or missing value 11:46:18 executing program 4: r0 = socket$netlink(0x10, 0x3, 0xf) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000000), 0x4) setsockopt$netlink_NETLINK_BROADCAST_ERROR(r0, 0x10e, 0x4, &(0x7f0000000080)=0x6, 0x4) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)={0x14, 0x23, 0x1, 0x0, 0x0, {0x20000000004, 0xe00000000000000}}, 0x14}}, 0x0) [ 253.157796][T10526] hfsplus: unable to parse mount options 11:46:18 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_FSGETXATTR(0xffffffffffffffff, 0x8004550f, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x1}, 0x10) r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r0, &(0x7f0000000000)={{0x6, @rose}, [@rose, @rose, @default, @netrom, @bcast, @rose, @rose, @null]}, 0x48) r1 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000080)='/dev/qat_adf_ctl\x00', 0x8200, 0x0) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r1, 0x6, 0x23, &(0x7f00000000c0)={&(0x7f0000ffc000/0x4000)=nil, 0x4000}, &(0x7f0000000140)=0x10) listen(r0, 0x0) unshare(0x40000000) r2 = accept(r0, 0x0, 0x0) write$binfmt_elf64(r2, &(0x7f00000002c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x9, 0x8, 0x0, 0x0, 0x0, 0x4825483b35c83c0b, 0x0, 0x0, 0x40, 0x227}, [{0x4, 0x1, 0xfff, 0x0, 0x0, 0xff8000000002, 0x0, 0x7fff}], "", [[], [], []]}, 0x378) 11:46:18 executing program 5: setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) setsockopt$netlink_NETLINK_BROADCAST_ERROR(0xffffffffffffffff, 0x10e, 0x4, 0x0, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000001c0)={0x0}}, 0x0) 11:46:18 executing program 0: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='devtmpfs\x00', 0x0, 0x0) chdir(&(0x7f00000000c0)='./file0\x00') pipe(0x0) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mkdir(0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$overlay(0x40000f, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="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"]) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000240)='cgroup2\x00', 0x0, 0x0) fstat(0xffffffffffffffff, &(0x7f00000008c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000005ec0)={{{@in6=@empty, @in=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@remote}, 0x0, @in6=@mcast2}}, &(0x7f0000004800)=0xffffffffffffffc3) r3 = geteuid() setsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f00000060c0)={{{@in=@remote, @in6=@rand_addr="20bbcbd1865253e3e58aa219d6ca6440", 0x4e21, 0x2400000000000000, 0x4e22, 0x0, 0xa, 0xa0, 0x0, 0x67, r2, r3}, {0x6, 0x183, 0x3, 0x7f, 0x61553a0b, 0x9, 0x1, 0x4}, {0x20, 0x80000001, 0x2000000000001, 0x9}, 0x9, 0x6e6bba, 0x0, 0x0, 0x1, 0x3}, {{@in=@empty, 0x4d3, 0x3c}, 0xa, @in=@loopback, 0x3504, 0x0, 0x3, 0xfffffffffffffffc, 0x1ff, 0x5, 0x6}}, 0xe8) syz_mount_image$hfsplus(&(0x7f0000000140)='hfsplus\x00', &(0x7f0000000200)='./file0\x00', 0x3, 0x7, &(0x7f0000000800)=[{&(0x7f0000000400)="e1ec051c0b7b96db7480b4620be1f7d4adcb21d5233a3d23bf43659e5359470de231dd734b698cd71201837ca57f911328e1aee6b2cb39533b2d549e", 0x3c, 0x101}, {&(0x7f0000000440)="dbac23926131781587488e056e40b191269651683d0d195cbd63543040e313e20126fd634002e0256fed786d07054466250e2de6b7fb6d7d8d5201ac1478ef26aafeae7947832c4cc7fea6315e92eb81c89a385dae378bf89ca53c6984b5aa79a7dcc139938fa64b30d7c24ff7b215c890be5756df2f441d0fcb938cb4c1f89245a47c630a2b5e28bb7b5a9c8c871c45857bc4fa646b30f485beccdf529ad0cd519a0bed9b5c7df28320d9ad7eceb30eda6c964cfcab57c8aa98b89d582792b886e41c9f6146332e31f93b", 0xcb, 0x1ff}, {&(0x7f0000000540)="5c96cd9925cbe6753ba234c06f8040f650bba8d4d4ebe59964acf97c49f7a5e793521ef728d90a4eb42cbe7a2536c6922f049b20f2c681c652b4dbe077b0a9972e1eeb5573d7ee69d6fc99d4e4894537fac772842763140c5d832bf593a5cc290fd0c641d14d06e564127871808073fb6fd27f2a9995b29abce9351b0b285f4887f1cc8de04d147141af2ed66cfb66fd230e329273710457efc72a8d09487b5c83e77201b28eb38d7d3846b63b1bf1233b5c925303dd3214066c99381b0457a62397c7df27f88e19a884e1dfa6", 0xcd, 0x6}, {&(0x7f0000000640)="8ae3f201063e83beadb088cb1080ef67", 0x10, 0x2a}, {&(0x7f0000000680)="dfeed81fb09a8a0d55f0999ce7730866db77fa306b896464e4d9cf133371563c7eb734eed8ec2dda58c030b96771bb708fba592614b985c573e8f3db424553c6", 0x40, 0x4}, {&(0x7f00000006c0)="f33dec9b5d96888f1504b1385ce82fdf8f2fa76ecc6ebf567753242a4c9129cd4c4885ba8bab1fd3120749889c981acccb344645e9d1ce95826ab7ceac8b7646d2e476e8934ac444aad3bba14f0d4be15675cd3d336db510c72ebbc07a000754d66f5282b1f241556cbd63a30b3d6af0f5c8a2443b03a92bb406abbb5f630ce1ef2afbba93c29e6bc46901a91ea9d91fa6048a468df5934437ca7e9e2a4fe38fddcd2aecac9406aa7adf5de93082ebf1b5c74d76b7b1b72a9b6fea1c5ab7cc1f3e97b5d7e1db9a64df9836ce0863cda956a1e2a45b9479b8ade23e81258e9444dfbf8066562f79", 0xe7, 0x7}, {&(0x7f00000007c0)="cd72eca63713ca8a35c3557b7d56b6a3073ca69e2067c18f5120c05d4ee8", 0x1e, 0x6}], 0x1, &(0x7f0000000a80)={[{@barrier='barrier'}, {@gid={'gid', 0x3d, r0}}, {@nodecompose='nodecompose'}, {@uid={'uid', 0x3d, r3}}, {@type={'type', 0x3d, "ae8c9d8f"}}, {@decompose='decompose'}, {@session={'session', 0x3d, 0x25}}], [{@uid_eq={'uid'}}, {@obj_type={'obj_type', 0x3d, 'overlay\x00'}}, {@euid_eq={'euid'}}, {@uid_eq={'uid'}}]}) [ 253.367386][T10533] overlayfs: unrecognized mount option "uppFrdir=./file0" or missing value 11:46:18 executing program 1: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='devtmpfs\x00', 0x0, 0x0) chdir(&(0x7f00000000c0)='./file0\x00') pipe(0x0) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mkdir(0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$overlay(0x40000f, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="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"]) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000240)='cgroup2\x00', 0x0, 0x0) fstat(0xffffffffffffffff, &(0x7f00000008c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000005ec0)={{{@in6=@empty, @in=@local}}, {{@in6=@remote}, 0x0, @in6=@mcast2}}, &(0x7f0000004800)=0xffffffffffffffc3) r2 = geteuid() syz_mount_image$hfsplus(&(0x7f0000000140)='hfsplus\x00', &(0x7f0000000200)='./file0\x00', 0x3, 0x7, &(0x7f0000000800)=[{&(0x7f0000000400)="e1ec051c0b7b96db7480b4620be1f7d4adcb21d5233a3d23bf43659e5359470de231dd734b698cd71201837ca57f911328e1aee6b2cb39533b2d549e", 0x3c, 0x101}, {&(0x7f0000000440)="dbac23926131781587488e056e40b191269651683d0d195cbd63543040e313e20126fd634002e0256fed786d07054466250e2de6b7fb6d7d8d5201ac1478ef26aafeae7947832c4cc7fea6315e92eb81c89a385dae378bf89ca53c6984b5aa79a7dcc139938fa64b30d7c24ff7b215c890be5756df2f441d0fcb938cb4c1f89245a47c630a2b5e28bb7b5a9c8c871c45857bc4fa646b30f485beccdf529ad0cd519a0bed9b5c7df28320d9ad7eceb30eda6c964cfcab57c8aa98b89d582792b886e41c9f6146332e31f93b", 0xcb, 0x1ff}, {&(0x7f0000000540)="5c96cd9925cbe6753ba234c06f8040f650bba8d4d4ebe59964acf97c49f7a5e793521ef728d90a4eb42cbe7a2536c6922f049b20f2c681c652b4dbe077b0a9972e1eeb5573d7ee69d6fc99d4e4894537fac772842763140c5d832bf593a5cc290fd0c641d14d06e564127871808073fb6fd27f2a9995b29abce9351b0b285f4887f1cc8de04d147141af2ed66cfb66fd230e329273710457efc72a8d09487b5c83e77201b28eb38d7d3846b63b1bf1233b5c925303dd3214066c99381b0457a62397c7df27f88e19a884e1dfa6", 0xcd, 0x6}, {&(0x7f0000000640)="8ae3f201063e83beadb088cb1080ef67", 0x10, 0x2a}, {&(0x7f0000000680)="dfeed81fb09a8a0d55f0999ce7730866db77fa306b896464e4d9cf133371563c7eb734eed8ec2dda58c030b96771bb708fba592614b985c573e8f3db424553c6", 0x40, 0x4}, {&(0x7f00000006c0)="f33dec9b5d96888f1504b1385ce82fdf8f2fa76ecc6ebf567753242a4c9129cd4c4885ba8bab1fd3120749889c981acccb344645e9d1ce95826ab7ceac8b7646d2e476e8934ac444aad3bba14f0d4be15675cd3d336db510c72ebbc07a000754d66f5282b1f241556cbd63a30b3d6af0f5c8a2443b03a92bb406abbb5f630ce1ef2afbba93c29e6bc46901a91ea9d91fa6048a468df5934437ca7e9e2a4fe38fddcd2aecac9406aa7adf5de93082ebf1b5c74d76b7b1b72a9b6fea1c5ab7cc1f3e97b5d7e1db9a64df9836ce0863cda956a1e2a45b9479b8ade23e81258e9444dfbf8066562f79", 0xe7, 0x7}, {&(0x7f00000007c0)="cd72eca63713ca8a35c3557b7d56b6a3073ca69e2067c18f5120c05d4ee8", 0x1e, 0x6}], 0x1, &(0x7f0000000a80)={[{@barrier='barrier'}, {@gid={'gid', 0x3d, r0}}, {@nodecompose='nodecompose'}, {@uid={'uid', 0x3d, r2}}, {@type={'type', 0x3d, "ae8c9d8f"}}, {@decompose='decompose'}, {@session={'session', 0x3d, 0x25}}], [{@uid_eq={'uid'}}, {@obj_type={'obj_type', 0x3d, 'overlay\x00'}}, {@euid_eq={'euid'}}, {@uid_eq={'uid'}}]}) 11:46:18 executing program 5: setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) setsockopt$netlink_NETLINK_BROADCAST_ERROR(0xffffffffffffffff, 0x10e, 0x4, 0x0, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000001c0)={0x0}}, 0x0) [ 253.459989][T10546] IPVS: ftp: loaded support on port[0] = 21 11:46:18 executing program 4: r0 = socket$netlink(0x10, 0x3, 0xf) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000000), 0x4) setsockopt$netlink_NETLINK_BROADCAST_ERROR(r0, 0x10e, 0x4, &(0x7f0000000080)=0x6, 0x4) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)={0x14, 0x23, 0x1, 0x0, 0x0, {0x20000000004, 0xe00000000000000}}, 0x14}}, 0x0) [ 253.517894][T10544] hfsplus: unable to parse mount options [ 253.634388][T10553] overlayfs: unrecognized mount option "uppFrdir=./file0" or missing value 11:46:18 executing program 3: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='devtmpfs\x00', 0x0, 0x0) chdir(&(0x7f00000000c0)='./file0\x00') pipe(0x0) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mkdir(0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$overlay(0x40000f, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="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"]) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000240)='cgroup2\x00', 0x0, 0x0) syz_mount_image$hfsplus(&(0x7f0000000140)='hfsplus\x00', &(0x7f0000000200)='./file0\x00', 0x3, 0x7, &(0x7f0000000800)=[{&(0x7f0000000400)="e1ec051c0b7b96db7480b4620be1f7d4adcb21d5233a3d23bf43659e5359470de231dd734b698cd71201837ca57f911328e1aee6b2cb39533b2d549e", 0x3c, 0x101}, {&(0x7f0000000440)="dbac23926131781587488e056e40b191269651683d0d195cbd63543040e313e20126fd634002e0256fed786d07054466250e2de6b7fb6d7d8d5201ac1478ef26aafeae7947832c4cc7fea6315e92eb81c89a385dae378bf89ca53c6984b5aa79a7dcc139938fa64b30d7c24ff7b215c890be5756df2f441d0fcb938cb4c1f89245a47c630a2b5e28bb7b5a9c8c871c45857bc4fa646b30f485beccdf529ad0cd519a0bed9b5c7df28320d9ad7eceb30eda6c964cfcab57c8aa98b89d582792b886e41c9f6146332e31f93b", 0xcb, 0x1ff}, {&(0x7f0000000540)="5c96cd9925cbe6753ba234c06f8040f650bba8d4d4ebe59964acf97c49f7a5e793521ef728d90a4eb42cbe7a2536c6922f049b20f2c681c652b4dbe077b0a9972e1eeb5573d7ee69d6fc99d4e4894537fac772842763140c5d832bf593a5cc290fd0c641d14d06e564127871808073fb6fd27f2a9995b29abce9351b0b285f4887f1cc8de04d147141af2ed66cfb66fd230e329273710457efc72a8d09487b5c83e77201b28eb38d7d3846b63b1bf1233b5c925303dd3214066c99381b0457a62397c7df27f88e19a884e1dfa6", 0xcd, 0x6}, {&(0x7f0000000640)="8ae3f201063e83beadb088cb1080ef67", 0x10, 0x2a}, {&(0x7f0000000680)="dfeed81fb09a8a0d55f0999ce7730866db77fa306b896464e4d9cf133371563c7eb734eed8ec2dda58c030b96771bb708fba592614b985c573e8f3db424553c6", 0x40, 0x4}, {&(0x7f00000006c0)="f33dec9b5d96888f1504b1385ce82fdf8f2fa76ecc6ebf567753242a4c9129cd4c4885ba8bab1fd3120749889c981acccb344645e9d1ce95826ab7ceac8b7646d2e476e8934ac444aad3bba14f0d4be15675cd3d336db510c72ebbc07a000754d66f5282b1f241556cbd63a30b3d6af0f5c8a2443b03a92bb406abbb5f630ce1ef2afbba93c29e6bc46901a91ea9d91fa6048a468df5934437ca7e9e2a4fe38fddcd2aecac9406aa7adf5de93082ebf1b5c74d76b7b1b72a9b6fea1c5ab7cc1f3e97b5d7e1db9a64df9836ce0863cda956a1e2a45b9479b8ade23e81258e9444dfbf8066562f79", 0xe7, 0x7}, {&(0x7f00000007c0)="cd72eca63713ca8a35c3557b7d56b6a3073ca69e2067c18f5120c05d4ee8", 0x1e, 0x6}], 0x1, &(0x7f0000000a80)={[{@barrier='barrier'}, {@gid={'gid'}}, {@nodecompose='nodecompose'}, {@uid={'uid'}}, {@type={'type', 0x3d, "ae8c9d8f"}}, {@decompose='decompose'}, {@session={'session', 0x3d, 0x25}}], [{@uid_eq={'uid'}}, {@obj_type={'obj_type', 0x3d, 'overlay\x00'}}, {@euid_eq={'euid'}}, {@uid_eq={'uid'}}]}) 11:46:18 executing program 5: setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) setsockopt$netlink_NETLINK_BROADCAST_ERROR(0xffffffffffffffff, 0x10e, 0x4, 0x0, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000001c0)={0x0}}, 0x0) [ 253.803931][T10553] hfsplus: unable to parse mount options [ 253.825867][T10558] overlayfs: unrecognized mount option "uppFrdir=./file0" or missing value 11:46:18 executing program 4: r0 = socket$netlink(0x10, 0x3, 0xf) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000000), 0x4) setsockopt$netlink_NETLINK_BROADCAST_ERROR(r0, 0x10e, 0x4, &(0x7f0000000080)=0x6, 0x4) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)={0x14, 0x23, 0x1, 0x0, 0x0, {0x20000000004, 0xe00000000000000}}, 0x14}}, 0x0) 11:46:18 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_FSGETXATTR(0xffffffffffffffff, 0x8004550f, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x1}, 0x10) r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r0, &(0x7f0000000000)={{0x6, @rose}, [@rose, @rose, @default, @netrom, @bcast, @rose, @rose, @null]}, 0x48) r1 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000080)='/dev/qat_adf_ctl\x00', 0x8200, 0x0) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r1, 0x6, 0x23, &(0x7f00000000c0)={&(0x7f0000ffc000/0x4000)=nil, 0x4000}, &(0x7f0000000140)=0x10) listen(r0, 0x0) unshare(0x40000000) r2 = accept(r0, 0x0, 0x0) write$binfmt_elf64(r2, &(0x7f00000002c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x9, 0x8, 0x0, 0x0, 0x0, 0x4825483b35c83c0b, 0x0, 0x0, 0x40, 0x227}, [{0x4, 0x1, 0xfff, 0x0, 0x0, 0xff8000000002, 0x0, 0x7fff}], "", [[], [], []]}, 0x378) 11:46:18 executing program 0: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='devtmpfs\x00', 0x0, 0x0) chdir(&(0x7f00000000c0)='./file0\x00') pipe(0x0) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mkdir(0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$overlay(0x40000f, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="75707046726469723d2e2f66696c65302c6c6f7765726469723d2e2f66696c65302c776f726b6469723d2e2f66696c65315c008dd712eb4c4602d39078433581919e8b817a1c09fe8e181081519b7a8259793b8c4b1093736b8d3ef3d64781796455ea1b29412fabd4fd749cbdbadd5d4fa6dad18d59235262aee5928a646acaa5b0b72c4348e1b0a4a52cab8fc461abde196cf60a732d195a64ce881b84bc1c085f990fd4bc2ce47e609a0daa4861948516ca0f519beaea32e38fa09e9b49538a32cce47c620ee6ce668079b8d73f89bfb329c08d9c81fe3c12bf0bf75ac36079bf34fd8eeadf965d333527ebe8ede05feec022e592e9e2e2be551753056d32048241d2b3ee3344aa57e1fe8f604132f549432ccf86af2039192fc4fdddf19ffd0d42de"]) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000240)='cgroup2\x00', 0x0, 0x0) fstat(0xffffffffffffffff, &(0x7f00000008c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000005ec0)={{{@in6=@empty, @in=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@remote}, 0x0, @in6=@mcast2}}, &(0x7f0000004800)=0xffffffffffffffc3) r3 = geteuid() setsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f00000060c0)={{{@in=@remote, @in6=@rand_addr="20bbcbd1865253e3e58aa219d6ca6440", 0x4e21, 0x2400000000000000, 0x4e22, 0x0, 0xa, 0xa0, 0x0, 0x67, r2, r3}, {0x6, 0x183, 0x3, 0x7f, 0x61553a0b, 0x9, 0x1, 0x4}, {0x20, 0x80000001, 0x2000000000001, 0x9}, 0x9, 0x6e6bba, 0x0, 0x0, 0x1, 0x3}, {{@in=@empty, 0x4d3, 0x3c}, 0xa, @in=@loopback, 0x3504, 0x0, 0x3, 0xfffffffffffffffc, 0x1ff, 0x5, 0x6}}, 0xe8) syz_mount_image$hfsplus(&(0x7f0000000140)='hfsplus\x00', &(0x7f0000000200)='./file0\x00', 0x3, 0x7, &(0x7f0000000800)=[{&(0x7f0000000400)="e1ec051c0b7b96db7480b4620be1f7d4adcb21d5233a3d23bf43659e5359470de231dd734b698cd71201837ca57f911328e1aee6b2cb39533b2d549e", 0x3c, 0x101}, {&(0x7f0000000440)="dbac23926131781587488e056e40b191269651683d0d195cbd63543040e313e20126fd634002e0256fed786d07054466250e2de6b7fb6d7d8d5201ac1478ef26aafeae7947832c4cc7fea6315e92eb81c89a385dae378bf89ca53c6984b5aa79a7dcc139938fa64b30d7c24ff7b215c890be5756df2f441d0fcb938cb4c1f89245a47c630a2b5e28bb7b5a9c8c871c45857bc4fa646b30f485beccdf529ad0cd519a0bed9b5c7df28320d9ad7eceb30eda6c964cfcab57c8aa98b89d582792b886e41c9f6146332e31f93b", 0xcb, 0x1ff}, {&(0x7f0000000540)="5c96cd9925cbe6753ba234c06f8040f650bba8d4d4ebe59964acf97c49f7a5e793521ef728d90a4eb42cbe7a2536c6922f049b20f2c681c652b4dbe077b0a9972e1eeb5573d7ee69d6fc99d4e4894537fac772842763140c5d832bf593a5cc290fd0c641d14d06e564127871808073fb6fd27f2a9995b29abce9351b0b285f4887f1cc8de04d147141af2ed66cfb66fd230e329273710457efc72a8d09487b5c83e77201b28eb38d7d3846b63b1bf1233b5c925303dd3214066c99381b0457a62397c7df27f88e19a884e1dfa6", 0xcd, 0x6}, {&(0x7f0000000640)="8ae3f201063e83beadb088cb1080ef67", 0x10, 0x2a}, {&(0x7f0000000680)="dfeed81fb09a8a0d55f0999ce7730866db77fa306b896464e4d9cf133371563c7eb734eed8ec2dda58c030b96771bb708fba592614b985c573e8f3db424553c6", 0x40, 0x4}, {&(0x7f00000006c0)="f33dec9b5d96888f1504b1385ce82fdf8f2fa76ecc6ebf567753242a4c9129cd4c4885ba8bab1fd3120749889c981acccb344645e9d1ce95826ab7ceac8b7646d2e476e8934ac444aad3bba14f0d4be15675cd3d336db510c72ebbc07a000754d66f5282b1f241556cbd63a30b3d6af0f5c8a2443b03a92bb406abbb5f630ce1ef2afbba93c29e6bc46901a91ea9d91fa6048a468df5934437ca7e9e2a4fe38fddcd2aecac9406aa7adf5de93082ebf1b5c74d76b7b1b72a9b6fea1c5ab7cc1f3e97b5d7e1db9a64df9836ce0863cda956a1e2a45b9479b8ade23e81258e9444dfbf8066562f79", 0xe7, 0x7}, {&(0x7f00000007c0)="cd72eca63713ca8a35c3557b7d56b6a3073ca69e2067c18f5120c05d4ee8", 0x1e, 0x6}], 0x1, &(0x7f0000000a80)={[{@barrier='barrier'}, {@gid={'gid', 0x3d, r0}}, {@nodecompose='nodecompose'}, {@uid={'uid', 0x3d, r3}}, {@type={'type', 0x3d, "ae8c9d8f"}}, {@decompose='decompose'}, {@session={'session', 0x3d, 0x25}}], [{@uid_eq={'uid'}}, {@obj_type={'obj_type', 0x3d, 'overlay\x00'}}, {@euid_eq={'euid'}}, {@uid_eq={'uid'}}]}) [ 254.054110][T10570] overlayfs: unrecognized mount option "uppFrdir=./file0" or missing value 11:46:19 executing program 1: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='devtmpfs\x00', 0x0, 0x0) chdir(&(0x7f00000000c0)='./file0\x00') pipe(0x0) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mkdir(0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$overlay(0x40000f, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="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"]) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000240)='cgroup2\x00', 0x0, 0x0) fstat(0xffffffffffffffff, &(0x7f00000008c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000005ec0)={{{@in6=@empty, @in=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@remote}, 0x0, @in6=@mcast2}}, &(0x7f0000004800)=0xffffffffffffffc3) r3 = geteuid() setsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f00000060c0)={{{@in=@remote, @in6=@rand_addr="20bbcbd1865253e3e58aa219d6ca6440", 0x4e21, 0x2400000000000000, 0x4e22, 0x0, 0xa, 0xa0, 0x0, 0x67, r2, r3}, {0x6, 0x183, 0x3, 0x7f, 0x61553a0b, 0x9, 0x1, 0x4}, {0x20, 0x80000001, 0x2000000000001, 0x9}, 0x9, 0x6e6bba, 0x0, 0x0, 0x1, 0x3}, {{@in=@empty, 0x4d3, 0x3c}, 0xa, @in=@loopback, 0x3504, 0x0, 0x3, 0xfffffffffffffffc, 0x1ff, 0x5, 0x6}}, 0xe8) syz_mount_image$hfsplus(&(0x7f0000000140)='hfsplus\x00', &(0x7f0000000200)='./file0\x00', 0x3, 0x7, &(0x7f0000000800)=[{&(0x7f0000000400)="e1ec051c0b7b96db7480b4620be1f7d4adcb21d5233a3d23bf43659e5359470de231dd734b698cd71201837ca57f911328e1aee6b2cb39533b2d549e", 0x3c, 0x101}, {&(0x7f0000000440)="dbac23926131781587488e056e40b191269651683d0d195cbd63543040e313e20126fd634002e0256fed786d07054466250e2de6b7fb6d7d8d5201ac1478ef26aafeae7947832c4cc7fea6315e92eb81c89a385dae378bf89ca53c6984b5aa79a7dcc139938fa64b30d7c24ff7b215c890be5756df2f441d0fcb938cb4c1f89245a47c630a2b5e28bb7b5a9c8c871c45857bc4fa646b30f485beccdf529ad0cd519a0bed9b5c7df28320d9ad7eceb30eda6c964cfcab57c8aa98b89d582792b886e41c9f6146332e31f93b", 0xcb, 0x1ff}, {&(0x7f0000000540)="5c96cd9925cbe6753ba234c06f8040f650bba8d4d4ebe59964acf97c49f7a5e793521ef728d90a4eb42cbe7a2536c6922f049b20f2c681c652b4dbe077b0a9972e1eeb5573d7ee69d6fc99d4e4894537fac772842763140c5d832bf593a5cc290fd0c641d14d06e564127871808073fb6fd27f2a9995b29abce9351b0b285f4887f1cc8de04d147141af2ed66cfb66fd230e329273710457efc72a8d09487b5c83e77201b28eb38d7d3846b63b1bf1233b5c925303dd3214066c99381b0457a62397c7df27f88e19a884e1dfa6", 0xcd, 0x6}, {&(0x7f0000000640)="8ae3f201063e83beadb088cb1080ef67", 0x10, 0x2a}, {&(0x7f0000000680)="dfeed81fb09a8a0d55f0999ce7730866db77fa306b896464e4d9cf133371563c7eb734eed8ec2dda58c030b96771bb708fba592614b985c573e8f3db424553c6", 0x40, 0x4}, {&(0x7f00000006c0)="f33dec9b5d96888f1504b1385ce82fdf8f2fa76ecc6ebf567753242a4c9129cd4c4885ba8bab1fd3120749889c981acccb344645e9d1ce95826ab7ceac8b7646d2e476e8934ac444aad3bba14f0d4be15675cd3d336db510c72ebbc07a000754d66f5282b1f241556cbd63a30b3d6af0f5c8a2443b03a92bb406abbb5f630ce1ef2afbba93c29e6bc46901a91ea9d91fa6048a468df5934437ca7e9e2a4fe38fddcd2aecac9406aa7adf5de93082ebf1b5c74d76b7b1b72a9b6fea1c5ab7cc1f3e97b5d7e1db9a64df9836ce0863cda956a1e2a45b9479b8ade23e81258e9444dfbf8066562f79", 0xe7, 0x7}, {&(0x7f00000007c0)="cd72eca63713ca8a35c3557b7d56b6a3073ca69e2067c18f5120c05d4ee8", 0x1e, 0x6}], 0x1, &(0x7f0000000a80)={[{@barrier='barrier'}, {@gid={'gid', 0x3d, r0}}, {@nodecompose='nodecompose'}, {@uid={'uid', 0x3d, r3}}, {@type={'type', 0x3d, "ae8c9d8f"}}, {@decompose='decompose'}, {@session={'session', 0x3d, 0x25}}], [{@uid_eq={'uid'}}, {@obj_type={'obj_type', 0x3d, 'overlay\x00'}}, {@euid_eq={'euid'}}, {@uid_eq={'uid'}}]}) 11:46:19 executing program 5: setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) setsockopt$netlink_NETLINK_BROADCAST_ERROR(0xffffffffffffffff, 0x10e, 0x4, 0x0, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)={0x14, 0x0, 0x1, 0x0, 0x0, {0x20000000004, 0xe00000000000000}}, 0x14}}, 0x0) [ 254.106412][T10574] hfsplus: unable to parse mount options 11:46:19 executing program 3: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='devtmpfs\x00', 0x0, 0x0) chdir(&(0x7f00000000c0)='./file0\x00') pipe(0x0) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mkdir(0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$overlay(0x40000f, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="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"]) syz_mount_image$hfsplus(&(0x7f0000000140)='hfsplus\x00', &(0x7f0000000200)='./file0\x00', 0x3, 0x7, &(0x7f0000000800)=[{&(0x7f0000000400)="e1ec051c0b7b96db7480b4620be1f7d4adcb21d5233a3d23bf43659e5359470de231dd734b698cd71201837ca57f911328e1aee6b2cb39533b2d549e", 0x3c, 0x101}, {&(0x7f0000000440)="dbac23926131781587488e056e40b191269651683d0d195cbd63543040e313e20126fd634002e0256fed786d07054466250e2de6b7fb6d7d8d5201ac1478ef26aafeae7947832c4cc7fea6315e92eb81c89a385dae378bf89ca53c6984b5aa79a7dcc139938fa64b30d7c24ff7b215c890be5756df2f441d0fcb938cb4c1f89245a47c630a2b5e28bb7b5a9c8c871c45857bc4fa646b30f485beccdf529ad0cd519a0bed9b5c7df28320d9ad7eceb30eda6c964cfcab57c8aa98b89d582792b886e41c9f6146332e31f93b", 0xcb, 0x1ff}, {&(0x7f0000000540)="5c96cd9925cbe6753ba234c06f8040f650bba8d4d4ebe59964acf97c49f7a5e793521ef728d90a4eb42cbe7a2536c6922f049b20f2c681c652b4dbe077b0a9972e1eeb5573d7ee69d6fc99d4e4894537fac772842763140c5d832bf593a5cc290fd0c641d14d06e564127871808073fb6fd27f2a9995b29abce9351b0b285f4887f1cc8de04d147141af2ed66cfb66fd230e329273710457efc72a8d09487b5c83e77201b28eb38d7d3846b63b1bf1233b5c925303dd3214066c99381b0457a62397c7df27f88e19a884e1dfa6", 0xcd, 0x6}, {&(0x7f0000000640)="8ae3f201063e83beadb088cb1080ef67", 0x10, 0x2a}, {&(0x7f0000000680)="dfeed81fb09a8a0d55f0999ce7730866db77fa306b896464e4d9cf133371563c7eb734eed8ec2dda58c030b96771bb708fba592614b985c573e8f3db424553c6", 0x40, 0x4}, {&(0x7f00000006c0)="f33dec9b5d96888f1504b1385ce82fdf8f2fa76ecc6ebf567753242a4c9129cd4c4885ba8bab1fd3120749889c981acccb344645e9d1ce95826ab7ceac8b7646d2e476e8934ac444aad3bba14f0d4be15675cd3d336db510c72ebbc07a000754d66f5282b1f241556cbd63a30b3d6af0f5c8a2443b03a92bb406abbb5f630ce1ef2afbba93c29e6bc46901a91ea9d91fa6048a468df5934437ca7e9e2a4fe38fddcd2aecac9406aa7adf5de93082ebf1b5c74d76b7b1b72a9b6fea1c5ab7cc1f3e97b5d7e1db9a64df9836ce0863cda956a1e2a45b9479b8ade23e81258e9444dfbf8066562f79", 0xe7, 0x7}, {&(0x7f00000007c0)="cd72eca63713ca8a35c3557b7d56b6a3073ca69e2067c18f5120c05d4ee8", 0x1e, 0x6}], 0x1, &(0x7f0000000a80)={[{@barrier='barrier'}, {@gid={'gid'}}, {@nodecompose='nodecompose'}, {@uid={'uid'}}, {@type={'type', 0x3d, "ae8c9d8f"}}, {@decompose='decompose'}, {@session={'session', 0x3d, 0x25}}], [{@uid_eq={'uid'}}, {@obj_type={'obj_type', 0x3d, 'overlay\x00'}}, {@euid_eq={'euid'}}, {@uid_eq={'uid'}}]}) [ 254.306423][T10591] IPVS: ftp: loaded support on port[0] = 21 [ 254.323840][T10587] overlayfs: unrecognized mount option "uppFrdir=./file0" or missing value 11:46:19 executing program 4: bind$netlink(0xffffffffffffffff, &(0x7f0000514ff4)={0x10, 0x0, 0x0, 0x2ffffffff}, 0xc) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x8, &(0x7f0000000000), 0x4) setsockopt$netlink_NETLINK_BROADCAST_ERROR(0xffffffffffffffff, 0x10e, 0x4, &(0x7f0000000080)=0x6, 0x4) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)={0x14, 0x23, 0x1, 0x0, 0x0, {0x20000000004, 0xe00000000000000}}, 0x14}}, 0x0) 11:46:19 executing program 5: setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) setsockopt$netlink_NETLINK_BROADCAST_ERROR(0xffffffffffffffff, 0x10e, 0x4, 0x0, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)={0x14, 0x0, 0x1, 0x0, 0x0, {0x20000000004, 0xe00000000000000}}, 0x14}}, 0x0) [ 254.370849][T10593] hfsplus: unable to parse mount options [ 254.395552][T10592] overlayfs: unrecognized mount option "uppFrdir=./file0" or missing value 11:46:19 executing program 0: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='devtmpfs\x00', 0x0, 0x0) chdir(&(0x7f00000000c0)='./file0\x00') pipe(0x0) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mkdir(0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$overlay(0x40000f, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="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"]) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000240)='cgroup2\x00', 0x0, 0x0) fstat(0xffffffffffffffff, &(0x7f00000008c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000005ec0)={{{@in6=@empty, @in=@local}}, {{@in6=@remote}, 0x0, @in6=@mcast2}}, &(0x7f0000004800)=0xffffffffffffffc3) r2 = geteuid() syz_mount_image$hfsplus(&(0x7f0000000140)='hfsplus\x00', &(0x7f0000000200)='./file0\x00', 0x3, 0x7, &(0x7f0000000800)=[{&(0x7f0000000400)="e1ec051c0b7b96db7480b4620be1f7d4adcb21d5233a3d23bf43659e5359470de231dd734b698cd71201837ca57f911328e1aee6b2cb39533b2d549e", 0x3c, 0x101}, {&(0x7f0000000440)="dbac23926131781587488e056e40b191269651683d0d195cbd63543040e313e20126fd634002e0256fed786d07054466250e2de6b7fb6d7d8d5201ac1478ef26aafeae7947832c4cc7fea6315e92eb81c89a385dae378bf89ca53c6984b5aa79a7dcc139938fa64b30d7c24ff7b215c890be5756df2f441d0fcb938cb4c1f89245a47c630a2b5e28bb7b5a9c8c871c45857bc4fa646b30f485beccdf529ad0cd519a0bed9b5c7df28320d9ad7eceb30eda6c964cfcab57c8aa98b89d582792b886e41c9f6146332e31f93b", 0xcb, 0x1ff}, {&(0x7f0000000540)="5c96cd9925cbe6753ba234c06f8040f650bba8d4d4ebe59964acf97c49f7a5e793521ef728d90a4eb42cbe7a2536c6922f049b20f2c681c652b4dbe077b0a9972e1eeb5573d7ee69d6fc99d4e4894537fac772842763140c5d832bf593a5cc290fd0c641d14d06e564127871808073fb6fd27f2a9995b29abce9351b0b285f4887f1cc8de04d147141af2ed66cfb66fd230e329273710457efc72a8d09487b5c83e77201b28eb38d7d3846b63b1bf1233b5c925303dd3214066c99381b0457a62397c7df27f88e19a884e1dfa6", 0xcd, 0x6}, {&(0x7f0000000640)="8ae3f201063e83beadb088cb1080ef67", 0x10, 0x2a}, {&(0x7f0000000680)="dfeed81fb09a8a0d55f0999ce7730866db77fa306b896464e4d9cf133371563c7eb734eed8ec2dda58c030b96771bb708fba592614b985c573e8f3db424553c6", 0x40, 0x4}, {&(0x7f00000006c0)="f33dec9b5d96888f1504b1385ce82fdf8f2fa76ecc6ebf567753242a4c9129cd4c4885ba8bab1fd3120749889c981acccb344645e9d1ce95826ab7ceac8b7646d2e476e8934ac444aad3bba14f0d4be15675cd3d336db510c72ebbc07a000754d66f5282b1f241556cbd63a30b3d6af0f5c8a2443b03a92bb406abbb5f630ce1ef2afbba93c29e6bc46901a91ea9d91fa6048a468df5934437ca7e9e2a4fe38fddcd2aecac9406aa7adf5de93082ebf1b5c74d76b7b1b72a9b6fea1c5ab7cc1f3e97b5d7e1db9a64df9836ce0863cda956a1e2a45b9479b8ade23e81258e9444dfbf8066562f79", 0xe7, 0x7}, {&(0x7f00000007c0)="cd72eca63713ca8a35c3557b7d56b6a3073ca69e2067c18f5120c05d4ee8", 0x1e, 0x6}], 0x1, &(0x7f0000000a80)={[{@barrier='barrier'}, {@gid={'gid', 0x3d, r0}}, {@nodecompose='nodecompose'}, {@uid={'uid', 0x3d, r2}}, {@type={'type', 0x3d, "ae8c9d8f"}}, {@decompose='decompose'}, {@session={'session', 0x3d, 0x25}}], [{@uid_eq={'uid'}}, {@obj_type={'obj_type', 0x3d, 'overlay\x00'}}, {@euid_eq={'euid'}}, {@uid_eq={'uid'}}]}) 11:46:19 executing program 5: setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) setsockopt$netlink_NETLINK_BROADCAST_ERROR(0xffffffffffffffff, 0x10e, 0x4, 0x0, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)={0x14, 0x0, 0x1, 0x0, 0x0, {0x20000000004, 0xe00000000000000}}, 0x14}}, 0x0) [ 254.623237][T10606] overlayfs: unrecognized mount option "uppFrdir=./file0" or missing value 11:46:19 executing program 1: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='devtmpfs\x00', 0x0, 0x0) chdir(&(0x7f00000000c0)='./file0\x00') pipe(0x0) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mkdir(0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$overlay(0x40000f, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="75707046726469723d2e2f66696c65302c6c6f7765726469723d2e2f66696c65302c776f726b6469723d2e2f66696c65315c008dd712eb4c4602d39078433581919e8b817a1c09fe8e181081519b7a8259793b8c4b1093736b8d3ef3d64781796455ea1b29412fabd4fd749cbdbadd5d4fa6dad18d59235262aee5928a646acaa5b0b72c4348e1b0a4a52cab8fc461abde196cf60a732d195a64ce881b84bc1c085f990fd4bc2ce47e609a0daa4861948516ca0f519beaea32e38fa09e9b49538a32cce47c620ee6ce668079b8d73f89bfb329c08d9c81fe3c12bf0bf75ac36079bf34fd8eeadf965d333527ebe8ede05feec022e592e9e2e2be551753056d32048241d2b3ee3344aa57e1fe8f604132f549432ccf86af2039192fc4fdddf19ffd0d42de"]) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000240)='cgroup2\x00', 0x0, 0x0) fstat(0xffffffffffffffff, &(0x7f00000008c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000005ec0)={{{@in6=@empty, @in=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@remote}, 0x0, @in6=@mcast2}}, &(0x7f0000004800)=0xffffffffffffffc3) r3 = geteuid() setsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f00000060c0)={{{@in=@remote, @in6=@rand_addr="20bbcbd1865253e3e58aa219d6ca6440", 0x4e21, 0x2400000000000000, 0x4e22, 0x0, 0xa, 0xa0, 0x0, 0x67, r2, r3}, {0x6, 0x183, 0x3, 0x7f, 0x61553a0b, 0x9, 0x1, 0x4}, {0x20, 0x80000001, 0x2000000000001, 0x9}, 0x9, 0x6e6bba, 0x0, 0x0, 0x1, 0x3}, {{@in=@empty, 0x4d3, 0x3c}, 0xa, @in=@loopback, 0x3504, 0x0, 0x3, 0xfffffffffffffffc, 0x1ff, 0x5, 0x6}}, 0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000940)={{{@in6, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@dev}, 0x0, @in6=@local}}, &(0x7f0000000a40)=0xe8) r5 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r5, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") getsockopt$inet_IP_IPSEC_POLICY(r5, 0x0, 0x10, &(0x7f0000005ec0)={{{@in6=@empty, @in=@local}}, {{@in6=@remote}, 0x0, @in6=@mcast2}}, &(0x7f0000004800)=0xffffffffffffffc3) syz_mount_image$hfsplus(&(0x7f0000000140)='hfsplus\x00', &(0x7f0000000200)='./file0\x00', 0x3, 0x7, &(0x7f0000000800)=[{&(0x7f0000000400)="e1ec051c0b7b96db7480b4620be1f7d4adcb21d5233a3d23bf43659e5359470de231dd734b698cd71201837ca57f911328e1aee6b2cb39533b2d549e", 0x3c, 0x101}, {&(0x7f0000000440)="dbac23926131781587488e056e40b191269651683d0d195cbd63543040e313e20126fd634002e0256fed786d07054466250e2de6b7fb6d7d8d5201ac1478ef26aafeae7947832c4cc7fea6315e92eb81c89a385dae378bf89ca53c6984b5aa79a7dcc139938fa64b30d7c24ff7b215c890be5756df2f441d0fcb938cb4c1f89245a47c630a2b5e28bb7b5a9c8c871c45857bc4fa646b30f485beccdf529ad0cd519a0bed9b5c7df28320d9ad7eceb30eda6c964cfcab57c8aa98b89d582792b886e41c9f6146332e31f93b", 0xcb, 0x1ff}, {&(0x7f0000000540)="5c96cd9925cbe6753ba234c06f8040f650bba8d4d4ebe59964acf97c49f7a5e793521ef728d90a4eb42cbe7a2536c6922f049b20f2c681c652b4dbe077b0a9972e1eeb5573d7ee69d6fc99d4e4894537fac772842763140c5d832bf593a5cc290fd0c641d14d06e564127871808073fb6fd27f2a9995b29abce9351b0b285f4887f1cc8de04d147141af2ed66cfb66fd230e329273710457efc72a8d09487b5c83e77201b28eb38d7d3846b63b1bf1233b5c925303dd3214066c99381b0457a62397c7df27f88e19a884e1dfa6", 0xcd, 0x6}, {&(0x7f0000000640)="8ae3f201063e83beadb088cb1080ef67", 0x10, 0x2a}, {&(0x7f0000000680)="dfeed81fb09a8a0d55f0999ce7730866db77fa306b896464e4d9cf133371563c7eb734eed8ec2dda58c030b96771bb708fba592614b985c573e8f3db424553c6", 0x40, 0x4}, {&(0x7f00000006c0)="f33dec9b5d96888f1504b1385ce82fdf8f2fa76ecc6ebf567753242a4c9129cd4c4885ba8bab1fd3120749889c981acccb344645e9d1ce95826ab7ceac8b7646d2e476e8934ac444aad3bba14f0d4be15675cd3d336db510c72ebbc07a000754d66f5282b1f241556cbd63a30b3d6af0f5c8a2443b03a92bb406abbb5f630ce1ef2afbba93c29e6bc46901a91ea9d91fa6048a468df5934437ca7e9e2a4fe38fddcd2aecac9406aa7adf5de93082ebf1b5c74d76b7b1b72a9b6fea1c5ab7cc1f3e97b5d7e1db9a64df9836ce0863cda956a1e2a45b9479b8ade23e81258e9444dfbf8066562f79", 0xe7, 0x7}, {&(0x7f00000007c0)="cd72eca63713ca8a35c3557b7d56b6a3073ca69e2067c18f5120c05d4ee8", 0x1e, 0x6}], 0x1, &(0x7f0000000a80)={[{@barrier='barrier'}, {@gid={'gid', 0x3d, r0}}, {@nodecompose='nodecompose'}, {@uid={'uid', 0x3d, r3}}, {@type={'type', 0x3d, "ae8c9d8f"}}, {@decompose='decompose'}, {@session={'session', 0x3d, 0x25}}], [{@uid_eq={'uid', 0x3d, r4}}, {@obj_type={'obj_type', 0x3d, 'overlay\x00'}}, {@euid_eq={'euid'}}, {@uid_eq={'uid'}}]}) [ 254.668229][T10610] hfsplus: unable to parse mount options 11:46:19 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_FSGETXATTR(0xffffffffffffffff, 0x8004550f, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x1}, 0x10) r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r0, &(0x7f0000000000)={{0x6, @rose}, [@rose, @rose, @default, @netrom, @bcast, @rose, @rose, @null]}, 0x48) r1 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000080)='/dev/qat_adf_ctl\x00', 0x8200, 0x0) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r1, 0x6, 0x23, &(0x7f00000000c0)={&(0x7f0000ffc000/0x4000)=nil, 0x4000}, &(0x7f0000000140)=0x10) listen(r0, 0x0) setrlimit(0x0, 0x0) r2 = accept(r0, 0x0, 0x0) write$binfmt_elf64(r2, &(0x7f00000002c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x9, 0x8, 0x0, 0x0, 0x0, 0x4825483b35c83c0b, 0x0, 0x0, 0x40, 0x227}, [{0x4, 0x1, 0xfff, 0x0, 0x0, 0xff8000000002, 0x0, 0x7fff}], "", [[], [], []]}, 0x378) 11:46:19 executing program 3: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='devtmpfs\x00', 0x0, 0x0) chdir(&(0x7f00000000c0)='./file0\x00') pipe(0x0) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mkdir(0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$hfsplus(&(0x7f0000000140)='hfsplus\x00', &(0x7f0000000200)='./file0\x00', 0x3, 0x7, &(0x7f0000000800)=[{&(0x7f0000000400)="e1ec051c0b7b96db7480b4620be1f7d4adcb21d5233a3d23bf43659e5359470de231dd734b698cd71201837ca57f911328e1aee6b2cb39533b2d549e", 0x3c, 0x101}, {&(0x7f0000000440)="dbac23926131781587488e056e40b191269651683d0d195cbd63543040e313e20126fd634002e0256fed786d07054466250e2de6b7fb6d7d8d5201ac1478ef26aafeae7947832c4cc7fea6315e92eb81c89a385dae378bf89ca53c6984b5aa79a7dcc139938fa64b30d7c24ff7b215c890be5756df2f441d0fcb938cb4c1f89245a47c630a2b5e28bb7b5a9c8c871c45857bc4fa646b30f485beccdf529ad0cd519a0bed9b5c7df28320d9ad7eceb30eda6c964cfcab57c8aa98b89d582792b886e41c9f6146332e31f93b", 0xcb, 0x1ff}, {&(0x7f0000000540)="5c96cd9925cbe6753ba234c06f8040f650bba8d4d4ebe59964acf97c49f7a5e793521ef728d90a4eb42cbe7a2536c6922f049b20f2c681c652b4dbe077b0a9972e1eeb5573d7ee69d6fc99d4e4894537fac772842763140c5d832bf593a5cc290fd0c641d14d06e564127871808073fb6fd27f2a9995b29abce9351b0b285f4887f1cc8de04d147141af2ed66cfb66fd230e329273710457efc72a8d09487b5c83e77201b28eb38d7d3846b63b1bf1233b5c925303dd3214066c99381b0457a62397c7df27f88e19a884e1dfa6", 0xcd, 0x6}, {&(0x7f0000000640)="8ae3f201063e83beadb088cb1080ef67", 0x10, 0x2a}, {&(0x7f0000000680)="dfeed81fb09a8a0d55f0999ce7730866db77fa306b896464e4d9cf133371563c7eb734eed8ec2dda58c030b96771bb708fba592614b985c573e8f3db424553c6", 0x40, 0x4}, {&(0x7f00000006c0)="f33dec9b5d96888f1504b1385ce82fdf8f2fa76ecc6ebf567753242a4c9129cd4c4885ba8bab1fd3120749889c981acccb344645e9d1ce95826ab7ceac8b7646d2e476e8934ac444aad3bba14f0d4be15675cd3d336db510c72ebbc07a000754d66f5282b1f241556cbd63a30b3d6af0f5c8a2443b03a92bb406abbb5f630ce1ef2afbba93c29e6bc46901a91ea9d91fa6048a468df5934437ca7e9e2a4fe38fddcd2aecac9406aa7adf5de93082ebf1b5c74d76b7b1b72a9b6fea1c5ab7cc1f3e97b5d7e1db9a64df9836ce0863cda956a1e2a45b9479b8ade23e81258e9444dfbf8066562f79", 0xe7, 0x7}, {&(0x7f00000007c0)="cd72eca63713ca8a35c3557b7d56b6a3073ca69e2067c18f5120c05d4ee8", 0x1e, 0x6}], 0x1, &(0x7f0000000a80)={[{@barrier='barrier'}, {@gid={'gid'}}, {@nodecompose='nodecompose'}, {@uid={'uid'}}, {@type={'type', 0x3d, "ae8c9d8f"}}, {@decompose='decompose'}, {@session={'session', 0x3d, 0x25}}], [{@uid_eq={'uid'}}, {@obj_type={'obj_type', 0x3d, 'overlay\x00'}}, {@euid_eq={'euid'}}, {@uid_eq={'uid'}}]}) [ 254.846481][T10614] overlayfs: unrecognized mount option "uppFrdir=./file0" or missing value 11:46:19 executing program 4: bind$netlink(0xffffffffffffffff, &(0x7f0000514ff4)={0x10, 0x0, 0x0, 0x2ffffffff}, 0xc) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x8, &(0x7f0000000000), 0x4) setsockopt$netlink_NETLINK_BROADCAST_ERROR(0xffffffffffffffff, 0x10e, 0x4, &(0x7f0000000080)=0x6, 0x4) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)={0x14, 0x23, 0x1, 0x0, 0x0, {0x20000000004, 0xe00000000000000}}, 0x14}}, 0x0) 11:46:19 executing program 5: setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) setsockopt$netlink_NETLINK_BROADCAST_ERROR(0xffffffffffffffff, 0x10e, 0x4, 0x0, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)={0x14, 0x23, 0x0, 0x0, 0x0, {0x20000000004, 0xe00000000000000}}, 0x14}}, 0x0) [ 254.935197][T10618] overlayfs: unrecognized mount option "uppFrdir=./file0" or missing value [ 255.026119][T10614] hfsplus: unable to parse mount options [ 255.148757][T10627] hfsplus: unable to parse mount options 11:46:20 executing program 0: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='devtmpfs\x00', 0x0, 0x0) chdir(&(0x7f00000000c0)='./file0\x00') pipe(0x0) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mkdir(0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$overlay(0x40000f, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="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"]) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000240)='cgroup2\x00', 0x0, 0x0) fstat(0xffffffffffffffff, &(0x7f00000008c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000005ec0)={{{@in6=@empty, @in=@local}}, {{@in6=@remote}, 0x0, @in6=@mcast2}}, &(0x7f0000004800)=0xffffffffffffffc3) r2 = geteuid() syz_mount_image$hfsplus(&(0x7f0000000140)='hfsplus\x00', &(0x7f0000000200)='./file0\x00', 0x3, 0x7, &(0x7f0000000800)=[{&(0x7f0000000400)="e1ec051c0b7b96db7480b4620be1f7d4adcb21d5233a3d23bf43659e5359470de231dd734b698cd71201837ca57f911328e1aee6b2cb39533b2d549e", 0x3c, 0x101}, {&(0x7f0000000440)="dbac23926131781587488e056e40b191269651683d0d195cbd63543040e313e20126fd634002e0256fed786d07054466250e2de6b7fb6d7d8d5201ac1478ef26aafeae7947832c4cc7fea6315e92eb81c89a385dae378bf89ca53c6984b5aa79a7dcc139938fa64b30d7c24ff7b215c890be5756df2f441d0fcb938cb4c1f89245a47c630a2b5e28bb7b5a9c8c871c45857bc4fa646b30f485beccdf529ad0cd519a0bed9b5c7df28320d9ad7eceb30eda6c964cfcab57c8aa98b89d582792b886e41c9f6146332e31f93b", 0xcb, 0x1ff}, {&(0x7f0000000540)="5c96cd9925cbe6753ba234c06f8040f650bba8d4d4ebe59964acf97c49f7a5e793521ef728d90a4eb42cbe7a2536c6922f049b20f2c681c652b4dbe077b0a9972e1eeb5573d7ee69d6fc99d4e4894537fac772842763140c5d832bf593a5cc290fd0c641d14d06e564127871808073fb6fd27f2a9995b29abce9351b0b285f4887f1cc8de04d147141af2ed66cfb66fd230e329273710457efc72a8d09487b5c83e77201b28eb38d7d3846b63b1bf1233b5c925303dd3214066c99381b0457a62397c7df27f88e19a884e1dfa6", 0xcd, 0x6}, {&(0x7f0000000640)="8ae3f201063e83beadb088cb1080ef67", 0x10, 0x2a}, {&(0x7f0000000680)="dfeed81fb09a8a0d55f0999ce7730866db77fa306b896464e4d9cf133371563c7eb734eed8ec2dda58c030b96771bb708fba592614b985c573e8f3db424553c6", 0x40, 0x4}, {&(0x7f00000006c0)="f33dec9b5d96888f1504b1385ce82fdf8f2fa76ecc6ebf567753242a4c9129cd4c4885ba8bab1fd3120749889c981acccb344645e9d1ce95826ab7ceac8b7646d2e476e8934ac444aad3bba14f0d4be15675cd3d336db510c72ebbc07a000754d66f5282b1f241556cbd63a30b3d6af0f5c8a2443b03a92bb406abbb5f630ce1ef2afbba93c29e6bc46901a91ea9d91fa6048a468df5934437ca7e9e2a4fe38fddcd2aecac9406aa7adf5de93082ebf1b5c74d76b7b1b72a9b6fea1c5ab7cc1f3e97b5d7e1db9a64df9836ce0863cda956a1e2a45b9479b8ade23e81258e9444dfbf8066562f79", 0xe7, 0x7}, {&(0x7f00000007c0)="cd72eca63713ca8a35c3557b7d56b6a3073ca69e2067c18f5120c05d4ee8", 0x1e, 0x6}], 0x1, &(0x7f0000000a80)={[{@barrier='barrier'}, {@gid={'gid', 0x3d, r0}}, {@nodecompose='nodecompose'}, {@uid={'uid', 0x3d, r2}}, {@type={'type', 0x3d, "ae8c9d8f"}}, {@decompose='decompose'}, {@session={'session', 0x3d, 0x25}}], [{@uid_eq={'uid'}}, {@obj_type={'obj_type', 0x3d, 'overlay\x00'}}, {@euid_eq={'euid'}}, {@uid_eq={'uid'}}]}) 11:46:20 executing program 5: setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) setsockopt$netlink_NETLINK_BROADCAST_ERROR(0xffffffffffffffff, 0x10e, 0x4, 0x0, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)={0x14, 0x23, 0x0, 0x0, 0x0, {0x20000000004, 0xe00000000000000}}, 0x14}}, 0x0) 11:46:20 executing program 4: bind$netlink(0xffffffffffffffff, &(0x7f0000514ff4)={0x10, 0x0, 0x0, 0x2ffffffff}, 0xc) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x8, &(0x7f0000000000), 0x4) setsockopt$netlink_NETLINK_BROADCAST_ERROR(0xffffffffffffffff, 0x10e, 0x4, &(0x7f0000000080)=0x6, 0x4) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)={0x14, 0x23, 0x1, 0x0, 0x0, {0x20000000004, 0xe00000000000000}}, 0x14}}, 0x0) 11:46:20 executing program 3: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='devtmpfs\x00', 0x0, 0x0) chdir(&(0x7f00000000c0)='./file0\x00') pipe(0x0) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mkdir(0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$hfsplus(&(0x7f0000000140)='hfsplus\x00', &(0x7f0000000200)='./file0\x00', 0x3, 0x7, &(0x7f0000000800)=[{&(0x7f0000000400)="e1ec051c0b7b96db7480b4620be1f7d4adcb21d5233a3d23bf43659e5359470de231dd734b698cd71201837ca57f911328e1aee6b2cb39533b2d549e", 0x3c, 0x101}, {&(0x7f0000000440)="dbac23926131781587488e056e40b191269651683d0d195cbd63543040e313e20126fd634002e0256fed786d07054466250e2de6b7fb6d7d8d5201ac1478ef26aafeae7947832c4cc7fea6315e92eb81c89a385dae378bf89ca53c6984b5aa79a7dcc139938fa64b30d7c24ff7b215c890be5756df2f441d0fcb938cb4c1f89245a47c630a2b5e28bb7b5a9c8c871c45857bc4fa646b30f485beccdf529ad0cd519a0bed9b5c7df28320d9ad7eceb30eda6c964cfcab57c8aa98b89d582792b886e41c9f6146332e31f93b", 0xcb, 0x1ff}, {&(0x7f0000000540)="5c96cd9925cbe6753ba234c06f8040f650bba8d4d4ebe59964acf97c49f7a5e793521ef728d90a4eb42cbe7a2536c6922f049b20f2c681c652b4dbe077b0a9972e1eeb5573d7ee69d6fc99d4e4894537fac772842763140c5d832bf593a5cc290fd0c641d14d06e564127871808073fb6fd27f2a9995b29abce9351b0b285f4887f1cc8de04d147141af2ed66cfb66fd230e329273710457efc72a8d09487b5c83e77201b28eb38d7d3846b63b1bf1233b5c925303dd3214066c99381b0457a62397c7df27f88e19a884e1dfa6", 0xcd, 0x6}, {&(0x7f0000000640)="8ae3f201063e83beadb088cb1080ef67", 0x10, 0x2a}, {&(0x7f0000000680)="dfeed81fb09a8a0d55f0999ce7730866db77fa306b896464e4d9cf133371563c7eb734eed8ec2dda58c030b96771bb708fba592614b985c573e8f3db424553c6", 0x40, 0x4}, {&(0x7f00000006c0)="f33dec9b5d96888f1504b1385ce82fdf8f2fa76ecc6ebf567753242a4c9129cd4c4885ba8bab1fd3120749889c981acccb344645e9d1ce95826ab7ceac8b7646d2e476e8934ac444aad3bba14f0d4be15675cd3d336db510c72ebbc07a000754d66f5282b1f241556cbd63a30b3d6af0f5c8a2443b03a92bb406abbb5f630ce1ef2afbba93c29e6bc46901a91ea9d91fa6048a468df5934437ca7e9e2a4fe38fddcd2aecac9406aa7adf5de93082ebf1b5c74d76b7b1b72a9b6fea1c5ab7cc1f3e97b5d7e1db9a64df9836ce0863cda956a1e2a45b9479b8ade23e81258e9444dfbf8066562f79", 0xe7, 0x7}, {&(0x7f00000007c0)="cd72eca63713ca8a35c3557b7d56b6a3073ca69e2067c18f5120c05d4ee8", 0x1e, 0x6}], 0x1, &(0x7f0000000a80)={[{@barrier='barrier'}, {@gid={'gid'}}, {@nodecompose='nodecompose'}, {@uid={'uid'}}, {@type={'type', 0x3d, "ae8c9d8f"}}, {@decompose='decompose'}, {@session={'session', 0x3d, 0x25}}], [{@uid_eq={'uid'}}, {@obj_type={'obj_type', 0x3d, 'overlay\x00'}}, {@euid_eq={'euid'}}, {@uid_eq={'uid'}}]}) 11:46:20 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_FSGETXATTR(0xffffffffffffffff, 0x8004550f, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x1}, 0x10) r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r0, &(0x7f0000000000)={{0x6, @rose}, [@rose, @rose, @default, @netrom, @bcast, @rose, @rose, @null]}, 0x48) r1 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000080)='/dev/qat_adf_ctl\x00', 0x8200, 0x0) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r1, 0x6, 0x23, &(0x7f00000000c0)={&(0x7f0000ffc000/0x4000)=nil, 0x4000}, &(0x7f0000000140)=0x10) listen(r0, 0x0) setrlimit(0x0, 0x0) r2 = accept(r0, 0x0, 0x0) write$binfmt_elf64(r2, &(0x7f00000002c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x9, 0x8, 0x0, 0x0, 0x0, 0x4825483b35c83c0b, 0x0, 0x0, 0x40, 0x227}, [{0x4, 0x1, 0xfff, 0x0, 0x0, 0xff8000000002, 0x0, 0x7fff}], "", [[], [], []]}, 0x378) 11:46:20 executing program 1: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='devtmpfs\x00', 0x0, 0x0) chdir(&(0x7f00000000c0)='./file0\x00') pipe(0x0) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mkdir(0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$overlay(0x40000f, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="75707046726469723d2e2f66696c65302c6c6f7765726469723d2e2f66696c65302c776f726b6469723d2e2f66696c65315c008dd712eb4c4602d39078433581919e8b817a1c09fe8e181081519b7a8259793b8c4b1093736b8d3ef3d64781796455ea1b29412fabd4fd749cbdbadd5d4fa6dad18d59235262aee5928a646acaa5b0b72c4348e1b0a4a52cab8fc461abde196cf60a732d195a64ce881b84bc1c085f990fd4bc2ce47e609a0daa4861948516ca0f519beaea32e38fa09e9b49538a32cce47c620ee6ce668079b8d73f89bfb329c08d9c81fe3c12bf0bf75ac36079bf34fd8eeadf965d333527ebe8ede05feec022e592e9e2e2be551753056d32048241d2b3ee3344aa57e1fe8f604132f549432ccf86af2039192fc4fdddf19ffd0d42de"]) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000240)='cgroup2\x00', 0x0, 0x0) fstat(0xffffffffffffffff, &(0x7f00000008c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000005ec0)={{{@in6=@empty, @in=@local}}, {{@in6=@remote}, 0x0, @in6=@mcast2}}, &(0x7f0000004800)=0xffffffffffffffc3) r2 = geteuid() syz_mount_image$hfsplus(&(0x7f0000000140)='hfsplus\x00', &(0x7f0000000200)='./file0\x00', 0x3, 0x7, &(0x7f0000000800)=[{&(0x7f0000000400)="e1ec051c0b7b96db7480b4620be1f7d4adcb21d5233a3d23bf43659e5359470de231dd734b698cd71201837ca57f911328e1aee6b2cb39533b2d549e", 0x3c, 0x101}, {&(0x7f0000000440)="dbac23926131781587488e056e40b191269651683d0d195cbd63543040e313e20126fd634002e0256fed786d07054466250e2de6b7fb6d7d8d5201ac1478ef26aafeae7947832c4cc7fea6315e92eb81c89a385dae378bf89ca53c6984b5aa79a7dcc139938fa64b30d7c24ff7b215c890be5756df2f441d0fcb938cb4c1f89245a47c630a2b5e28bb7b5a9c8c871c45857bc4fa646b30f485beccdf529ad0cd519a0bed9b5c7df28320d9ad7eceb30eda6c964cfcab57c8aa98b89d582792b886e41c9f6146332e31f93b", 0xcb, 0x1ff}, {&(0x7f0000000540)="5c96cd9925cbe6753ba234c06f8040f650bba8d4d4ebe59964acf97c49f7a5e793521ef728d90a4eb42cbe7a2536c6922f049b20f2c681c652b4dbe077b0a9972e1eeb5573d7ee69d6fc99d4e4894537fac772842763140c5d832bf593a5cc290fd0c641d14d06e564127871808073fb6fd27f2a9995b29abce9351b0b285f4887f1cc8de04d147141af2ed66cfb66fd230e329273710457efc72a8d09487b5c83e77201b28eb38d7d3846b63b1bf1233b5c925303dd3214066c99381b0457a62397c7df27f88e19a884e1dfa6", 0xcd, 0x6}, {&(0x7f0000000640)="8ae3f201063e83beadb088cb1080ef67", 0x10, 0x2a}, {&(0x7f0000000680)="dfeed81fb09a8a0d55f0999ce7730866db77fa306b896464e4d9cf133371563c7eb734eed8ec2dda58c030b96771bb708fba592614b985c573e8f3db424553c6", 0x40, 0x4}, {&(0x7f00000006c0)="f33dec9b5d96888f1504b1385ce82fdf8f2fa76ecc6ebf567753242a4c9129cd4c4885ba8bab1fd3120749889c981acccb344645e9d1ce95826ab7ceac8b7646d2e476e8934ac444aad3bba14f0d4be15675cd3d336db510c72ebbc07a000754d66f5282b1f241556cbd63a30b3d6af0f5c8a2443b03a92bb406abbb5f630ce1ef2afbba93c29e6bc46901a91ea9d91fa6048a468df5934437ca7e9e2a4fe38fddcd2aecac9406aa7adf5de93082ebf1b5c74d76b7b1b72a9b6fea1c5ab7cc1f3e97b5d7e1db9a64df9836ce0863cda956a1e2a45b9479b8ade23e81258e9444dfbf8066562f79", 0xe7, 0x7}, {&(0x7f00000007c0)="cd72eca63713ca8a35c3557b7d56b6a3073ca69e2067c18f5120c05d4ee8", 0x1e, 0x6}], 0x1, &(0x7f0000000a80)={[{@barrier='barrier'}, {@gid={'gid', 0x3d, r0}}, {@nodecompose='nodecompose'}, {@uid={'uid', 0x3d, r2}}, {@type={'type', 0x3d, "ae8c9d8f"}}, {@decompose='decompose'}, {@session={'session', 0x3d, 0x25}}], [{@uid_eq={'uid'}}, {@obj_type={'obj_type', 0x3d, 'overlay\x00'}}, {@euid_eq={'euid'}}, {@uid_eq={'uid'}}]}) 11:46:20 executing program 5: setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) setsockopt$netlink_NETLINK_BROADCAST_ERROR(0xffffffffffffffff, 0x10e, 0x4, 0x0, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)={0x14, 0x23, 0x0, 0x0, 0x0, {0x20000000004, 0xe00000000000000}}, 0x14}}, 0x0) [ 255.480693][T10654] hfsplus: unable to parse mount options [ 255.519905][T10649] overlayfs: unrecognized mount option "uppFrdir=./file0" or missing value 11:46:20 executing program 0: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='devtmpfs\x00', 0x0, 0x0) chdir(&(0x7f00000000c0)='./file0\x00') pipe(0x0) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mkdir(0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$overlay(0x40000f, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="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"]) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000240)='cgroup2\x00', 0x0, 0x0) fstat(0xffffffffffffffff, &(0x7f00000008c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000005ec0)={{{@in6=@empty, @in=@local}}, {{@in6=@remote}, 0x0, @in6=@mcast2}}, &(0x7f0000004800)=0xffffffffffffffc3) syz_mount_image$hfsplus(&(0x7f0000000140)='hfsplus\x00', &(0x7f0000000200)='./file0\x00', 0x3, 0x7, &(0x7f0000000800)=[{&(0x7f0000000400)="e1ec051c0b7b96db7480b4620be1f7d4adcb21d5233a3d23bf43659e5359470de231dd734b698cd71201837ca57f911328e1aee6b2cb39533b2d549e", 0x3c, 0x101}, {&(0x7f0000000440)="dbac23926131781587488e056e40b191269651683d0d195cbd63543040e313e20126fd634002e0256fed786d07054466250e2de6b7fb6d7d8d5201ac1478ef26aafeae7947832c4cc7fea6315e92eb81c89a385dae378bf89ca53c6984b5aa79a7dcc139938fa64b30d7c24ff7b215c890be5756df2f441d0fcb938cb4c1f89245a47c630a2b5e28bb7b5a9c8c871c45857bc4fa646b30f485beccdf529ad0cd519a0bed9b5c7df28320d9ad7eceb30eda6c964cfcab57c8aa98b89d582792b886e41c9f6146332e31f93b", 0xcb, 0x1ff}, {&(0x7f0000000540)="5c96cd9925cbe6753ba234c06f8040f650bba8d4d4ebe59964acf97c49f7a5e793521ef728d90a4eb42cbe7a2536c6922f049b20f2c681c652b4dbe077b0a9972e1eeb5573d7ee69d6fc99d4e4894537fac772842763140c5d832bf593a5cc290fd0c641d14d06e564127871808073fb6fd27f2a9995b29abce9351b0b285f4887f1cc8de04d147141af2ed66cfb66fd230e329273710457efc72a8d09487b5c83e77201b28eb38d7d3846b63b1bf1233b5c925303dd3214066c99381b0457a62397c7df27f88e19a884e1dfa6", 0xcd, 0x6}, {&(0x7f0000000640)="8ae3f201063e83beadb088cb1080ef67", 0x10, 0x2a}, {&(0x7f0000000680)="dfeed81fb09a8a0d55f0999ce7730866db77fa306b896464e4d9cf133371563c7eb734eed8ec2dda58c030b96771bb708fba592614b985c573e8f3db424553c6", 0x40, 0x4}, {&(0x7f00000006c0)="f33dec9b5d96888f1504b1385ce82fdf8f2fa76ecc6ebf567753242a4c9129cd4c4885ba8bab1fd3120749889c981acccb344645e9d1ce95826ab7ceac8b7646d2e476e8934ac444aad3bba14f0d4be15675cd3d336db510c72ebbc07a000754d66f5282b1f241556cbd63a30b3d6af0f5c8a2443b03a92bb406abbb5f630ce1ef2afbba93c29e6bc46901a91ea9d91fa6048a468df5934437ca7e9e2a4fe38fddcd2aecac9406aa7adf5de93082ebf1b5c74d76b7b1b72a9b6fea1c5ab7cc1f3e97b5d7e1db9a64df9836ce0863cda956a1e2a45b9479b8ade23e81258e9444dfbf8066562f79", 0xe7, 0x7}, {&(0x7f00000007c0)="cd72eca63713ca8a35c3557b7d56b6a3073ca69e2067c18f5120c05d4ee8", 0x1e, 0x6}], 0x1, &(0x7f0000000a80)={[{@barrier='barrier'}, {@gid={'gid', 0x3d, r0}}, {@nodecompose='nodecompose'}, {@uid={'uid'}}, {@type={'type', 0x3d, "ae8c9d8f"}}, {@decompose='decompose'}, {@session={'session', 0x3d, 0x25}}], [{@uid_eq={'uid'}}, {@obj_type={'obj_type', 0x3d, 'overlay\x00'}}, {@euid_eq={'euid'}}, {@uid_eq={'uid'}}]}) 11:46:20 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) bind$netlink(r0, &(0x7f0000514ff4)={0x10, 0x0, 0x0, 0x2ffffffff}, 0xc) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000000), 0x4) setsockopt$netlink_NETLINK_BROADCAST_ERROR(r0, 0x10e, 0x4, &(0x7f0000000080)=0x6, 0x4) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)={0x14, 0x23, 0x1, 0x0, 0x0, {0x20000000004, 0xe00000000000000}}, 0x14}}, 0x0) [ 255.705682][T10659] overlayfs: unrecognized mount option "uppFrdir=./file0" or missing value 11:46:20 executing program 5: setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) setsockopt$netlink_NETLINK_BROADCAST_ERROR(0xffffffffffffffff, 0x10e, 0x4, 0x0, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)={0x14, 0x23, 0x1, 0x0, 0x0, {0x0, 0xe00000000000000}}, 0x14}}, 0x0) [ 255.753323][T10663] hfsplus: unable to parse mount options 11:46:20 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_FSGETXATTR(0xffffffffffffffff, 0x8004550f, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x1}, 0x10) r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r0, &(0x7f0000000000)={{0x6, @rose}, [@rose, @rose, @default, @netrom, @bcast, @rose, @rose, @null]}, 0x48) r1 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000080)='/dev/qat_adf_ctl\x00', 0x8200, 0x0) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r1, 0x6, 0x23, &(0x7f00000000c0)={&(0x7f0000ffc000/0x4000)=nil, 0x4000}, &(0x7f0000000140)=0x10) listen(r0, 0x0) setrlimit(0x0, 0x0) r2 = accept(r0, 0x0, 0x0) write$binfmt_elf64(r2, &(0x7f00000002c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x9, 0x8, 0x0, 0x0, 0x0, 0x4825483b35c83c0b, 0x0, 0x0, 0x40, 0x227}, [{0x4, 0x1, 0xfff, 0x0, 0x0, 0xff8000000002, 0x0, 0x7fff}], "", [[], [], []]}, 0x378) [ 255.927578][T10681] overlayfs: unrecognized mount option "uppFrdir=./file0" or missing value 11:46:20 executing program 3: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='devtmpfs\x00', 0x0, 0x0) chdir(&(0x7f00000000c0)='./file0\x00') pipe(0x0) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mkdir(0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$hfsplus(&(0x7f0000000140)='hfsplus\x00', &(0x7f0000000200)='./file0\x00', 0x3, 0x7, &(0x7f0000000800)=[{&(0x7f0000000400)="e1ec051c0b7b96db7480b4620be1f7d4adcb21d5233a3d23bf43659e5359470de231dd734b698cd71201837ca57f911328e1aee6b2cb39533b2d549e", 0x3c, 0x101}, {&(0x7f0000000440)="dbac23926131781587488e056e40b191269651683d0d195cbd63543040e313e20126fd634002e0256fed786d07054466250e2de6b7fb6d7d8d5201ac1478ef26aafeae7947832c4cc7fea6315e92eb81c89a385dae378bf89ca53c6984b5aa79a7dcc139938fa64b30d7c24ff7b215c890be5756df2f441d0fcb938cb4c1f89245a47c630a2b5e28bb7b5a9c8c871c45857bc4fa646b30f485beccdf529ad0cd519a0bed9b5c7df28320d9ad7eceb30eda6c964cfcab57c8aa98b89d582792b886e41c9f6146332e31f93b", 0xcb, 0x1ff}, {&(0x7f0000000540)="5c96cd9925cbe6753ba234c06f8040f650bba8d4d4ebe59964acf97c49f7a5e793521ef728d90a4eb42cbe7a2536c6922f049b20f2c681c652b4dbe077b0a9972e1eeb5573d7ee69d6fc99d4e4894537fac772842763140c5d832bf593a5cc290fd0c641d14d06e564127871808073fb6fd27f2a9995b29abce9351b0b285f4887f1cc8de04d147141af2ed66cfb66fd230e329273710457efc72a8d09487b5c83e77201b28eb38d7d3846b63b1bf1233b5c925303dd3214066c99381b0457a62397c7df27f88e19a884e1dfa6", 0xcd, 0x6}, {&(0x7f0000000640)="8ae3f201063e83beadb088cb1080ef67", 0x10, 0x2a}, {&(0x7f0000000680)="dfeed81fb09a8a0d55f0999ce7730866db77fa306b896464e4d9cf133371563c7eb734eed8ec2dda58c030b96771bb708fba592614b985c573e8f3db424553c6", 0x40, 0x4}, {&(0x7f00000006c0)="f33dec9b5d96888f1504b1385ce82fdf8f2fa76ecc6ebf567753242a4c9129cd4c4885ba8bab1fd3120749889c981acccb344645e9d1ce95826ab7ceac8b7646d2e476e8934ac444aad3bba14f0d4be15675cd3d336db510c72ebbc07a000754d66f5282b1f241556cbd63a30b3d6af0f5c8a2443b03a92bb406abbb5f630ce1ef2afbba93c29e6bc46901a91ea9d91fa6048a468df5934437ca7e9e2a4fe38fddcd2aecac9406aa7adf5de93082ebf1b5c74d76b7b1b72a9b6fea1c5ab7cc1f3e97b5d7e1db9a64df9836ce0863cda956a1e2a45b9479b8ade23e81258e9444dfbf8066562f79", 0xe7, 0x7}, {&(0x7f00000007c0)="cd72eca63713ca8a35c3557b7d56b6a3073ca69e2067c18f5120c05d4ee8", 0x1e, 0x6}], 0x1, &(0x7f0000000a80)={[{@barrier='barrier'}, {@gid={'gid'}}, {@nodecompose='nodecompose'}, {@uid={'uid'}}, {@type={'type', 0x3d, "ae8c9d8f"}}, {@decompose='decompose'}, {@session={'session', 0x3d, 0x25}}], [{@uid_eq={'uid'}}, {@obj_type={'obj_type', 0x3d, 'overlay\x00'}}, {@euid_eq={'euid'}}, {@uid_eq={'uid'}}]}) 11:46:20 executing program 1: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='devtmpfs\x00', 0x0, 0x0) chdir(&(0x7f00000000c0)='./file0\x00') pipe(0x0) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mkdir(0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$overlay(0x40000f, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="75707046726469723d2e2f66696c65302c6c6f7765726469723d2e2f66696c65302c776f726b6469723d2e2f66696c65315c008dd712eb4c4602d39078433581919e8b817a1c09fe8e181081519b7a8259793b8c4b1093736b8d3ef3d64781796455ea1b29412fabd4fd749cbdbadd5d4fa6dad18d59235262aee5928a646acaa5b0b72c4348e1b0a4a52cab8fc461abde196cf60a732d195a64ce881b84bc1c085f990fd4bc2ce47e609a0daa4861948516ca0f519beaea32e38fa09e9b49538a32cce47c620ee6ce668079b8d73f89bfb329c08d9c81fe3c12bf0bf75ac36079bf34fd8eeadf965d333527ebe8ede05feec022e592e9e2e2be551753056d32048241d2b3ee3344aa57e1fe8f604132f549432ccf86af2039192fc4fdddf19ffd0d42de"]) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000240)='cgroup2\x00', 0x0, 0x0) fstat(0xffffffffffffffff, &(0x7f00000008c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000005ec0)={{{@in6=@empty, @in=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@remote}, 0x0, @in6=@mcast2}}, &(0x7f0000004800)=0xffffffffffffffc3) r3 = geteuid() setsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f00000060c0)={{{@in=@remote, @in6=@rand_addr="20bbcbd1865253e3e58aa219d6ca6440", 0x4e21, 0x2400000000000000, 0x4e22, 0x0, 0xa, 0xa0, 0x0, 0x67, r2, r3}, {0x6, 0x183, 0x3, 0x7f, 0x61553a0b, 0x9, 0x1, 0x4}, {0x20, 0x80000001, 0x2000000000001, 0x9}, 0x9, 0x6e6bba, 0x0, 0x0, 0x1, 0x3}, {{@in=@empty, 0x4d3, 0x3c}, 0xa, @in=@loopback, 0x3504, 0x0, 0x3, 0xfffffffffffffffc, 0x1ff, 0x5, 0x6}}, 0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000940)={{{@in6, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@dev}, 0x0, @in6=@local}}, &(0x7f0000000a40)=0xe8) r5 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r5, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") getsockopt$inet_IP_IPSEC_POLICY(r5, 0x0, 0x10, &(0x7f0000005ec0)={{{@in6=@empty, @in=@local}}, {{@in6=@remote}, 0x0, @in6=@mcast2}}, &(0x7f0000004800)=0xffffffffffffffc3) r6 = geteuid() syz_mount_image$hfsplus(&(0x7f0000000140)='hfsplus\x00', &(0x7f0000000200)='./file0\x00', 0x3, 0x7, &(0x7f0000000800)=[{&(0x7f0000000400)="e1ec051c0b7b96db7480b4620be1f7d4adcb21d5233a3d23bf43659e5359470de231dd734b698cd71201837ca57f911328e1aee6b2cb39533b2d549e", 0x3c, 0x101}, {&(0x7f0000000440)="dbac23926131781587488e056e40b191269651683d0d195cbd63543040e313e20126fd634002e0256fed786d07054466250e2de6b7fb6d7d8d5201ac1478ef26aafeae7947832c4cc7fea6315e92eb81c89a385dae378bf89ca53c6984b5aa79a7dcc139938fa64b30d7c24ff7b215c890be5756df2f441d0fcb938cb4c1f89245a47c630a2b5e28bb7b5a9c8c871c45857bc4fa646b30f485beccdf529ad0cd519a0bed9b5c7df28320d9ad7eceb30eda6c964cfcab57c8aa98b89d582792b886e41c9f6146332e31f93b", 0xcb, 0x1ff}, {&(0x7f0000000540)="5c96cd9925cbe6753ba234c06f8040f650bba8d4d4ebe59964acf97c49f7a5e793521ef728d90a4eb42cbe7a2536c6922f049b20f2c681c652b4dbe077b0a9972e1eeb5573d7ee69d6fc99d4e4894537fac772842763140c5d832bf593a5cc290fd0c641d14d06e564127871808073fb6fd27f2a9995b29abce9351b0b285f4887f1cc8de04d147141af2ed66cfb66fd230e329273710457efc72a8d09487b5c83e77201b28eb38d7d3846b63b1bf1233b5c925303dd3214066c99381b0457a62397c7df27f88e19a884e1dfa6", 0xcd, 0x6}, {&(0x7f0000000640)="8ae3f201063e83beadb088cb1080ef67", 0x10, 0x2a}, {&(0x7f0000000680)="dfeed81fb09a8a0d55f0999ce7730866db77fa306b896464e4d9cf133371563c7eb734eed8ec2dda58c030b96771bb708fba592614b985c573e8f3db424553c6", 0x40, 0x4}, {&(0x7f00000006c0)="f33dec9b5d96888f1504b1385ce82fdf8f2fa76ecc6ebf567753242a4c9129cd4c4885ba8bab1fd3120749889c981acccb344645e9d1ce95826ab7ceac8b7646d2e476e8934ac444aad3bba14f0d4be15675cd3d336db510c72ebbc07a000754d66f5282b1f241556cbd63a30b3d6af0f5c8a2443b03a92bb406abbb5f630ce1ef2afbba93c29e6bc46901a91ea9d91fa6048a468df5934437ca7e9e2a4fe38fddcd2aecac9406aa7adf5de93082ebf1b5c74d76b7b1b72a9b6fea1c5ab7cc1f3e97b5d7e1db9a64df9836ce0863cda956a1e2a45b9479b8ade23e81258e9444dfbf8066562f79", 0xe7, 0x7}, {&(0x7f00000007c0)="cd72eca63713ca8a35c3557b7d56b6a3073ca69e2067c18f5120c05d4ee8", 0x1e, 0x6}], 0x1, &(0x7f0000000a80)={[{@barrier='barrier'}, {@gid={'gid', 0x3d, r0}}, {@nodecompose='nodecompose'}, {@uid={'uid', 0x3d, r3}}, {@type={'type', 0x3d, "ae8c9d8f"}}, {@decompose='decompose'}, {@session={'session', 0x3d, 0x25}}], [{@uid_eq={'uid', 0x3d, r4}}, {@obj_type={'obj_type', 0x3d, 'overlay\x00'}}, {@euid_eq={'euid', 0x3d, r6}}, {@uid_eq={'uid'}}]}) 11:46:21 executing program 5: setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) setsockopt$netlink_NETLINK_BROADCAST_ERROR(0xffffffffffffffff, 0x10e, 0x4, 0x0, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)={0x14, 0x23, 0x1, 0x0, 0x0, {0x0, 0xe00000000000000}}, 0x14}}, 0x0) 11:46:21 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) bind$netlink(r0, &(0x7f0000514ff4)={0x10, 0x0, 0x0, 0x2ffffffff}, 0xc) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000000), 0x4) setsockopt$netlink_NETLINK_BROADCAST_ERROR(r0, 0x10e, 0x4, &(0x7f0000000080)=0x6, 0x4) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)={0x14, 0x23, 0x1, 0x0, 0x0, {0x20000000004, 0xe00000000000000}}, 0x14}}, 0x0) [ 256.062699][T10681] hfsplus: unable to parse mount options 11:46:21 executing program 0: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='devtmpfs\x00', 0x0, 0x0) chdir(&(0x7f00000000c0)='./file0\x00') pipe(0x0) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mkdir(0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$overlay(0x40000f, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="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"]) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000240)='cgroup2\x00', 0x0, 0x0) fstat(0xffffffffffffffff, &(0x7f00000008c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000005ec0)={{{@in6=@empty, @in=@local}}, {{@in6=@remote}, 0x0, @in6=@mcast2}}, &(0x7f0000004800)=0xffffffffffffffc3) syz_mount_image$hfsplus(&(0x7f0000000140)='hfsplus\x00', &(0x7f0000000200)='./file0\x00', 0x3, 0x7, &(0x7f0000000800)=[{&(0x7f0000000400)="e1ec051c0b7b96db7480b4620be1f7d4adcb21d5233a3d23bf43659e5359470de231dd734b698cd71201837ca57f911328e1aee6b2cb39533b2d549e", 0x3c, 0x101}, {&(0x7f0000000440)="dbac23926131781587488e056e40b191269651683d0d195cbd63543040e313e20126fd634002e0256fed786d07054466250e2de6b7fb6d7d8d5201ac1478ef26aafeae7947832c4cc7fea6315e92eb81c89a385dae378bf89ca53c6984b5aa79a7dcc139938fa64b30d7c24ff7b215c890be5756df2f441d0fcb938cb4c1f89245a47c630a2b5e28bb7b5a9c8c871c45857bc4fa646b30f485beccdf529ad0cd519a0bed9b5c7df28320d9ad7eceb30eda6c964cfcab57c8aa98b89d582792b886e41c9f6146332e31f93b", 0xcb, 0x1ff}, {&(0x7f0000000540)="5c96cd9925cbe6753ba234c06f8040f650bba8d4d4ebe59964acf97c49f7a5e793521ef728d90a4eb42cbe7a2536c6922f049b20f2c681c652b4dbe077b0a9972e1eeb5573d7ee69d6fc99d4e4894537fac772842763140c5d832bf593a5cc290fd0c641d14d06e564127871808073fb6fd27f2a9995b29abce9351b0b285f4887f1cc8de04d147141af2ed66cfb66fd230e329273710457efc72a8d09487b5c83e77201b28eb38d7d3846b63b1bf1233b5c925303dd3214066c99381b0457a62397c7df27f88e19a884e1dfa6", 0xcd, 0x6}, {&(0x7f0000000640)="8ae3f201063e83beadb088cb1080ef67", 0x10, 0x2a}, {&(0x7f0000000680)="dfeed81fb09a8a0d55f0999ce7730866db77fa306b896464e4d9cf133371563c7eb734eed8ec2dda58c030b96771bb708fba592614b985c573e8f3db424553c6", 0x40, 0x4}, {&(0x7f00000006c0)="f33dec9b5d96888f1504b1385ce82fdf8f2fa76ecc6ebf567753242a4c9129cd4c4885ba8bab1fd3120749889c981acccb344645e9d1ce95826ab7ceac8b7646d2e476e8934ac444aad3bba14f0d4be15675cd3d336db510c72ebbc07a000754d66f5282b1f241556cbd63a30b3d6af0f5c8a2443b03a92bb406abbb5f630ce1ef2afbba93c29e6bc46901a91ea9d91fa6048a468df5934437ca7e9e2a4fe38fddcd2aecac9406aa7adf5de93082ebf1b5c74d76b7b1b72a9b6fea1c5ab7cc1f3e97b5d7e1db9a64df9836ce0863cda956a1e2a45b9479b8ade23e81258e9444dfbf8066562f79", 0xe7, 0x7}, {&(0x7f00000007c0)="cd72eca63713ca8a35c3557b7d56b6a3073ca69e2067c18f5120c05d4ee8", 0x1e, 0x6}], 0x1, &(0x7f0000000a80)={[{@barrier='barrier'}, {@gid={'gid', 0x3d, r0}}, {@nodecompose='nodecompose'}, {@uid={'uid'}}, {@type={'type', 0x3d, "ae8c9d8f"}}, {@decompose='decompose'}, {@session={'session', 0x3d, 0x25}}], [{@uid_eq={'uid'}}, {@obj_type={'obj_type', 0x3d, 'overlay\x00'}}, {@euid_eq={'euid'}}, {@uid_eq={'uid'}}]}) [ 256.242683][T10694] hfsplus: unable to parse mount options 11:46:21 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_FSGETXATTR(0xffffffffffffffff, 0x8004550f, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x1}, 0x10) r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r0, &(0x7f0000000000)={{0x6, @rose}, [@rose, @rose, @default, @netrom, @bcast, @rose, @rose, @null]}, 0x48) r1 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000080)='/dev/qat_adf_ctl\x00', 0x8200, 0x0) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r1, 0x6, 0x23, &(0x7f00000000c0)={&(0x7f0000ffc000/0x4000)=nil, 0x4000}, &(0x7f0000000140)=0x10) unshare(0x40000000) setrlimit(0x0, 0x0) r2 = accept(r0, 0x0, 0x0) write$binfmt_elf64(r2, &(0x7f00000002c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x9, 0x8, 0x0, 0x0, 0x0, 0x4825483b35c83c0b, 0x0, 0x0, 0x40, 0x227}, [{0x4, 0x1, 0xfff, 0x0, 0x0, 0xff8000000002, 0x0, 0x7fff}], "", [[], [], []]}, 0x378) 11:46:21 executing program 5: setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) setsockopt$netlink_NETLINK_BROADCAST_ERROR(0xffffffffffffffff, 0x10e, 0x4, 0x0, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)={0x14, 0x23, 0x1, 0x0, 0x0, {0x0, 0xe00000000000000}}, 0x14}}, 0x0) 11:46:21 executing program 3: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='devtmpfs\x00', 0x0, 0x0) chdir(&(0x7f00000000c0)='./file0\x00') pipe(0x0) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mkdir(0x0, 0x0) syz_mount_image$hfsplus(&(0x7f0000000140)='hfsplus\x00', &(0x7f0000000200)='./file0\x00', 0x3, 0x7, &(0x7f0000000800)=[{&(0x7f0000000400)="e1ec051c0b7b96db7480b4620be1f7d4adcb21d5233a3d23bf43659e5359470de231dd734b698cd71201837ca57f911328e1aee6b2cb39533b2d549e", 0x3c, 0x101}, {&(0x7f0000000440)="dbac23926131781587488e056e40b191269651683d0d195cbd63543040e313e20126fd634002e0256fed786d07054466250e2de6b7fb6d7d8d5201ac1478ef26aafeae7947832c4cc7fea6315e92eb81c89a385dae378bf89ca53c6984b5aa79a7dcc139938fa64b30d7c24ff7b215c890be5756df2f441d0fcb938cb4c1f89245a47c630a2b5e28bb7b5a9c8c871c45857bc4fa646b30f485beccdf529ad0cd519a0bed9b5c7df28320d9ad7eceb30eda6c964cfcab57c8aa98b89d582792b886e41c9f6146332e31f93b", 0xcb, 0x1ff}, {&(0x7f0000000540)="5c96cd9925cbe6753ba234c06f8040f650bba8d4d4ebe59964acf97c49f7a5e793521ef728d90a4eb42cbe7a2536c6922f049b20f2c681c652b4dbe077b0a9972e1eeb5573d7ee69d6fc99d4e4894537fac772842763140c5d832bf593a5cc290fd0c641d14d06e564127871808073fb6fd27f2a9995b29abce9351b0b285f4887f1cc8de04d147141af2ed66cfb66fd230e329273710457efc72a8d09487b5c83e77201b28eb38d7d3846b63b1bf1233b5c925303dd3214066c99381b0457a62397c7df27f88e19a884e1dfa6", 0xcd, 0x6}, {&(0x7f0000000640)="8ae3f201063e83beadb088cb1080ef67", 0x10, 0x2a}, {&(0x7f0000000680)="dfeed81fb09a8a0d55f0999ce7730866db77fa306b896464e4d9cf133371563c7eb734eed8ec2dda58c030b96771bb708fba592614b985c573e8f3db424553c6", 0x40, 0x4}, {&(0x7f00000006c0)="f33dec9b5d96888f1504b1385ce82fdf8f2fa76ecc6ebf567753242a4c9129cd4c4885ba8bab1fd3120749889c981acccb344645e9d1ce95826ab7ceac8b7646d2e476e8934ac444aad3bba14f0d4be15675cd3d336db510c72ebbc07a000754d66f5282b1f241556cbd63a30b3d6af0f5c8a2443b03a92bb406abbb5f630ce1ef2afbba93c29e6bc46901a91ea9d91fa6048a468df5934437ca7e9e2a4fe38fddcd2aecac9406aa7adf5de93082ebf1b5c74d76b7b1b72a9b6fea1c5ab7cc1f3e97b5d7e1db9a64df9836ce0863cda956a1e2a45b9479b8ade23e81258e9444dfbf8066562f79", 0xe7, 0x7}, {&(0x7f00000007c0)="cd72eca63713ca8a35c3557b7d56b6a3073ca69e2067c18f5120c05d4ee8", 0x1e, 0x6}], 0x1, &(0x7f0000000a80)={[{@barrier='barrier'}, {@gid={'gid'}}, {@nodecompose='nodecompose'}, {@uid={'uid'}}, {@type={'type', 0x3d, "ae8c9d8f"}}, {@decompose='decompose'}, {@session={'session', 0x3d, 0x25}}], [{@uid_eq={'uid'}}, {@obj_type={'obj_type', 0x3d, 'overlay\x00'}}, {@euid_eq={'euid'}}, {@uid_eq={'uid'}}]}) [ 256.382788][T10705] overlayfs: unrecognized mount option "uppFrdir=./file0" or missing value 11:46:21 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) bind$netlink(r0, &(0x7f0000514ff4)={0x10, 0x0, 0x0, 0x2ffffffff}, 0xc) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000000), 0x4) setsockopt$netlink_NETLINK_BROADCAST_ERROR(r0, 0x10e, 0x4, &(0x7f0000000080)=0x6, 0x4) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)={0x14, 0x23, 0x1, 0x0, 0x0, {0x20000000004, 0xe00000000000000}}, 0x14}}, 0x0) [ 256.507975][T10710] overlayfs: unrecognized mount option "uppFrdir=./file0" or missing value [ 256.618492][T10722] hfsplus: unable to parse mount options [ 256.636473][T10721] IPVS: ftp: loaded support on port[0] = 21 [ 256.655534][T10728] hfsplus: unable to parse mount options 11:46:21 executing program 5: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='devtmpfs\x00', 0x0, 0x0) chdir(&(0x7f00000000c0)='./file0\x00') pipe(0x0) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mkdir(0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$overlay(0x40000f, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="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"]) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000240)='cgroup2\x00', 0x0, 0x0) fstat(0xffffffffffffffff, &(0x7f00000008c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000005ec0)={{{@in6=@empty, @in=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@remote}, 0x0, @in6=@mcast2}}, &(0x7f0000004800)=0xffffffffffffffc3) r3 = geteuid() setsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f00000060c0)={{{@in=@remote, @in6=@rand_addr="20bbcbd1865253e3e58aa219d6ca6440", 0x4e21, 0x2400000000000000, 0x4e22, 0x0, 0xa, 0xa0, 0x0, 0x67, r2, r3}, {0x6, 0x183, 0x3, 0x7f, 0x61553a0b, 0x9, 0x1, 0x4}, {0x20, 0x80000001, 0x2000000000001, 0x9}, 0x9, 0x6e6bba, 0x0, 0x0, 0x1, 0x3}, {{@in=@empty, 0x4d3, 0x3c}, 0xa, @in=@loopback, 0x3504, 0x0, 0x3, 0xfffffffffffffffc, 0x1ff, 0x5, 0x6}}, 0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000940)={{{@in6, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@dev}, 0x0, @in6=@local}}, &(0x7f0000000a40)=0xe8) r5 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r5, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") getsockopt$inet_IP_IPSEC_POLICY(r5, 0x0, 0x10, &(0x7f0000005ec0)={{{@in6=@empty, @in=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@remote}, 0x0, @in6=@mcast2}}, &(0x7f0000004800)=0xffffffffffffffc3) r7 = geteuid() setsockopt$inet_IP_XFRM_POLICY(r5, 0x0, 0x11, &(0x7f00000060c0)={{{@in=@remote, @in6=@rand_addr="20bbcbd1865253e3e58aa219d6ca6440", 0x4e21, 0x2400000000000000, 0x4e22, 0x0, 0xa, 0xa0, 0x0, 0x67, r6, r7}, {0x6, 0x183, 0x3, 0x7f, 0x61553a0b, 0x9, 0x1, 0x4}, {0x20, 0x80000001, 0x2000000000001, 0x9}, 0x9, 0x6e6bba, 0x0, 0x0, 0x1, 0x3}, {{@in=@empty, 0x4d3, 0x3c}, 0xa, @in=@loopback, 0x3504, 0x0, 0x3, 0xfffffffffffffffc, 0x1ff, 0x5, 0x6}}, 0xe8) r8 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r8, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_mount_image$hfsplus(&(0x7f0000000140)='hfsplus\x00', &(0x7f0000000200)='./file0\x00', 0x3, 0x7, &(0x7f0000000800)=[{&(0x7f0000000400)="e1ec051c0b7b96db7480b4620be1f7d4adcb21d5233a3d23bf43659e5359470de231dd734b698cd71201837ca57f911328e1aee6b2cb39533b2d549e", 0x3c, 0x101}, {&(0x7f0000000440)="dbac23926131781587488e056e40b191269651683d0d195cbd63543040e313e20126fd634002e0256fed786d07054466250e2de6b7fb6d7d8d5201ac1478ef26aafeae7947832c4cc7fea6315e92eb81c89a385dae378bf89ca53c6984b5aa79a7dcc139938fa64b30d7c24ff7b215c890be5756df2f441d0fcb938cb4c1f89245a47c630a2b5e28bb7b5a9c8c871c45857bc4fa646b30f485beccdf529ad0cd519a0bed9b5c7df28320d9ad7eceb30eda6c964cfcab57c8aa98b89d582792b886e41c9f6146332e31f93b", 0xcb, 0x1ff}, {&(0x7f0000000540)="5c96cd9925cbe6753ba234c06f8040f650bba8d4d4ebe59964acf97c49f7a5e793521ef728d90a4eb42cbe7a2536c6922f049b20f2c681c652b4dbe077b0a9972e1eeb5573d7ee69d6fc99d4e4894537fac772842763140c5d832bf593a5cc290fd0c641d14d06e564127871808073fb6fd27f2a9995b29abce9351b0b285f4887f1cc8de04d147141af2ed66cfb66fd230e329273710457efc72a8d09487b5c83e77201b28eb38d7d3846b63b1bf1233b5c925303dd3214066c99381b0457a62397c7df27f88e19a884e1dfa6", 0xcd, 0x6}, {&(0x7f0000000640)="8ae3f201063e83beadb088cb1080ef67", 0x10, 0x2a}, {&(0x7f0000000680)="dfeed81fb09a8a0d55f0999ce7730866db77fa306b896464e4d9cf133371563c7eb734eed8ec2dda58c030b96771bb708fba592614b985c573e8f3db424553c6", 0x40, 0x4}, {&(0x7f00000006c0)="f33dec9b5d96888f1504b1385ce82fdf8f2fa76ecc6ebf567753242a4c9129cd4c4885ba8bab1fd3120749889c981acccb344645e9d1ce95826ab7ceac8b7646d2e476e8934ac444aad3bba14f0d4be15675cd3d336db510c72ebbc07a000754d66f5282b1f241556cbd63a30b3d6af0f5c8a2443b03a92bb406abbb5f630ce1ef2afbba93c29e6bc46901a91ea9d91fa6048a468df5934437ca7e9e2a4fe38fddcd2aecac9406aa7adf5de93082ebf1b5c74d76b7b1b72a9b6fea1c5ab7cc1f3e97b5d7e1db9a64df9836ce0863cda956a1e2a45b9479b8ade23e81258e9444dfbf8066562f79", 0xe7, 0x7}, {&(0x7f00000007c0)="cd72eca63713ca8a35c3557b7d56b6a3073ca69e2067c18f5120c05d4ee8", 0x1e, 0x6}], 0x1, &(0x7f0000000a80)={[{@barrier='barrier'}, {@gid={'gid', 0x3d, r0}}, {@nodecompose='nodecompose'}, {@uid={'uid', 0x3d, r3}}, {@type={'type', 0x3d, "ae8c9d8f"}}, {@decompose='decompose'}, {@session={'session', 0x3d, 0x25}}], [{@uid_eq={'uid', 0x3d, r4}}, {@obj_type={'obj_type', 0x3d, 'overlay\x00'}}, {@euid_eq={'euid', 0x3d, r7}}, {@uid_eq={'uid'}}]}) 11:46:21 executing program 3: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='devtmpfs\x00', 0x0, 0x0) chdir(&(0x7f00000000c0)='./file0\x00') pipe(0x0) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) syz_mount_image$hfsplus(&(0x7f0000000140)='hfsplus\x00', &(0x7f0000000200)='./file0\x00', 0x3, 0x7, &(0x7f0000000800)=[{&(0x7f0000000400)="e1ec051c0b7b96db7480b4620be1f7d4adcb21d5233a3d23bf43659e5359470de231dd734b698cd71201837ca57f911328e1aee6b2cb39533b2d549e", 0x3c, 0x101}, {&(0x7f0000000440)="dbac23926131781587488e056e40b191269651683d0d195cbd63543040e313e20126fd634002e0256fed786d07054466250e2de6b7fb6d7d8d5201ac1478ef26aafeae7947832c4cc7fea6315e92eb81c89a385dae378bf89ca53c6984b5aa79a7dcc139938fa64b30d7c24ff7b215c890be5756df2f441d0fcb938cb4c1f89245a47c630a2b5e28bb7b5a9c8c871c45857bc4fa646b30f485beccdf529ad0cd519a0bed9b5c7df28320d9ad7eceb30eda6c964cfcab57c8aa98b89d582792b886e41c9f6146332e31f93b", 0xcb, 0x1ff}, {&(0x7f0000000540)="5c96cd9925cbe6753ba234c06f8040f650bba8d4d4ebe59964acf97c49f7a5e793521ef728d90a4eb42cbe7a2536c6922f049b20f2c681c652b4dbe077b0a9972e1eeb5573d7ee69d6fc99d4e4894537fac772842763140c5d832bf593a5cc290fd0c641d14d06e564127871808073fb6fd27f2a9995b29abce9351b0b285f4887f1cc8de04d147141af2ed66cfb66fd230e329273710457efc72a8d09487b5c83e77201b28eb38d7d3846b63b1bf1233b5c925303dd3214066c99381b0457a62397c7df27f88e19a884e1dfa6", 0xcd, 0x6}, {&(0x7f0000000640)="8ae3f201063e83beadb088cb1080ef67", 0x10, 0x2a}, {&(0x7f0000000680)="dfeed81fb09a8a0d55f0999ce7730866db77fa306b896464e4d9cf133371563c7eb734eed8ec2dda58c030b96771bb708fba592614b985c573e8f3db424553c6", 0x40, 0x4}, {&(0x7f00000006c0)="f33dec9b5d96888f1504b1385ce82fdf8f2fa76ecc6ebf567753242a4c9129cd4c4885ba8bab1fd3120749889c981acccb344645e9d1ce95826ab7ceac8b7646d2e476e8934ac444aad3bba14f0d4be15675cd3d336db510c72ebbc07a000754d66f5282b1f241556cbd63a30b3d6af0f5c8a2443b03a92bb406abbb5f630ce1ef2afbba93c29e6bc46901a91ea9d91fa6048a468df5934437ca7e9e2a4fe38fddcd2aecac9406aa7adf5de93082ebf1b5c74d76b7b1b72a9b6fea1c5ab7cc1f3e97b5d7e1db9a64df9836ce0863cda956a1e2a45b9479b8ade23e81258e9444dfbf8066562f79", 0xe7, 0x7}, {&(0x7f00000007c0)="cd72eca63713ca8a35c3557b7d56b6a3073ca69e2067c18f5120c05d4ee8", 0x1e, 0x6}], 0x1, &(0x7f0000000a80)={[{@barrier='barrier'}, {@gid={'gid'}}, {@nodecompose='nodecompose'}, {@uid={'uid'}}, {@type={'type', 0x3d, "ae8c9d8f"}}, {@decompose='decompose'}, {@session={'session', 0x3d, 0x25}}], [{@uid_eq={'uid'}}, {@obj_type={'obj_type', 0x3d, 'overlay\x00'}}, {@euid_eq={'euid'}}, {@uid_eq={'uid'}}]}) 11:46:21 executing program 1: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='devtmpfs\x00', 0x0, 0x0) chdir(&(0x7f00000000c0)='./file0\x00') pipe(0x0) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mkdir(0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$overlay(0x40000f, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="75707046726469723d2e2f66696c65302c6c6f7765726469723d2e2f66696c65302c776f726b6469723d2e2f66696c65315c008dd712eb4c4602d39078433581919e8b817a1c09fe8e181081519b7a8259793b8c4b1093736b8d3ef3d64781796455ea1b29412fabd4fd749cbdbadd5d4fa6dad18d59235262aee5928a646acaa5b0b72c4348e1b0a4a52cab8fc461abde196cf60a732d195a64ce881b84bc1c085f990fd4bc2ce47e609a0daa4861948516ca0f519beaea32e38fa09e9b49538a32cce47c620ee6ce668079b8d73f89bfb329c08d9c81fe3c12bf0bf75ac36079bf34fd8eeadf965d333527ebe8ede05feec022e592e9e2e2be551753056d32048241d2b3ee3344aa57e1fe8f604132f549432ccf86af2039192fc4fdddf19ffd0d42de"]) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000240)='cgroup2\x00', 0x0, 0x0) fstat(0xffffffffffffffff, &(0x7f00000008c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000005ec0)={{{@in6=@empty, @in=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@remote}, 0x0, @in6=@mcast2}}, &(0x7f0000004800)=0xffffffffffffffc3) r3 = geteuid() setsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f00000060c0)={{{@in=@remote, @in6=@rand_addr="20bbcbd1865253e3e58aa219d6ca6440", 0x4e21, 0x2400000000000000, 0x4e22, 0x0, 0xa, 0xa0, 0x0, 0x67, r2, r3}, {0x6, 0x183, 0x3, 0x7f, 0x61553a0b, 0x9, 0x1, 0x4}, {0x20, 0x80000001, 0x2000000000001, 0x9}, 0x9, 0x6e6bba, 0x0, 0x0, 0x1, 0x3}, {{@in=@empty, 0x4d3, 0x3c}, 0xa, @in=@loopback, 0x3504, 0x0, 0x3, 0xfffffffffffffffc, 0x1ff, 0x5, 0x6}}, 0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000940)={{{@in6, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@dev}, 0x0, @in6=@local}}, &(0x7f0000000a40)=0xe8) r5 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r5, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") getsockopt$inet_IP_IPSEC_POLICY(r5, 0x0, 0x10, &(0x7f0000005ec0)={{{@in6=@empty, @in=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@remote}, 0x0, @in6=@mcast2}}, &(0x7f0000004800)=0xffffffffffffffc3) r7 = geteuid() setsockopt$inet_IP_XFRM_POLICY(r5, 0x0, 0x11, &(0x7f00000060c0)={{{@in=@remote, @in6=@rand_addr="20bbcbd1865253e3e58aa219d6ca6440", 0x4e21, 0x2400000000000000, 0x4e22, 0x0, 0xa, 0xa0, 0x0, 0x67, r6, r7}, {0x6, 0x183, 0x3, 0x7f, 0x61553a0b, 0x9, 0x1, 0x4}, {0x20, 0x80000001, 0x2000000000001, 0x9}, 0x9, 0x6e6bba, 0x0, 0x0, 0x1, 0x3}, {{@in=@empty, 0x4d3, 0x3c}, 0xa, @in=@loopback, 0x3504, 0x0, 0x3, 0xfffffffffffffffc, 0x1ff, 0x5, 0x6}}, 0xe8) r8 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r8, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_mount_image$hfsplus(&(0x7f0000000140)='hfsplus\x00', &(0x7f0000000200)='./file0\x00', 0x3, 0x7, &(0x7f0000000800)=[{&(0x7f0000000400)="e1ec051c0b7b96db7480b4620be1f7d4adcb21d5233a3d23bf43659e5359470de231dd734b698cd71201837ca57f911328e1aee6b2cb39533b2d549e", 0x3c, 0x101}, {&(0x7f0000000440)="dbac23926131781587488e056e40b191269651683d0d195cbd63543040e313e20126fd634002e0256fed786d07054466250e2de6b7fb6d7d8d5201ac1478ef26aafeae7947832c4cc7fea6315e92eb81c89a385dae378bf89ca53c6984b5aa79a7dcc139938fa64b30d7c24ff7b215c890be5756df2f441d0fcb938cb4c1f89245a47c630a2b5e28bb7b5a9c8c871c45857bc4fa646b30f485beccdf529ad0cd519a0bed9b5c7df28320d9ad7eceb30eda6c964cfcab57c8aa98b89d582792b886e41c9f6146332e31f93b", 0xcb, 0x1ff}, {&(0x7f0000000540)="5c96cd9925cbe6753ba234c06f8040f650bba8d4d4ebe59964acf97c49f7a5e793521ef728d90a4eb42cbe7a2536c6922f049b20f2c681c652b4dbe077b0a9972e1eeb5573d7ee69d6fc99d4e4894537fac772842763140c5d832bf593a5cc290fd0c641d14d06e564127871808073fb6fd27f2a9995b29abce9351b0b285f4887f1cc8de04d147141af2ed66cfb66fd230e329273710457efc72a8d09487b5c83e77201b28eb38d7d3846b63b1bf1233b5c925303dd3214066c99381b0457a62397c7df27f88e19a884e1dfa6", 0xcd, 0x6}, {&(0x7f0000000640)="8ae3f201063e83beadb088cb1080ef67", 0x10, 0x2a}, {&(0x7f0000000680)="dfeed81fb09a8a0d55f0999ce7730866db77fa306b896464e4d9cf133371563c7eb734eed8ec2dda58c030b96771bb708fba592614b985c573e8f3db424553c6", 0x40, 0x4}, {&(0x7f00000006c0)="f33dec9b5d96888f1504b1385ce82fdf8f2fa76ecc6ebf567753242a4c9129cd4c4885ba8bab1fd3120749889c981acccb344645e9d1ce95826ab7ceac8b7646d2e476e8934ac444aad3bba14f0d4be15675cd3d336db510c72ebbc07a000754d66f5282b1f241556cbd63a30b3d6af0f5c8a2443b03a92bb406abbb5f630ce1ef2afbba93c29e6bc46901a91ea9d91fa6048a468df5934437ca7e9e2a4fe38fddcd2aecac9406aa7adf5de93082ebf1b5c74d76b7b1b72a9b6fea1c5ab7cc1f3e97b5d7e1db9a64df9836ce0863cda956a1e2a45b9479b8ade23e81258e9444dfbf8066562f79", 0xe7, 0x7}, {&(0x7f00000007c0)="cd72eca63713ca8a35c3557b7d56b6a3073ca69e2067c18f5120c05d4ee8", 0x1e, 0x6}], 0x1, &(0x7f0000000a80)={[{@barrier='barrier'}, {@gid={'gid', 0x3d, r0}}, {@nodecompose='nodecompose'}, {@uid={'uid', 0x3d, r3}}, {@type={'type', 0x3d, "ae8c9d8f"}}, {@decompose='decompose'}, {@session={'session', 0x3d, 0x25}}], [{@uid_eq={'uid', 0x3d, r4}}, {@obj_type={'obj_type', 0x3d, 'overlay\x00'}}, {@euid_eq={'euid', 0x3d, r7}}, {@uid_eq={'uid'}}]}) 11:46:21 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_FSGETXATTR(0xffffffffffffffff, 0x8004550f, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x1}, 0x10) r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r0, &(0x7f0000000000)={{0x6, @rose}, [@rose, @rose, @default, @netrom, @bcast, @rose, @rose, @null]}, 0x48) r1 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000080)='/dev/qat_adf_ctl\x00', 0x8200, 0x0) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r1, 0x6, 0x23, &(0x7f00000000c0)={&(0x7f0000ffc000/0x4000)=nil, 0x4000}, &(0x7f0000000140)=0x10) unshare(0x40000000) setrlimit(0x0, 0x0) r2 = accept(r0, 0x0, 0x0) write$binfmt_elf64(r2, &(0x7f00000002c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x9, 0x8, 0x0, 0x0, 0x0, 0x4825483b35c83c0b, 0x0, 0x0, 0x40, 0x227}, [{0x4, 0x1, 0xfff, 0x0, 0x0, 0xff8000000002, 0x0, 0x7fff}], "", [[], [], []]}, 0x378) 11:46:21 executing program 4: r0 = socket$netlink(0x10, 0x3, 0xf) bind$netlink(0xffffffffffffffff, &(0x7f0000514ff4)={0x10, 0x0, 0x0, 0x2ffffffff}, 0xc) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000000), 0x4) setsockopt$netlink_NETLINK_BROADCAST_ERROR(r0, 0x10e, 0x4, &(0x7f0000000080)=0x6, 0x4) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)={0x14, 0x23, 0x1, 0x0, 0x0, {0x20000000004, 0xe00000000000000}}, 0x14}}, 0x0) [ 256.965515][T10743] hfsplus: unable to parse mount options [ 256.993482][T10741] overlayfs: unrecognized mount option "uppFrdir=./file0" or missing value [ 257.001742][T10745] overlayfs: unrecognized mount option "uppFrdir=./file0" or missing value [ 257.154659][T10755] IPVS: ftp: loaded support on port[0] = 21 11:46:22 executing program 0: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='devtmpfs\x00', 0x0, 0x0) chdir(&(0x7f00000000c0)='./file0\x00') pipe(0x0) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mkdir(0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$overlay(0x40000f, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="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"]) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000240)='cgroup2\x00', 0x0, 0x0) fstat(0xffffffffffffffff, &(0x7f00000008c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_mount_image$hfsplus(&(0x7f0000000140)='hfsplus\x00', &(0x7f0000000200)='./file0\x00', 0x3, 0x7, &(0x7f0000000800)=[{&(0x7f0000000400)="e1ec051c0b7b96db7480b4620be1f7d4adcb21d5233a3d23bf43659e5359470de231dd734b698cd71201837ca57f911328e1aee6b2cb39533b2d549e", 0x3c, 0x101}, {&(0x7f0000000440)="dbac23926131781587488e056e40b191269651683d0d195cbd63543040e313e20126fd634002e0256fed786d07054466250e2de6b7fb6d7d8d5201ac1478ef26aafeae7947832c4cc7fea6315e92eb81c89a385dae378bf89ca53c6984b5aa79a7dcc139938fa64b30d7c24ff7b215c890be5756df2f441d0fcb938cb4c1f89245a47c630a2b5e28bb7b5a9c8c871c45857bc4fa646b30f485beccdf529ad0cd519a0bed9b5c7df28320d9ad7eceb30eda6c964cfcab57c8aa98b89d582792b886e41c9f6146332e31f93b", 0xcb, 0x1ff}, {&(0x7f0000000540)="5c96cd9925cbe6753ba234c06f8040f650bba8d4d4ebe59964acf97c49f7a5e793521ef728d90a4eb42cbe7a2536c6922f049b20f2c681c652b4dbe077b0a9972e1eeb5573d7ee69d6fc99d4e4894537fac772842763140c5d832bf593a5cc290fd0c641d14d06e564127871808073fb6fd27f2a9995b29abce9351b0b285f4887f1cc8de04d147141af2ed66cfb66fd230e329273710457efc72a8d09487b5c83e77201b28eb38d7d3846b63b1bf1233b5c925303dd3214066c99381b0457a62397c7df27f88e19a884e1dfa6", 0xcd, 0x6}, {&(0x7f0000000640)="8ae3f201063e83beadb088cb1080ef67", 0x10, 0x2a}, {&(0x7f0000000680)="dfeed81fb09a8a0d55f0999ce7730866db77fa306b896464e4d9cf133371563c7eb734eed8ec2dda58c030b96771bb708fba592614b985c573e8f3db424553c6", 0x40, 0x4}, {&(0x7f00000006c0)="f33dec9b5d96888f1504b1385ce82fdf8f2fa76ecc6ebf567753242a4c9129cd4c4885ba8bab1fd3120749889c981acccb344645e9d1ce95826ab7ceac8b7646d2e476e8934ac444aad3bba14f0d4be15675cd3d336db510c72ebbc07a000754d66f5282b1f241556cbd63a30b3d6af0f5c8a2443b03a92bb406abbb5f630ce1ef2afbba93c29e6bc46901a91ea9d91fa6048a468df5934437ca7e9e2a4fe38fddcd2aecac9406aa7adf5de93082ebf1b5c74d76b7b1b72a9b6fea1c5ab7cc1f3e97b5d7e1db9a64df9836ce0863cda956a1e2a45b9479b8ade23e81258e9444dfbf8066562f79", 0xe7, 0x7}, {&(0x7f00000007c0)="cd72eca63713ca8a35c3557b7d56b6a3073ca69e2067c18f5120c05d4ee8", 0x1e, 0x6}], 0x1, &(0x7f0000000a80)={[{@barrier='barrier'}, {@gid={'gid', 0x3d, r0}}, {@nodecompose='nodecompose'}, {@uid={'uid'}}, {@type={'type', 0x3d, "ae8c9d8f"}}, {@decompose='decompose'}, {@session={'session', 0x3d, 0x25}}], [{@uid_eq={'uid'}}, {@obj_type={'obj_type', 0x3d, 'overlay\x00'}}, {@euid_eq={'euid'}}, {@uid_eq={'uid'}}]}) 11:46:22 executing program 1: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='devtmpfs\x00', 0x0, 0x0) chdir(&(0x7f00000000c0)='./file0\x00') pipe(0x0) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mkdir(0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$overlay(0x40000f, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="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"]) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000240)='cgroup2\x00', 0x0, 0x0) fstat(0xffffffffffffffff, &(0x7f00000008c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000005ec0)={{{@in6=@empty, @in=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@remote}, 0x0, @in6=@mcast2}}, &(0x7f0000004800)=0xffffffffffffffc3) r3 = geteuid() setsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f00000060c0)={{{@in=@remote, @in6=@rand_addr="20bbcbd1865253e3e58aa219d6ca6440", 0x4e21, 0x2400000000000000, 0x4e22, 0x0, 0xa, 0xa0, 0x0, 0x67, r2, r3}, {0x6, 0x183, 0x3, 0x7f, 0x61553a0b, 0x9, 0x1, 0x4}, {0x20, 0x80000001, 0x2000000000001, 0x9}, 0x9, 0x6e6bba, 0x0, 0x0, 0x1, 0x3}, {{@in=@empty, 0x4d3, 0x3c}, 0xa, @in=@loopback, 0x3504, 0x0, 0x3, 0xfffffffffffffffc, 0x1ff, 0x5, 0x6}}, 0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000940)={{{@in6, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@dev}, 0x0, @in6=@local}}, &(0x7f0000000a40)=0xe8) r5 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r5, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") getsockopt$inet_IP_IPSEC_POLICY(r5, 0x0, 0x10, &(0x7f0000005ec0)={{{@in6=@empty, @in=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@remote}, 0x0, @in6=@mcast2}}, &(0x7f0000004800)=0xffffffffffffffc3) r7 = geteuid() setsockopt$inet_IP_XFRM_POLICY(r5, 0x0, 0x11, &(0x7f00000060c0)={{{@in=@remote, @in6=@rand_addr="20bbcbd1865253e3e58aa219d6ca6440", 0x4e21, 0x2400000000000000, 0x4e22, 0x0, 0xa, 0xa0, 0x0, 0x67, r6, r7}, {0x6, 0x183, 0x3, 0x7f, 0x61553a0b, 0x9, 0x1, 0x4}, {0x20, 0x80000001, 0x2000000000001, 0x9}, 0x9, 0x6e6bba, 0x0, 0x0, 0x1, 0x3}, {{@in=@empty, 0x4d3, 0x3c}, 0xa, @in=@loopback, 0x3504, 0x0, 0x3, 0xfffffffffffffffc, 0x1ff, 0x5, 0x6}}, 0xe8) r8 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r8, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") getsockopt$inet_IP_IPSEC_POLICY(r8, 0x0, 0x10, &(0x7f0000005ec0)={{{@in6=@empty, @in=@local}}, {{@in6=@remote}, 0x0, @in6=@mcast2}}, &(0x7f0000004800)=0xffffffffffffffc3) syz_mount_image$hfsplus(&(0x7f0000000140)='hfsplus\x00', &(0x7f0000000200)='./file0\x00', 0x3, 0x7, &(0x7f0000000800)=[{&(0x7f0000000400)="e1ec051c0b7b96db7480b4620be1f7d4adcb21d5233a3d23bf43659e5359470de231dd734b698cd71201837ca57f911328e1aee6b2cb39533b2d549e", 0x3c, 0x101}, {&(0x7f0000000440)="dbac23926131781587488e056e40b191269651683d0d195cbd63543040e313e20126fd634002e0256fed786d07054466250e2de6b7fb6d7d8d5201ac1478ef26aafeae7947832c4cc7fea6315e92eb81c89a385dae378bf89ca53c6984b5aa79a7dcc139938fa64b30d7c24ff7b215c890be5756df2f441d0fcb938cb4c1f89245a47c630a2b5e28bb7b5a9c8c871c45857bc4fa646b30f485beccdf529ad0cd519a0bed9b5c7df28320d9ad7eceb30eda6c964cfcab57c8aa98b89d582792b886e41c9f6146332e31f93b", 0xcb, 0x1ff}, {&(0x7f0000000540)="5c96cd9925cbe6753ba234c06f8040f650bba8d4d4ebe59964acf97c49f7a5e793521ef728d90a4eb42cbe7a2536c6922f049b20f2c681c652b4dbe077b0a9972e1eeb5573d7ee69d6fc99d4e4894537fac772842763140c5d832bf593a5cc290fd0c641d14d06e564127871808073fb6fd27f2a9995b29abce9351b0b285f4887f1cc8de04d147141af2ed66cfb66fd230e329273710457efc72a8d09487b5c83e77201b28eb38d7d3846b63b1bf1233b5c925303dd3214066c99381b0457a62397c7df27f88e19a884e1dfa6", 0xcd, 0x6}, {&(0x7f0000000640)="8ae3f201063e83beadb088cb1080ef67", 0x10, 0x2a}, {&(0x7f0000000680)="dfeed81fb09a8a0d55f0999ce7730866db77fa306b896464e4d9cf133371563c7eb734eed8ec2dda58c030b96771bb708fba592614b985c573e8f3db424553c6", 0x40, 0x4}, {&(0x7f00000006c0)="f33dec9b5d96888f1504b1385ce82fdf8f2fa76ecc6ebf567753242a4c9129cd4c4885ba8bab1fd3120749889c981acccb344645e9d1ce95826ab7ceac8b7646d2e476e8934ac444aad3bba14f0d4be15675cd3d336db510c72ebbc07a000754d66f5282b1f241556cbd63a30b3d6af0f5c8a2443b03a92bb406abbb5f630ce1ef2afbba93c29e6bc46901a91ea9d91fa6048a468df5934437ca7e9e2a4fe38fddcd2aecac9406aa7adf5de93082ebf1b5c74d76b7b1b72a9b6fea1c5ab7cc1f3e97b5d7e1db9a64df9836ce0863cda956a1e2a45b9479b8ade23e81258e9444dfbf8066562f79", 0xe7, 0x7}, {&(0x7f00000007c0)="cd72eca63713ca8a35c3557b7d56b6a3073ca69e2067c18f5120c05d4ee8", 0x1e, 0x6}], 0x1, &(0x7f0000000a80)={[{@barrier='barrier'}, {@gid={'gid', 0x3d, r0}}, {@nodecompose='nodecompose'}, {@uid={'uid', 0x3d, r3}}, {@type={'type', 0x3d, "ae8c9d8f"}}, {@decompose='decompose'}, {@session={'session', 0x3d, 0x25}}], [{@uid_eq={'uid', 0x3d, r4}}, {@obj_type={'obj_type', 0x3d, 'overlay\x00'}}, {@euid_eq={'euid', 0x3d, r7}}, {@uid_eq={'uid'}}]}) 11:46:22 executing program 3: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='devtmpfs\x00', 0x0, 0x0) chdir(&(0x7f00000000c0)='./file0\x00') pipe(0x0) syz_mount_image$hfsplus(&(0x7f0000000140)='hfsplus\x00', &(0x7f0000000200)='./file0\x00', 0x3, 0x7, &(0x7f0000000800)=[{&(0x7f0000000400)="e1ec051c0b7b96db7480b4620be1f7d4adcb21d5233a3d23bf43659e5359470de231dd734b698cd71201837ca57f911328e1aee6b2cb39533b2d549e", 0x3c, 0x101}, {&(0x7f0000000440)="dbac23926131781587488e056e40b191269651683d0d195cbd63543040e313e20126fd634002e0256fed786d07054466250e2de6b7fb6d7d8d5201ac1478ef26aafeae7947832c4cc7fea6315e92eb81c89a385dae378bf89ca53c6984b5aa79a7dcc139938fa64b30d7c24ff7b215c890be5756df2f441d0fcb938cb4c1f89245a47c630a2b5e28bb7b5a9c8c871c45857bc4fa646b30f485beccdf529ad0cd519a0bed9b5c7df28320d9ad7eceb30eda6c964cfcab57c8aa98b89d582792b886e41c9f6146332e31f93b", 0xcb, 0x1ff}, {&(0x7f0000000540)="5c96cd9925cbe6753ba234c06f8040f650bba8d4d4ebe59964acf97c49f7a5e793521ef728d90a4eb42cbe7a2536c6922f049b20f2c681c652b4dbe077b0a9972e1eeb5573d7ee69d6fc99d4e4894537fac772842763140c5d832bf593a5cc290fd0c641d14d06e564127871808073fb6fd27f2a9995b29abce9351b0b285f4887f1cc8de04d147141af2ed66cfb66fd230e329273710457efc72a8d09487b5c83e77201b28eb38d7d3846b63b1bf1233b5c925303dd3214066c99381b0457a62397c7df27f88e19a884e1dfa6", 0xcd, 0x6}, {&(0x7f0000000640)="8ae3f201063e83beadb088cb1080ef67", 0x10, 0x2a}, {&(0x7f0000000680)="dfeed81fb09a8a0d55f0999ce7730866db77fa306b896464e4d9cf133371563c7eb734eed8ec2dda58c030b96771bb708fba592614b985c573e8f3db424553c6", 0x40, 0x4}, {&(0x7f00000006c0)="f33dec9b5d96888f1504b1385ce82fdf8f2fa76ecc6ebf567753242a4c9129cd4c4885ba8bab1fd3120749889c981acccb344645e9d1ce95826ab7ceac8b7646d2e476e8934ac444aad3bba14f0d4be15675cd3d336db510c72ebbc07a000754d66f5282b1f241556cbd63a30b3d6af0f5c8a2443b03a92bb406abbb5f630ce1ef2afbba93c29e6bc46901a91ea9d91fa6048a468df5934437ca7e9e2a4fe38fddcd2aecac9406aa7adf5de93082ebf1b5c74d76b7b1b72a9b6fea1c5ab7cc1f3e97b5d7e1db9a64df9836ce0863cda956a1e2a45b9479b8ade23e81258e9444dfbf8066562f79", 0xe7, 0x7}, {&(0x7f00000007c0)="cd72eca63713ca8a35c3557b7d56b6a3073ca69e2067c18f5120c05d4ee8", 0x1e, 0x6}], 0x1, &(0x7f0000000a80)={[{@barrier='barrier'}, {@gid={'gid'}}, {@nodecompose='nodecompose'}, {@uid={'uid'}}, {@type={'type', 0x3d, "ae8c9d8f"}}, {@decompose='decompose'}, {@session={'session', 0x3d, 0x25}}], [{@uid_eq={'uid'}}, {@obj_type={'obj_type', 0x3d, 'overlay\x00'}}, {@euid_eq={'euid'}}, {@uid_eq={'uid'}}]}) [ 257.273400][T10741] hfsplus: unable to parse mount options [ 257.303313][T10763] overlayfs: unrecognized mount option "uppFrdir=./file0" or missing value 11:46:22 executing program 4: r0 = socket$netlink(0x10, 0x3, 0xf) bind$netlink(0xffffffffffffffff, &(0x7f0000514ff4)={0x10, 0x0, 0x0, 0x2ffffffff}, 0xc) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000000), 0x4) setsockopt$netlink_NETLINK_BROADCAST_ERROR(r0, 0x10e, 0x4, &(0x7f0000000080)=0x6, 0x4) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)={0x14, 0x23, 0x1, 0x0, 0x0, {0x20000000004, 0xe00000000000000}}, 0x14}}, 0x0) [ 257.432459][T10763] hfsplus: unable to parse mount options [ 257.553463][T10772] hfsplus: unable to parse mount options [ 257.564706][T10775] overlayfs: unrecognized mount option "uppFrdir=./file0" or missing value 11:46:22 executing program 3: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='devtmpfs\x00', 0x0, 0x0) chdir(&(0x7f00000000c0)='./file0\x00') syz_mount_image$hfsplus(&(0x7f0000000140)='hfsplus\x00', &(0x7f0000000200)='./file0\x00', 0x3, 0x7, &(0x7f0000000800)=[{&(0x7f0000000400)="e1ec051c0b7b96db7480b4620be1f7d4adcb21d5233a3d23bf43659e5359470de231dd734b698cd71201837ca57f911328e1aee6b2cb39533b2d549e", 0x3c, 0x101}, {&(0x7f0000000440)="dbac23926131781587488e056e40b191269651683d0d195cbd63543040e313e20126fd634002e0256fed786d07054466250e2de6b7fb6d7d8d5201ac1478ef26aafeae7947832c4cc7fea6315e92eb81c89a385dae378bf89ca53c6984b5aa79a7dcc139938fa64b30d7c24ff7b215c890be5756df2f441d0fcb938cb4c1f89245a47c630a2b5e28bb7b5a9c8c871c45857bc4fa646b30f485beccdf529ad0cd519a0bed9b5c7df28320d9ad7eceb30eda6c964cfcab57c8aa98b89d582792b886e41c9f6146332e31f93b", 0xcb, 0x1ff}, {&(0x7f0000000540)="5c96cd9925cbe6753ba234c06f8040f650bba8d4d4ebe59964acf97c49f7a5e793521ef728d90a4eb42cbe7a2536c6922f049b20f2c681c652b4dbe077b0a9972e1eeb5573d7ee69d6fc99d4e4894537fac772842763140c5d832bf593a5cc290fd0c641d14d06e564127871808073fb6fd27f2a9995b29abce9351b0b285f4887f1cc8de04d147141af2ed66cfb66fd230e329273710457efc72a8d09487b5c83e77201b28eb38d7d3846b63b1bf1233b5c925303dd3214066c99381b0457a62397c7df27f88e19a884e1dfa6", 0xcd, 0x6}, {&(0x7f0000000640)="8ae3f201063e83beadb088cb1080ef67", 0x10, 0x2a}, {&(0x7f0000000680)="dfeed81fb09a8a0d55f0999ce7730866db77fa306b896464e4d9cf133371563c7eb734eed8ec2dda58c030b96771bb708fba592614b985c573e8f3db424553c6", 0x40, 0x4}, {&(0x7f00000006c0)="f33dec9b5d96888f1504b1385ce82fdf8f2fa76ecc6ebf567753242a4c9129cd4c4885ba8bab1fd3120749889c981acccb344645e9d1ce95826ab7ceac8b7646d2e476e8934ac444aad3bba14f0d4be15675cd3d336db510c72ebbc07a000754d66f5282b1f241556cbd63a30b3d6af0f5c8a2443b03a92bb406abbb5f630ce1ef2afbba93c29e6bc46901a91ea9d91fa6048a468df5934437ca7e9e2a4fe38fddcd2aecac9406aa7adf5de93082ebf1b5c74d76b7b1b72a9b6fea1c5ab7cc1f3e97b5d7e1db9a64df9836ce0863cda956a1e2a45b9479b8ade23e81258e9444dfbf8066562f79", 0xe7, 0x7}, {&(0x7f00000007c0)="cd72eca63713ca8a35c3557b7d56b6a3073ca69e2067c18f5120c05d4ee8", 0x1e, 0x6}], 0x1, &(0x7f0000000a80)={[{@barrier='barrier'}, {@gid={'gid'}}, {@nodecompose='nodecompose'}, {@uid={'uid'}}, {@type={'type', 0x3d, "ae8c9d8f"}}, {@decompose='decompose'}, {@session={'session', 0x3d, 0x25}}], [{@uid_eq={'uid'}}, {@obj_type={'obj_type', 0x3d, 'overlay\x00'}}, {@euid_eq={'euid'}}, {@uid_eq={'uid'}}]}) 11:46:22 executing program 4: r0 = socket$netlink(0x10, 0x3, 0xf) bind$netlink(0xffffffffffffffff, &(0x7f0000514ff4)={0x10, 0x0, 0x0, 0x2ffffffff}, 0xc) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000000), 0x4) setsockopt$netlink_NETLINK_BROADCAST_ERROR(r0, 0x10e, 0x4, &(0x7f0000000080)=0x6, 0x4) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)={0x14, 0x23, 0x1, 0x0, 0x0, {0x20000000004, 0xe00000000000000}}, 0x14}}, 0x0) 11:46:22 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_FSGETXATTR(0xffffffffffffffff, 0x8004550f, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x1}, 0x10) r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r0, &(0x7f0000000000)={{0x6, @rose}, [@rose, @rose, @default, @netrom, @bcast, @rose, @rose, @null]}, 0x48) r1 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000080)='/dev/qat_adf_ctl\x00', 0x8200, 0x0) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r1, 0x6, 0x23, &(0x7f00000000c0)={&(0x7f0000ffc000/0x4000)=nil, 0x4000}, &(0x7f0000000140)=0x10) unshare(0x40000000) setrlimit(0x0, 0x0) r2 = accept(r0, 0x0, 0x0) write$binfmt_elf64(r2, &(0x7f00000002c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x9, 0x8, 0x0, 0x0, 0x0, 0x4825483b35c83c0b, 0x0, 0x0, 0x40, 0x227}, [{0x4, 0x1, 0xfff, 0x0, 0x0, 0xff8000000002, 0x0, 0x7fff}], "", [[], [], []]}, 0x378) 11:46:22 executing program 1: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='devtmpfs\x00', 0x0, 0x0) chdir(&(0x7f00000000c0)='./file0\x00') pipe(0x0) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mkdir(0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$overlay(0x40000f, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="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"]) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000240)='cgroup2\x00', 0x0, 0x0) fstat(0xffffffffffffffff, &(0x7f00000008c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_mount_image$hfsplus(&(0x7f0000000140)='hfsplus\x00', &(0x7f0000000200)='./file0\x00', 0x3, 0x7, &(0x7f0000000800)=[{&(0x7f0000000400)="e1ec051c0b7b96db7480b4620be1f7d4adcb21d5233a3d23bf43659e5359470de231dd734b698cd71201837ca57f911328e1aee6b2cb39533b2d549e", 0x3c, 0x101}, {&(0x7f0000000440)="dbac23926131781587488e056e40b191269651683d0d195cbd63543040e313e20126fd634002e0256fed786d07054466250e2de6b7fb6d7d8d5201ac1478ef26aafeae7947832c4cc7fea6315e92eb81c89a385dae378bf89ca53c6984b5aa79a7dcc139938fa64b30d7c24ff7b215c890be5756df2f441d0fcb938cb4c1f89245a47c630a2b5e28bb7b5a9c8c871c45857bc4fa646b30f485beccdf529ad0cd519a0bed9b5c7df28320d9ad7eceb30eda6c964cfcab57c8aa98b89d582792b886e41c9f6146332e31f93b", 0xcb, 0x1ff}, {&(0x7f0000000540)="5c96cd9925cbe6753ba234c06f8040f650bba8d4d4ebe59964acf97c49f7a5e793521ef728d90a4eb42cbe7a2536c6922f049b20f2c681c652b4dbe077b0a9972e1eeb5573d7ee69d6fc99d4e4894537fac772842763140c5d832bf593a5cc290fd0c641d14d06e564127871808073fb6fd27f2a9995b29abce9351b0b285f4887f1cc8de04d147141af2ed66cfb66fd230e329273710457efc72a8d09487b5c83e77201b28eb38d7d3846b63b1bf1233b5c925303dd3214066c99381b0457a62397c7df27f88e19a884e1dfa6", 0xcd, 0x6}, {&(0x7f0000000640)="8ae3f201063e83beadb088cb1080ef67", 0x10, 0x2a}, {&(0x7f0000000680)="dfeed81fb09a8a0d55f0999ce7730866db77fa306b896464e4d9cf133371563c7eb734eed8ec2dda58c030b96771bb708fba592614b985c573e8f3db424553c6", 0x40, 0x4}, {&(0x7f00000006c0)="f33dec9b5d96888f1504b1385ce82fdf8f2fa76ecc6ebf567753242a4c9129cd4c4885ba8bab1fd3120749889c981acccb344645e9d1ce95826ab7ceac8b7646d2e476e8934ac444aad3bba14f0d4be15675cd3d336db510c72ebbc07a000754d66f5282b1f241556cbd63a30b3d6af0f5c8a2443b03a92bb406abbb5f630ce1ef2afbba93c29e6bc46901a91ea9d91fa6048a468df5934437ca7e9e2a4fe38fddcd2aecac9406aa7adf5de93082ebf1b5c74d76b7b1b72a9b6fea1c5ab7cc1f3e97b5d7e1db9a64df9836ce0863cda956a1e2a45b9479b8ade23e81258e9444dfbf8066562f79", 0xe7, 0x7}, {&(0x7f00000007c0)="cd72eca63713ca8a35c3557b7d56b6a3073ca69e2067c18f5120c05d4ee8", 0x1e, 0x6}], 0x1, &(0x7f0000000a80)={[{@barrier='barrier'}, {@gid={'gid', 0x3d, r0}}, {@nodecompose='nodecompose'}, {@uid={'uid'}}, {@type={'type', 0x3d, "ae8c9d8f"}}, {@decompose='decompose'}, {@session={'session', 0x3d, 0x25}}], [{@uid_eq={'uid'}}, {@obj_type={'obj_type', 0x3d, 'overlay\x00'}}, {@euid_eq={'euid'}}, {@uid_eq={'uid'}}]}) 11:46:22 executing program 5: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='devtmpfs\x00', 0x0, 0x0) chdir(&(0x7f00000000c0)='./file0\x00') pipe(0x0) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mkdir(0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$overlay(0x40000f, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="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"]) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000240)='cgroup2\x00', 0x0, 0x0) fstat(0xffffffffffffffff, &(0x7f00000008c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000005ec0)={{{@in6=@empty, @in=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@remote}, 0x0, @in6=@mcast2}}, &(0x7f0000004800)=0xffffffffffffffc3) r3 = geteuid() setsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f00000060c0)={{{@in=@remote, @in6=@rand_addr="20bbcbd1865253e3e58aa219d6ca6440", 0x4e21, 0x2400000000000000, 0x4e22, 0x0, 0xa, 0xa0, 0x0, 0x67, r2, r3}, {0x6, 0x183, 0x3, 0x7f, 0x61553a0b, 0x9, 0x1, 0x4}, {0x20, 0x80000001, 0x2000000000001, 0x9}, 0x9, 0x6e6bba, 0x0, 0x0, 0x1, 0x3}, {{@in=@empty, 0x4d3, 0x3c}, 0xa, @in=@loopback, 0x3504, 0x0, 0x3, 0xfffffffffffffffc, 0x1ff, 0x5, 0x6}}, 0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000940)={{{@in6, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@dev}, 0x0, @in6=@local}}, &(0x7f0000000a40)=0xe8) r5 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r5, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") getsockopt$inet_IP_IPSEC_POLICY(r5, 0x0, 0x10, &(0x7f0000005ec0)={{{@in6=@empty, @in=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@remote}, 0x0, @in6=@mcast2}}, &(0x7f0000004800)=0xffffffffffffffc3) r7 = geteuid() setsockopt$inet_IP_XFRM_POLICY(r5, 0x0, 0x11, &(0x7f00000060c0)={{{@in=@remote, @in6=@rand_addr="20bbcbd1865253e3e58aa219d6ca6440", 0x4e21, 0x2400000000000000, 0x4e22, 0x0, 0xa, 0xa0, 0x0, 0x67, r6, r7}, {0x6, 0x183, 0x3, 0x7f, 0x61553a0b, 0x9, 0x1, 0x4}, {0x20, 0x80000001, 0x2000000000001, 0x9}, 0x9, 0x6e6bba, 0x0, 0x0, 0x1, 0x3}, {{@in=@empty, 0x4d3, 0x3c}, 0xa, @in=@loopback, 0x3504, 0x0, 0x3, 0xfffffffffffffffc, 0x1ff, 0x5, 0x6}}, 0xe8) r8 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r8, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_mount_image$hfsplus(&(0x7f0000000140)='hfsplus\x00', &(0x7f0000000200)='./file0\x00', 0x3, 0x7, &(0x7f0000000800)=[{&(0x7f0000000400)="e1ec051c0b7b96db7480b4620be1f7d4adcb21d5233a3d23bf43659e5359470de231dd734b698cd71201837ca57f911328e1aee6b2cb39533b2d549e", 0x3c, 0x101}, {&(0x7f0000000440)="dbac23926131781587488e056e40b191269651683d0d195cbd63543040e313e20126fd634002e0256fed786d07054466250e2de6b7fb6d7d8d5201ac1478ef26aafeae7947832c4cc7fea6315e92eb81c89a385dae378bf89ca53c6984b5aa79a7dcc139938fa64b30d7c24ff7b215c890be5756df2f441d0fcb938cb4c1f89245a47c630a2b5e28bb7b5a9c8c871c45857bc4fa646b30f485beccdf529ad0cd519a0bed9b5c7df28320d9ad7eceb30eda6c964cfcab57c8aa98b89d582792b886e41c9f6146332e31f93b", 0xcb, 0x1ff}, {&(0x7f0000000540)="5c96cd9925cbe6753ba234c06f8040f650bba8d4d4ebe59964acf97c49f7a5e793521ef728d90a4eb42cbe7a2536c6922f049b20f2c681c652b4dbe077b0a9972e1eeb5573d7ee69d6fc99d4e4894537fac772842763140c5d832bf593a5cc290fd0c641d14d06e564127871808073fb6fd27f2a9995b29abce9351b0b285f4887f1cc8de04d147141af2ed66cfb66fd230e329273710457efc72a8d09487b5c83e77201b28eb38d7d3846b63b1bf1233b5c925303dd3214066c99381b0457a62397c7df27f88e19a884e1dfa6", 0xcd, 0x6}, {&(0x7f0000000640)="8ae3f201063e83beadb088cb1080ef67", 0x10, 0x2a}, {&(0x7f0000000680)="dfeed81fb09a8a0d55f0999ce7730866db77fa306b896464e4d9cf133371563c7eb734eed8ec2dda58c030b96771bb708fba592614b985c573e8f3db424553c6", 0x40, 0x4}, {&(0x7f00000006c0)="f33dec9b5d96888f1504b1385ce82fdf8f2fa76ecc6ebf567753242a4c9129cd4c4885ba8bab1fd3120749889c981acccb344645e9d1ce95826ab7ceac8b7646d2e476e8934ac444aad3bba14f0d4be15675cd3d336db510c72ebbc07a000754d66f5282b1f241556cbd63a30b3d6af0f5c8a2443b03a92bb406abbb5f630ce1ef2afbba93c29e6bc46901a91ea9d91fa6048a468df5934437ca7e9e2a4fe38fddcd2aecac9406aa7adf5de93082ebf1b5c74d76b7b1b72a9b6fea1c5ab7cc1f3e97b5d7e1db9a64df9836ce0863cda956a1e2a45b9479b8ade23e81258e9444dfbf8066562f79", 0xe7, 0x7}, {&(0x7f00000007c0)="cd72eca63713ca8a35c3557b7d56b6a3073ca69e2067c18f5120c05d4ee8", 0x1e, 0x6}], 0x1, &(0x7f0000000a80)={[{@barrier='barrier'}, {@gid={'gid', 0x3d, r0}}, {@nodecompose='nodecompose'}, {@uid={'uid', 0x3d, r3}}, {@type={'type', 0x3d, "ae8c9d8f"}}, {@decompose='decompose'}, {@session={'session', 0x3d, 0x25}}], [{@uid_eq={'uid', 0x3d, r4}}, {@obj_type={'obj_type', 0x3d, 'overlay\x00'}}, {@euid_eq={'euid', 0x3d, r7}}, {@uid_eq={'uid'}}]}) [ 257.971051][T10791] hfsplus: unable to parse mount options [ 257.983983][T10790] overlayfs: unrecognized mount option "uppFrdir=./file0" or missing value 11:46:23 executing program 3: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='devtmpfs\x00', 0x0, 0x0) syz_mount_image$hfsplus(&(0x7f0000000140)='hfsplus\x00', &(0x7f0000000200)='./file0\x00', 0x3, 0x7, &(0x7f0000000800)=[{&(0x7f0000000400)="e1ec051c0b7b96db7480b4620be1f7d4adcb21d5233a3d23bf43659e5359470de231dd734b698cd71201837ca57f911328e1aee6b2cb39533b2d549e", 0x3c, 0x101}, {&(0x7f0000000440)="dbac23926131781587488e056e40b191269651683d0d195cbd63543040e313e20126fd634002e0256fed786d07054466250e2de6b7fb6d7d8d5201ac1478ef26aafeae7947832c4cc7fea6315e92eb81c89a385dae378bf89ca53c6984b5aa79a7dcc139938fa64b30d7c24ff7b215c890be5756df2f441d0fcb938cb4c1f89245a47c630a2b5e28bb7b5a9c8c871c45857bc4fa646b30f485beccdf529ad0cd519a0bed9b5c7df28320d9ad7eceb30eda6c964cfcab57c8aa98b89d582792b886e41c9f6146332e31f93b", 0xcb, 0x1ff}, {&(0x7f0000000540)="5c96cd9925cbe6753ba234c06f8040f650bba8d4d4ebe59964acf97c49f7a5e793521ef728d90a4eb42cbe7a2536c6922f049b20f2c681c652b4dbe077b0a9972e1eeb5573d7ee69d6fc99d4e4894537fac772842763140c5d832bf593a5cc290fd0c641d14d06e564127871808073fb6fd27f2a9995b29abce9351b0b285f4887f1cc8de04d147141af2ed66cfb66fd230e329273710457efc72a8d09487b5c83e77201b28eb38d7d3846b63b1bf1233b5c925303dd3214066c99381b0457a62397c7df27f88e19a884e1dfa6", 0xcd, 0x6}, {&(0x7f0000000640)="8ae3f201063e83beadb088cb1080ef67", 0x10, 0x2a}, {&(0x7f0000000680)="dfeed81fb09a8a0d55f0999ce7730866db77fa306b896464e4d9cf133371563c7eb734eed8ec2dda58c030b96771bb708fba592614b985c573e8f3db424553c6", 0x40, 0x4}, {&(0x7f00000006c0)="f33dec9b5d96888f1504b1385ce82fdf8f2fa76ecc6ebf567753242a4c9129cd4c4885ba8bab1fd3120749889c981acccb344645e9d1ce95826ab7ceac8b7646d2e476e8934ac444aad3bba14f0d4be15675cd3d336db510c72ebbc07a000754d66f5282b1f241556cbd63a30b3d6af0f5c8a2443b03a92bb406abbb5f630ce1ef2afbba93c29e6bc46901a91ea9d91fa6048a468df5934437ca7e9e2a4fe38fddcd2aecac9406aa7adf5de93082ebf1b5c74d76b7b1b72a9b6fea1c5ab7cc1f3e97b5d7e1db9a64df9836ce0863cda956a1e2a45b9479b8ade23e81258e9444dfbf8066562f79", 0xe7, 0x7}, {&(0x7f00000007c0)="cd72eca63713ca8a35c3557b7d56b6a3073ca69e2067c18f5120c05d4ee8", 0x1e, 0x6}], 0x1, &(0x7f0000000a80)={[{@barrier='barrier'}, {@gid={'gid'}}, {@nodecompose='nodecompose'}, {@uid={'uid'}}, {@type={'type', 0x3d, "ae8c9d8f"}}, {@decompose='decompose'}, {@session={'session', 0x3d, 0x25}}], [{@uid_eq={'uid'}}, {@obj_type={'obj_type', 0x3d, 'overlay\x00'}}, {@euid_eq={'euid'}}, {@uid_eq={'uid'}}]}) [ 258.049771][T10787] overlayfs: unrecognized mount option "uppFrdir=./file0" or missing value [ 258.093399][T10796] IPVS: ftp: loaded support on port[0] = 21 11:46:23 executing program 0: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='devtmpfs\x00', 0x0, 0x0) chdir(&(0x7f00000000c0)='./file0\x00') pipe(0x0) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mkdir(0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$overlay(0x40000f, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="75707046726469723d2e2f66696c65302c6c6f7765726469723d2e2f66696c65302c776f726b6469723d2e2f66696c65315c008dd712eb4c4602d39078433581919e8b817a1c09fe8e181081519b7a8259793b8c4b1093736b8d3ef3d64781796455ea1b29412fabd4fd749cbdbadd5d4fa6dad18d59235262aee5928a646acaa5b0b72c4348e1b0a4a52cab8fc461abde196cf60a732d195a64ce881b84bc1c085f990fd4bc2ce47e609a0daa4861948516ca0f519beaea32e38fa09e9b49538a32cce47c620ee6ce668079b8d73f89bfb329c08d9c81fe3c12bf0bf75ac36079bf34fd8eeadf965d333527ebe8ede05feec022e592e9e2e2be551753056d32048241d2b3ee3344aa57e1fe8f604132f549432ccf86af2039192fc4fdddf19ffd0d42de"]) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000240)='cgroup2\x00', 0x0, 0x0) fstat(0xffffffffffffffff, &(0x7f00000008c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_mount_image$hfsplus(&(0x7f0000000140)='hfsplus\x00', &(0x7f0000000200)='./file0\x00', 0x3, 0x7, &(0x7f0000000800)=[{&(0x7f0000000400)="e1ec051c0b7b96db7480b4620be1f7d4adcb21d5233a3d23bf43659e5359470de231dd734b698cd71201837ca57f911328e1aee6b2cb39533b2d549e", 0x3c, 0x101}, {&(0x7f0000000440)="dbac23926131781587488e056e40b191269651683d0d195cbd63543040e313e20126fd634002e0256fed786d07054466250e2de6b7fb6d7d8d5201ac1478ef26aafeae7947832c4cc7fea6315e92eb81c89a385dae378bf89ca53c6984b5aa79a7dcc139938fa64b30d7c24ff7b215c890be5756df2f441d0fcb938cb4c1f89245a47c630a2b5e28bb7b5a9c8c871c45857bc4fa646b30f485beccdf529ad0cd519a0bed9b5c7df28320d9ad7eceb30eda6c964cfcab57c8aa98b89d582792b886e41c9f6146332e31f93b", 0xcb, 0x1ff}, {&(0x7f0000000540)="5c96cd9925cbe6753ba234c06f8040f650bba8d4d4ebe59964acf97c49f7a5e793521ef728d90a4eb42cbe7a2536c6922f049b20f2c681c652b4dbe077b0a9972e1eeb5573d7ee69d6fc99d4e4894537fac772842763140c5d832bf593a5cc290fd0c641d14d06e564127871808073fb6fd27f2a9995b29abce9351b0b285f4887f1cc8de04d147141af2ed66cfb66fd230e329273710457efc72a8d09487b5c83e77201b28eb38d7d3846b63b1bf1233b5c925303dd3214066c99381b0457a62397c7df27f88e19a884e1dfa6", 0xcd, 0x6}, {&(0x7f0000000640)="8ae3f201063e83beadb088cb1080ef67", 0x10, 0x2a}, {&(0x7f0000000680)="dfeed81fb09a8a0d55f0999ce7730866db77fa306b896464e4d9cf133371563c7eb734eed8ec2dda58c030b96771bb708fba592614b985c573e8f3db424553c6", 0x40, 0x4}, {&(0x7f00000006c0)="f33dec9b5d96888f1504b1385ce82fdf8f2fa76ecc6ebf567753242a4c9129cd4c4885ba8bab1fd3120749889c981acccb344645e9d1ce95826ab7ceac8b7646d2e476e8934ac444aad3bba14f0d4be15675cd3d336db510c72ebbc07a000754d66f5282b1f241556cbd63a30b3d6af0f5c8a2443b03a92bb406abbb5f630ce1ef2afbba93c29e6bc46901a91ea9d91fa6048a468df5934437ca7e9e2a4fe38fddcd2aecac9406aa7adf5de93082ebf1b5c74d76b7b1b72a9b6fea1c5ab7cc1f3e97b5d7e1db9a64df9836ce0863cda956a1e2a45b9479b8ade23e81258e9444dfbf8066562f79", 0xe7, 0x7}, {&(0x7f00000007c0)="cd72eca63713ca8a35c3557b7d56b6a3073ca69e2067c18f5120c05d4ee8", 0x1e, 0x6}], 0x1, &(0x7f0000000a80)={[{@barrier='barrier'}, {@gid={'gid', 0x3d, r0}}, {@nodecompose='nodecompose'}, {@uid={'uid'}}, {@type={'type', 0x3d, "ae8c9d8f"}}, {@decompose='decompose'}, {@session={'session', 0x3d, 0x25}}], [{@uid_eq={'uid'}}, {@obj_type={'obj_type', 0x3d, 'overlay\x00'}}, {@euid_eq={'euid'}}, {@uid_eq={'uid'}}]}) [ 258.159128][T10790] hfsplus: unable to parse mount options [ 258.172985][T10803] hfsplus: unable to parse mount options 11:46:23 executing program 4: r0 = socket$netlink(0x10, 0x3, 0xf) bind$netlink(r0, 0x0, 0x0) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000000), 0x4) setsockopt$netlink_NETLINK_BROADCAST_ERROR(r0, 0x10e, 0x4, &(0x7f0000000080)=0x6, 0x4) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)={0x14, 0x23, 0x1, 0x0, 0x0, {0x20000000004, 0xe00000000000000}}, 0x14}}, 0x0) 11:46:23 executing program 5: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='devtmpfs\x00', 0x0, 0x0) chdir(&(0x7f00000000c0)='./file0\x00') pipe(0x0) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mkdir(0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$overlay(0x40000f, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="75707046726469723d2e2f66696c65302c6c6f7765726469723d2e2f66696c65302c776f726b6469723d2e2f66696c65315c008dd712eb4c4602d39078433581919e8b817a1c09fe8e181081519b7a8259793b8c4b1093736b8d3ef3d64781796455ea1b29412fabd4fd749cbdbadd5d4fa6dad18d59235262aee5928a646acaa5b0b72c4348e1b0a4a52cab8fc461abde196cf60a732d195a64ce881b84bc1c085f990fd4bc2ce47e609a0daa4861948516ca0f519beaea32e38fa09e9b49538a32cce47c620ee6ce668079b8d73f89bfb329c08d9c81fe3c12bf0bf75ac36079bf34fd8eeadf965d333527ebe8ede05feec022e592e9e2e2be551753056d32048241d2b3ee3344aa57e1fe8f604132f549432ccf86af2039192fc4fdddf19ffd0d42de"]) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000240)='cgroup2\x00', 0x0, 0x0) fstat(0xffffffffffffffff, &(0x7f00000008c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000005ec0)={{{@in6=@empty, @in=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@remote}, 0x0, @in6=@mcast2}}, &(0x7f0000004800)=0xffffffffffffffc3) r3 = geteuid() setsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f00000060c0)={{{@in=@remote, @in6=@rand_addr="20bbcbd1865253e3e58aa219d6ca6440", 0x4e21, 0x2400000000000000, 0x4e22, 0x0, 0xa, 0xa0, 0x0, 0x67, r2, r3}, {0x6, 0x183, 0x3, 0x7f, 0x61553a0b, 0x9, 0x1, 0x4}, {0x20, 0x80000001, 0x2000000000001, 0x9}, 0x9, 0x6e6bba, 0x0, 0x0, 0x1, 0x3}, {{@in=@empty, 0x4d3, 0x3c}, 0xa, @in=@loopback, 0x3504, 0x0, 0x3, 0xfffffffffffffffc, 0x1ff, 0x5, 0x6}}, 0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000940)={{{@in6, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@dev}, 0x0, @in6=@local}}, &(0x7f0000000a40)=0xe8) r5 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r5, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") getsockopt$inet_IP_IPSEC_POLICY(r5, 0x0, 0x10, &(0x7f0000005ec0)={{{@in6=@empty, @in=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@remote}, 0x0, @in6=@mcast2}}, &(0x7f0000004800)=0xffffffffffffffc3) r7 = geteuid() setsockopt$inet_IP_XFRM_POLICY(r5, 0x0, 0x11, &(0x7f00000060c0)={{{@in=@remote, @in6=@rand_addr="20bbcbd1865253e3e58aa219d6ca6440", 0x4e21, 0x2400000000000000, 0x4e22, 0x0, 0xa, 0xa0, 0x0, 0x67, r6, r7}, {0x6, 0x183, 0x3, 0x7f, 0x61553a0b, 0x9, 0x1, 0x4}, {0x20, 0x80000001, 0x2000000000001, 0x9}, 0x9, 0x6e6bba, 0x0, 0x0, 0x1, 0x3}, {{@in=@empty, 0x4d3, 0x3c}, 0xa, @in=@loopback, 0x3504, 0x0, 0x3, 0xfffffffffffffffc, 0x1ff, 0x5, 0x6}}, 0xe8) r8 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r8, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_mount_image$hfsplus(&(0x7f0000000140)='hfsplus\x00', &(0x7f0000000200)='./file0\x00', 0x3, 0x7, &(0x7f0000000800)=[{&(0x7f0000000400)="e1ec051c0b7b96db7480b4620be1f7d4adcb21d5233a3d23bf43659e5359470de231dd734b698cd71201837ca57f911328e1aee6b2cb39533b2d549e", 0x3c, 0x101}, {&(0x7f0000000440)="dbac23926131781587488e056e40b191269651683d0d195cbd63543040e313e20126fd634002e0256fed786d07054466250e2de6b7fb6d7d8d5201ac1478ef26aafeae7947832c4cc7fea6315e92eb81c89a385dae378bf89ca53c6984b5aa79a7dcc139938fa64b30d7c24ff7b215c890be5756df2f441d0fcb938cb4c1f89245a47c630a2b5e28bb7b5a9c8c871c45857bc4fa646b30f485beccdf529ad0cd519a0bed9b5c7df28320d9ad7eceb30eda6c964cfcab57c8aa98b89d582792b886e41c9f6146332e31f93b", 0xcb, 0x1ff}, {&(0x7f0000000540)="5c96cd9925cbe6753ba234c06f8040f650bba8d4d4ebe59964acf97c49f7a5e793521ef728d90a4eb42cbe7a2536c6922f049b20f2c681c652b4dbe077b0a9972e1eeb5573d7ee69d6fc99d4e4894537fac772842763140c5d832bf593a5cc290fd0c641d14d06e564127871808073fb6fd27f2a9995b29abce9351b0b285f4887f1cc8de04d147141af2ed66cfb66fd230e329273710457efc72a8d09487b5c83e77201b28eb38d7d3846b63b1bf1233b5c925303dd3214066c99381b0457a62397c7df27f88e19a884e1dfa6", 0xcd, 0x6}, {&(0x7f0000000640)="8ae3f201063e83beadb088cb1080ef67", 0x10, 0x2a}, {&(0x7f0000000680)="dfeed81fb09a8a0d55f0999ce7730866db77fa306b896464e4d9cf133371563c7eb734eed8ec2dda58c030b96771bb708fba592614b985c573e8f3db424553c6", 0x40, 0x4}, {&(0x7f00000006c0)="f33dec9b5d96888f1504b1385ce82fdf8f2fa76ecc6ebf567753242a4c9129cd4c4885ba8bab1fd3120749889c981acccb344645e9d1ce95826ab7ceac8b7646d2e476e8934ac444aad3bba14f0d4be15675cd3d336db510c72ebbc07a000754d66f5282b1f241556cbd63a30b3d6af0f5c8a2443b03a92bb406abbb5f630ce1ef2afbba93c29e6bc46901a91ea9d91fa6048a468df5934437ca7e9e2a4fe38fddcd2aecac9406aa7adf5de93082ebf1b5c74d76b7b1b72a9b6fea1c5ab7cc1f3e97b5d7e1db9a64df9836ce0863cda956a1e2a45b9479b8ade23e81258e9444dfbf8066562f79", 0xe7, 0x7}, {&(0x7f00000007c0)="cd72eca63713ca8a35c3557b7d56b6a3073ca69e2067c18f5120c05d4ee8", 0x1e, 0x6}], 0x1, &(0x7f0000000a80)={[{@barrier='barrier'}, {@gid={'gid', 0x3d, r0}}, {@nodecompose='nodecompose'}, {@uid={'uid', 0x3d, r3}}, {@type={'type', 0x3d, "ae8c9d8f"}}, {@decompose='decompose'}, {@session={'session', 0x3d, 0x25}}], [{@uid_eq={'uid', 0x3d, r4}}, {@obj_type={'obj_type', 0x3d, 'overlay\x00'}}, {@euid_eq={'euid', 0x3d, r7}}, {@uid_eq={'uid'}}]}) [ 258.307463][T10806] overlayfs: unrecognized mount option "uppFrdir=./file0" or missing value 11:46:23 executing program 3: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) syz_mount_image$hfsplus(&(0x7f0000000140)='hfsplus\x00', &(0x7f0000000200)='./file0\x00', 0x3, 0x7, &(0x7f0000000800)=[{&(0x7f0000000400)="e1ec051c0b7b96db7480b4620be1f7d4adcb21d5233a3d23bf43659e5359470de231dd734b698cd71201837ca57f911328e1aee6b2cb39533b2d549e", 0x3c, 0x101}, {&(0x7f0000000440)="dbac23926131781587488e056e40b191269651683d0d195cbd63543040e313e20126fd634002e0256fed786d07054466250e2de6b7fb6d7d8d5201ac1478ef26aafeae7947832c4cc7fea6315e92eb81c89a385dae378bf89ca53c6984b5aa79a7dcc139938fa64b30d7c24ff7b215c890be5756df2f441d0fcb938cb4c1f89245a47c630a2b5e28bb7b5a9c8c871c45857bc4fa646b30f485beccdf529ad0cd519a0bed9b5c7df28320d9ad7eceb30eda6c964cfcab57c8aa98b89d582792b886e41c9f6146332e31f93b", 0xcb, 0x1ff}, {&(0x7f0000000540)="5c96cd9925cbe6753ba234c06f8040f650bba8d4d4ebe59964acf97c49f7a5e793521ef728d90a4eb42cbe7a2536c6922f049b20f2c681c652b4dbe077b0a9972e1eeb5573d7ee69d6fc99d4e4894537fac772842763140c5d832bf593a5cc290fd0c641d14d06e564127871808073fb6fd27f2a9995b29abce9351b0b285f4887f1cc8de04d147141af2ed66cfb66fd230e329273710457efc72a8d09487b5c83e77201b28eb38d7d3846b63b1bf1233b5c925303dd3214066c99381b0457a62397c7df27f88e19a884e1dfa6", 0xcd, 0x6}, {&(0x7f0000000640)="8ae3f201063e83beadb088cb1080ef67", 0x10, 0x2a}, {&(0x7f0000000680)="dfeed81fb09a8a0d55f0999ce7730866db77fa306b896464e4d9cf133371563c7eb734eed8ec2dda58c030b96771bb708fba592614b985c573e8f3db424553c6", 0x40, 0x4}, {&(0x7f00000006c0)="f33dec9b5d96888f1504b1385ce82fdf8f2fa76ecc6ebf567753242a4c9129cd4c4885ba8bab1fd3120749889c981acccb344645e9d1ce95826ab7ceac8b7646d2e476e8934ac444aad3bba14f0d4be15675cd3d336db510c72ebbc07a000754d66f5282b1f241556cbd63a30b3d6af0f5c8a2443b03a92bb406abbb5f630ce1ef2afbba93c29e6bc46901a91ea9d91fa6048a468df5934437ca7e9e2a4fe38fddcd2aecac9406aa7adf5de93082ebf1b5c74d76b7b1b72a9b6fea1c5ab7cc1f3e97b5d7e1db9a64df9836ce0863cda956a1e2a45b9479b8ade23e81258e9444dfbf8066562f79", 0xe7, 0x7}, {&(0x7f00000007c0)="cd72eca63713ca8a35c3557b7d56b6a3073ca69e2067c18f5120c05d4ee8", 0x1e, 0x6}], 0x1, &(0x7f0000000a80)={[{@barrier='barrier'}, {@gid={'gid'}}, {@nodecompose='nodecompose'}, {@uid={'uid'}}, {@type={'type', 0x3d, "ae8c9d8f"}}, {@decompose='decompose'}, {@session={'session', 0x3d, 0x25}}], [{@uid_eq={'uid'}}, {@obj_type={'obj_type', 0x3d, 'overlay\x00'}}, {@euid_eq={'euid'}}, {@uid_eq={'uid'}}]}) 11:46:23 executing program 1 (fault-call:3 fault-nth:0): setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) setsockopt$netlink_NETLINK_BROADCAST_ERROR(0xffffffffffffffff, 0x10e, 0x4, 0x0, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)={0x14, 0x23, 0x1, 0x0, 0x0, {0x20000000004, 0xe00000000000000}}, 0x14}}, 0x0) [ 258.482863][T10806] hfsplus: unable to parse mount options [ 258.544136][T10816] overlayfs: unrecognized mount option "uppFrdir=./file0" or missing value [ 258.559337][T10825] FAULT_INJECTION: forcing a failure. [ 258.559337][T10825] name failslab, interval 1, probability 0, space 0, times 1 [ 258.572204][T10823] hfsplus: unable to parse mount options [ 258.578728][T10825] CPU: 0 PID: 10825 Comm: syz-executor.1 Not tainted 5.3.0+ #0 [ 258.586287][T10825] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 258.586299][T10825] Call Trace: [ 258.586385][T10825] dump_stack+0x172/0x1f0 [ 258.604207][T10825] should_fail.cold+0xa/0x15 [ 258.604228][T10825] ? fault_create_debugfs_attr+0x180/0x180 [ 258.614608][T10825] ? ___might_sleep+0x163/0x2c0 [ 258.614631][T10825] __should_failslab+0x121/0x190 [ 258.614648][T10825] should_failslab+0x9/0x14 [ 258.614668][T10825] kmem_cache_alloc_node+0x268/0x740 [ 258.629047][T10825] __alloc_skb+0xd5/0x5e0 [ 258.629065][T10825] ? __kmalloc_reserve.isra.0+0xf0/0xf0 [ 258.629083][T10825] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 258.629120][T10825] ? netlink_autobind.isra.0+0x228/0x310 [ 258.644250][T10825] netlink_sendmsg+0x972/0xd60 [ 258.644274][T10825] ? netlink_unicast+0x710/0x710 [ 258.644295][T10825] ? tomoyo_socket_sendmsg+0x26/0x30 [ 258.656140][T10825] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 258.656160][T10825] ? security_socket_sendmsg+0x8d/0xc0 [ 258.656178][T10825] ? netlink_unicast+0x710/0x710 [ 258.656197][T10825] sock_sendmsg+0xd7/0x130 [ 258.656214][T10825] ___sys_sendmsg+0x803/0x920 [ 258.656233][T10825] ? copy_msghdr_from_user+0x440/0x440 [ 258.656258][T10825] ? __kasan_check_read+0x11/0x20 [ 258.656278][T10825] ? __fget+0x384/0x560 [ 258.656299][T10825] ? ksys_dup3+0x3e0/0x3e0 [ 258.671271][T10825] ? __fget_light+0x1a9/0x230 [ 258.671292][T10825] ? __fdget+0x1b/0x20 [ 258.671311][T10825] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 258.671341][T10825] __sys_sendmsg+0x105/0x1d0 [ 258.692559][T10825] ? __sys_sendmsg_sock+0xd0/0xd0 11:46:23 executing program 4: r0 = socket$netlink(0x10, 0x3, 0xf) bind$netlink(r0, 0x0, 0x0) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000000), 0x4) setsockopt$netlink_NETLINK_BROADCAST_ERROR(r0, 0x10e, 0x4, &(0x7f0000000080)=0x6, 0x4) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)={0x14, 0x23, 0x1, 0x0, 0x0, {0x20000000004, 0xe00000000000000}}, 0x14}}, 0x0) [ 258.692591][T10825] ? trace_hardirqs_on_thunk+0x1a/0x20 [ 258.692609][T10825] ? do_syscall_64+0x26/0x760 [ 258.702775][T10825] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 258.711875][T10825] ? do_syscall_64+0x26/0x760 [ 258.711901][T10825] __x64_sys_sendmsg+0x78/0xb0 [ 258.711916][T10825] do_syscall_64+0xfa/0x760 [ 258.711936][T10825] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 258.725059][T10825] RIP: 0033:0x459a29 [ 258.725076][T10825] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 258.725084][T10825] RSP: 002b:00007f5e254b1c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 258.725099][T10825] RAX: ffffffffffffffda RBX: 00007f5e254b1c90 RCX: 0000000000459a29 [ 258.725107][T10825] RDX: 0000000000000000 RSI: 0000000020000100 RDI: 0000000000000003 [ 258.725120][T10825] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 258.735923][T10825] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f5e254b26d4 [ 258.735933][T10825] R13: 00000000004c7940 R14: 00000000004dd350 R15: 0000000000000004 11:46:23 executing program 1 (fault-call:3 fault-nth:1): setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) setsockopt$netlink_NETLINK_BROADCAST_ERROR(0xffffffffffffffff, 0x10e, 0x4, 0x0, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)={0x14, 0x23, 0x1, 0x0, 0x0, {0x20000000004, 0xe00000000000000}}, 0x14}}, 0x0) 11:46:23 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000140)='hfsplus\x00', &(0x7f0000000200)='./file0\x00', 0x3, 0x7, &(0x7f0000000800)=[{&(0x7f0000000400)="e1ec051c0b7b96db7480b4620be1f7d4adcb21d5233a3d23bf43659e5359470de231dd734b698cd71201837ca57f911328e1aee6b2cb39533b2d549e", 0x3c, 0x101}, {&(0x7f0000000440)="dbac23926131781587488e056e40b191269651683d0d195cbd63543040e313e20126fd634002e0256fed786d07054466250e2de6b7fb6d7d8d5201ac1478ef26aafeae7947832c4cc7fea6315e92eb81c89a385dae378bf89ca53c6984b5aa79a7dcc139938fa64b30d7c24ff7b215c890be5756df2f441d0fcb938cb4c1f89245a47c630a2b5e28bb7b5a9c8c871c45857bc4fa646b30f485beccdf529ad0cd519a0bed9b5c7df28320d9ad7eceb30eda6c964cfcab57c8aa98b89d582792b886e41c9f6146332e31f93b", 0xcb, 0x1ff}, {&(0x7f0000000540)="5c96cd9925cbe6753ba234c06f8040f650bba8d4d4ebe59964acf97c49f7a5e793521ef728d90a4eb42cbe7a2536c6922f049b20f2c681c652b4dbe077b0a9972e1eeb5573d7ee69d6fc99d4e4894537fac772842763140c5d832bf593a5cc290fd0c641d14d06e564127871808073fb6fd27f2a9995b29abce9351b0b285f4887f1cc8de04d147141af2ed66cfb66fd230e329273710457efc72a8d09487b5c83e77201b28eb38d7d3846b63b1bf1233b5c925303dd3214066c99381b0457a62397c7df27f88e19a884e1dfa6", 0xcd, 0x6}, {&(0x7f0000000640)="8ae3f201063e83beadb088cb1080ef67", 0x10, 0x2a}, {&(0x7f0000000680)="dfeed81fb09a8a0d55f0999ce7730866db77fa306b896464e4d9cf133371563c7eb734eed8ec2dda58c030b96771bb708fba592614b985c573e8f3db424553c6", 0x40, 0x4}, {&(0x7f00000006c0)="f33dec9b5d96888f1504b1385ce82fdf8f2fa76ecc6ebf567753242a4c9129cd4c4885ba8bab1fd3120749889c981acccb344645e9d1ce95826ab7ceac8b7646d2e476e8934ac444aad3bba14f0d4be15675cd3d336db510c72ebbc07a000754d66f5282b1f241556cbd63a30b3d6af0f5c8a2443b03a92bb406abbb5f630ce1ef2afbba93c29e6bc46901a91ea9d91fa6048a468df5934437ca7e9e2a4fe38fddcd2aecac9406aa7adf5de93082ebf1b5c74d76b7b1b72a9b6fea1c5ab7cc1f3e97b5d7e1db9a64df9836ce0863cda956a1e2a45b9479b8ade23e81258e9444dfbf8066562f79", 0xe7, 0x7}, {&(0x7f00000007c0)="cd72eca63713ca8a35c3557b7d56b6a3073ca69e2067c18f5120c05d4ee8", 0x1e, 0x6}], 0x1, &(0x7f0000000a80)={[{@barrier='barrier'}, {@gid={'gid'}}, {@nodecompose='nodecompose'}, {@uid={'uid'}}, {@type={'type', 0x3d, "ae8c9d8f"}}, {@decompose='decompose'}, {@session={'session', 0x3d, 0x25}}], [{@uid_eq={'uid'}}, {@obj_type={'obj_type', 0x3d, 'overlay\x00'}}, {@euid_eq={'euid'}}, {@uid_eq={'uid'}}]}) 11:46:23 executing program 0: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='devtmpfs\x00', 0x0, 0x0) chdir(&(0x7f00000000c0)='./file0\x00') pipe(0x0) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mkdir(0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$overlay(0x40000f, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="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"]) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000240)='cgroup2\x00', 0x0, 0x0) fstat(0xffffffffffffffff, &(0x7f00000008c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) socket$inet_udplite(0x2, 0x2, 0x88) syz_mount_image$hfsplus(&(0x7f0000000140)='hfsplus\x00', &(0x7f0000000200)='./file0\x00', 0x3, 0x7, &(0x7f0000000800)=[{&(0x7f0000000400)="e1ec051c0b7b96db7480b4620be1f7d4adcb21d5233a3d23bf43659e5359470de231dd734b698cd71201837ca57f911328e1aee6b2cb39533b2d549e", 0x3c, 0x101}, {&(0x7f0000000440)="dbac23926131781587488e056e40b191269651683d0d195cbd63543040e313e20126fd634002e0256fed786d07054466250e2de6b7fb6d7d8d5201ac1478ef26aafeae7947832c4cc7fea6315e92eb81c89a385dae378bf89ca53c6984b5aa79a7dcc139938fa64b30d7c24ff7b215c890be5756df2f441d0fcb938cb4c1f89245a47c630a2b5e28bb7b5a9c8c871c45857bc4fa646b30f485beccdf529ad0cd519a0bed9b5c7df28320d9ad7eceb30eda6c964cfcab57c8aa98b89d582792b886e41c9f6146332e31f93b", 0xcb, 0x1ff}, {&(0x7f0000000540)="5c96cd9925cbe6753ba234c06f8040f650bba8d4d4ebe59964acf97c49f7a5e793521ef728d90a4eb42cbe7a2536c6922f049b20f2c681c652b4dbe077b0a9972e1eeb5573d7ee69d6fc99d4e4894537fac772842763140c5d832bf593a5cc290fd0c641d14d06e564127871808073fb6fd27f2a9995b29abce9351b0b285f4887f1cc8de04d147141af2ed66cfb66fd230e329273710457efc72a8d09487b5c83e77201b28eb38d7d3846b63b1bf1233b5c925303dd3214066c99381b0457a62397c7df27f88e19a884e1dfa6", 0xcd, 0x6}, {&(0x7f0000000640)="8ae3f201063e83beadb088cb1080ef67", 0x10, 0x2a}, {&(0x7f0000000680)="dfeed81fb09a8a0d55f0999ce7730866db77fa306b896464e4d9cf133371563c7eb734eed8ec2dda58c030b96771bb708fba592614b985c573e8f3db424553c6", 0x40, 0x4}, {&(0x7f00000006c0)="f33dec9b5d96888f1504b1385ce82fdf8f2fa76ecc6ebf567753242a4c9129cd4c4885ba8bab1fd3120749889c981acccb344645e9d1ce95826ab7ceac8b7646d2e476e8934ac444aad3bba14f0d4be15675cd3d336db510c72ebbc07a000754d66f5282b1f241556cbd63a30b3d6af0f5c8a2443b03a92bb406abbb5f630ce1ef2afbba93c29e6bc46901a91ea9d91fa6048a468df5934437ca7e9e2a4fe38fddcd2aecac9406aa7adf5de93082ebf1b5c74d76b7b1b72a9b6fea1c5ab7cc1f3e97b5d7e1db9a64df9836ce0863cda956a1e2a45b9479b8ade23e81258e9444dfbf8066562f79", 0xe7, 0x7}, {&(0x7f00000007c0)="cd72eca63713ca8a35c3557b7d56b6a3073ca69e2067c18f5120c05d4ee8", 0x1e, 0x6}], 0x1, &(0x7f0000000a80)={[{@barrier='barrier'}, {@gid={'gid', 0x3d, r0}}, {@nodecompose='nodecompose'}, {@uid={'uid'}}, {@type={'type', 0x3d, "ae8c9d8f"}}, {@decompose='decompose'}, {@session={'session', 0x3d, 0x25}}], [{@uid_eq={'uid'}}, {@obj_type={'obj_type', 0x3d, 'overlay\x00'}}, {@euid_eq={'euid'}}, {@uid_eq={'uid'}}]}) [ 258.960383][T10816] hfsplus: unable to parse mount options [ 259.051157][T10835] FAULT_INJECTION: forcing a failure. [ 259.051157][T10835] name failslab, interval 1, probability 0, space 0, times 0 [ 259.096237][T10835] CPU: 0 PID: 10835 Comm: syz-executor.1 Not tainted 5.3.0+ #0 [ 259.103832][T10835] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 259.113896][T10835] Call Trace: [ 259.117202][T10835] dump_stack+0x172/0x1f0 [ 259.121561][T10835] should_fail.cold+0xa/0x15 [ 259.126176][T10835] ? fault_create_debugfs_attr+0x180/0x180 [ 259.132008][T10835] ? ___might_sleep+0x163/0x2c0 [ 259.136883][T10835] __should_failslab+0x121/0x190 [ 259.141836][T10835] should_failslab+0x9/0x14 [ 259.142961][T10840] overlayfs: unrecognized mount option "uppFrdir=./file0" or missing value [ 259.146357][T10835] kmem_cache_alloc_node_trace+0x274/0x750 [ 259.146377][T10835] ? rcu_read_lock_any_held.part.0+0x50/0x50 [ 259.146392][T10835] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 259.146414][T10835] __kmalloc_node_track_caller+0x3d/0x70 [ 259.146436][T10835] __kmalloc_reserve.isra.0+0x40/0xf0 [ 259.146453][T10835] __alloc_skb+0x10b/0x5e0 [ 259.146470][T10835] ? __kmalloc_reserve.isra.0+0xf0/0xf0 [ 259.146486][T10835] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 259.146507][T10835] ? netlink_autobind.isra.0+0x228/0x310 [ 259.183814][T10835] netlink_sendmsg+0x972/0xd60 [ 259.183837][T10835] ? netlink_unicast+0x710/0x710 [ 259.183857][T10835] ? tomoyo_socket_sendmsg+0x26/0x30 [ 259.205661][T10835] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 259.205680][T10835] ? security_socket_sendmsg+0x8d/0xc0 [ 259.205696][T10835] ? netlink_unicast+0x710/0x710 [ 259.205716][T10835] sock_sendmsg+0xd7/0x130 [ 259.220682][T10835] ___sys_sendmsg+0x803/0x920 [ 259.220704][T10835] ? copy_msghdr_from_user+0x440/0x440 [ 259.220732][T10835] ? __kasan_check_read+0x11/0x20 [ 259.246593][T10835] ? __fget+0x384/0x560 [ 259.246619][T10835] ? ksys_dup3+0x3e0/0x3e0 [ 259.246643][T10835] ? __fget_light+0x1a9/0x230 [ 259.246660][T10835] ? __fdget+0x1b/0x20 [ 259.246678][T10835] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 259.246701][T10835] __sys_sendmsg+0x105/0x1d0 [ 259.257163][T10835] ? __sys_sendmsg_sock+0xd0/0xd0 [ 259.257195][T10835] ? trace_hardirqs_on_thunk+0x1a/0x20 [ 259.257211][T10835] ? do_syscall_64+0x26/0x760 [ 259.257226][T10835] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 259.257239][T10835] ? do_syscall_64+0x26/0x760 [ 259.257260][T10835] __x64_sys_sendmsg+0x78/0xb0 [ 259.257275][T10835] do_syscall_64+0xfa/0x760 [ 259.257298][T10835] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 259.265841][T10835] RIP: 0033:0x459a29 [ 259.265857][T10835] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 259.265865][T10835] RSP: 002b:00007f5e254b1c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 259.265880][T10835] RAX: ffffffffffffffda RBX: 00007f5e254b1c90 RCX: 0000000000459a29 [ 259.265889][T10835] RDX: 0000000000000000 RSI: 0000000020000100 RDI: 0000000000000003 [ 259.265898][T10835] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 259.265907][T10835] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f5e254b26d4 [ 259.265915][T10835] R13: 00000000004c7940 R14: 00000000004dd350 R15: 0000000000000004 [ 259.428076][T10845] hfsplus: unable to parse mount options [ 259.447481][T10840] hfsplus: unable to parse mount options 11:46:26 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_FSGETXATTR(0xffffffffffffffff, 0x8004550f, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x1}, 0x10) r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r0, &(0x7f0000000000)={{0x6, @rose}, [@rose, @rose, @default, @netrom, @bcast, @rose, @rose, @null]}, 0x48) openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000080)='/dev/qat_adf_ctl\x00', 0x8200, 0x0) listen(r0, 0x0) unshare(0x40000000) setrlimit(0x0, 0x0) r1 = accept(r0, 0x0, 0x0) write$binfmt_elf64(r1, &(0x7f00000002c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x9, 0x8, 0x0, 0x0, 0x0, 0x4825483b35c83c0b, 0x0, 0x0, 0x40, 0x227}, [{0x4, 0x1, 0xfff, 0x0, 0x0, 0xff8000000002, 0x0, 0x7fff}], "", [[], [], []]}, 0x378) 11:46:26 executing program 5: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='devtmpfs\x00', 0x0, 0x0) chdir(&(0x7f00000000c0)='./file0\x00') pipe(0x0) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mkdir(0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$overlay(0x40000f, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="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"]) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000240)='cgroup2\x00', 0x0, 0x0) fstat(0xffffffffffffffff, &(0x7f00000008c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000005ec0)={{{@in6=@empty, @in=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@remote}, 0x0, @in6=@mcast2}}, &(0x7f0000004800)=0xffffffffffffffc3) r3 = geteuid() setsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f00000060c0)={{{@in=@remote, @in6=@rand_addr="20bbcbd1865253e3e58aa219d6ca6440", 0x4e21, 0x2400000000000000, 0x4e22, 0x0, 0xa, 0xa0, 0x0, 0x67, r2, r3}, {0x6, 0x183, 0x3, 0x7f, 0x61553a0b, 0x9, 0x1, 0x4}, {0x20, 0x80000001, 0x2000000000001, 0x9}, 0x9, 0x6e6bba, 0x0, 0x0, 0x1, 0x3}, {{@in=@empty, 0x4d3, 0x3c}, 0xa, @in=@loopback, 0x3504, 0x0, 0x3, 0xfffffffffffffffc, 0x1ff, 0x5, 0x6}}, 0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000940)={{{@in6, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@dev}, 0x0, @in6=@local}}, &(0x7f0000000a40)=0xe8) r5 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r5, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") getsockopt$inet_IP_IPSEC_POLICY(r5, 0x0, 0x10, &(0x7f0000005ec0)={{{@in6=@empty, @in=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@remote}, 0x0, @in6=@mcast2}}, &(0x7f0000004800)=0xffffffffffffffc3) r7 = geteuid() setsockopt$inet_IP_XFRM_POLICY(r5, 0x0, 0x11, &(0x7f00000060c0)={{{@in=@remote, @in6=@rand_addr="20bbcbd1865253e3e58aa219d6ca6440", 0x4e21, 0x2400000000000000, 0x4e22, 0x0, 0xa, 0xa0, 0x0, 0x67, r6, r7}, {0x6, 0x183, 0x3, 0x7f, 0x61553a0b, 0x9, 0x1, 0x4}, {0x20, 0x80000001, 0x2000000000001, 0x9}, 0x9, 0x6e6bba, 0x0, 0x0, 0x1, 0x3}, {{@in=@empty, 0x4d3, 0x3c}, 0xa, @in=@loopback, 0x3504, 0x0, 0x3, 0xfffffffffffffffc, 0x1ff, 0x5, 0x6}}, 0xe8) socket$inet_udplite(0x2, 0x2, 0x88) syz_mount_image$hfsplus(&(0x7f0000000140)='hfsplus\x00', &(0x7f0000000200)='./file0\x00', 0x3, 0x7, &(0x7f0000000800)=[{&(0x7f0000000400)="e1ec051c0b7b96db7480b4620be1f7d4adcb21d5233a3d23bf43659e5359470de231dd734b698cd71201837ca57f911328e1aee6b2cb39533b2d549e", 0x3c, 0x101}, {&(0x7f0000000440)="dbac23926131781587488e056e40b191269651683d0d195cbd63543040e313e20126fd634002e0256fed786d07054466250e2de6b7fb6d7d8d5201ac1478ef26aafeae7947832c4cc7fea6315e92eb81c89a385dae378bf89ca53c6984b5aa79a7dcc139938fa64b30d7c24ff7b215c890be5756df2f441d0fcb938cb4c1f89245a47c630a2b5e28bb7b5a9c8c871c45857bc4fa646b30f485beccdf529ad0cd519a0bed9b5c7df28320d9ad7eceb30eda6c964cfcab57c8aa98b89d582792b886e41c9f6146332e31f93b", 0xcb, 0x1ff}, {&(0x7f0000000540)="5c96cd9925cbe6753ba234c06f8040f650bba8d4d4ebe59964acf97c49f7a5e793521ef728d90a4eb42cbe7a2536c6922f049b20f2c681c652b4dbe077b0a9972e1eeb5573d7ee69d6fc99d4e4894537fac772842763140c5d832bf593a5cc290fd0c641d14d06e564127871808073fb6fd27f2a9995b29abce9351b0b285f4887f1cc8de04d147141af2ed66cfb66fd230e329273710457efc72a8d09487b5c83e77201b28eb38d7d3846b63b1bf1233b5c925303dd3214066c99381b0457a62397c7df27f88e19a884e1dfa6", 0xcd, 0x6}, {&(0x7f0000000640)="8ae3f201063e83beadb088cb1080ef67", 0x10, 0x2a}, {&(0x7f0000000680)="dfeed81fb09a8a0d55f0999ce7730866db77fa306b896464e4d9cf133371563c7eb734eed8ec2dda58c030b96771bb708fba592614b985c573e8f3db424553c6", 0x40, 0x4}, {&(0x7f00000006c0)="f33dec9b5d96888f1504b1385ce82fdf8f2fa76ecc6ebf567753242a4c9129cd4c4885ba8bab1fd3120749889c981acccb344645e9d1ce95826ab7ceac8b7646d2e476e8934ac444aad3bba14f0d4be15675cd3d336db510c72ebbc07a000754d66f5282b1f241556cbd63a30b3d6af0f5c8a2443b03a92bb406abbb5f630ce1ef2afbba93c29e6bc46901a91ea9d91fa6048a468df5934437ca7e9e2a4fe38fddcd2aecac9406aa7adf5de93082ebf1b5c74d76b7b1b72a9b6fea1c5ab7cc1f3e97b5d7e1db9a64df9836ce0863cda956a1e2a45b9479b8ade23e81258e9444dfbf8066562f79", 0xe7, 0x7}, {&(0x7f00000007c0)="cd72eca63713ca8a35c3557b7d56b6a3073ca69e2067c18f5120c05d4ee8", 0x1e, 0x6}], 0x1, &(0x7f0000000a80)={[{@barrier='barrier'}, {@gid={'gid', 0x3d, r0}}, {@nodecompose='nodecompose'}, {@uid={'uid', 0x3d, r3}}, {@type={'type', 0x3d, "ae8c9d8f"}}, {@decompose='decompose'}, {@session={'session', 0x3d, 0x25}}], [{@uid_eq={'uid', 0x3d, r4}}, {@obj_type={'obj_type', 0x3d, 'overlay\x00'}}, {@euid_eq={'euid', 0x3d, r7}}, {@uid_eq={'uid'}}]}) 11:46:26 executing program 1 (fault-call:3 fault-nth:2): setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) setsockopt$netlink_NETLINK_BROADCAST_ERROR(0xffffffffffffffff, 0x10e, 0x4, 0x0, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)={0x14, 0x23, 0x1, 0x0, 0x0, {0x20000000004, 0xe00000000000000}}, 0x14}}, 0x0) 11:46:26 executing program 4: r0 = socket$netlink(0x10, 0x3, 0xf) bind$netlink(r0, 0x0, 0x0) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000000), 0x4) setsockopt$netlink_NETLINK_BROADCAST_ERROR(r0, 0x10e, 0x4, &(0x7f0000000080)=0x6, 0x4) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)={0x14, 0x23, 0x1, 0x0, 0x0, {0x20000000004, 0xe00000000000000}}, 0x14}}, 0x0) 11:46:26 executing program 0: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='devtmpfs\x00', 0x0, 0x0) chdir(&(0x7f00000000c0)='./file0\x00') pipe(0x0) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mkdir(0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$overlay(0x40000f, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="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"]) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000240)='cgroup2\x00', 0x0, 0x0) fstat(0xffffffffffffffff, &(0x7f00000008c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) syz_mount_image$hfsplus(&(0x7f0000000140)='hfsplus\x00', &(0x7f0000000200)='./file0\x00', 0x3, 0x7, &(0x7f0000000800)=[{&(0x7f0000000400)="e1ec051c0b7b96db7480b4620be1f7d4adcb21d5233a3d23bf43659e5359470de231dd734b698cd71201837ca57f911328e1aee6b2cb39533b2d549e", 0x3c, 0x101}, {&(0x7f0000000440)="dbac23926131781587488e056e40b191269651683d0d195cbd63543040e313e20126fd634002e0256fed786d07054466250e2de6b7fb6d7d8d5201ac1478ef26aafeae7947832c4cc7fea6315e92eb81c89a385dae378bf89ca53c6984b5aa79a7dcc139938fa64b30d7c24ff7b215c890be5756df2f441d0fcb938cb4c1f89245a47c630a2b5e28bb7b5a9c8c871c45857bc4fa646b30f485beccdf529ad0cd519a0bed9b5c7df28320d9ad7eceb30eda6c964cfcab57c8aa98b89d582792b886e41c9f6146332e31f93b", 0xcb, 0x1ff}, {&(0x7f0000000540)="5c96cd9925cbe6753ba234c06f8040f650bba8d4d4ebe59964acf97c49f7a5e793521ef728d90a4eb42cbe7a2536c6922f049b20f2c681c652b4dbe077b0a9972e1eeb5573d7ee69d6fc99d4e4894537fac772842763140c5d832bf593a5cc290fd0c641d14d06e564127871808073fb6fd27f2a9995b29abce9351b0b285f4887f1cc8de04d147141af2ed66cfb66fd230e329273710457efc72a8d09487b5c83e77201b28eb38d7d3846b63b1bf1233b5c925303dd3214066c99381b0457a62397c7df27f88e19a884e1dfa6", 0xcd, 0x6}, {&(0x7f0000000640)="8ae3f201063e83beadb088cb1080ef67", 0x10, 0x2a}, {&(0x7f0000000680)="dfeed81fb09a8a0d55f0999ce7730866db77fa306b896464e4d9cf133371563c7eb734eed8ec2dda58c030b96771bb708fba592614b985c573e8f3db424553c6", 0x40, 0x4}, {&(0x7f00000006c0)="f33dec9b5d96888f1504b1385ce82fdf8f2fa76ecc6ebf567753242a4c9129cd4c4885ba8bab1fd3120749889c981acccb344645e9d1ce95826ab7ceac8b7646d2e476e8934ac444aad3bba14f0d4be15675cd3d336db510c72ebbc07a000754d66f5282b1f241556cbd63a30b3d6af0f5c8a2443b03a92bb406abbb5f630ce1ef2afbba93c29e6bc46901a91ea9d91fa6048a468df5934437ca7e9e2a4fe38fddcd2aecac9406aa7adf5de93082ebf1b5c74d76b7b1b72a9b6fea1c5ab7cc1f3e97b5d7e1db9a64df9836ce0863cda956a1e2a45b9479b8ade23e81258e9444dfbf8066562f79", 0xe7, 0x7}, {&(0x7f00000007c0)="cd72eca63713ca8a35c3557b7d56b6a3073ca69e2067c18f5120c05d4ee8", 0x1e, 0x6}], 0x1, &(0x7f0000000a80)={[{@barrier='barrier'}, {@gid={'gid', 0x3d, r0}}, {@nodecompose='nodecompose'}, {@uid={'uid'}}, {@type={'type', 0x3d, "ae8c9d8f"}}, {@decompose='decompose'}, {@session={'session', 0x3d, 0x25}}], [{@uid_eq={'uid'}}, {@obj_type={'obj_type', 0x3d, 'overlay\x00'}}, {@euid_eq={'euid'}}, {@uid_eq={'uid'}}]}) 11:46:26 executing program 3: syz_mount_image$hfsplus(0x0, &(0x7f0000000200)='./file0\x00', 0x3, 0x7, &(0x7f0000000800)=[{&(0x7f0000000400)="e1ec051c0b7b96db7480b4620be1f7d4adcb21d5233a3d23bf43659e5359470de231dd734b698cd71201837ca57f911328e1aee6b2cb39533b2d549e", 0x3c, 0x101}, {&(0x7f0000000440)="dbac23926131781587488e056e40b191269651683d0d195cbd63543040e313e20126fd634002e0256fed786d07054466250e2de6b7fb6d7d8d5201ac1478ef26aafeae7947832c4cc7fea6315e92eb81c89a385dae378bf89ca53c6984b5aa79a7dcc139938fa64b30d7c24ff7b215c890be5756df2f441d0fcb938cb4c1f89245a47c630a2b5e28bb7b5a9c8c871c45857bc4fa646b30f485beccdf529ad0cd519a0bed9b5c7df28320d9ad7eceb30eda6c964cfcab57c8aa98b89d582792b886e41c9f6146332e31f93b", 0xcb, 0x1ff}, {&(0x7f0000000540)="5c96cd9925cbe6753ba234c06f8040f650bba8d4d4ebe59964acf97c49f7a5e793521ef728d90a4eb42cbe7a2536c6922f049b20f2c681c652b4dbe077b0a9972e1eeb5573d7ee69d6fc99d4e4894537fac772842763140c5d832bf593a5cc290fd0c641d14d06e564127871808073fb6fd27f2a9995b29abce9351b0b285f4887f1cc8de04d147141af2ed66cfb66fd230e329273710457efc72a8d09487b5c83e77201b28eb38d7d3846b63b1bf1233b5c925303dd3214066c99381b0457a62397c7df27f88e19a884e1dfa6", 0xcd, 0x6}, {&(0x7f0000000640)="8ae3f201063e83beadb088cb1080ef67", 0x10, 0x2a}, {&(0x7f0000000680)="dfeed81fb09a8a0d55f0999ce7730866db77fa306b896464e4d9cf133371563c7eb734eed8ec2dda58c030b96771bb708fba592614b985c573e8f3db424553c6", 0x40, 0x4}, {&(0x7f00000006c0)="f33dec9b5d96888f1504b1385ce82fdf8f2fa76ecc6ebf567753242a4c9129cd4c4885ba8bab1fd3120749889c981acccb344645e9d1ce95826ab7ceac8b7646d2e476e8934ac444aad3bba14f0d4be15675cd3d336db510c72ebbc07a000754d66f5282b1f241556cbd63a30b3d6af0f5c8a2443b03a92bb406abbb5f630ce1ef2afbba93c29e6bc46901a91ea9d91fa6048a468df5934437ca7e9e2a4fe38fddcd2aecac9406aa7adf5de93082ebf1b5c74d76b7b1b72a9b6fea1c5ab7cc1f3e97b5d7e1db9a64df9836ce0863cda956a1e2a45b9479b8ade23e81258e9444dfbf8066562f79", 0xe7, 0x7}, {&(0x7f00000007c0)="cd72eca63713ca8a35c3557b7d56b6a3073ca69e2067c18f5120c05d4ee8", 0x1e, 0x6}], 0x1, &(0x7f0000000a80)={[{@barrier='barrier'}, {@gid={'gid'}}, {@nodecompose='nodecompose'}, {@uid={'uid'}}, {@type={'type', 0x3d, "ae8c9d8f"}}, {@decompose='decompose'}, {@session={'session', 0x3d, 0x25}}], [{@uid_eq={'uid'}}, {@obj_type={'obj_type', 0x3d, 'overlay\x00'}}, {@euid_eq={'euid'}}, {@uid_eq={'uid'}}]}) [ 261.952867][T10873] FAULT_INJECTION: forcing a failure. [ 261.952867][T10873] name failslab, interval 1, probability 0, space 0, times 0 [ 261.982274][T10878] overlayfs: unrecognized mount option "uppFrdir=./file0" or missing value [ 261.992684][T10879] overlayfs: unrecognized mount option "uppFrdir=./file0" or missing value [ 262.008913][T10873] CPU: 0 PID: 10873 Comm: syz-executor.1 Not tainted 5.3.0+ #0 [ 262.016475][T10873] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 262.026535][T10873] Call Trace: [ 262.029837][T10873] dump_stack+0x172/0x1f0 [ 262.034192][T10873] should_fail.cold+0xa/0x15 [ 262.038805][T10873] ? fault_create_debugfs_attr+0x180/0x180 [ 262.044641][T10873] __should_failslab+0x121/0x190 [ 262.049600][T10873] should_failslab+0x9/0x14 [ 262.054112][T10873] kmem_cache_alloc+0x47/0x710 [ 262.058872][T10873] ? lock_acquire+0x190/0x410 [ 262.063540][T10873] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 262.069782][T10873] skb_clone+0x154/0x3d0 [ 262.074025][T10873] netlink_deliver_tap+0x94d/0xbf0 [ 262.079246][T10873] netlink_unicast+0x5a2/0x710 [ 262.084003][T10873] ? netlink_attachskb+0x7c0/0x7c0 [ 262.089112][T10873] ? _copy_from_iter_full+0x25d/0x8c0 [ 262.094575][T10873] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 262.100808][T10873] netlink_sendmsg+0x8a5/0xd60 [ 262.105566][T10873] ? netlink_unicast+0x710/0x710 [ 262.110504][T10873] ? tomoyo_socket_sendmsg+0x26/0x30 [ 262.115791][T10873] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 262.122099][T10873] ? security_socket_sendmsg+0x8d/0xc0 [ 262.127567][T10873] ? netlink_unicast+0x710/0x710 [ 262.132507][T10873] sock_sendmsg+0xd7/0x130 [ 262.136914][T10873] ___sys_sendmsg+0x803/0x920 [ 262.141582][T10873] ? copy_msghdr_from_user+0x440/0x440 [ 262.147050][T10873] ? __kasan_check_read+0x11/0x20 [ 262.152136][T10873] ? __fget+0x384/0x560 [ 262.156282][T10873] ? ksys_dup3+0x3e0/0x3e0 [ 262.160710][T10873] ? __fget_light+0x1a9/0x230 [ 262.165390][T10873] ? __fdget+0x1b/0x20 [ 262.169459][T10873] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 262.175710][T10873] __sys_sendmsg+0x105/0x1d0 [ 262.180292][T10873] ? __sys_sendmsg_sock+0xd0/0xd0 [ 262.185453][T10873] ? trace_hardirqs_on_thunk+0x1a/0x20 [ 262.190910][T10873] ? do_syscall_64+0x26/0x760 [ 262.195681][T10873] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 262.201822][T10873] ? do_syscall_64+0x26/0x760 [ 262.206504][T10873] __x64_sys_sendmsg+0x78/0xb0 [ 262.211288][T10873] do_syscall_64+0xfa/0x760 [ 262.215793][T10873] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 262.221676][T10873] RIP: 0033:0x459a29 [ 262.225558][T10873] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 262.245156][T10873] RSP: 002b:00007f5e254b1c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e 11:46:27 executing program 4: r0 = socket$netlink(0x10, 0x3, 0xf) bind$netlink(r0, &(0x7f0000514ff4), 0xc) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000000), 0x4) setsockopt$netlink_NETLINK_BROADCAST_ERROR(r0, 0x10e, 0x4, &(0x7f0000000080)=0x6, 0x4) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)={0x14, 0x23, 0x1, 0x0, 0x0, {0x20000000004, 0xe00000000000000}}, 0x14}}, 0x0) [ 262.253557][T10873] RAX: ffffffffffffffda RBX: 00007f5e254b1c90 RCX: 0000000000459a29 [ 262.261524][T10873] RDX: 0000000000000000 RSI: 0000000020000100 RDI: 0000000000000003 [ 262.269495][T10873] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 262.277470][T10873] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f5e254b26d4 [ 262.285435][T10873] R13: 00000000004c7940 R14: 00000000004dd350 R15: 0000000000000004 11:46:27 executing program 1 (fault-call:3 fault-nth:3): setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) setsockopt$netlink_NETLINK_BROADCAST_ERROR(0xffffffffffffffff, 0x10e, 0x4, 0x0, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)={0x14, 0x23, 0x1, 0x0, 0x0, {0x20000000004, 0xe00000000000000}}, 0x14}}, 0x0) [ 262.382388][T10879] hfsplus: unable to parse mount options [ 262.389163][T10878] hfsplus: unable to parse mount options 11:46:27 executing program 3: syz_mount_image$hfsplus(0x0, &(0x7f0000000200)='./file0\x00', 0x3, 0x7, &(0x7f0000000800)=[{&(0x7f0000000400)="e1ec051c0b7b96db7480b4620be1f7d4adcb21d5233a3d23bf43659e5359470de231dd734b698cd71201837ca57f911328e1aee6b2cb39533b2d549e", 0x3c, 0x101}, {&(0x7f0000000440)="dbac23926131781587488e056e40b191269651683d0d195cbd63543040e313e20126fd634002e0256fed786d07054466250e2de6b7fb6d7d8d5201ac1478ef26aafeae7947832c4cc7fea6315e92eb81c89a385dae378bf89ca53c6984b5aa79a7dcc139938fa64b30d7c24ff7b215c890be5756df2f441d0fcb938cb4c1f89245a47c630a2b5e28bb7b5a9c8c871c45857bc4fa646b30f485beccdf529ad0cd519a0bed9b5c7df28320d9ad7eceb30eda6c964cfcab57c8aa98b89d582792b886e41c9f6146332e31f93b", 0xcb, 0x1ff}, {&(0x7f0000000540)="5c96cd9925cbe6753ba234c06f8040f650bba8d4d4ebe59964acf97c49f7a5e793521ef728d90a4eb42cbe7a2536c6922f049b20f2c681c652b4dbe077b0a9972e1eeb5573d7ee69d6fc99d4e4894537fac772842763140c5d832bf593a5cc290fd0c641d14d06e564127871808073fb6fd27f2a9995b29abce9351b0b285f4887f1cc8de04d147141af2ed66cfb66fd230e329273710457efc72a8d09487b5c83e77201b28eb38d7d3846b63b1bf1233b5c925303dd3214066c99381b0457a62397c7df27f88e19a884e1dfa6", 0xcd, 0x6}, {&(0x7f0000000640)="8ae3f201063e83beadb088cb1080ef67", 0x10, 0x2a}, {&(0x7f0000000680)="dfeed81fb09a8a0d55f0999ce7730866db77fa306b896464e4d9cf133371563c7eb734eed8ec2dda58c030b96771bb708fba592614b985c573e8f3db424553c6", 0x40, 0x4}, {&(0x7f00000006c0)="f33dec9b5d96888f1504b1385ce82fdf8f2fa76ecc6ebf567753242a4c9129cd4c4885ba8bab1fd3120749889c981acccb344645e9d1ce95826ab7ceac8b7646d2e476e8934ac444aad3bba14f0d4be15675cd3d336db510c72ebbc07a000754d66f5282b1f241556cbd63a30b3d6af0f5c8a2443b03a92bb406abbb5f630ce1ef2afbba93c29e6bc46901a91ea9d91fa6048a468df5934437ca7e9e2a4fe38fddcd2aecac9406aa7adf5de93082ebf1b5c74d76b7b1b72a9b6fea1c5ab7cc1f3e97b5d7e1db9a64df9836ce0863cda956a1e2a45b9479b8ade23e81258e9444dfbf8066562f79", 0xe7, 0x7}, {&(0x7f00000007c0)="cd72eca63713ca8a35c3557b7d56b6a3073ca69e2067c18f5120c05d4ee8", 0x1e, 0x6}], 0x1, &(0x7f0000000a80)={[{@barrier='barrier'}, {@gid={'gid'}}, {@nodecompose='nodecompose'}, {@uid={'uid'}}, {@type={'type', 0x3d, "ae8c9d8f"}}, {@decompose='decompose'}, {@session={'session', 0x3d, 0x25}}], [{@uid_eq={'uid'}}, {@obj_type={'obj_type', 0x3d, 'overlay\x00'}}, {@euid_eq={'euid'}}, {@uid_eq={'uid'}}]}) 11:46:27 executing program 5: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='devtmpfs\x00', 0x0, 0x0) chdir(&(0x7f00000000c0)='./file0\x00') pipe(0x0) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mkdir(0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$overlay(0x40000f, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="75707046726469723d2e2f66696c65302c6c6f7765726469723d2e2f66696c65302c776f726b6469723d2e2f66696c65315c008dd712eb4c4602d39078433581919e8b817a1c09fe8e181081519b7a8259793b8c4b1093736b8d3ef3d64781796455ea1b29412fabd4fd749cbdbadd5d4fa6dad18d59235262aee5928a646acaa5b0b72c4348e1b0a4a52cab8fc461abde196cf60a732d195a64ce881b84bc1c085f990fd4bc2ce47e609a0daa4861948516ca0f519beaea32e38fa09e9b49538a32cce47c620ee6ce668079b8d73f89bfb329c08d9c81fe3c12bf0bf75ac36079bf34fd8eeadf965d333527ebe8ede05feec022e592e9e2e2be551753056d32048241d2b3ee3344aa57e1fe8f604132f549432ccf86af2039192fc4fdddf19ffd0d42de"]) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000240)='cgroup2\x00', 0x0, 0x0) fstat(0xffffffffffffffff, &(0x7f00000008c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000005ec0)={{{@in6=@empty, @in=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@remote}, 0x0, @in6=@mcast2}}, &(0x7f0000004800)=0xffffffffffffffc3) r3 = geteuid() setsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f00000060c0)={{{@in=@remote, @in6=@rand_addr="20bbcbd1865253e3e58aa219d6ca6440", 0x4e21, 0x2400000000000000, 0x4e22, 0x0, 0xa, 0xa0, 0x0, 0x67, r2, r3}, {0x6, 0x183, 0x3, 0x7f, 0x61553a0b, 0x9, 0x1, 0x4}, {0x20, 0x80000001, 0x2000000000001, 0x9}, 0x9, 0x6e6bba, 0x0, 0x0, 0x1, 0x3}, {{@in=@empty, 0x4d3, 0x3c}, 0xa, @in=@loopback, 0x3504, 0x0, 0x3, 0xfffffffffffffffc, 0x1ff, 0x5, 0x6}}, 0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000940)={{{@in6, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@dev}, 0x0, @in6=@local}}, &(0x7f0000000a40)=0xe8) r5 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r5, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") getsockopt$inet_IP_IPSEC_POLICY(r5, 0x0, 0x10, &(0x7f0000005ec0)={{{@in6=@empty, @in=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@remote}, 0x0, @in6=@mcast2}}, &(0x7f0000004800)=0xffffffffffffffc3) r7 = geteuid() setsockopt$inet_IP_XFRM_POLICY(r5, 0x0, 0x11, &(0x7f00000060c0)={{{@in=@remote, @in6=@rand_addr="20bbcbd1865253e3e58aa219d6ca6440", 0x4e21, 0x2400000000000000, 0x4e22, 0x0, 0xa, 0xa0, 0x0, 0x67, r6, r7}, {0x6, 0x183, 0x3, 0x7f, 0x61553a0b, 0x9, 0x1, 0x4}, {0x20, 0x80000001, 0x2000000000001, 0x9}, 0x9, 0x6e6bba, 0x0, 0x0, 0x1, 0x3}, {{@in=@empty, 0x4d3, 0x3c}, 0xa, @in=@loopback, 0x3504, 0x0, 0x3, 0xfffffffffffffffc, 0x1ff, 0x5, 0x6}}, 0xe8) syz_mount_image$hfsplus(&(0x7f0000000140)='hfsplus\x00', &(0x7f0000000200)='./file0\x00', 0x3, 0x7, &(0x7f0000000800)=[{&(0x7f0000000400)="e1ec051c0b7b96db7480b4620be1f7d4adcb21d5233a3d23bf43659e5359470de231dd734b698cd71201837ca57f911328e1aee6b2cb39533b2d549e", 0x3c, 0x101}, {&(0x7f0000000440)="dbac23926131781587488e056e40b191269651683d0d195cbd63543040e313e20126fd634002e0256fed786d07054466250e2de6b7fb6d7d8d5201ac1478ef26aafeae7947832c4cc7fea6315e92eb81c89a385dae378bf89ca53c6984b5aa79a7dcc139938fa64b30d7c24ff7b215c890be5756df2f441d0fcb938cb4c1f89245a47c630a2b5e28bb7b5a9c8c871c45857bc4fa646b30f485beccdf529ad0cd519a0bed9b5c7df28320d9ad7eceb30eda6c964cfcab57c8aa98b89d582792b886e41c9f6146332e31f93b", 0xcb, 0x1ff}, {&(0x7f0000000540)="5c96cd9925cbe6753ba234c06f8040f650bba8d4d4ebe59964acf97c49f7a5e793521ef728d90a4eb42cbe7a2536c6922f049b20f2c681c652b4dbe077b0a9972e1eeb5573d7ee69d6fc99d4e4894537fac772842763140c5d832bf593a5cc290fd0c641d14d06e564127871808073fb6fd27f2a9995b29abce9351b0b285f4887f1cc8de04d147141af2ed66cfb66fd230e329273710457efc72a8d09487b5c83e77201b28eb38d7d3846b63b1bf1233b5c925303dd3214066c99381b0457a62397c7df27f88e19a884e1dfa6", 0xcd, 0x6}, {&(0x7f0000000640)="8ae3f201063e83beadb088cb1080ef67", 0x10, 0x2a}, {&(0x7f0000000680)="dfeed81fb09a8a0d55f0999ce7730866db77fa306b896464e4d9cf133371563c7eb734eed8ec2dda58c030b96771bb708fba592614b985c573e8f3db424553c6", 0x40, 0x4}, {&(0x7f00000006c0)="f33dec9b5d96888f1504b1385ce82fdf8f2fa76ecc6ebf567753242a4c9129cd4c4885ba8bab1fd3120749889c981acccb344645e9d1ce95826ab7ceac8b7646d2e476e8934ac444aad3bba14f0d4be15675cd3d336db510c72ebbc07a000754d66f5282b1f241556cbd63a30b3d6af0f5c8a2443b03a92bb406abbb5f630ce1ef2afbba93c29e6bc46901a91ea9d91fa6048a468df5934437ca7e9e2a4fe38fddcd2aecac9406aa7adf5de93082ebf1b5c74d76b7b1b72a9b6fea1c5ab7cc1f3e97b5d7e1db9a64df9836ce0863cda956a1e2a45b9479b8ade23e81258e9444dfbf8066562f79", 0xe7, 0x7}, {&(0x7f00000007c0)="cd72eca63713ca8a35c3557b7d56b6a3073ca69e2067c18f5120c05d4ee8", 0x1e, 0x6}], 0x1, &(0x7f0000000a80)={[{@barrier='barrier'}, {@gid={'gid', 0x3d, r0}}, {@nodecompose='nodecompose'}, {@uid={'uid', 0x3d, r3}}, {@type={'type', 0x3d, "ae8c9d8f"}}, {@decompose='decompose'}, {@session={'session', 0x3d, 0x25}}], [{@uid_eq={'uid', 0x3d, r4}}, {@obj_type={'obj_type', 0x3d, 'overlay\x00'}}, {@euid_eq={'euid', 0x3d, r7}}, {@uid_eq={'uid'}}]}) 11:46:27 executing program 0: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='devtmpfs\x00', 0x0, 0x0) chdir(&(0x7f00000000c0)='./file0\x00') pipe(0x0) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mkdir(0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$overlay(0x40000f, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="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"]) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000240)='cgroup2\x00', 0x0, 0x0) syz_mount_image$hfsplus(&(0x7f0000000140)='hfsplus\x00', &(0x7f0000000200)='./file0\x00', 0x3, 0x7, &(0x7f0000000800)=[{&(0x7f0000000400)="e1ec051c0b7b96db7480b4620be1f7d4adcb21d5233a3d23bf43659e5359470de231dd734b698cd71201837ca57f911328e1aee6b2cb39533b2d549e", 0x3c, 0x101}, {&(0x7f0000000440)="dbac23926131781587488e056e40b191269651683d0d195cbd63543040e313e20126fd634002e0256fed786d07054466250e2de6b7fb6d7d8d5201ac1478ef26aafeae7947832c4cc7fea6315e92eb81c89a385dae378bf89ca53c6984b5aa79a7dcc139938fa64b30d7c24ff7b215c890be5756df2f441d0fcb938cb4c1f89245a47c630a2b5e28bb7b5a9c8c871c45857bc4fa646b30f485beccdf529ad0cd519a0bed9b5c7df28320d9ad7eceb30eda6c964cfcab57c8aa98b89d582792b886e41c9f6146332e31f93b", 0xcb, 0x1ff}, {&(0x7f0000000540)="5c96cd9925cbe6753ba234c06f8040f650bba8d4d4ebe59964acf97c49f7a5e793521ef728d90a4eb42cbe7a2536c6922f049b20f2c681c652b4dbe077b0a9972e1eeb5573d7ee69d6fc99d4e4894537fac772842763140c5d832bf593a5cc290fd0c641d14d06e564127871808073fb6fd27f2a9995b29abce9351b0b285f4887f1cc8de04d147141af2ed66cfb66fd230e329273710457efc72a8d09487b5c83e77201b28eb38d7d3846b63b1bf1233b5c925303dd3214066c99381b0457a62397c7df27f88e19a884e1dfa6", 0xcd, 0x6}, {&(0x7f0000000640)="8ae3f201063e83beadb088cb1080ef67", 0x10, 0x2a}, {&(0x7f0000000680)="dfeed81fb09a8a0d55f0999ce7730866db77fa306b896464e4d9cf133371563c7eb734eed8ec2dda58c030b96771bb708fba592614b985c573e8f3db424553c6", 0x40, 0x4}, {&(0x7f00000006c0)="f33dec9b5d96888f1504b1385ce82fdf8f2fa76ecc6ebf567753242a4c9129cd4c4885ba8bab1fd3120749889c981acccb344645e9d1ce95826ab7ceac8b7646d2e476e8934ac444aad3bba14f0d4be15675cd3d336db510c72ebbc07a000754d66f5282b1f241556cbd63a30b3d6af0f5c8a2443b03a92bb406abbb5f630ce1ef2afbba93c29e6bc46901a91ea9d91fa6048a468df5934437ca7e9e2a4fe38fddcd2aecac9406aa7adf5de93082ebf1b5c74d76b7b1b72a9b6fea1c5ab7cc1f3e97b5d7e1db9a64df9836ce0863cda956a1e2a45b9479b8ade23e81258e9444dfbf8066562f79", 0xe7, 0x7}, {&(0x7f00000007c0)="cd72eca63713ca8a35c3557b7d56b6a3073ca69e2067c18f5120c05d4ee8", 0x1e, 0x6}], 0x1, &(0x7f0000000a80)={[{@barrier='barrier'}, {@gid={'gid'}}, {@nodecompose='nodecompose'}, {@uid={'uid'}}, {@type={'type', 0x3d, "ae8c9d8f"}}, {@decompose='decompose'}, {@session={'session', 0x3d, 0x25}}], [{@uid_eq={'uid'}}, {@obj_type={'obj_type', 0x3d, 'overlay\x00'}}, {@euid_eq={'euid'}}, {@uid_eq={'uid'}}]}) [ 262.574441][T10880] IPVS: ftp: loaded support on port[0] = 21 [ 262.645327][T10896] FAULT_INJECTION: forcing a failure. [ 262.645327][T10896] name failslab, interval 1, probability 0, space 0, times 0 11:46:27 executing program 4: r0 = socket$netlink(0x10, 0x3, 0xf) bind$netlink(r0, &(0x7f0000514ff4), 0xc) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000000), 0x4) setsockopt$netlink_NETLINK_BROADCAST_ERROR(r0, 0x10e, 0x4, &(0x7f0000000080)=0x6, 0x4) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)={0x14, 0x23, 0x1, 0x0, 0x0, {0x20000000004, 0xe00000000000000}}, 0x14}}, 0x0) [ 262.713196][T10902] overlayfs: unrecognized mount option "uppFrdir=./file0" or missing value [ 262.768801][T10896] CPU: 1 PID: 10896 Comm: syz-executor.1 Not tainted 5.3.0+ #0 [ 262.769335][T10906] overlayfs: unrecognized mount option "uppFrdir=./file0" or missing value [ 262.776489][T10896] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 262.776496][T10896] Call Trace: [ 262.776520][T10896] dump_stack+0x172/0x1f0 [ 262.776552][T10896] should_fail.cold+0xa/0x15 [ 262.776574][T10896] ? fault_create_debugfs_attr+0x180/0x180 [ 262.776599][T10896] ? ___might_sleep+0x163/0x2c0 [ 262.776620][T10896] __should_failslab+0x121/0x190 [ 262.776639][T10896] should_failslab+0x9/0x14 [ 262.776654][T10896] __kmalloc+0x2e0/0x770 [ 262.776674][T10896] ? mark_held_locks+0xa4/0xf0 [ 262.776756][T10896] ? wiphy_new_nm+0x6f0/0x1ed0 [ 262.776779][T10896] wiphy_new_nm+0x6f0/0x1ed0 [ 262.776821][T10896] ieee80211_alloc_hw_nm+0x3df/0x20e0 [ 262.776839][T10896] ? __local_bh_enable_ip+0x15a/0x270 [ 262.776899][T10896] mac80211_hwsim_new_radio+0x1ef/0x4360 [ 262.776920][T10896] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 262.776937][T10896] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 262.776954][T10896] ? cred_has_capability+0x199/0x330 [ 262.776971][T10896] ? selinux_sb_eat_lsm_opts+0x700/0x700 [ 262.776989][T10896] ? selinux_sb_eat_lsm_opts+0x700/0x700 [ 262.777001][T10896] ? __kasan_check_read+0x11/0x20 [ 262.777020][T10896] ? hwsim_cloned_frame_received_nl+0x1640/0x1640 [ 262.777036][T10896] ? memset+0x32/0x40 [ 262.777055][T10896] hwsim_new_radio_nl+0x9e3/0x1070 [ 262.777075][T10896] ? mac80211_hwsim_new_radio+0x4360/0x4360 [ 262.777090][T10896] ? nla_memcpy+0xb0/0xb0 [ 262.777117][T10896] ? __nla_parse+0x43/0x60 [ 262.777140][T10896] genl_family_rcv_msg+0x74b/0xf90 [ 262.777165][T10896] ? genl_unregister_family+0x7b0/0x7b0 [ 262.777180][T10896] ? __kasan_check_read+0x11/0x20 [ 262.777195][T10896] ? __lock_acquire+0x16f2/0x4a00 [ 262.777217][T10896] ? __dev_queue_xmit+0xbb5/0x3720 [ 262.777254][T10896] genl_rcv_msg+0xca/0x170 [ 262.777275][T10896] netlink_rcv_skb+0x177/0x450 [ 262.777293][T10896] ? genl_family_rcv_msg+0xf90/0xf90 [ 262.777314][T10896] ? netlink_ack+0xb50/0xb50 [ 262.777329][T10896] ? __kasan_check_write+0x14/0x20 [ 262.777350][T10896] ? netlink_deliver_tap+0x254/0xbf0 [ 262.777373][T10896] genl_rcv+0x29/0x40 [ 262.777388][T10896] netlink_unicast+0x531/0x710 [ 262.777409][T10896] ? netlink_attachskb+0x7c0/0x7c0 [ 262.777422][T10896] ? _copy_from_iter_full+0x25d/0x8c0 [ 262.777443][T10896] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 262.777463][T10896] netlink_sendmsg+0x8a5/0xd60 [ 262.863270][T10896] ? netlink_unicast+0x710/0x710 [ 262.863299][T10896] ? tomoyo_socket_sendmsg+0x26/0x30 [ 262.863317][T10896] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 262.881231][T10896] ? security_socket_sendmsg+0x8d/0xc0 [ 262.881250][T10896] ? netlink_unicast+0x710/0x710 [ 262.881280][T10896] sock_sendmsg+0xd7/0x130 [ 262.881298][T10896] ___sys_sendmsg+0x803/0x920 [ 262.881317][T10896] ? copy_msghdr_from_user+0x440/0x440 [ 262.881339][T10896] ? __kasan_check_read+0x11/0x20 [ 262.892580][T10896] ? __fget+0x384/0x560 [ 262.892604][T10896] ? ksys_dup3+0x3e0/0x3e0 [ 262.892631][T10896] ? __fget_light+0x1a9/0x230 [ 262.892650][T10896] ? __fdget+0x1b/0x20 [ 262.892668][T10896] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 262.892693][T10896] __sys_sendmsg+0x105/0x1d0 [ 262.904103][T10896] ? __sys_sendmsg_sock+0xd0/0xd0 [ 262.904135][T10896] ? trace_hardirqs_on_thunk+0x1a/0x20 [ 262.904151][T10896] ? do_syscall_64+0x26/0x760 [ 262.904167][T10896] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 262.904183][T10896] ? do_syscall_64+0x26/0x760 [ 262.904205][T10896] __x64_sys_sendmsg+0x78/0xb0 [ 262.913270][T10896] do_syscall_64+0xfa/0x760 [ 262.913291][T10896] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 262.913302][T10896] RIP: 0033:0x459a29 [ 262.913317][T10896] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 262.913326][T10896] RSP: 002b:00007f5e254b1c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 262.913340][T10896] RAX: ffffffffffffffda RBX: 00007f5e254b1c90 RCX: 0000000000459a29 [ 262.913348][T10896] RDX: 0000000000000000 RSI: 0000000020000100 RDI: 0000000000000003 [ 262.913357][T10896] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 262.913365][T10896] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f5e254b26d4 [ 262.913377][T10896] R13: 00000000004c7940 R14: 00000000004dd350 R15: 0000000000000004 [ 263.245452][T10909] hfsplus: unable to parse mount options [ 263.270251][T10902] hfsplus: unable to parse mount options 11:46:30 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_FSGETXATTR(0xffffffffffffffff, 0x8004550f, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x1}, 0x10) r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r0, &(0x7f0000000000)={{0x6, @rose}, [@rose, @rose, @default, @netrom, @bcast, @rose, @rose, @null]}, 0x48) openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000080)='/dev/qat_adf_ctl\x00', 0x8200, 0x0) listen(r0, 0x0) unshare(0x40000000) setrlimit(0x0, 0x0) r1 = accept(r0, 0x0, 0x0) write$binfmt_elf64(r1, &(0x7f00000002c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x9, 0x8, 0x0, 0x0, 0x0, 0x4825483b35c83c0b, 0x0, 0x0, 0x40, 0x227}, [{0x4, 0x1, 0xfff, 0x0, 0x0, 0xff8000000002, 0x0, 0x7fff}], "", [[], [], []]}, 0x378) 11:46:30 executing program 1 (fault-call:3 fault-nth:4): setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) setsockopt$netlink_NETLINK_BROADCAST_ERROR(0xffffffffffffffff, 0x10e, 0x4, 0x0, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)={0x14, 0x23, 0x1, 0x0, 0x0, {0x20000000004, 0xe00000000000000}}, 0x14}}, 0x0) 11:46:30 executing program 3: syz_mount_image$hfsplus(0x0, &(0x7f0000000200)='./file0\x00', 0x3, 0x7, &(0x7f0000000800)=[{&(0x7f0000000400)="e1ec051c0b7b96db7480b4620be1f7d4adcb21d5233a3d23bf43659e5359470de231dd734b698cd71201837ca57f911328e1aee6b2cb39533b2d549e", 0x3c, 0x101}, {&(0x7f0000000440)="dbac23926131781587488e056e40b191269651683d0d195cbd63543040e313e20126fd634002e0256fed786d07054466250e2de6b7fb6d7d8d5201ac1478ef26aafeae7947832c4cc7fea6315e92eb81c89a385dae378bf89ca53c6984b5aa79a7dcc139938fa64b30d7c24ff7b215c890be5756df2f441d0fcb938cb4c1f89245a47c630a2b5e28bb7b5a9c8c871c45857bc4fa646b30f485beccdf529ad0cd519a0bed9b5c7df28320d9ad7eceb30eda6c964cfcab57c8aa98b89d582792b886e41c9f6146332e31f93b", 0xcb, 0x1ff}, {&(0x7f0000000540)="5c96cd9925cbe6753ba234c06f8040f650bba8d4d4ebe59964acf97c49f7a5e793521ef728d90a4eb42cbe7a2536c6922f049b20f2c681c652b4dbe077b0a9972e1eeb5573d7ee69d6fc99d4e4894537fac772842763140c5d832bf593a5cc290fd0c641d14d06e564127871808073fb6fd27f2a9995b29abce9351b0b285f4887f1cc8de04d147141af2ed66cfb66fd230e329273710457efc72a8d09487b5c83e77201b28eb38d7d3846b63b1bf1233b5c925303dd3214066c99381b0457a62397c7df27f88e19a884e1dfa6", 0xcd, 0x6}, {&(0x7f0000000640)="8ae3f201063e83beadb088cb1080ef67", 0x10, 0x2a}, {&(0x7f0000000680)="dfeed81fb09a8a0d55f0999ce7730866db77fa306b896464e4d9cf133371563c7eb734eed8ec2dda58c030b96771bb708fba592614b985c573e8f3db424553c6", 0x40, 0x4}, {&(0x7f00000006c0)="f33dec9b5d96888f1504b1385ce82fdf8f2fa76ecc6ebf567753242a4c9129cd4c4885ba8bab1fd3120749889c981acccb344645e9d1ce95826ab7ceac8b7646d2e476e8934ac444aad3bba14f0d4be15675cd3d336db510c72ebbc07a000754d66f5282b1f241556cbd63a30b3d6af0f5c8a2443b03a92bb406abbb5f630ce1ef2afbba93c29e6bc46901a91ea9d91fa6048a468df5934437ca7e9e2a4fe38fddcd2aecac9406aa7adf5de93082ebf1b5c74d76b7b1b72a9b6fea1c5ab7cc1f3e97b5d7e1db9a64df9836ce0863cda956a1e2a45b9479b8ade23e81258e9444dfbf8066562f79", 0xe7, 0x7}, {&(0x7f00000007c0)="cd72eca63713ca8a35c3557b7d56b6a3073ca69e2067c18f5120c05d4ee8", 0x1e, 0x6}], 0x1, &(0x7f0000000a80)={[{@barrier='barrier'}, {@gid={'gid'}}, {@nodecompose='nodecompose'}, {@uid={'uid'}}, {@type={'type', 0x3d, "ae8c9d8f"}}, {@decompose='decompose'}, {@session={'session', 0x3d, 0x25}}], [{@uid_eq={'uid'}}, {@obj_type={'obj_type', 0x3d, 'overlay\x00'}}, {@euid_eq={'euid'}}, {@uid_eq={'uid'}}]}) 11:46:30 executing program 5: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='devtmpfs\x00', 0x0, 0x0) chdir(&(0x7f00000000c0)='./file0\x00') pipe(0x0) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mkdir(0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$overlay(0x40000f, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="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"]) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000240)='cgroup2\x00', 0x0, 0x0) fstat(0xffffffffffffffff, &(0x7f00000008c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000005ec0)={{{@in6=@empty, @in=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@remote}, 0x0, @in6=@mcast2}}, &(0x7f0000004800)=0xffffffffffffffc3) r3 = geteuid() setsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f00000060c0)={{{@in=@remote, @in6=@rand_addr="20bbcbd1865253e3e58aa219d6ca6440", 0x4e21, 0x2400000000000000, 0x4e22, 0x0, 0xa, 0xa0, 0x0, 0x67, r2, r3}, {0x6, 0x183, 0x3, 0x7f, 0x61553a0b, 0x9, 0x1, 0x4}, {0x20, 0x80000001, 0x2000000000001, 0x9}, 0x9, 0x6e6bba, 0x0, 0x0, 0x1, 0x3}, {{@in=@empty, 0x4d3, 0x3c}, 0xa, @in=@loopback, 0x3504, 0x0, 0x3, 0xfffffffffffffffc, 0x1ff, 0x5, 0x6}}, 0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000940)={{{@in6, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@dev}, 0x0, @in6=@local}}, &(0x7f0000000a40)=0xe8) r5 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r5, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") getsockopt$inet_IP_IPSEC_POLICY(r5, 0x0, 0x10, &(0x7f0000005ec0)={{{@in6=@empty, @in=@local}}, {{@in6=@remote}, 0x0, @in6=@mcast2}}, &(0x7f0000004800)=0xffffffffffffffc3) r6 = geteuid() syz_mount_image$hfsplus(&(0x7f0000000140)='hfsplus\x00', &(0x7f0000000200)='./file0\x00', 0x3, 0x7, &(0x7f0000000800)=[{&(0x7f0000000400)="e1ec051c0b7b96db7480b4620be1f7d4adcb21d5233a3d23bf43659e5359470de231dd734b698cd71201837ca57f911328e1aee6b2cb39533b2d549e", 0x3c, 0x101}, {&(0x7f0000000440)="dbac23926131781587488e056e40b191269651683d0d195cbd63543040e313e20126fd634002e0256fed786d07054466250e2de6b7fb6d7d8d5201ac1478ef26aafeae7947832c4cc7fea6315e92eb81c89a385dae378bf89ca53c6984b5aa79a7dcc139938fa64b30d7c24ff7b215c890be5756df2f441d0fcb938cb4c1f89245a47c630a2b5e28bb7b5a9c8c871c45857bc4fa646b30f485beccdf529ad0cd519a0bed9b5c7df28320d9ad7eceb30eda6c964cfcab57c8aa98b89d582792b886e41c9f6146332e31f93b", 0xcb, 0x1ff}, {&(0x7f0000000540)="5c96cd9925cbe6753ba234c06f8040f650bba8d4d4ebe59964acf97c49f7a5e793521ef728d90a4eb42cbe7a2536c6922f049b20f2c681c652b4dbe077b0a9972e1eeb5573d7ee69d6fc99d4e4894537fac772842763140c5d832bf593a5cc290fd0c641d14d06e564127871808073fb6fd27f2a9995b29abce9351b0b285f4887f1cc8de04d147141af2ed66cfb66fd230e329273710457efc72a8d09487b5c83e77201b28eb38d7d3846b63b1bf1233b5c925303dd3214066c99381b0457a62397c7df27f88e19a884e1dfa6", 0xcd, 0x6}, {&(0x7f0000000640)="8ae3f201063e83beadb088cb1080ef67", 0x10, 0x2a}, {&(0x7f0000000680)="dfeed81fb09a8a0d55f0999ce7730866db77fa306b896464e4d9cf133371563c7eb734eed8ec2dda58c030b96771bb708fba592614b985c573e8f3db424553c6", 0x40, 0x4}, {&(0x7f00000006c0)="f33dec9b5d96888f1504b1385ce82fdf8f2fa76ecc6ebf567753242a4c9129cd4c4885ba8bab1fd3120749889c981acccb344645e9d1ce95826ab7ceac8b7646d2e476e8934ac444aad3bba14f0d4be15675cd3d336db510c72ebbc07a000754d66f5282b1f241556cbd63a30b3d6af0f5c8a2443b03a92bb406abbb5f630ce1ef2afbba93c29e6bc46901a91ea9d91fa6048a468df5934437ca7e9e2a4fe38fddcd2aecac9406aa7adf5de93082ebf1b5c74d76b7b1b72a9b6fea1c5ab7cc1f3e97b5d7e1db9a64df9836ce0863cda956a1e2a45b9479b8ade23e81258e9444dfbf8066562f79", 0xe7, 0x7}, {&(0x7f00000007c0)="cd72eca63713ca8a35c3557b7d56b6a3073ca69e2067c18f5120c05d4ee8", 0x1e, 0x6}], 0x1, &(0x7f0000000a80)={[{@barrier='barrier'}, {@gid={'gid', 0x3d, r0}}, {@nodecompose='nodecompose'}, {@uid={'uid', 0x3d, r3}}, {@type={'type', 0x3d, "ae8c9d8f"}}, {@decompose='decompose'}, {@session={'session', 0x3d, 0x25}}], [{@uid_eq={'uid', 0x3d, r4}}, {@obj_type={'obj_type', 0x3d, 'overlay\x00'}}, {@euid_eq={'euid', 0x3d, r6}}, {@uid_eq={'uid'}}]}) 11:46:30 executing program 0: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='devtmpfs\x00', 0x0, 0x0) chdir(&(0x7f00000000c0)='./file0\x00') pipe(0x0) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mkdir(0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$overlay(0x40000f, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="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"]) syz_mount_image$hfsplus(&(0x7f0000000140)='hfsplus\x00', &(0x7f0000000200)='./file0\x00', 0x3, 0x7, &(0x7f0000000800)=[{&(0x7f0000000400)="e1ec051c0b7b96db7480b4620be1f7d4adcb21d5233a3d23bf43659e5359470de231dd734b698cd71201837ca57f911328e1aee6b2cb39533b2d549e", 0x3c, 0x101}, {&(0x7f0000000440)="dbac23926131781587488e056e40b191269651683d0d195cbd63543040e313e20126fd634002e0256fed786d07054466250e2de6b7fb6d7d8d5201ac1478ef26aafeae7947832c4cc7fea6315e92eb81c89a385dae378bf89ca53c6984b5aa79a7dcc139938fa64b30d7c24ff7b215c890be5756df2f441d0fcb938cb4c1f89245a47c630a2b5e28bb7b5a9c8c871c45857bc4fa646b30f485beccdf529ad0cd519a0bed9b5c7df28320d9ad7eceb30eda6c964cfcab57c8aa98b89d582792b886e41c9f6146332e31f93b", 0xcb, 0x1ff}, {&(0x7f0000000540)="5c96cd9925cbe6753ba234c06f8040f650bba8d4d4ebe59964acf97c49f7a5e793521ef728d90a4eb42cbe7a2536c6922f049b20f2c681c652b4dbe077b0a9972e1eeb5573d7ee69d6fc99d4e4894537fac772842763140c5d832bf593a5cc290fd0c641d14d06e564127871808073fb6fd27f2a9995b29abce9351b0b285f4887f1cc8de04d147141af2ed66cfb66fd230e329273710457efc72a8d09487b5c83e77201b28eb38d7d3846b63b1bf1233b5c925303dd3214066c99381b0457a62397c7df27f88e19a884e1dfa6", 0xcd, 0x6}, {&(0x7f0000000640)="8ae3f201063e83beadb088cb1080ef67", 0x10, 0x2a}, {&(0x7f0000000680)="dfeed81fb09a8a0d55f0999ce7730866db77fa306b896464e4d9cf133371563c7eb734eed8ec2dda58c030b96771bb708fba592614b985c573e8f3db424553c6", 0x40, 0x4}, {&(0x7f00000006c0)="f33dec9b5d96888f1504b1385ce82fdf8f2fa76ecc6ebf567753242a4c9129cd4c4885ba8bab1fd3120749889c981acccb344645e9d1ce95826ab7ceac8b7646d2e476e8934ac444aad3bba14f0d4be15675cd3d336db510c72ebbc07a000754d66f5282b1f241556cbd63a30b3d6af0f5c8a2443b03a92bb406abbb5f630ce1ef2afbba93c29e6bc46901a91ea9d91fa6048a468df5934437ca7e9e2a4fe38fddcd2aecac9406aa7adf5de93082ebf1b5c74d76b7b1b72a9b6fea1c5ab7cc1f3e97b5d7e1db9a64df9836ce0863cda956a1e2a45b9479b8ade23e81258e9444dfbf8066562f79", 0xe7, 0x7}, {&(0x7f00000007c0)="cd72eca63713ca8a35c3557b7d56b6a3073ca69e2067c18f5120c05d4ee8", 0x1e, 0x6}], 0x1, &(0x7f0000000a80)={[{@barrier='barrier'}, {@gid={'gid'}}, {@nodecompose='nodecompose'}, {@uid={'uid'}}, {@type={'type', 0x3d, "ae8c9d8f"}}, {@decompose='decompose'}, {@session={'session', 0x3d, 0x25}}], [{@uid_eq={'uid'}}, {@obj_type={'obj_type', 0x3d, 'overlay\x00'}}, {@euid_eq={'euid'}}, {@uid_eq={'uid'}}]}) 11:46:30 executing program 4: r0 = socket$netlink(0x10, 0x3, 0xf) bind$netlink(r0, &(0x7f0000514ff4), 0xc) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000000), 0x4) setsockopt$netlink_NETLINK_BROADCAST_ERROR(r0, 0x10e, 0x4, &(0x7f0000000080)=0x6, 0x4) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)={0x14, 0x23, 0x1, 0x0, 0x0, {0x20000000004, 0xe00000000000000}}, 0x14}}, 0x0) [ 265.624218][T10933] FAULT_INJECTION: forcing a failure. [ 265.624218][T10933] name fail_page_alloc, interval 1, probability 0, space 0, times 1 [ 265.637469][T10933] CPU: 1 PID: 10933 Comm: syz-executor.1 Not tainted 5.3.0+ #0 [ 265.645014][T10933] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 265.655067][T10933] Call Trace: [ 265.658362][T10933] dump_stack+0x172/0x1f0 [ 265.662707][T10933] should_fail.cold+0xa/0x15 [ 265.667308][T10933] ? fault_create_debugfs_attr+0x180/0x180 [ 265.673113][T10933] ? __kasan_check_read+0x11/0x20 [ 265.678139][T10933] ? __lock_acquire+0x16f2/0x4a00 [ 265.683175][T10933] should_fail_alloc_page+0x50/0x60 [ 265.688366][T10933] __alloc_pages_nodemask+0x1a1/0x900 [ 265.693735][T10933] ? fs_reclaim_acquire.part.0+0x30/0x30 [ 265.699366][T10933] ? __alloc_pages_slowpath+0x28e0/0x28e0 [ 265.705077][T10933] ? fs_reclaim_acquire.part.0+0x30/0x30 [ 265.710721][T10933] ? fault_create_debugfs_attr+0x180/0x180 [ 265.716527][T10933] cache_grow_begin+0x90/0xd20 [ 265.716545][T10933] ? wiphy_new_nm+0x6f0/0x1ed0 [ 265.716566][T10933] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 265.732275][T10933] __kmalloc+0x6b2/0x770 [ 265.736521][T10933] ? wiphy_new_nm+0x6f0/0x1ed0 [ 265.736543][T10933] wiphy_new_nm+0x6f0/0x1ed0 [ 265.736562][T10933] ieee80211_alloc_hw_nm+0x3df/0x20e0 [ 265.736578][T10933] ? __local_bh_enable_ip+0x15a/0x270 [ 265.736604][T10933] mac80211_hwsim_new_radio+0x1ef/0x4360 [ 265.745906][T10933] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 265.745923][T10933] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 265.745939][T10933] ? cred_has_capability+0x199/0x330 [ 265.745954][T10933] ? selinux_sb_eat_lsm_opts+0x700/0x700 [ 265.745974][T10933] ? selinux_sb_eat_lsm_opts+0x700/0x700 [ 265.758910][T10941] IPVS: ftp: loaded support on port[0] = 21 [ 265.762288][T10933] ? __kasan_check_read+0x11/0x20 [ 265.762309][T10933] ? hwsim_cloned_frame_received_nl+0x1640/0x1640 [ 265.762325][T10933] ? memset+0x32/0x40 [ 265.762346][T10933] hwsim_new_radio_nl+0x9e3/0x1070 [ 265.797141][T10933] ? mac80211_hwsim_new_radio+0x4360/0x4360 [ 265.797159][T10933] ? nla_memcpy+0xb0/0xb0 [ 265.797185][T10933] ? __nla_parse+0x43/0x60 [ 265.797213][T10933] genl_family_rcv_msg+0x74b/0xf90 [ 265.808607][T10933] ? genl_unregister_family+0x7b0/0x7b0 [ 265.808623][T10933] ? __kasan_check_read+0x11/0x20 [ 265.808638][T10933] ? __lock_acquire+0x16f2/0x4a00 [ 265.808651][T10933] ? __dev_queue_xmit+0xbb5/0x3720 [ 265.808682][T10933] genl_rcv_msg+0xca/0x170 [ 265.818666][T10933] netlink_rcv_skb+0x177/0x450 [ 265.818684][T10933] ? genl_family_rcv_msg+0xf90/0xf90 [ 265.818702][T10933] ? netlink_ack+0xb50/0xb50 [ 265.818716][T10933] ? __kasan_check_write+0x14/0x20 [ 265.818737][T10933] ? netlink_deliver_tap+0x254/0xbf0 [ 265.828909][T10933] genl_rcv+0x29/0x40 [ 265.828926][T10933] netlink_unicast+0x531/0x710 [ 265.828946][T10933] ? netlink_attachskb+0x7c0/0x7c0 [ 265.828963][T10933] ? _copy_from_iter_full+0x25d/0x8c0 [ 265.828985][T10933] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 265.829005][T10933] netlink_sendmsg+0x8a5/0xd60 [ 265.838494][T10933] ? netlink_unicast+0x710/0x710 [ 265.838514][T10933] ? tomoyo_socket_sendmsg+0x26/0x30 [ 265.838531][T10933] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 265.838549][T10933] ? security_socket_sendmsg+0x8d/0xc0 [ 265.849062][T10933] ? netlink_unicast+0x710/0x710 [ 265.849081][T10933] sock_sendmsg+0xd7/0x130 [ 265.849100][T10933] ___sys_sendmsg+0x803/0x920 [ 265.849120][T10933] ? copy_msghdr_from_user+0x440/0x440 [ 265.849141][T10933] ? __kasan_check_read+0x11/0x20 [ 265.849162][T10933] ? __fget+0x384/0x560 [ 265.859245][T10933] ? ksys_dup3+0x3e0/0x3e0 11:46:30 executing program 4: r0 = socket$netlink(0x10, 0x3, 0xf) bind$netlink(r0, &(0x7f0000514ff4)={0x10, 0x0, 0x0, 0x2ffffffff}, 0xc) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x8, &(0x7f0000000000), 0x4) setsockopt$netlink_NETLINK_BROADCAST_ERROR(r0, 0x10e, 0x4, &(0x7f0000000080)=0x6, 0x4) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)={0x14, 0x23, 0x1, 0x0, 0x0, {0x20000000004, 0xe00000000000000}}, 0x14}}, 0x0) [ 265.859272][T10933] ? __fget_light+0x1a9/0x230 [ 265.859289][T10933] ? __fdget+0x1b/0x20 [ 265.859305][T10933] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 265.859328][T10933] __sys_sendmsg+0x105/0x1d0 [ 265.868457][T10933] ? __sys_sendmsg_sock+0xd0/0xd0 [ 265.868485][T10933] ? trace_hardirqs_on_thunk+0x1a/0x20 [ 265.868500][T10933] ? do_syscall_64+0x26/0x760 [ 265.868514][T10933] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 265.868531][T10933] ? do_syscall_64+0x26/0x760 [ 265.878356][T10933] __x64_sys_sendmsg+0x78/0xb0 [ 265.878375][T10933] do_syscall_64+0xfa/0x760 [ 265.878396][T10933] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 265.878407][T10933] RIP: 0033:0x459a29 [ 265.878422][T10933] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 265.878435][T10933] RSP: 002b:00007f5e254b1c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 265.888770][T10933] RAX: ffffffffffffffda RBX: 00007f5e254b1c90 RCX: 0000000000459a29 [ 265.888778][T10933] RDX: 0000000000000000 RSI: 0000000020000100 RDI: 0000000000000003 [ 265.888787][T10933] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 265.888795][T10933] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f5e254b26d4 [ 265.888804][T10933] R13: 00000000004c7940 R14: 00000000004dd350 R15: 0000000000000004 [ 265.916419][T10945] overlayfs: unrecognized mount option "uppFrdir=./file0" or missing value [ 265.926951][T10944] overlayfs: unrecognized mount option "uppFrdir=./file0" or missing value 11:46:31 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000140)='hfsplus\x00', 0x0, 0x3, 0x7, &(0x7f0000000800)=[{&(0x7f0000000400)="e1ec051c0b7b96db7480b4620be1f7d4adcb21d5233a3d23bf43659e5359470de231dd734b698cd71201837ca57f911328e1aee6b2cb39533b2d549e", 0x3c, 0x101}, {&(0x7f0000000440)="dbac23926131781587488e056e40b191269651683d0d195cbd63543040e313e20126fd634002e0256fed786d07054466250e2de6b7fb6d7d8d5201ac1478ef26aafeae7947832c4cc7fea6315e92eb81c89a385dae378bf89ca53c6984b5aa79a7dcc139938fa64b30d7c24ff7b215c890be5756df2f441d0fcb938cb4c1f89245a47c630a2b5e28bb7b5a9c8c871c45857bc4fa646b30f485beccdf529ad0cd519a0bed9b5c7df28320d9ad7eceb30eda6c964cfcab57c8aa98b89d582792b886e41c9f6146332e31f93b", 0xcb, 0x1ff}, {&(0x7f0000000540)="5c96cd9925cbe6753ba234c06f8040f650bba8d4d4ebe59964acf97c49f7a5e793521ef728d90a4eb42cbe7a2536c6922f049b20f2c681c652b4dbe077b0a9972e1eeb5573d7ee69d6fc99d4e4894537fac772842763140c5d832bf593a5cc290fd0c641d14d06e564127871808073fb6fd27f2a9995b29abce9351b0b285f4887f1cc8de04d147141af2ed66cfb66fd230e329273710457efc72a8d09487b5c83e77201b28eb38d7d3846b63b1bf1233b5c925303dd3214066c99381b0457a62397c7df27f88e19a884e1dfa6", 0xcd, 0x6}, {&(0x7f0000000640)="8ae3f201063e83beadb088cb1080ef67", 0x10, 0x2a}, {&(0x7f0000000680)="dfeed81fb09a8a0d55f0999ce7730866db77fa306b896464e4d9cf133371563c7eb734eed8ec2dda58c030b96771bb708fba592614b985c573e8f3db424553c6", 0x40, 0x4}, {&(0x7f00000006c0)="f33dec9b5d96888f1504b1385ce82fdf8f2fa76ecc6ebf567753242a4c9129cd4c4885ba8bab1fd3120749889c981acccb344645e9d1ce95826ab7ceac8b7646d2e476e8934ac444aad3bba14f0d4be15675cd3d336db510c72ebbc07a000754d66f5282b1f241556cbd63a30b3d6af0f5c8a2443b03a92bb406abbb5f630ce1ef2afbba93c29e6bc46901a91ea9d91fa6048a468df5934437ca7e9e2a4fe38fddcd2aecac9406aa7adf5de93082ebf1b5c74d76b7b1b72a9b6fea1c5ab7cc1f3e97b5d7e1db9a64df9836ce0863cda956a1e2a45b9479b8ade23e81258e9444dfbf8066562f79", 0xe7, 0x7}, {&(0x7f00000007c0)="cd72eca63713ca8a35c3557b7d56b6a3073ca69e2067c18f5120c05d4ee8", 0x1e, 0x6}], 0x1, &(0x7f0000000a80)={[{@barrier='barrier'}, {@gid={'gid'}}, {@nodecompose='nodecompose'}, {@uid={'uid'}}, {@type={'type', 0x3d, "ae8c9d8f"}}, {@decompose='decompose'}, {@session={'session', 0x3d, 0x25}}], [{@uid_eq={'uid'}}, {@obj_type={'obj_type', 0x3d, 'overlay\x00'}}, {@euid_eq={'euid'}}, {@uid_eq={'uid'}}]}) 11:46:31 executing program 1 (fault-call:3 fault-nth:5): setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) setsockopt$netlink_NETLINK_BROADCAST_ERROR(0xffffffffffffffff, 0x10e, 0x4, 0x0, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)={0x14, 0x23, 0x1, 0x0, 0x0, {0x20000000004, 0xe00000000000000}}, 0x14}}, 0x0) [ 266.225446][T10931] hfsplus: unable to parse mount options [ 266.246140][T10934] hfsplus: unable to parse mount options [ 266.389907][T10959] FAULT_INJECTION: forcing a failure. [ 266.389907][T10959] name failslab, interval 1, probability 0, space 0, times 0 11:46:31 executing program 0: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='devtmpfs\x00', 0x0, 0x0) chdir(&(0x7f00000000c0)='./file0\x00') pipe(0x0) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mkdir(0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$hfsplus(&(0x7f0000000140)='hfsplus\x00', &(0x7f0000000200)='./file0\x00', 0x3, 0x7, &(0x7f0000000800)=[{&(0x7f0000000400)="e1ec051c0b7b96db7480b4620be1f7d4adcb21d5233a3d23bf43659e5359470de231dd734b698cd71201837ca57f911328e1aee6b2cb39533b2d549e", 0x3c, 0x101}, {&(0x7f0000000440)="dbac23926131781587488e056e40b191269651683d0d195cbd63543040e313e20126fd634002e0256fed786d07054466250e2de6b7fb6d7d8d5201ac1478ef26aafeae7947832c4cc7fea6315e92eb81c89a385dae378bf89ca53c6984b5aa79a7dcc139938fa64b30d7c24ff7b215c890be5756df2f441d0fcb938cb4c1f89245a47c630a2b5e28bb7b5a9c8c871c45857bc4fa646b30f485beccdf529ad0cd519a0bed9b5c7df28320d9ad7eceb30eda6c964cfcab57c8aa98b89d582792b886e41c9f6146332e31f93b", 0xcb, 0x1ff}, {&(0x7f0000000540)="5c96cd9925cbe6753ba234c06f8040f650bba8d4d4ebe59964acf97c49f7a5e793521ef728d90a4eb42cbe7a2536c6922f049b20f2c681c652b4dbe077b0a9972e1eeb5573d7ee69d6fc99d4e4894537fac772842763140c5d832bf593a5cc290fd0c641d14d06e564127871808073fb6fd27f2a9995b29abce9351b0b285f4887f1cc8de04d147141af2ed66cfb66fd230e329273710457efc72a8d09487b5c83e77201b28eb38d7d3846b63b1bf1233b5c925303dd3214066c99381b0457a62397c7df27f88e19a884e1dfa6", 0xcd, 0x6}, {&(0x7f0000000640)="8ae3f201063e83beadb088cb1080ef67", 0x10, 0x2a}, {&(0x7f0000000680)="dfeed81fb09a8a0d55f0999ce7730866db77fa306b896464e4d9cf133371563c7eb734eed8ec2dda58c030b96771bb708fba592614b985c573e8f3db424553c6", 0x40, 0x4}, {&(0x7f00000006c0)="f33dec9b5d96888f1504b1385ce82fdf8f2fa76ecc6ebf567753242a4c9129cd4c4885ba8bab1fd3120749889c981acccb344645e9d1ce95826ab7ceac8b7646d2e476e8934ac444aad3bba14f0d4be15675cd3d336db510c72ebbc07a000754d66f5282b1f241556cbd63a30b3d6af0f5c8a2443b03a92bb406abbb5f630ce1ef2afbba93c29e6bc46901a91ea9d91fa6048a468df5934437ca7e9e2a4fe38fddcd2aecac9406aa7adf5de93082ebf1b5c74d76b7b1b72a9b6fea1c5ab7cc1f3e97b5d7e1db9a64df9836ce0863cda956a1e2a45b9479b8ade23e81258e9444dfbf8066562f79", 0xe7, 0x7}, {&(0x7f00000007c0)="cd72eca63713ca8a35c3557b7d56b6a3073ca69e2067c18f5120c05d4ee8", 0x1e, 0x6}], 0x1, &(0x7f0000000a80)={[{@barrier='barrier'}, {@gid={'gid'}}, {@nodecompose='nodecompose'}, {@uid={'uid'}}, {@type={'type', 0x3d, "ae8c9d8f"}}, {@decompose='decompose'}, {@session={'session', 0x3d, 0x25}}], [{@uid_eq={'uid'}}, {@obj_type={'obj_type', 0x3d, 'overlay\x00'}}, {@euid_eq={'euid'}}, {@uid_eq={'uid'}}]}) 11:46:31 executing program 5: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='devtmpfs\x00', 0x0, 0x0) chdir(&(0x7f00000000c0)='./file0\x00') pipe(0x0) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mkdir(0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$overlay(0x40000f, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="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"]) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000240)='cgroup2\x00', 0x0, 0x0) fstat(0xffffffffffffffff, &(0x7f00000008c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000005ec0)={{{@in6=@empty, @in=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@remote}, 0x0, @in6=@mcast2}}, &(0x7f0000004800)=0xffffffffffffffc3) r3 = geteuid() setsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f00000060c0)={{{@in=@remote, @in6=@rand_addr="20bbcbd1865253e3e58aa219d6ca6440", 0x4e21, 0x2400000000000000, 0x4e22, 0x0, 0xa, 0xa0, 0x0, 0x67, r2, r3}, {0x6, 0x183, 0x3, 0x7f, 0x61553a0b, 0x9, 0x1, 0x4}, {0x20, 0x80000001, 0x2000000000001, 0x9}, 0x9, 0x6e6bba, 0x0, 0x0, 0x1, 0x3}, {{@in=@empty, 0x4d3, 0x3c}, 0xa, @in=@loopback, 0x3504, 0x0, 0x3, 0xfffffffffffffffc, 0x1ff, 0x5, 0x6}}, 0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000940)={{{@in6, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@dev}, 0x0, @in6=@local}}, &(0x7f0000000a40)=0xe8) r5 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r5, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") getsockopt$inet_IP_IPSEC_POLICY(r5, 0x0, 0x10, &(0x7f0000005ec0)={{{@in6=@empty, @in=@local}}, {{@in6=@remote}, 0x0, @in6=@mcast2}}, &(0x7f0000004800)=0xffffffffffffffc3) syz_mount_image$hfsplus(&(0x7f0000000140)='hfsplus\x00', &(0x7f0000000200)='./file0\x00', 0x3, 0x7, &(0x7f0000000800)=[{&(0x7f0000000400)="e1ec051c0b7b96db7480b4620be1f7d4adcb21d5233a3d23bf43659e5359470de231dd734b698cd71201837ca57f911328e1aee6b2cb39533b2d549e", 0x3c, 0x101}, {&(0x7f0000000440)="dbac23926131781587488e056e40b191269651683d0d195cbd63543040e313e20126fd634002e0256fed786d07054466250e2de6b7fb6d7d8d5201ac1478ef26aafeae7947832c4cc7fea6315e92eb81c89a385dae378bf89ca53c6984b5aa79a7dcc139938fa64b30d7c24ff7b215c890be5756df2f441d0fcb938cb4c1f89245a47c630a2b5e28bb7b5a9c8c871c45857bc4fa646b30f485beccdf529ad0cd519a0bed9b5c7df28320d9ad7eceb30eda6c964cfcab57c8aa98b89d582792b886e41c9f6146332e31f93b", 0xcb, 0x1ff}, {&(0x7f0000000540)="5c96cd9925cbe6753ba234c06f8040f650bba8d4d4ebe59964acf97c49f7a5e793521ef728d90a4eb42cbe7a2536c6922f049b20f2c681c652b4dbe077b0a9972e1eeb5573d7ee69d6fc99d4e4894537fac772842763140c5d832bf593a5cc290fd0c641d14d06e564127871808073fb6fd27f2a9995b29abce9351b0b285f4887f1cc8de04d147141af2ed66cfb66fd230e329273710457efc72a8d09487b5c83e77201b28eb38d7d3846b63b1bf1233b5c925303dd3214066c99381b0457a62397c7df27f88e19a884e1dfa6", 0xcd, 0x6}, {&(0x7f0000000640)="8ae3f201063e83beadb088cb1080ef67", 0x10, 0x2a}, {&(0x7f0000000680)="dfeed81fb09a8a0d55f0999ce7730866db77fa306b896464e4d9cf133371563c7eb734eed8ec2dda58c030b96771bb708fba592614b985c573e8f3db424553c6", 0x40, 0x4}, {&(0x7f00000006c0)="f33dec9b5d96888f1504b1385ce82fdf8f2fa76ecc6ebf567753242a4c9129cd4c4885ba8bab1fd3120749889c981acccb344645e9d1ce95826ab7ceac8b7646d2e476e8934ac444aad3bba14f0d4be15675cd3d336db510c72ebbc07a000754d66f5282b1f241556cbd63a30b3d6af0f5c8a2443b03a92bb406abbb5f630ce1ef2afbba93c29e6bc46901a91ea9d91fa6048a468df5934437ca7e9e2a4fe38fddcd2aecac9406aa7adf5de93082ebf1b5c74d76b7b1b72a9b6fea1c5ab7cc1f3e97b5d7e1db9a64df9836ce0863cda956a1e2a45b9479b8ade23e81258e9444dfbf8066562f79", 0xe7, 0x7}, {&(0x7f00000007c0)="cd72eca63713ca8a35c3557b7d56b6a3073ca69e2067c18f5120c05d4ee8", 0x1e, 0x6}], 0x1, &(0x7f0000000a80)={[{@barrier='barrier'}, {@gid={'gid', 0x3d, r0}}, {@nodecompose='nodecompose'}, {@uid={'uid', 0x3d, r3}}, {@type={'type', 0x3d, "ae8c9d8f"}}, {@decompose='decompose'}, {@session={'session', 0x3d, 0x25}}], [{@uid_eq={'uid', 0x3d, r4}}, {@obj_type={'obj_type', 0x3d, 'overlay\x00'}}, {@euid_eq={'euid'}}, {@uid_eq={'uid'}}]}) [ 266.505571][T10959] CPU: 0 PID: 10959 Comm: syz-executor.1 Not tainted 5.3.0+ #0 [ 266.513152][T10959] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 266.523208][T10959] Call Trace: [ 266.526509][T10959] dump_stack+0x172/0x1f0 [ 266.530871][T10959] should_fail.cold+0xa/0x15 [ 266.535487][T10959] ? fault_create_debugfs_attr+0x180/0x180 [ 266.541303][T10959] ? ___might_sleep+0x163/0x2c0 [ 266.546163][T10959] __should_failslab+0x121/0x190 [ 266.551098][T10959] should_failslab+0x9/0x14 [ 266.555591][T10959] __kmalloc_track_caller+0x2dc/0x760 [ 266.561006][T10959] ? pointer+0x720/0x720 [ 266.565289][T10959] ? __sys_sendmsg+0x105/0x1d0 [ 266.570060][T10959] ? do_syscall_64+0xfa/0x760 [ 266.574745][T10959] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 266.580829][T10959] ? __kasan_check_read+0x11/0x20 [ 266.585855][T10959] ? kvasprintf_const+0x65/0x190 [ 266.590798][T10959] kvasprintf+0xc8/0x170 [ 266.595050][T10959] ? bust_spinlocks+0xe0/0xe0 [ 266.599734][T10959] ? __kasan_check_read+0x11/0x20 [ 266.604775][T10959] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 266.611028][T10959] kvasprintf_const+0x65/0x190 [ 266.615800][T10959] kobject_set_name_vargs+0x5b/0x150 [ 266.621187][T10959] dev_set_name+0xbb/0xf0 [ 266.625527][T10959] ? device_initialize+0x460/0x460 [ 266.630660][T10959] ? __kmalloc+0x608/0x770 [ 266.635098][T10959] wiphy_new_nm+0x80d/0x1ed0 [ 266.639697][T10959] ieee80211_alloc_hw_nm+0x3df/0x20e0 [ 266.645077][T10959] ? __local_bh_enable_ip+0x15a/0x270 [ 266.650456][T10959] mac80211_hwsim_new_radio+0x1ef/0x4360 [ 266.656093][T10959] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 266.662331][T10959] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 266.668553][T10959] ? cred_has_capability+0x199/0x330 [ 266.673820][T10959] ? selinux_sb_eat_lsm_opts+0x700/0x700 [ 266.679432][T10959] ? selinux_sb_eat_lsm_opts+0x700/0x700 [ 266.685043][T10959] ? __kasan_check_read+0x11/0x20 [ 266.690053][T10959] ? hwsim_cloned_frame_received_nl+0x1640/0x1640 [ 266.696460][T10959] ? memset+0x32/0x40 [ 266.700426][T10959] hwsim_new_radio_nl+0x9e3/0x1070 [ 266.705523][T10959] ? mac80211_hwsim_new_radio+0x4360/0x4360 [ 266.711398][T10959] ? nla_memcpy+0xb0/0xb0 [ 266.715714][T10959] ? __nla_parse+0x43/0x60 [ 266.720116][T10959] genl_family_rcv_msg+0x74b/0xf90 [ 266.725213][T10959] ? genl_unregister_family+0x7b0/0x7b0 [ 266.730744][T10959] ? __kasan_check_read+0x11/0x20 [ 266.735753][T10959] ? __lock_acquire+0x16f2/0x4a00 [ 266.740773][T10959] ? __dev_queue_xmit+0xbb5/0x3720 [ 266.745882][T10959] genl_rcv_msg+0xca/0x170 [ 266.750301][T10959] netlink_rcv_skb+0x177/0x450 [ 266.755047][T10959] ? genl_family_rcv_msg+0xf90/0xf90 [ 266.760313][T10959] ? netlink_ack+0xb50/0xb50 [ 266.764894][T10959] ? __kasan_check_write+0x14/0x20 [ 266.769988][T10959] ? netlink_deliver_tap+0x254/0xbf0 [ 266.775258][T10959] genl_rcv+0x29/0x40 [ 266.779230][T10959] netlink_unicast+0x531/0x710 [ 266.783976][T10959] ? netlink_attachskb+0x7c0/0x7c0 [ 266.789066][T10959] ? _copy_from_iter_full+0x25d/0x8c0 [ 266.794419][T10959] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 266.800641][T10959] netlink_sendmsg+0x8a5/0xd60 [ 266.805388][T10959] ? netlink_unicast+0x710/0x710 [ 266.810308][T10959] ? tomoyo_socket_sendmsg+0x26/0x30 [ 266.815575][T10959] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 266.821801][T10959] ? security_socket_sendmsg+0x8d/0xc0 [ 266.827240][T10959] ? netlink_unicast+0x710/0x710 [ 266.832156][T10959] sock_sendmsg+0xd7/0x130 [ 266.836571][T10959] ___sys_sendmsg+0x803/0x920 [ 266.841232][T10959] ? copy_msghdr_from_user+0x440/0x440 [ 266.846675][T10959] ? __kasan_check_read+0x11/0x20 [ 266.851680][T10959] ? __fget+0x384/0x560 [ 266.855823][T10959] ? ksys_dup3+0x3e0/0x3e0 [ 266.860230][T10959] ? __fget_light+0x1a9/0x230 [ 266.864887][T10959] ? __fdget+0x1b/0x20 [ 266.868938][T10959] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 266.875163][T10959] __sys_sendmsg+0x105/0x1d0 [ 266.879749][T10959] ? __sys_sendmsg_sock+0xd0/0xd0 [ 266.884760][T10959] ? trace_hardirqs_on_thunk+0x1a/0x20 [ 266.890196][T10959] ? do_syscall_64+0x26/0x760 [ 266.894854][T10959] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 266.900907][T10959] ? do_syscall_64+0x26/0x760 [ 266.905567][T10959] __x64_sys_sendmsg+0x78/0xb0 [ 266.910310][T10959] do_syscall_64+0xfa/0x760 [ 266.914793][T10959] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 266.920676][T10959] RIP: 0033:0x459a29 [ 266.924550][T10959] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 266.944133][T10959] RSP: 002b:00007f5e254b1c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e 11:46:31 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000140)='hfsplus\x00', 0x0, 0x3, 0x7, &(0x7f0000000800)=[{&(0x7f0000000400)="e1ec051c0b7b96db7480b4620be1f7d4adcb21d5233a3d23bf43659e5359470de231dd734b698cd71201837ca57f911328e1aee6b2cb39533b2d549e", 0x3c, 0x101}, {&(0x7f0000000440)="dbac23926131781587488e056e40b191269651683d0d195cbd63543040e313e20126fd634002e0256fed786d07054466250e2de6b7fb6d7d8d5201ac1478ef26aafeae7947832c4cc7fea6315e92eb81c89a385dae378bf89ca53c6984b5aa79a7dcc139938fa64b30d7c24ff7b215c890be5756df2f441d0fcb938cb4c1f89245a47c630a2b5e28bb7b5a9c8c871c45857bc4fa646b30f485beccdf529ad0cd519a0bed9b5c7df28320d9ad7eceb30eda6c964cfcab57c8aa98b89d582792b886e41c9f6146332e31f93b", 0xcb, 0x1ff}, {&(0x7f0000000540)="5c96cd9925cbe6753ba234c06f8040f650bba8d4d4ebe59964acf97c49f7a5e793521ef728d90a4eb42cbe7a2536c6922f049b20f2c681c652b4dbe077b0a9972e1eeb5573d7ee69d6fc99d4e4894537fac772842763140c5d832bf593a5cc290fd0c641d14d06e564127871808073fb6fd27f2a9995b29abce9351b0b285f4887f1cc8de04d147141af2ed66cfb66fd230e329273710457efc72a8d09487b5c83e77201b28eb38d7d3846b63b1bf1233b5c925303dd3214066c99381b0457a62397c7df27f88e19a884e1dfa6", 0xcd, 0x6}, {&(0x7f0000000640)="8ae3f201063e83beadb088cb1080ef67", 0x10, 0x2a}, {&(0x7f0000000680)="dfeed81fb09a8a0d55f0999ce7730866db77fa306b896464e4d9cf133371563c7eb734eed8ec2dda58c030b96771bb708fba592614b985c573e8f3db424553c6", 0x40, 0x4}, {&(0x7f00000006c0)="f33dec9b5d96888f1504b1385ce82fdf8f2fa76ecc6ebf567753242a4c9129cd4c4885ba8bab1fd3120749889c981acccb344645e9d1ce95826ab7ceac8b7646d2e476e8934ac444aad3bba14f0d4be15675cd3d336db510c72ebbc07a000754d66f5282b1f241556cbd63a30b3d6af0f5c8a2443b03a92bb406abbb5f630ce1ef2afbba93c29e6bc46901a91ea9d91fa6048a468df5934437ca7e9e2a4fe38fddcd2aecac9406aa7adf5de93082ebf1b5c74d76b7b1b72a9b6fea1c5ab7cc1f3e97b5d7e1db9a64df9836ce0863cda956a1e2a45b9479b8ade23e81258e9444dfbf8066562f79", 0xe7, 0x7}, {&(0x7f00000007c0)="cd72eca63713ca8a35c3557b7d56b6a3073ca69e2067c18f5120c05d4ee8", 0x1e, 0x6}], 0x1, &(0x7f0000000a80)={[{@barrier='barrier'}, {@gid={'gid'}}, {@nodecompose='nodecompose'}, {@uid={'uid'}}, {@type={'type', 0x3d, "ae8c9d8f"}}, {@decompose='decompose'}, {@session={'session', 0x3d, 0x25}}], [{@uid_eq={'uid'}}, {@obj_type={'obj_type', 0x3d, 'overlay\x00'}}, {@euid_eq={'euid'}}, {@uid_eq={'uid'}}]}) [ 266.952523][T10959] RAX: ffffffffffffffda RBX: 00007f5e254b1c90 RCX: 0000000000459a29 [ 266.960472][T10959] RDX: 0000000000000000 RSI: 0000000020000100 RDI: 0000000000000003 [ 266.968443][T10959] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 266.976407][T10959] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f5e254b26d4 [ 266.984369][T10959] R13: 00000000004c7940 R14: 00000000004dd350 R15: 0000000000000004 11:46:32 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_FSGETXATTR(0xffffffffffffffff, 0x8004550f, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x1}, 0x10) r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r0, &(0x7f0000000000)={{0x6, @rose}, [@rose, @rose, @default, @netrom, @bcast, @rose, @rose, @null]}, 0x48) openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000080)='/dev/qat_adf_ctl\x00', 0x8200, 0x0) listen(r0, 0x0) unshare(0x40000000) setrlimit(0x0, 0x0) r1 = accept(r0, 0x0, 0x0) write$binfmt_elf64(r1, &(0x7f00000002c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x9, 0x8, 0x0, 0x0, 0x0, 0x4825483b35c83c0b, 0x0, 0x0, 0x40, 0x227}, [{0x4, 0x1, 0xfff, 0x0, 0x0, 0xff8000000002, 0x0, 0x7fff}], "", [[], [], []]}, 0x378) 11:46:32 executing program 4: r0 = socket$netlink(0x10, 0x3, 0xf) bind$netlink(r0, &(0x7f0000514ff4)={0x10, 0x0, 0x0, 0x2ffffffff}, 0xc) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x8, &(0x7f0000000000), 0x4) setsockopt$netlink_NETLINK_BROADCAST_ERROR(r0, 0x10e, 0x4, &(0x7f0000000080)=0x6, 0x4) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)={0x14, 0x23, 0x1, 0x0, 0x0, {0x20000000004, 0xe00000000000000}}, 0x14}}, 0x0) [ 267.044489][T10968] hfsplus: unable to parse mount options 11:46:32 executing program 0: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='devtmpfs\x00', 0x0, 0x0) chdir(&(0x7f00000000c0)='./file0\x00') pipe(0x0) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mkdir(0x0, 0x0) syz_mount_image$hfsplus(&(0x7f0000000140)='hfsplus\x00', &(0x7f0000000200)='./file0\x00', 0x3, 0x7, &(0x7f0000000800)=[{&(0x7f0000000400)="e1ec051c0b7b96db7480b4620be1f7d4adcb21d5233a3d23bf43659e5359470de231dd734b698cd71201837ca57f911328e1aee6b2cb39533b2d549e", 0x3c, 0x101}, {&(0x7f0000000440)="dbac23926131781587488e056e40b191269651683d0d195cbd63543040e313e20126fd634002e0256fed786d07054466250e2de6b7fb6d7d8d5201ac1478ef26aafeae7947832c4cc7fea6315e92eb81c89a385dae378bf89ca53c6984b5aa79a7dcc139938fa64b30d7c24ff7b215c890be5756df2f441d0fcb938cb4c1f89245a47c630a2b5e28bb7b5a9c8c871c45857bc4fa646b30f485beccdf529ad0cd519a0bed9b5c7df28320d9ad7eceb30eda6c964cfcab57c8aa98b89d582792b886e41c9f6146332e31f93b", 0xcb, 0x1ff}, {&(0x7f0000000540)="5c96cd9925cbe6753ba234c06f8040f650bba8d4d4ebe59964acf97c49f7a5e793521ef728d90a4eb42cbe7a2536c6922f049b20f2c681c652b4dbe077b0a9972e1eeb5573d7ee69d6fc99d4e4894537fac772842763140c5d832bf593a5cc290fd0c641d14d06e564127871808073fb6fd27f2a9995b29abce9351b0b285f4887f1cc8de04d147141af2ed66cfb66fd230e329273710457efc72a8d09487b5c83e77201b28eb38d7d3846b63b1bf1233b5c925303dd3214066c99381b0457a62397c7df27f88e19a884e1dfa6", 0xcd, 0x6}, {&(0x7f0000000640)="8ae3f201063e83beadb088cb1080ef67", 0x10, 0x2a}, {&(0x7f0000000680)="dfeed81fb09a8a0d55f0999ce7730866db77fa306b896464e4d9cf133371563c7eb734eed8ec2dda58c030b96771bb708fba592614b985c573e8f3db424553c6", 0x40, 0x4}, {&(0x7f00000006c0)="f33dec9b5d96888f1504b1385ce82fdf8f2fa76ecc6ebf567753242a4c9129cd4c4885ba8bab1fd3120749889c981acccb344645e9d1ce95826ab7ceac8b7646d2e476e8934ac444aad3bba14f0d4be15675cd3d336db510c72ebbc07a000754d66f5282b1f241556cbd63a30b3d6af0f5c8a2443b03a92bb406abbb5f630ce1ef2afbba93c29e6bc46901a91ea9d91fa6048a468df5934437ca7e9e2a4fe38fddcd2aecac9406aa7adf5de93082ebf1b5c74d76b7b1b72a9b6fea1c5ab7cc1f3e97b5d7e1db9a64df9836ce0863cda956a1e2a45b9479b8ade23e81258e9444dfbf8066562f79", 0xe7, 0x7}, {&(0x7f00000007c0)="cd72eca63713ca8a35c3557b7d56b6a3073ca69e2067c18f5120c05d4ee8", 0x1e, 0x6}], 0x1, &(0x7f0000000a80)={[{@barrier='barrier'}, {@gid={'gid'}}, {@nodecompose='nodecompose'}, {@uid={'uid'}}, {@type={'type', 0x3d, "ae8c9d8f"}}, {@decompose='decompose'}, {@session={'session', 0x3d, 0x25}}], [{@uid_eq={'uid'}}, {@obj_type={'obj_type', 0x3d, 'overlay\x00'}}, {@euid_eq={'euid'}}, {@uid_eq={'uid'}}]}) [ 267.117398][T10974] overlayfs: unrecognized mount option "uppFrdir=./file0" or missing value 11:46:32 executing program 1 (fault-call:3 fault-nth:6): setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) setsockopt$netlink_NETLINK_BROADCAST_ERROR(0xffffffffffffffff, 0x10e, 0x4, 0x0, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)={0x14, 0x23, 0x1, 0x0, 0x0, {0x20000000004, 0xe00000000000000}}, 0x14}}, 0x0) 11:46:32 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000140)='hfsplus\x00', 0x0, 0x3, 0x7, &(0x7f0000000800)=[{&(0x7f0000000400)="e1ec051c0b7b96db7480b4620be1f7d4adcb21d5233a3d23bf43659e5359470de231dd734b698cd71201837ca57f911328e1aee6b2cb39533b2d549e", 0x3c, 0x101}, {&(0x7f0000000440)="dbac23926131781587488e056e40b191269651683d0d195cbd63543040e313e20126fd634002e0256fed786d07054466250e2de6b7fb6d7d8d5201ac1478ef26aafeae7947832c4cc7fea6315e92eb81c89a385dae378bf89ca53c6984b5aa79a7dcc139938fa64b30d7c24ff7b215c890be5756df2f441d0fcb938cb4c1f89245a47c630a2b5e28bb7b5a9c8c871c45857bc4fa646b30f485beccdf529ad0cd519a0bed9b5c7df28320d9ad7eceb30eda6c964cfcab57c8aa98b89d582792b886e41c9f6146332e31f93b", 0xcb, 0x1ff}, {&(0x7f0000000540)="5c96cd9925cbe6753ba234c06f8040f650bba8d4d4ebe59964acf97c49f7a5e793521ef728d90a4eb42cbe7a2536c6922f049b20f2c681c652b4dbe077b0a9972e1eeb5573d7ee69d6fc99d4e4894537fac772842763140c5d832bf593a5cc290fd0c641d14d06e564127871808073fb6fd27f2a9995b29abce9351b0b285f4887f1cc8de04d147141af2ed66cfb66fd230e329273710457efc72a8d09487b5c83e77201b28eb38d7d3846b63b1bf1233b5c925303dd3214066c99381b0457a62397c7df27f88e19a884e1dfa6", 0xcd, 0x6}, {&(0x7f0000000640)="8ae3f201063e83beadb088cb1080ef67", 0x10, 0x2a}, {&(0x7f0000000680)="dfeed81fb09a8a0d55f0999ce7730866db77fa306b896464e4d9cf133371563c7eb734eed8ec2dda58c030b96771bb708fba592614b985c573e8f3db424553c6", 0x40, 0x4}, {&(0x7f00000006c0)="f33dec9b5d96888f1504b1385ce82fdf8f2fa76ecc6ebf567753242a4c9129cd4c4885ba8bab1fd3120749889c981acccb344645e9d1ce95826ab7ceac8b7646d2e476e8934ac444aad3bba14f0d4be15675cd3d336db510c72ebbc07a000754d66f5282b1f241556cbd63a30b3d6af0f5c8a2443b03a92bb406abbb5f630ce1ef2afbba93c29e6bc46901a91ea9d91fa6048a468df5934437ca7e9e2a4fe38fddcd2aecac9406aa7adf5de93082ebf1b5c74d76b7b1b72a9b6fea1c5ab7cc1f3e97b5d7e1db9a64df9836ce0863cda956a1e2a45b9479b8ade23e81258e9444dfbf8066562f79", 0xe7, 0x7}, {&(0x7f00000007c0)="cd72eca63713ca8a35c3557b7d56b6a3073ca69e2067c18f5120c05d4ee8", 0x1e, 0x6}], 0x1, &(0x7f0000000a80)={[{@barrier='barrier'}, {@gid={'gid'}}, {@nodecompose='nodecompose'}, {@uid={'uid'}}, {@type={'type', 0x3d, "ae8c9d8f"}}, {@decompose='decompose'}, {@session={'session', 0x3d, 0x25}}], [{@uid_eq={'uid'}}, {@obj_type={'obj_type', 0x3d, 'overlay\x00'}}, {@euid_eq={'euid'}}, {@uid_eq={'uid'}}]}) [ 267.262260][T10985] IPVS: ftp: loaded support on port[0] = 21 11:46:32 executing program 4: r0 = socket$netlink(0x10, 0x3, 0xf) bind$netlink(r0, &(0x7f0000514ff4)={0x10, 0x0, 0x0, 0x2ffffffff}, 0xc) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x8, &(0x7f0000000000), 0x4) setsockopt$netlink_NETLINK_BROADCAST_ERROR(r0, 0x10e, 0x4, &(0x7f0000000080)=0x6, 0x4) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)={0x14, 0x23, 0x1, 0x0, 0x0, {0x20000000004, 0xe00000000000000}}, 0x14}}, 0x0) [ 267.367158][T10991] hfsplus: unable to parse mount options [ 267.367445][T10974] hfsplus: unable to parse mount options [ 267.409871][T10999] FAULT_INJECTION: forcing a failure. [ 267.409871][T10999] name failslab, interval 1, probability 0, space 0, times 0 [ 267.424233][T10999] CPU: 0 PID: 10999 Comm: syz-executor.1 Not tainted 5.3.0+ #0 [ 267.431782][T10999] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 267.441832][T10999] Call Trace: [ 267.445115][T10999] dump_stack+0x172/0x1f0 [ 267.449462][T10999] should_fail.cold+0xa/0x15 [ 267.454061][T10999] ? fault_create_debugfs_attr+0x180/0x180 [ 267.459880][T10999] ? ___might_sleep+0x163/0x2c0 [ 267.464742][T10999] __should_failslab+0x121/0x190 [ 267.469676][T10999] should_failslab+0x9/0x14 [ 267.474160][T10999] __kmalloc+0x2e0/0x770 [ 267.478388][T10999] ? free_object+0x70/0x70 [ 267.482838][T10999] ? rfkill_alloc+0xaa/0x2b0 [ 267.487409][T10999] rfkill_alloc+0xaa/0x2b0 [ 267.491811][T10999] wiphy_new_nm+0x1328/0x1ed0 [ 267.496471][T10999] ieee80211_alloc_hw_nm+0x3df/0x20e0 [ 267.501831][T10999] ? __local_bh_enable_ip+0x15a/0x270 [ 267.507190][T10999] mac80211_hwsim_new_radio+0x1ef/0x4360 [ 267.512806][T10999] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 267.519028][T10999] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 267.525258][T10999] ? cred_has_capability+0x199/0x330 [ 267.530529][T10999] ? selinux_sb_eat_lsm_opts+0x700/0x700 [ 267.536142][T10999] ? selinux_sb_eat_lsm_opts+0x700/0x700 [ 267.541754][T10999] ? __kasan_check_read+0x11/0x20 [ 267.546764][T10999] ? hwsim_cloned_frame_received_nl+0x1640/0x1640 [ 267.553162][T10999] ? memset+0x32/0x40 [ 267.557127][T10999] hwsim_new_radio_nl+0x9e3/0x1070 [ 267.562221][T10999] ? mac80211_hwsim_new_radio+0x4360/0x4360 [ 267.568093][T10999] ? nla_memcpy+0xb0/0xb0 [ 267.572409][T10999] ? __nla_parse+0x43/0x60 [ 267.576814][T10999] genl_family_rcv_msg+0x74b/0xf90 [ 267.581911][T10999] ? genl_unregister_family+0x7b0/0x7b0 [ 267.587438][T10999] ? __kasan_check_read+0x11/0x20 [ 267.592443][T10999] ? __lock_acquire+0x16f2/0x4a00 [ 267.597450][T10999] ? __dev_queue_xmit+0xbb5/0x3720 [ 267.602561][T10999] genl_rcv_msg+0xca/0x170 [ 267.606959][T10999] netlink_rcv_skb+0x177/0x450 [ 267.611704][T10999] ? genl_family_rcv_msg+0xf90/0xf90 [ 267.616970][T10999] ? netlink_ack+0xb50/0xb50 [ 267.621539][T10999] ? __kasan_check_write+0x14/0x20 [ 267.626644][T10999] ? netlink_deliver_tap+0x254/0xbf0 [ 267.631914][T10999] genl_rcv+0x29/0x40 [ 267.635876][T10999] netlink_unicast+0x531/0x710 [ 267.640633][T10999] ? netlink_attachskb+0x7c0/0x7c0 [ 267.645723][T10999] ? _copy_from_iter_full+0x25d/0x8c0 [ 267.651081][T10999] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 267.657303][T10999] netlink_sendmsg+0x8a5/0xd60 [ 267.662052][T10999] ? netlink_unicast+0x710/0x710 [ 267.666975][T10999] ? tomoyo_socket_sendmsg+0x26/0x30 [ 267.672241][T10999] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 267.678471][T10999] ? security_socket_sendmsg+0x8d/0xc0 [ 267.683914][T10999] ? netlink_unicast+0x710/0x710 [ 267.688832][T10999] sock_sendmsg+0xd7/0x130 [ 267.693317][T10999] ___sys_sendmsg+0x803/0x920 [ 267.697975][T10999] ? copy_msghdr_from_user+0x440/0x440 [ 267.703424][T10999] ? __kasan_check_read+0x11/0x20 [ 267.708435][T10999] ? __fget+0x384/0x560 [ 267.712572][T10999] ? ksys_dup3+0x3e0/0x3e0 [ 267.716972][T10999] ? __fget_light+0x1a9/0x230 [ 267.721643][T10999] ? __fdget+0x1b/0x20 [ 267.725690][T10999] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 267.731926][T10999] __sys_sendmsg+0x105/0x1d0 [ 267.736510][T10999] ? __sys_sendmsg_sock+0xd0/0xd0 [ 267.741528][T10999] ? trace_hardirqs_on_thunk+0x1a/0x20 [ 267.746966][T10999] ? do_syscall_64+0x26/0x760 [ 267.751631][T10999] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 267.757684][T10999] ? do_syscall_64+0x26/0x760 [ 267.762344][T10999] __x64_sys_sendmsg+0x78/0xb0 [ 267.767089][T10999] do_syscall_64+0xfa/0x760 [ 267.771584][T10999] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 267.777453][T10999] RIP: 0033:0x459a29 [ 267.781431][T10999] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 267.801015][T10999] RSP: 002b:00007f5e254b1c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e 11:46:32 executing program 5: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='devtmpfs\x00', 0x0, 0x0) chdir(&(0x7f00000000c0)='./file0\x00') pipe(0x0) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mkdir(0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$overlay(0x40000f, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="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"]) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000240)='cgroup2\x00', 0x0, 0x0) fstat(0xffffffffffffffff, &(0x7f00000008c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000005ec0)={{{@in6=@empty, @in=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@remote}, 0x0, @in6=@mcast2}}, &(0x7f0000004800)=0xffffffffffffffc3) r3 = geteuid() setsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f00000060c0)={{{@in=@remote, @in6=@rand_addr="20bbcbd1865253e3e58aa219d6ca6440", 0x4e21, 0x2400000000000000, 0x4e22, 0x0, 0xa, 0xa0, 0x0, 0x67, r2, r3}, {0x6, 0x183, 0x3, 0x7f, 0x61553a0b, 0x9, 0x1, 0x4}, {0x20, 0x80000001, 0x2000000000001, 0x9}, 0x9, 0x6e6bba, 0x0, 0x0, 0x1, 0x3}, {{@in=@empty, 0x4d3, 0x3c}, 0xa, @in=@loopback, 0x3504, 0x0, 0x3, 0xfffffffffffffffc, 0x1ff, 0x5, 0x6}}, 0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000940)={{{@in6, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@dev}, 0x0, @in6=@local}}, &(0x7f0000000a40)=0xe8) r5 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r5, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_mount_image$hfsplus(&(0x7f0000000140)='hfsplus\x00', &(0x7f0000000200)='./file0\x00', 0x3, 0x7, &(0x7f0000000800)=[{&(0x7f0000000400)="e1ec051c0b7b96db7480b4620be1f7d4adcb21d5233a3d23bf43659e5359470de231dd734b698cd71201837ca57f911328e1aee6b2cb39533b2d549e", 0x3c, 0x101}, {&(0x7f0000000440)="dbac23926131781587488e056e40b191269651683d0d195cbd63543040e313e20126fd634002e0256fed786d07054466250e2de6b7fb6d7d8d5201ac1478ef26aafeae7947832c4cc7fea6315e92eb81c89a385dae378bf89ca53c6984b5aa79a7dcc139938fa64b30d7c24ff7b215c890be5756df2f441d0fcb938cb4c1f89245a47c630a2b5e28bb7b5a9c8c871c45857bc4fa646b30f485beccdf529ad0cd519a0bed9b5c7df28320d9ad7eceb30eda6c964cfcab57c8aa98b89d582792b886e41c9f6146332e31f93b", 0xcb, 0x1ff}, {&(0x7f0000000540)="5c96cd9925cbe6753ba234c06f8040f650bba8d4d4ebe59964acf97c49f7a5e793521ef728d90a4eb42cbe7a2536c6922f049b20f2c681c652b4dbe077b0a9972e1eeb5573d7ee69d6fc99d4e4894537fac772842763140c5d832bf593a5cc290fd0c641d14d06e564127871808073fb6fd27f2a9995b29abce9351b0b285f4887f1cc8de04d147141af2ed66cfb66fd230e329273710457efc72a8d09487b5c83e77201b28eb38d7d3846b63b1bf1233b5c925303dd3214066c99381b0457a62397c7df27f88e19a884e1dfa6", 0xcd, 0x6}, {&(0x7f0000000640)="8ae3f201063e83beadb088cb1080ef67", 0x10, 0x2a}, {&(0x7f0000000680)="dfeed81fb09a8a0d55f0999ce7730866db77fa306b896464e4d9cf133371563c7eb734eed8ec2dda58c030b96771bb708fba592614b985c573e8f3db424553c6", 0x40, 0x4}, {&(0x7f00000006c0)="f33dec9b5d96888f1504b1385ce82fdf8f2fa76ecc6ebf567753242a4c9129cd4c4885ba8bab1fd3120749889c981acccb344645e9d1ce95826ab7ceac8b7646d2e476e8934ac444aad3bba14f0d4be15675cd3d336db510c72ebbc07a000754d66f5282b1f241556cbd63a30b3d6af0f5c8a2443b03a92bb406abbb5f630ce1ef2afbba93c29e6bc46901a91ea9d91fa6048a468df5934437ca7e9e2a4fe38fddcd2aecac9406aa7adf5de93082ebf1b5c74d76b7b1b72a9b6fea1c5ab7cc1f3e97b5d7e1db9a64df9836ce0863cda956a1e2a45b9479b8ade23e81258e9444dfbf8066562f79", 0xe7, 0x7}, {&(0x7f00000007c0)="cd72eca63713ca8a35c3557b7d56b6a3073ca69e2067c18f5120c05d4ee8", 0x1e, 0x6}], 0x1, &(0x7f0000000a80)={[{@barrier='barrier'}, {@gid={'gid', 0x3d, r0}}, {@nodecompose='nodecompose'}, {@uid={'uid', 0x3d, r3}}, {@type={'type', 0x3d, "ae8c9d8f"}}, {@decompose='decompose'}, {@session={'session', 0x3d, 0x25}}], [{@uid_eq={'uid', 0x3d, r4}}, {@obj_type={'obj_type', 0x3d, 'overlay\x00'}}, {@euid_eq={'euid'}}, {@uid_eq={'uid'}}]}) [ 267.809421][T10999] RAX: ffffffffffffffda RBX: 00007f5e254b1c90 RCX: 0000000000459a29 [ 267.817369][T10999] RDX: 0000000000000000 RSI: 0000000020000100 RDI: 0000000000000003 [ 267.825326][T10999] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 267.833276][T10999] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f5e254b26d4 [ 267.841233][T10999] R13: 00000000004c7940 R14: 00000000004dd350 R15: 0000000000000004 11:46:32 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000140)='hfsplus\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x7, &(0x7f0000000800)=[{&(0x7f0000000400)="e1ec051c0b7b96db7480b4620be1f7d4adcb21d5233a3d23bf43659e5359470de231dd734b698cd71201837ca57f911328e1aee6b2cb39533b2d549e", 0x3c, 0x101}, {&(0x7f0000000440)="dbac23926131781587488e056e40b191269651683d0d195cbd63543040e313e20126fd634002e0256fed786d07054466250e2de6b7fb6d7d8d5201ac1478ef26aafeae7947832c4cc7fea6315e92eb81c89a385dae378bf89ca53c6984b5aa79a7dcc139938fa64b30d7c24ff7b215c890be5756df2f441d0fcb938cb4c1f89245a47c630a2b5e28bb7b5a9c8c871c45857bc4fa646b30f485beccdf529ad0cd519a0bed9b5c7df28320d9ad7eceb30eda6c964cfcab57c8aa98b89d582792b886e41c9f6146332e31f93b", 0xcb, 0x1ff}, {&(0x7f0000000540)="5c96cd9925cbe6753ba234c06f8040f650bba8d4d4ebe59964acf97c49f7a5e793521ef728d90a4eb42cbe7a2536c6922f049b20f2c681c652b4dbe077b0a9972e1eeb5573d7ee69d6fc99d4e4894537fac772842763140c5d832bf593a5cc290fd0c641d14d06e564127871808073fb6fd27f2a9995b29abce9351b0b285f4887f1cc8de04d147141af2ed66cfb66fd230e329273710457efc72a8d09487b5c83e77201b28eb38d7d3846b63b1bf1233b5c925303dd3214066c99381b0457a62397c7df27f88e19a884e1dfa6", 0xcd, 0x6}, {&(0x7f0000000640)="8ae3f201063e83beadb088cb1080ef67", 0x10, 0x2a}, {&(0x7f0000000680)="dfeed81fb09a8a0d55f0999ce7730866db77fa306b896464e4d9cf133371563c7eb734eed8ec2dda58c030b96771bb708fba592614b985c573e8f3db424553c6", 0x40, 0x4}, {&(0x7f00000006c0)="f33dec9b5d96888f1504b1385ce82fdf8f2fa76ecc6ebf567753242a4c9129cd4c4885ba8bab1fd3120749889c981acccb344645e9d1ce95826ab7ceac8b7646d2e476e8934ac444aad3bba14f0d4be15675cd3d336db510c72ebbc07a000754d66f5282b1f241556cbd63a30b3d6af0f5c8a2443b03a92bb406abbb5f630ce1ef2afbba93c29e6bc46901a91ea9d91fa6048a468df5934437ca7e9e2a4fe38fddcd2aecac9406aa7adf5de93082ebf1b5c74d76b7b1b72a9b6fea1c5ab7cc1f3e97b5d7e1db9a64df9836ce0863cda956a1e2a45b9479b8ade23e81258e9444dfbf8066562f79", 0xe7, 0x7}, {&(0x7f00000007c0)="cd72eca63713ca8a35c3557b7d56b6a3073ca69e2067c18f5120c05d4ee8", 0x1e, 0x6}], 0x1, &(0x7f0000000a80)={[{@barrier='barrier'}, {@gid={'gid'}}, {@nodecompose='nodecompose'}, {@uid={'uid'}}, {@type={'type', 0x3d, "ae8c9d8f"}}, {@decompose='decompose'}, {@session={'session', 0x3d, 0x25}}], [{@uid_eq={'uid'}}, {@obj_type={'obj_type', 0x3d, 'overlay\x00'}}, {@euid_eq={'euid'}}, {@uid_eq={'uid'}}]}) 11:46:32 executing program 0: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='devtmpfs\x00', 0x0, 0x0) chdir(&(0x7f00000000c0)='./file0\x00') pipe(0x0) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) syz_mount_image$hfsplus(&(0x7f0000000140)='hfsplus\x00', &(0x7f0000000200)='./file0\x00', 0x3, 0x7, &(0x7f0000000800)=[{&(0x7f0000000400)="e1ec051c0b7b96db7480b4620be1f7d4adcb21d5233a3d23bf43659e5359470de231dd734b698cd71201837ca57f911328e1aee6b2cb39533b2d549e", 0x3c, 0x101}, {&(0x7f0000000440)="dbac23926131781587488e056e40b191269651683d0d195cbd63543040e313e20126fd634002e0256fed786d07054466250e2de6b7fb6d7d8d5201ac1478ef26aafeae7947832c4cc7fea6315e92eb81c89a385dae378bf89ca53c6984b5aa79a7dcc139938fa64b30d7c24ff7b215c890be5756df2f441d0fcb938cb4c1f89245a47c630a2b5e28bb7b5a9c8c871c45857bc4fa646b30f485beccdf529ad0cd519a0bed9b5c7df28320d9ad7eceb30eda6c964cfcab57c8aa98b89d582792b886e41c9f6146332e31f93b", 0xcb, 0x1ff}, {&(0x7f0000000540)="5c96cd9925cbe6753ba234c06f8040f650bba8d4d4ebe59964acf97c49f7a5e793521ef728d90a4eb42cbe7a2536c6922f049b20f2c681c652b4dbe077b0a9972e1eeb5573d7ee69d6fc99d4e4894537fac772842763140c5d832bf593a5cc290fd0c641d14d06e564127871808073fb6fd27f2a9995b29abce9351b0b285f4887f1cc8de04d147141af2ed66cfb66fd230e329273710457efc72a8d09487b5c83e77201b28eb38d7d3846b63b1bf1233b5c925303dd3214066c99381b0457a62397c7df27f88e19a884e1dfa6", 0xcd, 0x6}, {&(0x7f0000000640)="8ae3f201063e83beadb088cb1080ef67", 0x10, 0x2a}, {&(0x7f0000000680)="dfeed81fb09a8a0d55f0999ce7730866db77fa306b896464e4d9cf133371563c7eb734eed8ec2dda58c030b96771bb708fba592614b985c573e8f3db424553c6", 0x40, 0x4}, {&(0x7f00000006c0)="f33dec9b5d96888f1504b1385ce82fdf8f2fa76ecc6ebf567753242a4c9129cd4c4885ba8bab1fd3120749889c981acccb344645e9d1ce95826ab7ceac8b7646d2e476e8934ac444aad3bba14f0d4be15675cd3d336db510c72ebbc07a000754d66f5282b1f241556cbd63a30b3d6af0f5c8a2443b03a92bb406abbb5f630ce1ef2afbba93c29e6bc46901a91ea9d91fa6048a468df5934437ca7e9e2a4fe38fddcd2aecac9406aa7adf5de93082ebf1b5c74d76b7b1b72a9b6fea1c5ab7cc1f3e97b5d7e1db9a64df9836ce0863cda956a1e2a45b9479b8ade23e81258e9444dfbf8066562f79", 0xe7, 0x7}, {&(0x7f00000007c0)="cd72eca63713ca8a35c3557b7d56b6a3073ca69e2067c18f5120c05d4ee8", 0x1e, 0x6}], 0x1, &(0x7f0000000a80)={[{@barrier='barrier'}, {@gid={'gid'}}, {@nodecompose='nodecompose'}, {@uid={'uid'}}, {@type={'type', 0x3d, "ae8c9d8f"}}, {@decompose='decompose'}, {@session={'session', 0x3d, 0x25}}], [{@uid_eq={'uid'}}, {@obj_type={'obj_type', 0x3d, 'overlay\x00'}}, {@euid_eq={'euid'}}, {@uid_eq={'uid'}}]}) 11:46:32 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_FSGETXATTR(0xffffffffffffffff, 0x8004550f, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x1}, 0x10) r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r0, &(0x7f0000000000)={{0x6, @rose}, [@rose, @rose, @default, @netrom, @bcast, @rose, @rose, @null]}, 0x48) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(0xffffffffffffffff, 0x6, 0x23, &(0x7f00000000c0)={&(0x7f0000ffc000/0x4000)=nil, 0x4000}, &(0x7f0000000140)=0x10) listen(r0, 0x0) unshare(0x40000000) setrlimit(0x0, 0x0) r1 = accept(r0, 0x0, 0x0) write$binfmt_elf64(r1, &(0x7f00000002c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x9, 0x8, 0x0, 0x0, 0x0, 0x4825483b35c83c0b, 0x0, 0x0, 0x40, 0x227}, [{0x4, 0x1, 0xfff, 0x0, 0x0, 0xff8000000002, 0x0, 0x7fff}], "", [[], [], []]}, 0x378) [ 268.066488][T11008] hfsplus: unable to parse mount options 11:46:33 executing program 1 (fault-call:3 fault-nth:7): setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) setsockopt$netlink_NETLINK_BROADCAST_ERROR(0xffffffffffffffff, 0x10e, 0x4, 0x0, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)={0x14, 0x23, 0x1, 0x0, 0x0, {0x20000000004, 0xe00000000000000}}, 0x14}}, 0x0) 11:46:33 executing program 4: r0 = socket$netlink(0x10, 0x3, 0xf) bind$netlink(r0, &(0x7f0000514ff4)={0x10, 0x0, 0x0, 0x2ffffffff}, 0xc) setsockopt$sock_int(r0, 0x1, 0x0, &(0x7f0000000000), 0x4) setsockopt$netlink_NETLINK_BROADCAST_ERROR(r0, 0x10e, 0x4, &(0x7f0000000080)=0x6, 0x4) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)={0x14, 0x23, 0x1, 0x0, 0x0, {0x20000000004, 0xe00000000000000}}, 0x14}}, 0x0) 11:46:33 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000140)='hfsplus\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x1, &(0x7f0000000a80)={[{@barrier='barrier'}, {@gid={'gid'}}, {@nodecompose='nodecompose'}, {@uid={'uid'}}, {@type={'type', 0x3d, "ae8c9d8f"}}, {@decompose='decompose'}, {@session={'session', 0x3d, 0x25}}], [{@uid_eq={'uid'}}, {@obj_type={'obj_type', 0x3d, 'overlay\x00'}}, {@euid_eq={'euid'}}, {@uid_eq={'uid'}}]}) [ 268.156209][T11012] hfsplus: unable to parse mount options [ 268.217098][T11017] IPVS: ftp: loaded support on port[0] = 21 11:46:33 executing program 0: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='devtmpfs\x00', 0x0, 0x0) chdir(&(0x7f00000000c0)='./file0\x00') pipe(0x0) syz_mount_image$hfsplus(&(0x7f0000000140)='hfsplus\x00', &(0x7f0000000200)='./file0\x00', 0x3, 0x7, &(0x7f0000000800)=[{&(0x7f0000000400)="e1ec051c0b7b96db7480b4620be1f7d4adcb21d5233a3d23bf43659e5359470de231dd734b698cd71201837ca57f911328e1aee6b2cb39533b2d549e", 0x3c, 0x101}, {&(0x7f0000000440)="dbac23926131781587488e056e40b191269651683d0d195cbd63543040e313e20126fd634002e0256fed786d07054466250e2de6b7fb6d7d8d5201ac1478ef26aafeae7947832c4cc7fea6315e92eb81c89a385dae378bf89ca53c6984b5aa79a7dcc139938fa64b30d7c24ff7b215c890be5756df2f441d0fcb938cb4c1f89245a47c630a2b5e28bb7b5a9c8c871c45857bc4fa646b30f485beccdf529ad0cd519a0bed9b5c7df28320d9ad7eceb30eda6c964cfcab57c8aa98b89d582792b886e41c9f6146332e31f93b", 0xcb, 0x1ff}, {&(0x7f0000000540)="5c96cd9925cbe6753ba234c06f8040f650bba8d4d4ebe59964acf97c49f7a5e793521ef728d90a4eb42cbe7a2536c6922f049b20f2c681c652b4dbe077b0a9972e1eeb5573d7ee69d6fc99d4e4894537fac772842763140c5d832bf593a5cc290fd0c641d14d06e564127871808073fb6fd27f2a9995b29abce9351b0b285f4887f1cc8de04d147141af2ed66cfb66fd230e329273710457efc72a8d09487b5c83e77201b28eb38d7d3846b63b1bf1233b5c925303dd3214066c99381b0457a62397c7df27f88e19a884e1dfa6", 0xcd, 0x6}, {&(0x7f0000000640)="8ae3f201063e83beadb088cb1080ef67", 0x10, 0x2a}, {&(0x7f0000000680)="dfeed81fb09a8a0d55f0999ce7730866db77fa306b896464e4d9cf133371563c7eb734eed8ec2dda58c030b96771bb708fba592614b985c573e8f3db424553c6", 0x40, 0x4}, {&(0x7f00000006c0)="f33dec9b5d96888f1504b1385ce82fdf8f2fa76ecc6ebf567753242a4c9129cd4c4885ba8bab1fd3120749889c981acccb344645e9d1ce95826ab7ceac8b7646d2e476e8934ac444aad3bba14f0d4be15675cd3d336db510c72ebbc07a000754d66f5282b1f241556cbd63a30b3d6af0f5c8a2443b03a92bb406abbb5f630ce1ef2afbba93c29e6bc46901a91ea9d91fa6048a468df5934437ca7e9e2a4fe38fddcd2aecac9406aa7adf5de93082ebf1b5c74d76b7b1b72a9b6fea1c5ab7cc1f3e97b5d7e1db9a64df9836ce0863cda956a1e2a45b9479b8ade23e81258e9444dfbf8066562f79", 0xe7, 0x7}, {&(0x7f00000007c0)="cd72eca63713ca8a35c3557b7d56b6a3073ca69e2067c18f5120c05d4ee8", 0x1e, 0x6}], 0x1, &(0x7f0000000a80)={[{@barrier='barrier'}, {@gid={'gid'}}, {@nodecompose='nodecompose'}, {@uid={'uid'}}, {@type={'type', 0x3d, "ae8c9d8f"}}, {@decompose='decompose'}, {@session={'session', 0x3d, 0x25}}], [{@uid_eq={'uid'}}, {@obj_type={'obj_type', 0x3d, 'overlay\x00'}}, {@euid_eq={'euid'}}, {@uid_eq={'uid'}}]}) [ 268.343510][T11032] FAULT_INJECTION: forcing a failure. [ 268.343510][T11032] name failslab, interval 1, probability 0, space 0, times 0 [ 268.386484][T11027] hfsplus: unable to parse mount options [ 268.411642][T11028] overlayfs: unrecognized mount option "uppFrdir=./file0" or missing value [ 268.429908][T11032] CPU: 1 PID: 11032 Comm: syz-executor.1 Not tainted 5.3.0+ #0 [ 268.437471][T11032] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 268.447529][T11032] Call Trace: [ 268.450828][T11032] dump_stack+0x172/0x1f0 [ 268.455183][T11032] should_fail.cold+0xa/0x15 [ 268.459806][T11032] ? fault_create_debugfs_attr+0x180/0x180 [ 268.465618][T11032] ? ___might_sleep+0x163/0x2c0 [ 268.465641][T11032] __should_failslab+0x121/0x190 [ 268.465662][T11032] should_failslab+0x9/0x14 [ 268.479908][T11032] kmem_cache_alloc_node_trace+0x274/0x750 [ 268.485716][T11032] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 268.485742][T11032] __kmalloc_node+0x3d/0x70 [ 268.485761][T11032] kvmalloc_node+0x68/0x100 [ 268.500512][T11032] bucket_table_alloc+0x90/0x480 [ 268.505647][T11032] rhashtable_init+0x3f4/0x7b0 [ 268.505666][T11032] rhltable_init+0x21/0x60 [ 268.505731][T11032] sta_info_init+0x24/0x110 [ 268.505749][T11032] ieee80211_alloc_hw_nm+0x6d3/0x20e0 [ 268.514885][T11032] mac80211_hwsim_new_radio+0x1ef/0x4360 [ 268.514905][T11032] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 268.514917][T11032] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 268.514937][T11032] ? cred_has_capability+0x199/0x330 [ 268.524753][T11032] ? selinux_sb_eat_lsm_opts+0x700/0x700 [ 268.524770][T11032] ? selinux_sb_eat_lsm_opts+0x700/0x700 [ 268.524784][T11032] ? __kasan_check_read+0x11/0x20 [ 268.524802][T11032] ? hwsim_cloned_frame_received_nl+0x1640/0x1640 [ 268.536620][T11032] ? memset+0x32/0x40 [ 268.536641][T11032] hwsim_new_radio_nl+0x9e3/0x1070 [ 268.536660][T11032] ? mac80211_hwsim_new_radio+0x4360/0x4360 [ 268.536676][T11032] ? nla_memcpy+0xb0/0xb0 [ 268.536701][T11032] ? __nla_parse+0x43/0x60 [ 268.548186][T11032] genl_family_rcv_msg+0x74b/0xf90 [ 268.548212][T11032] ? genl_unregister_family+0x7b0/0x7b0 [ 268.548227][T11032] ? __kasan_check_read+0x11/0x20 [ 268.548247][T11032] ? __lock_acquire+0x16f2/0x4a00 [ 268.559452][T11032] ? __dev_queue_xmit+0xbb5/0x3720 [ 268.559487][T11032] genl_rcv_msg+0xca/0x170 [ 268.559510][T11032] netlink_rcv_skb+0x177/0x450 [ 268.570905][T11032] ? genl_family_rcv_msg+0xf90/0xf90 [ 268.570924][T11032] ? netlink_ack+0xb50/0xb50 [ 268.570938][T11032] ? __kasan_check_write+0x14/0x20 [ 268.570957][T11032] ? netlink_deliver_tap+0x254/0xbf0 [ 268.570979][T11032] genl_rcv+0x29/0x40 [ 268.580032][T11032] netlink_unicast+0x531/0x710 [ 268.580054][T11032] ? netlink_attachskb+0x7c0/0x7c0 [ 268.580067][T11032] ? _copy_from_iter_full+0x25d/0x8c0 [ 268.580087][T11032] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 268.580107][T11032] netlink_sendmsg+0x8a5/0xd60 [ 268.590282][T11032] ? netlink_unicast+0x710/0x710 [ 268.590302][T11032] ? tomoyo_socket_sendmsg+0x26/0x30 [ 268.590325][T11032] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 268.599807][T11032] ? security_socket_sendmsg+0x8d/0xc0 [ 268.599823][T11032] ? netlink_unicast+0x710/0x710 [ 268.599842][T11032] sock_sendmsg+0xd7/0x130 [ 268.599858][T11032] ___sys_sendmsg+0x803/0x920 [ 268.599875][T11032] ? copy_msghdr_from_user+0x440/0x440 [ 268.599897][T11032] ? __kasan_check_read+0x11/0x20 [ 268.599917][T11032] ? __fget+0x384/0x560 [ 268.610563][T11032] ? ksys_dup3+0x3e0/0x3e0 [ 268.610593][T11032] ? __fget_light+0x1a9/0x230 [ 268.620679][T11032] ? __fdget+0x1b/0x20 [ 268.620696][T11032] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 268.620718][T11032] __sys_sendmsg+0x105/0x1d0 [ 268.620735][T11032] ? __sys_sendmsg_sock+0xd0/0xd0 [ 268.620764][T11032] ? trace_hardirqs_on_thunk+0x1a/0x20 [ 268.629885][T11032] ? do_syscall_64+0x26/0x760 [ 268.629902][T11032] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 268.629913][T11032] ? do_syscall_64+0x26/0x760 [ 268.629934][T11032] __x64_sys_sendmsg+0x78/0xb0 [ 268.639752][T11032] do_syscall_64+0xfa/0x760 [ 268.639772][T11032] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 268.639784][T11032] RIP: 0033:0x459a29 [ 268.639799][T11032] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 268.639811][T11032] RSP: 002b:00007f5e254b1c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 268.650151][T11032] RAX: ffffffffffffffda RBX: 00007f5e254b1c90 RCX: 0000000000459a29 [ 268.650160][T11032] RDX: 0000000000000000 RSI: 0000000020000100 RDI: 0000000000000003 [ 268.650169][T11032] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 268.650178][T11032] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f5e254b26d4 [ 268.650187][T11032] R13: 00000000004c7940 R14: 00000000004dd350 R15: 0000000000000004 [ 268.849782][T11038] hfsplus: unable to parse mount options [ 268.878959][T11041] hfsplus: unable to parse mount options 11:46:33 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000140)='hfsplus\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000a80)={[{@barrier='barrier'}, {@gid={'gid'}}, {@nodecompose='nodecompose'}, {@uid={'uid'}}, {@type={'type', 0x3d, "ae8c9d8f"}}, {@decompose='decompose'}, {@session={'session', 0x3d, 0x25}}], [{@uid_eq={'uid'}}, {@obj_type={'obj_type', 0x3d, 'overlay\x00'}}, {@euid_eq={'euid'}}, {@uid_eq={'uid'}}]}) 11:46:33 executing program 5: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='devtmpfs\x00', 0x0, 0x0) chdir(&(0x7f00000000c0)='./file0\x00') pipe(0x0) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mkdir(0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$overlay(0x40000f, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="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"]) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000240)='cgroup2\x00', 0x0, 0x0) fstat(0xffffffffffffffff, &(0x7f00000008c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000005ec0)={{{@in6=@empty, @in=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@remote}, 0x0, @in6=@mcast2}}, &(0x7f0000004800)=0xffffffffffffffc3) r3 = geteuid() setsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f00000060c0)={{{@in=@remote, @in6=@rand_addr="20bbcbd1865253e3e58aa219d6ca6440", 0x4e21, 0x2400000000000000, 0x4e22, 0x0, 0xa, 0xa0, 0x0, 0x67, r2, r3}, {0x6, 0x183, 0x3, 0x7f, 0x61553a0b, 0x9, 0x1, 0x4}, {0x20, 0x80000001, 0x2000000000001, 0x9}, 0x9, 0x6e6bba, 0x0, 0x0, 0x1, 0x3}, {{@in=@empty, 0x4d3, 0x3c}, 0xa, @in=@loopback, 0x3504, 0x0, 0x3, 0xfffffffffffffffc, 0x1ff, 0x5, 0x6}}, 0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000940)={{{@in6, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@dev}, 0x0, @in6=@local}}, &(0x7f0000000a40)=0xe8) socket$inet_udplite(0x2, 0x2, 0x88) syz_mount_image$hfsplus(&(0x7f0000000140)='hfsplus\x00', &(0x7f0000000200)='./file0\x00', 0x3, 0x7, &(0x7f0000000800)=[{&(0x7f0000000400)="e1ec051c0b7b96db7480b4620be1f7d4adcb21d5233a3d23bf43659e5359470de231dd734b698cd71201837ca57f911328e1aee6b2cb39533b2d549e", 0x3c, 0x101}, {&(0x7f0000000440)="dbac23926131781587488e056e40b191269651683d0d195cbd63543040e313e20126fd634002e0256fed786d07054466250e2de6b7fb6d7d8d5201ac1478ef26aafeae7947832c4cc7fea6315e92eb81c89a385dae378bf89ca53c6984b5aa79a7dcc139938fa64b30d7c24ff7b215c890be5756df2f441d0fcb938cb4c1f89245a47c630a2b5e28bb7b5a9c8c871c45857bc4fa646b30f485beccdf529ad0cd519a0bed9b5c7df28320d9ad7eceb30eda6c964cfcab57c8aa98b89d582792b886e41c9f6146332e31f93b", 0xcb, 0x1ff}, {&(0x7f0000000540)="5c96cd9925cbe6753ba234c06f8040f650bba8d4d4ebe59964acf97c49f7a5e793521ef728d90a4eb42cbe7a2536c6922f049b20f2c681c652b4dbe077b0a9972e1eeb5573d7ee69d6fc99d4e4894537fac772842763140c5d832bf593a5cc290fd0c641d14d06e564127871808073fb6fd27f2a9995b29abce9351b0b285f4887f1cc8de04d147141af2ed66cfb66fd230e329273710457efc72a8d09487b5c83e77201b28eb38d7d3846b63b1bf1233b5c925303dd3214066c99381b0457a62397c7df27f88e19a884e1dfa6", 0xcd, 0x6}, {&(0x7f0000000640)="8ae3f201063e83beadb088cb1080ef67", 0x10, 0x2a}, {&(0x7f0000000680)="dfeed81fb09a8a0d55f0999ce7730866db77fa306b896464e4d9cf133371563c7eb734eed8ec2dda58c030b96771bb708fba592614b985c573e8f3db424553c6", 0x40, 0x4}, {&(0x7f00000006c0)="f33dec9b5d96888f1504b1385ce82fdf8f2fa76ecc6ebf567753242a4c9129cd4c4885ba8bab1fd3120749889c981acccb344645e9d1ce95826ab7ceac8b7646d2e476e8934ac444aad3bba14f0d4be15675cd3d336db510c72ebbc07a000754d66f5282b1f241556cbd63a30b3d6af0f5c8a2443b03a92bb406abbb5f630ce1ef2afbba93c29e6bc46901a91ea9d91fa6048a468df5934437ca7e9e2a4fe38fddcd2aecac9406aa7adf5de93082ebf1b5c74d76b7b1b72a9b6fea1c5ab7cc1f3e97b5d7e1db9a64df9836ce0863cda956a1e2a45b9479b8ade23e81258e9444dfbf8066562f79", 0xe7, 0x7}, {&(0x7f00000007c0)="cd72eca63713ca8a35c3557b7d56b6a3073ca69e2067c18f5120c05d4ee8", 0x1e, 0x6}], 0x1, &(0x7f0000000a80)={[{@barrier='barrier'}, {@gid={'gid', 0x3d, r0}}, {@nodecompose='nodecompose'}, {@uid={'uid', 0x3d, r3}}, {@type={'type', 0x3d, "ae8c9d8f"}}, {@decompose='decompose'}, {@session={'session', 0x3d, 0x25}}], [{@uid_eq={'uid', 0x3d, r4}}, {@obj_type={'obj_type', 0x3d, 'overlay\x00'}}, {@euid_eq={'euid'}}, {@uid_eq={'uid'}}]}) 11:46:34 executing program 1 (fault-call:3 fault-nth:8): setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) setsockopt$netlink_NETLINK_BROADCAST_ERROR(0xffffffffffffffff, 0x10e, 0x4, 0x0, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)={0x14, 0x23, 0x1, 0x0, 0x0, {0x20000000004, 0xe00000000000000}}, 0x14}}, 0x0) 11:46:34 executing program 0: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='devtmpfs\x00', 0x0, 0x0) chdir(&(0x7f00000000c0)='./file0\x00') syz_mount_image$hfsplus(&(0x7f0000000140)='hfsplus\x00', &(0x7f0000000200)='./file0\x00', 0x3, 0x7, &(0x7f0000000800)=[{&(0x7f0000000400)="e1ec051c0b7b96db7480b4620be1f7d4adcb21d5233a3d23bf43659e5359470de231dd734b698cd71201837ca57f911328e1aee6b2cb39533b2d549e", 0x3c, 0x101}, {&(0x7f0000000440)="dbac23926131781587488e056e40b191269651683d0d195cbd63543040e313e20126fd634002e0256fed786d07054466250e2de6b7fb6d7d8d5201ac1478ef26aafeae7947832c4cc7fea6315e92eb81c89a385dae378bf89ca53c6984b5aa79a7dcc139938fa64b30d7c24ff7b215c890be5756df2f441d0fcb938cb4c1f89245a47c630a2b5e28bb7b5a9c8c871c45857bc4fa646b30f485beccdf529ad0cd519a0bed9b5c7df28320d9ad7eceb30eda6c964cfcab57c8aa98b89d582792b886e41c9f6146332e31f93b", 0xcb, 0x1ff}, {&(0x7f0000000540)="5c96cd9925cbe6753ba234c06f8040f650bba8d4d4ebe59964acf97c49f7a5e793521ef728d90a4eb42cbe7a2536c6922f049b20f2c681c652b4dbe077b0a9972e1eeb5573d7ee69d6fc99d4e4894537fac772842763140c5d832bf593a5cc290fd0c641d14d06e564127871808073fb6fd27f2a9995b29abce9351b0b285f4887f1cc8de04d147141af2ed66cfb66fd230e329273710457efc72a8d09487b5c83e77201b28eb38d7d3846b63b1bf1233b5c925303dd3214066c99381b0457a62397c7df27f88e19a884e1dfa6", 0xcd, 0x6}, {&(0x7f0000000640)="8ae3f201063e83beadb088cb1080ef67", 0x10, 0x2a}, {&(0x7f0000000680)="dfeed81fb09a8a0d55f0999ce7730866db77fa306b896464e4d9cf133371563c7eb734eed8ec2dda58c030b96771bb708fba592614b985c573e8f3db424553c6", 0x40, 0x4}, {&(0x7f00000006c0)="f33dec9b5d96888f1504b1385ce82fdf8f2fa76ecc6ebf567753242a4c9129cd4c4885ba8bab1fd3120749889c981acccb344645e9d1ce95826ab7ceac8b7646d2e476e8934ac444aad3bba14f0d4be15675cd3d336db510c72ebbc07a000754d66f5282b1f241556cbd63a30b3d6af0f5c8a2443b03a92bb406abbb5f630ce1ef2afbba93c29e6bc46901a91ea9d91fa6048a468df5934437ca7e9e2a4fe38fddcd2aecac9406aa7adf5de93082ebf1b5c74d76b7b1b72a9b6fea1c5ab7cc1f3e97b5d7e1db9a64df9836ce0863cda956a1e2a45b9479b8ade23e81258e9444dfbf8066562f79", 0xe7, 0x7}, {&(0x7f00000007c0)="cd72eca63713ca8a35c3557b7d56b6a3073ca69e2067c18f5120c05d4ee8", 0x1e, 0x6}], 0x1, &(0x7f0000000a80)={[{@barrier='barrier'}, {@gid={'gid'}}, {@nodecompose='nodecompose'}, {@uid={'uid'}}, {@type={'type', 0x3d, "ae8c9d8f"}}, {@decompose='decompose'}, {@session={'session', 0x3d, 0x25}}], [{@uid_eq={'uid'}}, {@obj_type={'obj_type', 0x3d, 'overlay\x00'}}, {@euid_eq={'euid'}}, {@uid_eq={'uid'}}]}) 11:46:34 executing program 4: r0 = socket$netlink(0x10, 0x3, 0xf) bind$netlink(r0, &(0x7f0000514ff4)={0x10, 0x0, 0x0, 0x2ffffffff}, 0xc) setsockopt$sock_int(r0, 0x1, 0x0, &(0x7f0000000000), 0x4) setsockopt$netlink_NETLINK_BROADCAST_ERROR(r0, 0x10e, 0x4, &(0x7f0000000080)=0x6, 0x4) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)={0x14, 0x23, 0x1, 0x0, 0x0, {0x20000000004, 0xe00000000000000}}, 0x14}}, 0x0) [ 269.114914][T11049] hfsplus: unable to parse mount options 11:46:34 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000140)='hfsplus\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 11:46:34 executing program 4: r0 = socket$netlink(0x10, 0x3, 0xf) bind$netlink(r0, &(0x7f0000514ff4)={0x10, 0x0, 0x0, 0x2ffffffff}, 0xc) setsockopt$sock_int(r0, 0x1, 0x0, &(0x7f0000000000), 0x4) setsockopt$netlink_NETLINK_BROADCAST_ERROR(r0, 0x10e, 0x4, &(0x7f0000000080)=0x6, 0x4) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)={0x14, 0x23, 0x1, 0x0, 0x0, {0x20000000004, 0xe00000000000000}}, 0x14}}, 0x0) [ 269.267922][T11059] FAULT_INJECTION: forcing a failure. [ 269.267922][T11059] name failslab, interval 1, probability 0, space 0, times 0 [ 269.326012][T11059] CPU: 0 PID: 11059 Comm: syz-executor.1 Not tainted 5.3.0+ #0 [ 269.333593][T11059] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 269.343646][T11059] Call Trace: [ 269.346940][T11059] dump_stack+0x172/0x1f0 [ 269.351280][T11059] should_fail.cold+0xa/0x15 [ 269.354661][T11065] overlayfs: unrecognized mount option "uppFrdir=./file0" or missing value [ 269.355877][T11059] ? fault_create_debugfs_attr+0x180/0x180 [ 269.370239][T11059] ? ___might_sleep+0x163/0x2c0 [ 269.375091][T11059] __should_failslab+0x121/0x190 [ 269.375110][T11059] should_failslab+0x9/0x14 [ 269.384514][T11059] __kmalloc_track_caller+0x2dc/0x760 [ 269.389880][T11059] ? pointer+0x720/0x720 [ 269.389902][T11059] ? kasprintf+0xbb/0xf0 [ 269.389920][T11059] kvasprintf+0xc8/0x170 [ 269.402583][T11059] ? bust_spinlocks+0xe0/0xe0 [ 269.407266][T11059] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 269.413076][T11059] kasprintf+0xbb/0xf0 [ 269.417146][T11059] ? kvasprintf_const+0x190/0x190 [ 269.422175][T11059] ? free_object+0x70/0x70 [ 269.426594][T11059] ? lockdep_init_map+0x1be/0x6d0 [ 269.431677][T11059] ieee80211_alloc_led_names+0x85/0x410 [ 269.431696][T11059] ieee80211_alloc_hw_nm+0x1b0b/0x20e0 [ 269.442854][T11059] mac80211_hwsim_new_radio+0x1ef/0x4360 [ 269.448492][T11059] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 269.454730][T11059] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 269.454747][T11059] ? cred_has_capability+0x199/0x330 [ 269.454764][T11059] ? selinux_sb_eat_lsm_opts+0x700/0x700 [ 269.454782][T11059] ? selinux_sb_eat_lsm_opts+0x700/0x700 [ 269.477502][T11059] ? __kasan_check_read+0x11/0x20 [ 269.482531][T11059] ? hwsim_cloned_frame_received_nl+0x1640/0x1640 [ 269.488950][T11059] ? memset+0x32/0x40 [ 269.492943][T11059] hwsim_new_radio_nl+0x9e3/0x1070 [ 269.496027][T11062] hfsplus: unable to parse mount options [ 269.498057][T11059] ? mac80211_hwsim_new_radio+0x4360/0x4360 [ 269.498088][T11059] ? nla_memcpy+0xb0/0xb0 [ 269.513886][T11059] ? __nla_parse+0x43/0x60 [ 269.518312][T11059] genl_family_rcv_msg+0x74b/0xf90 [ 269.523432][T11059] ? genl_unregister_family+0x7b0/0x7b0 [ 269.528981][T11059] ? __kasan_check_read+0x11/0x20 [ 269.534003][T11059] ? __lock_acquire+0x16f2/0x4a00 [ 269.539023][T11059] ? __dev_queue_xmit+0xbb5/0x3720 [ 269.544149][T11059] genl_rcv_msg+0xca/0x170 [ 269.548567][T11059] netlink_rcv_skb+0x177/0x450 [ 269.553328][T11059] ? genl_family_rcv_msg+0xf90/0xf90 [ 269.558611][T11059] ? netlink_ack+0xb50/0xb50 [ 269.563196][T11059] ? __kasan_check_write+0x14/0x20 [ 269.568313][T11059] ? netlink_deliver_tap+0x254/0xbf0 [ 269.573606][T11059] genl_rcv+0x29/0x40 [ 269.577592][T11059] netlink_unicast+0x531/0x710 [ 269.582364][T11059] ? netlink_attachskb+0x7c0/0x7c0 [ 269.587476][T11059] ? _copy_from_iter_full+0x25d/0x8c0 [ 269.592954][T11059] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 269.599200][T11059] netlink_sendmsg+0x8a5/0xd60 [ 269.603984][T11059] ? netlink_unicast+0x710/0x710 [ 269.608927][T11059] ? tomoyo_socket_sendmsg+0x26/0x30 [ 269.614217][T11059] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 269.620455][T11059] ? security_socket_sendmsg+0x8d/0xc0 [ 269.625911][T11059] ? netlink_unicast+0x710/0x710 [ 269.630852][T11059] sock_sendmsg+0xd7/0x130 [ 269.635271][T11059] ___sys_sendmsg+0x803/0x920 [ 269.639945][T11059] ? copy_msghdr_from_user+0x440/0x440 [ 269.645408][T11059] ? __kasan_check_read+0x11/0x20 [ 269.650439][T11059] ? __fget+0x384/0x560 [ 269.654602][T11059] ? ksys_dup3+0x3e0/0x3e0 [ 269.659029][T11059] ? __fget_light+0x1a9/0x230 [ 269.663708][T11059] ? __fdget+0x1b/0x20 [ 269.667778][T11059] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 269.674025][T11059] __sys_sendmsg+0x105/0x1d0 [ 269.678616][T11059] ? __sys_sendmsg_sock+0xd0/0xd0 [ 269.683653][T11059] ? trace_hardirqs_on_thunk+0x1a/0x20 [ 269.689110][T11059] ? do_syscall_64+0x26/0x760 [ 269.693792][T11059] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 269.699853][T11059] ? do_syscall_64+0x26/0x760 [ 269.704536][T11059] __x64_sys_sendmsg+0x78/0xb0 [ 269.709310][T11059] do_syscall_64+0xfa/0x760 [ 269.713818][T11059] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 269.719701][T11059] RIP: 0033:0x459a29 [ 269.723596][T11059] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 269.743196][T11059] RSP: 002b:00007f5e254b1c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 269.751621][T11059] RAX: ffffffffffffffda RBX: 00007f5e254b1c90 RCX: 0000000000459a29 [ 269.759588][T11059] RDX: 0000000000000000 RSI: 0000000020000100 RDI: 0000000000000003 [ 269.767555][T11059] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 269.775521][T11059] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f5e254b26d4 [ 269.783509][T11059] R13: 00000000004c7940 R14: 00000000004dd350 R15: 0000000000000004 [ 269.852942][T11060] hfsplus: unable to parse mount options [ 269.882975][T11073] hfsplus: unable to find HFS+ superblock 11:46:36 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_FSGETXATTR(0xffffffffffffffff, 0x8004550f, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x1}, 0x10) r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r0, &(0x7f0000000000)={{0x6, @rose}, [@rose, @rose, @default, @netrom, @bcast, @rose, @rose, @null]}, 0x48) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(0xffffffffffffffff, 0x6, 0x23, &(0x7f00000000c0)={&(0x7f0000ffc000/0x4000)=nil, 0x4000}, &(0x7f0000000140)=0x10) listen(r0, 0x0) unshare(0x40000000) setrlimit(0x0, 0x0) r1 = accept(r0, 0x0, 0x0) write$binfmt_elf64(r1, &(0x7f00000002c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x9, 0x8, 0x0, 0x0, 0x0, 0x4825483b35c83c0b, 0x0, 0x0, 0x40, 0x227}, [{0x4, 0x1, 0xfff, 0x0, 0x0, 0xff8000000002, 0x0, 0x7fff}], "", [[], [], []]}, 0x378) 11:46:36 executing program 0: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='devtmpfs\x00', 0x0, 0x0) syz_mount_image$hfsplus(&(0x7f0000000140)='hfsplus\x00', &(0x7f0000000200)='./file0\x00', 0x3, 0x7, &(0x7f0000000800)=[{&(0x7f0000000400)="e1ec051c0b7b96db7480b4620be1f7d4adcb21d5233a3d23bf43659e5359470de231dd734b698cd71201837ca57f911328e1aee6b2cb39533b2d549e", 0x3c, 0x101}, {&(0x7f0000000440)="dbac23926131781587488e056e40b191269651683d0d195cbd63543040e313e20126fd634002e0256fed786d07054466250e2de6b7fb6d7d8d5201ac1478ef26aafeae7947832c4cc7fea6315e92eb81c89a385dae378bf89ca53c6984b5aa79a7dcc139938fa64b30d7c24ff7b215c890be5756df2f441d0fcb938cb4c1f89245a47c630a2b5e28bb7b5a9c8c871c45857bc4fa646b30f485beccdf529ad0cd519a0bed9b5c7df28320d9ad7eceb30eda6c964cfcab57c8aa98b89d582792b886e41c9f6146332e31f93b", 0xcb, 0x1ff}, {&(0x7f0000000540)="5c96cd9925cbe6753ba234c06f8040f650bba8d4d4ebe59964acf97c49f7a5e793521ef728d90a4eb42cbe7a2536c6922f049b20f2c681c652b4dbe077b0a9972e1eeb5573d7ee69d6fc99d4e4894537fac772842763140c5d832bf593a5cc290fd0c641d14d06e564127871808073fb6fd27f2a9995b29abce9351b0b285f4887f1cc8de04d147141af2ed66cfb66fd230e329273710457efc72a8d09487b5c83e77201b28eb38d7d3846b63b1bf1233b5c925303dd3214066c99381b0457a62397c7df27f88e19a884e1dfa6", 0xcd, 0x6}, {&(0x7f0000000640)="8ae3f201063e83beadb088cb1080ef67", 0x10, 0x2a}, {&(0x7f0000000680)="dfeed81fb09a8a0d55f0999ce7730866db77fa306b896464e4d9cf133371563c7eb734eed8ec2dda58c030b96771bb708fba592614b985c573e8f3db424553c6", 0x40, 0x4}, {&(0x7f00000006c0)="f33dec9b5d96888f1504b1385ce82fdf8f2fa76ecc6ebf567753242a4c9129cd4c4885ba8bab1fd3120749889c981acccb344645e9d1ce95826ab7ceac8b7646d2e476e8934ac444aad3bba14f0d4be15675cd3d336db510c72ebbc07a000754d66f5282b1f241556cbd63a30b3d6af0f5c8a2443b03a92bb406abbb5f630ce1ef2afbba93c29e6bc46901a91ea9d91fa6048a468df5934437ca7e9e2a4fe38fddcd2aecac9406aa7adf5de93082ebf1b5c74d76b7b1b72a9b6fea1c5ab7cc1f3e97b5d7e1db9a64df9836ce0863cda956a1e2a45b9479b8ade23e81258e9444dfbf8066562f79", 0xe7, 0x7}, {&(0x7f00000007c0)="cd72eca63713ca8a35c3557b7d56b6a3073ca69e2067c18f5120c05d4ee8", 0x1e, 0x6}], 0x1, &(0x7f0000000a80)={[{@barrier='barrier'}, {@gid={'gid'}}, {@nodecompose='nodecompose'}, {@uid={'uid'}}, {@type={'type', 0x3d, "ae8c9d8f"}}, {@decompose='decompose'}, {@session={'session', 0x3d, 0x25}}], [{@uid_eq={'uid'}}, {@obj_type={'obj_type', 0x3d, 'overlay\x00'}}, {@euid_eq={'euid'}}, {@uid_eq={'uid'}}]}) 11:46:36 executing program 4: r0 = socket$netlink(0x10, 0x3, 0xf) bind$netlink(r0, &(0x7f0000514ff4)={0x10, 0x0, 0x0, 0x2ffffffff}, 0xc) setsockopt$sock_int(r0, 0x1, 0x8, 0x0, 0x0) setsockopt$netlink_NETLINK_BROADCAST_ERROR(r0, 0x10e, 0x4, &(0x7f0000000080)=0x6, 0x4) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)={0x14, 0x23, 0x1, 0x0, 0x0, {0x20000000004, 0xe00000000000000}}, 0x14}}, 0x0) 11:46:36 executing program 1 (fault-call:3 fault-nth:9): setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) setsockopt$netlink_NETLINK_BROADCAST_ERROR(0xffffffffffffffff, 0x10e, 0x4, 0x0, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)={0x14, 0x23, 0x1, 0x0, 0x0, {0x20000000004, 0xe00000000000000}}, 0x14}}, 0x0) 11:46:36 executing program 5: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='devtmpfs\x00', 0x0, 0x0) chdir(&(0x7f00000000c0)='./file0\x00') pipe(0x0) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mkdir(0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$overlay(0x40000f, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="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"]) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000240)='cgroup2\x00', 0x0, 0x0) fstat(0xffffffffffffffff, &(0x7f00000008c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000005ec0)={{{@in6=@empty, @in=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@remote}, 0x0, @in6=@mcast2}}, &(0x7f0000004800)=0xffffffffffffffc3) r3 = geteuid() setsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f00000060c0)={{{@in=@remote, @in6=@rand_addr="20bbcbd1865253e3e58aa219d6ca6440", 0x4e21, 0x2400000000000000, 0x4e22, 0x0, 0xa, 0xa0, 0x0, 0x67, r2, r3}, {0x6, 0x183, 0x3, 0x7f, 0x61553a0b, 0x9, 0x1, 0x4}, {0x20, 0x80000001, 0x2000000000001, 0x9}, 0x9, 0x6e6bba, 0x0, 0x0, 0x1, 0x3}, {{@in=@empty, 0x4d3, 0x3c}, 0xa, @in=@loopback, 0x3504, 0x0, 0x3, 0xfffffffffffffffc, 0x1ff, 0x5, 0x6}}, 0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000940)={{{@in6, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@dev}, 0x0, @in6=@local}}, &(0x7f0000000a40)=0xe8) syz_mount_image$hfsplus(&(0x7f0000000140)='hfsplus\x00', &(0x7f0000000200)='./file0\x00', 0x3, 0x7, &(0x7f0000000800)=[{&(0x7f0000000400)="e1ec051c0b7b96db7480b4620be1f7d4adcb21d5233a3d23bf43659e5359470de231dd734b698cd71201837ca57f911328e1aee6b2cb39533b2d549e", 0x3c, 0x101}, {&(0x7f0000000440)="dbac23926131781587488e056e40b191269651683d0d195cbd63543040e313e20126fd634002e0256fed786d07054466250e2de6b7fb6d7d8d5201ac1478ef26aafeae7947832c4cc7fea6315e92eb81c89a385dae378bf89ca53c6984b5aa79a7dcc139938fa64b30d7c24ff7b215c890be5756df2f441d0fcb938cb4c1f89245a47c630a2b5e28bb7b5a9c8c871c45857bc4fa646b30f485beccdf529ad0cd519a0bed9b5c7df28320d9ad7eceb30eda6c964cfcab57c8aa98b89d582792b886e41c9f6146332e31f93b", 0xcb, 0x1ff}, {&(0x7f0000000540)="5c96cd9925cbe6753ba234c06f8040f650bba8d4d4ebe59964acf97c49f7a5e793521ef728d90a4eb42cbe7a2536c6922f049b20f2c681c652b4dbe077b0a9972e1eeb5573d7ee69d6fc99d4e4894537fac772842763140c5d832bf593a5cc290fd0c641d14d06e564127871808073fb6fd27f2a9995b29abce9351b0b285f4887f1cc8de04d147141af2ed66cfb66fd230e329273710457efc72a8d09487b5c83e77201b28eb38d7d3846b63b1bf1233b5c925303dd3214066c99381b0457a62397c7df27f88e19a884e1dfa6", 0xcd, 0x6}, {&(0x7f0000000640)="8ae3f201063e83beadb088cb1080ef67", 0x10, 0x2a}, {&(0x7f0000000680)="dfeed81fb09a8a0d55f0999ce7730866db77fa306b896464e4d9cf133371563c7eb734eed8ec2dda58c030b96771bb708fba592614b985c573e8f3db424553c6", 0x40, 0x4}, {&(0x7f00000006c0)="f33dec9b5d96888f1504b1385ce82fdf8f2fa76ecc6ebf567753242a4c9129cd4c4885ba8bab1fd3120749889c981acccb344645e9d1ce95826ab7ceac8b7646d2e476e8934ac444aad3bba14f0d4be15675cd3d336db510c72ebbc07a000754d66f5282b1f241556cbd63a30b3d6af0f5c8a2443b03a92bb406abbb5f630ce1ef2afbba93c29e6bc46901a91ea9d91fa6048a468df5934437ca7e9e2a4fe38fddcd2aecac9406aa7adf5de93082ebf1b5c74d76b7b1b72a9b6fea1c5ab7cc1f3e97b5d7e1db9a64df9836ce0863cda956a1e2a45b9479b8ade23e81258e9444dfbf8066562f79", 0xe7, 0x7}, {&(0x7f00000007c0)="cd72eca63713ca8a35c3557b7d56b6a3073ca69e2067c18f5120c05d4ee8", 0x1e, 0x6}], 0x1, &(0x7f0000000a80)={[{@barrier='barrier'}, {@gid={'gid', 0x3d, r0}}, {@nodecompose='nodecompose'}, {@uid={'uid', 0x3d, r3}}, {@type={'type', 0x3d, "ae8c9d8f"}}, {@decompose='decompose'}, {@session={'session', 0x3d, 0x25}}], [{@uid_eq={'uid', 0x3d, r4}}, {@obj_type={'obj_type', 0x3d, 'overlay\x00'}}, {@euid_eq={'euid'}}, {@uid_eq={'uid'}}]}) 11:46:36 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000140)='hfsplus\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) [ 271.581216][T11090] hfsplus: unable to find HFS+ superblock [ 271.628276][T11084] FAULT_INJECTION: forcing a failure. [ 271.628276][T11084] name failslab, interval 1, probability 0, space 0, times 0 [ 271.645261][T11084] CPU: 1 PID: 11084 Comm: syz-executor.1 Not tainted 5.3.0+ #0 [ 271.652813][T11084] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 271.652819][T11084] Call Trace: [ 271.652842][T11084] dump_stack+0x172/0x1f0 [ 271.652865][T11084] should_fail.cold+0xa/0x15 [ 271.652886][T11084] ? fault_create_debugfs_attr+0x180/0x180 [ 271.675085][T11084] ? ___might_sleep+0x163/0x2c0 [ 271.675109][T11084] __should_failslab+0x121/0x190 [ 271.675125][T11084] should_failslab+0x9/0x14 [ 271.675145][T11084] __kmalloc_track_caller+0x2dc/0x760 [ 271.700599][T11084] ? pointer+0x720/0x720 [ 271.704851][T11084] ? kasprintf+0xbb/0xf0 [ 271.709100][T11084] kvasprintf+0xc8/0x170 [ 271.713352][T11084] ? bust_spinlocks+0xe0/0xe0 [ 271.718039][T11084] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 271.723853][T11084] kasprintf+0xbb/0xf0 11:46:36 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000140)='hfsplus\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) [ 271.727930][T11084] ? kvasprintf_const+0x190/0x190 [ 271.732958][T11084] ? free_object+0x70/0x70 [ 271.737375][T11084] ? lockdep_init_map+0x1be/0x6d0 [ 271.742405][T11084] ieee80211_alloc_led_names+0x118/0x410 [ 271.748049][T11084] ieee80211_alloc_hw_nm+0x1b0b/0x20e0 [ 271.753517][T11084] mac80211_hwsim_new_radio+0x1ef/0x4360 [ 271.759152][T11084] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 271.765401][T11084] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 271.771640][T11084] ? cred_has_capability+0x199/0x330 [ 271.776944][T11084] ? selinux_sb_eat_lsm_opts+0x700/0x700 [ 271.776961][T11084] ? selinux_sb_eat_lsm_opts+0x700/0x700 [ 271.776982][T11084] ? hwsim_cloned_frame_received_nl+0x1640/0x1640 [ 271.776998][T11084] ? memset+0x32/0x40 [ 271.777018][T11084] hwsim_new_radio_nl+0x9e3/0x1070 [ 271.777062][T11084] ? mac80211_hwsim_new_radio+0x4360/0x4360 [ 271.788381][T11084] ? nla_memcpy+0xb0/0xb0 [ 271.788407][T11084] ? __nla_parse+0x43/0x60 [ 271.788429][T11084] genl_family_rcv_msg+0x74b/0xf90 [ 271.788457][T11084] ? genl_unregister_family+0x7b0/0x7b0 [ 271.788473][T11084] ? __kasan_check_read+0x11/0x20 [ 271.788487][T11084] ? __lock_acquire+0x16f2/0x4a00 [ 271.788507][T11084] ? __dev_queue_xmit+0xbb5/0x3720 [ 271.803965][T11084] genl_rcv_msg+0xca/0x170 [ 271.841282][T11095] hfsplus: unable to parse mount options [ 271.844258][T11084] netlink_rcv_skb+0x177/0x450 [ 271.844276][T11084] ? genl_family_rcv_msg+0xf90/0xf90 [ 271.844295][T11084] ? netlink_ack+0xb50/0xb50 [ 271.859048][T11084] ? __kasan_check_write+0x14/0x20 [ 271.859072][T11084] ? netlink_deliver_tap+0x254/0xbf0 [ 271.859093][T11084] genl_rcv+0x29/0x40 [ 271.859109][T11084] netlink_unicast+0x531/0x710 [ 271.859131][T11084] ? netlink_attachskb+0x7c0/0x7c0 [ 271.859145][T11084] ? _copy_from_iter_full+0x25d/0x8c0 [ 271.859164][T11084] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 271.859182][T11084] netlink_sendmsg+0x8a5/0xd60 [ 271.859204][T11084] ? netlink_unicast+0x710/0x710 [ 271.859223][T11084] ? tomoyo_socket_sendmsg+0x26/0x30 [ 271.859240][T11084] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 11:46:36 executing program 4: r0 = socket$netlink(0x10, 0x3, 0xf) bind$netlink(r0, &(0x7f0000514ff4)={0x10, 0x0, 0x0, 0x2ffffffff}, 0xc) setsockopt$sock_int(r0, 0x1, 0x8, 0x0, 0x0) setsockopt$netlink_NETLINK_BROADCAST_ERROR(r0, 0x10e, 0x4, &(0x7f0000000080)=0x6, 0x4) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)={0x14, 0x23, 0x1, 0x0, 0x0, {0x20000000004, 0xe00000000000000}}, 0x14}}, 0x0) [ 271.859257][T11084] ? security_socket_sendmsg+0x8d/0xc0 [ 271.859272][T11084] ? netlink_unicast+0x710/0x710 [ 271.859291][T11084] sock_sendmsg+0xd7/0x130 [ 271.859307][T11084] ___sys_sendmsg+0x803/0x920 [ 271.859326][T11084] ? copy_msghdr_from_user+0x440/0x440 [ 271.859348][T11084] ? __kasan_check_read+0x11/0x20 [ 271.859371][T11084] ? __fget+0x384/0x560 [ 271.879587][T11084] ? ksys_dup3+0x3e0/0x3e0 [ 271.879614][T11084] ? __fget_light+0x1a9/0x230 [ 271.879632][T11084] ? __fdget+0x1b/0x20 [ 271.894357][T11098] IPVS: ftp: loaded support on port[0] = 21 [ 271.898786][T11084] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 271.898810][T11084] __sys_sendmsg+0x105/0x1d0 [ 271.898828][T11084] ? __sys_sendmsg_sock+0xd0/0xd0 [ 271.898856][T11084] ? trace_hardirqs_on_thunk+0x1a/0x20 [ 271.898874][T11084] ? do_syscall_64+0x26/0x760 [ 271.920017][T11084] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 271.920035][T11084] ? do_syscall_64+0x26/0x760 [ 271.920059][T11084] __x64_sys_sendmsg+0x78/0xb0 [ 271.920078][T11084] do_syscall_64+0xfa/0x760 [ 271.936654][T11084] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 271.936667][T11084] RIP: 0033:0x459a29 [ 271.936683][T11084] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 271.936691][T11084] RSP: 002b:00007f5e254b1c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 271.936706][T11084] RAX: ffffffffffffffda RBX: 00007f5e254b1c90 RCX: 0000000000459a29 [ 271.936714][T11084] RDX: 0000000000000000 RSI: 0000000020000100 RDI: 0000000000000003 [ 271.936723][T11084] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 271.936730][T11084] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f5e254b26d4 [ 271.936743][T11084] R13: 00000000004c7940 R14: 00000000004dd350 R15: 0000000000000004 [ 271.953520][T11094] overlayfs: unrecognized mount option "uppFrdir=./file0" or missing value 11:46:37 executing program 0: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) syz_mount_image$hfsplus(&(0x7f0000000140)='hfsplus\x00', &(0x7f0000000200)='./file0\x00', 0x3, 0x7, &(0x7f0000000800)=[{&(0x7f0000000400)="e1ec051c0b7b96db7480b4620be1f7d4adcb21d5233a3d23bf43659e5359470de231dd734b698cd71201837ca57f911328e1aee6b2cb39533b2d549e", 0x3c, 0x101}, {&(0x7f0000000440)="dbac23926131781587488e056e40b191269651683d0d195cbd63543040e313e20126fd634002e0256fed786d07054466250e2de6b7fb6d7d8d5201ac1478ef26aafeae7947832c4cc7fea6315e92eb81c89a385dae378bf89ca53c6984b5aa79a7dcc139938fa64b30d7c24ff7b215c890be5756df2f441d0fcb938cb4c1f89245a47c630a2b5e28bb7b5a9c8c871c45857bc4fa646b30f485beccdf529ad0cd519a0bed9b5c7df28320d9ad7eceb30eda6c964cfcab57c8aa98b89d582792b886e41c9f6146332e31f93b", 0xcb, 0x1ff}, {&(0x7f0000000540)="5c96cd9925cbe6753ba234c06f8040f650bba8d4d4ebe59964acf97c49f7a5e793521ef728d90a4eb42cbe7a2536c6922f049b20f2c681c652b4dbe077b0a9972e1eeb5573d7ee69d6fc99d4e4894537fac772842763140c5d832bf593a5cc290fd0c641d14d06e564127871808073fb6fd27f2a9995b29abce9351b0b285f4887f1cc8de04d147141af2ed66cfb66fd230e329273710457efc72a8d09487b5c83e77201b28eb38d7d3846b63b1bf1233b5c925303dd3214066c99381b0457a62397c7df27f88e19a884e1dfa6", 0xcd, 0x6}, {&(0x7f0000000640)="8ae3f201063e83beadb088cb1080ef67", 0x10, 0x2a}, {&(0x7f0000000680)="dfeed81fb09a8a0d55f0999ce7730866db77fa306b896464e4d9cf133371563c7eb734eed8ec2dda58c030b96771bb708fba592614b985c573e8f3db424553c6", 0x40, 0x4}, {&(0x7f00000006c0)="f33dec9b5d96888f1504b1385ce82fdf8f2fa76ecc6ebf567753242a4c9129cd4c4885ba8bab1fd3120749889c981acccb344645e9d1ce95826ab7ceac8b7646d2e476e8934ac444aad3bba14f0d4be15675cd3d336db510c72ebbc07a000754d66f5282b1f241556cbd63a30b3d6af0f5c8a2443b03a92bb406abbb5f630ce1ef2afbba93c29e6bc46901a91ea9d91fa6048a468df5934437ca7e9e2a4fe38fddcd2aecac9406aa7adf5de93082ebf1b5c74d76b7b1b72a9b6fea1c5ab7cc1f3e97b5d7e1db9a64df9836ce0863cda956a1e2a45b9479b8ade23e81258e9444dfbf8066562f79", 0xe7, 0x7}, {&(0x7f00000007c0)="cd72eca63713ca8a35c3557b7d56b6a3073ca69e2067c18f5120c05d4ee8", 0x1e, 0x6}], 0x1, &(0x7f0000000a80)={[{@barrier='barrier'}, {@gid={'gid'}}, {@nodecompose='nodecompose'}, {@uid={'uid'}}, {@type={'type', 0x3d, "ae8c9d8f"}}, {@decompose='decompose'}, {@session={'session', 0x3d, 0x25}}], [{@uid_eq={'uid'}}, {@obj_type={'obj_type', 0x3d, 'overlay\x00'}}, {@euid_eq={'euid'}}, {@uid_eq={'uid'}}]}) [ 272.160354][T11094] hfsplus: unable to parse mount options [ 272.197468][T11105] hfsplus: unable to find HFS+ superblock 11:46:37 executing program 1 (fault-call:3 fault-nth:10): setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) setsockopt$netlink_NETLINK_BROADCAST_ERROR(0xffffffffffffffff, 0x10e, 0x4, 0x0, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)={0x14, 0x23, 0x1, 0x0, 0x0, {0x20000000004, 0xe00000000000000}}, 0x14}}, 0x0) 11:46:37 executing program 5: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='devtmpfs\x00', 0x0, 0x0) chdir(&(0x7f00000000c0)='./file0\x00') pipe(0x0) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mkdir(0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$overlay(0x40000f, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="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"]) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000240)='cgroup2\x00', 0x0, 0x0) fstat(0xffffffffffffffff, &(0x7f00000008c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000005ec0)={{{@in6=@empty, @in=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@remote}, 0x0, @in6=@mcast2}}, &(0x7f0000004800)=0xffffffffffffffc3) r3 = geteuid() setsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f00000060c0)={{{@in=@remote, @in6=@rand_addr="20bbcbd1865253e3e58aa219d6ca6440", 0x4e21, 0x2400000000000000, 0x4e22, 0x0, 0xa, 0xa0, 0x0, 0x67, r2, r3}, {0x6, 0x183, 0x3, 0x7f, 0x61553a0b, 0x9, 0x1, 0x4}, {0x20, 0x80000001, 0x2000000000001, 0x9}, 0x9, 0x6e6bba, 0x0, 0x0, 0x1, 0x3}, {{@in=@empty, 0x4d3, 0x3c}, 0xa, @in=@loopback, 0x3504, 0x0, 0x3, 0xfffffffffffffffc, 0x1ff, 0x5, 0x6}}, 0xe8) syz_mount_image$hfsplus(&(0x7f0000000140)='hfsplus\x00', &(0x7f0000000200)='./file0\x00', 0x3, 0x7, &(0x7f0000000800)=[{&(0x7f0000000400)="e1ec051c0b7b96db7480b4620be1f7d4adcb21d5233a3d23bf43659e5359470de231dd734b698cd71201837ca57f911328e1aee6b2cb39533b2d549e", 0x3c, 0x101}, {&(0x7f0000000440)="dbac23926131781587488e056e40b191269651683d0d195cbd63543040e313e20126fd634002e0256fed786d07054466250e2de6b7fb6d7d8d5201ac1478ef26aafeae7947832c4cc7fea6315e92eb81c89a385dae378bf89ca53c6984b5aa79a7dcc139938fa64b30d7c24ff7b215c890be5756df2f441d0fcb938cb4c1f89245a47c630a2b5e28bb7b5a9c8c871c45857bc4fa646b30f485beccdf529ad0cd519a0bed9b5c7df28320d9ad7eceb30eda6c964cfcab57c8aa98b89d582792b886e41c9f6146332e31f93b", 0xcb, 0x1ff}, {&(0x7f0000000540)="5c96cd9925cbe6753ba234c06f8040f650bba8d4d4ebe59964acf97c49f7a5e793521ef728d90a4eb42cbe7a2536c6922f049b20f2c681c652b4dbe077b0a9972e1eeb5573d7ee69d6fc99d4e4894537fac772842763140c5d832bf593a5cc290fd0c641d14d06e564127871808073fb6fd27f2a9995b29abce9351b0b285f4887f1cc8de04d147141af2ed66cfb66fd230e329273710457efc72a8d09487b5c83e77201b28eb38d7d3846b63b1bf1233b5c925303dd3214066c99381b0457a62397c7df27f88e19a884e1dfa6", 0xcd, 0x6}, {&(0x7f0000000640)="8ae3f201063e83beadb088cb1080ef67", 0x10, 0x2a}, {&(0x7f0000000680)="dfeed81fb09a8a0d55f0999ce7730866db77fa306b896464e4d9cf133371563c7eb734eed8ec2dda58c030b96771bb708fba592614b985c573e8f3db424553c6", 0x40, 0x4}, {&(0x7f00000006c0)="f33dec9b5d96888f1504b1385ce82fdf8f2fa76ecc6ebf567753242a4c9129cd4c4885ba8bab1fd3120749889c981acccb344645e9d1ce95826ab7ceac8b7646d2e476e8934ac444aad3bba14f0d4be15675cd3d336db510c72ebbc07a000754d66f5282b1f241556cbd63a30b3d6af0f5c8a2443b03a92bb406abbb5f630ce1ef2afbba93c29e6bc46901a91ea9d91fa6048a468df5934437ca7e9e2a4fe38fddcd2aecac9406aa7adf5de93082ebf1b5c74d76b7b1b72a9b6fea1c5ab7cc1f3e97b5d7e1db9a64df9836ce0863cda956a1e2a45b9479b8ade23e81258e9444dfbf8066562f79", 0xe7, 0x7}, {&(0x7f00000007c0)="cd72eca63713ca8a35c3557b7d56b6a3073ca69e2067c18f5120c05d4ee8", 0x1e, 0x6}], 0x1, &(0x7f0000000a80)={[{@barrier='barrier'}, {@gid={'gid', 0x3d, r0}}, {@nodecompose='nodecompose'}, {@uid={'uid', 0x3d, r3}}, {@type={'type', 0x3d, "ae8c9d8f"}}, {@decompose='decompose'}, {@session={'session', 0x3d, 0x25}}], [{@uid_eq={'uid'}}, {@obj_type={'obj_type', 0x3d, 'overlay\x00'}}, {@euid_eq={'euid'}}, {@uid_eq={'uid'}}]}) 11:46:37 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000140)='hfsplus\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000a80)={[{@barrier='barrier'}, {@gid={'gid'}}, {@nodecompose='nodecompose'}, {@uid={'uid'}}, {@type={'type', 0x3d, "ae8c9d8f"}}, {@decompose='decompose'}], [{@uid_eq={'uid'}}, {@obj_type={'obj_type', 0x3d, 'overlay\x00'}}, {@euid_eq={'euid'}}, {@uid_eq={'uid'}}]}) [ 272.442628][T11122] FAULT_INJECTION: forcing a failure. [ 272.442628][T11122] name failslab, interval 1, probability 0, space 0, times 0 [ 272.467464][T11116] hfsplus: unable to parse mount options [ 272.506835][T11122] CPU: 0 PID: 11122 Comm: syz-executor.1 Not tainted 5.3.0+ #0 [ 272.514400][T11122] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 272.524449][T11122] Call Trace: [ 272.527726][T11122] dump_stack+0x172/0x1f0 [ 272.532045][T11122] should_fail.cold+0xa/0x15 [ 272.536619][T11122] ? fault_create_debugfs_attr+0x180/0x180 [ 272.545446][T11122] ? ___might_sleep+0x163/0x2c0 [ 272.550302][T11122] __should_failslab+0x121/0x190 [ 272.555223][T11122] should_failslab+0x9/0x14 [ 272.559707][T11122] __kmalloc_track_caller+0x2dc/0x760 [ 272.565060][T11122] ? pointer+0x720/0x720 [ 272.569286][T11122] ? kasprintf+0xbb/0xf0 [ 272.573515][T11122] kvasprintf+0xc8/0x170 [ 272.577738][T11122] ? bust_spinlocks+0xe0/0xe0 [ 272.582402][T11122] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 272.588192][T11122] kasprintf+0xbb/0xf0 [ 272.592240][T11122] ? kvasprintf_const+0x190/0x190 [ 272.597247][T11122] ? free_object+0x70/0x70 [ 272.601670][T11122] ? lockdep_init_map+0x1be/0x6d0 [ 272.606678][T11122] ieee80211_alloc_led_names+0x1ab/0x410 [ 272.612296][T11122] ieee80211_alloc_hw_nm+0x1b0b/0x20e0 [ 272.617743][T11122] mac80211_hwsim_new_radio+0x1ef/0x4360 [ 272.623357][T11122] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 272.629599][T11122] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 272.635818][T11122] ? cred_has_capability+0x199/0x330 [ 272.641085][T11122] ? selinux_sb_eat_lsm_opts+0x700/0x700 [ 272.646698][T11122] ? selinux_sb_eat_lsm_opts+0x700/0x700 [ 272.652307][T11122] ? __kasan_check_read+0x11/0x20 [ 272.657312][T11122] ? hwsim_cloned_frame_received_nl+0x1640/0x1640 [ 272.663730][T11122] ? memset+0x32/0x40 [ 272.667695][T11122] hwsim_new_radio_nl+0x9e3/0x1070 [ 272.672816][T11122] ? mac80211_hwsim_new_radio+0x4360/0x4360 [ 272.678695][T11122] ? nla_memcpy+0xb0/0xb0 [ 272.683025][T11122] ? __nla_parse+0x43/0x60 [ 272.687429][T11122] genl_family_rcv_msg+0x74b/0xf90 [ 272.692528][T11122] ? genl_unregister_family+0x7b0/0x7b0 [ 272.698064][T11122] ? __kasan_check_read+0x11/0x20 [ 272.703067][T11122] ? __lock_acquire+0x16f2/0x4a00 [ 272.708070][T11122] ? __dev_queue_xmit+0xbb5/0x3720 [ 272.713173][T11122] genl_rcv_msg+0xca/0x170 [ 272.717573][T11122] netlink_rcv_skb+0x177/0x450 [ 272.722325][T11122] ? genl_family_rcv_msg+0xf90/0xf90 [ 272.727591][T11122] ? netlink_ack+0xb50/0xb50 [ 272.732159][T11122] ? __kasan_check_write+0x14/0x20 [ 272.737264][T11122] ? netlink_deliver_tap+0x254/0xbf0 [ 272.742546][T11122] genl_rcv+0x29/0x40 [ 272.746512][T11122] netlink_unicast+0x531/0x710 [ 272.751258][T11122] ? netlink_attachskb+0x7c0/0x7c0 [ 272.756350][T11122] ? _copy_from_iter_full+0x25d/0x8c0 [ 272.761708][T11122] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 272.767931][T11122] netlink_sendmsg+0x8a5/0xd60 [ 272.772675][T11122] ? netlink_unicast+0x710/0x710 [ 272.777614][T11122] ? tomoyo_socket_sendmsg+0x26/0x30 [ 272.782877][T11122] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 272.789094][T11122] ? security_socket_sendmsg+0x8d/0xc0 [ 272.794528][T11122] ? netlink_unicast+0x710/0x710 [ 272.799446][T11122] sock_sendmsg+0xd7/0x130 [ 272.803840][T11122] ___sys_sendmsg+0x803/0x920 [ 272.808500][T11122] ? copy_msghdr_from_user+0x440/0x440 [ 272.813940][T11122] ? __kasan_check_read+0x11/0x20 [ 272.818949][T11122] ? __fget+0x384/0x560 [ 272.823087][T11122] ? ksys_dup3+0x3e0/0x3e0 [ 272.827490][T11122] ? __fget_light+0x1a9/0x230 [ 272.832149][T11122] ? __fdget+0x1b/0x20 [ 272.836196][T11122] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 272.842418][T11122] __sys_sendmsg+0x105/0x1d0 [ 272.846992][T11122] ? __sys_sendmsg_sock+0xd0/0xd0 [ 272.852004][T11122] ? trace_hardirqs_on_thunk+0x1a/0x20 [ 272.857443][T11122] ? do_syscall_64+0x26/0x760 [ 272.862196][T11122] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 272.868241][T11122] ? do_syscall_64+0x26/0x760 [ 272.872898][T11122] __x64_sys_sendmsg+0x78/0xb0 [ 272.877647][T11122] do_syscall_64+0xfa/0x760 [ 272.882131][T11122] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 272.888006][T11122] RIP: 0033:0x459a29 [ 272.891898][T11122] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 272.911566][T11122] RSP: 002b:00007f5e254b1c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 272.919955][T11122] RAX: ffffffffffffffda RBX: 00007f5e254b1c90 RCX: 0000000000459a29 [ 272.927906][T11122] RDX: 0000000000000000 RSI: 0000000020000100 RDI: 0000000000000003 [ 272.935857][T11122] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 272.943809][T11122] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f5e254b26d4 11:46:37 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_FSGETXATTR(0xffffffffffffffff, 0x8004550f, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x1}, 0x10) r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r0, &(0x7f0000000000)={{0x6, @rose}, [@rose, @rose, @default, @netrom, @bcast, @rose, @rose, @null]}, 0x48) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(0xffffffffffffffff, 0x6, 0x23, &(0x7f00000000c0)={&(0x7f0000ffc000/0x4000)=nil, 0x4000}, &(0x7f0000000140)=0x10) listen(r0, 0x0) unshare(0x40000000) setrlimit(0x0, 0x0) r1 = accept(r0, 0x0, 0x0) write$binfmt_elf64(r1, &(0x7f00000002c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x9, 0x8, 0x0, 0x0, 0x0, 0x4825483b35c83c0b, 0x0, 0x0, 0x40, 0x227}, [{0x4, 0x1, 0xfff, 0x0, 0x0, 0xff8000000002, 0x0, 0x7fff}], "", [[], [], []]}, 0x378) 11:46:37 executing program 4: r0 = socket$netlink(0x10, 0x3, 0xf) bind$netlink(r0, &(0x7f0000514ff4)={0x10, 0x0, 0x0, 0x2ffffffff}, 0xc) setsockopt$sock_int(r0, 0x1, 0x8, 0x0, 0x0) setsockopt$netlink_NETLINK_BROADCAST_ERROR(r0, 0x10e, 0x4, &(0x7f0000000080)=0x6, 0x4) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)={0x14, 0x23, 0x1, 0x0, 0x0, {0x20000000004, 0xe00000000000000}}, 0x14}}, 0x0) [ 272.951770][T11122] R13: 00000000004c7940 R14: 00000000004dd350 R15: 0000000000000004 [ 272.970698][T11123] overlayfs: unrecognized mount option "uppFrdir=./file0" or missing value 11:46:38 executing program 0: syz_mount_image$hfsplus(&(0x7f0000000140)='hfsplus\x00', &(0x7f0000000200)='./file0\x00', 0x3, 0x7, &(0x7f0000000800)=[{&(0x7f0000000400)="e1ec051c0b7b96db7480b4620be1f7d4adcb21d5233a3d23bf43659e5359470de231dd734b698cd71201837ca57f911328e1aee6b2cb39533b2d549e", 0x3c, 0x101}, {&(0x7f0000000440)="dbac23926131781587488e056e40b191269651683d0d195cbd63543040e313e20126fd634002e0256fed786d07054466250e2de6b7fb6d7d8d5201ac1478ef26aafeae7947832c4cc7fea6315e92eb81c89a385dae378bf89ca53c6984b5aa79a7dcc139938fa64b30d7c24ff7b215c890be5756df2f441d0fcb938cb4c1f89245a47c630a2b5e28bb7b5a9c8c871c45857bc4fa646b30f485beccdf529ad0cd519a0bed9b5c7df28320d9ad7eceb30eda6c964cfcab57c8aa98b89d582792b886e41c9f6146332e31f93b", 0xcb, 0x1ff}, {&(0x7f0000000540)="5c96cd9925cbe6753ba234c06f8040f650bba8d4d4ebe59964acf97c49f7a5e793521ef728d90a4eb42cbe7a2536c6922f049b20f2c681c652b4dbe077b0a9972e1eeb5573d7ee69d6fc99d4e4894537fac772842763140c5d832bf593a5cc290fd0c641d14d06e564127871808073fb6fd27f2a9995b29abce9351b0b285f4887f1cc8de04d147141af2ed66cfb66fd230e329273710457efc72a8d09487b5c83e77201b28eb38d7d3846b63b1bf1233b5c925303dd3214066c99381b0457a62397c7df27f88e19a884e1dfa6", 0xcd, 0x6}, {&(0x7f0000000640)="8ae3f201063e83beadb088cb1080ef67", 0x10, 0x2a}, {&(0x7f0000000680)="dfeed81fb09a8a0d55f0999ce7730866db77fa306b896464e4d9cf133371563c7eb734eed8ec2dda58c030b96771bb708fba592614b985c573e8f3db424553c6", 0x40, 0x4}, {&(0x7f00000006c0)="f33dec9b5d96888f1504b1385ce82fdf8f2fa76ecc6ebf567753242a4c9129cd4c4885ba8bab1fd3120749889c981acccb344645e9d1ce95826ab7ceac8b7646d2e476e8934ac444aad3bba14f0d4be15675cd3d336db510c72ebbc07a000754d66f5282b1f241556cbd63a30b3d6af0f5c8a2443b03a92bb406abbb5f630ce1ef2afbba93c29e6bc46901a91ea9d91fa6048a468df5934437ca7e9e2a4fe38fddcd2aecac9406aa7adf5de93082ebf1b5c74d76b7b1b72a9b6fea1c5ab7cc1f3e97b5d7e1db9a64df9836ce0863cda956a1e2a45b9479b8ade23e81258e9444dfbf8066562f79", 0xe7, 0x7}, {&(0x7f00000007c0)="cd72eca63713ca8a35c3557b7d56b6a3073ca69e2067c18f5120c05d4ee8", 0x1e, 0x6}], 0x1, &(0x7f0000000a80)={[{@barrier='barrier'}, {@gid={'gid'}}, {@nodecompose='nodecompose'}, {@uid={'uid'}}, {@type={'type', 0x3d, "ae8c9d8f"}}, {@decompose='decompose'}, {@session={'session', 0x3d, 0x25}}], [{@uid_eq={'uid'}}, {@obj_type={'obj_type', 0x3d, 'overlay\x00'}}, {@euid_eq={'euid'}}, {@uid_eq={'uid'}}]}) [ 273.088778][T11128] hfsplus: unable to parse mount options [ 273.154374][T11123] hfsplus: unable to parse mount options 11:46:38 executing program 1 (fault-call:3 fault-nth:11): setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) setsockopt$netlink_NETLINK_BROADCAST_ERROR(0xffffffffffffffff, 0x10e, 0x4, 0x0, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)={0x14, 0x23, 0x1, 0x0, 0x0, {0x20000000004, 0xe00000000000000}}, 0x14}}, 0x0) 11:46:38 executing program 5: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='devtmpfs\x00', 0x0, 0x0) chdir(&(0x7f00000000c0)='./file0\x00') pipe(0x0) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mkdir(0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$overlay(0x40000f, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="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"]) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000240)='cgroup2\x00', 0x0, 0x0) fstat(0xffffffffffffffff, &(0x7f00000008c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000005ec0)={{{@in6=@empty, @in=@local}}, {{@in6=@remote}, 0x0, @in6=@mcast2}}, &(0x7f0000004800)=0xffffffffffffffc3) r2 = geteuid() syz_mount_image$hfsplus(&(0x7f0000000140)='hfsplus\x00', &(0x7f0000000200)='./file0\x00', 0x3, 0x7, &(0x7f0000000800)=[{&(0x7f0000000400)="e1ec051c0b7b96db7480b4620be1f7d4adcb21d5233a3d23bf43659e5359470de231dd734b698cd71201837ca57f911328e1aee6b2cb39533b2d549e", 0x3c, 0x101}, {&(0x7f0000000440)="dbac23926131781587488e056e40b191269651683d0d195cbd63543040e313e20126fd634002e0256fed786d07054466250e2de6b7fb6d7d8d5201ac1478ef26aafeae7947832c4cc7fea6315e92eb81c89a385dae378bf89ca53c6984b5aa79a7dcc139938fa64b30d7c24ff7b215c890be5756df2f441d0fcb938cb4c1f89245a47c630a2b5e28bb7b5a9c8c871c45857bc4fa646b30f485beccdf529ad0cd519a0bed9b5c7df28320d9ad7eceb30eda6c964cfcab57c8aa98b89d582792b886e41c9f6146332e31f93b", 0xcb, 0x1ff}, {&(0x7f0000000540)="5c96cd9925cbe6753ba234c06f8040f650bba8d4d4ebe59964acf97c49f7a5e793521ef728d90a4eb42cbe7a2536c6922f049b20f2c681c652b4dbe077b0a9972e1eeb5573d7ee69d6fc99d4e4894537fac772842763140c5d832bf593a5cc290fd0c641d14d06e564127871808073fb6fd27f2a9995b29abce9351b0b285f4887f1cc8de04d147141af2ed66cfb66fd230e329273710457efc72a8d09487b5c83e77201b28eb38d7d3846b63b1bf1233b5c925303dd3214066c99381b0457a62397c7df27f88e19a884e1dfa6", 0xcd, 0x6}, {&(0x7f0000000640)="8ae3f201063e83beadb088cb1080ef67", 0x10, 0x2a}, {&(0x7f0000000680)="dfeed81fb09a8a0d55f0999ce7730866db77fa306b896464e4d9cf133371563c7eb734eed8ec2dda58c030b96771bb708fba592614b985c573e8f3db424553c6", 0x40, 0x4}, {&(0x7f00000006c0)="f33dec9b5d96888f1504b1385ce82fdf8f2fa76ecc6ebf567753242a4c9129cd4c4885ba8bab1fd3120749889c981acccb344645e9d1ce95826ab7ceac8b7646d2e476e8934ac444aad3bba14f0d4be15675cd3d336db510c72ebbc07a000754d66f5282b1f241556cbd63a30b3d6af0f5c8a2443b03a92bb406abbb5f630ce1ef2afbba93c29e6bc46901a91ea9d91fa6048a468df5934437ca7e9e2a4fe38fddcd2aecac9406aa7adf5de93082ebf1b5c74d76b7b1b72a9b6fea1c5ab7cc1f3e97b5d7e1db9a64df9836ce0863cda956a1e2a45b9479b8ade23e81258e9444dfbf8066562f79", 0xe7, 0x7}, {&(0x7f00000007c0)="cd72eca63713ca8a35c3557b7d56b6a3073ca69e2067c18f5120c05d4ee8", 0x1e, 0x6}], 0x1, &(0x7f0000000a80)={[{@barrier='barrier'}, {@gid={'gid', 0x3d, r0}}, {@nodecompose='nodecompose'}, {@uid={'uid', 0x3d, r2}}, {@type={'type', 0x3d, "ae8c9d8f"}}, {@decompose='decompose'}, {@session={'session', 0x3d, 0x25}}], [{@uid_eq={'uid'}}, {@obj_type={'obj_type', 0x3d, 'overlay\x00'}}, {@euid_eq={'euid'}}, {@uid_eq={'uid'}}]}) [ 273.234353][T11140] IPVS: ftp: loaded support on port[0] = 21 [ 273.265137][T11141] hfsplus: unable to parse mount options 11:46:38 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000140)='hfsplus\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000a80)={[{@barrier='barrier'}, {@gid={'gid'}}, {@nodecompose='nodecompose'}, {@uid={'uid'}}, {@type={'type', 0x3d, "ae8c9d8f"}}], [{@uid_eq={'uid'}}, {@obj_type={'obj_type', 0x3d, 'overlay\x00'}}, {@euid_eq={'euid'}}, {@uid_eq={'uid'}}]}) 11:46:38 executing program 4: r0 = socket$netlink(0x10, 0x3, 0xf) bind$netlink(r0, &(0x7f0000514ff4)={0x10, 0x0, 0x0, 0x2ffffffff}, 0xc) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000000), 0x4) setsockopt$netlink_NETLINK_BROADCAST_ERROR(0xffffffffffffffff, 0x10e, 0x4, &(0x7f0000000080)=0x6, 0x4) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)={0x14, 0x23, 0x1, 0x0, 0x0, {0x20000000004, 0xe00000000000000}}, 0x14}}, 0x0) [ 273.383861][T11151] FAULT_INJECTION: forcing a failure. [ 273.383861][T11151] name failslab, interval 1, probability 0, space 0, times 0 11:46:38 executing program 0: syz_mount_image$hfsplus(0x0, &(0x7f0000000200)='./file0\x00', 0x3, 0x7, &(0x7f0000000800)=[{&(0x7f0000000400)="e1ec051c0b7b96db7480b4620be1f7d4adcb21d5233a3d23bf43659e5359470de231dd734b698cd71201837ca57f911328e1aee6b2cb39533b2d549e", 0x3c, 0x101}, {&(0x7f0000000440)="dbac23926131781587488e056e40b191269651683d0d195cbd63543040e313e20126fd634002e0256fed786d07054466250e2de6b7fb6d7d8d5201ac1478ef26aafeae7947832c4cc7fea6315e92eb81c89a385dae378bf89ca53c6984b5aa79a7dcc139938fa64b30d7c24ff7b215c890be5756df2f441d0fcb938cb4c1f89245a47c630a2b5e28bb7b5a9c8c871c45857bc4fa646b30f485beccdf529ad0cd519a0bed9b5c7df28320d9ad7eceb30eda6c964cfcab57c8aa98b89d582792b886e41c9f6146332e31f93b", 0xcb, 0x1ff}, {&(0x7f0000000540)="5c96cd9925cbe6753ba234c06f8040f650bba8d4d4ebe59964acf97c49f7a5e793521ef728d90a4eb42cbe7a2536c6922f049b20f2c681c652b4dbe077b0a9972e1eeb5573d7ee69d6fc99d4e4894537fac772842763140c5d832bf593a5cc290fd0c641d14d06e564127871808073fb6fd27f2a9995b29abce9351b0b285f4887f1cc8de04d147141af2ed66cfb66fd230e329273710457efc72a8d09487b5c83e77201b28eb38d7d3846b63b1bf1233b5c925303dd3214066c99381b0457a62397c7df27f88e19a884e1dfa6", 0xcd, 0x6}, {&(0x7f0000000640)="8ae3f201063e83beadb088cb1080ef67", 0x10, 0x2a}, {&(0x7f0000000680)="dfeed81fb09a8a0d55f0999ce7730866db77fa306b896464e4d9cf133371563c7eb734eed8ec2dda58c030b96771bb708fba592614b985c573e8f3db424553c6", 0x40, 0x4}, {&(0x7f00000006c0)="f33dec9b5d96888f1504b1385ce82fdf8f2fa76ecc6ebf567753242a4c9129cd4c4885ba8bab1fd3120749889c981acccb344645e9d1ce95826ab7ceac8b7646d2e476e8934ac444aad3bba14f0d4be15675cd3d336db510c72ebbc07a000754d66f5282b1f241556cbd63a30b3d6af0f5c8a2443b03a92bb406abbb5f630ce1ef2afbba93c29e6bc46901a91ea9d91fa6048a468df5934437ca7e9e2a4fe38fddcd2aecac9406aa7adf5de93082ebf1b5c74d76b7b1b72a9b6fea1c5ab7cc1f3e97b5d7e1db9a64df9836ce0863cda956a1e2a45b9479b8ade23e81258e9444dfbf8066562f79", 0xe7, 0x7}, {&(0x7f00000007c0)="cd72eca63713ca8a35c3557b7d56b6a3073ca69e2067c18f5120c05d4ee8", 0x1e, 0x6}], 0x1, &(0x7f0000000a80)={[{@barrier='barrier'}, {@gid={'gid'}}, {@nodecompose='nodecompose'}, {@uid={'uid'}}, {@type={'type', 0x3d, "ae8c9d8f"}}, {@decompose='decompose'}, {@session={'session', 0x3d, 0x25}}], [{@uid_eq={'uid'}}, {@obj_type={'obj_type', 0x3d, 'overlay\x00'}}, {@euid_eq={'euid'}}, {@uid_eq={'uid'}}]}) [ 273.549536][T11156] overlayfs: unrecognized mount option "uppFrdir=./file0" or missing value [ 273.619653][T11158] hfsplus: unable to parse mount options [ 273.626835][T11160] hfsplus: unable to parse mount options [ 273.670187][T11151] CPU: 1 PID: 11151 Comm: syz-executor.1 Not tainted 5.3.0+ #0 [ 273.677750][T11151] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 273.687810][T11151] Call Trace: [ 273.691096][T11151] dump_stack+0x172/0x1f0 [ 273.695431][T11151] should_fail.cold+0xa/0x15 [ 273.700024][T11151] ? fault_create_debugfs_attr+0x180/0x180 [ 273.705832][T11151] ? ___might_sleep+0x163/0x2c0 [ 273.710683][T11151] __should_failslab+0x121/0x190 [ 273.715618][T11151] should_failslab+0x9/0x14 [ 273.720116][T11151] __kmalloc_track_caller+0x2dc/0x760 [ 273.725480][T11151] ? pointer+0x720/0x720 [ 273.729719][T11151] ? kasprintf+0xbb/0xf0 [ 273.734045][T11151] kvasprintf+0xc8/0x170 [ 273.738286][T11151] ? bust_spinlocks+0xe0/0xe0 [ 273.742970][T11151] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 273.748778][T11151] kasprintf+0xbb/0xf0 [ 273.752840][T11151] ? kvasprintf_const+0x190/0x190 [ 273.757977][T11151] ? free_object+0x70/0x70 [ 273.762413][T11151] ? lockdep_init_map+0x1be/0x6d0 [ 273.767445][T11151] ieee80211_alloc_led_names+0x240/0x410 [ 273.773075][T11151] ieee80211_alloc_hw_nm+0x1b0b/0x20e0 [ 273.778534][T11151] mac80211_hwsim_new_radio+0x1ef/0x4360 [ 273.784166][T11151] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 273.790398][T11151] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 273.796649][T11151] ? cred_has_capability+0x199/0x330 [ 273.801932][T11151] ? selinux_sb_eat_lsm_opts+0x700/0x700 [ 273.807560][T11151] ? selinux_sb_eat_lsm_opts+0x700/0x700 [ 273.813183][T11151] ? __kasan_check_read+0x11/0x20 [ 273.818208][T11151] ? hwsim_cloned_frame_received_nl+0x1640/0x1640 [ 273.824617][T11151] ? memset+0x32/0x40 [ 273.828603][T11151] hwsim_new_radio_nl+0x9e3/0x1070 [ 273.833716][T11151] ? mac80211_hwsim_new_radio+0x4360/0x4360 [ 273.839602][T11151] ? nla_memcpy+0xb0/0xb0 [ 273.843933][T11151] ? __nla_parse+0x43/0x60 [ 273.848350][T11151] genl_family_rcv_msg+0x74b/0xf90 [ 273.853468][T11151] ? genl_unregister_family+0x7b0/0x7b0 [ 273.859008][T11151] ? __kasan_check_read+0x11/0x20 [ 273.864050][T11151] ? __lock_acquire+0x16f2/0x4a00 [ 273.869081][T11151] ? __dev_queue_xmit+0xbb5/0x3720 [ 273.874214][T11151] genl_rcv_msg+0xca/0x170 [ 273.878632][T11151] netlink_rcv_skb+0x177/0x450 [ 273.883398][T11151] ? genl_family_rcv_msg+0xf90/0xf90 [ 273.888703][T11151] ? netlink_ack+0xb50/0xb50 [ 273.893294][T11151] ? __kasan_check_write+0x14/0x20 [ 273.898403][T11151] ? netlink_deliver_tap+0x254/0xbf0 [ 273.903690][T11151] genl_rcv+0x29/0x40 [ 273.907671][T11151] netlink_unicast+0x531/0x710 [ 273.912434][T11151] ? netlink_attachskb+0x7c0/0x7c0 [ 273.917537][T11151] ? _copy_from_iter_full+0x25d/0x8c0 [ 273.922907][T11151] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 273.929143][T11151] netlink_sendmsg+0x8a5/0xd60 [ 273.933908][T11151] ? netlink_unicast+0x710/0x710 [ 273.938865][T11151] ? tomoyo_socket_sendmsg+0x26/0x30 [ 273.944150][T11151] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 273.950394][T11151] ? security_socket_sendmsg+0x8d/0xc0 [ 273.955848][T11151] ? netlink_unicast+0x710/0x710 [ 273.960797][T11151] sock_sendmsg+0xd7/0x130 [ 273.965217][T11151] ___sys_sendmsg+0x803/0x920 [ 273.969899][T11151] ? copy_msghdr_from_user+0x440/0x440 [ 273.975364][T11151] ? __kasan_check_read+0x11/0x20 [ 273.980387][T11151] ? __fget+0x384/0x560 [ 273.984543][T11151] ? ksys_dup3+0x3e0/0x3e0 [ 273.988965][T11151] ? __fget_light+0x1a9/0x230 [ 273.993641][T11151] ? __fdget+0x1b/0x20 [ 273.997707][T11151] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 274.003948][T11151] __sys_sendmsg+0x105/0x1d0 [ 274.008536][T11151] ? __sys_sendmsg_sock+0xd0/0xd0 [ 274.013567][T11151] ? trace_hardirqs_on_thunk+0x1a/0x20 [ 274.019032][T11151] ? do_syscall_64+0x26/0x760 [ 274.023705][T11151] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 274.029771][T11151] ? do_syscall_64+0x26/0x760 [ 274.034449][T11151] __x64_sys_sendmsg+0x78/0xb0 [ 274.039210][T11151] do_syscall_64+0xfa/0x760 [ 274.043715][T11151] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 274.049599][T11151] RIP: 0033:0x459a29 11:46:39 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_FSGETXATTR(0xffffffffffffffff, 0x8004550f, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x1}, 0x10) r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) r1 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000080)='/dev/qat_adf_ctl\x00', 0x8200, 0x0) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r1, 0x6, 0x23, &(0x7f00000000c0)={&(0x7f0000ffc000/0x4000)=nil, 0x4000}, &(0x7f0000000140)=0x10) listen(r0, 0x0) unshare(0x40000000) setrlimit(0x0, 0x0) r2 = accept(r0, 0x0, 0x0) write$binfmt_elf64(r2, &(0x7f00000002c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x9, 0x8, 0x0, 0x0, 0x0, 0x4825483b35c83c0b, 0x0, 0x0, 0x40, 0x227}, [{0x4, 0x1, 0xfff, 0x0, 0x0, 0xff8000000002, 0x0, 0x7fff}], "", [[], [], []]}, 0x378) [ 274.053487][T11151] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 274.073084][T11151] RSP: 002b:00007f5e254b1c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 274.081490][T11151] RAX: ffffffffffffffda RBX: 00007f5e254b1c90 RCX: 0000000000459a29 [ 274.089452][T11151] RDX: 0000000000000000 RSI: 0000000020000100 RDI: 0000000000000003 [ 274.097416][T11151] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 274.105380][T11151] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f5e254b26d4 [ 274.113343][T11151] R13: 00000000004c7940 R14: 00000000004dd350 R15: 0000000000000004 11:46:39 executing program 0: syz_mount_image$hfsplus(0x0, &(0x7f0000000200)='./file0\x00', 0x3, 0x7, &(0x7f0000000800)=[{&(0x7f0000000400)="e1ec051c0b7b96db7480b4620be1f7d4adcb21d5233a3d23bf43659e5359470de231dd734b698cd71201837ca57f911328e1aee6b2cb39533b2d549e", 0x3c, 0x101}, {&(0x7f0000000440)="dbac23926131781587488e056e40b191269651683d0d195cbd63543040e313e20126fd634002e0256fed786d07054466250e2de6b7fb6d7d8d5201ac1478ef26aafeae7947832c4cc7fea6315e92eb81c89a385dae378bf89ca53c6984b5aa79a7dcc139938fa64b30d7c24ff7b215c890be5756df2f441d0fcb938cb4c1f89245a47c630a2b5e28bb7b5a9c8c871c45857bc4fa646b30f485beccdf529ad0cd519a0bed9b5c7df28320d9ad7eceb30eda6c964cfcab57c8aa98b89d582792b886e41c9f6146332e31f93b", 0xcb, 0x1ff}, {&(0x7f0000000540)="5c96cd9925cbe6753ba234c06f8040f650bba8d4d4ebe59964acf97c49f7a5e793521ef728d90a4eb42cbe7a2536c6922f049b20f2c681c652b4dbe077b0a9972e1eeb5573d7ee69d6fc99d4e4894537fac772842763140c5d832bf593a5cc290fd0c641d14d06e564127871808073fb6fd27f2a9995b29abce9351b0b285f4887f1cc8de04d147141af2ed66cfb66fd230e329273710457efc72a8d09487b5c83e77201b28eb38d7d3846b63b1bf1233b5c925303dd3214066c99381b0457a62397c7df27f88e19a884e1dfa6", 0xcd, 0x6}, {&(0x7f0000000640)="8ae3f201063e83beadb088cb1080ef67", 0x10, 0x2a}, {&(0x7f0000000680)="dfeed81fb09a8a0d55f0999ce7730866db77fa306b896464e4d9cf133371563c7eb734eed8ec2dda58c030b96771bb708fba592614b985c573e8f3db424553c6", 0x40, 0x4}, {&(0x7f00000006c0)="f33dec9b5d96888f1504b1385ce82fdf8f2fa76ecc6ebf567753242a4c9129cd4c4885ba8bab1fd3120749889c981acccb344645e9d1ce95826ab7ceac8b7646d2e476e8934ac444aad3bba14f0d4be15675cd3d336db510c72ebbc07a000754d66f5282b1f241556cbd63a30b3d6af0f5c8a2443b03a92bb406abbb5f630ce1ef2afbba93c29e6bc46901a91ea9d91fa6048a468df5934437ca7e9e2a4fe38fddcd2aecac9406aa7adf5de93082ebf1b5c74d76b7b1b72a9b6fea1c5ab7cc1f3e97b5d7e1db9a64df9836ce0863cda956a1e2a45b9479b8ade23e81258e9444dfbf8066562f79", 0xe7, 0x7}, {&(0x7f00000007c0)="cd72eca63713ca8a35c3557b7d56b6a3073ca69e2067c18f5120c05d4ee8", 0x1e, 0x6}], 0x1, &(0x7f0000000a80)={[{@barrier='barrier'}, {@gid={'gid'}}, {@nodecompose='nodecompose'}, {@uid={'uid'}}, {@type={'type', 0x3d, "ae8c9d8f"}}, {@decompose='decompose'}, {@session={'session', 0x3d, 0x25}}], [{@uid_eq={'uid'}}, {@obj_type={'obj_type', 0x3d, 'overlay\x00'}}, {@euid_eq={'euid'}}, {@uid_eq={'uid'}}]}) 11:46:39 executing program 5: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='devtmpfs\x00', 0x0, 0x0) chdir(&(0x7f00000000c0)='./file0\x00') pipe(0x0) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mkdir(0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$overlay(0x40000f, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="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"]) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000240)='cgroup2\x00', 0x0, 0x0) fstat(0xffffffffffffffff, &(0x7f00000008c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000005ec0)={{{@in6=@empty, @in=@local}}, {{@in6=@remote}, 0x0, @in6=@mcast2}}, &(0x7f0000004800)=0xffffffffffffffc3) syz_mount_image$hfsplus(&(0x7f0000000140)='hfsplus\x00', &(0x7f0000000200)='./file0\x00', 0x3, 0x7, &(0x7f0000000800)=[{&(0x7f0000000400)="e1ec051c0b7b96db7480b4620be1f7d4adcb21d5233a3d23bf43659e5359470de231dd734b698cd71201837ca57f911328e1aee6b2cb39533b2d549e", 0x3c, 0x101}, {&(0x7f0000000440)="dbac23926131781587488e056e40b191269651683d0d195cbd63543040e313e20126fd634002e0256fed786d07054466250e2de6b7fb6d7d8d5201ac1478ef26aafeae7947832c4cc7fea6315e92eb81c89a385dae378bf89ca53c6984b5aa79a7dcc139938fa64b30d7c24ff7b215c890be5756df2f441d0fcb938cb4c1f89245a47c630a2b5e28bb7b5a9c8c871c45857bc4fa646b30f485beccdf529ad0cd519a0bed9b5c7df28320d9ad7eceb30eda6c964cfcab57c8aa98b89d582792b886e41c9f6146332e31f93b", 0xcb, 0x1ff}, {&(0x7f0000000540)="5c96cd9925cbe6753ba234c06f8040f650bba8d4d4ebe59964acf97c49f7a5e793521ef728d90a4eb42cbe7a2536c6922f049b20f2c681c652b4dbe077b0a9972e1eeb5573d7ee69d6fc99d4e4894537fac772842763140c5d832bf593a5cc290fd0c641d14d06e564127871808073fb6fd27f2a9995b29abce9351b0b285f4887f1cc8de04d147141af2ed66cfb66fd230e329273710457efc72a8d09487b5c83e77201b28eb38d7d3846b63b1bf1233b5c925303dd3214066c99381b0457a62397c7df27f88e19a884e1dfa6", 0xcd, 0x6}, {&(0x7f0000000640)="8ae3f201063e83beadb088cb1080ef67", 0x10, 0x2a}, {&(0x7f0000000680)="dfeed81fb09a8a0d55f0999ce7730866db77fa306b896464e4d9cf133371563c7eb734eed8ec2dda58c030b96771bb708fba592614b985c573e8f3db424553c6", 0x40, 0x4}, {&(0x7f00000006c0)="f33dec9b5d96888f1504b1385ce82fdf8f2fa76ecc6ebf567753242a4c9129cd4c4885ba8bab1fd3120749889c981acccb344645e9d1ce95826ab7ceac8b7646d2e476e8934ac444aad3bba14f0d4be15675cd3d336db510c72ebbc07a000754d66f5282b1f241556cbd63a30b3d6af0f5c8a2443b03a92bb406abbb5f630ce1ef2afbba93c29e6bc46901a91ea9d91fa6048a468df5934437ca7e9e2a4fe38fddcd2aecac9406aa7adf5de93082ebf1b5c74d76b7b1b72a9b6fea1c5ab7cc1f3e97b5d7e1db9a64df9836ce0863cda956a1e2a45b9479b8ade23e81258e9444dfbf8066562f79", 0xe7, 0x7}, {&(0x7f00000007c0)="cd72eca63713ca8a35c3557b7d56b6a3073ca69e2067c18f5120c05d4ee8", 0x1e, 0x6}], 0x1, &(0x7f0000000a80)={[{@barrier='barrier'}, {@gid={'gid', 0x3d, r0}}, {@nodecompose='nodecompose'}, {@uid={'uid'}}, {@type={'type', 0x3d, "ae8c9d8f"}}, {@decompose='decompose'}, {@session={'session', 0x3d, 0x25}}], [{@uid_eq={'uid'}}, {@obj_type={'obj_type', 0x3d, 'overlay\x00'}}, {@euid_eq={'euid'}}, {@uid_eq={'uid'}}]}) 11:46:39 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000140)='hfsplus\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000a80)={[{@barrier='barrier'}, {@gid={'gid'}}, {@nodecompose='nodecompose'}, {@uid={'uid'}}], [{@uid_eq={'uid'}}, {@obj_type={'obj_type', 0x3d, 'overlay\x00'}}, {@euid_eq={'euid'}}, {@uid_eq={'uid'}}]}) 11:46:39 executing program 1: setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) setsockopt$netlink_NETLINK_BROADCAST_ERROR(0xffffffffffffffff, 0x10e, 0x4, 0x0, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)={0x14, 0x23, 0x1, 0x0, 0x0, {0x20000000004, 0xe00000000000000}}, 0x14}}, 0x0) 11:46:39 executing program 4: r0 = socket$netlink(0x10, 0x3, 0xf) bind$netlink(r0, &(0x7f0000514ff4)={0x10, 0x0, 0x0, 0x2ffffffff}, 0xc) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000000), 0x4) setsockopt$netlink_NETLINK_BROADCAST_ERROR(0xffffffffffffffff, 0x10e, 0x4, &(0x7f0000000080)=0x6, 0x4) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)={0x14, 0x23, 0x1, 0x0, 0x0, {0x20000000004, 0xe00000000000000}}, 0x14}}, 0x0) [ 274.412032][T11175] hfsplus: unable to parse mount options [ 274.472334][T11170] IPVS: ftp: loaded support on port[0] = 21 [ 274.480929][T11182] overlayfs: unrecognized mount option "uppFrdir=./file0" or missing value 11:46:39 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000140)='hfsplus\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000a80)={[{@barrier='barrier'}, {@gid={'gid'}}, {@nodecompose='nodecompose'}, {@uid={'uid'}}], [{@uid_eq={'uid'}}, {@obj_type={'obj_type', 0x3d, 'overlay\x00'}}, {@euid_eq={'euid'}}, {@uid_eq={'uid'}}]}) 11:46:39 executing program 0: syz_mount_image$hfsplus(0x0, &(0x7f0000000200)='./file0\x00', 0x3, 0x7, &(0x7f0000000800)=[{&(0x7f0000000400)="e1ec051c0b7b96db7480b4620be1f7d4adcb21d5233a3d23bf43659e5359470de231dd734b698cd71201837ca57f911328e1aee6b2cb39533b2d549e", 0x3c, 0x101}, {&(0x7f0000000440)="dbac23926131781587488e056e40b191269651683d0d195cbd63543040e313e20126fd634002e0256fed786d07054466250e2de6b7fb6d7d8d5201ac1478ef26aafeae7947832c4cc7fea6315e92eb81c89a385dae378bf89ca53c6984b5aa79a7dcc139938fa64b30d7c24ff7b215c890be5756df2f441d0fcb938cb4c1f89245a47c630a2b5e28bb7b5a9c8c871c45857bc4fa646b30f485beccdf529ad0cd519a0bed9b5c7df28320d9ad7eceb30eda6c964cfcab57c8aa98b89d582792b886e41c9f6146332e31f93b", 0xcb, 0x1ff}, {&(0x7f0000000540)="5c96cd9925cbe6753ba234c06f8040f650bba8d4d4ebe59964acf97c49f7a5e793521ef728d90a4eb42cbe7a2536c6922f049b20f2c681c652b4dbe077b0a9972e1eeb5573d7ee69d6fc99d4e4894537fac772842763140c5d832bf593a5cc290fd0c641d14d06e564127871808073fb6fd27f2a9995b29abce9351b0b285f4887f1cc8de04d147141af2ed66cfb66fd230e329273710457efc72a8d09487b5c83e77201b28eb38d7d3846b63b1bf1233b5c925303dd3214066c99381b0457a62397c7df27f88e19a884e1dfa6", 0xcd, 0x6}, {&(0x7f0000000640)="8ae3f201063e83beadb088cb1080ef67", 0x10, 0x2a}, {&(0x7f0000000680)="dfeed81fb09a8a0d55f0999ce7730866db77fa306b896464e4d9cf133371563c7eb734eed8ec2dda58c030b96771bb708fba592614b985c573e8f3db424553c6", 0x40, 0x4}, {&(0x7f00000006c0)="f33dec9b5d96888f1504b1385ce82fdf8f2fa76ecc6ebf567753242a4c9129cd4c4885ba8bab1fd3120749889c981acccb344645e9d1ce95826ab7ceac8b7646d2e476e8934ac444aad3bba14f0d4be15675cd3d336db510c72ebbc07a000754d66f5282b1f241556cbd63a30b3d6af0f5c8a2443b03a92bb406abbb5f630ce1ef2afbba93c29e6bc46901a91ea9d91fa6048a468df5934437ca7e9e2a4fe38fddcd2aecac9406aa7adf5de93082ebf1b5c74d76b7b1b72a9b6fea1c5ab7cc1f3e97b5d7e1db9a64df9836ce0863cda956a1e2a45b9479b8ade23e81258e9444dfbf8066562f79", 0xe7, 0x7}, {&(0x7f00000007c0)="cd72eca63713ca8a35c3557b7d56b6a3073ca69e2067c18f5120c05d4ee8", 0x1e, 0x6}], 0x1, &(0x7f0000000a80)={[{@barrier='barrier'}, {@gid={'gid'}}, {@nodecompose='nodecompose'}, {@uid={'uid'}}, {@type={'type', 0x3d, "ae8c9d8f"}}, {@decompose='decompose'}, {@session={'session', 0x3d, 0x25}}], [{@uid_eq={'uid'}}, {@obj_type={'obj_type', 0x3d, 'overlay\x00'}}, {@euid_eq={'euid'}}, {@uid_eq={'uid'}}]}) [ 274.702969][T11192] hfsplus: unable to parse mount options 11:46:39 executing program 1: setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) setsockopt$netlink_NETLINK_BROADCAST_ERROR(0xffffffffffffffff, 0x10e, 0x4, 0x0, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000100)={0x0, 0x2, &(0x7f00000001c0)={&(0x7f0000000040)={0x14, 0x23, 0x1, 0x0, 0x0, {0x20000000004, 0xe00000000000000}}, 0x14}}, 0x0) [ 274.830640][T11199] hfsplus: unable to parse mount options 11:46:39 executing program 5: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='devtmpfs\x00', 0x0, 0x0) chdir(&(0x7f00000000c0)='./file0\x00') pipe(0x0) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mkdir(0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$overlay(0x40000f, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="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"]) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000240)='cgroup2\x00', 0x0, 0x0) fstat(0xffffffffffffffff, &(0x7f00000008c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_mount_image$hfsplus(&(0x7f0000000140)='hfsplus\x00', &(0x7f0000000200)='./file0\x00', 0x3, 0x7, &(0x7f0000000800)=[{&(0x7f0000000400)="e1ec051c0b7b96db7480b4620be1f7d4adcb21d5233a3d23bf43659e5359470de231dd734b698cd71201837ca57f911328e1aee6b2cb39533b2d549e", 0x3c, 0x101}, {&(0x7f0000000440)="dbac23926131781587488e056e40b191269651683d0d195cbd63543040e313e20126fd634002e0256fed786d07054466250e2de6b7fb6d7d8d5201ac1478ef26aafeae7947832c4cc7fea6315e92eb81c89a385dae378bf89ca53c6984b5aa79a7dcc139938fa64b30d7c24ff7b215c890be5756df2f441d0fcb938cb4c1f89245a47c630a2b5e28bb7b5a9c8c871c45857bc4fa646b30f485beccdf529ad0cd519a0bed9b5c7df28320d9ad7eceb30eda6c964cfcab57c8aa98b89d582792b886e41c9f6146332e31f93b", 0xcb, 0x1ff}, {&(0x7f0000000540)="5c96cd9925cbe6753ba234c06f8040f650bba8d4d4ebe59964acf97c49f7a5e793521ef728d90a4eb42cbe7a2536c6922f049b20f2c681c652b4dbe077b0a9972e1eeb5573d7ee69d6fc99d4e4894537fac772842763140c5d832bf593a5cc290fd0c641d14d06e564127871808073fb6fd27f2a9995b29abce9351b0b285f4887f1cc8de04d147141af2ed66cfb66fd230e329273710457efc72a8d09487b5c83e77201b28eb38d7d3846b63b1bf1233b5c925303dd3214066c99381b0457a62397c7df27f88e19a884e1dfa6", 0xcd, 0x6}, {&(0x7f0000000640)="8ae3f201063e83beadb088cb1080ef67", 0x10, 0x2a}, {&(0x7f0000000680)="dfeed81fb09a8a0d55f0999ce7730866db77fa306b896464e4d9cf133371563c7eb734eed8ec2dda58c030b96771bb708fba592614b985c573e8f3db424553c6", 0x40, 0x4}, {&(0x7f00000006c0)="f33dec9b5d96888f1504b1385ce82fdf8f2fa76ecc6ebf567753242a4c9129cd4c4885ba8bab1fd3120749889c981acccb344645e9d1ce95826ab7ceac8b7646d2e476e8934ac444aad3bba14f0d4be15675cd3d336db510c72ebbc07a000754d66f5282b1f241556cbd63a30b3d6af0f5c8a2443b03a92bb406abbb5f630ce1ef2afbba93c29e6bc46901a91ea9d91fa6048a468df5934437ca7e9e2a4fe38fddcd2aecac9406aa7adf5de93082ebf1b5c74d76b7b1b72a9b6fea1c5ab7cc1f3e97b5d7e1db9a64df9836ce0863cda956a1e2a45b9479b8ade23e81258e9444dfbf8066562f79", 0xe7, 0x7}, {&(0x7f00000007c0)="cd72eca63713ca8a35c3557b7d56b6a3073ca69e2067c18f5120c05d4ee8", 0x1e, 0x6}], 0x1, &(0x7f0000000a80)={[{@barrier='barrier'}, {@gid={'gid', 0x3d, r0}}, {@nodecompose='nodecompose'}, {@uid={'uid'}}, {@type={'type', 0x3d, "ae8c9d8f"}}, {@decompose='decompose'}, {@session={'session', 0x3d, 0x25}}], [{@uid_eq={'uid'}}, {@obj_type={'obj_type', 0x3d, 'overlay\x00'}}, {@euid_eq={'euid'}}, {@uid_eq={'uid'}}]}) 11:46:40 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000140)='hfsplus\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000a80)={[{@barrier='barrier'}, {@gid={'gid'}}, {@nodecompose='nodecompose'}, {@uid={'uid'}}], [{@uid_eq={'uid'}}, {@obj_type={'obj_type', 0x3d, 'overlay\x00'}}, {@euid_eq={'euid'}}, {@uid_eq={'uid'}}]}) 11:46:40 executing program 4: r0 = socket$netlink(0x10, 0x3, 0xf) bind$netlink(r0, &(0x7f0000514ff4)={0x10, 0x0, 0x0, 0x2ffffffff}, 0xc) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000000), 0x4) setsockopt$netlink_NETLINK_BROADCAST_ERROR(0xffffffffffffffff, 0x10e, 0x4, &(0x7f0000000080)=0x6, 0x4) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)={0x14, 0x23, 0x1, 0x0, 0x0, {0x20000000004, 0xe00000000000000}}, 0x14}}, 0x0) [ 275.149531][T11215] overlayfs: unrecognized mount option "uppFrdir=./file0" or missing value [ 275.211010][T11221] hfsplus: unable to parse mount options [ 275.239769][T11225] hfsplus: unable to parse mount options 11:46:40 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_FSGETXATTR(0xffffffffffffffff, 0x8004550f, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x1}, 0x10) r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) r1 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000080)='/dev/qat_adf_ctl\x00', 0x8200, 0x0) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r1, 0x6, 0x23, &(0x7f00000000c0)={&(0x7f0000ffc000/0x4000)=nil, 0x4000}, &(0x7f0000000140)=0x10) listen(r0, 0x0) unshare(0x40000000) setrlimit(0x0, 0x0) r2 = accept(r0, 0x0, 0x0) write$binfmt_elf64(r2, &(0x7f00000002c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x9, 0x8, 0x0, 0x0, 0x0, 0x4825483b35c83c0b, 0x0, 0x0, 0x40, 0x227}, [{0x4, 0x1, 0xfff, 0x0, 0x0, 0xff8000000002, 0x0, 0x7fff}], "", [[], [], []]}, 0x378) 11:46:40 executing program 0: syz_mount_image$hfsplus(&(0x7f0000000140)='hfsplus\x00', 0x0, 0x3, 0x7, &(0x7f0000000800)=[{&(0x7f0000000400)="e1ec051c0b7b96db7480b4620be1f7d4adcb21d5233a3d23bf43659e5359470de231dd734b698cd71201837ca57f911328e1aee6b2cb39533b2d549e", 0x3c, 0x101}, {&(0x7f0000000440)="dbac23926131781587488e056e40b191269651683d0d195cbd63543040e313e20126fd634002e0256fed786d07054466250e2de6b7fb6d7d8d5201ac1478ef26aafeae7947832c4cc7fea6315e92eb81c89a385dae378bf89ca53c6984b5aa79a7dcc139938fa64b30d7c24ff7b215c890be5756df2f441d0fcb938cb4c1f89245a47c630a2b5e28bb7b5a9c8c871c45857bc4fa646b30f485beccdf529ad0cd519a0bed9b5c7df28320d9ad7eceb30eda6c964cfcab57c8aa98b89d582792b886e41c9f6146332e31f93b", 0xcb, 0x1ff}, {&(0x7f0000000540)="5c96cd9925cbe6753ba234c06f8040f650bba8d4d4ebe59964acf97c49f7a5e793521ef728d90a4eb42cbe7a2536c6922f049b20f2c681c652b4dbe077b0a9972e1eeb5573d7ee69d6fc99d4e4894537fac772842763140c5d832bf593a5cc290fd0c641d14d06e564127871808073fb6fd27f2a9995b29abce9351b0b285f4887f1cc8de04d147141af2ed66cfb66fd230e329273710457efc72a8d09487b5c83e77201b28eb38d7d3846b63b1bf1233b5c925303dd3214066c99381b0457a62397c7df27f88e19a884e1dfa6", 0xcd, 0x6}, {&(0x7f0000000640)="8ae3f201063e83beadb088cb1080ef67", 0x10, 0x2a}, {&(0x7f0000000680)="dfeed81fb09a8a0d55f0999ce7730866db77fa306b896464e4d9cf133371563c7eb734eed8ec2dda58c030b96771bb708fba592614b985c573e8f3db424553c6", 0x40, 0x4}, {&(0x7f00000006c0)="f33dec9b5d96888f1504b1385ce82fdf8f2fa76ecc6ebf567753242a4c9129cd4c4885ba8bab1fd3120749889c981acccb344645e9d1ce95826ab7ceac8b7646d2e476e8934ac444aad3bba14f0d4be15675cd3d336db510c72ebbc07a000754d66f5282b1f241556cbd63a30b3d6af0f5c8a2443b03a92bb406abbb5f630ce1ef2afbba93c29e6bc46901a91ea9d91fa6048a468df5934437ca7e9e2a4fe38fddcd2aecac9406aa7adf5de93082ebf1b5c74d76b7b1b72a9b6fea1c5ab7cc1f3e97b5d7e1db9a64df9836ce0863cda956a1e2a45b9479b8ade23e81258e9444dfbf8066562f79", 0xe7, 0x7}, {&(0x7f00000007c0)="cd72eca63713ca8a35c3557b7d56b6a3073ca69e2067c18f5120c05d4ee8", 0x1e, 0x6}], 0x1, &(0x7f0000000a80)={[{@barrier='barrier'}, {@gid={'gid'}}, {@nodecompose='nodecompose'}, {@uid={'uid'}}, {@type={'type', 0x3d, "ae8c9d8f"}}, {@decompose='decompose'}, {@session={'session', 0x3d, 0x25}}], [{@uid_eq={'uid'}}, {@obj_type={'obj_type', 0x3d, 'overlay\x00'}}, {@euid_eq={'euid'}}, {@uid_eq={'uid'}}]}) 11:46:40 executing program 1: setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) setsockopt$netlink_NETLINK_BROADCAST_ERROR(0xffffffffffffffff, 0x10e, 0x4, 0x0, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000100)={0x0, 0x3, &(0x7f00000001c0)={&(0x7f0000000040)={0x14, 0x23, 0x1, 0x0, 0x0, {0x20000000004, 0xe00000000000000}}, 0x14}}, 0x0) 11:46:40 executing program 5: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='devtmpfs\x00', 0x0, 0x0) chdir(&(0x7f00000000c0)='./file0\x00') pipe(0x0) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mkdir(0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$overlay(0x40000f, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="75707046726469723d2e2f66696c65302c6c6f7765726469723d2e2f66696c65302c776f726b6469723d2e2f66696c65315c008dd712eb4c4602d39078433581919e8b817a1c09fe8e181081519b7a8259793b8c4b1093736b8d3ef3d64781796455ea1b29412fabd4fd749cbdbadd5d4fa6dad18d59235262aee5928a646acaa5b0b72c4348e1b0a4a52cab8fc461abde196cf60a732d195a64ce881b84bc1c085f990fd4bc2ce47e609a0daa4861948516ca0f519beaea32e38fa09e9b49538a32cce47c620ee6ce668079b8d73f89bfb329c08d9c81fe3c12bf0bf75ac36079bf34fd8eeadf965d333527ebe8ede05feec022e592e9e2e2be551753056d32048241d2b3ee3344aa57e1fe8f604132f549432ccf86af2039192fc4fdddf19ffd0d42de"]) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000240)='cgroup2\x00', 0x0, 0x0) fstat(0xffffffffffffffff, &(0x7f00000008c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) socket$inet_udplite(0x2, 0x2, 0x88) syz_mount_image$hfsplus(&(0x7f0000000140)='hfsplus\x00', &(0x7f0000000200)='./file0\x00', 0x3, 0x7, &(0x7f0000000800)=[{&(0x7f0000000400)="e1ec051c0b7b96db7480b4620be1f7d4adcb21d5233a3d23bf43659e5359470de231dd734b698cd71201837ca57f911328e1aee6b2cb39533b2d549e", 0x3c, 0x101}, {&(0x7f0000000440)="dbac23926131781587488e056e40b191269651683d0d195cbd63543040e313e20126fd634002e0256fed786d07054466250e2de6b7fb6d7d8d5201ac1478ef26aafeae7947832c4cc7fea6315e92eb81c89a385dae378bf89ca53c6984b5aa79a7dcc139938fa64b30d7c24ff7b215c890be5756df2f441d0fcb938cb4c1f89245a47c630a2b5e28bb7b5a9c8c871c45857bc4fa646b30f485beccdf529ad0cd519a0bed9b5c7df28320d9ad7eceb30eda6c964cfcab57c8aa98b89d582792b886e41c9f6146332e31f93b", 0xcb, 0x1ff}, {&(0x7f0000000540)="5c96cd9925cbe6753ba234c06f8040f650bba8d4d4ebe59964acf97c49f7a5e793521ef728d90a4eb42cbe7a2536c6922f049b20f2c681c652b4dbe077b0a9972e1eeb5573d7ee69d6fc99d4e4894537fac772842763140c5d832bf593a5cc290fd0c641d14d06e564127871808073fb6fd27f2a9995b29abce9351b0b285f4887f1cc8de04d147141af2ed66cfb66fd230e329273710457efc72a8d09487b5c83e77201b28eb38d7d3846b63b1bf1233b5c925303dd3214066c99381b0457a62397c7df27f88e19a884e1dfa6", 0xcd, 0x6}, {&(0x7f0000000640)="8ae3f201063e83beadb088cb1080ef67", 0x10, 0x2a}, {&(0x7f0000000680)="dfeed81fb09a8a0d55f0999ce7730866db77fa306b896464e4d9cf133371563c7eb734eed8ec2dda58c030b96771bb708fba592614b985c573e8f3db424553c6", 0x40, 0x4}, {&(0x7f00000006c0)="f33dec9b5d96888f1504b1385ce82fdf8f2fa76ecc6ebf567753242a4c9129cd4c4885ba8bab1fd3120749889c981acccb344645e9d1ce95826ab7ceac8b7646d2e476e8934ac444aad3bba14f0d4be15675cd3d336db510c72ebbc07a000754d66f5282b1f241556cbd63a30b3d6af0f5c8a2443b03a92bb406abbb5f630ce1ef2afbba93c29e6bc46901a91ea9d91fa6048a468df5934437ca7e9e2a4fe38fddcd2aecac9406aa7adf5de93082ebf1b5c74d76b7b1b72a9b6fea1c5ab7cc1f3e97b5d7e1db9a64df9836ce0863cda956a1e2a45b9479b8ade23e81258e9444dfbf8066562f79", 0xe7, 0x7}, {&(0x7f00000007c0)="cd72eca63713ca8a35c3557b7d56b6a3073ca69e2067c18f5120c05d4ee8", 0x1e, 0x6}], 0x1, &(0x7f0000000a80)={[{@barrier='barrier'}, {@gid={'gid', 0x3d, r0}}, {@nodecompose='nodecompose'}, {@uid={'uid'}}, {@type={'type', 0x3d, "ae8c9d8f"}}, {@decompose='decompose'}, {@session={'session', 0x3d, 0x25}}], [{@uid_eq={'uid'}}, {@obj_type={'obj_type', 0x3d, 'overlay\x00'}}, {@euid_eq={'euid'}}, {@uid_eq={'uid'}}]}) 11:46:40 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000140)='hfsplus\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000a80)={[{@barrier='barrier'}, {@gid={'gid'}}, {@nodecompose='nodecompose'}, {@type={'type', 0x3d, "ae8c9d8f"}}], [{@uid_eq={'uid'}}, {@obj_type={'obj_type', 0x3d, 'overlay\x00'}}, {@euid_eq={'euid'}}, {@uid_eq={'uid'}}]}) 11:46:40 executing program 0: syz_mount_image$hfsplus(&(0x7f0000000140)='hfsplus\x00', 0x0, 0x3, 0x7, &(0x7f0000000800)=[{&(0x7f0000000400)="e1ec051c0b7b96db7480b4620be1f7d4adcb21d5233a3d23bf43659e5359470de231dd734b698cd71201837ca57f911328e1aee6b2cb39533b2d549e", 0x3c, 0x101}, {&(0x7f0000000440)="dbac23926131781587488e056e40b191269651683d0d195cbd63543040e313e20126fd634002e0256fed786d07054466250e2de6b7fb6d7d8d5201ac1478ef26aafeae7947832c4cc7fea6315e92eb81c89a385dae378bf89ca53c6984b5aa79a7dcc139938fa64b30d7c24ff7b215c890be5756df2f441d0fcb938cb4c1f89245a47c630a2b5e28bb7b5a9c8c871c45857bc4fa646b30f485beccdf529ad0cd519a0bed9b5c7df28320d9ad7eceb30eda6c964cfcab57c8aa98b89d582792b886e41c9f6146332e31f93b", 0xcb, 0x1ff}, {&(0x7f0000000540)="5c96cd9925cbe6753ba234c06f8040f650bba8d4d4ebe59964acf97c49f7a5e793521ef728d90a4eb42cbe7a2536c6922f049b20f2c681c652b4dbe077b0a9972e1eeb5573d7ee69d6fc99d4e4894537fac772842763140c5d832bf593a5cc290fd0c641d14d06e564127871808073fb6fd27f2a9995b29abce9351b0b285f4887f1cc8de04d147141af2ed66cfb66fd230e329273710457efc72a8d09487b5c83e77201b28eb38d7d3846b63b1bf1233b5c925303dd3214066c99381b0457a62397c7df27f88e19a884e1dfa6", 0xcd, 0x6}, {&(0x7f0000000640)="8ae3f201063e83beadb088cb1080ef67", 0x10, 0x2a}, {&(0x7f0000000680)="dfeed81fb09a8a0d55f0999ce7730866db77fa306b896464e4d9cf133371563c7eb734eed8ec2dda58c030b96771bb708fba592614b985c573e8f3db424553c6", 0x40, 0x4}, {&(0x7f00000006c0)="f33dec9b5d96888f1504b1385ce82fdf8f2fa76ecc6ebf567753242a4c9129cd4c4885ba8bab1fd3120749889c981acccb344645e9d1ce95826ab7ceac8b7646d2e476e8934ac444aad3bba14f0d4be15675cd3d336db510c72ebbc07a000754d66f5282b1f241556cbd63a30b3d6af0f5c8a2443b03a92bb406abbb5f630ce1ef2afbba93c29e6bc46901a91ea9d91fa6048a468df5934437ca7e9e2a4fe38fddcd2aecac9406aa7adf5de93082ebf1b5c74d76b7b1b72a9b6fea1c5ab7cc1f3e97b5d7e1db9a64df9836ce0863cda956a1e2a45b9479b8ade23e81258e9444dfbf8066562f79", 0xe7, 0x7}, {&(0x7f00000007c0)="cd72eca63713ca8a35c3557b7d56b6a3073ca69e2067c18f5120c05d4ee8", 0x1e, 0x6}], 0x1, &(0x7f0000000a80)={[{@barrier='barrier'}, {@gid={'gid'}}, {@nodecompose='nodecompose'}, {@uid={'uid'}}, {@type={'type', 0x3d, "ae8c9d8f"}}, {@decompose='decompose'}, {@session={'session', 0x3d, 0x25}}], [{@uid_eq={'uid'}}, {@obj_type={'obj_type', 0x3d, 'overlay\x00'}}, {@euid_eq={'euid'}}, {@uid_eq={'uid'}}]}) 11:46:40 executing program 4: r0 = socket$netlink(0x10, 0x3, 0xf) bind$netlink(r0, &(0x7f0000514ff4)={0x10, 0x0, 0x0, 0x2ffffffff}, 0xc) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000000), 0x4) setsockopt$netlink_NETLINK_BROADCAST_ERROR(r0, 0x10e, 0x4, 0x0, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)={0x14, 0x23, 0x1, 0x0, 0x0, {0x20000000004, 0xe00000000000000}}, 0x14}}, 0x0) 11:46:40 executing program 1: setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) setsockopt$netlink_NETLINK_BROADCAST_ERROR(0xffffffffffffffff, 0x10e, 0x4, 0x0, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000100)={0x0, 0x4, &(0x7f00000001c0)={&(0x7f0000000040)={0x14, 0x23, 0x1, 0x0, 0x0, {0x20000000004, 0xe00000000000000}}, 0x14}}, 0x0) [ 275.725483][T11249] hfsplus: unable to parse mount options [ 275.733241][T11247] overlayfs: unrecognized mount option "uppFrdir=./file0" or missing value [ 275.762876][T11242] IPVS: ftp: loaded support on port[0] = 21 11:46:40 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000140)='hfsplus\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000a80)={[{@barrier='barrier'}, {@gid={'gid'}}, {@type={'type', 0x3d, "ae8c9d8f"}}], [{@uid_eq={'uid'}}, {@obj_type={'obj_type', 0x3d, 'overlay\x00'}}, {@euid_eq={'euid'}}, {@uid_eq={'uid'}}]}) 11:46:40 executing program 0: syz_mount_image$hfsplus(&(0x7f0000000140)='hfsplus\x00', 0x0, 0x3, 0x7, &(0x7f0000000800)=[{&(0x7f0000000400)="e1ec051c0b7b96db7480b4620be1f7d4adcb21d5233a3d23bf43659e5359470de231dd734b698cd71201837ca57f911328e1aee6b2cb39533b2d549e", 0x3c, 0x101}, {&(0x7f0000000440)="dbac23926131781587488e056e40b191269651683d0d195cbd63543040e313e20126fd634002e0256fed786d07054466250e2de6b7fb6d7d8d5201ac1478ef26aafeae7947832c4cc7fea6315e92eb81c89a385dae378bf89ca53c6984b5aa79a7dcc139938fa64b30d7c24ff7b215c890be5756df2f441d0fcb938cb4c1f89245a47c630a2b5e28bb7b5a9c8c871c45857bc4fa646b30f485beccdf529ad0cd519a0bed9b5c7df28320d9ad7eceb30eda6c964cfcab57c8aa98b89d582792b886e41c9f6146332e31f93b", 0xcb, 0x1ff}, {&(0x7f0000000540)="5c96cd9925cbe6753ba234c06f8040f650bba8d4d4ebe59964acf97c49f7a5e793521ef728d90a4eb42cbe7a2536c6922f049b20f2c681c652b4dbe077b0a9972e1eeb5573d7ee69d6fc99d4e4894537fac772842763140c5d832bf593a5cc290fd0c641d14d06e564127871808073fb6fd27f2a9995b29abce9351b0b285f4887f1cc8de04d147141af2ed66cfb66fd230e329273710457efc72a8d09487b5c83e77201b28eb38d7d3846b63b1bf1233b5c925303dd3214066c99381b0457a62397c7df27f88e19a884e1dfa6", 0xcd, 0x6}, {&(0x7f0000000640)="8ae3f201063e83beadb088cb1080ef67", 0x10, 0x2a}, {&(0x7f0000000680)="dfeed81fb09a8a0d55f0999ce7730866db77fa306b896464e4d9cf133371563c7eb734eed8ec2dda58c030b96771bb708fba592614b985c573e8f3db424553c6", 0x40, 0x4}, {&(0x7f00000006c0)="f33dec9b5d96888f1504b1385ce82fdf8f2fa76ecc6ebf567753242a4c9129cd4c4885ba8bab1fd3120749889c981acccb344645e9d1ce95826ab7ceac8b7646d2e476e8934ac444aad3bba14f0d4be15675cd3d336db510c72ebbc07a000754d66f5282b1f241556cbd63a30b3d6af0f5c8a2443b03a92bb406abbb5f630ce1ef2afbba93c29e6bc46901a91ea9d91fa6048a468df5934437ca7e9e2a4fe38fddcd2aecac9406aa7adf5de93082ebf1b5c74d76b7b1b72a9b6fea1c5ab7cc1f3e97b5d7e1db9a64df9836ce0863cda956a1e2a45b9479b8ade23e81258e9444dfbf8066562f79", 0xe7, 0x7}, {&(0x7f00000007c0)="cd72eca63713ca8a35c3557b7d56b6a3073ca69e2067c18f5120c05d4ee8", 0x1e, 0x6}], 0x1, &(0x7f0000000a80)={[{@barrier='barrier'}, {@gid={'gid'}}, {@nodecompose='nodecompose'}, {@uid={'uid'}}, {@type={'type', 0x3d, "ae8c9d8f"}}, {@decompose='decompose'}, {@session={'session', 0x3d, 0x25}}], [{@uid_eq={'uid'}}, {@obj_type={'obj_type', 0x3d, 'overlay\x00'}}, {@euid_eq={'euid'}}, {@uid_eq={'uid'}}]}) [ 275.931979][T11247] hfsplus: unable to parse mount options 11:46:40 executing program 4: r0 = socket$netlink(0x10, 0x3, 0xf) bind$netlink(r0, &(0x7f0000514ff4)={0x10, 0x0, 0x0, 0x2ffffffff}, 0xc) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000000), 0x4) setsockopt$netlink_NETLINK_BROADCAST_ERROR(r0, 0x10e, 0x4, 0x0, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)={0x14, 0x23, 0x1, 0x0, 0x0, {0x20000000004, 0xe00000000000000}}, 0x14}}, 0x0) 11:46:41 executing program 5: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='devtmpfs\x00', 0x0, 0x0) chdir(&(0x7f00000000c0)='./file0\x00') pipe(0x0) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mkdir(0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$overlay(0x40000f, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="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"]) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000240)='cgroup2\x00', 0x0, 0x0) fstat(0xffffffffffffffff, &(0x7f00000008c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) syz_mount_image$hfsplus(&(0x7f0000000140)='hfsplus\x00', &(0x7f0000000200)='./file0\x00', 0x3, 0x7, &(0x7f0000000800)=[{&(0x7f0000000400)="e1ec051c0b7b96db7480b4620be1f7d4adcb21d5233a3d23bf43659e5359470de231dd734b698cd71201837ca57f911328e1aee6b2cb39533b2d549e", 0x3c, 0x101}, {&(0x7f0000000440)="dbac23926131781587488e056e40b191269651683d0d195cbd63543040e313e20126fd634002e0256fed786d07054466250e2de6b7fb6d7d8d5201ac1478ef26aafeae7947832c4cc7fea6315e92eb81c89a385dae378bf89ca53c6984b5aa79a7dcc139938fa64b30d7c24ff7b215c890be5756df2f441d0fcb938cb4c1f89245a47c630a2b5e28bb7b5a9c8c871c45857bc4fa646b30f485beccdf529ad0cd519a0bed9b5c7df28320d9ad7eceb30eda6c964cfcab57c8aa98b89d582792b886e41c9f6146332e31f93b", 0xcb, 0x1ff}, {&(0x7f0000000540)="5c96cd9925cbe6753ba234c06f8040f650bba8d4d4ebe59964acf97c49f7a5e793521ef728d90a4eb42cbe7a2536c6922f049b20f2c681c652b4dbe077b0a9972e1eeb5573d7ee69d6fc99d4e4894537fac772842763140c5d832bf593a5cc290fd0c641d14d06e564127871808073fb6fd27f2a9995b29abce9351b0b285f4887f1cc8de04d147141af2ed66cfb66fd230e329273710457efc72a8d09487b5c83e77201b28eb38d7d3846b63b1bf1233b5c925303dd3214066c99381b0457a62397c7df27f88e19a884e1dfa6", 0xcd, 0x6}, {&(0x7f0000000640)="8ae3f201063e83beadb088cb1080ef67", 0x10, 0x2a}, {&(0x7f0000000680)="dfeed81fb09a8a0d55f0999ce7730866db77fa306b896464e4d9cf133371563c7eb734eed8ec2dda58c030b96771bb708fba592614b985c573e8f3db424553c6", 0x40, 0x4}, {&(0x7f00000006c0)="f33dec9b5d96888f1504b1385ce82fdf8f2fa76ecc6ebf567753242a4c9129cd4c4885ba8bab1fd3120749889c981acccb344645e9d1ce95826ab7ceac8b7646d2e476e8934ac444aad3bba14f0d4be15675cd3d336db510c72ebbc07a000754d66f5282b1f241556cbd63a30b3d6af0f5c8a2443b03a92bb406abbb5f630ce1ef2afbba93c29e6bc46901a91ea9d91fa6048a468df5934437ca7e9e2a4fe38fddcd2aecac9406aa7adf5de93082ebf1b5c74d76b7b1b72a9b6fea1c5ab7cc1f3e97b5d7e1db9a64df9836ce0863cda956a1e2a45b9479b8ade23e81258e9444dfbf8066562f79", 0xe7, 0x7}, {&(0x7f00000007c0)="cd72eca63713ca8a35c3557b7d56b6a3073ca69e2067c18f5120c05d4ee8", 0x1e, 0x6}], 0x1, &(0x7f0000000a80)={[{@barrier='barrier'}, {@gid={'gid', 0x3d, r0}}, {@nodecompose='nodecompose'}, {@uid={'uid'}}, {@type={'type', 0x3d, "ae8c9d8f"}}, {@decompose='decompose'}, {@session={'session', 0x3d, 0x25}}], [{@uid_eq={'uid'}}, {@obj_type={'obj_type', 0x3d, 'overlay\x00'}}, {@euid_eq={'euid'}}, {@uid_eq={'uid'}}]}) [ 276.252723][T11275] hfsplus: unable to parse mount options [ 276.301857][T11279] overlayfs: unrecognized mount option "uppFrdir=./file0" or missing value [ 276.461398][T11279] hfsplus: unable to parse mount options 11:46:41 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_FSGETXATTR(0xffffffffffffffff, 0x8004550f, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x1}, 0x10) r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) r1 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000080)='/dev/qat_adf_ctl\x00', 0x8200, 0x0) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r1, 0x6, 0x23, &(0x7f00000000c0)={&(0x7f0000ffc000/0x4000)=nil, 0x4000}, &(0x7f0000000140)=0x10) listen(r0, 0x0) unshare(0x40000000) setrlimit(0x0, 0x0) r2 = accept(r0, 0x0, 0x0) write$binfmt_elf64(r2, &(0x7f00000002c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x9, 0x8, 0x0, 0x0, 0x0, 0x4825483b35c83c0b, 0x0, 0x0, 0x40, 0x227}, [{0x4, 0x1, 0xfff, 0x0, 0x0, 0xff8000000002, 0x0, 0x7fff}], "", [[], [], []]}, 0x378) 11:46:41 executing program 1: setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) setsockopt$netlink_NETLINK_BROADCAST_ERROR(0xffffffffffffffff, 0x10e, 0x4, 0x0, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000100)={0x0, 0x5, &(0x7f00000001c0)={&(0x7f0000000040)={0x14, 0x23, 0x1, 0x0, 0x0, {0x20000000004, 0xe00000000000000}}, 0x14}}, 0x0) 11:46:41 executing program 0: syz_mount_image$hfsplus(&(0x7f0000000140)='hfsplus\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x7, &(0x7f0000000800)=[{&(0x7f0000000400)="e1ec051c0b7b96db7480b4620be1f7d4adcb21d5233a3d23bf43659e5359470de231dd734b698cd71201837ca57f911328e1aee6b2cb39533b2d549e", 0x3c, 0x101}, {&(0x7f0000000440)="dbac23926131781587488e056e40b191269651683d0d195cbd63543040e313e20126fd634002e0256fed786d07054466250e2de6b7fb6d7d8d5201ac1478ef26aafeae7947832c4cc7fea6315e92eb81c89a385dae378bf89ca53c6984b5aa79a7dcc139938fa64b30d7c24ff7b215c890be5756df2f441d0fcb938cb4c1f89245a47c630a2b5e28bb7b5a9c8c871c45857bc4fa646b30f485beccdf529ad0cd519a0bed9b5c7df28320d9ad7eceb30eda6c964cfcab57c8aa98b89d582792b886e41c9f6146332e31f93b", 0xcb, 0x1ff}, {&(0x7f0000000540)="5c96cd9925cbe6753ba234c06f8040f650bba8d4d4ebe59964acf97c49f7a5e793521ef728d90a4eb42cbe7a2536c6922f049b20f2c681c652b4dbe077b0a9972e1eeb5573d7ee69d6fc99d4e4894537fac772842763140c5d832bf593a5cc290fd0c641d14d06e564127871808073fb6fd27f2a9995b29abce9351b0b285f4887f1cc8de04d147141af2ed66cfb66fd230e329273710457efc72a8d09487b5c83e77201b28eb38d7d3846b63b1bf1233b5c925303dd3214066c99381b0457a62397c7df27f88e19a884e1dfa6", 0xcd, 0x6}, {&(0x7f0000000640)="8ae3f201063e83beadb088cb1080ef67", 0x10, 0x2a}, {&(0x7f0000000680)="dfeed81fb09a8a0d55f0999ce7730866db77fa306b896464e4d9cf133371563c7eb734eed8ec2dda58c030b96771bb708fba592614b985c573e8f3db424553c6", 0x40, 0x4}, {&(0x7f00000006c0)="f33dec9b5d96888f1504b1385ce82fdf8f2fa76ecc6ebf567753242a4c9129cd4c4885ba8bab1fd3120749889c981acccb344645e9d1ce95826ab7ceac8b7646d2e476e8934ac444aad3bba14f0d4be15675cd3d336db510c72ebbc07a000754d66f5282b1f241556cbd63a30b3d6af0f5c8a2443b03a92bb406abbb5f630ce1ef2afbba93c29e6bc46901a91ea9d91fa6048a468df5934437ca7e9e2a4fe38fddcd2aecac9406aa7adf5de93082ebf1b5c74d76b7b1b72a9b6fea1c5ab7cc1f3e97b5d7e1db9a64df9836ce0863cda956a1e2a45b9479b8ade23e81258e9444dfbf8066562f79", 0xe7, 0x7}, {&(0x7f00000007c0)="cd72eca63713ca8a35c3557b7d56b6a3073ca69e2067c18f5120c05d4ee8", 0x1e, 0x6}], 0x1, &(0x7f0000000a80)={[{@barrier='barrier'}, {@gid={'gid'}}, {@nodecompose='nodecompose'}, {@uid={'uid'}}, {@type={'type', 0x3d, "ae8c9d8f"}}, {@decompose='decompose'}, {@session={'session', 0x3d, 0x25}}], [{@uid_eq={'uid'}}, {@obj_type={'obj_type', 0x3d, 'overlay\x00'}}, {@euid_eq={'euid'}}, {@uid_eq={'uid'}}]}) 11:46:41 executing program 4: r0 = socket$netlink(0x10, 0x3, 0xf) bind$netlink(r0, &(0x7f0000514ff4)={0x10, 0x0, 0x0, 0x2ffffffff}, 0xc) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000000), 0x4) setsockopt$netlink_NETLINK_BROADCAST_ERROR(r0, 0x10e, 0x4, 0x0, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)={0x14, 0x23, 0x1, 0x0, 0x0, {0x20000000004, 0xe00000000000000}}, 0x14}}, 0x0) 11:46:41 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000140)='hfsplus\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000a80)={[{@barrier='barrier'}, {@type={'type', 0x3d, "ae8c9d8f"}}], [{@uid_eq={'uid'}}, {@obj_type={'obj_type', 0x3d, 'overlay\x00'}}, {@euid_eq={'euid'}}, {@uid_eq={'uid'}}]}) 11:46:41 executing program 5: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='devtmpfs\x00', 0x0, 0x0) chdir(&(0x7f00000000c0)='./file0\x00') pipe(0x0) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mkdir(0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$overlay(0x40000f, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="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"]) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000240)='cgroup2\x00', 0x0, 0x0) syz_mount_image$hfsplus(&(0x7f0000000140)='hfsplus\x00', &(0x7f0000000200)='./file0\x00', 0x3, 0x7, &(0x7f0000000800)=[{&(0x7f0000000400)="e1ec051c0b7b96db7480b4620be1f7d4adcb21d5233a3d23bf43659e5359470de231dd734b698cd71201837ca57f911328e1aee6b2cb39533b2d549e", 0x3c, 0x101}, {&(0x7f0000000440)="dbac23926131781587488e056e40b191269651683d0d195cbd63543040e313e20126fd634002e0256fed786d07054466250e2de6b7fb6d7d8d5201ac1478ef26aafeae7947832c4cc7fea6315e92eb81c89a385dae378bf89ca53c6984b5aa79a7dcc139938fa64b30d7c24ff7b215c890be5756df2f441d0fcb938cb4c1f89245a47c630a2b5e28bb7b5a9c8c871c45857bc4fa646b30f485beccdf529ad0cd519a0bed9b5c7df28320d9ad7eceb30eda6c964cfcab57c8aa98b89d582792b886e41c9f6146332e31f93b", 0xcb, 0x1ff}, {&(0x7f0000000540)="5c96cd9925cbe6753ba234c06f8040f650bba8d4d4ebe59964acf97c49f7a5e793521ef728d90a4eb42cbe7a2536c6922f049b20f2c681c652b4dbe077b0a9972e1eeb5573d7ee69d6fc99d4e4894537fac772842763140c5d832bf593a5cc290fd0c641d14d06e564127871808073fb6fd27f2a9995b29abce9351b0b285f4887f1cc8de04d147141af2ed66cfb66fd230e329273710457efc72a8d09487b5c83e77201b28eb38d7d3846b63b1bf1233b5c925303dd3214066c99381b0457a62397c7df27f88e19a884e1dfa6", 0xcd, 0x6}, {&(0x7f0000000640)="8ae3f201063e83beadb088cb1080ef67", 0x10, 0x2a}, {&(0x7f0000000680)="dfeed81fb09a8a0d55f0999ce7730866db77fa306b896464e4d9cf133371563c7eb734eed8ec2dda58c030b96771bb708fba592614b985c573e8f3db424553c6", 0x40, 0x4}, {&(0x7f00000006c0)="f33dec9b5d96888f1504b1385ce82fdf8f2fa76ecc6ebf567753242a4c9129cd4c4885ba8bab1fd3120749889c981acccb344645e9d1ce95826ab7ceac8b7646d2e476e8934ac444aad3bba14f0d4be15675cd3d336db510c72ebbc07a000754d66f5282b1f241556cbd63a30b3d6af0f5c8a2443b03a92bb406abbb5f630ce1ef2afbba93c29e6bc46901a91ea9d91fa6048a468df5934437ca7e9e2a4fe38fddcd2aecac9406aa7adf5de93082ebf1b5c74d76b7b1b72a9b6fea1c5ab7cc1f3e97b5d7e1db9a64df9836ce0863cda956a1e2a45b9479b8ade23e81258e9444dfbf8066562f79", 0xe7, 0x7}, {&(0x7f00000007c0)="cd72eca63713ca8a35c3557b7d56b6a3073ca69e2067c18f5120c05d4ee8", 0x1e, 0x6}], 0x1, &(0x7f0000000a80)={[{@barrier='barrier'}, {@gid={'gid'}}, {@nodecompose='nodecompose'}, {@uid={'uid'}}, {@type={'type', 0x3d, "ae8c9d8f"}}, {@decompose='decompose'}, {@session={'session', 0x3d, 0x25}}], [{@uid_eq={'uid'}}, {@obj_type={'obj_type', 0x3d, 'overlay\x00'}}, {@euid_eq={'euid'}}, {@uid_eq={'uid'}}]}) [ 276.649132][T11299] hfsplus: unable to parse mount options [ 276.668091][T11301] hfsplus: unable to parse mount options [ 276.784323][T11305] overlayfs: unrecognized mount option "uppFrdir=./file0" or missing value [ 276.856974][T11309] hfsplus: unable to parse mount options 11:46:41 executing program 4: r0 = socket$netlink(0x10, 0x3, 0xf) bind$netlink(r0, &(0x7f0000514ff4)={0x10, 0x0, 0x0, 0x2ffffffff}, 0xc) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000000), 0x4) setsockopt$netlink_NETLINK_BROADCAST_ERROR(r0, 0x10e, 0x4, &(0x7f0000000080), 0x4) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)={0x14, 0x23, 0x1, 0x0, 0x0, {0x20000000004, 0xe00000000000000}}, 0x14}}, 0x0) 11:46:41 executing program 1: setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) setsockopt$netlink_NETLINK_BROADCAST_ERROR(0xffffffffffffffff, 0x10e, 0x4, 0x0, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000100)={0x0, 0x6, &(0x7f00000001c0)={&(0x7f0000000040)={0x14, 0x23, 0x1, 0x0, 0x0, {0x20000000004, 0xe00000000000000}}, 0x14}}, 0x0) 11:46:41 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000140)='hfsplus\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000a80)={[{@barrier='barrier'}, {@type={'type', 0x3d, "ae8c9d8f"}}], [{@uid_eq={'uid'}}, {@obj_type={'obj_type', 0x3d, 'overlay\x00'}}, {@euid_eq={'euid'}}, {@uid_eq={'uid'}}]}) 11:46:41 executing program 0: syz_mount_image$hfsplus(&(0x7f0000000140)='hfsplus\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x1, &(0x7f0000000a80)={[{@barrier='barrier'}, {@gid={'gid'}}, {@nodecompose='nodecompose'}, {@uid={'uid'}}, {@type={'type', 0x3d, "ae8c9d8f"}}, {@decompose='decompose'}, {@session={'session', 0x3d, 0x25}}], [{@uid_eq={'uid'}}, {@obj_type={'obj_type', 0x3d, 'overlay\x00'}}, {@euid_eq={'euid'}}, {@uid_eq={'uid'}}]}) 11:46:42 executing program 5: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='devtmpfs\x00', 0x0, 0x0) chdir(&(0x7f00000000c0)='./file0\x00') pipe(0x0) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mkdir(0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$overlay(0x40000f, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="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"]) syz_mount_image$hfsplus(&(0x7f0000000140)='hfsplus\x00', &(0x7f0000000200)='./file0\x00', 0x3, 0x7, &(0x7f0000000800)=[{&(0x7f0000000400)="e1ec051c0b7b96db7480b4620be1f7d4adcb21d5233a3d23bf43659e5359470de231dd734b698cd71201837ca57f911328e1aee6b2cb39533b2d549e", 0x3c, 0x101}, {&(0x7f0000000440)="dbac23926131781587488e056e40b191269651683d0d195cbd63543040e313e20126fd634002e0256fed786d07054466250e2de6b7fb6d7d8d5201ac1478ef26aafeae7947832c4cc7fea6315e92eb81c89a385dae378bf89ca53c6984b5aa79a7dcc139938fa64b30d7c24ff7b215c890be5756df2f441d0fcb938cb4c1f89245a47c630a2b5e28bb7b5a9c8c871c45857bc4fa646b30f485beccdf529ad0cd519a0bed9b5c7df28320d9ad7eceb30eda6c964cfcab57c8aa98b89d582792b886e41c9f6146332e31f93b", 0xcb, 0x1ff}, {&(0x7f0000000540)="5c96cd9925cbe6753ba234c06f8040f650bba8d4d4ebe59964acf97c49f7a5e793521ef728d90a4eb42cbe7a2536c6922f049b20f2c681c652b4dbe077b0a9972e1eeb5573d7ee69d6fc99d4e4894537fac772842763140c5d832bf593a5cc290fd0c641d14d06e564127871808073fb6fd27f2a9995b29abce9351b0b285f4887f1cc8de04d147141af2ed66cfb66fd230e329273710457efc72a8d09487b5c83e77201b28eb38d7d3846b63b1bf1233b5c925303dd3214066c99381b0457a62397c7df27f88e19a884e1dfa6", 0xcd, 0x6}, {&(0x7f0000000640)="8ae3f201063e83beadb088cb1080ef67", 0x10, 0x2a}, {&(0x7f0000000680)="dfeed81fb09a8a0d55f0999ce7730866db77fa306b896464e4d9cf133371563c7eb734eed8ec2dda58c030b96771bb708fba592614b985c573e8f3db424553c6", 0x40, 0x4}, {&(0x7f00000006c0)="f33dec9b5d96888f1504b1385ce82fdf8f2fa76ecc6ebf567753242a4c9129cd4c4885ba8bab1fd3120749889c981acccb344645e9d1ce95826ab7ceac8b7646d2e476e8934ac444aad3bba14f0d4be15675cd3d336db510c72ebbc07a000754d66f5282b1f241556cbd63a30b3d6af0f5c8a2443b03a92bb406abbb5f630ce1ef2afbba93c29e6bc46901a91ea9d91fa6048a468df5934437ca7e9e2a4fe38fddcd2aecac9406aa7adf5de93082ebf1b5c74d76b7b1b72a9b6fea1c5ab7cc1f3e97b5d7e1db9a64df9836ce0863cda956a1e2a45b9479b8ade23e81258e9444dfbf8066562f79", 0xe7, 0x7}, {&(0x7f00000007c0)="cd72eca63713ca8a35c3557b7d56b6a3073ca69e2067c18f5120c05d4ee8", 0x1e, 0x6}], 0x1, &(0x7f0000000a80)={[{@barrier='barrier'}, {@gid={'gid'}}, {@nodecompose='nodecompose'}, {@uid={'uid'}}, {@type={'type', 0x3d, "ae8c9d8f"}}, {@decompose='decompose'}, {@session={'session', 0x3d, 0x25}}], [{@uid_eq={'uid'}}, {@obj_type={'obj_type', 0x3d, 'overlay\x00'}}, {@euid_eq={'euid'}}, {@uid_eq={'uid'}}]}) [ 277.100411][T11308] IPVS: ftp: loaded support on port[0] = 21 [ 277.174923][T11329] hfsplus: unable to parse mount options [ 277.218521][T11331] hfsplus: unable to parse mount options 11:46:42 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000140)='hfsplus\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000a80)={[{@barrier='barrier'}, {@type={'type', 0x3d, "ae8c9d8f"}}], [{@uid_eq={'uid'}}, {@obj_type={'obj_type', 0x3d, 'overlay\x00'}}, {@euid_eq={'euid'}}, {@uid_eq={'uid'}}]}) [ 277.344752][T11337] overlayfs: unrecognized mount option "uppFrdir=./file0" or missing value [ 277.423209][T11338] hfsplus: unable to parse mount options [ 277.534561][T11345] hfsplus: unable to parse mount options 11:46:42 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_FSGETXATTR(0xffffffffffffffff, 0x8004550f, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x1}, 0x10) connect$netrom(0xffffffffffffffff, &(0x7f0000000000)={{0x6, @rose}, [@rose, @rose, @default, @netrom, @bcast, @rose, @rose, @null]}, 0x48) r0 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000080)='/dev/qat_adf_ctl\x00', 0x8200, 0x0) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, &(0x7f00000000c0)={&(0x7f0000ffc000/0x4000)=nil, 0x4000}, &(0x7f0000000140)=0x10) listen(0xffffffffffffffff, 0x0) unshare(0x40000000) setrlimit(0x0, 0x0) r1 = accept(0xffffffffffffffff, 0x0, 0x0) write$binfmt_elf64(r1, &(0x7f00000002c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x9, 0x8, 0x0, 0x0, 0x0, 0x4825483b35c83c0b, 0x0, 0x0, 0x40, 0x227}, [{0x4, 0x1, 0xfff, 0x0, 0x0, 0xff8000000002, 0x0, 0x7fff}], "", [[], [], []]}, 0x378) 11:46:42 executing program 4: r0 = socket$netlink(0x10, 0x3, 0xf) bind$netlink(r0, &(0x7f0000514ff4)={0x10, 0x0, 0x0, 0x2ffffffff}, 0xc) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000000), 0x4) setsockopt$netlink_NETLINK_BROADCAST_ERROR(r0, 0x10e, 0x4, &(0x7f0000000080), 0x4) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)={0x14, 0x23, 0x1, 0x0, 0x0, {0x20000000004, 0xe00000000000000}}, 0x14}}, 0x0) 11:46:42 executing program 1: setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) setsockopt$netlink_NETLINK_BROADCAST_ERROR(0xffffffffffffffff, 0x10e, 0x4, 0x0, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000100)={0x0, 0x7, &(0x7f00000001c0)={&(0x7f0000000040)={0x14, 0x23, 0x1, 0x0, 0x0, {0x20000000004, 0xe00000000000000}}, 0x14}}, 0x0) 11:46:42 executing program 0: syz_mount_image$hfsplus(&(0x7f0000000140)='hfsplus\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000a80)={[{@barrier='barrier'}, {@gid={'gid'}}, {@nodecompose='nodecompose'}, {@uid={'uid'}}, {@type={'type', 0x3d, "ae8c9d8f"}}, {@decompose='decompose'}, {@session={'session', 0x3d, 0x25}}], [{@uid_eq={'uid'}}, {@obj_type={'obj_type', 0x3d, 'overlay\x00'}}, {@euid_eq={'euid'}}, {@uid_eq={'uid'}}]}) 11:46:42 executing program 5: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='devtmpfs\x00', 0x0, 0x0) chdir(&(0x7f00000000c0)='./file0\x00') pipe(0x0) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mkdir(0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$hfsplus(&(0x7f0000000140)='hfsplus\x00', &(0x7f0000000200)='./file0\x00', 0x3, 0x7, &(0x7f0000000800)=[{&(0x7f0000000400)="e1ec051c0b7b96db7480b4620be1f7d4adcb21d5233a3d23bf43659e5359470de231dd734b698cd71201837ca57f911328e1aee6b2cb39533b2d549e", 0x3c, 0x101}, {&(0x7f0000000440)="dbac23926131781587488e056e40b191269651683d0d195cbd63543040e313e20126fd634002e0256fed786d07054466250e2de6b7fb6d7d8d5201ac1478ef26aafeae7947832c4cc7fea6315e92eb81c89a385dae378bf89ca53c6984b5aa79a7dcc139938fa64b30d7c24ff7b215c890be5756df2f441d0fcb938cb4c1f89245a47c630a2b5e28bb7b5a9c8c871c45857bc4fa646b30f485beccdf529ad0cd519a0bed9b5c7df28320d9ad7eceb30eda6c964cfcab57c8aa98b89d582792b886e41c9f6146332e31f93b", 0xcb, 0x1ff}, {&(0x7f0000000540)="5c96cd9925cbe6753ba234c06f8040f650bba8d4d4ebe59964acf97c49f7a5e793521ef728d90a4eb42cbe7a2536c6922f049b20f2c681c652b4dbe077b0a9972e1eeb5573d7ee69d6fc99d4e4894537fac772842763140c5d832bf593a5cc290fd0c641d14d06e564127871808073fb6fd27f2a9995b29abce9351b0b285f4887f1cc8de04d147141af2ed66cfb66fd230e329273710457efc72a8d09487b5c83e77201b28eb38d7d3846b63b1bf1233b5c925303dd3214066c99381b0457a62397c7df27f88e19a884e1dfa6", 0xcd, 0x6}, {&(0x7f0000000640)="8ae3f201063e83beadb088cb1080ef67", 0x10, 0x2a}, {&(0x7f0000000680)="dfeed81fb09a8a0d55f0999ce7730866db77fa306b896464e4d9cf133371563c7eb734eed8ec2dda58c030b96771bb708fba592614b985c573e8f3db424553c6", 0x40, 0x4}, {&(0x7f00000006c0)="f33dec9b5d96888f1504b1385ce82fdf8f2fa76ecc6ebf567753242a4c9129cd4c4885ba8bab1fd3120749889c981acccb344645e9d1ce95826ab7ceac8b7646d2e476e8934ac444aad3bba14f0d4be15675cd3d336db510c72ebbc07a000754d66f5282b1f241556cbd63a30b3d6af0f5c8a2443b03a92bb406abbb5f630ce1ef2afbba93c29e6bc46901a91ea9d91fa6048a468df5934437ca7e9e2a4fe38fddcd2aecac9406aa7adf5de93082ebf1b5c74d76b7b1b72a9b6fea1c5ab7cc1f3e97b5d7e1db9a64df9836ce0863cda956a1e2a45b9479b8ade23e81258e9444dfbf8066562f79", 0xe7, 0x7}, {&(0x7f00000007c0)="cd72eca63713ca8a35c3557b7d56b6a3073ca69e2067c18f5120c05d4ee8", 0x1e, 0x6}], 0x1, &(0x7f0000000a80)={[{@barrier='barrier'}, {@gid={'gid'}}, {@nodecompose='nodecompose'}, {@uid={'uid'}}, {@type={'type', 0x3d, "ae8c9d8f"}}, {@decompose='decompose'}, {@session={'session', 0x3d, 0x25}}], [{@uid_eq={'uid'}}, {@obj_type={'obj_type', 0x3d, 'overlay\x00'}}, {@euid_eq={'euid'}}, {@uid_eq={'uid'}}]}) 11:46:42 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000140)='hfsplus\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000a80)={[{@gid={'gid'}}, {@type={'type', 0x3d, "ae8c9d8f"}}], [{@uid_eq={'uid'}}, {@obj_type={'obj_type', 0x3d, 'overlay\x00'}}, {@euid_eq={'euid'}}, {@uid_eq={'uid'}}]}) [ 277.768706][T11359] hfsplus: unable to parse mount options 11:46:42 executing program 0: syz_mount_image$hfsplus(&(0x7f0000000140)='hfsplus\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) [ 277.871394][T11361] hfsplus: unable to parse mount options 11:46:42 executing program 1: setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) setsockopt$netlink_NETLINK_BROADCAST_ERROR(0xffffffffffffffff, 0x10e, 0x4, 0x0, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000100)={0x0, 0x8, &(0x7f00000001c0)={&(0x7f0000000040)={0x14, 0x23, 0x1, 0x0, 0x0, {0x20000000004, 0xe00000000000000}}, 0x14}}, 0x0) 11:46:42 executing program 4: r0 = socket$netlink(0x10, 0x3, 0xf) bind$netlink(r0, &(0x7f0000514ff4)={0x10, 0x0, 0x0, 0x2ffffffff}, 0xc) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000000), 0x4) setsockopt$netlink_NETLINK_BROADCAST_ERROR(r0, 0x10e, 0x4, &(0x7f0000000080), 0x4) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)={0x14, 0x23, 0x1, 0x0, 0x0, {0x20000000004, 0xe00000000000000}}, 0x14}}, 0x0) [ 278.006876][T11371] hfsplus: unable to parse mount options [ 278.041619][T11375] hfsplus: unable to find HFS+ superblock 11:46:43 executing program 5: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='devtmpfs\x00', 0x0, 0x0) chdir(&(0x7f00000000c0)='./file0\x00') pipe(0x0) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mkdir(0x0, 0x0) syz_mount_image$hfsplus(&(0x7f0000000140)='hfsplus\x00', &(0x7f0000000200)='./file0\x00', 0x3, 0x7, &(0x7f0000000800)=[{&(0x7f0000000400)="e1ec051c0b7b96db7480b4620be1f7d4adcb21d5233a3d23bf43659e5359470de231dd734b698cd71201837ca57f911328e1aee6b2cb39533b2d549e", 0x3c, 0x101}, {&(0x7f0000000440)="dbac23926131781587488e056e40b191269651683d0d195cbd63543040e313e20126fd634002e0256fed786d07054466250e2de6b7fb6d7d8d5201ac1478ef26aafeae7947832c4cc7fea6315e92eb81c89a385dae378bf89ca53c6984b5aa79a7dcc139938fa64b30d7c24ff7b215c890be5756df2f441d0fcb938cb4c1f89245a47c630a2b5e28bb7b5a9c8c871c45857bc4fa646b30f485beccdf529ad0cd519a0bed9b5c7df28320d9ad7eceb30eda6c964cfcab57c8aa98b89d582792b886e41c9f6146332e31f93b", 0xcb, 0x1ff}, {&(0x7f0000000540)="5c96cd9925cbe6753ba234c06f8040f650bba8d4d4ebe59964acf97c49f7a5e793521ef728d90a4eb42cbe7a2536c6922f049b20f2c681c652b4dbe077b0a9972e1eeb5573d7ee69d6fc99d4e4894537fac772842763140c5d832bf593a5cc290fd0c641d14d06e564127871808073fb6fd27f2a9995b29abce9351b0b285f4887f1cc8de04d147141af2ed66cfb66fd230e329273710457efc72a8d09487b5c83e77201b28eb38d7d3846b63b1bf1233b5c925303dd3214066c99381b0457a62397c7df27f88e19a884e1dfa6", 0xcd, 0x6}, {&(0x7f0000000640)="8ae3f201063e83beadb088cb1080ef67", 0x10, 0x2a}, {&(0x7f0000000680)="dfeed81fb09a8a0d55f0999ce7730866db77fa306b896464e4d9cf133371563c7eb734eed8ec2dda58c030b96771bb708fba592614b985c573e8f3db424553c6", 0x40, 0x4}, {&(0x7f00000006c0)="f33dec9b5d96888f1504b1385ce82fdf8f2fa76ecc6ebf567753242a4c9129cd4c4885ba8bab1fd3120749889c981acccb344645e9d1ce95826ab7ceac8b7646d2e476e8934ac444aad3bba14f0d4be15675cd3d336db510c72ebbc07a000754d66f5282b1f241556cbd63a30b3d6af0f5c8a2443b03a92bb406abbb5f630ce1ef2afbba93c29e6bc46901a91ea9d91fa6048a468df5934437ca7e9e2a4fe38fddcd2aecac9406aa7adf5de93082ebf1b5c74d76b7b1b72a9b6fea1c5ab7cc1f3e97b5d7e1db9a64df9836ce0863cda956a1e2a45b9479b8ade23e81258e9444dfbf8066562f79", 0xe7, 0x7}, {&(0x7f00000007c0)="cd72eca63713ca8a35c3557b7d56b6a3073ca69e2067c18f5120c05d4ee8", 0x1e, 0x6}], 0x1, &(0x7f0000000a80)={[{@barrier='barrier'}, {@gid={'gid'}}, {@nodecompose='nodecompose'}, {@uid={'uid'}}, {@type={'type', 0x3d, "ae8c9d8f"}}, {@decompose='decompose'}, {@session={'session', 0x3d, 0x25}}], [{@uid_eq={'uid'}}, {@obj_type={'obj_type', 0x3d, 'overlay\x00'}}, {@euid_eq={'euid'}}, {@uid_eq={'uid'}}]}) [ 278.083457][T11366] IPVS: ftp: loaded support on port[0] = 21 11:46:43 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000140)='hfsplus\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000a80)={[{@gid={'gid'}}, {@type={'type', 0x3d, "ae8c9d8f"}}], [{@uid_eq={'uid'}}, {@obj_type={'obj_type', 0x3d, 'overlay\x00'}}, {@euid_eq={'euid'}}, {@uid_eq={'uid'}}]}) 11:46:43 executing program 0: syz_mount_image$hfsplus(&(0x7f0000000140)='hfsplus\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) [ 278.341396][T11387] hfsplus: unable to parse mount options [ 278.492726][T11395] hfsplus: unable to parse mount options [ 278.617169][T11400] hfsplus: unable to find HFS+ superblock 11:46:43 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_FSGETXATTR(0xffffffffffffffff, 0x8004550f, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x1}, 0x10) connect$netrom(0xffffffffffffffff, &(0x7f0000000000)={{0x6, @rose}, [@rose, @rose, @default, @netrom, @bcast, @rose, @rose, @null]}, 0x48) r0 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000080)='/dev/qat_adf_ctl\x00', 0x8200, 0x0) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, &(0x7f00000000c0)={&(0x7f0000ffc000/0x4000)=nil, 0x4000}, &(0x7f0000000140)=0x10) listen(0xffffffffffffffff, 0x0) unshare(0x40000000) setrlimit(0x0, 0x0) r1 = accept(0xffffffffffffffff, 0x0, 0x0) write$binfmt_elf64(r1, &(0x7f00000002c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x9, 0x8, 0x0, 0x0, 0x0, 0x4825483b35c83c0b, 0x0, 0x0, 0x40, 0x227}, [{0x4, 0x1, 0xfff, 0x0, 0x0, 0xff8000000002, 0x0, 0x7fff}], "", [[], [], []]}, 0x378) 11:46:43 executing program 1: setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) setsockopt$netlink_NETLINK_BROADCAST_ERROR(0xffffffffffffffff, 0x10e, 0x4, 0x0, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000100)={0x0, 0x9, &(0x7f00000001c0)={&(0x7f0000000040)={0x14, 0x23, 0x1, 0x0, 0x0, {0x20000000004, 0xe00000000000000}}, 0x14}}, 0x0) 11:46:43 executing program 5: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='devtmpfs\x00', 0x0, 0x0) chdir(&(0x7f00000000c0)='./file0\x00') pipe(0x0) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) syz_mount_image$hfsplus(&(0x7f0000000140)='hfsplus\x00', &(0x7f0000000200)='./file0\x00', 0x3, 0x7, &(0x7f0000000800)=[{&(0x7f0000000400)="e1ec051c0b7b96db7480b4620be1f7d4adcb21d5233a3d23bf43659e5359470de231dd734b698cd71201837ca57f911328e1aee6b2cb39533b2d549e", 0x3c, 0x101}, {&(0x7f0000000440)="dbac23926131781587488e056e40b191269651683d0d195cbd63543040e313e20126fd634002e0256fed786d07054466250e2de6b7fb6d7d8d5201ac1478ef26aafeae7947832c4cc7fea6315e92eb81c89a385dae378bf89ca53c6984b5aa79a7dcc139938fa64b30d7c24ff7b215c890be5756df2f441d0fcb938cb4c1f89245a47c630a2b5e28bb7b5a9c8c871c45857bc4fa646b30f485beccdf529ad0cd519a0bed9b5c7df28320d9ad7eceb30eda6c964cfcab57c8aa98b89d582792b886e41c9f6146332e31f93b", 0xcb, 0x1ff}, {&(0x7f0000000540)="5c96cd9925cbe6753ba234c06f8040f650bba8d4d4ebe59964acf97c49f7a5e793521ef728d90a4eb42cbe7a2536c6922f049b20f2c681c652b4dbe077b0a9972e1eeb5573d7ee69d6fc99d4e4894537fac772842763140c5d832bf593a5cc290fd0c641d14d06e564127871808073fb6fd27f2a9995b29abce9351b0b285f4887f1cc8de04d147141af2ed66cfb66fd230e329273710457efc72a8d09487b5c83e77201b28eb38d7d3846b63b1bf1233b5c925303dd3214066c99381b0457a62397c7df27f88e19a884e1dfa6", 0xcd, 0x6}, {&(0x7f0000000640)="8ae3f201063e83beadb088cb1080ef67", 0x10, 0x2a}, {&(0x7f0000000680)="dfeed81fb09a8a0d55f0999ce7730866db77fa306b896464e4d9cf133371563c7eb734eed8ec2dda58c030b96771bb708fba592614b985c573e8f3db424553c6", 0x40, 0x4}, {&(0x7f00000006c0)="f33dec9b5d96888f1504b1385ce82fdf8f2fa76ecc6ebf567753242a4c9129cd4c4885ba8bab1fd3120749889c981acccb344645e9d1ce95826ab7ceac8b7646d2e476e8934ac444aad3bba14f0d4be15675cd3d336db510c72ebbc07a000754d66f5282b1f241556cbd63a30b3d6af0f5c8a2443b03a92bb406abbb5f630ce1ef2afbba93c29e6bc46901a91ea9d91fa6048a468df5934437ca7e9e2a4fe38fddcd2aecac9406aa7adf5de93082ebf1b5c74d76b7b1b72a9b6fea1c5ab7cc1f3e97b5d7e1db9a64df9836ce0863cda956a1e2a45b9479b8ade23e81258e9444dfbf8066562f79", 0xe7, 0x7}, {&(0x7f00000007c0)="cd72eca63713ca8a35c3557b7d56b6a3073ca69e2067c18f5120c05d4ee8", 0x1e, 0x6}], 0x1, &(0x7f0000000a80)={[{@barrier='barrier'}, {@gid={'gid'}}, {@nodecompose='nodecompose'}, {@uid={'uid'}}, {@type={'type', 0x3d, "ae8c9d8f"}}, {@decompose='decompose'}, {@session={'session', 0x3d, 0x25}}], [{@uid_eq={'uid'}}, {@obj_type={'obj_type', 0x3d, 'overlay\x00'}}, {@euid_eq={'euid'}}, {@uid_eq={'uid'}}]}) 11:46:43 executing program 4: r0 = socket$netlink(0x10, 0x3, 0xf) bind$netlink(r0, &(0x7f0000514ff4)={0x10, 0x0, 0x0, 0x2ffffffff}, 0xc) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000000), 0x4) setsockopt$netlink_NETLINK_BROADCAST_ERROR(r0, 0x10e, 0x4, &(0x7f0000000080)=0x6, 0x4) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)={0x14, 0x23, 0x1, 0x0, 0x0, {0x20000000004, 0xe00000000000000}}, 0x14}}, 0x0) 11:46:43 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000140)='hfsplus\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000a80)={[{@gid={'gid'}}, {@type={'type', 0x3d, "ae8c9d8f"}}], [{@uid_eq={'uid'}}, {@obj_type={'obj_type', 0x3d, 'overlay\x00'}}, {@euid_eq={'euid'}}, {@uid_eq={'uid'}}]}) 11:46:43 executing program 0: syz_mount_image$hfsplus(&(0x7f0000000140)='hfsplus\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 11:46:43 executing program 4: r0 = socket$netlink(0x10, 0x3, 0xf) bind$netlink(r0, &(0x7f0000514ff4)={0x10, 0x0, 0x0, 0x2ffffffff}, 0xc) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000000), 0x4) setsockopt$netlink_NETLINK_BROADCAST_ERROR(r0, 0x10e, 0x4, &(0x7f0000000080)=0x6, 0x4) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)={0x14, 0x23, 0x1, 0x0, 0x0, {0x20000000004, 0xe00000000000000}}, 0x14}}, 0x0) [ 278.867368][T11415] hfsplus: unable to parse mount options [ 278.947152][T11418] hfsplus: unable to find HFS+ superblock [ 278.957534][T11412] hfsplus: unable to parse mount options 11:46:44 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000140)='hfsplus\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000a80)={[{@barrier='barrier'}, {@gid={'gid'}}, {@type={'type', 0x3d, "ae8c9d8f"}}], [{@uid_eq={'uid'}}, {@obj_type={'obj_type', 0x3d, 'overlay\x00'}}, {@euid_eq={'euid'}}]}) 11:46:44 executing program 0: syz_mount_image$hfsplus(&(0x7f0000000140)='hfsplus\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000a80)={[{@barrier='barrier'}, {@gid={'gid'}}, {@nodecompose='nodecompose'}, {@uid={'uid'}}, {@type={'type', 0x3d, "ae8c9d8f"}}, {@decompose='decompose'}], [{@uid_eq={'uid'}}, {@obj_type={'obj_type', 0x3d, 'overlay\x00'}}, {@euid_eq={'euid'}}, {@uid_eq={'uid'}}]}) 11:46:44 executing program 5: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='devtmpfs\x00', 0x0, 0x0) chdir(&(0x7f00000000c0)='./file0\x00') pipe(0x0) syz_mount_image$hfsplus(&(0x7f0000000140)='hfsplus\x00', &(0x7f0000000200)='./file0\x00', 0x3, 0x7, &(0x7f0000000800)=[{&(0x7f0000000400)="e1ec051c0b7b96db7480b4620be1f7d4adcb21d5233a3d23bf43659e5359470de231dd734b698cd71201837ca57f911328e1aee6b2cb39533b2d549e", 0x3c, 0x101}, {&(0x7f0000000440)="dbac23926131781587488e056e40b191269651683d0d195cbd63543040e313e20126fd634002e0256fed786d07054466250e2de6b7fb6d7d8d5201ac1478ef26aafeae7947832c4cc7fea6315e92eb81c89a385dae378bf89ca53c6984b5aa79a7dcc139938fa64b30d7c24ff7b215c890be5756df2f441d0fcb938cb4c1f89245a47c630a2b5e28bb7b5a9c8c871c45857bc4fa646b30f485beccdf529ad0cd519a0bed9b5c7df28320d9ad7eceb30eda6c964cfcab57c8aa98b89d582792b886e41c9f6146332e31f93b", 0xcb, 0x1ff}, {&(0x7f0000000540)="5c96cd9925cbe6753ba234c06f8040f650bba8d4d4ebe59964acf97c49f7a5e793521ef728d90a4eb42cbe7a2536c6922f049b20f2c681c652b4dbe077b0a9972e1eeb5573d7ee69d6fc99d4e4894537fac772842763140c5d832bf593a5cc290fd0c641d14d06e564127871808073fb6fd27f2a9995b29abce9351b0b285f4887f1cc8de04d147141af2ed66cfb66fd230e329273710457efc72a8d09487b5c83e77201b28eb38d7d3846b63b1bf1233b5c925303dd3214066c99381b0457a62397c7df27f88e19a884e1dfa6", 0xcd, 0x6}, {&(0x7f0000000640)="8ae3f201063e83beadb088cb1080ef67", 0x10, 0x2a}, {&(0x7f0000000680)="dfeed81fb09a8a0d55f0999ce7730866db77fa306b896464e4d9cf133371563c7eb734eed8ec2dda58c030b96771bb708fba592614b985c573e8f3db424553c6", 0x40, 0x4}, {&(0x7f00000006c0)="f33dec9b5d96888f1504b1385ce82fdf8f2fa76ecc6ebf567753242a4c9129cd4c4885ba8bab1fd3120749889c981acccb344645e9d1ce95826ab7ceac8b7646d2e476e8934ac444aad3bba14f0d4be15675cd3d336db510c72ebbc07a000754d66f5282b1f241556cbd63a30b3d6af0f5c8a2443b03a92bb406abbb5f630ce1ef2afbba93c29e6bc46901a91ea9d91fa6048a468df5934437ca7e9e2a4fe38fddcd2aecac9406aa7adf5de93082ebf1b5c74d76b7b1b72a9b6fea1c5ab7cc1f3e97b5d7e1db9a64df9836ce0863cda956a1e2a45b9479b8ade23e81258e9444dfbf8066562f79", 0xe7, 0x7}, {&(0x7f00000007c0)="cd72eca63713ca8a35c3557b7d56b6a3073ca69e2067c18f5120c05d4ee8", 0x1e, 0x6}], 0x1, &(0x7f0000000a80)={[{@barrier='barrier'}, {@gid={'gid'}}, {@nodecompose='nodecompose'}, {@uid={'uid'}}, {@type={'type', 0x3d, "ae8c9d8f"}}, {@decompose='decompose'}, {@session={'session', 0x3d, 0x25}}], [{@uid_eq={'uid'}}, {@obj_type={'obj_type', 0x3d, 'overlay\x00'}}, {@euid_eq={'euid'}}, {@uid_eq={'uid'}}]}) 11:46:44 executing program 1: setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) setsockopt$netlink_NETLINK_BROADCAST_ERROR(0xffffffffffffffff, 0x10e, 0x4, 0x0, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000100)={0x0, 0xa, &(0x7f00000001c0)={&(0x7f0000000040)={0x14, 0x23, 0x1, 0x0, 0x0, {0x20000000004, 0xe00000000000000}}, 0x14}}, 0x0) 11:46:44 executing program 4: r0 = socket$netlink(0x10, 0x3, 0xf) bind$netlink(r0, &(0x7f0000514ff4)={0x10, 0x0, 0x0, 0x2ffffffff}, 0xc) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000000), 0x4) setsockopt$netlink_NETLINK_BROADCAST_ERROR(r0, 0x10e, 0x4, &(0x7f0000000080)=0x6, 0x4) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)={0x14, 0x23, 0x1, 0x0, 0x0, {0x20000000004, 0xe00000000000000}}, 0x14}}, 0x0) [ 279.205192][T11422] IPVS: ftp: loaded support on port[0] = 21 [ 279.241741][T11439] hfsplus: unable to parse mount options [ 279.268345][T11438] hfsplus: unable to parse mount options [ 279.437701][T11449] hfsplus: unable to parse mount options 11:46:44 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_FSGETXATTR(0xffffffffffffffff, 0x8004550f, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x1}, 0x10) connect$netrom(0xffffffffffffffff, &(0x7f0000000000)={{0x6, @rose}, [@rose, @rose, @default, @netrom, @bcast, @rose, @rose, @null]}, 0x48) r0 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000080)='/dev/qat_adf_ctl\x00', 0x8200, 0x0) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, &(0x7f00000000c0)={&(0x7f0000ffc000/0x4000)=nil, 0x4000}, &(0x7f0000000140)=0x10) listen(0xffffffffffffffff, 0x0) unshare(0x40000000) setrlimit(0x0, 0x0) r1 = accept(0xffffffffffffffff, 0x0, 0x0) write$binfmt_elf64(r1, &(0x7f00000002c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x9, 0x8, 0x0, 0x0, 0x0, 0x4825483b35c83c0b, 0x0, 0x0, 0x40, 0x227}, [{0x4, 0x1, 0xfff, 0x0, 0x0, 0xff8000000002, 0x0, 0x7fff}], "", [[], [], []]}, 0x378) 11:46:44 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000140)='hfsplus\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000a80)={[{@barrier='barrier'}, {@gid={'gid'}}, {@type={'type', 0x3d, "ae8c9d8f"}}], [{@uid_eq={'uid'}}, {@obj_type={'obj_type', 0x3d, 'overlay\x00'}}]}) 11:46:44 executing program 0: syz_mount_image$hfsplus(&(0x7f0000000140)='hfsplus\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000a80)={[{@barrier='barrier'}, {@gid={'gid'}}, {@nodecompose='nodecompose'}, {@uid={'uid'}}, {@type={'type', 0x3d, "ae8c9d8f"}}], [{@uid_eq={'uid'}}, {@obj_type={'obj_type', 0x3d, 'overlay\x00'}}, {@euid_eq={'euid'}}, {@uid_eq={'uid'}}]}) 11:46:44 executing program 4: r0 = socket$netlink(0x10, 0x3, 0xf) bind$netlink(r0, &(0x7f0000514ff4)={0x10, 0x0, 0x0, 0x2ffffffff}, 0xc) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000000), 0x4) setsockopt$netlink_NETLINK_BROADCAST_ERROR(r0, 0x10e, 0x4, &(0x7f0000000080)=0x6, 0x4) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, 0x0, 0x0) 11:46:44 executing program 5: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='devtmpfs\x00', 0x0, 0x0) chdir(&(0x7f00000000c0)='./file0\x00') syz_mount_image$hfsplus(&(0x7f0000000140)='hfsplus\x00', &(0x7f0000000200)='./file0\x00', 0x3, 0x7, &(0x7f0000000800)=[{&(0x7f0000000400)="e1ec051c0b7b96db7480b4620be1f7d4adcb21d5233a3d23bf43659e5359470de231dd734b698cd71201837ca57f911328e1aee6b2cb39533b2d549e", 0x3c, 0x101}, {&(0x7f0000000440)="dbac23926131781587488e056e40b191269651683d0d195cbd63543040e313e20126fd634002e0256fed786d07054466250e2de6b7fb6d7d8d5201ac1478ef26aafeae7947832c4cc7fea6315e92eb81c89a385dae378bf89ca53c6984b5aa79a7dcc139938fa64b30d7c24ff7b215c890be5756df2f441d0fcb938cb4c1f89245a47c630a2b5e28bb7b5a9c8c871c45857bc4fa646b30f485beccdf529ad0cd519a0bed9b5c7df28320d9ad7eceb30eda6c964cfcab57c8aa98b89d582792b886e41c9f6146332e31f93b", 0xcb, 0x1ff}, {&(0x7f0000000540)="5c96cd9925cbe6753ba234c06f8040f650bba8d4d4ebe59964acf97c49f7a5e793521ef728d90a4eb42cbe7a2536c6922f049b20f2c681c652b4dbe077b0a9972e1eeb5573d7ee69d6fc99d4e4894537fac772842763140c5d832bf593a5cc290fd0c641d14d06e564127871808073fb6fd27f2a9995b29abce9351b0b285f4887f1cc8de04d147141af2ed66cfb66fd230e329273710457efc72a8d09487b5c83e77201b28eb38d7d3846b63b1bf1233b5c925303dd3214066c99381b0457a62397c7df27f88e19a884e1dfa6", 0xcd, 0x6}, {&(0x7f0000000640)="8ae3f201063e83beadb088cb1080ef67", 0x10, 0x2a}, {&(0x7f0000000680)="dfeed81fb09a8a0d55f0999ce7730866db77fa306b896464e4d9cf133371563c7eb734eed8ec2dda58c030b96771bb708fba592614b985c573e8f3db424553c6", 0x40, 0x4}, {&(0x7f00000006c0)="f33dec9b5d96888f1504b1385ce82fdf8f2fa76ecc6ebf567753242a4c9129cd4c4885ba8bab1fd3120749889c981acccb344645e9d1ce95826ab7ceac8b7646d2e476e8934ac444aad3bba14f0d4be15675cd3d336db510c72ebbc07a000754d66f5282b1f241556cbd63a30b3d6af0f5c8a2443b03a92bb406abbb5f630ce1ef2afbba93c29e6bc46901a91ea9d91fa6048a468df5934437ca7e9e2a4fe38fddcd2aecac9406aa7adf5de93082ebf1b5c74d76b7b1b72a9b6fea1c5ab7cc1f3e97b5d7e1db9a64df9836ce0863cda956a1e2a45b9479b8ade23e81258e9444dfbf8066562f79", 0xe7, 0x7}, {&(0x7f00000007c0)="cd72eca63713ca8a35c3557b7d56b6a3073ca69e2067c18f5120c05d4ee8", 0x1e, 0x6}], 0x1, &(0x7f0000000a80)={[{@barrier='barrier'}, {@gid={'gid'}}, {@nodecompose='nodecompose'}, {@uid={'uid'}}, {@type={'type', 0x3d, "ae8c9d8f"}}, {@decompose='decompose'}, {@session={'session', 0x3d, 0x25}}], [{@uid_eq={'uid'}}, {@obj_type={'obj_type', 0x3d, 'overlay\x00'}}, {@euid_eq={'euid'}}, {@uid_eq={'uid'}}]}) 11:46:44 executing program 1: setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) setsockopt$netlink_NETLINK_BROADCAST_ERROR(0xffffffffffffffff, 0x10e, 0x4, 0x0, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000100)={0x0, 0xb, &(0x7f00000001c0)={&(0x7f0000000040)={0x14, 0x23, 0x1, 0x0, 0x0, {0x20000000004, 0xe00000000000000}}, 0x14}}, 0x0) [ 279.854534][T11470] hfsplus: unable to parse mount options [ 279.907537][T11467] hfsplus: unable to parse mount options [ 279.912732][T11466] hfsplus: unable to parse mount options 11:46:44 executing program 4: r0 = socket$netlink(0x10, 0x3, 0xf) bind$netlink(r0, &(0x7f0000514ff4)={0x10, 0x0, 0x0, 0x2ffffffff}, 0xc) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000000), 0x4) setsockopt$netlink_NETLINK_BROADCAST_ERROR(r0, 0x10e, 0x4, &(0x7f0000000080)=0x6, 0x4) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, 0x0, 0x0) 11:46:45 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000140)='hfsplus\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000a80)={[{@barrier='barrier'}, {@gid={'gid'}}, {@type={'type', 0x3d, "ae8c9d8f"}}], [{@uid_eq={'uid'}}]}) 11:46:45 executing program 5: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='devtmpfs\x00', 0x0, 0x0) syz_mount_image$hfsplus(&(0x7f0000000140)='hfsplus\x00', &(0x7f0000000200)='./file0\x00', 0x3, 0x7, &(0x7f0000000800)=[{&(0x7f0000000400)="e1ec051c0b7b96db7480b4620be1f7d4adcb21d5233a3d23bf43659e5359470de231dd734b698cd71201837ca57f911328e1aee6b2cb39533b2d549e", 0x3c, 0x101}, {&(0x7f0000000440)="dbac23926131781587488e056e40b191269651683d0d195cbd63543040e313e20126fd634002e0256fed786d07054466250e2de6b7fb6d7d8d5201ac1478ef26aafeae7947832c4cc7fea6315e92eb81c89a385dae378bf89ca53c6984b5aa79a7dcc139938fa64b30d7c24ff7b215c890be5756df2f441d0fcb938cb4c1f89245a47c630a2b5e28bb7b5a9c8c871c45857bc4fa646b30f485beccdf529ad0cd519a0bed9b5c7df28320d9ad7eceb30eda6c964cfcab57c8aa98b89d582792b886e41c9f6146332e31f93b", 0xcb, 0x1ff}, {&(0x7f0000000540)="5c96cd9925cbe6753ba234c06f8040f650bba8d4d4ebe59964acf97c49f7a5e793521ef728d90a4eb42cbe7a2536c6922f049b20f2c681c652b4dbe077b0a9972e1eeb5573d7ee69d6fc99d4e4894537fac772842763140c5d832bf593a5cc290fd0c641d14d06e564127871808073fb6fd27f2a9995b29abce9351b0b285f4887f1cc8de04d147141af2ed66cfb66fd230e329273710457efc72a8d09487b5c83e77201b28eb38d7d3846b63b1bf1233b5c925303dd3214066c99381b0457a62397c7df27f88e19a884e1dfa6", 0xcd, 0x6}, {&(0x7f0000000640)="8ae3f201063e83beadb088cb1080ef67", 0x10, 0x2a}, {&(0x7f0000000680)="dfeed81fb09a8a0d55f0999ce7730866db77fa306b896464e4d9cf133371563c7eb734eed8ec2dda58c030b96771bb708fba592614b985c573e8f3db424553c6", 0x40, 0x4}, {&(0x7f00000006c0)="f33dec9b5d96888f1504b1385ce82fdf8f2fa76ecc6ebf567753242a4c9129cd4c4885ba8bab1fd3120749889c981acccb344645e9d1ce95826ab7ceac8b7646d2e476e8934ac444aad3bba14f0d4be15675cd3d336db510c72ebbc07a000754d66f5282b1f241556cbd63a30b3d6af0f5c8a2443b03a92bb406abbb5f630ce1ef2afbba93c29e6bc46901a91ea9d91fa6048a468df5934437ca7e9e2a4fe38fddcd2aecac9406aa7adf5de93082ebf1b5c74d76b7b1b72a9b6fea1c5ab7cc1f3e97b5d7e1db9a64df9836ce0863cda956a1e2a45b9479b8ade23e81258e9444dfbf8066562f79", 0xe7, 0x7}, {&(0x7f00000007c0)="cd72eca63713ca8a35c3557b7d56b6a3073ca69e2067c18f5120c05d4ee8", 0x1e, 0x6}], 0x1, &(0x7f0000000a80)={[{@barrier='barrier'}, {@gid={'gid'}}, {@nodecompose='nodecompose'}, {@uid={'uid'}}, {@type={'type', 0x3d, "ae8c9d8f"}}, {@decompose='decompose'}, {@session={'session', 0x3d, 0x25}}], [{@uid_eq={'uid'}}, {@obj_type={'obj_type', 0x3d, 'overlay\x00'}}, {@euid_eq={'euid'}}, {@uid_eq={'uid'}}]}) 11:46:45 executing program 1: setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) setsockopt$netlink_NETLINK_BROADCAST_ERROR(0xffffffffffffffff, 0x10e, 0x4, 0x0, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000100)={0x0, 0xc, &(0x7f00000001c0)={&(0x7f0000000040)={0x14, 0x23, 0x1, 0x0, 0x0, {0x20000000004, 0xe00000000000000}}, 0x14}}, 0x0) 11:46:45 executing program 0: syz_mount_image$hfsplus(&(0x7f0000000140)='hfsplus\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000a80)={[{@barrier='barrier'}, {@gid={'gid'}}, {@nodecompose='nodecompose'}, {@uid={'uid'}}], [{@uid_eq={'uid'}}, {@obj_type={'obj_type', 0x3d, 'overlay\x00'}}, {@euid_eq={'euid'}}, {@uid_eq={'uid'}}]}) [ 280.170458][T11477] IPVS: ftp: loaded support on port[0] = 21 11:46:45 executing program 4: r0 = socket$netlink(0x10, 0x3, 0xf) bind$netlink(r0, &(0x7f0000514ff4)={0x10, 0x0, 0x0, 0x2ffffffff}, 0xc) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000000), 0x4) setsockopt$netlink_NETLINK_BROADCAST_ERROR(r0, 0x10e, 0x4, &(0x7f0000000080)=0x6, 0x4) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, 0x0, 0x0) [ 280.278412][T11494] hfsplus: unable to parse mount options [ 280.339975][T11499] hfsplus: unable to parse mount options [ 280.369753][T11498] hfsplus: unable to find HFS+ superblock 11:46:45 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_FSGETXATTR(0xffffffffffffffff, 0x8004550f, 0x0) r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r0, &(0x7f0000000000)={{0x6, @rose}, [@rose, @rose, @default, @netrom, @bcast, @rose, @rose, @null]}, 0x48) r1 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000080)='/dev/qat_adf_ctl\x00', 0x8200, 0x0) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r1, 0x6, 0x23, &(0x7f00000000c0)={&(0x7f0000ffc000/0x4000)=nil, 0x4000}, &(0x7f0000000140)=0x10) listen(r0, 0x0) unshare(0x40000000) setrlimit(0x0, 0x0) r2 = accept(r0, 0x0, 0x0) write$binfmt_elf64(r2, &(0x7f00000002c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x9, 0x8, 0x0, 0x0, 0x0, 0x4825483b35c83c0b, 0x0, 0x0, 0x40, 0x227}, [{0x4, 0x1, 0xfff, 0x0, 0x0, 0xff8000000002, 0x0, 0x7fff}], "", [[], [], []]}, 0x378) 11:46:45 executing program 5: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) syz_mount_image$hfsplus(&(0x7f0000000140)='hfsplus\x00', &(0x7f0000000200)='./file0\x00', 0x3, 0x7, &(0x7f0000000800)=[{&(0x7f0000000400)="e1ec051c0b7b96db7480b4620be1f7d4adcb21d5233a3d23bf43659e5359470de231dd734b698cd71201837ca57f911328e1aee6b2cb39533b2d549e", 0x3c, 0x101}, {&(0x7f0000000440)="dbac23926131781587488e056e40b191269651683d0d195cbd63543040e313e20126fd634002e0256fed786d07054466250e2de6b7fb6d7d8d5201ac1478ef26aafeae7947832c4cc7fea6315e92eb81c89a385dae378bf89ca53c6984b5aa79a7dcc139938fa64b30d7c24ff7b215c890be5756df2f441d0fcb938cb4c1f89245a47c630a2b5e28bb7b5a9c8c871c45857bc4fa646b30f485beccdf529ad0cd519a0bed9b5c7df28320d9ad7eceb30eda6c964cfcab57c8aa98b89d582792b886e41c9f6146332e31f93b", 0xcb, 0x1ff}, {&(0x7f0000000540)="5c96cd9925cbe6753ba234c06f8040f650bba8d4d4ebe59964acf97c49f7a5e793521ef728d90a4eb42cbe7a2536c6922f049b20f2c681c652b4dbe077b0a9972e1eeb5573d7ee69d6fc99d4e4894537fac772842763140c5d832bf593a5cc290fd0c641d14d06e564127871808073fb6fd27f2a9995b29abce9351b0b285f4887f1cc8de04d147141af2ed66cfb66fd230e329273710457efc72a8d09487b5c83e77201b28eb38d7d3846b63b1bf1233b5c925303dd3214066c99381b0457a62397c7df27f88e19a884e1dfa6", 0xcd, 0x6}, {&(0x7f0000000640)="8ae3f201063e83beadb088cb1080ef67", 0x10, 0x2a}, {&(0x7f0000000680)="dfeed81fb09a8a0d55f0999ce7730866db77fa306b896464e4d9cf133371563c7eb734eed8ec2dda58c030b96771bb708fba592614b985c573e8f3db424553c6", 0x40, 0x4}, {&(0x7f00000006c0)="f33dec9b5d96888f1504b1385ce82fdf8f2fa76ecc6ebf567753242a4c9129cd4c4885ba8bab1fd3120749889c981acccb344645e9d1ce95826ab7ceac8b7646d2e476e8934ac444aad3bba14f0d4be15675cd3d336db510c72ebbc07a000754d66f5282b1f241556cbd63a30b3d6af0f5c8a2443b03a92bb406abbb5f630ce1ef2afbba93c29e6bc46901a91ea9d91fa6048a468df5934437ca7e9e2a4fe38fddcd2aecac9406aa7adf5de93082ebf1b5c74d76b7b1b72a9b6fea1c5ab7cc1f3e97b5d7e1db9a64df9836ce0863cda956a1e2a45b9479b8ade23e81258e9444dfbf8066562f79", 0xe7, 0x7}, {&(0x7f00000007c0)="cd72eca63713ca8a35c3557b7d56b6a3073ca69e2067c18f5120c05d4ee8", 0x1e, 0x6}], 0x1, &(0x7f0000000a80)={[{@barrier='barrier'}, {@gid={'gid'}}, {@nodecompose='nodecompose'}, {@uid={'uid'}}, {@type={'type', 0x3d, "ae8c9d8f"}}, {@decompose='decompose'}, {@session={'session', 0x3d, 0x25}}], [{@uid_eq={'uid'}}, {@obj_type={'obj_type', 0x3d, 'overlay\x00'}}, {@euid_eq={'euid'}}, {@uid_eq={'uid'}}]}) 11:46:45 executing program 4: r0 = socket$netlink(0x10, 0x3, 0xf) bind$netlink(r0, &(0x7f0000514ff4)={0x10, 0x0, 0x0, 0x2ffffffff}, 0xc) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000000), 0x4) setsockopt$netlink_NETLINK_BROADCAST_ERROR(r0, 0x10e, 0x4, &(0x7f0000000080)=0x6, 0x4) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000100)={0x0, 0x0, 0x0}, 0x0) 11:46:45 executing program 1: setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) setsockopt$netlink_NETLINK_BROADCAST_ERROR(0xffffffffffffffff, 0x10e, 0x4, 0x0, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000100)={0x0, 0xd, &(0x7f00000001c0)={&(0x7f0000000040)={0x14, 0x23, 0x1, 0x0, 0x0, {0x20000000004, 0xe00000000000000}}, 0x14}}, 0x0) 11:46:45 executing program 0: syz_mount_image$hfsplus(&(0x7f0000000140)='hfsplus\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000a80)={[{@barrier='barrier'}, {@gid={'gid'}}, {@nodecompose='nodecompose'}, {@uid={'uid'}}], [{@uid_eq={'uid'}}, {@obj_type={'obj_type', 0x3d, 'overlay\x00'}}, {@euid_eq={'euid'}}, {@uid_eq={'uid'}}]}) 11:46:45 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000140)='hfsplus\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000a80)={[{@barrier='barrier'}, {@gid={'gid'}}, {@type={'type', 0x3d, "ae8c9d8f"}}]}) [ 280.867529][T11526] hfsplus: unable to parse mount options [ 280.893440][T11519] hfsplus: unable to find HFS+ superblock 11:46:45 executing program 4: r0 = socket$netlink(0x10, 0x3, 0xf) bind$netlink(r0, &(0x7f0000514ff4)={0x10, 0x0, 0x0, 0x2ffffffff}, 0xc) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000000), 0x4) setsockopt$netlink_NETLINK_BROADCAST_ERROR(r0, 0x10e, 0x4, &(0x7f0000000080)=0x6, 0x4) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000100)={0x0, 0x0, 0x0}, 0x0) [ 280.919526][T11523] hfsplus: unable to parse mount options 11:46:45 executing program 1: setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) setsockopt$netlink_NETLINK_BROADCAST_ERROR(0xffffffffffffffff, 0x10e, 0x4, 0x0, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000100)={0x0, 0xe, &(0x7f00000001c0)={&(0x7f0000000040)={0x14, 0x23, 0x1, 0x0, 0x0, {0x20000000004, 0xe00000000000000}}, 0x14}}, 0x0) 11:46:46 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_FSGETXATTR(0xffffffffffffffff, 0x8004550f, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x1}, 0x10) connect$netrom(0xffffffffffffffff, &(0x7f0000000000)={{0x6, @rose}, [@rose, @rose, @default, @netrom, @bcast, @rose, @rose, @null]}, 0x48) r0 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000080)='/dev/qat_adf_ctl\x00', 0x8200, 0x0) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, &(0x7f00000000c0)={&(0x7f0000ffc000/0x4000)=nil, 0x4000}, &(0x7f0000000140)=0x10) listen(0xffffffffffffffff, 0x0) unshare(0x40000000) setrlimit(0x0, 0x0) r1 = accept(0xffffffffffffffff, 0x0, 0x0) write$binfmt_elf64(r1, &(0x7f00000002c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x9, 0x8, 0x0, 0x0, 0x0, 0x4825483b35c83c0b, 0x0, 0x0, 0x40, 0x227}, [{0x4, 0x1, 0xfff, 0x0, 0x0, 0xff8000000002, 0x0, 0x7fff}], "", [[], [], []]}, 0x378) 11:46:46 executing program 5: syz_mount_image$hfsplus(&(0x7f0000000140)='hfsplus\x00', &(0x7f0000000200)='./file0\x00', 0x3, 0x7, &(0x7f0000000800)=[{&(0x7f0000000400)="e1ec051c0b7b96db7480b4620be1f7d4adcb21d5233a3d23bf43659e5359470de231dd734b698cd71201837ca57f911328e1aee6b2cb39533b2d549e", 0x3c, 0x101}, {&(0x7f0000000440)="dbac23926131781587488e056e40b191269651683d0d195cbd63543040e313e20126fd634002e0256fed786d07054466250e2de6b7fb6d7d8d5201ac1478ef26aafeae7947832c4cc7fea6315e92eb81c89a385dae378bf89ca53c6984b5aa79a7dcc139938fa64b30d7c24ff7b215c890be5756df2f441d0fcb938cb4c1f89245a47c630a2b5e28bb7b5a9c8c871c45857bc4fa646b30f485beccdf529ad0cd519a0bed9b5c7df28320d9ad7eceb30eda6c964cfcab57c8aa98b89d582792b886e41c9f6146332e31f93b", 0xcb, 0x1ff}, {&(0x7f0000000540)="5c96cd9925cbe6753ba234c06f8040f650bba8d4d4ebe59964acf97c49f7a5e793521ef728d90a4eb42cbe7a2536c6922f049b20f2c681c652b4dbe077b0a9972e1eeb5573d7ee69d6fc99d4e4894537fac772842763140c5d832bf593a5cc290fd0c641d14d06e564127871808073fb6fd27f2a9995b29abce9351b0b285f4887f1cc8de04d147141af2ed66cfb66fd230e329273710457efc72a8d09487b5c83e77201b28eb38d7d3846b63b1bf1233b5c925303dd3214066c99381b0457a62397c7df27f88e19a884e1dfa6", 0xcd, 0x6}, {&(0x7f0000000640)="8ae3f201063e83beadb088cb1080ef67", 0x10, 0x2a}, {&(0x7f0000000680)="dfeed81fb09a8a0d55f0999ce7730866db77fa306b896464e4d9cf133371563c7eb734eed8ec2dda58c030b96771bb708fba592614b985c573e8f3db424553c6", 0x40, 0x4}, {&(0x7f00000006c0)="f33dec9b5d96888f1504b1385ce82fdf8f2fa76ecc6ebf567753242a4c9129cd4c4885ba8bab1fd3120749889c981acccb344645e9d1ce95826ab7ceac8b7646d2e476e8934ac444aad3bba14f0d4be15675cd3d336db510c72ebbc07a000754d66f5282b1f241556cbd63a30b3d6af0f5c8a2443b03a92bb406abbb5f630ce1ef2afbba93c29e6bc46901a91ea9d91fa6048a468df5934437ca7e9e2a4fe38fddcd2aecac9406aa7adf5de93082ebf1b5c74d76b7b1b72a9b6fea1c5ab7cc1f3e97b5d7e1db9a64df9836ce0863cda956a1e2a45b9479b8ade23e81258e9444dfbf8066562f79", 0xe7, 0x7}, {&(0x7f00000007c0)="cd72eca63713ca8a35c3557b7d56b6a3073ca69e2067c18f5120c05d4ee8", 0x1e, 0x6}], 0x1, &(0x7f0000000a80)={[{@barrier='barrier'}, {@gid={'gid'}}, {@nodecompose='nodecompose'}, {@uid={'uid'}}, {@type={'type', 0x3d, "ae8c9d8f"}}, {@decompose='decompose'}, {@session={'session', 0x3d, 0x25}}], [{@uid_eq={'uid'}}, {@obj_type={'obj_type', 0x3d, 'overlay\x00'}}, {@euid_eq={'euid'}}, {@uid_eq={'uid'}}]}) 11:46:46 executing program 0: syz_mount_image$hfsplus(&(0x7f0000000140)='hfsplus\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000a80)={[{@barrier='barrier'}, {@gid={'gid'}}, {@nodecompose='nodecompose'}, {@uid={'uid'}}], [{@uid_eq={'uid'}}, {@obj_type={'obj_type', 0x3d, 'overlay\x00'}}, {@euid_eq={'euid'}}, {@uid_eq={'uid'}}]}) 11:46:46 executing program 4: r0 = socket$netlink(0x10, 0x3, 0xf) bind$netlink(r0, &(0x7f0000514ff4)={0x10, 0x0, 0x0, 0x2ffffffff}, 0xc) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000000), 0x4) setsockopt$netlink_NETLINK_BROADCAST_ERROR(r0, 0x10e, 0x4, &(0x7f0000000080)=0x6, 0x4) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000100)={0x0, 0x0, 0x0}, 0x0) [ 281.298306][T11534] IPVS: ftp: loaded support on port[0] = 21 [ 281.384145][T11552] hfsplus: unable to parse mount options [ 281.431074][T11554] hfsplus: unable to parse mount options 11:46:46 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_FSGETXATTR(0xffffffffffffffff, 0x8004550f, 0x0) r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r0, &(0x7f0000000000)={{0x6, @rose}, [@rose, @rose, @default, @netrom, @bcast, @rose, @rose, @null]}, 0x48) r1 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000080)='/dev/qat_adf_ctl\x00', 0x8200, 0x0) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r1, 0x6, 0x23, &(0x7f00000000c0)={&(0x7f0000ffc000/0x4000)=nil, 0x4000}, &(0x7f0000000140)=0x10) listen(r0, 0x0) unshare(0x40000000) setrlimit(0x0, 0x0) r2 = accept(r0, 0x0, 0x0) write$binfmt_elf64(r2, &(0x7f00000002c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x9, 0x8, 0x0, 0x0, 0x0, 0x4825483b35c83c0b, 0x0, 0x0, 0x40, 0x227}, [{0x4, 0x1, 0xfff, 0x0, 0x0, 0xff8000000002, 0x0, 0x7fff}], "", [[], [], []]}, 0x378) 11:46:46 executing program 1: setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) setsockopt$netlink_NETLINK_BROADCAST_ERROR(0xffffffffffffffff, 0x10e, 0x4, 0x0, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000100)={0x0, 0xf, &(0x7f00000001c0)={&(0x7f0000000040)={0x14, 0x23, 0x1, 0x0, 0x0, {0x20000000004, 0xe00000000000000}}, 0x14}}, 0x0) 11:46:46 executing program 4: r0 = socket$netlink(0x10, 0x3, 0xf) bind$netlink(r0, &(0x7f0000514ff4)={0x10, 0x0, 0x0, 0x2ffffffff}, 0xc) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000000), 0x4) setsockopt$netlink_NETLINK_BROADCAST_ERROR(r0, 0x10e, 0x4, &(0x7f0000000080)=0x6, 0x4) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000001c0)={0x0}}, 0x0) 11:46:46 executing program 5: syz_mount_image$hfsplus(0x0, &(0x7f0000000200)='./file0\x00', 0x3, 0x7, &(0x7f0000000800)=[{&(0x7f0000000400)="e1ec051c0b7b96db7480b4620be1f7d4adcb21d5233a3d23bf43659e5359470de231dd734b698cd71201837ca57f911328e1aee6b2cb39533b2d549e", 0x3c, 0x101}, {&(0x7f0000000440)="dbac23926131781587488e056e40b191269651683d0d195cbd63543040e313e20126fd634002e0256fed786d07054466250e2de6b7fb6d7d8d5201ac1478ef26aafeae7947832c4cc7fea6315e92eb81c89a385dae378bf89ca53c6984b5aa79a7dcc139938fa64b30d7c24ff7b215c890be5756df2f441d0fcb938cb4c1f89245a47c630a2b5e28bb7b5a9c8c871c45857bc4fa646b30f485beccdf529ad0cd519a0bed9b5c7df28320d9ad7eceb30eda6c964cfcab57c8aa98b89d582792b886e41c9f6146332e31f93b", 0xcb, 0x1ff}, {&(0x7f0000000540)="5c96cd9925cbe6753ba234c06f8040f650bba8d4d4ebe59964acf97c49f7a5e793521ef728d90a4eb42cbe7a2536c6922f049b20f2c681c652b4dbe077b0a9972e1eeb5573d7ee69d6fc99d4e4894537fac772842763140c5d832bf593a5cc290fd0c641d14d06e564127871808073fb6fd27f2a9995b29abce9351b0b285f4887f1cc8de04d147141af2ed66cfb66fd230e329273710457efc72a8d09487b5c83e77201b28eb38d7d3846b63b1bf1233b5c925303dd3214066c99381b0457a62397c7df27f88e19a884e1dfa6", 0xcd, 0x6}, {&(0x7f0000000640)="8ae3f201063e83beadb088cb1080ef67", 0x10, 0x2a}, {&(0x7f0000000680)="dfeed81fb09a8a0d55f0999ce7730866db77fa306b896464e4d9cf133371563c7eb734eed8ec2dda58c030b96771bb708fba592614b985c573e8f3db424553c6", 0x40, 0x4}, {&(0x7f00000006c0)="f33dec9b5d96888f1504b1385ce82fdf8f2fa76ecc6ebf567753242a4c9129cd4c4885ba8bab1fd3120749889c981acccb344645e9d1ce95826ab7ceac8b7646d2e476e8934ac444aad3bba14f0d4be15675cd3d336db510c72ebbc07a000754d66f5282b1f241556cbd63a30b3d6af0f5c8a2443b03a92bb406abbb5f630ce1ef2afbba93c29e6bc46901a91ea9d91fa6048a468df5934437ca7e9e2a4fe38fddcd2aecac9406aa7adf5de93082ebf1b5c74d76b7b1b72a9b6fea1c5ab7cc1f3e97b5d7e1db9a64df9836ce0863cda956a1e2a45b9479b8ade23e81258e9444dfbf8066562f79", 0xe7, 0x7}, {&(0x7f00000007c0)="cd72eca63713ca8a35c3557b7d56b6a3073ca69e2067c18f5120c05d4ee8", 0x1e, 0x6}], 0x1, &(0x7f0000000a80)={[{@barrier='barrier'}, {@gid={'gid'}}, {@nodecompose='nodecompose'}, {@uid={'uid'}}, {@type={'type', 0x3d, "ae8c9d8f"}}, {@decompose='decompose'}, {@session={'session', 0x3d, 0x25}}], [{@uid_eq={'uid'}}, {@obj_type={'obj_type', 0x3d, 'overlay\x00'}}, {@euid_eq={'euid'}}, {@uid_eq={'uid'}}]}) 11:46:46 executing program 0: syz_mount_image$hfsplus(&(0x7f0000000140)='hfsplus\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000a80)={[{@barrier='barrier'}, {@gid={'gid'}}, {@nodecompose='nodecompose'}, {@type={'type', 0x3d, "ae8c9d8f"}}], [{@uid_eq={'uid'}}, {@obj_type={'obj_type', 0x3d, 'overlay\x00'}}, {@euid_eq={'euid'}}, {@uid_eq={'uid'}}]}) [ 281.869656][T11575] hfsplus: unable to parse mount options 11:46:46 executing program 4: r0 = socket$netlink(0x10, 0x3, 0xf) bind$netlink(r0, &(0x7f0000514ff4)={0x10, 0x0, 0x0, 0x2ffffffff}, 0xc) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000000), 0x4) setsockopt$netlink_NETLINK_BROADCAST_ERROR(r0, 0x10e, 0x4, &(0x7f0000000080)=0x6, 0x4) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000001c0)={0x0}}, 0x0) 11:46:47 executing program 5: syz_mount_image$hfsplus(0x0, &(0x7f0000000200)='./file0\x00', 0x3, 0x7, &(0x7f0000000800)=[{&(0x7f0000000400)="e1ec051c0b7b96db7480b4620be1f7d4adcb21d5233a3d23bf43659e5359470de231dd734b698cd71201837ca57f911328e1aee6b2cb39533b2d549e", 0x3c, 0x101}, {&(0x7f0000000440)="dbac23926131781587488e056e40b191269651683d0d195cbd63543040e313e20126fd634002e0256fed786d07054466250e2de6b7fb6d7d8d5201ac1478ef26aafeae7947832c4cc7fea6315e92eb81c89a385dae378bf89ca53c6984b5aa79a7dcc139938fa64b30d7c24ff7b215c890be5756df2f441d0fcb938cb4c1f89245a47c630a2b5e28bb7b5a9c8c871c45857bc4fa646b30f485beccdf529ad0cd519a0bed9b5c7df28320d9ad7eceb30eda6c964cfcab57c8aa98b89d582792b886e41c9f6146332e31f93b", 0xcb, 0x1ff}, {&(0x7f0000000540)="5c96cd9925cbe6753ba234c06f8040f650bba8d4d4ebe59964acf97c49f7a5e793521ef728d90a4eb42cbe7a2536c6922f049b20f2c681c652b4dbe077b0a9972e1eeb5573d7ee69d6fc99d4e4894537fac772842763140c5d832bf593a5cc290fd0c641d14d06e564127871808073fb6fd27f2a9995b29abce9351b0b285f4887f1cc8de04d147141af2ed66cfb66fd230e329273710457efc72a8d09487b5c83e77201b28eb38d7d3846b63b1bf1233b5c925303dd3214066c99381b0457a62397c7df27f88e19a884e1dfa6", 0xcd, 0x6}, {&(0x7f0000000640)="8ae3f201063e83beadb088cb1080ef67", 0x10, 0x2a}, {&(0x7f0000000680)="dfeed81fb09a8a0d55f0999ce7730866db77fa306b896464e4d9cf133371563c7eb734eed8ec2dda58c030b96771bb708fba592614b985c573e8f3db424553c6", 0x40, 0x4}, {&(0x7f00000006c0)="f33dec9b5d96888f1504b1385ce82fdf8f2fa76ecc6ebf567753242a4c9129cd4c4885ba8bab1fd3120749889c981acccb344645e9d1ce95826ab7ceac8b7646d2e476e8934ac444aad3bba14f0d4be15675cd3d336db510c72ebbc07a000754d66f5282b1f241556cbd63a30b3d6af0f5c8a2443b03a92bb406abbb5f630ce1ef2afbba93c29e6bc46901a91ea9d91fa6048a468df5934437ca7e9e2a4fe38fddcd2aecac9406aa7adf5de93082ebf1b5c74d76b7b1b72a9b6fea1c5ab7cc1f3e97b5d7e1db9a64df9836ce0863cda956a1e2a45b9479b8ade23e81258e9444dfbf8066562f79", 0xe7, 0x7}, {&(0x7f00000007c0)="cd72eca63713ca8a35c3557b7d56b6a3073ca69e2067c18f5120c05d4ee8", 0x1e, 0x6}], 0x1, &(0x7f0000000a80)={[{@barrier='barrier'}, {@gid={'gid'}}, {@nodecompose='nodecompose'}, {@uid={'uid'}}, {@type={'type', 0x3d, "ae8c9d8f"}}, {@decompose='decompose'}, {@session={'session', 0x3d, 0x25}}], [{@uid_eq={'uid'}}, {@obj_type={'obj_type', 0x3d, 'overlay\x00'}}, {@euid_eq={'euid'}}, {@uid_eq={'uid'}}]}) 11:46:47 executing program 1: setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) setsockopt$netlink_NETLINK_BROADCAST_ERROR(0xffffffffffffffff, 0x10e, 0x4, 0x0, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000100)={0x0, 0x10, &(0x7f00000001c0)={&(0x7f0000000040)={0x14, 0x23, 0x1, 0x0, 0x0, {0x20000000004, 0xe00000000000000}}, 0x14}}, 0x0) [ 282.068862][T11579] IPVS: ftp: loaded support on port[0] = 21 [ 282.091481][T11590] IPVS: ftp: loaded support on port[0] = 21 11:46:47 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_FSGETXATTR(0xffffffffffffffff, 0x8004550f, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x1}, 0x10) connect$netrom(0xffffffffffffffff, &(0x7f0000000000)={{0x6, @rose}, [@rose, @rose, @default, @netrom, @bcast, @rose, @rose, @null]}, 0x48) r0 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000080)='/dev/qat_adf_ctl\x00', 0x8200, 0x0) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, &(0x7f00000000c0)={&(0x7f0000ffc000/0x4000)=nil, 0x4000}, &(0x7f0000000140)=0x10) listen(0xffffffffffffffff, 0x0) unshare(0x40000000) setrlimit(0x0, 0x0) r1 = accept(0xffffffffffffffff, 0x0, 0x0) write$binfmt_elf64(r1, &(0x7f00000002c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x9, 0x8, 0x0, 0x0, 0x0, 0x4825483b35c83c0b, 0x0, 0x0, 0x40, 0x227}, [{0x4, 0x1, 0xfff, 0x0, 0x0, 0xff8000000002, 0x0, 0x7fff}], "", [[], [], []]}, 0x378) 11:46:47 executing program 4: r0 = socket$netlink(0x10, 0x3, 0xf) bind$netlink(r0, &(0x7f0000514ff4)={0x10, 0x0, 0x0, 0x2ffffffff}, 0xc) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000000), 0x4) setsockopt$netlink_NETLINK_BROADCAST_ERROR(r0, 0x10e, 0x4, &(0x7f0000000080)=0x6, 0x4) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000001c0)={0x0}}, 0x0) 11:46:47 executing program 0: syz_mount_image$hfsplus(&(0x7f0000000140)='hfsplus\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000a80)={[{@barrier='barrier'}, {@gid={'gid'}}, {@type={'type', 0x3d, "ae8c9d8f"}}], [{@uid_eq={'uid'}}, {@obj_type={'obj_type', 0x3d, 'overlay\x00'}}, {@euid_eq={'euid'}}, {@uid_eq={'uid'}}]}) 11:46:47 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_FSGETXATTR(0xffffffffffffffff, 0x8004550f, 0x0) r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r0, &(0x7f0000000000)={{0x6, @rose}, [@rose, @rose, @default, @netrom, @bcast, @rose, @rose, @null]}, 0x48) r1 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000080)='/dev/qat_adf_ctl\x00', 0x8200, 0x0) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r1, 0x6, 0x23, &(0x7f00000000c0)={&(0x7f0000ffc000/0x4000)=nil, 0x4000}, &(0x7f0000000140)=0x10) listen(r0, 0x0) unshare(0x40000000) setrlimit(0x0, 0x0) r2 = accept(r0, 0x0, 0x0) write$binfmt_elf64(r2, &(0x7f00000002c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x9, 0x8, 0x0, 0x0, 0x0, 0x4825483b35c83c0b, 0x0, 0x0, 0x40, 0x227}, [{0x4, 0x1, 0xfff, 0x0, 0x0, 0xff8000000002, 0x0, 0x7fff}], "", [[], [], []]}, 0x378) 11:46:47 executing program 5: syz_mount_image$hfsplus(0x0, &(0x7f0000000200)='./file0\x00', 0x3, 0x7, &(0x7f0000000800)=[{&(0x7f0000000400)="e1ec051c0b7b96db7480b4620be1f7d4adcb21d5233a3d23bf43659e5359470de231dd734b698cd71201837ca57f911328e1aee6b2cb39533b2d549e", 0x3c, 0x101}, {&(0x7f0000000440)="dbac23926131781587488e056e40b191269651683d0d195cbd63543040e313e20126fd634002e0256fed786d07054466250e2de6b7fb6d7d8d5201ac1478ef26aafeae7947832c4cc7fea6315e92eb81c89a385dae378bf89ca53c6984b5aa79a7dcc139938fa64b30d7c24ff7b215c890be5756df2f441d0fcb938cb4c1f89245a47c630a2b5e28bb7b5a9c8c871c45857bc4fa646b30f485beccdf529ad0cd519a0bed9b5c7df28320d9ad7eceb30eda6c964cfcab57c8aa98b89d582792b886e41c9f6146332e31f93b", 0xcb, 0x1ff}, {&(0x7f0000000540)="5c96cd9925cbe6753ba234c06f8040f650bba8d4d4ebe59964acf97c49f7a5e793521ef728d90a4eb42cbe7a2536c6922f049b20f2c681c652b4dbe077b0a9972e1eeb5573d7ee69d6fc99d4e4894537fac772842763140c5d832bf593a5cc290fd0c641d14d06e564127871808073fb6fd27f2a9995b29abce9351b0b285f4887f1cc8de04d147141af2ed66cfb66fd230e329273710457efc72a8d09487b5c83e77201b28eb38d7d3846b63b1bf1233b5c925303dd3214066c99381b0457a62397c7df27f88e19a884e1dfa6", 0xcd, 0x6}, {&(0x7f0000000640)="8ae3f201063e83beadb088cb1080ef67", 0x10, 0x2a}, {&(0x7f0000000680)="dfeed81fb09a8a0d55f0999ce7730866db77fa306b896464e4d9cf133371563c7eb734eed8ec2dda58c030b96771bb708fba592614b985c573e8f3db424553c6", 0x40, 0x4}, {&(0x7f00000006c0)="f33dec9b5d96888f1504b1385ce82fdf8f2fa76ecc6ebf567753242a4c9129cd4c4885ba8bab1fd3120749889c981acccb344645e9d1ce95826ab7ceac8b7646d2e476e8934ac444aad3bba14f0d4be15675cd3d336db510c72ebbc07a000754d66f5282b1f241556cbd63a30b3d6af0f5c8a2443b03a92bb406abbb5f630ce1ef2afbba93c29e6bc46901a91ea9d91fa6048a468df5934437ca7e9e2a4fe38fddcd2aecac9406aa7adf5de93082ebf1b5c74d76b7b1b72a9b6fea1c5ab7cc1f3e97b5d7e1db9a64df9836ce0863cda956a1e2a45b9479b8ade23e81258e9444dfbf8066562f79", 0xe7, 0x7}, {&(0x7f00000007c0)="cd72eca63713ca8a35c3557b7d56b6a3073ca69e2067c18f5120c05d4ee8", 0x1e, 0x6}], 0x1, &(0x7f0000000a80)={[{@barrier='barrier'}, {@gid={'gid'}}, {@nodecompose='nodecompose'}, {@uid={'uid'}}, {@type={'type', 0x3d, "ae8c9d8f"}}, {@decompose='decompose'}, {@session={'session', 0x3d, 0x25}}], [{@uid_eq={'uid'}}, {@obj_type={'obj_type', 0x3d, 'overlay\x00'}}, {@euid_eq={'euid'}}, {@uid_eq={'uid'}}]}) 11:46:47 executing program 1: setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) setsockopt$netlink_NETLINK_BROADCAST_ERROR(0xffffffffffffffff, 0x10e, 0x4, 0x0, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000100)={0x0, 0x11, &(0x7f00000001c0)={&(0x7f0000000040)={0x14, 0x23, 0x1, 0x0, 0x0, {0x20000000004, 0xe00000000000000}}, 0x14}}, 0x0) [ 282.801363][T11615] hfsplus: unable to parse mount options 11:46:47 executing program 4: r0 = socket$netlink(0x10, 0x3, 0xf) bind$netlink(r0, &(0x7f0000514ff4)={0x10, 0x0, 0x0, 0x2ffffffff}, 0xc) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000000), 0x4) setsockopt$netlink_NETLINK_BROADCAST_ERROR(r0, 0x10e, 0x4, &(0x7f0000000080)=0x6, 0x4) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)={0x14, 0x0, 0x1, 0x0, 0x0, {0x20000000004, 0xe00000000000000}}, 0x14}}, 0x0) [ 282.895279][T11627] IPVS: ftp: loaded support on port[0] = 21 11:46:47 executing program 5: syz_mount_image$hfsplus(&(0x7f0000000140)='hfsplus\x00', 0x0, 0x3, 0x7, &(0x7f0000000800)=[{&(0x7f0000000400)="e1ec051c0b7b96db7480b4620be1f7d4adcb21d5233a3d23bf43659e5359470de231dd734b698cd71201837ca57f911328e1aee6b2cb39533b2d549e", 0x3c, 0x101}, {&(0x7f0000000440)="dbac23926131781587488e056e40b191269651683d0d195cbd63543040e313e20126fd634002e0256fed786d07054466250e2de6b7fb6d7d8d5201ac1478ef26aafeae7947832c4cc7fea6315e92eb81c89a385dae378bf89ca53c6984b5aa79a7dcc139938fa64b30d7c24ff7b215c890be5756df2f441d0fcb938cb4c1f89245a47c630a2b5e28bb7b5a9c8c871c45857bc4fa646b30f485beccdf529ad0cd519a0bed9b5c7df28320d9ad7eceb30eda6c964cfcab57c8aa98b89d582792b886e41c9f6146332e31f93b", 0xcb, 0x1ff}, {&(0x7f0000000540)="5c96cd9925cbe6753ba234c06f8040f650bba8d4d4ebe59964acf97c49f7a5e793521ef728d90a4eb42cbe7a2536c6922f049b20f2c681c652b4dbe077b0a9972e1eeb5573d7ee69d6fc99d4e4894537fac772842763140c5d832bf593a5cc290fd0c641d14d06e564127871808073fb6fd27f2a9995b29abce9351b0b285f4887f1cc8de04d147141af2ed66cfb66fd230e329273710457efc72a8d09487b5c83e77201b28eb38d7d3846b63b1bf1233b5c925303dd3214066c99381b0457a62397c7df27f88e19a884e1dfa6", 0xcd, 0x6}, {&(0x7f0000000640)="8ae3f201063e83beadb088cb1080ef67", 0x10, 0x2a}, {&(0x7f0000000680)="dfeed81fb09a8a0d55f0999ce7730866db77fa306b896464e4d9cf133371563c7eb734eed8ec2dda58c030b96771bb708fba592614b985c573e8f3db424553c6", 0x40, 0x4}, {&(0x7f00000006c0)="f33dec9b5d96888f1504b1385ce82fdf8f2fa76ecc6ebf567753242a4c9129cd4c4885ba8bab1fd3120749889c981acccb344645e9d1ce95826ab7ceac8b7646d2e476e8934ac444aad3bba14f0d4be15675cd3d336db510c72ebbc07a000754d66f5282b1f241556cbd63a30b3d6af0f5c8a2443b03a92bb406abbb5f630ce1ef2afbba93c29e6bc46901a91ea9d91fa6048a468df5934437ca7e9e2a4fe38fddcd2aecac9406aa7adf5de93082ebf1b5c74d76b7b1b72a9b6fea1c5ab7cc1f3e97b5d7e1db9a64df9836ce0863cda956a1e2a45b9479b8ade23e81258e9444dfbf8066562f79", 0xe7, 0x7}, {&(0x7f00000007c0)="cd72eca63713ca8a35c3557b7d56b6a3073ca69e2067c18f5120c05d4ee8", 0x1e, 0x6}], 0x1, &(0x7f0000000a80)={[{@barrier='barrier'}, {@gid={'gid'}}, {@nodecompose='nodecompose'}, {@uid={'uid'}}, {@type={'type', 0x3d, "ae8c9d8f"}}, {@decompose='decompose'}, {@session={'session', 0x3d, 0x25}}], [{@uid_eq={'uid'}}, {@obj_type={'obj_type', 0x3d, 'overlay\x00'}}, {@euid_eq={'euid'}}, {@uid_eq={'uid'}}]}) 11:46:47 executing program 0: syz_mount_image$hfsplus(&(0x7f0000000140)='hfsplus\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000a80)={[{@barrier='barrier'}, {@type={'type', 0x3d, "ae8c9d8f"}}], [{@uid_eq={'uid'}}, {@obj_type={'obj_type', 0x3d, 'overlay\x00'}}, {@euid_eq={'euid'}}, {@uid_eq={'uid'}}]}) 11:46:48 executing program 1: setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) setsockopt$netlink_NETLINK_BROADCAST_ERROR(0xffffffffffffffff, 0x10e, 0x4, 0x0, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000100)={0x0, 0x12, &(0x7f00000001c0)={&(0x7f0000000040)={0x14, 0x23, 0x1, 0x0, 0x0, {0x20000000004, 0xe00000000000000}}, 0x14}}, 0x0) [ 283.121959][T11626] IPVS: ftp: loaded support on port[0] = 21 11:46:48 executing program 4: r0 = socket$netlink(0x10, 0x3, 0xf) bind$netlink(r0, &(0x7f0000514ff4)={0x10, 0x0, 0x0, 0x2ffffffff}, 0xc) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000000), 0x4) setsockopt$netlink_NETLINK_BROADCAST_ERROR(r0, 0x10e, 0x4, &(0x7f0000000080)=0x6, 0x4) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)={0x14, 0x0, 0x1, 0x0, 0x0, {0x20000000004, 0xe00000000000000}}, 0x14}}, 0x0) [ 283.212841][T11643] hfsplus: unable to parse mount options 11:46:48 executing program 5: syz_mount_image$hfsplus(&(0x7f0000000140)='hfsplus\x00', 0x0, 0x3, 0x7, &(0x7f0000000800)=[{&(0x7f0000000400)="e1ec051c0b7b96db7480b4620be1f7d4adcb21d5233a3d23bf43659e5359470de231dd734b698cd71201837ca57f911328e1aee6b2cb39533b2d549e", 0x3c, 0x101}, {&(0x7f0000000440)="dbac23926131781587488e056e40b191269651683d0d195cbd63543040e313e20126fd634002e0256fed786d07054466250e2de6b7fb6d7d8d5201ac1478ef26aafeae7947832c4cc7fea6315e92eb81c89a385dae378bf89ca53c6984b5aa79a7dcc139938fa64b30d7c24ff7b215c890be5756df2f441d0fcb938cb4c1f89245a47c630a2b5e28bb7b5a9c8c871c45857bc4fa646b30f485beccdf529ad0cd519a0bed9b5c7df28320d9ad7eceb30eda6c964cfcab57c8aa98b89d582792b886e41c9f6146332e31f93b", 0xcb, 0x1ff}, {&(0x7f0000000540)="5c96cd9925cbe6753ba234c06f8040f650bba8d4d4ebe59964acf97c49f7a5e793521ef728d90a4eb42cbe7a2536c6922f049b20f2c681c652b4dbe077b0a9972e1eeb5573d7ee69d6fc99d4e4894537fac772842763140c5d832bf593a5cc290fd0c641d14d06e564127871808073fb6fd27f2a9995b29abce9351b0b285f4887f1cc8de04d147141af2ed66cfb66fd230e329273710457efc72a8d09487b5c83e77201b28eb38d7d3846b63b1bf1233b5c925303dd3214066c99381b0457a62397c7df27f88e19a884e1dfa6", 0xcd, 0x6}, {&(0x7f0000000640)="8ae3f201063e83beadb088cb1080ef67", 0x10, 0x2a}, {&(0x7f0000000680)="dfeed81fb09a8a0d55f0999ce7730866db77fa306b896464e4d9cf133371563c7eb734eed8ec2dda58c030b96771bb708fba592614b985c573e8f3db424553c6", 0x40, 0x4}, {&(0x7f00000006c0)="f33dec9b5d96888f1504b1385ce82fdf8f2fa76ecc6ebf567753242a4c9129cd4c4885ba8bab1fd3120749889c981acccb344645e9d1ce95826ab7ceac8b7646d2e476e8934ac444aad3bba14f0d4be15675cd3d336db510c72ebbc07a000754d66f5282b1f241556cbd63a30b3d6af0f5c8a2443b03a92bb406abbb5f630ce1ef2afbba93c29e6bc46901a91ea9d91fa6048a468df5934437ca7e9e2a4fe38fddcd2aecac9406aa7adf5de93082ebf1b5c74d76b7b1b72a9b6fea1c5ab7cc1f3e97b5d7e1db9a64df9836ce0863cda956a1e2a45b9479b8ade23e81258e9444dfbf8066562f79", 0xe7, 0x7}, {&(0x7f00000007c0)="cd72eca63713ca8a35c3557b7d56b6a3073ca69e2067c18f5120c05d4ee8", 0x1e, 0x6}], 0x1, &(0x7f0000000a80)={[{@barrier='barrier'}, {@gid={'gid'}}, {@nodecompose='nodecompose'}, {@uid={'uid'}}, {@type={'type', 0x3d, "ae8c9d8f"}}, {@decompose='decompose'}, {@session={'session', 0x3d, 0x25}}], [{@uid_eq={'uid'}}, {@obj_type={'obj_type', 0x3d, 'overlay\x00'}}, {@euid_eq={'euid'}}, {@uid_eq={'uid'}}]}) 11:46:48 executing program 3: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='devtmpfs\x00', 0x0, 0x0) chdir(&(0x7f00000000c0)='./file0\x00') pipe(0x0) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mkdir(0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$hfsplus(&(0x7f0000000140)='hfsplus\x00', &(0x7f0000000200)='./file0\x00', 0x3, 0x7, &(0x7f0000000800)=[{&(0x7f0000000400)="e1ec051c0b7b96db7480b4620be1f7d4adcb21d5233a3d23bf43659e5359470de231dd734b698cd71201837ca57f911328e1aee6b2cb39533b2d549e", 0x3c, 0x101}, {&(0x7f0000000440)="dbac23926131781587488e056e40b191269651683d0d195cbd63543040e313e20126fd634002e0256fed786d07054466250e2de6b7fb6d7d8d5201ac1478ef26aafeae7947832c4cc7fea6315e92eb81c89a385dae378bf89ca53c6984b5aa79a7dcc139938fa64b30d7c24ff7b215c890be5756df2f441d0fcb938cb4c1f89245a47c630a2b5e28bb7b5a9c8c871c45857bc4fa646b30f485beccdf529ad0cd519a0bed9b5c7df28320d9ad7eceb30eda6c964cfcab57c8aa98b89d582792b886e41c9f6146332e31f93b", 0xcb, 0x1ff}, {&(0x7f0000000540)="5c96cd9925cbe6753ba234c06f8040f650bba8d4d4ebe59964acf97c49f7a5e793521ef728d90a4eb42cbe7a2536c6922f049b20f2c681c652b4dbe077b0a9972e1eeb5573d7ee69d6fc99d4e4894537fac772842763140c5d832bf593a5cc290fd0c641d14d06e564127871808073fb6fd27f2a9995b29abce9351b0b285f4887f1cc8de04d147141af2ed66cfb66fd230e329273710457efc72a8d09487b5c83e77201b28eb38d7d3846b63b1bf1233b5c925303dd3214066c99381b0457a62397c7df27f88e19a884e1dfa6", 0xcd, 0x6}, {&(0x7f0000000640)="8ae3f201063e83beadb088cb1080ef67", 0x10, 0x2a}, {&(0x7f0000000680)="dfeed81fb09a8a0d55f0999ce7730866db77fa306b896464e4d9cf133371563c7eb734eed8ec2dda58c030b96771bb708fba592614b985c573e8f3db424553c6", 0x40, 0x4}, {&(0x7f00000006c0)="f33dec9b5d96888f1504b1385ce82fdf8f2fa76ecc6ebf567753242a4c9129cd4c4885ba8bab1fd3120749889c981acccb344645e9d1ce95826ab7ceac8b7646d2e476e8934ac444aad3bba14f0d4be15675cd3d336db510c72ebbc07a000754d66f5282b1f241556cbd63a30b3d6af0f5c8a2443b03a92bb406abbb5f630ce1ef2afbba93c29e6bc46901a91ea9d91fa6048a468df5934437ca7e9e2a4fe38fddcd2aecac9406aa7adf5de93082ebf1b5c74d76b7b1b72a9b6fea1c5ab7cc1f3e97b5d7e1db9a64df9836ce0863cda956a1e2a45b9479b8ade23e81258e9444dfbf8066562f79", 0xe7, 0x7}, {&(0x7f00000007c0)="cd72eca63713ca8a35c3557b7d56b6a3073ca69e2067c18f5120c05d4ee8", 0x1e, 0x6}], 0x1, &(0x7f0000000a80)={[{@barrier='barrier'}, {@gid={'gid'}}, {@nodecompose='nodecompose'}, {@uid={'uid'}}, {@type={'type', 0x3d, "ae8c9d8f"}}, {@decompose='decompose'}, {@session={'session', 0x3d, 0x25}}], [{@uid_eq={'uid'}}, {@obj_type={'obj_type', 0x3d, 'overlay\x00'}}, {@euid_eq={'euid'}}, {@uid_eq={'uid'}}]}) 11:46:48 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x1}, 0x10) r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r0, &(0x7f0000000000)={{0x6, @rose}, [@rose, @rose, @default, @netrom, @bcast, @rose, @rose, @null]}, 0x48) r1 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000080)='/dev/qat_adf_ctl\x00', 0x8200, 0x0) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r1, 0x6, 0x23, &(0x7f00000000c0)={&(0x7f0000ffc000/0x4000)=nil, 0x4000}, &(0x7f0000000140)=0x10) listen(r0, 0x0) unshare(0x40000000) setrlimit(0x0, 0x0) r2 = accept(r0, 0x0, 0x0) write$binfmt_elf64(r2, &(0x7f00000002c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x9, 0x8, 0x0, 0x0, 0x0, 0x4825483b35c83c0b, 0x0, 0x0, 0x40, 0x227}, [{0x4, 0x1, 0xfff, 0x0, 0x0, 0xff8000000002, 0x0, 0x7fff}], "", [[], [], []]}, 0x378) 11:46:48 executing program 0: syz_mount_image$hfsplus(&(0x7f0000000140)='hfsplus\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000a80)={[{@barrier='barrier'}, {@type={'type', 0x3d, "ae8c9d8f"}}], [{@uid_eq={'uid'}}, {@obj_type={'obj_type', 0x3d, 'overlay\x00'}}, {@euid_eq={'euid'}}, {@uid_eq={'uid'}}]}) 11:46:48 executing program 4: r0 = socket$netlink(0x10, 0x3, 0xf) bind$netlink(r0, &(0x7f0000514ff4)={0x10, 0x0, 0x0, 0x2ffffffff}, 0xc) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000000), 0x4) setsockopt$netlink_NETLINK_BROADCAST_ERROR(r0, 0x10e, 0x4, &(0x7f0000000080)=0x6, 0x4) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)={0x14, 0x0, 0x1, 0x0, 0x0, {0x20000000004, 0xe00000000000000}}, 0x14}}, 0x0) 11:46:48 executing program 1: setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) setsockopt$netlink_NETLINK_BROADCAST_ERROR(0xffffffffffffffff, 0x10e, 0x4, 0x0, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000100)={0x0, 0x13, &(0x7f00000001c0)={&(0x7f0000000040)={0x14, 0x23, 0x1, 0x0, 0x0, {0x20000000004, 0xe00000000000000}}, 0x14}}, 0x0) 11:46:48 executing program 5: syz_mount_image$hfsplus(&(0x7f0000000140)='hfsplus\x00', 0x0, 0x3, 0x7, &(0x7f0000000800)=[{&(0x7f0000000400)="e1ec051c0b7b96db7480b4620be1f7d4adcb21d5233a3d23bf43659e5359470de231dd734b698cd71201837ca57f911328e1aee6b2cb39533b2d549e", 0x3c, 0x101}, {&(0x7f0000000440)="dbac23926131781587488e056e40b191269651683d0d195cbd63543040e313e20126fd634002e0256fed786d07054466250e2de6b7fb6d7d8d5201ac1478ef26aafeae7947832c4cc7fea6315e92eb81c89a385dae378bf89ca53c6984b5aa79a7dcc139938fa64b30d7c24ff7b215c890be5756df2f441d0fcb938cb4c1f89245a47c630a2b5e28bb7b5a9c8c871c45857bc4fa646b30f485beccdf529ad0cd519a0bed9b5c7df28320d9ad7eceb30eda6c964cfcab57c8aa98b89d582792b886e41c9f6146332e31f93b", 0xcb, 0x1ff}, {&(0x7f0000000540)="5c96cd9925cbe6753ba234c06f8040f650bba8d4d4ebe59964acf97c49f7a5e793521ef728d90a4eb42cbe7a2536c6922f049b20f2c681c652b4dbe077b0a9972e1eeb5573d7ee69d6fc99d4e4894537fac772842763140c5d832bf593a5cc290fd0c641d14d06e564127871808073fb6fd27f2a9995b29abce9351b0b285f4887f1cc8de04d147141af2ed66cfb66fd230e329273710457efc72a8d09487b5c83e77201b28eb38d7d3846b63b1bf1233b5c925303dd3214066c99381b0457a62397c7df27f88e19a884e1dfa6", 0xcd, 0x6}, {&(0x7f0000000640)="8ae3f201063e83beadb088cb1080ef67", 0x10, 0x2a}, {&(0x7f0000000680)="dfeed81fb09a8a0d55f0999ce7730866db77fa306b896464e4d9cf133371563c7eb734eed8ec2dda58c030b96771bb708fba592614b985c573e8f3db424553c6", 0x40, 0x4}, {&(0x7f00000006c0)="f33dec9b5d96888f1504b1385ce82fdf8f2fa76ecc6ebf567753242a4c9129cd4c4885ba8bab1fd3120749889c981acccb344645e9d1ce95826ab7ceac8b7646d2e476e8934ac444aad3bba14f0d4be15675cd3d336db510c72ebbc07a000754d66f5282b1f241556cbd63a30b3d6af0f5c8a2443b03a92bb406abbb5f630ce1ef2afbba93c29e6bc46901a91ea9d91fa6048a468df5934437ca7e9e2a4fe38fddcd2aecac9406aa7adf5de93082ebf1b5c74d76b7b1b72a9b6fea1c5ab7cc1f3e97b5d7e1db9a64df9836ce0863cda956a1e2a45b9479b8ade23e81258e9444dfbf8066562f79", 0xe7, 0x7}, {&(0x7f00000007c0)="cd72eca63713ca8a35c3557b7d56b6a3073ca69e2067c18f5120c05d4ee8", 0x1e, 0x6}], 0x1, &(0x7f0000000a80)={[{@barrier='barrier'}, {@gid={'gid'}}, {@nodecompose='nodecompose'}, {@uid={'uid'}}, {@type={'type', 0x3d, "ae8c9d8f"}}, {@decompose='decompose'}, {@session={'session', 0x3d, 0x25}}], [{@uid_eq={'uid'}}, {@obj_type={'obj_type', 0x3d, 'overlay\x00'}}, {@euid_eq={'euid'}}, {@uid_eq={'uid'}}]}) 11:46:48 executing program 4: r0 = socket$netlink(0x10, 0x3, 0xf) bind$netlink(r0, &(0x7f0000514ff4)={0x10, 0x0, 0x0, 0x2ffffffff}, 0xc) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000000), 0x4) setsockopt$netlink_NETLINK_BROADCAST_ERROR(r0, 0x10e, 0x4, &(0x7f0000000080)=0x6, 0x4) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)={0x14, 0x23, 0x0, 0x0, 0x0, {0x20000000004, 0xe00000000000000}}, 0x14}}, 0x0) [ 283.858883][T11673] hfsplus: unable to parse mount options [ 283.880226][T11675] IPVS: ftp: loaded support on port[0] = 21 11:46:48 executing program 5: syz_mount_image$hfsplus(&(0x7f0000000140)='hfsplus\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x7, &(0x7f0000000800)=[{&(0x7f0000000400)="e1ec051c0b7b96db7480b4620be1f7d4adcb21d5233a3d23bf43659e5359470de231dd734b698cd71201837ca57f911328e1aee6b2cb39533b2d549e", 0x3c, 0x101}, {&(0x7f0000000440)="dbac23926131781587488e056e40b191269651683d0d195cbd63543040e313e20126fd634002e0256fed786d07054466250e2de6b7fb6d7d8d5201ac1478ef26aafeae7947832c4cc7fea6315e92eb81c89a385dae378bf89ca53c6984b5aa79a7dcc139938fa64b30d7c24ff7b215c890be5756df2f441d0fcb938cb4c1f89245a47c630a2b5e28bb7b5a9c8c871c45857bc4fa646b30f485beccdf529ad0cd519a0bed9b5c7df28320d9ad7eceb30eda6c964cfcab57c8aa98b89d582792b886e41c9f6146332e31f93b", 0xcb, 0x1ff}, {&(0x7f0000000540)="5c96cd9925cbe6753ba234c06f8040f650bba8d4d4ebe59964acf97c49f7a5e793521ef728d90a4eb42cbe7a2536c6922f049b20f2c681c652b4dbe077b0a9972e1eeb5573d7ee69d6fc99d4e4894537fac772842763140c5d832bf593a5cc290fd0c641d14d06e564127871808073fb6fd27f2a9995b29abce9351b0b285f4887f1cc8de04d147141af2ed66cfb66fd230e329273710457efc72a8d09487b5c83e77201b28eb38d7d3846b63b1bf1233b5c925303dd3214066c99381b0457a62397c7df27f88e19a884e1dfa6", 0xcd, 0x6}, {&(0x7f0000000640)="8ae3f201063e83beadb088cb1080ef67", 0x10, 0x2a}, {&(0x7f0000000680)="dfeed81fb09a8a0d55f0999ce7730866db77fa306b896464e4d9cf133371563c7eb734eed8ec2dda58c030b96771bb708fba592614b985c573e8f3db424553c6", 0x40, 0x4}, {&(0x7f00000006c0)="f33dec9b5d96888f1504b1385ce82fdf8f2fa76ecc6ebf567753242a4c9129cd4c4885ba8bab1fd3120749889c981acccb344645e9d1ce95826ab7ceac8b7646d2e476e8934ac444aad3bba14f0d4be15675cd3d336db510c72ebbc07a000754d66f5282b1f241556cbd63a30b3d6af0f5c8a2443b03a92bb406abbb5f630ce1ef2afbba93c29e6bc46901a91ea9d91fa6048a468df5934437ca7e9e2a4fe38fddcd2aecac9406aa7adf5de93082ebf1b5c74d76b7b1b72a9b6fea1c5ab7cc1f3e97b5d7e1db9a64df9836ce0863cda956a1e2a45b9479b8ade23e81258e9444dfbf8066562f79", 0xe7, 0x7}, {&(0x7f00000007c0)="cd72eca63713ca8a35c3557b7d56b6a3073ca69e2067c18f5120c05d4ee8", 0x1e, 0x6}], 0x1, &(0x7f0000000a80)={[{@barrier='barrier'}, {@gid={'gid'}}, {@nodecompose='nodecompose'}, {@uid={'uid'}}, {@type={'type', 0x3d, "ae8c9d8f"}}, {@decompose='decompose'}, {@session={'session', 0x3d, 0x25}}], [{@uid_eq={'uid'}}, {@obj_type={'obj_type', 0x3d, 'overlay\x00'}}, {@euid_eq={'euid'}}, {@uid_eq={'uid'}}]}) 11:46:48 executing program 0: syz_mount_image$hfsplus(&(0x7f0000000140)='hfsplus\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000a80)={[{@barrier='barrier'}, {@type={'type', 0x3d, "ae8c9d8f"}}], [{@uid_eq={'uid'}}, {@obj_type={'obj_type', 0x3d, 'overlay\x00'}}, {@euid_eq={'euid'}}, {@uid_eq={'uid'}}]}) 11:46:49 executing program 1: setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) setsockopt$netlink_NETLINK_BROADCAST_ERROR(0xffffffffffffffff, 0x10e, 0x4, 0x0, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000100)={0x0, 0x14, &(0x7f00000001c0)={&(0x7f0000000040)={0x14, 0x23, 0x1, 0x0, 0x0, {0x20000000004, 0xe00000000000000}}, 0x14}}, 0x0) [ 284.081243][T11679] hfsplus: unable to parse mount options 11:46:49 executing program 4: r0 = socket$netlink(0x10, 0x3, 0xf) bind$netlink(r0, &(0x7f0000514ff4)={0x10, 0x0, 0x0, 0x2ffffffff}, 0xc) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000000), 0x4) setsockopt$netlink_NETLINK_BROADCAST_ERROR(r0, 0x10e, 0x4, &(0x7f0000000080)=0x6, 0x4) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)={0x14, 0x23, 0x0, 0x0, 0x0, {0x20000000004, 0xe00000000000000}}, 0x14}}, 0x0) [ 284.134646][T11688] hfsplus: unable to parse mount options [ 284.270450][T11692] hfsplus: unable to parse mount options 11:46:49 executing program 5: syz_mount_image$hfsplus(&(0x7f0000000140)='hfsplus\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x1, &(0x7f0000000a80)={[{@barrier='barrier'}, {@gid={'gid'}}, {@nodecompose='nodecompose'}, {@uid={'uid'}}, {@type={'type', 0x3d, "ae8c9d8f"}}, {@decompose='decompose'}, {@session={'session', 0x3d, 0x25}}], [{@uid_eq={'uid'}}, {@obj_type={'obj_type', 0x3d, 'overlay\x00'}}, {@euid_eq={'euid'}}, {@uid_eq={'uid'}}]}) 11:46:49 executing program 3: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='devtmpfs\x00', 0x0, 0x0) chdir(&(0x7f00000000c0)='./file0\x00') pipe(0x0) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mkdir(0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$hfsplus(&(0x7f0000000140)='hfsplus\x00', &(0x7f0000000200)='./file0\x00', 0x3, 0x7, &(0x7f0000000800)=[{&(0x7f0000000400)="e1ec051c0b7b96db7480b4620be1f7d4adcb21d5233a3d23bf43659e5359470de231dd734b698cd71201837ca57f911328e1aee6b2cb39533b2d549e", 0x3c, 0x101}, {&(0x7f0000000440)="dbac23926131781587488e056e40b191269651683d0d195cbd63543040e313e20126fd634002e0256fed786d07054466250e2de6b7fb6d7d8d5201ac1478ef26aafeae7947832c4cc7fea6315e92eb81c89a385dae378bf89ca53c6984b5aa79a7dcc139938fa64b30d7c24ff7b215c890be5756df2f441d0fcb938cb4c1f89245a47c630a2b5e28bb7b5a9c8c871c45857bc4fa646b30f485beccdf529ad0cd519a0bed9b5c7df28320d9ad7eceb30eda6c964cfcab57c8aa98b89d582792b886e41c9f6146332e31f93b", 0xcb, 0x1ff}, {&(0x7f0000000540)="5c96cd9925cbe6753ba234c06f8040f650bba8d4d4ebe59964acf97c49f7a5e793521ef728d90a4eb42cbe7a2536c6922f049b20f2c681c652b4dbe077b0a9972e1eeb5573d7ee69d6fc99d4e4894537fac772842763140c5d832bf593a5cc290fd0c641d14d06e564127871808073fb6fd27f2a9995b29abce9351b0b285f4887f1cc8de04d147141af2ed66cfb66fd230e329273710457efc72a8d09487b5c83e77201b28eb38d7d3846b63b1bf1233b5c925303dd3214066c99381b0457a62397c7df27f88e19a884e1dfa6", 0xcd, 0x6}, {&(0x7f0000000640)="8ae3f201063e83beadb088cb1080ef67", 0x10, 0x2a}, {&(0x7f0000000680)="dfeed81fb09a8a0d55f0999ce7730866db77fa306b896464e4d9cf133371563c7eb734eed8ec2dda58c030b96771bb708fba592614b985c573e8f3db424553c6", 0x40, 0x4}, {&(0x7f00000006c0)="f33dec9b5d96888f1504b1385ce82fdf8f2fa76ecc6ebf567753242a4c9129cd4c4885ba8bab1fd3120749889c981acccb344645e9d1ce95826ab7ceac8b7646d2e476e8934ac444aad3bba14f0d4be15675cd3d336db510c72ebbc07a000754d66f5282b1f241556cbd63a30b3d6af0f5c8a2443b03a92bb406abbb5f630ce1ef2afbba93c29e6bc46901a91ea9d91fa6048a468df5934437ca7e9e2a4fe38fddcd2aecac9406aa7adf5de93082ebf1b5c74d76b7b1b72a9b6fea1c5ab7cc1f3e97b5d7e1db9a64df9836ce0863cda956a1e2a45b9479b8ade23e81258e9444dfbf8066562f79", 0xe7, 0x7}, {&(0x7f00000007c0)="cd72eca63713ca8a35c3557b7d56b6a3073ca69e2067c18f5120c05d4ee8", 0x1e, 0x6}], 0x1, &(0x7f0000000a80)={[{@barrier='barrier'}, {@gid={'gid'}}, {@nodecompose='nodecompose'}, {@uid={'uid'}}, {@type={'type', 0x3d, "ae8c9d8f"}}, {@decompose='decompose'}, {@session={'session', 0x3d, 0x25}}], [{@uid_eq={'uid'}}, {@obj_type={'obj_type', 0x3d, 'overlay\x00'}}, {@euid_eq={'euid'}}, {@uid_eq={'uid'}}]}) 11:46:49 executing program 2: bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x1}, 0x10) r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r0, &(0x7f0000000000)={{0x6, @rose}, [@rose, @rose, @default, @netrom, @bcast, @rose, @rose, @null]}, 0x48) r1 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000080)='/dev/qat_adf_ctl\x00', 0x8200, 0x0) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r1, 0x6, 0x23, &(0x7f00000000c0)={&(0x7f0000ffc000/0x4000)=nil, 0x4000}, &(0x7f0000000140)=0x10) listen(r0, 0x0) unshare(0x40000000) setrlimit(0x0, 0x0) r2 = accept(r0, 0x0, 0x0) write$binfmt_elf64(r2, &(0x7f00000002c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x9, 0x8, 0x0, 0x0, 0x0, 0x4825483b35c83c0b, 0x0, 0x0, 0x40, 0x227}, [{0x4, 0x1, 0xfff, 0x0, 0x0, 0xff8000000002, 0x0, 0x7fff}], "", [[], [], []]}, 0x378) 11:46:49 executing program 0: syz_mount_image$hfsplus(&(0x7f0000000140)='hfsplus\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000a80)={[{@gid={'gid'}}, {@type={'type', 0x3d, "ae8c9d8f"}}], [{@uid_eq={'uid'}}, {@obj_type={'obj_type', 0x3d, 'overlay\x00'}}, {@euid_eq={'euid'}}, {@uid_eq={'uid'}}]}) 11:46:49 executing program 4: r0 = socket$netlink(0x10, 0x3, 0xf) bind$netlink(r0, &(0x7f0000514ff4)={0x10, 0x0, 0x0, 0x2ffffffff}, 0xc) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000000), 0x4) setsockopt$netlink_NETLINK_BROADCAST_ERROR(r0, 0x10e, 0x4, &(0x7f0000000080)=0x6, 0x4) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)={0x14, 0x23, 0x0, 0x0, 0x0, {0x20000000004, 0xe00000000000000}}, 0x14}}, 0x0) 11:46:49 executing program 1: setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) setsockopt$netlink_NETLINK_BROADCAST_ERROR(0xffffffffffffffff, 0x10e, 0x4, 0x0, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000100)={0x0, 0x15, &(0x7f00000001c0)={&(0x7f0000000040)={0x14, 0x23, 0x1, 0x0, 0x0, {0x20000000004, 0xe00000000000000}}, 0x14}}, 0x0) [ 284.503961][T11709] hfsplus: unable to parse mount options 11:46:49 executing program 5: syz_mount_image$hfsplus(&(0x7f0000000140)='hfsplus\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000a80)={[{@barrier='barrier'}, {@gid={'gid'}}, {@nodecompose='nodecompose'}, {@uid={'uid'}}, {@type={'type', 0x3d, "ae8c9d8f"}}, {@decompose='decompose'}, {@session={'session', 0x3d, 0x25}}], [{@uid_eq={'uid'}}, {@obj_type={'obj_type', 0x3d, 'overlay\x00'}}, {@euid_eq={'euid'}}, {@uid_eq={'uid'}}]}) [ 284.658635][T11717] hfsplus: unable to parse mount options [ 284.723222][T11727] IPVS: ftp: loaded support on port[0] = 21 11:46:49 executing program 4: r0 = socket$netlink(0x10, 0x3, 0xf) bind$netlink(r0, &(0x7f0000514ff4)={0x10, 0x0, 0x0, 0x2ffffffff}, 0xc) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000000), 0x4) setsockopt$netlink_NETLINK_BROADCAST_ERROR(r0, 0x10e, 0x4, &(0x7f0000000080)=0x6, 0x4) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)={0x14, 0x23, 0x1, 0x0, 0x0, {0x0, 0xe00000000000000}}, 0x14}}, 0x0) [ 284.818581][T11723] hfsplus: unable to parse mount options [ 284.842469][T11732] hfsplus: unable to parse mount options 11:46:49 executing program 0: syz_mount_image$hfsplus(&(0x7f0000000140)='hfsplus\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000a80)={[{@gid={'gid'}}, {@type={'type', 0x3d, "ae8c9d8f"}}], [{@uid_eq={'uid'}}, {@obj_type={'obj_type', 0x3d, 'overlay\x00'}}, {@euid_eq={'euid'}}, {@uid_eq={'uid'}}]}) 11:46:49 executing program 3: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='devtmpfs\x00', 0x0, 0x0) chdir(&(0x7f00000000c0)='./file0\x00') pipe(0x0) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mkdir(0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$hfsplus(&(0x7f0000000140)='hfsplus\x00', &(0x7f0000000200)='./file0\x00', 0x3, 0x7, &(0x7f0000000800)=[{&(0x7f0000000400)="e1ec051c0b7b96db7480b4620be1f7d4adcb21d5233a3d23bf43659e5359470de231dd734b698cd71201837ca57f911328e1aee6b2cb39533b2d549e", 0x3c, 0x101}, {&(0x7f0000000440)="dbac23926131781587488e056e40b191269651683d0d195cbd63543040e313e20126fd634002e0256fed786d07054466250e2de6b7fb6d7d8d5201ac1478ef26aafeae7947832c4cc7fea6315e92eb81c89a385dae378bf89ca53c6984b5aa79a7dcc139938fa64b30d7c24ff7b215c890be5756df2f441d0fcb938cb4c1f89245a47c630a2b5e28bb7b5a9c8c871c45857bc4fa646b30f485beccdf529ad0cd519a0bed9b5c7df28320d9ad7eceb30eda6c964cfcab57c8aa98b89d582792b886e41c9f6146332e31f93b", 0xcb, 0x1ff}, {&(0x7f0000000540)="5c96cd9925cbe6753ba234c06f8040f650bba8d4d4ebe59964acf97c49f7a5e793521ef728d90a4eb42cbe7a2536c6922f049b20f2c681c652b4dbe077b0a9972e1eeb5573d7ee69d6fc99d4e4894537fac772842763140c5d832bf593a5cc290fd0c641d14d06e564127871808073fb6fd27f2a9995b29abce9351b0b285f4887f1cc8de04d147141af2ed66cfb66fd230e329273710457efc72a8d09487b5c83e77201b28eb38d7d3846b63b1bf1233b5c925303dd3214066c99381b0457a62397c7df27f88e19a884e1dfa6", 0xcd, 0x6}, {&(0x7f0000000640)="8ae3f201063e83beadb088cb1080ef67", 0x10, 0x2a}, {&(0x7f0000000680)="dfeed81fb09a8a0d55f0999ce7730866db77fa306b896464e4d9cf133371563c7eb734eed8ec2dda58c030b96771bb708fba592614b985c573e8f3db424553c6", 0x40, 0x4}, {&(0x7f00000006c0)="f33dec9b5d96888f1504b1385ce82fdf8f2fa76ecc6ebf567753242a4c9129cd4c4885ba8bab1fd3120749889c981acccb344645e9d1ce95826ab7ceac8b7646d2e476e8934ac444aad3bba14f0d4be15675cd3d336db510c72ebbc07a000754d66f5282b1f241556cbd63a30b3d6af0f5c8a2443b03a92bb406abbb5f630ce1ef2afbba93c29e6bc46901a91ea9d91fa6048a468df5934437ca7e9e2a4fe38fddcd2aecac9406aa7adf5de93082ebf1b5c74d76b7b1b72a9b6fea1c5ab7cc1f3e97b5d7e1db9a64df9836ce0863cda956a1e2a45b9479b8ade23e81258e9444dfbf8066562f79", 0xe7, 0x7}, {&(0x7f00000007c0)="cd72eca63713ca8a35c3557b7d56b6a3073ca69e2067c18f5120c05d4ee8", 0x1e, 0x6}], 0x1, &(0x7f0000000a80)={[{@barrier='barrier'}, {@gid={'gid'}}, {@nodecompose='nodecompose'}, {@uid={'uid'}}, {@type={'type', 0x3d, "ae8c9d8f"}}, {@decompose='decompose'}, {@session={'session', 0x3d, 0x25}}], [{@uid_eq={'uid'}}, {@obj_type={'obj_type', 0x3d, 'overlay\x00'}}, {@euid_eq={'euid'}}, {@uid_eq={'uid'}}]}) 11:46:50 executing program 1: setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) setsockopt$netlink_NETLINK_BROADCAST_ERROR(0xffffffffffffffff, 0x10e, 0x4, 0x0, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000100)={0x0, 0x16, &(0x7f00000001c0)={&(0x7f0000000040)={0x14, 0x23, 0x1, 0x0, 0x0, {0x20000000004, 0xe00000000000000}}, 0x14}}, 0x0) [ 285.067394][T11745] hfsplus: unable to parse mount options 11:46:50 executing program 5: syz_mount_image$hfsplus(&(0x7f0000000140)='hfsplus\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 11:46:50 executing program 0: syz_mount_image$hfsplus(&(0x7f0000000140)='hfsplus\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000a80)={[{@gid={'gid'}}, {@type={'type', 0x3d, "ae8c9d8f"}}], [{@uid_eq={'uid'}}, {@obj_type={'obj_type', 0x3d, 'overlay\x00'}}, {@euid_eq={'euid'}}, {@uid_eq={'uid'}}]}) 11:46:50 executing program 4: r0 = socket$netlink(0x10, 0x3, 0xf) bind$netlink(r0, &(0x7f0000514ff4)={0x10, 0x0, 0x0, 0x2ffffffff}, 0xc) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000000), 0x4) setsockopt$netlink_NETLINK_BROADCAST_ERROR(r0, 0x10e, 0x4, &(0x7f0000000080)=0x6, 0x4) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)={0x14, 0x23, 0x1, 0x0, 0x0, {0x0, 0xe00000000000000}}, 0x14}}, 0x0) [ 285.301727][T11751] hfsplus: unable to parse mount options 11:46:50 executing program 2: bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x1}, 0x10) r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r0, &(0x7f0000000000)={{0x6, @rose}, [@rose, @rose, @default, @netrom, @bcast, @rose, @rose, @null]}, 0x48) r1 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000080)='/dev/qat_adf_ctl\x00', 0x8200, 0x0) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r1, 0x6, 0x23, &(0x7f00000000c0)={&(0x7f0000ffc000/0x4000)=nil, 0x4000}, &(0x7f0000000140)=0x10) listen(r0, 0x0) unshare(0x40000000) setrlimit(0x0, 0x0) r2 = accept(r0, 0x0, 0x0) write$binfmt_elf64(r2, &(0x7f00000002c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x9, 0x8, 0x0, 0x0, 0x0, 0x4825483b35c83c0b, 0x0, 0x0, 0x40, 0x227}, [{0x4, 0x1, 0xfff, 0x0, 0x0, 0xff8000000002, 0x0, 0x7fff}], "", [[], [], []]}, 0x378) [ 285.367298][T11761] hfsplus: unable to find HFS+ superblock 11:46:50 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x14e24}, 0x1c) recvmmsg(r0, &(0x7f0000003700)=[{{&(0x7f00000000c0)=@ax25={{0x3, @null}, [@default, @default, @rose, @remote, @default, @null, @remote, @null]}, 0x80, 0x0}}, {{0x0, 0x0, 0x0}}], 0x2, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x1000000000004e24, 0x0, @ipv4={[], [], @loopback}}, 0x1c) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") sendmmsg(r0, &(0x7f00000092c0), 0x4ff, 0x0) [ 285.518614][T11765] hfsplus: unable to parse mount options 11:46:50 executing program 5: syz_mount_image$hfsplus(&(0x7f0000000140)='hfsplus\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 11:46:50 executing program 4: r0 = socket$netlink(0x10, 0x3, 0xf) bind$netlink(r0, &(0x7f0000514ff4)={0x10, 0x0, 0x0, 0x2ffffffff}, 0xc) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000000), 0x4) setsockopt$netlink_NETLINK_BROADCAST_ERROR(r0, 0x10e, 0x4, &(0x7f0000000080)=0x6, 0x4) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)={0x14, 0x23, 0x1, 0x0, 0x0, {0x0, 0xe00000000000000}}, 0x14}}, 0x0) [ 285.630826][T11777] IPVS: ftp: loaded support on port[0] = 21 11:46:50 executing program 0: syz_mount_image$hfsplus(&(0x7f0000000140)='hfsplus\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000a80)={[{@barrier='barrier'}, {@gid={'gid'}}, {@type={'type', 0x3d, "ae8c9d8f"}}], [{@uid_eq={'uid'}}, {@obj_type={'obj_type', 0x3d, 'overlay\x00'}}, {@euid_eq={'euid'}}]}) 11:46:50 executing program 1: setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) setsockopt$netlink_NETLINK_BROADCAST_ERROR(0xffffffffffffffff, 0x10e, 0x4, 0x0, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000100)={0x0, 0x17, &(0x7f00000001c0)={&(0x7f0000000040)={0x14, 0x23, 0x1, 0x0, 0x0, {0x20000000004, 0xe00000000000000}}, 0x14}}, 0x0) [ 285.847509][T11788] hfsplus: unable to find HFS+ superblock 11:46:50 executing program 5: syz_mount_image$hfsplus(&(0x7f0000000140)='hfsplus\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) [ 285.947408][T11791] hfsplus: unable to parse mount options 11:46:51 executing program 4: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) 11:46:51 executing program 0: syz_mount_image$hfsplus(&(0x7f0000000140)='hfsplus\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000a80)={[{@barrier='barrier'}, {@gid={'gid'}}, {@type={'type', 0x3d, "ae8c9d8f"}}], [{@uid_eq={'uid'}}, {@obj_type={'obj_type', 0x3d, 'overlay\x00'}}]}) 11:46:51 executing program 2: bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x1}, 0x10) r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r0, &(0x7f0000000000)={{0x6, @rose}, [@rose, @rose, @default, @netrom, @bcast, @rose, @rose, @null]}, 0x48) r1 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000080)='/dev/qat_adf_ctl\x00', 0x8200, 0x0) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r1, 0x6, 0x23, &(0x7f00000000c0)={&(0x7f0000ffc000/0x4000)=nil, 0x4000}, &(0x7f0000000140)=0x10) listen(r0, 0x0) unshare(0x40000000) setrlimit(0x0, 0x0) r2 = accept(r0, 0x0, 0x0) write$binfmt_elf64(r2, &(0x7f00000002c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x9, 0x8, 0x0, 0x0, 0x0, 0x4825483b35c83c0b, 0x0, 0x0, 0x40, 0x227}, [{0x4, 0x1, 0xfff, 0x0, 0x0, 0xff8000000002, 0x0, 0x7fff}], "", [[], [], []]}, 0x378) 11:46:51 executing program 1: setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) setsockopt$netlink_NETLINK_BROADCAST_ERROR(0xffffffffffffffff, 0x10e, 0x4, 0x0, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000100)={0x0, 0x18, &(0x7f00000001c0)={&(0x7f0000000040)={0x14, 0x23, 0x1, 0x0, 0x0, {0x20000000004, 0xe00000000000000}}, 0x14}}, 0x0) 11:46:51 executing program 4: creat(&(0x7f0000051ac0)='./file0\x00', 0x0) r0 = open(&(0x7f0000000080)='.\x00', 0x0, 0x0) fchmodat(r0, &(0x7f00000002c0)='./file0\x00', 0xe0) [ 286.238825][T11805] hfsplus: unable to find HFS+ superblock [ 286.326908][T11810] hfsplus: unable to parse mount options 11:46:51 executing program 5: syz_mount_image$hfsplus(&(0x7f0000000140)='hfsplus\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000a80)={[{@barrier='barrier'}, {@gid={'gid'}}, {@nodecompose='nodecompose'}, {@uid={'uid'}}, {@type={'type', 0x3d, "ae8c9d8f"}}, {@decompose='decompose'}], [{@uid_eq={'uid'}}, {@obj_type={'obj_type', 0x3d, 'overlay\x00'}}, {@euid_eq={'euid'}}, {@uid_eq={'uid'}}]}) [ 286.380603][T11819] IPVS: ftp: loaded support on port[0] = 21 [ 286.570219][T11828] hfsplus: unable to parse mount options 11:46:51 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) sendmsg$alg(0xffffffffffffffff, &(0x7f00000016c0)={0x0, 0x0, &(0x7f0000001700)=[{&(0x7f0000000040)="7a3ba45dd4bc75601b2bc3a1c5686b0071dfbbea77eea12d1ddeffd5a0d63c214466c58ad21035813129423b285561ceea4311a78771616ff6aebe1b58dde599f7b618b6", 0x44}], 0x1}, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000400)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_REGISTER_COALESCED_MMIO(r1, 0x4010ae67, &(0x7f00000001c0)={0x0, 0x119000}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, 0x0, 0xfefd, 0x0, 0x0, 0xfffffffffffffd9c) finit_module(0xffffffffffffffff, &(0x7f0000000000)='/dev/kvm\x00', 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) 11:46:51 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") r1 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000000)={'batadv0\x00', 0x0}) bind$packet(r1, &(0x7f0000000640)={0x11, 0x0, r2, 0x1, 0x0, 0x6, @link_local}, 0x14) sendmmsg(r1, &(0x7f00000068c0)=[{{0x0, 0x0, &(0x7f0000002900)=[{&(0x7f0000001740)="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", 0x5eb}], 0x1}}, {{0x0, 0x0, 0x0}}], 0x2, 0x28f0ab5f38276a17) 11:46:51 executing program 0: syz_mount_image$hfsplus(&(0x7f0000000140)='hfsplus\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000a80)={[{@barrier='barrier'}, {@gid={'gid'}}, {@type={'type', 0x3d, "ae8c9d8f"}}], [{@uid_eq={'uid'}}]}) 11:46:51 executing program 1: setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) setsockopt$netlink_NETLINK_BROADCAST_ERROR(0xffffffffffffffff, 0x10e, 0x4, 0x0, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000100)={0x0, 0x19, &(0x7f00000001c0)={&(0x7f0000000040)={0x14, 0x23, 0x1, 0x0, 0x0, {0x20000000004, 0xe00000000000000}}, 0x14}}, 0x0) 11:46:51 executing program 5: syz_mount_image$hfsplus(&(0x7f0000000140)='hfsplus\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000a80)={[{@barrier='barrier'}, {@gid={'gid'}}, {@nodecompose='nodecompose'}, {@uid={'uid'}}, {@type={'type', 0x3d, "ae8c9d8f"}}], [{@uid_eq={'uid'}}, {@obj_type={'obj_type', 0x3d, 'overlay\x00'}}, {@euid_eq={'euid'}}, {@uid_eq={'uid'}}]}) 11:46:51 executing program 2: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x1}, 0x10) r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r0, &(0x7f0000000000)={{0x6, @rose}, [@rose, @rose, @default, @netrom, @bcast, @rose, @rose, @null]}, 0x48) r1 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000080)='/dev/qat_adf_ctl\x00', 0x8200, 0x0) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r1, 0x6, 0x23, &(0x7f00000000c0)={&(0x7f0000ffc000/0x4000)=nil, 0x4000}, &(0x7f0000000140)=0x10) listen(r0, 0x0) unshare(0x40000000) setrlimit(0x0, 0x0) r2 = accept(r0, 0x0, 0x0) write$binfmt_elf64(r2, &(0x7f00000002c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x9, 0x8, 0x0, 0x0, 0x0, 0x4825483b35c83c0b, 0x0, 0x0, 0x40, 0x227}, [{0x4, 0x1, 0xfff, 0x0, 0x0, 0xff8000000002, 0x0, 0x7fff}], "", [[], [], []]}, 0x378) [ 286.908423][T11841] hfsplus: unable to find HFS+ superblock 11:46:51 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)=0x1) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000040)=0x1) [ 287.021531][T11855] IPVS: ftp: loaded support on port[0] = 21 [ 287.029109][T11849] hfsplus: unable to parse mount options 11:46:52 executing program 1: setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) setsockopt$netlink_NETLINK_BROADCAST_ERROR(0xffffffffffffffff, 0x10e, 0x4, 0x0, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000100)={0x0, 0x1a, &(0x7f00000001c0)={&(0x7f0000000040)={0x14, 0x23, 0x1, 0x0, 0x0, {0x20000000004, 0xe00000000000000}}, 0x14}}, 0x0) 11:46:52 executing program 0: syz_mount_image$hfsplus(&(0x7f0000000140)='hfsplus\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000a80)={[{@barrier='barrier'}, {@gid={'gid'}}, {@type={'type', 0x3d, "ae8c9d8f"}}]}) 11:46:52 executing program 5: syz_mount_image$hfsplus(&(0x7f0000000140)='hfsplus\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000a80)={[{@barrier='barrier'}, {@gid={'gid'}}, {@nodecompose='nodecompose'}, {@uid={'uid'}}], [{@uid_eq={'uid'}}, {@obj_type={'obj_type', 0x3d, 'overlay\x00'}}, {@euid_eq={'euid'}}, {@uid_eq={'uid'}}]}) [ 287.371000][T11871] hfsplus: unable to find HFS+ superblock [ 287.389232][T11877] hfsplus: unable to parse mount options 11:46:52 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) sendmsg$alg(0xffffffffffffffff, &(0x7f00000016c0)={0x0, 0x0, &(0x7f0000001700)=[{&(0x7f0000000040)="7a3ba45dd4bc75601b2bc3a1c5686b0071dfbbea77eea12d1ddeffd5a0d63c214466c58ad21035813129423b285561ceea4311a78771616ff6aebe1b58dde599f7b618b6", 0x44}], 0x1}, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000400)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_REGISTER_COALESCED_MMIO(r1, 0x4010ae67, &(0x7f00000001c0)={0x0, 0x119000}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, 0x0, 0xfefd, 0x0, 0x0, 0xfffffffffffffd9c) finit_module(0xffffffffffffffff, &(0x7f0000000000)='/dev/kvm\x00', 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) 11:46:52 executing program 1: setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) setsockopt$netlink_NETLINK_BROADCAST_ERROR(0xffffffffffffffff, 0x10e, 0x4, 0x0, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000100)={0x0, 0x1b, &(0x7f00000001c0)={&(0x7f0000000040)={0x14, 0x23, 0x1, 0x0, 0x0, {0x20000000004, 0xe00000000000000}}, 0x14}}, 0x0) 11:46:52 executing program 2: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x1}, 0x10) r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r0, &(0x7f0000000000)={{0x6, @rose}, [@rose, @rose, @default, @netrom, @bcast, @rose, @rose, @null]}, 0x48) r1 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000080)='/dev/qat_adf_ctl\x00', 0x8200, 0x0) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r1, 0x6, 0x23, &(0x7f00000000c0)={&(0x7f0000ffc000/0x4000)=nil, 0x4000}, &(0x7f0000000140)=0x10) listen(r0, 0x0) unshare(0x40000000) setrlimit(0x0, 0x0) r2 = accept(r0, 0x0, 0x0) write$binfmt_elf64(r2, &(0x7f00000002c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x9, 0x8, 0x0, 0x0, 0x0, 0x4825483b35c83c0b, 0x0, 0x0, 0x40, 0x227}, [{0x4, 0x1, 0xfff, 0x0, 0x0, 0xff8000000002, 0x0, 0x7fff}], "", [[], [], []]}, 0x378) 11:46:52 executing program 5: syz_mount_image$hfsplus(&(0x7f0000000140)='hfsplus\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000a80)={[{@barrier='barrier'}, {@gid={'gid'}}, {@nodecompose='nodecompose'}, {@uid={'uid'}}], [{@uid_eq={'uid'}}, {@obj_type={'obj_type', 0x3d, 'overlay\x00'}}, {@euid_eq={'euid'}}, {@uid_eq={'uid'}}]}) 11:46:52 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000580)={[{@gid={'gid'}}]}) 11:46:52 executing program 4: shmctl$IPC_STAT(0x0, 0x2, &(0x7f0000000300)=""/198) [ 287.995675][T11923] IPVS: ftp: loaded support on port[0] = 21 [ 288.111474][T11936] hfsplus: unable to parse mount options [ 288.245728][T11943] hfs: can't find a HFS filesystem on dev loop0 11:46:53 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1}, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) r1 = getegid() fchown(r0, 0xee01, r1) connect$inet6(r0, &(0x7f0000000140)={0xa, 0x0, 0x0, @local, 0x100000001}, 0x1c) sendmmsg(r0, &(0x7f00000092c0), 0x400000000000064, 0x0) recvfrom(r0, &(0x7f0000000000)=""/219, 0xdb, 0x1, &(0x7f0000000180)=@sco={0x1f, {0x6, 0x40, 0x81, 0x7, 0x31, 0xde}}, 0x80) 11:46:53 executing program 5: syz_mount_image$hfsplus(&(0x7f0000000140)='hfsplus\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000a80)={[{@barrier='barrier'}, {@gid={'gid'}}, {@nodecompose='nodecompose'}, {@uid={'uid'}}], [{@uid_eq={'uid'}}, {@obj_type={'obj_type', 0x3d, 'overlay\x00'}}, {@euid_eq={'euid'}}, {@uid_eq={'uid'}}]}) 11:46:53 executing program 1: setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) setsockopt$netlink_NETLINK_BROADCAST_ERROR(0xffffffffffffffff, 0x10e, 0x4, 0x0, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000100)={0x0, 0x1c, &(0x7f00000001c0)={&(0x7f0000000040)={0x14, 0x23, 0x1, 0x0, 0x0, {0x20000000004, 0xe00000000000000}}, 0x14}}, 0x0) [ 288.415613][T11948] hfs: can't find a HFS filesystem on dev loop0 11:46:53 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000580)={[{@gid={'gid'}}]}) [ 288.756476][T11955] hfsplus: unable to parse mount options 11:46:53 executing program 2: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x1}, 0x10) r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r0, &(0x7f0000000000)={{0x6, @rose}, [@rose, @rose, @default, @netrom, @bcast, @rose, @rose, @null]}, 0x48) r1 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000080)='/dev/qat_adf_ctl\x00', 0x8200, 0x0) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r1, 0x6, 0x23, &(0x7f00000000c0)={&(0x7f0000ffc000/0x4000)=nil, 0x4000}, &(0x7f0000000140)=0x10) listen(r0, 0x0) unshare(0x40000000) setrlimit(0x0, 0x0) r2 = accept(r0, 0x0, 0x0) write$binfmt_elf64(r2, &(0x7f00000002c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x9, 0x8, 0x0, 0x0, 0x0, 0x4825483b35c83c0b, 0x0, 0x0, 0x40, 0x227}, [{0x4, 0x1, 0xfff, 0x0, 0x0, 0xff8000000002, 0x0, 0x7fff}], "", [[], [], []]}, 0x378) 11:46:53 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1100008912, &(0x7f0000000040)="11dca50d810bcfe47bf070") r1 = syz_open_dev$usb(&(0x7f0000000200)='/dev/bus/usb/00#/00#\x00', 0x40000fffffc, 0x200000000000042) mmap$binder(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x1, 0x11, r1, 0x0) ioctl$FS_IOC_FSGETXATTR(r1, 0x8038550a, &(0x7f0000000000)={0x2, 0x0, 0x0, 0x0, 0x1000020fff000, 0x7ff0bdbe}) [ 289.011286][T11965] hfs: can't find a HFS filesystem on dev loop0 11:46:54 executing program 5: syz_mount_image$hfsplus(&(0x7f0000000140)='hfsplus\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000a80)={[{@barrier='barrier'}, {@gid={'gid'}}, {@nodecompose='nodecompose'}, {@type={'type', 0x3d, "ae8c9d8f"}}], [{@uid_eq={'uid'}}, {@obj_type={'obj_type', 0x3d, 'overlay\x00'}}, {@euid_eq={'euid'}}, {@uid_eq={'uid'}}]}) 11:46:54 executing program 1: setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) setsockopt$netlink_NETLINK_BROADCAST_ERROR(0xffffffffffffffff, 0x10e, 0x4, 0x0, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000100)={0x0, 0x1d, &(0x7f00000001c0)={&(0x7f0000000040)={0x14, 0x23, 0x1, 0x0, 0x0, {0x20000000004, 0xe00000000000000}}, 0x14}}, 0x0) [ 289.230221][ T26] audit: type=1400 audit(1569671214.157:107): avc: denied { map } for pid=11975 comm="syz-executor.3" path="/dev/bus/usb/006/001" dev="devtmpfs" ino=18314 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:usb_device_t:s0 tclass=chr_file permissive=1 11:46:54 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000580)={[{@gid={'gid'}}]}) [ 289.288734][T11977] IPVS: ftp: loaded support on port[0] = 21 [ 289.289066][T11981] vhci_hcd: default hub control req: 0000 v0000 i0000 l0 [ 289.403157][T11976] vhci_hcd: default hub control req: 0000 v0000 i0000 l0 [ 289.451156][T11984] hfsplus: unable to parse mount options 11:46:54 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1100008912, &(0x7f0000000040)="11dca50d810bcfe47bf070") r1 = syz_open_dev$usb(&(0x7f0000000200)='/dev/bus/usb/00#/00#\x00', 0x40000fffffc, 0x200000000000042) mmap$binder(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x1, 0x11, r1, 0x0) ioctl$FS_IOC_FSGETXATTR(r1, 0x8038550a, &(0x7f0000000000)={0x2, 0x0, 0x0, 0x0, 0x1000020fff000, 0x7ff0bdbe}) 11:46:54 executing program 5: syz_mount_image$hfsplus(&(0x7f0000000140)='hfsplus\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000a80)={[{@barrier='barrier'}, {@gid={'gid'}}, {@type={'type', 0x3d, "ae8c9d8f"}}], [{@uid_eq={'uid'}}, {@obj_type={'obj_type', 0x3d, 'overlay\x00'}}, {@euid_eq={'euid'}}, {@uid_eq={'uid'}}]}) [ 289.681880][T11990] hfs: can't find a HFS filesystem on dev loop0 11:46:54 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1}, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) r1 = getegid() fchown(r0, 0xee01, r1) connect$inet6(r0, &(0x7f0000000140)={0xa, 0x0, 0x0, @local, 0x100000001}, 0x1c) sendmmsg(r0, &(0x7f00000092c0), 0x400000000000064, 0x0) recvfrom(r0, &(0x7f0000000000)=""/219, 0xdb, 0x1, &(0x7f0000000180)=@sco={0x1f, {0x6, 0x40, 0x81, 0x7, 0x31, 0xde}}, 0x80) 11:46:54 executing program 0: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$sock_int(r0, 0x1, 0xf, &(0x7f0000d1c000)=0x6, 0x4) bind$inet6(r0, &(0x7f0000f67fe4)={0xa, 0x4e20}, 0x1c) r1 = socket$inet6(0xa, 0x2, 0x0) setsockopt$sock_int(r1, 0x1, 0xf, &(0x7f0000f59ffc)=0x4, 0x4) bind$inet6(r1, &(0x7f0000000480)={0xa, 0x4e20, 0x0, @mcast1={0xff, 0x3}}, 0x1c) [ 290.051952][T11998] vhci_hcd: default hub control req: 0000 v0000 i0000 l0 [ 290.104407][T12004] hfsplus: unable to parse mount options 11:46:55 executing program 1: setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) setsockopt$netlink_NETLINK_BROADCAST_ERROR(0xffffffffffffffff, 0x10e, 0x4, 0x0, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000100)={0x0, 0x1e, &(0x7f00000001c0)={&(0x7f0000000040)={0x14, 0x23, 0x1, 0x0, 0x0, {0x20000000004, 0xe00000000000000}}, 0x14}}, 0x0) 11:46:55 executing program 5: syz_mount_image$hfsplus(&(0x7f0000000140)='hfsplus\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000a80)={[{@barrier='barrier'}, {@type={'type', 0x3d, "ae8c9d8f"}}], [{@uid_eq={'uid'}}, {@obj_type={'obj_type', 0x3d, 'overlay\x00'}}, {@euid_eq={'euid'}}, {@uid_eq={'uid'}}]}) 11:46:55 executing program 3: socket$inet(0x2b, 0x1, 0x0) pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000480)='/dev/sequencer2\x00', 0x0, 0x0) socket$kcm(0x10, 0x2, 0x10) write(r1, &(0x7f0000000340), 0x41395527) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clock_gettime(0x0, 0x0) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1ff}, 0x0, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) [ 290.823188][T12027] hfsplus: unable to parse mount options 11:46:58 executing program 2: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x1}, 0x10) r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r0, &(0x7f0000000000)={{0x6, @rose}, [@rose, @rose, @default, @netrom, @bcast, @rose, @rose, @null]}, 0x48) r1 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000080)='/dev/qat_adf_ctl\x00', 0x8200, 0x0) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r1, 0x6, 0x23, &(0x7f00000000c0)={&(0x7f0000ffc000/0x4000)=nil, 0x4000}, &(0x7f0000000140)=0x10) listen(r0, 0x0) unshare(0x40000000) setrlimit(0x0, 0x0) r2 = accept(r0, 0x0, 0x0) write$binfmt_elf64(r2, &(0x7f00000002c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x9, 0x8, 0x0, 0x0, 0x0, 0x4825483b35c83c0b, 0x0, 0x0, 0x40, 0x227}, [{0x4, 0x1, 0xfff, 0x0, 0x0, 0xff8000000002, 0x0, 0x7fff}], "", [[], [], []]}, 0x378) 11:46:58 executing program 4: r0 = socket$kcm(0xa, 0x2, 0x11) sendmsg$kcm(r0, &(0x7f0000003d00)={&(0x7f0000000380)=@in={0x2, 0x4e23, @multicast1}, 0x80, 0x0}, 0x0) 11:46:58 executing program 1: setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) setsockopt$netlink_NETLINK_BROADCAST_ERROR(0xffffffffffffffff, 0x10e, 0x4, 0x0, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000100)={0x0, 0x21, &(0x7f00000001c0)={&(0x7f0000000040)={0x14, 0x23, 0x1, 0x0, 0x0, {0x20000000004, 0xe00000000000000}}, 0x14}}, 0x0) 11:46:58 executing program 3: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000480)='\x00\xea\\9\x1b|\xc9$\xa21w\xd3k\xa4D\xd3\x19$\xa8\x81_;\x93\x13\xd3\xdb\x10\xc4\xdcc9\xda\x03[\x19\xef|\xaf/') getdents64(r0, &(0x7f0000001440)=""/4096, 0x1000) 11:46:58 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='ns\x00') getdents(r0, &(0x7f0000000440)=""/46, 0x51) 11:46:58 executing program 3: r0 = socket$inet(0x2, 0x100000000805, 0x0) listen(r0, 0x40000004) sendmsg$inet_sctp(r0, &(0x7f0000000540)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@dstaddrv4={0x12, 0x84, 0x6, @remote}], 0x18}, 0x0) 11:46:58 executing program 4: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) listen(r0, 0x4000000043) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) sendto$inet6(r1, &(0x7f000087dffe)='F', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r2 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r2, 0x84, 0x9, &(0x7f00000000c0)={0x0, @in6, 0x18, 0x0, 0x0, 0x0, 0x5}, 0x98) 11:46:58 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000004c0)={'\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00\x00\r', 0x20000005002}) ioctl$TUNGETIFF(r0, 0x800454d2, &(0x7f0000000000)) 11:46:58 executing program 1: setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) setsockopt$netlink_NETLINK_BROADCAST_ERROR(0xffffffffffffffff, 0x10e, 0x4, 0x0, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000100)={0x0, 0x22, &(0x7f00000001c0)={&(0x7f0000000040)={0x14, 0x23, 0x1, 0x0, 0x0, {0x20000000004, 0xe00000000000000}}, 0x14}}, 0x0) [ 293.357391][T12063] IPVS: ftp: loaded support on port[0] = 21 11:46:58 executing program 5: syz_mount_image$hfsplus(&(0x7f0000000140)='hfsplus\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000a80)={[{@barrier='barrier'}, {@type={'type', 0x3d, "ae8c9d8f"}}], [{@uid_eq={'uid'}}, {@obj_type={'obj_type', 0x3d, 'overlay\x00'}}, {@euid_eq={'euid'}}, {@uid_eq={'uid'}}]}) 11:46:58 executing program 3: r0 = socket$inet(0x2, 0x100000000805, 0x0) listen(r0, 0x40000004) sendmsg$inet_sctp(r0, &(0x7f0000000540)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@prinfo={0x18, 0x84, 0x5, {0x30}}], 0x18}, 0x0) [ 293.630077][T12088] hfsplus: unable to parse mount options 11:46:58 executing program 1: setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) setsockopt$netlink_NETLINK_BROADCAST_ERROR(0xffffffffffffffff, 0x10e, 0x4, 0x0, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000100)={0x0, 0x23, &(0x7f00000001c0)={&(0x7f0000000040)={0x14, 0x23, 0x1, 0x0, 0x0, {0x20000000004, 0xe00000000000000}}, 0x14}}, 0x0) 11:46:58 executing program 5: syz_mount_image$hfsplus(&(0x7f0000000140)='hfsplus\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000a80)={[{@barrier='barrier'}, {@type={'type', 0x3d, "ae8c9d8f"}}], [{@uid_eq={'uid'}}, {@obj_type={'obj_type', 0x3d, 'overlay\x00'}}, {@euid_eq={'euid'}}, {@uid_eq={'uid'}}]}) 11:46:58 executing program 2: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x1}, 0x10) r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r0, &(0x7f0000000000)={{0x6, @rose}, [@rose, @rose, @default, @netrom, @bcast, @rose, @rose, @null]}, 0x48) r1 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000080)='/dev/qat_adf_ctl\x00', 0x8200, 0x0) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r1, 0x6, 0x23, &(0x7f00000000c0)={&(0x7f0000ffc000/0x4000)=nil, 0x4000}, &(0x7f0000000140)=0x10) listen(r0, 0x0) unshare(0x40000000) setrlimit(0x0, 0x0) r2 = accept(r0, 0x0, 0x0) write$binfmt_elf64(r2, &(0x7f00000002c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x9, 0x8, 0x0, 0x0, 0x0, 0x4825483b35c83c0b, 0x0, 0x0, 0x40, 0x227}, [{0x4, 0x1, 0xfff, 0x0, 0x0, 0xff8000000002, 0x0, 0x7fff}], "", [[], [], []]}, 0x378) 11:46:58 executing program 0: syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000004c0)={[{@grpid='grpid'}]}) 11:46:58 executing program 3: r0 = perf_event_open(&(0x7f0000000240)={0x1, 0x70, 0x5, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1124, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x20}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x0, 0x11, r1, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r1) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r2, &(0x7f00000000c0)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r2, 0x0, 0xfffffffffffffff8, 0x200007fe, &(0x7f0000000100)={0x2, 0x10004e23, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) sendto$inet(r2, &(0x7f0000d7cfcb), 0xffffffffffffffef, 0x0, 0x0, 0x9000000) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) [ 293.932428][T12107] IPVS: ftp: loaded support on port[0] = 21 [ 293.960724][T12112] hfsplus: unable to parse mount options [ 294.012020][T12108] XFS (loop0): Invalid superblock magic number 11:46:59 executing program 5: syz_mount_image$hfsplus(&(0x7f0000000140)='hfsplus\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000a80)={[{@gid={'gid'}}, {@type={'type', 0x3d, "ae8c9d8f"}}], [{@uid_eq={'uid'}}, {@obj_type={'obj_type', 0x3d, 'overlay\x00'}}, {@euid_eq={'euid'}}, {@uid_eq={'uid'}}]}) 11:46:59 executing program 1: setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) setsockopt$netlink_NETLINK_BROADCAST_ERROR(0xffffffffffffffff, 0x10e, 0x4, 0x0, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000100)={0x0, 0x24, &(0x7f00000001c0)={&(0x7f0000000040)={0x14, 0x23, 0x1, 0x0, 0x0, {0x20000000004, 0xe00000000000000}}, 0x14}}, 0x0) 11:46:59 executing program 4: r0 = socket(0x11, 0x803, 0x300) syz_emit_ethernet(0x36, &(0x7f00000000c0)=ANY=[@ANYBLOB="aaaaaaaaaa00aaaaaaaaaaaa080045000028000000fc0000060000000000000023bb0e00907800000000000000000000bbd538617b40"], 0x0) setsockopt$sock_int(r0, 0x1, 0x1d, &(0x7f0000000240)=0x7, 0x4) recvmmsg(r0, &(0x7f0000000780)=[{{&(0x7f0000000000)=@ax25={{0x3, @default}, [@default, @bcast, @remote, @null, @rose, @default, @bcast]}, 0x80, 0x0}}], 0x1, 0x0, 0x0) 11:46:59 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000013000/0x18000)=nil, &(0x7f0000000000)=[@text32={0x20, &(0x7f0000000100)="660f2b71ed0f20e035000200000f22e0b9020300000f320f795700f30f060f225b0f080fc77700b9a90b00000f32f36d", 0x30}], 0x1, 0x0, 0x0, 0x0) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r3, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r4, 0x4090ae82, &(0x7f0000000280)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4cb], 0x200001}) ioctl$KVM_RUN(r4, 0xae80, 0x0) 11:46:59 executing program 2: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x1}, 0x10) r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r0, &(0x7f0000000000)={{0x6, @rose}, [@rose, @rose, @default, @netrom, @bcast, @rose, @rose, @null]}, 0x48) r1 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000080)='/dev/qat_adf_ctl\x00', 0x8200, 0x0) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r1, 0x6, 0x23, &(0x7f00000000c0)={&(0x7f0000ffc000/0x4000)=nil, 0x4000}, &(0x7f0000000140)=0x10) listen(r0, 0x0) unshare(0x40000000) setrlimit(0x0, 0x0) r2 = accept(r0, 0x0, 0x0) write$binfmt_elf64(r2, &(0x7f00000002c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x9, 0x8, 0x0, 0x0, 0x0, 0x4825483b35c83c0b, 0x0, 0x0, 0x40, 0x227}, [{0x4, 0x1, 0xfff, 0x0, 0x0, 0xff8000000002, 0x0, 0x7fff}], "", [[], [], []]}, 0x378) [ 294.382554][T12134] hfsplus: unable to parse mount options 11:46:59 executing program 1: setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) setsockopt$netlink_NETLINK_BROADCAST_ERROR(0xffffffffffffffff, 0x10e, 0x4, 0x0, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000100)={0x0, 0x25, &(0x7f00000001c0)={&(0x7f0000000040)={0x14, 0x23, 0x1, 0x0, 0x0, {0x20000000004, 0xe00000000000000}}, 0x14}}, 0x0) 11:46:59 executing program 5: syz_mount_image$hfsplus(&(0x7f0000000140)='hfsplus\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000a80)={[{@gid={'gid'}}, {@type={'type', 0x3d, "ae8c9d8f"}}], [{@uid_eq={'uid'}}, {@obj_type={'obj_type', 0x3d, 'overlay\x00'}}, {@euid_eq={'euid'}}, {@uid_eq={'uid'}}]}) 11:46:59 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = syz_open_procfs(0x0, &(0x7f0000000080)='ns\x00') getdents(r2, &(0x7f0000000440)=""/46, 0x2e) getdents(r2, &(0x7f0000000440)=""/46, 0x2b) 11:46:59 executing program 4: r0 = perf_event_open(&(0x7f0000000240)={0x1, 0x70, 0x5, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1124, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x20}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x0, 0x11, r1, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r1) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r2, &(0x7f00000000c0)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r2, 0x0, 0xfffffffffffffff8, 0x200007fe, &(0x7f0000000100)={0x2, 0x10004e23, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) sendto$inet(r2, &(0x7f0000d7cfcb), 0xffffffffffffffef, 0x0, 0x0, 0x9000000) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) [ 294.698420][T12159] IPVS: ftp: loaded support on port[0] = 21 [ 294.779875][T12158] hfsplus: unable to parse mount options 11:46:59 executing program 0: sendmsg$key(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000000)={0x0}}, 0x0) r0 = syz_open_dev$vcsa(&(0x7f0000000040)='/dev/vcsa#\x00', 0x1, 0x401000001) pwritev(r0, &(0x7f00000000c0)=[{&(0x7f0000000180), 0x2f}], 0x100000000000002f, 0x0) 11:46:59 executing program 1: setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) setsockopt$netlink_NETLINK_BROADCAST_ERROR(0xffffffffffffffff, 0x10e, 0x4, 0x0, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000100)={0x0, 0x26, &(0x7f00000001c0)={&(0x7f0000000040)={0x14, 0x23, 0x1, 0x0, 0x0, {0x20000000004, 0xe00000000000000}}, 0x14}}, 0x0) 11:46:59 executing program 3: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) setsockopt(0xffffffffffffffff, 0x5, 0x1, &(0x7f0000000900)="7e444e5f3b6efa3ebe8dbf9d60932b385243510c95b2bbe7c85bdedee116dfc8e66404eb4d71511aab3b6a7e386f73167cca7b30c80e5085e61199017f5e0ef5bf5deab0f640cb3ff543fe389ab18df7549c32092b8b1a1b9c35c4a93d9ddba85b1f62e94f11160be83180b9e8a22d22374ffa44816f879ec7e673c46bb387d706f9a3fc046fd22d5c73781b1a9ccf6173686a2bd27ece59be73d3aa4e232107637abcf7d56337de30d5843723cc52a53d80ce3cb12a380ec44269f8c4b71479cd544cba858292e535b407a5cf5868fe94158f798eabb4dda41a2ebdaa0649132c33cc42960ecd3bdc7273e7f7c07bc7dac5cab52952f76c085b20e32d402a3956ee9ffeccc66f653566327ddab74082020b36e03b23e7b0c85f45c4f626708038e7ea9e8123185fec13f991038348f8a421eb1a74a0d0fb3aea63990e2c2a74d0da0ae62f12e3b603446def471d8b415f7217d28c107a65c6df3aa181e9f9028207c22348d2e2921cb95af0d0af5bfe48ff5e80d76e4ff3388ffb6293250a50b2bc67f5b31be3910e1b91680676ff7cbc44157ec96ef0886d76a0316a371344690d61381b6b620eda6fb45ac86bdb2d767d58e59f791fa5a4a6d6660a592a0d867f3d2fede45d21d8e50d76638d44912b467167c52badc54d16d065a5ca79cf90002424dca24c9128b99be81be016cc61b1fcb5fe7beb3bd5d96ddfe976a12234ebb687b83ac2a4eeaf18b7e1b0267ef8345644281069177d38926e7f466b3405e152bab92447cc95312571303b106345820c103f9054f7156cfd24cd09dd6ea6f4ba14b42ece57530b14baa7456426924e34975e63a5ddb7c36a515e27270986aed15340874f38f3857d9b34ac214c46d41457d504b9aaedfb973b06af7741624debabf22889fa2ea30d33d1073b871b2dec300404a1c9a3a71c10c7146bbed9a6f50cbe95ade5cb6bae3ae3f82f68e09c178cc43586ff449f18f1f7a314374dd866a7f6b68508d62560bf09377c615d81c3bf9e758225074ca97929ea644b8ace4275d797590a39c532ea01752bed37fb2cf6a2aafc0a04fc64e90b3de87a461ea9d218365a1b10591090ab3b1cdea3022767b2f04986e758a7dc6ef62af3d244eedbc6bbf59ecc84de62c7e744ff49955ae0656e01ece6c4eecf78794e3c9711c4a31f0dcc30698953f5e448d1b83470aae366ab9bd7b273ee42fad17ebb14324c015ecdc9da43ea4144099faa2a15bd8f0d7728381798394a74c1a52d5a343072957bee63a6bee78d9bbf4ea81b634e675f4cc323c3e5913d1c60fc7c0b6225131c42e8baa40e1097642d5255cb30f178821d39fa74c5060d3024dcfab16fa3bf605ea6c8a3b89e90e9a152a15c37ab593d1645a9bd98d187f4e414882e1dc57777da8107914099b4b0ef2967208fa04d0ce3c720c780d9f79c2215b995fb9833486105b9d67ab9562c55e76b5ef79f03494c38dbfec2e7c01aead549a25de031154b0f11216cf5ce0b69b387553944acb407748043b49dea842c41b6d4006eb93683b1ff2aa681ac0ab08e46b0ee94c7c31e0a48a109d7683d6b866b05a4eaf8621d29508986ca2bcff3204f77f06a767512c7e54613d659c08b74d3af0b67774831bff4ce49bdaa7aafd20972dd4040b226cfe57912bc0c5aa59cbd4e101d621c8e1a1a77cefa4ce462c5220e5997bd717fe8c572687861f58b555cdc790245b9096c71edf943a141dd4629418584fa95641851b69f50d99698189404a922574b669f3fd861a60559fc209ba35b0af57b7b7b4baa395ca97cc45be741c784ac0ca191acec332f13da95517d9a311225f77de804fd7692ab4ed0691fb8375e46faffd141b22423a6c9526637a623219fcf8bce34196d166ef8f5cefe12247cb9834c617eb909e688ebf9582feecf2c645be17fbc04260a6bb84798098dce9767dff9782659fb1a68137987640f07cc51aa5267af38e12ea699c51d1422bcdf463c300866b2cbf13820a7cf731d446548dcb733abda92378d22f4fe0fa084a2e460bff2004e0266b1f1a37655f2bfbb01c9c729f1cceabd3c47b6e1813741a6981c3f49c3085da9bd6a95367f7299080fbde14184092644b763e70aa15d71f8197683c7be109e2cec98e54134f7521181a30f8a63246a9fc36655782bfdc96e263863362059bad0c0d7ce1a2618334007c9459c0571f2405f38b79003ed3ef172839e468cbd9b067b4ca171c65663909b5d3fa98fd983ab178bdddb95556c9b987a50925f74b222c65e215def8db272889d4a6c28ff920083aa00b3ed2a870374c6609a5636bd7d37c09fb3f7012cd2e1b318d477e940bb3552e9c32ac2ef38e19db964881c2eb039104c4d734d6668934eb0b04b1a4fb57565615ea4748bfe9ccb8eb75d525c3f413db13aaefd344b65036a07940a256aa31d770e7bf9dcb71d1ff218b27897158c3068065871a2b71cabe4258fd6dfb66948df69e68ad91050417cd50fcdc7d1bf6736f07c7e9eb2aa40466840d1ccaa869135a38f4514b52d10be2901321eb683252b7886859486e0a62028a989d21cc64c2c2bf69f1a79f91036b789ffb494823c7fe0d189713986d79ceffd2b0e759d146535767078bbdc02fd7f81f180890513ab797ef05f611614f69b3c98d15c9e8aba099eb7125e7e2a2ef6585c2fa6db19fc7e4e1f3dacfaf2af6598ccc969cc072abe6c2e5f73cce0845a869b0ce78487b9216a4ee48f086c6bee7df6329da82fdf4a5f98ca20ebe0af2f6a5401d7a06fbd904c74a0f0597e4a4abb845cc8f889d6bac77d959b2b5e7b91618f248d7e1da4dc1d83c52e617086a25194a63eaf524d7c281450e9f44db34ad75ac818d6111753862bf021ed087427b0a20555f4b365469000208312693246b643377e9b29088a954e00167ef539b0f6ecef5bfe3a06adafc82c2da220efe33106328f875b83ab9d8fa72a36db52bbc0b0446cf86947203e43818baf099f5b009b58fa0e8255992cc981fa5feb8c60a4ec9043f05b8bd777475f86997a4b17f5f66892336da5e021d1f71928c3c634684b9c8fde92a9006b8c10b03098393c2234d245b56d79f014d0bffbd00c8914340a47247262624e76d6e97c0a59ffcb622f18f9fbca8cced8110a52bd354cd82ffc558582a122abbad47715b6ba19a08179029488973dcebbf44f764f4333f37aa24a59e068e0cf9e0dbca6cb1bd50ebe7f44df4efc9fc1ca8f7de437a5fdfe65270f3e7d376fbcc712298ced7bbfd2790de24792a5ee1444c54b86867d71c650dcaedb9b1338838471061d35700eeb288e027c8b66405f1e527f48d887467fb911bc9bd766c4693677a0f86cb2b06288888103d32f5ac39edcf62ccbf571df2ccd45de8c4326e5de417eae0a1d158e92c3a314681bd3125c0cce3f2db9a3f4a0c7132fdf5f999b7f3c4af12a5f7b50331de01fcc5d737a89dcc59687cd88366831a96f5a1aa3ef608d8b9bfdcd8b0b05b4944d381edbe13fd637009100f53b63348bb783b5d32a85ea70897dec2ca5345fa2309e7f2071caf7817108651fb16d4ae2ce9cb356a9fd1b671c57d39eb98f8789cfe19a894a1d839dc41336095205f11cec0e2d47fe5994af68c4e6d5685366feb0ad3ac7bc306802820a37c57a56d6d5dad1695fb691d96176e5020ed256756a2cf940ef5607499f678ebc135f80ceccb1ced9e269746f3b74958bd11dd9822993acefb94b9426998d00e1da61058edd75b73875ebc3bf600995fd3c2822644be10894cebb34df57fca443ce0b7a821fa14e6fc883da893a71601c9cd5fbd2579a8a620b372b276780cc7c1a3b007789d888137eb1be0b67759f262888d1c02bb7f2afb4cfb9e287ea868a2d30f795f784a8c4f552299e5dd17bdd17ea32ccc6bf252996f5fb7d04994d432094f0d1ee81c3477f8bfddba8b20a41a242e5408f983c15a46b79bc163728e1e7d2c4d7acfc3144e800200600a71d12016b821eea18b79afc1f1064e76d9e11bf0464a8eb8152d0e68290a87eb93d23d846f4586b5e720e381baae050b0ba18f58974a0ce4a95da0f8e64c3f06b8263cbd1dfc4ae1bad6e9badf8f1547219938a3645e9c0a6ca1bac805ebeb28608c0b3546ee8d5701ba64cb9b00f45e68607c48d04d140e7f44118522d3afd8d6db22ff69a7cfeab078fcfe7d55ad112f8a69c56e6b86e2f004fcb41aecc1fd3327ddfa3c4827b5c07e3d61c8eb437336a11065556179fb8fb18959311379192089b18c0f39ba95fa07bd7525ef7dd8a8a1fd2b8b245fba51ebec51532456e2ef8c89353b1d0f0badf36c20968c2722f7f92770a738fb0e9b3df0505f904571404b4eded865824e51a0c2527d7580791a8124e65a00ed56ece8bc4820a80ee6459cab6f36307d98a007241b17a121a861f5cd54691d7270711c9b7353712fca88358d28410fe6fb0e41e242c11018804a18bb6d0c2fbb1bc48f56cf541a8591959eefbdd9d44996ee192d8dde96141bdbdce3b0a2a43c2a6da7b5cde9311862ae895da1a026ffd3927e4981f9ccda28b498012afc5662ecd85eaf8435710ce679ecac475d80f4b1a1fb99b6067485a20b40cdee431a2f832957dce9adbeebecd30a73929b9a1f9a84cc9d4c972683435d5d7a79343133cf8cf69feb2db98693da727f4cd8a09df86082af5f13c99c63bab120493cb3ba979ce5de88115d0381156a71b49ca9f47a39968aebee780efdd9f32e4e5827ddccca90f5f4ec53429826ebffd813267cdfa976481c0ff0e193ba7795fa7c552899cd180fe3f8c22c424c7c19fba862070631db63531f14d4924896b2b965cbcfaa1f4cd1f453311a9a516a3f738eeac14685745147c592915f72a18f3608689c5ec3ec7156885671a7ee096142f6396a135b5129707bee3c14043dd1f4fbbd1b993143672fce38c3824ef1452f1737381dc3c2097f135ab83e8fb2901095f99b61636cb3af91e1ace63e068604dcd061313d8e2367eaa21d545d5f5353efafa89ede9651c01046ff6a1e805cd410f42be44879e50d40cadab61e4437edb86f838e0d5d46ba4bd5c6df8b98bb5c8164697b15ca47a76354d03a2235cfd7160695742bb2ffbc0f67912f879b7f3d8802cdd7d488161be46a3beb4a14078b0c72e0cecb95c7ab3066e3c11033bcc1078b50c68d3948a6702ff5243b63fcb134a360a234222bb2e3549624ed87658b1ef80a214ae19f5f69e3ba251b865099847c31be2f31bc71efd478d6ec2e10c56675f13c65f80798f7aa0ed3adbb5dca5068a9db3ff6c47ce19bb8c459915622f4d2b819eb2396383fe6b90dab0a5e415ed2430cad1a915d99a8fc4ddd6f7079e4df90797a90ea8235a60d78c311b738b908faded8e35c0c990304cbddaaf1038adf834b0d28185b8cfa6fb3f22fbb593a83e0f432e80e2a7e5db", 0xf00) fchdir(r0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r2 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) timer_create(0x0, &(0x7f0000000800)={0x0, 0x31, 0x0, @thr={&(0x7f0000000500)="245be8acf17215632c1d3a582ff795653212631c418ade5941eb2324b024", 0x0}}, 0x0) write$P9_RLOCK(r1, &(0x7f00000004c0)={0x8, 0x35, 0x1}, 0x8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BLKGETSIZE(r0, 0x1260, &(0x7f00000000c0)) ioctl$FS_IOC_MEASURE_VERITY(r0, 0xc0046686, &(0x7f0000001900)=ANY=[@ANYBLOB="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"]) ioctl$TCSETSF(r0, 0x5404, &(0x7f0000000000)={0x6, 0xc36d, 0x0, 0x0, 0x17, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x7f}) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write(r1, &(0x7f0000000600)="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", 0x200) r3 = openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$FS_IOC_GETFLAGS(r3, 0x80086601, &(0x7f00000001c0)) connect$unix(r0, &(0x7f0000000240)=@abs={0x64d27abb78b6eb5b, 0x0, 0x4e24}, 0x6e) sendfile(r1, r2, 0x0, 0x7fffffa7) open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) setsockopt$netlink_NETLINK_PKTINFO(0xffffffffffffffff, 0x10e, 0x3, &(0x7f00000008c0), 0x4) 11:47:00 executing program 0: r0 = socket$inet(0x2, 0x100000000805, 0x0) sendmsg$inet_sctp(r0, &(0x7f0000000540)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@dstaddrv4={0x12, 0x84, 0x6, @remote}], 0x28}, 0x0) 11:47:00 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x1}, 0x10) r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r0, &(0x7f0000000000)={{0x6, @rose}, [@rose, @rose, @default, @netrom, @bcast, @rose, @rose, @null]}, 0x48) r1 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000080)='/dev/qat_adf_ctl\x00', 0x8200, 0x0) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r1, 0x6, 0x23, &(0x7f00000000c0)={&(0x7f0000ffc000/0x4000)=nil, 0x4000}, &(0x7f0000000140)=0x10) listen(r0, 0x0) unshare(0x40000000) setrlimit(0x0, 0x0) r2 = accept(r0, 0x0, 0x0) write$binfmt_elf64(r2, &(0x7f00000002c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x9, 0x8, 0x0, 0x0, 0x0, 0x4825483b35c83c0b, 0x0, 0x0, 0x40, 0x227}, [{0x4, 0x1, 0xfff, 0x0, 0x0, 0xff8000000002, 0x0, 0x7fff}], "", [[], [], []]}, 0x378) 11:47:00 executing program 1: setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) setsockopt$netlink_NETLINK_BROADCAST_ERROR(0xffffffffffffffff, 0x10e, 0x4, 0x0, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000100)={0x0, 0x27, &(0x7f00000001c0)={&(0x7f0000000040)={0x14, 0x23, 0x1, 0x0, 0x0, {0x20000000004, 0xe00000000000000}}, 0x14}}, 0x0) 11:47:00 executing program 4: r0 = socket$inet(0x2, 0x100000000805, 0x0) sendmsg$inet_sctp(r0, &(0x7f0000000540)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@dstaddrv4={0x12, 0x84, 0x6, @remote}], 0x18}, 0x0) 11:47:00 executing program 5: syz_mount_image$hfsplus(&(0x7f0000000140)='hfsplus\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000a80)={[{@gid={'gid'}}, {@type={'type', 0x3d, "ae8c9d8f"}}], [{@uid_eq={'uid'}}, {@obj_type={'obj_type', 0x3d, 'overlay\x00'}}, {@euid_eq={'euid'}}, {@uid_eq={'uid'}}]}) 11:47:00 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$inet(0x2, 0x3, 0x800000800000001) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000000)={0x0, 0x0, 0x0}, &(0x7f0000000040)=0xc) syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000580)={[{@gid={'gid', 0x3d, r2}}]}) 11:47:00 executing program 4: process_vm_readv(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000580), 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/mcfilter\x00') r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, 0x0, 0x0) r2 = syz_open_dev$dspn(&(0x7f00000000c0)='/dev/dsp#\x00', 0x1, 0x2) ioctl$int_in(r2, 0x800000c004500a, &(0x7f0000000040)=0x10000000006) r3 = perf_event_open(&(0x7f0000000980)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$UHID_INPUT(r2, &(0x7f00000002c0)={0x8, "b13e1c20d1764d052a4289a71186ca1abfa7f39eb694f4602948f6585c3542ac42cb2f94b098e98f2bcd6128dab4a71d544e96e01e3a9a3548ee5f554c06d963346edb9d133e86fdd31c21e9aaffeb52f7cd63297b1fd0db1845e12bda3ce00f0cca0e6ac9c42a61e687c24c0553b408359c86c7bfd7a30944ac327f982b011258e85ee00f050c38e73199d07b72b225a96ab0fb5a9ea944a233e46cd4c25aaa0fe04bd9b3203f61a06c8f094563ffa0078e50248ce1acebc03c75069eb1cb20ebbe30ec063f9ebc45290dc4f8b56ebb08d32e4df04785fd385029f766a0b96db6a1b6615de63393fe97082c076a7170d2b1c06ce0627d6acae850c2b95f38b079a352f27bf6f5460078b8e597c1d3bdb5cf9e73f42eec5aea224ab44b94e18e812864faeaf770ba7471f99b07d41d573d1d4c3833fb4410ea36d710bfa66ccdb14a1927a678f873b023e82c341a43704adb37242a67b2a46d02ab7aee23cf3030a2f3dd58eece667b6e9393ee8d36649e37e83b1c73c0ef65b4df6173c1c25324fbb9afa1361dc4275f152deb03d7138a688eb9dc66e7845ce1be5647bf740b0e1dd038120ef1e3e1cf420cf8b723bef771376e433935e4f9096a10c4a969aceaac4791c41f365b274dab49bddf51b22a24c05ceaedcbf45febc927e98f410d38247d7679cee7b0d3041eaebd7821924ad31e7c5137bf87ce1ec537a981779f0a4c57bbbb5c641cfd02e1e3904f48b0be96fc9851b6bc8c4260168eea9d9d111e2777f78a9021d5eb0166e39410bf279656770263ca2fb7ac0e30d5e168f8cf4bc5665d057da939b770568e41d0fcec5d6aac0bf4ae66fb099b786cdce7f6a9bc00b83d8ed72440a9724d4ef8af71c7efbc31397930cdcb99d30502ecbcc7ddb9161ade16a1badbd7ea3c6c65b387b46234c4660c816506a2f76264bba07ecb685532116bd971464b58e3ea0a29c2fa1d49d9c6308806db01326e9a1b6bbb556f6479b29f48718e211d75f08d0fb477ad8dae5aeaad7e176b2c5ae331ef78212e9dd7e506549dc74ffd940dc91d74aee2fa7f28855919c163f443804e2a072ad8add2be84df87e414afcab0f8e6f67d3ebb1778a6798d50233da09d29b95c0da97304b7a025e50a7c89e614c63bc69477bfe0e5ae2c468332d134f9e22b19eb2f01c8e8d5148b9b980f8b9aa0cab9ba89aafe16d6a8cf9cb5ae659d8fba88e2841f3d6ac0c44dd9f03787d357fe31a4f551e247bfb73b1f2aa1e208c36aa90dcfc4da8877967c05fe951716ec2293d79c6083e79061bbe18150e2af1d889bb4e87c7735b0e7b88a3109a906d1bd4bf9b98c2462420ecc4e9f3a274a6678bc56e9aa7f3d64677141f874f35d00d04a1dc83126ccd69a0221305a3a5418ec24e163b165c1e4533c38f3d213de4012aece68ed11e2f42325d6da5eef78ee985f81a7991e3d1ff69188059c292779579418ef81177fa94b43cdd0fbf92d31f0fb592a864ddc98ddd5b49ece865e7c7a6c873169d0eea46c1a44f645b1cfa40849ffb9f5355ab396dc1a875180f17103be63be4e7d1920949c59ba5d47341c176ac307e165b9733ac5cd9e9691f5ecd76b467881b78f217d50903a06c57270f4104fd26d496dd7e08c27209185761882923f6447c73d53a74e28132e6bf97ee4f2df9d03be88653a9a7251d8df247f1a75f91f95886ce317e3c125aa7686eec86708fa72c9b33a664e76c0ed891ff9d840ac121ae3f96d32330a14fd76df19c7ae0434e2103d6e9175da0b6cc7a007a0a18615271771434959de305636cf7fbfdd16239bff7dbc656a702ebd48f9a2b1937cca80604ec525d292bb7337459235ad047c6933b6c81bd966ea60ec863de568a9e6d8e0378916f441e0f8b2b74df49b9b24094fd643413469428a537aed19b72bf9381ebab4cd57400ecad1cf1b792e9610910d02f9a779b009840e3f1a1395a87f1e590c33018be80a3f34bbaf49e415ba7d3858b40788cd19211b8cad3789870fb252f8991d64bff9558a67a2316ec2402c2f9c52de42e6389fc90bc4379f7b899b1a943035d64f20b7766edf08fdfa185d00493031f0d3f9ad7dce841f725c5adcba896a76857918a2f54c8aa2e50f71eda35b8fea3732a02c146201ad9f4b65b7caa09e2a73f72aee1ce428a35489038d5cc859fbd48be8da5d088ccab897a248fe418b89b409ab5507af725f077d264abec5b53667ca06aed03815dd537535a3360a50ca3d09c025b5057362c7cb5a4b99c58ac64fe813f4d7f2cafbc3048835ec43fa68170ec7310342134c9b5ec417763db145555cdd37f24b27b0911d172710b74d3c754aac02b24030166cbf2eccfaf1e909b629b7919db1351cd0167e8b6bddc5ce4b7e13cbf0c095f636427d440d058e7637eb117947fc6a60942d10bd455030ee38fc447fd3e6232efba65def558dcff60274e6b2ad62464b4f767bcfec22c681c12bdabf1fedc3946f45c9a34a9169f79ea60a9d190dcf1ce14957382af602dd134b610b269247f38c3d4e233f2fda399dc4cf09139cff9e9c731f8bf940df3cbdf9355f604bd0f3d3b20a6cfc39a7d9ff74f734750187b30c1a970a432bf7e9417cc87d8dea00c4e1885845e1a59bc6a5487687c5bca514e9dcf372bcdc0fe4a47f3e4ac456b1a812e69f88b2a8a964d946cc102ba6f3a7c965df24653c6384d810cf157c8581d4b40e874aded8d227a25fab9889f02698bf52980f048408de4a96226949eba5d1b7f41fce61ae1ff9388e096646ddda4c222f7b9bffc1d3e5b645b6e248637698f6a5be1dc03ff7aa9f418153beeef9b9d67ac5b6fc888e5adf0db41a6d5cac2b600af3b428a1294f4fdb4cf64ccc254c1c7ef71b9be3afceb797fc9504bc3f3dde217687d47cd445c44bea2b16eacae76f16d868b77065b189bd7c4678f3a5fc99b4d020d42972d010b7a6b22de46b434f2d8ec4f567af2d531817ec81ffa36cc27d073a66d2152f1be2a8dce08e98a00f473f22e680cf0ebdcf37936cee60f99eec69503a15d8e36f8d599b535021693fb52f9dc93e315d6e849bd4bf9d05fb25f0b09de91b73ca4edfbfa04d9262d449eab2be542ea30f316384609efc52ed641a9e32d48e4a57c65e8bfa5c13e769d5402a0b125c17360800bf0da8592a75abe647f1d9b1072942947da82e701308b60ecdcfd40d7b6cf44b443493ef0466790547c0a8e5914484969e52cba3787c41df965f91ed7074cd62a63db7e1c35b8f9ac30521295ae7b9c81143926f1dd36aefdfbcd7056b0d4209cabe113a18c58ecc062df687666725707029a8be3ef5721484bd429bab33fceb76c6a0f079da8819d0d9565f5e4ed45eb531f9501b85b619b5323169b0297b7cedcf6f288225dd5e6a7f52c1b96cd38dd94b2f6b8cfc6dbd7862901a5295dca5ecbae72344f41c4a222bd6711831d265b910d547501116bcfbf3c9e104b446175c4c8a4e56445ca22f9363f0f54858a8eb4a1c43103bca578c5b0ee372efd705a950510dbbfa4f74c8ddb4bbc1f07dd410ebb39c01f4da8a0bad2d3d35df3a12a9fa2daf44c8163d59aba8a7351ecc9fe4cd25b987dba700e73d7174307161adf70db0e7a802d7c9ec1b912ee58b0a35c2c6f40f112d70ab5aa708071379280c9ffbceaf0a4ec45c89ac0bf3ef40538302b685e24574da8bde8654e99eff66c9ad5e6beafa0e48e1c293c53d955980346cbc052d15e5d1f3baed388dfaa72ca089af06ae757466a704b93a0ff13cb5c722f0b872432a4fd4513ed56825b13ddd4d8c02eb624c8358199f52679421ab0e1792869f6b4aea523a1079b3138f1ef761c6df102096eff43ddb23ee668b9cc5161433feb318903b58387c3dae2833a8c770e7c6e27c31a1fca07377fbb07f11911be6192f7518a8d089b89826e48b28f5c8a00784bef9b2f68c90838eb2c9fcaeda4bb76782510082c977a7ecdd5743e9da8f088a3b67a25cfb25db4a709b6cbf5425e7efa8c2e472464606d9ccd2fc0f73cd1d51a5aa19d9caba10be2147f8e1ad763ba45693f9f078b0716cf588142be847ca67dc132c5782fed12b7d95c55a9bcfdfb85cb48698a45621cc2f1c85559617ece7def71486290b0cf8e987e8788e1a13f17e3f24b93ed2009ebe42e3bea9571f98b39b787c107dcada3a36fa1fe93736e74ec34af80a182cf0adf2846577f1d474c9ff1b4b8a2cfe6a2d445029ca77088b9c84be63655d48cbc5f61b18d7cda0d141f2db6bc3c479aa6ca19638e2c37da38768eb8820e5679345d2abe8033318eb952e297e17dacaaee3df7ef1d6cd554e9b1b453c44e3d4e030e25c5f9ed094100f6d9b1dc5dab371436ab252cc4d7fdf8fe4b7f36ab71f2bbe3878217b151664c3b9ae970e473ae164d77f294ca8ad58634ea446880e8327fc7af2a088e39508443a601eaa00742a7d0ad459dcac24a60edcfa6ac9f72f428c2b8dd30b8278e28f25a1a129d23cacd765de4c4aa52819578951bb8e311e8621f627e3463e2562b6dbc8d1c431c240f1424599438b9c94723f79ffd1fa1bc94104e4598bd43244302f86ddbe47ad8671e25f406aa507ba45bdba09841827a697cece002f79ec7cf14488789d754f84818d180bd04a11cb2115441a402bea2be749ef233bcd26ca27df828ada877a893e54ea3e6ea29e62d6e7693af7cbee59ccdb4045d0e6eeec3d8f59205f324a5f7cf5f871929c83ada04bc5d3990288dca5eb312339933ffb1031e05866e1b2d0aad0ca940795458b7d6c8a3750a76e1e6c8ccd48ca542d6c51164431d70c9d35f0f828cdec404a175a44bc2a9651ec5281c0f3aee9e4375f0eb139f58fa4419fddf9ebe2f8f37121a57397e7e830ac097ed375521a68f7cdc471621b769fef40cd19d8d55a82e27bf5b0cc4182359db7c9066e2ee10df279a89e96fcfea225995f065f7f286b8c8ef9b6c82a34df14dda2f737f557578ce5b15944e3149110102d80465c1b436b6bbb16fdc64a9d130ec7644bc162f0e2c5669a9254970a062561e269d85b72b4748d71d88ca20778287bc3b9613043166862f133f366f6361b9e1d040bbcd9728a70fcf3be7ea8fe0f55980ed03f336ec49f7cb6899813acf47d3b2413e7b637b764fcb9003ece75f8a255b9cdc71f80dbbaa7eaa2111b5551feeb7ea31620a2c88897538915abedcd184d57c79d81505985f561820449c330bc3412bffb68c4c743c5a5a3acafcf00d7561a66f70e5835da530ba62f221211e1fefdc1fbc8c05b1b68b7eb2afac6ebbbc0b961b8ef8b27b555ce7641f6601ac19d5f4adb06b40155a2085ff32de5b2c5edd96a01a14d1bb49b58f1fd718bec428043819b8070e46f0215d2153318320754638d9b40a5214784e7c1f80dde05500cfe8e4dff855504e099634fb3d44829453cf4ac8db7e5a4144f96d4508de90ada04240637fd5b261cfbb80c8d9ccdea6c1d3485a85663cff9749133002c7f9c6ea4de1b50fe90dae397f6b5833e943e6c5f60e10d805e97e6869488b857b44d8c94276f668257c223e2e26dff75222d3f304f8a040ce058e1b7b3bc5f0b69c310beea64212ef0a54bc9fb858c25681cee574c532b64d4f8241e0b855f7f79d0a1ea22fc3d9ad5a1658b5c4d9d417e9eae47c81628341172609a8ef8c72fb6e4e48da6a10207e56b727f65c82d49e2dbb44b492e1265c2b28f98980334ccc3abb0cfd15d73c2f38f4c824022aa7a0ac0b7d35eea934d3455d21e8c710474e54bdf29be107ebc00", 0xa943708f26830065}, 0x1006) dup3(r3, r2, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, 0x0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(r2, 0x84, 0xf, &(0x7f00000003c0)={r4, @in={{0x2, 0x4e1e, @multicast2}}, 0xbb, 0x6}, &(0x7f0000001400)=0x98) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, &(0x7f0000000040)={r4, @in6={{0xa, 0x4e22, 0x9, @loopback, 0x46cd}}, 0x0, 0x0, 0x0, 0x4, 0x100000000}, &(0x7f0000000100)=0x98) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, &(0x7f0000000040)={r4, @in6={{0xa, 0x4e20, 0x19, @rand_addr="c223e211e63ec71f52f4aa37180045d7", 0x1ff}}, 0x9, 0x10001, 0x81}, 0x0) setsockopt$inet_sctp6_SCTP_AUTH_DEACTIVATE_KEY(r1, 0x84, 0x23, &(0x7f0000000100)={r4, 0x7fff}, 0x8) getsockopt$inet_sctp_SCTP_STATUS(0xffffffffffffffff, 0x84, 0xe, &(0x7f0000000000)={0x0, 0x0, 0x3, 0x5, 0x4, 0x1504, 0x1, 0x101, {0x0, @in={{0x2, 0x4e23, @multicast1}}, 0x2, 0x0, 0xf9ab, 0x2c, 0x2}}, &(0x7f00000000c0)=0xb0) setsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r0, 0x84, 0x22, &(0x7f0000000100)={0x1f, 0x9, 0x3, 0x80, r5}, 0x10) preadv(0xffffffffffffffff, &(0x7f0000000480), 0x10000000000002a1, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff) mknod(0x0, 0x0, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000180)=@isdn, 0x80, &(0x7f0000000240)=[{&(0x7f0000000200)=""/39, 0x27}], 0x1, &(0x7f0000000280)=""/98, 0x62}, 0x100) sendto$isdn(0xffffffffffffffff, &(0x7f0000001540)=ANY=[], 0x0, 0x200c0000, &(0x7f0000000280)={0x22, 0xcb, 0xa1, 0x8, 0x4}, 0x6) r6 = syz_open_procfs(0x0, &(0x7f0000000140)='net/mcfilter\x00') preadv(r6, &(0x7f0000000480), 0x10000000000002a1, 0x0) accept$inet6(r6, &(0x7f0000000200)={0xa, 0x0, 0x0, @remote}, &(0x7f0000000240)=0x1c) creat(0x0, 0x0) [ 295.624481][T12199] hfsplus: unable to parse mount options [ 295.634507][T12203] IPVS: ftp: loaded support on port[0] = 21 11:47:00 executing program 5: syz_mount_image$hfsplus(&(0x7f0000000140)='hfsplus\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000a80)={[{@barrier='barrier'}, {@gid={'gid'}}, {@type={'type', 0x3d, "ae8c9d8f"}}], [{@uid_eq={'uid'}}, {@obj_type={'obj_type', 0x3d, 'overlay\x00'}}, {@euid_eq={'euid'}}]}) 11:47:00 executing program 1: setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) setsockopt$netlink_NETLINK_BROADCAST_ERROR(0xffffffffffffffff, 0x10e, 0x4, 0x0, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000100)={0x0, 0x28, &(0x7f00000001c0)={&(0x7f0000000040)={0x14, 0x23, 0x1, 0x0, 0x0, {0x20000000004, 0xe00000000000000}}, 0x14}}, 0x0) [ 295.775870][T12208] hfs: gid requires an argument [ 295.823460][T12208] hfs: unable to parse mount options [ 295.929678][T12220] hfsplus: unable to parse mount options 11:47:00 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x1}, 0x10) r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r0, &(0x7f0000000000)={{0x6, @rose}, [@rose, @rose, @default, @netrom, @bcast, @rose, @rose, @null]}, 0x48) r1 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000080)='/dev/qat_adf_ctl\x00', 0x8200, 0x0) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r1, 0x6, 0x23, &(0x7f00000000c0)={&(0x7f0000ffc000/0x4000)=nil, 0x4000}, &(0x7f0000000140)=0x10) listen(r0, 0x0) unshare(0x40000000) setrlimit(0x0, 0x0) r2 = accept(r0, 0x0, 0x0) write$binfmt_elf64(r2, &(0x7f00000002c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x9, 0x8, 0x0, 0x0, 0x0, 0x4825483b35c83c0b, 0x0, 0x0, 0x40, 0x227}, [{0x4, 0x1, 0xfff, 0x0, 0x0, 0xff8000000002, 0x0, 0x7fff}], "", [[], [], []]}, 0x378) 11:47:00 executing program 0: [ 296.113470][ T26] audit: type=1800 audit(1569671221.037:108): pid=12230 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed(directio) comm="syz-executor.3" name="file0" dev="sda1" ino=16949 res=0 [ 296.264059][ T26] audit: type=1804 audit(1569671221.067:109): pid=12230 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir326494445/syzkaller.9AVR6f/92/file0" dev="sda1" ino=16949 res=1 [ 296.390384][ T26] audit: type=1804 audit(1569671221.267:110): pid=12240 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir326494445/syzkaller.9AVR6f/92/file0" dev="sda1" ino=16949 res=1 [ 296.424238][T12241] IPVS: ftp: loaded support on port[0] = 21 11:47:01 executing program 3: 11:47:01 executing program 1: setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) setsockopt$netlink_NETLINK_BROADCAST_ERROR(0xffffffffffffffff, 0x10e, 0x4, 0x0, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000100)={0x0, 0x29, &(0x7f00000001c0)={&(0x7f0000000040)={0x14, 0x23, 0x1, 0x0, 0x0, {0x20000000004, 0xe00000000000000}}, 0x14}}, 0x0) 11:47:01 executing program 5: syz_mount_image$hfsplus(&(0x7f0000000140)='hfsplus\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000a80)={[{@barrier='barrier'}, {@gid={'gid'}}, {@type={'type', 0x3d, "ae8c9d8f"}}], [{@uid_eq={'uid'}}, {@obj_type={'obj_type', 0x3d, 'overlay\x00'}}]}) 11:47:01 executing program 0: 11:47:01 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x1}, 0x10) r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r0, &(0x7f0000000000)={{0x6, @rose}, [@rose, @rose, @default, @netrom, @bcast, @rose, @rose, @null]}, 0x48) r1 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000080)='/dev/qat_adf_ctl\x00', 0x8200, 0x0) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r1, 0x6, 0x23, &(0x7f00000000c0)={&(0x7f0000ffc000/0x4000)=nil, 0x4000}, &(0x7f0000000140)=0x10) listen(r0, 0x0) unshare(0x40000000) setrlimit(0x0, 0x0) r2 = accept(r0, 0x0, 0x0) write$binfmt_elf64(r2, &(0x7f00000002c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x9, 0x8, 0x0, 0x0, 0x0, 0x4825483b35c83c0b, 0x0, 0x0, 0x40, 0x227}, [{0x4, 0x1, 0xfff, 0x0, 0x0, 0xff8000000002, 0x0, 0x7fff}], "", [[], [], []]}, 0x378) [ 296.743602][T12255] hfsplus: unable to parse mount options 11:47:01 executing program 0: 11:47:01 executing program 4: 11:47:01 executing program 3: 11:47:01 executing program 5: syz_mount_image$hfsplus(&(0x7f0000000140)='hfsplus\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000a80)={[{@barrier='barrier'}, {@gid={'gid'}}, {@type={'type', 0x3d, "ae8c9d8f"}}], [{@uid_eq={'uid'}}]}) 11:47:01 executing program 1: setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) setsockopt$netlink_NETLINK_BROADCAST_ERROR(0xffffffffffffffff, 0x10e, 0x4, 0x0, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000100)={0x0, 0x2a, &(0x7f00000001c0)={&(0x7f0000000040)={0x14, 0x23, 0x1, 0x0, 0x0, {0x20000000004, 0xe00000000000000}}, 0x14}}, 0x0) 11:47:01 executing program 4: 11:47:02 executing program 0: [ 297.050689][T12273] IPVS: ftp: loaded support on port[0] = 21 [ 297.141979][T12280] hfsplus: unable to find HFS+ superblock 11:47:02 executing program 0: 11:47:02 executing program 3: 11:47:02 executing program 4: 11:47:02 executing program 5: syz_mount_image$hfsplus(&(0x7f0000000140)='hfsplus\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000a80)={[{@barrier='barrier'}, {@gid={'gid'}}, {@type={'type', 0x3d, "ae8c9d8f"}}]}) [ 297.440408][T12296] hfsplus: unable to find HFS+ superblock 11:47:02 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x1}, 0x10) r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r0, &(0x7f0000000000)={{0x6, @rose}, [@rose, @rose, @default, @netrom, @bcast, @rose, @rose, @null]}, 0x48) r1 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000080)='/dev/qat_adf_ctl\x00', 0x8200, 0x0) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r1, 0x6, 0x23, &(0x7f00000000c0)={&(0x7f0000ffc000/0x4000)=nil, 0x4000}, &(0x7f0000000140)=0x10) listen(r0, 0x0) unshare(0x40000000) setrlimit(0x0, 0x0) r2 = accept(r0, 0x0, 0x0) write$binfmt_elf64(r2, &(0x7f00000002c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x9, 0x8, 0x0, 0x0, 0x0, 0x4825483b35c83c0b, 0x0, 0x0, 0x40, 0x227}, [{0x4, 0x1, 0xfff, 0x0, 0x0, 0xff8000000002, 0x0, 0x7fff}], "", [[], [], []]}, 0x378) 11:47:02 executing program 0: 11:47:02 executing program 1: setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) setsockopt$netlink_NETLINK_BROADCAST_ERROR(0xffffffffffffffff, 0x10e, 0x4, 0x0, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000100)={0x0, 0x2b, &(0x7f00000001c0)={&(0x7f0000000040)={0x14, 0x23, 0x1, 0x0, 0x0, {0x20000000004, 0xe00000000000000}}, 0x14}}, 0x0) 11:47:02 executing program 4: 11:47:02 executing program 3: 11:47:02 executing program 5: 11:47:02 executing program 3: 11:47:02 executing program 0: 11:47:02 executing program 4: 11:47:02 executing program 5: 11:47:02 executing program 1: setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) setsockopt$netlink_NETLINK_BROADCAST_ERROR(0xffffffffffffffff, 0x10e, 0x4, 0x0, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000100)={0x0, 0x2c, &(0x7f00000001c0)={&(0x7f0000000040)={0x14, 0x23, 0x1, 0x0, 0x0, {0x20000000004, 0xe00000000000000}}, 0x14}}, 0x0) 11:47:02 executing program 3: [ 297.860220][T12317] IPVS: ftp: loaded support on port[0] = 21 11:47:03 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x1}, 0x10) r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r0, &(0x7f0000000000)={{0x6, @rose}, [@rose, @rose, @default, @netrom, @bcast, @rose, @rose, @null]}, 0x48) r1 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000080)='/dev/qat_adf_ctl\x00', 0x8200, 0x0) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r1, 0x6, 0x23, &(0x7f00000000c0)={&(0x7f0000ffc000/0x4000)=nil, 0x4000}, &(0x7f0000000140)=0x10) listen(r0, 0x0) unshare(0x40000000) setrlimit(0x0, 0x0) r2 = accept(r0, 0x0, 0x0) write$binfmt_elf64(r2, &(0x7f00000002c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x9, 0x8, 0x0, 0x0, 0x0, 0x4825483b35c83c0b, 0x0, 0x0, 0x40, 0x227}, [{0x4, 0x1, 0xfff, 0x0, 0x0, 0xff8000000002, 0x0, 0x7fff}], "", [[], [], []]}, 0x378) 11:47:03 executing program 0: 11:47:03 executing program 4: 11:47:03 executing program 3: 11:47:03 executing program 5: 11:47:03 executing program 1: setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) setsockopt$netlink_NETLINK_BROADCAST_ERROR(0xffffffffffffffff, 0x10e, 0x4, 0x0, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000100)={0x0, 0x2d, &(0x7f00000001c0)={&(0x7f0000000040)={0x14, 0x23, 0x1, 0x0, 0x0, {0x20000000004, 0xe00000000000000}}, 0x14}}, 0x0) 11:47:03 executing program 5: 11:47:03 executing program 4: 11:47:03 executing program 3: 11:47:03 executing program 0: [ 298.469958][T12345] IPVS: ftp: loaded support on port[0] = 21 11:47:03 executing program 4: 11:47:03 executing program 5: 11:47:03 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x1}, 0x10) r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r0, &(0x7f0000000000)={{0x6, @rose}, [@rose, @rose, @default, @netrom, @bcast, @rose, @rose, @null]}, 0x48) r1 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000080)='/dev/qat_adf_ctl\x00', 0x8200, 0x0) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r1, 0x6, 0x23, &(0x7f00000000c0)={&(0x7f0000ffc000/0x4000)=nil, 0x4000}, &(0x7f0000000140)=0x10) listen(r0, 0x0) unshare(0x40000000) setrlimit(0x0, 0x0) r2 = accept(r0, 0x0, 0x0) write$binfmt_elf64(r2, &(0x7f00000002c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x9, 0x8, 0x0, 0x0, 0x0, 0x4825483b35c83c0b, 0x0, 0x0, 0x40, 0x227}, [{0x4, 0x1, 0xfff, 0x0, 0x0, 0xff8000000002, 0x0, 0x7fff}], "", [[], [], []]}, 0x378) 11:47:03 executing program 0: 11:47:03 executing program 3: 11:47:03 executing program 5: 11:47:03 executing program 4: 11:47:03 executing program 1: setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) setsockopt$netlink_NETLINK_BROADCAST_ERROR(0xffffffffffffffff, 0x10e, 0x4, 0x0, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000100)={0x0, 0x2e, &(0x7f00000001c0)={&(0x7f0000000040)={0x14, 0x23, 0x1, 0x0, 0x0, {0x20000000004, 0xe00000000000000}}, 0x14}}, 0x0) 11:47:03 executing program 3: 11:47:03 executing program 5: 11:47:03 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rfkill\x00', 0x0, 0x0) close(r0) 11:47:03 executing program 0: [ 299.070783][T12375] IPVS: ftp: loaded support on port[0] = 21 11:47:04 executing program 1: setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) setsockopt$netlink_NETLINK_BROADCAST_ERROR(0xffffffffffffffff, 0x10e, 0x4, 0x0, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000100)={0x0, 0x2f, &(0x7f00000001c0)={&(0x7f0000000040)={0x14, 0x23, 0x1, 0x0, 0x0, {0x20000000004, 0xe00000000000000}}, 0x14}}, 0x0) 11:47:04 executing program 5: 11:47:04 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_ATTACH(0x8, 0x0, 0x0) r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r0, &(0x7f0000000000)={{0x6, @rose}, [@rose, @rose, @default, @netrom, @bcast, @rose, @rose, @null]}, 0x48) r1 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000080)='/dev/qat_adf_ctl\x00', 0x8200, 0x0) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r1, 0x6, 0x23, &(0x7f00000000c0)={&(0x7f0000ffc000/0x4000)=nil, 0x4000}, &(0x7f0000000140)=0x10) listen(r0, 0x0) unshare(0x40000000) setrlimit(0x0, 0x0) r2 = accept(r0, 0x0, 0x0) write$binfmt_elf64(r2, &(0x7f00000002c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x9, 0x8, 0x0, 0x0, 0x0, 0x4825483b35c83c0b, 0x0, 0x0, 0x40, 0x227}, [{0x4, 0x1, 0xfff, 0x0, 0x0, 0xff8000000002, 0x0, 0x7fff}], "", [[], [], []]}, 0x378) 11:47:04 executing program 3: 11:47:04 executing program 4: 11:47:04 executing program 0: 11:47:04 executing program 5: 11:47:04 executing program 4: 11:47:04 executing program 5: 11:47:04 executing program 1: setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) setsockopt$netlink_NETLINK_BROADCAST_ERROR(0xffffffffffffffff, 0x10e, 0x4, 0x0, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000100)={0x0, 0x30, &(0x7f00000001c0)={&(0x7f0000000040)={0x14, 0x23, 0x1, 0x0, 0x0, {0x20000000004, 0xe00000000000000}}, 0x14}}, 0x0) 11:47:04 executing program 3: r0 = socket$inet6(0xa, 0x8000000000001, 0x8010000000000084) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e21, 0x0, @empty}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f00000003c0)=ANY=[@ANYBLOB="000000000000000088995bc278078530907ba8daf19580c9613ff8c2531d48e56c969a3547034571923a2c0e75ecb75217584fce8cbddbd735b9d223dd4ca810697ce8f93d0755ee710b002c231a5731bd6a16792b1319e2acc0eb1ba8116a4ae39f9465a4cf19d78a65"], 0x8) setsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r0, 0x84, 0x72, &(0x7f0000000240)={0x0, 0xfffffffffffffffd, 0x30}, 0xc) connect$inet6(r0, &(0x7f0000000200)={0xa, 0x4e21, 0x0, @loopback}, 0x1c) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="2321212c0f0df81f47442a"], 0x10094) write$binfmt_misc(r0, &(0x7f0000000080)=ANY=[@ANYBLOB='1'], 0x1) setsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r0, 0x84, 0x72, &(0x7f00000002c0), 0xc) write$binfmt_script(r0, &(0x7f0000000000)=ANY=[@ANYBLOB], 0x1a000) close(r0) 11:47:04 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000280)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(sha224-generic)\x00'}, 0x58) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f0000005040)=[{{0x0, 0x0, 0x0}}], 0x500, 0x0, 0x0) [ 299.681710][T12406] IPVS: ftp: loaded support on port[0] = 21 11:47:04 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1100008912, &(0x7f0000000040)="11dca50d810bcfe47bf070") r1 = syz_open_dev$usb(&(0x7f0000000200)='/dev/bus/usb/00#/00#\x00', 0x40000fffffc, 0x200000000000042) mmap$binder(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x1, 0x11, r1, 0x0) ioctl$FS_IOC_FSGETXATTR(r1, 0x8038550a, &(0x7f0000000000)={0x2, 0x0, 0x0, 0x0, 0x1000020ffd000, 0x7ff0bdbe}) 11:47:04 executing program 4: bind$alg(0xffffffffffffffff, &(0x7f0000000100)={0x26, 'hash\x00', 0x0, 0x0, 'sha512\x00'}, 0x58) getsockopt$ARPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x61, &(0x7f0000000200)=ANY=[@ANYBLOB="66696c7465720000000000000000000000000000000000004d73765a33dd83ab92"], 0x0) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x303, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0x94, 0x9}], 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xaaaaaaaaaaaab31, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x2c3, 0x400}], 0x1, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) [ 300.026657][T12427] vhci_hcd: default hub control req: 0000 v0000 i0000 l0 [ 300.086327][T12433] vhci_hcd: default hub control req: 0000 v0000 i0000 l0 11:47:05 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_ATTACH(0x8, 0x0, 0x0) r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r0, &(0x7f0000000000)={{0x6, @rose}, [@rose, @rose, @default, @netrom, @bcast, @rose, @rose, @null]}, 0x48) r1 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000080)='/dev/qat_adf_ctl\x00', 0x8200, 0x0) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r1, 0x6, 0x23, &(0x7f00000000c0)={&(0x7f0000ffc000/0x4000)=nil, 0x4000}, &(0x7f0000000140)=0x10) listen(r0, 0x0) unshare(0x40000000) setrlimit(0x0, 0x0) r2 = accept(r0, 0x0, 0x0) write$binfmt_elf64(r2, &(0x7f00000002c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x9, 0x8, 0x0, 0x0, 0x0, 0x4825483b35c83c0b, 0x0, 0x0, 0x40, 0x227}, [{0x4, 0x1, 0xfff, 0x0, 0x0, 0xff8000000002, 0x0, 0x7fff}], "", [[], [], []]}, 0x378) 11:47:05 executing program 1: setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) setsockopt$netlink_NETLINK_BROADCAST_ERROR(0xffffffffffffffff, 0x10e, 0x4, 0x0, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000100)={0x0, 0x31, &(0x7f00000001c0)={&(0x7f0000000040)={0x14, 0x23, 0x1, 0x0, 0x0, {0x20000000004, 0xe00000000000000}}, 0x14}}, 0x0) 11:47:05 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1100008912, &(0x7f0000000040)="11dca50d810bcfe47bf070") r1 = syz_open_dev$usb(&(0x7f0000000200)='/dev/bus/usb/00#/00#\x00', 0x40000fffffc, 0x200000000000042) mmap$binder(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x1, 0x11, r1, 0x0) ioctl$FS_IOC_FSGETXATTR(r1, 0x8038550a, &(0x7f0000000000)={0x2, 0x0, 0x0, 0x0, 0x1000020ffd000, 0x7ff0bdbe}) 11:47:05 executing program 0: setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) setsockopt$netlink_NETLINK_BROADCAST_ERROR(0xffffffffffffffff, 0x10e, 0x4, 0x0, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000100)={0x0, 0x25, &(0x7f00000001c0)={&(0x7f0000000040)={0x14, 0x23, 0x1, 0x0, 0x0, {0x20000000004, 0xe00000000000000}}, 0x14}}, 0x0) [ 300.303973][T12430] EXT4-fs (loop4): feature flags set on rev 0 fs, running e2fsck is recommended [ 300.459341][T12430] EXT4-fs (loop4): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock 11:47:05 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x1}, 0x10) r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r0, &(0x7f0000000000)={{0x6, @rose}, [@rose, @rose, @default, @netrom, @bcast, @rose, @rose, @null]}, 0x48) r1 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000080)='/dev/qat_adf_ctl\x00', 0x8200, 0x0) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r1, 0x6, 0x23, &(0x7f00000000c0)={&(0x7f0000ffc000/0x4000)=nil, 0x4000}, &(0x7f0000000140)=0x10) listen(r0, 0x0) unshare(0x40000000) setrlimit(0x0, 0x0) r2 = accept(r0, 0x0, 0x0) write$binfmt_elf64(r2, &(0x7f00000002c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x9, 0x8, 0x0, 0x0, 0x0, 0x4825483b35c83c0b, 0x0, 0x0, 0x40, 0x227}, [{0x4, 0x1, 0xfff, 0x0, 0x0, 0xff8000000002, 0x0, 0x7fff}], "", [[], [], []]}, 0x378) [ 300.522331][T12450] IPVS: ftp: loaded support on port[0] = 21 [ 300.524546][T12430] EXT4-fs (loop4): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock 11:47:05 executing program 1: setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) setsockopt$netlink_NETLINK_BROADCAST_ERROR(0xffffffffffffffff, 0x10e, 0x4, 0x0, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000100)={0x0, 0x32, &(0x7f00000001c0)={&(0x7f0000000040)={0x14, 0x23, 0x1, 0x0, 0x0, {0x20000000004, 0xe00000000000000}}, 0x14}}, 0x0) [ 300.565647][T12449] vhci_hcd: default hub control req: 0000 v0000 i0000 l0 [ 300.578421][T12430] EXT4-fs (loop4): ext4_check_descriptors: Inode table for group 0 overlaps superblock 11:47:05 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1100008912, &(0x7f0000000040)="11dca50d810bcfe47bf070") r1 = syz_open_dev$usb(&(0x7f0000000200)='/dev/bus/usb/00#/00#\x00', 0x40000fffffc, 0x200000000000042) mmap$binder(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x1, 0x11, r1, 0x0) ioctl$FS_IOC_FSGETXATTR(r1, 0x8038550a, &(0x7f0000000000)={0x2, 0x0, 0x0, 0x0, 0x1000020ffd000, 0x7ff0bdbe}) [ 300.627904][T12430] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue [ 300.772890][T12461] IPVS: ftp: loaded support on port[0] = 21 11:47:05 executing program 0: syz_mount_image$hfsplus(&(0x7f0000000140)='hfsplus\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000a80)={[{@barrier='barrier'}, {@type={'type', 0x3d, "ae8c9d8f"}}], [{@uid_eq={'uid'}}, {@obj_type={'obj_type', 0x3d, 'overlay\x00'}}, {@euid_eq={'euid'}}, {@uid_eq={'uid'}}]}) 11:47:05 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_FSGETXATTR(0xffffffffffffffff, 0x8004550f, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x1}, 0x10) r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) r1 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000080)='/dev/qat_adf_ctl\x00', 0x8200, 0x0) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r1, 0x6, 0x23, &(0x7f00000000c0)={&(0x7f0000ffc000/0x4000)=nil, 0x4000}, &(0x7f0000000140)=0x10) listen(r0, 0x0) unshare(0x40000000) setrlimit(0x0, 0x0) r2 = accept(r0, 0x0, 0x0) write$binfmt_elf64(r2, &(0x7f00000002c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x9, 0x8, 0x0, 0x0, 0x0, 0x4825483b35c83c0b, 0x0, 0x0, 0x40, 0x227}, [{0x4, 0x1, 0xfff, 0x0, 0x0, 0xff8000000002, 0x0, 0x7fff}], "", [[], [], []]}, 0x378) [ 300.865393][T12465] vhci_hcd: default hub control req: 0000 v0000 i0000 l0 11:47:05 executing program 1: setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) setsockopt$netlink_NETLINK_BROADCAST_ERROR(0xffffffffffffffff, 0x10e, 0x4, 0x0, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000100)={0x0, 0x33, &(0x7f00000001c0)={&(0x7f0000000040)={0x14, 0x23, 0x1, 0x0, 0x0, {0x20000000004, 0xe00000000000000}}, 0x14}}, 0x0) 11:47:05 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_ATTACH(0x8, 0x0, 0x0) r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(0xffffffffffffffff, &(0x7f0000000000)={{0x6, @rose}, [@rose, @rose, @default, @netrom, @bcast, @rose, @rose, @null]}, 0x48) r1 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000080)='/dev/qat_adf_ctl\x00', 0x8200, 0x0) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r1, 0x6, 0x23, &(0x7f00000000c0)={&(0x7f0000ffc000/0x4000)=nil, 0x4000}, &(0x7f0000000140)=0x10) listen(r0, 0x0) unshare(0x40000000) setrlimit(0x0, 0x0) r2 = accept(r0, 0x0, 0x0) write$binfmt_elf64(r2, &(0x7f00000002c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x9, 0x8, 0x0, 0x0, 0x0, 0x4825483b35c83c0b, 0x0, 0x0, 0x40, 0x227}, [{0x4, 0x1, 0xfff, 0x0, 0x0, 0xff8000000002, 0x0, 0x7fff}], "", [[], [], []]}, 0x378) 11:47:05 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1100008912, &(0x7f0000000040)="11dca50d810bcfe47bf070") r1 = syz_open_dev$usb(&(0x7f0000000200)='/dev/bus/usb/00#/00#\x00', 0x40000fffffc, 0x200000000000042) mmap$binder(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x1, 0x11, r1, 0x0) ioctl$FS_IOC_FSGETXATTR(r1, 0x8038550a, &(0x7f0000000000)={0x2, 0x0, 0x0, 0x0, 0x1000020ffd000, 0x7ff0bdbe}) [ 301.036652][T12472] hfsplus: unable to parse mount options [ 301.163328][T12483] vhci_hcd: default hub control req: 0000 v0000 i0000 l0 11:47:06 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_ATTACH(0x8, 0x0, 0x0) r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r0, &(0x7f0000000000)={{0x6, @rose}, [@rose, @rose, @default, @netrom, @bcast, @rose, @rose, @null]}, 0x48) r1 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000080)='/dev/qat_adf_ctl\x00', 0x8200, 0x0) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r1, 0x6, 0x23, &(0x7f00000000c0)={&(0x7f0000ffc000/0x4000)=nil, 0x4000}, &(0x7f0000000140)=0x10) listen(r0, 0x0) unshare(0x40000000) setrlimit(0x0, 0x0) r2 = accept(r0, 0x0, 0x0) write$binfmt_elf64(r2, &(0x7f00000002c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x9, 0x8, 0x0, 0x0, 0x0, 0x4825483b35c83c0b, 0x0, 0x0, 0x40, 0x227}, [{0x4, 0x1, 0xfff, 0x0, 0x0, 0xff8000000002, 0x0, 0x7fff}], "", [[], [], []]}, 0x378) 11:47:06 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1100008912, &(0x7f0000000040)="11dca50d810bcfe47bf070") r1 = syz_open_dev$usb(&(0x7f0000000200)='/dev/bus/usb/00#/00#\x00', 0x40000fffffc, 0x200000000000042) ioctl$FS_IOC_FSGETXATTR(r1, 0x8038550a, &(0x7f0000000000)={0x2, 0x0, 0x0, 0x0, 0x1000020ffd000, 0x7ff0bdbe}) 11:47:06 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x1}, 0x10) r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r0, &(0x7f0000000000)={{0x6, @rose}, [@rose, @rose, @default, @netrom, @bcast, @rose, @rose, @null]}, 0x48) r1 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000080)='/dev/qat_adf_ctl\x00', 0x8200, 0x0) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r1, 0x6, 0x23, &(0x7f00000000c0)={&(0x7f0000ffc000/0x4000)=nil, 0x4000}, &(0x7f0000000140)=0x10) listen(r0, 0x0) unshare(0x40000000) setrlimit(0x0, 0x0) r2 = accept(r0, 0x0, 0x0) write$binfmt_elf64(r2, &(0x7f00000002c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x9, 0x8, 0x0, 0x0, 0x0, 0x4825483b35c83c0b, 0x0, 0x0, 0x40, 0x227}, [{0x4, 0x1, 0xfff, 0x0, 0x0, 0xff8000000002, 0x0, 0x7fff}], "", [[], [], []]}, 0x378) [ 301.283362][T12477] IPVS: ftp: loaded support on port[0] = 21 11:47:06 executing program 1: setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) setsockopt$netlink_NETLINK_BROADCAST_ERROR(0xffffffffffffffff, 0x10e, 0x4, 0x0, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000100)={0x0, 0x34, &(0x7f00000001c0)={&(0x7f0000000040)={0x14, 0x23, 0x1, 0x0, 0x0, {0x20000000004, 0xe00000000000000}}, 0x14}}, 0x0) [ 301.461399][T12486] IPVS: ftp: loaded support on port[0] = 21 [ 301.535885][T12505] vhci_hcd: default hub control req: 0000 v0000 i0000 l0 [ 301.547082][T12499] IPVS: ftp: loaded support on port[0] = 21 [ 301.621460][T12507] IPVS: ftp: loaded support on port[0] = 21 11:47:06 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1100008912, &(0x7f0000000040)="11dca50d810bcfe47bf070") r1 = syz_open_dev$usb(&(0x7f0000000200)='/dev/bus/usb/00#/00#\x00', 0x40000fffffc, 0x200000000000042) ioctl$FS_IOC_FSGETXATTR(r1, 0x8038550a, &(0x7f0000000000)={0x2, 0x0, 0x0, 0x0, 0x1000020ffd000, 0x7ff0bdbe}) 11:47:06 executing program 1: setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) setsockopt$netlink_NETLINK_BROADCAST_ERROR(0xffffffffffffffff, 0x10e, 0x4, 0x0, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000100)={0x0, 0x35, &(0x7f00000001c0)={&(0x7f0000000040)={0x14, 0x23, 0x1, 0x0, 0x0, {0x20000000004, 0xe00000000000000}}, 0x14}}, 0x0) [ 301.851639][T12517] vhci_hcd: default hub control req: 0000 v0000 i0000 l0 11:47:06 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1100008912, &(0x7f0000000040)="11dca50d810bcfe47bf070") r1 = syz_open_dev$usb(&(0x7f0000000200)='/dev/bus/usb/00#/00#\x00', 0x40000fffffc, 0x200000000000042) ioctl$FS_IOC_FSGETXATTR(r1, 0x8038550a, &(0x7f0000000000)={0x2, 0x0, 0x0, 0x0, 0x1000020ffd000, 0x7ff0bdbe}) 11:47:06 executing program 1: setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) setsockopt$netlink_NETLINK_BROADCAST_ERROR(0xffffffffffffffff, 0x10e, 0x4, 0x0, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000100)={0x0, 0x36, &(0x7f00000001c0)={&(0x7f0000000040)={0x14, 0x23, 0x1, 0x0, 0x0, {0x20000000004, 0xe00000000000000}}, 0x14}}, 0x0) [ 302.071639][T12527] vhci_hcd: default hub control req: 0000 v0000 i0000 l0 11:47:09 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_ATTACH(0x8, 0x0, 0x0) r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r0, &(0x7f0000000000)={{0x6, @rose}, [@rose, @rose, @default, @netrom, @bcast, @rose, @rose, @null]}, 0x48) r1 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000080)='/dev/qat_adf_ctl\x00', 0x8200, 0x0) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r1, 0x6, 0x23, &(0x7f00000000c0)={&(0x7f0000ffc000/0x4000)=nil, 0x4000}, &(0x7f0000000140)=0x10) listen(r0, 0x0) unshare(0x40000000) setrlimit(0x0, 0x0) r2 = accept(r0, 0x0, 0x0) write$binfmt_elf64(r2, &(0x7f00000002c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x9, 0x8, 0x0, 0x0, 0x0, 0x4825483b35c83c0b, 0x0, 0x0, 0x40, 0x227}, [{0x4, 0x1, 0xfff, 0x0, 0x0, 0xff8000000002, 0x0, 0x7fff}], "", [[], [], []]}, 0x378) 11:47:09 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1100008912, &(0x7f0000000040)="11dca50d810bcfe47bf070") mmap$binder(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x1, 0x11, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_FSGETXATTR(0xffffffffffffffff, 0x8038550a, &(0x7f0000000000)={0x2, 0x0, 0x0, 0x0, 0x1000020ffd000, 0x7ff0bdbe}) 11:47:09 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_ATTACH(0x8, 0x0, 0x0) r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(0xffffffffffffffff, &(0x7f0000000000)={{0x6, @rose}, [@rose, @rose, @default, @netrom, @bcast, @rose, @rose, @null]}, 0x48) r1 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000080)='/dev/qat_adf_ctl\x00', 0x8200, 0x0) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r1, 0x6, 0x23, &(0x7f00000000c0)={&(0x7f0000ffc000/0x4000)=nil, 0x4000}, &(0x7f0000000140)=0x10) listen(r0, 0x0) unshare(0x40000000) setrlimit(0x0, 0x0) r2 = accept(r0, 0x0, 0x0) write$binfmt_elf64(r2, &(0x7f00000002c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x9, 0x8, 0x0, 0x0, 0x0, 0x4825483b35c83c0b, 0x0, 0x0, 0x40, 0x227}, [{0x4, 0x1, 0xfff, 0x0, 0x0, 0xff8000000002, 0x0, 0x7fff}], "", [[], [], []]}, 0x378) 11:47:09 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x1}, 0x10) r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r0, &(0x7f0000000000)={{0x6, @rose}, [@rose, @rose, @default, @netrom, @bcast, @rose, @rose, @null]}, 0x48) r1 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000080)='/dev/qat_adf_ctl\x00', 0x8200, 0x0) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r1, 0x6, 0x23, &(0x7f00000000c0)={&(0x7f0000ffc000/0x4000)=nil, 0x4000}, &(0x7f0000000140)=0x10) listen(r0, 0x0) unshare(0x40000000) setrlimit(0x0, 0x0) r2 = accept(r0, 0x0, 0x0) write$binfmt_elf64(r2, &(0x7f00000002c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x9, 0x8, 0x0, 0x0, 0x0, 0x4825483b35c83c0b, 0x0, 0x0, 0x40, 0x227}, [{0x4, 0x1, 0xfff, 0x0, 0x0, 0xff8000000002, 0x0, 0x7fff}], "", [[], [], []]}, 0x378) 11:47:09 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_ATTACH(0x8, 0x0, 0x0) r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r0, &(0x7f0000000000)={{0x6, @rose}, [@rose, @rose, @default, @netrom, @bcast, @rose, @rose, @null]}, 0x48) r1 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000080)='/dev/qat_adf_ctl\x00', 0x8200, 0x0) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r1, 0x6, 0x23, &(0x7f00000000c0)={&(0x7f0000ffc000/0x4000)=nil, 0x4000}, &(0x7f0000000140)=0x10) listen(r0, 0x0) unshare(0x40000000) setrlimit(0x0, 0x0) r2 = accept(r0, 0x0, 0x0) write$binfmt_elf64(r2, &(0x7f00000002c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x9, 0x8, 0x0, 0x0, 0x0, 0x4825483b35c83c0b, 0x0, 0x0, 0x40, 0x227}, [{0x4, 0x1, 0xfff, 0x0, 0x0, 0xff8000000002, 0x0, 0x7fff}], "", [[], [], []]}, 0x378) 11:47:09 executing program 1: setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) setsockopt$netlink_NETLINK_BROADCAST_ERROR(0xffffffffffffffff, 0x10e, 0x4, 0x0, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000100)={0x0, 0x37, &(0x7f00000001c0)={&(0x7f0000000040)={0x14, 0x23, 0x1, 0x0, 0x0, {0x20000000004, 0xe00000000000000}}, 0x14}}, 0x0) 11:47:09 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1100008912, &(0x7f0000000040)="11dca50d810bcfe47bf070") mmap$binder(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x1, 0x11, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_FSGETXATTR(0xffffffffffffffff, 0x8038550a, &(0x7f0000000000)={0x2, 0x0, 0x0, 0x0, 0x1000020ffd000, 0x7ff0bdbe}) [ 304.794212][T12551] IPVS: ftp: loaded support on port[0] = 21 [ 304.810650][T12550] IPVS: ftp: loaded support on port[0] = 21 11:47:09 executing program 1: setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) setsockopt$netlink_NETLINK_BROADCAST_ERROR(0xffffffffffffffff, 0x10e, 0x4, 0x0, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000100)={0x0, 0x38, &(0x7f00000001c0)={&(0x7f0000000040)={0x14, 0x23, 0x1, 0x0, 0x0, {0x20000000004, 0xe00000000000000}}, 0x14}}, 0x0) [ 304.854512][T12557] IPVS: ftp: loaded support on port[0] = 21 11:47:09 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1100008912, &(0x7f0000000040)="11dca50d810bcfe47bf070") mmap$binder(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x1, 0x11, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_FSGETXATTR(0xffffffffffffffff, 0x8038550a, &(0x7f0000000000)={0x2, 0x0, 0x0, 0x0, 0x1000020ffd000, 0x7ff0bdbe}) [ 305.052527][T12558] IPVS: ftp: loaded support on port[0] = 21 11:47:10 executing program 5: socket$inet_udplite(0x2, 0x2, 0x88) r0 = syz_open_dev$usb(&(0x7f0000000200)='/dev/bus/usb/00#/00#\x00', 0x40000fffffc, 0x200000000000042) mmap$binder(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x1, 0x11, r0, 0x0) ioctl$FS_IOC_FSGETXATTR(r0, 0x8038550a, &(0x7f0000000000)={0x2, 0x0, 0x0, 0x0, 0x1000020ffd000, 0x7ff0bdbe}) 11:47:10 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_ATTACH(0x8, 0x0, 0x0) r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r0, &(0x7f0000000000)={{0x6, @rose}, [@rose, @rose, @default, @netrom, @bcast, @rose, @rose, @null]}, 0x48) r1 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000080)='/dev/qat_adf_ctl\x00', 0x8200, 0x0) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r1, 0x6, 0x23, &(0x7f00000000c0)={&(0x7f0000ffc000/0x4000)=nil, 0x4000}, &(0x7f0000000140)=0x10) listen(r0, 0x0) unshare(0x40000000) setrlimit(0x0, 0x0) r2 = accept(r0, 0x0, 0x0) write$binfmt_elf64(r2, &(0x7f00000002c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x9, 0x8, 0x0, 0x0, 0x0, 0x4825483b35c83c0b, 0x0, 0x0, 0x40, 0x227}, [{0x4, 0x1, 0xfff, 0x0, 0x0, 0xff8000000002, 0x0, 0x7fff}], "", [[], [], []]}, 0x378) 11:47:10 executing program 1: setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) setsockopt$netlink_NETLINK_BROADCAST_ERROR(0xffffffffffffffff, 0x10e, 0x4, 0x0, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000100)={0x0, 0x39, &(0x7f00000001c0)={&(0x7f0000000040)={0x14, 0x23, 0x1, 0x0, 0x0, {0x20000000004, 0xe00000000000000}}, 0x14}}, 0x0) [ 305.385568][T12573] vhci_hcd: default hub control req: 0000 v0000 i0000 l0 11:47:10 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_ATTACH(0x8, 0x0, 0x0) r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(0xffffffffffffffff, &(0x7f0000000000)={{0x6, @rose}, [@rose, @rose, @default, @netrom, @bcast, @rose, @rose, @null]}, 0x48) r1 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000080)='/dev/qat_adf_ctl\x00', 0x8200, 0x0) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r1, 0x6, 0x23, &(0x7f00000000c0)={&(0x7f0000ffc000/0x4000)=nil, 0x4000}, &(0x7f0000000140)=0x10) listen(r0, 0x0) unshare(0x40000000) setrlimit(0x0, 0x0) r2 = accept(r0, 0x0, 0x0) write$binfmt_elf64(r2, &(0x7f00000002c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x9, 0x8, 0x0, 0x0, 0x0, 0x4825483b35c83c0b, 0x0, 0x0, 0x40, 0x227}, [{0x4, 0x1, 0xfff, 0x0, 0x0, 0xff8000000002, 0x0, 0x7fff}], "", [[], [], []]}, 0x378) 11:47:10 executing program 5: socket$inet_udplite(0x2, 0x2, 0x88) r0 = syz_open_dev$usb(&(0x7f0000000200)='/dev/bus/usb/00#/00#\x00', 0x40000fffffc, 0x200000000000042) mmap$binder(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x1, 0x11, r0, 0x0) ioctl$FS_IOC_FSGETXATTR(r0, 0x8038550a, &(0x7f0000000000)={0x2, 0x0, 0x0, 0x0, 0x1000020ffd000, 0x7ff0bdbe}) [ 305.540900][T12579] IPVS: ftp: loaded support on port[0] = 21 [ 305.665483][T12587] vhci_hcd: default hub control req: 0000 v0000 i0000 l0 [ 305.853459][T12585] IPVS: ftp: loaded support on port[0] = 21 11:47:12 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_ATTACH(0x8, 0x0, 0x0) r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(0xffffffffffffffff, &(0x7f0000000000)={{0x6, @rose}, [@rose, @rose, @default, @netrom, @bcast, @rose, @rose, @null]}, 0x48) r1 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000080)='/dev/qat_adf_ctl\x00', 0x8200, 0x0) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r1, 0x6, 0x23, &(0x7f00000000c0)={&(0x7f0000ffc000/0x4000)=nil, 0x4000}, &(0x7f0000000140)=0x10) listen(r0, 0x0) unshare(0x40000000) setrlimit(0x0, 0x0) r2 = accept(r0, 0x0, 0x0) write$binfmt_elf64(r2, &(0x7f00000002c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x9, 0x8, 0x0, 0x0, 0x0, 0x4825483b35c83c0b, 0x0, 0x0, 0x40, 0x227}, [{0x4, 0x1, 0xfff, 0x0, 0x0, 0xff8000000002, 0x0, 0x7fff}], "", [[], [], []]}, 0x378) 11:47:12 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_ATTACH(0x8, 0x0, 0x0) r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r0, &(0x7f0000000000)={{0x6, @rose}, [@rose, @rose, @default, @netrom, @bcast, @rose, @rose, @null]}, 0x48) r1 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000080)='/dev/qat_adf_ctl\x00', 0x8200, 0x0) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r1, 0x6, 0x23, &(0x7f00000000c0)={&(0x7f0000ffc000/0x4000)=nil, 0x4000}, &(0x7f0000000140)=0x10) listen(r0, 0x0) unshare(0x40000000) setrlimit(0x0, 0x0) r2 = accept(r0, 0x0, 0x0) write$binfmt_elf64(r2, &(0x7f00000002c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x9, 0x8, 0x0, 0x0, 0x0, 0x4825483b35c83c0b, 0x0, 0x0, 0x40, 0x227}, [{0x4, 0x1, 0xfff, 0x0, 0x0, 0xff8000000002, 0x0, 0x7fff}], "", [[], [], []]}, 0x378) 11:47:12 executing program 5: socket$inet_udplite(0x2, 0x2, 0x88) r0 = syz_open_dev$usb(&(0x7f0000000200)='/dev/bus/usb/00#/00#\x00', 0x40000fffffc, 0x200000000000042) mmap$binder(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x1, 0x11, r0, 0x0) ioctl$FS_IOC_FSGETXATTR(r0, 0x8038550a, &(0x7f0000000000)={0x2, 0x0, 0x0, 0x0, 0x1000020ffd000, 0x7ff0bdbe}) 11:47:12 executing program 1: setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) setsockopt$netlink_NETLINK_BROADCAST_ERROR(0xffffffffffffffff, 0x10e, 0x4, 0x0, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000100)={0x0, 0x3a, &(0x7f00000001c0)={&(0x7f0000000040)={0x14, 0x23, 0x1, 0x0, 0x0, {0x20000000004, 0xe00000000000000}}, 0x14}}, 0x0) 11:47:12 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_ATTACH(0x8, 0x0, 0x0) r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r0, &(0x7f0000000000)={{0x6, @rose}, [@rose, @rose, @default, @netrom, @bcast, @rose, @rose, @null]}, 0x48) r1 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000080)='/dev/qat_adf_ctl\x00', 0x8200, 0x0) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r1, 0x6, 0x23, &(0x7f00000000c0)={&(0x7f0000ffc000/0x4000)=nil, 0x4000}, &(0x7f0000000140)=0x10) listen(r0, 0x0) unshare(0x40000000) setrlimit(0x0, 0x0) r2 = accept(r0, 0x0, 0x0) write$binfmt_elf64(r2, &(0x7f00000002c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x9, 0x8, 0x0, 0x0, 0x0, 0x4825483b35c83c0b, 0x0, 0x0, 0x40, 0x227}, [{0x4, 0x1, 0xfff, 0x0, 0x0, 0xff8000000002, 0x0, 0x7fff}], "", [[], [], []]}, 0x378) 11:47:12 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_FSGETXATTR(0xffffffffffffffff, 0x8004550f, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x1}, 0x10) r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r0, &(0x7f0000000000)={{0x6, @rose}, [@rose, @rose, @default, @netrom, @bcast, @rose, @rose, @null]}, 0x48) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(0xffffffffffffffff, 0x6, 0x23, &(0x7f00000000c0)={&(0x7f0000ffc000/0x4000)=nil, 0x4000}, &(0x7f0000000140)=0x10) listen(r0, 0x0) unshare(0x40000000) setrlimit(0x0, 0x0) r1 = accept(r0, 0x0, 0x0) write$binfmt_elf64(r1, &(0x7f00000002c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x9, 0x8, 0x0, 0x0, 0x0, 0x4825483b35c83c0b, 0x0, 0x0, 0x40, 0x227}, [{0x4, 0x1, 0xfff, 0x0, 0x0, 0xff8000000002, 0x0, 0x7fff}], "", [[], [], []]}, 0x378) 11:47:13 executing program 5: ioctl(0xffffffffffffffff, 0x1100008912, &(0x7f0000000040)="11dca50d810bcfe47bf070") r0 = syz_open_dev$usb(&(0x7f0000000200)='/dev/bus/usb/00#/00#\x00', 0x40000fffffc, 0x200000000000042) mmap$binder(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x1, 0x11, r0, 0x0) ioctl$FS_IOC_FSGETXATTR(r0, 0x8038550a, &(0x7f0000000000)={0x2, 0x0, 0x0, 0x0, 0x1000020ffd000, 0x7ff0bdbe}) [ 308.020610][T12608] vhci_hcd: default hub control req: 0000 v0000 i0000 l0 [ 308.083369][T12609] IPVS: ftp: loaded support on port[0] = 21 [ 308.108413][T12610] IPVS: ftp: loaded support on port[0] = 21 [ 308.139183][T12612] IPVS: ftp: loaded support on port[0] = 21 [ 308.151171][T12607] IPVS: ftp: loaded support on port[0] = 21 11:47:13 executing program 1: setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) setsockopt$netlink_NETLINK_BROADCAST_ERROR(0xffffffffffffffff, 0x10e, 0x4, 0x0, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000100)={0x0, 0x3b, &(0x7f00000001c0)={&(0x7f0000000040)={0x14, 0x23, 0x1, 0x0, 0x0, {0x20000000004, 0xe00000000000000}}, 0x14}}, 0x0) [ 308.184507][T12619] vhci_hcd: default hub control req: 0000 v0000 i0000 l0 11:47:13 executing program 5: ioctl(0xffffffffffffffff, 0x1100008912, &(0x7f0000000040)="11dca50d810bcfe47bf070") r0 = syz_open_dev$usb(&(0x7f0000000200)='/dev/bus/usb/00#/00#\x00', 0x40000fffffc, 0x200000000000042) mmap$binder(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x1, 0x11, r0, 0x0) ioctl$FS_IOC_FSGETXATTR(r0, 0x8038550a, &(0x7f0000000000)={0x2, 0x0, 0x0, 0x0, 0x1000020ffd000, 0x7ff0bdbe}) [ 308.432672][T12629] vhci_hcd: default hub control req: 0000 v0000 i0000 l0 11:47:13 executing program 5: ioctl(0xffffffffffffffff, 0x1100008912, &(0x7f0000000040)="11dca50d810bcfe47bf070") r0 = syz_open_dev$usb(&(0x7f0000000200)='/dev/bus/usb/00#/00#\x00', 0x40000fffffc, 0x200000000000042) mmap$binder(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x1, 0x11, r0, 0x0) ioctl$FS_IOC_FSGETXATTR(r0, 0x8038550a, &(0x7f0000000000)={0x2, 0x0, 0x0, 0x0, 0x1000020ffd000, 0x7ff0bdbe}) 11:47:13 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_ATTACH(0x8, 0x0, 0x0) r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(0xffffffffffffffff, &(0x7f0000000000)={{0x6, @rose}, [@rose, @rose, @default, @netrom, @bcast, @rose, @rose, @null]}, 0x48) r1 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000080)='/dev/qat_adf_ctl\x00', 0x8200, 0x0) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r1, 0x6, 0x23, &(0x7f00000000c0)={&(0x7f0000ffc000/0x4000)=nil, 0x4000}, &(0x7f0000000140)=0x10) listen(r0, 0x0) unshare(0x40000000) setrlimit(0x0, 0x0) r2 = accept(r0, 0x0, 0x0) write$binfmt_elf64(r2, &(0x7f00000002c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x9, 0x8, 0x0, 0x0, 0x0, 0x4825483b35c83c0b, 0x0, 0x0, 0x40, 0x227}, [{0x4, 0x1, 0xfff, 0x0, 0x0, 0xff8000000002, 0x0, 0x7fff}], "", [[], [], []]}, 0x378) 11:47:13 executing program 1: setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) setsockopt$netlink_NETLINK_BROADCAST_ERROR(0xffffffffffffffff, 0x10e, 0x4, 0x0, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000100)={0x0, 0x3c, &(0x7f00000001c0)={&(0x7f0000000040)={0x14, 0x23, 0x1, 0x0, 0x0, {0x20000000004, 0xe00000000000000}}, 0x14}}, 0x0) [ 308.715281][T12635] vhci_hcd: default hub control req: 0000 v0000 i0000 l0 [ 308.775181][T12639] IPVS: ftp: loaded support on port[0] = 21 11:47:13 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_ATTACH(0x8, 0x0, 0x0) r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r0, 0x0, 0x0) r1 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000080)='/dev/qat_adf_ctl\x00', 0x8200, 0x0) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r1, 0x6, 0x23, &(0x7f00000000c0)={&(0x7f0000ffc000/0x4000)=nil, 0x4000}, &(0x7f0000000140)=0x10) listen(r0, 0x0) unshare(0x40000000) setrlimit(0x0, 0x0) r2 = accept(r0, 0x0, 0x0) write$binfmt_elf64(r2, &(0x7f00000002c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x9, 0x8, 0x0, 0x0, 0x0, 0x4825483b35c83c0b, 0x0, 0x0, 0x40, 0x227}, [{0x4, 0x1, 0xfff, 0x0, 0x0, 0xff8000000002, 0x0, 0x7fff}], "", [[], [], []]}, 0x378) 11:47:13 executing program 5: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x1100008912, &(0x7f0000000040)="11dca50d810bcfe47bf070") r0 = syz_open_dev$usb(&(0x7f0000000200)='/dev/bus/usb/00#/00#\x00', 0x40000fffffc, 0x200000000000042) mmap$binder(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x1, 0x11, r0, 0x0) ioctl$FS_IOC_FSGETXATTR(r0, 0x8038550a, &(0x7f0000000000)={0x2, 0x0, 0x0, 0x0, 0x1000020ffd000, 0x7ff0bdbe}) 11:47:13 executing program 0: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='devtmpfs\x00', 0x0, 0x0) chdir(&(0x7f00000000c0)='./file0\x00') pipe(0x0) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mkdir(0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$overlay(0x40000f, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="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"]) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000240)='cgroup2\x00', 0x0, 0x0) fstat(0xffffffffffffffff, &(0x7f00000008c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000005ec0)={{{@in6=@empty, @in=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@remote}, 0x0, @in6=@mcast2}}, &(0x7f0000004800)=0xffffffffffffffc3) r3 = geteuid() setsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f00000060c0)={{{@in=@remote, @in6=@rand_addr="20bbcbd1865253e3e58aa219d6ca6440", 0x4e21, 0x2400000000000000, 0x4e22, 0x0, 0xa, 0xa0, 0x0, 0x67, r2, r3}, {0x6, 0x183, 0x3, 0x7f, 0x61553a0b, 0x9, 0x1, 0x4}, {0x20, 0x80000001, 0x2000000000001, 0x9}, 0x9, 0x6e6bba, 0x0, 0x0, 0x1, 0x3}, {{@in=@empty, 0x4d3, 0x3c}, 0xa, @in=@loopback, 0x3504, 0x0, 0x3, 0xfffffffffffffffc, 0x1ff, 0x5, 0x6}}, 0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000940)={{{@in6, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@dev}, 0x0, @in6=@local}}, &(0x7f0000000a40)=0xe8) r5 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r5, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") getsockopt$inet_IP_IPSEC_POLICY(r5, 0x0, 0x10, &(0x7f0000005ec0)={{{@in6=@empty, @in=@local}}, {{@in6=@remote}, 0x0, @in6=@mcast2}}, &(0x7f0000004800)=0xffffffffffffffc3) r6 = geteuid() syz_mount_image$hfsplus(&(0x7f0000000140)='hfsplus\x00', &(0x7f0000000200)='./file0\x00', 0x3, 0x7, &(0x7f0000000800)=[{&(0x7f0000000400)="e1ec051c0b7b96db7480b4620be1f7d4adcb21d5233a3d23bf43659e5359470de231dd734b698cd71201837ca57f911328e1aee6b2cb39533b2d549e", 0x3c, 0x101}, {&(0x7f0000000440)="dbac23926131781587488e056e40b191269651683d0d195cbd63543040e313e20126fd634002e0256fed786d07054466250e2de6b7fb6d7d8d5201ac1478ef26aafeae7947832c4cc7fea6315e92eb81c89a385dae378bf89ca53c6984b5aa79a7dcc139938fa64b30d7c24ff7b215c890be5756df2f441d0fcb938cb4c1f89245a47c630a2b5e28bb7b5a9c8c871c45857bc4fa646b30f485beccdf529ad0cd519a0bed9b5c7df28320d9ad7eceb30eda6c964cfcab57c8aa98b89d582792b886e41c9f6146332e31f93b", 0xcb, 0x1ff}, {&(0x7f0000000540)="5c96cd9925cbe6753ba234c06f8040f650bba8d4d4ebe59964acf97c49f7a5e793521ef728d90a4eb42cbe7a2536c6922f049b20f2c681c652b4dbe077b0a9972e1eeb5573d7ee69d6fc99d4e4894537fac772842763140c5d832bf593a5cc290fd0c641d14d06e564127871808073fb6fd27f2a9995b29abce9351b0b285f4887f1cc8de04d147141af2ed66cfb66fd230e329273710457efc72a8d09487b5c83e77201b28eb38d7d3846b63b1bf1233b5c925303dd3214066c99381b0457a62397c7df27f88e19a884e1dfa6", 0xcd, 0x6}, {&(0x7f0000000640)="8ae3f201063e83beadb088cb1080ef67", 0x10, 0x2a}, {&(0x7f0000000680)="dfeed81fb09a8a0d55f0999ce7730866db77fa306b896464e4d9cf133371563c7eb734eed8ec2dda58c030b96771bb708fba592614b985c573e8f3db424553c6", 0x40, 0x4}, {&(0x7f00000006c0)="f33dec9b5d96888f1504b1385ce82fdf8f2fa76ecc6ebf567753242a4c9129cd4c4885ba8bab1fd3120749889c981acccb344645e9d1ce95826ab7ceac8b7646d2e476e8934ac444aad3bba14f0d4be15675cd3d336db510c72ebbc07a000754d66f5282b1f241556cbd63a30b3d6af0f5c8a2443b03a92bb406abbb5f630ce1ef2afbba93c29e6bc46901a91ea9d91fa6048a468df5934437ca7e9e2a4fe38fddcd2aecac9406aa7adf5de93082ebf1b5c74d76b7b1b72a9b6fea1c5ab7cc1f3e97b5d7e1db9a64df9836ce0863cda956a1e2a45b9479b8ade23e81258e9444dfbf8066562f79", 0xe7, 0x7}, {&(0x7f00000007c0)="cd72eca63713ca8a35c3557b7d56b6a3073ca69e2067c18f5120c05d4ee8", 0x1e, 0x6}], 0x1, &(0x7f0000000a80)={[{@barrier='barrier'}, {@gid={'gid', 0x3d, r0}}, {@nodecompose='nodecompose'}, {@uid={'uid', 0x3d, r3}}, {@type={'type', 0x3d, "ae8c9d8f"}}, {@decompose='decompose'}, {@session={'session', 0x3d, 0x25}}], [{@uid_eq={'uid', 0x3d, r4}}, {@obj_type={'obj_type', 0x3d, 'overlay\x00'}}, {@euid_eq={'euid', 0x3d, r6}}, {@uid_eq={'uid'}}]}) 11:47:13 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_ATTACH(0x8, 0x0, 0x0) r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r0, &(0x7f0000000000)={{0x6, @rose}, [@rose, @rose, @default, @netrom, @bcast, @rose, @rose, @null]}, 0x48) r1 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000080)='/dev/qat_adf_ctl\x00', 0x8200, 0x0) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r1, 0x6, 0x23, &(0x7f00000000c0)={&(0x7f0000ffc000/0x4000)=nil, 0x4000}, &(0x7f0000000140)=0x10) listen(r0, 0x0) unshare(0x40000000) setrlimit(0x0, 0x0) accept(r0, 0x0, 0x0) [ 308.940124][T12643] vhci_hcd: default hub control req: 0000 v0000 i0000 l0 11:47:14 executing program 1: setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) setsockopt$netlink_NETLINK_BROADCAST_ERROR(0xffffffffffffffff, 0x10e, 0x4, 0x0, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000100)={0x0, 0x3d, &(0x7f00000001c0)={&(0x7f0000000040)={0x14, 0x23, 0x1, 0x0, 0x0, {0x20000000004, 0xe00000000000000}}, 0x14}}, 0x0) 11:47:14 executing program 5: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x1100008912, &(0x7f0000000040)="11dca50d810bcfe47bf070") r0 = syz_open_dev$usb(&(0x7f0000000200)='/dev/bus/usb/00#/00#\x00', 0x40000fffffc, 0x200000000000042) mmap$binder(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x1, 0x11, r0, 0x0) ioctl$FS_IOC_FSGETXATTR(r0, 0x8038550a, &(0x7f0000000000)={0x2, 0x0, 0x0, 0x0, 0x1000020ffd000, 0x7ff0bdbe}) [ 309.098638][T12646] overlayfs: unrecognized mount option "uppFrdir=./file0" or missing value [ 309.134310][T12655] hfsplus: unable to parse mount options [ 309.192199][T12659] IPVS: ftp: loaded support on port[0] = 21 [ 309.195805][T12653] IPVS: ftp: loaded support on port[0] = 21 11:47:14 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_FSGETXATTR(0xffffffffffffffff, 0x8004550f, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x1}, 0x10) r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r0, &(0x7f0000000000)={{0x6, @rose}, [@rose, @rose, @default, @netrom, @bcast, @rose, @rose, @null]}, 0x48) openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000080)='/dev/qat_adf_ctl\x00', 0x8200, 0x0) listen(r0, 0x0) unshare(0x40000000) setrlimit(0x0, 0x0) r1 = accept(r0, 0x0, 0x0) write$binfmt_elf64(r1, &(0x7f00000002c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x9, 0x8, 0x0, 0x0, 0x0, 0x4825483b35c83c0b, 0x0, 0x0, 0x40, 0x227}, [{0x4, 0x1, 0xfff, 0x0, 0x0, 0xff8000000002, 0x0, 0x7fff}], "", [[], [], []]}, 0x378) 11:47:14 executing program 0: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='devtmpfs\x00', 0x0, 0x0) chdir(&(0x7f00000000c0)='./file0\x00') pipe(0x0) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mkdir(0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$overlay(0x40000f, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="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"]) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000240)='cgroup2\x00', 0x0, 0x0) fstat(0xffffffffffffffff, &(0x7f00000008c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_mount_image$hfsplus(&(0x7f0000000140)='hfsplus\x00', &(0x7f0000000200)='./file0\x00', 0x3, 0x7, &(0x7f0000000800)=[{&(0x7f0000000400)="e1ec051c0b7b96db7480b4620be1f7d4adcb21d5233a3d23bf43659e5359470de231dd734b698cd71201837ca57f911328e1aee6b2cb39533b2d549e", 0x3c, 0x101}, {&(0x7f0000000440)="dbac23926131781587488e056e40b191269651683d0d195cbd63543040e313e20126fd634002e0256fed786d07054466250e2de6b7fb6d7d8d5201ac1478ef26aafeae7947832c4cc7fea6315e92eb81c89a385dae378bf89ca53c6984b5aa79a7dcc139938fa64b30d7c24ff7b215c890be5756df2f441d0fcb938cb4c1f89245a47c630a2b5e28bb7b5a9c8c871c45857bc4fa646b30f485beccdf529ad0cd519a0bed9b5c7df28320d9ad7eceb30eda6c964cfcab57c8aa98b89d582792b886e41c9f6146332e31f93b", 0xcb, 0x1ff}, {&(0x7f0000000540)="5c96cd9925cbe6753ba234c06f8040f650bba8d4d4ebe59964acf97c49f7a5e793521ef728d90a4eb42cbe7a2536c6922f049b20f2c681c652b4dbe077b0a9972e1eeb5573d7ee69d6fc99d4e4894537fac772842763140c5d832bf593a5cc290fd0c641d14d06e564127871808073fb6fd27f2a9995b29abce9351b0b285f4887f1cc8de04d147141af2ed66cfb66fd230e329273710457efc72a8d09487b5c83e77201b28eb38d7d3846b63b1bf1233b5c925303dd3214066c99381b0457a62397c7df27f88e19a884e1dfa6", 0xcd, 0x6}, {&(0x7f0000000640)="8ae3f201063e83beadb088cb1080ef67", 0x10, 0x2a}, {&(0x7f0000000680)="dfeed81fb09a8a0d55f0999ce7730866db77fa306b896464e4d9cf133371563c7eb734eed8ec2dda58c030b96771bb708fba592614b985c573e8f3db424553c6", 0x40, 0x4}, {&(0x7f00000006c0)="f33dec9b5d96888f1504b1385ce82fdf8f2fa76ecc6ebf567753242a4c9129cd4c4885ba8bab1fd3120749889c981acccb344645e9d1ce95826ab7ceac8b7646d2e476e8934ac444aad3bba14f0d4be15675cd3d336db510c72ebbc07a000754d66f5282b1f241556cbd63a30b3d6af0f5c8a2443b03a92bb406abbb5f630ce1ef2afbba93c29e6bc46901a91ea9d91fa6048a468df5934437ca7e9e2a4fe38fddcd2aecac9406aa7adf5de93082ebf1b5c74d76b7b1b72a9b6fea1c5ab7cc1f3e97b5d7e1db9a64df9836ce0863cda956a1e2a45b9479b8ade23e81258e9444dfbf8066562f79", 0xe7, 0x7}, {&(0x7f00000007c0)="cd72eca63713ca8a35c3557b7d56b6a3073ca69e2067c18f5120c05d4ee8", 0x1e, 0x6}], 0x1, &(0x7f0000000a80)={[{@barrier='barrier'}, {@gid={'gid', 0x3d, r0}}, {@nodecompose='nodecompose'}, {@uid={'uid'}}, {@type={'type', 0x3d, "ae8c9d8f"}}, {@decompose='decompose'}, {@session={'session', 0x3d, 0x25}}], [{@uid_eq={'uid'}}, {@obj_type={'obj_type', 0x3d, 'overlay\x00'}}, {@euid_eq={'euid'}}, {@uid_eq={'uid'}}]}) [ 309.318332][T12664] vhci_hcd: default hub control req: 0000 v0000 i0000 l0 11:47:14 executing program 5: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x1100008912, &(0x7f0000000040)="11dca50d810bcfe47bf070") r0 = syz_open_dev$usb(&(0x7f0000000200)='/dev/bus/usb/00#/00#\x00', 0x40000fffffc, 0x200000000000042) mmap$binder(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x1, 0x11, r0, 0x0) ioctl$FS_IOC_FSGETXATTR(r0, 0x8038550a, &(0x7f0000000000)={0x2, 0x0, 0x0, 0x0, 0x1000020ffd000, 0x7ff0bdbe}) [ 309.500298][T12674] IPVS: ftp: loaded support on port[0] = 21 11:47:14 executing program 1: setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) setsockopt$netlink_NETLINK_BROADCAST_ERROR(0xffffffffffffffff, 0x10e, 0x4, 0x0, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000100)={0x0, 0x3e, &(0x7f00000001c0)={&(0x7f0000000040)={0x14, 0x23, 0x1, 0x0, 0x0, {0x20000000004, 0xe00000000000000}}, 0x14}}, 0x0) [ 309.597957][T12679] vhci_hcd: default hub control req: 0000 v0000 i0000 l0 [ 309.620762][T12677] overlayfs: unrecognized mount option "uppFrdir=./file0" or missing value 11:47:14 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, &(0x7f0000000040)="11dca50d810bcfe47bf070") r1 = syz_open_dev$usb(&(0x7f0000000200)='/dev/bus/usb/00#/00#\x00', 0x40000fffffc, 0x200000000000042) mmap$binder(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x1, 0x11, r1, 0x0) ioctl$FS_IOC_FSGETXATTR(r1, 0x8038550a, &(0x7f0000000000)={0x2, 0x0, 0x0, 0x0, 0x1000020ffd000, 0x7ff0bdbe}) 11:47:14 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, &(0x7f0000000040)="11dca50d810bcfe47bf070") r1 = syz_open_dev$usb(&(0x7f0000000200)='/dev/bus/usb/00#/00#\x00', 0x40000fffffc, 0x200000000000042) mmap$binder(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x1, 0x11, r1, 0x0) ioctl$FS_IOC_FSGETXATTR(r1, 0x8038550a, &(0x7f0000000000)={0x2, 0x0, 0x0, 0x0, 0x1000020ffd000, 0x7ff0bdbe}) [ 309.760854][T12687] vhci_hcd: default hub control req: 0000 v0000 i0000 l0 [ 309.782778][T12684] hfsplus: unable to parse mount options [ 309.922449][T12692] vhci_hcd: default hub control req: 0000 v0000 i0000 l0 11:47:16 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_ATTACH(0x8, 0x0, 0x0) r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r0, 0x0, 0x0) r1 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000080)='/dev/qat_adf_ctl\x00', 0x8200, 0x0) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r1, 0x6, 0x23, &(0x7f00000000c0)={&(0x7f0000ffc000/0x4000)=nil, 0x4000}, &(0x7f0000000140)=0x10) listen(r0, 0x0) unshare(0x40000000) setrlimit(0x0, 0x0) r2 = accept(r0, 0x0, 0x0) write$binfmt_elf64(r2, &(0x7f00000002c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x9, 0x8, 0x0, 0x0, 0x0, 0x4825483b35c83c0b, 0x0, 0x0, 0x40, 0x227}, [{0x4, 0x1, 0xfff, 0x0, 0x0, 0xff8000000002, 0x0, 0x7fff}], "", [[], [], []]}, 0x378) 11:47:16 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_ATTACH(0x8, 0x0, 0x0) r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r0, &(0x7f0000000000)={{0x6, @rose}, [@rose, @rose, @default, @netrom, @bcast, @rose, @rose, @null]}, 0x48) r1 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000080)='/dev/qat_adf_ctl\x00', 0x8200, 0x0) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r1, 0x6, 0x23, &(0x7f00000000c0)={&(0x7f0000ffc000/0x4000)=nil, 0x4000}, &(0x7f0000000140)=0x10) listen(r0, 0x0) unshare(0x40000000) setrlimit(0x0, 0x0) accept(r0, 0x0, 0x0) 11:47:16 executing program 0 (fault-call:0 fault-nth:0): syz_mount_image$hfsplus(&(0x7f0000000140)='hfsplus\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000a80)={[{@barrier='barrier'}, {@gid={'gid'}}, {@type={'type', 0x3d, "ae8c9d8f"}}]}) 11:47:16 executing program 1: setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) setsockopt$netlink_NETLINK_BROADCAST_ERROR(0xffffffffffffffff, 0x10e, 0x4, 0x0, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000100)={0x0, 0x41, &(0x7f00000001c0)={&(0x7f0000000040)={0x14, 0x23, 0x1, 0x0, 0x0, {0x20000000004, 0xe00000000000000}}, 0x14}}, 0x0) 11:47:16 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, &(0x7f0000000040)="11dca50d810bcfe47bf070") r1 = syz_open_dev$usb(&(0x7f0000000200)='/dev/bus/usb/00#/00#\x00', 0x40000fffffc, 0x200000000000042) mmap$binder(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x1, 0x11, r1, 0x0) ioctl$FS_IOC_FSGETXATTR(r1, 0x8038550a, &(0x7f0000000000)={0x2, 0x0, 0x0, 0x0, 0x1000020ffd000, 0x7ff0bdbe}) 11:47:16 executing program 3 (fault-call:0 fault-nth:0): syz_mount_image$hfsplus(&(0x7f0000000140)='hfsplus\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000a80)={[{@barrier='barrier'}, {@gid={'gid'}}, {@type={'type', 0x3d, "ae8c9d8f"}}]}) [ 311.865748][T12708] FAULT_INJECTION: forcing a failure. [ 311.865748][T12708] name failslab, interval 1, probability 0, space 0, times 0 [ 311.890045][T12711] FAULT_INJECTION: forcing a failure. [ 311.890045][T12711] name failslab, interval 1, probability 0, space 0, times 0 [ 311.923132][T12706] vhci_hcd: default hub control req: 0000 v0000 i0000 l0 [ 311.955996][T12708] CPU: 0 PID: 12708 Comm: syz-executor.0 Not tainted 5.3.0+ #0 [ 311.963566][T12708] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 311.973618][T12708] Call Trace: [ 311.976916][T12708] dump_stack+0x172/0x1f0 [ 311.981261][T12708] should_fail.cold+0xa/0x15 [ 311.985861][T12708] ? fault_create_debugfs_attr+0x180/0x180 [ 311.991676][T12708] ? ___might_sleep+0x163/0x2c0 [ 311.996535][T12708] __should_failslab+0x121/0x190 [ 312.001474][T12708] should_failslab+0x9/0x14 [ 312.001492][T12708] __kmalloc+0x2e0/0x770 [ 312.001511][T12708] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 312.001524][T12708] ? fput_many+0x12c/0x1a0 [ 312.001543][T12708] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 312.020861][T12708] ? strnlen_user+0x1ed/0x2e0 [ 312.020877][T12708] ? __x64_sys_memfd_create+0x13c/0x470 [ 312.020895][T12708] __x64_sys_memfd_create+0x13c/0x470 [ 312.020908][T12708] ? memfd_fcntl+0x18c0/0x18c0 [ 312.042808][T12708] ? do_syscall_64+0x26/0x760 [ 312.042827][T12708] ? lockdep_hardirqs_on+0x421/0x5e0 [ 312.042843][T12708] ? trace_hardirqs_on+0x67/0x240 [ 312.042863][T12708] do_syscall_64+0xfa/0x760 [ 312.057539][T12708] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 312.057555][T12708] RIP: 0033:0x459a29 [ 312.067036][T12708] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 312.067045][T12708] RSP: 002b:00007ff9d7cf6a88 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 312.067060][T12708] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 0000000000459a29 [ 312.067068][T12708] RDX: 0000000000000010 RSI: 0000000000000000 RDI: 00000000004be948 [ 312.067077][T12708] RBP: 000000000075bf20 R08: fe03f80fe03f80ff R09: 00000000fbad8001 [ 312.067086][T12708] R10: 0000000000000000 R11: 0000000000000246 R12: 00007ff9d7cf76d4 [ 312.067094][T12708] R13: 00000000004c8be0 R14: 00000000004dfcd8 R15: 0000000000000003 [ 312.069034][T12711] CPU: 0 PID: 12711 Comm: syz-executor.3 Not tainted 5.3.0+ #0 [ 312.096679][T12711] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 312.096686][T12711] Call Trace: [ 312.096705][T12711] dump_stack+0x172/0x1f0 [ 312.096729][T12711] should_fail.cold+0xa/0x15 [ 312.096748][T12711] ? fault_create_debugfs_attr+0x180/0x180 [ 312.096769][T12711] ? ___might_sleep+0x163/0x2c0 [ 312.096791][T12711] __should_failslab+0x121/0x190 [ 312.096810][T12711] should_failslab+0x9/0x14 [ 312.096826][T12711] __kmalloc+0x2e0/0x770 [ 312.096843][T12711] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 312.096857][T12711] ? fput_many+0x12c/0x1a0 [ 312.096876][T12711] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 312.135508][T12714] IPVS: ftp: loaded support on port[0] = 21 11:47:17 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1100008912, 0x0) r1 = syz_open_dev$usb(&(0x7f0000000200)='/dev/bus/usb/00#/00#\x00', 0x40000fffffc, 0x200000000000042) mmap$binder(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x1, 0x11, r1, 0x0) ioctl$FS_IOC_FSGETXATTR(r1, 0x8038550a, &(0x7f0000000000)={0x2, 0x0, 0x0, 0x0, 0x1000020ffd000, 0x7ff0bdbe}) [ 312.137113][T12711] ? strnlen_user+0x1ed/0x2e0 [ 312.137130][T12711] ? __x64_sys_memfd_create+0x13c/0x470 [ 312.137149][T12711] __x64_sys_memfd_create+0x13c/0x470 [ 312.137166][T12711] ? memfd_fcntl+0x18c0/0x18c0 [ 312.137182][T12711] ? do_syscall_64+0x26/0x760 [ 312.137198][T12711] ? lockdep_hardirqs_on+0x421/0x5e0 [ 312.137212][T12711] ? trace_hardirqs_on+0x67/0x240 [ 312.137230][T12711] do_syscall_64+0xfa/0x760 [ 312.162754][T12711] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 312.162766][T12711] RIP: 0033:0x459a29 [ 312.162782][T12711] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 312.162789][T12711] RSP: 002b:00007faeae1cca88 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 312.162804][T12711] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 0000000000459a29 [ 312.162816][T12711] RDX: 0000000000000010 RSI: 0000000000000000 RDI: 00000000004be948 [ 312.221970][T12711] RBP: 000000000075bf20 R08: fe03f80fe03f80ff R09: 00000000fbad8001 [ 312.221980][T12711] R10: 0000000000000000 R11: 0000000000000246 R12: 00007faeae1cd6d4 [ 312.221989][T12711] R13: 00000000004c8be0 R14: 00000000004dfcd8 R15: 0000000000000003 [ 312.322279][T12719] vhci_hcd: default hub control req: 0000 v0000 i0000 l0 11:47:17 executing program 0 (fault-call:0 fault-nth:1): syz_mount_image$hfsplus(&(0x7f0000000140)='hfsplus\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000a80)={[{@barrier='barrier'}, {@gid={'gid'}}, {@type={'type', 0x3d, "ae8c9d8f"}}]}) [ 312.453799][T12715] IPVS: ftp: loaded support on port[0] = 21 11:47:17 executing program 1: setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) setsockopt$netlink_NETLINK_BROADCAST_ERROR(0xffffffffffffffff, 0x10e, 0x4, 0x0, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000100)={0x0, 0x42, &(0x7f00000001c0)={&(0x7f0000000040)={0x14, 0x23, 0x1, 0x0, 0x0, {0x20000000004, 0xe00000000000000}}, 0x14}}, 0x0) [ 312.542043][T12724] FAULT_INJECTION: forcing a failure. [ 312.542043][T12724] name failslab, interval 1, probability 0, space 0, times 0 [ 312.602659][T12724] CPU: 0 PID: 12724 Comm: syz-executor.0 Not tainted 5.3.0+ #0 [ 312.610240][T12724] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 312.620288][T12724] Call Trace: [ 312.620312][T12724] dump_stack+0x172/0x1f0 [ 312.620338][T12724] should_fail.cold+0xa/0x15 [ 312.620359][T12724] ? fault_create_debugfs_attr+0x180/0x180 [ 312.620380][T12724] ? ___might_sleep+0x163/0x2c0 [ 312.620418][T12724] __should_failslab+0x121/0x190 [ 312.628008][T12724] ? shmem_destroy_inode+0x80/0x80 [ 312.628028][T12724] should_failslab+0x9/0x14 [ 312.628047][T12724] kmem_cache_alloc+0x2aa/0x710 [ 312.628073][T12724] ? __alloc_fd+0x487/0x620 [ 312.648213][T12724] ? shmem_destroy_inode+0x80/0x80 [ 312.648229][T12724] shmem_alloc_inode+0x1c/0x50 [ 312.648245][T12724] alloc_inode+0x68/0x1e0 [ 312.648264][T12724] new_inode_pseudo+0x19/0xf0 [ 312.662671][T12724] new_inode+0x1f/0x40 [ 312.662688][T12724] shmem_get_inode+0x84/0x7e0 [ 312.662712][T12724] __shmem_file_setup.part.0+0x7e/0x2b0 11:47:17 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1100008912, 0x0) r1 = syz_open_dev$usb(&(0x7f0000000200)='/dev/bus/usb/00#/00#\x00', 0x40000fffffc, 0x200000000000042) mmap$binder(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x1, 0x11, r1, 0x0) ioctl$FS_IOC_FSGETXATTR(r1, 0x8038550a, &(0x7f0000000000)={0x2, 0x0, 0x0, 0x0, 0x1000020ffd000, 0x7ff0bdbe}) 11:47:17 executing program 3 (fault-call:0 fault-nth:1): syz_mount_image$hfsplus(&(0x7f0000000140)='hfsplus\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000a80)={[{@barrier='barrier'}, {@gid={'gid'}}, {@type={'type', 0x3d, "ae8c9d8f"}}]}) [ 312.662729][T12724] shmem_file_setup+0x66/0x90 [ 312.662749][T12724] __x64_sys_memfd_create+0x2a2/0x470 [ 312.672319][T12724] ? memfd_fcntl+0x18c0/0x18c0 [ 312.672335][T12724] ? do_syscall_64+0x26/0x760 [ 312.672349][T12724] ? lockdep_hardirqs_on+0x421/0x5e0 [ 312.672366][T12724] ? trace_hardirqs_on+0x67/0x240 [ 312.700307][T12724] do_syscall_64+0xfa/0x760 [ 312.700336][T12724] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 312.724987][T12724] RIP: 0033:0x459a29 [ 312.725003][T12724] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 312.725011][T12724] RSP: 002b:00007ff9d7cf6a88 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 312.725029][T12724] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 0000000000459a29 [ 312.740382][T12724] RDX: 0000000000000010 RSI: 0000000000000000 RDI: 00000000004be948 [ 312.740392][T12724] RBP: 000000000075bf20 R08: fe03f80fe03f80ff R09: 00000000fbad8001 [ 312.740401][T12724] R10: 0000000000000000 R11: 0000000000000246 R12: 00007ff9d7cf76d4 [ 312.740411][T12724] R13: 00000000004c8be0 R14: 00000000004dfcd8 R15: 0000000000000003 [ 312.761093][T12731] vhci_hcd: default hub control req: 0000 v0000 i0000 l0 [ 312.844699][T12734] FAULT_INJECTION: forcing a failure. [ 312.844699][T12734] name failslab, interval 1, probability 0, space 0, times 0 [ 312.904581][T12734] CPU: 1 PID: 12734 Comm: syz-executor.3 Not tainted 5.3.0+ #0 [ 312.912158][T12734] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 312.912166][T12734] Call Trace: [ 312.912187][T12734] dump_stack+0x172/0x1f0 [ 312.912211][T12734] should_fail.cold+0xa/0x15 [ 312.912235][T12734] ? fault_create_debugfs_attr+0x180/0x180 [ 312.912252][T12734] ? ___might_sleep+0x163/0x2c0 [ 312.912270][T12734] __should_failslab+0x121/0x190 [ 312.912287][T12734] ? shmem_destroy_inode+0x80/0x80 [ 312.940479][T12734] should_failslab+0x9/0x14 [ 312.940499][T12734] kmem_cache_alloc+0x2aa/0x710 [ 312.940514][T12734] ? __alloc_fd+0x487/0x620 [ 312.940534][T12734] ? shmem_destroy_inode+0x80/0x80 [ 312.940547][T12734] shmem_alloc_inode+0x1c/0x50 [ 312.940563][T12734] alloc_inode+0x68/0x1e0 [ 312.950318][T12734] new_inode_pseudo+0x19/0xf0 [ 312.950334][T12734] new_inode+0x1f/0x40 [ 312.950348][T12734] shmem_get_inode+0x84/0x7e0 [ 312.950372][T12734] __shmem_file_setup.part.0+0x7e/0x2b0 11:47:17 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1100008912, 0x0) r1 = syz_open_dev$usb(&(0x7f0000000200)='/dev/bus/usb/00#/00#\x00', 0x40000fffffc, 0x200000000000042) mmap$binder(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x1, 0x11, r1, 0x0) ioctl$FS_IOC_FSGETXATTR(r1, 0x8038550a, &(0x7f0000000000)={0x2, 0x0, 0x0, 0x0, 0x1000020ffd000, 0x7ff0bdbe}) [ 312.959940][T12734] shmem_file_setup+0x66/0x90 [ 312.959959][T12734] __x64_sys_memfd_create+0x2a2/0x470 [ 312.959976][T12734] ? memfd_fcntl+0x18c0/0x18c0 [ 312.959993][T12734] ? do_syscall_64+0x26/0x760 [ 312.960010][T12734] ? lockdep_hardirqs_on+0x421/0x5e0 [ 312.960027][T12734] ? trace_hardirqs_on+0x67/0x240 [ 312.974421][T12734] do_syscall_64+0xfa/0x760 [ 312.974444][T12734] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 312.974455][T12734] RIP: 0033:0x459a29 [ 312.974472][T12734] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 312.983504][T12734] RSP: 002b:00007faeae1cca88 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 312.983518][T12734] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 0000000000459a29 [ 312.983527][T12734] RDX: 0000000000000010 RSI: 0000000000000000 RDI: 00000000004be948 [ 312.983536][T12734] RBP: 000000000075bf20 R08: fe03f80fe03f80ff R09: 00000000fbad8001 [ 312.983545][T12734] R10: 0000000000000000 R11: 0000000000000246 R12: 00007faeae1cd6d4 [ 312.983552][T12734] R13: 00000000004c8be0 R14: 00000000004dfcd8 R15: 0000000000000003 [ 313.081168][T12737] vhci_hcd: default hub control req: 0000 v0000 i0000 l0 11:47:20 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_ATTACH(0x8, 0x0, 0x0) r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r0, 0x0, 0x0) r1 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000080)='/dev/qat_adf_ctl\x00', 0x8200, 0x0) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r1, 0x6, 0x23, &(0x7f00000000c0)={&(0x7f0000ffc000/0x4000)=nil, 0x4000}, &(0x7f0000000140)=0x10) listen(r0, 0x0) unshare(0x40000000) setrlimit(0x0, 0x0) r2 = accept(r0, 0x0, 0x0) write$binfmt_elf64(r2, &(0x7f00000002c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x9, 0x8, 0x0, 0x0, 0x0, 0x4825483b35c83c0b, 0x0, 0x0, 0x40, 0x227}, [{0x4, 0x1, 0xfff, 0x0, 0x0, 0xff8000000002, 0x0, 0x7fff}], "", [[], [], []]}, 0x378) [ 315.770098][T12744] IPVS: ftp: loaded support on port[0] = 21 11:47:20 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_ATTACH(0x8, 0x0, 0x0) r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r0, &(0x7f0000000000)={{0x6, @rose}, [@rose, @rose, @default, @netrom, @bcast, @rose, @rose, @null]}, 0x48) r1 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000080)='/dev/qat_adf_ctl\x00', 0x8200, 0x0) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r1, 0x6, 0x23, &(0x7f00000000c0)={&(0x7f0000ffc000/0x4000)=nil, 0x4000}, &(0x7f0000000140)=0x10) listen(r0, 0x0) unshare(0x40000000) setrlimit(0x0, 0x0) accept(r0, 0x0, 0x0) 11:47:20 executing program 0 (fault-call:0 fault-nth:2): syz_mount_image$hfsplus(&(0x7f0000000140)='hfsplus\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000a80)={[{@barrier='barrier'}, {@gid={'gid'}}, {@type={'type', 0x3d, "ae8c9d8f"}}]}) 11:47:20 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1100008912, &(0x7f0000000040)) r1 = syz_open_dev$usb(&(0x7f0000000200)='/dev/bus/usb/00#/00#\x00', 0x40000fffffc, 0x200000000000042) mmap$binder(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x1, 0x11, r1, 0x0) ioctl$FS_IOC_FSGETXATTR(r1, 0x8038550a, &(0x7f0000000000)={0x2, 0x0, 0x0, 0x0, 0x1000020ffd000, 0x7ff0bdbe}) 11:47:20 executing program 3 (fault-call:0 fault-nth:2): syz_mount_image$hfsplus(&(0x7f0000000140)='hfsplus\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000a80)={[{@barrier='barrier'}, {@gid={'gid'}}, {@type={'type', 0x3d, "ae8c9d8f"}}]}) 11:47:20 executing program 1: setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) setsockopt$netlink_NETLINK_BROADCAST_ERROR(0xffffffffffffffff, 0x10e, 0x4, 0x0, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000100)={0x0, 0x43, &(0x7f00000001c0)={&(0x7f0000000040)={0x14, 0x23, 0x1, 0x0, 0x0, {0x20000000004, 0xe00000000000000}}, 0x14}}, 0x0) [ 315.893900][T12753] FAULT_INJECTION: forcing a failure. [ 315.893900][T12753] name failslab, interval 1, probability 0, space 0, times 0 [ 315.907154][T12751] vhci_hcd: default hub control req: 0000 v0000 i0000 l0 [ 315.909657][T12754] FAULT_INJECTION: forcing a failure. [ 315.909657][T12754] name failslab, interval 1, probability 0, space 0, times 0 11:47:20 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1100008912, &(0x7f0000000040)) r1 = syz_open_dev$usb(&(0x7f0000000200)='/dev/bus/usb/00#/00#\x00', 0x40000fffffc, 0x200000000000042) mmap$binder(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x1, 0x11, r1, 0x0) ioctl$FS_IOC_FSGETXATTR(r1, 0x8038550a, &(0x7f0000000000)={0x2, 0x0, 0x0, 0x0, 0x1000020ffd000, 0x7ff0bdbe}) [ 315.999082][T12754] CPU: 0 PID: 12754 Comm: syz-executor.0 Not tainted 5.3.0+ #0 [ 316.006663][T12754] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 316.016713][T12754] Call Trace: [ 316.016736][T12754] dump_stack+0x172/0x1f0 [ 316.016763][T12754] should_fail.cold+0xa/0x15 [ 316.016785][T12754] ? fault_create_debugfs_attr+0x180/0x180 [ 316.016809][T12754] ? ___might_sleep+0x163/0x2c0 [ 316.016830][T12754] __should_failslab+0x121/0x190 [ 316.016848][T12754] should_failslab+0x9/0x14 11:47:20 executing program 1: setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) setsockopt$netlink_NETLINK_BROADCAST_ERROR(0xffffffffffffffff, 0x10e, 0x4, 0x0, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000100)={0x0, 0x44, &(0x7f00000001c0)={&(0x7f0000000040)={0x14, 0x23, 0x1, 0x0, 0x0, {0x20000000004, 0xe00000000000000}}, 0x14}}, 0x0) [ 316.016864][T12754] kmem_cache_alloc+0x2aa/0x710 [ 316.016889][T12754] ? __put_user_ns+0x70/0x70 [ 316.044587][T12754] ? percpu_ref_put_many+0xb6/0x190 [ 316.044611][T12754] security_inode_alloc+0x39/0x160 [ 316.044630][T12754] inode_init_always+0x56e/0xb50 [ 316.058528][T12754] alloc_inode+0x89/0x1e0 [ 316.058556][T12754] new_inode_pseudo+0x19/0xf0 [ 316.082753][T12754] new_inode+0x1f/0x40 [ 316.086831][T12754] shmem_get_inode+0x84/0x7e0 [ 316.086854][T12754] __shmem_file_setup.part.0+0x7e/0x2b0 [ 316.086873][T12754] shmem_file_setup+0x66/0x90 [ 316.086893][T12754] __x64_sys_memfd_create+0x2a2/0x470 [ 316.086914][T12754] ? memfd_fcntl+0x18c0/0x18c0 [ 316.086931][T12754] ? do_syscall_64+0x26/0x760 [ 316.086948][T12754] ? lockdep_hardirqs_on+0x421/0x5e0 [ 316.086964][T12754] ? trace_hardirqs_on+0x67/0x240 [ 316.086983][T12754] do_syscall_64+0xfa/0x760 [ 316.087004][T12754] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 316.087016][T12754] RIP: 0033:0x459a29 [ 316.087031][T12754] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 316.087039][T12754] RSP: 002b:00007ff9d7cf6a88 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 316.087053][T12754] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 0000000000459a29 [ 316.087061][T12754] RDX: 0000000000000010 RSI: 0000000000000000 RDI: 00000000004be948 [ 316.087069][T12754] RBP: 000000000075bf20 R08: fe03f80fe03f80ff R09: 00000000fbad8001 [ 316.087082][T12754] R10: 0000000000000000 R11: 0000000000000246 R12: 00007ff9d7cf76d4 [ 316.111999][T12754] R13: 00000000004c8be0 R14: 00000000004dfcd8 R15: 0000000000000003 [ 316.180105][T12753] CPU: 1 PID: 12753 Comm: syz-executor.3 Not tainted 5.3.0+ #0 [ 316.194822][T12753] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 316.194830][T12753] Call Trace: [ 316.194850][T12753] dump_stack+0x172/0x1f0 [ 316.194875][T12753] should_fail.cold+0xa/0x15 [ 316.194898][T12753] ? fault_create_debugfs_attr+0x180/0x180 [ 316.210817][T12753] ? ___might_sleep+0x163/0x2c0 [ 316.210840][T12753] __should_failslab+0x121/0x190 [ 316.210858][T12753] should_failslab+0x9/0x14 [ 316.210875][T12753] kmem_cache_alloc+0x2aa/0x710 [ 316.210889][T12753] ? __put_user_ns+0x70/0x70 [ 316.210908][T12753] ? percpu_ref_put_many+0xb6/0x190 [ 316.228496][T12753] security_inode_alloc+0x39/0x160 [ 316.228517][T12753] inode_init_always+0x56e/0xb50 [ 316.228535][T12753] alloc_inode+0x89/0x1e0 [ 316.228552][T12753] new_inode_pseudo+0x19/0xf0 [ 316.228570][T12753] new_inode+0x1f/0x40 [ 316.232303][T12764] vhci_hcd: default hub control req: 0000 v0000 i0000 l0 [ 316.236153][T12753] shmem_get_inode+0x84/0x7e0 [ 316.246502][T12753] __shmem_file_setup.part.0+0x7e/0x2b0 [ 316.246523][T12753] shmem_file_setup+0x66/0x90 [ 316.246543][T12753] __x64_sys_memfd_create+0x2a2/0x470 [ 316.246559][T12753] ? memfd_fcntl+0x18c0/0x18c0 [ 316.246579][T12753] ? do_syscall_64+0x26/0x760 [ 316.254654][T12763] IPVS: ftp: loaded support on port[0] = 21 [ 316.256336][T12753] ? lockdep_hardirqs_on+0x421/0x5e0 [ 316.256354][T12753] ? trace_hardirqs_on+0x67/0x240 [ 316.256375][T12753] do_syscall_64+0xfa/0x760 [ 316.256400][T12753] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 316.256416][T12753] RIP: 0033:0x459a29 [ 316.310222][T12753] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 316.320388][T12753] RSP: 002b:00007faeae1cca88 EFLAGS: 00000246 ORIG_RAX: 000000000000013f 11:47:21 executing program 0 (fault-call:0 fault-nth:3): syz_mount_image$hfsplus(&(0x7f0000000140)='hfsplus\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000a80)={[{@barrier='barrier'}, {@gid={'gid'}}, {@type={'type', 0x3d, "ae8c9d8f"}}]}) [ 316.320408][T12753] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 0000000000459a29 [ 316.320416][T12753] RDX: 0000000000000010 RSI: 0000000000000000 RDI: 00000000004be948 [ 316.320425][T12753] RBP: 000000000075bf20 R08: fe03f80fe03f80ff R09: 00000000fbad8001 [ 316.320434][T12753] R10: 0000000000000000 R11: 0000000000000246 R12: 00007faeae1cd6d4 [ 316.320443][T12753] R13: 00000000004c8be0 R14: 00000000004dfcd8 R15: 0000000000000003 11:47:21 executing program 3 (fault-call:0 fault-nth:3): syz_mount_image$hfsplus(&(0x7f0000000140)='hfsplus\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000a80)={[{@barrier='barrier'}, {@gid={'gid'}}, {@type={'type', 0x3d, "ae8c9d8f"}}]}) [ 316.554013][T12771] FAULT_INJECTION: forcing a failure. [ 316.554013][T12771] name failslab, interval 1, probability 0, space 0, times 0 [ 316.571535][T12771] CPU: 1 PID: 12771 Comm: syz-executor.0 Not tainted 5.3.0+ #0 [ 316.579103][T12771] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 316.589162][T12771] Call Trace: [ 316.592451][T12771] dump_stack+0x172/0x1f0 [ 316.592479][T12771] should_fail.cold+0xa/0x15 [ 316.592506][T12771] ? fault_create_debugfs_attr+0x180/0x180 [ 316.601396][T12771] ? ___might_sleep+0x163/0x2c0 [ 316.601419][T12771] __should_failslab+0x121/0x190 [ 316.601438][T12771] should_failslab+0x9/0x14 [ 316.601459][T12771] kmem_cache_alloc+0x2aa/0x710 [ 316.612059][T12771] ? current_time+0x6b/0x110 [ 316.612075][T12771] ? ktime_get_coarse_real_ts64+0xf0/0x2b0 [ 316.612092][T12771] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 316.612108][T12771] ? timestamp_truncate+0x20f/0x2f0 [ 316.612132][T12771] __d_alloc+0x2e/0x8c0 11:47:21 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1100008912, &(0x7f0000000040)) r1 = syz_open_dev$usb(&(0x7f0000000200)='/dev/bus/usb/00#/00#\x00', 0x40000fffffc, 0x200000000000042) mmap$binder(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x1, 0x11, r1, 0x0) ioctl$FS_IOC_FSGETXATTR(r1, 0x8038550a, &(0x7f0000000000)={0x2, 0x0, 0x0, 0x0, 0x1000020ffd000, 0x7ff0bdbe}) [ 316.621542][T12771] d_alloc_pseudo+0x1e/0x70 [ 316.621559][T12771] alloc_file_pseudo+0xe2/0x280 [ 316.621576][T12771] ? alloc_file+0x4d0/0x4d0 [ 316.621595][T12771] ? lockdep_annotate_inode_mutex_key+0x5b/0x70 [ 316.621617][T12771] __shmem_file_setup.part.0+0x108/0x2b0 [ 316.621636][T12771] shmem_file_setup+0x66/0x90 [ 316.631057][T12771] __x64_sys_memfd_create+0x2a2/0x470 [ 316.631075][T12771] ? memfd_fcntl+0x18c0/0x18c0 [ 316.631091][T12771] ? do_syscall_64+0x26/0x760 [ 316.631108][T12771] ? lockdep_hardirqs_on+0x421/0x5e0 [ 316.631126][T12771] ? trace_hardirqs_on+0x67/0x240 [ 316.643130][T12771] do_syscall_64+0xfa/0x760 [ 316.643154][T12771] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 316.643165][T12771] RIP: 0033:0x459a29 [ 316.643181][T12771] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 316.643188][T12771] RSP: 002b:00007ff9d7cf6a88 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 316.652500][T12771] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 0000000000459a29 [ 316.652509][T12771] RDX: 0000000000000010 RSI: 0000000000000000 RDI: 00000000004be948 [ 316.652517][T12771] RBP: 000000000075bf20 R08: fe03f80fe03f80ff R09: 00000000fbad8001 [ 316.652526][T12771] R10: 0000000000000000 R11: 0000000000000246 R12: 00007ff9d7cf76d4 [ 316.652535][T12771] R13: 00000000004c8be0 R14: 00000000004dfcd8 R15: 0000000000000003 [ 316.695996][T12773] FAULT_INJECTION: forcing a failure. [ 316.695996][T12773] name failslab, interval 1, probability 0, space 0, times 0 [ 316.719926][T12773] CPU: 1 PID: 12773 Comm: syz-executor.3 Not tainted 5.3.0+ #0 [ 316.742978][T12773] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 316.742985][T12773] Call Trace: [ 316.743008][T12773] dump_stack+0x172/0x1f0 [ 316.743032][T12773] should_fail.cold+0xa/0x15 [ 316.743052][T12773] ? fault_create_debugfs_attr+0x180/0x180 [ 316.743072][T12773] ? ___might_sleep+0x163/0x2c0 [ 316.743091][T12773] __should_failslab+0x121/0x190 11:47:21 executing program 0 (fault-call:0 fault-nth:4): syz_mount_image$hfsplus(&(0x7f0000000140)='hfsplus\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000a80)={[{@barrier='barrier'}, {@gid={'gid'}}, {@type={'type', 0x3d, "ae8c9d8f"}}]}) [ 316.743108][T12773] should_failslab+0x9/0x14 [ 316.743122][T12773] kmem_cache_alloc+0x2aa/0x710 [ 316.743137][T12773] ? current_time+0x6b/0x110 [ 316.743149][T12773] ? ktime_get_coarse_real_ts64+0xf0/0x2b0 [ 316.743169][T12773] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 316.759512][T12773] ? timestamp_truncate+0x20f/0x2f0 [ 316.759533][T12773] __d_alloc+0x2e/0x8c0 [ 316.759552][T12773] d_alloc_pseudo+0x1e/0x70 [ 316.759568][T12773] alloc_file_pseudo+0xe2/0x280 [ 316.759585][T12773] ? alloc_file+0x4d0/0x4d0 [ 316.759602][T12773] ? lockdep_annotate_inode_mutex_key+0x5b/0x70 [ 316.759626][T12773] __shmem_file_setup.part.0+0x108/0x2b0 [ 316.775539][T12773] shmem_file_setup+0x66/0x90 [ 316.775560][T12773] __x64_sys_memfd_create+0x2a2/0x470 [ 316.775577][T12773] ? memfd_fcntl+0x18c0/0x18c0 [ 316.775593][T12773] ? do_syscall_64+0x26/0x760 [ 316.775610][T12773] ? lockdep_hardirqs_on+0x421/0x5e0 [ 316.775629][T12773] ? trace_hardirqs_on+0x67/0x240 [ 316.791626][T12773] do_syscall_64+0xfa/0x760 [ 316.791650][T12773] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 316.791662][T12773] RIP: 0033:0x459a29 [ 316.791678][T12773] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 316.791686][T12773] RSP: 002b:00007faeae1cca88 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 316.791699][T12773] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 0000000000459a29 [ 316.791712][T12773] RDX: 0000000000000010 RSI: 0000000000000000 RDI: 00000000004be948 [ 316.811870][T12773] RBP: 000000000075bf20 R08: fe03f80fe03f80ff R09: 00000000fbad8001 [ 316.811879][T12773] R10: 0000000000000000 R11: 0000000000000246 R12: 00007faeae1cd6d4 [ 316.811886][T12773] R13: 00000000004c8be0 R14: 00000000004dfcd8 R15: 0000000000000003 [ 316.942908][T12777] vhci_hcd: default hub control req: 0000 v0000 i0000 l0 [ 317.035239][T12782] FAULT_INJECTION: forcing a failure. [ 317.035239][T12782] name failslab, interval 1, probability 0, space 0, times 0 [ 317.061904][T12782] CPU: 1 PID: 12782 Comm: syz-executor.0 Not tainted 5.3.0+ #0 [ 317.069477][T12782] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 317.069485][T12782] Call Trace: [ 317.069503][T12782] dump_stack+0x172/0x1f0 [ 317.069531][T12782] should_fail.cold+0xa/0x15 [ 317.091819][T12782] ? fault_create_debugfs_attr+0x180/0x180 [ 317.097636][T12782] ? ___might_sleep+0x163/0x2c0 [ 317.102488][T12782] __should_failslab+0x121/0x190 [ 317.102507][T12782] should_failslab+0x9/0x14 [ 317.102527][T12782] kmem_cache_alloc+0x2aa/0x710 [ 317.116762][T12782] ? rwlock_bug.part.0+0x90/0x90 [ 317.121819][T12782] ? lock_downgrade+0x920/0x920 [ 317.126676][T12782] __alloc_file+0x27/0x340 [ 317.126695][T12782] alloc_empty_file+0x72/0x170 [ 317.126711][T12782] alloc_file+0x5e/0x4d0 [ 317.126733][T12782] alloc_file_pseudo+0x189/0x280 [ 317.135871][T12782] ? alloc_file+0x4d0/0x4d0 [ 317.135892][T12782] ? lockdep_annotate_inode_mutex_key+0x5b/0x70 [ 317.135918][T12782] __shmem_file_setup.part.0+0x108/0x2b0 [ 317.145051][T12782] shmem_file_setup+0x66/0x90 [ 317.145071][T12782] __x64_sys_memfd_create+0x2a2/0x470 [ 317.145089][T12782] ? memfd_fcntl+0x18c0/0x18c0 [ 317.155778][T12782] ? do_syscall_64+0x26/0x760 [ 317.155796][T12782] ? lockdep_hardirqs_on+0x421/0x5e0 [ 317.155810][T12782] ? trace_hardirqs_on+0x67/0x240 [ 317.155835][T12782] do_syscall_64+0xfa/0x760 [ 317.166086][T12782] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 317.166099][T12782] RIP: 0033:0x459a29 [ 317.166115][T12782] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 317.166122][T12782] RSP: 002b:00007ff9d7cf6a88 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 317.176209][T12782] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 0000000000459a29 [ 317.176219][T12782] RDX: 0000000000000010 RSI: 0000000000000000 RDI: 00000000004be948 [ 317.176229][T12782] RBP: 000000000075bf20 R08: fe03f80fe03f80ff R09: 00000000fbad8001 [ 317.176237][T12782] R10: 0000000000000000 R11: 0000000000000246 R12: 00007ff9d7cf76d4 [ 317.176246][T12782] R13: 00000000004c8be0 R14: 00000000004dfcd8 R15: 0000000000000003 11:47:24 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_ATTACH(0x8, 0x0, 0x0) r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r0, &(0x7f0000000000)={{0x6, @rose}, [@rose, @rose, @default, @netrom, @bcast, @rose, @rose, @null]}, 0x48) r1 = openat$qat_adf_ctl(0xffffffffffffff9c, 0x0, 0x8200, 0x0) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r1, 0x6, 0x23, &(0x7f00000000c0)={&(0x7f0000ffc000/0x4000)=nil, 0x4000}, &(0x7f0000000140)=0x10) listen(r0, 0x0) unshare(0x40000000) setrlimit(0x0, 0x0) r2 = accept(r0, 0x0, 0x0) write$binfmt_elf64(r2, &(0x7f00000002c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x9, 0x8, 0x0, 0x0, 0x0, 0x4825483b35c83c0b, 0x0, 0x0, 0x40, 0x227}, [{0x4, 0x1, 0xfff, 0x0, 0x0, 0xff8000000002, 0x0, 0x7fff}], "", [[], [], []]}, 0x378) 11:47:24 executing program 3 (fault-call:0 fault-nth:4): syz_mount_image$hfsplus(&(0x7f0000000140)='hfsplus\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000a80)={[{@barrier='barrier'}, {@gid={'gid'}}, {@type={'type', 0x3d, "ae8c9d8f"}}]}) 11:47:24 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1100008912, &(0x7f0000000040)="11dca50d810b") r1 = syz_open_dev$usb(&(0x7f0000000200)='/dev/bus/usb/00#/00#\x00', 0x40000fffffc, 0x200000000000042) mmap$binder(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x1, 0x11, r1, 0x0) ioctl$FS_IOC_FSGETXATTR(r1, 0x8038550a, &(0x7f0000000000)={0x2, 0x0, 0x0, 0x0, 0x1000020ffd000, 0x7ff0bdbe}) 11:47:24 executing program 1: setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) setsockopt$netlink_NETLINK_BROADCAST_ERROR(0xffffffffffffffff, 0x10e, 0x4, 0x0, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000100)={0x0, 0x45, &(0x7f00000001c0)={&(0x7f0000000040)={0x14, 0x23, 0x1, 0x0, 0x0, {0x20000000004, 0xe00000000000000}}, 0x14}}, 0x0) 11:47:24 executing program 0 (fault-call:0 fault-nth:5): syz_mount_image$hfsplus(&(0x7f0000000140)='hfsplus\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000a80)={[{@barrier='barrier'}, {@gid={'gid'}}, {@type={'type', 0x3d, "ae8c9d8f"}}]}) 11:47:24 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_ATTACH(0x8, 0x0, 0x0) r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r0, &(0x7f0000000000)={{0x6, @rose}, [@rose, @rose, @default, @netrom, @bcast, @rose, @rose, @null]}, 0x48) r1 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000080)='/dev/qat_adf_ctl\x00', 0x8200, 0x0) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r1, 0x6, 0x23, &(0x7f00000000c0)={&(0x7f0000ffc000/0x4000)=nil, 0x4000}, &(0x7f0000000140)=0x10) listen(r0, 0x0) unshare(0x40000000) r2 = accept(r0, 0x0, 0x0) write$binfmt_elf64(r2, &(0x7f00000002c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x9, 0x8, 0x0, 0x0, 0x0, 0x4825483b35c83c0b, 0x0, 0x0, 0x40, 0x227}, [{0x4, 0x1, 0xfff, 0x0, 0x0, 0xff8000000002, 0x0, 0x7fff}], "", [[], [], []]}, 0x378) [ 319.370801][T12794] FAULT_INJECTION: forcing a failure. [ 319.370801][T12794] name failslab, interval 1, probability 0, space 0, times 0 [ 319.399026][T12799] FAULT_INJECTION: forcing a failure. [ 319.399026][T12799] name failslab, interval 1, probability 0, space 0, times 0 [ 319.424820][T12797] vhci_hcd: default hub control req: 0000 v0000 i0000 l0 [ 319.442745][T12794] CPU: 1 PID: 12794 Comm: syz-executor.0 Not tainted 5.3.0+ #0 [ 319.450315][T12794] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 319.460367][T12794] Call Trace: [ 319.463644][T12794] dump_stack+0x172/0x1f0 [ 319.467963][T12794] should_fail.cold+0xa/0x15 [ 319.472540][T12794] ? fault_create_debugfs_attr+0x180/0x180 [ 319.478332][T12794] ? ___might_sleep+0x163/0x2c0 [ 319.483170][T12794] __should_failslab+0x121/0x190 [ 319.488093][T12794] should_failslab+0x9/0x14 [ 319.492581][T12794] kmem_cache_alloc+0x2aa/0x710 [ 319.497416][T12794] ? kmem_cache_alloc+0x364/0x710 [ 319.502441][T12794] security_file_alloc+0x39/0x170 [ 319.507451][T12794] __alloc_file+0xde/0x340 [ 319.511848][T12794] alloc_empty_file+0x72/0x170 [ 319.516596][T12794] alloc_file+0x5e/0x4d0 [ 319.520821][T12794] alloc_file_pseudo+0x189/0x280 [ 319.525738][T12794] ? alloc_file+0x4d0/0x4d0 [ 319.530227][T12794] ? lockdep_annotate_inode_mutex_key+0x5b/0x70 [ 319.536454][T12794] __shmem_file_setup.part.0+0x108/0x2b0 [ 319.542074][T12794] shmem_file_setup+0x66/0x90 [ 319.546739][T12794] __x64_sys_memfd_create+0x2a2/0x470 [ 319.552093][T12794] ? memfd_fcntl+0x18c0/0x18c0 [ 319.556838][T12794] ? do_syscall_64+0x26/0x760 [ 319.561499][T12794] ? lockdep_hardirqs_on+0x421/0x5e0 [ 319.566855][T12794] ? trace_hardirqs_on+0x67/0x240 [ 319.571862][T12794] do_syscall_64+0xfa/0x760 [ 319.576350][T12794] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 319.582219][T12794] RIP: 0033:0x459a29 [ 319.586098][T12794] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 319.605764][T12794] RSP: 002b:00007ff9d7cf6a88 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 319.614158][T12794] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 0000000000459a29 [ 319.622126][T12794] RDX: 0000000000000010 RSI: 0000000000000000 RDI: 00000000004be948 [ 319.630078][T12794] RBP: 000000000075bf20 R08: fe03f80fe03f80ff R09: 00000000fbad8001 [ 319.638030][T12794] R10: 0000000000000000 R11: 0000000000000246 R12: 00007ff9d7cf76d4 [ 319.645979][T12794] R13: 00000000004c8be0 R14: 00000000004dfcd8 R15: 0000000000000003 11:47:24 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1100008912, &(0x7f0000000040)="11dca50d810b") r1 = syz_open_dev$usb(&(0x7f0000000200)='/dev/bus/usb/00#/00#\x00', 0x40000fffffc, 0x200000000000042) mmap$binder(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x1, 0x11, r1, 0x0) ioctl$FS_IOC_FSGETXATTR(r1, 0x8038550a, &(0x7f0000000000)={0x2, 0x0, 0x0, 0x0, 0x1000020ffd000, 0x7ff0bdbe}) [ 319.674739][T12799] CPU: 0 PID: 12799 Comm: syz-executor.3 Not tainted 5.3.0+ #0 [ 319.682312][T12799] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 319.692369][T12799] Call Trace: [ 319.695666][T12799] dump_stack+0x172/0x1f0 [ 319.700003][T12799] should_fail.cold+0xa/0x15 [ 319.704605][T12799] ? fault_create_debugfs_attr+0x180/0x180 [ 319.710418][T12799] ? ___might_sleep+0x163/0x2c0 [ 319.715281][T12799] __should_failslab+0x121/0x190 [ 319.720312][T12799] should_failslab+0x9/0x14 [ 319.724821][T12799] kmem_cache_alloc+0x2aa/0x710 [ 319.729676][T12799] ? rwlock_bug.part.0+0x90/0x90 [ 319.734624][T12799] ? lock_downgrade+0x920/0x920 [ 319.739474][T12799] __alloc_file+0x27/0x340 [ 319.743883][T12799] alloc_empty_file+0x72/0x170 [ 319.748646][T12799] alloc_file+0x5e/0x4d0 [ 319.752894][T12799] alloc_file_pseudo+0x189/0x280 [ 319.757835][T12799] ? alloc_file+0x4d0/0x4d0 [ 319.762350][T12799] ? lockdep_annotate_inode_mutex_key+0x5b/0x70 [ 319.768603][T12799] __shmem_file_setup.part.0+0x108/0x2b0 11:47:24 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1100008912, &(0x7f0000000040)="11dca50d810b") r1 = syz_open_dev$usb(&(0x7f0000000200)='/dev/bus/usb/00#/00#\x00', 0x40000fffffc, 0x200000000000042) mmap$binder(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x1, 0x11, r1, 0x0) ioctl$FS_IOC_FSGETXATTR(r1, 0x8038550a, &(0x7f0000000000)={0x2, 0x0, 0x0, 0x0, 0x1000020ffd000, 0x7ff0bdbe}) [ 319.774273][T12799] shmem_file_setup+0x66/0x90 [ 319.778957][T12799] __x64_sys_memfd_create+0x2a2/0x470 [ 319.780045][T12807] vhci_hcd: default hub control req: 0000 v0000 i0000 l0 [ 319.784330][T12799] ? memfd_fcntl+0x18c0/0x18c0 [ 319.796069][T12799] ? do_syscall_64+0x26/0x760 [ 319.800757][T12799] ? lockdep_hardirqs_on+0x421/0x5e0 [ 319.806048][T12799] ? trace_hardirqs_on+0x67/0x240 [ 319.811079][T12799] do_syscall_64+0xfa/0x760 [ 319.815589][T12799] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 319.821480][T12799] RIP: 0033:0x459a29 [ 319.825380][T12799] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 319.844973][T12799] RSP: 002b:00007faeae1cca88 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 319.853373][T12799] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 0000000000459a29 [ 319.853382][T12799] RDX: 0000000000000010 RSI: 0000000000000000 RDI: 00000000004be948 11:47:24 executing program 0 (fault-call:0 fault-nth:6): syz_mount_image$hfsplus(&(0x7f0000000140)='hfsplus\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000a80)={[{@barrier='barrier'}, {@gid={'gid'}}, {@type={'type', 0x3d, "ae8c9d8f"}}]}) [ 319.853390][T12799] RBP: 000000000075bf20 R08: fe03f80fe03f80ff R09: 00000000fbad8001 [ 319.853399][T12799] R10: 0000000000000000 R11: 0000000000000246 R12: 00007faeae1cd6d4 [ 319.853407][T12799] R13: 00000000004c8be0 R14: 00000000004dfcd8 R15: 0000000000000003 [ 319.889742][T12812] FAULT_INJECTION: forcing a failure. [ 319.889742][T12812] name failslab, interval 1, probability 0, space 0, times 0 [ 319.912586][T12802] IPVS: ftp: loaded support on port[0] = 21 11:47:24 executing program 1: setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) setsockopt$netlink_NETLINK_BROADCAST_ERROR(0xffffffffffffffff, 0x10e, 0x4, 0x0, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000100)={0x0, 0x47, &(0x7f00000001c0)={&(0x7f0000000040)={0x14, 0x23, 0x1, 0x0, 0x0, {0x20000000004, 0xe00000000000000}}, 0x14}}, 0x0) [ 319.948336][T12813] IPVS: ftp: loaded support on port[0] = 21 [ 319.986738][T12812] CPU: 0 PID: 12812 Comm: syz-executor.0 Not tainted 5.3.0+ #0 [ 319.994312][T12812] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 319.994319][T12812] Call Trace: [ 319.994340][T12812] dump_stack+0x172/0x1f0 [ 319.994367][T12812] should_fail.cold+0xa/0x15 [ 319.994390][T12812] ? fault_create_debugfs_attr+0x180/0x180 [ 320.022394][T12812] ? ___might_sleep+0x163/0x2c0 [ 320.027257][T12812] __should_failslab+0x121/0x190 [ 320.032202][T12812] should_failslab+0x9/0x14 [ 320.036706][T12812] kmem_cache_alloc+0x2aa/0x710 [ 320.036726][T12812] ? kmem_cache_alloc+0x364/0x710 [ 320.036748][T12812] security_file_alloc+0x39/0x170 [ 320.036767][T12812] __alloc_file+0xde/0x340 [ 320.036784][T12812] alloc_empty_file+0x72/0x170 [ 320.036800][T12812] alloc_file+0x5e/0x4d0 [ 320.036815][T12812] alloc_file_pseudo+0x189/0x280 [ 320.036829][T12812] ? alloc_file+0x4d0/0x4d0 [ 320.036848][T12812] ? lockdep_annotate_inode_mutex_key+0x5b/0x70 [ 320.036873][T12812] __shmem_file_setup.part.0+0x108/0x2b0 [ 320.036893][T12812] shmem_file_setup+0x66/0x90 [ 320.036911][T12812] __x64_sys_memfd_create+0x2a2/0x470 [ 320.036927][T12812] ? memfd_fcntl+0x18c0/0x18c0 [ 320.036941][T12812] ? do_syscall_64+0x26/0x760 [ 320.036960][T12812] ? lockdep_hardirqs_on+0x421/0x5e0 [ 320.046970][T12812] ? trace_hardirqs_on+0x67/0x240 [ 320.046992][T12812] do_syscall_64+0xfa/0x760 [ 320.047014][T12812] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 320.047026][T12812] RIP: 0033:0x459a29 [ 320.047041][T12812] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 320.047049][T12812] RSP: 002b:00007ff9d7cf6a88 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 320.047062][T12812] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 0000000000459a29 [ 320.047071][T12812] RDX: 0000000000000010 RSI: 0000000000000000 RDI: 00000000004be948 [ 320.047080][T12812] RBP: 000000000075bf20 R08: fe03f80fe03f80ff R09: 00000000fbad8001 [ 320.047089][T12812] R10: 0000000000000000 R11: 0000000000000246 R12: 00007ff9d7cf76d4 [ 320.047097][T12812] R13: 00000000004c8be0 R14: 00000000004dfcd8 R15: 0000000000000003 [ 320.057611][T12815] vhci_hcd: default hub control req: 0000 v0000 i0000 l0 11:47:25 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1100008912, &(0x7f0000000040)="11dca50d810bcfe47b") r1 = syz_open_dev$usb(&(0x7f0000000200)='/dev/bus/usb/00#/00#\x00', 0x40000fffffc, 0x200000000000042) mmap$binder(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x1, 0x11, r1, 0x0) ioctl$FS_IOC_FSGETXATTR(r1, 0x8038550a, &(0x7f0000000000)={0x2, 0x0, 0x0, 0x0, 0x1000020ffd000, 0x7ff0bdbe}) 11:47:25 executing program 3 (fault-call:0 fault-nth:5): syz_mount_image$hfsplus(&(0x7f0000000140)='hfsplus\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000a80)={[{@barrier='barrier'}, {@gid={'gid'}}, {@type={'type', 0x3d, "ae8c9d8f"}}]}) [ 320.432766][T12825] vhci_hcd: default hub control req: 0000 v0000 i0000 l0 [ 320.475278][T12829] FAULT_INJECTION: forcing a failure. [ 320.475278][T12829] name failslab, interval 1, probability 0, space 0, times 0 [ 320.523664][T12829] CPU: 0 PID: 12829 Comm: syz-executor.3 Not tainted 5.3.0+ #0 [ 320.531243][T12829] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 320.541302][T12829] Call Trace: [ 320.544602][T12829] dump_stack+0x172/0x1f0 [ 320.548948][T12829] should_fail.cold+0xa/0x15 [ 320.553554][T12829] ? fault_create_debugfs_attr+0x180/0x180 [ 320.559367][T12829] ? ___might_sleep+0x163/0x2c0 [ 320.564216][T12829] __should_failslab+0x121/0x190 [ 320.569158][T12829] should_failslab+0x9/0x14 11:47:25 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_ATTACH(0x8, 0x0, 0x0) r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r0, &(0x7f0000000000)={{0x6, @rose}, [@rose, @rose, @default, @netrom, @bcast, @rose, @rose, @null]}, 0x48) r1 = openat$qat_adf_ctl(0xffffffffffffff9c, 0x0, 0x0, 0x0) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r1, 0x6, 0x23, &(0x7f00000000c0)={&(0x7f0000ffc000/0x4000)=nil, 0x4000}, &(0x7f0000000140)=0x10) listen(r0, 0x0) unshare(0x40000000) setrlimit(0x0, 0x0) r2 = accept(r0, 0x0, 0x0) write$binfmt_elf64(r2, &(0x7f00000002c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x9, 0x8, 0x0, 0x0, 0x0, 0x4825483b35c83c0b, 0x0, 0x0, 0x40, 0x227}, [{0x4, 0x1, 0xfff, 0x0, 0x0, 0xff8000000002, 0x0, 0x7fff}], "", [[], [], []]}, 0x378) 11:47:25 executing program 0 (fault-call:0 fault-nth:7): syz_mount_image$hfsplus(&(0x7f0000000140)='hfsplus\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000a80)={[{@barrier='barrier'}, {@gid={'gid'}}, {@type={'type', 0x3d, "ae8c9d8f"}}]}) 11:47:25 executing program 1: setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) setsockopt$netlink_NETLINK_BROADCAST_ERROR(0xffffffffffffffff, 0x10e, 0x4, 0x0, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000100)={0x0, 0x48, &(0x7f00000001c0)={&(0x7f0000000040)={0x14, 0x23, 0x1, 0x0, 0x0, {0x20000000004, 0xe00000000000000}}, 0x14}}, 0x0) 11:47:25 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1100008912, &(0x7f0000000040)="11dca50d810bcfe47b") r1 = syz_open_dev$usb(&(0x7f0000000200)='/dev/bus/usb/00#/00#\x00', 0x40000fffffc, 0x200000000000042) mmap$binder(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x1, 0x11, r1, 0x0) ioctl$FS_IOC_FSGETXATTR(r1, 0x8038550a, &(0x7f0000000000)={0x2, 0x0, 0x0, 0x0, 0x1000020ffd000, 0x7ff0bdbe}) [ 320.573666][T12829] kmem_cache_alloc+0x2aa/0x710 [ 320.578520][T12829] ? rwlock_bug.part.0+0x90/0x90 [ 320.583461][T12829] ? lock_downgrade+0x920/0x920 [ 320.588328][T12829] __alloc_file+0x27/0x340 [ 320.592750][T12829] alloc_empty_file+0x72/0x170 [ 320.597530][T12829] alloc_file+0x5e/0x4d0 [ 320.601781][T12829] alloc_file_pseudo+0x189/0x280 [ 320.606730][T12829] ? alloc_file+0x4d0/0x4d0 [ 320.611241][T12829] ? lockdep_annotate_inode_mutex_key+0x5b/0x70 [ 320.617497][T12829] __shmem_file_setup.part.0+0x108/0x2b0 [ 320.617517][T12829] shmem_file_setup+0x66/0x90 [ 320.617535][T12829] __x64_sys_memfd_create+0x2a2/0x470 [ 320.617550][T12829] ? memfd_fcntl+0x18c0/0x18c0 [ 320.617570][T12829] ? do_syscall_64+0x26/0x760 [ 320.637939][T12829] ? lockdep_hardirqs_on+0x421/0x5e0 [ 320.637957][T12829] ? trace_hardirqs_on+0x67/0x240 [ 320.637977][T12829] do_syscall_64+0xfa/0x760 [ 320.637999][T12829] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 320.638010][T12829] RIP: 0033:0x459a29 [ 320.638024][T12829] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 320.638036][T12829] RSP: 002b:00007faeae1cca88 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 320.692973][T12835] vhci_hcd: default hub control req: 0000 v0000 i0000 l0 [ 320.695181][T12829] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 0000000000459a29 [ 320.710140][T12829] RDX: 0000000000000010 RSI: 0000000000000000 RDI: 00000000004be948 [ 320.718112][T12829] RBP: 000000000075bf20 R08: fe03f80fe03f80ff R09: 00000000fbad8001 [ 320.726085][T12829] R10: 0000000000000000 R11: 0000000000000246 R12: 00007faeae1cd6d4 [ 320.734057][T12829] R13: 00000000004c8be0 R14: 00000000004dfcd8 R15: 0000000000000003 [ 320.778232][T12841] FAULT_INJECTION: forcing a failure. [ 320.778232][T12841] name failslab, interval 1, probability 0, space 0, times 0 [ 320.791841][T12840] IPVS: ftp: loaded support on port[0] = 21 [ 320.798068][T12841] CPU: 0 PID: 12841 Comm: syz-executor.0 Not tainted 5.3.0+ #0 [ 320.805612][T12841] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 320.805632][T12841] Call Trace: [ 320.805653][T12841] dump_stack+0x172/0x1f0 [ 320.805680][T12841] should_fail.cold+0xa/0x15 11:47:25 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1100008912, &(0x7f0000000040)="11dca50d810bcfe47b") r1 = syz_open_dev$usb(&(0x7f0000000200)='/dev/bus/usb/00#/00#\x00', 0x40000fffffc, 0x200000000000042) mmap$binder(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x1, 0x11, r1, 0x0) ioctl$FS_IOC_FSGETXATTR(r1, 0x8038550a, &(0x7f0000000000)={0x2, 0x0, 0x0, 0x0, 0x1000020ffd000, 0x7ff0bdbe}) [ 320.805700][T12841] ? fault_create_debugfs_attr+0x180/0x180 [ 320.805720][T12841] ? ___might_sleep+0x163/0x2c0 [ 320.838563][T12841] __should_failslab+0x121/0x190 [ 320.843531][T12841] should_failslab+0x9/0x14 [ 320.848037][T12841] __kmalloc+0x2e0/0x770 [ 320.852284][T12841] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 320.858522][T12841] ? simple_dname+0xd1/0x1f0 [ 320.863105][T12841] ? tomoyo_encode2.part.0+0xf5/0x400 [ 320.863124][T12841] tomoyo_encode2.part.0+0xf5/0x400 [ 320.863142][T12841] tomoyo_encode+0x2b/0x50 [ 320.878079][T12841] tomoyo_realpath_from_path+0x1d3/0x7b0 [ 320.883711][T12841] ? tomoyo_path_perm+0x1cb/0x430 [ 320.883735][T12841] tomoyo_path_perm+0x230/0x430 [ 320.883750][T12841] ? tomoyo_path_perm+0x1cb/0x430 [ 320.883769][T12841] ? tomoyo_check_open_permission+0x3f0/0x3f0 [ 320.883803][T12841] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 320.910951][T12841] ? rcu_read_lock_any_held+0xcd/0xf0 [ 320.916321][T12841] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 320.916342][T12841] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 320.916364][T12841] tomoyo_path_truncate+0x1d/0x30 [ 320.916381][T12841] security_path_truncate+0xf2/0x150 [ 320.916402][T12841] do_sys_ftruncate+0x3d9/0x550 [ 320.916421][T12841] __x64_sys_ftruncate+0x59/0x80 [ 320.916439][T12841] do_syscall_64+0xfa/0x760 [ 320.916459][T12841] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 320.916471][T12841] RIP: 0033:0x4599f7 [ 320.916485][T12841] Code: 24 29 d7 48 69 ff e8 03 00 00 48 89 7c 24 08 48 89 e7 e8 dc e4 ff ff 48 83 c4 18 c3 0f 1f 80 00 00 00 00 b8 4d 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 320.916491][T12841] RSP: 002b:00007ff9d7cf6a88 EFLAGS: 00000217 ORIG_RAX: 000000000000004d [ 320.916504][T12841] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00000000004599f7 [ 320.916511][T12841] RDX: 0000000000000010 RSI: 0000000000000000 RDI: 0000000000000004 [ 320.916520][T12841] RBP: 000000000075bf20 R08: fe03f80fe03f80ff R09: 00000000fbad8001 [ 320.916527][T12841] R10: 0000000000000000 R11: 0000000000000217 R12: 0000000000000004 [ 320.916535][T12841] R13: 00000000004c8be0 R14: 00000000004dfcd8 R15: 0000000000000003 [ 321.031115][T12841] ERROR: Out of memory at tomoyo_realpath_from_path. [ 321.063165][T12841] hfsplus: unable to find HFS+ superblock [ 321.063700][T12847] vhci_hcd: default hub control req: 0000 v0000 i0000 l0 11:47:27 executing program 1: setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) setsockopt$netlink_NETLINK_BROADCAST_ERROR(0xffffffffffffffff, 0x10e, 0x4, 0x0, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000100)={0x0, 0x49, &(0x7f00000001c0)={&(0x7f0000000040)={0x14, 0x23, 0x1, 0x0, 0x0, {0x20000000004, 0xe00000000000000}}, 0x14}}, 0x0) 11:47:27 executing program 3 (fault-call:0 fault-nth:6): syz_mount_image$hfsplus(&(0x7f0000000140)='hfsplus\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000a80)={[{@barrier='barrier'}, {@gid={'gid'}}, {@type={'type', 0x3d, "ae8c9d8f"}}]}) 11:47:27 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1100008912, &(0x7f0000000040)="11dca50d810bcfe47bf0") r1 = syz_open_dev$usb(&(0x7f0000000200)='/dev/bus/usb/00#/00#\x00', 0x40000fffffc, 0x200000000000042) mmap$binder(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x1, 0x11, r1, 0x0) ioctl$FS_IOC_FSGETXATTR(r1, 0x8038550a, &(0x7f0000000000)={0x2, 0x0, 0x0, 0x0, 0x1000020ffd000, 0x7ff0bdbe}) 11:47:27 executing program 0 (fault-call:0 fault-nth:8): syz_mount_image$hfsplus(&(0x7f0000000140)='hfsplus\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000a80)={[{@barrier='barrier'}, {@gid={'gid'}}, {@type={'type', 0x3d, "ae8c9d8f"}}]}) 11:47:27 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_ATTACH(0x8, 0x0, 0x0) r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r0, &(0x7f0000000000)={{0x6, @rose}, [@rose, @rose, @default, @netrom, @bcast, @rose, @rose, @null]}, 0x48) r1 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000080)='/dev/qat_adf_ctl\x00', 0x8200, 0x0) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r1, 0x6, 0x23, &(0x7f00000000c0)={&(0x7f0000ffc000/0x4000)=nil, 0x4000}, &(0x7f0000000140)=0x10) listen(r0, 0x0) unshare(0x40000000) r2 = accept(r0, 0x0, 0x0) write$binfmt_elf64(r2, &(0x7f00000002c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x9, 0x8, 0x0, 0x0, 0x0, 0x4825483b35c83c0b, 0x0, 0x0, 0x40, 0x227}, [{0x4, 0x1, 0xfff, 0x0, 0x0, 0xff8000000002, 0x0, 0x7fff}], "", [[], [], []]}, 0x378) 11:47:27 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_ATTACH(0x8, 0x0, 0x0) r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r0, &(0x7f0000000000)={{0x6, @rose}, [@rose, @rose, @default, @netrom, @bcast, @rose, @rose, @null]}, 0x48) r1 = openat$qat_adf_ctl(0xffffffffffffff9c, 0x0, 0x0, 0x0) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r1, 0x6, 0x23, &(0x7f00000000c0)={&(0x7f0000ffc000/0x4000)=nil, 0x4000}, &(0x7f0000000140)=0x10) listen(r0, 0x0) unshare(0x40000000) setrlimit(0x0, 0x0) r2 = accept(r0, 0x0, 0x0) write$binfmt_elf64(r2, &(0x7f00000002c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x9, 0x8, 0x0, 0x0, 0x0, 0x4825483b35c83c0b, 0x0, 0x0, 0x40, 0x227}, [{0x4, 0x1, 0xfff, 0x0, 0x0, 0xff8000000002, 0x0, 0x7fff}], "", [[], [], []]}, 0x378) [ 322.876816][T12861] FAULT_INJECTION: forcing a failure. [ 322.876816][T12861] name failslab, interval 1, probability 0, space 0, times 0 [ 322.909061][T12864] vhci_hcd: default hub control req: 0000 v0000 i0000 l0 [ 322.919343][T12866] FAULT_INJECTION: forcing a failure. [ 322.919343][T12866] name failslab, interval 1, probability 0, space 0, times 0 [ 323.010329][T12861] CPU: 1 PID: 12861 Comm: syz-executor.0 Not tainted 5.3.0+ #0 [ 323.017916][T12861] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 323.027979][T12861] Call Trace: [ 323.031272][T12861] dump_stack+0x172/0x1f0 [ 323.031300][T12861] should_fail.cold+0xa/0x15 [ 323.031323][T12861] ? fault_create_debugfs_attr+0x180/0x180 [ 323.031345][T12861] ? ___might_sleep+0x163/0x2c0 [ 323.031364][T12861] __should_failslab+0x121/0x190 [ 323.031384][T12861] should_failslab+0x9/0x14 [ 323.040277][T12861] kmem_cache_alloc+0x2aa/0x710 [ 323.040295][T12861] ? do_sys_ftruncate+0x41e/0x550 [ 323.040311][T12861] ? find_held_lock+0x35/0x130 [ 323.040331][T12861] getname_flags+0xd6/0x5b0 [ 323.070190][T12861] getname+0x1a/0x20 [ 323.070210][T12861] do_sys_open+0x2c9/0x5d0 [ 323.070230][T12861] ? filp_open+0x80/0x80 [ 323.070247][T12861] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 323.070265][T12861] ? trace_hardirqs_on_thunk+0x1a/0x20 [ 323.070282][T12861] ? do_syscall_64+0x26/0x760 11:47:28 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1100008912, &(0x7f0000000040)="11dca50d810bcfe47bf0") r1 = syz_open_dev$usb(&(0x7f0000000200)='/dev/bus/usb/00#/00#\x00', 0x40000fffffc, 0x200000000000042) mmap$binder(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x1, 0x11, r1, 0x0) ioctl$FS_IOC_FSGETXATTR(r1, 0x8038550a, &(0x7f0000000000)={0x2, 0x0, 0x0, 0x0, 0x1000020ffd000, 0x7ff0bdbe}) [ 323.079513][T12861] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 323.079530][T12861] ? do_syscall_64+0x26/0x760 [ 323.079553][T12861] __x64_sys_open+0x7e/0xc0 [ 323.079570][T12861] do_syscall_64+0xfa/0x760 [ 323.079589][T12861] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 323.079601][T12861] RIP: 0033:0x413911 [ 323.079621][T12861] Code: 75 14 b8 02 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 04 19 00 00 c3 48 83 ec 08 e8 0a fa ff ff 48 89 04 24 b8 02 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 53 fa ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 323.098320][T12861] RSP: 002b:00007ff9d7cf6a80 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 [ 323.098336][T12861] RAX: ffffffffffffffda RBX: 0000000000000010 RCX: 0000000000413911 [ 323.098345][T12861] RDX: 00007ff9d7cf6b0a RSI: 0000000000000002 RDI: 00007ff9d7cf6b00 [ 323.098353][T12861] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 323.098362][T12861] R10: 0000000000000075 R11: 0000000000000293 R12: 0000000000000004 [ 323.098370][T12861] R13: 00000000004c8be0 R14: 00000000004dfcd8 R15: 0000000000000003 [ 323.133092][T12866] CPU: 1 PID: 12866 Comm: syz-executor.3 Not tainted 5.3.0+ #0 [ 323.163179][T12860] IPVS: ftp: loaded support on port[0] = 21 [ 323.166801][T12866] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 323.166808][T12866] Call Trace: [ 323.166828][T12866] dump_stack+0x172/0x1f0 [ 323.166856][T12866] should_fail.cold+0xa/0x15 [ 323.166878][T12866] ? fault_create_debugfs_attr+0x180/0x180 [ 323.166901][T12866] ? ___might_sleep+0x163/0x2c0 [ 323.166925][T12866] __should_failslab+0x121/0x190 11:47:28 executing program 1: setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) setsockopt$netlink_NETLINK_BROADCAST_ERROR(0xffffffffffffffff, 0x10e, 0x4, 0x0, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000100)={0x0, 0x4a, &(0x7f00000001c0)={&(0x7f0000000040)={0x14, 0x23, 0x1, 0x0, 0x0, {0x20000000004, 0xe00000000000000}}, 0x14}}, 0x0) [ 323.166944][T12866] should_failslab+0x9/0x14 [ 323.206722][T12866] __kmalloc+0x2e0/0x770 [ 323.206739][T12866] ? mark_held_locks+0xf0/0xf0 [ 323.206756][T12866] ? stack_trace_save+0xac/0xe0 [ 323.206776][T12866] ? tomoyo_realpath_from_path+0xcd/0x7b0 [ 323.206796][T12866] tomoyo_realpath_from_path+0xcd/0x7b0 [ 323.206811][T12866] ? tomoyo_path_perm+0x1cb/0x430 [ 323.206834][T12866] tomoyo_path_perm+0x230/0x430 [ 323.206854][T12866] ? tomoyo_path_perm+0x1cb/0x430 [ 323.230281][T12866] ? tomoyo_check_open_permission+0x3f0/0x3f0 [ 323.230315][T12866] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 323.230354][T12866] ? rcu_read_lock_any_held+0xcd/0xf0 [ 323.230369][T12866] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 323.230389][T12866] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 323.237959][T12866] tomoyo_path_truncate+0x1d/0x30 [ 323.237976][T12866] security_path_truncate+0xf2/0x150 [ 323.237996][T12866] do_sys_ftruncate+0x3d9/0x550 [ 323.238018][T12866] __x64_sys_ftruncate+0x59/0x80 [ 323.238036][T12866] do_syscall_64+0xfa/0x760 11:47:28 executing program 0 (fault-call:0 fault-nth:9): syz_mount_image$hfsplus(&(0x7f0000000140)='hfsplus\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000a80)={[{@barrier='barrier'}, {@gid={'gid'}}, {@type={'type', 0x3d, "ae8c9d8f"}}]}) [ 323.238059][T12866] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 323.238069][T12866] RIP: 0033:0x4599f7 [ 323.238086][T12866] Code: 24 29 d7 48 69 ff e8 03 00 00 48 89 7c 24 08 48 89 e7 e8 dc e4 ff ff 48 83 c4 18 c3 0f 1f 80 00 00 00 00 b8 4d 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 323.248432][T12866] RSP: 002b:00007faeae1cca88 EFLAGS: 00000217 ORIG_RAX: 000000000000004d [ 323.248447][T12866] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00000000004599f7 [ 323.248455][T12866] RDX: 0000000000000010 RSI: 0000000000000000 RDI: 0000000000000004 [ 323.248465][T12866] RBP: 000000000075bf20 R08: fe03f80fe03f80ff R09: 00000000fbad8001 [ 323.248473][T12866] R10: 0000000000000000 R11: 0000000000000217 R12: 0000000000000004 [ 323.248482][T12866] R13: 00000000004c8be0 R14: 00000000004dfcd8 R15: 0000000000000003 [ 323.337227][T12866] ERROR: Out of memory at tomoyo_realpath_from_path. [ 323.384855][T12868] IPVS: ftp: loaded support on port[0] = 21 [ 323.410706][T12879] vhci_hcd: default hub control req: 0000 v0000 i0000 l0 [ 323.454549][T12866] hfsplus: unable to find HFS+ superblock 11:47:28 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1100008912, &(0x7f0000000040)="11dca50d810bcfe47bf0") r1 = syz_open_dev$usb(&(0x7f0000000200)='/dev/bus/usb/00#/00#\x00', 0x40000fffffc, 0x200000000000042) mmap$binder(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x1, 0x11, r1, 0x0) ioctl$FS_IOC_FSGETXATTR(r1, 0x8038550a, &(0x7f0000000000)={0x2, 0x0, 0x0, 0x0, 0x1000020ffd000, 0x7ff0bdbe}) [ 323.633180][T12886] FAULT_INJECTION: forcing a failure. [ 323.633180][T12886] name failslab, interval 1, probability 0, space 0, times 0 11:47:28 executing program 3 (fault-call:0 fault-nth:7): syz_mount_image$hfsplus(&(0x7f0000000140)='hfsplus\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000a80)={[{@barrier='barrier'}, {@gid={'gid'}}, {@type={'type', 0x3d, "ae8c9d8f"}}]}) [ 323.684406][T12889] vhci_hcd: default hub control req: 0000 v0000 i0000 l0 [ 323.708228][T12886] CPU: 1 PID: 12886 Comm: syz-executor.0 Not tainted 5.3.0+ #0 [ 323.715798][T12886] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 323.725852][T12886] Call Trace: [ 323.729155][T12886] dump_stack+0x172/0x1f0 [ 323.733499][T12886] should_fail.cold+0xa/0x15 [ 323.733521][T12886] ? fault_create_debugfs_attr+0x180/0x180 [ 323.733544][T12886] ? ___might_sleep+0x163/0x2c0 [ 323.748751][T12886] __should_failslab+0x121/0x190 [ 323.753694][T12886] should_failslab+0x9/0x14 [ 323.758201][T12886] kmem_cache_alloc+0x2aa/0x710 [ 323.763047][T12886] ? do_sys_ftruncate+0x41e/0x550 [ 323.763065][T12886] ? find_held_lock+0x35/0x130 [ 323.763084][T12886] getname_flags+0xd6/0x5b0 [ 323.777329][T12886] getname+0x1a/0x20 [ 323.780785][T12892] FAULT_INJECTION: forcing a failure. [ 323.780785][T12892] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 323.781227][T12886] do_sys_open+0x2c9/0x5d0 [ 323.798788][T12886] ? filp_open+0x80/0x80 [ 323.803025][T12886] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 323.809253][T12886] ? trace_hardirqs_on_thunk+0x1a/0x20 [ 323.814697][T12886] ? do_syscall_64+0x26/0x760 [ 323.819363][T12886] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 323.825417][T12886] ? do_syscall_64+0x26/0x760 [ 323.830085][T12886] __x64_sys_open+0x7e/0xc0 [ 323.834578][T12886] do_syscall_64+0xfa/0x760 [ 323.839076][T12886] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 323.844955][T12886] RIP: 0033:0x413911 [ 323.848843][T12886] Code: 75 14 b8 02 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 04 19 00 00 c3 48 83 ec 08 e8 0a fa ff ff 48 89 04 24 b8 02 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 53 fa ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 323.868437][T12886] RSP: 002b:00007ff9d7cf6a80 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 [ 323.876836][T12886] RAX: ffffffffffffffda RBX: 0000000000000010 RCX: 0000000000413911 [ 323.884797][T12886] RDX: 00007ff9d7cf6b0a RSI: 0000000000000002 RDI: 00007ff9d7cf6b00 [ 323.892844][T12886] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 323.900807][T12886] R10: 0000000000000075 R11: 0000000000000293 R12: 0000000000000004 [ 323.908763][T12886] R13: 00000000004c8be0 R14: 00000000004dfcd8 R15: 0000000000000003 [ 323.916743][T12892] CPU: 0 PID: 12892 Comm: syz-executor.3 Not tainted 5.3.0+ #0 [ 323.924284][T12892] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 323.934591][T12892] Call Trace: [ 323.934610][T12892] dump_stack+0x172/0x1f0 [ 323.934634][T12892] should_fail.cold+0xa/0x15 [ 323.934654][T12892] ? fault_create_debugfs_attr+0x180/0x180 [ 323.934671][T12892] ? is_bpf_text_address+0xac/0x170 [ 323.934699][T12892] should_fail_alloc_page+0x50/0x60 [ 323.957801][T12892] __alloc_pages_nodemask+0x1a1/0x900 [ 323.957821][T12892] ? __alloc_pages_slowpath+0x28e0/0x28e0 [ 323.957837][T12892] ? __kasan_check_read+0x11/0x20 [ 323.957861][T12892] ? fault_create_debugfs_attr+0x180/0x180 11:47:28 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1100008912, &(0x7f0000000040)="11dca50d810bcfe47bf070") r1 = syz_open_dev$usb(0x0, 0x40000fffffc, 0x200000000000042) mmap$binder(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x1, 0x11, r1, 0x0) ioctl$FS_IOC_FSGETXATTR(r1, 0x8038550a, &(0x7f0000000000)={0x2, 0x0, 0x0, 0x0, 0x1000020ffd000, 0x7ff0bdbe}) [ 323.957880][T12892] cache_grow_begin+0x90/0xd20 [ 323.957896][T12892] ? tomoyo_realpath_from_path+0xcd/0x7b0 [ 323.957915][T12892] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 323.979150][T12892] __kmalloc+0x6b2/0x770 [ 323.979166][T12892] ? mark_held_locks+0xf0/0xf0 [ 323.979183][T12892] ? stack_trace_save+0xac/0xe0 [ 323.979207][T12892] ? tomoyo_realpath_from_path+0xcd/0x7b0 [ 323.989731][T12892] tomoyo_realpath_from_path+0xcd/0x7b0 [ 323.989745][T12892] ? tomoyo_path_perm+0x1cb/0x430 11:47:29 executing program 0 (fault-call:0 fault-nth:10): syz_mount_image$hfsplus(&(0x7f0000000140)='hfsplus\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000a80)={[{@barrier='barrier'}, {@gid={'gid'}}, {@type={'type', 0x3d, "ae8c9d8f"}}]}) [ 323.989768][T12892] tomoyo_path_perm+0x230/0x430 [ 323.989783][T12892] ? tomoyo_path_perm+0x1cb/0x430 [ 323.989803][T12892] ? tomoyo_check_open_permission+0x3f0/0x3f0 [ 323.989832][T12892] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 323.989866][T12892] ? rcu_read_lock_any_held+0xcd/0xf0 [ 324.010733][T12892] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 324.010753][T12892] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 324.010773][T12892] tomoyo_path_truncate+0x1d/0x30 [ 324.010790][T12892] security_path_truncate+0xf2/0x150 [ 324.021317][T12892] do_sys_ftruncate+0x3d9/0x550 [ 324.031838][T12892] __x64_sys_ftruncate+0x59/0x80 [ 324.031858][T12892] do_syscall_64+0xfa/0x760 [ 324.031883][T12892] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 324.041700][T12892] RIP: 0033:0x4599f7 [ 324.041715][T12892] Code: 24 29 d7 48 69 ff e8 03 00 00 48 89 7c 24 08 48 89 e7 e8 dc e4 ff ff 48 83 c4 18 c3 0f 1f 80 00 00 00 00 b8 4d 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 324.041729][T12892] RSP: 002b:00007faeae1cca88 EFLAGS: 00000217 ORIG_RAX: 000000000000004d [ 324.053981][T12892] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00000000004599f7 [ 324.053991][T12892] RDX: 0000000000000010 RSI: 0000000000000000 RDI: 0000000000000004 [ 324.054000][T12892] RBP: 000000000075bf20 R08: fe03f80fe03f80ff R09: 00000000fbad8001 [ 324.054009][T12892] R10: 0000000000000000 R11: 0000000000000217 R12: 0000000000000004 [ 324.054018][T12892] R13: 00000000004c8be0 R14: 00000000004dfcd8 R15: 0000000000000003 [ 324.114469][T12896] FAULT_INJECTION: forcing a failure. [ 324.114469][T12896] name failslab, interval 1, probability 0, space 0, times 0 [ 324.172495][T12896] CPU: 0 PID: 12896 Comm: syz-executor.0 Not tainted 5.3.0+ #0 [ 324.193851][T12896] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 324.203904][T12896] Call Trace: [ 324.207191][T12896] dump_stack+0x172/0x1f0 [ 324.207217][T12896] should_fail.cold+0xa/0x15 [ 324.207237][T12896] ? fault_create_debugfs_attr+0x180/0x180 [ 324.207257][T12896] ? ___might_sleep+0x163/0x2c0 [ 324.207278][T12896] __should_failslab+0x121/0x190 [ 324.207295][T12896] should_failslab+0x9/0x14 [ 324.207315][T12896] kmem_cache_alloc+0x2aa/0x710 [ 324.241062][T12896] ? kmem_cache_alloc+0x364/0x710 [ 324.246087][T12896] security_file_alloc+0x39/0x170 [ 324.246108][T12896] __alloc_file+0xde/0x340 [ 324.246124][T12896] alloc_empty_file+0x72/0x170 [ 324.246143][T12896] path_openat+0xef/0x46d0 [ 324.246157][T12896] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 324.246169][T12896] ? kasan_slab_alloc+0xf/0x20 [ 324.246184][T12896] ? kmem_cache_alloc+0x121/0x710 [ 324.246195][T12896] ? getname_flags+0xd6/0x5b0 [ 324.246205][T12896] ? getname+0x1a/0x20 [ 324.246220][T12896] ? do_sys_open+0x2c9/0x5d0 [ 324.246232][T12896] ? __x64_sys_open+0x7e/0xc0 [ 324.246248][T12896] ? __kasan_check_read+0x11/0x20 [ 324.255649][T12896] ? mark_lock+0xc2/0x1220 [ 324.264783][T12896] ? path_lookupat.isra.0+0x8d0/0x8d0 [ 324.264806][T12896] ? __alloc_fd+0x487/0x620 [ 324.264826][T12896] do_filp_open+0x1a1/0x280 [ 324.275357][T12896] ? may_open_dev+0x100/0x100 [ 324.285019][T12896] ? lock_downgrade+0x920/0x920 [ 324.285034][T12896] ? rwlock_bug.part.0+0x90/0x90 [ 324.285053][T12896] ? __kasan_check_read+0x11/0x20 [ 324.285069][T12896] ? do_raw_spin_unlock+0x57/0x270 [ 324.293681][T12896] ? _raw_spin_unlock+0x2d/0x50 [ 324.303438][T12896] ? __alloc_fd+0x487/0x620 [ 324.303470][T12896] do_sys_open+0x3fe/0x5d0 [ 324.303489][T12896] ? filp_open+0x80/0x80 [ 324.313227][T12896] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 324.313248][T12896] ? trace_hardirqs_on_thunk+0x1a/0x20 [ 324.313262][T12896] ? do_syscall_64+0x26/0x760 [ 324.313281][T12896] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 324.322235][T12896] ? do_syscall_64+0x26/0x760 [ 324.322257][T12896] __x64_sys_open+0x7e/0xc0 [ 324.322273][T12896] do_syscall_64+0xfa/0x760 [ 324.322293][T12896] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 324.331761][T12896] RIP: 0033:0x413911 [ 324.331777][T12896] Code: 75 14 b8 02 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 04 19 00 00 c3 48 83 ec 08 e8 0a fa ff ff 48 89 04 24 b8 02 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 53 fa ff ff 48 89 d0 48 83 c4 08 48 3d 01 11:47:29 executing program 0 (fault-call:0 fault-nth:11): syz_mount_image$hfsplus(&(0x7f0000000140)='hfsplus\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000a80)={[{@barrier='barrier'}, {@gid={'gid'}}, {@type={'type', 0x3d, "ae8c9d8f"}}]}) 11:47:29 executing program 1: setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) setsockopt$netlink_NETLINK_BROADCAST_ERROR(0xffffffffffffffff, 0x10e, 0x4, 0x0, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000100)={0x0, 0x4b, &(0x7f00000001c0)={&(0x7f0000000040)={0x14, 0x23, 0x1, 0x0, 0x0, {0x20000000004, 0xe00000000000000}}, 0x14}}, 0x0) [ 324.331786][T12896] RSP: 002b:00007ff9d7cf6a80 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 [ 324.331800][T12896] RAX: ffffffffffffffda RBX: 0000000000000010 RCX: 0000000000413911 [ 324.331812][T12896] RDX: 00007ff9d7cf6b0a RSI: 0000000000000002 RDI: 00007ff9d7cf6b00 [ 324.341717][T12896] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 324.341727][T12896] R10: 0000000000000075 R11: 0000000000000293 R12: 0000000000000004 [ 324.341736][T12896] R13: 00000000004c8be0 R14: 00000000004dfcd8 R15: 0000000000000003 [ 324.399023][T12892] hfsplus: unable to find HFS+ superblock [ 324.552038][T12908] FAULT_INJECTION: forcing a failure. [ 324.552038][T12908] name failslab, interval 1, probability 0, space 0, times 0 [ 324.584623][T12908] CPU: 1 PID: 12908 Comm: syz-executor.0 Not tainted 5.3.0+ #0 [ 324.592193][T12908] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 324.592199][T12908] Call Trace: [ 324.592220][T12908] dump_stack+0x172/0x1f0 [ 324.592244][T12908] should_fail.cold+0xa/0x15 [ 324.605564][T12908] ? fault_create_debugfs_attr+0x180/0x180 [ 324.605585][T12908] ? ___might_sleep+0x163/0x2c0 [ 324.605605][T12908] __should_failslab+0x121/0x190 [ 324.614479][T12908] should_failslab+0x9/0x14 [ 324.614497][T12908] kmem_cache_alloc+0x2aa/0x710 [ 324.614513][T12908] ? stack_trace_save+0xac/0xe0 [ 324.614532][T12908] ? stack_trace_consume_entry+0x190/0x190 [ 324.625147][T12908] __alloc_file+0x27/0x340 [ 324.625165][T12908] alloc_empty_file+0x72/0x170 [ 324.625182][T12908] path_openat+0xef/0x46d0 [ 324.625199][T12908] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 324.634582][T12908] ? kasan_slab_alloc+0xf/0x20 [ 324.634598][T12908] ? kmem_cache_alloc+0x121/0x710 [ 324.634612][T12908] ? getname_flags+0xd6/0x5b0 [ 324.634624][T12908] ? getname+0x1a/0x20 [ 324.634636][T12908] ? do_sys_open+0x2c9/0x5d0 [ 324.634653][T12908] ? __x64_sys_open+0x7e/0xc0 [ 324.663636][T12908] ? __kasan_check_read+0x11/0x20 [ 324.692439][T12908] ? mark_lock+0xc2/0x1220 [ 324.692454][T12908] ? __kasan_check_read+0x11/0x20 [ 324.692473][T12908] ? path_lookupat.isra.0+0x8d0/0x8d0 [ 324.702143][T12908] ? __alloc_fd+0x487/0x620 [ 324.702166][T12908] do_filp_open+0x1a1/0x280 [ 324.702180][T12908] ? may_open_dev+0x100/0x100 [ 324.702198][T12908] ? lock_downgrade+0x920/0x920 [ 324.711589][T12908] ? rwlock_bug.part.0+0x90/0x90 [ 324.711610][T12908] ? __kasan_check_read+0x11/0x20 [ 324.711624][T12908] ? do_raw_spin_unlock+0x57/0x270 [ 324.711639][T12908] ? _raw_spin_unlock+0x2d/0x50 [ 324.711658][T12908] ? __alloc_fd+0x487/0x620 [ 324.721489][T12908] do_sys_open+0x3fe/0x5d0 [ 324.721508][T12908] ? filp_open+0x80/0x80 [ 324.721523][T12908] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 324.721542][T12908] ? trace_hardirqs_on_thunk+0x1a/0x20 [ 324.774801][T12908] ? do_syscall_64+0x26/0x760 [ 324.784895][T12908] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 324.784913][T12908] ? do_syscall_64+0x26/0x760 [ 324.784935][T12908] __x64_sys_open+0x7e/0xc0 11:47:29 executing program 1: setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) setsockopt$netlink_NETLINK_BROADCAST_ERROR(0xffffffffffffffff, 0x10e, 0x4, 0x0, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000100)={0x0, 0x4c, &(0x7f00000001c0)={&(0x7f0000000040)={0x14, 0x23, 0x1, 0x0, 0x0, {0x20000000004, 0xe00000000000000}}, 0x14}}, 0x0) [ 324.800124][T12908] do_syscall_64+0xfa/0x760 [ 324.804636][T12908] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 324.810527][T12908] RIP: 0033:0x413911 [ 324.814424][T12908] Code: 75 14 b8 02 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 04 19 00 00 c3 48 83 ec 08 e8 0a fa ff ff 48 89 04 24 b8 02 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 53 fa ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 324.834027][T12908] RSP: 002b:00007ff9d7cf6a80 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 [ 324.842431][T12908] RAX: ffffffffffffffda RBX: 0000000000000010 RCX: 0000000000413911 [ 324.842445][T12908] RDX: 00007ff9d7cf6b0a RSI: 0000000000000002 RDI: 00007ff9d7cf6b00 [ 324.858350][T12908] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 324.858359][T12908] R10: 0000000000000075 R11: 0000000000000293 R12: 0000000000000004 [ 324.858368][T12908] R13: 00000000004c8be0 R14: 00000000004dfcd8 R15: 0000000000000003 11:47:32 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_ATTACH(0x8, 0x0, 0x0) r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r0, &(0x7f0000000000)={{0x6, @rose}, [@rose, @rose, @default, @netrom, @bcast, @rose, @rose, @null]}, 0x48) r1 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000080)='/dev/qat_adf_ctl\x00', 0x8200, 0x0) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r1, 0x6, 0x23, &(0x7f00000000c0)={&(0x7f0000ffc000/0x4000)=nil, 0x4000}, &(0x7f0000000140)=0x10) listen(r0, 0x0) unshare(0x40000000) r2 = accept(r0, 0x0, 0x0) write$binfmt_elf64(r2, &(0x7f00000002c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x9, 0x8, 0x0, 0x0, 0x0, 0x4825483b35c83c0b, 0x0, 0x0, 0x40, 0x227}, [{0x4, 0x1, 0xfff, 0x0, 0x0, 0xff8000000002, 0x0, 0x7fff}], "", [[], [], []]}, 0x378) 11:47:32 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1100008912, &(0x7f0000000040)="11dca50d810bcfe47bf070") r1 = syz_open_dev$usb(0x0, 0x40000fffffc, 0x200000000000042) mmap$binder(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x1, 0x11, r1, 0x0) ioctl$FS_IOC_FSGETXATTR(r1, 0x8038550a, &(0x7f0000000000)={0x2, 0x0, 0x0, 0x0, 0x1000020ffd000, 0x7ff0bdbe}) 11:47:32 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000140)='hfsplus\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000a80)={[{@barrier='barrier'}, {@gid={'gid'}}, {@type={'type', 0x3d, "ae8c9d8f"}}]}) 11:47:32 executing program 0 (fault-call:0 fault-nth:12): syz_mount_image$hfsplus(&(0x7f0000000140)='hfsplus\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000a80)={[{@barrier='barrier'}, {@gid={'gid'}}, {@type={'type', 0x3d, "ae8c9d8f"}}]}) 11:47:32 executing program 1: setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) setsockopt$netlink_NETLINK_BROADCAST_ERROR(0xffffffffffffffff, 0x10e, 0x4, 0x0, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000100)={0x0, 0x4d, &(0x7f00000001c0)={&(0x7f0000000040)={0x14, 0x23, 0x1, 0x0, 0x0, {0x20000000004, 0xe00000000000000}}, 0x14}}, 0x0) 11:47:32 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_ATTACH(0x8, 0x0, 0x0) r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r0, &(0x7f0000000000)={{0x6, @rose}, [@rose, @rose, @default, @netrom, @bcast, @rose, @rose, @null]}, 0x48) r1 = openat$qat_adf_ctl(0xffffffffffffff9c, 0x0, 0x0, 0x0) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r1, 0x6, 0x23, &(0x7f00000000c0)={&(0x7f0000ffc000/0x4000)=nil, 0x4000}, &(0x7f0000000140)=0x10) listen(r0, 0x0) unshare(0x40000000) setrlimit(0x0, 0x0) r2 = accept(r0, 0x0, 0x0) write$binfmt_elf64(r2, &(0x7f00000002c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x9, 0x8, 0x0, 0x0, 0x0, 0x4825483b35c83c0b, 0x0, 0x0, 0x40, 0x227}, [{0x4, 0x1, 0xfff, 0x0, 0x0, 0xff8000000002, 0x0, 0x7fff}], "", [[], [], []]}, 0x378) [ 327.647472][T12928] FAULT_INJECTION: forcing a failure. [ 327.647472][T12928] name failslab, interval 1, probability 0, space 0, times 0 [ 327.686246][T12931] hfsplus: unable to find HFS+ superblock 11:47:32 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1100008912, &(0x7f0000000040)="11dca50d810bcfe47bf070") r1 = syz_open_dev$usb(0x0, 0x40000fffffc, 0x200000000000042) mmap$binder(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x1, 0x11, r1, 0x0) ioctl$FS_IOC_FSGETXATTR(r1, 0x8038550a, &(0x7f0000000000)={0x2, 0x0, 0x0, 0x0, 0x1000020ffd000, 0x7ff0bdbe}) [ 327.741459][T12928] CPU: 1 PID: 12928 Comm: syz-executor.0 Not tainted 5.3.0+ #0 [ 327.749040][T12928] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 327.759223][T12928] Call Trace: [ 327.762520][T12928] dump_stack+0x172/0x1f0 [ 327.766869][T12928] should_fail.cold+0xa/0x15 [ 327.771473][T12928] ? fault_create_debugfs_attr+0x180/0x180 [ 327.777282][T12928] ? ___might_sleep+0x163/0x2c0 [ 327.777319][T12928] __should_failslab+0x121/0x190 [ 327.777336][T12928] should_failslab+0x9/0x14 [ 327.777357][T12928] __kmalloc+0x2e0/0x770 [ 327.795851][T12928] ? tomoyo_realpath_from_path+0xcd/0x7b0 [ 327.795873][T12928] tomoyo_realpath_from_path+0xcd/0x7b0 [ 327.795892][T12928] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 327.795916][T12928] tomoyo_check_open_permission+0x2a8/0x3f0 [ 327.795934][T12928] ? tomoyo_path_number_perm+0x520/0x520 [ 327.795959][T12928] ? ___might_sleep+0x163/0x2c0 [ 327.813420][T12928] ? inode_has_perm+0x230/0x230 [ 327.813435][T12928] ? spin_dump+0x9c/0xd0 [ 327.813458][T12928] tomoyo_file_open+0xa9/0xd0 [ 327.813476][T12928] security_file_open+0x71/0x300 [ 327.834632][T12928] do_dentry_open+0x373/0x1250 [ 327.834646][T12928] ? __kasan_check_read+0x11/0x20 [ 327.834667][T12928] ? chown_common+0x5c0/0x5c0 [ 327.834686][T12928] ? inode_permission+0xb4/0x560 [ 327.840600][T12937] IPVS: ftp: loaded support on port[0] = 21 [ 327.843566][T12928] vfs_open+0xa0/0xd0 [ 327.843583][T12928] path_openat+0x10e9/0x46d0 [ 327.843600][T12928] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 327.858250][T12928] ? kasan_slab_alloc+0xf/0x20 [ 327.858266][T12928] ? kmem_cache_alloc+0x121/0x710 [ 327.858281][T12928] ? getname_flags+0xd6/0x5b0 [ 327.858298][T12928] ? getname+0x1a/0x20 [ 327.858313][T12928] ? do_sys_open+0x2c9/0x5d0 [ 327.858342][T12928] ? path_lookupat.isra.0+0x8d0/0x8d0 [ 327.858367][T12928] ? __alloc_fd+0x487/0x620 [ 327.882357][T12928] do_filp_open+0x1a1/0x280 [ 327.882375][T12928] ? may_open_dev+0x100/0x100 [ 327.882403][T12928] ? __kasan_check_read+0x11/0x20 [ 327.882415][T12928] ? do_raw_spin_unlock+0x57/0x270 [ 327.882433][T12928] ? _raw_spin_unlock+0x2d/0x50 [ 327.902621][T12928] ? __alloc_fd+0x487/0x620 [ 327.902653][T12928] do_sys_open+0x3fe/0x5d0 [ 327.902673][T12928] ? filp_open+0x80/0x80 [ 327.902688][T12928] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 327.902707][T12928] ? trace_hardirqs_on_thunk+0x1a/0x20 [ 327.916664][T12928] ? do_syscall_64+0x26/0x760 [ 327.916682][T12928] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 327.916696][T12928] ? do_syscall_64+0x26/0x760 [ 327.916719][T12928] __x64_sys_open+0x7e/0xc0 [ 327.916735][T12928] do_syscall_64+0xfa/0x760 [ 327.916753][T12928] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 327.916763][T12928] RIP: 0033:0x413911 [ 327.916781][T12928] Code: 75 14 b8 02 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 04 19 00 00 c3 48 83 ec 08 e8 0a fa ff ff 48 89 04 24 b8 02 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 53 fa ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 327.930406][T12928] RSP: 002b:00007ff9d7cf6a80 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 [ 327.930421][T12928] RAX: ffffffffffffffda RBX: 0000000000000010 RCX: 0000000000413911 [ 327.930431][T12928] RDX: 00007ff9d7cf6b0a RSI: 0000000000000002 RDI: 00007ff9d7cf6b00 [ 327.930439][T12928] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 327.930448][T12928] R10: 0000000000000075 R11: 0000000000000293 R12: 0000000000000004 [ 327.930457][T12928] R13: 00000000004c8be0 R14: 00000000004dfcd8 R15: 0000000000000003 [ 327.949082][T12928] ERROR: Out of memory at tomoyo_realpath_from_path. 11:47:33 executing program 1: setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) setsockopt$netlink_NETLINK_BROADCAST_ERROR(0xffffffffffffffff, 0x10e, 0x4, 0x0, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000100)={0x0, 0x4e, &(0x7f00000001c0)={&(0x7f0000000040)={0x14, 0x23, 0x1, 0x0, 0x0, {0x20000000004, 0xe00000000000000}}, 0x14}}, 0x0) [ 328.160874][T12928] hfsplus: unable to find HFS+ superblock [ 328.229445][T12941] IPVS: ftp: loaded support on port[0] = 21 11:47:33 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1100008912, &(0x7f0000000040)="11dca50d810bcfe47bf070") r1 = syz_open_dev$usb(&(0x7f0000000200)='/dev/bus/usb/00#/00#\x00', 0x0, 0x200000000000042) mmap$binder(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x1, 0x11, r1, 0x0) ioctl$FS_IOC_FSGETXATTR(r1, 0x8038550a, &(0x7f0000000000)={0x2, 0x0, 0x0, 0x0, 0x1000020ffd000, 0x7ff0bdbe}) 11:47:33 executing program 0 (fault-call:0 fault-nth:13): syz_mount_image$hfsplus(&(0x7f0000000140)='hfsplus\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000a80)={[{@barrier='barrier'}, {@gid={'gid'}}, {@type={'type', 0x3d, "ae8c9d8f"}}]}) 11:47:33 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_ATTACH(0x8, 0x0, 0x0) r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r0, &(0x7f0000000000)={{0x6, @rose}, [@rose, @rose, @default, @netrom, @bcast, @rose, @rose, @null]}, 0x48) openat$qat_adf_ctl(0xffffffffffffff9c, 0x0, 0x0, 0x0) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(0xffffffffffffffff, 0x6, 0x23, &(0x7f00000000c0)={&(0x7f0000ffc000/0x4000)=nil, 0x4000}, &(0x7f0000000140)=0x10) listen(r0, 0x0) unshare(0x40000000) setrlimit(0x0, 0x0) r1 = accept(r0, 0x0, 0x0) write$binfmt_elf64(r1, &(0x7f00000002c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x9, 0x8, 0x0, 0x0, 0x0, 0x4825483b35c83c0b, 0x0, 0x0, 0x40, 0x227}, [{0x4, 0x1, 0xfff, 0x0, 0x0, 0xff8000000002, 0x0, 0x7fff}], "", [[], [], []]}, 0x378) 11:47:33 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1100008912, &(0x7f0000000040)="11dca50d810bcfe47bf070") r1 = syz_open_dev$usb(&(0x7f0000000200)='/dev/bus/usb/00#/00#\x00', 0x0, 0x200000000000042) mmap$binder(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x1, 0x11, r1, 0x0) ioctl$FS_IOC_FSGETXATTR(r1, 0x8038550a, &(0x7f0000000000)={0x2, 0x0, 0x0, 0x0, 0x1000020ffd000, 0x7ff0bdbe}) 11:47:33 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_ATTACH(0x8, 0x0, 0x0) r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r0, &(0x7f0000000000)={{0x6, @rose}, [@rose, @rose, @default, @netrom, @bcast, @rose, @rose, @null]}, 0x48) r1 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000080)='/dev/qat_adf_ctl\x00', 0x8200, 0x0) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r1, 0x6, 0x23, &(0x7f00000000c0)={&(0x7f0000ffc000/0x4000)=nil, 0x4000}, &(0x7f0000000140)=0x10) listen(r0, 0x0) setrlimit(0x0, 0x0) r2 = accept(r0, 0x0, 0x0) write$binfmt_elf64(r2, &(0x7f00000002c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x9, 0x8, 0x0, 0x0, 0x0, 0x4825483b35c83c0b, 0x0, 0x0, 0x40, 0x227}, [{0x4, 0x1, 0xfff, 0x0, 0x0, 0xff8000000002, 0x0, 0x7fff}], "", [[], [], []]}, 0x378) 11:47:33 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000140)='\nfsplus\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000a80)={[{@barrier='barrier'}, {@gid={'gid'}}, {@type={'type', 0x3d, "ae8c9d8f"}}]}) [ 328.621270][T12968] FAULT_INJECTION: forcing a failure. [ 328.621270][T12968] name failslab, interval 1, probability 0, space 0, times 0 [ 328.650989][T12968] CPU: 0 PID: 12968 Comm: syz-executor.0 Not tainted 5.3.0+ #0 [ 328.658569][T12968] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 11:47:33 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1100008912, &(0x7f0000000040)="11dca50d810bcfe47bf070") r1 = syz_open_dev$usb(&(0x7f0000000200)='/dev/bus/usb/00#/00#\x00', 0x0, 0x200000000000042) mmap$binder(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x1, 0x11, r1, 0x0) ioctl$FS_IOC_FSGETXATTR(r1, 0x8038550a, &(0x7f0000000000)={0x2, 0x0, 0x0, 0x0, 0x1000020ffd000, 0x7ff0bdbe}) [ 328.668628][T12968] Call Trace: [ 328.671933][T12968] dump_stack+0x172/0x1f0 [ 328.676281][T12968] should_fail.cold+0xa/0x15 [ 328.680893][T12968] ? fault_create_debugfs_attr+0x180/0x180 [ 328.686765][T12968] ? ___might_sleep+0x163/0x2c0 [ 328.691608][T12968] __should_failslab+0x121/0x190 [ 328.696526][T12968] should_failslab+0x9/0x14 [ 328.701009][T12968] __kmalloc+0x2e0/0x770 [ 328.705255][T12968] ? tomoyo_realpath_from_path+0xcd/0x7b0 [ 328.710956][T12968] tomoyo_realpath_from_path+0xcd/0x7b0 [ 328.716480][T12968] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 328.722701][T12968] tomoyo_check_open_permission+0x2a8/0x3f0 [ 328.728574][T12968] ? tomoyo_path_number_perm+0x520/0x520 [ 328.734195][T12968] ? ___might_sleep+0x163/0x2c0 [ 328.739055][T12968] ? inode_has_perm+0x230/0x230 [ 328.743888][T12968] ? spin_dump+0x9c/0xd0 [ 328.748129][T12968] tomoyo_file_open+0xa9/0xd0 [ 328.752798][T12968] security_file_open+0x71/0x300 [ 328.757754][T12968] do_dentry_open+0x373/0x1250 [ 328.762514][T12968] ? __kasan_check_read+0x11/0x20 [ 328.767704][T12968] ? chown_common+0x5c0/0x5c0 [ 328.772372][T12968] ? inode_permission+0xb4/0x560 [ 328.777293][T12968] vfs_open+0xa0/0xd0 [ 328.781348][T12968] path_openat+0x10e9/0x46d0 [ 328.785929][T12968] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 328.791722][T12968] ? kasan_slab_alloc+0xf/0x20 [ 328.798979][T12968] ? kmem_cache_alloc+0x121/0x710 [ 328.803980][T12968] ? getname_flags+0xd6/0x5b0 [ 328.808640][T12968] ? getname+0x1a/0x20 [ 328.812695][T12968] ? do_sys_open+0x2c9/0x5d0 [ 328.817278][T12968] ? path_lookupat.isra.0+0x8d0/0x8d0 [ 328.822637][T12968] ? __alloc_fd+0x487/0x620 [ 328.827210][T12968] do_filp_open+0x1a1/0x280 [ 328.831815][T12968] ? may_open_dev+0x100/0x100 [ 328.836473][T12968] ? __kasan_check_read+0x11/0x20 [ 328.841513][T12968] ? do_raw_spin_unlock+0x57/0x270 [ 328.846649][T12968] ? _raw_spin_unlock+0x2d/0x50 [ 328.851478][T12968] ? __alloc_fd+0x487/0x620 [ 328.855965][T12968] do_sys_open+0x3fe/0x5d0 [ 328.860360][T12968] ? filp_open+0x80/0x80 [ 328.864616][T12968] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 328.870836][T12968] ? trace_hardirqs_on_thunk+0x1a/0x20 [ 328.876280][T12968] ? do_syscall_64+0x26/0x760 [ 328.880947][T12968] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 328.886993][T12968] ? do_syscall_64+0x26/0x760 [ 328.891650][T12968] __x64_sys_open+0x7e/0xc0 [ 328.896132][T12968] do_syscall_64+0xfa/0x760 [ 328.900615][T12968] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 328.906481][T12968] RIP: 0033:0x413911 [ 328.910355][T12968] Code: 75 14 b8 02 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 04 19 00 00 c3 48 83 ec 08 e8 0a fa ff ff 48 89 04 24 b8 02 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 53 fa ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 328.929930][T12968] RSP: 002b:00007ff9d7cf6a80 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 [ 328.938315][T12968] RAX: ffffffffffffffda RBX: 0000000000000010 RCX: 0000000000413911 [ 328.946264][T12968] RDX: 00007ff9d7cf6b0a RSI: 0000000000000002 RDI: 00007ff9d7cf6b00 [ 328.954224][T12968] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 328.962185][T12968] R10: 0000000000000075 R11: 0000000000000293 R12: 0000000000000004 [ 328.970132][T12968] R13: 00000000004c8be0 R14: 00000000004dfcd8 R15: 0000000000000003 [ 328.980071][T12968] ERROR: Out of memory at tomoyo_realpath_from_path. [ 329.028409][T12974] IPVS: ftp: loaded support on port[0] = 21 11:47:34 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000140)='%fsplus\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000a80)={[{@barrier='barrier'}, {@gid={'gid'}}, {@type={'type', 0x3d, "ae8c9d8f"}}]}) 11:47:34 executing program 1: setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) setsockopt$netlink_NETLINK_BROADCAST_ERROR(0xffffffffffffffff, 0x10e, 0x4, 0x0, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000100)={0x0, 0x4f, &(0x7f00000001c0)={&(0x7f0000000040)={0x14, 0x23, 0x1, 0x0, 0x0, {0x20000000004, 0xe00000000000000}}, 0x14}}, 0x0) [ 329.147886][T12968] hfsplus: unable to find HFS+ superblock 11:47:34 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1100008912, &(0x7f0000000040)="11dca50d810bcfe47bf070") r1 = syz_open_dev$usb(&(0x7f0000000200)='/dev/bus/usb/00#/00#\x00', 0x40000fffffc, 0x0) mmap$binder(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x1, 0x11, r1, 0x0) ioctl$FS_IOC_FSGETXATTR(r1, 0x8038550a, &(0x7f0000000000)={0x2, 0x0, 0x0, 0x0, 0x1000020ffd000, 0x7ff0bdbe}) 11:47:34 executing program 0 (fault-call:0 fault-nth:14): syz_mount_image$hfsplus(&(0x7f0000000140)='hfsplus\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000a80)={[{@barrier='barrier'}, {@gid={'gid'}}, {@type={'type', 0x3d, "ae8c9d8f"}}]}) 11:47:34 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_ATTACH(0x8, 0x0, 0x0) r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r0, &(0x7f0000000000)={{0x6, @rose}, [@rose, @rose, @default, @netrom, @bcast, @rose, @rose, @null]}, 0x48) r1 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000080)='/dev/qat_adf_ctl\x00', 0x8200, 0x0) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r1, 0x6, 0x23, &(0x7f00000000c0)={&(0x7f0000ffc000/0x4000)=nil, 0x4000}, &(0x7f0000000140)=0x10) listen(r0, 0x0) setrlimit(0x0, 0x0) r2 = accept(r0, 0x0, 0x0) write$binfmt_elf64(r2, &(0x7f00000002c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x9, 0x8, 0x0, 0x0, 0x0, 0x4825483b35c83c0b, 0x0, 0x0, 0x40, 0x227}, [{0x4, 0x1, 0xfff, 0x0, 0x0, 0xff8000000002, 0x0, 0x7fff}], "", [[], [], []]}, 0x378) 11:47:34 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1100008912, &(0x7f0000000040)="11dca50d810bcfe47bf070") r1 = syz_open_dev$usb(&(0x7f0000000200)='/dev/bus/usb/00#/00#\x00', 0x40000fffffc, 0x0) mmap$binder(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x1, 0x11, r1, 0x0) ioctl$FS_IOC_FSGETXATTR(r1, 0x8038550a, &(0x7f0000000000)={0x2, 0x0, 0x0, 0x0, 0x1000020ffd000, 0x7ff0bdbe}) 11:47:34 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_ATTACH(0x8, 0x0, 0x0) r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r0, &(0x7f0000000000)={{0x6, @rose}, [@rose, @rose, @default, @netrom, @bcast, @rose, @rose, @null]}, 0x48) openat$qat_adf_ctl(0xffffffffffffff9c, 0x0, 0x0, 0x0) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(0xffffffffffffffff, 0x6, 0x23, &(0x7f00000000c0)={&(0x7f0000ffc000/0x4000)=nil, 0x4000}, &(0x7f0000000140)=0x10) listen(r0, 0x0) unshare(0x40000000) setrlimit(0x0, 0x0) r1 = accept(r0, 0x0, 0x0) write$binfmt_elf64(r1, &(0x7f00000002c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x9, 0x8, 0x0, 0x0, 0x0, 0x4825483b35c83c0b, 0x0, 0x0, 0x40, 0x227}, [{0x4, 0x1, 0xfff, 0x0, 0x0, 0xff8000000002, 0x0, 0x7fff}], "", [[], [], []]}, 0x378) [ 329.555512][T13009] FAULT_INJECTION: forcing a failure. [ 329.555512][T13009] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 329.568771][T13009] CPU: 0 PID: 13009 Comm: syz-executor.0 Not tainted 5.3.0+ #0 [ 329.576307][T13009] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 329.576313][T13009] Call Trace: [ 329.576335][T13009] dump_stack+0x172/0x1f0 [ 329.576362][T13009] should_fail.cold+0xa/0x15 [ 329.576384][T13009] ? fault_create_debugfs_attr+0x180/0x180 [ 329.576401][T13009] ? is_bpf_text_address+0xac/0x170 [ 329.576415][T13009] ? find_held_lock+0x35/0x130 [ 329.576437][T13009] should_fail_alloc_page+0x50/0x60 [ 329.589755][T13009] __alloc_pages_nodemask+0x1a1/0x900 [ 329.600359][T13009] ? lock_downgrade+0x920/0x920 [ 329.600378][T13009] ? __alloc_pages_slowpath+0x28e0/0x28e0 [ 329.600392][T13009] ? __kasan_check_read+0x11/0x20 [ 329.600417][T13009] ? fault_create_debugfs_attr+0x180/0x180 [ 329.600438][T13009] cache_grow_begin+0x90/0xd20 [ 329.611403][T13009] ? tomoyo_realpath_from_path+0xcd/0x7b0 [ 329.611423][T13009] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 329.611443][T13009] __kmalloc+0x6b2/0x770 [ 329.611464][T13009] ? tomoyo_realpath_from_path+0xcd/0x7b0 [ 329.611485][T13009] tomoyo_realpath_from_path+0xcd/0x7b0 [ 329.621396][T13009] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 329.621424][T13009] tomoyo_check_open_permission+0x2a8/0x3f0 [ 329.621444][T13009] ? tomoyo_path_number_perm+0x520/0x520 [ 329.621468][T13009] ? ___might_sleep+0x163/0x2c0 [ 329.621500][T13009] ? inode_has_perm+0x230/0x230 [ 329.631670][T13009] ? spin_dump+0x9c/0xd0 [ 329.631696][T13009] tomoyo_file_open+0xa9/0xd0 [ 329.631714][T13009] security_file_open+0x71/0x300 [ 329.631734][T13009] do_dentry_open+0x373/0x1250 [ 329.631751][T13009] ? __kasan_check_read+0x11/0x20 [ 329.642453][T13009] ? chown_common+0x5c0/0x5c0 [ 329.642470][T13009] ? inode_permission+0xb4/0x560 [ 329.642493][T13009] vfs_open+0xa0/0xd0 [ 329.642509][T13009] path_openat+0x10e9/0x46d0 [ 329.642528][T13009] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 329.653036][T13009] ? kasan_slab_alloc+0xf/0x20 [ 329.653050][T13009] ? kmem_cache_alloc+0x121/0x710 [ 329.653064][T13009] ? getname_flags+0xd6/0x5b0 [ 329.653076][T13009] ? getname+0x1a/0x20 [ 329.653090][T13009] ? do_sys_open+0x2c9/0x5d0 [ 329.653117][T13009] ? path_lookupat.isra.0+0x8d0/0x8d0 [ 329.665117][T13009] ? __alloc_fd+0x487/0x620 [ 329.665139][T13009] do_filp_open+0x1a1/0x280 [ 329.665156][T13009] ? may_open_dev+0x100/0x100 [ 329.665180][T13009] ? __kasan_check_read+0x11/0x20 [ 329.665192][T13009] ? do_raw_spin_unlock+0x57/0x270 [ 329.665211][T13009] ? _raw_spin_unlock+0x2d/0x50 [ 329.675120][T13009] ? __alloc_fd+0x487/0x620 [ 329.675152][T13009] do_sys_open+0x3fe/0x5d0 [ 329.675172][T13009] ? filp_open+0x80/0x80 [ 329.675190][T13009] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 329.675212][T13009] ? trace_hardirqs_on_thunk+0x1a/0x20 [ 329.686945][T13009] ? do_syscall_64+0x26/0x760 [ 329.686965][T13009] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 329.686980][T13009] ? do_syscall_64+0x26/0x760 [ 329.687001][T13009] __x64_sys_open+0x7e/0xc0 [ 329.687019][T13009] do_syscall_64+0xfa/0x760 [ 329.687038][T13009] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 329.687053][T13009] RIP: 0033:0x413911 [ 329.698525][T13009] Code: 75 14 b8 02 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 04 19 00 00 c3 48 83 ec 08 e8 0a fa ff ff 48 89 04 24 b8 02 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 53 fa ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 329.698533][T13009] RSP: 002b:00007ff9d7cf6a80 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 11:47:34 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_ATTACH(0x8, 0x0, 0x0) r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r0, &(0x7f0000000000)={{0x6, @rose}, [@rose, @rose, @default, @netrom, @bcast, @rose, @rose, @null]}, 0x48) r1 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000080)='/dev/qat_adf_ctl\x00', 0x8200, 0x0) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r1, 0x6, 0x23, &(0x7f00000000c0)={&(0x7f0000ffc000/0x4000)=nil, 0x4000}, &(0x7f0000000140)=0x10) listen(r0, 0x0) setrlimit(0x0, 0x0) r2 = accept(r0, 0x0, 0x0) write$binfmt_elf64(r2, &(0x7f00000002c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x9, 0x8, 0x0, 0x0, 0x0, 0x4825483b35c83c0b, 0x0, 0x0, 0x40, 0x227}, [{0x4, 0x1, 0xfff, 0x0, 0x0, 0xff8000000002, 0x0, 0x7fff}], "", [[], [], []]}, 0x378) [ 329.698547][T13009] RAX: ffffffffffffffda RBX: 0000000000000010 RCX: 0000000000413911 [ 329.698556][T13009] RDX: 00007ff9d7cf6b0a RSI: 0000000000000002 RDI: 00007ff9d7cf6b00 [ 329.698564][T13009] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 329.698590][T13009] R10: 0000000000000075 R11: 0000000000000293 R12: 0000000000000004 [ 329.698599][T13009] R13: 00000000004c8be0 R14: 00000000004dfcd8 R15: 0000000000000003 [ 329.896406][T13009] hfsplus: unable to find HFS+ superblock 11:47:34 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000140)='\\fsplus\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000a80)={[{@barrier='barrier'}, {@gid={'gid'}}, {@type={'type', 0x3d, "ae8c9d8f"}}]}) [ 329.973057][T13016] IPVS: ftp: loaded support on port[0] = 21 11:47:35 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1100008912, &(0x7f0000000040)="11dca50d810bcfe47bf070") r1 = syz_open_dev$usb(&(0x7f0000000200)='/dev/bus/usb/00#/00#\x00', 0x40000fffffc, 0x0) mmap$binder(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x1, 0x11, r1, 0x0) ioctl$FS_IOC_FSGETXATTR(r1, 0x8038550a, &(0x7f0000000000)={0x2, 0x0, 0x0, 0x0, 0x1000020ffd000, 0x7ff0bdbe}) 11:47:35 executing program 0 (fault-call:0 fault-nth:15): syz_mount_image$hfsplus(&(0x7f0000000140)='hfsplus\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000a80)={[{@barrier='barrier'}, {@gid={'gid'}}, {@type={'type', 0x3d, "ae8c9d8f"}}]}) 11:47:35 executing program 1: setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) setsockopt$netlink_NETLINK_BROADCAST_ERROR(0xffffffffffffffff, 0x10e, 0x4, 0x0, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000100)={0x0, 0x50, &(0x7f00000001c0)={&(0x7f0000000040)={0x14, 0x23, 0x1, 0x0, 0x0, {0x20000000004, 0xe00000000000000}}, 0x14}}, 0x0) 11:47:35 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_ATTACH(0x8, 0x0, 0x0) r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r0, &(0x7f0000000000)={{0x6, @rose}, [@rose, @rose, @default, @netrom, @bcast, @rose, @rose, @null]}, 0x48) openat$qat_adf_ctl(0xffffffffffffff9c, 0x0, 0x0, 0x0) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(0xffffffffffffffff, 0x6, 0x23, &(0x7f00000000c0)={&(0x7f0000ffc000/0x4000)=nil, 0x4000}, &(0x7f0000000140)=0x10) listen(r0, 0x0) unshare(0x40000000) setrlimit(0x0, 0x0) r1 = accept(r0, 0x0, 0x0) write$binfmt_elf64(r1, &(0x7f00000002c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x9, 0x8, 0x0, 0x0, 0x0, 0x4825483b35c83c0b, 0x0, 0x0, 0x40, 0x227}, [{0x4, 0x1, 0xfff, 0x0, 0x0, 0xff8000000002, 0x0, 0x7fff}], "", [[], [], []]}, 0x378) 11:47:35 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_ATTACH(0x8, 0x0, 0x0) r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r0, &(0x7f0000000000)={{0x6, @rose}, [@rose, @rose, @default, @netrom, @bcast, @rose, @rose, @null]}, 0x48) r1 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000080)='/dev/qat_adf_ctl\x00', 0x8200, 0x0) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r1, 0x6, 0x23, &(0x7f00000000c0)={&(0x7f0000ffc000/0x4000)=nil, 0x4000}, &(0x7f0000000140)=0x10) unshare(0x40000000) setrlimit(0x0, 0x0) r2 = accept(r0, 0x0, 0x0) write$binfmt_elf64(r2, &(0x7f00000002c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x9, 0x8, 0x0, 0x0, 0x0, 0x4825483b35c83c0b, 0x0, 0x0, 0x40, 0x227}, [{0x4, 0x1, 0xfff, 0x0, 0x0, 0xff8000000002, 0x0, 0x7fff}], "", [[], [], []]}, 0x378) [ 330.345312][T13041] FAULT_INJECTION: forcing a failure. [ 330.345312][T13041] name failslab, interval 1, probability 0, space 0, times 0 [ 330.419387][T13041] CPU: 1 PID: 13041 Comm: syz-executor.0 Not tainted 5.3.0+ #0 [ 330.426980][T13041] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 330.426987][T13041] Call Trace: [ 330.427010][T13041] dump_stack+0x172/0x1f0 [ 330.427036][T13041] should_fail.cold+0xa/0x15 [ 330.427058][T13041] ? fault_create_debugfs_attr+0x180/0x180 [ 330.427082][T13041] ? ___might_sleep+0x163/0x2c0 [ 330.427100][T13041] __should_failslab+0x121/0x190 [ 330.427120][T13041] should_failslab+0x9/0x14 [ 330.469359][T13041] __kmalloc+0x2e0/0x770 [ 330.473602][T13041] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 330.479843][T13041] ? d_absolute_path+0x11b/0x170 [ 330.484779][T13041] ? __d_path+0x140/0x140 [ 330.489126][T13041] ? tomoyo_encode2.part.0+0xf5/0x400 [ 330.494640][T13041] tomoyo_encode2.part.0+0xf5/0x400 [ 330.494660][T13041] tomoyo_encode+0x2b/0x50 [ 330.504245][T13041] tomoyo_realpath_from_path+0x1d3/0x7b0 [ 330.509893][T13041] tomoyo_path_number_perm+0x1dd/0x520 [ 330.515369][T13041] ? tomoyo_path_number_perm+0x193/0x520 [ 330.515388][T13041] ? tomoyo_execute_permission+0x4a0/0x4a0 [ 330.515414][T13041] ? ___might_sleep+0x163/0x2c0 [ 330.531663][T13041] ? selinux_file_mprotect+0x620/0x620 [ 330.537116][T13041] ? __fget+0x384/0x560 [ 330.541278][T13041] ? ksys_dup3+0x3e0/0x3e0 [ 330.545691][T13041] ? rcu_read_lock_sched_held+0x9c/0xd0 [ 330.551233][T13041] tomoyo_file_ioctl+0x23/0x30 [ 330.551248][T13041] security_file_ioctl+0x77/0xc0 [ 330.551267][T13041] ksys_ioctl+0x57/0xd0 [ 330.551283][T13041] __x64_sys_ioctl+0x73/0xb0 11:47:35 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000140)='h\nsplus\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000a80)={[{@barrier='barrier'}, {@gid={'gid'}}, {@type={'type', 0x3d, "ae8c9d8f"}}]}) 11:47:35 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1100008912, &(0x7f0000000040)="11dca50d810bcfe47bf070") r1 = syz_open_dev$usb(&(0x7f0000000200)='/dev/bus/usb/00#/00#\x00', 0x40000fffffc, 0x200000000000042) mmap$binder(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x1, 0x11, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_FSGETXATTR(r1, 0x8038550a, &(0x7f0000000000)={0x2, 0x0, 0x0, 0x0, 0x1000020ffd000, 0x7ff0bdbe}) [ 330.551304][T13041] do_syscall_64+0xfa/0x760 [ 330.560964][T13041] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 330.560979][T13041] RIP: 0033:0x459897 [ 330.583921][T13041] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 330.603514][T13041] RSP: 002b:00007ff9d7cf6a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 330.603529][T13041] RAX: ffffffffffffffda RBX: 0000000000000010 RCX: 0000000000459897 [ 330.603549][T13041] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 330.603557][T13041] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 330.603564][T13041] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 330.603572][T13041] R13: 00000000004c8be0 R14: 00000000004dfcd8 R15: 0000000000000003 [ 330.624184][T13041] ERROR: Out of memory at tomoyo_realpath_from_path. [ 330.680734][T13055] IPVS: ftp: loaded support on port[0] = 21 [ 330.733507][T13053] IPVS: ftp: loaded support on port[0] = 21 [ 330.778966][T13041] hfsplus: unable to find HFS+ superblock [ 330.816946][T13066] vhci_hcd: default hub control req: 0000 v0000 i0000 l0 11:47:35 executing program 1: setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) setsockopt$netlink_NETLINK_BROADCAST_ERROR(0xffffffffffffffff, 0x10e, 0x4, 0x0, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000100)={0x0, 0x51, &(0x7f00000001c0)={&(0x7f0000000040)={0x14, 0x23, 0x1, 0x0, 0x0, {0x20000000004, 0xe00000000000000}}, 0x14}}, 0x0) 11:47:35 executing program 0 (fault-call:0 fault-nth:16): syz_mount_image$hfsplus(&(0x7f0000000140)='hfsplus\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000a80)={[{@barrier='barrier'}, {@gid={'gid'}}, {@type={'type', 0x3d, "ae8c9d8f"}}]}) 11:47:35 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1100008912, &(0x7f0000000040)="11dca50d810bcfe47bf070") r1 = syz_open_dev$usb(&(0x7f0000000200)='/dev/bus/usb/00#/00#\x00', 0x40000fffffc, 0x200000000000042) mmap$binder(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x1, 0x11, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_FSGETXATTR(r1, 0x8038550a, &(0x7f0000000000)={0x2, 0x0, 0x0, 0x0, 0x1000020ffd000, 0x7ff0bdbe}) 11:47:35 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000140)='h%splus\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000a80)={[{@barrier='barrier'}, {@gid={'gid'}}, {@type={'type', 0x3d, "ae8c9d8f"}}]}) [ 331.072876][T13078] FAULT_INJECTION: forcing a failure. [ 331.072876][T13078] name failslab, interval 1, probability 0, space 0, times 0 [ 331.106189][T13078] CPU: 0 PID: 13078 Comm: syz-executor.0 Not tainted 5.3.0+ #0 [ 331.110408][T13082] vhci_hcd: default hub control req: 0000 v0000 i0000 l0 [ 331.113774][T13078] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 331.130816][T13078] Call Trace: [ 331.134106][T13078] dump_stack+0x172/0x1f0 [ 331.138450][T13078] should_fail.cold+0xa/0x15 [ 331.143045][T13078] ? fault_create_debugfs_attr+0x180/0x180 [ 331.148854][T13078] ? ___might_sleep+0x163/0x2c0 [ 331.153708][T13078] __should_failslab+0x121/0x190 [ 331.158647][T13078] should_failslab+0x9/0x14 [ 331.163158][T13078] kmem_cache_alloc+0x2aa/0x710 [ 331.168015][T13078] __kernfs_new_node+0xf0/0x6c0 [ 331.172864][T13078] ? _raw_spin_unlock_irq+0x28/0x90 [ 331.178064][T13078] ? kernfs_dop_revalidate+0x3c0/0x3c0 [ 331.183529][T13078] ? __kasan_check_read+0x11/0x20 [ 331.188557][T13078] ? __kasan_check_read+0x11/0x20 [ 331.193594][T13078] ? __lock_acquire+0x16f2/0x4a00 [ 331.198626][T13078] kernfs_new_node+0x96/0x120 [ 331.203307][T13078] kernfs_create_dir_ns+0x52/0x160 [ 331.208420][T13078] internal_create_group+0x7f4/0xc40 [ 331.213702][T13078] ? lock_downgrade+0x920/0x920 [ 331.218557][T13078] ? remove_files.isra.0+0x190/0x190 [ 331.223841][T13078] ? __kasan_check_write+0x14/0x20 [ 331.228947][T13078] ? up_write+0x155/0x490 [ 331.233290][T13078] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 331.239529][T13078] sysfs_create_group+0x20/0x30 [ 331.244454][T13078] loop_set_fd+0xac1/0x1020 [ 331.248982][T13078] lo_ioctl+0x1a3/0x1460 [ 331.253229][T13078] ? loop_set_fd+0x1020/0x1020 [ 331.257989][T13078] blkdev_ioctl+0xedb/0x1c20 [ 331.262573][T13078] ? blkpg_ioctl+0xa90/0xa90 [ 331.267160][T13078] ? tomoyo_execute_permission+0x4a0/0x4a0 [ 331.272975][T13078] ? ___might_sleep+0x163/0x2c0 [ 331.277825][T13078] block_ioctl+0xee/0x130 [ 331.282165][T13078] ? blkdev_fallocate+0x410/0x410 [ 331.287188][T13078] do_vfs_ioctl+0xdb6/0x13e0 [ 331.291780][T13078] ? ioctl_preallocate+0x210/0x210 [ 331.296884][T13078] ? selinux_file_mprotect+0x620/0x620 [ 331.302334][T13078] ? __fget+0x384/0x560 [ 331.306494][T13078] ? ksys_dup3+0x3e0/0x3e0 [ 331.310925][T13078] ? do_sys_open+0x31d/0x5d0 [ 331.315521][T13078] ? tomoyo_file_ioctl+0x23/0x30 [ 331.320465][T13078] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 331.326706][T13078] ? security_file_ioctl+0x8d/0xc0 [ 331.331821][T13078] ksys_ioctl+0xab/0xd0 [ 331.335981][T13078] __x64_sys_ioctl+0x73/0xb0 [ 331.340683][T13078] do_syscall_64+0xfa/0x760 [ 331.345185][T13078] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 331.351077][T13078] RIP: 0033:0x459897 11:47:36 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1100008912, &(0x7f0000000040)="11dca50d810bcfe47bf070") r1 = syz_open_dev$usb(&(0x7f0000000200)='/dev/bus/usb/00#/00#\x00', 0x40000fffffc, 0x200000000000042) mmap$binder(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x1, 0x11, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_FSGETXATTR(r1, 0x8038550a, &(0x7f0000000000)={0x2, 0x0, 0x0, 0x0, 0x1000020ffd000, 0x7ff0bdbe}) [ 331.354966][T13078] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 331.374567][T13078] RSP: 002b:00007ff9d7cf6a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 331.382958][T13078] RAX: ffffffffffffffda RBX: 0000000000000010 RCX: 0000000000459897 [ 331.390906][T13078] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 331.398857][T13078] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 331.406819][T13078] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 331.414771][T13078] R13: 00000000004c8be0 R14: 00000000004dfcd8 R15: 0000000000000003 11:47:36 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_ATTACH(0x8, 0x0, 0x0) r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r0, &(0x7f0000000000)={{0x6, @rose}, [@rose, @rose, @default, @netrom, @bcast, @rose, @rose, @null]}, 0x48) r1 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000080)='/dev/qat_adf_ctl\x00', 0x8200, 0x0) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r1, 0x6, 0x23, &(0x7f00000000c0)={&(0x7f0000ffc000/0x4000)=nil, 0x4000}, &(0x7f0000000140)=0x10) unshare(0x40000000) setrlimit(0x0, 0x0) r2 = accept(r0, 0x0, 0x0) write$binfmt_elf64(r2, &(0x7f00000002c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x9, 0x8, 0x0, 0x0, 0x0, 0x4825483b35c83c0b, 0x0, 0x0, 0x40, 0x227}, [{0x4, 0x1, 0xfff, 0x0, 0x0, 0xff8000000002, 0x0, 0x7fff}], "", [[], [], []]}, 0x378) 11:47:36 executing program 1: setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) setsockopt$netlink_NETLINK_BROADCAST_ERROR(0xffffffffffffffff, 0x10e, 0x4, 0x0, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000100)={0x0, 0x52, &(0x7f00000001c0)={&(0x7f0000000040)={0x14, 0x23, 0x1, 0x0, 0x0, {0x20000000004, 0xe00000000000000}}, 0x14}}, 0x0) [ 331.537180][T13086] vhci_hcd: default hub control req: 0000 v0000 i0000 l0 [ 331.545067][T13078] hfsplus: unable to find HFS+ superblock 11:47:36 executing program 0 (fault-call:0 fault-nth:17): syz_mount_image$hfsplus(&(0x7f0000000140)='hfsplus\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000a80)={[{@barrier='barrier'}, {@gid={'gid'}}, {@type={'type', 0x3d, "ae8c9d8f"}}]}) [ 331.817080][T13103] IPVS: ftp: loaded support on port[0] = 21 [ 331.926953][T13108] FAULT_INJECTION: forcing a failure. [ 331.926953][T13108] name failslab, interval 1, probability 0, space 0, times 0 [ 332.010658][T13108] CPU: 1 PID: 13108 Comm: syz-executor.0 Not tainted 5.3.0+ #0 [ 332.018230][T13108] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 332.028283][T13108] Call Trace: [ 332.031571][T13108] dump_stack+0x172/0x1f0 [ 332.035906][T13108] should_fail.cold+0xa/0x15 [ 332.040498][T13108] ? fault_create_debugfs_attr+0x180/0x180 [ 332.046308][T13108] ? ___might_sleep+0x163/0x2c0 [ 332.051161][T13108] __should_failslab+0x121/0x190 [ 332.056101][T13108] should_failslab+0x9/0x14 [ 332.060603][T13108] __kmalloc+0x2e0/0x770 [ 332.064836][T13108] ? mark_held_locks+0xf0/0xf0 [ 332.069594][T13108] ? __kasan_check_read+0x11/0x20 [ 332.074618][T13108] ? tomoyo_realpath_from_path+0xcd/0x7b0 [ 332.080349][T13108] tomoyo_realpath_from_path+0xcd/0x7b0 [ 332.085887][T13108] ? tomoyo_path_number_perm+0x193/0x520 [ 332.091533][T13108] tomoyo_path_number_perm+0x1dd/0x520 [ 332.096992][T13108] ? tomoyo_path_number_perm+0x193/0x520 [ 332.102629][T13108] ? tomoyo_execute_permission+0x4a0/0x4a0 [ 332.108447][T13108] ? ___might_sleep+0x163/0x2c0 [ 332.113334][T13108] ? selinux_file_mprotect+0x620/0x620 [ 332.118796][T13108] ? __fget+0x384/0x560 [ 332.122955][T13108] ? ksys_dup3+0x3e0/0x3e0 [ 332.127371][T13108] ? rcu_read_lock_sched_held+0x9c/0xd0 [ 332.132923][T13108] tomoyo_file_ioctl+0x23/0x30 [ 332.137686][T13108] security_file_ioctl+0x77/0xc0 [ 332.142626][T13108] ksys_ioctl+0x57/0xd0 [ 332.146783][T13108] __x64_sys_ioctl+0x73/0xb0 [ 332.151379][T13108] do_syscall_64+0xfa/0x760 [ 332.155891][T13108] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 332.161781][T13108] RIP: 0033:0x459897 [ 332.165679][T13108] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 332.185278][T13108] RSP: 002b:00007ff9d7cf6a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 332.193686][T13108] RAX: ffffffffffffffda RBX: 0000000000000010 RCX: 0000000000459897 [ 332.201654][T13108] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 332.209620][T13108] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 332.217591][T13108] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 332.225562][T13108] R13: 00000000004c8be0 R14: 00000000004dfcd8 R15: 0000000000000003 [ 332.245278][T13108] ERROR: Out of memory at tomoyo_realpath_from_path. [ 332.305043][T13108] hfsplus: unable to find HFS+ superblock 11:47:38 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_ATTACH(0x8, 0x0, 0x0) r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r0, &(0x7f0000000000)={{0x6, @rose}, [@rose, @rose, @default, @netrom, @bcast, @rose, @rose, @null]}, 0x48) r1 = openat$qat_adf_ctl(0xffffffffffffff9c, 0x0, 0x0, 0x0) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r1, 0x6, 0x23, 0x0, &(0x7f0000000140)) listen(r0, 0x0) unshare(0x40000000) setrlimit(0x0, 0x0) r2 = accept(r0, 0x0, 0x0) write$binfmt_elf64(r2, &(0x7f00000002c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x9, 0x8, 0x0, 0x0, 0x0, 0x4825483b35c83c0b, 0x0, 0x0, 0x40, 0x227}, [{0x4, 0x1, 0xfff, 0x0, 0x0, 0xff8000000002, 0x0, 0x7fff}], "", [[], [], []]}, 0x378) 11:47:38 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1100008912, &(0x7f0000000040)="11dca50d810bcfe47bf070") r1 = syz_open_dev$usb(&(0x7f0000000200)='/dev/bus/usb/00#/00#\x00', 0x40000fffffc, 0x200000000000042) mmap$binder(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x1, 0x11, r1, 0x0) ioctl$FS_IOC_FSGETXATTR(0xffffffffffffffff, 0x8038550a, &(0x7f0000000000)={0x2, 0x0, 0x0, 0x0, 0x1000020ffd000, 0x7ff0bdbe}) 11:47:38 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000140)='h.splus\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000a80)={[{@barrier='barrier'}, {@gid={'gid'}}, {@type={'type', 0x3d, "ae8c9d8f"}}]}) 11:47:38 executing program 1: setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) setsockopt$netlink_NETLINK_BROADCAST_ERROR(0xffffffffffffffff, 0x10e, 0x4, 0x0, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000100)={0x0, 0x53, &(0x7f00000001c0)={&(0x7f0000000040)={0x14, 0x23, 0x1, 0x0, 0x0, {0x20000000004, 0xe00000000000000}}, 0x14}}, 0x0) 11:47:38 executing program 0 (fault-call:0 fault-nth:18): syz_mount_image$hfsplus(&(0x7f0000000140)='hfsplus\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000a80)={[{@barrier='barrier'}, {@gid={'gid'}}, {@type={'type', 0x3d, "ae8c9d8f"}}]}) 11:47:38 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_ATTACH(0x8, 0x0, 0x0) r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r0, &(0x7f0000000000)={{0x6, @rose}, [@rose, @rose, @default, @netrom, @bcast, @rose, @rose, @null]}, 0x48) r1 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000080)='/dev/qat_adf_ctl\x00', 0x8200, 0x0) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r1, 0x6, 0x23, &(0x7f00000000c0)={&(0x7f0000ffc000/0x4000)=nil, 0x4000}, &(0x7f0000000140)=0x10) unshare(0x40000000) setrlimit(0x0, 0x0) r2 = accept(r0, 0x0, 0x0) write$binfmt_elf64(r2, &(0x7f00000002c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x9, 0x8, 0x0, 0x0, 0x0, 0x4825483b35c83c0b, 0x0, 0x0, 0x40, 0x227}, [{0x4, 0x1, 0xfff, 0x0, 0x0, 0xff8000000002, 0x0, 0x7fff}], "", [[], [], []]}, 0x378) [ 333.825583][T13126] FAULT_INJECTION: forcing a failure. [ 333.825583][T13126] name failslab, interval 1, probability 0, space 0, times 0 [ 333.856823][T13126] CPU: 0 PID: 13126 Comm: syz-executor.0 Not tainted 5.3.0+ #0 [ 333.864393][T13126] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 333.874439][T13126] Call Trace: [ 333.874465][T13126] dump_stack+0x172/0x1f0 [ 333.874491][T13126] should_fail.cold+0xa/0x15 [ 333.874512][T13126] ? fault_create_debugfs_attr+0x180/0x180 [ 333.882102][T13126] ? ___might_sleep+0x163/0x2c0 [ 333.882125][T13126] __should_failslab+0x121/0x190 [ 333.882146][T13126] should_failslab+0x9/0x14 [ 333.906762][T13126] __kmalloc+0x2e0/0x770 [ 333.911014][T13126] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 333.917254][T13126] ? d_absolute_path+0x11b/0x170 [ 333.922189][T13126] ? __d_path+0x140/0x140 [ 333.926523][T13126] ? tomoyo_encode2.part.0+0xf5/0x400 [ 333.931900][T13126] tomoyo_encode2.part.0+0xf5/0x400 [ 333.937115][T13126] tomoyo_encode+0x2b/0x50 [ 333.937132][T13126] tomoyo_realpath_from_path+0x1d3/0x7b0 [ 333.937158][T13126] tomoyo_path_number_perm+0x1dd/0x520 [ 333.937171][T13126] ? tomoyo_path_number_perm+0x193/0x520 [ 333.937189][T13126] ? tomoyo_execute_permission+0x4a0/0x4a0 [ 333.947221][T13126] ? ___might_sleep+0x163/0x2c0 [ 333.947261][T13126] ? selinux_file_mprotect+0x620/0x620 [ 333.947276][T13126] ? __fget+0x384/0x560 [ 333.947298][T13126] ? ksys_dup3+0x3e0/0x3e0 [ 333.964122][T13126] ? do_sys_open+0x31d/0x5d0 [ 333.964143][T13126] tomoyo_file_ioctl+0x23/0x30 [ 333.964159][T13126] security_file_ioctl+0x77/0xc0 [ 333.964178][T13126] ksys_ioctl+0x57/0xd0 [ 333.964201][T13126] __x64_sys_ioctl+0x73/0xb0 [ 333.987571][T13126] do_syscall_64+0xfa/0x760 [ 333.987593][T13126] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 333.987605][T13126] RIP: 0033:0x459897 11:47:38 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1100008912, &(0x7f0000000040)="11dca50d810bcfe47bf070") r1 = syz_open_dev$usb(&(0x7f0000000200)='/dev/bus/usb/00#/00#\x00', 0x40000fffffc, 0x200000000000042) mmap$binder(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x1, 0x11, r1, 0x0) ioctl$FS_IOC_FSGETXATTR(0xffffffffffffffff, 0x8038550a, &(0x7f0000000000)={0x2, 0x0, 0x0, 0x0, 0x1000020ffd000, 0x7ff0bdbe}) [ 333.987620][T13126] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 333.987627][T13126] RSP: 002b:00007ff9d7cf6a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 333.987640][T13126] RAX: ffffffffffffffda RBX: 0000000000000010 RCX: 0000000000459897 [ 333.987652][T13126] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 333.997301][T13126] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 333.997311][T13126] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 333.997320][T13126] R13: 00000000004c8be0 R14: 00000000004dfcd8 R15: 0000000000000003 [ 334.033867][T13126] ERROR: Out of memory at tomoyo_realpath_from_path. [ 334.167747][T13126] hfsplus: unable to find HFS+ superblock [ 334.205663][T13128] IPVS: ftp: loaded support on port[0] = 21 11:47:39 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000140)='h/splus\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000a80)={[{@barrier='barrier'}, {@gid={'gid'}}, {@type={'type', 0x3d, "ae8c9d8f"}}]}) 11:47:39 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1100008912, &(0x7f0000000040)="11dca50d810bcfe47bf070") r1 = syz_open_dev$usb(&(0x7f0000000200)='/dev/bus/usb/00#/00#\x00', 0x40000fffffc, 0x200000000000042) mmap$binder(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x1, 0x11, r1, 0x0) ioctl$FS_IOC_FSGETXATTR(0xffffffffffffffff, 0x8038550a, &(0x7f0000000000)={0x2, 0x0, 0x0, 0x0, 0x1000020ffd000, 0x7ff0bdbe}) 11:47:39 executing program 0 (fault-call:0 fault-nth:19): syz_mount_image$hfsplus(&(0x7f0000000140)='hfsplus\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000a80)={[{@barrier='barrier'}, {@gid={'gid'}}, {@type={'type', 0x3d, "ae8c9d8f"}}]}) [ 334.310599][T13136] IPVS: ftp: loaded support on port[0] = 21 11:47:39 executing program 1: setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) setsockopt$netlink_NETLINK_BROADCAST_ERROR(0xffffffffffffffff, 0x10e, 0x4, 0x0, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000100)={0x0, 0x54, &(0x7f00000001c0)={&(0x7f0000000040)={0x14, 0x23, 0x1, 0x0, 0x0, {0x20000000004, 0xe00000000000000}}, 0x14}}, 0x0) [ 334.629246][T13167] FAULT_INJECTION: forcing a failure. [ 334.629246][T13167] name failslab, interval 1, probability 0, space 0, times 0 [ 334.646165][T13167] CPU: 1 PID: 13167 Comm: syz-executor.0 Not tainted 5.3.0+ #0 [ 334.653742][T13167] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 334.663782][T13167] Call Trace: [ 334.667071][T13167] dump_stack+0x172/0x1f0 [ 334.671384][T13167] should_fail.cold+0xa/0x15 [ 334.675962][T13167] ? fault_create_debugfs_attr+0x180/0x180 [ 334.681751][T13167] ? ___might_sleep+0x163/0x2c0 [ 334.686587][T13167] __should_failslab+0x121/0x190 [ 334.691506][T13167] should_failslab+0x9/0x14 [ 334.695991][T13167] kmem_cache_alloc+0x2aa/0x710 [ 334.700832][T13167] __kernfs_new_node+0xf0/0x6c0 [ 334.705665][T13167] ? _raw_spin_unlock_irq+0x28/0x90 [ 334.710849][T13167] ? kernfs_dop_revalidate+0x3c0/0x3c0 [ 334.716286][T13167] ? __kasan_check_read+0x11/0x20 [ 334.721290][T13167] ? __kasan_check_read+0x11/0x20 [ 334.726300][T13167] ? __lock_acquire+0x16f2/0x4a00 [ 334.731767][T13167] kernfs_new_node+0x96/0x120 [ 334.736428][T13167] kernfs_create_dir_ns+0x52/0x160 [ 334.741522][T13167] internal_create_group+0x7f4/0xc40 [ 334.746786][T13167] ? lock_downgrade+0x920/0x920 [ 334.751621][T13167] ? remove_files.isra.0+0x190/0x190 [ 334.756890][T13167] ? __kasan_check_write+0x14/0x20 [ 334.761976][T13167] ? up_write+0x155/0x490 [ 334.766288][T13167] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 334.772510][T13167] sysfs_create_group+0x20/0x30 [ 334.777343][T13167] loop_set_fd+0xac1/0x1020 [ 334.781829][T13167] lo_ioctl+0x1a3/0x1460 [ 334.786053][T13167] ? loop_set_fd+0x1020/0x1020 [ 334.790807][T13167] blkdev_ioctl+0xedb/0x1c20 [ 334.795382][T13167] ? blkpg_ioctl+0xa90/0xa90 [ 334.799952][T13167] ? tomoyo_execute_permission+0x4a0/0x4a0 [ 334.805746][T13167] ? ___might_sleep+0x163/0x2c0 [ 334.810578][T13167] block_ioctl+0xee/0x130 [ 334.814885][T13167] ? blkdev_fallocate+0x410/0x410 [ 334.819907][T13167] do_vfs_ioctl+0xdb6/0x13e0 [ 334.824478][T13167] ? ioctl_preallocate+0x210/0x210 [ 334.829570][T13167] ? selinux_file_mprotect+0x620/0x620 [ 334.835009][T13167] ? __fget+0x384/0x560 [ 334.839150][T13167] ? ksys_dup3+0x3e0/0x3e0 [ 334.843549][T13167] ? rcu_read_lock_sched_held+0x9c/0xd0 [ 334.849077][T13167] ? tomoyo_file_ioctl+0x23/0x30 [ 334.853995][T13167] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 334.860217][T13167] ? security_file_ioctl+0x8d/0xc0 [ 334.865329][T13167] ksys_ioctl+0xab/0xd0 [ 334.869469][T13167] __x64_sys_ioctl+0x73/0xb0 [ 334.874039][T13167] do_syscall_64+0xfa/0x760 [ 334.878526][T13167] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 334.884403][T13167] RIP: 0033:0x459897 [ 334.888288][T13167] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 334.907870][T13167] RSP: 002b:00007ff9d7cf6a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 334.916260][T13167] RAX: ffffffffffffffda RBX: 0000000000000010 RCX: 0000000000459897 11:47:39 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1100008912, &(0x7f0000000040)="11dca50d810bcfe47bf070") r1 = syz_open_dev$usb(&(0x7f0000000200)='/dev/bus/usb/00#/00#\x00', 0x40000fffffc, 0x200000000000042) mmap$binder(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x1, 0x11, r1, 0x0) ioctl$FS_IOC_FSGETXATTR(r1, 0x8038550a, 0x0) [ 334.924207][T13167] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 334.932153][T13167] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 334.940102][T13167] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 334.948051][T13167] R13: 00000000004c8be0 R14: 00000000004dfcd8 R15: 0000000000000003 [ 335.082626][T13167] hfsplus: unable to find HFS+ superblock 11:47:40 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_ATTACH(0x8, 0x0, 0x0) r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r0, &(0x7f0000000000)={{0x6, @rose}, [@rose, @rose, @default, @netrom, @bcast, @rose, @rose, @null]}, 0x48) r1 = openat$qat_adf_ctl(0xffffffffffffff9c, 0x0, 0x0, 0x0) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r1, 0x6, 0x23, 0x0, &(0x7f0000000140)) listen(r0, 0x0) unshare(0x40000000) setrlimit(0x0, 0x0) r2 = accept(r0, 0x0, 0x0) write$binfmt_elf64(r2, &(0x7f00000002c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x9, 0x8, 0x0, 0x0, 0x0, 0x4825483b35c83c0b, 0x0, 0x0, 0x40, 0x227}, [{0x4, 0x1, 0xfff, 0x0, 0x0, 0xff8000000002, 0x0, 0x7fff}], "", [[], [], []]}, 0x378) 11:47:40 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000140)='h\\splus\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000a80)={[{@barrier='barrier'}, {@gid={'gid'}}, {@type={'type', 0x3d, "ae8c9d8f"}}]}) 11:47:40 executing program 0 (fault-call:0 fault-nth:20): syz_mount_image$hfsplus(&(0x7f0000000140)='hfsplus\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000a80)={[{@barrier='barrier'}, {@gid={'gid'}}, {@type={'type', 0x3d, "ae8c9d8f"}}]}) 11:47:40 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1100008912, &(0x7f0000000040)="11dca50d810bcfe47bf070") r1 = syz_open_dev$usb(&(0x7f0000000200)='/dev/bus/usb/00#/00#\x00', 0x40000fffffc, 0x200000000000042) mmap$binder(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x1, 0x11, r1, 0x0) ioctl$FS_IOC_FSGETXATTR(r1, 0x8038550a, 0x0) 11:47:40 executing program 1: setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) setsockopt$netlink_NETLINK_BROADCAST_ERROR(0xffffffffffffffff, 0x10e, 0x4, 0x0, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000100)={0x0, 0x55, &(0x7f00000001c0)={&(0x7f0000000040)={0x14, 0x23, 0x1, 0x0, 0x0, {0x20000000004, 0xe00000000000000}}, 0x14}}, 0x0) [ 335.333754][T13185] FAULT_INJECTION: forcing a failure. [ 335.333754][T13185] name failslab, interval 1, probability 0, space 0, times 0 [ 335.355942][T13185] CPU: 1 PID: 13185 Comm: syz-executor.0 Not tainted 5.3.0+ #0 [ 335.363501][T13185] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 335.363508][T13185] Call Trace: [ 335.363529][T13185] dump_stack+0x172/0x1f0 [ 335.363555][T13185] should_fail.cold+0xa/0x15 [ 335.363577][T13185] ? fault_create_debugfs_attr+0x180/0x180 [ 335.391563][T13185] ? ___might_sleep+0x163/0x2c0 [ 335.396409][T13185] __should_failslab+0x121/0x190 [ 335.396430][T13185] should_failslab+0x9/0x14 [ 335.396447][T13185] kmem_cache_alloc+0x2aa/0x710 [ 335.396462][T13185] ? __mutex_lock+0x45d/0x13c0 [ 335.396486][T13185] __kernfs_new_node+0xf0/0x6c0 [ 335.396505][T13185] ? kernfs_dop_revalidate+0x3c0/0x3c0 [ 335.396521][T13185] ? wait_for_completion+0x440/0x440 [ 335.396543][T13185] ? mutex_unlock+0xd/0x10 [ 335.396555][T13185] ? kernfs_activate+0x192/0x1f0 [ 335.396574][T13185] kernfs_new_node+0x96/0x120 [ 335.396595][T13185] __kernfs_create_file+0x51/0x340 [ 335.396615][T13185] sysfs_add_file_mode_ns+0x222/0x560 [ 335.396639][T13185] internal_create_group+0x359/0xc40 [ 335.396665][T13185] ? remove_files.isra.0+0x190/0x190 [ 335.396682][T13185] ? __kasan_check_write+0x14/0x20 [ 335.396694][T13185] ? up_write+0x155/0x490 [ 335.396714][T13185] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 335.410958][T13185] sysfs_create_group+0x20/0x30 [ 335.410976][T13185] loop_set_fd+0xac1/0x1020 [ 335.411000][T13185] lo_ioctl+0x1a3/0x1460 [ 335.495250][T13185] ? loop_set_fd+0x1020/0x1020 [ 335.500018][T13185] blkdev_ioctl+0xedb/0x1c20 [ 335.504595][T13185] ? blkpg_ioctl+0xa90/0xa90 [ 335.509169][T13185] ? tomoyo_execute_permission+0x4a0/0x4a0 [ 335.514969][T13185] ? ___might_sleep+0x163/0x2c0 [ 335.519808][T13185] block_ioctl+0xee/0x130 [ 335.524130][T13185] ? blkdev_fallocate+0x410/0x410 [ 335.529141][T13185] do_vfs_ioctl+0xdb6/0x13e0 [ 335.533721][T13185] ? ioctl_preallocate+0x210/0x210 [ 335.538814][T13185] ? selinux_file_mprotect+0x620/0x620 [ 335.544254][T13185] ? __fget+0x384/0x560 [ 335.548396][T13185] ? ksys_dup3+0x3e0/0x3e0 [ 335.552795][T13185] ? do_sys_open+0x31d/0x5d0 [ 335.557372][T13185] ? tomoyo_file_ioctl+0x23/0x30 [ 335.562295][T13185] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 335.568515][T13185] ? security_file_ioctl+0x8d/0xc0 [ 335.573612][T13185] ksys_ioctl+0xab/0xd0 [ 335.577751][T13185] __x64_sys_ioctl+0x73/0xb0 [ 335.582324][T13185] do_syscall_64+0xfa/0x760 [ 335.586814][T13185] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 335.592683][T13185] RIP: 0033:0x459897 [ 335.596562][T13185] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 335.616148][T13185] RSP: 002b:00007ff9d7cf6a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 335.624536][T13185] RAX: ffffffffffffffda RBX: 0000000000000010 RCX: 0000000000459897 [ 335.632495][T13185] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 335.640455][T13185] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 335.648403][T13185] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 335.656354][T13185] R13: 00000000004c8be0 R14: 00000000004dfcd8 R15: 0000000000000003 [ 335.755191][T13185] hfsplus: unable to find HFS+ superblock [ 335.843830][T13199] IPVS: ftp: loaded support on port[0] = 21 11:47:42 executing program 1: setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) setsockopt$netlink_NETLINK_BROADCAST_ERROR(0xffffffffffffffff, 0x10e, 0x4, 0x0, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000100)={0x0, 0x60, &(0x7f00000001c0)={&(0x7f0000000040)={0x14, 0x23, 0x1, 0x0, 0x0, {0x20000000004, 0xe00000000000000}}, 0x14}}, 0x0) 11:47:42 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1100008912, &(0x7f0000000040)="11dca50d810bcfe47bf070") r1 = syz_open_dev$usb(&(0x7f0000000200)='/dev/bus/usb/00#/00#\x00', 0x40000fffffc, 0x200000000000042) mmap$binder(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x1, 0x11, r1, 0x0) ioctl$FS_IOC_FSGETXATTR(r1, 0x8038550a, 0x0) 11:47:42 executing program 0 (fault-call:0 fault-nth:21): syz_mount_image$hfsplus(&(0x7f0000000140)='hfsplus\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000a80)={[{@barrier='barrier'}, {@gid={'gid'}}, {@type={'type', 0x3d, "ae8c9d8f"}}]}) 11:47:42 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000140)='hf\nplus\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000a80)={[{@barrier='barrier'}, {@gid={'gid'}}, {@type={'type', 0x3d, "ae8c9d8f"}}]}) 11:47:42 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_ATTACH(0x8, 0x0, 0x0) r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r0, &(0x7f0000000000)={{0x6, @rose}, [@rose, @rose, @default, @netrom, @bcast, @rose, @rose, @null]}, 0x48) openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000080)='/dev/qat_adf_ctl\x00', 0x8200, 0x0) listen(r0, 0x0) unshare(0x40000000) setrlimit(0x0, 0x0) r1 = accept(r0, 0x0, 0x0) write$binfmt_elf64(r1, &(0x7f00000002c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x9, 0x8, 0x0, 0x0, 0x0, 0x4825483b35c83c0b, 0x0, 0x0, 0x40, 0x227}, [{0x4, 0x1, 0xfff, 0x0, 0x0, 0xff8000000002, 0x0, 0x7fff}], "", [[], [], []]}, 0x378) 11:47:42 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_ATTACH(0x8, 0x0, 0x0) r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r0, &(0x7f0000000000)={{0x6, @rose}, [@rose, @rose, @default, @netrom, @bcast, @rose, @rose, @null]}, 0x48) r1 = openat$qat_adf_ctl(0xffffffffffffff9c, 0x0, 0x0, 0x0) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r1, 0x6, 0x23, 0x0, 0x0) listen(r0, 0x0) unshare(0x40000000) setrlimit(0x0, 0x0) r2 = accept(r0, 0x0, 0x0) write$binfmt_elf64(r2, &(0x7f00000002c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x9, 0x8, 0x0, 0x0, 0x0, 0x4825483b35c83c0b, 0x0, 0x0, 0x40, 0x227}, [{0x4, 0x1, 0xfff, 0x0, 0x0, 0xff8000000002, 0x0, 0x7fff}], "", [[], [], []]}, 0x378) [ 337.653450][T13220] FAULT_INJECTION: forcing a failure. [ 337.653450][T13220] name failslab, interval 1, probability 0, space 0, times 0 [ 337.685060][T13220] CPU: 1 PID: 13220 Comm: syz-executor.0 Not tainted 5.3.0+ #0 [ 337.692638][T13220] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 337.702694][T13220] Call Trace: [ 337.705987][T13220] dump_stack+0x172/0x1f0 [ 337.710331][T13220] should_fail.cold+0xa/0x15 [ 337.714926][T13220] ? fault_create_debugfs_attr+0x180/0x180 [ 337.720738][T13220] ? ___might_sleep+0x163/0x2c0 [ 337.725594][T13220] __should_failslab+0x121/0x190 [ 337.730531][T13220] should_failslab+0x9/0x14 [ 337.735030][T13220] kmem_cache_alloc+0x2aa/0x710 [ 337.739889][T13220] __kernfs_new_node+0xf0/0x6c0 [ 337.744738][T13220] ? _raw_spin_unlock_irq+0x28/0x90 [ 337.749950][T13220] ? kernfs_dop_revalidate+0x3c0/0x3c0 [ 337.755419][T13220] ? __kasan_check_read+0x11/0x20 [ 337.760447][T13220] ? __kasan_check_read+0x11/0x20 [ 337.765477][T13220] ? __lock_acquire+0x16f2/0x4a00 [ 337.770511][T13220] kernfs_new_node+0x96/0x120 [ 337.775191][T13220] kernfs_create_dir_ns+0x52/0x160 [ 337.780308][T13220] internal_create_group+0x7f4/0xc40 [ 337.785593][T13220] ? lock_downgrade+0x920/0x920 [ 337.790449][T13220] ? remove_files.isra.0+0x190/0x190 [ 337.795739][T13220] ? __kasan_check_write+0x14/0x20 [ 337.800849][T13220] ? up_write+0x155/0x490 [ 337.805184][T13220] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 337.811442][T13220] sysfs_create_group+0x20/0x30 [ 337.816301][T13220] loop_set_fd+0xac1/0x1020 [ 337.820818][T13220] lo_ioctl+0x1a3/0x1460 [ 337.825061][T13220] ? loop_set_fd+0x1020/0x1020 [ 337.829825][T13220] blkdev_ioctl+0xedb/0x1c20 [ 337.834417][T13220] ? blkpg_ioctl+0xa90/0xa90 [ 337.839013][T13220] ? tomoyo_execute_permission+0x4a0/0x4a0 [ 337.844831][T13220] ? ___might_sleep+0x163/0x2c0 [ 337.849683][T13220] block_ioctl+0xee/0x130 [ 337.854005][T13220] ? blkdev_fallocate+0x410/0x410 [ 337.859031][T13220] do_vfs_ioctl+0xdb6/0x13e0 [ 337.863622][T13220] ? ioctl_preallocate+0x210/0x210 [ 337.868736][T13220] ? selinux_file_mprotect+0x620/0x620 [ 337.874191][T13220] ? __fget+0x384/0x560 [ 337.878357][T13220] ? ksys_dup3+0x3e0/0x3e0 [ 337.882771][T13220] ? rcu_read_lock_sched_held+0x9c/0xd0 [ 337.888320][T13220] ? tomoyo_file_ioctl+0x23/0x30 [ 337.893258][T13220] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 337.899493][T13220] ? security_file_ioctl+0x8d/0xc0 11:47:42 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1100008912, &(0x7f0000000040)="11dca50d810bcfe47bf070") r1 = syz_open_dev$usb(&(0x7f0000000200)='/dev/bus/usb/00#/00#\x00', 0x40000fffffc, 0x200000000000042) mmap$binder(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x1, 0x11, r1, 0x0) ioctl$FS_IOC_FSGETXATTR(r1, 0x8038550a, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x1000020ffd000, 0x7ff0bdbe}) [ 337.904607][T13220] ksys_ioctl+0xab/0xd0 [ 337.908764][T13220] __x64_sys_ioctl+0x73/0xb0 [ 337.913356][T13220] do_syscall_64+0xfa/0x760 [ 337.917864][T13220] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 337.923748][T13220] RIP: 0033:0x459897 [ 337.927640][T13220] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 337.947322][T13220] RSP: 002b:00007ff9d7cf6a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 337.947338][T13220] RAX: ffffffffffffffda RBX: 0000000000000010 RCX: 0000000000459897 [ 337.947347][T13220] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 337.947356][T13220] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 337.947365][T13220] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 337.947374][T13220] R13: 00000000004c8be0 R14: 00000000004dfcd8 R15: 0000000000000003 [ 338.057409][T13218] IPVS: ftp: loaded support on port[0] = 21 11:47:43 executing program 1: setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) setsockopt$netlink_NETLINK_BROADCAST_ERROR(0xffffffffffffffff, 0x10e, 0x4, 0x0, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000100)={0x0, 0x68, &(0x7f00000001c0)={&(0x7f0000000040)={0x14, 0x23, 0x1, 0x0, 0x0, {0x20000000004, 0xe00000000000000}}, 0x14}}, 0x0) [ 338.133106][T13220] hfsplus: unable to find HFS+ superblock 11:47:43 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000140)='hf#plus\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000a80)={[{@barrier='barrier'}, {@gid={'gid'}}, {@type={'type', 0x3d, "ae8c9d8f"}}]}) 11:47:43 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1100008912, &(0x7f0000000040)="11dca50d810bcfe47bf070") r1 = syz_open_dev$usb(&(0x7f0000000200)='/dev/bus/usb/00#/00#\x00', 0x40000fffffc, 0x200000000000042) mmap$binder(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x1, 0x11, r1, 0x0) ioctl$FS_IOC_FSGETXATTR(r1, 0x8038550a, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x1000020ffd000, 0x7ff0bdbe}) [ 338.308266][T13240] IPVS: ftp: loaded support on port[0] = 21 11:47:43 executing program 0 (fault-call:0 fault-nth:22): syz_mount_image$hfsplus(&(0x7f0000000140)='hfsplus\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000a80)={[{@barrier='barrier'}, {@gid={'gid'}}, {@type={'type', 0x3d, "ae8c9d8f"}}]}) 11:47:43 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1100008912, &(0x7f0000000040)="11dca50d810bcfe47bf070") r1 = syz_open_dev$usb(&(0x7f0000000200)='/dev/bus/usb/00#/00#\x00', 0x40000fffffc, 0x200000000000042) mmap$binder(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x1, 0x11, r1, 0x0) ioctl$FS_IOC_FSGETXATTR(r1, 0x8038550a, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x1000020ffd000, 0x7ff0bdbe}) 11:47:43 executing program 1: setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) setsockopt$netlink_NETLINK_BROADCAST_ERROR(0xffffffffffffffff, 0x10e, 0x4, 0x0, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000100)={0x0, 0x6c, &(0x7f00000001c0)={&(0x7f0000000040)={0x14, 0x23, 0x1, 0x0, 0x0, {0x20000000004, 0xe00000000000000}}, 0x14}}, 0x0) 11:47:43 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000140)='hf%plus\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000a80)={[{@barrier='barrier'}, {@gid={'gid'}}, {@type={'type', 0x3d, "ae8c9d8f"}}]}) 11:47:43 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_ATTACH(0x8, 0x0, 0x0) r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r0, &(0x7f0000000000)={{0x6, @rose}, [@rose, @rose, @default, @netrom, @bcast, @rose, @rose, @null]}, 0x48) listen(r0, 0x0) unshare(0x40000000) setrlimit(0x0, 0x0) r1 = accept(r0, 0x0, 0x0) write$binfmt_elf64(r1, &(0x7f00000002c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x9, 0x8, 0x0, 0x0, 0x0, 0x4825483b35c83c0b, 0x0, 0x0, 0x40, 0x227}, [{0x4, 0x1, 0xfff, 0x0, 0x0, 0xff8000000002, 0x0, 0x7fff}], "", [[], [], []]}, 0x378) [ 338.702151][T13261] FAULT_INJECTION: forcing a failure. [ 338.702151][T13261] name failslab, interval 1, probability 0, space 0, times 0 11:47:43 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1100008912, &(0x7f0000000040)="11dca50d810bcfe47bf070") r1 = syz_open_dev$usb(&(0x7f0000000200)='/dev/bus/usb/00#/00#\x00', 0x40000fffffc, 0x200000000000042) mmap$binder(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x1, 0x11, r1, 0x0) ioctl$FS_IOC_FSGETXATTR(r1, 0x8038550a, &(0x7f0000000000)={0x2, 0x0, 0x0, 0x0, 0x0, 0x7ff0bdbe}) [ 338.765705][T13261] CPU: 0 PID: 13261 Comm: syz-executor.0 Not tainted 5.3.0+ #0 [ 338.773294][T13261] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 338.783345][T13261] Call Trace: [ 338.786632][T13261] dump_stack+0x172/0x1f0 [ 338.790976][T13261] should_fail.cold+0xa/0x15 [ 338.795583][T13261] ? fault_create_debugfs_attr+0x180/0x180 [ 338.801392][T13261] ? ___might_sleep+0x163/0x2c0 [ 338.806226][T13261] __should_failslab+0x121/0x190 [ 338.811143][T13261] should_failslab+0x9/0x14 [ 338.815619][T13261] kmem_cache_alloc+0x2aa/0x710 [ 338.820446][T13261] ? kernfs_activate+0x192/0x1f0 [ 338.825360][T13261] ? __mutex_lock+0x45d/0x13c0 [ 338.830102][T13261] __kernfs_new_node+0xf0/0x6c0 [ 338.834926][T13261] ? __mutex_lock+0x45d/0x13c0 [ 338.839667][T13261] ? kernfs_dop_revalidate+0x3c0/0x3c0 [ 338.845112][T13261] ? __kasan_check_write+0x14/0x20 [ 338.850198][T13261] ? __mutex_unlock_slowpath+0xf8/0x6b0 [ 338.855721][T13261] ? wait_for_completion+0x440/0x440 [ 338.860985][T13261] kernfs_new_node+0x96/0x120 [ 338.865640][T13261] __kernfs_create_file+0x51/0x340 [ 338.870729][T13261] sysfs_add_file_mode_ns+0x222/0x560 [ 338.876083][T13261] internal_create_group+0x359/0xc40 [ 338.881357][T13261] ? remove_files.isra.0+0x190/0x190 [ 338.886618][T13261] ? __kasan_check_write+0x14/0x20 [ 338.891703][T13261] ? up_write+0x155/0x490 [ 338.896008][T13261] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 338.902226][T13261] sysfs_create_group+0x20/0x30 [ 338.907052][T13261] loop_set_fd+0xac1/0x1020 [ 338.911563][T13261] lo_ioctl+0x1a3/0x1460 [ 338.915810][T13261] ? loop_set_fd+0x1020/0x1020 [ 338.920551][T13261] blkdev_ioctl+0xedb/0x1c20 [ 338.925148][T13261] ? blkpg_ioctl+0xa90/0xa90 [ 338.929743][T13261] ? tomoyo_execute_permission+0x4a0/0x4a0 [ 338.935534][T13261] ? ___might_sleep+0x163/0x2c0 [ 338.940363][T13261] block_ioctl+0xee/0x130 [ 338.944665][T13261] ? blkdev_fallocate+0x410/0x410 [ 338.949670][T13261] do_vfs_ioctl+0xdb6/0x13e0 [ 338.954238][T13261] ? ioctl_preallocate+0x210/0x210 [ 338.959323][T13261] ? selinux_file_mprotect+0x620/0x620 [ 338.964757][T13261] ? __fget+0x384/0x560 [ 338.968892][T13261] ? ksys_dup3+0x3e0/0x3e0 [ 338.973284][T13261] ? rcu_read_lock_sched_held+0x9c/0xd0 [ 338.978807][T13261] ? tomoyo_file_ioctl+0x23/0x30 [ 338.983719][T13261] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 338.989931][T13261] ? security_file_ioctl+0x8d/0xc0 [ 338.995017][T13261] ksys_ioctl+0xab/0xd0 [ 338.999157][T13261] __x64_sys_ioctl+0x73/0xb0 [ 339.003730][T13261] do_syscall_64+0xfa/0x760 [ 339.008210][T13261] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 339.014094][T13261] RIP: 0033:0x459897 [ 339.017964][T13261] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 339.037540][T13261] RSP: 002b:00007ff9d7cf6a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 339.045927][T13261] RAX: ffffffffffffffda RBX: 0000000000000010 RCX: 0000000000459897 [ 339.053877][T13261] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 339.061822][T13261] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 339.069776][T13261] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 339.077739][T13261] R13: 00000000004c8be0 R14: 00000000004dfcd8 R15: 0000000000000003 [ 339.103886][T13261] hfsplus: unable to find HFS+ superblock 11:47:44 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1100008912, &(0x7f0000000040)="11dca50d810bcfe47bf070") r1 = syz_open_dev$usb(&(0x7f0000000200)='/dev/bus/usb/00#/00#\x00', 0x40000fffffc, 0x200000000000042) mmap$binder(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x1, 0x11, r1, 0x0) ioctl$FS_IOC_FSGETXATTR(r1, 0x8038550a, &(0x7f0000000000)={0x2, 0x0, 0x0, 0x0, 0x0, 0x7ff0bdbe}) [ 339.377355][T13282] IPVS: ftp: loaded support on port[0] = 21 11:47:45 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_ATTACH(0x8, 0x0, 0x0) r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r0, &(0x7f0000000000)={{0x6, @rose}, [@rose, @rose, @default, @netrom, @bcast, @rose, @rose, @null]}, 0x48) r1 = openat$qat_adf_ctl(0xffffffffffffff9c, 0x0, 0x0, 0x0) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r1, 0x6, 0x23, 0x0, 0x0) listen(r0, 0x0) unshare(0x40000000) setrlimit(0x0, 0x0) r2 = accept(r0, 0x0, 0x0) write$binfmt_elf64(r2, &(0x7f00000002c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x9, 0x8, 0x0, 0x0, 0x0, 0x4825483b35c83c0b, 0x0, 0x0, 0x40, 0x227}, [{0x4, 0x1, 0xfff, 0x0, 0x0, 0xff8000000002, 0x0, 0x7fff}], "", [[], [], []]}, 0x378) 11:47:45 executing program 0 (fault-call:0 fault-nth:23): syz_mount_image$hfsplus(&(0x7f0000000140)='hfsplus\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000a80)={[{@barrier='barrier'}, {@gid={'gid'}}, {@type={'type', 0x3d, "ae8c9d8f"}}]}) 11:47:45 executing program 1: setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) setsockopt$netlink_NETLINK_BROADCAST_ERROR(0xffffffffffffffff, 0x10e, 0x4, 0x0, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000100)={0x0, 0x74, &(0x7f00000001c0)={&(0x7f0000000040)={0x14, 0x23, 0x1, 0x0, 0x0, {0x20000000004, 0xe00000000000000}}, 0x14}}, 0x0) 11:47:45 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1100008912, &(0x7f0000000040)="11dca50d810bcfe47bf070") r1 = syz_open_dev$usb(&(0x7f0000000200)='/dev/bus/usb/00#/00#\x00', 0x40000fffffc, 0x200000000000042) mmap$binder(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x1, 0x11, r1, 0x0) ioctl$FS_IOC_FSGETXATTR(r1, 0x8038550a, &(0x7f0000000000)={0x2, 0x0, 0x0, 0x0, 0x0, 0x7ff0bdbe}) 11:47:45 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000140)='hf*plus\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000a80)={[{@barrier='barrier'}, {@gid={'gid'}}, {@type={'type', 0x3d, "ae8c9d8f"}}]}) 11:47:45 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_ATTACH(0x8, 0x0, 0x0) r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r0, &(0x7f0000000000)={{0x6, @rose}, [@rose, @rose, @default, @netrom, @bcast, @rose, @rose, @null]}, 0x48) listen(r0, 0x0) unshare(0x40000000) setrlimit(0x0, 0x0) r1 = accept(r0, 0x0, 0x0) write$binfmt_elf64(r1, &(0x7f00000002c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x9, 0x8, 0x0, 0x0, 0x0, 0x4825483b35c83c0b, 0x0, 0x0, 0x40, 0x227}, [{0x4, 0x1, 0xfff, 0x0, 0x0, 0xff8000000002, 0x0, 0x7fff}], "", [[], [], []]}, 0x378) [ 341.150131][T13316] FAULT_INJECTION: forcing a failure. [ 341.150131][T13316] name failslab, interval 1, probability 0, space 0, times 0 [ 341.167078][T13316] CPU: 0 PID: 13316 Comm: syz-executor.0 Not tainted 5.3.0+ #0 [ 341.174645][T13316] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 341.184698][T13316] Call Trace: [ 341.188001][T13316] dump_stack+0x172/0x1f0 [ 341.192343][T13316] should_fail.cold+0xa/0x15 [ 341.196943][T13316] ? fault_create_debugfs_attr+0x180/0x180 [ 341.202755][T13316] ? ___might_sleep+0x163/0x2c0 [ 341.202780][T13316] __should_failslab+0x121/0x190 [ 341.202802][T13316] should_failslab+0x9/0x14 [ 341.217036][T13316] kmem_cache_alloc+0x2aa/0x710 [ 341.221884][T13316] ? __mutex_lock+0x45d/0x13c0 [ 341.226672][T13316] __kernfs_new_node+0xf0/0x6c0 [ 341.231525][T13316] ? kernfs_dop_revalidate+0x3c0/0x3c0 [ 341.236980][T13316] ? wait_for_completion+0x440/0x440 [ 341.237004][T13316] ? mutex_unlock+0xd/0x10 [ 341.237020][T13316] ? kernfs_activate+0x192/0x1f0 [ 341.237040][T13316] kernfs_new_node+0x96/0x120 [ 341.237061][T13316] __kernfs_create_file+0x51/0x340 [ 341.237082][T13316] sysfs_add_file_mode_ns+0x222/0x560 [ 341.237107][T13316] internal_create_group+0x359/0xc40 [ 341.237129][T13316] ? remove_files.isra.0+0x190/0x190 [ 341.237145][T13316] ? __kasan_check_write+0x14/0x20 [ 341.237158][T13316] ? up_write+0x155/0x490 [ 341.237181][T13316] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 341.261506][T13316] sysfs_create_group+0x20/0x30 [ 341.261525][T13316] loop_set_fd+0xac1/0x1020 [ 341.261549][T13316] lo_ioctl+0x1a3/0x1460 [ 341.261574][T13316] ? loop_set_fd+0x1020/0x1020 [ 341.312179][T13316] blkdev_ioctl+0xedb/0x1c20 [ 341.316844][T13316] ? blkpg_ioctl+0xa90/0xa90 [ 341.321447][T13316] ? tomoyo_execute_permission+0x4a0/0x4a0 [ 341.323261][T13307] IPVS: ftp: loaded support on port[0] = 21 [ 341.327273][T13316] ? ___might_sleep+0x163/0x2c0 [ 341.327296][T13316] block_ioctl+0xee/0x130 [ 341.327309][T13316] ? blkdev_fallocate+0x410/0x410 [ 341.327329][T13316] do_vfs_ioctl+0xdb6/0x13e0 [ 341.327349][T13316] ? ioctl_preallocate+0x210/0x210 [ 341.327367][T13316] ? selinux_file_mprotect+0x620/0x620 [ 341.327382][T13316] ? __fget+0x384/0x560 [ 341.327405][T13316] ? ksys_dup3+0x3e0/0x3e0 [ 341.327423][T13316] ? do_sys_open+0x31d/0x5d0 [ 341.327443][T13316] ? tomoyo_file_ioctl+0x23/0x30 [ 341.380579][T13316] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 341.386824][T13316] ? security_file_ioctl+0x8d/0xc0 [ 341.391942][T13316] ksys_ioctl+0xab/0xd0 [ 341.396109][T13316] __x64_sys_ioctl+0x73/0xb0 [ 341.400707][T13316] do_syscall_64+0xfa/0x760 [ 341.405218][T13316] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 341.411120][T13316] RIP: 0033:0x459897 [ 341.415014][T13316] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 341.434619][T13316] RSP: 002b:00007ff9d7cf6a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 341.443035][T13316] RAX: ffffffffffffffda RBX: 0000000000000010 RCX: 0000000000459897 11:47:46 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_ATTACH(0x8, 0x0, 0x0) r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r0, &(0x7f0000000000)={{0x6, @rose}, [@rose, @rose, @default, @netrom, @bcast, @rose, @rose, @null]}, 0x48) r1 = openat$qat_adf_ctl(0xffffffffffffff9c, 0x0, 0x0, 0x0) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r1, 0x6, 0x23, 0x0, 0x0) listen(r0, 0x0) unshare(0x40000000) setrlimit(0x0, 0x0) r2 = accept(r0, 0x0, 0x0) write$binfmt_elf64(r2, &(0x7f00000002c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x9, 0x8, 0x0, 0x0, 0x0, 0x4825483b35c83c0b, 0x0, 0x0, 0x40, 0x227}, [{0x4, 0x1, 0xfff, 0x0, 0x0, 0xff8000000002, 0x0, 0x7fff}], "", [[], [], []]}, 0x378) [ 341.451011][T13316] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 341.458978][T13316] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 341.466943][T13316] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 341.474909][T13316] R13: 00000000004c8be0 R14: 00000000004dfcd8 R15: 0000000000000003 [ 341.596415][T13316] hfsplus: unable to find HFS+ superblock 11:47:46 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000140)='hf+plus\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000a80)={[{@barrier='barrier'}, {@gid={'gid'}}, {@type={'type', 0x3d, "ae8c9d8f"}}]}) 11:47:46 executing program 0 (fault-call:0 fault-nth:24): syz_mount_image$hfsplus(&(0x7f0000000140)='hfsplus\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000a80)={[{@barrier='barrier'}, {@gid={'gid'}}, {@type={'type', 0x3d, "ae8c9d8f"}}]}) 11:47:46 executing program 1: setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) setsockopt$netlink_NETLINK_BROADCAST_ERROR(0xffffffffffffffff, 0x10e, 0x4, 0x0, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000100)={0x0, 0x7a, &(0x7f00000001c0)={&(0x7f0000000040)={0x14, 0x23, 0x1, 0x0, 0x0, {0x20000000004, 0xe00000000000000}}, 0x14}}, 0x0) [ 341.769767][T13318] IPVS: ftp: loaded support on port[0] = 21 [ 341.799063][T13330] IPVS: ftp: loaded support on port[0] = 21 [ 341.946769][T13340] FAULT_INJECTION: forcing a failure. [ 341.946769][T13340] name failslab, interval 1, probability 0, space 0, times 0 [ 341.962231][T13340] CPU: 0 PID: 13340 Comm: syz-executor.0 Not tainted 5.3.0+ #0 [ 341.969786][T13340] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 341.969792][T13340] Call Trace: [ 341.969813][T13340] dump_stack+0x172/0x1f0 [ 341.969839][T13340] should_fail.cold+0xa/0x15 [ 341.969860][T13340] ? fault_create_debugfs_attr+0x180/0x180 [ 341.969880][T13340] ? ___might_sleep+0x163/0x2c0 [ 341.969902][T13340] __should_failslab+0x121/0x190 [ 341.983226][T13340] should_failslab+0x9/0x14 [ 341.983245][T13340] kmem_cache_alloc+0x2aa/0x710 [ 341.983258][T13340] ? __mutex_lock+0x45d/0x13c0 [ 341.983280][T13340] __kernfs_new_node+0xf0/0x6c0 [ 341.992160][T13340] ? kernfs_dop_revalidate+0x3c0/0x3c0 [ 341.992178][T13340] ? wait_for_completion+0x440/0x440 [ 341.992202][T13340] ? mutex_unlock+0xd/0x10 [ 341.992216][T13340] ? kernfs_activate+0x192/0x1f0 [ 341.992235][T13340] kernfs_new_node+0x96/0x120 [ 342.002850][T13340] __kernfs_create_file+0x51/0x340 [ 342.002872][T13340] sysfs_add_file_mode_ns+0x222/0x560 [ 342.002898][T13340] internal_create_group+0x359/0xc40 [ 342.002924][T13340] ? remove_files.isra.0+0x190/0x190 [ 342.012334][T13340] ? __kasan_check_write+0x14/0x20 [ 342.012349][T13340] ? up_write+0x155/0x490 [ 342.012368][T13340] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 342.012390][T13340] sysfs_create_group+0x20/0x30 [ 342.012408][T13340] loop_set_fd+0xac1/0x1020 [ 342.097324][T13340] lo_ioctl+0x1a3/0x1460 [ 342.101555][T13340] ? loop_set_fd+0x1020/0x1020 [ 342.106304][T13340] blkdev_ioctl+0xedb/0x1c20 [ 342.110872][T13340] ? blkpg_ioctl+0xa90/0xa90 [ 342.115448][T13340] ? tomoyo_execute_permission+0x4a0/0x4a0 [ 342.121243][T13340] ? ___might_sleep+0x163/0x2c0 [ 342.126077][T13340] block_ioctl+0xee/0x130 [ 342.130389][T13340] ? blkdev_fallocate+0x410/0x410 [ 342.135398][T13340] do_vfs_ioctl+0xdb6/0x13e0 [ 342.139974][T13340] ? ioctl_preallocate+0x210/0x210 [ 342.145064][T13340] ? selinux_file_mprotect+0x620/0x620 [ 342.150499][T13340] ? __fget+0x384/0x560 [ 342.154651][T13340] ? ksys_dup3+0x3e0/0x3e0 [ 342.159052][T13340] ? do_sys_open+0x31d/0x5d0 [ 342.163625][T13340] ? tomoyo_file_ioctl+0x23/0x30 [ 342.168543][T13340] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 342.174766][T13340] ? security_file_ioctl+0x8d/0xc0 [ 342.179860][T13340] ksys_ioctl+0xab/0xd0 [ 342.183999][T13340] __x64_sys_ioctl+0x73/0xb0 [ 342.188570][T13340] do_syscall_64+0xfa/0x760 [ 342.193060][T13340] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 342.198935][T13340] RIP: 0033:0x459897 [ 342.202809][T13340] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 342.222390][T13340] RSP: 002b:00007ff9d7cf6a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 342.230785][T13340] RAX: ffffffffffffffda RBX: 0000000000000010 RCX: 0000000000459897 [ 342.238736][T13340] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 342.246705][T13340] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 342.254659][T13340] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 342.262609][T13340] R13: 00000000004c8be0 R14: 00000000004dfcd8 R15: 0000000000000003 11:47:47 executing program 1: setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) setsockopt$netlink_NETLINK_BROADCAST_ERROR(0xffffffffffffffff, 0x10e, 0x4, 0x0, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000100)={0x0, 0xf0, &(0x7f00000001c0)={&(0x7f0000000040)={0x14, 0x23, 0x1, 0x0, 0x0, {0x20000000004, 0xe00000000000000}}, 0x14}}, 0x0) [ 342.400864][T13340] hfsplus: unable to find HFS+ superblock 11:47:47 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000140)='hf-plus\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000a80)={[{@barrier='barrier'}, {@gid={'gid'}}, {@type={'type', 0x3d, "ae8c9d8f"}}]}) 11:47:50 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_ATTACH(0x8, 0x0, 0x0) r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r0, &(0x7f0000000000)={{0x6, @rose}, [@rose, @rose, @default, @netrom, @bcast, @rose, @rose, @null]}, 0x48) r1 = openat$qat_adf_ctl(0xffffffffffffff9c, 0x0, 0x0, 0x0) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r1, 0x6, 0x23, 0x0, 0x0) listen(r0, 0x0) unshare(0x40000000) setrlimit(0x0, 0x0) r2 = accept(r0, 0x0, 0x0) write$binfmt_elf64(r2, &(0x7f00000002c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x9, 0x8, 0x0, 0x0, 0x0, 0x4825483b35c83c0b, 0x0, 0x0, 0x40, 0x227}, [{0x4, 0x1, 0xfff, 0x0, 0x0, 0xff8000000002, 0x0, 0x7fff}], "", [[], [], []]}, 0x378) 11:47:50 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_ATTACH(0x8, 0x0, 0x0) r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r0, &(0x7f0000000000)={{0x6, @rose}, [@rose, @rose, @default, @netrom, @bcast, @rose, @rose, @null]}, 0x48) openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000080)='/dev/qat_adf_ctl\x00', 0x8200, 0x0) listen(r0, 0x0) unshare(0x40000000) setrlimit(0x0, 0x0) r1 = accept(r0, 0x0, 0x0) write$binfmt_elf64(r1, &(0x7f00000002c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x9, 0x8, 0x0, 0x0, 0x0, 0x4825483b35c83c0b, 0x0, 0x0, 0x40, 0x227}, [{0x4, 0x1, 0xfff, 0x0, 0x0, 0xff8000000002, 0x0, 0x7fff}], "", [[], [], []]}, 0x378) 11:47:50 executing program 1: setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) setsockopt$netlink_NETLINK_BROADCAST_ERROR(0xffffffffffffffff, 0x10e, 0x4, 0x0, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000100)={0x0, 0xf4, &(0x7f00000001c0)={&(0x7f0000000040)={0x14, 0x23, 0x1, 0x0, 0x0, {0x20000000004, 0xe00000000000000}}, 0x14}}, 0x0) 11:47:50 executing program 0 (fault-call:0 fault-nth:25): syz_mount_image$hfsplus(&(0x7f0000000140)='hfsplus\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000a80)={[{@barrier='barrier'}, {@gid={'gid'}}, {@type={'type', 0x3d, "ae8c9d8f"}}]}) 11:47:50 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000140)='hf.plus\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000a80)={[{@barrier='barrier'}, {@gid={'gid'}}, {@type={'type', 0x3d, "ae8c9d8f"}}]}) 11:47:50 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_ATTACH(0x8, 0x0, 0x0) r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r0, &(0x7f0000000000)={{0x6, @rose}, [@rose, @rose, @default, @netrom, @bcast, @rose, @rose, @null]}, 0x48) listen(r0, 0x0) unshare(0x40000000) setrlimit(0x0, 0x0) r1 = accept(r0, 0x0, 0x0) write$binfmt_elf64(r1, &(0x7f00000002c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x9, 0x8, 0x0, 0x0, 0x0, 0x4825483b35c83c0b, 0x0, 0x0, 0x40, 0x227}, [{0x4, 0x1, 0xfff, 0x0, 0x0, 0xff8000000002, 0x0, 0x7fff}], "", [[], [], []]}, 0x378) [ 345.372760][T13379] FAULT_INJECTION: forcing a failure. [ 345.372760][T13379] name failslab, interval 1, probability 0, space 0, times 0 [ 345.421301][T13379] CPU: 0 PID: 13379 Comm: syz-executor.0 Not tainted 5.3.0+ #0 [ 345.428872][T13379] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 345.428878][T13379] Call Trace: [ 345.428899][T13379] dump_stack+0x172/0x1f0 [ 345.428927][T13379] should_fail.cold+0xa/0x15 [ 345.428949][T13379] ? fault_create_debugfs_attr+0x180/0x180 [ 345.428970][T13379] ? ___might_sleep+0x163/0x2c0 [ 345.428990][T13379] __should_failslab+0x121/0x190 [ 345.429008][T13379] should_failslab+0x9/0x14 [ 345.429025][T13379] kmem_cache_alloc+0x2aa/0x710 [ 345.429037][T13379] ? __mutex_lock+0x45d/0x13c0 [ 345.429058][T13379] __kernfs_new_node+0xf0/0x6c0 [ 345.442387][T13379] ? kernfs_dop_revalidate+0x3c0/0x3c0 [ 345.442405][T13379] ? wait_for_completion+0x440/0x440 [ 345.442430][T13379] ? mutex_unlock+0xd/0x10 [ 345.442445][T13379] ? kernfs_activate+0x192/0x1f0 [ 345.442466][T13379] kernfs_new_node+0x96/0x120 [ 345.451341][T13379] __kernfs_create_file+0x51/0x340 [ 345.451363][T13379] sysfs_add_file_mode_ns+0x222/0x560 [ 345.451388][T13379] internal_create_group+0x359/0xc40 [ 345.451416][T13379] ? remove_files.isra.0+0x190/0x190 [ 345.451434][T13379] ? __kasan_check_write+0x14/0x20 [ 345.462043][T13379] ? up_write+0x155/0x490 [ 345.462061][T13379] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 345.462085][T13379] sysfs_create_group+0x20/0x30 [ 345.462103][T13379] loop_set_fd+0xac1/0x1020 [ 345.462130][T13379] lo_ioctl+0x1a3/0x1460 [ 345.472049][T13379] ? loop_set_fd+0x1020/0x1020 [ 345.472068][T13379] blkdev_ioctl+0xedb/0x1c20 [ 345.472084][T13379] ? blkpg_ioctl+0xa90/0xa90 [ 345.472102][T13379] ? tomoyo_execute_permission+0x4a0/0x4a0 [ 345.472128][T13379] ? ___might_sleep+0x163/0x2c0 [ 345.481691][T13379] block_ioctl+0xee/0x130 [ 345.481705][T13379] ? blkdev_fallocate+0x410/0x410 [ 345.481725][T13379] do_vfs_ioctl+0xdb6/0x13e0 [ 345.481747][T13379] ? ioctl_preallocate+0x210/0x210 [ 345.481768][T13379] ? selinux_file_mprotect+0x620/0x620 [ 345.492021][T13379] ? __fget+0x384/0x560 [ 345.492045][T13379] ? ksys_dup3+0x3e0/0x3e0 [ 345.492064][T13379] ? do_sys_open+0x31d/0x5d0 [ 345.492085][T13379] ? tomoyo_file_ioctl+0x23/0x30 [ 345.492106][T13379] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 345.501770][T13379] ? security_file_ioctl+0x8d/0xc0 [ 345.501791][T13379] ksys_ioctl+0xab/0xd0 [ 345.501812][T13379] __x64_sys_ioctl+0x73/0xb0 [ 345.501832][T13379] do_syscall_64+0xfa/0x760 [ 345.501854][T13379] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 345.511418][T13379] RIP: 0033:0x459897 [ 345.511437][T13379] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 345.521865][T13379] RSP: 002b:00007ff9d7cf6a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 345.521880][T13379] RAX: ffffffffffffffda RBX: 0000000000000010 RCX: 0000000000459897 [ 345.521889][T13379] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 345.521898][T13379] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 345.521912][T13379] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 345.521920][T13379] R13: 00000000004c8be0 R14: 00000000004dfcd8 R15: 0000000000000003 [ 345.581320][T13390] IPVS: ftp: loaded support on port[0] = 21 [ 345.686234][T13392] IPVS: ftp: loaded support on port[0] = 21 [ 345.784348][T13389] IPVS: ftp: loaded support on port[0] = 21 11:47:50 executing program 1: setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) setsockopt$netlink_NETLINK_BROADCAST_ERROR(0xffffffffffffffff, 0x10e, 0x4, 0x0, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000100)={0x0, 0x300, &(0x7f00000001c0)={&(0x7f0000000040)={0x14, 0x23, 0x1, 0x0, 0x0, {0x20000000004, 0xe00000000000000}}, 0x14}}, 0x0) [ 345.915859][T13379] hfsplus: unable to find HFS+ superblock 11:47:50 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000140)='hf/plus\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000a80)={[{@barrier='barrier'}, {@gid={'gid'}}, {@type={'type', 0x3d, "ae8c9d8f"}}]}) 11:47:51 executing program 5: r0 = socket(0xa, 0x803, 0xff) setsockopt$inet6_IPV6_ADDRFORM(r0, 0x29, 0x1, &(0x7f0000000080), 0x4) 11:47:51 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_ATTACH(0x8, 0x0, 0x0) r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r0, &(0x7f0000000000)={{0x6, @rose}, [@rose, @rose, @default, @netrom, @bcast, @rose, @rose, @null]}, 0x48) r1 = openat$qat_adf_ctl(0xffffffffffffff9c, 0x0, 0x0, 0x0) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r1, 0x6, 0x23, 0x0, 0x0) listen(0xffffffffffffffff, 0x0) unshare(0x40000000) setrlimit(0x0, 0x0) r2 = accept(r0, 0x0, 0x0) write$binfmt_elf64(r2, &(0x7f00000002c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x9, 0x8, 0x0, 0x0, 0x0, 0x4825483b35c83c0b, 0x0, 0x0, 0x40, 0x227}, [{0x4, 0x1, 0xfff, 0x0, 0x0, 0xff8000000002, 0x0, 0x7fff}], "", [[], [], []]}, 0x378) 11:47:51 executing program 1: setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) setsockopt$netlink_NETLINK_BROADCAST_ERROR(0xffffffffffffffff, 0x10e, 0x4, 0x0, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000100)={0x0, 0x500, &(0x7f00000001c0)={&(0x7f0000000040)={0x14, 0x23, 0x1, 0x0, 0x0, {0x20000000004, 0xe00000000000000}}, 0x14}}, 0x0) 11:47:51 executing program 0 (fault-call:0 fault-nth:26): syz_mount_image$hfsplus(&(0x7f0000000140)='hfsplus\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000a80)={[{@barrier='barrier'}, {@gid={'gid'}}, {@type={'type', 0x3d, "ae8c9d8f"}}]}) 11:47:51 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_ATTACH(0x8, 0x0, 0x0) r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000080)='/dev/qat_adf_ctl\x00', 0x8200, 0x0) listen(r0, 0x0) unshare(0x40000000) setrlimit(0x0, 0x0) r1 = accept(r0, 0x0, 0x0) write$binfmt_elf64(r1, &(0x7f00000002c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x9, 0x8, 0x0, 0x0, 0x0, 0x4825483b35c83c0b, 0x0, 0x0, 0x40, 0x227}, [{0x4, 0x1, 0xfff, 0x0, 0x0, 0xff8000000002, 0x0, 0x7fff}], "", [[], [], []]}, 0x378) 11:47:51 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000400)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$SEG6(&(0x7f00000000c0)='SEG6\x00') ioctl$KVM_REGISTER_COALESCED_MMIO(r1, 0x4010ae67, &(0x7f00000001c0)={0x0, 0x119000}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, 0x0, 0xfefd, 0x0, 0x0, 0xfffffffffffffd9c) ioctl$KVM_NMI(r2, 0xae9a) ioctl$KVM_RUN(r2, 0xae80, 0x0) [ 346.371874][T13424] FAULT_INJECTION: forcing a failure. [ 346.371874][T13424] name failslab, interval 1, probability 0, space 0, times 0 [ 346.384904][T13424] CPU: 1 PID: 13424 Comm: syz-executor.0 Not tainted 5.3.0+ #0 [ 346.392454][T13424] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 346.402498][T13424] Call Trace: [ 346.402519][T13424] dump_stack+0x172/0x1f0 [ 346.402543][T13424] should_fail.cold+0xa/0x15 [ 346.402565][T13424] ? fault_create_debugfs_attr+0x180/0x180 [ 346.410150][T13424] ? ___might_sleep+0x163/0x2c0 [ 346.410173][T13424] __should_failslab+0x121/0x190 [ 346.410191][T13424] should_failslab+0x9/0x14 [ 346.430316][T13424] kmem_cache_alloc+0x2aa/0x710 [ 346.439618][T13424] ? __mutex_lock+0x45d/0x13c0 [ 346.444380][T13424] __kernfs_new_node+0xf0/0x6c0 [ 346.449232][T13424] ? kernfs_dop_revalidate+0x3c0/0x3c0 [ 346.449249][T13424] ? wait_for_completion+0x440/0x440 [ 346.449271][T13424] ? mutex_unlock+0xd/0x10 [ 346.449288][T13424] ? kernfs_activate+0x192/0x1f0 [ 346.459984][T13424] kernfs_new_node+0x96/0x120 [ 346.460006][T13424] __kernfs_create_file+0x51/0x340 [ 346.460027][T13424] sysfs_add_file_mode_ns+0x222/0x560 [ 346.460052][T13424] internal_create_group+0x359/0xc40 [ 346.460077][T13424] ? remove_files.isra.0+0x190/0x190 [ 346.469378][T13424] ? __kasan_check_write+0x14/0x20 [ 346.469393][T13424] ? up_write+0x155/0x490 [ 346.469408][T13424] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 346.469429][T13424] sysfs_create_group+0x20/0x30 [ 346.489796][T13424] loop_set_fd+0xac1/0x1020 [ 346.489821][T13424] lo_ioctl+0x1a3/0x1460 [ 346.489839][T13424] ? loop_set_fd+0x1020/0x1020 [ 346.489854][T13424] blkdev_ioctl+0xedb/0x1c20 [ 346.489872][T13424] ? blkpg_ioctl+0xa90/0xa90 [ 346.500241][T13424] ? tomoyo_execute_permission+0x4a0/0x4a0 [ 346.500270][T13424] ? ___might_sleep+0x163/0x2c0 [ 346.500291][T13424] block_ioctl+0xee/0x130 [ 346.500303][T13424] ? blkdev_fallocate+0x410/0x410 [ 346.500324][T13424] do_vfs_ioctl+0xdb6/0x13e0 [ 346.510859][T13424] ? ioctl_preallocate+0x210/0x210 11:47:51 executing program 1: setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) setsockopt$netlink_NETLINK_BROADCAST_ERROR(0xffffffffffffffff, 0x10e, 0x4, 0x0, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000100)={0x0, 0x600, &(0x7f00000001c0)={&(0x7f0000000040)={0x14, 0x23, 0x1, 0x0, 0x0, {0x20000000004, 0xe00000000000000}}, 0x14}}, 0x0) [ 346.510876][T13424] ? selinux_file_mprotect+0x620/0x620 [ 346.510895][T13424] ? __fget+0x384/0x560 [ 346.518678][T13431] IPVS: ftp: loaded support on port[0] = 21 [ 346.520211][T13424] ? ksys_dup3+0x3e0/0x3e0 [ 346.520233][T13424] ? rcu_read_lock_sched_held+0x9c/0xd0 [ 346.533773][T13424] ? tomoyo_file_ioctl+0x23/0x30 [ 346.533792][T13424] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 346.533810][T13424] ? security_file_ioctl+0x8d/0xc0 [ 346.544174][T13424] ksys_ioctl+0xab/0xd0 [ 346.544195][T13424] __x64_sys_ioctl+0x73/0xb0 [ 346.544216][T13424] do_syscall_64+0xfa/0x760 [ 346.553366][T13424] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 346.553383][T13424] RIP: 0033:0x459897 [ 346.553403][T13424] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 346.562962][T13424] RSP: 002b:00007ff9d7cf6a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 346.562976][T13424] RAX: ffffffffffffffda RBX: 0000000000000010 RCX: 0000000000459897 [ 346.562985][T13424] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 346.562993][T13424] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 346.563001][T13424] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 346.563014][T13424] R13: 00000000004c8be0 R14: 00000000004dfcd8 R15: 0000000000000003 [ 346.714378][T13424] hfsplus: unable to find HFS+ superblock [ 346.722923][T13433] IPVS: ftp: loaded support on port[0] = 21 11:47:51 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000140)='hf0plus\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000a80)={[{@barrier='barrier'}, {@gid={'gid'}}, {@type={'type', 0x3d, "ae8c9d8f"}}]}) [ 346.900982][T13444] kvm: emulating exchange as write 11:47:51 executing program 0 (fault-call:0 fault-nth:27): syz_mount_image$hfsplus(&(0x7f0000000140)='hfsplus\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000a80)={[{@barrier='barrier'}, {@gid={'gid'}}, {@type={'type', 0x3d, "ae8c9d8f"}}]}) 11:47:51 executing program 1: setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) setsockopt$netlink_NETLINK_BROADCAST_ERROR(0xffffffffffffffff, 0x10e, 0x4, 0x0, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000100)={0x0, 0x700, &(0x7f00000001c0)={&(0x7f0000000040)={0x14, 0x23, 0x1, 0x0, 0x0, {0x20000000004, 0xe00000000000000}}, 0x14}}, 0x0) 11:47:52 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_ATTACH(0x8, 0x0, 0x0) r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r0, &(0x7f0000000000)={{0x6, @rose}, [@rose, @rose, @default, @netrom, @bcast, @rose, @rose, @null]}, 0x48) r1 = openat$qat_adf_ctl(0xffffffffffffff9c, 0x0, 0x0, 0x0) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r1, 0x6, 0x23, 0x0, 0x0) listen(0xffffffffffffffff, 0x0) unshare(0x40000000) setrlimit(0x0, 0x0) r2 = accept(r0, 0x0, 0x0) write$binfmt_elf64(r2, &(0x7f00000002c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x9, 0x8, 0x0, 0x0, 0x0, 0x4825483b35c83c0b, 0x0, 0x0, 0x40, 0x227}, [{0x4, 0x1, 0xfff, 0x0, 0x0, 0xff8000000002, 0x0, 0x7fff}], "", [[], [], []]}, 0x378) [ 347.214918][T13459] FAULT_INJECTION: forcing a failure. [ 347.214918][T13459] name failslab, interval 1, probability 0, space 0, times 0 [ 347.248237][T13459] CPU: 1 PID: 13459 Comm: syz-executor.0 Not tainted 5.3.0+ #0 [ 347.255808][T13459] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 347.265856][T13459] Call Trace: [ 347.269192][T13459] dump_stack+0x172/0x1f0 [ 347.273528][T13459] should_fail.cold+0xa/0x15 [ 347.273550][T13459] ? fault_create_debugfs_attr+0x180/0x180 [ 347.283905][T13459] ? ___might_sleep+0x163/0x2c0 [ 347.288750][T13459] __should_failslab+0x121/0x190 [ 347.288768][T13459] should_failslab+0x9/0x14 [ 347.288788][T13459] kmem_cache_alloc_node_trace+0x274/0x750 [ 347.288808][T13459] ? rcu_read_lock_any_held.part.0+0x50/0x50 [ 347.303991][T13459] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 347.304019][T13459] __kmalloc_node_track_caller+0x3d/0x70 [ 347.321364][T13459] __kmalloc_reserve.isra.0+0x40/0xf0 [ 347.326729][T13459] __alloc_skb+0x10b/0x5e0 [ 347.331140][T13459] ? __kmalloc_reserve.isra.0+0xf0/0xf0 [ 347.331156][T13459] ? __kasan_check_read+0x11/0x20 [ 347.331182][T13459] alloc_uevent_skb+0x83/0x1e2 [ 347.341705][T13459] kobject_uevent_env+0xaa3/0x101d [ 347.351536][T13459] kobject_uevent+0x20/0x26 [ 347.351554][T13459] loop_set_fd+0xb52/0x1020 [ 347.360524][T13459] lo_ioctl+0x1a3/0x1460 11:47:52 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_ATTACH(0x8, 0x0, 0x0) r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000080)='/dev/qat_adf_ctl\x00', 0x8200, 0x0) listen(r0, 0x0) unshare(0x40000000) setrlimit(0x0, 0x0) r1 = accept(r0, 0x0, 0x0) write$binfmt_elf64(r1, &(0x7f00000002c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x9, 0x8, 0x0, 0x0, 0x0, 0x4825483b35c83c0b, 0x0, 0x0, 0x40, 0x227}, [{0x4, 0x1, 0xfff, 0x0, 0x0, 0xff8000000002, 0x0, 0x7fff}], "", [[], [], []]}, 0x378) [ 347.360543][T13459] ? loop_set_fd+0x1020/0x1020 [ 347.369514][T13459] blkdev_ioctl+0xedb/0x1c20 [ 347.369530][T13459] ? blkpg_ioctl+0xa90/0xa90 [ 347.369548][T13459] ? tomoyo_execute_permission+0x4a0/0x4a0 [ 347.369576][T13459] ? ___might_sleep+0x163/0x2c0 [ 347.378711][T13459] block_ioctl+0xee/0x130 [ 347.378724][T13459] ? blkdev_fallocate+0x410/0x410 [ 347.378743][T13459] do_vfs_ioctl+0xdb6/0x13e0 [ 347.378763][T13459] ? ioctl_preallocate+0x210/0x210 [ 347.378784][T13459] ? selinux_file_mprotect+0x620/0x620 [ 347.389396][T13459] ? __fget+0x384/0x560 [ 347.389420][T13459] ? ksys_dup3+0x3e0/0x3e0 [ 347.389438][T13459] ? rcu_read_lock_sched_held+0x9c/0xd0 [ 347.389459][T13459] ? tomoyo_file_ioctl+0x23/0x30 [ 347.398773][T13459] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 347.398790][T13459] ? security_file_ioctl+0x8d/0xc0 [ 347.398809][T13459] ksys_ioctl+0xab/0xd0 [ 347.398828][T13459] __x64_sys_ioctl+0x73/0xb0 [ 347.453016][T13459] do_syscall_64+0xfa/0x760 [ 347.457505][T13459] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 347.463373][T13459] RIP: 0033:0x459897 [ 347.467247][T13459] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 347.486874][T13459] RSP: 002b:00007ff9d7cf6a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 347.495425][T13459] RAX: ffffffffffffffda RBX: 0000000000000010 RCX: 0000000000459897 [ 347.503388][T13459] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 347.511347][T13459] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 347.519298][T13459] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 347.527255][T13459] R13: 00000000004c8be0 R14: 00000000004dfcd8 R15: 0000000000000003 [ 347.594274][T13459] hfsplus: unable to find HFS+ superblock 11:47:52 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000140)='hfXplus\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000a80)={[{@barrier='barrier'}, {@gid={'gid'}}, {@type={'type', 0x3d, "ae8c9d8f"}}]}) 11:47:52 executing program 5: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002540), 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000580), 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/mcfilter\x00') preadv(0xffffffffffffffff, &(0x7f0000000480), 0x10000000000002a1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, 0x0, 0x0) r2 = syz_open_dev$dspn(&(0x7f00000000c0)='/dev/dsp#\x00', 0x1, 0x2) ioctl$int_in(r2, 0x800000c004500a, &(0x7f0000000040)=0x10000000006) r3 = perf_event_open(&(0x7f0000000980)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$UHID_INPUT(r2, &(0x7f00000002c0)={0x8, "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", 0xa943708f26830065}, 0x1006) dup3(r3, r2, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, 0x0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(r2, 0x84, 0xf, &(0x7f00000003c0)={r4, @in={{0x2, 0x4e1e, @multicast2}}, 0xbb, 0x6, 0x0, 0x0, 0x7fff}, &(0x7f0000001400)=0x98) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, &(0x7f0000000040)={r4, @in6={{0xa, 0x4e22, 0x9, @loopback, 0x46cd}}, 0xe00, 0x0, 0x7f, 0x4, 0x100000000}, &(0x7f0000000100)=0x98) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, &(0x7f0000000040)={r4, @in6={{0xa, 0x4e20, 0x19, @rand_addr="c223e211e63ec71f52f4aa37180045d7", 0x1ff}}, 0x9, 0x10001, 0x81}, &(0x7f0000000100)=0x98) setsockopt$inet_sctp6_SCTP_AUTH_DEACTIVATE_KEY(r1, 0x84, 0x23, &(0x7f0000000100)={r4, 0x7fff}, 0x8) getsockopt$inet_sctp_SCTP_STATUS(0xffffffffffffffff, 0x84, 0xe, &(0x7f0000000000)={r4, 0x34, 0x3, 0x5, 0x4, 0x1504, 0x1, 0x101, {0x0, @in={{0x2, 0x4e23, @multicast1}}, 0x0, 0xed8a, 0xf9ab, 0x2c, 0x2}}, &(0x7f00000000c0)=0xb0) setsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r0, 0x84, 0x22, &(0x7f0000000100)={0x1f, 0x9, 0x3, 0x80, r5}, 0x10) syz_open_procfs(0x0, &(0x7f0000000140)='net/mcfilter\x00') perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff) mknod(0x0, 0x0, 0x0) r6 = openat$sequencer2(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer2\x00', 0x80800, 0x0) recvmsg$kcm(r6, &(0x7f0000000300)={&(0x7f0000000180)=@isdn, 0x80, &(0x7f0000000240)=[{&(0x7f0000000200)=""/39, 0x27}], 0x1, &(0x7f0000000280)=""/98, 0x62}, 0x100) sendto$isdn(r6, &(0x7f0000001540)=ANY=[], 0x0, 0x200c0000, &(0x7f0000000280)={0x22, 0xcb, 0x0, 0x0, 0x4}, 0x6) preadv(0xffffffffffffffff, &(0x7f0000000480), 0x10000000000002a1, 0x0) accept$inet6(0xffffffffffffffff, &(0x7f0000000200)={0xa, 0x0, 0x0, @remote}, &(0x7f0000000240)=0x1c) creat(0x0, 0x0) 11:47:52 executing program 1: setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) setsockopt$netlink_NETLINK_BROADCAST_ERROR(0xffffffffffffffff, 0x10e, 0x4, 0x0, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000100)={0x0, 0x900, &(0x7f00000001c0)={&(0x7f0000000040)={0x14, 0x23, 0x1, 0x0, 0x0, {0x20000000004, 0xe00000000000000}}, 0x14}}, 0x0) [ 347.772487][T13474] IPVS: ftp: loaded support on port[0] = 21 11:47:52 executing program 0 (fault-call:0 fault-nth:28): syz_mount_image$hfsplus(&(0x7f0000000140)='hfsplus\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000a80)={[{@barrier='barrier'}, {@gid={'gid'}}, {@type={'type', 0x3d, "ae8c9d8f"}}]}) [ 347.876475][T13472] IPVS: ftp: loaded support on port[0] = 21 [ 348.090457][T13495] FAULT_INJECTION: forcing a failure. [ 348.090457][T13495] name failslab, interval 1, probability 0, space 0, times 0 [ 348.115779][T13495] CPU: 0 PID: 13495 Comm: syz-executor.0 Not tainted 5.3.0+ #0 [ 348.123347][T13495] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 348.133399][T13495] Call Trace: [ 348.136699][T13495] dump_stack+0x172/0x1f0 [ 348.141043][T13495] should_fail.cold+0xa/0x15 [ 348.141066][T13495] ? fault_create_debugfs_attr+0x180/0x180 [ 348.141090][T13495] ? ___might_sleep+0x163/0x2c0 [ 348.156292][T13495] __should_failslab+0x121/0x190 [ 348.161225][T13495] should_failslab+0x9/0x14 [ 348.161241][T13495] __kmalloc+0x2e0/0x770 [ 348.161262][T13495] ? kobject_get_path+0xc4/0x1b0 [ 348.161281][T13495] kobject_get_path+0xc4/0x1b0 [ 348.161301][T13495] kobject_uevent_env+0x3ab/0x101d [ 348.161327][T13495] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 348.174945][T13495] kobject_uevent+0x20/0x26 [ 348.174963][T13495] loop_set_fd+0xb52/0x1020 [ 348.174987][T13495] lo_ioctl+0x1a3/0x1460 [ 348.175008][T13495] ? loop_set_fd+0x1020/0x1020 [ 348.175024][T13495] blkdev_ioctl+0xedb/0x1c20 [ 348.175040][T13495] ? blkpg_ioctl+0xa90/0xa90 [ 348.184871][T13495] ? tomoyo_execute_permission+0x4a0/0x4a0 [ 348.184899][T13495] ? ___might_sleep+0x163/0x2c0 [ 348.184920][T13495] block_ioctl+0xee/0x130 [ 348.184933][T13495] ? blkdev_fallocate+0x410/0x410 11:47:53 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000140)='hf\\plus\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000a80)={[{@barrier='barrier'}, {@gid={'gid'}}, {@type={'type', 0x3d, "ae8c9d8f"}}]}) [ 348.184952][T13495] do_vfs_ioctl+0xdb6/0x13e0 [ 348.184973][T13495] ? ioctl_preallocate+0x210/0x210 [ 348.184989][T13495] ? selinux_file_mprotect+0x620/0x620 [ 348.185001][T13495] ? __fget+0x384/0x560 [ 348.185022][T13495] ? ksys_dup3+0x3e0/0x3e0 [ 348.200201][T13495] ? rcu_read_lock_sched_held+0x9c/0xd0 [ 348.200224][T13495] ? tomoyo_file_ioctl+0x23/0x30 [ 348.200243][T13495] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 348.200258][T13495] ? security_file_ioctl+0x8d/0xc0 [ 348.200279][T13495] ksys_ioctl+0xab/0xd0 [ 348.200298][T13495] __x64_sys_ioctl+0x73/0xb0 [ 348.209257][T13495] do_syscall_64+0xfa/0x760 [ 348.209279][T13495] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 348.209291][T13495] RIP: 0033:0x459897 [ 348.209307][T13495] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 348.209315][T13495] RSP: 002b:00007ff9d7cf6a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 348.209330][T13495] RAX: ffffffffffffffda RBX: 0000000000000010 RCX: 0000000000459897 [ 348.209338][T13495] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 348.209347][T13495] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 348.209355][T13495] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 348.209364][T13495] R13: 00000000004c8be0 R14: 00000000004dfcd8 R15: 0000000000000003 [ 348.359545][T13495] hfsplus: unable to find HFS+ superblock 11:47:53 executing program 1: setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) setsockopt$netlink_NETLINK_BROADCAST_ERROR(0xffffffffffffffff, 0x10e, 0x4, 0x0, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000100)={0x0, 0xa00, &(0x7f00000001c0)={&(0x7f0000000040)={0x14, 0x23, 0x1, 0x0, 0x0, {0x20000000004, 0xe00000000000000}}, 0x14}}, 0x0) 11:47:53 executing program 0 (fault-call:0 fault-nth:29): syz_mount_image$hfsplus(&(0x7f0000000140)='hfsplus\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000a80)={[{@barrier='barrier'}, {@gid={'gid'}}, {@type={'type', 0x3d, "ae8c9d8f"}}]}) 11:47:53 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000140)='hfcplus\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000a80)={[{@barrier='barrier'}, {@gid={'gid'}}, {@type={'type', 0x3d, "ae8c9d8f"}}]}) [ 348.666771][T13513] FAULT_INJECTION: forcing a failure. [ 348.666771][T13513] name failslab, interval 1, probability 0, space 0, times 0 [ 348.698441][T13513] CPU: 0 PID: 13513 Comm: syz-executor.0 Not tainted 5.3.0+ #0 [ 348.706007][T13513] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 348.716056][T13513] Call Trace: [ 348.719352][T13513] dump_stack+0x172/0x1f0 [ 348.723689][T13513] should_fail.cold+0xa/0x15 [ 348.728310][T13513] ? fault_create_debugfs_attr+0x180/0x180 [ 348.734119][T13513] ? ___might_sleep+0x163/0x2c0 [ 348.738969][T13513] __should_failslab+0x121/0x190 [ 348.743919][T13513] should_failslab+0x9/0x14 [ 348.748429][T13513] kmem_cache_alloc_node_trace+0x274/0x750 [ 348.754250][T13513] ? rcu_read_lock_any_held.part.0+0x50/0x50 [ 348.760234][T13513] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 348.766052][T13513] __kmalloc_node_track_caller+0x3d/0x70 [ 348.771686][T13513] __kmalloc_reserve.isra.0+0x40/0xf0 [ 348.777055][T13513] __alloc_skb+0x10b/0x5e0 [ 348.781472][T13513] ? __kmalloc_reserve.isra.0+0xf0/0xf0 [ 348.787017][T13513] ? __kasan_check_read+0x11/0x20 [ 348.792042][T13513] alloc_uevent_skb+0x83/0x1e2 [ 348.796805][T13513] kobject_uevent_env+0xaa3/0x101d [ 348.801919][T13513] kobject_uevent+0x20/0x26 [ 348.806418][T13513] loop_set_fd+0xb52/0x1020 [ 348.810925][T13513] lo_ioctl+0x1a3/0x1460 [ 348.815168][T13513] ? loop_set_fd+0x1020/0x1020 [ 348.819933][T13513] blkdev_ioctl+0xedb/0x1c20 [ 348.824516][T13513] ? blkpg_ioctl+0xa90/0xa90 [ 348.829113][T13513] ? tomoyo_execute_permission+0x4a0/0x4a0 [ 348.834932][T13513] ? ___might_sleep+0x163/0x2c0 [ 348.839798][T13513] block_ioctl+0xee/0x130 [ 348.844126][T13513] ? blkdev_fallocate+0x410/0x410 [ 348.849152][T13513] do_vfs_ioctl+0xdb6/0x13e0 [ 348.853746][T13513] ? ioctl_preallocate+0x210/0x210 [ 348.858856][T13513] ? selinux_file_mprotect+0x620/0x620 [ 348.864315][T13513] ? __fget+0x384/0x560 [ 348.868477][T13513] ? ksys_dup3+0x3e0/0x3e0 [ 348.872890][T13513] ? rcu_read_lock_sched_held+0x9c/0xd0 [ 348.878438][T13513] ? tomoyo_file_ioctl+0x23/0x30 [ 348.883393][T13513] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 348.889626][T13513] ? security_file_ioctl+0x8d/0xc0 [ 348.894739][T13513] ksys_ioctl+0xab/0xd0 [ 348.898895][T13513] __x64_sys_ioctl+0x73/0xb0 [ 348.903487][T13513] do_syscall_64+0xfa/0x760 [ 348.908005][T13513] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 348.913894][T13513] RIP: 0033:0x459897 [ 348.917790][T13513] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 348.937389][T13513] RSP: 002b:00007ff9d7cf6a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 348.945796][T13513] RAX: ffffffffffffffda RBX: 0000000000000010 RCX: 0000000000459897 [ 348.953758][T13513] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 11:47:53 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000080)=0x2000000000000074, 0x470) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000040)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xa8}]}, 0x10) sendto$inet(r0, 0x0, 0x211, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @empty}, 0x10) write$binfmt_elf64(r0, &(0x7f0000000c80)=ANY=[@ANYBLOB="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"/424], 0x1a8) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x3) r1 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000000)={'veth0\x00', 0x0}) bind$packet(r1, &(0x7f0000000640)={0x11, 0x0, r2, 0x1, 0x0, 0x6, @link_local}, 0x14) bind$packet(0xffffffffffffffff, &(0x7f0000000640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x14) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f0000000140)="0800a1695e1dcfe87b1071") write$binfmt_script(r0, &(0x7f00000009c0)=ANY=[], 0x378) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000600)=0xfff, 0x4) sendto$inet(r0, &(0x7f00000012c0)="32268a927f1f6588b967481241ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0xfe6a, 0x11, 0x0, 0xfffffffffffffec9) 11:47:53 executing program 1: setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) setsockopt$netlink_NETLINK_BROADCAST_ERROR(0xffffffffffffffff, 0x10e, 0x4, 0x0, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000100)={0x0, 0xb00, &(0x7f00000001c0)={&(0x7f0000000040)={0x14, 0x23, 0x1, 0x0, 0x0, {0x20000000004, 0xe00000000000000}}, 0x14}}, 0x0) [ 348.961725][T13513] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 348.969691][T13513] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 348.977655][T13513] R13: 00000000004c8be0 R14: 00000000004dfcd8 R15: 0000000000000003 [ 349.059470][T13513] hfsplus: unable to find HFS+ superblock 11:47:56 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000140)='hfdplus\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000a80)={[{@barrier='barrier'}, {@gid={'gid'}}, {@type={'type', 0x3d, "ae8c9d8f"}}]}) 11:47:56 executing program 0 (fault-call:0 fault-nth:30): syz_mount_image$hfsplus(&(0x7f0000000140)='hfsplus\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000a80)={[{@barrier='barrier'}, {@gid={'gid'}}, {@type={'type', 0x3d, "ae8c9d8f"}}]}) 11:47:56 executing program 1: setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) setsockopt$netlink_NETLINK_BROADCAST_ERROR(0xffffffffffffffff, 0x10e, 0x4, 0x0, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000100)={0x0, 0xc00, &(0x7f00000001c0)={&(0x7f0000000040)={0x14, 0x23, 0x1, 0x0, 0x0, {0x20000000004, 0xe00000000000000}}, 0x14}}, 0x0) 11:47:56 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x17, 0x0, 0x7fff, 0x1, 0x0, 0x1}, 0x3c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={r0, 0x0, &(0x7f00000005c0)}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={r0, 0x0, &(0x7f0000000280), 0x2}, 0x20) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000640)={r0, 0x0, 0x0}, 0x18) 11:47:56 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_ATTACH(0x8, 0x0, 0x0) r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r0, &(0x7f0000000000)={{0x6, @rose}, [@rose, @rose, @default, @netrom, @bcast, @rose, @rose, @null]}, 0x48) r1 = openat$qat_adf_ctl(0xffffffffffffff9c, 0x0, 0x0, 0x0) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r1, 0x6, 0x23, 0x0, 0x0) listen(0xffffffffffffffff, 0x0) unshare(0x40000000) setrlimit(0x0, 0x0) r2 = accept(r0, 0x0, 0x0) write$binfmt_elf64(r2, &(0x7f00000002c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x9, 0x8, 0x0, 0x0, 0x0, 0x4825483b35c83c0b, 0x0, 0x0, 0x40, 0x227}, [{0x4, 0x1, 0xfff, 0x0, 0x0, 0xff8000000002, 0x0, 0x7fff}], "", [[], [], []]}, 0x378) 11:47:56 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_ATTACH(0x8, 0x0, 0x0) r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000080)='/dev/qat_adf_ctl\x00', 0x8200, 0x0) listen(r0, 0x0) unshare(0x40000000) setrlimit(0x0, 0x0) r1 = accept(r0, 0x0, 0x0) write$binfmt_elf64(r1, &(0x7f00000002c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x9, 0x8, 0x0, 0x0, 0x0, 0x4825483b35c83c0b, 0x0, 0x0, 0x40, 0x227}, [{0x4, 0x1, 0xfff, 0x0, 0x0, 0xff8000000002, 0x0, 0x7fff}], "", [[], [], []]}, 0x378) [ 351.833709][T13564] FAULT_INJECTION: forcing a failure. [ 351.833709][T13564] name failslab, interval 1, probability 0, space 0, times 0 [ 351.887368][T13564] CPU: 1 PID: 13564 Comm: syz-executor.0 Not tainted 5.3.0+ #0 [ 351.894947][T13564] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 351.904997][T13564] Call Trace: [ 351.905019][T13564] dump_stack+0x172/0x1f0 [ 351.905051][T13564] should_fail.cold+0xa/0x15 [ 351.917200][T13564] ? fault_create_debugfs_attr+0x180/0x180 [ 351.917222][T13564] ? ___might_sleep+0x163/0x2c0 [ 351.917242][T13564] __should_failslab+0x121/0x190 [ 351.917259][T13564] should_failslab+0x9/0x14 [ 351.917279][T13564] kmem_cache_alloc_node+0x268/0x740 [ 351.927890][T13564] ? find_held_lock+0x35/0x130 [ 351.927911][T13564] ? netlink_has_listeners+0x23b/0x3f0 [ 351.927934][T13564] __alloc_skb+0xd5/0x5e0 [ 351.927953][T13564] ? __kmalloc_reserve.isra.0+0xf0/0xf0 [ 351.927967][T13564] ? __kasan_check_read+0x11/0x20 [ 351.927988][T13564] alloc_uevent_skb+0x83/0x1e2 [ 351.972314][T13564] kobject_uevent_env+0xaa3/0x101d [ 351.977428][T13564] kobject_uevent+0x20/0x26 [ 351.981939][T13564] loop_set_fd+0xb52/0x1020 [ 351.986450][T13564] lo_ioctl+0x1a3/0x1460 [ 351.990682][T13564] ? loop_set_fd+0x1020/0x1020 [ 351.995435][T13564] blkdev_ioctl+0xedb/0x1c20 [ 352.000026][T13564] ? blkpg_ioctl+0xa90/0xa90 [ 352.004597][T13564] ? tomoyo_execute_permission+0x4a0/0x4a0 [ 352.010399][T13564] ? ___might_sleep+0x163/0x2c0 [ 352.015229][T13564] block_ioctl+0xee/0x130 [ 352.019534][T13564] ? blkdev_fallocate+0x410/0x410 [ 352.024553][T13564] do_vfs_ioctl+0xdb6/0x13e0 [ 352.029140][T13564] ? ioctl_preallocate+0x210/0x210 [ 352.034232][T13564] ? selinux_file_mprotect+0x620/0x620 [ 352.039681][T13564] ? __fget+0x384/0x560 [ 352.043854][T13564] ? ksys_dup3+0x3e0/0x3e0 [ 352.048251][T13564] ? do_sys_open+0x31d/0x5d0 [ 352.052830][T13564] ? tomoyo_file_ioctl+0x23/0x30 [ 352.057749][T13564] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 352.063971][T13564] ? security_file_ioctl+0x8d/0xc0 [ 352.069082][T13564] ksys_ioctl+0xab/0xd0 [ 352.073274][T13564] __x64_sys_ioctl+0x73/0xb0 [ 352.077855][T13564] do_syscall_64+0xfa/0x760 [ 352.082390][T13564] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 352.088264][T13564] RIP: 0033:0x459897 [ 352.092147][T13564] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 352.111745][T13564] RSP: 002b:00007ff9d7cf6a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 352.120136][T13564] RAX: ffffffffffffffda RBX: 0000000000000010 RCX: 0000000000459897 [ 352.128092][T13564] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 11:47:57 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x17, 0x0, 0x7fff, 0x1, 0x0, 0x1}, 0x3c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={r0, 0x0, &(0x7f00000005c0)}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={r0, 0x0, &(0x7f0000000280), 0x2}, 0x20) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000640)={r0, 0x0, 0x0}, 0x18) [ 352.136040][T13564] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 352.143990][T13564] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 352.151956][T13564] R13: 00000000004c8be0 R14: 00000000004dfcd8 R15: 0000000000000003 [ 352.189032][T13571] IPVS: ftp: loaded support on port[0] = 21 11:47:57 executing program 1: setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) setsockopt$netlink_NETLINK_BROADCAST_ERROR(0xffffffffffffffff, 0x10e, 0x4, 0x0, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000100)={0x0, 0xd00, &(0x7f00000001c0)={&(0x7f0000000040)={0x14, 0x23, 0x1, 0x0, 0x0, {0x20000000004, 0xe00000000000000}}, 0x14}}, 0x0) [ 352.255189][T13564] hfsplus: unable to find HFS+ superblock 11:47:57 executing program 0 (fault-call:0 fault-nth:31): syz_mount_image$hfsplus(&(0x7f0000000140)='hfsplus\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000a80)={[{@barrier='barrier'}, {@gid={'gid'}}, {@type={'type', 0x3d, "ae8c9d8f"}}]}) [ 352.312969][T13563] IPVS: ftp: loaded support on port[0] = 21 11:47:57 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x17, 0x0, 0x7fff, 0x1, 0x0, 0x1}, 0x3c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={r0, 0x0, &(0x7f00000005c0)}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={r0, 0x0, &(0x7f0000000280), 0x2}, 0x20) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000640)={r0, 0x0, 0x0}, 0x18) 11:47:57 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000140)='hfiplus\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000a80)={[{@barrier='barrier'}, {@gid={'gid'}}, {@type={'type', 0x3d, "ae8c9d8f"}}]}) 11:47:57 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_ATTACH(0x8, 0x0, 0x0) r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r0, &(0x7f0000000000)={{0x6, @rose}, [@rose, @rose, @default, @netrom, @bcast, @rose, @rose, @null]}, 0x48) r1 = openat$qat_adf_ctl(0xffffffffffffff9c, 0x0, 0x0, 0x0) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r1, 0x6, 0x23, 0x0, 0x0) listen(r0, 0x0) unshare(0x0) setrlimit(0x0, 0x0) r2 = accept(r0, 0x0, 0x0) write$binfmt_elf64(r2, &(0x7f00000002c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x9, 0x8, 0x0, 0x0, 0x0, 0x4825483b35c83c0b, 0x0, 0x0, 0x40, 0x227}, [{0x4, 0x1, 0xfff, 0x0, 0x0, 0xff8000000002, 0x0, 0x7fff}], "", [[], [], []]}, 0x378) [ 352.571599][T13587] FAULT_INJECTION: forcing a failure. [ 352.571599][T13587] name failslab, interval 1, probability 0, space 0, times 0 [ 352.613717][T13587] CPU: 1 PID: 13587 Comm: syz-executor.0 Not tainted 5.3.0+ #0 [ 352.621290][T13587] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 352.621296][T13587] Call Trace: [ 352.621316][T13587] dump_stack+0x172/0x1f0 [ 352.621342][T13587] should_fail.cold+0xa/0x15 [ 352.621364][T13587] ? fault_create_debugfs_attr+0x180/0x180 [ 352.639000][T13587] ? ___might_sleep+0x163/0x2c0 [ 352.639021][T13587] __should_failslab+0x121/0x190 [ 352.639039][T13587] should_failslab+0x9/0x14 [ 352.639056][T13587] kmem_cache_alloc_node_trace+0x274/0x750 [ 352.639075][T13587] ? rcu_read_lock_any_held.part.0+0x50/0x50 [ 352.675458][T13587] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 352.681256][T13587] __kmalloc_node_track_caller+0x3d/0x70 [ 352.686892][T13587] __kmalloc_reserve.isra.0+0x40/0xf0 [ 352.692259][T13587] __alloc_skb+0x10b/0x5e0 [ 352.696665][T13587] ? __kmalloc_reserve.isra.0+0xf0/0xf0 [ 352.702188][T13587] ? __kasan_check_read+0x11/0x20 [ 352.707194][T13587] alloc_uevent_skb+0x83/0x1e2 [ 352.711936][T13587] kobject_uevent_env+0xaa3/0x101d [ 352.717028][T13587] kobject_uevent+0x20/0x26 [ 352.721512][T13587] loop_set_fd+0xb52/0x1020 [ 352.725996][T13587] lo_ioctl+0x1a3/0x1460 [ 352.730221][T13587] ? loop_set_fd+0x1020/0x1020 [ 352.734960][T13587] blkdev_ioctl+0xedb/0x1c20 [ 352.739540][T13587] ? blkpg_ioctl+0xa90/0xa90 [ 352.744107][T13587] ? tomoyo_execute_permission+0x4a0/0x4a0 [ 352.749897][T13587] ? ___might_sleep+0x163/0x2c0 [ 352.754730][T13587] block_ioctl+0xee/0x130 [ 352.759032][T13587] ? blkdev_fallocate+0x410/0x410 [ 352.764036][T13587] do_vfs_ioctl+0xdb6/0x13e0 [ 352.768613][T13587] ? ioctl_preallocate+0x210/0x210 [ 352.773721][T13587] ? selinux_file_mprotect+0x620/0x620 [ 352.779154][T13587] ? __fget+0x384/0x560 [ 352.783291][T13587] ? ksys_dup3+0x3e0/0x3e0 [ 352.787694][T13587] ? rcu_read_lock_sched_held+0x9c/0xd0 [ 352.793220][T13587] ? tomoyo_file_ioctl+0x23/0x30 [ 352.798136][T13587] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 352.804352][T13587] ? security_file_ioctl+0x8d/0xc0 [ 352.809446][T13587] ksys_ioctl+0xab/0xd0 [ 352.813583][T13587] __x64_sys_ioctl+0x73/0xb0 [ 352.818158][T13587] do_syscall_64+0xfa/0x760 [ 352.822654][T13587] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 352.828530][T13587] RIP: 0033:0x459897 [ 352.832399][T13587] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 352.851979][T13587] RSP: 002b:00007ff9d7cf6a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 11:47:57 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x17, 0x0, 0x7fff, 0x1, 0x0, 0x1}, 0x3c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={r0, 0x0, &(0x7f00000005c0)}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={r0, 0x0, &(0x7f0000000280), 0x2}, 0x20) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000640)={r0, 0x0, 0x0}, 0x18) [ 352.860364][T13587] RAX: ffffffffffffffda RBX: 0000000000000010 RCX: 0000000000459897 [ 352.868311][T13587] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 352.876259][T13587] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 352.884241][T13587] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 352.892190][T13587] R13: 00000000004c8be0 R14: 00000000004dfcd8 R15: 0000000000000003 [ 352.958158][T13587] hfsplus: unable to find HFS+ superblock 11:47:58 executing program 1: setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) setsockopt$netlink_NETLINK_BROADCAST_ERROR(0xffffffffffffffff, 0x10e, 0x4, 0x0, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000100)={0x0, 0xe00, &(0x7f00000001c0)={&(0x7f0000000040)={0x14, 0x23, 0x1, 0x0, 0x0, {0x20000000004, 0xe00000000000000}}, 0x14}}, 0x0) 11:47:58 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x17, 0x0, 0x7fff, 0x1, 0x0, 0x1}, 0x3c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={r0, 0x0, &(0x7f00000005c0)}, 0x20) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000640)={r0, 0x0, 0x0}, 0x18) 11:47:58 executing program 0 (fault-call:0 fault-nth:32): syz_mount_image$hfsplus(&(0x7f0000000140)='hfsplus\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000a80)={[{@barrier='barrier'}, {@gid={'gid'}}, {@type={'type', 0x3d, "ae8c9d8f"}}]}) 11:47:58 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_ATTACH(0x8, 0x0, 0x0) r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r0, &(0x7f0000000000)={{0x6, @rose}, [@rose, @rose, @default, @netrom, @bcast, @rose, @rose, @null]}, 0x48) r1 = openat$qat_adf_ctl(0xffffffffffffff9c, 0x0, 0x0, 0x0) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r1, 0x6, 0x23, 0x0, 0x0) listen(r0, 0x0) unshare(0x0) setrlimit(0x0, 0x0) r2 = accept(r0, 0x0, 0x0) write$binfmt_elf64(r2, &(0x7f00000002c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x9, 0x8, 0x0, 0x0, 0x0, 0x4825483b35c83c0b, 0x0, 0x0, 0x40, 0x227}, [{0x4, 0x1, 0xfff, 0x0, 0x0, 0xff8000000002, 0x0, 0x7fff}], "", [[], [], []]}, 0x378) [ 353.324742][T13617] FAULT_INJECTION: forcing a failure. [ 353.324742][T13617] name failslab, interval 1, probability 0, space 0, times 0 [ 353.368288][T13617] CPU: 0 PID: 13617 Comm: syz-executor.0 Not tainted 5.3.0+ #0 [ 353.375864][T13617] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 353.385917][T13617] Call Trace: [ 353.389213][T13617] dump_stack+0x172/0x1f0 [ 353.393548][T13617] should_fail.cold+0xa/0x15 [ 353.398150][T13617] ? fault_create_debugfs_attr+0x180/0x180 [ 353.403965][T13617] ? ___might_sleep+0x163/0x2c0 [ 353.408833][T13617] __should_failslab+0x121/0x190 [ 353.413773][T13617] should_failslab+0x9/0x14 [ 353.418274][T13617] kmem_cache_alloc+0x2aa/0x710 [ 353.423135][T13617] ? refcount_dec_and_mutex_lock+0x90/0x90 [ 353.428951][T13617] ? __kmalloc_node_track_caller+0x4e/0x70 [ 353.434760][T13617] skb_clone+0x154/0x3d0 [ 353.439012][T13617] netlink_broadcast_filtered+0x8d7/0xb80 [ 353.444742][T13617] netlink_broadcast+0x3a/0x50 [ 353.449508][T13617] kobject_uevent_env+0xad4/0x101d [ 353.454631][T13617] kobject_uevent+0x20/0x26 [ 353.459146][T13617] loop_set_fd+0xb52/0x1020 [ 353.463652][T13617] lo_ioctl+0x1a3/0x1460 [ 353.467898][T13617] ? loop_set_fd+0x1020/0x1020 [ 353.472662][T13617] blkdev_ioctl+0xedb/0x1c20 [ 353.477247][T13617] ? blkpg_ioctl+0xa90/0xa90 [ 353.481837][T13617] ? tomoyo_execute_permission+0x4a0/0x4a0 [ 353.487650][T13617] ? ___might_sleep+0x163/0x2c0 [ 353.492504][T13617] block_ioctl+0xee/0x130 [ 353.496843][T13617] ? blkdev_fallocate+0x410/0x410 [ 353.501874][T13617] do_vfs_ioctl+0xdb6/0x13e0 [ 353.506469][T13617] ? ioctl_preallocate+0x210/0x210 [ 353.511583][T13617] ? selinux_file_mprotect+0x620/0x620 [ 353.517047][T13617] ? __fget+0x384/0x560 [ 353.521210][T13617] ? ksys_dup3+0x3e0/0x3e0 [ 353.525624][T13617] ? rcu_read_lock_sched_held+0x9c/0xd0 [ 353.531177][T13617] ? tomoyo_file_ioctl+0x23/0x30 [ 353.536117][T13617] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 353.542356][T13617] ? security_file_ioctl+0x8d/0xc0 [ 353.547471][T13617] ksys_ioctl+0xab/0xd0 [ 353.551629][T13617] __x64_sys_ioctl+0x73/0xb0 [ 353.556217][T13617] do_syscall_64+0xfa/0x760 [ 353.560721][T13617] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 353.566603][T13617] RIP: 0033:0x459897 [ 353.570496][T13617] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 353.590094][T13617] RSP: 002b:00007ff9d7cf6a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 353.598504][T13617] RAX: ffffffffffffffda RBX: 0000000000000010 RCX: 0000000000459897 [ 353.606470][T13617] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 353.614433][T13617] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 353.622399][T13617] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 353.630365][T13617] R13: 00000000004c8be0 R14: 00000000004dfcd8 R15: 0000000000000003 [ 353.653109][T13617] hfsplus: unable to find HFS+ superblock 11:48:01 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x17, 0x0, 0x7fff, 0x1, 0x0, 0x1}, 0x3c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={r0, 0x0, &(0x7f00000005c0)}, 0x20) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000640)={r0, 0x0, 0x0}, 0x18) 11:48:01 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000140)='hflplus\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000a80)={[{@barrier='barrier'}, {@gid={'gid'}}, {@type={'type', 0x3d, "ae8c9d8f"}}]}) 11:48:01 executing program 1: setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) setsockopt$netlink_NETLINK_BROADCAST_ERROR(0xffffffffffffffff, 0x10e, 0x4, 0x0, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000100)={0x0, 0xf00, &(0x7f00000001c0)={&(0x7f0000000040)={0x14, 0x23, 0x1, 0x0, 0x0, {0x20000000004, 0xe00000000000000}}, 0x14}}, 0x0) 11:48:01 executing program 0 (fault-call:0 fault-nth:33): syz_mount_image$hfsplus(&(0x7f0000000140)='hfsplus\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000a80)={[{@barrier='barrier'}, {@gid={'gid'}}, {@type={'type', 0x3d, "ae8c9d8f"}}]}) 11:48:01 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_ATTACH(0x8, 0x0, 0x0) connect$netrom(0xffffffffffffffff, &(0x7f0000000000)={{0x6, @rose}, [@rose, @rose, @default, @netrom, @bcast, @rose, @rose, @null]}, 0x48) openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000080)='/dev/qat_adf_ctl\x00', 0x8200, 0x0) listen(0xffffffffffffffff, 0x0) unshare(0x40000000) setrlimit(0x0, 0x0) r0 = accept(0xffffffffffffffff, 0x0, 0x0) write$binfmt_elf64(r0, &(0x7f00000002c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x9, 0x8, 0x0, 0x0, 0x0, 0x4825483b35c83c0b, 0x0, 0x0, 0x40, 0x227}, [{0x4, 0x1, 0xfff, 0x0, 0x0, 0xff8000000002, 0x0, 0x7fff}], "", [[], [], []]}, 0x378) 11:48:01 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_ATTACH(0x8, 0x0, 0x0) r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r0, &(0x7f0000000000)={{0x6, @rose}, [@rose, @rose, @default, @netrom, @bcast, @rose, @rose, @null]}, 0x48) r1 = openat$qat_adf_ctl(0xffffffffffffff9c, 0x0, 0x0, 0x0) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r1, 0x6, 0x23, 0x0, 0x0) listen(r0, 0x0) unshare(0x0) setrlimit(0x0, 0x0) r2 = accept(r0, 0x0, 0x0) write$binfmt_elf64(r2, &(0x7f00000002c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x9, 0x8, 0x0, 0x0, 0x0, 0x4825483b35c83c0b, 0x0, 0x0, 0x40, 0x227}, [{0x4, 0x1, 0xfff, 0x0, 0x0, 0xff8000000002, 0x0, 0x7fff}], "", [[], [], []]}, 0x378) [ 356.595417][T13634] FAULT_INJECTION: forcing a failure. [ 356.595417][T13634] name failslab, interval 1, probability 0, space 0, times 0 [ 356.631699][T13634] CPU: 0 PID: 13634 Comm: syz-executor.0 Not tainted 5.3.0+ #0 [ 356.639282][T13634] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 356.649342][T13634] Call Trace: [ 356.652644][T13634] dump_stack+0x172/0x1f0 [ 356.656998][T13634] should_fail.cold+0xa/0x15 [ 356.661604][T13634] ? fault_create_debugfs_attr+0x180/0x180 [ 356.667422][T13634] ? ___might_sleep+0x163/0x2c0 [ 356.672288][T13634] __should_failslab+0x121/0x190 [ 356.677235][T13634] should_failslab+0x9/0x14 [ 356.681740][T13634] kmem_cache_alloc+0x2aa/0x710 [ 356.686590][T13634] ? debug_smp_processor_id+0x3c/0x214 [ 356.692052][T13634] ? rcu_lockdep_current_cpu_online+0xe3/0x130 [ 356.698214][T13634] getname_flags+0xd6/0x5b0 [ 356.702718][T13634] ? rcu_read_lock_sched_held+0x9c/0xd0 [ 356.708265][T13634] do_mkdirat+0xa0/0x2a0 [ 356.712533][T13634] ? __ia32_sys_mknod+0xb0/0xb0 [ 356.717384][T13634] ? trace_hardirqs_on_thunk+0x1a/0x20 [ 356.722838][T13634] ? do_syscall_64+0x26/0x760 [ 356.722855][T13634] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 356.722870][T13634] ? do_syscall_64+0x26/0x760 [ 356.722884][T13634] ? lockdep_hardirqs_on+0x421/0x5e0 11:48:01 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x17, 0x0, 0x7fff, 0x1, 0x0, 0x1}, 0x3c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={r0, 0x0, &(0x7f00000005c0)}, 0x20) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000640)={r0, 0x0, 0x0}, 0x18) [ 356.722902][T13634] __x64_sys_mkdir+0x5c/0x80 [ 356.743967][T13634] do_syscall_64+0xfa/0x760 [ 356.743989][T13634] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 356.744001][T13634] RIP: 0033:0x458e47 [ 356.744013][T13634] Code: 1f 40 00 b8 5a 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 cd c3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 ad c3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 356.744026][T13634] RSP: 002b:00007ff9d7cf6a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 356.782413][T13634] RAX: ffffffffffffffda RBX: 0000000000000010 RCX: 0000000000458e47 [ 356.782423][T13634] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000200 [ 356.782432][T13634] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 356.782441][T13634] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 356.782449][T13634] R13: 00000000004c8be0 R14: 00000000004dfcd8 R15: 0000000000000003 [ 356.851598][T13644] IPVS: ftp: loaded support on port[0] = 21 11:48:01 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_ATTACH(0x8, 0x0, 0x0) r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r0, &(0x7f0000000000)={{0x6, @rose}, [@rose, @rose, @default, @netrom, @bcast, @rose, @rose, @null]}, 0x48) r1 = openat$qat_adf_ctl(0xffffffffffffff9c, 0x0, 0x0, 0x0) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r1, 0x6, 0x23, 0x0, 0x0) listen(r0, 0x0) unshare(0x40000000) setrlimit(0x0, 0x0) r2 = accept(0xffffffffffffffff, 0x0, 0x0) write$binfmt_elf64(r2, &(0x7f00000002c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x9, 0x8, 0x0, 0x0, 0x0, 0x4825483b35c83c0b, 0x0, 0x0, 0x40, 0x227}, [{0x4, 0x1, 0xfff, 0x0, 0x0, 0xff8000000002, 0x0, 0x7fff}], "", [[], [], []]}, 0x378) 11:48:01 executing program 1: setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) setsockopt$netlink_NETLINK_BROADCAST_ERROR(0xffffffffffffffff, 0x10e, 0x4, 0x0, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000100)={0x0, 0xf30, &(0x7f00000001c0)={&(0x7f0000000040)={0x14, 0x23, 0x1, 0x0, 0x0, {0x20000000004, 0xe00000000000000}}, 0x14}}, 0x0) 11:48:01 executing program 0 (fault-call:0 fault-nth:34): syz_mount_image$hfsplus(&(0x7f0000000140)='hfsplus\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000a80)={[{@barrier='barrier'}, {@gid={'gid'}}, {@type={'type', 0x3d, "ae8c9d8f"}}]}) 11:48:01 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x17, 0x0, 0x7fff, 0x1, 0x0, 0x1}, 0x3c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={r0, 0x0, &(0x7f0000000280), 0x2}, 0x20) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000640)={r0, 0x0, 0x0}, 0x18) 11:48:01 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000140)='hfoplus\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000a80)={[{@barrier='barrier'}, {@gid={'gid'}}, {@type={'type', 0x3d, "ae8c9d8f"}}]}) 11:48:02 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x17, 0x0, 0x7fff, 0x1, 0x0, 0x1}, 0x3c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={r0, 0x0, &(0x7f0000000280), 0x2}, 0x20) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000640)={r0, 0x0, 0x0}, 0x18) [ 357.098315][T13659] FAULT_INJECTION: forcing a failure. [ 357.098315][T13659] name failslab, interval 1, probability 0, space 0, times 0 [ 357.099668][T13660] IPVS: ftp: loaded support on port[0] = 21 [ 357.159518][T13659] CPU: 0 PID: 13659 Comm: syz-executor.0 Not tainted 5.3.0+ #0 [ 357.167086][T13659] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 357.177137][T13659] Call Trace: [ 357.180436][T13659] dump_stack+0x172/0x1f0 [ 357.184784][T13659] should_fail.cold+0xa/0x15 [ 357.189386][T13659] ? fault_create_debugfs_attr+0x180/0x180 [ 357.195200][T13659] ? ___might_sleep+0x163/0x2c0 [ 357.200054][T13659] __should_failslab+0x121/0x190 [ 357.204991][T13659] should_failslab+0x9/0x14 [ 357.209496][T13659] __kmalloc+0x2e0/0x770 [ 357.213739][T13659] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 357.219981][T13659] ? d_absolute_path+0x11b/0x170 [ 357.224918][T13659] ? __d_path+0x140/0x140 [ 357.229246][T13659] ? tomoyo_encode2.part.0+0xf5/0x400 [ 357.234627][T13659] tomoyo_encode2.part.0+0xf5/0x400 [ 357.239833][T13659] tomoyo_encode+0x2b/0x50 [ 357.244250][T13659] tomoyo_realpath_from_path+0x1d3/0x7b0 [ 357.249892][T13659] tomoyo_path_number_perm+0x1dd/0x520 [ 357.255361][T13659] ? tomoyo_path_number_perm+0x193/0x520 [ 357.260998][T13659] ? tomoyo_execute_permission+0x4a0/0x4a0 [ 357.266803][T13659] ? find_held_lock+0x35/0x130 [ 357.271605][T13659] ? putname+0xef/0x130 [ 357.275766][T13659] ? rcu_read_lock_sched_held+0x9c/0xd0 [ 357.281324][T13659] ? rcu_read_lock_any_held.part.0+0x50/0x50 [ 357.287304][T13659] ? trace_hardirqs_on+0x67/0x240 [ 357.292329][T13659] ? kmem_cache_free+0x26b/0x320 [ 357.297273][T13659] tomoyo_path_mkdir+0xaa/0xf0 [ 357.302033][T13659] ? tomoyo_file_ioctl+0x30/0x30 [ 357.306964][T13659] ? kern_path_mountpoint+0x40/0x40 [ 357.312160][T13659] ? strncpy_from_user+0x2b4/0x400 [ 357.317280][T13659] security_path_mkdir+0x113/0x170 [ 357.322399][T13659] do_mkdirat+0x160/0x2a0 [ 357.326733][T13659] ? __ia32_sys_mknod+0xb0/0xb0 [ 357.331600][T13659] ? trace_hardirqs_on_thunk+0x1a/0x20 [ 357.337058][T13659] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 357.343123][T13659] ? do_syscall_64+0x26/0x760 [ 357.347801][T13659] ? lockdep_hardirqs_on+0x421/0x5e0 [ 357.353092][T13659] __x64_sys_mkdir+0x5c/0x80 [ 357.357686][T13659] do_syscall_64+0xfa/0x760 [ 357.362191][T13659] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 357.368074][T13659] RIP: 0033:0x458e47 [ 357.371971][T13659] Code: 1f 40 00 b8 5a 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 cd c3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 ad c3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 357.391583][T13659] RSP: 002b:00007ff9d7cf6a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 357.399992][T13659] RAX: ffffffffffffffda RBX: 0000000000000010 RCX: 0000000000458e47 11:48:02 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_ATTACH(0x8, 0x0, 0x0) connect$netrom(0xffffffffffffffff, &(0x7f0000000000)={{0x6, @rose}, [@rose, @rose, @default, @netrom, @bcast, @rose, @rose, @null]}, 0x48) openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000080)='/dev/qat_adf_ctl\x00', 0x8200, 0x0) listen(0xffffffffffffffff, 0x0) unshare(0x40000000) setrlimit(0x0, 0x0) r0 = accept(0xffffffffffffffff, 0x0, 0x0) write$binfmt_elf64(r0, &(0x7f00000002c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x9, 0x8, 0x0, 0x0, 0x0, 0x4825483b35c83c0b, 0x0, 0x0, 0x40, 0x227}, [{0x4, 0x1, 0xfff, 0x0, 0x0, 0xff8000000002, 0x0, 0x7fff}], "", [[], [], []]}, 0x378) [ 357.407959][T13659] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000200 [ 357.415923][T13659] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 357.423890][T13659] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 357.431859][T13659] R13: 00000000004c8be0 R14: 00000000004dfcd8 R15: 0000000000000003 11:48:02 executing program 1: setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) setsockopt$netlink_NETLINK_BROADCAST_ERROR(0xffffffffffffffff, 0x10e, 0x4, 0x0, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000100)={0x0, 0x1100, &(0x7f00000001c0)={&(0x7f0000000040)={0x14, 0x23, 0x1, 0x0, 0x0, {0x20000000004, 0xe00000000000000}}, 0x14}}, 0x0) 11:48:02 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x17, 0x0, 0x7fff, 0x1, 0x0, 0x1}, 0x3c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={r0, 0x0, &(0x7f0000000280), 0x2}, 0x20) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000640)={r0, 0x0, 0x0}, 0x18) 11:48:02 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000140)='hfpplus\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000a80)={[{@barrier='barrier'}, {@gid={'gid'}}, {@type={'type', 0x3d, "ae8c9d8f"}}]}) [ 357.639802][T13673] IPVS: ftp: loaded support on port[0] = 21 11:48:02 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_ATTACH(0x8, 0x0, 0x0) r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r0, &(0x7f0000000000)={{0x6, @rose}, [@rose, @rose, @default, @netrom, @bcast, @rose, @rose, @null]}, 0x48) r1 = openat$qat_adf_ctl(0xffffffffffffff9c, 0x0, 0x0, 0x0) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r1, 0x6, 0x23, 0x0, 0x0) listen(r0, 0x0) unshare(0x40000000) setrlimit(0x0, 0x0) r2 = accept(0xffffffffffffffff, 0x0, 0x0) write$binfmt_elf64(r2, &(0x7f00000002c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x9, 0x8, 0x0, 0x0, 0x0, 0x4825483b35c83c0b, 0x0, 0x0, 0x40, 0x227}, [{0x4, 0x1, 0xfff, 0x0, 0x0, 0xff8000000002, 0x0, 0x7fff}], "", [[], [], []]}, 0x378) 11:48:02 executing program 5: bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, &(0x7f00000005c0)}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={0xffffffffffffffff, 0x0, &(0x7f0000000280), 0x2}, 0x20) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000640)={0xffffffffffffffff, 0x0, 0x0}, 0x18) 11:48:02 executing program 1: setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) setsockopt$netlink_NETLINK_BROADCAST_ERROR(0xffffffffffffffff, 0x10e, 0x4, 0x0, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000100)={0x0, 0x1200, &(0x7f00000001c0)={&(0x7f0000000040)={0x14, 0x23, 0x1, 0x0, 0x0, {0x20000000004, 0xe00000000000000}}, 0x14}}, 0x0) 11:48:02 executing program 5: bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, &(0x7f00000005c0)}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={0xffffffffffffffff, 0x0, &(0x7f0000000280), 0x2}, 0x20) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000640)={0xffffffffffffffff, 0x0, 0x0}, 0x18) [ 357.930482][T13689] IPVS: ftp: loaded support on port[0] = 21 [ 357.950329][T13659] ERROR: Out of memory at tomoyo_realpath_from_path. 11:48:03 executing program 0: syz_mount_image$hfsplus(&(0x7f0000000140)='hfsplus\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000a80)={[{@barrier='barrier'}, {@gid={'gid'}}, {@type={'type', 0x3d, "ae8c9d8f"}}]}) 11:48:03 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000140)='hfuplus\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000a80)={[{@barrier='barrier'}, {@gid={'gid'}}, {@type={'type', 0x3d, "ae8c9d8f"}}]}) 11:48:03 executing program 5: bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, &(0x7f00000005c0)}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={0xffffffffffffffff, 0x0, &(0x7f0000000280), 0x2}, 0x20) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000640)={0xffffffffffffffff, 0x0, 0x0}, 0x18) 11:48:03 executing program 1: setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) setsockopt$netlink_NETLINK_BROADCAST_ERROR(0xffffffffffffffff, 0x10e, 0x4, 0x0, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000100)={0x0, 0x1300, &(0x7f00000001c0)={&(0x7f0000000040)={0x14, 0x23, 0x1, 0x0, 0x0, {0x20000000004, 0xe00000000000000}}, 0x14}}, 0x0) 11:48:03 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_ATTACH(0x8, 0x0, 0x0) connect$netrom(0xffffffffffffffff, &(0x7f0000000000)={{0x6, @rose}, [@rose, @rose, @default, @netrom, @bcast, @rose, @rose, @null]}, 0x48) openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000080)='/dev/qat_adf_ctl\x00', 0x8200, 0x0) listen(0xffffffffffffffff, 0x0) unshare(0x40000000) setrlimit(0x0, 0x0) r0 = accept(0xffffffffffffffff, 0x0, 0x0) write$binfmt_elf64(r0, &(0x7f00000002c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x9, 0x8, 0x0, 0x0, 0x0, 0x4825483b35c83c0b, 0x0, 0x0, 0x40, 0x227}, [{0x4, 0x1, 0xfff, 0x0, 0x0, 0xff8000000002, 0x0, 0x7fff}], "", [[], [], []]}, 0x378) 11:48:03 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_ATTACH(0x8, 0x0, 0x0) r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r0, &(0x7f0000000000)={{0x6, @rose}, [@rose, @rose, @default, @netrom, @bcast, @rose, @rose, @null]}, 0x48) r1 = openat$qat_adf_ctl(0xffffffffffffff9c, 0x0, 0x0, 0x0) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r1, 0x6, 0x23, 0x0, 0x0) listen(r0, 0x0) unshare(0x40000000) setrlimit(0x0, 0x0) r2 = accept(0xffffffffffffffff, 0x0, 0x0) write$binfmt_elf64(r2, &(0x7f00000002c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x9, 0x8, 0x0, 0x0, 0x0, 0x4825483b35c83c0b, 0x0, 0x0, 0x40, 0x227}, [{0x4, 0x1, 0xfff, 0x0, 0x0, 0xff8000000002, 0x0, 0x7fff}], "", [[], [], []]}, 0x378) 11:48:03 executing program 5: r0 = bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={r0, 0x0, &(0x7f00000005c0)}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={r0, 0x0, &(0x7f0000000280), 0x2}, 0x20) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000640)={r0, 0x0, 0x0}, 0x18) [ 358.536869][T13711] IPVS: ftp: loaded support on port[0] = 21 11:48:03 executing program 1: setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) setsockopt$netlink_NETLINK_BROADCAST_ERROR(0xffffffffffffffff, 0x10e, 0x4, 0x0, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000100)={0x0, 0x1400, &(0x7f00000001c0)={&(0x7f0000000040)={0x14, 0x23, 0x1, 0x0, 0x0, {0x20000000004, 0xe00000000000000}}, 0x14}}, 0x0) 11:48:03 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000140)='hfxplus\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000a80)={[{@barrier='barrier'}, {@gid={'gid'}}, {@type={'type', 0x3d, "ae8c9d8f"}}]}) [ 358.602388][T13709] IPVS: ftp: loaded support on port[0] = 21 11:48:03 executing program 5: r0 = bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={r0, 0x0, &(0x7f00000005c0)}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={r0, 0x0, &(0x7f0000000280), 0x2}, 0x20) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000640)={r0, 0x0, 0x0}, 0x18) [ 358.696762][T13710] hfsplus: unable to find HFS+ superblock 11:48:03 executing program 5: r0 = bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={r0, 0x0, &(0x7f00000005c0)}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={r0, 0x0, &(0x7f0000000280), 0x2}, 0x20) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000640)={r0, 0x0, 0x0}, 0x18) 11:48:03 executing program 0: syz_mount_image$hfsplus(&(0x7f0000000140)='\nfsplus\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000a80)={[{@barrier='barrier'}, {@gid={'gid'}}, {@type={'type', 0x3d, "ae8c9d8f"}}]}) 11:48:03 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_ATTACH(0x8, 0x0, 0x0) r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r0, &(0x7f0000000000)={{0x6, @rose}, [@rose, @rose, @default, @netrom, @bcast, @rose, @rose, @null]}, 0x48) r1 = openat$qat_adf_ctl(0xffffffffffffff9c, 0x0, 0x0, 0x0) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r1, 0x6, 0x23, 0x0, 0x0) listen(r0, 0x0) unshare(0x40000000) setrlimit(0x0, 0x0) accept(r0, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000002c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x9, 0x8, 0x0, 0x0, 0x0, 0x4825483b35c83c0b, 0x0, 0x0, 0x40, 0x227}, [{0x4, 0x1, 0xfff, 0x0, 0x0, 0xff8000000002, 0x0, 0x7fff}], "", [[], [], []]}, 0x378) 11:48:03 executing program 1: setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) setsockopt$netlink_NETLINK_BROADCAST_ERROR(0xffffffffffffffff, 0x10e, 0x4, 0x0, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000100)={0x0, 0x1500, &(0x7f00000001c0)={&(0x7f0000000040)={0x14, 0x23, 0x1, 0x0, 0x0, {0x20000000004, 0xe00000000000000}}, 0x14}}, 0x0) 11:48:03 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x0, 0x0, 0x7fff, 0x1, 0x0, 0x1}, 0x3c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={r0, 0x0, &(0x7f00000005c0)}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={r0, 0x0, &(0x7f0000000280), 0x2}, 0x20) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000640)={r0, 0x0, 0x0}, 0x18) 11:48:03 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000140)='hfs\nlus\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000a80)={[{@barrier='barrier'}, {@gid={'gid'}}, {@type={'type', 0x3d, "ae8c9d8f"}}]}) [ 359.100942][T13740] IPVS: ftp: loaded support on port[0] = 21 11:48:07 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r0, &(0x7f0000000000)={{0x6, @rose}, [@rose, @rose, @default, @netrom, @bcast, @rose, @rose, @null]}, 0x48) openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000080)='/dev/qat_adf_ctl\x00', 0x8200, 0x0) listen(r0, 0x0) unshare(0x40000000) setrlimit(0x0, 0x0) r1 = accept(r0, 0x0, 0x0) write$binfmt_elf64(r1, &(0x7f00000002c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x9, 0x8, 0x0, 0x0, 0x0, 0x4825483b35c83c0b, 0x0, 0x0, 0x40, 0x227}, [{0x4, 0x1, 0xfff, 0x0, 0x0, 0xff8000000002, 0x0, 0x7fff}], "", [[], [], []]}, 0x378) 11:48:07 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x0, 0x0, 0x7fff, 0x1, 0x0, 0x1}, 0x3c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={r0, 0x0, &(0x7f00000005c0)}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={r0, 0x0, &(0x7f0000000280), 0x2}, 0x20) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000640)={r0, 0x0, 0x0}, 0x18) 11:48:07 executing program 0: syz_mount_image$hfsplus(&(0x7f0000000140)='%fsplus\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000a80)={[{@barrier='barrier'}, {@gid={'gid'}}, {@type={'type', 0x3d, "ae8c9d8f"}}]}) 11:48:07 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_ATTACH(0x8, 0x0, 0x0) r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r0, &(0x7f0000000000)={{0x6, @rose}, [@rose, @rose, @default, @netrom, @bcast, @rose, @rose, @null]}, 0x48) r1 = openat$qat_adf_ctl(0xffffffffffffff9c, 0x0, 0x0, 0x0) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r1, 0x6, 0x23, 0x0, 0x0) listen(r0, 0x0) unshare(0x40000000) setrlimit(0x0, 0x0) accept(r0, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000002c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x9, 0x8, 0x0, 0x0, 0x0, 0x4825483b35c83c0b, 0x0, 0x0, 0x40, 0x227}, [{0x4, 0x1, 0xfff, 0x0, 0x0, 0xff8000000002, 0x0, 0x7fff}], "", [[], [], []]}, 0x378) 11:48:07 executing program 1: setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) setsockopt$netlink_NETLINK_BROADCAST_ERROR(0xffffffffffffffff, 0x10e, 0x4, 0x0, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000100)={0x0, 0x1600, &(0x7f00000001c0)={&(0x7f0000000040)={0x14, 0x23, 0x1, 0x0, 0x0, {0x20000000004, 0xe00000000000000}}, 0x14}}, 0x0) 11:48:07 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000140)='hfs\"lus\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000a80)={[{@barrier='barrier'}, {@gid={'gid'}}, {@type={'type', 0x3d, "ae8c9d8f"}}]}) 11:48:07 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x0, 0x0, 0x7fff, 0x1, 0x0, 0x1}, 0x3c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={r0, 0x0, &(0x7f00000005c0)}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={r0, 0x0, &(0x7f0000000280), 0x2}, 0x20) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000640)={r0, 0x0, 0x0}, 0x18) [ 362.357883][T13775] IPVS: ftp: loaded support on port[0] = 21 [ 362.371363][T13776] IPVS: ftp: loaded support on port[0] = 21 11:48:07 executing program 0: syz_mount_image$hfsplus(&(0x7f0000000140)='\\fsplus\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000a80)={[{@barrier='barrier'}, {@gid={'gid'}}, {@type={'type', 0x3d, "ae8c9d8f"}}]}) 11:48:07 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x17, 0x0, 0x0, 0x1, 0x0, 0x1}, 0x3c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={r0, 0x0, &(0x7f00000005c0)}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={r0, 0x0, &(0x7f0000000280), 0x2}, 0x20) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000640)={r0, 0x0, 0x0}, 0x18) 11:48:07 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000140)='hfs#lus\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000a80)={[{@barrier='barrier'}, {@gid={'gid'}}, {@type={'type', 0x3d, "ae8c9d8f"}}]}) 11:48:07 executing program 1: setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) setsockopt$netlink_NETLINK_BROADCAST_ERROR(0xffffffffffffffff, 0x10e, 0x4, 0x0, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000100)={0x0, 0x1700, &(0x7f00000001c0)={&(0x7f0000000040)={0x14, 0x23, 0x1, 0x0, 0x0, {0x20000000004, 0xe00000000000000}}, 0x14}}, 0x0) 11:48:07 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x17, 0x0, 0x0, 0x1, 0x0, 0x1}, 0x3c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={r0, 0x0, &(0x7f00000005c0)}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={r0, 0x0, &(0x7f0000000280), 0x2}, 0x20) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000640)={r0, 0x0, 0x0}, 0x18) 11:48:07 executing program 4: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r0, &(0x7f0000000000)={{0x6, @rose}, [@rose, @rose, @default, @netrom, @bcast, @rose, @rose, @null]}, 0x48) openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000080)='/dev/qat_adf_ctl\x00', 0x8200, 0x0) listen(r0, 0x0) unshare(0x40000000) setrlimit(0x0, 0x0) r1 = accept(r0, 0x0, 0x0) write$binfmt_elf64(r1, &(0x7f00000002c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x9, 0x8, 0x0, 0x0, 0x0, 0x4825483b35c83c0b, 0x0, 0x0, 0x40, 0x227}, [{0x4, 0x1, 0xfff, 0x0, 0x0, 0xff8000000002, 0x0, 0x7fff}], "", [[], [], []]}, 0x378) 11:48:07 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x17, 0x0, 0x0, 0x1, 0x0, 0x1}, 0x3c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={r0, 0x0, &(0x7f00000005c0)}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={r0, 0x0, &(0x7f0000000280), 0x2}, 0x20) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000640)={r0, 0x0, 0x0}, 0x18) 11:48:07 executing program 0: syz_mount_image$hfsplus(&(0x7f0000000140)='h\nsplus\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000a80)={[{@barrier='barrier'}, {@gid={'gid'}}, {@type={'type', 0x3d, "ae8c9d8f"}}]}) [ 362.908421][T13806] IPVS: ftp: loaded support on port[0] = 21 11:48:08 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_ATTACH(0x8, 0x0, 0x0) r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r0, &(0x7f0000000000)={{0x6, @rose}, [@rose, @rose, @default, @netrom, @bcast, @rose, @rose, @null]}, 0x48) r1 = openat$qat_adf_ctl(0xffffffffffffff9c, 0x0, 0x0, 0x0) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r1, 0x6, 0x23, 0x0, 0x0) listen(r0, 0x0) unshare(0x40000000) setrlimit(0x0, 0x0) accept(r0, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000002c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x9, 0x8, 0x0, 0x0, 0x0, 0x4825483b35c83c0b, 0x0, 0x0, 0x40, 0x227}, [{0x4, 0x1, 0xfff, 0x0, 0x0, 0xff8000000002, 0x0, 0x7fff}], "", [[], [], []]}, 0x378) 11:48:08 executing program 1: setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) setsockopt$netlink_NETLINK_BROADCAST_ERROR(0xffffffffffffffff, 0x10e, 0x4, 0x0, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000100)={0x0, 0x1800, &(0x7f00000001c0)={&(0x7f0000000040)={0x14, 0x23, 0x1, 0x0, 0x0, {0x20000000004, 0xe00000000000000}}, 0x14}}, 0x0) 11:48:08 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000140)='hfs%lus\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000a80)={[{@barrier='barrier'}, {@gid={'gid'}}, {@type={'type', 0x3d, "ae8c9d8f"}}]}) 11:48:08 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x17, 0x0, 0x7fff, 0x0, 0x0, 0x1}, 0x3c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={r0, 0x0, &(0x7f00000005c0)}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={r0, 0x0, &(0x7f0000000280), 0x2}, 0x20) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000640)={r0, 0x0, 0x0}, 0x18) 11:48:08 executing program 0: syz_mount_image$hfsplus(&(0x7f0000000140)='h%splus\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000a80)={[{@barrier='barrier'}, {@gid={'gid'}}, {@type={'type', 0x3d, "ae8c9d8f"}}]}) 11:48:08 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x17, 0x0, 0x7fff, 0x0, 0x0, 0x1}, 0x3c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={r0, 0x0, &(0x7f00000005c0)}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={r0, 0x0, &(0x7f0000000280), 0x2}, 0x20) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000640)={r0, 0x0, 0x0}, 0x18) [ 363.245374][T13825] IPVS: ftp: loaded support on port[0] = 21 11:48:08 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x17, 0x0, 0x7fff, 0x0, 0x0, 0x1}, 0x3c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={r0, 0x0, &(0x7f00000005c0)}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={r0, 0x0, &(0x7f0000000280), 0x2}, 0x20) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000640)={r0, 0x0, 0x0}, 0x18) 11:48:08 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000140)='hfs*lus\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000a80)={[{@barrier='barrier'}, {@gid={'gid'}}, {@type={'type', 0x3d, "ae8c9d8f"}}]}) 11:48:08 executing program 1: setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) setsockopt$netlink_NETLINK_BROADCAST_ERROR(0xffffffffffffffff, 0x10e, 0x4, 0x0, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000100)={0x0, 0x1900, &(0x7f00000001c0)={&(0x7f0000000040)={0x14, 0x23, 0x1, 0x0, 0x0, {0x20000000004, 0xe00000000000000}}, 0x14}}, 0x0) 11:48:08 executing program 4: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r0, &(0x7f0000000000)={{0x6, @rose}, [@rose, @rose, @default, @netrom, @bcast, @rose, @rose, @null]}, 0x48) openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000080)='/dev/qat_adf_ctl\x00', 0x8200, 0x0) listen(r0, 0x0) unshare(0x40000000) setrlimit(0x0, 0x0) r1 = accept(r0, 0x0, 0x0) write$binfmt_elf64(r1, &(0x7f00000002c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x9, 0x8, 0x0, 0x0, 0x0, 0x4825483b35c83c0b, 0x0, 0x0, 0x40, 0x227}, [{0x4, 0x1, 0xfff, 0x0, 0x0, 0xff8000000002, 0x0, 0x7fff}], "", [[], [], []]}, 0x378) 11:48:08 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_ATTACH(0x8, 0x0, 0x0) r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r0, &(0x7f0000000000)={{0x6, @rose}, [@rose, @rose, @default, @netrom, @bcast, @rose, @rose, @null]}, 0x48) r1 = openat$qat_adf_ctl(0xffffffffffffff9c, 0x0, 0x0, 0x0) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r1, 0x6, 0x23, 0x0, 0x0) listen(r0, 0x0) unshare(0x40000000) setrlimit(0x0, 0x0) r2 = accept(r0, 0x0, 0x0) write$binfmt_elf64(r2, 0x0, 0x0) 11:48:08 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x17, 0x0, 0x7fff, 0x1, 0x0, 0x1}, 0x3c) bpf$MAP_UPDATE_ELEM(0x2, 0x0, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={r0, 0x0, &(0x7f0000000280), 0x2}, 0x20) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000640)={r0, 0x0, 0x0}, 0x18) 11:48:08 executing program 0: syz_mount_image$hfsplus(&(0x7f0000000140)='h.splus\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000a80)={[{@barrier='barrier'}, {@gid={'gid'}}, {@type={'type', 0x3d, "ae8c9d8f"}}]}) 11:48:08 executing program 1: setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) setsockopt$netlink_NETLINK_BROADCAST_ERROR(0xffffffffffffffff, 0x10e, 0x4, 0x0, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000100)={0x0, 0x1a00, &(0x7f00000001c0)={&(0x7f0000000040)={0x14, 0x23, 0x1, 0x0, 0x0, {0x20000000004, 0xe00000000000000}}, 0x14}}, 0x0) 11:48:08 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000140)='hfs+lus\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000a80)={[{@barrier='barrier'}, {@gid={'gid'}}, {@type={'type', 0x3d, "ae8c9d8f"}}]}) 11:48:08 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x17, 0x0, 0x7fff, 0x1, 0x0, 0x1}, 0x3c) bpf$MAP_UPDATE_ELEM(0x2, 0x0, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={r0, 0x0, &(0x7f0000000280), 0x2}, 0x20) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000640)={r0, 0x0, 0x0}, 0x18) [ 363.771897][T13858] IPVS: ftp: loaded support on port[0] = 21 [ 363.843842][T13864] IPVS: ftp: loaded support on port[0] = 21 11:48:08 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x17, 0x0, 0x7fff, 0x1, 0x0, 0x1}, 0x3c) bpf$MAP_UPDATE_ELEM(0x2, 0x0, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={r0, 0x0, &(0x7f0000000280), 0x2}, 0x20) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000640)={r0, 0x0, 0x0}, 0x18) 11:48:08 executing program 0: syz_mount_image$hfsplus(&(0x7f0000000140)='h/splus\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000a80)={[{@barrier='barrier'}, {@gid={'gid'}}, {@type={'type', 0x3d, "ae8c9d8f"}}]}) 11:48:08 executing program 1: setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) setsockopt$netlink_NETLINK_BROADCAST_ERROR(0xffffffffffffffff, 0x10e, 0x4, 0x0, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000100)={0x0, 0x1b00, &(0x7f00000001c0)={&(0x7f0000000040)={0x14, 0x23, 0x1, 0x0, 0x0, {0x20000000004, 0xe00000000000000}}, 0x14}}, 0x0) 11:48:09 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000140)='hfs,lus\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000a80)={[{@barrier='barrier'}, {@gid={'gid'}}, {@type={'type', 0x3d, "ae8c9d8f"}}]}) 11:48:09 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x17, 0x0, 0x7fff, 0x1, 0x0, 0x1}, 0x3c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, &(0x7f00000005c0)}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={r0, 0x0, &(0x7f0000000280), 0x2}, 0x20) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000640)={r0, 0x0, 0x0}, 0x18) 11:48:09 executing program 4: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r0, &(0x7f0000000000)={{0x6, @rose}, [@rose, @rose, @default, @netrom, @bcast, @rose, @rose, @null]}, 0x48) openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000080)='/dev/qat_adf_ctl\x00', 0x8200, 0x0) listen(r0, 0x0) unshare(0x40000000) setrlimit(0x0, 0x0) r1 = accept(r0, 0x0, 0x0) write$binfmt_elf64(r1, &(0x7f00000002c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x9, 0x8, 0x0, 0x0, 0x0, 0x4825483b35c83c0b, 0x0, 0x0, 0x40, 0x227}, [{0x4, 0x1, 0xfff, 0x0, 0x0, 0xff8000000002, 0x0, 0x7fff}], "", [[], [], []]}, 0x378) 11:48:09 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_ATTACH(0x8, 0x0, 0x0) r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r0, &(0x7f0000000000)={{0x6, @rose}, [@rose, @rose, @default, @netrom, @bcast, @rose, @rose, @null]}, 0x48) r1 = openat$qat_adf_ctl(0xffffffffffffff9c, 0x0, 0x0, 0x0) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r1, 0x6, 0x23, 0x0, 0x0) listen(r0, 0x0) unshare(0x40000000) setrlimit(0x0, 0x0) r2 = accept(r0, 0x0, 0x0) write$binfmt_elf64(r2, 0x0, 0x0) 11:48:09 executing program 1: setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) setsockopt$netlink_NETLINK_BROADCAST_ERROR(0xffffffffffffffff, 0x10e, 0x4, 0x0, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000100)={0x0, 0x1c00, &(0x7f00000001c0)={&(0x7f0000000040)={0x14, 0x23, 0x1, 0x0, 0x0, {0x20000000004, 0xe00000000000000}}, 0x14}}, 0x0) 11:48:09 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x17, 0x0, 0x7fff, 0x1, 0x0, 0x1}, 0x3c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, &(0x7f00000005c0)}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={r0, 0x0, &(0x7f0000000280), 0x2}, 0x20) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000640)={r0, 0x0, 0x0}, 0x18) 11:48:09 executing program 0: syz_mount_image$hfsplus(&(0x7f0000000140)='h\\splus\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000a80)={[{@barrier='barrier'}, {@gid={'gid'}}, {@type={'type', 0x3d, "ae8c9d8f"}}]}) 11:48:09 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000140)='hfs-lus\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000a80)={[{@barrier='barrier'}, {@gid={'gid'}}, {@type={'type', 0x3d, "ae8c9d8f"}}]}) 11:48:09 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x17, 0x0, 0x7fff, 0x1, 0x0, 0x1}, 0x3c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, &(0x7f00000005c0)}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={r0, 0x0, &(0x7f0000000280), 0x2}, 0x20) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000640)={r0, 0x0, 0x0}, 0x18) [ 364.611692][T13903] IPVS: ftp: loaded support on port[0] = 21 11:48:09 executing program 1: setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) setsockopt$netlink_NETLINK_BROADCAST_ERROR(0xffffffffffffffff, 0x10e, 0x4, 0x0, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000100)={0x0, 0x1d00, &(0x7f00000001c0)={&(0x7f0000000040)={0x14, 0x23, 0x1, 0x0, 0x0, {0x20000000004, 0xe00000000000000}}, 0x14}}, 0x0) [ 364.720163][T13916] IPVS: ftp: loaded support on port[0] = 21 11:48:09 executing program 0: syz_mount_image$hfsplus(&(0x7f0000000140)='hf\nplus\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000a80)={[{@barrier='barrier'}, {@gid={'gid'}}, {@type={'type', 0x3d, "ae8c9d8f"}}]}) 11:48:09 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x17, 0x0, 0x7fff, 0x1, 0x0, 0x1}, 0x3c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={r0, 0x0, 0x0}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={r0, 0x0, &(0x7f0000000280), 0x2}, 0x20) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000640)={r0, 0x0, 0x0}, 0x18) 11:48:09 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000140)='hfs.lus\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000a80)={[{@barrier='barrier'}, {@gid={'gid'}}, {@type={'type', 0x3d, "ae8c9d8f"}}]}) 11:48:10 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x17, 0x0, 0x7fff, 0x1, 0x0, 0x1}, 0x3c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={r0, 0x0, 0x0}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={r0, 0x0, &(0x7f0000000280), 0x2}, 0x20) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000640)={r0, 0x0, 0x0}, 0x18) 11:48:10 executing program 4: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r0, &(0x7f0000000000)={{0x6, @rose}, [@rose, @rose, @default, @netrom, @bcast, @rose, @rose, @null]}, 0x48) openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000080)='/dev/qat_adf_ctl\x00', 0x8200, 0x0) listen(r0, 0x0) unshare(0x40000000) setrlimit(0x0, 0x0) r1 = accept(r0, 0x0, 0x0) write$binfmt_elf64(r1, &(0x7f00000002c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x9, 0x8, 0x0, 0x0, 0x0, 0x4825483b35c83c0b, 0x0, 0x0, 0x40, 0x227}, [{0x4, 0x1, 0xfff, 0x0, 0x0, 0xff8000000002, 0x0, 0x7fff}], "", [[], [], []]}, 0x378) 11:48:10 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_ATTACH(0x8, 0x0, 0x0) r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r0, &(0x7f0000000000)={{0x6, @rose}, [@rose, @rose, @default, @netrom, @bcast, @rose, @rose, @null]}, 0x48) r1 = openat$qat_adf_ctl(0xffffffffffffff9c, 0x0, 0x0, 0x0) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r1, 0x6, 0x23, 0x0, 0x0) listen(r0, 0x0) unshare(0x40000000) setrlimit(0x0, 0x0) r2 = accept(r0, 0x0, 0x0) write$binfmt_elf64(r2, 0x0, 0x0) 11:48:10 executing program 1: setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) setsockopt$netlink_NETLINK_BROADCAST_ERROR(0xffffffffffffffff, 0x10e, 0x4, 0x0, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000100)={0x0, 0x1e00, &(0x7f00000001c0)={&(0x7f0000000040)={0x14, 0x23, 0x1, 0x0, 0x0, {0x20000000004, 0xe00000000000000}}, 0x14}}, 0x0) 11:48:10 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x17, 0x0, 0x7fff, 0x1, 0x0, 0x1}, 0x3c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={r0, 0x0, 0x0}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={r0, 0x0, &(0x7f0000000280), 0x2}, 0x20) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000640)={r0, 0x0, 0x0}, 0x18) 11:48:10 executing program 0: syz_mount_image$hfsplus(&(0x7f0000000140)='hf#plus\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000a80)={[{@barrier='barrier'}, {@gid={'gid'}}, {@type={'type', 0x3d, "ae8c9d8f"}}]}) [ 365.260349][T13948] IPVS: ftp: loaded support on port[0] = 21 [ 365.281713][T13947] IPVS: ftp: loaded support on port[0] = 21 11:48:10 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000140)='hfs0lus\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000a80)={[{@barrier='barrier'}, {@gid={'gid'}}, {@type={'type', 0x3d, "ae8c9d8f"}}]}) 11:48:10 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x17, 0x0, 0x7fff, 0x1, 0x0, 0x1}, 0x3c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={r0, 0x0, &(0x7f00000005c0)}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, 0x0, 0x0) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000640)={r0, 0x0, 0x0}, 0x18) 11:48:10 executing program 1: setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) setsockopt$netlink_NETLINK_BROADCAST_ERROR(0xffffffffffffffff, 0x10e, 0x4, 0x0, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000100)={0x0, 0x1f00, &(0x7f00000001c0)={&(0x7f0000000040)={0x14, 0x23, 0x1, 0x0, 0x0, {0x20000000004, 0xe00000000000000}}, 0x14}}, 0x0) 11:48:10 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x17, 0x0, 0x7fff, 0x1, 0x0, 0x1}, 0x3c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={r0, 0x0, &(0x7f00000005c0)}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, 0x0, 0x0) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000640)={r0, 0x0, 0x0}, 0x18) 11:48:10 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_ATTACH(0x8, 0x0, 0x0) r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r0, &(0x7f0000000000)={{0x6, @rose}, [@rose, @rose, @default, @netrom, @bcast, @rose, @rose, @null]}, 0x48) r1 = openat$qat_adf_ctl(0xffffffffffffff9c, 0x0, 0x0, 0x0) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r1, 0x6, 0x23, 0x0, 0x0) listen(r0, 0x0) unshare(0x40000000) setrlimit(0x0, 0x0) r2 = accept(r0, 0x0, 0x0) write$binfmt_elf64(r2, &(0x7f00000002c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x4825483b35c83c0b, 0x0, 0x0, 0x40, 0x227}, [{0x4, 0x1, 0xfff, 0x0, 0x0, 0xff8000000002, 0x0, 0x7fff}], "", [[], [], []]}, 0x378) 11:48:10 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x17, 0x0, 0x7fff, 0x1, 0x0, 0x1}, 0x3c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={r0, 0x0, &(0x7f00000005c0)}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, 0x0, 0x0) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000640)={r0, 0x0, 0x0}, 0x18) 11:48:10 executing program 0: syz_mount_image$hfsplus(&(0x7f0000000140)='hf%plus\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000a80)={[{@barrier='barrier'}, {@gid={'gid'}}, {@type={'type', 0x3d, "ae8c9d8f"}}]}) 11:48:10 executing program 4: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r0, &(0x7f0000000000)={{0x6, @rose}, [@rose, @rose, @default, @netrom, @bcast, @rose, @rose, @null]}, 0x48) openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000080)='/dev/qat_adf_ctl\x00', 0x8200, 0x0) listen(r0, 0x0) unshare(0x40000000) setrlimit(0x0, 0x0) r1 = accept(r0, 0x0, 0x0) write$binfmt_elf64(r1, &(0x7f00000002c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x9, 0x8, 0x0, 0x0, 0x0, 0x4825483b35c83c0b, 0x0, 0x0, 0x40, 0x227}, [{0x4, 0x1, 0xfff, 0x0, 0x0, 0xff8000000002, 0x0, 0x7fff}], "", [[], [], []]}, 0x378) 11:48:10 executing program 1: setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) setsockopt$netlink_NETLINK_BROADCAST_ERROR(0xffffffffffffffff, 0x10e, 0x4, 0x0, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000100)={0x0, 0x2000, &(0x7f00000001c0)={&(0x7f0000000040)={0x14, 0x23, 0x1, 0x0, 0x0, {0x20000000004, 0xe00000000000000}}, 0x14}}, 0x0) 11:48:10 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000140)='hfsXlus\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000a80)={[{@barrier='barrier'}, {@gid={'gid'}}, {@type={'type', 0x3d, "ae8c9d8f"}}]}) 11:48:10 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x17, 0x0, 0x7fff, 0x1, 0x0, 0x1}, 0x3c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={r0, 0x0, &(0x7f00000005c0)}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={0xffffffffffffffff, 0x0, &(0x7f0000000280), 0x2}, 0x20) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000640)={r0, 0x0, 0x0}, 0x18) [ 365.908619][T13987] IPVS: ftp: loaded support on port[0] = 21 [ 365.961007][T13992] IPVS: ftp: loaded support on port[0] = 21 11:48:10 executing program 0: syz_mount_image$hfsplus(&(0x7f0000000140)='hf*plus\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000a80)={[{@barrier='barrier'}, {@gid={'gid'}}, {@type={'type', 0x3d, "ae8c9d8f"}}]}) 11:48:11 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x17, 0x0, 0x7fff, 0x1, 0x0, 0x1}, 0x3c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={r0, 0x0, &(0x7f00000005c0)}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={0xffffffffffffffff, 0x0, &(0x7f0000000280), 0x2}, 0x20) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000640)={r0, 0x0, 0x0}, 0x18) 11:48:11 executing program 1: setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) setsockopt$netlink_NETLINK_BROADCAST_ERROR(0xffffffffffffffff, 0x10e, 0x4, 0x0, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000100)={0x0, 0x2100, &(0x7f00000001c0)={&(0x7f0000000040)={0x14, 0x23, 0x1, 0x0, 0x0, {0x20000000004, 0xe00000000000000}}, 0x14}}, 0x0) 11:48:11 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000140)='hfs\\lus\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000a80)={[{@barrier='barrier'}, {@gid={'gid'}}, {@type={'type', 0x3d, "ae8c9d8f"}}]}) 11:48:11 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x17, 0x0, 0x7fff, 0x1, 0x0, 0x1}, 0x3c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={r0, 0x0, &(0x7f00000005c0)}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={0xffffffffffffffff, 0x0, &(0x7f0000000280), 0x2}, 0x20) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000640)={r0, 0x0, 0x0}, 0x18) 11:48:11 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_ATTACH(0x8, 0x0, 0x0) r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r0, &(0x7f0000000000)={{0x6, @rose}, [@rose, @rose, @default, @netrom, @bcast, @rose, @rose, @null]}, 0x48) r1 = openat$qat_adf_ctl(0xffffffffffffff9c, 0x0, 0x0, 0x0) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r1, 0x6, 0x23, 0x0, 0x0) listen(r0, 0x0) unshare(0x40000000) setrlimit(0x0, 0x0) r2 = accept(r0, 0x0, 0x0) write$binfmt_elf64(r2, &(0x7f00000002c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x4825483b35c83c0b, 0x0, 0x0, 0x40, 0x227}, [{0x4, 0x1, 0xfff, 0x0, 0x0, 0xff8000000002, 0x0, 0x7fff}], "", [[], [], []]}, 0x378) 11:48:11 executing program 4: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r0, &(0x7f0000000000)={{0x6, @rose}, [@rose, @rose, @default, @netrom, @bcast, @rose, @rose, @null]}, 0x48) openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000080)='/dev/qat_adf_ctl\x00', 0x8200, 0x0) listen(r0, 0x0) unshare(0x40000000) setrlimit(0x0, 0x0) r1 = accept(r0, 0x0, 0x0) write$binfmt_elf64(r1, &(0x7f00000002c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x9, 0x8, 0x0, 0x0, 0x0, 0x4825483b35c83c0b, 0x0, 0x0, 0x40, 0x227}, [{0x4, 0x1, 0xfff, 0x0, 0x0, 0xff8000000002, 0x0, 0x7fff}], "", [[], [], []]}, 0x378) 11:48:11 executing program 0: syz_mount_image$hfsplus(&(0x7f0000000140)='hf+plus\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000a80)={[{@barrier='barrier'}, {@gid={'gid'}}, {@type={'type', 0x3d, "ae8c9d8f"}}]}) 11:48:11 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x17, 0x0, 0x7fff, 0x1, 0x0, 0x1}, 0x3c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={r0, 0x0, &(0x7f00000005c0)}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={r0, 0x0, 0x0, 0x2}, 0x20) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000640)={r0, 0x0, 0x0}, 0x18) 11:48:11 executing program 1: setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) setsockopt$netlink_NETLINK_BROADCAST_ERROR(0xffffffffffffffff, 0x10e, 0x4, 0x0, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000100)={0x0, 0x2200, &(0x7f00000001c0)={&(0x7f0000000040)={0x14, 0x23, 0x1, 0x0, 0x0, {0x20000000004, 0xe00000000000000}}, 0x14}}, 0x0) 11:48:11 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000140)='hfsclus\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000a80)={[{@barrier='barrier'}, {@gid={'gid'}}, {@type={'type', 0x3d, "ae8c9d8f"}}]}) [ 366.571167][T14028] IPVS: ftp: loaded support on port[0] = 21 [ 366.620454][T14032] IPVS: ftp: loaded support on port[0] = 21 11:48:11 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x17, 0x0, 0x7fff, 0x1, 0x0, 0x1}, 0x3c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={r0, 0x0, &(0x7f00000005c0)}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={r0, 0x0, 0x0, 0x2}, 0x20) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000640)={r0, 0x0, 0x0}, 0x18) 11:48:11 executing program 1: setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) setsockopt$netlink_NETLINK_BROADCAST_ERROR(0xffffffffffffffff, 0x10e, 0x4, 0x0, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000100)={0x0, 0x2300, &(0x7f00000001c0)={&(0x7f0000000040)={0x14, 0x23, 0x1, 0x0, 0x0, {0x20000000004, 0xe00000000000000}}, 0x14}}, 0x0) 11:48:11 executing program 0: syz_mount_image$hfsplus(&(0x7f0000000140)='hf-plus\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000a80)={[{@barrier='barrier'}, {@gid={'gid'}}, {@type={'type', 0x3d, "ae8c9d8f"}}]}) 11:48:11 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x17, 0x0, 0x7fff, 0x1, 0x0, 0x1}, 0x3c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={r0, 0x0, &(0x7f00000005c0)}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={r0, 0x0, 0x0, 0x2}, 0x20) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000640)={r0, 0x0, 0x0}, 0x18) 11:48:11 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_ATTACH(0x8, 0x0, 0x0) r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r0, &(0x7f0000000000)={{0x6, @rose}, [@rose, @rose, @default, @netrom, @bcast, @rose, @rose, @null]}, 0x48) r1 = openat$qat_adf_ctl(0xffffffffffffff9c, 0x0, 0x0, 0x0) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r1, 0x6, 0x23, 0x0, 0x0) listen(r0, 0x0) unshare(0x40000000) setrlimit(0x0, 0x0) r2 = accept(r0, 0x0, 0x0) write$binfmt_elf64(r2, &(0x7f00000002c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x4825483b35c83c0b, 0x0, 0x0, 0x40, 0x227}, [{0x4, 0x1, 0xfff, 0x0, 0x0, 0xff8000000002, 0x0, 0x7fff}], "", [[], [], []]}, 0x378) 11:48:12 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000140)='hfsdlus\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000a80)={[{@barrier='barrier'}, {@gid={'gid'}}, {@type={'type', 0x3d, "ae8c9d8f"}}]}) 11:48:12 executing program 4: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r0, &(0x7f0000000000)={{0x6, @rose}, [@rose, @rose, @default, @netrom, @bcast, @rose, @rose, @null]}, 0x48) openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000080)='/dev/qat_adf_ctl\x00', 0x8200, 0x0) listen(r0, 0x0) unshare(0x40000000) setrlimit(0x0, 0x0) r1 = accept(r0, 0x0, 0x0) write$binfmt_elf64(r1, &(0x7f00000002c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x9, 0x8, 0x0, 0x0, 0x0, 0x4825483b35c83c0b, 0x0, 0x0, 0x40, 0x227}, [{0x4, 0x1, 0xfff, 0x0, 0x0, 0xff8000000002, 0x0, 0x7fff}], "", [[], [], []]}, 0x378) 11:48:12 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x17, 0x0, 0x7fff, 0x1, 0x0, 0x1}, 0x3c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={r0, 0x0, &(0x7f00000005c0)}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={r0, 0x0, &(0x7f0000000280)}, 0x20) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000640)={r0, 0x0, 0x0}, 0x18) 11:48:12 executing program 1: setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) setsockopt$netlink_NETLINK_BROADCAST_ERROR(0xffffffffffffffff, 0x10e, 0x4, 0x0, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000100)={0x0, 0x2400, &(0x7f00000001c0)={&(0x7f0000000040)={0x14, 0x23, 0x1, 0x0, 0x0, {0x20000000004, 0xe00000000000000}}, 0x14}}, 0x0) [ 367.171572][T14065] IPVS: ftp: loaded support on port[0] = 21 11:48:12 executing program 0: syz_mount_image$hfsplus(&(0x7f0000000140)='hf.plus\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000a80)={[{@barrier='barrier'}, {@gid={'gid'}}, {@type={'type', 0x3d, "ae8c9d8f"}}]}) [ 367.253687][T14069] IPVS: ftp: loaded support on port[0] = 21 11:48:12 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x17, 0x0, 0x7fff, 0x1, 0x0, 0x1}, 0x3c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={r0, 0x0, &(0x7f00000005c0)}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={r0, 0x0, &(0x7f0000000280)}, 0x20) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000640)={r0, 0x0, 0x0}, 0x18) 11:48:12 executing program 1: setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) setsockopt$netlink_NETLINK_BROADCAST_ERROR(0xffffffffffffffff, 0x10e, 0x4, 0x0, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000100)={0x0, 0x2500, &(0x7f00000001c0)={&(0x7f0000000040)={0x14, 0x23, 0x1, 0x0, 0x0, {0x20000000004, 0xe00000000000000}}, 0x14}}, 0x0) 11:48:12 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000140)='hfsilus\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000a80)={[{@barrier='barrier'}, {@gid={'gid'}}, {@type={'type', 0x3d, "ae8c9d8f"}}]}) 11:48:12 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x17, 0x0, 0x7fff, 0x1, 0x0, 0x1}, 0x3c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={r0, 0x0, &(0x7f00000005c0)}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={r0, 0x0, &(0x7f0000000280)}, 0x20) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000640)={r0, 0x0, 0x0}, 0x18) 11:48:12 executing program 4: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r0, &(0x7f0000000000)={{0x6, @rose}, [@rose, @rose, @default, @netrom, @bcast, @rose, @rose, @null]}, 0x48) openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000080)='/dev/qat_adf_ctl\x00', 0x8200, 0x0) listen(r0, 0x0) unshare(0x40000000) setrlimit(0x0, 0x0) r1 = accept(r0, 0x0, 0x0) write$binfmt_elf64(r1, &(0x7f00000002c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x9, 0x8, 0x0, 0x0, 0x0, 0x4825483b35c83c0b, 0x0, 0x0, 0x40, 0x227}, [{0x4, 0x1, 0xfff, 0x0, 0x0, 0xff8000000002, 0x0, 0x7fff}], "", [[], [], []]}, 0x378) 11:48:12 executing program 0: syz_mount_image$hfsplus(&(0x7f0000000140)='hf/plus\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000a80)={[{@barrier='barrier'}, {@gid={'gid'}}, {@type={'type', 0x3d, "ae8c9d8f"}}]}) 11:48:12 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_ATTACH(0x8, 0x0, 0x0) r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r0, &(0x7f0000000000)={{0x6, @rose}, [@rose, @rose, @default, @netrom, @bcast, @rose, @rose, @null]}, 0x48) r1 = openat$qat_adf_ctl(0xffffffffffffff9c, 0x0, 0x0, 0x0) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r1, 0x6, 0x23, 0x0, 0x0) listen(r0, 0x0) unshare(0x40000000) setrlimit(0x0, 0x0) r2 = accept(r0, 0x0, 0x0) write$binfmt_elf64(r2, &(0x7f00000002c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x4825483b35c83c0b, 0x0, 0x0, 0x40, 0x227}, [{0x4, 0x1, 0xfff, 0x0, 0x0, 0xff8000000002, 0x0, 0x7fff}], "", [[], [], []]}, 0x378) 11:48:12 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x17, 0x0, 0x7fff, 0x1, 0x0, 0x1}, 0x3c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={r0, 0x0, &(0x7f00000005c0)}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={r0, 0x0, &(0x7f0000000280), 0x2}, 0x20) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, 0x0, 0x0) 11:48:12 executing program 1: setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) setsockopt$netlink_NETLINK_BROADCAST_ERROR(0xffffffffffffffff, 0x10e, 0x4, 0x0, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000100)={0x0, 0x2600, &(0x7f00000001c0)={&(0x7f0000000040)={0x14, 0x23, 0x1, 0x0, 0x0, {0x20000000004, 0xe00000000000000}}, 0x14}}, 0x0) [ 367.815072][T14101] IPVS: ftp: loaded support on port[0] = 21 11:48:12 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000140)='hfsllus\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000a80)={[{@barrier='barrier'}, {@gid={'gid'}}, {@type={'type', 0x3d, "ae8c9d8f"}}]}) [ 367.920911][T14115] IPVS: ftp: loaded support on port[0] = 21 11:48:12 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x17, 0x0, 0x7fff, 0x1, 0x0, 0x1}, 0x3c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={r0, 0x0, &(0x7f00000005c0)}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={r0, 0x0, &(0x7f0000000280), 0x2}, 0x20) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, 0x0, 0x0) 11:48:12 executing program 0: syz_mount_image$hfsplus(&(0x7f0000000140)='hf0plus\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000a80)={[{@barrier='barrier'}, {@gid={'gid'}}, {@type={'type', 0x3d, "ae8c9d8f"}}]}) 11:48:13 executing program 1: setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) setsockopt$netlink_NETLINK_BROADCAST_ERROR(0xffffffffffffffff, 0x10e, 0x4, 0x0, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000100)={0x0, 0x2700, &(0x7f00000001c0)={&(0x7f0000000040)={0x14, 0x23, 0x1, 0x0, 0x0, {0x20000000004, 0xe00000000000000}}, 0x14}}, 0x0) 11:48:13 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x17, 0x0, 0x7fff, 0x1, 0x0, 0x1}, 0x3c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={r0, 0x0, &(0x7f00000005c0)}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={r0, 0x0, &(0x7f0000000280), 0x2}, 0x20) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, 0x0, 0x0) 11:48:13 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_ATTACH(0x8, 0x0, 0x0) r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r0, &(0x7f0000000000)={{0x6, @rose}, [@rose, @rose, @default, @netrom, @bcast, @rose, @rose, @null]}, 0x48) r1 = openat$qat_adf_ctl(0xffffffffffffff9c, 0x0, 0x0, 0x0) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r1, 0x6, 0x23, 0x0, 0x0) listen(r0, 0x0) unshare(0x40000000) setrlimit(0x0, 0x0) r2 = accept(r0, 0x0, 0x0) write$binfmt_elf64(r2, &(0x7f00000002c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x4825483b35c83c0b, 0x0, 0x0, 0x40, 0x227}, [{0x4, 0x1, 0xfff, 0x0, 0x0, 0xff8000000002, 0x0, 0x7fff}], "", [[], [], []]}, 0x378) 11:48:13 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000140)='hfsolus\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000a80)={[{@barrier='barrier'}, {@gid={'gid'}}, {@type={'type', 0x3d, "ae8c9d8f"}}]}) 11:48:13 executing program 4: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r0, &(0x7f0000000000)={{0x6, @rose}, [@rose, @rose, @default, @netrom, @bcast, @rose, @rose, @null]}, 0x48) openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000080)='/dev/qat_adf_ctl\x00', 0x8200, 0x0) listen(r0, 0x0) unshare(0x40000000) setrlimit(0x0, 0x0) r1 = accept(r0, 0x0, 0x0) write$binfmt_elf64(r1, &(0x7f00000002c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x9, 0x8, 0x0, 0x0, 0x0, 0x4825483b35c83c0b, 0x0, 0x0, 0x40, 0x227}, [{0x4, 0x1, 0xfff, 0x0, 0x0, 0xff8000000002, 0x0, 0x7fff}], "", [[], [], []]}, 0x378) 11:48:13 executing program 1: setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) setsockopt$netlink_NETLINK_BROADCAST_ERROR(0xffffffffffffffff, 0x10e, 0x4, 0x0, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000100)={0x0, 0x2800, &(0x7f00000001c0)={&(0x7f0000000040)={0x14, 0x23, 0x1, 0x0, 0x0, {0x20000000004, 0xe00000000000000}}, 0x14}}, 0x0) 11:48:13 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x17, 0x0, 0x7fff, 0x1, 0x0, 0x1}, 0x3c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={r0, 0x0, &(0x7f00000005c0)}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={r0, 0x0, &(0x7f0000000280), 0x2}, 0x20) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000640)={0xffffffffffffffff, 0x0, 0x0}, 0x18) 11:48:13 executing program 0: syz_mount_image$hfsplus(&(0x7f0000000140)='hfXplus\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000a80)={[{@barrier='barrier'}, {@gid={'gid'}}, {@type={'type', 0x3d, "ae8c9d8f"}}]}) [ 368.453423][T14147] IPVS: ftp: loaded support on port[0] = 21 11:48:13 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x17, 0x0, 0x7fff, 0x1, 0x0, 0x1}, 0x3c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={r0, 0x0, &(0x7f00000005c0)}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={r0, 0x0, &(0x7f0000000280), 0x2}, 0x20) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000640)={0xffffffffffffffff, 0x0, 0x0}, 0x18) [ 368.585844][T14157] IPVS: ftp: loaded support on port[0] = 21 11:48:13 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x17, 0x0, 0x7fff, 0x1, 0x0, 0x1}, 0x3c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={r0, 0x0, &(0x7f00000005c0)}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={r0, 0x0, &(0x7f0000000280), 0x2}, 0x20) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000640)={0xffffffffffffffff, 0x0, 0x0}, 0x18) 11:48:13 executing program 1: setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) setsockopt$netlink_NETLINK_BROADCAST_ERROR(0xffffffffffffffff, 0x10e, 0x4, 0x0, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000100)={0x0, 0x2900, &(0x7f00000001c0)={&(0x7f0000000040)={0x14, 0x23, 0x1, 0x0, 0x0, {0x20000000004, 0xe00000000000000}}, 0x14}}, 0x0) 11:48:13 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000140)='hfsslus\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000a80)={[{@barrier='barrier'}, {@gid={'gid'}}, {@type={'type', 0x3d, "ae8c9d8f"}}]}) 11:48:13 executing program 0: syz_mount_image$hfsplus(&(0x7f0000000140)='hf\\plus\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000a80)={[{@barrier='barrier'}, {@gid={'gid'}}, {@type={'type', 0x3d, "ae8c9d8f"}}]}) 11:48:13 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1100008912, &(0x7f0000000040)="11dca50d810bcfe47bf070") r1 = syz_open_dev$usb(&(0x7f0000000200)='/dev/bus/usb/00#/00#\x00', 0x40000fffffc, 0x200000000000042) mmap$binder(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x1, 0x11, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_FSGETXATTR(r1, 0x8038550a, &(0x7f0000000000)={0x2, 0x0, 0x0, 0x0, 0x1000020ffc000, 0x7ff0bdbe}) mincore(&(0x7f0000ffb000/0x4000)=nil, 0x4000, &(0x7f0000000240)=""/26) [ 368.978915][T14180] vhci_hcd: default hub control req: 0000 v0000 i0000 l0 [ 369.021916][T14185] vhci_hcd: default hub control req: 0000 v0000 i0000 l0 11:48:14 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_ATTACH(0x8, 0x0, 0x0) r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r0, &(0x7f0000000000)={{0x6, @rose}, [@rose, @rose, @default, @netrom, @bcast, @rose, @rose, @null]}, 0x48) r1 = openat$qat_adf_ctl(0xffffffffffffff9c, 0x0, 0x0, 0x0) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r1, 0x6, 0x23, 0x0, 0x0) listen(r0, 0x0) unshare(0x40000000) setrlimit(0x0, 0x0) r2 = accept(r0, 0x0, 0x0) write$binfmt_elf64(r2, &(0x7f00000002c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x4825483b35c83c0b, 0x0, 0x0, 0x40, 0x227}, [{0x4, 0x1, 0xfff, 0x0, 0x0, 0xff8000000002, 0x0, 0x7fff}], "", [[], [], []]}, 0x378) 11:48:14 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r0, &(0x7f0000000000)={{0x6, @rose}, [@rose, @rose, @default, @netrom, @bcast, @rose, @rose, @null]}, 0x48) openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000080)='/dev/qat_adf_ctl\x00', 0x8200, 0x0) listen(r0, 0x0) unshare(0x40000000) setrlimit(0x0, 0x0) r1 = accept(r0, 0x0, 0x0) write$binfmt_elf64(r1, &(0x7f00000002c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x9, 0x8, 0x0, 0x0, 0x0, 0x4825483b35c83c0b, 0x0, 0x0, 0x40, 0x227}, [{0x4, 0x1, 0xfff, 0x0, 0x0, 0xff8000000002, 0x0, 0x7fff}], "", [[], [], []]}, 0x378) 11:48:14 executing program 1: setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) setsockopt$netlink_NETLINK_BROADCAST_ERROR(0xffffffffffffffff, 0x10e, 0x4, 0x0, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000100)={0x0, 0x2a00, &(0x7f00000001c0)={&(0x7f0000000040)={0x14, 0x23, 0x1, 0x0, 0x0, {0x20000000004, 0xe00000000000000}}, 0x14}}, 0x0) 11:48:14 executing program 0: syz_mount_image$hfsplus(&(0x7f0000000140)='hfcplus\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000a80)={[{@barrier='barrier'}, {@gid={'gid'}}, {@type={'type', 0x3d, "ae8c9d8f"}}]}) 11:48:14 executing program 5: getitimer(0x0, &(0x7f0000000540)) 11:48:14 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000140)='hfsulus\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000a80)={[{@barrier='barrier'}, {@gid={'gid'}}, {@type={'type', 0x3d, "ae8c9d8f"}}]}) [ 369.183556][T14193] IPVS: ftp: loaded support on port[0] = 21 [ 369.294823][T14198] IPVS: ftp: loaded support on port[0] = 21 11:48:14 executing program 5: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) setsockopt(0xffffffffffffffff, 0x0, 0x1, &(0x7f0000000900)="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", 0xefd) fchdir(r0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r2 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) timer_create(0x0, &(0x7f0000000800)={0x0, 0x31, 0x0, @thr={&(0x7f0000000500)="245be8acf17215632c1d3a582ff795653212631c418ade5941eb2324b024e262e420", &(0x7f0000000580)="c4f9b1ce53164aa5a2ad5c5c5bbaa41703cefbae86a02b205025fd87e937f7910d0dbd2cc8c1052cf4ac201064a338c5361b72da09de2f408b6cb30d56aa6c1382e337981c559651bbf1726c352dd6531b2a0ed0138266b6db50325c18"}}, &(0x7f0000000840)) write$P9_RLOCK(r1, &(0x7f00000004c0)={0x8}, 0x8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BLKGETSIZE(r0, 0x1260, &(0x7f00000000c0)) ioctl$FS_IOC_MEASURE_VERITY(r0, 0xc0046686, &(0x7f0000001900)=ANY=[@ANYBLOB]) ioctl$TCSETSF(r0, 0x5404, &(0x7f0000000000)={0x6, 0xc36d, 0x0, 0x0, 0x17, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x7f}) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write(r1, &(0x7f0000000600)="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", 0x200) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) connect$unix(0xffffffffffffffff, &(0x7f0000000240)=@abs={0x64d27abb78b6eb5b, 0x0, 0x4e24}, 0x6e) sendfile(r1, r2, 0x0, 0x7fffffa7) open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) setsockopt$netlink_NETLINK_PKTINFO(0xffffffffffffffff, 0x10e, 0x3, 0x0, 0x0) 11:48:14 executing program 1: setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) setsockopt$netlink_NETLINK_BROADCAST_ERROR(0xffffffffffffffff, 0x10e, 0x4, 0x0, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000100)={0x0, 0x2b00, &(0x7f00000001c0)={&(0x7f0000000040)={0x14, 0x23, 0x1, 0x0, 0x0, {0x20000000004, 0xe00000000000000}}, 0x14}}, 0x0) 11:48:14 executing program 0: syz_mount_image$hfsplus(&(0x7f0000000140)='hfdplus\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000a80)={[{@barrier='barrier'}, {@gid={'gid'}}, {@type={'type', 0x3d, "ae8c9d8f"}}]}) [ 369.543060][ T26] audit: type=1800 audit(1569671294.467:111): pid=14220 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed(directio) comm="syz-executor.5" name="file0" dev="sda1" ino=17278 res=0 11:48:14 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000140)='hfsxlus\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000a80)={[{@barrier='barrier'}, {@gid={'gid'}}, {@type={'type', 0x3d, "ae8c9d8f"}}]}) 11:48:14 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_ATTACH(0x8, 0x0, 0x0) r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r0, &(0x7f0000000000)={{0x6, @rose}, [@rose, @rose, @default, @netrom, @bcast, @rose, @rose, @null]}, 0x48) r1 = openat$qat_adf_ctl(0xffffffffffffff9c, 0x0, 0x0, 0x0) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r1, 0x6, 0x23, 0x0, 0x0) listen(r0, 0x0) unshare(0x40000000) setrlimit(0x0, 0x0) r2 = accept(r0, 0x0, 0x0) write$binfmt_elf64(r2, &(0x7f00000002c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x9, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x227}, [{0x4, 0x1, 0xfff, 0x0, 0x0, 0xff8000000002, 0x0, 0x7fff}], "", [[], [], []]}, 0x378) 11:48:14 executing program 1: setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) setsockopt$netlink_NETLINK_BROADCAST_ERROR(0xffffffffffffffff, 0x10e, 0x4, 0x0, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000100)={0x0, 0x2c00, &(0x7f00000001c0)={&(0x7f0000000040)={0x14, 0x23, 0x1, 0x0, 0x0, {0x20000000004, 0xe00000000000000}}, 0x14}}, 0x0) 11:48:14 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r0, &(0x7f0000000000)={{0x6, @rose}, [@rose, @rose, @default, @netrom, @bcast, @rose, @rose, @null]}, 0x48) openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000080)='/dev/qat_adf_ctl\x00', 0x8200, 0x0) listen(r0, 0x0) unshare(0x40000000) setrlimit(0x0, 0x0) r1 = accept(r0, 0x0, 0x0) write$binfmt_elf64(r1, &(0x7f00000002c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x9, 0x8, 0x0, 0x0, 0x0, 0x4825483b35c83c0b, 0x0, 0x0, 0x40, 0x227}, [{0x4, 0x1, 0xfff, 0x0, 0x0, 0xff8000000002, 0x0, 0x7fff}], "", [[], [], []]}, 0x378) [ 369.659574][ T26] audit: type=1804 audit(1569671294.527:112): pid=14220 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir399166748/syzkaller.B1cliK/279/file0/file0" dev="sda1" ino=17278 res=1 [ 369.775689][ T26] audit: type=1804 audit(1569671294.697:113): pid=14220 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir399166748/syzkaller.B1cliK/279/file0/file0" dev="sda1" ino=17278 res=1 [ 369.943867][T14236] IPVS: ftp: loaded support on port[0] = 21 [ 369.945145][T14237] IPVS: ftp: loaded support on port[0] = 21 11:48:15 executing program 0: syz_mount_image$hfsplus(&(0x7f0000000140)='hfiplus\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000a80)={[{@barrier='barrier'}, {@gid={'gid'}}, {@type={'type', 0x3d, "ae8c9d8f"}}]}) 11:48:15 executing program 1: setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) setsockopt$netlink_NETLINK_BROADCAST_ERROR(0xffffffffffffffff, 0x10e, 0x4, 0x0, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000100)={0x0, 0x2d00, &(0x7f00000001c0)={&(0x7f0000000040)={0x14, 0x23, 0x1, 0x0, 0x0, {0x20000000004, 0xe00000000000000}}, 0x14}}, 0x0) 11:48:15 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000140)='hfsp\nus\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000a80)={[{@barrier='barrier'}, {@gid={'gid'}}, {@type={'type', 0x3d, "ae8c9d8f"}}]}) 11:48:15 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r0, &(0x7f0000000000)={{0x6, @rose}, [@rose, @rose, @default, @netrom, @bcast, @rose, @rose, @null]}, 0x48) openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000080)='/dev/qat_adf_ctl\x00', 0x8200, 0x0) listen(r0, 0x0) unshare(0x40000000) setrlimit(0x0, 0x0) r1 = accept(r0, 0x0, 0x0) write$binfmt_elf64(r1, &(0x7f00000002c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x9, 0x8, 0x0, 0x0, 0x0, 0x4825483b35c83c0b, 0x0, 0x0, 0x40, 0x227}, [{0x4, 0x1, 0xfff, 0x0, 0x0, 0xff8000000002, 0x0, 0x7fff}], "", [[], [], []]}, 0x378) 11:48:15 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_ATTACH(0x8, 0x0, 0x0) r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r0, &(0x7f0000000000)={{0x6, @rose}, [@rose, @rose, @default, @netrom, @bcast, @rose, @rose, @null]}, 0x48) r1 = openat$qat_adf_ctl(0xffffffffffffff9c, 0x0, 0x0, 0x0) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r1, 0x6, 0x23, 0x0, 0x0) listen(r0, 0x0) unshare(0x40000000) setrlimit(0x0, 0x0) r2 = accept(r0, 0x0, 0x0) write$binfmt_elf64(r2, &(0x7f00000002c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x9, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x227}, [{0x4, 0x1, 0xfff, 0x0, 0x0, 0xff8000000002, 0x0, 0x7fff}], "", [[], [], []]}, 0x378) [ 370.387827][ T26] audit: type=1804 audit(1569671295.317:114): pid=14260 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir399166748/syzkaller.B1cliK/279/file0/file0" dev="sda1" ino=17278 res=1 [ 370.566317][ T26] audit: type=1804 audit(1569671295.347:115): pid=14259 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir399166748/syzkaller.B1cliK/279/file0/file0" dev="sda1" ino=17278 res=1 [ 370.602014][T14272] IPVS: ftp: loaded support on port[0] = 21 11:48:15 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000000)='veth1\x00', 0x10) connect$inet(r1, &(0x7f0000000040)={0x2, 0x0, @loopback}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r1, 0x6, 0x1d, &(0x7f0000000080)={0x0, 0x6, 0xf087}, 0x14) setsockopt$inet_tcp_int(r1, 0x6, 0x4000000000013, &(0x7f0000000180), 0x4) write$binfmt_misc(r1, &(0x7f0000000200)=ANY=[@ANYBLOB="1026092bbe8b0200000000000000f536b91f5d97293fff009b606cf5252a6148b8024478ec4f968507bcde0c96d44c11f531043eb2f6b0708fb790da0e201273cdb0b3e7f951b4670773267333472474fdc7f337eb088f8bc7ac2ec5cf94041984a5b66bc4cc483c66872848ec12133c351a0890c2f647c7a465f918f70894adf09bbf2165e98cdc1483727cf6c4b2068fa46b5a6369e08fc2137474d2750c41feab58ea51b70b3dd8e3b302539f8ba13a64ef4e860e4bb4234a58372f1c78d3cf"], 0x1) setsockopt$sock_int(r1, 0x1, 0x2f, &(0x7f0000000140), 0x4) close(r1) 11:48:15 executing program 1: setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) setsockopt$netlink_NETLINK_BROADCAST_ERROR(0xffffffffffffffff, 0x10e, 0x4, 0x0, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000100)={0x0, 0x2e00, &(0x7f00000001c0)={&(0x7f0000000040)={0x14, 0x23, 0x1, 0x0, 0x0, {0x20000000004, 0xe00000000000000}}, 0x14}}, 0x0) 11:48:15 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000140)='hfsp#us\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000a80)={[{@barrier='barrier'}, {@gid={'gid'}}, {@type={'type', 0x3d, "ae8c9d8f"}}]}) 11:48:15 executing program 0: syz_mount_image$hfsplus(&(0x7f0000000140)='hflplus\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000a80)={[{@barrier='barrier'}, {@gid={'gid'}}, {@type={'type', 0x3d, "ae8c9d8f"}}]}) [ 370.651993][T14274] IPVS: ftp: loaded support on port[0] = 21 [ 370.659168][ T26] audit: type=1804 audit(1569671295.367:116): pid=14263 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir399166748/syzkaller.B1cliK/279/file0/file0" dev="sda1" ino=17278 res=1 11:48:15 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_ATTACH(0x8, 0x0, 0x0) r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r0, &(0x7f0000000000)={{0x6, @rose}, [@rose, @rose, @default, @netrom, @bcast, @rose, @rose, @null]}, 0x48) r1 = openat$qat_adf_ctl(0xffffffffffffff9c, 0x0, 0x0, 0x0) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r1, 0x6, 0x23, 0x0, 0x0) listen(r0, 0x0) unshare(0x40000000) setrlimit(0x0, 0x0) r2 = accept(r0, 0x0, 0x0) write$binfmt_elf64(r2, &(0x7f00000002c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x9, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x227}, [{0x4, 0x1, 0xfff, 0x0, 0x0, 0xff8000000002, 0x0, 0x7fff}], "", [[], [], []]}, 0x378) 11:48:15 executing program 1: setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) setsockopt$netlink_NETLINK_BROADCAST_ERROR(0xffffffffffffffff, 0x10e, 0x4, 0x0, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000100)={0x0, 0x2f00, &(0x7f00000001c0)={&(0x7f0000000040)={0x14, 0x23, 0x1, 0x0, 0x0, {0x20000000004, 0xe00000000000000}}, 0x14}}, 0x0) 11:48:15 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000140)='hfsp%us\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000a80)={[{@barrier='barrier'}, {@gid={'gid'}}, {@type={'type', 0x3d, "ae8c9d8f"}}]}) 11:48:15 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)={0xa, 0x2, 0x914, 0x4000000005}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000000c0)={r0, &(0x7f0000000440), &(0x7f0000000000), 0x2}, 0x20) 11:48:15 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r0, &(0x7f0000000000)={{0x6, @rose}, [@rose, @rose, @default, @netrom, @bcast, @rose, @rose, @null]}, 0x48) openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000080)='/dev/qat_adf_ctl\x00', 0x8200, 0x0) listen(r0, 0x0) unshare(0x40000000) setrlimit(0x0, 0x0) r1 = accept(r0, 0x0, 0x0) write$binfmt_elf64(r1, &(0x7f00000002c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x9, 0x8, 0x0, 0x0, 0x0, 0x4825483b35c83c0b, 0x0, 0x0, 0x40, 0x227}, [{0x4, 0x1, 0xfff, 0x0, 0x0, 0xff8000000002, 0x0, 0x7fff}], "", [[], [], []]}, 0x378) 11:48:15 executing program 0: syz_mount_image$hfsplus(&(0x7f0000000140)='hfoplus\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000a80)={[{@barrier='barrier'}, {@gid={'gid'}}, {@type={'type', 0x3d, "ae8c9d8f"}}]}) 11:48:16 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") r1 = syz_open_dev$binder(&(0x7f0000000140)='/dev/binder#\x00', 0x0, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r1, 0x40046207, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000180)={0x4, 0x0, &(0x7f0000000040)=[@enter_looper], 0x1, 0x0, &(0x7f0000000100)="8f"}) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000000)={0x10, 0x0, &(0x7f0000005fd4)=[@acquire, @acquire={0x400c630e}], 0x0, 0x0, 0x0}) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000080)={0x8, 0x0, &(0x7f00000000c0)=[@release={0x400c630f}], 0x78, 0x0, 0x0}) [ 371.154565][T14308] IPVS: ftp: loaded support on port[0] = 21 11:48:16 executing program 1: setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) setsockopt$netlink_NETLINK_BROADCAST_ERROR(0xffffffffffffffff, 0x10e, 0x4, 0x0, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000100)={0x0, 0x3000, &(0x7f00000001c0)={&(0x7f0000000040)={0x14, 0x23, 0x1, 0x0, 0x0, {0x20000000004, 0xe00000000000000}}, 0x14}}, 0x0) [ 371.195393][T14310] IPVS: ftp: loaded support on port[0] = 21 [ 371.264822][ T26] audit: type=1400 audit(1569671296.187:117): avc: denied { set_context_mgr } for pid=14315 comm="syz-executor.5" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=binder permissive=1 11:48:16 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000140)='hfsp*us\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000a80)={[{@barrier='barrier'}, {@gid={'gid'}}, {@type={'type', 0x3d, "ae8c9d8f"}}]}) [ 371.349069][T14320] binder: 14315:14320 ioctl c0306201 20000080 returned -14 [ 371.372955][T14323] binder: 14315:14323 ioctl c0306201 20000080 returned -14 11:48:16 executing program 0: syz_mount_image$hfsplus(&(0x7f0000000140)='hfpplus\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000a80)={[{@barrier='barrier'}, {@gid={'gid'}}, {@type={'type', 0x3d, "ae8c9d8f"}}]}) 11:48:16 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") r1 = syz_open_dev$binder(&(0x7f0000000140)='/dev/binder#\x00', 0x0, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r1, 0x40046207, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000180)={0x4, 0x0, &(0x7f0000000040)=[@enter_looper], 0x1, 0x0, &(0x7f0000000100)="8f"}) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000000)={0x10, 0x0, &(0x7f0000005fd4)=[@acquire, @acquire={0x400c630e}], 0x0, 0x0, 0x0}) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000080)={0x8, 0x0, &(0x7f00000000c0)=[@release={0x400c630f}], 0x78, 0x0, 0x0}) 11:48:16 executing program 1: setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) setsockopt$netlink_NETLINK_BROADCAST_ERROR(0xffffffffffffffff, 0x10e, 0x4, 0x0, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000100)={0x0, 0x300f, &(0x7f00000001c0)={&(0x7f0000000040)={0x14, 0x23, 0x1, 0x0, 0x0, {0x20000000004, 0xe00000000000000}}, 0x14}}, 0x0) 11:48:16 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_ATTACH(0x8, 0x0, 0x0) r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r0, &(0x7f0000000000)={{0x6, @rose}, [@rose, @rose, @default, @netrom, @bcast, @rose, @rose, @null]}, 0x48) r1 = openat$qat_adf_ctl(0xffffffffffffff9c, 0x0, 0x0, 0x0) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r1, 0x6, 0x23, 0x0, 0x0) listen(r0, 0x0) unshare(0x40000000) setrlimit(0x0, 0x0) r2 = accept(r0, 0x0, 0x0) write$binfmt_elf64(r2, &(0x7f00000002c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x9, 0x8, 0x0, 0x0, 0x0, 0x4825483b35c83c0b, 0x0, 0x0, 0x40}, [{0x4, 0x1, 0xfff, 0x0, 0x0, 0xff8000000002, 0x0, 0x7fff}], "", [[], [], []]}, 0x378) 11:48:16 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r0, &(0x7f0000000000)={{0x6, @rose}, [@rose, @rose, @default, @netrom, @bcast, @rose, @rose, @null]}, 0x48) openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000080)='/dev/qat_adf_ctl\x00', 0x8200, 0x0) listen(r0, 0x0) unshare(0x40000000) setrlimit(0x0, 0x0) r1 = accept(r0, 0x0, 0x0) write$binfmt_elf64(r1, &(0x7f00000002c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x9, 0x8, 0x0, 0x0, 0x0, 0x4825483b35c83c0b, 0x0, 0x0, 0x40, 0x227}, [{0x4, 0x1, 0xfff, 0x0, 0x0, 0xff8000000002, 0x0, 0x7fff}], "", [[], [], []]}, 0x378) [ 371.592478][T14337] binder: 14331:14337 ioctl c0306201 20000080 returned -14 11:48:16 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000140)='hfsp+us\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000a80)={[{@barrier='barrier'}, {@gid={'gid'}}, {@type={'type', 0x3d, "ae8c9d8f"}}]}) 11:48:16 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") r1 = syz_open_dev$binder(&(0x7f0000000140)='/dev/binder#\x00', 0x0, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r1, 0x40046207, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000180)={0x4, 0x0, &(0x7f0000000040)=[@enter_looper], 0x1, 0x0, &(0x7f0000000100)="8f"}) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000000)={0x10, 0x0, &(0x7f0000005fd4)=[@acquire, @acquire={0x400c630e}], 0x0, 0x0, 0x0}) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000080)={0x8, 0x0, &(0x7f00000000c0)=[@release={0x400c630f}], 0x78, 0x0, 0x0}) [ 371.765155][T14347] IPVS: ftp: loaded support on port[0] = 21 11:48:16 executing program 0: syz_mount_image$hfsplus(&(0x7f0000000140)='hfuplus\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000a80)={[{@barrier='barrier'}, {@gid={'gid'}}, {@type={'type', 0x3d, "ae8c9d8f"}}]}) [ 371.832208][T14351] IPVS: ftp: loaded support on port[0] = 21 11:48:16 executing program 1: setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) setsockopt$netlink_NETLINK_BROADCAST_ERROR(0xffffffffffffffff, 0x10e, 0x4, 0x0, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000100)={0x0, 0x3100, &(0x7f00000001c0)={&(0x7f0000000040)={0x14, 0x23, 0x1, 0x0, 0x0, {0x20000000004, 0xe00000000000000}}, 0x14}}, 0x0) [ 371.916963][T14357] binder: 14348:14357 ioctl c0306201 20000080 returned -14 11:48:16 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") r1 = syz_open_dev$binder(&(0x7f0000000140)='/dev/binder#\x00', 0x0, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r1, 0x40046207, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000180)={0x4, 0x0, &(0x7f0000000040)=[@enter_looper], 0x1, 0x0, &(0x7f0000000100)="8f"}) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000000)={0x10, 0x0, &(0x7f0000005fd4)=[@acquire, @acquire={0x400c630e}], 0x0, 0x0, 0x0}) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000080)={0x8, 0x0, &(0x7f00000000c0)=[@release={0x400c630f}], 0x78, 0x0, 0x0}) 11:48:17 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000140)='hfsp-us\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000a80)={[{@barrier='barrier'}, {@gid={'gid'}}, {@type={'type', 0x3d, "ae8c9d8f"}}]}) 11:48:17 executing program 0: syz_mount_image$hfsplus(&(0x7f0000000140)='hfxplus\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000a80)={[{@barrier='barrier'}, {@gid={'gid'}}, {@type={'type', 0x3d, "ae8c9d8f"}}]}) [ 372.253933][T14376] binder: 14366:14376 ioctl c0306201 20000080 returned -14 11:48:17 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000140)='hfsp.us\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000a80)={[{@barrier='barrier'}, {@gid={'gid'}}, {@type={'type', 0x3d, "ae8c9d8f"}}]}) 11:48:17 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x6, 0x0) write$binfmt_aout(r0, &(0x7f0000000300)=ANY=[@ANYBLOB="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"], 0x17b) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000080)) read(r0, &(0x7f0000000200)=""/231, 0x100000330) r1 = syz_open_pts(r0, 0x0) ioctl$TIOCPKT(r0, 0x5420, &(0x7f0000000a00)=0x4) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) ioctl$DRM_IOCTL_ADD_MAP(0xffffffffffffffff, 0xc0286415, 0x0) r2 = dup2(r1, r0) ioctl$TCXONC(r2, 0x540a, 0x3) 11:48:17 executing program 1: setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) setsockopt$netlink_NETLINK_BROADCAST_ERROR(0xffffffffffffffff, 0x10e, 0x4, 0x0, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000100)={0x0, 0x3200, &(0x7f00000001c0)={&(0x7f0000000040)={0x14, 0x23, 0x1, 0x0, 0x0, {0x20000000004, 0xe00000000000000}}, 0x14}}, 0x0) 11:48:20 executing program 0: syz_mount_image$hfsplus(&(0x7f0000000140)='hfs\nlus\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000a80)={[{@barrier='barrier'}, {@gid={'gid'}}, {@type={'type', 0x3d, "ae8c9d8f"}}]}) 11:48:20 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r0, &(0x7f0000000000)={{0x6, @rose}, [@rose, @rose, @default, @netrom, @bcast, @rose, @rose, @null]}, 0x48) openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000080)='/dev/qat_adf_ctl\x00', 0x8200, 0x0) listen(r0, 0x0) unshare(0x40000000) setrlimit(0x0, 0x0) r1 = accept(r0, 0x0, 0x0) write$binfmt_elf64(r1, &(0x7f00000002c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x9, 0x8, 0x0, 0x0, 0x0, 0x4825483b35c83c0b, 0x0, 0x0, 0x40, 0x227}, [{0x4, 0x1, 0xfff, 0x0, 0x0, 0xff8000000002, 0x0, 0x7fff}], "", [[], [], []]}, 0x378) 11:48:20 executing program 5: setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) setsockopt$netlink_NETLINK_BROADCAST_ERROR(0xffffffffffffffff, 0x10e, 0x4, 0x0, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000100)={0x0, 0x3100, &(0x7f00000001c0)={&(0x7f0000000040)={0x14, 0x23, 0x1, 0x0, 0x0, {0x20000000004, 0xe00000000000000}}, 0x14}}, 0x0) 11:48:20 executing program 1: setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) setsockopt$netlink_NETLINK_BROADCAST_ERROR(0xffffffffffffffff, 0x10e, 0x4, 0x0, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000100)={0x0, 0x3300, &(0x7f00000001c0)={&(0x7f0000000040)={0x14, 0x23, 0x1, 0x0, 0x0, {0x20000000004, 0xe00000000000000}}, 0x14}}, 0x0) 11:48:20 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_ATTACH(0x8, 0x0, 0x0) r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r0, &(0x7f0000000000)={{0x6, @rose}, [@rose, @rose, @default, @netrom, @bcast, @rose, @rose, @null]}, 0x48) r1 = openat$qat_adf_ctl(0xffffffffffffff9c, 0x0, 0x0, 0x0) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r1, 0x6, 0x23, 0x0, 0x0) listen(r0, 0x0) unshare(0x40000000) setrlimit(0x0, 0x0) r2 = accept(r0, 0x0, 0x0) write$binfmt_elf64(r2, &(0x7f00000002c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x9, 0x8, 0x0, 0x0, 0x0, 0x4825483b35c83c0b, 0x0, 0x0, 0x40}, [{0x0, 0x1, 0xfff, 0x0, 0x0, 0xff8000000002, 0x0, 0x7fff}], "", [[], [], []]}, 0x378) 11:48:20 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000140)='hfsp/us\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000a80)={[{@barrier='barrier'}, {@gid={'gid'}}, {@type={'type', 0x3d, "ae8c9d8f"}}]}) [ 375.932285][T14420] IPVS: ftp: loaded support on port[0] = 21 11:48:21 executing program 1: setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) setsockopt$netlink_NETLINK_BROADCAST_ERROR(0xffffffffffffffff, 0x10e, 0x4, 0x0, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000100)={0x0, 0x3400, &(0x7f00000001c0)={&(0x7f0000000040)={0x14, 0x23, 0x1, 0x0, 0x0, {0x20000000004, 0xe00000000000000}}, 0x14}}, 0x0) 11:48:21 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000140)='hfsp0us\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000a80)={[{@barrier='barrier'}, {@gid={'gid'}}, {@type={'type', 0x3d, "ae8c9d8f"}}]}) 11:48:21 executing program 0: syz_mount_image$hfsplus(&(0x7f0000000140)='hfs\"lus\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000a80)={[{@barrier='barrier'}, {@gid={'gid'}}, {@type={'type', 0x3d, "ae8c9d8f"}}]}) [ 376.152922][T14419] IPVS: ftp: loaded support on port[0] = 21 11:48:21 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_ATTACH(0x8, 0x0, 0x0) r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r0, &(0x7f0000000000)={{0x6, @rose}, [@rose, @rose, @default, @netrom, @bcast, @rose, @rose, @null]}, 0x48) r1 = openat$qat_adf_ctl(0xffffffffffffff9c, 0x0, 0x0, 0x0) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r1, 0x6, 0x23, 0x0, 0x0) listen(r0, 0x0) unshare(0x40000000) setrlimit(0x0, 0x0) r2 = accept(r0, 0x0, 0x0) write$binfmt_elf64(r2, &(0x7f00000002c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x9, 0x8, 0x0, 0x0, 0x0, 0x4825483b35c83c0b, 0x0, 0x0, 0x40}, [{0x4, 0x1, 0xfff, 0x0, 0x0, 0xff8000000002, 0x0, 0x7fff}], "", [[], [], []]}, 0x378) 11:48:21 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(0xffffffffffffffff, &(0x7f0000000000)={{0x6, @rose}, [@rose, @rose, @default, @netrom, @bcast, @rose, @rose, @null]}, 0x48) openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000080)='/dev/qat_adf_ctl\x00', 0x8200, 0x0) listen(r0, 0x0) unshare(0x40000000) setrlimit(0x0, 0x0) r1 = accept(r0, 0x0, 0x0) write$binfmt_elf64(r1, &(0x7f00000002c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x9, 0x8, 0x0, 0x0, 0x0, 0x4825483b35c83c0b, 0x0, 0x0, 0x40, 0x227}, [{0x4, 0x1, 0xfff, 0x0, 0x0, 0xff8000000002, 0x0, 0x7fff}], "", [[], [], []]}, 0x378) 11:48:21 executing program 1: setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) setsockopt$netlink_NETLINK_BROADCAST_ERROR(0xffffffffffffffff, 0x10e, 0x4, 0x0, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000100)={0x0, 0x3500, &(0x7f00000001c0)={&(0x7f0000000040)={0x14, 0x23, 0x1, 0x0, 0x0, {0x20000000004, 0xe00000000000000}}, 0x14}}, 0x0) 11:48:21 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000140)='hfspLus\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000a80)={[{@barrier='barrier'}, {@gid={'gid'}}, {@type={'type', 0x3d, "ae8c9d8f"}}]}) [ 376.536427][T14442] IPVS: ftp: loaded support on port[0] = 21 11:48:21 executing program 0: syz_mount_image$hfsplus(&(0x7f0000000140)='hfs#lus\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000a80)={[{@barrier='barrier'}, {@gid={'gid'}}, {@type={'type', 0x3d, "ae8c9d8f"}}]}) [ 376.765534][T14444] IPVS: ftp: loaded support on port[0] = 21 11:48:21 executing program 1: setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) setsockopt$netlink_NETLINK_BROADCAST_ERROR(0xffffffffffffffff, 0x10e, 0x4, 0x0, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000100)={0x0, 0x3600, &(0x7f00000001c0)={&(0x7f0000000040)={0x14, 0x23, 0x1, 0x0, 0x0, {0x20000000004, 0xe00000000000000}}, 0x14}}, 0x0) 11:48:21 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000140)='hfspXus\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000a80)={[{@barrier='barrier'}, {@gid={'gid'}}, {@type={'type', 0x3d, "ae8c9d8f"}}]}) 11:48:24 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_ATTACH(0x8, 0x0, 0x0) r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r0, &(0x7f0000000000)={{0x6, @rose}, [@rose, @rose, @default, @netrom, @bcast, @rose, @rose, @null]}, 0x48) r1 = openat$qat_adf_ctl(0xffffffffffffff9c, 0x0, 0x0, 0x0) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r1, 0x6, 0x23, 0x0, 0x0) listen(r0, 0x0) unshare(0x40000000) setrlimit(0x0, 0x0) r2 = accept(r0, 0x0, 0x0) write$binfmt_elf64(r2, &(0x7f00000002c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x9, 0x8, 0x0, 0x0, 0x0, 0x4825483b35c83c0b, 0x0, 0x0, 0x40}, [{0x0, 0x1, 0xfff, 0x0, 0x0, 0xff8000000002, 0x0, 0x7fff}], "", [[], [], []]}, 0x378) 11:48:24 executing program 0: syz_mount_image$hfsplus(&(0x7f0000000140)='hfs%lus\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000a80)={[{@barrier='barrier'}, {@gid={'gid'}}, {@type={'type', 0x3d, "ae8c9d8f"}}]}) 11:48:24 executing program 1: setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) setsockopt$netlink_NETLINK_BROADCAST_ERROR(0xffffffffffffffff, 0x10e, 0x4, 0x0, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000100)={0x0, 0x3700, &(0x7f00000001c0)={&(0x7f0000000040)={0x14, 0x23, 0x1, 0x0, 0x0, {0x20000000004, 0xe00000000000000}}, 0x14}}, 0x0) 11:48:24 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000140)='hfsp\\us\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000a80)={[{@barrier='barrier'}, {@gid={'gid'}}, {@type={'type', 0x3d, "ae8c9d8f"}}]}) 11:48:24 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_ATTACH(0x8, 0x0, 0x0) r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r0, &(0x7f0000000000)={{0x6, @rose}, [@rose, @rose, @default, @netrom, @bcast, @rose, @rose, @null]}, 0x48) r1 = openat$qat_adf_ctl(0xffffffffffffff9c, 0x0, 0x0, 0x0) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r1, 0x6, 0x23, 0x0, 0x0) listen(r0, 0x0) unshare(0x40000000) setrlimit(0x0, 0x0) r2 = accept(r0, 0x0, 0x0) write$binfmt_elf64(r2, &(0x7f00000002c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x9, 0x8, 0x0, 0x0, 0x0, 0x4825483b35c83c0b, 0x0, 0x0, 0x40}, [{0x4, 0x1, 0xfff, 0x0, 0x0, 0xff8000000002, 0x0, 0x7fff}], "", [[], [], []]}, 0x378) 11:48:24 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(0xffffffffffffffff, &(0x7f0000000000)={{0x6, @rose}, [@rose, @rose, @default, @netrom, @bcast, @rose, @rose, @null]}, 0x48) openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000080)='/dev/qat_adf_ctl\x00', 0x8200, 0x0) listen(r0, 0x0) unshare(0x40000000) setrlimit(0x0, 0x0) r1 = accept(r0, 0x0, 0x0) write$binfmt_elf64(r1, &(0x7f00000002c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x9, 0x8, 0x0, 0x0, 0x0, 0x4825483b35c83c0b, 0x0, 0x0, 0x40, 0x227}, [{0x4, 0x1, 0xfff, 0x0, 0x0, 0xff8000000002, 0x0, 0x7fff}], "", [[], [], []]}, 0x378) [ 380.124616][T14496] IPVS: ftp: loaded support on port[0] = 21 11:48:25 executing program 1: setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) setsockopt$netlink_NETLINK_BROADCAST_ERROR(0xffffffffffffffff, 0x10e, 0x4, 0x0, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000100)={0x0, 0x3800, &(0x7f00000001c0)={&(0x7f0000000040)={0x14, 0x23, 0x1, 0x0, 0x0, {0x20000000004, 0xe00000000000000}}, 0x14}}, 0x0) [ 380.187945][T14498] IPVS: ftp: loaded support on port[0] = 21 [ 380.191785][T14487] IPVS: ftp: loaded support on port[0] = 21 11:48:25 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000140)='hfspuus\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000a80)={[{@barrier='barrier'}, {@gid={'gid'}}, {@type={'type', 0x3d, "ae8c9d8f"}}]}) 11:48:25 executing program 0: syz_mount_image$hfsplus(&(0x7f0000000140)='hfs*lus\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000a80)={[{@barrier='barrier'}, {@gid={'gid'}}, {@type={'type', 0x3d, "ae8c9d8f"}}]}) 11:48:25 executing program 1: setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) setsockopt$netlink_NETLINK_BROADCAST_ERROR(0xffffffffffffffff, 0x10e, 0x4, 0x0, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000100)={0x0, 0x3900, &(0x7f00000001c0)={&(0x7f0000000040)={0x14, 0x23, 0x1, 0x0, 0x0, {0x20000000004, 0xe00000000000000}}, 0x14}}, 0x0) 11:48:25 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000140)='hfspl\ns\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000a80)={[{@barrier='barrier'}, {@gid={'gid'}}, {@type={'type', 0x3d, "ae8c9d8f"}}]}) 11:48:25 executing program 0: syz_mount_image$hfsplus(&(0x7f0000000140)='hfs+lus\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000a80)={[{@barrier='barrier'}, {@gid={'gid'}}, {@type={'type', 0x3d, "ae8c9d8f"}}]}) 11:48:25 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_ATTACH(0x8, 0x0, 0x0) r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r0, &(0x7f0000000000)={{0x6, @rose}, [@rose, @rose, @default, @netrom, @bcast, @rose, @rose, @null]}, 0x48) r1 = openat$qat_adf_ctl(0xffffffffffffff9c, 0x0, 0x0, 0x0) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r1, 0x6, 0x23, 0x0, 0x0) listen(r0, 0x0) unshare(0x40000000) setrlimit(0x0, 0x0) r2 = accept(r0, 0x0, 0x0) write$binfmt_elf64(r2, &(0x7f00000002c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x9, 0x8, 0x0, 0x0, 0x0, 0x4825483b35c83c0b, 0x0, 0x0, 0x40}, [{0x0, 0x0, 0xfff, 0x0, 0x0, 0xff8000000002, 0x0, 0x7fff}], "", [[], [], []]}, 0x378) 11:48:25 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_ATTACH(0x8, 0x0, 0x0) r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r0, &(0x7f0000000000)={{0x6, @rose}, [@rose, @rose, @default, @netrom, @bcast, @rose, @rose, @null]}, 0x48) r1 = openat$qat_adf_ctl(0xffffffffffffff9c, 0x0, 0x0, 0x0) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r1, 0x6, 0x23, 0x0, 0x0) listen(r0, 0x0) unshare(0x40000000) setrlimit(0x0, 0x0) r2 = accept(r0, 0x0, 0x0) write$binfmt_elf64(r2, &(0x7f00000002c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x9, 0x8, 0x0, 0x0, 0x0, 0x4825483b35c83c0b, 0x0, 0x0, 0x40}, [{0x4, 0x1, 0xfff, 0x0, 0x0, 0xff8000000002, 0x0, 0x7fff}], "", [[], [], []]}, 0x378) 11:48:25 executing program 1: setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) setsockopt$netlink_NETLINK_BROADCAST_ERROR(0xffffffffffffffff, 0x10e, 0x4, 0x0, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000100)={0x0, 0x3a00, &(0x7f00000001c0)={&(0x7f0000000040)={0x14, 0x23, 0x1, 0x0, 0x0, {0x20000000004, 0xe00000000000000}}, 0x14}}, 0x0) 11:48:26 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000140)='hfspl#s\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000a80)={[{@barrier='barrier'}, {@gid={'gid'}}, {@type={'type', 0x3d, "ae8c9d8f"}}]}) [ 381.049308][T14537] IPVS: ftp: loaded support on port[0] = 21 [ 381.065603][T14540] IPVS: ftp: loaded support on port[0] = 21 11:48:28 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(0xffffffffffffffff, &(0x7f0000000000)={{0x6, @rose}, [@rose, @rose, @default, @netrom, @bcast, @rose, @rose, @null]}, 0x48) openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000080)='/dev/qat_adf_ctl\x00', 0x8200, 0x0) listen(r0, 0x0) unshare(0x40000000) setrlimit(0x0, 0x0) r1 = accept(r0, 0x0, 0x0) write$binfmt_elf64(r1, &(0x7f00000002c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x9, 0x8, 0x0, 0x0, 0x0, 0x4825483b35c83c0b, 0x0, 0x0, 0x40, 0x227}, [{0x4, 0x1, 0xfff, 0x0, 0x0, 0xff8000000002, 0x0, 0x7fff}], "", [[], [], []]}, 0x378) 11:48:28 executing program 0: syz_mount_image$hfsplus(&(0x7f0000000140)='hfs,lus\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000a80)={[{@barrier='barrier'}, {@gid={'gid'}}, {@type={'type', 0x3d, "ae8c9d8f"}}]}) 11:48:28 executing program 1: setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) setsockopt$netlink_NETLINK_BROADCAST_ERROR(0xffffffffffffffff, 0x10e, 0x4, 0x0, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000100)={0x0, 0x3b00, &(0x7f00000001c0)={&(0x7f0000000040)={0x14, 0x23, 0x1, 0x0, 0x0, {0x20000000004, 0xe00000000000000}}, 0x14}}, 0x0) 11:48:28 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000140)='hfspl%s\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000a80)={[{@barrier='barrier'}, {@gid={'gid'}}, {@type={'type', 0x3d, "ae8c9d8f"}}]}) 11:48:28 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_ATTACH(0x8, 0x0, 0x0) r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r0, &(0x7f0000000000)={{0x6, @rose}, [@rose, @rose, @default, @netrom, @bcast, @rose, @rose, @null]}, 0x48) r1 = openat$qat_adf_ctl(0xffffffffffffff9c, 0x0, 0x0, 0x0) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r1, 0x6, 0x23, 0x0, 0x0) listen(r0, 0x0) unshare(0x40000000) setrlimit(0x0, 0x0) r2 = accept(r0, 0x0, 0x0) write$binfmt_elf64(r2, &(0x7f00000002c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x9, 0x8, 0x0, 0x0, 0x0, 0x4825483b35c83c0b, 0x0, 0x0, 0x40}, [{0x0, 0x1, 0xfff, 0x0, 0x0, 0xff8000000002, 0x0, 0x7fff}], "", [[], [], []]}, 0x378) 11:48:28 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_ATTACH(0x8, 0x0, 0x0) r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r0, &(0x7f0000000000)={{0x6, @rose}, [@rose, @rose, @default, @netrom, @bcast, @rose, @rose, @null]}, 0x48) r1 = openat$qat_adf_ctl(0xffffffffffffff9c, 0x0, 0x0, 0x0) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r1, 0x6, 0x23, 0x0, 0x0) listen(r0, 0x0) unshare(0x40000000) setrlimit(0x0, 0x0) r2 = accept(r0, 0x0, 0x0) write$binfmt_elf64(r2, &(0x7f00000002c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x9, 0x8, 0x0, 0x0, 0x0, 0x4825483b35c83c0b, 0x0, 0x0, 0x40}, [{0x0, 0x0, 0xfff, 0x0, 0x0, 0xff8000000002, 0x0, 0x7fff}], "", [[], [], []]}, 0x378) [ 383.691143][T14569] IPVS: ftp: loaded support on port[0] = 21 [ 383.703358][T14570] IPVS: ftp: loaded support on port[0] = 21 11:48:28 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000140)='hfspl*s\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000a80)={[{@barrier='barrier'}, {@gid={'gid'}}, {@type={'type', 0x3d, "ae8c9d8f"}}]}) 11:48:28 executing program 1: setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) setsockopt$netlink_NETLINK_BROADCAST_ERROR(0xffffffffffffffff, 0x10e, 0x4, 0x0, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000100)={0x0, 0x3c00, &(0x7f00000001c0)={&(0x7f0000000040)={0x14, 0x23, 0x1, 0x0, 0x0, {0x20000000004, 0xe00000000000000}}, 0x14}}, 0x0) [ 383.933030][T14568] IPVS: ftp: loaded support on port[0] = 21 11:48:28 executing program 0: syz_mount_image$hfsplus(&(0x7f0000000140)='hfs-lus\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000a80)={[{@barrier='barrier'}, {@gid={'gid'}}, {@type={'type', 0x3d, "ae8c9d8f"}}]}) 11:48:29 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_ATTACH(0x8, 0x0, 0x0) r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r0, &(0x7f0000000000)={{0x6, @rose}, [@rose, @rose, @default, @netrom, @bcast, @rose, @rose, @null]}, 0x48) r1 = openat$qat_adf_ctl(0xffffffffffffff9c, 0x0, 0x0, 0x0) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r1, 0x6, 0x23, 0x0, 0x0) listen(r0, 0x0) unshare(0x40000000) setrlimit(0x0, 0x0) r2 = accept(r0, 0x0, 0x0) write$binfmt_elf64(r2, &(0x7f00000002c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x9, 0x8, 0x0, 0x0, 0x0, 0x4825483b35c83c0b, 0x0, 0x0, 0x40}, [{0x0, 0x1, 0xfff, 0x0, 0x0, 0xff8000000002, 0x0, 0x7fff}], "", [[], [], []]}, 0x378) 11:48:29 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000140)='hfspl+s\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000a80)={[{@barrier='barrier'}, {@gid={'gid'}}, {@type={'type', 0x3d, "ae8c9d8f"}}]}) [ 384.281023][T14596] IPVS: ftp: loaded support on port[0] = 21 11:48:29 executing program 1: setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) setsockopt$netlink_NETLINK_BROADCAST_ERROR(0xffffffffffffffff, 0x10e, 0x4, 0x0, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000100)={0x0, 0x3d00, &(0x7f00000001c0)={&(0x7f0000000040)={0x14, 0x23, 0x1, 0x0, 0x0, {0x20000000004, 0xe00000000000000}}, 0x14}}, 0x0) 11:48:32 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r0, 0x0, 0x0) openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000080)='/dev/qat_adf_ctl\x00', 0x8200, 0x0) listen(r0, 0x0) unshare(0x40000000) setrlimit(0x0, 0x0) r1 = accept(r0, 0x0, 0x0) write$binfmt_elf64(r1, &(0x7f00000002c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x9, 0x8, 0x0, 0x0, 0x0, 0x4825483b35c83c0b, 0x0, 0x0, 0x40, 0x227}, [{0x4, 0x1, 0xfff, 0x0, 0x0, 0xff8000000002, 0x0, 0x7fff}], "", [[], [], []]}, 0x378) 11:48:32 executing program 0: syz_mount_image$hfsplus(&(0x7f0000000140)='hfs.lus\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000a80)={[{@barrier='barrier'}, {@gid={'gid'}}, {@type={'type', 0x3d, "ae8c9d8f"}}]}) 11:48:32 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_ATTACH(0x8, 0x0, 0x0) r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r0, &(0x7f0000000000)={{0x6, @rose}, [@rose, @rose, @default, @netrom, @bcast, @rose, @rose, @null]}, 0x48) r1 = openat$qat_adf_ctl(0xffffffffffffff9c, 0x0, 0x0, 0x0) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r1, 0x6, 0x23, 0x0, 0x0) listen(r0, 0x0) unshare(0x40000000) setrlimit(0x0, 0x0) r2 = accept(r0, 0x0, 0x0) write$binfmt_elf64(r2, &(0x7f00000002c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x9, 0x8, 0x0, 0x0, 0x0, 0x4825483b35c83c0b, 0x0, 0x0, 0x40}, [{0x0, 0x0, 0xfff, 0x0, 0x0, 0xff8000000002, 0x0, 0x7fff}], "", [[], [], []]}, 0x378) 11:48:32 executing program 1: setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) setsockopt$netlink_NETLINK_BROADCAST_ERROR(0xffffffffffffffff, 0x10e, 0x4, 0x0, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000100)={0x0, 0x3e00, &(0x7f00000001c0)={&(0x7f0000000040)={0x14, 0x23, 0x1, 0x0, 0x0, {0x20000000004, 0xe00000000000000}}, 0x14}}, 0x0) 11:48:32 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000140)='hfspl-s\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000a80)={[{@barrier='barrier'}, {@gid={'gid'}}, {@type={'type', 0x3d, "ae8c9d8f"}}]}) 11:48:32 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_ATTACH(0x8, 0x0, 0x0) r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r0, &(0x7f0000000000)={{0x6, @rose}, [@rose, @rose, @default, @netrom, @bcast, @rose, @rose, @null]}, 0x48) r1 = openat$qat_adf_ctl(0xffffffffffffff9c, 0x0, 0x0, 0x0) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r1, 0x6, 0x23, 0x0, 0x0) listen(r0, 0x0) unshare(0x40000000) setrlimit(0x0, 0x0) r2 = accept(r0, 0x0, 0x0) write$binfmt_elf64(r2, &(0x7f00000002c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x9, 0x8, 0x0, 0x0, 0x0, 0x4825483b35c83c0b, 0x0, 0x0, 0x40}, [{0x0, 0x1, 0xfff, 0x0, 0x0, 0xff8000000002, 0x0, 0x7fff}], "", [[], [], []]}, 0x378) 11:48:32 executing program 0: syz_mount_image$hfsplus(&(0x7f0000000140)='hfs0lus\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000a80)={[{@barrier='barrier'}, {@gid={'gid'}}, {@type={'type', 0x3d, "ae8c9d8f"}}]}) [ 387.573161][T14624] IPVS: ftp: loaded support on port[0] = 21 11:48:32 executing program 1: setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) setsockopt$netlink_NETLINK_BROADCAST_ERROR(0xffffffffffffffff, 0x10e, 0x4, 0x0, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000100)={0x0, 0x3f00, &(0x7f00000001c0)={&(0x7f0000000040)={0x14, 0x23, 0x1, 0x0, 0x0, {0x20000000004, 0xe00000000000000}}, 0x14}}, 0x0) [ 387.661432][T14608] IPVS: ftp: loaded support on port[0] = 21 11:48:32 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000140)='hfspl.s\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000a80)={[{@barrier='barrier'}, {@gid={'gid'}}, {@type={'type', 0x3d, "ae8c9d8f"}}]}) [ 387.787822][T14623] IPVS: ftp: loaded support on port[0] = 21 11:48:32 executing program 0: syz_mount_image$hfsplus(&(0x7f0000000140)='hfsXlus\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000a80)={[{@barrier='barrier'}, {@gid={'gid'}}, {@type={'type', 0x3d, "ae8c9d8f"}}]}) 11:48:33 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_ATTACH(0x8, 0x0, 0x0) r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r0, &(0x7f0000000000)={{0x6, @rose}, [@rose, @rose, @default, @netrom, @bcast, @rose, @rose, @null]}, 0x48) r1 = openat$qat_adf_ctl(0xffffffffffffff9c, 0x0, 0x0, 0x0) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r1, 0x6, 0x23, 0x0, 0x0) listen(r0, 0x0) unshare(0x40000000) setrlimit(0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000002c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x9, 0x8, 0x0, 0x0, 0x0, 0x4825483b35c83c0b, 0x0, 0x0, 0x40}, [{0x0, 0x1, 0xfff, 0x0, 0x0, 0xff8000000002, 0x0, 0x7fff}], "", [[], [], []]}, 0x378) 11:48:33 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000140)='hfspl0s\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000a80)={[{@barrier='barrier'}, {@gid={'gid'}}, {@type={'type', 0x3d, "ae8c9d8f"}}]}) [ 388.295138][T14655] IPVS: ftp: loaded support on port[0] = 21 11:48:36 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r0, 0x0, 0x0) openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000080)='/dev/qat_adf_ctl\x00', 0x8200, 0x0) listen(r0, 0x0) unshare(0x40000000) setrlimit(0x0, 0x0) r1 = accept(r0, 0x0, 0x0) write$binfmt_elf64(r1, &(0x7f00000002c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x9, 0x8, 0x0, 0x0, 0x0, 0x4825483b35c83c0b, 0x0, 0x0, 0x40, 0x227}, [{0x4, 0x1, 0xfff, 0x0, 0x0, 0xff8000000002, 0x0, 0x7fff}], "", [[], [], []]}, 0x378) 11:48:36 executing program 1: setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) setsockopt$netlink_NETLINK_BROADCAST_ERROR(0xffffffffffffffff, 0x10e, 0x4, 0x0, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000100)={0x0, 0x4000, &(0x7f00000001c0)={&(0x7f0000000040)={0x14, 0x23, 0x1, 0x0, 0x0, {0x20000000004, 0xe00000000000000}}, 0x14}}, 0x0) 11:48:36 executing program 0: syz_mount_image$hfsplus(&(0x7f0000000140)='hfs\\lus\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000a80)={[{@barrier='barrier'}, {@gid={'gid'}}, {@type={'type', 0x3d, "ae8c9d8f"}}]}) 11:48:37 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_ATTACH(0x8, 0x0, 0x0) r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r0, &(0x7f0000000000)={{0x6, @rose}, [@rose, @rose, @default, @netrom, @bcast, @rose, @rose, @null]}, 0x48) r1 = openat$qat_adf_ctl(0xffffffffffffff9c, 0x0, 0x0, 0x0) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r1, 0x6, 0x23, 0x0, 0x0) listen(r0, 0x0) unshare(0x40000000) setrlimit(0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000002c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x9, 0x8, 0x0, 0x0, 0x0, 0x4825483b35c83c0b, 0x0, 0x0, 0x40}, [{0x0, 0x1, 0xfff, 0x0, 0x0, 0xff8000000002, 0x0, 0x7fff}], "", [[], [], []]}, 0x378) 11:48:37 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000140)='hfsplXs\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000a80)={[{@barrier='barrier'}, {@gid={'gid'}}, {@type={'type', 0x3d, "ae8c9d8f"}}]}) 11:48:37 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_ATTACH(0x8, 0x0, 0x0) r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r0, &(0x7f0000000000)={{0x6, @rose}, [@rose, @rose, @default, @netrom, @bcast, @rose, @rose, @null]}, 0x48) r1 = openat$qat_adf_ctl(0xffffffffffffff9c, 0x0, 0x0, 0x0) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r1, 0x6, 0x23, 0x0, 0x0) listen(r0, 0x0) unshare(0x40000000) setrlimit(0x0, 0x0) r2 = accept(r0, 0x0, 0x0) write$binfmt_elf64(r2, &(0x7f00000002c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x9, 0x8, 0x0, 0x0, 0x0, 0x4825483b35c83c0b, 0x0, 0x0, 0x40}, [{0x0, 0x1, 0x0, 0x0, 0x0, 0xff8000000002, 0x0, 0x7fff}], "", [[], [], []]}, 0x378) 11:48:37 executing program 1: setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) setsockopt$netlink_NETLINK_BROADCAST_ERROR(0xffffffffffffffff, 0x10e, 0x4, 0x0, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000100)={0x0, 0x4100, &(0x7f00000001c0)={&(0x7f0000000040)={0x14, 0x23, 0x1, 0x0, 0x0, {0x20000000004, 0xe00000000000000}}, 0x14}}, 0x0) [ 392.230857][T14680] IPVS: ftp: loaded support on port[0] = 21 [ 392.232856][T14682] IPVS: ftp: loaded support on port[0] = 21 11:48:37 executing program 0: syz_mount_image$hfsplus(&(0x7f0000000140)='hfsclus\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000a80)={[{@barrier='barrier'}, {@gid={'gid'}}, {@type={'type', 0x3d, "ae8c9d8f"}}]}) [ 392.309779][T14674] IPVS: ftp: loaded support on port[0] = 21 11:48:37 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000140)='hfspl\\s\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000a80)={[{@barrier='barrier'}, {@gid={'gid'}}, {@type={'type', 0x3d, "ae8c9d8f"}}]}) 11:48:37 executing program 1: setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) setsockopt$netlink_NETLINK_BROADCAST_ERROR(0xffffffffffffffff, 0x10e, 0x4, 0x0, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000100)={0x0, 0x4200, &(0x7f00000001c0)={&(0x7f0000000040)={0x14, 0x23, 0x1, 0x0, 0x0, {0x20000000004, 0xe00000000000000}}, 0x14}}, 0x0) 11:48:37 executing program 0: syz_mount_image$hfsplus(&(0x7f0000000140)='hfsdlus\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000a80)={[{@barrier='barrier'}, {@gid={'gid'}}, {@type={'type', 0x3d, "ae8c9d8f"}}]}) 11:48:37 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_ATTACH(0x8, 0x0, 0x0) r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r0, &(0x7f0000000000)={{0x6, @rose}, [@rose, @rose, @default, @netrom, @bcast, @rose, @rose, @null]}, 0x48) r1 = openat$qat_adf_ctl(0xffffffffffffff9c, 0x0, 0x0, 0x0) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r1, 0x6, 0x23, 0x0, 0x0) listen(r0, 0x0) unshare(0x40000000) setrlimit(0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000002c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x9, 0x8, 0x0, 0x0, 0x0, 0x4825483b35c83c0b, 0x0, 0x0, 0x40}, [{0x0, 0x1, 0xfff, 0x0, 0x0, 0xff8000000002, 0x0, 0x7fff}], "", [[], [], []]}, 0x378) [ 393.022819][T14715] IPVS: ftp: loaded support on port[0] = 21 11:48:40 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r0, 0x0, 0x0) openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000080)='/dev/qat_adf_ctl\x00', 0x8200, 0x0) listen(r0, 0x0) unshare(0x40000000) setrlimit(0x0, 0x0) r1 = accept(r0, 0x0, 0x0) write$binfmt_elf64(r1, &(0x7f00000002c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x9, 0x8, 0x0, 0x0, 0x0, 0x4825483b35c83c0b, 0x0, 0x0, 0x40, 0x227}, [{0x4, 0x1, 0xfff, 0x0, 0x0, 0xff8000000002, 0x0, 0x7fff}], "", [[], [], []]}, 0x378) 11:48:40 executing program 1: setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) setsockopt$netlink_NETLINK_BROADCAST_ERROR(0xffffffffffffffff, 0x10e, 0x4, 0x0, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000100)={0x0, 0x4300, &(0x7f00000001c0)={&(0x7f0000000040)={0x14, 0x23, 0x1, 0x0, 0x0, {0x20000000004, 0xe00000000000000}}, 0x14}}, 0x0) 11:48:40 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_ATTACH(0x8, 0x0, 0x0) r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r0, &(0x7f0000000000)={{0x6, @rose}, [@rose, @rose, @default, @netrom, @bcast, @rose, @rose, @null]}, 0x48) r1 = openat$qat_adf_ctl(0xffffffffffffff9c, 0x0, 0x0, 0x0) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r1, 0x6, 0x23, 0x0, 0x0) listen(r0, 0x0) unshare(0x40000000) setrlimit(0x0, 0x0) r2 = accept(r0, 0x0, 0x0) write$binfmt_elf64(r2, &(0x7f00000002c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x9, 0x8, 0x0, 0x0, 0x0, 0x4825483b35c83c0b, 0x0, 0x0, 0x40}, [{0x0, 0x1, 0x0, 0x0, 0x0, 0xff8000000002, 0x0, 0x7fff}], "", [[], [], []]}, 0x378) 11:48:40 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000140)='hfsplcs\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000a80)={[{@barrier='barrier'}, {@gid={'gid'}}, {@type={'type', 0x3d, "ae8c9d8f"}}]}) 11:48:40 executing program 0: syz_mount_image$hfsplus(&(0x7f0000000140)='hfsilus\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000a80)={[{@barrier='barrier'}, {@gid={'gid'}}, {@type={'type', 0x3d, "ae8c9d8f"}}]}) 11:48:40 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_ATTACH(0x8, 0x0, 0x0) r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r0, &(0x7f0000000000)={{0x6, @rose}, [@rose, @rose, @default, @netrom, @bcast, @rose, @rose, @null]}, 0x48) r1 = openat$qat_adf_ctl(0xffffffffffffff9c, 0x0, 0x0, 0x0) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r1, 0x6, 0x23, 0x0, 0x0) listen(r0, 0x0) unshare(0x40000000) r2 = accept(r0, 0x0, 0x0) write$binfmt_elf64(r2, &(0x7f00000002c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x9, 0x8, 0x0, 0x0, 0x0, 0x4825483b35c83c0b, 0x0, 0x0, 0x40}, [{0x0, 0x1, 0xfff, 0x0, 0x0, 0xff8000000002, 0x0, 0x7fff}], "", [[], [], []]}, 0x378) [ 395.573366][T14732] IPVS: ftp: loaded support on port[0] = 21 [ 395.596180][T14733] IPVS: ftp: loaded support on port[0] = 21 11:48:40 executing program 1: setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) setsockopt$netlink_NETLINK_BROADCAST_ERROR(0xffffffffffffffff, 0x10e, 0x4, 0x0, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000100)={0x0, 0x4400, &(0x7f00000001c0)={&(0x7f0000000040)={0x14, 0x23, 0x1, 0x0, 0x0, {0x20000000004, 0xe00000000000000}}, 0x14}}, 0x0) 11:48:40 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000140)='hfsplds\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000a80)={[{@barrier='barrier'}, {@gid={'gid'}}, {@type={'type', 0x3d, "ae8c9d8f"}}]}) 11:48:40 executing program 0: syz_mount_image$hfsplus(&(0x7f0000000140)='hfsllus\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000a80)={[{@barrier='barrier'}, {@gid={'gid'}}, {@type={'type', 0x3d, "ae8c9d8f"}}]}) [ 395.848620][T14734] IPVS: ftp: loaded support on port[0] = 21 11:48:40 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_ATTACH(0x8, 0x0, 0x0) r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r0, &(0x7f0000000000)={{0x6, @rose}, [@rose, @rose, @default, @netrom, @bcast, @rose, @rose, @null]}, 0x48) r1 = openat$qat_adf_ctl(0xffffffffffffff9c, 0x0, 0x0, 0x0) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r1, 0x6, 0x23, 0x0, 0x0) listen(r0, 0x0) r2 = accept(r0, 0x0, 0x0) write$binfmt_elf64(r2, &(0x7f00000002c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x9, 0x8, 0x0, 0x0, 0x0, 0x4825483b35c83c0b, 0x0, 0x0, 0x40}, [{0x0, 0x1, 0xfff, 0x0, 0x0, 0xff8000000002, 0x0, 0x7fff}], "", [[], [], []]}, 0x378) 11:48:41 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000140)='hfsplis\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000a80)={[{@barrier='barrier'}, {@gid={'gid'}}, {@type={'type', 0x3d, "ae8c9d8f"}}]}) 11:48:41 executing program 1: setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) setsockopt$netlink_NETLINK_BROADCAST_ERROR(0xffffffffffffffff, 0x10e, 0x4, 0x0, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000100)={0x0, 0x4500, &(0x7f00000001c0)={&(0x7f0000000040)={0x14, 0x23, 0x1, 0x0, 0x0, {0x20000000004, 0xe00000000000000}}, 0x14}}, 0x0) 11:48:43 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r0, &(0x7f0000000000)={{0x6, @rose}, [@rose, @rose, @default, @netrom, @bcast, @rose, @rose, @null]}, 0x48) openat$qat_adf_ctl(0xffffffffffffff9c, 0x0, 0x8200, 0x0) listen(r0, 0x0) unshare(0x40000000) setrlimit(0x0, 0x0) r1 = accept(r0, 0x0, 0x0) write$binfmt_elf64(r1, &(0x7f00000002c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x9, 0x8, 0x0, 0x0, 0x0, 0x4825483b35c83c0b, 0x0, 0x0, 0x40, 0x227}, [{0x4, 0x1, 0xfff, 0x0, 0x0, 0xff8000000002, 0x0, 0x7fff}], "", [[], [], []]}, 0x378) 11:48:43 executing program 0: syz_mount_image$hfsplus(&(0x7f0000000140)='hfsolus\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000a80)={[{@barrier='barrier'}, {@gid={'gid'}}, {@type={'type', 0x3d, "ae8c9d8f"}}]}) 11:48:43 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_ATTACH(0x8, 0x0, 0x0) r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r0, &(0x7f0000000000)={{0x6, @rose}, [@rose, @rose, @default, @netrom, @bcast, @rose, @rose, @null]}, 0x48) r1 = openat$qat_adf_ctl(0xffffffffffffff9c, 0x0, 0x0, 0x0) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r1, 0x6, 0x23, 0x0, 0x0) listen(r0, 0x0) unshare(0x40000000) setrlimit(0x0, 0x0) r2 = accept(r0, 0x0, 0x0) write$binfmt_elf64(r2, &(0x7f00000002c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x9, 0x8, 0x0, 0x0, 0x0, 0x4825483b35c83c0b, 0x0, 0x0, 0x40}, [{0x0, 0x1, 0x0, 0x0, 0x0, 0xff8000000002, 0x0, 0x7fff}], "", [[], [], []]}, 0x378) 11:48:43 executing program 1: setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) setsockopt$netlink_NETLINK_BROADCAST_ERROR(0xffffffffffffffff, 0x10e, 0x4, 0x0, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000100)={0x0, 0x4700, &(0x7f00000001c0)={&(0x7f0000000040)={0x14, 0x23, 0x1, 0x0, 0x0, {0x20000000004, 0xe00000000000000}}, 0x14}}, 0x0) 11:48:43 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000140)='hfsplls\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000a80)={[{@barrier='barrier'}, {@gid={'gid'}}, {@type={'type', 0x3d, "ae8c9d8f"}}]}) 11:48:43 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_ATTACH(0x8, 0x0, 0x0) r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r0, &(0x7f0000000000)={{0x6, @rose}, [@rose, @rose, @default, @netrom, @bcast, @rose, @rose, @null]}, 0x48) r1 = openat$qat_adf_ctl(0xffffffffffffff9c, 0x0, 0x0, 0x0) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r1, 0x6, 0x23, 0x0, 0x0) listen(r0, 0x0) r2 = accept(r0, 0x0, 0x0) write$binfmt_elf64(r2, &(0x7f00000002c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x9, 0x8, 0x0, 0x0, 0x0, 0x4825483b35c83c0b, 0x0, 0x0, 0x40}, [{0x0, 0x1, 0xfff, 0x0, 0x0, 0xff8000000002, 0x0, 0x7fff}], "", [[], [], []]}, 0x378) 11:48:44 executing program 1: setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) setsockopt$netlink_NETLINK_BROADCAST_ERROR(0xffffffffffffffff, 0x10e, 0x4, 0x0, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000100)={0x0, 0x4800, &(0x7f00000001c0)={&(0x7f0000000040)={0x14, 0x23, 0x1, 0x0, 0x0, {0x20000000004, 0xe00000000000000}}, 0x14}}, 0x0) [ 399.171120][T14789] IPVS: ftp: loaded support on port[0] = 21 11:48:44 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_ATTACH(0x8, 0x0, 0x0) r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r0, &(0x7f0000000000)={{0x6, @rose}, [@rose, @rose, @default, @netrom, @bcast, @rose, @rose, @null]}, 0x48) r1 = openat$qat_adf_ctl(0xffffffffffffff9c, 0x0, 0x0, 0x0) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r1, 0x6, 0x23, 0x0, 0x0) listen(r0, 0x0) r2 = accept(r0, 0x0, 0x0) write$binfmt_elf64(r2, &(0x7f00000002c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x9, 0x8, 0x0, 0x0, 0x0, 0x4825483b35c83c0b, 0x0, 0x0, 0x40}, [{0x0, 0x1, 0xfff, 0x0, 0x0, 0xff8000000002, 0x0, 0x7fff}], "", [[], [], []]}, 0x378) [ 399.252847][T14796] IPVS: ftp: loaded support on port[0] = 21 11:48:44 executing program 0: syz_mount_image$hfsplus(&(0x7f0000000140)='hfsslus\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000a80)={[{@barrier='barrier'}, {@gid={'gid'}}, {@type={'type', 0x3d, "ae8c9d8f"}}]}) 11:48:44 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000140)='hfsplos\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000a80)={[{@barrier='barrier'}, {@gid={'gid'}}, {@type={'type', 0x3d, "ae8c9d8f"}}]}) 11:48:44 executing program 1: setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) setsockopt$netlink_NETLINK_BROADCAST_ERROR(0xffffffffffffffff, 0x10e, 0x4, 0x0, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000100)={0x0, 0x4900, &(0x7f00000001c0)={&(0x7f0000000040)={0x14, 0x23, 0x1, 0x0, 0x0, {0x20000000004, 0xe00000000000000}}, 0x14}}, 0x0) 11:48:44 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r0, &(0x7f0000000000)={{0x6, @rose}, [@rose, @rose, @default, @netrom, @bcast, @rose, @rose, @null]}, 0x48) openat$qat_adf_ctl(0xffffffffffffff9c, 0x0, 0x8200, 0x0) listen(r0, 0x0) unshare(0x40000000) setrlimit(0x0, 0x0) r1 = accept(r0, 0x0, 0x0) write$binfmt_elf64(r1, &(0x7f00000002c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x9, 0x8, 0x0, 0x0, 0x0, 0x4825483b35c83c0b, 0x0, 0x0, 0x40, 0x227}, [{0x4, 0x1, 0xfff, 0x0, 0x0, 0xff8000000002, 0x0, 0x7fff}], "", [[], [], []]}, 0x378) 11:48:44 executing program 0: syz_mount_image$hfsplus(&(0x7f0000000140)='hfsulus\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000a80)={[{@barrier='barrier'}, {@gid={'gid'}}, {@type={'type', 0x3d, "ae8c9d8f"}}]}) 11:48:44 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000140)='hfsplps\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000a80)={[{@barrier='barrier'}, {@gid={'gid'}}, {@type={'type', 0x3d, "ae8c9d8f"}}]}) [ 399.774309][T14823] IPVS: ftp: loaded support on port[0] = 21 11:48:44 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_ATTACH(0x8, 0x0, 0x0) r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r0, &(0x7f0000000000)={{0x6, @rose}, [@rose, @rose, @default, @netrom, @bcast, @rose, @rose, @null]}, 0x48) r1 = openat$qat_adf_ctl(0xffffffffffffff9c, 0x0, 0x0, 0x0) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r1, 0x6, 0x23, 0x0, 0x0) listen(r0, 0x0) unshare(0x40000000) setrlimit(0x0, 0x0) r2 = accept(r0, 0x0, 0x0) write$binfmt_elf64(r2, &(0x7f00000002c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x9, 0x8, 0x0, 0x0, 0x0, 0x4825483b35c83c0b, 0x0, 0x0, 0x40}, [{0x0, 0x1, 0xfff, 0x0, 0x0, 0x0, 0x0, 0x7fff}], "", [[], [], []]}, 0x378) 11:48:44 executing program 1: setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) setsockopt$netlink_NETLINK_BROADCAST_ERROR(0xffffffffffffffff, 0x10e, 0x4, 0x0, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000100)={0x0, 0x4a00, &(0x7f00000001c0)={&(0x7f0000000040)={0x14, 0x23, 0x1, 0x0, 0x0, {0x20000000004, 0xe00000000000000}}, 0x14}}, 0x0) 11:48:44 executing program 0: syz_mount_image$hfsplus(&(0x7f0000000140)='hfsxlus\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000a80)={[{@barrier='barrier'}, {@gid={'gid'}}, {@type={'type', 0x3d, "ae8c9d8f"}}]}) 11:48:45 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000140)='hfsplss\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000a80)={[{@barrier='barrier'}, {@gid={'gid'}}, {@type={'type', 0x3d, "ae8c9d8f"}}]}) [ 400.053478][T14841] IPVS: ftp: loaded support on port[0] = 21 11:48:45 executing program 1: setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) setsockopt$netlink_NETLINK_BROADCAST_ERROR(0xffffffffffffffff, 0x10e, 0x4, 0x0, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000100)={0x0, 0x4b00, &(0x7f00000001c0)={&(0x7f0000000040)={0x14, 0x23, 0x1, 0x0, 0x0, {0x20000000004, 0xe00000000000000}}, 0x14}}, 0x0) 11:48:45 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_ATTACH(0x8, 0x0, 0x0) r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r0, &(0x7f0000000000)={{0x6, @rose}, [@rose, @rose, @default, @netrom, @bcast, @rose, @rose, @null]}, 0x48) r1 = openat$qat_adf_ctl(0xffffffffffffff9c, 0x0, 0x0, 0x0) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r1, 0x6, 0x23, 0x0, 0x0) unshare(0x40000000) r2 = accept(r0, 0x0, 0x0) write$binfmt_elf64(r2, &(0x7f00000002c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x9, 0x8, 0x0, 0x0, 0x0, 0x4825483b35c83c0b, 0x0, 0x0, 0x40}, [{0x0, 0x1, 0xfff, 0x0, 0x0, 0xff8000000002, 0x0, 0x7fff}], "", [[], [], []]}, 0x378) 11:48:45 executing program 0: syz_mount_image$hfsplus(&(0x7f0000000140)='hfsp\nus\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000a80)={[{@barrier='barrier'}, {@gid={'gid'}}, {@type={'type', 0x3d, "ae8c9d8f"}}]}) [ 400.422537][T14859] IPVS: ftp: loaded support on port[0] = 21 11:48:45 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_ATTACH(0x8, 0x0, 0x0) r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r0, &(0x7f0000000000)={{0x6, @rose}, [@rose, @rose, @default, @netrom, @bcast, @rose, @rose, @null]}, 0x48) r1 = openat$qat_adf_ctl(0xffffffffffffff9c, 0x0, 0x0, 0x0) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r1, 0x6, 0x23, 0x0, 0x0) listen(r0, 0x0) unshare(0x40000000) setrlimit(0x0, 0x0) r2 = accept(r0, 0x0, 0x0) write$binfmt_elf64(r2, &(0x7f00000002c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x9, 0x8, 0x0, 0x0, 0x0, 0x4825483b35c83c0b, 0x0, 0x0, 0x40}, [{0x0, 0x1, 0xfff, 0x0, 0x0, 0x0, 0x0, 0x7fff}], "", [[], [], []]}, 0x378) 11:48:45 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000140)='hfsplxs\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000a80)={[{@barrier='barrier'}, {@gid={'gid'}}, {@type={'type', 0x3d, "ae8c9d8f"}}]}) 11:48:45 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r0, &(0x7f0000000000)={{0x6, @rose}, [@rose, @rose, @default, @netrom, @bcast, @rose, @rose, @null]}, 0x48) openat$qat_adf_ctl(0xffffffffffffff9c, 0x0, 0x8200, 0x0) listen(r0, 0x0) unshare(0x40000000) setrlimit(0x0, 0x0) r1 = accept(r0, 0x0, 0x0) write$binfmt_elf64(r1, &(0x7f00000002c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x9, 0x8, 0x0, 0x0, 0x0, 0x4825483b35c83c0b, 0x0, 0x0, 0x40, 0x227}, [{0x4, 0x1, 0xfff, 0x0, 0x0, 0xff8000000002, 0x0, 0x7fff}], "", [[], [], []]}, 0x378) 11:48:45 executing program 1: setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) setsockopt$netlink_NETLINK_BROADCAST_ERROR(0xffffffffffffffff, 0x10e, 0x4, 0x0, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000100)={0x0, 0x4c00, &(0x7f00000001c0)={&(0x7f0000000040)={0x14, 0x23, 0x1, 0x0, 0x0, {0x20000000004, 0xe00000000000000}}, 0x14}}, 0x0) [ 400.717557][T14875] IPVS: ftp: loaded support on port[0] = 21 [ 400.723877][T14877] IPVS: ftp: loaded support on port[0] = 21 11:48:45 executing program 0: syz_mount_image$hfsplus(&(0x7f0000000140)='hfsp#us\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000a80)={[{@barrier='barrier'}, {@gid={'gid'}}, {@type={'type', 0x3d, "ae8c9d8f"}}]}) 11:48:45 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000140)='hfsplu\n\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000a80)={[{@barrier='barrier'}, {@gid={'gid'}}, {@type={'type', 0x3d, "ae8c9d8f"}}]}) 11:48:45 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r0, &(0x7f0000000000)={{0x6, @rose}, [@rose, @rose, @default, @netrom, @bcast, @rose, @rose, @null]}, 0x48) openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000080)='/dev/qat_adf_ctl\x00', 0x0, 0x0) listen(r0, 0x0) unshare(0x40000000) setrlimit(0x0, 0x0) r1 = accept(r0, 0x0, 0x0) write$binfmt_elf64(r1, &(0x7f00000002c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x9, 0x8, 0x0, 0x0, 0x0, 0x4825483b35c83c0b, 0x0, 0x0, 0x40, 0x227}, [{0x4, 0x1, 0xfff, 0x0, 0x0, 0xff8000000002, 0x0, 0x7fff}], "", [[], [], []]}, 0x378) 11:48:45 executing program 1: setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) setsockopt$netlink_NETLINK_BROADCAST_ERROR(0xffffffffffffffff, 0x10e, 0x4, 0x0, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000100)={0x0, 0x4d00, &(0x7f00000001c0)={&(0x7f0000000040)={0x14, 0x23, 0x1, 0x0, 0x0, {0x20000000004, 0xe00000000000000}}, 0x14}}, 0x0) 11:48:46 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_ATTACH(0x8, 0x0, 0x0) r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r0, &(0x7f0000000000)={{0x6, @rose}, [@rose, @rose, @default, @netrom, @bcast, @rose, @rose, @null]}, 0x48) r1 = openat$qat_adf_ctl(0xffffffffffffff9c, 0x0, 0x0, 0x0) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r1, 0x6, 0x23, 0x0, 0x0) listen(r0, 0x0) unshare(0x40000000) setrlimit(0x0, 0x0) r2 = accept(r0, 0x0, 0x0) write$binfmt_elf64(r2, &(0x7f00000002c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x9, 0x8, 0x0, 0x0, 0x0, 0x4825483b35c83c0b, 0x0, 0x0, 0x40}, [{0x0, 0x1, 0xfff, 0x0, 0x0, 0x0, 0x0, 0x7fff}], "", [[], [], []]}, 0x378) 11:48:46 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_ATTACH(0x8, 0x0, 0x0) r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r0, &(0x7f0000000000)={{0x6, @rose}, [@rose, @rose, @default, @netrom, @bcast, @rose, @rose, @null]}, 0x48) r1 = openat$qat_adf_ctl(0xffffffffffffff9c, 0x0, 0x0, 0x0) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r1, 0x6, 0x23, 0x0, 0x0) unshare(0x40000000) r2 = accept(r0, 0x0, 0x0) write$binfmt_elf64(r2, &(0x7f00000002c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x9, 0x8, 0x0, 0x0, 0x0, 0x4825483b35c83c0b, 0x0, 0x0, 0x40}, [{0x0, 0x1, 0xfff, 0x0, 0x0, 0xff8000000002, 0x0, 0x7fff}], "", [[], [], []]}, 0x378) 11:48:46 executing program 0: syz_mount_image$hfsplus(&(0x7f0000000140)='hfsp%us\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000a80)={[{@barrier='barrier'}, {@gid={'gid'}}, {@type={'type', 0x3d, "ae8c9d8f"}}]}) [ 401.240426][T14904] IPVS: ftp: loaded support on port[0] = 21 [ 401.253194][T14905] IPVS: ftp: loaded support on port[0] = 21 11:48:46 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000140)='hfsplu#\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000a80)={[{@barrier='barrier'}, {@gid={'gid'}}, {@type={'type', 0x3d, "ae8c9d8f"}}]}) 11:48:46 executing program 1: setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) setsockopt$netlink_NETLINK_BROADCAST_ERROR(0xffffffffffffffff, 0x10e, 0x4, 0x0, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000100)={0x0, 0x4e00, &(0x7f00000001c0)={&(0x7f0000000040)={0x14, 0x23, 0x1, 0x0, 0x0, {0x20000000004, 0xe00000000000000}}, 0x14}}, 0x0) [ 401.411433][T14919] IPVS: ftp: loaded support on port[0] = 21 11:48:46 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r0, &(0x7f0000000000)={{0x6, @rose}, [@rose, @rose, @default, @netrom, @bcast, @rose, @rose, @null]}, 0x48) openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000080)='/dev/qat_adf_ctl\x00', 0x0, 0x0) listen(r0, 0x0) unshare(0x40000000) setrlimit(0x0, 0x0) r1 = accept(r0, 0x0, 0x0) write$binfmt_elf64(r1, &(0x7f00000002c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x9, 0x8, 0x0, 0x0, 0x0, 0x4825483b35c83c0b, 0x0, 0x0, 0x40, 0x227}, [{0x4, 0x1, 0xfff, 0x0, 0x0, 0xff8000000002, 0x0, 0x7fff}], "", [[], [], []]}, 0x378) 11:48:46 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000140)='hfsplu%\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000a80)={[{@barrier='barrier'}, {@gid={'gid'}}, {@type={'type', 0x3d, "ae8c9d8f"}}]}) 11:48:46 executing program 0: syz_mount_image$hfsplus(&(0x7f0000000140)='hfsp*us\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000a80)={[{@barrier='barrier'}, {@gid={'gid'}}, {@type={'type', 0x3d, "ae8c9d8f"}}]}) 11:48:46 executing program 1: setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) setsockopt$netlink_NETLINK_BROADCAST_ERROR(0xffffffffffffffff, 0x10e, 0x4, 0x0, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000100)={0x0, 0x4f00, &(0x7f00000001c0)={&(0x7f0000000040)={0x14, 0x23, 0x1, 0x0, 0x0, {0x20000000004, 0xe00000000000000}}, 0x14}}, 0x0) [ 401.838494][T14935] IPVS: ftp: loaded support on port[0] = 21 11:48:46 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000140)='hfsplu*\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000a80)={[{@barrier='barrier'}, {@gid={'gid'}}, {@type={'type', 0x3d, "ae8c9d8f"}}]}) 11:48:46 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_ATTACH(0x8, 0x0, 0x0) r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r0, &(0x7f0000000000)={{0x6, @rose}, [@rose, @rose, @default, @netrom, @bcast, @rose, @rose, @null]}, 0x48) r1 = openat$qat_adf_ctl(0xffffffffffffff9c, 0x0, 0x0, 0x0) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r1, 0x6, 0x23, 0x0, 0x0) listen(r0, 0x0) unshare(0x40000000) setrlimit(0x0, 0x0) r2 = accept(r0, 0x0, 0x0) write$binfmt_elf64(r2, &(0x7f00000002c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x9, 0x8, 0x0, 0x0, 0x0, 0x4825483b35c83c0b, 0x0, 0x0, 0x40}, [{0x0, 0x1, 0xfff, 0x0, 0x0, 0xff8000000002}], "", [[], [], []]}, 0x378) 11:48:47 executing program 0: syz_mount_image$hfsplus(&(0x7f0000000140)='hfsp+us\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000a80)={[{@barrier='barrier'}, {@gid={'gid'}}, {@type={'type', 0x3d, "ae8c9d8f"}}]}) 11:48:47 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_ATTACH(0x8, 0x0, 0x0) r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r0, &(0x7f0000000000)={{0x6, @rose}, [@rose, @rose, @default, @netrom, @bcast, @rose, @rose, @null]}, 0x48) r1 = openat$qat_adf_ctl(0xffffffffffffff9c, 0x0, 0x0, 0x0) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r1, 0x6, 0x23, 0x0, 0x0) unshare(0x40000000) r2 = accept(r0, 0x0, 0x0) write$binfmt_elf64(r2, &(0x7f00000002c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x9, 0x8, 0x0, 0x0, 0x0, 0x4825483b35c83c0b, 0x0, 0x0, 0x40}, [{0x0, 0x1, 0xfff, 0x0, 0x0, 0xff8000000002, 0x0, 0x7fff}], "", [[], [], []]}, 0x378) 11:48:47 executing program 1: setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) setsockopt$netlink_NETLINK_BROADCAST_ERROR(0xffffffffffffffff, 0x10e, 0x4, 0x0, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000100)={0x0, 0x5000, &(0x7f00000001c0)={&(0x7f0000000040)={0x14, 0x23, 0x1, 0x0, 0x0, {0x20000000004, 0xe00000000000000}}, 0x14}}, 0x0) [ 402.168557][T14953] IPVS: ftp: loaded support on port[0] = 21 11:48:47 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000140)='hfsplu+\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000a80)={[{@barrier='barrier'}, {@gid={'gid'}}, {@type={'type', 0x3d, "ae8c9d8f"}}]}) [ 402.333910][T14965] IPVS: ftp: loaded support on port[0] = 21 11:48:47 executing program 1: setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) setsockopt$netlink_NETLINK_BROADCAST_ERROR(0xffffffffffffffff, 0x10e, 0x4, 0x0, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000100)={0x0, 0x5100, &(0x7f00000001c0)={&(0x7f0000000040)={0x14, 0x23, 0x1, 0x0, 0x0, {0x20000000004, 0xe00000000000000}}, 0x14}}, 0x0) 11:48:47 executing program 0: syz_mount_image$hfsplus(&(0x7f0000000140)='hfsp-us\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000a80)={[{@barrier='barrier'}, {@gid={'gid'}}, {@type={'type', 0x3d, "ae8c9d8f"}}]}) 11:48:47 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r0, &(0x7f0000000000)={{0x6, @rose}, [@rose, @rose, @default, @netrom, @bcast, @rose, @rose, @null]}, 0x48) openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000080)='/dev/qat_adf_ctl\x00', 0x0, 0x0) listen(r0, 0x0) unshare(0x40000000) setrlimit(0x0, 0x0) r1 = accept(r0, 0x0, 0x0) write$binfmt_elf64(r1, &(0x7f00000002c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x9, 0x8, 0x0, 0x0, 0x0, 0x4825483b35c83c0b, 0x0, 0x0, 0x40, 0x227}, [{0x4, 0x1, 0xfff, 0x0, 0x0, 0xff8000000002, 0x0, 0x7fff}], "", [[], [], []]}, 0x378) 11:48:47 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000140)='hfsplu-\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000a80)={[{@barrier='barrier'}, {@gid={'gid'}}, {@type={'type', 0x3d, "ae8c9d8f"}}]}) 11:48:47 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_ATTACH(0x8, 0x0, 0x0) r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r0, &(0x7f0000000000)={{0x6, @rose}, [@rose, @rose, @default, @netrom, @bcast, @rose, @rose, @null]}, 0x48) r1 = openat$qat_adf_ctl(0xffffffffffffff9c, 0x0, 0x0, 0x0) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r1, 0x6, 0x23, 0x0, 0x0) listen(r0, 0x0) unshare(0x40000000) setrlimit(0x0, 0x0) r2 = accept(r0, 0x0, 0x0) write$binfmt_elf64(r2, &(0x7f00000002c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x9, 0x8, 0x0, 0x0, 0x0, 0x4825483b35c83c0b, 0x0, 0x0, 0x40}, [{0x0, 0x1, 0xfff, 0x0, 0x0, 0xff8000000002}], "", [[], [], []]}, 0x378) 11:48:47 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_ATTACH(0x8, 0x0, 0x0) r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r0, &(0x7f0000000000)={{0x6, @rose}, [@rose, @rose, @default, @netrom, @bcast, @rose, @rose, @null]}, 0x48) openat$qat_adf_ctl(0xffffffffffffff9c, 0x0, 0x0, 0x0) listen(r0, 0x0) unshare(0x40000000) r1 = accept(r0, 0x0, 0x0) write$binfmt_elf64(r1, &(0x7f00000002c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x9, 0x8, 0x0, 0x0, 0x0, 0x4825483b35c83c0b, 0x0, 0x0, 0x40}, [{0x0, 0x1, 0xfff, 0x0, 0x0, 0xff8000000002, 0x0, 0x7fff}], "", [[], [], []]}, 0x378) [ 402.807445][T14992] IPVS: ftp: loaded support on port[0] = 21 [ 402.828360][T14993] IPVS: ftp: loaded support on port[0] = 21 11:48:47 executing program 0: syz_mount_image$hfsplus(&(0x7f0000000140)='hfsp.us\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000a80)={[{@barrier='barrier'}, {@gid={'gid'}}, {@type={'type', 0x3d, "ae8c9d8f"}}]}) 11:48:47 executing program 1: setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) setsockopt$netlink_NETLINK_BROADCAST_ERROR(0xffffffffffffffff, 0x10e, 0x4, 0x0, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000100)={0x0, 0x5200, &(0x7f00000001c0)={&(0x7f0000000040)={0x14, 0x23, 0x1, 0x0, 0x0, {0x20000000004, 0xe00000000000000}}, 0x14}}, 0x0) [ 402.952170][T15002] IPVS: ftp: loaded support on port[0] = 21 11:48:47 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000140)='hfsplu.\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000a80)={[{@barrier='barrier'}, {@gid={'gid'}}, {@type={'type', 0x3d, "ae8c9d8f"}}]}) 11:48:48 executing program 0: syz_mount_image$hfsplus(&(0x7f0000000140)='hfsp/us\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000a80)={[{@barrier='barrier'}, {@gid={'gid'}}, {@type={'type', 0x3d, "ae8c9d8f"}}]}) 11:48:48 executing program 1: setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) setsockopt$netlink_NETLINK_BROADCAST_ERROR(0xffffffffffffffff, 0x10e, 0x4, 0x0, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000100)={0x0, 0x5300, &(0x7f00000001c0)={&(0x7f0000000040)={0x14, 0x23, 0x1, 0x0, 0x0, {0x20000000004, 0xe00000000000000}}, 0x14}}, 0x0) 11:48:48 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_ATTACH(0x8, 0x0, 0x0) r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r0, &(0x7f0000000000)={{0x6, @rose}, [@rose, @rose, @default, @netrom, @bcast, @rose, @rose, @null]}, 0x48) openat$qat_adf_ctl(0xffffffffffffff9c, 0x0, 0x0, 0x0) listen(r0, 0x0) unshare(0x40000000) r1 = accept(r0, 0x0, 0x0) write$binfmt_elf64(r1, &(0x7f00000002c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x9, 0x8, 0x0, 0x0, 0x0, 0x4825483b35c83c0b, 0x0, 0x0, 0x40}, [{0x0, 0x1, 0xfff, 0x0, 0x0, 0xff8000000002, 0x0, 0x7fff}], "", [[], [], []]}, 0x378) 11:48:48 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000140)='hfsplu/\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000a80)={[{@barrier='barrier'}, {@gid={'gid'}}, {@type={'type', 0x3d, "ae8c9d8f"}}]}) 11:48:48 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r0, &(0x7f0000000000)={{0x6, @rose}, [@rose, @rose, @default, @netrom, @bcast, @rose, @rose, @null]}, 0x48) openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000080)='/dev/qat_adf_ctl\x00', 0x8200, 0x0) listen(0xffffffffffffffff, 0x0) unshare(0x40000000) setrlimit(0x0, 0x0) r1 = accept(r0, 0x0, 0x0) write$binfmt_elf64(r1, &(0x7f00000002c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x9, 0x8, 0x0, 0x0, 0x0, 0x4825483b35c83c0b, 0x0, 0x0, 0x40, 0x227}, [{0x4, 0x1, 0xfff, 0x0, 0x0, 0xff8000000002, 0x0, 0x7fff}], "", [[], [], []]}, 0x378) 11:48:48 executing program 1: setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) setsockopt$netlink_NETLINK_BROADCAST_ERROR(0xffffffffffffffff, 0x10e, 0x4, 0x0, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000100)={0x0, 0x5400, &(0x7f00000001c0)={&(0x7f0000000040)={0x14, 0x23, 0x1, 0x0, 0x0, {0x20000000004, 0xe00000000000000}}, 0x14}}, 0x0) 11:48:48 executing program 0: syz_mount_image$hfsplus(&(0x7f0000000140)='hfsp0us\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000a80)={[{@barrier='barrier'}, {@gid={'gid'}}, {@type={'type', 0x3d, "ae8c9d8f"}}]}) [ 403.575661][T15031] IPVS: ftp: loaded support on port[0] = 21 11:48:48 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_ATTACH(0x8, 0x0, 0x0) r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r0, &(0x7f0000000000)={{0x6, @rose}, [@rose, @rose, @default, @netrom, @bcast, @rose, @rose, @null]}, 0x48) r1 = openat$qat_adf_ctl(0xffffffffffffff9c, 0x0, 0x0, 0x0) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r1, 0x6, 0x23, 0x0, 0x0) listen(r0, 0x0) unshare(0x40000000) setrlimit(0x0, 0x0) r2 = accept(r0, 0x0, 0x0) write$binfmt_elf64(r2, &(0x7f00000002c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x9, 0x8, 0x0, 0x0, 0x0, 0x4825483b35c83c0b, 0x0, 0x0, 0x40}, [{0x0, 0x1, 0xfff, 0x0, 0x0, 0xff8000000002}], "", [[], [], []]}, 0x378) 11:48:48 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000140)='hfsplu0\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000a80)={[{@barrier='barrier'}, {@gid={'gid'}}, {@type={'type', 0x3d, "ae8c9d8f"}}]}) [ 403.784109][T15049] IPVS: ftp: loaded support on port[0] = 21 11:48:48 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_ATTACH(0x8, 0x0, 0x0) r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r0, &(0x7f0000000000)={{0x6, @rose}, [@rose, @rose, @default, @netrom, @bcast, @rose, @rose, @null]}, 0x48) openat$qat_adf_ctl(0xffffffffffffff9c, 0x0, 0x0, 0x0) listen(r0, 0x0) unshare(0x40000000) r1 = accept(r0, 0x0, 0x0) write$binfmt_elf64(r1, &(0x7f00000002c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x9, 0x8, 0x0, 0x0, 0x0, 0x4825483b35c83c0b, 0x0, 0x0, 0x40}, [{0x0, 0x1, 0xfff, 0x0, 0x0, 0xff8000000002, 0x0, 0x7fff}], "", [[], [], []]}, 0x378) [ 403.842242][T15052] IPVS: ftp: loaded support on port[0] = 21 11:48:48 executing program 0: syz_mount_image$hfsplus(&(0x7f0000000140)='hfspLus\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000a80)={[{@barrier='barrier'}, {@gid={'gid'}}, {@type={'type', 0x3d, "ae8c9d8f"}}]}) 11:48:48 executing program 1: setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) setsockopt$netlink_NETLINK_BROADCAST_ERROR(0xffffffffffffffff, 0x10e, 0x4, 0x0, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000100)={0x0, 0x5500, &(0x7f00000001c0)={&(0x7f0000000040)={0x14, 0x23, 0x1, 0x0, 0x0, {0x20000000004, 0xe00000000000000}}, 0x14}}, 0x0) [ 404.103200][T15064] IPVS: ftp: loaded support on port[0] = 21 11:48:49 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000140)='hfspluX\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000a80)={[{@barrier='barrier'}, {@gid={'gid'}}, {@type={'type', 0x3d, "ae8c9d8f"}}]}) 11:48:49 executing program 1: setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) setsockopt$netlink_NETLINK_BROADCAST_ERROR(0xffffffffffffffff, 0x10e, 0x4, 0x0, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000100)={0x0, 0x6000, &(0x7f00000001c0)={&(0x7f0000000040)={0x14, 0x23, 0x1, 0x0, 0x0, {0x20000000004, 0xe00000000000000}}, 0x14}}, 0x0) 11:48:49 executing program 0: syz_mount_image$hfsplus(&(0x7f0000000140)='hfspXus\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000a80)={[{@barrier='barrier'}, {@gid={'gid'}}, {@type={'type', 0x3d, "ae8c9d8f"}}]}) 11:48:49 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_ATTACH(0x8, 0x0, 0x0) r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r0, &(0x7f0000000000)={{0x6, @rose}, [@rose, @rose, @default, @netrom, @bcast, @rose, @rose, @null]}, 0x48) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(0xffffffffffffffff, 0x6, 0x23, 0x0, 0x0) listen(r0, 0x0) unshare(0x40000000) r1 = accept(r0, 0x0, 0x0) write$binfmt_elf64(r1, &(0x7f00000002c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x9, 0x8, 0x0, 0x0, 0x0, 0x4825483b35c83c0b, 0x0, 0x0, 0x40}, [{0x0, 0x1, 0xfff, 0x0, 0x0, 0xff8000000002, 0x0, 0x7fff}], "", [[], [], []]}, 0x378) 11:48:49 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r0, &(0x7f0000000000)={{0x6, @rose}, [@rose, @rose, @default, @netrom, @bcast, @rose, @rose, @null]}, 0x48) openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000080)='/dev/qat_adf_ctl\x00', 0x8200, 0x0) listen(0xffffffffffffffff, 0x0) unshare(0x40000000) setrlimit(0x0, 0x0) r1 = accept(r0, 0x0, 0x0) write$binfmt_elf64(r1, &(0x7f00000002c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x9, 0x8, 0x0, 0x0, 0x0, 0x4825483b35c83c0b, 0x0, 0x0, 0x40, 0x227}, [{0x4, 0x1, 0xfff, 0x0, 0x0, 0xff8000000002, 0x0, 0x7fff}], "", [[], [], []]}, 0x378) 11:48:49 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_ATTACH(0x8, 0x0, 0x0) r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r0, &(0x7f0000000000)={{0x6, @rose}, [@rose, @rose, @default, @netrom, @bcast, @rose, @rose, @null]}, 0x48) r1 = openat$qat_adf_ctl(0xffffffffffffff9c, 0x0, 0x0, 0x0) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r1, 0x6, 0x23, 0x0, 0x0) listen(r0, 0x0) unshare(0x40000000) setrlimit(0x0, 0x0) r2 = accept(r0, 0x0, 0x0) write$binfmt_elf64(r2, &(0x7f00000002c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x9, 0x8, 0x0, 0x0, 0x0, 0x4825483b35c83c0b, 0x0, 0x0, 0x40}, [{0x0, 0x1, 0xfff, 0x0, 0x0, 0xff8000000002, 0x0, 0x7fff}], "", [[], []]}, 0x278) 11:48:49 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000140)='hfsplu\\\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000a80)={[{@barrier='barrier'}, {@gid={'gid'}}, {@type={'type', 0x3d, "ae8c9d8f"}}]}) 11:48:49 executing program 1: setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) setsockopt$netlink_NETLINK_BROADCAST_ERROR(0xffffffffffffffff, 0x10e, 0x4, 0x0, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000100)={0x0, 0x6800, &(0x7f00000001c0)={&(0x7f0000000040)={0x14, 0x23, 0x1, 0x0, 0x0, {0x20000000004, 0xe00000000000000}}, 0x14}}, 0x0) [ 404.668293][T15093] IPVS: ftp: loaded support on port[0] = 21 [ 404.742680][T15098] IPVS: ftp: loaded support on port[0] = 21 [ 404.762367][T15101] IPVS: ftp: loaded support on port[0] = 21 11:48:49 executing program 0: syz_mount_image$hfsplus(&(0x7f0000000140)='hfsp\\us\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000a80)={[{@barrier='barrier'}, {@gid={'gid'}}, {@type={'type', 0x3d, "ae8c9d8f"}}]}) 11:48:49 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000140)='hfspluc\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000a80)={[{@barrier='barrier'}, {@gid={'gid'}}, {@type={'type', 0x3d, "ae8c9d8f"}}]}) 11:48:50 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_ATTACH(0x8, 0x0, 0x0) r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r0, &(0x7f0000000000)={{0x6, @rose}, [@rose, @rose, @default, @netrom, @bcast, @rose, @rose, @null]}, 0x48) r1 = openat$qat_adf_ctl(0xffffffffffffff9c, 0x0, 0x0, 0x0) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r1, 0x6, 0x23, 0x0, 0x0) listen(r0, 0x0) unshare(0x40000000) setrlimit(0x0, 0x0) r2 = accept(r0, 0x0, 0x0) write$binfmt_elf64(r2, &(0x7f00000002c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x9, 0x8, 0x0, 0x0, 0x0, 0x4825483b35c83c0b, 0x0, 0x0, 0x40}, [{0x0, 0x1, 0xfff, 0x0, 0x0, 0xff8000000002, 0x0, 0x7fff}], "", [[], []]}, 0x278) 11:48:50 executing program 1: setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) setsockopt$netlink_NETLINK_BROADCAST_ERROR(0xffffffffffffffff, 0x10e, 0x4, 0x0, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000100)={0x0, 0x6c00, &(0x7f00000001c0)={&(0x7f0000000040)={0x14, 0x23, 0x1, 0x0, 0x0, {0x20000000004, 0xe00000000000000}}, 0x14}}, 0x0) 11:48:50 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_ATTACH(0x8, 0x0, 0x0) r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r0, &(0x7f0000000000)={{0x6, @rose}, [@rose, @rose, @default, @netrom, @bcast, @rose, @rose, @null]}, 0x48) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(0xffffffffffffffff, 0x6, 0x23, 0x0, 0x0) listen(r0, 0x0) unshare(0x40000000) r1 = accept(r0, 0x0, 0x0) write$binfmt_elf64(r1, &(0x7f00000002c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x9, 0x8, 0x0, 0x0, 0x0, 0x4825483b35c83c0b, 0x0, 0x0, 0x40}, [{0x0, 0x1, 0xfff, 0x0, 0x0, 0xff8000000002, 0x0, 0x7fff}], "", [[], [], []]}, 0x378) 11:48:50 executing program 0: syz_mount_image$hfsplus(&(0x7f0000000140)='hfspuus\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000a80)={[{@barrier='barrier'}, {@gid={'gid'}}, {@type={'type', 0x3d, "ae8c9d8f"}}]}) [ 405.322525][T15130] IPVS: ftp: loaded support on port[0] = 21 [ 405.363000][T15133] IPVS: ftp: loaded support on port[0] = 21 11:48:50 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000140)='hfsplud\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000a80)={[{@barrier='barrier'}, {@gid={'gid'}}, {@type={'type', 0x3d, "ae8c9d8f"}}]}) 11:48:50 executing program 1: setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) setsockopt$netlink_NETLINK_BROADCAST_ERROR(0xffffffffffffffff, 0x10e, 0x4, 0x0, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000100)={0x0, 0x7400, &(0x7f00000001c0)={&(0x7f0000000040)={0x14, 0x23, 0x1, 0x0, 0x0, {0x20000000004, 0xe00000000000000}}, 0x14}}, 0x0) 11:48:50 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r0, &(0x7f0000000000)={{0x6, @rose}, [@rose, @rose, @default, @netrom, @bcast, @rose, @rose, @null]}, 0x48) openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000080)='/dev/qat_adf_ctl\x00', 0x8200, 0x0) listen(0xffffffffffffffff, 0x0) unshare(0x40000000) setrlimit(0x0, 0x0) r1 = accept(r0, 0x0, 0x0) write$binfmt_elf64(r1, &(0x7f00000002c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x9, 0x8, 0x0, 0x0, 0x0, 0x4825483b35c83c0b, 0x0, 0x0, 0x40, 0x227}, [{0x4, 0x1, 0xfff, 0x0, 0x0, 0xff8000000002, 0x0, 0x7fff}], "", [[], [], []]}, 0x378) 11:48:50 executing program 0: syz_mount_image$hfsplus(&(0x7f0000000140)='hfspl\ns\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000a80)={[{@barrier='barrier'}, {@gid={'gid'}}, {@type={'type', 0x3d, "ae8c9d8f"}}]}) 11:48:50 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_ATTACH(0x8, 0x0, 0x0) r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r0, &(0x7f0000000000)={{0x6, @rose}, [@rose, @rose, @default, @netrom, @bcast, @rose, @rose, @null]}, 0x48) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(0xffffffffffffffff, 0x6, 0x23, 0x0, 0x0) listen(r0, 0x0) unshare(0x40000000) r1 = accept(r0, 0x0, 0x0) write$binfmt_elf64(r1, &(0x7f00000002c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x9, 0x8, 0x0, 0x0, 0x0, 0x4825483b35c83c0b, 0x0, 0x0, 0x40}, [{0x0, 0x1, 0xfff, 0x0, 0x0, 0xff8000000002, 0x0, 0x7fff}], "", [[], [], []]}, 0x378) [ 405.773479][T15151] IPVS: ftp: loaded support on port[0] = 21 [ 405.982431][T15164] IPVS: ftp: loaded support on port[0] = 21 11:48:50 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_ATTACH(0x8, 0x0, 0x0) r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r0, &(0x7f0000000000)={{0x6, @rose}, [@rose, @rose, @default, @netrom, @bcast, @rose, @rose, @null]}, 0x48) r1 = openat$qat_adf_ctl(0xffffffffffffff9c, 0x0, 0x0, 0x0) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r1, 0x6, 0x23, 0x0, 0x0) listen(r0, 0x0) unshare(0x40000000) setrlimit(0x0, 0x0) r2 = accept(r0, 0x0, 0x0) write$binfmt_elf64(r2, &(0x7f00000002c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x9, 0x8, 0x0, 0x0, 0x0, 0x4825483b35c83c0b, 0x0, 0x0, 0x40}, [{0x0, 0x1, 0xfff, 0x0, 0x0, 0xff8000000002, 0x0, 0x7fff}], "", [[], []]}, 0x278) 11:48:50 executing program 1: setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) setsockopt$netlink_NETLINK_BROADCAST_ERROR(0xffffffffffffffff, 0x10e, 0x4, 0x0, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000100)={0x0, 0x7a00, &(0x7f00000001c0)={&(0x7f0000000040)={0x14, 0x23, 0x1, 0x0, 0x0, {0x20000000004, 0xe00000000000000}}, 0x14}}, 0x0) 11:48:51 executing program 0: syz_mount_image$hfsplus(&(0x7f0000000140)='hfspl#s\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000a80)={[{@barrier='barrier'}, {@gid={'gid'}}, {@type={'type', 0x3d, "ae8c9d8f"}}]}) 11:48:51 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000140)='hfsplui\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000a80)={[{@barrier='barrier'}, {@gid={'gid'}}, {@type={'type', 0x3d, "ae8c9d8f"}}]}) 11:48:51 executing program 1: setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) setsockopt$netlink_NETLINK_BROADCAST_ERROR(0xffffffffffffffff, 0x10e, 0x4, 0x0, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000100)={0x0, 0xa087, &(0x7f00000001c0)={&(0x7f0000000040)={0x14, 0x23, 0x1, 0x0, 0x0, {0x20000000004, 0xe00000000000000}}, 0x14}}, 0x0) [ 406.231485][T15179] IPVS: ftp: loaded support on port[0] = 21 11:48:51 executing program 0: syz_mount_image$hfsplus(&(0x7f0000000140)='hfspl%s\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000a80)={[{@barrier='barrier'}, {@gid={'gid'}}, {@type={'type', 0x3d, "ae8c9d8f"}}]}) 11:48:51 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r0, &(0x7f0000000000)={{0x6, @rose}, [@rose, @rose, @default, @netrom, @bcast, @rose, @rose, @null]}, 0x48) openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000080)='/dev/qat_adf_ctl\x00', 0x8200, 0x0) listen(r0, 0x0) unshare(0x0) setrlimit(0x0, 0x0) r1 = accept(r0, 0x0, 0x0) write$binfmt_elf64(r1, &(0x7f00000002c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x9, 0x8, 0x0, 0x0, 0x0, 0x4825483b35c83c0b, 0x0, 0x0, 0x40, 0x227}, [{0x4, 0x1, 0xfff, 0x0, 0x0, 0xff8000000002, 0x0, 0x7fff}], "", [[], [], []]}, 0x378) 11:48:51 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000140)='hfsplul\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000a80)={[{@barrier='barrier'}, {@gid={'gid'}}, {@type={'type', 0x3d, "ae8c9d8f"}}]}) 11:48:51 executing program 1: setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) setsockopt$netlink_NETLINK_BROADCAST_ERROR(0xffffffffffffffff, 0x10e, 0x4, 0x0, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000100)={0x0, 0xf000, &(0x7f00000001c0)={&(0x7f0000000040)={0x14, 0x23, 0x1, 0x0, 0x0, {0x20000000004, 0xe00000000000000}}, 0x14}}, 0x0) 11:48:51 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_ATTACH(0x8, 0x0, 0x0) r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r0, &(0x7f0000000000)={{0x6, @rose}, [@rose, @rose, @default, @netrom, @bcast, @rose, @rose, @null]}, 0x48) r1 = openat$qat_adf_ctl(0xffffffffffffff9c, 0x0, 0x0, 0x0) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r1, 0x6, 0x23, 0x0, 0x0) listen(r0, 0x0) unshare(0x40000000) setrlimit(0x0, 0x0) r2 = accept(r0, 0x0, 0x0) write$binfmt_elf64(r2, &(0x7f00000002c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x9, 0x8, 0x0, 0x0, 0x0, 0x4825483b35c83c0b, 0x0, 0x0, 0x40}, [{0x0, 0x1, 0xfff, 0x0, 0x0, 0xff8000000002, 0x0, 0x7fff}], "", [[]]}, 0x178) 11:48:51 executing program 1: setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) setsockopt$netlink_NETLINK_BROADCAST_ERROR(0xffffffffffffffff, 0x10e, 0x4, 0x0, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000100)={0x0, 0xf400, &(0x7f00000001c0)={&(0x7f0000000040)={0x14, 0x23, 0x1, 0x0, 0x0, {0x20000000004, 0xe00000000000000}}, 0x14}}, 0x0) 11:48:51 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_ATTACH(0x8, 0x0, 0x0) r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) r1 = openat$qat_adf_ctl(0xffffffffffffff9c, 0x0, 0x0, 0x0) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r1, 0x6, 0x23, 0x0, 0x0) listen(r0, 0x0) unshare(0x40000000) r2 = accept(r0, 0x0, 0x0) write$binfmt_elf64(r2, &(0x7f00000002c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x9, 0x8, 0x0, 0x0, 0x0, 0x4825483b35c83c0b, 0x0, 0x0, 0x40}, [{0x0, 0x1, 0xfff, 0x0, 0x0, 0xff8000000002, 0x0, 0x7fff}], "", [[], [], []]}, 0x378) 11:48:51 executing program 0: syz_mount_image$hfsplus(&(0x7f0000000140)='hfspl*s\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000a80)={[{@barrier='barrier'}, {@gid={'gid'}}, {@type={'type', 0x3d, "ae8c9d8f"}}]}) [ 406.749018][T15207] IPVS: ftp: loaded support on port[0] = 21 11:48:51 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000140)='hfspluo\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000a80)={[{@barrier='barrier'}, {@gid={'gid'}}, {@type={'type', 0x3d, "ae8c9d8f"}}]}) [ 406.986535][T15213] IPVS: ftp: loaded support on port[0] = 21 11:48:52 executing program 0: syz_mount_image$hfsplus(&(0x7f0000000140)='hfspl+s\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000a80)={[{@barrier='barrier'}, {@gid={'gid'}}, {@type={'type', 0x3d, "ae8c9d8f"}}]}) 11:48:52 executing program 1: setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) setsockopt$netlink_NETLINK_BROADCAST_ERROR(0xffffffffffffffff, 0x10e, 0x4, 0x0, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000100)={0x0, 0x185b5, &(0x7f00000001c0)={&(0x7f0000000040)={0x14, 0x23, 0x1, 0x0, 0x0, {0x20000000004, 0xe00000000000000}}, 0x14}}, 0x0) 11:48:52 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000140)='hfsplup\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000a80)={[{@barrier='barrier'}, {@gid={'gid'}}, {@type={'type', 0x3d, "ae8c9d8f"}}]}) 11:48:52 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r0, &(0x7f0000000000)={{0x6, @rose}, [@rose, @rose, @default, @netrom, @bcast, @rose, @rose, @null]}, 0x48) openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000080)='/dev/qat_adf_ctl\x00', 0x8200, 0x0) listen(r0, 0x0) unshare(0x0) setrlimit(0x0, 0x0) r1 = accept(r0, 0x0, 0x0) write$binfmt_elf64(r1, &(0x7f00000002c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x9, 0x8, 0x0, 0x0, 0x0, 0x4825483b35c83c0b, 0x0, 0x0, 0x40, 0x227}, [{0x4, 0x1, 0xfff, 0x0, 0x0, 0xff8000000002, 0x0, 0x7fff}], "", [[], [], []]}, 0x378) 11:48:52 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r0, &(0x7f0000000000)={{0x6, @rose}, [@rose, @rose, @default, @netrom, @bcast, @rose, @rose, @null]}, 0x48) openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000080)='/dev/qat_adf_ctl\x00', 0x8200, 0x0) listen(r0, 0x0) unshare(0x0) setrlimit(0x0, 0x0) r1 = accept(r0, 0x0, 0x0) write$binfmt_elf64(r1, &(0x7f00000002c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x9, 0x8, 0x0, 0x0, 0x0, 0x4825483b35c83c0b, 0x0, 0x0, 0x40, 0x227}, [{0x4, 0x1, 0xfff, 0x0, 0x0, 0xff8000000002, 0x0, 0x7fff}], "", [[], [], []]}, 0x378) 11:48:52 executing program 0: syz_mount_image$hfsplus(&(0x7f0000000140)='hfspl-s\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000a80)={[{@barrier='barrier'}, {@gid={'gid'}}, {@type={'type', 0x3d, "ae8c9d8f"}}]}) 11:48:52 executing program 1: setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) setsockopt$netlink_NETLINK_BROADCAST_ERROR(0xffffffffffffffff, 0x10e, 0x4, 0x0, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000100)={0x0, 0x185b6, &(0x7f00000001c0)={&(0x7f0000000040)={0x14, 0x23, 0x1, 0x0, 0x0, {0x20000000004, 0xe00000000000000}}, 0x14}}, 0x0) 11:48:56 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_ATTACH(0x8, 0x0, 0x0) r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r0, &(0x7f0000000000)={{0x6, @rose}, [@rose, @rose, @default, @netrom, @bcast, @rose, @rose, @null]}, 0x48) r1 = openat$qat_adf_ctl(0xffffffffffffff9c, 0x0, 0x0, 0x0) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r1, 0x6, 0x23, 0x0, 0x0) listen(r0, 0x0) unshare(0x40000000) setrlimit(0x0, 0x0) r2 = accept(r0, 0x0, 0x0) write$binfmt_elf64(r2, &(0x7f00000002c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x9, 0x8, 0x0, 0x0, 0x0, 0x4825483b35c83c0b, 0x0, 0x0, 0x40}, [{0x0, 0x1, 0xfff, 0x0, 0x0, 0xff8000000002, 0x0, 0x7fff}], "", [[]]}, 0x178) 11:48:56 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000140)='hfspluu\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000a80)={[{@barrier='barrier'}, {@gid={'gid'}}, {@type={'type', 0x3d, "ae8c9d8f"}}]}) 11:48:56 executing program 0: syz_mount_image$hfsplus(&(0x7f0000000140)='hfspl.s\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000a80)={[{@barrier='barrier'}, {@gid={'gid'}}, {@type={'type', 0x3d, "ae8c9d8f"}}]}) 11:48:56 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r0, &(0x7f0000000000)={{0x6, @rose}, [@rose, @rose, @default, @netrom, @bcast, @rose, @rose, @null]}, 0x48) openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000080)='/dev/qat_adf_ctl\x00', 0x8200, 0x0) listen(r0, 0x0) unshare(0x40000000) setrlimit(0x0, 0x0) r1 = accept(0xffffffffffffffff, 0x0, 0x0) write$binfmt_elf64(r1, &(0x7f00000002c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x9, 0x8, 0x0, 0x0, 0x0, 0x4825483b35c83c0b, 0x0, 0x0, 0x40, 0x227}, [{0x4, 0x1, 0xfff, 0x0, 0x0, 0xff8000000002, 0x0, 0x7fff}], "", [[], [], []]}, 0x378) 11:48:56 executing program 1: setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) setsockopt$netlink_NETLINK_BROADCAST_ERROR(0xffffffffffffffff, 0x10e, 0x4, 0x0, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000100)={0x0, 0x185b7, &(0x7f00000001c0)={&(0x7f0000000040)={0x14, 0x23, 0x1, 0x0, 0x0, {0x20000000004, 0xe00000000000000}}, 0x14}}, 0x0) 11:48:56 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_ATTACH(0x8, 0x0, 0x0) r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) r1 = openat$qat_adf_ctl(0xffffffffffffff9c, 0x0, 0x0, 0x0) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r1, 0x6, 0x23, 0x0, 0x0) listen(r0, 0x0) unshare(0x40000000) r2 = accept(r0, 0x0, 0x0) write$binfmt_elf64(r2, &(0x7f00000002c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x9, 0x8, 0x0, 0x0, 0x0, 0x4825483b35c83c0b, 0x0, 0x0, 0x40}, [{0x0, 0x1, 0xfff, 0x0, 0x0, 0xff8000000002, 0x0, 0x7fff}], "", [[], [], []]}, 0x378) [ 411.661366][T15280] IPVS: ftp: loaded support on port[0] = 21 11:48:56 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000140)='hfsplux\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000a80)={[{@barrier='barrier'}, {@gid={'gid'}}, {@type={'type', 0x3d, "ae8c9d8f"}}]}) [ 411.709637][T15284] IPVS: ftp: loaded support on port[0] = 21 [ 411.740707][T15272] IPVS: ftp: loaded support on port[0] = 21 11:48:56 executing program 1: setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) setsockopt$netlink_NETLINK_BROADCAST_ERROR(0xffffffffffffffff, 0x10e, 0x4, 0x0, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000100)={0x0, 0x185b8, &(0x7f00000001c0)={&(0x7f0000000040)={0x14, 0x23, 0x1, 0x0, 0x0, {0x20000000004, 0xe00000000000000}}, 0x14}}, 0x0) 11:48:56 executing program 0: syz_mount_image$hfsplus(&(0x7f0000000140)='hfspl0s\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000a80)={[{@barrier='barrier'}, {@gid={'gid'}}, {@type={'type', 0x3d, "ae8c9d8f"}}]}) 11:48:57 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_ATTACH(0x8, 0x0, 0x0) r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r0, &(0x7f0000000000)={{0x6, @rose}, [@rose, @rose, @default, @netrom, @bcast, @rose, @rose, @null]}, 0x48) r1 = openat$qat_adf_ctl(0xffffffffffffff9c, 0x0, 0x0, 0x0) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r1, 0x6, 0x23, 0x0, 0x0) listen(r0, 0x0) unshare(0x40000000) setrlimit(0x0, 0x0) r2 = accept(r0, 0x0, 0x0) write$binfmt_elf64(r2, &(0x7f00000002c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x9, 0x8, 0x0, 0x0, 0x0, 0x4825483b35c83c0b, 0x0, 0x0, 0x40}, [{0x0, 0x1, 0xfff, 0x0, 0x0, 0xff8000000002, 0x0, 0x7fff}]}, 0x78) 11:48:57 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r0, &(0x7f0000000000)={{0x6, @rose}, [@rose, @rose, @default, @netrom, @bcast, @rose, @rose, @null]}, 0x48) openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000080)='/dev/qat_adf_ctl\x00', 0x8200, 0x0) listen(r0, 0x0) unshare(0x40000000) setrlimit(0x0, 0x0) r1 = accept(0xffffffffffffffff, 0x0, 0x0) write$binfmt_elf64(r1, &(0x7f00000002c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x9, 0x8, 0x0, 0x0, 0x0, 0x4825483b35c83c0b, 0x0, 0x0, 0x40, 0x227}, [{0x4, 0x1, 0xfff, 0x0, 0x0, 0xff8000000002, 0x0, 0x7fff}], "", [[], [], []]}, 0x378) 11:48:57 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000140)='hfsplus\x02', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000a80)={[{@barrier='barrier'}, {@gid={'gid'}}, {@type={'type', 0x3d, "ae8c9d8f"}}]}) 11:48:57 executing program 0: syz_mount_image$hfsplus(&(0x7f0000000140)='hfsplXs\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000a80)={[{@barrier='barrier'}, {@gid={'gid'}}, {@type={'type', 0x3d, "ae8c9d8f"}}]}) 11:48:57 executing program 1: setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) setsockopt$netlink_NETLINK_BROADCAST_ERROR(0xffffffffffffffff, 0x10e, 0x4, 0x0, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000100)={0x0, 0x185b9, &(0x7f00000001c0)={&(0x7f0000000040)={0x14, 0x23, 0x1, 0x0, 0x0, {0x20000000004, 0xe00000000000000}}, 0x14}}, 0x0) [ 412.281524][T15310] IPVS: ftp: loaded support on port[0] = 21 [ 412.330497][T15314] IPVS: ftp: loaded support on port[0] = 21 11:48:57 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000140)='hfsplus\x03', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000a80)={[{@barrier='barrier'}, {@gid={'gid'}}, {@type={'type', 0x3d, "ae8c9d8f"}}]}) 11:48:57 executing program 0: syz_mount_image$hfsplus(&(0x7f0000000140)='hfspl\\s\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000a80)={[{@barrier='barrier'}, {@gid={'gid'}}, {@type={'type', 0x3d, "ae8c9d8f"}}]}) 11:48:57 executing program 1: setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) setsockopt$netlink_NETLINK_BROADCAST_ERROR(0xffffffffffffffff, 0x10e, 0x4, 0x0, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000100)={0x0, 0x185ba, &(0x7f00000001c0)={&(0x7f0000000040)={0x14, 0x23, 0x1, 0x0, 0x0, {0x20000000004, 0xe00000000000000}}, 0x14}}, 0x0) 11:49:00 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_ATTACH(0x8, 0x0, 0x0) r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) r1 = openat$qat_adf_ctl(0xffffffffffffff9c, 0x0, 0x0, 0x0) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r1, 0x6, 0x23, 0x0, 0x0) listen(r0, 0x0) unshare(0x40000000) r2 = accept(r0, 0x0, 0x0) write$binfmt_elf64(r2, &(0x7f00000002c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x9, 0x8, 0x0, 0x0, 0x0, 0x4825483b35c83c0b, 0x0, 0x0, 0x40}, [{0x0, 0x1, 0xfff, 0x0, 0x0, 0xff8000000002, 0x0, 0x7fff}], "", [[], [], []]}, 0x378) 11:49:00 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r0, &(0x7f0000000000)={{0x6, @rose}, [@rose, @rose, @default, @netrom, @bcast, @rose, @rose, @null]}, 0x48) openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000080)='/dev/qat_adf_ctl\x00', 0x8200, 0x0) listen(r0, 0x0) unshare(0x40000000) setrlimit(0x0, 0x0) r1 = accept(0xffffffffffffffff, 0x0, 0x0) write$binfmt_elf64(r1, &(0x7f00000002c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x9, 0x8, 0x0, 0x0, 0x0, 0x4825483b35c83c0b, 0x0, 0x0, 0x40, 0x227}, [{0x4, 0x1, 0xfff, 0x0, 0x0, 0xff8000000002, 0x0, 0x7fff}], "", [[], [], []]}, 0x378) 11:49:00 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_ATTACH(0x8, 0x0, 0x0) r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r0, &(0x7f0000000000)={{0x6, @rose}, [@rose, @rose, @default, @netrom, @bcast, @rose, @rose, @null]}, 0x48) r1 = openat$qat_adf_ctl(0xffffffffffffff9c, 0x0, 0x0, 0x0) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r1, 0x6, 0x23, 0x0, 0x0) listen(r0, 0x0) unshare(0x40000000) setrlimit(0x0, 0x0) r2 = accept(r0, 0x0, 0x0) write$binfmt_elf64(r2, &(0x7f00000002c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x9, 0x8, 0x0, 0x0, 0x0, 0x4825483b35c83c0b, 0x0, 0x0, 0x40}, [{0x0, 0x1, 0xfff, 0x0, 0x0, 0xff8000000002, 0x0, 0x7fff}]}, 0x78) 11:49:00 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000140)='hfsplus\x04', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000a80)={[{@barrier='barrier'}, {@gid={'gid'}}, {@type={'type', 0x3d, "ae8c9d8f"}}]}) 11:49:00 executing program 0: syz_mount_image$hfsplus(&(0x7f0000000140)='hfsplcs\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000a80)={[{@barrier='barrier'}, {@gid={'gid'}}, {@type={'type', 0x3d, "ae8c9d8f"}}]}) 11:49:00 executing program 1: setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) setsockopt$netlink_NETLINK_BROADCAST_ERROR(0xffffffffffffffff, 0x10e, 0x4, 0x0, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000100)={0x0, 0x185bb, &(0x7f00000001c0)={&(0x7f0000000040)={0x14, 0x23, 0x1, 0x0, 0x0, {0x20000000004, 0xe00000000000000}}, 0x14}}, 0x0) [ 415.916870][T15360] IPVS: ftp: loaded support on port[0] = 21 11:49:00 executing program 0: syz_mount_image$hfsplus(&(0x7f0000000140)='hfsplds\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000a80)={[{@barrier='barrier'}, {@gid={'gid'}}, {@type={'type', 0x3d, "ae8c9d8f"}}]}) 11:49:00 executing program 1: setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) setsockopt$netlink_NETLINK_BROADCAST_ERROR(0xffffffffffffffff, 0x10e, 0x4, 0x0, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000100)={0x0, 0x185bc, &(0x7f00000001c0)={&(0x7f0000000040)={0x14, 0x23, 0x1, 0x0, 0x0, {0x20000000004, 0xe00000000000000}}, 0x14}}, 0x0) [ 415.970343][T15345] IPVS: ftp: loaded support on port[0] = 21 11:49:00 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000140)='hfsplus\x05', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000a80)={[{@barrier='barrier'}, {@gid={'gid'}}, {@type={'type', 0x3d, "ae8c9d8f"}}]}) [ 416.101553][T15361] IPVS: ftp: loaded support on port[0] = 21 11:49:01 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r0, &(0x7f0000000000)={{0x6, @rose}, [@rose, @rose, @default, @netrom, @bcast, @rose, @rose, @null]}, 0x48) openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000080)='/dev/qat_adf_ctl\x00', 0x8200, 0x0) listen(r0, 0x0) unshare(0x40000000) setrlimit(0x0, 0x0) accept(r0, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000002c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x9, 0x8, 0x0, 0x0, 0x0, 0x4825483b35c83c0b, 0x0, 0x0, 0x40, 0x227}, [{0x4, 0x1, 0xfff, 0x0, 0x0, 0xff8000000002, 0x0, 0x7fff}], "", [[], [], []]}, 0x378) 11:49:01 executing program 0: syz_mount_image$hfsplus(&(0x7f0000000140)='hfsplis\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000a80)={[{@barrier='barrier'}, {@gid={'gid'}}, {@type={'type', 0x3d, "ae8c9d8f"}}]}) 11:49:01 executing program 1: setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) setsockopt$netlink_NETLINK_BROADCAST_ERROR(0xffffffffffffffff, 0x10e, 0x4, 0x0, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000100)={0x0, 0x185bd, &(0x7f00000001c0)={&(0x7f0000000040)={0x14, 0x23, 0x1, 0x0, 0x0, {0x20000000004, 0xe00000000000000}}, 0x14}}, 0x0) [ 416.553121][T15387] IPVS: ftp: loaded support on port[0] = 21 11:49:04 executing program 0: syz_mount_image$hfsplus(&(0x7f0000000140)='hfsplls\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000a80)={[{@barrier='barrier'}, {@gid={'gid'}}, {@type={'type', 0x3d, "ae8c9d8f"}}]}) 11:49:04 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000140)='hfsplus\x06', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000a80)={[{@barrier='barrier'}, {@gid={'gid'}}, {@type={'type', 0x3d, "ae8c9d8f"}}]}) 11:49:04 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_ATTACH(0x8, 0x0, 0x0) r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r0, &(0x7f0000000000)={{0x6, @rose}, [@rose, @rose, @default, @netrom, @bcast, @rose, @rose, @null]}, 0x48) r1 = openat$qat_adf_ctl(0xffffffffffffff9c, 0x0, 0x0, 0x0) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r1, 0x6, 0x23, 0x0, 0x0) listen(r0, 0x0) unshare(0x40000000) setrlimit(0x0, 0x0) r2 = accept(r0, 0x0, 0x0) write$binfmt_elf64(r2, &(0x7f00000002c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x9, 0x8, 0x0, 0x0, 0x0, 0x4825483b35c83c0b, 0x0, 0x0, 0x40}, [{0x0, 0x1, 0xfff, 0x0, 0x0, 0xff8000000002, 0x0, 0x7fff}]}, 0x78) 11:49:04 executing program 1: setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) setsockopt$netlink_NETLINK_BROADCAST_ERROR(0xffffffffffffffff, 0x10e, 0x4, 0x0, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000100)={0x0, 0x185be, &(0x7f00000001c0)={&(0x7f0000000040)={0x14, 0x23, 0x1, 0x0, 0x0, {0x20000000004, 0xe00000000000000}}, 0x14}}, 0x0) 11:49:04 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_ATTACH(0x8, 0x0, 0x0) connect$netrom(0xffffffffffffffff, &(0x7f0000000000)={{0x6, @rose}, [@rose, @rose, @default, @netrom, @bcast, @rose, @rose, @null]}, 0x48) r0 = openat$qat_adf_ctl(0xffffffffffffff9c, 0x0, 0x0, 0x0) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, 0x0, 0x0) listen(0xffffffffffffffff, 0x0) unshare(0x40000000) r1 = accept(0xffffffffffffffff, 0x0, 0x0) write$binfmt_elf64(r1, &(0x7f00000002c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x9, 0x8, 0x0, 0x0, 0x0, 0x4825483b35c83c0b, 0x0, 0x0, 0x40}, [{0x0, 0x1, 0xfff, 0x0, 0x0, 0xff8000000002, 0x0, 0x7fff}], "", [[], [], []]}, 0x378) 11:49:04 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r0, &(0x7f0000000000)={{0x6, @rose}, [@rose, @rose, @default, @netrom, @bcast, @rose, @rose, @null]}, 0x48) openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000080)='/dev/qat_adf_ctl\x00', 0x8200, 0x0) listen(r0, 0x0) unshare(0x40000000) setrlimit(0x0, 0x0) accept(r0, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000002c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x9, 0x8, 0x0, 0x0, 0x0, 0x4825483b35c83c0b, 0x0, 0x0, 0x40, 0x227}, [{0x4, 0x1, 0xfff, 0x0, 0x0, 0xff8000000002, 0x0, 0x7fff}], "", [[], [], []]}, 0x378) 11:49:04 executing program 0: syz_mount_image$hfsplus(&(0x7f0000000140)='hfsplos\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000a80)={[{@barrier='barrier'}, {@gid={'gid'}}, {@type={'type', 0x3d, "ae8c9d8f"}}]}) 11:49:04 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000140)='hfsplus\a', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000a80)={[{@barrier='barrier'}, {@gid={'gid'}}, {@type={'type', 0x3d, "ae8c9d8f"}}]}) [ 419.949396][T15421] IPVS: ftp: loaded support on port[0] = 21 [ 420.027382][T15413] IPVS: ftp: loaded support on port[0] = 21 11:49:05 executing program 1: setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) setsockopt$netlink_NETLINK_BROADCAST_ERROR(0xffffffffffffffff, 0x10e, 0x4, 0x0, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000100)={0x0, 0x185c6, &(0x7f00000001c0)={&(0x7f0000000040)={0x14, 0x23, 0x1, 0x0, 0x0, {0x20000000004, 0xe00000000000000}}, 0x14}}, 0x0) [ 420.121735][T15409] IPVS: ftp: loaded support on port[0] = 21 11:49:05 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000140)='hfsplus\b', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000a80)={[{@barrier='barrier'}, {@gid={'gid'}}, {@type={'type', 0x3d, "ae8c9d8f"}}]}) 11:49:05 executing program 0: syz_mount_image$hfsplus(&(0x7f0000000140)='hfsplps\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000a80)={[{@barrier='barrier'}, {@gid={'gid'}}, {@type={'type', 0x3d, "ae8c9d8f"}}]}) 11:49:05 executing program 2: setrlimit(0x7, &(0x7f0000000000)) open(&(0x7f0000000140)='./file1\x00', 0x0, 0x0) 11:49:05 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r0, &(0x7f0000000000), 0x10) r1 = socket$inet6(0xa, 0x2, 0x0) dup3(r1, r0, 0x80000) r2 = syz_open_dev$mice(0x0, 0x0, 0x800) ioctl$KDADDIO(r2, 0x4b34, 0x800) getsockopt$inet6_mreq(r1, 0x29, 0x0, &(0x7f0000000080)={@remote}, &(0x7f0000000100)=0x14) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000001c0), 0x4) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000040), 0x4) 11:49:05 executing program 1: setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) setsockopt$netlink_NETLINK_BROADCAST_ERROR(0xffffffffffffffff, 0x10e, 0x4, 0x0, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000100)={0x0, 0x185c7, &(0x7f00000001c0)={&(0x7f0000000040)={0x14, 0x23, 0x1, 0x0, 0x0, {0x20000000004, 0xe00000000000000}}, 0x14}}, 0x0) 11:49:05 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000140)='hfsplus\t', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000a80)={[{@barrier='barrier'}, {@gid={'gid'}}, {@type={'type', 0x3d, "ae8c9d8f"}}]}) [ 420.617590][T15408] ================================================================== [ 420.626000][T15408] BUG: KASAN: use-after-free in refcount_inc_not_zero_checked+0x81/0x200 [ 420.634405][T15408] Read of size 4 at addr ffff8880556b7500 by task syz-executor.4/15408 [ 420.634420][T15408] [ 420.634435][T15408] CPU: 1 PID: 15408 Comm: syz-executor.4 Not tainted 5.3.0+ #0 [ 420.634443][T15408] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 420.634448][T15408] Call Trace: [ 420.634470][T15408] dump_stack+0x172/0x1f0 [ 420.662826][T15408] ? refcount_inc_not_zero_checked+0x81/0x200 [ 420.662846][T15408] print_address_description.constprop.0.cold+0xd4/0x30b [ 420.662861][T15408] ? refcount_inc_not_zero_checked+0x81/0x200 [ 420.662876][T15408] ? refcount_inc_not_zero_checked+0x81/0x200 [ 420.662891][T15408] __kasan_report.cold+0x1b/0x41 [ 420.662912][T15408] ? refcount_inc_not_zero_checked+0x81/0x200 [ 420.706576][T15408] kasan_report+0x12/0x20 [ 420.710908][T15408] check_memory_region+0x134/0x1a0 [ 420.716020][T15408] __kasan_check_read+0x11/0x20 [ 420.720869][T15408] refcount_inc_not_zero_checked+0x81/0x200 [ 420.726761][T15408] ? refcount_dec_and_mutex_lock+0x90/0x90 [ 420.732573][T15408] ? __kasan_check_write+0x14/0x20 [ 420.737682][T15408] refcount_inc_checked+0x17/0x70 [ 420.742767][T15408] nr_release+0x62/0x3e0 [ 420.747026][T15408] __sock_release+0xce/0x280 [ 420.751616][T15408] sock_close+0x1e/0x30 [ 420.755771][T15408] __fput+0x2ff/0x890 [ 420.759754][T15408] ? __sock_release+0x280/0x280 [ 420.764607][T15408] ____fput+0x16/0x20 [ 420.768586][T15408] task_work_run+0x145/0x1c0 [ 420.773182][T15408] exit_to_usermode_loop+0x316/0x380 [ 420.778465][T15408] do_syscall_64+0x65f/0x760 [ 420.783055][T15408] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 420.788937][T15408] RIP: 0033:0x413711 [ 420.792829][T15408] Code: 75 14 b8 03 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 04 1b 00 00 c3 48 83 ec 08 e8 0a fc ff ff 48 89 04 24 b8 03 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 53 fc ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 420.812422][T15408] RSP: 002b:00007ffda7e7b6b0 EFLAGS: 00000293 ORIG_RAX: 0000000000000003 [ 420.820828][T15408] RAX: 0000000000000000 RBX: 0000000000000007 RCX: 0000000000413711 [ 420.828799][T15408] RDX: 0000000000000000 RSI: 0000000000000f81 RDI: 0000000000000006 [ 420.836761][T15408] RBP: 0000000000000001 R08: 0000000011f74f81 R09: 0000000011f74f85 [ 420.844727][T15408] R10: 00007ffda7e7b790 R11: 0000000000000293 R12: 000000000075c9a0 [ 420.852692][T15408] R13: 000000000075c9a0 R14: 0000000000762810 R15: 000000000075c124 [ 420.860669][T15408] [ 420.862988][T15408] Allocated by task 15416: [ 420.867404][T15408] save_stack+0x23/0x90 [ 420.871553][T15408] __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 420.877175][T15408] kasan_kmalloc+0x9/0x10 [ 420.881522][T15408] __kmalloc+0x163/0x770 [ 420.885757][T15408] sk_prot_alloc+0x23a/0x310 [ 420.890341][T15408] sk_alloc+0x39/0xf70 [ 420.894401][T15408] nr_create+0xb9/0x5e0 [ 420.898555][T15408] __sock_create+0x3d8/0x730 [ 420.903138][T15408] __sys_socket+0x103/0x220 [ 420.907640][T15408] __x64_sys_socket+0x73/0xb0 [ 420.912309][T15408] do_syscall_64+0xfa/0x760 [ 420.916809][T15408] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 420.922687][T15408] [ 420.925012][T15408] Freed by task 15408: [ 420.929088][T15408] save_stack+0x23/0x90 [ 420.933240][T15408] __kasan_slab_free+0x102/0x150 [ 420.938171][T15408] kasan_slab_free+0xe/0x10 [ 420.942667][T15408] kfree+0x10a/0x2c0 [ 420.946553][T15408] __sk_destruct+0x4f7/0x6e0 [ 420.951132][T15408] sk_destruct+0x86/0xa0 [ 420.955367][T15408] __sk_free+0xfb/0x360 [ 420.959518][T15408] sk_free+0x42/0x50 [ 420.963405][T15408] nr_release+0x356/0x3e0 [ 420.967724][T15408] __sock_release+0xce/0x280 [ 420.972310][T15408] sock_close+0x1e/0x30 [ 420.976456][T15408] __fput+0x2ff/0x890 [ 420.980445][T15408] ____fput+0x16/0x20 [ 420.984418][T15408] task_work_run+0x145/0x1c0 [ 420.989002][T15408] exit_to_usermode_loop+0x316/0x380 [ 420.994281][T15408] do_syscall_64+0x65f/0x760 [ 420.998872][T15408] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 421.004769][T15408] [ 421.007104][T15408] The buggy address belongs to the object at ffff8880556b7480 [ 421.007104][T15408] which belongs to the cache kmalloc-2k of size 2048 [ 421.021148][T15408] The buggy address is located 128 bytes inside of [ 421.021148][T15408] 2048-byte region [ffff8880556b7480, ffff8880556b7c80) [ 421.034491][T15408] The buggy address belongs to the page: [ 421.040122][T15408] page:ffffea000155ad80 refcount:1 mapcount:0 mapping:ffff8880aa400e00 index:0x0 compound_mapcount: 0 [ 421.051043][T15408] flags: 0x1fffc0000010200(slab|head) [ 421.056415][T15408] raw: 01fffc0000010200 ffffea00015b3e08 ffffea000155a988 ffff8880aa400e00 [ 421.064995][T15408] raw: 0000000000000000 ffff8880556b6380 0000000100000003 0000000000000000 [ 421.073564][T15408] page dumped because: kasan: bad access detected [ 421.079961][T15408] [ 421.082275][T15408] Memory state around the buggy address: [ 421.087901][T15408] ffff8880556b7400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 421.096045][T15408] ffff8880556b7480: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 421.104097][T15408] >ffff8880556b7500: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 421.112143][T15408] ^ 11:49:06 executing program 0: syz_mount_image$hfsplus(&(0x7f0000000140)='hfsplss\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000a80)={[{@barrier='barrier'}, {@gid={'gid'}}, {@type={'type', 0x3d, "ae8c9d8f"}}]}) [ 421.116208][T15408] ffff8880556b7580: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 421.124262][T15408] ffff8880556b7600: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 421.132307][T15408] ================================================================== [ 421.140355][T15408] Disabling lock debugging due to kernel taint [ 421.166552][T15408] Kernel panic - not syncing: panic_on_warn set ... [ 421.172663][ T3889] kobject: 'loop3' (00000000f1722828): kobject_uevent_env [ 421.173158][T15408] CPU: 1 PID: 15408 Comm: syz-executor.4 Tainted: G B 5.3.0+ #0 [ 421.181827][T15450] kobject: 'rfkill285' (0000000080331ff7): kobject_add_internal: parent: 'phy285', set: 'devices' [ 421.189134][T15408] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 421.189157][T15408] Call Trace: [ 421.189174][T15408] dump_stack+0x172/0x1f0 [ 421.189189][T15408] panic+0x2dc/0x755 [ 421.189200][T15408] ? add_taint.cold+0x16/0x16 [ 421.189219][T15408] ? refcount_inc_not_zero_checked+0x81/0x200 [ 421.199890][ T3889] kobject: 'loop3' (00000000f1722828): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 421.209822][T15408] ? preempt_schedule+0x4b/0x60 [ 421.209837][T15408] ? ___preempt_schedule+0x16/0x20 [ 421.209850][T15408] ? trace_hardirqs_on+0x5e/0x240 [ 421.209868][T15408] ? refcount_inc_not_zero_checked+0x81/0x200 [ 421.215235][ T3889] kobject: 'loop0' (0000000013051ed7): kobject_uevent_env [ 421.217438][T15408] end_report+0x47/0x4f [ 421.217453][T15408] ? refcount_inc_not_zero_checked+0x81/0x200 [ 421.217464][T15408] __kasan_report.cold+0xe/0x41 [ 421.217481][T15408] ? refcount_inc_not_zero_checked+0x81/0x200 [ 421.221640][T15450] kobject: 'rfkill285' (0000000080331ff7): kobject_uevent_env [ 421.225994][T15408] kasan_report+0x12/0x20 [ 421.226007][T15408] check_memory_region+0x134/0x1a0 [ 421.226020][T15408] __kasan_check_read+0x11/0x20 [ 421.226033][T15408] refcount_inc_not_zero_checked+0x81/0x200 [ 421.226051][T15408] ? refcount_dec_and_mutex_lock+0x90/0x90 [ 421.232152][ T3889] kobject: 'loop0' (0000000013051ed7): fill_kobj_path: path = '/devices/virtual/block/loop0' [ 421.242204][T15408] ? __kasan_check_write+0x14/0x20 [ 421.242219][T15408] refcount_inc_checked+0x17/0x70 [ 421.242232][T15408] nr_release+0x62/0x3e0 [ 421.242250][T15408] __sock_release+0xce/0x280 [ 421.247195][T15450] kobject: 'rfkill285' (0000000080331ff7): fill_kobj_path: path = '/devices/virtual/mac80211_hwsim/hwsim285/ieee80211/phy285/rfkill285' [ 421.252152][T15408] sock_close+0x1e/0x30 [ 421.252165][T15408] __fput+0x2ff/0x890 [ 421.252179][T15408] ? __sock_release+0x280/0x280 [ 421.252197][T15408] ____fput+0x16/0x20 [ 421.259592][T15450] ieee80211 phy285: Selected rate control algorithm 'minstrel_ht' [ 421.263256][T15408] task_work_run+0x145/0x1c0 [ 421.263275][T15408] exit_to_usermode_loop+0x316/0x380 [ 421.263291][T15408] do_syscall_64+0x65f/0x760 [ 421.263310][T15408] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 421.285459][T15450] kobject: 'net' (00000000f04e9571): kobject_add_internal: parent: 'hwsim285', set: '(null)' [ 421.291442][T15408] RIP: 0033:0x413711 [ 421.291457][T15408] Code: 75 14 b8 03 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 04 1b 00 00 c3 48 83 ec 08 e8 0a fc ff ff 48 89 04 24 b8 03 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 53 fc ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 421.291463][T15408] RSP: 002b:00007ffda7e7b6b0 EFLAGS: 00000293 ORIG_RAX: 0000000000000003 [ 421.291475][T15408] RAX: 0000000000000000 RBX: 0000000000000007 RCX: 0000000000413711 [ 421.291483][T15408] RDX: 0000000000000000 RSI: 0000000000000f81 RDI: 0000000000000006 [ 421.291494][T15408] RBP: 0000000000000001 R08: 0000000011f74f81 R09: 0000000011f74f85 [ 421.291507][T15408] R10: 00007ffda7e7b790 R11: 0000000000000293 R12: 000000000075c9a0 [ 421.313377][T15450] kobject: 'wlan199' (000000003b8ced05): kobject_add_internal: parent: 'net', set: 'devices' [ 421.319034][T15408] R13: 000000000075c9a0 R14: 0000000000762810 R15: 000000000075c124 [ 421.320566][T15408] Kernel Offset: disabled [ 421.510389][T15408] Rebooting in 86400 seconds..