4_sys_ioctl+0x73/0xb0 [ 862.935612][ T2455] do_syscall_64+0x1a3/0x800 [ 862.940241][ T2455] ? syscall_return_slowpath+0x5f0/0x5f0 [ 862.945871][ T2455] ? prepare_exit_to_usermode+0x232/0x3b0 [ 862.951614][ T2455] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 862.957174][ T2455] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 862.963067][ T2455] RIP: 0033:0x457f07 [ 862.966950][ T2455] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 cd b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 862.986546][ T2455] RSP: 002b:00007f5004a43a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 862.994933][ T2455] RAX: ffffffffffffffda RBX: 0000000000000010 RCX: 0000000000457f07 [ 863.002895][ T2455] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 863.010854][ T2455] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 863.018839][ T2455] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 863.026809][ T2455] R13: 0000000000000000 R14: 00000000004dbc38 R15: 0000000000000003 [ 863.125336][ T2455] REISERFS warning (device loop0): super-6506 reiserfs_getopt: empty argument for "jdev" [ 863.125336][ T2455] [ 863.177449][ T2473] REISERFS warning (device loop1): super-6506 reiserfs_getopt: empty argument for "jdev" [ 863.177449][ T2473] 00:27:52 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000480)=@acquire={0x1ac, 0x17, 0x1, 0x0, 0x0, {{@in=@multicast1}, @in6=@ipv4={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffff0], [], @dev}, {@in=@loopback, @in6=@local}, {{@in, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x2}}}, [@tmpl={0x84, 0x5, [{{@in6=@mcast1, 0x0, 0x3c}, 0x0, @in=@multicast1}, {{@in=@remote, 0x0, 0x3c}, 0x0, @in=@broadcast}]}]}, 0x1ac}}, 0x0) 00:27:53 executing program 0 (fault-call:0 fault-nth:12): syz_mount_image$reiserfs(&(0x7f0000000180)='reiserfs\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[@ANYBLOB='jdev=./file0,jdev=']) 00:27:53 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00004e7000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f, 0xf0}, 0xc, &(0x7f0000000440)={&(0x7f00000001c0)=ANY=[@ANYBLOB="1c00000022000100000000000061960d0100000008fe0c009d0a6be0e6d9fc638f19561d6ceb8a6c9239228215fd206cf204e07953", @ANYRES32=0x0], 0x2}, 0x1, 0x0, 0x0, 0xffffffffffffffff}, 0x0) 00:27:53 executing program 2: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(&(0x7f0000000080)=@nbd={'/dev/nbd', 0x0, 0xe000c}, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000240)='hfs\x00\xe6\xa6\xe2\x06g\x96\xb3\v\xf2p\xd5:\x95p\x99\x92\xf2\xc4\x80\x1f\x01\x05\xb8e?\xbfwk\xe4\xe5\xca\x82\xeb\xb1\x04wn*\xf2\xc6\x9d\xc4!\x9e?\x83\x99\x0e\xcc\xa3\x95q.C\xee\x8dIf\xec\xbf\xe8\xb2\t\xedg\x9d\xd9\v\xce\xa3\xa3\xa5\x89F\x03\xefQ\x89\f\xeeRK\x15\xec{D\x9e\x83Z\xabTa\x8e\xcd\x01\xd0\xcfd\xf9c\x87m\xbe>\x81\xba\x9d2\x1c\a,\x12\xbf\xef\xb8m\v\xdf\x8e\xd5\xf5\x1a\xabD\xf6\xe0\x95\xf4\xfeRb_+\xeb\xf9f\xe8\\\x16\xeb\x87\x8e\x8acn4,\x80Q<\x84\xaep\xf9\xfc\x8e\x9f\xed\x06.a\xd5o\x14\r&L\xbd\xb9g\x82;+n\xd5\xcca\v\x86Z\x872\xc3c:`\xf2\x02\xc2\x92\x841\xe7\xca}\"@6}j\x0e\xb7\xa9\xbc\xf3N\xa3\xf3mbd\xfbS\x80\xe0\x11<\x7f\x84\xbe\xa2\xf9\xf7\xee\xf6\x94x\x9d\xe2{\xc5\x83\xc0M\xbb\xd4Io\r\x1c\xd7<\xc0\x84=`\xf1^Y', 0x0, 0x0) 00:27:53 executing program 1: syz_mount_image$reiserfs(&(0x7f0000000180)='reiserfs\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[@ANYBLOB='jdev=']) [ 863.399023][ T2492] FAULT_INJECTION: forcing a failure. [ 863.399023][ T2492] name failslab, interval 1, probability 0, space 0, times 0 [ 863.442549][ T2492] CPU: 0 PID: 2492 Comm: syz-executor0 Not tainted 5.0.0-rc2-next-20190117 #14 [ 863.451531][ T2492] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 863.461701][ T2492] Call Trace: [ 863.465025][ T2492] dump_stack+0x1db/0x2d0 [ 863.469387][ T2492] ? dump_stack_print_info.cold+0x20/0x20 [ 863.475116][ T2492] ? ___might_sleep+0x1e7/0x310 [ 863.479983][ T2492] should_fail.cold+0xa/0x14 [ 863.484585][ T2492] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 863.490424][ T2492] ? ___might_sleep+0x1e7/0x310 [ 863.495280][ T2492] ? arch_local_save_flags+0x50/0x50 [ 863.500580][ T2492] __should_failslab+0x121/0x190 [ 863.505535][ T2492] should_failslab+0x9/0x14 [ 863.510064][ T2492] kmem_cache_alloc+0x2be/0x710 [ 863.515105][ T2492] __kernfs_new_node+0xfe/0x8a0 [ 863.519958][ T2492] ? kasan_check_read+0x11/0x20 [ 863.524815][ T2492] ? kernfs_dop_revalidate+0x3c0/0x3c0 [ 863.530275][ T2492] ? wait_for_completion+0x810/0x810 [ 863.535569][ T2492] ? __lock_is_held+0xb6/0x140 00:27:53 executing program 2: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(&(0x7f0000000080)=@nbd={'/dev/nbd', 0x0, 0xe000e}, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000240)='hfs\x00\xe6\xa6\xe2\x06g\x96\xb3\v\xf2p\xd5:\x95p\x99\x92\xf2\xc4\x80\x1f\x01\x05\xb8e?\xbfwk\xe4\xe5\xca\x82\xeb\xb1\x04wn*\xf2\xc6\x9d\xc4!\x9e?\x83\x99\x0e\xcc\xa3\x95q.C\xee\x8dIf\xec\xbf\xe8\xb2\t\xedg\x9d\xd9\v\xce\xa3\xa3\xa5\x89F\x03\xefQ\x89\f\xeeRK\x15\xec{D\x9e\x83Z\xabTa\x8e\xcd\x01\xd0\xcfd\xf9c\x87m\xbe>\x81\xba\x9d2\x1c\a,\x12\xbf\xef\xb8m\v\xdf\x8e\xd5\xf5\x1a\xabD\xf6\xe0\x95\xf4\xfeRb_+\xeb\xf9f\xe8\\\x16\xeb\x87\x8e\x8acn4,\x80Q<\x84\xaep\xf9\xfc\x8e\x9f\xed\x06.a\xd5o\x14\r&L\xbd\xb9g\x82;+n\xd5\xcca\v\x86Z\x872\xc3c:`\xf2\x02\xc2\x92\x841\xe7\xca}\"@6}j\x0e\xb7\xa9\xbc\xf3N\xa3\xf3mbd\xfbS\x80\xe0\x11<\x7f\x84\xbe\xa2\xf9\xf7\xee\xf6\x94x\x9d\xe2{\xc5\x83\xc0M\xbb\xd4Io\r\x1c\xd7<\xc0\x84=`\xf1^Y', 0x0, 0x0) [ 863.540347][ T2492] ? mutex_unlock+0xd/0x10 [ 863.544762][ T2492] ? kernfs_activate+0x21c/0x2c0 [ 863.549703][ T2492] kernfs_new_node+0x99/0x130 [ 863.554384][ T2492] __kernfs_create_file+0x51/0x340 [ 863.559505][ T2492] sysfs_add_file_mode_ns+0x222/0x560 [ 863.564899][ T2492] internal_create_group+0x3d2/0xd80 [ 863.570196][ T2492] ? remove_files.isra.0+0x190/0x190 [ 863.575509][ T2492] ? down_read+0x120/0x120 [ 863.579938][ T2492] ? resched_curr+0x1a0/0x1a0 [ 863.584657][ T2492] sysfs_create_group+0x20/0x30 00:27:53 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000180)='./control\x00', 0x0) get_thread_area(0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x3) write$binfmt_script(r0, &(0x7f0000000bc0)=ANY=[@ANYBLOB="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"], 0x144) close(r0) execve(&(0x7f0000000180)='./file0\x00', &(0x7f0000000140), &(0x7f0000000140)) r1 = open(&(0x7f0000000000)='./control\x00', 0x80, 0x10) statfs(&(0x7f0000000380)='./control\x00', &(0x7f00000003c0)=""/20) write$P9_RWALK(r0, &(0x7f0000000400)=ANY=[@ANYBLOB="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"], 0x14f) getsockopt$inet_sctp6_SCTP_RTOINFO(r1, 0x84, 0x0, &(0x7f0000000080)={0x0, 0x200, 0x2, 0xffffffff}, &(0x7f0000000100)=0x10) [ 863.589513][ T2492] lo_ioctl+0x1147/0x23e0 [ 863.593856][ T2492] ? lo_rw_aio+0x1e50/0x1e50 [ 863.598465][ T2492] ? __fget+0x473/0x710 [ 863.602661][ T2492] ? lo_rw_aio+0x1e50/0x1e50 [ 863.607295][ T2492] blkdev_ioctl+0x10e0/0x2120 [ 863.611997][ T2492] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 863.618243][ T2492] ? blkpg_ioctl+0xc10/0xc10 [ 863.622842][ T2492] ? lock_downgrade+0xbe0/0xbe0 [ 863.627710][ T2492] ? kasan_check_read+0x11/0x20 [ 863.632573][ T2492] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 00:27:53 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00004e7000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f, 0xa00}, 0xc, &(0x7f0000000440)={&(0x7f00000001c0)=ANY=[@ANYBLOB="1c00000022000100000000000061960d0100000008fe0c009d0a6be0e6d9fc638f19561d6ceb8a6c9239228215fd206cf204e07953", @ANYRES32=0x0], 0x2}, 0x1, 0x0, 0x0, 0xffffffffffffffff}, 0x0) [ 863.638562][ T2492] ? rcu_read_unlock_special+0x380/0x380 [ 863.644212][ T2492] ? __fget+0x49a/0x710 [ 863.648382][ T2492] block_ioctl+0xee/0x130 [ 863.652748][ T2492] ? blkdev_fallocate+0x410/0x410 [ 863.657779][ T2492] do_vfs_ioctl+0x107b/0x17d0 [ 863.662438][ T2492] ? putname+0xef/0x130 [ 863.666590][ T2492] ? ioctl_preallocate+0x2f0/0x2f0 [ 863.671686][ T2492] ? __fget_light+0x2db/0x420 [ 863.676343][ T2492] ? fget_raw+0x20/0x20 [ 863.680480][ T2492] ? do_sys_open+0x3f9/0x7c0 [ 863.685053][ T2492] ? do_syscall_64+0x8c/0x800 [ 863.689711][ T2492] ? do_syscall_64+0x8c/0x800 [ 863.694370][ T2492] ? lockdep_hardirqs_on+0x415/0x5d0 [ 863.699661][ T2492] ? security_file_ioctl+0x93/0xc0 [ 863.704755][ T2492] ksys_ioctl+0xab/0xd0 [ 863.708895][ T2492] __x64_sys_ioctl+0x73/0xb0 [ 863.713480][ T2492] do_syscall_64+0x1a3/0x800 [ 863.718071][ T2492] ? syscall_return_slowpath+0x5f0/0x5f0 [ 863.723683][ T2492] ? prepare_exit_to_usermode+0x232/0x3b0 [ 863.729403][ T2492] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 863.734949][ T2492] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 863.740815][ T2492] RIP: 0033:0x457f07 [ 863.744696][ T2492] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 cd b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 863.764306][ T2492] RSP: 002b:00007f5004a43a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 863.772694][ T2492] RAX: ffffffffffffffda RBX: 0000000000000010 RCX: 0000000000457f07 [ 863.780645][ T2492] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 00:27:53 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000480)=@acquire={0x1ac, 0x17, 0x1, 0x0, 0x0, {{@in=@multicast1}, @in6=@ipv4={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc], [], @dev}, {@in=@loopback, @in6=@local}, {{@in, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x2}}}, [@tmpl={0x84, 0x5, [{{@in6=@mcast1, 0x0, 0x3c}, 0x0, @in=@multicast1}, {{@in=@remote, 0x0, 0x3c}, 0x0, @in=@broadcast}]}]}, 0x1ac}}, 0x0) [ 863.788611][ T2492] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 863.796569][ T2492] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 863.804520][ T2492] R13: 0000000000000000 R14: 00000000004dbc38 R15: 0000000000000003 [ 863.846010][ T2492] REISERFS warning (device loop0): super-6506 reiserfs_getopt: empty argument for "jdev" [ 863.846010][ T2492] [ 863.883938][ T2496] REISERFS warning (device loop1): super-6506 reiserfs_getopt: empty argument for "jdev" [ 863.883938][ T2496] 00:27:53 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000480)=@acquire={0x1ac, 0x17, 0x1, 0x0, 0x0, {{@in=@multicast1}, @in6=@ipv4={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf0ffffffffffff], [], @dev}, {@in=@loopback, @in6=@local}, {{@in, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x2}}}, [@tmpl={0x84, 0x5, [{{@in6=@mcast1, 0x0, 0x3c}, 0x0, @in=@multicast1}, {{@in=@remote, 0x0, 0x3c}, 0x0, @in=@broadcast}]}]}, 0x1ac}}, 0x0) 00:27:53 executing program 2: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(&(0x7f0000000080)=@nbd={'/dev/nbd', 0x0, 0xe0012}, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000240)='hfs\x00\xe6\xa6\xe2\x06g\x96\xb3\v\xf2p\xd5:\x95p\x99\x92\xf2\xc4\x80\x1f\x01\x05\xb8e?\xbfwk\xe4\xe5\xca\x82\xeb\xb1\x04wn*\xf2\xc6\x9d\xc4!\x9e?\x83\x99\x0e\xcc\xa3\x95q.C\xee\x8dIf\xec\xbf\xe8\xb2\t\xedg\x9d\xd9\v\xce\xa3\xa3\xa5\x89F\x03\xefQ\x89\f\xeeRK\x15\xec{D\x9e\x83Z\xabTa\x8e\xcd\x01\xd0\xcfd\xf9c\x87m\xbe>\x81\xba\x9d2\x1c\a,\x12\xbf\xef\xb8m\v\xdf\x8e\xd5\xf5\x1a\xabD\xf6\xe0\x95\xf4\xfeRb_+\xeb\xf9f\xe8\\\x16\xeb\x87\x8e\x8acn4,\x80Q<\x84\xaep\xf9\xfc\x8e\x9f\xed\x06.a\xd5o\x14\r&L\xbd\xb9g\x82;+n\xd5\xcca\v\x86Z\x872\xc3c:`\xf2\x02\xc2\x92\x841\xe7\xca}\"@6}j\x0e\xb7\xa9\xbc\xf3N\xa3\xf3mbd\xfbS\x80\xe0\x11<\x7f\x84\xbe\xa2\xf9\xf7\xee\xf6\x94x\x9d\xe2{\xc5\x83\xc0M\xbb\xd4Io\r\x1c\xd7<\xc0\x84=`\xf1^Y', 0x0, 0x0) 00:27:53 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000180)='./control\x00', 0x0) get_thread_area(0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x3) write$binfmt_script(r0, &(0x7f0000000bc0)=ANY=[@ANYBLOB="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"], 0x145) close(0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', &(0x7f0000000140), &(0x7f0000000140)) r1 = open(&(0x7f0000000000)='./control\x00', 0x80, 0x10) statfs(&(0x7f0000000380)='./control\x00', &(0x7f00000003c0)=""/20) write$P9_RWALK(r0, &(0x7f0000000400)=ANY=[@ANYBLOB="300000006f0100030001030000000400000000000000100000000003000002000000000300000000000000e646f1c5592139cf131e2bf572fa9728dbfac0390865410f3fa1f25743c497e12cb352eac4046b4500f95cfdfb4cf22a3be5c564a47654334c01d5732d382e27bbccd9b903000000c404000000d32dbd21f3ae581d32e69ef9327f7b487d1b4f4502838c08136678bd90733173ab78d6fc264b373611f15c439384ede863ecc86f33e74a14e307490508a39b41394adaba629948536b9cbfaf6fd153ef31439c5bf58116ad346d364e3293ce22b917bee18e0356778d7e12e96945109f9678302ea739b55b8173f4243ec467c6e40248445d0df527c5d637c03c41d500ed9802279fc3d9e4c6767ac0ad7893f64ec0568b7453adce65e06164d0003219476ba93aee62624d6b025582b2917ef27f06eae5af44ea3c7a25d16c5d25a2b04969202ed68056"], 0x14f) getsockopt$inet_sctp6_SCTP_RTOINFO(r1, 0x84, 0x0, &(0x7f0000000080)={0x0, 0x200, 0x2, 0xffffffff}, &(0x7f0000000100)=0x10) 00:27:53 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00004e7000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f, 0xab0}, 0xc, &(0x7f0000000440)={&(0x7f00000001c0)=ANY=[@ANYBLOB="1c00000022000100000000000061960d0100000008fe0c009d0a6be0e6d9fc638f19561d6ceb8a6c9239228215fd206cf204e07953", @ANYRES32=0x0], 0x2}, 0x1, 0x0, 0x0, 0xffffffffffffffff}, 0x0) 00:27:53 executing program 0 (fault-call:0 fault-nth:13): syz_mount_image$reiserfs(&(0x7f0000000180)='reiserfs\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[@ANYBLOB='jdev=./file0,jdev=']) 00:27:53 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000480)=@acquire={0x1ac, 0x17, 0x1, 0x0, 0x0, {{@in=@multicast1}, @in6=@ipv4={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000000000], [], @dev}, {@in=@loopback, @in6=@local}, {{@in, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x2}}}, [@tmpl={0x84, 0x5, [{{@in6=@mcast1, 0x0, 0x3c}, 0x0, @in=@multicast1}, {{@in=@remote, 0x0, 0x3c}, 0x0, @in=@broadcast}]}]}, 0x1ac}}, 0x0) [ 864.216898][ T2540] FAULT_INJECTION: forcing a failure. [ 864.216898][ T2540] name failslab, interval 1, probability 0, space 0, times 0 [ 864.246445][ T2540] CPU: 0 PID: 2540 Comm: syz-executor0 Not tainted 5.0.0-rc2-next-20190117 #14 [ 864.255392][ T2540] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 00:27:54 executing program 1: syz_mount_image$reiserfs(&(0x7f0000000180)='reiserfs\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[@ANYBLOB='jdev=']) 00:27:54 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000180)='./control\x00', 0x0) get_thread_area(0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x3) write$binfmt_script(r0, &(0x7f0000000bc0)=ANY=[@ANYBLOB="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"], 0x145) close(0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', &(0x7f0000000140), &(0x7f0000000140)) r1 = open(&(0x7f0000000000)='./control\x00', 0x80, 0x10) statfs(&(0x7f0000000380)='./control\x00', &(0x7f00000003c0)=""/20) write$P9_RWALK(r0, &(0x7f0000000400)=ANY=[@ANYBLOB="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"], 0x14f) getsockopt$inet_sctp6_SCTP_RTOINFO(r1, 0x84, 0x0, &(0x7f0000000080)={0x0, 0x200, 0x2, 0xffffffff}, &(0x7f0000000100)=0x10) 00:27:54 executing program 2: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(&(0x7f0000000080)=@nbd={'/dev/nbd', 0x0, 0xe0014}, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000240)='hfs\x00\xe6\xa6\xe2\x06g\x96\xb3\v\xf2p\xd5:\x95p\x99\x92\xf2\xc4\x80\x1f\x01\x05\xb8e?\xbfwk\xe4\xe5\xca\x82\xeb\xb1\x04wn*\xf2\xc6\x9d\xc4!\x9e?\x83\x99\x0e\xcc\xa3\x95q.C\xee\x8dIf\xec\xbf\xe8\xb2\t\xedg\x9d\xd9\v\xce\xa3\xa3\xa5\x89F\x03\xefQ\x89\f\xeeRK\x15\xec{D\x9e\x83Z\xabTa\x8e\xcd\x01\xd0\xcfd\xf9c\x87m\xbe>\x81\xba\x9d2\x1c\a,\x12\xbf\xef\xb8m\v\xdf\x8e\xd5\xf5\x1a\xabD\xf6\xe0\x95\xf4\xfeRb_+\xeb\xf9f\xe8\\\x16\xeb\x87\x8e\x8acn4,\x80Q<\x84\xaep\xf9\xfc\x8e\x9f\xed\x06.a\xd5o\x14\r&L\xbd\xb9g\x82;+n\xd5\xcca\v\x86Z\x872\xc3c:`\xf2\x02\xc2\x92\x841\xe7\xca}\"@6}j\x0e\xb7\xa9\xbc\xf3N\xa3\xf3mbd\xfbS\x80\xe0\x11<\x7f\x84\xbe\xa2\xf9\xf7\xee\xf6\x94x\x9d\xe2{\xc5\x83\xc0M\xbb\xd4Io\r\x1c\xd7<\xc0\x84=`\xf1^Y', 0x0, 0x0) 00:27:54 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00004e7000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f, 0xe00}, 0xc, &(0x7f0000000440)={&(0x7f00000001c0)=ANY=[@ANYBLOB="1c00000022000100000000000061960d0100000008fe0c009d0a6be0e6d9fc638f19561d6ceb8a6c9239228215fd206cf204e07953", @ANYRES32=0x0], 0x2}, 0x1, 0x0, 0x0, 0xffffffffffffffff}, 0x0) [ 864.265582][ T2540] Call Trace: [ 864.268897][ T2540] dump_stack+0x1db/0x2d0 [ 864.273240][ T2540] ? dump_stack_print_info.cold+0x20/0x20 [ 864.278972][ T2540] ? ___might_sleep+0x1e7/0x310 [ 864.283838][ T2540] should_fail.cold+0xa/0x14 [ 864.288429][ T2540] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 864.294264][ T2540] ? ___might_sleep+0x1e7/0x310 [ 864.299118][ T2540] ? arch_local_save_flags+0x50/0x50 [ 864.304418][ T2540] __should_failslab+0x121/0x190 [ 864.309368][ T2540] should_failslab+0x9/0x14 [ 864.313870][ T2540] kmem_cache_alloc+0x2be/0x710 [ 864.318712][ T2540] __kernfs_new_node+0xfe/0x8a0 [ 864.323572][ T2540] ? kasan_check_read+0x11/0x20 [ 864.328408][ T2540] ? kernfs_dop_revalidate+0x3c0/0x3c0 [ 864.333848][ T2540] ? wait_for_completion+0x810/0x810 [ 864.339135][ T2540] ? __lock_is_held+0xb6/0x140 [ 864.343906][ T2540] ? mutex_unlock+0xd/0x10 [ 864.348321][ T2540] ? kernfs_activate+0x21c/0x2c0 [ 864.353254][ T2540] kernfs_new_node+0x99/0x130 [ 864.357944][ T2540] __kernfs_create_file+0x51/0x340 [ 864.363073][ T2540] sysfs_add_file_mode_ns+0x222/0x560 [ 864.368429][ T2540] internal_create_group+0x3d2/0xd80 [ 864.373696][ T2540] ? remove_files.isra.0+0x190/0x190 [ 864.378956][ T2540] ? down_read+0x120/0x120 [ 864.383409][ T2540] ? resched_curr+0x1a0/0x1a0 [ 864.388071][ T2540] sysfs_create_group+0x20/0x30 [ 864.392915][ T2540] lo_ioctl+0x1147/0x23e0 [ 864.397276][ T2540] ? lo_rw_aio+0x1e50/0x1e50 [ 864.401872][ T2540] ? __fget+0x473/0x710 [ 864.406027][ T2540] ? lo_rw_aio+0x1e50/0x1e50 [ 864.410628][ T2540] blkdev_ioctl+0x10e0/0x2120 [ 864.415286][ T2540] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 864.421519][ T2540] ? blkpg_ioctl+0xc10/0xc10 [ 864.426089][ T2540] ? lock_downgrade+0xbe0/0xbe0 [ 864.430916][ T2540] ? kasan_check_read+0x11/0x20 [ 864.435767][ T2540] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 864.441753][ T2540] ? rcu_read_unlock_special+0x380/0x380 [ 864.447436][ T2540] ? __fget+0x49a/0x710 [ 864.451643][ T2540] block_ioctl+0xee/0x130 [ 864.455974][ T2540] ? blkdev_fallocate+0x410/0x410 [ 864.461009][ T2540] do_vfs_ioctl+0x107b/0x17d0 [ 864.465722][ T2540] ? putname+0xef/0x130 [ 864.469869][ T2540] ? ioctl_preallocate+0x2f0/0x2f0 [ 864.474972][ T2540] ? __fget_light+0x2db/0x420 [ 864.479713][ T2540] ? fget_raw+0x20/0x20 [ 864.483885][ T2540] ? do_sys_open+0x3f9/0x7c0 [ 864.488470][ T2540] ? do_syscall_64+0x8c/0x800 [ 864.493145][ T2540] ? do_syscall_64+0x8c/0x800 [ 864.497814][ T2540] ? lockdep_hardirqs_on+0x415/0x5d0 [ 864.503078][ T2540] ? security_file_ioctl+0x93/0xc0 [ 864.508207][ T2540] ksys_ioctl+0xab/0xd0 [ 864.512358][ T2540] __x64_sys_ioctl+0x73/0xb0 [ 864.516958][ T2540] do_syscall_64+0x1a3/0x800 [ 864.521541][ T2540] ? syscall_return_slowpath+0x5f0/0x5f0 [ 864.527186][ T2540] ? prepare_exit_to_usermode+0x232/0x3b0 [ 864.532905][ T2540] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 864.538460][ T2540] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 864.544342][ T2540] RIP: 0033:0x457f07 [ 864.548215][ T2540] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 cd b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 864.567803][ T2540] RSP: 002b:00007f5004a43a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 864.576233][ T2540] RAX: ffffffffffffffda RBX: 0000000000000010 RCX: 0000000000457f07 [ 864.584203][ T2540] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 864.592153][ T2540] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 864.600127][ T2540] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 864.608095][ T2540] R13: 0000000000000000 R14: 00000000004dbc38 R15: 0000000000000003 [ 864.700787][ T2540] REISERFS warning (device loop0): super-6506 reiserfs_getopt: empty argument for "jdev" [ 864.700787][ T2540] [ 864.704591][ T2544] REISERFS warning (device loop1): super-6506 reiserfs_getopt: empty argument for "jdev" [ 864.704591][ T2544] 00:27:54 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000480)=@acquire={0x1ac, 0x17, 0x1, 0x0, 0x0, {{@in=@multicast1}, @in6=@ipv4={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000000000], [], @dev}, {@in=@loopback, @in6=@local}, {{@in, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x2}}}, [@tmpl={0x84, 0x5, [{{@in6=@mcast1, 0x0, 0x3c}, 0x0, @in=@multicast1}, {{@in=@remote, 0x0, 0x3c}, 0x0, @in=@broadcast}]}]}, 0x1ac}}, 0x0) 00:27:54 executing program 2: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(&(0x7f0000000080)=@nbd={'/dev/nbd', 0x0, 0xe0023}, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000240)='hfs\x00\xe6\xa6\xe2\x06g\x96\xb3\v\xf2p\xd5:\x95p\x99\x92\xf2\xc4\x80\x1f\x01\x05\xb8e?\xbfwk\xe4\xe5\xca\x82\xeb\xb1\x04wn*\xf2\xc6\x9d\xc4!\x9e?\x83\x99\x0e\xcc\xa3\x95q.C\xee\x8dIf\xec\xbf\xe8\xb2\t\xedg\x9d\xd9\v\xce\xa3\xa3\xa5\x89F\x03\xefQ\x89\f\xeeRK\x15\xec{D\x9e\x83Z\xabTa\x8e\xcd\x01\xd0\xcfd\xf9c\x87m\xbe>\x81\xba\x9d2\x1c\a,\x12\xbf\xef\xb8m\v\xdf\x8e\xd5\xf5\x1a\xabD\xf6\xe0\x95\xf4\xfeRb_+\xeb\xf9f\xe8\\\x16\xeb\x87\x8e\x8acn4,\x80Q<\x84\xaep\xf9\xfc\x8e\x9f\xed\x06.a\xd5o\x14\r&L\xbd\xb9g\x82;+n\xd5\xcca\v\x86Z\x872\xc3c:`\xf2\x02\xc2\x92\x841\xe7\xca}\"@6}j\x0e\xb7\xa9\xbc\xf3N\xa3\xf3mbd\xfbS\x80\xe0\x11<\x7f\x84\xbe\xa2\xf9\xf7\xee\xf6\x94x\x9d\xe2{\xc5\x83\xc0M\xbb\xd4Io\r\x1c\xd7<\xc0\x84=`\xf1^Y', 0x0, 0x0) 00:27:54 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00004e7000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f, 0x6000}, 0xc, &(0x7f0000000440)={&(0x7f00000001c0)=ANY=[@ANYBLOB="1c00000022000100000000000061960d0100000008fe0c009d0a6be0e6d9fc638f19561d6ceb8a6c9239228215fd206cf204e07953", @ANYRES32=0x0], 0x2}, 0x1, 0x0, 0x0, 0xffffffffffffffff}, 0x0) 00:27:54 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000180)='./control\x00', 0x0) get_thread_area(0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x3) write$binfmt_script(r0, &(0x7f0000000bc0)=ANY=[@ANYBLOB="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"], 0x145) close(0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', &(0x7f0000000140), &(0x7f0000000140)) r1 = open(&(0x7f0000000000)='./control\x00', 0x80, 0x10) statfs(&(0x7f0000000380)='./control\x00', &(0x7f00000003c0)=""/20) write$P9_RWALK(r0, &(0x7f0000000400)=ANY=[@ANYBLOB="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"], 0x14f) getsockopt$inet_sctp6_SCTP_RTOINFO(r1, 0x84, 0x0, &(0x7f0000000080)={0x0, 0x200, 0x2, 0xffffffff}, &(0x7f0000000100)=0x10) 00:27:54 executing program 2: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(&(0x7f0000000080)=@nbd={'/dev/nbd', 0x0, 0xe0024}, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000240)='hfs\x00\xe6\xa6\xe2\x06g\x96\xb3\v\xf2p\xd5:\x95p\x99\x92\xf2\xc4\x80\x1f\x01\x05\xb8e?\xbfwk\xe4\xe5\xca\x82\xeb\xb1\x04wn*\xf2\xc6\x9d\xc4!\x9e?\x83\x99\x0e\xcc\xa3\x95q.C\xee\x8dIf\xec\xbf\xe8\xb2\t\xedg\x9d\xd9\v\xce\xa3\xa3\xa5\x89F\x03\xefQ\x89\f\xeeRK\x15\xec{D\x9e\x83Z\xabTa\x8e\xcd\x01\xd0\xcfd\xf9c\x87m\xbe>\x81\xba\x9d2\x1c\a,\x12\xbf\xef\xb8m\v\xdf\x8e\xd5\xf5\x1a\xabD\xf6\xe0\x95\xf4\xfeRb_+\xeb\xf9f\xe8\\\x16\xeb\x87\x8e\x8acn4,\x80Q<\x84\xaep\xf9\xfc\x8e\x9f\xed\x06.a\xd5o\x14\r&L\xbd\xb9g\x82;+n\xd5\xcca\v\x86Z\x872\xc3c:`\xf2\x02\xc2\x92\x841\xe7\xca}\"@6}j\x0e\xb7\xa9\xbc\xf3N\xa3\xf3mbd\xfbS\x80\xe0\x11<\x7f\x84\xbe\xa2\xf9\xf7\xee\xf6\x94x\x9d\xe2{\xc5\x83\xc0M\xbb\xd4Io\r\x1c\xd7<\xc0\x84=`\xf1^Y', 0x0, 0x0) 00:27:54 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000480)=@acquire={0x1ac, 0x17, 0x1, 0x0, 0x0, {{@in=@multicast1}, @in6=@ipv4={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x300000000000000], [], @dev}, {@in=@loopback, @in6=@local}, {{@in, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x2}}}, [@tmpl={0x84, 0x5, [{{@in6=@mcast1, 0x0, 0x3c}, 0x0, @in=@multicast1}, {{@in=@remote, 0x0, 0x3c}, 0x0, @in=@broadcast}]}]}, 0x1ac}}, 0x0) 00:27:54 executing program 0 (fault-call:0 fault-nth:14): syz_mount_image$reiserfs(&(0x7f0000000180)='reiserfs\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[@ANYBLOB='jdev=./file0,jdev=']) 00:27:54 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000180)='./control\x00', 0x0) get_thread_area(0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x3) write$binfmt_script(r0, &(0x7f0000000bc0)=ANY=[@ANYBLOB="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"], 0x143) close(r0) execve(&(0x7f0000000180)='./file0\x00', &(0x7f0000000140), &(0x7f0000000140)) r1 = open(&(0x7f0000000000)='./control\x00', 0x80, 0x10) statfs(&(0x7f0000000380)='./control\x00', &(0x7f00000003c0)=""/20) write$P9_RWALK(r0, &(0x7f0000000400)=ANY=[@ANYBLOB="300000006f0100030001030000000400000000000000100000000003000002000000000300000000000000e646f1c5592139cf131e2bf572fa9728dbfac0390865410f3fa1f25743c497e12cb352eac4046b4500f95cfdfb4cf22a3be5c564a47654334c01d5732d382e27bbccd9b903000000c404000000d32dbd21f3ae581d32e69ef9327f7b487d1b4f4502838c08136678bd90733173ab78d6fc264b373611f15c439384ede863ecc86f33e74a14e307490508a39b41394adaba629948536b9cbfaf6fd153ef31439c5bf58116ad346d364e3293ce22b917bee18e0356778d7e12e96945109f9678302ea739b55b8173f4243ec467c6e40248445d0df527c5d637c03c41d500ed9802279fc3d9e4c6767ac0ad7893f64ec0568b7453adce65e06164d0003219476ba93aee62624d6b025582b2917ef27f06eae5af44ea3c7a25d16c5d25a2b04969202ed68056"], 0x14f) getsockopt$inet_sctp6_SCTP_RTOINFO(r1, 0x84, 0x0, &(0x7f0000000080)={0x0, 0x200, 0x2, 0xffffffff}, &(0x7f0000000100)=0x10) 00:27:54 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000180)='./control\x00', 0x0) get_thread_area(0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x3) write$binfmt_script(r0, &(0x7f0000000bc0)=ANY=[@ANYBLOB="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"], 0x145) close(r0) execve(0x0, &(0x7f0000000140), &(0x7f0000000140)) r1 = open(&(0x7f0000000000)='./control\x00', 0x80, 0x10) statfs(&(0x7f0000000380)='./control\x00', &(0x7f00000003c0)=""/20) write$P9_RWALK(r0, &(0x7f0000000400)=ANY=[@ANYBLOB="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"], 0x14f) getsockopt$inet_sctp6_SCTP_RTOINFO(r1, 0x84, 0x0, &(0x7f0000000080)={0x0, 0x200, 0x2, 0xffffffff}, &(0x7f0000000100)=0x10) 00:27:54 executing program 2: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(&(0x7f0000000080)=@nbd={'/dev/nbd', 0x0, 0xe002c}, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000240)='hfs\x00\xe6\xa6\xe2\x06g\x96\xb3\v\xf2p\xd5:\x95p\x99\x92\xf2\xc4\x80\x1f\x01\x05\xb8e?\xbfwk\xe4\xe5\xca\x82\xeb\xb1\x04wn*\xf2\xc6\x9d\xc4!\x9e?\x83\x99\x0e\xcc\xa3\x95q.C\xee\x8dIf\xec\xbf\xe8\xb2\t\xedg\x9d\xd9\v\xce\xa3\xa3\xa5\x89F\x03\xefQ\x89\f\xeeRK\x15\xec{D\x9e\x83Z\xabTa\x8e\xcd\x01\xd0\xcfd\xf9c\x87m\xbe>\x81\xba\x9d2\x1c\a,\x12\xbf\xef\xb8m\v\xdf\x8e\xd5\xf5\x1a\xabD\xf6\xe0\x95\xf4\xfeRb_+\xeb\xf9f\xe8\\\x16\xeb\x87\x8e\x8acn4,\x80Q<\x84\xaep\xf9\xfc\x8e\x9f\xed\x06.a\xd5o\x14\r&L\xbd\xb9g\x82;+n\xd5\xcca\v\x86Z\x872\xc3c:`\xf2\x02\xc2\x92\x841\xe7\xca}\"@6}j\x0e\xb7\xa9\xbc\xf3N\xa3\xf3mbd\xfbS\x80\xe0\x11<\x7f\x84\xbe\xa2\xf9\xf7\xee\xf6\x94x\x9d\xe2{\xc5\x83\xc0M\xbb\xd4Io\r\x1c\xd7<\xc0\x84=`\xf1^Y', 0x0, 0x0) 00:27:54 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000480)=@acquire={0x1ac, 0x17, 0x1, 0x0, 0x0, {{@in=@multicast1}, @in6=@ipv4={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400000000000000], [], @dev}, {@in=@loopback, @in6=@local}, {{@in, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x2}}}, [@tmpl={0x84, 0x5, [{{@in6=@mcast1, 0x0, 0x3c}, 0x0, @in=@multicast1}, {{@in=@remote, 0x0, 0x3c}, 0x0, @in=@broadcast}]}]}, 0x1ac}}, 0x0) [ 865.075798][ T2588] FAULT_INJECTION: forcing a failure. [ 865.075798][ T2588] name failslab, interval 1, probability 0, space 0, times 0 [ 865.121847][ T2588] CPU: 1 PID: 2588 Comm: syz-executor0 Not tainted 5.0.0-rc2-next-20190117 #14 [ 865.130802][ T2588] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 865.140962][ T2588] Call Trace: [ 865.144268][ T2588] dump_stack+0x1db/0x2d0 [ 865.148617][ T2588] ? dump_stack_print_info.cold+0x20/0x20 [ 865.154357][ T2588] ? add_lock_to_list.isra.0+0x450/0x450 [ 865.160008][ T2588] ? kernfs_activate+0x8f/0x2c0 [ 865.164881][ T2588] should_fail.cold+0xa/0x14 00:27:54 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00004e7000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f, 0xb00a}, 0xc, &(0x7f0000000440)={&(0x7f00000001c0)=ANY=[@ANYBLOB="1c00000022000100000000000061960d0100000008fe0c009d0a6be0e6d9fc638f19561d6ceb8a6c9239228215fd206cf204e07953", @ANYRES32=0x0], 0x2}, 0x1, 0x0, 0x0, 0xffffffffffffffff}, 0x0) 00:27:54 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000180)='./control\x00', 0x0) get_thread_area(0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x3) write$binfmt_script(r0, &(0x7f0000000bc0)=ANY=[@ANYBLOB="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"], 0x145) close(0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', &(0x7f0000000140), &(0x7f0000000140)) r1 = open(&(0x7f0000000000)='./control\x00', 0x80, 0x10) statfs(&(0x7f0000000380)='./control\x00', &(0x7f00000003c0)=""/20) write$P9_RWALK(r0, &(0x7f0000000400)=ANY=[@ANYBLOB="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"], 0x14f) getsockopt$inet_sctp6_SCTP_RTOINFO(r1, 0x84, 0x0, &(0x7f0000000080)={0x0, 0x200, 0x2, 0xffffffff}, &(0x7f0000000100)=0x10) [ 865.169479][ T2588] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 865.175301][ T2588] ? ___might_sleep+0x1e7/0x310 [ 865.180152][ T2588] ? arch_local_save_flags+0x50/0x50 [ 865.185448][ T2588] __should_failslab+0x121/0x190 [ 865.190397][ T2588] should_failslab+0x9/0x14 [ 865.194963][ T2588] kmem_cache_alloc+0x2be/0x710 [ 865.199829][ T2588] ? __mutex_unlock_slowpath+0x195/0x870 [ 865.205449][ T2588] __kernfs_new_node+0xfe/0x8a0 [ 865.210288][ T2588] ? kernfs_dop_revalidate+0x3c0/0x3c0 [ 865.215748][ T2588] ? mutex_unlock+0xd/0x10 [ 865.220164][ T2588] ? kernfs_activate+0x21c/0x2c0 [ 865.225099][ T2588] ? kernfs_walk_and_get_ns+0x340/0x340 [ 865.230650][ T2588] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 865.236872][ T2588] ? kernfs_link_sibling+0x210/0x420 [ 865.242150][ T2588] kernfs_new_node+0x99/0x130 [ 865.246838][ T2588] __kernfs_create_file+0x51/0x340 [ 865.251932][ T2588] sysfs_add_file_mode_ns+0x222/0x560 [ 865.257307][ T2588] internal_create_group+0x3d2/0xd80 [ 865.262632][ T2588] ? remove_files.isra.0+0x190/0x190 [ 865.267905][ T2588] ? down_read+0x120/0x120 [ 865.272307][ T2588] ? resched_curr+0x1a0/0x1a0 [ 865.276975][ T2588] sysfs_create_group+0x20/0x30 [ 865.281817][ T2588] lo_ioctl+0x1147/0x23e0 [ 865.286132][ T2588] ? lo_rw_aio+0x1e50/0x1e50 [ 865.290708][ T2588] ? __fget+0x473/0x710 [ 865.294845][ T2588] ? lo_rw_aio+0x1e50/0x1e50 [ 865.299454][ T2588] blkdev_ioctl+0x10e0/0x2120 [ 865.304117][ T2588] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 865.310334][ T2588] ? blkpg_ioctl+0xc10/0xc10 [ 865.314942][ T2588] ? lock_downgrade+0xbe0/0xbe0 [ 865.319793][ T2588] ? kasan_check_read+0x11/0x20 [ 865.324636][ T2588] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 865.330599][ T2588] ? rcu_read_unlock_special+0x380/0x380 [ 865.336285][ T2588] ? __fget+0x49a/0x710 [ 865.340441][ T2588] block_ioctl+0xee/0x130 [ 865.344770][ T2588] ? blkdev_fallocate+0x410/0x410 [ 865.349782][ T2588] do_vfs_ioctl+0x107b/0x17d0 [ 865.354460][ T2588] ? putname+0xef/0x130 [ 865.358606][ T2588] ? ioctl_preallocate+0x2f0/0x2f0 [ 865.363756][ T2588] ? __fget_light+0x2db/0x420 [ 865.368413][ T2588] ? fget_raw+0x20/0x20 [ 865.372549][ T2588] ? do_sys_open+0x3f9/0x7c0 [ 865.377149][ T2588] ? do_syscall_64+0x8c/0x800 [ 865.381804][ T2588] ? do_syscall_64+0x8c/0x800 [ 865.386472][ T2588] ? lockdep_hardirqs_on+0x415/0x5d0 [ 865.391753][ T2588] ? security_file_ioctl+0x93/0xc0 [ 865.396845][ T2588] ksys_ioctl+0xab/0xd0 [ 865.400992][ T2588] __x64_sys_ioctl+0x73/0xb0 [ 865.405578][ T2588] do_syscall_64+0x1a3/0x800 [ 865.410148][ T2588] ? syscall_return_slowpath+0x5f0/0x5f0 [ 865.415761][ T2588] ? prepare_exit_to_usermode+0x232/0x3b0 [ 865.421463][ T2588] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 865.426989][ T2588] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 865.432856][ T2588] RIP: 0033:0x457f07 [ 865.436750][ T2588] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 cd b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 865.456332][ T2588] RSP: 002b:00007f5004a43a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 865.464721][ T2588] RAX: ffffffffffffffda RBX: 0000000000000010 RCX: 0000000000457f07 [ 865.472683][ T2588] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 865.480647][ T2588] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 865.488593][ T2588] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 865.496546][ T2588] R13: 0000000000000000 R14: 00000000004dbc38 R15: 0000000000000003 [ 865.585018][ T2588] REISERFS warning (device loop0): super-6506 reiserfs_getopt: empty argument for "jdev" [ 865.585018][ T2588] 00:27:55 executing program 2: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(&(0x7f0000000080)=@nbd={'/dev/nbd', 0x0, 0xe0034}, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000240)='hfs\x00\xe6\xa6\xe2\x06g\x96\xb3\v\xf2p\xd5:\x95p\x99\x92\xf2\xc4\x80\x1f\x01\x05\xb8e?\xbfwk\xe4\xe5\xca\x82\xeb\xb1\x04wn*\xf2\xc6\x9d\xc4!\x9e?\x83\x99\x0e\xcc\xa3\x95q.C\xee\x8dIf\xec\xbf\xe8\xb2\t\xedg\x9d\xd9\v\xce\xa3\xa3\xa5\x89F\x03\xefQ\x89\f\xeeRK\x15\xec{D\x9e\x83Z\xabTa\x8e\xcd\x01\xd0\xcfd\xf9c\x87m\xbe>\x81\xba\x9d2\x1c\a,\x12\xbf\xef\xb8m\v\xdf\x8e\xd5\xf5\x1a\xabD\xf6\xe0\x95\xf4\xfeRb_+\xeb\xf9f\xe8\\\x16\xeb\x87\x8e\x8acn4,\x80Q<\x84\xaep\xf9\xfc\x8e\x9f\xed\x06.a\xd5o\x14\r&L\xbd\xb9g\x82;+n\xd5\xcca\v\x86Z\x872\xc3c:`\xf2\x02\xc2\x92\x841\xe7\xca}\"@6}j\x0e\xb7\xa9\xbc\xf3N\xa3\xf3mbd\xfbS\x80\xe0\x11<\x7f\x84\xbe\xa2\xf9\xf7\xee\xf6\x94x\x9d\xe2{\xc5\x83\xc0M\xbb\xd4Io\r\x1c\xd7<\xc0\x84=`\xf1^Y', 0x0, 0x0) 00:27:55 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000480)=@acquire={0x1ac, 0x17, 0x1, 0x0, 0x0, {{@in=@multicast1}, @in6=@ipv4={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x500000000000000], [], @dev}, {@in=@loopback, @in6=@local}, {{@in, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x2}}}, [@tmpl={0x84, 0x5, [{{@in6=@mcast1, 0x0, 0x3c}, 0x0, @in=@multicast1}, {{@in=@remote, 0x0, 0x3c}, 0x0, @in=@broadcast}]}]}, 0x1ac}}, 0x0) 00:27:55 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000180)='./control\x00', 0x0) get_thread_area(0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x3) write$binfmt_script(r0, &(0x7f0000000bc0)=ANY=[@ANYBLOB="2321202e2f66696c6530202357994f66e76f4d0fe2208456ebfa69074cb94144c95c4375644bd1747e34c127d80575d10a599f851dc7ad26f3fa377c0a53cc7be2512b7493bf864ecf3f13e46032dbbf3af349b06321cec7a0652f4a5768256cd01a2d3d52de67dc459409a1e50ca51334791c8690646f7a1962ccefc0592a163bacf13da16978ca48eb3784c5baa40700ebfddde7e115f9388051297af49e38e0e3210d232e108a7e9b69c2e56676484906d975d537d128607c901050484e2bdb0d042a40c8ff8f4727cde00677ea73dac796f06f6f7ef7b3406723e7da9fb469c4ce44faff2888c779c000000000000000000000dc4fd7f68b303f980ed08fb24c8052b0626c8b3733eeee64a90f35fd7d88f958406cb5a8ed3b20b7d1278e15c1e1012befbc45a45f203503128d3a99b80bc2c744ae4b8509ca0149b48dc3e11c2d5db4"], 0x145) close(r0) execve(0x0, &(0x7f0000000140), &(0x7f0000000140)) r1 = open(&(0x7f0000000000)='./control\x00', 0x80, 0x10) statfs(&(0x7f0000000380)='./control\x00', &(0x7f00000003c0)=""/20) write$P9_RWALK(r0, &(0x7f0000000400)=ANY=[@ANYBLOB="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"], 0x14f) getsockopt$inet_sctp6_SCTP_RTOINFO(r1, 0x84, 0x0, &(0x7f0000000080)={0x0, 0x200, 0x2, 0xffffffff}, &(0x7f0000000100)=0x10) 00:27:55 executing program 0 (fault-call:0 fault-nth:15): syz_mount_image$reiserfs(&(0x7f0000000180)='reiserfs\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[@ANYBLOB='jdev=./file0,jdev=']) 00:27:55 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000180)='./control\x00', 0x0) get_thread_area(0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x3) write$binfmt_script(r0, &(0x7f0000000bc0)=ANY=[@ANYBLOB="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"], 0x143) close(r0) execve(&(0x7f0000000180)='./file0\x00', &(0x7f0000000140), &(0x7f0000000140)) r1 = open(&(0x7f0000000000)='./control\x00', 0x80, 0x10) statfs(&(0x7f0000000380)='./control\x00', &(0x7f00000003c0)=""/20) write$P9_RWALK(r0, &(0x7f0000000400)=ANY=[@ANYBLOB="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"], 0x14f) getsockopt$inet_sctp6_SCTP_RTOINFO(r1, 0x84, 0x0, &(0x7f0000000080)={0x0, 0x200, 0x2, 0xffffffff}, &(0x7f0000000100)=0x10) 00:27:55 executing program 2: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(&(0x7f0000000080)=@nbd={'/dev/nbd', 0x0, 0xe0062}, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000240)='hfs\x00\xe6\xa6\xe2\x06g\x96\xb3\v\xf2p\xd5:\x95p\x99\x92\xf2\xc4\x80\x1f\x01\x05\xb8e?\xbfwk\xe4\xe5\xca\x82\xeb\xb1\x04wn*\xf2\xc6\x9d\xc4!\x9e?\x83\x99\x0e\xcc\xa3\x95q.C\xee\x8dIf\xec\xbf\xe8\xb2\t\xedg\x9d\xd9\v\xce\xa3\xa3\xa5\x89F\x03\xefQ\x89\f\xeeRK\x15\xec{D\x9e\x83Z\xabTa\x8e\xcd\x01\xd0\xcfd\xf9c\x87m\xbe>\x81\xba\x9d2\x1c\a,\x12\xbf\xef\xb8m\v\xdf\x8e\xd5\xf5\x1a\xabD\xf6\xe0\x95\xf4\xfeRb_+\xeb\xf9f\xe8\\\x16\xeb\x87\x8e\x8acn4,\x80Q<\x84\xaep\xf9\xfc\x8e\x9f\xed\x06.a\xd5o\x14\r&L\xbd\xb9g\x82;+n\xd5\xcca\v\x86Z\x872\xc3c:`\xf2\x02\xc2\x92\x841\xe7\xca}\"@6}j\x0e\xb7\xa9\xbc\xf3N\xa3\xf3mbd\xfbS\x80\xe0\x11<\x7f\x84\xbe\xa2\xf9\xf7\xee\xf6\x94x\x9d\xe2{\xc5\x83\xc0M\xbb\xd4Io\r\x1c\xd7<\xc0\x84=`\xf1^Y', 0x0, 0x0) 00:27:55 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000480)=@acquire={0x1ac, 0x17, 0x1, 0x0, 0x0, {{@in=@multicast1}, @in6=@ipv4={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x600000000000000], [], @dev}, {@in=@loopback, @in6=@local}, {{@in, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x2}}}, [@tmpl={0x84, 0x5, [{{@in6=@mcast1, 0x0, 0x3c}, 0x0, @in=@multicast1}, {{@in=@remote, 0x0, 0x3c}, 0x0, @in=@broadcast}]}]}, 0x1ac}}, 0x0) 00:27:55 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00004e7000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f, 0xf000}, 0xc, &(0x7f0000000440)={&(0x7f00000001c0)=ANY=[@ANYBLOB="1c00000022000100000000000061960d0100000008fe0c009d0a6be0e6d9fc638f19561d6ceb8a6c9239228215fd206cf204e07953", @ANYRES32=0x0], 0x2}, 0x1, 0x0, 0x0, 0xffffffffffffffff}, 0x0) [ 865.879101][ T2620] FAULT_INJECTION: forcing a failure. [ 865.879101][ T2620] name failslab, interval 1, probability 0, space 0, times 0 00:27:55 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000180)='./control\x00', 0x0) get_thread_area(0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x3) write$binfmt_script(r0, &(0x7f0000000bc0)=ANY=[@ANYBLOB="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"], 0x145) close(r0) execve(0x0, &(0x7f0000000140), &(0x7f0000000140)) r1 = open(&(0x7f0000000000)='./control\x00', 0x80, 0x10) statfs(&(0x7f0000000380)='./control\x00', &(0x7f00000003c0)=""/20) write$P9_RWALK(r0, &(0x7f0000000400)=ANY=[@ANYBLOB="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"], 0x14f) getsockopt$inet_sctp6_SCTP_RTOINFO(r1, 0x84, 0x0, &(0x7f0000000080)={0x0, 0x200, 0x2, 0xffffffff}, &(0x7f0000000100)=0x10) [ 865.921365][ T2620] CPU: 1 PID: 2620 Comm: syz-executor0 Not tainted 5.0.0-rc2-next-20190117 #14 [ 865.930356][ T2620] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 865.940430][ T2620] Call Trace: [ 865.943740][ T2620] dump_stack+0x1db/0x2d0 [ 865.948107][ T2620] ? dump_stack_print_info.cold+0x20/0x20 [ 865.953835][ T2620] ? add_lock_to_list.isra.0+0x450/0x450 [ 865.959479][ T2620] ? kernfs_activate+0x8f/0x2c0 [ 865.964359][ T2620] should_fail.cold+0xa/0x14 00:27:55 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000180)='./control\x00', 0x0) get_thread_area(0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x3) write$binfmt_script(r0, &(0x7f0000000bc0)=ANY=[@ANYBLOB="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"], 0x143) close(r0) execve(&(0x7f0000000180)='./file0\x00', &(0x7f0000000140), &(0x7f0000000140)) r1 = open(&(0x7f0000000000)='./control\x00', 0x80, 0x10) statfs(&(0x7f0000000380)='./control\x00', &(0x7f00000003c0)=""/20) write$P9_RWALK(r0, &(0x7f0000000400)=ANY=[@ANYBLOB="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"], 0x14f) getsockopt$inet_sctp6_SCTP_RTOINFO(r1, 0x84, 0x0, &(0x7f0000000080)={0x0, 0x200, 0x2, 0xffffffff}, &(0x7f0000000100)=0x10) [ 865.969007][ T2620] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 865.974832][ T2620] ? ___might_sleep+0x1e7/0x310 [ 865.979688][ T2620] ? arch_local_save_flags+0x50/0x50 [ 865.984987][ T2620] __should_failslab+0x121/0x190 [ 865.989952][ T2620] should_failslab+0x9/0x14 [ 865.994458][ T2620] kmem_cache_alloc+0x2be/0x710 [ 865.999293][ T2620] ? __mutex_unlock_slowpath+0x195/0x870 [ 866.004910][ T2620] __kernfs_new_node+0xfe/0x8a0 [ 866.009803][ T2620] ? kernfs_dop_revalidate+0x3c0/0x3c0 [ 866.015276][ T2620] ? mutex_unlock+0xd/0x10 [ 866.019671][ T2620] ? kernfs_activate+0x21c/0x2c0 [ 866.024590][ T2620] ? kernfs_walk_and_get_ns+0x340/0x340 [ 866.030119][ T2620] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 866.036351][ T2620] ? kernfs_link_sibling+0x210/0x420 [ 866.041628][ T2620] kernfs_new_node+0x99/0x130 [ 866.046291][ T2620] __kernfs_create_file+0x51/0x340 [ 866.051406][ T2620] sysfs_add_file_mode_ns+0x222/0x560 [ 866.056764][ T2620] internal_create_group+0x3d2/0xd80 [ 866.062035][ T2620] ? remove_files.isra.0+0x190/0x190 [ 866.067303][ T2620] ? down_read+0x120/0x120 [ 866.071702][ T2620] ? resched_curr+0x1a0/0x1a0 [ 866.076369][ T2620] sysfs_create_group+0x20/0x30 [ 866.081237][ T2620] lo_ioctl+0x1147/0x23e0 [ 866.085580][ T2620] ? lo_rw_aio+0x1e50/0x1e50 [ 866.090162][ T2620] ? __fget+0x473/0x710 [ 866.094304][ T2620] ? lo_rw_aio+0x1e50/0x1e50 [ 866.098878][ T2620] blkdev_ioctl+0x10e0/0x2120 [ 866.103551][ T2620] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 866.109776][ T2620] ? blkpg_ioctl+0xc10/0xc10 [ 866.114348][ T2620] ? lock_downgrade+0xbe0/0xbe0 [ 866.119213][ T2620] ? kasan_check_read+0x11/0x20 [ 866.124050][ T2620] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 866.130013][ T2620] ? rcu_read_unlock_special+0x380/0x380 [ 866.135640][ T2620] ? __fget+0x49a/0x710 [ 866.139790][ T2620] block_ioctl+0xee/0x130 [ 866.144101][ T2620] ? blkdev_fallocate+0x410/0x410 [ 866.149113][ T2620] do_vfs_ioctl+0x107b/0x17d0 [ 866.153809][ T2620] ? ioctl_preallocate+0x2f0/0x2f0 [ 866.158903][ T2620] ? __fget_light+0x2db/0x420 [ 866.163562][ T2620] ? trace_hardirqs_off+0xb8/0x310 [ 866.168680][ T2620] ? fget_raw+0x20/0x20 [ 866.172820][ T2620] ? trace_hardirqs_on_caller+0x310/0x310 [ 866.178523][ T2620] ? do_sys_open+0x3f9/0x7c0 [ 866.183096][ T2620] ? do_syscall_64+0x8c/0x800 [ 866.187757][ T2620] ? do_syscall_64+0x8c/0x800 [ 866.192456][ T2620] ? lockdep_hardirqs_on+0x415/0x5d0 [ 866.197729][ T2620] ? security_file_ioctl+0x93/0xc0 [ 866.202826][ T2620] ksys_ioctl+0xab/0xd0 [ 866.206975][ T2620] __x64_sys_ioctl+0x73/0xb0 [ 866.211564][ T2620] do_syscall_64+0x1a3/0x800 [ 866.216142][ T2620] ? syscall_return_slowpath+0x5f0/0x5f0 [ 866.221753][ T2620] ? prepare_exit_to_usermode+0x232/0x3b0 [ 866.227469][ T2620] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 866.233016][ T2620] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 866.238886][ T2620] RIP: 0033:0x457f07 [ 866.242765][ T2620] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 cd b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 866.262375][ T2620] RSP: 002b:00007f5004a43a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 866.270796][ T2620] RAX: ffffffffffffffda RBX: 0000000000000010 RCX: 0000000000457f07 [ 866.278751][ T2620] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 866.286702][ T2620] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 866.294655][ T2620] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 866.302606][ T2620] R13: 0000000000000000 R14: 00000000004dbc38 R15: 0000000000000003 [ 866.370903][ T2620] REISERFS warning (device loop0): super-6506 reiserfs_getopt: empty argument for "jdev" [ 866.370903][ T2620] 00:27:56 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000480)=@acquire={0x1ac, 0x17, 0x1, 0x0, 0x0, {{@in=@multicast1}, @in6=@ipv4={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800000000000000], [], @dev}, {@in=@loopback, @in6=@local}, {{@in, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x2}}}, [@tmpl={0x84, 0x5, [{{@in6=@mcast1, 0x0, 0x3c}, 0x0, @in=@multicast1}, {{@in=@remote, 0x0, 0x3c}, 0x0, @in=@broadcast}]}]}, 0x1ac}}, 0x0) 00:27:56 executing program 2: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(&(0x7f0000000080)=@nbd={'/dev/nbd', 0x0, 0xe0064}, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000240)='hfs\x00\xe6\xa6\xe2\x06g\x96\xb3\v\xf2p\xd5:\x95p\x99\x92\xf2\xc4\x80\x1f\x01\x05\xb8e?\xbfwk\xe4\xe5\xca\x82\xeb\xb1\x04wn*\xf2\xc6\x9d\xc4!\x9e?\x83\x99\x0e\xcc\xa3\x95q.C\xee\x8dIf\xec\xbf\xe8\xb2\t\xedg\x9d\xd9\v\xce\xa3\xa3\xa5\x89F\x03\xefQ\x89\f\xeeRK\x15\xec{D\x9e\x83Z\xabTa\x8e\xcd\x01\xd0\xcfd\xf9c\x87m\xbe>\x81\xba\x9d2\x1c\a,\x12\xbf\xef\xb8m\v\xdf\x8e\xd5\xf5\x1a\xabD\xf6\xe0\x95\xf4\xfeRb_+\xeb\xf9f\xe8\\\x16\xeb\x87\x8e\x8acn4,\x80Q<\x84\xaep\xf9\xfc\x8e\x9f\xed\x06.a\xd5o\x14\r&L\xbd\xb9g\x82;+n\xd5\xcca\v\x86Z\x872\xc3c:`\xf2\x02\xc2\x92\x841\xe7\xca}\"@6}j\x0e\xb7\xa9\xbc\xf3N\xa3\xf3mbd\xfbS\x80\xe0\x11<\x7f\x84\xbe\xa2\xf9\xf7\xee\xf6\x94x\x9d\xe2{\xc5\x83\xc0M\xbb\xd4Io\r\x1c\xd7<\xc0\x84=`\xf1^Y', 0x0, 0x0) 00:27:56 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00004e7000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f, 0xf0ffff}, 0xc, &(0x7f0000000440)={&(0x7f00000001c0)=ANY=[@ANYBLOB="1c00000022000100000000000061960d0100000008fe0c009d0a6be0e6d9fc638f19561d6ceb8a6c9239228215fd206cf204e07953", @ANYRES32=0x0], 0x2}, 0x1, 0x0, 0x0, 0xffffffffffffffff}, 0x0) 00:27:56 executing program 0 (fault-call:0 fault-nth:16): syz_mount_image$reiserfs(&(0x7f0000000180)='reiserfs\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[@ANYBLOB='jdev=./file0,jdev=']) 00:27:56 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000480)=@acquire={0x1ac, 0x17, 0x1, 0x0, 0x0, {{@in=@multicast1}, @in6=@ipv4={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x805000000000000], [], @dev}, {@in=@loopback, @in6=@local}, {{@in, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x2}}}, [@tmpl={0x84, 0x5, [{{@in6=@mcast1, 0x0, 0x3c}, 0x0, @in=@multicast1}, {{@in=@remote, 0x0, 0x3c}, 0x0, @in=@broadcast}]}]}, 0x1ac}}, 0x0) 00:27:56 executing program 2: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(&(0x7f0000000080)=@nbd={'/dev/nbd', 0x0, 0xe0066}, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000240)='hfs\x00\xe6\xa6\xe2\x06g\x96\xb3\v\xf2p\xd5:\x95p\x99\x92\xf2\xc4\x80\x1f\x01\x05\xb8e?\xbfwk\xe4\xe5\xca\x82\xeb\xb1\x04wn*\xf2\xc6\x9d\xc4!\x9e?\x83\x99\x0e\xcc\xa3\x95q.C\xee\x8dIf\xec\xbf\xe8\xb2\t\xedg\x9d\xd9\v\xce\xa3\xa3\xa5\x89F\x03\xefQ\x89\f\xeeRK\x15\xec{D\x9e\x83Z\xabTa\x8e\xcd\x01\xd0\xcfd\xf9c\x87m\xbe>\x81\xba\x9d2\x1c\a,\x12\xbf\xef\xb8m\v\xdf\x8e\xd5\xf5\x1a\xabD\xf6\xe0\x95\xf4\xfeRb_+\xeb\xf9f\xe8\\\x16\xeb\x87\x8e\x8acn4,\x80Q<\x84\xaep\xf9\xfc\x8e\x9f\xed\x06.a\xd5o\x14\r&L\xbd\xb9g\x82;+n\xd5\xcca\v\x86Z\x872\xc3c:`\xf2\x02\xc2\x92\x841\xe7\xca}\"@6}j\x0e\xb7\xa9\xbc\xf3N\xa3\xf3mbd\xfbS\x80\xe0\x11<\x7f\x84\xbe\xa2\xf9\xf7\xee\xf6\x94x\x9d\xe2{\xc5\x83\xc0M\xbb\xd4Io\r\x1c\xd7<\xc0\x84=`\xf1^Y', 0x0, 0x0) 00:27:56 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000180)='./control\x00', 0x0) get_thread_area(0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x3) write$binfmt_script(r0, &(0x7f0000000bc0)=ANY=[@ANYBLOB="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"], 0x145) close(r0) execve(&(0x7f0000000180)='./file0\x00', 0x0, &(0x7f0000000140)) r1 = open(&(0x7f0000000000)='./control\x00', 0x80, 0x10) statfs(&(0x7f0000000380)='./control\x00', &(0x7f00000003c0)=""/20) write$P9_RWALK(r0, &(0x7f0000000400)=ANY=[@ANYBLOB="300000006f0100030001030000000400000000000000100000000003000002000000000300000000000000e646f1c5592139cf131e2bf572fa9728dbfac0390865410f3fa1f25743c497e12cb352eac4046b4500f95cfdfb4cf22a3be5c564a47654334c01d5732d382e27bbccd9b903000000c404000000d32dbd21f3ae581d32e69ef9327f7b487d1b4f4502838c08136678bd90733173ab78d6fc264b373611f15c439384ede863ecc86f33e74a14e307490508a39b41394adaba629948536b9cbfaf6fd153ef31439c5bf58116ad346d364e3293ce22b917bee18e0356778d7e12e96945109f9678302ea739b55b8173f4243ec467c6e40248445d0df527c5d637c03c41d500ed9802279fc3d9e4c6767ac0ad7893f64ec0568b7453adce65e06164d0003219476ba93aee62624d6b025582b2917ef27f06eae5af44ea3c7a25d16c5d25a2b04969202ed68056"], 0x14f) getsockopt$inet_sctp6_SCTP_RTOINFO(r1, 0x84, 0x0, &(0x7f0000000080)={0x0, 0x200, 0x2, 0xffffffff}, &(0x7f0000000100)=0x10) 00:27:56 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000180)='./control\x00', 0x0) get_thread_area(0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x3) write$binfmt_script(r0, &(0x7f0000000bc0)=ANY=[@ANYBLOB="2321202e2f66696c6530202357994f66e76f4d0fe2208456ebfa69074cb94144c95c4375644bd1747e34c127d80575d10a599f851dc7ad26f3fa377c0a53cc7be2512b7493bf864ecf3f13e46032dbbf3af349b06321cec7a0652f4a5768256cd01a2d3d52de67dc459409a1e50ca51334791c8690646f7a1962ccefc0592a163bacf13da16978ca48eb3784c5baa40700ebfddde7e115f9388051297af49e38e0e3210d232e108a7e9b69c2e56676484906d975d537d128607c901050484e2bdb0d042a40c8ff8f4727cde00677ea73dac796f06f6f7ef7b3406723e7da9fb469c4ce44faff2888c779c000000000000000000000dc4fd7f68b303f980ed08fb24c8052b0626c8b3733eeee64a90f35fd7d88f958406cb5a8ed3b20b7d1278e15c1e1012befbc45a45f203503128d3a99b80bc2c744ae4b8509ca0149b48dc3e11c2d5db4"], 0x145) close(r0) execve(0x0, &(0x7f0000000140), &(0x7f0000000140)) r1 = open(&(0x7f0000000000)='./control\x00', 0x80, 0x10) statfs(&(0x7f0000000380)='./control\x00', &(0x7f00000003c0)=""/20) write$P9_RWALK(r0, &(0x7f0000000400)=ANY=[@ANYBLOB="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"], 0x14f) getsockopt$inet_sctp6_SCTP_RTOINFO(r1, 0x84, 0x0, &(0x7f0000000080)={0x0, 0x200, 0x2, 0xffffffff}, &(0x7f0000000100)=0x10) 00:27:56 executing program 2: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(&(0x7f0000000080)=@nbd={'/dev/nbd', 0x0, 0xe00f0}, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000240)='hfs\x00\xe6\xa6\xe2\x06g\x96\xb3\v\xf2p\xd5:\x95p\x99\x92\xf2\xc4\x80\x1f\x01\x05\xb8e?\xbfwk\xe4\xe5\xca\x82\xeb\xb1\x04wn*\xf2\xc6\x9d\xc4!\x9e?\x83\x99\x0e\xcc\xa3\x95q.C\xee\x8dIf\xec\xbf\xe8\xb2\t\xedg\x9d\xd9\v\xce\xa3\xa3\xa5\x89F\x03\xefQ\x89\f\xeeRK\x15\xec{D\x9e\x83Z\xabTa\x8e\xcd\x01\xd0\xcfd\xf9c\x87m\xbe>\x81\xba\x9d2\x1c\a,\x12\xbf\xef\xb8m\v\xdf\x8e\xd5\xf5\x1a\xabD\xf6\xe0\x95\xf4\xfeRb_+\xeb\xf9f\xe8\\\x16\xeb\x87\x8e\x8acn4,\x80Q<\x84\xaep\xf9\xfc\x8e\x9f\xed\x06.a\xd5o\x14\r&L\xbd\xb9g\x82;+n\xd5\xcca\v\x86Z\x872\xc3c:`\xf2\x02\xc2\x92\x841\xe7\xca}\"@6}j\x0e\xb7\xa9\xbc\xf3N\xa3\xf3mbd\xfbS\x80\xe0\x11<\x7f\x84\xbe\xa2\xf9\xf7\xee\xf6\x94x\x9d\xe2{\xc5\x83\xc0M\xbb\xd4Io\r\x1c\xd7<\xc0\x84=`\xf1^Y', 0x0, 0x0) [ 866.774150][ T2669] FAULT_INJECTION: forcing a failure. [ 866.774150][ T2669] name failslab, interval 1, probability 0, space 0, times 0 [ 866.807611][ T2669] CPU: 1 PID: 2669 Comm: syz-executor0 Not tainted 5.0.0-rc2-next-20190117 #14 [ 866.816568][ T2669] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 866.826636][ T2669] Call Trace: [ 866.829957][ T2669] dump_stack+0x1db/0x2d0 [ 866.834302][ T2669] ? dump_stack_print_info.cold+0x20/0x20 [ 866.840025][ T2669] ? add_lock_to_list.isra.0+0x450/0x450 [ 866.845670][ T2669] ? kernfs_activate+0x8f/0x2c0 [ 866.850529][ T2669] should_fail.cold+0xa/0x14 [ 866.855170][ T2669] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 866.860980][ T2669] ? ___might_sleep+0x1e7/0x310 [ 866.865852][ T2669] ? arch_local_save_flags+0x50/0x50 00:27:56 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000180)='./control\x00', 0x0) get_thread_area(0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x3) write$binfmt_script(r0, &(0x7f0000000bc0)=ANY=[@ANYBLOB="2321202e2f66696c6530202357994f66e76f4d0fe2208456ebfa69074cb94144c95c4375644bd1747e34c127d80575d10a599f851dc7ad26f3fa377c0a53cc7be2512b7493bf864ecf3f13e46032dbbf3af349b06321cec7a0652f4a5768256cd01a2d3d52de67dc459409a1e50ca51334791c8690646f7a1962ccefc0592a163bacf13da16978ca48eb3784c5baa40700ebfddde7e115f9388051297af49e38e0e3210d232e108a7e9b69c2e56676484906d975d537d128607c901050484e2bdb0d042a40c8ff8f4727cde00677ea73dac796f06f6f7ef7b3406723e7da9fb469c4ce44faff2888c779c000000000000000000000dc4fd7f68b303f980ed08fb24c8052b0626c8b3733eeee64a90f35fd7d88f958406cb5a8ed3b20b7d1278e15c1e1012befbc45a45f203503128d3a99b80bc2c744ae4b8509ca0149b48dc3"], 0x140) close(r0) execve(&(0x7f0000000180)='./file0\x00', &(0x7f0000000140), &(0x7f0000000140)) r1 = open(&(0x7f0000000000)='./control\x00', 0x80, 0x10) statfs(&(0x7f0000000380)='./control\x00', &(0x7f00000003c0)=""/20) write$P9_RWALK(r0, &(0x7f0000000400)=ANY=[@ANYBLOB="300000006f0100030001030000000400000000000000100000000003000002000000000300000000000000e646f1c5592139cf131e2bf572fa9728dbfac0390865410f3fa1f25743c497e12cb352eac4046b4500f95cfdfb4cf22a3be5c564a47654334c01d5732d382e27bbccd9b903000000c404000000d32dbd21f3ae581d32e69ef9327f7b487d1b4f4502838c08136678bd90733173ab78d6fc264b373611f15c439384ede863ecc86f33e74a14e307490508a39b41394adaba629948536b9cbfaf6fd153ef31439c5bf58116ad346d364e3293ce22b917bee18e0356778d7e12e96945109f9678302ea739b55b8173f4243ec467c6e40248445d0df527c5d637c03c41d500ed9802279fc3d9e4c6767ac0ad7893f64ec0568b7453adce65e06164d0003219476ba93aee62624d6b025582b2917ef27f06eae5af44ea3c7a25d16c5d25a2b04969202ed68056"], 0x14f) getsockopt$inet_sctp6_SCTP_RTOINFO(r1, 0x84, 0x0, &(0x7f0000000080)={0x0, 0x200, 0x2, 0xffffffff}, &(0x7f0000000100)=0x10) [ 866.871197][ T2669] __should_failslab+0x121/0x190 [ 866.876150][ T2669] should_failslab+0x9/0x14 [ 866.880665][ T2669] kmem_cache_alloc+0x2be/0x710 [ 866.885527][ T2669] ? __mutex_unlock_slowpath+0x195/0x870 [ 866.891181][ T2669] __kernfs_new_node+0xfe/0x8a0 [ 866.896047][ T2669] ? kernfs_dop_revalidate+0x3c0/0x3c0 [ 866.901521][ T2669] ? mutex_unlock+0xd/0x10 [ 866.905939][ T2669] ? kernfs_activate+0x21c/0x2c0 [ 866.910887][ T2669] ? kernfs_walk_and_get_ns+0x340/0x340 [ 866.916439][ T2669] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 866.922682][ T2669] ? kernfs_link_sibling+0x210/0x420 [ 866.927981][ T2669] kernfs_new_node+0x99/0x130 [ 866.932668][ T2669] __kernfs_create_file+0x51/0x340 [ 866.937783][ T2669] sysfs_add_file_mode_ns+0x222/0x560 [ 866.943202][ T2669] internal_create_group+0x3d2/0xd80 [ 866.948518][ T2669] ? remove_files.isra.0+0x190/0x190 [ 866.953803][ T2669] ? down_read+0x120/0x120 [ 866.958258][ T2669] ? resched_curr+0x1a0/0x1a0 [ 866.962960][ T2669] sysfs_create_group+0x20/0x30 [ 866.967814][ T2669] lo_ioctl+0x1147/0x23e0 [ 866.972170][ T2669] ? lo_rw_aio+0x1e50/0x1e50 [ 866.976768][ T2669] ? __fget+0x473/0x710 [ 866.980929][ T2669] ? lo_rw_aio+0x1e50/0x1e50 [ 866.985536][ T2669] blkdev_ioctl+0x10e0/0x2120 [ 866.990213][ T2669] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 866.996452][ T2669] ? blkpg_ioctl+0xc10/0xc10 [ 867.001076][ T2669] ? lock_downgrade+0xbe0/0xbe0 [ 867.005926][ T2669] ? kasan_check_read+0x11/0x20 [ 867.010779][ T2669] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 867.016759][ T2669] ? rcu_read_unlock_special+0x380/0x380 [ 867.022406][ T2669] ? __fget+0x49a/0x710 [ 867.026590][ T2669] block_ioctl+0xee/0x130 [ 867.030961][ T2669] ? blkdev_fallocate+0x410/0x410 [ 867.035990][ T2669] do_vfs_ioctl+0x107b/0x17d0 [ 867.040684][ T2669] ? putname+0xef/0x130 [ 867.044841][ T2669] ? ioctl_preallocate+0x2f0/0x2f0 [ 867.049959][ T2669] ? __fget_light+0x2db/0x420 [ 867.054649][ T2669] ? fget_raw+0x20/0x20 [ 867.058815][ T2669] ? do_sys_open+0x3f9/0x7c0 [ 867.063416][ T2669] ? do_syscall_64+0x8c/0x800 [ 867.068099][ T2669] ? do_syscall_64+0x8c/0x800 [ 867.072778][ T2669] ? lockdep_hardirqs_on+0x415/0x5d0 [ 867.078069][ T2669] ? security_file_ioctl+0x93/0xc0 [ 867.083190][ T2669] ksys_ioctl+0xab/0xd0 [ 867.087370][ T2669] __x64_sys_ioctl+0x73/0xb0 [ 867.091969][ T2669] do_syscall_64+0x1a3/0x800 [ 867.096616][ T2669] ? syscall_return_slowpath+0x5f0/0x5f0 [ 867.102263][ T2669] ? prepare_exit_to_usermode+0x232/0x3b0 [ 867.107986][ T2669] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 867.113562][ T2669] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 867.119447][ T2669] RIP: 0033:0x457f07 [ 867.123322][ T2669] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 cd b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 867.143046][ T2669] RSP: 002b:00007f5004a43a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 867.151466][ T2669] RAX: ffffffffffffffda RBX: 0000000000000010 RCX: 0000000000457f07 [ 867.159440][ T2669] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 867.167396][ T2669] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a 00:27:56 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000480)=@acquire={0x1ac, 0x17, 0x1, 0x0, 0x0, {{@in=@multicast1}, @in6=@ipv4={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x900000000000000], [], @dev}, {@in=@loopback, @in6=@local}, {{@in, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x2}}}, [@tmpl={0x84, 0x5, [{{@in6=@mcast1, 0x0, 0x3c}, 0x0, @in=@multicast1}, {{@in=@remote, 0x0, 0x3c}, 0x0, @in=@broadcast}]}]}, 0x1ac}}, 0x0) 00:27:56 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00004e7000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f, 0x1000000}, 0xc, &(0x7f0000000440)={&(0x7f00000001c0)=ANY=[@ANYBLOB="1c00000022000100000000000061960d0100000008fe0c009d0a6be0e6d9fc638f19561d6ceb8a6c9239228215fd206cf204e07953", @ANYRES32=0x0], 0x2}, 0x1, 0x0, 0x0, 0xffffffffffffffff}, 0x0) 00:27:56 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000180)='./control\x00', 0x0) get_thread_area(0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x3) write$binfmt_script(r0, &(0x7f0000000bc0)=ANY=[@ANYBLOB="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"], 0x145) close(r0) execve(&(0x7f0000000180)='./file0\x00', 0x0, &(0x7f0000000140)) r1 = open(&(0x7f0000000000)='./control\x00', 0x80, 0x10) statfs(&(0x7f0000000380)='./control\x00', &(0x7f00000003c0)=""/20) write$P9_RWALK(r0, &(0x7f0000000400)=ANY=[@ANYBLOB="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"], 0x14f) getsockopt$inet_sctp6_SCTP_RTOINFO(r1, 0x84, 0x0, &(0x7f0000000080)={0x0, 0x200, 0x2, 0xffffffff}, &(0x7f0000000100)=0x10) [ 867.175348][ T2669] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 867.183298][ T2669] R13: 0000000000000000 R14: 00000000004dbc38 R15: 0000000000000003 [ 867.255415][ T2669] REISERFS warning (device loop0): super-6506 reiserfs_getopt: empty argument for "jdev" [ 867.255415][ T2669] 00:27:57 executing program 2: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(&(0x7f0000000080)=@nbd={'/dev/nbd', 0x0, 0xe0134}, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000240)='hfs\x00\xe6\xa6\xe2\x06g\x96\xb3\v\xf2p\xd5:\x95p\x99\x92\xf2\xc4\x80\x1f\x01\x05\xb8e?\xbfwk\xe4\xe5\xca\x82\xeb\xb1\x04wn*\xf2\xc6\x9d\xc4!\x9e?\x83\x99\x0e\xcc\xa3\x95q.C\xee\x8dIf\xec\xbf\xe8\xb2\t\xedg\x9d\xd9\v\xce\xa3\xa3\xa5\x89F\x03\xefQ\x89\f\xeeRK\x15\xec{D\x9e\x83Z\xabTa\x8e\xcd\x01\xd0\xcfd\xf9c\x87m\xbe>\x81\xba\x9d2\x1c\a,\x12\xbf\xef\xb8m\v\xdf\x8e\xd5\xf5\x1a\xabD\xf6\xe0\x95\xf4\xfeRb_+\xeb\xf9f\xe8\\\x16\xeb\x87\x8e\x8acn4,\x80Q<\x84\xaep\xf9\xfc\x8e\x9f\xed\x06.a\xd5o\x14\r&L\xbd\xb9g\x82;+n\xd5\xcca\v\x86Z\x872\xc3c:`\xf2\x02\xc2\x92\x841\xe7\xca}\"@6}j\x0e\xb7\xa9\xbc\xf3N\xa3\xf3mbd\xfbS\x80\xe0\x11<\x7f\x84\xbe\xa2\xf9\xf7\xee\xf6\x94x\x9d\xe2{\xc5\x83\xc0M\xbb\xd4Io\r\x1c\xd7<\xc0\x84=`\xf1^Y', 0x0, 0x0) 00:27:57 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000480)=@acquire={0x1ac, 0x17, 0x1, 0x0, 0x0, {{@in=@multicast1}, @in6=@ipv4={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa00000000000000], [], @dev}, {@in=@loopback, @in6=@local}, {{@in, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x2}}}, [@tmpl={0x84, 0x5, [{{@in6=@mcast1, 0x0, 0x3c}, 0x0, @in=@multicast1}, {{@in=@remote, 0x0, 0x3c}, 0x0, @in=@broadcast}]}]}, 0x1ac}}, 0x0) 00:27:57 executing program 0 (fault-call:0 fault-nth:17): syz_mount_image$reiserfs(&(0x7f0000000180)='reiserfs\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[@ANYBLOB='jdev=./file0,jdev=']) 00:27:57 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00004e7000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f, 0x2000000}, 0xc, &(0x7f0000000440)={&(0x7f00000001c0)=ANY=[@ANYBLOB="1c00000022000100000000000061960d0100000008fe0c009d0a6be0e6d9fc638f19561d6ceb8a6c9239228215fd206cf204e07953", @ANYRES32=0x0], 0x2}, 0x1, 0x0, 0x0, 0xffffffffffffffff}, 0x0) 00:27:57 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000180)='./control\x00', 0x0) get_thread_area(0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x3) write$binfmt_script(r0, &(0x7f0000000bc0)=ANY=[@ANYBLOB="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"], 0x145) close(r0) execve(&(0x7f0000000180)='./file0\x00', 0x0, &(0x7f0000000140)) r1 = open(&(0x7f0000000000)='./control\x00', 0x80, 0x10) statfs(&(0x7f0000000380)='./control\x00', &(0x7f00000003c0)=""/20) write$P9_RWALK(r0, &(0x7f0000000400)=ANY=[@ANYBLOB="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"], 0x14f) getsockopt$inet_sctp6_SCTP_RTOINFO(r1, 0x84, 0x0, &(0x7f0000000080)={0x0, 0x200, 0x2, 0xffffffff}, &(0x7f0000000100)=0x10) 00:27:57 executing program 2: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(&(0x7f0000000080)=@nbd={'/dev/nbd', 0x0, 0xe0150}, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000240)='hfs\x00\xe6\xa6\xe2\x06g\x96\xb3\v\xf2p\xd5:\x95p\x99\x92\xf2\xc4\x80\x1f\x01\x05\xb8e?\xbfwk\xe4\xe5\xca\x82\xeb\xb1\x04wn*\xf2\xc6\x9d\xc4!\x9e?\x83\x99\x0e\xcc\xa3\x95q.C\xee\x8dIf\xec\xbf\xe8\xb2\t\xedg\x9d\xd9\v\xce\xa3\xa3\xa5\x89F\x03\xefQ\x89\f\xeeRK\x15\xec{D\x9e\x83Z\xabTa\x8e\xcd\x01\xd0\xcfd\xf9c\x87m\xbe>\x81\xba\x9d2\x1c\a,\x12\xbf\xef\xb8m\v\xdf\x8e\xd5\xf5\x1a\xabD\xf6\xe0\x95\xf4\xfeRb_+\xeb\xf9f\xe8\\\x16\xeb\x87\x8e\x8acn4,\x80Q<\x84\xaep\xf9\xfc\x8e\x9f\xed\x06.a\xd5o\x14\r&L\xbd\xb9g\x82;+n\xd5\xcca\v\x86Z\x872\xc3c:`\xf2\x02\xc2\x92\x841\xe7\xca}\"@6}j\x0e\xb7\xa9\xbc\xf3N\xa3\xf3mbd\xfbS\x80\xe0\x11<\x7f\x84\xbe\xa2\xf9\xf7\xee\xf6\x94x\x9d\xe2{\xc5\x83\xc0M\xbb\xd4Io\r\x1c\xd7<\xc0\x84=`\xf1^Y', 0x0, 0x0) 00:27:57 executing program 1 (fault-call:0 fault-nth:0): syz_mount_image$reiserfs(&(0x7f0000000180)='reiserfs\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[@ANYBLOB='jdev=.']) 00:27:57 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000480)=@acquire={0x1ac, 0x17, 0x1, 0x0, 0x0, {{@in=@multicast1}, @in6=@ipv4={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb00000000000000], [], @dev}, {@in=@loopback, @in6=@local}, {{@in, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x2}}}, [@tmpl={0x84, 0x5, [{{@in6=@mcast1, 0x0, 0x3c}, 0x0, @in=@multicast1}, {{@in=@remote, 0x0, 0x3c}, 0x0, @in=@broadcast}]}]}, 0x1ac}}, 0x0) 00:27:57 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00004e7000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f, 0x4000000}, 0xc, &(0x7f0000000440)={&(0x7f00000001c0)=ANY=[@ANYBLOB="1c00000022000100000000000061960d0100000008fe0c009d0a6be0e6d9fc638f19561d6ceb8a6c9239228215fd206cf204e07953", @ANYRES32=0x0], 0x2}, 0x1, 0x0, 0x0, 0xffffffffffffffff}, 0x0) [ 867.601392][ T2714] FAULT_INJECTION: forcing a failure. [ 867.601392][ T2714] name failslab, interval 1, probability 0, space 0, times 0 [ 867.641161][ T2714] CPU: 1 PID: 2714 Comm: syz-executor0 Not tainted 5.0.0-rc2-next-20190117 #14 [ 867.650144][ T2714] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 867.660211][ T2714] Call Trace: [ 867.663514][ T2714] dump_stack+0x1db/0x2d0 [ 867.667859][ T2714] ? dump_stack_print_info.cold+0x20/0x20 [ 867.673604][ T2714] ? add_lock_to_list.isra.0+0x450/0x450 [ 867.679253][ T2714] ? kernfs_activate+0x8f/0x2c0 [ 867.684119][ T2714] should_fail.cold+0xa/0x14 [ 867.688805][ T2714] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 867.694635][ T2714] ? ___might_sleep+0x1e7/0x310 [ 867.699490][ T2714] ? arch_local_save_flags+0x50/0x50 [ 867.704788][ T2714] __should_failslab+0x121/0x190 [ 867.709709][ T2714] should_failslab+0x9/0x14 [ 867.714223][ T2714] kmem_cache_alloc+0x2be/0x710 [ 867.719069][ T2714] ? __mutex_unlock_slowpath+0x195/0x870 [ 867.724684][ T2714] __kernfs_new_node+0xfe/0x8a0 [ 867.729516][ T2714] ? kernfs_dop_revalidate+0x3c0/0x3c0 [ 867.734957][ T2714] ? mutex_unlock+0xd/0x10 [ 867.739352][ T2714] ? kernfs_activate+0x21c/0x2c0 [ 867.744293][ T2714] ? kernfs_walk_and_get_ns+0x340/0x340 [ 867.749823][ T2714] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 867.756042][ T2714] ? kernfs_link_sibling+0x210/0x420 [ 867.761655][ T2714] kernfs_new_node+0x99/0x130 [ 867.766310][ T2714] __kernfs_create_file+0x51/0x340 [ 867.771407][ T2714] sysfs_add_file_mode_ns+0x222/0x560 [ 867.776791][ T2714] internal_create_group+0x3d2/0xd80 [ 867.782074][ T2714] ? remove_files.isra.0+0x190/0x190 [ 867.787335][ T2714] ? down_read+0x120/0x120 [ 867.791752][ T2714] ? resched_curr+0x1a0/0x1a0 [ 867.796424][ T2714] sysfs_create_group+0x20/0x30 [ 867.801251][ T2714] lo_ioctl+0x1147/0x23e0 [ 867.805558][ T2714] ? lo_rw_aio+0x1e50/0x1e50 [ 867.810143][ T2714] ? __fget+0x473/0x710 [ 867.814279][ T2714] ? lo_rw_aio+0x1e50/0x1e50 [ 867.818847][ T2714] blkdev_ioctl+0x10e0/0x2120 [ 867.823501][ T2714] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 867.829717][ T2714] ? blkpg_ioctl+0xc10/0xc10 [ 867.834285][ T2714] ? lock_downgrade+0xbe0/0xbe0 [ 867.839113][ T2714] ? kasan_check_read+0x11/0x20 [ 867.843960][ T2714] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 867.849917][ T2714] ? rcu_read_unlock_special+0x380/0x380 [ 867.855533][ T2714] ? __fget+0x49a/0x710 [ 867.859711][ T2714] block_ioctl+0xee/0x130 [ 867.864032][ T2714] ? blkdev_fallocate+0x410/0x410 [ 867.869037][ T2714] do_vfs_ioctl+0x107b/0x17d0 [ 867.873696][ T2714] ? putname+0xef/0x130 [ 867.877839][ T2714] ? ioctl_preallocate+0x2f0/0x2f0 [ 867.882933][ T2714] ? __fget_light+0x2db/0x420 [ 867.887588][ T2714] ? fget_raw+0x20/0x20 [ 867.891726][ T2714] ? do_sys_open+0x3f9/0x7c0 [ 867.896296][ T2714] ? do_syscall_64+0x8c/0x800 [ 867.900964][ T2714] ? do_syscall_64+0x8c/0x800 [ 867.905633][ T2714] ? lockdep_hardirqs_on+0x415/0x5d0 [ 867.910903][ T2714] ? security_file_ioctl+0x93/0xc0 [ 867.915997][ T2714] ksys_ioctl+0xab/0xd0 [ 867.920130][ T2714] __x64_sys_ioctl+0x73/0xb0 [ 867.924702][ T2714] do_syscall_64+0x1a3/0x800 [ 867.929273][ T2714] ? syscall_return_slowpath+0x5f0/0x5f0 [ 867.934916][ T2714] ? prepare_exit_to_usermode+0x232/0x3b0 [ 867.940657][ T2714] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 867.946188][ T2714] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 867.952055][ T2714] RIP: 0033:0x457f07 [ 867.955924][ T2714] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 cd b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 867.975516][ T2714] RSP: 002b:00007f5004a43a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 867.983912][ T2714] RAX: ffffffffffffffda RBX: 0000000000000010 RCX: 0000000000457f07 [ 867.991860][ T2714] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 00:27:57 executing program 2: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(&(0x7f0000000080)=@nbd={'/dev/nbd', 0x0, 0xe0154}, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000240)='hfs\x00\xe6\xa6\xe2\x06g\x96\xb3\v\xf2p\xd5:\x95p\x99\x92\xf2\xc4\x80\x1f\x01\x05\xb8e?\xbfwk\xe4\xe5\xca\x82\xeb\xb1\x04wn*\xf2\xc6\x9d\xc4!\x9e?\x83\x99\x0e\xcc\xa3\x95q.C\xee\x8dIf\xec\xbf\xe8\xb2\t\xedg\x9d\xd9\v\xce\xa3\xa3\xa5\x89F\x03\xefQ\x89\f\xeeRK\x15\xec{D\x9e\x83Z\xabTa\x8e\xcd\x01\xd0\xcfd\xf9c\x87m\xbe>\x81\xba\x9d2\x1c\a,\x12\xbf\xef\xb8m\v\xdf\x8e\xd5\xf5\x1a\xabD\xf6\xe0\x95\xf4\xfeRb_+\xeb\xf9f\xe8\\\x16\xeb\x87\x8e\x8acn4,\x80Q<\x84\xaep\xf9\xfc\x8e\x9f\xed\x06.a\xd5o\x14\r&L\xbd\xb9g\x82;+n\xd5\xcca\v\x86Z\x872\xc3c:`\xf2\x02\xc2\x92\x841\xe7\xca}\"@6}j\x0e\xb7\xa9\xbc\xf3N\xa3\xf3mbd\xfbS\x80\xe0\x11<\x7f\x84\xbe\xa2\xf9\xf7\xee\xf6\x94x\x9d\xe2{\xc5\x83\xc0M\xbb\xd4Io\r\x1c\xd7<\xc0\x84=`\xf1^Y', 0x0, 0x0) 00:27:57 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000180)='./control\x00', 0x0) get_thread_area(0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x3) write$binfmt_script(r0, &(0x7f0000000bc0)=ANY=[@ANYBLOB="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"], 0x145) close(r0) execve(&(0x7f0000000180)='./file0\x00', &(0x7f0000000140), 0x0) r1 = open(&(0x7f0000000000)='./control\x00', 0x80, 0x10) statfs(&(0x7f0000000380)='./control\x00', &(0x7f00000003c0)=""/20) write$P9_RWALK(r0, &(0x7f0000000400)=ANY=[@ANYBLOB="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"], 0x14f) getsockopt$inet_sctp6_SCTP_RTOINFO(r1, 0x84, 0x0, &(0x7f0000000080)={0x0, 0x200, 0x2, 0xffffffff}, &(0x7f0000000100)=0x10) [ 867.999823][ T2714] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 868.007773][ T2714] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 868.015737][ T2714] R13: 0000000000000000 R14: 00000000004dbc38 R15: 0000000000000003 00:27:57 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000480)=@acquire={0x1ac, 0x17, 0x1, 0x0, 0x0, {{@in=@multicast1}, @in6=@ipv4={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe00000000000000], [], @dev}, {@in=@loopback, @in6=@local}, {{@in, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x2}}}, [@tmpl={0x84, 0x5, [{{@in6=@mcast1, 0x0, 0x3c}, 0x0, @in=@multicast1}, {{@in=@remote, 0x0, 0x3c}, 0x0, @in=@broadcast}]}]}, 0x1ac}}, 0x0) [ 868.119024][ T2732] FAULT_INJECTION: forcing a failure. [ 868.119024][ T2732] name failslab, interval 1, probability 0, space 0, times 0 [ 868.131864][ T2714] REISERFS warning (device loop0): super-6506 reiserfs_getopt: empty argument for "jdev" [ 868.131864][ T2714] [ 868.185206][ T2732] CPU: 1 PID: 2732 Comm: syz-executor1 Not tainted 5.0.0-rc2-next-20190117 #14 [ 868.194158][ T2732] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 868.204212][ T2732] Call Trace: [ 868.207538][ T2732] dump_stack+0x1db/0x2d0 [ 868.211881][ T2732] ? dump_stack_print_info.cold+0x20/0x20 [ 868.217620][ T2732] should_fail.cold+0xa/0x14 [ 868.222247][ T2732] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 868.228054][ T2732] ? ___might_sleep+0x1e7/0x310 [ 868.232929][ T2732] ? arch_local_save_flags+0x50/0x50 [ 868.238228][ T2732] __should_failslab+0x121/0x190 [ 868.243163][ T2732] should_failslab+0x9/0x14 [ 868.247675][ T2732] __kmalloc+0x2dc/0x740 [ 868.251941][ T2732] ? strncpy_from_user+0x4e0/0x4e0 [ 868.257051][ T2732] ? fput+0x128/0x1a0 [ 868.261026][ T2732] ? do_syscall_64+0x8c/0x800 [ 868.265690][ T2732] ? __x64_sys_memfd_create+0x13c/0x4b0 [ 868.271234][ T2732] __x64_sys_memfd_create+0x13c/0x4b0 [ 868.276586][ T2732] ? memfd_fcntl+0x1870/0x1870 [ 868.281329][ T2732] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 868.286769][ T2732] do_syscall_64+0x1a3/0x800 [ 868.291517][ T2732] ? syscall_return_slowpath+0x5f0/0x5f0 [ 868.297128][ T2732] ? prepare_exit_to_usermode+0x232/0x3b0 [ 868.302826][ T2732] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 868.308357][ T2732] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 868.314230][ T2732] RIP: 0033:0x458099 00:27:58 executing program 2: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(&(0x7f0000000080)=@nbd={'/dev/nbd', 0x0, 0xe0166}, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000240)='hfs\x00\xe6\xa6\xe2\x06g\x96\xb3\v\xf2p\xd5:\x95p\x99\x92\xf2\xc4\x80\x1f\x01\x05\xb8e?\xbfwk\xe4\xe5\xca\x82\xeb\xb1\x04wn*\xf2\xc6\x9d\xc4!\x9e?\x83\x99\x0e\xcc\xa3\x95q.C\xee\x8dIf\xec\xbf\xe8\xb2\t\xedg\x9d\xd9\v\xce\xa3\xa3\xa5\x89F\x03\xefQ\x89\f\xeeRK\x15\xec{D\x9e\x83Z\xabTa\x8e\xcd\x01\xd0\xcfd\xf9c\x87m\xbe>\x81\xba\x9d2\x1c\a,\x12\xbf\xef\xb8m\v\xdf\x8e\xd5\xf5\x1a\xabD\xf6\xe0\x95\xf4\xfeRb_+\xeb\xf9f\xe8\\\x16\xeb\x87\x8e\x8acn4,\x80Q<\x84\xaep\xf9\xfc\x8e\x9f\xed\x06.a\xd5o\x14\r&L\xbd\xb9g\x82;+n\xd5\xcca\v\x86Z\x872\xc3c:`\xf2\x02\xc2\x92\x841\xe7\xca}\"@6}j\x0e\xb7\xa9\xbc\xf3N\xa3\xf3mbd\xfbS\x80\xe0\x11<\x7f\x84\xbe\xa2\xf9\xf7\xee\xf6\x94x\x9d\xe2{\xc5\x83\xc0M\xbb\xd4Io\r\x1c\xd7<\xc0\x84=`\xf1^Y', 0x0, 0x0) 00:27:58 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00004e7000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f, 0x8000000}, 0xc, &(0x7f0000000440)={&(0x7f00000001c0)=ANY=[@ANYBLOB="1c00000022000100000000000061960d0100000008fe0c009d0a6be0e6d9fc638f19561d6ceb8a6c9239228215fd206cf204e07953", @ANYRES32=0x0], 0x2}, 0x1, 0x0, 0x0, 0xffffffffffffffff}, 0x0) [ 868.318114][ T2732] Code: 6d b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 3b b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 868.337724][ T2732] RSP: 002b:00007f92bde86a88 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 868.346117][ T2732] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 0000000000458099 [ 868.354069][ T2732] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00000000004bd0a7 [ 868.362019][ T2732] RBP: 000000000073bf00 R08: 0000000000000000 R09: 00000000fbad8001 [ 868.369970][ T2732] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f92bde876d4 [ 868.377920][ T2732] R13: 00000000004c6910 R14: 00000000004dbc38 R15: 0000000000000003 00:27:58 executing program 0: syz_mount_image$reiserfs(&(0x7f0000000180)='reiserfs\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[@ANYBLOB='jdev=./file0,jdev=']) 00:27:58 executing program 1 (fault-call:0 fault-nth:1): syz_mount_image$reiserfs(&(0x7f0000000180)='reiserfs\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[@ANYBLOB='jdev=.']) 00:27:58 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000480)=@acquire={0x1ac, 0x17, 0x1, 0x0, 0x0, {{@in=@multicast1}, @in6=@ipv4={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf00000000000000], [], @dev}, {@in=@loopback, @in6=@local}, {{@in, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x2}}}, [@tmpl={0x84, 0x5, [{{@in6=@mcast1, 0x0, 0x3c}, 0x0, @in=@multicast1}, {{@in=@remote, 0x0, 0x3c}, 0x0, @in=@broadcast}]}]}, 0x1ac}}, 0x0) 00:27:58 executing program 2: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(&(0x7f0000000080)=@nbd={'/dev/nbd', 0x0, 0xe0192}, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000240)='hfs\x00\xe6\xa6\xe2\x06g\x96\xb3\v\xf2p\xd5:\x95p\x99\x92\xf2\xc4\x80\x1f\x01\x05\xb8e?\xbfwk\xe4\xe5\xca\x82\xeb\xb1\x04wn*\xf2\xc6\x9d\xc4!\x9e?\x83\x99\x0e\xcc\xa3\x95q.C\xee\x8dIf\xec\xbf\xe8\xb2\t\xedg\x9d\xd9\v\xce\xa3\xa3\xa5\x89F\x03\xefQ\x89\f\xeeRK\x15\xec{D\x9e\x83Z\xabTa\x8e\xcd\x01\xd0\xcfd\xf9c\x87m\xbe>\x81\xba\x9d2\x1c\a,\x12\xbf\xef\xb8m\v\xdf\x8e\xd5\xf5\x1a\xabD\xf6\xe0\x95\xf4\xfeRb_+\xeb\xf9f\xe8\\\x16\xeb\x87\x8e\x8acn4,\x80Q<\x84\xaep\xf9\xfc\x8e\x9f\xed\x06.a\xd5o\x14\r&L\xbd\xb9g\x82;+n\xd5\xcca\v\x86Z\x872\xc3c:`\xf2\x02\xc2\x92\x841\xe7\xca}\"@6}j\x0e\xb7\xa9\xbc\xf3N\xa3\xf3mbd\xfbS\x80\xe0\x11<\x7f\x84\xbe\xa2\xf9\xf7\xee\xf6\x94x\x9d\xe2{\xc5\x83\xc0M\xbb\xd4Io\r\x1c\xd7<\xc0\x84=`\xf1^Y', 0x0, 0x0) [ 868.560817][ T2748] FAULT_INJECTION: forcing a failure. [ 868.560817][ T2748] name failslab, interval 1, probability 0, space 0, times 0 00:27:58 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00004e7000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f, 0xa000000}, 0xc, &(0x7f0000000440)={&(0x7f00000001c0)=ANY=[@ANYBLOB="1c00000022000100000000000061960d0100000008fe0c009d0a6be0e6d9fc638f19561d6ceb8a6c9239228215fd206cf204e07953", @ANYRES32=0x0], 0x2}, 0x1, 0x0, 0x0, 0xffffffffffffffff}, 0x0) [ 868.624381][ T2749] REISERFS warning (device loop0): super-6506 reiserfs_getopt: empty argument for "jdev" [ 868.624381][ T2749] [ 868.652575][ T2748] CPU: 0 PID: 2748 Comm: syz-executor1 Not tainted 5.0.0-rc2-next-20190117 #14 [ 868.661580][ T2748] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 00:27:58 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000480)=@acquire={0x1ac, 0x17, 0x1, 0x0, 0x0, {{@in=@multicast1}, @in6=@ipv4={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000000000000], [], @dev}, {@in=@loopback, @in6=@local}, {{@in, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x2}}}, [@tmpl={0x84, 0x5, [{{@in6=@mcast1, 0x0, 0x3c}, 0x0, @in=@multicast1}, {{@in=@remote, 0x0, 0x3c}, 0x0, @in=@broadcast}]}]}, 0x1ac}}, 0x0) 00:27:58 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000180)='./control\x00', 0x0) get_thread_area(0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x3) write$binfmt_script(r0, &(0x7f0000000bc0)=ANY=[@ANYBLOB="2321202e2f66696c6530202357994f66e76f4d0fe2208456ebfa69074cb94144c95c4375644bd1747e34c127d80575d10a599f851dc7ad26f3fa377c0a53cc7be2512b7493bf864ecf3f13e46032dbbf3af349b06321cec7a0652f4a5768256cd01a2d3d52de67dc459409a1e50ca51334791c8690646f7a1962ccefc0592a163bacf13da16978ca48eb3784c5baa40700ebfddde7e115f9388051297af49e38e0e3210d232e108a7e9b69c2e56676484906d975d537d128607c901050484e2bdb0d042a40c8ff8f4727cde00677ea73dac796f06f6f7ef7b3406723e7da9fb469c4ce44faff2888c779c000000000000000000000dc4fd7f68b303f980ed08fb24c8052b0626c8b3733eeee64a90f35fd7d88f958406cb5a8ed3b20b7d1278e15c1e1012befbc45a45f203503128d3a99b80bc2c744ae4b8509ca0149b48dc3e11c2d5db4"], 0x145) close(r0) execve(&(0x7f0000000180)='./file0\x00', &(0x7f0000000140), 0x0) r1 = open(&(0x7f0000000000)='./control\x00', 0x80, 0x10) statfs(&(0x7f0000000380)='./control\x00', &(0x7f00000003c0)=""/20) write$P9_RWALK(r0, &(0x7f0000000400)=ANY=[@ANYBLOB="300000006f0100030001030000000400000000000000100000000003000002000000000300000000000000e646f1c5592139cf131e2bf572fa9728dbfac0390865410f3fa1f25743c497e12cb352eac4046b4500f95cfdfb4cf22a3be5c564a47654334c01d5732d382e27bbccd9b903000000c404000000d32dbd21f3ae581d32e69ef9327f7b487d1b4f4502838c08136678bd90733173ab78d6fc264b373611f15c439384ede863ecc86f33e74a14e307490508a39b41394adaba629948536b9cbfaf6fd153ef31439c5bf58116ad346d364e3293ce22b917bee18e0356778d7e12e96945109f9678302ea739b55b8173f4243ec467c6e40248445d0df527c5d637c03c41d500ed9802279fc3d9e4c6767ac0ad7893f64ec0568b7453adce65e06164d0003219476ba93aee62624d6b025582b2917ef27f06eae5af44ea3c7a25d16c5d25a2b04969202ed68056"], 0x14f) getsockopt$inet_sctp6_SCTP_RTOINFO(r1, 0x84, 0x0, &(0x7f0000000080)={0x0, 0x200, 0x2, 0xffffffff}, &(0x7f0000000100)=0x10) [ 868.671660][ T2748] Call Trace: [ 868.674969][ T2748] dump_stack+0x1db/0x2d0 [ 868.679337][ T2748] ? dump_stack_print_info.cold+0x20/0x20 [ 868.685073][ T2748] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 868.691077][ T2748] ? print_usage_bug+0xd0/0xd0 [ 868.695912][ T2748] should_fail.cold+0xa/0x14 [ 868.700526][ T2748] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 868.706347][ T2748] ? ___might_sleep+0x1e7/0x310 [ 868.711199][ T2748] ? arch_local_save_flags+0x50/0x50 [ 868.716526][ T2748] __should_failslab+0x121/0x190 00:27:58 executing program 2: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(&(0x7f0000000080)=@nbd={'/dev/nbd', 0x0, 0xe01aa}, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000240)='hfs\x00\xe6\xa6\xe2\x06g\x96\xb3\v\xf2p\xd5:\x95p\x99\x92\xf2\xc4\x80\x1f\x01\x05\xb8e?\xbfwk\xe4\xe5\xca\x82\xeb\xb1\x04wn*\xf2\xc6\x9d\xc4!\x9e?\x83\x99\x0e\xcc\xa3\x95q.C\xee\x8dIf\xec\xbf\xe8\xb2\t\xedg\x9d\xd9\v\xce\xa3\xa3\xa5\x89F\x03\xefQ\x89\f\xeeRK\x15\xec{D\x9e\x83Z\xabTa\x8e\xcd\x01\xd0\xcfd\xf9c\x87m\xbe>\x81\xba\x9d2\x1c\a,\x12\xbf\xef\xb8m\v\xdf\x8e\xd5\xf5\x1a\xabD\xf6\xe0\x95\xf4\xfeRb_+\xeb\xf9f\xe8\\\x16\xeb\x87\x8e\x8acn4,\x80Q<\x84\xaep\xf9\xfc\x8e\x9f\xed\x06.a\xd5o\x14\r&L\xbd\xb9g\x82;+n\xd5\xcca\v\x86Z\x872\xc3c:`\xf2\x02\xc2\x92\x841\xe7\xca}\"@6}j\x0e\xb7\xa9\xbc\xf3N\xa3\xf3mbd\xfbS\x80\xe0\x11<\x7f\x84\xbe\xa2\xf9\xf7\xee\xf6\x94x\x9d\xe2{\xc5\x83\xc0M\xbb\xd4Io\r\x1c\xd7<\xc0\x84=`\xf1^Y', 0x0, 0x0) [ 868.721470][ T2748] should_failslab+0x9/0x14 [ 868.725977][ T2748] kmem_cache_alloc+0x2be/0x710 [ 868.730878][ T2748] ? shmem_destroy_callback+0xc0/0xc0 [ 868.736260][ T2748] shmem_alloc_inode+0x1c/0x50 [ 868.741034][ T2748] alloc_inode+0x66/0x190 [ 868.745369][ T2748] new_inode_pseudo+0x71/0x1b0 [ 868.750129][ T2748] ? prune_icache_sb+0x1c0/0x1c0 [ 868.755099][ T2748] ? _raw_spin_unlock+0x2d/0x50 [ 868.759933][ T2748] new_inode+0x1f/0x40 [ 868.763994][ T2748] shmem_get_inode+0xe1/0x8d0 [ 868.768690][ T2748] ? shmem_encode_fh+0x340/0x340 [ 868.773609][ T2748] ? lock_downgrade+0xbe0/0xbe0 [ 868.778447][ T2748] ? lock_release+0xc40/0xc40 [ 868.783112][ T2748] ? __check_object_size+0xa3/0x790 [ 868.788315][ T2748] __shmem_file_setup.part.0+0x7e/0x2b0 [ 868.793844][ T2748] shmem_file_setup+0x66/0x90 [ 868.798504][ T2748] __x64_sys_memfd_create+0x2a2/0x4b0 [ 868.803881][ T2748] ? memfd_fcntl+0x1870/0x1870 [ 868.808657][ T2748] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 868.814136][ T2748] do_syscall_64+0x1a3/0x800 [ 868.818710][ T2748] ? syscall_return_slowpath+0x5f0/0x5f0 [ 868.824331][ T2748] ? prepare_exit_to_usermode+0x232/0x3b0 [ 868.830057][ T2748] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 868.835602][ T2748] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 868.841493][ T2748] RIP: 0033:0x458099 [ 868.845402][ T2748] Code: 6d b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 3b b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 868.865002][ T2748] RSP: 002b:00007f92bde86a88 EFLAGS: 00000246 ORIG_RAX: 000000000000013f 00:27:58 executing program 1 (fault-call:0 fault-nth:2): syz_mount_image$reiserfs(&(0x7f0000000180)='reiserfs\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[@ANYBLOB='jdev=.']) [ 868.873422][ T2748] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 0000000000458099 [ 868.881396][ T2748] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00000000004bd0a7 [ 868.889377][ T2748] RBP: 000000000073bf00 R08: 0000000000000000 R09: 00000000fbad8001 [ 868.897347][ T2748] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f92bde876d4 [ 868.905315][ T2748] R13: 00000000004c6910 R14: 00000000004dbc38 R15: 0000000000000003 00:27:58 executing program 0: syz_mount_image$reiserfs(&(0x7f0000000180)='\neiserfs\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[@ANYBLOB='jdev=./file0,jdev=']) 00:27:58 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000480)=@acquire={0x1ac, 0x17, 0x1, 0x0, 0x0, {{@in=@multicast1}, @in6=@ipv4={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1100000000000000], [], @dev}, {@in=@loopback, @in6=@local}, {{@in, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x2}}}, [@tmpl={0x84, 0x5, [{{@in6=@mcast1, 0x0, 0x3c}, 0x0, @in=@multicast1}, {{@in=@remote, 0x0, 0x3c}, 0x0, @in=@broadcast}]}]}, 0x1ac}}, 0x0) [ 869.084489][ T2774] FAULT_INJECTION: forcing a failure. [ 869.084489][ T2774] name failslab, interval 1, probability 0, space 0, times 0 00:27:58 executing program 2: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(&(0x7f0000000080)=@nbd={'/dev/nbd', 0x0, 0xe01da}, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000240)='hfs\x00\xe6\xa6\xe2\x06g\x96\xb3\v\xf2p\xd5:\x95p\x99\x92\xf2\xc4\x80\x1f\x01\x05\xb8e?\xbfwk\xe4\xe5\xca\x82\xeb\xb1\x04wn*\xf2\xc6\x9d\xc4!\x9e?\x83\x99\x0e\xcc\xa3\x95q.C\xee\x8dIf\xec\xbf\xe8\xb2\t\xedg\x9d\xd9\v\xce\xa3\xa3\xa5\x89F\x03\xefQ\x89\f\xeeRK\x15\xec{D\x9e\x83Z\xabTa\x8e\xcd\x01\xd0\xcfd\xf9c\x87m\xbe>\x81\xba\x9d2\x1c\a,\x12\xbf\xef\xb8m\v\xdf\x8e\xd5\xf5\x1a\xabD\xf6\xe0\x95\xf4\xfeRb_+\xeb\xf9f\xe8\\\x16\xeb\x87\x8e\x8acn4,\x80Q<\x84\xaep\xf9\xfc\x8e\x9f\xed\x06.a\xd5o\x14\r&L\xbd\xb9g\x82;+n\xd5\xcca\v\x86Z\x872\xc3c:`\xf2\x02\xc2\x92\x841\xe7\xca}\"@6}j\x0e\xb7\xa9\xbc\xf3N\xa3\xf3mbd\xfbS\x80\xe0\x11<\x7f\x84\xbe\xa2\xf9\xf7\xee\xf6\x94x\x9d\xe2{\xc5\x83\xc0M\xbb\xd4Io\r\x1c\xd7<\xc0\x84=`\xf1^Y', 0x0, 0x0) 00:27:58 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00004e7000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f, 0xe000000}, 0xc, &(0x7f0000000440)={&(0x7f00000001c0)=ANY=[@ANYBLOB="1c00000022000100000000000061960d0100000008fe0c009d0a6be0e6d9fc638f19561d6ceb8a6c9239228215fd206cf204e07953", @ANYRES32=0x0], 0x2}, 0x1, 0x0, 0x0, 0xffffffffffffffff}, 0x0) 00:27:58 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000180)='./control\x00', 0x0) get_thread_area(0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x3) write$binfmt_script(r0, &(0x7f0000000bc0)=ANY=[@ANYBLOB="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"], 0x145) close(r0) execve(&(0x7f0000000180)='./file0\x00', &(0x7f0000000140), 0x0) r1 = open(&(0x7f0000000000)='./control\x00', 0x80, 0x10) statfs(&(0x7f0000000380)='./control\x00', &(0x7f00000003c0)=""/20) write$P9_RWALK(r0, &(0x7f0000000400)=ANY=[@ANYBLOB="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"], 0x14f) getsockopt$inet_sctp6_SCTP_RTOINFO(r1, 0x84, 0x0, &(0x7f0000000080)={0x0, 0x200, 0x2, 0xffffffff}, &(0x7f0000000100)=0x10) [ 869.168917][ T2774] CPU: 0 PID: 2774 Comm: syz-executor1 Not tainted 5.0.0-rc2-next-20190117 #14 [ 869.177900][ T2774] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 869.177908][ T2774] Call Trace: [ 869.177934][ T2774] dump_stack+0x1db/0x2d0 [ 869.177969][ T2774] ? dump_stack_print_info.cold+0x20/0x20 [ 869.201337][ T2774] ? new_inode_pseudo+0x71/0x1b0 [ 869.206274][ T2774] ? new_inode+0x1f/0x40 [ 869.210523][ T2774] ? shmem_get_inode+0xe1/0x8d0 [ 869.215375][ T2774] ? __shmem_file_setup.part.0+0x7e/0x2b0 [ 869.215389][ T2774] ? shmem_file_setup+0x66/0x90 [ 869.215406][ T2774] ? do_syscall_64+0x1a3/0x800 [ 869.215429][ T2774] should_fail.cold+0xa/0x14 [ 869.215450][ T2774] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 869.215474][ T2774] ? ___might_sleep+0x1e7/0x310 [ 869.215491][ T2774] ? arch_local_save_flags+0x50/0x50 [ 869.215505][ T2774] ? lockdep_init_map+0x10c/0x5b0 [ 869.215533][ T2774] __should_failslab+0x121/0x190 [ 869.261352][ T2774] should_failslab+0x9/0x14 [ 869.265879][ T2774] kmem_cache_alloc+0x2be/0x710 [ 869.270762][ T2774] ? kasan_check_read+0x11/0x20 [ 869.275643][ T2774] __d_alloc+0xae/0xbe0 [ 869.279872][ T2774] ? shrink_dcache_for_umount+0x2b0/0x2b0 [ 869.285604][ T2774] ? _raw_spin_unlock+0x2d/0x50 [ 869.290473][ T2774] ? inode_sb_list_add+0x223/0x310 [ 869.295594][ T2774] ? current_time+0x104/0x1b0 [ 869.300287][ T2774] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 869.306692][ T2774] ? lockdep_init_map+0x10c/0x5b0 [ 869.311872][ T2774] d_alloc_pseudo+0x1e/0x30 [ 869.316424][ T2774] alloc_file_pseudo+0x14f/0x3b0 [ 869.321372][ T2774] ? alloc_file+0x4d0/0x4d0 [ 869.325893][ T2774] ? __check_object_size+0xa3/0x790 [ 869.331110][ T2774] __shmem_file_setup.part.0+0x108/0x2b0 [ 869.336758][ T2774] shmem_file_setup+0x66/0x90 [ 869.341507][ T2774] __x64_sys_memfd_create+0x2a2/0x4b0 [ 869.346976][ T2774] ? memfd_fcntl+0x1870/0x1870 [ 869.351836][ T2774] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 869.357372][ T2774] do_syscall_64+0x1a3/0x800 [ 869.362030][ T2774] ? syscall_return_slowpath+0x5f0/0x5f0 [ 869.367728][ T2774] ? prepare_exit_to_usermode+0x232/0x3b0 [ 869.373487][ T2774] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 869.379063][ T2774] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 869.385017][ T2774] RIP: 0033:0x458099 [ 869.388990][ T2774] Code: 6d b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 3b b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 869.408652][ T2774] RSP: 002b:00007f92bde86a88 EFLAGS: 00000246 ORIG_RAX: 000000000000013f 00:27:59 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00004e7000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f, 0x10000000}, 0xc, &(0x7f0000000440)={&(0x7f00000001c0)=ANY=[@ANYBLOB="1c00000022000100000000000061960d0100000008fe0c009d0a6be0e6d9fc638f19561d6ceb8a6c9239228215fd206cf204e07953", @ANYRES32=0x0], 0x2}, 0x1, 0x0, 0x0, 0xffffffffffffffff}, 0x0) [ 869.417068][ T2774] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 0000000000458099 [ 869.425072][ T2774] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00000000004bd0a7 [ 869.433067][ T2774] RBP: 000000000073bf00 R08: 0000000000000000 R09: 00000000fbad8001 [ 869.441093][ T2774] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f92bde876d4 [ 869.449116][ T2774] R13: 00000000004c6910 R14: 00000000004dbc38 R15: 0000000000000003 00:27:59 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000480)=@acquire={0x1ac, 0x17, 0x1, 0x0, 0x0, {{@in=@multicast1}, @in6=@ipv4={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1200000000000000], [], @dev}, {@in=@loopback, @in6=@local}, {{@in, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x2}}}, [@tmpl={0x84, 0x5, [{{@in6=@mcast1, 0x0, 0x3c}, 0x0, @in=@multicast1}, {{@in=@remote, 0x0, 0x3c}, 0x0, @in=@broadcast}]}]}, 0x1ac}}, 0x0) 00:27:59 executing program 2: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(&(0x7f0000000080)=@nbd={'/dev/nbd', 0x0, 0xe01ec}, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000240)='hfs\x00\xe6\xa6\xe2\x06g\x96\xb3\v\xf2p\xd5:\x95p\x99\x92\xf2\xc4\x80\x1f\x01\x05\xb8e?\xbfwk\xe4\xe5\xca\x82\xeb\xb1\x04wn*\xf2\xc6\x9d\xc4!\x9e?\x83\x99\x0e\xcc\xa3\x95q.C\xee\x8dIf\xec\xbf\xe8\xb2\t\xedg\x9d\xd9\v\xce\xa3\xa3\xa5\x89F\x03\xefQ\x89\f\xeeRK\x15\xec{D\x9e\x83Z\xabTa\x8e\xcd\x01\xd0\xcfd\xf9c\x87m\xbe>\x81\xba\x9d2\x1c\a,\x12\xbf\xef\xb8m\v\xdf\x8e\xd5\xf5\x1a\xabD\xf6\xe0\x95\xf4\xfeRb_+\xeb\xf9f\xe8\\\x16\xeb\x87\x8e\x8acn4,\x80Q<\x84\xaep\xf9\xfc\x8e\x9f\xed\x06.a\xd5o\x14\r&L\xbd\xb9g\x82;+n\xd5\xcca\v\x86Z\x872\xc3c:`\xf2\x02\xc2\x92\x841\xe7\xca}\"@6}j\x0e\xb7\xa9\xbc\xf3N\xa3\xf3mbd\xfbS\x80\xe0\x11<\x7f\x84\xbe\xa2\xf9\xf7\xee\xf6\x94x\x9d\xe2{\xc5\x83\xc0M\xbb\xd4Io\r\x1c\xd7<\xc0\x84=`\xf1^Y', 0x0, 0x0) 00:27:59 executing program 1 (fault-call:0 fault-nth:3): syz_mount_image$reiserfs(&(0x7f0000000180)='reiserfs\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[@ANYBLOB='jdev=.']) 00:27:59 executing program 0: syz_mount_image$reiserfs(&(0x7f0000000180)='%eiserfs\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[@ANYBLOB='jdev=./file0,jdev=']) 00:27:59 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000480)=@acquire={0x1ac, 0x17, 0x1, 0x0, 0x0, {{@in=@multicast1}, @in6=@ipv4={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1300000000000000], [], @dev}, {@in=@loopback, @in6=@local}, {{@in, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x2}}}, [@tmpl={0x84, 0x5, [{{@in6=@mcast1, 0x0, 0x3c}, 0x0, @in=@multicast1}, {{@in=@remote, 0x0, 0x3c}, 0x0, @in=@broadcast}]}]}, 0x1ac}}, 0x0) 00:27:59 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000180)='./control\x00', 0x0) get_thread_area(0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x3) write$binfmt_script(r0, &(0x7f0000000bc0)=ANY=[@ANYBLOB="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"], 0x145) close(r0) execve(&(0x7f0000000180)='./file0\x00', &(0x7f0000000140), &(0x7f0000000140)) r1 = open(0x0, 0x80, 0x10) statfs(&(0x7f0000000380)='./control\x00', &(0x7f00000003c0)=""/20) write$P9_RWALK(r0, &(0x7f0000000400)=ANY=[@ANYBLOB="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"], 0x14f) getsockopt$inet_sctp6_SCTP_RTOINFO(r1, 0x84, 0x0, &(0x7f0000000080)={0x0, 0x200, 0x2, 0xffffffff}, &(0x7f0000000100)=0x10) 00:27:59 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00004e7000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f, 0x60000000}, 0xc, &(0x7f0000000440)={&(0x7f00000001c0)=ANY=[@ANYBLOB="1c00000022000100000000000061960d0100000008fe0c009d0a6be0e6d9fc638f19561d6ceb8a6c9239228215fd206cf204e07953", @ANYRES32=0x0], 0x2}, 0x1, 0x0, 0x0, 0xffffffffffffffff}, 0x0) 00:27:59 executing program 2: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(&(0x7f0000000080)=@nbd={'/dev/nbd', 0x0, 0xe01f2}, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000240)='hfs\x00\xe6\xa6\xe2\x06g\x96\xb3\v\xf2p\xd5:\x95p\x99\x92\xf2\xc4\x80\x1f\x01\x05\xb8e?\xbfwk\xe4\xe5\xca\x82\xeb\xb1\x04wn*\xf2\xc6\x9d\xc4!\x9e?\x83\x99\x0e\xcc\xa3\x95q.C\xee\x8dIf\xec\xbf\xe8\xb2\t\xedg\x9d\xd9\v\xce\xa3\xa3\xa5\x89F\x03\xefQ\x89\f\xeeRK\x15\xec{D\x9e\x83Z\xabTa\x8e\xcd\x01\xd0\xcfd\xf9c\x87m\xbe>\x81\xba\x9d2\x1c\a,\x12\xbf\xef\xb8m\v\xdf\x8e\xd5\xf5\x1a\xabD\xf6\xe0\x95\xf4\xfeRb_+\xeb\xf9f\xe8\\\x16\xeb\x87\x8e\x8acn4,\x80Q<\x84\xaep\xf9\xfc\x8e\x9f\xed\x06.a\xd5o\x14\r&L\xbd\xb9g\x82;+n\xd5\xcca\v\x86Z\x872\xc3c:`\xf2\x02\xc2\x92\x841\xe7\xca}\"@6}j\x0e\xb7\xa9\xbc\xf3N\xa3\xf3mbd\xfbS\x80\xe0\x11<\x7f\x84\xbe\xa2\xf9\xf7\xee\xf6\x94x\x9d\xe2{\xc5\x83\xc0M\xbb\xd4Io\r\x1c\xd7<\xc0\x84=`\xf1^Y', 0x0, 0x0) [ 869.941684][ T2810] FAULT_INJECTION: forcing a failure. [ 869.941684][ T2810] name failslab, interval 1, probability 0, space 0, times 0 [ 869.989903][ T2810] CPU: 1 PID: 2810 Comm: syz-executor1 Not tainted 5.0.0-rc2-next-20190117 #14 [ 869.998858][ T2810] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 870.008913][ T2810] Call Trace: [ 870.012217][ T2810] dump_stack+0x1db/0x2d0 [ 870.016559][ T2810] ? dump_stack_print_info.cold+0x20/0x20 [ 870.022295][ T2810] ? new_inode_pseudo+0x71/0x1b0 [ 870.027226][ T2810] ? new_inode+0x1f/0x40 [ 870.031473][ T2810] ? shmem_get_inode+0xe1/0x8d0 [ 870.036331][ T2810] ? __shmem_file_setup.part.0+0x7e/0x2b0 [ 870.042053][ T2810] ? shmem_file_setup+0x66/0x90 [ 870.046951][ T2810] ? do_syscall_64+0x1a3/0x800 [ 870.051741][ T2810] should_fail.cold+0xa/0x14 [ 870.056340][ T2810] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 870.062158][ T2810] ? ___might_sleep+0x1e7/0x310 [ 870.067016][ T2810] ? arch_local_save_flags+0x50/0x50 [ 870.072325][ T2810] ? lockdep_init_map+0x10c/0x5b0 [ 870.077404][ T2810] __should_failslab+0x121/0x190 [ 870.082347][ T2810] should_failslab+0x9/0x14 [ 870.086850][ T2810] kmem_cache_alloc+0x2be/0x710 [ 870.091716][ T2810] ? kasan_check_read+0x11/0x20 [ 870.096574][ T2810] __d_alloc+0xae/0xbe0 [ 870.100781][ T2810] ? shrink_dcache_for_umount+0x2b0/0x2b0 [ 870.106510][ T2810] ? _raw_spin_unlock+0x2d/0x50 [ 870.111365][ T2810] ? inode_sb_list_add+0x223/0x310 [ 870.116502][ T2810] ? current_time+0x104/0x1b0 [ 870.121196][ T2810] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 870.127440][ T2810] ? lockdep_init_map+0x10c/0x5b0 [ 870.132479][ T2810] d_alloc_pseudo+0x1e/0x30 [ 870.136994][ T2810] alloc_file_pseudo+0x14f/0x3b0 [ 870.141944][ T2810] ? alloc_file+0x4d0/0x4d0 [ 870.146451][ T2810] ? __check_object_size+0xa3/0x790 [ 870.151673][ T2810] __shmem_file_setup.part.0+0x108/0x2b0 [ 870.157349][ T2810] shmem_file_setup+0x66/0x90 [ 870.162036][ T2810] __x64_sys_memfd_create+0x2a2/0x4b0 [ 870.167415][ T2810] ? memfd_fcntl+0x1870/0x1870 [ 870.172186][ T2810] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 870.177662][ T2810] do_syscall_64+0x1a3/0x800 [ 870.182277][ T2810] ? syscall_return_slowpath+0x5f0/0x5f0 00:27:59 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000480)=@acquire={0x1ac, 0x17, 0x1, 0x0, 0x0, {{@in=@multicast1}, @in6=@ipv4={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000000000000], [], @dev}, {@in=@loopback, @in6=@local}, {{@in, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x2}}}, [@tmpl={0x84, 0x5, [{{@in6=@mcast1, 0x0, 0x3c}, 0x0, @in=@multicast1}, {{@in=@remote, 0x0, 0x3c}, 0x0, @in=@broadcast}]}]}, 0x1ac}}, 0x0) [ 870.187916][ T2810] ? prepare_exit_to_usermode+0x232/0x3b0 [ 870.193656][ T2810] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 870.199219][ T2810] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 870.205113][ T2810] RIP: 0033:0x458099 [ 870.209013][ T2810] Code: 6d b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 3b b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 870.228655][ T2810] RSP: 002b:00007f92bde86a88 EFLAGS: 00000246 ORIG_RAX: 000000000000013f 00:28:00 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00004e7000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f, 0x9effffff}, 0xc, &(0x7f0000000440)={&(0x7f00000001c0)=ANY=[@ANYBLOB="1c00000022000100000000000061960d0100000008fe0c009d0a6be0e6d9fc638f19561d6ceb8a6c9239228215fd206cf204e07953", @ANYRES32=0x0], 0x2}, 0x1, 0x0, 0x0, 0xffffffffffffffff}, 0x0) 00:28:00 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000180)='./control\x00', 0x0) get_thread_area(0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x3) write$binfmt_script(r0, &(0x7f0000000bc0)=ANY=[@ANYBLOB="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"], 0x145) close(r0) execve(&(0x7f0000000180)='./file0\x00', &(0x7f0000000140), &(0x7f0000000140)) r1 = open(0x0, 0x80, 0x10) statfs(&(0x7f0000000380)='./control\x00', &(0x7f00000003c0)=""/20) write$P9_RWALK(r0, &(0x7f0000000400)=ANY=[@ANYBLOB="300000006f0100030001030000000400000000000000100000000003000002000000000300000000000000e646f1c5592139cf131e2bf572fa9728dbfac0390865410f3fa1f25743c497e12cb352eac4046b4500f95cfdfb4cf22a3be5c564a47654334c01d5732d382e27bbccd9b903000000c404000000d32dbd21f3ae581d32e69ef9327f7b487d1b4f4502838c08136678bd90733173ab78d6fc264b373611f15c439384ede863ecc86f33e74a14e307490508a39b41394adaba629948536b9cbfaf6fd153ef31439c5bf58116ad346d364e3293ce22b917bee18e0356778d7e12e96945109f9678302ea739b55b8173f4243ec467c6e40248445d0df527c5d637c03c41d500ed9802279fc3d9e4c6767ac0ad7893f64ec0568b7453adce65e06164d0003219476ba93aee62624d6b025582b2917ef27f06eae5af44ea3c7a25d16c5d25a2b04969202ed68056"], 0x14f) getsockopt$inet_sctp6_SCTP_RTOINFO(r1, 0x84, 0x0, &(0x7f0000000080)={0x0, 0x200, 0x2, 0xffffffff}, &(0x7f0000000100)=0x10) 00:28:00 executing program 2: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(&(0x7f0000000080)=@nbd={'/dev/nbd', 0x0, 0xe01f6}, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000240)='hfs\x00\xe6\xa6\xe2\x06g\x96\xb3\v\xf2p\xd5:\x95p\x99\x92\xf2\xc4\x80\x1f\x01\x05\xb8e?\xbfwk\xe4\xe5\xca\x82\xeb\xb1\x04wn*\xf2\xc6\x9d\xc4!\x9e?\x83\x99\x0e\xcc\xa3\x95q.C\xee\x8dIf\xec\xbf\xe8\xb2\t\xedg\x9d\xd9\v\xce\xa3\xa3\xa5\x89F\x03\xefQ\x89\f\xeeRK\x15\xec{D\x9e\x83Z\xabTa\x8e\xcd\x01\xd0\xcfd\xf9c\x87m\xbe>\x81\xba\x9d2\x1c\a,\x12\xbf\xef\xb8m\v\xdf\x8e\xd5\xf5\x1a\xabD\xf6\xe0\x95\xf4\xfeRb_+\xeb\xf9f\xe8\\\x16\xeb\x87\x8e\x8acn4,\x80Q<\x84\xaep\xf9\xfc\x8e\x9f\xed\x06.a\xd5o\x14\r&L\xbd\xb9g\x82;+n\xd5\xcca\v\x86Z\x872\xc3c:`\xf2\x02\xc2\x92\x841\xe7\xca}\"@6}j\x0e\xb7\xa9\xbc\xf3N\xa3\xf3mbd\xfbS\x80\xe0\x11<\x7f\x84\xbe\xa2\xf9\xf7\xee\xf6\x94x\x9d\xe2{\xc5\x83\xc0M\xbb\xd4Io\r\x1c\xd7<\xc0\x84=`\xf1^Y', 0x0, 0x0) [ 870.237070][ T2810] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 0000000000458099 [ 870.245035][ T2810] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00000000004bd0a7 [ 870.252984][ T2810] RBP: 000000000073bf00 R08: 0000000000000000 R09: 00000000fbad8001 [ 870.260952][ T2810] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f92bde876d4 [ 870.268977][ T2810] R13: 00000000004c6910 R14: 00000000004dbc38 R15: 0000000000000003 00:28:00 executing program 1 (fault-call:0 fault-nth:4): syz_mount_image$reiserfs(&(0x7f0000000180)='reiserfs\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[@ANYBLOB='jdev=.']) 00:28:00 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000480)=@acquire={0x1ac, 0x17, 0x1, 0x0, 0x0, {{@in=@multicast1}, @in6=@ipv4={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6000000000000000], [], @dev}, {@in=@loopback, @in6=@local}, {{@in, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x2}}}, [@tmpl={0x84, 0x5, [{{@in6=@mcast1, 0x0, 0x3c}, 0x0, @in=@multicast1}, {{@in=@remote, 0x0, 0x3c}, 0x0, @in=@broadcast}]}]}, 0x1ac}}, 0x0) 00:28:00 executing program 0: syz_mount_image$reiserfs(&(0x7f0000000180)='\x86eiserfs\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[@ANYBLOB='jdev=./file0,jdev=']) [ 870.477803][ T2847] FAULT_INJECTION: forcing a failure. [ 870.477803][ T2847] name failslab, interval 1, probability 0, space 0, times 0 [ 870.530191][ T2847] CPU: 0 PID: 2847 Comm: syz-executor1 Not tainted 5.0.0-rc2-next-20190117 #14 [ 870.539165][ T2847] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 870.549226][ T2847] Call Trace: [ 870.552526][ T2847] dump_stack+0x1db/0x2d0 [ 870.556918][ T2847] ? dump_stack_print_info.cold+0x20/0x20 [ 870.562688][ T2847] ? __shmem_file_setup.part.0+0x108/0x2b0 [ 870.568504][ T2847] ? shmem_file_setup+0x66/0x90 [ 870.573376][ T2847] ? __x64_sys_memfd_create+0x2a2/0x4b0 [ 870.578937][ T2847] ? do_syscall_64+0x1a3/0x800 [ 870.583704][ T2847] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 870.589789][ T2847] should_fail.cold+0xa/0x14 [ 870.594390][ T2847] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 870.600202][ T2847] ? ___might_sleep+0x1e7/0x310 [ 870.605177][ T2847] ? arch_local_save_flags+0x50/0x50 [ 870.610487][ T2847] ? rcu_lockdep_current_cpu_online+0x1aa/0x220 [ 870.616766][ T2847] __should_failslab+0x121/0x190 [ 870.621732][ T2847] should_failslab+0x9/0x14 [ 870.626267][ T2847] kmem_cache_alloc+0x2be/0x710 [ 870.631146][ T2847] ? __alloc_file+0x93/0x480 [ 870.635761][ T2847] ? rcu_read_lock_sched_held+0x110/0x130 [ 870.641490][ T2847] ? kmem_cache_alloc+0x341/0x710 [ 870.646521][ T2847] security_file_alloc+0x39/0x170 [ 870.651554][ T2847] __alloc_file+0x128/0x480 [ 870.656062][ T2847] ? ____fput+0x20/0x20 [ 870.660229][ T2847] ? kasan_check_read+0x11/0x20 [ 870.665534][ T2847] ? do_raw_spin_unlock+0xa0/0x330 [ 870.670664][ T2847] ? do_raw_spin_trylock+0x270/0x270 [ 870.675957][ T2847] alloc_empty_file+0x72/0x170 [ 870.680732][ T2847] alloc_file+0x5e/0x4d0 [ 870.685011][ T2847] alloc_file_pseudo+0x24a/0x3b0 [ 870.689973][ T2847] ? alloc_file+0x4d0/0x4d0 [ 870.694501][ T2847] ? __check_object_size+0xa3/0x790 [ 870.699717][ T2847] __shmem_file_setup.part.0+0x108/0x2b0 [ 870.705378][ T2847] shmem_file_setup+0x66/0x90 [ 870.710058][ T2847] __x64_sys_memfd_create+0x2a2/0x4b0 [ 870.715433][ T2847] ? memfd_fcntl+0x1870/0x1870 [ 870.720204][ T2847] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 870.725688][ T2847] do_syscall_64+0x1a3/0x800 00:28:00 executing program 2: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(&(0x7f0000000080)=@nbd={'/dev/nbd', 0x0, 0xe0202}, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000240)='hfs\x00\xe6\xa6\xe2\x06g\x96\xb3\v\xf2p\xd5:\x95p\x99\x92\xf2\xc4\x80\x1f\x01\x05\xb8e?\xbfwk\xe4\xe5\xca\x82\xeb\xb1\x04wn*\xf2\xc6\x9d\xc4!\x9e?\x83\x99\x0e\xcc\xa3\x95q.C\xee\x8dIf\xec\xbf\xe8\xb2\t\xedg\x9d\xd9\v\xce\xa3\xa3\xa5\x89F\x03\xefQ\x89\f\xeeRK\x15\xec{D\x9e\x83Z\xabTa\x8e\xcd\x01\xd0\xcfd\xf9c\x87m\xbe>\x81\xba\x9d2\x1c\a,\x12\xbf\xef\xb8m\v\xdf\x8e\xd5\xf5\x1a\xabD\xf6\xe0\x95\xf4\xfeRb_+\xeb\xf9f\xe8\\\x16\xeb\x87\x8e\x8acn4,\x80Q<\x84\xaep\xf9\xfc\x8e\x9f\xed\x06.a\xd5o\x14\r&L\xbd\xb9g\x82;+n\xd5\xcca\v\x86Z\x872\xc3c:`\xf2\x02\xc2\x92\x841\xe7\xca}\"@6}j\x0e\xb7\xa9\xbc\xf3N\xa3\xf3mbd\xfbS\x80\xe0\x11<\x7f\x84\xbe\xa2\xf9\xf7\xee\xf6\x94x\x9d\xe2{\xc5\x83\xc0M\xbb\xd4Io\r\x1c\xd7<\xc0\x84=`\xf1^Y', 0x0, 0x0) 00:28:00 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00004e7000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f, 0xb00a0000}, 0xc, &(0x7f0000000440)={&(0x7f00000001c0)=ANY=[@ANYBLOB="1c00000022000100000000000061960d0100000008fe0c009d0a6be0e6d9fc638f19561d6ceb8a6c9239228215fd206cf204e07953", @ANYRES32=0x0], 0x2}, 0x1, 0x0, 0x0, 0xffffffffffffffff}, 0x0) 00:28:00 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000480)=@acquire={0x1ac, 0x17, 0x1, 0x0, 0x0, {{@in=@multicast1}, @in6=@ipv4={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9effffff00000000], [], @dev}, {@in=@loopback, @in6=@local}, {{@in, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x2}}}, [@tmpl={0x84, 0x5, [{{@in6=@mcast1, 0x0, 0x3c}, 0x0, @in=@multicast1}, {{@in=@remote, 0x0, 0x3c}, 0x0, @in=@broadcast}]}]}, 0x1ac}}, 0x0) [ 870.730285][ T2847] ? syscall_return_slowpath+0x5f0/0x5f0 [ 870.735931][ T2847] ? prepare_exit_to_usermode+0x232/0x3b0 [ 870.741722][ T2847] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 870.747273][ T2847] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 870.753161][ T2847] RIP: 0033:0x458099 [ 870.757064][ T2847] Code: 6d b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 3b b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00:28:00 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000180)='./control\x00', 0x0) get_thread_area(0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x3) write$binfmt_script(r0, &(0x7f0000000bc0)=ANY=[@ANYBLOB="2321202e2f66696c6530202357994f66e76f4d0fe2208456ebfa69074cb94144c95c4375644bd1747e34c127d80575d10a599f851dc7ad26f3fa377c0a53cc7be2512b7493bf864ecf3f13e46032dbbf3af349b06321cec7a0652f4a5768256cd01a2d3d52de67dc459409a1e50ca51334791c8690646f7a1962ccefc0592a163bacf13da16978ca48eb3784c5baa40700ebfddde7e115f9388051297af49e38e0e3210d232e108a7e9b69c2e56676484906d975d537d128607c901050484e2bdb0d042a40c8ff8f4727cde00677ea73dac796f06f6f7ef7b3406723e7da9fb469c4ce44faff2888c779c000000000000000000000dc4fd7f68b303f980ed08fb24c8052b0626c8b3733eeee64a90f35fd7d88f958406cb5a8ed3b20b7d1278e15c1e1012befbc45a45f203503128d3a99b80bc2c744ae4b8509ca0149b48dc3e11c2d5db4"], 0x145) close(r0) execve(&(0x7f0000000180)='./file0\x00', &(0x7f0000000140), &(0x7f0000000140)) r1 = open(0x0, 0x80, 0x10) statfs(&(0x7f0000000380)='./control\x00', &(0x7f00000003c0)=""/20) write$P9_RWALK(r0, &(0x7f0000000400)=ANY=[@ANYBLOB="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"], 0x14f) getsockopt$inet_sctp6_SCTP_RTOINFO(r1, 0x84, 0x0, &(0x7f0000000080)={0x0, 0x200, 0x2, 0xffffffff}, &(0x7f0000000100)=0x10) 00:28:00 executing program 1 (fault-call:0 fault-nth:5): syz_mount_image$reiserfs(&(0x7f0000000180)='reiserfs\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[@ANYBLOB='jdev=.']) [ 870.776669][ T2847] RSP: 002b:00007f92bde86a88 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 870.785162][ T2847] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 0000000000458099 [ 870.785172][ T2847] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00000000004bd0a7 [ 870.785182][ T2847] RBP: 000000000073bf00 R08: 0000000000000000 R09: 00000000fbad8001 [ 870.785190][ T2847] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f92bde876d4 [ 870.785214][ T2847] R13: 00000000004c6910 R14: 00000000004dbc38 R15: 0000000000000003 [ 870.939073][ T2867] FAULT_INJECTION: forcing a failure. [ 870.939073][ T2867] name failslab, interval 1, probability 0, space 0, times 0 00:28:00 executing program 2: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(&(0x7f0000000080)=@nbd={'/dev/nbd', 0x0, 0xe0204}, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000240)='hfs\x00\xe6\xa6\xe2\x06g\x96\xb3\v\xf2p\xd5:\x95p\x99\x92\xf2\xc4\x80\x1f\x01\x05\xb8e?\xbfwk\xe4\xe5\xca\x82\xeb\xb1\x04wn*\xf2\xc6\x9d\xc4!\x9e?\x83\x99\x0e\xcc\xa3\x95q.C\xee\x8dIf\xec\xbf\xe8\xb2\t\xedg\x9d\xd9\v\xce\xa3\xa3\xa5\x89F\x03\xefQ\x89\f\xeeRK\x15\xec{D\x9e\x83Z\xabTa\x8e\xcd\x01\xd0\xcfd\xf9c\x87m\xbe>\x81\xba\x9d2\x1c\a,\x12\xbf\xef\xb8m\v\xdf\x8e\xd5\xf5\x1a\xabD\xf6\xe0\x95\xf4\xfeRb_+\xeb\xf9f\xe8\\\x16\xeb\x87\x8e\x8acn4,\x80Q<\x84\xaep\xf9\xfc\x8e\x9f\xed\x06.a\xd5o\x14\r&L\xbd\xb9g\x82;+n\xd5\xcca\v\x86Z\x872\xc3c:`\xf2\x02\xc2\x92\x841\xe7\xca}\"@6}j\x0e\xb7\xa9\xbc\xf3N\xa3\xf3mbd\xfbS\x80\xe0\x11<\x7f\x84\xbe\xa2\xf9\xf7\xee\xf6\x94x\x9d\xe2{\xc5\x83\xc0M\xbb\xd4Io\r\x1c\xd7<\xc0\x84=`\xf1^Y', 0x0, 0x0) 00:28:00 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00004e7000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f, 0xf0ffffff}, 0xc, &(0x7f0000000440)={&(0x7f00000001c0)=ANY=[@ANYBLOB="1c00000022000100000000000061960d0100000008fe0c009d0a6be0e6d9fc638f19561d6ceb8a6c9239228215fd206cf204e07953", @ANYRES32=0x0], 0x2}, 0x1, 0x0, 0x0, 0xffffffffffffffff}, 0x0) [ 871.034022][ T2867] CPU: 0 PID: 2867 Comm: syz-executor1 Not tainted 5.0.0-rc2-next-20190117 #14 [ 871.043002][ T2867] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 871.053057][ T2867] Call Trace: [ 871.056365][ T2867] dump_stack+0x1db/0x2d0 [ 871.060710][ T2867] ? dump_stack_print_info.cold+0x20/0x20 [ 871.066442][ T2867] ? __shmem_file_setup.part.0+0x108/0x2b0 [ 871.072250][ T2867] ? shmem_file_setup+0x66/0x90 [ 871.077107][ T2867] ? __x64_sys_memfd_create+0x2a2/0x4b0 [ 871.082670][ T2867] ? do_syscall_64+0x1a3/0x800 [ 871.087444][ T2867] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 871.093527][ T2867] should_fail.cold+0xa/0x14 [ 871.098130][ T2867] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 871.103954][ T2867] ? ___might_sleep+0x1e7/0x310 [ 871.108815][ T2867] ? arch_local_save_flags+0x50/0x50 [ 871.114116][ T2867] ? rcu_lockdep_current_cpu_online+0x1aa/0x220 [ 871.120365][ T2867] __should_failslab+0x121/0x190 [ 871.125337][ T2867] should_failslab+0x9/0x14 00:28:00 executing program 2: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(&(0x7f0000000080)=@nbd={'/dev/nbd', 0x0, 0xe0232}, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000240)='hfs\x00\xe6\xa6\xe2\x06g\x96\xb3\v\xf2p\xd5:\x95p\x99\x92\xf2\xc4\x80\x1f\x01\x05\xb8e?\xbfwk\xe4\xe5\xca\x82\xeb\xb1\x04wn*\xf2\xc6\x9d\xc4!\x9e?\x83\x99\x0e\xcc\xa3\x95q.C\xee\x8dIf\xec\xbf\xe8\xb2\t\xedg\x9d\xd9\v\xce\xa3\xa3\xa5\x89F\x03\xefQ\x89\f\xeeRK\x15\xec{D\x9e\x83Z\xabTa\x8e\xcd\x01\xd0\xcfd\xf9c\x87m\xbe>\x81\xba\x9d2\x1c\a,\x12\xbf\xef\xb8m\v\xdf\x8e\xd5\xf5\x1a\xabD\xf6\xe0\x95\xf4\xfeRb_+\xeb\xf9f\xe8\\\x16\xeb\x87\x8e\x8acn4,\x80Q<\x84\xaep\xf9\xfc\x8e\x9f\xed\x06.a\xd5o\x14\r&L\xbd\xb9g\x82;+n\xd5\xcca\v\x86Z\x872\xc3c:`\xf2\x02\xc2\x92\x841\xe7\xca}\"@6}j\x0e\xb7\xa9\xbc\xf3N\xa3\xf3mbd\xfbS\x80\xe0\x11<\x7f\x84\xbe\xa2\xf9\xf7\xee\xf6\x94x\x9d\xe2{\xc5\x83\xc0M\xbb\xd4Io\r\x1c\xd7<\xc0\x84=`\xf1^Y', 0x0, 0x0) 00:28:00 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00004e7000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f, 0xfffff000}, 0xc, &(0x7f0000000440)={&(0x7f00000001c0)=ANY=[@ANYBLOB="1c00000022000100000000000061960d0100000008fe0c009d0a6be0e6d9fc638f19561d6ceb8a6c9239228215fd206cf204e07953", @ANYRES32=0x0], 0x2}, 0x1, 0x0, 0x0, 0xffffffffffffffff}, 0x0) [ 871.129847][ T2867] kmem_cache_alloc+0x2be/0x710 [ 871.134923][ T2867] ? __alloc_file+0x93/0x480 [ 871.139511][ T2867] ? rcu_read_lock_sched_held+0x110/0x130 [ 871.145261][ T2867] ? kmem_cache_alloc+0x341/0x710 [ 871.150314][ T2867] security_file_alloc+0x39/0x170 [ 871.155394][ T2867] __alloc_file+0x128/0x480 [ 871.159925][ T2867] ? ____fput+0x20/0x20 [ 871.164093][ T2867] ? kasan_check_read+0x11/0x20 [ 871.168959][ T2867] ? do_raw_spin_unlock+0xa0/0x330 [ 871.174083][ T2867] ? do_raw_spin_trylock+0x270/0x270 [ 871.179383][ T2867] alloc_empty_file+0x72/0x170 00:28:00 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000180)='./control\x00', 0x0) get_thread_area(0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x3) write$binfmt_script(r0, &(0x7f0000000bc0)=ANY=[@ANYBLOB="2321202e2f66696c6530202357994f66e76f4d0fe2208456ebfa69074cb94144c95c4375644bd1747e34c127d80575d10a599f851dc7ad26f3fa377c0a53cc7be2512b7493bf864ecf3f13e46032dbbf3af349b06321cec7a0652f4a5768256cd01a2d3d52de67dc459409a1e50ca51334791c8690646f7a1962ccefc0592a163bacf13da16978ca48eb3784c5baa40700ebfddde7e115f9388051297af49e38e0e3210d232e108a7e9b69c2e56676484906d975d537d128607c901050484e2bdb0d042a40c8ff8f4727cde00677ea73dac796f06f6f7ef7b3406723e7da9fb469c4ce44faff2888c779c000000000000000000000dc4fd7f68b303f980ed08fb24c8052b0626c8b3733eeee64a90f35fd7d88f958406cb5a8ed3b20b7d1278e15c1e1012befbc45a45f203503128d3a99b80bc2c744ae4b8509ca0149b48dc3e11c2d5db4"], 0x145) close(r0) execve(&(0x7f0000000180)='./file0\x00', &(0x7f0000000140), &(0x7f0000000140)) r1 = open(&(0x7f0000000000)='./control\x00', 0x0, 0x10) statfs(&(0x7f0000000380)='./control\x00', &(0x7f00000003c0)=""/20) write$P9_RWALK(r0, &(0x7f0000000400)=ANY=[@ANYBLOB="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"], 0x14f) getsockopt$inet_sctp6_SCTP_RTOINFO(r1, 0x84, 0x0, &(0x7f0000000080)={0x0, 0x200, 0x2, 0xffffffff}, &(0x7f0000000100)=0x10) [ 871.184154][ T2867] alloc_file+0x5e/0x4d0 [ 871.188408][ T2867] alloc_file_pseudo+0x24a/0x3b0 [ 871.193380][ T2867] ? alloc_file+0x4d0/0x4d0 [ 871.197905][ T2867] ? __check_object_size+0xa3/0x790 [ 871.203181][ T2867] __shmem_file_setup.part.0+0x108/0x2b0 [ 871.208822][ T2867] shmem_file_setup+0x66/0x90 [ 871.208846][ T2867] __x64_sys_memfd_create+0x2a2/0x4b0 [ 871.218872][ T2867] ? memfd_fcntl+0x1870/0x1870 [ 871.223659][ T2867] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 871.229135][ T2867] do_syscall_64+0x1a3/0x800 [ 871.233730][ T2867] ? syscall_return_slowpath+0x5f0/0x5f0 [ 871.233748][ T2867] ? prepare_exit_to_usermode+0x232/0x3b0 [ 871.233785][ T2867] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 871.233812][ T2867] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 871.233826][ T2867] RIP: 0033:0x458099 [ 871.233842][ T2867] Code: 6d b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 3b b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00:28:00 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000480)=@acquire={0x1ac, 0x17, 0x1, 0x0, 0x0, {{@in=@multicast1}, @in6=@ipv4={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf0ffffff00000000], [], @dev}, {@in=@loopback, @in6=@local}, {{@in, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x2}}}, [@tmpl={0x84, 0x5, [{{@in6=@mcast1, 0x0, 0x3c}, 0x0, @in=@multicast1}, {{@in=@remote, 0x0, 0x3c}, 0x0, @in=@broadcast}]}]}, 0x1ac}}, 0x0) [ 871.233851][ T2867] RSP: 002b:00007f92bde86a88 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 871.233866][ T2867] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 0000000000458099 [ 871.233875][ T2867] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00000000004bd0a7 [ 871.233897][ T2867] RBP: 000000000073bf00 R08: 0000000000000000 R09: 00000000fbad8001 [ 871.250854][ T2867] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f92bde876d4 [ 871.250863][ T2867] R13: 00000000004c6910 R14: 00000000004dbc38 R15: 0000000000000003 00:28:01 executing program 0: syz_mount_image$reiserfs(&(0x7f0000000180)='r\niserfs\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[@ANYBLOB='jdev=./file0,jdev=']) 00:28:01 executing program 1 (fault-call:0 fault-nth:6): syz_mount_image$reiserfs(&(0x7f0000000180)='reiserfs\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[@ANYBLOB='jdev=.']) 00:28:01 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000480)=@acquire={0x1ac, 0x17, 0x1, 0x0, 0x0, {{@in=@multicast1}, @in6=@ipv4={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfcffffff00000000], [], @dev}, {@in=@loopback, @in6=@local}, {{@in, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x2}}}, [@tmpl={0x84, 0x5, [{{@in6=@mcast1, 0x0, 0x3c}, 0x0, @in=@multicast1}, {{@in=@remote, 0x0, 0x3c}, 0x0, @in=@broadcast}]}]}, 0x1ac}}, 0x0) 00:28:01 executing program 2: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(&(0x7f0000000080)=@nbd={'/dev/nbd', 0x0, 0xe0242}, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000240)='hfs\x00\xe6\xa6\xe2\x06g\x96\xb3\v\xf2p\xd5:\x95p\x99\x92\xf2\xc4\x80\x1f\x01\x05\xb8e?\xbfwk\xe4\xe5\xca\x82\xeb\xb1\x04wn*\xf2\xc6\x9d\xc4!\x9e?\x83\x99\x0e\xcc\xa3\x95q.C\xee\x8dIf\xec\xbf\xe8\xb2\t\xedg\x9d\xd9\v\xce\xa3\xa3\xa5\x89F\x03\xefQ\x89\f\xeeRK\x15\xec{D\x9e\x83Z\xabTa\x8e\xcd\x01\xd0\xcfd\xf9c\x87m\xbe>\x81\xba\x9d2\x1c\a,\x12\xbf\xef\xb8m\v\xdf\x8e\xd5\xf5\x1a\xabD\xf6\xe0\x95\xf4\xfeRb_+\xeb\xf9f\xe8\\\x16\xeb\x87\x8e\x8acn4,\x80Q<\x84\xaep\xf9\xfc\x8e\x9f\xed\x06.a\xd5o\x14\r&L\xbd\xb9g\x82;+n\xd5\xcca\v\x86Z\x872\xc3c:`\xf2\x02\xc2\x92\x841\xe7\xca}\"@6}j\x0e\xb7\xa9\xbc\xf3N\xa3\xf3mbd\xfbS\x80\xe0\x11<\x7f\x84\xbe\xa2\xf9\xf7\xee\xf6\x94x\x9d\xe2{\xc5\x83\xc0M\xbb\xd4Io\r\x1c\xd7<\xc0\x84=`\xf1^Y', 0x0, 0x0) 00:28:01 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000180)='./control\x00', 0x0) get_thread_area(0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x3) write$binfmt_script(r0, &(0x7f0000000bc0)=ANY=[@ANYBLOB="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"], 0x145) close(r0) execve(&(0x7f0000000180)='./file0\x00', &(0x7f0000000140), &(0x7f0000000140)) r1 = open(&(0x7f0000000000)='./control\x00', 0x0, 0x10) statfs(&(0x7f0000000380)='./control\x00', &(0x7f00000003c0)=""/20) write$P9_RWALK(r0, &(0x7f0000000400)=ANY=[@ANYBLOB="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"], 0x14f) getsockopt$inet_sctp6_SCTP_RTOINFO(r1, 0x84, 0x0, &(0x7f0000000080)={0x0, 0x200, 0x2, 0xffffffff}, &(0x7f0000000100)=0x10) 00:28:01 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00004e7000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f, 0xffffff7f}, 0xc, &(0x7f0000000440)={&(0x7f00000001c0)=ANY=[@ANYBLOB="1c00000022000100000000000061960d0100000008fe0c009d0a6be0e6d9fc638f19561d6ceb8a6c9239228215fd206cf204e07953", @ANYRES32=0x0], 0x2}, 0x1, 0x0, 0x0, 0xffffffffffffffff}, 0x0) [ 871.534294][ T2897] FAULT_INJECTION: forcing a failure. [ 871.534294][ T2897] name failslab, interval 1, probability 0, space 0, times 0 [ 871.553811][ T2897] CPU: 0 PID: 2897 Comm: syz-executor1 Not tainted 5.0.0-rc2-next-20190117 #14 [ 871.562763][ T2897] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 871.572818][ T2897] Call Trace: [ 871.572844][ T2897] dump_stack+0x1db/0x2d0 [ 871.572866][ T2897] ? dump_stack_print_info.cold+0x20/0x20 [ 871.580475][ T2897] ? lock_downgrade+0xbe0/0xbe0 [ 871.580504][ T2897] should_fail.cold+0xa/0x14 [ 871.595607][ T2897] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 871.601427][ T2897] ? ___might_sleep+0x1e7/0x310 [ 871.606309][ T2897] ? arch_local_save_flags+0x50/0x50 [ 871.611650][ T2897] ? print_usage_bug+0xd0/0xd0 [ 871.611678][ T2897] __should_failslab+0x121/0x190 [ 871.611715][ T2897] should_failslab+0x9/0x14 [ 871.625923][ T2897] kmem_cache_alloc+0x2be/0x710 [ 871.630774][ T2897] ? __lock_acquire+0x572/0x4a10 [ 871.635745][ T2897] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 871.642024][ T2897] __alloc_file+0x93/0x480 [ 871.646445][ T2897] ? ____fput+0x20/0x20 [ 871.650609][ T2897] ? mark_held_locks+0x100/0x100 [ 871.655568][ T2897] alloc_empty_file+0x72/0x170 [ 871.655589][ T2897] path_openat+0x112/0x5660 [ 871.655609][ T2897] ? add_lock_to_list.isra.0+0x450/0x450 [ 871.655648][ T2897] ? __alloc_fd+0x549/0x700 [ 871.670515][ T2897] ? find_held_lock+0x35/0x120 [ 871.670532][ T2897] ? path_lookupat.isra.0+0xba0/0xba0 [ 871.670550][ T2897] ? do_dup2+0x580/0x580 [ 871.670575][ T2897] ? kasan_check_read+0x11/0x20 [ 871.670591][ T2897] ? do_raw_spin_unlock+0xa0/0x330 [ 871.670616][ T2897] ? do_raw_spin_trylock+0x270/0x270 [ 871.679871][ T2897] ? __phys_addr_symbol+0x30/0x70 [ 871.694294][ T2897] do_filp_open+0x26f/0x370 [ 871.694312][ T2897] ? may_open_dev+0x100/0x100 [ 871.694329][ T2897] ? exit_files+0xb0/0xb0 [ 871.694363][ T2897] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 871.694383][ T2897] ? digsig_verify.cold+0x32/0x32 00:28:01 executing program 2: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(&(0x7f0000000080)=@nbd={'/dev/nbd', 0x0, 0xe027a}, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000240)='hfs\x00\xe6\xa6\xe2\x06g\x96\xb3\v\xf2p\xd5:\x95p\x99\x92\xf2\xc4\x80\x1f\x01\x05\xb8e?\xbfwk\xe4\xe5\xca\x82\xeb\xb1\x04wn*\xf2\xc6\x9d\xc4!\x9e?\x83\x99\x0e\xcc\xa3\x95q.C\xee\x8dIf\xec\xbf\xe8\xb2\t\xedg\x9d\xd9\v\xce\xa3\xa3\xa5\x89F\x03\xefQ\x89\f\xeeRK\x15\xec{D\x9e\x83Z\xabTa\x8e\xcd\x01\xd0\xcfd\xf9c\x87m\xbe>\x81\xba\x9d2\x1c\a,\x12\xbf\xef\xb8m\v\xdf\x8e\xd5\xf5\x1a\xabD\xf6\xe0\x95\xf4\xfeRb_+\xeb\xf9f\xe8\\\x16\xeb\x87\x8e\x8acn4,\x80Q<\x84\xaep\xf9\xfc\x8e\x9f\xed\x06.a\xd5o\x14\r&L\xbd\xb9g\x82;+n\xd5\xcca\v\x86Z\x872\xc3c:`\xf2\x02\xc2\x92\x841\xe7\xca}\"@6}j\x0e\xb7\xa9\xbc\xf3N\xa3\xf3mbd\xfbS\x80\xe0\x11<\x7f\x84\xbe\xa2\xf9\xf7\xee\xf6\x94x\x9d\xe2{\xc5\x83\xc0M\xbb\xd4Io\r\x1c\xd7<\xc0\x84=`\xf1^Y', 0x0, 0x0) [ 871.694402][ T2897] ? get_unused_fd_flags+0x122/0x1a0 [ 871.694421][ T2897] ? __alloc_fd+0x700/0x700 [ 871.709810][ T2897] ? getname_flags+0x277/0x5b0 [ 871.709834][ T2897] do_sys_open+0x59a/0x7c0 [ 871.709854][ T2897] ? filp_open+0x80/0x80 [ 871.709878][ T2897] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 871.709903][ T2897] ? trace_hardirqs_off_caller+0x300/0x300 [ 871.709921][ T2897] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 871.709946][ T2897] __x64_sys_open+0x7e/0xc0 [ 871.779740][ T2897] do_syscall_64+0x1a3/0x800 00:28:01 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000480)=@acquire={0x1ac, 0x17, 0x1, 0x0, 0x0, {{@in=@multicast1}, @in6=@ipv4={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffff7f00000000], [], @dev}, {@in=@loopback, @in6=@local}, {{@in, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x2}}}, [@tmpl={0x84, 0x5, [{{@in6=@mcast1, 0x0, 0x3c}, 0x0, @in=@multicast1}, {{@in=@remote, 0x0, 0x3c}, 0x0, @in=@broadcast}]}]}, 0x1ac}}, 0x0) [ 871.784339][ T2897] ? syscall_return_slowpath+0x5f0/0x5f0 [ 871.789994][ T2897] ? prepare_exit_to_usermode+0x232/0x3b0 [ 871.795729][ T2897] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 871.801305][ T2897] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 871.807202][ T2897] RIP: 0033:0x412041 [ 871.811191][ T2897] Code: 75 14 b8 02 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 b4 17 00 00 c3 48 83 ec 08 e8 2a fa ff ff 48 89 04 24 b8 02 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 73 fa ff ff 48 89 d0 48 83 c4 08 48 3d 01 00:28:01 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000180)='./control\x00', 0x0) get_thread_area(0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x3) write$binfmt_script(r0, &(0x7f0000000bc0)=ANY=[@ANYBLOB="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"], 0x145) close(r0) execve(&(0x7f0000000180)='./file0\x00', &(0x7f0000000140), &(0x7f0000000140)) r1 = open(&(0x7f0000000000)='./control\x00', 0x0, 0x10) statfs(&(0x7f0000000380)='./control\x00', &(0x7f00000003c0)=""/20) write$P9_RWALK(r0, &(0x7f0000000400)=ANY=[@ANYBLOB="300000006f0100030001030000000400000000000000100000000003000002000000000300000000000000e646f1c5592139cf131e2bf572fa9728dbfac0390865410f3fa1f25743c497e12cb352eac4046b4500f95cfdfb4cf22a3be5c564a47654334c01d5732d382e27bbccd9b903000000c404000000d32dbd21f3ae581d32e69ef9327f7b487d1b4f4502838c08136678bd90733173ab78d6fc264b373611f15c439384ede863ecc86f33e74a14e307490508a39b41394adaba629948536b9cbfaf6fd153ef31439c5bf58116ad346d364e3293ce22b917bee18e0356778d7e12e96945109f9678302ea739b55b8173f4243ec467c6e40248445d0df527c5d637c03c41d500ed9802279fc3d9e4c6767ac0ad7893f64ec0568b7453adce65e06164d0003219476ba93aee62624d6b025582b2917ef27f06eae5af44ea3c7a25d16c5d25a2b04969202ed68056"], 0x14f) getsockopt$inet_sctp6_SCTP_RTOINFO(r1, 0x84, 0x0, &(0x7f0000000080)={0x0, 0x200, 0x2, 0xffffffff}, &(0x7f0000000100)=0x10) 00:28:01 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00004e7000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f, 0xffffff9e}, 0xc, &(0x7f0000000440)={&(0x7f00000001c0)=ANY=[@ANYBLOB="1c00000022000100000000000061960d0100000008fe0c009d0a6be0e6d9fc638f19561d6ceb8a6c9239228215fd206cf204e07953", @ANYRES32=0x0], 0x2}, 0x1, 0x0, 0x0, 0xffffffffffffffff}, 0x0) [ 871.830801][ T2897] RSP: 002b:00007f92bde86a80 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 [ 871.839233][ T2897] RAX: ffffffffffffffda RBX: 0000000000000010 RCX: 0000000000412041 [ 871.847211][ T2897] RDX: 00007f92bde86afa RSI: 0000000000000002 RDI: 00007f92bde86af0 [ 871.855229][ T2897] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 871.863203][ T2897] R10: 0000000000000075 R11: 0000000000000293 R12: 0000000000000004 [ 871.871189][ T2897] R13: 0000000000000000 R14: 00000000004dbc38 R15: 0000000000000003 00:28:01 executing program 1 (fault-call:0 fault-nth:7): syz_mount_image$reiserfs(&(0x7f0000000180)='reiserfs\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[@ANYBLOB='jdev=.']) 00:28:01 executing program 2: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(&(0x7f0000000080)=@nbd={'/dev/nbd', 0x0, 0xe0282}, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000240)='hfs\x00\xe6\xa6\xe2\x06g\x96\xb3\v\xf2p\xd5:\x95p\x99\x92\xf2\xc4\x80\x1f\x01\x05\xb8e?\xbfwk\xe4\xe5\xca\x82\xeb\xb1\x04wn*\xf2\xc6\x9d\xc4!\x9e?\x83\x99\x0e\xcc\xa3\x95q.C\xee\x8dIf\xec\xbf\xe8\xb2\t\xedg\x9d\xd9\v\xce\xa3\xa3\xa5\x89F\x03\xefQ\x89\f\xeeRK\x15\xec{D\x9e\x83Z\xabTa\x8e\xcd\x01\xd0\xcfd\xf9c\x87m\xbe>\x81\xba\x9d2\x1c\a,\x12\xbf\xef\xb8m\v\xdf\x8e\xd5\xf5\x1a\xabD\xf6\xe0\x95\xf4\xfeRb_+\xeb\xf9f\xe8\\\x16\xeb\x87\x8e\x8acn4,\x80Q<\x84\xaep\xf9\xfc\x8e\x9f\xed\x06.a\xd5o\x14\r&L\xbd\xb9g\x82;+n\xd5\xcca\v\x86Z\x872\xc3c:`\xf2\x02\xc2\x92\x841\xe7\xca}\"@6}j\x0e\xb7\xa9\xbc\xf3N\xa3\xf3mbd\xfbS\x80\xe0\x11<\x7f\x84\xbe\xa2\xf9\xf7\xee\xf6\x94x\x9d\xe2{\xc5\x83\xc0M\xbb\xd4Io\r\x1c\xd7<\xc0\x84=`\xf1^Y', 0x0, 0x0) [ 872.040796][ T2928] FAULT_INJECTION: forcing a failure. [ 872.040796][ T2928] name failslab, interval 1, probability 0, space 0, times 0 [ 872.081445][ T2928] CPU: 1 PID: 2928 Comm: syz-executor1 Not tainted 5.0.0-rc2-next-20190117 #14 [ 872.090404][ T2928] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 872.090425][ T2928] Call Trace: [ 872.103782][ T2928] dump_stack+0x1db/0x2d0 [ 872.108123][ T2928] ? dump_stack_print_info.cold+0x20/0x20 [ 872.113857][ T2928] should_fail.cold+0xa/0x14 [ 872.118454][ T2928] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 872.124283][ T2928] ? ___might_sleep+0x1e7/0x310 [ 872.129137][ T2928] ? arch_local_save_flags+0x50/0x50 [ 872.134440][ T2928] ? print_usage_bug+0xd0/0xd0 [ 872.139211][ T2928] __should_failslab+0x121/0x190 [ 872.139233][ T2928] should_failslab+0x9/0x14 [ 872.139255][ T2928] kmem_cache_alloc+0x2be/0x710 [ 872.153561][ T2928] ? __lock_acquire+0x572/0x4a10 [ 872.158523][ T2928] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 872.164781][ T2928] __alloc_file+0x93/0x480 [ 872.169219][ T2928] ? ____fput+0x20/0x20 [ 872.173393][ T2928] ? mark_held_locks+0x100/0x100 [ 872.178351][ T2928] alloc_empty_file+0x72/0x170 [ 872.183126][ T2928] path_openat+0x112/0x5660 [ 872.187652][ T2928] ? add_lock_to_list.isra.0+0x450/0x450 [ 872.193315][ T2928] ? __alloc_fd+0x549/0x700 [ 872.197878][ T2928] ? find_held_lock+0x35/0x120 [ 872.202657][ T2928] ? path_lookupat.isra.0+0xba0/0xba0 [ 872.208087][ T2928] ? do_dup2+0x580/0x580 [ 872.212342][ T2928] ? kasan_check_read+0x11/0x20 [ 872.217194][ T2928] ? do_raw_spin_unlock+0xa0/0x330 [ 872.222301][ T2928] ? do_raw_spin_trylock+0x270/0x270 [ 872.227593][ T2928] ? __phys_addr_symbol+0x30/0x70 [ 872.232605][ T2928] do_filp_open+0x26f/0x370 [ 872.237095][ T2928] ? may_open_dev+0x100/0x100 [ 872.241749][ T2928] ? exit_files+0xb0/0xb0 [ 872.246056][ T2928] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 872.252275][ T2928] ? digsig_verify.cold+0x32/0x32 [ 872.257310][ T2928] ? get_unused_fd_flags+0x122/0x1a0 [ 872.262593][ T2928] ? __alloc_fd+0x700/0x700 [ 872.267076][ T2928] ? getname_flags+0x277/0x5b0 [ 872.271837][ T2928] do_sys_open+0x59a/0x7c0 [ 872.276249][ T2928] ? filp_open+0x80/0x80 [ 872.280507][ T2928] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 872.286554][ T2928] ? trace_hardirqs_off_caller+0x300/0x300 [ 872.292342][ T2928] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 872.297777][ T2928] __x64_sys_open+0x7e/0xc0 [ 872.302256][ T2928] do_syscall_64+0x1a3/0x800 [ 872.306843][ T2928] ? syscall_return_slowpath+0x5f0/0x5f0 [ 872.312474][ T2928] ? prepare_exit_to_usermode+0x232/0x3b0 [ 872.318184][ T2928] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 872.323708][ T2928] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 872.329575][ T2928] RIP: 0033:0x412041 [ 872.333476][ T2928] Code: 75 14 b8 02 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 b4 17 00 00 c3 48 83 ec 08 e8 2a fa ff ff 48 89 04 24 b8 02 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 73 fa ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 872.353119][ T2928] RSP: 002b:00007f92bde86a80 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 [ 872.361529][ T2928] RAX: ffffffffffffffda RBX: 0000000000000010 RCX: 0000000000412041 [ 872.369496][ T2928] RDX: 00007f92bde86afa RSI: 0000000000000002 RDI: 00007f92bde86af0 [ 872.377457][ T2928] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 872.385405][ T2928] R10: 0000000000000075 R11: 0000000000000293 R12: 0000000000000004 [ 872.393353][ T2928] R13: 0000000000000000 R14: 00000000004dbc38 R15: 0000000000000003 00:28:02 executing program 0: syz_mount_image$reiserfs(&(0x7f0000000180)='r%iserfs\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[@ANYBLOB='jdev=./file0,jdev=']) 00:28:02 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000480)=@acquire={0x1ac, 0x17, 0x1, 0x0, 0x0, {{@in=@multicast1}, @in6=@ipv4={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff00000000], [], @dev}, {@in=@loopback, @in6=@local}, {{@in, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x2}}}, [@tmpl={0x84, 0x5, [{{@in6=@mcast1, 0x0, 0x3c}, 0x0, @in=@multicast1}, {{@in=@remote, 0x0, 0x3c}, 0x0, @in=@broadcast}]}]}, 0x1ac}}, 0x0) 00:28:02 executing program 2: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(&(0x7f0000000080)=@nbd={'/dev/nbd', 0x0, 0xe02b2}, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000240)='hfs\x00\xe6\xa6\xe2\x06g\x96\xb3\v\xf2p\xd5:\x95p\x99\x92\xf2\xc4\x80\x1f\x01\x05\xb8e?\xbfwk\xe4\xe5\xca\x82\xeb\xb1\x04wn*\xf2\xc6\x9d\xc4!\x9e?\x83\x99\x0e\xcc\xa3\x95q.C\xee\x8dIf\xec\xbf\xe8\xb2\t\xedg\x9d\xd9\v\xce\xa3\xa3\xa5\x89F\x03\xefQ\x89\f\xeeRK\x15\xec{D\x9e\x83Z\xabTa\x8e\xcd\x01\xd0\xcfd\xf9c\x87m\xbe>\x81\xba\x9d2\x1c\a,\x12\xbf\xef\xb8m\v\xdf\x8e\xd5\xf5\x1a\xabD\xf6\xe0\x95\xf4\xfeRb_+\xeb\xf9f\xe8\\\x16\xeb\x87\x8e\x8acn4,\x80Q<\x84\xaep\xf9\xfc\x8e\x9f\xed\x06.a\xd5o\x14\r&L\xbd\xb9g\x82;+n\xd5\xcca\v\x86Z\x872\xc3c:`\xf2\x02\xc2\x92\x841\xe7\xca}\"@6}j\x0e\xb7\xa9\xbc\xf3N\xa3\xf3mbd\xfbS\x80\xe0\x11<\x7f\x84\xbe\xa2\xf9\xf7\xee\xf6\x94x\x9d\xe2{\xc5\x83\xc0M\xbb\xd4Io\r\x1c\xd7<\xc0\x84=`\xf1^Y', 0x0, 0x0) 00:28:02 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00004e7000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f, 0xfffffff0}, 0xc, &(0x7f0000000440)={&(0x7f00000001c0)=ANY=[@ANYBLOB="1c00000022000100000000000061960d0100000008fe0c009d0a6be0e6d9fc638f19561d6ceb8a6c9239228215fd206cf204e07953", @ANYRES32=0x0], 0x2}, 0x1, 0x0, 0x0, 0xffffffffffffffff}, 0x0) 00:28:02 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000180)='./control\x00', 0x0) get_thread_area(0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x3) write$binfmt_script(r0, &(0x7f0000000bc0)=ANY=[@ANYBLOB="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"], 0x145) close(r0) execve(&(0x7f0000000180)='./file0\x00', &(0x7f0000000140), &(0x7f0000000140)) r1 = open(&(0x7f0000000000)='./control\x00', 0x80, 0x0) statfs(&(0x7f0000000380)='./control\x00', &(0x7f00000003c0)=""/20) write$P9_RWALK(r0, &(0x7f0000000400)=ANY=[@ANYBLOB="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"], 0x14f) getsockopt$inet_sctp6_SCTP_RTOINFO(r1, 0x84, 0x0, &(0x7f0000000080)={0x0, 0x200, 0x2, 0xffffffff}, &(0x7f0000000100)=0x10) 00:28:02 executing program 1 (fault-call:0 fault-nth:8): syz_mount_image$reiserfs(&(0x7f0000000180)='reiserfs\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[@ANYBLOB='jdev=.']) 00:28:02 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000480)=@acquire={0x1ac, 0x17, 0x1, 0x0, 0x0, {{@in=@multicast1}, @in6=@ipv4={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffff000], [], @dev}, {@in=@loopback, @in6=@local}, {{@in, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x2}}}, [@tmpl={0x84, 0x5, [{{@in6=@mcast1, 0x0, 0x3c}, 0x0, @in=@multicast1}, {{@in=@remote, 0x0, 0x3c}, 0x0, @in=@broadcast}]}]}, 0x1ac}}, 0x0) [ 872.532868][ T2951] FAULT_INJECTION: forcing a failure. [ 872.532868][ T2951] name failslab, interval 1, probability 0, space 0, times 0 00:28:02 executing program 2: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(&(0x7f0000000080)=@nbd={'/dev/nbd', 0x0, 0xe02ba}, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000240)='hfs\x00\xe6\xa6\xe2\x06g\x96\xb3\v\xf2p\xd5:\x95p\x99\x92\xf2\xc4\x80\x1f\x01\x05\xb8e?\xbfwk\xe4\xe5\xca\x82\xeb\xb1\x04wn*\xf2\xc6\x9d\xc4!\x9e?\x83\x99\x0e\xcc\xa3\x95q.C\xee\x8dIf\xec\xbf\xe8\xb2\t\xedg\x9d\xd9\v\xce\xa3\xa3\xa5\x89F\x03\xefQ\x89\f\xeeRK\x15\xec{D\x9e\x83Z\xabTa\x8e\xcd\x01\xd0\xcfd\xf9c\x87m\xbe>\x81\xba\x9d2\x1c\a,\x12\xbf\xef\xb8m\v\xdf\x8e\xd5\xf5\x1a\xabD\xf6\xe0\x95\xf4\xfeRb_+\xeb\xf9f\xe8\\\x16\xeb\x87\x8e\x8acn4,\x80Q<\x84\xaep\xf9\xfc\x8e\x9f\xed\x06.a\xd5o\x14\r&L\xbd\xb9g\x82;+n\xd5\xcca\v\x86Z\x872\xc3c:`\xf2\x02\xc2\x92\x841\xe7\xca}\"@6}j\x0e\xb7\xa9\xbc\xf3N\xa3\xf3mbd\xfbS\x80\xe0\x11<\x7f\x84\xbe\xa2\xf9\xf7\xee\xf6\x94x\x9d\xe2{\xc5\x83\xc0M\xbb\xd4Io\r\x1c\xd7<\xc0\x84=`\xf1^Y', 0x0, 0x0) [ 872.613267][ T2951] CPU: 0 PID: 2951 Comm: syz-executor1 Not tainted 5.0.0-rc2-next-20190117 #14 [ 872.622341][ T2951] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 872.632398][ T2951] Call Trace: [ 872.635702][ T2951] dump_stack+0x1db/0x2d0 [ 872.640047][ T2951] ? dump_stack_print_info.cold+0x20/0x20 [ 872.645797][ T2951] should_fail.cold+0xa/0x14 [ 872.650406][ T2951] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 872.656229][ T2951] ? ___might_sleep+0x1e7/0x310 [ 872.661094][ T2951] ? arch_local_save_flags+0x50/0x50 [ 872.666414][ T2951] ? print_usage_bug+0xd0/0xd0 [ 872.671207][ T2951] __should_failslab+0x121/0x190 [ 872.676152][ T2951] should_failslab+0x9/0x14 [ 872.680675][ T2951] kmem_cache_alloc+0x2be/0x710 [ 872.685536][ T2951] ? __lock_acquire+0x572/0x4a10 [ 872.690483][ T2951] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 872.696742][ T2951] __alloc_file+0x93/0x480 [ 872.701166][ T2951] ? ____fput+0x20/0x20 [ 872.705343][ T2951] ? mark_held_locks+0x100/0x100 00:28:02 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000180)='./control\x00', 0x0) get_thread_area(0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x3) write$binfmt_script(r0, &(0x7f0000000bc0)=ANY=[@ANYBLOB="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"], 0x145) close(r0) execve(&(0x7f0000000180)='./file0\x00', &(0x7f0000000140), &(0x7f0000000140)) r1 = open(&(0x7f0000000000)='./control\x00', 0x80, 0x0) statfs(&(0x7f0000000380)='./control\x00', &(0x7f00000003c0)=""/20) write$P9_RWALK(r0, &(0x7f0000000400)=ANY=[@ANYBLOB="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"], 0x14f) getsockopt$inet_sctp6_SCTP_RTOINFO(r1, 0x84, 0x0, &(0x7f0000000080)={0x0, 0x200, 0x2, 0xffffffff}, &(0x7f0000000100)=0x10) [ 872.710330][ T2951] alloc_empty_file+0x72/0x170 [ 872.715107][ T2951] path_openat+0x112/0x5660 [ 872.719619][ T2951] ? add_lock_to_list.isra.0+0x450/0x450 [ 872.725291][ T2951] ? __alloc_fd+0x549/0x700 [ 872.729818][ T2951] ? find_held_lock+0x35/0x120 [ 872.734614][ T2951] ? path_lookupat.isra.0+0xba0/0xba0 [ 872.740002][ T2951] ? do_dup2+0x580/0x580 [ 872.744319][ T2951] ? kasan_check_read+0x11/0x20 [ 872.749178][ T2951] ? do_raw_spin_unlock+0xa0/0x330 [ 872.754298][ T2951] ? do_raw_spin_trylock+0x270/0x270 [ 872.759607][ T2951] ? __phys_addr_symbol+0x30/0x70 [ 872.764714][ T2951] do_filp_open+0x26f/0x370 [ 872.769230][ T2951] ? may_open_dev+0x100/0x100 [ 872.773918][ T2951] ? exit_files+0xb0/0xb0 [ 872.778252][ T2951] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 872.784502][ T2951] ? digsig_verify.cold+0x32/0x32 [ 872.789537][ T2951] ? get_unused_fd_flags+0x122/0x1a0 [ 872.794878][ T2951] ? __alloc_fd+0x700/0x700 [ 872.799392][ T2951] ? getname_flags+0x277/0x5b0 [ 872.804186][ T2951] do_sys_open+0x59a/0x7c0 [ 872.808612][ T2951] ? filp_open+0x80/0x80 [ 872.812881][ T2951] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 872.818988][ T2951] ? trace_hardirqs_off_caller+0x300/0x300 [ 872.824803][ T2951] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 872.830269][ T2951] __x64_sys_open+0x7e/0xc0 [ 872.834786][ T2951] do_syscall_64+0x1a3/0x800 [ 872.839402][ T2951] ? syscall_return_slowpath+0x5f0/0x5f0 [ 872.845043][ T2951] ? prepare_exit_to_usermode+0x232/0x3b0 [ 872.850799][ T2951] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 872.856358][ T2951] entry_SYSCALL_64_after_hwframe+0x49/0xbe 00:28:02 executing program 2: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(&(0x7f0000000080)=@nbd={'/dev/nbd', 0x0, 0xe0300}, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000240)='hfs\x00\xe6\xa6\xe2\x06g\x96\xb3\v\xf2p\xd5:\x95p\x99\x92\xf2\xc4\x80\x1f\x01\x05\xb8e?\xbfwk\xe4\xe5\xca\x82\xeb\xb1\x04wn*\xf2\xc6\x9d\xc4!\x9e?\x83\x99\x0e\xcc\xa3\x95q.C\xee\x8dIf\xec\xbf\xe8\xb2\t\xedg\x9d\xd9\v\xce\xa3\xa3\xa5\x89F\x03\xefQ\x89\f\xeeRK\x15\xec{D\x9e\x83Z\xabTa\x8e\xcd\x01\xd0\xcfd\xf9c\x87m\xbe>\x81\xba\x9d2\x1c\a,\x12\xbf\xef\xb8m\v\xdf\x8e\xd5\xf5\x1a\xabD\xf6\xe0\x95\xf4\xfeRb_+\xeb\xf9f\xe8\\\x16\xeb\x87\x8e\x8acn4,\x80Q<\x84\xaep\xf9\xfc\x8e\x9f\xed\x06.a\xd5o\x14\r&L\xbd\xb9g\x82;+n\xd5\xcca\v\x86Z\x872\xc3c:`\xf2\x02\xc2\x92\x841\xe7\xca}\"@6}j\x0e\xb7\xa9\xbc\xf3N\xa3\xf3mbd\xfbS\x80\xe0\x11<\x7f\x84\xbe\xa2\xf9\xf7\xee\xf6\x94x\x9d\xe2{\xc5\x83\xc0M\xbb\xd4Io\r\x1c\xd7<\xc0\x84=`\xf1^Y', 0x0, 0x0) [ 872.862257][ T2951] RIP: 0033:0x412041 [ 872.866187][ T2951] Code: 75 14 b8 02 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 b4 17 00 00 c3 48 83 ec 08 e8 2a fa ff ff 48 89 04 24 b8 02 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 73 fa ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 872.885792][ T2951] RSP: 002b:00007f92bde86a80 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 [ 872.894231][ T2951] RAX: ffffffffffffffda RBX: 0000000000000010 RCX: 0000000000412041 [ 872.902218][ T2951] RDX: 00007f92bde86afa RSI: 0000000000000002 RDI: 00007f92bde86af0 00:28:02 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00004e7000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f, 0xf0ffffffffffff}, 0xc, &(0x7f0000000440)={&(0x7f00000001c0)=ANY=[@ANYBLOB="1c00000022000100000000000061960d0100000008fe0c009d0a6be0e6d9fc638f19561d6ceb8a6c9239228215fd206cf204e07953", @ANYRES32=0x0], 0x2}, 0x1, 0x0, 0x0, 0xffffffffffffffff}, 0x0) [ 872.910215][ T2951] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 872.918189][ T2951] R10: 0000000000000075 R11: 0000000000000293 R12: 0000000000000004 [ 872.926179][ T2951] R13: 0000000000000000 R14: 00000000004dbc38 R15: 0000000000000003 00:28:02 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000180)='./control\x00', 0x0) get_thread_area(0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x3) write$binfmt_script(r0, &(0x7f0000000bc0)=ANY=[@ANYBLOB="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"], 0x145) close(r0) execve(&(0x7f0000000180)='./file0\x00', &(0x7f0000000140), &(0x7f0000000140)) r1 = open(&(0x7f0000000000)='./control\x00', 0x80, 0x0) statfs(&(0x7f0000000380)='./control\x00', &(0x7f00000003c0)=""/20) write$P9_RWALK(r0, &(0x7f0000000400)=ANY=[@ANYBLOB="300000006f0100030001030000000400000000000000100000000003000002000000000300000000000000e646f1c5592139cf131e2bf572fa9728dbfac0390865410f3fa1f25743c497e12cb352eac4046b4500f95cfdfb4cf22a3be5c564a47654334c01d5732d382e27bbccd9b903000000c404000000d32dbd21f3ae581d32e69ef9327f7b487d1b4f4502838c08136678bd90733173ab78d6fc264b373611f15c439384ede863ecc86f33e74a14e307490508a39b41394adaba629948536b9cbfaf6fd153ef31439c5bf58116ad346d364e3293ce22b917bee18e0356778d7e12e96945109f9678302ea739b55b8173f4243ec467c6e40248445d0df527c5d637c03c41d500ed9802279fc3d9e4c6767ac0ad7893f64ec0568b7453adce65e06164d0003219476ba93aee62624d6b025582b2917ef27f06eae5af44ea3c7a25d16c5d25a2b04969202ed68056"], 0x14f) getsockopt$inet_sctp6_SCTP_RTOINFO(r1, 0x84, 0x0, &(0x7f0000000080)={0x0, 0x200, 0x2, 0xffffffff}, &(0x7f0000000100)=0x10) [ 873.007361][ T2480] block nbd2: Attempted send on invalid socket [ 873.013804][ T2480] print_req_error: I/O error, dev nbd2, sector 2 flags 0 [ 873.023618][ T2974] hfs: can't find a HFS filesystem on dev nbd2 00:28:02 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000480)=@acquire={0x1ac, 0x17, 0x1, 0x0, 0x0, {{@in=@multicast1}, @in6=@ipv4={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2], [], @dev}, {@in=@loopback, @in6=@local}, {{@in, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x2}}}, [@tmpl={0x84, 0x5, [{{@in6=@mcast1, 0x0, 0x3c}, 0x0, @in=@multicast1}, {{@in=@remote, 0x0, 0x3c}, 0x0, @in=@broadcast}]}]}, 0x1ac}}, 0x0) 00:28:02 executing program 0: syz_mount_image$reiserfs(&(0x7f0000000180)='r\x86iserfs\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[@ANYBLOB='jdev=./file0,jdev=']) 00:28:02 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00004e7000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f, 0x100000000000000}, 0xc, &(0x7f0000000440)={&(0x7f00000001c0)=ANY=[@ANYBLOB="1c00000022000100000000000061960d0100000008fe0c009d0a6be0e6d9fc638f19561d6ceb8a6c9239228215fd206cf204e07953", @ANYRES32=0x0], 0x2}, 0x1, 0x0, 0x0, 0xffffffffffffffff}, 0x0) 00:28:02 executing program 2: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(&(0x7f0000000080)=@nbd={'/dev/nbd', 0x0, 0xe031a}, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000240)='hfs\x00\xe6\xa6\xe2\x06g\x96\xb3\v\xf2p\xd5:\x95p\x99\x92\xf2\xc4\x80\x1f\x01\x05\xb8e?\xbfwk\xe4\xe5\xca\x82\xeb\xb1\x04wn*\xf2\xc6\x9d\xc4!\x9e?\x83\x99\x0e\xcc\xa3\x95q.C\xee\x8dIf\xec\xbf\xe8\xb2\t\xedg\x9d\xd9\v\xce\xa3\xa3\xa5\x89F\x03\xefQ\x89\f\xeeRK\x15\xec{D\x9e\x83Z\xabTa\x8e\xcd\x01\xd0\xcfd\xf9c\x87m\xbe>\x81\xba\x9d2\x1c\a,\x12\xbf\xef\xb8m\v\xdf\x8e\xd5\xf5\x1a\xabD\xf6\xe0\x95\xf4\xfeRb_+\xeb\xf9f\xe8\\\x16\xeb\x87\x8e\x8acn4,\x80Q<\x84\xaep\xf9\xfc\x8e\x9f\xed\x06.a\xd5o\x14\r&L\xbd\xb9g\x82;+n\xd5\xcca\v\x86Z\x872\xc3c:`\xf2\x02\xc2\x92\x841\xe7\xca}\"@6}j\x0e\xb7\xa9\xbc\xf3N\xa3\xf3mbd\xfbS\x80\xe0\x11<\x7f\x84\xbe\xa2\xf9\xf7\xee\xf6\x94x\x9d\xe2{\xc5\x83\xc0M\xbb\xd4Io\r\x1c\xd7<\xc0\x84=`\xf1^Y', 0x0, 0x0) 00:28:02 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000180)='./control\x00', 0x0) get_thread_area(0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x3) write$binfmt_script(r0, &(0x7f0000000bc0)=ANY=[@ANYBLOB="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"], 0x145) close(r0) execve(&(0x7f0000000180)='./file0\x00', &(0x7f0000000140), &(0x7f0000000140)) r1 = open(&(0x7f0000000000)='./control\x00', 0x80, 0x10) statfs(0x0, &(0x7f00000003c0)=""/20) write$P9_RWALK(r0, &(0x7f0000000400)=ANY=[@ANYBLOB="300000006f0100030001030000000400000000000000100000000003000002000000000300000000000000e646f1c5592139cf131e2bf572fa9728dbfac0390865410f3fa1f25743c497e12cb352eac4046b4500f95cfdfb4cf22a3be5c564a47654334c01d5732d382e27bbccd9b903000000c404000000d32dbd21f3ae581d32e69ef9327f7b487d1b4f4502838c08136678bd90733173ab78d6fc264b373611f15c439384ede863ecc86f33e74a14e307490508a39b41394adaba629948536b9cbfaf6fd153ef31439c5bf58116ad346d364e3293ce22b917bee18e0356778d7e12e96945109f9678302ea739b55b8173f4243ec467c6e40248445d0df527c5d637c03c41d500ed9802279fc3d9e4c6767ac0ad7893f64ec0568b7453adce65e06164d0003219476ba93aee62624d6b025582b2917ef27f06eae5af44ea3c7a25d16c5d25a2b04969202ed68056"], 0x14f) getsockopt$inet_sctp6_SCTP_RTOINFO(r1, 0x84, 0x0, &(0x7f0000000080)={0x0, 0x200, 0x2, 0xffffffff}, &(0x7f0000000100)=0x10) 00:28:02 executing program 1 (fault-call:0 fault-nth:9): syz_mount_image$reiserfs(&(0x7f0000000180)='reiserfs\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[@ANYBLOB='jdev=.']) 00:28:02 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000480)=@acquire={0x1ac, 0x17, 0x1, 0x0, 0x0, {{@in=@multicast1}, @in6=@ipv4={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3], [], @dev}, {@in=@loopback, @in6=@local}, {{@in, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x2}}}, [@tmpl={0x84, 0x5, [{{@in6=@mcast1, 0x0, 0x3c}, 0x0, @in=@multicast1}, {{@in=@remote, 0x0, 0x3c}, 0x0, @in=@broadcast}]}]}, 0x1ac}}, 0x0) 00:28:02 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00004e7000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f, 0x200000000000000}, 0xc, &(0x7f0000000440)={&(0x7f00000001c0)=ANY=[@ANYBLOB="1c00000022000100000000000061960d0100000008fe0c009d0a6be0e6d9fc638f19561d6ceb8a6c9239228215fd206cf204e07953", @ANYRES32=0x0], 0x2}, 0x1, 0x0, 0x0, 0xffffffffffffffff}, 0x0) 00:28:03 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000480)=@acquire={0x1ac, 0x17, 0x1, 0x0, 0x0, {{@in=@multicast1}, @in6=@ipv4={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4], [], @dev}, {@in=@loopback, @in6=@local}, {{@in, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x2}}}, [@tmpl={0x84, 0x5, [{{@in6=@mcast1, 0x0, 0x3c}, 0x0, @in=@multicast1}, {{@in=@remote, 0x0, 0x3c}, 0x0, @in=@broadcast}]}]}, 0x1ac}}, 0x0) 00:28:03 executing program 2: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(&(0x7f0000000080)=@nbd={'/dev/nbd', 0x0, 0xe0334}, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000240)='hfs\x00\xe6\xa6\xe2\x06g\x96\xb3\v\xf2p\xd5:\x95p\x99\x92\xf2\xc4\x80\x1f\x01\x05\xb8e?\xbfwk\xe4\xe5\xca\x82\xeb\xb1\x04wn*\xf2\xc6\x9d\xc4!\x9e?\x83\x99\x0e\xcc\xa3\x95q.C\xee\x8dIf\xec\xbf\xe8\xb2\t\xedg\x9d\xd9\v\xce\xa3\xa3\xa5\x89F\x03\xefQ\x89\f\xeeRK\x15\xec{D\x9e\x83Z\xabTa\x8e\xcd\x01\xd0\xcfd\xf9c\x87m\xbe>\x81\xba\x9d2\x1c\a,\x12\xbf\xef\xb8m\v\xdf\x8e\xd5\xf5\x1a\xabD\xf6\xe0\x95\xf4\xfeRb_+\xeb\xf9f\xe8\\\x16\xeb\x87\x8e\x8acn4,\x80Q<\x84\xaep\xf9\xfc\x8e\x9f\xed\x06.a\xd5o\x14\r&L\xbd\xb9g\x82;+n\xd5\xcca\v\x86Z\x872\xc3c:`\xf2\x02\xc2\x92\x841\xe7\xca}\"@6}j\x0e\xb7\xa9\xbc\xf3N\xa3\xf3mbd\xfbS\x80\xe0\x11<\x7f\x84\xbe\xa2\xf9\xf7\xee\xf6\x94x\x9d\xe2{\xc5\x83\xc0M\xbb\xd4Io\r\x1c\xd7<\xc0\x84=`\xf1^Y', 0x0, 0x0) [ 873.428915][ T3007] FAULT_INJECTION: forcing a failure. [ 873.428915][ T3007] name failslab, interval 1, probability 0, space 0, times 0 [ 873.494511][ T3007] CPU: 0 PID: 3007 Comm: syz-executor1 Not tainted 5.0.0-rc2-next-20190117 #14 [ 873.503489][ T3007] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 873.513565][ T3007] Call Trace: [ 873.516871][ T3007] dump_stack+0x1db/0x2d0 [ 873.521224][ T3007] ? dump_stack_print_info.cold+0x20/0x20 [ 873.526986][ T3007] should_fail.cold+0xa/0x14 [ 873.531590][ T3007] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 873.537417][ T3007] ? ___might_sleep+0x1e7/0x310 00:28:03 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000180)='./control\x00', 0x0) get_thread_area(0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x3) write$binfmt_script(r0, &(0x7f0000000bc0)=ANY=[@ANYBLOB="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"], 0x145) close(r0) execve(&(0x7f0000000180)='./file0\x00', &(0x7f0000000140), &(0x7f0000000140)) r1 = open(&(0x7f0000000000)='./control\x00', 0x80, 0x10) statfs(0x0, &(0x7f00000003c0)=""/20) write$P9_RWALK(r0, &(0x7f0000000400)=ANY=[@ANYBLOB="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"], 0x14f) getsockopt$inet_sctp6_SCTP_RTOINFO(r1, 0x84, 0x0, &(0x7f0000000080)={0x0, 0x200, 0x2, 0xffffffff}, &(0x7f0000000100)=0x10) 00:28:03 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000480)=@acquire={0x1ac, 0x17, 0x1, 0x0, 0x0, {{@in=@multicast1}, @in6=@ipv4={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5], [], @dev}, {@in=@loopback, @in6=@local}, {{@in, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x2}}}, [@tmpl={0x84, 0x5, [{{@in6=@mcast1, 0x0, 0x3c}, 0x0, @in=@multicast1}, {{@in=@remote, 0x0, 0x3c}, 0x0, @in=@broadcast}]}]}, 0x1ac}}, 0x0) [ 873.542275][ T3007] ? arch_local_save_flags+0x50/0x50 [ 873.547570][ T3007] __should_failslab+0x121/0x190 [ 873.552514][ T3007] should_failslab+0x9/0x14 [ 873.557016][ T3007] kmem_cache_alloc_trace+0x2d1/0x760 [ 873.562387][ T3007] ? __mutex_lock+0x622/0x1670 [ 873.567169][ T3007] ? find_held_lock+0x35/0x120 [ 873.571950][ T3007] ? lo_ioctl+0x25b/0x23e0 [ 873.576383][ T3007] ? __fget+0x473/0x710 [ 873.580533][ T3007] ? loop_get_status64+0x150/0x150 [ 873.585652][ T3007] __kthread_create_on_node+0x122/0x530 [ 873.591198][ T3007] ? kthread_parkme+0xb0/0xb0 [ 873.595871][ T3007] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 873.601847][ T3007] ? rcu_read_unlock_special+0x380/0x380 [ 873.607516][ T3007] ? loop_get_status64+0x150/0x150 [ 873.612664][ T3007] kthread_create_on_node+0xbb/0xf0 [ 873.617926][ T3007] ? __kthread_create_on_node+0x530/0x530 [ 873.623679][ T3007] ? kthread_park+0x1b0/0x1b0 [ 873.628351][ T3007] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 873.634648][ T3007] lo_ioctl+0xc80/0x23e0 [ 873.638875][ T3007] ? lo_rw_aio+0x1e50/0x1e50 [ 873.643466][ T3007] ? __fget+0x473/0x710 [ 873.647615][ T3007] ? lo_rw_aio+0x1e50/0x1e50 [ 873.652208][ T3007] blkdev_ioctl+0x10e0/0x2120 [ 873.656922][ T3007] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 873.663156][ T3007] ? blkpg_ioctl+0xc10/0xc10 [ 873.667760][ T3007] ? lock_downgrade+0xbe0/0xbe0 [ 873.672637][ T3007] ? kasan_check_read+0x11/0x20 [ 873.677492][ T3007] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 873.683464][ T3007] ? rcu_read_unlock_special+0x380/0x380 [ 873.689156][ T3007] ? __fget+0x49a/0x710 [ 873.693330][ T3007] block_ioctl+0xee/0x130 [ 873.697659][ T3007] ? blkdev_fallocate+0x410/0x410 [ 873.702677][ T3007] do_vfs_ioctl+0x107b/0x17d0 [ 873.707407][ T3007] ? putname+0xef/0x130 [ 873.711553][ T3007] ? ioctl_preallocate+0x2f0/0x2f0 [ 873.716705][ T3007] ? __fget_light+0x2db/0x420 [ 873.721397][ T3007] ? fget_raw+0x20/0x20 [ 873.725544][ T3007] ? do_sys_open+0x3f9/0x7c0 [ 873.730122][ T3007] ? do_syscall_64+0x8c/0x800 [ 873.734808][ T3007] ? do_syscall_64+0x8c/0x800 [ 873.739465][ T3007] ? lockdep_hardirqs_on+0x415/0x5d0 [ 873.744733][ T3007] ? security_file_ioctl+0x93/0xc0 [ 873.749826][ T3007] ksys_ioctl+0xab/0xd0 [ 873.753973][ T3007] __x64_sys_ioctl+0x73/0xb0 [ 873.758548][ T3007] do_syscall_64+0x1a3/0x800 [ 873.763145][ T3007] ? syscall_return_slowpath+0x5f0/0x5f0 [ 873.768768][ T3007] ? prepare_exit_to_usermode+0x232/0x3b0 [ 873.774466][ T3007] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 873.779998][ T3007] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 873.785885][ T3007] RIP: 0033:0x457f07 [ 873.789771][ T3007] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 cd b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 873.809359][ T3007] RSP: 002b:00007f92bde86a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 873.817750][ T3007] RAX: ffffffffffffffda RBX: 0000000000000010 RCX: 0000000000457f07 [ 873.825699][ T3007] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 873.833676][ T3007] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a 00:28:03 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00004e7000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f, 0x400000000000000}, 0xc, &(0x7f0000000440)={&(0x7f00000001c0)=ANY=[@ANYBLOB="1c00000022000100000000000061960d0100000008fe0c009d0a6be0e6d9fc638f19561d6ceb8a6c9239228215fd206cf204e07953", @ANYRES32=0x0], 0x2}, 0x1, 0x0, 0x0, 0xffffffffffffffff}, 0x0) [ 873.841654][ T3007] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 873.849614][ T3007] R13: 0000000000000000 R14: 00000000004dbc38 R15: 0000000000000003 00:28:03 executing program 1 (fault-call:0 fault-nth:10): syz_mount_image$reiserfs(&(0x7f0000000180)='reiserfs\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[@ANYBLOB='jdev=.']) 00:28:03 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000480)=@acquire={0x1ac, 0x17, 0x1, 0x0, 0x0, {{@in=@multicast1}, @in6=@ipv4={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6], [], @dev}, {@in=@loopback, @in6=@local}, {{@in, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x2}}}, [@tmpl={0x84, 0x5, [{{@in6=@mcast1, 0x0, 0x3c}, 0x0, @in=@multicast1}, {{@in=@remote, 0x0, 0x3c}, 0x0, @in=@broadcast}]}]}, 0x1ac}}, 0x0) 00:28:03 executing program 0: syz_mount_image$reiserfs(&(0x7f0000000180)='re\nserfs\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[@ANYBLOB='jdev=./file0,jdev=']) 00:28:03 executing program 2: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(&(0x7f0000000080)=@nbd={'/dev/nbd', 0x0, 0xe0394}, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000240)='hfs\x00\xe6\xa6\xe2\x06g\x96\xb3\v\xf2p\xd5:\x95p\x99\x92\xf2\xc4\x80\x1f\x01\x05\xb8e?\xbfwk\xe4\xe5\xca\x82\xeb\xb1\x04wn*\xf2\xc6\x9d\xc4!\x9e?\x83\x99\x0e\xcc\xa3\x95q.C\xee\x8dIf\xec\xbf\xe8\xb2\t\xedg\x9d\xd9\v\xce\xa3\xa3\xa5\x89F\x03\xefQ\x89\f\xeeRK\x15\xec{D\x9e\x83Z\xabTa\x8e\xcd\x01\xd0\xcfd\xf9c\x87m\xbe>\x81\xba\x9d2\x1c\a,\x12\xbf\xef\xb8m\v\xdf\x8e\xd5\xf5\x1a\xabD\xf6\xe0\x95\xf4\xfeRb_+\xeb\xf9f\xe8\\\x16\xeb\x87\x8e\x8acn4,\x80Q<\x84\xaep\xf9\xfc\x8e\x9f\xed\x06.a\xd5o\x14\r&L\xbd\xb9g\x82;+n\xd5\xcca\v\x86Z\x872\xc3c:`\xf2\x02\xc2\x92\x841\xe7\xca}\"@6}j\x0e\xb7\xa9\xbc\xf3N\xa3\xf3mbd\xfbS\x80\xe0\x11<\x7f\x84\xbe\xa2\xf9\xf7\xee\xf6\x94x\x9d\xe2{\xc5\x83\xc0M\xbb\xd4Io\r\x1c\xd7<\xc0\x84=`\xf1^Y', 0x0, 0x0) [ 874.100092][ T3033] FAULT_INJECTION: forcing a failure. [ 874.100092][ T3033] name failslab, interval 1, probability 0, space 0, times 0 [ 874.113308][ T3033] CPU: 0 PID: 3033 Comm: syz-executor1 Not tainted 5.0.0-rc2-next-20190117 #14 [ 874.122246][ T3033] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 874.132333][ T3033] Call Trace: [ 874.135660][ T3033] dump_stack+0x1db/0x2d0 [ 874.140017][ T3033] ? dump_stack_print_info.cold+0x20/0x20 00:28:03 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000480)=@acquire={0x1ac, 0x17, 0x1, 0x0, 0x0, {{@in=@multicast1}, @in6=@ipv4={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8], [], @dev}, {@in=@loopback, @in6=@local}, {{@in, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x2}}}, [@tmpl={0x84, 0x5, [{{@in6=@mcast1, 0x0, 0x3c}, 0x0, @in=@multicast1}, {{@in=@remote, 0x0, 0x3c}, 0x0, @in=@broadcast}]}]}, 0x1ac}}, 0x0) [ 874.145753][ T3033] ? pick_next_entity+0x198/0x3f0 [ 874.150798][ T3033] should_fail.cold+0xa/0x14 [ 874.155398][ T3033] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 874.161224][ T3033] ? ___might_sleep+0x1e7/0x310 [ 874.166094][ T3033] ? arch_local_save_flags+0x50/0x50 [ 874.171413][ T3033] __should_failslab+0x121/0x190 [ 874.176382][ T3033] should_failslab+0x9/0x14 [ 874.180898][ T3033] kmem_cache_alloc+0x2be/0x710 [ 874.185758][ T3033] ? trace_hardirqs_on+0xbd/0x310 [ 874.190793][ T3033] ? kasan_check_read+0x11/0x20 [ 874.195664][ T3033] ? __schedule+0x148d/0x1e60 [ 874.200349][ T3033] ? trace_hardirqs_off_caller+0x300/0x300 [ 874.206164][ T3033] ? do_raw_spin_trylock+0x270/0x270 [ 874.211502][ T3033] __kernfs_new_node+0xfe/0x8a0 [ 874.216359][ T3033] ? kernfs_dop_revalidate+0x3c0/0x3c0 [ 874.221833][ T3033] ? __schedule+0x148d/0x1e60 [ 874.226496][ T3033] ? add_lock_to_list.isra.0+0x450/0x450 [ 874.232123][ T3033] ? pci_mmcfg_check_reserved+0x170/0x170 [ 874.237836][ T3033] ? bd_set_size+0x2c1/0x370 [ 874.242432][ T3033] ? find_held_lock+0x35/0x120 [ 874.247186][ T3033] ? bd_set_size+0x2c1/0x370 [ 874.251790][ T3033] kernfs_new_node+0x99/0x130 [ 874.256527][ T3033] kernfs_create_dir_ns+0x52/0x160 [ 874.261661][ T3033] internal_create_group+0x8cd/0xd80 [ 874.267079][ T3033] ? remove_files.isra.0+0x190/0x190 [ 874.272363][ T3033] ? down_read+0x120/0x120 [ 874.276786][ T3033] ? resched_curr+0x1a0/0x1a0 [ 874.281483][ T3033] sysfs_create_group+0x20/0x30 [ 874.286336][ T3033] lo_ioctl+0x1147/0x23e0 [ 874.290675][ T3033] ? lo_rw_aio+0x1e50/0x1e50 [ 874.295270][ T3033] ? __fget+0x473/0x710 [ 874.299434][ T3033] ? lo_rw_aio+0x1e50/0x1e50 [ 874.304006][ T3033] blkdev_ioctl+0x10e0/0x2120 [ 874.308705][ T3033] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 874.314986][ T3033] ? blkpg_ioctl+0xc10/0xc10 [ 874.319569][ T3033] ? lock_downgrade+0xbe0/0xbe0 [ 874.324429][ T3033] ? kasan_check_read+0x11/0x20 [ 874.329294][ T3033] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 874.335263][ T3033] ? rcu_read_unlock_special+0x380/0x380 [ 874.340915][ T3033] ? __fget+0x49a/0x710 [ 874.345053][ T3033] block_ioctl+0xee/0x130 [ 874.349362][ T3033] ? blkdev_fallocate+0x410/0x410 [ 874.354429][ T3033] do_vfs_ioctl+0x107b/0x17d0 [ 874.359106][ T3033] ? putname+0xef/0x130 [ 874.363258][ T3033] ? ioctl_preallocate+0x2f0/0x2f0 [ 874.368367][ T3033] ? __fget_light+0x2db/0x420 [ 874.373038][ T3033] ? fget_raw+0x20/0x20 [ 874.377185][ T3033] ? do_sys_open+0x3f9/0x7c0 [ 874.381755][ T3033] ? do_syscall_64+0x8c/0x800 [ 874.386431][ T3033] ? do_syscall_64+0x8c/0x800 [ 874.391119][ T3033] ? lockdep_hardirqs_on+0x415/0x5d0 [ 874.396408][ T3033] ? security_file_ioctl+0x93/0xc0 [ 874.401511][ T3033] ksys_ioctl+0xab/0xd0 [ 874.405654][ T3033] __x64_sys_ioctl+0x73/0xb0 [ 874.410258][ T3033] do_syscall_64+0x1a3/0x800 [ 874.414841][ T3033] ? syscall_return_slowpath+0x5f0/0x5f0 [ 874.420461][ T3033] ? prepare_exit_to_usermode+0x232/0x3b0 [ 874.426169][ T3033] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 874.432410][ T3033] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 874.438319][ T3033] RIP: 0033:0x457f07 [ 874.442198][ T3033] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 cd b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 874.461786][ T3033] RSP: 002b:00007f92bde86a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 874.470174][ T3033] RAX: ffffffffffffffda RBX: 0000000000000010 RCX: 0000000000457f07 [ 874.478122][ T3033] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 874.486265][ T3033] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 874.494238][ T3033] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 00:28:04 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00004e7000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f, 0x800000000000000}, 0xc, &(0x7f0000000440)={&(0x7f00000001c0)=ANY=[@ANYBLOB="1c00000022000100000000000061960d0100000008fe0c009d0a6be0e6d9fc638f19561d6ceb8a6c9239228215fd206cf204e07953", @ANYRES32=0x0], 0x2}, 0x1, 0x0, 0x0, 0xffffffffffffffff}, 0x0) 00:28:04 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000180)='./control\x00', 0x0) get_thread_area(0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x3) write$binfmt_script(r0, &(0x7f0000000bc0)=ANY=[@ANYBLOB="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"], 0x145) close(r0) execve(&(0x7f0000000180)='./file0\x00', &(0x7f0000000140), &(0x7f0000000140)) r1 = open(&(0x7f0000000000)='./control\x00', 0x80, 0x10) statfs(0x0, &(0x7f00000003c0)=""/20) write$P9_RWALK(r0, &(0x7f0000000400)=ANY=[@ANYBLOB="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"], 0x14f) getsockopt$inet_sctp6_SCTP_RTOINFO(r1, 0x84, 0x0, &(0x7f0000000080)={0x0, 0x200, 0x2, 0xffffffff}, &(0x7f0000000100)=0x10) [ 874.502222][ T3033] R13: 0000000000000000 R14: 00000000004dbc38 R15: 0000000000000003 [ 874.531610][ T3033] REISERFS warning (device loop1): sh-2021 reiserfs_fill_super: can not find reiserfs on loop1 00:28:04 executing program 2: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(&(0x7f0000000080)=@nbd={'/dev/nbd', 0x0, 0xe03da}, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000240)='hfs\x00\xe6\xa6\xe2\x06g\x96\xb3\v\xf2p\xd5:\x95p\x99\x92\xf2\xc4\x80\x1f\x01\x05\xb8e?\xbfwk\xe4\xe5\xca\x82\xeb\xb1\x04wn*\xf2\xc6\x9d\xc4!\x9e?\x83\x99\x0e\xcc\xa3\x95q.C\xee\x8dIf\xec\xbf\xe8\xb2\t\xedg\x9d\xd9\v\xce\xa3\xa3\xa5\x89F\x03\xefQ\x89\f\xeeRK\x15\xec{D\x9e\x83Z\xabTa\x8e\xcd\x01\xd0\xcfd\xf9c\x87m\xbe>\x81\xba\x9d2\x1c\a,\x12\xbf\xef\xb8m\v\xdf\x8e\xd5\xf5\x1a\xabD\xf6\xe0\x95\xf4\xfeRb_+\xeb\xf9f\xe8\\\x16\xeb\x87\x8e\x8acn4,\x80Q<\x84\xaep\xf9\xfc\x8e\x9f\xed\x06.a\xd5o\x14\r&L\xbd\xb9g\x82;+n\xd5\xcca\v\x86Z\x872\xc3c:`\xf2\x02\xc2\x92\x841\xe7\xca}\"@6}j\x0e\xb7\xa9\xbc\xf3N\xa3\xf3mbd\xfbS\x80\xe0\x11<\x7f\x84\xbe\xa2\xf9\xf7\xee\xf6\x94x\x9d\xe2{\xc5\x83\xc0M\xbb\xd4Io\r\x1c\xd7<\xc0\x84=`\xf1^Y', 0x0, 0x0) 00:28:04 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000480)=@acquire={0x1ac, 0x17, 0x1, 0x0, 0x0, {{@in=@multicast1}, @in6=@ipv4={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9], [], @dev}, {@in=@loopback, @in6=@local}, {{@in, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x2}}}, [@tmpl={0x84, 0x5, [{{@in6=@mcast1, 0x0, 0x3c}, 0x0, @in=@multicast1}, {{@in=@remote, 0x0, 0x3c}, 0x0, @in=@broadcast}]}]}, 0x1ac}}, 0x0) 00:28:04 executing program 1 (fault-call:0 fault-nth:11): syz_mount_image$reiserfs(&(0x7f0000000180)='reiserfs\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[@ANYBLOB='jdev=.']) 00:28:04 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00004e7000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f, 0xa00000000000000}, 0xc, &(0x7f0000000440)={&(0x7f00000001c0)=ANY=[@ANYBLOB="1c00000022000100000000000061960d0100000008fe0c009d0a6be0e6d9fc638f19561d6ceb8a6c9239228215fd206cf204e07953", @ANYRES32=0x0], 0x2}, 0x1, 0x0, 0x0, 0xffffffffffffffff}, 0x0) 00:28:04 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000480)=@acquire={0x1ac, 0x17, 0x1, 0x0, 0x0, {{@in=@multicast1}, @in6=@ipv4={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa], [], @dev}, {@in=@loopback, @in6=@local}, {{@in, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x2}}}, [@tmpl={0x84, 0x5, [{{@in6=@mcast1, 0x0, 0x3c}, 0x0, @in=@multicast1}, {{@in=@remote, 0x0, 0x3c}, 0x0, @in=@broadcast}]}]}, 0x1ac}}, 0x0) 00:28:04 executing program 2: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(&(0x7f0000000080)=@nbd={'/dev/nbd', 0x0, 0xe03ea}, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000240)='hfs\x00\xe6\xa6\xe2\x06g\x96\xb3\v\xf2p\xd5:\x95p\x99\x92\xf2\xc4\x80\x1f\x01\x05\xb8e?\xbfwk\xe4\xe5\xca\x82\xeb\xb1\x04wn*\xf2\xc6\x9d\xc4!\x9e?\x83\x99\x0e\xcc\xa3\x95q.C\xee\x8dIf\xec\xbf\xe8\xb2\t\xedg\x9d\xd9\v\xce\xa3\xa3\xa5\x89F\x03\xefQ\x89\f\xeeRK\x15\xec{D\x9e\x83Z\xabTa\x8e\xcd\x01\xd0\xcfd\xf9c\x87m\xbe>\x81\xba\x9d2\x1c\a,\x12\xbf\xef\xb8m\v\xdf\x8e\xd5\xf5\x1a\xabD\xf6\xe0\x95\xf4\xfeRb_+\xeb\xf9f\xe8\\\x16\xeb\x87\x8e\x8acn4,\x80Q<\x84\xaep\xf9\xfc\x8e\x9f\xed\x06.a\xd5o\x14\r&L\xbd\xb9g\x82;+n\xd5\xcca\v\x86Z\x872\xc3c:`\xf2\x02\xc2\x92\x841\xe7\xca}\"@6}j\x0e\xb7\xa9\xbc\xf3N\xa3\xf3mbd\xfbS\x80\xe0\x11<\x7f\x84\xbe\xa2\xf9\xf7\xee\xf6\x94x\x9d\xe2{\xc5\x83\xc0M\xbb\xd4Io\r\x1c\xd7<\xc0\x84=`\xf1^Y', 0x0, 0x0) 00:28:04 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000180)='./control\x00', 0x0) get_thread_area(0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x3) write$binfmt_script(r0, &(0x7f0000000bc0)=ANY=[@ANYBLOB="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"], 0x145) close(r0) execve(&(0x7f0000000180)='./file0\x00', &(0x7f0000000140), &(0x7f0000000140)) r1 = open(&(0x7f0000000000)='./control\x00', 0x80, 0x10) statfs(&(0x7f0000000380)='./control\x00', 0x0) write$P9_RWALK(r0, &(0x7f0000000400)=ANY=[@ANYBLOB="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"], 0x14f) getsockopt$inet_sctp6_SCTP_RTOINFO(r1, 0x84, 0x0, &(0x7f0000000080)={0x0, 0x200, 0x2, 0xffffffff}, &(0x7f0000000100)=0x10) 00:28:04 executing program 0: syz_mount_image$reiserfs(&(0x7f0000000180)='re%serfs\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[@ANYBLOB='jdev=./file0,jdev=']) 00:28:04 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000480)=@acquire={0x1ac, 0x17, 0x1, 0x0, 0x0, {{@in=@multicast1}, @in6=@ipv4={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb], [], @dev}, {@in=@loopback, @in6=@local}, {{@in, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x2}}}, [@tmpl={0x84, 0x5, [{{@in6=@mcast1, 0x0, 0x3c}, 0x0, @in=@multicast1}, {{@in=@remote, 0x0, 0x3c}, 0x0, @in=@broadcast}]}]}, 0x1ac}}, 0x0) [ 874.912778][ T3080] FAULT_INJECTION: forcing a failure. [ 874.912778][ T3080] name failslab, interval 1, probability 0, space 0, times 0 [ 874.938556][ T3080] CPU: 0 PID: 3080 Comm: syz-executor1 Not tainted 5.0.0-rc2-next-20190117 #14 [ 874.947500][ T3080] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 874.957557][ T3080] Call Trace: 00:28:04 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00004e7000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f, 0xe00000000000000}, 0xc, &(0x7f0000000440)={&(0x7f00000001c0)=ANY=[@ANYBLOB="1c00000022000100000000000061960d0100000008fe0c009d0a6be0e6d9fc638f19561d6ceb8a6c9239228215fd206cf204e07953", @ANYRES32=0x0], 0x2}, 0x1, 0x0, 0x0, 0xffffffffffffffff}, 0x0) [ 874.960865][ T3080] dump_stack+0x1db/0x2d0 [ 874.965219][ T3080] ? dump_stack_print_info.cold+0x20/0x20 [ 874.971042][ T3080] ? ___might_sleep+0x1e7/0x310 [ 874.975917][ T3080] should_fail.cold+0xa/0x14 [ 874.980514][ T3080] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 874.986333][ T3080] ? ___might_sleep+0x1e7/0x310 [ 874.991185][ T3080] ? arch_local_save_flags+0x50/0x50 [ 874.996485][ T3080] __should_failslab+0x121/0x190 [ 875.001426][ T3080] should_failslab+0x9/0x14 [ 875.005934][ T3080] kmem_cache_alloc+0x2be/0x710 [ 875.010913][ T3080] __kernfs_new_node+0xfe/0x8a0 [ 875.015777][ T3080] ? kasan_check_read+0x11/0x20 [ 875.020620][ T3080] ? kernfs_dop_revalidate+0x3c0/0x3c0 [ 875.026084][ T3080] ? wait_for_completion+0x810/0x810 [ 875.031358][ T3080] ? __lock_is_held+0xb6/0x140 [ 875.036117][ T3080] ? mutex_unlock+0xd/0x10 [ 875.040515][ T3080] ? kernfs_activate+0x21c/0x2c0 [ 875.045457][ T3080] kernfs_new_node+0x99/0x130 [ 875.050124][ T3080] __kernfs_create_file+0x51/0x340 [ 875.055230][ T3080] sysfs_add_file_mode_ns+0x222/0x560 [ 875.060585][ T3080] internal_create_group+0x3d2/0xd80 [ 875.065870][ T3080] ? remove_files.isra.0+0x190/0x190 [ 875.071150][ T3080] ? down_read+0x120/0x120 [ 875.075595][ T3080] ? resched_curr+0x1a0/0x1a0 [ 875.080298][ T3080] sysfs_create_group+0x20/0x30 [ 875.085182][ T3080] lo_ioctl+0x1147/0x23e0 [ 875.089497][ T3080] ? lo_rw_aio+0x1e50/0x1e50 [ 875.094071][ T3080] ? __fget+0x473/0x710 [ 875.098207][ T3080] ? lo_rw_aio+0x1e50/0x1e50 [ 875.102777][ T3080] blkdev_ioctl+0x10e0/0x2120 [ 875.107434][ T3080] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 875.113670][ T3080] ? blkpg_ioctl+0xc10/0xc10 [ 875.118267][ T3080] ? lock_downgrade+0xbe0/0xbe0 [ 875.123104][ T3080] ? kasan_check_read+0x11/0x20 [ 875.127933][ T3080] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 875.133914][ T3080] ? rcu_read_unlock_special+0x380/0x380 [ 875.139534][ T3080] ? __fget+0x49a/0x710 [ 875.143681][ T3080] block_ioctl+0xee/0x130 [ 875.147992][ T3080] ? blkdev_fallocate+0x410/0x410 [ 875.153026][ T3080] do_vfs_ioctl+0x107b/0x17d0 [ 875.157701][ T3080] ? putname+0xef/0x130 [ 875.161840][ T3080] ? ioctl_preallocate+0x2f0/0x2f0 [ 875.166945][ T3080] ? __fget_light+0x2db/0x420 [ 875.171620][ T3080] ? fget_raw+0x20/0x20 [ 875.175769][ T3080] ? do_sys_open+0x3f9/0x7c0 [ 875.180339][ T3080] ? do_syscall_64+0x8c/0x800 [ 875.185033][ T3080] ? do_syscall_64+0x8c/0x800 [ 875.189703][ T3080] ? lockdep_hardirqs_on+0x415/0x5d0 [ 875.194972][ T3080] ? security_file_ioctl+0x93/0xc0 [ 875.200088][ T3080] ksys_ioctl+0xab/0xd0 [ 875.204246][ T3080] __x64_sys_ioctl+0x73/0xb0 [ 875.208844][ T3080] do_syscall_64+0x1a3/0x800 [ 875.213430][ T3080] ? syscall_return_slowpath+0x5f0/0x5f0 [ 875.219047][ T3080] ? prepare_exit_to_usermode+0x232/0x3b0 [ 875.224747][ T3080] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 875.230332][ T3080] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 875.236212][ T3080] RIP: 0033:0x457f07 [ 875.240099][ T3080] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 cd b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 875.259708][ T3080] RSP: 002b:00007f92bde86a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 875.268113][ T3080] RAX: ffffffffffffffda RBX: 0000000000000010 RCX: 0000000000457f07 [ 875.276065][ T3080] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 875.284109][ T3080] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 875.292146][ T3080] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 875.300094][ T3080] R13: 0000000000000000 R14: 00000000004dbc38 R15: 0000000000000003 [ 875.438238][ T3080] REISERFS warning (device loop1): sh-2021 reiserfs_fill_super: can not find reiserfs on loop1 00:28:05 executing program 2: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(&(0x7f0000000080)=@nbd={'/dev/nbd', 0x0, 0xe03f2}, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000240)='hfs\x00\xe6\xa6\xe2\x06g\x96\xb3\v\xf2p\xd5:\x95p\x99\x92\xf2\xc4\x80\x1f\x01\x05\xb8e?\xbfwk\xe4\xe5\xca\x82\xeb\xb1\x04wn*\xf2\xc6\x9d\xc4!\x9e?\x83\x99\x0e\xcc\xa3\x95q.C\xee\x8dIf\xec\xbf\xe8\xb2\t\xedg\x9d\xd9\v\xce\xa3\xa3\xa5\x89F\x03\xefQ\x89\f\xeeRK\x15\xec{D\x9e\x83Z\xabTa\x8e\xcd\x01\xd0\xcfd\xf9c\x87m\xbe>\x81\xba\x9d2\x1c\a,\x12\xbf\xef\xb8m\v\xdf\x8e\xd5\xf5\x1a\xabD\xf6\xe0\x95\xf4\xfeRb_+\xeb\xf9f\xe8\\\x16\xeb\x87\x8e\x8acn4,\x80Q<\x84\xaep\xf9\xfc\x8e\x9f\xed\x06.a\xd5o\x14\r&L\xbd\xb9g\x82;+n\xd5\xcca\v\x86Z\x872\xc3c:`\xf2\x02\xc2\x92\x841\xe7\xca}\"@6}j\x0e\xb7\xa9\xbc\xf3N\xa3\xf3mbd\xfbS\x80\xe0\x11<\x7f\x84\xbe\xa2\xf9\xf7\xee\xf6\x94x\x9d\xe2{\xc5\x83\xc0M\xbb\xd4Io\r\x1c\xd7<\xc0\x84=`\xf1^Y', 0x0, 0x0) 00:28:05 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000480)=@acquire={0x1ac, 0x17, 0x1, 0x0, 0x0, {{@in=@multicast1}, @in6=@ipv4={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe], [], @dev}, {@in=@loopback, @in6=@local}, {{@in, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x2}}}, [@tmpl={0x84, 0x5, [{{@in6=@mcast1, 0x0, 0x3c}, 0x0, @in=@multicast1}, {{@in=@remote, 0x0, 0x3c}, 0x0, @in=@broadcast}]}]}, 0x1ac}}, 0x0) 00:28:05 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00004e7000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f, 0x1000000000000000}, 0xc, &(0x7f0000000440)={&(0x7f00000001c0)=ANY=[@ANYBLOB="1c00000022000100000000000061960d0100000008fe0c009d0a6be0e6d9fc638f19561d6ceb8a6c9239228215fd206cf204e07953", @ANYRES32=0x0], 0x2}, 0x1, 0x0, 0x0, 0xffffffffffffffff}, 0x0) 00:28:05 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000180)='./control\x00', 0x0) get_thread_area(0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x3) write$binfmt_script(r0, &(0x7f0000000bc0)=ANY=[@ANYBLOB="2321202e2f66696c6530202357994f66e76f4d0fe2208456ebfa69074cb94144c95c4375644bd1747e34c127d80575d10a599f851dc7ad26f3fa377c0a53cc7be2512b7493bf864ecf3f13e46032dbbf3af349b06321cec7a0652f4a5768256cd01a2d3d52de67dc459409a1e50ca51334791c8690646f7a1962ccefc0592a163bacf13da16978ca48eb3784c5baa40700ebfddde7e115f9388051297af49e38e0e3210d232e108a7e9b69c2e56676484906d975d537d128607c901050484e2bdb0d042a40c8ff8f4727cde00677ea73dac796f06f6f7ef7b3406723e7da9fb469c4ce44faff2888c779c000000000000000000000dc4fd7f68b303f980ed08fb24c8052b0626c8b3733eeee64a90f35fd7d88f958406cb5a8ed3b20b7d1278e15c1e1012befbc45a45f203503128d3a99b80bc2c744ae4b8509ca0149b48dc3e11c2d5db4"], 0x145) close(r0) execve(&(0x7f0000000180)='./file0\x00', &(0x7f0000000140), &(0x7f0000000140)) r1 = open(&(0x7f0000000000)='./control\x00', 0x80, 0x10) statfs(&(0x7f0000000380)='./control\x00', 0x0) write$P9_RWALK(r0, &(0x7f0000000400)=ANY=[@ANYBLOB="300000006f0100030001030000000400000000000000100000000003000002000000000300000000000000e646f1c5592139cf131e2bf572fa9728dbfac0390865410f3fa1f25743c497e12cb352eac4046b4500f95cfdfb4cf22a3be5c564a47654334c01d5732d382e27bbccd9b903000000c404000000d32dbd21f3ae581d32e69ef9327f7b487d1b4f4502838c08136678bd90733173ab78d6fc264b373611f15c439384ede863ecc86f33e74a14e307490508a39b41394adaba629948536b9cbfaf6fd153ef31439c5bf58116ad346d364e3293ce22b917bee18e0356778d7e12e96945109f9678302ea739b55b8173f4243ec467c6e40248445d0df527c5d637c03c41d500ed9802279fc3d9e4c6767ac0ad7893f64ec0568b7453adce65e06164d0003219476ba93aee62624d6b025582b2917ef27f06eae5af44ea3c7a25d16c5d25a2b04969202ed68056"], 0x14f) getsockopt$inet_sctp6_SCTP_RTOINFO(r1, 0x84, 0x0, &(0x7f0000000080)={0x0, 0x200, 0x2, 0xffffffff}, &(0x7f0000000100)=0x10) 00:28:05 executing program 1 (fault-call:0 fault-nth:12): syz_mount_image$reiserfs(&(0x7f0000000180)='reiserfs\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[@ANYBLOB='jdev=.']) 00:28:05 executing program 0: syz_mount_image$reiserfs(&(0x7f0000000180)='rebserfs\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[@ANYBLOB='jdev=./file0,jdev=']) 00:28:05 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000480)=@acquire={0x1ac, 0x17, 0x1, 0x0, 0x0, {{@in=@multicast1}, @in6=@ipv4={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf], [], @dev}, {@in=@loopback, @in6=@local}, {{@in, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x2}}}, [@tmpl={0x84, 0x5, [{{@in6=@mcast1, 0x0, 0x3c}, 0x0, @in=@multicast1}, {{@in=@remote, 0x0, 0x3c}, 0x0, @in=@broadcast}]}]}, 0x1ac}}, 0x0) 00:28:05 executing program 2: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(&(0x7f0000000080)=@nbd={'/dev/nbd', 0x0, 0xe03f5}, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000240)='hfs\x00\xe6\xa6\xe2\x06g\x96\xb3\v\xf2p\xd5:\x95p\x99\x92\xf2\xc4\x80\x1f\x01\x05\xb8e?\xbfwk\xe4\xe5\xca\x82\xeb\xb1\x04wn*\xf2\xc6\x9d\xc4!\x9e?\x83\x99\x0e\xcc\xa3\x95q.C\xee\x8dIf\xec\xbf\xe8\xb2\t\xedg\x9d\xd9\v\xce\xa3\xa3\xa5\x89F\x03\xefQ\x89\f\xeeRK\x15\xec{D\x9e\x83Z\xabTa\x8e\xcd\x01\xd0\xcfd\xf9c\x87m\xbe>\x81\xba\x9d2\x1c\a,\x12\xbf\xef\xb8m\v\xdf\x8e\xd5\xf5\x1a\xabD\xf6\xe0\x95\xf4\xfeRb_+\xeb\xf9f\xe8\\\x16\xeb\x87\x8e\x8acn4,\x80Q<\x84\xaep\xf9\xfc\x8e\x9f\xed\x06.a\xd5o\x14\r&L\xbd\xb9g\x82;+n\xd5\xcca\v\x86Z\x872\xc3c:`\xf2\x02\xc2\x92\x841\xe7\xca}\"@6}j\x0e\xb7\xa9\xbc\xf3N\xa3\xf3mbd\xfbS\x80\xe0\x11<\x7f\x84\xbe\xa2\xf9\xf7\xee\xf6\x94x\x9d\xe2{\xc5\x83\xc0M\xbb\xd4Io\r\x1c\xd7<\xc0\x84=`\xf1^Y', 0x0, 0x0) [ 875.890473][ T3150] FAULT_INJECTION: forcing a failure. [ 875.890473][ T3150] name failslab, interval 1, probability 0, space 0, times 0 [ 875.903504][ T3150] CPU: 0 PID: 3150 Comm: syz-executor1 Not tainted 5.0.0-rc2-next-20190117 #14 [ 875.912441][ T3150] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 875.922533][ T3150] Call Trace: [ 875.925856][ T3150] dump_stack+0x1db/0x2d0 [ 875.930201][ T3150] ? dump_stack_print_info.cold+0x20/0x20 [ 875.935922][ T3150] ? add_lock_to_list.isra.0+0x450/0x450 [ 875.941562][ T3150] ? kernfs_activate+0x8f/0x2c0 [ 875.946476][ T3150] should_fail.cold+0xa/0x14 [ 875.951138][ T3150] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 875.956972][ T3150] ? ___might_sleep+0x1e7/0x310 [ 875.961827][ T3150] ? arch_local_save_flags+0x50/0x50 [ 875.967139][ T3150] __should_failslab+0x121/0x190 [ 875.972122][ T3150] should_failslab+0x9/0x14 [ 875.976664][ T3150] kmem_cache_alloc+0x2be/0x710 [ 875.981516][ T3150] ? __mutex_unlock_slowpath+0x195/0x870 [ 875.987153][ T3150] __kernfs_new_node+0xfe/0x8a0 [ 875.992015][ T3150] ? kernfs_dop_revalidate+0x3c0/0x3c0 [ 875.997480][ T3150] ? mutex_unlock+0xd/0x10 [ 876.001903][ T3150] ? kernfs_activate+0x21c/0x2c0 [ 876.006839][ T3150] ? kernfs_walk_and_get_ns+0x340/0x340 [ 876.012389][ T3150] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 876.018639][ T3150] ? kernfs_link_sibling+0x210/0x420 [ 876.023932][ T3150] kernfs_new_node+0x99/0x130 [ 876.028614][ T3150] __kernfs_create_file+0x51/0x340 [ 876.033745][ T3150] sysfs_add_file_mode_ns+0x222/0x560 [ 876.039172][ T3150] internal_create_group+0x3d2/0xd80 [ 876.044466][ T3150] ? remove_files.isra.0+0x190/0x190 [ 876.049752][ T3150] ? down_read+0x120/0x120 [ 876.054202][ T3150] ? resched_curr+0x1a0/0x1a0 [ 876.058920][ T3150] sysfs_create_group+0x20/0x30 [ 876.063779][ T3150] lo_ioctl+0x1147/0x23e0 [ 876.068135][ T3150] ? lo_rw_aio+0x1e50/0x1e50 [ 876.072733][ T3150] ? __fget+0x473/0x710 [ 876.076898][ T3150] ? lo_rw_aio+0x1e50/0x1e50 [ 876.081494][ T3150] blkdev_ioctl+0x10e0/0x2120 00:28:05 executing program 2: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(&(0x7f0000000080)=@nbd={'/dev/nbd', 0x0, 0xe03f6}, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000240)='hfs\x00\xe6\xa6\xe2\x06g\x96\xb3\v\xf2p\xd5:\x95p\x99\x92\xf2\xc4\x80\x1f\x01\x05\xb8e?\xbfwk\xe4\xe5\xca\x82\xeb\xb1\x04wn*\xf2\xc6\x9d\xc4!\x9e?\x83\x99\x0e\xcc\xa3\x95q.C\xee\x8dIf\xec\xbf\xe8\xb2\t\xedg\x9d\xd9\v\xce\xa3\xa3\xa5\x89F\x03\xefQ\x89\f\xeeRK\x15\xec{D\x9e\x83Z\xabTa\x8e\xcd\x01\xd0\xcfd\xf9c\x87m\xbe>\x81\xba\x9d2\x1c\a,\x12\xbf\xef\xb8m\v\xdf\x8e\xd5\xf5\x1a\xabD\xf6\xe0\x95\xf4\xfeRb_+\xeb\xf9f\xe8\\\x16\xeb\x87\x8e\x8acn4,\x80Q<\x84\xaep\xf9\xfc\x8e\x9f\xed\x06.a\xd5o\x14\r&L\xbd\xb9g\x82;+n\xd5\xcca\v\x86Z\x872\xc3c:`\xf2\x02\xc2\x92\x841\xe7\xca}\"@6}j\x0e\xb7\xa9\xbc\xf3N\xa3\xf3mbd\xfbS\x80\xe0\x11<\x7f\x84\xbe\xa2\xf9\xf7\xee\xf6\x94x\x9d\xe2{\xc5\x83\xc0M\xbb\xd4Io\r\x1c\xd7<\xc0\x84=`\xf1^Y', 0x0, 0x0) [ 876.086175][ T3150] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 876.092414][ T3150] ? blkpg_ioctl+0xc10/0xc10 [ 876.097000][ T3150] ? lock_downgrade+0xbe0/0xbe0 [ 876.101866][ T3150] ? kasan_check_read+0x11/0x20 [ 876.106747][ T3150] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 876.112730][ T3150] ? rcu_read_unlock_special+0x380/0x380 [ 876.118369][ T3150] ? __fget+0x49a/0x710 [ 876.122537][ T3150] block_ioctl+0xee/0x130 [ 876.126868][ T3150] ? blkdev_fallocate+0x410/0x410 [ 876.131909][ T3150] do_vfs_ioctl+0x107b/0x17d0 [ 876.136579][ T3150] ? putname+0xef/0x130 [ 876.140716][ T3150] ? ioctl_preallocate+0x2f0/0x2f0 [ 876.145820][ T3150] ? __fget_light+0x2db/0x420 [ 876.150490][ T3150] ? fget_raw+0x20/0x20 [ 876.154642][ T3150] ? do_sys_open+0x3f9/0x7c0 [ 876.159241][ T3150] ? do_syscall_64+0x8c/0x800 [ 876.163919][ T3150] ? do_syscall_64+0x8c/0x800 [ 876.168598][ T3150] ? lockdep_hardirqs_on+0x415/0x5d0 [ 876.173915][ T3150] ? security_file_ioctl+0x93/0xc0 [ 876.179054][ T3150] ksys_ioctl+0xab/0xd0 [ 876.183207][ T3150] __x64_sys_ioctl+0x73/0xb0 [ 876.187793][ T3150] do_syscall_64+0x1a3/0x800 [ 876.192365][ T3150] ? syscall_return_slowpath+0x5f0/0x5f0 [ 876.198000][ T3150] ? prepare_exit_to_usermode+0x232/0x3b0 [ 876.203717][ T3150] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 876.209263][ T3150] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 876.215133][ T3150] RIP: 0033:0x457f07 [ 876.219005][ T3150] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 cd b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00:28:06 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000180)='./control\x00', 0x0) get_thread_area(0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x3) write$binfmt_script(r0, &(0x7f0000000bc0)=ANY=[@ANYBLOB="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"], 0x145) close(r0) execve(&(0x7f0000000180)='./file0\x00', &(0x7f0000000140), &(0x7f0000000140)) r1 = open(&(0x7f0000000000)='./control\x00', 0x80, 0x10) statfs(&(0x7f0000000380)='./control\x00', 0x0) write$P9_RWALK(r0, &(0x7f0000000400)=ANY=[@ANYBLOB="300000006f0100030001030000000400000000000000100000000003000002000000000300000000000000e646f1c5592139cf131e2bf572fa9728dbfac0390865410f3fa1f25743c497e12cb352eac4046b4500f95cfdfb4cf22a3be5c564a47654334c01d5732d382e27bbccd9b903000000c404000000d32dbd21f3ae581d32e69ef9327f7b487d1b4f4502838c08136678bd90733173ab78d6fc264b373611f15c439384ede863ecc86f33e74a14e307490508a39b41394adaba629948536b9cbfaf6fd153ef31439c5bf58116ad346d364e3293ce22b917bee18e0356778d7e12e96945109f9678302ea739b55b8173f4243ec467c6e40248445d0df527c5d637c03c41d500ed9802279fc3d9e4c6767ac0ad7893f64ec0568b7453adce65e06164d0003219476ba93aee62624d6b025582b2917ef27f06eae5af44ea3c7a25d16c5d25a2b04969202ed68056"], 0x14f) getsockopt$inet_sctp6_SCTP_RTOINFO(r1, 0x84, 0x0, &(0x7f0000000080)={0x0, 0x200, 0x2, 0xffffffff}, &(0x7f0000000100)=0x10) 00:28:06 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00004e7000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f, 0x6000000000000000}, 0xc, &(0x7f0000000440)={&(0x7f00000001c0)=ANY=[@ANYBLOB="1c00000022000100000000000061960d0100000008fe0c009d0a6be0e6d9fc638f19561d6ceb8a6c9239228215fd206cf204e07953", @ANYRES32=0x0], 0x2}, 0x1, 0x0, 0x0, 0xffffffffffffffff}, 0x0) 00:28:06 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000480)=@acquire={0x1ac, 0x17, 0x1, 0x0, 0x0, {{@in=@multicast1}, @in6=@ipv4={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10], [], @dev}, {@in=@loopback, @in6=@local}, {{@in, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x2}}}, [@tmpl={0x84, 0x5, [{{@in6=@mcast1, 0x0, 0x3c}, 0x0, @in=@multicast1}, {{@in=@remote, 0x0, 0x3c}, 0x0, @in=@broadcast}]}]}, 0x1ac}}, 0x0) [ 876.238607][ T3150] RSP: 002b:00007f92bde86a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 876.247012][ T3150] RAX: ffffffffffffffda RBX: 0000000000000010 RCX: 0000000000457f07 [ 876.254973][ T3150] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 876.262928][ T3150] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 876.270917][ T3150] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 876.278871][ T3150] R13: 0000000000000000 R14: 00000000004dbc38 R15: 0000000000000003 00:28:06 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000480)=@acquire={0x1ac, 0x17, 0x1, 0x0, 0x0, {{@in=@multicast1}, @in6=@ipv4={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x11], [], @dev}, {@in=@loopback, @in6=@local}, {{@in, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x2}}}, [@tmpl={0x84, 0x5, [{{@in6=@mcast1, 0x0, 0x3c}, 0x0, @in=@multicast1}, {{@in=@remote, 0x0, 0x3c}, 0x0, @in=@broadcast}]}]}, 0x1ac}}, 0x0) [ 876.312127][ T3150] REISERFS warning (device loop1): sh-2021 reiserfs_fill_super: can not find reiserfs on loop1 00:28:06 executing program 2: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(&(0x7f0000000080)=@nbd={'/dev/nbd', 0x0, 0xe03fa}, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000240)='hfs\x00\xe6\xa6\xe2\x06g\x96\xb3\v\xf2p\xd5:\x95p\x99\x92\xf2\xc4\x80\x1f\x01\x05\xb8e?\xbfwk\xe4\xe5\xca\x82\xeb\xb1\x04wn*\xf2\xc6\x9d\xc4!\x9e?\x83\x99\x0e\xcc\xa3\x95q.C\xee\x8dIf\xec\xbf\xe8\xb2\t\xedg\x9d\xd9\v\xce\xa3\xa3\xa5\x89F\x03\xefQ\x89\f\xeeRK\x15\xec{D\x9e\x83Z\xabTa\x8e\xcd\x01\xd0\xcfd\xf9c\x87m\xbe>\x81\xba\x9d2\x1c\a,\x12\xbf\xef\xb8m\v\xdf\x8e\xd5\xf5\x1a\xabD\xf6\xe0\x95\xf4\xfeRb_+\xeb\xf9f\xe8\\\x16\xeb\x87\x8e\x8acn4,\x80Q<\x84\xaep\xf9\xfc\x8e\x9f\xed\x06.a\xd5o\x14\r&L\xbd\xb9g\x82;+n\xd5\xcca\v\x86Z\x872\xc3c:`\xf2\x02\xc2\x92\x841\xe7\xca}\"@6}j\x0e\xb7\xa9\xbc\xf3N\xa3\xf3mbd\xfbS\x80\xe0\x11<\x7f\x84\xbe\xa2\xf9\xf7\xee\xf6\x94x\x9d\xe2{\xc5\x83\xc0M\xbb\xd4Io\r\x1c\xd7<\xc0\x84=`\xf1^Y', 0x0, 0x0) 00:28:06 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00004e7000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f, 0x9effffff00000000}, 0xc, &(0x7f0000000440)={&(0x7f00000001c0)=ANY=[@ANYBLOB="1c00000022000100000000000061960d0100000008fe0c009d0a6be0e6d9fc638f19561d6ceb8a6c9239228215fd206cf204e07953", @ANYRES32=0x0], 0x2}, 0x1, 0x0, 0x0, 0xffffffffffffffff}, 0x0) 00:28:06 executing program 1 (fault-call:0 fault-nth:13): syz_mount_image$reiserfs(&(0x7f0000000180)='reiserfs\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[@ANYBLOB='jdev=.']) 00:28:06 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000480)=@acquire={0x1ac, 0x17, 0x1, 0x0, 0x0, {{@in=@multicast1}, @in6=@ipv4={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x12], [], @dev}, {@in=@loopback, @in6=@local}, {{@in, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x2}}}, [@tmpl={0x84, 0x5, [{{@in6=@mcast1, 0x0, 0x3c}, 0x0, @in=@multicast1}, {{@in=@remote, 0x0, 0x3c}, 0x0, @in=@broadcast}]}]}, 0x1ac}}, 0x0) 00:28:06 executing program 0: syz_mount_image$reiserfs(&(0x7f0000000180)='redserfs\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[@ANYBLOB='jdev=./file0,jdev=']) 00:28:06 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000180)='./control\x00', 0x0) get_thread_area(0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x3) write$binfmt_script(r0, &(0x7f0000000bc0)=ANY=[@ANYBLOB="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"], 0x145) close(r0) execve(&(0x7f0000000180)='./file0\x00', &(0x7f0000000140), &(0x7f0000000140)) r1 = open(&(0x7f0000000000)='./control\x00', 0x80, 0x10) statfs(&(0x7f0000000380)='./control\x00', &(0x7f00000003c0)=""/20) write$P9_RWALK(0xffffffffffffffff, &(0x7f0000000400)=ANY=[@ANYBLOB="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"], 0x14f) getsockopt$inet_sctp6_SCTP_RTOINFO(r1, 0x84, 0x0, &(0x7f0000000080)={0x0, 0x200, 0x2, 0xffffffff}, &(0x7f0000000100)=0x10) 00:28:06 executing program 2: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(&(0x7f0000000080)=@nbd={'/dev/nbd', 0x0, 0xe0402}, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000240)='hfs\x00\xe6\xa6\xe2\x06g\x96\xb3\v\xf2p\xd5:\x95p\x99\x92\xf2\xc4\x80\x1f\x01\x05\xb8e?\xbfwk\xe4\xe5\xca\x82\xeb\xb1\x04wn*\xf2\xc6\x9d\xc4!\x9e?\x83\x99\x0e\xcc\xa3\x95q.C\xee\x8dIf\xec\xbf\xe8\xb2\t\xedg\x9d\xd9\v\xce\xa3\xa3\xa5\x89F\x03\xefQ\x89\f\xeeRK\x15\xec{D\x9e\x83Z\xabTa\x8e\xcd\x01\xd0\xcfd\xf9c\x87m\xbe>\x81\xba\x9d2\x1c\a,\x12\xbf\xef\xb8m\v\xdf\x8e\xd5\xf5\x1a\xabD\xf6\xe0\x95\xf4\xfeRb_+\xeb\xf9f\xe8\\\x16\xeb\x87\x8e\x8acn4,\x80Q<\x84\xaep\xf9\xfc\x8e\x9f\xed\x06.a\xd5o\x14\r&L\xbd\xb9g\x82;+n\xd5\xcca\v\x86Z\x872\xc3c:`\xf2\x02\xc2\x92\x841\xe7\xca}\"@6}j\x0e\xb7\xa9\xbc\xf3N\xa3\xf3mbd\xfbS\x80\xe0\x11<\x7f\x84\xbe\xa2\xf9\xf7\xee\xf6\x94x\x9d\xe2{\xc5\x83\xc0M\xbb\xd4Io\r\x1c\xd7<\xc0\x84=`\xf1^Y', 0x0, 0x0) [ 876.688897][ T3201] FAULT_INJECTION: forcing a failure. [ 876.688897][ T3201] name failslab, interval 1, probability 0, space 0, times 0 [ 876.726103][ T3201] CPU: 1 PID: 3201 Comm: syz-executor1 Not tainted 5.0.0-rc2-next-20190117 #14 00:28:06 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00004e7000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f, 0xb00a000000000000}, 0xc, &(0x7f0000000440)={&(0x7f00000001c0)=ANY=[@ANYBLOB="1c00000022000100000000000061960d0100000008fe0c009d0a6be0e6d9fc638f19561d6ceb8a6c9239228215fd206cf204e07953", @ANYRES32=0x0], 0x2}, 0x1, 0x0, 0x0, 0xffffffffffffffff}, 0x0) [ 876.735049][ T3201] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 876.745102][ T3201] Call Trace: [ 876.748457][ T3201] dump_stack+0x1db/0x2d0 [ 876.752809][ T3201] ? dump_stack_print_info.cold+0x20/0x20 [ 876.758510][ T3201] ? add_lock_to_list.isra.0+0x450/0x450 [ 876.764125][ T3201] ? kernfs_activate+0x8f/0x2c0 [ 876.768960][ T3201] should_fail.cold+0xa/0x14 [ 876.773533][ T3201] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 876.779343][ T3201] ? ___might_sleep+0x1e7/0x310 [ 876.784216][ T3201] ? arch_local_save_flags+0x50/0x50 [ 876.789483][ T3201] __should_failslab+0x121/0x190 [ 876.794406][ T3201] should_failslab+0x9/0x14 [ 876.798903][ T3201] kmem_cache_alloc+0x2be/0x710 [ 876.803759][ T3201] ? __mutex_unlock_slowpath+0x195/0x870 [ 876.809373][ T3201] __kernfs_new_node+0xfe/0x8a0 [ 876.814215][ T3201] ? kernfs_dop_revalidate+0x3c0/0x3c0 [ 876.819668][ T3201] ? mutex_unlock+0xd/0x10 [ 876.824062][ T3201] ? kernfs_activate+0x21c/0x2c0 [ 876.828980][ T3201] ? kernfs_walk_and_get_ns+0x340/0x340 [ 876.834523][ T3201] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 876.840753][ T3201] ? kernfs_link_sibling+0x210/0x420 [ 876.846036][ T3201] kernfs_new_node+0x99/0x130 [ 876.850695][ T3201] __kernfs_create_file+0x51/0x340 [ 876.855814][ T3201] sysfs_add_file_mode_ns+0x222/0x560 [ 876.861171][ T3201] internal_create_group+0x3d2/0xd80 [ 876.866472][ T3201] ? remove_files.isra.0+0x190/0x190 [ 876.871764][ T3201] ? down_read+0x120/0x120 [ 876.876177][ T3201] ? resched_curr+0x1a0/0x1a0 [ 876.880870][ T3201] sysfs_create_group+0x20/0x30 [ 876.885734][ T3201] lo_ioctl+0x1147/0x23e0 [ 876.890065][ T3201] ? lo_rw_aio+0x1e50/0x1e50 [ 876.894673][ T3201] ? __fget+0x473/0x710 [ 876.898843][ T3201] ? lo_rw_aio+0x1e50/0x1e50 [ 876.903420][ T3201] blkdev_ioctl+0x10e0/0x2120 [ 876.908080][ T3201] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 876.914303][ T3201] ? blkpg_ioctl+0xc10/0xc10 [ 876.918908][ T3201] ? lock_downgrade+0xbe0/0xbe0 [ 876.923741][ T3201] ? kasan_check_read+0x11/0x20 [ 876.928577][ T3201] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 876.934558][ T3201] ? rcu_read_unlock_special+0x380/0x380 [ 876.940175][ T3201] ? __fget+0x49a/0x710 [ 876.944345][ T3201] block_ioctl+0xee/0x130 [ 876.948666][ T3201] ? blkdev_fallocate+0x410/0x410 [ 876.953679][ T3201] do_vfs_ioctl+0x107b/0x17d0 [ 876.958336][ T3201] ? putname+0xef/0x130 [ 876.962485][ T3201] ? ioctl_preallocate+0x2f0/0x2f0 [ 876.967577][ T3201] ? __fget_light+0x2db/0x420 [ 876.972254][ T3201] ? fget_raw+0x20/0x20 [ 876.976398][ T3201] ? do_sys_open+0x3f9/0x7c0 [ 876.980976][ T3201] ? do_syscall_64+0x8c/0x800 [ 876.985652][ T3201] ? do_syscall_64+0x8c/0x800 [ 876.990337][ T3201] ? lockdep_hardirqs_on+0x415/0x5d0 [ 876.995663][ T3201] ? security_file_ioctl+0x93/0xc0 [ 877.000787][ T3201] ksys_ioctl+0xab/0xd0 [ 877.004925][ T3201] __x64_sys_ioctl+0x73/0xb0 [ 877.009524][ T3201] do_syscall_64+0x1a3/0x800 [ 877.014098][ T3201] ? syscall_return_slowpath+0x5f0/0x5f0 [ 877.019729][ T3201] ? prepare_exit_to_usermode+0x232/0x3b0 [ 877.025535][ T3201] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 877.031071][ T3201] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 877.036943][ T3201] RIP: 0033:0x457f07 [ 877.040840][ T3201] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 cd b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 877.060428][ T3201] RSP: 002b:00007f92bde86a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 877.068825][ T3201] RAX: ffffffffffffffda RBX: 0000000000000010 RCX: 0000000000457f07 [ 877.076795][ T3201] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 00:28:06 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000480)=@acquire={0x1ac, 0x17, 0x1, 0x0, 0x0, {{@in=@multicast1}, @in6=@ipv4={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x13], [], @dev}, {@in=@loopback, @in6=@local}, {{@in, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x2}}}, [@tmpl={0x84, 0x5, [{{@in6=@mcast1, 0x0, 0x3c}, 0x0, @in=@multicast1}, {{@in=@remote, 0x0, 0x3c}, 0x0, @in=@broadcast}]}]}, 0x1ac}}, 0x0) [ 877.084771][ T3201] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 877.092742][ T3201] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 877.100707][ T3201] R13: 0000000000000000 R14: 00000000004dbc38 R15: 0000000000000003 [ 877.181683][ T3201] REISERFS warning (device loop1): sh-2021 reiserfs_fill_super: can not find reiserfs on loop1 00:28:07 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000480)=@acquire={0x1ac, 0x17, 0x1, 0x0, 0x0, {{@in=@multicast1}, @in6=@ipv4={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x60], [], @dev}, {@in=@loopback, @in6=@local}, {{@in, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x2}}}, [@tmpl={0x84, 0x5, [{{@in6=@mcast1, 0x0, 0x3c}, 0x0, @in=@multicast1}, {{@in=@remote, 0x0, 0x3c}, 0x0, @in=@broadcast}]}]}, 0x1ac}}, 0x0) 00:28:07 executing program 2: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(&(0x7f0000000080)=@nbd={'/dev/nbd', 0x0, 0xe0500}, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000240)='hfs\x00\xe6\xa6\xe2\x06g\x96\xb3\v\xf2p\xd5:\x95p\x99\x92\xf2\xc4\x80\x1f\x01\x05\xb8e?\xbfwk\xe4\xe5\xca\x82\xeb\xb1\x04wn*\xf2\xc6\x9d\xc4!\x9e?\x83\x99\x0e\xcc\xa3\x95q.C\xee\x8dIf\xec\xbf\xe8\xb2\t\xedg\x9d\xd9\v\xce\xa3\xa3\xa5\x89F\x03\xefQ\x89\f\xeeRK\x15\xec{D\x9e\x83Z\xabTa\x8e\xcd\x01\xd0\xcfd\xf9c\x87m\xbe>\x81\xba\x9d2\x1c\a,\x12\xbf\xef\xb8m\v\xdf\x8e\xd5\xf5\x1a\xabD\xf6\xe0\x95\xf4\xfeRb_+\xeb\xf9f\xe8\\\x16\xeb\x87\x8e\x8acn4,\x80Q<\x84\xaep\xf9\xfc\x8e\x9f\xed\x06.a\xd5o\x14\r&L\xbd\xb9g\x82;+n\xd5\xcca\v\x86Z\x872\xc3c:`\xf2\x02\xc2\x92\x841\xe7\xca}\"@6}j\x0e\xb7\xa9\xbc\xf3N\xa3\xf3mbd\xfbS\x80\xe0\x11<\x7f\x84\xbe\xa2\xf9\xf7\xee\xf6\x94x\x9d\xe2{\xc5\x83\xc0M\xbb\xd4Io\r\x1c\xd7<\xc0\x84=`\xf1^Y', 0x0, 0x0) 00:28:07 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00004e7000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f, 0xf0ffffff00000000}, 0xc, &(0x7f0000000440)={&(0x7f00000001c0)=ANY=[@ANYBLOB="1c00000022000100000000000061960d0100000008fe0c009d0a6be0e6d9fc638f19561d6ceb8a6c9239228215fd206cf204e07953", @ANYRES32=0x0], 0x2}, 0x1, 0x0, 0x0, 0xffffffffffffffff}, 0x0) 00:28:07 executing program 0: syz_mount_image$reiserfs(&(0x7f0000000180)='refserfs\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[@ANYBLOB='jdev=./file0,jdev=']) 00:28:07 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000180)='./control\x00', 0x0) get_thread_area(0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x3) write$binfmt_script(r0, &(0x7f0000000bc0)=ANY=[@ANYBLOB="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"], 0x145) close(r0) execve(&(0x7f0000000180)='./file0\x00', &(0x7f0000000140), &(0x7f0000000140)) r1 = open(&(0x7f0000000000)='./control\x00', 0x80, 0x10) statfs(&(0x7f0000000380)='./control\x00', &(0x7f00000003c0)=""/20) write$P9_RWALK(0xffffffffffffffff, &(0x7f0000000400)=ANY=[@ANYBLOB="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"], 0x14f) getsockopt$inet_sctp6_SCTP_RTOINFO(r1, 0x84, 0x0, &(0x7f0000000080)={0x0, 0x200, 0x2, 0xffffffff}, &(0x7f0000000100)=0x10) 00:28:07 executing program 1: syz_mount_image$reiserfs(&(0x7f0000000180)='reiserfs\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[@ANYBLOB='jdev=.']) [ 877.513847][ T2481] block nbd2: Attempted send on invalid socket [ 877.520096][ T2481] print_req_error: I/O error, dev nbd2, sector 2 flags 0 [ 877.528012][ T3250] hfs: can't find a HFS filesystem on dev nbd2 00:28:07 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00004e7000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f, 0xffffff7f00000000}, 0xc, &(0x7f0000000440)={&(0x7f00000001c0)=ANY=[@ANYBLOB="1c00000022000100000000000061960d0100000008fe0c009d0a6be0e6d9fc638f19561d6ceb8a6c9239228215fd206cf204e07953", @ANYRES32=0x0], 0x2}, 0x1, 0x0, 0x0, 0xffffffffffffffff}, 0x0) 00:28:07 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000480)=@acquire={0x1ac, 0x17, 0x1, 0x0, 0x0, {{@in=@multicast1}, @in6=@ipv4={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf0], [], @dev}, {@in=@loopback, @in6=@local}, {{@in, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x2}}}, [@tmpl={0x84, 0x5, [{{@in6=@mcast1, 0x0, 0x3c}, 0x0, @in=@multicast1}, {{@in=@remote, 0x0, 0x3c}, 0x0, @in=@broadcast}]}]}, 0x1ac}}, 0x0) 00:28:07 executing program 2: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(&(0x7f0000000080)=@nbd={'/dev/nbd', 0x0, 0xe0600}, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000240)='hfs\x00\xe6\xa6\xe2\x06g\x96\xb3\v\xf2p\xd5:\x95p\x99\x92\xf2\xc4\x80\x1f\x01\x05\xb8e?\xbfwk\xe4\xe5\xca\x82\xeb\xb1\x04wn*\xf2\xc6\x9d\xc4!\x9e?\x83\x99\x0e\xcc\xa3\x95q.C\xee\x8dIf\xec\xbf\xe8\xb2\t\xedg\x9d\xd9\v\xce\xa3\xa3\xa5\x89F\x03\xefQ\x89\f\xeeRK\x15\xec{D\x9e\x83Z\xabTa\x8e\xcd\x01\xd0\xcfd\xf9c\x87m\xbe>\x81\xba\x9d2\x1c\a,\x12\xbf\xef\xb8m\v\xdf\x8e\xd5\xf5\x1a\xabD\xf6\xe0\x95\xf4\xfeRb_+\xeb\xf9f\xe8\\\x16\xeb\x87\x8e\x8acn4,\x80Q<\x84\xaep\xf9\xfc\x8e\x9f\xed\x06.a\xd5o\x14\r&L\xbd\xb9g\x82;+n\xd5\xcca\v\x86Z\x872\xc3c:`\xf2\x02\xc2\x92\x841\xe7\xca}\"@6}j\x0e\xb7\xa9\xbc\xf3N\xa3\xf3mbd\xfbS\x80\xe0\x11<\x7f\x84\xbe\xa2\xf9\xf7\xee\xf6\x94x\x9d\xe2{\xc5\x83\xc0M\xbb\xd4Io\r\x1c\xd7<\xc0\x84=`\xf1^Y', 0x0, 0x0) [ 877.682486][ T3268] REISERFS warning (device loop1): sh-2021 reiserfs_fill_super: can not find reiserfs on loop1 00:28:07 executing program 0: syz_mount_image$reiserfs(&(0x7f0000000180)='re\x86serfs\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[@ANYBLOB='jdev=./file0,jdev=']) 00:28:07 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000480)=@acquire={0x1ac, 0x17, 0x1, 0x0, 0x0, {{@in=@multicast1}, @in6=@ipv4={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x300], [], @dev}, {@in=@loopback, @in6=@local}, {{@in, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x2}}}, [@tmpl={0x84, 0x5, [{{@in6=@mcast1, 0x0, 0x3c}, 0x0, @in=@multicast1}, {{@in=@remote, 0x0, 0x3c}, 0x0, @in=@broadcast}]}]}, 0x1ac}}, 0x0) 00:28:07 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000180)='./control\x00', 0x0) get_thread_area(0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x3) write$binfmt_script(r0, &(0x7f0000000bc0)=ANY=[@ANYBLOB="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"], 0x145) close(r0) execve(&(0x7f0000000180)='./file0\x00', &(0x7f0000000140), &(0x7f0000000140)) r1 = open(&(0x7f0000000000)='./control\x00', 0x80, 0x10) statfs(&(0x7f0000000380)='./control\x00', &(0x7f00000003c0)=""/20) write$P9_RWALK(0xffffffffffffffff, &(0x7f0000000400)=ANY=[@ANYBLOB="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"], 0x14f) getsockopt$inet_sctp6_SCTP_RTOINFO(r1, 0x84, 0x0, &(0x7f0000000080)={0x0, 0x200, 0x2, 0xffffffff}, &(0x7f0000000100)=0x10) [ 877.784008][ T2481] block nbd2: Attempted send on invalid socket [ 877.790262][ T2481] print_req_error: I/O error, dev nbd2, sector 2 flags 0 [ 877.798857][ T3282] hfs: can't find a HFS filesystem on dev nbd2 00:28:07 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00004e7000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f, 0xfffffffffffff000}, 0xc, &(0x7f0000000440)={&(0x7f00000001c0)=ANY=[@ANYBLOB="1c00000022000100000000000061960d0100000008fe0c009d0a6be0e6d9fc638f19561d6ceb8a6c9239228215fd206cf204e07953", @ANYRES32=0x0], 0x2}, 0x1, 0x0, 0x0, 0xffffffffffffffff}, 0x0) 00:28:07 executing program 1: syz_mount_image$reiserfs(&(0x7f0000000180)='\neiserfs\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[@ANYBLOB='jdev=.']) 00:28:07 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000480)=@acquire={0x1ac, 0x17, 0x1, 0x0, 0x0, {{@in=@multicast1}, @in6=@ipv4={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x500], [], @dev}, {@in=@loopback, @in6=@local}, {{@in, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x2}}}, [@tmpl={0x84, 0x5, [{{@in6=@mcast1, 0x0, 0x3c}, 0x0, @in=@multicast1}, {{@in=@remote, 0x0, 0x3c}, 0x0, @in=@broadcast}]}]}, 0x1ac}}, 0x0) [ 877.900890][ T2480] block nbd2: Attempted send on invalid socket [ 877.907360][ T2480] print_req_error: I/O error, dev nbd2, sector 2 flags 0 [ 877.915139][ T3282] hfs: can't find a HFS filesystem on dev nbd2 00:28:07 executing program 2: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(&(0x7f0000000080)=@nbd={'/dev/nbd', 0x0, 0xe0700}, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000240)='hfs\x00\xe6\xa6\xe2\x06g\x96\xb3\v\xf2p\xd5:\x95p\x99\x92\xf2\xc4\x80\x1f\x01\x05\xb8e?\xbfwk\xe4\xe5\xca\x82\xeb\xb1\x04wn*\xf2\xc6\x9d\xc4!\x9e?\x83\x99\x0e\xcc\xa3\x95q.C\xee\x8dIf\xec\xbf\xe8\xb2\t\xedg\x9d\xd9\v\xce\xa3\xa3\xa5\x89F\x03\xefQ\x89\f\xeeRK\x15\xec{D\x9e\x83Z\xabTa\x8e\xcd\x01\xd0\xcfd\xf9c\x87m\xbe>\x81\xba\x9d2\x1c\a,\x12\xbf\xef\xb8m\v\xdf\x8e\xd5\xf5\x1a\xabD\xf6\xe0\x95\xf4\xfeRb_+\xeb\xf9f\xe8\\\x16\xeb\x87\x8e\x8acn4,\x80Q<\x84\xaep\xf9\xfc\x8e\x9f\xed\x06.a\xd5o\x14\r&L\xbd\xb9g\x82;+n\xd5\xcca\v\x86Z\x872\xc3c:`\xf2\x02\xc2\x92\x841\xe7\xca}\"@6}j\x0e\xb7\xa9\xbc\xf3N\xa3\xf3mbd\xfbS\x80\xe0\x11<\x7f\x84\xbe\xa2\xf9\xf7\xee\xf6\x94x\x9d\xe2{\xc5\x83\xc0M\xbb\xd4Io\r\x1c\xd7<\xc0\x84=`\xf1^Y', 0x0, 0x0) 00:28:07 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00004e7000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f, 0x0, 0x2}, 0xc, &(0x7f0000000440)={&(0x7f00000001c0)=ANY=[@ANYBLOB="1c00000022000100000000000061960d0100000008fe0c009d0a6be0e6d9fc638f19561d6ceb8a6c9239228215fd206cf204e07953", @ANYRES32=0x0], 0x2}, 0x1, 0x0, 0x0, 0xffffffffffffffff}, 0x0) 00:28:07 executing program 0: syz_mount_image$reiserfs(&(0x7f0000000180)='rei\nerfs\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[@ANYBLOB='jdev=./file0,jdev=']) [ 878.117610][ T2480] block nbd2: Attempted send on invalid socket [ 878.124406][ T2480] print_req_error: I/O error, dev nbd2, sector 2 flags 0 [ 878.137003][ T3321] hfs: can't find a HFS filesystem on dev nbd2 00:28:07 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000480)=@acquire={0x1ac, 0x17, 0x1, 0x0, 0x0, {{@in=@multicast1}, @in6=@ipv4={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x508], [], @dev}, {@in=@loopback, @in6=@local}, {{@in, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x2}}}, [@tmpl={0x84, 0x5, [{{@in6=@mcast1, 0x0, 0x3c}, 0x0, @in=@multicast1}, {{@in=@remote, 0x0, 0x3c}, 0x0, @in=@broadcast}]}]}, 0x1ac}}, 0x0) 00:28:07 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000180)='./control\x00', 0x0) get_thread_area(0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x3) write$binfmt_script(r0, &(0x7f0000000bc0)=ANY=[@ANYBLOB="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"], 0x145) close(r0) execve(&(0x7f0000000180)='./file0\x00', &(0x7f0000000140), &(0x7f0000000140)) r1 = open(&(0x7f0000000000)='./control\x00', 0x80, 0x10) statfs(&(0x7f0000000380)='./control\x00', &(0x7f00000003c0)=""/20) write$P9_RWALK(r0, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_RTOINFO(r1, 0x84, 0x0, &(0x7f0000000080)={0x0, 0x200, 0x2, 0xffffffff}, &(0x7f0000000100)=0x10) 00:28:07 executing program 2: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(&(0x7f0000000080)=@nbd={'/dev/nbd', 0x0, 0xe0900}, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000240)='hfs\x00\xe6\xa6\xe2\x06g\x96\xb3\v\xf2p\xd5:\x95p\x99\x92\xf2\xc4\x80\x1f\x01\x05\xb8e?\xbfwk\xe4\xe5\xca\x82\xeb\xb1\x04wn*\xf2\xc6\x9d\xc4!\x9e?\x83\x99\x0e\xcc\xa3\x95q.C\xee\x8dIf\xec\xbf\xe8\xb2\t\xedg\x9d\xd9\v\xce\xa3\xa3\xa5\x89F\x03\xefQ\x89\f\xeeRK\x15\xec{D\x9e\x83Z\xabTa\x8e\xcd\x01\xd0\xcfd\xf9c\x87m\xbe>\x81\xba\x9d2\x1c\a,\x12\xbf\xef\xb8m\v\xdf\x8e\xd5\xf5\x1a\xabD\xf6\xe0\x95\xf4\xfeRb_+\xeb\xf9f\xe8\\\x16\xeb\x87\x8e\x8acn4,\x80Q<\x84\xaep\xf9\xfc\x8e\x9f\xed\x06.a\xd5o\x14\r&L\xbd\xb9g\x82;+n\xd5\xcca\v\x86Z\x872\xc3c:`\xf2\x02\xc2\x92\x841\xe7\xca}\"@6}j\x0e\xb7\xa9\xbc\xf3N\xa3\xf3mbd\xfbS\x80\xe0\x11<\x7f\x84\xbe\xa2\xf9\xf7\xee\xf6\x94x\x9d\xe2{\xc5\x83\xc0M\xbb\xd4Io\r\x1c\xd7<\xc0\x84=`\xf1^Y', 0x0, 0x0) 00:28:08 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000480)=@acquire={0x1ac, 0x17, 0x1, 0x0, 0x0, {{@in=@multicast1}, @in6=@ipv4={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x600], [], @dev}, {@in=@loopback, @in6=@local}, {{@in, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x2}}}, [@tmpl={0x84, 0x5, [{{@in6=@mcast1, 0x0, 0x3c}, 0x0, @in=@multicast1}, {{@in=@remote, 0x0, 0x3c}, 0x0, @in=@broadcast}]}]}, 0x1ac}}, 0x0) 00:28:08 executing program 1: syz_mount_image$reiserfs(&(0x7f0000000180)='%eiserfs\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[@ANYBLOB='jdev=.']) [ 878.388348][ T2480] block nbd2: Attempted send on invalid socket [ 878.394759][ T2480] print_req_error: I/O error, dev nbd2, sector 2 flags 0 [ 878.405880][ T3348] hfs: can't find a HFS filesystem on dev nbd2 00:28:08 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000180)='./control\x00', 0x0) get_thread_area(0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x3) write$binfmt_script(r0, &(0x7f0000000bc0)=ANY=[@ANYBLOB="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"], 0x145) close(r0) execve(&(0x7f0000000180)='./file0\x00', &(0x7f0000000140), &(0x7f0000000140)) r1 = open(&(0x7f0000000000)='./control\x00', 0x80, 0x10) statfs(&(0x7f0000000380)='./control\x00', &(0x7f00000003c0)=""/20) write$P9_RWALK(r0, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_RTOINFO(r1, 0x84, 0x0, &(0x7f0000000080)={0x0, 0x200, 0x2, 0xffffffff}, &(0x7f0000000100)=0x10) 00:28:08 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000480)=@acquire={0x1ac, 0x17, 0x1, 0x0, 0x0, {{@in=@multicast1}, @in6=@ipv4={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x805], [], @dev}, {@in=@loopback, @in6=@local}, {{@in, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x2}}}, [@tmpl={0x84, 0x5, [{{@in6=@mcast1, 0x0, 0x3c}, 0x0, @in=@multicast1}, {{@in=@remote, 0x0, 0x3c}, 0x0, @in=@broadcast}]}]}, 0x1ac}}, 0x0) 00:28:08 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00004e7000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f, 0x0, 0x4}, 0xc, &(0x7f0000000440)={&(0x7f00000001c0)=ANY=[@ANYBLOB="1c00000022000100000000000061960d0100000008fe0c009d0a6be0e6d9fc638f19561d6ceb8a6c9239228215fd206cf204e07953", @ANYRES32=0x0], 0x2}, 0x1, 0x0, 0x0, 0xffffffffffffffff}, 0x0) 00:28:08 executing program 2: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(&(0x7f0000000080)=@nbd={'/dev/nbd', 0x0, 0xe0a00}, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000240)='hfs\x00\xe6\xa6\xe2\x06g\x96\xb3\v\xf2p\xd5:\x95p\x99\x92\xf2\xc4\x80\x1f\x01\x05\xb8e?\xbfwk\xe4\xe5\xca\x82\xeb\xb1\x04wn*\xf2\xc6\x9d\xc4!\x9e?\x83\x99\x0e\xcc\xa3\x95q.C\xee\x8dIf\xec\xbf\xe8\xb2\t\xedg\x9d\xd9\v\xce\xa3\xa3\xa5\x89F\x03\xefQ\x89\f\xeeRK\x15\xec{D\x9e\x83Z\xabTa\x8e\xcd\x01\xd0\xcfd\xf9c\x87m\xbe>\x81\xba\x9d2\x1c\a,\x12\xbf\xef\xb8m\v\xdf\x8e\xd5\xf5\x1a\xabD\xf6\xe0\x95\xf4\xfeRb_+\xeb\xf9f\xe8\\\x16\xeb\x87\x8e\x8acn4,\x80Q<\x84\xaep\xf9\xfc\x8e\x9f\xed\x06.a\xd5o\x14\r&L\xbd\xb9g\x82;+n\xd5\xcca\v\x86Z\x872\xc3c:`\xf2\x02\xc2\x92\x841\xe7\xca}\"@6}j\x0e\xb7\xa9\xbc\xf3N\xa3\xf3mbd\xfbS\x80\xe0\x11<\x7f\x84\xbe\xa2\xf9\xf7\xee\xf6\x94x\x9d\xe2{\xc5\x83\xc0M\xbb\xd4Io\r\x1c\xd7<\xc0\x84=`\xf1^Y', 0x0, 0x0) 00:28:08 executing program 0: syz_mount_image$reiserfs(&(0x7f0000000180)='rei#erfs\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[@ANYBLOB='jdev=./file0,jdev=']) 00:28:08 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00004e7000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f, 0x0, 0x8}, 0xc, &(0x7f0000000440)={&(0x7f00000001c0)=ANY=[@ANYBLOB="1c00000022000100000000000061960d0100000008fe0c009d0a6be0e6d9fc638f19561d6ceb8a6c9239228215fd206cf204e07953", @ANYRES32=0x0], 0x2}, 0x1, 0x0, 0x0, 0xffffffffffffffff}, 0x0) 00:28:08 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000480)=@acquire={0x1ac, 0x17, 0x1, 0x0, 0x0, {{@in=@multicast1}, @in6=@ipv4={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x900], [], @dev}, {@in=@loopback, @in6=@local}, {{@in, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x2}}}, [@tmpl={0x84, 0x5, [{{@in6=@mcast1, 0x0, 0x3c}, 0x0, @in=@multicast1}, {{@in=@remote, 0x0, 0x3c}, 0x0, @in=@broadcast}]}]}, 0x1ac}}, 0x0) [ 878.675569][ T2481] block nbd2: Attempted send on invalid socket [ 878.681961][ T2481] print_req_error: I/O error, dev nbd2, sector 2 flags 0 [ 878.692945][ T3373] hfs: can't find a HFS filesystem on dev nbd2 00:28:08 executing program 2: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(&(0x7f0000000080)=@nbd={'/dev/nbd', 0x0, 0xe0c00}, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000240)='hfs\x00\xe6\xa6\xe2\x06g\x96\xb3\v\xf2p\xd5:\x95p\x99\x92\xf2\xc4\x80\x1f\x01\x05\xb8e?\xbfwk\xe4\xe5\xca\x82\xeb\xb1\x04wn*\xf2\xc6\x9d\xc4!\x9e?\x83\x99\x0e\xcc\xa3\x95q.C\xee\x8dIf\xec\xbf\xe8\xb2\t\xedg\x9d\xd9\v\xce\xa3\xa3\xa5\x89F\x03\xefQ\x89\f\xeeRK\x15\xec{D\x9e\x83Z\xabTa\x8e\xcd\x01\xd0\xcfd\xf9c\x87m\xbe>\x81\xba\x9d2\x1c\a,\x12\xbf\xef\xb8m\v\xdf\x8e\xd5\xf5\x1a\xabD\xf6\xe0\x95\xf4\xfeRb_+\xeb\xf9f\xe8\\\x16\xeb\x87\x8e\x8acn4,\x80Q<\x84\xaep\xf9\xfc\x8e\x9f\xed\x06.a\xd5o\x14\r&L\xbd\xb9g\x82;+n\xd5\xcca\v\x86Z\x872\xc3c:`\xf2\x02\xc2\x92\x841\xe7\xca}\"@6}j\x0e\xb7\xa9\xbc\xf3N\xa3\xf3mbd\xfbS\x80\xe0\x11<\x7f\x84\xbe\xa2\xf9\xf7\xee\xf6\x94x\x9d\xe2{\xc5\x83\xc0M\xbb\xd4Io\r\x1c\xd7<\xc0\x84=`\xf1^Y', 0x0, 0x0) 00:28:08 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000180)='./control\x00', 0x0) get_thread_area(0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x3) write$binfmt_script(r0, &(0x7f0000000bc0)=ANY=[@ANYBLOB="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"], 0x145) close(r0) execve(&(0x7f0000000180)='./file0\x00', &(0x7f0000000140), &(0x7f0000000140)) r1 = open(&(0x7f0000000000)='./control\x00', 0x80, 0x10) statfs(&(0x7f0000000380)='./control\x00', &(0x7f00000003c0)=""/20) write$P9_RWALK(r0, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_RTOINFO(r1, 0x84, 0x0, &(0x7f0000000080)={0x0, 0x200, 0x2, 0xffffffff}, &(0x7f0000000100)=0x10) 00:28:08 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00004e7000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f, 0x0, 0xa}, 0xc, &(0x7f0000000440)={&(0x7f00000001c0)=ANY=[@ANYBLOB="1c00000022000100000000000061960d0100000008fe0c009d0a6be0e6d9fc638f19561d6ceb8a6c9239228215fd206cf204e07953", @ANYRES32=0x0], 0x2}, 0x1, 0x0, 0x0, 0xffffffffffffffff}, 0x0) 00:28:08 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000480)=@acquire={0x1ac, 0x17, 0x1, 0x0, 0x0, {{@in=@multicast1}, @in6=@ipv4={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa00], [], @dev}, {@in=@loopback, @in6=@local}, {{@in, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x2}}}, [@tmpl={0x84, 0x5, [{{@in6=@mcast1, 0x0, 0x3c}, 0x0, @in=@multicast1}, {{@in=@remote, 0x0, 0x3c}, 0x0, @in=@broadcast}]}]}, 0x1ac}}, 0x0) [ 878.902427][ T2480] block nbd2: Attempted send on invalid socket [ 878.908666][ T2480] print_req_error: I/O error, dev nbd2, sector 2 flags 0 [ 878.923805][ T3395] hfs: can't find a HFS filesystem on dev nbd2 00:28:08 executing program 1: syz_mount_image$reiserfs(&(0x7f0000000180)='teiserfs\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[@ANYBLOB='jdev=.']) 00:28:08 executing program 2: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(&(0x7f0000000080)=@nbd={'/dev/nbd', 0x0, 0xe0e00}, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000240)='hfs\x00\xe6\xa6\xe2\x06g\x96\xb3\v\xf2p\xd5:\x95p\x99\x92\xf2\xc4\x80\x1f\x01\x05\xb8e?\xbfwk\xe4\xe5\xca\x82\xeb\xb1\x04wn*\xf2\xc6\x9d\xc4!\x9e?\x83\x99\x0e\xcc\xa3\x95q.C\xee\x8dIf\xec\xbf\xe8\xb2\t\xedg\x9d\xd9\v\xce\xa3\xa3\xa5\x89F\x03\xefQ\x89\f\xeeRK\x15\xec{D\x9e\x83Z\xabTa\x8e\xcd\x01\xd0\xcfd\xf9c\x87m\xbe>\x81\xba\x9d2\x1c\a,\x12\xbf\xef\xb8m\v\xdf\x8e\xd5\xf5\x1a\xabD\xf6\xe0\x95\xf4\xfeRb_+\xeb\xf9f\xe8\\\x16\xeb\x87\x8e\x8acn4,\x80Q<\x84\xaep\xf9\xfc\x8e\x9f\xed\x06.a\xd5o\x14\r&L\xbd\xb9g\x82;+n\xd5\xcca\v\x86Z\x872\xc3c:`\xf2\x02\xc2\x92\x841\xe7\xca}\"@6}j\x0e\xb7\xa9\xbc\xf3N\xa3\xf3mbd\xfbS\x80\xe0\x11<\x7f\x84\xbe\xa2\xf9\xf7\xee\xf6\x94x\x9d\xe2{\xc5\x83\xc0M\xbb\xd4Io\r\x1c\xd7<\xc0\x84=`\xf1^Y', 0x0, 0x0) 00:28:08 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000480)=@acquire={0x1ac, 0x17, 0x1, 0x0, 0x0, {{@in=@multicast1}, @in6=@ipv4={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb00], [], @dev}, {@in=@loopback, @in6=@local}, {{@in, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x2}}}, [@tmpl={0x84, 0x5, [{{@in6=@mcast1, 0x0, 0x3c}, 0x0, @in=@multicast1}, {{@in=@remote, 0x0, 0x3c}, 0x0, @in=@broadcast}]}]}, 0x1ac}}, 0x0) 00:28:08 executing program 0: syz_mount_image$reiserfs(&(0x7f0000000180)='rei%erfs\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[@ANYBLOB='jdev=./file0,jdev=']) 00:28:08 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000180)='./control\x00', 0x0) get_thread_area(0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x3) write$binfmt_script(r0, &(0x7f0000000bc0)=ANY=[@ANYBLOB="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"], 0x145) close(r0) execve(&(0x7f0000000180)='./file0\x00', &(0x7f0000000140), &(0x7f0000000140)) r1 = open(&(0x7f0000000000)='./control\x00', 0x80, 0x10) statfs(&(0x7f0000000380)='./control\x00', &(0x7f00000003c0)=""/20) write$P9_RWALK(r0, &(0x7f0000000400)=ANY=[], 0x0) getsockopt$inet_sctp6_SCTP_RTOINFO(r1, 0x84, 0x0, &(0x7f0000000080)={0x0, 0x200, 0x2, 0xffffffff}, &(0x7f0000000100)=0x10) 00:28:08 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00004e7000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f, 0x0, 0xe}, 0xc, &(0x7f0000000440)={&(0x7f00000001c0)=ANY=[@ANYBLOB="1c00000022000100000000000061960d0100000008fe0c009d0a6be0e6d9fc638f19561d6ceb8a6c9239228215fd206cf204e07953", @ANYRES32=0x0], 0x2}, 0x1, 0x0, 0x0, 0xffffffffffffffff}, 0x0) [ 879.225646][ T2481] block nbd2: Attempted send on invalid socket [ 879.231917][ T2481] print_req_error: I/O error, dev nbd2, sector 2 flags 0 [ 879.258743][ T3425] hfs: can't find a HFS filesystem on dev nbd2 00:28:09 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000480)=@acquire={0x1ac, 0x17, 0x1, 0x0, 0x0, {{@in=@multicast1}, @in6=@ipv4={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe00], [], @dev}, {@in=@loopback, @in6=@local}, {{@in, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x2}}}, [@tmpl={0x84, 0x5, [{{@in6=@mcast1, 0x0, 0x3c}, 0x0, @in=@multicast1}, {{@in=@remote, 0x0, 0x3c}, 0x0, @in=@broadcast}]}]}, 0x1ac}}, 0x0) 00:28:09 executing program 2: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(&(0x7f0000000080)=@nbd={'/dev/nbd', 0x0, 0xe1020}, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000240)='hfs\x00\xe6\xa6\xe2\x06g\x96\xb3\v\xf2p\xd5:\x95p\x99\x92\xf2\xc4\x80\x1f\x01\x05\xb8e?\xbfwk\xe4\xe5\xca\x82\xeb\xb1\x04wn*\xf2\xc6\x9d\xc4!\x9e?\x83\x99\x0e\xcc\xa3\x95q.C\xee\x8dIf\xec\xbf\xe8\xb2\t\xedg\x9d\xd9\v\xce\xa3\xa3\xa5\x89F\x03\xefQ\x89\f\xeeRK\x15\xec{D\x9e\x83Z\xabTa\x8e\xcd\x01\xd0\xcfd\xf9c\x87m\xbe>\x81\xba\x9d2\x1c\a,\x12\xbf\xef\xb8m\v\xdf\x8e\xd5\xf5\x1a\xabD\xf6\xe0\x95\xf4\xfeRb_+\xeb\xf9f\xe8\\\x16\xeb\x87\x8e\x8acn4,\x80Q<\x84\xaep\xf9\xfc\x8e\x9f\xed\x06.a\xd5o\x14\r&L\xbd\xb9g\x82;+n\xd5\xcca\v\x86Z\x872\xc3c:`\xf2\x02\xc2\x92\x841\xe7\xca}\"@6}j\x0e\xb7\xa9\xbc\xf3N\xa3\xf3mbd\xfbS\x80\xe0\x11<\x7f\x84\xbe\xa2\xf9\xf7\xee\xf6\x94x\x9d\xe2{\xc5\x83\xc0M\xbb\xd4Io\r\x1c\xd7<\xc0\x84=`\xf1^Y', 0x0, 0x0) 00:28:09 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00004e7000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f, 0x0, 0x10}, 0xc, &(0x7f0000000440)={&(0x7f00000001c0)=ANY=[@ANYBLOB="1c00000022000100000000000061960d0100000008fe0c009d0a6be0e6d9fc638f19561d6ceb8a6c9239228215fd206cf204e07953", @ANYRES32=0x0], 0x2}, 0x1, 0x0, 0x0, 0xffffffffffffffff}, 0x0) 00:28:09 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000480)=@acquire={0x1ac, 0x17, 0x1, 0x0, 0x0, {{@in=@multicast1}, @in6=@ipv4={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf00], [], @dev}, {@in=@loopback, @in6=@local}, {{@in, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x2}}}, [@tmpl={0x84, 0x5, [{{@in6=@mcast1, 0x0, 0x3c}, 0x0, @in=@multicast1}, {{@in=@remote, 0x0, 0x3c}, 0x0, @in=@broadcast}]}]}, 0x1ac}}, 0x0) 00:28:09 executing program 2: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(&(0x7f0000000080)=@nbd={'/dev/nbd', 0x0, 0xe1200}, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000240)='hfs\x00\xe6\xa6\xe2\x06g\x96\xb3\v\xf2p\xd5:\x95p\x99\x92\xf2\xc4\x80\x1f\x01\x05\xb8e?\xbfwk\xe4\xe5\xca\x82\xeb\xb1\x04wn*\xf2\xc6\x9d\xc4!\x9e?\x83\x99\x0e\xcc\xa3\x95q.C\xee\x8dIf\xec\xbf\xe8\xb2\t\xedg\x9d\xd9\v\xce\xa3\xa3\xa5\x89F\x03\xefQ\x89\f\xeeRK\x15\xec{D\x9e\x83Z\xabTa\x8e\xcd\x01\xd0\xcfd\xf9c\x87m\xbe>\x81\xba\x9d2\x1c\a,\x12\xbf\xef\xb8m\v\xdf\x8e\xd5\xf5\x1a\xabD\xf6\xe0\x95\xf4\xfeRb_+\xeb\xf9f\xe8\\\x16\xeb\x87\x8e\x8acn4,\x80Q<\x84\xaep\xf9\xfc\x8e\x9f\xed\x06.a\xd5o\x14\r&L\xbd\xb9g\x82;+n\xd5\xcca\v\x86Z\x872\xc3c:`\xf2\x02\xc2\x92\x841\xe7\xca}\"@6}j\x0e\xb7\xa9\xbc\xf3N\xa3\xf3mbd\xfbS\x80\xe0\x11<\x7f\x84\xbe\xa2\xf9\xf7\xee\xf6\x94x\x9d\xe2{\xc5\x83\xc0M\xbb\xd4Io\r\x1c\xd7<\xc0\x84=`\xf1^Y', 0x0, 0x0) 00:28:09 executing program 0: syz_mount_image$reiserfs(&(0x7f0000000180)='rei*erfs\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[@ANYBLOB='jdev=./file0,jdev=']) 00:28:09 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000480)=@acquire={0x1ac, 0x17, 0x1, 0x0, 0x0, {{@in=@multicast1}, @in6=@ipv4={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1100], [], @dev}, {@in=@loopback, @in6=@local}, {{@in, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x2}}}, [@tmpl={0x84, 0x5, [{{@in6=@mcast1, 0x0, 0x3c}, 0x0, @in=@multicast1}, {{@in=@remote, 0x0, 0x3c}, 0x0, @in=@broadcast}]}]}, 0x1ac}}, 0x0) 00:28:09 executing program 1: syz_mount_image$reiserfs(&(0x7f0000000180)='r\niserfs\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[@ANYBLOB='jdev=.']) 00:28:09 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000180)='./control\x00', 0x0) get_thread_area(0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x3) write$binfmt_script(r0, &(0x7f0000000bc0)=ANY=[@ANYBLOB="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"], 0x145) close(r0) execve(&(0x7f0000000180)='./file0\x00', &(0x7f0000000140), &(0x7f0000000140)) r1 = open(&(0x7f0000000000)='./control\x00', 0x80, 0x10) statfs(&(0x7f0000000380)='./control\x00', &(0x7f00000003c0)=""/20) write$P9_RWALK(r0, &(0x7f0000000400)=ANY=[], 0x0) getsockopt$inet_sctp6_SCTP_RTOINFO(r1, 0x84, 0x0, &(0x7f0000000080)={0x0, 0x200, 0x2, 0xffffffff}, &(0x7f0000000100)=0x10) 00:28:09 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00004e7000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f, 0x0, 0x60}, 0xc, &(0x7f0000000440)={&(0x7f00000001c0)=ANY=[@ANYBLOB="1c00000022000100000000000061960d0100000008fe0c009d0a6be0e6d9fc638f19561d6ceb8a6c9239228215fd206cf204e07953", @ANYRES32=0x0], 0x2}, 0x1, 0x0, 0x0, 0xffffffffffffffff}, 0x0) 00:28:09 executing program 2: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(&(0x7f0000000080)=@nbd={'/dev/nbd', 0x0, 0xe1400}, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000240)='hfs\x00\xe6\xa6\xe2\x06g\x96\xb3\v\xf2p\xd5:\x95p\x99\x92\xf2\xc4\x80\x1f\x01\x05\xb8e?\xbfwk\xe4\xe5\xca\x82\xeb\xb1\x04wn*\xf2\xc6\x9d\xc4!\x9e?\x83\x99\x0e\xcc\xa3\x95q.C\xee\x8dIf\xec\xbf\xe8\xb2\t\xedg\x9d\xd9\v\xce\xa3\xa3\xa5\x89F\x03\xefQ\x89\f\xeeRK\x15\xec{D\x9e\x83Z\xabTa\x8e\xcd\x01\xd0\xcfd\xf9c\x87m\xbe>\x81\xba\x9d2\x1c\a,\x12\xbf\xef\xb8m\v\xdf\x8e\xd5\xf5\x1a\xabD\xf6\xe0\x95\xf4\xfeRb_+\xeb\xf9f\xe8\\\x16\xeb\x87\x8e\x8acn4,\x80Q<\x84\xaep\xf9\xfc\x8e\x9f\xed\x06.a\xd5o\x14\r&L\xbd\xb9g\x82;+n\xd5\xcca\v\x86Z\x872\xc3c:`\xf2\x02\xc2\x92\x841\xe7\xca}\"@6}j\x0e\xb7\xa9\xbc\xf3N\xa3\xf3mbd\xfbS\x80\xe0\x11<\x7f\x84\xbe\xa2\xf9\xf7\xee\xf6\x94x\x9d\xe2{\xc5\x83\xc0M\xbb\xd4Io\r\x1c\xd7<\xc0\x84=`\xf1^Y', 0x0, 0x0) [ 879.781280][ T2481] block nbd2: Attempted send on invalid socket [ 879.787503][ T2481] print_req_error: I/O error, dev nbd2, sector 2 flags 0 [ 879.795728][ T3457] hfs: can't find a HFS filesystem on dev nbd2 00:28:09 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000480)=@acquire={0x1ac, 0x17, 0x1, 0x0, 0x0, {{@in=@multicast1}, @in6=@ipv4={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1200], [], @dev}, {@in=@loopback, @in6=@local}, {{@in, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x2}}}, [@tmpl={0x84, 0x5, [{{@in6=@mcast1, 0x0, 0x3c}, 0x0, @in=@multicast1}, {{@in=@remote, 0x0, 0x3c}, 0x0, @in=@broadcast}]}]}, 0x1ac}}, 0x0) [ 880.050956][ T2480] block nbd2: Attempted send on invalid socket [ 880.057324][ T2480] print_req_error: I/O error, dev nbd2, sector 2 flags 0 [ 880.069163][ T3480] hfs: can't find a HFS filesystem on dev nbd2 00:28:09 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00004e7000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f, 0x0, 0xf0}, 0xc, &(0x7f0000000440)={&(0x7f00000001c0)=ANY=[@ANYBLOB="1c00000022000100000000000061960d0100000008fe0c009d0a6be0e6d9fc638f19561d6ceb8a6c9239228215fd206cf204e07953", @ANYRES32=0x0], 0x2}, 0x1, 0x0, 0x0, 0xffffffffffffffff}, 0x0) 00:28:09 executing program 2: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(&(0x7f0000000080)=@nbd={'/dev/nbd', 0x0, 0xe1a03}, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000240)='hfs\x00\xe6\xa6\xe2\x06g\x96\xb3\v\xf2p\xd5:\x95p\x99\x92\xf2\xc4\x80\x1f\x01\x05\xb8e?\xbfwk\xe4\xe5\xca\x82\xeb\xb1\x04wn*\xf2\xc6\x9d\xc4!\x9e?\x83\x99\x0e\xcc\xa3\x95q.C\xee\x8dIf\xec\xbf\xe8\xb2\t\xedg\x9d\xd9\v\xce\xa3\xa3\xa5\x89F\x03\xefQ\x89\f\xeeRK\x15\xec{D\x9e\x83Z\xabTa\x8e\xcd\x01\xd0\xcfd\xf9c\x87m\xbe>\x81\xba\x9d2\x1c\a,\x12\xbf\xef\xb8m\v\xdf\x8e\xd5\xf5\x1a\xabD\xf6\xe0\x95\xf4\xfeRb_+\xeb\xf9f\xe8\\\x16\xeb\x87\x8e\x8acn4,\x80Q<\x84\xaep\xf9\xfc\x8e\x9f\xed\x06.a\xd5o\x14\r&L\xbd\xb9g\x82;+n\xd5\xcca\v\x86Z\x872\xc3c:`\xf2\x02\xc2\x92\x841\xe7\xca}\"@6}j\x0e\xb7\xa9\xbc\xf3N\xa3\xf3mbd\xfbS\x80\xe0\x11<\x7f\x84\xbe\xa2\xf9\xf7\xee\xf6\x94x\x9d\xe2{\xc5\x83\xc0M\xbb\xd4Io\r\x1c\xd7<\xc0\x84=`\xf1^Y', 0x0, 0x0) 00:28:10 executing program 0: syz_mount_image$reiserfs(&(0x7f0000000180)='rei+erfs\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[@ANYBLOB='jdev=./file0,jdev=']) 00:28:10 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000480)=@acquire={0x1ac, 0x17, 0x1, 0x0, 0x0, {{@in=@multicast1}, @in6=@ipv4={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1300], [], @dev}, {@in=@loopback, @in6=@local}, {{@in, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x2}}}, [@tmpl={0x84, 0x5, [{{@in6=@mcast1, 0x0, 0x3c}, 0x0, @in=@multicast1}, {{@in=@remote, 0x0, 0x3c}, 0x0, @in=@broadcast}]}]}, 0x1ac}}, 0x0) 00:28:10 executing program 2: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(&(0x7f0000000080)=@nbd={'/dev/nbd', 0x0, 0xe2000}, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000240)='hfs\x00\xe6\xa6\xe2\x06g\x96\xb3\v\xf2p\xd5:\x95p\x99\x92\xf2\xc4\x80\x1f\x01\x05\xb8e?\xbfwk\xe4\xe5\xca\x82\xeb\xb1\x04wn*\xf2\xc6\x9d\xc4!\x9e?\x83\x99\x0e\xcc\xa3\x95q.C\xee\x8dIf\xec\xbf\xe8\xb2\t\xedg\x9d\xd9\v\xce\xa3\xa3\xa5\x89F\x03\xefQ\x89\f\xeeRK\x15\xec{D\x9e\x83Z\xabTa\x8e\xcd\x01\xd0\xcfd\xf9c\x87m\xbe>\x81\xba\x9d2\x1c\a,\x12\xbf\xef\xb8m\v\xdf\x8e\xd5\xf5\x1a\xabD\xf6\xe0\x95\xf4\xfeRb_+\xeb\xf9f\xe8\\\x16\xeb\x87\x8e\x8acn4,\x80Q<\x84\xaep\xf9\xfc\x8e\x9f\xed\x06.a\xd5o\x14\r&L\xbd\xb9g\x82;+n\xd5\xcca\v\x86Z\x872\xc3c:`\xf2\x02\xc2\x92\x841\xe7\xca}\"@6}j\x0e\xb7\xa9\xbc\xf3N\xa3\xf3mbd\xfbS\x80\xe0\x11<\x7f\x84\xbe\xa2\xf9\xf7\xee\xf6\x94x\x9d\xe2{\xc5\x83\xc0M\xbb\xd4Io\r\x1c\xd7<\xc0\x84=`\xf1^Y', 0x0, 0x0) 00:28:10 executing program 1: syz_mount_image$reiserfs(&(0x7f0000000180)='r%iserfs\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[@ANYBLOB='jdev=.']) 00:28:10 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000180)='./control\x00', 0x0) get_thread_area(0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x3) write$binfmt_script(r0, &(0x7f0000000bc0)=ANY=[@ANYBLOB="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"], 0x145) close(r0) execve(&(0x7f0000000180)='./file0\x00', &(0x7f0000000140), &(0x7f0000000140)) r1 = open(&(0x7f0000000000)='./control\x00', 0x80, 0x10) statfs(&(0x7f0000000380)='./control\x00', &(0x7f00000003c0)=""/20) write$P9_RWALK(r0, &(0x7f0000000400)=ANY=[], 0x0) getsockopt$inet_sctp6_SCTP_RTOINFO(r1, 0x84, 0x0, &(0x7f0000000080)={0x0, 0x200, 0x2, 0xffffffff}, &(0x7f0000000100)=0x10) 00:28:10 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00004e7000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f, 0x0, 0xa00}, 0xc, &(0x7f0000000440)={&(0x7f00000001c0)=ANY=[@ANYBLOB="1c00000022000100000000000061960d0100000008fe0c009d0a6be0e6d9fc638f19561d6ceb8a6c9239228215fd206cf204e07953", @ANYRES32=0x0], 0x2}, 0x1, 0x0, 0x0, 0xffffffffffffffff}, 0x0) [ 880.522974][ T2481] block nbd2: Attempted send on invalid socket [ 880.529236][ T2481] print_req_error: I/O error, dev nbd2, sector 2 flags 0 [ 880.541135][ T3504] hfs: can't find a HFS filesystem on dev nbd2 00:28:10 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000480)=@acquire={0x1ac, 0x17, 0x1, 0x0, 0x0, {{@in=@multicast1}, @in6=@ipv4={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000], [], @dev}, {@in=@loopback, @in6=@local}, {{@in, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x2}}}, [@tmpl={0x84, 0x5, [{{@in6=@mcast1, 0x0, 0x3c}, 0x0, @in=@multicast1}, {{@in=@remote, 0x0, 0x3c}, 0x0, @in=@broadcast}]}]}, 0x1ac}}, 0x0) 00:28:10 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000480)=@acquire={0x1ac, 0x17, 0x1, 0x0, 0x0, {{@in=@multicast1}, @in6=@ipv4={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6000], [], @dev}, {@in=@loopback, @in6=@local}, {{@in, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x2}}}, [@tmpl={0x84, 0x5, [{{@in6=@mcast1, 0x0, 0x3c}, 0x0, @in=@multicast1}, {{@in=@remote, 0x0, 0x3c}, 0x0, @in=@broadcast}]}]}, 0x1ac}}, 0x0) 00:28:10 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000180)='./control\x00', 0x0) get_thread_area(0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x3) write$binfmt_script(r0, &(0x7f0000000bc0)=ANY=[@ANYBLOB="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"], 0x145) close(r0) execve(&(0x7f0000000180)='./file0\x00', &(0x7f0000000140), &(0x7f0000000140)) r1 = open(&(0x7f0000000000)='./control\x00', 0x80, 0x10) statfs(&(0x7f0000000380)='./control\x00', &(0x7f00000003c0)=""/20) write$P9_RWALK(r0, &(0x7f0000000400)=ANY=[@ANYBLOB], 0x0) getsockopt$inet_sctp6_SCTP_RTOINFO(r1, 0x84, 0x0, &(0x7f0000000080)={0x0, 0x200, 0x2, 0xffffffff}, &(0x7f0000000100)=0x10) 00:28:10 executing program 2: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(&(0x7f0000000080)=@nbd={'/dev/nbd', 0x0, 0xe2010}, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000240)='hfs\x00\xe6\xa6\xe2\x06g\x96\xb3\v\xf2p\xd5:\x95p\x99\x92\xf2\xc4\x80\x1f\x01\x05\xb8e?\xbfwk\xe4\xe5\xca\x82\xeb\xb1\x04wn*\xf2\xc6\x9d\xc4!\x9e?\x83\x99\x0e\xcc\xa3\x95q.C\xee\x8dIf\xec\xbf\xe8\xb2\t\xedg\x9d\xd9\v\xce\xa3\xa3\xa5\x89F\x03\xefQ\x89\f\xeeRK\x15\xec{D\x9e\x83Z\xabTa\x8e\xcd\x01\xd0\xcfd\xf9c\x87m\xbe>\x81\xba\x9d2\x1c\a,\x12\xbf\xef\xb8m\v\xdf\x8e\xd5\xf5\x1a\xabD\xf6\xe0\x95\xf4\xfeRb_+\xeb\xf9f\xe8\\\x16\xeb\x87\x8e\x8acn4,\x80Q<\x84\xaep\xf9\xfc\x8e\x9f\xed\x06.a\xd5o\x14\r&L\xbd\xb9g\x82;+n\xd5\xcca\v\x86Z\x872\xc3c:`\xf2\x02\xc2\x92\x841\xe7\xca}\"@6}j\x0e\xb7\xa9\xbc\xf3N\xa3\xf3mbd\xfbS\x80\xe0\x11<\x7f\x84\xbe\xa2\xf9\xf7\xee\xf6\x94x\x9d\xe2{\xc5\x83\xc0M\xbb\xd4Io\r\x1c\xd7<\xc0\x84=`\xf1^Y', 0x0, 0x0) 00:28:10 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00004e7000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f, 0x0, 0xab0}, 0xc, &(0x7f0000000440)={&(0x7f00000001c0)=ANY=[@ANYBLOB="1c00000022000100000000000061960d0100000008fe0c009d0a6be0e6d9fc638f19561d6ceb8a6c9239228215fd206cf204e07953", @ANYRES32=0x0], 0x2}, 0x1, 0x0, 0x0, 0xffffffffffffffff}, 0x0) 00:28:10 executing program 1: syz_mount_image$reiserfs(&(0x7f0000000180)='rtiserfs\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[@ANYBLOB='jdev=.']) 00:28:10 executing program 0: syz_mount_image$reiserfs(&(0x7f0000000180)='rei-erfs\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[@ANYBLOB='jdev=./file0,jdev=']) 00:28:10 executing program 2: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(&(0x7f0000000080)=@nbd={'/dev/nbd', 0x0, 0xe2300}, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000240)='hfs\x00\xe6\xa6\xe2\x06g\x96\xb3\v\xf2p\xd5:\x95p\x99\x92\xf2\xc4\x80\x1f\x01\x05\xb8e?\xbfwk\xe4\xe5\xca\x82\xeb\xb1\x04wn*\xf2\xc6\x9d\xc4!\x9e?\x83\x99\x0e\xcc\xa3\x95q.C\xee\x8dIf\xec\xbf\xe8\xb2\t\xedg\x9d\xd9\v\xce\xa3\xa3\xa5\x89F\x03\xefQ\x89\f\xeeRK\x15\xec{D\x9e\x83Z\xabTa\x8e\xcd\x01\xd0\xcfd\xf9c\x87m\xbe>\x81\xba\x9d2\x1c\a,\x12\xbf\xef\xb8m\v\xdf\x8e\xd5\xf5\x1a\xabD\xf6\xe0\x95\xf4\xfeRb_+\xeb\xf9f\xe8\\\x16\xeb\x87\x8e\x8acn4,\x80Q<\x84\xaep\xf9\xfc\x8e\x9f\xed\x06.a\xd5o\x14\r&L\xbd\xb9g\x82;+n\xd5\xcca\v\x86Z\x872\xc3c:`\xf2\x02\xc2\x92\x841\xe7\xca}\"@6}j\x0e\xb7\xa9\xbc\xf3N\xa3\xf3mbd\xfbS\x80\xe0\x11<\x7f\x84\xbe\xa2\xf9\xf7\xee\xf6\x94x\x9d\xe2{\xc5\x83\xc0M\xbb\xd4Io\r\x1c\xd7<\xc0\x84=`\xf1^Y', 0x0, 0x0) 00:28:10 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00004e7000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f, 0x0, 0xe00}, 0xc, &(0x7f0000000440)={&(0x7f00000001c0)=ANY=[@ANYBLOB="1c00000022000100000000000061960d0100000008fe0c009d0a6be0e6d9fc638f19561d6ceb8a6c9239228215fd206cf204e07953", @ANYRES32=0x0], 0x2}, 0x1, 0x0, 0x0, 0xffffffffffffffff}, 0x0) 00:28:10 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000480)=@acquire={0x1ac, 0x17, 0x1, 0x0, 0x0, {{@in=@multicast1}, @in6=@ipv4={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf000], [], @dev}, {@in=@loopback, @in6=@local}, {{@in, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x2}}}, [@tmpl={0x84, 0x5, [{{@in6=@mcast1, 0x0, 0x3c}, 0x0, @in=@multicast1}, {{@in=@remote, 0x0, 0x3c}, 0x0, @in=@broadcast}]}]}, 0x1ac}}, 0x0) [ 881.107357][ T2481] block nbd2: Attempted send on invalid socket [ 881.113907][ T2481] print_req_error: I/O error, dev nbd2, sector 2 flags 0 [ 881.121483][ T3559] hfs: can't find a HFS filesystem on dev nbd2 00:28:10 executing program 1: syz_mount_image$reiserfs(&(0x7f0000000180)='re\nserfs\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[@ANYBLOB='jdev=.']) 00:28:10 executing program 2: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(&(0x7f0000000080)=@nbd={'/dev/nbd', 0x0, 0xe2400}, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000240)='hfs\x00\xe6\xa6\xe2\x06g\x96\xb3\v\xf2p\xd5:\x95p\x99\x92\xf2\xc4\x80\x1f\x01\x05\xb8e?\xbfwk\xe4\xe5\xca\x82\xeb\xb1\x04wn*\xf2\xc6\x9d\xc4!\x9e?\x83\x99\x0e\xcc\xa3\x95q.C\xee\x8dIf\xec\xbf\xe8\xb2\t\xedg\x9d\xd9\v\xce\xa3\xa3\xa5\x89F\x03\xefQ\x89\f\xeeRK\x15\xec{D\x9e\x83Z\xabTa\x8e\xcd\x01\xd0\xcfd\xf9c\x87m\xbe>\x81\xba\x9d2\x1c\a,\x12\xbf\xef\xb8m\v\xdf\x8e\xd5\xf5\x1a\xabD\xf6\xe0\x95\xf4\xfeRb_+\xeb\xf9f\xe8\\\x16\xeb\x87\x8e\x8acn4,\x80Q<\x84\xaep\xf9\xfc\x8e\x9f\xed\x06.a\xd5o\x14\r&L\xbd\xb9g\x82;+n\xd5\xcca\v\x86Z\x872\xc3c:`\xf2\x02\xc2\x92\x841\xe7\xca}\"@6}j\x0e\xb7\xa9\xbc\xf3N\xa3\xf3mbd\xfbS\x80\xe0\x11<\x7f\x84\xbe\xa2\xf9\xf7\xee\xf6\x94x\x9d\xe2{\xc5\x83\xc0M\xbb\xd4Io\r\x1c\xd7<\xc0\x84=`\xf1^Y', 0x0, 0x0) 00:28:11 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000180)='./control\x00', 0x0) get_thread_area(0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x3) write$binfmt_script(r0, &(0x7f0000000bc0)=ANY=[@ANYBLOB="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"], 0x145) close(r0) execve(&(0x7f0000000180)='./file0\x00', &(0x7f0000000140), &(0x7f0000000140)) r1 = open(&(0x7f0000000000)='./control\x00', 0x80, 0x10) statfs(&(0x7f0000000380)='./control\x00', &(0x7f00000003c0)=""/20) write$P9_RWALK(r0, &(0x7f0000000400)=ANY=[@ANYBLOB], 0x0) getsockopt$inet_sctp6_SCTP_RTOINFO(r1, 0x84, 0x0, &(0x7f0000000080)={0x0, 0x200, 0x2, 0xffffffff}, &(0x7f0000000100)=0x10) 00:28:11 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000480)=@acquire={0x1ac, 0x17, 0x1, 0x0, 0x0, {{@in=@multicast1}, @in6=@ipv4={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf0ffff], [], @dev}, {@in=@loopback, @in6=@local}, {{@in, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x2}}}, [@tmpl={0x84, 0x5, [{{@in6=@mcast1, 0x0, 0x3c}, 0x0, @in=@multicast1}, {{@in=@remote, 0x0, 0x3c}, 0x0, @in=@broadcast}]}]}, 0x1ac}}, 0x0) 00:28:11 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00004e7000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f, 0x0, 0x6000}, 0xc, &(0x7f0000000440)={&(0x7f00000001c0)=ANY=[@ANYBLOB="1c00000022000100000000000061960d0100000008fe0c009d0a6be0e6d9fc638f19561d6ceb8a6c9239228215fd206cf204e07953", @ANYRES32=0x0], 0x2}, 0x1, 0x0, 0x0, 0xffffffffffffffff}, 0x0) 00:28:11 executing program 0: syz_mount_image$reiserfs(&(0x7f0000000180)='rei.erfs\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[@ANYBLOB='jdev=./file0,jdev=']) [ 881.474383][ T2481] block nbd2: Attempted send on invalid socket [ 881.480748][ T2481] print_req_error: I/O error, dev nbd2, sector 2 flags 0 [ 881.490342][ T3587] hfs: can't find a HFS filesystem on dev nbd2 00:28:11 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000480)=@acquire={0x1ac, 0x17, 0x1, 0x0, 0x0, {{@in=@multicast1}, @in6=@ipv4={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000], [], @dev}, {@in=@loopback, @in6=@local}, {{@in, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x2}}}, [@tmpl={0x84, 0x5, [{{@in6=@mcast1, 0x0, 0x3c}, 0x0, @in=@multicast1}, {{@in=@remote, 0x0, 0x3c}, 0x0, @in=@broadcast}]}]}, 0x1ac}}, 0x0) 00:28:11 executing program 2: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(&(0x7f0000000080)=@nbd={'/dev/nbd', 0x0, 0xe2c00}, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000240)='hfs\x00\xe6\xa6\xe2\x06g\x96\xb3\v\xf2p\xd5:\x95p\x99\x92\xf2\xc4\x80\x1f\x01\x05\xb8e?\xbfwk\xe4\xe5\xca\x82\xeb\xb1\x04wn*\xf2\xc6\x9d\xc4!\x9e?\x83\x99\x0e\xcc\xa3\x95q.C\xee\x8dIf\xec\xbf\xe8\xb2\t\xedg\x9d\xd9\v\xce\xa3\xa3\xa5\x89F\x03\xefQ\x89\f\xeeRK\x15\xec{D\x9e\x83Z\xabTa\x8e\xcd\x01\xd0\xcfd\xf9c\x87m\xbe>\x81\xba\x9d2\x1c\a,\x12\xbf\xef\xb8m\v\xdf\x8e\xd5\xf5\x1a\xabD\xf6\xe0\x95\xf4\xfeRb_+\xeb\xf9f\xe8\\\x16\xeb\x87\x8e\x8acn4,\x80Q<\x84\xaep\xf9\xfc\x8e\x9f\xed\x06.a\xd5o\x14\r&L\xbd\xb9g\x82;+n\xd5\xcca\v\x86Z\x872\xc3c:`\xf2\x02\xc2\x92\x841\xe7\xca}\"@6}j\x0e\xb7\xa9\xbc\xf3N\xa3\xf3mbd\xfbS\x80\xe0\x11<\x7f\x84\xbe\xa2\xf9\xf7\xee\xf6\x94x\x9d\xe2{\xc5\x83\xc0M\xbb\xd4Io\r\x1c\xd7<\xc0\x84=`\xf1^Y', 0x0, 0x0) 00:28:11 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00004e7000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f, 0x0, 0xb00a}, 0xc, &(0x7f0000000440)={&(0x7f00000001c0)=ANY=[@ANYBLOB="1c00000022000100000000000061960d0100000008fe0c009d0a6be0e6d9fc638f19561d6ceb8a6c9239228215fd206cf204e07953", @ANYRES32=0x0], 0x2}, 0x1, 0x0, 0x0, 0xffffffffffffffff}, 0x0) [ 881.700515][ T3596] hfs: can't find a HFS filesystem on dev nbd2 00:28:11 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000480)=@acquire={0x1ac, 0x17, 0x1, 0x0, 0x0, {{@in=@multicast1}, @in6=@ipv4={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000], [], @dev}, {@in=@loopback, @in6=@local}, {{@in, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x2}}}, [@tmpl={0x84, 0x5, [{{@in6=@mcast1, 0x0, 0x3c}, 0x0, @in=@multicast1}, {{@in=@remote, 0x0, 0x3c}, 0x0, @in=@broadcast}]}]}, 0x1ac}}, 0x0) 00:28:11 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000180)='./control\x00', 0x0) get_thread_area(0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x3) write$binfmt_script(r0, &(0x7f0000000bc0)=ANY=[@ANYBLOB="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"], 0x145) close(r0) execve(&(0x7f0000000180)='./file0\x00', &(0x7f0000000140), &(0x7f0000000140)) r1 = open(&(0x7f0000000000)='./control\x00', 0x80, 0x10) statfs(&(0x7f0000000380)='./control\x00', &(0x7f00000003c0)=""/20) write$P9_RWALK(r0, &(0x7f0000000400)=ANY=[@ANYBLOB], 0x0) getsockopt$inet_sctp6_SCTP_RTOINFO(r1, 0x84, 0x0, &(0x7f0000000080)={0x0, 0x200, 0x2, 0xffffffff}, &(0x7f0000000100)=0x10) 00:28:11 executing program 2: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(&(0x7f0000000080)=@nbd={'/dev/nbd', 0x0, 0xe3202}, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000240)='hfs\x00\xe6\xa6\xe2\x06g\x96\xb3\v\xf2p\xd5:\x95p\x99\x92\xf2\xc4\x80\x1f\x01\x05\xb8e?\xbfwk\xe4\xe5\xca\x82\xeb\xb1\x04wn*\xf2\xc6\x9d\xc4!\x9e?\x83\x99\x0e\xcc\xa3\x95q.C\xee\x8dIf\xec\xbf\xe8\xb2\t\xedg\x9d\xd9\v\xce\xa3\xa3\xa5\x89F\x03\xefQ\x89\f\xeeRK\x15\xec{D\x9e\x83Z\xabTa\x8e\xcd\x01\xd0\xcfd\xf9c\x87m\xbe>\x81\xba\x9d2\x1c\a,\x12\xbf\xef\xb8m\v\xdf\x8e\xd5\xf5\x1a\xabD\xf6\xe0\x95\xf4\xfeRb_+\xeb\xf9f\xe8\\\x16\xeb\x87\x8e\x8acn4,\x80Q<\x84\xaep\xf9\xfc\x8e\x9f\xed\x06.a\xd5o\x14\r&L\xbd\xb9g\x82;+n\xd5\xcca\v\x86Z\x872\xc3c:`\xf2\x02\xc2\x92\x841\xe7\xca}\"@6}j\x0e\xb7\xa9\xbc\xf3N\xa3\xf3mbd\xfbS\x80\xe0\x11<\x7f\x84\xbe\xa2\xf9\xf7\xee\xf6\x94x\x9d\xe2{\xc5\x83\xc0M\xbb\xd4Io\r\x1c\xd7<\xc0\x84=`\xf1^Y', 0x0, 0x0) 00:28:11 executing program 1: syz_mount_image$reiserfs(&(0x7f0000000180)='re%serfs\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[@ANYBLOB='jdev=.']) 00:28:11 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000480)=@acquire={0x1ac, 0x17, 0x1, 0x0, 0x0, {{@in=@multicast1}, @in6=@ipv4={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3000000], [], @dev}, {@in=@loopback, @in6=@local}, {{@in, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x2}}}, [@tmpl={0x84, 0x5, [{{@in6=@mcast1, 0x0, 0x3c}, 0x0, @in=@multicast1}, {{@in=@remote, 0x0, 0x3c}, 0x0, @in=@broadcast}]}]}, 0x1ac}}, 0x0) 00:28:11 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00004e7000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f, 0x0, 0xf000}, 0xc, &(0x7f0000000440)={&(0x7f00000001c0)=ANY=[@ANYBLOB="1c00000022000100000000000061960d0100000008fe0c009d0a6be0e6d9fc638f19561d6ceb8a6c9239228215fd206cf204e07953", @ANYRES32=0x0], 0x2}, 0x1, 0x0, 0x0, 0xffffffffffffffff}, 0x0) 00:28:11 executing program 2: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(&(0x7f0000000080)=@nbd={'/dev/nbd', 0x0, 0xe3400}, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000240)='hfs\x00\xe6\xa6\xe2\x06g\x96\xb3\v\xf2p\xd5:\x95p\x99\x92\xf2\xc4\x80\x1f\x01\x05\xb8e?\xbfwk\xe4\xe5\xca\x82\xeb\xb1\x04wn*\xf2\xc6\x9d\xc4!\x9e?\x83\x99\x0e\xcc\xa3\x95q.C\xee\x8dIf\xec\xbf\xe8\xb2\t\xedg\x9d\xd9\v\xce\xa3\xa3\xa5\x89F\x03\xefQ\x89\f\xeeRK\x15\xec{D\x9e\x83Z\xabTa\x8e\xcd\x01\xd0\xcfd\xf9c\x87m\xbe>\x81\xba\x9d2\x1c\a,\x12\xbf\xef\xb8m\v\xdf\x8e\xd5\xf5\x1a\xabD\xf6\xe0\x95\xf4\xfeRb_+\xeb\xf9f\xe8\\\x16\xeb\x87\x8e\x8acn4,\x80Q<\x84\xaep\xf9\xfc\x8e\x9f\xed\x06.a\xd5o\x14\r&L\xbd\xb9g\x82;+n\xd5\xcca\v\x86Z\x872\xc3c:`\xf2\x02\xc2\x92\x841\xe7\xca}\"@6}j\x0e\xb7\xa9\xbc\xf3N\xa3\xf3mbd\xfbS\x80\xe0\x11<\x7f\x84\xbe\xa2\xf9\xf7\xee\xf6\x94x\x9d\xe2{\xc5\x83\xc0M\xbb\xd4Io\r\x1c\xd7<\xc0\x84=`\xf1^Y', 0x0, 0x0) 00:28:11 executing program 0: syz_mount_image$reiserfs(&(0x7f0000000180)='rei0erfs\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[@ANYBLOB='jdev=./file0,jdev=']) 00:28:11 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00004e7000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f, 0x0, 0xf0ffff}, 0xc, &(0x7f0000000440)={&(0x7f00000001c0)=ANY=[@ANYBLOB="1c00000022000100000000000061960d0100000008fe0c009d0a6be0e6d9fc638f19561d6ceb8a6c9239228215fd206cf204e07953", @ANYRES32=0x0], 0x2}, 0x1, 0x0, 0x0, 0xffffffffffffffff}, 0x0) 00:28:11 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000480)=@acquire={0x1ac, 0x17, 0x1, 0x0, 0x0, {{@in=@multicast1}, @in6=@ipv4={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000], [], @dev}, {@in=@loopback, @in6=@local}, {{@in, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x2}}}, [@tmpl={0x84, 0x5, [{{@in6=@mcast1, 0x0, 0x3c}, 0x0, @in=@multicast1}, {{@in=@remote, 0x0, 0x3c}, 0x0, @in=@broadcast}]}]}, 0x1ac}}, 0x0) [ 882.194704][ T3636] hfs: can't find a HFS filesystem on dev nbd2 00:28:12 executing program 2: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(&(0x7f0000000080)=@nbd={'/dev/nbd', 0x0, 0xe3401}, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000240)='hfs\x00\xe6\xa6\xe2\x06g\x96\xb3\v\xf2p\xd5:\x95p\x99\x92\xf2\xc4\x80\x1f\x01\x05\xb8e?\xbfwk\xe4\xe5\xca\x82\xeb\xb1\x04wn*\xf2\xc6\x9d\xc4!\x9e?\x83\x99\x0e\xcc\xa3\x95q.C\xee\x8dIf\xec\xbf\xe8\xb2\t\xedg\x9d\xd9\v\xce\xa3\xa3\xa5\x89F\x03\xefQ\x89\f\xeeRK\x15\xec{D\x9e\x83Z\xabTa\x8e\xcd\x01\xd0\xcfd\xf9c\x87m\xbe>\x81\xba\x9d2\x1c\a,\x12\xbf\xef\xb8m\v\xdf\x8e\xd5\xf5\x1a\xabD\xf6\xe0\x95\xf4\xfeRb_+\xeb\xf9f\xe8\\\x16\xeb\x87\x8e\x8acn4,\x80Q<\x84\xaep\xf9\xfc\x8e\x9f\xed\x06.a\xd5o\x14\r&L\xbd\xb9g\x82;+n\xd5\xcca\v\x86Z\x872\xc3c:`\xf2\x02\xc2\x92\x841\xe7\xca}\"@6}j\x0e\xb7\xa9\xbc\xf3N\xa3\xf3mbd\xfbS\x80\xe0\x11<\x7f\x84\xbe\xa2\xf9\xf7\xee\xf6\x94x\x9d\xe2{\xc5\x83\xc0M\xbb\xd4Io\r\x1c\xd7<\xc0\x84=`\xf1^Y', 0x0, 0x0) 00:28:12 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000180)='./control\x00', 0x0) get_thread_area(0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x3) write$binfmt_script(r0, &(0x7f0000000bc0)=ANY=[@ANYBLOB="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"], 0x145) close(r0) execve(&(0x7f0000000180)='./file0\x00', &(0x7f0000000140), &(0x7f0000000140)) r1 = open(&(0x7f0000000000)='./control\x00', 0x80, 0x10) statfs(&(0x7f0000000380)='./control\x00', &(0x7f00000003c0)=""/20) write$P9_RWALK(r0, &(0x7f0000000400)=ANY=[@ANYBLOB="300000006f0100030001030000000400000000000000100000000003000002000000000300000000000000e646f1c5592139cf131e2bf572fa9728dbfac0390865410f3fa1f25743c497e12cb352eac4046b4500f95cfdfb4cf22a3be5c564a47654334c01d5732d382e27bbccd9b903000000c404000000d32dbd21f3ae581d32e69ef9327f7b487d1b4f4502838c08136678bd90733173ab78d6fc264b373611f15c439384ede8"], 0xa8) getsockopt$inet_sctp6_SCTP_RTOINFO(r1, 0x84, 0x0, &(0x7f0000000080)={0x0, 0x200, 0x2, 0xffffffff}, &(0x7f0000000100)=0x10) 00:28:12 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000480)=@acquire={0x1ac, 0x17, 0x1, 0x0, 0x0, {{@in=@multicast1}, @in6=@ipv4={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5000000], [], @dev}, {@in=@loopback, @in6=@local}, {{@in, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x2}}}, [@tmpl={0x84, 0x5, [{{@in6=@mcast1, 0x0, 0x3c}, 0x0, @in=@multicast1}, {{@in=@remote, 0x0, 0x3c}, 0x0, @in=@broadcast}]}]}, 0x1ac}}, 0x0) 00:28:12 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00004e7000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f, 0x0, 0x1000000}, 0xc, &(0x7f0000000440)={&(0x7f00000001c0)=ANY=[@ANYBLOB="1c00000022000100000000000061960d0100000008fe0c009d0a6be0e6d9fc638f19561d6ceb8a6c9239228215fd206cf204e07953", @ANYRES32=0x0], 0x2}, 0x1, 0x0, 0x0, 0xffffffffffffffff}, 0x0) 00:28:12 executing program 2: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(&(0x7f0000000080)=@nbd={'/dev/nbd', 0x0, 0xe3403}, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000240)='hfs\x00\xe6\xa6\xe2\x06g\x96\xb3\v\xf2p\xd5:\x95p\x99\x92\xf2\xc4\x80\x1f\x01\x05\xb8e?\xbfwk\xe4\xe5\xca\x82\xeb\xb1\x04wn*\xf2\xc6\x9d\xc4!\x9e?\x83\x99\x0e\xcc\xa3\x95q.C\xee\x8dIf\xec\xbf\xe8\xb2\t\xedg\x9d\xd9\v\xce\xa3\xa3\xa5\x89F\x03\xefQ\x89\f\xeeRK\x15\xec{D\x9e\x83Z\xabTa\x8e\xcd\x01\xd0\xcfd\xf9c\x87m\xbe>\x81\xba\x9d2\x1c\a,\x12\xbf\xef\xb8m\v\xdf\x8e\xd5\xf5\x1a\xabD\xf6\xe0\x95\xf4\xfeRb_+\xeb\xf9f\xe8\\\x16\xeb\x87\x8e\x8acn4,\x80Q<\x84\xaep\xf9\xfc\x8e\x9f\xed\x06.a\xd5o\x14\r&L\xbd\xb9g\x82;+n\xd5\xcca\v\x86Z\x872\xc3c:`\xf2\x02\xc2\x92\x841\xe7\xca}\"@6}j\x0e\xb7\xa9\xbc\xf3N\xa3\xf3mbd\xfbS\x80\xe0\x11<\x7f\x84\xbe\xa2\xf9\xf7\xee\xf6\x94x\x9d\xe2{\xc5\x83\xc0M\xbb\xd4Io\r\x1c\xd7<\xc0\x84=`\xf1^Y', 0x0, 0x0) 00:28:12 executing program 1: syz_mount_image$reiserfs(&(0x7f0000000180)='rebserfs\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[@ANYBLOB='jdev=.']) 00:28:12 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000480)=@acquire={0x1ac, 0x17, 0x1, 0x0, 0x0, {{@in=@multicast1}, @in6=@ipv4={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6000000], [], @dev}, {@in=@loopback, @in6=@local}, {{@in, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x2}}}, [@tmpl={0x84, 0x5, [{{@in6=@mcast1, 0x0, 0x3c}, 0x0, @in=@multicast1}, {{@in=@remote, 0x0, 0x3c}, 0x0, @in=@broadcast}]}]}, 0x1ac}}, 0x0) 00:28:12 executing program 0: syz_mount_image$reiserfs(&(0x7f0000000180)='reiKerfs\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[@ANYBLOB='jdev=./file0,jdev=']) 00:28:12 executing program 2: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(&(0x7f0000000080)=@nbd={'/dev/nbd', 0x0, 0xe3f00}, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000240)='hfs\x00\xe6\xa6\xe2\x06g\x96\xb3\v\xf2p\xd5:\x95p\x99\x92\xf2\xc4\x80\x1f\x01\x05\xb8e?\xbfwk\xe4\xe5\xca\x82\xeb\xb1\x04wn*\xf2\xc6\x9d\xc4!\x9e?\x83\x99\x0e\xcc\xa3\x95q.C\xee\x8dIf\xec\xbf\xe8\xb2\t\xedg\x9d\xd9\v\xce\xa3\xa3\xa5\x89F\x03\xefQ\x89\f\xeeRK\x15\xec{D\x9e\x83Z\xabTa\x8e\xcd\x01\xd0\xcfd\xf9c\x87m\xbe>\x81\xba\x9d2\x1c\a,\x12\xbf\xef\xb8m\v\xdf\x8e\xd5\xf5\x1a\xabD\xf6\xe0\x95\xf4\xfeRb_+\xeb\xf9f\xe8\\\x16\xeb\x87\x8e\x8acn4,\x80Q<\x84\xaep\xf9\xfc\x8e\x9f\xed\x06.a\xd5o\x14\r&L\xbd\xb9g\x82;+n\xd5\xcca\v\x86Z\x872\xc3c:`\xf2\x02\xc2\x92\x841\xe7\xca}\"@6}j\x0e\xb7\xa9\xbc\xf3N\xa3\xf3mbd\xfbS\x80\xe0\x11<\x7f\x84\xbe\xa2\xf9\xf7\xee\xf6\x94x\x9d\xe2{\xc5\x83\xc0M\xbb\xd4Io\r\x1c\xd7<\xc0\x84=`\xf1^Y', 0x0, 0x0) 00:28:12 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000180)='./control\x00', 0x0) get_thread_area(0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x3) write$binfmt_script(r0, &(0x7f0000000bc0)=ANY=[@ANYBLOB="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"], 0x145) close(r0) execve(&(0x7f0000000180)='./file0\x00', &(0x7f0000000140), &(0x7f0000000140)) r1 = open(&(0x7f0000000000)='./control\x00', 0x80, 0x10) statfs(&(0x7f0000000380)='./control\x00', &(0x7f00000003c0)=""/20) write$P9_RWALK(r0, &(0x7f0000000400)=ANY=[@ANYBLOB="300000006f0100030001030000000400000000000000100000000003000002000000000300000000000000e646f1c5592139cf131e2bf572fa9728dbfac0390865410f3fa1f25743c497e12cb352eac4046b4500f95cfdfb4cf22a3be5c564a47654334c01d5732d382e27bbccd9b903000000c404000000d32dbd21f3ae581d32e69ef9327f7b487d1b4f4502838c08136678bd90733173ab78d6fc264b373611f15c439384ede8"], 0xa8) getsockopt$inet_sctp6_SCTP_RTOINFO(r1, 0x84, 0x0, &(0x7f0000000080)={0x0, 0x200, 0x2, 0xffffffff}, &(0x7f0000000100)=0x10) 00:28:12 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000480)=@acquire={0x1ac, 0x17, 0x1, 0x0, 0x0, {{@in=@multicast1}, @in6=@ipv4={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000], [], @dev}, {@in=@loopback, @in6=@local}, {{@in, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x2}}}, [@tmpl={0x84, 0x5, [{{@in6=@mcast1, 0x0, 0x3c}, 0x0, @in=@multicast1}, {{@in=@remote, 0x0, 0x3c}, 0x0, @in=@broadcast}]}]}, 0x1ac}}, 0x0) 00:28:12 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00004e7000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f, 0x0, 0x2000000}, 0xc, &(0x7f0000000440)={&(0x7f00000001c0)=ANY=[@ANYBLOB="1c00000022000100000000000061960d0100000008fe0c009d0a6be0e6d9fc638f19561d6ceb8a6c9239228215fd206cf204e07953", @ANYRES32=0x0], 0x2}, 0x1, 0x0, 0x0, 0xffffffffffffffff}, 0x0) [ 882.845298][ T3705] hfs: can't find a HFS filesystem on dev nbd2 00:28:12 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000480)=@acquire={0x1ac, 0x17, 0x1, 0x0, 0x0, {{@in=@multicast1}, @in6=@ipv4={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8050000], [], @dev}, {@in=@loopback, @in6=@local}, {{@in, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x2}}}, [@tmpl={0x84, 0x5, [{{@in6=@mcast1, 0x0, 0x3c}, 0x0, @in=@multicast1}, {{@in=@remote, 0x0, 0x3c}, 0x0, @in=@broadcast}]}]}, 0x1ac}}, 0x0) 00:28:12 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00004e7000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f, 0x0, 0x4000000}, 0xc, &(0x7f0000000440)={&(0x7f00000001c0)=ANY=[@ANYBLOB="1c00000022000100000000000061960d0100000008fe0c009d0a6be0e6d9fc638f19561d6ceb8a6c9239228215fd206cf204e07953", @ANYRES32=0x0], 0x2}, 0x1, 0x0, 0x0, 0xffffffffffffffff}, 0x0) 00:28:12 executing program 2: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(&(0x7f0000000080)=@nbd={'/dev/nbd', 0x0, 0xe4000}, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000240)='hfs\x00\xe6\xa6\xe2\x06g\x96\xb3\v\xf2p\xd5:\x95p\x99\x92\xf2\xc4\x80\x1f\x01\x05\xb8e?\xbfwk\xe4\xe5\xca\x82\xeb\xb1\x04wn*\xf2\xc6\x9d\xc4!\x9e?\x83\x99\x0e\xcc\xa3\x95q.C\xee\x8dIf\xec\xbf\xe8\xb2\t\xedg\x9d\xd9\v\xce\xa3\xa3\xa5\x89F\x03\xefQ\x89\f\xeeRK\x15\xec{D\x9e\x83Z\xabTa\x8e\xcd\x01\xd0\xcfd\xf9c\x87m\xbe>\x81\xba\x9d2\x1c\a,\x12\xbf\xef\xb8m\v\xdf\x8e\xd5\xf5\x1a\xabD\xf6\xe0\x95\xf4\xfeRb_+\xeb\xf9f\xe8\\\x16\xeb\x87\x8e\x8acn4,\x80Q<\x84\xaep\xf9\xfc\x8e\x9f\xed\x06.a\xd5o\x14\r&L\xbd\xb9g\x82;+n\xd5\xcca\v\x86Z\x872\xc3c:`\xf2\x02\xc2\x92\x841\xe7\xca}\"@6}j\x0e\xb7\xa9\xbc\xf3N\xa3\xf3mbd\xfbS\x80\xe0\x11<\x7f\x84\xbe\xa2\xf9\xf7\xee\xf6\x94x\x9d\xe2{\xc5\x83\xc0M\xbb\xd4Io\r\x1c\xd7<\xc0\x84=`\xf1^Y', 0x0, 0x0) 00:28:12 executing program 1: syz_mount_image$reiserfs(&(0x7f0000000180)='redserfs\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[@ANYBLOB='jdev=.']) 00:28:12 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000180)='./control\x00', 0x0) get_thread_area(0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x3) write$binfmt_script(r0, &(0x7f0000000bc0)=ANY=[@ANYBLOB="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"], 0x145) close(r0) execve(&(0x7f0000000180)='./file0\x00', &(0x7f0000000140), &(0x7f0000000140)) r1 = open(&(0x7f0000000000)='./control\x00', 0x80, 0x10) statfs(&(0x7f0000000380)='./control\x00', &(0x7f00000003c0)=""/20) write$P9_RWALK(r0, &(0x7f0000000400)=ANY=[@ANYBLOB='0'], 0x1) getsockopt$inet_sctp6_SCTP_RTOINFO(r1, 0x84, 0x0, &(0x7f0000000080)={0x0, 0x200, 0x2, 0xffffffff}, &(0x7f0000000100)=0x10) 00:28:12 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000480)=@acquire={0x1ac, 0x17, 0x1, 0x0, 0x0, {{@in=@multicast1}, @in6=@ipv4={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9000000], [], @dev}, {@in=@loopback, @in6=@local}, {{@in, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x2}}}, [@tmpl={0x84, 0x5, [{{@in6=@mcast1, 0x0, 0x3c}, 0x0, @in=@multicast1}, {{@in=@remote, 0x0, 0x3c}, 0x0, @in=@broadcast}]}]}, 0x1ac}}, 0x0) 00:28:12 executing program 0: syz_mount_image$reiserfs(&(0x7f0000000180)='reiXerfs\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[@ANYBLOB='jdev=./file0,jdev=']) 00:28:12 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00004e7000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f, 0x0, 0x8000000}, 0xc, &(0x7f0000000440)={&(0x7f00000001c0)=ANY=[@ANYBLOB="1c00000022000100000000000061960d0100000008fe0c009d0a6be0e6d9fc638f19561d6ceb8a6c9239228215fd206cf204e07953", @ANYRES32=0x0], 0x2}, 0x1, 0x0, 0x0, 0xffffffffffffffff}, 0x0) [ 883.147299][ T2481] nbd_handle_cmd: 3 callbacks suppressed [ 883.147328][ T2481] block nbd2: Attempted send on invalid socket [ 883.159578][ T2481] print_req_error: 3 callbacks suppressed [ 883.159589][ T2481] print_req_error: I/O error, dev nbd2, sector 2 flags 0 [ 883.172734][ T3725] hfs: can't find a HFS filesystem on dev nbd2 00:28:12 executing program 2: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(&(0x7f0000000080)=@nbd={'/dev/nbd', 0x0, 0xe4202}, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000240)='hfs\x00\xe6\xa6\xe2\x06g\x96\xb3\v\xf2p\xd5:\x95p\x99\x92\xf2\xc4\x80\x1f\x01\x05\xb8e?\xbfwk\xe4\xe5\xca\x82\xeb\xb1\x04wn*\xf2\xc6\x9d\xc4!\x9e?\x83\x99\x0e\xcc\xa3\x95q.C\xee\x8dIf\xec\xbf\xe8\xb2\t\xedg\x9d\xd9\v\xce\xa3\xa3\xa5\x89F\x03\xefQ\x89\f\xeeRK\x15\xec{D\x9e\x83Z\xabTa\x8e\xcd\x01\xd0\xcfd\xf9c\x87m\xbe>\x81\xba\x9d2\x1c\a,\x12\xbf\xef\xb8m\v\xdf\x8e\xd5\xf5\x1a\xabD\xf6\xe0\x95\xf4\xfeRb_+\xeb\xf9f\xe8\\\x16\xeb\x87\x8e\x8acn4,\x80Q<\x84\xaep\xf9\xfc\x8e\x9f\xed\x06.a\xd5o\x14\r&L\xbd\xb9g\x82;+n\xd5\xcca\v\x86Z\x872\xc3c:`\xf2\x02\xc2\x92\x841\xe7\xca}\"@6}j\x0e\xb7\xa9\xbc\xf3N\xa3\xf3mbd\xfbS\x80\xe0\x11<\x7f\x84\xbe\xa2\xf9\xf7\xee\xf6\x94x\x9d\xe2{\xc5\x83\xc0M\xbb\xd4Io\r\x1c\xd7<\xc0\x84=`\xf1^Y', 0x0, 0x0) 00:28:13 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000180)='./control\x00', 0x0) get_thread_area(0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x3) write$binfmt_script(r0, &(0x7f0000000bc0)=ANY=[@ANYBLOB="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"], 0x145) close(r0) execve(&(0x7f0000000180)='./file0\x00', &(0x7f0000000140), &(0x7f0000000140)) r1 = open(&(0x7f0000000000)='./control\x00', 0x80, 0x10) statfs(&(0x7f0000000380)='./control\x00', &(0x7f00000003c0)=""/20) write$P9_RWALK(r0, &(0x7f0000000400)=ANY=[@ANYBLOB='0'], 0x1) getsockopt$inet_sctp6_SCTP_RTOINFO(r1, 0x84, 0x0, &(0x7f0000000080)={0x0, 0x200, 0x2, 0xffffffff}, &(0x7f0000000100)=0x10) 00:28:13 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000480)=@acquire={0x1ac, 0x17, 0x1, 0x0, 0x0, {{@in=@multicast1}, @in6=@ipv4={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa000000], [], @dev}, {@in=@loopback, @in6=@local}, {{@in, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x2}}}, [@tmpl={0x84, 0x5, [{{@in6=@mcast1, 0x0, 0x3c}, 0x0, @in=@multicast1}, {{@in=@remote, 0x0, 0x3c}, 0x0, @in=@broadcast}]}]}, 0x1ac}}, 0x0) 00:28:13 executing program 2: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(&(0x7f0000000080)=@nbd={'/dev/nbd', 0x0, 0xe5001}, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000240)='hfs\x00\xe6\xa6\xe2\x06g\x96\xb3\v\xf2p\xd5:\x95p\x99\x92\xf2\xc4\x80\x1f\x01\x05\xb8e?\xbfwk\xe4\xe5\xca\x82\xeb\xb1\x04wn*\xf2\xc6\x9d\xc4!\x9e?\x83\x99\x0e\xcc\xa3\x95q.C\xee\x8dIf\xec\xbf\xe8\xb2\t\xedg\x9d\xd9\v\xce\xa3\xa3\xa5\x89F\x03\xefQ\x89\f\xeeRK\x15\xec{D\x9e\x83Z\xabTa\x8e\xcd\x01\xd0\xcfd\xf9c\x87m\xbe>\x81\xba\x9d2\x1c\a,\x12\xbf\xef\xb8m\v\xdf\x8e\xd5\xf5\x1a\xabD\xf6\xe0\x95\xf4\xfeRb_+\xeb\xf9f\xe8\\\x16\xeb\x87\x8e\x8acn4,\x80Q<\x84\xaep\xf9\xfc\x8e\x9f\xed\x06.a\xd5o\x14\r&L\xbd\xb9g\x82;+n\xd5\xcca\v\x86Z\x872\xc3c:`\xf2\x02\xc2\x92\x841\xe7\xca}\"@6}j\x0e\xb7\xa9\xbc\xf3N\xa3\xf3mbd\xfbS\x80\xe0\x11<\x7f\x84\xbe\xa2\xf9\xf7\xee\xf6\x94x\x9d\xe2{\xc5\x83\xc0M\xbb\xd4Io\r\x1c\xd7<\xc0\x84=`\xf1^Y', 0x0, 0x0) 00:28:13 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00004e7000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f, 0x0, 0xa000000}, 0xc, &(0x7f0000000440)={&(0x7f00000001c0)=ANY=[@ANYBLOB="1c00000022000100000000000061960d0100000008fe0c009d0a6be0e6d9fc638f19561d6ceb8a6c9239228215fd206cf204e07953", @ANYRES32=0x0], 0x2}, 0x1, 0x0, 0x0, 0xffffffffffffffff}, 0x0) 00:28:13 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000480)=@acquire={0x1ac, 0x17, 0x1, 0x0, 0x0, {{@in=@multicast1}, @in6=@ipv4={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb000000], [], @dev}, {@in=@loopback, @in6=@local}, {{@in, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x2}}}, [@tmpl={0x84, 0x5, [{{@in6=@mcast1, 0x0, 0x3c}, 0x0, @in=@multicast1}, {{@in=@remote, 0x0, 0x3c}, 0x0, @in=@broadcast}]}]}, 0x1ac}}, 0x0) 00:28:13 executing program 0: syz_mount_image$reiserfs(&(0x7f0000000180)='reiaerfs\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[@ANYBLOB='jdev=./file0,jdev=']) 00:28:13 executing program 1: syz_mount_image$reiserfs(&(0x7f0000000180)='refserfs\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[@ANYBLOB='jdev=.']) 00:28:13 executing program 2: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(&(0x7f0000000080)=@nbd={'/dev/nbd', 0x0, 0xe5401}, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000240)='hfs\x00\xe6\xa6\xe2\x06g\x96\xb3\v\xf2p\xd5:\x95p\x99\x92\xf2\xc4\x80\x1f\x01\x05\xb8e?\xbfwk\xe4\xe5\xca\x82\xeb\xb1\x04wn*\xf2\xc6\x9d\xc4!\x9e?\x83\x99\x0e\xcc\xa3\x95q.C\xee\x8dIf\xec\xbf\xe8\xb2\t\xedg\x9d\xd9\v\xce\xa3\xa3\xa5\x89F\x03\xefQ\x89\f\xeeRK\x15\xec{D\x9e\x83Z\xabTa\x8e\xcd\x01\xd0\xcfd\xf9c\x87m\xbe>\x81\xba\x9d2\x1c\a,\x12\xbf\xef\xb8m\v\xdf\x8e\xd5\xf5\x1a\xabD\xf6\xe0\x95\xf4\xfeRb_+\xeb\xf9f\xe8\\\x16\xeb\x87\x8e\x8acn4,\x80Q<\x84\xaep\xf9\xfc\x8e\x9f\xed\x06.a\xd5o\x14\r&L\xbd\xb9g\x82;+n\xd5\xcca\v\x86Z\x872\xc3c:`\xf2\x02\xc2\x92\x841\xe7\xca}\"@6}j\x0e\xb7\xa9\xbc\xf3N\xa3\xf3mbd\xfbS\x80\xe0\x11<\x7f\x84\xbe\xa2\xf9\xf7\xee\xf6\x94x\x9d\xe2{\xc5\x83\xc0M\xbb\xd4Io\r\x1c\xd7<\xc0\x84=`\xf1^Y', 0x0, 0x0) 00:28:13 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000480)=@acquire={0x1ac, 0x17, 0x1, 0x0, 0x0, {{@in=@multicast1}, @in6=@ipv4={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe000000], [], @dev}, {@in=@loopback, @in6=@local}, {{@in, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x2}}}, [@tmpl={0x84, 0x5, [{{@in6=@mcast1, 0x0, 0x3c}, 0x0, @in=@multicast1}, {{@in=@remote, 0x0, 0x3c}, 0x0, @in=@broadcast}]}]}, 0x1ac}}, 0x0) 00:28:13 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000480)=@acquire={0x1ac, 0x17, 0x1, 0x0, 0x0, {{@in=@multicast1}, @in6=@ipv4={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf000000], [], @dev}, {@in=@loopback, @in6=@local}, {{@in, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x2}}}, [@tmpl={0x84, 0x5, [{{@in6=@mcast1, 0x0, 0x3c}, 0x0, @in=@multicast1}, {{@in=@remote, 0x0, 0x3c}, 0x0, @in=@broadcast}]}]}, 0x1ac}}, 0x0) 00:28:13 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00004e7000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f, 0x0, 0xe000000}, 0xc, &(0x7f0000000440)={&(0x7f00000001c0)=ANY=[@ANYBLOB="1c00000022000100000000000061960d0100000008fe0c009d0a6be0e6d9fc638f19561d6ceb8a6c9239228215fd206cf204e07953", @ANYRES32=0x0], 0x2}, 0x1, 0x0, 0x0, 0xffffffffffffffff}, 0x0) 00:28:13 executing program 2: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(&(0x7f0000000080)=@nbd={'/dev/nbd', 0x0, 0xe6200}, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000240)='hfs\x00\xe6\xa6\xe2\x06g\x96\xb3\v\xf2p\xd5:\x95p\x99\x92\xf2\xc4\x80\x1f\x01\x05\xb8e?\xbfwk\xe4\xe5\xca\x82\xeb\xb1\x04wn*\xf2\xc6\x9d\xc4!\x9e?\x83\x99\x0e\xcc\xa3\x95q.C\xee\x8dIf\xec\xbf\xe8\xb2\t\xedg\x9d\xd9\v\xce\xa3\xa3\xa5\x89F\x03\xefQ\x89\f\xeeRK\x15\xec{D\x9e\x83Z\xabTa\x8e\xcd\x01\xd0\xcfd\xf9c\x87m\xbe>\x81\xba\x9d2\x1c\a,\x12\xbf\xef\xb8m\v\xdf\x8e\xd5\xf5\x1a\xabD\xf6\xe0\x95\xf4\xfeRb_+\xeb\xf9f\xe8\\\x16\xeb\x87\x8e\x8acn4,\x80Q<\x84\xaep\xf9\xfc\x8e\x9f\xed\x06.a\xd5o\x14\r&L\xbd\xb9g\x82;+n\xd5\xcca\v\x86Z\x872\xc3c:`\xf2\x02\xc2\x92\x841\xe7\xca}\"@6}j\x0e\xb7\xa9\xbc\xf3N\xa3\xf3mbd\xfbS\x80\xe0\x11<\x7f\x84\xbe\xa2\xf9\xf7\xee\xf6\x94x\x9d\xe2{\xc5\x83\xc0M\xbb\xd4Io\r\x1c\xd7<\xc0\x84=`\xf1^Y', 0x0, 0x0) 00:28:13 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000180)='./control\x00', 0x0) get_thread_area(0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x3) write$binfmt_script(r0, &(0x7f0000000bc0)=ANY=[@ANYBLOB="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"], 0x145) close(r0) execve(&(0x7f0000000180)='./file0\x00', &(0x7f0000000140), &(0x7f0000000140)) r1 = open(&(0x7f0000000000)='./control\x00', 0x80, 0x10) statfs(&(0x7f0000000380)='./control\x00', &(0x7f00000003c0)=""/20) write$P9_RWALK(r0, &(0x7f0000000400)=ANY=[@ANYBLOB='0'], 0x1) getsockopt$inet_sctp6_SCTP_RTOINFO(r1, 0x84, 0x0, &(0x7f0000000080)={0x0, 0x200, 0x2, 0xffffffff}, &(0x7f0000000100)=0x10) 00:28:13 executing program 0: syz_mount_image$reiserfs(&(0x7f0000000180)='reiberfs\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[@ANYBLOB='jdev=./file0,jdev=']) 00:28:13 executing program 1: syz_mount_image$reiserfs(&(0x7f0000000180)='retserfs\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[@ANYBLOB='jdev=.']) 00:28:13 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00004e7000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f, 0x0, 0x10000000}, 0xc, &(0x7f0000000440)={&(0x7f00000001c0)=ANY=[@ANYBLOB="1c00000022000100000000000061960d0100000008fe0c009d0a6be0e6d9fc638f19561d6ceb8a6c9239228215fd206cf204e07953", @ANYRES32=0x0], 0x2}, 0x1, 0x0, 0x0, 0xffffffffffffffff}, 0x0) 00:28:13 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000480)=@acquire={0x1ac, 0x17, 0x1, 0x0, 0x0, {{@in=@multicast1}, @in6=@ipv4={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000], [], @dev}, {@in=@loopback, @in6=@local}, {{@in, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x2}}}, [@tmpl={0x84, 0x5, [{{@in6=@mcast1, 0x0, 0x3c}, 0x0, @in=@multicast1}, {{@in=@remote, 0x0, 0x3c}, 0x0, @in=@broadcast}]}]}, 0x1ac}}, 0x0) 00:28:13 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000180)='./control\x00', 0x0) get_thread_area(0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x3) write$binfmt_script(r0, &(0x7f0000000bc0)=ANY=[@ANYBLOB="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"], 0x145) close(r0) execve(&(0x7f0000000180)='./file0\x00', &(0x7f0000000140), &(0x7f0000000140)) r1 = open(&(0x7f0000000000)='./control\x00', 0x80, 0x10) statfs(&(0x7f0000000380)='./control\x00', &(0x7f00000003c0)=""/20) write$P9_RWALK(r0, &(0x7f0000000400)=ANY=[@ANYBLOB="300000006f0100030001030000000400000000000000100000000003000002000000000300000000000000e646f1c5592139cf131e2bf572fa9728dbfac0390865410f3fa1f25743c497e12cb352eac4046b4500f9"], 0x55) getsockopt$inet_sctp6_SCTP_RTOINFO(r1, 0x84, 0x0, &(0x7f0000000080)={0x0, 0x200, 0x2, 0xffffffff}, &(0x7f0000000100)=0x10) [ 884.130402][ T2481] block nbd2: Attempted send on invalid socket [ 884.136739][ T2481] print_req_error: I/O error, dev nbd2, sector 2 flags 0 [ 884.151197][ T3801] hfs: can't find a HFS filesystem on dev nbd2 00:28:14 executing program 2: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(&(0x7f0000000080)=@nbd={'/dev/nbd', 0x0, 0xe6400}, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000240)='hfs\x00\xe6\xa6\xe2\x06g\x96\xb3\v\xf2p\xd5:\x95p\x99\x92\xf2\xc4\x80\x1f\x01\x05\xb8e?\xbfwk\xe4\xe5\xca\x82\xeb\xb1\x04wn*\xf2\xc6\x9d\xc4!\x9e?\x83\x99\x0e\xcc\xa3\x95q.C\xee\x8dIf\xec\xbf\xe8\xb2\t\xedg\x9d\xd9\v\xce\xa3\xa3\xa5\x89F\x03\xefQ\x89\f\xeeRK\x15\xec{D\x9e\x83Z\xabTa\x8e\xcd\x01\xd0\xcfd\xf9c\x87m\xbe>\x81\xba\x9d2\x1c\a,\x12\xbf\xef\xb8m\v\xdf\x8e\xd5\xf5\x1a\xabD\xf6\xe0\x95\xf4\xfeRb_+\xeb\xf9f\xe8\\\x16\xeb\x87\x8e\x8acn4,\x80Q<\x84\xaep\xf9\xfc\x8e\x9f\xed\x06.a\xd5o\x14\r&L\xbd\xb9g\x82;+n\xd5\xcca\v\x86Z\x872\xc3c:`\xf2\x02\xc2\x92\x841\xe7\xca}\"@6}j\x0e\xb7\xa9\xbc\xf3N\xa3\xf3mbd\xfbS\x80\xe0\x11<\x7f\x84\xbe\xa2\xf9\xf7\xee\xf6\x94x\x9d\xe2{\xc5\x83\xc0M\xbb\xd4Io\r\x1c\xd7<\xc0\x84=`\xf1^Y', 0x0, 0x0) 00:28:14 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000480)=@acquire={0x1ac, 0x17, 0x1, 0x0, 0x0, {{@in=@multicast1}, @in6=@ipv4={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x11000000], [], @dev}, {@in=@loopback, @in6=@local}, {{@in, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x2}}}, [@tmpl={0x84, 0x5, [{{@in6=@mcast1, 0x0, 0x3c}, 0x0, @in=@multicast1}, {{@in=@remote, 0x0, 0x3c}, 0x0, @in=@broadcast}]}]}, 0x1ac}}, 0x0) 00:28:14 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00004e7000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f, 0x0, 0x60000000}, 0xc, &(0x7f0000000440)={&(0x7f00000001c0)=ANY=[@ANYBLOB="1c00000022000100000000000061960d0100000008fe0c009d0a6be0e6d9fc638f19561d6ceb8a6c9239228215fd206cf204e07953", @ANYRES32=0x0], 0x2}, 0x1, 0x0, 0x0, 0xffffffffffffffff}, 0x0) 00:28:14 executing program 0: syz_mount_image$reiserfs(&(0x7f0000000180)='reicerfs\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[@ANYBLOB='jdev=./file0,jdev=']) 00:28:14 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000480)=@acquire={0x1ac, 0x17, 0x1, 0x0, 0x0, {{@in=@multicast1}, @in6=@ipv4={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x12000000], [], @dev}, {@in=@loopback, @in6=@local}, {{@in, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x2}}}, [@tmpl={0x84, 0x5, [{{@in6=@mcast1, 0x0, 0x3c}, 0x0, @in=@multicast1}, {{@in=@remote, 0x0, 0x3c}, 0x0, @in=@broadcast}]}]}, 0x1ac}}, 0x0) [ 884.499145][ T2480] block nbd2: Attempted send on invalid socket [ 884.505503][ T2480] print_req_error: I/O error, dev nbd2, sector 2 flags 0 [ 884.514215][ T3836] hfs: can't find a HFS filesystem on dev nbd2 00:28:14 executing program 1: syz_mount_image$reiserfs(&(0x7f0000000180)='rei\nerfs\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[@ANYBLOB='jdev=.']) 00:28:14 executing program 2: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(&(0x7f0000000080)=@nbd={'/dev/nbd', 0x0, 0xe6600}, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000240)='hfs\x00\xe6\xa6\xe2\x06g\x96\xb3\v\xf2p\xd5:\x95p\x99\x92\xf2\xc4\x80\x1f\x01\x05\xb8e?\xbfwk\xe4\xe5\xca\x82\xeb\xb1\x04wn*\xf2\xc6\x9d\xc4!\x9e?\x83\x99\x0e\xcc\xa3\x95q.C\xee\x8dIf\xec\xbf\xe8\xb2\t\xedg\x9d\xd9\v\xce\xa3\xa3\xa5\x89F\x03\xefQ\x89\f\xeeRK\x15\xec{D\x9e\x83Z\xabTa\x8e\xcd\x01\xd0\xcfd\xf9c\x87m\xbe>\x81\xba\x9d2\x1c\a,\x12\xbf\xef\xb8m\v\xdf\x8e\xd5\xf5\x1a\xabD\xf6\xe0\x95\xf4\xfeRb_+\xeb\xf9f\xe8\\\x16\xeb\x87\x8e\x8acn4,\x80Q<\x84\xaep\xf9\xfc\x8e\x9f\xed\x06.a\xd5o\x14\r&L\xbd\xb9g\x82;+n\xd5\xcca\v\x86Z\x872\xc3c:`\xf2\x02\xc2\x92\x841\xe7\xca}\"@6}j\x0e\xb7\xa9\xbc\xf3N\xa3\xf3mbd\xfbS\x80\xe0\x11<\x7f\x84\xbe\xa2\xf9\xf7\xee\xf6\x94x\x9d\xe2{\xc5\x83\xc0M\xbb\xd4Io\r\x1c\xd7<\xc0\x84=`\xf1^Y', 0x0, 0x0) 00:28:14 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00004e7000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f, 0x0, 0x9effffff}, 0xc, &(0x7f0000000440)={&(0x7f00000001c0)=ANY=[@ANYBLOB="1c00000022000100000000000061960d0100000008fe0c009d0a6be0e6d9fc638f19561d6ceb8a6c9239228215fd206cf204e07953", @ANYRES32=0x0], 0x2}, 0x1, 0x0, 0x0, 0xffffffffffffffff}, 0x0) 00:28:14 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000480)=@acquire={0x1ac, 0x17, 0x1, 0x0, 0x0, {{@in=@multicast1}, @in6=@ipv4={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x13000000], [], @dev}, {@in=@loopback, @in6=@local}, {{@in, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x2}}}, [@tmpl={0x84, 0x5, [{{@in6=@mcast1, 0x0, 0x3c}, 0x0, @in=@multicast1}, {{@in=@remote, 0x0, 0x3c}, 0x0, @in=@broadcast}]}]}, 0x1ac}}, 0x0) 00:28:14 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000180)='./control\x00', 0x0) get_thread_area(0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x3) write$binfmt_script(r0, &(0x7f0000000bc0)=ANY=[@ANYBLOB="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"], 0x145) close(r0) execve(&(0x7f0000000180)='./file0\x00', &(0x7f0000000140), &(0x7f0000000140)) r1 = open(&(0x7f0000000000)='./control\x00', 0x80, 0x10) statfs(&(0x7f0000000380)='./control\x00', &(0x7f00000003c0)=""/20) write$P9_RWALK(r0, &(0x7f0000000400)=ANY=[@ANYBLOB="300000006f0100030001030000000400000000000000100000000003000002000000000300000000000000e646f1c5592139cf131e2bf572fa9728dbfac0390865410f3fa1f25743c497e12cb352eac4046b4500f9"], 0x55) getsockopt$inet_sctp6_SCTP_RTOINFO(r1, 0x84, 0x0, &(0x7f0000000080)={0x0, 0x200, 0x2, 0xffffffff}, &(0x7f0000000100)=0x10) [ 884.742050][ T2481] block nbd2: Attempted send on invalid socket [ 884.748300][ T2481] print_req_error: I/O error, dev nbd2, sector 2 flags 0 [ 884.775112][ T3849] hfs: can't find a HFS filesystem on dev nbd2 00:28:14 executing program 2: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(&(0x7f0000000080)=@nbd={'/dev/nbd', 0x0, 0xe6601}, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000240)='hfs\x00\xe6\xa6\xe2\x06g\x96\xb3\v\xf2p\xd5:\x95p\x99\x92\xf2\xc4\x80\x1f\x01\x05\xb8e?\xbfwk\xe4\xe5\xca\x82\xeb\xb1\x04wn*\xf2\xc6\x9d\xc4!\x9e?\x83\x99\x0e\xcc\xa3\x95q.C\xee\x8dIf\xec\xbf\xe8\xb2\t\xedg\x9d\xd9\v\xce\xa3\xa3\xa5\x89F\x03\xefQ\x89\f\xeeRK\x15\xec{D\x9e\x83Z\xabTa\x8e\xcd\x01\xd0\xcfd\xf9c\x87m\xbe>\x81\xba\x9d2\x1c\a,\x12\xbf\xef\xb8m\v\xdf\x8e\xd5\xf5\x1a\xabD\xf6\xe0\x95\xf4\xfeRb_+\xeb\xf9f\xe8\\\x16\xeb\x87\x8e\x8acn4,\x80Q<\x84\xaep\xf9\xfc\x8e\x9f\xed\x06.a\xd5o\x14\r&L\xbd\xb9g\x82;+n\xd5\xcca\v\x86Z\x872\xc3c:`\xf2\x02\xc2\x92\x841\xe7\xca}\"@6}j\x0e\xb7\xa9\xbc\xf3N\xa3\xf3mbd\xfbS\x80\xe0\x11<\x7f\x84\xbe\xa2\xf9\xf7\xee\xf6\x94x\x9d\xe2{\xc5\x83\xc0M\xbb\xd4Io\r\x1c\xd7<\xc0\x84=`\xf1^Y', 0x0, 0x0) 00:28:14 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00004e7000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f, 0x0, 0xb00a0000}, 0xc, &(0x7f0000000440)={&(0x7f00000001c0)=ANY=[@ANYBLOB="1c00000022000100000000000061960d0100000008fe0c009d0a6be0e6d9fc638f19561d6ceb8a6c9239228215fd206cf204e07953", @ANYRES32=0x0], 0x2}, 0x1, 0x0, 0x0, 0xffffffffffffffff}, 0x0) 00:28:14 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000480)=@acquire={0x1ac, 0x17, 0x1, 0x0, 0x0, {{@in=@multicast1}, @in6=@ipv4={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000], [], @dev}, {@in=@loopback, @in6=@local}, {{@in, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x2}}}, [@tmpl={0x84, 0x5, [{{@in6=@mcast1, 0x0, 0x3c}, 0x0, @in=@multicast1}, {{@in=@remote, 0x0, 0x3c}, 0x0, @in=@broadcast}]}]}, 0x1ac}}, 0x0) 00:28:14 executing program 0: syz_mount_image$reiserfs(&(0x7f0000000180)='reiderfs\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[@ANYBLOB='jdev=./file0,jdev=']) 00:28:14 executing program 2: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(&(0x7f0000000080)=@nbd={'/dev/nbd', 0x0, 0xe7a02}, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000240)='hfs\x00\xe6\xa6\xe2\x06g\x96\xb3\v\xf2p\xd5:\x95p\x99\x92\xf2\xc4\x80\x1f\x01\x05\xb8e?\xbfwk\xe4\xe5\xca\x82\xeb\xb1\x04wn*\xf2\xc6\x9d\xc4!\x9e?\x83\x99\x0e\xcc\xa3\x95q.C\xee\x8dIf\xec\xbf\xe8\xb2\t\xedg\x9d\xd9\v\xce\xa3\xa3\xa5\x89F\x03\xefQ\x89\f\xeeRK\x15\xec{D\x9e\x83Z\xabTa\x8e\xcd\x01\xd0\xcfd\xf9c\x87m\xbe>\x81\xba\x9d2\x1c\a,\x12\xbf\xef\xb8m\v\xdf\x8e\xd5\xf5\x1a\xabD\xf6\xe0\x95\xf4\xfeRb_+\xeb\xf9f\xe8\\\x16\xeb\x87\x8e\x8acn4,\x80Q<\x84\xaep\xf9\xfc\x8e\x9f\xed\x06.a\xd5o\x14\r&L\xbd\xb9g\x82;+n\xd5\xcca\v\x86Z\x872\xc3c:`\xf2\x02\xc2\x92\x841\xe7\xca}\"@6}j\x0e\xb7\xa9\xbc\xf3N\xa3\xf3mbd\xfbS\x80\xe0\x11<\x7f\x84\xbe\xa2\xf9\xf7\xee\xf6\x94x\x9d\xe2{\xc5\x83\xc0M\xbb\xd4Io\r\x1c\xd7<\xc0\x84=`\xf1^Y', 0x0, 0x0) 00:28:14 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000480)=@acquire={0x1ac, 0x17, 0x1, 0x0, 0x0, {{@in=@multicast1}, @in6=@ipv4={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x60000000], [], @dev}, {@in=@loopback, @in6=@local}, {{@in, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x2}}}, [@tmpl={0x84, 0x5, [{{@in6=@mcast1, 0x0, 0x3c}, 0x0, @in=@multicast1}, {{@in=@remote, 0x0, 0x3c}, 0x0, @in=@broadcast}]}]}, 0x1ac}}, 0x0) 00:28:14 executing program 1: syz_mount_image$reiserfs(&(0x7f0000000180)='rei#erfs\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[@ANYBLOB='jdev=.']) 00:28:14 executing program 2: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(&(0x7f0000000080)=@nbd={'/dev/nbd', 0x0, 0xe8202}, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000240)='hfs\x00\xe6\xa6\xe2\x06g\x96\xb3\v\xf2p\xd5:\x95p\x99\x92\xf2\xc4\x80\x1f\x01\x05\xb8e?\xbfwk\xe4\xe5\xca\x82\xeb\xb1\x04wn*\xf2\xc6\x9d\xc4!\x9e?\x83\x99\x0e\xcc\xa3\x95q.C\xee\x8dIf\xec\xbf\xe8\xb2\t\xedg\x9d\xd9\v\xce\xa3\xa3\xa5\x89F\x03\xefQ\x89\f\xeeRK\x15\xec{D\x9e\x83Z\xabTa\x8e\xcd\x01\xd0\xcfd\xf9c\x87m\xbe>\x81\xba\x9d2\x1c\a,\x12\xbf\xef\xb8m\v\xdf\x8e\xd5\xf5\x1a\xabD\xf6\xe0\x95\xf4\xfeRb_+\xeb\xf9f\xe8\\\x16\xeb\x87\x8e\x8acn4,\x80Q<\x84\xaep\xf9\xfc\x8e\x9f\xed\x06.a\xd5o\x14\r&L\xbd\xb9g\x82;+n\xd5\xcca\v\x86Z\x872\xc3c:`\xf2\x02\xc2\x92\x841\xe7\xca}\"@6}j\x0e\xb7\xa9\xbc\xf3N\xa3\xf3mbd\xfbS\x80\xe0\x11<\x7f\x84\xbe\xa2\xf9\xf7\xee\xf6\x94x\x9d\xe2{\xc5\x83\xc0M\xbb\xd4Io\r\x1c\xd7<\xc0\x84=`\xf1^Y', 0x0, 0x0) 00:28:14 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000480)=@acquire={0x1ac, 0x17, 0x1, 0x0, 0x0, {{@in=@multicast1}, @in6=@ipv4={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9effffff], [], @dev}, {@in=@loopback, @in6=@local}, {{@in, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x2}}}, [@tmpl={0x84, 0x5, [{{@in6=@mcast1, 0x0, 0x3c}, 0x0, @in=@multicast1}, {{@in=@remote, 0x0, 0x3c}, 0x0, @in=@broadcast}]}]}, 0x1ac}}, 0x0) 00:28:15 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000180)='./control\x00', 0x0) get_thread_area(0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x3) write$binfmt_script(r0, &(0x7f0000000bc0)=ANY=[@ANYBLOB="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"], 0x145) close(r0) execve(&(0x7f0000000180)='./file0\x00', &(0x7f0000000140), &(0x7f0000000140)) r1 = open(&(0x7f0000000000)='./control\x00', 0x80, 0x10) statfs(&(0x7f0000000380)='./control\x00', &(0x7f00000003c0)=""/20) write$P9_RWALK(r0, &(0x7f0000000400)=ANY=[@ANYBLOB="300000006f0100030001030000000400000000000000100000000003000002000000000300000000000000e646f1c5592139cf131e2bf572fa9728dbfac0390865410f3fa1f25743c497e12cb352eac4046b4500f9"], 0x55) getsockopt$inet_sctp6_SCTP_RTOINFO(r1, 0x84, 0x0, &(0x7f0000000080)={0x0, 0x200, 0x2, 0xffffffff}, &(0x7f0000000100)=0x10) 00:28:15 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00004e7000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f, 0x0, 0xf0ffffff}, 0xc, &(0x7f0000000440)={&(0x7f00000001c0)=ANY=[@ANYBLOB="1c00000022000100000000000061960d0100000008fe0c009d0a6be0e6d9fc638f19561d6ceb8a6c9239228215fd206cf204e07953", @ANYRES32=0x0], 0x2}, 0x1, 0x0, 0x0, 0xffffffffffffffff}, 0x0) 00:28:15 executing program 2: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(&(0x7f0000000080)=@nbd={'/dev/nbd', 0x0, 0xe9201}, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000240)='hfs\x00\xe6\xa6\xe2\x06g\x96\xb3\v\xf2p\xd5:\x95p\x99\x92\xf2\xc4\x80\x1f\x01\x05\xb8e?\xbfwk\xe4\xe5\xca\x82\xeb\xb1\x04wn*\xf2\xc6\x9d\xc4!\x9e?\x83\x99\x0e\xcc\xa3\x95q.C\xee\x8dIf\xec\xbf\xe8\xb2\t\xedg\x9d\xd9\v\xce\xa3\xa3\xa5\x89F\x03\xefQ\x89\f\xeeRK\x15\xec{D\x9e\x83Z\xabTa\x8e\xcd\x01\xd0\xcfd\xf9c\x87m\xbe>\x81\xba\x9d2\x1c\a,\x12\xbf\xef\xb8m\v\xdf\x8e\xd5\xf5\x1a\xabD\xf6\xe0\x95\xf4\xfeRb_+\xeb\xf9f\xe8\\\x16\xeb\x87\x8e\x8acn4,\x80Q<\x84\xaep\xf9\xfc\x8e\x9f\xed\x06.a\xd5o\x14\r&L\xbd\xb9g\x82;+n\xd5\xcca\v\x86Z\x872\xc3c:`\xf2\x02\xc2\x92\x841\xe7\xca}\"@6}j\x0e\xb7\xa9\xbc\xf3N\xa3\xf3mbd\xfbS\x80\xe0\x11<\x7f\x84\xbe\xa2\xf9\xf7\xee\xf6\x94x\x9d\xe2{\xc5\x83\xc0M\xbb\xd4Io\r\x1c\xd7<\xc0\x84=`\xf1^Y', 0x0, 0x0) 00:28:15 executing program 0: syz_mount_image$reiserfs(&(0x7f0000000180)='reiherfs\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[@ANYBLOB='jdev=./file0,jdev=']) 00:28:15 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000480)=@acquire={0x1ac, 0x17, 0x1, 0x0, 0x0, {{@in=@multicast1}, @in6=@ipv4={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf0ffffff], [], @dev}, {@in=@loopback, @in6=@local}, {{@in, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x2}}}, [@tmpl={0x84, 0x5, [{{@in6=@mcast1, 0x0, 0x3c}, 0x0, @in=@multicast1}, {{@in=@remote, 0x0, 0x3c}, 0x0, @in=@broadcast}]}]}, 0x1ac}}, 0x0) 00:28:15 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00004e7000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f, 0x0, 0xfffff000}, 0xc, &(0x7f0000000440)={&(0x7f00000001c0)=ANY=[@ANYBLOB="1c00000022000100000000000061960d0100000008fe0c009d0a6be0e6d9fc638f19561d6ceb8a6c9239228215fd206cf204e07953", @ANYRES32=0x0], 0x2}, 0x1, 0x0, 0x0, 0xffffffffffffffff}, 0x0) 00:28:15 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000480)=@acquire={0x1ac, 0x17, 0x1, 0x0, 0x0, {{@in=@multicast1}, @in6=@ipv4={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfcffffff], [], @dev}, {@in=@loopback, @in6=@local}, {{@in, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x2}}}, [@tmpl={0x84, 0x5, [{{@in6=@mcast1, 0x0, 0x3c}, 0x0, @in=@multicast1}, {{@in=@remote, 0x0, 0x3c}, 0x0, @in=@broadcast}]}]}, 0x1ac}}, 0x0) 00:28:15 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000180)='./control\x00', 0x0) get_thread_area(0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x3) write$binfmt_script(r0, &(0x7f0000000bc0)=ANY=[@ANYBLOB="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"], 0x145) close(r0) execve(&(0x7f0000000180)='./file0\x00', &(0x7f0000000140), &(0x7f0000000140)) r1 = open(&(0x7f0000000000)='./control\x00', 0x80, 0x10) statfs(&(0x7f0000000380)='./control\x00', &(0x7f00000003c0)=""/20) write$P9_RWALK(r0, &(0x7f0000000400)=ANY=[@ANYBLOB="300000006f0100030001030000000400000000000000100000000003000002000000000300000000000000e646f1c5592139cf131e2bf572fa9728dbfac0390865410f3fa1f25743c497e12cb352eac4046b4500f95cfdfb4cf22a3be5c564a47654334c01d5732d382e27bbccd9b903000000c404000000d32dbd21f3ae58"], 0x7f) getsockopt$inet_sctp6_SCTP_RTOINFO(r1, 0x84, 0x0, &(0x7f0000000080)={0x0, 0x200, 0x2, 0xffffffff}, &(0x7f0000000100)=0x10) 00:28:15 executing program 1: syz_mount_image$reiserfs(&(0x7f0000000180)='rei%erfs\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[@ANYBLOB='jdev=.']) 00:28:15 executing program 2: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(&(0x7f0000000080)=@nbd={'/dev/nbd', 0x0, 0xe9403}, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000240)='hfs\x00\xe6\xa6\xe2\x06g\x96\xb3\v\xf2p\xd5:\x95p\x99\x92\xf2\xc4\x80\x1f\x01\x05\xb8e?\xbfwk\xe4\xe5\xca\x82\xeb\xb1\x04wn*\xf2\xc6\x9d\xc4!\x9e?\x83\x99\x0e\xcc\xa3\x95q.C\xee\x8dIf\xec\xbf\xe8\xb2\t\xedg\x9d\xd9\v\xce\xa3\xa3\xa5\x89F\x03\xefQ\x89\f\xeeRK\x15\xec{D\x9e\x83Z\xabTa\x8e\xcd\x01\xd0\xcfd\xf9c\x87m\xbe>\x81\xba\x9d2\x1c\a,\x12\xbf\xef\xb8m\v\xdf\x8e\xd5\xf5\x1a\xabD\xf6\xe0\x95\xf4\xfeRb_+\xeb\xf9f\xe8\\\x16\xeb\x87\x8e\x8acn4,\x80Q<\x84\xaep\xf9\xfc\x8e\x9f\xed\x06.a\xd5o\x14\r&L\xbd\xb9g\x82;+n\xd5\xcca\v\x86Z\x872\xc3c:`\xf2\x02\xc2\x92\x841\xe7\xca}\"@6}j\x0e\xb7\xa9\xbc\xf3N\xa3\xf3mbd\xfbS\x80\xe0\x11<\x7f\x84\xbe\xa2\xf9\xf7\xee\xf6\x94x\x9d\xe2{\xc5\x83\xc0M\xbb\xd4Io\r\x1c\xd7<\xc0\x84=`\xf1^Y', 0x0, 0x0) 00:28:15 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00004e7000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f, 0x0, 0xffffff7f}, 0xc, &(0x7f0000000440)={&(0x7f00000001c0)=ANY=[@ANYBLOB="1c00000022000100000000000061960d0100000008fe0c009d0a6be0e6d9fc638f19561d6ceb8a6c9239228215fd206cf204e07953", @ANYRES32=0x0], 0x2}, 0x1, 0x0, 0x0, 0xffffffffffffffff}, 0x0) 00:28:15 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000480)=@acquire={0x1ac, 0x17, 0x1, 0x0, 0x0, {{@in=@multicast1}, @in6=@ipv4={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffff000], [], @dev}, {@in=@loopback, @in6=@local}, {{@in, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x2}}}, [@tmpl={0x84, 0x5, [{{@in6=@mcast1, 0x0, 0x3c}, 0x0, @in=@multicast1}, {{@in=@remote, 0x0, 0x3c}, 0x0, @in=@broadcast}]}]}, 0x1ac}}, 0x0) 00:28:15 executing program 0: syz_mount_image$reiserfs(&(0x7f0000000180)='reiierfs\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[@ANYBLOB='jdev=./file0,jdev=']) 00:28:15 executing program 2: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(&(0x7f0000000080)=@nbd={'/dev/nbd', 0x0, 0xeaa01}, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000240)='hfs\x00\xe6\xa6\xe2\x06g\x96\xb3\v\xf2p\xd5:\x95p\x99\x92\xf2\xc4\x80\x1f\x01\x05\xb8e?\xbfwk\xe4\xe5\xca\x82\xeb\xb1\x04wn*\xf2\xc6\x9d\xc4!\x9e?\x83\x99\x0e\xcc\xa3\x95q.C\xee\x8dIf\xec\xbf\xe8\xb2\t\xedg\x9d\xd9\v\xce\xa3\xa3\xa5\x89F\x03\xefQ\x89\f\xeeRK\x15\xec{D\x9e\x83Z\xabTa\x8e\xcd\x01\xd0\xcfd\xf9c\x87m\xbe>\x81\xba\x9d2\x1c\a,\x12\xbf\xef\xb8m\v\xdf\x8e\xd5\xf5\x1a\xabD\xf6\xe0\x95\xf4\xfeRb_+\xeb\xf9f\xe8\\\x16\xeb\x87\x8e\x8acn4,\x80Q<\x84\xaep\xf9\xfc\x8e\x9f\xed\x06.a\xd5o\x14\r&L\xbd\xb9g\x82;+n\xd5\xcca\v\x86Z\x872\xc3c:`\xf2\x02\xc2\x92\x841\xe7\xca}\"@6}j\x0e\xb7\xa9\xbc\xf3N\xa3\xf3mbd\xfbS\x80\xe0\x11<\x7f\x84\xbe\xa2\xf9\xf7\xee\xf6\x94x\x9d\xe2{\xc5\x83\xc0M\xbb\xd4Io\r\x1c\xd7<\xc0\x84=`\xf1^Y', 0x0, 0x0) 00:28:15 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00004e7000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f, 0x0, 0xffffff9e}, 0xc, &(0x7f0000000440)={&(0x7f00000001c0)=ANY=[@ANYBLOB="1c00000022000100000000000061960d0100000008fe0c009d0a6be0e6d9fc638f19561d6ceb8a6c9239228215fd206cf204e07953", @ANYRES32=0x0], 0x2}, 0x1, 0x0, 0x0, 0xffffffffffffffff}, 0x0) 00:28:15 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000480)=@acquire={0x1ac, 0x17, 0x1, 0x0, 0x0, {{@in=@multicast1}, @in6=@ipv4={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffff7f], [], @dev}, {@in=@loopback, @in6=@local}, {{@in, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x2}}}, [@tmpl={0x84, 0x5, [{{@in6=@mcast1, 0x0, 0x3c}, 0x0, @in=@multicast1}, {{@in=@remote, 0x0, 0x3c}, 0x0, @in=@broadcast}]}]}, 0x1ac}}, 0x0) 00:28:15 executing program 1: syz_mount_image$reiserfs(&(0x7f0000000180)='rei*erfs\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[@ANYBLOB='jdev=.']) 00:28:16 executing program 2: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(&(0x7f0000000080)=@nbd={'/dev/nbd', 0x0, 0xeb202}, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000240)='hfs\x00\xe6\xa6\xe2\x06g\x96\xb3\v\xf2p\xd5:\x95p\x99\x92\xf2\xc4\x80\x1f\x01\x05\xb8e?\xbfwk\xe4\xe5\xca\x82\xeb\xb1\x04wn*\xf2\xc6\x9d\xc4!\x9e?\x83\x99\x0e\xcc\xa3\x95q.C\xee\x8dIf\xec\xbf\xe8\xb2\t\xedg\x9d\xd9\v\xce\xa3\xa3\xa5\x89F\x03\xefQ\x89\f\xeeRK\x15\xec{D\x9e\x83Z\xabTa\x8e\xcd\x01\xd0\xcfd\xf9c\x87m\xbe>\x81\xba\x9d2\x1c\a,\x12\xbf\xef\xb8m\v\xdf\x8e\xd5\xf5\x1a\xabD\xf6\xe0\x95\xf4\xfeRb_+\xeb\xf9f\xe8\\\x16\xeb\x87\x8e\x8acn4,\x80Q<\x84\xaep\xf9\xfc\x8e\x9f\xed\x06.a\xd5o\x14\r&L\xbd\xb9g\x82;+n\xd5\xcca\v\x86Z\x872\xc3c:`\xf2\x02\xc2\x92\x841\xe7\xca}\"@6}j\x0e\xb7\xa9\xbc\xf3N\xa3\xf3mbd\xfbS\x80\xe0\x11<\x7f\x84\xbe\xa2\xf9\xf7\xee\xf6\x94x\x9d\xe2{\xc5\x83\xc0M\xbb\xd4Io\r\x1c\xd7<\xc0\x84=`\xf1^Y', 0x0, 0x0) 00:28:16 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000180)='./control\x00', 0x0) get_thread_area(0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x3) write$binfmt_script(r0, &(0x7f0000000bc0)=ANY=[@ANYBLOB="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"], 0x145) close(r0) execve(&(0x7f0000000180)='./file0\x00', &(0x7f0000000140), &(0x7f0000000140)) r1 = open(&(0x7f0000000000)='./control\x00', 0x80, 0x10) statfs(&(0x7f0000000380)='./control\x00', &(0x7f00000003c0)=""/20) write$P9_RWALK(r0, &(0x7f0000000400)=ANY=[@ANYBLOB="300000006f0100030001030000000400000000000000100000000003000002000000000300000000000000e646f1c5592139cf131e2bf572fa9728dbfac0390865410f3fa1f25743c497e12cb352eac4046b4500f95cfdfb4cf22a3be5c564a47654334c01d5732d382e27bbccd9b903000000c404000000d32dbd21f3ae58"], 0x7f) getsockopt$inet_sctp6_SCTP_RTOINFO(r1, 0x84, 0x0, &(0x7f0000000080)={0x0, 0x200, 0x2, 0xffffffff}, &(0x7f0000000100)=0x10) 00:28:16 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000480)=@acquire={0x1ac, 0x17, 0x1, 0x0, 0x0, {{@in=@multicast1}, @in6=@ipv4={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffff9e], [], @dev}, {@in=@loopback, @in6=@local}, {{@in, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x2}}}, [@tmpl={0x84, 0x5, [{{@in6=@mcast1, 0x0, 0x3c}, 0x0, @in=@multicast1}, {{@in=@remote, 0x0, 0x3c}, 0x0, @in=@broadcast}]}]}, 0x1ac}}, 0x0) 00:28:16 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00004e7000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f, 0x0, 0xfffffff0}, 0xc, &(0x7f0000000440)={&(0x7f00000001c0)=ANY=[@ANYBLOB="1c00000022000100000000000061960d0100000008fe0c009d0a6be0e6d9fc638f19561d6ceb8a6c9239228215fd206cf204e07953", @ANYRES32=0x0], 0x2}, 0x1, 0x0, 0x0, 0xffffffffffffffff}, 0x0) 00:28:16 executing program 2: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(&(0x7f0000000080)=@nbd={'/dev/nbd', 0x0, 0xeba02}, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000240)='hfs\x00\xe6\xa6\xe2\x06g\x96\xb3\v\xf2p\xd5:\x95p\x99\x92\xf2\xc4\x80\x1f\x01\x05\xb8e?\xbfwk\xe4\xe5\xca\x82\xeb\xb1\x04wn*\xf2\xc6\x9d\xc4!\x9e?\x83\x99\x0e\xcc\xa3\x95q.C\xee\x8dIf\xec\xbf\xe8\xb2\t\xedg\x9d\xd9\v\xce\xa3\xa3\xa5\x89F\x03\xefQ\x89\f\xeeRK\x15\xec{D\x9e\x83Z\xabTa\x8e\xcd\x01\xd0\xcfd\xf9c\x87m\xbe>\x81\xba\x9d2\x1c\a,\x12\xbf\xef\xb8m\v\xdf\x8e\xd5\xf5\x1a\xabD\xf6\xe0\x95\xf4\xfeRb_+\xeb\xf9f\xe8\\\x16\xeb\x87\x8e\x8acn4,\x80Q<\x84\xaep\xf9\xfc\x8e\x9f\xed\x06.a\xd5o\x14\r&L\xbd\xb9g\x82;+n\xd5\xcca\v\x86Z\x872\xc3c:`\xf2\x02\xc2\x92\x841\xe7\xca}\"@6}j\x0e\xb7\xa9\xbc\xf3N\xa3\xf3mbd\xfbS\x80\xe0\x11<\x7f\x84\xbe\xa2\xf9\xf7\xee\xf6\x94x\x9d\xe2{\xc5\x83\xc0M\xbb\xd4Io\r\x1c\xd7<\xc0\x84=`\xf1^Y', 0x0, 0x0) 00:28:16 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000480)=@acquire={0x1ac, 0x17, 0x1, 0x0, 0x0, {{@in=@multicast1}, @in6=@ipv4={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffff0], [], @dev}, {@in=@loopback, @in6=@local}, {{@in, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x2}}}, [@tmpl={0x84, 0x5, [{{@in6=@mcast1, 0x0, 0x3c}, 0x0, @in=@multicast1}, {{@in=@remote, 0x0, 0x3c}, 0x0, @in=@broadcast}]}]}, 0x1ac}}, 0x0) 00:28:16 executing program 0: syz_mount_image$reiserfs(&(0x7f0000000180)='reikerfs\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[@ANYBLOB='jdev=./file0,jdev=']) 00:28:16 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00004e7000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f, 0x0, 0xf0ffffffffffff}, 0xc, &(0x7f0000000440)={&(0x7f00000001c0)=ANY=[@ANYBLOB="1c00000022000100000000000061960d0100000008fe0c009d0a6be0e6d9fc638f19561d6ceb8a6c9239228215fd206cf204e07953", @ANYRES32=0x0], 0x2}, 0x1, 0x0, 0x0, 0xffffffffffffffff}, 0x0) 00:28:16 executing program 2: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(&(0x7f0000000080)=@nbd={'/dev/nbd', 0x0, 0xeda01}, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000240)='hfs\x00\xe6\xa6\xe2\x06g\x96\xb3\v\xf2p\xd5:\x95p\x99\x92\xf2\xc4\x80\x1f\x01\x05\xb8e?\xbfwk\xe4\xe5\xca\x82\xeb\xb1\x04wn*\xf2\xc6\x9d\xc4!\x9e?\x83\x99\x0e\xcc\xa3\x95q.C\xee\x8dIf\xec\xbf\xe8\xb2\t\xedg\x9d\xd9\v\xce\xa3\xa3\xa5\x89F\x03\xefQ\x89\f\xeeRK\x15\xec{D\x9e\x83Z\xabTa\x8e\xcd\x01\xd0\xcfd\xf9c\x87m\xbe>\x81\xba\x9d2\x1c\a,\x12\xbf\xef\xb8m\v\xdf\x8e\xd5\xf5\x1a\xabD\xf6\xe0\x95\xf4\xfeRb_+\xeb\xf9f\xe8\\\x16\xeb\x87\x8e\x8acn4,\x80Q<\x84\xaep\xf9\xfc\x8e\x9f\xed\x06.a\xd5o\x14\r&L\xbd\xb9g\x82;+n\xd5\xcca\v\x86Z\x872\xc3c:`\xf2\x02\xc2\x92\x841\xe7\xca}\"@6}j\x0e\xb7\xa9\xbc\xf3N\xa3\xf3mbd\xfbS\x80\xe0\x11<\x7f\x84\xbe\xa2\xf9\xf7\xee\xf6\x94x\x9d\xe2{\xc5\x83\xc0M\xbb\xd4Io\r\x1c\xd7<\xc0\x84=`\xf1^Y', 0x0, 0x0) 00:28:16 executing program 1: syz_mount_image$reiserfs(&(0x7f0000000180)='rei+erfs\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[@ANYBLOB='jdev=.']) 00:28:16 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000180)='./control\x00', 0x0) get_thread_area(0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x3) write$binfmt_script(r0, &(0x7f0000000bc0)=ANY=[@ANYBLOB="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"], 0x145) close(r0) execve(&(0x7f0000000180)='./file0\x00', &(0x7f0000000140), &(0x7f0000000140)) r1 = open(&(0x7f0000000000)='./control\x00', 0x80, 0x10) statfs(&(0x7f0000000380)='./control\x00', &(0x7f00000003c0)=""/20) write$P9_RWALK(r0, &(0x7f0000000400)=ANY=[@ANYBLOB="300000006f0100030001030000000400000000000000100000000003000002000000000300000000000000e646f1c5592139cf131e2bf572fa9728dbfac0390865410f3fa1f25743c497e12cb352eac4046b4500f95cfdfb4cf22a3be5c564a47654334c01d5732d382e27bbccd9b903000000c404000000d32dbd21f3ae58"], 0x7f) getsockopt$inet_sctp6_SCTP_RTOINFO(r1, 0x84, 0x0, &(0x7f0000000080)={0x0, 0x200, 0x2, 0xffffffff}, &(0x7f0000000100)=0x10) 00:28:16 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000480)=@acquire={0x1ac, 0x17, 0x1, 0x0, 0x0, {{@in=@multicast1}, @in6=@ipv4={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc], [], @dev}, {@in=@loopback, @in6=@local}, {{@in, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x2}}}, [@tmpl={0x84, 0x5, [{{@in6=@mcast1, 0x0, 0x3c}, 0x0, @in=@multicast1}, {{@in=@remote, 0x0, 0x3c}, 0x0, @in=@broadcast}]}]}, 0x1ac}}, 0x0) 00:28:16 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000480)=@acquire={0x1ac, 0x17, 0x1, 0x0, 0x0, {{@in=@multicast1}, @in6=@ipv4={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf0ffffffffffff], [], @dev}, {@in=@loopback, @in6=@local}, {{@in, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x2}}}, [@tmpl={0x84, 0x5, [{{@in6=@mcast1, 0x0, 0x3c}, 0x0, @in=@multicast1}, {{@in=@remote, 0x0, 0x3c}, 0x0, @in=@broadcast}]}]}, 0x1ac}}, 0x0) 00:28:16 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00004e7000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f, 0x0, 0x100000000000000}, 0xc, &(0x7f0000000440)={&(0x7f00000001c0)=ANY=[@ANYBLOB="1c00000022000100000000000061960d0100000008fe0c009d0a6be0e6d9fc638f19561d6ceb8a6c9239228215fd206cf204e07953", @ANYRES32=0x0], 0x2}, 0x1, 0x0, 0x0, 0xffffffffffffffff}, 0x0) 00:28:16 executing program 2: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(&(0x7f0000000080)=@nbd={'/dev/nbd', 0x0, 0xeda03}, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000240)='hfs\x00\xe6\xa6\xe2\x06g\x96\xb3\v\xf2p\xd5:\x95p\x99\x92\xf2\xc4\x80\x1f\x01\x05\xb8e?\xbfwk\xe4\xe5\xca\x82\xeb\xb1\x04wn*\xf2\xc6\x9d\xc4!\x9e?\x83\x99\x0e\xcc\xa3\x95q.C\xee\x8dIf\xec\xbf\xe8\xb2\t\xedg\x9d\xd9\v\xce\xa3\xa3\xa5\x89F\x03\xefQ\x89\f\xeeRK\x15\xec{D\x9e\x83Z\xabTa\x8e\xcd\x01\xd0\xcfd\xf9c\x87m\xbe>\x81\xba\x9d2\x1c\a,\x12\xbf\xef\xb8m\v\xdf\x8e\xd5\xf5\x1a\xabD\xf6\xe0\x95\xf4\xfeRb_+\xeb\xf9f\xe8\\\x16\xeb\x87\x8e\x8acn4,\x80Q<\x84\xaep\xf9\xfc\x8e\x9f\xed\x06.a\xd5o\x14\r&L\xbd\xb9g\x82;+n\xd5\xcca\v\x86Z\x872\xc3c:`\xf2\x02\xc2\x92\x841\xe7\xca}\"@6}j\x0e\xb7\xa9\xbc\xf3N\xa3\xf3mbd\xfbS\x80\xe0\x11<\x7f\x84\xbe\xa2\xf9\xf7\xee\xf6\x94x\x9d\xe2{\xc5\x83\xc0M\xbb\xd4Io\r\x1c\xd7<\xc0\x84=`\xf1^Y', 0x0, 0x0) 00:28:16 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000180)='./control\x00', 0x0) get_thread_area(0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x3) write$binfmt_script(r0, &(0x7f0000000bc0)=ANY=[@ANYBLOB="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"], 0x145) close(r0) execve(&(0x7f0000000180)='./file0\x00', &(0x7f0000000140), &(0x7f0000000140)) r1 = open(&(0x7f0000000000)='./control\x00', 0x80, 0x10) statfs(&(0x7f0000000380)='./control\x00', &(0x7f00000003c0)=""/20) write$P9_RWALK(r0, &(0x7f0000000400)=ANY=[@ANYBLOB="300000006f0100030001030000000400000000000000100000000003000002000000000300000000000000e646f1c5592139cf131e2bf572fa9728dbfac0390865410f3fa1f25743c497e12cb352eac4046b4500f95cfdfb4cf22a3be5c564a47654334c01d5732d382e27bbccd9b903000000c404000000d32dbd21f3ae581d32e69ef9327f7b487d1b4f4502838c08136678bd"], 0x94) getsockopt$inet_sctp6_SCTP_RTOINFO(r1, 0x84, 0x0, &(0x7f0000000080)={0x0, 0x200, 0x2, 0xffffffff}, &(0x7f0000000100)=0x10) 00:28:16 executing program 0: syz_mount_image$reiserfs(&(0x7f0000000180)='reilerfs\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[@ANYBLOB='jdev=./file0,jdev=']) 00:28:17 executing program 2: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(&(0x7f0000000080)=@nbd={'/dev/nbd', 0x0, 0xeea03}, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000240)='hfs\x00\xe6\xa6\xe2\x06g\x96\xb3\v\xf2p\xd5:\x95p\x99\x92\xf2\xc4\x80\x1f\x01\x05\xb8e?\xbfwk\xe4\xe5\xca\x82\xeb\xb1\x04wn*\xf2\xc6\x9d\xc4!\x9e?\x83\x99\x0e\xcc\xa3\x95q.C\xee\x8dIf\xec\xbf\xe8\xb2\t\xedg\x9d\xd9\v\xce\xa3\xa3\xa5\x89F\x03\xefQ\x89\f\xeeRK\x15\xec{D\x9e\x83Z\xabTa\x8e\xcd\x01\xd0\xcfd\xf9c\x87m\xbe>\x81\xba\x9d2\x1c\a,\x12\xbf\xef\xb8m\v\xdf\x8e\xd5\xf5\x1a\xabD\xf6\xe0\x95\xf4\xfeRb_+\xeb\xf9f\xe8\\\x16\xeb\x87\x8e\x8acn4,\x80Q<\x84\xaep\xf9\xfc\x8e\x9f\xed\x06.a\xd5o\x14\r&L\xbd\xb9g\x82;+n\xd5\xcca\v\x86Z\x872\xc3c:`\xf2\x02\xc2\x92\x841\xe7\xca}\"@6}j\x0e\xb7\xa9\xbc\xf3N\xa3\xf3mbd\xfbS\x80\xe0\x11<\x7f\x84\xbe\xa2\xf9\xf7\xee\xf6\x94x\x9d\xe2{\xc5\x83\xc0M\xbb\xd4Io\r\x1c\xd7<\xc0\x84=`\xf1^Y', 0x0, 0x0) 00:28:17 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00004e7000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f, 0x0, 0x200000000000000}, 0xc, &(0x7f0000000440)={&(0x7f00000001c0)=ANY=[@ANYBLOB="1c00000022000100000000000061960d0100000008fe0c009d0a6be0e6d9fc638f19561d6ceb8a6c9239228215fd206cf204e07953", @ANYRES32=0x0], 0x2}, 0x1, 0x0, 0x0, 0xffffffffffffffff}, 0x0) 00:28:17 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000480)=@acquire={0x1ac, 0x17, 0x1, 0x0, 0x0, {{@in=@multicast1}, @in6=@ipv4={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000000000], [], @dev}, {@in=@loopback, @in6=@local}, {{@in, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x2}}}, [@tmpl={0x84, 0x5, [{{@in6=@mcast1, 0x0, 0x3c}, 0x0, @in=@multicast1}, {{@in=@remote, 0x0, 0x3c}, 0x0, @in=@broadcast}]}]}, 0x1ac}}, 0x0) 00:28:17 executing program 1: syz_mount_image$reiserfs(&(0x7f0000000180)='rei-erfs\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[@ANYBLOB='jdev=.']) 00:28:17 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000180)='./control\x00', 0x0) get_thread_area(0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x3) write$binfmt_script(r0, &(0x7f0000000bc0)=ANY=[@ANYBLOB="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"], 0x145) close(r0) execve(&(0x7f0000000180)='./file0\x00', &(0x7f0000000140), &(0x7f0000000140)) r1 = open(&(0x7f0000000000)='./control\x00', 0x80, 0x10) statfs(&(0x7f0000000380)='./control\x00', &(0x7f00000003c0)=""/20) write$P9_RWALK(r0, &(0x7f0000000400)=ANY=[@ANYBLOB="300000006f0100030001030000000400000000000000100000000003000002000000000300000000000000e646f1c5592139cf131e2bf572fa9728dbfac0390865410f3fa1f25743c497e12cb352eac4046b4500f95cfdfb4cf22a3be5c564a47654334c01d5732d382e27bbccd9b903000000c404000000d32dbd21f3ae581d32e69ef9327f7b487d1b4f4502838c08136678bd"], 0x94) getsockopt$inet_sctp6_SCTP_RTOINFO(r1, 0x84, 0x0, &(0x7f0000000080)={0x0, 0x200, 0x2, 0xffffffff}, &(0x7f0000000100)=0x10) 00:28:17 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000480)=@acquire={0x1ac, 0x17, 0x1, 0x0, 0x0, {{@in=@multicast1}, @in6=@ipv4={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000000000], [], @dev}, {@in=@loopback, @in6=@local}, {{@in, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x2}}}, [@tmpl={0x84, 0x5, [{{@in6=@mcast1, 0x0, 0x3c}, 0x0, @in=@multicast1}, {{@in=@remote, 0x0, 0x3c}, 0x0, @in=@broadcast}]}]}, 0x1ac}}, 0x0) 00:28:17 executing program 2: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(&(0x7f0000000080)=@nbd={'/dev/nbd', 0x0, 0xeec01}, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000240)='hfs\x00\xe6\xa6\xe2\x06g\x96\xb3\v\xf2p\xd5:\x95p\x99\x92\xf2\xc4\x80\x1f\x01\x05\xb8e?\xbfwk\xe4\xe5\xca\x82\xeb\xb1\x04wn*\xf2\xc6\x9d\xc4!\x9e?\x83\x99\x0e\xcc\xa3\x95q.C\xee\x8dIf\xec\xbf\xe8\xb2\t\xedg\x9d\xd9\v\xce\xa3\xa3\xa5\x89F\x03\xefQ\x89\f\xeeRK\x15\xec{D\x9e\x83Z\xabTa\x8e\xcd\x01\xd0\xcfd\xf9c\x87m\xbe>\x81\xba\x9d2\x1c\a,\x12\xbf\xef\xb8m\v\xdf\x8e\xd5\xf5\x1a\xabD\xf6\xe0\x95\xf4\xfeRb_+\xeb\xf9f\xe8\\\x16\xeb\x87\x8e\x8acn4,\x80Q<\x84\xaep\xf9\xfc\x8e\x9f\xed\x06.a\xd5o\x14\r&L\xbd\xb9g\x82;+n\xd5\xcca\v\x86Z\x872\xc3c:`\xf2\x02\xc2\x92\x841\xe7\xca}\"@6}j\x0e\xb7\xa9\xbc\xf3N\xa3\xf3mbd\xfbS\x80\xe0\x11<\x7f\x84\xbe\xa2\xf9\xf7\xee\xf6\x94x\x9d\xe2{\xc5\x83\xc0M\xbb\xd4Io\r\x1c\xd7<\xc0\x84=`\xf1^Y', 0x0, 0x0) 00:28:17 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00004e7000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f, 0x0, 0x400000000000000}, 0xc, &(0x7f0000000440)={&(0x7f00000001c0)=ANY=[@ANYBLOB="1c00000022000100000000000061960d0100000008fe0c009d0a6be0e6d9fc638f19561d6ceb8a6c9239228215fd206cf204e07953", @ANYRES32=0x0], 0x2}, 0x1, 0x0, 0x0, 0xffffffffffffffff}, 0x0) [ 887.678695][ T26] audit: type=1800 audit(1697.394:39): pid=4071 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor4" name="file0" dev="sda1" ino=16671 res=0 00:28:17 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000480)=@acquire={0x1ac, 0x17, 0x1, 0x0, 0x0, {{@in=@multicast1}, @in6=@ipv4={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x300000000000000], [], @dev}, {@in=@loopback, @in6=@local}, {{@in, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x2}}}, [@tmpl={0x84, 0x5, [{{@in6=@mcast1, 0x0, 0x3c}, 0x0, @in=@multicast1}, {{@in=@remote, 0x0, 0x3c}, 0x0, @in=@broadcast}]}]}, 0x1ac}}, 0x0) 00:28:17 executing program 0: syz_mount_image$reiserfs(&(0x7f0000000180)='reioerfs\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[@ANYBLOB='jdev=./file0,jdev=']) 00:28:17 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00004e7000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f, 0x0, 0x800000000000000}, 0xc, &(0x7f0000000440)={&(0x7f00000001c0)=ANY=[@ANYBLOB="1c00000022000100000000000061960d0100000008fe0c009d0a6be0e6d9fc638f19561d6ceb8a6c9239228215fd206cf204e07953", @ANYRES32=0x0], 0x2}, 0x1, 0x0, 0x0, 0xffffffffffffffff}, 0x0) 00:28:17 executing program 2: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(&(0x7f0000000080)=@nbd={'/dev/nbd', 0x0, 0xef000}, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000240)='hfs\x00\xe6\xa6\xe2\x06g\x96\xb3\v\xf2p\xd5:\x95p\x99\x92\xf2\xc4\x80\x1f\x01\x05\xb8e?\xbfwk\xe4\xe5\xca\x82\xeb\xb1\x04wn*\xf2\xc6\x9d\xc4!\x9e?\x83\x99\x0e\xcc\xa3\x95q.C\xee\x8dIf\xec\xbf\xe8\xb2\t\xedg\x9d\xd9\v\xce\xa3\xa3\xa5\x89F\x03\xefQ\x89\f\xeeRK\x15\xec{D\x9e\x83Z\xabTa\x8e\xcd\x01\xd0\xcfd\xf9c\x87m\xbe>\x81\xba\x9d2\x1c\a,\x12\xbf\xef\xb8m\v\xdf\x8e\xd5\xf5\x1a\xabD\xf6\xe0\x95\xf4\xfeRb_+\xeb\xf9f\xe8\\\x16\xeb\x87\x8e\x8acn4,\x80Q<\x84\xaep\xf9\xfc\x8e\x9f\xed\x06.a\xd5o\x14\r&L\xbd\xb9g\x82;+n\xd5\xcca\v\x86Z\x872\xc3c:`\xf2\x02\xc2\x92\x841\xe7\xca}\"@6}j\x0e\xb7\xa9\xbc\xf3N\xa3\xf3mbd\xfbS\x80\xe0\x11<\x7f\x84\xbe\xa2\xf9\xf7\xee\xf6\x94x\x9d\xe2{\xc5\x83\xc0M\xbb\xd4Io\r\x1c\xd7<\xc0\x84=`\xf1^Y', 0x0, 0x0) [ 887.924454][ T2480] block nbd2: Attempted send on invalid socket [ 887.930679][ T2480] print_req_error: I/O error, dev nbd2, sector 2 flags 0 [ 887.941114][ T4096] hfs: can't find a HFS filesystem on dev nbd2 00:28:17 executing program 1: syz_mount_image$reiserfs(&(0x7f0000000180)='rei.erfs\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[@ANYBLOB='jdev=.']) 00:28:17 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000180)='./control\x00', 0x0) get_thread_area(0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x3) write$binfmt_script(r0, &(0x7f0000000bc0)=ANY=[@ANYBLOB="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"], 0x145) close(r0) execve(&(0x7f0000000180)='./file0\x00', &(0x7f0000000140), &(0x7f0000000140)) r1 = open(&(0x7f0000000000)='./control\x00', 0x80, 0x10) statfs(&(0x7f0000000380)='./control\x00', &(0x7f00000003c0)=""/20) write$P9_RWALK(r0, &(0x7f0000000400)=ANY=[@ANYBLOB="300000006f0100030001030000000400000000000000100000000003000002000000000300000000000000e646f1c5592139cf131e2bf572fa9728dbfac0390865410f3fa1f25743c497e12cb352eac4046b4500f95cfdfb4cf22a3be5c564a47654334c01d5732d382e27bbccd9b903000000c404000000d32dbd21f3ae581d32e69ef9327f7b487d1b4f4502838c08136678bd"], 0x94) getsockopt$inet_sctp6_SCTP_RTOINFO(r1, 0x84, 0x0, &(0x7f0000000080)={0x0, 0x200, 0x2, 0xffffffff}, &(0x7f0000000100)=0x10) 00:28:17 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000480)=@acquire={0x1ac, 0x17, 0x1, 0x0, 0x0, {{@in=@multicast1}, @in6=@ipv4={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400000000000000], [], @dev}, {@in=@loopback, @in6=@local}, {{@in, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x2}}}, [@tmpl={0x84, 0x5, [{{@in6=@mcast1, 0x0, 0x3c}, 0x0, @in=@multicast1}, {{@in=@remote, 0x0, 0x3c}, 0x0, @in=@broadcast}]}]}, 0x1ac}}, 0x0) [ 888.013722][ T2481] block nbd2: Attempted send on invalid socket [ 888.019957][ T2481] print_req_error: I/O error, dev nbd2, sector 2 flags 0 [ 888.027918][ T4096] hfs: can't find a HFS filesystem on dev nbd2 00:28:17 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00004e7000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f, 0x0, 0xa00000000000000}, 0xc, &(0x7f0000000440)={&(0x7f00000001c0)=ANY=[@ANYBLOB="1c00000022000100000000000061960d0100000008fe0c009d0a6be0e6d9fc638f19561d6ceb8a6c9239228215fd206cf204e07953", @ANYRES32=0x0], 0x2}, 0x1, 0x0, 0x0, 0xffffffffffffffff}, 0x0) 00:28:17 executing program 2: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(&(0x7f0000000080)=@nbd={'/dev/nbd', 0x0, 0xef201}, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000240)='hfs\x00\xe6\xa6\xe2\x06g\x96\xb3\v\xf2p\xd5:\x95p\x99\x92\xf2\xc4\x80\x1f\x01\x05\xb8e?\xbfwk\xe4\xe5\xca\x82\xeb\xb1\x04wn*\xf2\xc6\x9d\xc4!\x9e?\x83\x99\x0e\xcc\xa3\x95q.C\xee\x8dIf\xec\xbf\xe8\xb2\t\xedg\x9d\xd9\v\xce\xa3\xa3\xa5\x89F\x03\xefQ\x89\f\xeeRK\x15\xec{D\x9e\x83Z\xabTa\x8e\xcd\x01\xd0\xcfd\xf9c\x87m\xbe>\x81\xba\x9d2\x1c\a,\x12\xbf\xef\xb8m\v\xdf\x8e\xd5\xf5\x1a\xabD\xf6\xe0\x95\xf4\xfeRb_+\xeb\xf9f\xe8\\\x16\xeb\x87\x8e\x8acn4,\x80Q<\x84\xaep\xf9\xfc\x8e\x9f\xed\x06.a\xd5o\x14\r&L\xbd\xb9g\x82;+n\xd5\xcca\v\x86Z\x872\xc3c:`\xf2\x02\xc2\x92\x841\xe7\xca}\"@6}j\x0e\xb7\xa9\xbc\xf3N\xa3\xf3mbd\xfbS\x80\xe0\x11<\x7f\x84\xbe\xa2\xf9\xf7\xee\xf6\x94x\x9d\xe2{\xc5\x83\xc0M\xbb\xd4Io\r\x1c\xd7<\xc0\x84=`\xf1^Y', 0x0, 0x0) 00:28:17 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000480)=@acquire={0x1ac, 0x17, 0x1, 0x0, 0x0, {{@in=@multicast1}, @in6=@ipv4={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x500000000000000], [], @dev}, {@in=@loopback, @in6=@local}, {{@in, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x2}}}, [@tmpl={0x84, 0x5, [{{@in6=@mcast1, 0x0, 0x3c}, 0x0, @in=@multicast1}, {{@in=@remote, 0x0, 0x3c}, 0x0, @in=@broadcast}]}]}, 0x1ac}}, 0x0) 00:28:17 executing program 0: syz_mount_image$reiserfs(&(0x7f0000000180)='reiperfs\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[@ANYBLOB='jdev=./file0,jdev=']) 00:28:17 executing program 2: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(&(0x7f0000000080)=@nbd={'/dev/nbd', 0x0, 0xef203}, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000240)='hfs\x00\xe6\xa6\xe2\x06g\x96\xb3\v\xf2p\xd5:\x95p\x99\x92\xf2\xc4\x80\x1f\x01\x05\xb8e?\xbfwk\xe4\xe5\xca\x82\xeb\xb1\x04wn*\xf2\xc6\x9d\xc4!\x9e?\x83\x99\x0e\xcc\xa3\x95q.C\xee\x8dIf\xec\xbf\xe8\xb2\t\xedg\x9d\xd9\v\xce\xa3\xa3\xa5\x89F\x03\xefQ\x89\f\xeeRK\x15\xec{D\x9e\x83Z\xabTa\x8e\xcd\x01\xd0\xcfd\xf9c\x87m\xbe>\x81\xba\x9d2\x1c\a,\x12\xbf\xef\xb8m\v\xdf\x8e\xd5\xf5\x1a\xabD\xf6\xe0\x95\xf4\xfeRb_+\xeb\xf9f\xe8\\\x16\xeb\x87\x8e\x8acn4,\x80Q<\x84\xaep\xf9\xfc\x8e\x9f\xed\x06.a\xd5o\x14\r&L\xbd\xb9g\x82;+n\xd5\xcca\v\x86Z\x872\xc3c:`\xf2\x02\xc2\x92\x841\xe7\xca}\"@6}j\x0e\xb7\xa9\xbc\xf3N\xa3\xf3mbd\xfbS\x80\xe0\x11<\x7f\x84\xbe\xa2\xf9\xf7\xee\xf6\x94x\x9d\xe2{\xc5\x83\xc0M\xbb\xd4Io\r\x1c\xd7<\xc0\x84=`\xf1^Y', 0x0, 0x0) 00:28:18 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000180)='./control\x00', 0x0) get_thread_area(0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x3) write$binfmt_script(r0, &(0x7f0000000bc0)=ANY=[@ANYBLOB="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"], 0x145) close(r0) execve(&(0x7f0000000180)='./file0\x00', &(0x7f0000000140), &(0x7f0000000140)) r1 = open(&(0x7f0000000000)='./control\x00', 0x80, 0x10) statfs(&(0x7f0000000380)='./control\x00', &(0x7f00000003c0)=""/20) write$P9_RWALK(r0, &(0x7f0000000400)=ANY=[@ANYBLOB="300000006f0100030001030000000400000000000000100000000003000002000000000300000000000000e646f1c5592139cf131e2bf572fa9728dbfac0390865410f3fa1f25743c497e12cb352eac4046b4500f95cfdfb4cf22a3be5c564a47654334c01d5732d382e27bbccd9b903000000c404000000d32dbd21f3ae581d32e69ef9327f7b487d1b4f4502838c08136678bd90733173ab78d6fc264b"], 0x9e) getsockopt$inet_sctp6_SCTP_RTOINFO(r1, 0x84, 0x0, &(0x7f0000000080)={0x0, 0x200, 0x2, 0xffffffff}, &(0x7f0000000100)=0x10) 00:28:18 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00004e7000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f, 0x0, 0xe00000000000000}, 0xc, &(0x7f0000000440)={&(0x7f00000001c0)=ANY=[@ANYBLOB="1c00000022000100000000000061960d0100000008fe0c009d0a6be0e6d9fc638f19561d6ceb8a6c9239228215fd206cf204e07953", @ANYRES32=0x0], 0x2}, 0x1, 0x0, 0x0, 0xffffffffffffffff}, 0x0) 00:28:18 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000480)=@acquire={0x1ac, 0x17, 0x1, 0x0, 0x0, {{@in=@multicast1}, @in6=@ipv4={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x600000000000000], [], @dev}, {@in=@loopback, @in6=@local}, {{@in, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x2}}}, [@tmpl={0x84, 0x5, [{{@in6=@mcast1, 0x0, 0x3c}, 0x0, @in=@multicast1}, {{@in=@remote, 0x0, 0x3c}, 0x0, @in=@broadcast}]}]}, 0x1ac}}, 0x0) 00:28:18 executing program 2: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(&(0x7f0000000080)=@nbd={'/dev/nbd', 0x0, 0xef503}, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000240)='hfs\x00\xe6\xa6\xe2\x06g\x96\xb3\v\xf2p\xd5:\x95p\x99\x92\xf2\xc4\x80\x1f\x01\x05\xb8e?\xbfwk\xe4\xe5\xca\x82\xeb\xb1\x04wn*\xf2\xc6\x9d\xc4!\x9e?\x83\x99\x0e\xcc\xa3\x95q.C\xee\x8dIf\xec\xbf\xe8\xb2\t\xedg\x9d\xd9\v\xce\xa3\xa3\xa5\x89F\x03\xefQ\x89\f\xeeRK\x15\xec{D\x9e\x83Z\xabTa\x8e\xcd\x01\xd0\xcfd\xf9c\x87m\xbe>\x81\xba\x9d2\x1c\a,\x12\xbf\xef\xb8m\v\xdf\x8e\xd5\xf5\x1a\xabD\xf6\xe0\x95\xf4\xfeRb_+\xeb\xf9f\xe8\\\x16\xeb\x87\x8e\x8acn4,\x80Q<\x84\xaep\xf9\xfc\x8e\x9f\xed\x06.a\xd5o\x14\r&L\xbd\xb9g\x82;+n\xd5\xcca\v\x86Z\x872\xc3c:`\xf2\x02\xc2\x92\x841\xe7\xca}\"@6}j\x0e\xb7\xa9\xbc\xf3N\xa3\xf3mbd\xfbS\x80\xe0\x11<\x7f\x84\xbe\xa2\xf9\xf7\xee\xf6\x94x\x9d\xe2{\xc5\x83\xc0M\xbb\xd4Io\r\x1c\xd7<\xc0\x84=`\xf1^Y', 0x0, 0x0) 00:28:18 executing program 1: syz_mount_image$reiserfs(&(0x7f0000000180)='rei0erfs\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[@ANYBLOB='jdev=.']) 00:28:18 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00004e7000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f, 0x0, 0x1000000000000000}, 0xc, &(0x7f0000000440)={&(0x7f00000001c0)=ANY=[@ANYBLOB="1c00000022000100000000000061960d0100000008fe0c009d0a6be0e6d9fc638f19561d6ceb8a6c9239228215fd206cf204e07953", @ANYRES32=0x0], 0x2}, 0x1, 0x0, 0x0, 0xffffffffffffffff}, 0x0) 00:28:18 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000480)=@acquire={0x1ac, 0x17, 0x1, 0x0, 0x0, {{@in=@multicast1}, @in6=@ipv4={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800000000000000], [], @dev}, {@in=@loopback, @in6=@local}, {{@in, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x2}}}, [@tmpl={0x84, 0x5, [{{@in6=@mcast1, 0x0, 0x3c}, 0x0, @in=@multicast1}, {{@in=@remote, 0x0, 0x3c}, 0x0, @in=@broadcast}]}]}, 0x1ac}}, 0x0) 00:28:18 executing program 0: syz_mount_image$reiserfs(&(0x7f0000000180)='reiterfs\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[@ANYBLOB='jdev=./file0,jdev=']) 00:28:18 executing program 2: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(&(0x7f0000000080)=@nbd={'/dev/nbd', 0x0, 0xef601}, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000240)='hfs\x00\xe6\xa6\xe2\x06g\x96\xb3\v\xf2p\xd5:\x95p\x99\x92\xf2\xc4\x80\x1f\x01\x05\xb8e?\xbfwk\xe4\xe5\xca\x82\xeb\xb1\x04wn*\xf2\xc6\x9d\xc4!\x9e?\x83\x99\x0e\xcc\xa3\x95q.C\xee\x8dIf\xec\xbf\xe8\xb2\t\xedg\x9d\xd9\v\xce\xa3\xa3\xa5\x89F\x03\xefQ\x89\f\xeeRK\x15\xec{D\x9e\x83Z\xabTa\x8e\xcd\x01\xd0\xcfd\xf9c\x87m\xbe>\x81\xba\x9d2\x1c\a,\x12\xbf\xef\xb8m\v\xdf\x8e\xd5\xf5\x1a\xabD\xf6\xe0\x95\xf4\xfeRb_+\xeb\xf9f\xe8\\\x16\xeb\x87\x8e\x8acn4,\x80Q<\x84\xaep\xf9\xfc\x8e\x9f\xed\x06.a\xd5o\x14\r&L\xbd\xb9g\x82;+n\xd5\xcca\v\x86Z\x872\xc3c:`\xf2\x02\xc2\x92\x841\xe7\xca}\"@6}j\x0e\xb7\xa9\xbc\xf3N\xa3\xf3mbd\xfbS\x80\xe0\x11<\x7f\x84\xbe\xa2\xf9\xf7\xee\xf6\x94x\x9d\xe2{\xc5\x83\xc0M\xbb\xd4Io\r\x1c\xd7<\xc0\x84=`\xf1^Y', 0x0, 0x0) 00:28:18 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000480)=@acquire={0x1ac, 0x17, 0x1, 0x0, 0x0, {{@in=@multicast1}, @in6=@ipv4={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x805000000000000], [], @dev}, {@in=@loopback, @in6=@local}, {{@in, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x2}}}, [@tmpl={0x84, 0x5, [{{@in6=@mcast1, 0x0, 0x3c}, 0x0, @in=@multicast1}, {{@in=@remote, 0x0, 0x3c}, 0x0, @in=@broadcast}]}]}, 0x1ac}}, 0x0) 00:28:18 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00004e7000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f, 0x0, 0x6000000000000000}, 0xc, &(0x7f0000000440)={&(0x7f00000001c0)=ANY=[@ANYBLOB="1c00000022000100000000000061960d0100000008fe0c009d0a6be0e6d9fc638f19561d6ceb8a6c9239228215fd206cf204e07953", @ANYRES32=0x0], 0x2}, 0x1, 0x0, 0x0, 0xffffffffffffffff}, 0x0) 00:28:18 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000180)='./control\x00', 0x0) get_thread_area(0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x3) write$binfmt_script(r0, &(0x7f0000000bc0)=ANY=[@ANYBLOB="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"], 0x145) close(r0) execve(&(0x7f0000000180)='./file0\x00', &(0x7f0000000140), &(0x7f0000000140)) r1 = open(&(0x7f0000000000)='./control\x00', 0x80, 0x10) statfs(&(0x7f0000000380)='./control\x00', &(0x7f00000003c0)=""/20) write$P9_RWALK(r0, &(0x7f0000000400)=ANY=[@ANYBLOB="300000006f0100030001030000000400000000000000100000000003000002000000000300000000000000e646f1c5592139cf131e2bf572fa9728dbfac0390865410f3fa1f25743c497e12cb352eac4046b4500f95cfdfb4cf22a3be5c564a47654334c01d5732d382e27bbccd9b903000000c404000000d32dbd21f3ae581d32e69ef9327f7b487d1b4f4502838c08136678bd90733173ab78d6fc264b"], 0x9e) getsockopt$inet_sctp6_SCTP_RTOINFO(r1, 0x84, 0x0, &(0x7f0000000080)={0x0, 0x200, 0x2, 0xffffffff}, &(0x7f0000000100)=0x10) 00:28:18 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000480)=@acquire={0x1ac, 0x17, 0x1, 0x0, 0x0, {{@in=@multicast1}, @in6=@ipv4={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x900000000000000], [], @dev}, {@in=@loopback, @in6=@local}, {{@in, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x2}}}, [@tmpl={0x84, 0x5, [{{@in6=@mcast1, 0x0, 0x3c}, 0x0, @in=@multicast1}, {{@in=@remote, 0x0, 0x3c}, 0x0, @in=@broadcast}]}]}, 0x1ac}}, 0x0) 00:28:18 executing program 2: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(&(0x7f0000000080)=@nbd={'/dev/nbd', 0x0, 0xef603}, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000240)='hfs\x00\xe6\xa6\xe2\x06g\x96\xb3\v\xf2p\xd5:\x95p\x99\x92\xf2\xc4\x80\x1f\x01\x05\xb8e?\xbfwk\xe4\xe5\xca\x82\xeb\xb1\x04wn*\xf2\xc6\x9d\xc4!\x9e?\x83\x99\x0e\xcc\xa3\x95q.C\xee\x8dIf\xec\xbf\xe8\xb2\t\xedg\x9d\xd9\v\xce\xa3\xa3\xa5\x89F\x03\xefQ\x89\f\xeeRK\x15\xec{D\x9e\x83Z\xabTa\x8e\xcd\x01\xd0\xcfd\xf9c\x87m\xbe>\x81\xba\x9d2\x1c\a,\x12\xbf\xef\xb8m\v\xdf\x8e\xd5\xf5\x1a\xabD\xf6\xe0\x95\xf4\xfeRb_+\xeb\xf9f\xe8\\\x16\xeb\x87\x8e\x8acn4,\x80Q<\x84\xaep\xf9\xfc\x8e\x9f\xed\x06.a\xd5o\x14\r&L\xbd\xb9g\x82;+n\xd5\xcca\v\x86Z\x872\xc3c:`\xf2\x02\xc2\x92\x841\xe7\xca}\"@6}j\x0e\xb7\xa9\xbc\xf3N\xa3\xf3mbd\xfbS\x80\xe0\x11<\x7f\x84\xbe\xa2\xf9\xf7\xee\xf6\x94x\x9d\xe2{\xc5\x83\xc0M\xbb\xd4Io\r\x1c\xd7<\xc0\x84=`\xf1^Y', 0x0, 0x0) 00:28:18 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00004e7000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f, 0x0, 0x9effffff00000000}, 0xc, &(0x7f0000000440)={&(0x7f00000001c0)=ANY=[@ANYBLOB="1c00000022000100000000000061960d0100000008fe0c009d0a6be0e6d9fc638f19561d6ceb8a6c9239228215fd206cf204e07953", @ANYRES32=0x0], 0x2}, 0x1, 0x0, 0x0, 0xffffffffffffffff}, 0x0) 00:28:18 executing program 1: syz_mount_image$reiserfs(&(0x7f0000000180)='reiKerfs\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[@ANYBLOB='jdev=.']) 00:28:18 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000480)=@acquire={0x1ac, 0x17, 0x1, 0x0, 0x0, {{@in=@multicast1}, @in6=@ipv4={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa00000000000000], [], @dev}, {@in=@loopback, @in6=@local}, {{@in, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x2}}}, [@tmpl={0x84, 0x5, [{{@in6=@mcast1, 0x0, 0x3c}, 0x0, @in=@multicast1}, {{@in=@remote, 0x0, 0x3c}, 0x0, @in=@broadcast}]}]}, 0x1ac}}, 0x0) 00:28:18 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00004e7000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f, 0x0, 0xb00a000000000000}, 0xc, &(0x7f0000000440)={&(0x7f00000001c0)=ANY=[@ANYBLOB="1c00000022000100000000000061960d0100000008fe0c009d0a6be0e6d9fc638f19561d6ceb8a6c9239228215fd206cf204e07953", @ANYRES32=0x0], 0x2}, 0x1, 0x0, 0x0, 0xffffffffffffffff}, 0x0) 00:28:18 executing program 2: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(&(0x7f0000000080)=@nbd={'/dev/nbd', 0x0, 0xefa03}, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000240)='hfs\x00\xe6\xa6\xe2\x06g\x96\xb3\v\xf2p\xd5:\x95p\x99\x92\xf2\xc4\x80\x1f\x01\x05\xb8e?\xbfwk\xe4\xe5\xca\x82\xeb\xb1\x04wn*\xf2\xc6\x9d\xc4!\x9e?\x83\x99\x0e\xcc\xa3\x95q.C\xee\x8dIf\xec\xbf\xe8\xb2\t\xedg\x9d\xd9\v\xce\xa3\xa3\xa5\x89F\x03\xefQ\x89\f\xeeRK\x15\xec{D\x9e\x83Z\xabTa\x8e\xcd\x01\xd0\xcfd\xf9c\x87m\xbe>\x81\xba\x9d2\x1c\a,\x12\xbf\xef\xb8m\v\xdf\x8e\xd5\xf5\x1a\xabD\xf6\xe0\x95\xf4\xfeRb_+\xeb\xf9f\xe8\\\x16\xeb\x87\x8e\x8acn4,\x80Q<\x84\xaep\xf9\xfc\x8e\x9f\xed\x06.a\xd5o\x14\r&L\xbd\xb9g\x82;+n\xd5\xcca\v\x86Z\x872\xc3c:`\xf2\x02\xc2\x92\x841\xe7\xca}\"@6}j\x0e\xb7\xa9\xbc\xf3N\xa3\xf3mbd\xfbS\x80\xe0\x11<\x7f\x84\xbe\xa2\xf9\xf7\xee\xf6\x94x\x9d\xe2{\xc5\x83\xc0M\xbb\xd4Io\r\x1c\xd7<\xc0\x84=`\xf1^Y', 0x0, 0x0) 00:28:19 executing program 0: syz_mount_image$reiserfs(&(0x7f0000000180)='reiuerfs\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[@ANYBLOB='jdev=./file0,jdev=']) 00:28:19 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000180)='./control\x00', 0x0) get_thread_area(0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x3) write$binfmt_script(r0, &(0x7f0000000bc0)=ANY=[@ANYBLOB="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"], 0x145) close(r0) execve(&(0x7f0000000180)='./file0\x00', &(0x7f0000000140), &(0x7f0000000140)) r1 = open(&(0x7f0000000000)='./control\x00', 0x80, 0x10) statfs(&(0x7f0000000380)='./control\x00', &(0x7f00000003c0)=""/20) write$P9_RWALK(r0, &(0x7f0000000400)=ANY=[@ANYBLOB="300000006f0100030001030000000400000000000000100000000003000002000000000300000000000000e646f1c5592139cf131e2bf572fa9728dbfac0390865410f3fa1f25743c497e12cb352eac4046b4500f95cfdfb4cf22a3be5c564a47654334c01d5732d382e27bbccd9b903000000c404000000d32dbd21f3ae581d32e69ef9327f7b487d1b4f4502838c08136678bd90733173ab78d6fc264b"], 0x9e) getsockopt$inet_sctp6_SCTP_RTOINFO(r1, 0x84, 0x0, &(0x7f0000000080)={0x0, 0x200, 0x2, 0xffffffff}, &(0x7f0000000100)=0x10) 00:28:19 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000480)=@acquire={0x1ac, 0x17, 0x1, 0x0, 0x0, {{@in=@multicast1}, @in6=@ipv4={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb00000000000000], [], @dev}, {@in=@loopback, @in6=@local}, {{@in, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x2}}}, [@tmpl={0x84, 0x5, [{{@in6=@mcast1, 0x0, 0x3c}, 0x0, @in=@multicast1}, {{@in=@remote, 0x0, 0x3c}, 0x0, @in=@broadcast}]}]}, 0x1ac}}, 0x0) 00:28:19 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00004e7000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f, 0x0, 0xf0ffffff00000000}, 0xc, &(0x7f0000000440)={&(0x7f00000001c0)=ANY=[@ANYBLOB="1c00000022000100000000000061960d0100000008fe0c009d0a6be0e6d9fc638f19561d6ceb8a6c9239228215fd206cf204e07953", @ANYRES32=0x0], 0x2}, 0x1, 0x0, 0x0, 0xffffffffffffffff}, 0x0) 00:28:19 executing program 2: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(&(0x7f0000000080)=@nbd={'/dev/nbd', 0x0, 0xeff0f}, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000240)='hfs\x00\xe6\xa6\xe2\x06g\x96\xb3\v\xf2p\xd5:\x95p\x99\x92\xf2\xc4\x80\x1f\x01\x05\xb8e?\xbfwk\xe4\xe5\xca\x82\xeb\xb1\x04wn*\xf2\xc6\x9d\xc4!\x9e?\x83\x99\x0e\xcc\xa3\x95q.C\xee\x8dIf\xec\xbf\xe8\xb2\t\xedg\x9d\xd9\v\xce\xa3\xa3\xa5\x89F\x03\xefQ\x89\f\xeeRK\x15\xec{D\x9e\x83Z\xabTa\x8e\xcd\x01\xd0\xcfd\xf9c\x87m\xbe>\x81\xba\x9d2\x1c\a,\x12\xbf\xef\xb8m\v\xdf\x8e\xd5\xf5\x1a\xabD\xf6\xe0\x95\xf4\xfeRb_+\xeb\xf9f\xe8\\\x16\xeb\x87\x8e\x8acn4,\x80Q<\x84\xaep\xf9\xfc\x8e\x9f\xed\x06.a\xd5o\x14\r&L\xbd\xb9g\x82;+n\xd5\xcca\v\x86Z\x872\xc3c:`\xf2\x02\xc2\x92\x841\xe7\xca}\"@6}j\x0e\xb7\xa9\xbc\xf3N\xa3\xf3mbd\xfbS\x80\xe0\x11<\x7f\x84\xbe\xa2\xf9\xf7\xee\xf6\x94x\x9d\xe2{\xc5\x83\xc0M\xbb\xd4Io\r\x1c\xd7<\xc0\x84=`\xf1^Y', 0x0, 0x0) 00:28:19 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000180)='./control\x00', 0x0) get_thread_area(0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x3) write$binfmt_script(r0, &(0x7f0000000bc0)=ANY=[@ANYBLOB="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"], 0x145) close(r0) execve(&(0x7f0000000180)='./file0\x00', &(0x7f0000000140), &(0x7f0000000140)) r1 = open(&(0x7f0000000000)='./control\x00', 0x80, 0x10) statfs(&(0x7f0000000380)='./control\x00', &(0x7f00000003c0)=""/20) write$P9_RWALK(r0, &(0x7f0000000400)=ANY=[@ANYBLOB="300000006f0100030001030000000400000000000000100000000003000002000000000300000000000000e646f1c5592139cf131e2bf572fa9728dbfac0390865410f3fa1f25743c497e12cb352eac4046b4500f95cfdfb4cf22a3be5c564a47654334c01d5732d382e27bbccd9b903000000c404000000d32dbd21f3ae581d32e69ef9327f7b487d1b4f4502838c08136678bd90733173ab78d6fc264b373611f15c"], 0xa3) getsockopt$inet_sctp6_SCTP_RTOINFO(r1, 0x84, 0x0, &(0x7f0000000080)={0x0, 0x200, 0x2, 0xffffffff}, &(0x7f0000000100)=0x10) 00:28:19 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000480)=@acquire={0x1ac, 0x17, 0x1, 0x0, 0x0, {{@in=@multicast1}, @in6=@ipv4={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe00000000000000], [], @dev}, {@in=@loopback, @in6=@local}, {{@in, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x2}}}, [@tmpl={0x84, 0x5, [{{@in6=@mcast1, 0x0, 0x3c}, 0x0, @in=@multicast1}, {{@in=@remote, 0x0, 0x3c}, 0x0, @in=@broadcast}]}]}, 0x1ac}}, 0x0) 00:28:19 executing program 1: syz_mount_image$reiserfs(&(0x7f0000000180)='reiXerfs\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[@ANYBLOB='jdev=.']) 00:28:19 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00004e7000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f, 0x0, 0xffffff7f00000000}, 0xc, &(0x7f0000000440)={&(0x7f00000001c0)=ANY=[@ANYBLOB="1c00000022000100000000000061960d0100000008fe0c009d0a6be0e6d9fc638f19561d6ceb8a6c9239228215fd206cf204e07953", @ANYRES32=0x0], 0x2}, 0x1, 0x0, 0x0, 0xffffffffffffffff}, 0x0) 00:28:19 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000480)=@acquire={0x1ac, 0x17, 0x1, 0x0, 0x0, {{@in=@multicast1}, @in6=@ipv4={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf00000000000000], [], @dev}, {@in=@loopback, @in6=@local}, {{@in, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x2}}}, [@tmpl={0x84, 0x5, [{{@in6=@mcast1, 0x0, 0x3c}, 0x0, @in=@multicast1}, {{@in=@remote, 0x0, 0x3c}, 0x0, @in=@broadcast}]}]}, 0x1ac}}, 0x0) 00:28:19 executing program 2: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(&(0x7f0000000080)=@nbd={'/dev/nbd', 0x0, 0xff0f0000}, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000240)='hfs\x00\xe6\xa6\xe2\x06g\x96\xb3\v\xf2p\xd5:\x95p\x99\x92\xf2\xc4\x80\x1f\x01\x05\xb8e?\xbfwk\xe4\xe5\xca\x82\xeb\xb1\x04wn*\xf2\xc6\x9d\xc4!\x9e?\x83\x99\x0e\xcc\xa3\x95q.C\xee\x8dIf\xec\xbf\xe8\xb2\t\xedg\x9d\xd9\v\xce\xa3\xa3\xa5\x89F\x03\xefQ\x89\f\xeeRK\x15\xec{D\x9e\x83Z\xabTa\x8e\xcd\x01\xd0\xcfd\xf9c\x87m\xbe>\x81\xba\x9d2\x1c\a,\x12\xbf\xef\xb8m\v\xdf\x8e\xd5\xf5\x1a\xabD\xf6\xe0\x95\xf4\xfeRb_+\xeb\xf9f\xe8\\\x16\xeb\x87\x8e\x8acn4,\x80Q<\x84\xaep\xf9\xfc\x8e\x9f\xed\x06.a\xd5o\x14\r&L\xbd\xb9g\x82;+n\xd5\xcca\v\x86Z\x872\xc3c:`\xf2\x02\xc2\x92\x841\xe7\xca}\"@6}j\x0e\xb7\xa9\xbc\xf3N\xa3\xf3mbd\xfbS\x80\xe0\x11<\x7f\x84\xbe\xa2\xf9\xf7\xee\xf6\x94x\x9d\xe2{\xc5\x83\xc0M\xbb\xd4Io\r\x1c\xd7<\xc0\x84=`\xf1^Y', 0x0, 0x0) 00:28:19 executing program 0: syz_mount_image$reiserfs(&(0x7f0000000180)='reixerfs\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[@ANYBLOB='jdev=./file0,jdev=']) [ 889.954488][ T2481] block nbd2: Attempted send on invalid socket [ 889.960793][ T2481] print_req_error: I/O error, dev nbd2, sector 2 flags 0 [ 889.968224][ T4263] hfs: can't find a HFS filesystem on dev nbd2 00:28:19 executing program 2: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(&(0x7f0000000080)=@nbd={'/dev/nbd', 0x0, 0xe0000}, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000240)='%fs\x00\xe6\xa6\xe2\x06g\x96\xb3\v\xf2p\xd5:\x95p\x99\x92\xf2\xc4\x80\x1f\x01\x05\xb8e?\xbfwk\xe4\xe5\xca\x82\xeb\xb1\x04wn*\xf2\xc6\x9d\xc4!\x9e?\x83\x99\x0e\xcc\xa3\x95q.C\xee\x8dIf\xec\xbf\xe8\xb2\t\xedg\x9d\xd9\v\xce\xa3\xa3\xa5\x89F\x03\xefQ\x89\f\xeeRK\x15\xec{D\x9e\x83Z\xabTa\x8e\xcd\x01\xd0\xcfd\xf9c\x87m\xbe>\x81\xba\x9d2\x1c\a,\x12\xbf\xef\xb8m\v\xdf\x8e\xd5\xf5\x1a\xabD\xf6\xe0\x95\xf4\xfeRb_+\xeb\xf9f\xe8\\\x16\xeb\x87\x8e\x8acn4,\x80Q<\x84\xaep\xf9\xfc\x8e\x9f\xed\x06.a\xd5o\x14\r&L\xbd\xb9g\x82;+n\xd5\xcca\v\x86Z\x872\xc3c:`\xf2\x02\xc2\x92\x841\xe7\xca}\"@6}j\x0e\xb7\xa9\xbc\xf3N\xa3\xf3mbd\xfbS\x80\xe0\x11<\x7f\x84\xbe\xa2\xf9\xf7\xee\xf6\x94x\x9d\xe2{\xc5\x83\xc0M\xbb\xd4Io\r\x1c\xd7<\xc0\x84=`\xf1^Y', 0x0, 0x0) 00:28:19 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000480)=@acquire={0x1ac, 0x17, 0x1, 0x0, 0x0, {{@in=@multicast1}, @in6=@ipv4={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000000000000], [], @dev}, {@in=@loopback, @in6=@local}, {{@in, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x2}}}, [@tmpl={0x84, 0x5, [{{@in6=@mcast1, 0x0, 0x3c}, 0x0, @in=@multicast1}, {{@in=@remote, 0x0, 0x3c}, 0x0, @in=@broadcast}]}]}, 0x1ac}}, 0x0) 00:28:19 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00004e7000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f, 0x0, 0xfffffffffffff000}, 0xc, &(0x7f0000000440)={&(0x7f00000001c0)=ANY=[@ANYBLOB="1c00000022000100000000000061960d0100000008fe0c009d0a6be0e6d9fc638f19561d6ceb8a6c9239228215fd206cf204e07953", @ANYRES32=0x0], 0x2}, 0x1, 0x0, 0x0, 0xffffffffffffffff}, 0x0) 00:28:19 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000180)='./control\x00', 0x0) get_thread_area(0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x3) write$binfmt_script(r0, &(0x7f0000000bc0)=ANY=[@ANYBLOB="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"], 0x145) close(r0) execve(&(0x7f0000000180)='./file0\x00', &(0x7f0000000140), &(0x7f0000000140)) r1 = open(&(0x7f0000000000)='./control\x00', 0x80, 0x10) statfs(&(0x7f0000000380)='./control\x00', &(0x7f00000003c0)=""/20) write$P9_RWALK(r0, &(0x7f0000000400)=ANY=[@ANYBLOB="300000006f0100030001030000000400000000000000100000000003000002000000000300000000000000e646f1c5592139cf131e2bf572fa9728dbfac0390865410f3fa1f25743c497e12cb352eac4046b4500f95cfdfb4cf22a3be5c564a47654334c01d5732d382e27bbccd9b903000000c404000000d32dbd21f3ae581d32e69ef9327f7b487d1b4f4502838c08136678bd90733173ab78d6fc264b373611f15c"], 0xa3) getsockopt$inet_sctp6_SCTP_RTOINFO(r1, 0x84, 0x0, &(0x7f0000000080)={0x0, 0x200, 0x2, 0xffffffff}, &(0x7f0000000100)=0x10) 00:28:19 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000480)=@acquire={0x1ac, 0x17, 0x1, 0x0, 0x0, {{@in=@multicast1}, @in6=@ipv4={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1100000000000000], [], @dev}, {@in=@loopback, @in6=@local}, {{@in, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x2}}}, [@tmpl={0x84, 0x5, [{{@in6=@mcast1, 0x0, 0x3c}, 0x0, @in=@multicast1}, {{@in=@remote, 0x0, 0x3c}, 0x0, @in=@broadcast}]}]}, 0x1ac}}, 0x0) 00:28:19 executing program 1: syz_mount_image$reiserfs(&(0x7f0000000180)='reiaerfs\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[@ANYBLOB='jdev=.']) 00:28:20 executing program 2: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(&(0x7f0000000080)=@nbd={'/dev/nbd', 0x0, 0xe0000}, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000240)='h%s\x00\xe6\xa6\xe2\x06g\x96\xb3\v\xf2p\xd5:\x95p\x99\x92\xf2\xc4\x80\x1f\x01\x05\xb8e?\xbfwk\xe4\xe5\xca\x82\xeb\xb1\x04wn*\xf2\xc6\x9d\xc4!\x9e?\x83\x99\x0e\xcc\xa3\x95q.C\xee\x8dIf\xec\xbf\xe8\xb2\t\xedg\x9d\xd9\v\xce\xa3\xa3\xa5\x89F\x03\xefQ\x89\f\xeeRK\x15\xec{D\x9e\x83Z\xabTa\x8e\xcd\x01\xd0\xcfd\xf9c\x87m\xbe>\x81\xba\x9d2\x1c\a,\x12\xbf\xef\xb8m\v\xdf\x8e\xd5\xf5\x1a\xabD\xf6\xe0\x95\xf4\xfeRb_+\xeb\xf9f\xe8\\\x16\xeb\x87\x8e\x8acn4,\x80Q<\x84\xaep\xf9\xfc\x8e\x9f\xed\x06.a\xd5o\x14\r&L\xbd\xb9g\x82;+n\xd5\xcca\v\x86Z\x872\xc3c:`\xf2\x02\xc2\x92\x841\xe7\xca}\"@6}j\x0e\xb7\xa9\xbc\xf3N\xa3\xf3mbd\xfbS\x80\xe0\x11<\x7f\x84\xbe\xa2\xf9\xf7\xee\xf6\x94x\x9d\xe2{\xc5\x83\xc0M\xbb\xd4Io\r\x1c\xd7<\xc0\x84=`\xf1^Y', 0x0, 0x0) 00:28:20 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000480)=@acquire={0x1ac, 0x17, 0x1, 0x0, 0x0, {{@in=@multicast1}, @in6=@ipv4={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1200000000000000], [], @dev}, {@in=@loopback, @in6=@local}, {{@in, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x2}}}, [@tmpl={0x84, 0x5, [{{@in6=@mcast1, 0x0, 0x3c}, 0x0, @in=@multicast1}, {{@in=@remote, 0x0, 0x3c}, 0x0, @in=@broadcast}]}]}, 0x1ac}}, 0x0) 00:28:20 executing program 0: syz_mount_image$reiserfs(&(0x7f0000000180)='reiyerfs\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[@ANYBLOB='jdev=./file0,jdev=']) 00:28:20 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00004e7000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f}, 0xb, &(0x7f0000000440)={&(0x7f00000001c0)=ANY=[@ANYBLOB="1c00000022000100000000000061960d0100000008fe0c009d0a6be0e6d9fc638f19561d6ceb8a6c9239228215fd206cf204e07953", @ANYRES32=0x0], 0x2}, 0x1, 0x0, 0x0, 0xffffffffffffffff}, 0x0) 00:28:20 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000480)=@acquire={0x1ac, 0x17, 0x1, 0x0, 0x0, {{@in=@multicast1}, @in6=@ipv4={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1300000000000000], [], @dev}, {@in=@loopback, @in6=@local}, {{@in, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x2}}}, [@tmpl={0x84, 0x5, [{{@in6=@mcast1, 0x0, 0x3c}, 0x0, @in=@multicast1}, {{@in=@remote, 0x0, 0x3c}, 0x0, @in=@broadcast}]}]}, 0x1ac}}, 0x0) 00:28:20 executing program 2: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(&(0x7f0000000080)=@nbd={'/dev/nbd', 0x0, 0xe0000}, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000240)='h.s\x00\xe6\xa6\xe2\x06g\x96\xb3\v\xf2p\xd5:\x95p\x99\x92\xf2\xc4\x80\x1f\x01\x05\xb8e?\xbfwk\xe4\xe5\xca\x82\xeb\xb1\x04wn*\xf2\xc6\x9d\xc4!\x9e?\x83\x99\x0e\xcc\xa3\x95q.C\xee\x8dIf\xec\xbf\xe8\xb2\t\xedg\x9d\xd9\v\xce\xa3\xa3\xa5\x89F\x03\xefQ\x89\f\xeeRK\x15\xec{D\x9e\x83Z\xabTa\x8e\xcd\x01\xd0\xcfd\xf9c\x87m\xbe>\x81\xba\x9d2\x1c\a,\x12\xbf\xef\xb8m\v\xdf\x8e\xd5\xf5\x1a\xabD\xf6\xe0\x95\xf4\xfeRb_+\xeb\xf9f\xe8\\\x16\xeb\x87\x8e\x8acn4,\x80Q<\x84\xaep\xf9\xfc\x8e\x9f\xed\x06.a\xd5o\x14\r&L\xbd\xb9g\x82;+n\xd5\xcca\v\x86Z\x872\xc3c:`\xf2\x02\xc2\x92\x841\xe7\xca}\"@6}j\x0e\xb7\xa9\xbc\xf3N\xa3\xf3mbd\xfbS\x80\xe0\x11<\x7f\x84\xbe\xa2\xf9\xf7\xee\xf6\x94x\x9d\xe2{\xc5\x83\xc0M\xbb\xd4Io\r\x1c\xd7<\xc0\x84=`\xf1^Y', 0x0, 0x0) 00:28:20 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000480)=@acquire={0x1ac, 0x17, 0x1, 0x0, 0x0, {{@in=@multicast1}, @in6=@ipv4={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000000000000], [], @dev}, {@in=@loopback, @in6=@local}, {{@in, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x2}}}, [@tmpl={0x84, 0x5, [{{@in6=@mcast1, 0x0, 0x3c}, 0x0, @in=@multicast1}, {{@in=@remote, 0x0, 0x3c}, 0x0, @in=@broadcast}]}]}, 0x1ac}}, 0x0) 00:28:20 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000180)='./control\x00', 0x0) get_thread_area(0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x3) write$binfmt_script(r0, &(0x7f0000000bc0)=ANY=[@ANYBLOB="2321202e2f66696c6530202357994f66e76f4d0fe2208456ebfa69074cb94144c95c4375644bd1747e34c127d80575d10a599f851dc7ad26f3fa377c0a53cc7be2512b7493bf864ecf3f13e46032dbbf3af349b06321cec7a0652f4a5768256cd01a2d3d52de67dc459409a1e50ca51334791c8690646f7a1962ccefc0592a163bacf13da16978ca48eb3784c5baa40700ebfddde7e115f9388051297af49e38e0e3210d232e108a7e9b69c2e56676484906d975d537d128607c901050484e2bdb0d042a40c8ff8f4727cde00677ea73dac796f06f6f7ef7b3406723e7da9fb469c4ce44faff2888c779c000000000000000000000dc4fd7f68b303f980ed08fb24c8052b0626c8b3733eeee64a90f35fd7d88f958406cb5a8ed3b20b7d1278e15c1e1012befbc45a45f203503128d3a99b80bc2c744ae4b8509ca0149b48dc3e11c2d5db4"], 0x145) close(r0) execve(&(0x7f0000000180)='./file0\x00', &(0x7f0000000140), &(0x7f0000000140)) r1 = open(&(0x7f0000000000)='./control\x00', 0x80, 0x10) statfs(&(0x7f0000000380)='./control\x00', &(0x7f00000003c0)=""/20) write$P9_RWALK(r0, &(0x7f0000000400)=ANY=[@ANYBLOB="300000006f0100030001030000000400000000000000100000000003000002000000000300000000000000e646f1c5592139cf131e2bf572fa9728dbfac0390865410f3fa1f25743c497e12cb352eac4046b4500f95cfdfb4cf22a3be5c564a47654334c01d5732d382e27bbccd9b903000000c404000000d32dbd21f3ae581d32e69ef9327f7b487d1b4f4502838c08136678bd90733173ab78d6fc264b373611f15c"], 0xa3) getsockopt$inet_sctp6_SCTP_RTOINFO(r1, 0x84, 0x0, &(0x7f0000000080)={0x0, 0x200, 0x2, 0xffffffff}, &(0x7f0000000100)=0x10) 00:28:20 executing program 1: syz_mount_image$reiserfs(&(0x7f0000000180)='reiberfs\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[@ANYBLOB='jdev=.']) 00:28:20 executing program 2: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(&(0x7f0000000080)=@nbd={'/dev/nbd', 0x0, 0xe0000}, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000240)='h/s\x00\xe6\xa6\xe2\x06g\x96\xb3\v\xf2p\xd5:\x95p\x99\x92\xf2\xc4\x80\x1f\x01\x05\xb8e?\xbfwk\xe4\xe5\xca\x82\xeb\xb1\x04wn*\xf2\xc6\x9d\xc4!\x9e?\x83\x99\x0e\xcc\xa3\x95q.C\xee\x8dIf\xec\xbf\xe8\xb2\t\xedg\x9d\xd9\v\xce\xa3\xa3\xa5\x89F\x03\xefQ\x89\f\xeeRK\x15\xec{D\x9e\x83Z\xabTa\x8e\xcd\x01\xd0\xcfd\xf9c\x87m\xbe>\x81\xba\x9d2\x1c\a,\x12\xbf\xef\xb8m\v\xdf\x8e\xd5\xf5\x1a\xabD\xf6\xe0\x95\xf4\xfeRb_+\xeb\xf9f\xe8\\\x16\xeb\x87\x8e\x8acn4,\x80Q<\x84\xaep\xf9\xfc\x8e\x9f\xed\x06.a\xd5o\x14\r&L\xbd\xb9g\x82;+n\xd5\xcca\v\x86Z\x872\xc3c:`\xf2\x02\xc2\x92\x841\xe7\xca}\"@6}j\x0e\xb7\xa9\xbc\xf3N\xa3\xf3mbd\xfbS\x80\xe0\x11<\x7f\x84\xbe\xa2\xf9\xf7\xee\xf6\x94x\x9d\xe2{\xc5\x83\xc0M\xbb\xd4Io\r\x1c\xd7<\xc0\x84=`\xf1^Y', 0x0, 0x0) 00:28:20 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00004e7000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f}, 0x2000048c, &(0x7f0000000440)={&(0x7f00000001c0)=ANY=[@ANYBLOB="1c00000022000100000000000061960d0100000008fe0c009d0a6be0e6d9fc638f19561d6ceb8a6c9239228215fd206cf204e07953", @ANYRES32=0x0], 0x2}, 0x1, 0x0, 0x0, 0xffffffffffffffff}, 0x0) 00:28:20 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000480)=@acquire={0x1ac, 0x17, 0x1, 0x0, 0x0, {{@in=@multicast1}, @in6=@ipv4={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6000000000000000], [], @dev}, {@in=@loopback, @in6=@local}, {{@in, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x2}}}, [@tmpl={0x84, 0x5, [{{@in6=@mcast1, 0x0, 0x3c}, 0x0, @in=@multicast1}, {{@in=@remote, 0x0, 0x3c}, 0x0, @in=@broadcast}]}]}, 0x1ac}}, 0x0) 00:28:20 executing program 0: syz_mount_image$reiserfs(&(0x7f0000000180)='reizerfs\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[@ANYBLOB='jdev=./file0,jdev=']) 00:28:20 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000480)=@acquire={0x1ac, 0x17, 0x1, 0x0, 0x0, {{@in=@multicast1}, @in6=@ipv4={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9effffff00000000], [], @dev}, {@in=@loopback, @in6=@local}, {{@in, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x2}}}, [@tmpl={0x84, 0x5, [{{@in6=@mcast1, 0x0, 0x3c}, 0x0, @in=@multicast1}, {{@in=@remote, 0x0, 0x3c}, 0x0, @in=@broadcast}]}]}, 0x1ac}}, 0x0) 00:28:20 executing program 2: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(&(0x7f0000000080)=@nbd={'/dev/nbd', 0x0, 0xe0000}, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000240)='his\x00\xe6\xa6\xe2\x06g\x96\xb3\v\xf2p\xd5:\x95p\x99\x92\xf2\xc4\x80\x1f\x01\x05\xb8e?\xbfwk\xe4\xe5\xca\x82\xeb\xb1\x04wn*\xf2\xc6\x9d\xc4!\x9e?\x83\x99\x0e\xcc\xa3\x95q.C\xee\x8dIf\xec\xbf\xe8\xb2\t\xedg\x9d\xd9\v\xce\xa3\xa3\xa5\x89F\x03\xefQ\x89\f\xeeRK\x15\xec{D\x9e\x83Z\xabTa\x8e\xcd\x01\xd0\xcfd\xf9c\x87m\xbe>\x81\xba\x9d2\x1c\a,\x12\xbf\xef\xb8m\v\xdf\x8e\xd5\xf5\x1a\xabD\xf6\xe0\x95\xf4\xfeRb_+\xeb\xf9f\xe8\\\x16\xeb\x87\x8e\x8acn4,\x80Q<\x84\xaep\xf9\xfc\x8e\x9f\xed\x06.a\xd5o\x14\r&L\xbd\xb9g\x82;+n\xd5\xcca\v\x86Z\x872\xc3c:`\xf2\x02\xc2\x92\x841\xe7\xca}\"@6}j\x0e\xb7\xa9\xbc\xf3N\xa3\xf3mbd\xfbS\x80\xe0\x11<\x7f\x84\xbe\xa2\xf9\xf7\xee\xf6\x94x\x9d\xe2{\xc5\x83\xc0M\xbb\xd4Io\r\x1c\xd7<\xc0\x84=`\xf1^Y', 0x0, 0x0) 00:28:20 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00004e7000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f}, 0xc, &(0x7f0000000440)={&(0x7f00000001c0)=ANY=[@ANYBLOB="1c00000022000100000000000061960d0100000008fe0c009d0a6be0e6d9fc638f19561d6ceb8a6c9239228215fd206cf204e07953", @ANYRES32=0x0], 0x2}, 0x1, 0x0, 0x0, 0xffffffffffffffff}, 0x0) 00:28:21 executing program 2: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(&(0x7f0000000080)=@nbd={'/dev/nbd', 0x0, 0xe0000}, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000240)='hf#\x00\xe6\xa6\xe2\x06g\x96\xb3\v\xf2p\xd5:\x95p\x99\x92\xf2\xc4\x80\x1f\x01\x05\xb8e?\xbfwk\xe4\xe5\xca\x82\xeb\xb1\x04wn*\xf2\xc6\x9d\xc4!\x9e?\x83\x99\x0e\xcc\xa3\x95q.C\xee\x8dIf\xec\xbf\xe8\xb2\t\xedg\x9d\xd9\v\xce\xa3\xa3\xa5\x89F\x03\xefQ\x89\f\xeeRK\x15\xec{D\x9e\x83Z\xabTa\x8e\xcd\x01\xd0\xcfd\xf9c\x87m\xbe>\x81\xba\x9d2\x1c\a,\x12\xbf\xef\xb8m\v\xdf\x8e\xd5\xf5\x1a\xabD\xf6\xe0\x95\xf4\xfeRb_+\xeb\xf9f\xe8\\\x16\xeb\x87\x8e\x8acn4,\x80Q<\x84\xaep\xf9\xfc\x8e\x9f\xed\x06.a\xd5o\x14\r&L\xbd\xb9g\x82;+n\xd5\xcca\v\x86Z\x872\xc3c:`\xf2\x02\xc2\x92\x841\xe7\xca}\"@6}j\x0e\xb7\xa9\xbc\xf3N\xa3\xf3mbd\xfbS\x80\xe0\x11<\x7f\x84\xbe\xa2\xf9\xf7\xee\xf6\x94x\x9d\xe2{\xc5\x83\xc0M\xbb\xd4Io\r\x1c\xd7<\xc0\x84=`\xf1^Y', 0x0, 0x0) 00:28:21 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00004e7000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f}, 0xc, &(0x7f0000000440)={&(0x7f00000001c0)=ANY=[@ANYBLOB="1c00000022000100000000000061960d0100000008fe0c009d0a6be0e6d9fc638f19561d6ceb8a6c9239228215fd206cf204e07953", @ANYRES32=0x0], 0x2}, 0x1, 0x0, 0x0, 0xffffffffffffffff}, 0x0) 00:28:21 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000480)=@acquire={0x1ac, 0x17, 0x1, 0x0, 0x0, {{@in=@multicast1}, @in6=@ipv4={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf0ffffff00000000], [], @dev}, {@in=@loopback, @in6=@local}, {{@in, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x2}}}, [@tmpl={0x84, 0x5, [{{@in6=@mcast1, 0x0, 0x3c}, 0x0, @in=@multicast1}, {{@in=@remote, 0x0, 0x3c}, 0x0, @in=@broadcast}]}]}, 0x1ac}}, 0x0) 00:28:21 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000180)='./control\x00', 0x0) get_thread_area(0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x3) write$binfmt_script(r0, &(0x7f0000000bc0)=ANY=[@ANYBLOB="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"], 0x145) close(r0) execve(&(0x7f0000000180)='./file0\x00', &(0x7f0000000140), &(0x7f0000000140)) r1 = open(&(0x7f0000000000)='./control\x00', 0x80, 0x10) statfs(&(0x7f0000000380)='./control\x00', &(0x7f00000003c0)=""/20) write$P9_RWALK(r0, &(0x7f0000000400)=ANY=[@ANYBLOB="300000006f0100030001030000000400000000000000100000000003000002000000000300000000000000e646f1c5592139cf131e2bf572fa9728dbfac0390865410f3fa1f25743c497e12cb352eac4046b4500f95cfdfb4cf22a3be5c564a47654334c01d5732d382e27bbccd9b903000000c404000000d32dbd21f3ae581d32e69ef9327f7b487d1b4f4502838c08136678bd90733173ab78d6fc264b373611f15c439384"], 0xa6) getsockopt$inet_sctp6_SCTP_RTOINFO(r1, 0x84, 0x0, &(0x7f0000000080)={0x0, 0x200, 0x2, 0xffffffff}, &(0x7f0000000100)=0x10) 00:28:21 executing program 1: syz_mount_image$reiserfs(&(0x7f0000000180)='reicerfs\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[@ANYBLOB='jdev=.']) 00:28:21 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000480)=@acquire={0x1ac, 0x17, 0x1, 0x0, 0x0, {{@in=@multicast1}, @in6=@ipv4={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfcffffff00000000], [], @dev}, {@in=@loopback, @in6=@local}, {{@in, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x2}}}, [@tmpl={0x84, 0x5, [{{@in6=@mcast1, 0x0, 0x3c}, 0x0, @in=@multicast1}, {{@in=@remote, 0x0, 0x3c}, 0x0, @in=@broadcast}]}]}, 0x1ac}}, 0x0) 00:28:21 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00004e7000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f}, 0xc, &(0x7f0000000440)={&(0x7f00000001c0)=ANY=[@ANYBLOB="1c00000022000100000000000061960d0100000008fe0c009d0a6be0e6d9fc638f19561d6ceb8a6c9239228215fd206cf204e07953", @ANYRES32=0x0], 0x2}, 0x1, 0x0, 0x0, 0xffffffffffffffff}, 0x0) 00:28:21 executing program 2: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(&(0x7f0000000080)=@nbd={'/dev/nbd', 0x0, 0xe0000}, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000240)='hf%\x00\xe6\xa6\xe2\x06g\x96\xb3\v\xf2p\xd5:\x95p\x99\x92\xf2\xc4\x80\x1f\x01\x05\xb8e?\xbfwk\xe4\xe5\xca\x82\xeb\xb1\x04wn*\xf2\xc6\x9d\xc4!\x9e?\x83\x99\x0e\xcc\xa3\x95q.C\xee\x8dIf\xec\xbf\xe8\xb2\t\xedg\x9d\xd9\v\xce\xa3\xa3\xa5\x89F\x03\xefQ\x89\f\xeeRK\x15\xec{D\x9e\x83Z\xabTa\x8e\xcd\x01\xd0\xcfd\xf9c\x87m\xbe>\x81\xba\x9d2\x1c\a,\x12\xbf\xef\xb8m\v\xdf\x8e\xd5\xf5\x1a\xabD\xf6\xe0\x95\xf4\xfeRb_+\xeb\xf9f\xe8\\\x16\xeb\x87\x8e\x8acn4,\x80Q<\x84\xaep\xf9\xfc\x8e\x9f\xed\x06.a\xd5o\x14\r&L\xbd\xb9g\x82;+n\xd5\xcca\v\x86Z\x872\xc3c:`\xf2\x02\xc2\x92\x841\xe7\xca}\"@6}j\x0e\xb7\xa9\xbc\xf3N\xa3\xf3mbd\xfbS\x80\xe0\x11<\x7f\x84\xbe\xa2\xf9\xf7\xee\xf6\x94x\x9d\xe2{\xc5\x83\xc0M\xbb\xd4Io\r\x1c\xd7<\xc0\x84=`\xf1^Y', 0x0, 0x0) 00:28:21 executing program 0: syz_mount_image$reiserfs(&(0x7f0000000180)='rei\x86erfs\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[@ANYBLOB='jdev=./file0,jdev=']) 00:28:21 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000480)=@acquire={0x1ac, 0x17, 0x1, 0x0, 0x0, {{@in=@multicast1}, @in6=@ipv4={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffff7f00000000], [], @dev}, {@in=@loopback, @in6=@local}, {{@in, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x2}}}, [@tmpl={0x84, 0x5, [{{@in6=@mcast1, 0x0, 0x3c}, 0x0, @in=@multicast1}, {{@in=@remote, 0x0, 0x3c}, 0x0, @in=@broadcast}]}]}, 0x1ac}}, 0x0) 00:28:21 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00004e7000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f}, 0xc, &(0x7f0000000440)={&(0x7f00000001c0)=ANY=[@ANYBLOB="1c00000022000100000000000061960d0100000008fe0c009d0a6be0e6d9fc638f19561d6ceb8a6c9239228215fd206cf204e07953", @ANYRES32=0x0], 0x2}, 0x1, 0x0, 0x0, 0xffffffffffffffff}, 0x0) 00:28:21 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000480)=@acquire={0x1ac, 0x17, 0x1, 0x0, 0x0, {{@in=@multicast1}, @in6=@ipv4={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff00000000], [], @dev}, {@in=@loopback, @in6=@local}, {{@in, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x2}}}, [@tmpl={0x84, 0x5, [{{@in6=@mcast1, 0x0, 0x3c}, 0x0, @in=@multicast1}, {{@in=@remote, 0x0, 0x3c}, 0x0, @in=@broadcast}]}]}, 0x1ac}}, 0x0) 00:28:21 executing program 2: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(&(0x7f0000000080)=@nbd={'/dev/nbd', 0x0, 0xe0000}, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000240)='hf*\x00\xe6\xa6\xe2\x06g\x96\xb3\v\xf2p\xd5:\x95p\x99\x92\xf2\xc4\x80\x1f\x01\x05\xb8e?\xbfwk\xe4\xe5\xca\x82\xeb\xb1\x04wn*\xf2\xc6\x9d\xc4!\x9e?\x83\x99\x0e\xcc\xa3\x95q.C\xee\x8dIf\xec\xbf\xe8\xb2\t\xedg\x9d\xd9\v\xce\xa3\xa3\xa5\x89F\x03\xefQ\x89\f\xeeRK\x15\xec{D\x9e\x83Z\xabTa\x8e\xcd\x01\xd0\xcfd\xf9c\x87m\xbe>\x81\xba\x9d2\x1c\a,\x12\xbf\xef\xb8m\v\xdf\x8e\xd5\xf5\x1a\xabD\xf6\xe0\x95\xf4\xfeRb_+\xeb\xf9f\xe8\\\x16\xeb\x87\x8e\x8acn4,\x80Q<\x84\xaep\xf9\xfc\x8e\x9f\xed\x06.a\xd5o\x14\r&L\xbd\xb9g\x82;+n\xd5\xcca\v\x86Z\x872\xc3c:`\xf2\x02\xc2\x92\x841\xe7\xca}\"@6}j\x0e\xb7\xa9\xbc\xf3N\xa3\xf3mbd\xfbS\x80\xe0\x11<\x7f\x84\xbe\xa2\xf9\xf7\xee\xf6\x94x\x9d\xe2{\xc5\x83\xc0M\xbb\xd4Io\r\x1c\xd7<\xc0\x84=`\xf1^Y', 0x0, 0x0) 00:28:21 executing program 1: syz_mount_image$reiserfs(&(0x7f0000000180)='reiderfs\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[@ANYBLOB='jdev=.']) 00:28:21 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000180)='./control\x00', 0x0) get_thread_area(0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x3) write$binfmt_script(r0, &(0x7f0000000bc0)=ANY=[@ANYBLOB="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"], 0x145) close(r0) execve(&(0x7f0000000180)='./file0\x00', &(0x7f0000000140), &(0x7f0000000140)) r1 = open(&(0x7f0000000000)='./control\x00', 0x80, 0x10) statfs(&(0x7f0000000380)='./control\x00', &(0x7f00000003c0)=""/20) write$P9_RWALK(r0, &(0x7f0000000400)=ANY=[@ANYBLOB="300000006f0100030001030000000400000000000000100000000003000002000000000300000000000000e646f1c5592139cf131e2bf572fa9728dbfac0390865410f3fa1f25743c497e12cb352eac4046b4500f95cfdfb4cf22a3be5c564a47654334c01d5732d382e27bbccd9b903000000c404000000d32dbd21f3ae581d32e69ef9327f7b487d1b4f4502838c08136678bd90733173ab78d6fc264b373611f15c439384"], 0xa6) getsockopt$inet_sctp6_SCTP_RTOINFO(r1, 0x84, 0x0, &(0x7f0000000080)={0x0, 0x200, 0x2, 0xffffffff}, &(0x7f0000000100)=0x10) 00:28:21 executing program 2: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(&(0x7f0000000080)=@nbd={'/dev/nbd', 0x0, 0xe0000}, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000240)='hf+\x00\xe6\xa6\xe2\x06g\x96\xb3\v\xf2p\xd5:\x95p\x99\x92\xf2\xc4\x80\x1f\x01\x05\xb8e?\xbfwk\xe4\xe5\xca\x82\xeb\xb1\x04wn*\xf2\xc6\x9d\xc4!\x9e?\x83\x99\x0e\xcc\xa3\x95q.C\xee\x8dIf\xec\xbf\xe8\xb2\t\xedg\x9d\xd9\v\xce\xa3\xa3\xa5\x89F\x03\xefQ\x89\f\xeeRK\x15\xec{D\x9e\x83Z\xabTa\x8e\xcd\x01\xd0\xcfd\xf9c\x87m\xbe>\x81\xba\x9d2\x1c\a,\x12\xbf\xef\xb8m\v\xdf\x8e\xd5\xf5\x1a\xabD\xf6\xe0\x95\xf4\xfeRb_+\xeb\xf9f\xe8\\\x16\xeb\x87\x8e\x8acn4,\x80Q<\x84\xaep\xf9\xfc\x8e\x9f\xed\x06.a\xd5o\x14\r&L\xbd\xb9g\x82;+n\xd5\xcca\v\x86Z\x872\xc3c:`\xf2\x02\xc2\x92\x841\xe7\xca}\"@6}j\x0e\xb7\xa9\xbc\xf3N\xa3\xf3mbd\xfbS\x80\xe0\x11<\x7f\x84\xbe\xa2\xf9\xf7\xee\xf6\x94x\x9d\xe2{\xc5\x83\xc0M\xbb\xd4Io\r\x1c\xd7<\xc0\x84=`\xf1^Y', 0x0, 0x0) 00:28:21 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000480)=@acquire={0x1ac, 0x17, 0x1, 0x0, 0x0, {{@in=@multicast1}, @in6=@ipv4={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffff000], [], @dev}, {@in=@loopback, @in6=@local}, {{@in, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x2}}}, [@tmpl={0x84, 0x5, [{{@in6=@mcast1, 0x0, 0x3c}, 0x0, @in=@multicast1}, {{@in=@remote, 0x0, 0x3c}, 0x0, @in=@broadcast}]}]}, 0x1ac}}, 0x0) 00:28:21 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00004e7000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f}, 0xc, &(0x7f0000000440)={&(0x7f00000001c0)=ANY=[@ANYBLOB="1c00000022000100000000000061960d0100000008fe0c009d0a6be0e6d9fc638f19561d6ceb8a6c9239228215fd206cf204e07953", @ANYRES32=0x0], 0x2}, 0x1, 0x0, 0x0, 0xffffffffffffffff}, 0x0) 00:28:21 executing program 0: syz_mount_image$reiserfs(&(0x7f0000000180)='reis\nrfs\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[@ANYBLOB='jdev=./file0,jdev=']) 00:28:21 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000180)='./control\x00', 0x0) get_thread_area(0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x3) write$binfmt_script(r0, &(0x7f0000000bc0)=ANY=[@ANYBLOB="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"], 0x145) close(r0) execve(&(0x7f0000000180)='./file0\x00', &(0x7f0000000140), &(0x7f0000000140)) r1 = open(&(0x7f0000000000)='./control\x00', 0x80, 0x10) statfs(&(0x7f0000000380)='./control\x00', &(0x7f00000003c0)=""/20) write$P9_RWALK(r0, &(0x7f0000000400)=ANY=[@ANYBLOB="300000006f0100030001030000000400000000000000100000000003000002000000000300000000000000e646f1c5592139cf131e2bf572fa9728dbfac0390865410f3fa1f25743c497e12cb352eac4046b4500f95cfdfb4cf22a3be5c564a47654334c01d5732d382e27bbccd9b903000000c404000000d32dbd21f3ae581d32e69ef9327f7b487d1b4f4502838c08136678bd90733173ab78d6fc264b373611f15c439384"], 0xa6) getsockopt$inet_sctp6_SCTP_RTOINFO(r1, 0x84, 0x0, &(0x7f0000000080)={0x0, 0x200, 0x2, 0xffffffff}, &(0x7f0000000100)=0x10) 00:28:21 executing program 2: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(&(0x7f0000000080)=@nbd={'/dev/nbd', 0x0, 0xe0000}, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000240)='hf-\x00\xe6\xa6\xe2\x06g\x96\xb3\v\xf2p\xd5:\x95p\x99\x92\xf2\xc4\x80\x1f\x01\x05\xb8e?\xbfwk\xe4\xe5\xca\x82\xeb\xb1\x04wn*\xf2\xc6\x9d\xc4!\x9e?\x83\x99\x0e\xcc\xa3\x95q.C\xee\x8dIf\xec\xbf\xe8\xb2\t\xedg\x9d\xd9\v\xce\xa3\xa3\xa5\x89F\x03\xefQ\x89\f\xeeRK\x15\xec{D\x9e\x83Z\xabTa\x8e\xcd\x01\xd0\xcfd\xf9c\x87m\xbe>\x81\xba\x9d2\x1c\a,\x12\xbf\xef\xb8m\v\xdf\x8e\xd5\xf5\x1a\xabD\xf6\xe0\x95\xf4\xfeRb_+\xeb\xf9f\xe8\\\x16\xeb\x87\x8e\x8acn4,\x80Q<\x84\xaep\xf9\xfc\x8e\x9f\xed\x06.a\xd5o\x14\r&L\xbd\xb9g\x82;+n\xd5\xcca\v\x86Z\x872\xc3c:`\xf2\x02\xc2\x92\x841\xe7\xca}\"@6}j\x0e\xb7\xa9\xbc\xf3N\xa3\xf3mbd\xfbS\x80\xe0\x11<\x7f\x84\xbe\xa2\xf9\xf7\xee\xf6\x94x\x9d\xe2{\xc5\x83\xc0M\xbb\xd4Io\r\x1c\xd7<\xc0\x84=`\xf1^Y', 0x0, 0x0) 00:28:21 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000480)=@acquire={0x1ac, 0x17, 0x1, 0x0, 0x0, {{@in=@multicast1}, @in6=@ipv4={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2], [], @dev}, {@in=@loopback, @in6=@local}, {{@in, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x2}}}, [@tmpl={0x84, 0x5, [{{@in6=@mcast1, 0x0, 0x3c}, 0x0, @in=@multicast1}, {{@in=@remote, 0x0, 0x3c}, 0x0, @in=@broadcast}]}]}, 0x1ac}}, 0x0) 00:28:21 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00004e7000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f}, 0xc, &(0x7f0000000440)={&(0x7f00000001c0)=ANY=[@ANYBLOB="1c00000022000100000000000061960d0100000008fe0c009d0a6be0e6d9fc638f19561d6ceb8a6c9239228215fd206cf204e07953", @ANYRES32=0x0], 0x2}, 0x1, 0x0, 0x0, 0xffffffffffffffff}, 0x0) 00:28:22 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000480)=@acquire={0x1ac, 0x17, 0x1, 0x0, 0x0, {{@in=@multicast1}, @in6=@ipv4={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3], [], @dev}, {@in=@loopback, @in6=@local}, {{@in, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x2}}}, [@tmpl={0x84, 0x5, [{{@in6=@mcast1, 0x0, 0x3c}, 0x0, @in=@multicast1}, {{@in=@remote, 0x0, 0x3c}, 0x0, @in=@broadcast}]}]}, 0x1ac}}, 0x0) 00:28:22 executing program 2: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(&(0x7f0000000080)=@nbd={'/dev/nbd', 0x0, 0xe0000}, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000240)='hf.\x00\xe6\xa6\xe2\x06g\x96\xb3\v\xf2p\xd5:\x95p\x99\x92\xf2\xc4\x80\x1f\x01\x05\xb8e?\xbfwk\xe4\xe5\xca\x82\xeb\xb1\x04wn*\xf2\xc6\x9d\xc4!\x9e?\x83\x99\x0e\xcc\xa3\x95q.C\xee\x8dIf\xec\xbf\xe8\xb2\t\xedg\x9d\xd9\v\xce\xa3\xa3\xa5\x89F\x03\xefQ\x89\f\xeeRK\x15\xec{D\x9e\x83Z\xabTa\x8e\xcd\x01\xd0\xcfd\xf9c\x87m\xbe>\x81\xba\x9d2\x1c\a,\x12\xbf\xef\xb8m\v\xdf\x8e\xd5\xf5\x1a\xabD\xf6\xe0\x95\xf4\xfeRb_+\xeb\xf9f\xe8\\\x16\xeb\x87\x8e\x8acn4,\x80Q<\x84\xaep\xf9\xfc\x8e\x9f\xed\x06.a\xd5o\x14\r&L\xbd\xb9g\x82;+n\xd5\xcca\v\x86Z\x872\xc3c:`\xf2\x02\xc2\x92\x841\xe7\xca}\"@6}j\x0e\xb7\xa9\xbc\xf3N\xa3\xf3mbd\xfbS\x80\xe0\x11<\x7f\x84\xbe\xa2\xf9\xf7\xee\xf6\x94x\x9d\xe2{\xc5\x83\xc0M\xbb\xd4Io\r\x1c\xd7<\xc0\x84=`\xf1^Y', 0x0, 0x0) 00:28:22 executing program 1: syz_mount_image$reiserfs(&(0x7f0000000180)='reiherfs\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[@ANYBLOB='jdev=.']) 00:28:22 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000180)='./control\x00', 0x0) get_thread_area(0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x3) write$binfmt_script(r0, &(0x7f0000000bc0)=ANY=[@ANYBLOB="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"], 0x145) close(r0) execve(&(0x7f0000000180)='./file0\x00', &(0x7f0000000140), &(0x7f0000000140)) r1 = open(&(0x7f0000000000)='./control\x00', 0x80, 0x10) statfs(&(0x7f0000000380)='./control\x00', &(0x7f00000003c0)=""/20) write$P9_RWALK(r0, &(0x7f0000000400)=ANY=[@ANYBLOB="300000006f0100030001030000000400000000000000100000000003000002000000000300000000000000e646f1c5592139cf131e2bf572fa9728dbfac0390865410f3fa1f25743c497e12cb352eac4046b4500f95cfdfb4cf22a3be5c564a47654334c01d5732d382e27bbccd9b903000000c404000000d32dbd21f3ae581d32e69ef9327f7b487d1b4f4502838c08136678bd90733173ab78d6fc264b373611f15c43"], 0xa4) getsockopt$inet_sctp6_SCTP_RTOINFO(r1, 0x84, 0x0, &(0x7f0000000080)={0x0, 0x200, 0x2, 0xffffffff}, &(0x7f0000000100)=0x10) 00:28:22 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00004e7000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f}, 0xc, &(0x7f0000000440)={&(0x7f00000001c0)=ANY=[@ANYBLOB="1c00000022000100000000000061960d0100000008fe0c009d0a6be0e6d9fc638f19561d6ceb8a6c9239228215fd206cf204e07953", @ANYRES32=0x0], 0x2}, 0x1, 0x0, 0x0, 0xffffffffffffffff}, 0x0) 00:28:22 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000480)=@acquire={0x1ac, 0x17, 0x1, 0x0, 0x0, {{@in=@multicast1}, @in6=@ipv4={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4], [], @dev}, {@in=@loopback, @in6=@local}, {{@in, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x2}}}, [@tmpl={0x84, 0x5, [{{@in6=@mcast1, 0x0, 0x3c}, 0x0, @in=@multicast1}, {{@in=@remote, 0x0, 0x3c}, 0x0, @in=@broadcast}]}]}, 0x1ac}}, 0x0) 00:28:22 executing program 2: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(&(0x7f0000000080)=@nbd={'/dev/nbd', 0x0, 0xe0000}, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000240)='hf0\x00\xe6\xa6\xe2\x06g\x96\xb3\v\xf2p\xd5:\x95p\x99\x92\xf2\xc4\x80\x1f\x01\x05\xb8e?\xbfwk\xe4\xe5\xca\x82\xeb\xb1\x04wn*\xf2\xc6\x9d\xc4!\x9e?\x83\x99\x0e\xcc\xa3\x95q.C\xee\x8dIf\xec\xbf\xe8\xb2\t\xedg\x9d\xd9\v\xce\xa3\xa3\xa5\x89F\x03\xefQ\x89\f\xeeRK\x15\xec{D\x9e\x83Z\xabTa\x8e\xcd\x01\xd0\xcfd\xf9c\x87m\xbe>\x81\xba\x9d2\x1c\a,\x12\xbf\xef\xb8m\v\xdf\x8e\xd5\xf5\x1a\xabD\xf6\xe0\x95\xf4\xfeRb_+\xeb\xf9f\xe8\\\x16\xeb\x87\x8e\x8acn4,\x80Q<\x84\xaep\xf9\xfc\x8e\x9f\xed\x06.a\xd5o\x14\r&L\xbd\xb9g\x82;+n\xd5\xcca\v\x86Z\x872\xc3c:`\xf2\x02\xc2\x92\x841\xe7\xca}\"@6}j\x0e\xb7\xa9\xbc\xf3N\xa3\xf3mbd\xfbS\x80\xe0\x11<\x7f\x84\xbe\xa2\xf9\xf7\xee\xf6\x94x\x9d\xe2{\xc5\x83\xc0M\xbb\xd4Io\r\x1c\xd7<\xc0\x84=`\xf1^Y', 0x0, 0x0) 00:28:22 executing program 0: syz_mount_image$reiserfs(&(0x7f0000000180)='reis%rfs\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[@ANYBLOB='jdev=./file0,jdev=']) 00:28:22 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00004e7000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f}, 0xc, &(0x7f0000000440)={&(0x7f00000001c0)=ANY=[@ANYBLOB="1c00000022000100000000000061960d0100000008fe0c009d0a6be0e6d9fc638f19561d6ceb8a6c9239228215fd206cf204e07953", @ANYRES32=0x0], 0x2}, 0x1, 0x0, 0x0, 0xffffffffffffffff}, 0x0) 00:28:22 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000480)=@acquire={0x1ac, 0x17, 0x1, 0x0, 0x0, {{@in=@multicast1}, @in6=@ipv4={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5], [], @dev}, {@in=@loopback, @in6=@local}, {{@in, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x2}}}, [@tmpl={0x84, 0x5, [{{@in6=@mcast1, 0x0, 0x3c}, 0x0, @in=@multicast1}, {{@in=@remote, 0x0, 0x3c}, 0x0, @in=@broadcast}]}]}, 0x1ac}}, 0x0) 00:28:22 executing program 2: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(&(0x7f0000000080)=@nbd={'/dev/nbd', 0x0, 0xe0000}, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000240)='hfX\x00\xe6\xa6\xe2\x06g\x96\xb3\v\xf2p\xd5:\x95p\x99\x92\xf2\xc4\x80\x1f\x01\x05\xb8e?\xbfwk\xe4\xe5\xca\x82\xeb\xb1\x04wn*\xf2\xc6\x9d\xc4!\x9e?\x83\x99\x0e\xcc\xa3\x95q.C\xee\x8dIf\xec\xbf\xe8\xb2\t\xedg\x9d\xd9\v\xce\xa3\xa3\xa5\x89F\x03\xefQ\x89\f\xeeRK\x15\xec{D\x9e\x83Z\xabTa\x8e\xcd\x01\xd0\xcfd\xf9c\x87m\xbe>\x81\xba\x9d2\x1c\a,\x12\xbf\xef\xb8m\v\xdf\x8e\xd5\xf5\x1a\xabD\xf6\xe0\x95\xf4\xfeRb_+\xeb\xf9f\xe8\\\x16\xeb\x87\x8e\x8acn4,\x80Q<\x84\xaep\xf9\xfc\x8e\x9f\xed\x06.a\xd5o\x14\r&L\xbd\xb9g\x82;+n\xd5\xcca\v\x86Z\x872\xc3c:`\xf2\x02\xc2\x92\x841\xe7\xca}\"@6}j\x0e\xb7\xa9\xbc\xf3N\xa3\xf3mbd\xfbS\x80\xe0\x11<\x7f\x84\xbe\xa2\xf9\xf7\xee\xf6\x94x\x9d\xe2{\xc5\x83\xc0M\xbb\xd4Io\r\x1c\xd7<\xc0\x84=`\xf1^Y', 0x0, 0x0) 00:28:22 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000180)='./control\x00', 0x0) get_thread_area(0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x3) write$binfmt_script(r0, &(0x7f0000000bc0)=ANY=[@ANYBLOB="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"], 0x145) close(r0) execve(&(0x7f0000000180)='./file0\x00', &(0x7f0000000140), &(0x7f0000000140)) r1 = open(&(0x7f0000000000)='./control\x00', 0x80, 0x10) statfs(&(0x7f0000000380)='./control\x00', &(0x7f00000003c0)=""/20) write$P9_RWALK(r0, &(0x7f0000000400)=ANY=[@ANYBLOB="300000006f0100030001030000000400000000000000100000000003000002000000000300000000000000e646f1c5592139cf131e2bf572fa9728dbfac0390865410f3fa1f25743c497e12cb352eac4046b4500f95cfdfb4cf22a3be5c564a47654334c01d5732d382e27bbccd9b903000000c404000000d32dbd21f3ae581d32e69ef9327f7b487d1b4f4502838c08136678bd90733173ab78d6fc264b373611f15c43"], 0xa4) getsockopt$inet_sctp6_SCTP_RTOINFO(r1, 0x84, 0x0, &(0x7f0000000080)={0x0, 0x200, 0x2, 0xffffffff}, &(0x7f0000000100)=0x10) 00:28:22 executing program 1: syz_mount_image$reiserfs(&(0x7f0000000180)='reiierfs\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[@ANYBLOB='jdev=.']) 00:28:22 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000480)=@acquire={0x1ac, 0x17, 0x1, 0x0, 0x0, {{@in=@multicast1}, @in6=@ipv4={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6], [], @dev}, {@in=@loopback, @in6=@local}, {{@in, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x2}}}, [@tmpl={0x84, 0x5, [{{@in6=@mcast1, 0x0, 0x3c}, 0x0, @in=@multicast1}, {{@in=@remote, 0x0, 0x3c}, 0x0, @in=@broadcast}]}]}, 0x1ac}}, 0x0) 00:28:22 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00004e7000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f}, 0xc, &(0x7f0000000440)={&(0x7f00000001c0)=ANY=[@ANYBLOB="1c00000022000100000000000061960d0100000008fe0c009d0a6be0e6d9fc638f19561d6ceb8a6c9239228215fd206cf204e07953", @ANYRES32=0x0], 0x2}, 0x1, 0x0, 0x0, 0xffffffffffffffff}, 0x0) 00:28:22 executing program 2: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(&(0x7f0000000080)=@nbd={'/dev/nbd', 0x0, 0xe0000}, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000240)='hfc\x00\xe6\xa6\xe2\x06g\x96\xb3\v\xf2p\xd5:\x95p\x99\x92\xf2\xc4\x80\x1f\x01\x05\xb8e?\xbfwk\xe4\xe5\xca\x82\xeb\xb1\x04wn*\xf2\xc6\x9d\xc4!\x9e?\x83\x99\x0e\xcc\xa3\x95q.C\xee\x8dIf\xec\xbf\xe8\xb2\t\xedg\x9d\xd9\v\xce\xa3\xa3\xa5\x89F\x03\xefQ\x89\f\xeeRK\x15\xec{D\x9e\x83Z\xabTa\x8e\xcd\x01\xd0\xcfd\xf9c\x87m\xbe>\x81\xba\x9d2\x1c\a,\x12\xbf\xef\xb8m\v\xdf\x8e\xd5\xf5\x1a\xabD\xf6\xe0\x95\xf4\xfeRb_+\xeb\xf9f\xe8\\\x16\xeb\x87\x8e\x8acn4,\x80Q<\x84\xaep\xf9\xfc\x8e\x9f\xed\x06.a\xd5o\x14\r&L\xbd\xb9g\x82;+n\xd5\xcca\v\x86Z\x872\xc3c:`\xf2\x02\xc2\x92\x841\xe7\xca}\"@6}j\x0e\xb7\xa9\xbc\xf3N\xa3\xf3mbd\xfbS\x80\xe0\x11<\x7f\x84\xbe\xa2\xf9\xf7\xee\xf6\x94x\x9d\xe2{\xc5\x83\xc0M\xbb\xd4Io\r\x1c\xd7<\xc0\x84=`\xf1^Y', 0x0, 0x0) 00:28:22 executing program 0: syz_mount_image$reiserfs(&(0x7f0000000180)='reis\x86rfs\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[@ANYBLOB='jdev=./file0,jdev=']) 00:28:22 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000480)=@acquire={0x1ac, 0x17, 0x1, 0x0, 0x0, {{@in=@multicast1}, @in6=@ipv4={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8], [], @dev}, {@in=@loopback, @in6=@local}, {{@in, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x2}}}, [@tmpl={0x84, 0x5, [{{@in6=@mcast1, 0x0, 0x3c}, 0x0, @in=@multicast1}, {{@in=@remote, 0x0, 0x3c}, 0x0, @in=@broadcast}]}]}, 0x1ac}}, 0x0) 00:28:22 executing program 2: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(&(0x7f0000000080)=@nbd={'/dev/nbd', 0x0, 0xe0000}, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000240)='hfd\x00\xe6\xa6\xe2\x06g\x96\xb3\v\xf2p\xd5:\x95p\x99\x92\xf2\xc4\x80\x1f\x01\x05\xb8e?\xbfwk\xe4\xe5\xca\x82\xeb\xb1\x04wn*\xf2\xc6\x9d\xc4!\x9e?\x83\x99\x0e\xcc\xa3\x95q.C\xee\x8dIf\xec\xbf\xe8\xb2\t\xedg\x9d\xd9\v\xce\xa3\xa3\xa5\x89F\x03\xefQ\x89\f\xeeRK\x15\xec{D\x9e\x83Z\xabTa\x8e\xcd\x01\xd0\xcfd\xf9c\x87m\xbe>\x81\xba\x9d2\x1c\a,\x12\xbf\xef\xb8m\v\xdf\x8e\xd5\xf5\x1a\xabD\xf6\xe0\x95\xf4\xfeRb_+\xeb\xf9f\xe8\\\x16\xeb\x87\x8e\x8acn4,\x80Q<\x84\xaep\xf9\xfc\x8e\x9f\xed\x06.a\xd5o\x14\r&L\xbd\xb9g\x82;+n\xd5\xcca\v\x86Z\x872\xc3c:`\xf2\x02\xc2\x92\x841\xe7\xca}\"@6}j\x0e\xb7\xa9\xbc\xf3N\xa3\xf3mbd\xfbS\x80\xe0\x11<\x7f\x84\xbe\xa2\xf9\xf7\xee\xf6\x94x\x9d\xe2{\xc5\x83\xc0M\xbb\xd4Io\r\x1c\xd7<\xc0\x84=`\xf1^Y', 0x0, 0x0) 00:28:23 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000480)=@acquire={0x1ac, 0x17, 0x1, 0x0, 0x0, {{@in=@multicast1}, @in6=@ipv4={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9], [], @dev}, {@in=@loopback, @in6=@local}, {{@in, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x2}}}, [@tmpl={0x84, 0x5, [{{@in6=@mcast1, 0x0, 0x3c}, 0x0, @in=@multicast1}, {{@in=@remote, 0x0, 0x3c}, 0x0, @in=@broadcast}]}]}, 0x1ac}}, 0x0) 00:28:23 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000180)='./control\x00', 0x0) get_thread_area(0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x3) write$binfmt_script(r0, &(0x7f0000000bc0)=ANY=[@ANYBLOB="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"], 0x145) close(r0) execve(&(0x7f0000000180)='./file0\x00', &(0x7f0000000140), &(0x7f0000000140)) r1 = open(&(0x7f0000000000)='./control\x00', 0x80, 0x10) statfs(&(0x7f0000000380)='./control\x00', &(0x7f00000003c0)=""/20) write$P9_RWALK(r0, &(0x7f0000000400)=ANY=[@ANYBLOB="300000006f0100030001030000000400000000000000100000000003000002000000000300000000000000e646f1c5592139cf131e2bf572fa9728dbfac0390865410f3fa1f25743c497e12cb352eac4046b4500f95cfdfb4cf22a3be5c564a47654334c01d5732d382e27bbccd9b903000000c404000000d32dbd21f3ae581d32e69ef9327f7b487d1b4f4502838c08136678bd90733173ab78d6fc264b373611f15c43"], 0xa4) getsockopt$inet_sctp6_SCTP_RTOINFO(r1, 0x84, 0x0, &(0x7f0000000080)={0x0, 0x200, 0x2, 0xffffffff}, &(0x7f0000000100)=0x10) 00:28:23 executing program 1: syz_mount_image$reiserfs(&(0x7f0000000180)='reikerfs\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[@ANYBLOB='jdev=.']) 00:28:23 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00004e7000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f}, 0xc, &(0x7f0000000440)={&(0x7f00000001c0)=ANY=[@ANYBLOB="1c00000022000100000000000061960d0100000008fe0c009d0a6be0e6d9fc638f19561d6ceb8a6c9239228215fd206cf204e07953", @ANYRES32=0x0], 0x2}, 0x1, 0x0, 0x0, 0xffffffffffffffff}, 0x0) 00:28:23 executing program 0: syz_mount_image$reiserfs(&(0x7f0000000180)='reise\nfs\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[@ANYBLOB='jdev=./file0,jdev=']) 00:28:23 executing program 2: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(&(0x7f0000000080)=@nbd={'/dev/nbd', 0x0, 0xe0000}, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000240)='hfi\x00\xe6\xa6\xe2\x06g\x96\xb3\v\xf2p\xd5:\x95p\x99\x92\xf2\xc4\x80\x1f\x01\x05\xb8e?\xbfwk\xe4\xe5\xca\x82\xeb\xb1\x04wn*\xf2\xc6\x9d\xc4!\x9e?\x83\x99\x0e\xcc\xa3\x95q.C\xee\x8dIf\xec\xbf\xe8\xb2\t\xedg\x9d\xd9\v\xce\xa3\xa3\xa5\x89F\x03\xefQ\x89\f\xeeRK\x15\xec{D\x9e\x83Z\xabTa\x8e\xcd\x01\xd0\xcfd\xf9c\x87m\xbe>\x81\xba\x9d2\x1c\a,\x12\xbf\xef\xb8m\v\xdf\x8e\xd5\xf5\x1a\xabD\xf6\xe0\x95\xf4\xfeRb_+\xeb\xf9f\xe8\\\x16\xeb\x87\x8e\x8acn4,\x80Q<\x84\xaep\xf9\xfc\x8e\x9f\xed\x06.a\xd5o\x14\r&L\xbd\xb9g\x82;+n\xd5\xcca\v\x86Z\x872\xc3c:`\xf2\x02\xc2\x92\x841\xe7\xca}\"@6}j\x0e\xb7\xa9\xbc\xf3N\xa3\xf3mbd\xfbS\x80\xe0\x11<\x7f\x84\xbe\xa2\xf9\xf7\xee\xf6\x94x\x9d\xe2{\xc5\x83\xc0M\xbb\xd4Io\r\x1c\xd7<\xc0\x84=`\xf1^Y', 0x0, 0x0) 00:28:23 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000480)=@acquire={0x1ac, 0x17, 0x1, 0x0, 0x0, {{@in=@multicast1}, @in6=@ipv4={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa], [], @dev}, {@in=@loopback, @in6=@local}, {{@in, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x2}}}, [@tmpl={0x84, 0x5, [{{@in6=@mcast1, 0x0, 0x3c}, 0x0, @in=@multicast1}, {{@in=@remote, 0x0, 0x3c}, 0x0, @in=@broadcast}]}]}, 0x1ac}}, 0x0) 00:28:23 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000180)='./control\x00', 0x0) get_thread_area(0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x3) write$binfmt_script(r0, &(0x7f0000000bc0)=ANY=[@ANYBLOB="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"], 0x145) close(r0) execve(&(0x7f0000000180)='./file0\x00', &(0x7f0000000140), &(0x7f0000000140)) r1 = open(&(0x7f0000000000)='./control\x00', 0x80, 0x10) statfs(&(0x7f0000000380)='./control\x00', &(0x7f00000003c0)=""/20) write$P9_RWALK(r0, &(0x7f0000000400)=ANY=[@ANYBLOB="300000006f0100030001030000000400000000000000100000000003000002000000000300000000000000e646f1c5592139cf131e2bf572fa9728dbfac0390865410f3fa1f25743c497e12cb352eac4046b4500f95cfdfb4cf22a3be5c564a47654334c01d5732d382e27bbccd9b903000000c404000000d32dbd21f3ae581d32e69ef9327f7b487d1b4f4502838c08136678bd90733173ab78d6fc264b373611f15c4393"], 0xa5) getsockopt$inet_sctp6_SCTP_RTOINFO(r1, 0x84, 0x0, &(0x7f0000000080)={0x0, 0x200, 0x2, 0xffffffff}, &(0x7f0000000100)=0x10) 00:28:23 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00004e7000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f}, 0xc, &(0x7f0000000440)={&(0x7f00000001c0)=ANY=[@ANYBLOB="1c00000022000100000000000061960d0100000008fe0c009d0a6be0e6d9fc638f19561d6ceb8a6c9239228215fd206cf204e07953", @ANYRES32=0x0], 0x2}, 0x1, 0x0, 0x0, 0xffffffffffffffff}, 0x0) 00:28:23 executing program 1: syz_mount_image$reiserfs(&(0x7f0000000180)='reilerfs\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[@ANYBLOB='jdev=.']) 00:28:23 executing program 2: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(&(0x7f0000000080)=@nbd={'/dev/nbd', 0x0, 0xe0000}, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000240)='hfl\x00\xe6\xa6\xe2\x06g\x96\xb3\v\xf2p\xd5:\x95p\x99\x92\xf2\xc4\x80\x1f\x01\x05\xb8e?\xbfwk\xe4\xe5\xca\x82\xeb\xb1\x04wn*\xf2\xc6\x9d\xc4!\x9e?\x83\x99\x0e\xcc\xa3\x95q.C\xee\x8dIf\xec\xbf\xe8\xb2\t\xedg\x9d\xd9\v\xce\xa3\xa3\xa5\x89F\x03\xefQ\x89\f\xeeRK\x15\xec{D\x9e\x83Z\xabTa\x8e\xcd\x01\xd0\xcfd\xf9c\x87m\xbe>\x81\xba\x9d2\x1c\a,\x12\xbf\xef\xb8m\v\xdf\x8e\xd5\xf5\x1a\xabD\xf6\xe0\x95\xf4\xfeRb_+\xeb\xf9f\xe8\\\x16\xeb\x87\x8e\x8acn4,\x80Q<\x84\xaep\xf9\xfc\x8e\x9f\xed\x06.a\xd5o\x14\r&L\xbd\xb9g\x82;+n\xd5\xcca\v\x86Z\x872\xc3c:`\xf2\x02\xc2\x92\x841\xe7\xca}\"@6}j\x0e\xb7\xa9\xbc\xf3N\xa3\xf3mbd\xfbS\x80\xe0\x11<\x7f\x84\xbe\xa2\xf9\xf7\xee\xf6\x94x\x9d\xe2{\xc5\x83\xc0M\xbb\xd4Io\r\x1c\xd7<\xc0\x84=`\xf1^Y', 0x0, 0x0) 00:28:23 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000480)=@acquire={0x1ac, 0x17, 0x1, 0x0, 0x0, {{@in=@multicast1}, @in6=@ipv4={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb], [], @dev}, {@in=@loopback, @in6=@local}, {{@in, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x2}}}, [@tmpl={0x84, 0x5, [{{@in6=@mcast1, 0x0, 0x3c}, 0x0, @in=@multicast1}, {{@in=@remote, 0x0, 0x3c}, 0x0, @in=@broadcast}]}]}, 0x1ac}}, 0x0) 00:28:23 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00004e7000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f}, 0xc, &(0x7f0000000440)={&(0x7f00000001c0)=ANY=[@ANYBLOB="1c00000022000100000000000061960d0100000008fe0c009d0a6be0e6d9fc638f19561d6ceb8a6c9239228215fd206cf204e07953", @ANYRES32=0x0], 0x2}, 0x1, 0x0, 0x0, 0xffffffffffffffff}, 0x0) 00:28:23 executing program 0: syz_mount_image$reiserfs(&(0x7f0000000180)='reise%fs\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[@ANYBLOB='jdev=./file0,jdev=']) 00:28:23 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000180)='./control\x00', 0x0) get_thread_area(0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x3) write$binfmt_script(r0, &(0x7f0000000bc0)=ANY=[@ANYBLOB="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"], 0x145) close(r0) execve(&(0x7f0000000180)='./file0\x00', &(0x7f0000000140), &(0x7f0000000140)) r1 = open(&(0x7f0000000000)='./control\x00', 0x80, 0x10) statfs(&(0x7f0000000380)='./control\x00', &(0x7f00000003c0)=""/20) write$P9_RWALK(r0, &(0x7f0000000400)=ANY=[@ANYBLOB="300000006f0100030001030000000400000000000000100000000003000002000000000300000000000000e646f1c5592139cf131e2bf572fa9728dbfac0390865410f3fa1f25743c497e12cb352eac4046b4500f95cfdfb4cf22a3be5c564a47654334c01d5732d382e27bbccd9b903000000c404000000d32dbd21f3ae581d32e69ef9327f7b487d1b4f4502838c08136678bd90733173ab78d6fc264b373611f15c4393"], 0xa5) getsockopt$inet_sctp6_SCTP_RTOINFO(r1, 0x84, 0x0, &(0x7f0000000080)={0x0, 0x200, 0x2, 0xffffffff}, &(0x7f0000000100)=0x10) 00:28:23 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000480)=@acquire={0x1ac, 0x17, 0x1, 0x0, 0x0, {{@in=@multicast1}, @in6=@ipv4={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe], [], @dev}, {@in=@loopback, @in6=@local}, {{@in, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x2}}}, [@tmpl={0x84, 0x5, [{{@in6=@mcast1, 0x0, 0x3c}, 0x0, @in=@multicast1}, {{@in=@remote, 0x0, 0x3c}, 0x0, @in=@broadcast}]}]}, 0x1ac}}, 0x0) 00:28:23 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00004e7000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f}, 0xc, &(0x7f0000000440)={&(0x7f00000001c0)=ANY=[@ANYBLOB="1c00000022000100000000000061960d0100000008fe0c009d0a6be0e6d9fc638f19561d6ceb8a6c9239228215fd206cf204e07953", @ANYRES32=0x0], 0x2}, 0x1, 0x0, 0x0, 0xffffffffffffffff}, 0x0) 00:28:23 executing program 2: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(&(0x7f0000000080)=@nbd={'/dev/nbd', 0x0, 0xe0000}, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000240)='hfo\x00\xe6\xa6\xe2\x06g\x96\xb3\v\xf2p\xd5:\x95p\x99\x92\xf2\xc4\x80\x1f\x01\x05\xb8e?\xbfwk\xe4\xe5\xca\x82\xeb\xb1\x04wn*\xf2\xc6\x9d\xc4!\x9e?\x83\x99\x0e\xcc\xa3\x95q.C\xee\x8dIf\xec\xbf\xe8\xb2\t\xedg\x9d\xd9\v\xce\xa3\xa3\xa5\x89F\x03\xefQ\x89\f\xeeRK\x15\xec{D\x9e\x83Z\xabTa\x8e\xcd\x01\xd0\xcfd\xf9c\x87m\xbe>\x81\xba\x9d2\x1c\a,\x12\xbf\xef\xb8m\v\xdf\x8e\xd5\xf5\x1a\xabD\xf6\xe0\x95\xf4\xfeRb_+\xeb\xf9f\xe8\\\x16\xeb\x87\x8e\x8acn4,\x80Q<\x84\xaep\xf9\xfc\x8e\x9f\xed\x06.a\xd5o\x14\r&L\xbd\xb9g\x82;+n\xd5\xcca\v\x86Z\x872\xc3c:`\xf2\x02\xc2\x92\x841\xe7\xca}\"@6}j\x0e\xb7\xa9\xbc\xf3N\xa3\xf3mbd\xfbS\x80\xe0\x11<\x7f\x84\xbe\xa2\xf9\xf7\xee\xf6\x94x\x9d\xe2{\xc5\x83\xc0M\xbb\xd4Io\r\x1c\xd7<\xc0\x84=`\xf1^Y', 0x0, 0x0) 00:28:23 executing program 1: syz_mount_image$reiserfs(&(0x7f0000000180)='reioerfs\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[@ANYBLOB='jdev=.']) 00:28:23 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000480)=@acquire={0x1ac, 0x17, 0x1, 0x0, 0x0, {{@in=@multicast1}, @in6=@ipv4={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf], [], @dev}, {@in=@loopback, @in6=@local}, {{@in, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x2}}}, [@tmpl={0x84, 0x5, [{{@in6=@mcast1, 0x0, 0x3c}, 0x0, @in=@multicast1}, {{@in=@remote, 0x0, 0x3c}, 0x0, @in=@broadcast}]}]}, 0x1ac}}, 0x0) 00:28:24 executing program 2: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(&(0x7f0000000080)=@nbd={'/dev/nbd', 0x0, 0xe0000}, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000240)='hfp\x00\xe6\xa6\xe2\x06g\x96\xb3\v\xf2p\xd5:\x95p\x99\x92\xf2\xc4\x80\x1f\x01\x05\xb8e?\xbfwk\xe4\xe5\xca\x82\xeb\xb1\x04wn*\xf2\xc6\x9d\xc4!\x9e?\x83\x99\x0e\xcc\xa3\x95q.C\xee\x8dIf\xec\xbf\xe8\xb2\t\xedg\x9d\xd9\v\xce\xa3\xa3\xa5\x89F\x03\xefQ\x89\f\xeeRK\x15\xec{D\x9e\x83Z\xabTa\x8e\xcd\x01\xd0\xcfd\xf9c\x87m\xbe>\x81\xba\x9d2\x1c\a,\x12\xbf\xef\xb8m\v\xdf\x8e\xd5\xf5\x1a\xabD\xf6\xe0\x95\xf4\xfeRb_+\xeb\xf9f\xe8\\\x16\xeb\x87\x8e\x8acn4,\x80Q<\x84\xaep\xf9\xfc\x8e\x9f\xed\x06.a\xd5o\x14\r&L\xbd\xb9g\x82;+n\xd5\xcca\v\x86Z\x872\xc3c:`\xf2\x02\xc2\x92\x841\xe7\xca}\"@6}j\x0e\xb7\xa9\xbc\xf3N\xa3\xf3mbd\xfbS\x80\xe0\x11<\x7f\x84\xbe\xa2\xf9\xf7\xee\xf6\x94x\x9d\xe2{\xc5\x83\xc0M\xbb\xd4Io\r\x1c\xd7<\xc0\x84=`\xf1^Y', 0x0, 0x0) 00:28:24 executing program 0: syz_mount_image$reiserfs(&(0x7f0000000180)='reise\x86fs\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[@ANYBLOB='jdev=./file0,jdev=']) 00:28:24 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000180)='./control\x00', 0x0) get_thread_area(0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x3) write$binfmt_script(r0, &(0x7f0000000bc0)=ANY=[@ANYBLOB="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"], 0x145) close(r0) execve(&(0x7f0000000180)='./file0\x00', &(0x7f0000000140), &(0x7f0000000140)) r1 = open(&(0x7f0000000000)='./control\x00', 0x80, 0x10) statfs(&(0x7f0000000380)='./control\x00', &(0x7f00000003c0)=""/20) write$P9_RWALK(r0, &(0x7f0000000400)=ANY=[@ANYBLOB="300000006f0100030001030000000400000000000000100000000003000002000000000300000000000000e646f1c5592139cf131e2bf572fa9728dbfac0390865410f3fa1f25743c497e12cb352eac4046b4500f95cfdfb4cf22a3be5c564a47654334c01d5732d382e27bbccd9b903000000c404000000d32dbd21f3ae581d32e69ef9327f7b487d1b4f4502838c08136678bd90733173ab78d6fc264b373611f15c4393"], 0xa5) getsockopt$inet_sctp6_SCTP_RTOINFO(r1, 0x84, 0x0, &(0x7f0000000080)={0x0, 0x200, 0x2, 0xffffffff}, &(0x7f0000000100)=0x10) 00:28:24 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00004e7000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f}, 0xc, &(0x7f0000000440)={&(0x7f00000001c0)=ANY=[@ANYBLOB="1c00000022000100000000000061960d0100000008fe0c009d0a6be0e6d9fc638f19561d6ceb8a6c9239228215fd206cf204e07953", @ANYRES32=0x0], 0x2}, 0x1, 0x0, 0x0, 0xffffffffffffffff}, 0x0) 00:28:24 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000480)=@acquire={0x1ac, 0x17, 0x1, 0x0, 0x0, {{@in=@multicast1}, @in6=@ipv4={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10], [], @dev}, {@in=@loopback, @in6=@local}, {{@in, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x2}}}, [@tmpl={0x84, 0x5, [{{@in6=@mcast1, 0x0, 0x3c}, 0x0, @in=@multicast1}, {{@in=@remote, 0x0, 0x3c}, 0x0, @in=@broadcast}]}]}, 0x1ac}}, 0x0) 00:28:24 executing program 2: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(&(0x7f0000000080)=@nbd={'/dev/nbd', 0x0, 0xe0000}, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000240)='hfu\x00\xe6\xa6\xe2\x06g\x96\xb3\v\xf2p\xd5:\x95p\x99\x92\xf2\xc4\x80\x1f\x01\x05\xb8e?\xbfwk\xe4\xe5\xca\x82\xeb\xb1\x04wn*\xf2\xc6\x9d\xc4!\x9e?\x83\x99\x0e\xcc\xa3\x95q.C\xee\x8dIf\xec\xbf\xe8\xb2\t\xedg\x9d\xd9\v\xce\xa3\xa3\xa5\x89F\x03\xefQ\x89\f\xeeRK\x15\xec{D\x9e\x83Z\xabTa\x8e\xcd\x01\xd0\xcfd\xf9c\x87m\xbe>\x81\xba\x9d2\x1c\a,\x12\xbf\xef\xb8m\v\xdf\x8e\xd5\xf5\x1a\xabD\xf6\xe0\x95\xf4\xfeRb_+\xeb\xf9f\xe8\\\x16\xeb\x87\x8e\x8acn4,\x80Q<\x84\xaep\xf9\xfc\x8e\x9f\xed\x06.a\xd5o\x14\r&L\xbd\xb9g\x82;+n\xd5\xcca\v\x86Z\x872\xc3c:`\xf2\x02\xc2\x92\x841\xe7\xca}\"@6}j\x0e\xb7\xa9\xbc\xf3N\xa3\xf3mbd\xfbS\x80\xe0\x11<\x7f\x84\xbe\xa2\xf9\xf7\xee\xf6\x94x\x9d\xe2{\xc5\x83\xc0M\xbb\xd4Io\r\x1c\xd7<\xc0\x84=`\xf1^Y', 0x0, 0x0) 00:28:24 executing program 1: syz_mount_image$reiserfs(&(0x7f0000000180)='reiperfs\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[@ANYBLOB='jdev=.']) 00:28:24 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00004e7000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f}, 0xc, &(0x7f0000000440)={&(0x7f00000001c0)=ANY=[@ANYBLOB="1c00000022000100000000000061960d0100000008fe0c009d0a6be0e6d9fc638f19561d6ceb8a6c9239228215fd206cf204e07953", @ANYRES32=0x0], 0x2}, 0x1, 0x0, 0x0, 0xffffffffffffffff}, 0x0) 00:28:24 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000180)='./control\x00', 0x0) get_thread_area(0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x3) write$binfmt_script(r0, &(0x7f0000000bc0)=ANY=[@ANYBLOB="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"], 0x145) close(r0) execve(&(0x7f0000000180)='./file0\x00', &(0x7f0000000140), &(0x7f0000000140)) open(&(0x7f0000000000)='./control\x00', 0x80, 0x10) statfs(&(0x7f0000000380)='./control\x00', &(0x7f00000003c0)=""/20) write$P9_RWALK(r0, &(0x7f0000000400)=ANY=[@ANYBLOB="300000006f0100030001030000000400000000000000100000000003000002000000000300000000000000e646f1c5592139cf131e2bf572fa9728dbfac0390865410f3fa1f25743c497e12cb352eac4046b4500f95cfdfb4cf22a3be5c564a47654334c01d5732d382e27bbccd9b903000000c404000000d32dbd21f3ae581d32e69ef9327f7b487d1b4f4502838c08136678bd90733173ab78d6fc264b373611f15c439384"], 0xa6) getsockopt$inet_sctp6_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000000080)={0x0, 0x200, 0x2, 0xffffffff}, &(0x7f0000000100)=0x10) 00:28:24 executing program 0: syz_mount_image$reiserfs(&(0x7f0000000180)='reiser\ns\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[@ANYBLOB='jdev=./file0,jdev=']) 00:28:24 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000480)=@acquire={0x1ac, 0x17, 0x1, 0x0, 0x0, {{@in=@multicast1}, @in6=@ipv4={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x11], [], @dev}, {@in=@loopback, @in6=@local}, {{@in, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x2}}}, [@tmpl={0x84, 0x5, [{{@in6=@mcast1, 0x0, 0x3c}, 0x0, @in=@multicast1}, {{@in=@remote, 0x0, 0x3c}, 0x0, @in=@broadcast}]}]}, 0x1ac}}, 0x0) 00:28:24 executing program 2: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(&(0x7f0000000080)=@nbd={'/dev/nbd', 0x0, 0xe0000}, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000240)='hfx\x00\xe6\xa6\xe2\x06g\x96\xb3\v\xf2p\xd5:\x95p\x99\x92\xf2\xc4\x80\x1f\x01\x05\xb8e?\xbfwk\xe4\xe5\xca\x82\xeb\xb1\x04wn*\xf2\xc6\x9d\xc4!\x9e?\x83\x99\x0e\xcc\xa3\x95q.C\xee\x8dIf\xec\xbf\xe8\xb2\t\xedg\x9d\xd9\v\xce\xa3\xa3\xa5\x89F\x03\xefQ\x89\f\xeeRK\x15\xec{D\x9e\x83Z\xabTa\x8e\xcd\x01\xd0\xcfd\xf9c\x87m\xbe>\x81\xba\x9d2\x1c\a,\x12\xbf\xef\xb8m\v\xdf\x8e\xd5\xf5\x1a\xabD\xf6\xe0\x95\xf4\xfeRb_+\xeb\xf9f\xe8\\\x16\xeb\x87\x8e\x8acn4,\x80Q<\x84\xaep\xf9\xfc\x8e\x9f\xed\x06.a\xd5o\x14\r&L\xbd\xb9g\x82;+n\xd5\xcca\v\x86Z\x872\xc3c:`\xf2\x02\xc2\x92\x841\xe7\xca}\"@6}j\x0e\xb7\xa9\xbc\xf3N\xa3\xf3mbd\xfbS\x80\xe0\x11<\x7f\x84\xbe\xa2\xf9\xf7\xee\xf6\x94x\x9d\xe2{\xc5\x83\xc0M\xbb\xd4Io\r\x1c\xd7<\xc0\x84=`\xf1^Y', 0x0, 0x0) 00:28:24 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00004e7000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f}, 0xc, &(0x7f0000000440)={&(0x7f00000001c0)=ANY=[@ANYBLOB="1c00000022000100000000000061960d0100000008fe0c009d0a6be0e6d9fc638f19561d6ceb8a6c9239228215fd206cf204e07953", @ANYRES32=0x0], 0x2}, 0x1, 0x0, 0x0, 0xffffffffffffffff}, 0x0) 00:28:24 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000180)='./control\x00', 0x0) get_thread_area(0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x3) write$binfmt_script(r0, &(0x7f0000000bc0)=ANY=[@ANYBLOB="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"], 0x145) close(r0) execve(&(0x7f0000000180)='./file0\x00', &(0x7f0000000140), &(0x7f0000000140)) open(&(0x7f0000000000)='./control\x00', 0x80, 0x10) statfs(&(0x7f0000000380)='./control\x00', &(0x7f00000003c0)=""/20) write$P9_RWALK(r0, &(0x7f0000000400)=ANY=[@ANYBLOB="300000006f0100030001030000000400000000000000100000000003000002000000000300000000000000e646f1c5592139cf131e2bf572fa9728dbfac0390865410f3fa1f25743c497e12cb352eac4046b4500f95cfdfb4cf22a3be5c564a47654334c01d5732d382e27bbccd9b903000000c404000000d32dbd21f3ae581d32e69ef9327f7b487d1b4f4502838c08136678bd90733173ab78d6fc264b373611f15c439384"], 0xa6) getsockopt$inet_sctp6_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000000080)={0x0, 0x200, 0x2, 0xffffffff}, &(0x7f0000000100)=0x10) 00:28:24 executing program 1: syz_mount_image$reiserfs(&(0x7f0000000180)='reiterfs\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[@ANYBLOB='jdev=.']) 00:28:24 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000480)=@acquire={0x1ac, 0x17, 0x1, 0x0, 0x0, {{@in=@multicast1}, @in6=@ipv4={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x12], [], @dev}, {@in=@loopback, @in6=@local}, {{@in, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x2}}}, [@tmpl={0x84, 0x5, [{{@in6=@mcast1, 0x0, 0x3c}, 0x0, @in=@multicast1}, {{@in=@remote, 0x0, 0x3c}, 0x0, @in=@broadcast}]}]}, 0x1ac}}, 0x0) 00:28:24 executing program 0: syz_mount_image$reiserfs(&(0x7f0000000180)='reiser%s\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[@ANYBLOB='jdev=./file0,jdev=']) 00:28:24 executing program 2: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(&(0x7f0000000080)=@nbd={'/dev/nbd', 0x0, 0xe0000}, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000240)='hfs\x02\xe6\xa6\xe2\x06g\x96\xb3\v\xf2p\xd5:\x95p\x99\x92\xf2\xc4\x80\x1f\x01\x05\xb8e?\xbfwk\xe4\xe5\xca\x82\xeb\xb1\x04wn*\xf2\xc6\x9d\xc4!\x9e?\x83\x99\x0e\xcc\xa3\x95q.C\xee\x8dIf\xec\xbf\xe8\xb2\t\xedg\x9d\xd9\v\xce\xa3\xa3\xa5\x89F\x03\xefQ\x89\f\xeeRK\x15\xec{D\x9e\x83Z\xabTa\x8e\xcd\x01\xd0\xcfd\xf9c\x87m\xbe>\x81\xba\x9d2\x1c\a,\x12\xbf\xef\xb8m\v\xdf\x8e\xd5\xf5\x1a\xabD\xf6\xe0\x95\xf4\xfeRb_+\xeb\xf9f\xe8\\\x16\xeb\x87\x8e\x8acn4,\x80Q<\x84\xaep\xf9\xfc\x8e\x9f\xed\x06.a\xd5o\x14\r&L\xbd\xb9g\x82;+n\xd5\xcca\v\x86Z\x872\xc3c:`\xf2\x02\xc2\x92\x841\xe7\xca}\"@6}j\x0e\xb7\xa9\xbc\xf3N\xa3\xf3mbd\xfbS\x80\xe0\x11<\x7f\x84\xbe\xa2\xf9\xf7\xee\xf6\x94x\x9d\xe2{\xc5\x83\xc0M\xbb\xd4Io\r\x1c\xd7<\xc0\x84=`\xf1^Y', 0x0, 0x0) 00:28:24 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00004e7000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f}, 0xc, &(0x7f0000000440)={&(0x7f00000001c0)=ANY=[@ANYBLOB="1c00000022000100000000000061960d0100000008fe0c009d0a6be0e6d9fc638f19561d6ceb8a6c9239228215fd206cf204e07953", @ANYRES32=0x0], 0x2}, 0x1, 0x0, 0x0, 0xffffffffffffffff}, 0x0) 00:28:25 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000480)=@acquire={0x1ac, 0x17, 0x1, 0x0, 0x0, {{@in=@multicast1}, @in6=@ipv4={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x13], [], @dev}, {@in=@loopback, @in6=@local}, {{@in, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x2}}}, [@tmpl={0x84, 0x5, [{{@in6=@mcast1, 0x0, 0x3c}, 0x0, @in=@multicast1}, {{@in=@remote, 0x0, 0x3c}, 0x0, @in=@broadcast}]}]}, 0x1ac}}, 0x0) 00:28:25 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000180)='./control\x00', 0x0) get_thread_area(0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x3) write$binfmt_script(r0, &(0x7f0000000bc0)=ANY=[@ANYBLOB="2321202e2f66696c6530202357994f66e76f4d0fe2208456ebfa69074cb94144c95c4375644bd1747e34c127d80575d10a599f851dc7ad26f3fa377c0a53cc7be2512b7493bf864ecf3f13e46032dbbf3af349b06321cec7a0652f4a5768256cd01a2d3d52de67dc459409a1e50ca51334791c8690646f7a1962ccefc0592a163bacf13da16978ca48eb3784c5baa40700ebfddde7e115f9388051297af49e38e0e3210d232e108a7e9b69c2e56676484906d975d537d128607c901050484e2bdb0d042a40c8ff8f4727cde00677ea73dac796f06f6f7ef7b3406723e7da9fb469c4ce44faff2888c779c000000000000000000000dc4fd7f68b303f980ed08fb24c8052b0626c8b3733eeee64a90f35fd7d88f958406cb5a8ed3b20b7d1278e15c1e1012befbc45a45f203503128d3a99b80bc2c744ae4b8509ca0149b48dc3e11c2d5db4"], 0x145) close(r0) execve(&(0x7f0000000180)='./file0\x00', &(0x7f0000000140), &(0x7f0000000140)) open(&(0x7f0000000000)='./control\x00', 0x80, 0x10) statfs(&(0x7f0000000380)='./control\x00', &(0x7f00000003c0)=""/20) write$P9_RWALK(r0, &(0x7f0000000400)=ANY=[@ANYBLOB="300000006f0100030001030000000400000000000000100000000003000002000000000300000000000000e646f1c5592139cf131e2bf572fa9728dbfac0390865410f3fa1f25743c497e12cb352eac4046b4500f95cfdfb4cf22a3be5c564a47654334c01d5732d382e27bbccd9b903000000c404000000d32dbd21f3ae581d32e69ef9327f7b487d1b4f4502838c08136678bd90733173ab78d6fc264b373611f15c439384"], 0xa6) getsockopt$inet_sctp6_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000000080)={0x0, 0x200, 0x2, 0xffffffff}, &(0x7f0000000100)=0x10) 00:28:25 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00004e7000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f}, 0xc, &(0x7f0000000440)={&(0x7f00000001c0)=ANY=[@ANYBLOB="1c00000022000100000000000061960d0100000008fe0c009d0a6be0e6d9fc638f19561d6ceb8a6c9239228215fd206cf204e07953", @ANYRES32=0x0], 0x2}, 0x1, 0x0, 0x0, 0xffffffffffffffff}, 0x0) 00:28:25 executing program 2: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(&(0x7f0000000080)=@nbd={'/dev/nbd', 0x0, 0xe0000}, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000240)='hfs\x03\xe6\xa6\xe2\x06g\x96\xb3\v\xf2p\xd5:\x95p\x99\x92\xf2\xc4\x80\x1f\x01\x05\xb8e?\xbfwk\xe4\xe5\xca\x82\xeb\xb1\x04wn*\xf2\xc6\x9d\xc4!\x9e?\x83\x99\x0e\xcc\xa3\x95q.C\xee\x8dIf\xec\xbf\xe8\xb2\t\xedg\x9d\xd9\v\xce\xa3\xa3\xa5\x89F\x03\xefQ\x89\f\xeeRK\x15\xec{D\x9e\x83Z\xabTa\x8e\xcd\x01\xd0\xcfd\xf9c\x87m\xbe>\x81\xba\x9d2\x1c\a,\x12\xbf\xef\xb8m\v\xdf\x8e\xd5\xf5\x1a\xabD\xf6\xe0\x95\xf4\xfeRb_+\xeb\xf9f\xe8\\\x16\xeb\x87\x8e\x8acn4,\x80Q<\x84\xaep\xf9\xfc\x8e\x9f\xed\x06.a\xd5o\x14\r&L\xbd\xb9g\x82;+n\xd5\xcca\v\x86Z\x872\xc3c:`\xf2\x02\xc2\x92\x841\xe7\xca}\"@6}j\x0e\xb7\xa9\xbc\xf3N\xa3\xf3mbd\xfbS\x80\xe0\x11<\x7f\x84\xbe\xa2\xf9\xf7\xee\xf6\x94x\x9d\xe2{\xc5\x83\xc0M\xbb\xd4Io\r\x1c\xd7<\xc0\x84=`\xf1^Y', 0x0, 0x0) 00:28:25 executing program 1: syz_mount_image$reiserfs(&(0x7f0000000180)='reiuerfs\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[@ANYBLOB='jdev=.']) 00:28:25 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000480)=@acquire={0x1ac, 0x17, 0x1, 0x0, 0x0, {{@in=@multicast1}, @in6=@ipv4={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x60], [], @dev}, {@in=@loopback, @in6=@local}, {{@in, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x2}}}, [@tmpl={0x84, 0x5, [{{@in6=@mcast1, 0x0, 0x3c}, 0x0, @in=@multicast1}, {{@in=@remote, 0x0, 0x3c}, 0x0, @in=@broadcast}]}]}, 0x1ac}}, 0x0) 00:28:25 executing program 2: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(&(0x7f0000000080)=@nbd={'/dev/nbd', 0x0, 0xe0000}, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000240)='hfs\x04\xe6\xa6\xe2\x06g\x96\xb3\v\xf2p\xd5:\x95p\x99\x92\xf2\xc4\x80\x1f\x01\x05\xb8e?\xbfwk\xe4\xe5\xca\x82\xeb\xb1\x04wn*\xf2\xc6\x9d\xc4!\x9e?\x83\x99\x0e\xcc\xa3\x95q.C\xee\x8dIf\xec\xbf\xe8\xb2\t\xedg\x9d\xd9\v\xce\xa3\xa3\xa5\x89F\x03\xefQ\x89\f\xeeRK\x15\xec{D\x9e\x83Z\xabTa\x8e\xcd\x01\xd0\xcfd\xf9c\x87m\xbe>\x81\xba\x9d2\x1c\a,\x12\xbf\xef\xb8m\v\xdf\x8e\xd5\xf5\x1a\xabD\xf6\xe0\x95\xf4\xfeRb_+\xeb\xf9f\xe8\\\x16\xeb\x87\x8e\x8acn4,\x80Q<\x84\xaep\xf9\xfc\x8e\x9f\xed\x06.a\xd5o\x14\r&L\xbd\xb9g\x82;+n\xd5\xcca\v\x86Z\x872\xc3c:`\xf2\x02\xc2\x92\x841\xe7\xca}\"@6}j\x0e\xb7\xa9\xbc\xf3N\xa3\xf3mbd\xfbS\x80\xe0\x11<\x7f\x84\xbe\xa2\xf9\xf7\xee\xf6\x94x\x9d\xe2{\xc5\x83\xc0M\xbb\xd4Io\r\x1c\xd7<\xc0\x84=`\xf1^Y', 0x0, 0x0) 00:28:25 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00004e7000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f}, 0xc, &(0x7f0000000440)={&(0x7f00000001c0)=ANY=[@ANYBLOB="1c00000022000100000000000061960d0100000008fe0c009d0a6be0e6d9fc638f19561d6ceb8a6c9239228215fd206cf204e07953", @ANYRES32=0x0], 0x2}, 0x1, 0x0, 0x0, 0xffffffffffffffff}, 0x0) 00:28:25 executing program 0: syz_mount_image$reiserfs(&(0x7f0000000180)='reiser.s\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[@ANYBLOB='jdev=./file0,jdev=']) 00:28:25 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000480)=@acquire={0x1ac, 0x17, 0x1, 0x0, 0x0, {{@in=@multicast1}, @in6=@ipv4={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf0], [], @dev}, {@in=@loopback, @in6=@local}, {{@in, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x2}}}, [@tmpl={0x84, 0x5, [{{@in6=@mcast1, 0x0, 0x3c}, 0x0, @in=@multicast1}, {{@in=@remote, 0x0, 0x3c}, 0x0, @in=@broadcast}]}]}, 0x1ac}}, 0x0) 00:28:25 executing program 2: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(&(0x7f0000000080)=@nbd={'/dev/nbd', 0x0, 0xe0000}, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000240)='hfs\x05\xe6\xa6\xe2\x06g\x96\xb3\v\xf2p\xd5:\x95p\x99\x92\xf2\xc4\x80\x1f\x01\x05\xb8e?\xbfwk\xe4\xe5\xca\x82\xeb\xb1\x04wn*\xf2\xc6\x9d\xc4!\x9e?\x83\x99\x0e\xcc\xa3\x95q.C\xee\x8dIf\xec\xbf\xe8\xb2\t\xedg\x9d\xd9\v\xce\xa3\xa3\xa5\x89F\x03\xefQ\x89\f\xeeRK\x15\xec{D\x9e\x83Z\xabTa\x8e\xcd\x01\xd0\xcfd\xf9c\x87m\xbe>\x81\xba\x9d2\x1c\a,\x12\xbf\xef\xb8m\v\xdf\x8e\xd5\xf5\x1a\xabD\xf6\xe0\x95\xf4\xfeRb_+\xeb\xf9f\xe8\\\x16\xeb\x87\x8e\x8acn4,\x80Q<\x84\xaep\xf9\xfc\x8e\x9f\xed\x06.a\xd5o\x14\r&L\xbd\xb9g\x82;+n\xd5\xcca\v\x86Z\x872\xc3c:`\xf2\x02\xc2\x92\x841\xe7\xca}\"@6}j\x0e\xb7\xa9\xbc\xf3N\xa3\xf3mbd\xfbS\x80\xe0\x11<\x7f\x84\xbe\xa2\xf9\xf7\xee\xf6\x94x\x9d\xe2{\xc5\x83\xc0M\xbb\xd4Io\r\x1c\xd7<\xc0\x84=`\xf1^Y', 0x0, 0x0) 00:28:25 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000180)='./control\x00', 0x0) get_thread_area(0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x3) write$binfmt_script(r0, &(0x7f0000000bc0)=ANY=[@ANYBLOB="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"], 0x145) close(r0) execve(&(0x7f0000000180)='./file0\x00', &(0x7f0000000140), &(0x7f0000000140)) r1 = open(&(0x7f0000000000)='./control\x00', 0x80, 0x10) statfs(&(0x7f0000000380)='./control\x00', &(0x7f00000003c0)=""/20) write$P9_RWALK(r0, &(0x7f0000000400)=ANY=[@ANYBLOB="300000006f0100030001030000000400000000000000100000000003000002000000000300000000000000e646f1c5592139cf131e2bf572fa9728dbfac0390865410f3fa1f25743c497e12cb352eac4046b4500f95cfdfb4cf22a3be5c564a47654334c01d5732d382e27bbccd9b903000000c404000000d32dbd21f3ae581d32e69ef9327f7b487d1b4f4502838c08136678bd90733173ab78d6fc264b373611f15c439384"], 0xa6) getsockopt$inet_sctp6_SCTP_RTOINFO(r1, 0x84, 0x0, 0x0, &(0x7f0000000100)) 00:28:25 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00004e7000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f}, 0xc, &(0x7f0000000440)={&(0x7f00000001c0)=ANY=[@ANYBLOB="1c00000022000100000000000061960d0100000008fe0c009d0a6be0e6d9fc638f19561d6ceb8a6c9239228215fd206cf204e07953", @ANYRES32=0x0], 0x2}, 0x1, 0x0, 0x0, 0xffffffffffffffff}, 0x0) 00:28:25 executing program 1: syz_mount_image$reiserfs(&(0x7f0000000180)='reixerfs\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[@ANYBLOB='jdev=.']) 00:28:25 executing program 2: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(&(0x7f0000000080)=@nbd={'/dev/nbd', 0x0, 0xe0000}, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000240)='hfs\x06\xe6\xa6\xe2\x06g\x96\xb3\v\xf2p\xd5:\x95p\x99\x92\xf2\xc4\x80\x1f\x01\x05\xb8e?\xbfwk\xe4\xe5\xca\x82\xeb\xb1\x04wn*\xf2\xc6\x9d\xc4!\x9e?\x83\x99\x0e\xcc\xa3\x95q.C\xee\x8dIf\xec\xbf\xe8\xb2\t\xedg\x9d\xd9\v\xce\xa3\xa3\xa5\x89F\x03\xefQ\x89\f\xeeRK\x15\xec{D\x9e\x83Z\xabTa\x8e\xcd\x01\xd0\xcfd\xf9c\x87m\xbe>\x81\xba\x9d2\x1c\a,\x12\xbf\xef\xb8m\v\xdf\x8e\xd5\xf5\x1a\xabD\xf6\xe0\x95\xf4\xfeRb_+\xeb\xf9f\xe8\\\x16\xeb\x87\x8e\x8acn4,\x80Q<\x84\xaep\xf9\xfc\x8e\x9f\xed\x06.a\xd5o\x14\r&L\xbd\xb9g\x82;+n\xd5\xcca\v\x86Z\x872\xc3c:`\xf2\x02\xc2\x92\x841\xe7\xca}\"@6}j\x0e\xb7\xa9\xbc\xf3N\xa3\xf3mbd\xfbS\x80\xe0\x11<\x7f\x84\xbe\xa2\xf9\xf7\xee\xf6\x94x\x9d\xe2{\xc5\x83\xc0M\xbb\xd4Io\r\x1c\xd7<\xc0\x84=`\xf1^Y', 0x0, 0x0) 00:28:25 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000480)=@acquire={0x1ac, 0x17, 0x1, 0x0, 0x0, {{@in=@multicast1}, @in6=@ipv4={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x300], [], @dev}, {@in=@loopback, @in6=@local}, {{@in, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x2}}}, [@tmpl={0x84, 0x5, [{{@in6=@mcast1, 0x0, 0x3c}, 0x0, @in=@multicast1}, {{@in=@remote, 0x0, 0x3c}, 0x0, @in=@broadcast}]}]}, 0x1ac}}, 0x0) 00:28:26 executing program 0: syz_mount_image$reiserfs(&(0x7f0000000180)='reiser/s\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[@ANYBLOB='jdev=./file0,jdev=']) 00:28:26 executing program 2: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(&(0x7f0000000080)=@nbd={'/dev/nbd', 0x0, 0xe0000}, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000240)='hfs\a\xe6\xa6\xe2\x06g\x96\xb3\v\xf2p\xd5:\x95p\x99\x92\xf2\xc4\x80\x1f\x01\x05\xb8e?\xbfwk\xe4\xe5\xca\x82\xeb\xb1\x04wn*\xf2\xc6\x9d\xc4!\x9e?\x83\x99\x0e\xcc\xa3\x95q.C\xee\x8dIf\xec\xbf\xe8\xb2\t\xedg\x9d\xd9\v\xce\xa3\xa3\xa5\x89F\x03\xefQ\x89\f\xeeRK\x15\xec{D\x9e\x83Z\xabTa\x8e\xcd\x01\xd0\xcfd\xf9c\x87m\xbe>\x81\xba\x9d2\x1c\a,\x12\xbf\xef\xb8m\v\xdf\x8e\xd5\xf5\x1a\xabD\xf6\xe0\x95\xf4\xfeRb_+\xeb\xf9f\xe8\\\x16\xeb\x87\x8e\x8acn4,\x80Q<\x84\xaep\xf9\xfc\x8e\x9f\xed\x06.a\xd5o\x14\r&L\xbd\xb9g\x82;+n\xd5\xcca\v\x86Z\x872\xc3c:`\xf2\x02\xc2\x92\x841\xe7\xca}\"@6}j\x0e\xb7\xa9\xbc\xf3N\xa3\xf3mbd\xfbS\x80\xe0\x11<\x7f\x84\xbe\xa2\xf9\xf7\xee\xf6\x94x\x9d\xe2{\xc5\x83\xc0M\xbb\xd4Io\r\x1c\xd7<\xc0\x84=`\xf1^Y', 0x0, 0x0) 00:28:26 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00004e7000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f}, 0xc, &(0x7f0000000440)={&(0x7f00000001c0)=ANY=[@ANYBLOB="1c00000022000100000000000061960d0100000008fe0c009d0a6be0e6d9fc638f19561d6ceb8a6c9239228215fd206cf204e07953", @ANYRES32=0x0], 0x2}, 0x1, 0x0, 0x0, 0xffffffffffffffff}, 0x0) 00:28:26 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000480)=@acquire={0x1ac, 0x17, 0x1, 0x0, 0x0, {{@in=@multicast1}, @in6=@ipv4={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x500], [], @dev}, {@in=@loopback, @in6=@local}, {{@in, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x2}}}, [@tmpl={0x84, 0x5, [{{@in6=@mcast1, 0x0, 0x3c}, 0x0, @in=@multicast1}, {{@in=@remote, 0x0, 0x3c}, 0x0, @in=@broadcast}]}]}, 0x1ac}}, 0x0) 00:28:26 executing program 2: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(&(0x7f0000000080)=@nbd={'/dev/nbd', 0x0, 0xe0000}, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000240)='hfs\t\xe6\xa6\xe2\x06g\x96\xb3\v\xf2p\xd5:\x95p\x99\x92\xf2\xc4\x80\x1f\x01\x05\xb8e?\xbfwk\xe4\xe5\xca\x82\xeb\xb1\x04wn*\xf2\xc6\x9d\xc4!\x9e?\x83\x99\x0e\xcc\xa3\x95q.C\xee\x8dIf\xec\xbf\xe8\xb2\t\xedg\x9d\xd9\v\xce\xa3\xa3\xa5\x89F\x03\xefQ\x89\f\xeeRK\x15\xec{D\x9e\x83Z\xabTa\x8e\xcd\x01\xd0\xcfd\xf9c\x87m\xbe>\x81\xba\x9d2\x1c\a,\x12\xbf\xef\xb8m\v\xdf\x8e\xd5\xf5\x1a\xabD\xf6\xe0\x95\xf4\xfeRb_+\xeb\xf9f\xe8\\\x16\xeb\x87\x8e\x8acn4,\x80Q<\x84\xaep\xf9\xfc\x8e\x9f\xed\x06.a\xd5o\x14\r&L\xbd\xb9g\x82;+n\xd5\xcca\v\x86Z\x872\xc3c:`\xf2\x02\xc2\x92\x841\xe7\xca}\"@6}j\x0e\xb7\xa9\xbc\xf3N\xa3\xf3mbd\xfbS\x80\xe0\x11<\x7f\x84\xbe\xa2\xf9\xf7\xee\xf6\x94x\x9d\xe2{\xc5\x83\xc0M\xbb\xd4Io\r\x1c\xd7<\xc0\x84=`\xf1^Y', 0x0, 0x0) 00:28:26 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000180)='./control\x00', 0x0) get_thread_area(0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x3) write$binfmt_script(r0, &(0x7f0000000bc0)=ANY=[@ANYBLOB="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"], 0x145) close(r0) execve(&(0x7f0000000180)='./file0\x00', &(0x7f0000000140), &(0x7f0000000140)) r1 = open(&(0x7f0000000000)='./control\x00', 0x80, 0x10) statfs(&(0x7f0000000380)='./control\x00', &(0x7f00000003c0)=""/20) write$P9_RWALK(r0, &(0x7f0000000400)=ANY=[@ANYBLOB="300000006f0100030001030000000400000000000000100000000003000002000000000300000000000000e646f1c5592139cf131e2bf572fa9728dbfac0390865410f3fa1f25743c497e12cb352eac4046b4500f95cfdfb4cf22a3be5c564a47654334c01d5732d382e27bbccd9b903000000c404000000d32dbd21f3ae581d32e69ef9327f7b487d1b4f4502838c08136678bd90733173ab78d6fc264b373611f15c439384"], 0xa6) getsockopt$inet_sctp6_SCTP_RTOINFO(r1, 0x84, 0x0, 0x0, &(0x7f0000000100)) 00:28:26 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000480)=@acquire={0x1ac, 0x17, 0x1, 0x0, 0x0, {{@in=@multicast1}, @in6=@ipv4={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x508], [], @dev}, {@in=@loopback, @in6=@local}, {{@in, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x2}}}, [@tmpl={0x84, 0x5, [{{@in6=@mcast1, 0x0, 0x3c}, 0x0, @in=@multicast1}, {{@in=@remote, 0x0, 0x3c}, 0x0, @in=@broadcast}]}]}, 0x1ac}}, 0x0) 00:28:26 executing program 1: syz_mount_image$reiserfs(&(0x7f0000000180)='reiyerfs\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[@ANYBLOB='jdev=.']) 00:28:26 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00004e7000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f}, 0xc, &(0x7f0000000440)={&(0x7f00000001c0)=ANY=[@ANYBLOB="1c00000022000100000000000061960d0100000008fe0c009d0a6be0e6d9fc638f19561d6ceb8a6c9239228215fd206cf204e07953", @ANYRES32=0x0], 0x2}, 0x1, 0x0, 0x0, 0xffffffffffffffff}, 0x0) 00:28:26 executing program 2: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(&(0x7f0000000080)=@nbd={'/dev/nbd', 0x0, 0xe0000}, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000240)='hfs\n\xe6\xa6\xe2\x06g\x96\xb3\v\xf2p\xd5:\x95p\x99\x92\xf2\xc4\x80\x1f\x01\x05\xb8e?\xbfwk\xe4\xe5\xca\x82\xeb\xb1\x04wn*\xf2\xc6\x9d\xc4!\x9e?\x83\x99\x0e\xcc\xa3\x95q.C\xee\x8dIf\xec\xbf\xe8\xb2\t\xedg\x9d\xd9\v\xce\xa3\xa3\xa5\x89F\x03\xefQ\x89\f\xeeRK\x15\xec{D\x9e\x83Z\xabTa\x8e\xcd\x01\xd0\xcfd\xf9c\x87m\xbe>\x81\xba\x9d2\x1c\a,\x12\xbf\xef\xb8m\v\xdf\x8e\xd5\xf5\x1a\xabD\xf6\xe0\x95\xf4\xfeRb_+\xeb\xf9f\xe8\\\x16\xeb\x87\x8e\x8acn4,\x80Q<\x84\xaep\xf9\xfc\x8e\x9f\xed\x06.a\xd5o\x14\r&L\xbd\xb9g\x82;+n\xd5\xcca\v\x86Z\x872\xc3c:`\xf2\x02\xc2\x92\x841\xe7\xca}\"@6}j\x0e\xb7\xa9\xbc\xf3N\xa3\xf3mbd\xfbS\x80\xe0\x11<\x7f\x84\xbe\xa2\xf9\xf7\xee\xf6\x94x\x9d\xe2{\xc5\x83\xc0M\xbb\xd4Io\r\x1c\xd7<\xc0\x84=`\xf1^Y', 0x0, 0x0) 00:28:26 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000480)=@acquire={0x1ac, 0x17, 0x1, 0x0, 0x0, {{@in=@multicast1}, @in6=@ipv4={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x600], [], @dev}, {@in=@loopback, @in6=@local}, {{@in, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x2}}}, [@tmpl={0x84, 0x5, [{{@in6=@mcast1, 0x0, 0x3c}, 0x0, @in=@multicast1}, {{@in=@remote, 0x0, 0x3c}, 0x0, @in=@broadcast}]}]}, 0x1ac}}, 0x0) 00:28:26 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00004e7000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f}, 0xc, &(0x7f0000000440)={&(0x7f00000001c0)=ANY=[@ANYBLOB="1c00000022000100000000000061960d0100000008fe0c009d0a6be0e6d9fc638f19561d6ceb8a6c9239228215fd206cf204e07953", @ANYRES32=0x0], 0x2}, 0x1, 0x0, 0x0, 0xffffffffffffffff}, 0x0) 00:28:26 executing program 0: syz_mount_image$reiserfs(&(0x7f0000000180)='reiseris\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[@ANYBLOB='jdev=./file0,jdev=']) 00:28:26 executing program 2: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(&(0x7f0000000080)=@nbd={'/dev/nbd', 0x0, 0xe0000}, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000240)='hfs\f\xe6\xa6\xe2\x06g\x96\xb3\v\xf2p\xd5:\x95p\x99\x92\xf2\xc4\x80\x1f\x01\x05\xb8e?\xbfwk\xe4\xe5\xca\x82\xeb\xb1\x04wn*\xf2\xc6\x9d\xc4!\x9e?\x83\x99\x0e\xcc\xa3\x95q.C\xee\x8dIf\xec\xbf\xe8\xb2\t\xedg\x9d\xd9\v\xce\xa3\xa3\xa5\x89F\x03\xefQ\x89\f\xeeRK\x15\xec{D\x9e\x83Z\xabTa\x8e\xcd\x01\xd0\xcfd\xf9c\x87m\xbe>\x81\xba\x9d2\x1c\a,\x12\xbf\xef\xb8m\v\xdf\x8e\xd5\xf5\x1a\xabD\xf6\xe0\x95\xf4\xfeRb_+\xeb\xf9f\xe8\\\x16\xeb\x87\x8e\x8acn4,\x80Q<\x84\xaep\xf9\xfc\x8e\x9f\xed\x06.a\xd5o\x14\r&L\xbd\xb9g\x82;+n\xd5\xcca\v\x86Z\x872\xc3c:`\xf2\x02\xc2\x92\x841\xe7\xca}\"@6}j\x0e\xb7\xa9\xbc\xf3N\xa3\xf3mbd\xfbS\x80\xe0\x11<\x7f\x84\xbe\xa2\xf9\xf7\xee\xf6\x94x\x9d\xe2{\xc5\x83\xc0M\xbb\xd4Io\r\x1c\xd7<\xc0\x84=`\xf1^Y', 0x0, 0x0) 00:28:26 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00004e7000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f}, 0xc, &(0x7f0000000440)={&(0x7f00000001c0)=ANY=[@ANYBLOB="1c00000022000100000000000061960d0100000008fe0c009d0a6be0e6d9fc638f19561d6ceb8a6c9239228215fd206cf204e07953", @ANYRES32=0x0], 0x2}, 0x1, 0x0, 0x0, 0xffffffffffffffff}, 0x0) 00:28:26 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000480)=@acquire={0x1ac, 0x17, 0x1, 0x0, 0x0, {{@in=@multicast1}, @in6=@ipv4={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x805], [], @dev}, {@in=@loopback, @in6=@local}, {{@in, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x2}}}, [@tmpl={0x84, 0x5, [{{@in6=@mcast1, 0x0, 0x3c}, 0x0, @in=@multicast1}, {{@in=@remote, 0x0, 0x3c}, 0x0, @in=@broadcast}]}]}, 0x1ac}}, 0x0) 00:28:26 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000180)='./control\x00', 0x0) get_thread_area(0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x3) write$binfmt_script(r0, &(0x7f0000000bc0)=ANY=[@ANYBLOB="2321202e2f66696c6530202357994f66e76f4d0fe2208456ebfa69074cb94144c95c4375644bd1747e34c127d80575d10a599f851dc7ad26f3fa377c0a53cc7be2512b7493bf864ecf3f13e46032dbbf3af349b06321cec7a0652f4a5768256cd01a2d3d52de67dc459409a1e50ca51334791c8690646f7a1962ccefc0592a163bacf13da16978ca48eb3784c5baa40700ebfddde7e115f9388051297af49e38e0e3210d232e108a7e9b69c2e56676484906d975d537d128607c901050484e2bdb0d042a40c8ff8f4727cde00677ea73dac796f06f6f7ef7b3406723e7da9fb469c4ce44faff2888c779c000000000000000000000dc4fd7f68b303f980ed08fb24c8052b0626c8b3733eeee64a90f35fd7d88f958406cb5a8ed3b20b7d1278e15c1e1012befbc45a45f203503128d3a99b80bc2c744ae4b8509ca0149b48dc3e11c2d5db4"], 0x145) close(r0) execve(&(0x7f0000000180)='./file0\x00', &(0x7f0000000140), &(0x7f0000000140)) r1 = open(&(0x7f0000000000)='./control\x00', 0x80, 0x10) statfs(&(0x7f0000000380)='./control\x00', &(0x7f00000003c0)=""/20) write$P9_RWALK(r0, &(0x7f0000000400)=ANY=[@ANYBLOB="300000006f0100030001030000000400000000000000100000000003000002000000000300000000000000e646f1c5592139cf131e2bf572fa9728dbfac0390865410f3fa1f25743c497e12cb352eac4046b4500f95cfdfb4cf22a3be5c564a47654334c01d5732d382e27bbccd9b903000000c404000000d32dbd21f3ae581d32e69ef9327f7b487d1b4f4502838c08136678bd90733173ab78d6fc264b373611f15c439384"], 0xa6) getsockopt$inet_sctp6_SCTP_RTOINFO(r1, 0x84, 0x0, 0x0, &(0x7f0000000100)) 00:28:26 executing program 2: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(&(0x7f0000000080)=@nbd={'/dev/nbd', 0x0, 0xe0000}, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000240)='hfs\x12\xe6\xa6\xe2\x06g\x96\xb3\v\xf2p\xd5:\x95p\x99\x92\xf2\xc4\x80\x1f\x01\x05\xb8e?\xbfwk\xe4\xe5\xca\x82\xeb\xb1\x04wn*\xf2\xc6\x9d\xc4!\x9e?\x83\x99\x0e\xcc\xa3\x95q.C\xee\x8dIf\xec\xbf\xe8\xb2\t\xedg\x9d\xd9\v\xce\xa3\xa3\xa5\x89F\x03\xefQ\x89\f\xeeRK\x15\xec{D\x9e\x83Z\xabTa\x8e\xcd\x01\xd0\xcfd\xf9c\x87m\xbe>\x81\xba\x9d2\x1c\a,\x12\xbf\xef\xb8m\v\xdf\x8e\xd5\xf5\x1a\xabD\xf6\xe0\x95\xf4\xfeRb_+\xeb\xf9f\xe8\\\x16\xeb\x87\x8e\x8acn4,\x80Q<\x84\xaep\xf9\xfc\x8e\x9f\xed\x06.a\xd5o\x14\r&L\xbd\xb9g\x82;+n\xd5\xcca\v\x86Z\x872\xc3c:`\xf2\x02\xc2\x92\x841\xe7\xca}\"@6}j\x0e\xb7\xa9\xbc\xf3N\xa3\xf3mbd\xfbS\x80\xe0\x11<\x7f\x84\xbe\xa2\xf9\xf7\xee\xf6\x94x\x9d\xe2{\xc5\x83\xc0M\xbb\xd4Io\r\x1c\xd7<\xc0\x84=`\xf1^Y', 0x0, 0x0) 00:28:26 executing program 1: syz_mount_image$reiserfs(&(0x7f0000000180)='reizerfs\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[@ANYBLOB='jdev=.']) 00:28:27 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000480)=@acquire={0x1ac, 0x17, 0x1, 0x0, 0x0, {{@in=@multicast1}, @in6=@ipv4={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x900], [], @dev}, {@in=@loopback, @in6=@local}, {{@in, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x2}}}, [@tmpl={0x84, 0x5, [{{@in6=@mcast1, 0x0, 0x3c}, 0x0, @in=@multicast1}, {{@in=@remote, 0x0, 0x3c}, 0x0, @in=@broadcast}]}]}, 0x1ac}}, 0x0) 00:28:27 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00004e7000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f}, 0xc, &(0x7f0000000440)={&(0x7f00000001c0)=ANY=[@ANYBLOB="1c00000022000100000000000061960d0100000008fe0c009d0a6be0e6d9fc638f19561d6ceb8a6c9239228215fd206cf204e07953", @ANYRES32=0x0], 0x2}, 0x1, 0x0, 0x0, 0xffffffffffffffff}, 0x0) 00:28:27 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000180)='./control\x00', 0x0) get_thread_area(0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x3) write$binfmt_script(r0, &(0x7f0000000bc0)=ANY=[@ANYBLOB="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"], 0x145) close(r0) execve(&(0x7f0000000180)='./file0\x00', &(0x7f0000000140), &(0x7f0000000140)) r1 = open(&(0x7f0000000000)='./control\x00', 0x80, 0x10) statfs(&(0x7f0000000380)='./control\x00', &(0x7f00000003c0)=""/20) write$P9_RWALK(r0, &(0x7f0000000400)=ANY=[@ANYBLOB="300000006f0100030001030000000400000000000000100000000003000002000000000300000000000000e646f1c5592139cf131e2bf572fa9728dbfac0390865410f3fa1f25743c497e12cb352eac4046b4500f95cfdfb4cf22a3be5c564a47654334c01d5732d382e27bbccd9b903000000c404000000d32dbd21f3ae581d32e69ef9327f7b487d1b4f4502838c08136678bd90733173ab78d6fc264b373611f15c439384"], 0xa6) getsockopt$inet_sctp6_SCTP_RTOINFO(r1, 0x84, 0x0, &(0x7f0000000080)={0x0, 0x0, 0x2, 0xffffffff}, &(0x7f0000000100)=0x10) 00:28:27 executing program 2: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(&(0x7f0000000080)=@nbd={'/dev/nbd', 0x0, 0xe0000}, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000240)='hfs\x14\xe6\xa6\xe2\x06g\x96\xb3\v\xf2p\xd5:\x95p\x99\x92\xf2\xc4\x80\x1f\x01\x05\xb8e?\xbfwk\xe4\xe5\xca\x82\xeb\xb1\x04wn*\xf2\xc6\x9d\xc4!\x9e?\x83\x99\x0e\xcc\xa3\x95q.C\xee\x8dIf\xec\xbf\xe8\xb2\t\xedg\x9d\xd9\v\xce\xa3\xa3\xa5\x89F\x03\xefQ\x89\f\xeeRK\x15\xec{D\x9e\x83Z\xabTa\x8e\xcd\x01\xd0\xcfd\xf9c\x87m\xbe>\x81\xba\x9d2\x1c\a,\x12\xbf\xef\xb8m\v\xdf\x8e\xd5\xf5\x1a\xabD\xf6\xe0\x95\xf4\xfeRb_+\xeb\xf9f\xe8\\\x16\xeb\x87\x8e\x8acn4,\x80Q<\x84\xaep\xf9\xfc\x8e\x9f\xed\x06.a\xd5o\x14\r&L\xbd\xb9g\x82;+n\xd5\xcca\v\x86Z\x872\xc3c:`\xf2\x02\xc2\x92\x841\xe7\xca}\"@6}j\x0e\xb7\xa9\xbc\xf3N\xa3\xf3mbd\xfbS\x80\xe0\x11<\x7f\x84\xbe\xa2\xf9\xf7\xee\xf6\x94x\x9d\xe2{\xc5\x83\xc0M\xbb\xd4Io\r\x1c\xd7<\xc0\x84=`\xf1^Y', 0x0, 0x0) 00:28:27 executing program 0: syz_mount_image$reiserfs(&(0x7f0000000180)='reiser\x86s\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[@ANYBLOB='jdev=./file0,jdev=']) 00:28:27 executing program 2: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(&(0x7f0000000080)=@nbd={'/dev/nbd', 0x0, 0xe0000}, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000240)='hfs#\xe6\xa6\xe2\x06g\x96\xb3\v\xf2p\xd5:\x95p\x99\x92\xf2\xc4\x80\x1f\x01\x05\xb8e?\xbfwk\xe4\xe5\xca\x82\xeb\xb1\x04wn*\xf2\xc6\x9d\xc4!\x9e?\x83\x99\x0e\xcc\xa3\x95q.C\xee\x8dIf\xec\xbf\xe8\xb2\t\xedg\x9d\xd9\v\xce\xa3\xa3\xa5\x89F\x03\xefQ\x89\f\xeeRK\x15\xec{D\x9e\x83Z\xabTa\x8e\xcd\x01\xd0\xcfd\xf9c\x87m\xbe>\x81\xba\x9d2\x1c\a,\x12\xbf\xef\xb8m\v\xdf\x8e\xd5\xf5\x1a\xabD\xf6\xe0\x95\xf4\xfeRb_+\xeb\xf9f\xe8\\\x16\xeb\x87\x8e\x8acn4,\x80Q<\x84\xaep\xf9\xfc\x8e\x9f\xed\x06.a\xd5o\x14\r&L\xbd\xb9g\x82;+n\xd5\xcca\v\x86Z\x872\xc3c:`\xf2\x02\xc2\x92\x841\xe7\xca}\"@6}j\x0e\xb7\xa9\xbc\xf3N\xa3\xf3mbd\xfbS\x80\xe0\x11<\x7f\x84\xbe\xa2\xf9\xf7\xee\xf6\x94x\x9d\xe2{\xc5\x83\xc0M\xbb\xd4Io\r\x1c\xd7<\xc0\x84=`\xf1^Y', 0x0, 0x0) 00:28:27 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00004e7000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f}, 0xc, &(0x7f0000000440)={&(0x7f00000001c0)=ANY=[@ANYBLOB="1c00000022000100000000000061960d0100000008fe0c009d0a6be0e6d9fc638f19561d6ceb8a6c9239228215fd206cf204e07953", @ANYRES32=0x0], 0x2}, 0x1, 0x0, 0x0, 0xffffffffffffffff}, 0x0) 00:28:27 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000480)=@acquire={0x1ac, 0x17, 0x1, 0x0, 0x0, {{@in=@multicast1}, @in6=@ipv4={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa00], [], @dev}, {@in=@loopback, @in6=@local}, {{@in, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x2}}}, [@tmpl={0x84, 0x5, [{{@in6=@mcast1, 0x0, 0x3c}, 0x0, @in=@multicast1}, {{@in=@remote, 0x0, 0x3c}, 0x0, @in=@broadcast}]}]}, 0x1ac}}, 0x0) 00:28:27 executing program 2: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(&(0x7f0000000080)=@nbd={'/dev/nbd', 0x0, 0xe0000}, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000240)='hfs$\xe6\xa6\xe2\x06g\x96\xb3\v\xf2p\xd5:\x95p\x99\x92\xf2\xc4\x80\x1f\x01\x05\xb8e?\xbfwk\xe4\xe5\xca\x82\xeb\xb1\x04wn*\xf2\xc6\x9d\xc4!\x9e?\x83\x99\x0e\xcc\xa3\x95q.C\xee\x8dIf\xec\xbf\xe8\xb2\t\xedg\x9d\xd9\v\xce\xa3\xa3\xa5\x89F\x03\xefQ\x89\f\xeeRK\x15\xec{D\x9e\x83Z\xabTa\x8e\xcd\x01\xd0\xcfd\xf9c\x87m\xbe>\x81\xba\x9d2\x1c\a,\x12\xbf\xef\xb8m\v\xdf\x8e\xd5\xf5\x1a\xabD\xf6\xe0\x95\xf4\xfeRb_+\xeb\xf9f\xe8\\\x16\xeb\x87\x8e\x8acn4,\x80Q<\x84\xaep\xf9\xfc\x8e\x9f\xed\x06.a\xd5o\x14\r&L\xbd\xb9g\x82;+n\xd5\xcca\v\x86Z\x872\xc3c:`\xf2\x02\xc2\x92\x841\xe7\xca}\"@6}j\x0e\xb7\xa9\xbc\xf3N\xa3\xf3mbd\xfbS\x80\xe0\x11<\x7f\x84\xbe\xa2\xf9\xf7\xee\xf6\x94x\x9d\xe2{\xc5\x83\xc0M\xbb\xd4Io\r\x1c\xd7<\xc0\x84=`\xf1^Y', 0x0, 0x0) 00:28:27 executing program 0: syz_mount_image$reiserfs(&(0x7f0000000180)='reiserf\n\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[@ANYBLOB='jdev=./file0,jdev=']) 00:28:27 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00004e7000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f}, 0xc, &(0x7f0000000440)={&(0x7f00000001c0)=ANY=[@ANYBLOB="1c00000022000100000000000061960d0100000008fe0c009d0a6be0e6d9fc638f19561d6ceb8a6c9239228215fd206cf204e07953", @ANYRES32=0x0], 0x2}, 0x1, 0x0, 0x0, 0xffffffffffffffff}, 0x0) 00:28:27 executing program 1: syz_mount_image$reiserfs(&(0x7f0000000180)='reis\nrfs\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[@ANYBLOB='jdev=.']) 00:28:27 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000480)=@acquire={0x1ac, 0x17, 0x1, 0x0, 0x0, {{@in=@multicast1}, @in6=@ipv4={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb00], [], @dev}, {@in=@loopback, @in6=@local}, {{@in, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x2}}}, [@tmpl={0x84, 0x5, [{{@in6=@mcast1, 0x0, 0x3c}, 0x0, @in=@multicast1}, {{@in=@remote, 0x0, 0x3c}, 0x0, @in=@broadcast}]}]}, 0x1ac}}, 0x0) 00:28:27 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000180)='./control\x00', 0x0) get_thread_area(0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x3) write$binfmt_script(r0, &(0x7f0000000bc0)=ANY=[@ANYBLOB="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"], 0x145) close(r0) execve(&(0x7f0000000180)='./file0\x00', &(0x7f0000000140), &(0x7f0000000140)) r1 = open(&(0x7f0000000000)='./control\x00', 0x80, 0x10) statfs(&(0x7f0000000380)='./control\x00', &(0x7f00000003c0)=""/20) write$P9_RWALK(r0, &(0x7f0000000400)=ANY=[@ANYBLOB="300000006f0100030001030000000400000000000000100000000003000002000000000300000000000000e646f1c5592139cf131e2bf572fa9728dbfac0390865410f3fa1f25743c497e12cb352eac4046b4500f95cfdfb4cf22a3be5c564a47654334c01d5732d382e27bbccd9b903000000c404000000d32dbd21f3ae581d32e69ef9327f7b487d1b4f4502838c08136678bd90733173ab78d6fc264b373611f15c439384"], 0xa6) getsockopt$inet_sctp6_SCTP_RTOINFO(r1, 0x84, 0x0, &(0x7f0000000080)={0x0, 0x0, 0x2, 0xffffffff}, &(0x7f0000000100)=0x10) 00:28:27 executing program 2: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(&(0x7f0000000080)=@nbd={'/dev/nbd', 0x0, 0xe0000}, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000240)='hfs,\xe6\xa6\xe2\x06g\x96\xb3\v\xf2p\xd5:\x95p\x99\x92\xf2\xc4\x80\x1f\x01\x05\xb8e?\xbfwk\xe4\xe5\xca\x82\xeb\xb1\x04wn*\xf2\xc6\x9d\xc4!\x9e?\x83\x99\x0e\xcc\xa3\x95q.C\xee\x8dIf\xec\xbf\xe8\xb2\t\xedg\x9d\xd9\v\xce\xa3\xa3\xa5\x89F\x03\xefQ\x89\f\xeeRK\x15\xec{D\x9e\x83Z\xabTa\x8e\xcd\x01\xd0\xcfd\xf9c\x87m\xbe>\x81\xba\x9d2\x1c\a,\x12\xbf\xef\xb8m\v\xdf\x8e\xd5\xf5\x1a\xabD\xf6\xe0\x95\xf4\xfeRb_+\xeb\xf9f\xe8\\\x16\xeb\x87\x8e\x8acn4,\x80Q<\x84\xaep\xf9\xfc\x8e\x9f\xed\x06.a\xd5o\x14\r&L\xbd\xb9g\x82;+n\xd5\xcca\v\x86Z\x872\xc3c:`\xf2\x02\xc2\x92\x841\xe7\xca}\"@6}j\x0e\xb7\xa9\xbc\xf3N\xa3\xf3mbd\xfbS\x80\xe0\x11<\x7f\x84\xbe\xa2\xf9\xf7\xee\xf6\x94x\x9d\xe2{\xc5\x83\xc0M\xbb\xd4Io\r\x1c\xd7<\xc0\x84=`\xf1^Y', 0x0, 0x0) 00:28:27 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000480)=@acquire={0x1ac, 0x17, 0x1, 0x0, 0x0, {{@in=@multicast1}, @in6=@ipv4={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe00], [], @dev}, {@in=@loopback, @in6=@local}, {{@in, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x2}}}, [@tmpl={0x84, 0x5, [{{@in6=@mcast1, 0x0, 0x3c}, 0x0, @in=@multicast1}, {{@in=@remote, 0x0, 0x3c}, 0x0, @in=@broadcast}]}]}, 0x1ac}}, 0x0) 00:28:27 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00004e7000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f}, 0xc, &(0x7f0000000440)={&(0x7f00000001c0)=ANY=[@ANYBLOB="1c00000022000100000000000061960d0100000008fe0c009d0a6be0e6d9fc638f19561d6ceb8a6c9239228215fd206cf204e07953", @ANYRES32=0x0], 0x2}, 0x1, 0x0, 0x0, 0xffffffffffffffff}, 0x0) 00:28:27 executing program 2: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(&(0x7f0000000080)=@nbd={'/dev/nbd', 0x0, 0xe0000}, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000240)='hfs4\xe6\xa6\xe2\x06g\x96\xb3\v\xf2p\xd5:\x95p\x99\x92\xf2\xc4\x80\x1f\x01\x05\xb8e?\xbfwk\xe4\xe5\xca\x82\xeb\xb1\x04wn*\xf2\xc6\x9d\xc4!\x9e?\x83\x99\x0e\xcc\xa3\x95q.C\xee\x8dIf\xec\xbf\xe8\xb2\t\xedg\x9d\xd9\v\xce\xa3\xa3\xa5\x89F\x03\xefQ\x89\f\xeeRK\x15\xec{D\x9e\x83Z\xabTa\x8e\xcd\x01\xd0\xcfd\xf9c\x87m\xbe>\x81\xba\x9d2\x1c\a,\x12\xbf\xef\xb8m\v\xdf\x8e\xd5\xf5\x1a\xabD\xf6\xe0\x95\xf4\xfeRb_+\xeb\xf9f\xe8\\\x16\xeb\x87\x8e\x8acn4,\x80Q<\x84\xaep\xf9\xfc\x8e\x9f\xed\x06.a\xd5o\x14\r&L\xbd\xb9g\x82;+n\xd5\xcca\v\x86Z\x872\xc3c:`\xf2\x02\xc2\x92\x841\xe7\xca}\"@6}j\x0e\xb7\xa9\xbc\xf3N\xa3\xf3mbd\xfbS\x80\xe0\x11<\x7f\x84\xbe\xa2\xf9\xf7\xee\xf6\x94x\x9d\xe2{\xc5\x83\xc0M\xbb\xd4Io\r\x1c\xd7<\xc0\x84=`\xf1^Y', 0x0, 0x0) 00:28:27 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000480)=@acquire={0x1ac, 0x17, 0x1, 0x0, 0x0, {{@in=@multicast1}, @in6=@ipv4={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf00], [], @dev}, {@in=@loopback, @in6=@local}, {{@in, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x2}}}, [@tmpl={0x84, 0x5, [{{@in6=@mcast1, 0x0, 0x3c}, 0x0, @in=@multicast1}, {{@in=@remote, 0x0, 0x3c}, 0x0, @in=@broadcast}]}]}, 0x1ac}}, 0x0) 00:28:28 executing program 0: syz_mount_image$reiserfs(&(0x7f0000000180)='reiserf#\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[@ANYBLOB='jdev=./file0,jdev=']) 00:28:28 executing program 2: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(&(0x7f0000000080)=@nbd={'/dev/nbd', 0x0, 0xe0000}, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000240)='hfsb\xe6\xa6\xe2\x06g\x96\xb3\v\xf2p\xd5:\x95p\x99\x92\xf2\xc4\x80\x1f\x01\x05\xb8e?\xbfwk\xe4\xe5\xca\x82\xeb\xb1\x04wn*\xf2\xc6\x9d\xc4!\x9e?\x83\x99\x0e\xcc\xa3\x95q.C\xee\x8dIf\xec\xbf\xe8\xb2\t\xedg\x9d\xd9\v\xce\xa3\xa3\xa5\x89F\x03\xefQ\x89\f\xeeRK\x15\xec{D\x9e\x83Z\xabTa\x8e\xcd\x01\xd0\xcfd\xf9c\x87m\xbe>\x81\xba\x9d2\x1c\a,\x12\xbf\xef\xb8m\v\xdf\x8e\xd5\xf5\x1a\xabD\xf6\xe0\x95\xf4\xfeRb_+\xeb\xf9f\xe8\\\x16\xeb\x87\x8e\x8acn4,\x80Q<\x84\xaep\xf9\xfc\x8e\x9f\xed\x06.a\xd5o\x14\r&L\xbd\xb9g\x82;+n\xd5\xcca\v\x86Z\x872\xc3c:`\xf2\x02\xc2\x92\x841\xe7\xca}\"@6}j\x0e\xb7\xa9\xbc\xf3N\xa3\xf3mbd\xfbS\x80\xe0\x11<\x7f\x84\xbe\xa2\xf9\xf7\xee\xf6\x94x\x9d\xe2{\xc5\x83\xc0M\xbb\xd4Io\r\x1c\xd7<\xc0\x84=`\xf1^Y', 0x0, 0x0) 00:28:28 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000180)='./control\x00', 0x0) get_thread_area(0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x3) write$binfmt_script(r0, &(0x7f0000000bc0)=ANY=[@ANYBLOB="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"], 0x145) close(r0) execve(&(0x7f0000000180)='./file0\x00', &(0x7f0000000140), &(0x7f0000000140)) r1 = open(&(0x7f0000000000)='./control\x00', 0x80, 0x10) statfs(&(0x7f0000000380)='./control\x00', &(0x7f00000003c0)=""/20) write$P9_RWALK(r0, &(0x7f0000000400)=ANY=[@ANYBLOB="300000006f0100030001030000000400000000000000100000000003000002000000000300000000000000e646f1c5592139cf131e2bf572fa9728dbfac0390865410f3fa1f25743c497e12cb352eac4046b4500f95cfdfb4cf22a3be5c564a47654334c01d5732d382e27bbccd9b903000000c404000000d32dbd21f3ae581d32e69ef9327f7b487d1b4f4502838c08136678bd90733173ab78d6fc264b373611f15c439384"], 0xa6) getsockopt$inet_sctp6_SCTP_RTOINFO(r1, 0x84, 0x0, &(0x7f0000000080)={0x0, 0x0, 0x2, 0xffffffff}, &(0x7f0000000100)=0x10) 00:28:28 executing program 1: syz_mount_image$reiserfs(&(0x7f0000000180)='reis%rfs\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[@ANYBLOB='jdev=.']) 00:28:28 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000480)=@acquire={0x1ac, 0x17, 0x1, 0x0, 0x0, {{@in=@multicast1}, @in6=@ipv4={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1100], [], @dev}, {@in=@loopback, @in6=@local}, {{@in, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x2}}}, [@tmpl={0x84, 0x5, [{{@in6=@mcast1, 0x0, 0x3c}, 0x0, @in=@multicast1}, {{@in=@remote, 0x0, 0x3c}, 0x0, @in=@broadcast}]}]}, 0x1ac}}, 0x0) 00:28:28 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00004e7000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f}, 0xc, &(0x7f0000000440)={&(0x7f00000001c0)=ANY=[@ANYBLOB="1c00000022000100000000000061960d0100000008fe0c009d0a6be0e6d9fc638f19561d6ceb8a6c9239228215fd206cf204e07953", @ANYRES32=0x0], 0x2}, 0x1, 0x0, 0x0, 0xffffffffffffffff}, 0x0) 00:28:28 executing program 2: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(&(0x7f0000000080)=@nbd={'/dev/nbd', 0x0, 0xe0000}, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000240)='hfsd\xe6\xa6\xe2\x06g\x96\xb3\v\xf2p\xd5:\x95p\x99\x92\xf2\xc4\x80\x1f\x01\x05\xb8e?\xbfwk\xe4\xe5\xca\x82\xeb\xb1\x04wn*\xf2\xc6\x9d\xc4!\x9e?\x83\x99\x0e\xcc\xa3\x95q.C\xee\x8dIf\xec\xbf\xe8\xb2\t\xedg\x9d\xd9\v\xce\xa3\xa3\xa5\x89F\x03\xefQ\x89\f\xeeRK\x15\xec{D\x9e\x83Z\xabTa\x8e\xcd\x01\xd0\xcfd\xf9c\x87m\xbe>\x81\xba\x9d2\x1c\a,\x12\xbf\xef\xb8m\v\xdf\x8e\xd5\xf5\x1a\xabD\xf6\xe0\x95\xf4\xfeRb_+\xeb\xf9f\xe8\\\x16\xeb\x87\x8e\x8acn4,\x80Q<\x84\xaep\xf9\xfc\x8e\x9f\xed\x06.a\xd5o\x14\r&L\xbd\xb9g\x82;+n\xd5\xcca\v\x86Z\x872\xc3c:`\xf2\x02\xc2\x92\x841\xe7\xca}\"@6}j\x0e\xb7\xa9\xbc\xf3N\xa3\xf3mbd\xfbS\x80\xe0\x11<\x7f\x84\xbe\xa2\xf9\xf7\xee\xf6\x94x\x9d\xe2{\xc5\x83\xc0M\xbb\xd4Io\r\x1c\xd7<\xc0\x84=`\xf1^Y', 0x0, 0x0) 00:28:28 executing program 2: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(&(0x7f0000000080)=@nbd={'/dev/nbd', 0x0, 0xe0000}, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000240)='hfsf\xe6\xa6\xe2\x06g\x96\xb3\v\xf2p\xd5:\x95p\x99\x92\xf2\xc4\x80\x1f\x01\x05\xb8e?\xbfwk\xe4\xe5\xca\x82\xeb\xb1\x04wn*\xf2\xc6\x9d\xc4!\x9e?\x83\x99\x0e\xcc\xa3\x95q.C\xee\x8dIf\xec\xbf\xe8\xb2\t\xedg\x9d\xd9\v\xce\xa3\xa3\xa5\x89F\x03\xefQ\x89\f\xeeRK\x15\xec{D\x9e\x83Z\xabTa\x8e\xcd\x01\xd0\xcfd\xf9c\x87m\xbe>\x81\xba\x9d2\x1c\a,\x12\xbf\xef\xb8m\v\xdf\x8e\xd5\xf5\x1a\xabD\xf6\xe0\x95\xf4\xfeRb_+\xeb\xf9f\xe8\\\x16\xeb\x87\x8e\x8acn4,\x80Q<\x84\xaep\xf9\xfc\x8e\x9f\xed\x06.a\xd5o\x14\r&L\xbd\xb9g\x82;+n\xd5\xcca\v\x86Z\x872\xc3c:`\xf2\x02\xc2\x92\x841\xe7\xca}\"@6}j\x0e\xb7\xa9\xbc\xf3N\xa3\xf3mbd\xfbS\x80\xe0\x11<\x7f\x84\xbe\xa2\xf9\xf7\xee\xf6\x94x\x9d\xe2{\xc5\x83\xc0M\xbb\xd4Io\r\x1c\xd7<\xc0\x84=`\xf1^Y', 0x0, 0x0) 00:28:28 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00004e7000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f}, 0xc, &(0x7f0000000440)={&(0x7f00000001c0)=ANY=[@ANYBLOB="1c00000022000100000000000061960d0100000008fe0c009d0a6be0e6d9fc638f19561d6ceb8a6c9239228215fd206cf204e07953", @ANYRES32=0x0], 0x2}, 0x1, 0x0, 0x0, 0xffffffffffffffff}, 0x0) 00:28:28 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000480)=@acquire={0x1ac, 0x17, 0x1, 0x0, 0x0, {{@in=@multicast1}, @in6=@ipv4={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1200], [], @dev}, {@in=@loopback, @in6=@local}, {{@in, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x2}}}, [@tmpl={0x84, 0x5, [{{@in6=@mcast1, 0x0, 0x3c}, 0x0, @in=@multicast1}, {{@in=@remote, 0x0, 0x3c}, 0x0, @in=@broadcast}]}]}, 0x1ac}}, 0x0) 00:28:28 executing program 1: syz_mount_image$reiserfs(&(0x7f0000000180)='reistrfs\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[@ANYBLOB='jdev=.']) 00:28:28 executing program 0: syz_mount_image$reiserfs(&(0x7f0000000180)='reiserf%\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[@ANYBLOB='jdev=./file0,jdev=']) 00:28:28 executing program 2: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(&(0x7f0000000080)=@nbd={'/dev/nbd', 0x0, 0xe0000}, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000240)='hfs\x00\xe6\xa6\xe3\x06g\x96\xb3\v\xf2p\xd5:\x95p\x99\x92\xf2\xc4\x80\x1f\x01\x05\xb8e?\xbfwk\xe4\xe5\xca\x82\xeb\xb1\x04wn*\xf2\xc6\x9d\xc4!\x9e?\x83\x99\x0e\xcc\xa3\x95q.C\xee\x8dIf\xec\xbf\xe8\xb2\t\xedg\x9d\xd9\v\xce\xa3\xa3\xa5\x89F\x03\xefQ\x89\f\xeeRK\x15\xec{D\x9e\x83Z\xabTa\x8e\xcd\x01\xd0\xcfd\xf9c\x87m\xbe>\x81\xba\x9d2\x1c\a,\x12\xbf\xef\xb8m\v\xdf\x8e\xd5\xf5\x1a\xabD\xf6\xe0\x95\xf4\xfeRb_+\xeb\xf9f\xe8\\\x16\xeb\x87\x8e\x8acn4,\x80Q<\x84\xaep\xf9\xfc\x8e\x9f\xed\x06.a\xd5o\x14\r&L\xbd\xb9g\x82;+n\xd5\xcca\v\x86Z\x872\xc3c:`\xf2\x02\xc2\x92\x841\xe7\xca}\"@6}j\x0e\xb7\xa9\xbc\xf3N\xa3\xf3mbd\xfbS\x80\xe0\x11<\x7f\x84\xbe\xa2\xf9\xf7\xee\xf6\x94x\x9d\xe2{\xc5\x83\xc0M\xbb\xd4Io\r\x1c\xd7<\xc0\x84=`\xf1^Y', 0x0, 0x0) 00:28:28 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000480)=@acquire={0x1ac, 0x17, 0x1, 0x0, 0x0, {{@in=@multicast1}, @in6=@ipv4={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1300], [], @dev}, {@in=@loopback, @in6=@local}, {{@in, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x2}}}, [@tmpl={0x84, 0x5, [{{@in6=@mcast1, 0x0, 0x3c}, 0x0, @in=@multicast1}, {{@in=@remote, 0x0, 0x3c}, 0x0, @in=@broadcast}]}]}, 0x1ac}}, 0x0) 00:28:28 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000180)='./control\x00', 0x0) get_thread_area(0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x3) write$binfmt_script(r0, &(0x7f0000000bc0)=ANY=[@ANYBLOB="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"], 0x145) close(r0) execve(&(0x7f0000000180)='./file0\x00', &(0x7f0000000140), &(0x7f0000000140)) r1 = open(&(0x7f0000000000)='./control\x00', 0x80, 0x10) statfs(&(0x7f0000000380)='./control\x00', &(0x7f00000003c0)=""/20) write$P9_RWALK(r0, &(0x7f0000000400)=ANY=[@ANYBLOB="300000006f0100030001030000000400000000000000100000000003000002000000000300000000000000e646f1c5592139cf131e2bf572fa9728dbfac0390865410f3fa1f25743c497e12cb352eac4046b4500f95cfdfb4cf22a3be5c564a47654334c01d5732d382e27bbccd9b903000000c404000000d32dbd21f3ae581d32e69ef9327f7b487d1b4f4502838c08136678bd90733173ab78d6fc264b373611f15c439384"], 0xa6) getsockopt$inet_sctp6_SCTP_RTOINFO(r1, 0x84, 0x0, &(0x7f0000000080)={0x0, 0x200, 0x0, 0xffffffff}, &(0x7f0000000100)=0x10) 00:28:28 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00004e7000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f}, 0xc, &(0x7f0000000440)={&(0x7f00000001c0)=ANY=[@ANYBLOB="1c00000022000100000000000061960d0100000008fe0c009d0a6be0e6d9fc638f19561d6ceb8a6c9239228215fd206cf204e07953", @ANYRES32=0x0], 0x2}, 0x1, 0x0, 0x0, 0xffffffffffffffff}, 0x0) [ 899.138123][ T2481] block nbd2: Attempted send on invalid socket [ 899.144466][ T2481] print_req_error: I/O error, dev nbd2, sector 2 flags 0 [ 899.154677][ T5030] hfs: can't find a HFS filesystem on dev nbd2 00:28:28 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000480)=@acquire={0x1ac, 0x17, 0x1, 0x0, 0x0, {{@in=@multicast1}, @in6=@ipv4={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000], [], @dev}, {@in=@loopback, @in6=@local}, {{@in, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x2}}}, [@tmpl={0x84, 0x5, [{{@in6=@mcast1, 0x0, 0x3c}, 0x0, @in=@multicast1}, {{@in=@remote, 0x0, 0x3c}, 0x0, @in=@broadcast}]}]}, 0x1ac}}, 0x0) 00:28:28 executing program 2: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(&(0x7f0000000080)=@nbd={'/dev/nbd', 0x0, 0xe0000}, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000240)='hfs\x00\xe6\xa6\xe2\x04g\x96\xb3\v\xf2p\xd5:\x95p\x99\x92\xf2\xc4\x80\x1f\x01\x05\xb8e?\xbfwk\xe4\xe5\xca\x82\xeb\xb1\x04wn*\xf2\xc6\x9d\xc4!\x9e?\x83\x99\x0e\xcc\xa3\x95q.C\xee\x8dIf\xec\xbf\xe8\xb2\t\xedg\x9d\xd9\v\xce\xa3\xa3\xa5\x89F\x03\xefQ\x89\f\xeeRK\x15\xec{D\x9e\x83Z\xabTa\x8e\xcd\x01\xd0\xcfd\xf9c\x87m\xbe>\x81\xba\x9d2\x1c\a,\x12\xbf\xef\xb8m\v\xdf\x8e\xd5\xf5\x1a\xabD\xf6\xe0\x95\xf4\xfeRb_+\xeb\xf9f\xe8\\\x16\xeb\x87\x8e\x8acn4,\x80Q<\x84\xaep\xf9\xfc\x8e\x9f\xed\x06.a\xd5o\x14\r&L\xbd\xb9g\x82;+n\xd5\xcca\v\x86Z\x872\xc3c:`\xf2\x02\xc2\x92\x841\xe7\xca}\"@6}j\x0e\xb7\xa9\xbc\xf3N\xa3\xf3mbd\xfbS\x80\xe0\x11<\x7f\x84\xbe\xa2\xf9\xf7\xee\xf6\x94x\x9d\xe2{\xc5\x83\xc0M\xbb\xd4Io\r\x1c\xd7<\xc0\x84=`\xf1^Y', 0x0, 0x0) 00:28:29 executing program 0: syz_mount_image$reiserfs(&(0x7f0000000180)='reiserf*\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[@ANYBLOB='jdev=./file0,jdev=']) [ 899.333300][ T2480] block nbd2: Attempted send on invalid socket [ 899.339562][ T2480] print_req_error: I/O error, dev nbd2, sector 2 flags 0 [ 899.348316][ T5052] hfs: can't find a HFS filesystem on dev nbd2 00:28:29 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00004e7000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f}, 0xc, &(0x7f0000000440)={&(0x7f00000001c0)=ANY=[@ANYBLOB="1c00000022000100000000000061960d0100000008fe0c009d0a6be0e6d9fc638f19561d6ceb8a6c9239228215fd206cf204e07953", @ANYRES32=0x0], 0x2}, 0x1, 0x0, 0x0, 0xffffffffffffffff}, 0x0) 00:28:29 executing program 1: syz_mount_image$reiserfs(&(0x7f0000000180)='reise\nfs\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[@ANYBLOB='jdev=.']) 00:28:29 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000480)=@acquire={0x1ac, 0x17, 0x1, 0x0, 0x0, {{@in=@multicast1}, @in6=@ipv4={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6000], [], @dev}, {@in=@loopback, @in6=@local}, {{@in, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x2}}}, [@tmpl={0x84, 0x5, [{{@in6=@mcast1, 0x0, 0x3c}, 0x0, @in=@multicast1}, {{@in=@remote, 0x0, 0x3c}, 0x0, @in=@broadcast}]}]}, 0x1ac}}, 0x0) 00:28:29 executing program 2: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(&(0x7f0000000080)=@nbd={'/dev/nbd', 0x0, 0xe0000}, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000240)='hfs\x00\xe6\xa6\xe2\ng\x96\xb3\v\xf2p\xd5:\x95p\x99\x92\xf2\xc4\x80\x1f\x01\x05\xb8e?\xbfwk\xe4\xe5\xca\x82\xeb\xb1\x04wn*\xf2\xc6\x9d\xc4!\x9e?\x83\x99\x0e\xcc\xa3\x95q.C\xee\x8dIf\xec\xbf\xe8\xb2\t\xedg\x9d\xd9\v\xce\xa3\xa3\xa5\x89F\x03\xefQ\x89\f\xeeRK\x15\xec{D\x9e\x83Z\xabTa\x8e\xcd\x01\xd0\xcfd\xf9c\x87m\xbe>\x81\xba\x9d2\x1c\a,\x12\xbf\xef\xb8m\v\xdf\x8e\xd5\xf5\x1a\xabD\xf6\xe0\x95\xf4\xfeRb_+\xeb\xf9f\xe8\\\x16\xeb\x87\x8e\x8acn4,\x80Q<\x84\xaep\xf9\xfc\x8e\x9f\xed\x06.a\xd5o\x14\r&L\xbd\xb9g\x82;+n\xd5\xcca\v\x86Z\x872\xc3c:`\xf2\x02\xc2\x92\x841\xe7\xca}\"@6}j\x0e\xb7\xa9\xbc\xf3N\xa3\xf3mbd\xfbS\x80\xe0\x11<\x7f\x84\xbe\xa2\xf9\xf7\xee\xf6\x94x\x9d\xe2{\xc5\x83\xc0M\xbb\xd4Io\r\x1c\xd7<\xc0\x84=`\xf1^Y', 0x0, 0x0) 00:28:29 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000180)='./control\x00', 0x0) get_thread_area(0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x3) write$binfmt_script(r0, &(0x7f0000000bc0)=ANY=[@ANYBLOB="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"], 0x145) close(r0) execve(&(0x7f0000000180)='./file0\x00', &(0x7f0000000140), &(0x7f0000000140)) r1 = open(&(0x7f0000000000)='./control\x00', 0x80, 0x10) statfs(&(0x7f0000000380)='./control\x00', &(0x7f00000003c0)=""/20) write$P9_RWALK(r0, &(0x7f0000000400)=ANY=[@ANYBLOB="300000006f0100030001030000000400000000000000100000000003000002000000000300000000000000e646f1c5592139cf131e2bf572fa9728dbfac0390865410f3fa1f25743c497e12cb352eac4046b4500f95cfdfb4cf22a3be5c564a47654334c01d5732d382e27bbccd9b903000000c404000000d32dbd21f3ae581d32e69ef9327f7b487d1b4f4502838c08136678bd90733173ab78d6fc264b373611f15c439384"], 0xa6) getsockopt$inet_sctp6_SCTP_RTOINFO(r1, 0x84, 0x0, &(0x7f0000000080)={0x0, 0x200, 0x0, 0xffffffff}, &(0x7f0000000100)=0x10) 00:28:29 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000480)=@acquire={0x1ac, 0x17, 0x1, 0x0, 0x0, {{@in=@multicast1}, @in6=@ipv4={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf000], [], @dev}, {@in=@loopback, @in6=@local}, {{@in, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x2}}}, [@tmpl={0x84, 0x5, [{{@in6=@mcast1, 0x0, 0x3c}, 0x0, @in=@multicast1}, {{@in=@remote, 0x0, 0x3c}, 0x0, @in=@broadcast}]}]}, 0x1ac}}, 0x0) [ 899.589219][ T2480] block nbd2: Attempted send on invalid socket [ 899.596534][ T2480] print_req_error: I/O error, dev nbd2, sector 2 flags 0 [ 899.607605][ T5068] hfs: can't find a HFS filesystem on dev nbd2 00:28:29 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00004e7000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f}, 0xc, &(0x7f0000000440)={&(0x7f00000001c0)=ANY=[@ANYBLOB="1c00000022000100000000000061960d0100000008fe0c009d0a6be0e6d9fc638f19561d6ceb8a6c9239228215fd206cf204e07953", @ANYRES32=0x0], 0x2}, 0x1, 0x0, 0x0, 0xffffffffffffffff}, 0x0) 00:28:29 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000480)=@acquire={0x1ac, 0x17, 0x1, 0x0, 0x0, {{@in=@multicast1}, @in6=@ipv4={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf0ffff], [], @dev}, {@in=@loopback, @in6=@local}, {{@in, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x2}}}, [@tmpl={0x84, 0x5, [{{@in6=@mcast1, 0x0, 0x3c}, 0x0, @in=@multicast1}, {{@in=@remote, 0x0, 0x3c}, 0x0, @in=@broadcast}]}]}, 0x1ac}}, 0x0) [ 899.701354][ T2481] block nbd2: Attempted send on invalid socket [ 899.707607][ T2481] print_req_error: I/O error, dev nbd2, sector 2 flags 0 [ 899.715135][ T5068] hfs: can't find a HFS filesystem on dev nbd2 00:28:29 executing program 2: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(&(0x7f0000000080)=@nbd={'/dev/nbd', 0x0, 0xe0000}, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000240)='hfs\x00\xe6\xa6\xe2\x0fg\x96\xb3\v\xf2p\xd5:\x95p\x99\x92\xf2\xc4\x80\x1f\x01\x05\xb8e?\xbfwk\xe4\xe5\xca\x82\xeb\xb1\x04wn*\xf2\xc6\x9d\xc4!\x9e?\x83\x99\x0e\xcc\xa3\x95q.C\xee\x8dIf\xec\xbf\xe8\xb2\t\xedg\x9d\xd9\v\xce\xa3\xa3\xa5\x89F\x03\xefQ\x89\f\xeeRK\x15\xec{D\x9e\x83Z\xabTa\x8e\xcd\x01\xd0\xcfd\xf9c\x87m\xbe>\x81\xba\x9d2\x1c\a,\x12\xbf\xef\xb8m\v\xdf\x8e\xd5\xf5\x1a\xabD\xf6\xe0\x95\xf4\xfeRb_+\xeb\xf9f\xe8\\\x16\xeb\x87\x8e\x8acn4,\x80Q<\x84\xaep\xf9\xfc\x8e\x9f\xed\x06.a\xd5o\x14\r&L\xbd\xb9g\x82;+n\xd5\xcca\v\x86Z\x872\xc3c:`\xf2\x02\xc2\x92\x841\xe7\xca}\"@6}j\x0e\xb7\xa9\xbc\xf3N\xa3\xf3mbd\xfbS\x80\xe0\x11<\x7f\x84\xbe\xa2\xf9\xf7\xee\xf6\x94x\x9d\xe2{\xc5\x83\xc0M\xbb\xd4Io\r\x1c\xd7<\xc0\x84=`\xf1^Y', 0x0, 0x0) 00:28:29 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000180)='./control\x00', 0x0) get_thread_area(0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x3) write$binfmt_script(r0, &(0x7f0000000bc0)=ANY=[@ANYBLOB="2321202e2f66696c6530202357994f66e76f4d0fe2208456ebfa69074cb94144c95c4375644bd1747e34c127d80575d10a599f851dc7ad26f3fa377c0a53cc7be2512b7493bf864ecf3f13e46032dbbf3af349b06321cec7a0652f4a5768256cd01a2d3d52de67dc459409a1e50ca51334791c8690646f7a1962ccefc0592a163bacf13da16978ca48eb3784c5baa40700ebfddde7e115f9388051297af49e38e0e3210d232e108a7e9b69c2e56676484906d975d537d128607c901050484e2bdb0d042a40c8ff8f4727cde00677ea73dac796f06f6f7ef7b3406723e7da9fb469c4ce44faff2888c779c000000000000000000000dc4fd7f68b303f980ed08fb24c8052b0626c8b3733eeee64a90f35fd7d88f958406cb5a8ed3b20b7d1278e15c1e1012befbc45a45f203503128d3a99b80bc2c744ae4b8509ca0149b48dc3e11c2d5db4"], 0x145) close(r0) execve(&(0x7f0000000180)='./file0\x00', &(0x7f0000000140), &(0x7f0000000140)) r1 = open(&(0x7f0000000000)='./control\x00', 0x80, 0x10) statfs(&(0x7f0000000380)='./control\x00', &(0x7f00000003c0)=""/20) write$P9_RWALK(r0, &(0x7f0000000400)=ANY=[@ANYBLOB="300000006f0100030001030000000400000000000000100000000003000002000000000300000000000000e646f1c5592139cf131e2bf572fa9728dbfac0390865410f3fa1f25743c497e12cb352eac4046b4500f95cfdfb4cf22a3be5c564a47654334c01d5732d382e27bbccd9b903000000c404000000d32dbd21f3ae581d32e69ef9327f7b487d1b4f4502838c08136678bd90733173ab78d6fc264b373611f15c439384"], 0xa6) getsockopt$inet_sctp6_SCTP_RTOINFO(r1, 0x84, 0x0, &(0x7f0000000080)={0x0, 0x200, 0x0, 0xffffffff}, &(0x7f0000000100)=0x10) 00:28:29 executing program 0: syz_mount_image$reiserfs(&(0x7f0000000180)='reiserf+\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[@ANYBLOB='jdev=./file0,jdev=']) 00:28:29 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000480)=@acquire={0x1ac, 0x17, 0x1, 0x0, 0x0, {{@in=@multicast1}, @in6=@ipv4={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000], [], @dev}, {@in=@loopback, @in6=@local}, {{@in, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x2}}}, [@tmpl={0x84, 0x5, [{{@in6=@mcast1, 0x0, 0x3c}, 0x0, @in=@multicast1}, {{@in=@remote, 0x0, 0x3c}, 0x0, @in=@broadcast}]}]}, 0x1ac}}, 0x0) [ 899.930383][ T2480] block nbd2: Attempted send on invalid socket [ 899.936901][ T2480] print_req_error: I/O error, dev nbd2, sector 2 flags 0 [ 899.948499][ T5100] hfs: can't find a HFS filesystem on dev nbd2 00:28:29 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00004e7000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f}, 0xc, &(0x7f0000000440)={&(0x7f00000001c0)=ANY=[@ANYBLOB="1c00000022000100000000000061960d0100000008fe0c009d0a6be0e6d9fc638f19561d6ceb8a6c9239228215fd206cf204e07953", @ANYRES32=0x0], 0x2}, 0x1, 0x0, 0x0, 0xffffffffffffffff}, 0x0) 00:28:29 executing program 1: syz_mount_image$reiserfs(&(0x7f0000000180)='reise%fs\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[@ANYBLOB='jdev=.']) 00:28:29 executing program 2: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(&(0x7f0000000080)=@nbd={'/dev/nbd', 0x0, 0xe0000}, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000240)='hfs\x00\xe6\xa6\xe2\x10g\x96\xb3\v\xf2p\xd5:\x95p\x99\x92\xf2\xc4\x80\x1f\x01\x05\xb8e?\xbfwk\xe4\xe5\xca\x82\xeb\xb1\x04wn*\xf2\xc6\x9d\xc4!\x9e?\x83\x99\x0e\xcc\xa3\x95q.C\xee\x8dIf\xec\xbf\xe8\xb2\t\xedg\x9d\xd9\v\xce\xa3\xa3\xa5\x89F\x03\xefQ\x89\f\xeeRK\x15\xec{D\x9e\x83Z\xabTa\x8e\xcd\x01\xd0\xcfd\xf9c\x87m\xbe>\x81\xba\x9d2\x1c\a,\x12\xbf\xef\xb8m\v\xdf\x8e\xd5\xf5\x1a\xabD\xf6\xe0\x95\xf4\xfeRb_+\xeb\xf9f\xe8\\\x16\xeb\x87\x8e\x8acn4,\x80Q<\x84\xaep\xf9\xfc\x8e\x9f\xed\x06.a\xd5o\x14\r&L\xbd\xb9g\x82;+n\xd5\xcca\v\x86Z\x872\xc3c:`\xf2\x02\xc2\x92\x841\xe7\xca}\"@6}j\x0e\xb7\xa9\xbc\xf3N\xa3\xf3mbd\xfbS\x80\xe0\x11<\x7f\x84\xbe\xa2\xf9\xf7\xee\xf6\x94x\x9d\xe2{\xc5\x83\xc0M\xbb\xd4Io\r\x1c\xd7<\xc0\x84=`\xf1^Y', 0x0, 0x0) 00:28:29 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000480)=@acquire={0x1ac, 0x17, 0x1, 0x0, 0x0, {{@in=@multicast1}, @in6=@ipv4={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000], [], @dev}, {@in=@loopback, @in6=@local}, {{@in, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x2}}}, [@tmpl={0x84, 0x5, [{{@in6=@mcast1, 0x0, 0x3c}, 0x0, @in=@multicast1}, {{@in=@remote, 0x0, 0x3c}, 0x0, @in=@broadcast}]}]}, 0x1ac}}, 0x0) 00:28:29 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000180)='./control\x00', 0x0) get_thread_area(0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x3) write$binfmt_script(r0, &(0x7f0000000bc0)=ANY=[@ANYBLOB="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"], 0x145) close(r0) execve(&(0x7f0000000180)='./file0\x00', &(0x7f0000000140), &(0x7f0000000140)) r1 = open(&(0x7f0000000000)='./control\x00', 0x80, 0x10) statfs(&(0x7f0000000380)='./control\x00', &(0x7f00000003c0)=""/20) write$P9_RWALK(r0, &(0x7f0000000400)=ANY=[@ANYBLOB="300000006f0100030001030000000400000000000000100000000003000002000000000300000000000000e646f1c5592139cf131e2bf572fa9728dbfac0390865410f3fa1f25743c497e12cb352eac4046b4500f95cfdfb4cf22a3be5c564a47654334c01d5732d382e27bbccd9b903000000c404000000d32dbd21f3ae581d32e69ef9327f7b487d1b4f4502838c08136678bd90733173ab78d6fc264b373611f15c439384"], 0xa6) getsockopt$inet_sctp6_SCTP_RTOINFO(r1, 0x84, 0x0, &(0x7f0000000080)={0x0, 0x200, 0x2}, &(0x7f0000000100)=0x10) 00:28:29 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00004e7000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f}, 0xc, &(0x7f0000000440)={&(0x7f00000001c0)=ANY=[@ANYBLOB="1c00000022000100000000000061960d0100000008fe0c009d0a6be0e6d9fc638f19561d6ceb8a6c9239228215fd206cf204e07953", @ANYRES32=0x0], 0x2}, 0x1, 0x0, 0x0, 0xffffffffffffffff}, 0x0) [ 900.164129][ T2480] block nbd2: Attempted send on invalid socket [ 900.170376][ T2480] print_req_error: I/O error, dev nbd2, sector 2 flags 0 [ 900.216762][ T5119] hfs: can't find a HFS filesystem on dev nbd2 00:28:30 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000480)=@acquire={0x1ac, 0x17, 0x1, 0x0, 0x0, {{@in=@multicast1}, @in6=@ipv4={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3000000], [], @dev}, {@in=@loopback, @in6=@local}, {{@in, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x2}}}, [@tmpl={0x84, 0x5, [{{@in6=@mcast1, 0x0, 0x3c}, 0x0, @in=@multicast1}, {{@in=@remote, 0x0, 0x3c}, 0x0, @in=@broadcast}]}]}, 0x1ac}}, 0x0) 00:28:30 executing program 2: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(&(0x7f0000000080)=@nbd={'/dev/nbd', 0x0, 0xe0000}, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000240)='hfs\x00\xe6\xa6\xe2\x14g\x96\xb3\v\xf2p\xd5:\x95p\x99\x92\xf2\xc4\x80\x1f\x01\x05\xb8e?\xbfwk\xe4\xe5\xca\x82\xeb\xb1\x04wn*\xf2\xc6\x9d\xc4!\x9e?\x83\x99\x0e\xcc\xa3\x95q.C\xee\x8dIf\xec\xbf\xe8\xb2\t\xedg\x9d\xd9\v\xce\xa3\xa3\xa5\x89F\x03\xefQ\x89\f\xeeRK\x15\xec{D\x9e\x83Z\xabTa\x8e\xcd\x01\xd0\xcfd\xf9c\x87m\xbe>\x81\xba\x9d2\x1c\a,\x12\xbf\xef\xb8m\v\xdf\x8e\xd5\xf5\x1a\xabD\xf6\xe0\x95\xf4\xfeRb_+\xeb\xf9f\xe8\\\x16\xeb\x87\x8e\x8acn4,\x80Q<\x84\xaep\xf9\xfc\x8e\x9f\xed\x06.a\xd5o\x14\r&L\xbd\xb9g\x82;+n\xd5\xcca\v\x86Z\x872\xc3c:`\xf2\x02\xc2\x92\x841\xe7\xca}\"@6}j\x0e\xb7\xa9\xbc\xf3N\xa3\xf3mbd\xfbS\x80\xe0\x11<\x7f\x84\xbe\xa2\xf9\xf7\xee\xf6\x94x\x9d\xe2{\xc5\x83\xc0M\xbb\xd4Io\r\x1c\xd7<\xc0\x84=`\xf1^Y', 0x0, 0x0) 00:28:30 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00004e7000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f}, 0xc, &(0x7f0000000440)={&(0x7f00000001c0)=ANY=[@ANYBLOB="1c00000022000100000000000061960d0100000008fe0c009d0a6be0e6d9fc638f19561d6ceb8a6c9239228215fd206cf204e07953", @ANYRES32=0x0], 0x2}, 0x1, 0x0, 0x0, 0xffffffffffffffff}, 0x0) 00:28:30 executing program 0: syz_mount_image$reiserfs(&(0x7f0000000180)='reiserf-\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[@ANYBLOB='jdev=./file0,jdev=']) 00:28:30 executing program 1: syz_mount_image$reiserfs(&(0x7f0000000180)='reisetfs\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[@ANYBLOB='jdev=.']) [ 900.466344][ T2480] block nbd2: Attempted send on invalid socket [ 900.473421][ T2480] print_req_error: I/O error, dev nbd2, sector 2 flags 0 [ 900.480658][ T5146] hfs: can't find a HFS filesystem on dev nbd2 00:28:30 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000480)=@acquire={0x1ac, 0x17, 0x1, 0x0, 0x0, {{@in=@multicast1}, @in6=@ipv4={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000], [], @dev}, {@in=@loopback, @in6=@local}, {{@in, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x2}}}, [@tmpl={0x84, 0x5, [{{@in6=@mcast1, 0x0, 0x3c}, 0x0, @in=@multicast1}, {{@in=@remote, 0x0, 0x3c}, 0x0, @in=@broadcast}]}]}, 0x1ac}}, 0x0) 00:28:30 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000180)='./control\x00', 0x0) get_thread_area(0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x3) write$binfmt_script(r0, &(0x7f0000000bc0)=ANY=[@ANYBLOB="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"], 0x145) close(r0) execve(&(0x7f0000000180)='./file0\x00', &(0x7f0000000140), &(0x7f0000000140)) r1 = open(&(0x7f0000000000)='./control\x00', 0x80, 0x10) statfs(&(0x7f0000000380)='./control\x00', &(0x7f00000003c0)=""/20) write$P9_RWALK(r0, &(0x7f0000000400)=ANY=[@ANYBLOB="300000006f0100030001030000000400000000000000100000000003000002000000000300000000000000e646f1c5592139cf131e2bf572fa9728dbfac0390865410f3fa1f25743c497e12cb352eac4046b4500f95cfdfb4cf22a3be5c564a47654334c01d5732d382e27bbccd9b903000000c404000000d32dbd21f3ae581d32e69ef9327f7b487d1b4f4502838c08136678bd90733173ab78d6fc264b373611f15c439384"], 0xa6) getsockopt$inet_sctp6_SCTP_RTOINFO(r1, 0x84, 0x0, &(0x7f0000000080)={0x0, 0x200, 0x2}, &(0x7f0000000100)=0x10) 00:28:30 executing program 2: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(&(0x7f0000000080)=@nbd={'/dev/nbd', 0x0, 0xe0000}, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000240)='hfs\x00\xe6\xa6\xe2\x06B\x96\xb3\v\xf2p\xd5:\x95p\x99\x92\xf2\xc4\x80\x1f\x01\x05\xb8e?\xbfwk\xe4\xe5\xca\x82\xeb\xb1\x04wn*\xf2\xc6\x9d\xc4!\x9e?\x83\x99\x0e\xcc\xa3\x95q.C\xee\x8dIf\xec\xbf\xe8\xb2\t\xedg\x9d\xd9\v\xce\xa3\xa3\xa5\x89F\x03\xefQ\x89\f\xeeRK\x15\xec{D\x9e\x83Z\xabTa\x8e\xcd\x01\xd0\xcfd\xf9c\x87m\xbe>\x81\xba\x9d2\x1c\a,\x12\xbf\xef\xb8m\v\xdf\x8e\xd5\xf5\x1a\xabD\xf6\xe0\x95\xf4\xfeRb_+\xeb\xf9f\xe8\\\x16\xeb\x87\x8e\x8acn4,\x80Q<\x84\xaep\xf9\xfc\x8e\x9f\xed\x06.a\xd5o\x14\r&L\xbd\xb9g\x82;+n\xd5\xcca\v\x86Z\x872\xc3c:`\xf2\x02\xc2\x92\x841\xe7\xca}\"@6}j\x0e\xb7\xa9\xbc\xf3N\xa3\xf3mbd\xfbS\x80\xe0\x11<\x7f\x84\xbe\xa2\xf9\xf7\xee\xf6\x94x\x9d\xe2{\xc5\x83\xc0M\xbb\xd4Io\r\x1c\xd7<\xc0\x84=`\xf1^Y', 0x0, 0x0) 00:28:30 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00004e7000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f}, 0xc, &(0x7f0000000440)={&(0x7f00000001c0)=ANY=[@ANYBLOB="1c00000022000100000000000061960d0100000008fe0c009d0a6be0e6d9fc638f19561d6ceb8a6c9239228215fd206cf204e07953", @ANYRES32=0x0], 0x2}, 0x1, 0x0, 0x0, 0xffffffffffffffff}, 0x0) 00:28:30 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000480)=@acquire={0x1ac, 0x17, 0x1, 0x0, 0x0, {{@in=@multicast1}, @in6=@ipv4={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5000000], [], @dev}, {@in=@loopback, @in6=@local}, {{@in, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x2}}}, [@tmpl={0x84, 0x5, [{{@in6=@mcast1, 0x0, 0x3c}, 0x0, @in=@multicast1}, {{@in=@remote, 0x0, 0x3c}, 0x0, @in=@broadcast}]}]}, 0x1ac}}, 0x0) [ 900.721122][ T2481] block nbd2: Attempted send on invalid socket [ 900.727325][ T2481] print_req_error: I/O error, dev nbd2, sector 2 flags 0 00:28:30 executing program 0: syz_mount_image$reiserfs(&(0x7f0000000180)='reiserf.\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[@ANYBLOB='jdev=./file0,jdev=']) [ 900.762720][ T5168] hfs: can't find a HFS filesystem on dev nbd2 00:28:30 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00004e7000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f}, 0xc, &(0x7f0000000440)={&(0x7f00000001c0)=ANY=[@ANYBLOB="1c00000022000100000000000061960d0100000008fe0c009d0a6be0e6d9fc638f19561d6ceb8a6c9239228215fd206cf204e07953", @ANYRES32=0x0], 0x2}, 0x1, 0x0, 0x0, 0xffffffffffffffff}, 0x0) 00:28:30 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000480)=@acquire={0x1ac, 0x17, 0x1, 0x0, 0x0, {{@in=@multicast1}, @in6=@ipv4={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6000000], [], @dev}, {@in=@loopback, @in6=@local}, {{@in, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x2}}}, [@tmpl={0x84, 0x5, [{{@in6=@mcast1, 0x0, 0x3c}, 0x0, @in=@multicast1}, {{@in=@remote, 0x0, 0x3c}, 0x0, @in=@broadcast}]}]}, 0x1ac}}, 0x0) 00:28:30 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000180)='./control\x00', 0x0) get_thread_area(0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x3) write$binfmt_script(r0, &(0x7f0000000bc0)=ANY=[@ANYBLOB="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"], 0x145) close(r0) execve(&(0x7f0000000180)='./file0\x00', &(0x7f0000000140), &(0x7f0000000140)) r1 = open(&(0x7f0000000000)='./control\x00', 0x80, 0x10) statfs(&(0x7f0000000380)='./control\x00', &(0x7f00000003c0)=""/20) write$P9_RWALK(r0, &(0x7f0000000400)=ANY=[@ANYBLOB="300000006f0100030001030000000400000000000000100000000003000002000000000300000000000000e646f1c5592139cf131e2bf572fa9728dbfac0390865410f3fa1f25743c497e12cb352eac4046b4500f95cfdfb4cf22a3be5c564a47654334c01d5732d382e27bbccd9b903000000c404000000d32dbd21f3ae581d32e69ef9327f7b487d1b4f4502838c08136678bd90733173ab78d6fc264b373611f15c439384"], 0xa6) getsockopt$inet_sctp6_SCTP_RTOINFO(r1, 0x84, 0x0, &(0x7f0000000080)={0x0, 0x200, 0x2}, &(0x7f0000000100)=0x10) 00:28:30 executing program 2: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(&(0x7f0000000080)=@nbd={'/dev/nbd', 0x0, 0xe0000}, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000240)='hfs\x00\xe6\xa6\xe2\x06C\x96\xb3\v\xf2p\xd5:\x95p\x99\x92\xf2\xc4\x80\x1f\x01\x05\xb8e?\xbfwk\xe4\xe5\xca\x82\xeb\xb1\x04wn*\xf2\xc6\x9d\xc4!\x9e?\x83\x99\x0e\xcc\xa3\x95q.C\xee\x8dIf\xec\xbf\xe8\xb2\t\xedg\x9d\xd9\v\xce\xa3\xa3\xa5\x89F\x03\xefQ\x89\f\xeeRK\x15\xec{D\x9e\x83Z\xabTa\x8e\xcd\x01\xd0\xcfd\xf9c\x87m\xbe>\x81\xba\x9d2\x1c\a,\x12\xbf\xef\xb8m\v\xdf\x8e\xd5\xf5\x1a\xabD\xf6\xe0\x95\xf4\xfeRb_+\xeb\xf9f\xe8\\\x16\xeb\x87\x8e\x8acn4,\x80Q<\x84\xaep\xf9\xfc\x8e\x9f\xed\x06.a\xd5o\x14\r&L\xbd\xb9g\x82;+n\xd5\xcca\v\x86Z\x872\xc3c:`\xf2\x02\xc2\x92\x841\xe7\xca}\"@6}j\x0e\xb7\xa9\xbc\xf3N\xa3\xf3mbd\xfbS\x80\xe0\x11<\x7f\x84\xbe\xa2\xf9\xf7\xee\xf6\x94x\x9d\xe2{\xc5\x83\xc0M\xbb\xd4Io\r\x1c\xd7<\xc0\x84=`\xf1^Y', 0x0, 0x0) 00:28:30 executing program 1: syz_mount_image$reiserfs(&(0x7f0000000180)='reiser\ns\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[@ANYBLOB='jdev=.']) [ 901.081186][ T2480] block nbd2: Attempted send on invalid socket [ 901.087480][ T2480] print_req_error: I/O error, dev nbd2, sector 2 flags 0 [ 901.097071][ T5201] hfs: can't find a HFS filesystem on dev nbd2 00:28:30 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000480)=@acquire={0x1ac, 0x17, 0x1, 0x0, 0x0, {{@in=@multicast1}, @in6=@ipv4={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000], [], @dev}, {@in=@loopback, @in6=@local}, {{@in, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x2}}}, [@tmpl={0x84, 0x5, [{{@in6=@mcast1, 0x0, 0x3c}, 0x0, @in=@multicast1}, {{@in=@remote, 0x0, 0x3c}, 0x0, @in=@broadcast}]}]}, 0x1ac}}, 0x0) 00:28:30 executing program 0: syz_mount_image$reiserfs(&(0x7f0000000180)='reiserf0\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[@ANYBLOB='jdev=./file0,jdev=']) 00:28:30 executing program 2: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(&(0x7f0000000080)=@nbd={'/dev/nbd', 0x0, 0xe0000}, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000240)='hfs\x00\xe6\xa6\xe2\x06D\x96\xb3\v\xf2p\xd5:\x95p\x99\x92\xf2\xc4\x80\x1f\x01\x05\xb8e?\xbfwk\xe4\xe5\xca\x82\xeb\xb1\x04wn*\xf2\xc6\x9d\xc4!\x9e?\x83\x99\x0e\xcc\xa3\x95q.C\xee\x8dIf\xec\xbf\xe8\xb2\t\xedg\x9d\xd9\v\xce\xa3\xa3\xa5\x89F\x03\xefQ\x89\f\xeeRK\x15\xec{D\x9e\x83Z\xabTa\x8e\xcd\x01\xd0\xcfd\xf9c\x87m\xbe>\x81\xba\x9d2\x1c\a,\x12\xbf\xef\xb8m\v\xdf\x8e\xd5\xf5\x1a\xabD\xf6\xe0\x95\xf4\xfeRb_+\xeb\xf9f\xe8\\\x16\xeb\x87\x8e\x8acn4,\x80Q<\x84\xaep\xf9\xfc\x8e\x9f\xed\x06.a\xd5o\x14\r&L\xbd\xb9g\x82;+n\xd5\xcca\v\x86Z\x872\xc3c:`\xf2\x02\xc2\x92\x841\xe7\xca}\"@6}j\x0e\xb7\xa9\xbc\xf3N\xa3\xf3mbd\xfbS\x80\xe0\x11<\x7f\x84\xbe\xa2\xf9\xf7\xee\xf6\x94x\x9d\xe2{\xc5\x83\xc0M\xbb\xd4Io\r\x1c\xd7<\xc0\x84=`\xf1^Y', 0x0, 0x0) 00:28:30 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00004e7000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f}, 0xc, &(0x7f0000000440)={&(0x7f00000001c0)=ANY=[@ANYBLOB="1c00000022000100000000000061960d0100000008fe0c009d0a6be0e6d9fc638f19561d6ceb8a6c9239228215fd206cf204e07953", @ANYRES32=0x0], 0x2}, 0x1, 0x0, 0x0, 0xffffffffffffffff}, 0x0) 00:28:31 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000480)=@acquire={0x1ac, 0x17, 0x1, 0x0, 0x0, {{@in=@multicast1}, @in6=@ipv4={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8050000], [], @dev}, {@in=@loopback, @in6=@local}, {{@in, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x2}}}, [@tmpl={0x84, 0x5, [{{@in6=@mcast1, 0x0, 0x3c}, 0x0, @in=@multicast1}, {{@in=@remote, 0x0, 0x3c}, 0x0, @in=@broadcast}]}]}, 0x1ac}}, 0x0) [ 901.332033][ T2480] block nbd2: Attempted send on invalid socket [ 901.338307][ T2480] print_req_error: I/O error, dev nbd2, sector 2 flags 0 [ 901.345831][ T5221] hfs: can't find a HFS filesystem on dev nbd2 00:28:31 executing program 1: syz_mount_image$reiserfs(&(0x7f0000000180)='reiser%s\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[@ANYBLOB='jdev=.']) 00:28:31 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000180)='./control\x00', 0x0) get_thread_area(0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x3) write$binfmt_script(r0, &(0x7f0000000bc0)=ANY=[@ANYBLOB="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"], 0x145) close(r0) execve(&(0x7f0000000180)='./file0\x00', &(0x7f0000000140), &(0x7f0000000140)) r1 = open(&(0x7f0000000000)='./control\x00', 0x80, 0x10) statfs(&(0x7f0000000380)='./control\x00', &(0x7f00000003c0)=""/20) write$P9_RWALK(r0, &(0x7f0000000400)=ANY=[@ANYBLOB="300000006f0100030001030000000400000000000000100000000003000002000000000300000000000000e646f1c5592139cf131e2bf572fa9728dbfac0390865410f3fa1f25743c497e12cb352eac4046b4500f95cfdfb4cf22a3be5c564a47654334c01d5732d382e27bbccd9b903000000c404000000d32dbd21f3ae581d32e69ef9327f7b487d1b4f4502838c08136678bd90733173ab78d6fc264b373611f15c439384"], 0xa6) getsockopt$inet_sctp6_SCTP_RTOINFO(r1, 0x84, 0x0, &(0x7f0000000080)={0x0, 0x200, 0x2, 0xffffffff}, 0x0) 00:28:31 executing program 2: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(&(0x7f0000000080)=@nbd={'/dev/nbd', 0x0, 0xe0000}, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000240)='hfs\x00\xe6\xa6\xe2\x06E\x96\xb3\v\xf2p\xd5:\x95p\x99\x92\xf2\xc4\x80\x1f\x01\x05\xb8e?\xbfwk\xe4\xe5\xca\x82\xeb\xb1\x04wn*\xf2\xc6\x9d\xc4!\x9e?\x83\x99\x0e\xcc\xa3\x95q.C\xee\x8dIf\xec\xbf\xe8\xb2\t\xedg\x9d\xd9\v\xce\xa3\xa3\xa5\x89F\x03\xefQ\x89\f\xeeRK\x15\xec{D\x9e\x83Z\xabTa\x8e\xcd\x01\xd0\xcfd\xf9c\x87m\xbe>\x81\xba\x9d2\x1c\a,\x12\xbf\xef\xb8m\v\xdf\x8e\xd5\xf5\x1a\xabD\xf6\xe0\x95\xf4\xfeRb_+\xeb\xf9f\xe8\\\x16\xeb\x87\x8e\x8acn4,\x80Q<\x84\xaep\xf9\xfc\x8e\x9f\xed\x06.a\xd5o\x14\r&L\xbd\xb9g\x82;+n\xd5\xcca\v\x86Z\x872\xc3c:`\xf2\x02\xc2\x92\x841\xe7\xca}\"@6}j\x0e\xb7\xa9\xbc\xf3N\xa3\xf3mbd\xfbS\x80\xe0\x11<\x7f\x84\xbe\xa2\xf9\xf7\xee\xf6\x94x\x9d\xe2{\xc5\x83\xc0M\xbb\xd4Io\r\x1c\xd7<\xc0\x84=`\xf1^Y', 0x0, 0x0) 00:28:31 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00004e7000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f}, 0xc, &(0x7f0000000440)={&(0x7f00000001c0)=ANY=[@ANYBLOB="1c00000022000100000000000061960d0100000008fe0c009d0a6be0e6d9fc638f19561d6ceb8a6c9239228215fd206cf204e07953", @ANYRES32=0x0], 0x2}, 0x1, 0x0, 0x0, 0xffffffffffffffff}, 0x0) 00:28:31 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000480)=@acquire={0x1ac, 0x17, 0x1, 0x0, 0x0, {{@in=@multicast1}, @in6=@ipv4={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9000000], [], @dev}, {@in=@loopback, @in6=@local}, {{@in, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x2}}}, [@tmpl={0x84, 0x5, [{{@in6=@mcast1, 0x0, 0x3c}, 0x0, @in=@multicast1}, {{@in=@remote, 0x0, 0x3c}, 0x0, @in=@broadcast}]}]}, 0x1ac}}, 0x0) 00:28:31 executing program 2: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(&(0x7f0000000080)=@nbd={'/dev/nbd', 0x0, 0xe0000}, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000240)='hfs\x00\xe6\xa6\xe2\x06F\x96\xb3\v\xf2p\xd5:\x95p\x99\x92\xf2\xc4\x80\x1f\x01\x05\xb8e?\xbfwk\xe4\xe5\xca\x82\xeb\xb1\x04wn*\xf2\xc6\x9d\xc4!\x9e?\x83\x99\x0e\xcc\xa3\x95q.C\xee\x8dIf\xec\xbf\xe8\xb2\t\xedg\x9d\xd9\v\xce\xa3\xa3\xa5\x89F\x03\xefQ\x89\f\xeeRK\x15\xec{D\x9e\x83Z\xabTa\x8e\xcd\x01\xd0\xcfd\xf9c\x87m\xbe>\x81\xba\x9d2\x1c\a,\x12\xbf\xef\xb8m\v\xdf\x8e\xd5\xf5\x1a\xabD\xf6\xe0\x95\xf4\xfeRb_+\xeb\xf9f\xe8\\\x16\xeb\x87\x8e\x8acn4,\x80Q<\x84\xaep\xf9\xfc\x8e\x9f\xed\x06.a\xd5o\x14\r&L\xbd\xb9g\x82;+n\xd5\xcca\v\x86Z\x872\xc3c:`\xf2\x02\xc2\x92\x841\xe7\xca}\"@6}j\x0e\xb7\xa9\xbc\xf3N\xa3\xf3mbd\xfbS\x80\xe0\x11<\x7f\x84\xbe\xa2\xf9\xf7\xee\xf6\x94x\x9d\xe2{\xc5\x83\xc0M\xbb\xd4Io\r\x1c\xd7<\xc0\x84=`\xf1^Y', 0x0, 0x0) 00:28:31 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000480)=@acquire={0x1ac, 0x17, 0x1, 0x0, 0x0, {{@in=@multicast1}, @in6=@ipv4={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa000000], [], @dev}, {@in=@loopback, @in6=@local}, {{@in, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x2}}}, [@tmpl={0x84, 0x5, [{{@in6=@mcast1, 0x0, 0x3c}, 0x0, @in=@multicast1}, {{@in=@remote, 0x0, 0x3c}, 0x0, @in=@broadcast}]}]}, 0x1ac}}, 0x0) 00:28:31 executing program 0: syz_mount_image$reiserfs(&(0x7f0000000180)='reiserfK\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[@ANYBLOB='jdev=./file0,jdev=']) 00:28:31 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00004e7000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f}, 0xc, &(0x7f0000000440)={&(0x7f00000001c0)=ANY=[@ANYBLOB="1c00000022000100000000000061960d0100000008fe0c009d0a6be0e6d9fc638f19561d6ceb8a6c9239228215fd206cf204e07953", @ANYRES32=0x0], 0x2}, 0x1, 0x0, 0x0, 0xffffffffffffffff}, 0x0) 00:28:31 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000180)='./control\x00', 0x0) get_thread_area(0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x3) write$binfmt_script(r0, &(0x7f0000000bc0)=ANY=[@ANYBLOB="2321202e2f66696c6530202357994f66e76f4d0fe2208456ebfa69074cb94144c95c4375644bd1747e34c127d80575d10a599f851dc7ad26f3fa377c0a53cc7be2512b7493bf864ecf3f13e46032dbbf3af349b06321cec7a0652f4a5768256cd01a2d3d52de67dc459409a1e50ca51334791c8690646f7a1962ccefc0592a163bacf13da16978ca48eb3784c5baa40700ebfddde7e115f9388051297af49e38e0e3210d232e108a7e9b69c2e56676484906d975d537d128607c901050484e2bdb0d042a40c8ff8f4727cde00677ea73dac796f06f6f7ef7b3406723e7da9fb469c4ce44faff2888c779c000000000000000000000dc4fd7f68b303f980ed08fb24c8052b0626c8b3733eeee64a90f35fd7d88f958406cb5a8ed3b20b7d1278e15c1e1012befbc45a45f203503128d3a99b80bc2c744ae4b8509ca0149b48dc3e11c2d5db4"], 0x145) close(r0) execve(&(0x7f0000000180)='./file0\x00', &(0x7f0000000140), &(0x7f0000000140)) r1 = open(&(0x7f0000000000)='./control\x00', 0x80, 0x10) statfs(&(0x7f0000000380)='./control\x00', &(0x7f00000003c0)=""/20) write$P9_RWALK(r0, &(0x7f0000000400)=ANY=[@ANYBLOB="300000006f0100030001030000000400000000000000100000000003000002000000000300000000000000e646f1c5592139cf131e2bf572fa9728dbfac0390865410f3fa1f25743c497e12cb352eac4046b4500f95cfdfb4cf22a3be5c564a47654334c01d5732d382e27bbccd9b903000000c404000000d32dbd21f3ae581d32e69ef9327f7b487d1b4f4502838c08136678bd90733173ab78d6fc264b373611f15c439384"], 0xa6) getsockopt$inet_sctp6_SCTP_RTOINFO(r1, 0x84, 0x0, &(0x7f0000000080)={0x0, 0x200, 0x2, 0xffffffff}, 0x0) 00:28:31 executing program 2: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(&(0x7f0000000080)=@nbd={'/dev/nbd', 0x0, 0xe0000}, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000240)='hfs\x00\xe6\xa6\xe2\x06G\x96\xb3\v\xf2p\xd5:\x95p\x99\x92\xf2\xc4\x80\x1f\x01\x05\xb8e?\xbfwk\xe4\xe5\xca\x82\xeb\xb1\x04wn*\xf2\xc6\x9d\xc4!\x9e?\x83\x99\x0e\xcc\xa3\x95q.C\xee\x8dIf\xec\xbf\xe8\xb2\t\xedg\x9d\xd9\v\xce\xa3\xa3\xa5\x89F\x03\xefQ\x89\f\xeeRK\x15\xec{D\x9e\x83Z\xabTa\x8e\xcd\x01\xd0\xcfd\xf9c\x87m\xbe>\x81\xba\x9d2\x1c\a,\x12\xbf\xef\xb8m\v\xdf\x8e\xd5\xf5\x1a\xabD\xf6\xe0\x95\xf4\xfeRb_+\xeb\xf9f\xe8\\\x16\xeb\x87\x8e\x8acn4,\x80Q<\x84\xaep\xf9\xfc\x8e\x9f\xed\x06.a\xd5o\x14\r&L\xbd\xb9g\x82;+n\xd5\xcca\v\x86Z\x872\xc3c:`\xf2\x02\xc2\x92\x841\xe7\xca}\"@6}j\x0e\xb7\xa9\xbc\xf3N\xa3\xf3mbd\xfbS\x80\xe0\x11<\x7f\x84\xbe\xa2\xf9\xf7\xee\xf6\x94x\x9d\xe2{\xc5\x83\xc0M\xbb\xd4Io\r\x1c\xd7<\xc0\x84=`\xf1^Y', 0x0, 0x0) [ 901.759392][ T5261] hfs: can't find a HFS filesystem on dev nbd2 00:28:31 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000480)=@acquire={0x1ac, 0x17, 0x1, 0x0, 0x0, {{@in=@multicast1}, @in6=@ipv4={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb000000], [], @dev}, {@in=@loopback, @in6=@local}, {{@in, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x2}}}, [@tmpl={0x84, 0x5, [{{@in6=@mcast1, 0x0, 0x3c}, 0x0, @in=@multicast1}, {{@in=@remote, 0x0, 0x3c}, 0x0, @in=@broadcast}]}]}, 0x1ac}}, 0x0) 00:28:31 executing program 1: syz_mount_image$reiserfs(&(0x7f0000000180)='reiser.s\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[@ANYBLOB='jdev=.']) [ 901.928555][ T5278] hfs: can't find a HFS filesystem on dev nbd2 00:28:31 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000480)=@acquire={0x1ac, 0x17, 0x1, 0x0, 0x0, {{@in=@multicast1}, @in6=@ipv4={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe000000], [], @dev}, {@in=@loopback, @in6=@local}, {{@in, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x2}}}, [@tmpl={0x84, 0x5, [{{@in6=@mcast1, 0x0, 0x3c}, 0x0, @in=@multicast1}, {{@in=@remote, 0x0, 0x3c}, 0x0, @in=@broadcast}]}]}, 0x1ac}}, 0x0) 00:28:31 executing program 2: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(&(0x7f0000000080)=@nbd={'/dev/nbd', 0x0, 0xe0000}, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000240)='hfs\x00\xe6\xa6\xe2\x06I\x96\xb3\v\xf2p\xd5:\x95p\x99\x92\xf2\xc4\x80\x1f\x01\x05\xb8e?\xbfwk\xe4\xe5\xca\x82\xeb\xb1\x04wn*\xf2\xc6\x9d\xc4!\x9e?\x83\x99\x0e\xcc\xa3\x95q.C\xee\x8dIf\xec\xbf\xe8\xb2\t\xedg\x9d\xd9\v\xce\xa3\xa3\xa5\x89F\x03\xefQ\x89\f\xeeRK\x15\xec{D\x9e\x83Z\xabTa\x8e\xcd\x01\xd0\xcfd\xf9c\x87m\xbe>\x81\xba\x9d2\x1c\a,\x12\xbf\xef\xb8m\v\xdf\x8e\xd5\xf5\x1a\xabD\xf6\xe0\x95\xf4\xfeRb_+\xeb\xf9f\xe8\\\x16\xeb\x87\x8e\x8acn4,\x80Q<\x84\xaep\xf9\xfc\x8e\x9f\xed\x06.a\xd5o\x14\r&L\xbd\xb9g\x82;+n\xd5\xcca\v\x86Z\x872\xc3c:`\xf2\x02\xc2\x92\x841\xe7\xca}\"@6}j\x0e\xb7\xa9\xbc\xf3N\xa3\xf3mbd\xfbS\x80\xe0\x11<\x7f\x84\xbe\xa2\xf9\xf7\xee\xf6\x94x\x9d\xe2{\xc5\x83\xc0M\xbb\xd4Io\r\x1c\xd7<\xc0\x84=`\xf1^Y', 0x0, 0x0) 00:28:31 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00004e7000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f}, 0xc, &(0x7f0000000440)={&(0x7f00000001c0)=ANY=[@ANYBLOB="1c00000022000100000000000061960d0100000008fe0c009d0a6be0e6d9fc638f19561d6ceb8a6c9239228215fd206cf204e07953", @ANYRES32=0x0], 0x2}, 0x1, 0x0, 0x0, 0xffffffffffffffff}, 0x0) 00:28:31 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000180)='./control\x00', 0x0) get_thread_area(0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x3) write$binfmt_script(r0, &(0x7f0000000bc0)=ANY=[@ANYBLOB="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"], 0x145) close(r0) execve(&(0x7f0000000180)='./file0\x00', &(0x7f0000000140), &(0x7f0000000140)) r1 = open(&(0x7f0000000000)='./control\x00', 0x80, 0x10) statfs(&(0x7f0000000380)='./control\x00', &(0x7f00000003c0)=""/20) write$P9_RWALK(r0, &(0x7f0000000400)=ANY=[@ANYBLOB="300000006f0100030001030000000400000000000000100000000003000002000000000300000000000000e646f1c5592139cf131e2bf572fa9728dbfac0390865410f3fa1f25743c497e12cb352eac4046b4500f95cfdfb4cf22a3be5c564a47654334c01d5732d382e27bbccd9b903000000c404000000d32dbd21f3ae581d32e69ef9327f7b487d1b4f4502838c08136678bd90733173ab78d6fc264b373611f15c439384"], 0xa6) getsockopt$inet_sctp6_SCTP_RTOINFO(r1, 0x84, 0x0, &(0x7f0000000080)={0x0, 0x200, 0x2, 0xffffffff}, 0x0) 00:28:31 executing program 0: syz_mount_image$reiserfs(&(0x7f0000000180)='reiserfX\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[@ANYBLOB='jdev=./file0,jdev=']) 00:28:31 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000480)=@acquire={0x1ac, 0x17, 0x1, 0x0, 0x0, {{@in=@multicast1}, @in6=@ipv4={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf000000], [], @dev}, {@in=@loopback, @in6=@local}, {{@in, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x2}}}, [@tmpl={0x84, 0x5, [{{@in6=@mcast1, 0x0, 0x3c}, 0x0, @in=@multicast1}, {{@in=@remote, 0x0, 0x3c}, 0x0, @in=@broadcast}]}]}, 0x1ac}}, 0x0) [ 902.161210][ T5297] hfs: can't find a HFS filesystem on dev nbd2 00:28:32 executing program 2: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(&(0x7f0000000080)=@nbd={'/dev/nbd', 0x0, 0xe0000}, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000240)='hfs\x00\xe6\xa6\xe2\x06K\x96\xb3\v\xf2p\xd5:\x95p\x99\x92\xf2\xc4\x80\x1f\x01\x05\xb8e?\xbfwk\xe4\xe5\xca\x82\xeb\xb1\x04wn*\xf2\xc6\x9d\xc4!\x9e?\x83\x99\x0e\xcc\xa3\x95q.C\xee\x8dIf\xec\xbf\xe8\xb2\t\xedg\x9d\xd9\v\xce\xa3\xa3\xa5\x89F\x03\xefQ\x89\f\xeeRK\x15\xec{D\x9e\x83Z\xabTa\x8e\xcd\x01\xd0\xcfd\xf9c\x87m\xbe>\x81\xba\x9d2\x1c\a,\x12\xbf\xef\xb8m\v\xdf\x8e\xd5\xf5\x1a\xabD\xf6\xe0\x95\xf4\xfeRb_+\xeb\xf9f\xe8\\\x16\xeb\x87\x8e\x8acn4,\x80Q<\x84\xaep\xf9\xfc\x8e\x9f\xed\x06.a\xd5o\x14\r&L\xbd\xb9g\x82;+n\xd5\xcca\v\x86Z\x872\xc3c:`\xf2\x02\xc2\x92\x841\xe7\xca}\"@6}j\x0e\xb7\xa9\xbc\xf3N\xa3\xf3mbd\xfbS\x80\xe0\x11<\x7f\x84\xbe\xa2\xf9\xf7\xee\xf6\x94x\x9d\xe2{\xc5\x83\xc0M\xbb\xd4Io\r\x1c\xd7<\xc0\x84=`\xf1^Y', 0x0, 0x0) 00:28:32 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000480)=@acquire={0x1ac, 0x17, 0x1, 0x0, 0x0, {{@in=@multicast1}, @in6=@ipv4={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000], [], @dev}, {@in=@loopback, @in6=@local}, {{@in, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x2}}}, [@tmpl={0x84, 0x5, [{{@in6=@mcast1, 0x0, 0x3c}, 0x0, @in=@multicast1}, {{@in=@remote, 0x0, 0x3c}, 0x0, @in=@broadcast}]}]}, 0x1ac}}, 0x0) 00:28:32 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00004e7000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f}, 0xc, &(0x7f0000000440)={&(0x7f00000001c0)=ANY=[@ANYBLOB="1c00000022000100000000000061960d0100000008fe0c009d0a6be0e6d9fc638f19561d6ceb8a6c9239228215fd206cf204e07953", @ANYRES32=0x0], 0x2}, 0x1, 0x0, 0x0, 0xffffffffffffffff}, 0x0) [ 902.462632][ T5325] hfs: can't find a HFS filesystem on dev nbd2 00:28:32 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000480)=@acquire={0x1ac, 0x17, 0x1, 0x0, 0x0, {{@in=@multicast1}, @in6=@ipv4={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x11000000], [], @dev}, {@in=@loopback, @in6=@local}, {{@in, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x2}}}, [@tmpl={0x84, 0x5, [{{@in6=@mcast1, 0x0, 0x3c}, 0x0, @in=@multicast1}, {{@in=@remote, 0x0, 0x3c}, 0x0, @in=@broadcast}]}]}, 0x1ac}}, 0x0) 00:28:32 executing program 1: syz_mount_image$reiserfs(&(0x7f0000000180)='reiser/s\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[@ANYBLOB='jdev=.']) 00:28:32 executing program 2: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(&(0x7f0000000080)=@nbd={'/dev/nbd', 0x0, 0xe0000}, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000240)='hfs\x00\xe6\xa6\xe2\x06M\x96\xb3\v\xf2p\xd5:\x95p\x99\x92\xf2\xc4\x80\x1f\x01\x05\xb8e?\xbfwk\xe4\xe5\xca\x82\xeb\xb1\x04wn*\xf2\xc6\x9d\xc4!\x9e?\x83\x99\x0e\xcc\xa3\x95q.C\xee\x8dIf\xec\xbf\xe8\xb2\t\xedg\x9d\xd9\v\xce\xa3\xa3\xa5\x89F\x03\xefQ\x89\f\xeeRK\x15\xec{D\x9e\x83Z\xabTa\x8e\xcd\x01\xd0\xcfd\xf9c\x87m\xbe>\x81\xba\x9d2\x1c\a,\x12\xbf\xef\xb8m\v\xdf\x8e\xd5\xf5\x1a\xabD\xf6\xe0\x95\xf4\xfeRb_+\xeb\xf9f\xe8\\\x16\xeb\x87\x8e\x8acn4,\x80Q<\x84\xaep\xf9\xfc\x8e\x9f\xed\x06.a\xd5o\x14\r&L\xbd\xb9g\x82;+n\xd5\xcca\v\x86Z\x872\xc3c:`\xf2\x02\xc2\x92\x841\xe7\xca}\"@6}j\x0e\xb7\xa9\xbc\xf3N\xa3\xf3mbd\xfbS\x80\xe0\x11<\x7f\x84\xbe\xa2\xf9\xf7\xee\xf6\x94x\x9d\xe2{\xc5\x83\xc0M\xbb\xd4Io\r\x1c\xd7<\xc0\x84=`\xf1^Y', 0x0, 0x0) 00:28:32 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00004e7000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f}, 0xc, &(0x7f0000000440)={&(0x7f00000001c0)=ANY=[@ANYBLOB="1c00000022000100000000000061960d0100000008fe0c009d0a6be0e6d9fc638f19561d6ceb8a6c9239228215fd206cf204e07953", @ANYRES32=0x0], 0x2}, 0x1, 0x0, 0x0, 0xffffffffffffffff}, 0x0) 00:28:32 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000480)=@acquire={0x1ac, 0x17, 0x1, 0x0, 0x0, {{@in=@multicast1}, @in6=@ipv4={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x12000000], [], @dev}, {@in=@loopback, @in6=@local}, {{@in, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x2}}}, [@tmpl={0x84, 0x5, [{{@in6=@mcast1, 0x0, 0x3c}, 0x0, @in=@multicast1}, {{@in=@remote, 0x0, 0x3c}, 0x0, @in=@broadcast}]}]}, 0x1ac}}, 0x0) [ 902.746848][ T5341] hfs: can't find a HFS filesystem on dev nbd2 00:28:32 executing program 0: syz_mount_image$reiserfs(&(0x7f0000000180)='reiserfa\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[@ANYBLOB='jdev=./file0,jdev=']) [ 902.820849][ T5341] hfs: can't find a HFS filesystem on dev nbd2 00:28:32 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00004e7000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f}, 0xc, &(0x7f0000000440)={&(0x7f00000001c0)=ANY=[@ANYBLOB="1c02000022000100000000000061960d0100000008fe0c009d0a6be0e6d9fc638f19561d6ceb8a6c9239228215fd206cf204e07953", @ANYRES32=0x0], 0x2}, 0x1, 0x0, 0x0, 0xffffffffffffffff}, 0x0) 00:28:32 executing program 4: r0 = creat(&(0x7f0000000100)='./bus\x00', 0x0) ftruncate(r0, 0x208200) r1 = open(&(0x7f0000000780)='./bus\x00', 0x14103e, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x4002011, r1, 0x0) pipe(&(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) write(r3, &(0x7f0000000340), 0x10000014c) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x45000}], 0x1, 0x0) 00:28:32 executing program 2: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(&(0x7f0000000080)=@nbd={'/dev/nbd', 0x0, 0xe0000}, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000240)='hfs\x00\xe6\xa6\xe2\x06N\x96\xb3\v\xf2p\xd5:\x95p\x99\x92\xf2\xc4\x80\x1f\x01\x05\xb8e?\xbfwk\xe4\xe5\xca\x82\xeb\xb1\x04wn*\xf2\xc6\x9d\xc4!\x9e?\x83\x99\x0e\xcc\xa3\x95q.C\xee\x8dIf\xec\xbf\xe8\xb2\t\xedg\x9d\xd9\v\xce\xa3\xa3\xa5\x89F\x03\xefQ\x89\f\xeeRK\x15\xec{D\x9e\x83Z\xabTa\x8e\xcd\x01\xd0\xcfd\xf9c\x87m\xbe>\x81\xba\x9d2\x1c\a,\x12\xbf\xef\xb8m\v\xdf\x8e\xd5\xf5\x1a\xabD\xf6\xe0\x95\xf4\xfeRb_+\xeb\xf9f\xe8\\\x16\xeb\x87\x8e\x8acn4,\x80Q<\x84\xaep\xf9\xfc\x8e\x9f\xed\x06.a\xd5o\x14\r&L\xbd\xb9g\x82;+n\xd5\xcca\v\x86Z\x872\xc3c:`\xf2\x02\xc2\x92\x841\xe7\xca}\"@6}j\x0e\xb7\xa9\xbc\xf3N\xa3\xf3mbd\xfbS\x80\xe0\x11<\x7f\x84\xbe\xa2\xf9\xf7\xee\xf6\x94x\x9d\xe2{\xc5\x83\xc0M\xbb\xd4Io\r\x1c\xd7<\xc0\x84=`\xf1^Y', 0x0, 0x0) 00:28:32 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000480)=@acquire={0x1ac, 0x17, 0x1, 0x0, 0x0, {{@in=@multicast1}, @in6=@ipv4={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x13000000], [], @dev}, {@in=@loopback, @in6=@local}, {{@in, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x2}}}, [@tmpl={0x84, 0x5, [{{@in6=@mcast1, 0x0, 0x3c}, 0x0, @in=@multicast1}, {{@in=@remote, 0x0, 0x3c}, 0x0, @in=@broadcast}]}]}, 0x1ac}}, 0x0) 00:28:32 executing program 1: syz_mount_image$reiserfs(&(0x7f0000000180)='reiseris\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[@ANYBLOB='jdev=.']) [ 903.015803][ T5363] hfs: can't find a HFS filesystem on dev nbd2 00:28:32 executing program 2: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(&(0x7f0000000080)=@nbd={'/dev/nbd', 0x0, 0xe0000}, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000240)='hfs\x00\xe6\xa6\xe2\x06O\x96\xb3\v\xf2p\xd5:\x95p\x99\x92\xf2\xc4\x80\x1f\x01\x05\xb8e?\xbfwk\xe4\xe5\xca\x82\xeb\xb1\x04wn*\xf2\xc6\x9d\xc4!\x9e?\x83\x99\x0e\xcc\xa3\x95q.C\xee\x8dIf\xec\xbf\xe8\xb2\t\xedg\x9d\xd9\v\xce\xa3\xa3\xa5\x89F\x03\xefQ\x89\f\xeeRK\x15\xec{D\x9e\x83Z\xabTa\x8e\xcd\x01\xd0\xcfd\xf9c\x87m\xbe>\x81\xba\x9d2\x1c\a,\x12\xbf\xef\xb8m\v\xdf\x8e\xd5\xf5\x1a\xabD\xf6\xe0\x95\xf4\xfeRb_+\xeb\xf9f\xe8\\\x16\xeb\x87\x8e\x8acn4,\x80Q<\x84\xaep\xf9\xfc\x8e\x9f\xed\x06.a\xd5o\x14\r&L\xbd\xb9g\x82;+n\xd5\xcca\v\x86Z\x872\xc3c:`\xf2\x02\xc2\x92\x841\xe7\xca}\"@6}j\x0e\xb7\xa9\xbc\xf3N\xa3\xf3mbd\xfbS\x80\xe0\x11<\x7f\x84\xbe\xa2\xf9\xf7\xee\xf6\x94x\x9d\xe2{\xc5\x83\xc0M\xbb\xd4Io\r\x1c\xd7<\xc0\x84=`\xf1^Y', 0x0, 0x0) 00:28:32 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00004e7000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f}, 0xc, &(0x7f0000000440)={&(0x7f00000001c0)=ANY=[@ANYBLOB="1c04000022000100000000000061960d0100000008fe0c009d0a6be0e6d9fc638f19561d6ceb8a6c9239228215fd206cf204e07953", @ANYRES32=0x0], 0x2}, 0x1, 0x0, 0x0, 0xffffffffffffffff}, 0x0) 00:28:32 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000480)=@acquire={0x1ac, 0x17, 0x1, 0x0, 0x0, {{@in=@multicast1}, @in6=@ipv4={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000], [], @dev}, {@in=@loopback, @in6=@local}, {{@in, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x2}}}, [@tmpl={0x84, 0x5, [{{@in6=@mcast1, 0x0, 0x3c}, 0x0, @in=@multicast1}, {{@in=@remote, 0x0, 0x3c}, 0x0, @in=@broadcast}]}]}, 0x1ac}}, 0x0) [ 903.207521][ T5379] hfs: can't find a HFS filesystem on dev nbd2 00:28:33 executing program 2: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(&(0x7f0000000080)=@nbd={'/dev/nbd', 0x0, 0xe0000}, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000240)='hfs\x00\xe6\xa6\xe2\x06R\x96\xb3\v\xf2p\xd5:\x95p\x99\x92\xf2\xc4\x80\x1f\x01\x05\xb8e?\xbfwk\xe4\xe5\xca\x82\xeb\xb1\x04wn*\xf2\xc6\x9d\xc4!\x9e?\x83\x99\x0e\xcc\xa3\x95q.C\xee\x8dIf\xec\xbf\xe8\xb2\t\xedg\x9d\xd9\v\xce\xa3\xa3\xa5\x89F\x03\xefQ\x89\f\xeeRK\x15\xec{D\x9e\x83Z\xabTa\x8e\xcd\x01\xd0\xcfd\xf9c\x87m\xbe>\x81\xba\x9d2\x1c\a,\x12\xbf\xef\xb8m\v\xdf\x8e\xd5\xf5\x1a\xabD\xf6\xe0\x95\xf4\xfeRb_+\xeb\xf9f\xe8\\\x16\xeb\x87\x8e\x8acn4,\x80Q<\x84\xaep\xf9\xfc\x8e\x9f\xed\x06.a\xd5o\x14\r&L\xbd\xb9g\x82;+n\xd5\xcca\v\x86Z\x872\xc3c:`\xf2\x02\xc2\x92\x841\xe7\xca}\"@6}j\x0e\xb7\xa9\xbc\xf3N\xa3\xf3mbd\xfbS\x80\xe0\x11<\x7f\x84\xbe\xa2\xf9\xf7\xee\xf6\x94x\x9d\xe2{\xc5\x83\xc0M\xbb\xd4Io\r\x1c\xd7<\xc0\x84=`\xf1^Y', 0x0, 0x0) 00:28:33 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000480)=@acquire={0x1ac, 0x17, 0x1, 0x0, 0x0, {{@in=@multicast1}, @in6=@ipv4={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x60000000], [], @dev}, {@in=@loopback, @in6=@local}, {{@in, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x2}}}, [@tmpl={0x84, 0x5, [{{@in6=@mcast1, 0x0, 0x3c}, 0x0, @in=@multicast1}, {{@in=@remote, 0x0, 0x3c}, 0x0, @in=@broadcast}]}]}, 0x1ac}}, 0x0) 00:28:33 executing program 0: syz_mount_image$reiserfs(&(0x7f0000000180)='reiserfb\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[@ANYBLOB='jdev=./file0,jdev=']) 00:28:33 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00004e7000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f}, 0xc, &(0x7f0000000440)={&(0x7f00000001c0)=ANY=[@ANYBLOB="1c08000022000100000000000061960d0100000008fe0c009d0a6be0e6d9fc638f19561d6ceb8a6c9239228215fd206cf204e07953", @ANYRES32=0x0], 0x2}, 0x1, 0x0, 0x0, 0xffffffffffffffff}, 0x0) 00:28:33 executing program 1: syz_mount_image$reiserfs(&(0x7f0000000180)='reiserts\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[@ANYBLOB='jdev=.']) [ 903.557562][ T5411] hfs: can't find a HFS filesystem on dev nbd2 00:28:33 executing program 4: 00:28:33 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000480)=@acquire={0x1ac, 0x17, 0x1, 0x0, 0x0, {{@in=@multicast1}, @in6=@ipv4={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9effffff], [], @dev}, {@in=@loopback, @in6=@local}, {{@in, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x2}}}, [@tmpl={0x84, 0x5, [{{@in6=@mcast1, 0x0, 0x3c}, 0x0, @in=@multicast1}, {{@in=@remote, 0x0, 0x3c}, 0x0, @in=@broadcast}]}]}, 0x1ac}}, 0x0) 00:28:33 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00004e7000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f}, 0xc, &(0x7f0000000440)={&(0x7f00000001c0)=ANY=[@ANYBLOB="1c0a000022000100000000000061960d0100000008fe0c009d0a6be0e6d9fc638f19561d6ceb8a6c9239228215fd206cf204e07953", @ANYRES32=0x0], 0x2}, 0x1, 0x0, 0x0, 0xffffffffffffffff}, 0x0) 00:28:33 executing program 2: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(&(0x7f0000000080)=@nbd={'/dev/nbd', 0x0, 0xe0000}, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000240)='hfs\x00\xe6\xa6\xe2\x06S\x96\xb3\v\xf2p\xd5:\x95p\x99\x92\xf2\xc4\x80\x1f\x01\x05\xb8e?\xbfwk\xe4\xe5\xca\x82\xeb\xb1\x04wn*\xf2\xc6\x9d\xc4!\x9e?\x83\x99\x0e\xcc\xa3\x95q.C\xee\x8dIf\xec\xbf\xe8\xb2\t\xedg\x9d\xd9\v\xce\xa3\xa3\xa5\x89F\x03\xefQ\x89\f\xeeRK\x15\xec{D\x9e\x83Z\xabTa\x8e\xcd\x01\xd0\xcfd\xf9c\x87m\xbe>\x81\xba\x9d2\x1c\a,\x12\xbf\xef\xb8m\v\xdf\x8e\xd5\xf5\x1a\xabD\xf6\xe0\x95\xf4\xfeRb_+\xeb\xf9f\xe8\\\x16\xeb\x87\x8e\x8acn4,\x80Q<\x84\xaep\xf9\xfc\x8e\x9f\xed\x06.a\xd5o\x14\r&L\xbd\xb9g\x82;+n\xd5\xcca\v\x86Z\x872\xc3c:`\xf2\x02\xc2\x92\x841\xe7\xca}\"@6}j\x0e\xb7\xa9\xbc\xf3N\xa3\xf3mbd\xfbS\x80\xe0\x11<\x7f\x84\xbe\xa2\xf9\xf7\xee\xf6\x94x\x9d\xe2{\xc5\x83\xc0M\xbb\xd4Io\r\x1c\xd7<\xc0\x84=`\xf1^Y', 0x0, 0x0) 00:28:33 executing program 1: syz_mount_image$reiserfs(&(0x7f0000000180)='reiserf\n\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[@ANYBLOB='jdev=.']) 00:28:33 executing program 0: syz_mount_image$reiserfs(&(0x7f0000000180)='reiserfc\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[@ANYBLOB='jdev=./file0,jdev=']) 00:28:33 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000480)=@acquire={0x1ac, 0x17, 0x1, 0x0, 0x0, {{@in=@multicast1}, @in6=@ipv4={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf0ffffff], [], @dev}, {@in=@loopback, @in6=@local}, {{@in, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x2}}}, [@tmpl={0x84, 0x5, [{{@in6=@mcast1, 0x0, 0x3c}, 0x0, @in=@multicast1}, {{@in=@remote, 0x0, 0x3c}, 0x0, @in=@broadcast}]}]}, 0x1ac}}, 0x0) [ 903.820474][ T5429] hfs: can't find a HFS filesystem on dev nbd2 00:28:33 executing program 2: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(&(0x7f0000000080)=@nbd={'/dev/nbd', 0x0, 0xe0000}, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000240)='hfs\x00\xe6\xa6\xe2\x06U\x96\xb3\v\xf2p\xd5:\x95p\x99\x92\xf2\xc4\x80\x1f\x01\x05\xb8e?\xbfwk\xe4\xe5\xca\x82\xeb\xb1\x04wn*\xf2\xc6\x9d\xc4!\x9e?\x83\x99\x0e\xcc\xa3\x95q.C\xee\x8dIf\xec\xbf\xe8\xb2\t\xedg\x9d\xd9\v\xce\xa3\xa3\xa5\x89F\x03\xefQ\x89\f\xeeRK\x15\xec{D\x9e\x83Z\xabTa\x8e\xcd\x01\xd0\xcfd\xf9c\x87m\xbe>\x81\xba\x9d2\x1c\a,\x12\xbf\xef\xb8m\v\xdf\x8e\xd5\xf5\x1a\xabD\xf6\xe0\x95\xf4\xfeRb_+\xeb\xf9f\xe8\\\x16\xeb\x87\x8e\x8acn4,\x80Q<\x84\xaep\xf9\xfc\x8e\x9f\xed\x06.a\xd5o\x14\r&L\xbd\xb9g\x82;+n\xd5\xcca\v\x86Z\x872\xc3c:`\xf2\x02\xc2\x92\x841\xe7\xca}\"@6}j\x0e\xb7\xa9\xbc\xf3N\xa3\xf3mbd\xfbS\x80\xe0\x11<\x7f\x84\xbe\xa2\xf9\xf7\xee\xf6\x94x\x9d\xe2{\xc5\x83\xc0M\xbb\xd4Io\r\x1c\xd7<\xc0\x84=`\xf1^Y', 0x0, 0x0) 00:28:33 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00004e7000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f}, 0xc, &(0x7f0000000440)={&(0x7f00000001c0)=ANY=[@ANYBLOB="1c0e000022000100000000000061960d0100000008fe0c009d0a6be0e6d9fc638f19561d6ceb8a6c9239228215fd206cf204e07953", @ANYRES32=0x0], 0x2}, 0x1, 0x0, 0x0, 0xffffffffffffffff}, 0x0) 00:28:33 executing program 4: 00:28:33 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000480)=@acquire={0x1ac, 0x17, 0x1, 0x0, 0x0, {{@in=@multicast1}, @in6=@ipv4={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfcffffff], [], @dev}, {@in=@loopback, @in6=@local}, {{@in, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x2}}}, [@tmpl={0x84, 0x5, [{{@in6=@mcast1, 0x0, 0x3c}, 0x0, @in=@multicast1}, {{@in=@remote, 0x0, 0x3c}, 0x0, @in=@broadcast}]}]}, 0x1ac}}, 0x0) [ 904.095813][ T5454] hfs: can't find a HFS filesystem on dev nbd2 00:28:33 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000480)=@acquire={0x1ac, 0x17, 0x1, 0x0, 0x0, {{@in=@multicast1}, @in6=@ipv4={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffff000], [], @dev}, {@in=@loopback, @in6=@local}, {{@in, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x2}}}, [@tmpl={0x84, 0x5, [{{@in6=@mcast1, 0x0, 0x3c}, 0x0, @in=@multicast1}, {{@in=@remote, 0x0, 0x3c}, 0x0, @in=@broadcast}]}]}, 0x1ac}}, 0x0) 00:28:33 executing program 4: r0 = socket$unix(0x1, 0x1, 0x0) write$P9_RLINK(0xffffffffffffffff, 0x0, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) pwritev(0xffffffffffffffff, 0x0, 0xff, 0x0) bind$unix(r1, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) getgid() listen(r1, 0x0) ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, 0x0) r2 = accept4(r1, 0x0, 0x0, 0x0) connect$unix(r0, &(0x7f0000000100)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) waitid(0x0, 0x0, 0x0, 0x0, 0x0) getpeername$netlink(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) setsockopt$inet_mreqn(r2, 0x0, 0x0, 0x0, 0x0) 00:28:33 executing program 2: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(&(0x7f0000000080)=@nbd={'/dev/nbd', 0x0, 0xe0000}, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000240)='hfs\x00\xe6\xa6\xe2\x06V\x96\xb3\v\xf2p\xd5:\x95p\x99\x92\xf2\xc4\x80\x1f\x01\x05\xb8e?\xbfwk\xe4\xe5\xca\x82\xeb\xb1\x04wn*\xf2\xc6\x9d\xc4!\x9e?\x83\x99\x0e\xcc\xa3\x95q.C\xee\x8dIf\xec\xbf\xe8\xb2\t\xedg\x9d\xd9\v\xce\xa3\xa3\xa5\x89F\x03\xefQ\x89\f\xeeRK\x15\xec{D\x9e\x83Z\xabTa\x8e\xcd\x01\xd0\xcfd\xf9c\x87m\xbe>\x81\xba\x9d2\x1c\a,\x12\xbf\xef\xb8m\v\xdf\x8e\xd5\xf5\x1a\xabD\xf6\xe0\x95\xf4\xfeRb_+\xeb\xf9f\xe8\\\x16\xeb\x87\x8e\x8acn4,\x80Q<\x84\xaep\xf9\xfc\x8e\x9f\xed\x06.a\xd5o\x14\r&L\xbd\xb9g\x82;+n\xd5\xcca\v\x86Z\x872\xc3c:`\xf2\x02\xc2\x92\x841\xe7\xca}\"@6}j\x0e\xb7\xa9\xbc\xf3N\xa3\xf3mbd\xfbS\x80\xe0\x11<\x7f\x84\xbe\xa2\xf9\xf7\xee\xf6\x94x\x9d\xe2{\xc5\x83\xc0M\xbb\xd4Io\r\x1c\xd7<\xc0\x84=`\xf1^Y', 0x0, 0x0) 00:28:33 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00004e7000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f}, 0xc, &(0x7f0000000440)={&(0x7f00000001c0)=ANY=[@ANYBLOB="1c10000022000100000000000061960d0100000008fe0c009d0a6be0e6d9fc638f19561d6ceb8a6c9239228215fd206cf204e07953", @ANYRES32=0x0], 0x2}, 0x1, 0x0, 0x0, 0xffffffffffffffff}, 0x0) 00:28:33 executing program 0: syz_mount_image$reiserfs(&(0x7f0000000180)='reiserfd\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[@ANYBLOB='jdev=./file0,jdev=']) 00:28:34 executing program 1: syz_mount_image$reiserfs(&(0x7f0000000180)='reiserf#\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[@ANYBLOB='jdev=.']) 00:28:34 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000480)=@acquire={0x1ac, 0x17, 0x1, 0x0, 0x0, {{@in=@multicast1}, @in6=@ipv4={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffff7f], [], @dev}, {@in=@loopback, @in6=@local}, {{@in, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x2}}}, [@tmpl={0x84, 0x5, [{{@in6=@mcast1, 0x0, 0x3c}, 0x0, @in=@multicast1}, {{@in=@remote, 0x0, 0x3c}, 0x0, @in=@broadcast}]}]}, 0x1ac}}, 0x0) [ 904.309553][ T2481] nbd_handle_cmd: 11 callbacks suppressed [ 904.309585][ T2481] block nbd2: Attempted send on invalid socket [ 904.321971][ T2481] print_req_error: 11 callbacks suppressed [ 904.321982][ T2481] print_req_error: I/O error, dev nbd2, sector 2 flags 0 [ 904.341217][ T5475] hfs: can't find a HFS filesystem on dev nbd2 00:28:34 executing program 2: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(&(0x7f0000000080)=@nbd={'/dev/nbd', 0x0, 0xe0000}, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000240)='hfs\x00\xe6\xa6\xe2\x06a\x96\xb3\v\xf2p\xd5:\x95p\x99\x92\xf2\xc4\x80\x1f\x01\x05\xb8e?\xbfwk\xe4\xe5\xca\x82\xeb\xb1\x04wn*\xf2\xc6\x9d\xc4!\x9e?\x83\x99\x0e\xcc\xa3\x95q.C\xee\x8dIf\xec\xbf\xe8\xb2\t\xedg\x9d\xd9\v\xce\xa3\xa3\xa5\x89F\x03\xefQ\x89\f\xeeRK\x15\xec{D\x9e\x83Z\xabTa\x8e\xcd\x01\xd0\xcfd\xf9c\x87m\xbe>\x81\xba\x9d2\x1c\a,\x12\xbf\xef\xb8m\v\xdf\x8e\xd5\xf5\x1a\xabD\xf6\xe0\x95\xf4\xfeRb_+\xeb\xf9f\xe8\\\x16\xeb\x87\x8e\x8acn4,\x80Q<\x84\xaep\xf9\xfc\x8e\x9f\xed\x06.a\xd5o\x14\r&L\xbd\xb9g\x82;+n\xd5\xcca\v\x86Z\x872\xc3c:`\xf2\x02\xc2\x92\x841\xe7\xca}\"@6}j\x0e\xb7\xa9\xbc\xf3N\xa3\xf3mbd\xfbS\x80\xe0\x11<\x7f\x84\xbe\xa2\xf9\xf7\xee\xf6\x94x\x9d\xe2{\xc5\x83\xc0M\xbb\xd4Io\r\x1c\xd7<\xc0\x84=`\xf1^Y', 0x0, 0x0) 00:28:34 executing program 4: mprotect(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x4) mremap(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x3000, 0x3, &(0x7f0000ff7000/0x3000)=nil) 00:28:34 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00004e7000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f}, 0xc, &(0x7f0000000440)={&(0x7f00000001c0)=ANY=[@ANYBLOB="1c60000022000100000000000061960d0100000008fe0c009d0a6be0e6d9fc638f19561d6ceb8a6c9239228215fd206cf204e07953", @ANYRES32=0x0], 0x2}, 0x1, 0x0, 0x0, 0xffffffffffffffff}, 0x0) 00:28:34 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000480)=@acquire={0x1ac, 0x17, 0x1, 0x0, 0x0, {{@in=@multicast1}, @in6=@ipv4={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffff9e], [], @dev}, {@in=@loopback, @in6=@local}, {{@in, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x2}}}, [@tmpl={0x84, 0x5, [{{@in6=@mcast1, 0x0, 0x3c}, 0x0, @in=@multicast1}, {{@in=@remote, 0x0, 0x3c}, 0x0, @in=@broadcast}]}]}, 0x1ac}}, 0x0) [ 904.508338][ T2481] block nbd2: Attempted send on invalid socket [ 904.514960][ T2481] print_req_error: I/O error, dev nbd2, sector 2 flags 0 [ 904.527296][ T5492] hfs: can't find a HFS filesystem on dev nbd2 00:28:34 executing program 4: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) ioctl$TUNSETQUEUE(r0, 0x400454d9, &(0x7f00000000c0)={'bcsf0\x00\x00\x00\x00\x00\x00\x00\x1f\x00', 0x400}) ioctl$TUNATTACHFILTER(r0, 0x401054d5, &(0x7f0000000000)={0x0, 0x0}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000200)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x04\x00', 0x43732e5398416f1a}) 00:28:34 executing program 2: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(&(0x7f0000000080)=@nbd={'/dev/nbd', 0x0, 0xe0000}, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000240)='hfs\x00\xe6\xa6\xe2\x06b\x96\xb3\v\xf2p\xd5:\x95p\x99\x92\xf2\xc4\x80\x1f\x01\x05\xb8e?\xbfwk\xe4\xe5\xca\x82\xeb\xb1\x04wn*\xf2\xc6\x9d\xc4!\x9e?\x83\x99\x0e\xcc\xa3\x95q.C\xee\x8dIf\xec\xbf\xe8\xb2\t\xedg\x9d\xd9\v\xce\xa3\xa3\xa5\x89F\x03\xefQ\x89\f\xeeRK\x15\xec{D\x9e\x83Z\xabTa\x8e\xcd\x01\xd0\xcfd\xf9c\x87m\xbe>\x81\xba\x9d2\x1c\a,\x12\xbf\xef\xb8m\v\xdf\x8e\xd5\xf5\x1a\xabD\xf6\xe0\x95\xf4\xfeRb_+\xeb\xf9f\xe8\\\x16\xeb\x87\x8e\x8acn4,\x80Q<\x84\xaep\xf9\xfc\x8e\x9f\xed\x06.a\xd5o\x14\r&L\xbd\xb9g\x82;+n\xd5\xcca\v\x86Z\x872\xc3c:`\xf2\x02\xc2\x92\x841\xe7\xca}\"@6}j\x0e\xb7\xa9\xbc\xf3N\xa3\xf3mbd\xfbS\x80\xe0\x11<\x7f\x84\xbe\xa2\xf9\xf7\xee\xf6\x94x\x9d\xe2{\xc5\x83\xc0M\xbb\xd4Io\r\x1c\xd7<\xc0\x84=`\xf1^Y', 0x0, 0x0) 00:28:34 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00004e7000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f}, 0xc, &(0x7f0000000440)={&(0x7f00000001c0)=ANY=[@ANYBLOB="1cf0000022000100000000000061960d0100000008fe0c009d0a6be0e6d9fc638f19561d6ceb8a6c9239228215fd206cf204e07953", @ANYRES32=0x0], 0x2}, 0x1, 0x0, 0x0, 0xffffffffffffffff}, 0x0) 00:28:34 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000480)=@acquire={0x1ac, 0x17, 0x1, 0x0, 0x0, {{@in=@multicast1}, @in6=@ipv4={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffff0], [], @dev}, {@in=@loopback, @in6=@local}, {{@in, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x2}}}, [@tmpl={0x84, 0x5, [{{@in6=@mcast1, 0x0, 0x3c}, 0x0, @in=@multicast1}, {{@in=@remote, 0x0, 0x3c}, 0x0, @in=@broadcast}]}]}, 0x1ac}}, 0x0) 00:28:34 executing program 0: syz_mount_image$reiserfs(&(0x7f0000000180)='reiserfh\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[@ANYBLOB='jdev=./file0,jdev=']) [ 904.815021][ T2481] block nbd2: Attempted send on invalid socket [ 904.821325][ T2481] print_req_error: I/O error, dev nbd2, sector 2 flags 0 [ 904.829924][ T5523] hfs: can't find a HFS filesystem on dev nbd2 00:28:34 executing program 1: syz_mount_image$reiserfs(&(0x7f0000000180)='reiserf%\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[@ANYBLOB='jdev=.']) 00:28:34 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000480)=@acquire={0x1ac, 0x17, 0x1, 0x0, 0x0, {{@in=@multicast1}, @in6=@ipv4={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc], [], @dev}, {@in=@loopback, @in6=@local}, {{@in, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x2}}}, [@tmpl={0x84, 0x5, [{{@in6=@mcast1, 0x0, 0x3c}, 0x0, @in=@multicast1}, {{@in=@remote, 0x0, 0x3c}, 0x0, @in=@broadcast}]}]}, 0x1ac}}, 0x0) 00:28:34 executing program 2: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(&(0x7f0000000080)=@nbd={'/dev/nbd', 0x0, 0xe0000}, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000240)='hfs\x00\xe6\xa6\xe2\x06d\x96\xb3\v\xf2p\xd5:\x95p\x99\x92\xf2\xc4\x80\x1f\x01\x05\xb8e?\xbfwk\xe4\xe5\xca\x82\xeb\xb1\x04wn*\xf2\xc6\x9d\xc4!\x9e?\x83\x99\x0e\xcc\xa3\x95q.C\xee\x8dIf\xec\xbf\xe8\xb2\t\xedg\x9d\xd9\v\xce\xa3\xa3\xa5\x89F\x03\xefQ\x89\f\xeeRK\x15\xec{D\x9e\x83Z\xabTa\x8e\xcd\x01\xd0\xcfd\xf9c\x87m\xbe>\x81\xba\x9d2\x1c\a,\x12\xbf\xef\xb8m\v\xdf\x8e\xd5\xf5\x1a\xabD\xf6\xe0\x95\xf4\xfeRb_+\xeb\xf9f\xe8\\\x16\xeb\x87\x8e\x8acn4,\x80Q<\x84\xaep\xf9\xfc\x8e\x9f\xed\x06.a\xd5o\x14\r&L\xbd\xb9g\x82;+n\xd5\xcca\v\x86Z\x872\xc3c:`\xf2\x02\xc2\x92\x841\xe7\xca}\"@6}j\x0e\xb7\xa9\xbc\xf3N\xa3\xf3mbd\xfbS\x80\xe0\x11<\x7f\x84\xbe\xa2\xf9\xf7\xee\xf6\x94x\x9d\xe2{\xc5\x83\xc0M\xbb\xd4Io\r\x1c\xd7<\xc0\x84=`\xf1^Y', 0x0, 0x0) 00:28:34 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00004e7000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f}, 0xc, &(0x7f0000000440)={&(0x7f00000001c0)=ANY=[@ANYBLOB="1c000a0022000100000000000061960d0100000008fe0c009d0a6be0e6d9fc638f19561d6ceb8a6c9239228215fd206cf204e07953", @ANYRES32=0x0], 0x2}, 0x1, 0x0, 0x0, 0xffffffffffffffff}, 0x0) 00:28:34 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000480)=@acquire={0x1ac, 0x17, 0x1, 0x0, 0x0, {{@in=@multicast1}, @in6=@ipv4={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf0ffffffffffff], [], @dev}, {@in=@loopback, @in6=@local}, {{@in, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x2}}}, [@tmpl={0x84, 0x5, [{{@in6=@mcast1, 0x0, 0x3c}, 0x0, @in=@multicast1}, {{@in=@remote, 0x0, 0x3c}, 0x0, @in=@broadcast}]}]}, 0x1ac}}, 0x0) [ 905.108505][ T2481] block nbd2: Attempted send on invalid socket [ 905.114947][ T2481] print_req_error: I/O error, dev nbd2, sector 2 flags 0 [ 905.122700][ T5551] hfs: can't find a HFS filesystem on dev nbd2 00:28:34 executing program 1: syz_mount_image$reiserfs(&(0x7f0000000180)='reiserf*\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[@ANYBLOB='jdev=.']) 00:28:34 executing program 0: syz_mount_image$reiserfs(&(0x7f0000000180)='reiserfi\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[@ANYBLOB='jdev=./file0,jdev=']) 00:28:35 executing program 4: r0 = openat$misdntimer(0xffffffffffffff9c, &(0x7f0000000100)='/dev/mISDNtimer\x00', 0x0, 0x0) r1 = syz_open_dev$cec(&(0x7f0000000040)='/dev/cec#\x00', 0x3, 0x2) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) dup3(r0, r1, 0x0) 00:28:35 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000480)=@acquire={0x1ac, 0x17, 0x1, 0x0, 0x0, {{@in=@multicast1}, @in6=@ipv4={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000000000], [], @dev}, {@in=@loopback, @in6=@local}, {{@in, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x2}}}, [@tmpl={0x84, 0x5, [{{@in6=@mcast1, 0x0, 0x3c}, 0x0, @in=@multicast1}, {{@in=@remote, 0x0, 0x3c}, 0x0, @in=@broadcast}]}]}, 0x1ac}}, 0x0) 00:28:35 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00004e7000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f}, 0xc, &(0x7f0000000440)={&(0x7f00000001c0)=ANY=[@ANYBLOB="1cb00a0022000100000000000061960d0100000008fe0c009d0a6be0e6d9fc638f19561d6ceb8a6c9239228215fd206cf204e07953", @ANYRES32=0x0], 0x2}, 0x1, 0x0, 0x0, 0xffffffffffffffff}, 0x0) 00:28:35 executing program 2: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(&(0x7f0000000080)=@nbd={'/dev/nbd', 0x0, 0xe0000}, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000240)='hfs\x00\xe6\xa6\xe2\x06f\x96\xb3\v\xf2p\xd5:\x95p\x99\x92\xf2\xc4\x80\x1f\x01\x05\xb8e?\xbfwk\xe4\xe5\xca\x82\xeb\xb1\x04wn*\xf2\xc6\x9d\xc4!\x9e?\x83\x99\x0e\xcc\xa3\x95q.C\xee\x8dIf\xec\xbf\xe8\xb2\t\xedg\x9d\xd9\v\xce\xa3\xa3\xa5\x89F\x03\xefQ\x89\f\xeeRK\x15\xec{D\x9e\x83Z\xabTa\x8e\xcd\x01\xd0\xcfd\xf9c\x87m\xbe>\x81\xba\x9d2\x1c\a,\x12\xbf\xef\xb8m\v\xdf\x8e\xd5\xf5\x1a\xabD\xf6\xe0\x95\xf4\xfeRb_+\xeb\xf9f\xe8\\\x16\xeb\x87\x8e\x8acn4,\x80Q<\x84\xaep\xf9\xfc\x8e\x9f\xed\x06.a\xd5o\x14\r&L\xbd\xb9g\x82;+n\xd5\xcca\v\x86Z\x872\xc3c:`\xf2\x02\xc2\x92\x841\xe7\xca}\"@6}j\x0e\xb7\xa9\xbc\xf3N\xa3\xf3mbd\xfbS\x80\xe0\x11<\x7f\x84\xbe\xa2\xf9\xf7\xee\xf6\x94x\x9d\xe2{\xc5\x83\xc0M\xbb\xd4Io\r\x1c\xd7<\xc0\x84=`\xf1^Y', 0x0, 0x0) 00:28:35 executing program 0: syz_mount_image$reiserfs(&(0x7f0000000180)='reiserfk\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[@ANYBLOB='jdev=./file0,jdev=']) 00:28:35 executing program 1: syz_mount_image$reiserfs(&(0x7f0000000180)='reiserf+\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[@ANYBLOB='jdev=.']) [ 905.944155][ T2481] block nbd2: Attempted send on invalid socket [ 905.950351][ T2481] print_req_error: I/O error, dev nbd2, sector 2 flags 0 [ 905.972196][ T5592] hfs: can't find a HFS filesystem on dev nbd2 00:28:35 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000480)=@acquire={0x1ac, 0x17, 0x1, 0x0, 0x0, {{@in=@multicast1}, @in6=@ipv4={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000000000], [], @dev}, {@in=@loopback, @in6=@local}, {{@in, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x2}}}, [@tmpl={0x84, 0x5, [{{@in6=@mcast1, 0x0, 0x3c}, 0x0, @in=@multicast1}, {{@in=@remote, 0x0, 0x3c}, 0x0, @in=@broadcast}]}]}, 0x1ac}}, 0x0) 00:28:35 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00004e7000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f}, 0xc, &(0x7f0000000440)={&(0x7f00000001c0)=ANY=[@ANYBLOB="1c000e0022000100000000000061960d0100000008fe0c009d0a6be0e6d9fc638f19561d6ceb8a6c9239228215fd206cf204e07953", @ANYRES32=0x0], 0x2}, 0x1, 0x0, 0x0, 0xffffffffffffffff}, 0x0) 00:28:35 executing program 2: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(&(0x7f0000000080)=@nbd={'/dev/nbd', 0x0, 0xe0000}, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000240)='hfs\x00\xe6\xa6\xe2\x06h\x96\xb3\v\xf2p\xd5:\x95p\x99\x92\xf2\xc4\x80\x1f\x01\x05\xb8e?\xbfwk\xe4\xe5\xca\x82\xeb\xb1\x04wn*\xf2\xc6\x9d\xc4!\x9e?\x83\x99\x0e\xcc\xa3\x95q.C\xee\x8dIf\xec\xbf\xe8\xb2\t\xedg\x9d\xd9\v\xce\xa3\xa3\xa5\x89F\x03\xefQ\x89\f\xeeRK\x15\xec{D\x9e\x83Z\xabTa\x8e\xcd\x01\xd0\xcfd\xf9c\x87m\xbe>\x81\xba\x9d2\x1c\a,\x12\xbf\xef\xb8m\v\xdf\x8e\xd5\xf5\x1a\xabD\xf6\xe0\x95\xf4\xfeRb_+\xeb\xf9f\xe8\\\x16\xeb\x87\x8e\x8acn4,\x80Q<\x84\xaep\xf9\xfc\x8e\x9f\xed\x06.a\xd5o\x14\r&L\xbd\xb9g\x82;+n\xd5\xcca\v\x86Z\x872\xc3c:`\xf2\x02\xc2\x92\x841\xe7\xca}\"@6}j\x0e\xb7\xa9\xbc\xf3N\xa3\xf3mbd\xfbS\x80\xe0\x11<\x7f\x84\xbe\xa2\xf9\xf7\xee\xf6\x94x\x9d\xe2{\xc5\x83\xc0M\xbb\xd4Io\r\x1c\xd7<\xc0\x84=`\xf1^Y', 0x0, 0x0) 00:28:35 executing program 4: 00:28:35 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000480)=@acquire={0x1ac, 0x17, 0x1, 0x0, 0x0, {{@in=@multicast1}, @in6=@ipv4={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x300000000000000], [], @dev}, {@in=@loopback, @in6=@local}, {{@in, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x2}}}, [@tmpl={0x84, 0x5, [{{@in6=@mcast1, 0x0, 0x3c}, 0x0, @in=@multicast1}, {{@in=@remote, 0x0, 0x3c}, 0x0, @in=@broadcast}]}]}, 0x1ac}}, 0x0) 00:28:35 executing program 1: syz_mount_image$reiserfs(&(0x7f0000000180)='reiserf-\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[@ANYBLOB='jdev=.']) 00:28:36 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00004e7000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f}, 0xc, &(0x7f0000000440)={&(0x7f00000001c0)=ANY=[@ANYBLOB="1c00600022000100000000000061960d0100000008fe0c009d0a6be0e6d9fc638f19561d6ceb8a6c9239228215fd206cf204e07953", @ANYRES32=0x0], 0x2}, 0x1, 0x0, 0x0, 0xffffffffffffffff}, 0x0) 00:28:36 executing program 4: 00:28:36 executing program 0: syz_mount_image$reiserfs(&(0x7f0000000180)='reiserfl\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[@ANYBLOB='jdev=./file0,jdev=']) [ 906.249962][ T2481] block nbd2: Attempted send on invalid socket [ 906.256425][ T2481] print_req_error: I/O error, dev nbd2, sector 2 flags 0 [ 906.269551][ T5624] hfs: can't find a HFS filesystem on dev nbd2 00:28:36 executing program 2: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(&(0x7f0000000080)=@nbd={'/dev/nbd', 0x0, 0xe0000}, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000240)='hfs\x00\xe6\xa6\xe2\x06i\x96\xb3\v\xf2p\xd5:\x95p\x99\x92\xf2\xc4\x80\x1f\x01\x05\xb8e?\xbfwk\xe4\xe5\xca\x82\xeb\xb1\x04wn*\xf2\xc6\x9d\xc4!\x9e?\x83\x99\x0e\xcc\xa3\x95q.C\xee\x8dIf\xec\xbf\xe8\xb2\t\xedg\x9d\xd9\v\xce\xa3\xa3\xa5\x89F\x03\xefQ\x89\f\xeeRK\x15\xec{D\x9e\x83Z\xabTa\x8e\xcd\x01\xd0\xcfd\xf9c\x87m\xbe>\x81\xba\x9d2\x1c\a,\x12\xbf\xef\xb8m\v\xdf\x8e\xd5\xf5\x1a\xabD\xf6\xe0\x95\xf4\xfeRb_+\xeb\xf9f\xe8\\\x16\xeb\x87\x8e\x8acn4,\x80Q<\x84\xaep\xf9\xfc\x8e\x9f\xed\x06.a\xd5o\x14\r&L\xbd\xb9g\x82;+n\xd5\xcca\v\x86Z\x872\xc3c:`\xf2\x02\xc2\x92\x841\xe7\xca}\"@6}j\x0e\xb7\xa9\xbc\xf3N\xa3\xf3mbd\xfbS\x80\xe0\x11<\x7f\x84\xbe\xa2\xf9\xf7\xee\xf6\x94x\x9d\xe2{\xc5\x83\xc0M\xbb\xd4Io\r\x1c\xd7<\xc0\x84=`\xf1^Y', 0x0, 0x0) 00:28:36 executing program 4: 00:28:36 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000480)=@acquire={0x1ac, 0x17, 0x1, 0x0, 0x0, {{@in=@multicast1}, @in6=@ipv4={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400000000000000], [], @dev}, {@in=@loopback, @in6=@local}, {{@in, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x2}}}, [@tmpl={0x84, 0x5, [{{@in6=@mcast1, 0x0, 0x3c}, 0x0, @in=@multicast1}, {{@in=@remote, 0x0, 0x3c}, 0x0, @in=@broadcast}]}]}, 0x1ac}}, 0x0) 00:28:36 executing program 4: [ 906.493280][ T2480] block nbd2: Attempted send on invalid socket [ 906.499584][ T2480] print_req_error: I/O error, dev nbd2, sector 2 flags 0 [ 906.512086][ T5645] hfs: can't find a HFS filesystem on dev nbd2 00:28:36 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00004e7000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f}, 0xc, &(0x7f0000000440)={&(0x7f00000001c0)=ANY=[@ANYBLOB="1c0ab00022000100000000000061960d0100000008fe0c009d0a6be0e6d9fc638f19561d6ceb8a6c9239228215fd206cf204e07953", @ANYRES32=0x0], 0x2}, 0x1, 0x0, 0x0, 0xffffffffffffffff}, 0x0) 00:28:36 executing program 1: syz_mount_image$reiserfs(&(0x7f0000000180)='reiserf.\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[@ANYBLOB='jdev=.']) 00:28:36 executing program 2: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(&(0x7f0000000080)=@nbd={'/dev/nbd', 0x0, 0xe0000}, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000240)='hfs\x00\xe6\xa6\xe2\x06m\x96\xb3\v\xf2p\xd5:\x95p\x99\x92\xf2\xc4\x80\x1f\x01\x05\xb8e?\xbfwk\xe4\xe5\xca\x82\xeb\xb1\x04wn*\xf2\xc6\x9d\xc4!\x9e?\x83\x99\x0e\xcc\xa3\x95q.C\xee\x8dIf\xec\xbf\xe8\xb2\t\xedg\x9d\xd9\v\xce\xa3\xa3\xa5\x89F\x03\xefQ\x89\f\xeeRK\x15\xec{D\x9e\x83Z\xabTa\x8e\xcd\x01\xd0\xcfd\xf9c\x87m\xbe>\x81\xba\x9d2\x1c\a,\x12\xbf\xef\xb8m\v\xdf\x8e\xd5\xf5\x1a\xabD\xf6\xe0\x95\xf4\xfeRb_+\xeb\xf9f\xe8\\\x16\xeb\x87\x8e\x8acn4,\x80Q<\x84\xaep\xf9\xfc\x8e\x9f\xed\x06.a\xd5o\x14\r&L\xbd\xb9g\x82;+n\xd5\xcca\v\x86Z\x872\xc3c:`\xf2\x02\xc2\x92\x841\xe7\xca}\"@6}j\x0e\xb7\xa9\xbc\xf3N\xa3\xf3mbd\xfbS\x80\xe0\x11<\x7f\x84\xbe\xa2\xf9\xf7\xee\xf6\x94x\x9d\xe2{\xc5\x83\xc0M\xbb\xd4Io\r\x1c\xd7<\xc0\x84=`\xf1^Y', 0x0, 0x0) 00:28:36 executing program 4: 00:28:36 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000480)=@acquire={0x1ac, 0x17, 0x1, 0x0, 0x0, {{@in=@multicast1}, @in6=@ipv4={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x500000000000000], [], @dev}, {@in=@loopback, @in6=@local}, {{@in, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x2}}}, [@tmpl={0x84, 0x5, [{{@in6=@mcast1, 0x0, 0x3c}, 0x0, @in=@multicast1}, {{@in=@remote, 0x0, 0x3c}, 0x0, @in=@broadcast}]}]}, 0x1ac}}, 0x0) [ 906.746013][ T2480] block nbd2: Attempted send on invalid socket [ 906.752450][ T2480] print_req_error: I/O error, dev nbd2, sector 2 flags 0 [ 906.759638][ T5664] hfs: can't find a HFS filesystem on dev nbd2 00:28:36 executing program 2: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(&(0x7f0000000080)=@nbd={'/dev/nbd', 0x0, 0xe0000}, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000240)='hfs\x00\xe6\xa6\xe2\x06r\x96\xb3\v\xf2p\xd5:\x95p\x99\x92\xf2\xc4\x80\x1f\x01\x05\xb8e?\xbfwk\xe4\xe5\xca\x82\xeb\xb1\x04wn*\xf2\xc6\x9d\xc4!\x9e?\x83\x99\x0e\xcc\xa3\x95q.C\xee\x8dIf\xec\xbf\xe8\xb2\t\xedg\x9d\xd9\v\xce\xa3\xa3\xa5\x89F\x03\xefQ\x89\f\xeeRK\x15\xec{D\x9e\x83Z\xabTa\x8e\xcd\x01\xd0\xcfd\xf9c\x87m\xbe>\x81\xba\x9d2\x1c\a,\x12\xbf\xef\xb8m\v\xdf\x8e\xd5\xf5\x1a\xabD\xf6\xe0\x95\xf4\xfeRb_+\xeb\xf9f\xe8\\\x16\xeb\x87\x8e\x8acn4,\x80Q<\x84\xaep\xf9\xfc\x8e\x9f\xed\x06.a\xd5o\x14\r&L\xbd\xb9g\x82;+n\xd5\xcca\v\x86Z\x872\xc3c:`\xf2\x02\xc2\x92\x841\xe7\xca}\"@6}j\x0e\xb7\xa9\xbc\xf3N\xa3\xf3mbd\xfbS\x80\xe0\x11<\x7f\x84\xbe\xa2\xf9\xf7\xee\xf6\x94x\x9d\xe2{\xc5\x83\xc0M\xbb\xd4Io\r\x1c\xd7<\xc0\x84=`\xf1^Y', 0x0, 0x0) 00:28:36 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00004e7000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f}, 0xc, &(0x7f0000000440)={&(0x7f00000001c0)=ANY=[@ANYBLOB="1c00f00022000100000000000061960d0100000008fe0c009d0a6be0e6d9fc638f19561d6ceb8a6c9239228215fd206cf204e07953", @ANYRES32=0x0], 0x2}, 0x1, 0x0, 0x0, 0xffffffffffffffff}, 0x0) 00:28:36 executing program 0: syz_mount_image$reiserfs(&(0x7f0000000180)='reiserfo\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[@ANYBLOB='jdev=./file0,jdev=']) 00:28:36 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000480)=@acquire={0x1ac, 0x17, 0x1, 0x0, 0x0, {{@in=@multicast1}, @in6=@ipv4={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x600000000000000], [], @dev}, {@in=@loopback, @in6=@local}, {{@in, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x2}}}, [@tmpl={0x84, 0x5, [{{@in6=@mcast1, 0x0, 0x3c}, 0x0, @in=@multicast1}, {{@in=@remote, 0x0, 0x3c}, 0x0, @in=@broadcast}]}]}, 0x1ac}}, 0x0) 00:28:36 executing program 4: 00:28:36 executing program 4: [ 906.959300][ T2480] block nbd2: Attempted send on invalid socket [ 906.965566][ T2480] print_req_error: I/O error, dev nbd2, sector 2 flags 0 [ 906.972851][ T5684] hfs: can't find a HFS filesystem on dev nbd2 00:28:36 executing program 2: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(&(0x7f0000000080)=@nbd={'/dev/nbd', 0x0, 0xe0000}, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000240)='hfs\x00\xe6\xa6\xe2\x06s\x96\xb3\v\xf2p\xd5:\x95p\x99\x92\xf2\xc4\x80\x1f\x01\x05\xb8e?\xbfwk\xe4\xe5\xca\x82\xeb\xb1\x04wn*\xf2\xc6\x9d\xc4!\x9e?\x83\x99\x0e\xcc\xa3\x95q.C\xee\x8dIf\xec\xbf\xe8\xb2\t\xedg\x9d\xd9\v\xce\xa3\xa3\xa5\x89F\x03\xefQ\x89\f\xeeRK\x15\xec{D\x9e\x83Z\xabTa\x8e\xcd\x01\xd0\xcfd\xf9c\x87m\xbe>\x81\xba\x9d2\x1c\a,\x12\xbf\xef\xb8m\v\xdf\x8e\xd5\xf5\x1a\xabD\xf6\xe0\x95\xf4\xfeRb_+\xeb\xf9f\xe8\\\x16\xeb\x87\x8e\x8acn4,\x80Q<\x84\xaep\xf9\xfc\x8e\x9f\xed\x06.a\xd5o\x14\r&L\xbd\xb9g\x82;+n\xd5\xcca\v\x86Z\x872\xc3c:`\xf2\x02\xc2\x92\x841\xe7\xca}\"@6}j\x0e\xb7\xa9\xbc\xf3N\xa3\xf3mbd\xfbS\x80\xe0\x11<\x7f\x84\xbe\xa2\xf9\xf7\xee\xf6\x94x\x9d\xe2{\xc5\x83\xc0M\xbb\xd4Io\r\x1c\xd7<\xc0\x84=`\xf1^Y', 0x0, 0x0) 00:28:36 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000480)=@acquire={0x1ac, 0x17, 0x1, 0x0, 0x0, {{@in=@multicast1}, @in6=@ipv4={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800000000000000], [], @dev}, {@in=@loopback, @in6=@local}, {{@in, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x2}}}, [@tmpl={0x84, 0x5, [{{@in6=@mcast1, 0x0, 0x3c}, 0x0, @in=@multicast1}, {{@in=@remote, 0x0, 0x3c}, 0x0, @in=@broadcast}]}]}, 0x1ac}}, 0x0) 00:28:36 executing program 1: syz_mount_image$reiserfs(&(0x7f0000000180)='reiserf0\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[@ANYBLOB='jdev=.']) 00:28:36 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00004e7000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f}, 0xc, &(0x7f0000000440)={&(0x7f00000001c0)=ANY=[@ANYBLOB="1c00020022000100000000000061960d0100000008fe0c009d0a6be0e6d9fc638f19561d6ceb8a6c9239228215fd206cf204e07953", @ANYRES32=0x0], 0x2}, 0x1, 0x0, 0x0, 0xffffffffffffffff}, 0x0) [ 907.149918][ T2480] block nbd2: Attempted send on invalid socket [ 907.156802][ T2480] print_req_error: I/O error, dev nbd2, sector 2 flags 0 [ 907.171600][ T5697] hfs: can't find a HFS filesystem on dev nbd2 00:28:36 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000480)=@acquire={0x1ac, 0x17, 0x1, 0x0, 0x0, {{@in=@multicast1}, @in6=@ipv4={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x805000000000000], [], @dev}, {@in=@loopback, @in6=@local}, {{@in, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x2}}}, [@tmpl={0x84, 0x5, [{{@in6=@mcast1, 0x0, 0x3c}, 0x0, @in=@multicast1}, {{@in=@remote, 0x0, 0x3c}, 0x0, @in=@broadcast}]}]}, 0x1ac}}, 0x0) 00:28:37 executing program 4: 00:28:37 executing program 2: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(&(0x7f0000000080)=@nbd={'/dev/nbd', 0x0, 0xe0000}, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000240)='hfs\x00\xe6\xa6\xe2\x06t\x96\xb3\v\xf2p\xd5:\x95p\x99\x92\xf2\xc4\x80\x1f\x01\x05\xb8e?\xbfwk\xe4\xe5\xca\x82\xeb\xb1\x04wn*\xf2\xc6\x9d\xc4!\x9e?\x83\x99\x0e\xcc\xa3\x95q.C\xee\x8dIf\xec\xbf\xe8\xb2\t\xedg\x9d\xd9\v\xce\xa3\xa3\xa5\x89F\x03\xefQ\x89\f\xeeRK\x15\xec{D\x9e\x83Z\xabTa\x8e\xcd\x01\xd0\xcfd\xf9c\x87m\xbe>\x81\xba\x9d2\x1c\a,\x12\xbf\xef\xb8m\v\xdf\x8e\xd5\xf5\x1a\xabD\xf6\xe0\x95\xf4\xfeRb_+\xeb\xf9f\xe8\\\x16\xeb\x87\x8e\x8acn4,\x80Q<\x84\xaep\xf9\xfc\x8e\x9f\xed\x06.a\xd5o\x14\r&L\xbd\xb9g\x82;+n\xd5\xcca\v\x86Z\x872\xc3c:`\xf2\x02\xc2\x92\x841\xe7\xca}\"@6}j\x0e\xb7\xa9\xbc\xf3N\xa3\xf3mbd\xfbS\x80\xe0\x11<\x7f\x84\xbe\xa2\xf9\xf7\xee\xf6\x94x\x9d\xe2{\xc5\x83\xc0M\xbb\xd4Io\r\x1c\xd7<\xc0\x84=`\xf1^Y', 0x0, 0x0) 00:28:37 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00004e7000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f}, 0xc, &(0x7f0000000440)={&(0x7f00000001c0)=ANY=[@ANYBLOB="1c00040022000100000000000061960d0100000008fe0c009d0a6be0e6d9fc638f19561d6ceb8a6c9239228215fd206cf204e07953", @ANYRES32=0x0], 0x2}, 0x1, 0x0, 0x0, 0xffffffffffffffff}, 0x0) 00:28:37 executing program 0: syz_mount_image$reiserfs(&(0x7f0000000180)='reiserfp\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[@ANYBLOB='jdev=./file0,jdev=']) 00:28:37 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000480)=@acquire={0x1ac, 0x17, 0x1, 0x0, 0x0, {{@in=@multicast1}, @in6=@ipv4={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x900000000000000], [], @dev}, {@in=@loopback, @in6=@local}, {{@in, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x2}}}, [@tmpl={0x84, 0x5, [{{@in6=@mcast1, 0x0, 0x3c}, 0x0, @in=@multicast1}, {{@in=@remote, 0x0, 0x3c}, 0x0, @in=@broadcast}]}]}, 0x1ac}}, 0x0) 00:28:37 executing program 4: [ 907.462319][ T5733] hfs: can't find a HFS filesystem on dev nbd2 00:28:37 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00004e7000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f}, 0xc, &(0x7f0000000440)={&(0x7f00000001c0)=ANY=[@ANYBLOB="1c00080022000100000000000061960d0100000008fe0c009d0a6be0e6d9fc638f19561d6ceb8a6c9239228215fd206cf204e07953", @ANYRES32=0x0], 0x2}, 0x1, 0x0, 0x0, 0xffffffffffffffff}, 0x0) 00:28:37 executing program 2: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(&(0x7f0000000080)=@nbd={'/dev/nbd', 0x0, 0xe0000}, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000240)='hfs\x00\xe6\xa6\xe2\x06x\x96\xb3\v\xf2p\xd5:\x95p\x99\x92\xf2\xc4\x80\x1f\x01\x05\xb8e?\xbfwk\xe4\xe5\xca\x82\xeb\xb1\x04wn*\xf2\xc6\x9d\xc4!\x9e?\x83\x99\x0e\xcc\xa3\x95q.C\xee\x8dIf\xec\xbf\xe8\xb2\t\xedg\x9d\xd9\v\xce\xa3\xa3\xa5\x89F\x03\xefQ\x89\f\xeeRK\x15\xec{D\x9e\x83Z\xabTa\x8e\xcd\x01\xd0\xcfd\xf9c\x87m\xbe>\x81\xba\x9d2\x1c\a,\x12\xbf\xef\xb8m\v\xdf\x8e\xd5\xf5\x1a\xabD\xf6\xe0\x95\xf4\xfeRb_+\xeb\xf9f\xe8\\\x16\xeb\x87\x8e\x8acn4,\x80Q<\x84\xaep\xf9\xfc\x8e\x9f\xed\x06.a\xd5o\x14\r&L\xbd\xb9g\x82;+n\xd5\xcca\v\x86Z\x872\xc3c:`\xf2\x02\xc2\x92\x841\xe7\xca}\"@6}j\x0e\xb7\xa9\xbc\xf3N\xa3\xf3mbd\xfbS\x80\xe0\x11<\x7f\x84\xbe\xa2\xf9\xf7\xee\xf6\x94x\x9d\xe2{\xc5\x83\xc0M\xbb\xd4Io\r\x1c\xd7<\xc0\x84=`\xf1^Y', 0x0, 0x0) 00:28:37 executing program 1: syz_mount_image$reiserfs(&(0x7f0000000180)='reiserfK\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[@ANYBLOB='jdev=.']) 00:28:37 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000480)=@acquire={0x1ac, 0x17, 0x1, 0x0, 0x0, {{@in=@multicast1}, @in6=@ipv4={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa00000000000000], [], @dev}, {@in=@loopback, @in6=@local}, {{@in, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x2}}}, [@tmpl={0x84, 0x5, [{{@in6=@mcast1, 0x0, 0x3c}, 0x0, @in=@multicast1}, {{@in=@remote, 0x0, 0x3c}, 0x0, @in=@broadcast}]}]}, 0x1ac}}, 0x0) 00:28:37 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00004e7000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f}, 0xc, &(0x7f0000000440)={&(0x7f00000001c0)=ANY=[@ANYBLOB="1c000a0022000100000000000061960d0100000008fe0c009d0a6be0e6d9fc638f19561d6ceb8a6c9239228215fd206cf204e07953", @ANYRES32=0x0], 0x2}, 0x1, 0x0, 0x0, 0xffffffffffffffff}, 0x0) 00:28:37 executing program 4: 00:28:37 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000480)=@acquire={0x1ac, 0x17, 0x1, 0x0, 0x0, {{@in=@multicast1}, @in6=@ipv4={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb00000000000000], [], @dev}, {@in=@loopback, @in6=@local}, {{@in, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x2}}}, [@tmpl={0x84, 0x5, [{{@in6=@mcast1, 0x0, 0x3c}, 0x0, @in=@multicast1}, {{@in=@remote, 0x0, 0x3c}, 0x0, @in=@broadcast}]}]}, 0x1ac}}, 0x0) 00:28:37 executing program 4: [ 907.823883][ T5760] hfs: can't find a HFS filesystem on dev nbd2 00:28:37 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000480)=@acquire={0x1ac, 0x17, 0x1, 0x0, 0x0, {{@in=@multicast1}, @in6=@ipv4={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe00000000000000], [], @dev}, {@in=@loopback, @in6=@local}, {{@in, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x2}}}, [@tmpl={0x84, 0x5, [{{@in6=@mcast1, 0x0, 0x3c}, 0x0, @in=@multicast1}, {{@in=@remote, 0x0, 0x3c}, 0x0, @in=@broadcast}]}]}, 0x1ac}}, 0x0) 00:28:37 executing program 0: syz_mount_image$reiserfs(&(0x7f0000000180)='reiserft\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[@ANYBLOB='jdev=./file0,jdev=']) 00:28:37 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00004e7000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f}, 0xc, &(0x7f0000000440)={&(0x7f00000001c0)=ANY=[@ANYBLOB="1c000e0022000100000000000061960d0100000008fe0c009d0a6be0e6d9fc638f19561d6ceb8a6c9239228215fd206cf204e07953", @ANYRES32=0x0], 0x2}, 0x1, 0x0, 0x0, 0xffffffffffffffff}, 0x0) 00:28:37 executing program 2: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(&(0x7f0000000080)=@nbd={'/dev/nbd', 0x0, 0xe0000}, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000240)='hfs\x00\xe6\xa6\xe2\x06g\x96\xb3\n\xf2p\xd5:\x95p\x99\x92\xf2\xc4\x80\x1f\x01\x05\xb8e?\xbfwk\xe4\xe5\xca\x82\xeb\xb1\x04wn*\xf2\xc6\x9d\xc4!\x9e?\x83\x99\x0e\xcc\xa3\x95q.C\xee\x8dIf\xec\xbf\xe8\xb2\t\xedg\x9d\xd9\v\xce\xa3\xa3\xa5\x89F\x03\xefQ\x89\f\xeeRK\x15\xec{D\x9e\x83Z\xabTa\x8e\xcd\x01\xd0\xcfd\xf9c\x87m\xbe>\x81\xba\x9d2\x1c\a,\x12\xbf\xef\xb8m\v\xdf\x8e\xd5\xf5\x1a\xabD\xf6\xe0\x95\xf4\xfeRb_+\xeb\xf9f\xe8\\\x16\xeb\x87\x8e\x8acn4,\x80Q<\x84\xaep\xf9\xfc\x8e\x9f\xed\x06.a\xd5o\x14\r&L\xbd\xb9g\x82;+n\xd5\xcca\v\x86Z\x872\xc3c:`\xf2\x02\xc2\x92\x841\xe7\xca}\"@6}j\x0e\xb7\xa9\xbc\xf3N\xa3\xf3mbd\xfbS\x80\xe0\x11<\x7f\x84\xbe\xa2\xf9\xf7\xee\xf6\x94x\x9d\xe2{\xc5\x83\xc0M\xbb\xd4Io\r\x1c\xd7<\xc0\x84=`\xf1^Y', 0x0, 0x0) 00:28:37 executing program 4: 00:28:37 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000480)=@acquire={0x1ac, 0x17, 0x1, 0x0, 0x0, {{@in=@multicast1}, @in6=@ipv4={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf00000000000000], [], @dev}, {@in=@loopback, @in6=@local}, {{@in, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x2}}}, [@tmpl={0x84, 0x5, [{{@in6=@mcast1, 0x0, 0x3c}, 0x0, @in=@multicast1}, {{@in=@remote, 0x0, 0x3c}, 0x0, @in=@broadcast}]}]}, 0x1ac}}, 0x0) 00:28:37 executing program 1: syz_mount_image$reiserfs(&(0x7f0000000180)='reiserfX\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[@ANYBLOB='jdev=.']) 00:28:37 executing program 4: 00:28:37 executing program 2: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(&(0x7f0000000080)=@nbd={'/dev/nbd', 0x0, 0xe0000}, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000240)='hfs\x00\xe6\xa6\xe2\x06g\x96\xb3\x10\xf2p\xd5:\x95p\x99\x92\xf2\xc4\x80\x1f\x01\x05\xb8e?\xbfwk\xe4\xe5\xca\x82\xeb\xb1\x04wn*\xf2\xc6\x9d\xc4!\x9e?\x83\x99\x0e\xcc\xa3\x95q.C\xee\x8dIf\xec\xbf\xe8\xb2\t\xedg\x9d\xd9\v\xce\xa3\xa3\xa5\x89F\x03\xefQ\x89\f\xeeRK\x15\xec{D\x9e\x83Z\xabTa\x8e\xcd\x01\xd0\xcfd\xf9c\x87m\xbe>\x81\xba\x9d2\x1c\a,\x12\xbf\xef\xb8m\v\xdf\x8e\xd5\xf5\x1a\xabD\xf6\xe0\x95\xf4\xfeRb_+\xeb\xf9f\xe8\\\x16\xeb\x87\x8e\x8acn4,\x80Q<\x84\xaep\xf9\xfc\x8e\x9f\xed\x06.a\xd5o\x14\r&L\xbd\xb9g\x82;+n\xd5\xcca\v\x86Z\x872\xc3c:`\xf2\x02\xc2\x92\x841\xe7\xca}\"@6}j\x0e\xb7\xa9\xbc\xf3N\xa3\xf3mbd\xfbS\x80\xe0\x11<\x7f\x84\xbe\xa2\xf9\xf7\xee\xf6\x94x\x9d\xe2{\xc5\x83\xc0M\xbb\xd4Io\r\x1c\xd7<\xc0\x84=`\xf1^Y', 0x0, 0x0) 00:28:37 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00004e7000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f}, 0xc, &(0x7f0000000440)={&(0x7f00000001c0)=ANY=[@ANYBLOB="1c00100022000100000000000061960d0100000008fe0c009d0a6be0e6d9fc638f19561d6ceb8a6c9239228215fd206cf204e07953", @ANYRES32=0x0], 0x2}, 0x1, 0x0, 0x0, 0xffffffffffffffff}, 0x0) [ 908.113886][ T5782] hfs: can't find a HFS filesystem on dev nbd2 00:28:38 executing program 4: 00:28:38 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000480)=@acquire={0x1ac, 0x17, 0x1, 0x0, 0x0, {{@in=@multicast1}, @in6=@ipv4={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000000000000], [], @dev}, {@in=@loopback, @in6=@local}, {{@in, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x2}}}, [@tmpl={0x84, 0x5, [{{@in6=@mcast1, 0x0, 0x3c}, 0x0, @in=@multicast1}, {{@in=@remote, 0x0, 0x3c}, 0x0, @in=@broadcast}]}]}, 0x1ac}}, 0x0) 00:28:38 executing program 4: [ 908.343368][ T5804] hfs: can't find a HFS filesystem on dev nbd2 00:28:38 executing program 2: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(&(0x7f0000000080)=@nbd={'/dev/nbd', 0x0, 0xe0000}, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000240)='hfs\x00\xe6\xa6\xe2\x06g\x96\xb3\x12\xf2p\xd5:\x95p\x99\x92\xf2\xc4\x80\x1f\x01\x05\xb8e?\xbfwk\xe4\xe5\xca\x82\xeb\xb1\x04wn*\xf2\xc6\x9d\xc4!\x9e?\x83\x99\x0e\xcc\xa3\x95q.C\xee\x8dIf\xec\xbf\xe8\xb2\t\xedg\x9d\xd9\v\xce\xa3\xa3\xa5\x89F\x03\xefQ\x89\f\xeeRK\x15\xec{D\x9e\x83Z\xabTa\x8e\xcd\x01\xd0\xcfd\xf9c\x87m\xbe>\x81\xba\x9d2\x1c\a,\x12\xbf\xef\xb8m\v\xdf\x8e\xd5\xf5\x1a\xabD\xf6\xe0\x95\xf4\xfeRb_+\xeb\xf9f\xe8\\\x16\xeb\x87\x8e\x8acn4,\x80Q<\x84\xaep\xf9\xfc\x8e\x9f\xed\x06.a\xd5o\x14\r&L\xbd\xb9g\x82;+n\xd5\xcca\v\x86Z\x872\xc3c:`\xf2\x02\xc2\x92\x841\xe7\xca}\"@6}j\x0e\xb7\xa9\xbc\xf3N\xa3\xf3mbd\xfbS\x80\xe0\x11<\x7f\x84\xbe\xa2\xf9\xf7\xee\xf6\x94x\x9d\xe2{\xc5\x83\xc0M\xbb\xd4Io\r\x1c\xd7<\xc0\x84=`\xf1^Y', 0x0, 0x0) 00:28:38 executing program 0: syz_mount_image$reiserfs(&(0x7f0000000180)='reiserfu\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[@ANYBLOB='jdev=./file0,jdev=']) 00:28:38 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000480)=@acquire={0x1ac, 0x17, 0x1, 0x0, 0x0, {{@in=@multicast1}, @in6=@ipv4={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1100000000000000], [], @dev}, {@in=@loopback, @in6=@local}, {{@in, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x2}}}, [@tmpl={0x84, 0x5, [{{@in6=@mcast1, 0x0, 0x3c}, 0x0, @in=@multicast1}, {{@in=@remote, 0x0, 0x3c}, 0x0, @in=@broadcast}]}]}, 0x1ac}}, 0x0) 00:28:38 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00004e7000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f}, 0xc, &(0x7f0000000440)={&(0x7f00000001c0)=ANY=[@ANYBLOB="1c00600022000100000000000061960d0100000008fe0c009d0a6be0e6d9fc638f19561d6ceb8a6c9239228215fd206cf204e07953", @ANYRES32=0x0], 0x2}, 0x1, 0x0, 0x0, 0xffffffffffffffff}, 0x0) 00:28:38 executing program 4: 00:28:38 executing program 1: syz_mount_image$reiserfs(&(0x7f0000000180)='reiserfa\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[@ANYBLOB='jdev=.']) 00:28:38 executing program 4: [ 908.607448][ T5826] hfs: can't find a HFS filesystem on dev nbd2 00:28:38 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00004e7000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f}, 0xc, &(0x7f0000000440)={&(0x7f00000001c0)=ANY=[@ANYBLOB="1c00f00022000100000000000061960d0100000008fe0c009d0a6be0e6d9fc638f19561d6ceb8a6c9239228215fd206cf204e07953", @ANYRES32=0x0], 0x2}, 0x1, 0x0, 0x0, 0xffffffffffffffff}, 0x0) 00:28:38 executing program 2: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(&(0x7f0000000080)=@nbd={'/dev/nbd', 0x0, 0xe0000}, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000240)='hfs\x00\xe6\xa6\xe2\x06g\x96\xb3\x14\xf2p\xd5:\x95p\x99\x92\xf2\xc4\x80\x1f\x01\x05\xb8e?\xbfwk\xe4\xe5\xca\x82\xeb\xb1\x04wn*\xf2\xc6\x9d\xc4!\x9e?\x83\x99\x0e\xcc\xa3\x95q.C\xee\x8dIf\xec\xbf\xe8\xb2\t\xedg\x9d\xd9\v\xce\xa3\xa3\xa5\x89F\x03\xefQ\x89\f\xeeRK\x15\xec{D\x9e\x83Z\xabTa\x8e\xcd\x01\xd0\xcfd\xf9c\x87m\xbe>\x81\xba\x9d2\x1c\a,\x12\xbf\xef\xb8m\v\xdf\x8e\xd5\xf5\x1a\xabD\xf6\xe0\x95\xf4\xfeRb_+\xeb\xf9f\xe8\\\x16\xeb\x87\x8e\x8acn4,\x80Q<\x84\xaep\xf9\xfc\x8e\x9f\xed\x06.a\xd5o\x14\r&L\xbd\xb9g\x82;+n\xd5\xcca\v\x86Z\x872\xc3c:`\xf2\x02\xc2\x92\x841\xe7\xca}\"@6}j\x0e\xb7\xa9\xbc\xf3N\xa3\xf3mbd\xfbS\x80\xe0\x11<\x7f\x84\xbe\xa2\xf9\xf7\xee\xf6\x94x\x9d\xe2{\xc5\x83\xc0M\xbb\xd4Io\r\x1c\xd7<\xc0\x84=`\xf1^Y', 0x0, 0x0) 00:28:38 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000480)=@acquire={0x1ac, 0x17, 0x1, 0x0, 0x0, {{@in=@multicast1}, @in6=@ipv4={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1200000000000000], [], @dev}, {@in=@loopback, @in6=@local}, {{@in, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x2}}}, [@tmpl={0x84, 0x5, [{{@in6=@mcast1, 0x0, 0x3c}, 0x0, @in=@multicast1}, {{@in=@remote, 0x0, 0x3c}, 0x0, @in=@broadcast}]}]}, 0x1ac}}, 0x0) [ 908.819800][ T5844] hfs: can't find a HFS filesystem on dev nbd2 00:28:38 executing program 4: 00:28:38 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000480)=@acquire={0x1ac, 0x17, 0x1, 0x0, 0x0, {{@in=@multicast1}, @in6=@ipv4={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1300000000000000], [], @dev}, {@in=@loopback, @in6=@local}, {{@in, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x2}}}, [@tmpl={0x84, 0x5, [{{@in6=@mcast1, 0x0, 0x3c}, 0x0, @in=@multicast1}, {{@in=@remote, 0x0, 0x3c}, 0x0, @in=@broadcast}]}]}, 0x1ac}}, 0x0) 00:28:38 executing program 2: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(&(0x7f0000000080)=@nbd={'/dev/nbd', 0x0, 0xe0000}, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000240)='hfs\x00\xe6\xa6\xe2\x06g\x96\xb3\v\xf1p\xd5:\x95p\x99\x92\xf2\xc4\x80\x1f\x01\x05\xb8e?\xbfwk\xe4\xe5\xca\x82\xeb\xb1\x04wn*\xf2\xc6\x9d\xc4!\x9e?\x83\x99\x0e\xcc\xa3\x95q.C\xee\x8dIf\xec\xbf\xe8\xb2\t\xedg\x9d\xd9\v\xce\xa3\xa3\xa5\x89F\x03\xefQ\x89\f\xeeRK\x15\xec{D\x9e\x83Z\xabTa\x8e\xcd\x01\xd0\xcfd\xf9c\x87m\xbe>\x81\xba\x9d2\x1c\a,\x12\xbf\xef\xb8m\v\xdf\x8e\xd5\xf5\x1a\xabD\xf6\xe0\x95\xf4\xfeRb_+\xeb\xf9f\xe8\\\x16\xeb\x87\x8e\x8acn4,\x80Q<\x84\xaep\xf9\xfc\x8e\x9f\xed\x06.a\xd5o\x14\r&L\xbd\xb9g\x82;+n\xd5\xcca\v\x86Z\x872\xc3c:`\xf2\x02\xc2\x92\x841\xe7\xca}\"@6}j\x0e\xb7\xa9\xbc\xf3N\xa3\xf3mbd\xfbS\x80\xe0\x11<\x7f\x84\xbe\xa2\xf9\xf7\xee\xf6\x94x\x9d\xe2{\xc5\x83\xc0M\xbb\xd4Io\r\x1c\xd7<\xc0\x84=`\xf1^Y', 0x0, 0x0) [ 909.037361][ T5860] hfs: can't find a HFS filesystem on dev nbd2 00:28:38 executing program 0: syz_mount_image$reiserfs(&(0x7f0000000180)='reiserfx\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[@ANYBLOB='jdev=./file0,jdev=']) 00:28:38 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00004e7000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f}, 0xc, &(0x7f0000000440)={&(0x7f00000001c0)=ANY=[@ANYBLOB="1c00000a22000100000000000061960d0100000008fe0c009d0a6be0e6d9fc638f19561d6ceb8a6c9239228215fd206cf204e07953", @ANYRES32=0x0], 0x2}, 0x1, 0x0, 0x0, 0xffffffffffffffff}, 0x0) 00:28:38 executing program 4: 00:28:38 executing program 1: syz_mount_image$reiserfs(&(0x7f0000000180)='reiserfb\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[@ANYBLOB='jdev=.']) 00:28:38 executing program 2: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(&(0x7f0000000080)=@nbd={'/dev/nbd', 0x0, 0xe0000}, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000240)='hfs\x00\xe6\xa6\xe2\x06g\x96\xb3\v\xf3p\xd5:\x95p\x99\x92\xf2\xc4\x80\x1f\x01\x05\xb8e?\xbfwk\xe4\xe5\xca\x82\xeb\xb1\x04wn*\xf2\xc6\x9d\xc4!\x9e?\x83\x99\x0e\xcc\xa3\x95q.C\xee\x8dIf\xec\xbf\xe8\xb2\t\xedg\x9d\xd9\v\xce\xa3\xa3\xa5\x89F\x03\xefQ\x89\f\xeeRK\x15\xec{D\x9e\x83Z\xabTa\x8e\xcd\x01\xd0\xcfd\xf9c\x87m\xbe>\x81\xba\x9d2\x1c\a,\x12\xbf\xef\xb8m\v\xdf\x8e\xd5\xf5\x1a\xabD\xf6\xe0\x95\xf4\xfeRb_+\xeb\xf9f\xe8\\\x16\xeb\x87\x8e\x8acn4,\x80Q<\x84\xaep\xf9\xfc\x8e\x9f\xed\x06.a\xd5o\x14\r&L\xbd\xb9g\x82;+n\xd5\xcca\v\x86Z\x872\xc3c:`\xf2\x02\xc2\x92\x841\xe7\xca}\"@6}j\x0e\xb7\xa9\xbc\xf3N\xa3\xf3mbd\xfbS\x80\xe0\x11<\x7f\x84\xbe\xa2\xf9\xf7\xee\xf6\x94x\x9d\xe2{\xc5\x83\xc0M\xbb\xd4Io\r\x1c\xd7<\xc0\x84=`\xf1^Y', 0x0, 0x0) 00:28:38 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000480)=@acquire={0x1ac, 0x17, 0x1, 0x0, 0x0, {{@in=@multicast1}, @in6=@ipv4={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000000000000], [], @dev}, {@in=@loopback, @in6=@local}, {{@in, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x2}}}, [@tmpl={0x84, 0x5, [{{@in6=@mcast1, 0x0, 0x3c}, 0x0, @in=@multicast1}, {{@in=@remote, 0x0, 0x3c}, 0x0, @in=@broadcast}]}]}, 0x1ac}}, 0x0) 00:28:38 executing program 4: [ 909.224994][ T5877] hfs: can't find a HFS filesystem on dev nbd2 00:28:39 executing program 2: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(&(0x7f0000000080)=@nbd={'/dev/nbd', 0x0, 0xe0000}, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000240)='hfs\x00\xe6\xa6\xe2\x06g\x96\xb3\v\xf2#\xd5:\x95p\x99\x92\xf2\xc4\x80\x1f\x01\x05\xb8e?\xbfwk\xe4\xe5\xca\x82\xeb\xb1\x04wn*\xf2\xc6\x9d\xc4!\x9e?\x83\x99\x0e\xcc\xa3\x95q.C\xee\x8dIf\xec\xbf\xe8\xb2\t\xedg\x9d\xd9\v\xce\xa3\xa3\xa5\x89F\x03\xefQ\x89\f\xeeRK\x15\xec{D\x9e\x83Z\xabTa\x8e\xcd\x01\xd0\xcfd\xf9c\x87m\xbe>\x81\xba\x9d2\x1c\a,\x12\xbf\xef\xb8m\v\xdf\x8e\xd5\xf5\x1a\xabD\xf6\xe0\x95\xf4\xfeRb_+\xeb\xf9f\xe8\\\x16\xeb\x87\x8e\x8acn4,\x80Q<\x84\xaep\xf9\xfc\x8e\x9f\xed\x06.a\xd5o\x14\r&L\xbd\xb9g\x82;+n\xd5\xcca\v\x86Z\x872\xc3c:`\xf2\x02\xc2\x92\x841\xe7\xca}\"@6}j\x0e\xb7\xa9\xbc\xf3N\xa3\xf3mbd\xfbS\x80\xe0\x11<\x7f\x84\xbe\xa2\xf9\xf7\xee\xf6\x94x\x9d\xe2{\xc5\x83\xc0M\xbb\xd4Io\r\x1c\xd7<\xc0\x84=`\xf1^Y', 0x0, 0x0) 00:28:39 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000480)=@acquire={0x1ac, 0x17, 0x1, 0x0, 0x0, {{@in=@multicast1}, @in6=@ipv4={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6000000000000000], [], @dev}, {@in=@loopback, @in6=@local}, {{@in, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x2}}}, [@tmpl={0x84, 0x5, [{{@in6=@mcast1, 0x0, 0x3c}, 0x0, @in=@multicast1}, {{@in=@remote, 0x0, 0x3c}, 0x0, @in=@broadcast}]}]}, 0x1ac}}, 0x0) 00:28:39 executing program 4: mremap(&(0x7f0000001000/0xc00000)=nil, 0xc00000, 0x2000, 0x0, &(0x7f0000c87000/0x2000)=nil) mmap(&(0x7f00008da000/0x1000)=nil, 0x1000, 0x0, 0xb4972, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000340)='./bus\x00', 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) fcntl$setstatus(r0, 0x4, 0x44000) io_setup(0x4ed4, &(0x7f0000000100)=0x0) ftruncate(0xffffffffffffffff, 0x0) io_submit(r2, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r0, &(0x7f0000000000), 0x377140be6b5ef710}]) 00:28:39 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00004e7000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f}, 0xc, &(0x7f0000000440)={&(0x7f00000001c0)=ANY=[@ANYBLOB="1c00b00a22000100000000000061960d0100000008fe0c009d0a6be0e6d9fc638f19561d6ceb8a6c9239228215fd206cf204e07953", @ANYRES32=0x0], 0x2}, 0x1, 0x0, 0x0, 0xffffffffffffffff}, 0x0) 00:28:39 executing program 0: syz_mount_image$reiserfs(&(0x7f0000000180)='reiserfy\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[@ANYBLOB='jdev=./file0,jdev=']) [ 909.444717][ T2481] nbd_handle_cmd: 8 callbacks suppressed [ 909.444732][ T2481] block nbd2: Attempted send on invalid socket [ 909.462665][ T2481] print_req_error: 8 callbacks suppressed [ 909.462676][ T2481] print_req_error: I/O error, dev nbd2, sector 2 flags 0 [ 909.477308][ T5899] hfs: can't find a HFS filesystem on dev nbd2 00:28:39 executing program 1: syz_mount_image$reiserfs(&(0x7f0000000180)='reiserfc\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[@ANYBLOB='jdev=.']) 00:28:39 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000480)=@acquire={0x1ac, 0x17, 0x1, 0x0, 0x0, {{@in=@multicast1}, @in6=@ipv4={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9effffff00000000], [], @dev}, {@in=@loopback, @in6=@local}, {{@in, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x2}}}, [@tmpl={0x84, 0x5, [{{@in6=@mcast1, 0x0, 0x3c}, 0x0, @in=@multicast1}, {{@in=@remote, 0x0, 0x3c}, 0x0, @in=@broadcast}]}]}, 0x1ac}}, 0x0) 00:28:39 executing program 2: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(&(0x7f0000000080)=@nbd={'/dev/nbd', 0x0, 0xe0000}, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000240)='hfs\x00\xe6\xa6\xe2\x06g\x96\xb3\v\xf2%\xd5:\x95p\x99\x92\xf2\xc4\x80\x1f\x01\x05\xb8e?\xbfwk\xe4\xe5\xca\x82\xeb\xb1\x04wn*\xf2\xc6\x9d\xc4!\x9e?\x83\x99\x0e\xcc\xa3\x95q.C\xee\x8dIf\xec\xbf\xe8\xb2\t\xedg\x9d\xd9\v\xce\xa3\xa3\xa5\x89F\x03\xefQ\x89\f\xeeRK\x15\xec{D\x9e\x83Z\xabTa\x8e\xcd\x01\xd0\xcfd\xf9c\x87m\xbe>\x81\xba\x9d2\x1c\a,\x12\xbf\xef\xb8m\v\xdf\x8e\xd5\xf5\x1a\xabD\xf6\xe0\x95\xf4\xfeRb_+\xeb\xf9f\xe8\\\x16\xeb\x87\x8e\x8acn4,\x80Q<\x84\xaep\xf9\xfc\x8e\x9f\xed\x06.a\xd5o\x14\r&L\xbd\xb9g\x82;+n\xd5\xcca\v\x86Z\x872\xc3c:`\xf2\x02\xc2\x92\x841\xe7\xca}\"@6}j\x0e\xb7\xa9\xbc\xf3N\xa3\xf3mbd\xfbS\x80\xe0\x11<\x7f\x84\xbe\xa2\xf9\xf7\xee\xf6\x94x\x9d\xe2{\xc5\x83\xc0M\xbb\xd4Io\r\x1c\xd7<\xc0\x84=`\xf1^Y', 0x0, 0x0) 00:28:39 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00004e7000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f}, 0xc, &(0x7f0000000440)={&(0x7f00000001c0)=ANY=[@ANYBLOB="1c00000e22000100000000000061960d0100000008fe0c009d0a6be0e6d9fc638f19561d6ceb8a6c9239228215fd206cf204e07953", @ANYRES32=0x0], 0x2}, 0x1, 0x0, 0x0, 0xffffffffffffffff}, 0x0) 00:28:39 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000480)=@acquire={0x1ac, 0x17, 0x1, 0x0, 0x0, {{@in=@multicast1}, @in6=@ipv4={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf0ffffff00000000], [], @dev}, {@in=@loopback, @in6=@local}, {{@in, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x2}}}, [@tmpl={0x84, 0x5, [{{@in6=@mcast1, 0x0, 0x3c}, 0x0, @in=@multicast1}, {{@in=@remote, 0x0, 0x3c}, 0x0, @in=@broadcast}]}]}, 0x1ac}}, 0x0) 00:28:39 executing program 4: r0 = socket$key(0xf, 0x3, 0x2) r1 = socket$caif_seqpacket(0x25, 0x5, 0x0) dup3(r0, r1, 0x0) [ 909.754980][ T2480] block nbd2: Attempted send on invalid socket [ 909.761321][ T2480] print_req_error: I/O error, dev nbd2, sector 2 flags 0 [ 909.773052][ T5930] hfs: can't find a HFS filesystem on dev nbd2 00:28:39 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000480)=@acquire={0x1ac, 0x17, 0x1, 0x0, 0x0, {{@in=@multicast1}, @in6=@ipv4={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfcffffff00000000], [], @dev}, {@in=@loopback, @in6=@local}, {{@in, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x2}}}, [@tmpl={0x84, 0x5, [{{@in6=@mcast1, 0x0, 0x3c}, 0x0, @in=@multicast1}, {{@in=@remote, 0x0, 0x3c}, 0x0, @in=@broadcast}]}]}, 0x1ac}}, 0x0) 00:28:39 executing program 0: syz_mount_image$reiserfs(&(0x7f0000000180)='reiserfz\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[@ANYBLOB='jdev=./file0,jdev=']) 00:28:39 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00004e7000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f}, 0xc, &(0x7f0000000440)={&(0x7f00000001c0)=ANY=[@ANYBLOB="1c00006022000100000000000061960d0100000008fe0c009d0a6be0e6d9fc638f19561d6ceb8a6c9239228215fd206cf204e07953", @ANYRES32=0x0], 0x2}, 0x1, 0x0, 0x0, 0xffffffffffffffff}, 0x0) 00:28:39 executing program 2: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(&(0x7f0000000080)=@nbd={'/dev/nbd', 0x0, 0xe0000}, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000240)='hfs\x00\xe6\xa6\xe2\x06g\x96\xb3\v\xf2*\xd5:\x95p\x99\x92\xf2\xc4\x80\x1f\x01\x05\xb8e?\xbfwk\xe4\xe5\xca\x82\xeb\xb1\x04wn*\xf2\xc6\x9d\xc4!\x9e?\x83\x99\x0e\xcc\xa3\x95q.C\xee\x8dIf\xec\xbf\xe8\xb2\t\xedg\x9d\xd9\v\xce\xa3\xa3\xa5\x89F\x03\xefQ\x89\f\xeeRK\x15\xec{D\x9e\x83Z\xabTa\x8e\xcd\x01\xd0\xcfd\xf9c\x87m\xbe>\x81\xba\x9d2\x1c\a,\x12\xbf\xef\xb8m\v\xdf\x8e\xd5\xf5\x1a\xabD\xf6\xe0\x95\xf4\xfeRb_+\xeb\xf9f\xe8\\\x16\xeb\x87\x8e\x8acn4,\x80Q<\x84\xaep\xf9\xfc\x8e\x9f\xed\x06.a\xd5o\x14\r&L\xbd\xb9g\x82;+n\xd5\xcca\v\x86Z\x872\xc3c:`\xf2\x02\xc2\x92\x841\xe7\xca}\"@6}j\x0e\xb7\xa9\xbc\xf3N\xa3\xf3mbd\xfbS\x80\xe0\x11<\x7f\x84\xbe\xa2\xf9\xf7\xee\xf6\x94x\x9d\xe2{\xc5\x83\xc0M\xbb\xd4Io\r\x1c\xd7<\xc0\x84=`\xf1^Y', 0x0, 0x0) 00:28:39 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000480)=@acquire={0x1ac, 0x17, 0x1, 0x0, 0x0, {{@in=@multicast1}, @in6=@ipv4={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffff7f00000000], [], @dev}, {@in=@loopback, @in6=@local}, {{@in, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x2}}}, [@tmpl={0x84, 0x5, [{{@in6=@mcast1, 0x0, 0x3c}, 0x0, @in=@multicast1}, {{@in=@remote, 0x0, 0x3c}, 0x0, @in=@broadcast}]}]}, 0x1ac}}, 0x0) 00:28:39 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000500)='/dev/ptmx\x00', 0x0, 0x0) read(r0, &(0x7f0000000040)=""/11, 0xb) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000200)) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$EVIOCSKEYCODE_V2(r1, 0x40284504, 0x0) [ 910.064137][ T2480] block nbd2: Attempted send on invalid socket [ 910.070397][ T2480] print_req_error: I/O error, dev nbd2, sector 2 flags 0 [ 910.081474][ T5954] hfs: can't find a HFS filesystem on dev nbd2 00:28:39 executing program 1: syz_mount_image$reiserfs(&(0x7f0000000180)='reiserfd\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[@ANYBLOB='jdev=.']) 00:28:39 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000480)=@acquire={0x1ac, 0x17, 0x1, 0x0, 0x0, {{@in=@multicast1}, @in6=@ipv4={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff00000000], [], @dev}, {@in=@loopback, @in6=@local}, {{@in, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x2}}}, [@tmpl={0x84, 0x5, [{{@in6=@mcast1, 0x0, 0x3c}, 0x0, @in=@multicast1}, {{@in=@remote, 0x0, 0x3c}, 0x0, @in=@broadcast}]}]}, 0x1ac}}, 0x0) 00:28:39 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00004e7000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f}, 0xc, &(0x7f0000000440)={&(0x7f00000001c0)=ANY=[@ANYBLOB="1c000ab022000100000000000061960d0100000008fe0c009d0a6be0e6d9fc638f19561d6ceb8a6c9239228215fd206cf204e07953", @ANYRES32=0x0], 0x2}, 0x1, 0x0, 0x0, 0xffffffffffffffff}, 0x0) 00:28:39 executing program 4: openat$rtc(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rtc0\x00', 0x0, 0x0) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x8}, &(0x7f0000000200), 0x0) 00:28:39 executing program 2: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(&(0x7f0000000080)=@nbd={'/dev/nbd', 0x0, 0xe0000}, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000240)='hfs\x00\xe6\xa6\xe2\x06g\x96\xb3\v\xf2+\xd5:\x95p\x99\x92\xf2\xc4\x80\x1f\x01\x05\xb8e?\xbfwk\xe4\xe5\xca\x82\xeb\xb1\x04wn*\xf2\xc6\x9d\xc4!\x9e?\x83\x99\x0e\xcc\xa3\x95q.C\xee\x8dIf\xec\xbf\xe8\xb2\t\xedg\x9d\xd9\v\xce\xa3\xa3\xa5\x89F\x03\xefQ\x89\f\xeeRK\x15\xec{D\x9e\x83Z\xabTa\x8e\xcd\x01\xd0\xcfd\xf9c\x87m\xbe>\x81\xba\x9d2\x1c\a,\x12\xbf\xef\xb8m\v\xdf\x8e\xd5\xf5\x1a\xabD\xf6\xe0\x95\xf4\xfeRb_+\xeb\xf9f\xe8\\\x16\xeb\x87\x8e\x8acn4,\x80Q<\x84\xaep\xf9\xfc\x8e\x9f\xed\x06.a\xd5o\x14\r&L\xbd\xb9g\x82;+n\xd5\xcca\v\x86Z\x872\xc3c:`\xf2\x02\xc2\x92\x841\xe7\xca}\"@6}j\x0e\xb7\xa9\xbc\xf3N\xa3\xf3mbd\xfbS\x80\xe0\x11<\x7f\x84\xbe\xa2\xf9\xf7\xee\xf6\x94x\x9d\xe2{\xc5\x83\xc0M\xbb\xd4Io\r\x1c\xd7<\xc0\x84=`\xf1^Y', 0x0, 0x0) 00:28:40 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000480)=@acquire={0x1ac, 0x17, 0x1, 0x0, 0x0, {{@in=@multicast1}, @in6=@ipv4={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffff000], [], @dev}, {@in=@loopback, @in6=@local}, {{@in, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x2}}}, [@tmpl={0x84, 0x5, [{{@in6=@mcast1, 0x0, 0x3c}, 0x0, @in=@multicast1}, {{@in=@remote, 0x0, 0x3c}, 0x0, @in=@broadcast}]}]}, 0x1ac}}, 0x0) 00:28:40 executing program 0: syz_mount_image$reiserfs(&(0x7f0000000180)='reiserf\x86\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[@ANYBLOB='jdev=./file0,jdev=']) 00:28:40 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00004e7000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f}, 0xc, &(0x7f0000000440)={&(0x7f00000001c0)=ANY=[@ANYBLOB="1c0000f022000100000000000061960d0100000008fe0c009d0a6be0e6d9fc638f19561d6ceb8a6c9239228215fd206cf204e07953", @ANYRES32=0x0], 0x2}, 0x1, 0x0, 0x0, 0xffffffffffffffff}, 0x0) [ 910.334289][ T2481] block nbd2: Attempted send on invalid socket [ 910.340607][ T2481] print_req_error: I/O error, dev nbd2, sector 2 flags 0 [ 910.355276][ T5986] hfs: can't find a HFS filesystem on dev nbd2 00:28:40 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000480)=@acquire={0x1ac, 0x17, 0x1, 0x0, 0x0, {{@in=@multicast1}, @in6=@ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x2}}, {@in=@loopback, @in6=@local}, {{@in, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x2}}}, [@tmpl={0x84, 0x5, [{{@in6=@mcast1, 0x0, 0x3c}, 0x0, @in=@multicast1}, {{@in=@remote, 0x0, 0x3c}, 0x0, @in=@broadcast}]}]}, 0x1ac}}, 0x0) 00:28:40 executing program 4: r0 = syz_open_dev$sndpcmc(&(0x7f0000000380)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) ioctl(r0, 0xc1004110, 0x0) 00:28:40 executing program 2: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(&(0x7f0000000080)=@nbd={'/dev/nbd', 0x0, 0xe0000}, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000240)='hfs\x00\xe6\xa6\xe2\x06g\x96\xb3\v\xf2-\xd5:\x95p\x99\x92\xf2\xc4\x80\x1f\x01\x05\xb8e?\xbfwk\xe4\xe5\xca\x82\xeb\xb1\x04wn*\xf2\xc6\x9d\xc4!\x9e?\x83\x99\x0e\xcc\xa3\x95q.C\xee\x8dIf\xec\xbf\xe8\xb2\t\xedg\x9d\xd9\v\xce\xa3\xa3\xa5\x89F\x03\xefQ\x89\f\xeeRK\x15\xec{D\x9e\x83Z\xabTa\x8e\xcd\x01\xd0\xcfd\xf9c\x87m\xbe>\x81\xba\x9d2\x1c\a,\x12\xbf\xef\xb8m\v\xdf\x8e\xd5\xf5\x1a\xabD\xf6\xe0\x95\xf4\xfeRb_+\xeb\xf9f\xe8\\\x16\xeb\x87\x8e\x8acn4,\x80Q<\x84\xaep\xf9\xfc\x8e\x9f\xed\x06.a\xd5o\x14\r&L\xbd\xb9g\x82;+n\xd5\xcca\v\x86Z\x872\xc3c:`\xf2\x02\xc2\x92\x841\xe7\xca}\"@6}j\x0e\xb7\xa9\xbc\xf3N\xa3\xf3mbd\xfbS\x80\xe0\x11<\x7f\x84\xbe\xa2\xf9\xf7\xee\xf6\x94x\x9d\xe2{\xc5\x83\xc0M\xbb\xd4Io\r\x1c\xd7<\xc0\x84=`\xf1^Y', 0x0, 0x0) 00:28:40 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00004e7000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f}, 0xc, &(0x7f0000000440)={&(0x7f00000001c0)=ANY=[@ANYBLOB="1c00000222000100000000000061960d0100000008fe0c009d0a6be0e6d9fc638f19561d6ceb8a6c9239228215fd206cf204e07953", @ANYRES32=0x0], 0x2}, 0x1, 0x0, 0x0, 0xffffffffffffffff}, 0x0) 00:28:40 executing program 1: syz_mount_image$reiserfs(&(0x7f0000000180)='reiserfh\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[@ANYBLOB='jdev=.']) 00:28:40 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000480)=@acquire={0x1ac, 0x17, 0x1, 0x0, 0x0, {{@in=@multicast1}, @in6=@ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x3}}, {@in=@loopback, @in6=@local}, {{@in, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x2}}}, [@tmpl={0x84, 0x5, [{{@in6=@mcast1, 0x0, 0x3c}, 0x0, @in=@multicast1}, {{@in=@remote, 0x0, 0x3c}, 0x0, @in=@broadcast}]}]}, 0x1ac}}, 0x0) [ 910.667678][ T2480] block nbd2: Attempted send on invalid socket [ 910.673999][ T2480] print_req_error: I/O error, dev nbd2, sector 2 flags 0 [ 910.681545][ T6011] hfs: can't find a HFS filesystem on dev nbd2 00:28:40 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000480)=@acquire={0x1ac, 0x17, 0x1, 0x0, 0x0, {{@in=@multicast1}, @in6=@ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x4}}, {@in=@loopback, @in6=@local}, {{@in, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x2}}}, [@tmpl={0x84, 0x5, [{{@in6=@mcast1, 0x0, 0x3c}, 0x0, @in=@multicast1}, {{@in=@remote, 0x0, 0x3c}, 0x0, @in=@broadcast}]}]}, 0x1ac}}, 0x0) 00:28:40 executing program 2: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(&(0x7f0000000080)=@nbd={'/dev/nbd', 0x0, 0xe0000}, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000240)='hfs\x00\xe6\xa6\xe2\x06g\x96\xb3\v\xf2.\xd5:\x95p\x99\x92\xf2\xc4\x80\x1f\x01\x05\xb8e?\xbfwk\xe4\xe5\xca\x82\xeb\xb1\x04wn*\xf2\xc6\x9d\xc4!\x9e?\x83\x99\x0e\xcc\xa3\x95q.C\xee\x8dIf\xec\xbf\xe8\xb2\t\xedg\x9d\xd9\v\xce\xa3\xa3\xa5\x89F\x03\xefQ\x89\f\xeeRK\x15\xec{D\x9e\x83Z\xabTa\x8e\xcd\x01\xd0\xcfd\xf9c\x87m\xbe>\x81\xba\x9d2\x1c\a,\x12\xbf\xef\xb8m\v\xdf\x8e\xd5\xf5\x1a\xabD\xf6\xe0\x95\xf4\xfeRb_+\xeb\xf9f\xe8\\\x16\xeb\x87\x8e\x8acn4,\x80Q<\x84\xaep\xf9\xfc\x8e\x9f\xed\x06.a\xd5o\x14\r&L\xbd\xb9g\x82;+n\xd5\xcca\v\x86Z\x872\xc3c:`\xf2\x02\xc2\x92\x841\xe7\xca}\"@6}j\x0e\xb7\xa9\xbc\xf3N\xa3\xf3mbd\xfbS\x80\xe0\x11<\x7f\x84\xbe\xa2\xf9\xf7\xee\xf6\x94x\x9d\xe2{\xc5\x83\xc0M\xbb\xd4Io\r\x1c\xd7<\xc0\x84=`\xf1^Y', 0x0, 0x0) 00:28:40 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000480)=@acquire={0x1ac, 0x17, 0x1, 0x0, 0x0, {{@in=@multicast1}, @in6=@ipv4={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8050000], [], @dev}, {@in=@loopback, @in6=@local}, {{@in, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x2}}}, [@tmpl={0x84, 0x5, [{{@in6=@mcast1, 0x0, 0x3c}, 0x0, @in=@multicast1}, {{@in=@remote, 0x0, 0x3c}, 0x0, @in=@broadcast}]}]}, 0x1ac}}, 0x0) 00:28:40 executing program 0: syz_mount_image$reiserfs(&(0x7f0000000180)='reiserfs\x02', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[@ANYBLOB='jdev=./file0,jdev=']) 00:28:40 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00004e7000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f}, 0xc, &(0x7f0000000440)={&(0x7f00000001c0)=ANY=[@ANYBLOB="1c00000422000100000000000061960d0100000008fe0c009d0a6be0e6d9fc638f19561d6ceb8a6c9239228215fd206cf204e07953", @ANYRES32=0x0], 0x2}, 0x1, 0x0, 0x0, 0xffffffffffffffff}, 0x0) [ 910.908639][ T2481] block nbd2: Attempted send on invalid socket [ 910.915352][ T2481] print_req_error: I/O error, dev nbd2, sector 2 flags 0 [ 910.923722][ T6033] hfs: can't find a HFS filesystem on dev nbd2 00:28:40 executing program 1: syz_mount_image$reiserfs(&(0x7f0000000180)='reiserfi\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[@ANYBLOB='jdev=.']) 00:28:40 executing program 2: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(&(0x7f0000000080)=@nbd={'/dev/nbd', 0x0, 0xe0000}, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000240)='hfs\x00\xe6\xa6\xe2\x06g\x96\xb3\v\xf20\xd5:\x95p\x99\x92\xf2\xc4\x80\x1f\x01\x05\xb8e?\xbfwk\xe4\xe5\xca\x82\xeb\xb1\x04wn*\xf2\xc6\x9d\xc4!\x9e?\x83\x99\x0e\xcc\xa3\x95q.C\xee\x8dIf\xec\xbf\xe8\xb2\t\xedg\x9d\xd9\v\xce\xa3\xa3\xa5\x89F\x03\xefQ\x89\f\xeeRK\x15\xec{D\x9e\x83Z\xabTa\x8e\xcd\x01\xd0\xcfd\xf9c\x87m\xbe>\x81\xba\x9d2\x1c\a,\x12\xbf\xef\xb8m\v\xdf\x8e\xd5\xf5\x1a\xabD\xf6\xe0\x95\xf4\xfeRb_+\xeb\xf9f\xe8\\\x16\xeb\x87\x8e\x8acn4,\x80Q<\x84\xaep\xf9\xfc\x8e\x9f\xed\x06.a\xd5o\x14\r&L\xbd\xb9g\x82;+n\xd5\xcca\v\x86Z\x872\xc3c:`\xf2\x02\xc2\x92\x841\xe7\xca}\"@6}j\x0e\xb7\xa9\xbc\xf3N\xa3\xf3mbd\xfbS\x80\xe0\x11<\x7f\x84\xbe\xa2\xf9\xf7\xee\xf6\x94x\x9d\xe2{\xc5\x83\xc0M\xbb\xd4Io\r\x1c\xd7<\xc0\x84=`\xf1^Y', 0x0, 0x0) 00:28:40 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000180)='./control\x00', 0x0) get_thread_area(0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x3) write$binfmt_script(r0, &(0x7f0000000bc0)=ANY=[@ANYBLOB="2321202e2f66696c6530202357994f66e76f4d0fe2208456ebfa69074cb94144c95c4375644bd1747e34c127d80575d10a599f851dc7ad26f3fa377c0a53cc7be2512b7493bf864ecf3f13e46032dbbf3af349b06321cec7a0652f4a5768256cd01a2d3d52de67dc459409a1e50ca51334791c8690646f7a1962ccefc0592a163bacf13da16978ca48eb3784c5baa40700ebfddde7e115f9388051297af49e38e0e3210d232e108a7e9b69c2e56676484906d975d537d128607c901050484e2bdb0d042a40c8ff8f4727cde00677ea73dac796f06f6f7ef7b3406723e7da9fb469c4ce44faff2888c779c000000000000000000000dc4fd7f68b303f980ed08fb24c8052b0626c8b3733eeee64a90f35fd7d88f958406cb5a8ed3b20b7d1278e15c1e1012befbc45a45f203503128d3a99b80bc2c744ae4b8509ca0149b48dc3e11c2d5db4"], 0x145) close(r0) execve(&(0x7f0000000180)='./file0\x00', &(0x7f0000000140), &(0x7f0000000140)) r1 = open(&(0x7f0000000000)='./control\x00', 0x80, 0x10) statfs(&(0x7f0000000380)='./control\x00', &(0x7f00000003c0)=""/20) write$P9_RWALK(r0, &(0x7f0000000400)=ANY=[@ANYBLOB="300000006f0100030001030000000400000000000000100000000003000002000000000300000000000000e646f1c5592139cf131e2bf572fa9728dbfac0390865410f3fa1f25743c497e12cb352eac4046b4500f95cfdfb4cf22a3be5c564a47654334c01d5732d382e27bbccd9b903000000c404000000d32dbd21f3ae581d32e69ef9327f7b487d1b4f4502838c08136678bd90733173ab78d6fc264b373611f15c439384"], 0xa6) getsockopt$inet_sctp6_SCTP_RTOINFO(r1, 0x84, 0x0, &(0x7f0000000080)={0x0, 0x200, 0x0, 0xffffffff}, &(0x7f0000000100)=0x10) 00:28:40 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000480)=@acquire={0x1ac, 0x17, 0x1, 0x0, 0x0, {{@in=@multicast1}, @in6=@ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x5}}, {@in=@loopback, @in6=@local}, {{@in, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x2}}}, [@tmpl={0x84, 0x5, [{{@in6=@mcast1, 0x0, 0x3c}, 0x0, @in=@multicast1}, {{@in=@remote, 0x0, 0x3c}, 0x0, @in=@broadcast}]}]}, 0x1ac}}, 0x0) [ 911.106366][ T2481] block nbd2: Attempted send on invalid socket [ 911.112985][ T2481] print_req_error: I/O error, dev nbd2, sector 2 flags 0 [ 911.121634][ T6056] hfs: can't find a HFS filesystem on dev nbd2 00:28:40 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00004e7000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f}, 0xc, &(0x7f0000000440)={&(0x7f00000001c0)=ANY=[@ANYBLOB="1c00000822000100000000000061960d0100000008fe0c009d0a6be0e6d9fc638f19561d6ceb8a6c9239228215fd206cf204e07953", @ANYRES32=0x0], 0x2}, 0x1, 0x0, 0x0, 0xffffffffffffffff}, 0x0) 00:28:40 executing program 2: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(&(0x7f0000000080)=@nbd={'/dev/nbd', 0x0, 0xe0000}, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000240)='hfs\x00\xe6\xa6\xe2\x06g\x96\xb3\v\xf2X\xd5:\x95p\x99\x92\xf2\xc4\x80\x1f\x01\x05\xb8e?\xbfwk\xe4\xe5\xca\x82\xeb\xb1\x04wn*\xf2\xc6\x9d\xc4!\x9e?\x83\x99\x0e\xcc\xa3\x95q.C\xee\x8dIf\xec\xbf\xe8\xb2\t\xedg\x9d\xd9\v\xce\xa3\xa3\xa5\x89F\x03\xefQ\x89\f\xeeRK\x15\xec{D\x9e\x83Z\xabTa\x8e\xcd\x01\xd0\xcfd\xf9c\x87m\xbe>\x81\xba\x9d2\x1c\a,\x12\xbf\xef\xb8m\v\xdf\x8e\xd5\xf5\x1a\xabD\xf6\xe0\x95\xf4\xfeRb_+\xeb\xf9f\xe8\\\x16\xeb\x87\x8e\x8acn4,\x80Q<\x84\xaep\xf9\xfc\x8e\x9f\xed\x06.a\xd5o\x14\r&L\xbd\xb9g\x82;+n\xd5\xcca\v\x86Z\x872\xc3c:`\xf2\x02\xc2\x92\x841\xe7\xca}\"@6}j\x0e\xb7\xa9\xbc\xf3N\xa3\xf3mbd\xfbS\x80\xe0\x11<\x7f\x84\xbe\xa2\xf9\xf7\xee\xf6\x94x\x9d\xe2{\xc5\x83\xc0M\xbb\xd4Io\r\x1c\xd7<\xc0\x84=`\xf1^Y', 0x0, 0x0) 00:28:41 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000480)=@acquire={0x1ac, 0x17, 0x1, 0x0, 0x0, {{@in=@multicast1}, @in6=@ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x6}}, {@in=@loopback, @in6=@local}, {{@in, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x2}}}, [@tmpl={0x84, 0x5, [{{@in6=@mcast1, 0x0, 0x3c}, 0x0, @in=@multicast1}, {{@in=@remote, 0x0, 0x3c}, 0x0, @in=@broadcast}]}]}, 0x1ac}}, 0x0) 00:28:41 executing program 0: syz_mount_image$reiserfs(&(0x7f0000000180)='reiserfs\x03', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[@ANYBLOB='jdev=./file0,jdev=']) 00:28:41 executing program 2: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(&(0x7f0000000080)=@nbd={'/dev/nbd', 0x0, 0xe0000}, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000240)='hfs\x00\xe6\xa6\xe2\x06g\x96\xb3\v\xf2c\xd5:\x95p\x99\x92\xf2\xc4\x80\x1f\x01\x05\xb8e?\xbfwk\xe4\xe5\xca\x82\xeb\xb1\x04wn*\xf2\xc6\x9d\xc4!\x9e?\x83\x99\x0e\xcc\xa3\x95q.C\xee\x8dIf\xec\xbf\xe8\xb2\t\xedg\x9d\xd9\v\xce\xa3\xa3\xa5\x89F\x03\xefQ\x89\f\xeeRK\x15\xec{D\x9e\x83Z\xabTa\x8e\xcd\x01\xd0\xcfd\xf9c\x87m\xbe>\x81\xba\x9d2\x1c\a,\x12\xbf\xef\xb8m\v\xdf\x8e\xd5\xf5\x1a\xabD\xf6\xe0\x95\xf4\xfeRb_+\xeb\xf9f\xe8\\\x16\xeb\x87\x8e\x8acn4,\x80Q<\x84\xaep\xf9\xfc\x8e\x9f\xed\x06.a\xd5o\x14\r&L\xbd\xb9g\x82;+n\xd5\xcca\v\x86Z\x872\xc3c:`\xf2\x02\xc2\x92\x841\xe7\xca}\"@6}j\x0e\xb7\xa9\xbc\xf3N\xa3\xf3mbd\xfbS\x80\xe0\x11<\x7f\x84\xbe\xa2\xf9\xf7\xee\xf6\x94x\x9d\xe2{\xc5\x83\xc0M\xbb\xd4Io\r\x1c\xd7<\xc0\x84=`\xf1^Y', 0x0, 0x0) [ 911.354874][ T2481] block nbd2: Attempted send on invalid socket [ 911.361546][ T2481] print_req_error: I/O error, dev nbd2, sector 2 flags 0 [ 911.369900][ T6076] hfs: can't find a HFS filesystem on dev nbd2 00:28:41 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00004e7000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f}, 0xc, &(0x7f0000000440)={&(0x7f00000001c0)=ANY=[@ANYBLOB="1c00000a22000100000000000061960d0100000008fe0c009d0a6be0e6d9fc638f19561d6ceb8a6c9239228215fd206cf204e07953", @ANYRES32=0x0], 0x2}, 0x1, 0x0, 0x0, 0xffffffffffffffff}, 0x0) 00:28:41 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000480)=@acquire={0x1ac, 0x17, 0x1, 0x0, 0x0, {{@in=@multicast1}, @in6=@ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x8}}, {@in=@loopback, @in6=@local}, {{@in, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x2}}}, [@tmpl={0x84, 0x5, [{{@in6=@mcast1, 0x0, 0x3c}, 0x0, @in=@multicast1}, {{@in=@remote, 0x0, 0x3c}, 0x0, @in=@broadcast}]}]}, 0x1ac}}, 0x0) 00:28:41 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000180)='./control\x00', 0x0) get_thread_area(0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x3) write$binfmt_script(r0, &(0x7f0000000bc0)=ANY=[@ANYBLOB="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"], 0x145) close(r0) execve(&(0x7f0000000180)='./file0\x00', &(0x7f0000000140), &(0x7f0000000140)) r1 = open(&(0x7f0000000000)='./control\x00', 0x80, 0x10) statfs(&(0x7f0000000380)='./control\x00', &(0x7f00000003c0)=""/20) write$P9_RWALK(r0, &(0x7f0000000400)=ANY=[@ANYBLOB="300000006f0100030001030000000400000000000000100000000003000002000000000300000000000000e646f1c5592139cf131e2bf572fa9728dbfac0390865410f3fa1f25743c497e12cb352eac4046b4500f95cfdfb4cf22a3be5c564a47654334c01d5732d382e27bbccd9b903000000c404000000d32dbd21f3ae581d32e69ef9327f7b487d1b4f4502838c08136678bd90733173ab78d6fc264b373611f15c439384"], 0xa6) getsockopt$inet_sctp6_SCTP_RTOINFO(r1, 0x84, 0x0, &(0x7f0000000080)={0x0, 0x200, 0x0, 0xffffffff}, &(0x7f0000000100)=0x10) [ 911.617474][ T2481] block nbd2: Attempted send on invalid socket [ 911.623733][ T2481] print_req_error: I/O error, dev nbd2, sector 2 flags 0 00:28:41 executing program 1: syz_mount_image$reiserfs(&(0x7f0000000180)='reiserfk\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[@ANYBLOB='jdev=.']) [ 911.659288][ T6085] hfs: can't find a HFS filesystem on dev nbd2 00:28:41 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000480)=@acquire={0x1ac, 0x17, 0x1, 0x0, 0x0, {{@in=@multicast1}, @in6=@ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x9}}, {@in=@loopback, @in6=@local}, {{@in, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x2}}}, [@tmpl={0x84, 0x5, [{{@in6=@mcast1, 0x0, 0x3c}, 0x0, @in=@multicast1}, {{@in=@remote, 0x0, 0x3c}, 0x0, @in=@broadcast}]}]}, 0x1ac}}, 0x0) 00:28:41 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00004e7000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f}, 0xc, &(0x7f0000000440)={&(0x7f00000001c0)=ANY=[@ANYBLOB="1c00000e22000100000000000061960d0100000008fe0c009d0a6be0e6d9fc638f19561d6ceb8a6c9239228215fd206cf204e07953", @ANYRES32=0x0], 0x2}, 0x1, 0x0, 0x0, 0xffffffffffffffff}, 0x0) 00:28:41 executing program 2: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(&(0x7f0000000080)=@nbd={'/dev/nbd', 0x0, 0xe0000}, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000240)='hfs\x00\xe6\xa6\xe2\x06g\x96\xb3\v\xf2d\xd5:\x95p\x99\x92\xf2\xc4\x80\x1f\x01\x05\xb8e?\xbfwk\xe4\xe5\xca\x82\xeb\xb1\x04wn*\xf2\xc6\x9d\xc4!\x9e?\x83\x99\x0e\xcc\xa3\x95q.C\xee\x8dIf\xec\xbf\xe8\xb2\t\xedg\x9d\xd9\v\xce\xa3\xa3\xa5\x89F\x03\xefQ\x89\f\xeeRK\x15\xec{D\x9e\x83Z\xabTa\x8e\xcd\x01\xd0\xcfd\xf9c\x87m\xbe>\x81\xba\x9d2\x1c\a,\x12\xbf\xef\xb8m\v\xdf\x8e\xd5\xf5\x1a\xabD\xf6\xe0\x95\xf4\xfeRb_+\xeb\xf9f\xe8\\\x16\xeb\x87\x8e\x8acn4,\x80Q<\x84\xaep\xf9\xfc\x8e\x9f\xed\x06.a\xd5o\x14\r&L\xbd\xb9g\x82;+n\xd5\xcca\v\x86Z\x872\xc3c:`\xf2\x02\xc2\x92\x841\xe7\xca}\"@6}j\x0e\xb7\xa9\xbc\xf3N\xa3\xf3mbd\xfbS\x80\xe0\x11<\x7f\x84\xbe\xa2\xf9\xf7\xee\xf6\x94x\x9d\xe2{\xc5\x83\xc0M\xbb\xd4Io\r\x1c\xd7<\xc0\x84=`\xf1^Y', 0x0, 0x0) 00:28:41 executing program 0: syz_mount_image$reiserfs(&(0x7f0000000180)='reiserfs\x04', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[@ANYBLOB='jdev=./file0,jdev=']) 00:28:41 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000480)=@acquire={0x1ac, 0x17, 0x1, 0x0, 0x0, {{@in=@multicast1}, @in6=@ipv4={[], [], @dev={0xac, 0x14, 0x14, 0xa}}, {@in=@loopback, @in6=@local}, {{@in, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x2}}}, [@tmpl={0x84, 0x5, [{{@in6=@mcast1, 0x0, 0x3c}, 0x0, @in=@multicast1}, {{@in=@remote, 0x0, 0x3c}, 0x0, @in=@broadcast}]}]}, 0x1ac}}, 0x0) [ 911.936862][ T2480] block nbd2: Attempted send on invalid socket [ 911.943499][ T2480] print_req_error: I/O error, dev nbd2, sector 2 flags 0 [ 911.959153][ T6117] hfs: can't find a HFS filesystem on dev nbd2 00:28:41 executing program 1: syz_mount_image$reiserfs(&(0x7f0000000180)='reiserfl\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[@ANYBLOB='jdev=.']) 00:28:41 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000180)='./control\x00', 0x0) get_thread_area(0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x3) write$binfmt_script(r0, &(0x7f0000000bc0)=ANY=[@ANYBLOB="2321202e2f66696c6530202357994f66e76f4d0fe2208456ebfa69074cb94144c95c4375644bd1747e34c127d80575d10a599f851dc7ad26f3fa377c0a53cc7be2512b7493bf864ecf3f13e46032dbbf3af349b06321cec7a0652f4a5768256cd01a2d3d52de67dc459409a1e50ca51334791c8690646f7a1962ccefc0592a163bacf13da16978ca48eb3784c5baa40700ebfddde7e115f9388051297af49e38e0e3210d232e108a7e9b69c2e56676484906d975d537d128607c901050484e2bdb0d042a40c8ff8f4727cde00677ea73dac796f06f6f7ef7b3406723e7da9fb469c4ce44faff2888c779c000000000000000000000dc4fd7f68b303f980ed08fb24c8052b0626c8b3733eeee64a90f35fd7d88f958406cb5a8ed3b20b7d1278e15c1e1012befbc45a45f203503128d3a99b80bc2c744ae4b8509ca0149b48dc3e11c2d5db4"], 0x145) close(r0) execve(&(0x7f0000000180)='./file0\x00', &(0x7f0000000140), &(0x7f0000000140)) open(&(0x7f0000000000)='./control\x00', 0x80, 0x10) statfs(&(0x7f0000000380)='./control\x00', &(0x7f00000003c0)=""/20) write$P9_RWALK(r0, &(0x7f0000000400)=ANY=[@ANYBLOB="300000006f0100030001030000000400000000000000100000000003000002000000000300000000000000e646f1c5592139cf131e2bf572fa9728dbfac0390865410f3fa1f25743c497e12cb352eac4046b4500f95cfdfb4cf22a3be5c564a47654334c01d5732d382e27bbccd9b903000000c404000000d32dbd21f3ae581d32e69ef9327f7b487d1b4f4502838c08136678bd90733173ab78d6fc264b373611f15c439384"], 0xa6) getsockopt$inet_sctp6_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000000080)={0x0, 0x200, 0x2, 0xffffffff}, &(0x7f0000000100)=0x10) 00:28:41 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000480)=@acquire={0x1ac, 0x17, 0x1, 0x0, 0x0, {{@in=@multicast1}, @in6=@ipv4={[], [], @dev={0xac, 0x14, 0x14, 0xb}}, {@in=@loopback, @in6=@local}, {{@in, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x2}}}, [@tmpl={0x84, 0x5, [{{@in6=@mcast1, 0x0, 0x3c}, 0x0, @in=@multicast1}, {{@in=@remote, 0x0, 0x3c}, 0x0, @in=@broadcast}]}]}, 0x1ac}}, 0x0) 00:28:41 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00004e7000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f}, 0xc, &(0x7f0000000440)={&(0x7f00000001c0)=ANY=[@ANYBLOB="1c00001022000100000000000061960d0100000008fe0c009d0a6be0e6d9fc638f19561d6ceb8a6c9239228215fd206cf204e07953", @ANYRES32=0x0], 0x2}, 0x1, 0x0, 0x0, 0xffffffffffffffff}, 0x0) 00:28:41 executing program 2: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(&(0x7f0000000080)=@nbd={'/dev/nbd', 0x0, 0xe0000}, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000240)='hfs\x00\xe6\xa6\xe2\x06g\x96\xb3\v\xf2i\xd5:\x95p\x99\x92\xf2\xc4\x80\x1f\x01\x05\xb8e?\xbfwk\xe4\xe5\xca\x82\xeb\xb1\x04wn*\xf2\xc6\x9d\xc4!\x9e?\x83\x99\x0e\xcc\xa3\x95q.C\xee\x8dIf\xec\xbf\xe8\xb2\t\xedg\x9d\xd9\v\xce\xa3\xa3\xa5\x89F\x03\xefQ\x89\f\xeeRK\x15\xec{D\x9e\x83Z\xabTa\x8e\xcd\x01\xd0\xcfd\xf9c\x87m\xbe>\x81\xba\x9d2\x1c\a,\x12\xbf\xef\xb8m\v\xdf\x8e\xd5\xf5\x1a\xabD\xf6\xe0\x95\xf4\xfeRb_+\xeb\xf9f\xe8\\\x16\xeb\x87\x8e\x8acn4,\x80Q<\x84\xaep\xf9\xfc\x8e\x9f\xed\x06.a\xd5o\x14\r&L\xbd\xb9g\x82;+n\xd5\xcca\v\x86Z\x872\xc3c:`\xf2\x02\xc2\x92\x841\xe7\xca}\"@6}j\x0e\xb7\xa9\xbc\xf3N\xa3\xf3mbd\xfbS\x80\xe0\x11<\x7f\x84\xbe\xa2\xf9\xf7\xee\xf6\x94x\x9d\xe2{\xc5\x83\xc0M\xbb\xd4Io\r\x1c\xd7<\xc0\x84=`\xf1^Y', 0x0, 0x0) 00:28:41 executing program 0: syz_mount_image$reiserfs(&(0x7f0000000180)='reiserfs\x05', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[@ANYBLOB='jdev=./file0,jdev=']) 00:28:41 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000480)=@acquire={0x1ac, 0x17, 0x1, 0x0, 0x0, {{@in=@multicast1}, @in6=@ipv4={[], [], @dev={0xac, 0x14, 0x14, 0xe}}, {@in=@loopback, @in6=@local}, {{@in, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x2}}}, [@tmpl={0x84, 0x5, [{{@in6=@mcast1, 0x0, 0x3c}, 0x0, @in=@multicast1}, {{@in=@remote, 0x0, 0x3c}, 0x0, @in=@broadcast}]}]}, 0x1ac}}, 0x0) 00:28:42 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00004e7000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f}, 0xc, &(0x7f0000000440)={&(0x7f00000001c0)=ANY=[@ANYBLOB="1c00006022000100000000000061960d0100000008fe0c009d0a6be0e6d9fc638f19561d6ceb8a6c9239228215fd206cf204e07953", @ANYRES32=0x0], 0x2}, 0x1, 0x0, 0x0, 0xffffffffffffffff}, 0x0) [ 912.329289][ T6151] hfs: can't find a HFS filesystem on dev nbd2 00:28:42 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000180)='./control\x00', 0x0) get_thread_area(0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x3) write$binfmt_script(r0, &(0x7f0000000bc0)=ANY=[@ANYBLOB="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"], 0x145) close(r0) execve(&(0x7f0000000180)='./file0\x00', &(0x7f0000000140), &(0x7f0000000140)) open(&(0x7f0000000000)='./control\x00', 0x80, 0x10) statfs(&(0x7f0000000380)='./control\x00', &(0x7f00000003c0)=""/20) write$P9_RWALK(r0, &(0x7f0000000400)=ANY=[@ANYBLOB="300000006f0100030001030000000400000000000000100000000003000002000000000300000000000000e646f1c5592139cf131e2bf572fa9728dbfac0390865410f3fa1f25743c497e12cb352eac4046b4500f95cfdfb4cf22a3be5c564a47654334c01d5732d382e27bbccd9b903000000c404000000d32dbd21f3ae581d32e69ef9327f7b487d1b4f4502838c08136678bd90733173ab78d6fc264b373611f15c439384"], 0xa6) getsockopt$inet_sctp6_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000000080)={0x0, 0x200, 0x2, 0xffffffff}, &(0x7f0000000100)=0x10) 00:28:42 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000480)=@acquire={0x1ac, 0x17, 0x1, 0x0, 0x0, {{@in=@multicast1}, @in6=@ipv4={[], [], @dev={0xac, 0x14, 0x14, 0xf}}, {@in=@loopback, @in6=@local}, {{@in, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x2}}}, [@tmpl={0x84, 0x5, [{{@in6=@mcast1, 0x0, 0x3c}, 0x0, @in=@multicast1}, {{@in=@remote, 0x0, 0x3c}, 0x0, @in=@broadcast}]}]}, 0x1ac}}, 0x0) 00:28:42 executing program 1: syz_mount_image$reiserfs(&(0x7f0000000180)='reiserfo\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[@ANYBLOB='jdev=.']) [ 912.462144][ T6151] hfs: can't find a HFS filesystem on dev nbd2 00:28:42 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00004e7000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f}, 0xc, &(0x7f0000000440)={&(0x7f00000001c0)=ANY=[@ANYBLOB="1c00000022040000000000000061960d0100000008fe0c009d0a6be0e6d9fc638f19561d6ceb8a6c9239228215fd206cf204e07953", @ANYRES32=0x0], 0x2}, 0x1, 0x0, 0x0, 0xffffffffffffffff}, 0x0) 00:28:42 executing program 2: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(&(0x7f0000000080)=@nbd={'/dev/nbd', 0x0, 0xe0000}, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000240)='hfs\x00\xe6\xa6\xe2\x06g\x96\xb3\v\xf2l\xd5:\x95p\x99\x92\xf2\xc4\x80\x1f\x01\x05\xb8e?\xbfwk\xe4\xe5\xca\x82\xeb\xb1\x04wn*\xf2\xc6\x9d\xc4!\x9e?\x83\x99\x0e\xcc\xa3\x95q.C\xee\x8dIf\xec\xbf\xe8\xb2\t\xedg\x9d\xd9\v\xce\xa3\xa3\xa5\x89F\x03\xefQ\x89\f\xeeRK\x15\xec{D\x9e\x83Z\xabTa\x8e\xcd\x01\xd0\xcfd\xf9c\x87m\xbe>\x81\xba\x9d2\x1c\a,\x12\xbf\xef\xb8m\v\xdf\x8e\xd5\xf5\x1a\xabD\xf6\xe0\x95\xf4\xfeRb_+\xeb\xf9f\xe8\\\x16\xeb\x87\x8e\x8acn4,\x80Q<\x84\xaep\xf9\xfc\x8e\x9f\xed\x06.a\xd5o\x14\r&L\xbd\xb9g\x82;+n\xd5\xcca\v\x86Z\x872\xc3c:`\xf2\x02\xc2\x92\x841\xe7\xca}\"@6}j\x0e\xb7\xa9\xbc\xf3N\xa3\xf3mbd\xfbS\x80\xe0\x11<\x7f\x84\xbe\xa2\xf9\xf7\xee\xf6\x94x\x9d\xe2{\xc5\x83\xc0M\xbb\xd4Io\r\x1c\xd7<\xc0\x84=`\xf1^Y', 0x0, 0x0) 00:28:42 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000480)=@acquire={0x1ac, 0x17, 0x1, 0x0, 0x0, {{@in=@multicast1}, @in6=@ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x10}}, {@in=@loopback, @in6=@local}, {{@in, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x2}}}, [@tmpl={0x84, 0x5, [{{@in6=@mcast1, 0x0, 0x3c}, 0x0, @in=@multicast1}, {{@in=@remote, 0x0, 0x3c}, 0x0, @in=@broadcast}]}]}, 0x1ac}}, 0x0) [ 912.702787][ T6182] hfs: can't find a HFS filesystem on dev nbd2 00:28:42 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000480)=@acquire={0x1ac, 0x17, 0x1, 0x0, 0x0, {{@in=@multicast1}, @in6=@ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x11}}, {@in=@loopback, @in6=@local}, {{@in, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x2}}}, [@tmpl={0x84, 0x5, [{{@in6=@mcast1, 0x0, 0x3c}, 0x0, @in=@multicast1}, {{@in=@remote, 0x0, 0x3c}, 0x0, @in=@broadcast}]}]}, 0x1ac}}, 0x0) 00:28:42 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00004e7000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f}, 0xc, &(0x7f0000000440)={&(0x7f00000001c0)=ANY=[@ANYBLOB="1c00000022020100000000000061960d0100000008fe0c009d0a6be0e6d9fc638f19561d6ceb8a6c9239228215fd206cf204e07953", @ANYRES32=0x0], 0x2}, 0x1, 0x0, 0x0, 0xffffffffffffffff}, 0x0) 00:28:42 executing program 0: syz_mount_image$reiserfs(&(0x7f0000000180)='reiserfs\x06', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[@ANYBLOB='jdev=./file0,jdev=']) 00:28:42 executing program 2: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(&(0x7f0000000080)=@nbd={'/dev/nbd', 0x0, 0xe0000}, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000240)='hfs\x00\xe6\xa6\xe2\x06g\x96\xb3\v\xf2o\xd5:\x95p\x99\x92\xf2\xc4\x80\x1f\x01\x05\xb8e?\xbfwk\xe4\xe5\xca\x82\xeb\xb1\x04wn*\xf2\xc6\x9d\xc4!\x9e?\x83\x99\x0e\xcc\xa3\x95q.C\xee\x8dIf\xec\xbf\xe8\xb2\t\xedg\x9d\xd9\v\xce\xa3\xa3\xa5\x89F\x03\xefQ\x89\f\xeeRK\x15\xec{D\x9e\x83Z\xabTa\x8e\xcd\x01\xd0\xcfd\xf9c\x87m\xbe>\x81\xba\x9d2\x1c\a,\x12\xbf\xef\xb8m\v\xdf\x8e\xd5\xf5\x1a\xabD\xf6\xe0\x95\xf4\xfeRb_+\xeb\xf9f\xe8\\\x16\xeb\x87\x8e\x8acn4,\x80Q<\x84\xaep\xf9\xfc\x8e\x9f\xed\x06.a\xd5o\x14\r&L\xbd\xb9g\x82;+n\xd5\xcca\v\x86Z\x872\xc3c:`\xf2\x02\xc2\x92\x841\xe7\xca}\"@6}j\x0e\xb7\xa9\xbc\xf3N\xa3\xf3mbd\xfbS\x80\xe0\x11<\x7f\x84\xbe\xa2\xf9\xf7\xee\xf6\x94x\x9d\xe2{\xc5\x83\xc0M\xbb\xd4Io\r\x1c\xd7<\xc0\x84=`\xf1^Y', 0x0, 0x0) 00:28:42 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000480)=@acquire={0x1ac, 0x17, 0x1, 0x0, 0x0, {{@in=@multicast1}, @in6=@ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x12}}, {@in=@loopback, @in6=@local}, {{@in, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x2}}}, [@tmpl={0x84, 0x5, [{{@in6=@mcast1, 0x0, 0x3c}, 0x0, @in=@multicast1}, {{@in=@remote, 0x0, 0x3c}, 0x0, @in=@broadcast}]}]}, 0x1ac}}, 0x0) 00:28:42 executing program 1: syz_mount_image$reiserfs(&(0x7f0000000180)='reiserfp\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[@ANYBLOB='jdev=.']) [ 913.041869][ T6200] hfs: can't find a HFS filesystem on dev nbd2 00:28:42 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000180)='./control\x00', 0x0) get_thread_area(0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x3) write$binfmt_script(r0, &(0x7f0000000bc0)=ANY=[@ANYBLOB="2321202e2f66696c6530202357994f66e76f4d0fe2208456ebfa69074cb94144c95c4375644bd1747e34c127d80575d10a599f851dc7ad26f3fa377c0a53cc7be2512b7493bf864ecf3f13e46032dbbf3af349b06321cec7a0652f4a5768256cd01a2d3d52de67dc459409a1e50ca51334791c8690646f7a1962ccefc0592a163bacf13da16978ca48eb3784c5baa40700ebfddde7e115f9388051297af49e38e0e3210d232e108a7e9b69c2e56676484906d975d537d128607c901050484e2bdb0d042a40c8ff8f4727cde00677ea73dac796f06f6f7ef7b3406723e7da9fb469c4ce44faff2888c779c000000000000000000000dc4fd7f68b303f980ed08fb24c8052b0626c8b3733eeee64a90f35fd7d88f958406cb5a8ed3b20b7d1278e15c1e1012befbc45a45f203503128d3a99b80bc2c744ae4b8509ca0149b48dc3e11c2d5db4"], 0x145) close(r0) execve(&(0x7f0000000180)='./file0\x00', &(0x7f0000000140), &(0x7f0000000140)) open(&(0x7f0000000000)='./control\x00', 0x80, 0x10) statfs(&(0x7f0000000380)='./control\x00', &(0x7f00000003c0)=""/20) write$P9_RWALK(r0, &(0x7f0000000400)=ANY=[@ANYBLOB="300000006f0100030001030000000400000000000000100000000003000002000000000300000000000000e646f1c5592139cf131e2bf572fa9728dbfac0390865410f3fa1f25743c497e12cb352eac4046b4500f95cfdfb4cf22a3be5c564a47654334c01d5732d382e27bbccd9b903000000c404000000d32dbd21f3ae581d32e69ef9327f7b487d1b4f4502838c08136678bd90733173ab78d6fc264b373611f15c439384"], 0xa6) getsockopt$inet_sctp6_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000000080)={0x0, 0x200, 0x2, 0xffffffff}, &(0x7f0000000100)=0x10) 00:28:42 executing program 2: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(&(0x7f0000000080)=@nbd={'/dev/nbd', 0x0, 0xe0000}, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000240)='hfs\x00\xe6\xa6\xe2\x06g\x96\xb3\v\xf2s\xd5:\x95p\x99\x92\xf2\xc4\x80\x1f\x01\x05\xb8e?\xbfwk\xe4\xe5\xca\x82\xeb\xb1\x04wn*\xf2\xc6\x9d\xc4!\x9e?\x83\x99\x0e\xcc\xa3\x95q.C\xee\x8dIf\xec\xbf\xe8\xb2\t\xedg\x9d\xd9\v\xce\xa3\xa3\xa5\x89F\x03\xefQ\x89\f\xeeRK\x15\xec{D\x9e\x83Z\xabTa\x8e\xcd\x01\xd0\xcfd\xf9c\x87m\xbe>\x81\xba\x9d2\x1c\a,\x12\xbf\xef\xb8m\v\xdf\x8e\xd5\xf5\x1a\xabD\xf6\xe0\x95\xf4\xfeRb_+\xeb\xf9f\xe8\\\x16\xeb\x87\x8e\x8acn4,\x80Q<\x84\xaep\xf9\xfc\x8e\x9f\xed\x06.a\xd5o\x14\r&L\xbd\xb9g\x82;+n\xd5\xcca\v\x86Z\x872\xc3c:`\xf2\x02\xc2\x92\x841\xe7\xca}\"@6}j\x0e\xb7\xa9\xbc\xf3N\xa3\xf3mbd\xfbS\x80\xe0\x11<\x7f\x84\xbe\xa2\xf9\xf7\xee\xf6\x94x\x9d\xe2{\xc5\x83\xc0M\xbb\xd4Io\r\x1c\xd7<\xc0\x84=`\xf1^Y', 0x0, 0x0) 00:28:42 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00004e7000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f}, 0xc, &(0x7f0000000440)={&(0x7f00000001c0)=ANY=[@ANYBLOB="1c00000022040100000000000061960d0100000008fe0c009d0a6be0e6d9fc638f19561d6ceb8a6c9239228215fd206cf204e07953", @ANYRES32=0x0], 0x2}, 0x1, 0x0, 0x0, 0xffffffffffffffff}, 0x0) 00:28:42 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000480)=@acquire={0x1ac, 0x17, 0x1, 0x0, 0x0, {{@in=@multicast1}, @in6=@ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x13}}, {@in=@loopback, @in6=@local}, {{@in, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x2}}}, [@tmpl={0x84, 0x5, [{{@in6=@mcast1, 0x0, 0x3c}, 0x0, @in=@multicast1}, {{@in=@remote, 0x0, 0x3c}, 0x0, @in=@broadcast}]}]}, 0x1ac}}, 0x0) 00:28:43 executing program 0: syz_mount_image$reiserfs(&(0x7f0000000180)='reiserfs\a', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[@ANYBLOB='jdev=./file0,jdev=']) [ 913.251182][ T6217] hfs: can't find a HFS filesystem on dev nbd2 00:28:43 executing program 2: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(&(0x7f0000000080)=@nbd={'/dev/nbd', 0x0, 0xe0000}, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000240)='hfs\x00\xe6\xa6\xe2\x06g\x96\xb3\v\xf2u\xd5:\x95p\x99\x92\xf2\xc4\x80\x1f\x01\x05\xb8e?\xbfwk\xe4\xe5\xca\x82\xeb\xb1\x04wn*\xf2\xc6\x9d\xc4!\x9e?\x83\x99\x0e\xcc\xa3\x95q.C\xee\x8dIf\xec\xbf\xe8\xb2\t\xedg\x9d\xd9\v\xce\xa3\xa3\xa5\x89F\x03\xefQ\x89\f\xeeRK\x15\xec{D\x9e\x83Z\xabTa\x8e\xcd\x01\xd0\xcfd\xf9c\x87m\xbe>\x81\xba\x9d2\x1c\a,\x12\xbf\xef\xb8m\v\xdf\x8e\xd5\xf5\x1a\xabD\xf6\xe0\x95\xf4\xfeRb_+\xeb\xf9f\xe8\\\x16\xeb\x87\x8e\x8acn4,\x80Q<\x84\xaep\xf9\xfc\x8e\x9f\xed\x06.a\xd5o\x14\r&L\xbd\xb9g\x82;+n\xd5\xcca\v\x86Z\x872\xc3c:`\xf2\x02\xc2\x92\x841\xe7\xca}\"@6}j\x0e\xb7\xa9\xbc\xf3N\xa3\xf3mbd\xfbS\x80\xe0\x11<\x7f\x84\xbe\xa2\xf9\xf7\xee\xf6\x94x\x9d\xe2{\xc5\x83\xc0M\xbb\xd4Io\r\x1c\xd7<\xc0\x84=`\xf1^Y', 0x0, 0x0) 00:28:43 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000480)=@acquire={0x1ac, 0x17, 0x1, 0x0, 0x0, {{@in=@multicast1}, @in6=@ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x60}}, {@in=@loopback, @in6=@local}, {{@in, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x2}}}, [@tmpl={0x84, 0x5, [{{@in6=@mcast1, 0x0, 0x3c}, 0x0, @in=@multicast1}, {{@in=@remote, 0x0, 0x3c}, 0x0, @in=@broadcast}]}]}, 0x1ac}}, 0x0) 00:28:43 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000180)='./control\x00', 0x0) get_thread_area(0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x3) write$binfmt_script(r0, &(0x7f0000000bc0)=ANY=[@ANYBLOB="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"], 0x145) close(r0) execve(&(0x7f0000000180)='./file0\x00', &(0x7f0000000140), &(0x7f0000000140)) open(&(0x7f0000000000)='./control\x00', 0x80, 0x10) statfs(&(0x7f0000000380)='./control\x00', &(0x7f00000003c0)=""/20) write$P9_RWALK(r0, &(0x7f0000000400)=ANY=[@ANYBLOB="300000006f0100030001030000000400000000000000100000000003000002000000000300000000000000e646f1c5592139cf131e2bf572fa9728dbfac0390865410f3fa1f25743c497e12cb352eac4046b4500f95cfdfb4cf22a3be5c564a47654334c01d5732d382e27bbccd9b903000000c404000000d32dbd21f3ae581d32e69ef9327f7b487d1b4f4502838c08136678bd90733173ab78d6fc264b373611f15c439384"], 0xa6) getsockopt$inet_sctp6_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000000080)={0x0, 0x200, 0x2, 0xffffffff}, &(0x7f0000000100)=0x10) 00:28:43 executing program 1: syz_mount_image$reiserfs(&(0x7f0000000180)='reiserft\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[@ANYBLOB='jdev=.']) 00:28:43 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00004e7000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f}, 0xc, &(0x7f0000000440)={&(0x7f00000001c0)=ANY=[@ANYBLOB="1c00000022080100000000000061960d0100000008fe0c009d0a6be0e6d9fc638f19561d6ceb8a6c9239228215fd206cf204e07953", @ANYRES32=0x0], 0x2}, 0x1, 0x0, 0x0, 0xffffffffffffffff}, 0x0) 00:28:43 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000480)=@acquire={0x1ac, 0x17, 0x1, 0x0, 0x0, {{@in=@multicast1}, @in6=@ipv4={[], [], @dev={0xac, 0x14, 0x14, 0xf0}}, {@in=@loopback, @in6=@local}, {{@in, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x2}}}, [@tmpl={0x84, 0x5, [{{@in6=@mcast1, 0x0, 0x3c}, 0x0, @in=@multicast1}, {{@in=@remote, 0x0, 0x3c}, 0x0, @in=@broadcast}]}]}, 0x1ac}}, 0x0) [ 913.527694][ T6243] hfs: can't find a HFS filesystem on dev nbd2 00:28:43 executing program 2: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(&(0x7f0000000080)=@nbd={'/dev/nbd', 0x0, 0xe0000}, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000240)='hfs\x00\xe6\xa6\xe2\x06g\x96\xb3\v\xf2x\xd5:\x95p\x99\x92\xf2\xc4\x80\x1f\x01\x05\xb8e?\xbfwk\xe4\xe5\xca\x82\xeb\xb1\x04wn*\xf2\xc6\x9d\xc4!\x9e?\x83\x99\x0e\xcc\xa3\x95q.C\xee\x8dIf\xec\xbf\xe8\xb2\t\xedg\x9d\xd9\v\xce\xa3\xa3\xa5\x89F\x03\xefQ\x89\f\xeeRK\x15\xec{D\x9e\x83Z\xabTa\x8e\xcd\x01\xd0\xcfd\xf9c\x87m\xbe>\x81\xba\x9d2\x1c\a,\x12\xbf\xef\xb8m\v\xdf\x8e\xd5\xf5\x1a\xabD\xf6\xe0\x95\xf4\xfeRb_+\xeb\xf9f\xe8\\\x16\xeb\x87\x8e\x8acn4,\x80Q<\x84\xaep\xf9\xfc\x8e\x9f\xed\x06.a\xd5o\x14\r&L\xbd\xb9g\x82;+n\xd5\xcca\v\x86Z\x872\xc3c:`\xf2\x02\xc2\x92\x841\xe7\xca}\"@6}j\x0e\xb7\xa9\xbc\xf3N\xa3\xf3mbd\xfbS\x80\xe0\x11<\x7f\x84\xbe\xa2\xf9\xf7\xee\xf6\x94x\x9d\xe2{\xc5\x83\xc0M\xbb\xd4Io\r\x1c\xd7<\xc0\x84=`\xf1^Y', 0x0, 0x0) 00:28:43 executing program 0: syz_mount_image$reiserfs(&(0x7f0000000180)='reiserfs\b', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[@ANYBLOB='jdev=./file0,jdev=']) 00:28:43 executing program 2: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(&(0x7f0000000080)=@nbd={'/dev/nbd', 0x0, 0xe0000}, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000240)='hfs\x00\xe6\xa6\xe2\x06g\x96\xb3\v\xf2p\xd5%\x95p\x99\x92\xf2\xc4\x80\x1f\x01\x05\xb8e?\xbfwk\xe4\xe5\xca\x82\xeb\xb1\x04wn*\xf2\xc6\x9d\xc4!\x9e?\x83\x99\x0e\xcc\xa3\x95q.C\xee\x8dIf\xec\xbf\xe8\xb2\t\xedg\x9d\xd9\v\xce\xa3\xa3\xa5\x89F\x03\xefQ\x89\f\xeeRK\x15\xec{D\x9e\x83Z\xabTa\x8e\xcd\x01\xd0\xcfd\xf9c\x87m\xbe>\x81\xba\x9d2\x1c\a,\x12\xbf\xef\xb8m\v\xdf\x8e\xd5\xf5\x1a\xabD\xf6\xe0\x95\xf4\xfeRb_+\xeb\xf9f\xe8\\\x16\xeb\x87\x8e\x8acn4,\x80Q<\x84\xaep\xf9\xfc\x8e\x9f\xed\x06.a\xd5o\x14\r&L\xbd\xb9g\x82;+n\xd5\xcca\v\x86Z\x872\xc3c:`\xf2\x02\xc2\x92\x841\xe7\xca}\"@6}j\x0e\xb7\xa9\xbc\xf3N\xa3\xf3mbd\xfbS\x80\xe0\x11<\x7f\x84\xbe\xa2\xf9\xf7\xee\xf6\x94x\x9d\xe2{\xc5\x83\xc0M\xbb\xd4Io\r\x1c\xd7<\xc0\x84=`\xf1^Y', 0x0, 0x0) 00:28:43 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000480)=@acquire={0x1ac, 0x17, 0x1, 0x0, 0x0, {{@in=@multicast1}, @in6=@ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x300}}, {@in=@loopback, @in6=@local}, {{@in, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x2}}}, [@tmpl={0x84, 0x5, [{{@in6=@mcast1, 0x0, 0x3c}, 0x0, @in=@multicast1}, {{@in=@remote, 0x0, 0x3c}, 0x0, @in=@broadcast}]}]}, 0x1ac}}, 0x0) [ 913.729896][ T6263] hfs: can't find a HFS filesystem on dev nbd2 00:28:43 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00004e7000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f}, 0xc, &(0x7f0000000440)={&(0x7f00000001c0)=ANY=[@ANYBLOB="1c000000220a0100000000000061960d0100000008fe0c009d0a6be0e6d9fc638f19561d6ceb8a6c9239228215fd206cf204e07953", @ANYRES32=0x0], 0x2}, 0x1, 0x0, 0x0, 0xffffffffffffffff}, 0x0) 00:28:43 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000180)='./control\x00', 0x0) get_thread_area(0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x3) write$binfmt_script(r0, &(0x7f0000000bc0)=ANY=[@ANYBLOB="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"], 0x145) close(r0) execve(&(0x7f0000000180)='./file0\x00', &(0x7f0000000140), &(0x7f0000000140)) open(&(0x7f0000000000)='./control\x00', 0x80, 0x10) statfs(&(0x7f0000000380)='./control\x00', &(0x7f00000003c0)=""/20) write$P9_RWALK(r0, &(0x7f0000000400)=ANY=[@ANYBLOB="300000006f0100030001030000000400000000000000100000000003000002000000000300000000000000e646f1c5592139cf131e2bf572fa9728dbfac0390865410f3fa1f25743c497e12cb352eac4046b4500f95cfdfb4cf22a3be5c564a47654334c01d5732d382e27bbccd9b903000000c404000000d32dbd21f3ae581d32e69ef9327f7b487d1b4f4502838c08136678bd90733173ab78d6fc264b373611f15c439384"], 0xa6) getsockopt$inet_sctp6_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000000080)={0x0, 0x200, 0x2, 0xffffffff}, &(0x7f0000000100)=0x10) [ 913.907200][ T6275] hfs: can't find a HFS filesystem on dev nbd2 00:28:43 executing program 2: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(&(0x7f0000000080)=@nbd={'/dev/nbd', 0x0, 0xe0000}, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000240)='hfs\x00\xe6\xa6\xe2\x06g\x96\xb3\v\xf2p\xd5:\x95#\x99\x92\xf2\xc4\x80\x1f\x01\x05\xb8e?\xbfwk\xe4\xe5\xca\x82\xeb\xb1\x04wn*\xf2\xc6\x9d\xc4!\x9e?\x83\x99\x0e\xcc\xa3\x95q.C\xee\x8dIf\xec\xbf\xe8\xb2\t\xedg\x9d\xd9\v\xce\xa3\xa3\xa5\x89F\x03\xefQ\x89\f\xeeRK\x15\xec{D\x9e\x83Z\xabTa\x8e\xcd\x01\xd0\xcfd\xf9c\x87m\xbe>\x81\xba\x9d2\x1c\a,\x12\xbf\xef\xb8m\v\xdf\x8e\xd5\xf5\x1a\xabD\xf6\xe0\x95\xf4\xfeRb_+\xeb\xf9f\xe8\\\x16\xeb\x87\x8e\x8acn4,\x80Q<\x84\xaep\xf9\xfc\x8e\x9f\xed\x06.a\xd5o\x14\r&L\xbd\xb9g\x82;+n\xd5\xcca\v\x86Z\x872\xc3c:`\xf2\x02\xc2\x92\x841\xe7\xca}\"@6}j\x0e\xb7\xa9\xbc\xf3N\xa3\xf3mbd\xfbS\x80\xe0\x11<\x7f\x84\xbe\xa2\xf9\xf7\xee\xf6\x94x\x9d\xe2{\xc5\x83\xc0M\xbb\xd4Io\r\x1c\xd7<\xc0\x84=`\xf1^Y', 0x0, 0x0) 00:28:43 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000480)=@acquire={0x1ac, 0x17, 0x1, 0x0, 0x0, {{@in=@multicast1}, @in6=@ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x500}}, {@in=@loopback, @in6=@local}, {{@in, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x2}}}, [@tmpl={0x84, 0x5, [{{@in6=@mcast1, 0x0, 0x3c}, 0x0, @in=@multicast1}, {{@in=@remote, 0x0, 0x3c}, 0x0, @in=@broadcast}]}]}, 0x1ac}}, 0x0) 00:28:43 executing program 1: syz_mount_image$reiserfs(&(0x7f0000000180)='reiserfu\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[@ANYBLOB='jdev=.']) 00:28:43 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00004e7000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f}, 0xc, &(0x7f0000000440)={&(0x7f00000001c0)=ANY=[@ANYBLOB="1c000000220e0100000000000061960d0100000008fe0c009d0a6be0e6d9fc638f19561d6ceb8a6c9239228215fd206cf204e07953", @ANYRES32=0x0], 0x2}, 0x1, 0x0, 0x0, 0xffffffffffffffff}, 0x0) [ 914.120694][ T6296] hfs: can't find a HFS filesystem on dev nbd2 00:28:43 executing program 2: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(&(0x7f0000000080)=@nbd={'/dev/nbd', 0x0, 0xe0000}, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000240)='hfs\x00\xe6\xa6\xe2\x06g\x96\xb3\v\xf2p\xd5:\x95%\x99\x92\xf2\xc4\x80\x1f\x01\x05\xb8e?\xbfwk\xe4\xe5\xca\x82\xeb\xb1\x04wn*\xf2\xc6\x9d\xc4!\x9e?\x83\x99\x0e\xcc\xa3\x95q.C\xee\x8dIf\xec\xbf\xe8\xb2\t\xedg\x9d\xd9\v\xce\xa3\xa3\xa5\x89F\x03\xefQ\x89\f\xeeRK\x15\xec{D\x9e\x83Z\xabTa\x8e\xcd\x01\xd0\xcfd\xf9c\x87m\xbe>\x81\xba\x9d2\x1c\a,\x12\xbf\xef\xb8m\v\xdf\x8e\xd5\xf5\x1a\xabD\xf6\xe0\x95\xf4\xfeRb_+\xeb\xf9f\xe8\\\x16\xeb\x87\x8e\x8acn4,\x80Q<\x84\xaep\xf9\xfc\x8e\x9f\xed\x06.a\xd5o\x14\r&L\xbd\xb9g\x82;+n\xd5\xcca\v\x86Z\x872\xc3c:`\xf2\x02\xc2\x92\x841\xe7\xca}\"@6}j\x0e\xb7\xa9\xbc\xf3N\xa3\xf3mbd\xfbS\x80\xe0\x11<\x7f\x84\xbe\xa2\xf9\xf7\xee\xf6\x94x\x9d\xe2{\xc5\x83\xc0M\xbb\xd4Io\r\x1c\xd7<\xc0\x84=`\xf1^Y', 0x0, 0x0) 00:28:43 executing program 0: syz_mount_image$reiserfs(&(0x7f0000000180)='reiserfs\n', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[@ANYBLOB='jdev=./file0,jdev=']) 00:28:43 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000480)=@acquire={0x1ac, 0x17, 0x1, 0x0, 0x0, {{@in=@multicast1}, @in6=@ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x508}}, {@in=@loopback, @in6=@local}, {{@in, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x2}}}, [@tmpl={0x84, 0x5, [{{@in6=@mcast1, 0x0, 0x3c}, 0x0, @in=@multicast1}, {{@in=@remote, 0x0, 0x3c}, 0x0, @in=@broadcast}]}]}, 0x1ac}}, 0x0) 00:28:44 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000180)='./control\x00', 0x0) get_thread_area(0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x3) write$binfmt_script(r0, &(0x7f0000000bc0)=ANY=[@ANYBLOB="2321202e2f66696c6530202357994f66e76f4d0fe2208456ebfa69074cb94144c95c4375644bd1747e34c127d80575d10a599f851dc7ad26f3fa377c0a53cc7be2512b7493bf864ecf3f13e46032dbbf3af349b06321cec7a0652f4a5768256cd01a2d3d52de67dc459409a1e50ca51334791c8690646f7a1962ccefc0592a163bacf13da16978ca48eb3784c5baa40700ebfddde7e115f9388051297af49e38e0e3210d232e108a7e9b69c2e56676484906d975d537d128607c901050484e2bdb0d042a40c8ff8f4727cde00677ea73dac796f06f6f7ef7b3406723e7da9fb469c4ce44faff2888c779c000000000000000000000dc4fd7f68b303f980ed08fb24c8052b0626c8b3733eeee64a90f35fd7d88f958406cb5a8ed3b20b7d1278e15c1e1012befbc45a45f203503128d3a99b80bc2c744ae4b8509ca0149b48dc3e11c2d5db4"], 0x145) close(r0) execve(&(0x7f0000000180)='./file0\x00', &(0x7f0000000140), &(0x7f0000000140)) r1 = open(&(0x7f0000000000)='./control\x00', 0x80, 0x10) statfs(&(0x7f0000000380)='./control\x00', &(0x7f00000003c0)=""/20) write$P9_RWALK(r0, &(0x7f0000000400)=ANY=[@ANYBLOB="300000006f0100030001030000000400000000000000100000000003000002000000000300000000000000e646f1c5592139cf131e2bf572fa9728dbfac0390865410f3fa1f25743c497e12cb352eac4046b4500f95cfdfb4cf22a3be5c564a47654334c01d5732d382e27bbccd9b903000000c404000000d32dbd21f3ae581d32e69ef9327f7b487d1b4f4502838c08136678bd90733173ab78d6fc264b373611f15c4393"], 0xa5) getsockopt$inet_sctp6_SCTP_RTOINFO(r1, 0x84, 0x0, &(0x7f0000000080)={0x0, 0x200, 0x2, 0xffffffff}, &(0x7f0000000100)=0x10) [ 914.353519][ T6315] hfs: can't find a HFS filesystem on dev nbd2 00:28:44 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000480)=@acquire={0x1ac, 0x17, 0x1, 0x0, 0x0, {{@in=@multicast1}, @in6=@ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x600}}, {@in=@loopback, @in6=@local}, {{@in, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x2}}}, [@tmpl={0x84, 0x5, [{{@in6=@mcast1, 0x0, 0x3c}, 0x0, @in=@multicast1}, {{@in=@remote, 0x0, 0x3c}, 0x0, @in=@broadcast}]}]}, 0x1ac}}, 0x0) 00:28:44 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00004e7000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f}, 0xc, &(0x7f0000000440)={&(0x7f00000001c0)=ANY=[@ANYBLOB="1c00000022100100000000000061960d0100000008fe0c009d0a6be0e6d9fc638f19561d6ceb8a6c9239228215fd206cf204e07953", @ANYRES32=0x0], 0x2}, 0x1, 0x0, 0x0, 0xffffffffffffffff}, 0x0) 00:28:44 executing program 1: syz_mount_image$reiserfs(&(0x7f0000000180)='reiserfx\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[@ANYBLOB='jdev=.']) 00:28:44 executing program 2: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(&(0x7f0000000080)=@nbd={'/dev/nbd', 0x0, 0xe0000}, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000240)='hfs\x00\xe6\xa6\xe2\x06g\x96\xb3\v\xf2p\xd5:\x95*\x99\x92\xf2\xc4\x80\x1f\x01\x05\xb8e?\xbfwk\xe4\xe5\xca\x82\xeb\xb1\x04wn*\xf2\xc6\x9d\xc4!\x9e?\x83\x99\x0e\xcc\xa3\x95q.C\xee\x8dIf\xec\xbf\xe8\xb2\t\xedg\x9d\xd9\v\xce\xa3\xa3\xa5\x89F\x03\xefQ\x89\f\xeeRK\x15\xec{D\x9e\x83Z\xabTa\x8e\xcd\x01\xd0\xcfd\xf9c\x87m\xbe>\x81\xba\x9d2\x1c\a,\x12\xbf\xef\xb8m\v\xdf\x8e\xd5\xf5\x1a\xabD\xf6\xe0\x95\xf4\xfeRb_+\xeb\xf9f\xe8\\\x16\xeb\x87\x8e\x8acn4,\x80Q<\x84\xaep\xf9\xfc\x8e\x9f\xed\x06.a\xd5o\x14\r&L\xbd\xb9g\x82;+n\xd5\xcca\v\x86Z\x872\xc3c:`\xf2\x02\xc2\x92\x841\xe7\xca}\"@6}j\x0e\xb7\xa9\xbc\xf3N\xa3\xf3mbd\xfbS\x80\xe0\x11<\x7f\x84\xbe\xa2\xf9\xf7\xee\xf6\x94x\x9d\xe2{\xc5\x83\xc0M\xbb\xd4Io\r\x1c\xd7<\xc0\x84=`\xf1^Y', 0x0, 0x0) 00:28:44 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000480)=@acquire={0x1ac, 0x17, 0x1, 0x0, 0x0, {{@in=@multicast1}, @in6=@ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x805}}, {@in=@loopback, @in6=@local}, {{@in, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x2}}}, [@tmpl={0x84, 0x5, [{{@in6=@mcast1, 0x0, 0x3c}, 0x0, @in=@multicast1}, {{@in=@remote, 0x0, 0x3c}, 0x0, @in=@broadcast}]}]}, 0x1ac}}, 0x0) 00:28:44 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000180)='./control\x00', 0x0) get_thread_area(0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x3) write$binfmt_script(r0, &(0x7f0000000bc0)=ANY=[@ANYBLOB="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"], 0x145) close(r0) execve(&(0x7f0000000180)='./file0\x00', &(0x7f0000000140), &(0x7f0000000140)) r1 = open(&(0x7f0000000000)='./control\x00', 0x80, 0x10) statfs(&(0x7f0000000380)='./control\x00', &(0x7f00000003c0)=""/20) write$P9_RWALK(r0, &(0x7f0000000400)=ANY=[@ANYBLOB="300000006f0100030001030000000400000000000000100000000003000002000000000300000000000000e646f1c5592139cf131e2bf572fa9728dbfac0390865410f3fa1f25743c497e12cb352eac4046b4500f95cfdfb4cf22a3be5c564a47654334c01d5732d382e27bbccd9b903000000c404000000d32dbd21f3ae581d32e69ef9327f7b487d1b4f4502838c08136678bd90733173ab78d6fc264b373611f15c4393"], 0xa5) getsockopt$inet_sctp6_SCTP_RTOINFO(r1, 0x84, 0x0, &(0x7f0000000080)={0x0, 0x200, 0x2, 0xffffffff}, &(0x7f0000000100)=0x10) 00:28:44 executing program 0: syz_mount_image$reiserfs(&(0x7f0000000180)='reiserfs\f', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[@ANYBLOB='jdev=./file0,jdev=']) [ 914.612633][ T2481] nbd_handle_cmd: 10 callbacks suppressed [ 914.612650][ T2481] block nbd2: Attempted send on invalid socket [ 914.625282][ T2481] print_req_error: 10 callbacks suppressed [ 914.625309][ T2481] print_req_error: I/O error, dev nbd2, sector 2 flags 0 [ 914.638473][ T6343] hfs: can't find a HFS filesystem on dev nbd2 00:28:44 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00004e7000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f}, 0xc, &(0x7f0000000440)={&(0x7f00000001c0)=ANY=[@ANYBLOB="1c00000022600100000000000061960d0100000008fe0c009d0a6be0e6d9fc638f19561d6ceb8a6c9239228215fd206cf204e07953", @ANYRES32=0x0], 0x2}, 0x1, 0x0, 0x0, 0xffffffffffffffff}, 0x0) 00:28:44 executing program 2: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(&(0x7f0000000080)=@nbd={'/dev/nbd', 0x0, 0xe0000}, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000240)='hfs\x00\xe6\xa6\xe2\x06g\x96\xb3\v\xf2p\xd5:\x95+\x99\x92\xf2\xc4\x80\x1f\x01\x05\xb8e?\xbfwk\xe4\xe5\xca\x82\xeb\xb1\x04wn*\xf2\xc6\x9d\xc4!\x9e?\x83\x99\x0e\xcc\xa3\x95q.C\xee\x8dIf\xec\xbf\xe8\xb2\t\xedg\x9d\xd9\v\xce\xa3\xa3\xa5\x89F\x03\xefQ\x89\f\xeeRK\x15\xec{D\x9e\x83Z\xabTa\x8e\xcd\x01\xd0\xcfd\xf9c\x87m\xbe>\x81\xba\x9d2\x1c\a,\x12\xbf\xef\xb8m\v\xdf\x8e\xd5\xf5\x1a\xabD\xf6\xe0\x95\xf4\xfeRb_+\xeb\xf9f\xe8\\\x16\xeb\x87\x8e\x8acn4,\x80Q<\x84\xaep\xf9\xfc\x8e\x9f\xed\x06.a\xd5o\x14\r&L\xbd\xb9g\x82;+n\xd5\xcca\v\x86Z\x872\xc3c:`\xf2\x02\xc2\x92\x841\xe7\xca}\"@6}j\x0e\xb7\xa9\xbc\xf3N\xa3\xf3mbd\xfbS\x80\xe0\x11<\x7f\x84\xbe\xa2\xf9\xf7\xee\xf6\x94x\x9d\xe2{\xc5\x83\xc0M\xbb\xd4Io\r\x1c\xd7<\xc0\x84=`\xf1^Y', 0x0, 0x0) 00:28:44 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000480)=@acquire={0x1ac, 0x17, 0x1, 0x0, 0x0, {{@in=@multicast1}, @in6=@ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x900}}, {@in=@loopback, @in6=@local}, {{@in, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x2}}}, [@tmpl={0x84, 0x5, [{{@in6=@mcast1, 0x0, 0x3c}, 0x0, @in=@multicast1}, {{@in=@remote, 0x0, 0x3c}, 0x0, @in=@broadcast}]}]}, 0x1ac}}, 0x0) 00:28:44 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000480)=@acquire={0x1ac, 0x17, 0x1, 0x0, 0x0, {{@in=@multicast1}, @in6=@ipv4={[], [], @dev={0xac, 0x14, 0x14, 0xa00}}, {@in=@loopback, @in6=@local}, {{@in, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x2}}}, [@tmpl={0x84, 0x5, [{{@in6=@mcast1, 0x0, 0x3c}, 0x0, @in=@multicast1}, {{@in=@remote, 0x0, 0x3c}, 0x0, @in=@broadcast}]}]}, 0x1ac}}, 0x0) [ 914.844057][ T2481] block nbd2: Attempted send on invalid socket [ 914.850368][ T2481] print_req_error: I/O error, dev nbd2, sector 2 flags 0 [ 914.869964][ T6357] hfs: can't find a HFS filesystem on dev nbd2 00:28:44 executing program 2: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(&(0x7f0000000080)=@nbd={'/dev/nbd', 0x0, 0xe0000}, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000240)='hfs\x00\xe6\xa6\xe2\x06g\x96\xb3\v\xf2p\xd5:\x95-\x99\x92\xf2\xc4\x80\x1f\x01\x05\xb8e?\xbfwk\xe4\xe5\xca\x82\xeb\xb1\x04wn*\xf2\xc6\x9d\xc4!\x9e?\x83\x99\x0e\xcc\xa3\x95q.C\xee\x8dIf\xec\xbf\xe8\xb2\t\xedg\x9d\xd9\v\xce\xa3\xa3\xa5\x89F\x03\xefQ\x89\f\xeeRK\x15\xec{D\x9e\x83Z\xabTa\x8e\xcd\x01\xd0\xcfd\xf9c\x87m\xbe>\x81\xba\x9d2\x1c\a,\x12\xbf\xef\xb8m\v\xdf\x8e\xd5\xf5\x1a\xabD\xf6\xe0\x95\xf4\xfeRb_+\xeb\xf9f\xe8\\\x16\xeb\x87\x8e\x8acn4,\x80Q<\x84\xaep\xf9\xfc\x8e\x9f\xed\x06.a\xd5o\x14\r&L\xbd\xb9g\x82;+n\xd5\xcca\v\x86Z\x872\xc3c:`\xf2\x02\xc2\x92\x841\xe7\xca}\"@6}j\x0e\xb7\xa9\xbc\xf3N\xa3\xf3mbd\xfbS\x80\xe0\x11<\x7f\x84\xbe\xa2\xf9\xf7\xee\xf6\x94x\x9d\xe2{\xc5\x83\xc0M\xbb\xd4Io\r\x1c\xd7<\xc0\x84=`\xf1^Y', 0x0, 0x0) 00:28:44 executing program 1: syz_mount_image$reiserfs(&(0x7f0000000180)='reiserfy\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[@ANYBLOB='jdev=.']) 00:28:44 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000480)=@acquire={0x1ac, 0x17, 0x1, 0x0, 0x0, {{@in=@multicast1}, @in6=@ipv4={[], [], @dev={0xac, 0x14, 0x14, 0xb00}}, {@in=@loopback, @in6=@local}, {{@in, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x2}}}, [@tmpl={0x84, 0x5, [{{@in6=@mcast1, 0x0, 0x3c}, 0x0, @in=@multicast1}, {{@in=@remote, 0x0, 0x3c}, 0x0, @in=@broadcast}]}]}, 0x1ac}}, 0x0) [ 915.046162][ T2480] block nbd2: Attempted send on invalid socket [ 915.052597][ T2480] print_req_error: I/O error, dev nbd2, sector 2 flags 0 [ 915.071182][ T6375] hfs: can't find a HFS filesystem on dev nbd2 00:28:44 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00004e7000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f}, 0xc, &(0x7f0000000440)={&(0x7f00000001c0)=ANY=[@ANYBLOB="1c00000022003f00000000000061960d0100000008fe0c009d0a6be0e6d9fc638f19561d6ceb8a6c9239228215fd206cf204e07953", @ANYRES32=0x0], 0x2}, 0x1, 0x0, 0x0, 0xffffffffffffffff}, 0x0) 00:28:44 executing program 0: syz_mount_image$reiserfs(&(0x7f0000000180)='reiserfs\x10', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[@ANYBLOB='jdev=./file0,jdev=']) 00:28:44 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000180)='./control\x00', 0x0) get_thread_area(0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x3) write$binfmt_script(r0, &(0x7f0000000bc0)=ANY=[@ANYBLOB="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"], 0x145) close(r0) execve(&(0x7f0000000180)='./file0\x00', &(0x7f0000000140), &(0x7f0000000140)) r1 = open(&(0x7f0000000000)='./control\x00', 0x80, 0x10) statfs(&(0x7f0000000380)='./control\x00', &(0x7f00000003c0)=""/20) write$P9_RWALK(r0, &(0x7f0000000400)=ANY=[@ANYBLOB="300000006f0100030001030000000400000000000000100000000003000002000000000300000000000000e646f1c5592139cf131e2bf572fa9728dbfac0390865410f3fa1f25743c497e12cb352eac4046b4500f95cfdfb4cf22a3be5c564a47654334c01d5732d382e27bbccd9b903000000c404000000d32dbd21f3ae581d32e69ef9327f7b487d1b4f4502838c08136678bd90733173ab78d6fc264b373611f15c439384"], 0xa6) getsockopt$inet_sctp6_SCTP_RTOINFO(r1, 0x84, 0x0, &(0x7f0000000080)={0x0, 0x200, 0x2, 0xffffffff}, &(0x7f0000000100)=0x10) 00:28:44 executing program 2: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(&(0x7f0000000080)=@nbd={'/dev/nbd', 0x0, 0xe0000}, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000240)='hfs\x00\xe6\xa6\xe2\x06g\x96\xb3\v\xf2p\xd5:\x95.\x99\x92\xf2\xc4\x80\x1f\x01\x05\xb8e?\xbfwk\xe4\xe5\xca\x82\xeb\xb1\x04wn*\xf2\xc6\x9d\xc4!\x9e?\x83\x99\x0e\xcc\xa3\x95q.C\xee\x8dIf\xec\xbf\xe8\xb2\t\xedg\x9d\xd9\v\xce\xa3\xa3\xa5\x89F\x03\xefQ\x89\f\xeeRK\x15\xec{D\x9e\x83Z\xabTa\x8e\xcd\x01\xd0\xcfd\xf9c\x87m\xbe>\x81\xba\x9d2\x1c\a,\x12\xbf\xef\xb8m\v\xdf\x8e\xd5\xf5\x1a\xabD\xf6\xe0\x95\xf4\xfeRb_+\xeb\xf9f\xe8\\\x16\xeb\x87\x8e\x8acn4,\x80Q<\x84\xaep\xf9\xfc\x8e\x9f\xed\x06.a\xd5o\x14\r&L\xbd\xb9g\x82;+n\xd5\xcca\v\x86Z\x872\xc3c:`\xf2\x02\xc2\x92\x841\xe7\xca}\"@6}j\x0e\xb7\xa9\xbc\xf3N\xa3\xf3mbd\xfbS\x80\xe0\x11<\x7f\x84\xbe\xa2\xf9\xf7\xee\xf6\x94x\x9d\xe2{\xc5\x83\xc0M\xbb\xd4Io\r\x1c\xd7<\xc0\x84=`\xf1^Y', 0x0, 0x0) 00:28:44 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000480)=@acquire={0x1ac, 0x17, 0x1, 0x0, 0x0, {{@in=@multicast1}, @in6=@ipv4={[], [], @dev={0xac, 0x14, 0x14, 0xe00}}, {@in=@loopback, @in6=@local}, {{@in, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x2}}}, [@tmpl={0x84, 0x5, [{{@in6=@mcast1, 0x0, 0x3c}, 0x0, @in=@multicast1}, {{@in=@remote, 0x0, 0x3c}, 0x0, @in=@broadcast}]}]}, 0x1ac}}, 0x0) 00:28:45 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00004e7000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f}, 0xc, &(0x7f0000000440)={&(0x7f00000001c0)=ANY=[@ANYBLOB="1c00000022000200000000000061960d0100000008fe0c009d0a6be0e6d9fc638f19561d6ceb8a6c9239228215fd206cf204e07953", @ANYRES32=0x0], 0x2}, 0x1, 0x0, 0x0, 0xffffffffffffffff}, 0x0) 00:28:45 executing program 1: syz_mount_image$reiserfs(&(0x7f0000000180)='reiserfz\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[@ANYBLOB='jdev=.']) [ 915.349070][ T2481] block nbd2: Attempted send on invalid socket [ 915.355732][ T2481] print_req_error: I/O error, dev nbd2, sector 2 flags 0 [ 915.368949][ T6402] hfs: can't find a HFS filesystem on dev nbd2 00:28:45 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000480)=@acquire={0x1ac, 0x17, 0x1, 0x0, 0x0, {{@in=@multicast1}, @in6=@ipv4={[], [], @dev={0xac, 0x14, 0x14, 0xf00}}, {@in=@loopback, @in6=@local}, {{@in, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x2}}}, [@tmpl={0x84, 0x5, [{{@in6=@mcast1, 0x0, 0x3c}, 0x0, @in=@multicast1}, {{@in=@remote, 0x0, 0x3c}, 0x0, @in=@broadcast}]}]}, 0x1ac}}, 0x0) 00:28:45 executing program 2: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(&(0x7f0000000080)=@nbd={'/dev/nbd', 0x0, 0xe0000}, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000240)='hfs\x00\xe6\xa6\xe2\x06g\x96\xb3\v\xf2p\xd5:\x950\x99\x92\xf2\xc4\x80\x1f\x01\x05\xb8e?\xbfwk\xe4\xe5\xca\x82\xeb\xb1\x04wn*\xf2\xc6\x9d\xc4!\x9e?\x83\x99\x0e\xcc\xa3\x95q.C\xee\x8dIf\xec\xbf\xe8\xb2\t\xedg\x9d\xd9\v\xce\xa3\xa3\xa5\x89F\x03\xefQ\x89\f\xeeRK\x15\xec{D\x9e\x83Z\xabTa\x8e\xcd\x01\xd0\xcfd\xf9c\x87m\xbe>\x81\xba\x9d2\x1c\a,\x12\xbf\xef\xb8m\v\xdf\x8e\xd5\xf5\x1a\xabD\xf6\xe0\x95\xf4\xfeRb_+\xeb\xf9f\xe8\\\x16\xeb\x87\x8e\x8acn4,\x80Q<\x84\xaep\xf9\xfc\x8e\x9f\xed\x06.a\xd5o\x14\r&L\xbd\xb9g\x82;+n\xd5\xcca\v\x86Z\x872\xc3c:`\xf2\x02\xc2\x92\x841\xe7\xca}\"@6}j\x0e\xb7\xa9\xbc\xf3N\xa3\xf3mbd\xfbS\x80\xe0\x11<\x7f\x84\xbe\xa2\xf9\xf7\xee\xf6\x94x\x9d\xe2{\xc5\x83\xc0M\xbb\xd4Io\r\x1c\xd7<\xc0\x84=`\xf1^Y', 0x0, 0x0) 00:28:45 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00004e7000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f}, 0xc, &(0x7f0000000440)={&(0x7f00000001c0)=ANY=[@ANYBLOB="1c00000022000800000000000061960d0100000008fe0c009d0a6be0e6d9fc638f19561d6ceb8a6c9239228215fd206cf204e07953", @ANYRES32=0x0], 0x2}, 0x1, 0x0, 0x0, 0xffffffffffffffff}, 0x0) 00:28:45 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000180)='./control\x00', 0x0) get_thread_area(0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x3) write$binfmt_script(r0, &(0x7f0000000bc0)=ANY=[@ANYBLOB="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"], 0x145) close(r0) execve(&(0x7f0000000180)='./file0\x00', &(0x7f0000000140), &(0x7f0000000140)) r1 = open(&(0x7f0000000000)='./control\x00', 0x80, 0x10) statfs(&(0x7f0000000380)='./control\x00', &(0x7f00000003c0)=""/20) write$P9_RWALK(r0, &(0x7f0000000400)=ANY=[@ANYBLOB="300000006f0100030001030000000400000000000000100000000003000002000000000300000000000000e646f1c5592139cf131e2bf572fa9728dbfac0390865410f3fa1f25743c497e12cb352eac4046b4500f95cfdfb4cf22a3be5c564a47654334c01d5732d382e27bbccd9b903000000c404000000d32dbd21f3ae581d32e69ef9327f7b487d1b4f4502838c08136678bd90733173ab78d6fc264b373611f15c439384"], 0xa6) getsockopt$inet_sctp6_SCTP_RTOINFO(r1, 0x84, 0x0, &(0x7f0000000080)={0x0, 0x200, 0x2, 0xffffffff}, &(0x7f0000000100)=0x10) 00:28:45 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000480)=@acquire={0x1ac, 0x17, 0x1, 0x0, 0x0, {{@in=@multicast1}, @in6=@ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x1100}}, {@in=@loopback, @in6=@local}, {{@in, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x2}}}, [@tmpl={0x84, 0x5, [{{@in6=@mcast1, 0x0, 0x3c}, 0x0, @in=@multicast1}, {{@in=@remote, 0x0, 0x3c}, 0x0, @in=@broadcast}]}]}, 0x1ac}}, 0x0) 00:28:45 executing program 0: syz_mount_image$reiserfs(&(0x7f0000000180)='reiserfs\x12', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[@ANYBLOB='jdev=./file0,jdev=']) 00:28:45 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000480)=@acquire={0x1ac, 0x17, 0x1, 0x0, 0x0, {{@in=@multicast1}, @in6=@ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x1200}}, {@in=@loopback, @in6=@local}, {{@in, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x2}}}, [@tmpl={0x84, 0x5, [{{@in6=@mcast1, 0x0, 0x3c}, 0x0, @in=@multicast1}, {{@in=@remote, 0x0, 0x3c}, 0x0, @in=@broadcast}]}]}, 0x1ac}}, 0x0) [ 915.768961][ T2481] block nbd2: Attempted send on invalid socket [ 915.775357][ T2481] print_req_error: I/O error, dev nbd2, sector 2 flags 0 [ 915.782897][ T6441] hfs: can't find a HFS filesystem on dev nbd2 00:28:45 executing program 1: syz_mount_image$reiserfs(&(0x7f0000000180)='reiserfs\x02', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[@ANYBLOB='jdev=.']) 00:28:45 executing program 2: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(&(0x7f0000000080)=@nbd={'/dev/nbd', 0x0, 0xe0000}, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000240)='hfs\x00\xe6\xa6\xe2\x06g\x96\xb3\v\xf2p\xd5:\x95X\x99\x92\xf2\xc4\x80\x1f\x01\x05\xb8e?\xbfwk\xe4\xe5\xca\x82\xeb\xb1\x04wn*\xf2\xc6\x9d\xc4!\x9e?\x83\x99\x0e\xcc\xa3\x95q.C\xee\x8dIf\xec\xbf\xe8\xb2\t\xedg\x9d\xd9\v\xce\xa3\xa3\xa5\x89F\x03\xefQ\x89\f\xeeRK\x15\xec{D\x9e\x83Z\xabTa\x8e\xcd\x01\xd0\xcfd\xf9c\x87m\xbe>\x81\xba\x9d2\x1c\a,\x12\xbf\xef\xb8m\v\xdf\x8e\xd5\xf5\x1a\xabD\xf6\xe0\x95\xf4\xfeRb_+\xeb\xf9f\xe8\\\x16\xeb\x87\x8e\x8acn4,\x80Q<\x84\xaep\xf9\xfc\x8e\x9f\xed\x06.a\xd5o\x14\r&L\xbd\xb9g\x82;+n\xd5\xcca\v\x86Z\x872\xc3c:`\xf2\x02\xc2\x92\x841\xe7\xca}\"@6}j\x0e\xb7\xa9\xbc\xf3N\xa3\xf3mbd\xfbS\x80\xe0\x11<\x7f\x84\xbe\xa2\xf9\xf7\xee\xf6\x94x\x9d\xe2{\xc5\x83\xc0M\xbb\xd4Io\r\x1c\xd7<\xc0\x84=`\xf1^Y', 0x0, 0x0) 00:28:45 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00004e7000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f}, 0xc, &(0x7f0000000440)={&(0x7f00000001c0)=ANY=[@ANYBLOB="1c00000022001fffffff00000061960d0100000008fe0c009d0a6be0e6d9fc638f19561d6ceb8a6c9239228215fd206cf204e07953", @ANYRES32=0x0], 0x2}, 0x1, 0x0, 0x0, 0xffffffffffffffff}, 0x0) 00:28:45 executing program 0: syz_mount_image$reiserfs(&(0x7f0000000180)='reiserfs\x14', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[@ANYBLOB='jdev=./file0,jdev=']) 00:28:45 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000480)=@acquire={0x1ac, 0x17, 0x1, 0x0, 0x0, {{@in=@multicast1}, @in6=@ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x1300}}, {@in=@loopback, @in6=@local}, {{@in, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x2}}}, [@tmpl={0x84, 0x5, [{{@in6=@mcast1, 0x0, 0x3c}, 0x0, @in=@multicast1}, {{@in=@remote, 0x0, 0x3c}, 0x0, @in=@broadcast}]}]}, 0x1ac}}, 0x0) [ 916.029216][ T2480] block nbd2: Attempted send on invalid socket [ 916.035496][ T2480] print_req_error: I/O error, dev nbd2, sector 2 flags 0 [ 916.047912][ T6460] hfs: can't find a HFS filesystem on dev nbd2 00:28:45 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000180)='./control\x00', 0x0) get_thread_area(0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x3) write$binfmt_script(r0, &(0x7f0000000bc0)=ANY=[@ANYBLOB="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"], 0x145) close(r0) execve(&(0x7f0000000180)='./file0\x00', &(0x7f0000000140), &(0x7f0000000140)) r1 = open(&(0x7f0000000000)='./control\x00', 0x80, 0x10) statfs(&(0x7f0000000380)='./control\x00', &(0x7f00000003c0)=""/20) write$P9_RWALK(r0, &(0x7f0000000400)=ANY=[@ANYBLOB="300000006f0100030001030000000400000000000000100000000003000002000000000300000000000000e646f1c5592139cf131e2bf572fa9728dbfac0390865410f3fa1f25743c497e12cb352eac4046b4500f95cfdfb4cf22a3be5c564a47654334c01d5732d382e27bbccd9b903000000c404000000d32dbd21f3ae581d32e69ef9327f7b487d1b4f4502838c08136678bd90733173ab78d6fc264b373611f15c439384"], 0xa6) getsockopt$inet_sctp6_SCTP_RTOINFO(r1, 0x84, 0x0, &(0x7f0000000080)={0x0, 0x200, 0x2, 0xffffffff}, &(0x7f0000000100)=0x10) 00:28:45 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000480)=@acquire={0x1ac, 0x17, 0x1, 0x0, 0x0, {{@in=@multicast1}, @in6=@ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x2000}}, {@in=@loopback, @in6=@local}, {{@in, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x2}}}, [@tmpl={0x84, 0x5, [{{@in6=@mcast1, 0x0, 0x3c}, 0x0, @in=@multicast1}, {{@in=@remote, 0x0, 0x3c}, 0x0, @in=@broadcast}]}]}, 0x1ac}}, 0x0) 00:28:45 executing program 2: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(&(0x7f0000000080)=@nbd={'/dev/nbd', 0x0, 0xe0000}, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000240)='hfs\x00\xe6\xa6\xe2\x06g\x96\xb3\v\xf2p\xd5:\x95c\x99\x92\xf2\xc4\x80\x1f\x01\x05\xb8e?\xbfwk\xe4\xe5\xca\x82\xeb\xb1\x04wn*\xf2\xc6\x9d\xc4!\x9e?\x83\x99\x0e\xcc\xa3\x95q.C\xee\x8dIf\xec\xbf\xe8\xb2\t\xedg\x9d\xd9\v\xce\xa3\xa3\xa5\x89F\x03\xefQ\x89\f\xeeRK\x15\xec{D\x9e\x83Z\xabTa\x8e\xcd\x01\xd0\xcfd\xf9c\x87m\xbe>\x81\xba\x9d2\x1c\a,\x12\xbf\xef\xb8m\v\xdf\x8e\xd5\xf5\x1a\xabD\xf6\xe0\x95\xf4\xfeRb_+\xeb\xf9f\xe8\\\x16\xeb\x87\x8e\x8acn4,\x80Q<\x84\xaep\xf9\xfc\x8e\x9f\xed\x06.a\xd5o\x14\r&L\xbd\xb9g\x82;+n\xd5\xcca\v\x86Z\x872\xc3c:`\xf2\x02\xc2\x92\x841\xe7\xca}\"@6}j\x0e\xb7\xa9\xbc\xf3N\xa3\xf3mbd\xfbS\x80\xe0\x11<\x7f\x84\xbe\xa2\xf9\xf7\xee\xf6\x94x\x9d\xe2{\xc5\x83\xc0M\xbb\xd4Io\r\x1c\xd7<\xc0\x84=`\xf1^Y', 0x0, 0x0) 00:28:45 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00004e7000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f}, 0xc, &(0x7f0000000440)={&(0x7f00000001c0)=ANY=[@ANYBLOB="1c00000022000102000000000061960d0100000008fe0c009d0a6be0e6d9fc638f19561d6ceb8a6c9239228215fd206cf204e07953", @ANYRES32=0x0], 0x2}, 0x1, 0x0, 0x0, 0xffffffffffffffff}, 0x0) 00:28:46 executing program 0: syz_mount_image$reiserfs(&(0x7f0000000180)='reiserfs$', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[@ANYBLOB='jdev=./file0,jdev=']) 00:28:46 executing program 1: syz_mount_image$reiserfs(&(0x7f0000000180)='reiserfs\x03', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[@ANYBLOB='jdev=.']) 00:28:46 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000480)=@acquire={0x1ac, 0x17, 0x1, 0x0, 0x0, {{@in=@multicast1}, @in6=@ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x6000}}, {@in=@loopback, @in6=@local}, {{@in, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x2}}}, [@tmpl={0x84, 0x5, [{{@in6=@mcast1, 0x0, 0x3c}, 0x0, @in=@multicast1}, {{@in=@remote, 0x0, 0x3c}, 0x0, @in=@broadcast}]}]}, 0x1ac}}, 0x0) [ 916.397056][ T2481] block nbd2: Attempted send on invalid socket [ 916.403577][ T2481] print_req_error: I/O error, dev nbd2, sector 2 flags 0 [ 916.412261][ T6487] hfs: can't find a HFS filesystem on dev nbd2 00:28:46 executing program 2: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(&(0x7f0000000080)=@nbd={'/dev/nbd', 0x0, 0xe0000}, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000240)='hfs\x00\xe6\xa6\xe2\x06g\x96\xb3\v\xf2p\xd5:\x95d\x99\x92\xf2\xc4\x80\x1f\x01\x05\xb8e?\xbfwk\xe4\xe5\xca\x82\xeb\xb1\x04wn*\xf2\xc6\x9d\xc4!\x9e?\x83\x99\x0e\xcc\xa3\x95q.C\xee\x8dIf\xec\xbf\xe8\xb2\t\xedg\x9d\xd9\v\xce\xa3\xa3\xa5\x89F\x03\xefQ\x89\f\xeeRK\x15\xec{D\x9e\x83Z\xabTa\x8e\xcd\x01\xd0\xcfd\xf9c\x87m\xbe>\x81\xba\x9d2\x1c\a,\x12\xbf\xef\xb8m\v\xdf\x8e\xd5\xf5\x1a\xabD\xf6\xe0\x95\xf4\xfeRb_+\xeb\xf9f\xe8\\\x16\xeb\x87\x8e\x8acn4,\x80Q<\x84\xaep\xf9\xfc\x8e\x9f\xed\x06.a\xd5o\x14\r&L\xbd\xb9g\x82;+n\xd5\xcca\v\x86Z\x872\xc3c:`\xf2\x02\xc2\x92\x841\xe7\xca}\"@6}j\x0e\xb7\xa9\xbc\xf3N\xa3\xf3mbd\xfbS\x80\xe0\x11<\x7f\x84\xbe\xa2\xf9\xf7\xee\xf6\x94x\x9d\xe2{\xc5\x83\xc0M\xbb\xd4Io\r\x1c\xd7<\xc0\x84=`\xf1^Y', 0x0, 0x0) 00:28:46 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00004e7000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f}, 0xc, &(0x7f0000000440)={&(0x7f00000001c0)=ANY=[@ANYBLOB="1c00000022000104000000000061960d0100000008fe0c009d0a6be0e6d9fc638f19561d6ceb8a6c9239228215fd206cf204e07953", @ANYRES32=0x0], 0x2}, 0x1, 0x0, 0x0, 0xffffffffffffffff}, 0x0) 00:28:46 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000180)='./control\x00', 0x0) get_thread_area(0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x3) write$binfmt_script(r0, &(0x7f0000000bc0)=ANY=[@ANYBLOB="2321202e2f66696c6530202357994f66e76f4d0fe2208456ebfa69074cb94144c95c4375644bd1747e34c127d80575d10a599f851dc7ad26f3fa377c0a53cc7be2512b7493bf864ecf3f13e46032dbbf3af349b06321cec7a0652f4a5768256cd01a2d3d52de67dc459409a1e50ca51334791c8690646f7a1962ccefc0592a163bacf13da16978ca48eb3784c5baa40700ebfddde7e115f9388051297af49e38e0e3210d232e108a7e9b69c2e56676484906d975d537d128607c901050484e2bdb0d042a40c8ff8f4727cde00677ea73dac796f06f6f7ef7b3406723e7da9fb469c4ce44faff2888c779c000000000000000000000dc4fd7f68b303f980ed08fb24c8052b0626c8b3733eeee64a90f35fd7d88f958406cb5a8ed3b20b7d1278e15c1e1012befbc45a45f203503128d3a99b80bc2c744ae4b8509ca0149b48dc3e11c2d5db4"], 0x145) close(r0) execve(&(0x7f0000000180)='./file0\x00', &(0x7f0000000140), &(0x7f0000000140)) r1 = open(&(0x7f0000000000)='./control\x00', 0x80, 0x10) statfs(&(0x7f0000000380)='./control\x00', &(0x7f00000003c0)=""/20) write$P9_RWALK(r0, &(0x7f0000000400)=ANY=[@ANYBLOB="300000006f0100030001030000000400000000000000100000000003000002000000000300000000000000e646f1c5592139cf131e2bf572fa9728dbfac0390865410f3fa1f25743c497e12cb352eac4046b4500f95cfdfb4cf22a3be5c564a47654334c01d5732d382e27bbccd9b903000000c404000000d32dbd21f3ae581d32e69ef9327f7b487d1b4f4502838c08136678bd90733173ab78d6fc264b373611f15c439384"], 0xa6) getsockopt$inet_sctp6_SCTP_RTOINFO(r1, 0x84, 0x0, &(0x7f0000000080)={0x0, 0x200, 0x2, 0xffffffff}, &(0x7f0000000100)=0x10) 00:28:46 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000480)=@acquire={0x1ac, 0x17, 0x1, 0x0, 0x0, {{@in=@multicast1}, @in6=@ipv4={[], [], @dev={0xac, 0x14, 0x14, 0xf000}}, {@in=@loopback, @in6=@local}, {{@in, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x2}}}, [@tmpl={0x84, 0x5, [{{@in6=@mcast1, 0x0, 0x3c}, 0x0, @in=@multicast1}, {{@in=@remote, 0x0, 0x3c}, 0x0, @in=@broadcast}]}]}, 0x1ac}}, 0x0) 00:28:46 executing program 0: syz_mount_image$reiserfs(&(0x7f0000000180)='reiserfs,', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[@ANYBLOB='jdev=./file0,jdev=']) 00:28:46 executing program 1: syz_mount_image$reiserfs(&(0x7f0000000180)='reiserfs\x04', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[@ANYBLOB='jdev=.']) [ 916.798547][ T2481] block nbd2: Attempted send on invalid socket [ 916.804797][ T2481] print_req_error: I/O error, dev nbd2, sector 2 flags 0 [ 916.812618][ T6513] hfs: can't find a HFS filesystem on dev nbd2 00:28:46 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000480)=@acquire={0x1ac, 0x17, 0x1, 0x0, 0x0, {{@in=@multicast1}, @in6=@ipv4={[], [], @dev={0xac, 0x14, 0x14, 0xf0ffff}}, {@in=@loopback, @in6=@local}, {{@in, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x2}}}, [@tmpl={0x84, 0x5, [{{@in6=@mcast1, 0x0, 0x3c}, 0x0, @in=@multicast1}, {{@in=@remote, 0x0, 0x3c}, 0x0, @in=@broadcast}]}]}, 0x1ac}}, 0x0) 00:28:46 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00004e7000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f}, 0xc, &(0x7f0000000440)={&(0x7f00000001c0)=ANY=[@ANYBLOB="1c00000022000108000000000061960d0100000008fe0c009d0a6be0e6d9fc638f19561d6ceb8a6c9239228215fd206cf204e07953", @ANYRES32=0x0], 0x2}, 0x1, 0x0, 0x0, 0xffffffffffffffff}, 0x0) 00:28:46 executing program 2: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(&(0x7f0000000080)=@nbd={'/dev/nbd', 0x0, 0xe0000}, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000240)='hfs\x00\xe6\xa6\xe2\x06g\x96\xb3\v\xf2p\xd5:\x95i\x99\x92\xf2\xc4\x80\x1f\x01\x05\xb8e?\xbfwk\xe4\xe5\xca\x82\xeb\xb1\x04wn*\xf2\xc6\x9d\xc4!\x9e?\x83\x99\x0e\xcc\xa3\x95q.C\xee\x8dIf\xec\xbf\xe8\xb2\t\xedg\x9d\xd9\v\xce\xa3\xa3\xa5\x89F\x03\xefQ\x89\f\xeeRK\x15\xec{D\x9e\x83Z\xabTa\x8e\xcd\x01\xd0\xcfd\xf9c\x87m\xbe>\x81\xba\x9d2\x1c\a,\x12\xbf\xef\xb8m\v\xdf\x8e\xd5\xf5\x1a\xabD\xf6\xe0\x95\xf4\xfeRb_+\xeb\xf9f\xe8\\\x16\xeb\x87\x8e\x8acn4,\x80Q<\x84\xaep\xf9\xfc\x8e\x9f\xed\x06.a\xd5o\x14\r&L\xbd\xb9g\x82;+n\xd5\xcca\v\x86Z\x872\xc3c:`\xf2\x02\xc2\x92\x841\xe7\xca}\"@6}j\x0e\xb7\xa9\xbc\xf3N\xa3\xf3mbd\xfbS\x80\xe0\x11<\x7f\x84\xbe\xa2\xf9\xf7\xee\xf6\x94x\x9d\xe2{\xc5\x83\xc0M\xbb\xd4Io\r\x1c\xd7<\xc0\x84=`\xf1^Y', 0x0, 0x0) 00:28:46 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000480)=@acquire={0x1ac, 0x17, 0x1, 0x0, 0x0, {{@in=@multicast1}, @in6=@ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x1000000}}, {@in=@loopback, @in6=@local}, {{@in, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x2}}}, [@tmpl={0x84, 0x5, [{{@in6=@mcast1, 0x0, 0x3c}, 0x0, @in=@multicast1}, {{@in=@remote, 0x0, 0x3c}, 0x0, @in=@broadcast}]}]}, 0x1ac}}, 0x0) 00:28:46 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000180)='./control\x00', 0x0) get_thread_area(0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x3) write$binfmt_script(r0, &(0x7f0000000bc0)=ANY=[@ANYBLOB="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"], 0x145) close(r0) execve(&(0x7f0000000180)='./file0\x00', &(0x7f0000000140), &(0x7f0000000140)) r1 = open(&(0x7f0000000000)='./control\x00', 0x80, 0x10) statfs(&(0x7f0000000380)='./control\x00', &(0x7f00000003c0)=""/20) write$P9_RWALK(r0, &(0x7f0000000400)=ANY=[@ANYBLOB="300000006f0100030001030000000400000000000000100000000003000002000000000300000000000000e646f1c5592139cf131e2bf572fa9728dbfac0390865410f3fa1f25743c497e12cb352eac4046b4500f95cfdfb4cf22a3be5c564a47654334c01d5732d382e27bbccd9b903000000c404000000d32dbd21f3ae581d32e69ef9327f7b487d1b4f4502838c08136678bd90733173ab78d6fc264b373611f15c439384"], 0xa6) getsockopt$inet_sctp6_SCTP_RTOINFO(r1, 0x84, 0x0, &(0x7f0000000080)={0x0, 0x200, 0x2, 0xffffffff}, &(0x7f0000000100)=0x10) [ 917.057179][ T2480] block nbd2: Attempted send on invalid socket [ 917.064109][ T2480] print_req_error: I/O error, dev nbd2, sector 2 flags 0 [ 917.072633][ T6539] hfs: can't find a HFS filesystem on dev nbd2 00:28:46 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00004e7000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f}, 0xc, &(0x7f0000000440)={&(0x7f00000001c0)=ANY=[@ANYBLOB="1c0000002200010a000000000061960d0100000008fe0c009d0a6be0e6d9fc638f19561d6ceb8a6c9239228215fd206cf204e07953", @ANYRES32=0x0], 0x2}, 0x1, 0x0, 0x0, 0xffffffffffffffff}, 0x0) 00:28:46 executing program 2: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(&(0x7f0000000080)=@nbd={'/dev/nbd', 0x0, 0xe0000}, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000240)='hfs\x00\xe6\xa6\xe2\x06g\x96\xb3\v\xf2p\xd5:\x95l\x99\x92\xf2\xc4\x80\x1f\x01\x05\xb8e?\xbfwk\xe4\xe5\xca\x82\xeb\xb1\x04wn*\xf2\xc6\x9d\xc4!\x9e?\x83\x99\x0e\xcc\xa3\x95q.C\xee\x8dIf\xec\xbf\xe8\xb2\t\xedg\x9d\xd9\v\xce\xa3\xa3\xa5\x89F\x03\xefQ\x89\f\xeeRK\x15\xec{D\x9e\x83Z\xabTa\x8e\xcd\x01\xd0\xcfd\xf9c\x87m\xbe>\x81\xba\x9d2\x1c\a,\x12\xbf\xef\xb8m\v\xdf\x8e\xd5\xf5\x1a\xabD\xf6\xe0\x95\xf4\xfeRb_+\xeb\xf9f\xe8\\\x16\xeb\x87\x8e\x8acn4,\x80Q<\x84\xaep\xf9\xfc\x8e\x9f\xed\x06.a\xd5o\x14\r&L\xbd\xb9g\x82;+n\xd5\xcca\v\x86Z\x872\xc3c:`\xf2\x02\xc2\x92\x841\xe7\xca}\"@6}j\x0e\xb7\xa9\xbc\xf3N\xa3\xf3mbd\xfbS\x80\xe0\x11<\x7f\x84\xbe\xa2\xf9\xf7\xee\xf6\x94x\x9d\xe2{\xc5\x83\xc0M\xbb\xd4Io\r\x1c\xd7<\xc0\x84=`\xf1^Y', 0x0, 0x0) 00:28:46 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000480)=@acquire={0x1ac, 0x17, 0x1, 0x0, 0x0, {{@in=@multicast1}, @in6=@ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x2000000}}, {@in=@loopback, @in6=@local}, {{@in, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x2}}}, [@tmpl={0x84, 0x5, [{{@in6=@mcast1, 0x0, 0x3c}, 0x0, @in=@multicast1}, {{@in=@remote, 0x0, 0x3c}, 0x0, @in=@broadcast}]}]}, 0x1ac}}, 0x0) 00:28:46 executing program 0: syz_mount_image$reiserfs(&(0x7f0000000180)='reiserfs4', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[@ANYBLOB='jdev=./file0,jdev=']) 00:28:47 executing program 1: syz_mount_image$reiserfs(&(0x7f0000000180)='reiserfs\x05', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[@ANYBLOB='jdev=.']) [ 917.281604][ T2480] block nbd2: Attempted send on invalid socket [ 917.288057][ T2480] print_req_error: I/O error, dev nbd2, sector 2 flags 0 [ 917.297113][ T6558] hfs: can't find a HFS filesystem on dev nbd2 00:28:47 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00004e7000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f}, 0xc, &(0x7f0000000440)={&(0x7f00000001c0)=ANY=[@ANYBLOB="1c0000002200010e000000000061960d0100000008fe0c009d0a6be0e6d9fc638f19561d6ceb8a6c9239228215fd206cf204e07953", @ANYRES32=0x0], 0x2}, 0x1, 0x0, 0x0, 0xffffffffffffffff}, 0x0) 00:28:47 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000480)=@acquire={0x1ac, 0x17, 0x1, 0x0, 0x0, {{@in=@multicast1}, @in6=@ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x3000000}}, {@in=@loopback, @in6=@local}, {{@in, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x2}}}, [@tmpl={0x84, 0x5, [{{@in6=@mcast1, 0x0, 0x3c}, 0x0, @in=@multicast1}, {{@in=@remote, 0x0, 0x3c}, 0x0, @in=@broadcast}]}]}, 0x1ac}}, 0x0) 00:28:47 executing program 2: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(&(0x7f0000000080)=@nbd={'/dev/nbd', 0x0, 0xe0000}, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000240)='hfs\x00\xe6\xa6\xe2\x06g\x96\xb3\v\xf2p\xd5:\x95o\x99\x92\xf2\xc4\x80\x1f\x01\x05\xb8e?\xbfwk\xe4\xe5\xca\x82\xeb\xb1\x04wn*\xf2\xc6\x9d\xc4!\x9e?\x83\x99\x0e\xcc\xa3\x95q.C\xee\x8dIf\xec\xbf\xe8\xb2\t\xedg\x9d\xd9\v\xce\xa3\xa3\xa5\x89F\x03\xefQ\x89\f\xeeRK\x15\xec{D\x9e\x83Z\xabTa\x8e\xcd\x01\xd0\xcfd\xf9c\x87m\xbe>\x81\xba\x9d2\x1c\a,\x12\xbf\xef\xb8m\v\xdf\x8e\xd5\xf5\x1a\xabD\xf6\xe0\x95\xf4\xfeRb_+\xeb\xf9f\xe8\\\x16\xeb\x87\x8e\x8acn4,\x80Q<\x84\xaep\xf9\xfc\x8e\x9f\xed\x06.a\xd5o\x14\r&L\xbd\xb9g\x82;+n\xd5\xcca\v\x86Z\x872\xc3c:`\xf2\x02\xc2\x92\x841\xe7\xca}\"@6}j\x0e\xb7\xa9\xbc\xf3N\xa3\xf3mbd\xfbS\x80\xe0\x11<\x7f\x84\xbe\xa2\xf9\xf7\xee\xf6\x94x\x9d\xe2{\xc5\x83\xc0M\xbb\xd4Io\r\x1c\xd7<\xc0\x84=`\xf1^Y', 0x0, 0x0) 00:28:47 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000180)='./control\x00', 0x0) get_thread_area(0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x3) write$binfmt_script(r0, &(0x7f0000000bc0)=ANY=[@ANYBLOB="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"], 0x145) close(r0) execve(&(0x7f0000000180)='./file0\x00', &(0x7f0000000140), &(0x7f0000000140)) r1 = open(&(0x7f0000000000)='./control\x00', 0x80, 0x10) statfs(&(0x7f0000000380)='./control\x00', &(0x7f00000003c0)=""/20) write$P9_RWALK(r0, &(0x7f0000000400)=ANY=[@ANYBLOB="300000006f0100030001030000000400000000000000100000000003000002000000000300000000000000e646f1c5592139cf131e2bf572fa9728dbfac0390865410f3fa1f25743c497e12cb352eac4046b4500f95cfdfb4cf22a3be5c564a47654334c01d5732d382e27bbccd9b903000000c404000000d32dbd21f3ae581d32e69ef9327f7b487d1b4f4502838c08136678bd90733173ab78d6fc264b373611f15c439384"], 0xa6) getsockopt$inet_sctp6_SCTP_RTOINFO(r1, 0x84, 0x0, &(0x7f0000000080)={0x0, 0x200, 0x2, 0xffffffff}, &(0x7f0000000100)=0x10) 00:28:47 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000480)=@acquire={0x1ac, 0x17, 0x1, 0x0, 0x0, {{@in=@multicast1}, @in6=@ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x4000000}}, {@in=@loopback, @in6=@local}, {{@in, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x2}}}, [@tmpl={0x84, 0x5, [{{@in6=@mcast1, 0x0, 0x3c}, 0x0, @in=@multicast1}, {{@in=@remote, 0x0, 0x3c}, 0x0, @in=@broadcast}]}]}, 0x1ac}}, 0x0) [ 917.530726][ T6582] hfs: can't find a HFS filesystem on dev nbd2 00:28:47 executing program 2: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(&(0x7f0000000080)=@nbd={'/dev/nbd', 0x0, 0xe0000}, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000240)='hfs\x00\xe6\xa6\xe2\x06g\x96\xb3\v\xf2p\xd5:\x95s\x99\x92\xf2\xc4\x80\x1f\x01\x05\xb8e?\xbfwk\xe4\xe5\xca\x82\xeb\xb1\x04wn*\xf2\xc6\x9d\xc4!\x9e?\x83\x99\x0e\xcc\xa3\x95q.C\xee\x8dIf\xec\xbf\xe8\xb2\t\xedg\x9d\xd9\v\xce\xa3\xa3\xa5\x89F\x03\xefQ\x89\f\xeeRK\x15\xec{D\x9e\x83Z\xabTa\x8e\xcd\x01\xd0\xcfd\xf9c\x87m\xbe>\x81\xba\x9d2\x1c\a,\x12\xbf\xef\xb8m\v\xdf\x8e\xd5\xf5\x1a\xabD\xf6\xe0\x95\xf4\xfeRb_+\xeb\xf9f\xe8\\\x16\xeb\x87\x8e\x8acn4,\x80Q<\x84\xaep\xf9\xfc\x8e\x9f\xed\x06.a\xd5o\x14\r&L\xbd\xb9g\x82;+n\xd5\xcca\v\x86Z\x872\xc3c:`\xf2\x02\xc2\x92\x841\xe7\xca}\"@6}j\x0e\xb7\xa9\xbc\xf3N\xa3\xf3mbd\xfbS\x80\xe0\x11<\x7f\x84\xbe\xa2\xf9\xf7\xee\xf6\x94x\x9d\xe2{\xc5\x83\xc0M\xbb\xd4Io\r\x1c\xd7<\xc0\x84=`\xf1^Y', 0x0, 0x0) 00:28:47 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00004e7000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f}, 0xc, &(0x7f0000000440)={&(0x7f00000001c0)=ANY=[@ANYBLOB="1c00000022000110000000000061960d0100000008fe0c009d0a6be0e6d9fc638f19561d6ceb8a6c9239228215fd206cf204e07953", @ANYRES32=0x0], 0x2}, 0x1, 0x0, 0x0, 0xffffffffffffffff}, 0x0) 00:28:47 executing program 0: syz_mount_image$reiserfs(&(0x7f0000000180)='reiserfs>', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[@ANYBLOB='jdev=./file0,jdev=']) 00:28:47 executing program 1: syz_mount_image$reiserfs(&(0x7f0000000180)='reiserfs\x06', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[@ANYBLOB='jdev=.']) [ 917.797855][ T6601] hfs: can't find a HFS filesystem on dev nbd2 00:28:47 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000480)=@acquire={0x1ac, 0x17, 0x1, 0x0, 0x0, {{@in=@multicast1}, @in6=@ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x5000000}}, {@in=@loopback, @in6=@local}, {{@in, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x2}}}, [@tmpl={0x84, 0x5, [{{@in6=@mcast1, 0x0, 0x3c}, 0x0, @in=@multicast1}, {{@in=@remote, 0x0, 0x3c}, 0x0, @in=@broadcast}]}]}, 0x1ac}}, 0x0) 00:28:47 executing program 2: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(&(0x7f0000000080)=@nbd={'/dev/nbd', 0x0, 0xe0000}, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000240)='hfs\x00\xe6\xa6\xe2\x06g\x96\xb3\v\xf2p\xd5:\x95u\x99\x92\xf2\xc4\x80\x1f\x01\x05\xb8e?\xbfwk\xe4\xe5\xca\x82\xeb\xb1\x04wn*\xf2\xc6\x9d\xc4!\x9e?\x83\x99\x0e\xcc\xa3\x95q.C\xee\x8dIf\xec\xbf\xe8\xb2\t\xedg\x9d\xd9\v\xce\xa3\xa3\xa5\x89F\x03\xefQ\x89\f\xeeRK\x15\xec{D\x9e\x83Z\xabTa\x8e\xcd\x01\xd0\xcfd\xf9c\x87m\xbe>\x81\xba\x9d2\x1c\a,\x12\xbf\xef\xb8m\v\xdf\x8e\xd5\xf5\x1a\xabD\xf6\xe0\x95\xf4\xfeRb_+\xeb\xf9f\xe8\\\x16\xeb\x87\x8e\x8acn4,\x80Q<\x84\xaep\xf9\xfc\x8e\x9f\xed\x06.a\xd5o\x14\r&L\xbd\xb9g\x82;+n\xd5\xcca\v\x86Z\x872\xc3c:`\xf2\x02\xc2\x92\x841\xe7\xca}\"@6}j\x0e\xb7\xa9\xbc\xf3N\xa3\xf3mbd\xfbS\x80\xe0\x11<\x7f\x84\xbe\xa2\xf9\xf7\xee\xf6\x94x\x9d\xe2{\xc5\x83\xc0M\xbb\xd4Io\r\x1c\xd7<\xc0\x84=`\xf1^Y', 0x0, 0x0) 00:28:47 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00004e7000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f}, 0xc, &(0x7f0000000440)={&(0x7f00000001c0)=ANY=[@ANYBLOB="1c00000022000160000000000061960d0100000008fe0c009d0a6be0e6d9fc638f19561d6ceb8a6c9239228215fd206cf204e07953", @ANYRES32=0x0], 0x2}, 0x1, 0x0, 0x0, 0xffffffffffffffff}, 0x0) 00:28:47 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000480)=@acquire={0x1ac, 0x17, 0x1, 0x0, 0x0, {{@in=@multicast1}, @in6=@ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x6000000}}, {@in=@loopback, @in6=@local}, {{@in, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x2}}}, [@tmpl={0x84, 0x5, [{{@in6=@mcast1, 0x0, 0x3c}, 0x0, @in=@multicast1}, {{@in=@remote, 0x0, 0x3c}, 0x0, @in=@broadcast}]}]}, 0x1ac}}, 0x0) 00:28:47 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000180)='./control\x00', 0x0) get_thread_area(0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x3) write$binfmt_script(r0, &(0x7f0000000bc0)=ANY=[@ANYBLOB="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"], 0x145) close(r0) execve(&(0x7f0000000180)='./file0\x00', &(0x7f0000000140), &(0x7f0000000140)) r1 = open(&(0x7f0000000000)='./control\x00', 0x80, 0x10) statfs(&(0x7f0000000380)='./control\x00', &(0x7f00000003c0)=""/20) write$P9_RWALK(r0, &(0x7f0000000400)=ANY=[@ANYBLOB="300000006f0100030001030000000400000000000000100000000003000002000000000300000000000000e646f1c5592139cf131e2bf572fa9728dbfac0390865410f3fa1f25743c497e12cb352eac4046b4500f95cfdfb4cf22a3be5c564a47654334c01d5732d382e27bbccd9b903000000c404000000d32dbd21f3ae581d32e69ef9327f7b487d1b4f4502838c08136678bd90733173ab78d6fc264b373611f15c439384"], 0xa6) getsockopt$inet_sctp6_SCTP_RTOINFO(r1, 0x84, 0x0, &(0x7f0000000080)={0x0, 0x200, 0x2, 0xffffffff}, &(0x7f0000000100)=0x10) [ 918.133094][ T6621] hfs: can't find a HFS filesystem on dev nbd2 00:28:47 executing program 0: syz_mount_image$reiserfs(&(0x7f0000000180)='reiserfsB', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[@ANYBLOB='jdev=./file0,jdev=']) 00:28:48 executing program 2: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(&(0x7f0000000080)=@nbd={'/dev/nbd', 0x0, 0xe0000}, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000240)='hfs\x00\xe6\xa6\xe2\x06g\x96\xb3\v\xf2p\xd5:\x95x\x99\x92\xf2\xc4\x80\x1f\x01\x05\xb8e?\xbfwk\xe4\xe5\xca\x82\xeb\xb1\x04wn*\xf2\xc6\x9d\xc4!\x9e?\x83\x99\x0e\xcc\xa3\x95q.C\xee\x8dIf\xec\xbf\xe8\xb2\t\xedg\x9d\xd9\v\xce\xa3\xa3\xa5\x89F\x03\xefQ\x89\f\xeeRK\x15\xec{D\x9e\x83Z\xabTa\x8e\xcd\x01\xd0\xcfd\xf9c\x87m\xbe>\x81\xba\x9d2\x1c\a,\x12\xbf\xef\xb8m\v\xdf\x8e\xd5\xf5\x1a\xabD\xf6\xe0\x95\xf4\xfeRb_+\xeb\xf9f\xe8\\\x16\xeb\x87\x8e\x8acn4,\x80Q<\x84\xaep\xf9\xfc\x8e\x9f\xed\x06.a\xd5o\x14\r&L\xbd\xb9g\x82;+n\xd5\xcca\v\x86Z\x872\xc3c:`\xf2\x02\xc2\x92\x841\xe7\xca}\"@6}j\x0e\xb7\xa9\xbc\xf3N\xa3\xf3mbd\xfbS\x80\xe0\x11<\x7f\x84\xbe\xa2\xf9\xf7\xee\xf6\x94x\x9d\xe2{\xc5\x83\xc0M\xbb\xd4Io\r\x1c\xd7<\xc0\x84=`\xf1^Y', 0x0, 0x0) 00:28:48 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000480)=@acquire={0x1ac, 0x17, 0x1, 0x0, 0x0, {{@in=@multicast1}, @in6=@ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x8000000}}, {@in=@loopback, @in6=@local}, {{@in, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x2}}}, [@tmpl={0x84, 0x5, [{{@in6=@mcast1, 0x0, 0x3c}, 0x0, @in=@multicast1}, {{@in=@remote, 0x0, 0x3c}, 0x0, @in=@broadcast}]}]}, 0x1ac}}, 0x0) 00:28:48 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00004e7000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f}, 0xc, &(0x7f0000000440)={&(0x7f00000001c0)=ANY=[@ANYBLOB="1c000000220001f0000000000061960d0100000008fe0c009d0a6be0e6d9fc638f19561d6ceb8a6c9239228215fd206cf204e07953", @ANYRES32=0x0], 0x2}, 0x1, 0x0, 0x0, 0xffffffffffffffff}, 0x0) 00:28:48 executing program 1: syz_mount_image$reiserfs(&(0x7f0000000180)='reiserfs\a', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[@ANYBLOB='jdev=.']) [ 918.437321][ T6647] hfs: can't find a HFS filesystem on dev nbd2 00:28:48 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000480)=@acquire={0x1ac, 0x17, 0x1, 0x0, 0x0, {{@in=@multicast1}, @in6=@ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x8050000}}, {@in=@loopback, @in6=@local}, {{@in, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x2}}}, [@tmpl={0x84, 0x5, [{{@in6=@mcast1, 0x0, 0x3c}, 0x0, @in=@multicast1}, {{@in=@remote, 0x0, 0x3c}, 0x0, @in=@broadcast}]}]}, 0x1ac}}, 0x0) 00:28:48 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000180)='./control\x00', 0x0) get_thread_area(0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x3) write$binfmt_script(r0, &(0x7f0000000bc0)=ANY=[@ANYBLOB="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"], 0x145) close(r0) execve(&(0x7f0000000180)='./file0\x00', &(0x7f0000000140), &(0x7f0000000140)) r1 = open(&(0x7f0000000000)='./control\x00', 0x80, 0x10) statfs(&(0x7f0000000380)='./control\x00', &(0x7f00000003c0)=""/20) write$P9_RWALK(r0, &(0x7f0000000400)=ANY=[@ANYBLOB="300000006f0100030001030000000400000000000000100000000003000002000000000300000000000000e646f1c5592139cf131e2bf572fa9728dbfac0390865410f3fa1f25743c497e12cb352eac4046b4500f95cfdfb4cf22a3be5c564a47654334c01d5732d382e27bbccd9b903000000c404000000d32dbd21f3ae581d32e69ef9327f7b487d1b4f4502838c08136678bd90733173ab78d6fc264b"], 0x9e) getsockopt$inet_sctp6_SCTP_RTOINFO(r1, 0x84, 0x0, &(0x7f0000000080)={0x0, 0x200, 0x2, 0xffffffff}, &(0x7f0000000100)=0x10) 00:28:48 executing program 2: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(&(0x7f0000000080)=@nbd={'/dev/nbd', 0x0, 0xe0000}, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000240)='hfs\x00\xe6\xa6\xe2\x06g\x96\xb3\v\xf2p\xd5:\x95p\x99\x92\xf1\xc4\x80\x1f\x01\x05\xb8e?\xbfwk\xe4\xe5\xca\x82\xeb\xb1\x04wn*\xf2\xc6\x9d\xc4!\x9e?\x83\x99\x0e\xcc\xa3\x95q.C\xee\x8dIf\xec\xbf\xe8\xb2\t\xedg\x9d\xd9\v\xce\xa3\xa3\xa5\x89F\x03\xefQ\x89\f\xeeRK\x15\xec{D\x9e\x83Z\xabTa\x8e\xcd\x01\xd0\xcfd\xf9c\x87m\xbe>\x81\xba\x9d2\x1c\a,\x12\xbf\xef\xb8m\v\xdf\x8e\xd5\xf5\x1a\xabD\xf6\xe0\x95\xf4\xfeRb_+\xeb\xf9f\xe8\\\x16\xeb\x87\x8e\x8acn4,\x80Q<\x84\xaep\xf9\xfc\x8e\x9f\xed\x06.a\xd5o\x14\r&L\xbd\xb9g\x82;+n\xd5\xcca\v\x86Z\x872\xc3c:`\xf2\x02\xc2\x92\x841\xe7\xca}\"@6}j\x0e\xb7\xa9\xbc\xf3N\xa3\xf3mbd\xfbS\x80\xe0\x11<\x7f\x84\xbe\xa2\xf9\xf7\xee\xf6\x94x\x9d\xe2{\xc5\x83\xc0M\xbb\xd4Io\r\x1c\xd7<\xc0\x84=`\xf1^Y', 0x0, 0x0) 00:28:48 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000480)=@acquire={0x1ac, 0x17, 0x1, 0x0, 0x0, {{@in=@multicast1}, @in6=@ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x9000000}}, {@in=@loopback, @in6=@local}, {{@in, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x2}}}, [@tmpl={0x84, 0x5, [{{@in6=@mcast1, 0x0, 0x3c}, 0x0, @in=@multicast1}, {{@in=@remote, 0x0, 0x3c}, 0x0, @in=@broadcast}]}]}, 0x1ac}}, 0x0) 00:28:48 executing program 0: syz_mount_image$reiserfs(&(0x7f0000000180)='reiserfsH', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[@ANYBLOB='jdev=./file0,jdev=']) 00:28:48 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00004e7000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f}, 0xc, &(0x7f0000000440)={&(0x7f00000001c0)=ANY=[@ANYBLOB="1c000000220001000a0000000061960d0100000008fe0c009d0a6be0e6d9fc638f19561d6ceb8a6c9239228215fd206cf204e07953", @ANYRES32=0x0], 0x2}, 0x1, 0x0, 0x0, 0xffffffffffffffff}, 0x0) [ 918.767123][ T6669] hfs: can't find a HFS filesystem on dev nbd2 00:28:48 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000180)='./control\x00', 0x0) get_thread_area(0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x3) write$binfmt_script(r0, &(0x7f0000000bc0)=ANY=[@ANYBLOB="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"], 0x145) close(r0) execve(&(0x7f0000000180)='./file0\x00', &(0x7f0000000140), &(0x7f0000000140)) r1 = open(&(0x7f0000000000)='./control\x00', 0x80, 0x10) statfs(&(0x7f0000000380)='./control\x00', &(0x7f00000003c0)=""/20) write$P9_RWALK(r0, &(0x7f0000000400)=ANY=[@ANYBLOB="300000006f0100030001030000000400000000000000100000000003000002000000000300000000000000e646f1c5592139cf131e2bf572fa9728dbfac0390865410f3fa1f25743c497e12cb352eac4046b4500f95cfdfb4cf22a3be5c564a47654334c01d5732d382e27bbccd9b903000000c404000000d32dbd21f3ae581d32e69ef9327f7b487d1b4f4502838c08136678bd90733173ab78d6fc264b"], 0x9e) getsockopt$inet_sctp6_SCTP_RTOINFO(r1, 0x84, 0x0, &(0x7f0000000080)={0x0, 0x200, 0x2, 0xffffffff}, &(0x7f0000000100)=0x10) 00:28:48 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000480)=@acquire={0x1ac, 0x17, 0x1, 0x0, 0x0, {{@in=@multicast1}, @in6=@ipv4={[], [], @dev={0xac, 0x14, 0x14, 0xa000000}}, {@in=@loopback, @in6=@local}, {{@in, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x2}}}, [@tmpl={0x84, 0x5, [{{@in6=@mcast1, 0x0, 0x3c}, 0x0, @in=@multicast1}, {{@in=@remote, 0x0, 0x3c}, 0x0, @in=@broadcast}]}]}, 0x1ac}}, 0x0) 00:28:48 executing program 2: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(&(0x7f0000000080)=@nbd={'/dev/nbd', 0x0, 0xe0000}, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000240)='hfs\x00\xe6\xa6\xe2\x06g\x96\xb3\v\xf2p\xd5:\x95p\x99\x92\xf3\xc4\x80\x1f\x01\x05\xb8e?\xbfwk\xe4\xe5\xca\x82\xeb\xb1\x04wn*\xf2\xc6\x9d\xc4!\x9e?\x83\x99\x0e\xcc\xa3\x95q.C\xee\x8dIf\xec\xbf\xe8\xb2\t\xedg\x9d\xd9\v\xce\xa3\xa3\xa5\x89F\x03\xefQ\x89\f\xeeRK\x15\xec{D\x9e\x83Z\xabTa\x8e\xcd\x01\xd0\xcfd\xf9c\x87m\xbe>\x81\xba\x9d2\x1c\a,\x12\xbf\xef\xb8m\v\xdf\x8e\xd5\xf5\x1a\xabD\xf6\xe0\x95\xf4\xfeRb_+\xeb\xf9f\xe8\\\x16\xeb\x87\x8e\x8acn4,\x80Q<\x84\xaep\xf9\xfc\x8e\x9f\xed\x06.a\xd5o\x14\r&L\xbd\xb9g\x82;+n\xd5\xcca\v\x86Z\x872\xc3c:`\xf2\x02\xc2\x92\x841\xe7\xca}\"@6}j\x0e\xb7\xa9\xbc\xf3N\xa3\xf3mbd\xfbS\x80\xe0\x11<\x7f\x84\xbe\xa2\xf9\xf7\xee\xf6\x94x\x9d\xe2{\xc5\x83\xc0M\xbb\xd4Io\r\x1c\xd7<\xc0\x84=`\xf1^Y', 0x0, 0x0) 00:28:48 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00004e7000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f}, 0xc, &(0x7f0000000440)={&(0x7f00000001c0)=ANY=[@ANYBLOB="1c000000220001b00a0000000061960d0100000008fe0c009d0a6be0e6d9fc638f19561d6ceb8a6c9239228215fd206cf204e07953", @ANYRES32=0x0], 0x2}, 0x1, 0x0, 0x0, 0xffffffffffffffff}, 0x0) 00:28:48 executing program 1: syz_mount_image$reiserfs(&(0x7f0000000180)='reiserfs\b', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[@ANYBLOB='jdev=.']) 00:28:48 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000480)=@acquire={0x1ac, 0x17, 0x1, 0x0, 0x0, {{@in=@multicast1}, @in6=@ipv4={[], [], @dev={0xac, 0x14, 0x14, 0xb000000}}, {@in=@loopback, @in6=@local}, {{@in, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x2}}}, [@tmpl={0x84, 0x5, [{{@in6=@mcast1, 0x0, 0x3c}, 0x0, @in=@multicast1}, {{@in=@remote, 0x0, 0x3c}, 0x0, @in=@broadcast}]}]}, 0x1ac}}, 0x0) [ 918.964898][ T6693] hfs: can't find a HFS filesystem on dev nbd2 00:28:48 executing program 2: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(&(0x7f0000000080)=@nbd={'/dev/nbd', 0x0, 0xe0000}, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000240)='hfs\x00\xe6\xa6\xe2\x06g\x96\xb3\v\xf2p\xd5:\x95p\x99\x92\xf2\xc3\x80\x1f\x01\x05\xb8e?\xbfwk\xe4\xe5\xca\x82\xeb\xb1\x04wn*\xf2\xc6\x9d\xc4!\x9e?\x83\x99\x0e\xcc\xa3\x95q.C\xee\x8dIf\xec\xbf\xe8\xb2\t\xedg\x9d\xd9\v\xce\xa3\xa3\xa5\x89F\x03\xefQ\x89\f\xeeRK\x15\xec{D\x9e\x83Z\xabTa\x8e\xcd\x01\xd0\xcfd\xf9c\x87m\xbe>\x81\xba\x9d2\x1c\a,\x12\xbf\xef\xb8m\v\xdf\x8e\xd5\xf5\x1a\xabD\xf6\xe0\x95\xf4\xfeRb_+\xeb\xf9f\xe8\\\x16\xeb\x87\x8e\x8acn4,\x80Q<\x84\xaep\xf9\xfc\x8e\x9f\xed\x06.a\xd5o\x14\r&L\xbd\xb9g\x82;+n\xd5\xcca\v\x86Z\x872\xc3c:`\xf2\x02\xc2\x92\x841\xe7\xca}\"@6}j\x0e\xb7\xa9\xbc\xf3N\xa3\xf3mbd\xfbS\x80\xe0\x11<\x7f\x84\xbe\xa2\xf9\xf7\xee\xf6\x94x\x9d\xe2{\xc5\x83\xc0M\xbb\xd4Io\r\x1c\xd7<\xc0\x84=`\xf1^Y', 0x0, 0x0) 00:28:48 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000480)=@acquire={0x1ac, 0x17, 0x1, 0x0, 0x0, {{@in=@multicast1}, @in6=@ipv4={[], [], @dev={0xac, 0x14, 0x14, 0xe000000}}, {@in=@loopback, @in6=@local}, {{@in, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x2}}}, [@tmpl={0x84, 0x5, [{{@in6=@mcast1, 0x0, 0x3c}, 0x0, @in=@multicast1}, {{@in=@remote, 0x0, 0x3c}, 0x0, @in=@broadcast}]}]}, 0x1ac}}, 0x0) 00:28:48 executing program 0: syz_mount_image$reiserfs(&(0x7f0000000180)='reiserfsL', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[@ANYBLOB='jdev=./file0,jdev=']) 00:28:48 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00004e7000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f, 0x0, 0x400000000000000}, 0xc, &(0x7f0000000440)={&(0x7f00000001c0)=ANY=[@ANYBLOB="1c00000022000100000000000061960d0100000008fe0c009d0a6be0e6d9fc638f19561d6ceb8a6c9239228215fd206cf204e07953", @ANYRES32=0x0], 0x2}, 0x1, 0x0, 0x0, 0xffffffffffffffff}, 0x0) 00:28:48 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00004e7000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f}, 0xc, &(0x7f0000000440)={&(0x7f00000001c0)=ANY=[@ANYBLOB="1c000000220001000e0000000061960d0100000008fe0c009d0a6be0e6d9fc638f19561d6ceb8a6c9239228215fd206cf204e07953", @ANYRES32=0x0], 0x2}, 0x1, 0x0, 0x0, 0xffffffffffffffff}, 0x0) 00:28:49 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000480)=@acquire={0x1ac, 0x17, 0x1, 0x0, 0x0, {{@in=@multicast1}, @in6=@ipv4={[], [], @dev={0xac, 0x14, 0x14, 0xf000000}}, {@in=@loopback, @in6=@local}, {{@in, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x2}}}, [@tmpl={0x84, 0x5, [{{@in6=@mcast1, 0x0, 0x3c}, 0x0, @in=@multicast1}, {{@in=@remote, 0x0, 0x3c}, 0x0, @in=@broadcast}]}]}, 0x1ac}}, 0x0) [ 919.306635][ T6718] hfs: can't find a HFS filesystem on dev nbd2 00:28:49 executing program 2: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(&(0x7f0000000080)=@nbd={'/dev/nbd', 0x0, 0xe0000}, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000240)='hfs\x00\xe6\xa6\xe2\x06g\x96\xb3\v\xf2p\xd5:\x95p\x99\x92\xf2\xc5\x80\x1f\x01\x05\xb8e?\xbfwk\xe4\xe5\xca\x82\xeb\xb1\x04wn*\xf2\xc6\x9d\xc4!\x9e?\x83\x99\x0e\xcc\xa3\x95q.C\xee\x8dIf\xec\xbf\xe8\xb2\t\xedg\x9d\xd9\v\xce\xa3\xa3\xa5\x89F\x03\xefQ\x89\f\xeeRK\x15\xec{D\x9e\x83Z\xabTa\x8e\xcd\x01\xd0\xcfd\xf9c\x87m\xbe>\x81\xba\x9d2\x1c\a,\x12\xbf\xef\xb8m\v\xdf\x8e\xd5\xf5\x1a\xabD\xf6\xe0\x95\xf4\xfeRb_+\xeb\xf9f\xe8\\\x16\xeb\x87\x8e\x8acn4,\x80Q<\x84\xaep\xf9\xfc\x8e\x9f\xed\x06.a\xd5o\x14\r&L\xbd\xb9g\x82;+n\xd5\xcca\v\x86Z\x872\xc3c:`\xf2\x02\xc2\x92\x841\xe7\xca}\"@6}j\x0e\xb7\xa9\xbc\xf3N\xa3\xf3mbd\xfbS\x80\xe0\x11<\x7f\x84\xbe\xa2\xf9\xf7\xee\xf6\x94x\x9d\xe2{\xc5\x83\xc0M\xbb\xd4Io\r\x1c\xd7<\xc0\x84=`\xf1^Y', 0x0, 0x0) 00:28:49 executing program 1: syz_mount_image$reiserfs(&(0x7f0000000180)='reiserfs\t', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[@ANYBLOB='jdev=.']) 00:28:49 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00004e7000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f}, 0xc, &(0x7f0000000440)={&(0x7f00000001c0)=ANY=[@ANYBLOB="1c00000022000100600000000061960d0100000008fe0c009d0a6be0e6d9fc638f19561d6ceb8a6c9239228215fd206cf204e07953", @ANYRES32=0x0], 0x2}, 0x1, 0x0, 0x0, 0xffffffffffffffff}, 0x0) 00:28:49 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000180)='./control\x00', 0x0) get_thread_area(0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x3) write$binfmt_script(r0, &(0x7f0000000bc0)=ANY=[@ANYBLOB="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"], 0x145) close(r0) execve(&(0x7f0000000180)='./file0\x00', &(0x7f0000000140), &(0x7f0000000140)) r1 = open(&(0x7f0000000000)='./control\x00', 0x80, 0x10) statfs(&(0x7f0000000380)='./control\x00', &(0x7f00000003c0)=""/20) write$P9_RWALK(r0, &(0x7f0000000400)=ANY=[@ANYBLOB="300000006f0100030001030000000400000000000000100000000003000002000000000300000000000000e646f1c5592139cf131e2bf572fa9728dbfac0390865410f3fa1f25743c497e12cb352eac4046b4500f95cfdfb4cf22a3be5c564a47654334c01d5732d382e27bbccd9b903000000c404000000d32dbd21f3ae581d32e69ef9327f7b487d1b4f4502838c08136678bd"], 0x94) getsockopt$inet_sctp6_SCTP_RTOINFO(r1, 0x84, 0x0, &(0x7f0000000080)={0x0, 0x200, 0x2, 0xffffffff}, &(0x7f0000000100)=0x10) 00:28:49 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000480)=@acquire={0x1ac, 0x17, 0x1, 0x0, 0x0, {{@in=@multicast1}, @in6=@ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x10000000}}, {@in=@loopback, @in6=@local}, {{@in, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x2}}}, [@tmpl={0x84, 0x5, [{{@in6=@mcast1, 0x0, 0x3c}, 0x0, @in=@multicast1}, {{@in=@remote, 0x0, 0x3c}, 0x0, @in=@broadcast}]}]}, 0x1ac}}, 0x0) [ 919.571169][ T6747] hfs: can't find a HFS filesystem on dev nbd2 00:28:49 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000480)=@acquire={0x1ac, 0x17, 0x1, 0x0, 0x0, {{@in=@multicast1}, @in6=@ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x11000000}}, {@in=@loopback, @in6=@local}, {{@in, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x2}}}, [@tmpl={0x84, 0x5, [{{@in6=@mcast1, 0x0, 0x3c}, 0x0, @in=@multicast1}, {{@in=@remote, 0x0, 0x3c}, 0x0, @in=@broadcast}]}]}, 0x1ac}}, 0x0) 00:28:49 executing program 0: syz_mount_image$reiserfs(&(0x7f0000000180)='reiserfs`', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[@ANYBLOB='jdev=./file0,jdev=']) 00:28:49 executing program 2: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(&(0x7f0000000080)=@nbd={'/dev/nbd', 0x0, 0xe0000}, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000240)='hfs\x00\xe6\xa6\xe2\x06g\x96\xb3\v\xf2p\xd5:\x95p\x99\x92\xf2\xc4\x80\x1f\x02\x05\xb8e?\xbfwk\xe4\xe5\xca\x82\xeb\xb1\x04wn*\xf2\xc6\x9d\xc4!\x9e?\x83\x99\x0e\xcc\xa3\x95q.C\xee\x8dIf\xec\xbf\xe8\xb2\t\xedg\x9d\xd9\v\xce\xa3\xa3\xa5\x89F\x03\xefQ\x89\f\xeeRK\x15\xec{D\x9e\x83Z\xabTa\x8e\xcd\x01\xd0\xcfd\xf9c\x87m\xbe>\x81\xba\x9d2\x1c\a,\x12\xbf\xef\xb8m\v\xdf\x8e\xd5\xf5\x1a\xabD\xf6\xe0\x95\xf4\xfeRb_+\xeb\xf9f\xe8\\\x16\xeb\x87\x8e\x8acn4,\x80Q<\x84\xaep\xf9\xfc\x8e\x9f\xed\x06.a\xd5o\x14\r&L\xbd\xb9g\x82;+n\xd5\xcca\v\x86Z\x872\xc3c:`\xf2\x02\xc2\x92\x841\xe7\xca}\"@6}j\x0e\xb7\xa9\xbc\xf3N\xa3\xf3mbd\xfbS\x80\xe0\x11<\x7f\x84\xbe\xa2\xf9\xf7\xee\xf6\x94x\x9d\xe2{\xc5\x83\xc0M\xbb\xd4Io\r\x1c\xd7<\xc0\x84=`\xf1^Y', 0x0, 0x0) 00:28:49 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00004e7000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f}, 0xc, &(0x7f0000000440)={&(0x7f00000001c0)=ANY=[@ANYBLOB="1c0000002200010ab00000000061960d0100000008fe0c009d0a6be0e6d9fc638f19561d6ceb8a6c9239228215fd206cf204e07953", @ANYRES32=0x0], 0x2}, 0x1, 0x0, 0x0, 0xffffffffffffffff}, 0x0) 00:28:49 executing program 1: syz_mount_image$reiserfs(&(0x7f0000000180)='reiserfs\n', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[@ANYBLOB='jdev=.']) 00:28:49 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000480)=@acquire={0x1ac, 0x17, 0x1, 0x0, 0x0, {{@in=@multicast1}, @in6=@ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x12000000}}, {@in=@loopback, @in6=@local}, {{@in, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x2}}}, [@tmpl={0x84, 0x5, [{{@in6=@mcast1, 0x0, 0x3c}, 0x0, @in=@multicast1}, {{@in=@remote, 0x0, 0x3c}, 0x0, @in=@broadcast}]}]}, 0x1ac}}, 0x0) 00:28:49 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000180)='./control\x00', 0x0) get_thread_area(0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x3) write$binfmt_script(r0, &(0x7f0000000bc0)=ANY=[@ANYBLOB="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"], 0x145) close(r0) execve(&(0x7f0000000180)='./file0\x00', &(0x7f0000000140), &(0x7f0000000140)) r1 = open(&(0x7f0000000000)='./control\x00', 0x80, 0x10) statfs(&(0x7f0000000380)='./control\x00', &(0x7f00000003c0)=""/20) write$P9_RWALK(r0, &(0x7f0000000400)=ANY=[@ANYBLOB='0'], 0x1) getsockopt$inet_sctp6_SCTP_RTOINFO(r1, 0x84, 0x0, &(0x7f0000000080)={0x0, 0x200, 0x2, 0xffffffff}, &(0x7f0000000100)=0x10) [ 919.842800][ T2480] nbd_handle_cmd: 8 callbacks suppressed [ 919.842816][ T2480] block nbd2: Attempted send on invalid socket [ 919.854783][ T2480] print_req_error: 8 callbacks suppressed [ 919.854792][ T2480] print_req_error: I/O error, dev nbd2, sector 2 flags 0 [ 919.868379][ T6767] hfs: can't find a HFS filesystem on dev nbd2 00:28:49 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000480)=@acquire={0x1ac, 0x17, 0x1, 0x0, 0x0, {{@in=@multicast1}, @in6=@ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x13000000}}, {@in=@loopback, @in6=@local}, {{@in, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x2}}}, [@tmpl={0x84, 0x5, [{{@in6=@mcast1, 0x0, 0x3c}, 0x0, @in=@multicast1}, {{@in=@remote, 0x0, 0x3c}, 0x0, @in=@broadcast}]}]}, 0x1ac}}, 0x0) 00:28:49 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00004e7000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f}, 0xc, &(0x7f0000000440)={&(0x7f00000001c0)=ANY=[@ANYBLOB="1c00000022000100f00000000061960d0100000008fe0c009d0a6be0e6d9fc638f19561d6ceb8a6c9239228215fd206cf204e07953", @ANYRES32=0x0], 0x2}, 0x1, 0x0, 0x0, 0xffffffffffffffff}, 0x0) 00:28:49 executing program 2: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(&(0x7f0000000080)=@nbd={'/dev/nbd', 0x0, 0xe0000}, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000240)='hfs\x00\xe6\xa6\xe2\x06g\x96\xb3\v\xf2p\xd5:\x95p\x99\x92\xf2\xc4\x80\x1f\x03\x05\xb8e?\xbfwk\xe4\xe5\xca\x82\xeb\xb1\x04wn*\xf2\xc6\x9d\xc4!\x9e?\x83\x99\x0e\xcc\xa3\x95q.C\xee\x8dIf\xec\xbf\xe8\xb2\t\xedg\x9d\xd9\v\xce\xa3\xa3\xa5\x89F\x03\xefQ\x89\f\xeeRK\x15\xec{D\x9e\x83Z\xabTa\x8e\xcd\x01\xd0\xcfd\xf9c\x87m\xbe>\x81\xba\x9d2\x1c\a,\x12\xbf\xef\xb8m\v\xdf\x8e\xd5\xf5\x1a\xabD\xf6\xe0\x95\xf4\xfeRb_+\xeb\xf9f\xe8\\\x16\xeb\x87\x8e\x8acn4,\x80Q<\x84\xaep\xf9\xfc\x8e\x9f\xed\x06.a\xd5o\x14\r&L\xbd\xb9g\x82;+n\xd5\xcca\v\x86Z\x872\xc3c:`\xf2\x02\xc2\x92\x841\xe7\xca}\"@6}j\x0e\xb7\xa9\xbc\xf3N\xa3\xf3mbd\xfbS\x80\xe0\x11<\x7f\x84\xbe\xa2\xf9\xf7\xee\xf6\x94x\x9d\xe2{\xc5\x83\xc0M\xbb\xd4Io\r\x1c\xd7<\xc0\x84=`\xf1^Y', 0x0, 0x0) 00:28:49 executing program 1: syz_mount_image$reiserfs(&(0x7f0000000180)='reiserfs\f', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[@ANYBLOB='jdev=.']) [ 920.141957][ T2481] block nbd2: Attempted send on invalid socket [ 920.148244][ T2481] print_req_error: I/O error, dev nbd2, sector 2 flags 0 [ 920.155811][ T6794] hfs: can't find a HFS filesystem on dev nbd2 00:28:49 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000480)=@acquire={0x1ac, 0x17, 0x1, 0x0, 0x0, {{@in=@multicast1}, @in6=@ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x20000000}}, {@in=@loopback, @in6=@local}, {{@in, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x2}}}, [@tmpl={0x84, 0x5, [{{@in6=@mcast1, 0x0, 0x3c}, 0x0, @in=@multicast1}, {{@in=@remote, 0x0, 0x3c}, 0x0, @in=@broadcast}]}]}, 0x1ac}}, 0x0) 00:28:49 executing program 0: syz_mount_image$reiserfs(&(0x7f0000000180)='reiserfsb', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[@ANYBLOB='jdev=./file0,jdev=']) 00:28:50 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000480)=@acquire={0x1ac, 0x17, 0x1, 0x0, 0x0, {{@in=@multicast1}, @in6=@ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x60000000}}, {@in=@loopback, @in6=@local}, {{@in, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x2}}}, [@tmpl={0x84, 0x5, [{{@in6=@mcast1, 0x0, 0x3c}, 0x0, @in=@multicast1}, {{@in=@remote, 0x0, 0x3c}, 0x0, @in=@broadcast}]}]}, 0x1ac}}, 0x0) 00:28:50 executing program 2: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(&(0x7f0000000080)=@nbd={'/dev/nbd', 0x0, 0xe0000}, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000240)='hfs\x00\xe6\xa6\xe2\x06g\x96\xb3\v\xf2p\xd5:\x95p\x99\x92\xf2\xc4\x80\x1f\x04\x05\xb8e?\xbfwk\xe4\xe5\xca\x82\xeb\xb1\x04wn*\xf2\xc6\x9d\xc4!\x9e?\x83\x99\x0e\xcc\xa3\x95q.C\xee\x8dIf\xec\xbf\xe8\xb2\t\xedg\x9d\xd9\v\xce\xa3\xa3\xa5\x89F\x03\xefQ\x89\f\xeeRK\x15\xec{D\x9e\x83Z\xabTa\x8e\xcd\x01\xd0\xcfd\xf9c\x87m\xbe>\x81\xba\x9d2\x1c\a,\x12\xbf\xef\xb8m\v\xdf\x8e\xd5\xf5\x1a\xabD\xf6\xe0\x95\xf4\xfeRb_+\xeb\xf9f\xe8\\\x16\xeb\x87\x8e\x8acn4,\x80Q<\x84\xaep\xf9\xfc\x8e\x9f\xed\x06.a\xd5o\x14\r&L\xbd\xb9g\x82;+n\xd5\xcca\v\x86Z\x872\xc3c:`\xf2\x02\xc2\x92\x841\xe7\xca}\"@6}j\x0e\xb7\xa9\xbc\xf3N\xa3\xf3mbd\xfbS\x80\xe0\x11<\x7f\x84\xbe\xa2\xf9\xf7\xee\xf6\x94x\x9d\xe2{\xc5\x83\xc0M\xbb\xd4Io\r\x1c\xd7<\xc0\x84=`\xf1^Y', 0x0, 0x0) 00:28:50 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00004e7000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f}, 0xc, &(0x7f0000000440)={&(0x7f00000001c0)=ANY=[@ANYBLOB="1c000000220001fffff000000061960d0100000008fe0c009d0a6be0e6d9fc638f19561d6ceb8a6c9239228215fd206cf204e07953", @ANYRES32=0x0], 0x2}, 0x1, 0x0, 0x0, 0xffffffffffffffff}, 0x0) 00:28:50 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000480)=@acquire={0x1ac, 0x17, 0x1, 0x0, 0x0, {{@in=@multicast1}, @in6=@ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x9effffff}}, {@in=@loopback, @in6=@local}, {{@in, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x2}}}, [@tmpl={0x84, 0x5, [{{@in6=@mcast1, 0x0, 0x3c}, 0x0, @in=@multicast1}, {{@in=@remote, 0x0, 0x3c}, 0x0, @in=@broadcast}]}]}, 0x1ac}}, 0x0) [ 920.444943][ T2480] block nbd2: Attempted send on invalid socket [ 920.451259][ T2480] print_req_error: I/O error, dev nbd2, sector 2 flags 0 [ 920.492101][ T6816] hfs: can't find a HFS filesystem on dev nbd2 00:28:50 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00004e7000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f}, 0xc, &(0x7f0000000440)={&(0x7f00000001c0)=ANY=[@ANYBLOB="1c00000022000100000001000061960d0100000008fe0c009d0a6be0e6d9fc638f19561d6ceb8a6c9239228215fd206cf204e07953", @ANYRES32=0x0], 0x2}, 0x1, 0x0, 0x0, 0xffffffffffffffff}, 0x0) 00:28:50 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000180)='./control\x00', 0x0) get_thread_area(0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x3) write$binfmt_script(r0, &(0x7f0000000bc0)=ANY=[@ANYBLOB="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"], 0x145) close(r0) execve(&(0x7f0000000180)='./file0\x00', &(0x7f0000000140), &(0x7f0000000140)) r1 = open(&(0x7f0000000000)='./control\x00', 0x80, 0x10) statfs(&(0x7f0000000380)='./control\x00', &(0x7f00000003c0)=""/20) write$P9_RWALK(r0, &(0x7f0000000400)=ANY=[@ANYBLOB='0'], 0x1) getsockopt$inet_sctp6_SCTP_RTOINFO(r1, 0x84, 0x0, &(0x7f0000000080)={0x0, 0x200, 0x2, 0xffffffff}, &(0x7f0000000100)=0x10) 00:28:50 executing program 1: syz_mount_image$reiserfs(&(0x7f0000000180)='reiserfs\x10', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[@ANYBLOB='jdev=.']) 00:28:50 executing program 0: syz_mount_image$reiserfs(&(0x7f0000000180)='reiserfsd', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[@ANYBLOB='jdev=./file0,jdev=']) 00:28:50 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000480)=@acquire={0x1ac, 0x17, 0x1, 0x0, 0x0, {{@in=@multicast1}, @in6=@ipv4={[], [], @dev={0xac, 0x14, 0x14, 0xf0ffffff}}, {@in=@loopback, @in6=@local}, {{@in, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x2}}}, [@tmpl={0x84, 0x5, [{{@in6=@mcast1, 0x0, 0x3c}, 0x0, @in=@multicast1}, {{@in=@remote, 0x0, 0x3c}, 0x0, @in=@broadcast}]}]}, 0x1ac}}, 0x0) 00:28:50 executing program 2: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(&(0x7f0000000080)=@nbd={'/dev/nbd', 0x0, 0xe0000}, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000240)='hfs\x00\xe6\xa6\xe2\x06g\x96\xb3\v\xf2p\xd5:\x95p\x99\x92\xf2\xc4\x80\x1f\x05\x05\xb8e?\xbfwk\xe4\xe5\xca\x82\xeb\xb1\x04wn*\xf2\xc6\x9d\xc4!\x9e?\x83\x99\x0e\xcc\xa3\x95q.C\xee\x8dIf\xec\xbf\xe8\xb2\t\xedg\x9d\xd9\v\xce\xa3\xa3\xa5\x89F\x03\xefQ\x89\f\xeeRK\x15\xec{D\x9e\x83Z\xabTa\x8e\xcd\x01\xd0\xcfd\xf9c\x87m\xbe>\x81\xba\x9d2\x1c\a,\x12\xbf\xef\xb8m\v\xdf\x8e\xd5\xf5\x1a\xabD\xf6\xe0\x95\xf4\xfeRb_+\xeb\xf9f\xe8\\\x16\xeb\x87\x8e\x8acn4,\x80Q<\x84\xaep\xf9\xfc\x8e\x9f\xed\x06.a\xd5o\x14\r&L\xbd\xb9g\x82;+n\xd5\xcca\v\x86Z\x872\xc3c:`\xf2\x02\xc2\x92\x841\xe7\xca}\"@6}j\x0e\xb7\xa9\xbc\xf3N\xa3\xf3mbd\xfbS\x80\xe0\x11<\x7f\x84\xbe\xa2\xf9\xf7\xee\xf6\x94x\x9d\xe2{\xc5\x83\xc0M\xbb\xd4Io\r\x1c\xd7<\xc0\x84=`\xf1^Y', 0x0, 0x0) [ 920.797607][ T2481] block nbd2: Attempted send on invalid socket [ 920.804021][ T2481] print_req_error: I/O error, dev nbd2, sector 2 flags 0 [ 920.805413][ T6844] hfs: can't find a HFS filesystem on dev nbd2 00:28:50 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000480)=@acquire={0x1ac, 0x17, 0x1, 0x0, 0x0, {{@in=@multicast1}, @in6=@ipv4={[], [], @dev={0xac, 0x14, 0x14, 0xfcffffff}}, {@in=@loopback, @in6=@local}, {{@in, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x2}}}, [@tmpl={0x84, 0x5, [{{@in6=@mcast1, 0x0, 0x3c}, 0x0, @in=@multicast1}, {{@in=@remote, 0x0, 0x3c}, 0x0, @in=@broadcast}]}]}, 0x1ac}}, 0x0) 00:28:50 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00004e7000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f}, 0xc, &(0x7f0000000440)={&(0x7f00000001c0)=ANY=[@ANYBLOB="1c00000022000100000002000061960d0100000008fe0c009d0a6be0e6d9fc638f19561d6ceb8a6c9239228215fd206cf204e07953", @ANYRES32=0x0], 0x2}, 0x1, 0x0, 0x0, 0xffffffffffffffff}, 0x0) 00:28:50 executing program 2: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(&(0x7f0000000080)=@nbd={'/dev/nbd', 0x0, 0xe0000}, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000240)='hfs\x00\xe6\xa6\xe2\x06g\x96\xb3\v\xf2p\xd5:\x95p\x99\x92\xf2\xc4\x80\x1f\x06\x05\xb8e?\xbfwk\xe4\xe5\xca\x82\xeb\xb1\x04wn*\xf2\xc6\x9d\xc4!\x9e?\x83\x99\x0e\xcc\xa3\x95q.C\xee\x8dIf\xec\xbf\xe8\xb2\t\xedg\x9d\xd9\v\xce\xa3\xa3\xa5\x89F\x03\xefQ\x89\f\xeeRK\x15\xec{D\x9e\x83Z\xabTa\x8e\xcd\x01\xd0\xcfd\xf9c\x87m\xbe>\x81\xba\x9d2\x1c\a,\x12\xbf\xef\xb8m\v\xdf\x8e\xd5\xf5\x1a\xabD\xf6\xe0\x95\xf4\xfeRb_+\xeb\xf9f\xe8\\\x16\xeb\x87\x8e\x8acn4,\x80Q<\x84\xaep\xf9\xfc\x8e\x9f\xed\x06.a\xd5o\x14\r&L\xbd\xb9g\x82;+n\xd5\xcca\v\x86Z\x872\xc3c:`\xf2\x02\xc2\x92\x841\xe7\xca}\"@6}j\x0e\xb7\xa9\xbc\xf3N\xa3\xf3mbd\xfbS\x80\xe0\x11<\x7f\x84\xbe\xa2\xf9\xf7\xee\xf6\x94x\x9d\xe2{\xc5\x83\xc0M\xbb\xd4Io\r\x1c\xd7<\xc0\x84=`\xf1^Y', 0x0, 0x0) 00:28:50 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00004e7000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f}, 0xc, &(0x7f0000000440)={&(0x7f00000001c0)=ANY=[@ANYBLOB="1c00000022000100000004000061960d0100000008fe0c009d0a6be0e6d9fc638f19561d6ceb8a6c9239228215fd206cf204e07953", @ANYRES32=0x0], 0x2}, 0x1, 0x0, 0x0, 0xffffffffffffffff}, 0x0) 00:28:50 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000480)=@acquire={0x1ac, 0x17, 0x1, 0x0, 0x0, {{@in=@multicast1}, @in6=@ipv4={[], [], @dev={0xac, 0x14, 0x14, 0xfffff000}}, {@in=@loopback, @in6=@local}, {{@in, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x2}}}, [@tmpl={0x84, 0x5, [{{@in6=@mcast1, 0x0, 0x3c}, 0x0, @in=@multicast1}, {{@in=@remote, 0x0, 0x3c}, 0x0, @in=@broadcast}]}]}, 0x1ac}}, 0x0) 00:28:50 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000180)='./control\x00', 0x0) get_thread_area(0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x3) write$binfmt_script(r0, &(0x7f0000000bc0)=ANY=[@ANYBLOB="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"], 0x145) close(r0) execve(&(0x7f0000000180)='./file0\x00', &(0x7f0000000140), &(0x7f0000000140)) r1 = open(&(0x7f0000000000)='./control\x00', 0x80, 0x10) statfs(&(0x7f0000000380)='./control\x00', &(0x7f00000003c0)=""/20) write$P9_RWALK(r0, &(0x7f0000000400)=ANY=[@ANYBLOB="300000006f0100030001030000000400000000000000100000000003000002000000000300000000000000e646f1c5592139cf131e2bf572fa9728dbfac0390865410f3fa1f25743c497e12cb352eac4046b4500f95cfdfb4cf22a3be5c564a47654334c01d5732d382e27bbccd9b903000000c404000000d32dbd21f3ae581d32e69ef9327f7b487d1b4f4502838c08136678bd90733173ab78d6fc264b373611f15c439384ede8"], 0xa8) getsockopt$inet_sctp6_SCTP_RTOINFO(r1, 0x84, 0x0, &(0x7f0000000080)={0x0, 0x200, 0x2, 0xffffffff}, &(0x7f0000000100)=0x10) [ 921.039714][ T2481] block nbd2: Attempted send on invalid socket [ 921.046299][ T2481] print_req_error: I/O error, dev nbd2, sector 2 flags 0 [ 921.054881][ T6865] hfs: can't find a HFS filesystem on dev nbd2 00:28:50 executing program 1: syz_mount_image$reiserfs(&(0x7f0000000180)='reiserfs\x12', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[@ANYBLOB='jdev=.']) 00:28:50 executing program 2: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(&(0x7f0000000080)=@nbd={'/dev/nbd', 0x0, 0xe0000}, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000240)='hfs\x00\xe6\xa6\xe2\x06g\x96\xb3\v\xf2p\xd5:\x95p\x99\x92\xf2\xc4\x80\x1f\n\x05\xb8e?\xbfwk\xe4\xe5\xca\x82\xeb\xb1\x04wn*\xf2\xc6\x9d\xc4!\x9e?\x83\x99\x0e\xcc\xa3\x95q.C\xee\x8dIf\xec\xbf\xe8\xb2\t\xedg\x9d\xd9\v\xce\xa3\xa3\xa5\x89F\x03\xefQ\x89\f\xeeRK\x15\xec{D\x9e\x83Z\xabTa\x8e\xcd\x01\xd0\xcfd\xf9c\x87m\xbe>\x81\xba\x9d2\x1c\a,\x12\xbf\xef\xb8m\v\xdf\x8e\xd5\xf5\x1a\xabD\xf6\xe0\x95\xf4\xfeRb_+\xeb\xf9f\xe8\\\x16\xeb\x87\x8e\x8acn4,\x80Q<\x84\xaep\xf9\xfc\x8e\x9f\xed\x06.a\xd5o\x14\r&L\xbd\xb9g\x82;+n\xd5\xcca\v\x86Z\x872\xc3c:`\xf2\x02\xc2\x92\x841\xe7\xca}\"@6}j\x0e\xb7\xa9\xbc\xf3N\xa3\xf3mbd\xfbS\x80\xe0\x11<\x7f\x84\xbe\xa2\xf9\xf7\xee\xf6\x94x\x9d\xe2{\xc5\x83\xc0M\xbb\xd4Io\r\x1c\xd7<\xc0\x84=`\xf1^Y', 0x0, 0x0) 00:28:50 executing program 0: syz_mount_image$reiserfs(&(0x7f0000000180)='reiserfsf', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[@ANYBLOB='jdev=./file0,jdev=']) [ 921.241339][ T2481] block nbd2: Attempted send on invalid socket [ 921.247627][ T2481] print_req_error: I/O error, dev nbd2, sector 2 flags 0 [ 921.256732][ T6877] hfs: can't find a HFS filesystem on dev nbd2 00:28:51 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000480)=@acquire={0x1ac, 0x17, 0x1, 0x0, 0x0, {{@in=@multicast1}, @in6=@ipv4={[], [], @dev={0xac, 0x14, 0x14, 0xffffff7f}}, {@in=@loopback, @in6=@local}, {{@in, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x2}}}, [@tmpl={0x84, 0x5, [{{@in6=@mcast1, 0x0, 0x3c}, 0x0, @in=@multicast1}, {{@in=@remote, 0x0, 0x3c}, 0x0, @in=@broadcast}]}]}, 0x1ac}}, 0x0) 00:28:51 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00004e7000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f}, 0xc, &(0x7f0000000440)={&(0x7f00000001c0)=ANY=[@ANYBLOB="1c00000022000100000008000061960d0100000008fe0c009d0a6be0e6d9fc638f19561d6ceb8a6c9239228215fd206cf204e07953", @ANYRES32=0x0], 0x2}, 0x1, 0x0, 0x0, 0xffffffffffffffff}, 0x0) 00:28:51 executing program 2: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(&(0x7f0000000080)=@nbd={'/dev/nbd', 0x0, 0xe0000}, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000240)='hfs\x00\xe6\xa6\xe2\x06g\x96\xb3\v\xf2p\xd5:\x95p\x99\x92\xf2\xc4\x80\x1f\x10\x05\xb8e?\xbfwk\xe4\xe5\xca\x82\xeb\xb1\x04wn*\xf2\xc6\x9d\xc4!\x9e?\x83\x99\x0e\xcc\xa3\x95q.C\xee\x8dIf\xec\xbf\xe8\xb2\t\xedg\x9d\xd9\v\xce\xa3\xa3\xa5\x89F\x03\xefQ\x89\f\xeeRK\x15\xec{D\x9e\x83Z\xabTa\x8e\xcd\x01\xd0\xcfd\xf9c\x87m\xbe>\x81\xba\x9d2\x1c\a,\x12\xbf\xef\xb8m\v\xdf\x8e\xd5\xf5\x1a\xabD\xf6\xe0\x95\xf4\xfeRb_+\xeb\xf9f\xe8\\\x16\xeb\x87\x8e\x8acn4,\x80Q<\x84\xaep\xf9\xfc\x8e\x9f\xed\x06.a\xd5o\x14\r&L\xbd\xb9g\x82;+n\xd5\xcca\v\x86Z\x872\xc3c:`\xf2\x02\xc2\x92\x841\xe7\xca}\"@6}j\x0e\xb7\xa9\xbc\xf3N\xa3\xf3mbd\xfbS\x80\xe0\x11<\x7f\x84\xbe\xa2\xf9\xf7\xee\xf6\x94x\x9d\xe2{\xc5\x83\xc0M\xbb\xd4Io\r\x1c\xd7<\xc0\x84=`\xf1^Y', 0x0, 0x0) 00:28:51 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000480)=@acquire={0x1ac, 0x17, 0x1, 0x0, 0x0, {{@in=@multicast1}, @in6=@ipv4={[], [], @dev={0xac, 0x14, 0x14, 0xffffff9e}}, {@in=@loopback, @in6=@local}, {{@in, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x2}}}, [@tmpl={0x84, 0x5, [{{@in6=@mcast1, 0x0, 0x3c}, 0x0, @in=@multicast1}, {{@in=@remote, 0x0, 0x3c}, 0x0, @in=@broadcast}]}]}, 0x1ac}}, 0x0) 00:28:51 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000180)='./control\x00', 0x0) get_thread_area(0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x3) write$binfmt_script(r0, &(0x7f0000000bc0)=ANY=[@ANYBLOB="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"], 0x145) close(r0) execve(&(0x7f0000000180)='./file0\x00', &(0x7f0000000140), &(0x7f0000000140)) r1 = open(&(0x7f0000000000)='./control\x00', 0x80, 0x10) statfs(&(0x7f0000000380)='./control\x00', &(0x7f00000003c0)=""/20) write$P9_RWALK(r0, &(0x7f0000000400)=ANY=[@ANYBLOB="300000006f0100030001030000000400000000000000100000000003000002000000000300000000000000e646f1c5592139cf131e2bf572fa9728dbfac0390865410f3fa1f25743c497e12cb352eac4046b4500f95cfdfb4cf22a3be5c564a47654334c01d5732d382e27bbccd9b903000000c404000000d32dbd21f3ae581d32e69ef9327f7b487d1b4f4502838c08136678bd90733173ab78d6fc264b373611f15c439384ede8"], 0xa8) getsockopt$inet_sctp6_SCTP_RTOINFO(r1, 0x84, 0x0, &(0x7f0000000080)={0x0, 0x200, 0x2, 0xffffffff}, &(0x7f0000000100)=0x10) [ 921.501856][ T2480] block nbd2: Attempted send on invalid socket [ 921.508114][ T2480] print_req_error: I/O error, dev nbd2, sector 2 flags 0 [ 921.517239][ T6904] hfs: can't find a HFS filesystem on dev nbd2 00:28:51 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000480)=@acquire={0x1ac, 0x17, 0x1, 0x0, 0x0, {{@in=@multicast1}, @in6=@ipv4={[], [], @dev={0xac, 0x14, 0x14, 0xfffffff0}}, {@in=@loopback, @in6=@local}, {{@in, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x2}}}, [@tmpl={0x84, 0x5, [{{@in6=@mcast1, 0x0, 0x3c}, 0x0, @in=@multicast1}, {{@in=@remote, 0x0, 0x3c}, 0x0, @in=@broadcast}]}]}, 0x1ac}}, 0x0) 00:28:51 executing program 1: syz_mount_image$reiserfs(&(0x7f0000000180)='reiserfs\x14', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[@ANYBLOB='jdev=.']) 00:28:51 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00004e7000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f}, 0xc, &(0x7f0000000440)={&(0x7f00000001c0)=ANY=[@ANYBLOB="1c0000002200010000000a000061960d0100000008fe0c009d0a6be0e6d9fc638f19561d6ceb8a6c9239228215fd206cf204e07953", @ANYRES32=0x0], 0x2}, 0x1, 0x0, 0x0, 0xffffffffffffffff}, 0x0) 00:28:51 executing program 0: syz_mount_image$reiserfs(&(0x7f0000000180)='reiserfsh', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[@ANYBLOB='jdev=./file0,jdev=']) 00:28:51 executing program 2: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(&(0x7f0000000080)=@nbd={'/dev/nbd', 0x0, 0xe0000}, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000240)='hfs\x00\xe6\xa6\xe2\x06g\x96\xb3\v\xf2p\xd5:\x95p\x99\x92\xf2\xc4\x80\x1f\x14\x05\xb8e?\xbfwk\xe4\xe5\xca\x82\xeb\xb1\x04wn*\xf2\xc6\x9d\xc4!\x9e?\x83\x99\x0e\xcc\xa3\x95q.C\xee\x8dIf\xec\xbf\xe8\xb2\t\xedg\x9d\xd9\v\xce\xa3\xa3\xa5\x89F\x03\xefQ\x89\f\xeeRK\x15\xec{D\x9e\x83Z\xabTa\x8e\xcd\x01\xd0\xcfd\xf9c\x87m\xbe>\x81\xba\x9d2\x1c\a,\x12\xbf\xef\xb8m\v\xdf\x8e\xd5\xf5\x1a\xabD\xf6\xe0\x95\xf4\xfeRb_+\xeb\xf9f\xe8\\\x16\xeb\x87\x8e\x8acn4,\x80Q<\x84\xaep\xf9\xfc\x8e\x9f\xed\x06.a\xd5o\x14\r&L\xbd\xb9g\x82;+n\xd5\xcca\v\x86Z\x872\xc3c:`\xf2\x02\xc2\x92\x841\xe7\xca}\"@6}j\x0e\xb7\xa9\xbc\xf3N\xa3\xf3mbd\xfbS\x80\xe0\x11<\x7f\x84\xbe\xa2\xf9\xf7\xee\xf6\x94x\x9d\xe2{\xc5\x83\xc0M\xbb\xd4Io\r\x1c\xd7<\xc0\x84=`\xf1^Y', 0x0, 0x0) 00:28:51 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000480)=@acquire={0x1ac, 0x17, 0x1, 0x0, 0x0, {{@in=@multicast1}, @in6=@ipv4={[], [], @dev={0xac, 0x14, 0x14, 0xfffffffc}}, {@in=@loopback, @in6=@local}, {{@in, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x2}}}, [@tmpl={0x84, 0x5, [{{@in6=@mcast1, 0x0, 0x3c}, 0x0, @in=@multicast1}, {{@in=@remote, 0x0, 0x3c}, 0x0, @in=@broadcast}]}]}, 0x1ac}}, 0x0) 00:28:51 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00004e7000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f}, 0xc, &(0x7f0000000440)={&(0x7f00000001c0)=ANY=[@ANYBLOB="1c0000002200010000000e000061960d0100000008fe0c009d0a6be0e6d9fc638f19561d6ceb8a6c9239228215fd206cf204e07953", @ANYRES32=0x0], 0x2}, 0x1, 0x0, 0x0, 0xffffffffffffffff}, 0x0) [ 921.849637][ T2481] block nbd2: Attempted send on invalid socket [ 921.856001][ T2481] print_req_error: I/O error, dev nbd2, sector 2 flags 0 [ 921.879488][ T6926] hfs: can't find a HFS filesystem on dev nbd2 00:28:51 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000480)=@acquire={0x1ac, 0x17, 0x1, 0x0, 0x0, {{@in=@multicast1}, @in6=@ipv4={[], [], @dev={0xac, 0x14, 0x14, 0xf0ffffffffffff}}, {@in=@loopback, @in6=@local}, {{@in, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x2}}}, [@tmpl={0x84, 0x5, [{{@in6=@mcast1, 0x0, 0x3c}, 0x0, @in=@multicast1}, {{@in=@remote, 0x0, 0x3c}, 0x0, @in=@broadcast}]}]}, 0x1ac}}, 0x0) 00:28:51 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000180)='./control\x00', 0x0) get_thread_area(0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x3) write$binfmt_script(r0, &(0x7f0000000bc0)=ANY=[@ANYBLOB="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"], 0x145) close(r0) execve(&(0x7f0000000180)='./file0\x00', &(0x7f0000000140), &(0x7f0000000140)) r1 = open(&(0x7f0000000000)='./control\x00', 0x80, 0x10) statfs(&(0x7f0000000380)='./control\x00', &(0x7f00000003c0)=""/20) write$P9_RWALK(r0, &(0x7f0000000400)=ANY=[@ANYBLOB="300000006f0100030001030000000400000000000000100000000003000002000000000300000000000000e646f1c5592139cf131e2bf572fa9728dbfac0390865410f3fa1f25743c497e12cb352eac4046b4500f95cfdfb4cf22a3be5c564a47654334c01d5732d382e27bbccd9b903000000c404000000d32dbd21f3ae581d32e69ef9327f7b487d1b4f4502838c08136678bd90733173ab78d6fc264b373611f15c439384ede8"], 0xa8) getsockopt$inet_sctp6_SCTP_RTOINFO(r1, 0x84, 0x0, &(0x7f0000000080)={0x0, 0x200, 0x2, 0xffffffff}, &(0x7f0000000100)=0x10) 00:28:51 executing program 2: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(&(0x7f0000000080)=@nbd={'/dev/nbd', 0x0, 0xe0000}, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000240)='hfs\x00\xe6\xa6\xe2\x06g\x96\xb3\v\xf2p\xd5:\x95p\x99\x92\xf2\xc4\x80\x1f%\x05\xb8e?\xbfwk\xe4\xe5\xca\x82\xeb\xb1\x04wn*\xf2\xc6\x9d\xc4!\x9e?\x83\x99\x0e\xcc\xa3\x95q.C\xee\x8dIf\xec\xbf\xe8\xb2\t\xedg\x9d\xd9\v\xce\xa3\xa3\xa5\x89F\x03\xefQ\x89\f\xeeRK\x15\xec{D\x9e\x83Z\xabTa\x8e\xcd\x01\xd0\xcfd\xf9c\x87m\xbe>\x81\xba\x9d2\x1c\a,\x12\xbf\xef\xb8m\v\xdf\x8e\xd5\xf5\x1a\xabD\xf6\xe0\x95\xf4\xfeRb_+\xeb\xf9f\xe8\\\x16\xeb\x87\x8e\x8acn4,\x80Q<\x84\xaep\xf9\xfc\x8e\x9f\xed\x06.a\xd5o\x14\r&L\xbd\xb9g\x82;+n\xd5\xcca\v\x86Z\x872\xc3c:`\xf2\x02\xc2\x92\x841\xe7\xca}\"@6}j\x0e\xb7\xa9\xbc\xf3N\xa3\xf3mbd\xfbS\x80\xe0\x11<\x7f\x84\xbe\xa2\xf9\xf7\xee\xf6\x94x\x9d\xe2{\xc5\x83\xc0M\xbb\xd4Io\r\x1c\xd7<\xc0\x84=`\xf1^Y', 0x0, 0x0) 00:28:51 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00004e7000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f}, 0xc, &(0x7f0000000440)={&(0x7f00000001c0)=ANY=[@ANYBLOB="1c00000022000100000010000061960d0100000008fe0c009d0a6be0e6d9fc638f19561d6ceb8a6c9239228215fd206cf204e07953", @ANYRES32=0x0], 0x2}, 0x1, 0x0, 0x0, 0xffffffffffffffff}, 0x0) 00:28:51 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000480)=@acquire={0x1ac, 0x17, 0x1, 0x0, 0x0, {{@in=@multicast1}, @in6=@ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x100000000000000}}, {@in=@loopback, @in6=@local}, {{@in, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x2}}}, [@tmpl={0x84, 0x5, [{{@in6=@mcast1, 0x0, 0x3c}, 0x0, @in=@multicast1}, {{@in=@remote, 0x0, 0x3c}, 0x0, @in=@broadcast}]}]}, 0x1ac}}, 0x0) [ 922.208817][ T2480] block nbd2: Attempted send on invalid socket [ 922.215115][ T2480] print_req_error: I/O error, dev nbd2, sector 2 flags 0 [ 922.222374][ T6957] hfs: can't find a HFS filesystem on dev nbd2 00:28:52 executing program 1: syz_mount_image$reiserfs(&(0x7f0000000180)='reiserfs#', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[@ANYBLOB='jdev=.']) 00:28:52 executing program 2: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(&(0x7f0000000080)=@nbd={'/dev/nbd', 0x0, 0xe0000}, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000240)='hfs\x00\xe6\xa6\xe2\x06g\x96\xb3\v\xf2p\xd5:\x95p\x99\x92\xf2\xc4\x80\x1fd\x05\xb8e?\xbfwk\xe4\xe5\xca\x82\xeb\xb1\x04wn*\xf2\xc6\x9d\xc4!\x9e?\x83\x99\x0e\xcc\xa3\x95q.C\xee\x8dIf\xec\xbf\xe8\xb2\t\xedg\x9d\xd9\v\xce\xa3\xa3\xa5\x89F\x03\xefQ\x89\f\xeeRK\x15\xec{D\x9e\x83Z\xabTa\x8e\xcd\x01\xd0\xcfd\xf9c\x87m\xbe>\x81\xba\x9d2\x1c\a,\x12\xbf\xef\xb8m\v\xdf\x8e\xd5\xf5\x1a\xabD\xf6\xe0\x95\xf4\xfeRb_+\xeb\xf9f\xe8\\\x16\xeb\x87\x8e\x8acn4,\x80Q<\x84\xaep\xf9\xfc\x8e\x9f\xed\x06.a\xd5o\x14\r&L\xbd\xb9g\x82;+n\xd5\xcca\v\x86Z\x872\xc3c:`\xf2\x02\xc2\x92\x841\xe7\xca}\"@6}j\x0e\xb7\xa9\xbc\xf3N\xa3\xf3mbd\xfbS\x80\xe0\x11<\x7f\x84\xbe\xa2\xf9\xf7\xee\xf6\x94x\x9d\xe2{\xc5\x83\xc0M\xbb\xd4Io\r\x1c\xd7<\xc0\x84=`\xf1^Y', 0x0, 0x0) 00:28:52 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000480)=@acquire={0x1ac, 0x17, 0x1, 0x0, 0x0, {{@in=@multicast1}, @in6=@ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x200000000000000}}, {@in=@loopback, @in6=@local}, {{@in, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x2}}}, [@tmpl={0x84, 0x5, [{{@in6=@mcast1, 0x0, 0x3c}, 0x0, @in=@multicast1}, {{@in=@remote, 0x0, 0x3c}, 0x0, @in=@broadcast}]}]}, 0x1ac}}, 0x0) 00:28:52 executing program 0: syz_mount_image$reiserfs(&(0x7f0000000180)='reiserfsl', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[@ANYBLOB='jdev=./file0,jdev=']) 00:28:52 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00004e7000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f}, 0xc, &(0x7f0000000440)={&(0x7f00000001c0)=ANY=[@ANYBLOB="1c00000022000100000060000061960d0100000008fe0c009d0a6be0e6d9fc638f19561d6ceb8a6c9239228215fd206cf204e07953", @ANYRES32=0x0], 0x2}, 0x1, 0x0, 0x0, 0xffffffffffffffff}, 0x0) 00:28:52 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000180)='./control\x00', 0x0) get_thread_area(0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x3) write$binfmt_script(r0, &(0x7f0000000bc0)=ANY=[@ANYBLOB="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"], 0x145) close(r0) execve(&(0x7f0000000180)='./file0\x00', &(0x7f0000000140), &(0x7f0000000140)) r1 = open(&(0x7f0000000000)='./control\x00', 0x80, 0x10) statfs(&(0x7f0000000380)='./control\x00', &(0x7f00000003c0)=""/20) write$P9_RWALK(r0, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_RTOINFO(r1, 0x84, 0x0, &(0x7f0000000080)={0x0, 0x200, 0x2, 0xffffffff}, &(0x7f0000000100)=0x10) [ 922.471752][ T2480] block nbd2: Attempted send on invalid socket [ 922.477996][ T2480] print_req_error: I/O error, dev nbd2, sector 2 flags 0 [ 922.486320][ T6972] hfs: can't find a HFS filesystem on dev nbd2 00:28:52 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000480)=@acquire={0x1ac, 0x17, 0x1, 0x0, 0x0, {{@in=@multicast1}, @in6=@ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x300000000000000}}, {@in=@loopback, @in6=@local}, {{@in, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x2}}}, [@tmpl={0x84, 0x5, [{{@in6=@mcast1, 0x0, 0x3c}, 0x0, @in=@multicast1}, {{@in=@remote, 0x0, 0x3c}, 0x0, @in=@broadcast}]}]}, 0x1ac}}, 0x0) 00:28:52 executing program 2: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(&(0x7f0000000080)=@nbd={'/dev/nbd', 0x0, 0xe0000}, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000240)='hfs\x00\xe6\xa6\xe2\x06g\x96\xb3\v\xf2p\xd5:\x95p\x99\x92\xf2\xc4\x80\x1f\x01\x02\xb8e?\xbfwk\xe4\xe5\xca\x82\xeb\xb1\x04wn*\xf2\xc6\x9d\xc4!\x9e?\x83\x99\x0e\xcc\xa3\x95q.C\xee\x8dIf\xec\xbf\xe8\xb2\t\xedg\x9d\xd9\v\xce\xa3\xa3\xa5\x89F\x03\xefQ\x89\f\xeeRK\x15\xec{D\x9e\x83Z\xabTa\x8e\xcd\x01\xd0\xcfd\xf9c\x87m\xbe>\x81\xba\x9d2\x1c\a,\x12\xbf\xef\xb8m\v\xdf\x8e\xd5\xf5\x1a\xabD\xf6\xe0\x95\xf4\xfeRb_+\xeb\xf9f\xe8\\\x16\xeb\x87\x8e\x8acn4,\x80Q<\x84\xaep\xf9\xfc\x8e\x9f\xed\x06.a\xd5o\x14\r&L\xbd\xb9g\x82;+n\xd5\xcca\v\x86Z\x872\xc3c:`\xf2\x02\xc2\x92\x841\xe7\xca}\"@6}j\x0e\xb7\xa9\xbc\xf3N\xa3\xf3mbd\xfbS\x80\xe0\x11<\x7f\x84\xbe\xa2\xf9\xf7\xee\xf6\x94x\x9d\xe2{\xc5\x83\xc0M\xbb\xd4Io\r\x1c\xd7<\xc0\x84=`\xf1^Y', 0x0, 0x0) 00:28:52 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00004e7000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f}, 0xc, &(0x7f0000000440)={&(0x7f00000001c0)=ANY=[@ANYBLOB="1c000000220001ffffff9e000061960d0100000008fe0c009d0a6be0e6d9fc638f19561d6ceb8a6c9239228215fd206cf204e07953", @ANYRES32=0x0], 0x2}, 0x1, 0x0, 0x0, 0xffffffffffffffff}, 0x0) [ 922.724355][ T6993] hfs: can't find a HFS filesystem on dev nbd2 00:28:52 executing program 1: syz_mount_image$reiserfs(&(0x7f0000000180)='reiserfs$', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[@ANYBLOB='jdev=.']) 00:28:52 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000480)=@acquire={0x1ac, 0x17, 0x1, 0x0, 0x0, {{@in=@multicast1}, @in6=@ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x400000000000000}}, {@in=@loopback, @in6=@local}, {{@in, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x2}}}, [@tmpl={0x84, 0x5, [{{@in6=@mcast1, 0x0, 0x3c}, 0x0, @in=@multicast1}, {{@in=@remote, 0x0, 0x3c}, 0x0, @in=@broadcast}]}]}, 0x1ac}}, 0x0) 00:28:52 executing program 0: syz_mount_image$reiserfs(&(0x7f0000000180)='reiserfst', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[@ANYBLOB='jdev=./file0,jdev=']) [ 922.830400][ T6993] hfs: can't find a HFS filesystem on dev nbd2 00:28:52 executing program 4: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(&(0x7f0000000080)=@nbd={'/dev/nbd', 0x0, 0xe0000}, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000240)='hfs\x00\xe6\xa6\xe2\x06g\x96\xb3\v\xf2p\xd5:\x95p\x99\x92\xf2\xc4\x80\x1fd\x05\xb8e?\xbfwk\xe4\xe5\xca\x82\xeb\xb1\x04wn*\xf2\xc6\x9d\xc4!\x9e?\x83\x99\x0e\xcc\xa3\x95q.C\xee\x8dIf\xec\xbf\xe8\xb2\t\xedg\x9d\xd9\v\xce\xa3\xa3\xa5\x89F\x03\xefQ\x89\f\xeeRK\x15\xec{D\x9e\x83Z\xabTa\x8e\xcd\x01\xd0\xcfd\xf9c\x87m\xbe>\x81\xba\x9d2\x1c\a,\x12\xbf\xef\xb8m\v\xdf\x8e\xd5\xf5\x1a\xabD\xf6\xe0\x95\xf4\xfeRb_+\xeb\xf9f\xe8\\\x16\xeb\x87\x8e\x8acn4,\x80Q<\x84\xaep\xf9\xfc\x8e\x9f\xed\x06.a\xd5o\x14\r&L\xbd\xb9g\x82;+n\xd5\xcca\v\x86Z\x872\xc3c:`\xf2\x02\xc2\x92\x841\xe7\xca}\"@6}j\x0e\xb7\xa9\xbc\xf3N\xa3\xf3mbd\xfbS\x80\xe0\x11<\x7f\x84\xbe\xa2\xf9\xf7\xee\xf6\x94x\x9d\xe2{\xc5\x83\xc0M\xbb\xd4Io\r\x1c\xd7<\xc0\x84=`\xf1^Y', 0x0, 0x0) 00:28:52 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00004e7000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f}, 0xc, &(0x7f0000000440)={&(0x7f00000001c0)=ANY=[@ANYBLOB="1c00000022000100000ab0000061960d0100000008fe0c009d0a6be0e6d9fc638f19561d6ceb8a6c9239228215fd206cf204e07953", @ANYRES32=0x0], 0x2}, 0x1, 0x0, 0x0, 0xffffffffffffffff}, 0x0) 00:28:52 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000480)=@acquire={0x1ac, 0x17, 0x1, 0x0, 0x0, {{@in=@multicast1}, @in6=@ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x500000000000000}}, {@in=@loopback, @in6=@local}, {{@in, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x2}}}, [@tmpl={0x84, 0x5, [{{@in6=@mcast1, 0x0, 0x3c}, 0x0, @in=@multicast1}, {{@in=@remote, 0x0, 0x3c}, 0x0, @in=@broadcast}]}]}, 0x1ac}}, 0x0) 00:28:52 executing program 2: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(&(0x7f0000000080)=@nbd={'/dev/nbd', 0x0, 0xe0000}, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000240)='hfs\x00\xe6\xa6\xe2\x06g\x96\xb3\v\xf2p\xd5:\x95p\x99\x92\xf2\xc4\x80\x1f\x01\x03\xb8e?\xbfwk\xe4\xe5\xca\x82\xeb\xb1\x04wn*\xf2\xc6\x9d\xc4!\x9e?\x83\x99\x0e\xcc\xa3\x95q.C\xee\x8dIf\xec\xbf\xe8\xb2\t\xedg\x9d\xd9\v\xce\xa3\xa3\xa5\x89F\x03\xefQ\x89\f\xeeRK\x15\xec{D\x9e\x83Z\xabTa\x8e\xcd\x01\xd0\xcfd\xf9c\x87m\xbe>\x81\xba\x9d2\x1c\a,\x12\xbf\xef\xb8m\v\xdf\x8e\xd5\xf5\x1a\xabD\xf6\xe0\x95\xf4\xfeRb_+\xeb\xf9f\xe8\\\x16\xeb\x87\x8e\x8acn4,\x80Q<\x84\xaep\xf9\xfc\x8e\x9f\xed\x06.a\xd5o\x14\r&L\xbd\xb9g\x82;+n\xd5\xcca\v\x86Z\x872\xc3c:`\xf2\x02\xc2\x92\x841\xe7\xca}\"@6}j\x0e\xb7\xa9\xbc\xf3N\xa3\xf3mbd\xfbS\x80\xe0\x11<\x7f\x84\xbe\xa2\xf9\xf7\xee\xf6\x94x\x9d\xe2{\xc5\x83\xc0M\xbb\xd4Io\r\x1c\xd7<\xc0\x84=`\xf1^Y', 0x0, 0x0) [ 922.996459][ T7021] hfs: can't find a HFS filesystem on dev nbd4 00:28:52 executing program 0: syz_mount_image$reiserfs(&(0x7f0000000180)='reiserfsz', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[@ANYBLOB='jdev=./file0,jdev=']) 00:28:52 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000480)=@acquire={0x1ac, 0x17, 0x1, 0x0, 0x0, {{@in=@multicast1}, @in6=@ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x600000000000000}}, {@in=@loopback, @in6=@local}, {{@in, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x2}}}, [@tmpl={0x84, 0x5, [{{@in6=@mcast1, 0x0, 0x3c}, 0x0, @in=@multicast1}, {{@in=@remote, 0x0, 0x3c}, 0x0, @in=@broadcast}]}]}, 0x1ac}}, 0x0) 00:28:52 executing program 1: syz_mount_image$reiserfs(&(0x7f0000000180)='reiserfs,', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[@ANYBLOB='jdev=.']) [ 923.130228][ T7034] hfs: can't find a HFS filesystem on dev nbd2 00:28:52 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000180)='./control\x00', 0x0) get_thread_area(0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x3) write$binfmt_script(r0, &(0x7f0000000bc0)=ANY=[@ANYBLOB="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"], 0x145) close(r0) execve(&(0x7f0000000180)='./file0\x00', &(0x7f0000000140), &(0x7f0000000140)) r1 = open(&(0x7f0000000000)='./control\x00', 0x80, 0x10) statfs(&(0x7f0000000380)='./control\x00', &(0x7f00000003c0)=""/20) write$P9_RWALK(r0, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_RTOINFO(r1, 0x84, 0x0, &(0x7f0000000080)={0x0, 0x200, 0x2, 0xffffffff}, &(0x7f0000000100)=0x10) 00:28:52 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00004e7000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f}, 0xc, &(0x7f0000000440)={&(0x7f00000001c0)=ANY=[@ANYBLOB="1c000000220001fffffff0000061960d0100000008fe0c009d0a6be0e6d9fc638f19561d6ceb8a6c9239228215fd206cf204e07953", @ANYRES32=0x0], 0x2}, 0x1, 0x0, 0x0, 0xffffffffffffffff}, 0x0) 00:28:53 executing program 2: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(&(0x7f0000000080)=@nbd={'/dev/nbd', 0x0, 0xe0000}, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000240)='hfs\x00\xe6\xa6\xe2\x06g\x96\xb3\v\xf2p\xd5:\x95p\x99\x92\xf2\xc4\x80\x1f\x01\x04\xb8e?\xbfwk\xe4\xe5\xca\x82\xeb\xb1\x04wn*\xf2\xc6\x9d\xc4!\x9e?\x83\x99\x0e\xcc\xa3\x95q.C\xee\x8dIf\xec\xbf\xe8\xb2\t\xedg\x9d\xd9\v\xce\xa3\xa3\xa5\x89F\x03\xefQ\x89\f\xeeRK\x15\xec{D\x9e\x83Z\xabTa\x8e\xcd\x01\xd0\xcfd\xf9c\x87m\xbe>\x81\xba\x9d2\x1c\a,\x12\xbf\xef\xb8m\v\xdf\x8e\xd5\xf5\x1a\xabD\xf6\xe0\x95\xf4\xfeRb_+\xeb\xf9f\xe8\\\x16\xeb\x87\x8e\x8acn4,\x80Q<\x84\xaep\xf9\xfc\x8e\x9f\xed\x06.a\xd5o\x14\r&L\xbd\xb9g\x82;+n\xd5\xcca\v\x86Z\x872\xc3c:`\xf2\x02\xc2\x92\x841\xe7\xca}\"@6}j\x0e\xb7\xa9\xbc\xf3N\xa3\xf3mbd\xfbS\x80\xe0\x11<\x7f\x84\xbe\xa2\xf9\xf7\xee\xf6\x94x\x9d\xe2{\xc5\x83\xc0M\xbb\xd4Io\r\x1c\xd7<\xc0\x84=`\xf1^Y', 0x0, 0x0) 00:28:53 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000480)=@acquire={0x1ac, 0x17, 0x1, 0x0, 0x0, {{@in=@multicast1}, @in6=@ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x800000000000000}}, {@in=@loopback, @in6=@local}, {{@in, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x2}}}, [@tmpl={0x84, 0x5, [{{@in6=@mcast1, 0x0, 0x3c}, 0x0, @in=@multicast1}, {{@in=@remote, 0x0, 0x3c}, 0x0, @in=@broadcast}]}]}, 0x1ac}}, 0x0) [ 923.389290][ T7058] hfs: can't find a HFS filesystem on dev nbd2 00:28:53 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00004e7000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f}, 0xc, &(0x7f0000000440)={&(0x7f00000001c0)=ANY=[@ANYBLOB="1c00000022000100f0ffff000061960d0100000008fe0c009d0a6be0e6d9fc638f19561d6ceb8a6c9239228215fd206cf204e07953", @ANYRES32=0x0], 0x2}, 0x1, 0x0, 0x0, 0xffffffffffffffff}, 0x0) 00:28:53 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000480)=@acquire={0x1ac, 0x17, 0x1, 0x0, 0x0, {{@in=@multicast1}, @in6=@ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x805000000000000}}, {@in=@loopback, @in6=@local}, {{@in, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x2}}}, [@tmpl={0x84, 0x5, [{{@in6=@mcast1, 0x0, 0x3c}, 0x0, @in=@multicast1}, {{@in=@remote, 0x0, 0x3c}, 0x0, @in=@broadcast}]}]}, 0x1ac}}, 0x0) 00:28:53 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000180)='./control\x00', 0x0) get_thread_area(0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x3) write$binfmt_script(r0, &(0x7f0000000bc0)=ANY=[@ANYBLOB="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"], 0x145) close(r0) execve(&(0x7f0000000180)='./file0\x00', &(0x7f0000000140), &(0x7f0000000140)) r1 = open(&(0x7f0000000000)='./control\x00', 0x80, 0x10) statfs(&(0x7f0000000380)='./control\x00', &(0x7f00000003c0)=""/20) write$P9_RWALK(0xffffffffffffffff, &(0x7f0000000400)=ANY=[@ANYBLOB="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"], 0x14f) getsockopt$inet_sctp6_SCTP_RTOINFO(r1, 0x84, 0x0, &(0x7f0000000080)={0x0, 0x200, 0x2, 0xffffffff}, &(0x7f0000000100)=0x10) 00:28:53 executing program 2: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(&(0x7f0000000080)=@nbd={'/dev/nbd', 0x0, 0xe0000}, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000240)='hfs\x00\xe6\xa6\xe2\x06g\x96\xb3\v\xf2p\xd5:\x95p\x99\x92\xf2\xc4\x80\x1f\x01\x06\xb8e?\xbfwk\xe4\xe5\xca\x82\xeb\xb1\x04wn*\xf2\xc6\x9d\xc4!\x9e?\x83\x99\x0e\xcc\xa3\x95q.C\xee\x8dIf\xec\xbf\xe8\xb2\t\xedg\x9d\xd9\v\xce\xa3\xa3\xa5\x89F\x03\xefQ\x89\f\xeeRK\x15\xec{D\x9e\x83Z\xabTa\x8e\xcd\x01\xd0\xcfd\xf9c\x87m\xbe>\x81\xba\x9d2\x1c\a,\x12\xbf\xef\xb8m\v\xdf\x8e\xd5\xf5\x1a\xabD\xf6\xe0\x95\xf4\xfeRb_+\xeb\xf9f\xe8\\\x16\xeb\x87\x8e\x8acn4,\x80Q<\x84\xaep\xf9\xfc\x8e\x9f\xed\x06.a\xd5o\x14\r&L\xbd\xb9g\x82;+n\xd5\xcca\v\x86Z\x872\xc3c:`\xf2\x02\xc2\x92\x841\xe7\xca}\"@6}j\x0e\xb7\xa9\xbc\xf3N\xa3\xf3mbd\xfbS\x80\xe0\x11<\x7f\x84\xbe\xa2\xf9\xf7\xee\xf6\x94x\x9d\xe2{\xc5\x83\xc0M\xbb\xd4Io\r\x1c\xd7<\xc0\x84=`\xf1^Y', 0x0, 0x0) 00:28:53 executing program 0: syz_mount_image$reiserfs(&(0x7f0000000180)='reiserfs4', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[@ANYBLOB='jdev=./file0,jdev=']) 00:28:53 executing program 1: syz_mount_image$reiserfs(&(0x7f0000000180)='reiserfs4', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[@ANYBLOB='jdev=.']) 00:28:53 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00004e7000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f}, 0xc, &(0x7f0000000440)={&(0x7f00000001c0)=ANY=[@ANYBLOB="1c0000002200017fffffff000061960d0100000008fe0c009d0a6be0e6d9fc638f19561d6ceb8a6c9239228215fd206cf204e07953", @ANYRES32=0x0], 0x2}, 0x1, 0x0, 0x0, 0xffffffffffffffff}, 0x0) 00:28:53 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000480)=@acquire={0x1ac, 0x17, 0x1, 0x0, 0x0, {{@in=@multicast1}, @in6=@ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x900000000000000}}, {@in=@loopback, @in6=@local}, {{@in, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x2}}}, [@tmpl={0x84, 0x5, [{{@in6=@mcast1, 0x0, 0x3c}, 0x0, @in=@multicast1}, {{@in=@remote, 0x0, 0x3c}, 0x0, @in=@broadcast}]}]}, 0x1ac}}, 0x0) [ 923.659705][ T7079] hfs: can't find a HFS filesystem on dev nbd2 00:28:53 executing program 2: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(&(0x7f0000000080)=@nbd={'/dev/nbd', 0x0, 0xe0000}, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000240)='hfs\x00\xe6\xa6\xe2\x06g\x96\xb3\v\xf2p\xd5:\x95p\x99\x92\xf2\xc4\x80\x1f\x01\a\xb8e?\xbfwk\xe4\xe5\xca\x82\xeb\xb1\x04wn*\xf2\xc6\x9d\xc4!\x9e?\x83\x99\x0e\xcc\xa3\x95q.C\xee\x8dIf\xec\xbf\xe8\xb2\t\xedg\x9d\xd9\v\xce\xa3\xa3\xa5\x89F\x03\xefQ\x89\f\xeeRK\x15\xec{D\x9e\x83Z\xabTa\x8e\xcd\x01\xd0\xcfd\xf9c\x87m\xbe>\x81\xba\x9d2\x1c\a,\x12\xbf\xef\xb8m\v\xdf\x8e\xd5\xf5\x1a\xabD\xf6\xe0\x95\xf4\xfeRb_+\xeb\xf9f\xe8\\\x16\xeb\x87\x8e\x8acn4,\x80Q<\x84\xaep\xf9\xfc\x8e\x9f\xed\x06.a\xd5o\x14\r&L\xbd\xb9g\x82;+n\xd5\xcca\v\x86Z\x872\xc3c:`\xf2\x02\xc2\x92\x841\xe7\xca}\"@6}j\x0e\xb7\xa9\xbc\xf3N\xa3\xf3mbd\xfbS\x80\xe0\x11<\x7f\x84\xbe\xa2\xf9\xf7\xee\xf6\x94x\x9d\xe2{\xc5\x83\xc0M\xbb\xd4Io\r\x1c\xd7<\xc0\x84=`\xf1^Y', 0x0, 0x0) 00:28:53 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000180)='./control\x00', 0x0) get_thread_area(0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x3) write$binfmt_script(r0, &(0x7f0000000bc0)=ANY=[@ANYBLOB="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"], 0x145) close(r0) execve(&(0x7f0000000180)='./file0\x00', &(0x7f0000000140), &(0x7f0000000140)) r1 = open(&(0x7f0000000000)='./control\x00', 0x80, 0x0) statfs(&(0x7f0000000380)='./control\x00', &(0x7f00000003c0)=""/20) write$P9_RWALK(r0, &(0x7f0000000400)=ANY=[@ANYBLOB="300000006f0100030001030000000400000000000000100000000003000002000000000300000000000000e646f1c5592139cf131e2bf572fa9728dbfac0390865410f3fa1f25743c497e12cb352eac4046b4500f95cfdfb4cf22a3be5c564a47654334c01d5732d382e27bbccd9b903000000c404000000d32dbd21f3ae581d32e69ef9327f7b487d1b4f4502838c08136678bd90733173ab78d6fc264b373611f15c439384ede863ecc86f33e74a14e307490508a39b41394adaba629948536b9cbfaf6fd153ef31439c5bf58116ad346d364e3293ce22b917bee18e0356778d7e12e96945109f9678302ea739b55b8173f4243ec467c6e40248445d0df527c5d637c03c41d500ed9802279fc3d9e4c6767ac0ad7893f64ec0568b7453adce65e06164d0003219476ba93aee62624d6b025582b2917ef27f06eae5af44ea3c7a25d16c5d25a2b04969202ed68056"], 0x14f) getsockopt$inet_sctp6_SCTP_RTOINFO(r1, 0x84, 0x0, &(0x7f0000000080)={0x0, 0x200, 0x2, 0xffffffff}, &(0x7f0000000100)=0x10) 00:28:53 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000480)=@acquire={0x1ac, 0x17, 0x1, 0x0, 0x0, {{@in=@multicast1}, @in6=@ipv4={[], [], @dev={0xac, 0x14, 0x14, 0xa00000000000000}}, {@in=@loopback, @in6=@local}, {{@in, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x2}}}, [@tmpl={0x84, 0x5, [{{@in6=@mcast1, 0x0, 0x3c}, 0x0, @in=@multicast1}, {{@in=@remote, 0x0, 0x3c}, 0x0, @in=@broadcast}]}]}, 0x1ac}}, 0x0) 00:28:53 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00004e7000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f}, 0xc, &(0x7f0000000440)={&(0x7f00000001c0)=ANY=[@ANYBLOB="1c0000002200019effffff000061960d0100000008fe0c009d0a6be0e6d9fc638f19561d6ceb8a6c9239228215fd206cf204e07953", @ANYRES32=0x0], 0x2}, 0x1, 0x0, 0x0, 0xffffffffffffffff}, 0x0) 00:28:53 executing program 2: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(&(0x7f0000000080)=@nbd={'/dev/nbd', 0x0, 0xe0000}, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000240)='hfs\x00\xe6\xa6\xe2\x06g\x96\xb3\v\xf2p\xd5:\x95p\x99\x92\xf2\xc4\x80\x1f\x01\n\xb8e?\xbfwk\xe4\xe5\xca\x82\xeb\xb1\x04wn*\xf2\xc6\x9d\xc4!\x9e?\x83\x99\x0e\xcc\xa3\x95q.C\xee\x8dIf\xec\xbf\xe8\xb2\t\xedg\x9d\xd9\v\xce\xa3\xa3\xa5\x89F\x03\xefQ\x89\f\xeeRK\x15\xec{D\x9e\x83Z\xabTa\x8e\xcd\x01\xd0\xcfd\xf9c\x87m\xbe>\x81\xba\x9d2\x1c\a,\x12\xbf\xef\xb8m\v\xdf\x8e\xd5\xf5\x1a\xabD\xf6\xe0\x95\xf4\xfeRb_+\xeb\xf9f\xe8\\\x16\xeb\x87\x8e\x8acn4,\x80Q<\x84\xaep\xf9\xfc\x8e\x9f\xed\x06.a\xd5o\x14\r&L\xbd\xb9g\x82;+n\xd5\xcca\v\x86Z\x872\xc3c:`\xf2\x02\xc2\x92\x841\xe7\xca}\"@6}j\x0e\xb7\xa9\xbc\xf3N\xa3\xf3mbd\xfbS\x80\xe0\x11<\x7f\x84\xbe\xa2\xf9\xf7\xee\xf6\x94x\x9d\xe2{\xc5\x83\xc0M\xbb\xd4Io\r\x1c\xd7<\xc0\x84=`\xf1^Y', 0x0, 0x0) [ 923.926702][ T7101] hfs: can't find a HFS filesystem on dev nbd2 00:28:53 executing program 0: syz_mount_image$reiserfs(&(0x7f0000000180)='reiserfsP', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[@ANYBLOB='jdev=./file0,jdev=']) [ 924.073933][ T7111] hfs: can't find a HFS filesystem on dev nbd2 00:28:53 executing program 1: syz_mount_image$reiserfs(&(0x7f0000000180)='reiserfs>', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[@ANYBLOB='jdev=.']) 00:28:53 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000480)=@acquire={0x1ac, 0x17, 0x1, 0x0, 0x0, {{@in=@multicast1}, @in6=@ipv4={[], [], @dev={0xac, 0x14, 0x14, 0xb00000000000000}}, {@in=@loopback, @in6=@local}, {{@in, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x2}}}, [@tmpl={0x84, 0x5, [{{@in6=@mcast1, 0x0, 0x3c}, 0x0, @in=@multicast1}, {{@in=@remote, 0x0, 0x3c}, 0x0, @in=@broadcast}]}]}, 0x1ac}}, 0x0) 00:28:53 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00004e7000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f}, 0xc, &(0x7f0000000440)={&(0x7f00000001c0)=ANY=[@ANYBLOB="1c000000220001f0ffffff000061960d0100000008fe0c009d0a6be0e6d9fc638f19561d6ceb8a6c9239228215fd206cf204e07953", @ANYRES32=0x0], 0x2}, 0x1, 0x0, 0x0, 0xffffffffffffffff}, 0x0) 00:28:53 executing program 2: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(&(0x7f0000000080)=@nbd={'/dev/nbd', 0x0, 0xe0000}, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000240)='hfs\x00\xe6\xa6\xe2\x06g\x96\xb3\v\xf2p\xd5:\x95p\x99\x92\xf2\xc4\x80\x1f\x01\x10\xb8e?\xbfwk\xe4\xe5\xca\x82\xeb\xb1\x04wn*\xf2\xc6\x9d\xc4!\x9e?\x83\x99\x0e\xcc\xa3\x95q.C\xee\x8dIf\xec\xbf\xe8\xb2\t\xedg\x9d\xd9\v\xce\xa3\xa3\xa5\x89F\x03\xefQ\x89\f\xeeRK\x15\xec{D\x9e\x83Z\xabTa\x8e\xcd\x01\xd0\xcfd\xf9c\x87m\xbe>\x81\xba\x9d2\x1c\a,\x12\xbf\xef\xb8m\v\xdf\x8e\xd5\xf5\x1a\xabD\xf6\xe0\x95\xf4\xfeRb_+\xeb\xf9f\xe8\\\x16\xeb\x87\x8e\x8acn4,\x80Q<\x84\xaep\xf9\xfc\x8e\x9f\xed\x06.a\xd5o\x14\r&L\xbd\xb9g\x82;+n\xd5\xcca\v\x86Z\x872\xc3c:`\xf2\x02\xc2\x92\x841\xe7\xca}\"@6}j\x0e\xb7\xa9\xbc\xf3N\xa3\xf3mbd\xfbS\x80\xe0\x11<\x7f\x84\xbe\xa2\xf9\xf7\xee\xf6\x94x\x9d\xe2{\xc5\x83\xc0M\xbb\xd4Io\r\x1c\xd7<\xc0\x84=`\xf1^Y', 0x0, 0x0) 00:28:54 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000480)=@acquire={0x1ac, 0x17, 0x1, 0x0, 0x0, {{@in=@multicast1}, @in6=@ipv4={[], [], @dev={0xac, 0x14, 0x14, 0xe00000000000000}}, {@in=@loopback, @in6=@local}, {{@in, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x2}}}, [@tmpl={0x84, 0x5, [{{@in6=@mcast1, 0x0, 0x3c}, 0x0, @in=@multicast1}, {{@in=@remote, 0x0, 0x3c}, 0x0, @in=@broadcast}]}]}, 0x1ac}}, 0x0) [ 924.351848][ T7138] hfs: can't find a HFS filesystem on dev nbd2 00:28:54 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000180)='./control\x00', 0x0) get_thread_area(0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x3) write$binfmt_script(r0, &(0x7f0000000bc0)=ANY=[@ANYBLOB="2321202e2f66696c6530202357994f66e76f4d0fe2208456ebfa69074cb94144c95c4375644bd1747e34c127d80575d10a599f851dc7ad26f3fa377c0a53cc7be2512b7493bf864ecf3f13e46032dbbf3af349b06321cec7a0652f4a5768256cd01a2d3d52de67dc459409a1e50ca51334791c8690646f7a1962ccefc0592a163bacf13da16978ca48eb3784c5baa40700ebfddde7e115f9388051297af49e38e0e3210d232e108a7e9b69c2e56676484906d975d537d128607c901050484e2bdb0d042a40c8ff8f4727cde00677ea73dac796f06f6f7ef7b3406723e7da9fb469c4ce44faff2888c779c000000000000000000000dc4fd7f68b303f980ed08fb24c8052b0626c8b3733eeee64a90f35fd7d88f958406cb5a8ed3b20b7d1278e15c1e1012befbc45a45f203503128d3a99b80bc2c744ae4b8509ca0149b48dc3e11c2d5db4"], 0x145) close(r0) execve(&(0x7f0000000180)='./file0\x00', &(0x7f0000000140), &(0x7f0000000140)) r1 = open(&(0x7f0000000000)='./control\x00', 0x80, 0x0) statfs(&(0x7f0000000380)='./control\x00', &(0x7f00000003c0)=""/20) write$P9_RWALK(r0, &(0x7f0000000400)=ANY=[@ANYBLOB="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"], 0x14f) getsockopt$inet_sctp6_SCTP_RTOINFO(r1, 0x84, 0x0, &(0x7f0000000080)={0x0, 0x200, 0x2, 0xffffffff}, &(0x7f0000000100)=0x10) 00:28:54 executing program 2: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(&(0x7f0000000080)=@nbd={'/dev/nbd', 0x0, 0xe0000}, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000240)='hfs\x00\xe6\xa6\xe2\x06g\x96\xb3\v\xf2p\xd5:\x95p\x99\x92\xf2\xc4\x80\x1f\x01\x14\xb8e?\xbfwk\xe4\xe5\xca\x82\xeb\xb1\x04wn*\xf2\xc6\x9d\xc4!\x9e?\x83\x99\x0e\xcc\xa3\x95q.C\xee\x8dIf\xec\xbf\xe8\xb2\t\xedg\x9d\xd9\v\xce\xa3\xa3\xa5\x89F\x03\xefQ\x89\f\xeeRK\x15\xec{D\x9e\x83Z\xabTa\x8e\xcd\x01\xd0\xcfd\xf9c\x87m\xbe>\x81\xba\x9d2\x1c\a,\x12\xbf\xef\xb8m\v\xdf\x8e\xd5\xf5\x1a\xabD\xf6\xe0\x95\xf4\xfeRb_+\xeb\xf9f\xe8\\\x16\xeb\x87\x8e\x8acn4,\x80Q<\x84\xaep\xf9\xfc\x8e\x9f\xed\x06.a\xd5o\x14\r&L\xbd\xb9g\x82;+n\xd5\xcca\v\x86Z\x872\xc3c:`\xf2\x02\xc2\x92\x841\xe7\xca}\"@6}j\x0e\xb7\xa9\xbc\xf3N\xa3\xf3mbd\xfbS\x80\xe0\x11<\x7f\x84\xbe\xa2\xf9\xf7\xee\xf6\x94x\x9d\xe2{\xc5\x83\xc0M\xbb\xd4Io\r\x1c\xd7<\xc0\x84=`\xf1^Y', 0x0, 0x0) 00:28:54 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000480)=@acquire={0x1ac, 0x17, 0x1, 0x0, 0x0, {{@in=@multicast1}, @in6=@ipv4={[], [], @dev={0xac, 0x14, 0x14, 0xf00000000000000}}, {@in=@loopback, @in6=@local}, {{@in, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x2}}}, [@tmpl={0x84, 0x5, [{{@in6=@mcast1, 0x0, 0x3c}, 0x0, @in=@multicast1}, {{@in=@remote, 0x0, 0x3c}, 0x0, @in=@broadcast}]}]}, 0x1ac}}, 0x0) 00:28:54 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00004e7000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f}, 0xc, &(0x7f0000000440)={&(0x7f00000001c0)=ANY=[@ANYBLOB="1c00000022000100020000000061960d0100000008fe0c009d0a6be0e6d9fc638f19561d6ceb8a6c9239228215fd206cf204e07953", @ANYRES32=0x0], 0x2}, 0x1, 0x0, 0x0, 0xffffffffffffffff}, 0x0) 00:28:54 executing program 1: syz_mount_image$reiserfs(&(0x7f0000000180)='reiserfsB', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[@ANYBLOB='jdev=.']) 00:28:54 executing program 0: syz_mount_image$reiserfs(&(0x7f0000000180)='reiserfsT', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[@ANYBLOB='jdev=./file0,jdev=']) [ 924.608555][ T7155] hfs: can't find a HFS filesystem on dev nbd2 00:28:54 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000480)=@acquire={0x1ac, 0x17, 0x1, 0x0, 0x0, {{@in=@multicast1}, @in6=@ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x1000000000000000}}, {@in=@loopback, @in6=@local}, {{@in, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x2}}}, [@tmpl={0x84, 0x5, [{{@in6=@mcast1, 0x0, 0x3c}, 0x0, @in=@multicast1}, {{@in=@remote, 0x0, 0x3c}, 0x0, @in=@broadcast}]}]}, 0x1ac}}, 0x0) 00:28:54 executing program 2: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(&(0x7f0000000080)=@nbd={'/dev/nbd', 0x0, 0xe0000}, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000240)='hfs\x00\xe6\xa6\xe2\x06g\x96\xb3\v\xf2p\xd5:\x95p\x99\x92\xf2\xc4\x80\x1f\x01\x05\xb7e?\xbfwk\xe4\xe5\xca\x82\xeb\xb1\x04wn*\xf2\xc6\x9d\xc4!\x9e?\x83\x99\x0e\xcc\xa3\x95q.C\xee\x8dIf\xec\xbf\xe8\xb2\t\xedg\x9d\xd9\v\xce\xa3\xa3\xa5\x89F\x03\xefQ\x89\f\xeeRK\x15\xec{D\x9e\x83Z\xabTa\x8e\xcd\x01\xd0\xcfd\xf9c\x87m\xbe>\x81\xba\x9d2\x1c\a,\x12\xbf\xef\xb8m\v\xdf\x8e\xd5\xf5\x1a\xabD\xf6\xe0\x95\xf4\xfeRb_+\xeb\xf9f\xe8\\\x16\xeb\x87\x8e\x8acn4,\x80Q<\x84\xaep\xf9\xfc\x8e\x9f\xed\x06.a\xd5o\x14\r&L\xbd\xb9g\x82;+n\xd5\xcca\v\x86Z\x872\xc3c:`\xf2\x02\xc2\x92\x841\xe7\xca}\"@6}j\x0e\xb7\xa9\xbc\xf3N\xa3\xf3mbd\xfbS\x80\xe0\x11<\x7f\x84\xbe\xa2\xf9\xf7\xee\xf6\x94x\x9d\xe2{\xc5\x83\xc0M\xbb\xd4Io\r\x1c\xd7<\xc0\x84=`\xf1^Y', 0x0, 0x0) 00:28:54 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00004e7000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f}, 0xc, &(0x7f0000000440)={&(0x7f00000001c0)=ANY=[@ANYBLOB="1c00000022000100040000000061960d0100000008fe0c009d0a6be0e6d9fc638f19561d6ceb8a6c9239228215fd206cf204e07953", @ANYRES32=0x0], 0x2}, 0x1, 0x0, 0x0, 0xffffffffffffffff}, 0x0) 00:28:54 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000480)=@acquire={0x1ac, 0x17, 0x1, 0x0, 0x0, {{@in=@multicast1}, @in6=@ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x1100000000000000}}, {@in=@loopback, @in6=@local}, {{@in, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x2}}}, [@tmpl={0x84, 0x5, [{{@in6=@mcast1, 0x0, 0x3c}, 0x0, @in=@multicast1}, {{@in=@remote, 0x0, 0x3c}, 0x0, @in=@broadcast}]}]}, 0x1ac}}, 0x0) [ 924.860133][ T2480] nbd_handle_cmd: 10 callbacks suppressed [ 924.860149][ T2480] block nbd2: Attempted send on invalid socket [ 924.872552][ T2480] print_req_error: 10 callbacks suppressed [ 924.872563][ T2480] print_req_error: I/O error, dev nbd2, sector 2 flags 0 [ 924.888421][ T7184] hfs: can't find a HFS filesystem on dev nbd2 00:28:54 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000180)='./control\x00', 0x0) get_thread_area(0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x3) write$binfmt_script(r0, &(0x7f0000000bc0)=ANY=[@ANYBLOB="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"], 0x145) close(r0) execve(&(0x7f0000000180)='./file0\x00', &(0x7f0000000140), 0x0) r1 = open(&(0x7f0000000000)='./control\x00', 0x80, 0x10) statfs(&(0x7f0000000380)='./control\x00', &(0x7f00000003c0)=""/20) write$P9_RWALK(r0, &(0x7f0000000400)=ANY=[@ANYBLOB="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"], 0x14f) getsockopt$inet_sctp6_SCTP_RTOINFO(r1, 0x84, 0x0, &(0x7f0000000080)={0x0, 0x200, 0x2, 0xffffffff}, &(0x7f0000000100)=0x10) 00:28:54 executing program 2: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(&(0x7f0000000080)=@nbd={'/dev/nbd', 0x0, 0xe0000}, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000240)='hfs\x00\xe6\xa6\xe2\x06g\x96\xb3\v\xf2p\xd5:\x95p\x99\x92\xf2\xc4\x80\x1f\x01\x05\xb8%?\xbfwk\xe4\xe5\xca\x82\xeb\xb1\x04wn*\xf2\xc6\x9d\xc4!\x9e?\x83\x99\x0e\xcc\xa3\x95q.C\xee\x8dIf\xec\xbf\xe8\xb2\t\xedg\x9d\xd9\v\xce\xa3\xa3\xa5\x89F\x03\xefQ\x89\f\xeeRK\x15\xec{D\x9e\x83Z\xabTa\x8e\xcd\x01\xd0\xcfd\xf9c\x87m\xbe>\x81\xba\x9d2\x1c\a,\x12\xbf\xef\xb8m\v\xdf\x8e\xd5\xf5\x1a\xabD\xf6\xe0\x95\xf4\xfeRb_+\xeb\xf9f\xe8\\\x16\xeb\x87\x8e\x8acn4,\x80Q<\x84\xaep\xf9\xfc\x8e\x9f\xed\x06.a\xd5o\x14\r&L\xbd\xb9g\x82;+n\xd5\xcca\v\x86Z\x872\xc3c:`\xf2\x02\xc2\x92\x841\xe7\xca}\"@6}j\x0e\xb7\xa9\xbc\xf3N\xa3\xf3mbd\xfbS\x80\xe0\x11<\x7f\x84\xbe\xa2\xf9\xf7\xee\xf6\x94x\x9d\xe2{\xc5\x83\xc0M\xbb\xd4Io\r\x1c\xd7<\xc0\x84=`\xf1^Y', 0x0, 0x0) 00:28:54 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000480)=@acquire={0x1ac, 0x17, 0x1, 0x0, 0x0, {{@in=@multicast1}, @in6=@ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x1200000000000000}}, {@in=@loopback, @in6=@local}, {{@in, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x2}}}, [@tmpl={0x84, 0x5, [{{@in6=@mcast1, 0x0, 0x3c}, 0x0, @in=@multicast1}, {{@in=@remote, 0x0, 0x3c}, 0x0, @in=@broadcast}]}]}, 0x1ac}}, 0x0) 00:28:54 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00004e7000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f}, 0xc, &(0x7f0000000440)={&(0x7f00000001c0)=ANY=[@ANYBLOB="1c00000022000100080000000061960d0100000008fe0c009d0a6be0e6d9fc638f19561d6ceb8a6c9239228215fd206cf204e07953", @ANYRES32=0x0], 0x2}, 0x1, 0x0, 0x0, 0xffffffffffffffff}, 0x0) 00:28:54 executing program 0: syz_mount_image$reiserfs(&(0x7f0000000180)='reiserfsf', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[@ANYBLOB='jdev=./file0,jdev=']) 00:28:54 executing program 1: syz_mount_image$reiserfs(&(0x7f0000000180)='reiserfsH', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[@ANYBLOB='jdev=.']) [ 925.165930][ T2480] block nbd2: Attempted send on invalid socket [ 925.172567][ T2480] print_req_error: I/O error, dev nbd2, sector 2 flags 0 [ 925.184988][ T7202] hfs: can't find a HFS filesystem on dev nbd2 00:28:54 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000480)=@acquire={0x1ac, 0x17, 0x1, 0x0, 0x0, {{@in=@multicast1}, @in6=@ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x1300000000000000}}, {@in=@loopback, @in6=@local}, {{@in, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x2}}}, [@tmpl={0x84, 0x5, [{{@in6=@mcast1, 0x0, 0x3c}, 0x0, @in=@multicast1}, {{@in=@remote, 0x0, 0x3c}, 0x0, @in=@broadcast}]}]}, 0x1ac}}, 0x0) 00:28:55 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000180)='./control\x00', 0x0) get_thread_area(0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x3) write$binfmt_script(r0, &(0x7f0000000bc0)=ANY=[@ANYBLOB="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"], 0x145) close(r0) execve(&(0x7f0000000180)='./file0\x00', &(0x7f0000000140), 0x0) r1 = open(&(0x7f0000000000)='./control\x00', 0x80, 0x10) statfs(&(0x7f0000000380)='./control\x00', &(0x7f00000003c0)=""/20) write$P9_RWALK(r0, &(0x7f0000000400)=ANY=[@ANYBLOB="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"], 0x14f) getsockopt$inet_sctp6_SCTP_RTOINFO(r1, 0x84, 0x0, &(0x7f0000000080)={0x0, 0x200, 0x2, 0xffffffff}, &(0x7f0000000100)=0x10) 00:28:55 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00004e7000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f}, 0xc, &(0x7f0000000440)={&(0x7f00000001c0)=ANY=[@ANYBLOB="1c000000220001000a0000000061960d0100000008fe0c009d0a6be0e6d9fc638f19561d6ceb8a6c9239228215fd206cf204e07953", @ANYRES32=0x0], 0x2}, 0x1, 0x0, 0x0, 0xffffffffffffffff}, 0x0) 00:28:55 executing program 2: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(&(0x7f0000000080)=@nbd={'/dev/nbd', 0x0, 0xe0000}, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000240)='hfs\x00\xe6\xa6\xe2\x06g\x96\xb3\v\xf2p\xd5:\x95p\x99\x92\xf2\xc4\x80\x1f\x01\x05\xb8e\"\xbfwk\xe4\xe5\xca\x82\xeb\xb1\x04wn*\xf2\xc6\x9d\xc4!\x9e?\x83\x99\x0e\xcc\xa3\x95q.C\xee\x8dIf\xec\xbf\xe8\xb2\t\xedg\x9d\xd9\v\xce\xa3\xa3\xa5\x89F\x03\xefQ\x89\f\xeeRK\x15\xec{D\x9e\x83Z\xabTa\x8e\xcd\x01\xd0\xcfd\xf9c\x87m\xbe>\x81\xba\x9d2\x1c\a,\x12\xbf\xef\xb8m\v\xdf\x8e\xd5\xf5\x1a\xabD\xf6\xe0\x95\xf4\xfeRb_+\xeb\xf9f\xe8\\\x16\xeb\x87\x8e\x8acn4,\x80Q<\x84\xaep\xf9\xfc\x8e\x9f\xed\x06.a\xd5o\x14\r&L\xbd\xb9g\x82;+n\xd5\xcca\v\x86Z\x872\xc3c:`\xf2\x02\xc2\x92\x841\xe7\xca}\"@6}j\x0e\xb7\xa9\xbc\xf3N\xa3\xf3mbd\xfbS\x80\xe0\x11<\x7f\x84\xbe\xa2\xf9\xf7\xee\xf6\x94x\x9d\xe2{\xc5\x83\xc0M\xbb\xd4Io\r\x1c\xd7<\xc0\x84=`\xf1^Y', 0x0, 0x0) 00:28:55 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000480)=@acquire={0x1ac, 0x17, 0x1, 0x0, 0x0, {{@in=@multicast1}, @in6=@ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x2000000000000000}}, {@in=@loopback, @in6=@local}, {{@in, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x2}}}, [@tmpl={0x84, 0x5, [{{@in6=@mcast1, 0x0, 0x3c}, 0x0, @in=@multicast1}, {{@in=@remote, 0x0, 0x3c}, 0x0, @in=@broadcast}]}]}, 0x1ac}}, 0x0) [ 925.370789][ T2480] block nbd2: Attempted send on invalid socket [ 925.377300][ T2480] print_req_error: I/O error, dev nbd2, sector 2 flags 0 [ 925.396495][ T7226] hfs: can't find a HFS filesystem on dev nbd2 00:28:55 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000480)=@acquire={0x1ac, 0x17, 0x1, 0x0, 0x0, {{@in=@multicast1}, @in6=@ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x6000000000000000}}, {@in=@loopback, @in6=@local}, {{@in, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x2}}}, [@tmpl={0x84, 0x5, [{{@in6=@mcast1, 0x0, 0x3c}, 0x0, @in=@multicast1}, {{@in=@remote, 0x0, 0x3c}, 0x0, @in=@broadcast}]}]}, 0x1ac}}, 0x0) 00:28:55 executing program 0: syz_mount_image$reiserfs(&(0x7f0000000180)='reiserfs\x92', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[@ANYBLOB='jdev=./file0,jdev=']) 00:28:55 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00004e7000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f}, 0xc, &(0x7f0000000440)={&(0x7f00000001c0)=ANY=[@ANYBLOB="1c000000220001000e0000000061960d0100000008fe0c009d0a6be0e6d9fc638f19561d6ceb8a6c9239228215fd206cf204e07953", @ANYRES32=0x0], 0x2}, 0x1, 0x0, 0x0, 0xffffffffffffffff}, 0x0) 00:28:55 executing program 2: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(&(0x7f0000000080)=@nbd={'/dev/nbd', 0x0, 0xe0000}, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000240)='hfs\x00\xe6\xa6\xe2\x06g\x96\xb3\v\xf2p\xd5:\x95p\x99\x92\xf2\xc4\x80\x1f\x01\x05\xb8e1\xbfwk\xe4\xe5\xca\x82\xeb\xb1\x04wn*\xf2\xc6\x9d\xc4!\x9e?\x83\x99\x0e\xcc\xa3\x95q.C\xee\x8dIf\xec\xbf\xe8\xb2\t\xedg\x9d\xd9\v\xce\xa3\xa3\xa5\x89F\x03\xefQ\x89\f\xeeRK\x15\xec{D\x9e\x83Z\xabTa\x8e\xcd\x01\xd0\xcfd\xf9c\x87m\xbe>\x81\xba\x9d2\x1c\a,\x12\xbf\xef\xb8m\v\xdf\x8e\xd5\xf5\x1a\xabD\xf6\xe0\x95\xf4\xfeRb_+\xeb\xf9f\xe8\\\x16\xeb\x87\x8e\x8acn4,\x80Q<\x84\xaep\xf9\xfc\x8e\x9f\xed\x06.a\xd5o\x14\r&L\xbd\xb9g\x82;+n\xd5\xcca\v\x86Z\x872\xc3c:`\xf2\x02\xc2\x92\x841\xe7\xca}\"@6}j\x0e\xb7\xa9\xbc\xf3N\xa3\xf3mbd\xfbS\x80\xe0\x11<\x7f\x84\xbe\xa2\xf9\xf7\xee\xf6\x94x\x9d\xe2{\xc5\x83\xc0M\xbb\xd4Io\r\x1c\xd7<\xc0\x84=`\xf1^Y', 0x0, 0x0) 00:28:55 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000180)='./control\x00', 0x0) get_thread_area(0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x3) write$binfmt_script(r0, &(0x7f0000000bc0)=ANY=[@ANYBLOB="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"], 0x145) close(r0) execve(&(0x7f0000000180)='./file0\x00', &(0x7f0000000140), 0x0) r1 = open(&(0x7f0000000000)='./control\x00', 0x80, 0x10) statfs(&(0x7f0000000380)='./control\x00', &(0x7f00000003c0)=""/20) write$P9_RWALK(r0, &(0x7f0000000400)=ANY=[@ANYBLOB="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"], 0x14f) getsockopt$inet_sctp6_SCTP_RTOINFO(r1, 0x84, 0x0, &(0x7f0000000080)={0x0, 0x200, 0x2, 0xffffffff}, &(0x7f0000000100)=0x10) 00:28:55 executing program 1: syz_mount_image$reiserfs(&(0x7f0000000180)='reiserfsL', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[@ANYBLOB='jdev=.']) [ 925.700143][ T2480] block nbd2: Attempted send on invalid socket [ 925.706454][ T2480] print_req_error: I/O error, dev nbd2, sector 2 flags 0 [ 925.713800][ T7247] hfs: can't find a HFS filesystem on dev nbd2 00:28:55 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000480)=@acquire={0x1ac, 0x17, 0x1, 0x0, 0x0, {{@in=@multicast1}, @in6=@ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x9effffff00000000}}, {@in=@loopback, @in6=@local}, {{@in, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x2}}}, [@tmpl={0x84, 0x5, [{{@in6=@mcast1, 0x0, 0x3c}, 0x0, @in=@multicast1}, {{@in=@remote, 0x0, 0x3c}, 0x0, @in=@broadcast}]}]}, 0x1ac}}, 0x0) 00:28:55 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00004e7000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f}, 0xc, &(0x7f0000000440)={&(0x7f00000001c0)=ANY=[@ANYBLOB="1c00000022000100100000000061960d0100000008fe0c009d0a6be0e6d9fc638f19561d6ceb8a6c9239228215fd206cf204e07953", @ANYRES32=0x0], 0x2}, 0x1, 0x0, 0x0, 0xffffffffffffffff}, 0x0) 00:28:55 executing program 4 (fault-call:7 fault-nth:0): perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000180)='./control\x00', 0x0) get_thread_area(0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x3) write$binfmt_script(r0, &(0x7f0000000bc0)=ANY=[@ANYBLOB="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"], 0x145) close(r0) execve(&(0x7f0000000180)='./file0\x00', &(0x7f0000000140), &(0x7f0000000140)) r1 = open(&(0x7f0000000000)='./control\x00', 0x80, 0x10) statfs(&(0x7f0000000380)='./control\x00', &(0x7f00000003c0)=""/20) write$P9_RWALK(r0, &(0x7f0000000400)=ANY=[@ANYBLOB="300000006f0100030001030000000400000000000000100000000003000002000000000300000000000000e646f1c5592139cf131e2bf572fa9728dbfac0390865410f3fa1f25743c497e12cb352eac4046b4500f95cfdfb4cf22a3be5c564a47654334c01d5732d382e27bbccd9b903000000c404000000d32dbd21f3ae581d32e69ef9327f7b487d1b4f4502838c08136678bd90733173ab78d6fc264b373611f15c439384"], 0xa6) getsockopt$inet_sctp6_SCTP_RTOINFO(r1, 0x84, 0x0, &(0x7f0000000080)={0x0, 0x200, 0x2, 0xffffffff}, &(0x7f0000000100)=0x10) 00:28:55 executing program 2: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(&(0x7f0000000080)=@nbd={'/dev/nbd', 0x0, 0xe0000}, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000240)='hfs\x00\xe6\xa6\xe2\x06g\x96\xb3\v\xf2p\xd5:\x95p\x99\x92\xf2\xc4\x80\x1f\x01\x05\xb8e?\xbewk\xe4\xe5\xca\x82\xeb\xb1\x04wn*\xf2\xc6\x9d\xc4!\x9e?\x83\x99\x0e\xcc\xa3\x95q.C\xee\x8dIf\xec\xbf\xe8\xb2\t\xedg\x9d\xd9\v\xce\xa3\xa3\xa5\x89F\x03\xefQ\x89\f\xeeRK\x15\xec{D\x9e\x83Z\xabTa\x8e\xcd\x01\xd0\xcfd\xf9c\x87m\xbe>\x81\xba\x9d2\x1c\a,\x12\xbf\xef\xb8m\v\xdf\x8e\xd5\xf5\x1a\xabD\xf6\xe0\x95\xf4\xfeRb_+\xeb\xf9f\xe8\\\x16\xeb\x87\x8e\x8acn4,\x80Q<\x84\xaep\xf9\xfc\x8e\x9f\xed\x06.a\xd5o\x14\r&L\xbd\xb9g\x82;+n\xd5\xcca\v\x86Z\x872\xc3c:`\xf2\x02\xc2\x92\x841\xe7\xca}\"@6}j\x0e\xb7\xa9\xbc\xf3N\xa3\xf3mbd\xfbS\x80\xe0\x11<\x7f\x84\xbe\xa2\xf9\xf7\xee\xf6\x94x\x9d\xe2{\xc5\x83\xc0M\xbb\xd4Io\r\x1c\xd7<\xc0\x84=`\xf1^Y', 0x0, 0x0) 00:28:55 executing program 0: syz_mount_image$reiserfs(&(0x7f0000000180)='reiserfs\xaa', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[@ANYBLOB='jdev=./file0,jdev=']) 00:28:55 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000480)=@acquire={0x1ac, 0x17, 0x1, 0x0, 0x0, {{@in=@multicast1}, @in6=@ipv4={[], [], @dev={0xac, 0x14, 0x14, 0xf0ffffff00000000}}, {@in=@loopback, @in6=@local}, {{@in, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x2}}}, [@tmpl={0x84, 0x5, [{{@in6=@mcast1, 0x0, 0x3c}, 0x0, @in=@multicast1}, {{@in=@remote, 0x0, 0x3c}, 0x0, @in=@broadcast}]}]}, 0x1ac}}, 0x0) [ 925.924208][ T2481] block nbd2: Attempted send on invalid socket [ 925.930433][ T2481] print_req_error: I/O error, dev nbd2, sector 2 flags 0 [ 925.940020][ T7278] hfs: can't find a HFS filesystem on dev nbd2 00:28:55 executing program 2: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(&(0x7f0000000080)=@nbd={'/dev/nbd', 0x0, 0xe0000}, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000240)='hfs\x00\xe6\xa6\xe2\x06g\x96\xb3\v\xf2p\xd5:\x95p\x99\x92\xf2\xc4\x80\x1f\x01\x05\xb8e?\xbfwk\xe3\xe5\xca\x82\xeb\xb1\x04wn*\xf2\xc6\x9d\xc4!\x9e?\x83\x99\x0e\xcc\xa3\x95q.C\xee\x8dIf\xec\xbf\xe8\xb2\t\xedg\x9d\xd9\v\xce\xa3\xa3\xa5\x89F\x03\xefQ\x89\f\xeeRK\x15\xec{D\x9e\x83Z\xabTa\x8e\xcd\x01\xd0\xcfd\xf9c\x87m\xbe>\x81\xba\x9d2\x1c\a,\x12\xbf\xef\xb8m\v\xdf\x8e\xd5\xf5\x1a\xabD\xf6\xe0\x95\xf4\xfeRb_+\xeb\xf9f\xe8\\\x16\xeb\x87\x8e\x8acn4,\x80Q<\x84\xaep\xf9\xfc\x8e\x9f\xed\x06.a\xd5o\x14\r&L\xbd\xb9g\x82;+n\xd5\xcca\v\x86Z\x872\xc3c:`\xf2\x02\xc2\x92\x841\xe7\xca}\"@6}j\x0e\xb7\xa9\xbc\xf3N\xa3\xf3mbd\xfbS\x80\xe0\x11<\x7f\x84\xbe\xa2\xf9\xf7\xee\xf6\x94x\x9d\xe2{\xc5\x83\xc0M\xbb\xd4Io\r\x1c\xd7<\xc0\x84=`\xf1^Y', 0x0, 0x0) 00:28:55 executing program 1: syz_mount_image$reiserfs(&(0x7f0000000180)='reiserfs`', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[@ANYBLOB='jdev=.']) 00:28:55 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00004e7000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f}, 0xc, &(0x7f0000000440)={&(0x7f00000001c0)=ANY=[@ANYBLOB="1c00000022000100600000000061960d0100000008fe0c009d0a6be0e6d9fc638f19561d6ceb8a6c9239228215fd206cf204e07953", @ANYRES32=0x0], 0x2}, 0x1, 0x0, 0x0, 0xffffffffffffffff}, 0x0) [ 926.056025][ T7280] FAULT_INJECTION: forcing a failure. [ 926.056025][ T7280] name failslab, interval 1, probability 0, space 0, times 0 [ 926.099438][ T7280] CPU: 1 PID: 7280 Comm: syz-executor4 Not tainted 5.0.0-rc2-next-20190117 #14 [ 926.108388][ T7280] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 926.118457][ T7280] Call Trace: [ 926.121762][ T7280] dump_stack+0x1db/0x2d0 [ 926.126110][ T7280] ? dump_stack_print_info.cold+0x20/0x20 [ 926.131838][ T7280] ? retint_kernel+0x2d/0x2d [ 926.136440][ T7280] ? trace_hardirqs_on_caller+0xc0/0x310 [ 926.140797][ T2481] block nbd2: Attempted send on invalid socket [ 926.142078][ T7280] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 926.142102][ T7280] should_fail.cold+0xa/0x14 [ 926.142121][ T7280] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 926.142136][ T7280] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 926.142168][ T7280] __should_failslab+0x121/0x190 [ 926.148300][ T2481] print_req_error: I/O error, dev nbd2, sector 2 flags 0 [ 926.153739][ T7280] should_failslab+0x9/0x14 [ 926.153754][ T7280] kmem_cache_alloc+0x2be/0x710 [ 926.153784][ T7280] getname_flags+0xd6/0x5b0 [ 926.159415][ T7293] hfs: can't find a HFS filesystem on dev nbd2 [ 926.164148][ T7280] getname+0x1a/0x20 [ 926.164166][ T7280] __x64_sys_execve+0x73/0xc0 [ 926.164183][ T7280] do_syscall_64+0x1a3/0x800 [ 926.164201][ T7280] ? syscall_return_slowpath+0x5f0/0x5f0 [ 926.164231][ T7280] ? prepare_exit_to_usermode+0x232/0x3b0 [ 926.164252][ T7280] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 926.231511][ T7280] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 926.237403][ T7280] RIP: 0033:0x458099 [ 926.241303][ T7280] Code: 6d b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 3b b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 926.260897][ T7280] RSP: 002b:00007f0a9fbd4c78 EFLAGS: 00000246 ORIG_RAX: 000000000000003b [ 926.269827][ T7280] RAX: ffffffffffffffda RBX: 00007f0a9fbd4c90 RCX: 0000000000458099 [ 926.277807][ T7280] RDX: 0000000020000140 RSI: 0000000020000140 RDI: 0000000020000180 [ 926.285771][ T7280] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 00:28:56 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000480)=@acquire={0x1ac, 0x17, 0x1, 0x0, 0x0, {{@in=@multicast1}, @in6=@ipv4={[], [], @dev={0xac, 0x14, 0x14, 0xfcffffff00000000}}, {@in=@loopback, @in6=@local}, {{@in, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x2}}}, [@tmpl={0x84, 0x5, [{{@in6=@mcast1, 0x0, 0x3c}, 0x0, @in=@multicast1}, {{@in=@remote, 0x0, 0x3c}, 0x0, @in=@broadcast}]}]}, 0x1ac}}, 0x0) 00:28:56 executing program 4 (fault-call:7 fault-nth:1): perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000180)='./control\x00', 0x0) get_thread_area(0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x3) write$binfmt_script(r0, &(0x7f0000000bc0)=ANY=[@ANYBLOB="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"], 0x145) close(r0) execve(&(0x7f0000000180)='./file0\x00', &(0x7f0000000140), &(0x7f0000000140)) r1 = open(&(0x7f0000000000)='./control\x00', 0x80, 0x10) statfs(&(0x7f0000000380)='./control\x00', &(0x7f00000003c0)=""/20) write$P9_RWALK(r0, &(0x7f0000000400)=ANY=[@ANYBLOB="300000006f0100030001030000000400000000000000100000000003000002000000000300000000000000e646f1c5592139cf131e2bf572fa9728dbfac0390865410f3fa1f25743c497e12cb352eac4046b4500f95cfdfb4cf22a3be5c564a47654334c01d5732d382e27bbccd9b903000000c404000000d32dbd21f3ae581d32e69ef9327f7b487d1b4f4502838c08136678bd90733173ab78d6fc264b373611f15c439384"], 0xa6) getsockopt$inet_sctp6_SCTP_RTOINFO(r1, 0x84, 0x0, &(0x7f0000000080)={0x0, 0x200, 0x2, 0xffffffff}, &(0x7f0000000100)=0x10) [ 926.293749][ T7280] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f0a9fbd56d4 [ 926.301731][ T7280] R13: 00000000004be6af R14: 00000000004ced68 R15: 0000000000000004 [ 926.333738][ T2480] block nbd2: Attempted send on invalid socket [ 926.339953][ T2480] print_req_error: I/O error, dev nbd2, sector 2 flags 0 [ 926.347353][ T7293] hfs: can't find a HFS filesystem on dev nbd2 00:28:56 executing program 2: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(&(0x7f0000000080)=@nbd={'/dev/nbd', 0x0, 0xe0000}, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000240)='hfs\x00\xe6\xa6\xe2\x06g\x96\xb3\v\xf2p\xd5:\x95p\x99\x92\xf2\xc4\x80\x1f\x01\x05\xb8e?\xbfwk\xe5\xe5\xca\x82\xeb\xb1\x04wn*\xf2\xc6\x9d\xc4!\x9e?\x83\x99\x0e\xcc\xa3\x95q.C\xee\x8dIf\xec\xbf\xe8\xb2\t\xedg\x9d\xd9\v\xce\xa3\xa3\xa5\x89F\x03\xefQ\x89\f\xeeRK\x15\xec{D\x9e\x83Z\xabTa\x8e\xcd\x01\xd0\xcfd\xf9c\x87m\xbe>\x81\xba\x9d2\x1c\a,\x12\xbf\xef\xb8m\v\xdf\x8e\xd5\xf5\x1a\xabD\xf6\xe0\x95\xf4\xfeRb_+\xeb\xf9f\xe8\\\x16\xeb\x87\x8e\x8acn4,\x80Q<\x84\xaep\xf9\xfc\x8e\x9f\xed\x06.a\xd5o\x14\r&L\xbd\xb9g\x82;+n\xd5\xcca\v\x86Z\x872\xc3c:`\xf2\x02\xc2\x92\x841\xe7\xca}\"@6}j\x0e\xb7\xa9\xbc\xf3N\xa3\xf3mbd\xfbS\x80\xe0\x11<\x7f\x84\xbe\xa2\xf9\xf7\xee\xf6\x94x\x9d\xe2{\xc5\x83\xc0M\xbb\xd4Io\r\x1c\xd7<\xc0\x84=`\xf1^Y', 0x0, 0x0) 00:28:56 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000480)=@acquire={0x1ac, 0x17, 0x1, 0x0, 0x0, {{@in=@multicast1}, @in6=@ipv4={[], [], @dev={0xac, 0x14, 0x14, 0xffffff7f00000000}}, {@in=@loopback, @in6=@local}, {{@in, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x2}}}, [@tmpl={0x84, 0x5, [{{@in6=@mcast1, 0x0, 0x3c}, 0x0, @in=@multicast1}, {{@in=@remote, 0x0, 0x3c}, 0x0, @in=@broadcast}]}]}, 0x1ac}}, 0x0) 00:28:56 executing program 0: syz_mount_image$reiserfs(&(0x7f0000000180)='reiserfs\xda', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[@ANYBLOB='jdev=./file0,jdev=']) 00:28:56 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00004e7000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f}, 0xc, &(0x7f0000000440)={&(0x7f00000001c0)=ANY=[@ANYBLOB="1c00000022000100f00000000061960d0100000008fe0c009d0a6be0e6d9fc638f19561d6ceb8a6c9239228215fd206cf204e07953", @ANYRES32=0x0], 0x2}, 0x1, 0x0, 0x0, 0xffffffffffffffff}, 0x0) [ 926.573569][ T7311] FAULT_INJECTION: forcing a failure. [ 926.573569][ T7311] name failslab, interval 1, probability 0, space 0, times 0 [ 926.588218][ T7311] CPU: 1 PID: 7311 Comm: syz-executor4 Not tainted 5.0.0-rc2-next-20190117 #14 [ 926.597174][ T7311] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 926.607235][ T7311] Call Trace: [ 926.610533][ T7311] dump_stack+0x1db/0x2d0 [ 926.614865][ T7311] ? dump_stack_print_info.cold+0x20/0x20 [ 926.620594][ T7311] ? retint_kernel+0x2d/0x2d [ 926.625192][ T7311] ? fs_reclaim_acquire+0x20/0x20 [ 926.630321][ T7311] should_fail.cold+0xa/0x14 [ 926.634934][ T7311] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 926.640801][ T7311] ? ___might_sleep+0x1e7/0x310 [ 926.645657][ T7311] ? arch_local_save_flags+0x50/0x50 [ 926.650967][ T7311] __should_failslab+0x121/0x190 [ 926.655925][ T7311] should_failslab+0x9/0x14 [ 926.660446][ T7311] kmem_cache_alloc+0x2be/0x710 [ 926.665306][ T7311] ? lock_downgrade+0xbe0/0xbe0 [ 926.670169][ T7311] ? kasan_check_read+0x11/0x20 [ 926.675034][ T7311] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 926.681014][ T7311] dup_fd+0x100/0xe80 [ 926.685035][ T7311] ? __fdget+0x20/0x20 [ 926.689131][ T7311] ? kernel_text_address+0x73/0xf0 [ 926.694242][ T7311] ? __kernel_text_address+0xd/0x40 [ 926.699462][ T7311] ? unwind_get_return_address+0x61/0xa0 [ 926.705091][ T7311] ? __save_stack_trace+0x8a/0xf0 [ 926.710130][ T7311] unshare_fd+0x1f3/0x2c0 [ 926.714461][ T7311] ? save_stack+0xa9/0xd0 [ 926.718786][ T7311] ? set_max_threads+0x1a0/0x1a0 [ 926.723721][ T7311] ? kasan_slab_alloc+0xf/0x20 [ 926.728481][ T7311] ? kmem_cache_alloc+0x12d/0x710 [ 926.733494][ T7311] ? getname_flags+0xd6/0x5b0 [ 926.738164][ T7311] ? __x64_sys_execve+0x73/0xc0 [ 926.743010][ T7311] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 926.749074][ T7311] ? add_lock_to_list.isra.0+0x450/0x450 [ 926.754706][ T7311] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 926.760182][ T7311] unshare_files+0xa9/0x2d0 [ 926.764686][ T7311] ? trace_hardirqs_on_caller+0xc0/0x310 [ 926.770313][ T7311] ? __ia32_sys_unshare+0x40/0x40 [ 926.775335][ T7311] ? __phys_addr_symbol+0x30/0x70 [ 926.780356][ T7311] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 926.786072][ T7311] ? __check_object_size+0xa3/0x790 [ 926.791271][ T7311] __do_execve_file.isra.0+0x331/0x2700 [ 926.796810][ T7311] ? getname_flags+0xd6/0x5b0 [ 926.801490][ T7311] ? rcu_pm_notify+0xd0/0xd0 [ 926.806090][ T7311] ? copy_strings_kernel+0x110/0x110 [ 926.811383][ T7311] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 926.817628][ T7311] ? strncpy_from_user+0x3aa/0x4e0 [ 926.822736][ T7311] ? digsig_verify.cold+0x32/0x32 [ 926.827758][ T7311] ? kmem_cache_alloc+0x341/0x710 [ 926.832783][ T7311] ? do_syscall_64+0x8c/0x800 [ 926.837468][ T7311] ? lockdep_hardirqs_on+0x415/0x5d0 [ 926.842797][ T7311] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 926.849029][ T7311] ? getname_flags+0x277/0x5b0 [ 926.853787][ T7311] ? trace_hardirqs_off_caller+0x300/0x300 [ 926.859622][ T7311] __x64_sys_execve+0x8f/0xc0 [ 926.864298][ T7311] do_syscall_64+0x1a3/0x800 [ 926.868888][ T7311] ? syscall_return_slowpath+0x5f0/0x5f0 [ 926.874519][ T7311] ? prepare_exit_to_usermode+0x232/0x3b0 [ 926.880241][ T7311] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 926.885810][ T7311] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 926.891698][ T7311] RIP: 0033:0x458099 [ 926.895593][ T7311] Code: 6d b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 3b b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 926.915225][ T7311] RSP: 002b:00007f0a9fbd4c78 EFLAGS: 00000246 ORIG_RAX: 000000000000003b [ 926.923649][ T7311] RAX: ffffffffffffffda RBX: 00007f0a9fbd4c90 RCX: 0000000000458099 [ 926.931699][ T7311] RDX: 0000000020000140 RSI: 0000000020000140 RDI: 0000000020000180 [ 926.939716][ T7311] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 926.947710][ T7311] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f0a9fbd56d4 [ 926.955681][ T7311] R13: 00000000004be6af R14: 00000000004ced68 R15: 0000000000000004 00:28:56 executing program 4 (fault-call:7 fault-nth:2): perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000180)='./control\x00', 0x0) get_thread_area(0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x3) write$binfmt_script(r0, &(0x7f0000000bc0)=ANY=[@ANYBLOB="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"], 0x145) close(r0) execve(&(0x7f0000000180)='./file0\x00', &(0x7f0000000140), &(0x7f0000000140)) r1 = open(&(0x7f0000000000)='./control\x00', 0x80, 0x10) statfs(&(0x7f0000000380)='./control\x00', &(0x7f00000003c0)=""/20) write$P9_RWALK(r0, &(0x7f0000000400)=ANY=[@ANYBLOB="300000006f0100030001030000000400000000000000100000000003000002000000000300000000000000e646f1c5592139cf131e2bf572fa9728dbfac0390865410f3fa1f25743c497e12cb352eac4046b4500f95cfdfb4cf22a3be5c564a47654334c01d5732d382e27bbccd9b903000000c404000000d32dbd21f3ae581d32e69ef9327f7b487d1b4f4502838c08136678bd90733173ab78d6fc264b373611f15c439384"], 0xa6) getsockopt$inet_sctp6_SCTP_RTOINFO(r1, 0x84, 0x0, &(0x7f0000000080)={0x0, 0x200, 0x2, 0xffffffff}, &(0x7f0000000100)=0x10) [ 927.008821][ T2481] block nbd2: Attempted send on invalid socket [ 927.015149][ T2481] print_req_error: I/O error, dev nbd2, sector 2 flags 0 [ 927.024005][ T7315] hfs: can't find a HFS filesystem on dev nbd2 00:28:56 executing program 1: syz_mount_image$reiserfs(&(0x7f0000000180)='reiserfsb', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[@ANYBLOB='jdev=.']) 00:28:56 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000480)=@acquire={0x1ac, 0x17, 0x1, 0x0, 0x0, {{@in=@multicast1}, @in6=@ipv4={[], [], @dev={0xac, 0x14, 0x14, 0xffffffff00000000}}, {@in=@loopback, @in6=@local}, {{@in, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x2}}}, [@tmpl={0x84, 0x5, [{{@in6=@mcast1, 0x0, 0x3c}, 0x0, @in=@multicast1}, {{@in=@remote, 0x0, 0x3c}, 0x0, @in=@broadcast}]}]}, 0x1ac}}, 0x0) 00:28:56 executing program 2: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(&(0x7f0000000080)=@nbd={'/dev/nbd', 0x0, 0xe0000}, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000240)='hfs\x00\xe6\xa6\xe2\x06g\x96\xb3\v\xf2p\xd5:\x95p\x99\x92\xf2\xc4\x80\x1f\x01\x05\xb8e?\xbfwk\xe4\xe4\xca\x82\xeb\xb1\x04wn*\xf2\xc6\x9d\xc4!\x9e?\x83\x99\x0e\xcc\xa3\x95q.C\xee\x8dIf\xec\xbf\xe8\xb2\t\xedg\x9d\xd9\v\xce\xa3\xa3\xa5\x89F\x03\xefQ\x89\f\xeeRK\x15\xec{D\x9e\x83Z\xabTa\x8e\xcd\x01\xd0\xcfd\xf9c\x87m\xbe>\x81\xba\x9d2\x1c\a,\x12\xbf\xef\xb8m\v\xdf\x8e\xd5\xf5\x1a\xabD\xf6\xe0\x95\xf4\xfeRb_+\xeb\xf9f\xe8\\\x16\xeb\x87\x8e\x8acn4,\x80Q<\x84\xaep\xf9\xfc\x8e\x9f\xed\x06.a\xd5o\x14\r&L\xbd\xb9g\x82;+n\xd5\xcca\v\x86Z\x872\xc3c:`\xf2\x02\xc2\x92\x841\xe7\xca}\"@6}j\x0e\xb7\xa9\xbc\xf3N\xa3\xf3mbd\xfbS\x80\xe0\x11<\x7f\x84\xbe\xa2\xf9\xf7\xee\xf6\x94x\x9d\xe2{\xc5\x83\xc0M\xbb\xd4Io\r\x1c\xd7<\xc0\x84=`\xf1^Y', 0x0, 0x0) [ 927.233090][ T7334] FAULT_INJECTION: forcing a failure. [ 927.233090][ T7334] name failslab, interval 1, probability 0, space 0, times 0 [ 927.247709][ T7334] CPU: 1 PID: 7334 Comm: syz-executor4 Not tainted 5.0.0-rc2-next-20190117 #14 [ 927.256682][ T7334] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 927.266716][ T7334] Call Trace: [ 927.269988][ T7334] dump_stack+0x1db/0x2d0 [ 927.274348][ T7334] ? dump_stack_print_info.cold+0x20/0x20 [ 927.280112][ T7334] ? update_curr+0x4ae/0xbc0 [ 927.284694][ T7334] should_fail.cold+0xa/0x14 [ 927.289299][ T7334] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 927.295087][ T7334] ? ___might_sleep+0x1e7/0x310 [ 927.299962][ T7334] ? arch_local_save_flags+0x50/0x50 [ 927.305235][ T7334] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 927.310679][ T7334] __should_failslab+0x121/0x190 [ 927.315601][ T7334] should_failslab+0x9/0x14 [ 927.320084][ T7334] kmem_cache_alloc+0x2be/0x710 [ 927.324956][ T7334] ? dup_fd+0xa2/0xe80 [ 927.329023][ T7334] dup_fd+0x100/0xe80 [ 927.333016][ T7334] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 927.338454][ T7334] ? __fdget+0x20/0x20 [ 927.342504][ T7334] ? retint_kernel+0x2d/0x2d [ 927.347077][ T7334] ? depot_save_stack+0x7a/0x460 [ 927.352015][ T7334] unshare_fd+0x1f3/0x2c0 [ 927.356336][ T7334] ? save_stack+0xa9/0xd0 [ 927.360701][ T7334] ? set_max_threads+0x1a0/0x1a0 [ 927.365621][ T7334] ? kasan_slab_alloc+0xf/0x20 [ 927.370386][ T7334] ? kmem_cache_alloc+0x12d/0x710 [ 927.375395][ T7334] ? getname_flags+0xd6/0x5b0 [ 927.380065][ T7334] ? __x64_sys_execve+0x73/0xc0 [ 927.384898][ T7334] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 927.390986][ T7334] ? rcu_read_lock_sched_held+0x110/0x130 [ 927.396702][ T7334] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 927.402157][ T7334] unshare_files+0xa9/0x2d0 [ 927.406649][ T7334] ? trace_hardirqs_on_caller+0xc0/0x310 [ 927.412292][ T7334] ? find_held_lock+0x35/0x120 [ 927.417042][ T7334] ? __ia32_sys_unshare+0x40/0x40 [ 927.422052][ T7334] ? __phys_addr_symbol+0x30/0x70 [ 927.427060][ T7334] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 927.432778][ T7334] ? __check_object_size+0xa3/0x790 [ 927.437961][ T7334] __do_execve_file.isra.0+0x331/0x2700 [ 927.443482][ T7334] ? getname_flags+0xd6/0x5b0 [ 927.448140][ T7334] ? rcu_pm_notify+0xd0/0xd0 [ 927.452708][ T7334] ? copy_strings_kernel+0x110/0x110 [ 927.457974][ T7334] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 927.464194][ T7334] ? strncpy_from_user+0x3aa/0x4e0 [ 927.469305][ T7334] ? digsig_verify.cold+0x32/0x32 [ 927.474311][ T7334] ? kmem_cache_alloc+0x341/0x710 [ 927.479319][ T7334] ? do_syscall_64+0x8c/0x800 [ 927.483986][ T7334] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 927.490255][ T7334] ? getname_flags+0x277/0x5b0 [ 927.494997][ T7334] ? trace_hardirqs_off_caller+0x300/0x300 [ 927.500786][ T7334] __x64_sys_execve+0x8f/0xc0 [ 927.505465][ T7334] do_syscall_64+0x1a3/0x800 [ 927.510051][ T7334] ? syscall_return_slowpath+0x5f0/0x5f0 [ 927.515660][ T7334] ? prepare_exit_to_usermode+0x232/0x3b0 [ 927.521369][ T7334] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 927.526897][ T7334] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 927.532783][ T7334] RIP: 0033:0x458099 [ 927.536660][ T7334] Code: 6d b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 3b b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 927.556771][ T7334] RSP: 002b:00007f0a9fbd4c78 EFLAGS: 00000246 ORIG_RAX: 000000000000003b [ 927.565158][ T7334] RAX: ffffffffffffffda RBX: 00007f0a9fbd4c90 RCX: 0000000000458099 [ 927.573130][ T7334] RDX: 0000000020000140 RSI: 0000000020000140 RDI: 0000000020000180 00:28:57 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00004e7000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f}, 0xc, &(0x7f0000000440)={&(0x7f00000001c0)=ANY=[@ANYBLOB="1c00000022000100000a00000061960d0100000008fe0c009d0a6be0e6d9fc638f19561d6ceb8a6c9239228215fd206cf204e07953", @ANYRES32=0x0], 0x2}, 0x1, 0x0, 0x0, 0xffffffffffffffff}, 0x0) 00:28:57 executing program 4 (fault-call:7 fault-nth:3): perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000180)='./control\x00', 0x0) get_thread_area(0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x3) write$binfmt_script(r0, &(0x7f0000000bc0)=ANY=[@ANYBLOB="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"], 0x145) close(r0) execve(&(0x7f0000000180)='./file0\x00', &(0x7f0000000140), &(0x7f0000000140)) r1 = open(&(0x7f0000000000)='./control\x00', 0x80, 0x10) statfs(&(0x7f0000000380)='./control\x00', &(0x7f00000003c0)=""/20) write$P9_RWALK(r0, &(0x7f0000000400)=ANY=[@ANYBLOB="300000006f0100030001030000000400000000000000100000000003000002000000000300000000000000e646f1c5592139cf131e2bf572fa9728dbfac0390865410f3fa1f25743c497e12cb352eac4046b4500f95cfdfb4cf22a3be5c564a47654334c01d5732d382e27bbccd9b903000000c404000000d32dbd21f3ae581d32e69ef9327f7b487d1b4f4502838c08136678bd90733173ab78d6fc264b373611f15c439384"], 0xa6) getsockopt$inet_sctp6_SCTP_RTOINFO(r1, 0x84, 0x0, &(0x7f0000000080)={0x0, 0x200, 0x2, 0xffffffff}, &(0x7f0000000100)=0x10) [ 927.581087][ T7334] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 927.589036][ T7334] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f0a9fbd56d4 [ 927.597028][ T7334] R13: 00000000004be6af R14: 00000000004ced68 R15: 0000000000000004 00:28:57 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000480)=@acquire={0x1ac, 0x17, 0x1, 0x0, 0x0, {{@in=@multicast1}, @in6=@ipv4={[], [], @dev={0xac, 0x14, 0x14, 0xfffffffffffff000}}, {@in=@loopback, @in6=@local}, {{@in, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x2}}}, [@tmpl={0x84, 0x5, [{{@in6=@mcast1, 0x0, 0x3c}, 0x0, @in=@multicast1}, {{@in=@remote, 0x0, 0x3c}, 0x0, @in=@broadcast}]}]}, 0x1ac}}, 0x0) [ 927.717680][ T2480] block nbd2: Attempted send on invalid socket [ 927.723956][ T2480] print_req_error: I/O error, dev nbd2, sector 2 flags 0 [ 927.739756][ T7348] hfs: can't find a HFS filesystem on dev nbd2 00:28:57 executing program 0: syz_mount_image$reiserfs(&(0x7f0000000180)='reiserfs\xec', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[@ANYBLOB='jdev=./file0,jdev=']) [ 927.819461][ T7357] FAULT_INJECTION: forcing a failure. [ 927.819461][ T7357] name failslab, interval 1, probability 0, space 0, times 0 [ 927.836048][ T7357] CPU: 1 PID: 7357 Comm: syz-executor4 Not tainted 5.0.0-rc2-next-20190117 #14 [ 927.844994][ T7357] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 927.855049][ T7357] Call Trace: [ 927.858369][ T7357] dump_stack+0x1db/0x2d0 [ 927.862716][ T7357] ? dump_stack_print_info.cold+0x20/0x20 00:28:57 executing program 2: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(&(0x7f0000000080)=@nbd={'/dev/nbd', 0x0, 0xe0000}, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000240)='hfs\x00\xe6\xa6\xe2\x06g\x96\xb3\v\xf2p\xd5:\x95p\x99\x92\xf2\xc4\x80\x1f\x01\x05\xb8e?\xbfwk\xe4\xe5\xc9\x82\xeb\xb1\x04wn*\xf2\xc6\x9d\xc4!\x9e?\x83\x99\x0e\xcc\xa3\x95q.C\xee\x8dIf\xec\xbf\xe8\xb2\t\xedg\x9d\xd9\v\xce\xa3\xa3\xa5\x89F\x03\xefQ\x89\f\xeeRK\x15\xec{D\x9e\x83Z\xabTa\x8e\xcd\x01\xd0\xcfd\xf9c\x87m\xbe>\x81\xba\x9d2\x1c\a,\x12\xbf\xef\xb8m\v\xdf\x8e\xd5\xf5\x1a\xabD\xf6\xe0\x95\xf4\xfeRb_+\xeb\xf9f\xe8\\\x16\xeb\x87\x8e\x8acn4,\x80Q<\x84\xaep\xf9\xfc\x8e\x9f\xed\x06.a\xd5o\x14\r&L\xbd\xb9g\x82;+n\xd5\xcca\v\x86Z\x872\xc3c:`\xf2\x02\xc2\x92\x841\xe7\xca}\"@6}j\x0e\xb7\xa9\xbc\xf3N\xa3\xf3mbd\xfbS\x80\xe0\x11<\x7f\x84\xbe\xa2\xf9\xf7\xee\xf6\x94x\x9d\xe2{\xc5\x83\xc0M\xbb\xd4Io\r\x1c\xd7<\xc0\x84=`\xf1^Y', 0x0, 0x0) [ 927.868443][ T7357] ? __do_execve_file.isra.0+0x331/0x2700 [ 927.874173][ T7357] ? __x64_sys_execve+0x8f/0xc0 [ 927.879032][ T7357] ? do_syscall_64+0x1a3/0x800 [ 927.883811][ T7357] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 927.889908][ T7357] should_fail.cold+0xa/0x14 [ 927.894504][ T7357] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 927.900298][ T7357] ? ___might_sleep+0x1e7/0x310 [ 927.905131][ T7357] ? arch_local_save_flags+0x50/0x50 [ 927.910411][ T7357] ? find_held_lock+0x35/0x120 [ 927.915193][ T7357] __should_failslab+0x121/0x190 [ 927.920117][ T7357] should_failslab+0x9/0x14 [ 927.924601][ T7357] kmem_cache_alloc_trace+0x2d1/0x760 [ 927.929973][ T7357] ? do_raw_spin_unlock+0xa0/0x330 [ 927.935063][ T7357] ? do_raw_spin_trylock+0x270/0x270 [ 927.940344][ T7357] alloc_fdtable+0x86/0x290 [ 927.944828][ T7357] dup_fd+0x993/0xe80 [ 927.948792][ T7357] ? __fdget+0x20/0x20 [ 927.952844][ T7357] ? kernel_text_address+0x73/0xf0 [ 927.957938][ T7357] ? unwind_get_return_address+0x61/0xa0 [ 927.963549][ T7357] ? __save_stack_trace+0x8a/0xf0 [ 927.968559][ T7357] unshare_fd+0x1f3/0x2c0 [ 927.972870][ T7357] ? set_max_threads+0x1a0/0x1a0 [ 927.977784][ T7357] ? retint_kernel+0x2d/0x2d [ 927.982355][ T7357] ? trace_hardirqs_on_caller+0xc0/0x310 [ 927.987984][ T7357] ? __x64_sys_execve+0x73/0xc0 [ 927.992835][ T7357] ? __bpf_trace_preemptirq_template+0x30/0x30 [ 927.998998][ T7357] ? rcu_read_lock_sched_held+0x110/0x130 [ 928.004697][ T7357] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 928.010131][ T7357] unshare_files+0xa9/0x2d0 [ 928.014614][ T7357] ? __ia32_sys_unshare+0x40/0x40 [ 928.019630][ T7357] ? __phys_addr_symbol+0x30/0x70 [ 928.024647][ T7357] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 928.030350][ T7357] ? __check_object_size+0xa3/0x790 [ 928.035533][ T7357] __do_execve_file.isra.0+0x331/0x2700 [ 928.041086][ T7357] ? copy_strings_kernel+0x110/0x110 [ 928.046353][ T7357] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 928.052571][ T7357] ? strncpy_from_user+0x3aa/0x4e0 [ 928.057685][ T7357] ? digsig_verify.cold+0x32/0x32 [ 928.062723][ T7357] ? kmem_cache_alloc+0x341/0x710 [ 928.067736][ T7357] ? retint_kernel+0x2d/0x2d [ 928.072307][ T7357] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 928.078523][ T7357] ? getname_flags+0x277/0x5b0 [ 928.083323][ T7357] ? setup_new_exec+0x760/0x760 [ 928.088172][ T7357] __x64_sys_execve+0x8f/0xc0 [ 928.092832][ T7357] do_syscall_64+0x1a3/0x800 [ 928.097404][ T7357] ? syscall_return_slowpath+0x5f0/0x5f0 [ 928.103020][ T7357] ? prepare_exit_to_usermode+0x232/0x3b0 [ 928.108737][ T7357] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 928.114265][ T7357] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 928.120133][ T7357] RIP: 0033:0x458099 [ 928.124008][ T7357] Code: 6d b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 3b b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 928.143608][ T7357] RSP: 002b:00007f0a9fbd4c78 EFLAGS: 00000246 ORIG_RAX: 000000000000003b [ 928.151997][ T7357] RAX: ffffffffffffffda RBX: 00007f0a9fbd4c90 RCX: 0000000000458099 [ 928.159961][ T7357] RDX: 0000000020000140 RSI: 0000000020000140 RDI: 0000000020000180 00:28:57 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00004e7000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f}, 0xc, &(0x7f0000000440)={&(0x7f00000001c0)=ANY=[@ANYBLOB="1c00000022000100b00a00000061960d0100000008fe0c009d0a6be0e6d9fc638f19561d6ceb8a6c9239228215fd206cf204e07953", @ANYRES32=0x0], 0x2}, 0x1, 0x0, 0x0, 0xffffffffffffffff}, 0x0) [ 928.167922][ T7357] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 928.175873][ T7357] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f0a9fbd56d4 [ 928.183822][ T7357] R13: 00000000004be6af R14: 00000000004ced68 R15: 0000000000000004 00:28:58 executing program 4 (fault-call:7 fault-nth:4): perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000180)='./control\x00', 0x0) get_thread_area(0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x3) write$binfmt_script(r0, &(0x7f0000000bc0)=ANY=[@ANYBLOB="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"], 0x145) close(r0) execve(&(0x7f0000000180)='./file0\x00', &(0x7f0000000140), &(0x7f0000000140)) r1 = open(&(0x7f0000000000)='./control\x00', 0x80, 0x10) statfs(&(0x7f0000000380)='./control\x00', &(0x7f00000003c0)=""/20) write$P9_RWALK(r0, &(0x7f0000000400)=ANY=[@ANYBLOB="300000006f0100030001030000000400000000000000100000000003000002000000000300000000000000e646f1c5592139cf131e2bf572fa9728dbfac0390865410f3fa1f25743c497e12cb352eac4046b4500f95cfdfb4cf22a3be5c564a47654334c01d5732d382e27bbccd9b903000000c404000000d32dbd21f3ae581d32e69ef9327f7b487d1b4f4502838c08136678bd90733173ab78d6fc264b373611f15c439384"], 0xa6) getsockopt$inet_sctp6_SCTP_RTOINFO(r1, 0x84, 0x0, &(0x7f0000000080)={0x0, 0x200, 0x2, 0xffffffff}, &(0x7f0000000100)=0x10) 00:28:58 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000480)=@acquire={0x1ac, 0x17, 0x1, 0x0, 0x0, {{@in=@multicast1}, @in6=@ipv4={[], [], @dev}, {@in=@loopback=0x7f000002, @in6=@local}, {{@in, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x2}}}, [@tmpl={0x84, 0x5, [{{@in6=@mcast1, 0x0, 0x3c}, 0x0, @in=@multicast1}, {{@in=@remote, 0x0, 0x3c}, 0x0, @in=@broadcast}]}]}, 0x1ac}}, 0x0) 00:28:58 executing program 1: syz_mount_image$reiserfs(&(0x7f0000000180)='reiserfsd', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[@ANYBLOB='jdev=.']) [ 928.309149][ T2480] block nbd2: Attempted send on invalid socket [ 928.315574][ T2480] print_req_error: I/O error, dev nbd2, sector 2 flags 0 [ 928.322862][ T7374] hfs: can't find a HFS filesystem on dev nbd2 00:28:58 executing program 2: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(&(0x7f0000000080)=@nbd={'/dev/nbd', 0x0, 0xe0000}, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000240)='hfs\x00\xe6\xa6\xe2\x06g\x96\xb3\v\xf2p\xd5:\x95p\x99\x92\xf2\xc4\x80\x1f\x01\x05\xb8e?\xbfwk\xe4\xe5\xcb\x82\xeb\xb1\x04wn*\xf2\xc6\x9d\xc4!\x9e?\x83\x99\x0e\xcc\xa3\x95q.C\xee\x8dIf\xec\xbf\xe8\xb2\t\xedg\x9d\xd9\v\xce\xa3\xa3\xa5\x89F\x03\xefQ\x89\f\xeeRK\x15\xec{D\x9e\x83Z\xabTa\x8e\xcd\x01\xd0\xcfd\xf9c\x87m\xbe>\x81\xba\x9d2\x1c\a,\x12\xbf\xef\xb8m\v\xdf\x8e\xd5\xf5\x1a\xabD\xf6\xe0\x95\xf4\xfeRb_+\xeb\xf9f\xe8\\\x16\xeb\x87\x8e\x8acn4,\x80Q<\x84\xaep\xf9\xfc\x8e\x9f\xed\x06.a\xd5o\x14\r&L\xbd\xb9g\x82;+n\xd5\xcca\v\x86Z\x872\xc3c:`\xf2\x02\xc2\x92\x841\xe7\xca}\"@6}j\x0e\xb7\xa9\xbc\xf3N\xa3\xf3mbd\xfbS\x80\xe0\x11<\x7f\x84\xbe\xa2\xf9\xf7\xee\xf6\x94x\x9d\xe2{\xc5\x83\xc0M\xbb\xd4Io\r\x1c\xd7<\xc0\x84=`\xf1^Y', 0x0, 0x0) 00:28:58 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00004e7000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f}, 0xc, &(0x7f0000000440)={&(0x7f00000001c0)=ANY=[@ANYBLOB="1c00000022000100000e00000061960d0100000008fe0c009d0a6be0e6d9fc638f19561d6ceb8a6c9239228215fd206cf204e07953", @ANYRES32=0x0], 0x2}, 0x1, 0x0, 0x0, 0xffffffffffffffff}, 0x0) [ 928.493529][ T7390] hfs: can't find a HFS filesystem on dev nbd2 00:28:58 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000480)=@acquire={0x1ac, 0x17, 0x1, 0x0, 0x0, {{@in=@multicast1}, @in6=@ipv4={[], [], @dev}, {@in=@loopback=0x7f000008, @in6=@local}, {{@in, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x2}}}, [@tmpl={0x84, 0x5, [{{@in6=@mcast1, 0x0, 0x3c}, 0x0, @in=@multicast1}, {{@in=@remote, 0x0, 0x3c}, 0x0, @in=@broadcast}]}]}, 0x1ac}}, 0x0) 00:28:58 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00004e7000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f}, 0xc, &(0x7f0000000440)={&(0x7f00000001c0)=ANY=[@ANYBLOB="1c00000022000100006000000061960d0100000008fe0c009d0a6be0e6d9fc638f19561d6ceb8a6c9239228215fd206cf204e07953", @ANYRES32=0x0], 0x2}, 0x1, 0x0, 0x0, 0xffffffffffffffff}, 0x0) [ 928.575346][ T7391] FAULT_INJECTION: forcing a failure. [ 928.575346][ T7391] name failslab, interval 1, probability 0, space 0, times 0 [ 928.624699][ T7391] CPU: 0 PID: 7391 Comm: syz-executor4 Not tainted 5.0.0-rc2-next-20190117 #14 [ 928.633652][ T7391] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 928.643715][ T7391] Call Trace: [ 928.643744][ T7391] dump_stack+0x1db/0x2d0 [ 928.643769][ T7391] ? dump_stack_print_info.cold+0x20/0x20 [ 928.643789][ T7391] ? kasan_kmalloc+0x9/0x10 [ 928.643807][ T7391] ? kmem_cache_alloc_trace+0x151/0x760 [ 928.643825][ T7391] ? alloc_fdtable+0x86/0x290 [ 928.643841][ T7391] ? dup_fd+0x993/0xe80 [ 928.643860][ T7391] ? unshare_fd+0x1f3/0x2c0 [ 928.643880][ T7391] ? __do_execve_file.isra.0+0x331/0x2700 [ 928.643908][ T7391] should_fail.cold+0xa/0x14 [ 928.690892][ T7391] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 928.696722][ T7391] ? ___might_sleep+0x1e7/0x310 [ 928.701581][ T7391] ? arch_local_save_flags+0x50/0x50 [ 928.706874][ T7391] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 928.713116][ T7391] ? check_preemption_disabled+0x48/0x290 [ 928.718839][ T7391] __should_failslab+0x121/0x190 [ 928.723780][ T7391] should_failslab+0x9/0x14 [ 928.728287][ T7391] kmem_cache_alloc_node_trace+0x270/0x720 [ 928.734093][ T7391] ? alloc_fdtable+0x86/0x290 [ 928.738776][ T7391] __kmalloc_node+0x3d/0x70 [ 928.743301][ T7391] kvmalloc_node+0x68/0x100 [ 928.747856][ T7391] alloc_fdtable+0xd6/0x290 [ 928.747888][ T7391] dup_fd+0x993/0xe80 [ 928.747908][ T7391] ? __fdget+0x20/0x20 [ 928.760425][ T7391] ? kernel_text_address+0x73/0xf0 [ 928.765549][ T7391] ? unwind_get_return_address+0x61/0xa0 00:28:58 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00004e7000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f}, 0xc, &(0x7f0000000440)={&(0x7f00000001c0)=ANY=[@ANYBLOB="1c000000220001000ab000000061960d0100000008fe0c009d0a6be0e6d9fc638f19561d6ceb8a6c9239228215fd206cf204e07953", @ANYRES32=0x0], 0x2}, 0x1, 0x0, 0x0, 0xffffffffffffffff}, 0x0) 00:28:58 executing program 2: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(&(0x7f0000000080)=@nbd={'/dev/nbd', 0x0, 0xe0000}, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000240)='hfs\x00\xe6\xa6\xe2\x06g\x96\xb3\v\xf2p\xd5:\x95p\x99\x92\xf2\xc4\x80\x1f\x01\x05\xb8e?\xbfwk\xe4\xe5\xca\x82\xec\xb1\x04wn*\xf2\xc6\x9d\xc4!\x9e?\x83\x99\x0e\xcc\xa3\x95q.C\xee\x8dIf\xec\xbf\xe8\xb2\t\xedg\x9d\xd9\v\xce\xa3\xa3\xa5\x89F\x03\xefQ\x89\f\xeeRK\x15\xec{D\x9e\x83Z\xabTa\x8e\xcd\x01\xd0\xcfd\xf9c\x87m\xbe>\x81\xba\x9d2\x1c\a,\x12\xbf\xef\xb8m\v\xdf\x8e\xd5\xf5\x1a\xabD\xf6\xe0\x95\xf4\xfeRb_+\xeb\xf9f\xe8\\\x16\xeb\x87\x8e\x8acn4,\x80Q<\x84\xaep\xf9\xfc\x8e\x9f\xed\x06.a\xd5o\x14\r&L\xbd\xb9g\x82;+n\xd5\xcca\v\x86Z\x872\xc3c:`\xf2\x02\xc2\x92\x841\xe7\xca}\"@6}j\x0e\xb7\xa9\xbc\xf3N\xa3\xf3mbd\xfbS\x80\xe0\x11<\x7f\x84\xbe\xa2\xf9\xf7\xee\xf6\x94x\x9d\xe2{\xc5\x83\xc0M\xbb\xd4Io\r\x1c\xd7<\xc0\x84=`\xf1^Y', 0x0, 0x0) [ 928.771195][ T7391] ? __save_stack_trace+0x8a/0xf0 [ 928.776236][ T7391] unshare_fd+0x1f3/0x2c0 [ 928.780740][ T7391] ? save_stack+0xa9/0xd0 [ 928.785099][ T7391] ? set_max_threads+0x1a0/0x1a0 [ 928.790034][ T7391] ? kasan_slab_alloc+0xf/0x20 [ 928.794807][ T7391] ? kmem_cache_alloc+0x12d/0x710 [ 928.799848][ T7391] ? getname_flags+0xd6/0x5b0 [ 928.804535][ T7391] ? __x64_sys_execve+0x73/0xc0 [ 928.809424][ T7391] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 928.815490][ T7391] ? rcu_read_lock_sched_held+0x110/0x130 [ 928.821211][ T7391] unshare_files+0xa9/0x2d0 [ 928.825738][ T7391] ? find_held_lock+0x35/0x120 [ 928.830545][ T7391] ? __ia32_sys_unshare+0x40/0x40 [ 928.835572][ T7391] ? __phys_addr_symbol+0x30/0x70 [ 928.840592][ T7391] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 928.846324][ T7391] ? __check_object_size+0xa3/0x790 [ 928.851557][ T7391] __do_execve_file.isra.0+0x331/0x2700 [ 928.857098][ T7391] ? getname_flags+0xd6/0x5b0 [ 928.861779][ T7391] ? rcu_pm_notify+0xd0/0xd0 [ 928.866372][ T7391] ? copy_strings_kernel+0x110/0x110 [ 928.871650][ T7391] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 928.877878][ T7391] ? strncpy_from_user+0x3aa/0x4e0 [ 928.882984][ T7391] ? digsig_verify.cold+0x32/0x32 [ 928.888007][ T7391] ? kmem_cache_alloc+0x341/0x710 [ 928.893462][ T7391] ? do_syscall_64+0x8c/0x800 [ 928.898121][ T7391] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 928.904351][ T7391] ? getname_flags+0x277/0x5b0 [ 928.909124][ T7391] ? trace_hardirqs_off_caller+0x300/0x300 [ 928.914961][ T7391] __x64_sys_execve+0x8f/0xc0 [ 928.919662][ T7391] do_syscall_64+0x1a3/0x800 [ 928.924255][ T7391] ? syscall_return_slowpath+0x5f0/0x5f0 [ 928.929879][ T7391] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 928.935578][ T7391] ? __switch_to_asm+0x34/0x70 [ 928.940322][ T7391] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 928.945872][ T7391] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 928.951793][ T7391] RIP: 0033:0x458099 [ 928.955675][ T7391] Code: 6d b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 3b b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 928.975299][ T7391] RSP: 002b:00007f0a9fbb3c78 EFLAGS: 00000246 ORIG_RAX: 000000000000003b [ 928.983710][ T7391] RAX: ffffffffffffffda RBX: 00007f0a9fbb3c90 RCX: 0000000000458099 [ 928.991680][ T7391] RDX: 0000000020000140 RSI: 0000000020000140 RDI: 0000000020000180 [ 928.999640][ T7391] RBP: 000000000073bfa0 R08: 0000000000000000 R09: 0000000000000000 [ 929.007621][ T7391] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f0a9fbb46d4 [ 929.015604][ T7391] R13: 00000000004be6af R14: 00000000004ced68 R15: 0000000000000005 00:28:58 executing program 0: syz_mount_image$reiserfs(&(0x7f0000000180)='reiserfs\xf2', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[@ANYBLOB='jdev=./file0,jdev=']) 00:28:58 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000480)=@acquire={0x1ac, 0x17, 0x1, 0x0, 0x0, {{@in=@multicast1}, @in6=@ipv4={[], [], @dev}, {@in=@loopback=0x7f000300, @in6=@local}, {{@in, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x2}}}, [@tmpl={0x84, 0x5, [{{@in6=@mcast1, 0x0, 0x3c}, 0x0, @in=@multicast1}, {{@in=@remote, 0x0, 0x3c}, 0x0, @in=@broadcast}]}]}, 0x1ac}}, 0x0) 00:28:58 executing program 4 (fault-call:7 fault-nth:5): perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000180)='./control\x00', 0x0) get_thread_area(0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x3) write$binfmt_script(r0, &(0x7f0000000bc0)=ANY=[@ANYBLOB="2321202e2f66696c6530202357994f66e76f4d0fe2208456ebfa69074cb94144c95c4375644bd1747e34c127d80575d10a599f851dc7ad26f3fa377c0a53cc7be2512b7493bf864ecf3f13e46032dbbf3af349b06321cec7a0652f4a5768256cd01a2d3d52de67dc459409a1e50ca51334791c8690646f7a1962ccefc0592a163bacf13da16978ca48eb3784c5baa40700ebfddde7e115f9388051297af49e38e0e3210d232e108a7e9b69c2e56676484906d975d537d128607c901050484e2bdb0d042a40c8ff8f4727cde00677ea73dac796f06f6f7ef7b3406723e7da9fb469c4ce44faff2888c779c000000000000000000000dc4fd7f68b303f980ed08fb24c8052b0626c8b3733eeee64a90f35fd7d88f958406cb5a8ed3b20b7d1278e15c1e1012befbc45a45f203503128d3a99b80bc2c744ae4b8509ca0149b48dc3e11c2d5db4"], 0x145) close(r0) execve(&(0x7f0000000180)='./file0\x00', &(0x7f0000000140), &(0x7f0000000140)) r1 = open(&(0x7f0000000000)='./control\x00', 0x80, 0x10) statfs(&(0x7f0000000380)='./control\x00', &(0x7f00000003c0)=""/20) write$P9_RWALK(r0, &(0x7f0000000400)=ANY=[@ANYBLOB="300000006f0100030001030000000400000000000000100000000003000002000000000300000000000000e646f1c5592139cf131e2bf572fa9728dbfac0390865410f3fa1f25743c497e12cb352eac4046b4500f95cfdfb4cf22a3be5c564a47654334c01d5732d382e27bbccd9b903000000c404000000d32dbd21f3ae581d32e69ef9327f7b487d1b4f4502838c08136678bd90733173ab78d6fc264b373611f15c439384"], 0xa6) getsockopt$inet_sctp6_SCTP_RTOINFO(r1, 0x84, 0x0, &(0x7f0000000080)={0x0, 0x200, 0x2, 0xffffffff}, &(0x7f0000000100)=0x10) 00:28:58 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000480)=@acquire={0x1ac, 0x17, 0x1, 0x0, 0x0, {{@in=@multicast1}, @in6=@ipv4={[], [], @dev}, {@in=@loopback, @in6=@local={0xfe, 0x8000000}}, {{@in, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x2}}}, [@tmpl={0x84, 0x5, [{{@in6=@mcast1, 0x0, 0x3c}, 0x0, @in=@multicast1}, {{@in=@remote, 0x0, 0x3c}, 0x0, @in=@broadcast}]}]}, 0x1ac}}, 0x0) 00:28:58 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00004e7000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f}, 0xc, &(0x7f0000000440)={&(0x7f00000001c0)=ANY=[@ANYBLOB="1c0000002200010000f000000061960d0100000008fe0c009d0a6be0e6d9fc638f19561d6ceb8a6c9239228215fd206cf204e07953", @ANYRES32=0x0], 0x2}, 0x1, 0x0, 0x0, 0xffffffffffffffff}, 0x0) [ 929.226718][ T7419] hfs: can't find a HFS filesystem on dev nbd2 [ 929.247750][ T7415] FAULT_INJECTION: forcing a failure. [ 929.247750][ T7415] name failslab, interval 1, probability 0, space 0, times 0 [ 929.324952][ T7415] CPU: 1 PID: 7415 Comm: syz-executor4 Not tainted 5.0.0-rc2-next-20190117 #14 [ 929.334120][ T7415] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 929.344177][ T7415] Call Trace: [ 929.347477][ T7415] dump_stack+0x1db/0x2d0 [ 929.351835][ T7415] ? dump_stack_print_info.cold+0x20/0x20 [ 929.357559][ T7415] ? retint_kernel+0x2d/0x2d [ 929.362159][ T7415] should_fail.cold+0xa/0x14 [ 929.362181][ T7415] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 929.362204][ T7415] ? ___might_sleep+0x1e7/0x310 [ 929.362220][ T7415] ? arch_local_save_flags+0x50/0x50 [ 929.362244][ T7415] __should_failslab+0x121/0x190 [ 929.372629][ T7415] should_failslab+0x9/0x14 [ 929.372663][ T7415] kmem_cache_alloc_node_trace+0x270/0x720 [ 929.372721][ T7415] ? kasan_unpoison_shadow+0x35/0x50 [ 929.372768][ T7415] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 929.372795][ T7415] __kmalloc_node+0x3d/0x70 [ 929.413636][ T7415] kvmalloc_node+0x68/0x100 [ 929.418152][ T7415] alloc_fdtable+0x142/0x290 [ 929.422767][ T7415] dup_fd+0x993/0xe80 [ 929.426748][ T7415] ? __fdget+0x20/0x20 [ 929.430805][ T7415] ? kernel_text_address+0x73/0xf0 [ 929.435925][ T7415] ? unwind_get_return_address+0x61/0xa0 [ 929.441537][ T7415] ? __save_stack_trace+0x8a/0xf0 [ 929.446558][ T7415] unshare_fd+0x1f3/0x2c0 [ 929.450937][ T7415] ? save_stack+0xa9/0xd0 [ 929.455287][ T7415] ? set_max_threads+0x1a0/0x1a0 [ 929.460216][ T7415] ? kasan_slab_alloc+0xf/0x20 [ 929.464960][ T7415] ? kmem_cache_alloc+0x12d/0x710 [ 929.469965][ T7415] ? getname_flags+0xd6/0x5b0 [ 929.474649][ T7415] ? __x64_sys_execve+0x73/0xc0 [ 929.479503][ T7415] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 929.485557][ T7415] ? rcu_read_lock_sched_held+0x110/0x130 [ 929.491385][ T7415] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 929.496876][ T7415] unshare_files+0xa9/0x2d0 [ 929.501362][ T7415] ? trace_hardirqs_on_caller+0xc0/0x310 [ 929.506974][ T7415] ? find_held_lock+0x35/0x120 [ 929.511719][ T7415] ? __ia32_sys_unshare+0x40/0x40 [ 929.516729][ T7415] ? __phys_addr_symbol+0x30/0x70 [ 929.521756][ T7415] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 929.527478][ T7415] ? __check_object_size+0xa3/0x790 [ 929.532708][ T7415] __do_execve_file.isra.0+0x331/0x2700 [ 929.538233][ T7415] ? getname_flags+0xd6/0x5b0 [ 929.542898][ T7415] ? rcu_pm_notify+0xd0/0xd0 [ 929.547471][ T7415] ? copy_strings_kernel+0x110/0x110 [ 929.552760][ T7415] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 929.559097][ T7415] ? strncpy_from_user+0x3aa/0x4e0 [ 929.564214][ T7415] ? digsig_verify.cold+0x32/0x32 [ 929.569245][ T7415] ? kmem_cache_alloc+0x341/0x710 [ 929.574263][ T7415] ? do_syscall_64+0x8c/0x800 [ 929.578922][ T7415] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 929.585159][ T7415] ? getname_flags+0x277/0x5b0 [ 929.590001][ T7415] ? trace_hardirqs_off_caller+0x300/0x300 [ 929.595797][ T7415] __x64_sys_execve+0x8f/0xc0 [ 929.600473][ T7415] do_syscall_64+0x1a3/0x800 [ 929.605074][ T7415] ? syscall_return_slowpath+0x5f0/0x5f0 [ 929.610701][ T7415] ? prepare_exit_to_usermode+0x232/0x3b0 [ 929.616408][ T7415] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 929.621975][ T7415] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 929.627876][ T7415] RIP: 0033:0x458099 [ 929.631764][ T7415] Code: 6d b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 3b b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 929.651392][ T7415] RSP: 002b:00007f0a9fbd4c78 EFLAGS: 00000246 ORIG_RAX: 000000000000003b [ 929.659780][ T7415] RAX: ffffffffffffffda RBX: 00007f0a9fbd4c90 RCX: 0000000000458099 [ 929.667732][ T7415] RDX: 0000000020000140 RSI: 0000000020000140 RDI: 0000000020000180 00:28:59 executing program 1: syz_mount_image$reiserfs(&(0x7f0000000180)='reiserfsf', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[@ANYBLOB='jdev=.']) 00:28:59 executing program 2: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(&(0x7f0000000080)=@nbd={'/dev/nbd', 0x0, 0xe0000}, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000240)='hfs\x00\xe6\xa6\xe2\x06g\x96\xb3\v\xf2p\xd5:\x95p\x99\x92\xf2\xc4\x80\x1f\x01\x05\xb8e?\xbfwk\xe4\xe5\xca\x82\xeb\xb1\x02wn*\xf2\xc6\x9d\xc4!\x9e?\x83\x99\x0e\xcc\xa3\x95q.C\xee\x8dIf\xec\xbf\xe8\xb2\t\xedg\x9d\xd9\v\xce\xa3\xa3\xa5\x89F\x03\xefQ\x89\f\xeeRK\x15\xec{D\x9e\x83Z\xabTa\x8e\xcd\x01\xd0\xcfd\xf9c\x87m\xbe>\x81\xba\x9d2\x1c\a,\x12\xbf\xef\xb8m\v\xdf\x8e\xd5\xf5\x1a\xabD\xf6\xe0\x95\xf4\xfeRb_+\xeb\xf9f\xe8\\\x16\xeb\x87\x8e\x8acn4,\x80Q<\x84\xaep\xf9\xfc\x8e\x9f\xed\x06.a\xd5o\x14\r&L\xbd\xb9g\x82;+n\xd5\xcca\v\x86Z\x872\xc3c:`\xf2\x02\xc2\x92\x841\xe7\xca}\"@6}j\x0e\xb7\xa9\xbc\xf3N\xa3\xf3mbd\xfbS\x80\xe0\x11<\x7f\x84\xbe\xa2\xf9\xf7\xee\xf6\x94x\x9d\xe2{\xc5\x83\xc0M\xbb\xd4Io\r\x1c\xd7<\xc0\x84=`\xf1^Y', 0x0, 0x0) 00:28:59 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000480)=@acquire={0x1ac, 0x17, 0x1, 0x0, 0x0, {{@in=@multicast1}, @in6=@ipv4={[], [], @dev}, {@in=@loopback, @in6=@local={0xfe, 0x80, [0x2]}}, {{@in, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x2}}}, [@tmpl={0x84, 0x5, [{{@in6=@mcast1, 0x0, 0x3c}, 0x0, @in=@multicast1}, {{@in=@remote, 0x0, 0x3c}, 0x0, @in=@broadcast}]}]}, 0x1ac}}, 0x0) [ 929.675703][ T7415] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 929.683654][ T7415] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f0a9fbd56d4 [ 929.691645][ T7415] R13: 00000000004be6af R14: 00000000004ced68 R15: 0000000000000004 00:28:59 executing program 4 (fault-call:7 fault-nth:6): perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000180)='./control\x00', 0x0) get_thread_area(0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x3) write$binfmt_script(r0, &(0x7f0000000bc0)=ANY=[@ANYBLOB="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"], 0x145) close(r0) execve(&(0x7f0000000180)='./file0\x00', &(0x7f0000000140), &(0x7f0000000140)) r1 = open(&(0x7f0000000000)='./control\x00', 0x80, 0x10) statfs(&(0x7f0000000380)='./control\x00', &(0x7f00000003c0)=""/20) write$P9_RWALK(r0, &(0x7f0000000400)=ANY=[@ANYBLOB="300000006f0100030001030000000400000000000000100000000003000002000000000300000000000000e646f1c5592139cf131e2bf572fa9728dbfac0390865410f3fa1f25743c497e12cb352eac4046b4500f95cfdfb4cf22a3be5c564a47654334c01d5732d382e27bbccd9b903000000c404000000d32dbd21f3ae581d32e69ef9327f7b487d1b4f4502838c08136678bd90733173ab78d6fc264b373611f15c439384"], 0xa6) getsockopt$inet_sctp6_SCTP_RTOINFO(r1, 0x84, 0x0, &(0x7f0000000080)={0x0, 0x200, 0x2, 0xffffffff}, &(0x7f0000000100)=0x10) 00:28:59 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00004e7000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f}, 0xc, &(0x7f0000000440)={&(0x7f00000001c0)=ANY=[@ANYBLOB="1c00000022000100fffff0000061960d0100000008fe0c009d0a6be0e6d9fc638f19561d6ceb8a6c9239228215fd206cf204e07953", @ANYRES32=0x0], 0x2}, 0x1, 0x0, 0x0, 0xffffffffffffffff}, 0x0) [ 929.777409][ T7438] hfs: can't find a HFS filesystem on dev nbd2 00:28:59 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000480)=@acquire={0x1ac, 0x17, 0x1, 0x0, 0x0, {{@in=@multicast1}, @in6=@ipv4={[], [], @dev}, {@in=@loopback, @in6=@local={0xfe, 0x80, [0x3]}}, {{@in, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x2}}}, [@tmpl={0x84, 0x5, [{{@in6=@mcast1, 0x0, 0x3c}, 0x0, @in=@multicast1}, {{@in=@remote, 0x0, 0x3c}, 0x0, @in=@broadcast}]}]}, 0x1ac}}, 0x0) 00:28:59 executing program 0: syz_mount_image$reiserfs(&(0x7f0000000180)='reiserfs\xf6', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[@ANYBLOB='jdev=./file0,jdev=']) 00:28:59 executing program 2: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(&(0x7f0000000080)=@nbd={'/dev/nbd', 0x0, 0xe0000}, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000240)='hfs\x00\xe6\xa6\xe2\x06g\x96\xb3\v\xf2p\xd5:\x95p\x99\x92\xf2\xc4\x80\x1f\x01\x05\xb8e?\xbfwk\xe4\xe5\xca\x82\xeb\xb1\x03wn*\xf2\xc6\x9d\xc4!\x9e?\x83\x99\x0e\xcc\xa3\x95q.C\xee\x8dIf\xec\xbf\xe8\xb2\t\xedg\x9d\xd9\v\xce\xa3\xa3\xa5\x89F\x03\xefQ\x89\f\xeeRK\x15\xec{D\x9e\x83Z\xabTa\x8e\xcd\x01\xd0\xcfd\xf9c\x87m\xbe>\x81\xba\x9d2\x1c\a,\x12\xbf\xef\xb8m\v\xdf\x8e\xd5\xf5\x1a\xabD\xf6\xe0\x95\xf4\xfeRb_+\xeb\xf9f\xe8\\\x16\xeb\x87\x8e\x8acn4,\x80Q<\x84\xaep\xf9\xfc\x8e\x9f\xed\x06.a\xd5o\x14\r&L\xbd\xb9g\x82;+n\xd5\xcca\v\x86Z\x872\xc3c:`\xf2\x02\xc2\x92\x841\xe7\xca}\"@6}j\x0e\xb7\xa9\xbc\xf3N\xa3\xf3mbd\xfbS\x80\xe0\x11<\x7f\x84\xbe\xa2\xf9\xf7\xee\xf6\x94x\x9d\xe2{\xc5\x83\xc0M\xbb\xd4Io\r\x1c\xd7<\xc0\x84=`\xf1^Y', 0x0, 0x0) [ 929.987843][ T7451] FAULT_INJECTION: forcing a failure. [ 929.987843][ T7451] name failslab, interval 1, probability 0, space 0, times 0 [ 930.014924][ T2480] nbd_handle_cmd: 3 callbacks suppressed [ 930.014940][ T2480] block nbd2: Attempted send on invalid socket [ 930.026976][ T2480] print_req_error: 3 callbacks suppressed [ 930.026986][ T2480] print_req_error: I/O error, dev nbd2, sector 2 flags 0 [ 930.037268][ T7451] CPU: 0 PID: 7451 Comm: syz-executor4 Not tainted 5.0.0-rc2-next-20190117 #14 [ 930.048760][ T7451] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 930.048766][ T7451] Call Trace: [ 930.048790][ T7451] dump_stack+0x1db/0x2d0 [ 930.048810][ T7451] ? dump_stack_print_info.cold+0x20/0x20 [ 930.048844][ T7451] should_fail.cold+0xa/0x14 [ 930.060356][ T7458] hfs: can't find a HFS filesystem on dev nbd2 [ 930.062154][ T7451] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 930.062179][ T7451] ? ___might_sleep+0x1e7/0x310 [ 930.062196][ T7451] ? arch_local_save_flags+0x50/0x50 [ 930.062214][ T7451] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 930.062237][ T7451] __should_failslab+0x121/0x190 [ 930.062258][ T7451] should_failslab+0x9/0x14 [ 930.062279][ T7451] kmem_cache_alloc+0x2be/0x710 [ 930.119351][ T7451] ? rcu_lockdep_current_cpu_online+0x1aa/0x220 [ 930.125597][ T7451] prepare_creds+0xa4/0x510 [ 930.130103][ T7451] ? __do_execve_file.isra.0+0x40c/0x2700 [ 930.135821][ T7451] ? abort_creds+0x2c0/0x2c0 [ 930.140445][ T7451] ? rcu_read_lock_sched_held+0x110/0x130 [ 930.146170][ T7451] ? kmem_cache_alloc_trace+0x354/0x760 [ 930.151715][ T7451] ? __phys_addr+0x120/0x120 [ 930.156326][ T7451] ? __phys_addr_symbol+0x30/0x70 [ 930.161355][ T7451] prepare_exec_creds+0x12/0xf0 [ 930.166204][ T7451] __do_execve_file.isra.0+0x47a/0x2700 [ 930.171748][ T7451] ? getname_flags+0xd6/0x5b0 [ 930.176432][ T7451] ? rcu_pm_notify+0xd0/0xd0 [ 930.181021][ T7451] ? copy_strings_kernel+0x110/0x110 [ 930.186307][ T7451] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 930.192542][ T7451] ? strncpy_from_user+0x3aa/0x4e0 [ 930.197650][ T7451] ? digsig_verify.cold+0x32/0x32 [ 930.202684][ T7451] ? kmem_cache_alloc+0x341/0x710 [ 930.207723][ T7451] ? do_syscall_64+0x8c/0x800 [ 930.212400][ T7451] ? lockdep_hardirqs_on+0x415/0x5d0 [ 930.217697][ T7451] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 930.223938][ T7451] ? getname_flags+0x277/0x5b0 [ 930.228713][ T7451] ? trace_hardirqs_off_caller+0x300/0x300 [ 930.234520][ T7451] __x64_sys_execve+0x8f/0xc0 [ 930.239199][ T7451] do_syscall_64+0x1a3/0x800 [ 930.243793][ T7451] ? syscall_return_slowpath+0x5f0/0x5f0 [ 930.249425][ T7451] ? prepare_exit_to_usermode+0x232/0x3b0 [ 930.255148][ T7451] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 930.260712][ T7451] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 930.266601][ T7451] RIP: 0033:0x458099 00:29:00 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000480)=@acquire={0x1ac, 0x17, 0x1, 0x0, 0x0, {{@in=@multicast1}, @in6=@ipv4={[], [], @dev}, {@in=@loopback, @in6=@local={0xfe, 0x80, [0x4]}}, {{@in, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x2}}}, [@tmpl={0x84, 0x5, [{{@in6=@mcast1, 0x0, 0x3c}, 0x0, @in=@multicast1}, {{@in=@remote, 0x0, 0x3c}, 0x0, @in=@broadcast}]}]}, 0x1ac}}, 0x0) [ 930.270513][ T7451] Code: 6d b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 3b b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 930.290112][ T7451] RSP: 002b:00007f0a9fbd4c78 EFLAGS: 00000246 ORIG_RAX: 000000000000003b [ 930.298517][ T7451] RAX: ffffffffffffffda RBX: 00007f0a9fbd4c90 RCX: 0000000000458099 [ 930.306497][ T7451] RDX: 0000000020000140 RSI: 0000000020000140 RDI: 0000000020000180 [ 930.314466][ T7451] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 930.322429][ T7451] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f0a9fbd56d4 [ 930.330393][ T7451] R13: 00000000004be6af R14: 00000000004ced68 R15: 0000000000000004 00:29:00 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00004e7000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f}, 0xc, &(0x7f0000000440)={&(0x7f00000001c0)=ANY=[@ANYBLOB="1c00000022000100000000010061960d0100000008fe0c009d0a6be0e6d9fc638f19561d6ceb8a6c9239228215fd206cf204e07953", @ANYRES32=0x0], 0x2}, 0x1, 0x0, 0x0, 0xffffffffffffffff}, 0x0) 00:29:00 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000480)=@acquire={0x1ac, 0x17, 0x1, 0x0, 0x0, {{@in=@multicast1}, @in6=@ipv4={[], [], @dev}, {@in=@loopback, @in6=@local={0xfe, 0x80, [0x5]}}, {{@in, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x2}}}, [@tmpl={0x84, 0x5, [{{@in6=@mcast1, 0x0, 0x3c}, 0x0, @in=@multicast1}, {{@in=@remote, 0x0, 0x3c}, 0x0, @in=@broadcast}]}]}, 0x1ac}}, 0x0) 00:29:00 executing program 1: syz_mount_image$reiserfs(&(0x7f0000000180)='reiserfsh', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[@ANYBLOB='jdev=.']) 00:29:00 executing program 2: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(&(0x7f0000000080)=@nbd={'/dev/nbd', 0x0, 0xe0000}, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000240)='hfs\x00\xe6\xa6\xe2\x06g\x96\xb3\v\xf2p\xd5:\x95p\x99\x92\xf2\xc4\x80\x1f\x01\x05\xb8e?\xbfwk\xe4\xe5\xca\x82\xeb\xb1\x05wn*\xf2\xc6\x9d\xc4!\x9e?\x83\x99\x0e\xcc\xa3\x95q.C\xee\x8dIf\xec\xbf\xe8\xb2\t\xedg\x9d\xd9\v\xce\xa3\xa3\xa5\x89F\x03\xefQ\x89\f\xeeRK\x15\xec{D\x9e\x83Z\xabTa\x8e\xcd\x01\xd0\xcfd\xf9c\x87m\xbe>\x81\xba\x9d2\x1c\a,\x12\xbf\xef\xb8m\v\xdf\x8e\xd5\xf5\x1a\xabD\xf6\xe0\x95\xf4\xfeRb_+\xeb\xf9f\xe8\\\x16\xeb\x87\x8e\x8acn4,\x80Q<\x84\xaep\xf9\xfc\x8e\x9f\xed\x06.a\xd5o\x14\r&L\xbd\xb9g\x82;+n\xd5\xcca\v\x86Z\x872\xc3c:`\xf2\x02\xc2\x92\x841\xe7\xca}\"@6}j\x0e\xb7\xa9\xbc\xf3N\xa3\xf3mbd\xfbS\x80\xe0\x11<\x7f\x84\xbe\xa2\xf9\xf7\xee\xf6\x94x\x9d\xe2{\xc5\x83\xc0M\xbb\xd4Io\r\x1c\xd7<\xc0\x84=`\xf1^Y', 0x0, 0x0) 00:29:00 executing program 4 (fault-call:7 fault-nth:7): perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000180)='./control\x00', 0x0) get_thread_area(0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x3) write$binfmt_script(r0, &(0x7f0000000bc0)=ANY=[@ANYBLOB="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"], 0x145) close(r0) execve(&(0x7f0000000180)='./file0\x00', &(0x7f0000000140), &(0x7f0000000140)) r1 = open(&(0x7f0000000000)='./control\x00', 0x80, 0x10) statfs(&(0x7f0000000380)='./control\x00', &(0x7f00000003c0)=""/20) write$P9_RWALK(r0, &(0x7f0000000400)=ANY=[@ANYBLOB="300000006f0100030001030000000400000000000000100000000003000002000000000300000000000000e646f1c5592139cf131e2bf572fa9728dbfac0390865410f3fa1f25743c497e12cb352eac4046b4500f95cfdfb4cf22a3be5c564a47654334c01d5732d382e27bbccd9b903000000c404000000d32dbd21f3ae581d32e69ef9327f7b487d1b4f4502838c08136678bd90733173ab78d6fc264b373611f15c439384"], 0xa6) getsockopt$inet_sctp6_SCTP_RTOINFO(r1, 0x84, 0x0, &(0x7f0000000080)={0x0, 0x200, 0x2, 0xffffffff}, &(0x7f0000000100)=0x10) 00:29:00 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000480)=@acquire={0x1ac, 0x17, 0x1, 0x0, 0x0, {{@in=@multicast1}, @in6=@ipv4={[], [], @dev}, {@in=@loopback, @in6=@local={0xfe, 0x80, [0x6]}}, {{@in, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x2}}}, [@tmpl={0x84, 0x5, [{{@in6=@mcast1, 0x0, 0x3c}, 0x0, @in=@multicast1}, {{@in=@remote, 0x0, 0x3c}, 0x0, @in=@broadcast}]}]}, 0x1ac}}, 0x0) 00:29:00 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00004e7000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f}, 0xc, &(0x7f0000000440)={&(0x7f00000001c0)=ANY=[@ANYBLOB="1c00000022000100000000020061960d0100000008fe0c009d0a6be0e6d9fc638f19561d6ceb8a6c9239228215fd206cf204e07953", @ANYRES32=0x0], 0x2}, 0x1, 0x0, 0x0, 0xffffffffffffffff}, 0x0) 00:29:00 executing program 0: syz_mount_image$reiserfs(&(0x7f0000000180)='reiserfs\x02', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[@ANYBLOB='jdev=./file0,jdev=']) 00:29:00 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000480)=@acquire={0x1ac, 0x17, 0x1, 0x0, 0x0, {{@in=@multicast1}, @in6=@ipv4={[], [], @dev}, {@in=@loopback, @in6=@local={0xfe, 0x80, [0x8]}}, {{@in, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x2}}}, [@tmpl={0x84, 0x5, [{{@in6=@mcast1, 0x0, 0x3c}, 0x0, @in=@multicast1}, {{@in=@remote, 0x0, 0x3c}, 0x0, @in=@broadcast}]}]}, 0x1ac}}, 0x0) [ 930.754726][ T7487] FAULT_INJECTION: forcing a failure. [ 930.754726][ T7487] name failslab, interval 1, probability 0, space 0, times 0 [ 930.763010][ T2481] block nbd2: Attempted send on invalid socket [ 930.773694][ T2481] print_req_error: I/O error, dev nbd2, sector 2 flags 0 [ 930.784417][ T7502] hfs: can't find a HFS filesystem on dev nbd2 [ 930.789544][ T7487] CPU: 1 PID: 7487 Comm: syz-executor4 Not tainted 5.0.0-rc2-next-20190117 #14 [ 930.799525][ T7487] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 930.809597][ T7487] Call Trace: [ 930.812907][ T7487] dump_stack+0x1db/0x2d0 [ 930.817285][ T7487] ? dump_stack_print_info.cold+0x20/0x20 [ 930.823033][ T7487] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 930.828486][ T7487] ? preempt_schedule+0x4b/0x60 [ 930.833336][ T7487] should_fail.cold+0xa/0x14 [ 930.837927][ T7487] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 930.843735][ T7487] ? retint_kernel+0x2d/0x2d [ 930.848346][ T7487] ? __should_failslab+0x67/0x190 [ 930.853371][ T7487] __should_failslab+0x121/0x190 [ 930.858310][ T7487] should_failslab+0x9/0x14 [ 930.862815][ T7487] kmem_cache_alloc+0x2be/0x710 [ 930.867664][ T7487] ? rcu_lockdep_current_cpu_online+0x1aa/0x220 [ 930.873918][ T7487] prepare_creds+0xa4/0x510 [ 930.878420][ T7487] ? __do_execve_file.isra.0+0x40c/0x2700 [ 930.884144][ T7487] ? abort_creds+0x2c0/0x2c0 [ 930.888744][ T7487] ? rcu_read_lock_sched_held+0x110/0x130 [ 930.894487][ T7487] ? kmem_cache_alloc_trace+0x354/0x760 [ 930.900081][ T7487] ? __phys_addr_symbol+0x30/0x70 [ 930.905139][ T7487] prepare_exec_creds+0x12/0xf0 [ 930.910578][ T7487] __do_execve_file.isra.0+0x47a/0x2700 [ 930.916120][ T7487] ? getname_flags+0xd6/0x5b0 [ 930.920816][ T7487] ? rcu_pm_notify+0xd0/0xd0 [ 930.925402][ T7487] ? copy_strings_kernel+0x110/0x110 [ 930.930711][ T7487] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 930.936949][ T7487] ? strncpy_from_user+0x3aa/0x4e0 [ 930.942064][ T7487] ? digsig_verify.cold+0x32/0x32 [ 930.947082][ T7487] ? kmem_cache_alloc+0x341/0x710 [ 930.952109][ T7487] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 930.958354][ T7487] ? getname_flags+0x277/0x5b0 [ 930.963134][ T7487] __x64_sys_execve+0x8f/0xc0 [ 930.967841][ T7487] do_syscall_64+0x1a3/0x800 [ 930.972434][ T7487] ? syscall_return_slowpath+0x5f0/0x5f0 [ 930.978066][ T7487] ? prepare_exit_to_usermode+0x232/0x3b0 [ 930.983804][ T7487] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 930.989401][ T7487] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 930.995294][ T7487] RIP: 0033:0x458099 [ 930.999189][ T7487] Code: 6d b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 3b b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 931.018784][ T7487] RSP: 002b:00007f0a9fbd4c78 EFLAGS: 00000246 ORIG_RAX: 000000000000003b [ 931.027217][ T7487] RAX: ffffffffffffffda RBX: 00007f0a9fbd4c90 RCX: 0000000000458099 [ 931.035192][ T7487] RDX: 0000000020000140 RSI: 0000000020000140 RDI: 0000000020000180 [ 931.043169][ T7487] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 931.051130][ T7487] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f0a9fbd56d4 [ 931.059092][ T7487] R13: 00000000004be6af R14: 00000000004ced68 R15: 0000000000000004 00:29:00 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00004e7000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f}, 0xc, &(0x7f0000000440)={&(0x7f00000001c0)=ANY=[@ANYBLOB="1c00000022000100000000040061960d0100000008fe0c009d0a6be0e6d9fc638f19561d6ceb8a6c9239228215fd206cf204e07953", @ANYRES32=0x0], 0x2}, 0x1, 0x0, 0x0, 0xffffffffffffffff}, 0x0) 00:29:00 executing program 4 (fault-call:7 fault-nth:8): perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000180)='./control\x00', 0x0) get_thread_area(0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x3) write$binfmt_script(r0, &(0x7f0000000bc0)=ANY=[@ANYBLOB="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"], 0x145) close(r0) execve(&(0x7f0000000180)='./file0\x00', &(0x7f0000000140), &(0x7f0000000140)) r1 = open(&(0x7f0000000000)='./control\x00', 0x80, 0x10) statfs(&(0x7f0000000380)='./control\x00', &(0x7f00000003c0)=""/20) write$P9_RWALK(r0, &(0x7f0000000400)=ANY=[@ANYBLOB="300000006f0100030001030000000400000000000000100000000003000002000000000300000000000000e646f1c5592139cf131e2bf572fa9728dbfac0390865410f3fa1f25743c497e12cb352eac4046b4500f95cfdfb4cf22a3be5c564a47654334c01d5732d382e27bbccd9b903000000c404000000d32dbd21f3ae581d32e69ef9327f7b487d1b4f4502838c08136678bd90733173ab78d6fc264b373611f15c439384"], 0xa6) getsockopt$inet_sctp6_SCTP_RTOINFO(r1, 0x84, 0x0, &(0x7f0000000080)={0x0, 0x200, 0x2, 0xffffffff}, &(0x7f0000000100)=0x10) 00:29:00 executing program 2: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(&(0x7f0000000080)=@nbd={'/dev/nbd', 0x0, 0xe0000}, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000240)='hfs\x00\xe6\xa6\xe2\x06g\x96\xb3\v\xf2p\xd5:\x95p\x99\x92\xf2\xc4\x80\x1f\x01\x05\xb8e?\xbfwk\xe4\xe5\xca\x82\xeb\xb1\x06wn*\xf2\xc6\x9d\xc4!\x9e?\x83\x99\x0e\xcc\xa3\x95q.C\xee\x8dIf\xec\xbf\xe8\xb2\t\xedg\x9d\xd9\v\xce\xa3\xa3\xa5\x89F\x03\xefQ\x89\f\xeeRK\x15\xec{D\x9e\x83Z\xabTa\x8e\xcd\x01\xd0\xcfd\xf9c\x87m\xbe>\x81\xba\x9d2\x1c\a,\x12\xbf\xef\xb8m\v\xdf\x8e\xd5\xf5\x1a\xabD\xf6\xe0\x95\xf4\xfeRb_+\xeb\xf9f\xe8\\\x16\xeb\x87\x8e\x8acn4,\x80Q<\x84\xaep\xf9\xfc\x8e\x9f\xed\x06.a\xd5o\x14\r&L\xbd\xb9g\x82;+n\xd5\xcca\v\x86Z\x872\xc3c:`\xf2\x02\xc2\x92\x841\xe7\xca}\"@6}j\x0e\xb7\xa9\xbc\xf3N\xa3\xf3mbd\xfbS\x80\xe0\x11<\x7f\x84\xbe\xa2\xf9\xf7\xee\xf6\x94x\x9d\xe2{\xc5\x83\xc0M\xbb\xd4Io\r\x1c\xd7<\xc0\x84=`\xf1^Y', 0x0, 0x0) 00:29:00 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000480)=@acquire={0x1ac, 0x17, 0x1, 0x0, 0x0, {{@in=@multicast1}, @in6=@ipv4={[], [], @dev}, {@in=@loopback, @in6=@local={0xfe, 0x80, [0x9]}}, {{@in, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x2}}}, [@tmpl={0x84, 0x5, [{{@in6=@mcast1, 0x0, 0x3c}, 0x0, @in=@multicast1}, {{@in=@remote, 0x0, 0x3c}, 0x0, @in=@broadcast}]}]}, 0x1ac}}, 0x0) 00:29:01 executing program 1: syz_mount_image$reiserfs(&(0x7f0000000180)='reiserfsl', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[@ANYBLOB='jdev=.']) 00:29:01 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00004e7000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f}, 0xc, &(0x7f0000000440)={&(0x7f00000001c0)=ANY=[@ANYBLOB="1c00000022000100000000080061960d0100000008fe0c009d0a6be0e6d9fc638f19561d6ceb8a6c9239228215fd206cf204e07953", @ANYRES32=0x0], 0x2}, 0x1, 0x0, 0x0, 0xffffffffffffffff}, 0x0) [ 931.345617][ T7522] FAULT_INJECTION: forcing a failure. [ 931.345617][ T7522] name failslab, interval 1, probability 0, space 0, times 0 [ 931.378384][ T2481] block nbd2: Attempted send on invalid socket [ 931.384725][ T2481] print_req_error: I/O error, dev nbd2, sector 2 flags 0 [ 931.396577][ T7527] hfs: can't find a HFS filesystem on dev nbd2 00:29:01 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000480)=@acquire={0x1ac, 0x17, 0x1, 0x0, 0x0, {{@in=@multicast1}, @in6=@ipv4={[], [], @dev}, {@in=@loopback, @in6=@local={0xfe, 0x80, [0xa]}}, {{@in, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x2}}}, [@tmpl={0x84, 0x5, [{{@in6=@mcast1, 0x0, 0x3c}, 0x0, @in=@multicast1}, {{@in=@remote, 0x0, 0x3c}, 0x0, @in=@broadcast}]}]}, 0x1ac}}, 0x0) [ 931.439685][ T7522] CPU: 0 PID: 7522 Comm: syz-executor4 Not tainted 5.0.0-rc2-next-20190117 #14 [ 931.448633][ T7522] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 931.458700][ T7522] Call Trace: [ 931.462018][ T7522] dump_stack+0x1db/0x2d0 [ 931.466364][ T7522] ? dump_stack_print_info.cold+0x20/0x20 [ 931.472114][ T7522] ? prepare_creds+0xa4/0x510 [ 931.476792][ T7522] ? prepare_exec_creds+0x12/0xf0 [ 931.481826][ T7522] ? __do_execve_file.isra.0+0x47a/0x2700 00:29:01 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00004e7000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f}, 0xc, &(0x7f0000000440)={&(0x7f00000001c0)=ANY=[@ANYBLOB="1c000000220001000000000a0061960d0100000008fe0c009d0a6be0e6d9fc638f19561d6ceb8a6c9239228215fd206cf204e07953", @ANYRES32=0x0], 0x2}, 0x1, 0x0, 0x0, 0xffffffffffffffff}, 0x0) [ 931.487545][ T7522] ? __x64_sys_execve+0x8f/0xc0 [ 931.492418][ T7522] ? do_syscall_64+0x1a3/0x800 [ 931.497201][ T7522] should_fail.cold+0xa/0x14 [ 931.501904][ T7522] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 931.507731][ T7522] ? ___might_sleep+0x1e7/0x310 [ 931.512588][ T7522] ? arch_local_save_flags+0x50/0x50 [ 931.517881][ T7522] ? check_preemption_disabled+0x48/0x290 [ 931.523611][ T7522] __should_failslab+0x121/0x190 [ 931.528596][ T7522] should_failslab+0x9/0x14 [ 931.533108][ T7522] __kmalloc+0x2dc/0x740 [ 931.537373][ T7522] ? refcount_dec_and_mutex_lock+0x90/0x90 [ 931.543207][ T7522] ? security_prepare_creds+0x123/0x190 [ 931.548763][ T7522] security_prepare_creds+0x123/0x190 [ 931.554133][ T7522] prepare_creds+0x3c4/0x510 [ 931.558707][ T7522] ? abort_creds+0x2c0/0x2c0 [ 931.563290][ T7522] ? rcu_read_lock_sched_held+0x110/0x130 [ 931.569014][ T7522] ? kmem_cache_alloc_trace+0x354/0x760 [ 931.574553][ T7522] prepare_exec_creds+0x12/0xf0 [ 931.579382][ T7522] __do_execve_file.isra.0+0x47a/0x2700 [ 931.584966][ T7522] ? copy_strings_kernel+0x110/0x110 [ 931.590262][ T7522] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 931.596483][ T7522] ? strncpy_from_user+0x3aa/0x4e0 [ 931.601624][ T7522] ? digsig_verify.cold+0x32/0x32 [ 931.606677][ T7522] ? kmem_cache_alloc+0x341/0x710 [ 931.611719][ T7522] ? do_syscall_64+0x8c/0x800 [ 931.616404][ T7522] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 931.622651][ T7522] ? getname_flags+0x277/0x5b0 [ 931.627456][ T7522] ? trace_hardirqs_off_caller+0x300/0x300 [ 931.633281][ T7522] __x64_sys_execve+0x8f/0xc0 [ 931.637968][ T7522] do_syscall_64+0x1a3/0x800 [ 931.642555][ T7522] ? syscall_return_slowpath+0x5f0/0x5f0 [ 931.648179][ T7522] ? prepare_exit_to_usermode+0x232/0x3b0 [ 931.653906][ T7522] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 931.659562][ T7522] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 931.665444][ T7522] RIP: 0033:0x458099 [ 931.669341][ T7522] Code: 6d b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 3b b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 931.688944][ T7522] RSP: 002b:00007f0a9fbd4c78 EFLAGS: 00000246 ORIG_RAX: 000000000000003b [ 931.697354][ T7522] RAX: ffffffffffffffda RBX: 00007f0a9fbd4c90 RCX: 0000000000458099 [ 931.705313][ T7522] RDX: 0000000020000140 RSI: 0000000020000140 RDI: 0000000020000180 [ 931.713282][ T7522] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 931.721296][ T7522] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f0a9fbd56d4 [ 931.729266][ T7522] R13: 00000000004be6af R14: 00000000004ced68 R15: 0000000000000004 [ 931.781070][ C1] ------------[ cut here ]------------ [ 931.786764][ C1] AppArmor WARN cred_label: ((!blob)): [ 931.787008][ C1] WARNING: CPU: 1 PID: 8005 at security/apparmor/include/cred.h:30 apparmor_cred_free+0x12f/0x1a0 [ 931.803104][ C1] Kernel panic - not syncing: panic_on_warn set ... [ 931.809715][ C1] CPU: 1 PID: 8005 Comm: sshd Not tainted 5.0.0-rc2-next-20190117 #14 [ 931.817895][ C1] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 931.827940][ C1] Call Trace: [ 931.831200][ C1] [ 931.834036][ C1] dump_stack+0x1db/0x2d0 [ 931.838385][ C1] ? dump_stack_print_info.cold+0x20/0x20 [ 931.844082][ C1] ? apparmor_cred_free+0x70/0x1a0 [ 931.849167][ C1] panic+0x2cb/0x65c [ 931.853053][ C1] ? add_taint.cold+0x16/0x16 [ 931.857709][ C1] ? apparmor_cred_free+0x12f/0x1a0 [ 931.862884][ C1] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 931.869096][ C1] ? __probe_kernel_read+0x1f4/0x250 [ 931.874370][ C1] ? __warn.cold+0x5/0x48 [ 931.878693][ C1] ? __warn+0xe8/0x1d0 [ 931.882737][ C1] ? apparmor_cred_free+0x12f/0x1a0 [ 931.887908][ C1] __warn.cold+0x20/0x48 [ 931.892155][ C1] ? apparmor_cred_free+0x12f/0x1a0 [ 931.897330][ C1] report_bug+0x263/0x2b0 [ 931.901640][ C1] do_error_trap+0x11b/0x200 [ 931.906206][ C1] do_invalid_op+0x37/0x50 [ 931.910610][ C1] ? apparmor_cred_free+0x12f/0x1a0 [ 931.915782][ C1] invalid_op+0x14/0x20 [ 931.919910][ C1] RIP: 0010:apparmor_cred_free+0x12f/0x1a0 [ 931.925696][ C1] Code: 7c 88 48 c7 c7 80 d2 7c 88 e8 9d 69 f2 fd 0f 0b eb a9 e8 a4 40 29 fe 48 c7 c6 40 e2 7c 88 48 c7 c7 80 d2 7c 88 e8 81 69 f2 fd <0f> 0b 48 b8 00 00 00 00 00 fc ff df 80 38 00 75 4a 4c 8b 2c 25 00 [ 931.945290][ C1] RSP: 0018:ffff8880ae7079f8 EFLAGS: 00010286 [ 931.951346][ C1] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 0000000000000000 [ 931.959482][ C1] RDX: 0000000000000100 RSI: ffffffff81688726 RDI: 0000000000000006 [ 931.967460][ C1] RBP: ffff8880ae707a18 R08: ffff88808744e480 R09: 0000000000000000 [ 931.975407][ C1] R10: 0000000000000000 R11: 0000000000000000 R12: ffff8880a37a7a00 [ 931.983360][ C1] R13: ffff8880a37a7a00 R14: ffff8880a37a7a88 R15: dffffc0000000000 [ 931.991351][ C1] ? vprintk_func+0x86/0x189 [ 931.995938][ C1] ? apparmor_cred_free+0x12f/0x1a0 [ 932.001134][ C1] security_cred_free+0x4b/0xf0 [ 932.005962][ C1] put_cred_rcu+0x21f/0x6e0 [ 932.010443][ C1] ? get_task_cred+0x5e0/0x5e0 [ 932.015204][ C1] ? lock_release+0xc40/0xc40 [ 932.019856][ C1] ? __do_softirq+0x30b/0xb11 [ 932.024511][ C1] ? trace_hardirqs_off_caller+0x300/0x300 [ 932.030294][ C1] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 932.036512][ C1] ? check_preemption_disabled+0x48/0x290 [ 932.042213][ C1] rcu_core+0xc4a/0x1680 [ 932.046437][ C1] ? rcu_fwd_progress_check+0xd0/0xd0 [ 932.051785][ C1] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 932.057996][ C1] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 932.064210][ C1] ? check_preemption_disabled+0x48/0x290 [ 932.069920][ C1] ? rcu_lockdep_current_cpu_online+0x1aa/0x220 [ 932.076137][ C1] ? rcu_pm_notify+0xd0/0xd0 [ 932.080724][ C1] __do_softirq+0x30b/0xb11 [ 932.085209][ C1] ? __irqentry_text_end+0x1f96d2/0x1f96d2 [ 932.091010][ C1] ? kvm_clock_read+0x18/0x30 [ 932.095706][ C1] ? kvm_sched_clock_read+0x9/0x20 [ 932.100793][ C1] ? sched_clock+0x2e/0x50 [ 932.105199][ C1] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 932.111450][ C1] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 932.117683][ C1] ? check_preemption_disabled+0x48/0x290 [ 932.123385][ C1] irq_exit+0x180/0x1d0 [ 932.127518][ C1] smp_apic_timer_interrupt+0x1b7/0x760 [ 932.133042][ C1] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 932.138565][ C1] ? smp_call_function_single_interrupt+0x640/0x640 [ 932.145127][ C1] ? trace_hardirqs_off+0x310/0x310 [ 932.150318][ C1] ? task_prio+0x50/0x50 [ 932.154652][ C1] ? check_preemption_disabled+0x48/0x290 [ 932.160357][ C1] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 932.165895][ C1] apic_timer_interrupt+0xf/0x20 [ 932.170804][ C1] [ 932.173725][ C1] RIP: 0010:_raw_spin_unlock_irq+0x54/0x90 [ 932.179508][ C1] Code: c0 00 84 92 89 48 ba 00 00 00 00 00 fc ff df 48 c1 e8 03 80 3c 10 00 75 33 48 83 3d a5 65 9c 01 00 74 20 fb 66 0f 1f 44 00 00 01 00 00 00 e8 f2 27 62 f9 65 8b 05 5b cf 0b 78 85 c0 74 06 41 [ 932.199101][ C1] RSP: 0018:ffff8880901df0f0 EFLAGS: 00000282 ORIG_RAX: ffffffffffffff13 [ 932.207533][ C1] RAX: 1ffffffff1325080 RBX: 1ffff1101203be27 RCX: 0000000000000000 [ 932.215491][ C1] RDX: dffffc0000000000 RSI: 0000000000000001 RDI: ffff88808744ecfc [ 932.223444][ C1] RBP: ffff8880901df0f8 R08: ffff88808744e480 R09: 0000000000000000 [ 932.231391][ C1] R10: 0000000000000000 R11: 0000000000000000 R12: ffff8880ae72ce00 [ 932.239336][ C1] R13: ffff8880a949a340 R14: ffff8880912d8040 R15: ffff8880901df1b8 [ 932.247298][ C1] finish_task_switch+0x1e9/0xac0 [ 932.252386][ C1] ? finish_task_switch+0x1a8/0xac0 [ 932.257573][ C1] ? __switch_to_asm+0x34/0x70 [ 932.262311][ C1] ? __switch_to_asm+0x40/0x70 [ 932.267114][ C1] ? __switch_to_asm+0x34/0x70 [ 932.271857][ C1] ? __bpf_trace_sched_wake_idle_without_ipi+0x10/0x10 [ 932.278695][ C1] ? __switch_to_asm+0x34/0x70 [ 932.283455][ C1] ? __switch_to_asm+0x40/0x70 [ 932.288195][ C1] ? __switch_to_asm+0x34/0x70 [ 932.292958][ C1] ? __switch_to_asm+0x34/0x70 [ 932.297705][ C1] ? __switch_to_asm+0x34/0x70 [ 932.302474][ C1] ? __switch_to_asm+0x40/0x70 [ 932.307214][ C1] ? __switch_to_asm+0x34/0x70 [ 932.311952][ C1] ? __switch_to_asm+0x40/0x70 [ 932.316715][ C1] ? __switch_to_asm+0x34/0x70 [ 932.321456][ C1] ? __switch_to_asm+0x40/0x70 [ 932.326199][ C1] __schedule+0x89f/0x1e60 [ 932.330598][ C1] ? pci_mmcfg_check_reserved+0x170/0x170 [ 932.336296][ C1] ? lock_hrtimer_base.isra.0+0x75/0x130 [ 932.341906][ C1] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 932.348125][ C1] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 932.353975][ C1] schedule+0xfe/0x350 [ 932.358051][ C1] ? __hrtimer_get_remaining+0x1e0/0x1e0 [ 932.363680][ C1] ? lock_acquire+0x1db/0x570 [ 932.368336][ C1] ? __schedule+0x1e60/0x1e60 [ 932.372987][ C1] ? _raw_spin_unlock_irqrestore+0x6b/0xe0 [ 932.378788][ C1] ? memset+0x32/0x40 [ 932.382746][ C1] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 932.388975][ C1] ? __hrtimer_init+0xe1/0x250 [ 932.393732][ C1] schedule_hrtimeout_range_clock+0x252/0x4c0 [ 932.399810][ C1] ? tcp_keepalive_timer.cold+0x17/0x17 [ 932.405352][ C1] ? hrtimer_nanosleep_restart+0x1c0/0x1c0 [ 932.411140][ C1] ? clock_was_set_work+0x30/0x30 [ 932.416174][ C1] ? wait_woken+0x250/0x250 [ 932.420677][ C1] schedule_hrtimeout_range+0x2b/0x40 [ 932.426032][ C1] poll_schedule_timeout.constprop.0+0x11a/0x200 [ 932.432336][ C1] ? pollwake+0x300/0x300 [ 932.436750][ C1] ? poll_initwait+0x180/0x180 [ 932.441496][ C1] ? pipe_poll+0x2c4/0x340 [ 932.445890][ C1] do_select+0x15b7/0x1ab0 [ 932.450292][ C1] ? select_estimate_accuracy+0x4e0/0x4e0 [ 932.455990][ C1] ? set_fd_set.part.0+0x70/0x70 [ 932.460902][ C1] ? set_fd_set.part.0+0x70/0x70 [ 932.465816][ C1] ? set_fd_set.part.0+0x70/0x70 [ 932.470728][ C1] ? set_fd_set.part.0+0x70/0x70 [ 932.475698][ C1] ? __might_fault+0x12b/0x1e0 [ 932.480453][ C1] ? find_held_lock+0x35/0x120 [ 932.485209][ C1] ? __might_fault+0x12b/0x1e0 [ 932.489953][ C1] ? lock_acquire+0x1db/0x570 [ 932.494610][ C1] ? lock_downgrade+0xbe0/0xbe0 [ 932.499441][ C1] ? lock_release+0xc40/0xc40 [ 932.504095][ C1] ? __check_object_size+0xa3/0x790 [ 932.509282][ C1] core_sys_select+0x72a/0xb80 [ 932.514032][ C1] ? core_sys_select+0x72a/0xb80 [ 932.518952][ C1] ? do_compat_pselect+0x2d0/0x2d0 [ 932.524042][ C1] ? trace_hardirqs_off_caller+0x300/0x300 [ 932.529852][ C1] ? kvm_clock_read+0x18/0x30 [ 932.534511][ C1] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 932.540726][ C1] ? ktime_get_ts64+0x38d/0x4f0 [ 932.545558][ C1] ? nsec_to_clock_t+0x30/0x30 [ 932.550326][ C1] ? poll_select_set_timeout+0x154/0x240 [ 932.555939][ C1] ? do_restart_poll+0x2e0/0x2e0 [ 932.560856][ C1] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 932.567078][ C1] ? _copy_from_user+0xdd/0x150 [ 932.571924][ C1] kern_select+0x1b4/0x250 [ 932.576321][ C1] ? core_sys_select+0xb80/0xb80 [ 932.581235][ C1] ? lockdep_hardirqs_on+0x415/0x5d0 [ 932.586500][ C1] ? trace_hardirqs_on+0xbd/0x310 [ 932.591539][ C1] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 932.597610][ C1] ? trace_hardirqs_off_caller+0x300/0x300 [ 932.603399][ C1] __x64_sys_select+0xbe/0x150 [ 932.608159][ C1] do_syscall_64+0x1a3/0x800 [ 932.612731][ C1] ? syscall_return_slowpath+0x5f0/0x5f0 [ 932.618340][ C1] ? prepare_exit_to_usermode+0x232/0x3b0 [ 932.624049][ C1] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 932.629628][ C1] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 932.635493][ C1] RIP: 0033:0x7ff521432dd3 [ 932.639915][ C1] Code: 48 29 c2 64 89 11 48 83 c8 ff eb ea 90 90 90 90 90 90 90 90 90 90 90 83 3d 25 48 2b 00 00 75 13 49 89 ca b8 17 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 34 c3 48 83 ec 08 e8 ab 2f 01 00 48 89 04 24 [ 932.659538][ C1] RSP: 002b:00007ffcbcbedd88 EFLAGS: 00000246 ORIG_RAX: 0000000000000017 [ 932.667973][ C1] RAX: ffffffffffffffda RBX: 00007ffcbcbede10 RCX: 00007ff521432dd3 [ 932.675949][ C1] RDX: 000055b3f3d59ae0 RSI: 000055b3f3d59b00 RDI: 000000000000000c [ 932.683913][ C1] RBP: 000055b3f3b998dc R08: 00007ffcbcbeddb0 R09: 0101010101010101 [ 932.691863][ C1] R10: 0000000000000000 R11: 0000000000000246 R12: 00007ffcbcbede18 [ 932.699809][ C1] R13: 0000000000000000 R14: 00007ffcbcbede08 R15: 00007ffcbcbede0c [ 932.708952][ C1] Kernel Offset: disabled [ 932.713377][ C1] Rebooting in 86400 seconds..