1: r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f0000000000)="240342001e0025eaa87865f51ef6bce90a04000200bff20182a9000c080009000d000000", 0x24) 04:08:06 executing program 4: 04:08:06 executing program 0: r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0x4}}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x30, r2, 0x805, 0x0, 0x0, {{0x1, 0x40030000000000}, 0xffffff9e, 0x6, 0x0, {0x14}}}, 0x30}}, 0x0) 04:08:07 executing program 3: r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0x4}}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x30, r2, 0x805, 0x0, 0x0, {{0x1, 0x40030000000000}, 0x1000000000000, 0x6, 0x0, {0x14}}}, 0x30}}, 0x0) 04:08:07 executing program 5: syz_open_dev$sndseq(&(0x7f00000000c0)='/dev/snd/seq\x00', 0x0, 0x2e04c0) r0 = socket$inet_sctp(0x2, 0x5, 0x84) sendmsg$inet_sctp(r0, &(0x7f0000000400)={&(0x7f0000000000)=@in={0x2, 0x0, @remote}, 0x10, &(0x7f0000000080)=[{&(0x7f0000000040)='H', 0x1}], 0x1, &(0x7f00000003c0)=ANY=[@ANYBLOB='\x00'/18, @ANYRES32=0x0], 0x20}, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000580)={{{@in=@dev, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@initdev}, 0x0, @in6=@mcast1}}, &(0x7f0000000380)=0xe8) syz_mount_image$xfs(&(0x7f0000000100)='xfs\x00', &(0x7f0000000140)='./file0\x00', 0x2a, 0x4, &(0x7f0000000500)=[{&(0x7f0000000180)="612ef57a6c00b07a7fbb34999639c3b1c24e1f5e1d8613db26494bdf3b32ec99379fe2f89ec0", 0x26}, {&(0x7f00000001c0)="1a3cd9ba1907933538290f2ac50716a7cdc6504f2e30d406e39e076214dfe8957e3e57fc02b8128dcd5ced9babd1f2756d21a14fcf344b3755d8aef84e88d8340e60cc55d585c995a3d0307fe10b5b7bbb08500e0f96d9ba32b1c92fab337a3fa7a5be8af90c7d5d177c5bfc8d4eda74e098698882770af4a5199e9fb25a372be7d6464109fb2040dcc688e8988c834c259ac4265f9f3c95c6bb3203fb6cf7fb7454811a7a607dc92f1893766ae89c16425c4c0d", 0xb4, 0x80}, {&(0x7f0000000280)="520fd3164ab84848ed1b037be2aedac821231d5e697f8f87dcd28ee5bfd515f59584e790bb23e20fc36c3fd74a42faa051360f2d7bc0e5e94d34ef7c94d54d40ad932570066bb818f7fb03d3feb2acd701d800cc573340f1214ef849aa570dafe9426f5eb623d7996af7ce87fcbd6da5d0a8017484e40c85f429bd3cf617c918b4e0ce7ca09bd4c5c84ab126cada133666c325b03b93b3b99faf006aa59694c38dad5a01eaf64fff57733c43cd7b53deb69a620a5ccb55d986de132d1ee234bd9798ab6a65", 0xc5}, {&(0x7f0000000440)="9a56017b15264e000dd3b58358a9d396beaaaa118706558dd1e9281ff6bc38ab3cbc1216ed757faeb7243112e4d13343f9a1c82001d77d81f95400837361e4badc159e8c78b31e1b4e3a1e0f26bf7a8fcc0c906f9c961c64b679ac0084f977219ee8b6ec97fc0a51f244ca92d046a652020d1f4369e836510ea34d11c0dba9657193c61f5ac26fffbf8508fab15111709d0d81f171324413ed7c76894d906d168e16", 0xa2, 0xd75d}], 0x20040c2, &(0x7f0000000680)={[{@nogrpid='nogrpid'}, {@uquota='uquota'}], [{@seclabel='seclabel'}, {@uid_eq={'uid', 0x3d, r1}}, {@obj_user={'obj_user', 0x3d, '.\xd0\'+user{$+!\'nodev'}}, {@subj_user={'subj_user', 0x3d, 'ppp1selinuxkeyring\\securityselinuxcgroupeth1'}}]}) 04:08:07 executing program 4: 04:08:07 executing program 1: r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f0000000000)="240043001e0025eaa87865f51ef6bce90a04000200bff20182a9000c080009000d000000", 0x24) 04:08:07 executing program 0: r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0x4}}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x30, r2, 0x805, 0x0, 0x0, {{0x1, 0x40030000000000}, 0xffffffa1, 0x6, 0x0, {0x14}}}, 0x30}}, 0x0) 04:08:07 executing program 3: r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0x4}}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x30, r2, 0x805, 0x0, 0x0, {{0x1, 0x40030000000000}, 0x3000000000000, 0x6, 0x0, {0x14}}}, 0x30}}, 0x0) 04:08:07 executing program 4: 04:08:07 executing program 2: syz_mount_image$hfs(&(0x7f00000000c0)='hfsl', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000540)={[{@uid={'uid', 0x3d, 0xffffffffffffffff}}]}) 04:08:07 executing program 1: r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f0000000000)="240143001e0025eaa87865f51ef6bce90a04000200bff20182a9000c080009000d000000", 0x24) 04:08:07 executing program 4: [ 618.637678][T31596] XFS (loop5): unknown mount option [seclabel]. 04:08:07 executing program 0: r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0x4}}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x30, r2, 0x805, 0x0, 0x0, {{0x1, 0x40030000000000}, 0xffffffea, 0x6, 0x0, {0x14}}}, 0x30}}, 0x0) 04:08:07 executing program 1: r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f0000000000)="240243001e0025eaa87865f51ef6bce90a04000200bff20182a9000c080009000d000000", 0x24) 04:08:07 executing program 3: r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0x4}}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x30, r2, 0x805, 0x0, 0x0, {{0x1, 0x40030000000000}, 0x40030000000000, 0x6, 0x0, {0x14}}}, 0x30}}, 0x0) 04:08:07 executing program 5: r0 = socket$inet_sctp(0x2, 0x5, 0x84) sendmsg$inet_sctp(r0, &(0x7f0000000400)={&(0x7f0000000000)=@in={0x2, 0x0, @remote}, 0x10, &(0x7f0000000080)=[{&(0x7f0000000040)='H', 0x1}], 0x1, &(0x7f00000003c0)=ANY=[@ANYBLOB="200000000000000084000000020000000000025a2894966820ba9800", @ANYRES32=0x0], 0x20}, 0x0) 04:08:07 executing program 0: r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0x4}}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x30, r2, 0x805, 0x0, 0x0, {{0x1, 0x40030000000000}, 0xfffffff0, 0x6, 0x0, {0x14}}}, 0x30}}, 0x0) 04:08:07 executing program 4: 04:08:07 executing program 1: r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f0000000000)="240343001e0025eaa87865f51ef6bce90a04000200bff20182a9000c080009000d000000", 0x24) 04:08:07 executing program 3: r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0x4}}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x30, r2, 0x805, 0x0, 0x0, {{0x1, 0x40030000000000}, 0xf0ffffffffffff, 0x6, 0x0, {0x14}}}, 0x30}}, 0x0) 04:08:07 executing program 2: syz_mount_image$hfs(&(0x7f00000000c0)='hfst', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000540)={[{@uid={'uid', 0x3d, 0xffffffffffffffff}}]}) 04:08:07 executing program 5: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer\x00', 0x3, 0x0) getpeername$netrom(r0, &(0x7f0000000100)={{0x3, @null}, [@netrom, @bcast, @rose, @rose, @netrom, @remote, @netrom, @netrom]}, &(0x7f0000000180)=0x48) r1 = socket$inet_sctp(0x2, 0x0, 0x84) sendmsg$inet_sctp(r1, &(0x7f0000000400)={&(0x7f0000000000)=@in={0x2, 0x0, @remote}, 0x10, &(0x7f0000000080)=[{&(0x7f0000000040)='H', 0x1}], 0x1, &(0x7f00000003c0)=[@sndinfo={0x20, 0x84, 0x2, {0x0, 0x2}}], 0x20}, 0x0) 04:08:07 executing program 4: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x2) write$evdev(r0, &(0x7f0000057fa0)=[{}, {}], 0xfffffd24) clone(0x800081ff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$EVIOCGREP(r0, 0x80084503, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r1) sendmsg$SEG6_CMD_SET_TUNSRC(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)}, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x8031, 0xffffffffffffffff, 0x0) 04:08:08 executing program 1: r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f0000000000)="240044001e0025eaa87865f51ef6bce90a04000200bff20182a9000c080009000d000000", 0x24) 04:08:08 executing program 0: r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0x4}}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x30, r2, 0x805, 0x0, 0x0, {{0x1, 0x40030000000000}, 0xfffffffc, 0x6, 0x0, {0x14}}}, 0x30}}, 0x0) 04:08:08 executing program 3: r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0x4}}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x30, r2, 0x805, 0x0, 0x0, {{0x1, 0x40030000000000}, 0x100000000000000, 0x6, 0x0, {0x14}}}, 0x30}}, 0x0) 04:08:08 executing program 4: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r0, &(0x7f0000000040)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) write$binfmt_elf32(r0, &(0x7f00000009c0)=ANY=[@ANYBLOB="7f454c46000000000000000000000000000000000000000000000000380000000000000000000000000020000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000be8482d48c3cefb662ca406349d570285ad41d31900f82019739323d494ba4615c6dc497c739e39c00038356ee7674da68b964f425e111854c2b0bf1a00af18e705f3b1d9534408279176538f0ecbdcb43a4c8aa34155f9237d2c6450d2bab0ce132aeab5b67c3ab54503f9ff0a3371b11c1c4000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000004000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000009ef3d342ab1f4809ff362fcfcb00"/521], 0x209) sendto$inet(r0, &(0x7f00000012c0)="0c268a927f1f6588b967481241ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0x1688, 0x11, 0x0, 0x27) 04:08:08 executing program 1: r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f0000000000)="240144001e0025eaa87865f51ef6bce90a04000200bff20182a9000c080009000d000000", 0x24) 04:08:08 executing program 2: syz_mount_image$hfs(&(0x7f00000000c0)='hfsz', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000540)={[{@uid={'uid', 0x3d, 0xffffffffffffffff}}]}) 04:08:08 executing program 5: r0 = socket$inet_sctp(0x2, 0x5, 0x84) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f00000000c0)=0x0) tkill(r1, 0x15) sendmsg$inet_sctp(r0, &(0x7f0000000400)={&(0x7f0000000000)=@in={0x2, 0x0, @remote}, 0x10, &(0x7f0000000080)=[{&(0x7f0000000040)='H', 0x1}], 0x1, &(0x7f00000003c0)=ANY=[@ANYBLOB="200000000000000000000200"/28, @ANYRES32=0x0], 0x20}, 0x0) r2 = syz_open_dev$radio(&(0x7f0000000240)='/dev/radio#\x00', 0x2, 0x2) bind$rose(r2, &(0x7f0000000280)=@short={0xb, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, 0x1, @bcast}, 0x1c) timer_create(0x0, &(0x7f0000000100)={0x0, 0x26, 0x0, @tid=r1}, &(0x7f0000000140)=0x0) clock_gettime(0x0, &(0x7f0000000180)={0x0, 0x0}) ioctl$SCSI_IOCTL_DOORLOCK(r2, 0x5380) timer_settime(r3, 0x0, &(0x7f00000001c0)={{r4, r5+10000000}, {0x77359400}}, &(0x7f0000000200)) 04:08:08 executing program 0: r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0x4}}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x30, r2, 0x805, 0x0, 0x0, {{0x1, 0x40030000000000}, 0x1000000000000, 0x6, 0x0, {0x14}}}, 0x30}}, 0x0) 04:08:08 executing program 3: r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0x4}}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x30, r2, 0x805, 0x0, 0x0, {{0x1, 0x40030000000000}, 0x200000000000000, 0x6, 0x0, {0x14}}}, 0x30}}, 0x0) 04:08:08 executing program 1: r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f0000000000)="240244001e0025eaa87865f51ef6bce90a04000200bff20182a9000c080009000d000000", 0x24) 04:08:08 executing program 4: syz_open_dev$mouse(&(0x7f00000025c0)='/dev/input/mouse#\x00', 0x5, 0x20000) getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f0000002740)={0x0, 0xfff, 0x208, 0xf96c, 0x7f, 0x20, 0x2, 0xf500000000000}, &(0x7f0000002780)=0x20) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(0xffffffffffffffff, 0x0, 0x0) r0 = openat$audio(0xffffffffffffff9c, 0x0, 0x400000, 0x0) ioctl$TIOCLINUX7(r0, 0x541c, &(0x7f00000003c0)={0x7, 0xfffffffffffff7a6}) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x2) setsockopt$packet_fanout_data(r0, 0x107, 0x16, &(0x7f0000000480)={0x0, 0x0}, 0x10) r1 = syz_open_dev$loop(&(0x7f0000000140)='/dev/loop#\x00', 0x0, 0x182) r2 = memfd_create(&(0x7f0000000380)='iC;`\xb6p+\x10', 0x0) ioctl$PIO_FONTX(0xffffffffffffffff, 0x4b6c, &(0x7f0000000500)="7becd4f2547dc7c440bc50f5fbd87fcea0c8e116e082a7d08126071a2ea6e4f18a7b80e97c708032cd799960b6be8adbb131095e83b96e4e97539c80e7805172fd528faebb8bc6bf563487467d43f7c778e667967b6625339a624d99ddfca6a851a83f46bd7b049610cf4d5b26ad6ab14875e9af8e") pwritev(r2, &(0x7f0000000340)=[{&(0x7f0000000040)='\'', 0x1}], 0x1, 0x81805) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000400)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000180), 0x13f, 0x5}}, 0x20) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) syz_genetlink_get_family_id$team(&(0x7f0000000080)='team\x00') setsockopt$inet_sctp6_SCTP_SET_PEER_PRIMARY_ADDR(r0, 0x84, 0x5, &(0x7f0000000680)={0x0, @in={{0x2, 0x4e22, @rand_addr=0x8}}}, 0x84) r3 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000200)='/dev/snapshot\x00', 0x20000, 0x0) getsockopt$inet_sctp_SCTP_RESET_STREAMS(r3, 0x84, 0x77, &(0x7f0000000240)={0x0, 0x9, 0x6, [0x5, 0x10001, 0x0, 0xf9, 0x8, 0x5]}, &(0x7f00000002c0)=0x14) ioctl$VIDIOC_G_AUDOUT(0xffffffffffffffff, 0x80345631, 0x0) sendfile(r1, r1, 0x0, 0x2000005) ioctl$LOOP_CLR_FD(r1, 0x4c01) 04:08:08 executing program 3: r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0x4}}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x30, r2, 0x805, 0x0, 0x0, {{0x1, 0x40030000000000}, 0x300000000000000, 0x6, 0x0, {0x14}}}, 0x30}}, 0x0) 04:08:08 executing program 5: r0 = socket$inet_sctp(0x2, 0x5, 0x84) r1 = fcntl$dupfd(r0, 0x0, r0) setsockopt$netlink_NETLINK_TX_RING(r1, 0x10e, 0x7, &(0x7f00000000c0)={0x3, 0x7f, 0x7, 0x5}, 0x10) sendmsg$inet_sctp(r0, &(0x7f0000000400)={&(0x7f0000000000)=@in={0x2, 0x0, @remote}, 0x10, &(0x7f0000000080)=[{&(0x7f0000000040)='H', 0x1}], 0x1, &(0x7f00000003c0)=ANY=[@ANYBLOB="2026e00000000000000084001b000200000000000200000000a565f5", @ANYRES32=0x0], 0x20}, 0x0) 04:08:08 executing program 1: r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f0000000000)="240344001e0025eaa87865f51ef6bce90a04000200bff20182a9000c080009000d000000", 0x24) 04:08:08 executing program 0: r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0x4}}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x30, r2, 0x805, 0x0, 0x0, {{0x1, 0x40030000000000}, 0x3000000000000, 0x6, 0x0, {0x14}}}, 0x30}}, 0x0) 04:08:08 executing program 2: syz_mount_image$hfs(&(0x7f00000000c0)='hfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000540)={[{@uid={'uid', 0x3d, 0xffffffffffffffff}}]}) 04:08:08 executing program 5: r0 = socket$inet_sctp(0x2, 0x5, 0x84) sendmsg$inet_sctp(r0, &(0x7f0000000400)={&(0x7f0000000000)=@in={0x2, 0x0, @remote}, 0x10, &(0x7f0000000080)=[{&(0x7f0000000040)='H', 0x1}], 0x1, &(0x7f00000003c0)=[@sndinfo={0x20, 0x84, 0x2, {0x0, 0x2}}], 0x20}, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f00000000c0)=[@in={0x2, 0x4e24, @dev={0xac, 0x14, 0x14, 0x1e}}, @in6={0xa, 0x4e20, 0x8, @loopback, 0x7fff}, @in6={0xa, 0x4e22, 0x3, @rand_addr="1fd62efe2a6649c4f233807f3059a386", 0x8001}, @in={0x2, 0x4e22, @multicast2}, @in6={0xa, 0x4e21, 0x81, @empty, 0xaf8}], 0x74) [ 619.952907][T31729] hfs: invalid uid -1 04:08:08 executing program 3: r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0x4}}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x30, r2, 0x805, 0x0, 0x0, {{0x1, 0x40030000000000}, 0x400000000000000, 0x6, 0x0, {0x14}}}, 0x30}}, 0x0) 04:08:08 executing program 1: r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f0000000000)="240045001e0025eaa87865f51ef6bce90a04000200bff20182a9000c080009000d000000", 0x24) [ 619.977069][T31729] hfs: unable to parse mount options 04:08:08 executing program 0: r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0x4}}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x30, r2, 0x805, 0x0, 0x0, {{0x1, 0x40030000000000}, 0x40030000000000, 0x6, 0x0, {0x14}}}, 0x30}}, 0x0) 04:08:08 executing program 4: unshare(0x2040400) lstat(0x0, 0x0) ioctl$DRM_IOCTL_ADD_CTX(0xffffffffffffffff, 0xc0086420, 0x0) syz_mount_image$hfsplus(&(0x7f0000000000)='hfsplus\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x7, &(0x7f00000006c0)=[{&(0x7f00000000c0)="8290d9262bcafbe3282f28f37c93a69ed7e40d4f", 0x14, 0x6}, {&(0x7f0000000100)="2db9160689bbca80ea7a5a21a088c7f0c5f192000fb843db1972274d58d0c53b71b2bb03bf0b8407c1dcfdf056fdf19b183064db4420dda0939e0d3509a53608de3df980ad3d56b01d3abec911455e3e7f8f7be517a3b8a5f589ffd838ffa165a331ce05bbac3d1cbebca23d26033ac726c3a5e2fbd696d1c5b7aca88b48707f9a59b30dba483574e09d32dd8203d161be4086d8a493db4e631e06198b4cce9dd53816605ee9f7a98d10c2a4e0898a25998adfe6775377afbb78cbbc4c", 0xbd, 0x7}, {&(0x7f0000000200)="fcdd674e25cb9b140a8e7cfb7895288714e2c77794fee74667d2d884626a04d48c4a38ca15b9e6ada53271bf210d750b278bba2a21c0ec358900241cb50a72d859feba0f6e0ea9c3de4bdb42d7460c43ce8778cc7db1c192907076767da47634a6502192215cb6e541ec482eaceebfb366fa7c4e4980a65b90674d956abdd0e3a99bbc9bbf026d5f839805573aa4828a098562733adcfe1f3627bc219605d1d23b2217b6fa7d0381", 0xa8}, {0x0, 0x0, 0x1}, {0x0, 0x0, 0x3}, {&(0x7f0000000400)="55d9fdff15a6517af51d4a786172efd4", 0x10, 0x2}, {0x0}], 0x0, &(0x7f0000000880)={[{@nls={'nls', 0x3d, 'cp855'}}], [{@rootcontext={'rootcontext', 0x3d, 'system_u'}}, {@permit_directio='permit_directio'}, {@fsname={'fsname', 0x3d, '/dev/media#\x00'}}, {@defcontext={'defcontext', 0x3d, 'sysadm_u'}}, {@fsmagic={'fsmagic', 0x3d, 0x6}}]}) ioctl$SG_GET_RESERVED_SIZE(0xffffffffffffffff, 0x2205, 0x0) [ 620.065665][T31729] hfs: invalid uid -1 [ 620.097030][T31729] hfs: unable to parse mount options 04:08:08 executing program 1: r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f0000000000)="240145001e0025eaa87865f51ef6bce90a04000200bff20182a9000c080009000d000000", 0x24) 04:08:09 executing program 5: r0 = socket$inet_sctp(0x2, 0x5, 0x84) sendmsg$inet_sctp(r0, &(0x7f0000000400)={&(0x7f0000000000)=@in={0x2, 0x0, @remote}, 0x10, &(0x7f0000000080)=[{&(0x7f0000000040)='H', 0x1}], 0x1, &(0x7f00000003c0)=[@sndinfo={0x20, 0x84, 0x2, {0x0, 0x2}}], 0x20}, 0x0) r1 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/capi/capi20\x00', 0x901, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000180)=0x14) sendto$packet(r1, &(0x7f0000000100), 0x0, 0x50, &(0x7f00000001c0)={0x11, 0x1, r2, 0x1, 0x3f, 0x6, @random="27365332da71"}, 0x14) 04:08:09 executing program 2: syz_mount_image$hfs(&(0x7f00000000c0)='hfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000540)={[{@uid={'uid', 0x3d, 0xffffffffffffffff}}]}) 04:08:09 executing program 3: r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0x4}}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x30, r2, 0x805, 0x0, 0x0, {{0x1, 0x40030000000000}, 0x500000000000000, 0x6, 0x0, {0x14}}}, 0x30}}, 0x0) 04:08:09 executing program 4: pipe(&(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r3 = socket$inet_udp(0x2, 0x2, 0x0) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xffffff4b) setsockopt$inet_mreqn(r3, 0x0, 0x20, &(0x7f00000000c0)={@rand_addr, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x14) connect$inet(r3, &(0x7f0000000040)={0x2, 0x0, @multicast1}, 0x10) splice(r0, 0x0, r3, 0x0, 0x810005, 0x0) 04:08:09 executing program 0: r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0x4}}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x30, r2, 0x805, 0x0, 0x0, {{0x1, 0x40030000000000}, 0xf0ffffffffffff, 0x6, 0x0, {0x14}}}, 0x30}}, 0x0) 04:08:09 executing program 1: r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f0000000000)="240245001e0025eaa87865f51ef6bce90a04000200bff20182a9000c080009000d000000", 0x24) [ 620.400353][T31769] hfs: invalid uid -1 04:08:09 executing program 0: r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0x4}}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x30, r2, 0x805, 0x0, 0x0, {{0x1, 0x40030000000000}, 0x100000000000000, 0x6, 0x0, {0x14}}}, 0x30}}, 0x0) 04:08:09 executing program 3: r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0x4}}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x30, r2, 0x805, 0x0, 0x0, {{0x1, 0x40030000000000}, 0x600000000000000, 0x6, 0x0, {0x14}}}, 0x30}}, 0x0) 04:08:09 executing program 5: r0 = socket$inet_sctp(0x2, 0x1, 0x84) sendmsg$inet_sctp(r0, &(0x7f0000000400)={&(0x7f0000000000)=@in={0x2, 0x0, @remote}, 0x10, &(0x7f0000000080)=[{&(0x7f0000000040)='H', 0x1}], 0x1, &(0x7f00000003c0)=ANY=[@ANYBLOB="20000000000000008400ff0300000000000002000000000000130000", @ANYRES32=0x0], 0x20}, 0x0) link(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0\x00') getsockopt$inet_sctp_SCTP_EVENTS(r0, 0x84, 0xb, &(0x7f0000000140), &(0x7f0000000180)=0xb) [ 620.443303][T31769] hfs: unable to parse mount options [ 620.537166][T31769] hfs: invalid uid -1 [ 620.552917][T31769] hfs: unable to parse mount options 04:08:09 executing program 1: r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f0000000000)="240345001e0025eaa87865f51ef6bce90a04000200bff20182a9000c080009000d000000", 0x24) 04:08:09 executing program 5: r0 = socket$inet_sctp(0x2, 0x5, 0x84) sendmsg$inet_sctp(r0, &(0x7f0000000400)={&(0x7f0000000000)=@in={0x2, 0x0, @remote}, 0x10, &(0x7f0000000080)=[{&(0x7f0000000040)='H', 0x1}], 0x1, &(0x7f00000003c0)=ANY=[@ANYBLOB="200002000000b6fb124dc4a8b2099300000200"/28, @ANYRES32=0x0], 0x20}, 0x0) 04:08:09 executing program 2: syz_mount_image$hfs(&(0x7f00000000c0)='hfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000540)={[{@uid={'uid', 0x3d, 0xffffffffffffffff}}]}) 04:08:09 executing program 0: r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0x4}}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x30, r2, 0x805, 0x0, 0x0, {{0x1, 0x40030000000000}, 0x200000000000000, 0x6, 0x0, {0x14}}}, 0x30}}, 0x0) 04:08:09 executing program 3: r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0x4}}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x30, r2, 0x805, 0x0, 0x0, {{0x1, 0x40030000000000}, 0x700000000000000, 0x6, 0x0, {0x14}}}, 0x30}}, 0x0) [ 620.830634][T31801] hfs: invalid uid -1 04:08:09 executing program 5: sendmsg$inet_sctp(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000000)=@in={0x2, 0x0, @remote}, 0x10, &(0x7f0000000080)=[{&(0x7f0000000040)='H', 0x1}], 0x1, &(0x7f00000003c0)=[@sndinfo={0x20, 0x84, 0x2, {0x0, 0x2}}], 0x20}, 0x0) r0 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/capi/capi20\x00', 0x400, 0x0) setsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(r0, 0x84, 0x13, &(0x7f0000000100)=0x909, 0x4) [ 620.859176][T31801] hfs: unable to parse mount options [ 620.938505][T31801] hfs: invalid uid -1 [ 620.952609][T31801] hfs: unable to parse mount options 04:08:09 executing program 4: r0 = open(&(0x7f0000000140)='./bus\x00', 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) getpid() r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) fadvise64(r0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000340)='./file0\x00', 0x0) openat$fuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) 04:08:09 executing program 1: r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f0000000000)="240046001e0025eaa87865f51ef6bce90a04000200bff20182a9000c080009000d000000", 0x24) 04:08:09 executing program 3: r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0x4}}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x30, r2, 0x805, 0x0, 0x0, {{0x1, 0x40030000000000}, 0xa00000000000000, 0x6, 0x0, {0x14}}}, 0x30}}, 0x0) 04:08:09 executing program 0: r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0x4}}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x30, r2, 0x805, 0x0, 0x0, {{0x1, 0x40030000000000}, 0x300000000000000, 0x6, 0x0, {0x14}}}, 0x30}}, 0x0) 04:08:09 executing program 5: r0 = openat$dsp(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/dsp\x00', 0x240840, 0x0) ioctl$SIOCGETNODEID(r0, 0x89e1, &(0x7f0000000200)={0x1}) ioctl$PIO_FONTX(r0, 0x4b6c, &(0x7f0000000140)="51efcf7994efaebcd512501afe8c5c9498e8723bec7d796a3179a35d8d01e089c59cdc6edcc09b4f29ff49") r1 = socket$inet_sctp(0x2, 0x5, 0x84) sendmsg$inet_sctp(r1, &(0x7f0000000400)={&(0x7f0000000000)=@in={0x2, 0x0, @remote}, 0x10, &(0x7f0000000080)=[{&(0x7f0000000040)='H', 0x1}], 0x1, &(0x7f00000003c0)=ANY=[@ANYBLOB="200000000800ca9600e4cf719ca248d947e9116400800000", @ANYRES32=0x0], 0x20}, 0x0) 04:08:09 executing program 2: syz_mount_image$hfs(&(0x7f00000000c0)='hfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000540)={[{@uid={'uid', 0x3d, 0xffffffffffffffff}}]}) 04:08:10 executing program 1: r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f0000000000)="240146001e0025eaa87865f51ef6bce90a04000200bff20182a9000c080009000d000000", 0x24) [ 621.237538][T31830] hfs: invalid uid -1 04:08:10 executing program 3: r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0x4}}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x30, r2, 0x805, 0x0, 0x0, {{0x1, 0x40030000000000}, 0xe00000000000000, 0x6, 0x0, {0x14}}}, 0x30}}, 0x0) 04:08:10 executing program 5: r0 = socket$inet_sctp(0x2, 0x5, 0x84) sendmsg$inet_sctp(r0, &(0x7f0000000400)={&(0x7f0000000000)=@in={0x2, 0x0, @remote}, 0x10, &(0x7f0000000080)=[{&(0x7f0000000040)='H', 0x1}], 0x1, &(0x7f0000000100)=ANY=[@ANYBLOB="200000000000000084000000020000000000020400000000000000003516b6e2f68c0600ff6637b5a697e6f23f", @ANYRES32=0x0], 0x20}, 0x0) [ 621.298967][T31830] hfs: unable to parse mount options 04:08:10 executing program 0: r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0x4}}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x30, r2, 0x805, 0x0, 0x0, {{0x1, 0x40030000000000}, 0x400000000000000, 0x6, 0x0, {0x14}}}, 0x30}}, 0x0) [ 621.387604][T31830] hfs: invalid uid -1 [ 621.392106][T31830] hfs: unable to parse mount options 04:08:10 executing program 1: r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f0000000000)="240246001e0025eaa87865f51ef6bce90a04000200bff20182a9000c080009000d000000", 0x24) 04:08:10 executing program 5: r0 = socket$inet_sctp(0x2, 0x5, 0x84) sendmsg$inet_sctp(r0, &(0x7f0000000400)={&(0x7f00000000c0)=@in6={0xa, 0x4e23, 0x57cf94e3, @local, 0x3}, 0x1c, &(0x7f0000000080)=[{&(0x7f0000000040)='H', 0xfffffd52}], 0x1, &(0x7f0000000100)=ANY=[@ANYRESDEC=r0, @ANYRES32=0x0], 0x18}, 0x10000) r1 = syz_open_dev$audion(&(0x7f0000000000)='/dev/audio#\x00', 0x9, 0x1) io_uring_register$IORING_UNREGISTER_FILES(r1, 0x3, 0x0, 0x0) 04:08:10 executing program 4: r0 = socket$inet6(0xa, 0x802, 0x88) sendto$inet6(r0, 0x0, 0x0, 0x8800, &(0x7f0000000000)={0xa, 0x4e23, 0x0, @ipv4}, 0x1c) sendto$inet6(r0, &(0x7f00000000c0)="dd", 0x1, 0x0, 0x0, 0x0) 04:08:10 executing program 2: syz_mount_image$hfs(&(0x7f00000000c0)='hfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000540)={[{@uid={'uid', 0x3d, 0xffffffffffffffff}}]}) 04:08:10 executing program 3: r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0x4}}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x30, r2, 0x805, 0x0, 0x0, {{0x1, 0x40030000000000}, 0xf00000000000000, 0x6, 0x0, {0x14}}}, 0x30}}, 0x0) 04:08:10 executing program 0: r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0x4}}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x30, r2, 0x805, 0x0, 0x0, {{0x1, 0x40030000000000}, 0x500000000000000, 0x6, 0x0, {0x14}}}, 0x30}}, 0x0) 04:08:10 executing program 1: r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f0000000000)="240346001e0025eaa87865f51ef6bce90a04000200bff20182a9000c080009000d000000", 0x24) 04:08:10 executing program 5: socket$bt_hidp(0x1f, 0x3, 0x6) r0 = socket$inet_sctp(0x2, 0x5, 0x84) sendmsg$inet_sctp(r0, &(0x7f0000000400)={&(0x7f0000000000)=@in={0x2, 0x0, @remote}, 0x10, &(0x7f0000000080)=[{&(0x7f0000000040)='H', 0x1}], 0x1, &(0x7f00000003c0)=[@sndinfo={0x20, 0x84, 0x2, {0x0, 0x2}}], 0x20}, 0x0) 04:08:11 executing program 1: r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f0000000000)="240047001e0025eaa87865f51ef6bce90a04000200bff20182a9000c080009000d000000", 0x24) [ 622.308093][T31896] hfs: invalid uid -1 [ 622.323278][T31896] hfs: unable to parse mount options 04:08:11 executing program 5: r0 = socket$inet_sctp(0x2, 0x5, 0x84) sendmsg$inet_sctp(r0, &(0x7f0000000400)={&(0x7f0000000000)=@in={0x2, 0x0, @remote}, 0x10, &(0x7f0000000080)=[{&(0x7f0000000040)='H', 0x1}], 0x1, &(0x7f00000003c0)=[@sndinfo={0x20, 0x84, 0x2, {0x0, 0x2}}], 0x20}, 0x0) arch_prctl$ARCH_GET_GS(0x1004, &(0x7f00000000c0)) 04:08:11 executing program 0: r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0x4}}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x30, r2, 0x805, 0x0, 0x0, {{0x1, 0x40030000000000}, 0x600000000000000, 0x6, 0x0, {0x14}}}, 0x30}}, 0x0) 04:08:11 executing program 3: r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0x4}}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x30, r2, 0x805, 0x0, 0x0, {{0x1, 0x40030000000000}, 0x2f02000000000000, 0x6, 0x0, {0x14}}}, 0x30}}, 0x0) 04:08:11 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") msgrcv(0x0, 0x0, 0x0, 0x0, 0x0) msgctl$IPC_SET(0x0, 0x1, &(0x7f0000000300)) [ 622.388901][T31896] hfs: invalid uid -1 [ 622.392912][T31896] hfs: unable to parse mount options 04:08:11 executing program 2: syz_mount_image$hfs(&(0x7f00000000c0)='hfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000540)={[{@uid={'uid', 0x3d, 0xffffffffffffffff}}]}) 04:08:11 executing program 3: r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0x4}}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x30, r2, 0x805, 0x0, 0x0, {{0x1, 0x40030000000000}, 0x3f00000000000000, 0x6, 0x0, {0x14}}}, 0x30}}, 0x0) 04:08:11 executing program 4: r0 = msgget$private(0x0, 0x0) msgrcv(r0, 0x0, 0x0, 0x2, 0x0) msgsnd(r0, &(0x7f0000000040)={0x1}, 0x8, 0x0) 04:08:11 executing program 5: r0 = socket$inet_sctp(0x2, 0x5, 0x84) msync(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0xb3bd1fb4798bb1b4) sendmsg$inet_sctp(r0, &(0x7f0000000400)={&(0x7f0000000000)=@in={0x2, 0x0, @remote}, 0x10, &(0x7f0000000080)=[{&(0x7f0000000040)='H', 0x1}], 0x1, &(0x7f00000003c0)=[@sndinfo={0x20, 0x84, 0x2, {0x0, 0x2}}], 0x20}, 0x0) 04:08:11 executing program 1: r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f0000000000)="240147001e0025eaa87865f51ef6bce90a04000200bff20182a9000c080009000d000000", 0x24) 04:08:11 executing program 0: r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0x4}}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x30, r2, 0x805, 0x0, 0x0, {{0x1, 0x40030000000000}, 0x700000000000000, 0x6, 0x0, {0x14}}}, 0x30}}, 0x0) [ 622.686325][T31923] hfs: invalid uid -1 [ 622.690337][T31923] hfs: unable to parse mount options [ 622.785095][T31923] hfs: invalid uid -1 04:08:11 executing program 3: r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0x4}}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x30, r2, 0x805, 0x0, 0x0, {{0x1, 0x40030000000000}, 0x4000000000000000, 0x6, 0x0, {0x14}}}, 0x30}}, 0x0) [ 622.806052][T31923] hfs: unable to parse mount options 04:08:11 executing program 5: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x1, 0x101040) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(0xffffffffffffffff, 0x84, 0x7c, &(0x7f0000000100)={0x0, 0x5, 0xffff}, &(0x7f0000000140)=0x8) setsockopt$inet_sctp_SCTP_AUTH_DEACTIVATE_KEY(r0, 0x84, 0x23, &(0x7f0000000180)={r1, 0x81}, 0x8) r2 = socket$inet_sctp(0x2, 0x5, 0x84) ioctl$TIOCGPTPEER(r0, 0x5441, 0xffffffffffffff01) sendmsg$inet_sctp(r2, &(0x7f0000000400)={&(0x7f0000000000)=@in={0x2, 0x0, @remote}, 0x10, &(0x7f0000000080)=[{&(0x7f0000000040)='H', 0x1}], 0x1, &(0x7f00000003c0)=ANY=[@ANYBLOB="2079852f4dc862fde07dbf2a72cbcf00000000000000840000000200", @ANYRES32=0x0], 0x20}, 0x0) 04:08:11 executing program 2: syz_mount_image$hfs(&(0x7f00000000c0)='hfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000540)={[{@uid={'uid', 0x3d, 0xffffffffffffffff}}]}) 04:08:11 executing program 1: r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f0000000000)="240247001e0025eaa87865f51ef6bce90a04000200bff20182a9000c080009000d000000", 0x24) 04:08:11 executing program 0: r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0x4}}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x30, r2, 0x805, 0x0, 0x0, {{0x1, 0x40030000000000}, 0xa00000000000000, 0x6, 0x0, {0x14}}}, 0x30}}, 0x0) [ 623.012776][T31956] hfs: invalid uid -1 04:08:11 executing program 3: r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0x4}}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x30, r2, 0x805, 0x0, 0x0, {{0x1, 0x40030000000000}, 0x4800000000000000, 0x6, 0x0, {0x14}}}, 0x30}}, 0x0) 04:08:11 executing program 5: r0 = socket$inet_sctp(0x2, 0x1, 0x84) r1 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000100)='/dev/dsp\x00', 0x100, 0x0) ioctl$VIDIOC_S_JPEGCOMP(r1, 0x408c563e, &(0x7f0000000140)={0x800, 0x9, 0x24, "06af11076608e3f8e4167e0c0feb35662253820be68b513353ad088d49cae9fb6877bdaaa9a5a2435b587f1a8efb2b911d053c397c1da95985de8708", 0x27, "2d65d12044a670bac5c1dcacfdb8fc441be2ef9e3dc32f61e6d5569e8e91fa6bea2d2cf7a91b73ea84d4503481c54fba447f95d0f75d7a7e5bc0b826", 0x48}) ioctl$UI_SET_RELBIT(r1, 0x40045566, 0x6) ioctl$DRM_IOCTL_AGP_ACQUIRE(r1, 0x6430) sendmsg$inet_sctp(r0, &(0x7f0000000400)={&(0x7f0000000000)=@in={0x2, 0x0, @remote}, 0x10, &(0x7f0000000080)=[{&(0x7f0000000040)='H', 0x1}], 0x1, &(0x7f00000000c0)=[@sndinfo={0x20, 0x84, 0x2, {0x0, 0x2}}], 0x1d}, 0x0) getsockopt$TIPC_DEST_DROPPABLE(r1, 0x10f, 0x81, &(0x7f0000000200), &(0x7f0000000240)=0x4) [ 623.033785][T31956] hfs: unable to parse mount options 04:08:11 executing program 1: r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f0000000000)="240347001e0025eaa87865f51ef6bce90a04000200bff20182a9000c080009000d000000", 0x24) [ 623.125270][T31956] hfs: invalid uid -1 [ 623.129380][T31956] hfs: unable to parse mount options 04:08:12 executing program 4: r0 = socket(0x42000000015, 0x805, 0x0) getsockopt(r0, 0x114, 0x2715, 0x0, &(0x7f0000000000)) 04:08:12 executing program 0: r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0x4}}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x30, r2, 0x805, 0x0, 0x0, {{0x1, 0x40030000000000}, 0xe00000000000000, 0x6, 0x0, {0x14}}}, 0x30}}, 0x0) 04:08:12 executing program 3: r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0x4}}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x30, r2, 0x805, 0x0, 0x0, {{0x1, 0x40030000000000}, 0x4c00000000000000, 0x6, 0x0, {0x14}}}, 0x30}}, 0x0) 04:08:12 executing program 2: syz_mount_image$hfs(&(0x7f00000000c0)='hfs ', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000540)={[{@uid={'uid', 0x3d, 0xffffffffffffffff}}]}) 04:08:12 executing program 5: r0 = socket$inet_sctp(0x2, 0x5, 0x84) sendmsg$inet_sctp(r0, &(0x7f0000000400)={&(0x7f0000000000)=@in={0x2, 0x0, @remote}, 0x10, &(0x7f0000000080)=[{&(0x7f0000000040)='H', 0x1}], 0x1, &(0x7f00000003c0)=[@sndinfo={0x20, 0x84, 0x2, {0x0, 0x2}}], 0x20}, 0x0) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/autofs\x00', 0x1, 0x0) ioctl$SG_SET_FORCE_PACK_ID(r1, 0x227b, &(0x7f0000000100)) 04:08:12 executing program 1: r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f0000000000)="240048001e0025eaa87865f51ef6bce90a04000200bff20182a9000c080009000d000000", 0x24) 04:08:12 executing program 1: r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f0000000000)="240148001e0025eaa87865f51ef6bce90a04000200bff20182a9000c080009000d000000", 0x24) 04:08:12 executing program 5: r0 = socket$inet_sctp(0x2, 0x5, 0x84) sendmsg$inet_sctp(r0, &(0x7f0000000400)={&(0x7f0000000000)=@in={0x2, 0x0, @remote}, 0x10, &(0x7f0000000080)=[{&(0x7f0000000040)='H', 0x1}], 0x1, &(0x7f00000003c0)=[@sndinfo={0x20, 0x84, 0x2, {0x0, 0x2}}], 0x20}, 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='loginuid\x00') ioctl$SG_SET_DEBUG(r1, 0x227e, &(0x7f0000000100)) 04:08:12 executing program 4: r0 = syz_open_dev$sndtimer(&(0x7f0000000000)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_PVERSION(r0, 0x80045400, &(0x7f00000002c0)) 04:08:12 executing program 3: r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0x4}}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x30, r2, 0x805, 0x0, 0x0, {{0x1, 0x40030000000000}, 0x6000000000000000, 0x6, 0x0, {0x14}}}, 0x30}}, 0x0) 04:08:12 executing program 0: r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0x4}}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x30, r2, 0x805, 0x0, 0x0, {{0x1, 0x40030000000000}, 0xf00000000000000, 0x6, 0x0, {0x14}}}, 0x30}}, 0x0) 04:08:12 executing program 2: syz_mount_image$hfs(&(0x7f00000000c0)='hfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000540)={[{@uid={'uid', 0x3d, 0xffffffffffffffff}}]}) 04:08:12 executing program 1: r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f0000000000)="240248001e0025eaa87865f51ef6bce90a04000200bff20182a9000c080009000d000000", 0x24) 04:08:12 executing program 0: r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0x4}}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x30, r2, 0x805, 0x0, 0x0, {{0x1, 0x40030000000000}, 0x3f00000000000000, 0x6, 0x0, {0x14}}}, 0x30}}, 0x0) 04:08:12 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = syz_open_dev$swradio(&(0x7f0000000000)='/dev/swradio#\x00', 0x1, 0x2) ppoll(&(0x7f00000000c0)=[{r1, 0x1}], 0x1, &(0x7f0000000180), 0x0, 0x0) [ 623.966691][T32028] hfs: invalid uid -1 04:08:12 executing program 5: r0 = socket$inet_sctp(0x2, 0x5, 0x84) sendmsg$inet_sctp(r0, &(0x7f0000000400)={&(0x7f0000000000)=@in={0x2, 0x0, @remote}, 0x10, &(0x7f0000000080)=[{&(0x7f0000000040)='H', 0x1}], 0x1, &(0x7f00000003c0)=[@sndinfo={0x20, 0x84, 0x2, {0x0, 0x2}}], 0x20}, 0x0) getsockopt$inet_sctp_SCTP_RTOINFO(r0, 0x84, 0x0, &(0x7f00000000c0)={0x0, 0x7, 0x48280000000, 0xe0}, &(0x7f0000000100)=0x10) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(r0, 0x84, 0x7b, &(0x7f0000000140)={r1, 0x1}, &(0x7f0000000180)=0x8) 04:08:12 executing program 3: r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0x4}}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x30, r2, 0x805, 0x0, 0x0, {{0x1, 0x40030000000000}, 0x6800000000000000, 0x6, 0x0, {0x14}}}, 0x30}}, 0x0) [ 623.999622][T32028] hfs: unable to parse mount options 04:08:12 executing program 1: r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f0000000000)="240348001e0025eaa87865f51ef6bce90a04000200bff20182a9000c080009000d000000", 0x24) [ 624.102087][T32028] hfs: invalid uid -1 [ 624.118044][T32028] hfs: unable to parse mount options 04:08:12 executing program 0: r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0x4}}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x30, r2, 0x805, 0x0, 0x0, {{0x1, 0x40030000000000}, 0x4000000000000000, 0x6, 0x0, {0x14}}}, 0x30}}, 0x0) 04:08:12 executing program 4: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x2001002, 0x0) mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x44000, 0x0) 04:08:12 executing program 3: r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0x4}}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x30, r2, 0x805, 0x0, 0x0, {{0x1, 0x40030000000000}, 0x6c00000000000000, 0x6, 0x0, {0x14}}}, 0x30}}, 0x0) 04:08:13 executing program 2: syz_mount_image$hfs(&(0x7f00000000c0)='hfs\x10', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000540)={[{@uid={'uid', 0x3d, 0xffffffffffffffff}}]}) 04:08:13 executing program 5: r0 = socket$inet_sctp(0x2, 0x5, 0x84) r1 = gettid() ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f00000000c0)=0x0) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) kcmp$KCMP_EPOLL_TFD(r1, r2, 0x7, r0, &(0x7f0000000140)={r3, r0, 0x8}) sendmsg$inet_sctp(r0, &(0x7f0000000400)={&(0x7f0000000000)=@in={0x2, 0x0, @remote}, 0x10, &(0x7f0000000080)=[{&(0x7f0000000040)='H', 0x1}], 0x1, &(0x7f00000003c0)=[@sndinfo={0x20, 0x84, 0x2, {0x0, 0x2}}], 0x20}, 0x0) 04:08:13 executing program 4: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x2001002, 0x0) mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x44000, 0x0) 04:08:13 executing program 0: r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0x4}}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x30, r2, 0x805, 0x0, 0x0, {{0x1, 0x40030000000000}, 0x4800000000000000, 0x6, 0x0, {0x14}}}, 0x30}}, 0x0) 04:08:13 executing program 3: r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0x4}}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x30, r2, 0x805, 0x0, 0x0, {{0x1, 0x40030000000000}, 0x7400000000000000, 0x6, 0x0, {0x14}}}, 0x30}}, 0x0) 04:08:13 executing program 1: r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f0000000000)="240049001e0025eaa87865f51ef6bce90a04000200bff20182a9000c080009000d000000", 0x24) 04:08:13 executing program 5: r0 = socket$inet_sctp(0x2, 0x5, 0x84) sendmsg$inet_sctp(r0, &(0x7f0000000100)={&(0x7f0000000140)=@in6={0xa, 0x4e20, 0x4, @local, 0x4e98025c}, 0x1c, &(0x7f0000000080)=[{&(0x7f0000000040)='H', 0x1}], 0x1, &(0x7f00000000c0)=[@sndinfo={0x20, 0x84, 0x2, {0x0, 0x2}}], 0x20}, 0x0) 04:08:13 executing program 3: r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0x4}}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x30, r2, 0x805, 0x0, 0x0, {{0x1, 0x40030000000000}, 0x7a00000000000000, 0x6, 0x0, {0x14}}}, 0x30}}, 0x0) 04:08:13 executing program 2: syz_mount_image$hfs(&(0x7f00000000c0)='hfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000540)={[{@uid={'uid', 0x3d, 0xffffffffffffffff}}]}) 04:08:13 executing program 4: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x2001002, 0x0) mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x44000, 0x0) 04:08:13 executing program 0: r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0x4}}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x30, r2, 0x805, 0x0, 0x0, {{0x1, 0x40030000000000}, 0x4c00000000000000, 0x6, 0x0, {0x14}}}, 0x30}}, 0x0) 04:08:13 executing program 1: r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f0000000000)="240149001e0025eaa87865f51ef6bce90a04000200bff20182a9000c080009000d000000", 0x24) 04:08:13 executing program 5: r0 = socket$inet_sctp(0x2, 0x5, 0x84) prctl$PR_GET_TSC(0x19, &(0x7f0000000000)) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(0xffffffffffffffff, 0x84, 0x7c, &(0x7f0000000040)={0x0, 0x3, 0x1}, &(0x7f0000000140)=0x8) setsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x76, &(0x7f00000001c0)={r1, 0x3}, 0x8) sendmsg$inet_sctp(r0, &(0x7f0000000400)={&(0x7f0000000180)=@in6={0xa, 0x4e21, 0x8, @dev={0xfe, 0x80, [], 0x27}, 0x21b900f8}, 0x1c, &(0x7f0000000080)=[{&(0x7f0000000100)='H', 0x82}], 0x1000000000000062, &(0x7f00000003c0)=[@sndinfo={0x20, 0x84, 0x2, {0x0, 0x2}}], 0x20}, 0x4000000) pipe2$9p(&(0x7f00000000c0), 0x4000) 04:08:13 executing program 3: r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0x4}}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x30, r2, 0x805, 0x0, 0x0, {{0x1, 0x40030000000000}, 0x9effffff00000000, 0x6, 0x0, {0x14}}}, 0x30}}, 0x0) [ 624.860761][T32101] hfs: invalid uid -1 [ 624.888965][T32101] hfs: unable to parse mount options 04:08:13 executing program 1: r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f0000000000)="240249001e0025eaa87865f51ef6bce90a04000200bff20182a9000c080009000d000000", 0x24) 04:08:13 executing program 4: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x2001002, 0x0) mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x44000, 0x0) 04:08:13 executing program 0: r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0x4}}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x30, r2, 0x805, 0x0, 0x0, {{0x1, 0x40030000000000}, 0x6000000000000000, 0x6, 0x0, {0x14}}}, 0x30}}, 0x0) 04:08:13 executing program 5: r0 = socket$inet_sctp(0x2, 0x5, 0x84) r1 = openat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x1, 0x20) getsockopt$bt_l2cap_L2CAP_LM(r1, 0x6, 0x3, &(0x7f0000000100), &(0x7f0000000140)=0x4) sendmsg$inet_sctp(r0, &(0x7f0000000400)={&(0x7f0000000000)=@in={0x2, 0x0, @remote}, 0x10, &(0x7f0000000080)=[{&(0x7f0000000040)='H', 0x1}], 0x1, &(0x7f00000003c0)=[@sndinfo={0x20, 0x84, 0x2, {0x0, 0x2}}], 0x20}, 0x0) [ 624.972910][T32101] hfs: invalid uid -1 [ 624.991848][T32101] hfs: unable to parse mount options 04:08:13 executing program 3: r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0x4}}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x30, r2, 0x805, 0x0, 0x0, {{0x1, 0x40030000000000}, 0xa1ffffff00000000, 0x6, 0x0, {0x14}}}, 0x30}}, 0x0) 04:08:13 executing program 2: syz_mount_image$hfs(&(0x7f00000000c0)='hfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000540)={[{@uid={'uid', 0x3d, 0xffffffffffffffff}}]}) 04:08:13 executing program 1: r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f0000000000)="240349001e0025eaa87865f51ef6bce90a04000200bff20182a9000c080009000d000000", 0x24) 04:08:14 executing program 5: sendmsg$inet_sctp(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000000)=@in={0x2, 0x0, @remote}, 0x10, &(0x7f0000000080)=[{&(0x7f0000000040)='H', 0x1}], 0x1, &(0x7f0000000100)=ANY=[@ANYBLOB="20000000000000008400000002003cb0d69994c86297000000000000aa332150c756660e0d8007a5d2fe99d60939675e31a77ccaa3ceca69c908c5fd9ad81aebc93c13af04f88bb3da4ed0cc31a4955653abed693d0558d4512efa2e63c53818271dc6e2d7d91dd714ad0a2a7d3115071b98", @ANYRES32=0x0], 0x20}, 0x0) ioctl$int_out(0xffffffffffffffff, 0x5460, &(0x7f00000000c0)) 04:08:14 executing program 0: r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0x4}}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x30, r2, 0x805, 0x0, 0x0, {{0x1, 0x40030000000000}, 0x6800000000000000, 0x6, 0x0, {0x14}}}, 0x30}}, 0x0) 04:08:14 executing program 4: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x44000, 0x0) 04:08:14 executing program 3: r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0x4}}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x30, r2, 0x805, 0x0, 0x0, {{0x1, 0x40030000000000}, 0xeaffffff00000000, 0x6, 0x0, {0x14}}}, 0x30}}, 0x0) [ 625.324417][T32143] hfs: invalid uid -1 [ 625.343350][T32143] hfs: unable to parse mount options [ 625.407235][T32143] hfs: invalid uid -1 04:08:14 executing program 1: r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f0000000000)="24004a001e0025eaa87865f51ef6bce90a04000200bff20182a9000c080009000d000000", 0x24) [ 625.435272][T32143] hfs: unable to parse mount options 04:08:14 executing program 5: r0 = socket$inet_sctp(0x2, 0x5, 0x84) sendmsg$inet_sctp(r0, &(0x7f0000000400)={&(0x7f0000000000)=@in={0x2, 0x0, @remote}, 0x10, &(0x7f0000000080)=[{&(0x7f0000000040)='H', 0x1}], 0x1, &(0x7f00000003c0)=[@sndinfo={0x20, 0x84, 0x2, {0x0, 0x2}}], 0x20}, 0x0) io_setup(0x8000, &(0x7f00000000c0)=0x0) r2 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000140)='/dev/hwrng\x00', 0x40080, 0x0) io_cancel(r1, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x2, 0x100, r0, &(0x7f0000000100)="461c5c6f83b6bfb57b66a4ba7b3f4c0798dd775c4a8ef686b9ac13892cf6f243da231681538aeaf96dcedb34a1d4158c6933b379563542463d884422d7ab77f9", 0x40, 0x5, 0x0, 0x3, r2}, &(0x7f00000001c0)) 04:08:14 executing program 4: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x44000, 0x0) 04:08:14 executing program 3: r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0x4}}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x30, r2, 0x805, 0x0, 0x0, {{0x1, 0x40030000000000}, 0xf0ffffff00000000, 0x6, 0x0, {0x14}}}, 0x30}}, 0x0) 04:08:14 executing program 0: r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0x4}}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x30, r2, 0x805, 0x0, 0x0, {{0x1, 0x40030000000000}, 0x6c00000000000000, 0x6, 0x0, {0x14}}}, 0x30}}, 0x0) 04:08:14 executing program 2: syz_mount_image$hfs(&(0x7f00000000c0)='hfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000540)={[{@uid={'uid', 0x3d, 0xffffffffffffffff}}]}) 04:08:14 executing program 1: r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f0000000000)="24014a001e0025eaa87865f51ef6bce90a04000200bff20182a9000c080009000d000000", 0x24) 04:08:14 executing program 4: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x44000, 0x0) [ 625.685777][T32169] hfs: invalid uid -1 04:08:14 executing program 5: r0 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(r0, 0x84, 0x13, &(0x7f00000000c0)={0x0, 0x3}, &(0x7f0000000100)=0x8) setsockopt$inet_sctp_SCTP_MAXSEG(r0, 0x84, 0xd, &(0x7f0000000140)=@assoc_id=r1, 0x4) getsockopt$inet_sctp_SCTP_DELAYED_SACK(r0, 0x84, 0x10, &(0x7f0000000740)=@assoc_value={r1, 0x9}, &(0x7f0000000780)=0x8) r2 = syz_open_dev$adsp(&(0x7f0000000040)='/dev/adsp#\x00', 0x668, 0x1) io_uring_register$IORING_REGISTER_BUFFERS(r2, 0x0, &(0x7f00000006c0)=[{&(0x7f00000002c0)=""/224, 0xe0}, {&(0x7f0000000440)=""/171, 0xab}, {&(0x7f0000000500)=""/186, 0xba}, {&(0x7f00000005c0)=""/46, 0x2e}, {&(0x7f0000000600)=""/25, 0x19}, {&(0x7f0000000640)=""/123, 0x7b}], 0x6) sendmsg$inet_sctp(r0, &(0x7f0000000400)={&(0x7f0000000000)=@in={0x2, 0x0, @remote}, 0x10, &(0x7f0000000080)=[{&(0x7f0000000280)='H', 0x1}], 0x1, &(0x7f00000003c0)=ANY=[@ANYBLOB="2000002008000000840000000200000000001e000000000000000000", @ANYRES32=0x0], 0x20}, 0x0) getsockopt$inet_sctp_SCTP_STATUS(r0, 0x84, 0xe, &(0x7f0000000180)={r1, 0x6, 0x100, 0xbd1d, 0x9, 0x6, 0x2, 0xf4, {r1, @in={{0x2, 0x4e21, @broadcast}}, 0x6, 0x3f, 0x3, 0xfffffffffffffffd, 0x7}}, &(0x7f0000000240)=0xb0) [ 625.730139][T32169] hfs: unable to parse mount options 04:08:14 executing program 0: r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0x4}}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x30, r2, 0x805, 0x0, 0x0, {{0x1, 0x40030000000000}, 0x7400000000000000, 0x6, 0x0, {0x14}}}, 0x30}}, 0x0) 04:08:14 executing program 3: r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0x4}}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x30, r2, 0x805, 0x0, 0x0, {{0x1, 0x40030000000000}, 0xfcffffff00000000, 0x6, 0x0, {0x14}}}, 0x30}}, 0x0) 04:08:14 executing program 1: r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f0000000000)="24024a001e0025eaa87865f51ef6bce90a04000200bff20182a9000c080009000d000000", 0x24) [ 625.843552][T32169] hfs: invalid uid -1 [ 625.853668][T32169] hfs: unable to parse mount options 04:08:14 executing program 4: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x2001002, 0x0) mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x44000, 0x0) 04:08:14 executing program 2: syz_mount_image$hfs(&(0x7f00000000c0)='hfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000540)={[{@uid={'uid', 0x3d, 0xffffffffffffffff}}]}) [ 625.993774][T32193] sctp: [Deprecated]: syz-executor.5 (pid 32193) Use of int in maxseg socket option. [ 625.993774][T32193] Use struct sctp_assoc_value instead 04:08:14 executing program 0: r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0x4}}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x30, r2, 0x805, 0x0, 0x0, {{0x1, 0x40030000000000}, 0x7a00000000000000, 0x6, 0x0, {0x14}}}, 0x30}}, 0x0) 04:08:14 executing program 1: r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f0000000000)="24034a001e0025eaa87865f51ef6bce90a04000200bff20182a9000c080009000d000000", 0x24) [ 626.089475][T32202] sctp: [Deprecated]: syz-executor.5 (pid 32202) Use of struct sctp_assoc_value in delayed_ack socket option. [ 626.089475][T32202] Use struct sctp_sack_info instead 04:08:14 executing program 4: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x2001002, 0x0) mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x44000, 0x0) 04:08:14 executing program 3: r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0x4}}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x30, r2, 0x805, 0x0, 0x0, {{0x1, 0x40030000000000}, 0xffffff7f00000000, 0x6, 0x0, {0x14}}}, 0x30}}, 0x0) [ 626.151914][T32211] hfs: invalid uid -1 [ 626.163468][T32211] hfs: unable to parse mount options 04:08:15 executing program 1: r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f0000000000)="24004b001e0025eaa87865f51ef6bce90a04000200bff20182a9000c080009000d000000", 0x24) [ 626.195311][T32202] sctp: [Deprecated]: syz-executor.5 (pid 32202) Use of int in maxseg socket option. [ 626.195311][T32202] Use struct sctp_assoc_value instead [ 626.213675][T32193] sctp: [Deprecated]: syz-executor.5 (pid 32193) Use of struct sctp_assoc_value in delayed_ack socket option. [ 626.213675][T32193] Use struct sctp_sack_info instead [ 626.259750][T32211] hfs: invalid uid -1 04:08:15 executing program 5: r0 = socket$inet_sctp(0x2, 0x5, 0x84) sendmsg$inet_sctp(r0, &(0x7f0000000400)={&(0x7f0000000000)=@in={0x2, 0x0, @remote}, 0x10, &(0x7f0000000080)=[{&(0x7f0000000040)='H', 0x1}], 0x1, &(0x7f00000003c0)=[@sndinfo={0x20, 0x84, 0x2, {0x0, 0x2}}], 0x20}, 0x0) 04:08:15 executing program 0: r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0x4}}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x30, r2, 0x805, 0x0, 0x0, {{0x1, 0x40030000000000}, 0x8702000000000000, 0x6, 0x0, {0x14}}}, 0x30}}, 0x0) [ 626.303241][T32211] hfs: unable to parse mount options 04:08:15 executing program 1: r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f0000000000)="24014b001e0025eaa87865f51ef6bce90a04000200bff20182a9000c080009000d000000", 0x24) 04:08:15 executing program 4: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x2001002, 0x0) mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x44000, 0x0) 04:08:15 executing program 0: r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0x4}}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x30, r2, 0x805, 0x0, 0x0, {{0x1, 0x40030000000000}, 0x9effffff00000000, 0x6, 0x0, {0x14}}}, 0x30}}, 0x0) 04:08:15 executing program 3: r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0x4}}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x30, r2, 0x805, 0x0, 0x0, {{0x1, 0x40030000000000}, 0xffffffff00000000, 0x6, 0x0, {0x14}}}, 0x30}}, 0x0) 04:08:15 executing program 2: syz_mount_image$hfs(&(0x7f00000000c0)='hfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000540)={[{@uid={'uid', 0x3d, 0xffffffffffffffff}}]}) 04:08:15 executing program 5: r0 = socket$inet_sctp(0x2, 0x5, 0x84) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/dlm_plock\x00', 0x80000, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(r1, 0x29, 0x45, &(0x7f0000000100)={'ah\x00'}, &(0x7f0000000140)=0x1e) sendmsg$inet_sctp(r0, &(0x7f0000000180)={&(0x7f0000000000)=@in={0x2, 0x0, @remote}, 0xa, &(0x7f0000000080)=[{&(0x7f0000000040)='H', 0x1}], 0x1, &(0x7f0000000200)=ANY=[@ANYBLOB="0927405b99e206708bf5d8200000000000000084c000000000000500001a00000000000000", @ANYRES32=0x0], 0x20}, 0x0) getsockopt$inet_sctp6_SCTP_AUTOCLOSE(r1, 0x84, 0x4, &(0x7f00000001c0), &(0x7f0000000240)=0x4) listen(r0, 0x9) ioctl$NBD_DISCONNECT(r1, 0xab08) 04:08:15 executing program 1: r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f0000000000)="24024b001e0025eaa87865f51ef6bce90a04000200bff20182a9000c080009000d000000", 0x24) 04:08:15 executing program 3: r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0x4}}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x30, r2, 0x805, 0x0, 0x0, {{0x1, 0x40030000000000}, 0xfffffffffffff000, 0x6, 0x0, {0x14}}}, 0x30}}, 0x0) [ 626.656478][T32250] hfs: invalid uid -1 04:08:15 executing program 0: r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0x4}}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x30, r2, 0x805, 0x0, 0x0, {{0x1, 0x40030000000000}, 0xa1ffffff00000000, 0x6, 0x0, {0x14}}}, 0x30}}, 0x0) [ 626.695530][T32250] hfs: unable to parse mount options 04:08:15 executing program 4: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x2001002, 0x0) mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x44000, 0x0) 04:08:15 executing program 5: r0 = socket$inet_sctp(0x2, 0x5, 0x84) sendmsg$inet_sctp(r0, &(0x7f0000000400)={&(0x7f0000000000)=@in={0x2, 0x0, @remote}, 0x10, &(0x7f0000000080)=[{&(0x7f0000000040)='H', 0x1}], 0x1, &(0x7f00000003c0)=ANY=[@ANYBLOB="2000000000000000840000006ffabe6b3c0c54d30000000000000000", @ANYRES32=0x0], 0x20}, 0x0) [ 626.787081][T32250] hfs: invalid uid -1 [ 626.791342][T32250] hfs: unable to parse mount options 04:08:15 executing program 1: r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f0000000000)="24034b001e0025eaa87865f51ef6bce90a04000200bff20182a9000c080009000d000000", 0x24) 04:08:15 executing program 3: r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0x4}}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x30, r2, 0x805, 0x0, 0x0, {{0x1, 0x40030000000000}, 0x0, 0x2, 0x0, {0x14}}}, 0x30}}, 0x0) 04:08:15 executing program 4: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x2001002, 0x0) mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x44000, 0x0) 04:08:15 executing program 0: r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0x4}}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x30, r2, 0x805, 0x0, 0x0, {{0x1, 0x40030000000000}, 0xeaffffff00000000, 0x6, 0x0, {0x14}}}, 0x30}}, 0x0) 04:08:15 executing program 5: r0 = socket$inet_sctp(0x2, 0x1, 0x84) sendmsg$inet_sctp(r0, &(0x7f0000000400)={&(0x7f0000000000)=@in={0x2, 0x0, @remote}, 0x10, &(0x7f0000000080)=[{&(0x7f0000000040)='H', 0x1}], 0x1, &(0x7f00000003c0)=[@sndinfo={0x20, 0x84, 0x2, {0x0, 0x2}}], 0x20}, 0x0) 04:08:15 executing program 2: syz_mount_image$hfs(&(0x7f00000000c0)='hfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000540)={[{@uid={'uid', 0x3d, 0xffffffffffffffff}}]}) 04:08:15 executing program 4: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x2001002, 0x0) mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x44000, 0x0) 04:08:15 executing program 1: r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f0000000000)="24004c001e0025eaa87865f51ef6bce90a04000200bff20182a9000c080009000d000000", 0x24) 04:08:15 executing program 5: r0 = socket$inet_sctp(0x2, 0x5, 0x84) socket(0x4, 0x1, 0x3) sendmsg$inet_sctp(r0, &(0x7f0000000400)={&(0x7f0000000000)=@in={0x2, 0x0, @remote}, 0x10, &(0x7f0000000080)=[{&(0x7f0000000040)='H', 0x1}], 0x1, &(0x7f00000000c0)=ANY=[@ANYBLOB="2000a7790e3348508422376749e125d1314ff64e3fb3e202e34e0b1f8e9d72edd6ae7ac1d642d3104c00a7899befb24885cf8c0ecf6afea74c9325e50651ebb7a06649bffd80401edb49fda2d1a7310ddfc845aa2f33fdeea71e5b03b431cbf974c17af8f6e81a9c8c967b6686a4ef3edac569c3b184c694b6bc7d5f685449386df6d44183a3d5d94cf826564d1ce00289b38c6548ae5d1a670cb547cdfdd04aeb3bb56fee98b39441862e040badc872f68336f483fe4fcb3d7f686ec15e33c592a9fcc7620ee2b32477d188287898000000000000", @ANYRES32=0x0], 0x20}, 0x0) [ 627.133085][T32293] hfs: invalid uid -1 [ 627.147711][T32293] hfs: unable to parse mount options 04:08:15 executing program 0: r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0x4}}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x30, r2, 0x805, 0x0, 0x0, {{0x1, 0x40030000000000}, 0xf0ffffff00000000, 0x6, 0x0, {0x14}}}, 0x30}}, 0x0) 04:08:16 executing program 4: mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x2001002, 0x0) mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x44000, 0x0) 04:08:16 executing program 3: r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0x4}}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x30, r2, 0x805, 0x0, 0x0, {{0x1, 0x40030000000000}, 0x0, 0x3, 0x0, {0x14}}}, 0x30}}, 0x0) [ 627.244041][T32293] hfs: invalid uid -1 [ 627.248141][T32293] hfs: unable to parse mount options 04:08:16 executing program 1: r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f0000000000)="24014c001e0025eaa87865f51ef6bce90a04000200bff20182a9000c080009000d000000", 0x24) 04:08:16 executing program 2: syz_mount_image$hfs(&(0x7f00000000c0)='hfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000540)={[{@uid={'uid', 0x3d, 0xffffffffffffffff}}]}) 04:08:16 executing program 5: r0 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/capi/capi20ncci\x00', 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000100)={0xffffffffffffffff}, 0x111, 0x8}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_ADDR(r0, &(0x7f0000000180)={0x15, 0x110, 0xfa00, {r1, 0x1, 0x0, 0x0, 0x0, @in6={0xa, 0x4e24, 0xffffffff80000001, @mcast1, 0x7f}, @in={0x2, 0x4e22, @initdev={0xac, 0x1e, 0x1, 0x0}}}}, 0x118) r2 = socket$inet_sctp(0x2, 0x5, 0x84) sendmsg$inet_sctp(r2, &(0x7f0000000400)={&(0x7f0000000000)=@in={0x2, 0x0, @remote}, 0x10, &(0x7f0000000080)=[{&(0x7f0000000040)='H', 0x1}], 0x1, &(0x7f00000003c0)=[@sndinfo={0x20, 0x84, 0x2, {0x0, 0x2}}], 0x20}, 0x0) 04:08:16 executing program 4: mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x2001002, 0x0) mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x44000, 0x0) 04:08:16 executing program 3: r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0x4}}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x30, r2, 0x805, 0x0, 0x0, {{0x1, 0x40030000000000}, 0x0, 0x4, 0x0, {0x14}}}, 0x30}}, 0x0) 04:08:16 executing program 1: r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f0000000000)="24024c001e0025eaa87865f51ef6bce90a04000200bff20182a9000c080009000d000000", 0x24) 04:08:16 executing program 0: r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0x4}}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x30, r2, 0x805, 0x0, 0x0, {{0x1, 0x40030000000000}, 0xfcffffff00000000, 0x6, 0x0, {0x14}}}, 0x30}}, 0x0) [ 627.568509][T32332] hfs: invalid uid -1 04:08:16 executing program 3: r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0x4}}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x30, r2, 0x805, 0x0, 0x0, {{0x1, 0x40030000000000}, 0x0, 0x5, 0x0, {0x14}}}, 0x30}}, 0x0) [ 627.613271][T32332] hfs: unable to parse mount options 04:08:16 executing program 4: mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x2001002, 0x0) mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x44000, 0x0) 04:08:16 executing program 5: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000040)='/dev/snapshot\x00', 0x10000, 0x0) ioctl$VT_RESIZEX(r0, 0x560a, &(0x7f0000000080)={0x9, 0x800, 0x9898, 0x1, 0x9, 0x3}) r1 = socket$inet_sctp(0x2, 0x1, 0x84) sendmsg$inet_sctp(r1, &(0x7f0000000400)={&(0x7f0000000000)=@in={0x2, 0x0, @remote}, 0x10, &(0x7f0000000140)=[{&(0x7f0000000180)="14f60addfae3c2aa8d5d40ff1dcd107824e18e0198482fc7c94689af18cb04c60dcf4be38681b65e1176a90c2710030c9def4c45fffcee4e88b1d198", 0xfffffffffffffff5}], 0x1, &(0x7f00000003c0)=[@sndinfo={0x20, 0x84, 0x2, {0x0, 0x2}}], 0x20}, 0x20000006) socket$inet_smc(0x2b, 0x1, 0x0) r2 = syz_open_dev$midi(&(0x7f00000000c0)='/dev/midi#\x00', 0x6d, 0x400) ioctl$SNDRV_CTL_IOCTL_PVERSION(r2, 0x80045500, &(0x7f0000000100)) lseek(r1, 0x0, 0x0) 04:08:16 executing program 1: r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f0000000000)="24034c001e0025eaa87865f51ef6bce90a04000200bff20182a9000c080009000d000000", 0x24) [ 627.792613][T32332] hfs: invalid uid -1 04:08:16 executing program 4: mkdir(0x0, 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x2001002, 0x0) mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x44000, 0x0) 04:08:16 executing program 3: r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0x4}}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x30, r2, 0x805, 0x0, 0x0, {{0x1, 0x40030000000000}, 0x0, 0xb, 0x0, {0x14}}}, 0x30}}, 0x0) [ 627.821786][T32332] hfs: unable to parse mount options 04:08:16 executing program 2: syz_mount_image$hfs(&(0x7f00000000c0)='hfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000540)={[{@uid={'uid', 0x3d, 0xffffffffffffffff}}]}) 04:08:16 executing program 0: r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0x4}}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x30, r2, 0x805, 0x0, 0x0, {{0x1, 0x40030000000000}, 0xffffff7f00000000, 0x6, 0x0, {0x14}}}, 0x30}}, 0x0) 04:08:16 executing program 1: r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f0000000000)="24004d001e0025eaa87865f51ef6bce90a04000200bff20182a9000c080009000d000000", 0x24) 04:08:16 executing program 5: r0 = socket$inet_sctp(0x2, 0x5, 0x84) sendmsg$inet_sctp(r0, &(0x7f0000000400)={&(0x7f0000000000)=@in={0x2, 0x0, @remote}, 0x10, &(0x7f0000000080)=[{&(0x7f0000000040)='H', 0x1}], 0x1, &(0x7f00000003c0)=[@sndinfo={0x20, 0x84, 0x2, {0x0, 0x2}}], 0x20}, 0x0) r1 = syz_open_dev$midi(&(0x7f00000000c0)='/dev/midi#\x00', 0x0, 0x1) getsockopt$inet_sctp6_SCTP_AUTOCLOSE(r1, 0x84, 0x4, &(0x7f0000000100), &(0x7f0000000140)=0x4) 04:08:16 executing program 4: mkdir(0x0, 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x2001002, 0x0) mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x44000, 0x0) 04:08:16 executing program 3: r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0x4}}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x30, r2, 0x805, 0x0, 0x0, {{0x1, 0x40030000000000}, 0x0, 0xf, 0x0, {0x14}}}, 0x30}}, 0x0) 04:08:16 executing program 1: r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f0000000000)="24014d001e0025eaa87865f51ef6bce90a04000200bff20182a9000c080009000d000000", 0x24) [ 628.058886][T32372] hfs: invalid uid -1 04:08:16 executing program 0: r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0x4}}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x30, r2, 0x805, 0x0, 0x0, {{0x1, 0x40030000000000}, 0xffffffff00000000, 0x6, 0x0, {0x14}}}, 0x30}}, 0x0) [ 628.101012][T32372] hfs: unable to parse mount options 04:08:16 executing program 4: mkdir(0x0, 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x2001002, 0x0) mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x44000, 0x0) 04:08:16 executing program 5: r0 = socket$inet_sctp(0x2, 0x5, 0x84) sendmsg$inet_sctp(r0, &(0x7f0000000400)={&(0x7f0000000000)=@in={0x2, 0x0, @remote}, 0x10, &(0x7f0000000080)=[{&(0x7f0000000040)='H', 0x1}], 0x1, &(0x7f00000000c0)=ANY=[@ANYBLOB="20000000000000008400000002000000000002000000000040000000489a28cebbfe5e1128d53a6a7578ddbc9fc6ca2fd5059c9580f36d56437b61f12a8daac00982e820b01c005b4f75c7b27214cdbf5bfe1f9e1159f2640969a78c607b9e0dda7b6a0797777d217981af0fb88af250557bfd936271c5", @ANYRES32=0x0], 0x20}, 0x0) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140)='/dev/snapshot\x00', 0x101000, 0x0) r2 = syz_genetlink_get_family_id$net_dm(&(0x7f0000000240)='NET_DM\x00') sendmsg$NET_DM_CMD_STOP(r1, &(0x7f0000000300)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x480d0002}, 0xc, &(0x7f00000002c0)={&(0x7f0000000280)={0x14, r2, 0x800, 0x70bd2d, 0x25dfdbfb, {}, ["", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x810}, 0x800) ioctl$sock_inet_SIOCGIFBRDADDR(r0, 0x8919, &(0x7f00000001c0)={'veTZyuM\xa2\x9d\xceCidGe\x00', {0x2, 0x4e23, @multicast1}}) fcntl$getownex(r1, 0x10, &(0x7f0000000340)) setsockopt$inet6_tcp_TLS_RX(r1, 0x6, 0x2, &(0x7f0000000180)=@ccm_128={{0x304}, "3193222f207c02b1", "1e16084f4bb78f81add3d0802dedc809", "45514fed", "b813e7a421e86a7b"}, 0x28) [ 628.249664][T32372] hfs: invalid uid -1 [ 628.263474][T32372] hfs: unable to parse mount options 04:08:17 executing program 3: r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0x4}}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x30, r2, 0x805, 0x0, 0x0, {{0x1, 0x40030000000000}, 0x0, 0x400b, 0x0, {0x14}}}, 0x30}}, 0x0) 04:08:17 executing program 1: r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f0000000000)="24024d001e0025eaa87865f51ef6bce90a04000200bff20182a9000c080009000d000000", 0x24) 04:08:17 executing program 2: syz_mount_image$hfs(&(0x7f00000000c0)='hfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000540)={[{@uid={'uid', 0x3d, 0xffffffffffffffff}}]}) 04:08:17 executing program 0: r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0x4}}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x30, r2, 0x805, 0x0, 0x0, {{0x1, 0x40030000000000}, 0xfffffffffffff000, 0x6, 0x0, {0x14}}}, 0x30}}, 0x0) 04:08:17 executing program 4: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, 0x0, &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x2001002, 0x0) mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x44000, 0x0) 04:08:17 executing program 4: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, 0x0, &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x2001002, 0x0) mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x44000, 0x0) [ 628.501661][T32416] hfs: invalid uid -1 04:08:17 executing program 0: r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0x4}}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x30, r2, 0x805, 0x0, 0x0, {{0x1, 0x40030000000000}, 0x0, 0x2, 0x0, {0x14}}}, 0x30}}, 0x0) 04:08:17 executing program 1: r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f0000000000)="24034d001e0025eaa87865f51ef6bce90a04000200bff20182a9000c080009000d000000", 0x24) 04:08:17 executing program 5: r0 = syz_open_dev$audion(&(0x7f00000000c0)='/dev/audio#\x00', 0xa71, 0x80101) sendmsg$inet_sctp(r0, &(0x7f0000000380)={&(0x7f0000000100)=@in6={0xa, 0x4e20, 0x2, @ipv4={[], [], @multicast1}, 0x6}, 0x1c, &(0x7f0000000300)=[{&(0x7f0000000140)="7654619c797595c3e29266da2ff690797732295fb6865cfd0d1b6db1bf512fd4d6a71a9902f944ea963532e49debcc4d4c7341ea595d5459485aca17646a63a045e52105388ba722d8fd213dac6ee757b36aa9183023aaa3c6df4ad54658984432950b341aa7aaa2f6bbbc147f11ea8b77b8e3bb4496bbecb92c8d00f994cb5d9c14dab93c2509dbb06245d24a6837d49b06ec9a9b75cf159f4915601271e85442e3f9bd9f3db02f3f9406d00f737547caf8be62be717e6afbcafdad2f7456135df7afefd2b18e85cbf84e867b83105b7d37eed0480fffe51440b0af505101543e5d7c7c58ae4520796c9e", 0xeb}, {&(0x7f0000000240)="7e6dbb78a4d514b278f0d6e708554fd1fcc951cc3ad9fcb54fb6537a5c0d88150fadab80d64abd2a92961e32082d8da10b5e39d23048fec8df4e61864c143e1fcdcee2b02385a09971c10c10b7e1f45576be9ea2ee3f7ebcce1a0b4263f7dd86ac779c648354e799441c0e1c9a068a191580a9226cf0ead66edb36e80f6b52480934e25cb4213d69f36231776990e5", 0x8f}], 0x2, &(0x7f0000000340)=[@dstaddrv6={0x20, 0x84, 0x8, @mcast1}], 0x20, 0x48000}, 0x4000) r1 = socket$inet_sctp(0x2, 0x5, 0x84) sendmsg$inet_sctp(r1, &(0x7f0000000400)={&(0x7f0000000000)=@in={0x2, 0x0, @remote}, 0x10, &(0x7f0000000080)=[{&(0x7f0000000040)='H', 0x1}], 0x1, &(0x7f00000003c0)=ANY=[@ANYBLOB="20000000000000008400000002000000000002e21e6f6a5ca5c22300", @ANYRES32=0x0], 0x20}, 0x0) [ 628.569094][T32416] hfs: unable to parse mount options 04:08:17 executing program 4: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, 0x0, &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x2001002, 0x0) mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x44000, 0x0) 04:08:17 executing program 3: r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0x4}}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x30, r2, 0x805, 0x0, 0x0, {{0x1, 0x40030000000000}, 0x0, 0x4101, 0x0, {0x14}}}, 0x30}}, 0x0) [ 628.724994][T32416] hfs: invalid uid -1 [ 628.729000][T32416] hfs: unable to parse mount options 04:08:17 executing program 1: r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f0000000000)="24004e001e0025eaa87865f51ef6bce90a04000200bff20182a9000c080009000d000000", 0x24) 04:08:17 executing program 4: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x2001002, 0x0) mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x44000, 0x0) 04:08:17 executing program 5: r0 = socket$inet_sctp(0x2, 0x5, 0x84) sendmsg$inet_sctp(r0, &(0x7f0000000400)={&(0x7f0000000000)=@in={0x2, 0x0, @remote}, 0x10, &(0x7f0000000080)=[{&(0x7f0000000040)='H', 0x1}], 0x1, &(0x7f00000000c0)=ANY=[@ANYBLOB="200000000000000084000000ce9b6b0b7e31020000000000020000000eb69a452dd4524fec9d5ba34320a65416296c11395c9122307e4c6da821b4b15ce89a1b9a90cbcb5a6232a369bc495e10d06700cc745b8d8479d32cd641031f629592bb0b2e17cbbd639e7e66891974857a0e2e740f53f022c2cfc8fbc6c1f48b533c4017aeea4bd7efc208f3f29662011550d487a44116eddff6001178ab7c8a22bf0ad3e69f22ad36091193f8830c8a7358b3ad285505e35185a2e918f4786df3", @ANYRES32=0x0], 0x20}, 0x0) 04:08:17 executing program 2: syz_mount_image$hfs(&(0x7f00000000c0)='hfs\xc0', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000540)={[{@uid={'uid', 0x3d, 0xffffffffffffffff}}]}) 04:08:17 executing program 3: r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0x4}}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x30, r2, 0x805, 0x0, 0x0, {{0x1, 0x40030000000000}, 0x0, 0x4102, 0x0, {0x14}}}, 0x30}}, 0x0) 04:08:17 executing program 0: r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0x4}}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x30, r2, 0x805, 0x0, 0x0, {{0x1, 0x40030000000000}, 0x0, 0x3, 0x0, {0x14}}}, 0x30}}, 0x0) 04:08:17 executing program 1: r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f0000000000)="24014e001e0025eaa87865f51ef6bce90a04000200bff20182a9000c080009000d000000", 0x24) 04:08:17 executing program 4: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x2001002, 0x0) mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x44000, 0x0) 04:08:17 executing program 5: r0 = socket$inet_sctp(0x2, 0x1, 0x84) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000140)='/dev/sequencer2\x00', 0x80000, 0x0) ioctl$FS_IOC_FSSETXATTR(r1, 0x401c5820, &(0x7f0000000300)={0x7, 0x80, 0x7, 0x7f, 0x634}) write$nbd(r1, &(0x7f0000000180)={0x67446698, 0x0, 0x4, 0x2, 0xffffffffffffffff, "93f2673ced124e70c25357c09aa77bbca805edd1f31df916bd029c4244712ccd8e343f48295762458f4f5a49de460b51696e8ddaff603e7d3871ece58ebeebedbf7df8701dd55282022b13c83d6f17d03e48847603f1df3804211c96a3272a2d90a651627affbbe79e3b62822bbf9c1a"}, 0x80) write$nbd(r1, &(0x7f0000000200)={0x67446698, 0x1, 0x4, 0x3, 0x4, "47be285c137b5ab7a2836b0878cb5fe21b81eb5695350143b9d8ee8a4fff90ff8296508c44609a4f454f5cf26feb2d39d4e9569a94ef73c89bcb974c934a26d8f4715025ac6c1212241d8b0859d9abef679e739d040b1a5334169c17676cbc1d7fc270396877b045f24e94792ef03054e303fefd1147a41dc8ab74b95d91d3ef183c92dd13a3d1822cf6c6a60ceb9582c881cdaea8ef1bdb44ce8475feaab1322daa"}, 0xb2) ioctl$IMADDTIMER(r1, 0x80044940, &(0x7f00000002c0)=0xffffffffffffffff) sendmsg$inet_sctp(r0, &(0x7f0000000400)={&(0x7f0000000000)=@in={0x2, 0x0, @remote}, 0x10, &(0x7f0000000080)=[{&(0x7f0000000040)='H', 0x1}], 0x1, &(0x7f0000000340)=ANY=[@ANYBLOB="200000000000dc6bd7318b3d1b4fc408ab9354a1b3000084000000027a4563f025c16ecf884bb6f8c68aa26d7929eb003e49f2715bc81b2ee7929b8b69b501200d03cb3f13d7b25bfb15c35744acabec56", @ANYRES32=0x0], 0x20}, 0x0) 04:08:17 executing program 0: r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0x4}}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x30, r2, 0x805, 0x0, 0x0, {{0x1, 0x40030000000000}, 0x0, 0x4, 0x0, {0x14}}}, 0x30}}, 0x0) 04:08:17 executing program 3: r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0x4}}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x30, r2, 0x805, 0x0, 0x0, {{0x1, 0x40030000000000}, 0x0, 0x4107, 0x0, {0x14}}}, 0x30}}, 0x0) 04:08:18 executing program 1: r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f0000000000)="24024e001e0025eaa87865f51ef6bce90a04000200bff20182a9000c080009000d000000", 0x24) 04:08:18 executing program 2: syz_mount_image$hfs(&(0x7f00000000c0)='hfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000540)={[{@uid={'uid', 0x3d, 0xffffffffffffffff}}]}) 04:08:18 executing program 5: r0 = openat$null(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/null\x00', 0x20400, 0x0) getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, &(0x7f0000000100)={0x0, @in={{0x2, 0x4e23, @loopback}}, 0x100000001, 0x400}, &(0x7f00000001c0)=0x90) setsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x76, &(0x7f0000000200)={r1, 0x9}, 0x8) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000440)={{{@in=@remote, @in=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@dev}, 0x0, @in=@multicast1}}, &(0x7f0000000380)=0xe8) stat(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000540)={0x0, 0x0, 0x0, 0x0, 0x0}) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000005c0)={{{@in6=@local, @in6=@mcast2, 0x4e22, 0x6, 0x4e21, 0xffff, 0x14b3adfa115e554e, 0x20, 0xa0, 0x2b, r2, r3}, {0x0, 0x8, 0xa964, 0x401, 0x9, 0x1, 0x1f, 0x9}, {0x9, 0xeb6f2cf, 0xffffffff, 0xfffffffffffffff7}, 0x7f, 0x6e6bb0, 0x0, 0x0, 0x2, 0x1}, {{@in6=@mcast1, 0x4d3, 0x32}, 0x2, @in=@local, 0x3506, 0x1, 0x0, 0x5, 0x7, 0xbaa, 0xaab}}, 0xe8) r4 = socket$inet_sctp(0x2, 0x5, 0x84) sendmsg$inet_sctp(r4, &(0x7f0000000400)={&(0x7f0000000000)=@in={0x2, 0x0, @remote}, 0x10, &(0x7f0000000080)=[{&(0x7f0000000040)='H', 0x1}], 0x1, &(0x7f0000000240)=ANY=[@ANYBLOB="200000000000010023000084007300020100000000420700000000e9ffffff", @ANYRES32=0x0], 0x20}, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_NUMBER(r0, 0x84, 0x1c, &(0x7f0000000280), &(0x7f00000002c0)=0x4) 04:08:18 executing program 0: r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0x4}}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x30, r2, 0x805, 0x0, 0x0, {{0x1, 0x40030000000000}, 0x0, 0x5, 0x0, {0x14}}}, 0x30}}, 0x0) 04:08:18 executing program 4: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x2001002, 0x0) mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x44000, 0x0) 04:08:18 executing program 3: r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0x4}}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x30, r2, 0x805, 0x0, 0x0, {{0x1, 0x40030000000000}, 0x0, 0x4109, 0x0, {0x14}}}, 0x30}}, 0x0) 04:08:18 executing program 1: r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f0000000000)="24034e001e0025eaa87865f51ef6bce90a04000200bff20182a9000c080009000d000000", 0x24) [ 629.397153][T32492] hfs: invalid uid -1 [ 629.416825][T32492] hfs: unable to parse mount options [ 629.508845][T32492] hfs: invalid uid -1 04:08:18 executing program 5: r0 = socket$inet_sctp(0x2, 0x5, 0x84) sendmsg$inet_sctp(r0, &(0x7f0000000400)={&(0x7f0000000000)=@in={0x2, 0x0, @remote}, 0x10, &(0x7f0000000080)=[{&(0x7f0000000040)='H', 0x1}], 0x1, &(0x7f00000003c0)=ANY=[@ANYBLOB="200000000000000084000000020000000000e1ffffff000000000000", @ANYRES32=0x0], 0x20}, 0x0) [ 629.551230][T32492] hfs: unable to parse mount options 04:08:18 executing program 0: r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0x4}}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x30, r2, 0x805, 0x0, 0x0, {{0x1, 0x40030000000000}, 0x0, 0xb, 0x0, {0x14}}}, 0x30}}, 0x0) 04:08:18 executing program 1: r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f0000000000)="24004f001e0025eaa87865f51ef6bce90a04000200bff20182a9000c080009000d000000", 0x24) 04:08:18 executing program 3: r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0x4}}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x30, r2, 0x805, 0x0, 0x0, {{0x1, 0x40030000000000}, 0x0, 0x410c, 0x0, {0x14}}}, 0x30}}, 0x0) 04:08:18 executing program 4: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(0x0, 0x0) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x2001002, 0x0) mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x44000, 0x0) 04:08:18 executing program 2: syz_mount_image$hfs(&(0x7f00000000c0)='hfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000540)={[{@uid={'uid', 0x3d, 0xffffffffffffffff}}]}) 04:08:18 executing program 5: r0 = socket$inet_sctp(0x2, 0x5, 0x84) ioctl$TIOCPKT(r0, 0x5420, &(0x7f00000000c0)=0x7) sendmsg$inet_sctp(r0, &(0x7f0000000400)={&(0x7f0000000000)=@in={0x2, 0x0, @remote}, 0x10, &(0x7f0000000080)=[{&(0x7f0000000040)='H', 0x1}], 0x1, &(0x7f00000003c0)=ANY=[@ANYBLOB="200000000000000000a03100"/28, @ANYRES32=0x0], 0x20}, 0x0) 04:08:18 executing program 4: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(0x0, 0x0) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x2001002, 0x0) mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x44000, 0x0) 04:08:18 executing program 0: r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0x4}}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x30, r2, 0x805, 0x0, 0x0, {{0x1, 0x40030000000000}, 0x0, 0xf, 0x0, {0x14}}}, 0x30}}, 0x0) 04:08:18 executing program 1: r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f0000000000)="24014f001e0025eaa87865f51ef6bce90a04000200bff20182a9000c080009000d000000", 0x24) 04:08:18 executing program 3: r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0x4}}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x30, r2, 0x805, 0x0, 0x0, {{0x1, 0x40030000000000}, 0x0, 0x7fed, 0x0, {0x14}}}, 0x30}}, 0x0) 04:08:18 executing program 0: r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0x4}}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x30, r2, 0x805, 0x0, 0x0, {{0x1, 0x40030000000000}, 0x0, 0x400b, 0x0, {0x14}}}, 0x30}}, 0x0) [ 629.994361][T32547] hfs: invalid uid -1 04:08:18 executing program 5: r0 = socket$inet_sctp(0x2, 0x1, 0x84) sendmsg$inet_sctp(r0, &(0x7f0000000400)={&(0x7f0000000000)=@in={0x2, 0x0, @remote}, 0x10, &(0x7f0000000080)=[{&(0x7f0000000040)='H', 0x1}], 0x1, &(0x7f00000003c0)=[@sndinfo={0x20, 0x84, 0x2, {0x0, 0x2}}], 0x20}, 0x0) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/net/pfkey\x00', 0x800, 0x0) setsockopt$netlink_NETLINK_CAP_ACK(r1, 0x10e, 0xa, &(0x7f0000000100)=0xfff, 0x4) 04:08:18 executing program 4: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(0x0, 0x0) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x2001002, 0x0) mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x44000, 0x0) [ 630.022315][T32547] hfs: unable to parse mount options 04:08:18 executing program 3: r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0x4}}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x30, r2, 0x805, 0x0, 0x0, {{0x1, 0x40030000000000}, 0x0, 0xffff8001, 0x0, {0x14}}}, 0x30}}, 0x0) 04:08:18 executing program 1: r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f0000000000)="24024f001e0025eaa87865f51ef6bce90a04000200bff20182a9000c080009000d000000", 0x24) 04:08:18 executing program 0: r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0x4}}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x30, r2, 0x805, 0x0, 0x0, {{0x1, 0x40030000000000}, 0x0, 0x4101, 0x0, {0x14}}}, 0x30}}, 0x0) [ 630.125506][T32547] hfs: invalid uid -1 [ 630.156608][T32547] hfs: unable to parse mount options 04:08:19 executing program 2: syz_mount_image$hfs(&(0x7f00000000c0)='hfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000540)={[{@uid={'uid', 0x3d, 0xffffffffffffffff}}]}) 04:08:19 executing program 4: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x2001002, 0x0) mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x44000, 0x0) 04:08:19 executing program 3: r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0x4}}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x30, r2, 0x805, 0x0, 0x0, {{0x1, 0x40030000000000}, 0x0, 0xffff800b, 0x0, {0x14}}}, 0x30}}, 0x0) 04:08:19 executing program 5: r0 = socket$inet_sctp(0x2, 0x5, 0x84) r1 = syz_open_dev$vcsa(&(0x7f0000000040)='/dev/vcsa#\x00', 0x2, 0x0) getsockopt$bt_BT_DEFER_SETUP(r1, 0x112, 0x7, &(0x7f0000000080), &(0x7f00000000c0)=0x4) sendmsg$inet_sctp(r0, &(0x7f0000000400)={&(0x7f0000000000)=@in={0x2, 0x0, @remote}, 0xffffff7a, &(0x7f0000000080), 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB="20000003000000000000000000000007928e2b7be53c64f59903dc9fbb2fbb4d00000000ef0000400000000000", @ANYRES32=0x0], 0x31}, 0x0) 04:08:19 executing program 1: r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f0000000000)="24034f001e0025eaa87865f51ef6bce90a04000200bff20182a9000c080009000d000000", 0x24) 04:08:19 executing program 0: r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0x4}}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x30, r2, 0x805, 0x0, 0x0, {{0x1, 0x40030000000000}, 0x0, 0x4102, 0x0, {0x14}}}, 0x30}}, 0x0) [ 630.385837][T32575] hfs: invalid uid -1 04:08:19 executing program 4: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x2001002, 0x0) mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x44000, 0x0) [ 630.419647][T32575] hfs: unable to parse mount options 04:08:19 executing program 1: r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f0000000000)="240050001e0025eaa87865f51ef6bce90a04000200bff20182a9000c080009000d000000", 0x24) 04:08:19 executing program 5: r0 = socket$inet_sctp(0x2, 0x5, 0x84) sendmsg$inet_sctp(r0, &(0x7f0000000400)={&(0x7f0000000000)=@in={0x2, 0x0, @remote}, 0x10, &(0x7f0000000080)=[{&(0x7f0000000040)='H', 0x1}], 0x1, &(0x7f00000003c0)=[@sndinfo={0x20, 0x84, 0x2, {0x0, 0x2}}], 0x20}, 0x0) getsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(r0, 0x84, 0x72, &(0x7f00000000c0)={0x0, 0x1}, &(0x7f0000000100)=0xc) setsockopt$inet_sctp_SCTP_MAXSEG(r0, 0x84, 0xd, &(0x7f0000000140)=@assoc_id=r1, 0x4) 04:08:19 executing program 3: r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0x4}}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x30, r2, 0x805, 0x0, 0x0, {{0x1, 0x40030000000000}, 0x0, 0x6, 0x2, {0x14}}}, 0x30}}, 0x0) [ 630.519053][T32575] hfs: invalid uid -1 [ 630.523070][T32575] hfs: unable to parse mount options 04:08:19 executing program 0: r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0x4}}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x30, r2, 0x805, 0x0, 0x0, {{0x1, 0x40030000000000}, 0x0, 0x4107, 0x0, {0x14}}}, 0x30}}, 0x0) 04:08:19 executing program 4: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x2001002, 0x0) mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x44000, 0x0) 04:08:19 executing program 2: syz_mount_image$hfs(&(0x7f00000000c0)='hfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000540)={[{@uid={'uid', 0x3d, 0xffffffffffffffff}}]}) [ 630.630238][T32601] sctp: [Deprecated]: syz-executor.5 (pid 32601) Use of int in maxseg socket option. [ 630.630238][T32601] Use struct sctp_assoc_value instead 04:08:19 executing program 1: r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f0000000000)="240150001e0025eaa87865f51ef6bce90a04000200bff20182a9000c080009000d000000", 0x24) 04:08:19 executing program 0: r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0x4}}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x30, r2, 0x805, 0x0, 0x0, {{0x1, 0x40030000000000}, 0x0, 0x4109, 0x0, {0x14}}}, 0x30}}, 0x0) 04:08:19 executing program 5: r0 = socket$inet_sctp(0x2, 0x928589cd116533f9, 0x84) sendmsg$inet_sctp(r0, &(0x7f0000000400)={&(0x7f0000000000)=@in={0x2, 0x0, @remote}, 0x10, &(0x7f0000000080)=[{&(0x7f0000000040)='H', 0x1}], 0x1, &(0x7f00000003c0)=[@sndinfo={0x20, 0x84, 0x2, {0x0, 0x2}}], 0x20}, 0x0) 04:08:19 executing program 3: r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0x4}}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x30, r2, 0x805, 0x0, 0x0, {{0x1, 0x40030000000000}, 0x0, 0x6, 0x3, {0x14}}}, 0x30}}, 0x0) 04:08:19 executing program 4: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x0, 0x0) mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x44000, 0x0) [ 630.838410][T32617] hfs: invalid uid -1 [ 630.917678][T32617] hfs: unable to parse mount options 04:08:19 executing program 0: r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0x4}}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x30, r2, 0x805, 0x0, 0x0, {{0x1, 0x40030000000000}, 0x0, 0x410c, 0x0, {0x14}}}, 0x30}}, 0x0) 04:08:19 executing program 5: r0 = socket$inet_sctp(0x2, 0x5, 0x84) r1 = syz_open_dev$swradio(&(0x7f0000000140)='/dev/swradio#\x00', 0x0, 0x2) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(0xffffffffffffffff, 0x84, 0x10, &(0x7f0000000180)=@sack_info={0x0, 0x5, 0x3000}, &(0x7f00000001c0)=0xc) setsockopt$inet_sctp6_SCTP_AUTH_KEY(r1, 0x84, 0x17, &(0x7f0000000200)={r2, 0x3, 0xd2, "3742f43bbb46ad6100c0cb15e8c07bc12e6d88b12243b690de4556c9eac73d745a773feaefd08c8049c694cd6bb7e0141286417e8e0d16f941cfd4998d965e543d9dc87a29a96f76b2c1d3f492cecb4aed3dec291303955dd623f29faf7f42cd316ca48afde9c5367113febc423f9934351530e08d93b66bf2a38ca53e156306333f4799fa60ab4047ae1b9460541a8def1b9bcda37703744d80d3a17b699b85bd20072ae73cd71759c1b298f5af0fa51afbe89bc9b7e9f4452c9eadd133ce92ee58b195f7d6c50c87b5bf1fb3a1218f8fa9"}, 0xda) sendmsg$inet_sctp(r0, &(0x7f0000000400)={&(0x7f0000000000)=@in={0x2, 0x0, @remote}, 0x10, &(0x7f0000000080)=[{&(0x7f0000000040)='H', 0x1}], 0x1, &(0x7f00000003c0)=[@sndinfo={0x20, 0x84, 0x2, {0x0, 0x2}}], 0x20}, 0x0) ioctl(r0, 0x100000000, &(0x7f00000000c0)="37dff5e8cfd554f75621c62fb70d44f2b28aadd566cf16c468f72d38d18bfef835aaf69a699910af9393e98e1ad87905df518f8cdef1a40665a05be367d88f0095c403065a07216ba63626d7a0e57e8d99ae4c03b5f6db93e9e9832024ec0a0ca5db78b1af0735e9") 04:08:19 executing program 1: r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f0000000000)="240250001e0025eaa87865f51ef6bce90a04000200bff20182a9000c080009000d000000", 0x24) 04:08:19 executing program 3: r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0x4}}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x30, r2, 0x805, 0x0, 0x0, {{0x1, 0x40030000000000}, 0x0, 0x6, 0x4, {0x14}}}, 0x30}}, 0x0) 04:08:19 executing program 4: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x0, 0x0) mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x44000, 0x0) [ 631.067346][T32617] hfs: invalid uid -1 [ 631.071360][T32617] hfs: unable to parse mount options 04:08:20 executing program 2: syz_mount_image$hfs(&(0x7f00000000c0)='hfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000540)={[{@uid={'uid', 0x3d, 0xffffffffffffffff}}]}) 04:08:20 executing program 0: r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0x4}}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x30, r2, 0x805, 0x0, 0x0, {{0x1, 0x40030000000000}, 0x0, 0x7fec, 0x0, {0x14}}}, 0x30}}, 0x0) 04:08:20 executing program 5: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x9, 0x200000) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(r0, 0xc4c85512, &(0x7f0000000440)={{0xa, 0x1, 0x6, 0x1, 'syz0\x00', 0x1f}, 0x0, [0x65, 0x3, 0x9, 0x0, 0x7ff, 0x80000001, 0x233644ca, 0x5, 0x3, 0x9, 0x7, 0xffffffffffffff09, 0x1ff, 0x0, 0x2, 0x400, 0x6, 0x8000, 0x53, 0x406a, 0x200, 0x4, 0x0, 0x0, 0x0, 0x7, 0x3, 0x3ff, 0x5, 0x0, 0x4, 0x6, 0x8, 0x6, 0x2, 0x1, 0x8, 0x8000, 0x6, 0x1, 0x6, 0x4, 0x8000, 0x1f, 0x2, 0x1000, 0x6, 0xa67, 0x6, 0x5, 0x0, 0xfffffffffffffff9, 0xfff, 0x8, 0x9163, 0x4, 0x9e3, 0x6, 0x10040000, 0x9a, 0x9, 0x41e, 0x4, 0xffff, 0x7, 0x4b6, 0x2, 0x73, 0x6, 0x56e, 0x8, 0x1, 0x8, 0x496, 0x10001, 0xfff, 0x9, 0x0, 0x2, 0x6, 0x80, 0xffff, 0x7c1, 0x4, 0x3f, 0x7, 0x5, 0x80, 0x5b4b9221, 0x0, 0x4, 0x65, 0x8, 0xffffffff, 0x334, 0x7, 0x80, 0x80000000, 0x1, 0x80000001, 0x7f, 0x96ab, 0x1, 0x1, 0x7ff, 0x5, 0x10001, 0x9, 0xc55, 0x23124cfd, 0x8000, 0x1, 0x91a9, 0x6, 0xffff, 0x3, 0xffffffffffffffff, 0x70000000000000, 0x4, 0x0, 0x1, 0x3, 0xff, 0x4, 0x1ff, 0x1000, 0xd7, 0x3], {0x77359400}}) r1 = socket$inet_sctp(0x2, 0x5, 0x84) sendmsg$inet_sctp(r1, &(0x7f0000000400)={&(0x7f0000000000)=@in={0x2, 0x0, @remote}, 0x10, &(0x7f0000000080)=[{&(0x7f0000000040)='H', 0x1}], 0x1, &(0x7f00000003c0)=[@sndinfo={0x20, 0x84, 0x2, {0x0, 0x2}}], 0x20}, 0x0) write$uinput_user_dev(r0, &(0x7f0000000940)={'syz0\x00', {0x7, 0x6, 0x7fffffff, 0x81}, 0x2a, [0x7fff, 0x3, 0x9, 0x6, 0x1, 0x7f, 0x5, 0x7, 0x82, 0x80000001, 0x3f, 0x8, 0x2cb, 0x5, 0x6, 0x7f, 0x2, 0x1ff, 0x1f, 0x5c72, 0x0, 0x5, 0x5, 0xffffffffffffffff, 0x5, 0x3, 0x3, 0x1f, 0x200000000000, 0x7ff, 0xdd2f, 0x7, 0x8, 0xffffffffffffffff, 0x7f, 0x97, 0x5, 0x800, 0x4, 0x1d, 0x9, 0x1, 0x6, 0x8001, 0xfffffffffffffffd, 0xf6, 0x401, 0x2, 0x3db9412, 0x8001, 0x0, 0x7f, 0x6, 0xffffffffffffffff, 0x627, 0x2, 0x1, 0x3, 0x0, 0x6, 0x20, 0x94b6, 0x7, 0x2b], [0x88f0, 0x2, 0x1ff, 0x8, 0x400, 0x59f00000000000, 0x1000, 0x0, 0xffffffff, 0x0, 0x7, 0x8, 0x0, 0x101, 0x1, 0xffffffff, 0x6, 0x80000001, 0x400, 0xd1, 0x5, 0x6, 0x964, 0x3, 0x0, 0x80000000, 0x4, 0x20, 0x6, 0xaf, 0x4, 0x7d, 0x32d0, 0x1f, 0x6, 0x5, 0x4, 0x8, 0x9, 0x8001, 0x3, 0x9, 0x8, 0x8, 0x1f, 0x6, 0x1f, 0x9, 0x100000000, 0x5, 0x7, 0x7fffffff, 0xfff, 0xf25c, 0x6, 0x2, 0x6, 0x1ff, 0x800, 0x8, 0xfffffffffffffff7, 0x100000000, 0x7, 0x4], [0x4, 0x1, 0x3ff, 0x6e, 0x9, 0x3, 0x7, 0x7, 0x67, 0xffff, 0x5, 0x7e0000, 0x8, 0x1, 0x8001, 0x5, 0x6, 0x3, 0x0, 0x80000001, 0x6, 0x5, 0x3, 0x5, 0x9, 0x5, 0x2, 0x4, 0x5, 0x8, 0x4dbed507, 0x9, 0x100000001, 0x81, 0x1f, 0x5, 0x4, 0x4, 0x4c46, 0x2b, 0x4a, 0x5, 0xa2, 0x10001, 0x1, 0x0, 0x81, 0x0, 0x7, 0x2, 0x0, 0xb8afb25, 0x6, 0x2, 0x101, 0x5, 0x1, 0x1ff, 0x0, 0xffffffff, 0x6, 0x8, 0x80000001, 0x80000000], [0x9, 0x7, 0x1ff, 0x9, 0x0, 0x40, 0x2, 0x3, 0x401, 0x6df9fef9, 0x7b4, 0x1, 0x10000, 0x1, 0x1, 0x7fff, 0x83b, 0xff, 0x7, 0x6, 0x5, 0x200, 0x7, 0xfffffffffffffffb, 0x3, 0x5, 0x3, 0x93, 0x200000000000000, 0x7ff, 0x5, 0x7, 0xd5c, 0x1967, 0xd83, 0xfffffffffffffff9, 0x65, 0x0, 0x7fff, 0x7, 0x10000, 0x40, 0x8f89, 0x8001, 0x8000, 0x3, 0x8, 0x9, 0x5, 0x10000, 0x2, 0x2, 0x4, 0x5, 0x1c59800, 0x1, 0x1, 0x2, 0x100000000, 0x7e656a4a, 0x5a399ebf, 0x7ff, 0x0, 0x5af8]}, 0x45c) 04:08:20 executing program 1: r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f0000000000)="240350001e0025eaa87865f51ef6bce90a04000200bff20182a9000c080009000d000000", 0x24) 04:08:20 executing program 3: r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0x4}}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x30, r2, 0x805, 0x0, 0x0, {{0x1, 0x40030000000000}, 0x0, 0x6, 0x5, {0x14}}}, 0x30}}, 0x0) [ 631.355955][T32665] hfs: invalid uid -1 04:08:20 executing program 4: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x0, 0x0) mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x44000, 0x0) 04:08:20 executing program 0: r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0x4}}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x30, r2, 0x805, 0x0, 0x0, {{0x1, 0x40030000000000}, 0x0, 0xffff8001, 0x0, {0x14}}}, 0x30}}, 0x0) 04:08:20 executing program 1: r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f0000000000)="240051001e0025eaa87865f51ef6bce90a04000200bff20182a9000c080009000d000000", 0x24) [ 631.413819][T32665] hfs: unable to parse mount options 04:08:20 executing program 5: r0 = socket$inet_sctp(0x2, 0x5, 0x84) sendmsg$inet_sctp(r0, &(0x7f0000000400)={&(0x7f0000000000)=@in={0x2, 0x0, @remote}, 0x10, &(0x7f0000000080)=[{&(0x7f0000000040)='H', 0x1}], 0x1, &(0x7f00000003c0)=ANY=[@ANYBLOB="20000000000000008423000002000000000002000000000000000000", @ANYRES32=0x0], 0x20}, 0x0) [ 631.468918][T32665] hfs: invalid uid -1 [ 631.472999][T32665] hfs: unable to parse mount options 04:08:20 executing program 3: r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0x4}}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x30, r2, 0x805, 0x0, 0x0, {{0x1, 0x40030000000000}, 0x0, 0x6, 0x6, {0x14}}}, 0x30}}, 0x0) 04:08:20 executing program 2: syz_mount_image$hfs(&(0x7f00000000c0)='hfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000540)={[{@uid={'uid', 0x3d, 0xffffffffffffffff}}]}) 04:08:20 executing program 4: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x2001002, 0x0) mount$bpf(0x0, 0x0, 0x0, 0x44000, 0x0) 04:08:20 executing program 1: r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f0000000000)="240151001e0025eaa87865f51ef6bce90a04000200bff20182a9000c080009000d000000", 0x24) 04:08:20 executing program 0: r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0x4}}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x30, r2, 0x805, 0x0, 0x0, {{0x1, 0x40030000000000}, 0x0, 0xffff800b, 0x0, {0x14}}}, 0x30}}, 0x0) 04:08:20 executing program 5: r0 = socket$inet_sctp(0x2, 0x1, 0x84) sendmsg$inet_sctp(r0, &(0x7f0000000400)={&(0x7f0000000000)=@in={0x2, 0x0, @remote}, 0x10, &(0x7f0000000080)=[{&(0x7f0000000040)='H', 0x1}], 0x1, &(0x7f00000000c0)=ANY=[@ANYBLOB="2000000000000000840000000200000000000a0000000000000000008169f7f0576308c229fa197443d482c1d7cf15e55b302e97463f25bdb9b586bd2ecf1f47d82131d1e1302e23ebb314a88244b2855bbd5bbbee2c1b9b72f98a4311a27d7bf628f1a0385780681267a25499ecd54efe9e54acf0a3a9abf2e8b5fff037afe428b4b3783457f4fa22af93d27c643cc93f258fc9783dde851104f88444e3aeb6a22557e72a9a66f8f688837ace13878eff7eeb46d63895924a22971ce56ec2075dbcc88b0ac3f07331442d1ba88e41aa4431eb0fa8db14c7352cde9ac982853fecf08fc088663e00"/246, @ANYRES32=0x0], 0x20}, 0x0) [ 631.826971][T32694] hfs: invalid uid -1 04:08:20 executing program 3: r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0x4}}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x30, r2, 0x805, 0x0, 0x0, {{0x1, 0x40030000000000}, 0x0, 0x6, 0x7, {0x14}}}, 0x30}}, 0x0) [ 631.863329][T32694] hfs: unable to parse mount options 04:08:20 executing program 1: r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f0000000000)="240251001e0025eaa87865f51ef6bce90a04000200bff20182a9000c080009000d000000", 0x24) 04:08:20 executing program 4: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x2001002, 0x0) mount$bpf(0x0, 0x0, 0x0, 0x44000, 0x0) 04:08:20 executing program 5: r0 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x1d, &(0x7f00000000c0)={0x4, [0x0, 0x0, 0x0, 0x0]}, &(0x7f0000000100)=0x14) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f0000000140)={r2, @in6={{0xa, 0x4e21, 0x4, @local, 0x100}}, 0x6, 0x6, 0x6, 0x30000000000000}, 0x98) setsockopt$inet_sctp_SCTP_RESET_ASSOC(r0, 0x84, 0x78, &(0x7f0000000280)=r1, 0x4) sendmsg$inet_sctp(r0, &(0x7f0000000400)={&(0x7f0000000000)=@in={0x2, 0x0, @remote}, 0x10, &(0x7f0000000080)=[{&(0x7f0000000040)='H', 0x1}], 0x1, &(0x7f00000003c0)=[@sndinfo={0x20, 0x84, 0x2, {0x0, 0x2}}], 0x20}, 0x0) getsockopt$sock_timeval(r0, 0x1, 0x14, &(0x7f0000000200), &(0x7f0000000240)=0x10) 04:08:20 executing program 0: r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0x4}}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x30, r2, 0x805, 0x0, 0x0, {{0x1, 0x40030000000000}, 0x0, 0x6, 0x2, {0x14}}}, 0x30}}, 0x0) [ 631.971930][T32694] hfs: invalid uid -1 [ 631.988865][T32694] hfs: unable to parse mount options 04:08:20 executing program 1: r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f0000000000)="240351001e0025eaa87865f51ef6bce90a04000200bff20182a9000c080009000d000000", 0x24) 04:08:20 executing program 2: syz_mount_image$hfs(&(0x7f00000000c0)='hfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000540)={[{@uid={'uid', 0x3d, 0xffffffffffffffff}}]}) 04:08:20 executing program 4: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x2001002, 0x0) mount$bpf(0x0, 0x0, 0x0, 0x44000, 0x0) 04:08:20 executing program 5: r0 = socket$inet_sctp(0x2, 0x3f4fe632c59b2210, 0x84) write$P9_RREMOVE(r0, &(0x7f00000000c0)={0x7, 0x7b, 0x1}, 0x7) sendmsg$inet_sctp(r0, &(0x7f0000000400)={&(0x7f0000000000)=@in={0x2, 0x0, @remote}, 0x10, &(0x7f0000000080)=[{&(0x7f0000000040)='H', 0x1}], 0x1, &(0x7f00000003c0)=[@sndinfo={0x20, 0x84, 0x2, {0x0, 0x2}}], 0x20}, 0x0) 04:08:21 executing program 0: r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0x4}}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x30, r2, 0x805, 0x0, 0x0, {{0x1, 0x40030000000000}, 0x0, 0x6, 0x3, {0x14}}}, 0x30}}, 0x0) 04:08:21 executing program 3: r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0x4}}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x30, r2, 0x805, 0x0, 0x0, {{0x1, 0x40030000000000}, 0x0, 0x6, 0xa, {0x14}}}, 0x30}}, 0x0) 04:08:21 executing program 1: r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f0000000000)="240052001e0025eaa87865f51ef6bce90a04000200bff20182a9000c080009000d000000", 0x24) [ 632.331650][T32742] hfs: invalid uid -1 04:08:21 executing program 5: socket$inet_sctp(0x2, 0x5, 0x84) r0 = socket$inet(0x2, 0x80000, 0xffffffffffffffc0) sendmsg$inet_sctp(r0, &(0x7f0000000400)={&(0x7f0000000000)=@in={0x2, 0x0, @remote}, 0x10, &(0x7f0000000080)=[{&(0x7f0000000040)='H', 0x5e}], 0x4828247ae80b74d, &(0x7f00000003c0)=[@sndinfo={0x20, 0x84, 0x2, {0x0, 0x2}}], 0xfffffffffffffdbb, 0x4001}, 0x0) 04:08:21 executing program 4: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x2001002, 0x0) mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0) [ 632.394202][T32742] hfs: unable to parse mount options 04:08:21 executing program 0: r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0x4}}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x30, r2, 0x805, 0x0, 0x0, {{0x1, 0x40030000000000}, 0x0, 0x6, 0x4, {0x14}}}, 0x30}}, 0x0) 04:08:21 executing program 3: r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0x4}}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x30, r2, 0x805, 0x0, 0x0, {{0x1, 0x40030000000000}, 0x0, 0x6, 0xe, {0x14}}}, 0x30}}, 0x0) [ 632.465442][T32742] hfs: invalid uid -1 [ 632.469444][T32742] hfs: unable to parse mount options 04:08:21 executing program 1: r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f0000000000)="240152001e0025eaa87865f51ef6bce90a04000200bff20182a9000c080009000d000000", 0x24) 04:08:21 executing program 5: r0 = socket$inet_sctp(0x2, 0x5, 0x84) sendmsg$inet_sctp(r0, &(0x7f0000000400)={&(0x7f0000000000)=@in={0x2, 0x0, @remote}, 0x10, &(0x7f0000000080)=[{&(0x7f0000000040)='H', 0x1}], 0x1000000000000178, &(0x7f00000003c0)=[@sndinfo={0x20, 0x84, 0x2, {0x0, 0x2}}], 0x20}, 0x0) getsockopt$SO_TIMESTAMPING(r0, 0x1, 0x41, &(0x7f00000000c0), &(0x7f0000000100)=0x4) r1 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000140)='/dev/btrfs-control\x00', 0x30841, 0x0) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000180)=r1, 0x4) 04:08:21 executing program 2: syz_mount_image$hfs(&(0x7f00000000c0)='hfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000540)={[{@uid={'uid', 0x3d, 0xffffffffffffffff}}]}) 04:08:21 executing program 3: r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0x4}}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x30, r2, 0x805, 0x0, 0x0, {{0x1, 0x40030000000000}, 0x0, 0x6, 0xf, {0x14}}}, 0x30}}, 0x0) 04:08:21 executing program 0: r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0x4}}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x30, r2, 0x805, 0x0, 0x0, {{0x1, 0x40030000000000}, 0x0, 0x6, 0x5, {0x14}}}, 0x30}}, 0x0) 04:08:21 executing program 4: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x2001002, 0x0) mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0) 04:08:21 executing program 1: r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f0000000000)="240252001e0025eaa87865f51ef6bce90a04000200bff20182a9000c080009000d000000", 0x24) 04:08:21 executing program 5: r0 = socket$inet_sctp(0x2, 0x5, 0x84) sendmsg$inet_sctp(r0, &(0x7f0000000400)={&(0x7f0000000000)=@in={0x2, 0x0, @remote}, 0x10, &(0x7f0000000080)=[{&(0x7f0000000040)='H', 0x1}], 0x1, &(0x7f00000003c0)=[@sndinfo={0x20, 0x84, 0x2, {0x0, 0x2}}], 0x20}, 0x0) socket$inet_sctp(0x2, 0x1, 0x84) [ 632.857021][ T313] hfs: invalid uid -1 04:08:21 executing program 3: r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0x4}}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x30, r2, 0x805, 0x0, 0x0, {{0x1, 0x40030000000000}, 0x0, 0x6, 0x48, {0x14}}}, 0x30}}, 0x0) [ 632.890445][ T313] hfs: unable to parse mount options 04:08:21 executing program 0: r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0x4}}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x30, r2, 0x805, 0x0, 0x0, {{0x1, 0x40030000000000}, 0x0, 0x6, 0x6, {0x14}}}, 0x30}}, 0x0) 04:08:21 executing program 1: r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f0000000000)="240352001e0025eaa87865f51ef6bce90a04000200bff20182a9000c080009000d000000", 0x24) [ 633.001973][ T313] hfs: invalid uid -1 [ 633.020874][ T313] hfs: unable to parse mount options 04:08:21 executing program 4: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x2001002, 0x0) mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0) 04:08:21 executing program 5: r0 = socket$inet_sctp(0x2, 0x5, 0x84) sendmsg$inet_sctp(r0, &(0x7f0000000400)={&(0x7f0000000000)=@in={0x2, 0x0, @remote}, 0x10, &(0x7f0000000080)=[{&(0x7f0000000040)='H', 0x1}], 0x1, &(0x7f00000003c0)=ANY=[@ANYBLOB="200000000000000084000000020200"/28, @ANYRES32=0x0], 0x20}, 0x0) 04:08:21 executing program 3: r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0x4}}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x30, r2, 0x805, 0x0, 0x0, {{0x1, 0x40030000000000}, 0x0, 0x6, 0x4c, {0x14}}}, 0x30}}, 0x0) 04:08:21 executing program 2: syz_mount_image$hfs(&(0x7f00000000c0)='hfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000540)={[{@uid={'uid', 0x3d, 0xffffffffffffffff}}]}) 04:08:22 executing program 1: r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f0000000000)="240053001e0025eaa87865f51ef6bce90a04000200bff20182a9000c080009000d000000", 0x24) 04:08:22 executing program 0: r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0x4}}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x30, r2, 0x805, 0x0, 0x0, {{0x1, 0x40030000000000}, 0x0, 0x6, 0x7, {0x14}}}, 0x30}}, 0x0) 04:08:22 executing program 4: r0 = open(0x0, 0x141042, 0x0) write$UHID_INPUT(r0, &(0x7f0000000580)={0x8, "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", 0x1000}, 0x10000005c) rename(0x0, &(0x7f00000002c0)='./bus\x00') prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r1 = getpid() sched_setattr(r1, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r2, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000000)='/dev/fuse\x00', 0x2, 0x0) [ 633.302866][ T353] hfs: invalid uid -1 04:08:22 executing program 5: r0 = syz_open_dev$mice(&(0x7f0000000140)='/dev/input/mice\x00', 0x0, 0x80000) getsockopt$IP_VS_SO_GET_DAEMON(r0, 0x0, 0x487, &(0x7f0000000240), &(0x7f0000000280)=0x30) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000180)={0x5, [0x0, 0x0, 0x0, 0x0, 0x0]}, &(0x7f00000001c0)=0x18) setsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x76, &(0x7f0000000200)={r1, 0x7}, 0x8) r2 = socket$inet_sctp(0x2, 0x5, 0x84) sendmsg$inet_sctp(r2, &(0x7f0000000400)={&(0x7f0000000000)=@in={0x2, 0x0, @remote}, 0x10, &(0x7f0000000080)=[{&(0x7f0000000040)='H', 0x1}], 0x1, &(0x7f00000003c0)=ANY=[@ANYBLOB="2000000000000000840000000200000000000232c000000000000000", @ANYRES32=0x0], 0x20}, 0x0) r3 = getpgrp(0xffffffffffffffff) ptrace$setsig(0x4203, r3, 0x400, &(0x7f00000000c0)={0x3d, 0x4, 0x8000}) [ 633.331689][ T353] hfs: unable to parse mount options 04:08:22 executing program 3: r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0x4}}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x30, r2, 0x805, 0x0, 0x0, {{0x1, 0x40030000000000}, 0x0, 0x6, 0x60, {0x14}}}, 0x30}}, 0x0) 04:08:22 executing program 1: r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f0000000000)="240153001e0025eaa87865f51ef6bce90a04000200bff20182a9000c080009000d000000", 0x24) [ 633.407739][ T353] hfs: invalid uid -1 [ 633.411747][ T353] hfs: unable to parse mount options 04:08:22 executing program 0: r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0x4}}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x30, r2, 0x805, 0x0, 0x0, {{0x1, 0x40030000000000}, 0x0, 0x6, 0xa, {0x14}}}, 0x30}}, 0x0) 04:08:22 executing program 2: syz_mount_image$hfs(&(0x7f00000000c0)='hfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000540)={[{@uid={'uid', 0x3d, 0xffffffffffffffff}}]}) 04:08:22 executing program 3: r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0x4}}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x30, r2, 0x805, 0x0, 0x0, {{0x1, 0x40030000000000}, 0x0, 0x6, 0x68, {0x14}}}, 0x30}}, 0x0) 04:08:22 executing program 1: r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f0000000000)="240253001e0025eaa87865f51ef6bce90a04000200bff20182a9000c080009000d000000", 0x24) 04:08:22 executing program 5: r0 = socket$inet_sctp(0x2, 0x5, 0x84) sendmsg$inet_sctp(r0, &(0x7f0000000400)={&(0x7f0000000000)=@in={0x2, 0x0, @remote}, 0x10, &(0x7f0000000080)=[{&(0x7f0000000040)='H', 0x1}], 0x0, &(0x7f00000003c0)=[@sndinfo={0x20, 0x84, 0x2, {0x0, 0x2}}], 0x20}, 0x2) r1 = syz_open_dev$mouse(&(0x7f00000000c0)='/dev/input/mouse#\x00', 0x1f, 0x8000) ioctl$VIDIOC_ENUMOUTPUT(r1, 0xc0485630, &(0x7f0000000100)={0x3, "40f3c38e24545024b9bed41f7f00804f98c8381326f8be419e256bee3f5ee20a", 0x3, 0x20, 0x5, 0x0, 0x2}) 04:08:22 executing program 0: r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0x4}}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x30, r2, 0x805, 0x0, 0x0, {{0x1, 0x40030000000000}, 0x0, 0x6, 0xe, {0x14}}}, 0x30}}, 0x0) 04:08:22 executing program 3: r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0x4}}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x30, r2, 0x805, 0x0, 0x0, {{0x1, 0x40030000000000}, 0x0, 0x6, 0x6c, {0x14}}}, 0x30}}, 0x0) [ 633.712970][ T389] hfs: invalid uid -1 04:08:22 executing program 1: r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f0000000000)="240353001e0025eaa87865f51ef6bce90a04000200bff20182a9000c080009000d000000", 0x24) [ 633.767173][ T389] hfs: unable to parse mount options [ 633.846757][ T389] hfs: invalid uid -1 [ 633.887623][ T389] hfs: unable to parse mount options 04:08:22 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b97000)={0x1, &(0x7f0000000200)=[{0x6}]}, 0x10) getsockopt$sock_buf(r0, 0x1, 0x1a, &(0x7f00000000c0)=""/1, &(0x7f0000561ffc)=0x1) 04:08:22 executing program 0: r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0x4}}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x30, r2, 0x805, 0x0, 0x0, {{0x1, 0x40030000000000}, 0x0, 0x6, 0xf, {0x14}}}, 0x30}}, 0x0) 04:08:22 executing program 1: r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f0000000000)="240054001e0025eaa87865f51ef6bce90a04000200bff20182a9000c080009000d000000", 0x24) 04:08:22 executing program 3: r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0x4}}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x30, r2, 0x805, 0x0, 0x0, {{0x1, 0x40030000000000}, 0x0, 0x6, 0x74, {0x14}}}, 0x30}}, 0x0) 04:08:22 executing program 2: syz_mount_image$hfs(&(0x7f00000000c0)='hfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000540)={[{@uid={'uid', 0x3d, 0xffffffffffffffff}}]}) 04:08:22 executing program 5: r0 = socket$inet(0x2, 0x1, 0x8) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, &(0x7f00000000c0)={0x0, @in6={{0xa, 0x4e23, 0xffff, @mcast2, 0x10000}}, 0x0, 0x7ff, 0x684, 0x6, 0x8}, &(0x7f0000000180)=0x98) setsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r0, 0x84, 0x18, &(0x7f00000001c0)={r1, 0x3ff}, 0x8) r2 = socket$inet_sctp(0x2, 0x5, 0x84) sendmsg$inet_sctp(r2, &(0x7f0000000400)={&(0x7f0000000000)=@in={0x2, 0x0, @remote}, 0x10, &(0x7f0000000080)=[{&(0x7f0000000040)='H', 0x1}], 0x1, &(0x7f00000003c0)=[@sndinfo={0x20, 0x84, 0x2, {0x0, 0x2}}], 0x20}, 0x0) 04:08:23 executing program 1: r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f0000000000)="240154001e0025eaa87865f51ef6bce90a04000200bff20182a9000c080009000d000000", 0x24) 04:08:23 executing program 0: r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0x4}}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x30, r2, 0x805, 0x0, 0x0, {{0x1, 0x40030000000000}, 0x0, 0x6, 0x48, {0x14}}}, 0x30}}, 0x0) [ 634.286985][ T429] hfs: invalid uid -1 [ 634.303706][ T429] hfs: unable to parse mount options 04:08:23 executing program 3: r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0x4}}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x30, r2, 0x805, 0x0, 0x0, {{0x1, 0x40030000000000}, 0x0, 0x6, 0x7a, {0x14}}}, 0x30}}, 0x0) [ 634.396039][ T429] hfs: invalid uid -1 [ 634.400048][ T429] hfs: unable to parse mount options 04:08:23 executing program 5: r0 = socket$inet_sctp(0x2, 0x5, 0x84) r1 = shmget(0x1, 0x3000, 0x78000000, &(0x7f0000ffb000/0x3000)=nil) shmctl$SHM_UNLOCK(r1, 0xc) getpeername$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0}, &(0x7f0000000100)=0x14) sendmsg$can_raw(r0, &(0x7f0000000240)={&(0x7f0000000140)={0x1d, r2}, 0x10, &(0x7f0000000200)={&(0x7f0000000180)=@canfd={{0x1, 0x2, 0x8001, 0x1}, 0x34, 0x3, 0x0, 0x0, "61009a70d7381015f835e391b0825392f3e90c538850f200e7bfd5b0a3db9233ddddd8d794667d128ecd9adb8f56a959db11406bbc073ec17821d117fa2a0d31"}, 0x48}}, 0x40880) sendmsg$inet_sctp(r0, &(0x7f0000000400)={&(0x7f0000000000)=@in={0x2, 0x0, @remote}, 0x10, &(0x7f0000000080)=[{&(0x7f0000000040)='H', 0x1}], 0x1, &(0x7f00000003c0)=[@sndinfo={0x20, 0x84, 0x2, {0x0, 0x2}}], 0x20}, 0x0) 04:08:23 executing program 1: r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f0000000000)="240254001e0025eaa87865f51ef6bce90a04000200bff20182a9000c080009000d000000", 0x24) 04:08:23 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$inet_MCAST_MSFILTER(r0, 0x0, 0x30, &(0x7f0000000540)={0x0, {{0x2, 0x0, @multicast2}}, 0x0, 0x1, [{{0x2, 0x0, @multicast2}}]}, 0x110) 04:08:23 executing program 0: r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0x4}}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x30, r2, 0x805, 0x0, 0x0, {{0x1, 0x40030000000000}, 0x0, 0x6, 0x4c, {0x14}}}, 0x30}}, 0x0) 04:08:23 executing program 2: syz_mount_image$hfs(&(0x7f00000000c0)='hfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000540)={[{@uid={'uid', 0x3d, 0xffffffffffffffff}}]}) 04:08:23 executing program 3: r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0x4}}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x30, r2, 0x805, 0x0, 0x0, {{0x1, 0x40030000000000}, 0x0, 0x6, 0xf0, {0x14}}}, 0x30}}, 0x0) 04:08:23 executing program 4: unshare(0x2040400) r0 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000080)='/dev/cachefiles\x00', 0x220201, 0x0) getsockopt$sock_buf(r0, 0x1, 0x0, 0x0, 0x0) [ 634.711170][ T470] hfs: invalid uid -1 04:08:23 executing program 0: r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0x4}}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x30, r2, 0x805, 0x0, 0x0, {{0x1, 0x40030000000000}, 0x0, 0x6, 0x60, {0x14}}}, 0x30}}, 0x0) 04:08:23 executing program 1: r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f0000000000)="240354001e0025eaa87865f51ef6bce90a04000200bff20182a9000c080009000d000000", 0x24) 04:08:23 executing program 5: getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000000c0)={{{@in=@broadcast, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6}, 0x0, @in6=@dev}}, &(0x7f00000001c0)=0xe8) r1 = add_key(&(0x7f0000000200)='syzkaller\x00', &(0x7f0000000240)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffff8) keyctl$get_persistent(0x16, r0, r1) r2 = socket$inet_sctp(0x2, 0x5, 0x84) socket$unix(0x1, 0xd35ce495e43b45a1, 0x0) sendmsg$inet_sctp(r2, &(0x7f0000000400)={&(0x7f0000000000)=@in={0x2, 0x0, @remote}, 0x10, &(0x7f0000000080)=[{&(0x7f0000000040)='H', 0x1}], 0x1, &(0x7f00000003c0)=ANY=[@ANYBLOB="000200000000006890ae2881d5000000", @ANYRES32=0x0], 0x20}, 0x0) 04:08:23 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x4, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x80002, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @dev, 0x10000}, 0x1c) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x11, &(0x7f0000000040)={@ipv4={[0x2, 0x0, 0x0, 0x0, 0x2, 0x0, 0x2], [], @multicast2}}, 0x20) setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x6, 0x1, &(0x7f0000000600)=@gcm_128={{0x303}, "b55398b5ce5f2689", "ce5b351040e916accfed08cc3953646b", "c7d960df", "8b5ffd5590f35e8d"}, 0x28) [ 634.767579][ T470] hfs: unable to parse mount options 04:08:23 executing program 3: r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0x4}}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x30, r2, 0x805, 0x0, 0x0, {{0x1, 0x40030000000000}, 0x0, 0x6, 0x22f, {0x14}}}, 0x30}}, 0x0) [ 634.866521][ T470] hfs: invalid uid -1 [ 634.893448][ T470] hfs: unable to parse mount options 04:08:23 executing program 5: r0 = socket$inet_sctp(0x2, 0x5, 0x84) sendmsg$inet_sctp(r0, &(0x7f0000000400)={&(0x7f0000000000)=@in={0x2, 0x0, @remote}, 0x10, &(0x7f0000000080)=[{&(0x7f0000000040)='H', 0x1}], 0x1, &(0x7f00000000c0)=ANY=[@ANYBLOB="20000000000000000000000000000300f5eda36b73e90bf24e9853ec65acfa4198ffc6619e63728e73d0cc6a8c0dae8ae480a2813e063776c1e8", @ANYRES32=0x0], 0x20}, 0x0) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer2\x00', 0x3, 0x0) 04:08:23 executing program 3: r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0x4}}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x30, r2, 0x805, 0x0, 0x0, {{0x1, 0x40030000000000}, 0x0, 0x6, 0x300, {0x14}}}, 0x30}}, 0x0) 04:08:23 executing program 0: r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0x4}}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x30, r2, 0x805, 0x0, 0x0, {{0x1, 0x40030000000000}, 0x0, 0x6, 0x68, {0x14}}}, 0x30}}, 0x0) 04:08:23 executing program 1: r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f0000000000)="240055001e0025eaa87865f51ef6bce90a04000200bff20182a9000c080009000d000000", 0x24) 04:08:23 executing program 2: syz_mount_image$hfs(&(0x7f00000000c0)='hfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000540)={[{@uid={'uid', 0x3d, 0xffffffffffffffff}}]}) 04:08:23 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") readahead(0xffffffffffffffff, 0x0, 0x0) 04:08:24 executing program 0: r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0x4}}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x30, r2, 0x805, 0x0, 0x0, {{0x1, 0x40030000000000}, 0x0, 0x6, 0x6c, {0x14}}}, 0x30}}, 0x0) [ 635.182463][ T512] hfs: invalid uid -1 [ 635.197552][ T512] hfs: unable to parse mount options 04:08:24 executing program 1: r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f0000000000)="240155001e0025eaa87865f51ef6bce90a04000200bff20182a9000c080009000d000000", 0x24) 04:08:24 executing program 3: r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0x4}}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x30, r2, 0x805, 0x0, 0x0, {{0x1, 0x40030000000000}, 0x0, 0x6, 0x500, {0x14}}}, 0x30}}, 0x0) 04:08:24 executing program 4: [ 635.260935][ T512] hfs: invalid uid -1 [ 635.276869][ T512] hfs: unable to parse mount options 04:08:24 executing program 5: r0 = socket$inet_sctp(0x2, 0x5, 0x84) r1 = getpgrp(0x0) r2 = syz_open_procfs(r1, &(0x7f00000000c0)='attr\x00') ioctl$KVM_SET_VCPU_EVENTS(r2, 0x4040aea0, &(0x7f0000000100)={0x5, 0x7, 0x9, 0x0, 0xfffffffffffff0cc, 0x10001, 0x0, 0x5, 0x401, 0x2, 0x2, 0x0, 0x0, 0xed8, 0x6, 0x8, 0x4, 0xffffffff, 0x8}) write$P9_RSETATTR(r2, &(0x7f0000000140)={0x7, 0x1b, 0x2}, 0x7) sendmsg$inet_sctp(r0, &(0x7f0000000400)={&(0x7f0000000000)=@in={0x2, 0x0, @remote}, 0x82, &(0x7f0000000080)=[{&(0x7f0000000040)='H', 0xfffffffffffffcfc}], 0x1, &(0x7f00000003c0)=[@sndinfo={0x20, 0x84, 0x2, {0x0, 0x2}}], 0x20}, 0x0) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vga_arbiter\x00', 0x100, 0x0) 04:08:24 executing program 0: r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0x4}}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x30, r2, 0x805, 0x0, 0x0, {{0x1, 0x40030000000000}, 0x0, 0x6, 0x74, {0x14}}}, 0x30}}, 0x0) 04:08:24 executing program 1: r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f0000000000)="240255001e0025eaa87865f51ef6bce90a04000200bff20182a9000c080009000d000000", 0x24) 04:08:24 executing program 2: syz_mount_image$hfs(&(0x7f00000000c0)='hfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000540)={[{@uid={'uid', 0x3d, 0xffffffffffffffff}}]}) 04:08:24 executing program 4: 04:08:24 executing program 5: r0 = socket$inet_sctp(0x2, 0x5, 0x84) sendmsg$inet_sctp(r0, &(0x7f0000000400)={&(0x7f0000000000)=@in={0x2, 0x0, @remote}, 0x10, &(0x7f0000000080)=[{&(0x7f0000000040)='H', 0x1}], 0x1, &(0x7f00000003c0)=ANY=[@ANYBLOB="200000000000000084000000020000ea00"/28, @ANYRES32=0x0], 0x20}, 0x0) r1 = syz_open_dev$sndpcmc(&(0x7f0000008440)='/dev/snd/pcmC#D#c\x00', 0x6, 0x200c01) connect$rds(r1, &(0x7f0000008480)={0x2, 0x4e21, @empty}, 0x10) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(r1, 0x84, 0x71, &(0x7f00000000c0)={0x0, 0xc02c}, &(0x7f0000000100)=0x8) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r1, 0xc0505350, &(0x7f0000000240)={{0x5, 0x4}, {0x4, 0x5fed}, 0x0, 0x1}) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(r0, 0x84, 0x1a, &(0x7f0000000140)={r2, 0xb8, "d64d91151644dc287b3b78f1a7fe07c87d0a3cd1f07536f4a9714ea03ce373baee90a3689f3c9ad4137b9a028d0cb8589b56145cf194f90851c46c4e97994384cf309a32dc35beb9c888ba65d9d505158cd6a29dffdeb5ec288138f77aded01485a618e0384bd8be233b1cdecf5a008565f45b55670a69618ab6a7b939c462624f63aaba314f609ee37be60b2147588b85f04219cde7628b684833473ff6dcb735820393b61e928c7cd175b8bd189f63435f3e8a9d63ab3f"}, &(0x7f0000000200)=0xc0) 04:08:24 executing program 3: r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0x4}}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x30, r2, 0x805, 0x0, 0x0, {{0x1, 0x40030000000000}, 0x0, 0x6, 0x600, {0x14}}}, 0x30}}, 0x0) 04:08:24 executing program 0: r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0x4}}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x30, r2, 0x805, 0x0, 0x0, {{0x1, 0x40030000000000}, 0x0, 0x6, 0x7a, {0x14}}}, 0x30}}, 0x0) 04:08:24 executing program 4: [ 635.659772][ T548] hfs: invalid uid -1 04:08:24 executing program 4: [ 635.693446][ T548] hfs: unable to parse mount options 04:08:24 executing program 1: r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f0000000000)="240355001e0025eaa87865f51ef6bce90a04000200bff20182a9000c080009000d000000", 0x24) 04:08:24 executing program 5: r0 = socket$inet_sctp(0x2, 0x1, 0x84) sendmsg$inet_sctp(r0, &(0x7f0000000400)={&(0x7f0000000000)=@in={0x2, 0x0, @remote}, 0x10, &(0x7f0000000080)=[{&(0x7f0000000040)='H', 0x1}], 0x1, &(0x7f00000003c0)=[@sndinfo={0x20, 0x84, 0x2, {0x0, 0x2}}], 0x20}, 0x0) 04:08:24 executing program 0: r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0x4}}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x30, r2, 0x805, 0x0, 0x0, {{0x1, 0x40030000000000}, 0x0, 0x6, 0xf0, {0x14}}}, 0x30}}, 0x0) [ 635.738292][ T548] hfs: invalid uid -1 [ 635.757108][ T548] hfs: unable to parse mount options 04:08:24 executing program 3: r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0x4}}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x30, r2, 0x805, 0x0, 0x0, {{0x1, 0x40030000000000}, 0x0, 0x6, 0x700, {0x14}}}, 0x30}}, 0x0) 04:08:24 executing program 4: 04:08:24 executing program 2: syz_mount_image$hfs(&(0x7f00000000c0)='hfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000540)={[{@uid={'uid', 0x3d, 0xffffffffffffffff}}]}) 04:08:24 executing program 1: r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f0000000000)="240056001e0025eaa87865f51ef6bce90a04000200bff20182a9000c080009000d000000", 0x24) 04:08:24 executing program 5: r0 = socket$inet_sctp(0x2, 0x5, 0x84) rename(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0\x00') sendmsg$inet_sctp(r0, &(0x7f0000000400)={&(0x7f0000000000)=@in={0x2, 0x0, @remote}, 0x10, &(0x7f0000000080)=[{&(0x7f0000000040)='H', 0x1}], 0x10000000000002f6, &(0x7f00000003c0)=[@sndinfo={0x20, 0x84, 0x2, {0x0, 0x2}}], 0x20}, 0x0) 04:08:24 executing program 0: r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0x4}}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x30, r2, 0x805, 0x0, 0x0, {{0x1, 0x40030000000000}, 0x0, 0x6, 0x287, {0x14}}}, 0x30}}, 0x0) 04:08:24 executing program 4: 04:08:24 executing program 3: r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0x4}}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x30, r2, 0x805, 0x0, 0x0, {{0x1, 0x40030000000000}, 0x0, 0x6, 0xa00, {0x14}}}, 0x30}}, 0x0) [ 636.067170][ T582] hfs: invalid uid -1 [ 636.071183][ T582] hfs: unable to parse mount options 04:08:24 executing program 1: r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f0000000000)="240156001e0025eaa87865f51ef6bce90a04000200bff20182a9000c080009000d000000", 0x24) 04:08:25 executing program 0: r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0x4}}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x30, r2, 0x805, 0x0, 0x0, {{0x1, 0x40030000000000}, 0x0, 0x6, 0x300, {0x14}}}, 0x30}}, 0x0) 04:08:25 executing program 4: 04:08:25 executing program 5: r0 = socket$inet_sctp(0x2, 0x5, 0x84) sendmsg$inet_sctp(r0, &(0x7f0000000400)={&(0x7f0000000000)=@in={0x2, 0x0, @remote}, 0x10, &(0x7f0000000080)=[{&(0x7f0000000040)='H', 0x1}], 0x1, &(0x7f00000003c0)=[@sndinfo={0x20, 0x84, 0x2, {0x0, 0x2}}], 0x20}, 0x0) [ 636.284494][ T582] hfs: invalid uid -1 [ 636.288504][ T582] hfs: unable to parse mount options 04:08:25 executing program 3: r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0x4}}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x30, r2, 0x805, 0x0, 0x0, {{0x1, 0x40030000000000}, 0x0, 0x6, 0xe00, {0x14}}}, 0x30}}, 0x0) 04:08:25 executing program 2: syz_mount_image$hfs(&(0x7f00000000c0)='hfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000540)={[{@uid={'uid', 0x3d, 0xffffffffffffffff}}]}) 04:08:25 executing program 1: r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f0000000000)="240256001e0025eaa87865f51ef6bce90a04000200bff20182a9000c080009000d000000", 0x24) 04:08:25 executing program 4: 04:08:25 executing program 0: r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0x4}}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x30, r2, 0x805, 0x0, 0x0, {{0x1, 0x40030000000000}, 0x0, 0x6, 0x500, {0x14}}}, 0x30}}, 0x0) 04:08:25 executing program 5: r0 = socket$inet_sctp(0x2, 0x5, 0x84) sendmsg$inet_sctp(r0, &(0x7f0000000100)={&(0x7f0000000000)=@in={0x2, 0x0, @remote}, 0x10, &(0x7f0000000080)=[{&(0x7f0000000040)='H', 0x1}], 0x1, &(0x7f00000000c0)=[@sndinfo={0x20, 0x84, 0x2, {0x0, 0x2}}], 0x20}, 0x0) [ 636.537181][ T620] hfs: invalid uid -1 [ 636.541193][ T620] hfs: unable to parse mount options 04:08:25 executing program 4: 04:08:25 executing program 3: r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0x4}}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x30, r2, 0x805, 0x0, 0x0, {{0x1, 0x40030000000000}, 0x0, 0x6, 0xf00, {0x14}}}, 0x30}}, 0x0) 04:08:25 executing program 1: r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f0000000000)="240356001e0025eaa87865f51ef6bce90a04000200bff20182a9000c080009000d000000", 0x24) 04:08:25 executing program 5: r0 = socket$inet_sctp(0x2, 0x5, 0x84) sendmsg$inet_sctp(r0, &(0x7f0000000400)={&(0x7f0000000000)=@in={0x2, 0x0, @remote}, 0x10, &(0x7f0000000080)=[{&(0x7f0000000040)='H', 0x1}], 0x1, &(0x7f00000003c0)=[@sndinfo={0x20, 0x84, 0x2, {0x0, 0x2}}], 0x20}, 0x0) 04:08:25 executing program 0: r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0x4}}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x30, r2, 0x805, 0x0, 0x0, {{0x1, 0x40030000000000}, 0x0, 0x6, 0x600, {0x14}}}, 0x30}}, 0x0) [ 636.719732][ T620] hfs: invalid uid -1 04:08:25 executing program 4: [ 636.780377][ T620] hfs: unable to parse mount options 04:08:25 executing program 5: r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_ports\x00', 0x2, 0x0) ioctl$BLKDISCARD(r0, 0x1277, &(0x7f0000000100)=0x81) r1 = socket$inet_sctp(0x2, 0x5, 0x84) fchmod(r1, 0x1) sendmsg$inet_sctp(r1, &(0x7f0000000400)={&(0x7f00000000c0)=@in={0x2, 0x0, @remote}, 0x10, &(0x7f0000000080)=[{&(0x7f0000000040)='H', 0x1}], 0x1, &(0x7f00000003c0)=ANY=[@ANYBLOB="20fe0000000000000182423102000000000002000000000000000000", @ANYRES32=0x0], 0x20}, 0x0) 04:08:25 executing program 2: syz_mount_image$hfs(&(0x7f00000000c0)='hfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000540)={[{@uid={'uid', 0x3d, 0xffffffffffffffff}}]}) 04:08:25 executing program 1: r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f0000000000)="240057001e0025eaa87865f51ef6bce90a04000200bff20182a9000c080009000d000000", 0x24) 04:08:25 executing program 3: r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0x4}}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x30, r2, 0x805, 0x0, 0x0, {{0x1, 0x40030000000000}, 0x0, 0x6, 0x2f02, {0x14}}}, 0x30}}, 0x0) 04:08:25 executing program 4: 04:08:25 executing program 0: r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0x4}}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x30, r2, 0x805, 0x0, 0x0, {{0x1, 0x40030000000000}, 0x0, 0x6, 0x700, {0x14}}}, 0x30}}, 0x0) 04:08:25 executing program 5: r0 = socket$inet_sctp(0x2, 0x5, 0x84) openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0, 0x83) getsockopt$inet_mreqn(r0, 0x0, 0xa33528b92bd0b92a, &(0x7f0000000200)={@remote, @multicast1, 0x0}, &(0x7f0000000240)=0xc) bind$can_raw(r0, &(0x7f0000000280)={0x1d, r1}, 0x9ca1cb5ce3e13874) sendmsg$inet_sctp(r0, &(0x7f0000000400)={&(0x7f0000000000)=@in={0x2, 0x0, @remote}, 0x10, &(0x7f0000000080)=[{&(0x7f0000000040)='H', 0x1}], 0x1, &(0x7f00000003c0)=[@sndinfo={0x20, 0x84, 0x2, {0x0, 0x2}}], 0x20}, 0x0) 04:08:25 executing program 4: [ 637.117619][ T664] hfs: invalid uid -1 04:08:25 executing program 0: r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0x4}}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x30, r2, 0x805, 0x0, 0x0, {{0x1, 0x40030000000000}, 0x0, 0x6, 0xa00, {0x14}}}, 0x30}}, 0x0) [ 637.145603][ T664] hfs: unable to parse mount options 04:08:26 executing program 1: r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f0000000000)="240157001e0025eaa87865f51ef6bce90a04000200bff20182a9000c080009000d000000", 0x24) 04:08:26 executing program 4: 04:08:26 executing program 3: r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0x4}}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x30, r2, 0x805, 0x0, 0x0, {{0x1, 0x40030000000000}, 0x0, 0x6, 0x3f00, {0x14}}}, 0x30}}, 0x0) [ 637.194591][ T664] hfs: invalid uid -1 [ 637.198713][ T664] hfs: unable to parse mount options 04:08:26 executing program 5: r0 = socket$inet_sctp(0x2, 0x5, 0x84) r1 = openat$zero(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/zero\x00', 0x101000, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_CLIENT(r1, 0x404c534a, &(0x7f0000000300)={0x7ff, 0x8, 0xfffffffffffffff9}) ioctl$DRM_IOCTL_GET_STATS(r1, 0x80f86406, &(0x7f0000000440)=""/193) sendmsg$inet_sctp(r0, &(0x7f0000000400)={&(0x7f0000000000)=@in={0x2, 0x0, @remote}, 0x10, &(0x7f0000000080)=[{&(0x7f0000000040)='H', 0x1}], 0x1, &(0x7f00000000c0)=ANY=[@ANYBLOB="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", @ANYRES32=0x0], 0x20}, 0x0) r2 = openat$audio(0xffffffffffffff9c, &(0x7f0000000240)='/dev/audio\x00', 0x442000, 0x0) ioctl$VIDIOC_ENCODER_CMD(r2, 0xc028564d, &(0x7f0000000280)={0x2, 0x1, [0x42a18260, 0x4, 0xffffffffffffffa9, 0x8000, 0x3f, 0x6, 0xa8c, 0x183789f5]}) 04:08:26 executing program 2: syz_mount_image$hfs(&(0x7f00000000c0)='hfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000540)={[{@uid={'uid', 0x3d, 0xffffffffffffffff}}]}) 04:08:26 executing program 0: r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0x4}}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x30, r2, 0x805, 0x0, 0x0, {{0x1, 0x40030000000000}, 0x0, 0x6, 0xe00, {0x14}}}, 0x30}}, 0x0) 04:08:26 executing program 1: r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f0000000000)="240257001e0025eaa87865f51ef6bce90a04000200bff20182a9000c080009000d000000", 0x24) 04:08:26 executing program 4: 04:08:26 executing program 1: r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f0000000000)="240357001e0025eaa87865f51ef6bce90a04000200bff20182a9000c080009000d000000", 0x24) [ 637.511093][ T699] hfs: invalid uid -1 04:08:26 executing program 5: r0 = socket$inet_sctp(0x2, 0x5, 0x84) sendmsg$inet_sctp(r0, &(0x7f0000000400)={&(0x7f0000000000)=@in={0x2, 0x0, @remote}, 0x10, &(0x7f0000000080)=[{&(0x7f0000000040)='H', 0x1}], 0x0, &(0x7f00000003c0)=[@sndinfo={0x20, 0x84, 0x2, {0x0, 0x2}}], 0x20}, 0x0) 04:08:26 executing program 3: r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0x4}}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x30, r2, 0x805, 0x0, 0x0, {{0x1, 0x40030000000000}, 0x0, 0x6, 0x4000, {0x14}}}, 0x30}}, 0x0) 04:08:26 executing program 4: 04:08:26 executing program 0: r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0x4}}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x30, r2, 0x805, 0x0, 0x0, {{0x1, 0x40030000000000}, 0x0, 0x6, 0xf00, {0x14}}}, 0x30}}, 0x0) [ 637.557135][ T699] hfs: unable to parse mount options [ 637.612338][ T699] hfs: invalid uid -1 [ 637.663360][ T699] hfs: unable to parse mount options 04:08:26 executing program 4: 04:08:26 executing program 2: syz_mount_image$hfs(&(0x7f00000000c0)='hfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000540)={[{@uid={'uid', 0x3d, 0xffffffffffffffff}}]}) 04:08:26 executing program 1: r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f0000000000)="240058001e0025eaa87865f51ef6bce90a04000200bff20182a9000c080009000d000000", 0x24) 04:08:26 executing program 3: r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0x4}}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x30, r2, 0x805, 0x0, 0x0, {{0x1, 0x40030000000000}, 0x0, 0x6, 0x4800, {0x14}}}, 0x30}}, 0x0) 04:08:26 executing program 5: r0 = socket$inet_sctp(0x2, 0x5, 0x84) sendmsg$inet_sctp(r0, &(0x7f0000000400)={&(0x7f0000000000)=@in={0x2, 0x0, @remote}, 0x10, &(0x7f0000000080)=[{&(0x7f0000000040)='H', 0x1}], 0x1, &(0x7f00000003c0)=[@sndinfo={0x20, 0x84, 0x2, {0x0, 0x2}}], 0x20}, 0x0) set_thread_area(&(0x7f00000000c0)={0xdbcb, 0x20000800, 0x0, 0x6, 0xe6, 0x5, 0x1f, 0x81, 0x7ff, 0x7}) 04:08:26 executing program 0: r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0x4}}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x30, r2, 0x805, 0x0, 0x0, {{0x1, 0x40030000000000}, 0x0, 0x6, 0x3f00, {0x14}}}, 0x30}}, 0x0) 04:08:26 executing program 4: [ 637.988383][ T731] hfs: invalid uid -1 04:08:26 executing program 0: r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0x4}}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x30, r2, 0x805, 0x0, 0x0, {{0x1, 0x40030000000000}, 0x0, 0x6, 0x4000, {0x14}}}, 0x30}}, 0x0) 04:08:26 executing program 4: 04:08:26 executing program 5: r0 = creat(&(0x7f0000000480)='./file0\x00', 0x48) ioctl$DRM_IOCTL_GEM_OPEN(0xffffffffffffffff, 0xc010640b, &(0x7f00000004c0)={0x0, 0x0}) ioctl$DRM_IOCTL_GEM_CLOSE(r0, 0x40086409, &(0x7f0000000500)={r1}) r2 = socket$inet_sctp(0x2, 0x1, 0x84) sendmsg$inet_sctp(r2, &(0x7f0000000400)={&(0x7f0000000000)=@in={0x2, 0x0, @remote}, 0x10, &(0x7f0000000080)=[{&(0x7f0000000040)='H', 0x1}], 0x1, &(0x7f00000003c0)=[@sndinfo={0x20, 0x84, 0x2, {0x0, 0x2}}], 0x20}, 0x0) open_by_handle_at(r2, &(0x7f00000000c0)=ANY=[@ANYBLOB="f700000002000000ac2b049795342c72b584f40d5a224d3c52c00c4bea7d9dc5ef4d6f61191d78c64a809e1165078066c4779c59e573f344a498e9df0a29b4004611792aec395dc2bd5ea36a8d3cbf997b0512d16c74cf3f99414951a9aa94d883853eb1cff5d3036143915a82f94a0c7789162738dd46c64f43ff519356de95909458dea52196be942c42ddac38f6fd5e80ab1aa93df7fd98f3549077e1c835ee6484bedf6cef792fb69e5092781fba5555bb4a984a516d2a34ce524748e3dd17465a5bee473f5fc68a1cd5b1862cdfd56867f746660989227cf760767246035a92ad2f314b8f3fb2bfc742ce5004b8d6648962aa1f94"], 0x2) r3 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000200)='/dev/mixer\x00', 0x1, 0x0) ioctl$DRM_IOCTL_RES_CTX(0xffffffffffffffff, 0xc0106426, &(0x7f0000000280)={0x2, &(0x7f0000000240)=[{0x0}, {}]}) ioctl$DRM_IOCTL_SET_SAREA_CTX(r3, 0x4010641c, &(0x7f0000000440)={r4, &(0x7f00000002c0)=""/218}) pipe2(&(0x7f00000001c0), 0x4000) 04:08:26 executing program 3: r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0x4}}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x30, r2, 0x805, 0x0, 0x0, {{0x1, 0x40030000000000}, 0x0, 0x6, 0x4c00, {0x14}}}, 0x30}}, 0x0) 04:08:26 executing program 1: r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f0000000000)="240158001e0025eaa87865f51ef6bce90a04000200bff20182a9000c080009000d000000", 0x24) [ 638.030067][ T731] hfs: unable to parse mount options 04:08:26 executing program 4: [ 638.164551][ T731] hfs: invalid uid -1 [ 638.168557][ T731] hfs: unable to parse mount options 04:08:27 executing program 2: syz_mount_image$hfs(&(0x7f00000000c0)='hfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000540)={[{@uid={'uid', 0x3d, 0xffffffffffffffff}}]}) 04:08:27 executing program 1: r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f0000000000)="240258001e0025eaa87865f51ef6bce90a04000200bff20182a9000c080009000d000000", 0x24) 04:08:27 executing program 4: 04:08:27 executing program 0: r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0x4}}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x30, r2, 0x805, 0x0, 0x0, {{0x1, 0x40030000000000}, 0x0, 0x6, 0x4800, {0x14}}}, 0x30}}, 0x0) 04:08:27 executing program 3: r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0x4}}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x30, r2, 0x805, 0x0, 0x0, {{0x1, 0x40030000000000}, 0x0, 0x6, 0x6000, {0x14}}}, 0x30}}, 0x0) 04:08:27 executing program 5: r0 = socket$inet_sctp(0x2, 0x5, 0x84) sendmsg$inet_sctp(r0, &(0x7f0000000400)={&(0x7f0000000000)=@in={0x2, 0x0, @remote}, 0x10, &(0x7f0000000080)=[{&(0x7f0000000040)='H', 0x1}], 0x1, &(0x7f00000003c0)=[@sndinfo={0x20, 0x84, 0x2, {0x0, 0x2}}], 0x20}, 0x0) getsockopt$inet_sctp6_SCTP_CONTEXT(0xffffffffffffffff, 0x84, 0x11, &(0x7f00000000c0)={0x0, 0x1000}, &(0x7f0000000100)=0x8) getsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f00000001c0)={r1, 0x64, &(0x7f0000000140)=[@in6={0xa, 0x4e22, 0x4, @loopback, 0x20}, @in={0x2, 0x4e20, @remote}, @in6={0xa, 0x4e23, 0x10001, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x6}, @in6={0xa, 0x4e21, 0x0, @rand_addr="193a1a3e1fb6968f5ff1b756a1cedcc6", 0x7fffffff}]}, &(0x7f0000000200)=0x10) 04:08:27 executing program 4: [ 638.444938][ T770] hfs: invalid uid -1 [ 638.448987][ T770] hfs: unable to parse mount options 04:08:27 executing program 1: r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f0000000000)="240358001e0025eaa87865f51ef6bce90a04000200bff20182a9000c080009000d000000", 0x24) 04:08:27 executing program 3: r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0x4}}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x30, r2, 0x805, 0x0, 0x0, {{0x1, 0x40030000000000}, 0x0, 0x6, 0x6800, {0x14}}}, 0x30}}, 0x0) 04:08:27 executing program 0: r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0x4}}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x30, r2, 0x805, 0x0, 0x0, {{0x1, 0x40030000000000}, 0x0, 0x6, 0x4c00, {0x14}}}, 0x30}}, 0x0) 04:08:27 executing program 5: r0 = syz_open_dev$usbmon(&(0x7f00000000c0)='/dev/usbmon#\x00', 0x1800000000, 0x101000) ioctl$SIOCSIFMTU(r0, 0x8922, &(0x7f0000000100)={'veth1_to_bond\x00', 0x3}) openat$ashmem(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ashmem\x00', 0x2000, 0x0) r1 = socket$inet_sctp(0x2, 0x1, 0x84) sendmsg$inet_sctp(r1, &(0x7f0000000400)={&(0x7f0000000000)=@in={0x2, 0x0, @remote}, 0x10, &(0x7f0000000080)=[{&(0x7f0000000040)='H', 0x1}], 0x1, &(0x7f0000000140)=ANY=[@ANYBLOB="cbf1c66b7b678e1228200bed00e8ff8300003cc200"/33, @ANYRES32=0x0], 0x20}, 0x0) r2 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) setsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r2, 0x84, 0x13, &(0x7f0000000180)=0xffffffffffffffe0, 0x4) [ 638.575623][ T770] hfs: invalid uid -1 [ 638.579633][ T770] hfs: unable to parse mount options 04:08:27 executing program 1: r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f0000000000)="246558001e0025eaa87865f51ef6bce90a04000200bff20182a9000c080009000d000000", 0x24) 04:08:27 executing program 2: syz_mount_image$hfs(&(0x7f00000000c0)='hfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000540)={[{@uid={'uid', 0x3d, 0xffffffffffffffff}}]}) 04:08:27 executing program 4: 04:08:27 executing program 4: 04:08:27 executing program 0: r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0x4}}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x30, r2, 0x805, 0x0, 0x0, {{0x1, 0x40030000000000}, 0x0, 0x6, 0x6000, {0x14}}}, 0x30}}, 0x0) 04:08:27 executing program 3: r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0x4}}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x30, r2, 0x805, 0x0, 0x0, {{0x1, 0x40030000000000}, 0x0, 0x6, 0x6c00, {0x14}}}, 0x30}}, 0x0) 04:08:27 executing program 5: r0 = socket$inet_sctp(0x2, 0x5, 0x84) sendmsg$inet_sctp(r0, &(0x7f0000000400)={&(0x7f00000000c0)=@in={0x2, 0x0, @remote}, 0x10, &(0x7f0000000080)=[{&(0x7f0000000040), 0x1}], 0xffffd17, &(0x7f00000003c0)=ANY=[@ANYBLOB="20000000000000008401010000000000000002000000000000000000", @ANYRES32=0x0], 0xfc62}, 0x0) 04:08:27 executing program 1: r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f0000000000)="240059001e0025eaa87865f51ef6bce90a04000200bff20182a9000c080009000d000000", 0x24) 04:08:27 executing program 4: [ 638.937777][ T808] hfs: invalid uid -1 [ 638.953387][ T808] hfs: unable to parse mount options [ 639.024089][ T808] hfs: invalid uid -1 [ 639.042119][ T808] hfs: unable to parse mount options 04:08:27 executing program 3: r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0x4}}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x30, r2, 0x805, 0x0, 0x0, {{0x1, 0x40030000000000}, 0x0, 0x6, 0x7400, {0x14}}}, 0x30}}, 0x0) 04:08:27 executing program 4: 04:08:27 executing program 0: r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0x4}}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x30, r2, 0x805, 0x0, 0x0, {{0x1, 0x40030000000000}, 0x0, 0x6, 0x6800, {0x14}}}, 0x30}}, 0x0) 04:08:27 executing program 5: 04:08:28 executing program 2: syz_mount_image$hfs(&(0x7f00000000c0)='hfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000540)={[{@uid={'uid', 0x3d, 0xffffffffffffffff}}]}) 04:08:28 executing program 1: r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f0000000000)="240159001e0025eaa87865f51ef6bce90a04000200bff20182a9000c080009000d000000", 0x24) 04:08:28 executing program 4: 04:08:28 executing program 3: r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0x4}}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x30, r2, 0x805, 0x0, 0x0, {{0x1, 0x40030000000000}, 0x0, 0x6, 0x7a00, {0x14}}}, 0x30}}, 0x0) 04:08:28 executing program 0: r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0x4}}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x30, r2, 0x805, 0x0, 0x0, {{0x1, 0x40030000000000}, 0x0, 0x6, 0x6c00, {0x14}}}, 0x30}}, 0x0) 04:08:28 executing program 5: [ 639.380313][ T843] hfs: invalid uid -1 [ 639.388029][ T843] hfs: unable to parse mount options 04:08:28 executing program 1: r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f0000000000)="240259001e0025eaa87865f51ef6bce90a04000200bff20182a9000c080009000d000000", 0x24) [ 639.505873][ T843] hfs: invalid uid -1 [ 639.510121][ T843] hfs: unable to parse mount options 04:08:28 executing program 4: 04:08:28 executing program 3: r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0x4}}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x30, r2, 0x805, 0x0, 0x0, {{0x1, 0x40030000000000}, 0x0, 0x6, 0xf000, {0x14}}}, 0x30}}, 0x0) 04:08:28 executing program 0: r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0x4}}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x30, r2, 0x805, 0x0, 0x0, {{0x1, 0x40030000000000}, 0x0, 0x6, 0x7400, {0x14}}}, 0x30}}, 0x0) 04:08:28 executing program 5: 04:08:28 executing program 2: syz_mount_image$hfs(&(0x7f00000000c0)='hfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000540)={[{@uid={'uid', 0x3d, 0xffffffffffffffff}}]}) 04:08:28 executing program 1: r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f0000000000)="240359001e0025eaa87865f51ef6bce90a04000200bff20182a9000c080009000d000000", 0x24) 04:08:28 executing program 4: 04:08:28 executing program 3: r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0x4}}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x30, r2, 0x805, 0x0, 0x0, {{0x1, 0x40030000000000}, 0x0, 0x6, 0x30000, {0x14}}}, 0x30}}, 0x0) 04:08:28 executing program 0: r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0x4}}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x30, r2, 0x805, 0x0, 0x0, {{0x1, 0x40030000000000}, 0x0, 0x6, 0x7a00, {0x14}}}, 0x30}}, 0x0) 04:08:28 executing program 4: 04:08:28 executing program 5: [ 639.853313][ T876] hfs: invalid uid -1 [ 639.870996][ T876] hfs: unable to parse mount options 04:08:28 executing program 1: r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f0000000000)="24005a001e0025eaa87865f51ef6bce90a04000200bff20182a9000c080009000d000000", 0x24) 04:08:28 executing program 3: r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0x4}}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x30, r2, 0x805, 0x0, 0x0, {{0x1, 0x40030000000000}, 0x0, 0x6, 0x34000, {0x14}}}, 0x30}}, 0x0) [ 640.014103][ T876] hfs: invalid uid -1 04:08:28 executing program 4: [ 640.048007][ T876] hfs: unable to parse mount options 04:08:28 executing program 5: 04:08:28 executing program 1: r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f0000000000)="24015a001e0025eaa87865f51ef6bce90a04000200bff20182a9000c080009000d000000", 0x24) 04:08:28 executing program 2: syz_mount_image$hfs(&(0x7f00000000c0)='hfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000540)={[{@uid={'uid', 0x3d, 0xffffffffffffffff}}]}) 04:08:28 executing program 0: r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0x4}}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x30, r2, 0x805, 0x0, 0x0, {{0x1, 0x40030000000000}, 0x0, 0x6, 0x8702, {0x14}}}, 0x30}}, 0x0) 04:08:28 executing program 4: 04:08:28 executing program 3: r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0x4}}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x30, r2, 0x805, 0x0, 0x0, {{0x1, 0x40030000000000}, 0x0, 0x6, 0x400300, {0x14}}}, 0x30}}, 0x0) 04:08:29 executing program 4: 04:08:29 executing program 1: r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f0000000000)="24025a001e0025eaa87865f51ef6bce90a04000200bff20182a9000c080009000d000000", 0x24) [ 640.366925][ T916] hfs: invalid uid -1 04:08:29 executing program 0: r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0x4}}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x30, r2, 0x805, 0x0, 0x0, {{0x1, 0x40030000000000}, 0x0, 0x6, 0xf000, {0x14}}}, 0x30}}, 0x0) 04:08:29 executing program 5: [ 640.391605][ T916] hfs: unable to parse mount options 04:08:29 executing program 4: 04:08:29 executing program 3: r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0x4}}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x30, r2, 0x805, 0x0, 0x0, {{0x1, 0x40030000000000}, 0x0, 0x6, 0xf0ffff, {0x14}}}, 0x30}}, 0x0) [ 640.494386][ T916] hfs: invalid uid -1 04:08:29 executing program 1: r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f0000000000)="24035a001e0025eaa87865f51ef6bce90a04000200bff20182a9000c080009000d000000", 0x24) 04:08:29 executing program 5: [ 640.543465][ T916] hfs: unable to parse mount options 04:08:29 executing program 2: syz_mount_image$hfs(&(0x7f00000000c0)='hfs\xff', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000540)={[{@uid={'uid', 0x3d, 0xffffffffffffffff}}]}) 04:08:29 executing program 4: 04:08:29 executing program 3: r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0x4}}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x30, r2, 0x805, 0x0, 0x0, {{0x1, 0x40030000000000}, 0x0, 0x6, 0x1000000, {0x14}}}, 0x30}}, 0x0) 04:08:29 executing program 0: r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0x4}}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x30, r2, 0x805, 0x0, 0x0, {{0x1, 0x40030000000000}, 0x0, 0x6, 0x30000, {0x14}}}, 0x30}}, 0x0) 04:08:29 executing program 5: 04:08:29 executing program 1: r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f0000000000)="24005b001e0025eaa87865f51ef6bce90a04000200bff20182a9000c080009000d000000", 0x24) 04:08:29 executing program 4: 04:08:29 executing program 3: r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0x4}}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x30, r2, 0x805, 0x0, 0x0, {{0x1, 0x40030000000000}, 0x0, 0x6, 0x2000000, {0x14}}}, 0x30}}, 0x0) 04:08:29 executing program 0: r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0x4}}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x30, r2, 0x805, 0x0, 0x0, {{0x1, 0x40030000000000}, 0x0, 0x6, 0x34000, {0x14}}}, 0x30}}, 0x0) 04:08:29 executing program 1: r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f0000000000)="24015b001e0025eaa87865f51ef6bce90a04000200bff20182a9000c080009000d000000", 0x24) 04:08:29 executing program 5: 04:08:29 executing program 4: 04:08:29 executing program 2: syz_mount_image$hfs(&(0x7f00000000c0)='hfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000540)={[{@uid={'uid', 0x3d, 0xffffffffffffffff}}]}) 04:08:29 executing program 1: r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f0000000000)="24025b001e0025eaa87865f51ef6bce90a04000200bff20182a9000c080009000d000000", 0x24) 04:08:29 executing program 5: 04:08:29 executing program 4: 04:08:30 executing program 0: r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0x4}}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x30, r2, 0x805, 0x0, 0x0, {{0x1, 0x40030000000000}, 0x0, 0x6, 0x400300, {0x14}}}, 0x30}}, 0x0) 04:08:30 executing program 3: r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0x4}}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x30, r2, 0x805, 0x0, 0x0, {{0x1, 0x40030000000000}, 0x0, 0x6, 0x3000000, {0x14}}}, 0x30}}, 0x0) 04:08:30 executing program 1: r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f0000000000)="24035b001e0025eaa87865f51ef6bce90a04000200bff20182a9000c080009000d000000", 0x24) 04:08:30 executing program 5: 04:08:30 executing program 4: 04:08:30 executing program 0: r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0x4}}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x30, r2, 0x805, 0x0, 0x0, {{0x1, 0x40030000000000}, 0x0, 0x6, 0xf0ffff, {0x14}}}, 0x30}}, 0x0) [ 641.377658][ T990] hfs: invalid uid -1 [ 641.384434][ T990] hfs: unable to parse mount options 04:08:30 executing program 1: r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f0000000000)="24005c001e0025eaa87865f51ef6bce90a04000200bff20182a9000c080009000d000000", 0x24) 04:08:30 executing program 3: r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0x4}}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x30, r2, 0x805, 0x0, 0x0, {{0x1, 0x40030000000000}, 0x0, 0x6, 0x4000000, {0x14}}}, 0x30}}, 0x0) [ 641.455497][ T990] hfs: invalid uid -1 [ 641.475545][ T990] hfs: unable to parse mount options 04:08:30 executing program 2: syz_mount_image$hfs(&(0x7f00000000c0)='hfs\xff', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000540)={[{@uid={'uid', 0x3d, 0xffffffffffffffff}}]}) 04:08:30 executing program 4: 04:08:30 executing program 5: 04:08:30 executing program 0: r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0x4}}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x30, r2, 0x805, 0x0, 0x0, {{0x1, 0x40030000000000}, 0x0, 0x6, 0x1000000, {0x14}}}, 0x30}}, 0x0) 04:08:30 executing program 4: 04:08:30 executing program 1: r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f0000000000)="24015c001e0025eaa87865f51ef6bce90a04000200bff20182a9000c080009000d000000", 0x24) 04:08:30 executing program 3: r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0x4}}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x30, r2, 0x805, 0x0, 0x0, {{0x1, 0x40030000000000}, 0x0, 0x6, 0x5000000, {0x14}}}, 0x30}}, 0x0) 04:08:30 executing program 4: 04:08:30 executing program 0: r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0x4}}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x30, r2, 0x805, 0x0, 0x0, {{0x1, 0x40030000000000}, 0x0, 0x6, 0x2000000, {0x14}}}, 0x30}}, 0x0) 04:08:30 executing program 5: 04:08:30 executing program 1: r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f0000000000)="24025c001e0025eaa87865f51ef6bce90a04000200bff20182a9000c080009000d000000", 0x24) 04:08:30 executing program 3: r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0x4}}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x30, r2, 0x805, 0x0, 0x0, {{0x1, 0x40030000000000}, 0x0, 0x6, 0x6000000, {0x14}}}, 0x30}}, 0x0) 04:08:30 executing program 2: syz_mount_image$hfs(&(0x7f00000000c0)='hfs\xff', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000540)={[{@uid={'uid', 0x3d, 0xffffffffffffffff}}]}) 04:08:30 executing program 5: 04:08:30 executing program 1: r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f0000000000)="24035c001e0025eaa87865f51ef6bce90a04000200bff20182a9000c080009000d000000", 0x24) 04:08:30 executing program 4: 04:08:30 executing program 0: r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0x4}}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x30, r2, 0x805, 0x0, 0x0, {{0x1, 0x40030000000000}, 0x0, 0x6, 0x3000000, {0x14}}}, 0x30}}, 0x0) 04:08:30 executing program 3: r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0x4}}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x30, r2, 0x805, 0x0, 0x0, {{0x1, 0x40030000000000}, 0x0, 0x6, 0x7000000, {0x14}}}, 0x30}}, 0x0) 04:08:31 executing program 5: 04:08:31 executing program 1: r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f0000000000)="24005d001e0025eaa87865f51ef6bce90a04000200bff20182a9000c080009000d000000", 0x24) 04:08:31 executing program 4: 04:08:31 executing program 2: syz_mount_image$hfs(&(0x7f00000000c0)='hfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000540)={[{@uid={'uid', 0x3d, 0xffffffffffffffff}}]}) 04:08:31 executing program 5: 04:08:31 executing program 0: r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0x4}}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x30, r2, 0x805, 0x0, 0x0, {{0x1, 0x40030000000000}, 0x0, 0x6, 0x4000000, {0x14}}}, 0x30}}, 0x0) 04:08:31 executing program 3: r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0x4}}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x30, r2, 0x805, 0x0, 0x0, {{0x1, 0x40030000000000}, 0x0, 0x6, 0xa000000, {0x14}}}, 0x30}}, 0x0) [ 642.474451][ T1086] hfs: invalid uid -1 [ 642.491087][ T1086] hfs: unable to parse mount options 04:08:31 executing program 5: 04:08:31 executing program 1: r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f0000000000)="24015d001e0025eaa87865f51ef6bce90a04000200bff20182a9000c080009000d000000", 0x24) 04:08:31 executing program 4: [ 642.607120][ T1086] hfs: invalid uid -1 [ 642.611259][ T1086] hfs: unable to parse mount options 04:08:31 executing program 5: 04:08:31 executing program 0: r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0x4}}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x30, r2, 0x805, 0x0, 0x0, {{0x1, 0x40030000000000}, 0x0, 0x6, 0x5000000, {0x14}}}, 0x30}}, 0x0) 04:08:31 executing program 2: syz_mount_image$hfs(&(0x7f00000000c0)='hfs\xf9', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000540)={[{@uid={'uid', 0x3d, 0xffffffffffffffff}}]}) 04:08:31 executing program 1: r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f0000000000)="24025d001e0025eaa87865f51ef6bce90a04000200bff20182a9000c080009000d000000", 0x24) 04:08:31 executing program 3: r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0x4}}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x30, r2, 0x805, 0x0, 0x0, {{0x1, 0x40030000000000}, 0x0, 0x6, 0xe000000, {0x14}}}, 0x30}}, 0x0) 04:08:31 executing program 4: 04:08:31 executing program 5: 04:08:31 executing program 1: r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f0000000000)="24035d001e0025eaa87865f51ef6bce90a04000200bff20182a9000c080009000d000000", 0x24) 04:08:31 executing program 0: r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0x4}}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x30, r2, 0x805, 0x0, 0x0, {{0x1, 0x40030000000000}, 0x0, 0x6, 0x6000000, {0x14}}}, 0x30}}, 0x0) 04:08:31 executing program 5: 04:08:31 executing program 3: r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0x4}}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x30, r2, 0x805, 0x0, 0x0, {{0x1, 0x40030000000000}, 0x0, 0x6, 0xf000000, {0x14}}}, 0x30}}, 0x0) 04:08:31 executing program 4: 04:08:31 executing program 2: syz_mount_image$hfs(&(0x7f00000000c0)='hfs\x7f', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000540)={[{@uid={'uid', 0x3d, 0xffffffffffffffff}}]}) 04:08:31 executing program 5: 04:08:31 executing program 1: r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f0000000000)="24005e001e0025eaa87865f51ef6bce90a04000200bff20182a9000c080009000d000000", 0x24) 04:08:31 executing program 4: 04:08:31 executing program 3: r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0x4}}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x30, r2, 0x805, 0x0, 0x0, {{0x1, 0x40030000000000}, 0x0, 0x6, 0x2f020000, {0x14}}}, 0x30}}, 0x0) 04:08:32 executing program 0: r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0x4}}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x30, r2, 0x805, 0x0, 0x0, {{0x1, 0x40030000000000}, 0x0, 0x6, 0x7000000, {0x14}}}, 0x30}}, 0x0) 04:08:32 executing program 4: 04:08:32 executing program 5: 04:08:32 executing program 1: r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f0000000000)="24015e001e0025eaa87865f51ef6bce90a04000200bff20182a9000c080009000d000000", 0x24) 04:08:32 executing program 0: r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0x4}}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x30, r2, 0x805, 0x0, 0x0, {{0x1, 0x40030000000000}, 0x0, 0x6, 0xa000000, {0x14}}}, 0x30}}, 0x0) 04:08:32 executing program 3: r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0x4}}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x30, r2, 0x805, 0x0, 0x0, {{0x1, 0x40030000000000}, 0x0, 0x6, 0x3f000000, {0x14}}}, 0x30}}, 0x0) 04:08:32 executing program 4: 04:08:32 executing program 2: syz_mount_image$hfs(&(0x7f00000000c0)='hfs\x8c', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000540)={[{@uid={'uid', 0x3d, 0xffffffffffffffff}}]}) 04:08:32 executing program 5: 04:08:32 executing program 0: r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0x4}}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x30, r2, 0x805, 0x0, 0x0, {{0x1, 0x40030000000000}, 0x0, 0x6, 0xe000000, {0x14}}}, 0x30}}, 0x0) 04:08:32 executing program 1: r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f0000000000)="24025e001e0025eaa87865f51ef6bce90a04000200bff20182a9000c080009000d000000", 0x24) 04:08:32 executing program 4: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) r0 = openat$urandom(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$FS_IOC_SETFSLABEL(r0, 0x41009432, 0x0) 04:08:32 executing program 3: r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0x4}}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x30, r2, 0x805, 0x0, 0x0, {{0x1, 0x40030000000000}, 0x0, 0x6, 0x40000000, {0x14}}}, 0x30}}, 0x0) 04:08:32 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) r2 = openat$cgroup_procs(r1, &(0x7f00000001c0)='tasks\x00', 0x2, 0x0) write$cgroup_pid(r2, &(0x7f0000000240), 0x12) 04:08:32 executing program 0: r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0x4}}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x30, r2, 0x805, 0x0, 0x0, {{0x1, 0x40030000000000}, 0x0, 0x6, 0xf000000, {0x14}}}, 0x30}}, 0x0) 04:08:32 executing program 1: r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f0000000000)="24035e001e0025eaa87865f51ef6bce90a04000200bff20182a9000c080009000d000000", 0x24) 04:08:32 executing program 3: r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0x4}}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x30, r2, 0x805, 0x0, 0x0, {{0x1, 0x40030000000000}, 0x0, 0x6, 0x48000000, {0x14}}}, 0x30}}, 0x0) 04:08:32 executing program 4: semctl$SETALL(0x0, 0x0, 0x11, &(0x7f0000000080)=[0x200]) semop(0x0, &(0x7f0000000100)=[{}], 0x1) semctl$IPC_RMID(0x0, 0x0, 0x0) 04:08:32 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getresuid(&(0x7f0000000380), 0x0, 0x0) ioctl$UI_SET_KEYBIT(0xffffffffffffffff, 0x40045565, 0x0) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(0xffffffffffffffff, 0xc0505405, 0x0) r0 = socket(0x10, 0x2, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000400)='net/udp6\x00') sendfile(r0, r1, 0x0, 0x80000002) 04:08:32 executing program 2: syz_mount_image$hfs(&(0x7f00000000c0)='hfs\xf6', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000540)={[{@uid={'uid', 0x3d, 0xffffffffffffffff}}]}) 04:08:32 executing program 0: r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0x4}}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x30, r2, 0x805, 0x0, 0x0, {{0x1, 0x40030000000000}, 0x0, 0x6, 0x3f000000, {0x14}}}, 0x30}}, 0x0) 04:08:32 executing program 3: r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0x4}}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x30, r2, 0x805, 0x0, 0x0, {{0x1, 0x40030000000000}, 0x0, 0x6, 0x4c000000, {0x14}}}, 0x30}}, 0x0) 04:08:33 executing program 1: r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f0000000000)="24005f001e0025eaa87865f51ef6bce90a04000200bff20182a9000c080009000d000000", 0x24) 04:08:33 executing program 3: r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0x4}}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x30, r2, 0x805, 0x0, 0x0, {{0x1, 0x40030000000000}, 0x0, 0x6, 0x60000000, {0x14}}}, 0x30}}, 0x0) 04:08:33 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f00000000c0)='IPVS\x00') sendmsg$IPVS_CMD_DEL_DEST(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000001c0)={0x28, r1, 0xf7e8f6cb5dcde06f, 0x0, 0x0, {}, [@IPVS_CMD_ATTR_SERVICE={0x14, 0x1, [@IPVS_SVC_ATTR_AF={0x8}, @IPVS_SVC_ATTR_PORT={0x8}]}]}, 0x28}}, 0x0) 04:08:33 executing program 0: r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0x4}}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x30, r2, 0x805, 0x0, 0x0, {{0x1, 0x40030000000000}, 0x0, 0x6, 0x40000000, {0x14}}}, 0x30}}, 0x0) 04:08:33 executing program 5: r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0x4}}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x30, r2, 0x805, 0x0, 0x0, {{0x1, 0x40030000000000}, 0x68000000, 0x6, 0x0, {0x14}}}, 0x30}}, 0x0) 04:08:33 executing program 1: r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f0000000000)="24015f001e0025eaa87865f51ef6bce90a04000200bff20182a9000c080009000d000000", 0x24) [ 644.469339][ T1248] netlink: 'syz-executor.4': attribute type 1 has an invalid length. [ 644.480646][ T1248] netlink: 'syz-executor.4': attribute type 4 has an invalid length. [ 644.500531][ T1254] netlink: 'syz-executor.4': attribute type 1 has an invalid length. [ 644.525492][ T1254] netlink: 'syz-executor.4': attribute type 4 has an invalid length. 04:08:33 executing program 3: r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0x4}}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x30, r2, 0x805, 0x0, 0x0, {{0x1, 0x40030000000000}, 0x0, 0x6, 0x68000000, {0x14}}}, 0x30}}, 0x0) 04:08:33 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup2(r2, r0) getsockname$netlink(r3, &(0x7f0000000280), &(0x7f00000002c0)=0xc) ioctl$SG_GET_COMMAND_Q(r0, 0x2270, &(0x7f0000000240)) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r0, 0x84, 0x6, &(0x7f0000000140)={0x0, @in={{0x2, 0x4e24, @remote}}}, &(0x7f00000000c0)=0x84) setsockopt$inet_sctp6_SCTP_AUTH_DEACTIVATE_KEY(r0, 0x84, 0x23, &(0x7f0000000200)={r4, 0x33cac5f2}, 0x8) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000080)={0x0}, &(0x7f0000000100)=0xc) setsockopt$inet_sctp_SCTP_RECVRCVINFO(r3, 0x84, 0x20, &(0x7f0000000040), 0x4) sendmsg$netlink(r3, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@cred={{0x1c, 0x1, 0x2, {r5}}}], 0x20}, 0x0) recvmmsg(r1, &(0x7f0000000300), 0x4df, 0x62, 0x0) 04:08:33 executing program 0: r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0x4}}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x30, r2, 0x805, 0x0, 0x0, {{0x1, 0x40030000000000}, 0x0, 0x6, 0x48000000, {0x14}}}, 0x30}}, 0x0) 04:08:33 executing program 2: syz_mount_image$hfs(&(0x7f00000000c0)='hfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000540)={[{@uid={'uid', 0x3d, 0xffffffffffffffff}}]}) 04:08:33 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$f2fs(&(0x7f00000000c0)='f2fs\x00', &(0x7f00000001c0)='./file0\x00', 0x6, 0x3, &(0x7f0000000600)=[{&(0x7f0000000300)="f20b43efdbf8e38abc34ebc2ce540b41e1230edc0b253fa82382b6408ebf09ba590549c3c92e70d42ed25c530cfcecf6fe98205d4c0ac55ffa657b02fc19b083b3efb830cfca87bd415d0dff6c0080190b92a364861aa09946e7b13c86131f6931a1776bc2058062b18e1320127eeb73bf1748b335869e5c3210898a477756fbf1ea0e07b5460a1a23022559aaefd61bbc8b4ddc2bb0cb2681566e2bf82b1cbb870c9c49fa22a9bc", 0xa8, 0x5}, {&(0x7f0000000480)="45f701570b2fa6c0c36dae7919602bec1dc862709701356b055b78f28a70972f3e338b35baa35464a73bc7b0422d2342f22f2392ea5323d5103bb5d0779d5d3051af467359196d5f68073ff76b577a4856bfab43e61f40303defd788dcdd1e0d895e46aae657378cd92ee60d37d90dc3e6", 0x71, 0x800}, {&(0x7f0000000500)="c3dc523be05e816454c2473d0a1a3c9c37994d784c1d909e98134fcdbbb02f11ecaf0f08aceb62f86406fe0dc3a1e20519032f732e6907f24f70ee7b5b5b6863720b029cc9de30c6236c68218f95ee9d2a6d1136335d52e75bb43364a1eeedb5fa88a19807918b6745d0945e8aa4ffa5fd886bb59d85eaf3f5a0342ecdd852cc7dc21bc64ca17b83414576f0901fd723d4f36341db33d077af20a5c5ba77d20ef66798b5d5adf7b203e68297b1419f6231e7a734497ac0351c3175410c2fb25898e9739e80b6", 0xc6, 0x8}], 0x200020, &(0x7f0000000700)=ANY=[@ANYBLOB="6163746976655f6c6f6761782d40a770628b7267733d322c75737271756f74613d65746831776c616e315e7d766d6e657430706f737f000000636c5f616363657373637075736574247b70707030665d1747504c2c736d61636b6673726f6f743d2d6d643573a57e5d7365637572697479252c0000000000"]) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000140)='/dev/full\x00', 0x80, 0x0) openat(r1, &(0x7f0000000180)='./file1\x00', 0x200800, 0x80) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup2(r3, r0) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000080)={0x0}, &(0x7f0000000100)=0xc) sendmsg$netlink(r4, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@cred={{0x1c, 0x1, 0x2, {r5}}}], 0x20}, 0x0) setsockopt$packet_rx_ring(r4, 0x107, 0x5, &(0x7f0000000400)=@req3={0x3, 0x7fff, 0x20, 0xd2, 0x4, 0x7, 0x4}, 0x1c) ioctl$sock_SIOCADDDLCI(r3, 0x8980, &(0x7f0000000040)={'bridge_slave_0\x00', 0x1}) recvmmsg(r2, &(0x7f0000000940)=[{{&(0x7f0000000200)=@l2, 0x80, &(0x7f00000005c0), 0x0, &(0x7f0000000280)=""/84, 0x54}}, {{&(0x7f0000000680)=@l2, 0x80, &(0x7f0000000900), 0x0, &(0x7f0000000ac0)=""/147, 0x93}}], 0x2, 0x62, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(r4, 0x84, 0x70, &(0x7f0000000780)={0x0, @in6={{0xa, 0x4e22, 0x3e8b, @empty, 0x3f}}, [0x3, 0x1, 0x40, 0x100000001, 0x1, 0x20, 0x1, 0x80, 0xa43a, 0x100000000, 0x5, 0x3, 0xa983, 0x2, 0x6]}, &(0x7f0000000880)=0x100) setsockopt$inet_sctp_SCTP_RTOINFO(r4, 0x84, 0x0, &(0x7f00000008c0)={r6, 0x5, 0xfffffffffffffff7, 0x380000000000000}, 0x10) 04:08:33 executing program 1: r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f0000000000)="24025f001e0025eaa87865f51ef6bce90a04000200bff20182a9000c080009000d000000", 0x24) [ 644.822777][ T1275] hfs: invalid uid -1 [ 644.848565][ T1275] hfs: unable to parse mount options 04:08:33 executing program 0: r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0x4}}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x30, r2, 0x805, 0x0, 0x0, {{0x1, 0x40030000000000}, 0x0, 0x6, 0x4c000000, {0x14}}}, 0x30}}, 0x0) 04:08:33 executing program 1: r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f0000000000)="24035f001e0025eaa87865f51ef6bce90a04000200bff20182a9000c080009000d000000", 0x24) 04:08:33 executing program 3: r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0x4}}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x30, r2, 0x805, 0x0, 0x0, {{0x1, 0x40030000000000}, 0x0, 0x6, 0x6c000000, {0x14}}}, 0x30}}, 0x0) 04:08:33 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup2(r2, r0) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000080)={0x0}, &(0x7f0000000100)=0xc) sendmsg$netlink(r3, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@cred={{0x1c, 0x1, 0x2, {r4}}}], 0x20}, 0x0) kcmp$KCMP_EPOLL_TFD(r4, r4, 0x7, r2, &(0x7f0000000300)={r3, r1, 0x100000}) recvmmsg(r0, &(0x7f0000000140)=[{{&(0x7f0000000200)=@l2, 0x80, &(0x7f00000005c0), 0x0, &(0x7f0000000280)=""/84, 0x54}}, {{&(0x7f0000000680)=@l2, 0x80, &(0x7f00000001c0)=[{&(0x7f00000000c0)=""/10, 0xa}, {&(0x7f0000000b80)=""/4096, 0x1000}], 0x2, &(0x7f0000000ac0)=""/147, 0x93}}], 0x2, 0x62, 0x0) [ 644.967024][ T1275] hfs: invalid uid -1 [ 644.982444][ T1275] hfs: unable to parse mount options 04:08:33 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup2(r2, r0) openat$cgroup_procs(r3, &(0x7f0000000040)='cgroup.threads\x00', 0x2, 0x0) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000080)={0x0}, &(0x7f0000000100)=0xc) sendmsg$netlink(r3, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@cred={{0x1c, 0x1, 0x2, {r4}}}], 0x20}, 0x0) recvmmsg(r1, &(0x7f0000000140)=[{{&(0x7f0000000200)=@l2, 0x80, &(0x7f00000005c0), 0x0, &(0x7f0000000280)=""/84, 0x54}}, {{&(0x7f0000000680)=@l2, 0x80, &(0x7f0000000a40), 0x0, &(0x7f0000000ac0)=""/147, 0x93}}], 0x4000000000001ae, 0x62, 0x0) 04:08:33 executing program 2: syz_mount_image$hfs(&(0x7f00000000c0)='hfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000540)={[{@uid={'uid', 0x3d, 0xffffffffffffffff}}]}) 04:08:33 executing program 3: r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0x4}}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x30, r2, 0x805, 0x0, 0x0, {{0x1, 0x40030000000000}, 0x0, 0x6, 0x74000000, {0x14}}}, 0x30}}, 0x0) 04:08:33 executing program 0: r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0x4}}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x30, r2, 0x805, 0x0, 0x0, {{0x1, 0x40030000000000}, 0x0, 0x6, 0x60000000, {0x14}}}, 0x30}}, 0x0) 04:08:34 executing program 4: r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0x4}}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x30, r2, 0x805, 0x0, 0x0, {{0x1, 0x40030000000000, 0x4000000000000000}, 0x0, 0x6, 0x0, {0x14}}}, 0x30}}, 0x0) 04:08:34 executing program 1: r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f0000000000)="240060001e0025eaa87865f51ef6bce90a04000200bff20182a9000c080009000d000000", 0x24) 04:08:34 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup2(r2, r0) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000080)={0x0}, &(0x7f0000000100)=0xc) sendmsg$netlink(r3, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@cred={{0x1c, 0x1, 0x2, {r4}}}], 0x20}, 0x0) recvmmsg(r1, &(0x7f0000000140)=[{{&(0x7f0000000200)=@l2, 0x80, &(0x7f00000005c0), 0x0, &(0x7f0000000280)=""/84, 0x54}}, {{&(0x7f0000000680)=@l2, 0x80, &(0x7f0000000a40), 0x0, &(0x7f0000000ac0)=""/147, 0x93}}], 0x4000000000001ae, 0x62, 0x0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, &(0x7f00000008c0)={0x0, @in6={{0xa, 0x4e20, 0x7f, @local, 0x4}}, 0x7, 0x2, 0x5, 0x4, 0x2}, &(0x7f00000000c0)=0x98) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x1d, &(0x7f00000001c0)={0x8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, &(0x7f0000000380)=0x24) sendmsg$inet_sctp(r3, &(0x7f0000000400)={&(0x7f0000000040)=@in={0x2, 0x4e23, @local}, 0x10, &(0x7f0000000840)=[{&(0x7f0000000300)="764f914814c2c829ce4ebd81a2b2085a5ddeedb22cd3b0b67fb05391a126ee2290a46fa795df9474c7b5c7569ebc4d9396f700dadd30f30ff303729e6014c1653940ab", 0x43}, {&(0x7f0000000480)="40030689dd1df677c909b2155abdc0afe3f71110af7eb912255d429324ff903da8d1e9c5f281d014edc639b61e1586b5a96de5d59a7047a9c11b8e8099076ad6a9b1440d44659ed9de9a1b9dfdbe9437b30120b48c4c06a10f9cc1a1372920b5541255ea941e1663f2de065620ef795add5b698b2739475c7be74688b3b3ba87f127e8c2af79c2c800987578d89cad19ca509347606ff118e007a65839d72b3c0d6c03c207f406ff4f0151d6aaa1d32c8a07067625559e3cc5eab1542adcae1b39", 0xc1}, {&(0x7f0000000580)="556dc46b2e3a5ee8e07c5fb5d2a7913fcfb6ac88de84864275097eb72cdba997f558b0ab325fee4c342fd369c3b1f82a712d4e90b2af8ecdafc7dfe45206f79fa61cb46caf2d75971f8170cbdf2a319ce0acc94e603d9999770301172bea833375dd0912cf152d6023f1816a29d81da70ad23a1388d2c6b018fa4a214d25025bb192961c196035c60f6eca16", 0x8c}, {&(0x7f0000000700)="77ce616b5957b05ce15d6fb5dc566583b730f052ba07a803b687a5591e2f3130bdabea60d2b8ad5d3dc3e84a8b8fa61001359940d878802d6a9567f90d67adb0fcb197b6d06002aa4d66602693ee6f3b46f7fff13289c070a3bb8171e81325acdb77d8bee9f9faf8da197be74ab7a13d8b3208448146ef7661d363d6c7d46dabb065db32fefb90249f200a9d306bbc224686303bfc791a324c7662f864612192", 0xa0}, {&(0x7f00000007c0)="1ab7529a0f1cc6f34cfccd11df904a9e5f59c664f649c74f5f3c1955789bc41e0c10af267d07df344339f5ad78ef1d835ed2a9be1b864ba4d7b1cdab9bd7c51704f83460ba9c08b8d115def0", 0x4c}], 0x5, &(0x7f0000000980)=[@init={0x18, 0x84, 0x0, {0x3, 0x3, 0x1, 0x9}}, @sndinfo={0x20, 0x84, 0x2, {0x1, 0x8, 0x5, 0x7f, r5}}, @init={0x18, 0x84, 0x0, {0x16b, 0x0, 0x8, 0x3}}, @init={0x18, 0x84, 0x0, {0x4f, 0x0, 0x5, 0x7}}, @sndrcv={0x30, 0x84, 0x1, {0x6, 0xc1c00000, 0x8, 0x99, 0x4, 0x5, 0x6143, 0x9, r6}}], 0x98}, 0x10) [ 645.248661][ T1309] hfs: invalid uid -1 [ 645.252866][ T1309] hfs: unable to parse mount options 04:08:34 executing program 0: r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0x4}}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x30, r2, 0x805, 0x0, 0x0, {{0x1, 0x40030000000000}, 0x0, 0x6, 0x68000000, {0x14}}}, 0x30}}, 0x0) 04:08:34 executing program 3: r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0x4}}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x30, r2, 0x805, 0x0, 0x0, {{0x1, 0x40030000000000}, 0x0, 0x6, 0x7a000000, {0x14}}}, 0x30}}, 0x0) 04:08:34 executing program 1: r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f0000000000)="240160001e0025eaa87865f51ef6bce90a04000200bff20182a9000c080009000d000000", 0x24) [ 645.406172][ T1309] hfs: invalid uid -1 [ 645.410295][ T1309] hfs: unable to parse mount options 04:08:34 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup2(r2, r0) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000080)={0x0}, &(0x7f0000000100)=0xc) sendmsg$netlink(r3, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@cred={{0x1c, 0x1, 0x2, {r4}}}], 0x20}, 0x0) rt_sigpending(&(0x7f00000001c0), 0x8) recvmmsg(r1, &(0x7f0000000140)=[{{&(0x7f0000000200)=@l2, 0x80, &(0x7f00000005c0), 0x0, &(0x7f0000000280)=""/84, 0x54}}, {{&(0x7f0000000680)=@l2, 0x80, &(0x7f0000000a40), 0x0, &(0x7f0000000ac0)=""/147, 0x93}}], 0x4000000000001ae, 0x62, 0x0) getsockopt$X25_QBITINCL(r3, 0x106, 0x1, &(0x7f0000000040), &(0x7f00000000c0)=0x4) 04:08:34 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup2(r2, r0) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000080)={0x0}, &(0x7f0000000100)=0xc) getsockopt$inet_sctp_SCTP_ADAPTATION_LAYER(r3, 0x84, 0x7, &(0x7f0000000040), &(0x7f00000000c0)=0x4) getsockopt$inet_sctp_SCTP_ADAPTATION_LAYER(r3, 0x84, 0x7, &(0x7f00000001c0), &(0x7f0000000300)=0x4) sendmsg$netlink(r3, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@cred={{0x1c, 0x1, 0x2, {r4}}}], 0x20}, 0x0) ioctl$GIO_FONTX(r0, 0x4b6b, &(0x7f0000000b80)=""/4096) recvmmsg(r1, &(0x7f0000000140)=[{{&(0x7f0000000200)=@l2, 0x80, &(0x7f00000005c0), 0x0, &(0x7f0000000280)=""/84, 0x54}}, {{&(0x7f0000000680)=@l2, 0x80, &(0x7f0000000a40), 0x0, &(0x7f0000000ac0)=""/147, 0x93}}], 0x4000000000001ae, 0x62, 0x0) 04:08:34 executing program 2: syz_mount_image$hfs(&(0x7f00000000c0)='hfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000540)={[{@uid={'uid', 0x3d, 0xffffffffffffffff}}]}) 04:08:34 executing program 0: r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0x4}}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x30, r2, 0x805, 0x0, 0x0, {{0x1, 0x40030000000000}, 0x0, 0x6, 0x6c000000, {0x14}}}, 0x30}}, 0x0) 04:08:34 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x1000000000002, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r1 = dup2(r0, r0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000080)={0x0}, &(0x7f0000000100)=0xc) nanosleep(&(0x7f0000000040)={0x0, 0x1c9c380}, 0x0) sendmsg$netlink(r1, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@cred={{0x1c, 0x1, 0x2, {r2}}}], 0x20}, 0x0) recvmmsg(r0, &(0x7f0000000140)=[{{&(0x7f0000000200)=@l2, 0x80, &(0x7f00000005c0), 0x0, &(0x7f0000000280)=""/84, 0x54}}, {{&(0x7f0000000680)=@l2, 0x80, &(0x7f0000000a40), 0x0, &(0x7f0000000ac0)=""/147, 0x93}}], 0x4000000000001ae, 0x62, 0x0) 04:08:34 executing program 3: r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0x4}}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x30, r2, 0x805, 0x0, 0x0, {{0x1, 0x40030000000000}, 0x0, 0x6, 0x9effffff, {0x14}}}, 0x30}}, 0x0) 04:08:34 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup2(r2, r0) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000080)={0x0}, &(0x7f0000000100)=0xc) ioctl$SNDRV_CTL_IOCTL_ELEM_UNLOCK(r3, 0x40405515, &(0x7f00000001c0)={0x4, 0x4, 0x7fff, 0x3, 'syz0\x00', 0x8}) kexec_load(0x9, 0x7, &(0x7f00000008c0)=[{&(0x7f0000000300)="c2b90e9b48e5a3aa3a2157e0b1fff6a92f9b3c784a96ffb4fbfefcc9461cad84e947e6f4007cbf1af013216c3e7d210518203667604f515bb0ed1682524c32098efb33657b1ece1cc88891e82227c39a9a5529a761706111a866f49efb9cc00b87ca5b023c59b6cf428096cfefbd5b8080257191c69456b646ce5a87e849e25b93db3e80fdeb0479fbf6ba7831a6236c4f", 0x91, 0x8, 0xfff}, {&(0x7f0000000480)="c87798dd52c8a4346e1ea3e0e48af635869c20aef34280837a53198f01d83123bf6099ae978ce2045549894353bf44ecfeeb6f0642a86231b1cc48041eac4a17e5a27d6e95563dd744224fb01301ee32db1bda9dffb7f055f5cd9f6b6bd832033bff7664529a02e46e411c5323cff87f22f895ea38e7f26f51a36d8570311410a7be4b5b4bd442b5fc949da0a0d3e34af850542d43e057da53cd015517d3", 0x9e, 0x9}, {&(0x7f0000000540)="2a92f34d90f41390abb6d65b7b8270b358fa775d9dd01000562bddd7f6f1c583c1c045ecf9f8f86817ae8a35cc276a405162c37faaff0331d3e4de5e78c5c453342e0cc4ede0e55a5a356453ce39677029e98ea8e27cf882eb9075161b10e5a9d10f73219181d05e681f85d1d83d472cb754ecfa83e6612409c52b1a68ee6bf2ca7aadd3ed73b71ee87ff6eb56a08a950dde855048f7c86373840ff2ffa5132eaaca229854b8e9f89aadd36d556085b19557ec1ef64f265fa3c7ac3c270d19a8347f5372c2727de880119627f3d044f9", 0xd0, 0x8, 0xffffffffffff0001}, {&(0x7f0000000700)="b489e5ebfbbb6ef048200147296611573abd904a022b8cfb7b90edaad9b476ff647ce1d6c8805311f72ccbbacb1ffa4cf93ceb4845c51021b6cd9e46ffbbff25bd910b39ac76544700ab3cce7573d7aaedc37f8a0761997de2404f0baf06f4e6177e61bda140a1b01823673b442eafd475b269b68159f6f76ee08dbfb08321eb02f001110cb66c7c164eac93f2e6772db84c9e6f0b0fe29d089aba6a5bde88a87fc8c38644a956046787969a8bc0701e35394c5263f7b54806935c687ce1f0d09b804f85102c73b447e3b3225f634ec7c56d71fdccc060cc51c74b625108dc73036596204d22a5926fd552e6472f", 0xee, 0x4bc, 0x4}, {&(0x7f0000000040)="f39b7d3c5a874c934b6285fa", 0xc, 0x63c, 0x1}, {&(0x7f00000000c0)="a0106db7b6578401aa34a7ead192383406a8d6", 0x13, 0x40, 0xbb9}, {&(0x7f0000000800)="5b7f66bdb08d3b694d60ba40c4e808b6a00586386f0ca29342013d4ebd1e13925bf711102a6f6c478e64536e515ae9d210832f63895ac2e76d96347a55e806d337daa762ecfdd2a59f445d04114d09871997641b2b05929f5beb796fa9877c7d6c7a896be8d83db07a0ce35b0408da05204844a02706f2e8d12b8706eea959353a6b75f904853572", 0x88, 0x0, 0x7}], 0x160000) ioctl$sock_SIOCETHTOOL(r3, 0x8946, &(0x7f0000000640)={'veth1\x00', &(0x7f00000009c0)=ANY=[@ANYBLOB="37000000ff01000080000000000000001f000000080000000900000000000000090000006fffffffff01000007000000a704000087deffffd6414fbb1a1cd6336330765dc12b792efdf8bcae673494a321772282aa2ad8d8677efa4dd57ac0ba5de4da89be3fc94300010000e0339ff2a6c65c38f70e90e88a23143303d7265f961f1a51"]}) syz_open_dev$rtc(&(0x7f0000000400)='/dev/rtc#\x00', 0xfffffffffffeffff, 0x0) sendmsg$netlink(r3, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@cred={{0x1c, 0x1, 0x2, {r4}}}], 0x20}, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000a80)='/dev/rtc0\x00', 0x2000, 0x0) recvmmsg(r1, &(0x7f0000000140)=[{{&(0x7f0000000200)=@l2, 0x80, &(0x7f00000005c0), 0x0, &(0x7f0000000280)=""/84, 0x54}}, {{&(0x7f0000000680)=@l2, 0x80, &(0x7f0000000a40), 0x0, &(0x7f0000000ac0)=""/147, 0x93}}], 0x4000000000001ae, 0x62, 0x0) 04:08:34 executing program 1: r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f0000000000)="240260001e0025eaa87865f51ef6bce90a04000200bff20182a9000c080009000d000000", 0x24) [ 645.727792][ T1346] hfs: invalid uid -1 [ 645.734020][ T1346] hfs: unable to parse mount options 04:08:34 executing program 0: r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0x4}}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x30, r2, 0x805, 0x0, 0x0, {{0x1, 0x40030000000000}, 0x0, 0x6, 0x74000000, {0x14}}}, 0x30}}, 0x0) 04:08:34 executing program 3: r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0x4}}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x30, r2, 0x805, 0x0, 0x0, {{0x1, 0x40030000000000}, 0x0, 0x6, 0xa1ffffff, {0x14}}}, 0x30}}, 0x0) 04:08:34 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup2(r2, r0) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000080)={0x0}, &(0x7f0000000100)=0xc) sendmsg$netlink(r3, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@cred={{0x1c, 0x1, 0x2, {r4}}}], 0x20}, 0x0) recvmmsg(r1, &(0x7f0000000140)=[{{&(0x7f0000000200)=@l2, 0x80, &(0x7f00000005c0), 0x0, &(0x7f0000000280)=""/84, 0x54}}, {{&(0x7f0000000680)=@l2, 0x80, &(0x7f0000000a40), 0x40000, &(0x7f0000000ac0)=""/147, 0x93}}], 0x4000000000001ae, 0x62, 0x0) [ 645.835749][ T1346] hfs: invalid uid -1 [ 645.839856][ T1346] hfs: unable to parse mount options 04:08:34 executing program 2: syz_mount_image$hfs(&(0x7f00000000c0)='hfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000540)={[{@uid={'uid', 0x3d, 0xffffffffffffffff}}]}) 04:08:34 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup2(r2, r0) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000080)={0x0}, &(0x7f0000000100)=0xc) sendmsg$netlink(r3, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@cred={{0x1c, 0x1, 0x2, {r4}}}], 0x20}, 0x0) recvmmsg(r1, &(0x7f0000000140)=[{{&(0x7f0000000200)=@l2, 0x80, &(0x7f00000005c0), 0x0, &(0x7f0000000280)=""/84, 0x54}, 0x0}, {{&(0x7f0000000680)=@l2, 0x80, &(0x7f0000000a40), 0x0, &(0x7f0000000ac0)=""/147, 0x93}}], 0x4000000000001ae, 0x62, 0x0) 04:08:34 executing program 1: r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f0000000000)="240360001e0025eaa87865f51ef6bce90a04000200bff20182a9000c080009000d000000", 0x24) 04:08:34 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup2(r2, r0) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000080)={0x0}, &(0x7f0000000100)=0xc) sendmsg$netlink(r3, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@cred={{0x1c, 0x1, 0x2, {r4}}}], 0x20}, 0x0) recvmmsg(r1, &(0x7f0000000140)=[{{&(0x7f0000000200)=@l2, 0x80, &(0x7f00000005c0), 0x0, &(0x7f0000000280)=""/84, 0x54}, 0x40000}, {{&(0x7f0000000680)=@l2, 0x80, &(0x7f0000000a40), 0x0, &(0x7f0000000ac0)=""/147, 0x93}}], 0x4000000000001ae, 0x62, 0x0) 04:08:34 executing program 0: r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0x4}}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x30, r2, 0x805, 0x0, 0x0, {{0x1, 0x40030000000000}, 0x0, 0x6, 0x7a000000, {0x14}}}, 0x30}}, 0x0) 04:08:34 executing program 3: r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0x4}}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x30, r2, 0x805, 0x0, 0x0, {{0x1, 0x40030000000000}, 0x0, 0x6, 0xeaffffff, {0x14}}}, 0x30}}, 0x0) [ 646.141635][ T1384] hfs: invalid uid -1 [ 646.161612][ T1384] hfs: unable to parse mount options 04:08:35 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup2(r2, r0) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000080)={0x0}, &(0x7f0000000100)=0xc) sendmsg$netlink(r3, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@cred={{0x1c, 0x1, 0x2, {r4}}}], 0x20}, 0x0) recvmmsg(r1, &(0x7f0000000140)=[{{&(0x7f0000000200)=@l2, 0x80, &(0x7f00000005c0), 0x0, &(0x7f0000000280)=""/84, 0x54}, 0x4}, {{&(0x7f0000000680)=@l2, 0x80, &(0x7f0000000a40), 0x0, &(0x7f0000000ac0)=""/147, 0x93}}], 0x4000000000001ae, 0x62, 0x0) 04:08:35 executing program 1: r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f0000000000)="240061001e0025eaa87865f51ef6bce90a04000200bff20182a9000c080009000d000000", 0x24) [ 646.258283][ T1384] hfs: invalid uid -1 [ 646.269303][ T1384] hfs: unable to parse mount options 04:08:35 executing program 0: r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0x4}}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x30, r2, 0x805, 0x0, 0x0, {{0x1, 0x40030000000000}, 0x0, 0x6, 0x87020000, {0x14}}}, 0x30}}, 0x0) 04:08:35 executing program 3: r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0x4}}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x30, r2, 0x805, 0x0, 0x0, {{0x1, 0x40030000000000}, 0x0, 0x6, 0xf0ffffff, {0x14}}}, 0x30}}, 0x0) 04:08:35 executing program 2: syz_mount_image$hfs(&(0x7f00000000c0)='hfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000540)={[{@uid={'uid', 0x3d, 0xffffffffffffffff}}]}) 04:08:35 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup2(r2, r0) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000080)={0x0}, &(0x7f0000000100)=0xc) sendmsg$netlink(r3, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@cred={{0x1c, 0x1, 0x2, {r4}}}], 0x20}, 0x0) recvmmsg(r1, &(0x7f0000000140)=[{{&(0x7f0000000200)=@l2, 0x80, &(0x7f00000005c0), 0x0, &(0x7f0000000280)=""/84, 0x54, 0x0}}, {{&(0x7f0000000680)=@l2, 0x80, &(0x7f0000000a40), 0x0, &(0x7f0000000ac0)=""/147, 0x93}}], 0x4000000000001ae, 0x62, 0x0) 04:08:35 executing program 3: r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0x4}}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x30, r2, 0x805, 0x0, 0x0, {{0x1, 0x40030000000000}, 0x0, 0x6, 0xfcffffff, {0x14}}}, 0x30}}, 0x0) 04:08:35 executing program 1: r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f0000000000)="240161001e0025eaa87865f51ef6bce90a04000200bff20182a9000c080009000d000000", 0x24) [ 646.579514][ T1415] hfs: invalid uid -1 04:08:35 executing program 0: r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0x4}}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x30, r2, 0x805, 0x0, 0x0, {{0x1, 0x40030000000000}, 0x0, 0x6, 0x9effffff, {0x14}}}, 0x30}}, 0x0) [ 646.607908][ T1415] hfs: unable to parse mount options 04:08:35 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup2(r2, r0) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000080)={0x0}, &(0x7f0000000100)=0xc) sendmsg$netlink(r3, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@cred={{0x1c, 0x1, 0x2, {r4}}}], 0x20}, 0x0) recvmmsg(r1, &(0x7f0000000140)=[{{&(0x7f0000000200)=@l2, 0x80, &(0x7f00000005c0), 0x0, &(0x7f0000000280)=""/84, 0x54, 0x4000000000000}}, {{&(0x7f0000000680)=@l2, 0x80, &(0x7f0000000a40), 0x0, &(0x7f0000000ac0)=""/147, 0x93}}], 0x4000000000001ae, 0x62, 0x0) [ 646.724498][ T1415] hfs: invalid uid -1 [ 646.728740][ T1415] hfs: unable to parse mount options 04:08:35 executing program 3: r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0x4}}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x30, r2, 0x805, 0x0, 0x0, {{0x1, 0x40030000000000}, 0x0, 0x6, 0xfffff000, {0x14}}}, 0x30}}, 0x0) 04:08:35 executing program 1: r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f0000000000)="240261001e0025eaa87865f51ef6bce90a04000200bff20182a9000c080009000d000000", 0x24) 04:08:35 executing program 2: syz_mount_image$hfs(&(0x7f00000000c0)='hfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000540)={[{@uid={'uid', 0x3d, 0xffffffffffffffff}}]}) 04:08:35 executing program 0: r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0x4}}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x30, r2, 0x805, 0x0, 0x0, {{0x1, 0x40030000000000}, 0x0, 0x6, 0xa1ffffff, {0x14}}}, 0x30}}, 0x0) 04:08:35 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup2(r2, r0) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000080)={0x0}, &(0x7f0000000100)=0xc) sendmsg$netlink(r3, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@cred={{0x1c, 0x1, 0x2, {r4}}}], 0x20}, 0x0) recvmmsg(r1, &(0x7f0000000140)=[{{&(0x7f0000000200)=@l2, 0x80, &(0x7f00000005c0), 0x0, &(0x7f0000000280)=""/84, 0x54}}, {{&(0x7f0000000680)=@l2, 0x80, &(0x7f0000000a40), 0x0, &(0x7f0000000ac0)=""/147, 0x93}}], 0x4000000000001ae, 0x62, 0x0) 04:08:35 executing program 1: r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f0000000000)="240361001e0025eaa87865f51ef6bce90a04000200bff20182a9000c080009000d000000", 0x24) 04:08:35 executing program 3: r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0x4}}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x30, r2, 0x805, 0x0, 0x0, {{0x1, 0x40030000000000}, 0x0, 0x6, 0xffffff7f, {0x14}}}, 0x30}}, 0x0) [ 647.129588][ T1448] hfs: invalid uid -1 04:08:36 executing program 0: r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0x4}}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x30, r2, 0x805, 0x0, 0x0, {{0x1, 0x40030000000000}, 0x0, 0x6, 0xeaffffff, {0x14}}}, 0x30}}, 0x0) [ 647.191617][ T1448] hfs: unable to parse mount options 04:08:36 executing program 1: r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f0000000000)="240062001e0025eaa87865f51ef6bce90a04000200bff20182a9000c080009000d000000", 0x24) 04:08:36 executing program 4 (fault-call:4 fault-nth:0): mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x2001002, 0x0) mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x44000, 0x0) [ 647.309176][ T1448] hfs: invalid uid -1 [ 647.323526][ T1448] hfs: unable to parse mount options 04:08:36 executing program 2: syz_mount_image$hfs(&(0x7f00000000c0)='hfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000540)={[{@uid={'uid', 0x3d, 0xffffffffffffffff}}]}) 04:08:36 executing program 0: r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0x4}}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x30, r2, 0x805, 0x0, 0x0, {{0x1, 0x40030000000000}, 0x0, 0x6, 0xf0ffffff, {0x14}}}, 0x30}}, 0x0) 04:08:36 executing program 3: r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0x4}}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x30, r2, 0x805, 0x0, 0x0, {{0x1, 0x40030000000000}, 0x0, 0x6, 0xffffff9e, {0x14}}}, 0x30}}, 0x0) 04:08:36 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup2(r2, r0) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000080)={0x0}, &(0x7f0000000100)=0xc) sendmsg$netlink(r3, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@cred={{0x1c, 0x1, 0x2, {r4}}}], 0x20}, 0x0) recvmmsg(r1, &(0x7f0000000140)=[{{&(0x7f0000000200)=@l2, 0x80, &(0x7f00000005c0), 0x0, &(0x7f0000000280)=""/84, 0x54}}, {{&(0x7f0000000680)=@l2, 0x80, &(0x7f0000000a40), 0x0, &(0x7f0000000ac0)=""/147, 0x93}}], 0x4000000000001ae, 0x62, 0x0) 04:08:36 executing program 1: r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f0000000000)="240162001e0025eaa87865f51ef6bce90a04000200bff20182a9000c080009000d000000", 0x24) [ 647.577540][ T1475] hfs: invalid uid -1 [ 647.581559][ T1475] hfs: unable to parse mount options 04:08:36 executing program 4: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x2001002, 0x0) mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x44000, 0x0) 04:08:36 executing program 0: r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0x4}}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x30, r2, 0x805, 0x0, 0x0, {{0x1, 0x40030000000000}, 0x0, 0x6, 0xfcffffff, {0x14}}}, 0x30}}, 0x0) 04:08:36 executing program 2: syz_mount_image$hfs(&(0x7f00000000c0)='hfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000540)={[{@uid={'uid', 0x3d, 0xffffffffffffffff}}]}) 04:08:36 executing program 1: r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f0000000000)="240262001e0025eaa87865f51ef6bce90a04000200bff20182a9000c080009000d000000", 0x24) 04:08:36 executing program 3: r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0x4}}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x30, r2, 0x805, 0x0, 0x0, {{0x1, 0x40030000000000}, 0x0, 0x6, 0xffffffa1, {0x14}}}, 0x30}}, 0x0) 04:08:36 executing program 5: r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000080)={0x0}}, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000100)={0x0, 0x0}, &(0x7f00000001c0)=0xc) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0xffffffff) getresgid(&(0x7f0000000240), &(0x7f0000000280), &(0x7f00000002c0)=0x0) lchown(&(0x7f00000000c0)='./file0\x00', r1, r2) writev(0xffffffffffffffff, &(0x7f0000000080)=[{&(0x7f0000000040)="39000006000007000011070000001419001300007f00000045da8a08e528b51b005d932baa959c386ac20e187518ef33e7952b", 0x33}], 0x1) write(0xffffffffffffffff, &(0x7f0000000000)="24000000580001000000f4f9002304000a04f511080001000201009f08000280", 0x20) r3 = syz_open_dev$adsp(&(0x7f0000000300)='/dev/adsp#\x00', 0x7fffffff, 0x80) sendmsg$alg(r3, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000500)=[{&(0x7f0000000340)="a1a2a0cb4b16d590639d0fe931792b43a99b3cbd04da0ff8b64a135f77371c06b712586870af1d60c3e9604b17016e050da6b43687ff8ab7c543a1817a43a2d2660fb1627df9f8822fb967f2e4a7b20768a5dc3d8096974b692dee31622a71", 0x5f}, {&(0x7f00000003c0)="0f3041e326bc6b9afabf", 0xa}, {&(0x7f0000000400)="892560dd4e65993d7564ed27ce0460bb6bbb60d31fd1da10198b42243a9724b3", 0x20}, {&(0x7f0000000440)="5e5c9d4404f65b5b8e9940999f787dceb3476315dbf89bc80db826f787d3a2f8d1325a2b733ace0de8f6ec2dc9e0c162ea1462f8d36412ac8de0299ae7e11f324dc23a0aa99faadeddbfeb0ca36e7fc40b25b0037a4e74fd06ec62219fec1743af94dcc134168d2aef1ace57a9d466d5c766db191342a4e656ac06b51e3d398fd0e6214a0979b177374986d4cded58aa8570ff66ecaebe0020715946fa1af528a26f", 0xa2}], 0x4, &(0x7f0000000540)=[@op={0x18}, @assoc={0x18, 0x117, 0x4, 0x7ff}, @assoc={0x18, 0x117, 0x4, 0xb057}, @op={0x18, 0x117, 0x3, 0x1}, @iv={0x100, 0x117, 0x2, 0xeb, "576ca6602d654689ab2e5e5f0e7ff321f1e0e8efe9383e343e332cf852d95ba6f8abb7071aab533d8c351ecf1c79a5e0ce72d12daa5d6b059333efaeb180bdae5c77ac6fc54e161df00ae5f74e7ee58e75be3d431cdffdef082e610273bc2b5787311bd50302be356c6fe1fd42c2a88f3c52dabad124462992fd849a2c59820919cff5da16b5def3a4951478ff54a68a77284c42f0cf55c5de3b5217b7380ab72ece33c979923ea8e59b186cfe073ee84fae82f86f19adb3c6c2bf9b0d147415c5b52932bf9708eb02d577cd149f88f5473419dbcfbbfc3f7a2ab2da157242e7cb29f8978449e6cf9b64f9"}], 0x160, 0x4000}, 0x20000040) r4 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r4, &(0x7f0000000140)=[{0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000100)}], 0x492492492492805, 0x0) [ 648.003092][ T1502] hfs: invalid uid -1 04:08:36 executing program 0: r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0x4}}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x30, r2, 0x805, 0x0, 0x0, {{0x1, 0x40030000000000}, 0x0, 0x6, 0xfffff000, {0x14}}}, 0x30}}, 0x0) [ 648.036707][ T1502] hfs: unable to parse mount options 04:08:36 executing program 3: r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0x4}}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x30, r2, 0x805, 0x0, 0x0, {{0x1, 0x40030000000000}, 0x0, 0x6, 0xffffffea, {0x14}}}, 0x30}}, 0x0) 04:08:36 executing program 1: r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f0000000000)="240362001e0025eaa87865f51ef6bce90a04000200bff20182a9000c080009000d000000", 0x24) 04:08:36 executing program 4: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x2001002, 0x0) mount$bpf(0x2, &(0x7f0000000080)='./file0\x00', 0x0, 0x44000, 0x0) [ 648.184306][ T1502] hfs: invalid uid -1 [ 648.193024][ T1502] hfs: unable to parse mount options 04:08:37 executing program 5: ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$TCSETSW(0xffffffffffffffff, 0x5403, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x875c, 0x0, 0x4c51a1c6}) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000740)={0x3, 0x2, 0xf000, 0x1000, &(0x7f0000015000/0x1000)=nil}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r3 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_buf(r3, 0x0, 0x26, &(0x7f0000000040)="0edad9412571a0b7a2827bf090025572dca789a3b81b30dff5bbf8e89f835293", 0x20) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000380)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x102], 0x1f004}) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, 0x0, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 04:08:37 executing program 0: r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0x4}}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x30, r2, 0x805, 0x0, 0x0, {{0x1, 0x40030000000000}, 0x0, 0x6, 0xffffff7f, {0x14}}}, 0x30}}, 0x0) 04:08:37 executing program 2: syz_mount_image$hfs(&(0x7f00000000c0)='hfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000540)={[{@uid={'uid', 0x3d, 0xffffffffffffffff}}]}) 04:08:37 executing program 3: r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0x4}}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x30, r2, 0x805, 0x0, 0x0, {{0x1, 0x40030000000000}, 0x0, 0x6, 0xfffffff0, {0x14}}}, 0x30}}, 0x0) 04:08:37 executing program 1: r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f0000000000)="240063001e0025eaa87865f51ef6bce90a04000200bff20182a9000c080009000d000000", 0x24) 04:08:37 executing program 4: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x2001002, 0x0) mount$bpf(0x3, &(0x7f0000000080)='./file0\x00', 0x0, 0x44000, 0x0) [ 648.500365][ T1548] hfs: invalid uid -1 04:08:37 executing program 0: r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0x4}}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x30, r2, 0x805, 0x0, 0x0, {{0x1, 0x40030000000000}, 0x0, 0x6, 0xffffff9e, {0x14}}}, 0x30}}, 0x0) [ 648.533253][ T1548] hfs: unable to parse mount options 04:08:37 executing program 3: r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0x4}}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x30, r2, 0x805, 0x0, 0x0, {{0x1, 0x40030000000000}, 0x0, 0x6, 0xfffffffc, {0x14}}}, 0x30}}, 0x0) [ 648.655855][ T1548] hfs: invalid uid -1 04:08:37 executing program 1: r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f0000000000)="240163001e0025eaa87865f51ef6bce90a04000200bff20182a9000c080009000d000000", 0x24) [ 648.678164][ T1548] hfs: unable to parse mount options 04:08:37 executing program 4: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x2001002, 0x0) mount$bpf(0x4, &(0x7f0000000080)='./file0\x00', 0x0, 0x44000, 0x0) 04:08:37 executing program 0: r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0x4}}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x30, r2, 0x805, 0x0, 0x0, {{0x1, 0x40030000000000}, 0x0, 0x6, 0xffffffa1, {0x14}}}, 0x30}}, 0x0) 04:08:37 executing program 2: syz_mount_image$hfs(&(0x7f00000000c0)='hfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000540)={[{@uid={'uid', 0x3d, 0xffffffffffffffff}}]}) [ 649.111324][ T1582] hfs: invalid uid -1 [ 649.136409][ T1582] hfs: unable to parse mount options [ 649.213020][ T1582] hfs: invalid uid -1 [ 649.218614][ T1582] hfs: unable to parse mount options 04:08:39 executing program 5: ioctl$TUNSETTXFILTER(0xffffffffffffffff, 0x400454d1, 0x0) r0 = getpid() r1 = syz_open_procfs(r0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0\x00', 0x0, 0x2001001, 0x0) capget(&(0x7f00000000c0)={0x99b59757f7a8480a, r0}, &(0x7f0000000200)={0x5, 0x0, 0x800, 0x8, 0xbff0, 0x9}) statx(r1, &(0x7f00000002c0)='./file0\x00', 0x1000, 0x400, &(0x7f00000005c0)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ptrace$getregs(0xe, 0x0, 0x323, &(0x7f0000000400)=""/147) syz_open_dev$dri(&(0x7f0000000100)='/dev/dri/card#\x00', 0x0, 0x4200) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000300)='./file0\x00') pivot_root(&(0x7f0000000180)='./file0\x00', &(0x7f0000000240)='./file0\x00') ioctl$VIDIOC_S_CROP(r1, 0x4014563c, &(0x7f0000000040)={0x4, {0x7, 0x1, 0x8, 0x6}}) r2 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) getsockopt$bt_BT_SECURITY(r2, 0x12, 0x3, &(0x7f0000000480), 0x50053f) write$P9_RAUTH(r1, 0x0, 0x0) 04:08:39 executing program 3: r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0x4}}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x30, r2, 0x805, 0x0, 0x0, {{0x1, 0x40030000000000}, 0x0, 0x6, 0x1000000000000, {0x14}}}, 0x30}}, 0x0) 04:08:39 executing program 1: r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f0000000000)="240263001e0025eaa87865f51ef6bce90a04000200bff20182a9000c080009000d000000", 0x24) 04:08:39 executing program 0: r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0x4}}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x30, r2, 0x805, 0x0, 0x0, {{0x1, 0x40030000000000}, 0x0, 0x6, 0xffffffea, {0x14}}}, 0x30}}, 0x0) 04:08:39 executing program 4: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x2001002, 0x0) mount$bpf(0x5, &(0x7f0000000080)='./file0\x00', 0x0, 0x44000, 0x0) 04:08:39 executing program 2: syz_mount_image$hfs(&(0x7f00000000c0)='hfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000540)={[{@uid={'uid', 0x3d, 0xffffffffffffffff}}]}) 04:08:39 executing program 1: r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f0000000000)="240363001e0025eaa87865f51ef6bce90a04000200bff20182a9000c080009000d000000", 0x24) [ 650.635163][ T1632] hfs: invalid uid -1 [ 650.650907][ T1632] hfs: unable to parse mount options 04:08:39 executing program 0: r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0x4}}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x30, r2, 0x805, 0x0, 0x0, {{0x1, 0x40030000000000}, 0x0, 0x6, 0xfffffff0, {0x14}}}, 0x30}}, 0x0) 04:08:39 executing program 3: r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0x4}}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x30, r2, 0x805, 0x0, 0x0, {{0x1, 0x40030000000000}, 0x0, 0x6, 0x3000000000000, {0x14}}}, 0x30}}, 0x0) 04:08:39 executing program 4: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x2001002, 0x0) mount$bpf(0x6, &(0x7f0000000080)='./file0\x00', 0x0, 0x44000, 0x0) [ 650.746606][ T1632] hfs: invalid uid -1 [ 650.750624][ T1632] hfs: unable to parse mount options 04:08:39 executing program 5: syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x10, 0x0) r0 = accept4$vsock_stream(0xffffffffffffffff, &(0x7f0000000080)={0x28, 0x0, 0x2710, @hyper}, 0x10, 0x80000) ioctl$sock_inet_SIOCSIFDSTADDR(r0, 0x8918, &(0x7f00000000c0)={'ip6gretap0\x00', {0x2, 0x4e21, @broadcast}}) 04:08:39 executing program 2: syz_mount_image$hfs(&(0x7f00000000c0)='hfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000540)={[{@uid={'uid', 0x3d, 0xffffffffffffffff}}]}) 04:08:39 executing program 1: r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f0000000000)="240064001e0025eaa87865f51ef6bce90a04000200bff20182a9000c080009000d000000", 0x24) 04:08:39 executing program 0: r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0x4}}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x30, r2, 0x805, 0x0, 0x0, {{0x1, 0x40030000000000}, 0x0, 0x6, 0xfffffffc, {0x14}}}, 0x30}}, 0x0) 04:08:39 executing program 3: r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0x4}}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x30, r2, 0x805, 0x0, 0x0, {{0x1, 0x40030000000000}, 0x0, 0x6, 0x40030000000000, {0x14}}}, 0x30}}, 0x0) 04:08:39 executing program 4: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x2001002, 0x0) mount$bpf(0x7, &(0x7f0000000080)='./file0\x00', 0x0, 0x44000, 0x0) [ 651.007418][ T1656] hfs: invalid uid -1 [ 651.017777][ T1656] hfs: unable to parse mount options 04:08:39 executing program 1: r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f0000000000)="240164001e0025eaa87865f51ef6bce90a04000200bff20182a9000c080009000d000000", 0x24) [ 651.127712][ T1656] hfs: invalid uid -1 [ 651.131729][ T1656] hfs: unable to parse mount options 04:08:40 executing program 0: r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0x4}}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x30, r2, 0x805, 0x0, 0x0, {{0x1, 0x40030000000000}, 0x0, 0x6, 0x1000000000000, {0x14}}}, 0x30}}, 0x0) 04:08:40 executing program 3: r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0x4}}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x30, r2, 0x805, 0x0, 0x0, {{0x1, 0x40030000000000}, 0x0, 0x6, 0xf0ffffffffffff, {0x14}}}, 0x30}}, 0x0) 04:08:40 executing program 2: syz_mount_image$hfs(&(0x7f00000000c0)='hfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000540)={[{@uid={'uid', 0x3d, 0xffffffffffffffff}}]}) 04:08:40 executing program 1: r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f0000000000)="240264001e0025eaa87865f51ef6bce90a04000200bff20182a9000c080009000d000000", 0x24) 04:08:40 executing program 0: r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0x4}}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x30, r2, 0x805, 0x0, 0x0, {{0x1, 0x40030000000000}, 0x0, 0x6, 0x3000000000000, {0x14}}}, 0x30}}, 0x0) [ 651.421365][ T1689] hfs: invalid uid -1 [ 651.444624][ T1689] hfs: unable to parse mount options [ 651.540337][ T1689] hfs: invalid uid -1 [ 651.559208][ T1689] hfs: unable to parse mount options 04:08:40 executing program 5: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) r1 = dup(r0) fcntl$setlease(r0, 0x400, 0x3) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8b1a, &(0x7f0000000080)='wlan1\x00\a\xd3~\xd4\xa2\xb8y\xe1\x04\xbe\x00\x00@\x00\x00\x00\x00\x00\t\x00\xff\x8d\x00\x00\xf6\xe7\xf9\x01\x06\x8c\xe2K\x04\xd9\xfd\xbd\x00\x1d})\xa0\xb1\xd2\xe4\x00\x00\x00\x00\x00\b\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00s\x18\x9f \xfa\x91\x1b\x01U\xbe\x01\x01X\xbdh\xbfjOc\xcd\x15\xc1K\xab\xe9\xe3\xe8\x05\xda\xce\xed\xa5\xb8<\x9d\xd1\x19EI\x952\x12,\xec\x02:a\xad\xef,\xbc (\x02B-mF\xfa\x92\xdc\x13\x06\x1fk6=z\x8eni)\xb5i\x0f\xc7\v\x9d\x81\xb3r\xb1x\\\xdb\xcbzE\xfeO\xe7\xdf\x96\xa2\xf8EX\xe3\xbcf\x02\x98T\x1a\x1f\x16\xb9\b\xa2\xb0\xb1\xc4vCh>\xa3\xd7\xc70\x92C5\x9d\x17\xd1\x96g\x8d\xd1\x06i\xde<\xf3\xd9\x93M/\x1eQ\xba\xe7[\xe3\x00\x00\x00\x00\x00\x00t\xeeKr\xb3\"\xa9\xef\xa2\xd8\x03_\xee=[o\xaa \x91d\xff9\xfa\r\xbe\x16%\xde\xa2o\xa9\\%\xc8\xfa\xd9t\xe5t\x9d\aj\x16\xc4}-\xf6\xd3\x02\x00\x00\x00\x00\x00\x00\x00\x00\x04\x00\x00\x00\xd0\xab.\x13L8V\x1d\xa0\x02#\xb4\xea@\x1b\xd0{\x02iE\xb30\xe8\xdb[\xc8\xe5\xae\x98\xdc\xe4Tr\xb4w\xba\xa9\xfe\x0f\xdcFc\xd0\x9f\x82\x9d\xae\x9cy\xb3QOT\xdc\x86\x82Q\xe0\xab\xc1w\x03;-^(\x02=\xf39\xe9yT\xc4\xf0\xef\xe0\xd8\b#\x9a\xcd\xe0\xf8q\x9a\xcd\xdeAF,\x04\"\x84\xa9O\x97\xf7\xfb\xa2N>\xcb\x9d\xc0\xcc\x13\x12\xcc@\x89\xf8F\x82OO\x99') 04:08:40 executing program 4: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x2001002, 0x0) mount$bpf(0x8, &(0x7f0000000080)='./file0\x00', 0x0, 0x44000, 0x0) 04:08:40 executing program 3: r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0x4}}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x30, r2, 0x805, 0x0, 0x0, {{0x1, 0x40030000000000}, 0x0, 0x6, 0x100000000000000, {0x14}}}, 0x30}}, 0x0) 04:08:40 executing program 1: r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f0000000000)="240364001e0025eaa87865f51ef6bce90a04000200bff20182a9000c080009000d000000", 0x24) 04:08:40 executing program 0: r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0x4}}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x30, r2, 0x805, 0x0, 0x0, {{0x1, 0x40030000000000}, 0x0, 0x6, 0x40030000000000, {0x14}}}, 0x30}}, 0x0) 04:08:40 executing program 2: syz_mount_image$hfs(&(0x7f00000000c0)='hfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000540)={[{@uid={'uid', 0x3d, 0xffffffffffffffff}}]}) [ 651.805701][ T1710] hfs: invalid uid -1 04:08:40 executing program 0: r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0x4}}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x30, r2, 0x805, 0x0, 0x0, {{0x1, 0x40030000000000}, 0x0, 0x6, 0xf0ffffffffffff, {0x14}}}, 0x30}}, 0x0) 04:08:40 executing program 1: r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f0000000000)="240065001e0025eaa87865f51ef6bce90a04000200bff20182a9000c080009000d000000", 0x24) [ 651.837889][ T1710] hfs: unable to parse mount options 04:08:40 executing program 3: r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0x4}}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x30, r2, 0x805, 0x0, 0x0, {{0x1, 0x40030000000000}, 0x0, 0x6, 0x200000000000000, {0x14}}}, 0x30}}, 0x0) 04:08:40 executing program 5: r0 = fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) ioctl$MON_IOCX_GET(r0, 0x40189206, &(0x7f0000000080)={&(0x7f0000000000), &(0x7f0000000040)=""/40, 0x28}) r1 = syz_open_dev$media(&(0x7f0000000200)='/dev/media#\x00', 0x0, 0x0) read$rfkill(r1, 0x0, 0x0) 04:08:40 executing program 4: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x2001002, 0x0) mount$bpf(0xf0, &(0x7f0000000080)='./file0\x00', 0x0, 0x44000, 0x0) [ 651.970416][ T1710] hfs: invalid uid -1 [ 652.010167][ T1710] hfs: unable to parse mount options 04:08:40 executing program 3: r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0x4}}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x30, r2, 0x805, 0x0, 0x0, {{0x1, 0x40030000000000}, 0x0, 0x6, 0x300000000000000, {0x14}}}, 0x30}}, 0x0) 04:08:40 executing program 0: r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0x4}}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x30, r2, 0x805, 0x0, 0x0, {{0x1, 0x40030000000000}, 0x0, 0x6, 0x100000000000000, {0x14}}}, 0x30}}, 0x0) 04:08:40 executing program 1: r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f0000000000)="240165001e0025eaa87865f51ef6bce90a04000200bff20182a9000c080009000d000000", 0x24) 04:08:40 executing program 2: syz_mount_image$hfs(&(0x7f00000000c0)='hfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000540)={[{@uid={'uid', 0x3d, 0xffffffffffffffff}}]}) 04:08:41 executing program 4: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x2001002, 0x0) mount$bpf(0x300, &(0x7f0000000080)='./file0\x00', 0x0, 0x44000, 0x0) 04:08:41 executing program 0: r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0x4}}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x30, r2, 0x805, 0x0, 0x0, {{0x1, 0x40030000000000}, 0x0, 0x6, 0x200000000000000, {0x14}}}, 0x30}}, 0x0) 04:08:41 executing program 1: r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f0000000000)="240265001e0025eaa87865f51ef6bce90a04000200bff20182a9000c080009000d000000", 0x24) [ 652.367751][ T1749] hfs: invalid uid -1 04:08:41 executing program 3: r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0x4}}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x30, r2, 0x805, 0x0, 0x0, {{0x1, 0x40030000000000}, 0x0, 0x6, 0x400000000000000, {0x14}}}, 0x30}}, 0x0) [ 652.415004][ T1749] hfs: unable to parse mount options [ 652.499677][ T1749] hfs: invalid uid -1 [ 652.503966][ T1749] hfs: unable to parse mount options 04:08:41 executing program 4: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x2001002, 0x0) mount$bpf(0x500, &(0x7f0000000080)='./file0\x00', 0x0, 0x44000, 0x0) 04:08:41 executing program 2: syz_mount_image$hfs(&(0x7f00000000c0)='hfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000540)={[{@uid={'uid', 0x3d, 0xffffffffffffffff}}]}) [ 652.789686][ T1776] hfs: invalid uid -1 [ 652.822298][ T1776] hfs: unable to parse mount options [ 652.869895][ T1776] hfs: invalid uid -1 [ 652.889173][ T1776] hfs: unable to parse mount options [ 654.386541][ T90] device bridge_slave_1 left promiscuous mode [ 654.393683][ T90] bridge0: port 2(bridge_slave_1) entered disabled state [ 654.457754][ T90] device bridge_slave_0 left promiscuous mode [ 654.468633][ T90] bridge0: port 1(bridge_slave_0) entered disabled state [ 656.273817][ T90] device hsr_slave_0 left promiscuous mode [ 656.313354][ T90] device hsr_slave_1 left promiscuous mode [ 656.362481][ T90] team0 (unregistering): Port device team_slave_1 removed [ 656.376536][ T90] team0 (unregistering): Port device team_slave_0 removed [ 656.387855][ T90] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 656.437695][ T90] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 656.520750][ T90] bond0 (unregistering): Released all slaves [ 656.631534][ T1830] IPVS: ftp: loaded support on port[0] = 21 [ 656.696912][ T1830] chnl_net:caif_netlink_parms(): no params data found [ 656.732203][ T1830] bridge0: port 1(bridge_slave_0) entered blocking state [ 656.739382][ T1830] bridge0: port 1(bridge_slave_0) entered disabled state [ 656.747395][ T1830] device bridge_slave_0 entered promiscuous mode [ 656.756456][ T1830] bridge0: port 2(bridge_slave_1) entered blocking state [ 656.763582][ T1830] bridge0: port 2(bridge_slave_1) entered disabled state [ 656.771320][ T1830] device bridge_slave_1 entered promiscuous mode [ 656.790068][ T1830] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 656.801139][ T1830] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 656.823643][ T1830] team0: Port device team_slave_0 added [ 656.830827][ T1830] team0: Port device team_slave_1 added [ 656.906285][ T1830] device hsr_slave_0 entered promiscuous mode [ 656.963669][ T1830] device hsr_slave_1 entered promiscuous mode [ 657.003362][ T1830] debugfs: Directory 'hsr0' with parent '/' already present! [ 657.080286][ T1830] bridge0: port 2(bridge_slave_1) entered blocking state [ 657.087427][ T1830] bridge0: port 2(bridge_slave_1) entered forwarding state [ 657.094817][ T1830] bridge0: port 1(bridge_slave_0) entered blocking state [ 657.101886][ T1830] bridge0: port 1(bridge_slave_0) entered forwarding state [ 657.178724][ T1830] 8021q: adding VLAN 0 to HW filter on device bond0 [ 657.199911][T18124] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 657.212277][T18124] bridge0: port 1(bridge_slave_0) entered disabled state [ 657.231055][T18124] bridge0: port 2(bridge_slave_1) entered disabled state [ 657.251863][ T1830] 8021q: adding VLAN 0 to HW filter on device team0 [ 657.271120][T18124] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 657.288599][T18124] bridge0: port 1(bridge_slave_0) entered blocking state [ 657.295738][T18124] bridge0: port 1(bridge_slave_0) entered forwarding state [ 657.333928][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 657.342822][ T5] bridge0: port 2(bridge_slave_1) entered blocking state [ 657.349941][ T5] bridge0: port 2(bridge_slave_1) entered forwarding state [ 657.367259][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 657.392784][ T1830] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 657.412353][ T1830] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 657.432493][T18124] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 657.441871][T18124] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 657.458720][T18124] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 657.471099][T18124] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 657.499566][T18124] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 657.518933][ T1830] 8021q: adding VLAN 0 to HW filter on device batadv0 04:08:46 executing program 5: r0 = syz_open_dev$dri(&(0x7f00000002c0)='/dev/dri/card#\x00', 0x36a7, 0x0) ioctl(r0, 0x7, 0x0) ioctl$FIGETBSZ(r0, 0x2, &(0x7f0000001980)) r1 = dup2(r0, r0) ioctl$SIOCX25GCALLUSERDATA(r1, 0x89e4, &(0x7f00000019c0)={0x65, "9c58d8e3625ad2c2054acf125dae33f57990598b76a9f50584f422477226bef21789a8a7550c803a7ad839dea44bbf8d5b1d2df0a41c6fb716713d02764e961b3c804f2f0afba40ab4522e181341805773c23ae5e8c70a3b8d2b6eca2531100672659d265251677ebcc336655f532f74cf3c1b36ac0b9d3c8b053b4eb20e1bf3"}) r2 = syz_open_dev$mouse(&(0x7f0000000000)='/dev/input/mouse#\x00', 0x100, 0x600182) getsockopt$bt_BT_RCVMTU(r2, 0x112, 0xd, &(0x7f00000018c0)=0x7, &(0x7f0000001a80)=0x2) getsockname$netlink(r2, &(0x7f0000001900), &(0x7f0000001940)=0xc) r3 = creat(&(0x7f0000000040)='./file0\x00', 0x10) sendmsg$inet6(r3, &(0x7f0000001880)={&(0x7f0000000080)={0xa, 0x4e20, 0x4, @local, 0xff}, 0x1c, &(0x7f0000001780)=[{&(0x7f00000000c0)="c81e475efc7444ee27c3f9177bb54286d8ed8cf5a2073a9ef9b07577fc63a0a0df5ba8a6a69fa3c4ecfd6563f4328e235509d3df8b90016a2b8c3f20541005e20c123d75ae5d06b9f6effa608003e7dbb63a9d0a387db2ac6d35c017f2d915a2b4e53e0dcdba4a1e4d63abacfe81bfe63ed02eeee5ac29ef1227ff7c2b48f2f7afd097769a3ca4a1e6450fc0c49616ccd55b6f540bbfe80d1333094703486cc225598930363c3311c02147adbb8c8eef1b67e610804ac8bb4208d561e8303c63f664ab197967b9932e4c1ce2fed9902e2003c4b274c5e82ae0a370b355be4afe04c32f92d03f77", 0xe7}, {&(0x7f00000001c0)="ef8e534d651c3f45a60523a12c87d36a84a0b3e3a4be435240ec2f6b8e97084bb491cc547fe611faddde67e7761a66f4d899a070fc76a0b4bd47f1e2826451d3c6e7bae32eca9976e0f18d753b08be74e075c421af9dc2c23372c5b971513dae64238ad5fc0a152869cb63f17e1494cf311fd221ba895e322a2e0d8ef08e", 0x7e}, {&(0x7f0000000300)="783222b90a5daccddd90204e01899663b598b290294013380c839a35cc269ffc299c845f48690bb50718a7c3b21778c6274f33a7f03c7a4d645b88cfbebeab31c06bc5146217fae80f3c215d9f6a93c42374f61358045ef955ad3a3f209f458e3d856e0ede500e94e22be75e50f16d53049c53017cd927f767aa77f324e4a9c12aaa5aa55f6b55fc7cbdb39d97e9430e2396124df7ff4d07bb616f01371a72aa25a0c4fe4e9938857e13c515408891c784082c7fa8950e90af22fcb3a28bc4a30c6b76287db5632f36e0cbe1e99ca71c5b1e08f0abf70c5c", 0xd8}, {&(0x7f0000000240)="31398d57e9dbcad4e2096f9544eb3a9a0221f9ba07a3ddbbbcc5295d876640a8e0a6d88de6acd415a79377ea27cd36472de93ec96fd4dcd3c398660652747d34e43afeeefa57e827d6e63314f3c39c8404605866bf503aa1676c5aa78063651e60b9a112d9472a360f5e2ada8586e20d353cf37fc3239a8067c8", 0x7a}, {&(0x7f0000000400)="b5ca8740ab0315", 0x7}, {&(0x7f0000000440)="34dc5229334cdf02d62a51489ec1ba857766beaee7852f1ecf894596002d179bb21fd7d7497b022693840757edf1c573171dcab9f48632b9f1c55eb831f0cab02501695ee65e8806292b4440efd49355dc27f4b34452ffe6cc58438da473c55d995aa0ab5ac105740b279446fb77f9cbb5752d40e5f6007558e032678b366fa983252ff09d11807a640205a412f79cbe6e92255bb0817356c8320b6cad4bd4f75da2cdbf", 0xa4}, {&(0x7f0000000500)="4eb7c2469ab126861dd08c4847343119afb8ac7ebd04b12ab80a9d5c0e46f7e0e9b93ca2afdf64be7998c598a86786b87c0ed6420fbd894a2536ac7d94c472e355e433f489d331ac68e5c06d9055099214d39b8934cbf8f546538bc574153398d51889ca4266cbd975355d1d66613fcf7937a250f144c85d3fe5bfd0c964ef9ed7e282a0bd5c277d4a42a25c5124aed78bf55143b389ae5d8a887934c5a104c25417902ff17d5465c0c37d06c7583b0cc3454aca8acf2d590264bb780348277ee7441c49b0e0a910195f1534c7a3c16b7d682f0c3d072622547115e1823d62b4b413efca7576afcc82f67a247df8", 0xee}, {&(0x7f0000000600)="7c9c1c784f379860bcbd2b5ee12e94396b09ba9c33325300770637dc50b55eeb01594d0b3ebd92fd454e41ac776b12e590a24925d960cf33a8b694686a1f2f5a1bf3caf998ba2e925ba1342ded52c1527f2fcffc17616705e2fcd5da1c2ab28b358a0c81707f06c110783858b8223fda42bcda52a4a0d4c809ebf1cbc789b1ccb95388b83cbdb3004b1c91325924dc547e98fbb6b19502ffa652197749c754bd379c23b397a452b459a0cd37d6aa90e4c13245c276ad48ddf250c18acc56cf4a95c293443140f99a9d15a73914383ee2ed9793694c89b2d168226a5f8978454e708ab34adef744c23936ec7e42a6e8", 0xef}, {&(0x7f0000000700)="87fa2ecd9939713bced6096f1ba57971a8fc66405ff18360d90bdc815f9c1bc0dc0c4ce28d7488b17170b1e0156191ae965e10f98fed5b17b2929d562a6912959f488338894772738f27a278e16ac6c30ad45b49095258d8a6317aeb99945c2097dcf135799d2581fce4af60a889848a", 0x70}, {&(0x7f0000000780)="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", 0x1000}], 0xa, &(0x7f0000001840)=ANY=[@ANYBLOB="1f00000033007d52001000"/24], 0x18}, 0x80) 04:08:46 executing program 1: r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f0000000000)="240365001e0025eaa87865f51ef6bce90a04000200bff20182a9000c080009000d000000", 0x24) 04:08:46 executing program 3: r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0x4}}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x30, r2, 0x805, 0x0, 0x0, {{0x1, 0x40030000000000}, 0x0, 0x6, 0x500000000000000, {0x14}}}, 0x30}}, 0x0) 04:08:46 executing program 0: r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0x4}}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x30, r2, 0x805, 0x0, 0x0, {{0x1, 0x40030000000000}, 0x0, 0x6, 0x300000000000000, {0x14}}}, 0x30}}, 0x0) 04:08:46 executing program 4: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x2001002, 0x0) mount$bpf(0x600, &(0x7f0000000080)='./file0\x00', 0x0, 0x44000, 0x0) 04:08:46 executing program 2: syz_mount_image$hfs(&(0x7f00000000c0)='hfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000540)={[{@uid={'uid', 0x3d, 0xffffffffffffffff}}]}) [ 657.784207][ T1849] hfs: invalid uid -1 04:08:46 executing program 1: r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f0000000000)="245865001e0025eaa87865f51ef6bce90a04000200bff20182a9000c080009000d000000", 0x24) 04:08:46 executing program 3: r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0x4}}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x30, r2, 0x805, 0x0, 0x0, {{0x1, 0x40030000000000}, 0x0, 0x6, 0x600000000000000, {0x14}}}, 0x30}}, 0x0) 04:08:46 executing program 0: r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0x4}}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x30, r2, 0x805, 0x0, 0x0, {{0x1, 0x40030000000000}, 0x0, 0x6, 0x400000000000000, {0x14}}}, 0x30}}, 0x0) 04:08:46 executing program 4: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x2001002, 0x0) mount$bpf(0x700, &(0x7f0000000080)='./file0\x00', 0x0, 0x44000, 0x0) [ 657.818653][ T1849] hfs: unable to parse mount options 04:08:46 executing program 1: r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f0000000000)="240066001e0025eaa87865f51ef6bce90a04000200bff20182a9000c080009000d000000", 0x24) [ 657.941109][ T1849] hfs: invalid uid -1 [ 657.953318][ T1849] hfs: unable to parse mount options 04:08:46 executing program 5: r0 = syz_open_dev$video(&(0x7f0000000000)='/dev/video#\x00', 0x8001, 0x0) ioctl$VIDIOC_G_SELECTION(r0, 0xc040565e, &(0x7f00000000c0)={0x0, 0x3}) pipe2(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}, 0x84800) getsockopt$inet6_int(r1, 0x29, 0x33, &(0x7f0000000080), &(0x7f0000000100)=0x4) ioctl$TUNSETVNETLE(r1, 0x400454dc, &(0x7f0000000140)) sendmsg$nfc_llcp(r1, &(0x7f0000000500)={&(0x7f00000001c0)={0x27, 0x1, 0x1, 0x5, 0xea20, 0x9fd, "e0a3af20dd806fa3e9b171db474fc666289769a2fd9675513ef5e379fe6daaf41a8850963779d571f89f9033ec59a10e563bbe37ebc1c74c6cce230b2a966a", 0x3d}, 0x60, &(0x7f0000000440)=[{&(0x7f0000000240)="89c56565", 0x4}, {&(0x7f0000000280)="2af97cf76323c24dff5ceb6b7c3d34aaa2964c3380d46dc1a859266e09d877d5ab5db0daffdfd0aaf566f28cfeac3af686208a2d93a9bc3ff52d91106ecf6485a125c4913f8ea20b24f4d9b612d643d6b3a58b7a5df7d09659f14498b503294dbec0e022e0be7871c0dfda0f1099a6ed297991caeb1df30c908e922981d3ae8f1227ded94528770646add8f83adb4487ff19e0", 0x93}, {&(0x7f0000000340)="7fe07189a56f10d2fa3b95414f40e50bd7c37f7f9d6d255d16db7abacda636c0de47b68566c066b119715365ea06c5477adf77dddfa56d80d66c9bfc06c84fe7dccffbb919df5ec1d969e9c46ccde38473ad84a4cc829f68bc01a0c82cfbee2632b526d04151bef88d1cb368657cc8147309733b1a746307fc9deab8c87ef2acda44223ddc41c78f43e83710f4ba6859c842c9d649551328255607e7e06e4a1e2c754eed848f43bb913b2fb85eb086647f5b0f3d18c6d1066f952728c493c40b45cac8f140e528793e11e9656d1c9ec70be1f1650ed45d0759ae20560944e95069", 0xe1}], 0x3, &(0x7f0000000480)=ANY=[@ANYBLOB="0000000000eeffff0e01000002000200486c61848d4785631d290c9b16a9af71851ad7d5d0a5f3dfec56402ae5056607fa9baca1178db87207d2018166940e7e8aa7cc8ad469882402d4ddecea3695624390c80000000000"], 0x58}, 0x40000) ioctl$PPPOEIOCSFWD(r2, 0x4008b100, &(0x7f0000000180)={0x18, 0x0, {0x4, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xe}, 'tunl0\x00'}}) ioctl$SNDRV_CTL_IOCTL_TLV_COMMAND(r2, 0xc008551c, &(0x7f0000000540)={0x3, 0x8, [0xacc, 0x1d35]}) 04:08:46 executing program 0: r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0x4}}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x30, r2, 0x805, 0x0, 0x0, {{0x1, 0x40030000000000}, 0x0, 0x6, 0x500000000000000, {0x14}}}, 0x30}}, 0x0) 04:08:46 executing program 3: r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0x4}}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x30, r2, 0x805, 0x0, 0x0, {{0x1, 0x40030000000000}, 0x0, 0x6, 0x700000000000000, {0x14}}}, 0x30}}, 0x0) 04:08:46 executing program 4: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x2001002, 0x0) mount$bpf(0x1020, &(0x7f0000000080)='./file0\x00', 0x0, 0x44000, 0x0) 04:08:46 executing program 2: syz_mount_image$hfs(&(0x7f00000000c0)='hfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000540)={[{@uid={'uid', 0x3d, 0xffffffffffffffff}}]}) 04:08:46 executing program 1: r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f0000000000)="240166001e0025eaa87865f51ef6bce90a04000200bff20182a9000c080009000d000000", 0x24) 04:08:47 executing program 3: r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0x4}}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x30, r2, 0x805, 0x0, 0x0, {{0x1, 0x40030000000000}, 0x0, 0x6, 0xa00000000000000, {0x14}}}, 0x30}}, 0x0) 04:08:47 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f00000001c0)='ip_vti0\x00', 0x10) connect$inet(r0, &(0x7f00000000c0)={0x2, 0x0, @loopback}, 0x10) r1 = add_key(&(0x7f0000000100)='cifs.spnego\x00', &(0x7f0000000440)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffb) r2 = add_key$keyring(&(0x7f0000000480)='keyring\x00', &(0x7f00000004c0)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffff9) keyctl$unlink(0x9, r1, r2) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000140)=0x29b, 0xffca) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f0000000080)={0x0, 0xdf2, 0xf087}, 0x14) setsockopt$inet_tcp_int(r0, 0x6, 0x4000000000013, &(0x7f0000000180), 0x4) writev(r0, &(0x7f0000000640)=[{&(0x7f0000000200)="a4106c47a3f9a168d68534b43a60f117be9b1dab0fc0b0367a913143ae2316be952c2c9603f800d60ccaa7e22c2a95ded47fcc880aeadd0174dede97e1ed1c184adb76c1bf2640d687dbea994b329db62e2d72fe88d134cdb98fa3a3ab8f9cd1b0fe406c0bbbf592fb1d9867731e67cd8e6f6043a0a72618cf3e88bba7b27e82421f18b8637fb8bb5ad8237d30376747493cbe2874d71721607249b6a337c8a1559f8ca5", 0xa4}, {&(0x7f0000000000)="364979559c6d29097a382f59f5e24f6e4a9622ac88f35aebe88800e28b810a99854dee94039869101e3b542a3648a128cbb15b21f45db18bd4792e0934c3efa6fdef86", 0x43}, {&(0x7f00000002c0)="103a5687416fb844d6ca7bf6bb5305b838a93367409d6b8117c3369bcdc52471fc8edcdf1962107948e5946ac9ca0f1111eb6254d9bce977ffcacc26654131785fd471b0ea195f2cb97dc1b38d35377664d34ee9e689dfe22a85c270da58196e008cf6af827056896216ddc3d0c3da977d7b8fb7e921bacb3c8c3c49e54e7015aa325b168052a82b0e2c826f32e2ae21f5ce5675376d96662e898b7af7daae1f500a83cce7bcf9ab07919b34e159a43178ad95db683012215fbf69e6d904802117fbd20a82cfc0ce9b1a7b6daf138fe5697513a18b33ad63e145fce9bf4692b7d76277578dadb5534456", 0xea}, {&(0x7f00000003c0)="f1eaf64cf3a502c60d21da00cb1420f396813abc98b608341de8be46a0ab7ccec0b2b13ae8adb2c885bd08397da202de90d12ca28be49cacea78a6c589ec3123b4dc6531cb7533fc", 0x48}], 0x4) 04:08:47 executing program 0: r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0x4}}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x30, r2, 0x805, 0x0, 0x0, {{0x1, 0x40030000000000}, 0x0, 0x6, 0x600000000000000, {0x14}}}, 0x30}}, 0x0) [ 658.334742][ T1892] hfs: invalid uid -1 [ 658.339110][ T1892] hfs: unable to parse mount options 04:08:47 executing program 4: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x2001002, 0x0) mount$bpf(0x2000, &(0x7f0000000080)='./file0\x00', 0x0, 0x44000, 0x0) 04:08:47 executing program 1: r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f0000000000)="240266001e0025eaa87865f51ef6bce90a04000200bff20182a9000c080009000d000000", 0x24) [ 658.460711][ T1892] hfs: invalid uid -1 04:08:47 executing program 0: r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0x4}}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x30, r2, 0x805, 0x0, 0x0, {{0x1, 0x40030000000000}, 0x0, 0x6, 0x700000000000000, {0x14}}}, 0x30}}, 0x0) [ 658.510509][ T1892] hfs: unable to parse mount options 04:08:47 executing program 3: r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0x4}}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x30, r2, 0x805, 0x0, 0x0, {{0x1, 0x40030000000000}, 0x0, 0x6, 0xe00000000000000, {0x14}}}, 0x30}}, 0x0) 04:08:47 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = inotify_init1(0x0) r1 = inotify_init() inotify_add_watch(r1, &(0x7f00000000c0)='./file0\x00', 0xe0) inotify_add_watch(r0, &(0x7f0000ac5000)='./file0\x00', 0xa400295c) rmdir(&(0x7f0000000380)='./file0\x00') mq_getsetattr(0xffffffffffffffff, 0x0, 0x0) r2 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x20140, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f0000000100)={{{@in, @in=@empty}}, {{@in=@local}}}, &(0x7f0000000080)=0xe8) ioctl$EXT4_IOC_GROUP_EXTEND(r2, 0x40086607, &(0x7f0000000200)=0x7) 04:08:47 executing program 2: syz_mount_image$hfs(&(0x7f00000000c0)='hfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000540)={[{@uid={'uid', 0x3d, 0xffffffffffffffff}}]}) 04:08:47 executing program 1: r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f0000000000)="240366001e0025eaa87865f51ef6bce90a04000200bff20182a9000c080009000d000000", 0x24) 04:08:47 executing program 4: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x2001002, 0x0) mount$bpf(0x2010, &(0x7f0000000080)='./file0\x00', 0x0, 0x44000, 0x0) [ 658.784305][ T1931] hfs: invalid uid -1 04:08:47 executing program 0: r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0x4}}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x30, r2, 0x805, 0x0, 0x0, {{0x1, 0x40030000000000}, 0x0, 0x6, 0xa00000000000000, {0x14}}}, 0x30}}, 0x0) [ 658.812266][ T1931] hfs: unable to parse mount options 04:08:47 executing program 3: r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0x4}}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x30, r2, 0x805, 0x0, 0x0, {{0x1, 0x40030000000000}, 0x0, 0x6, 0xf00000000000000, {0x14}}}, 0x30}}, 0x0) 04:08:47 executing program 1: r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f0000000000)="240067001e0025eaa87865f51ef6bce90a04000200bff20182a9000c080009000d000000", 0x24) [ 658.947499][ T1931] hfs: invalid uid -1 [ 658.951521][ T1931] hfs: unable to parse mount options 04:08:47 executing program 5: r0 = open(&(0x7f0000000180)='./file0\x00', 0x800, 0x0) fstat(r0, &(0x7f0000000fbc)) ioctl$FS_IOC_GETFSMAP(r0, 0xc0c0583b, &(0x7f00000001c0)={0x0, 0x0, 0x3, 0x0, [], [{0x5f9d80000000, 0x0, 0x81, 0x4, 0x1ff, 0x400}, {0x9, 0x5, 0x100000000000000, 0x43, 0x2df2b50c, 0x21}], [[], [], []]}) sigaltstack(&(0x7f0000001000/0x2000)=nil, 0x0) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8924, &(0x7f0000000000)={'erspan0\x00', @local}) sigaltstack(&(0x7f0000000000/0x4000)=nil, 0x0) 04:08:47 executing program 3: r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0x4}}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x30, r2, 0x805, 0x0, 0x0, {{0x1, 0x40030000000000}, 0x0, 0x6, 0x2f02000000000000, {0x14}}}, 0x30}}, 0x0) 04:08:47 executing program 2: syz_mount_image$hfs(&(0x7f00000000c0)='hfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000540)={[{@uid={'uid', 0x3d, 0xffffffffffffffff}}]}) 04:08:47 executing program 0: r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0x4}}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x30, r2, 0x805, 0x0, 0x0, {{0x1, 0x40030000000000}, 0x0, 0x6, 0xe00000000000000, {0x14}}}, 0x30}}, 0x0) 04:08:47 executing program 1: r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f0000000000)="240167001e0025eaa87865f51ef6bce90a04000200bff20182a9000c080009000d000000", 0x24) 04:08:47 executing program 4: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x2001002, 0x0) mount$bpf(0x4000, &(0x7f0000000080)='./file0\x00', 0x0, 0x44000, 0x0) 04:08:48 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_int(r0, 0x107, 0xa, &(0x7f0000000000)=0x2, 0x4) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) 04:08:48 executing program 0: r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0x4}}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x30, r2, 0x805, 0x0, 0x0, {{0x1, 0x40030000000000}, 0x0, 0x6, 0xf00000000000000, {0x14}}}, 0x30}}, 0x0) [ 659.301622][ T1971] hfs: invalid uid -1 04:08:48 executing program 1: r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f0000000000)="240267001e0025eaa87865f51ef6bce90a04000200bff20182a9000c080009000d000000", 0x24) [ 659.339576][ T1971] hfs: unable to parse mount options 04:08:48 executing program 4: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x2001002, 0x0) mount$bpf(0xf000, &(0x7f0000000080)='./file0\x00', 0x0, 0x44000, 0x0) 04:08:48 executing program 3: r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0x4}}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x30, r2, 0x805, 0x0, 0x0, {{0x1, 0x40030000000000}, 0x0, 0x6, 0x3f00000000000000, {0x14}}}, 0x30}}, 0x0) [ 659.458911][ T1971] hfs: invalid uid -1 [ 659.462922][ T1971] hfs: unable to parse mount options 04:08:48 executing program 1: r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f0000000000)="240367001e0025eaa87865f51ef6bce90a04000200bff20182a9000c080009000d000000", 0x24) 04:08:48 executing program 0: r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0x4}}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x30, r2, 0x805, 0x0, 0x0, {{0x1, 0x40030000000000}, 0x0, 0x6, 0x3f00000000000000, {0x14}}}, 0x30}}, 0x0) 04:08:48 executing program 2: syz_mount_image$hfs(&(0x7f00000000c0)='hfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000540)={[{@uid={'uid', 0x3d, 0xffffffffffffffff}}]}) 04:08:48 executing program 4: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x2001002, 0x0) mount$bpf(0xff00, &(0x7f0000000080)='./file0\x00', 0x0, 0x44000, 0x0) 04:08:48 executing program 5: r0 = socket$unix(0x1, 0x1, 0x0) bind$unix(r0, &(0x7f0000000000)=@abs={0x1}, 0x15) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x80000000000002, &(0x7f0000000800)=0x16c, 0x4) setsockopt$inet_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000480)={@in={{0x2, 0x0, @local}}, 0x0, 0x20000000005, 0x2, "a77760f5a7645bc43c241d69912dda0c63c2a66726f8cfafd6c8fe2c98de7ba44947a79015f0fe57917cb62a93987a938fdedfce7bbba4fec2d8a09c41fb233245f2604b9e07b8ab79ec15ef2818a179"}, 0xd8) r2 = syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) setsockopt$nfc_llcp_NFC_LLCP_MIUX(r2, 0x118, 0x1, &(0x7f0000000440)=0xf200000, 0x4) bind$inet(r1, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$sock_int(r1, 0x1, 0x9, &(0x7f00000000c0), 0x4) setsockopt$TIPC_IMPORTANCE(0xffffffffffffffff, 0x10f, 0x7f, &(0x7f0000000140)=0x1, 0x4) recvmsg(r1, &(0x7f0000000240)={&(0x7f0000000040)=@nfc, 0x23, &(0x7f0000000180)=[{&(0x7f0000003ac0)=""/4096, 0xdc00}], 0x1, &(0x7f0000000200)=""/20, 0x14}, 0x100) setsockopt$inet_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f00000001c0)='hybla\x00', 0x6) write$binfmt_elf64(r1, &(0x7f0000002300)=ANY=[@ANYRES64], 0x1000001bd) 04:08:48 executing program 3: r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0x4}}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x30, r2, 0x805, 0x0, 0x0, {{0x1, 0x40030000000000}, 0x0, 0x6, 0x4000000000000000, {0x14}}}, 0x30}}, 0x0) 04:08:48 executing program 1: r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f0000000000)="240068001e0025eaa87865f51ef6bce90a04000200bff20182a9000c080009000d000000", 0x24) [ 659.752020][ T2006] hfs: invalid uid -1 04:08:48 executing program 0: r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0x4}}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x30, r2, 0x805, 0x0, 0x0, {{0x1, 0x40030000000000}, 0x0, 0x6, 0x4000000000000000, {0x14}}}, 0x30}}, 0x0) [ 659.852395][ T2006] hfs: unable to parse mount options 04:08:48 executing program 5: r0 = socket$kcm(0x29, 0x3, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x89e2, &(0x7f0000000000)={0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x406, r0) write$FUSE_NOTIFY_DELETE(r2, &(0x7f0000000040)={0x16b, 0x6, 0x0, {0x3, 0x6, 0x142, 0x0, 'net/kcm\x00\b\x00\'\xde7znT\r\x1cc\x14=\xd5=_w_\xc8\xa8\x97i\xc8\"\x92\x89{\x90e\x97\x88\xd3\xe4\xf7y\'\x1b\xa7(\x87\x92X\xabK4\xca\xac\xe0P\x99\xa5\xcfB\x88\x03\x14\xae\xa2\xbfG\xe4\x12\xcd\xfe\rIG\xe3Vm\xed\xa2\xb5\x1a\xa4\x18)[[i\xa1\x0eq\xe2\xfe\xf2\xe5\xac\x88\x04\xba`\xac>z\x92S\x89E^Wv\x1brJx\xe9\xa8\x06t\x13%\"N]~\x00IA\x18\xa4\x86\xb6\xad2\x81J8O\xb4)\x89\x14\xd4\x8d\xf7\x85\xeb\x00\x00\x00\x00\x00\x00\x00\x02\xf3\ap|!\x97\x18R\xfc\r\x00\x00\x19\x00\x00\x00\xf9\xb0?s\x8cg\xdf\xc2X8\xfc\x7f\xff\xa5\x86\xf7\xe4d\xe3J\x88s\xf9F\xac\x02V\xaf\xe8\xcfG.\xa8\x03sRU\xa2\xbf\xb7\xe4\x8d\xc24\xdc\xf1\xd7x\xef\xd4\xda\xbc>a\xc3\xb7\x19\xc5\xa3y\xf53\xf2,\x83\xd7 \xd1a\xcd\xbd/\xaf\x03\xd6\nP\xc5\x8f+\x04\f`?^-*\xf5j\r\xed\t\x00\xd5]5`\xf2S\xa7\xcc\xf5Z\xbc\xf3e\x83\xa2\xe0jUq%\x99\xa0\xac&[\xa8\xde8\xfb9\xe0\x02\xc9$\xbd?\xac\x984\xe6xY\x7f\x1cT\x87$\f\x91|\xd8\xa6\xf6\xb7\x16\xb2\xf4\xeec'}}, 0x16b) r3 = syz_open_procfs(0x0, &(0x7f0000001880)='net/kcm\x00\b\x00\'\xde7znT\r\x1cc\x14=\xd5=_w_\xc8\xa8\x97i\xc8\"\x92\x89{\x90e\x97\x88\xd3\xe4\xf7y\'\x1b\xa7(\x87\x92X\xabK4\xca\xac\xe0P\x99\xa5\xcfB\x88\x03\x14\xae\xa2\xbfG\xe4\x12\xcd\xfe\rIG\xe3Vm\xed\xa2\xb5\x1a\xa4\x18)[[i\xa1\x0eq\xe2\xfe\xf2\xe5\xac\x88\x04\xba`\xac>z\x92S\x89E^Wv\x1brJx\xe9\xa8\x06t\x13%\"N]~\x00IA\x18\xa4\x86\xb6\xad2\x81J8O\xb4)\x89\x14\xd4\x8d\xf7\x85\xeb\x00\x00\x00\x00\x00\x00\x00\x02\xf3\ap|!\x97\x18R\xfc\r\x00\x00\x19\x00\x00\x00\xf9\xb0?s\x8cg\xdf\xc2X8\xfc\x7f\xff\xa5\x86\xf7\xe4d\xe3J\x88s\xf9F\xac\x02V\xaf\xe8\xcfG.\xa8\x03sRU\xa2\xbf\xb7\xe4\x8d\xc24\xdc\xf1\xd7x\xef\xd4\xda\xbc>a\xc3\xb7\x19\xc5\xa3y\xf53\xf2,\x83\xd7 \xd1a\xcd\xbd/\xaf\x03\xd6\nP\xc5\x8f+\x04\f`?^-*\xf5j\r\xed\t\x00\xd5]5`\xf2S\xa7\xcc\xf5Z\xbc\xf3e\x83\xa2\xe0jUq%\x99\xa0\xac&[\xa8\xde8\xfb9\xe0\x02\xc9$\xbd?\xac\x984\xe6xY\x7f\x1cT\x87$\f\x91|\xd8\xa6\xf6\xb7\x16\xb2\xf4\xeec') r4 = syz_genetlink_get_family_id$tipc(&(0x7f0000000200)='TIPC\x00') sendmsg$TIPC_CMD_GET_MAX_PORTS(r2, &(0x7f00000002c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x80800001}, 0xc, &(0x7f0000000280)={&(0x7f0000000240)={0x1c, r4, 0x2, 0x70bd25, 0x25dfdbfd, {}, [""]}, 0x1c}, 0x1, 0x0, 0x0, 0x800}, 0x4000) ioctl$SG_GET_REQUEST_TABLE(r3, 0x2286, &(0x7f0000000600)) 04:08:48 executing program 1: r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f0000000000)="240168001e0025eaa87865f51ef6bce90a04000200bff20182a9000c080009000d000000", 0x24) [ 659.960271][ T2006] hfs: invalid uid -1 04:08:48 executing program 3: r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0x4}}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x30, r2, 0x805, 0x0, 0x0, {{0x1, 0x40030000000000}, 0x0, 0x6, 0x4800000000000000, {0x14}}}, 0x30}}, 0x0) 04:08:48 executing program 4: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x2001002, 0x0) mount$bpf(0x400000, &(0x7f0000000080)='./file0\x00', 0x0, 0x44000, 0x0) 04:08:48 executing program 0: r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0x4}}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x30, r2, 0x805, 0x0, 0x0, {{0x1, 0x40030000000000}, 0x0, 0x6, 0x4800000000000000, {0x14}}}, 0x30}}, 0x0) [ 660.018877][ T2006] hfs: unable to parse mount options 04:08:48 executing program 2: syz_mount_image$hfs(&(0x7f00000000c0)='hfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000540)={[{@uid={'uid', 0x3d, 0xffffffffffffffff}}]}) 04:08:49 executing program 1: r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f0000000000)="240268001e0025eaa87865f51ef6bce90a04000200bff20182a9000c080009000d000000", 0x24) 04:08:49 executing program 5: r0 = socket(0x2, 0x4, 0x102) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)) mount$9p_tcp(&(0x7f0000000140)='127.0.0.1\x00', &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='9p\x00', 0x4, &(0x7f0000000200)=ANY=[@ANYBLOB='trans=tcp,porG=0x0000000000004G24,smackf{def=^,smackfsdef=\x00,smackfshat=md5sumcbj_role=:*Wlan1{:%,\x00'/114]) r1 = creat(&(0x7f0000000040)='./file0\x00', 0x40) ioctl$SNDRV_SEQ_IOCTL_GET_NAMED_QUEUE(r1, 0xc08c5336, &(0x7f0000000080)={0x7, 0x3ff, 0x7f, 'queue0\x00', 0x3}) 04:08:49 executing program 0: r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0x4}}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x30, r2, 0x805, 0x0, 0x0, {{0x1, 0x40030000000000}, 0x0, 0x6, 0x4c00000000000000, {0x14}}}, 0x30}}, 0x0) 04:08:49 executing program 3: r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0x4}}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x30, r2, 0x805, 0x0, 0x0, {{0x1, 0x40030000000000}, 0x0, 0x6, 0x4c00000000000000, {0x14}}}, 0x30}}, 0x0) [ 660.288536][ T2045] hfs: invalid uid -1 [ 660.292558][ T2045] hfs: unable to parse mount options 04:08:49 executing program 4: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x2001002, 0x0) mount$bpf(0xf0ffff, &(0x7f0000000080)='./file0\x00', 0x0, 0x44000, 0x0) [ 660.402823][ T2057] 9pnet: p9_fd_create_tcp (2057): problem connecting socket to 127.0.0.1 [ 660.442222][ T2045] hfs: invalid uid -1 04:08:49 executing program 1: r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f0000000000)="240368001e0025eaa87865f51ef6bce90a04000200bff20182a9000c080009000d000000", 0x24) [ 660.469352][ T2045] hfs: unable to parse mount options 04:08:49 executing program 3: r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0x4}}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x30, r2, 0x805, 0x0, 0x0, {{0x1, 0x40030000000000}, 0x0, 0x6, 0x6000000000000000, {0x14}}}, 0x30}}, 0x0) 04:08:49 executing program 2: syz_mount_image$hfs(&(0x7f00000000c0)='hfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000540)={[{@uid={'uid', 0x3d, 0xffffffffffffffff}}]}) 04:08:49 executing program 4: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x2001002, 0x0) mount$bpf(0x1000000, &(0x7f0000000080)='./file0\x00', 0x0, 0x44000, 0x0) 04:08:49 executing program 5: r0 = syz_open_dev$dmmidi(&(0x7f0000000000)='/dev/dmmidi#\x00', 0x3, 0x200) getsockopt$packet_buf(r0, 0x107, 0xf045318de4aad3fe, &(0x7f0000000040)=""/229, &(0x7f0000000140)=0xe5) r1 = socket$inet6(0xa, 0x3, 0xe9) bind$inet6(r1, 0x0, 0x0) 04:08:49 executing program 0: r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0x4}}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x30, r2, 0x805, 0x0, 0x0, {{0x1, 0x40030000000000}, 0x0, 0x6, 0x6000000000000000, {0x14}}}, 0x30}}, 0x0) 04:08:49 executing program 1: r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f0000000000)="240069001e0025eaa87865f51ef6bce90a04000200bff20182a9000c080009000d000000", 0x24) 04:08:49 executing program 5: ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) sendmmsg(0xffffffffffffffff, &(0x7f0000000180), 0x32bc45944b084a6, 0x0) mkdir(0x0, 0x0) mount(0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(0xffffffffffffffff, 0x84, 0x75, 0x0, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prctl$PR_GET_TIMERSLACK(0x1e) r2 = syz_open_dev$sndmidi(&(0x7f0000000000)='/dev/snd/midiC#D#\x00', 0x0, 0x101000) fsetxattr$security_smack_transmute(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) read(r2, 0x0, 0x0) r3 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0x2, 0x0) fanotify_init(0x10, 0x1400) r4 = dup2(r0, r3) ioctl$KVM_ASSIGN_PCI_DEVICE(r4, 0x8040ae69, &(0x7f0000000080)={0x0, 0x2}) ioctl$FS_IOC_GETVERSION(r1, 0x80087601, &(0x7f00000000c0)) mknodat(r3, &(0x7f0000000100)='./file0\x00', 0x4, 0xfffff29f) 04:08:49 executing program 0: r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0x4}}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x30, r2, 0x805, 0x0, 0x0, {{0x1, 0x40030000000000}, 0x0, 0x6, 0x6800000000000000, {0x14}}}, 0x30}}, 0x0) [ 660.817589][ T2094] hfs: invalid uid -1 [ 660.821728][ T2094] hfs: unable to parse mount options 04:08:49 executing program 3: r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0x4}}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x30, r2, 0x805, 0x0, 0x0, {{0x1, 0x40030000000000}, 0x0, 0x6, 0x6800000000000000, {0x14}}}, 0x30}}, 0x0) 04:08:49 executing program 1: r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f0000000000)="240169001e0025eaa87865f51ef6bce90a04000200bff20182a9000c080009000d000000", 0x24) 04:08:49 executing program 4: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x2001002, 0x0) mount$bpf(0x2000000, &(0x7f0000000080)='./file0\x00', 0x0, 0x44000, 0x0) [ 660.931593][ T2094] hfs: invalid uid -1 [ 660.941925][ T2094] hfs: unable to parse mount options 04:08:49 executing program 0: r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0x4}}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x30, r2, 0x805, 0x0, 0x0, {{0x1, 0x40030000000000}, 0x0, 0x6, 0x6c00000000000000, {0x14}}}, 0x30}}, 0x0) 04:08:49 executing program 1: r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f0000000000)="240269001e0025eaa87865f51ef6bce90a04000200bff20182a9000c080009000d000000", 0x24) 04:08:49 executing program 2: syz_mount_image$hfs(&(0x7f00000000c0)='hfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000540)={[{@uid={'uid', 0x3d, 0xffffffffffffffff}}]}) 04:08:49 executing program 3: r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0x4}}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x30, r2, 0x805, 0x0, 0x0, {{0x1, 0x40030000000000}, 0x0, 0x6, 0x6c00000000000000, {0x14}}}, 0x30}}, 0x0) 04:08:49 executing program 4: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x2001002, 0x0) mount$bpf(0x3000000, &(0x7f0000000080)='./file0\x00', 0x0, 0x44000, 0x0) 04:08:50 executing program 0: r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0x4}}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x30, r2, 0x805, 0x0, 0x0, {{0x1, 0x40030000000000}, 0x0, 0x6, 0x7400000000000000, {0x14}}}, 0x30}}, 0x0) 04:08:50 executing program 1: r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f0000000000)="240369001e0025eaa87865f51ef6bce90a04000200bff20182a9000c080009000d000000", 0x24) [ 661.248616][ T2126] hfs: invalid uid -1 [ 661.273366][ T2126] hfs: unable to parse mount options 04:08:50 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x4c, &(0x7f00000000c0)={@dev}, 0x20) r1 = syz_open_dev$dmmidi(&(0x7f0000000000)='/dev/dmmidi#\x00', 0x7, 0x8002) connect$ax25(r1, &(0x7f0000000040)={{0x3, @default, 0x3}, [@default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @null, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}]}, 0x48) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x800, 0x0) 04:08:50 executing program 3: r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0x4}}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x30, r2, 0x805, 0x0, 0x0, {{0x1, 0x40030000000000}, 0x0, 0x6, 0x7400000000000000, {0x14}}}, 0x30}}, 0x0) [ 661.341310][ T2126] hfs: invalid uid -1 [ 661.348906][ T2126] hfs: unable to parse mount options 04:08:50 executing program 0: r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0x4}}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x30, r2, 0x805, 0x0, 0x0, {{0x1, 0x40030000000000}, 0x0, 0x6, 0x7a00000000000000, {0x14}}}, 0x30}}, 0x0) 04:08:50 executing program 2: syz_mount_image$hfs(&(0x7f00000000c0)='hfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000540)={[{@uid={'uid', 0x3d, 0xffffffffffffffff}}]}) 04:08:50 executing program 4: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x2001002, 0x0) mount$bpf(0x4000000, &(0x7f0000000080)='./file0\x00', 0x0, 0x44000, 0x0) 04:08:50 executing program 1: r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f0000000000)="24006a001e0025eaa87865f51ef6bce90a04000200bff20182a9000c080009000d000000", 0x24) 04:08:50 executing program 0: r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0x4}}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x30, r2, 0x805, 0x0, 0x0, {{0x1, 0x40030000000000}, 0x0, 0x6, 0x8702000000000000, {0x14}}}, 0x30}}, 0x0) 04:08:50 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="11dca50d5e0bcfe47bf070") r1 = syz_open_dev$usb(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x40000fffffb, 0x40000) mmap$binder(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x1, 0x11, r1, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) epoll_wait(r1, &(0x7f0000000040)=[{}, {}], 0x2, 0x2) 04:08:50 executing program 3: r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0x4}}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x30, r2, 0x805, 0x0, 0x0, {{0x1, 0x40030000000000}, 0x0, 0x6, 0x7a00000000000000, {0x14}}}, 0x30}}, 0x0) [ 661.632845][ T2162] hfs: invalid uid -1 [ 661.657616][ T2162] hfs: unable to parse mount options 04:08:50 executing program 4: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x2001002, 0x0) mount$bpf(0x5000000, &(0x7f0000000080)='./file0\x00', 0x0, 0x44000, 0x0) 04:08:50 executing program 1: r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f0000000000)="24016a001e0025eaa87865f51ef6bce90a04000200bff20182a9000c080009000d000000", 0x24) 04:08:50 executing program 0: r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0x4}}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x30, r2, 0x805, 0x0, 0x0, {{0x1, 0x40030000000000}, 0x0, 0x6, 0x9effffff00000000, {0x14}}}, 0x30}}, 0x0) [ 661.728709][ T2162] hfs: invalid uid -1 [ 661.745487][ T2162] hfs: unable to parse mount options 04:08:50 executing program 2: syz_mount_image$hfs(&(0x7f00000000c0)='hfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000540)={[{@uid={'uid', 0x3d, 0xffffffffffffffff}}]}) 04:08:50 executing program 3: r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0x4}}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x30, r2, 0x805, 0x0, 0x0, {{0x1, 0x40030000000000}, 0x0, 0x6, 0x9effffff00000000, {0x14}}}, 0x30}}, 0x0) 04:08:50 executing program 5: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount$9p_virtio(0x0, 0x0, 0x0, 0x102020800, 0x0) mkdir(&(0x7f00000009c0)='./file1\x00', 0x0) r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(r0, 0x40106614, &(0x7f0000000040)={0x0, @aes256}) setxattr$system_posix_acl(&(0x7f0000000580)='./file1\x00', &(0x7f00000005c0)='system.posix_acl_default\x00', &(0x7f0000000c40)={{}, {}, [{}], {0x4, 0x7}, [{}, {}, {0x8, 0x1}]}, 0x44, 0x0) mount$overlay(0x40000a, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}], [], 0xf603000000000000}) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000240)='cgroup2\x00', 0x0, 0x0) 04:08:50 executing program 1: r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f0000000000)="24026a001e0025eaa87865f51ef6bce90a04000200bff20182a9000c080009000d000000", 0x24) 04:08:50 executing program 0: r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0x4}}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x30, r2, 0x805, 0x0, 0x0, {{0x1, 0x40030000000000}, 0x0, 0x6, 0xa1ffffff00000000, {0x14}}}, 0x30}}, 0x0) [ 662.010414][ T2195] hfs: invalid uid -1 04:08:50 executing program 4: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x2001002, 0x0) mount$bpf(0x6000000, &(0x7f0000000080)='./file0\x00', 0x0, 0x44000, 0x0) [ 662.036544][ T2195] hfs: unable to parse mount options 04:08:50 executing program 3: r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0x4}}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x30, r2, 0x805, 0x0, 0x0, {{0x1, 0x40030000000000}, 0x0, 0x6, 0xa1ffffff00000000, {0x14}}}, 0x30}}, 0x0) 04:08:50 executing program 1: r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f0000000000)="24036a001e0025eaa87865f51ef6bce90a04000200bff20182a9000c080009000d000000", 0x24) [ 662.161946][ T2195] hfs: invalid uid -1 [ 662.198088][ T2204] overlayfs: workdir and upperdir must reside under the same mount [ 662.225018][ T2195] hfs: unable to parse mount options 04:08:51 executing program 0: r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0x4}}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x30, r2, 0x805, 0x0, 0x0, {{0x1, 0x40030000000000}, 0x0, 0x6, 0xeaffffff00000000, {0x14}}}, 0x30}}, 0x0) 04:08:51 executing program 2: syz_mount_image$hfs(&(0x7f00000000c0)='hfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000540)={[{@uid={'uid', 0x3d, 0xffffffffffffffff}}]}) 04:08:51 executing program 4: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x2001002, 0x0) mount$bpf(0x7000000, &(0x7f0000000080)='./file0\x00', 0x0, 0x44000, 0x0) [ 662.272261][ T2220] overlayfs: workdir and upperdir must reside under the same mount 04:08:51 executing program 3: r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0x4}}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x30, r2, 0x805, 0x0, 0x0, {{0x1, 0x40030000000000}, 0x0, 0x6, 0xeaffffff00000000, {0x14}}}, 0x30}}, 0x0) 04:08:51 executing program 1: r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f0000000000)="24006b001e0025eaa87865f51ef6bce90a04000200bff20182a9000c080009000d000000", 0x24) 04:08:51 executing program 5: openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000140)='/dev/btrfs-control\x00', 0x400000, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1, 0x3, &(0x7f0000000080)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x8, 0xffffffa5, 0x0, 0x0, 0xe4ffffff}}, &(0x7f0000000040)='syzkaller\x00', 0x1, 0x99, &(0x7f000000d000)=""/153, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) [ 662.399119][ T2227] hfs: invalid uid -1 [ 662.443301][ T2227] hfs: unable to parse mount options 04:08:51 executing program 0: r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0x4}}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x30, r2, 0x805, 0x0, 0x0, {{0x1, 0x40030000000000}, 0x0, 0x6, 0xf0ffffff00000000, {0x14}}}, 0x30}}, 0x0) 04:08:51 executing program 4: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x2001002, 0x0) mount$bpf(0x8000000, &(0x7f0000000080)='./file0\x00', 0x0, 0x44000, 0x0) 04:08:51 executing program 1: r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f0000000000)="24016b001e0025eaa87865f51ef6bce90a04000200bff20182a9000c080009000d000000", 0x24) [ 662.524658][ T2227] hfs: invalid uid -1 [ 662.528682][ T2227] hfs: unable to parse mount options 04:08:51 executing program 3: r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0x4}}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x30, r2, 0x805, 0x0, 0x0, {{0x1, 0x40030000000000}, 0x0, 0x6, 0xf0ffffff00000000, {0x14}}}, 0x30}}, 0x0) 04:08:51 executing program 2: syz_mount_image$hfs(&(0x7f00000000c0)='hfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000540)={[{@uid={'uid', 0x3d, 0xffffffffffffffff}}]}) 04:08:51 executing program 5: socketpair(0x5, 0x5f6fb0ed2da81267, 0x100000001, &(0x7f0000000080)={0xffffffffffffffff}) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e24, @multicast1}, 0x10) r1 = perf_event_open(&(0x7f000025c000)={0x400000001, 0x70, 0x2005, 0x0, 0x0, 0x0, 0x0, 0x1, 0x8090, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000000140)='./file0\x00', 0x4000, 0x1) ioctl$BLKROTATIONAL(r2, 0x127e, &(0x7f0000000180)) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r3, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r1, 0x2405, r3) r4 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r4, &(0x7f0000000040)={0x2, 0x4e23, @broadcast}, 0x10) bind$inet(r4, &(0x7f0000000000)={0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0x14}}, 0x10) sendto$inet(r4, 0x0, 0x10b, 0x200007fe, &(0x7f0000000100)={0x2, 0x10004e23, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) sendto$inet(r4, &(0x7f0000d7cfcb), 0xffffffffffffffef, 0x241, 0x0, 0x0) 04:08:51 executing program 0: r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0x4}}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x30, r2, 0x805, 0x0, 0x0, {{0x1, 0x40030000000000}, 0x0, 0x6, 0xfcffffff00000000, {0x14}}}, 0x30}}, 0x0) 04:08:51 executing program 4: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x2001002, 0x0) mount$bpf(0x20000000, &(0x7f0000000080)='./file0\x00', 0x0, 0x44000, 0x0) 04:08:51 executing program 1: r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f0000000000)="24026b001e0025eaa87865f51ef6bce90a04000200bff20182a9000c080009000d000000", 0x24) [ 662.829385][ T2265] hfs: invalid uid -1 04:08:51 executing program 3: r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0x4}}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x30, r2, 0x805, 0x0, 0x0, {{0x1, 0x40030000000000}, 0x0, 0x6, 0xfcffffff00000000, {0x14}}}, 0x30}}, 0x0) [ 662.890729][ T2265] hfs: unable to parse mount options [ 662.978786][ T2265] hfs: invalid uid -1 [ 662.993096][ T2265] hfs: unable to parse mount options 04:08:51 executing program 1: r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f0000000000)="24036b001e0025eaa87865f51ef6bce90a04000200bff20182a9000c080009000d000000", 0x24) 04:08:51 executing program 3: r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0x4}}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x30, r2, 0x805, 0x0, 0x0, {{0x1, 0x40030000000000}, 0x0, 0x6, 0xffffff7f00000000, {0x14}}}, 0x30}}, 0x0) 04:08:51 executing program 0: r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0x4}}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x30, r2, 0x805, 0x0, 0x0, {{0x1, 0x40030000000000}, 0x0, 0x6, 0xffffff7f00000000, {0x14}}}, 0x30}}, 0x0) 04:08:51 executing program 2: syz_mount_image$hfs(&(0x7f00000000c0)='hfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000540)={[{@uid={'uid', 0x3d, 0xffffffffffffffff}}]}) 04:08:51 executing program 4: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x2001002, 0x0) mount$bpf(0x20100000, &(0x7f0000000080)='./file0\x00', 0x0, 0x44000, 0x0) 04:08:52 executing program 1: r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f0000000000)="24006c001e0025eaa87865f51ef6bce90a04000200bff20182a9000c080009000d000000", 0x24) 04:08:52 executing program 0: r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0x4}}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x30, r2, 0x805, 0x0, 0x0, {{0x1, 0x40030000000000}, 0x0, 0x6, 0xffffffff00000000, {0x14}}}, 0x30}}, 0x0) [ 663.321135][ T2298] hfs: invalid uid -1 [ 663.354485][ T2298] hfs: unable to parse mount options [ 663.474484][ T2298] hfs: invalid uid -1 [ 663.490911][ T2298] hfs: unable to parse mount options 04:08:52 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000009c0)={0x26, 'hash\x00', 0x0, 0x0, 'sm3\x00'}, 0x58) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="119ca50d090000006df070") r2 = accept$alg(r0, 0x0, 0x0) r3 = syz_open_dev$mice(&(0x7f0000000040)='/dev/input/mice\x00', 0x0, 0x2000) r4 = syz_genetlink_get_family_id$tipc(&(0x7f00000000c0)='TIPC\x00') sendmsg$TIPC_CMD_ENABLE_BEARER(r3, &(0x7f0000000180)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x950}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x34, r4, 0x200, 0x70bd2a, 0x25dfdbfc, {{}, 0x0, 0x4101, 0x0, {0x18, 0x17, {0x4, 0x8, @udp='udp:syz1\x00'}}}, ["", "", "", "", "", ""]}, 0x34}, 0x1, 0x0, 0x0, 0x4004}, 0x4000044) ioctl$MON_IOCT_RING_SIZE(r3, 0x9204, 0x64f8e) sendmmsg$alg(r2, &(0x7f0000003e80)=[{0x0, 0x0, &(0x7f0000002a80), 0x162, &(0x7f0000000000)=[@op={0x18}], 0x24}], 0x49249249249265b, 0x0) 04:08:52 executing program 3: r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0x4}}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x30, r2, 0x805, 0x0, 0x0, {{0x1, 0x40030000000000}, 0x0, 0x6, 0xffffffff00000000, {0x14}}}, 0x30}}, 0x0) 04:08:52 executing program 4: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x2001002, 0x0) mount$bpf(0x40000000, &(0x7f0000000080)='./file0\x00', 0x0, 0x44000, 0x0) 04:08:52 executing program 1: r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f0000000000)="24016c001e0025eaa87865f51ef6bce90a04000200bff20182a9000c080009000d000000", 0x24) 04:08:52 executing program 0: r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0x4}}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x30, r2, 0x805, 0x0, 0x0, {{0x1, 0x40030000000000}, 0x0, 0x6, 0xfffffffffffff000, {0x14}}}, 0x30}}, 0x0) 04:08:52 executing program 2: syz_mount_image$hfs(&(0x7f00000000c0)='hfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000540)={[{@uid={'uid', 0x3d, 0xffffffffffffffff}}]}) 04:08:52 executing program 0: r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0x4}}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x30, r2, 0x805, 0x0, 0x0, {{0x1, 0x40030000000000}, 0x0, 0x6, 0x0, {0x3}}}, 0x30}}, 0x0) 04:08:52 executing program 1: r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f0000000000)="24026c001e0025eaa87865f51ef6bce90a04000200bff20182a9000c080009000d000000", 0x24) [ 663.757203][ T2326] hfs: invalid uid -1 [ 663.761208][ T2326] hfs: unable to parse mount options 04:08:52 executing program 3: r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0x4}}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x30, r2, 0x805, 0x0, 0x0, {{0x1, 0x40030000000000}, 0x0, 0x6, 0xfffffffffffff000, {0x14}}}, 0x30}}, 0x0) 04:08:52 executing program 4: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x2001002, 0x0) mount$bpf(0x8cffffff, &(0x7f0000000080)='./file0\x00', 0x0, 0x44000, 0x0) 04:08:52 executing program 5: socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) unshare(0x0) r2 = perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = accept4(r1, 0x0, 0x0, 0x800) getsockopt$bt_hci(r3, 0x0, 0x0, &(0x7f0000000300)=""/248, &(0x7f0000000200)=0xf8) r4 = syz_open_dev$sndpcmp(&(0x7f00000002c0)='/dev/snd/pcmC#D#p\x00', 0x1, 0x200000) fstat(r2, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0x0}) stat(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000540)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) write$FUSE_ATTR(r4, &(0x7f00000005c0)={0x78, 0x0, 0x5, {0x81, 0xffffffffffffff5b, 0x0, {0x5, 0x4, 0x9, 0x0, 0xffffffffffffffff, 0x10001, 0x960, 0x7f, 0x6, 0x6, 0x1ff, r5, r6, 0x200, 0x3}}}, 0x78) getsockopt$TIPC_GROUP_JOIN(r3, 0x10f, 0x87, &(0x7f0000000500), 0x0) r7 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000640)='/dev/dlm-control\x00', 0x8040, 0x0) ioctl$KVM_GET_ONE_REG(r7, 0x4010aeab, &(0x7f0000000680)={0x3}) msgctl$IPC_STAT(0x0, 0x2, 0x0) write$P9_RSYMLINK(0xffffffffffffffff, &(0x7f0000000180)={0x14, 0x11, 0x2, {0x80, 0x0, 0x8}}, 0x14) connect$can_bcm(0xffffffffffffffff, 0x0, 0x0) ioctl$KVM_X86_SET_MCE(0xffffffffffffffff, 0x4040ae9e, &(0x7f0000000040)={0x2000000000000000, 0x3000, 0x101, 0x1, 0x14}) ioctl$FS_IOC_FSSETXATTR(r2, 0x401c5820, &(0x7f0000000080)={0x7, 0x2, 0x3, 0x0, 0x1}) ioctl$sock_inet_SIOCGIFBRDADDR(0xffffffffffffffff, 0x8919, &(0x7f0000000480)={'vlan0\x00', {0x2, 0x0, @dev={0xac, 0x14, 0x14, 0xc}}}) setsockopt$inet_tcp_TLS_TX(r3, 0x6, 0x1, &(0x7f0000000280)=@gcm_128={{0x303}, "e8d99c4b2743129b", "aae264793b43f33ba4df192694a50fee", "a4b99f58", "1090081928101b10"}, 0x28) ioctl$GIO_FONTX(r0, 0x4b6b, 0x0) r8 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r8, 0x8991, &(0x7f00000000c0)={'bond0\x00\x16\b\xea\xff\xff\x80\x00\x00\x02\xff', @ifru_names='bond_slave_1\x00'}) mount$9p_fd(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='9p\x00', 0x1000, &(0x7f00000006c0)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r7, @ANYBLOB=',wfdno=', @ANYRESHEX=r8, @ANYBLOB="2c64656275673d3078303030303030303030303030303030352c616669643d30783030303030303030303030c2704e6eb97d74656e642c61707072616973652c646f6e745f6d4800737572652c0000000000c3d07fa7e259c763ecdb32ba7198a554cb34eb4f85bf78d011a31b6be6ad0ca8"]) ioctl$sock_ifreq(r8, 0x8990, &(0x7f0000000240)={'bond0\x00\xe1\x03\n\x00!!\x00\x01\x00', @ifru_names='bond_slave_1\x00\x00\x00\b'}) [ 663.916559][ T2326] hfs: invalid uid -1 04:08:52 executing program 0: r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0x4}}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x30, r2, 0x805, 0x0, 0x0, {{0x1, 0x40030000000000}, 0x0, 0x6, 0x0, {0x8}}}, 0x30}}, 0x0) 04:08:52 executing program 1: r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f0000000000)="24036c001e0025eaa87865f51ef6bce90a04000200bff20182a9000c080009000d000000", 0x24) [ 663.943266][ T2326] hfs: unable to parse mount options 04:08:52 executing program 2: syz_mount_image$hfs(&(0x7f00000000c0)='hfs\xff', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000540)={[{@uid={'uid', 0x3d, 0xffffffffffffffff}}]}) 04:08:52 executing program 3: r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0x4}}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x30, r2, 0x805, 0x0, 0x0, {{0x1, 0x40030000000000}, 0x0, 0x6, 0x0, {0x3}}}, 0x30}}, 0x0) 04:08:52 executing program 1: r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f0000000000)="24006d001e0025eaa87865f51ef6bce90a04000200bff20182a9000c080009000d000000", 0x24) 04:08:52 executing program 0: r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0x4}}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x30, r2, 0x805, 0x0, 0x0, {{0x1, 0x40030000000000}, 0x0, 0x6, 0x0, {0x1ec0}}}, 0x30}}, 0x0) 04:08:52 executing program 4: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x2001002, 0x0) mount$bpf(0xf6ffffff, &(0x7f0000000080)='./file0\x00', 0x0, 0x44000, 0x0) [ 664.195017][ T2356] bond0: (slave bond_slave_1): Releasing backup interface 04:08:53 executing program 1: r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f0000000000)="24016d001e0025eaa87865f51ef6bce90a04000200bff20182a9000c080009000d000000", 0x24) 04:08:53 executing program 3: r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0x4}}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x30, r2, 0x805, 0x0, 0x0, {{0x1, 0x40030000000000}, 0x0, 0x6, 0x0, {0x8}}}, 0x30}}, 0x0) 04:08:53 executing program 0: r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0x4}}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x30, r2, 0x805, 0x0, 0x0, {{0x1, 0x40030000000000}, 0x0, 0x6, 0x0, {0x14, 0x19, {0x2}}}}, 0x30}}, 0x0) 04:08:53 executing program 4: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x2001002, 0x0) mount$bpf(0xff000000, &(0x7f0000000080)='./file0\x00', 0x0, 0x44000, 0x0) 04:08:53 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") fsetxattr$security_ima(0xffffffffffffffff, &(0x7f0000000040)='security.ima\x00', &(0x7f0000000080)=@md5={0x1, "f311f15cb604ed94237acb3c62010c75"}, 0x11, 0x1) recvmsg(0xffffffffffffffff, 0x0, 0x0) dup3(r0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ID(0xffffffffffffffff, 0x80082407, &(0x7f0000000200)) r1 = syz_open_dev$loop(&(0x7f0000000240)='/dev/loop#\x00', 0x0, 0x1100082) accept4$alg(r0, 0x0, 0x0, 0xa1d94e337f796489) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x43, &(0x7f0000000280)={'HL\x00'}, &(0x7f0000000300)=0x1e) r2 = memfd_create(&(0x7f00000002c0)='t\x00\x8c\x00', 0x0) pwritev(r2, &(0x7f0000000680)=[{&(0x7f0000001140)='\'', 0x1}], 0x3bc, 0x1081804) sendfile(r1, r1, 0x0, 0x200000d) ioctl$LOOP_SET_STATUS64(r1, 0x4c04, &(0x7f00000000c0)={0x0, 0x200000000000000, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, "a431c2a4cdb9795b06f93c44aefdc4ebf9addb49fd9e2cfaaa63c88dddde91314b0d0c1bcae24ad02e236d21bd56c63a54cc7bfd4ad9913e2f2b6f447da7afba", "ca7b43cfe50b09a476d2e2c6bfd6ac63b02d293cd0b94a4956448cd4144cb88abeba582dc0a71367dc57a23815f624081914c7ef067966df29d18a5750689cdf", "81c7d45ce1dc72f0bb0a35d8194333e5cd543f10797db1079d5bc87f576edc84"}) 04:08:53 executing program 2: syz_mount_image$hfs(&(0x7f00000000c0)='hfs\x00', &(0x7f0000000140)='./file0\x00', 0x2, 0x0, 0x0, 0x0, &(0x7f0000000540)={[{@uid={'uid', 0x3d, 0xffffffffffffffff}}]}) 04:08:53 executing program 0: r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0x4}}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x30, r2, 0x805, 0x0, 0x0, {{0x1, 0x40030000000000}, 0x0, 0x6, 0x0, {0x14, 0x19, {0x3}}}}, 0x30}}, 0x0) 04:08:53 executing program 3: r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0x4}}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x30, r2, 0x805, 0x0, 0x0, {{0x1, 0x40030000000000}, 0x0, 0x6, 0x0, {0x1e94}}}, 0x30}}, 0x0) 04:08:53 executing program 1: r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f0000000000)="24026d001e0025eaa87865f51ef6bce90a04000200bff20182a9000c080009000d000000", 0x24) 04:08:53 executing program 4: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x2001002, 0x0) mount$bpf(0xfffff000, &(0x7f0000000080)='./file0\x00', 0x0, 0x44000, 0x0) [ 664.932770][ T2367] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 664.945223][ T2405] bond0: (slave bond_slave_1): Error: Device is in use and cannot be enslaved [ 665.062070][ T2415] hfs: invalid uid -1 04:08:53 executing program 1: r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f0000000000)="24036d001e0025eaa87865f51ef6bce90a04000200bff20182a9000c080009000d000000", 0x24) [ 665.099241][ T2415] hfs: unable to parse mount options 04:08:53 executing program 0: r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0x4}}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x30, r2, 0x805, 0x0, 0x0, {{0x1, 0x40030000000000}, 0x0, 0x6, 0x0, {0x14, 0x19, {0x4}}}}, 0x30}}, 0x0) 04:08:53 executing program 3: r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0x4}}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x30, r2, 0x805, 0x0, 0x0, {{0x1, 0x40030000000000}, 0x0, 0x6, 0x0, {0x1ec0}}}, 0x30}}, 0x0) 04:08:53 executing program 4: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x2001002, 0x0) mount$bpf(0xffffff8c, &(0x7f0000000080)='./file0\x00', 0x0, 0x44000, 0x0) [ 665.209785][ T2415] hfs: invalid uid -1 04:08:54 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") r1 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e21, 0x0, @ipv4={[], [], @empty}}, 0x1c) connect$inet6(r1, &(0x7f0000000200)={0xa, 0x4e21, 0x0, @loopback}, 0x1c) getsockopt$inet_sctp6_SCTP_MAXSEG(r1, 0x84, 0x76, &(0x7f00000001c0)=@assoc_value, &(0x7f0000000340)=0x8) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000100)={0x0, 0xffffffffffffffff, 0x0, 0x9, &(0x7f0000000080)='vboxnet0\x00'}, 0x30) prlimit64(r2, 0x0, &(0x7f0000000140)={0x4, 0x2}, &(0x7f0000000180)) openat$vcs(0xffffffffffffff9c, &(0x7f0000000300)='/dev/vcs\x00', 0x0, 0x0) r3 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000240)='/dev/vga_arbiter\x00', 0x42200, 0x0) ioctl$VIDIOC_SUBDEV_G_FMT(r3, 0xc0585604, &(0x7f0000000280)={0x1, 0x0, {0x3, 0x6, 0x2009, 0x4, 0x5, 0x2, 0xa39484c95c449d80, 0x3}}) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(r1, 0x84, 0xf, 0x0, &(0x7f0000000040)) [ 665.239867][ T2415] hfs: unable to parse mount options 04:08:54 executing program 3: r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0x4}}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x30, r2, 0x805, 0x0, 0x0, {{0x1, 0x40030000000000}, 0x0, 0x6, 0x0, {0x14, 0x19, {0x2}}}}, 0x30}}, 0x0) 04:08:54 executing program 1: r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f0000000000)="24006e001e0025eaa87865f51ef6bce90a04000200bff20182a9000c080009000d000000", 0x24) 04:08:54 executing program 2: syz_mount_image$hfs(&(0x7f00000000c0)='hfs\x00', &(0x7f0000000140)='./file0\x00', 0x3, 0x0, 0x0, 0x0, &(0x7f0000000540)={[{@uid={'uid', 0x3d, 0xffffffffffffffff}}]}) 04:08:54 executing program 0: r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0x4}}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x30, r2, 0x805, 0x0, 0x0, {{0x1, 0x40030000000000}, 0x0, 0x6, 0x0, {0x14, 0x19, {0x5}}}}, 0x30}}, 0x0) 04:08:54 executing program 4: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x2001002, 0x0) mount$bpf(0xfffffff6, &(0x7f0000000080)='./file0\x00', 0x0, 0x44000, 0x0) 04:08:54 executing program 3: r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0x4}}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x30, r2, 0x805, 0x0, 0x0, {{0x1, 0x40030000000000}, 0x0, 0x6, 0x0, {0x14, 0x19, {0x3}}}}, 0x30}}, 0x0) [ 665.547782][ T2462] hfs: invalid uid -1 04:08:54 executing program 1: r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f0000000000)="24016e001e0025eaa87865f51ef6bce90a04000200bff20182a9000c080009000d000000", 0x24) 04:08:54 executing program 0: r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0x4}}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x30, r2, 0x805, 0x0, 0x0, {{0x1, 0x40030000000000}, 0x0, 0x6, 0x0, {0x14, 0x19, {0x6}}}}, 0x30}}, 0x0) [ 665.603235][ T2462] hfs: unable to parse mount options [ 665.714399][ T2462] hfs: invalid uid -1 04:08:54 executing program 1: r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f0000000000)="24026e001e0025eaa87865f51ef6bce90a04000200bff20182a9000c080009000d000000", 0x24) 04:08:54 executing program 3: r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0x4}}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x30, r2, 0x805, 0x0, 0x0, {{0x1, 0x40030000000000}, 0x0, 0x6, 0x0, {0x14, 0x19, {0x4}}}}, 0x30}}, 0x0) [ 665.734647][ T2462] hfs: unable to parse mount options 04:08:54 executing program 4: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x2001002, 0x0) mount$bpf(0x40000000000000, &(0x7f0000000080)='./file0\x00', 0x0, 0x44000, 0x0) 04:08:54 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000300)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f00000008c0)=[@text32={0x20, &(0x7f0000000140)="b805000000b9510000000f01c10f46a78900000066ba2100b067ee66ba4100edb9800000c00f3235004000000f30c4c271de9d0000000066b808008ed0660f38806f000f011c2666b8bf008ee0", 0x4d}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = socket$packet(0x11, 0x3, 0x300) mmap(&(0x7f0000ff0000/0x10000)=nil, 0x7fffdf00f000, 0xa, 0x13012, r3, 0x0) r4 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2a, 0x0, 0x8, 0x1f, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) shmget$private(0x0, 0x2000, 0x20, &(0x7f0000ffe000/0x2000)=nil) fcntl$F_GET_FILE_RW_HINT(r4, 0x40d, &(0x7f0000000080)) r5 = openat$dlm_control(0xffffffffffffff9c, 0x0, 0x80000, 0x0) fsetxattr$security_smack_entry(r4, &(0x7f0000000000)='security.SMACK64IPOUT\x00', &(0x7f0000000040)='[\x00', 0x2, 0x3) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = socket(0xa, 0x1, 0x0) setsockopt$IP_VS_SO_SET_ADD(r6, 0x0, 0x482, &(0x7f0000000300)={0x100000011, @multicast2, 0x0, 0x0, 'lblc\x00'}, 0x2c) r7 = socket(0xa, 0x4000000001, 0x0) setsockopt$IP_VS_SO_SET_ADD(r7, 0x0, 0x482, &(0x7f0000000000)={0x11, @rand_addr, 0x88, 0x0, 'lblcr\x00'}, 0x2c) getsockopt$inet_pktinfo(r5, 0x0, 0x8, &(0x7f0000001580)={0x0, @dev, @broadcast}, &(0x7f0000000480)=0xc) setsockopt$inet_pktinfo(r5, 0x0, 0x8, &(0x7f0000000300)={r8, @loopback, @remote}, 0xc) getsockopt$inet_pktinfo(r5, 0x0, 0x8, &(0x7f00000000c0)={0x0, @remote, @empty}, &(0x7f0000000100)=0x332) setsockopt$inet_pktinfo(r7, 0x0, 0x8, &(0x7f0000000140)={r9, @remote, @loopback}, 0xc) ustat(0x0, 0x0) ioctl$CAPI_GET_MANUFACTURER(r5, 0xc0044306, &(0x7f0000000500)) r10 = fcntl$getown(r6, 0x9) fcntl$lock(r5, 0x25, &(0x7f0000000200)={0x2, 0x3, 0x80000000, 0x3f, r10}) setsockopt$sock_timeval(r5, 0x1, 0x14, &(0x7f00000002c0)={0x77359400}, 0x8) setsockopt$EBT_SO_SET_COUNTERS(r5, 0x0, 0x81, &(0x7f0000000540)=ANY=[@ANYBLOB="665e6c7465720000000000abf768717b5a86592b8ad05b739aba2f0000001200000000000000000000000000000000000000000000000000000000000000000000080000d65a00000000000000000000000000000000000000000000000000000000000000000000000000000000611a7938d26d318d0000ffdb301eda7395abb51625b622677961b2ad0000000000000000", @ANYPTR=&(0x7f0000000240)=ANY=[@ANYBLOB="0000f56987245b05598482730359bab9fa6a000000000000"], @ANYBLOB="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"], 0x70) ioctl$FICLONE(r3, 0x40049409, r6) ioctl$VIDIOC_SUBDEV_ENUM_MBUS_CODE(0xffffffffffffffff, 0xc0305602, &(0x7f0000000040)={0x0, 0x3, 0x2024, 0x1}) preadv(r2, &(0x7f0000000140)=[{&(0x7f0000000080)=""/163, 0xa3}], 0x1, 0x0) 04:08:54 executing program 2: syz_mount_image$hfs(&(0x7f00000000c0)='hfs\x00', &(0x7f0000000140)='./file0\x00', 0x4, 0x0, 0x0, 0x0, &(0x7f0000000540)={[{@uid={'uid', 0x3d, 0xffffffffffffffff}}]}) 04:08:54 executing program 0: r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0x4}}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x30, r2, 0x805, 0x0, 0x0, {{0x1, 0x40030000000000}, 0x0, 0x6, 0x0, {0x14, 0x19, {0x7}}}}, 0x30}}, 0x0) 04:08:54 executing program 1: r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f0000000000)="24036e001e0025eaa87865f51ef6bce90a04000200bff20182a9000c080009000d000000", 0x24) 04:08:54 executing program 3: r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0x4}}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x30, r2, 0x805, 0x0, 0x0, {{0x1, 0x40030000000000}, 0x0, 0x6, 0x0, {0x14, 0x19, {0x5}}}}, 0x30}}, 0x0) [ 666.045194][ T2495] hfs: invalid uid -1 [ 666.060996][ T2495] hfs: unable to parse mount options 04:08:54 executing program 3: r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0x4}}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x30, r2, 0x805, 0x0, 0x0, {{0x1, 0x40030000000000}, 0x0, 0x6, 0x0, {0x14, 0x19, {0x6}}}}, 0x30}}, 0x0) 04:08:54 executing program 0: r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0x4}}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x30, r2, 0x805, 0x0, 0x0, {{0x1, 0x40030000000000}, 0x0, 0x6, 0x0, {0x14, 0x19, {0xa}}}}, 0x30}}, 0x0) 04:08:54 executing program 1: r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f0000000000)="24006f001e0025eaa87865f51ef6bce90a04000200bff20182a9000c080009000d000000", 0x24) [ 666.175430][ T2495] hfs: invalid uid -1 [ 666.197644][ T2495] hfs: unable to parse mount options 04:08:55 executing program 4: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x2001002, 0x0) mount$bpf(0xf0ffffffffffff, &(0x7f0000000080)='./file0\x00', 0x0, 0x44000, 0x0) 04:08:55 executing program 2: syz_mount_image$hfs(&(0x7f00000000c0)='hfs\x00', &(0x7f0000000140)='./file0\x00', 0x5, 0x0, 0x0, 0x0, &(0x7f0000000540)={[{@uid={'uid', 0x3d, 0xffffffffffffffff}}]}) 04:08:55 executing program 5: r0 = gettid() ioctl$RTC_VL_CLR(0xffffffffffffffff, 0x7014) r1 = creat(&(0x7f0000000100)='./file0\x00', 0x100010172) write$binfmt_script(r1, &(0x7f0000000900)=ANY=[@ANYBLOB="01"], 0x1) stat(&(0x7f00000005c0)='./file0\x00', 0x0) msgctl$IPC_SET(0x0, 0x1, &(0x7f0000000880)={{0x0, 0x0, 0x0, 0x0, 0x0, 0x104, 0x8}, 0x0, 0x0, 0x0, 0x200, 0x80, 0x0, r0, r0}) prctl$PR_SET_PTRACER(0x59616d61, r0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r1) fsetxattr$trusted_overlay_origin(0xffffffffffffffff, 0x0, &(0x7f00000000c0)='y\x00', 0x2, 0x1) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) 04:08:55 executing program 1: r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f0000000000)="24016f001e0025eaa87865f51ef6bce90a04000200bff20182a9000c080009000d000000", 0x24) 04:08:55 executing program 0: r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0x4}}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x30, r2, 0x805, 0x0, 0x0, {{0x1, 0x40030000000000}, 0x0, 0x6, 0x0, {0x14, 0x19, {0xe}}}}, 0x30}}, 0x0) 04:08:55 executing program 3: r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0x4}}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x30, r2, 0x805, 0x0, 0x0, {{0x1, 0x40030000000000}, 0x0, 0x6, 0x0, {0x14, 0x19, {0x7}}}}, 0x30}}, 0x0) [ 666.537451][ T2543] hfs: invalid uid -1 04:08:55 executing program 4: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x2001002, 0x0) mount$bpf(0x100000000000000, &(0x7f0000000080)='./file0\x00', 0x0, 0x44000, 0x0) [ 666.566800][ T2543] hfs: unable to parse mount options 04:08:55 executing program 1: r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f0000000000)="24026f001e0025eaa87865f51ef6bce90a04000200bff20182a9000c080009000d000000", 0x24) [ 666.686531][ T2543] hfs: invalid uid -1 [ 666.700936][ T2543] hfs: unable to parse mount options 04:08:55 executing program 0: r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0x4}}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x30, r2, 0x805, 0x0, 0x0, {{0x1, 0x40030000000000}, 0x0, 0x6, 0x0, {0x14, 0x19, {0xf}}}}, 0x30}}, 0x0) 04:08:55 executing program 3: r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0x4}}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x30, r2, 0x805, 0x0, 0x0, {{0x1, 0x40030000000000}, 0x0, 0x6, 0x0, {0x14, 0x19, {0xa}}}}, 0x30}}, 0x0) 04:08:55 executing program 2: syz_mount_image$hfs(&(0x7f00000000c0)='hfs\x00', &(0x7f0000000140)='./file0\x00', 0x6, 0x0, 0x0, 0x0, &(0x7f0000000540)={[{@uid={'uid', 0x3d, 0xffffffffffffffff}}]}) 04:08:55 executing program 1: r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f0000000000)="24036f001e0025eaa87865f51ef6bce90a04000200bff20182a9000c080009000d000000", 0x24) 04:08:55 executing program 4: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x2001002, 0x0) mount$bpf(0x200000000000000, &(0x7f0000000080)='./file0\x00', 0x0, 0x44000, 0x0) 04:08:55 executing program 3: r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0x4}}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x30, r2, 0x805, 0x0, 0x0, {{0x1, 0x40030000000000}, 0x0, 0x6, 0x0, {0x14, 0x19, {0xe}}}}, 0x30}}, 0x0) [ 666.971263][ T2586] hfs: invalid uid -1 [ 667.003288][ T2586] hfs: unable to parse mount options [ 667.070651][ T2586] hfs: invalid uid -1 [ 667.078690][ T2586] hfs: unable to parse mount options 04:08:58 executing program 5: r0 = perf_event_open(&(0x7f0000000580)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) epoll_pwait(0xffffffffffffffff, 0x0, 0x0, 0x10000000000000b0, &(0x7f0000000600), 0xffffffffffffff71) recvfrom$packet(0xffffffffffffffff, &(0x7f00000001c0), 0x0, 0x40000040, &(0x7f0000000280)={0x11, 0x0, 0x0, 0x1, 0x1, 0x6, @local}, 0x14) ioctl$VT_WAITACTIVE(0xffffffffffffffff, 0x5607) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ptmx\x00', 0x28002, 0x0) ioctl$KVM_IRQ_LINE_STATUS(0xffffffffffffffff, 0xc008ae67, &(0x7f0000000040)={0x100000001, 0x7}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000002c0)={{{@in=@dev, @in=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@initdev}, 0x0, @in=@loopback}}, &(0x7f0000000140)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000003c0)={{{@in6=@mcast2, @in6=@ipv4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6}, 0x0, @in=@remote}}, 0x0) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000640)={{{@in=@multicast2, @in=@local, 0x4e22, 0x0, 0x4e21, 0x80, 0x2, 0x80, 0x20, 0x0, r2, r3}, {0x0, 0x40, 0xfffffffffffff800, 0x0, 0x270a, 0x1, 0x2e8e, 0x80000001}, {0x5, 0x520, 0x8, 0x81}, 0x7fff, 0x6e6bba, 0x0, 0x1}, {{@in6=@mcast1, 0x4d4}, 0xfaa9c74d4b2c2cad, @in6=@ipv4={[], [], @local}, 0x3505, 0x4, 0x0, 0x2, 0x0, 0x2, 0x5}}, 0xe8) r4 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/btrfs-control\x00', 0x200000, 0x0) r5 = gettid() perf_event_open(&(0x7f00000004c0)={0x1, 0x70, 0x1ff, 0x2, 0x3, 0x5, 0x0, 0x7ff, 0x2, 0x4, 0x7, 0x8001, 0x3f, 0x2, 0x0, 0x0, 0x1, 0x10001, 0x800, 0x3d3, 0x7, 0x2, 0x1, 0x3, 0x8, 0x10001, 0x0, 0x1, 0xffffffff, 0x6, 0x7, 0xfffffffffffffffb, 0x100000001, 0x80000000, 0x4, 0x1, 0x2, 0x7, 0x0, 0x6, 0x2, @perf_config_ext={0xffffffff, 0x62}, 0x10, 0x8, 0x401, 0x8, 0xfff, 0x3ff, 0xfff}, r5, 0xa, r0, 0x8) ioctl$RTC_VL_READ(r4, 0x80047013, &(0x7f0000000180)) ioctl$TIOCSETD(r1, 0x5423, &(0x7f00000000c0)=0x6) 04:08:58 executing program 1: r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f0000000000)="240070001e0025eaa87865f51ef6bce90a04000200bff20182a9000c080009000d000000", 0x24) 04:08:58 executing program 3: r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0x4}}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x30, r2, 0x805, 0x0, 0x0, {{0x1, 0x40030000000000}, 0x0, 0x6, 0x0, {0x14, 0x19, {0xf}}}}, 0x30}}, 0x0) 04:08:58 executing program 0: r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0x4}}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x30, r2, 0x805, 0x0, 0x0, {{0x1, 0x40030000000000}, 0x0, 0x6, 0x0, {0x14, 0x19, {0x48}}}}, 0x30}}, 0x0) 04:08:58 executing program 4: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x2001002, 0x0) mount$bpf(0x300000000000000, &(0x7f0000000080)='./file0\x00', 0x0, 0x44000, 0x0) 04:08:58 executing program 2: syz_mount_image$hfs(&(0x7f00000000c0)='hfs\x00', &(0x7f0000000140)='./file0\x00', 0x7, 0x0, 0x0, 0x0, &(0x7f0000000540)={[{@uid={'uid', 0x3d, 0xffffffffffffffff}}]}) [ 669.652464][ T2626] hfs: invalid uid -1 04:08:58 executing program 0: r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0x4}}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x30, r2, 0x805, 0x0, 0x0, {{0x1, 0x40030000000000}, 0x0, 0x6, 0x0, {0x14, 0x19, {0x4c}}}}, 0x30}}, 0x0) 04:08:58 executing program 1: r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f0000000000)="240170001e0025eaa87865f51ef6bce90a04000200bff20182a9000c080009000d000000", 0x24) [ 669.675425][ T2626] hfs: unable to parse mount options 04:08:58 executing program 4: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x2001002, 0x0) mount$bpf(0x400000000000000, &(0x7f0000000080)='./file0\x00', 0x0, 0x44000, 0x0) 04:08:58 executing program 3: r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0x4}}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x30, r2, 0x805, 0x0, 0x0, {{0x1, 0x40030000000000}, 0x0, 0x6, 0x0, {0x14, 0x19, {0x48}}}}, 0x30}}, 0x0) [ 669.775180][ T2626] hfs: invalid uid -1 [ 669.801736][ T2626] hfs: unable to parse mount options 04:08:58 executing program 1: r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f0000000000)="240270001e0025eaa87865f51ef6bce90a04000200bff20182a9000c080009000d000000", 0x24) 04:08:58 executing program 2: syz_mount_image$hfs(&(0x7f00000000c0)='hfs\x00', &(0x7f0000000140)='./file0\x00', 0x8, 0x0, 0x0, 0x0, &(0x7f0000000540)={[{@uid={'uid', 0x3d, 0xffffffffffffffff}}]}) 04:08:58 executing program 5: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000600)='/dev/zero\x00', 0x0, 0x0) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000640)={0xb03, 0x519e195d8ef5afc7, 0x2000}, 0x4) r1 = socket$inet6(0xa, 0x5, 0x0) getsockopt$inet6_buf(r1, 0x29, 0x3c, 0x0, &(0x7f0000000680)=0x54) vmsplice(r1, &(0x7f00000001c0)=[{&(0x7f0000000000)="aea8f29bfea8c3318d8f9d389d82acbb6cac40de28175cb7af45b34d4bd38bcda12956b789175f5000c29c0550b9cef6879938ef4a42299ee4b7984a531d251b6655b3052295f70a29f5a21d14c6bf6a6caf0fb076c368bb18efee3160ca97b113050b6dee40adaf49da7ba3966abd3015366f146b8d423698a6507a363cfcea61ae6f13046d9543ae7ebbe4e8c0573f017d4c4216d7c778ee9fb0f4f4e58cd5058cb84c124a73475b9c6e1c43aa0a0fd8b8ac46e9dd4a940663742d79877f1a9f9e7f23e444a3c1f65277", 0xcb}, {&(0x7f0000000100)="302375e0274ad1bfc49c178ab212803cc8ca9c2a46cd784f9d66a3abaec236755f5873be4d41cddd54966ab1c42c75169bb3cd357f82495f60e85807bd2847ffab5b355bd1958a5dfd4e51bccaa45364cab6fb525d4ee94980a986a93bbd4bd7cacd0548baca2af667d7e745eee96c28cc794a8c38b98b5563e063f5ec3c1c4a9f70d46a63311afc0509da962056b437a98a417441b0a1d23c", 0x99}, {&(0x7f0000000240)="8e3d8b92caf613211f9dea42f2e7c72853433fd59c19196bcbea07d4ed226a3d3b75011873ad6f8f0bbf8cd4ce0e2fca5f44621d961e47fb3b5cdbb223f7660b1b9737c1c5d42fbcb7af9a21329f512ce48e72ea8650c92957be5d0059d38202eff1951c8d220d27ed26696a7d763d86d4885508af085fd2fd75", 0x7a}, {&(0x7f00000002c0)="58f259682d6baf21e02567b063e6d47be133e2d452198ab13e3a1e096c1d9539514addf30a572d3821e5246406948f7fbc766847ff9a01a403d081af0bb46bd5fe5ae6e2285ef8c17eee8874f528bd99ebc6f9b4aed815e18ca5ccda204f6f7cabf735907178f91bb81a72c0eb80cc9986d2c913bf1157154d18c70661dadd2d939878cfbed961f2163682536ac7fd8aec6b84c8d91117606b2069d8a8", 0x9d}], 0x4, 0x2) fcntl$getflags(r1, 0x401) ioctl$MON_IOCX_MFETCH(0xffffffffffffffff, 0xc0109207, &(0x7f0000000480)={&(0x7f0000000440)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0xa, 0x8}) socketpair(0x5, 0x3, 0x7, &(0x7f00000006c0)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$inet_dccp_buf(r3, 0x21, 0xc, &(0x7f00000003c0)="ce57", 0x2) fsetxattr$security_selinux(r1, &(0x7f0000000200)='security.selinux\x00', &(0x7f0000000380)='system_u:object_r:crond_var_run_t:s0\x00', 0x25, 0x1) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r1, 0x84, 0x9, &(0x7f00000004c0)={0x0, @in6={{0xa, 0x4e21, 0x7, @mcast1, 0x1}}, 0x400, 0x100000001, 0xd8, 0x0, 0x1}, &(0x7f0000000580)=0x98) setsockopt$inet_sctp6_SCTP_DELAYED_SACK(r3, 0x84, 0x10, &(0x7f00000005c0)=@sack_info={r4, 0x400, 0x1}, 0xc) setsockopt$TIPC_GROUP_LEAVE(r2, 0x10f, 0x88) 04:08:58 executing program 3: r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0x4}}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x30, r2, 0x805, 0x0, 0x0, {{0x1, 0x40030000000000}, 0x0, 0x6, 0x0, {0x14, 0x19, {0x4c}}}}, 0x30}}, 0x0) 04:08:58 executing program 0: r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0x4}}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x30, r2, 0x805, 0x0, 0x0, {{0x1, 0x40030000000000}, 0x0, 0x6, 0x0, {0x14, 0x19, {0x60}}}}, 0x30}}, 0x0) 04:08:58 executing program 4: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x2001002, 0x0) mount$bpf(0x500000000000000, &(0x7f0000000080)='./file0\x00', 0x0, 0x44000, 0x0) 04:08:58 executing program 1: r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f0000000000)="240370001e0025eaa87865f51ef6bce90a04000200bff20182a9000c080009000d000000", 0x24) [ 670.093042][ T2662] hfs: invalid uid -1 [ 670.121804][ T2662] hfs: unable to parse mount options 04:08:58 executing program 3: r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0x4}}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x30, r2, 0x805, 0x0, 0x0, {{0x1, 0x40030000000000}, 0x0, 0x6, 0x0, {0x14, 0x19, {0x60}}}}, 0x30}}, 0x0) 04:08:59 executing program 0: r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0x4}}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x30, r2, 0x805, 0x0, 0x0, {{0x1, 0x40030000000000}, 0x0, 0x6, 0x0, {0x14, 0x19, {0x68}}}}, 0x30}}, 0x0) [ 670.197306][ T2662] hfs: invalid uid -1 [ 670.201316][ T2662] hfs: unable to parse mount options 04:08:59 executing program 1: r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f0000000000)="240071001e0025eaa87865f51ef6bce90a04000200bff20182a9000c080009000d000000", 0x24) 04:08:59 executing program 5: lgetxattr(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)=@known='com.apple.FinderInfo\x00', &(0x7f0000000100)=""/91, 0x5b) r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000003c0)={0xa, 0x2}, 0x1c) setsockopt$inet_tcp_int(r0, 0x6, 0xc, &(0x7f0000000000), 0x4) r2 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/btrfs-control\x00', 0x80, 0x0) ioctl$KVM_SET_BOOT_CPU_ID(r2, 0xae78, &(0x7f0000000200)) bind$inet6(r1, &(0x7f0000000180)={0xa, 0x4e23, 0x2, @local}, 0x1c) listen(r1, 0x0) connect$inet(r0, &(0x7f0000000040)={0x2, 0x2, @empty}, 0x10) 04:08:59 executing program 2: syz_mount_image$hfs(&(0x7f00000000c0)='hfs\x00', &(0x7f0000000140)='./file0\x00', 0x9, 0x0, 0x0, 0x0, &(0x7f0000000540)={[{@uid={'uid', 0x3d, 0xffffffffffffffff}}]}) 04:08:59 executing program 4: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x2001002, 0x0) mount$bpf(0x600000000000000, &(0x7f0000000080)='./file0\x00', 0x0, 0x44000, 0x0) 04:08:59 executing program 0: r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0x4}}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x30, r2, 0x805, 0x0, 0x0, {{0x1, 0x40030000000000}, 0x0, 0x6, 0x0, {0x14, 0x19, {0x6c}}}}, 0x30}}, 0x0) 04:08:59 executing program 3: r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0x4}}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x30, r2, 0x805, 0x0, 0x0, {{0x1, 0x40030000000000}, 0x0, 0x6, 0x0, {0x14, 0x19, {0x68}}}}, 0x30}}, 0x0) 04:08:59 executing program 1: r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f0000000000)="240171001e0025eaa87865f51ef6bce90a04000200bff20182a9000c080009000d000000", 0x24) [ 670.461630][ C0] TCP: request_sock_TCP: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. [ 670.545706][ T2707] hfs: invalid uid -1 [ 670.561180][ T2707] hfs: unable to parse mount options 04:08:59 executing program 4: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x2001002, 0x0) mount$bpf(0x700000000000000, &(0x7f0000000080)='./file0\x00', 0x0, 0x44000, 0x0) 04:08:59 executing program 5: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000001880)='/dev/full\x00', 0x40, 0x0) r1 = open_tree(0xffffffffffffffff, &(0x7f00000018c0)='./file0\x00', 0x0) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, r1, &(0x7f0000001900)={0x90000001}) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x8) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r2 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, 0x0) fchdir(r2) r3 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r3, &(0x7f0000000300)=ANY=[@ANYBLOB="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"], 0x131) clock_gettime(0x0, &(0x7f0000001940)={0x0, 0x0}) write$evdev(r2, &(0x7f0000001980)=[{{r4, r5/1000+10000}, 0x14, 0x5, 0x7fffffff}], 0x18) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet_sctp6_SCTP_AUTOCLOSE(r0, 0x84, 0x4, &(0x7f00000000c0)=0x6, 0x4) iopl(0x3ffffffffffe) sendfile(r3, r3, &(0x7f0000000000), 0x8080fffffffe) open(&(0x7f0000000080)='./file0\x00', 0xc4000141041, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee68, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 04:08:59 executing program 1: r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f0000000000)="240271001e0025eaa87865f51ef6bce90a04000200bff20182a9000c080009000d000000", 0x24) [ 670.640624][ T2707] hfs: invalid uid -1 [ 670.654112][ T2707] hfs: unable to parse mount options 04:08:59 executing program 2: syz_mount_image$hfs(&(0x7f00000000c0)='hfs\x00', &(0x7f0000000140)='./file0\x00', 0xa, 0x0, 0x0, 0x0, &(0x7f0000000540)={[{@uid={'uid', 0x3d, 0xffffffffffffffff}}]}) 04:08:59 executing program 0: r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0x4}}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x30, r2, 0x805, 0x0, 0x0, {{0x1, 0x40030000000000}, 0x0, 0x6, 0x0, {0x14, 0x19, {0x74}}}}, 0x30}}, 0x0) 04:08:59 executing program 3: r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0x4}}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x30, r2, 0x805, 0x0, 0x0, {{0x1, 0x40030000000000}, 0x0, 0x6, 0x0, {0x14, 0x19, {0x6c}}}}, 0x30}}, 0x0) 04:08:59 executing program 4: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x2001002, 0x0) mount$bpf(0x800000000000000, &(0x7f0000000080)='./file0\x00', 0x0, 0x44000, 0x0) 04:08:59 executing program 1: r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f0000000000)="240371001e0025eaa87865f51ef6bce90a04000200bff20182a9000c080009000d000000", 0x24) [ 671.040210][ T2749] hfs: invalid uid -1 04:08:59 executing program 0: r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0x4}}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x30, r2, 0x805, 0x0, 0x0, {{0x1, 0x40030000000000}, 0x0, 0x6, 0x0, {0x14, 0x19, {0x7a}}}}, 0x30}}, 0x0) [ 671.061592][ T2749] hfs: unable to parse mount options 04:08:59 executing program 3: r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0x4}}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x30, r2, 0x805, 0x0, 0x0, {{0x1, 0x40030000000000}, 0x0, 0x6, 0x0, {0x14, 0x19, {0x74}}}}, 0x30}}, 0x0) [ 671.129754][ T2749] hfs: invalid uid -1 [ 671.135290][ T2749] hfs: unable to parse mount options 04:09:00 executing program 1: r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f0000000000)="240072001e0025eaa87865f51ef6bce90a04000200bff20182a9000c080009000d000000", 0x24) 04:09:00 executing program 4: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x2001002, 0x0) mount$bpf(0x2000000000000000, &(0x7f0000000080)='./file0\x00', 0x0, 0x44000, 0x0) 04:09:00 executing program 2: syz_mount_image$hfs(&(0x7f00000000c0)='hfs\x00', &(0x7f0000000140)='./file0\x00', 0xb, 0x0, 0x0, 0x0, &(0x7f0000000540)={[{@uid={'uid', 0x3d, 0xffffffffffffffff}}]}) [ 671.446151][ T2776] hfs: invalid uid -1 [ 671.482684][ T2776] hfs: unable to parse mount options [ 671.526127][ T2776] hfs: invalid uid -1 [ 671.530133][ T2776] hfs: unable to parse mount options 04:09:00 executing program 5: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000001880)='/dev/full\x00', 0x40, 0x0) r1 = open_tree(0xffffffffffffffff, &(0x7f00000018c0)='./file0\x00', 0x0) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, r1, &(0x7f0000001900)={0x90000001}) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x8) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r2 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, 0x0) fchdir(r2) r3 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r3, &(0x7f0000000300)=ANY=[@ANYBLOB="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"], 0x131) clock_gettime(0x0, &(0x7f0000001940)={0x0, 0x0}) write$evdev(r2, &(0x7f0000001980)=[{{r4, r5/1000+10000}, 0x14, 0x5, 0x7fffffff}], 0x18) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet_sctp6_SCTP_AUTOCLOSE(r0, 0x84, 0x4, &(0x7f00000000c0)=0x6, 0x4) iopl(0x3ffffffffffe) sendfile(r3, r3, &(0x7f0000000000), 0x8080fffffffe) open(&(0x7f0000000080)='./file0\x00', 0xc4000141041, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee68, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 04:09:00 executing program 0: r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0x4}}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x30, r2, 0x805, 0x0, 0x0, {{0x1, 0x40030000000000}, 0x0, 0x6, 0x0, {0x14, 0x19, {0xf0}}}}, 0x30}}, 0x0) 04:09:00 executing program 1: r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f0000000000)="240172001e0025eaa87865f51ef6bce90a04000200bff20182a9000c080009000d000000", 0x24) 04:09:00 executing program 3: r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0x4}}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x30, r2, 0x805, 0x0, 0x0, {{0x1, 0x40030000000000}, 0x0, 0x6, 0x0, {0x14, 0x19, {0x7a}}}}, 0x30}}, 0x0) 04:09:00 executing program 4: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x2001002, 0x0) mount$bpf(0x2010000000000000, &(0x7f0000000080)='./file0\x00', 0x0, 0x44000, 0x0) 04:09:00 executing program 2: syz_mount_image$hfs(&(0x7f00000000c0)='hfs\x00', &(0x7f0000000140)='./file0\x00', 0x10, 0x0, 0x0, 0x0, &(0x7f0000000540)={[{@uid={'uid', 0x3d, 0xffffffffffffffff}}]}) 04:09:00 executing program 1: r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f0000000000)="240272001e0025eaa87865f51ef6bce90a04000200bff20182a9000c080009000d000000", 0x24) 04:09:00 executing program 3: r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0x4}}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x30, r2, 0x805, 0x0, 0x0, {{0x1, 0x40030000000000}, 0x0, 0x6, 0x0, {0x14, 0x19, {0xf0}}}}, 0x30}}, 0x0) 04:09:00 executing program 0: r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0x4}}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x30, r2, 0x805, 0x0, 0x0, {{0x1, 0x40030000000000}, 0x0, 0x6, 0x0, {0x14, 0x19, {0x287}}}}, 0x30}}, 0x0) [ 671.874023][ T2795] hfs: invalid uid -1 [ 671.891657][ T2795] hfs: unable to parse mount options 04:09:00 executing program 4: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x2001002, 0x0) mount$bpf(0x4000000000000000, &(0x7f0000000080)='./file0\x00', 0x0, 0x44000, 0x0) 04:09:00 executing program 1: r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f0000000000)="240372001e0025eaa87865f51ef6bce90a04000200bff20182a9000c080009000d000000", 0x24) [ 671.996866][ T2795] hfs: invalid uid -1 [ 672.005614][ T2795] hfs: unable to parse mount options 04:09:00 executing program 3: r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0x4}}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x30, r2, 0x805, 0x0, 0x0, {{0x1, 0x40030000000000}, 0x0, 0x6, 0x0, {0x14, 0x19, {0x22f}}}}, 0x30}}, 0x0) 04:09:01 executing program 5: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000001880)='/dev/full\x00', 0x40, 0x0) r1 = open_tree(0xffffffffffffffff, &(0x7f00000018c0)='./file0\x00', 0x0) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, r1, &(0x7f0000001900)={0x90000001}) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x8) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r2 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, 0x0) fchdir(r2) r3 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r3, &(0x7f0000000300)=ANY=[@ANYBLOB="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"], 0x131) clock_gettime(0x0, &(0x7f0000001940)={0x0, 0x0}) write$evdev(r2, &(0x7f0000001980)=[{{r4, r5/1000+10000}, 0x14, 0x5, 0x7fffffff}], 0x18) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet_sctp6_SCTP_AUTOCLOSE(r0, 0x84, 0x4, &(0x7f00000000c0)=0x6, 0x4) iopl(0x3ffffffffffe) sendfile(r3, r3, &(0x7f0000000000), 0x8080fffffffe) open(&(0x7f0000000080)='./file0\x00', 0xc4000141041, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee68, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 04:09:01 executing program 2: syz_mount_image$hfs(&(0x7f00000000c0)='hfs\x00', &(0x7f0000000140)='./file0\x00', 0x48, 0x0, 0x0, 0x0, &(0x7f0000000540)={[{@uid={'uid', 0x3d, 0xffffffffffffffff}}]}) 04:09:01 executing program 1: r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f0000000000)="240073001e0025eaa87865f51ef6bce90a04000200bff20182a9000c080009000d000000", 0x24) 04:09:01 executing program 0: r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0x4}}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x30, r2, 0x805, 0x0, 0x0, {{0x1, 0x40030000000000}, 0x0, 0x6, 0x0, {0x14, 0x19, {0x300}}}}, 0x30}}, 0x0) 04:09:01 executing program 4: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x2001002, 0x0) mount$bpf(0x8cffffff00000000, &(0x7f0000000080)='./file0\x00', 0x0, 0x44000, 0x0) 04:09:01 executing program 3: r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0x4}}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x30, r2, 0x805, 0x0, 0x0, {{0x1, 0x40030000000000}, 0x0, 0x6, 0x0, {0x14, 0x19, {0x300}}}}, 0x30}}, 0x0) 04:09:01 executing program 3: r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0x4}}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x30, r2, 0x805, 0x0, 0x0, {{0x1, 0x40030000000000}, 0x0, 0x6, 0x0, {0x14, 0x19, {0x500}}}}, 0x30}}, 0x0) [ 672.533914][ T2849] hfs: invalid uid -1 [ 672.550990][ T2849] hfs: unable to parse mount options 04:09:01 executing program 1: r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f0000000000)="240173001e0025eaa87865f51ef6bce90a04000200bff20182a9000c080009000d000000", 0x24) 04:09:01 executing program 4: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x2001002, 0x0) mount$bpf(0xf6ffffff00000000, &(0x7f0000000080)='./file0\x00', 0x0, 0x44000, 0x0) 04:09:01 executing program 0: r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0x4}}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x30, r2, 0x805, 0x0, 0x0, {{0x1, 0x40030000000000}, 0x0, 0x6, 0x0, {0x14, 0x19, {0x500}}}}, 0x30}}, 0x0) 04:09:01 executing program 2: syz_mount_image$hfs(&(0x7f00000000c0)='hfs\x00', &(0x7f0000000140)='./file0\x00', 0x4c, 0x0, 0x0, 0x0, &(0x7f0000000540)={[{@uid={'uid', 0x3d, 0xffffffffffffffff}}]}) 04:09:01 executing program 3: r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0x4}}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x30, r2, 0x805, 0x0, 0x0, {{0x1, 0x40030000000000}, 0x0, 0x6, 0x0, {0x14, 0x19, {0x600}}}}, 0x30}}, 0x0) [ 672.985491][ T2888] hfs: invalid uid -1 [ 673.000986][ T2888] hfs: unable to parse mount options [ 673.082561][ T2888] hfs: invalid uid -1 [ 673.090709][ T2888] hfs: unable to parse mount options 04:09:02 executing program 5: r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) ioctl$int_in(0xffffffffffffffff, 0x0, 0x0) r2 = syz_open_dev$media(&(0x7f00000000c0)='/dev/media#\x00', 0x0, 0x101000) io_uring_register$IORING_REGISTER_FILES(r2, 0x2, &(0x7f0000000100)=[r1, r0, r1], 0x3) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) ioprio_set$pid(0x2, 0x0, 0x7c39) clone(0x20008577, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0x4009000, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000040)={&(0x7f0000000000)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000080)={0x0, r3, 0xd, 0x2}, 0x14) 04:09:02 executing program 1: r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f0000000000)="240273001e0025eaa87865f51ef6bce90a04000200bff20182a9000c080009000d000000", 0x24) 04:09:02 executing program 4: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x2001002, 0x0) mount$bpf(0xff00000000000000, &(0x7f0000000080)='./file0\x00', 0x0, 0x44000, 0x0) 04:09:02 executing program 0: r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0x4}}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x30, r2, 0x805, 0x0, 0x0, {{0x1, 0x40030000000000}, 0x0, 0x6, 0x0, {0x14, 0x19, {0x600}}}}, 0x30}}, 0x0) 04:09:02 executing program 3: r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0x4}}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x30, r2, 0x805, 0x0, 0x0, {{0x1, 0x40030000000000}, 0x0, 0x6, 0x0, {0x14, 0x19, {0x700}}}}, 0x30}}, 0x0) 04:09:02 executing program 2: syz_mount_image$hfs(&(0x7f00000000c0)='hfs\x00', &(0x7f0000000140)='./file0\x00', 0x60, 0x0, 0x0, 0x0, &(0x7f0000000540)={[{@uid={'uid', 0x3d, 0xffffffffffffffff}}]}) 04:09:02 executing program 1: r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f0000000000)="240373001e0025eaa87865f51ef6bce90a04000200bff20182a9000c080009000d000000", 0x24) [ 673.602431][ T2906] hfs: invalid uid -1 04:09:02 executing program 3: r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0x4}}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x30, r2, 0x805, 0x0, 0x0, {{0x1, 0x40030000000000}, 0x0, 0x6, 0x0, {0x14, 0x19, {0xa00}}}}, 0x30}}, 0x0) [ 673.623550][ T2906] hfs: unable to parse mount options 04:09:02 executing program 0: r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0x4}}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x30, r2, 0x805, 0x0, 0x0, {{0x1, 0x40030000000000}, 0x0, 0x6, 0x0, {0x14, 0x19, {0x700}}}}, 0x30}}, 0x0) 04:09:02 executing program 4: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x2001002, 0x0) mount$bpf(0xfffffffffffff000, &(0x7f0000000080)='./file0\x00', 0x0, 0x44000, 0x0) 04:09:02 executing program 1: r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f0000000000)="240074001e0025eaa87865f51ef6bce90a04000200bff20182a9000c080009000d000000", 0x24) [ 673.784885][ T2906] hfs: invalid uid -1 [ 673.789132][ T2906] hfs: unable to parse mount options 04:09:02 executing program 3: r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0x4}}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x30, r2, 0x805, 0x0, 0x0, {{0x1, 0x40030000000000}, 0x0, 0x6, 0x0, {0x14, 0x19, {0xe00}}}}, 0x30}}, 0x0) 04:09:02 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)=ANY=[@ANYBLOB="2c0000002f0005030000000000ffffff0c0000001800030014000000fe8000000000000000000000000000bb"], 0x2c}, 0x1, 0xffffff7f0e000000}, 0x0) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') sendmsg$TIPC_NL_MON_GET(r0, &(0x7f0000000240)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x18002}, 0xc, &(0x7f0000000200)={&(0x7f0000000140)={0xb0, r1, 0x4, 0x70bd2d, 0x25dfdbff, {}, [@TIPC_NLA_NET={0x58, 0x7, [@TIPC_NLA_NET_ADDR={0x8, 0x2, 0x3f}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x2}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x4}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x10001}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x5}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0xfff}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x6}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x100000001}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x3}]}, @TIPC_NLA_MON={0x14, 0x9, [@TIPC_NLA_MON_REF={0x8, 0x2, 0x8}, @TIPC_NLA_MON_REF={0x8, 0x2, 0xffff}]}, @TIPC_NLA_MEDIA={0x30, 0x5, [@TIPC_NLA_MEDIA_PROP={0x2c, 0x2, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xd}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0xfff}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x2}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0xff}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x7fff}]}]}]}, 0xb0}, 0x1, 0x0, 0x0, 0x20000000}, 0x40) 04:09:02 executing program 0: r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0x4}}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x30, r2, 0x805, 0x0, 0x0, {{0x1, 0x40030000000000}, 0x0, 0x6, 0x0, {0x14, 0x19, {0xa00}}}}, 0x30}}, 0x0) 04:09:02 executing program 4: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x2001002, 0x0) mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x40002, 0x0) 04:09:02 executing program 1: r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f0000000000)="240174001e0025eaa87865f51ef6bce90a04000200bff20182a9000c080009000d000000", 0x24) 04:09:02 executing program 2: syz_mount_image$hfs(&(0x7f00000000c0)='hfs\x00', &(0x7f0000000140)='./file0\x00', 0x68, 0x0, 0x0, 0x0, &(0x7f0000000540)={[{@uid={'uid', 0x3d, 0xffffffffffffffff}}]}) 04:09:02 executing program 3: r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0x4}}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x30, r2, 0x805, 0x0, 0x0, {{0x1, 0x40030000000000}, 0x0, 0x6, 0x0, {0x14, 0x19, {0xf00}}}}, 0x30}}, 0x0) [ 674.098321][ T2957] hfs: invalid uid -1 [ 674.102337][ T2957] hfs: unable to parse mount options 04:09:02 executing program 0: r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0x4}}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x30, r2, 0x805, 0x0, 0x0, {{0x1, 0x40030000000000}, 0x0, 0x6, 0x0, {0x14, 0x19, {0xe00}}}}, 0x30}}, 0x0) 04:09:02 executing program 1: r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f0000000000)="240274001e0025eaa87865f51ef6bce90a04000200bff20182a9000c080009000d000000", 0x24) 04:09:03 executing program 4: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x2001002, 0x0) mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x40010, 0x0) 04:09:03 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$usb(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x40000fffffb, 0x0) mmap$binder(&(0x7f0000e00000/0x200000)=nil, 0x200000, 0x1, 0x11, r0, 0x0) pselect6(0x40, &(0x7f0000000040)={0x4, 0x0, 0x4, 0xcc8, 0xd6a, 0x7, 0x8, 0x3f}, &(0x7f0000000080)={0x4, 0x7, 0x1, 0x0, 0x3, 0x5, 0x5, 0x8}, &(0x7f00000000c0)={0x9, 0x8, 0x2, 0xffffffff, 0x80000001, 0x1000, 0x0, 0xb1}, &(0x7f0000000100), &(0x7f0000000180)={&(0x7f0000000140)={0x75e}, 0x8}) setsockopt$TIPC_GROUP_JOIN(r0, 0x10f, 0x87, &(0x7f00000001c0)={0x42, 0x4, 0x2}, 0x10) [ 674.295352][ T2957] hfs: invalid uid -1 [ 674.299608][ T2957] hfs: unable to parse mount options 04:09:03 executing program 3: r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0x4}}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x30, r2, 0x805, 0x0, 0x0, {{0x1, 0x40030000000000}, 0x0, 0x6, 0x0, {0x14, 0x19, {0x2f02}}}}, 0x30}}, 0x0) 04:09:03 executing program 0: r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0x4}}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x30, r2, 0x805, 0x0, 0x0, {{0x1, 0x40030000000000}, 0x0, 0x6, 0x0, {0x14, 0x19, {0xf00}}}}, 0x30}}, 0x0) 04:09:03 executing program 4: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x2001002, 0x0) mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x40300, 0x0) 04:09:03 executing program 2: syz_mount_image$hfs(&(0x7f00000000c0)='hfs\x00', &(0x7f0000000140)='./file0\x00', 0x6c, 0x0, 0x0, 0x0, &(0x7f0000000540)={[{@uid={'uid', 0x3d, 0xffffffffffffffff}}]}) 04:09:03 executing program 1: r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f0000000000)="240374001e0025eaa87865f51ef6bce90a04000200bff20182a9000c080009000d000000", 0x24) [ 674.592486][ T2994] hfs: invalid uid -1 04:09:03 executing program 5: r0 = syz_open_dev$amidi(&(0x7f0000000040)='/dev/amidi#\x00', 0x1000, 0x8000) ioctl$RTC_ALM_SET(r0, 0x40247007, &(0x7f00000004c0)={0x2f, 0x3a, 0xd, 0x15, 0x0, 0x4, 0x6, 0x11e, 0x1}) r1 = syz_open_dev$mice(&(0x7f0000000480)='/dev/input/mice\x00', 0x0, 0x8000) ioctl$EVIOCGABS2F(r1, 0x8018456f, &(0x7f0000000080)=""/189) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x6, 0x209e21, 0x3, 0x1}, 0x2c) sendmsg$tipc(r1, &(0x7f0000000440)={&(0x7f0000000140)=@id={0x1e, 0x3, 0x3, {0x4e23, 0x2}}, 0x10, &(0x7f0000000340)=[{&(0x7f0000000200)="7dada0e47af8b5a1a2b29f4f0aded2eec7c30a23e080c582fb8c6324eddad3625f6d736cfed7cd38a160d65fb78301866e675630a466690f00cc28fb67e183907a199aa3d58952a4d343a4b7b0a618ffa12f4dc8636a85366a79a61e131c269b5a9f1a1c3d251e8f80421a9c6b278e6fc7", 0x71}, {&(0x7f0000000280)="baae37ce335285ffdbaac9d69734f75a81ea06cb325cc6ccff29b6aa090b2b77142470af9f584fc9db9d3cd29b06066e7b299355cedfd1d81f061443ed614b7351799dcc4712b9d0c05f9a6db6ab0ce741f8c6843d56dc8f64d19ddb10e32e400743b58679e4f9240c661989deca1f7e8aa0fdf69a2c53d4e124b3ee3b771f7f3fe2afc32c5484ffff214a109142f12ea980e5", 0x93}], 0x2, &(0x7f0000000380)="f22e910a2554dac9ad21f6b75e9067e98c2968c80ac6413807be0fda7070a083ebc2603fa5bdfa0b3d8615836dffc4123826058542d15396171bf88bb8cf3474541f34a6ec55b9221815dd17f9b2d6a92776ef9012c2d5abebf4ff0e9f6f5b33d395aca80373720b404387b8b5e64844412bb6c2189a5740b7012dbff303cc8ed1ceee651994077972e254", 0x8b, 0x40}, 0xb579773ed16d1a3a) 04:09:03 executing program 3: r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0x4}}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x30, r2, 0x805, 0x0, 0x0, {{0x1, 0x40030000000000}, 0x0, 0x6, 0x0, {0x14, 0x19, {0x3f00}}}}, 0x30}}, 0x0) [ 674.613261][ T2994] hfs: unable to parse mount options 04:09:03 executing program 0: r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0x4}}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x30, r2, 0x805, 0x0, 0x0, {{0x1, 0x40030000000000}, 0x0, 0x6, 0x0, {0x14, 0x19, {0x3f00}}}}, 0x30}}, 0x0) [ 674.701371][ T2994] hfs: invalid uid -1 04:09:03 executing program 1: r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f0000000000)="240075001e0025eaa87865f51ef6bce90a04000200bff20182a9000c080009000d000000", 0x24) 04:09:03 executing program 4: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x2001002, 0x0) mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x40500, 0x0) [ 674.724138][ T2994] hfs: unable to parse mount options 04:09:03 executing program 2: syz_mount_image$hfs(&(0x7f00000000c0)='hfs\x00', &(0x7f0000000140)='./file0\x00', 0x74, 0x0, 0x0, 0x0, &(0x7f0000000540)={[{@uid={'uid', 0x3d, 0xffffffffffffffff}}]}) 04:09:03 executing program 3: r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0x4}}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x30, r2, 0x805, 0x0, 0x0, {{0x1, 0x40030000000000}, 0x0, 0x6, 0x0, {0x14, 0x19, {0x4000}}}}, 0x30}}, 0x0) 04:09:03 executing program 0: r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0x4}}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x30, r2, 0x805, 0x0, 0x0, {{0x1, 0x40030000000000}, 0x0, 0x6, 0x0, {0x14, 0x19, {0x4000}}}}, 0x30}}, 0x0) 04:09:03 executing program 1: r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f0000000000)="240175001e0025eaa87865f51ef6bce90a04000200bff20182a9000c080009000d000000", 0x24) 04:09:03 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) ioctl$DRM_IOCTL_SET_CLIENT_CAP(r0, 0x4010640d, &(0x7f0000000100)={0x41e, 0x5}) r1 = creat(&(0x7f0000000140)='./file0\x00', 0x100010004) write$P9_RREAD(r1, &(0x7f0000000c00)=ANY=[@ANYBLOB='F'], 0x1) fallocate(r1, 0x0, 0x40000, 0xfff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fallocate(r0, 0x0, 0x0, 0x110001) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1, 0x0, 0x8}) ioctl$EXT4_IOC_GROUP_EXTEND(r0, 0x40086607, &(0x7f0000000000)=0x8) 04:09:03 executing program 4: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x2001002, 0x0) mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x40600, 0x0) [ 675.024123][ T3026] hfs: invalid uid -1 [ 675.072191][ T3026] hfs: unable to parse mount options 04:09:03 executing program 1: r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f0000000000)="240275001e0025eaa87865f51ef6bce90a04000200bff20182a9000c080009000d000000", 0x24) 04:09:03 executing program 3: r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0x4}}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x30, r2, 0x805, 0x0, 0x0, {{0x1, 0x40030000000000}, 0x0, 0x6, 0x0, {0x14, 0x19, {0x4800}}}}, 0x30}}, 0x0) [ 675.152749][ T3026] hfs: invalid uid -1 04:09:04 executing program 0: r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0x4}}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x30, r2, 0x805, 0x0, 0x0, {{0x1, 0x40030000000000}, 0x0, 0x6, 0x0, {0x14, 0x19, {0x4800}}}}, 0x30}}, 0x0) [ 675.196402][ T3026] hfs: unable to parse mount options [ 675.222339][ T3046] EXT4-fs warning (device sda1): ext4_group_extend:1768: can't shrink FS - resize aborted 04:09:04 executing program 1: r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f0000000000)="240375001e0025eaa87865f51ef6bce90a04000200bff20182a9000c080009000d000000", 0x24) 04:09:04 executing program 2: syz_mount_image$hfs(&(0x7f00000000c0)='hfs\x00', &(0x7f0000000140)='./file0\x00', 0x7a, 0x0, 0x0, 0x0, &(0x7f0000000540)={[{@uid={'uid', 0x3d, 0xffffffffffffffff}}]}) 04:09:04 executing program 4: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x2001002, 0x0) mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x40700, 0x0) 04:09:04 executing program 3: r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0x4}}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x30, r2, 0x805, 0x0, 0x0, {{0x1, 0x40030000000000}, 0x0, 0x6, 0x0, {0x14, 0x19, {0x4c00}}}}, 0x30}}, 0x0) [ 675.421028][ T26] audit: type=1800 audit(1566792544.204:679): pid=3038 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.5" name=7374617409C0D2FEBCF9DF2DEAC8C177FF171248E91193513049F831550D6F7DE66CF637BDBF1311920C8A26EDA4DCC3783F9DB5116B34D31B0512A5608AAFF01E7952340CD6FD dev="sda1" ino=17617 res=0 [ 675.463059][ T3064] hfs: invalid uid -1 [ 675.481369][ T3064] hfs: unable to parse mount options 04:09:04 executing program 1: r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f0000000000)="240076001e0025eaa87865f51ef6bce90a04000200bff20182a9000c080009000d000000", 0x24) 04:09:04 executing program 0: r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0x4}}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x30, r2, 0x805, 0x0, 0x0, {{0x1, 0x40030000000000}, 0x0, 0x6, 0x0, {0x14, 0x19, {0x4c00}}}}, 0x30}}, 0x0) 04:09:04 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) syncfs(r0) getsockopt$IP_VS_SO_GET_SERVICE(r0, 0x0, 0x483, &(0x7f0000000340), &(0x7f00000002c0)=0x68) [ 675.570491][ T3064] hfs: invalid uid -1 [ 675.588753][ T3064] hfs: unable to parse mount options 04:09:04 executing program 3: r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0x4}}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x30, r2, 0x805, 0x0, 0x0, {{0x1, 0x40030000000000}, 0x0, 0x6, 0x0, {0x14, 0x19, {0x6000}}}}, 0x30}}, 0x0) 04:09:04 executing program 2: syz_mount_image$hfs(&(0x7f00000000c0)='hfs\x00', &(0x7f0000000140)='./file0\x00', 0x300, 0x0, 0x0, 0x0, &(0x7f0000000540)={[{@uid={'uid', 0x3d, 0xffffffffffffffff}}]}) 04:09:04 executing program 1: r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f0000000000)="240176001e0025eaa87865f51ef6bce90a04000200bff20182a9000c080009000d000000", 0x24) 04:09:04 executing program 0: r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0x4}}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x30, r2, 0x805, 0x0, 0x0, {{0x1, 0x40030000000000}, 0x0, 0x6, 0x0, {0x14, 0x19, {0x6000}}}}, 0x30}}, 0x0) 04:09:04 executing program 4: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x2001002, 0x0) mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x40900, 0x0) 04:09:04 executing program 5: r0 = creat(&(0x7f0000000000)='./bus\x00', 0x0) write$apparmor_current(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="8020ae6d0f0771e7df091810c05916bca8fcc42d3c318df088e51e6b3cbfbf2cc7f5b2517ee0322eaa4ffb34f855edf4ef5b205677067585"], 0x11) fcntl$setstatus(r0, 0x4, 0xe95fcb27500075ab) io_setup(0x3, &(0x7f0000000100)=0x0) keyctl$KEYCTL_CAPABILITIES(0x1f, &(0x7f0000000140)=""/118, 0x76) ioctl$FIGETBSZ(r0, 0x2, &(0x7f0000000080)) io_submit(r1, 0x732, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x80000000000000, 0x1, 0x0, r0, &(0x7f0000000000), 0x377140be6b5ef4c7}]) 04:09:04 executing program 0: r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0x4}}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x30, r2, 0x805, 0x0, 0x0, {{0x1, 0x40030000000000}, 0x0, 0x6, 0x0, {0x14, 0x19, {0x6800}}}}, 0x30}}, 0x0) 04:09:04 executing program 3: r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0x4}}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x30, r2, 0x805, 0x0, 0x0, {{0x1, 0x40030000000000}, 0x0, 0x6, 0x0, {0x14, 0x19, {0x6800}}}}, 0x30}}, 0x0) 04:09:04 executing program 1: r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f0000000000)="240276001e0025eaa87865f51ef6bce90a04000200bff20182a9000c080009000d000000", 0x24) [ 676.048306][ T3116] hfs: invalid uid -1 [ 676.062581][ T3116] hfs: unable to parse mount options 04:09:04 executing program 4: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x2001002, 0x0) mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x40a00, 0x0) 04:09:04 executing program 0: r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0x4}}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x30, r2, 0x805, 0x0, 0x0, {{0x1, 0x40030000000000}, 0x0, 0x6, 0x0, {0x14, 0x19, {0x6c00}}}}, 0x30}}, 0x0) 04:09:04 executing program 3: r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0x4}}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x30, r2, 0x805, 0x0, 0x0, {{0x1, 0x40030000000000}, 0x0, 0x6, 0x0, {0x14, 0x19, {0x6c00}}}}, 0x30}}, 0x0) [ 676.158100][ T3116] hfs: invalid uid -1 [ 676.187280][ T3116] hfs: unable to parse mount options 04:09:05 executing program 5: mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x1000002, 0x400002172, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x2, 0x200000) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000580)={{{@in6=@mcast2, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@initdev}, 0x0, @in6=@dev}}, &(0x7f00000004c0)=0xe8) sendmsg$can_raw(r0, &(0x7f0000000700)={&(0x7f0000000500)={0x1d, r1}, 0x10, &(0x7f00000006c0)={&(0x7f0000000680)=@can={{0x1, 0x7, 0x195b, 0x3}, 0x2, 0x2, 0x0, 0x0, "1508a3ddaa230cf3"}, 0x10}, 0x1, 0x0, 0x0, 0x4081}, 0x40000) mremap(&(0x7f0000001000/0xc00000)=nil, 0xc00000, 0x2000, 0x0, &(0x7f0000c87000/0x2000)=nil) mmap(&(0x7f00008da000/0x1000)=nil, 0x1000, 0x0, 0xb4972, 0xffffffffffffffff, 0x0) r2 = creat(&(0x7f00000001c0)='./bus\x00', 0x0) fcntl$setstatus(r2, 0x4, 0x44000) getsockopt$SO_COOKIE(r2, 0x1, 0x39, &(0x7f0000000140), &(0x7f0000000180)=0x8) io_setup(0xa21, &(0x7f0000000380)=0x0) io_submit(r3, 0x732, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0xe00200, 0x80000000000000, 0x1, 0x0, r2, &(0x7f0000000000), 0x377140be6b5ef4c7}]) 04:09:05 executing program 2: syz_mount_image$hfs(&(0x7f00000000c0)='hfs\x00', &(0x7f0000000140)='./file0\x00', 0x500, 0x0, 0x0, 0x0, &(0x7f0000000540)={[{@uid={'uid', 0x3d, 0xffffffffffffffff}}]}) 04:09:05 executing program 1: r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f0000000000)="240376001e0025eaa87865f51ef6bce90a04000200bff20182a9000c080009000d000000", 0x24) 04:09:05 executing program 1: r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f0000000000)="240077001e0025eaa87865f51ef6bce90a04000200bff20182a9000c080009000d000000", 0x24) 04:09:05 executing program 0: r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0x4}}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x30, r2, 0x805, 0x0, 0x0, {{0x1, 0x40030000000000}, 0x0, 0x6, 0x0, {0x14, 0x19, {0x7400}}}}, 0x30}}, 0x0) 04:09:05 executing program 3: r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0x4}}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x30, r2, 0x805, 0x0, 0x0, {{0x1, 0x40030000000000}, 0x0, 0x6, 0x0, {0x14, 0x19, {0x7400}}}}, 0x30}}, 0x0) 04:09:05 executing program 4: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x2001002, 0x0) mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x40b00, 0x0) 04:09:05 executing program 0: r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0x4}}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x30, r2, 0x805, 0x0, 0x0, {{0x1, 0x40030000000000}, 0x0, 0x6, 0x0, {0x14, 0x19, {0x7a00}}}}, 0x30}}, 0x0) [ 676.547593][ T3168] hfs: invalid uid -1 04:09:05 executing program 1: r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f0000000000)="240177001e0025eaa87865f51ef6bce90a04000200bff20182a9000c080009000d000000", 0x24) [ 676.593253][ T3168] hfs: unable to parse mount options 04:09:05 executing program 3: r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0x4}}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x30, r2, 0x805, 0x0, 0x0, {{0x1, 0x40030000000000}, 0x0, 0x6, 0x0, {0x14, 0x19, {0x7a00}}}}, 0x30}}, 0x0) 04:09:05 executing program 5: futex(0x0, 0x400000000000085, 0x4, 0x0, &(0x7f0000000080), 0x3000000) 04:09:05 executing program 0: r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0x4}}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x30, r2, 0x805, 0x0, 0x0, {{0x1, 0x40030000000000}, 0x0, 0x6, 0x0, {0x14, 0x19, {0x8702}}}}, 0x30}}, 0x0) [ 676.676629][ T3168] hfs: invalid uid -1 [ 676.680757][ T3168] hfs: unable to parse mount options 04:09:05 executing program 4: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x2001002, 0x0) mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x40c00, 0x0) 04:09:05 executing program 2: syz_mount_image$hfs(&(0x7f00000000c0)='hfs\x00', &(0x7f0000000140)='./file0\x00', 0x600, 0x0, 0x0, 0x0, &(0x7f0000000540)={[{@uid={'uid', 0x3d, 0xffffffffffffffff}}]}) 04:09:05 executing program 1: r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f0000000000)="240277001e0025eaa87865f51ef6bce90a04000200bff20182a9000c080009000d000000", 0x24) 04:09:05 executing program 5: r0 = syz_init_net_socket$bt_sco(0x1f, 0x3, 0x6) r1 = dup(r0) ioctl$sock_bt_hidp_HIDPCONNADD(r1, 0x400448c8, &(0x7f0000000000)={r0, r0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz0\x00'}) 04:09:05 executing program 3: r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0x4}}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x30, r2, 0x805, 0x0, 0x0, {{0x1, 0x40030000000000}, 0x0, 0x6, 0x0, {0x14, 0x19, {0xf000}}}}, 0x30}}, 0x0) 04:09:05 executing program 0: r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0x4}}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x30, r2, 0x805, 0x0, 0x0, {{0x1, 0x40030000000000}, 0x0, 0x6, 0x0, {0x14, 0x19, {0xf000}}}}, 0x30}}, 0x0) [ 677.007171][ T3212] hfs: invalid uid -1 [ 677.021312][ T3212] hfs: unable to parse mount options 04:09:05 executing program 1: r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f0000000000)="240377001e0025eaa87865f51ef6bce90a04000200bff20182a9000c080009000d000000", 0x24) 04:09:05 executing program 4: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x2001002, 0x0) mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x40d00, 0x0) [ 677.119338][ T3212] hfs: invalid uid -1 [ 677.133285][ T3212] hfs: unable to parse mount options 04:09:06 executing program 5: r0 = socket$inet6(0xa, 0x6, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") getsockopt$IP_VS_SO_GET_INFO(r0, 0x0, 0x481, &(0x7f0000000080), &(0x7f00000000c0)=0xc) socket$inet_udplite(0x2, 0x2, 0x88) 04:09:06 executing program 2: syz_mount_image$hfs(&(0x7f00000000c0)='hfs\x00', &(0x7f0000000140)='./file0\x00', 0x700, 0x0, 0x0, 0x0, &(0x7f0000000540)={[{@uid={'uid', 0x3d, 0xffffffffffffffff}}]}) 04:09:06 executing program 0: r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0x4}}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x30, r2, 0x805, 0x0, 0x0, {{0x1, 0x40030000000000}, 0x0, 0x6, 0x0, {0x14, 0x19, {0x30000}}}}, 0x30}}, 0x0) 04:09:06 executing program 3: r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0x4}}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x30, r2, 0x805, 0x0, 0x0, {{0x1, 0x40030000000000}, 0x0, 0x6, 0x0, {0x14, 0x19, {0x30000}}}}, 0x30}}, 0x0) 04:09:06 executing program 1: r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f0000000000)="240078001e0025eaa87865f51ef6bce90a04000200bff20182a9000c080009000d000000", 0x24) [ 677.420456][ T3249] hfs: invalid uid -1 [ 677.443232][ T3249] hfs: unable to parse mount options 04:09:06 executing program 4: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x2001002, 0x0) mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x40e00, 0x0) 04:09:06 executing program 0: r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0x4}}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x30, r2, 0x805, 0x0, 0x0, {{0x1, 0x40030000000000}, 0x0, 0x6, 0x0, {0x14, 0x19, {0x34000}}}}, 0x30}}, 0x0) 04:09:06 executing program 5: r0 = syz_open_dev$usbmon(&(0x7f0000000040)='/dev/usbmon#\x00', 0x4, 0x224000) preadv(r0, &(0x7f0000002280)=[{&(0x7f00000011c0)=""/173, 0xad}, {&(0x7f0000001280)=""/4096, 0x1000}, {&(0x7f0000000080)}, {&(0x7f00000000c0)=""/56, 0x38}], 0x4, 0x0) r1 = syz_open_dev$cec(&(0x7f0000000000)='/dev/cec#\x00', 0x2, 0x2) write$vhci(r1, &(0x7f0000000180)=@HCI_SCODATA_PKT={0x3, "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"}, 0x1001) r2 = socket$alg(0x26, 0x5, 0x0) ioctl$MON_IOCX_GET(r1, 0x40189206, &(0x7f0000002340)={&(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @iso}, &(0x7f00000022c0)=""/94, 0x5e}) bind$alg(r2, &(0x7f0000000100)={0x26, 'aead\x00', 0x0, 0x0, 'aegis128-generic\x00'}, 0x58) setsockopt$ALG_SET_AEAD_AUTHSIZE(r2, 0x117, 0x5, 0x0, 0x1) 04:09:06 executing program 1: r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f0000000000)="240178001e0025eaa87865f51ef6bce90a04000200bff20182a9000c080009000d000000", 0x24) [ 677.551267][ T3249] hfs: invalid uid -1 04:09:06 executing program 3: r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0x4}}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x30, r2, 0x805, 0x0, 0x0, {{0x1, 0x40030000000000}, 0x0, 0x6, 0x0, {0x14, 0x19, {0x34000}}}}, 0x30}}, 0x0) [ 677.601678][ T3249] hfs: unable to parse mount options 04:09:06 executing program 2: syz_mount_image$hfs(&(0x7f00000000c0)='hfs\x00', &(0x7f0000000140)='./file0\x00', 0x900, 0x0, 0x0, 0x0, &(0x7f0000000540)={[{@uid={'uid', 0x3d, 0xffffffffffffffff}}]}) 04:09:06 executing program 0: r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0x4}}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x30, r2, 0x805, 0x0, 0x0, {{0x1, 0x40030000000000}, 0x0, 0x6, 0x0, {0x14, 0x19, {0x400300}}}}, 0x30}}, 0x0) 04:09:06 executing program 1: r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f0000000000)="240278001e0025eaa87865f51ef6bce90a04000200bff20182a9000c080009000d000000", 0x24) 04:09:06 executing program 5: r0 = getpid() r1 = syz_open_dev$vcsn(&(0x7f0000000140)='/dev/vcs#\x00', 0x6, 0x80200) ioctl$KVM_GET_PIT(r1, 0xc048ae65, &(0x7f0000000340)) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000011c0)='/proc/self/net/pfkey\x00', 0x1, 0x0) write$FUSE_STATFS(0xffffffffffffffff, &(0x7f0000001200)={0x60, 0x0, 0x0, {{0x0, 0x0, 0x2, 0x0, 0x0, 0xe84}}}, 0x60) sched_setscheduler(0x0, 0x5, &(0x7f00000001c0)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r4 = syz_open_dev$cec(&(0x7f0000000500)='/dev/cec#\x00', 0x3, 0x2) r5 = ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f00000000c0)=[@textreal={0x8, &(0x7f0000000080)="baa100b000eef36cba2100ec66b9800000c00f326635001000000f30bad104ecc80080d267d9f8f30f1bb429000f20c06635200000000f22c067f3af", 0x3c}], 0x1, 0x0, 0x0, 0x0) r6 = ioctl$KVM_CREATE_VCPU(r5, 0xae41, 0x0) getsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000002c0)=""/23, &(0x7f0000000300)=0x17) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x1, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r5, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x1000, &(0x7f0000000000/0x1000)=nil}) ioctl$KVM_SET_REGS(r6, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff], 0x1f000}) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$TIOCSPGRP(r1, 0x5410, &(0x7f0000000180)=r0) syz_kvm_setup_cpu$x86(r5, 0xffffffffffffffff, &(0x7f0000013000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) lstat(&(0x7f0000000c40)='./file0\x00', &(0x7f0000000c80)) getsockopt$inet_IP_XFRM_POLICY(r4, 0x0, 0x11, &(0x7f0000000d00)={{{@in=@broadcast, @in6=@initdev}}, {{@in=@initdev}, 0x0, @in6=@dev}}, &(0x7f0000000e00)=0xe8) r7 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_DELAYED_SACK(r7, 0x84, 0x10, 0x0, 0x0) geteuid() syz_open_dev$sndpcmp(&(0x7f0000000100)='/dev/snd/pcmC#D#p\x00', 0x9, 0x0) 04:09:06 executing program 4: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x2001002, 0x0) mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x40f00, 0x0) 04:09:06 executing program 3: r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0x4}}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x30, r2, 0x805, 0x0, 0x0, {{0x1, 0x40030000000000}, 0x0, 0x6, 0x0, {0x14, 0x19, {0x400300}}}}, 0x30}}, 0x0) 04:09:06 executing program 0: r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0x4}}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x30, r2, 0x805, 0x0, 0x0, {{0x1, 0x40030000000000}, 0x0, 0x6, 0x0, {0x14, 0x19, {0xf0ffff}}}}, 0x30}}, 0x0) 04:09:06 executing program 1: r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f0000000000)="240378001e0025eaa87865f51ef6bce90a04000200bff20182a9000c080009000d000000", 0x24) [ 677.929958][ T3307] hfs: invalid uid -1 [ 677.968152][ T3307] hfs: unable to parse mount options 04:09:06 executing program 4: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x2001002, 0x0) mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x44002, 0x0) [ 678.074535][ T3307] hfs: invalid uid -1 04:09:06 executing program 1: r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f0000000000)="240079001e0025eaa87865f51ef6bce90a04000200bff20182a9000c080009000d000000", 0x24) [ 678.113378][ T3307] hfs: unable to parse mount options 04:09:07 executing program 2: syz_mount_image$hfs(&(0x7f00000000c0)='hfs\x00', &(0x7f0000000140)='./file0\x00', 0xa00, 0x0, 0x0, 0x0, &(0x7f0000000540)={[{@uid={'uid', 0x3d, 0xffffffffffffffff}}]}) 04:09:07 executing program 3: r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0x4}}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x30, r2, 0x805, 0x0, 0x0, {{0x1, 0x40030000000000}, 0x0, 0x6, 0x0, {0x14, 0x19, {0xf0ffff}}}}, 0x30}}, 0x0) 04:09:07 executing program 0: r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0x4}}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x30, r2, 0x805, 0x0, 0x0, {{0x1, 0x40030000000000}, 0x0, 0x6, 0x0, {0x14, 0x19, {0x1000000}}}}, 0x30}}, 0x0) 04:09:07 executing program 1: r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f0000000000)="240179001e0025eaa87865f51ef6bce90a04000200bff20182a9000c080009000d000000", 0x24) 04:09:07 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = syz_open_dev$mouse(&(0x7f0000000000)='/dev/input/mouse#\x00', 0x8000, 0x400000) r2 = syz_genetlink_get_family_id$tipc2(&(0x7f00000001c0)='TIPCv2\x00') sendmsg$TIPC_NL_SOCK_GET(r1, &(0x7f0000000340)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x800}, 0xfffffffffffffe6d, &(0x7f0000000280)={&(0x7f0000000240)={0x1c, r2, 0x400, 0x70bd29, 0x25dfdbfb, {}, [@TIPC_NLA_SOCK={0x8, 0x2, [@TIPC_NLA_SOCK_HAS_PUBL={0x4}]}]}, 0x1c}}, 0x840) ioctl(r0, 0x8, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r3 = socket$kcm(0xa, 0x7, 0x73) sendmsg$TIPC_CMD_GET_NETID(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000180)={0xa}, 0x1c}}, 0x0) setsockopt$IP_VS_SO_SET_TIMEOUT(r0, 0x0, 0x48a, &(0x7f0000000140)={0x10000, 0x3, 0x4}, 0xc) sendmmsg(r3, &(0x7f0000000080)=[{{&(0x7f00000002c0)=@in6={0xa, 0x0, 0x0, @loopback={0xff00000000000000}}, 0x80, 0x0, 0x1dc}}], 0x1, 0x10000) 04:09:07 executing program 4: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x2001002, 0x0) mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x44003, 0x0) [ 678.444971][ T3356] hfs: invalid uid -1 [ 678.448993][ T3356] hfs: unable to parse mount options 04:09:07 executing program 1: r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f0000000000)="240279001e0025eaa87865f51ef6bce90a04000200bff20182a9000c080009000d000000", 0x24) 04:09:07 executing program 3: r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0x4}}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x30, r2, 0x805, 0x0, 0x0, {{0x1, 0x40030000000000}, 0x0, 0x6, 0x0, {0x14, 0x19, {0x1000000}}}}, 0x30}}, 0x0) 04:09:07 executing program 0: r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0x4}}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x30, r2, 0x805, 0x0, 0x0, {{0x1, 0x40030000000000}, 0x0, 0x6, 0x0, {0x14, 0x19, {0x2000000}}}}, 0x30}}, 0x0) [ 678.533830][ T3356] hfs: invalid uid -1 [ 678.537919][ T3356] hfs: unable to parse mount options 04:09:07 executing program 4: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x2001002, 0x0) mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x44004, 0x0) 04:09:07 executing program 2: syz_mount_image$hfs(&(0x7f00000000c0)='hfs\x00', &(0x7f0000000140)='./file0\x00', 0xb00, 0x0, 0x0, 0x0, &(0x7f0000000540)={[{@uid={'uid', 0x3d, 0xffffffffffffffff}}]}) 04:09:07 executing program 0: r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0x4}}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x30, r2, 0x805, 0x0, 0x0, {{0x1, 0x40030000000000}, 0x0, 0x6, 0x0, {0x14, 0x19, {0x3000000}}}}, 0x30}}, 0x0) 04:09:07 executing program 1: r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f0000000000)="240379001e0025eaa87865f51ef6bce90a04000200bff20182a9000c080009000d000000", 0x24) 04:09:07 executing program 3: r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0x4}}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x30, r2, 0x805, 0x0, 0x0, {{0x1, 0x40030000000000}, 0x0, 0x6, 0x0, {0x14, 0x19, {0x2000000}}}}, 0x30}}, 0x0) [ 678.882596][ T3395] hfs: invalid uid -1 04:09:07 executing program 4: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x2001002, 0x0) mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x44005, 0x0) 04:09:07 executing program 5: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) setxattr$security_selinux(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='security.selinux\x00', &(0x7f0000000100)='system_u:object_r:random_device_t:s0\x00', 0x25, 0x1) r0 = creat(&(0x7f0000001280)='./file0/bus\x00', 0xbc9dc8fbd81cb4b0) write$UHID_DESTROY(r0, &(0x7f0000000040), 0x4) fcntl$lock(r0, 0x7, &(0x7f0000027000)={0x1}) truncate(&(0x7f00000000c0)='./file0/bus\x00', 0x0) [ 678.915955][ T3395] hfs: unable to parse mount options 04:09:07 executing program 0: r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0x4}}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x30, r2, 0x805, 0x0, 0x0, {{0x1, 0x40030000000000}, 0x0, 0x6, 0x0, {0x14, 0x19, {0x4000000}}}}, 0x30}}, 0x0) 04:09:07 executing program 1: r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f0000000000)="24007a001e0025eaa87865f51ef6bce90a04000200bff20182a9000c080009000d000000", 0x24) [ 679.007901][ T3395] hfs: invalid uid -1 [ 679.011914][ T3395] hfs: unable to parse mount options 04:09:07 executing program 3: r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0x4}}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x30, r2, 0x805, 0x0, 0x0, {{0x1, 0x40030000000000}, 0x0, 0x6, 0x0, {0x14, 0x19, {0x3000000}}}}, 0x30}}, 0x0) 04:09:07 executing program 2: syz_mount_image$hfs(&(0x7f00000000c0)='hfs\x00', &(0x7f0000000140)='./file0\x00', 0x1020, 0x0, 0x0, 0x0, &(0x7f0000000540)={[{@uid={'uid', 0x3d, 0xffffffffffffffff}}]}) 04:09:07 executing program 0: r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0x4}}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x30, r2, 0x805, 0x0, 0x0, {{0x1, 0x40030000000000}, 0x0, 0x6, 0x0, {0x14, 0x19, {0x5000000}}}}, 0x30}}, 0x0) 04:09:08 executing program 4: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x2001002, 0x0) mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x44006, 0x0) 04:09:08 executing program 5: semget$private(0x0, 0x1, 0x20) r0 = semget$private(0x0, 0x0, 0x20) semop(r0, 0x0, 0xffffffffffffff9f) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) r2 = socket(0x5, 0x4, 0x4f2a) r3 = syz_genetlink_get_family_id$tipc(&(0x7f0000000200)='TIPC\x00') sendmsg$TIPC_CMD_GET_MEDIA_NAMES(r2, &(0x7f00000002c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000280)={&(0x7f0000000240)={0x1c, r3, 0x2, 0x70bd27, 0x25dfdbfe, {}, ["", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4000814}, 0x20000000) r4 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = dup(r4) rename(&(0x7f00000003c0)='./file0\x00', &(0x7f00000005c0)='./file0\x00') ioctl$sock_FIOGETOWN(r5, 0x8903, &(0x7f0000000000)) ioctl$TIOCGSID(r1, 0x5429, &(0x7f00000001c0)) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='configfs\x00', 0x0, 0x0) r6 = open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) getdents64(r6, &(0x7f00000003c0)=""/116, 0x3fb) 04:09:08 executing program 1: r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f0000000000)="24017a001e0025eaa87865f51ef6bce90a04000200bff20182a9000c080009000d000000", 0x24) [ 679.297900][ T3431] hfs: invalid uid -1 [ 679.331375][ T3431] hfs: unable to parse mount options 04:09:08 executing program 3: r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0x4}}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x30, r2, 0x805, 0x0, 0x0, {{0x1, 0x40030000000000}, 0x0, 0x6, 0x0, {0x14, 0x19, {0x4000000}}}}, 0x30}}, 0x0) 04:09:08 executing program 0: r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0x4}}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x30, r2, 0x805, 0x0, 0x0, {{0x1, 0x40030000000000}, 0x0, 0x6, 0x0, {0x14, 0x19, {0x6000000}}}}, 0x30}}, 0x0) 04:09:08 executing program 1: r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f0000000000)="24027a001e0025eaa87865f51ef6bce90a04000200bff20182a9000c080009000d000000", 0x24) [ 679.409293][ T3431] hfs: invalid uid -1 [ 679.414751][ T3431] hfs: unable to parse mount options 04:09:08 executing program 2: syz_mount_image$hfs(&(0x7f00000000c0)='hfs\x00', &(0x7f0000000140)='./file0\x00', 0x2000, 0x0, 0x0, 0x0, &(0x7f0000000540)={[{@uid={'uid', 0x3d, 0xffffffffffffffff}}]}) 04:09:08 executing program 0: r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0x4}}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x30, r2, 0x805, 0x0, 0x0, {{0x1, 0x40030000000000}, 0x0, 0x6, 0x0, {0x14, 0x19, {0x7000000}}}}, 0x30}}, 0x0) 04:09:08 executing program 4: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x2001002, 0x0) mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x44007, 0x0) 04:09:08 executing program 3: r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0x4}}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x30, r2, 0x805, 0x0, 0x0, {{0x1, 0x40030000000000}, 0x0, 0x6, 0x0, {0x14, 0x19, {0x5000000}}}}, 0x30}}, 0x0) 04:09:08 executing program 1: r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f0000000000)="24037a001e0025eaa87865f51ef6bce90a04000200bff20182a9000c080009000d000000", 0x24) [ 679.686320][ T3466] hfs: invalid uid -1 [ 679.700669][ T3466] hfs: unable to parse mount options 04:09:08 executing program 5: ioctl$RTC_UIE_OFF(0xffffffffffffffff, 0x7004) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x3, 0x0) getsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x76, &(0x7f0000000000)={0x0, 0x8001}, &(0x7f0000000080)=0x8) setsockopt$inet_sctp_SCTP_PR_SUPPORTED(r0, 0x84, 0x71, &(0x7f00000000c0)={r1, 0x5ea}, 0x8) setsockopt$netlink_NETLINK_TX_RING(r0, 0x10e, 0xc, &(0x7f00000001c0)={0x100004}, 0xfd57) write(r0, &(0x7f0000000040)="1c0000001a00110214f9f4072c090406110000000002000000020000", 0x1c) 04:09:08 executing program 0: r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0x4}}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x30, r2, 0x805, 0x0, 0x0, {{0x1, 0x40030000000000}, 0x0, 0x6, 0x0, {0x14, 0x19, {0xa000000}}}}, 0x30}}, 0x0) 04:09:08 executing program 2: syz_mount_image$hfs(&(0x7f00000000c0)='hfs\x00', &(0x7f0000000140)='./file0\x00', 0x2010, 0x0, 0x0, 0x0, &(0x7f0000000540)={[{@uid={'uid', 0x3d, 0xffffffffffffffff}}]}) 04:09:08 executing program 3: r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0x4}}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x30, r2, 0x805, 0x0, 0x0, {{0x1, 0x40030000000000}, 0x0, 0x6, 0x0, {0x14, 0x19, {0x6000000}}}}, 0x30}}, 0x0) 04:09:08 executing program 4: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x2001002, 0x0) mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x44008, 0x0) 04:09:08 executing program 1: r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f0000000000)="24007b001e0025eaa87865f51ef6bce90a04000200bff20182a9000c080009000d000000", 0x24) 04:09:08 executing program 0: r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0x4}}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x30, r2, 0x805, 0x0, 0x0, {{0x1, 0x40030000000000}, 0x0, 0x6, 0x0, {0x14, 0x19, {0xe000000}}}}, 0x30}}, 0x0) 04:09:08 executing program 5: r0 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x9, 0x101e40) ioctl$KVM_SET_MSRS(r0, 0x4008ae89, &(0x7f0000000040)={0x2, 0x0, [{0x8d3, 0x0, 0x8000}, {0xc0011020, 0x0, 0x787}]}) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000001b80)={0x0, 0x0, &(0x7f0000001b40)={&(0x7f0000001b00)=@bridge_newneigh={0x24, 0x1c, 0x0, 0x0, 0x0, {}, [@NDA_PORT={0x8, 0x6, 0x4e23}]}, 0x24}}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vsock\x00', 0x0, 0x0) timer_create(0x0, &(0x7f0000000340)={0x0, 0x0, 0x0, @thr={0x0, &(0x7f0000000280)="a43854d3cdf70dcd9606e4e102a6d6fba4759dfdaa68cafd5bd845cd62c643671d089a4530ad00ac39fd3e32b6c39eae02b3e74f4b10cc2d4e02a83cc9e186ccee70695ee3eae63897fbefb06cded8d6e3a2734eb6099c2c4243d09830a655975d89c3bce88f50f8e26ed3fa4e194cd1d47268cf6669ace5e8d54e1eca23"}}, 0x0) add_key(&(0x7f0000000080)='dns_resolver\x00', &(0x7f00000000c0), &(0x7f0000000100), 0xfffff, 0xfffffffffffffffb) [ 680.072585][ T3497] hfs: invalid uid -1 04:09:08 executing program 3: r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0x4}}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x30, r2, 0x805, 0x0, 0x0, {{0x1, 0x40030000000000}, 0x0, 0x6, 0x0, {0x14, 0x19, {0x7000000}}}}, 0x30}}, 0x0) [ 680.124316][ T3497] hfs: unable to parse mount options 04:09:08 executing program 1: r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f0000000000)="24017b001e0025eaa87865f51ef6bce90a04000200bff20182a9000c080009000d000000", 0x24) 04:09:09 executing program 4: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x2001002, 0x0) mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x45d00, 0x0) 04:09:09 executing program 0: r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0x4}}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x30, r2, 0x805, 0x0, 0x0, {{0x1, 0x40030000000000}, 0x0, 0x6, 0x0, {0x14, 0x19, {0xf000000}}}}, 0x30}}, 0x0) [ 680.194764][ T3511] Invalid option length (6179) for dns_resolver key 04:09:09 executing program 2: syz_mount_image$hfs(&(0x7f00000000c0)='hfs\x00', &(0x7f0000000140)='./file0\x00', 0x3f00, 0x0, 0x0, 0x0, &(0x7f0000000540)={[{@uid={'uid', 0x3d, 0xffffffffffffffff}}]}) [ 680.304870][ T3516] Invalid option length (6179) for dns_resolver key 04:09:09 executing program 5: r0 = socket(0x2, 0x1, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="11dca50d5e0bcfe47bf070") setsockopt$EBT_SO_SET_ENTRIES(r0, 0xa00000000000000, 0x80, &(0x7f00000001c0)=@broute={'broute\x00', 0x20, 0x1, 0x1f, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000e00], 0x0, 0x0, &(0x7f00000002c0)=ANY=[@ANYRESOCT=r0, @ANYPTR]}, 0x97) getsockopt$inet_sctp_SCTP_MAX_BURST(r0, 0x84, 0x14, &(0x7f0000000040), &(0x7f0000000080)=0x4) 04:09:09 executing program 3: r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0x4}}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x30, r2, 0x805, 0x0, 0x0, {{0x1, 0x40030000000000}, 0x0, 0x6, 0x0, {0x14, 0x19, {0xa000000}}}}, 0x30}}, 0x0) 04:09:09 executing program 1: r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f0000000000)="24027b001e0025eaa87865f51ef6bce90a04000200bff20182a9000c080009000d000000", 0x24) 04:09:09 executing program 0: r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0x4}}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x30, r2, 0x805, 0x0, 0x0, {{0x1, 0x40030000000000}, 0x0, 0x6, 0x0, {0x14, 0x19, {0x3f000000}}}}, 0x30}}, 0x0) 04:09:09 executing program 4: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x2001002, 0x0) mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x4ff00, 0x0) [ 680.418906][ T3529] hfs: invalid uid -1 [ 680.428210][ T3529] hfs: unable to parse mount options [ 680.499686][ T3529] hfs: invalid uid -1 [ 680.505577][ T3529] hfs: unable to parse mount options 04:09:09 executing program 0: r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0x4}}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x30, r2, 0x805, 0x0, 0x0, {{0x1, 0x40030000000000}, 0x0, 0x6, 0x0, {0x14, 0x19, {0x40000000}}}}, 0x30}}, 0x0) 04:09:09 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xa, 0x82, 0x200, 0x3, 0x0, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffff9c}, 0x3c) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000080)={r0, &(0x7f0000000180)="db", &(0x7f0000001180)=""/226}, 0x18) r1 = socket$caif_stream(0x25, 0x1, 0x5) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000000), &(0x7f00000000c0)=0xc) 04:09:09 executing program 2: syz_mount_image$hfs(&(0x7f00000000c0)='hfs\x00', &(0x7f0000000140)='./file0\x00', 0x4000, 0x0, 0x0, 0x0, &(0x7f0000000540)={[{@uid={'uid', 0x3d, 0xffffffffffffffff}}]}) 04:09:09 executing program 3: r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0x4}}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x30, r2, 0x805, 0x0, 0x0, {{0x1, 0x40030000000000}, 0x0, 0x6, 0x0, {0x14, 0x19, {0xe000000}}}}, 0x30}}, 0x0) 04:09:09 executing program 1: r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f0000000000)="24037b001e0025eaa87865f51ef6bce90a04000200bff20182a9000c080009000d000000", 0x24) 04:09:09 executing program 4: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) socket$netlink(0x10, 0x3, 0x6) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) creat(&(0x7f0000000100)='./file0\x00', 0x141) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x2001002, 0x0) mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x44000, 0x0) 04:09:09 executing program 5: r0 = socket$can_raw(0x1d, 0x3, 0x1) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000440)={'vcan0\x00', 0x0}) r2 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_TX_RING(r2, 0x11b, 0x3, &(0x7f00000000c0)=0x4, 0x1fe) setsockopt$XDP_UMEM_REG(r2, 0x11b, 0x4, &(0x7f0000000100)={&(0x7f0000000000)=""/17, 0x10000, 0x1000}, 0x12) setsockopt$XDP_UMEM_FILL_RING(r2, 0x11b, 0x5, &(0x7f0000000180)=0x8, 0x4) setsockopt$XDP_UMEM_COMPLETION_RING(r2, 0x11b, 0x6, &(0x7f00000002c0)=0x80, 0x4) write$binfmt_script(r2, &(0x7f0000000040)={'#! ', './file0', [{0x20, 'keyring$,trusted$.-em0}self'}, {0x20, 'vcan0\x00'}], 0xa, "3842c984f4930e5bf9a180503ce0b2035dca03b8f52ac199fdee4f06c04dd236164788ddd293c99b51cc0b60c07b99c6e65070ea4e6a2d"}, 0x65) bind$xdp(r2, &(0x7f0000000300)={0x2c, 0x0, r1}, 0x10) setsockopt$XDP_RX_RING(r2, 0x11b, 0x2, &(0x7f0000000400), 0x4) 04:09:09 executing program 0: r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0x4}}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x30, r2, 0x805, 0x0, 0x0, {{0x1, 0x40030000000000}, 0x0, 0x6, 0x0, {0x14, 0x19, {0x48000000}}}}, 0x30}}, 0x0) [ 680.862487][ T3568] hfs: invalid uid -1 04:09:09 executing program 1: r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f0000000000)="24007c001e0025eaa87865f51ef6bce90a04000200bff20182a9000c080009000d000000", 0x24) 04:09:09 executing program 3: r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0x4}}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x30, r2, 0x805, 0x0, 0x0, {{0x1, 0x40030000000000}, 0x0, 0x6, 0x0, {0x14, 0x19, {0xf000000}}}}, 0x30}}, 0x0) [ 680.912492][ T3568] hfs: unable to parse mount options 04:09:09 executing program 0: r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0x4}}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x30, r2, 0x805, 0x0, 0x0, {{0x1, 0x40030000000000}, 0x0, 0x6, 0x0, {0x14, 0x19, {0x4c000000}}}}, 0x30}}, 0x0) [ 681.019580][ T3568] hfs: invalid uid -1 [ 681.057857][ T3568] hfs: unable to parse mount options 04:09:09 executing program 3: r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0x4}}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x30, r2, 0x805, 0x0, 0x0, {{0x1, 0x40030000000000}, 0x0, 0x6, 0x0, {0x14, 0x19, {0x2f020000}}}}, 0x30}}, 0x0) 04:09:09 executing program 1: r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f0000000000)="24017c001e0025eaa87865f51ef6bce90a04000200bff20182a9000c080009000d000000", 0x24) 04:09:09 executing program 4: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0xbd301c0d5240093d) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x2001002, 0x0) mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x44000, 0x0) 04:09:10 executing program 5: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f00000015c0)={&(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ff8000/0x7000)=nil, &(0x7f0000ffa000/0x3000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ff9000/0x3000)=nil, &(0x7f0000ffa000/0x1000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ff9000/0x1000)=nil, &(0x7f0000ff9000/0x3000)=nil, &(0x7f0000ffb000/0x1000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000001500)="e0b702191615d040b8d48ac3bfe734b40eac1f59ebd3a823c16fc3ea26a8938be049e0472080e5706fca6400e1441eac12d253dbbe3c0580597f2818ad519a9a3f481c1ac260e2c63819164aefde6afe3e1595108b0bc2f375a9b223ed29edc31e43e37a491d2935c0b7a4fee369a6c4345943eed9b4cc9d4fdeea2623d2978ee0d071ea", 0x84, r0}, 0x68) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xfec8) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX(r1, 0x84, 0x6e, &(0x7f0000000200)=[@in6={0xa, 0x4e20, 0x516, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0xfffffffffffff801}, @in6={0xa, 0x4e20, 0x4, @loopback, 0x64}], 0x38) r3 = socket$inet(0x2, 0x3, 0x2) writev(r2, &(0x7f0000001480)=[{&(0x7f00000000c0)="5d1abefb444b6f0bbcd6e2200744e6c93131a07240b8c74495065b1946b3", 0x1e}, {&(0x7f0000000100)="a1fd076834f3ed74592d6e9e280657dbaea0ed7097e08eb553ac29b3d3303a9ab10e690c74995c8311d6b6b7fafe126569085d40115f697ff30be76641b1cc198a3a13d47c1852757a736ce07cf4a9b9f18d97869983ce446c1846c98ca840c5c1c3b302b337fdccace13d8c779367a9c76495330154ed159522ee46ecc5fb3476ee18519c7298df1bd15b27c4428c632b372fa8bcd293fa97ff7cfb63f4389d291bcb4fbc7db6f61db0d4b4cf950cfbb0a14ceef64d5a16a4909066ca44198d468c9080b73157ce82f460ae", 0xcc}, {&(0x7f0000000200)}, {&(0x7f0000000240)="c185dcd7b54a2213ef336c837a96102fb12d71c7c853a504646f4165a2b49ef0383b4b519ad18c2b3a0722184320908e503651c61b0899be61677f25ab59934d44ab8103d283af8d5d91719f3e20da9c7a5e152865c5fd32e7aa9b6154fa5a531a21ac24b44f4b900641d87361b37ad1827e502789992df1bca6", 0x7a}, {&(0x7f0000000300)="1e732aa8b9fbdbe562f60b06a930d9304ead1b51ff122d42a6933e0c829bb271f884cce70846020c978d1d1c6bdf08b41a4b97cb40c2b94f520deeeed238c98c00156f07071e267deef803a50f47b679de736b3f572461386d530141cd9d72bb2ec34e1222356de4e6d56044b749c855c803e67b84f225b7df059161fa4f6ea2f6bf5e08a8796c688f104c78554274161a7a07cbfd668fda121525cce55e2d1c78", 0xa1}, {&(0x7f00000003c0)="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", 0x1000}, {&(0x7f00000013c0)="bb2ae6efae21bffa39baad20f290df14cecab7fcef05d551a2b949c601e11ae7b3d9910b53c8e56d212c8dd7bbae17ed9fc4f27a52759be109863ea2dc0228ba893e881263e25c3b05a1f9b025feaee757b2acd6019b95941541fb5806c7c752e28e62ab3260a10e8d312c5b0b388f4513ec87f2cfec7879ee9f322203d5f46157cafaf654036f0edf6651c6788ee238d44993ceef1eee4f61", 0x99}], 0x7) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet(r2, &(0x7f00000002c0)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0xc}}, 0x10) connect$inet(r2, &(0x7f0000000040)={0x2, 0x0, @multicast1}, 0x10) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r3, 0x84, 0x8, &(0x7f0000000080)=0x8, 0x4) splice(r0, 0x0, r2, 0x0, 0x10005, 0x0) r4 = getpid() ioctl$KVM_TRANSLATE(r2, 0xc018ae85, &(0x7f0000001640)={0x0, 0x0, 0xe346, 0x7ff, 0x5}) prctl$PR_SET_PTRACER(0x59616d61, r4) 04:09:10 executing program 2: syz_mount_image$hfs(&(0x7f00000000c0)='hfs\x00', &(0x7f0000000140)='./file0\x00', 0x4800, 0x0, 0x0, 0x0, &(0x7f0000000540)={[{@uid={'uid', 0x3d, 0xffffffffffffffff}}]}) 04:09:10 executing program 0: r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0x4}}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x30, r2, 0x805, 0x0, 0x0, {{0x1, 0x40030000000000}, 0x0, 0x6, 0x0, {0x14, 0x19, {0x60000000}}}}, 0x30}}, 0x0) 04:09:10 executing program 3: r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0x4}}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x30, r2, 0x805, 0x0, 0x0, {{0x1, 0x40030000000000}, 0x0, 0x6, 0x0, {0x14, 0x19, {0x3f000000}}}}, 0x30}}, 0x0) 04:09:10 executing program 1: r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f0000000000)="24027c001e0025eaa87865f51ef6bce90a04000200bff20182a9000c080009000d000000", 0x24) 04:09:10 executing program 4: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) r1 = fcntl$getown(0xffffffffffffffff, 0x9) getresuid(&(0x7f0000000340), &(0x7f0000000380), &(0x7f00000003c0)=0x0) getresgid(&(0x7f0000000400), &(0x7f0000000440), &(0x7f0000000480)=0x0) sendmmsg$unix(r0, &(0x7f0000000500)=[{&(0x7f0000000100)=@file={0x0, './file0/file1\x00'}, 0x6e, &(0x7f0000000300)=[{&(0x7f00000001c0)="31b5818996f4b2dc6fdfc16cb7bc8413ca564d1df1df19ddc82b4370b4b6de84965a0cc403e99ba07fc71385dae7f0f578d7893c06fdc8d94a7303d78b649785dacb062ecec2b8fb3c224b94654274429bfd7d5682188133eb59e2ed50befb23c2c929509e270a291978480b3beed8b81df2e227f9ba8d1e865c6c193aa73b27d44631820a29aacde5ec023e7846e367a0843b10543ca81f25848bf48c536914f8fb2c916bc3d8531d3799c90ce91dda4e44f2be423bbf64d5eee69b165fb6b86c7b670f844f6406f2a0512b7fa4c8389a5128e3149231", 0xd7}, {&(0x7f00000002c0)="adeb8af2c2cce77d6e", 0x9}], 0x2, &(0x7f00000004c0)=[@cred={{0x1c, 0x1, 0x2, {r1, r2, r3}}}], 0x20, 0x9ec58ef025f11880}], 0x1, 0x4000000) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x2001002, 0x0) mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x44000, 0x0) [ 681.476000][ T3615] hfs: invalid uid -1 04:09:10 executing program 0: r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0x4}}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x30, r2, 0x805, 0x0, 0x0, {{0x1, 0x40030000000000}, 0x0, 0x6, 0x0, {0x14, 0x19, {0x68000000}}}}, 0x30}}, 0x0) [ 681.535839][ T3615] hfs: unable to parse mount options [ 681.605725][ T3615] hfs: invalid uid -1 [ 681.609741][ T3615] hfs: unable to parse mount options 04:09:10 executing program 3: r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0x4}}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x30, r2, 0x805, 0x0, 0x0, {{0x1, 0x40030000000000}, 0x0, 0x6, 0x0, {0x14, 0x19, {0x40000000}}}}, 0x30}}, 0x0) 04:09:10 executing program 1: r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f0000000000)="24037c001e0025eaa87865f51ef6bce90a04000200bff20182a9000c080009000d000000", 0x24) 04:09:10 executing program 4: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000340)='bpf\x00', 0x100000000, 0x0) mkdir(&(0x7f0000000100)='./file0\x00', 0x100010002) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x2001002, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000000)=0x0) sched_getscheduler(r0) mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x44000, 0x0) 04:09:10 executing program 5: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_SET_LEDBIT(r0, 0x40045569, 0x0) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x11) ioctl$UI_DEV_SETUP(r0, 0x405c5503, &(0x7f00000000c0)={{}, 'syz0\x00'}) ioctl$UI_DEV_SETUP(r0, 0x5501, 0x0) ioctl$UI_DEV_DESTROY(r0, 0x5502) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0x101, 0x0) ioctl$TUNGETVNETHDRSZ(r1, 0x800454d7, &(0x7f0000000080)) 04:09:10 executing program 0: r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0x4}}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x30, r2, 0x805, 0x0, 0x0, {{0x1, 0x40030000000000}, 0x0, 0x6, 0x0, {0x14, 0x19, {0x6c000000}}}}, 0x30}}, 0x0) 04:09:10 executing program 2: syz_mount_image$hfs(&(0x7f00000000c0)='hfs\x00', &(0x7f0000000140)='./file0\x00', 0x4c00, 0x0, 0x0, 0x0, &(0x7f0000000540)={[{@uid={'uid', 0x3d, 0xffffffffffffffff}}]}) 04:09:10 executing program 1: r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f0000000000)="24007d001e0025eaa87865f51ef6bce90a04000200bff20182a9000c080009000d000000", 0x24) [ 681.876430][ T3646] input: syz0 as /devices/virtual/input/input11 04:09:10 executing program 3: r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0x4}}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x30, r2, 0x805, 0x0, 0x0, {{0x1, 0x40030000000000}, 0x0, 0x6, 0x0, {0x14, 0x19, {0x48000000}}}}, 0x30}}, 0x0) [ 681.982772][ T3650] hfs: invalid uid -1 04:09:10 executing program 0: r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0x4}}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x30, r2, 0x805, 0x0, 0x0, {{0x1, 0x40030000000000}, 0x0, 0x6, 0x0, {0x14, 0x19, {0x74000000}}}}, 0x30}}, 0x0) [ 682.043450][ T3650] hfs: unable to parse mount options 04:09:10 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000400)='./file0\x00', &(0x7f0000000480)='bpf\x00', 0x20000, 0x0) r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl$FS_IOC_GETFSLABEL(r0, 0x81009431, &(0x7f00000004c0)) r1 = dup2(0xffffffffffffffff, 0xffffffffffffffff) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x15, &(0x7f0000000140)={@rand_addr, 0x0}, &(0x7f00000002c0)=0x14) sendto(r1, &(0x7f00000001c0)="e69cc091b28ae64bd625065190955b35e184a0f0d3124091d005af9ef693a4808ba3400b7e1e4683412609f57b9189b14e514b9d94c25076317545820dd823c6eaebfdcbe2da3e31a757c81a69d0d718b1585d2a66285137ffab25011e7456c2b942f0e8ff3b6dc6ac2fb26c23c93f37f95e6104a5c32adee16cf8b6069c9fbf6fbe537671b2578f18664fae4369b47b55aa1f96796bfd809a48c485e449edd1eba85998d922953029aa7ed0507d9ef9598a82f57f778570cd0a85c511101151d1350821e16ccae4e92d04e3759cbd6d1393", 0xd2, 0x4, &(0x7f0000000300)=@xdp={0x2c, 0x4, r2, 0x18}, 0x80) mkdir(&(0x7f00000000c0)='./file1\x00', 0x2) mount$bpf(0x20000000, &(0x7f00000003c0)='./file0\x00', 0x0, 0x2001006, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000380)={'nr0\x00', r2}) mq_getsetattr(r1, &(0x7f0000000040)={0x3, 0x6, 0x20, 0x1, 0x4, 0x4, 0x6, 0x401cebac}, &(0x7f0000000180)) io_setup(0x0, &(0x7f0000000440)=0x0) io_cancel(r3, &(0x7f00000006c0)={0x0, 0x0, 0x0, 0xdd057278cd4861e, 0xfffffffffffffffc, r1, &(0x7f00000005c0)="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", 0xfe, 0x6, 0x0, 0x2}, &(0x7f0000000700)) creat(&(0x7f0000000100)='./file1\x00', 0x10004) mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x44000, 0x0) 04:09:10 executing program 3: r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0x4}}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x30, r2, 0x805, 0x0, 0x0, {{0x1, 0x40030000000000}, 0x0, 0x6, 0x0, {0x14, 0x19, {0x4c000000}}}}, 0x30}}, 0x0) 04:09:10 executing program 1: r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f0000000000)="24017d001e0025eaa87865f51ef6bce90a04000200bff20182a9000c080009000d000000", 0x24) [ 682.116040][ T3650] hfs: invalid uid -1 [ 682.120176][ T3650] hfs: unable to parse mount options [ 682.157971][ T3655] input: syz0 as /devices/virtual/input/input12 04:09:11 executing program 2: syz_mount_image$hfs(&(0x7f00000000c0)='hfs\x00', &(0x7f0000000140)='./file0\x00', 0x6000, 0x0, 0x0, 0x0, &(0x7f0000000540)={[{@uid={'uid', 0x3d, 0xffffffffffffffff}}]}) 04:09:11 executing program 5: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x800, 0x24) close(r2) r3 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r3, &(0x7f00000001c0)={0x18, 0x0, {0x4, @dev={[], 0xa}, 'lo\x00'}}, 0x1e) ioctl$PPPIOCGCHAN(r3, 0x80047437, &(0x7f00000003c0)) syz_open_dev$sndpcmp(&(0x7f0000000040)='/dev/snd/pcmC#D#p\x00', 0x9, 0x80) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, &(0x7f0000000000)={0x8, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r2, 0x0, r2, 0x0, 0x200010009, 0x0) 04:09:11 executing program 0: r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0x4}}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x30, r2, 0x805, 0x0, 0x0, {{0x1, 0x40030000000000}, 0x0, 0x6, 0x0, {0x14, 0x19, {0x7a000000}}}}, 0x30}}, 0x0) 04:09:11 executing program 4: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) lsetxattr$trusted_overlay_upper(&(0x7f0000000100)='./file0/file0\x00', &(0x7f0000000140)='trusted.overlay.upper\x00', &(0x7f00000001c0)=ANY=[@ANYBLOB="00db1507a91c95ba41d96175d6adc7c8435f974175"], 0x15, 0x1) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) r0 = semget$private(0x0, 0x2, 0x400) semctl$GETNCNT(r0, 0x0, 0xe, &(0x7f0000000200)=""/251) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x2001002, 0x0) mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x44000, 0x0) 04:09:11 executing program 3: r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0x4}}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x30, r2, 0x805, 0x0, 0x0, {{0x1, 0x40030000000000}, 0x0, 0x6, 0x0, {0x14, 0x19, {0x60000000}}}}, 0x30}}, 0x0) 04:09:11 executing program 1: r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f0000000000)="24027d001e0025eaa87865f51ef6bce90a04000200bff20182a9000c080009000d000000", 0x24) [ 682.464819][ T3690] hfs: invalid uid -1 [ 682.485130][ T3690] hfs: unable to parse mount options 04:09:11 executing program 3: r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0x4}}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x30, r2, 0x805, 0x0, 0x0, {{0x1, 0x40030000000000}, 0x0, 0x6, 0x0, {0x14, 0x19, {0x68000000}}}}, 0x30}}, 0x0) [ 682.578893][ T3690] hfs: invalid uid -1 [ 682.609018][ T3690] hfs: unable to parse mount options 04:09:11 executing program 1: r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f0000000000)="24037d001e0025eaa87865f51ef6bce90a04000200bff20182a9000c080009000d000000", 0x24) 04:09:11 executing program 0: r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0x4}}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x30, r2, 0x805, 0x0, 0x0, {{0x1, 0x40030000000000}, 0x0, 0x6, 0x0, {0x14, 0x19, {0x87020000}}}}, 0x30}}, 0x0) 04:09:11 executing program 4: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f0000000100)='./file0/file0\x00', 0x2) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x2001002, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000002c0)={{{@in=@initdev, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}, 0x0, @in6=@loopback}}, &(0x7f00000003c0)=0xe8) r1 = geteuid() syz_mount_image$msdos(&(0x7f00000000c0)='msdos\x00', &(0x7f0000000140)='./file1\x00', 0x9, 0x1, &(0x7f0000000280)=[{&(0x7f00000001c0)="5d8df1ef5c825cf8c183d3e2c9d3be71b6987adb3a7c14ca41d6affa7cdee2c523f7a4c96d008c9d08f5e0055fa1fd604e39fffab5892b8caf6e43d786c81f4dae3e2271f6edbbbb29cde4512cd8024144ad5ee627a4127d0a2e873b7f73b9f610864e668ff2d365528bf0ee4ed2b9be42a504a1cf7220882f1d460ef694fc21fd66abe722373f6b84f86763cc1ab80a40b85ce8d85d9d0b995bfed2a5ffe96860cabdad19680d181dab8623a8c246bf1afd40ca31ee850a6423874f6033", 0xbe}], 0x54a796e8608869fc, &(0x7f00000005c0)=ANY=[@ANYBLOB="6572726f72733d636f6e74696e75652c7375626a5f726f6c653d627066002c6f626a5f726f6c653d656d302c7375626a5f757365723d252e2c66736d616769633d3078303030303030303030303030303030302c6673757569643d00656639363735612d396431382d300062822d1537334c2d31187f36341333312c657569643c", @ANYRESDEC=r0, @ANYBLOB=',fsmagic=0x000000000000ffff,euid=', @ANYRESDEC=r1, @ANYBLOB="2c21c7cd571a3d535595fb4efa03eab632f23558c8bc04c183a2a47396a54873bab2e64d027a9542b0c2e8749e56f3bfa016fefe79e0ccb1dc73fc893d2afb41f8ec2bd99fcaa7adc564b7ae80b090761f4606e1206cbc4843da157004d7182a2d49632d37c4a327ce513d68ba48c280e93ea46fc66ed065c99dda0abf1c973c5f64ff189903e4629ed63d98797fc7cedaa759d2cc377174dafdc998988d3ba9c0d7e43e0ef94b378ff839d755889ed9ef626fb856b7b65337a6f9aab84aeb3878edb372eaafa65c5a7c5d99d8f19a69a1f76a479ebae285f92eb5d874f0b5f356e33e8836b8249d7043d022c32a00"]) mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x44000, 0x0) 04:09:11 executing program 2: syz_mount_image$hfs(&(0x7f00000000c0)='hfs\x00', &(0x7f0000000140)='./file0\x00', 0x6800, 0x0, 0x0, 0x0, &(0x7f0000000540)={[{@uid={'uid', 0x3d, 0xffffffffffffffff}}]}) 04:09:11 executing program 3: r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0x4}}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x30, r2, 0x805, 0x0, 0x0, {{0x1, 0x40030000000000}, 0x0, 0x6, 0x0, {0x14, 0x19, {0x6c000000}}}}, 0x30}}, 0x0) 04:09:11 executing program 1: r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f0000000000)="24007e001e0025eaa87865f51ef6bce90a04000200bff20182a9000c080009000d000000", 0x24) [ 682.893954][ T3735] hfs: invalid uid -1 [ 682.925135][ T3735] hfs: unable to parse mount options [ 683.014288][ T3735] hfs: invalid uid -1 [ 683.020618][ T3735] hfs: unable to parse mount options 04:09:12 executing program 5: r0 = syz_init_net_socket$ax25(0x3, 0x2, 0x7252b605e724c96b) fcntl$getownex(r0, 0x10, &(0x7f0000000000)={0x0, 0x0}) r2 = openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x80, 0x0) setsockopt$inet_dccp_int(r2, 0x21, 0x1, &(0x7f0000000080)=0x1, 0x4) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f00000000c0)=0x87) r3 = add_key(&(0x7f0000000100)='rxrpc_s\x00', &(0x7f0000000140)={'syz', 0x1}, &(0x7f0000000180)="5f0ea903", 0x4, 0xfffffffffffffffe) keyctl$clear(0x7, r3) setsockopt$RXRPC_SECURITY_KEYRING(r2, 0x110, 0x2, &(0x7f00000001c0)='/dev/zero\x00', 0xa) readahead(r0, 0xfffffffffffffffc, 0x7) getsockopt$inet6_dccp_buf(r2, 0x21, 0xc0, &(0x7f0000000200)=""/193, &(0x7f0000000300)=0xc1) r4 = syz_genetlink_get_family_id$tipc(&(0x7f0000000380)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r2, &(0x7f0000000440)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000400)={&(0x7f00000003c0)={0x30, r4, 0x2, 0x70bd2d, 0x25dfdbff, {{}, 0x0, 0x5, 0x0, {0x14, 0x19, {0x76babc74, 0x8, 0xfffffffffffffffd, 0x10001}}}, ["", "", ""]}, 0x30}, 0x1, 0x0, 0x0, 0x4000}, 0x20004080) r5 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000004c0)={&(0x7f0000000480)='){\x00', r2}, 0x10) r6 = creat(&(0x7f0000000500)='./file0\x00', 0x1) r7 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000540)='/dev/vhci\x00', 0x101000) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r6, 0x84, 0x64, &(0x7f0000000580)=[@in={0x2, 0x4e23, @multicast2}], 0x10) listxattr(&(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)=""/136, 0x88) ioctl$sock_bt_bnep_BNEPGETCONNLIST(r2, 0x800442d2, &(0x7f0000000800)={0xa, &(0x7f00000006c0)=[{0x0, 0x0, 0x0, @local}, {0x0, 0x0, 0x0, @local}, {0x0, 0x0, 0x0, @link_local}, {}, {0x0, 0x0, 0x0, @random}, {0x0, 0x0, 0x0, @remote}, {0x0, 0x0, 0x0, @remote}, {0x0, 0x0, 0x0, @link_local}, {}, {0x0, 0x0, 0x0, @random}]}) ioctl$BINDER_WRITE_READ(r6, 0xc0306201, &(0x7f0000001a00)={0x50, 0x0, &(0x7f0000001900)=[@reply={0x40406301, {0x2, 0x0, 0x0, 0x0, 0x10, 0x0, 0x0, 0x60, 0x18, &(0x7f0000001840)={@fda={0x66646185, 0x6, 0x0, 0x26}, @ptr={0x70742a85, 0x0, &(0x7f0000000840)=""/4096, 0x1000, 0x2, 0x33}, @fd={0x66642a85, 0x0, r5}}, &(0x7f00000018c0)={0x0, 0x20, 0x48}}}, @enter_looper, @increfs={0x40046304, 0x2}], 0x77, 0x0, &(0x7f0000001980)="eee35978a7d2c31b0be64bbb0d3a7080b7224c1f7acb22a42dafb47bc796045315c7d52a5d5f333f2f85174ce48854f82197571be739d8009ef865ca1cb6ad7cd8eca7b208947b3f9d778ad86bd5f5eb80067390e3092bff16c6eeb757436fa11030ccead906f7f719f3cb939f194991cb2f7dcb53c6af"}) setsockopt$inet6_mtu(r2, 0x29, 0x17, &(0x7f0000001a40)=0x3, 0x4) r8 = geteuid() ioctl$DRM_IOCTL_GET_CLIENT(r2, 0xc0286405, &(0x7f0000001a80)={0x64b, 0x100000000, r1, 0x0, r8, 0x0, 0x8, 0x80}) recvfrom$rose(r6, &(0x7f0000001ac0)=""/208, 0xd0, 0x100, 0x0, 0x0) connect$rxrpc(r6, &(0x7f0000001bc0)=@in4={0x21, 0x1, 0x2, 0x10, {0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0x1d}}}, 0x24) sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r6, &(0x7f0000001cc0)={&(0x7f0000001c00), 0xc, &(0x7f0000001c80)={&(0x7f0000001c40)={0x30, r4, 0x10, 0x70bd2c, 0x25dfdbff, {{}, 0x0, 0x5, 0x0, {0x14, 0x19, {0x401, 0x1, 0x8, 0x7}}}, ["", ""]}, 0x30}, 0x1, 0x0, 0x0, 0x4094}, 0x8000) ioctl$DRM_IOCTL_MAP_BUFS(r6, 0xc0186419, &(0x7f0000002040)={0x3, &(0x7f0000001d00)=""/197, &(0x7f0000001fc0)=[{0x3, 0xc6, 0x7, &(0x7f0000001e00)=""/198}, {0x9, 0x6f, 0x3e, &(0x7f0000001f00)=""/111}, {0x1, 0x32, 0x1ff, &(0x7f0000001f80)=""/50}]}) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r6, 0x84, 0x6b, &(0x7f0000002080)=[@in6={0xa, 0x4e20, 0x6, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x7ff}, @in={0x2, 0x4e20, @local}, @in={0x2, 0x4e20, @local}, @in={0x2, 0x4e23, @loopback}, @in6={0xa, 0x4e23, 0x1, @dev={0xfe, 0x80, [], 0x1c}, 0xba71}], 0x68) mount(&(0x7f0000002100)=@sr0='/dev/sr0\x00', &(0x7f0000002140)='.\x00', &(0x7f0000002180)='bpf\x00', 0x2020000, &(0x7f00000021c0)='\xf0!\x00') mknod(&(0x7f0000002200)='./file0\x00', 0x800, 0xc030) fchdir(r7) 04:09:12 executing program 4: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x2001002, 0x0) mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x44000, 0x0) 04:09:12 executing program 0: r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0x4}}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x30, r2, 0x805, 0x0, 0x0, {{0x1, 0x40030000000000}, 0x0, 0x6, 0x0, {0x14, 0x19, {0x9effffff}}}}, 0x30}}, 0x0) 04:09:12 executing program 3: r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0x4}}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x30, r2, 0x805, 0x0, 0x0, {{0x1, 0x40030000000000}, 0x0, 0x6, 0x0, {0x14, 0x19, {0x74000000}}}}, 0x30}}, 0x0) 04:09:12 executing program 1: r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f0000000000)="24017e001e0025eaa87865f51ef6bce90a04000200bff20182a9000c080009000d000000", 0x24) 04:09:12 executing program 2: syz_mount_image$hfs(&(0x7f00000000c0)='hfs\x00', &(0x7f0000000140)='./file0\x00', 0x6c00, 0x0, 0x0, 0x0, &(0x7f0000000540)={[{@uid={'uid', 0x3d, 0xffffffffffffffff}}]}) [ 683.387442][ T3760] hfs: invalid uid -1 [ 683.405670][ T3760] hfs: unable to parse mount options 04:09:12 executing program 1: r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f0000000000)="24027e001e0025eaa87865f51ef6bce90a04000200bff20182a9000c080009000d000000", 0x24) 04:09:12 executing program 4: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) prctl$PR_GET_NAME(0x10, &(0x7f0000000240)=""/221) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x2001002, 0x0) statfs(&(0x7f0000000100)='./file0/file0\x00', &(0x7f00000001c0)=""/107) mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x44000, 0x0) 04:09:12 executing program 0: r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0x4}}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x30, r2, 0x805, 0x0, 0x0, {{0x1, 0x40030000000000}, 0x0, 0x6, 0x0, {0x14, 0x19, {0xa1ffffff}}}}, 0x30}}, 0x0) [ 683.501968][ T3760] hfs: invalid uid -1 04:09:12 executing program 3: r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0x4}}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x30, r2, 0x805, 0x0, 0x0, {{0x1, 0x40030000000000}, 0x0, 0x6, 0x0, {0x14, 0x19, {0x7a000000}}}}, 0x30}}, 0x0) [ 683.539301][ T3760] hfs: unable to parse mount options 04:09:12 executing program 1: r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f0000000000)="24037e001e0025eaa87865f51ef6bce90a04000200bff20182a9000c080009000d000000", 0x24) 04:09:12 executing program 2: syz_mount_image$hfs(&(0x7f00000000c0)='hfs\x00', &(0x7f0000000140)='./file0\x00', 0x7400, 0x0, 0x0, 0x0, &(0x7f0000000540)={[{@uid={'uid', 0x3d, 0xffffffffffffffff}}]}) 04:09:12 executing program 5: r0 = syz_open_dev$video(&(0x7f0000000000)='/dev/video#\x00', 0x3d5a, 0x0) ioctl$VIDIOC_G_FMT(r0, 0xc0d05604, &(0x7f0000000040)={0x98c3651c830adc1a, @sliced={0x7fff, [0xfffffffffffffffb, 0x70ac, 0x80, 0x5, 0x3, 0x8, 0x6, 0x8, 0x0, 0x401, 0x8, 0x100000001, 0xfffffffffffff000, 0x9, 0x3, 0x0, 0x200, 0x0, 0x2, 0xfff, 0x0, 0x200, 0x1, 0x6, 0x80, 0x0, 0x4, 0x2, 0x0, 0x9, 0x3, 0x3, 0x3, 0x697c, 0xd60, 0xdc2, 0x8, 0x7a28, 0x1ff, 0xffffffffffff8001, 0x855, 0x2, 0x1c4ff170, 0xfffffffffffffffa, 0x401, 0x6, 0x100, 0x1ff], 0x5}}) getsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r0, 0x84, 0x1e, &(0x7f0000000140), &(0x7f0000000180)=0x4) 04:09:12 executing program 4: r0 = open(&(0x7f0000000100)='./file0\x00', 0x2000, 0x9) ioctl$KVM_HAS_DEVICE_ATTR(r0, 0x4018aee3, &(0x7f00000001c0)={0x0, 0x3, 0x4, &(0x7f0000000140)=0x7}) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) umount2(&(0x7f0000000200)='./file0/file1\x00', 0x8) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x2001002, 0x0) mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x44000, 0x0) 04:09:12 executing program 0: r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0x4}}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x30, r2, 0x805, 0x0, 0x0, {{0x1, 0x40030000000000}, 0x0, 0x6, 0x0, {0x14, 0x19, {0xeaffffff}}}}, 0x30}}, 0x0) [ 683.771965][ T3800] hfs: invalid uid -1 [ 683.787485][ T3800] hfs: unable to parse mount options 04:09:12 executing program 1: r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f0000000000)="24007f001e0025eaa87865f51ef6bce90a04000200bff20182a9000c080009000d000000", 0x24) [ 683.836259][ T3800] hfs: invalid uid -1 [ 683.847733][ T3800] hfs: unable to parse mount options 04:09:12 executing program 3: r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0x4}}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x30, r2, 0x805, 0x0, 0x0, {{0x1, 0x40030000000000}, 0x0, 0x6, 0x0, {0x14, 0x19, {0x9effffff}}}}, 0x30}}, 0x0) 04:09:12 executing program 2: syz_mount_image$hfs(&(0x7f00000000c0)='hfs\x00', &(0x7f0000000140)='./file0\x00', 0x7a00, 0x0, 0x0, 0x0, &(0x7f0000000540)={[{@uid={'uid', 0x3d, 0xffffffffffffffff}}]}) 04:09:12 executing program 5: bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x7}, 0x20) r0 = socket$kcm(0xa, 0x122000000003, 0x11) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000100)='/dev/audio\x00', 0x40080, 0x0) getsockname$inet6(r1, &(0x7f0000000140)={0xa, 0x0, 0x0, @remote}, &(0x7f00000001c0)=0x1c) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x1e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) accept4(r0, &(0x7f0000000380)=@hci={0x1f, 0x0}, &(0x7f0000000400)=0x80, 0x800) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000440)={'sit0\x00', r2}) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f0000000240), 0x26e) ioctl$VIDIOC_DBG_G_REGISTER(r1, 0xc0385650, &(0x7f0000000200)={{0x2, @name="0cf0557bd92741a7db418f9b73e4991b5062bf8ba3c1878f29215f6e527d9b4a"}, 0x8, 0x100000001, 0x7ff}) socketpair(0x1, 0x6, 0x6, &(0x7f0000000280)) sendmsg$kcm(r0, &(0x7f0000000000)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000000180)=[{&(0x7f00000000c0)="035db86376863a68fe800000000000004208c349d7c40346d59be131ad18d92c2bca9d7f6e6a6ac7d6", 0x29}], 0x1}, 0x0) 04:09:12 executing program 0: r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0x4}}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x30, r2, 0x805, 0x0, 0x0, {{0x1, 0x40030000000000}, 0x0, 0x6, 0x0, {0x14, 0x19, {0xf0ffffff}}}}, 0x30}}, 0x0) 04:09:12 executing program 1: r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f0000000000)="24017f001e0025eaa87865f51ef6bce90a04000200bff20182a9000c080009000d000000", 0x24) [ 684.129379][ T3821] hfs: invalid uid -1 04:09:12 executing program 4: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f00000001c0)='./file0/file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x2001002, 0x0) setrlimit(0xe, &(0x7f0000000100)={0x25, 0x31}) mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x44000, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='memory.current\x00', 0x0, 0x0) r1 = socket$inet_smc(0x2b, 0x1, 0x0) ioctl$sock_bt_bnep_BNEPCONNADD(r0, 0x400442c8, &(0x7f0000000200)={r1, 0x7, 0x1000, "1a4462720fdbafe4a234f593c486cc3b70a118f1b4a68a05c0b5cd5e6fe08781b7a9143afe919c133eb74e41f3832816ac598741d125c089981a3e0870f123958215313dcbe86e858d53945309c72acf8e31c3db92050ce32c70d0def0682bd9d3245e29317a2ec625dd5ec029f11175165d87458f14f824330d52290da9f61769f78f42777b9c8b6baa8393c883f2cbe2701d77f292304bc8bb4ee8772c2df645519a9cf910949bf17130b9c15a23c3dab88377281f"}) [ 684.166730][ T3821] hfs: unable to parse mount options 04:09:13 executing program 3: r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0x4}}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x30, r2, 0x805, 0x0, 0x0, {{0x1, 0x40030000000000}, 0x0, 0x6, 0x0, {0x14, 0x19, {0xa1ffffff}}}}, 0x30}}, 0x0) 04:09:13 executing program 1: r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f0000000000)="24027f001e0025eaa87865f51ef6bce90a04000200bff20182a9000c080009000d000000", 0x24) 04:09:13 executing program 0: r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0x4}}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x30, r2, 0x805, 0x0, 0x0, {{0x1, 0x40030000000000}, 0x0, 0x6, 0x0, {0x14, 0x19, {0xfcffffff}}}}, 0x30}}, 0x0) [ 684.238429][ T3821] hfs: invalid uid -1 [ 684.242552][ T3821] hfs: unable to parse mount options 04:09:13 executing program 2: syz_mount_image$hfs(&(0x7f00000000c0)='hfs\x00', &(0x7f0000000140)='./file0\x00', 0xedc0, 0x0, 0x0, 0x0, &(0x7f0000000540)={[{@uid={'uid', 0x3d, 0xffffffffffffffff}}]}) 04:09:13 executing program 5: r0 = open(&(0x7f0000002bc0)='./file0\x00', 0x40c2, 0x0) r1 = syz_open_dev$usbmon(&(0x7f0000000280)='/dev/usbmon#\x00', 0x6, 0x20403) getsockopt$inet_sctp_SCTP_STATUS(r0, 0x84, 0xe, &(0x7f00000002c0)={0x0, 0x81, 0x6, 0x2, 0xe97, 0x1, 0x4, 0xfff, {0x0, @in6={{0xa, 0x4e21, 0x0, @rand_addr="75c8e4f3a2b9cfc17371d51e3315264e", 0x20}}, 0x6, 0x8, 0x47, 0x7f, 0x80000001}}, &(0x7f0000000380)=0xb0) getsockopt$inet_sctp_SCTP_MAXSEG(r0, 0x84, 0xd, &(0x7f00000003c0)=@assoc_value={0x0}, &(0x7f0000000400)=0x8) getsockopt$inet_sctp6_SCTP_STATUS(r1, 0x84, 0xe, &(0x7f0000000440)={r2, 0x4, 0x80, 0x800, 0x6, 0x0, 0x7, 0x7fffffff, {r3, @in6={{0xa, 0x4e21, 0x7f, @mcast1, 0x5b7}}, 0x4, 0x8f2, 0x5, 0x7, 0x5}}, &(0x7f0000000500)=0xb0) fsetxattr$trusted_overlay_upper(r0, &(0x7f0000000000)='trusted.overlay.upper\x00', &(0x7f0000000240)=ANY=[@ANYPTR64=&(0x7f00000001c0)=ANY=[@ANYRES32, @ANYRES16=r0, @ANYPTR=&(0x7f0000000100)=ANY=[@ANYBLOB="e279b00d4133bb02229943f8de78a5965f6f46221eeaa93ae9cda6e204879e787cc70dec55cea9f030499ffa10fb053e5d940c622f53be170b58629e1baa38a04b207556a95fdcbd85ab46b538ef5d0f4e25645573604040afb0230bf9ca43acf119ed459bf2caf43d84118eb2f9a788e041dec12532080e9b1fc412f2119835cbd9d98be5578d4887f6b07f", @ANYRES32, @ANYPTR64, @ANYRES16=r0, @ANYRES32=r0, @ANYRES16=r0], @ANYPTR, @ANYRES64=r0, @ANYRESOCT=r0, @ANYBLOB="8e384e1be926f44f24998bf3b7f030ca8028627ae6b82ba3283427b7eb2434e05190f7", @ANYRES64=r0, @ANYRES64=r0, @ANYPTR64=&(0x7f0000000040)=ANY=[@ANYRES32=r0, @ANYRESHEX=r0, @ANYRESOCT=r0]], @ANYRES64=r0, @ANYRESDEC=0x0, @ANYRESOCT=r0, @ANYRES16=r0], 0x5, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='system.posix_acl_access\x00', &(0x7f0000001a80)={{}, {}, [], {}, [{}, {}, {}, {}, {}, {}, {}]}, 0x5c, 0x0) 04:09:13 executing program 3: r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0x4}}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x30, r2, 0x805, 0x0, 0x0, {{0x1, 0x40030000000000}, 0x0, 0x6, 0x0, {0x14, 0x19, {0xeaffffff}}}}, 0x30}}, 0x0) 04:09:13 executing program 4: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x2001002, 0x0) utime(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)={0x80000000, 0x1}) mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x44000, 0x0) [ 684.509833][ T3855] hfs: invalid uid -1 04:09:13 executing program 0: r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0x4}}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x30, r2, 0x805, 0x0, 0x0, {{0x1, 0x40030000000000}, 0x0, 0x6, 0x0, {0x14, 0x19, {0xfffff000}}}}, 0x30}}, 0x0) [ 684.535294][ T3855] hfs: unable to parse mount options 04:09:13 executing program 1: r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f0000000000)="24037f001e0025eaa87865f51ef6bce90a04000200bff20182a9000c080009000d000000", 0x24) [ 684.618707][ T3855] hfs: invalid uid -1 [ 684.622719][ T3855] hfs: unable to parse mount options [ 684.628178][ T26] audit: type=1800 audit(1566792553.404:680): pid=3863 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.5" name="file0" dev="sda1" ino=17432 res=0 04:09:13 executing program 3: r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0x4}}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x30, r2, 0x805, 0x0, 0x0, {{0x1, 0x40030000000000}, 0x0, 0x6, 0x0, {0x14, 0x19, {0xf0ffffff}}}}, 0x30}}, 0x0) 04:09:13 executing program 1: r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f0000000000)="240280001e0025eaa87865f51ef6bce90a04000200bff20182a9000c080009000d000000", 0x24) 04:09:13 executing program 2: syz_mount_image$hfs(&(0x7f00000000c0)='hfs\x00', &(0x7f0000000140)='./file0\x00', 0xff00, 0x0, 0x0, 0x0, &(0x7f0000000540)={[{@uid={'uid', 0x3d, 0xffffffffffffffff}}]}) 04:09:13 executing program 4: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000140)='./file1\x00', 0x0, 0x102022, 0x0) mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x44000, 0x0) 04:09:13 executing program 5: r0 = open(&(0x7f0000000000)='./file0\x00', 0x82040, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x82, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000001, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10001}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setlease(r0, 0x400, 0x0) rt_sigprocmask(0x0, 0x0, 0x0, 0x0) fcntl$setlease(r0, 0x40a, 0x0) 04:09:13 executing program 0: r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0x4}}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x30, r2, 0x805, 0x0, 0x0, {{0x1, 0x40030000000000}, 0x0, 0x6, 0x0, {0x14, 0x19, {0xffffff7f}}}}, 0x30}}, 0x0) 04:09:13 executing program 3: r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0x4}}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x30, r2, 0x805, 0x0, 0x0, {{0x1, 0x40030000000000}, 0x0, 0x6, 0x0, {0x14, 0x19, {0xfcffffff}}}}, 0x30}}, 0x0) 04:09:13 executing program 1: r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f0000000000)="240380001e0025eaa87865f51ef6bce90a04000200bff20182a9000c080009000d000000", 0x24) [ 684.942201][ T3891] hfs: invalid uid -1 [ 684.971619][ T3891] hfs: unable to parse mount options 04:09:13 executing program 0: r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0x4}}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x30, r2, 0x805, 0x0, 0x0, {{0x1, 0x40030000000000}, 0x0, 0x6, 0x0, {0x14, 0x19, {0xffffff9e}}}}, 0x30}}, 0x0) 04:09:13 executing program 5: r0 = open(&(0x7f0000000000)='./file0\x00', 0x82040, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x82, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000001, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10001}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setlease(r0, 0x400, 0x0) rt_sigprocmask(0x0, 0x0, 0x0, 0x0) fcntl$setlease(r0, 0x40a, 0x0) 04:09:13 executing program 4: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x2001002, 0x0) r0 = creat(&(0x7f0000000100)='./file0\x00', 0x4) ioctl$SNDRV_SEQ_IOCTL_CLIENT_ID(r0, 0x80045301, &(0x7f0000000140)) mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x44000, 0x0) 04:09:13 executing program 1: r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f0000000000)="240081001e0025eaa87865f51ef6bce90a04000200bff20182a9000c080009000d000000", 0x24) [ 685.102472][ T3891] hfs: invalid uid -1 [ 685.117055][ T3891] hfs: unable to parse mount options 04:09:14 executing program 2: syz_mount_image$hfs(&(0x7f00000000c0)='hfs\x00', &(0x7f0000000140)='./file0\x00', 0x1000000, 0x0, 0x0, 0x0, &(0x7f0000000540)={[{@uid={'uid', 0x3d, 0xffffffffffffffff}}]}) 04:09:14 executing program 3: r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0x4}}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x30, r2, 0x805, 0x0, 0x0, {{0x1, 0x40030000000000}, 0x0, 0x6, 0x0, {0x14, 0x19, {0xfffff000}}}}, 0x30}}, 0x0) 04:09:14 executing program 0: r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0x4}}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x30, r2, 0x805, 0x0, 0x0, {{0x1, 0x40030000000000}, 0x0, 0x6, 0x0, {0x14, 0x19, {0xffffffa1}}}}, 0x30}}, 0x0) 04:09:14 executing program 1: r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f0000000000)="240181001e0025eaa87865f51ef6bce90a04000200bff20182a9000c080009000d000000", 0x24) 04:09:14 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) socket(0x0, 0x0, 0x0) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000080)='syz_tun\x00\x00\x00\t\xf6\x00', 0x3bc) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @multicast1}, 0x10) connect$inet(r0, &(0x7f0000000280)={0x2, 0x0, @broadcast}, 0x10) [ 685.451220][ T3930] hfs: invalid uid -1 [ 685.462897][ T3930] hfs: unable to parse mount options 04:09:14 executing program 3: r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0x4}}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x30, r2, 0x805, 0x0, 0x0, {{0x1, 0x40030000000000}, 0x0, 0x6, 0x0, {0x14, 0x19, {0xffffff7f}}}}, 0x30}}, 0x0) 04:09:14 executing program 4: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) readlink(&(0x7f0000000080)='./file0\x00', &(0x7f00000001c0)=""/83, 0x53) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x2001002, 0x0) mount$bpf(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x44000, 0x0) 04:09:14 executing program 1: r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f0000000000)="240281001e0025eaa87865f51ef6bce90a04000200bff20182a9000c080009000d000000", 0x24) 04:09:14 executing program 0: r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0x4}}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x30, r2, 0x805, 0x0, 0x0, {{0x1, 0x40030000000000}, 0x0, 0x6, 0x0, {0x14, 0x19, {0xffffffea}}}}, 0x30}}, 0x0) 04:09:14 executing program 2: syz_mount_image$hfs(&(0x7f00000000c0)='hfs\x00', &(0x7f0000000140)='./file0\x00', 0x2000000, 0x0, 0x0, 0x0, &(0x7f0000000540)={[{@uid={'uid', 0x3d, 0xffffffffffffffff}}]}) 04:09:14 executing program 5: r0 = socket(0x200001000000011, 0x4000000000000003, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000240)={'bridge0\x00', 0x0}) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000000)={r1, 0x3, 0x6, @broadcast}, 0x10) 04:09:14 executing program 1: r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f0000000000)="240381001e0025eaa87865f51ef6bce90a04000200bff20182a9000c080009000d000000", 0x24) 04:09:14 executing program 3: r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0x4}}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x30, r2, 0x805, 0x0, 0x0, {{0x1, 0x40030000000000}, 0x0, 0x6, 0x0, {0x14, 0x19, {0xffffff9e}}}}, 0x30}}, 0x0) 04:09:14 executing program 0: r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0x4}}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x30, r2, 0x805, 0x0, 0x0, {{0x1, 0x40030000000000}, 0x0, 0x6, 0x0, {0x14, 0x19, {0xfffffff0}}}}, 0x30}}, 0x0) [ 685.788767][ T3965] hfs: invalid uid -1 [ 685.792784][ T3965] hfs: unable to parse mount options 04:09:14 executing program 4: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x2001002, 0x0) mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x44000, 0x0) r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000100)='/dev/hwrng\x00', 0x20000, 0x0) ioctl$TCFLSH(r0, 0x540b, 0xffffffffffffff5a) [ 685.876349][ T3965] hfs: invalid uid -1 [ 685.938934][ T3965] hfs: unable to parse mount options [ 685.940757][ T3977] device bridge0 entered promiscuous mode 04:09:14 executing program 3: r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0x4}}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x30, r2, 0x805, 0x0, 0x0, {{0x1, 0x40030000000000}, 0x0, 0x6, 0x0, {0x14, 0x19, {0xffffffa1}}}}, 0x30}}, 0x0) 04:09:14 executing program 1: r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f0000000000)="240082001e0025eaa87865f51ef6bce90a04000200bff20182a9000c080009000d000000", 0x24) [ 686.007088][ T3973] device bridge0 left promiscuous mode 04:09:14 executing program 4: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000080)='./file0/file0\x00', &(0x7f00000019c0)='bpf\x00', 0x10, 0x0) chmod(&(0x7f0000000100)='./file0/file0\x00', 0x80) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) r0 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) ioctl$KDSETLED(r0, 0x4b32, 0xfffffffffffffffb) r1 = accept$alg(0xffffffffffffffff, 0x0, 0x0) munmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000) recvmmsg(r1, &(0x7f0000002f80)=[{{&(0x7f00000001c0)=@xdp, 0x80, &(0x7f0000001600)=[{&(0x7f0000000240)=""/4096, 0x1000}, {&(0x7f0000001240)=""/233, 0xe9}, {&(0x7f0000001340)=""/125, 0x7d}, {&(0x7f0000000140)=""/4, 0x4}, {&(0x7f00000013c0)=""/169, 0xa9}, {&(0x7f0000001480)=""/78, 0x4e}, {&(0x7f0000001500)=""/248, 0xf8}], 0x7, &(0x7f0000001680)=""/203, 0xcb}, 0x8}, {{0x0, 0x0, &(0x7f0000002b00)=[{&(0x7f0000001780)=""/153, 0x99}, {&(0x7f0000001840)=""/191, 0xbf}, {&(0x7f0000001900)=""/109, 0x6d}, {&(0x7f0000001a00)=""/4096, 0x1000}, {&(0x7f0000002a00)=""/248, 0xf8}], 0x5, &(0x7f0000002b80)=""/198, 0xc6}, 0x2c}, {{&(0x7f0000002c80)=@nfc_llcp, 0x80, &(0x7f0000001980)=[{&(0x7f0000002d00)=""/114, 0x72}, {&(0x7f0000002d80)=""/197, 0xc5}], 0x2, &(0x7f0000002e80)=""/222, 0xde}, 0x7ff}], 0x3, 0x10002, &(0x7f0000003040)={0x77359400}) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x2001002, 0x0) mount$bpf(0x0, &(0x7f0000003080)='./file0\x00', 0x0, 0x1044000, 0x0) 04:09:14 executing program 2: syz_mount_image$hfs(&(0x7f00000000c0)='hfs\x00', &(0x7f0000000140)='./file0\x00', 0x3000000, 0x0, 0x0, 0x0, &(0x7f0000000540)={[{@uid={'uid', 0x3d, 0xffffffffffffffff}}]}) [ 686.075414][ T3988] device bridge0 entered promiscuous mode [ 686.098454][ T3973] device bridge0 left promiscuous mode 04:09:15 executing program 0: r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0x4}}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x30, r2, 0x805, 0x0, 0x0, {{0x1, 0x40030000000000}, 0x0, 0x6, 0x0, {0x14, 0x19, {0xfffffffc}}}}, 0x30}}, 0x0) 04:09:15 executing program 5: perf_event_open(&(0x7f0000000040)={0x1, 0x4c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0x4000000000a, 0x3, 0x2) sendmsg$unix(r0, &(0x7f0000000900)={&(0x7f0000000180)=@abs, 0x6e, &(0x7f0000000040)=[{&(0x7f0000001900)="83", 0x1}], 0x1}, 0x0) recvmmsg(r0, &(0x7f0000000240)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffde4}}], 0x627, 0x2, 0x0) [ 686.238418][ T4001] hfs: invalid uid -1 04:09:15 executing program 4: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x2001002, 0x0) mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x44000, 0x0) pipe2(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80000) symlinkat(&(0x7f0000000100)='./file0\x00', r0, &(0x7f00000001c0)='./file0\x00') 04:09:15 executing program 3: r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0x4}}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x30, r2, 0x805, 0x0, 0x0, {{0x1, 0x40030000000000}, 0x0, 0x6, 0x0, {0x14, 0x19, {0xffffffea}}}}, 0x30}}, 0x0) 04:09:15 executing program 1: r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f0000000000)="240182001e0025eaa87865f51ef6bce90a04000200bff20182a9000c080009000d000000", 0x24) [ 686.261162][ T4001] hfs: unable to parse mount options [ 686.375488][ T4001] hfs: invalid uid -1 [ 686.381959][ T4001] hfs: unable to parse mount options 04:09:15 executing program 0: r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0x4}}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x30, r2, 0x805, 0x0, 0x0, {{0x1, 0x40030000000000}, 0x0, 0x6, 0x0, {0x14, 0x19, {0x1000000000000}}}}, 0x30}}, 0x0) 04:09:15 executing program 4: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x2001002, 0x0) mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x44000, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='cpuacct.stat\x00', 0x0, 0x0) ioctl$SG_EMULATED_HOST(r0, 0x2203, &(0x7f0000000140)) 04:09:15 executing program 3: r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0x4}}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x30, r2, 0x805, 0x0, 0x0, {{0x1, 0x40030000000000}, 0x0, 0x6, 0x0, {0x14, 0x19, {0xfffffff0}}}}, 0x30}}, 0x0) 04:09:15 executing program 1: r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f0000000000)="240282001e0025eaa87865f51ef6bce90a04000200bff20182a9000c080009000d000000", 0x24) 04:09:15 executing program 2: syz_mount_image$hfs(&(0x7f00000000c0)='hfs\x00', &(0x7f0000000140)='./file0\x00', 0x4000000, 0x0, 0x0, 0x0, &(0x7f0000000540)={[{@uid={'uid', 0x3d, 0xffffffffffffffff}}]}) 04:09:15 executing program 5: perf_event_open(&(0x7f0000000040)={0x1, 0x4c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0x4000000000a, 0x3, 0x2) sendmsg$unix(r0, &(0x7f0000000900)={&(0x7f0000000180)=@abs, 0x6e, &(0x7f0000000040)=[{&(0x7f0000001900)="83", 0x1}], 0x1}, 0x0) recvmmsg(r0, &(0x7f0000000240)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffde4}}], 0x627, 0x2, 0x0) 04:09:15 executing program 1: r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f0000000000)="240382001e0025eaa87865f51ef6bce90a04000200bff20182a9000c080009000d000000", 0x24) 04:09:15 executing program 3: r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0x4}}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x30, r2, 0x805, 0x0, 0x0, {{0x1, 0x40030000000000}, 0x0, 0x6, 0x0, {0x14, 0x19, {0xfffffffc}}}}, 0x30}}, 0x0) [ 686.809651][ T4039] hfs: invalid uid -1 04:09:15 executing program 0: r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0x4}}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x30, r2, 0x805, 0x0, 0x0, {{0x1, 0x40030000000000}, 0x0, 0x6, 0x0, {0x14, 0x19, {0x3000000000000}}}}, 0x30}}, 0x0) [ 686.837505][ T4039] hfs: unable to parse mount options 04:09:15 executing program 4: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) r0 = shmget(0x1, 0x1000, 0x8, &(0x7f0000fff000/0x1000)=nil) shmctl$SHM_UNLOCK(r0, 0xc) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x2001002, 0x0) mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x44000, 0x0) 04:09:15 executing program 2: syz_mount_image$hfs(&(0x7f00000000c0)='hfs\x00', &(0x7f0000000140)='./file0\x00', 0x5000000, 0x0, 0x0, 0x0, &(0x7f0000000540)={[{@uid={'uid', 0x3d, 0xffffffffffffffff}}]}) 04:09:15 executing program 1: r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f0000000000)="240083001e0025eaa87865f51ef6bce90a04000200bff20182a9000c080009000d000000", 0x24) 04:09:15 executing program 0: r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0x4}}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x30, r2, 0x805, 0x0, 0x0, {{0x1, 0x40030000000000}, 0x0, 0x6, 0x0, {0x14, 0x19, {0x40030000000000}}}}, 0x30}}, 0x0) 04:09:15 executing program 3: r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0x4}}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x30, r2, 0x805, 0x0, 0x0, {{0x1, 0x40030000000000}, 0x0, 0x6, 0x0, {0x14, 0x19, {0x1000000000000}}}}, 0x30}}, 0x0) [ 687.136448][ T4061] hfs: invalid uid -1 04:09:15 executing program 1: r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f0000000000)="240183001e0025eaa87865f51ef6bce90a04000200bff20182a9000c080009000d000000", 0x24) 04:09:16 executing program 5: perf_event_open(&(0x7f0000000040)={0x1, 0x4c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0x4000000000a, 0x3, 0x2) sendmsg$unix(r0, &(0x7f0000000900)={&(0x7f0000000180)=@abs, 0x6e, &(0x7f0000000040)=[{&(0x7f0000001900)="83", 0x1}], 0x1}, 0x0) recvmmsg(r0, &(0x7f0000000240)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffde4}}], 0x627, 0x2, 0x0) [ 687.187529][ T4061] hfs: unable to parse mount options 04:09:16 executing program 4: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) socket$kcm(0x29, 0x2, 0x0) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000040)="2e000000130081c5e4050cecdb4cb9040a485e002000000000ffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1}, 0x0) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x2001002, 0x0) [ 687.308482][ T4061] hfs: invalid uid -1 [ 687.312498][ T4061] hfs: unable to parse mount options 04:09:16 executing program 0: r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0x4}}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x30, r2, 0x805, 0x0, 0x0, {{0x1, 0x40030000000000}, 0x0, 0x6, 0x0, {0x14, 0x19, {0xf0ffffffffffff}}}}, 0x30}}, 0x0) 04:09:16 executing program 4: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) chroot(&(0x7f0000000100)='./file0/file0\x00') mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f00000014c0)='/dev/rtc0\x00', 0x400, 0x0) r0 = syz_open_dev$midi(&(0x7f0000000140)='/dev/midi#\x00', 0x6ee, 0x408000) ioctl$SG_IO(r0, 0x2285, &(0x7f0000001440)={0x53, 0xfffffffffffffffb, 0x33, 0x3, @scatter={0x3, 0x0, &(0x7f0000001340)=[{&(0x7f00000001c0)=""/113, 0x71}, {&(0x7f0000000240)=""/4096, 0x1000}, {&(0x7f0000001240)=""/216, 0xd8}]}, &(0x7f0000001380)="3ca1ca0231d839ff038d644dd1f2342502512799b91e48bb1c0ac16a4e74ba39ede331532b71a87eb4800e83b71f222d720e99", &(0x7f00000013c0)=""/61, 0x9, 0x5, 0x1, &(0x7f0000001400)}) mkdir(&(0x7f0000001640)='./file0/file0\x00', 0x122) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x4, 0x0) mount$bpf(0x0, &(0x7f00000015c0)='./file0/file0\x00', 0x0, 0x44000, 0x0) lsetxattr$security_smack_transmute(&(0x7f0000000080)='./file0\x00', &(0x7f0000001500)='security.SMACK64TRANSMUTE\x00', &(0x7f0000001580)='TRUE', 0x4, 0x1) 04:09:16 executing program 3: r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0x4}}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x30, r2, 0x805, 0x0, 0x0, {{0x1, 0x40030000000000}, 0x0, 0x6, 0x0, {0x14, 0x19, {0x3000000000000}}}}, 0x30}}, 0x0) 04:09:16 executing program 1: r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f0000000000)="240283001e0025eaa87865f51ef6bce90a04000200bff20182a9000c080009000d000000", 0x24) 04:09:16 executing program 2: syz_mount_image$hfs(&(0x7f00000000c0)='hfs\x00', &(0x7f0000000140)='./file0\x00', 0x6000000, 0x0, 0x0, 0x0, &(0x7f0000000540)={[{@uid={'uid', 0x3d, 0xffffffffffffffff}}]}) 04:09:16 executing program 3: r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0x4}}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x30, r2, 0x805, 0x0, 0x0, {{0x1, 0x40030000000000}, 0x0, 0x6, 0x0, {0x14, 0x19, {0x40030000000000}}}}, 0x30}}, 0x0) 04:09:16 executing program 0: r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0x4}}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x30, r2, 0x805, 0x0, 0x0, {{0x1, 0x40030000000000}, 0x0, 0x6, 0x0, {0x14, 0x19, {0x100000000000000}}}}, 0x30}}, 0x0) 04:09:16 executing program 1: r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f0000000000)="240383001e0025eaa87865f51ef6bce90a04000200bff20182a9000c080009000d000000", 0x24) [ 687.678212][ T4103] hfs: invalid uid -1 [ 687.693359][ T4103] hfs: unable to parse mount options 04:09:16 executing program 4: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x2001002, 0x0) mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x44000, 0x0) r0 = accept$ax25(0xffffffffffffffff, &(0x7f0000000100)={{0x3, @default}, [@null, @default, @default, @rose, @default, @bcast, @null, @bcast]}, &(0x7f00000001c0)=0x48) r1 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, &(0x7f0000000400)={0x0, @in={{0x2, 0x4e20, @empty}}, 0x0, 0x9}, &(0x7f00000004c0)=0x90) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(r1, 0x84, 0xf, &(0x7f0000000500)={r2, @in={{0x2, 0x4e24, @remote}}, 0x3, 0x0, 0x0, 0xa73, 0x6}, &(0x7f00000005c0)=0x98) recvmsg(r0, &(0x7f00000003c0)={&(0x7f0000000200)=@vsock={0x28, 0x0, 0x0, @hyper}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000280)=""/25, 0x19}, {&(0x7f00000002c0)=""/14, 0xe}, {&(0x7f0000000300)=""/92, 0x5c}], 0x3}, 0x100) 04:09:16 executing program 0: r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0x4}}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x30, r2, 0x805, 0x0, 0x0, {{0x1, 0x40030000000000}, 0x0, 0x6, 0x0, {0x14, 0x19, {0x200000000000000}}}}, 0x30}}, 0x0) [ 687.774016][ T4103] hfs: invalid uid -1 [ 687.792721][ T4103] hfs: unable to parse mount options 04:09:16 executing program 5: perf_event_open(&(0x7f0000000040)={0x1, 0x4c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0x4000000000a, 0x3, 0x2) sendmsg$unix(r0, &(0x7f0000000900)={&(0x7f0000000180)=@abs, 0x6e, &(0x7f0000000040)=[{&(0x7f0000001900)="83", 0x1}], 0x1}, 0x0) recvmmsg(r0, &(0x7f0000000240)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffde4}}], 0x627, 0x2, 0x0) 04:09:16 executing program 3: r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0x4}}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x30, r2, 0x805, 0x0, 0x0, {{0x1, 0x40030000000000}, 0x0, 0x6, 0x0, {0x14, 0x19, {0xf0ffffffffffff}}}}, 0x30}}, 0x0) 04:09:16 executing program 1: r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f0000000000)="240084001e0025eaa87865f51ef6bce90a04000200bff20182a9000c080009000d000000", 0x24) 04:09:16 executing program 2: syz_mount_image$hfs(&(0x7f00000000c0)='hfs\x00', &(0x7f0000000140)='./file0\x00', 0x7000000, 0x0, 0x0, 0x0, &(0x7f0000000540)={[{@uid={'uid', 0x3d, 0xffffffffffffffff}}]}) 04:09:16 executing program 0: r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0x4}}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x30, r2, 0x805, 0x0, 0x0, {{0x1, 0x40030000000000}, 0x0, 0x6, 0x0, {0x14, 0x19, {0x300000000000000}}}}, 0x30}}, 0x0) 04:09:16 executing program 1: r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f0000000000)="240184001e0025eaa87865f51ef6bce90a04000200bff20182a9000c080009000d000000", 0x24) 04:09:16 executing program 4: r0 = syz_open_dev$cec(&(0x7f0000000300)='/dev/cec#\x00', 0x1, 0x2) ioctl$SNDRV_RAWMIDI_IOCTL_STATUS(r0, 0xc0385720, &(0x7f0000000340)={0x1, {0x77359400}, 0xecb, 0x94ec}) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) r1 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ubi_ctrl\x00', 0x0, 0x0) recvfrom$inet6(r1, &(0x7f00000001c0)=""/239, 0xef, 0x40, &(0x7f0000000140)={0xa, 0x4e23, 0x7ff, @remote, 0x9}, 0x1c) fanotify_mark(r1, 0x14, 0x10, r1, &(0x7f0000000080)='./file0/file0\x00') mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x2001002, 0x0) syz_open_dev$dspn(&(0x7f0000000380)='/dev/dsp#\x00', 0x8, 0x4000) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x3e78dc65782aa1d3, 0x0) 04:09:16 executing program 3: r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0x4}}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x30, r2, 0x805, 0x0, 0x0, {{0x1, 0x40030000000000}, 0x0, 0x6, 0x0, {0x14, 0x19, {0x100000000000000}}}}, 0x30}}, 0x0) [ 688.119911][ T4141] hfs: invalid uid -1 [ 688.150070][ T4141] hfs: unable to parse mount options 04:09:17 executing program 1: r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f0000000000)="240284001e0025eaa87865f51ef6bce90a04000200bff20182a9000c080009000d000000", 0x24) 04:09:17 executing program 3: r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0x4}}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x30, r2, 0x805, 0x0, 0x0, {{0x1, 0x40030000000000}, 0x0, 0x6, 0x0, {0x14, 0x19, {0x200000000000000}}}}, 0x30}}, 0x0) [ 688.260899][ T4141] hfs: invalid uid -1 [ 688.279783][ T4141] hfs: unable to parse mount options 04:09:17 executing program 0: r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0x4}}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x30, r2, 0x805, 0x0, 0x0, {{0x1, 0x40030000000000}, 0x0, 0x6, 0x0, {0x14, 0x19, {0x400000000000000}}}}, 0x30}}, 0x0) 04:09:17 executing program 4: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000100)='./file0/file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f0000000140)='./file0/file0\x00', 0x80) mount$bpf(0x20000000, &(0x7f0000000000)='./file0/file0\x00', 0x0, 0x2001012, 0x0) mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x44000, 0x0) 04:09:17 executing program 5: perf_event_open(&(0x7f0000000040)={0x1, 0x4c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0x4000000000a, 0x3, 0x2) recvmmsg(r0, &(0x7f0000000240)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffde4}}], 0x627, 0x2, 0x0) 04:09:17 executing program 2: syz_mount_image$hfs(&(0x7f00000000c0)='hfs\x00', &(0x7f0000000140)='./file0\x00', 0x8000000, 0x0, 0x0, 0x0, &(0x7f0000000540)={[{@uid={'uid', 0x3d, 0xffffffffffffffff}}]}) 04:09:17 executing program 1: r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f0000000000)="240384001e0025eaa87865f51ef6bce90a04000200bff20182a9000c080009000d000000", 0x24) 04:09:17 executing program 3: r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0x4}}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x30, r2, 0x805, 0x0, 0x0, {{0x1, 0x40030000000000}, 0x0, 0x6, 0x0, {0x14, 0x19, {0x300000000000000}}}}, 0x30}}, 0x0) 04:09:17 executing program 0: r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0x4}}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x30, r2, 0x805, 0x0, 0x0, {{0x1, 0x40030000000000}, 0x0, 0x6, 0x0, {0x14, 0x19, {0x500000000000000}}}}, 0x30}}, 0x0) [ 688.534292][ T4169] hfs: invalid uid -1 [ 688.551614][ T4169] hfs: unable to parse mount options 04:09:17 executing program 2: syz_mount_image$hfs(&(0x7f00000000c0)='hfs\x00', &(0x7f0000000140)='./file0\x00', 0x9000000, 0x0, 0x0, 0x0, &(0x7f0000000540)={[{@uid={'uid', 0x3d, 0xffffffffffffffff}}]}) 04:09:17 executing program 3: r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0x4}}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x30, r2, 0x805, 0x0, 0x0, {{0x1, 0x40030000000000}, 0x0, 0x6, 0x0, {0x14, 0x19, {0x400000000000000}}}}, 0x30}}, 0x0) 04:09:17 executing program 4: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x2001002, 0x0) mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x800102, 0x0) 04:09:17 executing program 1: r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f0000000000)="240085001e0025eaa87865f51ef6bce90a04000200bff20182a9000c080009000d000000", 0x24) 04:09:17 executing program 0: r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0x4}}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x30, r2, 0x805, 0x0, 0x0, {{0x1, 0x40030000000000}, 0x0, 0x6, 0x0, {0x14, 0x19, {0x600000000000000}}}}, 0x30}}, 0x0) 04:09:17 executing program 1: r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f0000000000)="240185001e0025eaa87865f51ef6bce90a04000200bff20182a9000c080009000d000000", 0x24) [ 688.834374][ T4197] hfs: invalid uid -1 [ 688.854431][ T4197] hfs: unable to parse mount options 04:09:17 executing program 3: r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0x4}}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x30, r2, 0x805, 0x0, 0x0, {{0x1, 0x40030000000000}, 0x0, 0x6, 0x0, {0x14, 0x19, {0x500000000000000}}}}, 0x30}}, 0x0) 04:09:18 executing program 5: perf_event_open(&(0x7f0000000040)={0x1, 0x4c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0x4000000000a, 0x3, 0x2) recvmmsg(r0, &(0x7f0000000240)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffde4}}], 0x627, 0x2, 0x0) 04:09:18 executing program 2: syz_mount_image$hfs(&(0x7f00000000c0)='hfs\x00', &(0x7f0000000140)='./file0\x00', 0xa000000, 0x0, 0x0, 0x0, &(0x7f0000000540)={[{@uid={'uid', 0x3d, 0xffffffffffffffff}}]}) 04:09:18 executing program 0: r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0x4}}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x30, r2, 0x805, 0x0, 0x0, {{0x1, 0x40030000000000}, 0x0, 0x6, 0x0, {0x14, 0x19, {0x700000000000000}}}}, 0x30}}, 0x0) 04:09:18 executing program 4: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x100080005, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x2001002, 0x0) mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x44000, 0x0) 04:09:18 executing program 1: r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f0000000000)="240285001e0025eaa87865f51ef6bce90a04000200bff20182a9000c080009000d000000", 0x24) 04:09:18 executing program 3: r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0x4}}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x30, r2, 0x805, 0x0, 0x0, {{0x1, 0x40030000000000}, 0x0, 0x6, 0x0, {0x14, 0x19, {0x600000000000000}}}}, 0x30}}, 0x0) [ 689.521416][ T4241] hfs: invalid uid -1 04:09:18 executing program 4: socketpair(0x9, 0x38a90095c41c7eb1, 0x200, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$EBT_SO_GET_ENTRIES(r0, 0x0, 0x81, &(0x7f0000000280)={'nat\x00', 0x0, 0x3, 0x69, [], 0x7, &(0x7f0000000180)=[{}, {}, {}, {}, {}, {}, {}], &(0x7f0000000200)=""/105}, &(0x7f0000000300)=0x78) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) getsockopt$bt_rfcomm_RFCOMM_LM(r1, 0x12, 0x3, &(0x7f0000000340), &(0x7f0000000380)=0x4) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001002, 0x0) mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x44000, 0x0) setsockopt$RXRPC_EXCLUSIVE_CONNECTION(r0, 0x110, 0x3) socket$inet(0x2, 0x1, 0x13f) [ 689.542525][ T4241] hfs: unable to parse mount options 04:09:18 executing program 0: r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0x4}}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x30, r2, 0x805, 0x0, 0x0, {{0x1, 0x40030000000000}, 0x0, 0x6, 0x0, {0x14, 0x19, {0xa00000000000000}}}}, 0x30}}, 0x0) 04:09:18 executing program 1: r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f0000000000)="240385001e0025eaa87865f51ef6bce90a04000200bff20182a9000c080009000d000000", 0x24) 04:09:18 executing program 3: r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0x4}}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x30, r2, 0x805, 0x0, 0x0, {{0x1, 0x40030000000000}, 0x0, 0x6, 0x0, {0x14, 0x19, {0x700000000000000}}}}, 0x30}}, 0x0) 04:09:18 executing program 4: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000200)='/dev/mixer\x00', 0x2401, 0x0) symlinkat(&(0x7f00000001c0)='.\x00', r0, &(0x7f0000000240)='./file0/file1\x00') mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) symlink(&(0x7f0000000100)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00') rseq(&(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={0x0, 0x1, 0x14, 0x5d, 0x7fffffff}, 0x2}, 0x20, 0x1, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000002c0)='./file0/file1\x00', 0x0, 0x2001002, 0x0) mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x44000, 0x0) [ 689.666947][ T4241] hfs: invalid uid -1 [ 689.700531][ T4241] hfs: unable to parse mount options 04:09:18 executing program 0: r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0x4}}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x30, r2, 0x805, 0x0, 0x0, {{0x1, 0x40030000000000}, 0x0, 0x6, 0x0, {0x14, 0x19, {0xe00000000000000}}}}, 0x30}}, 0x0) 04:09:19 executing program 5: perf_event_open(&(0x7f0000000040)={0x1, 0x4c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0x4000000000a, 0x3, 0x2) recvmmsg(r0, &(0x7f0000000240)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffde4}}], 0x627, 0x2, 0x0) 04:09:19 executing program 2: syz_mount_image$hfs(&(0x7f00000000c0)='hfs\x00', &(0x7f0000000140)='./file0\x00', 0xb000000, 0x0, 0x0, 0x0, &(0x7f0000000540)={[{@uid={'uid', 0x3d, 0xffffffffffffffff}}]}) 04:09:19 executing program 3: r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0x4}}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x30, r2, 0x805, 0x0, 0x0, {{0x1, 0x40030000000000}, 0x0, 0x6, 0x0, {0x14, 0x19, {0xa00000000000000}}}}, 0x30}}, 0x0) 04:09:19 executing program 1: r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f0000000000)="240086001e0025eaa87865f51ef6bce90a04000200bff20182a9000c080009000d000000", 0x24) 04:09:19 executing program 4: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x2001002, 0x0) mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x44000, 0x0) 04:09:19 executing program 0: r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0x4}}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x30, r2, 0x805, 0x0, 0x0, {{0x1, 0x40030000000000}, 0x0, 0x6, 0x0, {0x14, 0x19, {0xf00000000000000}}}}, 0x30}}, 0x0) [ 690.511678][ T4307] hfs: invalid uid -1 04:09:19 executing program 3: r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0x4}}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x30, r2, 0x805, 0x0, 0x0, {{0x1, 0x40030000000000}, 0x0, 0x6, 0x0, {0x14, 0x19, {0xe00000000000000}}}}, 0x30}}, 0x0) 04:09:19 executing program 4: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000100)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$DRM_IOCTL_RES_CTX(0xffffffffffffffff, 0xc0106426, &(0x7f0000000240)={0x3, &(0x7f0000000200)=[{0x0}, {}, {}]}) ioctl$DRM_IOCTL_RM_CTX(r0, 0xc0086421, &(0x7f0000000280)={r1, 0x3}) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x2001002, 0x0) mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x44000, 0x0) 04:09:19 executing program 1: r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f0000000000)="240186001e0025eaa87865f51ef6bce90a04000200bff20182a9000c080009000d000000", 0x24) 04:09:19 executing program 0: r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0x4}}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x30, r2, 0x805, 0x0, 0x0, {{0x1, 0x40030000000000}, 0x0, 0x6, 0x0, {0x14, 0x19, {0x3f00000000000000}}}}, 0x30}}, 0x0) [ 690.560705][ T4307] hfs: unable to parse mount options 04:09:19 executing program 2: syz_mount_image$hfs(&(0x7f00000000c0)='hfs\x00', &(0x7f0000000140)='./file0\x00', 0x10000000, 0x0, 0x0, 0x0, &(0x7f0000000540)={[{@uid={'uid', 0x3d, 0xffffffffffffffff}}]}) 04:09:19 executing program 1: r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f0000000000)="240286001e0025eaa87865f51ef6bce90a04000200bff20182a9000c080009000d000000", 0x24) [ 690.837541][ T4330] hfs: invalid uid -1 [ 690.851343][ T4330] hfs: unable to parse mount options [ 690.938324][ T4330] hfs: invalid uid -1 [ 690.942335][ T4330] hfs: unable to parse mount options 04:09:20 executing program 5: perf_event_open(&(0x7f0000000040)={0x1, 0x4c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$unix(0xffffffffffffffff, &(0x7f0000000900)={&(0x7f0000000180)=@abs, 0x6e, &(0x7f0000000040)=[{&(0x7f0000001900)="83", 0x1}], 0x1}, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000000240)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffde4}}], 0x627, 0x2, 0x0) 04:09:20 executing program 3: r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0x4}}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x30, r2, 0x805, 0x0, 0x0, {{0x1, 0x40030000000000}, 0x0, 0x6, 0x0, {0x14, 0x19, {0xf00000000000000}}}}, 0x30}}, 0x0) 04:09:20 executing program 4: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x2001002, 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x80802, 0x0) r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0x2, 0x0) ioctl$DRM_IOCTL_AGP_ALLOC(r0, 0xc0206434, &(0x7f0000000280)={0x59, 0x0, 0x2, 0x3}) ioctl$DRM_IOCTL_AGP_UNBIND(r0, 0x40106437, &(0x7f0000000300)={r1, 0x3}) ioctl$TUNATTACHFILTER(r0, 0x401054d5, &(0x7f0000000200)={0x7, &(0x7f0000000100)=[{0x1f, 0x8, 0x3, 0x3}, {0x8, 0x1, 0xfffffffffffffbff, 0xb3}, {0x56, 0x4, 0x1000, 0x7fff}, {0x8, 0x2, 0x81, 0x1}, {0x1, 0x7fff, 0x2, 0x8001}, {0x8001, 0x3, 0xfffffffffffffffe, 0xffffffffffff0001}, {0xadd, 0x4, 0x0, 0x2}]}) r2 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000240)='/dev/hwrng\x00', 0x400000, 0x0) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffffff, 0xc0206434, &(0x7f0000000140)={0xede, 0x0, 0x0, 0x3}) ioctl$DRM_IOCTL_SG_ALLOC(r2, 0xc0106438, &(0x7f00000001c0)={0x0, r3}) 04:09:20 executing program 0: r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0x4}}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x30, r2, 0x805, 0x0, 0x0, {{0x1, 0x40030000000000}, 0x0, 0x6, 0x0, {0x14, 0x19, {0x4000000000000000}}}}, 0x30}}, 0x0) 04:09:20 executing program 1: r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f0000000000)="240386001e0025eaa87865f51ef6bce90a04000200bff20182a9000c080009000d000000", 0x24) 04:09:20 executing program 2: syz_mount_image$hfs(&(0x7f00000000c0)='hfs\x00', &(0x7f0000000140)='./file0\x00', 0x20000000, 0x0, 0x0, 0x0, &(0x7f0000000540)={[{@uid={'uid', 0x3d, 0xffffffffffffffff}}]}) [ 691.430732][ T4350] hfs: invalid uid -1 04:09:20 executing program 1: r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f0000000000)="240087001e0025eaa87865f51ef6bce90a04000200bff20182a9000c080009000d000000", 0x24) [ 691.460809][ T4350] hfs: unable to parse mount options 04:09:20 executing program 0: r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0x4}}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x30, r2, 0x805, 0x0, 0x0, {{0x1, 0x40030000000000}, 0x0, 0x6, 0x0, {0x14, 0x19, {0x4800000000000000}}}}, 0x30}}, 0x0) 04:09:20 executing program 3: r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0x4}}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x30, r2, 0x805, 0x0, 0x0, {{0x1, 0x40030000000000}, 0x0, 0x6, 0x0, {0x14, 0x19, {0x2f02000000000000}}}}, 0x30}}, 0x0) 04:09:20 executing program 4: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vcs\x00', 0x400200, 0x0) getsockopt$inet6_buf(r0, 0x29, 0xd3, &(0x7f00000001c0)=""/206, &(0x7f0000000140)=0xce) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x2001002, 0x0) r1 = getpgrp(0x0) r2 = getuid() lstat(&(0x7f0000001440)='./file0/file1\x00', &(0x7f0000001480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000001500)=0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000001540)={{{@in=@broadcast, @in6=@ipv4={[], [], @multicast2}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@remote}, 0x0, @in6=@ipv4={[], [], @initdev}}}, &(0x7f0000001640)=0xe8) getgroups(0x2, &(0x7f0000001680)=[0x0, 0xee01]) fcntl$getownex(r0, 0x10, &(0x7f0000001800)={0x0, 0x0}) r8 = getuid() getgroups(0x6, &(0x7f0000001840)=[0xee00, 0x0, 0xee01, 0x0, 0xee01, 0xee00]) r10 = syz_open_dev$usb(&(0x7f0000001880)='/dev/bus/usb/00#/00#\x00', 0x3, 0x280) ioctl$TIOCGPGRP(r0, 0x540f, &(0x7f00000018c0)=0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000002a00)={{{@in6=@initdev, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={[], [], @multicast2}}, 0x0, @in6}}, &(0x7f0000001900)=0xe8) stat(&(0x7f0000001940)='./file0/file0\x00', &(0x7f0000002b00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r14 = getpgrp(0xffffffffffffffff) getresuid(&(0x7f0000002e00)=0x0, &(0x7f0000002e40), &(0x7f0000002e80)) r16 = getegid() r17 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000004b40)='/dev/ptmx\x00', 0x420000, 0x0) r18 = getpid() getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000004b80)={0x0, 0x0}, &(0x7f0000004bc0)=0xc) r20 = getgid() ioctl$TIOCGPGRP(r0, 0x540f, &(0x7f0000004c00)=0x0) fstat(r0, &(0x7f0000004c40)={0x0, 0x0, 0x0, 0x0, 0x0}) getresgid(&(0x7f0000004cc0)=0x0, &(0x7f0000004d00), &(0x7f0000004d40)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000005380)={0x0, r0, 0x0, 0x1, &(0x7f0000005340)='\x00'}, 0x30) r25 = getuid() getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000053c0)={0x0, 0x0, 0x0}, &(0x7f0000005400)=0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000005480)={0xffffffffffffffff, r0, 0x0, 0x9, &(0x7f0000005440)='/dev/vcs\x00'}, 0x30) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000054c0)={0x0, 0x0}, &(0x7f0000005500)=0xc) stat(&(0x7f0000005540)='./file0/file0/file0\x00', &(0x7f0000005580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fcntl$getownex(r0, 0x10, &(0x7f0000005600)={0x0, 0x0}) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000005640)={{{@in6, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@local}, 0x0, @in6=@ipv4={[], [], @dev}}}, &(0x7f0000005740)=0xe8) fstat(r0, &(0x7f0000005780)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) sendmmsg$unix(r0, &(0x7f0000005d00)=[{&(0x7f00000002c0)=@abs={0x1, 0x0, 0x4e21}, 0x6e, &(0x7f0000001400)=[{&(0x7f0000000340)="f89b14faed289678a09f11dd57173a3dfc8cef627f05c6bcacd5e5c69afcc5721b7e40623ebc94f3807b3d3b31a25069bade1fa1fd0171718f91e24fbaaf5b32af1bcdeeadd7d56c0cd5bf25d85d6c571740a992b03360fab7218fb4587d951fb62e3ac85ee69b60cbfd54e1a33cd787705fca19f76bf954db12ede411fbfd27543a9e274549bac200c9a6bbcb15573181ad81fd0b111785a5fc9cb9a7a0e9b241aacb9a22dc4e891e0f408ce1a2ae4875fa8a0347bec7ca01d5a9360a18cd765fbb56cf48ae2ecdd4802e328a956bf88191e9a7e6550031ddf6cfdea914ccc005a6962a212de5d988c8ee6aad7c7afe8d536dab623508aa4183c82136a8f6828ccdbcea6bdb5f926239588fd0ff63fd78f4359e3af84b710b2b145ef3f85f6909361bbb2574cf78c8847f4b1d5d845f616aadffa913c16ebf153e91212b12429ae37870468e8263200299240fc3116aaf237d35be880f873fcd4f6dba6409e79f852f89c9c05dcd6a9ba3e47a14f4a35325ffbd3b18f970decf37281a0f18be17f44fae5672e7ffeaf70485f618b1c72fd12df92498c9741003b4809f534014c466969a8de0cfc48947026cb5d759007a073e65218489375edda73159146c337a08aa7eb19475bd895ee925bb78c77ae1019b788c48c56d66e8841099702d842356e1ee422de9b61ac01fd07446f3b2ab92e84ea69c51282c31ad9c187c7b4cc3a9b384f388012fca9a408179d32e66a80fbe349ca0a524b59e83d810ba1744133c1718c30c1532b06e028976073bf84b0c23b4050ed99932ed4b5610772b89c94719d9d52a00e9dd11b1b41de9ce44e692fa047f1ffb7ef6010a7d6947e10905c41e6b5e5500af2751aba785f5a106738fe8af8e8f7c09a24f613de13f87102293883e79d00c79eb1c0a68cb6b79d39c37954cafc8e37691cd47bf35524b61e2fdbfdad1f905d64ad0298ddd0caa58556ef847cdeedb86e518fc5ae94af6102fb5cf9d4bbce45534b2bf4b6e319cdc934422a2eaabe851cf7742fb20b89f1bb57f29e0c1470bc6370ca35026f0a2af32a553ec0059b38eb3b779c7705ef8345c762d0b2af4266f386dbd8f3fc6c4f1464eadfb42ba52020474d14b9a474a8e21fede06e2ca6e7aa4e3d00e6e7cb398d5fce3fe6ec33df329804dac9e43c8409fe23645e1eae861612057f8d28b75b9dc36f27c0fded5416da633e85d146b5b11a37c66e0deb15eb74f90db7ccc455afe3b625863a9c70bda3baf9e9fe55eaa3c8e4b0d235d08448d229a7f9b659fe87ad09332513b3fcb8f29ae2c93dead14b615a8dbdb312b03792bf2578246bcfa8460327e62e08044a39a3ee4f1e7f44ade85f7c1072bbb452289fd766fddee4a362e720bb6442dc3246bdbda5b87efb4d0e3f27814d1abd349d4fc3913d280ceece2794d798bbb1ccaec8c43a366046615c940e0cdcf1d3cd6b5232f9eca5f733b9bdb4e90b42b844ddf9f16a4abfa3efaf1cc5f8fb877db61ee998cc361c12b8fbd766a4ea838d46228f4697e9c00d6eeb6eb262b587a58b34950c1f391f573d38731dde2321315920fbd70754dd7386290bbe504100da0dcad27acbc8b7a136acfd71806850266fc3b27a196941158961554256579dc787addc425a6dadeaab66043501cfdf73a32d978aaf6c6ee693094aa695d51251cdd41decb15622294a6b11a27fad6b0220583a85b9e6450c2bea2cb90d36390a8954f41c4d992ed67dac634865183355e9583c6deb6f6ed11debe6decdbc2be19df2ed4a746d45a8cec662fa141f7483ca09093318c5f3463cbacbc4a467e6106ecf3796a4f4dbf59d50e110ecfa9560355d3100c7a95da8e280a38260b750960370d2b0d4741888e831c93b70a77094652a4e9ba45627d76abb89e38b15a6e6fe106781b59204b327b42a3eb7fdee72d0f2d11c020ebc552e901935bd208a24b834f9ffd37393e1e86108bfd9f57131215adf9c2f4061a9c1248d6b9e37500a74acc49951d492ce6557a14c2e9a36c06f8c78a63696e1b7d8deda5243b055e585b89d24a366b80ca9f2211b947329392c210293bdf80bd34372217fa06ac346871955e2528e4be4efd20fb2e3a9a6f6ae345ede0a9383d2af625d357e35ac8c3802f03614355df68e172f1be271b8d4d428d5b6785f4e811a194420bd36cfbc16792e716784859b8c3fe2a1f2ac7c305a02ad76b5144979ddeccd019398bef788c52497fea68e011bd9a16ee6b38382ecc13e7869436f559717595a789b54b531a4fdefd8dc5316958240517c46d76385b6e491c825d8761fcbc2371bb9d1bbde3325caf8b7f5e00edc550230ffd8def2b226643a93278380f536f1bb517337400af39bc24b531a95a89b325611b4962d03f35c8321d1f1b9d40a03f1a64fb205048897df45ee2ef05beca87574e1af16818fa47980da4e25b5a0816c955d36f40eabde6c75a9428040e3b1e80091331a39937f4b93a3c5464514661a71713e948a86b94bb88e2f38a3975ef55db94fa9cf9daf92832be10fd8bdb4e0f4d386b8e205970caa8888fc2bbbc3de2838f004510ee867ac90a175b8e8ffe82ba6f5954e2eeb0fe3fab71631252219c6ee984fc5331ff76d77abed02a86f2b02a51185da0ba2d5befc3e2c0a117d69fd1f2ebe3ae816a5cc129fd15156e4b962574622cd5d8996941b75c6f0dcaf21a11a17090f33fd645660e870b26ec5b98195ec4fd5730ad8532c0fb55a30b7993bf5e8519e9697f1fa12cdd61f9c1647fd08a2b68495a8fe97e509b5d402c201d02920b4e6109a969bab1cbf098199c90f99a9e4107163180d72c2bf3e758a86ddc67e81c39adb1ece1f7a671dac81e9380b15efded2f543ee62092cf78142f05141d0bb0d30bd402d70670e1305eb1f5b333f0846e441065a8fd5e320f442381a2dffa7bb85c39f188dcbfb1dab6c3e917eb0096a336176a3917083857bdc999f225529e42c398e93b6aa297376a367b65316ab4ffb5755556405c30c1e9ae0d3e7894a5b80840214400647602aceb439a935a7dcbc5fab2b57aecfb403499135a2b148d03402add01df95293f26037d098a2ec2da73293f2577cb2121145894d1472ad7e4ddc4e47a8b3271eb4a942fde1379d5f7e6f744510a8501671185d2f509e69ab265dced70df4d5880b1e7be39bf753eaa119428c8ba9f9140bc299a1de9c6c0a74bbf63f9103b7f62020ebfa051679756f6d1671e8a522f24ff2a3adde3819d33b561725d02bdd370b72f9401356d533950ff33e4c60b2eabb7b5ff0fa59c087eb5dc1e098b58b93b250e79541220e5399e239386b0e0ceedf836cdfd488f9acd98ef51a78e7c5a7fb865e0acdb6efb09d67e21cb2ff5db0c27bf111060ce638ef9dea713663ee80c0ff9fb45a907b5fe29d2e8aad3c320333f8f6ed29bd86a6b5240c3bdcdd57b8b3eb75482b480f77cb43f6a897342a87b61c372678e8782f4d9e901bae347f6a814c582e6e9a4cb921239b3a75c4bd388c1ea6521c9f727566143b96d4e209a70b3a8ab465835bc724ccf1ea4cd4f5a2273ccf960a950697d8156fa364fc6c57d9c5543f9e1e61df154d0f123f465de8adc95ce1e266a5101d5167293fbec4bf1897ffbc5084bcaf8c39edfc3f960feff91d531260c83cf5de3bab9e4b0b6a4484847af9aaee6a31fb036b34a357f3f11e393eae03d2f5992eb8b048b2d21bb970b8bb67e5b467cc921d6d671395df46fafbd79feb78c4106ded955273c102539be1c734500e43ca79f5e87a571994d2d2f909bdb4025bf11371a5ac46a859ed6f729a65ad3317ca082bc79dbc5062c3854d7a979d552c3ba149d7ad42b0a7a13b2dd28a4d1428637692e3f41161408df562104fa7b8f5dd3d2337db40bd34e80730584f87b47c2ed5114f8335a4a61cf09c602d75be538fd9d2ad0fd3af68f8126f0d6838e6c2adca6c17b710271e8dad530278b23b9cbfbb5394b7d556550291e0c74e197fb6238f91a677d18fd535c775b7504aba2fe30d5b00fbf1052e0afe74f0ef19b4a2ee0f10b82748441f76172e36599606f8defde132fc486b4e14220a3343c48d585506452a98fde5d45bac2466899fff979322a9434d82f0dcdac9e43beaf6c0ac6920611bd1c336abcddefbd2c18e10963f284be6813fd2bd4733ba8e5aefb255e5e35cba10aa43872960cc427eeea6dfe1490d36407572085e59d348385e7d05c99393569aac90717a1d2c4ed897335d180161042a680fe2018d85267ad02318d86a5bade51772c078e0fe2d71fd1e6b3152d14d1c609d6d59f875d49b6575261ed3c07b34440e372f1449957640b106004c5a77b5fb9f819fc9f58171030ee4bdd3569e0a8c829ee1213842d3ed8be52c37bb288b69eb36d060422a2ce3967154bfff355dc0e6b74547ce0b0b84104c7b037ec41d23b4abf93b7b6dc467f7e60e2c0cf37232a653ebed8eec15aa79ad75b66d6e6a57b2a4ece3abd0b71e5caf23dd10a572e382d0d5e82d069cb323b67a94cbff66ed3d8b305259e58daff8528132838099d923d3cb806268922dd55b84aea3957ce2b5fd07e22c3428335673620eb67459d644c8f34a317333a1129d63b738e5ca5bbef40d5be4609ee6eafdc70de9eb5b43fcd2b50a8742ea7d2c143c5a1007e48d61602feb8b63dab514d8735d1a7ef97cc360f2a7731d71e091a0c768ab7dcdf4ebaf625ce6d3d29a79248c93305e89274c2d8701ea353929f8dc21d11b31dec7c17aa6217987da9859baca3d774e6e200ff8377cd07f9fdb47164b275cff090d39eec9a4452643e246ce06d71b35e4443232495c4de4100ff4b7a151b0c4c8d897a8f5cca4ccf585609d2d075cd54ffa2cf87c52aafc1b714e4fac7ede0c9678019ddf4ae91c10415611c59b4ce347ab0ca3926e88a37b9498c74072658fc9051747f5c5c3b62d1f862a51c9c93c8352b711a92c48b5d427caf9961b4204075ab32f82d7761c69f45d7bbdc4c31ab901077cc2f93ea5eeaf8d1a2612f46b1b3df134167f88d222acd31207890420a238049ad0fc3dfa528195062180935ae47b7521cac5efab6bfee66b445acf461a5e6665cc9e9bcf6b05e78125fda75ab699094dab1c3855155c42d1467d7ef04951884a5b945efb84e9038b0d9b8a93befb9d69e0ad516be5150155fa1ba29133073468f30339cb76f4f8570a615ed12173c5d20c4eedcef72ef4a29af7efcb515b6778da2e1f88aa817a9cd4d83fe83f2b210d68ce8cd7dfa1e292ffaba43bdd7d3f56d5ad45e490309dd115345f6a16fc46f5ef0dcc5d1b737aa6f35d65e7c26f58f33574b1d960a6ccfbe0cf38339445f79405550cffd430d6fec6a6b0c4f79a3b8917bfee12df9daad80079c439f7e68c47df2ceebc55d7021e5ca9938e444f11bcc488d81b0007f867b0bb2e810368351c7cfd30562da8f4f714e7f4fd313934686bfc49235c8e8c5a127d409991c95273b1b0ff2aa64603be9f0fd9029eb36bce48226f12d241707f2b5685637dbab1a835d6f829b0a9c176e8280a8400726c800153bad34c76b5d8ce958960962eb696b5d9e71c65e01984ea4acfe7f87d915cd3e68416f8fffb1683a629ce8322c60daa53b5fa20f44c44da5c269e184f13688a393e2ca316c83dca5c9abd39075bf8fb2ac389d6e6fea4b8206a33ae493e90523cf1ec5d002b1bf8b4122eb05a185ecfda41a76ec133ea034da4782dc13e73f6b05118611280836d94b3474d09280ac400cbfe6425af60735d6d0bd4f49a1ea657c06a40feae4280c2395c835b971", 0x1000}, {&(0x7f0000001340)="f053a86225a2189f7b1d3ca89ee48c5b3048df8929b1266ebfc47e468c74fe218b317ba0a3a2ee588099aa946256cf066ddda336029c1837af4409ff7823dd10491bfa56387f83f87379b8245829463d15aab45afe3078b82feff85a42755f10f26c232e20a338ddba3cefc848325419942224d613f7291957670f1cb3c690c3b99733", 0x83}], 0x2, &(0x7f00000016c0)=[@cred={{0x1c, 0x1, 0x2, {r1, r2, r3}}}, @cred={{0x1c, 0x1, 0x2, {r4, r5, r6}}}], 0x40, 0x40000}, {&(0x7f0000001700)=@file={0x1, './file0/file0/file0\x00'}, 0x6e, &(0x7f00000017c0)=[{&(0x7f0000001780)="830ca53b5802f11c080c47c500db819f56c2ef206b4a4d2b774082bfa892c72b4dbddcb95a19fe6a9fbcbec4ecc8c34619fabf772131969c", 0x38}, {&(0x7f0000001a00)="b6e9f3345c5874554e75931c32be396737d70772df4e850b2920ab3e31f8fe016e115425bacbcb4dc41bcd36511cf33524cbc0b05fc0499a80d143316b09aafd0aec28fc4c9fef3a04cb4cafc78b43823fe10139f146ba55e9cf47784177d6d11604634246c4f9825fc004f5b943439ecc0036ed81f1ddae3aafc981966242dc1b39308aa130fd494ab6771ead8f057f625ba67c0bee199f78d4b57d2dd840c8b042628e3415c2a88542843d5eeea0958c0ff115346f4d90668366c2da6f28650357d4632d983e0752e3864e8d13e22a6b758d060a03b4782918fdcc9cef99820655b387b93cc532da6bee51f1665cd36bc5cb61e5f11ec08d79e55b2156a55d43b1e96ddebc060dfe17550bdd1fb4d364f554f846e36a9c5e844edf51a68ecbe8e4181432c590df023056810fee4848a35977d02b5fdbb632ec27f0cc1a51aca69df343a1b368acc023eae2ad8945529bee78832d957e7863b5f2bb6f8c0a890eb4df22c522c15af88bbda0f8da216b336dd369af24673085fcd93ca4fe4c4216efde46369deb33e7ba32c2f4101b663545806d9f4ce458487a2e2f4e9c875fc1d7bab66e771147bf1b0d92376ac70810e3967b23573a99bb7d6c9d95c5febc49539fb5cfcca209a47fc391290c70df371e766957dacb86fcf0e8d44ce6ad3dbbacd346583d1efc444eafcdaa79366f87f61802eb612ab9126bcb5e6aacde9d8619b8cb1f75a639eceeb86c515af8228c6b7fe09ba24b9dee8a3b876a1754a1bdd71d8c7b5288a5f460766be75dee53ccc365b76af5b5b04b4d7d82f8507107f03520a21ee93b94114beb918f88d816996f61395d9b73dfcdf1ba86bb6c07fb3b8f23d4dba1ebcdedf7d22479a8f342611627bf704a2eeb7ba3caee98f6dc907c88938e357b712c4b52332a589734710dd6a03d077f386c052aec9dcb9e0d25535d42cd0d8f86e824952af6bb911fc640c311abfc28cdfb1707934e0a0e3cde0d7425dd401dd99a59c07226e1d863cabd7f4121a6ad7addb86e0159f36ce88b1968a818995524163c730f956451660f996128de3471dc96d1f9cbdda5ea41e6b1e9854d18ae09affb96a9294d0b416bac782fed3a6c060cbd53b193dc7abffc7a61ceac79d9a99d8075d9c89a4d42c0164ade279030cbb2bdf22c125b80dff4a87f4b1ff43027901c3a9e6fe85423ddcdbc9606933daac90ef6a60ce735e61cc782dd40f663a971f722fd97a56f406bf1908769b7453e49523cd623cb0874dc26792a5985012a311bd125dadde13f7feaf459beed1032a3187243ff44a944db0f011941f06f2bf890f00d992711f1a913cbe06f628c07ea9e16509a82c51a2d7a20e5d7cebe83c586d5a78b292c79704be0ded501a74d5f9632fc16242d1a79ba9cc677bf92e16197eb30f56a0ed21dd099d648657ead6d916ba25d32ebb128e75317965546b99bb1de8c03486df351ca4865a8a45248c52d67343eef4bc88bbe4c2efeb9dd76aa8c81e4da9f4c59f71af1ca26874460a68e684926ae478afd6de9903665ae2d0f006dbfd68b91f067ebc18237801ee939fbe798091bc6f2aaf78587b67c397697b7c663f866e0577387476378e3420098fc32a968aefa11fd430f1d03bb40eb33a9c8a8bd81b95c419f8b30954e3ab2767e99541d2a4fe92fb40a9677a829a543ef0304d3871dc0dd4a713b77dd634ff9ea4a77c8062e0d2c3836a0bc114d59f5e1703aca4376087b43a1e05621fda9ff6950c4408206bdf6f8df6f145173d498b1c95d54ae589f284f5bd9cdf7f7ffe68c8389fc947833257b1267e3d7eb66d102bc625def51b2f2ebf9ff14bf2341d0a3452d9611844b00c6ef25a5c57eeca2859f8d15175216860b006ed5ab34ba2f198ddbd74688d8725fc309647bac5b9d199dfeae781557245e95c7c5a84145fe09cc4b65c1cc78a250710e9be58acee5cfa511e5155d319f232672c223824634ea685a3f7326dcd2d456f4dc528ddf810dd6fb44b5f0bb28472237ad3387f2a926d6db043e61ae04c1eaaa25c575caceb11d083c724e2db6eb4b112ab452f2b3399610ec086e39876027b132db86d5471be8e21d38469afebcc0a058025096ab32b79406d3b8522ef56efb65574c2ec5d08f2aa221c185a7ea519d5c248316ec0bf5c9a1fdf333ae29699dca3d22ef8fd7991db00d852147f15b82c96fdfd604e85356e5230a7f2d13d1d0ced343e8c8a64ad057c38bf497e1a4c5274d13dd83d582b5b24331cbd122d2772d678c95521a4a8345e619a6a80c350c6ee2291aec08bcfb3199293d3f77762b1d0c61ddf7dd95cf93d2b41e43eab519b3ee2d50fb4d04e30031dde9f0eb51242c9f992dd3b5ce43f98ccc1df7c39f7c7b21b2336eea57fcaa8c40ed2811d8589c5c6196f317e5ac66962ec89ac644222b44aeafc6b54926240365f8243b73018d642beaaa7a9d8f77cc60e1c0cfc3a09474dc1fd179c55091184943de0edac35c98ed834073db7516bf2ff9f2ba26034a9f09c3ad5f24ad55f10af13ab280c94686cac605f00fc850bebdd17e1f65e07a2e8d1bdada4e6223de1ab25a7e91179417c9d5b775231e9a5b2b85c3cff327f2cb7c4252196a8b535d8081ec7650b8169a21ab8e4d32d6640ae35a1b2cfc9f6e24667322d6a34617bd193f21bb7319e35a49fb1da86b1aeb824c1c2938778aeb404d32803c0a2ce0171db5e433105bdf31dacfd69ada1afa524864f4f05a27d0605ac9466091a68a82643f7dbacd04f8287c4f4d0ce90574bfe4644cbdd99d01dea160a0bf624b6d330ed1190bd5df07b512947f6bc62f3b8235041c4aae35240fab60d413d4dd029da932b617c3a0f322545d2ca7750a0582d3718a004587f7e38b97a9164fdfb3786e33badd654bc8c06ad874cb67611fa31fc0dc85c3ab7d99797d009c01fbd1bff84531a6d197bb0103d437c2bc6b9a6978196f1b1eea19e4ae74076f0a29f152ae5a7a31ca587f3efa4213e2440cad15e2276b3e14addd9ab00eb78416d4d4573e918384c9c7dd9114f64abcf354539cdf61317c3e3d88c3304ee370ff503ef502792ffa08465e2e2916d8cb0d61ef6b0cb59689f837a9f30e5ea558508d5e2c1e1986c668878e5cf6ace390e4d68ca4280d4bb2c63be72142685809081a9f9efc23dcc2e9f7a962bc993d358ff51d225252bbce2588cd35060ee1834fc761196b26f06e6edad5be3d7e16a356ce69cebaa0f656943fc1a655c24784a41f964570fc836359e2e3587a7eae8fc2b575e24008faffff908f776f318dbef18c65859c43fc5087500fa98323f89e2b78c831a0b815f547660b9720d54efd124d83e4ac572749de7a820767eee8e2e520e9204ca114a13414f88901a7a1378f99feb7061ddaec075a33a761b6fec64c67939228bcb1e96544f56aadefd0981e16326e4e39dfc394d2555198e8c3068f9aab697bc5482222fa11db707c2f425760bf6fedf82be7420fd1ca9e9dabd72eb59741863a468366d7acf5cf188387d7fb94a6e449c9bfccaa96301c5f11c324f39debba255c534dd538f7953dd54862700d3bd73785cc2a05baa805dca9bb9e4a19a97d5f174a953e3a308783dfa74ae150ce0e375ac35a8c683df5a2ce308919de7ba9bcba5d005ac085b91a3e10da30e984b35a13cfde0746a20bef9c54ed2d0e9b89b88daa85ac60ba095837cc7b2d16726457d0d9953a885ff44d7dc30718cf575637576dd0d65e0d9e110437c198985754077e79ecfdd5636176720999af3c1d78e3a39d9785f4ad256253ffc21e268bd85a6283802045f93ee5b18c04b980ab87be54fdadaeb603c6a058ce3080ec5ac4f6f7127aa1390b1d835e734f0475a2975837409420a982d85621c2ab020dd5d30abf104a4369c1eb1ad476dc2b98730715c607fd546dc77e00d0111362e99f64e9206599ab04610d6d08e3a951dc19f06ec17e03d3f8c807aa34f949fc7638c304267fd2249b30dd6b14c37dd78578db59ea21ff42aeaba64eacd74b29b7db9f867ea454aabd7c1ef650cd05f7533cd66f293858ac3c4cb0ec72ec1b4e477ac17a26fc845b6b9d3820fb8d9be4fcd0125bad641857e0dd223cd222e29e5d3f54da9bb04fb32fd88c4ca0c7ed377bd95f4e067e0a7c754494ef346495ff34d86074332aeea62e77d11e007e788b50c744ed50a9e98cb866cf8ce2c4da889d2d02af0733782fb51ef2af833dee19a139fbd8972b27732a3bb3bebbee0c4dbb7cbf71453e9bc8c80a39d71c6e2a3e94369284f324543fae16b0bcb3f38d0e99e7ade7d85bd952a606b042065fabbfcc6465ac0b425fab8674de3cb05f4469c1c9121c55038dd59e9766b38262afe03dfd7209878c577e1a6b4960f3ebbf127d69c2a519b6cb9672cb0bb711d0cae8147201fbdacc798ca252b9f43eb23d12332a735c3b533d1255422859a8113635f7c4dad8c4bc3bbf8bf22117c7456febb20a086d1f08f18194d680f16d5b3bc01907fc0e379b0b0f39e8f3ca5c7bf8d7bb2f33731ee585511f803431432192a49abd91ee1fb8d74f6038d008eb7bac8efdb41f14c6e6e472ecadb44d4feadda9e0f4655a1cd70ad63d542ff7e744d68770f6407a528429fdd68cb126c8559d486b345f620fdcc38f75ee6c8cd7df8d51c96c90f50874459a39ecfc6248b7ac0dba20a502e4860990566da6081136e0971a905b5cbf86e499b6a4f83dafff64ba0b5922495cea24375877ed88762e65bcb610073119d1d0c04006851dd7cf175785857e89ac160b395ef1cbdbc82532b487785b216074777deeafc0c2d7e804192c239934da3f2635da5ded5c53f10dad6dbbc8005897e0d7ef685e36db441df4648e64f38e1e4b9f2c3a242cc8b884f39bb88d7ab28b46c88c57df439862734b13919e5cac7692c29dcf6da71d5f70d91f5b37b7eba31442ec9958cc96865fa85f0f10cd79df3dc4500ee9866f32893ae934ce000b6b8b3aafcaa1d0bed47c5161d04447f95c009e426a7be68a5e54d121cba8928dfe83f207470c6d0b4f6bdd190d5ae19ff200fd000879de2622404a3bbdcfac365db6bfae481c2945ff4f82d11668f288e7f90fd46a63b42bbc4c2036cacb6787f7b2ec42914e0af7a06cfaf24995fb566e107ed7f0c2391165deb03e336c57e48669b23f0e34d13b73e5fe18ed256764c01ffef2cdec70221b51c5e33e3fee386815c4cc41106fbf02d24aaae0c44f8cb016fa4238c951229a579a5d26347daa59b5bd6a37f236fc93a099659cb467462c18e81b454b1df5d575a67686eddab0e988e805c62916b85495689df934fc7326629f350eb12012057112b2687d2fd66a61d29ad1ff56e2aaf2a342e542059b167ac422a294fd4cb7ac37809443632d7fad1f1e769bbf071c02ef8fb2bac84b644de42bd74ff7e8b7dd6892382221c78364edaab555c9c903cc203ea018ec844134f314de3f046e1c87c0781290bb76b1e4d09b86902b0ac905b854952ddb444b8628daaf1d26e984f13666833e9d6f9b084a6bd3520bf1bd7299d1e43551deee17bf20e61745081c0bff8f7449e4ee485ad6a2eb0a9c6f86d65c1f05879bd95c9f6d3cb9c9869d24bf895bb212de205d705600c856a02139f2dc20dcb0e094b69313ae3513ba5c2f472811c1be15dcbeaa0798db072206f9efa1c90fbbc81ad61f6345f2237d07c501032366fa8c9454fe520893448c652ff9d5a1175b0b4e210a8d0cbffdc80e679e8e5bd060f591e2df061c02e62c60bf03bfc81ff1efd9bf414bef8c1db91e78f6224ac76aa56b", 0x1000}], 0x2, &(0x7f0000002b80)=[@cred={{0x1c, 0x1, 0x2, {r7, r8, r9}}}, @rights={{0x34, 0x1, 0x1, [r10, r0, r0, r0, r0, r0, r0, r0, r0]}}, @cred={{0x1c, 0x1, 0x2, {r11, r12, r13}}}, @rights={{0x24, 0x1, 0x1, [r0, r0, r0, r0, r0]}}, @rights={{0x24, 0x1, 0x1, [r0, r0, r0, r0, r0]}}], 0xc8, 0x1}, {&(0x7f0000002c80)=@file={0x3086e8ff69a02c70, './file0/file1\x00'}, 0x6e, &(0x7f0000002dc0)=[{&(0x7f0000001980)="e3074f2e412e6015372922d6fbbd9cd4844b2a3e57bfd3df09fef3302f9beca556", 0x21}, {&(0x7f0000002d00)="da10ace3e8b6873caa4e408bd2e56627bcc957fcd594066503de75c5fff5fa5baf00032b1038a722a9cafb4c671fdb02d6657946b6faa1d962a8471219a2d50db3e0941b7fc4ddccceffdd482fa4b5eaf05a12a4f5d1dc0661d7e286fbea1d70eef5819b97113c3ad2d59e8752b3fbb58521ee7dd5208609c5976e9cd6d67437", 0x80}, {&(0x7f0000002d80)="d93ec5721f26ab6965bfde04e053bef44267e22b60f45d43bea9ae7b7cfa52454e6f8d15ade388c2a446", 0x2a}], 0x3, &(0x7f0000002ec0)=[@rights={{0x24, 0x1, 0x1, [r0, r0, r0, r0, r0]}}, @rights={{0x18, 0x1, 0x1, [r0, r0]}}, @rights={{0x18, 0x1, 0x1, [r0, r0]}}, @cred={{0x1c, 0x1, 0x2, {r14, r15, r16}}}, @rights={{0x28, 0x1, 0x1, [r0, r0, r0, r0, r0, r0]}}, @rights={{0x18, 0x1, 0x1, [r0, r0]}}], 0xb8, 0x800}, {&(0x7f0000002f80)=@abs={0x1, 0x0, 0x4e22}, 0x6e, &(0x7f0000003480)=[{&(0x7f0000003000)="ddff073f646c5ef6c6d6e4ad004f08e272069f1998e934adb628bcf8168dabd9b9512aa2d712c5e9251465ccb063d6548a26d5f2772f89027e1478f9c6ee3a3596aa9a0eb603fa150b5831ca2107708dbc09e4e4c6fc29000120fd11efe4a184c3f9850e7c5151fb8da31e1ad9f1", 0x6e}, {&(0x7f0000003080)="13bab845ea0d6fc4fa464b1186fab990f4ec2eae99f143e431d2c76129ed09a45c4c409036964802e331a8aa59d7fa6eaacebbb1a752ee92e42628c7457853451a69e6b5aad34830cb55d2d7f30922ebbb099a84f8f8ca0e9f7998a7250aae452602a722854698ef1f8d9d5ecf2ccd12fc232c26ef5ba6b28ca63244c3c6c9", 0x7f}, {&(0x7f0000003100)="0a1756b53b30e800c25f1266271579775621dcc94576376499b29b626a2f040a25f1375d0b5e1308bff547120a4a7805894ba97669421e2525cb3870b329e8935803ec49ee0cfb10236885e7227ec87e95c5573987f6af4414e56b449c171784abba9aebb09c4802", 0x68}, {&(0x7f0000003180)="d956f3e3c5ae3cc2d2be076623dc87b5e3977e1fa88512a8628aa3af4de9152558c04981ea20328ba107119e5cee9223a09d8f9da8ccc2ca18b521b1ffd1a4aa5891bf8f4da752352c68250945088a3054c217de98c43c4c3e642acdb7fbc64f982b4efb9f8bd5337ff4cf3a91ec4074cae096234757c45d36bd3c2ec625010de4e8b2257ac19b65ec29c44f14ebe11d78da498ef77672745ee9bc5f702ef5e90a07470e39812106fd6919b3", 0xac}, {&(0x7f0000003240)="14e397d115d7ec51c3308ff7d15119bc44b81318751c4bab2549ed296368850710e0e0fc6ff19e4360ef537bc69de1af847199c39522d316d74b6506762be183f06409dd2edd33749ebfde5f467fe1ec8cd9219b1f56e9171990b18781f503cf148f4c5c93fd5e98706f88e6c35e3a6a328f9de8a9c27f98d891879f097bfd4cec7ae2e61e746250bb8e201c8a9822dccc58364729ac5fd0bcdf240d537c21d81537159aa37413a47c362d88221b35ed2cb518bb", 0xb4}, {&(0x7f0000003300)="168e48cc0748e790ec66bc173f09b3e576e2a344ee", 0x15}, {&(0x7f0000003340)="733b2e5bd58351f5f0b5a11bee0ff5274eef178945ff660bf732aeef0cf5f8be44b817e785174aa81dc463f1cee38838746d3c4f22b1f5ef2bf44f2d346e8571acbe37ce52dbb05be4498d3f2e706af93ec6f2fe3a1b1d3fd0f2be380cb700c75433ddf2dc209c178d9f07a1e022f9e2a5754d06062ba0392acc127c4e07388bf4e9187a825585fe0f3ee43616c4df327d4ff70925a54548217525efc59040eb4ae11e", 0xa3}, {&(0x7f0000003400)="1d48070ed9b2a70ce92972dbe5b8857b02c56ce1c69e83af2ce483340ff8ab64b439b9894384cf609e7d8d2168704eccd567f9bb6d7c6c10d387cdb26b2bf86052b0d5763a3d94acfea2ead0c334376322ffbd7819eb7b5432fdb645270599292ae6", 0x62}], 0x8, &(0x7f0000003500)=[@rights={{0x2c, 0x1, 0x1, [r0, r0, r0, r0, r0, r0, r0]}}], 0x30, 0x1}, {&(0x7f0000003540)=@abs={0x0, 0x0, 0x4e24}, 0x6e, &(0x7f0000003700)=[{&(0x7f00000035c0)="ef997b2fc61ddc86f45c298dbe85de4e870d998b4ac23cca23abe81e67c65bc6e6779ecef29a3274b91b07ca6df4956b0622afa524b5dcb8a5bd1b838721a2e1e4cd0d2781d3960e8cec88c4015051efcbaf7d951540adc14027352c2fe8c0eda0d781ea905a41d7c23fcddb0767dd9b7736630f7f42f0f06e6a624e522e1548fb2b", 0x82}, {&(0x7f0000003680)="b60160a9f662557844ed99ade374a94ea84f189cb847cd14af91afd4e83dec27899728d77967a3ca4f428b0a67420490a5b5ec808a6df4fd6213a39c5cffc8bef6beea2045ff2101", 0x48}], 0x2, 0x0, 0x0, 0x80}, {&(0x7f0000003740)=@abs={0x0, 0x0, 0x4e20}, 0x6e, &(0x7f0000004ac0)=[{&(0x7f00000037c0)="30280d240d8b7aa1ff37063e7a6de1e41f4a20e7a5dd20d09f2d7915480fb9ae08bc1b7a8da64b35775223f61486ebaea4b136ccb332f2153d2830d6a515cbb54325d894fea7b2adc6efd734ed69ce0214d27351448f232a5a36f5d9621ce45b1dacf5a58ac0d4ea54ad28797fdfe79afbb5933ecb7bb3d3f0dd56a78989c65d08ff9f460b2fd9b68f556a9ab5596cacd7a6d3c540b52621507ffc4c72601c616a349d2a9c81c1e22ca26e0553f66a7bd91e9e3be4ce8f00b09842787226930efbea7ad5eee27ae5af3495d44d3a8598ed62c042ad88a767bbaf7d67aa81c0da017168aad5edd661a5", 0xe9}, {&(0x7f00000038c0)="3e4d5e85ba35c42bdb3fc6f8faf8a62deb1c5944ba32f327dfbf4f9c9eed836721dbd5b3f829d472d8474504e5830767ddf8fb024d9098ecbc0dd7db3e1c9989e9cfdd6b1a33b57bcc3d7bc170b4e6cff5b671bc72d8e99aefb3f06a2e29a48509a2cc11dc49be01bee518ca977bd22139052fe2dbd2cbf1a1584f2c951d03e4b9fcee8bdb", 0x85}, {&(0x7f0000003980)="4c4201f88527a67a7702cf81152b7bb01b52700ffd7d9cdc86d810d3f6934a6183d553849eaebd30f67b40e34ba5986df7b46f42281aecf1e1de673f110f58530754277ffeb02a8fa835da3789009f71d1f35a7b89759a93c961f2428b9000ba82af22a11adb637d943bda5c19d7f21a84844ae63497b7e54545f9f63d11f0ab9bc55b41c4f4cc61", 0x88}, {&(0x7f0000003a40)="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", 0x1000}, {&(0x7f0000004a40)="2daaae8a35b90108c2c24288a685d2bed6d6b72ce088d80acef6bd15c559f382c9f01420b105ee90a80fe06fdb751db568a5fd3ad43a41035baadf1e4d1bf2cb00159afa8b86de7c3ba750a1a6e759093d2aea6e3c741a9cc347dcc91569b5f7e8724bb1387ad38d45cce8a4f0e6d970681c7c96", 0x74}, {0xfffffffffffffffd}], 0x6, &(0x7f0000004d80)=[@rights={{0x18, 0x1, 0x1, [r0, r0]}}, @rights={{0x2c, 0x1, 0x1, [r17, r0, r0, r0, r0, r0, r0]}}, @cred={{0x1c, 0x1, 0x2, {r18, r19, r20}}}, @cred={{0x1c, 0x1, 0x2, {r21, r22, r23}}}, @rights={{0x1c, 0x1, 0x1, [r0, r0, r0]}}], 0xa8, 0x8040}, {&(0x7f0000004e40)=@file={0x0, './file0/file0/file0\x00'}, 0x6e, &(0x7f00000052c0)=[{&(0x7f0000004ec0)="6d83bb41d8af0a6294096b0d1f0baea8e9c313f1607d5ebc60760a6cd7786dacf43244172465e66e82fb1c382644334be141026a750e390d551286d4500252897dd8ac84a96f3f89c524c0c554ab537edbcfc91123c364c565900b51369a3df56c18c6620c3b3e0b2352f9ab640734714b8cc86665ad9b2e51e37a81a1754d15b96dbe9fb0893734c4ee0865c5cb405b9936b5d673e1cb49b39d329608872ec606bc00cd094bc8fb398729b05124aa9669e24841daed58b2d9ce654cc2043862c2a722", 0xc3}, {&(0x7f0000004fc0)="f27d24f26ebecab4ad1c5e5ade5fb42e95405e8ddf0c2eda2b42a9d8601195fbd287be9b82bafccfe15eabffe597585da4322754eaf11babce0a108e02989668607a374a43591541306dafcd4bbe387dfaad54803f1e55132fa5ac856d080ea744605f386b39dc463875e0a36efc9af0a38cb195437a4c17036b6def524e99132a16d5b3ac303af157c42f1592f6578dd885bab8eac4719a1ecb0f0906b8a00cefe0d45b197c550d0eae37cbad2a03f0d73c4a76c627561291692b4d948b28a83641b423a2505858a22d9d92788c966e9ffd8db770d156d9ebf26087c65de55450a7bfd0529b3c05c1020047c05b78e86916162c5329c5eb", 0xf8}, {&(0x7f00000050c0)="485e83e92b8efe9a33d7a377ac7274d7dd43e67219c207e6daea563016", 0x1d}, {&(0x7f0000005100)="32e7232c9dd3852738fd4728aa706336520e6033144e0095b6befda088dae60e9a793bde7688f3ee33140a73a93279873e389e7b5e4bb47e1e187dcaebcc177292492ff9d0bc5b182378564908eff72723866ea4ed0cf91cea1ca040b603fb6018f06683d34c942edcea3d81fc43912ffbd0f461f7e8d9ff94aa69ca6ab4c548eb566aa661f06c8e25c609d01f43078f23fb6635ffc9", 0x96}, {&(0x7f00000051c0)="c8f1f5c3b903e17be3d290e95f5a3866aeec6b895e73ab2eb80a9962b58b543af8f353aae22006491721fcd5f765214d7cc47ca958c7c12a98e9214a19b638ca21893579fb2d1bc7aacd97b6f48c6810d8b731fa5d6ac2e5aec431845adfe215b47918c4c12be2967cf470aa4e86f6ee40af227171ff1c4b085a04f7e686235ace06ce5770771f362017abfc108788bf670f224b1e44c956db5328362861c15480d60eac0cf520aa6875976edb70a6ecdde23177082b7150f1fe5d8e111be9f72fa730744b99cf88351c6a7675cb959fa419702215aefa45af48c3270573e8", 0xdf}], 0x5, &(0x7f0000005800)=[@cred={{0x1c, 0x1, 0x2, {r24, r25, r26}}}, @cred={{0x1c, 0x1, 0x2, {r27, r28, r29}}}, @rights={{0x2c, 0x1, 0x1, [r0, r0, r0, r0, r0, r0, r0]}}, @cred={{0x1c, 0x1, 0x2, {r30, r31, r32}}}], 0x90, 0x20008840}, {&(0x7f00000058c0)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000005c80)=[{&(0x7f0000005940)="db3d66c096890e63d286e2a9eeaf559fa65676f50a0c905971bee09299ff151327b4dbe92cfa41803b8c28dac47eb635c39598f7f7838021e3d26491da8f5976c24b90430ef8975d9e5e59741e9b30143853e63f5851a1d781ecdee86830b8770b81539c45a14a09244973818ebe4c1af4a7fd2242af1bc88e9158cf0fc5a876ef3e3bc0b8ac78124af6dcc2a260a4fc286865248d230cf6ed13136bd0f71b737c12a563595b3b", 0xa7}, {&(0x7f0000005a00)="97b6fa510fc8a4eedab863f8470024c733f2df49079d781fe96a369d9970b7fc8b03e7d0a041e9d7e315e20ea2a2048bcb2f1739bf6082cdd9423c3a504709addc9c82971dc82aa5b11ba4b828360fb770610a3922f31a49fc77b9b8b3dbf8a8d57c1fe85a74c929ba2b3c3fe1d525fd1fccca38c90bd77078ff2b8307be753968ad294ff3a17b388c931a2758ac43213bed0c49d89617d84a110fbc44ac04794f590184dddf6cb08b40657f6a9779ea66b4", 0xb2}, {&(0x7f0000005ac0)="b6379321ed0eafc218f7b70cf594654140ffcae862be90c08fd27a25c6a9c4e7aedb4827d431eebb11e938facd677ea1191ddc1c1ef22fb4a3849be8da203171bfe51f980c54026ea5c675482fd5476de6081bb7bfd37c70ea23df62e079225783b0bdbcdfa2b2ff9b21555b9a4fa1bb27c0bc0daa153176fd034aa61bea88e0e52e", 0x82}, {&(0x7f0000005b80)="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", 0xff}], 0x4, &(0x7f0000005cc0)=[@rights={{0x24, 0x1, 0x1, [r0, r0, r0, r0, r0]}}], 0x28, 0x40044}], 0x8, 0xc7105acd4cfaefa5) mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x44000, 0x0) 04:09:20 executing program 2: syz_mount_image$hfs(&(0x7f00000000c0)='hfs\x00', &(0x7f0000000140)='./file0\x00', 0x20100000, 0x0, 0x0, 0x0, &(0x7f0000000540)={[{@uid={'uid', 0x3d, 0xffffffffffffffff}}]}) 04:09:20 executing program 5: perf_event_open(&(0x7f0000000040)={0x1, 0x4c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$unix(0xffffffffffffffff, &(0x7f0000000900)={&(0x7f0000000180)=@abs, 0x6e, &(0x7f0000000040)=[{&(0x7f0000001900)="83", 0x1}], 0x1}, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000000240)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffde4}}], 0x627, 0x2, 0x0) 04:09:20 executing program 1: r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f0000000000)="240187001e0025eaa87865f51ef6bce90a04000200bff20182a9000c080009000d000000", 0x24) 04:09:20 executing program 5: perf_event_open(&(0x7f0000000040)={0x1, 0x4c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$unix(0xffffffffffffffff, &(0x7f0000000900)={&(0x7f0000000180)=@abs, 0x6e, &(0x7f0000000040)=[{&(0x7f0000001900)="83", 0x1}], 0x1}, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000000240)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffde4}}], 0x627, 0x2, 0x0) 04:09:20 executing program 3: r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0x4}}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x30, r2, 0x805, 0x0, 0x0, {{0x1, 0x40030000000000}, 0x0, 0x6, 0x0, {0x14, 0x19, {0x3f00000000000000}}}}, 0x30}}, 0x0) [ 691.761355][ T4374] hfs: invalid uid -1 [ 691.796171][ T4374] hfs: unable to parse mount options 04:09:20 executing program 0: r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0x4}}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x30, r2, 0x805, 0x0, 0x0, {{0x1, 0x40030000000000}, 0x0, 0x6, 0x0, {0x14, 0x19, {0x4c00000000000000}}}}, 0x30}}, 0x0) 04:09:20 executing program 4: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000100)='/dev/autofs\x00', 0x18000, 0x0) getsockopt$inet6_dccp_int(r0, 0x21, 0xf, &(0x7f0000000140), &(0x7f00000001c0)=0x4) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x2001002, 0x0) mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x10004, 0x0) 04:09:20 executing program 2: syz_mount_image$hfs(&(0x7f00000000c0)='hfs\x00', &(0x7f0000000140)='./file0\x00', 0x3f000000, 0x0, 0x0, 0x0, &(0x7f0000000540)={[{@uid={'uid', 0x3d, 0xffffffffffffffff}}]}) 04:09:20 executing program 1: r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f0000000000)="240287001e0025eaa87865f51ef6bce90a04000200bff20182a9000c080009000d000000", 0x24) 04:09:20 executing program 5: r0 = socket(0x4000000000a, 0x3, 0x2) sendmsg$unix(r0, &(0x7f0000000900)={&(0x7f0000000180)=@abs, 0x6e, &(0x7f0000000040)=[{&(0x7f0000001900)="83", 0x1}], 0x1}, 0x0) recvmmsg(r0, &(0x7f0000000240)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffde4}}], 0x627, 0x2, 0x0) 04:09:20 executing program 3: r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0x4}}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x30, r2, 0x805, 0x0, 0x0, {{0x1, 0x40030000000000}, 0x0, 0x6, 0x0, {0x14, 0x19, {0x4000000000000000}}}}, 0x30}}, 0x0) 04:09:20 executing program 0: r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0x4}}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x30, r2, 0x805, 0x0, 0x0, {{0x1, 0x40030000000000}, 0x0, 0x6, 0x0, {0x14, 0x19, {0x6000000000000000}}}}, 0x30}}, 0x0) 04:09:20 executing program 1: r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f0000000000)="240387001e0025eaa87865f51ef6bce90a04000200bff20182a9000c080009000d000000", 0x24) [ 692.182481][ T4411] hfs: invalid uid -1 [ 692.203963][ T4411] hfs: unable to parse mount options 04:09:21 executing program 3: r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0x4}}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x30, r2, 0x805, 0x0, 0x0, {{0x1, 0x40030000000000}, 0x0, 0x6, 0x0, {0x14, 0x19, {0x4800000000000000}}}}, 0x30}}, 0x0) 04:09:21 executing program 4: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x2001002, 0x0) mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x44000, 0x0) r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vcs\x00', 0x2000, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000300)={0x0, @rand_addr, @broadcast}, &(0x7f0000000340)=0xc) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000380)={'bond0\x00', r1}) 04:09:21 executing program 5: r0 = socket(0x4000000000a, 0x3, 0x2) sendmsg$unix(r0, &(0x7f0000000900)={&(0x7f0000000180)=@abs, 0x6e, &(0x7f0000000040)=[{&(0x7f0000001900)="83", 0x1}], 0x1}, 0x0) recvmmsg(r0, &(0x7f0000000240)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffde4}}], 0x627, 0x2, 0x0) 04:09:21 executing program 0: r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0x4}}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x30, r2, 0x805, 0x0, 0x0, {{0x1, 0x40030000000000}, 0x0, 0x6, 0x0, {0x14, 0x19, {0x6800000000000000}}}}, 0x30}}, 0x0) [ 692.280643][ T4411] hfs: invalid uid -1 [ 692.298887][ T4411] hfs: unable to parse mount options 04:09:21 executing program 1: r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f0000000000)="240088001e0025eaa87865f51ef6bce90a04000200bff20182a9000c080009000d000000", 0x24) 04:09:21 executing program 2: syz_mount_image$hfs(&(0x7f00000000c0)='hfs\x00', &(0x7f0000000140)='./file0\x00', 0x40000000, 0x0, 0x0, 0x0, &(0x7f0000000540)={[{@uid={'uid', 0x3d, 0xffffffffffffffff}}]}) 04:09:21 executing program 4: mkdir(&(0x7f0000000140)='./file0/file0\x00', 0xd2) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) r0 = syz_open_dev$sndpcmp(&(0x7f0000000100)='/dev/snd/pcmC#D#p\x00', 0x81, 0x400801) ioctl$KDSETLED(r0, 0x4b32, 0x100000000) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x2001002, 0x0) mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x44000, 0x0) 04:09:21 executing program 3: r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0x4}}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x30, r2, 0x805, 0x0, 0x0, {{0x1, 0x40030000000000}, 0x0, 0x6, 0x0, {0x14, 0x19, {0x4c00000000000000}}}}, 0x30}}, 0x0) 04:09:21 executing program 5: r0 = socket(0x4000000000a, 0x3, 0x2) sendmsg$unix(r0, &(0x7f0000000900)={&(0x7f0000000180)=@abs, 0x6e, &(0x7f0000000040)=[{&(0x7f0000001900)="83", 0x1}], 0x1}, 0x0) recvmmsg(r0, &(0x7f0000000240)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffde4}}], 0x627, 0x2, 0x0) 04:09:21 executing program 0: r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0x4}}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x30, r2, 0x805, 0x0, 0x0, {{0x1, 0x40030000000000}, 0x0, 0x6, 0x0, {0x14, 0x19, {0x6c00000000000000}}}}, 0x30}}, 0x0) 04:09:21 executing program 1: r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f0000000000)="240188001e0025eaa87865f51ef6bce90a04000200bff20182a9000c080009000d000000", 0x24) [ 692.631684][ T4443] hfs: invalid uid -1 [ 692.668332][ T4443] hfs: unable to parse mount options 04:09:21 executing program 4: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x2001002, 0x0) uselib(&(0x7f0000000100)='./file0\x00') mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x44000, 0x0) 04:09:21 executing program 3: r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0x4}}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x30, r2, 0x805, 0x0, 0x0, {{0x1, 0x40030000000000}, 0x0, 0x6, 0x0, {0x14, 0x19, {0x6000000000000000}}}}, 0x30}}, 0x0) 04:09:21 executing program 2: syz_mount_image$hfs(&(0x7f00000000c0)='hfs\x00', &(0x7f0000000140)='./file0\x00', 0x48000000, 0x0, 0x0, 0x0, &(0x7f0000000540)={[{@uid={'uid', 0x3d, 0xffffffffffffffff}}]}) 04:09:21 executing program 0: r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0x4}}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x30, r2, 0x805, 0x0, 0x0, {{0x1, 0x40030000000000}, 0x0, 0x6, 0x0, {0x14, 0x19, {0x7400000000000000}}}}, 0x30}}, 0x0) 04:09:21 executing program 5: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0x4000000000a, 0x3, 0x2) sendmsg$unix(r0, &(0x7f0000000900)={&(0x7f0000000180)=@abs, 0x6e, &(0x7f0000000040)=[{&(0x7f0000001900)="83", 0x1}], 0x1}, 0x0) recvmmsg(r0, &(0x7f0000000240)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffde4}}], 0x627, 0x2, 0x0) 04:09:21 executing program 1: r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f0000000000)="240288001e0025eaa87865f51ef6bce90a04000200bff20182a9000c080009000d000000", 0x24) [ 692.962065][ T4469] hfs: invalid uid -1 04:09:21 executing program 3: r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0x4}}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x30, r2, 0x805, 0x0, 0x0, {{0x1, 0x40030000000000}, 0x0, 0x6, 0x0, {0x14, 0x19, {0x6800000000000000}}}}, 0x30}}, 0x0) [ 693.007188][ T4469] hfs: unable to parse mount options 04:09:21 executing program 4: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000200)='./file0/file0\x00', &(0x7f0000000240)='bpf\x00', 0x10001, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x2001002, 0x0) mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x44000, 0x0) 04:09:21 executing program 1: r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f0000000000)="240388001e0025eaa87865f51ef6bce90a04000200bff20182a9000c080009000d000000", 0x24) 04:09:21 executing program 0: r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0x4}}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x30, r2, 0x805, 0x0, 0x0, {{0x1, 0x40030000000000}, 0x0, 0x6, 0x0, {0x14, 0x19, {0x7a00000000000000}}}}, 0x30}}, 0x0) 04:09:21 executing program 2: syz_mount_image$hfs(&(0x7f00000000c0)='hfs\x00', &(0x7f0000000140)='./file0\x00', 0x4c000000, 0x0, 0x0, 0x0, &(0x7f0000000540)={[{@uid={'uid', 0x3d, 0xffffffffffffffff}}]}) 04:09:22 executing program 3: r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0x4}}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x30, r2, 0x805, 0x0, 0x0, {{0x1, 0x40030000000000}, 0x0, 0x6, 0x0, {0x14, 0x19, {0x6c00000000000000}}}}, 0x30}}, 0x0) 04:09:22 executing program 5: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0x4000000000a, 0x3, 0x2) sendmsg$unix(r0, &(0x7f0000000900)={&(0x7f0000000180)=@abs, 0x6e, &(0x7f0000000040)=[{&(0x7f0000001900)="83", 0x1}], 0x1}, 0x0) recvmmsg(r0, &(0x7f0000000240)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffde4}}], 0x627, 0x2, 0x0) [ 693.342155][ T4500] hfs: invalid uid -1 [ 693.362017][ T4500] hfs: unable to parse mount options 04:09:22 executing program 0: r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0x4}}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x30, r2, 0x805, 0x0, 0x0, {{0x1, 0x40030000000000}, 0x0, 0x6, 0x0, {0x14, 0x19, {0x8702000000000000}}}}, 0x30}}, 0x0) 04:09:22 executing program 4: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x2001002, 0x0) mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x44000, 0x0) mkdir(&(0x7f0000000100)='./file0\x00', 0x80) 04:09:22 executing program 1: r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f0000000000)="240089001e0025eaa87865f51ef6bce90a04000200bff20182a9000c080009000d000000", 0x24) 04:09:22 executing program 3: r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0x4}}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x30, r2, 0x805, 0x0, 0x0, {{0x1, 0x40030000000000}, 0x0, 0x6, 0x0, {0x14, 0x19, {0x7400000000000000}}}}, 0x30}}, 0x0) [ 693.468290][ T4500] hfs: invalid uid -1 [ 693.501537][ T4500] hfs: unable to parse mount options 04:09:22 executing program 2: syz_mount_image$hfs(&(0x7f00000000c0)='hfs\x00', &(0x7f0000000140)='./file0\x00', 0x60000000, 0x0, 0x0, 0x0, &(0x7f0000000540)={[{@uid={'uid', 0x3d, 0xffffffffffffffff}}]}) 04:09:22 executing program 5: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0x4000000000a, 0x3, 0x2) sendmsg$unix(r0, &(0x7f0000000900)={&(0x7f0000000180)=@abs, 0x6e, &(0x7f0000000040)=[{&(0x7f0000001900)="83", 0x1}], 0x1}, 0x0) recvmmsg(r0, &(0x7f0000000240)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffde4}}], 0x627, 0x2, 0x0) 04:09:22 executing program 1: r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f0000000000)="240189001e0025eaa87865f51ef6bce90a04000200bff20182a9000c080009000d000000", 0x24) 04:09:22 executing program 0: r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0x4}}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x30, r2, 0x805, 0x0, 0x0, {{0x1, 0x40030000000000}, 0x0, 0x6, 0x0, {0x14, 0x19, {0x9effffff00000000}}}}, 0x30}}, 0x0) 04:09:22 executing program 4: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000100)='/dev/mixer\x00', 0x4000, 0x0) ioctl$EVIOCSABS3F(r0, 0x401845ff, &(0x7f00000001c0)={0x7, 0x2, 0xfffffffffffffff7, 0x3, 0x5, 0x1f}) fcntl$setflags(r0, 0x2, 0x1) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x2001002, 0x0) mount$bpf(0x0, &(0x7f0000000200)='./file0/file0\x00', 0x0, 0x44000, 0x0) ioctl$SG_SET_DEBUG(r0, 0x227e, &(0x7f0000000140)) 04:09:22 executing program 3: r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0x4}}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x30, r2, 0x805, 0x0, 0x0, {{0x1, 0x40030000000000}, 0x0, 0x6, 0x0, {0x14, 0x19, {0x7a00000000000000}}}}, 0x30}}, 0x0) [ 693.790453][ T4529] hfs: invalid uid -1 04:09:22 executing program 1: r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f0000000000)="240289001e0025eaa87865f51ef6bce90a04000200bff20182a9000c080009000d000000", 0x24) 04:09:22 executing program 5: perf_event_open(&(0x7f0000000040)={0x0, 0x4c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0x4000000000a, 0x3, 0x2) sendmsg$unix(r0, &(0x7f0000000900)={&(0x7f0000000180)=@abs, 0x6e, &(0x7f0000000040)=[{&(0x7f0000001900)="83", 0x1}], 0x1}, 0x0) recvmmsg(r0, &(0x7f0000000240)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffde4}}], 0x627, 0x2, 0x0) [ 693.827102][ T4529] hfs: unable to parse mount options 04:09:22 executing program 2: syz_mount_image$hfs(&(0x7f00000000c0)='hfs\x00', &(0x7f0000000140)='./file0\x00', 0x68000000, 0x0, 0x0, 0x0, &(0x7f0000000540)={[{@uid={'uid', 0x3d, 0xffffffffffffffff}}]}) 04:09:22 executing program 0: r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0x4}}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x30, r2, 0x805, 0x0, 0x0, {{0x1, 0x40030000000000}, 0x0, 0x6, 0x0, {0x14, 0x19, {0xa1ffffff00000000}}}}, 0x30}}, 0x0) 04:09:22 executing program 4: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x2001002, 0x0) timer_create(0x7, &(0x7f00000001c0)={0x0, 0x15, 0x379cc8b512fca636, @tid=0xffffffffffffffff}, &(0x7f0000000200)=0x0) timer_gettime(r0, &(0x7f0000000240)) mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x44000, 0x0) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000100)='/dev/autofs\x00', 0x80, 0x0) write$FUSE_NOTIFY_RETRIEVE(r1, &(0x7f0000000140)={0x30, 0x5, 0x0, {0x0, 0x4, 0xe940, 0x1}}, 0x30) 04:09:22 executing program 3: r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0x4}}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x30, r2, 0x805, 0x0, 0x0, {{0x1, 0x40030000000000}, 0x0, 0x6, 0x0, {0x14, 0x19, {0x9effffff00000000}}}}, 0x30}}, 0x0) 04:09:22 executing program 1: r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f0000000000)="240389001e0025eaa87865f51ef6bce90a04000200bff20182a9000c080009000d000000", 0x24) [ 694.121050][ T4557] hfs: invalid uid -1 04:09:23 executing program 5: perf_event_open(&(0x7f0000000040)={0x0, 0x4c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0x4000000000a, 0x3, 0x2) sendmsg$unix(r0, &(0x7f0000000900)={&(0x7f0000000180)=@abs, 0x6e, &(0x7f0000000040)=[{&(0x7f0000001900)="83", 0x1}], 0x1}, 0x0) recvmmsg(r0, &(0x7f0000000240)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffde4}}], 0x627, 0x2, 0x0) [ 694.167198][ T4557] hfs: unable to parse mount options 04:09:23 executing program 0: r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0x4}}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x30, r2, 0x805, 0x0, 0x0, {{0x1, 0x40030000000000}, 0x0, 0x6, 0x0, {0x14, 0x19, {0xeaffffff00000000}}}}, 0x30}}, 0x0) 04:09:23 executing program 1: r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f0000000000)="24008a001e0025eaa87865f51ef6bce90a04000200bff20182a9000c080009000d000000", 0x24) 04:09:23 executing program 3: r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0x4}}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x30, r2, 0x805, 0x0, 0x0, {{0x1, 0x40030000000000}, 0x0, 0x6, 0x0, {0x14, 0x19, {0xa1ffffff00000000}}}}, 0x30}}, 0x0) 04:09:23 executing program 4: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x20000, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x2001002, 0x0) mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x44000, 0x0) r0 = geteuid() mount$bpf(0x0, &(0x7f0000000100)='./file1\x00', &(0x7f0000000140)='bpf\x00', 0x880c, &(0x7f00000001c0)={[{@mode={'mode', 0x3d, 0x1ff}}], [{@hash='hash'}, {@smackfstransmute={'smackfstransmute', 0x3d, 'em0vmnet1'}}, {@appraise_type='appraise_type=imasig'}, {@fowner_eq={'fowner', 0x3d, r0}}, {@permit_directio='permit_directio'}]}) [ 694.279543][ T4557] hfs: invalid uid -1 [ 694.291062][ T4557] hfs: unable to parse mount options 04:09:23 executing program 2: syz_mount_image$hfs(&(0x7f00000000c0)='hfs\x00', &(0x7f0000000140)='./file0\x00', 0x6c000000, 0x0, 0x0, 0x0, &(0x7f0000000540)={[{@uid={'uid', 0x3d, 0xffffffffffffffff}}]}) 04:09:23 executing program 0: r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0x4}}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x30, r2, 0x805, 0x0, 0x0, {{0x1, 0x40030000000000}, 0x0, 0x6, 0x0, {0x14, 0x19, {0xf0ffffff00000000}}}}, 0x30}}, 0x0) 04:09:23 executing program 1: r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f0000000000)="24018a001e0025eaa87865f51ef6bce90a04000200bff20182a9000c080009000d000000", 0x24) 04:09:23 executing program 3: r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0x4}}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x30, r2, 0x805, 0x0, 0x0, {{0x1, 0x40030000000000}, 0x0, 0x6, 0x0, {0x14, 0x19, {0xeaffffff00000000}}}}, 0x30}}, 0x0) 04:09:23 executing program 5: perf_event_open(&(0x7f0000000040)={0x0, 0x4c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0x4000000000a, 0x3, 0x2) sendmsg$unix(r0, &(0x7f0000000900)={&(0x7f0000000180)=@abs, 0x6e, &(0x7f0000000040)=[{&(0x7f0000001900)="83", 0x1}], 0x1}, 0x0) recvmmsg(r0, &(0x7f0000000240)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffde4}}], 0x627, 0x2, 0x0) 04:09:23 executing program 0: r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0x4}}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x30, r2, 0x805, 0x0, 0x0, {{0x1, 0x40030000000000}, 0x0, 0x6, 0x0, {0x14, 0x19, {0xfcffffff00000000}}}}, 0x30}}, 0x0) 04:09:23 executing program 4: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x2001002, 0x0) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_QUERY(r0, &(0x7f00000000c0)={0x13, 0x10, 0x7, {0x0, r1, 0x1}}, 0x18) mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x44000, 0x0) r2 = syz_open_dev$swradio(&(0x7f0000000100)='/dev/swradio#\x00', 0x0, 0x2) ioctl$SNDRV_SEQ_IOCTL_QUERY_SUBS(r2, 0xc058534f, &(0x7f00000001c0)={{0x20, 0x4}, 0x0, 0x100, 0x1ff, {0x5, 0xffffffff00000001}, 0x7, 0x2}) [ 694.683064][ T4603] hfs: invalid uid -1 [ 694.706917][ T4603] hfs: unable to parse mount options 04:09:23 executing program 1: r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f0000000000)="24028a001e0025eaa87865f51ef6bce90a04000200bff20182a9000c080009000d000000", 0x24) 04:09:23 executing program 3: r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0x4}}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x30, r2, 0x805, 0x0, 0x0, {{0x1, 0x40030000000000}, 0x0, 0x6, 0x0, {0x14, 0x19, {0xf0ffffff00000000}}}}, 0x30}}, 0x0) [ 694.815267][ T4603] hfs: invalid uid -1 [ 694.819303][ T4603] hfs: unable to parse mount options 04:09:23 executing program 5: perf_event_open(&(0x7f0000000040)={0x1, 0x4c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0x4000000000a, 0x3, 0x2) sendmsg$unix(r0, &(0x7f0000000900)={&(0x7f0000000180)=@abs, 0x6e, &(0x7f0000000040)=[{&(0x7f0000001900)="83", 0x1}], 0x1}, 0x0) recvmmsg(r0, &(0x7f0000000240)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffde4}}], 0x627, 0x2, 0x0) 04:09:23 executing program 1: r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f0000000000)="24038a001e0025eaa87865f51ef6bce90a04000200bff20182a9000c080009000d000000", 0x24) 04:09:23 executing program 2: syz_mount_image$hfs(&(0x7f00000000c0)='hfs\x00', &(0x7f0000000140)='./file0\x00', 0x74000000, 0x0, 0x0, 0x0, &(0x7f0000000540)={[{@uid={'uid', 0x3d, 0xffffffffffffffff}}]}) 04:09:23 executing program 0: r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0x4}}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x30, r2, 0x805, 0x0, 0x0, {{0x1, 0x40030000000000}, 0x0, 0x6, 0x0, {0x14, 0x19, {0xffffff7f00000000}}}}, 0x30}}, 0x0) 04:09:23 executing program 4: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0/file0\x00', 0x0, 0x800000, 0x0) mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x44000, 0x0) 04:09:23 executing program 3: r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0x4}}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x30, r2, 0x805, 0x0, 0x0, {{0x1, 0x40030000000000}, 0x0, 0x6, 0x0, {0x14, 0x19, {0xfcffffff00000000}}}}, 0x30}}, 0x0) [ 695.083869][ T4634] hfs: invalid uid -1 [ 695.101242][ T4634] hfs: unable to parse mount options 04:09:23 executing program 1: r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f0000000000)="24008b001e0025eaa87865f51ef6bce90a04000200bff20182a9000c080009000d000000", 0x24) [ 695.185492][ T4634] hfs: invalid uid -1 [ 695.189649][ T4634] hfs: unable to parse mount options 04:09:24 executing program 4: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000100)='/dev/dsp\x00', 0x10000, 0x0) ioctl$EVIOCGSW(r0, 0x8040451b, &(0x7f00000001c0)=""/104) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x2001002, 0x0) mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x44000, 0x0) 04:09:24 executing program 0: r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0x4}}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x30, r2, 0x805, 0x0, 0x0, {{0x1, 0x40030000000000}, 0x0, 0x6, 0x0, {0x14, 0x19, {0xffffffff00000000}}}}, 0x30}}, 0x0) 04:09:24 executing program 5: perf_event_open(&(0x7f0000000040)={0x1, 0x4c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0x4000000000a, 0x3, 0x2) sendmsg$unix(r0, &(0x7f0000000900)={&(0x7f0000000180)=@abs, 0x6e, &(0x7f0000000040)=[{&(0x7f0000001900)="83", 0x1}], 0x1}, 0x0) recvmmsg(r0, &(0x7f0000000240)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffde4}}], 0x627, 0x2, 0x0) 04:09:24 executing program 3: r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0x4}}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x30, r2, 0x805, 0x0, 0x0, {{0x1, 0x40030000000000}, 0x0, 0x6, 0x0, {0x14, 0x19, {0xffffff7f00000000}}}}, 0x30}}, 0x0) 04:09:24 executing program 2: syz_mount_image$hfs(&(0x7f00000000c0)='hfs\x00', &(0x7f0000000140)='./file0\x00', 0x7a000000, 0x0, 0x0, 0x0, &(0x7f0000000540)={[{@uid={'uid', 0x3d, 0xffffffffffffffff}}]}) 04:09:24 executing program 1: r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f0000000000)="24018b001e0025eaa87865f51ef6bce90a04000200bff20182a9000c080009000d000000", 0x24) 04:09:24 executing program 1: r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f0000000000)="24028b001e0025eaa87865f51ef6bce90a04000200bff20182a9000c080009000d000000", 0x24) 04:09:24 executing program 0: r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0x4}}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x30, r2, 0x805, 0x0, 0x0, {{0x1, 0x40030000000000}, 0x0, 0x6, 0x0, {0x14, 0x19, {0xfffffffffffff000}}}}, 0x30}}, 0x0) 04:09:24 executing program 4: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$EVIOCGPROP(r0, 0x80404509, &(0x7f00000007c0)=""/125) unshare(0x200) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) r3 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x2000, 0x0) dup2(r2, r3) arch_prctl$ARCH_MAP_VDSO_X32(0x2001, 0xdf) ioctl$MON_IOCG_STATS(r1, 0x80089203, &(0x7f00000002c0)) rmdir(&(0x7f0000000080)='./file0/file0\x00') mount$bpf(0x0, &(0x7f0000000300)='./file0\x00', 0x0, 0x44000, 0x0) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000280)='/dev/sequencer2\x00', 0x900, 0x0) 04:09:24 executing program 5: perf_event_open(&(0x7f0000000040)={0x1, 0x4c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0x4000000000a, 0x3, 0x2) sendmsg$unix(r0, &(0x7f0000000900)={&(0x7f0000000180)=@abs, 0x6e, &(0x7f0000000040)=[{&(0x7f0000001900)="83", 0x1}], 0x1}, 0x0) recvmmsg(r0, &(0x7f0000000240)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffde4}}], 0x627, 0x2, 0x0) 04:09:24 executing program 3: r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0x4}}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x30, r2, 0x805, 0x0, 0x0, {{0x1, 0x40030000000000}, 0x0, 0x6, 0x0, {0x14, 0x19, {0xffffffff00000000}}}}, 0x30}}, 0x0) [ 695.568294][ T4677] hfs: invalid uid -1 [ 695.580383][ T4677] hfs: unable to parse mount options 04:09:24 executing program 1: r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f0000000000)="24038b001e0025eaa87865f51ef6bce90a04000200bff20182a9000c080009000d000000", 0x24) 04:09:24 executing program 2: syz_mount_image$hfs(&(0x7f00000000c0)='hfs\x00', &(0x7f0000000140)='./file0\x00', 0x8cffffff, 0x0, 0x0, 0x0, &(0x7f0000000540)={[{@uid={'uid', 0x3d, 0xffffffffffffffff}}]}) 04:09:24 executing program 0: r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0x4}}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x30, r2, 0x805, 0x0, 0x0, {{0x1, 0x40030000000000}, 0x0, 0x6, 0x0, {0x14, 0x19, {0x0, 0x2}}}}, 0x30}}, 0x0) 04:09:24 executing program 5: perf_event_open(&(0x7f0000000040)={0x1, 0x4c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x4000000000a, 0x3, 0x2) sendmsg$unix(r0, &(0x7f0000000900)={&(0x7f0000000180)=@abs, 0x6e, &(0x7f0000000040)=[{&(0x7f0000001900)="83", 0x1}], 0x1}, 0x0) recvmmsg(r0, &(0x7f0000000240)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffde4}}], 0x627, 0x2, 0x0) 04:09:24 executing program 3: r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0x4}}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x30, r2, 0x805, 0x0, 0x0, {{0x1, 0x40030000000000}, 0x0, 0x6, 0x0, {0x14, 0x19, {0xfffffffffffff000}}}}, 0x30}}, 0x0) 04:09:24 executing program 4: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000002c0), &(0x7f0000000300)=0xc) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x2001002, 0x0) mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x44000, 0x0) r1 = socket(0x3, 0x2, 0x200) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000480)={&(0x7f0000000340)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x50, 0x50, 0x4, [@func_proto={0x0, 0x7, 0x0, 0xd, 0x0, [{0xd, 0x3}, {0x6, 0x1}, {0x3, 0x5}, {0xb, 0x3}, {0x9, 0x3}, {0x5, 0x2}, {0x10}]}, @volatile={0x10, 0x0, 0x0, 0x9, 0x5}]}, {0x0, [0x5f, 0x30]}}, &(0x7f00000003c0)=""/180, 0x6c, 0xb4, 0x1}, 0x20) getsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000000100)={0x0, 0x1ff, 0x8001, 0x10001}, &(0x7f0000000140)=0x10) getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(r1, 0x84, 0x1f, &(0x7f00000001c0)={r2, @in6={{0xa, 0x4e21, 0x0, @rand_addr="484e4fd0ce6d09ff7d67b7b4e9d7b11b", 0x401}}, 0x7, 0xfffffffffffffff8}, &(0x7f0000000280)=0x90) 04:09:24 executing program 1: r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f0000000000)="24008c001e0025eaa87865f51ef6bce90a04000200bff20182a9000c080009000d000000", 0x24) [ 695.928305][ T4705] hfs: invalid uid -1 [ 695.968977][ T4705] hfs: unable to parse mount options 04:09:24 executing program 2: syz_mount_image$hfs(&(0x7f00000000c0)='hfs\x00', &(0x7f0000000140)='./file0\x00', 0xc0ed0000, 0x0, 0x0, 0x0, &(0x7f0000000540)={[{@uid={'uid', 0x3d, 0xffffffffffffffff}}]}) 04:09:24 executing program 4: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000140)='./file0/file0\x00', &(0x7f0000000100)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x2001002, 0x0) mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x44000, 0x0) 04:09:24 executing program 0: r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0x4}}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x30, r2, 0x805, 0x0, 0x0, {{0x1, 0x40030000000000}, 0x0, 0x6, 0x0, {0x14, 0x19, {0x0, 0x3}}}}, 0x30}}, 0x0) 04:09:24 executing program 3: r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0x4}}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x30, r2, 0x805, 0x0, 0x0, {{0x1, 0x40030000000000}, 0x0, 0x6, 0x0, {0x14, 0x19, {0x0, 0x2}}}}, 0x30}}, 0x0) 04:09:25 executing program 5: perf_event_open(&(0x7f0000000040)={0x1, 0x4c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x0, 0x3, 0x2) sendmsg$unix(r0, &(0x7f0000000900)={&(0x7f0000000180)=@abs, 0x6e, &(0x7f0000000040)=[{&(0x7f0000001900)="83", 0x1}], 0x1}, 0x0) recvmmsg(r0, &(0x7f0000000240)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffde4}}], 0x627, 0x2, 0x0) 04:09:25 executing program 1: r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f0000000000)="24018c001e0025eaa87865f51ef6bce90a04000200bff20182a9000c080009000d000000", 0x24) [ 696.273023][ T4727] hfs: invalid uid -1 [ 696.330417][ T4727] hfs: unable to parse mount options 04:09:25 executing program 0: r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0x4}}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x30, r2, 0x805, 0x0, 0x0, {{0x1, 0x40030000000000}, 0x0, 0x6, 0x0, {0x14, 0x19, {0x0, 0x4}}}}, 0x30}}, 0x0) 04:09:25 executing program 2: syz_mount_image$hfs(&(0x7f00000000c0)='hfs\x00', &(0x7f0000000140)='./file0\x00', 0xf6ffffff, 0x0, 0x0, 0x0, &(0x7f0000000540)={[{@uid={'uid', 0x3d, 0xffffffffffffffff}}]}) 04:09:25 executing program 4: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0xa) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x2001002, 0x0) mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x44000, 0x0) fstat(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0}) mount$bpf(0x0, &(0x7f0000000100)='./file0/file0\x00', &(0x7f0000000140)='bpf\x00', 0x4, &(0x7f0000000240)={[{@mode={'mode', 0x3d, 0x1}}, {@mode={'mode', 0x3d, 0x7}}, {@mode={'mode', 0x3d, 0x3}}, {@mode={'mode', 0x3d, 0x9}}, {@mode={'mode', 0x3d, 0x3}}, {@mode={'mode', 0x3d, 0xcf}}, {@mode={'mode', 0x3d, 0x1000}}, {@mode={'mode', 0x3d, 0x2}}], [{@appraise_type='appraise_type=imasig'}, {@fowner_eq={'fowner', 0x3d, r0}}, {@smackfshat={'smackfshat', 0x3d, 'bpf\x00'}}, {@dont_measure='dont_measure'}, {@func={'func', 0x3d, 'FIRMWARE_CHECK'}}]}) 04:09:25 executing program 1: r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f0000000000)="24028c001e0025eaa87865f51ef6bce90a04000200bff20182a9000c080009000d000000", 0x24) 04:09:25 executing program 3: r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0x4}}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x30, r2, 0x805, 0x0, 0x0, {{0x1, 0x40030000000000}, 0x0, 0x6, 0x0, {0x14, 0x19, {0x0, 0x3}}}}, 0x30}}, 0x0) 04:09:25 executing program 5: perf_event_open(&(0x7f0000000040)={0x1, 0x4c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x0, 0x3, 0x2) sendmsg$unix(r0, &(0x7f0000000900)={&(0x7f0000000180)=@abs, 0x6e, &(0x7f0000000040)=[{&(0x7f0000001900)="83", 0x1}], 0x1}, 0x0) recvmmsg(r0, &(0x7f0000000240)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffde4}}], 0x627, 0x2, 0x0) [ 696.674312][ T4761] hfs: invalid uid -1 [ 696.690978][ T4761] hfs: unable to parse mount options 04:09:25 executing program 0: r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0x4}}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x30, r2, 0x805, 0x0, 0x0, {{0x1, 0x40030000000000}, 0x0, 0x6, 0x0, {0x14, 0x19, {0x0, 0x5}}}}, 0x30}}, 0x0) 04:09:25 executing program 3: r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0x4}}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x30, r2, 0x805, 0x0, 0x0, {{0x1, 0x40030000000000}, 0x0, 0x6, 0x0, {0x14, 0x19, {0x0, 0x4}}}}, 0x30}}, 0x0) 04:09:25 executing program 1: r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f0000000000)="24038c001e0025eaa87865f51ef6bce90a04000200bff20182a9000c080009000d000000", 0x24) 04:09:25 executing program 4: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000100)={0xffffffffffffffff}) getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(r0, 0x84, 0x13, &(0x7f0000000240)={0x0, 0x3}, &(0x7f0000000280)=0x8) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f00000002c0)={r1, @in6={{0xa, 0x4e22, 0x7, @mcast1, 0xffffffffffffffe0}}, 0x4, 0x1, 0xfffffffffffffff9, 0x99db, 0x8}, 0x98) getsockopt$inet_sctp_SCTP_GET_PEER_ADDRS(0xffffffffffffffff, 0x84, 0x6c, &(0x7f0000000140)={0x0, 0x29, "5c3c9956a841ab32e9ec6b7b6bd87b9da64f7b31003741150759684c393f2f7e92e409cd2ea5efb5ff"}, &(0x7f00000001c0)=0x31) setsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(r0, 0x84, 0x7c, &(0x7f0000000200)={r2, 0x8, 0x80}, 0x8) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x2001002, 0x0) mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x44000, 0x0) [ 696.772532][ T4761] hfs: invalid uid -1 [ 696.783341][ T4761] hfs: unable to parse mount options 04:09:25 executing program 5: perf_event_open(&(0x7f0000000040)={0x1, 0x4c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x0, 0x3, 0x2) sendmsg$unix(r0, &(0x7f0000000900)={&(0x7f0000000180)=@abs, 0x6e, &(0x7f0000000040)=[{&(0x7f0000001900)="83", 0x1}], 0x1}, 0x0) recvmmsg(r0, &(0x7f0000000240)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffde4}}], 0x627, 0x2, 0x0) 04:09:25 executing program 0: r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0x4}}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x30, r2, 0x805, 0x0, 0x0, {{0x1, 0x40030000000000}, 0x0, 0x6, 0x0, {0x14, 0x19, {0x0, 0x6}}}}, 0x30}}, 0x0) 04:09:25 executing program 2: syz_mount_image$hfs(&(0x7f00000000c0)='hfs\x00', &(0x7f0000000140)='./file0\x00', 0xf9fdffff, 0x0, 0x0, 0x0, &(0x7f0000000540)={[{@uid={'uid', 0x3d, 0xffffffffffffffff}}]}) 04:09:25 executing program 1: r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f0000000000)="24008d001e0025eaa87865f51ef6bce90a04000200bff20182a9000c080009000d000000", 0x24) 04:09:25 executing program 3: r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0x4}}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x30, r2, 0x805, 0x0, 0x0, {{0x1, 0x40030000000000}, 0x0, 0x6, 0x0, {0x14, 0x19, {0x0, 0x5}}}}, 0x30}}, 0x0) 04:09:25 executing program 5: perf_event_open(&(0x7f0000000040)={0x1, 0x4c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x4000000000a, 0x0, 0x2) sendmsg$unix(r0, &(0x7f0000000900)={&(0x7f0000000180)=@abs, 0x6e, &(0x7f0000000040)=[{&(0x7f0000001900)="83", 0x1}], 0x1}, 0x0) recvmmsg(r0, &(0x7f0000000240)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffde4}}], 0x627, 0x2, 0x0) 04:09:25 executing program 4: mkdir(&(0x7f0000000640)='./file0/file0\x00', 0x100000000) mount$bpf(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000400)='bpf\x00', 0x80, 0x0) mkdir(&(0x7f0000000380)='./file0/file0\x00', 0xb1483cf55e5ce0db) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x2001002, 0x0) mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x44000, 0x0) socketpair(0x1f, 0xbd5140b4df13bc22, 0x3fd, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(r0, 0x84, 0x6c, &(0x7f0000000000)={0x0, 0x2d, "7973d5782257a32e304cb911b0c55e16091a86baff2b633fcbdfbdcbcb8b364175d57dbe711e452f78ebe26bea"}, &(0x7f00000003c0)=0x35) getsockopt$inet_sctp_SCTP_RESET_STREAMS(r1, 0x84, 0x77, &(0x7f0000000440)=ANY=[@ANYRES32=r2, @ANYBLOB="0000efff7300c0ff"], &(0x7f0000000480)=0xc) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f0000000500)={r3, @in={{0x2, 0x4e23, @rand_addr=0x56}}, 0x999, 0x0, 0x8, 0xffff, 0xf1}, &(0x7f0000000340)=0x98) getsockopt$inet_sctp6_SCTP_STATUS(0xffffffffffffffff, 0x84, 0xe, &(0x7f00000001c0)={0x0, 0x9, 0x4, 0x101, 0xffffffffffffff83, 0x9, 0x33d, 0x40000003ff, {0x0, @in={{0x2, 0x4e24, @initdev={0xac, 0x1e, 0x1, 0x0}}}, 0x200, 0x6, 0xffffffffffffffff, 0x2b}}, &(0x7f0000000140)=0x1d) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(r1, 0x84, 0xf, &(0x7f0000000280)={r4, @in6={{0xa, 0x4e20, 0x9, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x1}}, 0x1, 0x4, 0x0, 0x5, 0x1000003b}, &(0x7f00000004c0)=0xfffffffffffffe7d) [ 697.127929][ T4801] hfs: invalid uid -1 04:09:25 executing program 0: r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0x4}}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x30, r2, 0x805, 0x0, 0x0, {{0x1, 0x40030000000000}, 0x0, 0x6, 0x0, {0x14, 0x19, {0x0, 0x7}}}}, 0x30}}, 0x0) [ 697.162400][ T4801] hfs: unable to parse mount options 04:09:25 executing program 1: r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f0000000000)="24018d001e0025eaa87865f51ef6bce90a04000200bff20182a9000c080009000d000000", 0x24) 04:09:26 executing program 3: r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0x4}}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x30, r2, 0x805, 0x0, 0x0, {{0x1, 0x40030000000000}, 0x0, 0x6, 0x0, {0x14, 0x19, {0x0, 0x6}}}}, 0x30}}, 0x0) [ 697.246598][ T4801] hfs: invalid uid -1 [ 697.250751][ T4801] hfs: unable to parse mount options 04:09:26 executing program 2: syz_mount_image$hfs(&(0x7f00000000c0)='hfs\x00', &(0x7f0000000140)='./file0\x00', 0xff000000, 0x0, 0x0, 0x0, &(0x7f0000000540)={[{@uid={'uid', 0x3d, 0xffffffffffffffff}}]}) 04:09:26 executing program 1: r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f0000000000)="24028d001e0025eaa87865f51ef6bce90a04000200bff20182a9000c080009000d000000", 0x24) 04:09:26 executing program 4: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) syz_mount_image$jfs(&(0x7f0000000140)='jfs\x00', &(0x7f00000001c0)='./file0\x00', 0x679c, 0x2, &(0x7f00000003c0)=[{&(0x7f0000000200)="07f6a6270e48ac304921269d66d9b75596dfc96cd3dd7a738bef9bed9365c0a2575231fa44be11c1ba4834dcd5d7ee055c243dd56a10aab92b2f6848b3d108acd879b667bf94621a0326c842e4f02c959dd1008977b134eacd5e580953e5f60abad6a93df506459ee439107151128d8d93af6367cd65c87a90571fc9067201058407013211dc2cf21d8631efc9baeedc0368ab5eb766a6b84b0057c6570aab52b33ef78445c63ef33ae2", 0xaa, 0x2}, {&(0x7f00000002c0)="db88fd6072382ffe484d3cc5a64060ef2a8cdbc9bc3105ca1e92a1c16833323f0c03fdd70c5615f73060a1f0019bf0d2fdaf9e9ec3d0f332f85a7aa589a2a7377ce5eb0998ee9ebdf217c05ca1d6ec71d02d8aea9c1de45ed8f3f629f28e804e3527f3e020f9718f5f2a412320d9e3b9d6aba8299fa905aacc64716b52d7dee886ca1cddb0a9d124e4e8a60401fd08f79744242eb34c44e481df66d9cfa2053db579e951e98c2e14c046b7c2baa7d3773cccca65e184d0e53cb4cfcb17e37d91398d48bbc70c84f0e6bbff09d96cd4414c5f", 0xd2}], 0x200000, &(0x7f0000000400)={[{@umask={'umask', 0x3d, 0x6}}], [{@subj_role={'subj_role', 0x3d, 'bpf\x00'}}, {@measure='measure'}]}) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x2001002, 0x0) mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x44000, 0x0) r0 = dup(0xffffffffffffffff) write$P9_RLOPEN(r0, &(0x7f0000000100)={0x18, 0xd, 0x1, {{0xc3, 0x4, 0x2}}}, 0x18) 04:09:26 executing program 3: r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0x4}}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x30, r2, 0x805, 0x0, 0x0, {{0x1, 0x40030000000000}, 0x0, 0x6, 0x0, {0x14, 0x19, {0x0, 0x7}}}}, 0x30}}, 0x0) 04:09:26 executing program 5: perf_event_open(&(0x7f0000000040)={0x1, 0x4c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x4000000000a, 0x0, 0x2) sendmsg$unix(r0, &(0x7f0000000900)={&(0x7f0000000180)=@abs, 0x6e, &(0x7f0000000040)=[{&(0x7f0000001900)="83", 0x1}], 0x1}, 0x0) recvmmsg(r0, &(0x7f0000000240)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffde4}}], 0x627, 0x2, 0x0) 04:09:26 executing program 0: r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0x4}}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x30, r2, 0x805, 0x0, 0x0, {{0x1, 0x40030000000000}, 0x0, 0x6, 0x0, {0x14, 0x19, {0x0, 0xa}}}}, 0x30}}, 0x0) [ 697.554152][ T4829] hfs: invalid uid -1 [ 697.563989][ T4829] hfs: unable to parse mount options [ 697.646619][ T4829] hfs: invalid uid -1 04:09:26 executing program 0: r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0x4}}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x30, r2, 0x805, 0x0, 0x0, {{0x1, 0x40030000000000}, 0x0, 0x6, 0x0, {0x14, 0x19, {0x0, 0xe}}}}, 0x30}}, 0x0) 04:09:26 executing program 1: r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f0000000000)="24038d001e0025eaa87865f51ef6bce90a04000200bff20182a9000c080009000d000000", 0x24) 04:09:26 executing program 3: r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0x4}}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x30, r2, 0x805, 0x0, 0x0, {{0x1, 0x40030000000000}, 0x0, 0x6, 0x0, {0x14, 0x19, {0x0, 0xa}}}}, 0x30}}, 0x0) [ 697.669250][ T4829] hfs: unable to parse mount options 04:09:26 executing program 5: perf_event_open(&(0x7f0000000040)={0x1, 0x4c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x4000000000a, 0x0, 0x2) sendmsg$unix(r0, &(0x7f0000000900)={&(0x7f0000000180)=@abs, 0x6e, &(0x7f0000000040)=[{&(0x7f0000001900)="83", 0x1}], 0x1}, 0x0) recvmmsg(r0, &(0x7f0000000240)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffde4}}], 0x627, 0x2, 0x0) 04:09:26 executing program 4: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f0000000340)='./file0/file1\x00', 0x10000) r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000180)='/dev/autofs\x00', 0x80000, 0x0) ioctl$BINDER_THREAD_EXIT(r0, 0x40046208, 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0/file0\x00', 0x0, 0x2001002, 0x0) mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x44000, 0x0) r1 = accept(0xffffffffffffffff, &(0x7f0000000100)=@in={0x2, 0x0, @remote}, &(0x7f00000001c0)=0x80) r2 = openat$null(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/null\x00', 0x400000, 0x0) openat(r2, &(0x7f0000000280)='./file1\x00', 0x400280, 0x8) bind$vsock_stream(r1, &(0x7f0000000200)={0x28, 0x0, 0x0, @reserved}, 0x10) 04:09:26 executing program 2: syz_mount_image$hfs(&(0x7f00000000c0)='hfs\x00', &(0x7f0000000140)='./file0\x00', 0xfffffdf9, 0x0, 0x0, 0x0, &(0x7f0000000540)={[{@uid={'uid', 0x3d, 0xffffffffffffffff}}]}) 04:09:26 executing program 0: r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0x4}}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x30, r2, 0x805, 0x0, 0x0, {{0x1, 0x40030000000000}, 0x0, 0x6, 0x0, {0x14, 0x19, {0x0, 0xf}}}}, 0x30}}, 0x0) 04:09:26 executing program 1: r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f0000000000)="24008e001e0025eaa87865f51ef6bce90a04000200bff20182a9000c080009000d000000", 0x24) 04:09:26 executing program 3: r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0x4}}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x30, r2, 0x805, 0x0, 0x0, {{0x1, 0x40030000000000}, 0x0, 0x6, 0x0, {0x14, 0x19, {0x0, 0xe}}}}, 0x30}}, 0x0) [ 698.038387][ T4875] hfs: invalid uid -1 04:09:26 executing program 5: perf_event_open(&(0x7f0000000040)={0x1, 0x4c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x4000000000a, 0x3, 0x0) sendmsg$unix(r0, &(0x7f0000000900)={&(0x7f0000000180)=@abs, 0x6e, &(0x7f0000000040)=[{&(0x7f0000001900)="83", 0x1}], 0x1}, 0x0) recvmmsg(r0, &(0x7f0000000240)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffde4}}], 0x627, 0x2, 0x0) 04:09:26 executing program 4: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x2001002, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) fsetxattr$trusted_overlay_redirect(r0, &(0x7f0000000140)='trusted.overlay.redirect\x00', &(0x7f00000001c0)='./file0\x00', 0x8, 0x1) mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x44000, 0x0) r1 = socket(0x9, 0x800, 0xdac1) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(0xffffffffffffffff, 0x84, 0x22, &(0x7f0000000500)={0x1, 0x8000, 0x7ff, 0x3, 0x0}, &(0x7f0000000540)=0x10) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRS(r1, 0x84, 0x6d, &(0x7f0000000580)={r2, 0x8f, "29a72a1597e3c3733e34de5cab77aab7ce3de625dfbd06e256ad787ab8f58f03a5e2f09fc82f62714c68f09367edf709f53cbe9746d7493c0d765a6b56b532fe5d76f2cee952593924e46901014bab781e6c19a4db3db16b19b7819d5febd5f741fccafd89f2a6cd19eb91e5640c0df002ff91f05f80867b8beb106a6a246bc14667b92ed8101b59f7b95813627493"}, &(0x7f0000000640)=0x97) [ 698.058681][ T4875] hfs: unable to parse mount options 04:09:26 executing program 0: r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0x4}}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x30, r2, 0x805, 0x0, 0x0, {{0x1, 0x40030000000000}, 0x0, 0x6, 0x0, {0x14, 0x19, {0x0, 0x48}}}}, 0x30}}, 0x0) 04:09:26 executing program 1: r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f0000000000)="24018e001e0025eaa87865f51ef6bce90a04000200bff20182a9000c080009000d000000", 0x24) 04:09:26 executing program 3: r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0x4}}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x30, r2, 0x805, 0x0, 0x0, {{0x1, 0x40030000000000}, 0x0, 0x6, 0x0, {0x14, 0x19, {0x0, 0xf}}}}, 0x30}}, 0x0) [ 698.165573][ T4875] hfs: invalid uid -1 [ 698.169678][ T4875] hfs: unable to parse mount options 04:09:27 executing program 2: syz_mount_image$hfs(&(0x7f00000000c0)='hfs\x00', &(0x7f0000000140)='./file0\x00', 0xffffff7f, 0x0, 0x0, 0x0, &(0x7f0000000540)={[{@uid={'uid', 0x3d, 0xffffffffffffffff}}]}) 04:09:27 executing program 4: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vcs\x00', 0x44101, 0x0) recvfrom$unix(r0, &(0x7f0000000380)=""/4096, 0x1000, 0x40000000, &(0x7f0000001380)=@file={0x15e73bc7c8ee28de, './file0\x00'}, 0x6e) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) clock_gettime(0x0, &(0x7f0000001540)={0x0, 0x0}) utimes(&(0x7f0000001500)='./file0/file0\x00', &(0x7f0000001580)={{0x77359400}, {r1, r2/1000+10000}}) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x2001002, 0x0) r3 = syz_open_dev$sndpcmp(&(0x7f0000000100)='/dev/snd/pcmC#D#p\x00', 0x77b2, 0x420080) setxattr$trusted_overlay_origin(&(0x7f0000001400)='./file0/file0\x00', &(0x7f0000001440)='trusted.overlay.origin\x00', &(0x7f0000001480)='y\x00', 0x2, 0x2) ioctl$VIDIOC_G_OUTPUT(r0, 0x8004562e, &(0x7f00000015c0)) mkdir(&(0x7f00000014c0)='./file0\x00', 0x100) open_by_handle_at(r3, &(0x7f00000002c0)={0x79, 0x8000, "20cbf09a582cfac731a269b45ef5be0e92291d50bcf9fcebe19c5e66b7d81652fa210966a1136b5e63cc588c0314b3c6d87559954b66769074dd6075e315fad594d414ebce3a49ba0d8dd486437c021cbbb35399113bf1fc72a8a9964cb6be43fc5a2b917ecbf5e5d644c8b174dfbf7658"}, 0x4000) r4 = syz_genetlink_get_family_id$ipvs(&(0x7f00000001c0)='IPVS\x00') sendmsg$IPVS_CMD_SET_SERVICE(r3, &(0x7f0000000280)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x2002a02}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)=ANY=[@ANYBLOB='(\x00\x00\x00', @ANYRES16=r4, @ANYBLOB="200029bd7000ffdbdf250200000008000600000200000c0001220800020021000000"], 0x28}, 0x1, 0x0, 0x0, 0x40000}, 0x4) mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x44000, 0x0) 04:09:27 executing program 1: r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f0000000000)="24028e001e0025eaa87865f51ef6bce90a04000200bff20182a9000c080009000d000000", 0x24) 04:09:27 executing program 0: r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0x4}}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x30, r2, 0x805, 0x0, 0x0, {{0x1, 0x40030000000000}, 0x0, 0x6, 0x0, {0x14, 0x19, {0x0, 0x4c}}}}, 0x30}}, 0x0) 04:09:27 executing program 5: perf_event_open(&(0x7f0000000040)={0x1, 0x4c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x4000000000a, 0x3, 0x0) sendmsg$unix(r0, &(0x7f0000000900)={&(0x7f0000000180)=@abs, 0x6e, &(0x7f0000000040)=[{&(0x7f0000001900)="83", 0x1}], 0x1}, 0x0) recvmmsg(r0, &(0x7f0000000240)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffde4}}], 0x627, 0x2, 0x0) 04:09:27 executing program 3: r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0x4}}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x30, r2, 0x805, 0x0, 0x0, {{0x1, 0x40030000000000}, 0x0, 0x6, 0x0, {0x14, 0x19, {0x0, 0x48}}}}, 0x30}}, 0x0) [ 698.441196][ T4913] hfs: invalid uid -1 [ 698.518335][ T4913] hfs: unable to parse mount options 04:09:27 executing program 1: r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f0000000000)="24038e001e0025eaa87865f51ef6bce90a04000200bff20182a9000c080009000d000000", 0x24) 04:09:27 executing program 0: r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0x4}}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x30, r2, 0x805, 0x0, 0x0, {{0x1, 0x40030000000000}, 0x0, 0x6, 0x0, {0x14, 0x19, {0x0, 0x60}}}}, 0x30}}, 0x0) 04:09:27 executing program 3: r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0x4}}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x30, r2, 0x805, 0x0, 0x0, {{0x1, 0x40030000000000}, 0x0, 0x6, 0x0, {0x14, 0x19, {0x0, 0x4c}}}}, 0x30}}, 0x0) 04:09:27 executing program 4: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) stat(&(0x7f0000000480)='./file0/file0\x00', &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000540)={{{@in=@broadcast, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}, 0x0, @in=@loopback}}, &(0x7f0000000640)=0xe8) syz_mount_image$btrfs(&(0x7f00000000c0)='btrfs\x00', &(0x7f0000000240)='./file0\x00', 0x1, 0x2, &(0x7f0000000440)=[{&(0x7f0000000280)="1cf4a12b2f717ae46f7b48043bd58b31758bd9eb87bae39f347b1a15d7ad624e886262db04129c06e70e1cfe2d6e929a007e2792cef0979c741d6078d332dc9e01033c813ef645adda66476e94647f87a5bb6a5865d013c74f4d4608bcb343b03d1b2c3dbccabcdf2fce1019009c39e8aaa354d59e66bcc9b587b62f2fdb046f79345af4ad885d952cf36af8190a4c29defba03102ede7e4b3df40720c6c0a8c0d6276e2de37567cfbd3929613ec3e421da3611ae94b3fa4f680fb593c3eab06e4cf766ac1a91306288cbd0e3be3a7ffd6efe0e8b66a4d4e3ce11d21689c170bc1fc9b78ff5eab4fa10675f443c9f14ff7c432f66b", 0xf5, 0x8001}, {&(0x7f0000000380)="a0eb190bfdcc63a57365335e638ce78a63d1cc7d33457cac8d274102732b8aba4907eddab826cf63b68edc99c9108cf41f831979fcbb08ffd9cda850c27bf3ec7d25c31dcfe38ccbdb7839d2841750ea85d6c00a69de94aa54a97933f24b82472a57fcff50b6bfdc6187a4afc32a1db689d8845206fa780684c96c0454549503b8f59bfe3c66118f632f725e1e02e5ee1f00caa5c5d8c0", 0x97, 0x2}], 0x0, &(0x7f0000000680)={[{@inode_cache='inode_cache'}], [{@fsmagic={'fsmagic', 0x3d, 0x1}}, {@uid_eq={'uid', 0x3d, r0}}, {@context={'context', 0x3d, 'root'}}, {@uid_gt={'uid>', r1}}]}) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) getgid() mkdir(&(0x7f0000000100)='./file0/file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x2001002, 0x0) mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x44000, 0x0) r2 = getpgid(0xffffffffffffffff) ptrace$getregs(0xc, r2, 0x7, &(0x7f00000001c0)=""/78) unlink(&(0x7f0000000140)='./file0/file0\x00') 04:09:27 executing program 2: syz_mount_image$hfs(&(0x7f00000000c0)='hfs\x00', &(0x7f0000000140)='./file0\x00', 0xffffff8c, 0x0, 0x0, 0x0, &(0x7f0000000540)={[{@uid={'uid', 0x3d, 0xffffffffffffffff}}]}) 04:09:27 executing program 5: perf_event_open(&(0x7f0000000040)={0x1, 0x4c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x4000000000a, 0x3, 0x0) sendmsg$unix(r0, &(0x7f0000000900)={&(0x7f0000000180)=@abs, 0x6e, &(0x7f0000000040)=[{&(0x7f0000001900)="83", 0x1}], 0x1}, 0x0) recvmmsg(r0, &(0x7f0000000240)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffde4}}], 0x627, 0x2, 0x0) 04:09:27 executing program 3: r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0x4}}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x30, r2, 0x805, 0x0, 0x0, {{0x1, 0x40030000000000}, 0x0, 0x6, 0x0, {0x14, 0x19, {0x0, 0x60}}}}, 0x30}}, 0x0) 04:09:27 executing program 1: r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f0000000000)="24008f001e0025eaa87865f51ef6bce90a04000200bff20182a9000c080009000d000000", 0x24) 04:09:27 executing program 0: r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0x4}}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x30, r2, 0x805, 0x0, 0x0, {{0x1, 0x40030000000000}, 0x0, 0x6, 0x0, {0x14, 0x19, {0x0, 0x68}}}}, 0x30}}, 0x0) 04:09:27 executing program 3: r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0x4}}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x30, r2, 0x805, 0x0, 0x0, {{0x1, 0x40030000000000}, 0x0, 0x6, 0x0, {0x14, 0x19, {0x0, 0x68}}}}, 0x30}}, 0x0) [ 699.009831][ T4961] hfs: invalid uid -1 [ 699.025726][ T4961] hfs: unable to parse mount options 04:09:27 executing program 1: r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f0000000000)="24018f001e0025eaa87865f51ef6bce90a04000200bff20182a9000c080009000d000000", 0x24) 04:09:27 executing program 0: r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0x4}}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x30, r2, 0x805, 0x0, 0x0, {{0x1, 0x40030000000000}, 0x0, 0x6, 0x0, {0x14, 0x19, {0x0, 0x6c}}}}, 0x30}}, 0x0) 04:09:27 executing program 5: perf_event_open(&(0x7f0000000040)={0x1, 0x4c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x4000000000a, 0x3, 0x2) sendmsg$unix(0xffffffffffffffff, &(0x7f0000000900)={&(0x7f0000000180)=@abs, 0x6e, &(0x7f0000000040)=[{&(0x7f0000001900)="83", 0x1}], 0x1}, 0x0) recvmmsg(r0, &(0x7f0000000240)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffde4}}], 0x627, 0x2, 0x0) 04:09:28 executing program 4: mkdir(&(0x7f0000000040)='./file0\x00', 0x100000168) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) lgetxattr(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)=@random={'trusted.', '$bdev{\\^\x00'}, &(0x7f0000000240)=""/33, 0x21) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) bind$x25(r0, &(0x7f0000000100)={0x9, @null=' \x00'}, 0x12) ioctl$KDSETKEYCODE(r0, 0x4b4d, &(0x7f0000000140)={0x10001, 0x4}) mount$bpf(0x20000000, &(0x7f0000000300)='./file0\x00', 0x0, 0x30008, 0x0) mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x44000, 0x0) [ 699.151544][ T4961] hfs: invalid uid -1 [ 699.164967][ T4961] hfs: unable to parse mount options 04:09:28 executing program 1: r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f0000000000)="24028f001e0025eaa87865f51ef6bce90a04000200bff20182a9000c080009000d000000", 0x24) 04:09:28 executing program 3: r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0x4}}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x30, r2, 0x805, 0x0, 0x0, {{0x1, 0x40030000000000}, 0x0, 0x6, 0x0, {0x14, 0x19, {0x0, 0x6c}}}}, 0x30}}, 0x0) 04:09:28 executing program 2: syz_mount_image$hfs(&(0x7f00000000c0)='hfs\x00', &(0x7f0000000140)='./file0\x00', 0xfffffff6, 0x0, 0x0, 0x0, &(0x7f0000000540)={[{@uid={'uid', 0x3d, 0xffffffffffffffff}}]}) 04:09:28 executing program 4: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) r0 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000280)='/dev/qat_adf_ctl\x00', 0x101000, 0x0) ioctl$TIOCMIWAIT(r0, 0x545c, 0x0) arch_prctl$ARCH_SET_CPUID(0x1012, 0x0) mount$bpf(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f0000000100)='bpf\x00', 0x10, 0x0) ioctl$IOC_PR_RELEASE(r0, 0x401070ca, &(0x7f0000000300)={0x8000, 0xff}) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm_plock\x00', 0x121000, 0x0) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x2001002, 0x0) mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x44000, 0x0) r1 = openat$dsp(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/dsp\x00', 0x2, 0x0) write$P9_RSTAT(r1, &(0x7f0000000440)=ANY=[@ANYBLOB="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"], 0x55) r2 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000140)='/dev/dsp\x00', 0x400000, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x1, &(0x7f00000001c0)={0xffffffffffffffff}, 0x117, 0x9}}, 0x20) write$RDMA_USER_CM_CMD_NOTIFY(r2, &(0x7f0000000240)={0xf, 0x8, 0xfa00, {r3, 0x1b}}, 0x10) 04:09:28 executing program 0: r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0x4}}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x30, r2, 0x805, 0x0, 0x0, {{0x1, 0x40030000000000}, 0x0, 0x6, 0x0, {0x14, 0x19, {0x0, 0x74}}}}, 0x30}}, 0x0) [ 699.488639][ T4999] hfs: invalid uid -1 [ 699.502459][ T4999] hfs: unable to parse mount options 04:09:28 executing program 3: r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0x4}}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x30, r2, 0x805, 0x0, 0x0, {{0x1, 0x40030000000000}, 0x0, 0x6, 0x0, {0x14, 0x19, {0x0, 0x74}}}}, 0x30}}, 0x0) 04:09:28 executing program 2: syz_mount_image$hfs(&(0x7f00000000c0)='hfs\x00', &(0x7f0000000140)='./file0\x00', 0xedc000000000, 0x0, 0x0, 0x0, &(0x7f0000000540)={[{@uid={'uid', 0x3d, 0xffffffffffffffff}}]}) 04:09:28 executing program 1: r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f0000000000)="24038f001e0025eaa87865f51ef6bce90a04000200bff20182a9000c080009000d000000", 0x24) 04:09:28 executing program 4: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) pipe2$9p(&(0x7f0000000100), 0x4000) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x2001002, 0x0) mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x44000, 0x0) 04:09:28 executing program 0: r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0x4}}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x30, r2, 0x805, 0x0, 0x0, {{0x1, 0x40030000000000}, 0x0, 0x6, 0x0, {0x14, 0x19, {0x0, 0x7a}}}}, 0x30}}, 0x0) [ 699.721691][ T5012] hfs: invalid uid -1 [ 699.743846][ T5012] hfs: unable to parse mount options 04:09:28 executing program 5: perf_event_open(&(0x7f0000000040)={0x1, 0x4c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x4000000000a, 0x3, 0x2) sendmsg$unix(0xffffffffffffffff, &(0x7f0000000900)={&(0x7f0000000180)=@abs, 0x6e, &(0x7f0000000040)=[{&(0x7f0000001900)="83", 0x1}], 0x1}, 0x0) recvmmsg(r0, &(0x7f0000000240)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffde4}}], 0x627, 0x2, 0x0) 04:09:28 executing program 3: r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0x4}}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x30, r2, 0x805, 0x0, 0x0, {{0x1, 0x40030000000000}, 0x0, 0x6, 0x0, {0x14, 0x19, {0x0, 0x7a}}}}, 0x30}}, 0x0) 04:09:28 executing program 1: r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f0000000000)="240090001e0025eaa87865f51ef6bce90a04000200bff20182a9000c080009000d000000", 0x24) 04:09:28 executing program 2: syz_mount_image$hfs(&(0x7f00000000c0)='hfs\x00', &(0x7f0000000140)='./file0\x00', 0x100000000000000, 0x0, 0x0, 0x0, &(0x7f0000000540)={[{@uid={'uid', 0x3d, 0xffffffffffffffff}}]}) 04:09:28 executing program 4: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000100)='./file0/file0\x00', &(0x7f00000019c0)='bpf\x00', 0x10, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x2001002, 0x0) mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x44000, 0x0) 04:09:28 executing program 0: r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0x4}}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x30, r2, 0x805, 0x0, 0x0, {{0x1, 0x40030000000000}, 0x0, 0x6, 0x0, {0x14, 0x19, {0x0, 0xf0}}}}, 0x30}}, 0x0) [ 700.174922][ T5040] hfs: invalid uid -1 [ 700.208687][ T5040] hfs: unable to parse mount options 04:09:29 executing program 0: r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0x4}}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x30, r2, 0x805, 0x0, 0x0, {{0x1, 0x40030000000000}, 0x0, 0x6, 0x0, {0x14, 0x19, {0x0, 0x287}}}}, 0x30}}, 0x0) 04:09:29 executing program 1: r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f0000000000)="240190001e0025eaa87865f51ef6bce90a04000200bff20182a9000c080009000d000000", 0x24) 04:09:29 executing program 3: r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0x4}}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x30, r2, 0x805, 0x0, 0x0, {{0x1, 0x40030000000000}, 0x0, 0x6, 0x0, {0x14, 0x19, {0x0, 0xf0}}}}, 0x30}}, 0x0) 04:09:29 executing program 4: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000340)={0xffffffffffffffff, 0xc0, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)=0x1000, 0x0, 0x0, 0x0, &(0x7f0000000140)={0x2, 0x3}, 0x0, 0x0, &(0x7f00000001c0)={0x0, 0x7, 0xc2, 0x1a000000000}, &(0x7f0000000200)=0x5, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)=0x30}}, 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000380)=r0, 0x4) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x2001002, 0x0) mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x44000, 0x0) [ 700.288803][ T5040] hfs: invalid uid -1 [ 700.300929][ T5040] hfs: unable to parse mount options 04:09:29 executing program 2: syz_mount_image$hfs(&(0x7f00000000c0)='hfs\x00', &(0x7f0000000140)='./file0\x00', 0x200000000000000, 0x0, 0x0, 0x0, &(0x7f0000000540)={[{@uid={'uid', 0x3d, 0xffffffffffffffff}}]}) 04:09:29 executing program 0: r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0x4}}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x30, r2, 0x805, 0x0, 0x0, {{0x1, 0x40030000000000}, 0x0, 0x6, 0x0, {0x14, 0x19, {0x0, 0x300}}}}, 0x30}}, 0x0) [ 700.548645][ T5069] hfs: invalid uid -1 [ 700.573217][ T5069] hfs: unable to parse mount options [ 700.655579][ T5069] hfs: invalid uid -1 [ 700.659722][ T5069] hfs: unable to parse mount options 04:09:29 executing program 1: r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f0000000000)="240290001e0025eaa87865f51ef6bce90a04000200bff20182a9000c080009000d000000", 0x24) 04:09:29 executing program 3: r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0x4}}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x30, r2, 0x805, 0x0, 0x0, {{0x1, 0x40030000000000}, 0x0, 0x6, 0x0, {0x14, 0x19, {0x0, 0x22f}}}}, 0x30}}, 0x0) 04:09:29 executing program 5: perf_event_open(&(0x7f0000000040)={0x1, 0x4c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x4000000000a, 0x3, 0x2) sendmsg$unix(0xffffffffffffffff, &(0x7f0000000900)={&(0x7f0000000180)=@abs, 0x6e, &(0x7f0000000040)=[{&(0x7f0000001900)="83", 0x1}], 0x1}, 0x0) recvmmsg(r0, &(0x7f0000000240)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffde4}}], 0x627, 0x2, 0x0) 04:09:29 executing program 4: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x2001002, 0x0) mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x44000, 0x0) 04:09:29 executing program 0: r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0x4}}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x30, r2, 0x805, 0x0, 0x0, {{0x1, 0x40030000000000}, 0x0, 0x6, 0x0, {0x14, 0x19, {0x0, 0x500}}}}, 0x30}}, 0x0) 04:09:29 executing program 2: syz_mount_image$hfs(&(0x7f00000000c0)='hfs\x00', &(0x7f0000000140)='./file0\x00', 0x300000000000000, 0x0, 0x0, 0x0, &(0x7f0000000540)={[{@uid={'uid', 0x3d, 0xffffffffffffffff}}]}) 04:09:29 executing program 0: r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0x4}}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x30, r2, 0x805, 0x0, 0x0, {{0x1, 0x40030000000000}, 0x0, 0x6, 0x0, {0x14, 0x19, {0x0, 0x600}}}}, 0x30}}, 0x0) 04:09:30 executing program 1: r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f0000000000)="240390001e0025eaa87865f51ef6bce90a04000200bff20182a9000c080009000d000000", 0x24) [ 701.160328][ T5104] hfs: invalid uid -1 [ 701.179617][ T5104] hfs: unable to parse mount options 04:09:30 executing program 3: r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0x4}}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x30, r2, 0x805, 0x0, 0x0, {{0x1, 0x40030000000000}, 0x0, 0x6, 0x0, {0x14, 0x19, {0x0, 0x300}}}}, 0x30}}, 0x0) 04:09:30 executing program 4: r0 = open(&(0x7f0000000400)='./file0/file0\x00', 0x40041, 0x10) sendmsg$TIPC_CMD_SET_LINK_WINDOW(r0, 0xfffffffffffffffd, 0x20008050) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x2001002, 0x0) mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x44000, 0x0) fstat(r0, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0}) r2 = getegid() mount$fuse(0x0, &(0x7f0000000140)='./file0/file0\x00', &(0x7f00000001c0)='fuse\x00', 0x400, &(0x7f0000000280)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB="2c726f6f746d6ff2578572b35bd162fadd64653d3030303030000000003030303030303030313a303030", @ANYRESDEC=r1, @ANYBLOB=',group_id=', @ANYRESDEC=r2, @ANYBLOB=',allow_other,default_permissions,default_permissions,default_permissions,blksize=0x0000000000000200,default_permissions,blksize=0x0000000000001000,max_read=0x0000000000000027,defcontext=staff_u,\x00']) [ 701.253111][ T5104] hfs: invalid uid -1 [ 701.292369][ T5104] hfs: unable to parse mount options 04:09:30 executing program 0: r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0x4}}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x30, r2, 0x805, 0x0, 0x0, {{0x1, 0x40030000000000}, 0x0, 0x6, 0x0, {0x14, 0x19, {0x0, 0x700}}}}, 0x30}}, 0x0) 04:09:30 executing program 2: syz_mount_image$hfs(&(0x7f00000000c0)='hfs\x00', &(0x7f0000000140)='./file0\x00', 0x400000000000000, 0x0, 0x0, 0x0, &(0x7f0000000540)={[{@uid={'uid', 0x3d, 0xffffffffffffffff}}]}) 04:09:30 executing program 1: r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f0000000000)="240091001e0025eaa87865f51ef6bce90a04000200bff20182a9000c080009000d000000", 0x24) [ 701.390270][ T5123] fuse: Bad value for 'subtype' 04:09:30 executing program 3: r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0x4}}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x30, r2, 0x805, 0x0, 0x0, {{0x1, 0x40030000000000}, 0x0, 0x6, 0x0, {0x14, 0x19, {0x0, 0x500}}}}, 0x30}}, 0x0) [ 701.601626][ T5139] hfs: invalid uid -1 [ 701.612544][ T5139] hfs: unable to parse mount options 04:09:30 executing program 5: perf_event_open(&(0x7f0000000040)={0x1, 0x4c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x4000000000a, 0x3, 0x2) sendmsg$unix(r0, 0x0, 0x0) recvmmsg(r0, &(0x7f0000000240)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffde4}}], 0x627, 0x2, 0x0) 04:09:30 executing program 4: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) fanotify_init(0x1, 0xd94036461fbc6923) setxattr$security_evm(&(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000140)='security.evm\x00', &(0x7f00000001c0)=@v2={0x3, 0x1, 0xd, 0x3, 0xd1, "db1a8bbdfede1a5e871899f773f74a20b1990ae23e72579f74118506faa5bec13c19294712aa3fe3a93607729800936f7af56e1f5f724ab1179f868d65e5d856867f7a62437483f0c3fde494a045ccb5174c4bcf54dac24393fa76345a8a809ae8e1bebcc7a6e1fe5c7bb09bada06891cae1e2cb484a3fc79d562237d1355c898fba03abc4352929cb3bac1d92126d2e8babfe86564ad9ffb272651b4c0b7066c97d462d37134de8d9e964352c471903febded997f4b8081468fe2ebaf82404132f07ad09eb224f452d6351e98e944ea66"}, 0xdb, 0x1) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x2001002, 0x0) mount$bpf(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x44000, 0x0) 04:09:30 executing program 0: r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0x4}}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x30, r2, 0x805, 0x0, 0x0, {{0x1, 0x40030000000000}, 0x0, 0x6, 0x0, {0x14, 0x19, {0x0, 0xa00}}}}, 0x30}}, 0x0) 04:09:30 executing program 3: r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0x4}}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x30, r2, 0x805, 0x0, 0x0, {{0x1, 0x40030000000000}, 0x0, 0x6, 0x0, {0x14, 0x19, {0x0, 0x600}}}}, 0x30}}, 0x0) 04:09:30 executing program 1: r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f0000000000)="240191001e0025eaa87865f51ef6bce90a04000200bff20182a9000c080009000d000000", 0x24) 04:09:30 executing program 2: syz_mount_image$hfs(&(0x7f00000000c0)='hfs\x00', &(0x7f0000000140)='./file0\x00', 0x500000000000000, 0x0, 0x0, 0x0, &(0x7f0000000540)={[{@uid={'uid', 0x3d, 0xffffffffffffffff}}]}) [ 702.041982][ T5151] hfs: invalid uid -1 04:09:30 executing program 3: r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0x4}}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x30, r2, 0x805, 0x0, 0x0, {{0x1, 0x40030000000000}, 0x0, 0x6, 0x0, {0x14, 0x19, {0x0, 0x700}}}}, 0x30}}, 0x0) 04:09:30 executing program 1: r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f0000000000)="240291001e0025eaa87865f51ef6bce90a04000200bff20182a9000c080009000d000000", 0x24) [ 702.086227][ T5151] hfs: unable to parse mount options 04:09:30 executing program 0: r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0x4}}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x30, r2, 0x805, 0x0, 0x0, {{0x1, 0x40030000000000}, 0x0, 0x6, 0x0, {0x14, 0x19, {0x0, 0xe00}}}}, 0x30}}, 0x0) 04:09:30 executing program 4: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vga_arbiter\x00', 0x400, 0x0) ioctl$KVM_SET_MP_STATE(r0, 0x4004ae99, &(0x7f0000000300)=0x3) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) setxattr$security_ima(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='security.ima\x00', &(0x7f0000000280)=@v1={0x2, "5ef3b6bf7487e27023a119cfd7153e"}, 0x10, 0x1) r1 = syz_open_dev$radio(&(0x7f0000000100)='/dev/radio#\x00', 0x3, 0x2) getsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r1, 0x84, 0x8, &(0x7f0000000140), &(0x7f00000001c0)=0x4) ioctl$EVIOCSKEYCODE_V2(r1, 0x40284504, &(0x7f0000000180)={0x7, 0x4, 0x32, 0xca9, "77736ed72ee9ac29cbb286dcb07801559b9042deea8a0e3d52fb4c51d80dc39e"}) mount$bpf(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x100000, 0x0) 04:09:31 executing program 2: syz_mount_image$hfs(&(0x7f00000000c0)='hfs\x00', &(0x7f0000000140)='./file0\x00', 0x600000000000000, 0x0, 0x0, 0x0, &(0x7f0000000540)={[{@uid={'uid', 0x3d, 0xffffffffffffffff}}]}) 04:09:31 executing program 3: r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0x4}}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x30, r2, 0x805, 0x0, 0x0, {{0x1, 0x40030000000000}, 0x0, 0x6, 0x0, {0x14, 0x19, {0x0, 0xa00}}}}, 0x30}}, 0x0) [ 702.438930][ T5182] hfs: invalid uid -1 [ 702.453063][ T5182] hfs: unable to parse mount options 04:09:31 executing program 5: perf_event_open(&(0x7f0000000040)={0x1, 0x4c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x4000000000a, 0x3, 0x2) sendmsg$unix(r0, 0x0, 0x0) recvmmsg(r0, &(0x7f0000000240)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffde4}}], 0x627, 0x2, 0x0) 04:09:31 executing program 1: r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f0000000000)="240391001e0025eaa87865f51ef6bce90a04000200bff20182a9000c080009000d000000", 0x24) 04:09:31 executing program 0: r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0x4}}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x30, r2, 0x805, 0x0, 0x0, {{0x1, 0x40030000000000}, 0x0, 0x6, 0x0, {0x14, 0x19, {0x0, 0xf00}}}}, 0x30}}, 0x0) 04:09:31 executing program 4: mkdir(&(0x7f00000001c0)='./file1\x00', 0x81) r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x80, 0x0) ioctl$VIDIOC_S_AUDOUT(r0, 0x40345632, &(0x7f0000000100)={0x1, "b04e60c527c59ef99a3f4f0686a63186cc33ebd50c40600dcc2a1a10c2cabbbd", 0x1, 0x1}) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000400)='IPVS\x00') sendmsg$IPVS_CMD_GET_DAEMON(r0, &(0x7f0000000340)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x410000}, 0xc, &(0x7f0000000300)={&(0x7f0000000240)={0xb8, r1, 0x1, 0x70bd29, 0x25dfdbfb, {}, [@IPVS_CMD_ATTR_DEST={0x1c, 0x2, [@IPVS_DEST_ATTR_U_THRESH={0x8, 0x5, 0x9}, @IPVS_DEST_ATTR_PERSIST_CONNS={0x8, 0x9, 0x40}, @IPVS_DEST_ATTR_ADDR_FAMILY={0x8, 0xb, 0x2}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x5c5e}, @IPVS_CMD_ATTR_DEST={0x40, 0x2, [@IPVS_DEST_ATTR_TUN_PORT={0x8, 0xe, 0x4e24}, @IPVS_DEST_ATTR_ACTIVE_CONNS={0x8, 0x7, 0x100000000}, @IPVS_DEST_ATTR_ADDR={0x14, 0x1, @ipv4=@broadcast}, @IPVS_DEST_ATTR_FWD_METHOD={0x8, 0x3, 0x4}, @IPVS_DEST_ATTR_PORT={0x8, 0x2, 0x4e24}, @IPVS_DEST_ATTR_U_THRESH={0x8, 0x5, 0xfffffffffffffcd8}]}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0xfff}, @IPVS_CMD_ATTR_DAEMON={0x38, 0x3, [@IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @multicast2}, @IPVS_DAEMON_ATTR_MCAST_PORT={0x8, 0x7, 0x4e24}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x3}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @empty}, @IPVS_DAEMON_ATTR_MCAST_TTL={0x8, 0x8, 0x9c5}]}]}, 0xb8}, 0x1, 0x0, 0x0, 0x4000}, 0xe4754f0fbee0f7d4) mkdir(&(0x7f00000000c0)='./file2\x00', 0x20) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x2001002, 0x0) mount$bpf(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x20, 0x0) 04:09:31 executing program 2: syz_mount_image$hfs(&(0x7f00000000c0)='hfs\x00', &(0x7f0000000140)='./file0\x00', 0x700000000000000, 0x0, 0x0, 0x0, &(0x7f0000000540)={[{@uid={'uid', 0x3d, 0xffffffffffffffff}}]}) 04:09:31 executing program 3: r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0x4}}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x30, r2, 0x805, 0x0, 0x0, {{0x1, 0x40030000000000}, 0x0, 0x6, 0x0, {0x14, 0x19, {0x0, 0xe00}}}}, 0x30}}, 0x0) [ 702.969698][ T5198] hfs: invalid uid -1 04:09:31 executing program 1: r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f0000000000)="240092001e0025eaa87865f51ef6bce90a04000200bff20182a9000c080009000d000000", 0x24) [ 702.996746][ T5198] hfs: unable to parse mount options 04:09:31 executing program 3: r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0x4}}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x30, r2, 0x805, 0x0, 0x0, {{0x1, 0x40030000000000}, 0x0, 0x6, 0x0, {0x14, 0x19, {0x0, 0xf00}}}}, 0x30}}, 0x0) 04:09:31 executing program 4: lsetxattr$security_capability(&(0x7f0000000140)='./file0/file0\x00', &(0x7f00000001c0)='security.capability\x00', &(0x7f0000000200)=@v2={0x2000000, [{0x1, 0x20000000400}, {0x0, 0x6}]}, 0x14, 0x3) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x2001002, 0x0) mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x44000, 0x0) chmod(&(0x7f00000000c0)='./file0/file0\x00', 0x40) 04:09:31 executing program 0: r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0x4}}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x30, r2, 0x805, 0x0, 0x0, {{0x1, 0x40030000000000}, 0x0, 0x6, 0x0, {0x14, 0x19, {0x0, 0x3f00}}}}, 0x30}}, 0x0) 04:09:31 executing program 2: syz_mount_image$hfs(&(0x7f00000000c0)='hfs\x00', &(0x7f0000000140)='./file0\x00', 0x800000000000000, 0x0, 0x0, 0x0, &(0x7f0000000540)={[{@uid={'uid', 0x3d, 0xffffffffffffffff}}]}) 04:09:32 executing program 1: r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f0000000000)="240192001e0025eaa87865f51ef6bce90a04000200bff20182a9000c080009000d000000", 0x24) [ 703.272933][ T5222] hfs: invalid uid -1 [ 703.286313][ T5222] hfs: unable to parse mount options 04:09:32 executing program 5: perf_event_open(&(0x7f0000000040)={0x1, 0x4c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x4000000000a, 0x3, 0x2) sendmsg$unix(r0, 0x0, 0x0) recvmmsg(r0, &(0x7f0000000240)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffde4}}], 0x627, 0x2, 0x0) 04:09:32 executing program 3: r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0x4}}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x30, r2, 0x805, 0x0, 0x0, {{0x1, 0x40030000000000}, 0x0, 0x6, 0x0, {0x14, 0x19, {0x0, 0x2f02}}}}, 0x30}}, 0x0) 04:09:32 executing program 0: r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0x4}}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x30, r2, 0x805, 0x0, 0x0, {{0x1, 0x40030000000000}, 0x0, 0x6, 0x0, {0x14, 0x19, {0x0, 0x4000}}}}, 0x30}}, 0x0) 04:09:32 executing program 2: syz_mount_image$hfs(&(0x7f00000000c0)='hfs\x00', &(0x7f0000000140)='./file0\x00', 0x900000000000000, 0x0, 0x0, 0x0, &(0x7f0000000540)={[{@uid={'uid', 0x3d, 0xffffffffffffffff}}]}) 04:09:32 executing program 4: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f00000001c0)='./file0/file0\x00', 0x10) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x2001002, 0x0) mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x44000, 0x0) 04:09:32 executing program 1: r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f0000000000)="240292001e0025eaa87865f51ef6bce90a04000200bff20182a9000c080009000d000000", 0x24) [ 703.930477][ T5241] hfs: invalid uid -1 04:09:32 executing program 1: r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f0000000000)="240392001e0025eaa87865f51ef6bce90a04000200bff20182a9000c080009000d000000", 0x24) [ 703.954968][ T5241] hfs: unable to parse mount options 04:09:32 executing program 4: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x2001002, 0x0) mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x44000, 0x0) 04:09:32 executing program 3: r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0x4}}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x30, r2, 0x805, 0x0, 0x0, {{0x1, 0x40030000000000}, 0x0, 0x6, 0x0, {0x14, 0x19, {0x0, 0x3f00}}}}, 0x30}}, 0x0) 04:09:32 executing program 0: r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0x4}}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x30, r2, 0x805, 0x0, 0x0, {{0x1, 0x40030000000000}, 0x0, 0x6, 0x0, {0x14, 0x19, {0x0, 0x4800}}}}, 0x30}}, 0x0) 04:09:32 executing program 3: r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0x4}}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x30, r2, 0x805, 0x0, 0x0, {{0x1, 0x40030000000000}, 0x0, 0x6, 0x0, {0x14, 0x19, {0x0, 0x4000}}}}, 0x30}}, 0x0) 04:09:32 executing program 2: syz_mount_image$hfs(&(0x7f00000000c0)='hfs\x00', &(0x7f0000000140)='./file0\x00', 0xa00000000000000, 0x0, 0x0, 0x0, &(0x7f0000000540)={[{@uid={'uid', 0x3d, 0xffffffffffffffff}}]}) [ 704.297112][ T5272] hfs: invalid uid -1 [ 704.313999][ T5272] hfs: unable to parse mount options [ 704.415008][ T5272] hfs: invalid uid -1 [ 704.419114][ T5272] hfs: unable to parse mount options 04:09:33 executing program 5: perf_event_open(&(0x7f0000000040)={0x1, 0x4c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x4000000000a, 0x3, 0x2) sendmsg$unix(r0, &(0x7f0000000900)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000001900)="83", 0x1}], 0x1}, 0x0) recvmmsg(r0, &(0x7f0000000240)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffde4}}], 0x627, 0x2, 0x0) 04:09:33 executing program 4: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x2001002, 0x0) r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000100)='/dev/null\x00', 0x801, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000300)={0x0, @initdev, @local}, &(0x7f0000000340)=0xc) setsockopt$inet6_IPV6_PKTINFO(r0, 0x29, 0x32, &(0x7f0000000380)={@empty, r1}, 0x14) mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x44000, 0x0) 04:09:33 executing program 1: r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f0000000000)="240093001e0025eaa87865f51ef6bce90a04000200bff20182a9000c080009000d000000", 0x24) 04:09:33 executing program 3: r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0x4}}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x30, r2, 0x805, 0x0, 0x0, {{0x1, 0x40030000000000}, 0x0, 0x6, 0x0, {0x14, 0x19, {0x0, 0x4800}}}}, 0x30}}, 0x0) 04:09:33 executing program 0: r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0x4}}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x30, r2, 0x805, 0x0, 0x0, {{0x1, 0x40030000000000}, 0x0, 0x6, 0x0, {0x14, 0x19, {0x0, 0x4c00}}}}, 0x30}}, 0x0) 04:09:33 executing program 2: syz_mount_image$hfs(&(0x7f00000000c0)='hfs\x00', &(0x7f0000000140)='./file0\x00', 0xb00000000000000, 0x0, 0x0, 0x0, &(0x7f0000000540)={[{@uid={'uid', 0x3d, 0xffffffffffffffff}}]}) [ 704.848839][ T5287] hfs: invalid uid -1 [ 704.870586][ T5287] hfs: unable to parse mount options 04:09:33 executing program 0: r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0x4}}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x30, r2, 0x805, 0x0, 0x0, {{0x1, 0x40030000000000}, 0x0, 0x6, 0x0, {0x14, 0x19, {0x0, 0x6000}}}}, 0x30}}, 0x0) 04:09:33 executing program 3: r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0x4}}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x30, r2, 0x805, 0x0, 0x0, {{0x1, 0x40030000000000}, 0x0, 0x6, 0x0, {0x14, 0x19, {0x0, 0x4c00}}}}, 0x30}}, 0x0) 04:09:33 executing program 4: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x800000, 0x0) mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x44000, 0x0) 04:09:33 executing program 1: r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f0000000000)="240193001e0025eaa87865f51ef6bce90a04000200bff20182a9000c080009000d000000", 0x24) 04:09:33 executing program 2: syz_mount_image$hfs(&(0x7f00000000c0)='hfs\x00', &(0x7f0000000140)='./file0\x00', 0x1000000000000000, 0x0, 0x0, 0x0, &(0x7f0000000540)={[{@uid={'uid', 0x3d, 0xffffffffffffffff}}]}) 04:09:33 executing program 4: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) r0 = dup(0xffffffffffffffff) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000200)={{{@in6=@remote, @in6=@remote}}, {{@in=@broadcast}, 0x0, @in6=@empty}}, &(0x7f0000000300)=0xe8) write$FUSE_LSEEK(r0, &(0x7f00000001c0)={0x18, 0x0, 0x5, {0x8}}, 0x18) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x2001002, 0x0) r1 = syz_open_dev$dmmidi(&(0x7f0000000100)='/dev/dmmidi#\x00', 0x6, 0x200000) setsockopt$bt_l2cap_L2CAP_OPTIONS(r1, 0x6, 0x1, &(0x7f0000000140)={0x5, 0x800, 0x1, 0x4, 0x1, 0x8000, 0x100000000}, 0xc) mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x44000, 0x0) [ 705.188069][ T5317] hfs: invalid uid -1 [ 705.221093][ T5317] hfs: unable to parse mount options 04:09:34 executing program 5: perf_event_open(&(0x7f0000000040)={0x1, 0x4c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x4000000000a, 0x3, 0x2) sendmsg$unix(r0, &(0x7f0000000900)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000001900)="83", 0x1}], 0x1}, 0x0) recvmmsg(r0, &(0x7f0000000240)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffde4}}], 0x627, 0x2, 0x0) 04:09:34 executing program 0: r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0x4}}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x30, r2, 0x805, 0x0, 0x0, {{0x1, 0x40030000000000}, 0x0, 0x6, 0x0, {0x14, 0x19, {0x0, 0x6800}}}}, 0x30}}, 0x0) 04:09:34 executing program 1: r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f0000000000)="240293001e0025eaa87865f51ef6bce90a04000200bff20182a9000c080009000d000000", 0x24) 04:09:34 executing program 3: r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0x4}}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x30, r2, 0x805, 0x0, 0x0, {{0x1, 0x40030000000000}, 0x0, 0x6, 0x0, {0x14, 0x19, {0x0, 0x6000}}}}, 0x30}}, 0x0) 04:09:34 executing program 4: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) pipe2(&(0x7f0000000100)={0xffffffffffffffff}, 0x800) getsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(0xffffffffffffffff, 0x84, 0x72, &(0x7f0000000140)={0x0, 0x80}, &(0x7f00000001c0)=0xc) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(r0, 0x84, 0x7b, &(0x7f0000000200)={r1, 0x6}, &(0x7f0000000240)=0x8) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x2001002, 0x0) mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x44000, 0x0) 04:09:34 executing program 2: syz_mount_image$hfs(&(0x7f00000000c0)='hfs\x00', &(0x7f0000000140)='./file0\x00', 0x2000000000000000, 0x0, 0x0, 0x0, &(0x7f0000000540)={[{@uid={'uid', 0x3d, 0xffffffffffffffff}}]}) [ 705.825038][ T5335] hfs: invalid uid -1 [ 705.843529][ T5335] hfs: unable to parse mount options 04:09:34 executing program 0: r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0x4}}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x30, r2, 0x805, 0x0, 0x0, {{0x1, 0x40030000000000}, 0x0, 0x6, 0x0, {0x14, 0x19, {0x0, 0x6c00}}}}, 0x30}}, 0x0) 04:09:34 executing program 1: r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f0000000000)="240393001e0025eaa87865f51ef6bce90a04000200bff20182a9000c080009000d000000", 0x24) 04:09:34 executing program 3: r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0x4}}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x30, r2, 0x805, 0x0, 0x0, {{0x1, 0x40030000000000}, 0x0, 0x6, 0x0, {0x14, 0x19, {0x0, 0x6800}}}}, 0x30}}, 0x0) 04:09:34 executing program 2: syz_mount_image$hfs(&(0x7f00000000c0)='hfs\x00', &(0x7f0000000140)='./file0\x00', 0x2010000000000000, 0x0, 0x0, 0x0, &(0x7f0000000540)={[{@uid={'uid', 0x3d, 0xffffffffffffffff}}]}) 04:09:34 executing program 4: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) openat$rfkill(0xffffffffffffff9c, &(0x7f0000000100)='/dev/rfkill\x00', 0x20100, 0x0) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x2001002, 0x0) mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x44000, 0x0) 04:09:34 executing program 0: r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0x4}}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x30, r2, 0x805, 0x0, 0x0, {{0x1, 0x40030000000000}, 0x0, 0x6, 0x0, {0x14, 0x19, {0x0, 0x7400}}}}, 0x30}}, 0x0) [ 706.121925][ T5359] hfs: invalid uid -1 [ 706.131114][ T5359] hfs: unable to parse mount options [ 706.234541][ T5359] hfs: invalid uid -1 [ 706.243265][ T5359] hfs: unable to parse mount options 04:09:35 executing program 5: perf_event_open(&(0x7f0000000040)={0x1, 0x4c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x4000000000a, 0x3, 0x2) sendmsg$unix(r0, &(0x7f0000000900)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000001900)="83", 0x1}], 0x1}, 0x0) recvmmsg(r0, &(0x7f0000000240)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffde4}}], 0x627, 0x2, 0x0) 04:09:35 executing program 1: r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f0000000000)="240094001e0025eaa87865f51ef6bce90a04000200bff20182a9000c080009000d000000", 0x24) 04:09:35 executing program 3: r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0x4}}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x30, r2, 0x805, 0x0, 0x0, {{0x1, 0x40030000000000}, 0x0, 0x6, 0x0, {0x14, 0x19, {0x0, 0x6c00}}}}, 0x30}}, 0x0) 04:09:35 executing program 4: r0 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000100)='/dev/dlm-monitor\x00', 0x400000, 0x0) r1 = syz_open_dev$cec(&(0x7f00000001c0)='/dev/cec#\x00', 0x2, 0x2) ioctl$KVM_IOEVENTFD(r0, 0x4040ae79, &(0x7f0000000200)={0x1d000, &(0x7f0000000140), 0x6, r1, 0x4}) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x2001002, 0x0) mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x44000, 0x0) 04:09:35 executing program 0: r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0x4}}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x30, r2, 0x805, 0x0, 0x0, {{0x1, 0x40030000000000}, 0x0, 0x6, 0x0, {0x14, 0x19, {0x0, 0x7a00}}}}, 0x30}}, 0x0) 04:09:35 executing program 2: syz_mount_image$hfs(&(0x7f00000000c0)='hfs\x00', &(0x7f0000000140)='./file0\x00', 0x3f00000000000000, 0x0, 0x0, 0x0, &(0x7f0000000540)={[{@uid={'uid', 0x3d, 0xffffffffffffffff}}]}) 04:09:35 executing program 1: r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f0000000000)="240194001e0025eaa87865f51ef6bce90a04000200bff20182a9000c080009000d000000", 0x24) [ 706.769762][ T5386] hfs: invalid uid -1 04:09:35 executing program 4: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x2001002, 0x0) lsetxattr$security_selinux(&(0x7f0000000100)='./file0/file0\x00', &(0x7f0000000140)='security.selinux\x00', &(0x7f00000001c0)='system_u:object_r:systemd_notify_exec_t:s0\x00', 0x2b, 0x2) mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x44000, 0x0) openat$usbmon(0xffffffffffffff9c, &(0x7f0000000200)='/dev/usbmon0\x00', 0x400, 0x0) 04:09:35 executing program 3: r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0x4}}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x30, r2, 0x805, 0x0, 0x0, {{0x1, 0x40030000000000}, 0x0, 0x6, 0x0, {0x14, 0x19, {0x0, 0x7400}}}}, 0x30}}, 0x0) 04:09:35 executing program 0: r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0x4}}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x30, r2, 0x805, 0x0, 0x0, {{0x1, 0x40030000000000}, 0x0, 0x6, 0x0, {0x14, 0x19, {0x0, 0x8702}}}}, 0x30}}, 0x0) [ 706.859089][ T5386] hfs: unable to parse mount options 04:09:35 executing program 1: r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f0000000000)="240294001e0025eaa87865f51ef6bce90a04000200bff20182a9000c080009000d000000", 0x24) 04:09:35 executing program 2: syz_mount_image$hfs(&(0x7f00000000c0)='hfs\x00', &(0x7f0000000140)='./file0\x00', 0x4000000000000000, 0x0, 0x0, 0x0, &(0x7f0000000540)={[{@uid={'uid', 0x3d, 0xffffffffffffffff}}]}) [ 707.131572][ T5410] hfs: invalid uid -1 [ 707.136900][ T5410] hfs: unable to parse mount options [ 707.192593][ T5410] hfs: invalid uid -1 [ 707.199815][ T5410] hfs: unable to parse mount options 04:09:36 executing program 5: perf_event_open(&(0x7f0000000040)={0x1, 0x4c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x4000000000a, 0x3, 0x2) sendmsg$unix(r0, &(0x7f0000000900)={&(0x7f0000000180)=@abs, 0x6e, 0x0}, 0x0) recvmmsg(r0, &(0x7f0000000240)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffde4}}], 0x627, 0x2, 0x0) 04:09:36 executing program 0: r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0x4}}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x30, r2, 0x805, 0x0, 0x0, {{0x1, 0x40030000000000}, 0x0, 0x6, 0x0, {0x14, 0x19, {0x0, 0xf000}}}}, 0x30}}, 0x0) 04:09:36 executing program 3: r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0x4}}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x30, r2, 0x805, 0x0, 0x0, {{0x1, 0x40030000000000}, 0x0, 0x6, 0x0, {0x14, 0x19, {0x0, 0x7a00}}}}, 0x30}}, 0x0) 04:09:36 executing program 1: r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f0000000000)="240394001e0025eaa87865f51ef6bce90a04000200bff20182a9000c080009000d000000", 0x24) 04:09:36 executing program 4: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) r0 = syz_open_dev$mouse(&(0x7f0000000100)='/dev/input/mouse#\x00', 0x80000001, 0x20000) r1 = getpgrp(0xffffffffffffffff) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000001400)={{{@in=@remote, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@dev}, 0x0, @in=@initdev}}, &(0x7f0000001500)=0xe8) r3 = getgid() r4 = getpid() lstat(&(0x7f0000001540)='./file0/file0\x00', &(0x7f0000001580)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001600)={0x0, 0x0, 0x0}, &(0x7f0000001640)=0xc) r7 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000001680)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) r8 = syz_open_dev$swradio(&(0x7f00000016c0)='/dev/swradio#\x00', 0x0, 0x2) r9 = openat$urandom(0xffffffffffffff9c, &(0x7f0000001700)='/dev/urandom\x00', 0x80000, 0x0) r10 = syz_open_dev$sndseq(&(0x7f0000001740)='/dev/snd/seq\x00', 0x0, 0x10000) r11 = syz_open_dev$video4linux(&(0x7f0000001780)='/dev/v4l-subdev#\x00', 0x8, 0x800) r12 = openat$ppp(0xffffffffffffff9c, &(0x7f00000017c0)='/dev/ppp\x00', 0x2, 0x0) r13 = creat(&(0x7f0000001800)='./file0\x00', 0x1) r14 = accept4$netrom(0xffffffffffffffff, &(0x7f0000001840)={{0x3, @bcast}, [@netrom, @null, @remote, @rose, @default, @rose, @default, @null]}, &(0x7f00000018c0)=0x48, 0x800) r15 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000001900)='/dev/sequencer2\x00', 0x78c910d68042099f, 0x0) r16 = socket$inet6_tcp(0xa, 0x1, 0x0) r17 = openat$vicodec0(0xffffffffffffff9c, &(0x7f0000001940)='/dev/video36\x00', 0x2, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000001a00)={0x0, 0xffffffffffffffff, 0x0, 0x4, &(0x7f0000001980)='bpf\x00', 0xffffffffffffffff}, 0x30) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000001a40)={{{@in6=@ipv4={[], [], @initdev}, @in=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@dev}, 0x0, @in=@dev}}, &(0x7f0000001b40)=0xe8) r20 = getegid() sendmsg$unix(r0, &(0x7f0000001c40)={&(0x7f00000001c0)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000000140)=[{&(0x7f0000000240)="1a6137d75c2a8b1391dd8eacccf3d4fccc831f66a7fbc6eb40d46ad05c83320fdb24f766d4d00b376ce9801e3edcb735b8f76c54686a63b1963defc8fa8aa9acd4599355ecdbde17323c511a6f5b92753e1cda6f4ed6f95a2cc17865ef2867656b9cd13f7084c5e355f48a595c79361078b7f1b60b1fd28c15962c3bf64e89fa21a7430821fa1bfc1839c241369a4506c5717d6e90092c8848cb8335aaa0f65415b5ecd11c82b9a69c052b36f70d3a260b2caa89468b15431d3edc89354883ce2950c8a6e3a0f2d5fd1f9cf5b4153d05839f93d478d958099744775c2c7e3a45693977034e", 0xe5}, {&(0x7f0000000340)="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", 0x1000}, {&(0x7f0000001340)="e132ea03b145cbc7c32dd624126983e7246bbaeb2d7ce6bfbff5ec94a6c199e1ab037d7f877dbb7750ab2341fec04ebb70d5618dbd8b031ad3de3467ccfddcc046ae6bcad8a40c7d53180836766dd2677c8af1252d083ce9065f5b23a0edd93c3aed192aa9d7394d3affe9e5c3099cb7aa8a7f42983a69d168e7ac46a57d841986fae9b34c3ca9e99499f269ef684e43c1c6137629c77ff141cdbca81783d4a8794505", 0xa3}], 0x3, &(0x7f0000001b80)=ANY=[@ANYBLOB="1c000000000000000100000002000000", @ANYRES32=r1, @ANYRES32=r2, @ANYRES32=r3, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=r4, @ANYRES32=r5, @ANYRES32=r6, @ANYBLOB="0000000028000000000000000100000001000000", @ANYRES32=r7, @ANYRES32=r8, @ANYRES32=r9, @ANYRES32=r10, @ANYRES32=r11, @ANYRES32=r12, @ANYBLOB="20000000000000000100000001000000", @ANYRES32=r13, @ANYRES32=r14, @ANYRES32=r15, @ANYRES32=r16, @ANYBLOB="14000000000000000100000001000000", @ANYRES32=r17, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=r18, @ANYRES32=r19, @ANYRES32=r20, @ANYBLOB='\x00\x00\x00\x00'], 0xc0, 0x801}, 0x4000000) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x2001002, 0x0) mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x44000, 0x0) 04:09:36 executing program 2: syz_mount_image$hfs(&(0x7f00000000c0)='hfs\x00', &(0x7f0000000140)='./file0\x00', 0x4800000000000000, 0x0, 0x0, 0x0, &(0x7f0000000540)={[{@uid={'uid', 0x3d, 0xffffffffffffffff}}]}) 04:09:36 executing program 1: r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f0000000000)="240095001e0025eaa87865f51ef6bce90a04000200bff20182a9000c080009000d000000", 0x24) [ 707.666587][ T5431] hfs: invalid uid -1 04:09:36 executing program 3: r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0x4}}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x30, r2, 0x805, 0x0, 0x0, {{0x1, 0x40030000000000}, 0x0, 0x6, 0x0, {0x14, 0x19, {0x0, 0xf000}}}}, 0x30}}, 0x0) 04:09:36 executing program 0: r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0x4}}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x30, r2, 0x805, 0x0, 0x0, {{0x1, 0x40030000000000}, 0x0, 0x6, 0x0, {0x14, 0x19, {0x0, 0x30000}}}}, 0x30}}, 0x0) 04:09:36 executing program 4: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x2001002, 0x0) mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x1001, 0x0) pipe2(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x1d55b46e5742b29) ioctl$VIDIOC_SUBSCRIBE_EVENT(r0, 0x4020565a, &(0x7f0000000140)={0x1, 0x0, 0x1}) [ 707.713389][ T5431] hfs: unable to parse mount options 04:09:36 executing program 1: r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f0000000000)="240195001e0025eaa87865f51ef6bce90a04000200bff20182a9000c080009000d000000", 0x24) [ 707.821020][ T5431] hfs: invalid uid -1 [ 707.858498][ T5431] hfs: unable to parse mount options 04:09:36 executing program 4: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x2001002, 0x0) socket$can_raw(0x1d, 0x3, 0x1) mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x44000, 0x0) 04:09:37 executing program 5: perf_event_open(&(0x7f0000000040)={0x1, 0x4c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x4000000000a, 0x3, 0x2) sendmsg$unix(r0, &(0x7f0000000900)={&(0x7f0000000180)=@abs, 0x6e, 0x0}, 0x0) recvmmsg(r0, &(0x7f0000000240)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffde4}}], 0x627, 0x2, 0x0) 04:09:37 executing program 2: syz_mount_image$hfs(&(0x7f00000000c0)='hfs\x00', &(0x7f0000000140)='./file0\x00', 0x4c00000000000000, 0x0, 0x0, 0x0, &(0x7f0000000540)={[{@uid={'uid', 0x3d, 0xffffffffffffffff}}]}) 04:09:37 executing program 3: r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0x4}}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x30, r2, 0x805, 0x0, 0x0, {{0x1, 0x40030000000000}, 0x0, 0x6, 0x0, {0x14, 0x19, {0x0, 0x30000}}}}, 0x30}}, 0x0) 04:09:37 executing program 0: r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0x4}}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x30, r2, 0x805, 0x0, 0x0, {{0x1, 0x40030000000000}, 0x0, 0x6, 0x0, {0x14, 0x19, {0x0, 0x34000}}}}, 0x30}}, 0x0) 04:09:37 executing program 1: r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f0000000000)="240295001e0025eaa87865f51ef6bce90a04000200bff20182a9000c080009000d000000", 0x24) 04:09:37 executing program 4: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x2001002, 0x0) mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x44000, 0x0) rt_sigsuspend(&(0x7f0000000100)={0x3}, 0x8) mkdir(&(0x7f0000000140)='./file0\x00', 0x40) [ 708.544197][ T5474] hfs: invalid uid -1 [ 708.553234][ T5474] hfs: unable to parse mount options 04:09:37 executing program 1: r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f0000000000)="240395001e0025eaa87865f51ef6bce90a04000200bff20182a9000c080009000d000000", 0x24) 04:09:37 executing program 3: r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0x4}}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x30, r2, 0x805, 0x0, 0x0, {{0x1, 0x40030000000000}, 0x0, 0x6, 0x0, {0x14, 0x19, {0x0, 0x34000}}}}, 0x30}}, 0x0) 04:09:37 executing program 0: r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0x4}}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x30, r2, 0x805, 0x0, 0x0, {{0x1, 0x40030000000000}, 0x0, 0x6, 0x0, {0x14, 0x19, {0x0, 0x400300}}}}, 0x30}}, 0x0) 04:09:37 executing program 2: syz_mount_image$hfs(&(0x7f00000000c0)='hfs\x00', &(0x7f0000000140)='./file0\x00', 0x6000000000000000, 0x0, 0x0, 0x0, &(0x7f0000000540)={[{@uid={'uid', 0x3d, 0xffffffffffffffff}}]}) 04:09:37 executing program 1: r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f0000000000)="240096001e0025eaa87865f51ef6bce90a04000200bff20182a9000c080009000d000000", 0x24) [ 708.791151][ T5495] hfs: invalid uid -1 04:09:37 executing program 3: r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0x4}}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x30, r2, 0x805, 0x0, 0x0, {{0x1, 0x40030000000000}, 0x0, 0x6, 0x0, {0x14, 0x19, {0x0, 0x400300}}}}, 0x30}}, 0x0) [ 708.811845][ T5495] hfs: unable to parse mount options [ 708.886566][ T5495] hfs: invalid uid -1 [ 708.895443][ T5495] hfs: unable to parse mount options 04:09:38 executing program 5: perf_event_open(&(0x7f0000000040)={0x1, 0x4c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x4000000000a, 0x3, 0x2) sendmsg$unix(r0, &(0x7f0000000900)={&(0x7f0000000180)=@abs, 0x6e, 0x0}, 0x0) recvmmsg(r0, &(0x7f0000000240)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffde4}}], 0x627, 0x2, 0x0) 04:09:38 executing program 0: r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0x4}}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x30, r2, 0x805, 0x0, 0x0, {{0x1, 0x40030000000000}, 0x0, 0x6, 0x0, {0x14, 0x19, {0x0, 0xf0ffff}}}}, 0x30}}, 0x0) 04:09:38 executing program 1: r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f0000000000)="240196001e0025eaa87865f51ef6bce90a04000200bff20182a9000c080009000d000000", 0x24) 04:09:38 executing program 2: syz_mount_image$hfs(&(0x7f00000000c0)='hfs\x00', &(0x7f0000000140)='./file0\x00', 0x6800000000000000, 0x0, 0x0, 0x0, &(0x7f0000000540)={[{@uid={'uid', 0x3d, 0xffffffffffffffff}}]}) 04:09:38 executing program 3: r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0x4}}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x30, r2, 0x805, 0x0, 0x0, {{0x1, 0x40030000000000}, 0x0, 0x6, 0x0, {0x14, 0x19, {0x0, 0xf0ffff}}}}, 0x30}}, 0x0) 04:09:38 executing program 4: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) r0 = dup(0xffffffffffffffff) ioctl$KVM_X86_GET_MCE_CAP_SUPPORTED(r0, 0x8008ae9d, &(0x7f0000000100)=""/54) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x2001002, 0x0) bind$nfc_llcp(r0, &(0x7f00000001c0)={0x27, 0x0, 0x2, 0x5, 0x7, 0x8, "6362c6da10adcdc5e8636db60bdf302de8c1760bb3bc0729d0925e3b884acceda9afde938f90c4017d65a8870395d52c93b4a33f680049fe44c5e34edf610b", 0x7}, 0x60) mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x44000, 0x0) 04:09:38 executing program 1: r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f0000000000)="240296001e0025eaa87865f51ef6bce90a04000200bff20182a9000c080009000d000000", 0x24) 04:09:38 executing program 4: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x2001002, 0x0) syz_mount_image$hfs(&(0x7f0000000140)='hfs\x00', &(0x7f00000001c0)='./file0\x00', 0x1, 0x2, &(0x7f0000000340)=[{&(0x7f0000000200)="0a0badd9138003c642c433c77420628f5cce697e9a8f787789740c8a4f7e625fce2948c289640c6f5b80b4c7bc3d77a55b41e1b6c9349eea7413d35bd031e4ec9599b55e61df48588e1380aba058dee29586be46dbb61d9a1008af8e99016b30d8088d9f2ca67dd98999f285341b7978038dd1ebc79a186b0765ed2053a6bd32795ce7e636ec1bb441e5d2b9578fbe07cdf07770cde2373c9aa72d147dfc1252066c84f98c2ec1ce16c1c3c475756995c3104a8c0622d9869446d1baaa356e7b4b77fdbe0a4b0cadfb0344e46fbe2c7ac32962b6bf75cc90178d2fbf93c6412972d0037352689a558ebd66ac7d799838d2", 0xf1, 0x7}, {&(0x7f0000000300)="7c3922596973dfc7e271c5ae2e46914040b5c9f12b", 0x15, 0x8}], 0x4, &(0x7f0000000380)={[{@codepage={'codepage', 0x3d, 'macroman'}}, {@type={'type', 0x3d, "05bd0943"}}, {@codepage={'codepage', 0x3d, 'iso8859-6'}}, {@creator={'creator', 0x3d, "e67f4862"}}, {@quiet='quiet'}, {@creator={'creator', 0x3d, "d8ce7f2f"}}, {@umask={'umask', 0x3d, 0x3}}], [{@dont_appraise='dont_appraise'}, {@fscontext={'fscontext', 0x3d, 'unconfined_u'}}, {@hash='hash'}, {@obj_user={'obj_user', 0x3d, 'bpf\x00'}}, {@fsmagic={'fsmagic', 0x3d, 0xfffffffffffffffd}}]}) r0 = openat(0xffffffffffffff9c, &(0x7f0000000500)='./file0\x00', 0x105282, 0x5) ioctl$EVIOCGLED(r0, 0x80404519, &(0x7f0000000600)=""/230) ioctl$SNDRV_SEQ_IOCTL_GET_NAMED_QUEUE(r0, 0xc08c5336, &(0x7f0000000540)={0x5, 0x7ff, 0xea1, 'queue0\x00', 0x6}) mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x44000, 0x0) r1 = syz_open_dev$vbi(&(0x7f0000000480)='/dev/vbi#\x00', 0x3, 0x2) ioctl$VIDIOC_S_AUDIO(r1, 0x40345622, &(0x7f00000004c0)={0x33, "f8d3cd58e2ba3c5fa3d781f329c44016564617166d1ea20ecc874719d3c26dfa", 0x2, 0x1}) umount2(&(0x7f0000000100)='./file0/file0\x00', 0x8) [ 709.539450][ T5525] hfs: invalid uid -1 [ 709.555134][ T5525] hfs: unable to parse mount options 04:09:38 executing program 0: r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0x4}}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x30, r2, 0x805, 0x0, 0x0, {{0x1, 0x40030000000000}, 0x0, 0x6, 0x0, {0x14, 0x19, {0x0, 0x1000000}}}}, 0x30}}, 0x0) 04:09:38 executing program 3: r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0x4}}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x30, r2, 0x805, 0x0, 0x0, {{0x1, 0x40030000000000}, 0x0, 0x6, 0x0, {0x14, 0x19, {0x0, 0x1000000}}}}, 0x30}}, 0x0) 04:09:38 executing program 2: syz_mount_image$hfs(&(0x7f00000000c0)='hfs\x00', &(0x7f0000000140)='./file0\x00', 0x6c00000000000000, 0x0, 0x0, 0x0, &(0x7f0000000540)={[{@uid={'uid', 0x3d, 0xffffffffffffffff}}]}) 04:09:38 executing program 1: r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f0000000000)="240396001e0025eaa87865f51ef6bce90a04000200bff20182a9000c080009000d000000", 0x24) [ 709.855405][ T5548] hfs: invalid uid -1 [ 709.873930][ T5548] hfs: unable to parse mount options 04:09:39 executing program 5: perf_event_open(&(0x7f0000000040)={0x1, 0x4c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x4000000000a, 0x3, 0x2) sendmsg$unix(r0, &(0x7f0000000900)={&(0x7f0000000180)=@abs, 0x6e, &(0x7f0000000040)}, 0x0) recvmmsg(r0, &(0x7f0000000240)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffde4}}], 0x627, 0x2, 0x0) 04:09:39 executing program 3: r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0x4}}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x30, r2, 0x805, 0x0, 0x0, {{0x1, 0x40030000000000}, 0x0, 0x6, 0x0, {0x14, 0x19, {0x0, 0x2000000}}}}, 0x30}}, 0x0) 04:09:39 executing program 4: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000240)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x2001002, 0x0) mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x44000, 0x0) r0 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000100)='/proc/capi/capi20ncci\x00', 0x2000, 0x0) getpeername$unix(r0, &(0x7f00000001c0), &(0x7f0000000140)=0x6e) 04:09:39 executing program 0: r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0x4}}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x30, r2, 0x805, 0x0, 0x0, {{0x1, 0x40030000000000}, 0x0, 0x6, 0x0, {0x14, 0x19, {0x0, 0x2000000}}}}, 0x30}}, 0x0) 04:09:39 executing program 1: r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f0000000000)="240097001e0025eaa87865f51ef6bce90a04000200bff20182a9000c080009000d000000", 0x24) 04:09:39 executing program 2: syz_mount_image$hfs(&(0x7f00000000c0)='hfs\x00', &(0x7f0000000140)='./file0\x00', 0x7400000000000000, 0x0, 0x0, 0x0, &(0x7f0000000540)={[{@uid={'uid', 0x3d, 0xffffffffffffffff}}]}) 04:09:39 executing program 3: r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0x4}}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x30, r2, 0x805, 0x0, 0x0, {{0x1, 0x40030000000000}, 0x0, 0x6, 0x0, {0x14, 0x19, {0x0, 0x3000000}}}}, 0x30}}, 0x0) 04:09:39 executing program 1: r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f0000000000)="240197001e0025eaa87865f51ef6bce90a04000200bff20182a9000c080009000d000000", 0x24) 04:09:39 executing program 0: r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0x4}}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x30, r2, 0x805, 0x0, 0x0, {{0x1, 0x40030000000000}, 0x0, 0x6, 0x0, {0x14, 0x19, {0x0, 0x3000000}}}}, 0x30}}, 0x0) 04:09:39 executing program 4: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x2001002, 0x0) r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000100)='/dev/full\x00', 0x2000, 0x0) accept4$vsock_stream(r0, &(0x7f0000000140)={0x28, 0x0, 0x2711}, 0x10, 0x80800) mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x44000, 0x0) [ 710.531087][ T5566] hfs: invalid uid -1 [ 710.542302][ T5566] hfs: unable to parse mount options [ 710.631944][ T5566] hfs: invalid uid -1 [ 710.666365][ T5566] hfs: unable to parse mount options 04:09:39 executing program 1: r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f0000000000)="240297001e0025eaa87865f51ef6bce90a04000200bff20182a9000c080009000d000000", 0x24) 04:09:39 executing program 4: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f0000000240)='./bus\x00', 0x6) r0 = syz_open_dev$dri(0x0, 0x0, 0x0) ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x5501, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) request_key(&(0x7f0000000000)='big_key\x00', &(0x7f0000000040)={'syz', 0x2}, &(0x7f0000000080)='$systemlo\x00', 0xfffffffffffffff8) ioctl$KVM_CHECK_EXTENSION_VM(0xffffffffffffffff, 0xae03, 0x0) ioctl$KVM_IRQFD(r2, 0x4020ae76, &(0x7f0000000200)={r0, 0x80000000, 0x9, r1}) mmap$perf(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x2000000, 0x10, 0xffffffffffffffff, 0x0) setsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x5, &(0x7f0000000400)="6c7d62787332c215caf5521a67893cd437ccce3f7889f660e6bd2f5b063081a585ac60f6be515e1120f370258abeff36c67c5ffbe44cebb5906106e744174d77a9215c09d106674b0a3c5f593114c999758831ba7ea16ceffc21f96b39774c41ca37983e6e21b9dd6a76ba36af03fb694bdb5c0431bd6f7f7d9b3467d76ad10efbd5b5d9166fe89a807d17bda935fdb8f373f296b8593da900789d710c4f09a527bb812186157eeee34fd3ccde006401d30a0a82d1c7d58361ce5c59f89d130c37b950ca21a553d36edcf1c76582dd876a24a06cd60898e8f81095d3f3251bbcf6193f7119621cb1c1827a41592c4ac938", 0xf1) renameat(0xffffffffffffffff, &(0x7f00000006c0)='./bus\x00', 0xffffffffffffffff, 0x0) ioctl$TIOCLINUX2(0xffffffffffffffff, 0x541c, &(0x7f0000000380)={0x2, 0x0, 0x0, 0x0, 0x4, 0x68}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f0000001300)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(arc4)\x00'}, 0x58) r4 = accept$alg(r3, 0x0, 0x0) fcntl$setstatus(r4, 0x4, 0x2800) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000280)="8b", 0x1) recvmmsg(r4, &(0x7f0000006100)=[{{&(0x7f0000000100)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @dev}, 0x80, &(0x7f0000000300), 0x0, &(0x7f0000000340)=""/120, 0x6f}}], 0x400000000000653, 0x0, 0x0) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x2001002, 0x0) mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x44000, 0x0) 04:09:40 executing program 5: perf_event_open(&(0x7f0000000040)={0x1, 0x4c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x4000000000a, 0x3, 0x2) sendmsg$unix(r0, &(0x7f0000000900)={&(0x7f0000000180)=@abs, 0x6e, &(0x7f0000000040)}, 0x0) recvmmsg(r0, &(0x7f0000000240)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffde4}}], 0x627, 0x2, 0x0) 04:09:40 executing program 3: r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0x4}}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x30, r2, 0x805, 0x0, 0x0, {{0x1, 0x40030000000000}, 0x0, 0x6, 0x0, {0x14, 0x19, {0x0, 0x4000000}}}}, 0x30}}, 0x0) 04:09:40 executing program 2: syz_mount_image$hfs(&(0x7f00000000c0)='hfs\x00', &(0x7f0000000140)='./file0\x00', 0x7a00000000000000, 0x0, 0x0, 0x0, &(0x7f0000000540)={[{@uid={'uid', 0x3d, 0xffffffffffffffff}}]}) 04:09:40 executing program 0: r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0x4}}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x30, r2, 0x805, 0x0, 0x0, {{0x1, 0x40030000000000}, 0x0, 0x6, 0x0, {0x14, 0x19, {0x0, 0x4000000}}}}, 0x30}}, 0x0) 04:09:40 executing program 1: r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f0000000000)="240397001e0025eaa87865f51ef6bce90a04000200bff20182a9000c080009000d000000", 0x24) 04:09:40 executing program 4: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) r0 = fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) ioctl$VIDIOC_S_CROP(r0, 0x4014563c, &(0x7f00000001c0)={0x3, {0xffffffffffffffff, 0x10000, 0xfff}}) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) r1 = syz_open_dev$usb(&(0x7f0000000100)='/dev/bus/usb/00#/00#\x00', 0x1, 0x2) prctl$PR_GET_NO_NEW_PRIVS(0x27) sendto$unix(r1, &(0x7f0000000140)="c0c542cae4b93948a4a84f1731ea119dc1caca1f4851", 0x16, 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) sendmsg$nl_crypto(r0, &(0x7f0000000380)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000340)={&(0x7f0000000240)=@del={0xf0, 0x11, 0x1, 0x70bd28, 0x25dfdbfd, {{'tgr192-generic\x00'}, [], [], 0x400, 0x2400}, [{0x8, 0x1, 0x7}, {0x8, 0x1, 0x200}]}, 0xf0}, 0x1, 0x0, 0x0, 0x1}, 0xc010) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x2001002, 0x0) socket$l2tp(0x18, 0x1, 0x1) mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x44000, 0x0) [ 711.413717][ T5604] hfs: invalid uid -1 [ 711.427911][ T5604] hfs: unable to parse mount options 04:09:40 executing program 1: r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f0000000000)="240098001e0025eaa87865f51ef6bce90a04000200bff20182a9000c080009000d000000", 0x24) 04:09:40 executing program 3: r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0x4}}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x30, r2, 0x805, 0x0, 0x0, {{0x1, 0x40030000000000}, 0x0, 0x6, 0x0, {0x14, 0x19, {0x0, 0x5000000}}}}, 0x30}}, 0x0) 04:09:40 executing program 2: syz_mount_image$hfs(&(0x7f00000000c0)='hfs\x00', &(0x7f0000000140)='./file0\x00', 0x8cffffff00000000, 0x0, 0x0, 0x0, &(0x7f0000000540)={[{@uid={'uid', 0x3d, 0xffffffffffffffff}}]}) 04:09:40 executing program 4: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f0000000240)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) llistxattr(&(0x7f0000000100)='./file0/file0\x00', &(0x7f00000001c0)=""/118, 0x76) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x2001002, 0x0) mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x44000, 0x0) chroot(&(0x7f0000000000)='./file0/file0\x00') 04:09:40 executing program 0: r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0x4}}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x30, r2, 0x805, 0x0, 0x0, {{0x1, 0x40030000000000}, 0x0, 0x6, 0x0, {0x14, 0x19, {0x0, 0x5000000}}}}, 0x30}}, 0x0) 04:09:40 executing program 3: r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0x4}}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x30, r2, 0x805, 0x0, 0x0, {{0x1, 0x40030000000000}, 0x0, 0x6, 0x0, {0x14, 0x19, {0x0, 0x6000000}}}}, 0x30}}, 0x0) [ 711.765292][ T5633] hfs: invalid uid -1 [ 711.779910][ T5633] hfs: unable to parse mount options [ 711.849606][ T5633] hfs: invalid uid -1 [ 711.856396][ T5633] hfs: unable to parse mount options 04:09:41 executing program 5: perf_event_open(&(0x7f0000000040)={0x1, 0x4c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x4000000000a, 0x3, 0x2) sendmsg$unix(r0, &(0x7f0000000900)={&(0x7f0000000180)=@abs, 0x6e, &(0x7f0000000040)}, 0x0) recvmmsg(r0, &(0x7f0000000240)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffde4}}], 0x627, 0x2, 0x0) 04:09:41 executing program 1: r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f0000000000)="240198001e0025eaa87865f51ef6bce90a04000200bff20182a9000c080009000d000000", 0x24) 04:09:41 executing program 0: r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0x4}}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x30, r2, 0x805, 0x0, 0x0, {{0x1, 0x40030000000000}, 0x0, 0x6, 0x0, {0x14, 0x19, {0x0, 0x6000000}}}}, 0x30}}, 0x0) 04:09:41 executing program 3: r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0x4}}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x30, r2, 0x805, 0x0, 0x0, {{0x1, 0x40030000000000}, 0x0, 0x6, 0x0, {0x14, 0x19, {0x0, 0x7000000}}}}, 0x30}}, 0x0) 04:09:41 executing program 4: mkdir(&(0x7f0000000380)='./file0\x00', 0xbb0fa1775b35e9a3) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x10010) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x2001002, 0x0) r0 = syz_open_dev$mouse(&(0x7f0000000040)='/dev/input/mouse#\x00', 0x0, 0x0) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000100)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DEST(r0, &(0x7f00000002c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x400300}, 0xc, &(0x7f0000000280)={&(0x7f00000001c0)={0x78, r1, 0x800, 0x70bd2a, 0x25dfdbfd, {}, [@IPVS_CMD_ATTR_DEST={0x30, 0x2, [@IPVS_DEST_ATTR_ACTIVE_CONNS={0x8}, @IPVS_DEST_ATTR_ADDR={0x14, 0x1, @ipv6=@loopback}, @IPVS_DEST_ATTR_U_THRESH={0x8}, @IPVS_DEST_ATTR_ADDR_FAMILY={0x8, 0xb, 0xa}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x8001}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x35}, @IPVS_CMD_ATTR_SERVICE={0x24, 0x1, [@IPVS_SVC_ATTR_FWMARK={0x8}, @IPVS_SVC_ATTR_PE_NAME={0x8, 0xb, 'sip\x00'}, @IPVS_SVC_ATTR_PORT={0x8, 0x4, 0x4e24}, @IPVS_SVC_ATTR_SCHED_NAME={0x8, 0x6, 'sed\x00'}]}]}, 0x78}, 0x1, 0x0, 0x0, 0x15}, 0x800) mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x44000, 0x0) 04:09:41 executing program 2: syz_mount_image$hfs(&(0x7f00000000c0)='hfs\x00', &(0x7f0000000140)='./file0\x00', 0xf6ffffff00000000, 0x0, 0x0, 0x0, &(0x7f0000000540)={[{@uid={'uid', 0x3d, 0xffffffffffffffff}}]}) [ 712.390999][ T5650] hfs: invalid uid -1 [ 712.420069][ T5650] hfs: unable to parse mount options 04:09:41 executing program 1: r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f0000000000)="240298001e0025eaa87865f51ef6bce90a04000200bff20182a9000c080009000d000000", 0x24) 04:09:41 executing program 4: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) r0 = add_key$keyring(&(0x7f0000000200)='keyring\x00', &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffa) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r0, &(0x7f0000000280)='rxrpc_s\x00', &(0x7f00000002c0)=@secondary='builtin_and_secondary_trusted\x00') mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x2001002, 0x0) mount$bpf(0x0, &(0x7f0000000300)='./file0\x00', 0x0, 0x0, 0x0) mount(&(0x7f0000000100)=ANY=[@ANYBLOB="166465762f73723000"], &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='cramfs\x00', 0x1, 0x0) r1 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/btrfs-control\x00', 0x0, 0x0) r2 = msgget$private(0x0, 0xd) lstat(&(0x7f0000000380)='./file0/file0\x00', &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0}) stat(&(0x7f0000000440)='./file0/file0\x00', &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000000500)={{{@in=@remote, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@dev}, 0x0, @in6}}, &(0x7f0000000600)=0xe8) getgroups(0xa, &(0x7f0000000640)=[0x0, 0xee01, 0x0, 0x0, 0xee01, 0xee01, 0x0, 0xee00, 0xee01, 0xee01]) r7 = gettid() ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f0000000680)=0x0) msgctl$IPC_SET(r2, 0x1, &(0x7f00000006c0)={{0x2, r3, r4, r5, r6, 0x7, 0x7}, 0x3, 0x7ff, 0xffffffffffffff01, 0x379, 0x80000001, 0xffff, r7, r8}) getsockopt$bt_l2cap_L2CAP_LM(r1, 0x6, 0x3, &(0x7f0000000780), &(0x7f00000007c0)=0x4) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r1, 0x84, 0x8, &(0x7f0000000340)=0xff2, 0x4) fcntl$lock(r1, 0x25, &(0x7f0000000740)={0x0, 0x0, 0x4, 0x2fb, r7}) 04:09:41 executing program 3: r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0x4}}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x30, r2, 0x805, 0x0, 0x0, {{0x1, 0x40030000000000}, 0x0, 0x6, 0x0, {0x14, 0x19, {0x0, 0xa000000}}}}, 0x30}}, 0x0) 04:09:41 executing program 0: r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0x4}}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x30, r2, 0x805, 0x0, 0x0, {{0x1, 0x40030000000000}, 0x0, 0x6, 0x0, {0x14, 0x19, {0x0, 0x7000000}}}}, 0x30}}, 0x0) 04:09:41 executing program 2: syz_mount_image$hfs(&(0x7f00000000c0)='hfs\x00', &(0x7f0000000140)='./file0\x00', 0xf9fdffff00000000, 0x0, 0x0, 0x0, &(0x7f0000000540)={[{@uid={'uid', 0x3d, 0xffffffffffffffff}}]}) 04:09:41 executing program 1: r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f0000000000)="240398001e0025eaa87865f51ef6bce90a04000200bff20182a9000c080009000d000000", 0x24) [ 712.687596][ T5678] hfs: invalid uid -1 [ 712.691874][ T5678] hfs: unable to parse mount options [ 712.874264][ T5678] hfs: invalid uid -1 [ 712.878278][ T5678] hfs: unable to parse mount options 04:09:42 executing program 5: perf_event_open(&(0x7f0000000040)={0x1, 0x4c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x4000000000a, 0x3, 0x2) sendmsg$unix(r0, &(0x7f0000000900)={&(0x7f0000000180)=@abs, 0x6e, &(0x7f0000000040)=[{0x0}], 0x1}, 0x0) recvmmsg(r0, &(0x7f0000000240)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffde4}}], 0x627, 0x2, 0x0) 04:09:42 executing program 3: r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0x4}}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x30, r2, 0x805, 0x0, 0x0, {{0x1, 0x40030000000000}, 0x0, 0x6, 0x0, {0x14, 0x19, {0x0, 0xe000000}}}}, 0x30}}, 0x0) 04:09:42 executing program 0: r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0x4}}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x30, r2, 0x805, 0x0, 0x0, {{0x1, 0x40030000000000}, 0x0, 0x6, 0x0, {0x14, 0x19, {0x0, 0xa000000}}}}, 0x30}}, 0x0) 04:09:42 executing program 1: r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f0000000000)="240099001e0025eaa87865f51ef6bce90a04000200bff20182a9000c080009000d000000", 0x24) 04:09:42 executing program 4: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f0000000080)='./file0\x00', 0x80) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x2001002, 0x0) mount$bpf(0x0, &(0x7f0000000100)='./file0/file0\x00', 0x0, 0x44000, 0x0) 04:09:42 executing program 2: syz_mount_image$hfs(&(0x7f00000000c0)='hfs\x00', &(0x7f0000000140)='./file0\x00', 0xff00000000000000, 0x0, 0x0, 0x0, &(0x7f0000000540)={[{@uid={'uid', 0x3d, 0xffffffffffffffff}}]}) [ 713.301457][ T5703] hfs: invalid uid -1 [ 713.332233][ T5703] hfs: unable to parse mount options 04:09:42 executing program 0: r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0x4}}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x30, r2, 0x805, 0x0, 0x0, {{0x1, 0x40030000000000}, 0x0, 0x6, 0x0, {0x14, 0x19, {0x0, 0xe000000}}}}, 0x30}}, 0x0) 04:09:42 executing program 1: r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f0000000000)="240199001e0025eaa87865f51ef6bce90a04000200bff20182a9000c080009000d000000", 0x24) 04:09:42 executing program 3: r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0x4}}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x30, r2, 0x805, 0x0, 0x0, {{0x1, 0x40030000000000}, 0x0, 0x6, 0x0, {0x14, 0x19, {0x0, 0xf000000}}}}, 0x30}}, 0x0) 04:09:42 executing program 2: syz_mount_image$hfs(&(0x7f00000000c0)='hfs\x00', &(0x7f0000000140)='./file0\x00', 0xffffff7f00000000, 0x0, 0x0, 0x0, &(0x7f0000000540)={[{@uid={'uid', 0x3d, 0xffffffffffffffff}}]}) 04:09:42 executing program 4: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x2001002, 0x0) r0 = syz_open_dev$admmidi(&(0x7f0000000100)='/dev/admmidi#\x00', 0x80, 0x20000) ioctl$PPPIOCGIDLE(r0, 0x8010743f, &(0x7f0000000140)) ioctl$TIOCGPTLCK(r0, 0x80045439, &(0x7f0000000280)) accept4$unix(r0, &(0x7f0000000200)=@abs, &(0x7f0000000080)=0x6e, 0x80800) mount$bpf(0x0, &(0x7f00000001c0)='./file0/file0\x00', 0x0, 0x44000, 0x0) 04:09:42 executing program 1: r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f0000000000)="240299001e0025eaa87865f51ef6bce90a04000200bff20182a9000c080009000d000000", 0x24) [ 713.701844][ T5733] hfs: invalid uid -1 [ 713.726962][ T5733] hfs: unable to parse mount options 04:09:42 executing program 3: r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0x4}}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x30, r2, 0x805, 0x0, 0x0, {{0x1, 0x40030000000000}, 0x0, 0x6, 0x0, {0x14, 0x19, {0x0, 0x2f020000}}}}, 0x30}}, 0x0) 04:09:42 executing program 0: r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0x4}}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x30, r2, 0x805, 0x0, 0x0, {{0x1, 0x40030000000000}, 0x0, 0x6, 0x0, {0x14, 0x19, {0x0, 0xf000000}}}}, 0x30}}, 0x0) 04:09:42 executing program 4: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x2001002, 0x0) mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x44000, 0x0) open(&(0x7f0000000100)='./file0/file0\x00', 0x10000, 0x20) 04:09:42 executing program 5: perf_event_open(&(0x7f0000000040)={0x1, 0x4c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x4000000000a, 0x3, 0x2) sendmsg$unix(r0, &(0x7f0000000900)={&(0x7f0000000180)=@abs, 0x6e, &(0x7f0000000040)=[{0x0}], 0x1}, 0x0) recvmmsg(r0, &(0x7f0000000240)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffde4}}], 0x627, 0x2, 0x0) 04:09:42 executing program 1: r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f0000000000)="240399001e0025eaa87865f51ef6bce90a04000200bff20182a9000c080009000d000000", 0x24) 04:09:42 executing program 2: syz_mount_image$hfs(&(0x7f00000000c0)='hfs\x00', &(0x7f0000000140)='./file0\x00', 0xffffffff00000000, 0x0, 0x0, 0x0, &(0x7f0000000540)={[{@uid={'uid', 0x3d, 0xffffffffffffffff}}]}) [ 714.230166][ T5749] hfs: invalid uid -1 04:09:43 executing program 1: r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f0000000000)="24009a001e0025eaa87865f51ef6bce90a04000200bff20182a9000c080009000d000000", 0x24) [ 714.268780][ T5749] hfs: unable to parse mount options 04:09:43 executing program 3: r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0x4}}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x30, r2, 0x805, 0x0, 0x0, {{0x1, 0x40030000000000}, 0x0, 0x6, 0x0, {0x14, 0x19, {0x0, 0x3f000000}}}}, 0x30}}, 0x0) 04:09:43 executing program 0: r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0x4}}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x30, r2, 0x805, 0x0, 0x0, {{0x1, 0x40030000000000}, 0x0, 0x6, 0x0, {0x14, 0x19, {0x0, 0x3f000000}}}}, 0x30}}, 0x0) 04:09:43 executing program 2: syz_mount_image$hfs(&(0x7f00000000c0)='hfs\x00', &(0x7f0000000140)='./file0\x00', 0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000540)={[{@uid={'uid', 0x3d, 0xffffffffffffffff}}]}) 04:09:43 executing program 4: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x2) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x2001002, 0x0) mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x44000, 0x0) r0 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000100)='/dev/cachefiles\x00', 0x4000, 0x0) getdents64(r0, &(0x7f00000001c0)=""/155, 0x9b) 04:09:43 executing program 1: r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f0000000000)="24019a001e0025eaa87865f51ef6bce90a04000200bff20182a9000c080009000d000000", 0x24) 04:09:43 executing program 3: r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0x4}}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x30, r2, 0x805, 0x0, 0x0, {{0x1, 0x40030000000000}, 0x0, 0x6, 0x0, {0x14, 0x19, {0x0, 0x40000000}}}}, 0x30}}, 0x0) [ 714.522221][ T5770] hfs: invalid uid -1 [ 714.540990][ T5770] hfs: unable to parse mount options 04:09:43 executing program 0: r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0x4}}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x30, r2, 0x805, 0x0, 0x0, {{0x1, 0x40030000000000}, 0x0, 0x6, 0x0, {0x14, 0x19, {0x0, 0x40000000}}}}, 0x30}}, 0x0) 04:09:43 executing program 2: syz_mount_image$hfs(&(0x7f00000000c0)='hfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2, 0x0, 0x0, &(0x7f0000000540)={[{@uid={'uid', 0x3d, 0xffffffffffffffff}}]}) 04:09:43 executing program 5: perf_event_open(&(0x7f0000000040)={0x1, 0x4c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x4000000000a, 0x3, 0x2) sendmsg$unix(r0, &(0x7f0000000900)={&(0x7f0000000180)=@abs, 0x6e, &(0x7f0000000040)=[{0x0}], 0x1}, 0x0) recvmmsg(r0, &(0x7f0000000240)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffde4}}], 0x627, 0x2, 0x0) 04:09:43 executing program 1: r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f0000000000)="24029a001e0025eaa87865f51ef6bce90a04000200bff20182a9000c080009000d000000", 0x24) 04:09:43 executing program 4: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) r0 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000240)='/dev/cachefiles\x00', 0x20a241, 0x0) mknodat(r0, &(0x7f0000000140)='./file0\x00', 0x101, 0x9) read$rfkill(r0, &(0x7f00000001c0), 0x8) mkdir(&(0x7f0000000100)='./file0/file0\x00', 0x100000016) setsockopt$RDS_GET_MR_FOR_DEST(r0, 0x114, 0x7, &(0x7f0000000300)={@generic={0x9, "25a4e728cb2624c0e5c0c95462f2da8118d7d3c42ab244a7d3c1a1db5a160bef016f16bbc86d70ff19e7da61ba05386f015f3e268125b0c7a6816742a62b06ebf34c481744e8148b24a2d047879ed268d5bb04e23494ca9d08ea732ce1f1ef5ec8cd8b912f2b58baba796bc1a4fc452390e592bad42d6c0a360adc30c86d"}, {&(0x7f0000000280)=""/93, 0x5d}, &(0x7f00000000c0), 0x44}, 0xa0) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x2001002, 0x0) mount$bpf(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x44010, 0x0) 04:09:43 executing program 3: r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0x4}}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x30, r2, 0x805, 0x0, 0x0, {{0x1, 0x40030000000000}, 0x0, 0x6, 0x0, {0x14, 0x19, {0x0, 0x48000000}}}}, 0x30}}, 0x0) 04:09:43 executing program 2: syz_mount_image$hfs(&(0x7f00000000c0)='hfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x3, 0x0, 0x0, &(0x7f0000000540)={[{@uid={'uid', 0x3d, 0xffffffffffffffff}}]}) 04:09:43 executing program 0: r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0x4}}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x30, r2, 0x805, 0x0, 0x0, {{0x1, 0x40030000000000}, 0x0, 0x6, 0x0, {0x14, 0x19, {0x0, 0x48000000}}}}, 0x30}}, 0x0) 04:09:44 executing program 1: r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f0000000000)="24039a001e0025eaa87865f51ef6bce90a04000200bff20182a9000c080009000d000000", 0x24) 04:09:44 executing program 3: r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0x4}}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x30, r2, 0x805, 0x0, 0x0, {{0x1, 0x40030000000000}, 0x0, 0x6, 0x0, {0x14, 0x19, {0x0, 0x4c000000}}}}, 0x30}}, 0x0) 04:09:44 executing program 0: r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0x4}}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x30, r2, 0x805, 0x0, 0x0, {{0x1, 0x40030000000000}, 0x0, 0x6, 0x0, {0x14, 0x19, {0x0, 0x4c000000}}}}, 0x30}}, 0x0) 04:09:44 executing program 2: syz_mount_image$hfs(&(0x7f00000000c0)='hfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x4, 0x0, 0x0, &(0x7f0000000540)={[{@uid={'uid', 0x3d, 0xffffffffffffffff}}]}) 04:09:44 executing program 1: r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f0000000000)="24009b001e0025eaa87865f51ef6bce90a04000200bff20182a9000c080009000d000000", 0x24) 04:09:44 executing program 4: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000240)='/proc/self/net/pfkey\x00', 0x800, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000280)={{{@in6=@remote, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@initdev}, 0x0, @in=@broadcast}}, &(0x7f0000000380)=0xe8) r2 = getegid() mount$fuseblk(&(0x7f0000000140)='/dev/loop0\x00', &(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='fuseblk\x00', 0x1010, &(0x7f0000000600)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0xa000}, 0x2c, {'user_id', 0x3d, r1}, 0x2c, {'group_id', 0x3d, r2}, 0x2c, {[{@allow_other='allow_other'}, {@default_permissions='default_permissions'}, {@max_read={'max_read', 0x3d, 0xc2}}, {@blksize={'blksize', 0x3d, 0x1800}}, {@allow_other='allow_other'}, {@max_read={'max_read', 0x3d, 0x2}}, {@default_permissions='default_permissions'}, {@blksize={'blksize', 0x3d, 0xe00}}, {@blksize={'blksize', 0x3d, 0xc00}}, {@default_permissions='default_permissions'}], [{@rootcontext={'rootcontext', 0x3d, 'system_u'}}, {@seclabel='seclabel'}, {@fsuuid={'fsuuid', 0x3d, {[0x35, 0x32, 0x65, 0x30, 0x37, 0x32, 0x4e16d987a0f9dc44, 0x63], 0x2d, [0x3f, 0x73, 0x33, 0x65], 0x2d, [0x62, 0x66, 0x30, 0x32], 0x2d, [0x31, 0x37, 0x77, 0x64], 0x2d, [0x32, 0x7f, 0x66, 0x3d88b531d40ea5a7, 0x37, 0x64, 0x65, 0x31]}}}, {@defcontext={'defcontext', 0x3d, 'system_u'}}, {@seclabel='seclabel'}]}}) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x2001002, 0x0) mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x44000, 0x0) umount2(&(0x7f00000005c0)='./file0\x00', 0x1db9c0bfac99e9b8) 04:09:44 executing program 5: perf_event_open(&(0x7f0000000040)={0x1, 0x4c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x4000000000a, 0x3, 0x2) sendmsg$unix(r0, &(0x7f0000000900)={&(0x7f0000000180)=@abs, 0x6e, &(0x7f0000000040)=[{&(0x7f0000001900)}], 0x1}, 0x0) recvmmsg(r0, &(0x7f0000000240)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffde4}}], 0x627, 0x2, 0x0) 04:09:44 executing program 0: r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0x4}}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x30, r2, 0x805, 0x0, 0x0, {{0x1, 0x40030000000000}, 0x0, 0x6, 0x0, {0x14, 0x19, {0x0, 0x60000000}}}}, 0x30}}, 0x0) 04:09:44 executing program 3: r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0x4}}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x30, r2, 0x805, 0x0, 0x0, {{0x1, 0x40030000000000}, 0x0, 0x6, 0x0, {0x14, 0x19, {0x0, 0x60000000}}}}, 0x30}}, 0x0) 04:09:44 executing program 2: syz_mount_image$hfs(&(0x7f00000000c0)='hfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x5, 0x0, 0x0, &(0x7f0000000540)={[{@uid={'uid', 0x3d, 0xffffffffffffffff}}]}) 04:09:44 executing program 1: r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f0000000000)="24019b001e0025eaa87865f51ef6bce90a04000200bff20182a9000c080009000d000000", 0x24) 04:09:44 executing program 4: r0 = syz_open_dev$sndpcmp(&(0x7f0000000100)='/dev/snd/pcmC#D#p\x00', 0x1, 0x840) fstat(r0, &(0x7f00000001c0)) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x2001002, 0x0) mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x44000, 0x0) 04:09:44 executing program 2: syz_mount_image$hfs(&(0x7f00000000c0)='hfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x6, 0x0, 0x0, &(0x7f0000000540)={[{@uid={'uid', 0x3d, 0xffffffffffffffff}}]}) 04:09:45 executing program 3: r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0x4}}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x30, r2, 0x805, 0x0, 0x0, {{0x1, 0x40030000000000}, 0x0, 0x6, 0x0, {0x14, 0x19, {0x0, 0x68000000}}}}, 0x30}}, 0x0) 04:09:45 executing program 1: r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f0000000000)="24029b001e0025eaa87865f51ef6bce90a04000200bff20182a9000c080009000d000000", 0x24) 04:09:45 executing program 0: r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0x4}}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x30, r2, 0x805, 0x0, 0x0, {{0x1, 0x40030000000000}, 0x0, 0x6, 0x0, {0x14, 0x19, {0x0, 0x68000000}}}}, 0x30}}, 0x0) 04:09:45 executing program 4: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) r0 = syz_open_dev$sndpcmc(&(0x7f0000000100)='/dev/snd/pcmC#D#c\x00', 0x3, 0x0) ioctl$VFIO_IOMMU_MAP_DMA(r0, 0x3b71, &(0x7f0000000140)={0x20, 0x2, 0x1, 0x20, 0x1}) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x2001002, 0x0) syz_mount_image$minix(&(0x7f00000001c0)='minix\x00', &(0x7f0000000200)='./file0/file0\x00', 0x77b9, 0x3, &(0x7f0000000340)=[{&(0x7f0000000240)="2754bee92491e999c2e719d787f93135fc5cc232dc428efb84e29a0fe671575935c44c76db017e2271cce864891c6d6f29d3f52d29ad1503e929927e20f80b67a9b043f69e87c91169ae2d1de0f279070a1c7492fe042fc8", 0x58}, {&(0x7f00000002c0)="b771cbde91859edc3d74da8217c798596fdfbeda9b5bec", 0x17, 0x5}, {&(0x7f0000000300)="e813edb975f878c4f77c95ce38a24884dd5c", 0x12, 0x841a}], 0x1840000, 0x0) mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x44000, 0x0) 04:09:45 executing program 2: syz_mount_image$hfs(&(0x7f00000000c0)='hfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x7, 0x0, 0x0, &(0x7f0000000540)={[{@uid={'uid', 0x3d, 0xffffffffffffffff}}]}) 04:09:45 executing program 1: r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f0000000000)="24039b001e0025eaa87865f51ef6bce90a04000200bff20182a9000c080009000d000000", 0x24) 04:09:45 executing program 3: r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0x4}}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x30, r2, 0x805, 0x0, 0x0, {{0x1, 0x40030000000000}, 0x0, 0x6, 0x0, {0x14, 0x19, {0x0, 0x6c000000}}}}, 0x30}}, 0x0) 04:09:45 executing program 4: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x10, 0x0) r0 = syz_open_dev$vbi(&(0x7f0000000100)='/dev/vbi#\x00', 0x0, 0x2) ioctl$VIDIOC_DBG_G_CHIP_INFO(r0, 0xc0c85666, &(0x7f00000001c0)={{0x3, @addr=0x5}, "e4e751fa645d7159af78785a21bbac80d1899e474fafdeb809e2c48e102f25a7", 0x2}) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x2001002, 0x0) mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x44000, 0x0) 04:09:45 executing program 0: r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0x4}}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x30, r2, 0x805, 0x0, 0x0, {{0x1, 0x40030000000000}, 0x0, 0x6, 0x0, {0x14, 0x19, {0x0, 0x6c000000}}}}, 0x30}}, 0x0) 04:09:45 executing program 5: perf_event_open(&(0x7f0000000040)={0x1, 0x4c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x4000000000a, 0x3, 0x2) sendmsg$unix(r0, &(0x7f0000000900)={&(0x7f0000000180)=@abs, 0x6e, &(0x7f0000000040)=[{&(0x7f0000001900)}], 0x1}, 0x0) recvmmsg(r0, &(0x7f0000000240)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffde4}}], 0x627, 0x2, 0x0) 04:09:45 executing program 2: syz_mount_image$hfs(&(0x7f00000000c0)='hfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x8, 0x0, 0x0, &(0x7f0000000540)={[{@uid={'uid', 0x3d, 0xffffffffffffffff}}]}) 04:09:45 executing program 4: mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f0000000200)='./file0/file0\x00', 0x10052) r0 = openat$vsock(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vsock\x00', 0x22000, 0x0) ioctl$SIOCNRDECOBS(r0, 0x89e2) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x2001002, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)) mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x44000, 0x0) getsockopt$netrom_NETROM_N2(0xffffffffffffffff, 0x103, 0x3, &(0x7f0000000140)=0x309ab977, &(0x7f00000001c0)=0x4) 04:09:45 executing program 0: r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0x4}}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x30, r2, 0x805, 0x0, 0x0, {{0x1, 0x40030000000000}, 0x0, 0x6, 0x0, {0x14, 0x19, {0x0, 0x74000000}}}}, 0x30}}, 0x0) 04:09:45 executing program 2: syz_mount_image$hfs(&(0x7f00000000c0)='hfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x9, 0x0, 0x0, &(0x7f0000000540)={[{@uid={'uid', 0x3d, 0xffffffffffffffff}}]}) 04:09:45 executing program 3: r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0x4}}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x30, r2, 0x805, 0x0, 0x0, {{0x1, 0x40030000000000}, 0x0, 0x6, 0x0, {0x14, 0x19, {0x0, 0x74000000}}}}, 0x30}}, 0x0) 04:09:45 executing program 1: r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f0000000000)="24009c001e0025eaa87865f51ef6bce90a04000200bff20182a9000c080009000d000000", 0x24) 04:09:46 executing program 2: syz_mount_image$hfs(&(0x7f00000000c0)='hfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0xa, 0x0, 0x0, &(0x7f0000000540)={[{@uid={'uid', 0x3d, 0xffffffffffffffff}}]}) 04:09:46 executing program 4: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f0000000100)='./file0/file0\x00', 0x40) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x2001002, 0x0) mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x44000, 0x0) 04:09:46 executing program 0: r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0x4}}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x30, r2, 0x805, 0x0, 0x0, {{0x1, 0x40030000000000}, 0x0, 0x6, 0x0, {0x14, 0x19, {0x0, 0x7a000000}}}}, 0x30}}, 0x0) 04:09:46 executing program 1: r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f0000000000)="24019c001e0025eaa87865f51ef6bce90a04000200bff20182a9000c080009000d000000", 0x24) 04:09:46 executing program 5: perf_event_open(&(0x7f0000000040)={0x1, 0x4c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x4000000000a, 0x3, 0x2) sendmsg$unix(r0, &(0x7f0000000900)={&(0x7f0000000180)=@abs, 0x6e, &(0x7f0000000040)=[{&(0x7f0000001900)}], 0x1}, 0x0) recvmmsg(r0, &(0x7f0000000240)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffde4}}], 0x627, 0x2, 0x0) 04:09:46 executing program 3: r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0x4}}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x30, r2, 0x805, 0x0, 0x0, {{0x1, 0x40030000000000}, 0x0, 0x6, 0x0, {0x14, 0x19, {0x0, 0x7a000000}}}}, 0x30}}, 0x0) 04:09:46 executing program 2: syz_mount_image$hfs(&(0x7f00000000c0)='hfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0xb, 0x0, 0x0, &(0x7f0000000540)={[{@uid={'uid', 0x3d, 0xffffffffffffffff}}]}) 04:09:46 executing program 1: r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f0000000000)="24029c001e0025eaa87865f51ef6bce90a04000200bff20182a9000c080009000d000000", 0x24) 04:09:46 executing program 0: r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0x4}}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x30, r2, 0x805, 0x0, 0x0, {{0x1, 0x40030000000000}, 0x0, 0x6, 0x0, {0x14, 0x19, {0x0, 0x87020000}}}}, 0x30}}, 0x0) 04:09:46 executing program 4: r0 = socket$kcm(0xa, 0x6, 0x0) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000080)) 04:09:46 executing program 2: syz_mount_image$hfs(&(0x7f00000000c0)='hfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x10, 0x0, 0x0, &(0x7f0000000540)={[{@uid={'uid', 0x3d, 0xffffffffffffffff}}]}) 04:09:46 executing program 4: sched_setaffinity(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x2, 0x70, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22, 0x0, @empty}, 0x1c) 04:09:46 executing program 1: r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f0000000000)="24039c001e0025eaa87865f51ef6bce90a04000200bff20182a9000c080009000d000000", 0x24) 04:09:46 executing program 0: r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0x4}}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x30, r2, 0x805, 0x0, 0x0, {{0x1, 0x40030000000000}, 0x0, 0x6, 0x0, {0x14, 0x19, {0x0, 0x9effffff}}}}, 0x30}}, 0x0) 04:09:46 executing program 3: r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0x4}}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x30, r2, 0x805, 0x0, 0x0, {{0x1, 0x40030000000000}, 0x0, 0x6, 0x0, {0x14, 0x19, {0x0, 0x9effffff}}}}, 0x30}}, 0x0) [ 718.135396][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 04:09:47 executing program 1: r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f0000000000)="24009d001e0025eaa87865f51ef6bce90a04000200bff20182a9000c080009000d000000", 0x24) 04:09:47 executing program 5: perf_event_open(&(0x7f0000000040)={0x1, 0x4c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x4000000000a, 0x3, 0x2) sendmsg$unix(r0, &(0x7f0000000900)={&(0x7f0000000180)=@abs, 0x6e, &(0x7f0000000040)=[{&(0x7f0000001900)="83", 0x1}], 0x1}, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000000240)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffde4}}], 0x627, 0x2, 0x0) 04:09:47 executing program 3: r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0x4}}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x30, r2, 0x805, 0x0, 0x0, {{0x1, 0x40030000000000}, 0x0, 0x6, 0x0, {0x14, 0x19, {0x0, 0xa1ffffff}}}}, 0x30}}, 0x0) 04:09:47 executing program 0: r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0x4}}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x30, r2, 0x805, 0x0, 0x0, {{0x1, 0x40030000000000}, 0x0, 0x6, 0x0, {0x14, 0x19, {0x0, 0xa1ffffff}}}}, 0x30}}, 0x0) 04:09:47 executing program 2: syz_mount_image$hfs(&(0x7f00000000c0)='hfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x48, 0x0, 0x0, &(0x7f0000000540)={[{@uid={'uid', 0x3d, 0xffffffffffffffff}}]}) 04:09:47 executing program 4: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount$fuseblk(&(0x7f0000000080)='/dev/loop0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000200)='fuseblk\x00', 0x0, 0x0) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe) 04:09:47 executing program 1: r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f0000000000)="24019d001e0025eaa87865f51ef6bce90a04000200bff20182a9000c080009000d000000", 0x24) 04:09:47 executing program 2: syz_mount_image$hfs(&(0x7f00000000c0)='hfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x4c, 0x0, 0x0, &(0x7f0000000540)={[{@uid={'uid', 0x3d, 0xffffffffffffffff}}]}) 04:09:47 executing program 5: perf_event_open(&(0x7f0000000040)={0x1, 0x4c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x4000000000a, 0x3, 0x2) sendmsg$unix(r0, &(0x7f0000000900)={&(0x7f0000000180)=@abs, 0x6e, &(0x7f0000000040)=[{&(0x7f0000001900)="83", 0x1}], 0x1}, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000000240)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffde4}}], 0x627, 0x2, 0x0) 04:09:47 executing program 4: r0 = socket$inet(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000900)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="4c0000001200ff09fffefd956fa283b724a6008000000000000000683540150e04001d001fc41180b598bc593ab6821148a730de33a49868c62b2ca654a6613b6aabf35d0f1cbc882b079881", 0x4c}], 0x1}, 0x0) recvmmsg(r0, &(0x7f0000004cc0)=[{{0x0, 0x0, &(0x7f0000000640)=[{&(0x7f0000000100)=""/208, 0xd0}, {&(0x7f00000002c0)=""/145, 0x91}, {&(0x7f0000000380)=""/234, 0xea}, {&(0x7f0000000480)=""/92, 0x5c}, {&(0x7f0000000940)=""/4096, 0x1000}, {&(0x7f0000000500)=""/131, 0x83}, {&(0x7f00000005c0)=""/78, 0x4e}], 0x7}}, {{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0}}], 0x3, 0x0, 0x0) 04:09:47 executing program 1: r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f0000000000)="24029d001e0025eaa87865f51ef6bce90a04000200bff20182a9000c080009000d000000", 0x24) 04:09:47 executing program 0: r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0x4}}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x30, r2, 0x805, 0x0, 0x0, {{0x1, 0x40030000000000}, 0x0, 0x6, 0x0, {0x14, 0x19, {0x0, 0xeaffffff}}}}, 0x30}}, 0x0) 04:09:47 executing program 3: r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0x4}}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x30, r2, 0x805, 0x0, 0x0, {{0x1, 0x40030000000000}, 0x0, 0x6, 0x0, {0x14, 0x19, {0x0, 0xeaffffff}}}}, 0x30}}, 0x0) 04:09:47 executing program 2: syz_mount_image$hfs(&(0x7f00000000c0)='hfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x60, 0x0, 0x0, &(0x7f0000000540)={[{@uid={'uid', 0x3d, 0xffffffffffffffff}}]}) [ 719.094397][ T5990] netlink: 'syz-executor.4': attribute type 29 has an invalid length. 04:09:47 executing program 3: r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0x4}}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x30, r2, 0x805, 0x0, 0x0, {{0x1, 0x40030000000000}, 0x0, 0x6, 0x0, {0x14, 0x19, {0x0, 0xf0ffffff}}}}, 0x30}}, 0x0) 04:09:48 executing program 5: perf_event_open(&(0x7f0000000040)={0x1, 0x4c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x4000000000a, 0x3, 0x2) sendmsg$unix(r0, &(0x7f0000000900)={&(0x7f0000000180)=@abs, 0x6e, &(0x7f0000000040)=[{&(0x7f0000001900)="83", 0x1}], 0x1}, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000000240)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffde4}}], 0x627, 0x2, 0x0) 04:09:48 executing program 1: r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f0000000000)="24039d001e0025eaa87865f51ef6bce90a04000200bff20182a9000c080009000d000000", 0x24) 04:09:48 executing program 0: r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0x4}}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x30, r2, 0x805, 0x0, 0x0, {{0x1, 0x40030000000000}, 0x0, 0x6, 0x0, {0x14, 0x19, {0x0, 0xf0ffffff}}}}, 0x30}}, 0x0) [ 719.221345][ T5990] netlink: 'syz-executor.4': attribute type 29 has an invalid length. 04:09:48 executing program 2: syz_mount_image$hfs(&(0x7f00000000c0)='hfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x68, 0x0, 0x0, &(0x7f0000000540)={[{@uid={'uid', 0x3d, 0xffffffffffffffff}}]}) [ 719.277385][ T5994] netlink: 'syz-executor.4': attribute type 29 has an invalid length. 04:09:48 executing program 3: r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0x4}}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x30, r2, 0x805, 0x0, 0x0, {{0x1, 0x40030000000000}, 0x0, 0x6, 0x0, {0x14, 0x19, {0x0, 0xfcffffff}}}}, 0x30}}, 0x0) 04:09:48 executing program 5: perf_event_open(&(0x7f0000000040)={0x1, 0x4c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x4000000000a, 0x3, 0x2) sendmsg$unix(r0, &(0x7f0000000900)={&(0x7f0000000180)=@abs, 0x6e, &(0x7f0000000040)=[{&(0x7f0000001900)="83", 0x1}], 0x1}, 0x0) recvmmsg(r0, 0x0, 0x0, 0x2, 0x0) [ 719.344003][ T5994] netlink: 'syz-executor.4': attribute type 29 has an invalid length. [ 719.363479][ T5994] netlink: 'syz-executor.4': attribute type 29 has an invalid length. [ 719.435886][ T5990] netlink: 'syz-executor.4': attribute type 29 has an invalid length. [ 719.476828][ T5990] netlink: 'syz-executor.4': attribute type 29 has an invalid length. 04:09:48 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000007000)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(crc32c-generic)\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) recvmmsg(r1, &(0x7f0000004740)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) 04:09:48 executing program 1: r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f0000000000)="24009e001e0025eaa87865f51ef6bce90a04000200bff20182a9000c080009000d000000", 0x24) 04:09:48 executing program 0: r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0x4}}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x30, r2, 0x805, 0x0, 0x0, {{0x1, 0x40030000000000}, 0x0, 0x6, 0x0, {0x14, 0x19, {0x0, 0xfcffffff}}}}, 0x30}}, 0x0) 04:09:48 executing program 2: syz_mount_image$hfs(&(0x7f00000000c0)='hfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x6c, 0x0, 0x0, &(0x7f0000000540)={[{@uid={'uid', 0x3d, 0xffffffffffffffff}}]}) 04:09:48 executing program 5: perf_event_open(&(0x7f0000000040)={0x1, 0x4c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x4000000000a, 0x3, 0x2) sendmsg$unix(r0, &(0x7f0000000900)={&(0x7f0000000180)=@abs, 0x6e, &(0x7f0000000040)=[{&(0x7f0000001900)="83", 0x1}], 0x1}, 0x0) recvmmsg(r0, 0x0, 0x0, 0x2, 0x0) 04:09:48 executing program 3: r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0x4}}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x30, r2, 0x805, 0x0, 0x0, {{0x1, 0x40030000000000}, 0x0, 0x6, 0x0, {0x14, 0x19, {0x0, 0xfffff000}}}}, 0x30}}, 0x0) 04:09:48 executing program 1: r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f0000000000)="24019e001e0025eaa87865f51ef6bce90a04000200bff20182a9000c080009000d000000", 0x24) 04:09:48 executing program 2: syz_mount_image$hfs(&(0x7f00000000c0)='hfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x74, 0x0, 0x0, &(0x7f0000000540)={[{@uid={'uid', 0x3d, 0xffffffffffffffff}}]}) 04:09:48 executing program 0: r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0x4}}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x30, r2, 0x805, 0x0, 0x0, {{0x1, 0x40030000000000}, 0x0, 0x6, 0x0, {0x14, 0x19, {0x0, 0xfffff000}}}}, 0x30}}, 0x0) 04:09:48 executing program 5: perf_event_open(&(0x7f0000000040)={0x1, 0x4c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x4000000000a, 0x3, 0x2) sendmsg$unix(r0, &(0x7f0000000900)={&(0x7f0000000180)=@abs, 0x6e, &(0x7f0000000040)=[{&(0x7f0000001900)="83", 0x1}], 0x1}, 0x0) recvmmsg(r0, 0x0, 0x0, 0x2, 0x0) 04:09:48 executing program 3: r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0x4}}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x30, r2, 0x805, 0x0, 0x0, {{0x1, 0x40030000000000}, 0x0, 0x6, 0x0, {0x14, 0x19, {0x0, 0xffffff7f}}}}, 0x30}}, 0x0) 04:09:48 executing program 1: r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f0000000000)="24029e001e0025eaa87865f51ef6bce90a04000200bff20182a9000c080009000d000000", 0x24) 04:09:48 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'aegis128-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)=[@assoc={0x18, 0x117, 0x4, 0xd4e5}, @op={0x18, 0x117, 0x3, 0x1}], 0x30}, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f0000007e00)=[{{&(0x7f0000001240)=@alg, 0x80, &(0x7f0000004700)=[{&(0x7f00000012c0)=""/167, 0xf}, {&(0x7f00000023c0)=""/49, 0x200023f1}, {&(0x7f0000003580)=""/4096, 0x1000}], 0x3, &(0x7f0000004780)=""/245, 0xf5}}], 0x30, 0x0, &(0x7f0000008000)={0x0, 0x989680}) 04:09:48 executing program 2: syz_mount_image$hfs(&(0x7f00000000c0)='hfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x7a, 0x0, 0x0, &(0x7f0000000540)={[{@uid={'uid', 0x3d, 0xffffffffffffffff}}]}) 04:09:48 executing program 0: r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0x4}}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x30, r2, 0x805, 0x0, 0x0, {{0x1, 0x40030000000000}, 0x0, 0x6, 0x0, {0x14, 0x19, {0x0, 0xffffff7f}}}}, 0x30}}, 0x0) 04:09:48 executing program 5: perf_event_open(&(0x7f0000000040)={0x1, 0x4c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x4000000000a, 0x3, 0x2) sendmsg$unix(r0, &(0x7f0000000900)={&(0x7f0000000180)=@abs, 0x6e, &(0x7f0000000040)=[{&(0x7f0000001900)="83", 0x1}], 0x1}, 0x0) recvmmsg(r0, &(0x7f0000000240), 0x0, 0x2, 0x0) 04:09:48 executing program 3: r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0x4}}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x30, r2, 0x805, 0x0, 0x0, {{0x1, 0x40030000000000}, 0x0, 0x6, 0x0, {0x14, 0x19, {0x0, 0xffffff9e}}}}, 0x30}}, 0x0) 04:09:48 executing program 2: syz_mount_image$hfs(&(0x7f00000000c0)='hfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x300, 0x0, 0x0, &(0x7f0000000540)={[{@uid={'uid', 0x3d, 0xffffffffffffffff}}]}) 04:09:48 executing program 0: r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0x4}}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x30, r2, 0x805, 0x0, 0x0, {{0x1, 0x40030000000000}, 0x0, 0x6, 0x0, {0x14, 0x19, {0x0, 0xffffff9e}}}}, 0x30}}, 0x0) 04:09:48 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") ioctl$sock_SIOCGSKNS(r0, 0x894c, 0x0) 04:09:49 executing program 1: r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f0000000000)="24039e001e0025eaa87865f51ef6bce90a04000200bff20182a9000c080009000d000000", 0x24) 04:09:49 executing program 5: perf_event_open(&(0x7f0000000040)={0x1, 0x4c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x4000000000a, 0x3, 0x2) sendmsg$unix(r0, &(0x7f0000000900)={&(0x7f0000000180)=@abs, 0x6e, &(0x7f0000000040)=[{&(0x7f0000001900)="83", 0x1}], 0x1}, 0x0) recvmmsg(r0, &(0x7f0000000240), 0x0, 0x2, 0x0) 04:09:49 executing program 3: r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0x4}}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x30, r2, 0x805, 0x0, 0x0, {{0x1, 0x40030000000000}, 0x0, 0x6, 0x0, {0x14, 0x19, {0x0, 0xffffffa1}}}}, 0x30}}, 0x0) 04:09:49 executing program 2: syz_mount_image$hfs(&(0x7f00000000c0)='hfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x500, 0x0, 0x0, &(0x7f0000000540)={[{@uid={'uid', 0x3d, 0xffffffffffffffff}}]}) 04:09:49 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") fcntl$F_GET_RW_HINT(r0, 0x40b, &(0x7f00000000c0)) 04:09:49 executing program 1: r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f0000000000)="24009f001e0025eaa87865f51ef6bce90a04000200bff20182a9000c080009000d000000", 0x24) 04:09:49 executing program 0: r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0x4}}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x30, r2, 0x805, 0x0, 0x0, {{0x1, 0x40030000000000}, 0x0, 0x6, 0x0, {0x14, 0x19, {0x0, 0xffffffa1}}}}, 0x30}}, 0x0) 04:09:49 executing program 5: perf_event_open(&(0x7f0000000040)={0x1, 0x4c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x4000000000a, 0x3, 0x2) sendmsg$unix(r0, &(0x7f0000000900)={&(0x7f0000000180)=@abs, 0x6e, &(0x7f0000000040)=[{&(0x7f0000001900)="83", 0x1}], 0x1}, 0x0) recvmmsg(r0, &(0x7f0000000240), 0x0, 0x2, 0x0) 04:09:49 executing program 3: r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0x4}}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x30, r2, 0x805, 0x0, 0x0, {{0x1, 0x40030000000000}, 0x0, 0x6, 0x0, {0x14, 0x19, {0x0, 0xffffffea}}}}, 0x30}}, 0x0) 04:09:49 executing program 2: syz_mount_image$hfs(&(0x7f00000000c0)='hfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x600, 0x0, 0x0, &(0x7f0000000540)={[{@uid={'uid', 0x3d, 0xffffffffffffffff}}]}) 04:09:49 executing program 1: r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f0000000000)="24019f001e0025eaa87865f51ef6bce90a04000200bff20182a9000c080009000d000000", 0x24) 04:09:49 executing program 0: r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0x4}}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x30, r2, 0x805, 0x0, 0x0, {{0x1, 0x40030000000000}, 0x0, 0x6, 0x0, {0x14, 0x19, {0x0, 0xffffffea}}}}, 0x30}}, 0x0) 04:09:49 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000100)={0x26, 'aead\x00', 0x0, 0x0, 'aegis128l-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000013c0)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) syz_open_dev$midi(&(0x7f0000000000)='/dev/midi#\x00', 0x1, 0x101000) recvmmsg(r1, &(0x7f0000007e00)=[{{&(0x7f0000001240)=@alg, 0x80, &(0x7f0000004700)=[{&(0x7f00000012c0)=""/167, 0x95c8}, {&(0x7f00000023c0)=""/49, 0x200023f1}, {&(0x7f0000003580)=""/4096, 0x2c0}], 0x3, &(0x7f0000004780)=""/245, 0xf5}}], 0x30, 0x0, &(0x7f0000008000)={0x0, 0x989680}) 04:09:49 executing program 5: perf_event_open(&(0x7f0000000040)={0x1, 0x4c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x4000000000a, 0x3, 0x2) sendmsg$unix(r0, &(0x7f0000000900)={&(0x7f0000000180)=@abs, 0x6e, &(0x7f0000000040)=[{&(0x7f0000001900)="83", 0x1}], 0x1}, 0x0) recvmmsg(r0, &(0x7f0000000240)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffde4}}], 0x627, 0x0, 0x0) 04:09:49 executing program 3: r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0x4}}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x30, r2, 0x805, 0x0, 0x0, {{0x1, 0x40030000000000}, 0x0, 0x6, 0x0, {0x14, 0x19, {0x0, 0xfffffff0}}}}, 0x30}}, 0x0) 04:09:49 executing program 2: syz_mount_image$hfs(&(0x7f00000000c0)='hfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x700, 0x0, 0x0, &(0x7f0000000540)={[{@uid={'uid', 0x3d, 0xffffffffffffffff}}]}) 04:09:49 executing program 1: r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f0000000000)="24029f001e0025eaa87865f51ef6bce90a04000200bff20182a9000c080009000d000000", 0x24) 04:09:49 executing program 3: r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0x4}}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x30, r2, 0x805, 0x0, 0x0, {{0x1, 0x40030000000000}, 0x0, 0x6, 0x0, {0x14, 0x19, {0x0, 0xfffffffc}}}}, 0x30}}, 0x0) 04:09:49 executing program 0: r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0x4}}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x30, r2, 0x805, 0x0, 0x0, {{0x1, 0x40030000000000}, 0x0, 0x6, 0x0, {0x14, 0x19, {0x0, 0xfffffff0}}}}, 0x30}}, 0x0) 04:09:49 executing program 4: r0 = socket$inet(0x2, 0x8000a, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0x0) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000000)='vxcan1\x00', 0xf) 04:09:49 executing program 2: syz_mount_image$hfs(&(0x7f00000000c0)='hfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x900, 0x0, 0x0, &(0x7f0000000540)={[{@uid={'uid', 0x3d, 0xffffffffffffffff}}]}) 04:09:49 executing program 0: r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0x4}}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x30, r2, 0x805, 0x0, 0x0, {{0x1, 0x40030000000000}, 0x0, 0x6, 0x0, {0x14, 0x19, {0x0, 0xfffffffc}}}}, 0x30}}, 0x0) 04:09:49 executing program 3: r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0x4}}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x30, r2, 0x805, 0x0, 0x0, {{0x1, 0x40030000000000}, 0x0, 0x6, 0x0, {0x14, 0x19, {0x0, 0x1000000000000}}}}, 0x30}}, 0x0) 04:09:49 executing program 1: r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f0000000000)="24039f001e0025eaa87865f51ef6bce90a04000200bff20182a9000c080009000d000000", 0x24) 04:09:49 executing program 4: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x3, 0x0) ioctl$LOOP_SET_BLOCK_SIZE(r0, 0x4c08, 0x0) 04:09:50 executing program 5: perf_event_open(&(0x7f0000000040)={0x1, 0x4c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x4000000000a, 0x3, 0x2) sendmsg$unix(r0, &(0x7f0000000900)={&(0x7f0000000180)=@abs, 0x6e, &(0x7f0000000040)=[{&(0x7f0000001900)="83", 0x1}], 0x1}, 0x0) recvmmsg(r0, &(0x7f0000000240)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffde4}}], 0x627, 0x0, 0x0) 04:09:50 executing program 2: syz_mount_image$hfs(&(0x7f00000000c0)='hfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0xa00, 0x0, 0x0, &(0x7f0000000540)={[{@uid={'uid', 0x3d, 0xffffffffffffffff}}]}) 04:09:50 executing program 3: r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0x4}}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x30, r2, 0x805, 0x0, 0x0, {{0x1, 0x40030000000000}, 0x0, 0x6, 0x0, {0x14, 0x19, {0x0, 0x3000000000000}}}}, 0x30}}, 0x0) 04:09:50 executing program 4: r0 = socket$inet(0x2, 0x3, 0x2) setsockopt$MISDN_TIME_STAMP(r0, 0x0, 0x1, 0x0, 0x0) 04:09:50 executing program 0: r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0x4}}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x30, r2, 0x805, 0x0, 0x0, {{0x1, 0x40030000000000}, 0x0, 0x6, 0x0, {0x14, 0x19, {0x0, 0x1000000000000}}}}, 0x30}}, 0x0) 04:09:50 executing program 1: r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f0000000000)="2400a0001e0025eaa87865f51ef6bce90a04000200bff20182a9000c080009000d000000", 0x24) 04:09:50 executing program 4: sysinfo(&(0x7f0000000040)=""/22) sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000001000)}, 0x0) r0 = socket$inet(0x10, 0x2, 0x0) fstat(r0, 0x0) ioctl$CAPI_INSTALLED(r0, 0x80024322) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_ifreq(r0, 0x89f1, &(0x7f0000000180)={'ip6_vti0\x00\x14\xea:\x01\x00\xeb\x00', @ifru_flags=0xc}) 04:09:50 executing program 0: r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0x4}}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x30, r2, 0x805, 0x0, 0x0, {{0x1, 0x40030000000000}, 0x0, 0x6, 0x0, {0x14, 0x19, {0x0, 0x3000000000000}}}}, 0x30}}, 0x0) 04:09:50 executing program 2: syz_mount_image$hfs(&(0x7f00000000c0)='hfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0xb00, 0x0, 0x0, &(0x7f0000000540)={[{@uid={'uid', 0x3d, 0xffffffffffffffff}}]}) 04:09:50 executing program 3: r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0x4}}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x30, r2, 0x805, 0x0, 0x0, {{0x1, 0x40030000000000}, 0x0, 0x6, 0x0, {0x14, 0x19, {0x0, 0x40030000000000}}}}, 0x30}}, 0x0) 04:09:50 executing program 1: r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f0000000000)="2401a0001e0025eaa87865f51ef6bce90a04000200bff20182a9000c080009000d000000", 0x24) 04:09:50 executing program 3: r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0x4}}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x30, r2, 0x805, 0x0, 0x0, {{0x1, 0x40030000000000}, 0x0, 0x6, 0x0, {0x14, 0x19, {0x0, 0xf0ffffffffffff}}}}, 0x30}}, 0x0) 04:09:51 executing program 5: perf_event_open(&(0x7f0000000040)={0x1, 0x4c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x4000000000a, 0x3, 0x2) sendmsg$unix(r0, &(0x7f0000000900)={&(0x7f0000000180)=@abs, 0x6e, &(0x7f0000000040)=[{&(0x7f0000001900)="83", 0x1}], 0x1}, 0x0) recvmmsg(r0, &(0x7f0000000240)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffde4}}], 0x627, 0x0, 0x0) 04:09:51 executing program 1: r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f0000000000)="2402a0001e0025eaa87865f51ef6bce90a04000200bff20182a9000c080009000d000000", 0x24) 04:09:51 executing program 0: r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0x4}}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x30, r2, 0x805, 0x0, 0x0, {{0x1, 0x40030000000000}, 0x0, 0x6, 0x0, {0x14, 0x19, {0x0, 0x40030000000000}}}}, 0x30}}, 0x0) 04:09:51 executing program 4: r0 = socket$inet(0x2, 0x3, 0x2) ioctl$sock_inet_sctp_SIOCINQ(r0, 0x541b, &(0x7f0000000040)) 04:09:51 executing program 2: syz_mount_image$hfs(&(0x7f00000000c0)='hfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x1020, 0x0, 0x0, &(0x7f0000000540)={[{@uid={'uid', 0x3d, 0xffffffffffffffff}}]}) 04:09:51 executing program 3: r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0x4}}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x30, r2, 0x805, 0x0, 0x0, {{0x1, 0x40030000000000}, 0x0, 0x6, 0x0, {0x14, 0x19, {0x0, 0x100000000000000}}}}, 0x30}}, 0x0) 04:09:51 executing program 4: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x6, 0x2, 0x0, 0xe5}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000140)='bbr\x00\x15\xfc\xbfbn\xa5\xc0\xa6\xcd\f\xf7b\xe6\x9ea\n\xcd\xa1\xd5\x1a\xfbl\x95\x7f\xa6N\xd5\x0e\x8b\xe0\xd3\x88\x1e\x93\x8d', 0x27) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000600)=0xda9, 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x200}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(r0, 0x84, 0x7b, &(0x7f0000000000)={0x0, 0xca9}, &(0x7f0000000180)=0x8) r1 = openat$vga_arbiter(0xffffffffffffff9c, 0x0, 0x400c0, 0x0) getsockopt$inet6_mtu(r1, 0x29, 0x17, &(0x7f0000000040), 0x0) getsockopt$inet_tcp_buf(r1, 0x6, 0x0, 0x0, 0x0) semget$private(0x0, 0x0, 0x0) ioctl$SCSI_IOCTL_START_UNIT(r1, 0x5) sendfile(r0, r0, &(0x7f0000000100), 0x8) sendto$inet(r0, &(0x7f00000012c0)="20268a927f1f6588b967481241ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf9221a7513bf746bec66ba", 0xfe6a, 0xe, 0x0, 0x27) 04:09:51 executing program 3: r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0x4}}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x30, r2, 0x805, 0x0, 0x0, {{0x1, 0x40030000000000}, 0x0, 0x6, 0x0, {0x14, 0x19, {0x0, 0x200000000000000}}}}, 0x30}}, 0x0) 04:09:51 executing program 0: r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0x4}}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x30, r2, 0x805, 0x0, 0x0, {{0x1, 0x40030000000000}, 0x0, 0x6, 0x0, {0x14, 0x19, {0x0, 0xf0ffffffffffff}}}}, 0x30}}, 0x0) 04:09:51 executing program 2: syz_mount_image$hfs(&(0x7f00000000c0)='hfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2000, 0x0, 0x0, &(0x7f0000000540)={[{@uid={'uid', 0x3d, 0xffffffffffffffff}}]}) 04:09:51 executing program 1: r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f0000000000)="2403a0001e0025eaa87865f51ef6bce90a04000200bff20182a9000c080009000d000000", 0x24) 04:09:51 executing program 2: syz_mount_image$hfs(&(0x7f00000000c0)='hfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2010, 0x0, 0x0, &(0x7f0000000540)={[{@uid={'uid', 0x3d, 0xffffffffffffffff}}]}) 04:09:52 executing program 2: syz_mount_image$hfs(&(0x7f00000000c0)='hfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x3f00, 0x0, 0x0, &(0x7f0000000540)={[{@uid={'uid', 0x3d, 0xffffffffffffffff}}]}) 04:09:52 executing program 3: r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0x4}}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x30, r2, 0x805, 0x0, 0x0, {{0x1, 0x40030000000000}, 0x0, 0x6, 0x0, {0x14, 0x19, {0x0, 0x300000000000000}}}}, 0x30}}, 0x0) 04:09:52 executing program 1: r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f0000000000)="2400a1001e0025eaa87865f51ef6bce90a04000200bff20182a9000c080009000d000000", 0x24) 04:09:52 executing program 0: r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0x4}}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x30, r2, 0x805, 0x0, 0x0, {{0x1, 0x40030000000000}, 0x0, 0x6, 0x0, {0x14, 0x19, {0x0, 0x100000000000000}}}}, 0x30}}, 0x0) 04:09:52 executing program 5: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x0, 0x0) close(r0) openat$rtc(0xffffffffffffff9c, &(0x7f0000001100)='/dev/rtc0\x00', 0x0, 0x0) ioctl$RTC_SET_TIME(r0, 0x80247009, 0x0) 04:09:52 executing program 1: r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f0000000000)="2401a1001e0025eaa87865f51ef6bce90a04000200bff20182a9000c080009000d000000", 0x24) 04:09:52 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_GET_IRQCHIP(r1, 0xc208ae62, &(0x7f0000000000)={0x0, 0x0, @ioapic}) 04:09:52 executing program 2: syz_mount_image$hfs(&(0x7f00000000c0)='hfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x4000, 0x0, 0x0, &(0x7f0000000540)={[{@uid={'uid', 0x3d, 0xffffffffffffffff}}]}) 04:09:52 executing program 0: r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0x4}}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x30, r2, 0x805, 0x0, 0x0, {{0x1, 0x40030000000000}, 0x0, 0x6, 0x0, {0x14, 0x19, {0x0, 0x200000000000000}}}}, 0x30}}, 0x0) 04:09:52 executing program 3: r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0x4}}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x30, r2, 0x805, 0x0, 0x0, {{0x1, 0x40030000000000}, 0x0, 0x6, 0x0, {0x14, 0x19, {0x0, 0x400000000000000}}}}, 0x30}}, 0x0) 04:09:52 executing program 5: r0 = socket$inet(0x2b, 0x801, 0x0) connect$inet(r0, &(0x7f0000000040)={0x2, 0x0, @rand_addr=0x7ff}, 0x10) 04:09:52 executing program 2: syz_mount_image$hfs(&(0x7f00000000c0)='hfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x4800, 0x0, 0x0, &(0x7f0000000540)={[{@uid={'uid', 0x3d, 0xffffffffffffffff}}]}) 04:09:52 executing program 1: r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f0000000000)="2402a1001e0025eaa87865f51ef6bce90a04000200bff20182a9000c080009000d000000", 0x24) 04:09:52 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000100)={0x26, 'aead\x00', 0x0, 0x0, 'aegis128l-generic\x00'}, 0x58) accept$alg(r0, 0x0, 0x0) 04:09:52 executing program 3: r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0x4}}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x30, r2, 0x805, 0x0, 0x0, {{0x1, 0x40030000000000}, 0x0, 0x6, 0x0, {0x14, 0x19, {0x0, 0x500000000000000}}}}, 0x30}}, 0x0) 04:09:52 executing program 5: r0 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000080)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$clear(0x7, r0) 04:09:52 executing program 0: r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0x4}}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x30, r2, 0x805, 0x0, 0x0, {{0x1, 0x40030000000000}, 0x0, 0x6, 0x0, {0x14, 0x19, {0x0, 0x300000000000000}}}}, 0x30}}, 0x0) 04:09:52 executing program 2: syz_mount_image$hfs(&(0x7f00000000c0)='hfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x4c00, 0x0, 0x0, &(0x7f0000000540)={[{@uid={'uid', 0x3d, 0xffffffffffffffff}}]}) 04:09:52 executing program 1: r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f0000000000)="2403a1001e0025eaa87865f51ef6bce90a04000200bff20182a9000c080009000d000000", 0x24) 04:09:52 executing program 5: perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x80002, 0x0) recvmmsg(r0, &(0x7f0000003b40)=[{{0x0, 0x1b2, 0x0}}], 0x300, 0x0, 0x0) setsockopt$sock_int(r0, 0x1, 0x2e, &(0x7f0000000200)=0x6, 0x4) shutdown(r0, 0x0) 04:09:52 executing program 0: r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0x4}}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x30, r2, 0x805, 0x0, 0x0, {{0x1, 0x40030000000000}, 0x0, 0x6, 0x0, {0x14, 0x19, {0x0, 0x400000000000000}}}}, 0x30}}, 0x0) 04:09:52 executing program 3: r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0x4}}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x30, r2, 0x805, 0x0, 0x0, {{0x1, 0x40030000000000}, 0x0, 0x6, 0x0, {0x14, 0x19, {0x0, 0x600000000000000}}}}, 0x30}}, 0x0) 04:09:52 executing program 2: syz_mount_image$hfs(&(0x7f00000000c0)='hfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x6000, 0x0, 0x0, &(0x7f0000000540)={[{@uid={'uid', 0x3d, 0xffffffffffffffff}}]}) 04:09:52 executing program 1: r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f0000000000)="2400a2001e0025eaa87865f51ef6bce90a04000200bff20182a9000c080009000d000000", 0x24) 04:09:53 executing program 4: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 04:09:53 executing program 3: r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0x4}}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x30, r2, 0x805, 0x0, 0x0, {{0x1, 0x40030000000000}, 0x0, 0x6, 0x0, {0x14, 0x19, {0x0, 0x700000000000000}}}}, 0x30}}, 0x0) 04:09:53 executing program 0: r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0x4}}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x30, r2, 0x805, 0x0, 0x0, {{0x1, 0x40030000000000}, 0x0, 0x6, 0x0, {0x14, 0x19, {0x0, 0x500000000000000}}}}, 0x30}}, 0x0) 04:09:53 executing program 5: r0 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000000)={@local, 0x0, 0x1}, 0x20) 04:09:53 executing program 1: r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f0000000000)="2401a2001e0025eaa87865f51ef6bce90a04000200bff20182a9000c080009000d000000", 0x24) 04:09:53 executing program 2: syz_mount_image$hfs(&(0x7f00000000c0)='hfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x6800, 0x0, 0x0, &(0x7f0000000540)={[{@uid={'uid', 0x3d, 0xffffffffffffffff}}]}) 04:09:53 executing program 4: r0 = syz_open_dev$vbi(&(0x7f00000000c0)='/dev/vbi#\x00', 0x2, 0x2) ioctl$VIDIOC_G_PARM(r0, 0xc0cc5615, &(0x7f0000000140)) 04:09:53 executing program 3: r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0x4}}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x30, r2, 0x805, 0x0, 0x0, {{0x1, 0x40030000000000}, 0x0, 0x6, 0x0, {0x14, 0x19, {0x0, 0xa00000000000000}}}}, 0x30}}, 0x0) 04:09:53 executing program 2: syz_mount_image$hfs(&(0x7f00000000c0)='hfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x6c00, 0x0, 0x0, &(0x7f0000000540)={[{@uid={'uid', 0x3d, 0xffffffffffffffff}}]}) 04:09:53 executing program 0: r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0x4}}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x30, r2, 0x805, 0x0, 0x0, {{0x1, 0x40030000000000}, 0x0, 0x6, 0x0, {0x14, 0x19, {0x0, 0x600000000000000}}}}, 0x30}}, 0x0) 04:09:53 executing program 1: r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f0000000000)="2402a2001e0025eaa87865f51ef6bce90a04000200bff20182a9000c080009000d000000", 0x24) 04:09:53 executing program 5: r0 = msgget$private(0x0, 0x0) msgrcv(r0, &(0x7f0000000100)={0x0, ""/4096}, 0x1008, 0x0, 0x0) msgsnd(r0, &(0x7f0000000040)={0x1}, 0x8, 0x0) 04:09:53 executing program 4: r0 = syz_open_dev$vbi(&(0x7f00000000c0)='/dev/vbi#\x00', 0x2, 0x2) ioctl$VIDIOC_REQBUFS(r0, 0xc0145608, &(0x7f0000000100)={0x2, 0x4, 0x2}) 04:09:53 executing program 3: r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0x4}}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x30, r2, 0x805, 0x0, 0x0, {{0x1, 0x40030000000000}, 0x0, 0x6, 0x0, {0x14, 0x19, {0x0, 0xe00000000000000}}}}, 0x30}}, 0x0) 04:09:53 executing program 0: r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0x4}}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x30, r2, 0x805, 0x0, 0x0, {{0x1, 0x40030000000000}, 0x0, 0x6, 0x0, {0x14, 0x19, {0x0, 0x700000000000000}}}}, 0x30}}, 0x0) 04:09:53 executing program 2: syz_mount_image$hfs(&(0x7f00000000c0)='hfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x7400, 0x0, 0x0, &(0x7f0000000540)={[{@uid={'uid', 0x3d, 0xffffffffffffffff}}]}) 04:09:53 executing program 4: rt_sigsuspend(&(0x7f0000000140), 0x8) 04:09:53 executing program 5: r0 = socket(0x40000000002, 0x3, 0x2) sendmsg$TIPC_NL_NET_SET(r0, &(0x7f0000000240)={&(0x7f0000000080), 0xc, &(0x7f0000000200)={0x0}}, 0x0) 04:09:53 executing program 3: r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0x4}}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x30, r2, 0x805, 0x0, 0x0, {{0x1, 0x40030000000000}, 0x0, 0x6, 0x0, {0x14, 0x19, {0x0, 0xf00000000000000}}}}, 0x30}}, 0x0) 04:09:53 executing program 1: r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f0000000000)="2403a2001e0025eaa87865f51ef6bce90a04000200bff20182a9000c080009000d000000", 0x24) 04:09:53 executing program 0: r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0x4}}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x30, r2, 0x805, 0x0, 0x0, {{0x1, 0x40030000000000}, 0x0, 0x6, 0x0, {0x14, 0x19, {0x0, 0xa00000000000000}}}}, 0x30}}, 0x0) 04:09:53 executing program 2: syz_mount_image$hfs(&(0x7f00000000c0)='hfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x7a00, 0x0, 0x0, &(0x7f0000000540)={[{@uid={'uid', 0x3d, 0xffffffffffffffff}}]}) 04:09:53 executing program 5: unshare(0x2040400) r0 = syz_open_dev$media(&(0x7f0000000080)='/dev/media#\x00', 0x0, 0x0) preadv(r0, &(0x7f0000000200)=[{&(0x7f00000000c0)=""/83, 0x53}], 0x1, 0x0) 04:09:53 executing program 1: r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f0000000000)="2400a3001e0025eaa87865f51ef6bce90a04000200bff20182a9000c080009000d000000", 0x24) 04:09:53 executing program 3: r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0x4}}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x30, r2, 0x805, 0x0, 0x0, {{0x1, 0x40030000000000}, 0x0, 0x6, 0x0, {0x14, 0x19, {0x0, 0x2f02000000000000}}}}, 0x30}}, 0x0) 04:09:54 executing program 2: syz_mount_image$hfs(&(0x7f00000000c0)='hfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0xedc0, 0x0, 0x0, &(0x7f0000000540)={[{@uid={'uid', 0x3d, 0xffffffffffffffff}}]}) 04:09:54 executing program 1: r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f0000000000)="2401a3001e0025eaa87865f51ef6bce90a04000200bff20182a9000c080009000d000000", 0x24) 04:09:54 executing program 5: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000280)='./file0\x00', &(0x7f0000000240)='overlay\x00', 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB=',lowerdir=\\']) [ 725.515054][ T6426] overlayfs: at least 2 lowerdir are needed while upperdir nonexistent 04:09:54 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x2, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000400)='net/udp6\x00') sendfile(r0, r1, 0x0, 0x80000002) 04:09:54 executing program 2: syz_mount_image$hfs(&(0x7f00000000c0)='hfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0xff00, 0x0, 0x0, &(0x7f0000000540)={[{@uid={'uid', 0x3d, 0xffffffffffffffff}}]}) 04:09:54 executing program 1: r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f0000000000)="2402a3001e0025eaa87865f51ef6bce90a04000200bff20182a9000c080009000d000000", 0x24) 04:09:54 executing program 5: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r0, &(0x7f00000005c0)=[{0x0}, {&(0x7f0000000280)='M', 0x1}], 0x2, 0x0) [ 888.903406][ T1065] INFO: task syz-executor.0:6402 can't die for more than 143 seconds. [ 888.911599][ T1065] syz-executor.0 D28592 6402 8624 0x00000004 [ 888.926750][ T1065] Call Trace: [ 888.930083][ T1065] __schedule+0x76e/0x17d0 [ 888.936761][ T1065] ? __sched_text_start+0x8/0x8 [ 888.941626][ T1065] ? lock_downgrade+0x920/0x920 [ 888.951600][ T1065] ? rwlock_bug.part.0+0x90/0x90 [ 888.958801][ T1065] schedule+0xa8/0x270 [ 888.962883][ T1065] schedule_preempt_disabled+0x13/0x20 [ 888.972563][ T1065] __mutex_lock+0x7b0/0x13c0 [ 888.979619][ T1065] ? genl_rcv_msg+0x13e/0x170 [ 888.988711][ T1065] ? mutex_lock_io_nested+0x1260/0x1260 [ 888.996489][ T1065] ? __kasan_check_read+0x11/0x20 [ 889.001529][ T1065] ? __lock_acquire+0x1703/0x4e70 [ 889.010772][ T1065] ? __dev_queue_xmit+0xbb5/0x3650 [ 889.018118][ T1065] mutex_lock_nested+0x16/0x20 [ 889.022892][ T1065] ? mutex_lock_nested+0x16/0x20 [ 889.032129][ T1065] genl_rcv_msg+0x13e/0x170 [ 889.039128][ T1065] netlink_rcv_skb+0x177/0x450 [ 889.048126][ T1065] ? genl_family_rcv_msg+0xf90/0xf90 [ 889.055637][ T1065] ? netlink_ack+0xb30/0xb30 [ 889.060235][ T1065] ? __kasan_check_write+0x14/0x20 [ 889.069599][ T1065] ? netlink_deliver_tap+0x254/0xbf0 [ 889.077993][ T1065] genl_rcv+0x29/0x40 [ 889.081983][ T1065] netlink_unicast+0x531/0x710 [ 889.091019][ T1065] ? netlink_attachskb+0x7c0/0x7c0 [ 889.098462][ T1065] ? _copy_from_iter_full+0x25d/0x8a0 [ 889.108059][ T1065] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 889.116006][ T1065] ? __check_object_size+0x3d/0x437 [ 889.121220][ T1065] netlink_sendmsg+0x8a5/0xd60 [ 889.130246][ T1065] ? netlink_unicast+0x710/0x710 [ 889.137416][ T1065] ? aa_sock_msg_perm.isra.0+0xba/0x170 [ 889.142973][ T1065] ? apparmor_socket_sendmsg+0x2a/0x30 [ 889.155931][ T1065] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 889.162700][ T1065] ? security_socket_sendmsg+0x8d/0xc0 [ 889.171391][ T1065] ? netlink_unicast+0x710/0x710 [ 889.179585][ T1065] sock_sendmsg+0xd7/0x130 [ 889.187231][ T1065] ___sys_sendmsg+0x803/0x920 [ 889.191933][ T1065] ? copy_msghdr_from_user+0x440/0x440 [ 889.200670][ T1065] ? __kasan_check_read+0x11/0x20 [ 889.209990][ T1065] ? __fget+0x384/0x560 [ 889.217381][ T1065] ? ksys_dup3+0x3e0/0x3e0 [ 889.221818][ T1065] ? __fget_light+0x1a9/0x230 [ 889.229737][ T1065] ? __fdget+0x1b/0x20 [ 889.237130][ T1065] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 889.246863][ T1065] __sys_sendmsg+0x105/0x1d0 [ 889.251464][ T1065] ? __sys_sendmsg_sock+0xd0/0xd0 [ 889.259840][ T1065] ? trace_hardirqs_on_thunk+0x1a/0x20 [ 889.268514][ T1065] ? do_syscall_64+0x26/0x760 [ 889.276431][ T1065] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 889.282511][ T1065] ? do_syscall_64+0x26/0x760 [ 889.290421][ T1065] __x64_sys_sendmsg+0x78/0xb0 [ 889.298447][ T1065] do_syscall_64+0xfa/0x760 [ 889.302976][ T1065] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 889.312082][ T1065] RIP: 0033:0x413681 [ 889.319300][ T1065] Code: 00 bf 9a 38 44 00 ff 15 15 a0 24 00 85 c0 0f 85 cf fc ff ff 45 31 c9 31 c9 31 f6 41 b8 70 d6 65 00 ba 0b 00 00 00 bf af 38 44 <00> e8 09 2f 02 00 85 c0 0f 85 ab fc ff ff 41 b9 b0 20 41 00 45 31 [ 889.346498][ T1065] RSP: 002b:00007f8c598a69c0 EFLAGS: 00000293 ORIG_RAX: 000000000000002e [ 889.358351][ T1065] RAX: ffffffffffffffda RBX: 00007f8c598a6a58 RCX: 0000000000413681 [ 889.371119][ T1065] RDX: 0000000000000000 RSI: 00007f8c598a6a00 RDI: 0000000000000005 [ 889.382370][ T1065] RBP: 0000000000000005 R08: 000000000000000b R09: 0000000000000000 [ 889.396775][ T1065] R10: 0000000000000000 R11: 0000000000000293 R12: 00007f8c598a6a40 [ 889.407069][ T1065] R13: 00000000004d0800 R14: 00000000004df730 R15: 00000000ffffffff [ 889.419399][ T1065] INFO: task syz-executor.0:6402 blocked for more than 143 seconds. [ 889.429585][ T1065] Not tainted 5.3.0-rc5-next-20190823 #72 [ 889.440080][ T1065] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 889.450968][ T1065] syz-executor.0 D28592 6402 8624 0x00000004 [ 889.461622][ T1065] Call Trace: [ 889.467312][ T1065] __schedule+0x76e/0x17d0 [ 889.471749][ T1065] ? __sched_text_start+0x8/0x8 [ 889.481743][ T1065] ? lock_downgrade+0x920/0x920 [ 889.489017][ T1065] ? rwlock_bug.part.0+0x90/0x90 [ 889.498200][ T1065] schedule+0xa8/0x270 [ 889.502917][ T1065] schedule_preempt_disabled+0x13/0x20 [ 889.510614][ T1065] __mutex_lock+0x7b0/0x13c0 [ 889.519499][ T1065] ? genl_rcv_msg+0x13e/0x170 [ 889.526482][ T1065] ? mutex_lock_io_nested+0x1260/0x1260 [ 889.532044][ T1065] ? __kasan_check_read+0x11/0x20 [ 889.541349][ T1065] ? __lock_acquire+0x1703/0x4e70 [ 889.549138][ T1065] ? __dev_queue_xmit+0xbb5/0x3650 [ 889.558559][ T1065] mutex_lock_nested+0x16/0x20 [ 889.565541][ T1065] ? mutex_lock_nested+0x16/0x20 [ 889.570491][ T1065] genl_rcv_msg+0x13e/0x170 [ 889.579435][ T1065] netlink_rcv_skb+0x177/0x450 [ 889.586426][ T1065] ? genl_family_rcv_msg+0xf90/0xf90 [ 889.591721][ T1065] ? netlink_ack+0xb30/0xb30 [ 889.600586][ T1065] ? __kasan_check_write+0x14/0x20 [ 889.608805][ T1065] ? netlink_deliver_tap+0x254/0xbf0 [ 889.618368][ T1065] genl_rcv+0x29/0x40 [ 889.622358][ T1065] netlink_unicast+0x531/0x710 [ 889.638023][ T1065] ? netlink_attachskb+0x7c0/0x7c0 [ 889.644359][ T1065] ? _copy_from_iter_full+0x25d/0x8a0 [ 889.649739][ T1065] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 889.660721][ T1065] ? __check_object_size+0x3d/0x437 [ 889.667128][ T1065] netlink_sendmsg+0x8a5/0xd60 [ 889.671908][ T1065] ? netlink_unicast+0x710/0x710 [ 889.682300][ T1065] ? aa_sock_msg_perm.isra.0+0xba/0x170 [ 889.689118][ T1065] ? apparmor_socket_sendmsg+0x2a/0x30 [ 889.699883][ T1065] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 889.707456][ T1065] ? security_socket_sendmsg+0x8d/0xc0 [ 889.712920][ T1065] ? netlink_unicast+0x710/0x710 [ 889.724345][ T1065] sock_sendmsg+0xd7/0x130 [ 889.728782][ T1065] ___sys_sendmsg+0x803/0x920 [ 889.738599][ T1065] ? copy_msghdr_from_user+0x440/0x440 [ 889.746367][ T1065] ? __kasan_check_read+0x11/0x20 [ 889.751403][ T1065] ? __fget+0x384/0x560 [ 889.759851][ T1065] ? ksys_dup3+0x3e0/0x3e0 [ 889.766485][ T1065] ? __fget_light+0x1a9/0x230 [ 889.771169][ T1065] ? __fdget+0x1b/0x20 [ 889.779503][ T1065] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 889.789125][ T1065] __sys_sendmsg+0x105/0x1d0 [ 889.798033][ T1065] ? __sys_sendmsg_sock+0xd0/0xd0 [ 889.803079][ T1065] ? trace_hardirqs_on_thunk+0x1a/0x20 [ 889.810753][ T1065] ? do_syscall_64+0x26/0x760 [ 889.819666][ T1065] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 889.827966][ T1065] ? do_syscall_64+0x26/0x760 [ 889.832652][ T1065] __x64_sys_sendmsg+0x78/0xb0 [ 889.841659][ T1065] do_syscall_64+0xfa/0x760 [ 889.848377][ T1065] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 889.858591][ T1065] RIP: 0033:0x413681 [ 889.862497][ T1065] Code: 00 bf 9a 38 44 00 ff 15 15 a0 24 00 85 c0 0f 85 cf fc ff ff 45 31 c9 31 c9 31 f6 41 b8 70 d6 65 00 ba 0b 00 00 00 bf af 38 44 <00> e8 09 2f 02 00 85 c0 0f 85 ab fc ff ff 41 b9 b0 20 41 00 45 31 [ 889.889474][ T1065] RSP: 002b:00007f8c598a69c0 EFLAGS: 00000293 ORIG_RAX: 000000000000002e [ 889.898405][ T1065] RAX: ffffffffffffffda RBX: 00007f8c598a6a58 RCX: 0000000000413681 [ 889.912886][ T1065] RDX: 0000000000000000 RSI: 00007f8c598a6a00 RDI: 0000000000000005 [ 889.921188][ T1065] RBP: 0000000000000005 R08: 000000000000000b R09: 0000000000000000 [ 889.935697][ T1065] R10: 0000000000000000 R11: 0000000000000293 R12: 00007f8c598a6a40 [ 889.947129][ T1065] R13: 00000000004d0800 R14: 00000000004df730 R15: 00000000ffffffff [ 889.958552][ T1065] INFO: task syz-executor.0:6403 can't die for more than 144 seconds. [ 889.970299][ T1065] syz-executor.0 R running task 25456 6403 8624 0x00004006 [ 889.981613][ T1065] Call Trace: [ 889.988263][ T1065] ? tipc_sk_lookup+0x678/0xbf0 [ 889.996694][ T1065] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 890.002945][ T1065] ? mark_held_locks+0xf0/0xf0 [ 890.011188][ T1065] ? lock_downgrade+0x920/0x920 [ 890.020473][ T1065] ? rcu_read_lock_held_common+0xb4/0x130 [ 890.029581][ T1065] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 890.039229][ T1065] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 890.048861][ T1065] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 890.058119][ T1065] ? lockdep_rht_mutex_is_held+0x70/0x90 [ 890.067153][ T1065] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 890.076867][ T1065] ? nla_memcpy+0xb0/0xb0 [ 890.081213][ T1065] ? __tipc_nl_add_sk+0x400/0x400 [ 890.089638][ T1065] ? __nla_parse+0x43/0x60 [ 890.097609][ T1065] ? tipc_nl_publ_dump+0x863/0xd60 [ 890.102900][ T1065] ? trace_hardirqs_on_thunk+0x1a/0x20 [ 890.111865][ T1065] ? retint_kernel+0x2b/0x2b [ 890.119849][ T1065] ? trace_hardirqs_on_caller+0x6a/0x240 [ 890.128850][ T1065] ? tipc_nl_sk_dump+0x30/0x30 [ 890.136981][ T1065] ? trace_hardirqs_on_thunk+0x1a/0x20 [ 890.142459][ T1065] ? __tipc_nl_compat_dumpit.isra.0+0x1f7/0x930 [ 890.153031][ T1065] ? __tipc_nl_compat_dumpit.isra.0+0x21a/0x930 [ 890.162691][ T1065] ? __tipc_add_link_prop.isra.0+0x210/0x210 [ 890.172045][ T1065] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 890.181666][ T1065] ? __phys_addr+0xa4/0x120 [ 890.191087][ T1065] ? __nla_put+0x37/0x40 [ 890.198810][ T1065] ? nla_put+0x110/0x150 [ 890.203064][ T1065] ? tipc_nl_compat_sk_dump+0x54d/0x970 [ 890.212103][ T1065] ? __tipc_nl_compat_dumpit.isra.0+0x930/0x930 [ 890.221799][ T1065] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 890.231508][ T1065] ? __nla_validate_parse+0x2d0/0x1ed0 [ 890.240621][ T1065] ? tipc_nl_sk_dump+0x30/0x30 [ 890.248752][ T1065] ? tipc_tlv_sprintf+0x2f0/0x2f0 [ 890.257539][ T1065] ? nla_memcpy+0xb0/0xb0 [ 890.261876][ T1065] ? __kasan_check_read+0x11/0x20 [ 890.270333][ T1065] ? __tipc_nl_compat_dumpit.isra.0+0x320/0x930 [ 890.280975][ T1065] ? __tipc_add_link_prop.isra.0+0x210/0x210 [ 890.290334][ T1065] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 890.300089][ T1065] ? __phys_addr+0xa4/0x120 [ 890.316963][ T1065] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 890.322693][ T1065] ? skb_put+0x177/0x1d0 [ 890.329548][ T1065] ? tipc_nl_compat_dumpit+0x24c/0x510 [ 890.339554][ T1065] ? tipc_nl_compat_recv+0x5a0/0xae0 [ 890.347421][ T1065] ? tipc_nl_compat_doit+0x5e0/0x5e0 [ 890.352709][ T1065] ? mark_held_locks+0xf0/0xf0 [ 890.361932][ T1065] ? tipc_dump_start+0x90/0x90 [ 890.369039][ T1065] ? __tipc_nl_compat_dumpit.isra.0+0x930/0x930 [ 890.379737][ T1065] ? genl_family_rcv_msg+0x74b/0xf90 [ 890.387425][ T1065] ? genl_unregister_family+0x7b0/0x7b0 [ 890.392989][ T1065] ? __kasan_check_read+0x11/0x20 [ 890.402593][ T1065] ? __lock_acquire+0x1703/0x4e70 [ 890.410907][ T1065] ? __dev_queue_xmit+0xbb5/0x3650 [ 890.420585][ T1065] ? genl_rcv_msg+0xca/0x170 [ 890.427599][ T1065] ? netlink_rcv_skb+0x177/0x450 [ 890.432543][ T1065] ? genl_family_rcv_msg+0xf90/0xf90 [ 890.442449][ T1065] ? netlink_ack+0xb30/0xb30 [ 890.449507][ T1065] ? __kasan_check_write+0x14/0x20 [ 890.459187][ T1065] ? netlink_deliver_tap+0x254/0xbf0 [ 890.466853][ T1065] ? genl_rcv+0x29/0x40 [ 890.471011][ T1065] ? netlink_unicast+0x531/0x710 [ 890.480529][ T1065] ? netlink_attachskb+0x7c0/0x7c0 [ 890.488027][ T1065] ? _copy_from_iter_full+0x25d/0x8a0 [ 890.497827][ T1065] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 890.506992][ T1065] ? __check_object_size+0x3d/0x437 [ 890.512212][ T1065] ? netlink_sendmsg+0x8a5/0xd60 [ 890.521743][ T1065] ? netlink_unicast+0x710/0x710 [ 890.529039][ T1065] ? aa_sock_msg_perm.isra.0+0xba/0x170 [ 890.540377][ T1065] ? apparmor_socket_sendmsg+0x2a/0x30 [ 890.548342][ T1065] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 890.559021][ T1065] ? security_socket_sendmsg+0x8d/0xc0 [ 890.566848][ T1065] ? netlink_unicast+0x710/0x710 [ 890.571790][ T1065] ? sock_sendmsg+0xd7/0x130 [ 890.580857][ T1065] ? ___sys_sendmsg+0x803/0x920 [ 890.588088][ T1065] ? copy_msghdr_from_user+0x440/0x440 [ 890.597975][ T1065] ? __kasan_check_read+0x11/0x20 [ 890.603018][ T1065] ? __fget+0x384/0x560 [ 890.609584][ T1065] ? ksys_dup3+0x3e0/0x3e0 [ 890.618532][ T1065] ? __fget_light+0x1a9/0x230 [ 890.625567][ T1065] ? __fdget+0x1b/0x20 [ 890.629640][ T1065] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 890.640380][ T1065] ? __sys_sendmsg+0x105/0x1d0 [ 890.647525][ T1065] ? __sys_sendmsg_sock+0xd0/0xd0 [ 890.652566][ T1065] ? trace_hardirqs_on_thunk+0x1a/0x20 [ 890.662783][ T1065] ? do_syscall_64+0x26/0x760 [ 890.680425][ T1065] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 890.686876][ T1065] ? do_syscall_64+0x26/0x760 [ 890.691563][ T1065] ? __x64_sys_sendmsg+0x78/0xb0 [ 890.702993][ T1065] ? do_syscall_64+0xfa/0x760 [ 890.707991][ T1065] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 890.720569][ T1065] INFO: task syz-executor.3:6414 can't die for more than 145 seconds. [ 890.729052][ T1065] syz-executor.3 D28592 6414 8632 0x00000004 [ 890.741938][ T1065] Call Trace: [ 890.745709][ T1065] __schedule+0x76e/0x17d0 [ 890.750143][ T1065] ? __sched_text_start+0x8/0x8 [ 890.761636][ T1065] ? lock_downgrade+0x920/0x920 [ 890.766793][ T1065] ? rwlock_bug.part.0+0x90/0x90 [ 890.771740][ T1065] schedule+0xa8/0x270 [ 890.782296][ T1065] schedule_preempt_disabled+0x13/0x20 [ 890.788170][ T1065] __mutex_lock+0x7b0/0x13c0 [ 890.792762][ T1065] ? genl_rcv_msg+0x13e/0x170 [ 890.805000][ T1065] ? mutex_lock_io_nested+0x1260/0x1260 [ 890.810560][ T1065] ? __kasan_check_read+0x11/0x20 [ 890.821048][ T1065] ? __lock_acquire+0x1703/0x4e70 [ 890.828943][ T1065] ? __dev_queue_xmit+0xbb5/0x3650 [ 890.839582][ T1065] mutex_lock_nested+0x16/0x20 [ 890.845689][ T1065] ? mutex_lock_nested+0x16/0x20 [ 890.850629][ T1065] genl_rcv_msg+0x13e/0x170 [ 890.860754][ T1065] netlink_rcv_skb+0x177/0x450 [ 890.866869][ T1065] ? genl_family_rcv_msg+0xf90/0xf90 [ 890.872160][ T1065] ? netlink_ack+0xb30/0xb30 [ 890.882196][ T1065] ? __kasan_check_write+0x14/0x20 [ 890.888675][ T1065] ? netlink_deliver_tap+0x254/0xbf0 [ 890.899549][ T1065] genl_rcv+0x29/0x40 [ 890.904875][ T1065] netlink_unicast+0x531/0x710 [ 890.909644][ T1065] ? netlink_attachskb+0x7c0/0x7c0 [ 890.920304][ T1065] ? _copy_from_iter_full+0x25d/0x8a0 [ 890.927134][ T1065] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 890.932858][ T1065] ? __check_object_size+0x3d/0x437 [ 890.945487][ T1065] netlink_sendmsg+0x8a5/0xd60 [ 890.950279][ T1065] ? netlink_unicast+0x710/0x710 [ 890.959711][ T1065] ? aa_sock_msg_perm.isra.0+0xba/0x170 [ 890.967836][ T1065] ? apparmor_socket_sendmsg+0x2a/0x30 [ 890.977672][ T1065] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 890.986398][ T1065] ? security_socket_sendmsg+0x8d/0xc0 [ 890.991859][ T1065] ? netlink_unicast+0x710/0x710 [ 891.001247][ T1065] sock_sendmsg+0xd7/0x130 [ 891.008112][ T1065] ___sys_sendmsg+0x803/0x920 [ 891.012816][ T1065] ? copy_msghdr_from_user+0x440/0x440 [ 891.022890][ T1065] ? __kasan_check_read+0x11/0x20 [ 891.030300][ T1065] ? __fget+0x384/0x560 [ 891.038856][ T1065] ? ksys_dup3+0x3e0/0x3e0 [ 891.045622][ T1065] ? __fget_light+0x1a9/0x230 [ 891.050301][ T1065] ? __fdget+0x1b/0x20 [ 891.059075][ T1065] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 891.067691][ T1065] __sys_sendmsg+0x105/0x1d0 [ 891.072287][ T1065] ? __sys_sendmsg_sock+0xd0/0xd0 [ 891.082632][ T1065] ? trace_hardirqs_on_thunk+0x1a/0x20 [ 891.090461][ T1065] ? do_syscall_64+0x26/0x760 [ 891.099519][ T1065] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 891.107931][ T1065] ? do_syscall_64+0x26/0x760 [ 891.112616][ T1065] __x64_sys_sendmsg+0x78/0xb0 [ 891.121952][ T1065] do_syscall_64+0xfa/0x760 [ 891.128837][ T1065] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 891.139118][ T1065] RIP: 0033:0x413681 [ 891.143022][ T1065] Code: 00 bf 9a 38 44 00 ff 15 15 a0 24 00 85 c0 0f 85 cf fc ff ff 45 31 c9 31 c9 31 f6 41 b8 70 d6 65 00 ba 0b 00 00 00 bf af 38 44 <00> e8 09 2f 02 00 85 c0 0f 85 ab fc ff ff 41 b9 b0 20 41 00 45 31 [ 891.169363][ T1065] RSP: 002b:00007fce26d2e9c0 EFLAGS: 00000293 ORIG_RAX: 000000000000002e [ 891.178241][ T1065] RAX: ffffffffffffffda RBX: 00007fce26d2ea58 RCX: 0000000000413681 [ 891.192771][ T1065] RDX: 0000000000000000 RSI: 00007fce26d2ea00 RDI: 0000000000000005 [ 891.201092][ T1065] RBP: 0000000000000005 R08: 000000000000000b R09: 0000000000000000 [ 891.216475][ T1065] R10: 0000000000000000 R11: 0000000000000293 R12: 00007fce26d2ea40 [ 891.228927][ T1065] R13: 00000000004d0800 R14: 00000000004df730 R15: 00000000ffffffff [ 891.240353][ T1065] INFO: task syz-executor.3:6414 blocked for more than 145 seconds. [ 891.251655][ T1065] Not tainted 5.3.0-rc5-next-20190823 #72 [ 891.261359][ T1065] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 891.276548][ T1065] syz-executor.3 D28592 6414 8632 0x00000004 [ 891.282894][ T1065] Call Trace: [ 891.288586][ T1065] __schedule+0x76e/0x17d0 [ 891.298812][ T1065] ? __sched_text_start+0x8/0x8 [ 891.306037][ T1065] ? lock_downgrade+0x920/0x920 [ 891.310896][ T1065] ? rwlock_bug.part.0+0x90/0x90 [ 891.320328][ T1065] schedule+0xa8/0x270 [ 891.326835][ T1065] schedule_preempt_disabled+0x13/0x20 [ 891.332440][ T1065] __mutex_lock+0x7b0/0x13c0 [ 891.341608][ T1065] ? genl_rcv_msg+0x13e/0x170 [ 891.349549][ T1065] ? mutex_lock_io_nested+0x1260/0x1260 [ 891.359517][ T1065] ? __kasan_check_read+0x11/0x20 [ 891.366904][ T1065] ? __lock_acquire+0x1703/0x4e70 [ 891.377996][ T1065] ? __dev_queue_xmit+0xbb5/0x3650 [ 891.385495][ T1065] mutex_lock_nested+0x16/0x20 [ 891.390263][ T1065] ? mutex_lock_nested+0x16/0x20 [ 891.399702][ T1065] genl_rcv_msg+0x13e/0x170 [ 891.406630][ T1065] netlink_rcv_skb+0x177/0x450 [ 891.411398][ T1065] ? genl_family_rcv_msg+0xf90/0xf90 [ 891.421109][ T1065] ? netlink_ack+0xb30/0xb30 [ 891.428039][ T1065] ? __kasan_check_write+0x14/0x20 [ 891.437628][ T1065] ? netlink_deliver_tap+0x254/0xbf0 [ 891.442928][ T1065] genl_rcv+0x29/0x40 [ 891.449310][ T1065] netlink_unicast+0x531/0x710 [ 891.458556][ T1065] ? netlink_attachskb+0x7c0/0x7c0 [ 891.466127][ T1065] ? _copy_from_iter_full+0x25d/0x8a0 [ 891.471502][ T1065] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 891.482548][ T1065] ? __check_object_size+0x3d/0x437 [ 891.490101][ T1065] netlink_sendmsg+0x8a5/0xd60 [ 891.499365][ T1065] ? netlink_unicast+0x710/0x710 [ 891.506649][ T1065] ? aa_sock_msg_perm.isra.0+0xba/0x170 [ 891.512202][ T1065] ? apparmor_socket_sendmsg+0x2a/0x30 [ 891.522105][ T1065] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 891.531068][ T1065] ? security_socket_sendmsg+0x8d/0xc0 [ 891.540926][ T1065] ? netlink_unicast+0x710/0x710 [ 891.548291][ T1065] sock_sendmsg+0xd7/0x130 [ 891.552712][ T1065] ___sys_sendmsg+0x803/0x920 [ 891.561890][ T1065] ? copy_msghdr_from_user+0x440/0x440 [ 891.569719][ T1065] ? __kasan_check_read+0x11/0x20 [ 891.579170][ T1065] ? __fget+0x384/0x560 [ 891.585674][ T1065] ? ksys_dup3+0x3e0/0x3e0 [ 891.590098][ T1065] ? __fget_light+0x1a9/0x230 [ 891.599269][ T1065] ? __fdget+0x1b/0x20 [ 891.606658][ T1065] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 891.612906][ T1065] __sys_sendmsg+0x105/0x1d0 [ 891.622035][ T1065] ? __sys_sendmsg_sock+0xd0/0xd0 [ 891.629903][ T1065] ? trace_hardirqs_on_thunk+0x1a/0x20 [ 891.639766][ T1065] ? do_syscall_64+0x26/0x760 [ 891.646796][ T1065] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 891.652866][ T1065] ? do_syscall_64+0x26/0x760 [ 891.661956][ T1065] __x64_sys_sendmsg+0x78/0xb0 [ 891.669085][ T1065] do_syscall_64+0xfa/0x760 [ 891.677965][ T1065] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 891.686202][ T1065] RIP: 0033:0x413681 [ 891.690100][ T1065] Code: 00 bf 9a 38 44 00 ff 15 15 a0 24 00 85 c0 0f 85 cf fc ff ff 45 31 c9 31 c9 31 f6 41 b8 70 d6 65 00 ba 0b 00 00 00 bf af 38 44 <00> e8 09 2f 02 00 85 c0 0f 85 ab fc ff ff 41 b9 b0 20 41 00 45 31 [ 891.720768][ T1065] RSP: 002b:00007fce26d2e9c0 EFLAGS: 00000293 ORIG_RAX: 000000000000002e [ 891.731617][ T1065] RAX: ffffffffffffffda RBX: 00007fce26d2ea58 RCX: 0000000000413681 [ 891.746993][ T1065] RDX: 0000000000000000 RSI: 00007fce26d2ea00 RDI: 0000000000000005 [ 891.758469][ T1065] RBP: 0000000000000005 R08: 000000000000000b R09: 0000000000000000 [ 891.769999][ T1065] R10: 0000000000000000 R11: 0000000000000293 R12: 00007fce26d2ea40 [ 891.781369][ T1065] R13: 00000000004d0800 R14: 00000000004df730 R15: 00000000ffffffff [ 891.792838][ T1065] INFO: task syz-executor.3:6421 can't die for more than 146 seconds. [ 891.807516][ T1065] syz-executor.3 D27840 6421 8632 0x00000004 [ 891.815207][ T1065] Call Trace: [ 891.818508][ T1065] __schedule+0x76e/0x17d0 [ 891.822925][ T1065] ? __sched_text_start+0x8/0x8 [ 891.834405][ T1065] ? lock_downgrade+0x920/0x920 [ 891.839265][ T1065] ? rwlock_bug.part.0+0x90/0x90 [ 891.849712][ T1065] schedule+0xa8/0x270 [ 891.855124][ T1065] schedule_preempt_disabled+0x13/0x20 [ 891.860581][ T1065] __mutex_lock+0x7b0/0x13c0 [ 891.871670][ T1065] ? genl_rcv_msg+0x13e/0x170 [ 891.878613][ T1065] ? mutex_lock_io_nested+0x1260/0x1260 [ 891.889607][ T1065] ? __kasan_check_read+0x11/0x20 [ 891.895995][ T1065] ? __lock_acquire+0x1703/0x4e70 [ 891.901033][ T1065] ? __dev_queue_xmit+0xbb5/0x3650 [ 891.911729][ T1065] mutex_lock_nested+0x16/0x20 [ 891.917853][ T1065] ? mutex_lock_nested+0x16/0x20 [ 891.922892][ T1065] genl_rcv_msg+0x13e/0x170 [ 891.932925][ T1065] netlink_rcv_skb+0x177/0x450 [ 891.939068][ T1065] ? genl_family_rcv_msg+0xf90/0xf90 [ 891.949839][ T1065] ? netlink_ack+0xb30/0xb30 [ 891.955773][ T1065] ? __kasan_check_write+0x14/0x20 [ 891.960893][ T1065] ? netlink_deliver_tap+0x254/0xbf0 [ 891.971702][ T1065] genl_rcv+0x29/0x40 [ 891.977017][ T1065] netlink_unicast+0x531/0x710 [ 891.981793][ T1065] ? netlink_attachskb+0x7c0/0x7c0 [ 891.992487][ T1065] ? _copy_from_iter_full+0x25d/0x8a0 [ 891.999231][ T1065] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 892.011246][ T1065] ? __check_object_size+0x3d/0x437 [ 892.017801][ T1065] netlink_sendmsg+0x8a5/0xd60 [ 892.022577][ T1065] ? netlink_unicast+0x710/0x710 [ 892.036318][ T1065] ? aa_sock_msg_perm.isra.0+0xba/0x170 [ 892.041884][ T1065] ? apparmor_socket_sendmsg+0x2a/0x30 [ 892.050588][ T1065] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 892.060234][ T1065] ? security_socket_sendmsg+0x8d/0xc0 [ 892.068923][ T1065] ? netlink_unicast+0x710/0x710 [ 892.077106][ T1065] sock_sendmsg+0xd7/0x130 [ 892.081533][ T1065] ___sys_sendmsg+0x803/0x920 [ 892.089441][ T1065] ? copy_msghdr_from_user+0x440/0x440 [ 892.098177][ T1065] ? __kasan_check_read+0x11/0x20 [ 892.107561][ T1065] ? __fget+0x384/0x560 [ 892.111733][ T1065] ? ksys_dup3+0x3e0/0x3e0 [ 892.119385][ T1065] ? __fget_light+0x1a9/0x230 [ 892.127291][ T1065] ? __fdget+0x1b/0x20 [ 892.131367][ T1065] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 892.141765][ T1065] __sys_sendmsg+0x105/0x1d0 [ 892.149670][ T1065] ? __sys_sendmsg_sock+0xd0/0xd0 [ 892.158262][ T1065] ? trace_hardirqs_on_thunk+0x1a/0x20 [ 892.166997][ T1065] ? do_syscall_64+0x26/0x760 [ 892.171686][ T1065] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 892.181067][ T1065] ? do_syscall_64+0x26/0x760 [ 892.188979][ T1065] __x64_sys_sendmsg+0x78/0xb0 [ 892.196973][ T1065] do_syscall_64+0xfa/0x760 [ 892.201491][ T1065] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 892.210693][ T1065] RIP: 0033:0x413681 [ 892.217789][ T1065] Code: 00 bf 9a 38 44 00 ff 15 15 a0 24 00 85 c0 0f 85 cf fc ff ff 45 31 c9 31 c9 31 f6 41 b8 70 d6 65 00 ba 0b 00 00 00 bf af 38 44 <00> e8 09 2f 02 00 85 c0 0f 85 ab fc ff ff 41 b9 b0 20 41 00 45 31 [ 892.243794][ T1065] RSP: 002b:00007fce26d0d9c0 EFLAGS: 00000293 ORIG_RAX: 000000000000002e [ 892.252214][ T1065] RAX: ffffffffffffffda RBX: 00007fce26d0da58 RCX: 0000000000413681 [ 892.268549][ T1065] RDX: 0000000000000000 RSI: 00007fce26d0da00 RDI: 0000000000000005 [ 892.278969][ T1065] RBP: 0000000000000005 R08: 000000000000000b R09: 0000000000000000 [ 892.291180][ T1065] R10: 0000000000000000 R11: 0000000000000293 R12: 00007fce26d0da40 [ 892.301379][ T1065] R13: 00000000004d0800 R14: 00000000004df730 R15: 00000000ffffffff [ 892.315690][ T1065] INFO: task syz-executor.3:6421 blocked for more than 146 seconds. [ 892.326873][ T1065] Not tainted 5.3.0-rc5-next-20190823 #72 [ 892.336450][ T1065] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 892.350550][ T1065] syz-executor.3 D27840 6421 8632 0x00000004 [ 892.360154][ T1065] Call Trace: [ 892.366730][ T1065] __schedule+0x76e/0x17d0 [ 892.371166][ T1065] ? __sched_text_start+0x8/0x8 [ 892.379258][ T1065] ? lock_downgrade+0x920/0x920 [ 892.387305][ T1065] ? rwlock_bug.part.0+0x90/0x90 [ 892.392258][ T1065] schedule+0xa8/0x270 [ 892.400565][ T1065] schedule_preempt_disabled+0x13/0x20 [ 892.409238][ T1065] __mutex_lock+0x7b0/0x13c0 [ 892.417036][ T1065] ? genl_rcv_msg+0x13e/0x170 [ 892.421725][ T1065] ? mutex_lock_io_nested+0x1260/0x1260 [ 892.430685][ T1065] ? __kasan_check_read+0x11/0x20 [ 892.438949][ T1065] ? __lock_acquire+0x1703/0x4e70 [ 892.447261][ T1065] ? __dev_queue_xmit+0xbb5/0x3650 [ 892.452393][ T1065] mutex_lock_nested+0x16/0x20 [ 892.460461][ T1065] ? mutex_lock_nested+0x16/0x20 [ 892.468612][ T1065] genl_rcv_msg+0x13e/0x170 [ 892.476432][ T1065] netlink_rcv_skb+0x177/0x450 [ 892.481290][ T1065] ? genl_family_rcv_msg+0xf90/0xf90 [ 892.489754][ T1065] ? netlink_ack+0xb30/0xb30 [ 892.497651][ T1065] ? __kasan_check_write+0x14/0x20 [ 892.502774][ T1065] ? netlink_deliver_tap+0x254/0xbf0 [ 892.512023][ T1065] genl_rcv+0x29/0x40 [ 892.519277][ T1065] netlink_unicast+0x531/0x710 [ 892.528227][ T1065] ? netlink_attachskb+0x7c0/0x7c0 [ 892.536705][ T1065] ? _copy_from_iter_full+0x25d/0x8a0 [ 892.542111][ T1065] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 892.551280][ T1065] ? __check_object_size+0x3d/0x437 [ 892.559765][ T1065] netlink_sendmsg+0x8a5/0xd60 [ 892.567757][ T1065] ? netlink_unicast+0x710/0x710 [ 892.572702][ T1065] ? aa_sock_msg_perm.isra.0+0xba/0x170 [ 892.581518][ T1065] ? apparmor_socket_sendmsg+0x2a/0x30 [ 892.590289][ T1065] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 892.599814][ T1065] ? security_socket_sendmsg+0x8d/0xc0 [ 892.608473][ T1065] ? netlink_unicast+0x710/0x710 [ 892.616751][ T1065] sock_sendmsg+0xd7/0x130 [ 892.621174][ T1065] ___sys_sendmsg+0x803/0x920 [ 892.629060][ T1065] ? copy_msghdr_from_user+0x440/0x440 [ 892.637805][ T1065] ? __kasan_check_read+0x11/0x20 [ 892.642837][ T1065] ? __fget+0x384/0x560 [ 892.650294][ T1065] ? ksys_dup3+0x3e0/0x3e0 [ 892.658884][ T1065] ? __fget_light+0x1a9/0x230 [ 892.666856][ T1065] ? __fdget+0x1b/0x20 [ 892.670932][ T1065] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 892.680474][ T1065] __sys_sendmsg+0x105/0x1d0 [ 892.688272][ T1065] ? __sys_sendmsg_sock+0xd0/0xd0 [ 892.696649][ T1065] ? trace_hardirqs_on_thunk+0x1a/0x20 [ 892.702113][ T1065] ? do_syscall_64+0x26/0x760 [ 892.710021][ T1065] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 892.719463][ T1065] ? do_syscall_64+0x26/0x760 [ 892.727358][ T1065] __x64_sys_sendmsg+0x78/0xb0 [ 892.732132][ T1065] do_syscall_64+0xfa/0x760 [ 892.739917][ T1065] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 892.753401][ T1065] RIP: 0033:0x413681 [ 892.757315][ T1065] Code: 00 bf 9a 38 44 00 ff 15 15 a0 24 00 85 c0 0f 85 cf fc ff ff 45 31 c9 31 c9 31 f6 41 b8 70 d6 65 00 ba 0b 00 00 00 bf af 38 44 <00> e8 09 2f 02 00 85 c0 0f 85 ab fc ff ff 41 b9 b0 20 41 00 45 31 [ 892.782623][ T1065] RSP: 002b:00007fce26d0d9c0 EFLAGS: 00000293 ORIG_RAX: 000000000000002e [ 892.792227][ T1065] RAX: ffffffffffffffda RBX: 00007fce26d0da58 RCX: 0000000000413681 [ 892.806611][ T1065] RDX: 0000000000000000 RSI: 00007fce26d0da00 RDI: 0000000000000005 [ 892.816804][ T1065] RBP: 0000000000000005 R08: 000000000000000b R09: 0000000000000000 [ 892.829041][ T1065] R10: 0000000000000000 R11: 0000000000000293 R12: 00007fce26d0da40 [ 892.839315][ T1065] R13: 00000000004d0800 R14: 00000000004df730 R15: 00000000ffffffff [ 892.851628][ T1065] [ 892.851628][ T1065] Showing all locks held in the system: [ 892.861659][ T1065] 1 lock held by khungtaskd/1065: [ 892.870930][ T1065] #0: ffffffff88fa9440 (rcu_read_lock){....}, at: debug_show_all_locks+0x5f/0x27e [ 892.882499][ T1065] 1 lock held by rsyslogd/8495: [ 892.891642][ T1065] #0: ffff88809a165da0 (&f->f_pos_lock){+.+.}, at: __fdget_pos+0xee/0x110 [ 892.902484][ T1065] 2 locks held by getty/8585: [ 892.916088][ T1065] #0: ffff888091394b50 (&tty->ldisc_sem){++++}, at: ldsem_down_read+0x33/0x40 [ 892.929324][ T1065] #1: ffffc90005f292e0 (&ldata->atomic_read_lock){+.+.}, at: n_tty_read+0x232/0x1c10 [ 892.941219][ T1065] 2 locks held by getty/8586: [ 892.950123][ T1065] #0: ffff8880913953d0 (&tty->ldisc_sem){++++}, at: ldsem_down_read+0x33/0x40 [ 892.961291][ T1065] #1: ffffc90005f312e0 (&ldata->atomic_read_lock){+.+.}, at: n_tty_read+0x232/0x1c10 [ 892.977268][ T1065] 2 locks held by getty/8587: [ 892.981950][ T1065] #0: ffff8880915bcb10 (&tty->ldisc_sem){++++}, at: ldsem_down_read+0x33/0x40 [ 892.993083][ T1065] #1: ffffc90005f212e0 (&ldata->atomic_read_lock){+.+.}, at: n_tty_read+0x232/0x1c10 [ 893.008988][ T1065] 2 locks held by getty/8588: [ 893.017982][ T1065] #0: ffff888098d7a110 (&tty->ldisc_sem){++++}, at: ldsem_down_read+0x33/0x40 [ 893.029158][ T1065] #1: ffffc90005f2d2e0 (&ldata->atomic_read_lock){+.+.}, at: n_tty_read+0x232/0x1c10 [ 893.042950][ T1065] 2 locks held by getty/8589: [ 893.050710][ T1065] #0: ffff8880953c6090 (&tty->ldisc_sem){++++}, at: ldsem_down_read+0x33/0x40 [ 893.066403][ T1065] #1: ffffc90005f192e0 (&ldata->atomic_read_lock){+.+.}, at: n_tty_read+0x232/0x1c10 [ 893.079221][ T1065] 2 locks held by getty/8590: [ 893.087095][ T1065] #0: ffff8880953c6910 (&tty->ldisc_sem){++++}, at: ldsem_down_read+0x33/0x40 [ 893.099372][ T1065] #1: ffffc90005f152e0 (&ldata->atomic_read_lock){+.+.}, at: n_tty_read+0x232/0x1c10 [ 893.112182][ T1065] 2 locks held by getty/8591: [ 893.120110][ T1065] #0: ffff8880a88a76d0 (&tty->ldisc_sem){++++}, at: ldsem_down_read+0x33/0x40 [ 893.132347][ T1065] #1: ffffc90005f012e0 (&ldata->atomic_read_lock){+.+.}, at: n_tty_read+0x232/0x1c10 [ 893.148455][ T1065] 2 locks held by syz-executor.0/6402: [ 893.154271][ T1065] #0: ffffffff899f4da8 (cb_lock){++++}, at: genl_rcv+0x1a/0x40 [ 893.161921][ T1065] #1: ffffffff899f4e60 (genl_mutex){+.+.}, at: genl_rcv_msg+0x13e/0x170 [ 893.177759][ T1065] 3 locks held by syz-executor.0/6403: [ 893.185584][ T1065] 2 locks held by syz-executor.3/6414: [ 893.191036][ T1065] #0: ffffffff899f4da8 (cb_lock){++++}, at: genl_rcv+0x1a/0x40 [ 893.203171][ T1065] #1: ffffffff899f4e60 (genl_mutex){+.+.}, at: genl_rcv_msg+0x13e/0x170 [ 893.211608][ T1065] 2 locks held by syz-executor.3/6421: [ 893.217419][ T1065] #0: ffffffff899f4da8 (cb_lock){++++}, at: genl_rcv+0x1a/0x40 [ 893.225347][ T1065] #1: ffffffff899f4e60 (genl_mutex){+.+.}, at: genl_rcv_msg+0x13e/0x170 [ 893.234102][ T1065] [ 893.236437][ T1065] ============================================= [ 893.236437][ T1065] [ 893.245155][ T1065] NMI backtrace for cpu 0 [ 893.249489][ T1065] CPU: 0 PID: 1065 Comm: khungtaskd Not tainted 5.3.0-rc5-next-20190823 #72 [ 893.258150][ T1065] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 893.268194][ T1065] Call Trace: [ 893.271482][ T1065] dump_stack+0x172/0x1f0 [ 893.275811][ T1065] nmi_cpu_backtrace.cold+0x70/0xb2 [ 893.281007][ T1065] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 893.287245][ T1065] ? lapic_can_unplug_cpu.cold+0x45/0x45 [ 893.292879][ T1065] nmi_trigger_cpumask_backtrace+0x23b/0x28b [ 893.298866][ T1065] arch_trigger_cpumask_backtrace+0x14/0x20 [ 893.304753][ T1065] watchdog+0xc99/0x1360 [ 893.308995][ T1065] kthread+0x361/0x430 [ 893.313055][ T1065] ? reset_hung_task_detector+0x30/0x30 [ 893.318596][ T1065] ? kthread_cancel_delayed_work_sync+0x20/0x20 [ 893.324830][ T1065] ret_from_fork+0x24/0x30 [ 893.329434][ T1065] Sending NMI from CPU 0 to CPUs 1: [ 893.335580][ C1] NMI backtrace for cpu 1 [ 893.335587][ C1] CPU: 1 PID: 6403 Comm: syz-executor.0 Not tainted 5.3.0-rc5-next-20190823 #72 [ 893.335592][ C1] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 893.335596][ C1] RIP: 0010:__sanitizer_cov_trace_pc+0x3b/0x50 [ 893.335606][ C1] Code: b2 8f 7e 81 e2 00 01 1f 00 48 8b 75 08 75 2b 8b 90 f8 12 00 00 83 fa 02 75 20 48 8b 88 00 13 00 00 8b 80 fc 12 00 00 48 8b 11 <48> 83 c2 01 48 39 d0 76 07 48 89 34 d1 48 89 11 5d c3 0f 1f 00 65 [ 893.335609][ C1] RSP: 0018:ffff88805b7d6cc0 EFLAGS: 00000246 [ 893.335617][ C1] RAX: 0000000000040000 RBX: 0000000000000000 RCX: ffffc9000633f000 [ 893.335622][ C1] RDX: 000000000003ffff RSI: ffffffff83506503 RDI: 0000000000000001 [ 893.335626][ C1] RBP: ffff88805b7d6cc0 R08: ffff888095a844c0 R09: ffff88805b7d6ee8 [ 893.335631][ C1] R10: ffffed100b6fade9 R11: ffff88805b7d6f4f R12: 0000000000000008 [ 893.335635][ C1] R13: 0000000000000002 R14: ffff88805450d358 R15: ffff88805b7d6ee8 [ 893.335640][ C1] FS: 00007f8c59886700(0000) GS:ffff8880ae900000(0000) knlGS:0000000000000000 [ 893.335644][ C1] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 893.335649][ C1] CR2: ffffffffff600400 CR3: 0000000047d2a000 CR4: 00000000001406e0 [ 893.335653][ C1] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 893.335657][ C1] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 893.335659][ C1] Call Trace: [ 893.335662][ C1] __nla_validate_parse+0x6a3/0x1ed0 [ 893.335665][ C1] ? nla_memcpy+0xb0/0xb0 [ 893.335668][ C1] __nla_parse+0x43/0x60 [ 893.335671][ C1] tipc_nl_publ_dump+0x907/0xd60 [ 893.335674][ C1] ? mark_held_locks+0xa4/0xf0 [ 893.335677][ C1] ? trace_hardirqs_on_thunk+0x1a/0x20 [ 893.335680][ C1] ? trace_hardirqs_on_thunk+0x1a/0x20 [ 893.335683][ C1] ? lockdep_hardirqs_on+0x418/0x5d0 [ 893.335686][ C1] ? retint_kernel+0x2b/0x2b [ 893.335689][ C1] ? trace_hardirqs_on_caller+0x6a/0x240 [ 893.335692][ C1] ? tipc_nl_sk_dump+0x30/0x30 [ 893.335696][ C1] __tipc_nl_compat_dumpit.isra.0+0x21a/0x930 [ 893.335699][ C1] ? __tipc_add_link_prop.isra.0+0x210/0x210 [ 893.335703][ C1] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 893.335705][ C1] ? __phys_addr+0xa4/0x120 [ 893.335708][ C1] ? __nla_put+0x37/0x40 [ 893.335711][ C1] ? nla_put+0x110/0x150 [ 893.335714][ C1] tipc_nl_compat_sk_dump+0x54d/0x970 [ 893.335717][ C1] ? __tipc_nl_compat_dumpit.isra.0+0x930/0x930 [ 893.335720][ C1] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 893.335724][ C1] ? __nla_validate_parse+0x2d0/0x1ed0 [ 893.335726][ C1] ? tipc_nl_sk_dump+0x30/0x30 [ 893.335729][ C1] ? tipc_tlv_sprintf+0x2f0/0x2f0 [ 893.335732][ C1] ? nla_memcpy+0xb0/0xb0 [ 893.335735][ C1] ? __kasan_check_read+0x11/0x20 [ 893.335738][ C1] __tipc_nl_compat_dumpit.isra.0+0x320/0x930 [ 893.335742][ C1] ? __tipc_add_link_prop.isra.0+0x210/0x210 [ 893.335745][ C1] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 893.335748][ C1] ? __phys_addr+0xa4/0x120 [ 893.335751][ C1] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 893.335753][ C1] ? skb_put+0x177/0x1d0 [ 893.335756][ C1] tipc_nl_compat_dumpit+0x24c/0x510 [ 893.335759][ C1] tipc_nl_compat_recv+0x5a0/0xae0 [ 893.335762][ C1] ? tipc_nl_compat_doit+0x5e0/0x5e0 [ 893.335765][ C1] ? mark_held_locks+0xf0/0xf0 [ 893.335768][ C1] ? tipc_dump_start+0x90/0x90 [ 893.335771][ C1] ? __tipc_nl_compat_dumpit.isra.0+0x930/0x930 [ 893.335774][ C1] genl_family_rcv_msg+0x74b/0xf90 [ 893.335777][ C1] ? genl_unregister_family+0x7b0/0x7b0 [ 893.335780][ C1] ? __kasan_check_read+0x11/0x20 [ 893.335783][ C1] ? __lock_acquire+0x1703/0x4e70 [ 893.335786][ C1] ? __dev_queue_xmit+0xbb5/0x3650 [ 893.335789][ C1] genl_rcv_msg+0xca/0x170 [ 893.335792][ C1] netlink_rcv_skb+0x177/0x450 [ 893.335795][ C1] ? genl_family_rcv_msg+0xf90/0xf90 [ 893.335798][ C1] ? netlink_ack+0xb30/0xb30 [ 893.335801][ C1] ? __kasan_check_write+0x14/0x20 [ 893.335803][ C1] ? netlink_deliver_tap+0x254/0xbf0 [ 893.335806][ C1] genl_rcv+0x29/0x40 [ 893.335809][ C1] netlink_unicast+0x531/0x710 [ 893.335812][ C1] ? netlink_attachskb+0x7c0/0x7c0 [ 893.335815][ C1] ? _copy_from_iter_full+0x25d/0x8a0 [ 893.335818][ C1] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 893.335821][ C1] ? __check_object_size+0x3d/0x437 [ 893.335824][ C1] netlink_sendmsg+0x8a5/0xd60 [ 893.335827][ C1] ? netlink_unicast+0x710/0x710 [ 893.335830][ C1] ? aa_sock_msg_perm.isra.0+0xba/0x170 [ 893.335833][ C1] ? apparmor_socket_sendmsg+0x2a/0x30 [ 893.335836][ C1] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 893.335839][ C1] ? security_socket_sendmsg+0x8d/0xc0 [ 893.335842][ C1] ? netlink_unicast+0x710/0x710 [ 893.335845][ C1] sock_sendmsg+0xd7/0x130 [ 893.335848][ C1] ___sys_sendmsg+0x803/0x920 [ 893.335851][ C1] ? copy_msghdr_from_user+0x440/0x440 [ 893.335854][ C1] ? __kasan_check_read+0x11/0x20 [ 893.335856][ C1] ? __fget+0x384/0x560 [ 893.335859][ C1] ? ksys_dup3+0x3e0/0x3e0 [ 893.335862][ C1] ? __fget_light+0x1a9/0x230 [ 893.335864][ C1] ? __fdget+0x1b/0x20 [ 893.335868][ C1] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 893.335871][ C1] __sys_sendmsg+0x105/0x1d0 [ 893.335873][ C1] ? __sys_sendmsg_sock+0xd0/0xd0 [ 893.335877][ C1] ? trace_hardirqs_on_thunk+0x1a/0x20 [ 893.335879][ C1] ? do_syscall_64+0x26/0x760 [ 893.335883][ C1] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 893.335885][ C1] ? do_syscall_64+0x26/0x760 [ 893.335888][ C1] __x64_sys_sendmsg+0x78/0xb0 [ 893.335891][ C1] do_syscall_64+0xfa/0x760 [ 893.335894][ C1] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 893.335897][ C1] RIP: 0033:0x459879 [ 893.335907][ C1] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 893.335910][ C1] RSP: 002b:00007f8c59885c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 893.335918][ C1] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000459879 [ 893.335922][ C1] RDX: 0000000000000000 RSI: 0000000020000500 RDI: 0000000000000004 [ 893.335926][ C1] RBP: 000000000075c070 R08: 0000000000000000 R09: 0000000000000000 [ 893.335930][ C1] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f8c598866d4 [ 893.335935][ C1] R13: 00000000004ce9d8 R14: 00000000004dcc70 R15: 00000000ffffffff [ 893.341042][ T1065] Kernel panic - not syncing: hung_task: blocked tasks [ 893.955852][ T1065] CPU: 0 PID: 1065 Comm: khungtaskd Not tainted 5.3.0-rc5-next-20190823 #72 [ 893.964512][ T1065] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 893.974553][ T1065] Call Trace: [ 893.977863][ T1065] dump_stack+0x172/0x1f0 [ 893.982190][ T1065] panic+0x2dc/0x755 [ 893.986091][ T1065] ? add_taint.cold+0x16/0x16 [ 893.990761][ T1065] ? lapic_can_unplug_cpu.cold+0x45/0x45 [ 893.996392][ T1065] ? ___preempt_schedule+0x16/0x20 [ 894.001502][ T1065] ? nmi_trigger_cpumask_backtrace+0x21b/0x28b [ 894.007646][ T1065] ? nmi_trigger_cpumask_backtrace+0x24c/0x28b [ 894.013788][ T1065] ? nmi_trigger_cpumask_backtrace+0x256/0x28b [ 894.019934][ T1065] ? nmi_trigger_cpumask_backtrace+0x21b/0x28b [ 894.026092][ T1065] watchdog+0xcaa/0x1360 [ 894.030340][ T1065] kthread+0x361/0x430 [ 894.034407][ T1065] ? reset_hung_task_detector+0x30/0x30 [ 894.039954][ T1065] ? kthread_cancel_delayed_work_sync+0x20/0x20 [ 894.046191][ T1065] ret_from_fork+0x24/0x30 [ 894.052162][ T1065] Kernel Offset: disabled [ 894.056497][ T1065] Rebooting in 86400 seconds..