le Compute Engine, BIOS Google 01/01/2011 [ 129.543266] Call Trace: [ 129.545891] dump_stack+0x1c9/0x2b4 [ 129.549540] ? dump_stack_print_info.cold.2+0x52/0x52 [ 129.554742] ? ext4_getblk+0x10e/0x630 [ 129.558643] ? ext4_bread+0x95/0x2b0 [ 129.562368] ? ext4_append+0x14e/0x370 [ 129.566271] ? ext4_mkdir+0x532/0xe60 [ 129.570088] ? do_mkdirat+0x27b/0x310 [ 129.573909] should_fail.cold.4+0xa/0x11 [ 129.577996] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 129.583117] ? kasan_check_write+0x14/0x20 [ 129.587370] ? do_raw_spin_lock+0xc1/0x200 [ 129.591634] ? trace_hardirqs_on+0x10/0x10 [ 129.595890] ? debug_check_no_obj_freed+0x30b/0x595 [ 129.600931] ? trace_hardirqs_off+0xd/0x10 [ 129.605193] ? quarantine_put+0x10d/0x1b0 [ 129.609370] ? __kasan_slab_free+0x131/0x170 [ 129.613812] ? trace_hardirqs_on+0xd/0x10 [ 129.617999] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 129.623561] ? ext4_ext_map_blocks+0xfb2/0x62f0 [ 129.628271] __should_failslab+0x124/0x180 [ 129.632528] should_failslab+0x9/0x14 [ 129.636329] kmem_cache_alloc+0x47/0x760 [ 129.640401] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 129.645426] ? ext4_es_can_be_merged+0x238/0x2a0 [ 129.650194] __es_insert_extent+0x305/0x1140 [ 129.654621] ? ext4_es_free_extent+0x820/0x820 [ 129.659232] ? lock_release+0xa30/0xa30 [ 129.663213] ? ext4_map_blocks+0x480/0x1b60 [ 129.667530] ? kasan_check_write+0x14/0x20 [ 129.671759] ? do_raw_write_lock+0xbd/0x1b0 [ 129.676080] ext4_es_insert_extent+0x2ea/0x7e0 [ 129.680670] ? lock_release+0xa30/0xa30 [ 129.684639] ? ext4_es_find_delayed_extent_range+0xd80/0xd80 [ 129.690435] ? lock_downgrade+0x8f0/0x8f0 [ 129.694576] ? down_write+0x8f/0x130 [ 129.698297] ? ext4_map_blocks+0x88b/0x1b60 [ 129.703581] ? down_read+0x1d0/0x1d0 [ 129.707294] ext4_map_blocks+0xb08/0x1b60 [ 129.711453] ? __save_stack_trace+0x8d/0xf0 [ 129.715778] ? ext4_issue_zeroout+0x190/0x190 [ 129.720285] ? save_stack+0x43/0xd0 [ 129.723911] ? __kasan_slab_free+0x11a/0x170 [ 129.728340] ? kasan_slab_free+0xe/0x10 [ 129.732327] ? kmem_cache_free+0x86/0x2d0 [ 129.736495] ext4_getblk+0x10e/0x630 [ 129.740231] ? ext4_iomap_begin+0x1350/0x1350 [ 129.744730] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 129.750262] ? __dquot_initialize+0x61d/0xde0 [ 129.754765] ext4_bread+0x95/0x2b0 [ 129.758305] ? ext4_getblk+0x630/0x630 [ 129.762189] ? dquot_get_next_dqblk+0x180/0x180 [ 129.766861] ? debug_check_no_obj_freed+0x30b/0x595 [ 129.771888] ? kasan_check_write+0x14/0x20 [ 129.776121] ext4_append+0x14e/0x370 [ 129.779832] ext4_mkdir+0x532/0xe60 [ 129.783467] ? ext4_init_dot_dotdot+0x510/0x510 [ 129.788140] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 129.793702] ? security_inode_permission+0xd2/0x100 [ 129.798720] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 129.804266] ? security_inode_mkdir+0xe8/0x120 [ 129.808856] vfs_mkdir+0x42e/0x6b0 [ 129.812400] do_mkdirat+0x27b/0x310 [ 129.816037] ? __ia32_sys_mknod+0xb0/0xb0 [ 129.820206] ? ksys_ioctl+0x81/0xd0 [ 129.823852] __x64_sys_mkdir+0x5c/0x80 [ 129.827744] do_syscall_64+0x1b9/0x820 [ 129.831625] ? finish_task_switch+0x1d3/0x870 [ 129.836126] ? syscall_return_slowpath+0x5e0/0x5e0 [ 129.841064] ? syscall_return_slowpath+0x31d/0x5e0 [ 129.846011] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 129.851050] ? prepare_exit_to_usermode+0x291/0x3b0 [ 129.856062] ? perf_trace_sys_enter+0xb10/0xb10 [ 129.860719] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 129.865583] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 129.870772] RIP: 0033:0x455267 [ 129.873959] Code: 1f 40 00 b8 5a 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 cd c5 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 ad c5 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 129.893205] RSP: 002b:00007fe773c40a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 129.901105] RAX: ffffffffffffffda RBX: 0000000020001690 RCX: 0000000000455267 [ 129.908476] RDX: 0000000000000014 RSI: 00000000000001ff RDI: 0000000020001740 21:23:38 executing program 3: r0 = getpid() prctl$setptracer(0x59616d61, r0) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/rtc0\x00', 0x0, 0x0) ioctl$VHOST_SET_MEM_TABLE(r1, 0x4008af03, &(0x7f0000000200)={0x2, 0x0, [{0x7000, 0x1000, &(0x7f00000002c0)=""/4096}, {0x6000, 0xd1, &(0x7f00000012c0)=""/209}]}) socketpair$inet_sctp(0x2, 0x0, 0x84, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) prctl$setptracer(0x59616d61, r0) prctl$setptracer(0x59616d61, 0x0) ioctl$sock_SIOCOUTQ(r2, 0x5411, &(0x7f0000000000)) prctl$setptracer(0x59616d61, 0x0) prctl$setptracer(0x59616d61, r0) r4 = dup3(r3, r3, 0x80000) capget(&(0x7f0000000140)={0x20071026, r0}, &(0x7f0000000180)={0x4, 0x4, 0x100000001, 0x1, 0x100000000, 0x2}) getsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(r3, 0x84, 0x75, &(0x7f0000000040)={0x0, 0x9}, &(0x7f0000000080)=0x8) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r4, 0x84, 0x72, &(0x7f00000000c0)={r5, 0x8000, 0x20}, &(0x7f0000000100)=0xc) 21:23:38 executing program 4: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockname(r0, &(0x7f0000000100)=@ethernet={0x0, @random}, &(0x7f0000000200)=0x80) setsockopt$inet_sctp6_SCTP_AUTH_KEY(r0, 0x84, 0x18, &(0x7f0000000140)=ANY=[], 0x0) 21:23:38 executing program 6: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) r1 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rfkill\x00', 0x200, 0x0) getsockopt$XDP_STATISTICS(r1, 0x11b, 0x7, &(0x7f0000000040), &(0x7f0000000080)=0x18) setsockopt$inet_sctp6_SCTP_AUTH_KEY(r0, 0x84, 0xc, &(0x7f0000000140)=ANY=[], 0x0) 21:23:38 executing program 1: socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$sock_inet_SIOCSARP(0xffffffffffffffff, 0x8955, &(0x7f00000000c0)={{0x2, 0x200004e24, @multicast1=0xe0000001}, {0x0, @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}}, 0x0, {0x2, 0x0, @local={0xac, 0x14, 0x14, 0xaa}}, 'ip6_vti0\x00'}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000000, 0x0, 0x0, 0x0, 0x200000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) write$cgroup_int(0xffffffffffffffff, &(0x7f00000001c0), 0x4) 21:23:38 executing program 0: syz_open_dev$sndseq(&(0x7f0000000000)='/dev/snd/seq\x00', 0x0, 0x0) userfaultfd(0x0) syz_open_dev$mice(&(0x7f0000000100)='/dev/input/mice\x00', 0x0, 0x0) pselect6(0x40, &(0x7f00000abfc0)={0x3ffffd, 0x0, 0x0, 0x0, 0x6000}, &(0x7f0000768000), &(0x7f00007fbfc0), &(0x7f0000f22000)={0x0, 0x989680}, &(0x7f0000f14000)={&(0x7f0000553ff8), 0x8}) [ 129.915734] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 129.923004] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000014 [ 129.930374] R13: 0000000000000000 R14: 00000000004d3eb0 R15: 000000000000001d 21:23:39 executing program 4: r0 = syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0xffffffffffffffff, 0x101000) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r0, 0x84, 0x8, &(0x7f0000000140)=0x1, 0x4) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000200)={0x0, 0x4c, &(0x7f0000000180)=[@in6={0xa, 0x4e20, 0x3ff, @ipv4={[], [0xff, 0xff], @broadcast=0xffffffff}}, @in={0x2, 0x4e24, @loopback=0x7f000001}, @in={0x2, 0x4e24, @dev={0xac, 0x14, 0x14, 0x17}}, @in={0x2, 0x4e20}]}, &(0x7f0000000240)=0x10) setsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r0, 0x84, 0x6, &(0x7f0000000280)={r1, @in6={{0xa, 0x4e22, 0x1ff28c07, @dev={0xfe, 0x80, [], 0x100000000}, 0x8}}}, 0x84) write$P9_RSTATFS(r0, &(0x7f0000000080)={0x43, 0x9, 0x2, {0xf9c, 0x8, 0x0, 0xc83, 0x9, 0x8, 0x4, 0x2e, 0xa2}}, 0x43) r2 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_AUTH_KEY(r2, 0x84, 0x18, &(0x7f0000000040)=ANY=[@ANYRES16=r2, @ANYRES32], 0x2) prctl$setname(0xf, &(0x7f0000000100)='/dev/dsp#\x00') 21:23:39 executing program 6: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_AUTH_KEY(r0, 0x84, 0xc, &(0x7f0000000140)=ANY=[], 0x0) getsockopt$inet_sctp6_SCTP_NODELAY(r0, 0x84, 0x3, &(0x7f0000000000), &(0x7f0000000040)=0x4) 21:23:39 executing program 5: getsockopt$inet6_mreq(0xffffffffffffff9c, 0x29, 0x1f, &(0x7f0000000240)={@mcast2}, &(0x7f0000000280)=0x14) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000200)={0x10}, 0xc, &(0x7f0000000340)={&(0x7f0000000300)=ANY=[@ANYBLOB="2c0000002600200300000000fedbdf250000"], 0x1}, 0x1, 0x0, 0x0, 0x40000}, 0x20004000) ioctl$sock_inet_SIOCSARP(0xffffffffffffffff, 0x8955, &(0x7f00000000c0)={{0x2, 0x200004e24, @multicast1=0xe0000001}, {0x0, @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}}, 0x2, {0x2, 0x0, @local={0xac, 0x14, 0x14, 0xaa}}, 'ip6_vti0\x00'}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000000, 0x0, 0x0, 0x0, 0x200000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x0, 0x0) setsockopt$IP_VS_SO_SET_TIMEOUT(0xffffffffffffffff, 0x0, 0x48a, &(0x7f00000003c0)={0x0, 0x45e6a3c0, 0x81}, 0xc) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) write$cgroup_int(0xffffffffffffffff, &(0x7f00000001c0), 0x4) [ 129.979319] gfs2: invalid mount option: l [ 129.983753] gfs2: can't parse mount arguments 21:23:39 executing program 0: syz_open_dev$sndseq(&(0x7f0000000000)='/dev/snd/seq\x00', 0x0, 0x0) userfaultfd(0x0) syz_open_dev$mice(&(0x7f0000000100)='/dev/input/mice\x00', 0x0, 0x0) pselect6(0x40, &(0x7f00000abfc0)={0x3ffffd, 0x0, 0x0, 0x0, 0x8}, &(0x7f0000768000), &(0x7f00007fbfc0), &(0x7f0000f22000)={0x0, 0x989680}, &(0x7f0000f14000)={&(0x7f0000553ff8), 0x8}) 21:23:39 executing program 7: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$hfsplus(&(0x7f0000000040)='hfspLus\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000300), 0x0, &(0x7f0000000380)) [ 130.085721] capability: warning: `syz-executor3' uses deprecated v2 capabilities in a way that may be insecure 21:23:39 executing program 0: syz_open_dev$sndseq(&(0x7f0000000000)='/dev/snd/seq\x00', 0x0, 0x0) userfaultfd(0x0) syz_open_dev$mice(&(0x7f0000000100)='/dev/input/mice\x00', 0x0, 0x0) pselect6(0x40, &(0x7f00000abfc0)={0x3ffffd, 0x0, 0x0, 0x0, 0x10}, &(0x7f0000768000), &(0x7f00007fbfc0), &(0x7f0000f22000)={0x0, 0x989680}, &(0x7f0000f14000)={&(0x7f0000553ff8), 0x8}) 21:23:39 executing program 2 (fault-call:0 fault-nth:30): syz_mount_image$gfs2(&(0x7f0000000040)='gfs2\x00', &(0x7f0000001740)='./file0\x00', 0x0, 0x0, &(0x7f0000001680), 0x0, &(0x7f0000000880)=ANY=[@ANYBLOB='l']) 21:23:39 executing program 4: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_AUTH_KEY(r0, 0x84, 0x18, &(0x7f0000000140)=ANY=[], 0x0) setsockopt$inet6_MCAST_LEAVE_GROUP(r0, 0x29, 0x2d, &(0x7f0000000000)={0x8, {{0xa, 0x4e23, 0xed, @dev={0xfe, 0x80, [], 0xc}}}}, 0x88) 21:23:39 executing program 3: r0 = getpid() gettid() prctl$setptracer(0x59616d61, r0) socketpair$inet_sctp(0x2, 0x0, 0x84, &(0x7f0000000280)) prctl$setptracer(0x59616d61, 0x0) prctl$setptracer(0x59616d61, 0x0) prctl$setptracer(0x59616d61, 0x0) prctl$setptracer(0x59616d61, r0) 21:23:39 executing program 6: r0 = socket$inet6_sctp(0xa, 0x8008002000a, 0x84) setsockopt$inet_sctp6_SCTP_AUTH_KEY(r0, 0x84, 0xc, &(0x7f0000000140)=ANY=[], 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r0, 0x84, 0x66, &(0x7f0000000000)={0x0, 0x7fffffff}, &(0x7f0000000040)=0x8) getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, &(0x7f0000000080)={0x95a, 0x35c1, 0x8004, 0xf9c, 0x69, 0x4, 0x3, 0x2, r1}, &(0x7f00000000c0)=0x20) 21:23:39 executing program 0: syz_open_dev$sndseq(&(0x7f0000000000)='/dev/snd/seq\x00', 0x0, 0x0) userfaultfd(0x0) syz_open_dev$mice(&(0x7f0000000100)='/dev/input/mice\x00', 0x0, 0x0) pselect6(0x40, &(0x7f00000abfc0)={0x3ffffd, 0x0, 0x0, 0x0, 0x1600000000000000}, &(0x7f0000768000), &(0x7f00007fbfc0), &(0x7f0000f22000)={0x0, 0x989680}, &(0x7f0000f14000)={&(0x7f0000553ff8), 0x8}) [ 130.269258] FAULT_INJECTION: forcing a failure. [ 130.269258] name failslab, interval 1, probability 0, space 0, times 0 [ 130.280653] CPU: 1 PID: 11091 Comm: syz-executor2 Not tainted 4.18.0-rc3-next-20180706+ #1 [ 130.289079] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 130.298453] Call Trace: [ 130.301073] dump_stack+0x1c9/0x2b4 [ 130.304731] ? dump_stack_print_info.cold.2+0x52/0x52 [ 130.309955] should_fail.cold.4+0xa/0x11 [ 130.314087] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 130.319240] ? kasan_check_write+0x14/0x20 [ 130.323508] ? __brelse+0x104/0x180 [ 130.327160] ? block_commit_write+0x30/0x30 [ 130.331507] ? kasan_check_write+0x14/0x20 [ 130.335764] ? do_raw_spin_lock+0xc1/0x200 [ 130.340034] ? __find_get_block+0x36d/0xe60 [ 130.344401] ? block_invalidatepage+0x520/0x520 [ 130.349088] ? check_same_owner+0x340/0x340 [ 130.353411] ? lock_downgrade+0x8f0/0x8f0 [ 130.357559] ? check_same_owner+0x340/0x340 [ 130.361879] ? rcu_note_context_switch+0x730/0x730 [ 130.366828] __should_failslab+0x124/0x180 [ 130.371060] should_failslab+0x9/0x14 [ 130.374862] kmem_cache_alloc+0x2af/0x760 [ 130.379008] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 130.384037] ? __find_get_block+0xe60/0xe60 [ 130.388375] jbd2_journal_add_journal_head+0x1ef/0x5d0 [ 130.393662] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 130.399192] ? jbd2_journal_write_metadata_buffer+0xf00/0xf00 [ 130.405076] jbd2_journal_get_create_access+0x42/0x600 [ 130.410360] ? rcu_note_context_switch+0x730/0x730 [ 130.415650] __ext4_journal_get_create_access+0x46/0x90 [ 130.421009] ext4_getblk+0x2be/0x630 [ 130.424730] ? ext4_iomap_begin+0x1350/0x1350 [ 130.429234] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 130.434764] ? __dquot_initialize+0x61d/0xde0 [ 130.439256] ext4_bread+0x95/0x2b0 [ 130.442788] ? ext4_getblk+0x630/0x630 [ 130.446662] ? dquot_get_next_dqblk+0x180/0x180 [ 130.451325] ext4_append+0x14e/0x370 [ 130.455030] ext4_mkdir+0x532/0xe60 [ 130.458658] ? ext4_init_dot_dotdot+0x510/0x510 [ 130.463316] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 130.469023] ? security_inode_permission+0xd2/0x100 [ 130.474035] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 130.479583] ? security_inode_mkdir+0xe8/0x120 [ 130.484172] vfs_mkdir+0x42e/0x6b0 [ 130.487705] do_mkdirat+0x27b/0x310 [ 130.491334] ? __ia32_sys_mknod+0xb0/0xb0 [ 130.495482] ? syscall_slow_exit_work+0x500/0x500 [ 130.500310] ? ksys_ioctl+0x81/0xd0 [ 130.503927] __x64_sys_mkdir+0x5c/0x80 [ 130.507819] do_syscall_64+0x1b9/0x820 [ 130.511695] ? finish_task_switch+0x1d3/0x870 [ 130.516189] ? syscall_return_slowpath+0x5e0/0x5e0 [ 130.521114] ? syscall_return_slowpath+0x31d/0x5e0 [ 130.526044] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 130.531057] ? prepare_exit_to_usermode+0x291/0x3b0 [ 130.536082] ? perf_trace_sys_enter+0xb10/0xb10 [ 130.540753] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 130.545590] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 130.550781] RIP: 0033:0x455267 [ 130.553952] Code: 1f 40 00 b8 5a 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 cd c5 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 ad c5 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 130.573170] RSP: 002b:00007fe773c40a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 130.580879] RAX: ffffffffffffffda RBX: 0000000020001690 RCX: 0000000000455267 [ 130.588153] RDX: 0000000000000014 RSI: 00000000000001ff RDI: 0000000020001740 [ 130.595416] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 130.602680] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000014 [ 130.609944] R13: 0000000000000000 R14: 00000000004d3eb0 R15: 000000000000001e 21:23:39 executing program 5: getsockopt$inet6_mreq(0xffffffffffffff9c, 0x29, 0x1f, &(0x7f0000000240)={@mcast2}, &(0x7f0000000280)=0x14) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000200)={0x10}, 0xc, &(0x7f0000000340)={&(0x7f0000000300)=ANY=[@ANYBLOB="2c0000002600200300000000fedbdf250000"], 0x1}, 0x1, 0x0, 0x0, 0x40000}, 0x20004000) ioctl$sock_inet_SIOCSARP(0xffffffffffffffff, 0x8955, &(0x7f00000000c0)={{0x2, 0x200004e24, @multicast1=0xe0000001}, {0x0, @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}}, 0x2, {0x2, 0x0, @local={0xac, 0x14, 0x14, 0xaa}}, 'ip6_vti0\x00'}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000000, 0x0, 0x0, 0x0, 0x200000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x0, 0x0) setsockopt$IP_VS_SO_SET_TIMEOUT(0xffffffffffffffff, 0x0, 0x48a, &(0x7f00000003c0)={0x0, 0x45e6a3c0, 0x81}, 0xc) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) write$cgroup_int(0xffffffffffffffff, &(0x7f00000001c0), 0x4) 21:23:39 executing program 6: clock_gettime(0x0, &(0x7f00000006c0)={0x0, 0x0}) recvmmsg(0xffffffffffffffff, &(0x7f0000000640)=[{{&(0x7f0000000000)=@pppol2tpv3in6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @loopback}}}, 0x80, &(0x7f0000000240)=[{&(0x7f0000000080)=""/172, 0xac}, {&(0x7f0000000140)=""/163, 0xa3}, {&(0x7f0000000200)=""/4, 0x4}], 0x3, &(0x7f0000000280)=""/134, 0x86, 0x2}, 0x8}, {{&(0x7f0000000340)=@xdp, 0x80, &(0x7f0000000500)=[{&(0x7f00000003c0)=""/16, 0x10}, {&(0x7f0000000400)=""/243, 0xf3}], 0x2, &(0x7f0000000540)=""/254, 0xfe, 0x9}, 0x8}], 0x2, 0x40000000, &(0x7f0000000700)={r0, r1+30000000}) getsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r2, 0x84, 0x1e, &(0x7f00000007c0), &(0x7f0000000800)=0x4) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000740), &(0x7f0000000780)=0xc) r3 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_AUTH_KEY(r3, 0x84, 0xc, &(0x7f0000000140)=ANY=[], 0x0) 21:23:39 executing program 4: r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dsp\x00', 0x2, 0x0) ioctl$ASHMEM_PURGE_ALL_CACHES(r0, 0x770a, 0x0) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(r0, 0x84, 0x70, &(0x7f00000000c0)={0x0, @in={{0x2, 0x4e21, @rand_addr}}, [0x3f, 0x6, 0x5, 0x1, 0x6, 0x2, 0x8, 0x7ff, 0xa29, 0x42, 0x2c6, 0xffff, 0x8, 0x0, 0xb5c9]}, &(0x7f00000001c0)=0x100) getsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r0, 0x84, 0x13, &(0x7f0000000200)={r2, 0x4}, &(0x7f0000000240)=0x8) setsockopt$inet_sctp6_SCTP_AUTH_KEY(r1, 0x84, 0x18, &(0x7f0000000140)=ANY=[], 0x0) [ 130.617338] ENOMEM in journal_alloc_journal_head, retrying. [ 130.623859] gfs2: invalid mount option: l [ 130.628213] gfs2: can't parse mount arguments 21:23:39 executing program 3: r0 = getpid() prctl$setptracer(0x59616d61, r0) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$KVM_S390_UCAS_MAP(r1, 0x4018ae50, &(0x7f0000000040)={0x3f, 0x400, 0x8001}) socketpair$inet_sctp(0x2, 0x0, 0x84, &(0x7f0000000280)) prctl$setptracer(0x59616d61, 0x0) prctl$setptracer(0x59616d61, 0x0) prctl$setptracer(0x59616d61, r0) prctl$setptracer(0x59616d61, r0) 21:23:39 executing program 1: socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$sock_inet_SIOCSARP(0xffffffffffffffff, 0x8955, &(0x7f00000000c0)={{0x2, 0x200004e24, @multicast1=0xe0000001}, {0x0, @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}}, 0x0, {0x2, 0x0, @local={0xac, 0x14, 0x14, 0xaa}}, 'ip6_vti0\x00'}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000000, 0x0, 0x0, 0x0, 0x200000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) write$cgroup_int(0xffffffffffffffff, &(0x7f00000001c0), 0x4) 21:23:39 executing program 0: syz_open_dev$sndseq(&(0x7f0000000000)='/dev/snd/seq\x00', 0x0, 0x0) userfaultfd(0x0) syz_open_dev$mice(&(0x7f0000000100)='/dev/input/mice\x00', 0x0, 0x0) pselect6(0x40, &(0x7f00000abfc0)={0x3ffffd, 0x0, 0x0, 0x0, 0x60000000}, &(0x7f0000768000), &(0x7f00007fbfc0), &(0x7f0000f22000)={0x0, 0x989680}, &(0x7f0000f14000)={&(0x7f0000553ff8), 0x8}) 21:23:39 executing program 2 (fault-call:0 fault-nth:31): syz_mount_image$gfs2(&(0x7f0000000040)='gfs2\x00', &(0x7f0000001740)='./file0\x00', 0x0, 0x0, &(0x7f0000001680), 0x0, &(0x7f0000000880)=ANY=[@ANYBLOB='l']) 21:23:39 executing program 4: r0 = socket$inet6_sctp(0xa, 0x3, 0x84) setsockopt$inet_sctp6_SCTP_AUTH_KEY(r0, 0x84, 0x18, &(0x7f0000000140)=ANY=[], 0x0) r1 = openat$audio(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/audio\x00', 0x400000, 0x0) setsockopt$kcm_KCM_RECV_DISABLE(r1, 0x119, 0x1, &(0x7f0000000100)=0xffff, 0x4) openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qat_adf_ctl\x00', 0x4040, 0x0) 21:23:39 executing program 6: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x400, 0x0) getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, &(0x7f0000000080)={0x5, 0x5, 0x8, 0x800, 0x2, 0x5, 0xedd, 0x7fff, 0x0}, &(0x7f00000000c0)=0x20) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000340)={0x0}, &(0x7f0000000380)=0xc) ptrace(0x8, r2) getsockopt$inet_sctp6_SCTP_MAXSEG(r0, 0x84, 0xd, &(0x7f0000000100)=@assoc_value={r1, 0x3f80}, &(0x7f0000000140)=0xffffffffffffff45) setsockopt$inet_sctp6_SCTP_AUTH_KEY(r0, 0x84, 0xc, &(0x7f0000000480)=ANY=[@ANYPTR=&(0x7f0000000240)=ANY=[@ANYRES16=r1, @ANYRES64=r3, @ANYRES64=r1, @ANYPTR64=&(0x7f0000000200)=ANY=[@ANYPTR64, @ANYRESHEX=r3], @ANYRESOCT=r0, @ANYRESHEX=r1, @ANYRES32=0x0], @ANYRESHEX=r1, @ANYRESDEC=r1, @ANYBLOB="ae4387ed217d9989e660ee7c44cbaeee9913e711808a0183f4467633232870dca2cfd78256e1e5eacfd4d35080eed2ffb060d908fec7766b0e87bba8854eef28f676632db1268c4d2dba311b64637a1652d1e8", @ANYRESHEX=r0, @ANYRESHEX=r0], 0x6) setsockopt$inet_sctp6_SCTP_I_WANT_MAPPED_V4_ADDR(r0, 0x84, 0xc, &(0x7f0000000040)=0x7, 0x4) getdents(r0, &(0x7f0000000180)=""/79, 0x4f) 21:23:39 executing program 7: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$hfsplus(&(0x7f0000000040)='hfspuus\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000300), 0x0, &(0x7f0000000380)) [ 130.815659] FAULT_INJECTION: forcing a failure. [ 130.815659] name failslab, interval 1, probability 0, space 0, times 0 [ 130.827013] CPU: 1 PID: 11132 Comm: syz-executor2 Not tainted 4.18.0-rc3-next-20180706+ #1 [ 130.835426] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 130.844787] Call Trace: [ 130.847384] dump_stack+0x1c9/0x2b4 [ 130.851852] ? dump_stack_print_info.cold.2+0x52/0x52 [ 130.857079] ? ext4_getblk+0x10e/0x630 [ 130.860986] ? ext4_bread+0x95/0x2b0 [ 130.864719] ? ext4_append+0x14e/0x370 [ 130.868634] ? ext4_mkdir+0x532/0xe60 [ 130.872480] ? do_mkdirat+0x27b/0x310 [ 130.876334] should_fail.cold.4+0xa/0x11 [ 130.880434] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 130.885553] ? kasan_check_write+0x14/0x20 [ 130.889782] ? do_raw_spin_lock+0xc1/0x200 [ 130.894037] ? trace_hardirqs_on+0x10/0x10 [ 130.898271] ? debug_check_no_obj_freed+0x30b/0x595 [ 130.903298] ? trace_hardirqs_off+0xd/0x10 [ 130.907531] ? quarantine_put+0x10d/0x1b0 [ 130.911703] ? __kasan_slab_free+0x131/0x170 [ 130.916131] ? trace_hardirqs_on+0xd/0x10 [ 130.920288] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 130.925820] ? ext4_ext_map_blocks+0xfb2/0x62f0 [ 130.930516] __should_failslab+0x124/0x180 [ 130.934757] should_failslab+0x9/0x14 [ 130.938587] kmem_cache_alloc+0x47/0x760 [ 130.942679] ? perf_trace_lock+0xde/0x920 [ 130.946842] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 130.951873] ? ext4_es_can_be_merged+0x238/0x2a0 [ 130.956635] __es_insert_extent+0x305/0x1140 [ 130.961063] ? ext4_es_free_extent+0x820/0x820 [ 130.965640] ? lock_release+0xa30/0xa30 [ 130.969616] ? ext4_map_blocks+0x480/0x1b60 [ 130.973946] ? kasan_check_write+0x14/0x20 [ 130.978178] ? do_raw_write_lock+0xbd/0x1b0 [ 130.982497] ext4_es_insert_extent+0x2ea/0x7e0 [ 130.987083] ? lock_release+0xa30/0xa30 [ 130.991067] ? ext4_es_find_delayed_extent_range+0xd80/0xd80 [ 130.996857] ? rcu_note_context_switch+0x730/0x730 [ 131.001796] ? down_write+0x8f/0x130 [ 131.005502] ? ext4_map_blocks+0x88b/0x1b60 [ 131.009823] ? down_read+0x1d0/0x1d0 [ 131.013546] ext4_map_blocks+0xb08/0x1b60 [ 131.017693] ? __save_stack_trace+0x8d/0xf0 [ 131.022121] ? ext4_issue_zeroout+0x190/0x190 [ 131.026824] ? save_stack+0x43/0xd0 [ 131.030457] ? __kasan_slab_free+0x11a/0x170 [ 131.034855] ? kasan_slab_free+0xe/0x10 [ 131.038832] ? kmem_cache_free+0x86/0x2d0 [ 131.043095] ext4_getblk+0x10e/0x630 [ 131.047358] ? ext4_iomap_begin+0x1350/0x1350 [ 131.051865] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 131.057395] ? __dquot_initialize+0x61d/0xde0 [ 131.061905] ext4_bread+0x95/0x2b0 [ 131.065450] ? ext4_getblk+0x630/0x630 [ 131.069369] ? dquot_get_next_dqblk+0x180/0x180 [ 131.074045] ? debug_check_no_obj_freed+0x30b/0x595 [ 131.079171] ? kasan_check_write+0x14/0x20 [ 131.083415] ext4_append+0x14e/0x370 [ 131.087132] ext4_mkdir+0x532/0xe60 [ 131.090764] ? ext4_init_dot_dotdot+0x510/0x510 [ 131.095423] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 131.100972] ? security_inode_permission+0xd2/0x100 [ 131.105993] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 131.111530] ? security_inode_mkdir+0xe8/0x120 [ 131.116117] vfs_mkdir+0x42e/0x6b0 [ 131.119658] do_mkdirat+0x27b/0x310 [ 131.123280] ? __ia32_sys_mknod+0xb0/0xb0 [ 131.127436] ? ksys_ioctl+0x81/0xd0 [ 131.131074] __x64_sys_mkdir+0x5c/0x80 [ 131.134980] do_syscall_64+0x1b9/0x820 [ 131.138865] ? syscall_return_slowpath+0x5e0/0x5e0 [ 131.143800] ? syscall_return_slowpath+0x31d/0x5e0 [ 131.148751] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 131.153763] ? prepare_exit_to_usermode+0x291/0x3b0 [ 131.158775] ? perf_trace_sys_enter+0xb10/0xb10 [ 131.163445] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 131.168299] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 131.173486] RIP: 0033:0x455267 [ 131.176657] Code: 1f 40 00 b8 5a 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 cd c5 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 ad c5 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 131.195821] RSP: 002b:00007fe773c40a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 131.203531] RAX: ffffffffffffffda RBX: 0000000020001690 RCX: 0000000000455267 21:23:40 executing program 6: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) socket(0x8, 0x5, 0xd3) r1 = syz_open_dev$amidi(&(0x7f0000000040)='/dev/amidi#\x00', 0x5, 0x200) ioctl$RTC_VL_CLR(r1, 0x7014) ioctl$GIO_CMAP(r1, 0x4b70, &(0x7f0000000080)) setsockopt$inet_sctp6_SCTP_AUTH_KEY(r0, 0x84, 0xc, &(0x7f0000000140)=ANY=[], 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x410000, 0x0) [ 131.210789] RDX: 0000000000000014 RSI: 00000000000001ff RDI: 0000000020001740 [ 131.218050] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 131.225329] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000014 [ 131.232589] R13: 0000000000000000 R14: 00000000004d3eb0 R15: 000000000000001f 21:23:40 executing program 4: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_AUTH_KEY(r0, 0x84, 0x18, &(0x7f0000000140)=ANY=[], 0x0) r1 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x2) ioctl$KVM_GET_REG_LIST(r1, 0xc008aeb0, &(0x7f0000000100)={0x2, [0x1, 0x0]}) socketpair$inet_udplite(0x2, 0x2, 0x88, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$inet_MCAST_JOIN_GROUP(r2, 0x0, 0x2a, &(0x7f0000000040)={0x0, {{0x2, 0x4e24, @multicast1=0xe0000001}}}, 0x88) accept$inet(r2, 0x0, &(0x7f0000000140)) 21:23:40 executing program 3: r0 = getpid() ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000000)={0xffffffffffffffff}) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000040), &(0x7f00000000c0)=0xc) prctl$setptracer(0x59616d61, r0) socketpair$inet_sctp(0x2, 0x0, 0x84, &(0x7f0000000080)) prctl$setptracer(0x59616d61, 0x0) prctl$setptracer(0x59616d61, 0x0) prctl$setptracer(0x59616d61, 0x0) prctl$setptracer(0x59616d61, r0) [ 131.291136] gfs2: invalid mount option: l [ 131.295394] gfs2: can't parse mount arguments 21:23:40 executing program 0: syz_open_dev$sndseq(&(0x7f0000000000)='/dev/snd/seq\x00', 0x0, 0x0) userfaultfd(0x0) syz_open_dev$mice(&(0x7f0000000100)='/dev/input/mice\x00', 0x0, 0x0) pselect6(0x40, &(0x7f00000abfc0)={0x3ffffd, 0x0, 0x0, 0x0, 0x6400}, &(0x7f0000768000), &(0x7f00007fbfc0), &(0x7f0000f22000)={0x0, 0x989680}, &(0x7f0000f14000)={&(0x7f0000553ff8), 0x8}) 21:23:40 executing program 5: getsockopt$inet6_mreq(0xffffffffffffff9c, 0x29, 0x1f, &(0x7f0000000240)={@mcast2}, &(0x7f0000000280)=0x14) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000200)={0x10}, 0xc, &(0x7f0000000340)={&(0x7f0000000300)=ANY=[@ANYBLOB="2c0000002600200300000000fedbdf250000"], 0x1}, 0x1, 0x0, 0x0, 0x40000}, 0x20004000) ioctl$sock_inet_SIOCSARP(0xffffffffffffffff, 0x8955, &(0x7f00000000c0)={{0x2, 0x200004e24, @multicast1=0xe0000001}, {0x0, @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}}, 0x2, {0x2, 0x0, @local={0xac, 0x14, 0x14, 0xaa}}, 'ip6_vti0\x00'}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000000, 0x0, 0x0, 0x0, 0x200000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x0, 0x0) setsockopt$IP_VS_SO_SET_TIMEOUT(0xffffffffffffffff, 0x0, 0x48a, &(0x7f00000003c0)={0x0, 0x45e6a3c0, 0x81}, 0xc) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) write$cgroup_int(0xffffffffffffffff, &(0x7f00000001c0), 0x4) 21:23:40 executing program 1: socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$sock_inet_SIOCSARP(0xffffffffffffffff, 0x8955, &(0x7f00000000c0)={{0x2, 0x200004e24, @multicast1=0xe0000001}, {0x0, @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}}, 0x0, {0x2, 0x0, @local={0xac, 0x14, 0x14, 0xaa}}, 'ip6_vti0\x00'}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000000, 0x0, 0x0, 0x0, 0x200000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) write$cgroup_int(0xffffffffffffffff, &(0x7f00000001c0), 0x4) 21:23:40 executing program 6: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x800, 0x0) ioctl$SNDRV_SEQ_IOCTL_PVERSION(r1, 0x80045300, &(0x7f0000000040)) setsockopt$inet_sctp6_SCTP_AUTH_KEY(r0, 0x84, 0xc, &(0x7f0000000140)=ANY=[], 0x0) 21:23:40 executing program 4: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.swap.current\x00', 0x0, 0x0) accept$packet(r1, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @link_local}, &(0x7f0000000100)=0x85) setsockopt$inet_sctp6_SCTP_AUTH_KEY(r0, 0x84, 0x18, &(0x7f0000000140)=ANY=[], 0x0) 21:23:40 executing program 7: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$hfsplus(&(0x7f0000000040)='hfsplXs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000300), 0x0, &(0x7f0000000380)) 21:23:40 executing program 2 (fault-call:0 fault-nth:32): syz_mount_image$gfs2(&(0x7f0000000040)='gfs2\x00', &(0x7f0000001740)='./file0\x00', 0x0, 0x0, &(0x7f0000001680), 0x0, &(0x7f0000000880)=ANY=[@ANYBLOB='l']) 21:23:40 executing program 0: syz_open_dev$sndseq(&(0x7f0000000000)='/dev/snd/seq\x00', 0x0, 0x0) userfaultfd(0x0) syz_open_dev$mice(&(0x7f0000000100)='/dev/input/mice\x00', 0x0, 0x0) pselect6(0x40, &(0x7f00000abfc0)={0x3ffffd, 0x0, 0x0, 0x0, 0x0, 0x1600000000000000}, &(0x7f0000768000), &(0x7f00007fbfc0), &(0x7f0000f22000)={0x0, 0x989680}, &(0x7f0000f14000)={&(0x7f0000553ff8), 0x8}) 21:23:40 executing program 3: r0 = getpid() prctl$setptracer(0x59616d61, r0) socketpair$inet_sctp(0x2, 0x0, 0x84, &(0x7f0000000280)) prctl$setptracer(0x59616d61, 0x0) prctl$setptracer(0x59616d61, 0x0) prctl$setptracer(0x59616d61, 0x0) rseq(&(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={0x0, 0x2, 0x50d, 0xad, 0x1}, 0x1}, 0x20, 0x1, 0x0) prctl$setptracer(0x59616d61, r0) 21:23:40 executing program 0: syz_open_dev$sndseq(&(0x7f0000000000)='/dev/snd/seq\x00', 0x0, 0x0) userfaultfd(0x0) syz_open_dev$mice(&(0x7f0000000100)='/dev/input/mice\x00', 0x0, 0x0) pselect6(0x40, &(0x7f00000abfc0)={0x3ffffd, 0x0, 0x0, 0x0, 0x0, 0x8000000}, &(0x7f0000768000), &(0x7f00007fbfc0), &(0x7f0000f22000)={0x0, 0x989680}, &(0x7f0000f14000)={&(0x7f0000553ff8), 0x8}) 21:23:40 executing program 1: socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$sock_inet_SIOCSARP(0xffffffffffffffff, 0x8955, &(0x7f00000000c0)={{0x2, 0x200004e24, @multicast1=0xe0000001}, {0x0, @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}}, 0x0, {0x2, 0x0, @local={0xac, 0x14, 0x14, 0xaa}}, 'ip6_vti0\x00'}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000000, 0x0, 0x0, 0x0, 0x200000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) write$cgroup_int(0xffffffffffffffff, &(0x7f00000001c0), 0x4) 21:23:40 executing program 6: r0 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x17, 0x40040) ioctl$TUNSETLINK(r0, 0x400454cd, 0xd346159684a3e35b) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_AUTH_KEY(r1, 0x84, 0xc, &(0x7f0000000140)=ANY=[], 0x0) 21:23:40 executing program 4: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_AUTH_KEY(r0, 0x84, 0x18, &(0x7f0000001340)=ANY=[@ANYPTR=&(0x7f0000001140)=ANY=[@ANYRESDEC=r0, @ANYRESDEC=r0, @ANYRES16=r0, @ANYPTR64=&(0x7f0000000040)=ANY=[@ANYBLOB="d642b25b5d139fb934c00e66c797e31267078c5e28934a6f1949e7d63835cb0909b73362afa34bb50a316e11e5", @ANYPTR, @ANYPTR, @ANYBLOB="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", @ANYRESHEX=r0, @ANYBLOB="938d3043f0772c669409ccea963a8ba64f707c8604deb34b88b213a248030308f72f9d002cd6b638e5ea842c2048706eec5360ec56566ba3fb3dd9bcf62c27751750c1df5afb1814a4812cb0549c9913a7771af4c847908541d1461989972dda128130bb8976eec5d4959192935e76f0144cd44477071077a63d544321ede531a697323dbc742105fab18a546d931750b2a48b965a315eeff51f39c27241", @ANYPTR, @ANYPTR]], @ANYPTR=&(0x7f0000001180)=ANY=[@ANYRESOCT=r0, @ANYRESOCT=r0], @ANYRESOCT, @ANYRES16=r0, @ANYPTR64=&(0x7f0000001300)=ANY=[@ANYBLOB="ed9b410186dab297507f0992fb067fff190497806214688e4c89", @ANYPTR64=&(0x7f0000001280)=ANY=[@ANYRES16=r0, @ANYRESDEC, @ANYRESOCT=r0, @ANYRESDEC=r0, @ANYRES16=0x0, @ANYRES64=r0, @ANYRES64=r0, @ANYRESHEX]], @ANYBLOB="6d6e24018aff5bfeca519d9f435a82438c47be1ab9990baa433d96ffa8c1604858edc785f4a734c70e97cf1f89a930f1e75f83fd85fcfe3eb9bf4c1af3628bad0ffc6276ec558546184b89607a18848c4329609589200fcb19e8e810b8e781da39255c56fe8394"], 0x6) r1 = dup3(r0, r0, 0x80000) ioctl$SNDRV_CTL_IOCTL_POWER_STATE(r1, 0x800455d1, &(0x7f0000000000)) [ 131.565574] FAULT_INJECTION: forcing a failure. [ 131.565574] name failslab, interval 1, probability 0, space 0, times 0 [ 131.576893] CPU: 0 PID: 11198 Comm: syz-executor2 Not tainted 4.18.0-rc3-next-20180706+ #1 [ 131.585301] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 131.594657] Call Trace: [ 131.597258] dump_stack+0x1c9/0x2b4 [ 131.600923] ? dump_stack_print_info.cold.2+0x52/0x52 [ 131.606133] ? perf_trace_lock+0xde/0x920 [ 131.610299] should_fail.cold.4+0xa/0x11 [ 131.614407] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 131.619527] ? zap_class+0x740/0x740 [ 131.623260] ? save_stack+0xa9/0xd0 [ 131.626900] ? save_stack+0x43/0xd0 [ 131.630714] ? kasan_kmalloc+0xc4/0xe0 [ 131.634615] ? __kmalloc_track_caller+0x14a/0x760 [ 131.639473] ? memdup_user+0x2c/0xa0 [ 131.643204] ? strndup_user+0x77/0xd0 [ 131.647016] ? ksys_mount+0x3c/0x140 [ 131.650738] ? do_syscall_64+0x1b9/0x820 [ 131.654838] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 131.660227] ? lock_acquire+0x1e4/0x540 21:23:40 executing program 5: getsockopt$inet6_mreq(0xffffffffffffff9c, 0x29, 0x1f, &(0x7f0000000240)={@mcast2}, &(0x7f0000000280)=0x14) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000200)={0x10}, 0xc, &(0x7f0000000340)={&(0x7f0000000300)=ANY=[@ANYBLOB="2c0000002600200300000000fedbdf250000"], 0x1}, 0x1, 0x0, 0x0, 0x40000}, 0x20004000) ioctl$sock_inet_SIOCSARP(0xffffffffffffffff, 0x8955, &(0x7f00000000c0)={{0x2, 0x200004e24, @multicast1=0xe0000001}, {0x0, @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}}, 0x2, {0x2, 0x0, @local={0xac, 0x14, 0x14, 0xaa}}, 'ip6_vti0\x00'}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000000, 0x0, 0x0, 0x0, 0x200000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x0, 0x0) setsockopt$IP_VS_SO_SET_TIMEOUT(0xffffffffffffffff, 0x0, 0x48a, &(0x7f00000003c0)={0x0, 0x45e6a3c0, 0x81}, 0xc) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) write$cgroup_int(0xffffffffffffffff, &(0x7f00000001c0), 0x4) [ 131.664213] ? handle_mm_fault+0x417/0xc80 [ 131.668462] ? lock_acquire+0x1e4/0x540 [ 131.672450] ? fs_reclaim_acquire+0x20/0x20 [ 131.676792] ? lock_downgrade+0x8f0/0x8f0 [ 131.680958] ? check_same_owner+0x340/0x340 [ 131.685295] ? lock_release+0xa30/0xa30 [ 131.689281] ? rcu_note_context_switch+0x730/0x730 [ 131.694228] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 131.699272] __should_failslab+0x124/0x180 [ 131.703533] should_failslab+0x9/0x14 [ 131.707378] __kmalloc_track_caller+0x2c4/0x760 [ 131.712062] ? strncpy_from_user+0x510/0x510 [ 131.716488] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 131.722040] ? strndup_user+0x77/0xd0 [ 131.725865] memdup_user+0x2c/0xa0 [ 131.729426] strndup_user+0x77/0xd0 [ 131.733071] ksys_mount+0x73/0x140 [ 131.736630] __x64_sys_mount+0xbe/0x150 [ 131.740624] do_syscall_64+0x1b9/0x820 [ 131.744551] ? finish_task_switch+0x1d3/0x870 [ 131.749059] ? syscall_return_slowpath+0x5e0/0x5e0 [ 131.754000] ? syscall_return_slowpath+0x31d/0x5e0 [ 131.758940] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 131.763965] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 131.769515] ? prepare_exit_to_usermode+0x291/0x3b0 [ 131.774543] ? perf_trace_sys_enter+0xb10/0xb10 [ 131.779226] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 131.784091] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 131.789287] RIP: 0033:0x45885a [ 131.792504] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 dd 8f fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 ba 8f fb ff c3 66 0f 1f 84 00 00 00 00 00 21:23:40 executing program 3: r0 = getpid() prctl$setptracer(0x59616d61, r0) socketpair$inet_sctp(0x2, 0x0, 0x84, &(0x7f0000000280)) prctl$setptracer(0x59616d61, 0x0) prctl$setptracer(0x59616d61, 0x0) prctl$setptracer(0x59616d61, 0x0) prctl$setptracer(0x59616d61, r0) 21:23:40 executing program 4: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_AUTH_KEY(r0, 0x84, 0x18, &(0x7f0000000140)=ANY=[], 0x0) 21:23:40 executing program 6: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_AUTH_KEY(r0, 0x84, 0xc, &(0x7f0000000140)=ANY=[], 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext3\x00', &(0x7f0000000040)='./file0\x00', 0xffffffff, 0x2, &(0x7f0000000180)=[{&(0x7f0000000080)="e705b519934e583b5ddde7c547592161a230354e80239269b90673df9ac0b016aeb6124ef6fe97c6f2e1647b7e43c1c85c60481c75d45c080a0f8b928783c0d0b396cd053d2feb955d038b294986dfa1370b6cbf4b63edf0c3c34954a87ec2b79b523f63152557a7265664ac27f7eba6f4951ab2a3901ca3887297da8611f58fe24e15b9291c57d8d8514ec09823d9744631dda28591e6fd8a1b3626c1ce366affa051f100cc68e67ac3ddca7968", 0xae, 0x80000001}, {&(0x7f0000000140)="9b6fb18909845d0dcaa5f94cdb98175d17569e7838b5bfb8647c51279d458fe69191418b425ba8a1", 0x28, 0x9}], 0x8, &(0x7f00000001c0)={[{@barrier_val={'barrier', 0x3d, [0x33, 0x3f7dad08f4fb0e96, 0x2d, 0x30]}, 0x2c}, {@grpjquota_path={'grpjquota', 0x3d, './file0'}, 0x2c}]}) 21:23:40 executing program 0: syz_open_dev$sndseq(&(0x7f0000000000)='/dev/snd/seq\x00', 0x0, 0x0) userfaultfd(0x0) syz_open_dev$mice(&(0x7f0000000100)='/dev/input/mice\x00', 0x0, 0x0) pselect6(0x40, &(0x7f00000abfc0)={0x3ffffd, 0x0, 0x0, 0x0, 0x0, 0x1600}, &(0x7f0000768000), &(0x7f00007fbfc0), &(0x7f0000f22000)={0x0, 0x989680}, &(0x7f0000f14000)={&(0x7f0000553ff8), 0x8}) [ 131.811843] RSP: 002b:00007fe773c40a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 131.819571] RAX: ffffffffffffffda RBX: 00007fe773c40b30 RCX: 000000000045885a [ 131.826841] RDX: 00007fe773c40ad0 RSI: 0000000020001740 RDI: 00007fe773c40af0 [ 131.834099] RBP: 0000000020001740 R08: 00007fe773c40b30 R09: 00007fe773c40ad0 [ 131.841357] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000014 [ 131.848622] R13: 0000000000000000 R14: 00000000004d3eb0 R15: 0000000000000020 21:23:40 executing program 2 (fault-call:0 fault-nth:33): syz_mount_image$gfs2(&(0x7f0000000040)='gfs2\x00', &(0x7f0000001740)='./file0\x00', 0x0, 0x0, &(0x7f0000001680), 0x0, &(0x7f0000000880)=ANY=[@ANYBLOB='l']) 21:23:40 executing program 7: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$hfsplus(&(0x7f0000000040)='hfsplos\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000300), 0x0, &(0x7f0000000380)) 21:23:41 executing program 4: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(r0, 0x84, 0x7b, &(0x7f0000000040)={0x0, 0x6}, &(0x7f0000000080)=0x8) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(r0, 0x84, 0x1b, &(0x7f00000000c0)={r1, 0xb4, "53fb79a1186589b7a2c86c6d1177cd2c0ad1378123c4a14269125c7304f3c0de8ed90aeb6c6afd2fbf03a9363db1ad1e9db4da3bfa3cf4c3944eaf2c1439bbc0d5fc6a93ba76f64df3f6accb0e5f97071400ffded557dd9e5cd2b355ee9066cffa05386745ebc280b2074a74110a3dd57f52efa0711010e5dcb407d2a67bf11c84232283460f88d18d6580e06600c7372237bd36cd0eca782c199c6a232a5fc38ab76489abca0057790d1b36a159e6ece8c9f554"}, &(0x7f0000000180)=0xbc) setsockopt$inet_sctp6_SCTP_AUTH_KEY(r0, 0x84, 0x18, &(0x7f0000000140)=ANY=[], 0x0) syz_genetlink_get_family_id$fou(&(0x7f0000000000)='fou\x00') 21:23:41 executing program 0: syz_open_dev$sndseq(&(0x7f0000000000)='/dev/snd/seq\x00', 0x0, 0x0) userfaultfd(0x0) syz_open_dev$mice(&(0x7f0000000100)='/dev/input/mice\x00', 0x0, 0x0) pselect6(0x40, &(0x7f00000abfc0)={0x3ffffd, 0x0, 0x0, 0x0, 0x0, 0x6400}, &(0x7f0000768000), &(0x7f00007fbfc0), &(0x7f0000f22000)={0x0, 0x989680}, &(0x7f0000f14000)={&(0x7f0000553ff8), 0x8}) 21:23:41 executing program 3: r0 = getpid() prctl$setptracer(0x59616d61, r0) request_key(&(0x7f0000000080)='.request_key_auth\x00', &(0x7f00000000c0)={0x73, 0x79, 0x7a, 0x2}, &(0x7f0000000100)='vmnet0@@\x00', 0xfffffffffffffff9) setxattr(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180)=@known='security.evm\x00', &(0x7f00000001c0)='!posix_acl_access\x00', 0x12, 0x1) r1 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0x0, 0x0) write$P9_RVERSION(r1, &(0x7f00000002c0)=ANY=[@ANYBLOB="156b66e869ef3e139d0beb00b15b951a19000061b6ff81000000ea14c399dc9d08bbeaf2b3655b342fca4448272d403044b4f48e214c92291eea3aeb21b6e562789a0e8f8684c7fd558327900900000000000000e9c6b1e30ae6559c49"], 0x15) socketpair$inet_sctp(0x2, 0x0, 0x84, &(0x7f0000000280)) prctl$setptracer(0x59616d61, 0x0) prctl$setptracer(0x59616d61, 0x0) prctl$setptracer(0x59616d61, 0x0) prctl$setptracer(0x59616d61, r0) gettid() 21:23:41 executing program 1: r0 = memfd_create(&(0x7f00000002c0)='/dev/vcs#\x00', 0x0) fgetxattr(r0, &(0x7f0000000300)=@known='security.capability\x00', &(0x7f0000000740)=""/4096, 0x1000) 21:23:41 executing program 4: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_AUTH_KEY(r0, 0x84, 0x18, &(0x7f0000000140)=ANY=[], 0x0) r1 = socket(0x8, 0x1, 0x7f) ioctl$sock_inet_SIOCDARP(r1, 0x8953, &(0x7f0000000040)={{0x2, 0x4e20, @loopback=0x7f000001}, {0x6, @random="6da95d71f8ae"}, 0x70, {0x2, 0x4e20}, 'veth0\x00'}) poll(&(0x7f0000000000)=[{r0, 0x2052}, {r0, 0x10}, {r0}], 0x3, 0x1) [ 132.052336] EXT4-fs (loop6): VFS: Can't find ext4 filesystem [ 132.079553] FAULT_INJECTION: forcing a failure. [ 132.079553] name failslab, interval 1, probability 0, space 0, times 0 [ 132.090849] CPU: 0 PID: 11272 Comm: syz-executor2 Not tainted 4.18.0-rc3-next-20180706+ #1 21:23:41 executing program 5: add_key(&(0x7f0000000080)='id_legacy\x00', &(0x7f00000000c0)={0x73, 0x79, 0x7a}, &(0x7f0000000100)='x', 0x1, 0xfffffffffffffffb) [ 132.099258] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 132.108670] Call Trace: [ 132.111275] dump_stack+0x1c9/0x2b4 [ 132.114954] ? dump_stack_print_info.cold.2+0x52/0x52 [ 132.120186] ? __kernel_text_address+0xd/0x40 [ 132.124704] ? perf_trace_lock+0xde/0x920 [ 132.128883] should_fail.cold.4+0xa/0x11 [ 132.132964] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 132.138080] ? zap_class+0x740/0x740 [ 132.141812] ? save_stack+0xa9/0xd0 [ 132.145458] ? kasan_kmalloc+0xc4/0xe0 21:23:41 executing program 4: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_AUTH_KEY(r0, 0x84, 0x18, &(0x7f0000000140)=ANY=[], 0x0) r1 = syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x2, 0x280) setsockopt$inet_tcp_TLS_RX(r1, 0x6, 0x2, &(0x7f0000000040)={0x303, 0x33}, 0xffffffffffffffb4) [ 132.149369] ? __kmalloc_track_caller+0x14a/0x760 [ 132.154403] ? memdup_user+0x2c/0xa0 [ 132.158396] ? strndup_user+0x77/0xd0 [ 132.162211] ? ksys_mount+0x73/0x140 [ 132.165939] ? __x64_sys_mount+0xbe/0x150 [ 132.170104] ? do_syscall_64+0x1b9/0x820 [ 132.174213] ? lock_acquire+0x1e4/0x540 [ 132.178204] ? handle_mm_fault+0x417/0xc80 [ 132.182458] ? lock_acquire+0x1e4/0x540 [ 132.186456] ? fs_reclaim_acquire+0x20/0x20 [ 132.190794] ? lock_downgrade+0x8f0/0x8f0 [ 132.194959] ? check_same_owner+0x340/0x340 [ 132.199302] ? lock_release+0xa30/0xa30 [ 132.203296] ? check_same_owner+0x340/0x340 [ 132.207627] ? rcu_note_context_switch+0x730/0x730 [ 132.212553] ? __check_object_size+0x9d/0x5f2 [ 132.217037] __should_failslab+0x124/0x180 [ 132.221269] should_failslab+0x9/0x14 [ 132.225073] kmem_cache_alloc_trace+0x2cb/0x780 [ 132.229752] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 132.235285] ? _copy_from_user+0xdf/0x150 [ 132.239436] copy_mount_options+0x5f/0x380 [ 132.243666] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 132.249202] ksys_mount+0xd0/0x140 [ 132.252737] __x64_sys_mount+0xbe/0x150 [ 132.256713] ? write_comp_data+0x70/0x70 [ 132.260761] do_syscall_64+0x1b9/0x820 [ 132.264642] ? finish_task_switch+0x1d3/0x870 [ 132.269123] ? syscall_return_slowpath+0x5e0/0x5e0 [ 132.274039] ? syscall_return_slowpath+0x31d/0x5e0 [ 132.278968] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 132.283977] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 132.289515] ? prepare_exit_to_usermode+0x291/0x3b0 [ 132.294515] ? perf_trace_sys_enter+0xb10/0xb10 [ 132.299169] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 132.304009] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 132.309187] RIP: 0033:0x45885a [ 132.312376] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 dd 8f fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 ba 8f fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 132.331573] RSP: 002b:00007fe773c40a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 132.339264] RAX: ffffffffffffffda RBX: 00007fe773c40b30 RCX: 000000000045885a [ 132.346520] RDX: 00007fe773c40ad0 RSI: 0000000020001740 RDI: 00007fe773c40af0 21:23:41 executing program 5: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x0, 0x0) fstat(r0, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setfsgid(r1) [ 132.353781] RBP: 0000000020001740 R08: 00007fe773c40b30 R09: 00007fe773c40ad0 [ 132.361035] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000014 [ 132.368297] R13: 0000000000000000 R14: 00000000004d3eb0 R15: 0000000000000021 21:23:41 executing program 6: r0 = socket$kcm(0x2, 0x5, 0x0) setsockopt$sock_attach_bpf(r0, 0x84, 0x65, &(0x7f00000000c0), 0x54deded00158a180) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) ioctl$sock_SIOCDELDLCI(r1, 0x8981, &(0x7f0000000040)={'syzkaller1\x00', 0x7fff}) setsockopt$inet_sctp6_SCTP_AUTH_KEY(r1, 0x84, 0xc, &(0x7f0000000140)=ANY=[], 0x0) 21:23:41 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000100)={0x26, 'aead\x00', 0x0, 0x0, 'gcm_base(ctr-camellia-asm,ghash-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000480)="d3ab27191a010023560fd9d5e03eba602dff05b82756df62", 0x18) 21:23:41 executing program 7: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$hfsplus(&(0x7f0000000040)='hfsplxs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000300), 0x0, &(0x7f0000000380)) 21:23:41 executing program 0: syz_open_dev$sndseq(&(0x7f0000000000)='/dev/snd/seq\x00', 0x0, 0x0) userfaultfd(0x0) syz_open_dev$mice(&(0x7f0000000100)='/dev/input/mice\x00', 0x0, 0x0) pselect6(0x40, &(0x7f00000abfc0)={0x3ffffd, 0x0, 0x0, 0x0, 0x0, 0x6000000000000000}, &(0x7f0000768000), &(0x7f00007fbfc0), &(0x7f0000f22000)={0x0, 0x989680}, &(0x7f0000f14000)={&(0x7f0000553ff8), 0x8}) 21:23:41 executing program 4: r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) getsockopt$inet_sctp_SCTP_DELAYED_SACK(0xffffffffffffff9c, 0x84, 0x10, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r0, 0x84, 0x18, &(0x7f0000000080)={r1, 0x1}, &(0x7f00000000c0)=0x8) r2 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_AUTH_KEY(r2, 0x84, 0x18, &(0x7f0000000140)=ANY=[], 0x0) 21:23:41 executing program 3: r0 = getpid() prctl$setptracer(0x59616d61, r0) socketpair$inet_sctp(0x2, 0x0, 0x84, &(0x7f0000000280)) prctl$setptracer(0x59616d61, 0x0) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x20) ioctl$PPPIOCGCHAN(r1, 0x80047437, &(0x7f0000000040)) prctl$setptracer(0x59616d61, r0) prctl$setptracer(0x59616d61, 0x0) prctl$setptracer(0x59616d61, r0) 21:23:41 executing program 2 (fault-call:0 fault-nth:34): syz_mount_image$gfs2(&(0x7f0000000040)='gfs2\x00', &(0x7f0000001740)='./file0\x00', 0x0, 0x0, &(0x7f0000001680), 0x0, &(0x7f0000000880)=ANY=[@ANYBLOB='l']) 21:23:41 executing program 5: 21:23:41 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000100)={0x26, 'aead\x00', 0x0, 0x0, 'gcm_base(ctr-camellia-asm,ghash-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000480)="d3ab27191a010023560fd9d5e03eba602dff05b82756df62", 0x18) 21:23:41 executing program 5: 21:23:41 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000100)={0x26, 'aead\x00', 0x0, 0x0, 'gcm_base(ctr-camellia-asm,ghash-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000480)="d3ab27191a010023560fd9d5e03eba602dff05b82756df62", 0x18) [ 132.633463] FAULT_INJECTION: forcing a failure. [ 132.633463] name failslab, interval 1, probability 0, space 0, times 0 [ 132.644792] CPU: 1 PID: 11348 Comm: syz-executor2 Not tainted 4.18.0-rc3-next-20180706+ #1 [ 132.653203] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 132.662563] Call Trace: [ 132.665172] dump_stack+0x1c9/0x2b4 [ 132.668819] ? dump_stack_print_info.cold.2+0x52/0x52 [ 132.674029] ? __kernel_text_address+0xd/0x40 [ 132.678546] ? unwind_get_return_address+0x61/0xa0 21:23:41 executing program 5: 21:23:41 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000100)={0x26, 'aead\x00', 0x0, 0x0, 'gcm_base(ctr-camellia-asm,ghash-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000480)="d3ab27191a010023560fd9d5e03eba602dff05b82756df62", 0x18) [ 132.683518] should_fail.cold.4+0xa/0x11 [ 132.687600] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 132.692722] ? save_stack+0xa9/0xd0 [ 132.696467] ? kasan_kmalloc+0xc4/0xe0 [ 132.700438] ? __kmalloc_track_caller+0x14a/0x760 [ 132.705326] ? memdup_user+0x2c/0xa0 [ 132.709066] ? strndup_user+0x77/0xd0 [ 132.712888] ? ksys_mount+0x73/0x140 [ 132.716705] ? __x64_sys_mount+0xbe/0x150 [ 132.720884] ? do_syscall_64+0x1b9/0x820 [ 132.724968] ? lock_acquire+0x1e4/0x540 [ 132.728979] ? handle_mm_fault+0x417/0xc80 21:23:41 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = socket$alg(0x26, 0x5, 0x0) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000480)="d3ab27191a010023560fd9d5e03eba602dff05b82756df62", 0x18) [ 132.733240] ? lock_release+0xa30/0xa30 [ 132.737355] ? lock_acquire+0x1e4/0x540 [ 132.741608] ? fs_reclaim_acquire+0x20/0x20 [ 132.745961] ? lock_downgrade+0x8f0/0x8f0 [ 132.750141] ? check_same_owner+0x340/0x340 [ 132.754491] ? lock_release+0xa30/0xa30 [ 132.758494] ? check_same_owner+0x340/0x340 [ 132.762836] ? rcu_note_context_switch+0x730/0x730 [ 132.767783] ? __check_object_size+0x9d/0x5f2 [ 132.772291] __should_failslab+0x124/0x180 [ 132.776565] should_failslab+0x9/0x14 21:23:41 executing program 5: 21:23:41 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") bind$alg(0xffffffffffffffff, &(0x7f0000000100)={0x26, 'aead\x00', 0x0, 0x0, 'gcm_base(ctr-camellia-asm,ghash-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000480)="d3ab27191a010023560fd9d5e03eba602dff05b82756df62", 0x18) [ 132.780382] kmem_cache_alloc_trace+0x2cb/0x780 [ 132.785069] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 132.790621] ? _copy_from_user+0xdf/0x150 [ 132.794791] copy_mount_options+0x5f/0x380 [ 132.799049] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 132.804601] ksys_mount+0xd0/0x140 [ 132.808166] __x64_sys_mount+0xbe/0x150 [ 132.812165] do_syscall_64+0x1b9/0x820 [ 132.816063] ? finish_task_switch+0x1d3/0x870 [ 132.820573] ? syscall_return_slowpath+0x5e0/0x5e0 [ 132.825514] ? syscall_return_slowpath+0x31d/0x5e0 [ 132.830453] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 132.835459] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 132.840980] ? prepare_exit_to_usermode+0x291/0x3b0 [ 132.845983] ? perf_trace_sys_enter+0xb10/0xb10 [ 132.851418] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 132.856250] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 132.861421] RIP: 0033:0x45885a [ 132.864591] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 dd 8f fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 ba 8f fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 132.883763] RSP: 002b:00007fe773c40a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 132.891456] RAX: ffffffffffffffda RBX: 00007fe773c40b30 RCX: 000000000045885a [ 132.898722] RDX: 00007fe773c40ad0 RSI: 0000000020001740 RDI: 00007fe773c40af0 [ 132.905977] RBP: 0000000020001740 R08: 00007fe773c40b30 R09: 00007fe773c40ad0 [ 132.913229] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000014 [ 132.920483] R13: 0000000000000000 R14: 00000000004d3eb0 R15: 0000000000000022 21:23:42 executing program 6: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_AUTH_KEY(r0, 0x84, 0xc, &(0x7f0000000180)=ANY=[@ANYRES32=r0, @ANYRES64=r0, @ANYRESHEX=0x0, @ANYPTR64=&(0x7f0000000000)=ANY=[@ANYRES64=r0, @ANYRESOCT=r0, @ANYBLOB="8569c38899baff8408ba274ac4f95919984a44d53cb42884fd76274f513504028701470cb780a6605e2b87904714647ce661", @ANYRES32], @ANYRES64=0x0, @ANYBLOB="98e3b05fe89fa08a0ad4fef5ccea83ea9a82a7695a4d7f2861be7fe0fc1c1091a30abb7f8f24f0b02c42ef798a533587f0c0489aa921266f9fff9d63b096d28ac8fcc15eaf56af692fff0ed0361fd283d270d904b90dc26b2675224f704c8e9f3b1d6a7a6e3aee6ccb84516c7c2aa5caf2026cf29af579fdc9ddcc42718ca4a4bcfe19e1b6a3e3c576cebf2b92c0fb8f752ab9f9826725b985be35e9683b8008f7610cf2a72653b2a24b05a815f93527997706d8ed4fcb90e4d37ee5fa6bff388fc2458e06fd1b560330"], 0x6) 21:23:42 executing program 0: syz_open_dev$sndseq(&(0x7f0000000000)='/dev/snd/seq\x00', 0x0, 0x0) userfaultfd(0x0) syz_open_dev$mice(&(0x7f0000000100)='/dev/input/mice\x00', 0x0, 0x0) pselect6(0x40, &(0x7f00000abfc0)={0x3ffffd, 0x0, 0x0, 0x0, 0x0, 0x6400000000000000}, &(0x7f0000768000), &(0x7f00007fbfc0), &(0x7f0000f22000)={0x0, 0x989680}, &(0x7f0000f14000)={&(0x7f0000553ff8), 0x8}) 21:23:42 executing program 4: socket$inet6_sctp(0xa, 0x5, 0x84) r0 = creat(&(0x7f0000000000)='./file0\x00', 0x102) ioctl$SNDRV_SEQ_IOCTL_RUNNING_MODE(r0, 0xc0105303, &(0x7f0000000040)={0x389, 0x2, 0x4}) 21:23:42 executing program 3: r0 = getpid() sched_setscheduler(r0, 0x2, &(0x7f0000000000)=0x1) prctl$setptracer(0x59616d61, r0) socketpair$inet_sctp(0x2, 0x0, 0x84, &(0x7f0000000280)) prctl$setptracer(0x59616d61, 0x0) prctl$setptracer(0x59616d61, 0x0) prctl$setptracer(0x59616d61, 0x0) prctl$setptracer(0x59616d61, r0) 21:23:42 executing program 7: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$hfsplus(&(0x7f0000000040)='hfspl%s\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000300), 0x0, &(0x7f0000000380)) 21:23:42 executing program 5: 21:23:42 executing program 2 (fault-call:0 fault-nth:35): syz_mount_image$gfs2(&(0x7f0000000040)='gfs2\x00', &(0x7f0000001740)='./file0\x00', 0x0, 0x0, &(0x7f0000001680), 0x0, &(0x7f0000000880)=ANY=[@ANYBLOB='l']) 21:23:42 executing program 1: socket$inet6(0xa, 0x1000000000002, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000100)={0x26, 'aead\x00', 0x0, 0x0, 'gcm_base(ctr-camellia-asm,ghash-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000480)="d3ab27191a010023560fd9d5e03eba602dff05b82756df62", 0x18) [ 133.096180] FAULT_INJECTION: forcing a failure. [ 133.096180] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 133.108040] CPU: 0 PID: 11389 Comm: syz-executor2 Not tainted 4.18.0-rc3-next-20180706+ #1 [ 133.116670] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 133.126032] Call Trace: [ 133.128651] dump_stack+0x1c9/0x2b4 [ 133.132296] ? dump_stack_print_info.cold.2+0x52/0x52 [ 133.137510] should_fail.cold.4+0xa/0x11 [ 133.141601] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 133.146736] ? zap_class+0x740/0x740 [ 133.150469] ? __ext4_journal_stop+0xde/0x1f0 [ 133.155014] ? ext4_mkdir+0xa2c/0xe60 [ 133.158838] ? trace_hardirqs_on+0x10/0x10 [ 133.163098] ? kasan_check_read+0x11/0x20 [ 133.167271] ? zap_class+0x740/0x740 [ 133.171033] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 133.176085] ? perf_trace_lock+0xde/0x920 [ 133.180266] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 133.185814] ? should_fail+0x246/0xd86 [ 133.189716] ? zap_class+0x740/0x740 21:23:42 executing program 1: socket$inet6(0xa, 0x1000000000002, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000100)={0x26, 'aead\x00', 0x0, 0x0, 'gcm_base(ctr-camellia-asm,ghash-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000480)="d3ab27191a010023560fd9d5e03eba602dff05b82756df62", 0x18) 21:23:42 executing program 5: 21:23:42 executing program 5: 21:23:42 executing program 6: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) setsockopt$netlink_NETLINK_DROP_MEMBERSHIP(r0, 0x10e, 0x2, &(0x7f0000000000)=0xa, 0x4) r1 = openat$null(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/null\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS(r1, 0x4c02, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x7fffffff, 0x16, 0xa, 0x1, "cf8c1f67d7891e1671628cd28d1429a6b16c182582c935a49ad3483e5cfae3a44a485853985326b24b212ee455634d4db242132771343e36a7c81aaa4ad717d9", "08515c90cf43abf818a2b7a63f9ea969b0905975311ac40a3abdbc6b6e065753", [0x8, 0xa699]}) getsockopt$inet_sctp6_SCTP_RTOINFO(r1, 0x84, 0x0, &(0x7f00000001c0)={0x0, 0x80000001, 0x5a, 0x3}, &(0x7f0000000200)=0x10) getsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(r1, 0x84, 0x75, &(0x7f0000000240)={r2, 0x1}, &(0x7f0000000280)=0x8) r3 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_AUTH_KEY(r3, 0x84, 0xc, &(0x7f0000000140)=ANY=[], 0x0) getsockopt$IP_VS_SO_GET_TIMEOUT(r3, 0x0, 0x486, &(0x7f0000000040), &(0x7f0000000080)=0xc) 21:23:42 executing program 1: socket$inet6(0xa, 0x1000000000002, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000100)={0x26, 'aead\x00', 0x0, 0x0, 'gcm_base(ctr-camellia-asm,ghash-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000480)="d3ab27191a010023560fd9d5e03eba602dff05b82756df62", 0x18) [ 133.193469] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 133.198641] __alloc_pages_nodemask+0x36e/0xdb0 [ 133.203352] ? kasan_check_read+0x11/0x20 [ 133.207543] ? rcu_is_watching+0x8c/0x150 [ 133.211727] ? __alloc_pages_slowpath+0x2d00/0x2d00 [ 133.216763] ? is_bpf_text_address+0xd7/0x170 [ 133.221467] ? kernel_text_address+0x79/0xf0 [ 133.225905] ? lock_acquire+0x1e4/0x540 [ 133.229915] ? fs_reclaim_acquire+0x20/0x20 [ 133.234261] ? lock_downgrade+0x8f0/0x8f0 [ 133.238520] ? lock_release+0xa30/0xa30 [ 133.242548] ? check_same_owner+0x340/0x340 21:23:42 executing program 5: 21:23:42 executing program 6: setsockopt$inet_sctp6_SCTP_AUTH_KEY(0xffffffffffffffff, 0x84, 0xc, &(0x7f0000000140)=ANY=[], 0x0) r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x101000, 0x0) sendmsg$nl_crypto(r0, &(0x7f0000000200)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000080)=ANY=[@ANYBLOB="200100001200200027bd7000fbdbdf256d6f72757331323830000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000000000000000000000000000000000000000e0ffffff00000000000000000000000000000000000000000000000000000000000000000000000000000000000024000000040000000000000000000008000100fb6f957d08000100070000000800010002b5000008000100b30f0000080001000080ffff080001000300000008000100090000000000000000000000"], 0x120}, 0x1, 0x0, 0x0, 0x20000000}, 0x4008000) 21:23:42 executing program 1: ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000100)={0x26, 'aead\x00', 0x0, 0x0, 'gcm_base(ctr-camellia-asm,ghash-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000480)="d3ab27191a010023560fd9d5e03eba602dff05b82756df62", 0x18) [ 133.246904] ? save_stack+0xa9/0xd0 [ 133.250570] cache_grow_begin+0x91/0x710 [ 133.254660] kmem_cache_alloc+0x689/0x760 [ 133.258825] ? lock_acquire+0x1e4/0x540 [ 133.262822] getname_flags+0xd0/0x5a0 [ 133.266682] user_path_at_empty+0x2d/0x50 [ 133.270849] do_mount+0x180/0x1fb0 [ 133.274431] ? check_same_owner+0x340/0x340 [ 133.278763] ? lock_release+0xa30/0xa30 [ 133.282749] ? check_same_owner+0x340/0x340 [ 133.287107] ? copy_mount_string+0x40/0x40 [ 133.291367] ? retint_kernel+0x10/0x10 21:23:42 executing program 5: r0 = gettid() kcmp(r0, r0, 0x2, 0xffffffffffffffff, 0xffffffffffffffff) open$dir(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) [ 133.295289] ? copy_mount_options+0x213/0x380 [ 133.299806] ? copy_mount_options+0x213/0x380 [ 133.304315] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 133.309862] ? copy_mount_options+0x285/0x380 [ 133.314371] ksys_mount+0x12d/0x140 [ 133.318102] __x64_sys_mount+0xbe/0x150 [ 133.322107] do_syscall_64+0x1b9/0x820 [ 133.326003] ? finish_task_switch+0x1d3/0x870 [ 133.330534] ? syscall_return_slowpath+0x5e0/0x5e0 [ 133.335472] ? syscall_return_slowpath+0x31d/0x5e0 [ 133.340414] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 133.345444] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 133.350995] ? prepare_exit_to_usermode+0x291/0x3b0 [ 133.356029] ? perf_trace_sys_enter+0xb10/0xb10 [ 133.360718] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 133.365585] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 133.370800] RIP: 0033:0x45885a [ 133.373990] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 dd 8f fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 ba 8f fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 133.393305] RSP: 002b:00007fe773c40a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 133.401028] RAX: ffffffffffffffda RBX: 00007fe773c40b30 RCX: 000000000045885a [ 133.409439] RDX: 00007fe773c40ad0 RSI: 0000000020001740 RDI: 00007fe773c40af0 [ 133.416718] RBP: 0000000020001740 R08: 00007fe773c40b30 R09: 00007fe773c40ad0 [ 133.423996] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000014 [ 133.431298] R13: 0000000000000000 R14: 00000000004d3eb0 R15: 0000000000000023 21:23:42 executing program 0: syz_open_dev$sndseq(&(0x7f0000000000)='/dev/snd/seq\x00', 0x0, 0x0) userfaultfd(0x0) syz_open_dev$mice(&(0x7f0000000100)='/dev/input/mice\x00', 0x0, 0x0) pselect6(0x40, &(0x7f00000abfc0)={0x3ffffd, 0x0, 0x0, 0x0, 0x0, 0x10000000}, &(0x7f0000768000), &(0x7f00007fbfc0), &(0x7f0000f22000)={0x0, 0x989680}, &(0x7f0000f14000)={&(0x7f0000553ff8), 0x8}) 21:23:42 executing program 6: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_AUTH_KEY(r0, 0x84, 0xc, &(0x7f0000000140)=ANY=[], 0x0) 21:23:42 executing program 1: ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000100)={0x26, 'aead\x00', 0x0, 0x0, 'gcm_base(ctr-camellia-asm,ghash-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000480)="d3ab27191a010023560fd9d5e03eba602dff05b82756df62", 0x18) [ 133.458898] gfs2: invalid mount option: l [ 133.463164] gfs2: can't parse mount arguments 21:23:42 executing program 7: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$hfsplus(&(0x7f0000000040)='hfsplds\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000300), 0x0, &(0x7f0000000380)) 21:23:42 executing program 5: r0 = gettid() kcmp(r0, r0, 0x2, 0xffffffffffffffff, 0xffffffffffffffff) open$dir(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) 21:23:42 executing program 2 (fault-call:0 fault-nth:36): syz_mount_image$gfs2(&(0x7f0000000040)='gfs2\x00', &(0x7f0000001740)='./file0\x00', 0x0, 0x0, &(0x7f0000001680), 0x0, &(0x7f0000000880)=ANY=[@ANYBLOB='l']) 21:23:42 executing program 4: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) r1 = syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x88, 0x200001) getsockopt$kcm_KCM_RECV_DISABLE(r1, 0x119, 0x1, &(0x7f0000000080), 0x4) setsockopt$llc_int(r1, 0x10c, 0xb, &(0x7f0000000040)=0x5, 0x4) setsockopt$inet_sctp6_SCTP_AUTH_KEY(r0, 0x84, 0x18, &(0x7f0000000140)=ANY=[], 0x0) 21:23:42 executing program 6: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r0, 0x0) setsockopt$inet_sctp6_SCTP_AUTH_KEY(r0, 0x84, 0xc, &(0x7f0000000140)=ANY=[], 0x0) 21:23:42 executing program 3: r0 = getpid() prctl$setptracer(0x59616d61, r0) socketpair$inet_sctp(0x2, 0x0, 0x84, &(0x7f0000000280)) prctl$setptracer(0x59616d61, 0x0) prctl$setptracer(0x59616d61, 0x0) prctl$setptracer(0x59616d61, 0x0) r1 = syz_open_dev$mice(&(0x7f0000000080)='/dev/input/mice\x00', 0x0, 0x111200) perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x5, 0x4ec5, 0x7, 0x7ff, 0x0, 0x2a, 0x400, 0xe, 0x7, 0x8, 0xfff, 0x4a, 0xfffffffffffff894, 0x2, 0x1f, 0x7, 0x401, 0x3, 0x10000, 0xffffffff, 0x1000, 0x100000001, 0x8, 0x9, 0x0, 0xfffffffffffffffe, 0x3, 0x6, 0x8d, 0xcb4, 0x1, 0x20, 0x483d, 0x4, 0x2, 0x0, 0x0, 0x10000, 0x4, @perf_config_ext={0x6, 0x3e03}, 0x6040, 0x7, 0x81, 0x7, 0x7, 0x391000, 0x6}, r0, 0xb, r1, 0x2) prctl$setptracer(0x59616d61, r0) 21:23:42 executing program 1: ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000100)={0x26, 'aead\x00', 0x0, 0x0, 'gcm_base(ctr-camellia-asm,ghash-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000480)="d3ab27191a010023560fd9d5e03eba602dff05b82756df62", 0x18) 21:23:42 executing program 5: r0 = gettid() kcmp(r0, r0, 0x2, 0xffffffffffffffff, 0xffffffffffffffff) open$dir(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) 21:23:42 executing program 4: [ 133.659287] FAULT_INJECTION: forcing a failure. [ 133.659287] name failslab, interval 1, probability 0, space 0, times 0 [ 133.670673] CPU: 0 PID: 11471 Comm: syz-executor2 Not tainted 4.18.0-rc3-next-20180706+ #1 [ 133.679086] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 133.688448] Call Trace: [ 133.691051] dump_stack+0x1c9/0x2b4 [ 133.694697] ? dump_stack_print_info.cold.2+0x52/0x52 [ 133.699913] ? perf_trace_lock+0xde/0x920 [ 133.704217] should_fail.cold.4+0xa/0x11 21:23:42 executing program 0: syz_open_dev$sndseq(&(0x7f0000000000)='/dev/snd/seq\x00', 0x0, 0x0) userfaultfd(0x0) syz_open_dev$mice(&(0x7f0000000100)='/dev/input/mice\x00', 0x0, 0x0) pselect6(0x40, &(0x7f00000abfc0)={0x3ffffd, 0x0, 0x0, 0x0, 0x0, 0x10}, &(0x7f0000768000), &(0x7f00007fbfc0), &(0x7f0000f22000)={0x0, 0x989680}, &(0x7f0000f14000)={&(0x7f0000553ff8), 0x8}) [ 133.708302] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 133.713432] ? save_stack+0xa9/0xd0 [ 133.717083] ? save_stack+0x43/0xd0 [ 133.720732] ? kasan_kmalloc+0xc4/0xe0 [ 133.724648] ? __kmalloc_track_caller+0x14a/0x760 [ 133.729509] ? kmemdup_nul+0x31/0xa0 [ 133.733263] ? vfs_set_fs_source+0x67/0x180 [ 133.737649] ? ksys_mount+0x12d/0x140 [ 133.741491] ? __x64_sys_mount+0xbe/0x150 [ 133.745659] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 133.751042] ? do_syscall_64+0x1b9/0x820 [ 133.755125] ? __sched_text_start+0x8/0x8 21:23:42 executing program 6: r0 = socket$inet6_sctp(0xa, 0x20005, 0x84) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r0, 0x84, 0x10, &(0x7f0000000800)=@sack_info={0x0, 0x5}, &(0x7f00000000c0)=0xc) getsockopt$IP_VS_SO_GET_DAEMON(r0, 0x0, 0x487, &(0x7f00000001c0), &(0x7f0000000200)=0x30) getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, &(0x7f0000000100)={0xffffffff, 0x1, 0x2, 0x4, 0x400, 0x3f, 0x6, 0x8, r1}, &(0x7f0000000140)=0x20) getsockopt$inet_sctp6_SCTP_I_WANT_MAPPED_V4_ADDR(r0, 0x84, 0xc, &(0x7f0000000000), &(0x7f0000000040)=0x4) setsockopt$inet_sctp6_SCTP_AUTH_KEY(r0, 0x84, 0xc, &(0x7f0000000140)=ANY=[], 0x0) r3 = openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x2000, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_WRITE(r3, 0xc4c85513, &(0x7f0000000280)={{0x4, 0x0, 0xffffffff, 0x7, '\x00', 0x9}, 0x0, [0x4, 0xffffffffffffff00, 0x9, 0x2, 0xfffffffffffffff8, 0x8, 0xffffffff, 0x2, 0x0, 0x4, 0x0, 0x0, 0xffffffffffffffff, 0x80000000, 0x2, 0x7, 0x321, 0x4, 0x2, 0x10001, 0x0, 0x7, 0x4, 0xfffffffffffffffd, 0xffffffffffffffff, 0xae, 0x401, 0x101, 0x3, 0x6, 0x2f6, 0x26, 0x6, 0x3, 0x8, 0xfffffffffffffffa, 0x5832, 0x8, 0x5, 0x8, 0x6, 0x4f0c, 0x2, 0x80, 0x0, 0x6, 0x8, 0x6, 0x72, 0x101, 0x4, 0x80000000000, 0x1, 0x7, 0x0, 0x3, 0x0, 0x4, 0x9, 0x7f, 0x7744, 0x8000, 0x9, 0x4, 0x200, 0x4, 0x100000001, 0x5, 0x80, 0x10001, 0x7, 0x3f, 0x83, 0x1, 0x1f, 0x5, 0x7, 0x8, 0x8, 0xfffffffffffffff9, 0x43, 0x0, 0x9, 0xffffffffffffff80, 0x9, 0x3f21328, 0x8, 0x4, 0x6, 0x4, 0x40, 0x7, 0xffffffffffffffff, 0xff, 0xff9, 0x8, 0x0, 0x8, 0x2, 0x8, 0x8, 0x4, 0xffff, 0x7d, 0xffffffffffff7fff, 0x1a, 0xb2af, 0x1000, 0x3, 0x3f, 0x3f4c, 0x7fffffff, 0x8, 0x4, 0x100, 0xffffffffffffff00, 0x7b62, 0x6, 0x1, 0x5, 0x7fff, 0x6, 0x0, 0x80000000, 0x61, 0x2, 0x3, 0x20], {0x0, 0x1c9c380}}) r4 = socket(0x13, 0x3, 0x8) setsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(r4, 0x84, 0x7c, &(0x7f0000000180)={r2, 0x4, 0x5}, 0x8) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(r3, 0x84, 0x77, &(0x7f0000000780)={r1, 0x7fffffff, 0x4, [0x3, 0x0, 0xfffffffffffffff9, 0xfff]}, &(0x7f00000007c0)=0x10) 21:23:42 executing program 1: r0 = socket$inet6(0xa, 0x0, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000100)={0x26, 'aead\x00', 0x0, 0x0, 'gcm_base(ctr-camellia-asm,ghash-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000480)="d3ab27191a010023560fd9d5e03eba602dff05b82756df62", 0x18) [ 133.759290] ? trace_hardirqs_off+0xd/0x10 [ 133.763543] ? lock_acquire+0x1e4/0x540 [ 133.767535] ? fs_reclaim_acquire+0x20/0x20 [ 133.771882] ? lock_downgrade+0x8f0/0x8f0 [ 133.776042] ? lock_downgrade+0x8f0/0x8f0 [ 133.780205] ? lock_release+0xa30/0xa30 [ 133.784197] ? check_same_owner+0x340/0x340 [ 133.788531] ? check_same_owner+0x340/0x340 [ 133.792875] ? debug_mutex_init+0x2d/0x60 [ 133.797045] ? rcu_note_context_switch+0x730/0x730 [ 133.802003] __should_failslab+0x124/0x180 [ 133.806267] should_failslab+0x9/0x14 21:23:42 executing program 4: 21:23:42 executing program 5: r0 = gettid() kcmp(r0, r0, 0x2, 0xffffffffffffffff, 0xffffffffffffffff) open$dir(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) [ 133.810096] __kmalloc_track_caller+0x2c4/0x760 [ 133.814782] ? __kmalloc_track_caller+0x311/0x760 [ 133.819668] ? security_fs_context_alloc+0x18/0xb0 [ 133.824615] ? legacy_parse_monolithic+0xc1/0x1d0 [ 133.829478] kmemdup+0x24/0x50 [ 133.832690] legacy_parse_monolithic+0xc1/0x1d0 [ 133.837384] ? vfs_set_fs_source+0x12c/0x180 [ 133.841813] ? legacy_validate+0x210/0x210 [ 133.846062] do_mount+0x69e/0x1fb0 [ 133.849614] ? check_same_owner+0x340/0x340 [ 133.853951] ? lock_release+0xa30/0xa30 21:23:42 executing program 3: r0 = getpid() prctl$setptracer(0x59616d61, r0) socketpair$inet_sctp(0x2, 0x0, 0x84, &(0x7f0000000280)) prctl$setptracer(0x59616d61, 0x0) ptrace$cont(0x7, r0, 0x2, 0x1000) prctl$setptracer(0x59616d61, r0) syz_open_procfs(r0, &(0x7f0000000000)='net/icmp\x00') prctl$setptracer(0x59616d61, 0x0) prctl$setptracer(0x59616d61, r0) [ 133.858031] ? copy_mount_string+0x40/0x40 [ 133.862282] ? retint_kernel+0x10/0x10 [ 133.866187] ? copy_mount_options+0x213/0x380 [ 133.870716] ? copy_mount_options+0x1a1/0x380 [ 133.875225] ? __sanitizer_cov_trace_pc+0x20/0x50 [ 133.880081] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 133.885634] ? copy_mount_options+0x285/0x380 [ 133.890171] ksys_mount+0x12d/0x140 [ 133.893814] __x64_sys_mount+0xbe/0x150 [ 133.897805] do_syscall_64+0x1b9/0x820 [ 133.901703] ? finish_task_switch+0x1d3/0x870 [ 133.906212] ? syscall_return_slowpath+0x5e0/0x5e0 [ 133.911152] ? syscall_return_slowpath+0x31d/0x5e0 [ 133.916125] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 133.921161] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 133.926896] ? prepare_exit_to_usermode+0x291/0x3b0 [ 133.931929] ? perf_trace_sys_enter+0xb10/0xb10 [ 133.936802] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 133.941669] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 133.946876] RIP: 0033:0x45885a 21:23:43 executing program 4: [ 133.950065] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 dd 8f fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 ba 8f fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 133.969474] RSP: 002b:00007fe773c40a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 133.977198] RAX: ffffffffffffffda RBX: 00007fe773c40b30 RCX: 000000000045885a [ 133.985181] RDX: 00007fe773c40ad0 RSI: 0000000020001740 RDI: 00007fe773c40af0 [ 133.992486] RBP: 0000000020001740 R08: 00007fe773c40b30 R09: 00007fe773c40ad0 [ 133.999766] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000014 [ 134.007043] R13: 0000000000000000 R14: 00000000004d3eb0 R15: 0000000000000024 21:23:43 executing program 7: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$hfsplus(&(0x7f0000000040)='hfsplis\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000300), 0x0, &(0x7f0000000380)) 21:23:43 executing program 5: r0 = gettid() kcmp(r0, r0, 0x2, 0xffffffffffffffff, 0xffffffffffffffff) 21:23:43 executing program 2 (fault-call:0 fault-nth:37): syz_mount_image$gfs2(&(0x7f0000000040)='gfs2\x00', &(0x7f0000001740)='./file0\x00', 0x0, 0x0, &(0x7f0000001680), 0x0, &(0x7f0000000880)=ANY=[@ANYBLOB='l']) 21:23:43 executing program 0: syz_open_dev$sndseq(&(0x7f0000000000)='/dev/snd/seq\x00', 0x0, 0x0) userfaultfd(0x0) syz_open_dev$mice(&(0x7f0000000100)='/dev/input/mice\x00', 0x0, 0x0) pselect6(0x40, &(0x7f00000abfc0)={0x3ffffd, 0x0, 0x0, 0x0, 0x0, 0x16}, &(0x7f0000768000), &(0x7f00007fbfc0), &(0x7f0000f22000)={0x0, 0x989680}, &(0x7f0000f14000)={&(0x7f0000553ff8), 0x8}) 21:23:43 executing program 1: r0 = socket$inet6(0xa, 0x0, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000100)={0x26, 'aead\x00', 0x0, 0x0, 'gcm_base(ctr-camellia-asm,ghash-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000480)="d3ab27191a010023560fd9d5e03eba602dff05b82756df62", 0x18) 21:23:43 executing program 6: r0 = syz_open_dev$sndpcmp(&(0x7f00000000c0)='/dev/snd/pcmC#D#p\x00', 0x2, 0x0) setsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r0, 0x84, 0x13, &(0x7f0000000100)=0x7ff, 0x4) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_AUTH_KEY(r1, 0x84, 0xc, &(0x7f0000000140)=ANY=[], 0x0) 21:23:43 executing program 4: 21:23:43 executing program 5: kcmp(0x0, 0x0, 0x2, 0xffffffffffffffff, 0xffffffffffffffff) 21:23:43 executing program 3: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x20000, 0x0) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, &(0x7f0000000040)={0x0, 0x429, 0x9, [0x1, 0xfffffffffffffffa, 0x0, 0x6, 0x5, 0x401, 0x80000001, 0x100, 0x5]}, &(0x7f0000000080)=0x1a) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(r0, 0x84, 0x1b, &(0x7f00000000c0)={r1, 0x1d, "d40f84cfd5874eb147359e645fe64c596396aa9aab053453d845ec8857"}, &(0x7f0000000100)=0x25) r2 = getpid() prctl$setptracer(0x59616d61, r2) socketpair$inet_sctp(0x2, 0x0, 0x84, &(0x7f0000000280)) prctl$setptracer(0x59616d61, 0x0) prctl$setptracer(0x59616d61, 0x0) prctl$setptracer(0x59616d61, 0x0) prctl$setptracer(0x59616d61, r2) 21:23:43 executing program 4: [ 134.201899] FAULT_INJECTION: forcing a failure. [ 134.201899] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 134.213768] CPU: 1 PID: 11547 Comm: syz-executor2 Not tainted 4.18.0-rc3-next-20180706+ #1 [ 134.222180] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 134.231714] Call Trace: [ 134.234326] dump_stack+0x1c9/0x2b4 [ 134.237981] ? dump_stack_print_info.cold.2+0x52/0x52 [ 134.243315] should_fail.cold.4+0xa/0x11 21:23:43 executing program 6: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_AUTH_KEY(r0, 0x84, 0xc, &(0x7f0000000140)=ANY=[], 0x0) r1 = msgget(0x3, 0x10) msgget(0x1, 0x102) msgctl$IPC_RMID(r1, 0x0) r2 = syz_open_dev$audion(&(0x7f0000000000)='/dev/audio#\x00', 0x2, 0x4200) setsockopt$IP_VS_SO_SET_EDIT(r2, 0x0, 0x483, &(0x7f0000000040)={0x2c, @broadcast=0xffffffff, 0x4e23, 0x0, 'lc\x00', 0x12, 0x2, 0x25}, 0x2c) r3 = getpgrp(0xffffffffffffffff) write$cgroup_pid(r2, &(0x7f0000000080)=r3, 0x12) 21:23:43 executing program 4: 21:23:43 executing program 5: r0 = gettid() kcmp(0x0, r0, 0x2, 0xffffffffffffffff, 0xffffffffffffffff) 21:23:43 executing program 3: r0 = getpid() prctl$setptracer(0x59616d61, r0) socketpair$inet_sctp(0x2, 0x0, 0x84, &(0x7f0000000280)) r1 = syz_open_dev$audion(&(0x7f0000000000)='/dev/audio#\x00', 0xb8f, 0x10000) ioctl$IOC_PR_CLEAR(r1, 0x401070cd, &(0x7f0000000040)={0x8}) prctl$setptracer(0x59616d61, 0x0) prctl$setptracer(0x59616d61, 0x0) prctl$setptracer(0x59616d61, 0x0) ioctl$SG_GET_SCSI_ID(r1, 0x2276, &(0x7f0000000080)) prctl$setptracer(0x59616d61, r0) [ 134.247395] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 134.252516] ? zap_class+0x740/0x740 [ 134.256248] ? __ext4_journal_stop+0xde/0x1f0 [ 134.260758] ? ext4_mkdir+0xa2c/0xe60 [ 134.264580] ? trace_hardirqs_on+0x10/0x10 [ 134.268835] ? kasan_check_read+0x11/0x20 [ 134.273001] ? zap_class+0x740/0x740 [ 134.276745] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 134.281783] ? perf_trace_lock+0xde/0x920 [ 134.285964] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 134.291526] ? should_fail+0x246/0xd86 [ 134.295433] ? zap_class+0x740/0x740 [ 134.299194] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 134.304413] __alloc_pages_nodemask+0x36e/0xdb0 [ 134.309104] ? kasan_check_read+0x11/0x20 [ 134.313276] ? rcu_is_watching+0x8c/0x150 [ 134.317450] ? __alloc_pages_slowpath+0x2d00/0x2d00 [ 134.322664] ? is_bpf_text_address+0xd7/0x170 [ 134.327181] ? kernel_text_address+0x79/0xf0 [ 134.331703] ? lock_acquire+0x1e4/0x540 [ 134.335695] ? fs_reclaim_acquire+0x20/0x20 [ 134.340056] ? lock_downgrade+0x8f0/0x8f0 [ 134.344227] ? lock_release+0xa30/0xa30 [ 134.348231] ? check_same_owner+0x340/0x340 21:23:43 executing program 4: [ 134.352576] ? save_stack+0xa9/0xd0 [ 134.356230] cache_grow_begin+0x91/0x710 [ 134.360317] kmem_cache_alloc+0x689/0x760 [ 134.364577] getname_flags+0xd0/0x5a0 [ 134.368399] user_path_at_empty+0x2d/0x50 [ 134.372563] do_mount+0x180/0x1fb0 [ 134.376124] ? kasan_check_write+0x14/0x20 [ 134.380377] ? copy_mount_string+0x40/0x40 [ 134.384628] ? kasan_kmalloc+0xc4/0xe0 [ 134.388534] ? kmem_cache_alloc_trace+0x318/0x780 [ 134.393393] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 21:23:43 executing program 6: r0 = socket$inet6_sctp(0xa, 0x400000000005, 0x84) setsockopt$bt_BT_FLUSHABLE(r0, 0x112, 0x8, &(0x7f0000000000)=0x9, 0x4) setsockopt$inet_sctp6_SCTP_AUTH_KEY(r0, 0x84, 0xc, &(0x7f0000000140)=ANY=[], 0x0) [ 134.398962] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 134.404517] ? copy_mount_options+0x285/0x380 [ 134.409035] ksys_mount+0x12d/0x140 [ 134.412705] __x64_sys_mount+0xbe/0x150 [ 134.416724] do_syscall_64+0x1b9/0x820 [ 134.420622] ? finish_task_switch+0x1d3/0x870 [ 134.425133] ? syscall_return_slowpath+0x5e0/0x5e0 [ 134.430082] ? syscall_return_slowpath+0x31d/0x5e0 [ 134.435038] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 134.440079] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 134.445641] ? prepare_exit_to_usermode+0x291/0x3b0 [ 134.450680] ? perf_trace_sys_enter+0xb10/0xb10 [ 134.455375] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 134.460241] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 134.465441] RIP: 0033:0x45885a [ 134.468632] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 dd 8f fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 ba 8f fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 134.487943] RSP: 002b:00007fe773c40a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 134.495670] RAX: ffffffffffffffda RBX: 00007fe773c40b30 RCX: 000000000045885a [ 134.502953] RDX: 00007fe773c40ad0 RSI: 0000000020001740 RDI: 00007fe773c40af0 [ 134.510232] RBP: 0000000020001740 R08: 00007fe773c40b30 R09: 00007fe773c40ad0 [ 134.517511] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000014 [ 134.524792] R13: 0000000000000000 R14: 00000000004d3eb0 R15: 0000000000000025 [ 134.544914] gfs2: invalid mount option: l [ 134.549187] gfs2: can't parse mount arguments 21:23:43 executing program 6: r0 = syz_open_dev$adsp(&(0x7f0000000000)='/dev/adsp#\x00', 0x4, 0x0) sendto$inet(r0, &(0x7f0000000040)="0fdacc989fb234288bad3bf33f1266fbe541387842fce5f946dc215395e9d362c10addd710055c1ed261406f26db3d5a7ea84ecec6d7ec8e992151", 0x3b, 0xc4, &(0x7f0000000140)={0x2, 0x4e21, @rand_addr}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x1d, &(0x7f0000000300)=ANY=[@ANYRESOCT=r0, @ANYPTR=&(0x7f00000002c0)=ANY=[@ANYRESDEC=r0, @ANYRESHEX, @ANYRES64=r0, @ANYRES32, @ANYRES16=r0, @ANYRES16=r0, @ANYPTR=&(0x7f00000001c0)=ANY=[@ANYPTR, @ANYPTR64, @ANYPTR64, @ANYPTR, @ANYRES16=r0, @ANYBLOB="1570d6ebefcd8d62f4d9ebc8e46d41187126b1a25ed3948d402e93c161894ecae6a57154b4a2f4e166a3ea69a83486b0a0c51711f548310b82194444c39a36c3fd31089185c079c40e1b33c39686fdc45f1b07f714f9abd9ff2d197749160c0a846e8dcfe6dffc233025d2a215b54870ee6b429efd535e7c3ef1ccd5d0e70d35b828352ee85fee24d57299ed3d8469f49702823998cdde6e3cde0e677419360ffd0c87db9a1ecdfb07b91ae900650b"]]], &(0x7f0000000080)=0x2) setsockopt$inet_sctp6_SCTP_CONTEXT(r0, 0x84, 0x11, &(0x7f00000000c0)={0x0, 0x7}, 0x8) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_AUTH_KEY(r1, 0x84, 0xc, &(0x7f0000000140)=ANY=[], 0x0) 21:23:43 executing program 4: 21:23:43 executing program 3: r0 = getpid() prctl$setptracer(0x59616d61, r0) socketpair$inet_sctp(0x2, 0x0, 0x84, &(0x7f0000000280)) prctl$setptracer(0x59616d61, r0) prctl$setptracer(0x59616d61, 0x0) prctl$setptracer(0x59616d61, 0x0) prctl$setptracer(0x59616d61, r0) 21:23:43 executing program 1: r0 = socket$inet6(0xa, 0x0, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000100)={0x26, 'aead\x00', 0x0, 0x0, 'gcm_base(ctr-camellia-asm,ghash-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000480)="d3ab27191a010023560fd9d5e03eba602dff05b82756df62", 0x18) 21:23:43 executing program 5: r0 = gettid() kcmp(r0, 0x0, 0x2, 0xffffffffffffffff, 0xffffffffffffffff) 21:23:43 executing program 7: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$hfsplus(&(0x7f0000000040)='hfsplps\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000300), 0x0, &(0x7f0000000380)) 21:23:43 executing program 2 (fault-call:0 fault-nth:38): syz_mount_image$gfs2(&(0x7f0000000040)='gfs2\x00', &(0x7f0000001740)='./file0\x00', 0x0, 0x0, &(0x7f0000001680), 0x0, &(0x7f0000000880)=ANY=[@ANYBLOB='l']) 21:23:43 executing program 0: syz_open_dev$sndseq(&(0x7f0000000000)='/dev/snd/seq\x00', 0x0, 0x0) userfaultfd(0x0) syz_open_dev$mice(&(0x7f0000000100)='/dev/input/mice\x00', 0x0, 0x0) pselect6(0x40, &(0x7f00000abfc0)={0x3ffffd, 0x0, 0x0, 0x0, 0x0, 0x64}, &(0x7f0000768000), &(0x7f00007fbfc0), &(0x7f0000f22000)={0x0, 0x989680}, &(0x7f0000f14000)={&(0x7f0000553ff8), 0x8}) 21:23:43 executing program 5: r0 = gettid() kcmp(r0, r0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) 21:23:43 executing program 4: 21:23:43 executing program 6: [ 134.649194] FAULT_INJECTION: forcing a failure. [ 134.649194] name failslab, interval 1, probability 0, space 0, times 0 [ 134.660556] CPU: 0 PID: 11616 Comm: syz-executor2 Not tainted 4.18.0-rc3-next-20180706+ #1 [ 134.668973] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 134.678331] Call Trace: [ 134.680940] dump_stack+0x1c9/0x2b4 [ 134.684590] ? dump_stack_print_info.cold.2+0x52/0x52 [ 134.689797] ? __kernel_text_address+0xd/0x40 [ 134.694314] should_fail.cold.4+0xa/0x11 [ 134.698418] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 134.703539] ? save_stack+0xa9/0xd0 [ 134.707184] ? save_stack+0x43/0xd0 [ 134.710828] ? kasan_kmalloc+0xc4/0xe0 [ 134.714731] ? __kmalloc_track_caller+0x14a/0x760 [ 134.719593] ? kmemdup_nul+0x31/0xa0 [ 134.723319] ? vfs_set_fs_source+0x67/0x180 [ 134.727655] ? ksys_mount+0x12d/0x140 [ 134.731469] ? __x64_sys_mount+0xbe/0x150 [ 134.735636] ? do_syscall_64+0x1b9/0x820 [ 134.739720] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 134.745104] ? do_syscall_64+0x1b9/0x820 21:23:43 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000100)={0x26, 'aead\x00', 0x0, 0x0, 'gcm_base(ctr-camellia-asm,ghash-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000480)="d3ab27191a010023560fd9d5e03eba602dff05b82756df62", 0x18) [ 134.749180] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 134.754567] ? trace_hardirqs_off+0xd/0x10 [ 134.758831] ? quarantine_put+0x10d/0x1b0 [ 134.763006] ? lock_acquire+0x1e4/0x540 [ 134.766995] ? fs_reclaim_acquire+0x20/0x20 [ 134.771336] ? lock_downgrade+0x8f0/0x8f0 [ 134.775508] ? lock_downgrade+0x8f0/0x8f0 [ 134.779678] ? lock_release+0xa30/0xa30 [ 134.783673] ? check_same_owner+0x340/0x340 [ 134.788043] ? check_same_owner+0x340/0x340 [ 134.792402] ? debug_mutex_init+0x2d/0x60 [ 134.796745] ? rcu_note_context_switch+0x730/0x730 [ 134.801702] __should_failslab+0x124/0x180 [ 134.805955] should_failslab+0x9/0x14 [ 134.809770] __kmalloc_track_caller+0x2c4/0x760 [ 134.814456] ? __kmalloc_track_caller+0x311/0x760 [ 134.819335] ? legacy_parse_monolithic+0xc1/0x1d0 [ 134.824196] kmemdup+0x24/0x50 [ 134.827437] legacy_parse_monolithic+0xc1/0x1d0 [ 134.832136] ? vfs_set_fs_source+0x12c/0x180 [ 134.836916] ? legacy_validate+0x210/0x210 [ 134.841180] do_mount+0x69e/0x1fb0 [ 134.844735] ? check_same_owner+0x340/0x340 21:23:43 executing program 6: 21:23:43 executing program 4: 21:23:43 executing program 3: r0 = getpid() prctl$setptracer(0x59616d61, r0) socketpair$inet_sctp(0x2, 0x9, 0x84, &(0x7f0000000000)) prctl$setptracer(0x59616d61, 0x0) prctl$setptracer(0x59616d61, 0x0) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/autofs\x00', 0x4401, 0x0) ioctl$RTC_RD_TIME(r1, 0x80247009, &(0x7f0000000080)) prctl$setptracer(0x59616d61, 0x0) prctl$setptracer(0x59616d61, r0) [ 134.849079] ? lock_release+0xa30/0xa30 [ 134.853069] ? copy_mount_string+0x40/0x40 [ 134.857319] ? retint_kernel+0x10/0x10 [ 134.861218] ? copy_mount_options+0x213/0x380 [ 134.865750] ? write_comp_data+0x70/0x70 [ 134.869825] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 134.876443] ? copy_mount_options+0x285/0x380 [ 134.880959] ksys_mount+0x12d/0x140 [ 134.884690] __x64_sys_mount+0xbe/0x150 [ 134.888684] do_syscall_64+0x1b9/0x820 [ 134.892607] ? finish_task_switch+0x1d3/0x870 [ 134.897115] ? syscall_return_slowpath+0x5e0/0x5e0 [ 134.902061] ? syscall_return_slowpath+0x31d/0x5e0 [ 134.907011] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 134.912043] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 134.917597] ? prepare_exit_to_usermode+0x291/0x3b0 [ 134.922633] ? perf_trace_sys_enter+0xb10/0xb10 [ 134.927321] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 134.932200] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 134.937402] RIP: 0033:0x45885a 21:23:44 executing program 6: 21:23:44 executing program 4: [ 134.940589] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 dd 8f fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 ba 8f fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 134.960060] RSP: 002b:00007fe773c40a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 134.967781] RAX: ffffffffffffffda RBX: 00007fe773c40b30 RCX: 000000000045885a [ 134.975086] RDX: 00007fe773c40ad0 RSI: 0000000020001740 RDI: 00007fe773c40af0 [ 134.982385] RBP: 0000000020001740 R08: 00007fe773c40b30 R09: 00007fe773c40ad0 [ 134.989665] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000014 21:23:44 executing program 5: [ 134.996944] R13: 0000000000000000 R14: 00000000004d3eb0 R15: 0000000000000026 21:23:44 executing program 5: mknod(&(0x7f0000000240)='./file0\x00', 0x1040, 0x0) r0 = open$dir(&(0x7f0000000040)='./file0\x00', 0x26e, 0x0) ioctl$int_in(r0, 0x5452, &(0x7f0000000000)=0x95) 21:23:44 executing program 6: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) bind$inet(r0, &(0x7f0000000040)={0x2, 0x0, @local={0xac, 0x14, 0x14, 0xaa}}, 0x10) sendto$inet(r0, &(0x7f0000000080), 0x0, 0x0, &(0x7f0000000200)={0x2, 0x0, @multicast2=0xe0000002}, 0x10) 21:23:44 executing program 4: r0 = perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pause() ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000100)=0x6) 21:23:44 executing program 7: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$hfsplus(&(0x7f0000000040)='hfspl\ns\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000300), 0x0, &(0x7f0000000380)) 21:23:44 executing program 2 (fault-call:0 fault-nth:39): syz_mount_image$gfs2(&(0x7f0000000040)='gfs2\x00', &(0x7f0000001740)='./file0\x00', 0x0, 0x0, &(0x7f0000001680), 0x0, &(0x7f0000000880)=ANY=[@ANYBLOB='l']) 21:23:44 executing program 0: syz_open_dev$sndseq(&(0x7f0000000000)='/dev/snd/seq\x00', 0x0, 0x0) userfaultfd(0x0) syz_open_dev$mice(&(0x7f0000000100)='/dev/input/mice\x00', 0x0, 0x0) pselect6(0x40, &(0x7f00000abfc0)={0x3ffffd, 0x0, 0x0, 0x0, 0x0, 0x64000000}, &(0x7f0000768000), &(0x7f00007fbfc0), &(0x7f0000f22000)={0x0, 0x989680}, &(0x7f0000f14000)={&(0x7f0000553ff8), 0x8}) 21:23:44 executing program 3: r0 = getpid() prctl$setptracer(0x59616d61, r0) socketpair$inet_sctp(0x2, 0x0, 0x84, &(0x7f0000000280)) prctl$setptracer(0x59616d61, 0x0) prctl$setptracer(0x59616d61, 0x0) prlimit64(r0, 0xb, &(0x7f0000000040)={0x1, 0x2ec}, &(0x7f0000000080)) prctl$setptracer(0x59616d61, 0x0) open(&(0x7f0000000000)='./file0\x00', 0x200040, 0x1c) prctl$setptracer(0x59616d61, r0) 21:23:44 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000100)={0x26, 'aead\x00', 0x0, 0x0, 'gcm_base(ctr-camellia-asm,ghash-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000480)="d3ab27191a010023560fd9d5e03eba602dff05b82756df62", 0x18) 21:23:44 executing program 6: r0 = syz_open_procfs(0x0, &(0x7f0000000100)='clear_refs\x00') write$cgroup_pid(r0, &(0x7f0000000040), 0x1) 21:23:44 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") timer_create(0x0, &(0x7f0000066000)={0x0, 0x12}, &(0x7f00009b1ffc)) timer_settime(0x0, 0x0, &(0x7f0000000040)={{}, {0x77359400}}, &(0x7f00000000c0)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x989680}, {0x0, 0x9}}, &(0x7f0000040000)) [ 135.227232] FAULT_INJECTION: forcing a failure. [ 135.227232] name failslab, interval 1, probability 0, space 0, times 0 [ 135.238568] CPU: 1 PID: 11703 Comm: syz-executor2 Not tainted 4.18.0-rc3-next-20180706+ #1 [ 135.246974] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 135.256324] Call Trace: [ 135.258947] dump_stack+0x1c9/0x2b4 [ 135.262598] ? dump_stack_print_info.cold.2+0x52/0x52 [ 135.269988] ? perf_trace_lock+0xde/0x920 [ 135.274167] should_fail.cold.4+0xa/0x11 [ 135.278257] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 135.283391] ? save_stack+0xa9/0xd0 [ 135.287046] ? save_stack+0x43/0xd0 [ 135.290684] ? kasan_kmalloc+0xc4/0xe0 [ 135.294576] ? vfs_new_fs_context+0x5a/0x700 [ 135.299000] ? do_mount+0x5cf/0x1fb0 [ 135.302732] ? __x64_sys_mount+0xbe/0x150 [ 135.306901] ? do_syscall_64+0x1b9/0x820 [ 135.310986] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 135.316373] ? trace_hardirqs_off+0xd/0x10 [ 135.320637] ? lock_acquire+0x1e4/0x540 21:23:44 executing program 6: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000240)='/dev/autofs\x00', 0x101000, 0x0) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000400)='/proc/sys/net/ipv4/vs/backup_only\x00', 0x2, 0x0) r2 = openat$null(0xffffffffffffff9c, &(0x7f0000000440)='/dev/null\x00', 0x80400, 0x0) ioctl$sock_inet_tcp_SIOCINQ(r2, 0x541b, &(0x7f00000003c0)) perf_event_open(&(0x7f000001d000)={0x200000002, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffa24, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f0000000040)=0x0) getpriority(0x3, r3) r4 = syz_open_procfs(0x0, &(0x7f0000000080)="2f65786500000000000409004bddd9de91be10eebf000ee9a90f798058439ed554fa07424ada75af1f02acc7edbcd7a071fb35331ce39c5a00000000") fsetxattr(r4, &(0x7f0000000280)=@known='user.syz\x00', &(0x7f00000002c0)="2f0409004bddd9de91be10eebf000ee9a90f798058439ed554af1f02acc7edbcd7a071fb35331ce39c5a0000000000000000080000000000000000000aaad955a3c93f9d248b46a7c99eb35b406bf918ff01739e56187b2db8f1074424745271062042fb3808186e0a837132f9108c583073a4ca94b3e4e58717fe2b659fa3903c7b73bd66b83f5ecc0a7361257896883f1b43ff4ec0a1e336b92f705461af0b60825a7834ffd0a7339d85c51b8db7b4c0e4f40953dd2d9f2110f04c9fdf8489eaa996", 0xc3, 0x0) syncfs(r4) write$cgroup_int(r0, &(0x7f0000000480), 0x1) ptrace$peekuser(0x3, r3, 0x2) shmget(0x2, 0x2000, 0x0, &(0x7f0000ffb000/0x2000)=nil) 21:23:44 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) setsockopt$sock_int(r0, 0x1, 0x23, &(0x7f0000012000)=0xffffffffad36b24d, 0x4) recvmsg(r0, &(0x7f0000000780)={&(0x7f0000000040)=@ethernet={0x0, @link_local}, 0x10, &(0x7f0000000600), 0x0, &(0x7f00000006c0)=""/188, 0xbc}, 0x0) sendmsg$key(r0, &(0x7f0000007000)={0x0, 0x0, &(0x7f000001b000)={&(0x7f000001bf30)={0x2, 0x12, 0x0, 0x0, 0x2}, 0x10}, 0x1}, 0x0) 21:23:44 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000100)={0x26, 'aead\x00', 0x0, 0x0, 'gcm_base(ctr-camellia-asm,ghash-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000480)="d3ab27191a010023560fd9d5e03eba602dff05b82756df62", 0x18) [ 135.324631] ? fs_reclaim_acquire+0x20/0x20 [ 135.328971] ? lock_downgrade+0x8f0/0x8f0 [ 135.333138] ? fs_reclaim_acquire+0x20/0x20 [ 135.337480] ? check_same_owner+0x340/0x340 [ 135.341816] ? debug_mutex_init+0x2d/0x60 [ 135.345984] ? rcu_note_context_switch+0x730/0x730 [ 135.350943] __should_failslab+0x124/0x180 [ 135.355197] should_failslab+0x9/0x14 [ 135.359018] __kmalloc_track_caller+0x2c4/0x760 [ 135.363713] ? vfs_set_fs_source+0x67/0x180 [ 135.368065] kmemdup_nul+0x31/0xa0 [ 135.371642] vfs_set_fs_source+0x67/0x180 [ 135.375815] do_mount+0x61b/0x1fb0 [ 135.379354] ? kasan_check_write+0x14/0x20 [ 135.383580] ? copy_mount_string+0x40/0x40 [ 135.387820] ? retint_kernel+0x10/0x10 [ 135.391715] ? copy_mount_options+0x1f0/0x380 [ 135.396201] ? copy_mount_options+0x206/0x380 [ 135.400693] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 135.406239] ? copy_mount_options+0x285/0x380 [ 135.410725] ksys_mount+0x12d/0x140 [ 135.414368] __x64_sys_mount+0xbe/0x150 [ 135.418354] do_syscall_64+0x1b9/0x820 [ 135.422227] ? syscall_return_slowpath+0x5e0/0x5e0 [ 135.427163] ? syscall_return_slowpath+0x31d/0x5e0 [ 135.432080] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 135.437086] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 135.442615] ? prepare_exit_to_usermode+0x291/0x3b0 [ 135.447630] ? perf_trace_sys_enter+0xb10/0xb10 [ 135.452288] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 135.457122] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 135.462300] RIP: 0033:0x45885a 21:23:44 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x0, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000100)={0x26, 'aead\x00', 0x0, 0x0, 'gcm_base(ctr-camellia-asm,ghash-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000480)="d3ab27191a010023560fd9d5e03eba602dff05b82756df62", 0x18) [ 135.465471] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 dd 8f fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 ba 8f fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 135.484686] RSP: 002b:00007fe773c40a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 135.492388] RAX: ffffffffffffffda RBX: 00007fe773c40b30 RCX: 000000000045885a [ 135.499648] RDX: 00007fe773c40ad0 RSI: 0000000020001740 RDI: 00007fe773c40af0 [ 135.506911] RBP: 0000000020001740 R08: 00007fe773c40b30 R09: 00007fe773c40ad0 [ 135.514166] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000014 [ 135.521423] R13: 0000000000000000 R14: 00000000004d3eb0 R15: 0000000000000027 21:23:44 executing program 0: syz_open_dev$sndseq(&(0x7f0000000000)='/dev/snd/seq\x00', 0x0, 0x0) userfaultfd(0x0) syz_open_dev$mice(&(0x7f0000000100)='/dev/input/mice\x00', 0x0, 0x0) pselect6(0x40, &(0x7f00000abfc0)={0x3ffffd, 0x0, 0x0, 0x0, 0x0, 0x16000000}, &(0x7f0000768000), &(0x7f00007fbfc0), &(0x7f0000f22000)={0x0, 0x989680}, &(0x7f0000f14000)={&(0x7f0000553ff8), 0x8}) 21:23:44 executing program 7: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$hfsplus(&(0x7f0000000040)='hfsplss\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000300), 0x0, &(0x7f0000000380)) 21:23:44 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x0, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000100)={0x26, 'aead\x00', 0x0, 0x0, 'gcm_base(ctr-camellia-asm,ghash-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000480)="d3ab27191a010023560fd9d5e03eba602dff05b82756df62", 0x18) 21:23:44 executing program 2 (fault-call:0 fault-nth:40): syz_mount_image$gfs2(&(0x7f0000000040)='gfs2\x00', &(0x7f0000001740)='./file0\x00', 0x0, 0x0, &(0x7f0000001680), 0x0, &(0x7f0000000880)=ANY=[@ANYBLOB='l']) [ 135.685809] FAULT_INJECTION: forcing a failure. [ 135.685809] name failslab, interval 1, probability 0, space 0, times 0 [ 135.697147] CPU: 0 PID: 11742 Comm: syz-executor2 Not tainted 4.18.0-rc3-next-20180706+ #1 [ 135.705566] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 135.714928] Call Trace: [ 135.717533] dump_stack+0x1c9/0x2b4 [ 135.721190] ? dump_stack_print_info.cold.2+0x52/0x52 [ 135.726413] ? perf_trace_lock+0xde/0x920 [ 135.730582] should_fail.cold.4+0xa/0x11 [ 135.734661] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 135.739790] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 135.744830] ? perf_trace_lock+0xde/0x920 [ 135.749009] ? lock_acquire+0x1e4/0x540 [ 135.753006] ? should_fail+0x246/0xd86 [ 135.756921] ? lock_acquire+0x1e4/0x540 [ 135.760905] ? fs_reclaim_acquire+0x20/0x20 [ 135.765224] ? lock_downgrade+0x8f0/0x8f0 [ 135.769457] ? is_bpf_text_address+0xd7/0x170 [ 135.773951] ? check_same_owner+0x340/0x340 [ 135.778274] ? __kernel_text_address+0xd/0x40 [ 135.782764] ? rcu_note_context_switch+0x730/0x730 [ 135.787689] __should_failslab+0x124/0x180 [ 135.791949] should_failslab+0x9/0x14 [ 135.795755] kmem_cache_alloc+0x2af/0x760 [ 135.799911] ? check_same_owner+0x340/0x340 [ 135.804316] getname_kernel+0x54/0x370 [ 135.808547] kern_path+0x1e/0x40 [ 135.811905] lookup_bdev+0x10c/0x250 [ 135.815619] ? blkdev_open+0x280/0x280 [ 135.819511] ? trace_hardirqs_off+0xd/0x10 [ 135.823741] blkdev_get_by_path+0x1f/0xe0 [ 135.827883] gfs2_mount+0xc0/0x712 [ 135.831420] ? fill_super+0x1a40/0x1a40 [ 135.835396] ? check_same_owner+0x340/0x340 [ 135.839732] ? debug_mutex_init+0x2d/0x60 [ 135.843880] ? kasan_unpoison_shadow+0x35/0x50 [ 135.848460] ? kasan_kmalloc+0xc4/0xe0 [ 135.852344] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 135.857890] ? fill_super+0x1a40/0x1a40 [ 135.861867] legacy_get_tree+0x118/0x440 [ 135.865939] vfs_get_tree+0x1cb/0x5c0 [ 135.870537] ? vfs_set_fs_source+0x12c/0x180 [ 135.874955] do_mount+0x6c1/0x1fb0 [ 135.878499] ? kasan_check_read+0x11/0x20 [ 135.882660] ? copy_mount_string+0x40/0x40 [ 135.887092] ? retint_kernel+0x10/0x10 [ 135.890983] ? copy_mount_options+0x213/0x380 [ 135.895504] ? write_comp_data+0x22/0x70 [ 135.899586] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 135.905133] ? copy_mount_options+0x285/0x380 [ 135.909644] ksys_mount+0x12d/0x140 [ 135.913281] __x64_sys_mount+0xbe/0x150 [ 135.917274] do_syscall_64+0x1b9/0x820 [ 135.921177] ? finish_task_switch+0x1d3/0x870 [ 135.925678] ? syscall_return_slowpath+0x5e0/0x5e0 [ 135.930604] ? syscall_return_slowpath+0x31d/0x5e0 [ 135.935536] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 135.940556] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 135.946089] ? prepare_exit_to_usermode+0x291/0x3b0 [ 135.951113] ? perf_trace_sys_enter+0xb10/0xb10 [ 135.955805] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 135.960651] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 135.965854] RIP: 0033:0x45885a [ 135.969043] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 dd 8f fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 ba 8f fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 135.988223] RSP: 002b:00007fe773c40a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 135.995932] RAX: ffffffffffffffda RBX: 00007fe773c40b30 RCX: 000000000045885a [ 136.003302] RDX: 00007fe773c40ad0 RSI: 0000000020001740 RDI: 00007fe773c40af0 [ 136.010571] RBP: 0000000020001740 R08: 00007fe773c40b30 R09: 00007fe773c40ad0 [ 136.017835] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000014 [ 136.025197] R13: 0000000000000000 R14: 00000000004d3eb0 R15: 0000000000000028 21:23:45 executing program 4: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000380)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) rmdir(&(0x7f00000000c0)='./file0/file1\x00') 21:23:45 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x0, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000100)={0x26, 'aead\x00', 0x0, 0x0, 'gcm_base(ctr-camellia-asm,ghash-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000480)="d3ab27191a010023560fd9d5e03eba602dff05b82756df62", 0x18) 21:23:45 executing program 6: r0 = socket$nl_route(0x10, 0x3, 0x0) bind$netlink(r0, &(0x7f00000002c0)={0x10, 0x0, 0x0, 0x100000}, 0xc) sendmsg$nl_route(r0, &(0x7f0000002f40)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000002f00)={&(0x7f0000001ac0)=@ipv6_delroute={0xb74, 0x19, 0x801, 0x0, 0x0, {0xa}, [@RTA_PRIORITY={0x8, 0x6, 0x3}, @RTA_OIF={0x8, 0x4}, @RTA_ENCAP={0xb48, 0x16, @nested={0xb44, 0x0, [@generic="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", @typed={0xc, 0xd, @u64=0x9}, @generic="572740b785422e973f196d4c18b758b72d013d0b5445b674a9ce34a6d800f07ccfc945e42fa3b1d5107528a519f20c2a45fdb85d68708477565342d0d0e9eb9b7ecf4d05a290075f910fc368360cc66add0b415c25ce59b2a54e8ee9e20a017bea4cce69b0532707cca702053c87539cb2149322a6c7e7b9bef035"]}}]}, 0xb74}, 0x1, 0x0, 0x0, 0x20000000}, 0x4000) 21:23:45 executing program 3: r0 = getpid() prctl$setptracer(0x59616d61, r0) socketpair$inet_sctp(0x2, 0x0, 0x84, &(0x7f0000000280)) prctl$setptracer(0x59616d61, r0) prctl$setptracer(0x59616d61, 0x0) prctl$setptracer(0x59616d61, 0x0) prctl$setptracer(0x59616d61, r0) 21:23:45 executing program 0: syz_open_dev$sndseq(&(0x7f0000000000)='/dev/snd/seq\x00', 0x0, 0x0) userfaultfd(0x0) syz_open_dev$mice(&(0x7f0000000100)='/dev/input/mice\x00', 0x0, 0x0) pselect6(0x40, &(0x7f00000abfc0)={0x3ffffd, 0x0, 0x0, 0x0, 0x0, 0x6000}, &(0x7f0000768000), &(0x7f00007fbfc0), &(0x7f0000f22000)={0x0, 0x989680}, &(0x7f0000f14000)={&(0x7f0000553ff8), 0x8}) 21:23:45 executing program 7: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$hfsplus(&(0x7f0000000040)='hfsplls\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000300), 0x0, &(0x7f0000000380)) 21:23:45 executing program 2 (fault-call:0 fault-nth:41): syz_mount_image$gfs2(&(0x7f0000000040)='gfs2\x00', &(0x7f0000001740)='./file0\x00', 0x0, 0x0, &(0x7f0000001680), 0x0, &(0x7f0000000880)=ANY=[@ANYBLOB='l']) [ 136.173250] FAULT_INJECTION: forcing a failure. [ 136.173250] name failslab, interval 1, probability 0, space 0, times 0 [ 136.184734] CPU: 0 PID: 11759 Comm: syz-executor2 Not tainted 4.18.0-rc3-next-20180706+ #1 [ 136.193155] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 136.202520] Call Trace: [ 136.205133] dump_stack+0x1c9/0x2b4 [ 136.208791] ? dump_stack_print_info.cold.2+0x52/0x52 [ 136.214007] ? perf_trace_lock+0xde/0x920 [ 136.218208] should_fail.cold.4+0xa/0x11 [ 136.222309] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 136.227444] ? save_stack+0xa9/0xd0 [ 136.231089] ? save_stack+0x43/0xd0 [ 136.234767] ? kasan_kmalloc+0xc4/0xe0 [ 136.238693] ? __kmalloc_track_caller+0x14a/0x760 [ 136.243559] ? kmemdup_nul+0x31/0xa0 [ 136.247310] ? vfs_set_fs_source+0x67/0x180 [ 136.251667] ? ksys_mount+0x12d/0x140 [ 136.260871] ? __x64_sys_mount+0xbe/0x150 [ 136.265042] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 136.270431] ? do_syscall_64+0x1b9/0x820 [ 136.274510] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 136.280072] ? trace_hardirqs_off+0xd/0x10 [ 136.284335] ? lock_acquire+0x1e4/0x540 [ 136.288334] ? fs_reclaim_acquire+0x20/0x20 [ 136.292691] ? lock_downgrade+0x8f0/0x8f0 [ 136.296908] ? lock_downgrade+0x8f0/0x8f0 [ 136.301227] ? lock_release+0xa30/0xa30 [ 136.305579] ? check_same_owner+0x340/0x340 [ 136.309927] ? check_same_owner+0x340/0x340 [ 136.314270] ? debug_mutex_init+0x2d/0x60 [ 136.318440] ? rcu_note_context_switch+0x730/0x730 [ 136.323389] __should_failslab+0x124/0x180 [ 136.327647] should_failslab+0x9/0x14 [ 136.331554] __kmalloc_track_caller+0x2c4/0x760 [ 136.336244] ? __kmalloc_track_caller+0x311/0x760 [ 136.341106] ? legacy_parse_monolithic+0xc1/0x1d0 [ 136.345979] kmemdup+0x24/0x50 [ 136.349192] legacy_parse_monolithic+0xc1/0x1d0 [ 136.353893] ? vfs_set_fs_source+0x12c/0x180 [ 136.358331] ? legacy_validate+0x210/0x210 [ 136.362568] do_mount+0x69e/0x1fb0 [ 136.366217] ? kasan_check_write+0x14/0x20 [ 136.370555] ? copy_mount_string+0x40/0x40 [ 136.374782] ? retint_kernel+0x10/0x10 [ 136.378678] ? copy_mount_options+0x1a1/0x380 [ 136.383170] ? __sanitizer_cov_trace_pc+0x48/0x50 [ 136.388029] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 136.393578] ? copy_mount_options+0x285/0x380 [ 136.398069] ksys_mount+0x12d/0x140 [ 136.401688] __x64_sys_mount+0xbe/0x150 [ 136.405662] do_syscall_64+0x1b9/0x820 [ 136.409883] ? finish_task_switch+0x1d3/0x870 [ 136.414416] ? syscall_return_slowpath+0x5e0/0x5e0 [ 136.419343] ? syscall_return_slowpath+0x31d/0x5e0 [ 136.424329] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 136.429369] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 136.434897] ? prepare_exit_to_usermode+0x291/0x3b0 [ 136.439907] ? perf_trace_sys_enter+0xb10/0xb10 [ 136.444589] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 136.449449] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 136.454627] RIP: 0033:0x45885a 21:23:45 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000100)={0x26, 'aead\x00', 0x0, 0x0, 'gcm_base(ctr-camellia-asm,ghash-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000480)="d3ab27191a010023560fd9d5e03eba602dff05b82756df62", 0x18) 21:23:45 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$EVIOCGPHYS(0xffffffffffffffff, 0x80404507, &(0x7f0000000140)=""/53) perf_event_open(&(0x7f0000c86f88)={0x2, 0x70, 0x12, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clock_adjtime(0x0, &(0x7f0000000640)={0x8001}) [ 136.457799] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 dd 8f fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 ba 8f fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 136.477163] RSP: 002b:00007fe773c40a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 136.484881] RAX: ffffffffffffffda RBX: 00007fe773c40b30 RCX: 000000000045885a [ 136.492231] RDX: 00007fe773c40ad0 RSI: 0000000020001740 RDI: 00007fe773c40af0 [ 136.499494] RBP: 0000000020001740 R08: 00007fe773c40b30 R09: 00007fe773c40ad0 [ 136.506756] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000014 [ 136.514017] R13: 0000000000000000 R14: 00000000004d3eb0 R15: 0000000000000029 21:23:45 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000500)="025cc83d6d345f8f762070") r1 = syz_open_procfs(0x0, &(0x7f0000000240)='oom_adj\x00') write$cgroup_pid(r1, &(0x7f0000000200), 0x2) 21:23:45 executing program 3: r0 = getpid() prctl$setptracer(0x59616d61, r0) socketpair$inet_sctp(0x2, 0x0, 0x84, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) prctl$setptracer(0x59616d61, 0x0) prctl$setptracer(0x59616d61, 0x0) fcntl$getownex(r1, 0x10, &(0x7f0000000140)) prctl$setptracer(0x59616d61, r0) r3 = syz_open_dev$mice(&(0x7f0000000180)='/dev/input/mice\x00', 0x0, 0x1) ioctl$LOOP_SET_FD(r3, 0x4c00, r2) prctl$setptracer(0x59616d61, r0) getsockopt$inet_IP_IPSEC_POLICY(r2, 0x0, 0x10, &(0x7f0000000000)={{{@in=@multicast1, @in6=@mcast2}}, {{}, 0x0, @in=@multicast1}}, &(0x7f0000000100)=0xe8) 21:23:45 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000100)='clear_refs\x00') r1 = gettid() perf_event_open(&(0x7f000001d000)={0x200000002, 0x70, 0x5, 0x108000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = socket$inet6(0xa, 0x1, 0x0) ioctl(r2, 0x4000008912, &(0x7f0000000100)="295ee1311f16f477671070") madvise(&(0x7f0000a93000/0x4000)=nil, 0x4000, 0xe) mremap(&(0x7f0000a96000/0x1000)=nil, 0x1000, 0x800000, 0x3, &(0x7f0000130000/0x800000)=nil) process_vm_writev(r1, &(0x7f0000000000)=[{&(0x7f00008f9f09)=""/247, 0xf7}], 0x1, &(0x7f0000121000)=[{&(0x7f0000217f28)=""/231, 0xffffff4e}], 0x23a, 0x0) write$cgroup_pid(r0, &(0x7f0000000080), 0x1) mbind(&(0x7f00006e7000/0x4000)=nil, 0x4000, 0x0, &(0x7f0000000040), 0x1, 0x2) 21:23:45 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000100)={0x26, 'aead\x00', 0x0, 0x0, 'gcm_base(ctr-camellia-asm,ghash-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000480)="d3ab27191a010023560fd9d5e03eba602dff05b82756df62", 0x18) 21:23:45 executing program 2 (fault-call:0 fault-nth:42): syz_mount_image$gfs2(&(0x7f0000000040)='gfs2\x00', &(0x7f0000001740)='./file0\x00', 0x0, 0x0, &(0x7f0000001680), 0x0, &(0x7f0000000880)=ANY=[@ANYBLOB='l']) 21:23:45 executing program 0: syz_open_dev$sndseq(&(0x7f0000000000)='/dev/snd/seq\x00', 0x0, 0x0) userfaultfd(0x0) syz_open_dev$mice(&(0x7f0000000100)='/dev/input/mice\x00', 0x0, 0x0) pselect6(0x40, &(0x7f00000abfc0)={0x3ffffd, 0x0, 0x0, 0x0, 0x0, 0x8}, &(0x7f0000768000), &(0x7f00007fbfc0), &(0x7f0000f22000)={0x0, 0x989680}, &(0x7f0000f14000)={&(0x7f0000553ff8), 0x8}) 21:23:45 executing program 6: r0 = semget$private(0x0, 0x6, 0x0) unshare(0x40000) semtimedop(r0, &(0x7f00000000c0)=[{0x0, 0xfffffffffffffff9, 0x1000}], 0x1, &(0x7f0000efe000)={0x2000}) semop(r0, &(0x7f00008d8000)=[{0x0, 0x0, 0xffffffffffffffff}], 0x1) semctl$SETALL(r0, 0x0, 0x11, &(0x7f0000000000)) perf_event_open(&(0x7f000001d000)={0x200000002, 0x70, 0x80000000006, 0x108000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r1 = syz_open_dev$loop(&(0x7f0000000340)='/dev/loop#\x00', 0x0, 0x82) r2 = openat$null(0xffffffffffffff9c, &(0x7f0000000180)='/dev/null\x00', 0x200, 0x0) write$cgroup_int(r2, &(0x7f00000002c0), 0x4) getrusage(0x1, &(0x7f0000000200)) r3 = gettid() r4 = syz_open_procfs(r3, &(0x7f00000001c0)='net/rt_acct\x00') clock_gettime(0x0, &(0x7f0000000140)) ioctl$LOOP_CHANGE_FD(r1, 0x4c06, r4) 21:23:45 executing program 7: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$hfsplus(&(0x7f0000000040)='hfsplcs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000300), 0x0, &(0x7f0000000380)) 21:23:45 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000100)={0x26, 'aead\x00', 0x0, 0x0, 'gcm_base(ctr-camellia-asm,ghash-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000480)="d3ab27191a010023560fd9d5e03eba602dff05b82756df62", 0x18) 21:23:45 executing program 0: syz_open_dev$sndseq(&(0x7f0000000000)='/dev/snd/seq\x00', 0x0, 0x0) userfaultfd(0x0) syz_open_dev$mice(&(0x7f0000000100)='/dev/input/mice\x00', 0x0, 0x0) pselect6(0x40, &(0x7f00000abfc0)={0x3ffffd, 0x0, 0x0, 0x0, 0x0, 0x60}, &(0x7f0000768000), &(0x7f00007fbfc0), &(0x7f0000f22000)={0x0, 0x989680}, &(0x7f0000f14000)={&(0x7f0000553ff8), 0x8}) [ 136.703575] FAULT_INJECTION: forcing a failure. [ 136.703575] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 136.715577] CPU: 0 PID: 11827 Comm: syz-executor2 Not tainted 4.18.0-rc3-next-20180706+ #1 [ 136.724376] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 136.733750] Call Trace: [ 136.736398] dump_stack+0x1c9/0x2b4 [ 136.740275] ? dump_stack_print_info.cold.2+0x52/0x52 [ 136.745472] should_fail.cold.4+0xa/0x11 [ 136.749532] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 136.754642] ? trace_hardirqs_on+0x10/0x10 [ 136.758904] ? kasan_check_read+0x11/0x20 [ 136.763672] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 136.769679] ? trace_hardirqs_on+0x10/0x10 [ 136.773931] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 136.778967] ? bpf_prog_kallsyms_find+0xde/0x4c0 [ 136.783741] ? trace_hardirqs_on+0x10/0x10 [ 136.787981] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 136.793537] ? should_fail+0x246/0xd86 [ 136.797533] ? lock_downgrade+0x8f0/0x8f0 [ 136.801690] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 136.806808] __alloc_pages_nodemask+0x36e/0xdb0 [ 136.811471] ? __alloc_pages_slowpath+0x2d00/0x2d00 [ 136.816480] ? lock_acquire+0x1e4/0x540 [ 136.820463] ? is_bpf_text_address+0xae/0x170 [ 136.824954] ? lock_downgrade+0x8f0/0x8f0 [ 136.829137] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 136.834708] ? lock_acquire+0x1e4/0x540 [ 136.838704] ? fs_reclaim_acquire+0x20/0x20 [ 136.843035] ? lock_downgrade+0x8f0/0x8f0 [ 136.847179] ? lock_release+0xa30/0xa30 [ 136.851173] ? is_bpf_text_address+0xd7/0x170 [ 136.855687] ? check_same_owner+0x340/0x340 [ 136.859997] cache_grow_begin+0x91/0x710 [ 136.864051] kmem_cache_alloc+0x689/0x760 [ 136.868192] getname_kernel+0x54/0x370 [ 136.872081] kern_path+0x1e/0x40 [ 136.875434] lookup_bdev+0x10c/0x250 [ 136.879133] ? blkdev_open+0x280/0x280 [ 136.883014] ? trace_hardirqs_off+0xd/0x10 [ 136.887248] blkdev_get_by_path+0x1f/0xe0 [ 136.891494] gfs2_mount+0xc0/0x712 [ 136.895066] ? fill_super+0x1a40/0x1a40 [ 136.899032] ? do_raw_spin_unlock+0xa7/0x2f0 [ 136.903450] ? do_raw_spin_trylock+0x1c0/0x1c0 [ 136.908049] ? kasan_unpoison_shadow+0x35/0x50 [ 136.912640] ? kasan_kmalloc+0xc4/0xe0 [ 136.916631] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 136.922258] ? fill_super+0x1a40/0x1a40 [ 136.926229] legacy_get_tree+0x118/0x440 [ 136.930287] vfs_get_tree+0x1cb/0x5c0 [ 136.934077] ? vfs_set_fs_source+0x12c/0x180 [ 136.938569] do_mount+0x6c1/0x1fb0 [ 136.942100] ? check_same_owner+0x340/0x340 [ 136.946410] ? lock_release+0xa30/0xa30 [ 136.950376] ? copy_mount_string+0x40/0x40 [ 136.954599] ? kasan_kmalloc+0xc4/0xe0 [ 136.958481] ? kmem_cache_alloc_trace+0x318/0x780 [ 136.963336] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 136.968880] ? _copy_from_user+0xdf/0x150 [ 136.973026] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 136.978552] ? copy_mount_options+0x285/0x380 [ 136.983036] ksys_mount+0x12d/0x140 [ 136.986652] __x64_sys_mount+0xbe/0x150 [ 136.990618] do_syscall_64+0x1b9/0x820 [ 136.994507] ? finish_task_switch+0x1d3/0x870 [ 136.998989] ? syscall_return_slowpath+0x5e0/0x5e0 [ 137.003907] ? syscall_return_slowpath+0x31d/0x5e0 [ 137.008826] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 137.013849] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 137.020442] ? prepare_exit_to_usermode+0x291/0x3b0 [ 137.025462] ? perf_trace_sys_enter+0xb10/0xb10 [ 137.030117] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 137.034951] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 137.040130] RIP: 0033:0x45885a [ 137.043300] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 dd 8f fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 ba 8f fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 137.062649] RSP: 002b:00007fe773c40a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 137.070345] RAX: ffffffffffffffda RBX: 00007fe773c40b30 RCX: 000000000045885a [ 137.077616] RDX: 00007fe773c40ad0 RSI: 0000000020001740 RDI: 00007fe773c40af0 [ 137.084871] RBP: 0000000020001740 R08: 00007fe773c40b30 R09: 00007fe773c40ad0 [ 137.092130] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000014 21:23:46 executing program 7: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$hfsplus(&(0x7f0000000040)='hfsplu\n\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000300), 0x0, &(0x7f0000000380)) 21:23:46 executing program 5: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu\x00', 0x200002, 0x0) r1 = openat$cgroup_int(r0, &(0x7f0000000140)='cpuset.mems\x00', 0x2, 0x0) write$cgroup_int(r1, &(0x7f0000000040), 0x2) [ 137.099385] R13: 0000000000000000 R14: 00000000004d3eb0 R15: 000000000000002a [ 137.108345] gfs2: invalid mount option: l [ 137.112548] gfs2: can't parse mount arguments 21:23:46 executing program 2 (fault-call:0 fault-nth:43): syz_mount_image$gfs2(&(0x7f0000000040)='gfs2\x00', &(0x7f0000001740)='./file0\x00', 0x0, 0x0, &(0x7f0000001680), 0x0, &(0x7f0000000880)=ANY=[@ANYBLOB='l']) 21:23:46 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d34") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000100)={0x26, 'aead\x00', 0x0, 0x0, 'gcm_base(ctr-camellia-asm,ghash-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000480)="d3ab27191a010023560fd9d5e03eba602dff05b82756df62", 0x18) 21:23:46 executing program 0: syz_open_dev$sndseq(&(0x7f0000000000)='/dev/snd/seq\x00', 0x0, 0x0) userfaultfd(0x0) syz_open_dev$mice(&(0x7f0000000100)='/dev/input/mice\x00', 0x0, 0x0) pselect6(0x40, &(0x7f00000abfc0)={0x3ffffd, 0x0, 0x0, 0x0, 0x0, 0x1000000000000}, &(0x7f0000768000), &(0x7f00007fbfc0), &(0x7f0000f22000)={0x0, 0x989680}, &(0x7f0000f14000)={&(0x7f0000553ff8), 0x8}) 21:23:46 executing program 5: perf_event_open(&(0x7f000001d000)={0x200000002, 0x70, 0x5, 0x108000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)="2e2f6367726f75702e63707500eac5bea7af575a45fddd5af3a7709295a69e7bc5fd0592bf2a4dc8ace908be8842141ca2a714ed0163d4afd8ac48123d4869e05556a93347d6a7430e03a5f2beb186f16bacf2e4dcdcf3b9ff1d99165ce38d996e7798fe471d9a0d81acd08788fcc9892a2487efcde7a649614b14ba1c18", 0x200002, 0x0) r1 = openat$cgroup_int(r0, &(0x7f0000000000)='cpuacct.usage\x00', 0x2, 0x0) write$cgroup_int(r1, &(0x7f0000000040), 0x1) 21:23:46 executing program 3: r0 = getpid() r1 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cuse\x00', 0x80000, 0x0) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r1, 0x6, 0x1d, &(0x7f0000000080)={0x0, 0x9, 0x7, 0xfffffffffffff001, 0x1}, 0x14) prctl$setptracer(0x59616d61, r0) socketpair$inet_sctp(0x2, 0x0, 0x84, &(0x7f0000000280)) prctl$setptracer(0x59616d61, 0x0) prctl$setptracer(0x59616d61, 0x0) prctl$setptracer(0x59616d61, 0x0) prctl$setptracer(0x59616d61, r0) syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0x125c, 0x4000) [ 137.275835] FAULT_INJECTION: forcing a failure. [ 137.275835] name failslab, interval 1, probability 0, space 0, times 0 [ 137.287247] CPU: 1 PID: 11859 Comm: syz-executor2 Not tainted 4.18.0-rc3-next-20180706+ #1 [ 137.295746] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 137.305105] Call Trace: [ 137.307706] dump_stack+0x1c9/0x2b4 [ 137.311360] ? dump_stack_print_info.cold.2+0x52/0x52 [ 137.316569] ? trace_hardirqs_on+0x10/0x10 [ 137.320822] should_fail.cold.4+0xa/0x11 21:23:46 executing program 4: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl(r0, 0x4000008912, &(0x7f0000000240)="295ee1311f16f477671070") r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu\x00', 0x200002, 0x0) r2 = openat$cgroup_int(r1, &(0x7f0000000100)='cpuset.memory_spread_slab\x00', 0x2, 0x0) write$cgroup_int(r2, &(0x7f0000000140), 0x2) 21:23:46 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d34") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000100)={0x26, 'aead\x00', 0x0, 0x0, 'gcm_base(ctr-camellia-asm,ghash-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000480)="d3ab27191a010023560fd9d5e03eba602dff05b82756df62", 0x18) 21:23:46 executing program 7: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$hfsplus(&(0x7f0000000040)='hfsplu%\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000300), 0x0, &(0x7f0000000380)) [ 137.324904] ? lock_acquire+0x1e4/0x540 [ 137.328894] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 137.334021] ? lock_release+0xa30/0xa30 [ 137.338079] ? check_same_owner+0x340/0x340 [ 137.342424] ? trace_hardirqs_on+0x10/0x10 [ 137.346683] ? lock_acquire+0x1e4/0x540 [ 137.350668] ? blkdev_get+0x5f2/0xb50 [ 137.354481] ? __mutex_lock+0x6c4/0x1680 [ 137.358557] ? lo_open+0x1b/0xb0 [ 137.361940] ? lock_acquire+0x1e4/0x540 [ 137.365926] ? fs_reclaim_acquire+0x20/0x20 [ 137.370266] ? lock_downgrade+0x8f0/0x8f0 [ 137.374444] ? check_same_owner+0x340/0x340 [ 137.378980] ? kasan_check_write+0x14/0x20 [ 137.383237] ? __mutex_lock+0x6c4/0x1680 [ 137.387316] ? rcu_note_context_switch+0x730/0x730 [ 137.392269] __should_failslab+0x124/0x180 [ 137.397268] should_failslab+0x9/0x14 [ 137.401062] kmem_cache_alloc_trace+0x2cb/0x780 [ 137.405732] ? lock_release+0xa30/0xa30 [ 137.409706] ? check_same_owner+0x340/0x340 [ 137.414029] ? rcu_note_context_switch+0x730/0x730 [ 137.418950] alloc_super+0xd4/0xb10 [ 137.422570] ? destroy_unused_super.part.11+0x110/0x110 [ 137.427918] ? sget_userns+0x17c/0x860 [ 137.431796] ? lock_downgrade+0x8f0/0x8f0 [ 137.435948] ? kasan_check_read+0x11/0x20 [ 137.440105] ? do_raw_spin_unlock+0xa7/0x2f0 [ 137.444513] ? do_raw_spin_trylock+0x1c0/0x1c0 [ 137.449086] ? kasan_check_write+0x14/0x20 [ 137.453310] ? do_raw_spin_lock+0xc1/0x200 [ 137.457539] sget_userns+0x276/0x860 [ 137.461245] ? gfs2_kill_sb+0x1a0/0x1a0 [ 137.465220] ? fallocate_chunk.isra.15.cold.19+0x7c/0x7c [ 137.470665] ? vfs_get_super+0x270/0x270 [ 137.474729] ? kasan_check_read+0x11/0x20 [ 137.478875] ? do_raw_spin_unlock+0xa7/0x2f0 [ 137.483279] ? do_raw_spin_trylock+0x1c0/0x1c0 [ 137.488379] ? kasan_check_write+0x14/0x20 [ 137.492608] ? do_raw_spin_lock+0xc1/0x200 [ 137.496856] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 137.502401] ? ns_capable_common+0x13f/0x170 [ 137.506818] ? gfs2_kill_sb+0x1a0/0x1a0 [ 137.510787] sget+0x10b/0x150 [ 137.513881] ? fallocate_chunk.isra.15.cold.19+0x7c/0x7c [ 137.519333] gfs2_mount+0x1a7/0x712 [ 137.522967] ? fill_super+0x1a40/0x1a40 [ 137.526942] ? check_same_owner+0x340/0x340 [ 137.531250] ? debug_mutex_init+0x2d/0x60 [ 137.535393] ? kasan_unpoison_shadow+0x35/0x50 [ 137.539965] ? kasan_kmalloc+0xc4/0xe0 [ 137.543844] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 137.549374] ? fill_super+0x1a40/0x1a40 [ 137.553357] legacy_get_tree+0x118/0x440 [ 137.557410] vfs_get_tree+0x1cb/0x5c0 [ 137.561197] ? vfs_set_fs_source+0x12c/0x180 [ 137.565602] do_mount+0x6c1/0x1fb0 [ 137.569157] ? check_same_owner+0x340/0x340 [ 137.573475] ? lock_release+0xa30/0xa30 [ 137.577455] ? copy_mount_string+0x40/0x40 [ 137.582379] ? retint_kernel+0x10/0x10 [ 137.586265] ? copy_mount_options+0x213/0x380 [ 137.590768] ? copy_mount_options+0x19c/0x380 [ 137.595271] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 137.600797] ? copy_mount_options+0x285/0x380 [ 137.605285] ksys_mount+0x12d/0x140 [ 137.608915] __x64_sys_mount+0xbe/0x150 [ 137.612893] do_syscall_64+0x1b9/0x820 [ 137.616779] ? finish_task_switch+0x1d3/0x870 [ 137.621277] ? syscall_return_slowpath+0x5e0/0x5e0 [ 137.626214] ? syscall_return_slowpath+0x31d/0x5e0 [ 137.631144] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 137.636152] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 137.641680] ? prepare_exit_to_usermode+0x291/0x3b0 [ 137.646713] ? perf_trace_sys_enter+0xb10/0xb10 [ 137.651374] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 137.656212] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 137.661400] RIP: 0033:0x45885a [ 137.664572] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 dd 8f fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 ba 8f fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 137.683864] RSP: 002b:00007fe773c40a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 137.691564] RAX: ffffffffffffffda RBX: 00007fe773c40b30 RCX: 000000000045885a [ 137.698822] RDX: 00007fe773c40ad0 RSI: 0000000020001740 RDI: 00007fe773c40af0 [ 137.706090] RBP: 0000000020001740 R08: 00007fe773c40b30 R09: 00007fe773c40ad0 [ 137.713345] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000014 [ 137.720601] R13: 0000000000000000 R14: 00000000004d3eb0 R15: 000000000000002b 21:23:46 executing program 3: r0 = getpid() r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0x2000, 0x0) ioctl$LOOP_SET_CAPACITY(r1, 0x4c07) prctl$setptracer(0x59616d61, r0) socketpair$inet_sctp(0x2, 0x0, 0x84, &(0x7f0000000000)) prctl$setptracer(0x59616d61, 0x0) prctl$setptracer(0x59616d61, 0x0) prctl$setptracer(0x59616d61, 0x0) prctl$setptracer(0x59616d61, r0) 21:23:46 executing program 5: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r0) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f00000000c0)=[@textreal={0x8, &(0x7f0000000040)="0f20e06635000002000f22e00f00dddb9500002e3e0fc76b003e6436ca2ed2260f06baf80c66b86cb4568166efbafc0cb80058efb8b8068ed0baa100ecd25076", 0x40}], 0x1, 0x0, &(0x7f0000000100), 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_SET_TSS_ADDR(r2, 0xae47, 0xd000) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_CPUID(r3, 0x4008ae8a, &(0x7f00000001c0)=ANY=[@ANYBLOB="08000000000000000b000000010000004000000000000000ffffff7f000000000000000006000000ef00000006000000ffffff7f0000000004000400001f000800000000000400000006000000210400000000008801040080010000000300000009000000000000010000000000000000b42f3c00410b"]) ioctl$KVM_RUN(r3, 0xae80, 0x0) r4 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) write$cgroup_pid(r4, &(0x7f0000000000), 0x6) mmap(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x800002, 0x11, r4, 0x0) ioctl$fiemap(r4, 0xc020660b, &(0x7f0000000240)={0x0, 0x10000000, 0x3}) 21:23:46 executing program 6: r0 = semget$private(0x0, 0x6, 0x0) unshare(0x40000) semtimedop(r0, &(0x7f00000000c0)=[{0x0, 0xfffffffffffffff9, 0x1000}], 0x1, &(0x7f0000efe000)={0x2000}) semop(r0, &(0x7f00008d8000)=[{0x0, 0x0, 0xffffffffffffffff}], 0x1) semctl$SETALL(r0, 0x0, 0x11, &(0x7f0000000000)) perf_event_open(&(0x7f000001d000)={0x200000002, 0x70, 0x80000000006, 0x108000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r1 = syz_open_dev$loop(&(0x7f0000000340)='/dev/loop#\x00', 0x0, 0x82) r2 = openat$null(0xffffffffffffff9c, &(0x7f0000000180)='/dev/null\x00', 0x200, 0x0) write$cgroup_int(r2, &(0x7f00000002c0), 0x4) getrusage(0x1, &(0x7f0000000200)) r3 = gettid() r4 = syz_open_procfs(r3, &(0x7f00000001c0)='net/rt_acct\x00') clock_gettime(0x0, &(0x7f0000000140)) ioctl$LOOP_CHANGE_FD(r1, 0x4c06, r4) 21:23:46 executing program 0: syz_open_dev$sndseq(&(0x7f0000000000)='/dev/snd/seq\x00', 0x0, 0x0) userfaultfd(0x0) syz_open_dev$mice(&(0x7f0000000100)='/dev/input/mice\x00', 0x0, 0x0) pselect6(0x40, &(0x7f00000abfc0)={0x3ffffd, 0x0, 0x0, 0x0, 0x0, 0x100000000000000}, &(0x7f0000768000), &(0x7f00007fbfc0), &(0x7f0000f22000)={0x0, 0x989680}, &(0x7f0000f14000)={&(0x7f0000553ff8), 0x8}) 21:23:46 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d34") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000100)={0x26, 'aead\x00', 0x0, 0x0, 'gcm_base(ctr-camellia-asm,ghash-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000480)="d3ab27191a010023560fd9d5e03eba602dff05b82756df62", 0x18) 21:23:46 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f0000aaa000)={0x2, 0x70, 0x857, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount$9p_virtio(&(0x7f0000000140)='/dev/cuse\x00', &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='9p\x00', 0x1000, &(0x7f0000000200)={'trans=\x00'}) 21:23:46 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) getpeername$netlink(r0, &(0x7f0000000040), &(0x7f00000002c0)=0xc) 21:23:46 executing program 7: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$hfsplus(&(0x7f0000000040)='hfsplusl', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000300), 0x0, &(0x7f0000000380)) 21:23:46 executing program 2 (fault-call:0 fault-nth:44): syz_mount_image$gfs2(&(0x7f0000000040)='gfs2\x00', &(0x7f0000001740)='./file0\x00', 0x0, 0x0, &(0x7f0000001680), 0x0, &(0x7f0000000880)=ANY=[@ANYBLOB='l']) 21:23:46 executing program 3: r0 = getpid() prctl$setptracer(0x59616d61, r0) socketpair$inet_sctp(0x2, 0x0, 0x84, &(0x7f0000000280)) prctl$setptracer(0x59616d61, 0x0) prctl$setptracer(0x59616d61, r0) prctl$setptracer(0x59616d61, 0x0) prctl$setptracer(0x59616d61, r0) [ 137.971931] FAULT_INJECTION: forcing a failure. [ 137.971931] name failslab, interval 1, probability 0, space 0, times 0 [ 137.983415] CPU: 0 PID: 11923 Comm: syz-executor2 Not tainted 4.18.0-rc3-next-20180706+ #1 [ 137.992022] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 138.001481] Call Trace: [ 138.004091] dump_stack+0x1c9/0x2b4 [ 138.007738] ? dump_stack_print_info.cold.2+0x52/0x52 [ 138.012945] ? perf_trace_lock+0xde/0x920 [ 138.017115] should_fail.cold.4+0xa/0x11 [ 138.021202] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 138.026326] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 138.031559] ? perf_trace_lock+0xde/0x920 [ 138.035728] ? lock_acquire+0x1e4/0x540 [ 138.039721] ? should_fail+0x246/0xd86 [ 138.043632] ? lock_acquire+0x1e4/0x540 [ 138.047754] ? fs_reclaim_acquire+0x20/0x20 [ 138.052105] ? lock_downgrade+0x8f0/0x8f0 [ 138.056280] ? is_bpf_text_address+0xd7/0x170 [ 138.060789] ? check_same_owner+0x340/0x340 [ 138.065278] ? __kernel_text_address+0xd/0x40 [ 138.069809] ? rcu_note_context_switch+0x730/0x730 [ 138.074754] __should_failslab+0x124/0x180 [ 138.079120] should_failslab+0x9/0x14 [ 138.082936] kmem_cache_alloc+0x2af/0x760 [ 138.087096] ? check_same_owner+0x340/0x340 [ 138.091534] getname_kernel+0x54/0x370 [ 138.095437] kern_path+0x1e/0x40 [ 138.098820] lookup_bdev+0x10c/0x250 [ 138.102557] ? blkdev_open+0x280/0x280 [ 138.106461] blkdev_get_by_path+0x1f/0xe0 [ 138.110626] gfs2_mount+0xc0/0x712 [ 138.114185] ? fill_super+0x1a40/0x1a40 [ 138.118256] ? kasan_check_write+0x14/0x20 [ 138.122504] ? do_raw_spin_lock+0xc1/0x200 [ 138.126761] ? kasan_unpoison_shadow+0x35/0x50 [ 138.131355] ? kasan_kmalloc+0xc4/0xe0 [ 138.135266] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 138.140820] ? fill_super+0x1a40/0x1a40 [ 138.144810] legacy_get_tree+0x118/0x440 [ 138.148887] vfs_get_tree+0x1cb/0x5c0 [ 138.152810] ? vfs_set_fs_source+0x12c/0x180 [ 138.157235] do_mount+0x6c1/0x1fb0 [ 138.160788] ? kasan_check_write+0x14/0x20 [ 138.165036] ? copy_mount_string+0x40/0x40 [ 138.169268] ? kasan_kmalloc+0xc4/0xe0 [ 138.173205] ? kmem_cache_alloc_trace+0x318/0x780 [ 138.178039] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 138.183569] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 138.189095] ? copy_mount_options+0x285/0x380 [ 138.193578] ksys_mount+0x12d/0x140 [ 138.197208] __x64_sys_mount+0xbe/0x150 [ 138.201175] do_syscall_64+0x1b9/0x820 [ 138.205058] ? finish_task_switch+0x1d3/0x870 [ 138.209550] ? syscall_return_slowpath+0x5e0/0x5e0 [ 138.214485] ? syscall_return_slowpath+0x31d/0x5e0 [ 138.219436] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 138.224473] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 138.230008] ? prepare_exit_to_usermode+0x291/0x3b0 [ 138.235017] ? perf_trace_sys_enter+0xb10/0xb10 [ 138.239672] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 138.244510] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 138.249682] RIP: 0033:0x45885a [ 138.252858] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 dd 8f fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 ba 8f fb ff c3 66 0f 1f 84 00 00 00 00 00 21:23:47 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f76") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000100)={0x26, 'aead\x00', 0x0, 0x0, 'gcm_base(ctr-camellia-asm,ghash-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000480)="d3ab27191a010023560fd9d5e03eba602dff05b82756df62", 0x18) 21:23:47 executing program 5: perf_event_open(&(0x7f0000aaa000)={0x2, 0x70, 0x857, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) timer_create(0x0, &(0x7f0000000100)={0x0, 0xd, 0x0, @tid=0xffffffffffffffff}, &(0x7f0000000140)) timer_delete(0x0) 21:23:47 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f76") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000100)={0x26, 'aead\x00', 0x0, 0x0, 'gcm_base(ctr-camellia-asm,ghash-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000480)="d3ab27191a010023560fd9d5e03eba602dff05b82756df62", 0x18) 21:23:47 executing program 5: r0 = inotify_init() close(r0) 21:23:47 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f76") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000100)={0x26, 'aead\x00', 0x0, 0x0, 'gcm_base(ctr-camellia-asm,ghash-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000480)="d3ab27191a010023560fd9d5e03eba602dff05b82756df62", 0x18) 21:23:47 executing program 5: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x12}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpriority(0x0, 0x0) 21:23:47 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) fstat(r0, &(0x7f0000000080)) 21:23:47 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f7620") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000100)={0x26, 'aead\x00', 0x0, 0x0, 'gcm_base(ctr-camellia-asm,ghash-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000480)="d3ab27191a010023560fd9d5e03eba602dff05b82756df62", 0x18) [ 138.272062] RSP: 002b:00007fe773c40a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 138.279754] RAX: ffffffffffffffda RBX: 00007fe773c40b30 RCX: 000000000045885a [ 138.287024] RDX: 00007fe773c40ad0 RSI: 0000000020001740 RDI: 00007fe773c40af0 [ 138.294288] RBP: 0000000020001740 R08: 00007fe773c40b30 R09: 00007fe773c40ad0 [ 138.301539] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000014 [ 138.308793] R13: 0000000000000000 R14: 00000000004d3eb0 R15: 000000000000002c 21:23:47 executing program 6: r0 = semget$private(0x0, 0x6, 0x0) unshare(0x40000) semtimedop(r0, &(0x7f00000000c0)=[{0x0, 0xfffffffffffffff9, 0x1000}], 0x1, &(0x7f0000efe000)={0x2000}) semop(r0, &(0x7f00008d8000)=[{0x0, 0x0, 0xffffffffffffffff}], 0x1) semctl$SETALL(r0, 0x0, 0x11, &(0x7f0000000000)) perf_event_open(&(0x7f000001d000)={0x200000002, 0x70, 0x80000000006, 0x108000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r1 = syz_open_dev$loop(&(0x7f0000000340)='/dev/loop#\x00', 0x0, 0x82) r2 = openat$null(0xffffffffffffff9c, &(0x7f0000000180)='/dev/null\x00', 0x200, 0x0) write$cgroup_int(r2, &(0x7f00000002c0), 0x4) getrusage(0x1, &(0x7f0000000200)) r3 = gettid() r4 = syz_open_procfs(r3, &(0x7f00000001c0)='net/rt_acct\x00') clock_gettime(0x0, &(0x7f0000000140)) ioctl$LOOP_CHANGE_FD(r1, 0x4c06, r4) 21:23:47 executing program 0: syz_open_dev$sndseq(&(0x7f0000000000)='/dev/snd/seq\x00', 0x0, 0x0) userfaultfd(0x0) syz_open_dev$mice(&(0x7f0000000100)='/dev/input/mice\x00', 0x0, 0x0) pselect6(0x40, &(0x7f00000abfc0)={0x3ffffd, 0x0, 0x0, 0x0, 0x0, 0x800000000000000}, &(0x7f0000768000), &(0x7f00007fbfc0), &(0x7f0000f22000)={0x0, 0x989680}, &(0x7f0000f14000)={&(0x7f0000553ff8), 0x8}) 21:23:47 executing program 7: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$hfsplus(&(0x7f0000000040)="686673706c7573ff", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000300), 0x0, &(0x7f0000000380)) 21:23:47 executing program 2 (fault-call:0 fault-nth:45): syz_mount_image$gfs2(&(0x7f0000000040)='gfs2\x00', &(0x7f0000001740)='./file0\x00', 0x0, 0x0, &(0x7f0000001680), 0x0, &(0x7f0000000880)=ANY=[@ANYBLOB='l']) 21:23:47 executing program 3: r0 = getpid() prctl$setptracer(0x59616d61, r0) socketpair$inet_sctp(0x2, 0x0, 0x84, &(0x7f0000000280)) prctl$setptracer(0x59616d61, 0x0) prctl$setptracer(0x59616d61, 0x0) prctl$setptracer(0x59616d61, 0x0) prctl$setptracer(0x59616d61, r0) 21:23:47 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f7620") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000100)={0x26, 'aead\x00', 0x0, 0x0, 'gcm_base(ctr-camellia-asm,ghash-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000480)="d3ab27191a010023560fd9d5e03eba602dff05b82756df62", 0x18) 21:23:47 executing program 4: r0 = getpgrp(0x0) sched_rr_get_interval(r0, &(0x7f0000000040)) 21:23:47 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000deb000)={0x2, 0x4e23, @broadcast=0xffffffff}, 0x10) sendto$inet(r0, &(0x7f0000000140), 0x0, 0x200007ff, &(0x7f0000deaff0)={0x2, 0x4e23}, 0x10) sendto$inet(r0, &(0x7f00006fd000)="c3", 0x1, 0x0, &(0x7f0000e66000)={0x2, 0x0, @rand_addr}, 0x10) shutdown(r0, 0x1) readv(r0, &(0x7f00000005c0)=[{&(0x7f0000000100)=""/101, 0x65}], 0x1) 21:23:48 executing program 4: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000180)=0x40000000000074, 0x315) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000040)='yeah\x00', 0x5) bind$inet(r0, &(0x7f00000001c0)={0x2, 0x4e23, @multicast2=0xe0000002}, 0x10) sendto$inet(r0, &(0x7f0000a88f88), 0x2f0a, 0x20008001, &(0x7f0000e68000)={0x2, 0x4e23, @loopback=0x7f000001}, 0x10) 21:23:48 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f7620") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000100)={0x26, 'aead\x00', 0x0, 0x0, 'gcm_base(ctr-camellia-asm,ghash-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000480)="d3ab27191a010023560fd9d5e03eba602dff05b82756df62", 0x18) 21:23:48 executing program 0: syz_open_dev$sndseq(&(0x7f0000000000)='/dev/snd/seq\x00', 0x0, 0x0) userfaultfd(0x0) syz_open_dev$mice(&(0x7f0000000100)='/dev/input/mice\x00', 0x0, 0x0) pselect6(0x40, &(0x7f00000abfc0)={0x3ffffd, 0x0, 0x0, 0x0, 0x0, 0x1000000000000000}, &(0x7f0000768000), &(0x7f00007fbfc0), &(0x7f0000f22000)={0x0, 0x989680}, &(0x7f0000f14000)={&(0x7f0000553ff8), 0x8}) 21:23:48 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000deb000)={0x2, 0x4e23, @broadcast=0xffffffff}, 0x10) sendto$inet(r0, &(0x7f0000000140), 0x0, 0x200007ff, &(0x7f0000deaff0)={0x2, 0x4e23}, 0x10) r1 = gettid() ioctl$sock_FIOSETOWN(r0, 0x8901, &(0x7f0000000040)=r1) sendto$inet(r0, &(0x7f0000000080)='=', 0x1, 0x1, &(0x7f00000000c0)={0x2, 0x0, @multicast2=0xe0000002}, 0x10) 21:23:48 executing program 7: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$hfsplus(&(0x7f0000000040)="686673706c7573ff", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000300), 0x0, &(0x7f0000000380)) 21:23:48 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000100)={0x26, 'aead\x00', 0x0, 0x0, 'gcm_base(ctr-camellia-asm,ghash-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000480)="d3ab27191a010023560fd9d5e03eba602dff05b82756df62", 0x18) 21:23:48 executing program 3: r0 = getpid() ptrace$peekuser(0x3, r0, 0x8) prctl$setptracer(0x59616d61, r0) socketpair$inet_sctp(0x2, 0x0, 0x84, &(0x7f0000000280)={0xffffffffffffffff}) prctl$setptracer(0x59616d61, r0) r2 = dup3(r1, r1, 0x80000) ioctl$SG_SET_RESERVED_SIZE(r2, 0x2275, &(0x7f0000000040)=0x7fffffff) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000080), &(0x7f00000000c0)=0xc) prctl$setptracer(0x59616d61, 0x0) prctl$setptracer(0x59616d61, 0x0) prctl$setptracer(0x59616d61, r0) r3 = dup(r1) ioctl$SNDRV_SEQ_IOCTL_PVERSION(r3, 0x80045300, &(0x7f0000000000)) 21:23:48 executing program 0: syz_open_dev$sndseq(&(0x7f0000000000)='/dev/snd/seq\x00', 0x0, 0x0) userfaultfd(0x0) syz_open_dev$mice(&(0x7f0000000100)='/dev/input/mice\x00', 0x0, 0x0) pselect6(0x40, &(0x7f00000abfc0)={0x3ffffd, 0x0, 0x0, 0x0, 0x0, 0x1000000}, &(0x7f0000768000), &(0x7f00007fbfc0), &(0x7f0000f22000)={0x0, 0x989680}, &(0x7f0000f14000)={&(0x7f0000553ff8), 0x8}) [ 139.195333] FAULT_INJECTION: forcing a failure. [ 139.195333] name failslab, interval 1, probability 0, space 0, times 0 [ 139.206691] CPU: 1 PID: 12046 Comm: syz-executor2 Not tainted 4.18.0-rc3-next-20180706+ #1 [ 139.215096] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 139.224528] Call Trace: [ 139.227137] dump_stack+0x1c9/0x2b4 [ 139.230779] ? dump_stack_print_info.cold.2+0x52/0x52 [ 139.235985] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 139.241539] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 139.247090] ? delete_node+0x30a/0xc80 [ 139.251001] should_fail.cold.4+0xa/0x11 [ 139.255095] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 139.260521] ? radix_tree_iter_tag_clear+0xd0/0xd0 [ 139.265460] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 139.270994] ? replace_slot+0xc9/0x4c0 [ 139.274888] ? __save_stack_trace+0x8d/0xf0 [ 139.279203] ? plist_requeue+0x650/0x650 [ 139.283266] ? save_stack+0xa9/0xd0 [ 139.286899] ? lock_acquire+0x1e4/0x540 [ 139.290864] ? fs_reclaim_acquire+0x20/0x20 [ 139.295195] ? lock_downgrade+0x8f0/0x8f0 [ 139.299335] ? check_same_owner+0x340/0x340 [ 139.303662] ? check_same_owner+0x340/0x340 [ 139.307979] ? rcu_note_context_switch+0x730/0x730 [ 139.312916] __should_failslab+0x124/0x180 [ 139.317145] should_failslab+0x9/0x14 [ 139.320944] __kmalloc+0x2c8/0x760 [ 139.324474] ? rcu_note_context_switch+0x730/0x730 [ 139.329402] ? __list_lru_init+0x151/0x840 [ 139.333663] __list_lru_init+0x151/0x840 [ 139.337723] ? up_write+0x7b/0x220 [ 139.341256] ? down_read+0x1d0/0x1d0 [ 139.344956] ? list_lru_destroy+0x500/0x500 [ 139.349264] ? prealloc_shrinker+0x124/0x450 [ 139.353673] ? prealloc_shrinker+0x21c/0x450 [ 139.358074] ? inactive_list_is_low+0x850/0x850 [ 139.362734] ? __lockdep_init_map+0x105/0x590 [ 139.367234] alloc_super+0x976/0xb10 [ 139.370956] ? destroy_unused_super.part.11+0x110/0x110 [ 139.376327] ? lock_downgrade+0x8f0/0x8f0 [ 139.380487] ? kasan_check_read+0x11/0x20 [ 139.384646] ? do_raw_spin_trylock+0x1c0/0x1c0 [ 139.389240] ? kasan_check_write+0x14/0x20 [ 139.393486] ? do_raw_spin_lock+0xc1/0x200 [ 139.397727] sget_userns+0x276/0x860 [ 139.401437] ? gfs2_kill_sb+0x1a0/0x1a0 [ 139.405410] ? fallocate_chunk.isra.15.cold.19+0x7c/0x7c [ 139.410857] ? vfs_get_super+0x270/0x270 [ 139.414914] ? kasan_check_read+0x11/0x20 [ 139.419060] ? do_raw_spin_unlock+0xa7/0x2f0 [ 139.423452] ? do_raw_spin_trylock+0x1c0/0x1c0 [ 139.428035] ? kasan_check_write+0x14/0x20 [ 139.432258] ? do_raw_spin_lock+0xc1/0x200 [ 139.436503] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 139.442044] ? ns_capable_common+0x13f/0x170 [ 139.446540] ? gfs2_kill_sb+0x1a0/0x1a0 [ 139.450522] sget+0x10b/0x150 [ 139.453643] ? fallocate_chunk.isra.15.cold.19+0x7c/0x7c [ 139.459084] gfs2_mount+0x1a7/0x712 [ 139.462713] ? fill_super+0x1a40/0x1a40 [ 139.466685] ? check_same_owner+0x340/0x340 [ 139.471004] ? debug_mutex_init+0x2d/0x60 [ 139.475154] ? kasan_unpoison_shadow+0x35/0x50 [ 139.479725] ? kasan_kmalloc+0xc4/0xe0 [ 139.483619] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 139.489171] ? fill_super+0x1a40/0x1a40 [ 139.493136] legacy_get_tree+0x118/0x440 [ 139.497189] vfs_get_tree+0x1cb/0x5c0 [ 139.500973] ? vfs_set_fs_source+0x12c/0x180 [ 139.505370] do_mount+0x6c1/0x1fb0 [ 139.508919] ? check_same_owner+0x340/0x340 [ 139.513230] ? lock_release+0xa30/0xa30 [ 139.517193] ? copy_mount_string+0x40/0x40 [ 139.521415] ? kasan_kmalloc+0xc4/0xe0 [ 139.525289] ? kmem_cache_alloc_trace+0x318/0x780 [ 139.530134] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 139.535666] ? _copy_from_user+0xdf/0x150 [ 139.539812] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 139.545349] ? copy_mount_options+0x285/0x380 [ 139.549859] ksys_mount+0x12d/0x140 [ 139.553474] __x64_sys_mount+0xbe/0x150 [ 139.557434] do_syscall_64+0x1b9/0x820 [ 139.561306] ? finish_task_switch+0x1d3/0x870 [ 139.565792] ? syscall_return_slowpath+0x5e0/0x5e0 [ 139.570719] ? syscall_return_slowpath+0x31d/0x5e0 [ 139.575635] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 139.580638] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 139.586192] ? prepare_exit_to_usermode+0x291/0x3b0 [ 139.591217] ? perf_trace_sys_enter+0xb10/0xb10 [ 139.595873] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 139.600707] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 139.605897] RIP: 0033:0x45885a [ 139.609079] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 dd 8f fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 ba 8f fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 139.628251] RSP: 002b:00007fe773c40a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 139.635945] RAX: ffffffffffffffda RBX: 00007fe773c40b30 RCX: 000000000045885a [ 139.643213] RDX: 00007fe773c40ad0 RSI: 0000000020001740 RDI: 00007fe773c40af0 [ 139.650477] RBP: 0000000020001740 R08: 00007fe773c40b30 R09: 00007fe773c40ad0 [ 139.657731] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000014 [ 139.664987] R13: 0000000000000000 R14: 00000000004d3eb0 R15: 000000000000002d 21:23:48 executing program 6: r0 = semget$private(0x0, 0x6, 0x0) unshare(0x40000) semtimedop(r0, &(0x7f00000000c0)=[{0x0, 0xfffffffffffffff9, 0x1000}], 0x1, &(0x7f0000efe000)={0x2000}) semop(r0, &(0x7f00008d8000)=[{0x0, 0x0, 0xffffffffffffffff}], 0x1) semctl$SETALL(r0, 0x0, 0x11, &(0x7f0000000000)) perf_event_open(&(0x7f000001d000)={0x200000002, 0x70, 0x80000000006, 0x108000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r1 = syz_open_dev$loop(&(0x7f0000000340)='/dev/loop#\x00', 0x0, 0x82) r2 = openat$null(0xffffffffffffff9c, &(0x7f0000000180)='/dev/null\x00', 0x200, 0x0) write$cgroup_int(r2, &(0x7f00000002c0), 0x4) getrusage(0x1, &(0x7f0000000200)) r3 = gettid() r4 = syz_open_procfs(r3, &(0x7f00000001c0)='net/rt_acct\x00') clock_gettime(0x0, &(0x7f0000000140)) ioctl$LOOP_CHANGE_FD(r1, 0x4c06, r4) 21:23:48 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000380)="636c6561725f72656673007edb") write$cgroup_pid(r0, &(0x7f0000000280), 0x1) 21:23:48 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000100)={0x26, 'aead\x00', 0x0, 0x0, 'gcm_base(ctr-camellia-asm,ghash-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000480)="d3ab27191a010023560fd9d5e03eba602dff05b82756df62", 0x18) 21:23:48 executing program 4: perf_event_open(&(0x7f0000aaa000)={0x2, 0x70, 0x857, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kcmp(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) 21:23:48 executing program 7: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$hfsplus(&(0x7f0000000040)='hfsplus\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000300), 0x0, &(0x7f0000000380)) 21:23:48 executing program 3: r0 = getpid() prctl$setptracer(0x59616d61, r0) socketpair$inet_sctp(0x2, 0x0, 0x84, &(0x7f0000000280)) r1 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000100)={&(0x7f00000000c0)='\x00'}, 0x10) ioctl$SNDRV_SEQ_IOCTL_QUERY_SUBS(r1, 0xc058534f, &(0x7f0000000140)={{0x54da6b80, 0x7}, 0x0, 0x4, 0x1d0, {0x0, 0xffff}, 0x5, 0x401}) r2 = syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x100000000, 0x0) ioctl$TIOCGPGRP(r2, 0x540f, &(0x7f0000000080)) syz_open_dev$binder(&(0x7f0000000000)='/dev/binder#\x00', 0x0, 0x0) prctl$setptracer(0x59616d61, 0x0) prctl$setptracer(0x59616d61, 0x0) prctl$setptracer(0x59616d61, 0x0) prctl$setptracer(0x59616d61, r0) 21:23:48 executing program 2 (fault-call:0 fault-nth:46): syz_mount_image$gfs2(&(0x7f0000000040)='gfs2\x00', &(0x7f0000001740)='./file0\x00', 0x0, 0x0, &(0x7f0000001680), 0x0, &(0x7f0000000880)=ANY=[@ANYBLOB='l']) 21:23:48 executing program 0: syz_open_dev$sndseq(&(0x7f0000000000)='/dev/snd/seq\x00', 0x0, 0x0) userfaultfd(0x0) syz_open_dev$mice(&(0x7f0000000100)='/dev/input/mice\x00', 0x0, 0x0) pselect6(0x40, &(0x7f00000abfc0)={0x3ffffd, 0x0, 0x0, 0x0, 0x0, 0x60000000}, &(0x7f0000768000), &(0x7f00007fbfc0), &(0x7f0000f22000)={0x0, 0x989680}, &(0x7f0000f14000)={&(0x7f0000553ff8), 0x8}) [ 139.938738] FAULT_INJECTION: forcing a failure. [ 139.938738] name failslab, interval 1, probability 0, space 0, times 0 [ 139.950111] CPU: 1 PID: 12065 Comm: syz-executor2 Not tainted 4.18.0-rc3-next-20180706+ #1 [ 139.958535] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 139.967916] Call Trace: [ 139.970517] dump_stack+0x1c9/0x2b4 [ 139.974153] ? dump_stack_print_info.cold.2+0x52/0x52 [ 139.979355] should_fail.cold.4+0xa/0x11 [ 139.983427] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 139.988549] ? save_stack+0xa9/0xd0 [ 139.992169] ? save_stack+0x43/0xd0 [ 139.995812] ? kasan_kmalloc+0xc4/0xe0 [ 139.999693] ? __kmalloc+0x14e/0x760 [ 140.003402] ? __list_lru_init+0x151/0x840 [ 140.007630] ? alloc_super+0x976/0xb10 [ 140.011526] ? sget_userns+0x276/0x860 [ 140.015411] ? sget+0x10b/0x150 [ 140.018701] ? gfs2_mount+0x1a7/0x712 [ 140.022504] ? legacy_get_tree+0x118/0x440 [ 140.026749] ? vfs_get_tree+0x1cb/0x5c0 [ 140.030716] ? do_mount+0x6c1/0x1fb0 [ 140.034422] ? ksys_mount+0x12d/0x140 [ 140.038213] ? __x64_sys_mount+0xbe/0x150 [ 140.042372] ? do_syscall_64+0x1b9/0x820 [ 140.046431] ? lock_acquire+0x1e4/0x540 [ 140.050400] ? fs_reclaim_acquire+0x20/0x20 [ 140.054716] ? lock_downgrade+0x8f0/0x8f0 [ 140.058873] ? check_same_owner+0x340/0x340 [ 140.063202] ? rcu_note_context_switch+0x730/0x730 [ 140.068129] __should_failslab+0x124/0x180 [ 140.072457] should_failslab+0x9/0x14 [ 140.076254] kmem_cache_alloc_node_trace+0x26f/0x770 [ 140.081356] ? kasan_kmalloc+0xc4/0xe0 [ 140.085241] __kmalloc_node+0x33/0x70 [ 140.089051] kvmalloc_node+0x65/0xf0 [ 140.092761] __list_lru_init+0x5d9/0x840 [ 140.096813] ? up_write+0x7b/0x220 [ 140.100359] ? list_lru_destroy+0x500/0x500 [ 140.104685] ? prealloc_shrinker+0x124/0x450 [ 140.109101] ? prealloc_shrinker+0x21c/0x450 [ 140.113502] ? inactive_list_is_low+0x850/0x850 [ 140.118166] ? __lockdep_init_map+0x105/0x590 [ 140.122664] alloc_super+0x976/0xb10 [ 140.126374] ? destroy_unused_super.part.11+0x110/0x110 [ 140.131746] ? lock_downgrade+0x8f0/0x8f0 [ 140.135901] ? kasan_check_read+0x11/0x20 [ 140.140054] ? do_raw_spin_trylock+0x1c0/0x1c0 [ 140.144629] ? kasan_check_write+0x14/0x20 [ 140.148860] ? do_raw_spin_lock+0xc1/0x200 [ 140.153107] sget_userns+0x276/0x860 [ 140.156835] ? gfs2_kill_sb+0x1a0/0x1a0 [ 140.160813] ? fallocate_chunk.isra.15.cold.19+0x7c/0x7c [ 140.166356] ? vfs_get_super+0x270/0x270 [ 140.170417] ? kasan_check_read+0x11/0x20 [ 140.174657] ? do_raw_spin_unlock+0xa7/0x2f0 [ 140.179056] ? do_raw_spin_trylock+0x1c0/0x1c0 [ 140.183636] ? kasan_check_write+0x14/0x20 [ 140.187872] ? do_raw_spin_lock+0xc1/0x200 [ 140.192139] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 140.197671] ? ns_capable_common+0x13f/0x170 [ 140.202083] ? gfs2_kill_sb+0x1a0/0x1a0 [ 140.206059] sget+0x10b/0x150 [ 140.209167] ? fallocate_chunk.isra.15.cold.19+0x7c/0x7c [ 140.214649] gfs2_mount+0x1a7/0x712 [ 140.218375] ? fill_super+0x1a40/0x1a40 [ 140.222355] ? check_same_owner+0x340/0x340 [ 140.226670] ? debug_mutex_init+0x2d/0x60 [ 140.230814] ? kasan_unpoison_shadow+0x35/0x50 [ 140.235404] ? kasan_kmalloc+0xc4/0xe0 [ 140.239305] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 140.244856] ? fill_super+0x1a40/0x1a40 [ 140.248820] legacy_get_tree+0x118/0x440 [ 140.252875] vfs_get_tree+0x1cb/0x5c0 [ 140.256685] ? vfs_set_fs_source+0x12c/0x180 [ 140.261088] do_mount+0x6c1/0x1fb0 [ 140.264618] ? check_same_owner+0x340/0x340 [ 140.268928] ? lock_release+0xa30/0xa30 [ 140.272897] ? copy_mount_string+0x40/0x40 [ 140.277143] ? kasan_kmalloc+0xc4/0xe0 [ 140.281029] ? kmem_cache_alloc_trace+0x318/0x780 [ 140.285864] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 140.291392] ? _copy_from_user+0xdf/0x150 [ 140.295534] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 140.301066] ? copy_mount_options+0x285/0x380 [ 140.305558] ksys_mount+0x12d/0x140 [ 140.309193] __x64_sys_mount+0xbe/0x150 [ 140.313166] do_syscall_64+0x1b9/0x820 [ 140.317044] ? finish_task_switch+0x1d3/0x870 [ 140.321547] ? syscall_return_slowpath+0x5e0/0x5e0 [ 140.326486] ? syscall_return_slowpath+0x31d/0x5e0 [ 140.331408] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 140.336420] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 140.341958] ? prepare_exit_to_usermode+0x291/0x3b0 [ 140.346981] ? perf_trace_sys_enter+0xb10/0xb10 [ 140.351642] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 140.356482] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 140.361663] RIP: 0033:0x45885a [ 140.364871] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 dd 8f fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 ba 8f fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 140.384172] RSP: 002b:00007fe773c40a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 140.391872] RAX: ffffffffffffffda RBX: 00007fe773c40b30 RCX: 000000000045885a [ 140.399132] RDX: 00007fe773c40ad0 RSI: 0000000020001740 RDI: 00007fe773c40af0 [ 140.406405] RBP: 0000000020001740 R08: 00007fe773c40b30 R09: 00007fe773c40ad0 [ 140.413673] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000014 [ 140.420930] R13: 0000000000000000 R14: 00000000004d3eb0 R15: 000000000000002e 21:23:49 executing program 5: perf_event_open(&(0x7f0000aaa000)={0x2, 0x70, 0x857, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpgrp(0xffffffffffffffff) r1 = getpgrp(0xffffffffffffffff) kcmp(r0, r1, 0x6, 0xffffffffffffffff, 0xffffffffffffffff) 21:23:49 executing program 2 (fault-call:0 fault-nth:47): syz_mount_image$gfs2(&(0x7f0000000040)='gfs2\x00', &(0x7f0000001740)='./file0\x00', 0x0, 0x0, &(0x7f0000001680), 0x0, &(0x7f0000000880)=ANY=[@ANYBLOB='l']) 21:23:49 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000100)={0x26, 'aead\x00', 0x0, 0x0, 'gcm_base(ctr-camellia-asm,ghash-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000480), 0x0) 21:23:49 executing program 0: syz_open_dev$sndseq(&(0x7f0000000000)='/dev/snd/seq\x00', 0x0, 0x0) userfaultfd(0x0) syz_open_dev$mice(&(0x7f0000000100)='/dev/input/mice\x00', 0x0, 0x0) pselect6(0x40, &(0x7f00000abfc0)={0x3ffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x16}, &(0x7f0000768000), &(0x7f00007fbfc0), &(0x7f0000f22000)={0x0, 0x989680}, &(0x7f0000f14000)={&(0x7f0000553ff8), 0x8}) [ 140.476607] hfsplus: unable to find HFS+ superblock 21:23:49 executing program 4: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='loginuid\x00') write$cgroup_pid(r0, &(0x7f00000000c0), 0x1) sendfile(r0, r0, &(0x7f0000000040), 0x3223) 21:23:49 executing program 3: r0 = getpid() prctl$setptracer(0x59616d61, r0) socketpair$inet_sctp(0x2, 0x0, 0x84, &(0x7f0000000280)) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) waitid(0x2, r0, 0x0, 0x80000000, &(0x7f0000000180)) getsockopt$inet6_dccp_buf(r1, 0x21, 0xcf, &(0x7f0000000080)=""/154, &(0x7f0000000140)=0x9a) prctl$setptracer(0x59616d61, r0) prctl$setptracer(0x59616d61, r0) sched_getaffinity(r0, 0x8, &(0x7f0000000000)) prctl$setptracer(0x59616d61, r0) prctl$setptracer(0x59616d61, r0) 21:23:49 executing program 7: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$hfsplus(&(0x7f0000000040)="686673706c75730e", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000300), 0x0, &(0x7f0000000380)) 21:23:49 executing program 5: r0 = socket$packet(0x11, 0x808000000002, 0x300) flock(r0, 0x1) close(r0) [ 140.690815] FAULT_INJECTION: forcing a failure. [ 140.690815] name failslab, interval 1, probability 0, space 0, times 0 [ 140.702386] CPU: 0 PID: 12106 Comm: syz-executor2 Not tainted 4.18.0-rc3-next-20180706+ #1 [ 140.710798] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 140.720188] Call Trace: [ 140.722792] dump_stack+0x1c9/0x2b4 [ 140.726437] ? dump_stack_print_info.cold.2+0x52/0x52 [ 140.731657] ? __kernel_text_address+0xd/0x40 [ 140.736168] ? unwind_get_return_address+0x61/0xa0 [ 140.741119] should_fail.cold.4+0xa/0x11 [ 140.745199] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 140.750320] ? save_stack+0xa9/0xd0 [ 140.753962] ? save_stack+0x43/0xd0 [ 140.757603] ? kasan_kmalloc+0xc4/0xe0 [ 140.761500] ? kmem_cache_alloc_trace+0x152/0x780 [ 140.766355] ? __memcg_init_list_lru_node+0x185/0x2d0 [ 140.771582] ? __list_lru_init+0x4d6/0x840 [ 140.775829] ? alloc_super+0x976/0xb10 [ 140.779711] ? sget+0x10b/0x150 [ 140.783015] ? gfs2_mount+0x1a7/0x712 [ 140.786811] ? legacy_get_tree+0x118/0x440 [ 140.791050] ? vfs_get_tree+0x1cb/0x5c0 [ 140.795115] ? do_mount+0x6c1/0x1fb0 [ 140.799087] ? ksys_mount+0x12d/0x140 [ 140.802889] ? __x64_sys_mount+0xbe/0x150 [ 140.807043] ? do_syscall_64+0x1b9/0x820 [ 140.811094] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 140.816455] ? save_stack+0xa9/0xd0 [ 140.820078] ? lock_acquire+0x1e4/0x540 [ 140.824058] ? fs_reclaim_acquire+0x20/0x20 [ 140.828376] ? lock_downgrade+0x8f0/0x8f0 [ 140.832525] ? ksys_mount+0x12d/0x140 [ 140.836322] ? check_same_owner+0x340/0x340 [ 140.840642] ? rcu_note_context_switch+0x730/0x730 [ 140.845570] __should_failslab+0x124/0x180 [ 140.849837] should_failslab+0x9/0x14 [ 140.853631] kmem_cache_alloc_trace+0x2cb/0x780 [ 140.858285] ? kasan_kmalloc+0xc4/0xe0 [ 140.862167] __memcg_init_list_lru_node+0x185/0x2d0 [ 140.867177] ? kvfree_rcu+0x20/0x20 [ 140.870803] ? __kmalloc_node+0x47/0x70 [ 140.874787] __list_lru_init+0x4d6/0x840 [ 140.878841] ? up_write+0x7b/0x220 [ 140.882374] ? list_lru_destroy+0x500/0x500 [ 140.886682] ? prealloc_shrinker+0x124/0x450 [ 140.891080] ? prealloc_shrinker+0x21c/0x450 [ 140.895477] ? inactive_list_is_low+0x850/0x850 [ 140.900143] ? __lockdep_init_map+0x105/0x590 [ 140.904632] alloc_super+0x976/0xb10 [ 140.908437] ? destroy_unused_super.part.11+0x110/0x110 [ 140.913797] ? lock_downgrade+0x8f0/0x8f0 [ 140.917947] ? kasan_check_read+0x11/0x20 [ 140.922084] ? do_raw_spin_trylock+0x1c0/0x1c0 [ 140.926654] ? kasan_check_write+0x14/0x20 [ 140.930873] ? do_raw_spin_lock+0xc1/0x200 [ 140.935099] sget_userns+0x276/0x860 [ 140.938813] ? gfs2_kill_sb+0x1a0/0x1a0 [ 140.942790] ? fallocate_chunk.isra.15.cold.19+0x7c/0x7c [ 140.948239] ? vfs_get_super+0x270/0x270 [ 140.952294] ? kasan_check_read+0x11/0x20 [ 140.956461] ? do_raw_spin_unlock+0xa7/0x2f0 [ 140.960870] ? do_raw_spin_trylock+0x1c0/0x1c0 [ 140.965455] ? kasan_check_write+0x14/0x20 [ 140.969677] ? do_raw_spin_lock+0xc1/0x200 [ 140.973911] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 140.979441] ? ns_capable_common+0x13f/0x170 [ 140.983837] ? gfs2_kill_sb+0x1a0/0x1a0 [ 140.987797] sget+0x10b/0x150 [ 140.990899] ? fallocate_chunk.isra.15.cold.19+0x7c/0x7c [ 140.996334] gfs2_mount+0x1a7/0x712 [ 140.999955] ? fill_super+0x1a40/0x1a40 [ 141.003930] ? check_same_owner+0x340/0x340 [ 141.008241] ? kasan_unpoison_shadow+0x35/0x50 [ 141.012817] ? kasan_kmalloc+0xc4/0xe0 [ 141.016711] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 141.022236] ? fill_super+0x1a40/0x1a40 [ 141.027024] legacy_get_tree+0x118/0x440 [ 141.031083] vfs_get_tree+0x1cb/0x5c0 [ 141.034877] ? vfs_set_fs_source+0x12c/0x180 [ 141.039281] do_mount+0x6c1/0x1fb0 [ 141.042816] ? check_same_owner+0x340/0x340 [ 141.047126] ? lock_release+0xa30/0xa30 [ 141.051096] ? copy_mount_string+0x40/0x40 [ 141.055314] ? kasan_kmalloc+0xc4/0xe0 [ 141.059205] ? kmem_cache_alloc_trace+0x318/0x780 [ 141.064039] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 141.069564] ? _copy_from_user+0xdf/0x150 [ 141.073708] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 141.079254] ? copy_mount_options+0x285/0x380 [ 141.083747] ksys_mount+0x12d/0x140 [ 141.087366] __x64_sys_mount+0xbe/0x150 [ 141.091328] do_syscall_64+0x1b9/0x820 [ 141.095213] ? syscall_return_slowpath+0x5e0/0x5e0 [ 141.100223] ? syscall_return_slowpath+0x31d/0x5e0 [ 141.105146] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 141.110148] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 141.115682] ? prepare_exit_to_usermode+0x291/0x3b0 [ 141.120693] ? perf_trace_sys_enter+0xb10/0xb10 [ 141.125360] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 141.130191] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 141.135368] RIP: 0033:0x45885a [ 141.138536] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 dd 8f fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 ba 8f fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 141.157730] RSP: 002b:00007fe773c40a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 141.165429] RAX: ffffffffffffffda RBX: 00007fe773c40b30 RCX: 000000000045885a [ 141.172684] RDX: 00007fe773c40ad0 RSI: 0000000020001740 RDI: 00007fe773c40af0 [ 141.179951] RBP: 0000000020001740 R08: 00007fe773c40b30 R09: 00007fe773c40ad0 [ 141.187204] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000014 [ 141.194466] R13: 0000000000000000 R14: 00000000004d3eb0 R15: 000000000000002f 21:23:50 executing program 6: r0 = semget$private(0x0, 0x6, 0x0) unshare(0x40000) semtimedop(r0, &(0x7f00000000c0)=[{0x0, 0xfffffffffffffff9, 0x1000}], 0x1, &(0x7f0000efe000)={0x2000}) semop(r0, &(0x7f00008d8000)=[{0x0, 0x0, 0xffffffffffffffff}], 0x1) semctl$SETALL(r0, 0x0, 0x11, &(0x7f0000000000)) perf_event_open(&(0x7f000001d000)={0x200000002, 0x70, 0x80000000006, 0x108000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) syz_open_dev$loop(&(0x7f0000000340)='/dev/loop#\x00', 0x0, 0x82) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000180)='/dev/null\x00', 0x200, 0x0) write$cgroup_int(r1, &(0x7f00000002c0), 0x4) getrusage(0x1, &(0x7f0000000200)) r2 = gettid() syz_open_procfs(r2, &(0x7f00000001c0)='net/rt_acct\x00') clock_gettime(0x0, &(0x7f0000000140)) 21:23:50 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000100)={0x26, 'aead\x00', 0x0, 0x0, 'gcm_base(ctr-camellia-asm,ghash-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000480)="d3ab27191a010023560fd9d5", 0xc) 21:23:50 executing program 0: syz_open_dev$sndseq(&(0x7f0000000000)='/dev/snd/seq\x00', 0x0, 0x0) userfaultfd(0x0) syz_open_dev$mice(&(0x7f0000000100)='/dev/input/mice\x00', 0x0, 0x0) pselect6(0x40, &(0x7f00000abfc0)={0x3ffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x60}, &(0x7f0000768000), &(0x7f00007fbfc0), &(0x7f0000f22000)={0x0, 0x989680}, &(0x7f0000f14000)={&(0x7f0000553ff8), 0x8}) 21:23:50 executing program 4: 21:23:50 executing program 7: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$hfsplus(&(0x7f0000000040)="686673706c757306", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000300), 0x0, &(0x7f0000000380)) 21:23:50 executing program 5: 21:23:50 executing program 3: r0 = getpid() r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000140)='/dev/sequencer\x00', 0x40000, 0x0) ioctl$sock_SIOCBRADDBR(r1, 0x89a0, &(0x7f0000000180)='ip6_vti0\x00') prctl$setptracer(0x59616d61, r0) socketpair$inet_sctp(0x2, 0x0, 0x84, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) prctl$setptracer(0x59616d61, 0x0) r4 = dup3(r2, r3, 0x80000) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_NEXT_DEVICE(r4, 0xc0045540, &(0x7f00000000c0)=0x1) prctl$setptracer(0x59616d61, 0x0) ioctl$UFFDIO_REGISTER(r4, 0xc020aa00, &(0x7f0000000100)={{&(0x7f0000ffd000/0x3000)=nil, 0x3000}, 0x3}) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SNDRV_TIMER_IOCTL_PARAMS(r5, 0x40505412, &(0x7f0000000040)={0x7, 0x100000000, 0x8, 0x0, 0x8}) recvmsg$kcm(r5, &(0x7f0000000480)={&(0x7f00000001c0)=@vsock={0x0, 0x0, 0x0, @hyper}, 0x80, &(0x7f0000000440)=[{&(0x7f0000000240)=""/48, 0x30}, {&(0x7f00000002c0)=""/74, 0x4a}, {&(0x7f0000000340)=""/54, 0x36}, {&(0x7f0000000380)=""/179, 0xb3}], 0x4, 0x0, 0x0, 0x2}, 0x1) prctl$setptracer(0x59616d61, 0x0) prctl$setptracer(0x59616d61, r0) 21:23:50 executing program 2 (fault-call:0 fault-nth:48): syz_mount_image$gfs2(&(0x7f0000000040)='gfs2\x00', &(0x7f0000001740)='./file0\x00', 0x0, 0x0, &(0x7f0000001680), 0x0, &(0x7f0000000880)=ANY=[@ANYBLOB='l']) [ 141.443993] FAULT_INJECTION: forcing a failure. [ 141.443993] name failslab, interval 1, probability 0, space 0, times 0 [ 141.455278] CPU: 1 PID: 12148 Comm: syz-executor2 Not tainted 4.18.0-rc3-next-20180706+ #1 [ 141.463689] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 141.473052] Call Trace: [ 141.475662] dump_stack+0x1c9/0x2b4 [ 141.479305] ? dump_stack_print_info.cold.2+0x52/0x52 [ 141.484517] ? perf_trace_lock+0xde/0x920 [ 141.488681] should_fail.cold.4+0xa/0x11 21:23:50 executing program 4: 21:23:50 executing program 5: 21:23:50 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000100)={0x26, 'aead\x00', 0x0, 0x0, 'gcm_base(ctr-camellia-asm,ghash-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000480)="d3ab27191a010023560fd9d5e03eba602dff", 0x12) [ 141.493283] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 141.498404] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 141.504016] ? find_next_zero_bit+0x111/0x140 [ 141.508529] ? kasan_check_read+0x11/0x20 [ 141.512698] ? do_raw_spin_unlock+0xa7/0x2f0 [ 141.517134] ? do_raw_spin_trylock+0x1c0/0x1c0 [ 141.521743] ? find_next_bit+0x104/0x130 [ 141.525898] ? cpumask_next+0x24/0x30 [ 141.529719] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 141.535277] ? pcpu_alloc+0x190/0x13a0 [ 141.539181] ? kmem_cache_alloc_trace+0x152/0x780 21:23:50 executing program 4: 21:23:50 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000100)={0x26, 'aead\x00', 0x0, 0x0, 'gcm_base(ctr-camellia-asm,ghash-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000480)="d3ab27191a010023560fd9d5e03eba602dff05b827", 0x15) [ 141.544041] ? lock_acquire+0x1e4/0x540 [ 141.548030] ? fs_reclaim_acquire+0x20/0x20 [ 141.552370] ? lock_downgrade+0x8f0/0x8f0 [ 141.556536] ? check_same_owner+0x340/0x340 [ 141.560877] ? rcu_note_context_switch+0x730/0x730 [ 141.565827] __should_failslab+0x124/0x180 [ 141.570083] should_failslab+0x9/0x14 [ 141.573897] __kmalloc+0x2c8/0x760 [ 141.577452] ? __init_rwsem+0x1cc/0x2a0 [ 141.581446] ? do_raw_write_unlock.cold.8+0x49/0x49 [ 141.586481] ? prealloc_shrinker+0x124/0x450 21:23:50 executing program 4: 21:23:50 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000100)={0x26, 'aead\x00', 0x0, 0x0, 'gcm_base(ctr-camellia-asm,ghash-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000480)="d3ab27191a010023560fd9d5e03eba602dff05b82756df", 0x17) [ 141.590909] prealloc_shrinker+0x124/0x450 [ 141.595161] ? inactive_list_is_low+0x850/0x850 [ 141.599852] ? __lockdep_init_map+0x105/0x590 [ 141.604370] alloc_super+0x8dd/0xb10 [ 141.608104] ? destroy_unused_super.part.11+0x110/0x110 [ 141.613489] ? lock_downgrade+0x8f0/0x8f0 [ 141.617682] ? kasan_check_read+0x11/0x20 [ 141.621850] ? do_raw_spin_trylock+0x1c0/0x1c0 [ 141.626450] ? kasan_check_write+0x14/0x20 [ 141.630699] ? do_raw_spin_lock+0xc1/0x200 [ 141.634960] sget_userns+0x276/0x860 [ 141.638952] ? gfs2_kill_sb+0x1a0/0x1a0 21:23:50 executing program 4: [ 141.642965] ? fallocate_chunk.isra.15.cold.19+0x7c/0x7c [ 141.648432] ? vfs_get_super+0x270/0x270 [ 141.652531] ? kasan_check_read+0x11/0x20 [ 141.656723] ? do_raw_spin_unlock+0xa7/0x2f0 [ 141.661144] ? do_raw_spin_trylock+0x1c0/0x1c0 [ 141.665771] ? kasan_check_write+0x14/0x20 [ 141.670021] ? do_raw_spin_lock+0xc1/0x200 [ 141.674282] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 141.679861] ? ns_capable_common+0x13f/0x170 [ 141.684290] ? gfs2_kill_sb+0x1a0/0x1a0 [ 141.688286] sget+0x10b/0x150 [ 141.691412] ? fallocate_chunk.isra.15.cold.19+0x7c/0x7c [ 141.696883] gfs2_mount+0x1a7/0x712 [ 141.700534] ? fill_super+0x1a40/0x1a40 [ 141.704529] ? kasan_check_write+0x14/0x20 [ 141.708780] ? do_raw_spin_lock+0xc1/0x200 [ 141.713038] ? kasan_unpoison_shadow+0x35/0x50 [ 141.717648] ? kasan_kmalloc+0xc4/0xe0 [ 141.721871] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 141.727428] ? fill_super+0x1a40/0x1a40 [ 141.731419] legacy_get_tree+0x118/0x440 [ 141.735503] vfs_get_tree+0x1cb/0x5c0 [ 141.739331] ? vfs_set_fs_source+0x12c/0x180 [ 141.743759] do_mount+0x6c1/0x1fb0 [ 141.747324] ? kasan_check_write+0x14/0x20 [ 141.751576] ? copy_mount_string+0x40/0x40 [ 141.755827] ? kasan_kmalloc+0xc4/0xe0 [ 141.759732] ? kmem_cache_alloc_trace+0x318/0x780 [ 141.764595] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 141.770158] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 141.775810] ? copy_mount_options+0x285/0x380 [ 141.780327] ksys_mount+0x12d/0x140 [ 141.783974] __x64_sys_mount+0xbe/0x150 [ 141.787973] do_syscall_64+0x1b9/0x820 [ 141.791874] ? finish_task_switch+0x1d3/0x870 [ 141.796400] ? syscall_return_slowpath+0x5e0/0x5e0 [ 141.801352] ? syscall_return_slowpath+0x31d/0x5e0 [ 141.806328] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 141.811360] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 141.816912] ? prepare_exit_to_usermode+0x291/0x3b0 [ 141.821947] ? perf_trace_sys_enter+0xb10/0xb10 [ 141.826634] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 141.831484] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 141.836676] RIP: 0033:0x45885a [ 141.839865] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 dd 8f fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 ba 8f fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 141.859067] RSP: 002b:00007fe773c40a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 141.866773] RAX: ffffffffffffffda RBX: 00007fe773c40b30 RCX: 000000000045885a [ 141.874040] RDX: 00007fe773c40ad0 RSI: 0000000020001740 RDI: 00007fe773c40af0 [ 141.881311] RBP: 0000000020001740 R08: 00007fe773c40b30 R09: 00007fe773c40ad0 [ 141.888582] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000014 [ 141.895851] R13: 0000000000000000 R14: 00000000004d3eb0 R15: 0000000000000030 21:23:51 executing program 6: r0 = semget$private(0x0, 0x6, 0x0) unshare(0x40000) semtimedop(r0, &(0x7f00000000c0)=[{0x0, 0xfffffffffffffff9, 0x1000}], 0x1, &(0x7f0000efe000)={0x2000}) semop(r0, &(0x7f00008d8000)=[{0x0, 0x0, 0xffffffffffffffff}], 0x1) semctl$SETALL(r0, 0x0, 0x11, &(0x7f0000000000)) perf_event_open(&(0x7f000001d000)={0x200000002, 0x70, 0x80000000006, 0x108000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) syz_open_dev$loop(&(0x7f0000000340)='/dev/loop#\x00', 0x0, 0x82) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000180)='/dev/null\x00', 0x200, 0x0) write$cgroup_int(r1, &(0x7f00000002c0), 0x4) getrusage(0x1, &(0x7f0000000200)) r2 = gettid() syz_open_procfs(r2, &(0x7f00000001c0)='net/rt_acct\x00') 21:23:51 executing program 1: 21:23:51 executing program 4: mkdir(&(0x7f0000000500)='./file1\x00', 0x0) r0 = open(&(0x7f0000000080)='./file1\x00', 0x0, 0x0) mkdirat(r0, &(0x7f0000000100)='./file1\x00', 0x0) openat(r0, &(0x7f0000000000)='./file1\x00', 0x400800, 0xffffffffffffffff) 21:23:51 executing program 5: mkdir(&(0x7f0000000500)='./file1\x00', 0x0) r0 = open(&(0x7f0000000080)='./file1\x00', 0x0, 0x0) mkdirat(r0, &(0x7f0000000100)='./file1\x00', 0x0) openat(r0, &(0x7f0000000000)='./file1\x00', 0x20000, 0x80000003) 21:23:51 executing program 3: r0 = getpgid(0xffffffffffffffff) ptrace$getenv(0x4201, r0, 0x2, &(0x7f0000000000)) r1 = getpid() prctl$setptracer(0x59616d61, r1) socketpair$inet_sctp(0x2, 0x0, 0x84, &(0x7f0000000280)) prctl$setptracer(0x59616d61, 0x0) prctl$setptracer(0x59616d61, 0x0) prctl$setptracer(0x59616d61, 0x0) prctl$setptracer(0x59616d61, r1) 21:23:51 executing program 2 (fault-call:0 fault-nth:49): syz_mount_image$gfs2(&(0x7f0000000040)='gfs2\x00', &(0x7f0000001740)='./file0\x00', 0x0, 0x0, &(0x7f0000001680), 0x0, &(0x7f0000000880)=ANY=[@ANYBLOB='l']) 21:23:51 executing program 0: syz_open_dev$sndseq(&(0x7f0000000000)='/dev/snd/seq\x00', 0x0, 0x0) userfaultfd(0x0) syz_open_dev$mice(&(0x7f0000000100)='/dev/input/mice\x00', 0x0, 0x0) pselect6(0x40, &(0x7f00000abfc0)={0x3ffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6000000000000000}, &(0x7f0000768000), &(0x7f00007fbfc0), &(0x7f0000f22000)={0x0, 0x989680}, &(0x7f0000f14000)={&(0x7f0000553ff8), 0x8}) 21:23:51 executing program 7: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$hfsplus(&(0x7f0000000040)='hfsplus\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000300), 0x0, &(0x7f0000000380)) 21:23:51 executing program 1: mkdir(&(0x7f0000000100)='./file1\x00', 0x0) r0 = open(&(0x7f0000000080)='./file1\x00', 0x0, 0x0) mkdirat(r0, &(0x7f0000000040)='./file1\x00', 0x0) openat(r0, &(0x7f0000000000)='./file1\x00', 0x400, 0x442e7a75c41c277c) [ 142.482658] FAULT_INJECTION: forcing a failure. [ 142.482658] name failslab, interval 1, probability 0, space 0, times 0 [ 142.494226] CPU: 1 PID: 12208 Comm: syz-executor2 Not tainted 4.18.0-rc3-next-20180706+ #1 [ 142.502649] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 142.512188] Call Trace: [ 142.514868] dump_stack+0x1c9/0x2b4 [ 142.518518] ? dump_stack_print_info.cold.2+0x52/0x52 [ 142.523727] ? perf_trace_lock+0xde/0x920 [ 142.528007] should_fail.cold.4+0xa/0x11 21:23:51 executing program 5: mkdir(&(0x7f0000000500)='./file1\x00', 0x0) r0 = open(&(0x7f0000000080)='./file1\x00', 0x0, 0x0) mkdirat(r0, &(0x7f0000000140)='./file1\x00', 0x0) faccessat(r0, &(0x7f0000000000)='./file1\x00', 0x4, 0x400) 21:23:51 executing program 4: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) r1 = dup2(r0, r0) mkdirat(r1, &(0x7f0000000100)='./file0\x00', 0x0) openat(r0, &(0x7f0000000040)='./file0\x00', 0x0, 0x140) [ 142.532086] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 142.537209] ? save_stack+0xa9/0xd0 [ 142.540862] ? save_stack+0x43/0xd0 [ 142.544506] ? kasan_kmalloc+0xc4/0xe0 [ 142.548398] ? kmem_cache_alloc_trace+0x152/0x780 [ 142.553261] ? __memcg_init_list_lru_node+0x185/0x2d0 [ 142.558469] ? __list_lru_init+0x4d6/0x840 [ 142.562718] ? alloc_super+0x976/0xb10 [ 142.566622] ? sget+0x10b/0x150 [ 142.569941] ? gfs2_mount+0x1a7/0x712 [ 142.573903] ? vfs_get_tree+0x1cb/0x5c0 [ 142.577896] ? do_mount+0x6c1/0x1fb0 21:23:51 executing program 1: mkdir(&(0x7f0000000100)='./file1\x00', 0x0) r0 = open(&(0x7f0000000080)='./file1\x00', 0x0, 0x0) mkdirat(r0, &(0x7f0000000040)='./file1\x00', 0x0) openat(r0, &(0x7f0000000000)='./file1\x00', 0x84000, 0x442e7a75c41c277f) [ 142.581768] ? ksys_mount+0x12d/0x140 [ 142.585588] ? __x64_sys_mount+0xbe/0x150 [ 142.589752] ? do_syscall_64+0x1b9/0x820 [ 142.593832] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 142.599225] ? lock_acquire+0x1e4/0x540 [ 142.603225] ? fs_reclaim_acquire+0x20/0x20 [ 142.607600] ? lock_downgrade+0x8f0/0x8f0 [ 142.611778] ? ksys_mount+0x12d/0x140 [ 142.615599] ? check_same_owner+0x340/0x340 [ 142.619969] ? rcu_note_context_switch+0x730/0x730 [ 142.624941] __should_failslab+0x124/0x180 [ 142.629204] should_failslab+0x9/0x14 21:23:51 executing program 3: r0 = getpid() prctl$setptracer(0x59616d61, r0) socketpair$inet_sctp(0x2, 0x0, 0x84, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) prctl$setptracer(0x59616d61, 0x0) prctl$setptracer(0x59616d61, 0x0) prctl$setptracer(0x59616d61, 0x0) prctl$setptracer(0x59616d61, r0) rename(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='./file0\x00') pwrite64(r1, &(0x7f00000012c0)="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", 0x101d, 0x0) 21:23:51 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x9, 0x1d, 0x6, 0x4, 0x2}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={r0, &(0x7f0000000000), &(0x7f0000000040)}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={r0, &(0x7f0000000000), &(0x7f0000000140)}, 0x20) 21:23:51 executing program 5: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0x3, &(0x7f0000002000)=@framed={{0x18}, [], {0x95}}, &(0x7f0000003ff6)='syzkaller\x00', 0x3, 0xc3, &(0x7f0000386000)=""/195}, 0x48) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000180)={r0, 0x50, &(0x7f0000000080)={0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000001c0)=r1, 0x4) [ 142.633060] kmem_cache_alloc_trace+0x2cb/0x780 [ 142.637851] ? kasan_kmalloc+0xc4/0xe0 [ 142.641813] __memcg_init_list_lru_node+0x185/0x2d0 [ 142.646848] ? kvfree_rcu+0x20/0x20 [ 142.650491] ? __kmalloc_node+0x47/0x70 [ 142.654483] __list_lru_init+0x4d6/0x840 [ 142.658555] ? up_write+0x7b/0x220 [ 142.662110] ? list_lru_destroy+0x500/0x500 [ 142.666444] ? prealloc_shrinker+0x124/0x450 [ 142.670871] ? prealloc_shrinker+0x21c/0x450 [ 142.675292] ? inactive_list_is_low+0x850/0x850 21:23:51 executing program 1: mkdir(&(0x7f0000000500)='./file1\x00', 0x0) r0 = open(&(0x7f0000000080)='./file1\x00', 0x0, 0x0) mkdirat(r0, &(0x7f0000000100)='./file1\x00', 0x0) openat(r0, &(0x7f0000000000)='./file1\x00', 0x400, 0x22) [ 142.679988] ? __lockdep_init_map+0x105/0x590 [ 142.684507] alloc_super+0x976/0xb10 [ 142.688248] ? destroy_unused_super.part.11+0x110/0x110 [ 142.693658] ? lock_downgrade+0x8f0/0x8f0 [ 142.697851] ? kasan_check_read+0x11/0x20 [ 142.702019] ? do_raw_spin_trylock+0x1c0/0x1c0 [ 142.706619] ? kasan_check_write+0x14/0x20 [ 142.710869] ? do_raw_spin_lock+0xc1/0x200 [ 142.715133] sget_userns+0x276/0x860 [ 142.718861] ? gfs2_kill_sb+0x1a0/0x1a0 [ 142.722852] ? fallocate_chunk.isra.15.cold.19+0x7c/0x7c [ 142.728322] ? vfs_get_super+0x270/0x270 [ 142.732399] ? kasan_check_read+0x11/0x20 [ 142.736559] ? do_raw_spin_unlock+0xa7/0x2f0 [ 142.742722] ? do_raw_spin_trylock+0x1c0/0x1c0 [ 142.747317] ? kasan_check_write+0x14/0x20 [ 142.751579] ? do_raw_spin_lock+0xc1/0x200 [ 142.755926] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 142.761505] ? ns_capable_common+0x13f/0x170 [ 142.765914] ? gfs2_kill_sb+0x1a0/0x1a0 [ 142.769893] sget+0x10b/0x150 [ 142.772995] ? fallocate_chunk.isra.15.cold.19+0x7c/0x7c [ 142.778440] gfs2_mount+0x1a7/0x712 [ 142.782072] ? fill_super+0x1a40/0x1a40 [ 142.786039] ? do_raw_spin_unlock+0xa7/0x2f0 [ 142.790468] ? do_raw_spin_trylock+0x1c0/0x1c0 [ 142.795048] ? kasan_unpoison_shadow+0x35/0x50 [ 142.799635] ? kasan_kmalloc+0xc4/0xe0 [ 142.803533] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 142.809068] ? fill_super+0x1a40/0x1a40 [ 142.813033] legacy_get_tree+0x118/0x440 [ 142.817093] vfs_get_tree+0x1cb/0x5c0 [ 142.820899] ? vfs_set_fs_source+0x12c/0x180 [ 142.825307] do_mount+0x6c1/0x1fb0 [ 142.828834] ? check_same_owner+0x340/0x340 [ 142.833145] ? lock_release+0xa30/0xa30 [ 142.837222] ? copy_mount_string+0x40/0x40 [ 142.841448] ? kasan_kmalloc+0xc4/0xe0 [ 142.845326] ? kmem_cache_alloc_trace+0x318/0x780 [ 142.850793] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 142.856326] ? _copy_from_user+0xdf/0x150 [ 142.860462] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 142.865989] ? copy_mount_options+0x285/0x380 [ 142.870497] ksys_mount+0x12d/0x140 [ 142.874124] __x64_sys_mount+0xbe/0x150 [ 142.878092] do_syscall_64+0x1b9/0x820 [ 142.881973] ? finish_task_switch+0x1d3/0x870 [ 142.886632] ? syscall_return_slowpath+0x5e0/0x5e0 [ 142.891560] ? syscall_return_slowpath+0x31d/0x5e0 [ 142.896486] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 142.901495] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 142.907022] ? prepare_exit_to_usermode+0x291/0x3b0 [ 142.912032] ? perf_trace_sys_enter+0xb10/0xb10 [ 142.916698] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 142.921537] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 142.926711] RIP: 0033:0x45885a [ 142.929885] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 dd 8f fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 ba 8f fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 142.949196] RSP: 002b:00007fe773c40a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 142.956898] RAX: ffffffffffffffda RBX: 00007fe773c40b30 RCX: 000000000045885a [ 142.964162] RDX: 00007fe773c40ad0 RSI: 0000000020001740 RDI: 00007fe773c40af0 [ 142.971420] RBP: 0000000020001740 R08: 00007fe773c40b30 R09: 00007fe773c40ad0 [ 142.978676] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000014 [ 142.985933] R13: 0000000000000000 R14: 00000000004d3eb0 R15: 0000000000000031 [ 142.997427] hfsplus: unable to find HFS+ superblock [ 143.025849] hfsplus: unable to find HFS+ superblock 21:23:52 executing program 6: r0 = semget$private(0x0, 0x6, 0x0) unshare(0x40000) semtimedop(r0, &(0x7f00000000c0)=[{0x0, 0xfffffffffffffff9, 0x1000}], 0x1, &(0x7f0000efe000)={0x2000}) semop(r0, &(0x7f00008d8000)=[{0x0, 0x0, 0xffffffffffffffff}], 0x1) semctl$SETALL(r0, 0x0, 0x11, &(0x7f0000000000)) perf_event_open(&(0x7f000001d000)={0x200000002, 0x70, 0x80000000006, 0x108000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) syz_open_dev$loop(&(0x7f0000000340)='/dev/loop#\x00', 0x0, 0x82) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000180)='/dev/null\x00', 0x200, 0x0) write$cgroup_int(r1, &(0x7f00000002c0), 0x4) getrusage(0x1, &(0x7f0000000200)) gettid() 21:23:52 executing program 1: creat(&(0x7f0000000000)='./file0\x00', 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') write$P9_RREMOVE(r0, &(0x7f0000000040)={0x7, 0x7b}, 0x7) 21:23:52 executing program 0: syz_open_dev$sndseq(&(0x7f0000000000)='/dev/snd/seq\x00', 0x0, 0x0) userfaultfd(0x0) syz_open_dev$mice(&(0x7f0000000100)='/dev/input/mice\x00', 0x0, 0x0) pselect6(0x40, &(0x7f00000abfc0)={0x3ffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800000000000000}, &(0x7f0000768000), &(0x7f00007fbfc0), &(0x7f0000f22000)={0x0, 0x989680}, &(0x7f0000f14000)={&(0x7f0000553ff8), 0x8}) 21:23:52 executing program 4: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) r1 = dup2(r0, r0) mkdirat(r1, &(0x7f0000000100)='./file0\x00', 0x0) openat(r1, &(0x7f0000000140)='./file0\x00', 0x400800, 0x10) 21:23:52 executing program 7: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$hfsplus(&(0x7f0000000040)='hfsplus\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000300), 0x0, &(0x7f0000000380)) 21:23:52 executing program 3: r0 = getpid() r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x50800, 0x0) setsockopt$IP_VS_SO_SET_DEL(r1, 0x0, 0x484, &(0x7f0000000040)={0xb7, @dev={0xac, 0x14, 0x14, 0x16}, 0x4e22, 0x3, 'lc\x00', 0x8, 0xff, 0x1a}, 0x2c) prctl$setptracer(0x59616d61, r0) socketpair$inet_sctp(0x2, 0x0, 0x84, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) prctl$setptracer(0x59616d61, 0x0) getsockname$inet(r2, &(0x7f0000000240)={0x0, 0x0, @remote}, &(0x7f00000002c0)=0x10) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000080)={0xffffffff}, 0x13f, 0x3}}, 0x20) write$RDMA_USER_CM_CMD_ACCEPT(r1, &(0x7f0000000100)={0x8, 0x120, 0xfa00, {0x3, {0x3, 0x5, "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", 0xdd, 0x9, 0x400, 0xfffffffffffffffb, 0xffff, 0x10001, 0x4, 0x1}, r3}}, 0x128) prctl$setptracer(0x59616d61, 0x0) prctl$setptracer(0x59616d61, 0x0) prctl$setptracer(0x59616d61, r0) accept(r1, &(0x7f0000000300)=@ipx, &(0x7f0000000380)=0x80) 21:23:52 executing program 2 (fault-call:0 fault-nth:50): syz_mount_image$gfs2(&(0x7f0000000040)='gfs2\x00', &(0x7f0000001740)='./file0\x00', 0x0, 0x0, &(0x7f0000001680), 0x0, &(0x7f0000000880)=ANY=[@ANYBLOB='l']) 21:23:52 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) mknodat(r0, &(0x7f0000000040)='./file1\x00', 0x0, 0x0) openat(r0, &(0x7f00000000c0)='./file1\x00', 0x4014b800, 0x110) [ 143.450662] FAULT_INJECTION: forcing a failure. [ 143.450662] name failslab, interval 1, probability 0, space 0, times 0 [ 143.461957] CPU: 1 PID: 12286 Comm: syz-executor2 Not tainted 4.18.0-rc3-next-20180706+ #1 [ 143.470162] hfsplus: unable to find HFS+ superblock [ 143.470420] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 143.470426] Call Trace: [ 143.470451] dump_stack+0x1c9/0x2b4 [ 143.470470] ? dump_stack_print_info.cold.2+0x52/0x52 [ 143.470491] ? perf_trace_lock+0xde/0x920 [ 143.500461] should_fail.cold.4+0xa/0x11 [ 143.504556] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 143.509678] ? save_stack+0xa9/0xd0 [ 143.513323] ? save_stack+0x43/0xd0 [ 143.516967] ? kasan_kmalloc+0xc4/0xe0 [ 143.520867] ? kmem_cache_alloc_trace+0x152/0x780 [ 143.525723] ? __memcg_init_list_lru_node+0x185/0x2d0 [ 143.530925] ? __list_lru_init+0x4d6/0x840 [ 143.535191] ? alloc_super+0x976/0xb10 [ 143.539094] ? sget+0x10b/0x150 [ 143.542648] ? gfs2_mount+0x1a7/0x712 [ 143.546462] ? vfs_get_tree+0x1cb/0x5c0 21:23:52 executing program 1: creat(&(0x7f0000000000)='./file0\x00', 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') write$9p(r0, &(0x7f0000000140), 0x0) 21:23:52 executing program 1: pipe2$9p(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) ioctl$sock_SIOCINQ(r0, 0x541b, &(0x7f0000000040)) 21:23:52 executing program 5: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) r1 = dup2(r0, r0) mkdirat(r1, &(0x7f0000000100)='./file0\x00', 0x0) openat(r0, &(0x7f0000000000)='./file0\x00', 0x58800, 0x5) [ 143.550444] ? do_mount+0x6c1/0x1fb0 [ 143.554182] ? ksys_mount+0x12d/0x140 [ 143.557994] ? __x64_sys_mount+0xbe/0x150 [ 143.562161] ? do_syscall_64+0x1b9/0x820 [ 143.566232] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 143.571612] ? lock_acquire+0x1e4/0x540 [ 143.575595] ? fs_reclaim_acquire+0x20/0x20 [ 143.579925] ? lock_downgrade+0x8f0/0x8f0 [ 143.584080] ? ksys_mount+0x12d/0x140 [ 143.587891] ? check_same_owner+0x340/0x340 [ 143.592226] ? rcu_note_context_switch+0x730/0x730 [ 143.597177] __should_failslab+0x124/0x180 21:23:52 executing program 1: creat(&(0x7f0000000080)='./file0\x00', 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') write$P9_RFSYNC(r0, &(0x7f0000000000)={0x7, 0x33}, 0x7) [ 143.601424] should_failslab+0x9/0x14 [ 143.605235] kmem_cache_alloc_trace+0x2cb/0x780 [ 143.609919] ? kasan_kmalloc+0xc4/0xe0 [ 143.613830] __memcg_init_list_lru_node+0x185/0x2d0 [ 143.618861] ? kvfree_rcu+0x20/0x20 [ 143.622509] ? __kmalloc_node+0x47/0x70 [ 143.626641] __list_lru_init+0x4d6/0x840 [ 143.630722] ? up_write+0x7b/0x220 [ 143.634282] ? list_lru_destroy+0x500/0x500 [ 143.638705] ? prealloc_shrinker+0x124/0x450 [ 143.643126] ? prealloc_shrinker+0x21c/0x450 21:23:52 executing program 5: [ 143.647554] ? inactive_list_is_low+0x850/0x850 [ 143.652241] ? __lockdep_init_map+0x105/0x590 [ 143.656759] alloc_super+0x976/0xb10 [ 143.660493] ? destroy_unused_super.part.11+0x110/0x110 [ 143.665868] ? lock_downgrade+0x8f0/0x8f0 [ 143.670040] ? kasan_check_read+0x11/0x20 [ 143.674202] ? do_raw_spin_trylock+0x1c0/0x1c0 [ 143.678856] ? kasan_check_write+0x14/0x20 [ 143.683101] ? do_raw_spin_lock+0xc1/0x200 [ 143.687354] sget_userns+0x276/0x860 [ 143.691182] ? gfs2_kill_sb+0x1a0/0x1a0 [ 143.695189] ? fallocate_chunk.isra.15.cold.19+0x7c/0x7c 21:23:52 executing program 3: r0 = getpid() prctl$setptracer(0x59616d61, r0) socketpair$inet_sctp(0x2, 0x0, 0x84, &(0x7f0000000280)) prctl$setptracer(0x59616d61, r0) r1 = socket$inet_udp(0x2, 0x2, 0x0) r2 = syz_open_dev$sndpcmc(&(0x7f0000000000)='/dev/snd/pcmC#D#c\x00', 0x9, 0x402) setsockopt$inet_group_source_req(r2, 0x0, 0x2c, &(0x7f0000000140)={0xffffffff, {{0x2, 0x4e20, @local={0xac, 0x14, 0x14, 0xaa}}}, {{0x2, 0x4e20, @local={0xac, 0x14, 0x14, 0xaa}}}}, 0x108) ioctl$KDADDIO(r2, 0x4b34, 0x0) prctl$setptracer(0x59616d61, r0) prctl$setptracer(0x59616d61, 0x0) prctl$setptracer(0x59616d61, r0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000080)={0xffffffff}, 0x2, 0x1009}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r2, &(0x7f0000000100)={0x1, 0x10, 0xfa00, {&(0x7f0000000040), r3}}, 0x18) 21:23:52 executing program 1: [ 143.700650] ? vfs_get_super+0x270/0x270 [ 143.704726] ? kasan_check_read+0x11/0x20 [ 143.708885] ? do_raw_spin_unlock+0xa7/0x2f0 [ 143.713307] ? do_raw_spin_trylock+0x1c0/0x1c0 [ 143.717900] ? kasan_check_write+0x14/0x20 [ 143.722173] ? do_raw_spin_lock+0xc1/0x200 [ 143.726436] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 143.731988] ? ns_capable_common+0x13f/0x170 [ 143.736415] ? gfs2_kill_sb+0x1a0/0x1a0 [ 143.740399] sget+0x10b/0x150 [ 143.743529] ? fallocate_chunk.isra.15.cold.19+0x7c/0x7c 21:23:52 executing program 4: [ 143.749012] gfs2_mount+0x1a7/0x712 [ 143.752650] ? fill_super+0x1a40/0x1a40 [ 143.757241] ? do_raw_spin_unlock+0xa7/0x2f0 [ 143.761662] ? do_raw_spin_trylock+0x1c0/0x1c0 [ 143.766257] ? kasan_unpoison_shadow+0x35/0x50 [ 143.770847] ? kasan_kmalloc+0xc4/0xe0 [ 143.774748] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 143.780326] ? fill_super+0x1a40/0x1a40 [ 143.784309] legacy_get_tree+0x118/0x440 [ 143.788386] vfs_get_tree+0x1cb/0x5c0 [ 143.792268] ? vfs_set_fs_source+0x12c/0x180 [ 143.796860] do_mount+0x6c1/0x1fb0 [ 143.800410] ? check_same_owner+0x340/0x340 [ 143.804745] ? lock_release+0xa30/0xa30 [ 143.808733] ? copy_mount_string+0x40/0x40 [ 143.812980] ? kasan_kmalloc+0xc4/0xe0 [ 143.816878] ? kmem_cache_alloc_trace+0x318/0x780 [ 143.821728] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 143.827362] ? _copy_from_user+0xdf/0x150 [ 143.831524] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 143.837073] ? copy_mount_options+0x285/0x380 [ 143.841577] ksys_mount+0x12d/0x140 [ 143.845217] __x64_sys_mount+0xbe/0x150 [ 143.849208] do_syscall_64+0x1b9/0x820 [ 143.853106] ? finish_task_switch+0x1d3/0x870 [ 143.857623] ? syscall_return_slowpath+0x5e0/0x5e0 [ 143.862571] ? syscall_return_slowpath+0x31d/0x5e0 [ 143.867515] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 143.872546] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 143.878116] ? prepare_exit_to_usermode+0x291/0x3b0 [ 143.883160] ? perf_trace_sys_enter+0xb10/0xb10 [ 143.887847] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 143.892909] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 143.898114] RIP: 0033:0x45885a [ 143.901302] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 dd 8f fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 ba 8f fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 143.920611] RSP: 002b:00007fe773c40a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 143.928467] RAX: ffffffffffffffda RBX: 00007fe773c40b30 RCX: 000000000045885a [ 143.935737] RDX: 00007fe773c40ad0 RSI: 0000000020001740 RDI: 00007fe773c40af0 [ 143.943115] RBP: 0000000020001740 R08: 00007fe773c40b30 R09: 00007fe773c40ad0 [ 143.950391] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000014 [ 143.957670] R13: 0000000000000000 R14: 00000000004d3eb0 R15: 0000000000000032 21:23:53 executing program 5: 21:23:53 executing program 1: 21:23:53 executing program 4: 21:23:53 executing program 2 (fault-call:0 fault-nth:51): syz_mount_image$gfs2(&(0x7f0000000040)='gfs2\x00', &(0x7f0000001740)='./file0\x00', 0x0, 0x0, &(0x7f0000001680), 0x0, &(0x7f0000000880)=ANY=[@ANYBLOB='l']) 21:23:53 executing program 3: r0 = getpid() prctl$setptracer(0x59616d61, r0) socketpair$inet_sctp(0x2, 0x0, 0x84, &(0x7f0000000280)) prctl$setptracer(0x59616d61, 0x0) prctl$setptracer(0x59616d61, 0x0) prctl$setptracer(0x59616d61, 0x0) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x109840, 0x0) ioctl$TIOCGSID(r1, 0x5429, &(0x7f0000000040)) prctl$setptracer(0x59616d61, r0) 21:23:53 executing program 7: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$hfsplus(&(0x7f0000000040)='hfsplus\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000300), 0x0, &(0x7f0000000380)) 21:23:53 executing program 6: r0 = semget$private(0x0, 0x6, 0x0) unshare(0x40000) semtimedop(r0, &(0x7f00000000c0)=[{0x0, 0xfffffffffffffff9, 0x1000}], 0x1, &(0x7f0000efe000)={0x2000}) semop(r0, &(0x7f00008d8000)=[{0x0, 0x0, 0xffffffffffffffff}], 0x1) semctl$SETALL(r0, 0x0, 0x11, &(0x7f0000000000)) perf_event_open(&(0x7f000001d000)={0x200000002, 0x70, 0x80000000006, 0x108000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) syz_open_dev$loop(&(0x7f0000000340)='/dev/loop#\x00', 0x0, 0x82) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000180)='/dev/null\x00', 0x200, 0x0) write$cgroup_int(r1, &(0x7f00000002c0), 0x4) getrusage(0x1, &(0x7f0000000200)) 21:23:53 executing program 0: syz_open_dev$sndseq(&(0x7f0000000000)='/dev/snd/seq\x00', 0x0, 0x0) userfaultfd(0x0) syz_open_dev$mice(&(0x7f0000000100)='/dev/input/mice\x00', 0x0, 0x0) pselect6(0x40, &(0x7f00000abfc0)={0x3ffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1600}, &(0x7f0000768000), &(0x7f00007fbfc0), &(0x7f0000f22000)={0x0, 0x989680}, &(0x7f0000f14000)={&(0x7f0000553ff8), 0x8}) 21:23:53 executing program 4: 21:23:53 executing program 1: [ 144.440305] FAULT_INJECTION: forcing a failure. [ 144.440305] name failslab, interval 1, probability 0, space 0, times 0 [ 144.451651] CPU: 0 PID: 12351 Comm: syz-executor2 Not tainted 4.18.0-rc3-next-20180706+ #1 [ 144.460344] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 144.469709] Call Trace: [ 144.472311] dump_stack+0x1c9/0x2b4 [ 144.475953] ? dump_stack_print_info.cold.2+0x52/0x52 [ 144.481163] ? __kernel_text_address+0xd/0x40 21:23:53 executing program 5: [ 144.485791] ? unwind_get_return_address+0x61/0xa0 [ 144.491865] should_fail.cold.4+0xa/0x11 [ 144.496469] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 144.501606] ? save_stack+0xa9/0xd0 [ 144.505248] ? save_stack+0x43/0xd0 [ 144.508893] ? kasan_kmalloc+0xc4/0xe0 [ 144.512795] ? kmem_cache_alloc_trace+0x152/0x780 [ 144.517658] ? __memcg_init_list_lru_node+0x185/0x2d0 [ 144.522886] ? __list_lru_init+0x4d6/0x840 [ 144.527133] ? alloc_super+0x976/0xb10 [ 144.531033] ? sget+0x10b/0x150 [ 144.534378] ? gfs2_mount+0x1a7/0x712 21:23:53 executing program 4: 21:23:53 executing program 1: [ 144.538199] ? legacy_get_tree+0x118/0x440 [ 144.542540] ? vfs_get_tree+0x1cb/0x5c0 [ 144.546541] ? do_mount+0x6c1/0x1fb0 [ 144.550276] ? ksys_mount+0x12d/0x140 [ 144.554094] ? __x64_sys_mount+0xbe/0x150 [ 144.558256] ? do_syscall_64+0x1b9/0x820 [ 144.562335] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 144.567723] ? save_stack+0xa9/0xd0 [ 144.571457] ? lock_acquire+0x1e4/0x540 [ 144.575534] ? fs_reclaim_acquire+0x20/0x20 [ 144.579881] ? lock_downgrade+0x8f0/0x8f0 [ 144.584068] ? ksys_mount+0x12d/0x140 21:23:53 executing program 5: [ 144.587893] ? check_same_owner+0x340/0x340 [ 144.592233] ? rcu_note_context_switch+0x730/0x730 [ 144.597201] __should_failslab+0x124/0x180 [ 144.601449] should_failslab+0x9/0x14 [ 144.605292] kmem_cache_alloc_trace+0x2cb/0x780 [ 144.609972] ? kasan_kmalloc+0xc4/0xe0 [ 144.613872] __memcg_init_list_lru_node+0x185/0x2d0 [ 144.618896] ? kvfree_rcu+0x20/0x20 [ 144.622516] ? __kmalloc_node+0x47/0x70 [ 144.626495] __list_lru_init+0x4d6/0x840 [ 144.630563] ? up_write+0x7b/0x220 [ 144.634101] ? list_lru_destroy+0x500/0x500 [ 144.638411] ? prealloc_shrinker+0x124/0x450 [ 144.642811] ? prealloc_shrinker+0x21c/0x450 [ 144.647219] ? inactive_list_is_low+0x850/0x850 [ 144.651888] ? __lockdep_init_map+0x105/0x590 [ 144.656389] alloc_super+0x976/0xb10 [ 144.660102] ? destroy_unused_super.part.11+0x110/0x110 [ 144.665467] ? lock_downgrade+0x8f0/0x8f0 [ 144.669620] ? kasan_check_read+0x11/0x20 [ 144.673761] ? do_raw_spin_trylock+0x1c0/0x1c0 [ 144.678335] ? kasan_check_write+0x14/0x20 [ 144.682560] ? do_raw_spin_lock+0xc1/0x200 [ 144.686883] sget_userns+0x276/0x860 [ 144.690586] ? gfs2_kill_sb+0x1a0/0x1a0 [ 144.694559] ? fallocate_chunk.isra.15.cold.19+0x7c/0x7c [ 144.700030] ? vfs_get_super+0x270/0x270 [ 144.704097] ? kasan_check_read+0x11/0x20 [ 144.708241] ? do_raw_spin_unlock+0xa7/0x2f0 [ 144.712654] ? do_raw_spin_trylock+0x1c0/0x1c0 [ 144.717358] ? kasan_check_write+0x14/0x20 [ 144.721580] ? do_raw_spin_lock+0xc1/0x200 [ 144.725824] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 144.731352] ? ns_capable_common+0x13f/0x170 [ 144.735752] ? gfs2_kill_sb+0x1a0/0x1a0 [ 144.739716] sget+0x10b/0x150 [ 144.742809] ? fallocate_chunk.isra.15.cold.19+0x7c/0x7c [ 144.748256] gfs2_mount+0x1a7/0x712 [ 144.751875] ? fill_super+0x1a40/0x1a40 [ 144.755848] ? check_same_owner+0x340/0x340 [ 144.760157] ? debug_mutex_init+0x2d/0x60 [ 144.764296] ? kasan_unpoison_shadow+0x35/0x50 [ 144.768867] ? kasan_kmalloc+0xc4/0xe0 [ 144.772750] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 144.778282] ? fill_super+0x1a40/0x1a40 [ 144.782272] legacy_get_tree+0x118/0x440 [ 144.786326] vfs_get_tree+0x1cb/0x5c0 [ 144.790115] ? vfs_set_fs_source+0x12c/0x180 [ 144.794518] do_mount+0x6c1/0x1fb0 [ 144.798143] ? check_same_owner+0x340/0x340 [ 144.802630] ? lock_release+0xa30/0xa30 [ 144.806602] ? copy_mount_string+0x40/0x40 [ 144.810847] ? kasan_kmalloc+0xc4/0xe0 [ 144.814738] ? kmem_cache_alloc_trace+0x318/0x780 [ 144.819581] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 144.825209] ? _copy_from_user+0xdf/0x150 [ 144.829374] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 144.834904] ? copy_mount_options+0x285/0x380 [ 144.839397] ksys_mount+0x12d/0x140 [ 144.843028] __x64_sys_mount+0xbe/0x150 [ 144.847014] do_syscall_64+0x1b9/0x820 [ 144.850913] ? syscall_return_slowpath+0x5e0/0x5e0 [ 144.855833] ? syscall_return_slowpath+0x31d/0x5e0 [ 144.860759] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 144.865763] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 144.871293] ? prepare_exit_to_usermode+0x291/0x3b0 [ 144.876295] ? perf_trace_sys_enter+0xb10/0xb10 [ 144.880953] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 144.885800] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 144.890983] RIP: 0033:0x45885a [ 144.894160] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 dd 8f fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 ba 8f fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 144.913571] RSP: 002b:00007fe773c40a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 144.921279] RAX: ffffffffffffffda RBX: 00007fe773c40b30 RCX: 000000000045885a [ 144.928540] RDX: 00007fe773c40ad0 RSI: 0000000020001740 RDI: 00007fe773c40af0 21:23:54 executing program 1: 21:23:54 executing program 4: [ 144.935799] RBP: 0000000020001740 R08: 00007fe773c40b30 R09: 00007fe773c40ad0 [ 144.943338] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000014 [ 144.950604] R13: 0000000000000000 R14: 00000000004d3eb0 R15: 0000000000000033 21:23:54 executing program 0: syz_open_dev$sndseq(&(0x7f0000000000)='/dev/snd/seq\x00', 0x0, 0x0) userfaultfd(0x0) syz_open_dev$mice(&(0x7f0000000100)='/dev/input/mice\x00', 0x0, 0x0) pselect6(0x40, &(0x7f00000abfc0)={0x3ffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10}, &(0x7f0000768000), &(0x7f00007fbfc0), &(0x7f0000f22000)={0x0, 0x989680}, &(0x7f0000f14000)={&(0x7f0000553ff8), 0x8}) 21:23:54 executing program 5: 21:23:54 executing program 1: 21:23:54 executing program 2 (fault-call:0 fault-nth:52): syz_mount_image$gfs2(&(0x7f0000000040)='gfs2\x00', &(0x7f0000001740)='./file0\x00', 0x0, 0x0, &(0x7f0000001680), 0x0, &(0x7f0000000880)=ANY=[@ANYBLOB='l']) 21:23:54 executing program 3: r0 = getpid() prctl$setptracer(0x59616d61, r0) socketpair$inet_sctp(0x2, 0x0, 0x84, &(0x7f0000000280)) prctl$setptracer(0x59616d61, 0x0) prctl$setptracer(0x59616d61, 0x0) prctl$setptracer(0x59616d61, 0x0) prctl$setptracer(0x59616d61, r0) prctl$setptracer(0x59616d61, r0) [ 145.178605] FAULT_INJECTION: forcing a failure. [ 145.178605] name failslab, interval 1, probability 0, space 0, times 0 [ 145.189932] CPU: 1 PID: 12406 Comm: syz-executor2 Not tainted 4.18.0-rc3-next-20180706+ #1 [ 145.198406] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 145.202525] hfsplus: unable to find HFS+ superblock [ 145.207767] Call Trace: [ 145.207795] dump_stack+0x1c9/0x2b4 [ 145.207815] ? dump_stack_print_info.cold.2+0x52/0x52 [ 145.207837] ? perf_trace_lock+0xde/0x920 [ 145.228445] should_fail.cold.4+0xa/0x11 [ 145.232600] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 145.237693] ? save_stack+0xa9/0xd0 [ 145.241316] ? save_stack+0x43/0xd0 [ 145.244953] ? kasan_kmalloc+0xc4/0xe0 [ 145.248848] ? kmem_cache_alloc_trace+0x152/0x780 [ 145.253678] ? __memcg_init_list_lru_node+0x185/0x2d0 [ 145.258850] ? __list_lru_init+0x4d6/0x840 [ 145.263079] ? alloc_super+0x976/0xb10 [ 145.266950] ? sget+0x10b/0x150 [ 145.270235] ? gfs2_mount+0x1a7/0x712 [ 145.274030] ? vfs_get_tree+0x1cb/0x5c0 [ 145.278026] ? do_mount+0x6c1/0x1fb0 [ 145.281728] ? ksys_mount+0x12d/0x140 [ 145.285520] ? __x64_sys_mount+0xbe/0x150 [ 145.289664] ? do_syscall_64+0x1b9/0x820 [ 145.293710] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 145.299068] ? lock_acquire+0x1e4/0x540 [ 145.303042] ? fs_reclaim_acquire+0x20/0x20 [ 145.307364] ? lock_downgrade+0x8f0/0x8f0 [ 145.311518] ? ksys_mount+0x12d/0x140 [ 145.315310] ? check_same_owner+0x340/0x340 [ 145.319624] ? rcu_note_context_switch+0x730/0x730 [ 145.324539] __should_failslab+0x124/0x180 [ 145.328759] should_failslab+0x9/0x14 [ 145.332545] kmem_cache_alloc_trace+0x2cb/0x780 [ 145.337201] ? kasan_kmalloc+0xc4/0xe0 [ 145.341078] __memcg_init_list_lru_node+0x185/0x2d0 [ 145.346082] ? kvfree_rcu+0x20/0x20 [ 145.349696] ? __kmalloc_node+0x47/0x70 [ 145.353662] __list_lru_init+0x4d6/0x840 [ 145.357707] ? up_write+0x7b/0x220 [ 145.361240] ? list_lru_destroy+0x500/0x500 [ 145.365570] ? prealloc_shrinker+0x124/0x450 [ 145.369976] ? prealloc_shrinker+0x21c/0x450 [ 145.374376] ? inactive_list_is_low+0x850/0x850 [ 145.379129] ? __lockdep_init_map+0x105/0x590 [ 145.383701] alloc_super+0x976/0xb10 [ 145.387413] ? destroy_unused_super.part.11+0x110/0x110 [ 145.392761] ? lock_downgrade+0x8f0/0x8f0 [ 145.396908] ? kasan_check_read+0x11/0x20 [ 145.401054] ? do_raw_spin_trylock+0x1c0/0x1c0 [ 145.405642] ? kasan_check_write+0x14/0x20 [ 145.409874] ? do_raw_spin_lock+0xc1/0x200 [ 145.414110] sget_userns+0x276/0x860 [ 145.417816] ? gfs2_kill_sb+0x1a0/0x1a0 [ 145.421781] ? fallocate_chunk.isra.15.cold.19+0x7c/0x7c [ 145.427226] ? vfs_get_super+0x270/0x270 [ 145.431277] ? kasan_check_read+0x11/0x20 [ 145.435415] ? do_raw_spin_unlock+0xa7/0x2f0 [ 145.439814] ? do_raw_spin_trylock+0x1c0/0x1c0 [ 145.444394] ? kasan_check_write+0x14/0x20 [ 145.448617] ? do_raw_spin_lock+0xc1/0x200 [ 145.452855] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 145.458397] ? ns_capable_common+0x13f/0x170 [ 145.462801] ? gfs2_kill_sb+0x1a0/0x1a0 [ 145.466762] sget+0x10b/0x150 [ 145.469890] ? fallocate_chunk.isra.15.cold.19+0x7c/0x7c [ 145.475349] gfs2_mount+0x1a7/0x712 [ 145.478993] ? fill_super+0x1a40/0x1a40 [ 145.482966] ? kasan_check_write+0x14/0x20 [ 145.487201] ? do_raw_spin_lock+0xc1/0x200 [ 145.491425] ? kasan_unpoison_shadow+0x35/0x50 [ 145.495993] ? kasan_kmalloc+0xc4/0xe0 [ 145.499884] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 145.505422] ? fill_super+0x1a40/0x1a40 [ 145.509387] legacy_get_tree+0x118/0x440 [ 145.513459] vfs_get_tree+0x1cb/0x5c0 [ 145.517503] ? vfs_set_fs_source+0x12c/0x180 [ 145.521897] do_mount+0x6c1/0x1fb0 [ 145.525434] ? kasan_check_write+0x14/0x20 [ 145.529658] ? copy_mount_string+0x40/0x40 [ 145.533878] ? kasan_kmalloc+0xc4/0xe0 [ 145.537761] ? kmem_cache_alloc_trace+0x318/0x780 [ 145.542603] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 145.548126] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 145.553671] ? copy_mount_options+0x285/0x380 [ 145.558152] ksys_mount+0x12d/0x140 [ 145.561773] __x64_sys_mount+0xbe/0x150 [ 145.565758] do_syscall_64+0x1b9/0x820 [ 145.569638] ? finish_task_switch+0x1d3/0x870 [ 145.574129] ? syscall_return_slowpath+0x5e0/0x5e0 [ 145.579133] ? syscall_return_slowpath+0x31d/0x5e0 [ 145.584064] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 145.589081] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 145.594605] ? prepare_exit_to_usermode+0x291/0x3b0 [ 145.599621] ? perf_trace_sys_enter+0xb10/0xb10 [ 145.604279] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 145.609116] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 145.614299] RIP: 0033:0x45885a [ 145.617466] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 dd 8f fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 ba 8f fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 145.636615] RSP: 002b:00007fe773c40a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 145.644317] RAX: ffffffffffffffda RBX: 00007fe773c40b30 RCX: 000000000045885a [ 145.651584] RDX: 00007fe773c40ad0 RSI: 0000000020001740 RDI: 00007fe773c40af0 [ 145.658859] RBP: 0000000020001740 R08: 00007fe773c40b30 R09: 00007fe773c40ad0 [ 145.666119] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000014 [ 145.673399] R13: 0000000000000000 R14: 00000000004d3eb0 R15: 0000000000000034 [ 145.706415] hfsplus: unable to find HFS+ superblock 21:23:54 executing program 6: r0 = semget$private(0x0, 0x6, 0x0) unshare(0x40000) semtimedop(r0, &(0x7f00000000c0)=[{0x0, 0xfffffffffffffff9, 0x1000}], 0x1, &(0x7f0000efe000)={0x2000}) semop(r0, &(0x7f00008d8000)=[{0x0, 0x0, 0xffffffffffffffff}], 0x1) semctl$SETALL(r0, 0x0, 0x11, &(0x7f0000000000)) perf_event_open(&(0x7f000001d000)={0x200000002, 0x70, 0x80000000006, 0x108000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) syz_open_dev$loop(&(0x7f0000000340)='/dev/loop#\x00', 0x0, 0x82) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000180)='/dev/null\x00', 0x200, 0x0) write$cgroup_int(r1, &(0x7f00000002c0), 0x4) 21:23:54 executing program 4: 21:23:54 executing program 5: 21:23:54 executing program 0: syz_open_dev$sndseq(&(0x7f0000000000)='/dev/snd/seq\x00', 0x0, 0x0) userfaultfd(0x0) syz_open_dev$mice(&(0x7f0000000100)='/dev/input/mice\x00', 0x0, 0x0) pselect6(0x40, &(0x7f00000abfc0)={0x3ffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000000000}, &(0x7f0000768000), &(0x7f00007fbfc0), &(0x7f0000f22000)={0x0, 0x989680}, &(0x7f0000f14000)={&(0x7f0000553ff8), 0x8}) 21:23:54 executing program 1: 21:23:54 executing program 2 (fault-call:0 fault-nth:53): syz_mount_image$gfs2(&(0x7f0000000040)='gfs2\x00', &(0x7f0000001740)='./file0\x00', 0x0, 0x0, &(0x7f0000001680), 0x0, &(0x7f0000000880)=ANY=[@ANYBLOB='l']) 21:23:54 executing program 3: r0 = getpid() prctl$setptracer(0x59616d61, r0) socketpair$inet_sctp(0x2, 0x0, 0x84, &(0x7f0000000280)) prctl$setptracer(0x59616d61, 0x0) prctl$setptracer(0x59616d61, r0) prctl$setptracer(0x59616d61, 0x0) prctl$setptracer(0x59616d61, r0) 21:23:54 executing program 7: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$hfsplus(&(0x7f0000000040)='hfsplus\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000300), 0x0, &(0x7f0000000380)) 21:23:54 executing program 1: 21:23:54 executing program 4: [ 145.844303] hfsplus: unable to find HFS+ superblock 21:23:54 executing program 5: 21:23:54 executing program 0: syz_open_dev$sndseq(&(0x7f0000000000)='/dev/snd/seq\x00', 0x0, 0x0) userfaultfd(0x0) syz_open_dev$mice(&(0x7f0000000100)='/dev/input/mice\x00', 0x0, 0x0) pselect6(0x40, &(0x7f00000abfc0)={0x3ffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x60000000}, &(0x7f0000768000), &(0x7f00007fbfc0), &(0x7f0000f22000)={0x0, 0x989680}, &(0x7f0000f14000)={&(0x7f0000553ff8), 0x8}) [ 145.961309] FAULT_INJECTION: forcing a failure. [ 145.961309] name failslab, interval 1, probability 0, space 0, times 0 [ 145.972870] CPU: 1 PID: 12438 Comm: syz-executor2 Not tainted 4.18.0-rc3-next-20180706+ #1 [ 145.981278] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 145.990632] Call Trace: [ 145.993238] dump_stack+0x1c9/0x2b4 [ 145.996982] ? dump_stack_print_info.cold.2+0x52/0x52 [ 146.002188] ? __kernel_text_address+0xd/0x40 [ 146.006697] ? unwind_get_return_address+0x61/0xa0 [ 146.011645] should_fail.cold.4+0xa/0x11 [ 146.015711] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 146.020846] ? save_stack+0xa9/0xd0 [ 146.024466] ? save_stack+0x43/0xd0 [ 146.028084] ? kasan_kmalloc+0xc4/0xe0 [ 146.031967] ? kmem_cache_alloc_trace+0x152/0x780 [ 146.036828] ? __memcg_init_list_lru_node+0x185/0x2d0 [ 146.042006] ? __list_lru_init+0x4d6/0x840 [ 146.046231] ? alloc_super+0x976/0xb10 [ 146.050112] ? sget+0x10b/0x150 [ 146.053381] ? gfs2_mount+0x1a7/0x712 [ 146.057167] ? legacy_get_tree+0x118/0x440 [ 146.061399] ? vfs_get_tree+0x1cb/0x5c0 [ 146.065364] ? do_mount+0x6c1/0x1fb0 [ 146.069072] ? ksys_mount+0x12d/0x140 [ 146.072860] ? __x64_sys_mount+0xbe/0x150 [ 146.077004] ? do_syscall_64+0x1b9/0x820 [ 146.081055] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 146.086414] ? save_stack+0xa9/0xd0 [ 146.090047] ? lock_acquire+0x1e4/0x540 [ 146.094022] ? fs_reclaim_acquire+0x20/0x20 [ 146.098336] ? lock_downgrade+0x8f0/0x8f0 [ 146.102483] ? ksys_mount+0x12d/0x140 [ 146.106280] ? check_same_owner+0x340/0x340 [ 146.110600] ? rcu_note_context_switch+0x730/0x730 [ 146.115533] __should_failslab+0x124/0x180 [ 146.119763] should_failslab+0x9/0x14 [ 146.123562] kmem_cache_alloc_trace+0x2cb/0x780 [ 146.128226] ? kasan_kmalloc+0xc4/0xe0 [ 146.132116] __memcg_init_list_lru_node+0x185/0x2d0 [ 146.137121] ? kvfree_rcu+0x20/0x20 [ 146.140738] ? __kmalloc_node+0x47/0x70 [ 146.144704] __list_lru_init+0x4d6/0x840 [ 146.148756] ? up_write+0x7b/0x220 [ 146.152287] ? list_lru_destroy+0x500/0x500 [ 146.156617] ? prealloc_shrinker+0x124/0x450 [ 146.161027] ? prealloc_shrinker+0x21c/0x450 [ 146.165426] ? inactive_list_is_low+0x850/0x850 [ 146.170088] ? __lockdep_init_map+0x105/0x590 [ 146.174579] alloc_super+0x976/0xb10 [ 146.178290] ? destroy_unused_super.part.11+0x110/0x110 [ 146.183643] ? lock_downgrade+0x8f0/0x8f0 [ 146.187798] ? kasan_check_read+0x11/0x20 [ 146.191939] ? do_raw_spin_trylock+0x1c0/0x1c0 [ 146.196515] ? kasan_check_write+0x14/0x20 [ 146.200740] ? do_raw_spin_lock+0xc1/0x200 [ 146.204987] sget_userns+0x276/0x860 [ 146.208706] ? gfs2_kill_sb+0x1a0/0x1a0 [ 146.212674] ? fallocate_chunk.isra.15.cold.19+0x7c/0x7c [ 146.218119] ? vfs_get_super+0x270/0x270 [ 146.222172] ? kasan_check_read+0x11/0x20 [ 146.226308] ? do_raw_spin_unlock+0xa7/0x2f0 [ 146.230705] ? do_raw_spin_trylock+0x1c0/0x1c0 [ 146.235283] ? kasan_check_write+0x14/0x20 [ 146.239518] ? do_raw_spin_lock+0xc1/0x200 [ 146.243770] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 146.249307] ? ns_capable_common+0x13f/0x170 [ 146.253794] ? gfs2_kill_sb+0x1a0/0x1a0 [ 146.257759] sget+0x10b/0x150 [ 146.260857] ? fallocate_chunk.isra.15.cold.19+0x7c/0x7c [ 146.266300] gfs2_mount+0x1a7/0x712 [ 146.269919] ? fill_super+0x1a40/0x1a40 [ 146.273892] ? do_raw_spin_unlock+0xa7/0x2f0 [ 146.278302] ? do_raw_spin_trylock+0x1c0/0x1c0 [ 146.282875] ? kasan_unpoison_shadow+0x35/0x50 [ 146.287458] ? kasan_kmalloc+0xc4/0xe0 [ 146.291337] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 146.297305] ? fill_super+0x1a40/0x1a40 [ 146.301267] legacy_get_tree+0x118/0x440 [ 146.305321] vfs_get_tree+0x1cb/0x5c0 [ 146.309111] ? vfs_set_fs_source+0x12c/0x180 [ 146.313522] do_mount+0x6c1/0x1fb0 [ 146.317050] ? check_same_owner+0x340/0x340 [ 146.321360] ? lock_release+0xa30/0xa30 [ 146.325333] ? copy_mount_string+0x40/0x40 [ 146.329752] ? retint_kernel+0x10/0x10 [ 146.333632] ? copy_mount_options+0x1f0/0x380 [ 146.338118] ? copy_mount_options+0x1f6/0x380 [ 146.342602] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 146.348138] ? copy_mount_options+0x285/0x380 [ 146.352635] ksys_mount+0x12d/0x140 [ 146.356262] __x64_sys_mount+0xbe/0x150 [ 146.360228] do_syscall_64+0x1b9/0x820 [ 146.364100] ? finish_task_switch+0x1d3/0x870 [ 146.368583] ? syscall_return_slowpath+0x5e0/0x5e0 [ 146.373502] ? syscall_return_slowpath+0x31d/0x5e0 [ 146.378423] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 146.383429] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 146.388965] ? prepare_exit_to_usermode+0x291/0x3b0 [ 146.393972] ? perf_trace_sys_enter+0xb10/0xb10 [ 146.398634] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 146.403479] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 146.408654] RIP: 0033:0x45885a [ 146.411824] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 dd 8f fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 ba 8f fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 146.431200] RSP: 002b:00007fe773c40a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 146.438900] RAX: ffffffffffffffda RBX: 00007fe773c40b30 RCX: 000000000045885a [ 146.446156] RDX: 00007fe773c40ad0 RSI: 0000000020001740 RDI: 00007fe773c40af0 [ 146.453411] RBP: 0000000020001740 R08: 00007fe773c40b30 R09: 00007fe773c40ad0 21:23:55 executing program 7: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$hfsplus(&(0x7f0000000040)='hfsplus\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000300), 0x0, &(0x7f0000000380)) 21:23:55 executing program 3: r0 = getpid() prctl$setptracer(0x59616d61, r0) socketpair$inet_sctp(0x2, 0x0, 0x84, &(0x7f0000000280)) prctl$setptracer(0x59616d61, 0x0) prctl$setptracer(0x59616d61, 0x0) prctl$setptracer(0x59616d61, 0x0) sched_setattr(r0, &(0x7f0000000000)={0x30, 0x2, 0x1, 0xdf, 0x4, 0xffffffffffffff01, 0x1000, 0x2}, 0x168c01b3d691082f) prctl$setptracer(0x59616d61, r0) 21:23:55 executing program 5: 21:23:55 executing program 1: [ 146.460666] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000014 [ 146.467919] R13: 0000000000000000 R14: 00000000004d3eb0 R15: 0000000000000035 [ 146.490481] hfsplus: unable to find HFS+ superblock 21:23:55 executing program 6: r0 = semget$private(0x0, 0x6, 0x0) unshare(0x40000) semtimedop(r0, &(0x7f00000000c0)=[{0x0, 0xfffffffffffffff9, 0x1000}], 0x1, &(0x7f0000efe000)={0x2000}) semop(r0, &(0x7f00008d8000)=[{0x0, 0x0, 0xffffffffffffffff}], 0x1) semctl$SETALL(r0, 0x0, 0x11, &(0x7f0000000000)) perf_event_open(&(0x7f000001d000)={0x200000002, 0x70, 0x80000000006, 0x108000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) syz_open_dev$loop(&(0x7f0000000340)='/dev/loop#\x00', 0x0, 0x82) openat$null(0xffffffffffffff9c, &(0x7f0000000180)='/dev/null\x00', 0x200, 0x0) 21:23:55 executing program 4: clone(0x600f9eb7f8be1d47, &(0x7f0000000600), &(0x7f00000002c0), &(0x7f0000000300), &(0x7f0000000700)) 21:23:55 executing program 1: r0 = open$dir(&(0x7f0000000100)='./file0\x00', 0x60840, 0x0) r1 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='9p\x00', 0x0, &(0x7f00000001c0)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c}) 21:23:55 executing program 7: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$hfsplus(&(0x7f0000000040)='hfsplus\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000300), 0x0, &(0x7f0000000380)) 21:23:55 executing program 0: syz_open_dev$sndseq(&(0x7f0000000000)='/dev/snd/seq\x00', 0x0, 0x0) userfaultfd(0x0) syz_open_dev$mice(&(0x7f0000000100)='/dev/input/mice\x00', 0x0, 0x0) pselect6(0x40, &(0x7f00000abfc0)={0x3ffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, &(0x7f0000768000), &(0x7f00007fbfc0), &(0x7f0000f22000)={0x0, 0x989680}, &(0x7f0000f14000)={&(0x7f0000553ff8), 0x8}) 21:23:55 executing program 2 (fault-call:0 fault-nth:54): syz_mount_image$gfs2(&(0x7f0000000040)='gfs2\x00', &(0x7f0000001740)='./file0\x00', 0x0, 0x0, &(0x7f0000001680), 0x0, &(0x7f0000000880)=ANY=[@ANYBLOB='l']) 21:23:55 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000180)={0xe, 0x18, 0xfa00, @id_afonly={&(0x7f0000000140), 0xffffffff, 0x0, 0x2, 0x4}}, 0x20) 21:23:55 executing program 3: r0 = getpid() prctl$setptracer(0x59616d61, r0) r1 = syz_open_dev$sndpcmp(&(0x7f0000000040)='/dev/snd/pcmC#D#p\x00', 0x81, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffff9c, 0x8933, &(0x7f00000017c0)={'vcan0\x00', 0x0}) bind$can_raw(r1, &(0x7f0000001800)={0x1d, r2}, 0x10) ioctl$sock_bt_hidp_HIDPGETCONNLIST(r1, 0x800448d2, &(0x7f0000001980)={0x1bacf914c1bae4a, &(0x7f0000001840)=[{}]}) socketpair$inet_sctp(0x2, 0x0, 0x84, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) prctl$setptracer(0x59616d61, r0) prctl$setptracer(0x59616d61, 0x0) ioctl$sock_FIOGETOWN(r3, 0x8903, &(0x7f00000002c0)=0x0) prctl$setptracer(0x59616d61, r5) r6 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000600)='/dev/sequencer2\x00', 0x200040, 0x0) ioctl$SNDRV_TIMER_IOCTL_NEXT_DEVICE(r6, 0xc0145401, &(0x7f0000001740)={0x0, 0x3, 0x0, 0x0, 0xffffffff}) process_vm_readv(r5, &(0x7f0000000240)=[{&(0x7f0000000300)=""/77, 0x4d}, {&(0x7f0000000380)=""/218, 0xda}, {&(0x7f0000000480)=""/108, 0x6c}, {&(0x7f0000000500)=""/229, 0xe5}], 0x4, &(0x7f0000001700)=[{&(0x7f0000000600)}, {&(0x7f0000000640)=""/4096, 0x1000}, {&(0x7f0000001640)=""/130, 0x82}], 0x3, 0x0) r7 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='hugetlb.2MB.usage_in_bytes\x00', 0x0, 0x0) kcmp$KCMP_EPOLL_TFD(r5, r0, 0x7, r3, &(0x7f0000001780)={r7, r4, 0x9}) getsockopt$inet_sctp_SCTP_STATUS(r3, 0x84, 0xe, &(0x7f0000000080)={0x0, 0x82a, 0x3ff, 0x2, 0xffffffffffff8000, 0x5, 0x2, 0x1, {0x0, @in6={{0xa, 0x4e20, 0x9, @mcast1={0xff, 0x1, [], 0x1}, 0x80000001}}, 0x8001, 0x7f, 0x0, 0x1000, 0x7}}, &(0x7f0000000140)=0xb0) setsockopt$inet_sctp6_SCTP_SET_PEER_PRIMARY_ADDR(r7, 0x84, 0x5, &(0x7f0000000180)={r8, @in6={{0xa, 0x4e22, 0x3fffffff8000, @dev={0xfe, 0x80, [], 0xe}, 0x3ff}}}, 0xfffffe89) prctl$setptracer(0x59616d61, 0x0) prctl$setptracer(0x59616d61, r0) 21:23:55 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_INIT_QP_ATTR(r0, &(0x7f00000001c0)={0xb, 0x10, 0xfa00, {&(0x7f0000000040), 0xffffffff, 0x9}}, 0x18) [ 146.855680] FAULT_INJECTION: forcing a failure. [ 146.855680] name failslab, interval 1, probability 0, space 0, times 0 [ 146.867064] CPU: 0 PID: 12500 Comm: syz-executor2 Not tainted 4.18.0-rc3-next-20180706+ #1 [ 146.875478] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 146.884664] hfsplus: unable to find HFS+ superblock [ 146.884833] Call Trace: [ 146.884861] dump_stack+0x1c9/0x2b4 [ 146.896138] ? dump_stack_print_info.cold.2+0x52/0x52 [ 146.901367] ? perf_trace_lock+0xde/0x920 21:23:55 executing program 5: msgctl$IPC_STAT(0x0, 0x2, &(0x7f00000000c0)=""/57) 21:23:55 executing program 1: r0 = open$dir(&(0x7f0000000100)='./file0\x00', 0x60840, 0x0) r1 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='9p\x00', 0x0, &(0x7f00000001c0)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c}) [ 146.905570] should_fail.cold.4+0xa/0x11 [ 146.909651] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 146.914782] ? save_stack+0xa9/0xd0 [ 146.918446] ? save_stack+0x43/0xd0 [ 146.922089] ? kasan_kmalloc+0xc4/0xe0 [ 146.925991] ? kmem_cache_alloc_trace+0x152/0x780 [ 146.930934] ? __memcg_init_list_lru_node+0x185/0x2d0 [ 146.936141] ? __list_lru_init+0x4d6/0x840 [ 146.940394] ? alloc_super+0x976/0xb10 [ 146.944397] ? sget+0x10b/0x150 [ 146.947695] ? gfs2_mount+0x1a7/0x712 [ 146.951513] ? vfs_get_tree+0x1cb/0x5c0 [ 146.955504] ? do_mount+0x6c1/0x1fb0 [ 146.959235] ? ksys_mount+0x12d/0x140 [ 146.963049] ? __x64_sys_mount+0xbe/0x150 [ 146.967308] ? do_syscall_64+0x1b9/0x820 [ 146.971390] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 146.976785] ? lock_acquire+0x1e4/0x540 [ 146.981141] ? fs_reclaim_acquire+0x20/0x20 [ 146.985651] ? lock_downgrade+0x8f0/0x8f0 [ 146.989820] ? ksys_mount+0x12d/0x140 [ 146.993649] ? check_same_owner+0x340/0x340 [ 146.998006] ? rcu_note_context_switch+0x730/0x730 21:23:56 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/ip_vs_stats_percpu\x00') close(r0) 21:23:56 executing program 1: r0 = open$dir(&(0x7f0000000100)='./file0\x00', 0x60840, 0x0) r1 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='9p\x00', 0x0, &(0x7f00000001c0)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c}) [ 147.002963] __should_failslab+0x124/0x180 [ 147.007225] should_failslab+0x9/0x14 [ 147.011035] kmem_cache_alloc_trace+0x2cb/0x780 [ 147.015714] ? kasan_kmalloc+0xc4/0xe0 [ 147.020354] __memcg_init_list_lru_node+0x185/0x2d0 [ 147.025384] ? kvfree_rcu+0x20/0x20 [ 147.029026] ? __kmalloc_node+0x47/0x70 [ 147.033019] __list_lru_init+0x4d6/0x840 [ 147.037092] ? up_write+0x7b/0x220 [ 147.040645] ? list_lru_destroy+0x500/0x500 [ 147.044977] ? prealloc_shrinker+0x124/0x450 [ 147.049400] ? prealloc_shrinker+0x21c/0x450 21:23:56 executing program 5: open$dir(&(0x7f0000000000)='./file0\x00', 0x7ff, 0x0) [ 147.053818] ? inactive_list_is_low+0x850/0x850 [ 147.058504] ? __lockdep_init_map+0x105/0x590 [ 147.063108] alloc_super+0x976/0xb10 [ 147.066846] ? destroy_unused_super.part.11+0x110/0x110 [ 147.072250] ? lock_downgrade+0x8f0/0x8f0 [ 147.076413] ? kasan_check_read+0x11/0x20 [ 147.080573] ? do_raw_spin_trylock+0x1c0/0x1c0 [ 147.085171] ? kasan_check_write+0x14/0x20 [ 147.089420] ? do_raw_spin_lock+0xc1/0x200 [ 147.093672] sget_userns+0x276/0x860 [ 147.097400] ? gfs2_kill_sb+0x1a0/0x1a0 [ 147.101392] ? fallocate_chunk.isra.15.cold.19+0x7c/0x7c 21:23:56 executing program 1: r0 = open$dir(&(0x7f0000000100)='./file0\x00', 0x60840, 0x0) r1 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='9p\x00', 0x0, &(0x7f00000001c0)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c}) [ 147.106859] ? vfs_get_super+0x270/0x270 [ 147.110940] ? kasan_check_read+0x11/0x20 [ 147.115102] ? do_raw_spin_unlock+0xa7/0x2f0 [ 147.119546] ? do_raw_spin_trylock+0x1c0/0x1c0 [ 147.124159] ? kasan_check_write+0x14/0x20 [ 147.128406] ? do_raw_spin_lock+0xc1/0x200 [ 147.132698] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 147.138272] ? ns_capable_common+0x13f/0x170 [ 147.142707] ? gfs2_kill_sb+0x1a0/0x1a0 [ 147.146694] sget+0x10b/0x150 [ 147.149815] ? fallocate_chunk.isra.15.cold.19+0x7c/0x7c 21:23:56 executing program 5: recvmsg(0xffffffffffffffff, &(0x7f0000000040)={&(0x7f0000000080)=@pppol2tpin6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @mcast1}}}, 0x80, &(0x7f00000034c0), 0x0, &(0x7f0000000940)=""/42, 0x2a}, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_sctp6_SCTP_ADAPTATION_LAYER(0xffffffffffffffff, 0x84, 0x7, &(0x7f0000000040)={0x7}, 0x4) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000380)={'bridge0\x00', &(0x7f0000000040)=ANY=[]}) [ 147.155287] gfs2_mount+0x1a7/0x712 [ 147.158932] ? fill_super+0x1a40/0x1a40 [ 147.162924] ? check_same_owner+0x340/0x340 [ 147.167259] ? debug_mutex_init+0x2d/0x60 [ 147.171424] ? kasan_unpoison_shadow+0x35/0x50 [ 147.176016] ? kasan_kmalloc+0xc4/0xe0 [ 147.179916] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 147.185471] ? fill_super+0x1a40/0x1a40 [ 147.189458] legacy_get_tree+0x118/0x440 [ 147.193532] vfs_get_tree+0x1cb/0x5c0 [ 147.197375] ? vfs_set_fs_source+0x12c/0x180 [ 147.201886] do_mount+0x6c1/0x1fb0 [ 147.205433] ? check_same_owner+0x340/0x340 [ 147.209768] ? copy_mount_string+0x40/0x40 [ 147.214009] ? retint_kernel+0x10/0x10 [ 147.217911] ? copy_mount_options+0x1e3/0x380 [ 147.222419] ? write_comp_data+0x6c/0x70 [ 147.226508] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 147.232055] ? copy_mount_options+0x285/0x380 [ 147.236577] ksys_mount+0x12d/0x140 [ 147.240223] __x64_sys_mount+0xbe/0x150 [ 147.244220] do_syscall_64+0x1b9/0x820 [ 147.248117] ? finish_task_switch+0x1d3/0x870 [ 147.252622] ? syscall_return_slowpath+0x5e0/0x5e0 [ 147.257588] ? syscall_return_slowpath+0x31d/0x5e0 [ 147.262533] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 147.267653] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 147.273239] ? prepare_exit_to_usermode+0x291/0x3b0 [ 147.278264] ? perf_trace_sys_enter+0xb10/0xb10 [ 147.282940] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 147.287823] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 147.293011] RIP: 0033:0x45885a [ 147.296192] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 dd 8f fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 ba 8f fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 147.315361] RSP: 002b:00007fe773c40a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 147.323089] RAX: ffffffffffffffda RBX: 00007fe773c40b30 RCX: 000000000045885a [ 147.330363] RDX: 00007fe773c40ad0 RSI: 0000000020001740 RDI: 00007fe773c40af0 [ 147.337622] RBP: 0000000020001740 R08: 00007fe773c40b30 R09: 00007fe773c40ad0 [ 147.344893] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000014 [ 147.352432] R13: 0000000000000000 R14: 00000000004d3eb0 R15: 0000000000000036 [ 147.383308] hfsplus: unable to find HFS+ superblock 21:23:56 executing program 6: r0 = semget$private(0x0, 0x6, 0x0) unshare(0x40000) semtimedop(r0, &(0x7f00000000c0)=[{0x0, 0xfffffffffffffff9, 0x1000}], 0x1, &(0x7f0000efe000)={0x2000}) semop(r0, &(0x7f00008d8000)=[{0x0, 0x0, 0xffffffffffffffff}], 0x1) semctl$SETALL(r0, 0x0, 0x11, &(0x7f0000000000)) perf_event_open(&(0x7f000001d000)={0x200000002, 0x70, 0x80000000006, 0x108000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) syz_open_dev$loop(&(0x7f0000000340)='/dev/loop#\x00', 0x0, 0x82) 21:23:56 executing program 1: r0 = open$dir(&(0x7f0000000100)='./file0\x00', 0x60840, 0x0) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='9p\x00', 0x0, &(0x7f00000001c0)={'trans=fd,', {'rfdno', 0x3d}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c}) 21:23:56 executing program 5: 21:23:56 executing program 4: 21:23:56 executing program 3: r0 = getpid() prctl$setptracer(0x59616d61, r0) openat$rfkill(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rfkill\x00', 0x2, 0x0) socketpair$inet_sctp(0x2, 0x0, 0x84, &(0x7f0000000280)) prctl$setptracer(0x59616d61, 0x0) prctl$setptracer(0x59616d61, 0x0) prctl$setptracer(0x59616d61, 0x0) prctl$setptracer(0x59616d61, r0) 21:23:56 executing program 0: syz_open_dev$sndseq(&(0x7f0000000000)='/dev/snd/seq\x00', 0x0, 0x0) userfaultfd(0x0) syz_open_dev$mice(&(0x7f0000000100)='/dev/input/mice\x00', 0x0, 0x0) pselect6(0x40, &(0x7f00000abfc0)={0x3ffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6400000000000000}, &(0x7f0000768000), &(0x7f00007fbfc0), &(0x7f0000f22000)={0x0, 0x989680}, &(0x7f0000f14000)={&(0x7f0000553ff8), 0x8}) 21:23:56 executing program 2 (fault-call:0 fault-nth:55): syz_mount_image$gfs2(&(0x7f0000000040)='gfs2\x00', &(0x7f0000001740)='./file0\x00', 0x0, 0x0, &(0x7f0000001680), 0x0, &(0x7f0000000880)=ANY=[@ANYBLOB='l']) 21:23:56 executing program 7: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$hfsplus(&(0x7f0000000040)='hfsplus\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000300), 0x0, &(0x7f0000000380)) [ 147.835833] FAULT_INJECTION: forcing a failure. [ 147.835833] name failslab, interval 1, probability 0, space 0, times 0 [ 147.847330] CPU: 0 PID: 12563 Comm: syz-executor2 Not tainted 4.18.0-rc3-next-20180706+ #1 [ 147.855746] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 147.865208] Call Trace: [ 147.867809] dump_stack+0x1c9/0x2b4 [ 147.872052] ? dump_stack_print_info.cold.2+0x52/0x52 [ 147.877253] ? __kernel_text_address+0xd/0x40 [ 147.881860] ? unwind_get_return_address+0x61/0xa0 [ 147.886829] should_fail.cold.4+0xa/0x11 [ 147.890889] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 147.895991] ? save_stack+0xa9/0xd0 [ 147.899626] ? save_stack+0x43/0xd0 [ 147.903252] ? kasan_kmalloc+0xc4/0xe0 [ 147.907130] ? kmem_cache_alloc_trace+0x152/0x780 [ 147.911977] ? __memcg_init_list_lru_node+0x185/0x2d0 [ 147.917158] ? __list_lru_init+0x4d6/0x840 [ 147.921386] ? alloc_super+0x976/0xb10 [ 147.925266] ? sget+0x10b/0x150 [ 147.928541] ? gfs2_mount+0x1a7/0x712 [ 147.932336] ? legacy_get_tree+0x118/0x440 [ 147.936565] ? vfs_get_tree+0x1cb/0x5c0 [ 147.940533] ? do_mount+0x6c1/0x1fb0 [ 147.944265] ? ksys_mount+0x12d/0x140 [ 147.948074] ? __x64_sys_mount+0xbe/0x150 [ 147.952216] ? do_syscall_64+0x1b9/0x820 [ 147.956274] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 147.961634] ? save_stack+0xa9/0xd0 [ 147.965258] ? lock_acquire+0x1e4/0x540 [ 147.969231] ? fs_reclaim_acquire+0x20/0x20 [ 147.973561] ? lock_downgrade+0x8f0/0x8f0 [ 147.977710] ? ksys_mount+0x12d/0x140 [ 147.981522] ? check_same_owner+0x340/0x340 [ 147.985851] ? rcu_note_context_switch+0x730/0x730 [ 147.990796] __should_failslab+0x124/0x180 [ 147.995030] should_failslab+0x9/0x14 [ 147.998826] kmem_cache_alloc_trace+0x2cb/0x780 [ 148.003489] ? kasan_kmalloc+0xc4/0xe0 [ 148.007377] __memcg_init_list_lru_node+0x185/0x2d0 [ 148.012482] ? kvfree_rcu+0x20/0x20 [ 148.016118] ? __kmalloc_node+0x47/0x70 [ 148.020099] __list_lru_init+0x4d6/0x840 [ 148.024166] ? up_write+0x7b/0x220 [ 148.027699] ? list_lru_destroy+0x500/0x500 [ 148.032017] ? prealloc_shrinker+0x124/0x450 [ 148.036420] ? prealloc_shrinker+0x21c/0x450 [ 148.040844] ? inactive_list_is_low+0x850/0x850 [ 148.045526] ? __lockdep_init_map+0x105/0x590 [ 148.050021] alloc_super+0x976/0xb10 [ 148.053737] ? destroy_unused_super.part.11+0x110/0x110 [ 148.059108] ? lock_downgrade+0x8f0/0x8f0 [ 148.063252] ? kasan_check_read+0x11/0x20 [ 148.067395] ? do_raw_spin_trylock+0x1c0/0x1c0 [ 148.071970] ? kasan_check_write+0x14/0x20 [ 148.076196] ? do_raw_spin_lock+0xc1/0x200 [ 148.080433] sget_userns+0x276/0x860 [ 148.084142] ? gfs2_kill_sb+0x1a0/0x1a0 [ 148.088204] ? fallocate_chunk.isra.15.cold.19+0x7c/0x7c [ 148.093672] ? vfs_get_super+0x270/0x270 [ 148.097731] ? kasan_check_read+0x11/0x20 [ 148.101880] ? do_raw_spin_unlock+0xa7/0x2f0 [ 148.106298] ? do_raw_spin_trylock+0x1c0/0x1c0 [ 148.110884] ? kasan_check_write+0x14/0x20 [ 148.115112] ? do_raw_spin_lock+0xc1/0x200 [ 148.119374] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 148.124909] ? ns_capable_common+0x13f/0x170 [ 148.129315] ? gfs2_kill_sb+0x1a0/0x1a0 [ 148.133286] sget+0x10b/0x150 [ 148.136405] ? fallocate_chunk.isra.15.cold.19+0x7c/0x7c [ 148.141850] gfs2_mount+0x1a7/0x712 [ 148.145492] ? fill_super+0x1a40/0x1a40 [ 148.149469] ? kasan_check_write+0x14/0x20 [ 148.153692] ? do_raw_spin_lock+0xc1/0x200 [ 148.157919] ? kasan_unpoison_shadow+0x35/0x50 [ 148.162492] ? kasan_kmalloc+0xc4/0xe0 [ 148.166371] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 148.171914] ? fill_super+0x1a40/0x1a40 [ 148.175883] legacy_get_tree+0x118/0x440 [ 148.180377] vfs_get_tree+0x1cb/0x5c0 [ 148.184182] ? vfs_set_fs_source+0x12c/0x180 [ 148.188595] do_mount+0x6c1/0x1fb0 [ 148.192731] ? kasan_check_read+0x11/0x20 [ 148.196867] ? do_raw_spin_unlock+0xa7/0x2f0 [ 148.201272] ? copy_mount_string+0x40/0x40 [ 148.205497] ? kasan_kmalloc+0xc4/0xe0 [ 148.209385] ? kmem_cache_alloc_trace+0x318/0x780 [ 148.214233] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 148.219760] ? copy_mount_options+0x285/0x380 [ 148.224249] ksys_mount+0x12d/0x140 [ 148.227878] __x64_sys_mount+0xbe/0x150 [ 148.231845] do_syscall_64+0x1b9/0x820 [ 148.235729] ? finish_task_switch+0x1d3/0x870 [ 148.240219] ? syscall_return_slowpath+0x5e0/0x5e0 [ 148.245139] ? syscall_return_slowpath+0x31d/0x5e0 [ 148.250059] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 148.255178] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 148.260716] ? prepare_exit_to_usermode+0x291/0x3b0 [ 148.265726] ? perf_trace_sys_enter+0xb10/0xb10 [ 148.270388] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 148.275227] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 148.280403] RIP: 0033:0x45885a [ 148.283575] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 dd 8f fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 ba 8f fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 148.302860] RSP: 002b:00007fe773c40a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 148.310560] RAX: ffffffffffffffda RBX: 00007fe773c40b30 RCX: 000000000045885a [ 148.317828] RDX: 00007fe773c40ad0 RSI: 0000000020001740 RDI: 00007fe773c40af0 [ 148.325086] RBP: 0000000020001740 R08: 00007fe773c40b30 R09: 00007fe773c40ad0 21:23:57 executing program 4: r0 = syz_open_procfs$namespace(0x0, &(0x7f0000000340)='ns/uts\x00') ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x89e2, &(0x7f0000000000)) 21:23:57 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f000001bfc8)={&(0x7f00007a9000)={0x10}, 0xc, &(0x7f000000b000)={&(0x7f00006c1000)=@ipv6_newroute={0x20, 0x18, 0x501, 0x0, 0x0, {0xa, 0xfe80}, [@RTA_METRICS={0x4, 0x8}]}, 0x20}, 0x1}, 0x0) [ 148.332440] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000014 [ 148.339698] R13: 0000000000000000 R14: 00000000004d3eb0 R15: 0000000000000037 [ 148.350943] 9pnet: Insufficient options for proto=fd 21:23:57 executing program 2 (fault-call:0 fault-nth:56): syz_mount_image$gfs2(&(0x7f0000000040)='gfs2\x00', &(0x7f0000001740)='./file0\x00', 0x0, 0x0, &(0x7f0000001680), 0x0, &(0x7f0000000880)=ANY=[@ANYBLOB='l']) [ 148.390226] hfsplus: unable to find HFS+ superblock 21:23:57 executing program 1: r0 = open$dir(&(0x7f0000000100)='./file0\x00', 0x60840, 0x0) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='9p\x00', 0x0, &(0x7f00000001c0)={'trans=fd,', {'rfdno', 0x3d}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c}) 21:23:57 executing program 0: syz_open_dev$sndseq(&(0x7f0000000000)='/dev/snd/seq\x00', 0x0, 0x0) userfaultfd(0x0) syz_open_dev$mice(&(0x7f0000000100)='/dev/input/mice\x00', 0x0, 0x0) pselect6(0x40, &(0x7f00000abfc0)={0x3ffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1600000000000000}, &(0x7f0000768000), &(0x7f00007fbfc0), &(0x7f0000f22000)={0x0, 0x989680}, &(0x7f0000f14000)={&(0x7f0000553ff8), 0x8}) 21:23:57 executing program 3: rt_sigprocmask(0x0, &(0x7f0000000000)={0x1}, &(0x7f0000000040), 0x8) r0 = getpid() prctl$setptracer(0x59616d61, r0) ptrace$setregset(0x4205, r0, 0x203, &(0x7f0000000100)={&(0x7f0000000080)="414bd0893a3b49694292039316b5536883245934c601b4cd37a069896cb0658a5b70d39a4281ab69da3857dc065be3942d8b4453f5ed65754f944afdecfc3c24e9226534743883a53eea2b42a6e9d1ac218593fc228432b2fbe8bbd3061641a02124f4e31a468b9ef09402cf7ae94016f3f1357eaddc105f9cab1048c4", 0x7d}) socketpair$inet_sctp(0x2, 0x0, 0x84, &(0x7f0000000280)) prctl$setptracer(0x59616d61, 0x0) prctl$setptracer(0x59616d61, 0x0) prctl$setptracer(0x59616d61, 0x0) prctl$setptracer(0x59616d61, r0) [ 148.493087] 9pnet: Insufficient options for proto=fd [ 148.504187] FAULT_INJECTION: forcing a failure. [ 148.504187] name failslab, interval 1, probability 0, space 0, times 0 [ 148.515554] CPU: 1 PID: 12602 Comm: syz-executor2 Not tainted 4.18.0-rc3-next-20180706+ #1 [ 148.523965] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 148.533327] Call Trace: [ 148.535941] dump_stack+0x1c9/0x2b4 [ 148.539584] ? dump_stack_print_info.cold.2+0x52/0x52 [ 148.544790] ? __kernel_text_address+0xd/0x40 [ 148.549300] ? unwind_get_return_address+0x61/0xa0 [ 148.554250] should_fail.cold.4+0xa/0x11 [ 148.558505] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 148.563627] ? save_stack+0xa9/0xd0 [ 148.567269] ? save_stack+0x43/0xd0 [ 148.570910] ? kasan_kmalloc+0xc4/0xe0 [ 148.574809] ? kmem_cache_alloc_trace+0x152/0x780 [ 148.579664] ? __memcg_init_list_lru_node+0x185/0x2d0 [ 148.584875] ? __list_lru_init+0x4d6/0x840 [ 148.589125] ? alloc_super+0x976/0xb10 21:23:57 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000000)) read(r0, &(0x7f0000000040)=""/11, 0xb) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000100)) r1 = epoll_create1(0x0) r2 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000140)) r3 = syz_open_pts(r0, 0x0) dup2(r2, r3) 21:23:57 executing program 5: memfd_create(&(0x7f0000000080)="74086e750000000000000000008c00", 0x0) pwritev(0xffffffffffffffff, &(0x7f0000000340)=[{&(0x7f00000001c0)='\'', 0x1}], 0x1, 0x1081806) sync() [ 148.593099] ? sget+0x10b/0x150 [ 148.596392] ? gfs2_mount+0x1a7/0x712 [ 148.600207] ? legacy_get_tree+0x118/0x440 [ 148.604459] ? vfs_get_tree+0x1cb/0x5c0 [ 148.608443] ? do_mount+0x6c1/0x1fb0 [ 148.612153] ? ksys_mount+0x12d/0x140 [ 148.615966] ? __x64_sys_mount+0xbe/0x150 [ 148.620120] ? do_syscall_64+0x1b9/0x820 [ 148.624169] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 148.629531] ? save_stack+0xa9/0xd0 [ 148.633152] ? lock_acquire+0x1e4/0x540 [ 148.637125] ? fs_reclaim_acquire+0x20/0x20 [ 148.641437] ? lock_downgrade+0x8f0/0x8f0 [ 148.645572] ? ksys_mount+0x12d/0x140 [ 148.649367] ? check_same_owner+0x340/0x340 [ 148.653692] ? rcu_note_context_switch+0x730/0x730 [ 148.658611] __should_failslab+0x124/0x180 [ 148.662838] should_failslab+0x9/0x14 [ 148.666636] kmem_cache_alloc_trace+0x2cb/0x780 [ 148.671324] ? kasan_kmalloc+0xc4/0xe0 [ 148.675207] __memcg_init_list_lru_node+0x185/0x2d0 [ 148.680225] ? kvfree_rcu+0x20/0x20 [ 148.683849] ? __kmalloc_node+0x47/0x70 [ 148.687822] __list_lru_init+0x4d6/0x840 [ 148.691871] ? up_write+0x7b/0x220 [ 148.695401] ? list_lru_destroy+0x500/0x500 [ 148.699733] ? prealloc_shrinker+0x124/0x450 [ 148.704151] ? prealloc_shrinker+0x21c/0x450 [ 148.708549] ? inactive_list_is_low+0x850/0x850 [ 148.713219] ? __lockdep_init_map+0x105/0x590 [ 148.717720] alloc_super+0x976/0xb10 [ 148.721427] ? destroy_unused_super.part.11+0x110/0x110 [ 148.726800] ? lock_downgrade+0x8f0/0x8f0 [ 148.730937] ? kasan_check_read+0x11/0x20 [ 148.735081] ? do_raw_spin_trylock+0x1c0/0x1c0 [ 148.739656] ? kasan_check_write+0x14/0x20 [ 148.743883] ? do_raw_spin_lock+0xc1/0x200 [ 148.748118] sget_userns+0x276/0x860 [ 148.751817] ? gfs2_kill_sb+0x1a0/0x1a0 [ 148.755788] ? fallocate_chunk.isra.15.cold.19+0x7c/0x7c [ 148.761226] ? vfs_get_super+0x270/0x270 [ 148.765287] ? kasan_check_read+0x11/0x20 [ 148.769422] ? do_raw_spin_unlock+0xa7/0x2f0 [ 148.773816] ? do_raw_spin_trylock+0x1c0/0x1c0 [ 148.778389] ? kasan_check_write+0x14/0x20 [ 148.782609] ? do_raw_spin_lock+0xc1/0x200 [ 148.786860] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 148.792391] ? ns_capable_common+0x13f/0x170 [ 148.796793] ? gfs2_kill_sb+0x1a0/0x1a0 [ 148.800764] sget+0x10b/0x150 [ 148.803887] ? fallocate_chunk.isra.15.cold.19+0x7c/0x7c [ 148.809341] gfs2_mount+0x1a7/0x712 [ 148.812963] ? fill_super+0x1a40/0x1a40 [ 148.816931] ? kasan_check_write+0x14/0x20 [ 148.821171] ? do_raw_spin_lock+0xc1/0x200 [ 148.825410] ? kasan_unpoison_shadow+0x35/0x50 [ 148.829986] ? kasan_kmalloc+0xc4/0xe0 [ 148.833866] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 148.839390] ? fill_super+0x1a40/0x1a40 [ 148.843350] legacy_get_tree+0x118/0x440 [ 148.847400] vfs_get_tree+0x1cb/0x5c0 [ 148.852079] ? vfs_set_fs_source+0x12c/0x180 [ 148.856494] do_mount+0x6c1/0x1fb0 [ 148.860027] ? kasan_check_write+0x14/0x20 [ 148.864259] ? copy_mount_string+0x40/0x40 [ 148.868482] ? kasan_kmalloc+0xc4/0xe0 [ 148.872357] ? kmem_cache_alloc_trace+0x318/0x780 [ 148.877204] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 148.882821] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 148.888363] ? copy_mount_options+0x285/0x380 [ 148.892856] ksys_mount+0x12d/0x140 [ 148.896477] __x64_sys_mount+0xbe/0x150 [ 148.900448] do_syscall_64+0x1b9/0x820 [ 148.904334] ? finish_task_switch+0x1d3/0x870 [ 148.908825] ? syscall_return_slowpath+0x5e0/0x5e0 [ 148.913751] ? syscall_return_slowpath+0x31d/0x5e0 [ 148.918685] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 148.923698] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 148.929286] ? prepare_exit_to_usermode+0x291/0x3b0 [ 148.934647] ? perf_trace_sys_enter+0xb10/0xb10 [ 148.939314] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 148.944163] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 148.949339] RIP: 0033:0x45885a [ 148.952511] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 dd 8f fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 ba 8f fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 148.971784] RSP: 002b:00007fe773c40a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 148.979482] RAX: ffffffffffffffda RBX: 00007fe773c40b30 RCX: 000000000045885a [ 148.986758] RDX: 00007fe773c40ad0 RSI: 0000000020001740 RDI: 00007fe773c40af0 [ 148.994021] RBP: 0000000020001740 R08: 00007fe773c40b30 R09: 00007fe773c40ad0 [ 149.001299] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000014 [ 149.008573] R13: 0000000000000000 R14: 00000000004d3eb0 R15: 0000000000000038 21:23:58 executing program 6: r0 = semget$private(0x0, 0x6, 0x0) unshare(0x40000) semtimedop(r0, &(0x7f00000000c0)=[{0x0, 0xfffffffffffffff9, 0x1000}], 0x1, &(0x7f0000efe000)={0x2000}) semop(r0, &(0x7f00008d8000)=[{0x0, 0x0, 0xffffffffffffffff}], 0x1) semctl$SETALL(r0, 0x0, 0x11, &(0x7f0000000000)) perf_event_open(&(0x7f000001d000)={0x200000002, 0x70, 0x80000000006, 0x108000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) 21:23:58 executing program 1: r0 = open$dir(&(0x7f0000000100)='./file0\x00', 0x60840, 0x0) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='9p\x00', 0x0, &(0x7f00000001c0)={'trans=fd,', {'rfdno', 0x3d}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c}) 21:23:58 executing program 7: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$hfsplus(&(0x7f0000000040)="686673706c7573f5", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000300), 0x0, &(0x7f0000000380)) 21:23:58 executing program 0: syz_open_dev$sndseq(&(0x7f0000000000)='/dev/snd/seq\x00', 0x0, 0x0) userfaultfd(0x0) syz_open_dev$mice(&(0x7f0000000100)='/dev/input/mice\x00', 0x0, 0x0) pselect6(0x40, &(0x7f00000abfc0)={0x3ffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000}, &(0x7f0000768000), &(0x7f00007fbfc0), &(0x7f0000f22000)={0x0, 0x989680}, &(0x7f0000f14000)={&(0x7f0000553ff8), 0x8}) 21:23:58 executing program 2 (fault-call:0 fault-nth:57): syz_mount_image$gfs2(&(0x7f0000000040)='gfs2\x00', &(0x7f0000001740)='./file0\x00', 0x0, 0x0, &(0x7f0000001680), 0x0, &(0x7f0000000880)=ANY=[@ANYBLOB='l']) 21:23:58 executing program 3: r0 = getpid() prctl$setptracer(0x59616d61, r0) socketpair$inet_sctp(0x2, 0x0, 0x84, &(0x7f0000000280)) r1 = syz_open_dev$admmidi(&(0x7f0000000000)='/dev/admmidi#\x00', 0x5, 0x0) accept$unix(r1, &(0x7f0000000040)=@abs, &(0x7f00000000c0)=0x6e) prctl$setptracer(0x59616d61, 0x0) prctl$setptracer(0x59616d61, 0x0) prctl$setptracer(0x59616d61, 0x0) prctl$setptracer(0x59616d61, r0) 21:23:58 executing program 5: r0 = getpgrp(0x0) sched_getattr(r0, &(0x7f0000000440), 0x30, 0x0) [ 149.317949] 9pnet: Insufficient options for proto=fd [ 149.326510] FAULT_INJECTION: forcing a failure. [ 149.326510] name failslab, interval 1, probability 0, space 0, times 0 [ 149.337862] CPU: 0 PID: 12641 Comm: syz-executor2 Not tainted 4.18.0-rc3-next-20180706+ #1 [ 149.346281] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 149.355694] Call Trace: [ 149.358308] dump_stack+0x1c9/0x2b4 [ 149.361960] ? dump_stack_print_info.cold.2+0x52/0x52 21:23:58 executing program 5: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000400)=""/246) pread64(r0, &(0x7f0000974f42)=""/190, 0xbe, 0x0) [ 149.367170] ? kasan_check_write+0x14/0x20 [ 149.371423] ? __mutex_lock+0x6c4/0x1680 [ 149.375515] should_fail.cold.4+0xa/0x11 [ 149.379621] ? __list_lru_init+0x4d6/0x840 [ 149.383884] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 149.389022] ? mutex_trylock+0x2b0/0x2b0 [ 149.393108] ? ksys_mount+0x12d/0x140 [ 149.396930] ? __x64_sys_mount+0xbe/0x150 [ 149.401101] ? do_syscall_64+0x1b9/0x820 [ 149.405183] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 149.410574] ? __list_lru_init+0x409/0x840 [ 149.414845] ? lock_downgrade+0x8f0/0x8f0 [ 149.418993] ? lock_acquire+0x1e4/0x540 [ 149.422988] ? fs_reclaim_acquire+0x20/0x20 [ 149.427344] ? lock_downgrade+0x8f0/0x8f0 [ 149.431512] ? lock_acquire+0x1e4/0x540 [ 149.435480] ? fs_reclaim_acquire+0x20/0x20 [ 149.439797] ? lock_downgrade+0x8f0/0x8f0 [ 149.443956] ? check_same_owner+0x340/0x340 [ 149.448798] ? check_same_owner+0x340/0x340 [ 149.453141] ? rcu_note_context_switch+0x730/0x730 [ 149.458075] __should_failslab+0x124/0x180 [ 149.462313] should_failslab+0x9/0x14 [ 149.466112] __kmalloc+0x2c8/0x760 [ 149.469642] ? kvfree_rcu+0x20/0x20 [ 149.473274] ? __list_lru_init+0x151/0x840 [ 149.477504] __list_lru_init+0x151/0x840 [ 149.481569] ? up_write+0x7b/0x220 [ 149.485129] ? list_lru_destroy+0x500/0x500 [ 149.489459] ? prealloc_shrinker+0x124/0x450 [ 149.493864] ? prealloc_shrinker+0x21c/0x450 [ 149.498264] ? inactive_list_is_low+0x850/0x850 [ 149.502923] ? __lockdep_init_map+0x105/0x590 [ 149.507410] alloc_super+0x9a6/0xb10 [ 149.511116] ? destroy_unused_super.part.11+0x110/0x110 [ 149.516467] ? lock_downgrade+0x8f0/0x8f0 [ 149.520605] ? kasan_check_read+0x11/0x20 [ 149.524741] ? do_raw_spin_trylock+0x1c0/0x1c0 [ 149.529313] ? kasan_check_write+0x14/0x20 [ 149.533537] ? do_raw_spin_lock+0xc1/0x200 [ 149.537763] sget_userns+0x276/0x860 [ 149.541466] ? gfs2_kill_sb+0x1a0/0x1a0 [ 149.545436] ? fallocate_chunk.isra.15.cold.19+0x7c/0x7c [ 149.550889] ? vfs_get_super+0x270/0x270 [ 149.554937] ? kasan_check_read+0x11/0x20 [ 149.559079] ? do_raw_spin_unlock+0xa7/0x2f0 [ 149.563478] ? do_raw_spin_trylock+0x1c0/0x1c0 [ 149.568051] ? kasan_check_write+0x14/0x20 [ 149.572276] ? do_raw_spin_lock+0xc1/0x200 [ 149.576518] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 149.582064] ? ns_capable_common+0x13f/0x170 [ 149.586476] ? gfs2_kill_sb+0x1a0/0x1a0 [ 149.590443] sget+0x10b/0x150 [ 149.593541] ? fallocate_chunk.isra.15.cold.19+0x7c/0x7c [ 149.598999] gfs2_mount+0x1a7/0x712 [ 149.602654] ? fill_super+0x1a40/0x1a40 [ 149.606630] ? kasan_check_write+0x14/0x20 [ 149.610873] ? do_raw_spin_lock+0xc1/0x200 [ 149.615113] ? kasan_unpoison_shadow+0x35/0x50 [ 149.619689] ? kasan_kmalloc+0xc4/0xe0 [ 149.623571] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 149.629109] ? fill_super+0x1a40/0x1a40 [ 149.633075] legacy_get_tree+0x118/0x440 [ 149.637137] vfs_get_tree+0x1cb/0x5c0 [ 149.640925] ? vfs_set_fs_source+0x12c/0x180 [ 149.645322] do_mount+0x6c1/0x1fb0 [ 149.648850] ? kasan_check_read+0x11/0x20 [ 149.652990] ? do_raw_spin_unlock+0xa7/0x2f0 [ 149.657395] ? copy_mount_string+0x40/0x40 [ 149.661647] ? retint_kernel+0x10/0x10 [ 149.665540] ? copy_mount_options+0x1f0/0x380 [ 149.670029] ? copy_mount_options+0x1f6/0x380 [ 149.674516] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 149.680044] ? copy_mount_options+0x285/0x380 [ 149.684536] ksys_mount+0x12d/0x140 [ 149.688154] __x64_sys_mount+0xbe/0x150 [ 149.692116] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 149.697642] do_syscall_64+0x1b9/0x820 [ 149.701532] ? syscall_slow_exit_work+0x500/0x500 [ 149.706362] ? syscall_return_slowpath+0x5e0/0x5e0 [ 149.711289] ? syscall_return_slowpath+0x31d/0x5e0 [ 149.716208] ? prepare_exit_to_usermode+0x291/0x3b0 [ 149.721214] ? perf_trace_sys_enter+0xb10/0xb10 [ 149.725874] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 149.730716] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 149.735891] RIP: 0033:0x45885a [ 149.739073] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 dd 8f fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 ba 8f fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 149.758357] RSP: 002b:00007fe773c40a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 21:23:58 executing program 1: r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='9p\x00', 0x0, &(0x7f00000001c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d}, 0x2c}) 21:23:58 executing program 3: r0 = getpid() r1 = syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x7fff, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r1, 0xc0a85352, &(0x7f0000000040)={{0x7, 0x2}, 'port0\x00', 0x49, 0x1000, 0x905, 0x10001, 0x0, 0x10000, 0x80, 0x0, 0x4, 0x400}) prctl$setptracer(0x59616d61, r0) socketpair$inet_sctp(0x2, 0x0, 0x84, &(0x7f0000000280)) link(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='./file0\x00') prctl$setptracer(0x59616d61, 0x0) getsockopt$IP_VS_SO_GET_INFO(r1, 0x0, 0x481, &(0x7f0000000180), &(0x7f00000001c0)=0xc) prctl$setptracer(0x59616d61, 0x0) prctl$setptracer(0x59616d61, 0x0) sync_file_range(r1, 0x9af, 0x0, 0x5) prctl$setptracer(0x59616d61, r0) [ 149.766058] RAX: ffffffffffffffda RBX: 00007fe773c40b30 RCX: 000000000045885a [ 149.773314] RDX: 00007fe773c40ad0 RSI: 0000000020001740 RDI: 00007fe773c40af0 [ 149.780573] RBP: 0000000020001740 R08: 00007fe773c40b30 R09: 00007fe773c40ad0 [ 149.787840] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000014 [ 149.795097] R13: 0000000000000000 R14: 00000000004d3eb0 R15: 0000000000000039 21:23:58 executing program 5: r0 = socket$kcm(0x2, 0x800000000002, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000180)=ANY=[], &(0x7f0000000200)="47501a00f9d3c471b4a5430b11691d81fb4b9c49106ab3a01eaa6e1494e10112f6e527a746961b2da661bc0517d1fed124f6efb4292dc4c6df52a2c0623cdc1a18767d961c26d3aa8c633a234967dfe047b15997efc5a3bb522cb0393846dcc3f6e76a288635697c642b3cc7b3b36b3d1354dd508712a1f15e3b542d8a0c0c9a73d19d952bcef7d7d5cb703b44c4f17e5f76e7a2f9c44e076fb1000000000000000000000000000000", 0x2, 0xffffffffffffffe6, &(0x7f0000000080)=""/251}, 0x48) sendmsg(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)=@nfc={0x27, 0x0, 0x2}, 0xd0b7a20e2b82d5d5, &(0x7f00000019c0)}, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r0, 0x890b, &(0x7f0000000000)) 21:23:58 executing program 0: syz_open_dev$sndseq(&(0x7f0000000000)='/dev/snd/seq\x00', 0x0, 0x0) userfaultfd(0x0) syz_open_dev$mice(&(0x7f0000000100)='/dev/input/mice\x00', 0x0, 0x0) pselect6(0x40, &(0x7f00000abfc0)={0x3ffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6400}, &(0x7f0000768000), &(0x7f00007fbfc0), &(0x7f0000f22000)={0x0, 0x989680}, &(0x7f0000f14000)={&(0x7f0000553ff8), 0x8}) 21:23:58 executing program 2 (fault-call:0 fault-nth:58): syz_mount_image$gfs2(&(0x7f0000000040)='gfs2\x00', &(0x7f0000001740)='./file0\x00', 0x0, 0x0, &(0x7f0000001680), 0x0, &(0x7f0000000880)=ANY=[@ANYBLOB='l']) 21:23:58 executing program 1: r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='9p\x00', 0x0, &(0x7f00000001c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d}, 0x2c}) [ 149.947238] FAULT_INJECTION: forcing a failure. [ 149.947238] name failslab, interval 1, probability 0, space 0, times 0 [ 149.958628] CPU: 1 PID: 12687 Comm: syz-executor2 Not tainted 4.18.0-rc3-next-20180706+ #1 [ 149.967039] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 149.976399] Call Trace: [ 149.979000] dump_stack+0x1c9/0x2b4 [ 149.982652] ? dump_stack_print_info.cold.2+0x52/0x52 [ 149.987864] ? perf_trace_lock+0xde/0x920 [ 149.992033] should_fail.cold.4+0xa/0x11 [ 149.996117] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 150.001250] ? save_stack+0xa9/0xd0 [ 150.004902] ? save_stack+0x43/0xd0 [ 150.008556] ? kasan_kmalloc+0xc4/0xe0 [ 150.012466] ? kmem_cache_alloc_trace+0x152/0x780 [ 150.017324] ? __memcg_init_list_lru_node+0x185/0x2d0 [ 150.022542] ? __list_lru_init+0x4d6/0x840 [ 150.026795] ? alloc_super+0x9a6/0xb10 [ 150.030702] ? sget+0x10b/0x150 [ 150.034008] ? gfs2_mount+0x1a7/0x712 [ 150.037835] ? vfs_get_tree+0x1cb/0x5c0 [ 150.041829] ? do_mount+0x6c1/0x1fb0 [ 150.045675] ? ksys_mount+0x12d/0x140 [ 150.049520] ? __x64_sys_mount+0xbe/0x150 [ 150.053694] ? do_syscall_64+0x1b9/0x820 [ 150.057774] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 150.063172] ? lock_acquire+0x1e4/0x540 [ 150.067281] ? fs_reclaim_acquire+0x20/0x20 [ 150.071699] ? lock_downgrade+0x8f0/0x8f0 [ 150.075871] ? ksys_mount+0x12d/0x140 [ 150.079701] ? check_same_owner+0x340/0x340 [ 150.084121] ? rcu_note_context_switch+0x730/0x730 [ 150.089115] __should_failslab+0x124/0x180 [ 150.093373] should_failslab+0x9/0x14 21:23:59 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000000)) read(r0, &(0x7f0000000040)=""/11, 0xb) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000100)) r1 = epoll_create1(0x0) r2 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000140)) r3 = syz_open_pts(r0, 0x0) dup2(r2, r3) 21:23:59 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)=ANY=[], &(0x7f00000004c0)='GPL\x00', 0x0, 0xfb, &(0x7f0000000340)=""/251}, 0x48) r0 = socket$kcm(0xa, 0x5, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x1}, 0x14) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x890b, &(0x7f0000000000)) [ 150.097196] kmem_cache_alloc_trace+0x2cb/0x780 [ 150.101892] ? kasan_kmalloc+0xc4/0xe0 [ 150.105829] __memcg_init_list_lru_node+0x185/0x2d0 [ 150.112217] ? kvfree_rcu+0x20/0x20 [ 150.115873] ? __kmalloc_node+0x47/0x70 [ 150.119906] __list_lru_init+0x4d6/0x840 [ 150.123992] ? up_write+0x7b/0x220 [ 150.127707] ? list_lru_destroy+0x500/0x500 [ 150.132039] ? prealloc_shrinker+0x124/0x450 [ 150.136452] ? prealloc_shrinker+0x21c/0x450 [ 150.140874] ? inactive_list_is_low+0x850/0x850 [ 150.145550] ? __lockdep_init_map+0x105/0x590 [ 150.150044] alloc_super+0x9a6/0xb10 [ 150.153754] ? destroy_unused_super.part.11+0x110/0x110 [ 150.159114] ? lock_downgrade+0x8f0/0x8f0 [ 150.163273] ? kasan_check_read+0x11/0x20 [ 150.167413] ? do_raw_spin_trylock+0x1c0/0x1c0 [ 150.172010] ? kasan_check_write+0x14/0x20 [ 150.176257] ? do_raw_spin_lock+0xc1/0x200 [ 150.180496] sget_userns+0x276/0x860 [ 150.184227] ? gfs2_kill_sb+0x1a0/0x1a0 [ 150.188312] ? fallocate_chunk.isra.15.cold.19+0x7c/0x7c [ 150.193764] ? vfs_get_super+0x270/0x270 [ 150.197816] ? kasan_check_read+0x11/0x20 [ 150.201953] ? do_raw_spin_unlock+0xa7/0x2f0 [ 150.206350] ? do_raw_spin_trylock+0x1c0/0x1c0 [ 150.210938] ? kasan_check_write+0x14/0x20 [ 150.215174] ? do_raw_spin_lock+0xc1/0x200 [ 150.219429] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 150.224972] ? ns_capable_common+0x13f/0x170 [ 150.229387] ? gfs2_kill_sb+0x1a0/0x1a0 [ 150.233353] sget+0x10b/0x150 [ 150.236452] ? fallocate_chunk.isra.15.cold.19+0x7c/0x7c [ 150.241900] gfs2_mount+0x1a7/0x712 [ 150.245528] ? fill_super+0x1a40/0x1a40 [ 150.249494] ? check_same_owner+0x340/0x340 [ 150.253844] ? debug_mutex_init+0x2d/0x60 [ 150.257993] ? kasan_unpoison_shadow+0x35/0x50 [ 150.262580] ? kasan_kmalloc+0xc4/0xe0 [ 150.266473] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 150.272008] ? fill_super+0x1a40/0x1a40 [ 150.275980] legacy_get_tree+0x118/0x440 [ 150.280042] vfs_get_tree+0x1cb/0x5c0 [ 150.283880] ? vfs_set_fs_source+0x12c/0x180 [ 150.288301] do_mount+0x6c1/0x1fb0 [ 150.291848] ? check_same_owner+0x340/0x340 [ 150.296189] ? lock_release+0xa30/0xa30 [ 150.300160] ? copy_mount_string+0x40/0x40 [ 150.304402] ? kasan_kmalloc+0xc4/0xe0 [ 150.308391] ? kmem_cache_alloc_trace+0x318/0x780 [ 150.313231] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 150.318760] ? _copy_from_user+0xdf/0x150 [ 150.323166] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 150.328702] ? copy_mount_options+0x285/0x380 [ 150.333200] ksys_mount+0x12d/0x140 [ 150.336852] __x64_sys_mount+0xbe/0x150 [ 150.340825] do_syscall_64+0x1b9/0x820 [ 150.344708] ? finish_task_switch+0x1d3/0x870 [ 150.349195] ? syscall_return_slowpath+0x5e0/0x5e0 [ 150.354116] ? syscall_return_slowpath+0x31d/0x5e0 [ 150.359051] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 150.364061] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 150.369602] ? prepare_exit_to_usermode+0x291/0x3b0 [ 150.374648] ? perf_trace_sys_enter+0xb10/0xb10 [ 150.379309] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 150.384150] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 150.389328] RIP: 0033:0x45885a [ 150.392516] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 dd 8f fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 ba 8f fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 150.411826] RSP: 002b:00007fe773c40a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 150.419535] RAX: ffffffffffffffda RBX: 00007fe773c40b30 RCX: 000000000045885a [ 150.427151] RDX: 00007fe773c40ad0 RSI: 0000000020001740 RDI: 00007fe773c40af0 [ 150.434764] RBP: 0000000020001740 R08: 00007fe773c40b30 R09: 00007fe773c40ad0 [ 150.442032] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000014 [ 150.449378] R13: 0000000000000000 R14: 00000000004d3eb0 R15: 000000000000003a 21:23:59 executing program 6: r0 = semget$private(0x0, 0x6, 0x0) unshare(0x40000) semtimedop(r0, &(0x7f00000000c0)=[{0x0, 0xfffffffffffffff9, 0x1000}], 0x1, &(0x7f0000efe000)={0x2000}) semop(r0, &(0x7f00008d8000)=[{0x0, 0x0, 0xffffffffffffffff}], 0x1) semctl$SETALL(r0, 0x0, 0x11, &(0x7f0000000000)) 21:23:59 executing program 1: r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='9p\x00', 0x0, &(0x7f00000001c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d}, 0x2c}) 21:23:59 executing program 3: r0 = getpid() prctl$setptracer(0x59616d61, r0) socketpair$inet_sctp(0x2, 0x0, 0x84, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) prctl$setptracer(0x59616d61, 0x0) getsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f0000000000)={{{@in6=@remote, @in=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6}, 0x0, @in6}}, &(0x7f0000000100)=0xe8) r4 = socket(0x9, 0x80807, 0x1ff) stat(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) sendmsg$unix(r4, &(0x7f0000000680)={&(0x7f00000001c0)=@abs={0x1, 0x0, 0x4e23}, 0x6e, &(0x7f0000000480)=[{&(0x7f0000000240)="c3809b904d571ece7b3c91eee160f3d33fb64fc9822a0ab7b432b231b8", 0x1d}, {&(0x7f00000002c0)="39eddb549235f4a7d35417ff584ba868a8c69bf1354b8206562cd06c6ee3d9885861e5ae6c9bffdb46c11b835f8ce4046f4eaa8f5a6eee566c9ddd7d69f920f6a55c9d7e0020c86ef50ee915a2ffe494831464aaa48055e035ab3abc9eb199eab49be77e5392a5aaaa46396787949d0a4aa1e4c1cb7ca21e8fab280afd53c8c6ddfffdba677bf02f24bc3d1cc7382e44af17651ebdbfe31e0080ae90c8c4ce5ca86fd98847a7e60d814151bde5b80e63165d64064b6be199", 0xb8}, {&(0x7f0000000380)="04f403a9536abef41685fe0f57", 0xd}, {&(0x7f00000003c0)="bb90e20d56e589ad4d37a3c54e1854109b67190b21988f58078d6e16e52c5006253a07b298b613dcc2016bc7d3f340ef7a9dc225eb04e525853b9f0b9c88414b58d557a614d38243d8de6f5661afdee8e9470834d6f88478076346017e1048a492558cb81ad53f863745a41c172ac6496c93741f135b840002aa41d1e712e439bf1ec2d8a36a23e72361bf6f79909e6d10d6c050be55a46f53a522", 0x9b}], 0x4, &(0x7f0000000580)=[@cred={0x20, 0x1, 0x2, r0, r3, r5}, @rights={0x30, 0x1, 0x1, [r2, r1, r2, r2, r2, r1, r2, r1]}, @rights={0x30, 0x1, 0x1, [r2, r2, r1, r1, r2, r2, r2]}, @rights={0x18, 0x1, 0x1, [r2]}, @rights={0x28, 0x1, 0x1, [r2, r1, r1, r2, r1, r2]}, @rights={0x18, 0x1, 0x1, [r2]}], 0xd8, 0x4008880}, 0x0) setfsuid(r3) prctl$setptracer(0x59616d61, 0x0) prctl$setptracer(0x59616d61, 0x0) r6 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000140)='/dev/sequencer\x00', 0x0, 0x0) ioctl$TUNSETSTEERINGEBPF(r6, 0x800454e0, &(0x7f0000000180)=r2) prctl$setptracer(0x59616d61, r0) 21:23:59 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)=ANY=[], &(0x7f00000004c0)='GPL\x00', 0x0, 0xfb, &(0x7f0000000340)=""/251}, 0x48) r0 = socket$kcm(0xa, 0x5, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x1}, 0x14) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x890b, &(0x7f0000000000)) 21:23:59 executing program 2 (fault-call:0 fault-nth:59): syz_mount_image$gfs2(&(0x7f0000000040)='gfs2\x00', &(0x7f0000001740)='./file0\x00', 0x0, 0x0, &(0x7f0000001680), 0x0, &(0x7f0000000880)=ANY=[@ANYBLOB='l']) 21:23:59 executing program 0: syz_open_dev$sndseq(&(0x7f0000000000)='/dev/snd/seq\x00', 0x0, 0x0) userfaultfd(0x0) syz_open_dev$mice(&(0x7f0000000100)='/dev/input/mice\x00', 0x0, 0x0) pselect6(0x40, &(0x7f00000abfc0)={0x3ffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x64}, &(0x7f0000768000), &(0x7f00007fbfc0), &(0x7f0000f22000)={0x0, 0x989680}, &(0x7f0000f14000)={&(0x7f0000553ff8), 0x8}) 21:23:59 executing program 7: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$hfsplus(&(0x7f0000000040)="686673706c757302", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000300), 0x0, &(0x7f0000000380)) [ 150.621671] FAULT_INJECTION: forcing a failure. [ 150.621671] name failslab, interval 1, probability 0, space 0, times 0 [ 150.632986] CPU: 1 PID: 12721 Comm: syz-executor2 Not tainted 4.18.0-rc3-next-20180706+ #1 [ 150.641402] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 150.650772] Call Trace: [ 150.653384] dump_stack+0x1c9/0x2b4 [ 150.657045] ? dump_stack_print_info.cold.2+0x52/0x52 [ 150.662269] ? perf_trace_lock+0xde/0x920 [ 150.666448] should_fail.cold.4+0xa/0x11 21:23:59 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)=ANY=[], &(0x7f00000004c0)='GPL\x00', 0x0, 0xfb, &(0x7f0000000340)=""/251}, 0x48) r0 = socket$kcm(0xa, 0x5, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x1}, 0x14) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x890b, &(0x7f0000000000)) 21:23:59 executing program 1: r0 = open$dir(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) r1 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='9p\x00', 0x0, &(0x7f00000001c0)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c}) [ 150.670548] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 150.675738] ? save_stack+0xa9/0xd0 [ 150.679388] ? save_stack+0x43/0xd0 [ 150.684668] ? kasan_kmalloc+0xc4/0xe0 [ 150.688581] ? kmem_cache_alloc_trace+0x152/0x780 [ 150.693448] ? __memcg_init_list_lru_node+0x185/0x2d0 [ 150.698664] ? __list_lru_init+0x4d6/0x840 [ 150.702921] ? alloc_super+0x976/0xb10 [ 150.706828] ? sget+0x10b/0x150 [ 150.710128] ? gfs2_mount+0x1a7/0x712 [ 150.713950] ? vfs_get_tree+0x1cb/0x5c0 [ 150.717945] ? do_mount+0x6c1/0x1fb0 [ 150.721680] ? ksys_mount+0x12d/0x140 [ 150.725501] ? __x64_sys_mount+0xbe/0x150 [ 150.729666] ? do_syscall_64+0x1b9/0x820 [ 150.733741] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 150.739133] ? lock_acquire+0x1e4/0x540 [ 150.743126] ? fs_reclaim_acquire+0x20/0x20 [ 150.747476] ? lock_downgrade+0x8f0/0x8f0 [ 150.751641] ? ksys_mount+0x12d/0x140 [ 150.755467] ? check_same_owner+0x340/0x340 [ 150.759810] ? rcu_note_context_switch+0x730/0x730 [ 150.764783] __should_failslab+0x124/0x180 21:23:59 executing program 3: r0 = getpid() prctl$setptracer(0x59616d61, r0) socketpair$inet_sctp(0x2, 0x0, 0x84, &(0x7f0000000280)) prctl$setptracer(0x59616d61, 0x0) prctl$setptracer(0x59616d61, 0x0) r1 = syz_open_dev$admmidi(&(0x7f0000000080)='/dev/admmidi#\x00', 0x7fff, 0x10000) perf_event_open$cgroup(&(0x7f0000000000)={0x7, 0x70, 0x1ff, 0x50c851b4, 0x8, 0x7, 0x0, 0x2, 0x8000, 0xa, 0x3, 0xdf05, 0x5cc2, 0x800, 0x8, 0x100000000, 0x8, 0x1, 0x2, 0x4, 0xfff, 0xf0, 0xfc8, 0x80000000, 0xffff, 0x40, 0x7, 0x10000, 0x3ff, 0x7, 0x8000, 0x0, 0xfffffffffffff801, 0x1, 0x7, 0x7fe, 0x7fff, 0x3, 0x0, 0x6, 0x4, @perf_config_ext={0x80000001, 0x9069}, 0x20020, 0x3, 0x4, 0x6, 0x7, 0x8, 0x9}, r1, 0xa, 0xffffffffffffff9c, 0x1) prctl$setptracer(0x59616d61, 0x0) prctl$setptracer(0x59616d61, r0) 21:23:59 executing program 1: r0 = open$dir(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) r1 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='9p\x00', 0x0, &(0x7f00000001c0)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c}) [ 150.769050] should_failslab+0x9/0x14 [ 150.772878] kmem_cache_alloc_trace+0x2cb/0x780 [ 150.777705] ? kasan_kmalloc+0xc4/0xe0 [ 150.781622] __memcg_init_list_lru_node+0x185/0x2d0 [ 150.786663] ? kvfree_rcu+0x20/0x20 [ 150.790314] ? __kmalloc_node+0x47/0x70 [ 150.794339] __list_lru_init+0x4d6/0x840 [ 150.798416] ? up_write+0x7b/0x220 [ 150.802002] ? list_lru_destroy+0x500/0x500 [ 150.806341] ? prealloc_shrinker+0x124/0x450 [ 150.810771] ? prealloc_shrinker+0x21c/0x450 [ 150.815236] ? inactive_list_is_low+0x850/0x850 21:23:59 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)=ANY=[], &(0x7f00000004c0)='GPL\x00', 0x0, 0xfb, &(0x7f0000000340)=""/251}, 0x48) r0 = socket$kcm(0xa, 0x5, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x1}, 0x14) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x890b, &(0x7f0000000000)) 21:23:59 executing program 1: r0 = open$dir(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) r1 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='9p\x00', 0x0, &(0x7f00000001c0)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c}) [ 150.819928] ? __lockdep_init_map+0x105/0x590 [ 150.824445] alloc_super+0x976/0xb10 [ 150.828204] ? destroy_unused_super.part.11+0x110/0x110 [ 150.833586] ? lock_downgrade+0x8f0/0x8f0 [ 150.837758] ? kasan_check_read+0x11/0x20 [ 150.841924] ? do_raw_spin_trylock+0x1c0/0x1c0 [ 150.846527] ? kasan_check_write+0x14/0x20 [ 150.851538] ? do_raw_spin_lock+0xc1/0x200 [ 150.855804] sget_userns+0x276/0x860 [ 150.859563] ? gfs2_kill_sb+0x1a0/0x1a0 [ 150.863555] ? fallocate_chunk.isra.15.cold.19+0x7c/0x7c 21:23:59 executing program 1: r0 = open$dir(&(0x7f0000000100)='./file0\x00', 0x60840, 0x0) r1 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='9p\x00', 0x0, &(0x7f00000001c0)={'trans=fd,', {'rfdno', 0x3d}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c}) [ 150.869051] ? vfs_get_super+0x270/0x270 [ 150.873131] ? kasan_check_read+0x11/0x20 [ 150.877300] ? do_raw_spin_unlock+0xa7/0x2f0 [ 150.881734] ? do_raw_spin_trylock+0x1c0/0x1c0 [ 150.886364] ? kasan_check_write+0x14/0x20 [ 150.890621] ? do_raw_spin_lock+0xc1/0x200 [ 150.894891] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 150.900458] ? ns_capable_common+0x13f/0x170 [ 150.904891] ? gfs2_kill_sb+0x1a0/0x1a0 [ 150.908889] sget+0x10b/0x150 [ 150.912047] ? fallocate_chunk.isra.15.cold.19+0x7c/0x7c [ 150.917525] gfs2_mount+0x1a7/0x712 [ 150.921178] ? fill_super+0x1a40/0x1a40 [ 150.925181] ? kasan_check_write+0x14/0x20 [ 150.926060] 9pnet: Insufficient options for proto=fd [ 150.929433] ? do_raw_spin_lock+0xc1/0x200 [ 150.929472] ? kasan_unpoison_shadow+0x35/0x50 [ 150.929487] ? kasan_kmalloc+0xc4/0xe0 [ 150.929514] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 150.952903] ? fill_super+0x1a40/0x1a40 [ 150.956904] legacy_get_tree+0x118/0x440 [ 150.961023] vfs_get_tree+0x1cb/0x5c0 [ 150.964847] ? vfs_set_fs_source+0x12c/0x180 [ 150.969273] do_mount+0x6c1/0x1fb0 21:24:00 executing program 4: r0 = socket$kcm(0x2, 0x5, 0x0) sendmsg$kcm(r0, &(0x7f0000000580)={&(0x7f0000000440)=@generic={0x2, "3767b4818fa51940a75a64ff601bed813ca4a744c0b30776cbb54beba33938bf9ccf422347bed9adea3ea7b2af4dc38251de34ee1983e9f78ee47cdbc9f40f1c533e017a6210f8b1ae7433ba79ea888efd4d2ca875816bb74e7216bf0a3da8b1dbb6bd851d93d102318daaf0f7c44c2c16d06122e97f68275e698782a0a1"}, 0x80, &(0x7f0000001140), 0x0, &(0x7f0000001000)=ANY=[]}, 0x0) recvmsg$kcm(r0, &(0x7f0000000100)={&(0x7f0000000000)=@pppol2tpin6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @dev}}}, 0x80, &(0x7f00000000c0), 0x0, &(0x7f00000005c0)=""/201, 0xc9}, 0x0) setsockopt$sock_attach_bpf(r0, 0x84, 0xb, &(0x7f0000000080), 0x4) sendmsg$kcm(r0, &(0x7f0000001d40)={&(0x7f0000000740)=@in={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x16}}, 0x80, &(0x7f0000001c00)=[{&(0x7f0000001bc0)="01", 0x1}], 0x1, &(0x7f0000001c80)}, 0x0) 21:24:00 executing program 5: openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) [ 150.972837] ? kasan_check_write+0x14/0x20 [ 150.977089] ? copy_mount_string+0x40/0x40 [ 150.981428] ? kasan_kmalloc+0xc4/0xe0 [ 150.985369] ? kmem_cache_alloc_trace+0x318/0x780 [ 150.990235] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 150.996056] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 151.001647] ? copy_mount_options+0x285/0x380 [ 151.006253] ksys_mount+0x12d/0x140 [ 151.009905] __x64_sys_mount+0xbe/0x150 [ 151.013903] do_syscall_64+0x1b9/0x820 [ 151.017814] ? syscall_return_slowpath+0x5e0/0x5e0 [ 151.022768] ? syscall_return_slowpath+0x31d/0x5e0 [ 151.027747] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 151.032785] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 151.038352] ? prepare_exit_to_usermode+0x291/0x3b0 [ 151.043414] ? perf_trace_sys_enter+0xb10/0xb10 [ 151.048113] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 151.052982] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 151.058195] RIP: 0033:0x45885a [ 151.061388] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 dd 8f fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 ba 8f fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 151.080730] RSP: 002b:00007fe773c40a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 151.088499] RAX: ffffffffffffffda RBX: 00007fe773c40b30 RCX: 000000000045885a [ 151.095778] RDX: 00007fe773c40ad0 RSI: 0000000020001740 RDI: 00007fe773c40af0 [ 151.103060] RBP: 0000000020001740 R08: 00007fe773c40b30 R09: 00007fe773c40ad0 [ 151.110345] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000014 [ 151.117670] R13: 0000000000000000 R14: 00000000004d3eb0 R15: 000000000000003b 21:24:00 executing program 6: r0 = semget$private(0x0, 0x6, 0x0) unshare(0x40000) semtimedop(r0, &(0x7f00000000c0)=[{0x0, 0xfffffffffffffff9, 0x1000}], 0x1, &(0x7f0000efe000)={0x2000}) semctl$SETALL(r0, 0x0, 0x11, &(0x7f0000000000)) 21:24:00 executing program 1: r0 = open$dir(&(0x7f0000000100)='./file0\x00', 0x60840, 0x0) r1 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='9p\x00', 0x0, &(0x7f00000001c0)={'trans=fd,', {'rfdno', 0x3d}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c}) 21:24:00 executing program 4: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup\x00', 0x200002, 0x0) r1 = openat$cgroup_int(r0, &(0x7f00000000c0)='cgroup.max.depth\x00', 0x2, 0x0) write$cgroup_int(r1, &(0x7f0000000180)=0x100000001, 0x12) 21:24:00 executing program 3: r0 = getpid() prctl$setptracer(0x59616d61, r0) socketpair$inet_sctp(0x2, 0x0, 0x84, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) prctl$setptracer(0x59616d61, 0x0) prctl$setptracer(0x59616d61, 0x0) prctl$setptracer(0x59616d61, 0x0) r3 = dup2(r1, r2) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, &(0x7f0000000000)={0x0, @in6={{0xa, 0x4e23, 0x2, @loopback={0x0, 0x1}, 0x5f007a91}}, 0x0, 0x7d}, &(0x7f00000000c0)=0x90) ioctl$sock_inet_udp_SIOCOUTQ(r3, 0x5411, &(0x7f0000000180)) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(r3, 0x84, 0x22, &(0x7f0000000100)={0x0, 0x8000, 0x9, 0x7fffffff, r4}, &(0x7f0000000140)=0x10) prctl$setptracer(0x59616d61, r0) r5 = shmat(0x0, &(0x7f0000ffb000/0x2000)=nil, 0x0) shmdt(r5) ioctl$VHOST_SET_VRING_ENDIAN(r3, 0x4008af13, &(0x7f00000001c0)={0x2}) 21:24:00 executing program 5: socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) recvmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000040)=@ax25, 0x2, &(0x7f0000000000)=[{&(0x7f0000000080)=""/151, 0xffffff77}], 0x1, &(0x7f00000001c0)=""/17, 0xffda}, 0x0) sendmsg(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100), 0x47, &(0x7f0000000000)}, 0x0) 21:24:00 executing program 0: syz_open_dev$sndseq(&(0x7f0000000000)='/dev/snd/seq\x00', 0x0, 0x0) userfaultfd(0x0) syz_open_dev$mice(&(0x7f0000000100)='/dev/input/mice\x00', 0x0, 0x0) pselect6(0x40, &(0x7f00000abfc0)={0x3ffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000000000000}, &(0x7f0000768000), &(0x7f00007fbfc0), &(0x7f0000f22000)={0x0, 0x989680}, &(0x7f0000f14000)={&(0x7f0000553ff8), 0x8}) 21:24:00 executing program 7: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$hfsplus(&(0x7f0000000040)='hfsplus\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000300), 0x0, &(0x7f0000000380)) 21:24:00 executing program 2 (fault-call:0 fault-nth:60): syz_mount_image$gfs2(&(0x7f0000000040)='gfs2\x00', &(0x7f0000001740)='./file0\x00', 0x0, 0x0, &(0x7f0000001680), 0x0, &(0x7f0000000880)=ANY=[@ANYBLOB='l']) 21:24:00 executing program 4: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={&(0x7f00000000c0)=@in={0x2}, 0x80, &(0x7f00000003c0), 0x0, &(0x7f0000000040)}, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x89f2, &(0x7f0000000080)='ip6tnl0\x00') 21:24:00 executing program 1: r0 = open$dir(&(0x7f0000000100)='./file0\x00', 0x60840, 0x0) r1 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='9p\x00', 0x0, &(0x7f00000001c0)={'trans=fd,', {'rfdno', 0x3d}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c}) [ 151.560307] 9pnet: Insufficient options for proto=fd [ 151.561431] FAULT_INJECTION: forcing a failure. [ 151.561431] name failslab, interval 1, probability 0, space 0, times 0 [ 151.576734] CPU: 1 PID: 12802 Comm: syz-executor2 Not tainted 4.18.0-rc3-next-20180706+ #1 [ 151.585230] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 151.594595] Call Trace: [ 151.597198] dump_stack+0x1c9/0x2b4 [ 151.600935] ? dump_stack_print_info.cold.2+0x52/0x52 [ 151.606146] ? perf_trace_lock+0xde/0x920 [ 151.610313] should_fail.cold.4+0xa/0x11 [ 151.614401] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 151.619529] ? is_bpf_text_address+0xd7/0x170 [ 151.624074] ? kernel_text_address+0x79/0xf0 [ 151.628520] ? __kernel_text_address+0xd/0x40 [ 151.633033] ? unwind_get_return_address+0x61/0xa0 [ 151.638392] ? __save_stack_trace+0x8d/0xf0 [ 151.642775] ? lock_acquire+0x1e4/0x540 [ 151.646777] ? fs_reclaim_acquire+0x20/0x20 [ 151.651106] ? lock_downgrade+0x8f0/0x8f0 [ 151.655264] ? ksys_mount+0x12d/0x140 [ 151.659073] ? check_same_owner+0x340/0x340 [ 151.663406] ? rcu_note_context_switch+0x730/0x730 [ 151.668354] __should_failslab+0x124/0x180 [ 151.672599] should_failslab+0x9/0x14 [ 151.676415] kmem_cache_alloc_trace+0x2cb/0x780 [ 151.681078] ? kasan_kmalloc+0xc4/0xe0 [ 151.684980] __memcg_init_list_lru_node+0x185/0x2d0 [ 151.690018] ? kvfree_rcu+0x20/0x20 [ 151.693638] ? __kmalloc_node+0x47/0x70 [ 151.697608] __list_lru_init+0x4d6/0x840 [ 151.701661] ? up_write+0x7b/0x220 [ 151.705223] ? list_lru_destroy+0x500/0x500 [ 151.710685] ? prealloc_shrinker+0x124/0x450 [ 151.715089] ? prealloc_shrinker+0x21c/0x450 [ 151.719493] ? inactive_list_is_low+0x850/0x850 [ 151.724172] ? __lockdep_init_map+0x105/0x590 [ 151.728663] alloc_super+0x9a6/0xb10 [ 151.732380] ? destroy_unused_super.part.11+0x110/0x110 [ 151.737744] ? lock_downgrade+0x8f0/0x8f0 [ 151.741903] ? kasan_check_read+0x11/0x20 [ 151.746046] ? do_raw_spin_trylock+0x1c0/0x1c0 [ 151.750641] ? kasan_check_write+0x14/0x20 [ 151.754882] ? do_raw_spin_lock+0xc1/0x200 [ 151.759111] sget_userns+0x276/0x860 [ 151.762815] ? gfs2_kill_sb+0x1a0/0x1a0 [ 151.766806] ? fallocate_chunk.isra.15.cold.19+0x7c/0x7c [ 151.772263] ? vfs_get_super+0x270/0x270 [ 151.776330] ? kasan_check_read+0x11/0x20 [ 151.780483] ? do_raw_spin_unlock+0xa7/0x2f0 [ 151.784896] ? do_raw_spin_trylock+0x1c0/0x1c0 [ 151.789474] ? kasan_check_write+0x14/0x20 [ 151.793699] ? do_raw_spin_lock+0xc1/0x200 [ 151.797947] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 151.803648] ? ns_capable_common+0x13f/0x170 [ 151.808141] ? gfs2_kill_sb+0x1a0/0x1a0 [ 151.812902] sget+0x10b/0x150 [ 151.816003] ? fallocate_chunk.isra.15.cold.19+0x7c/0x7c [ 151.821464] gfs2_mount+0x1a7/0x712 [ 151.825114] ? fill_super+0x1a40/0x1a40 [ 151.829351] ? check_same_owner+0x340/0x340 [ 151.833669] ? debug_mutex_init+0x2d/0x60 [ 151.837818] ? kasan_unpoison_shadow+0x35/0x50 [ 151.842394] ? kasan_kmalloc+0xc4/0xe0 [ 151.846278] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 151.851813] ? fill_super+0x1a40/0x1a40 [ 151.855795] legacy_get_tree+0x118/0x440 [ 151.859852] vfs_get_tree+0x1cb/0x5c0 [ 151.863642] ? vfs_set_fs_source+0x12c/0x180 [ 151.868045] do_mount+0x6c1/0x1fb0 [ 151.871587] ? check_same_owner+0x340/0x340 [ 151.875904] ? lock_release+0xa30/0xa30 [ 151.879878] ? copy_mount_string+0x40/0x40 [ 151.884109] ? retint_kernel+0x10/0x10 [ 151.887995] ? copy_mount_options+0x1f0/0x380 [ 151.892612] ? copy_mount_options+0x206/0x380 [ 151.897127] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 151.902681] ? copy_mount_options+0x285/0x380 [ 151.907175] ksys_mount+0x12d/0x140 [ 151.910810] __x64_sys_mount+0xbe/0x150 [ 151.914784] do_syscall_64+0x1b9/0x820 [ 151.918664] ? finish_task_switch+0x1d3/0x870 [ 151.923166] ? syscall_return_slowpath+0x5e0/0x5e0 [ 151.928102] ? syscall_return_slowpath+0x31d/0x5e0 [ 151.933034] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 151.938053] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 151.943586] ? prepare_exit_to_usermode+0x291/0x3b0 [ 151.948608] ? perf_trace_sys_enter+0xb10/0xb10 [ 151.953279] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 151.958122] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 151.963315] RIP: 0033:0x45885a [ 151.966492] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 dd 8f fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 ba 8f fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 151.985805] RSP: 002b:00007fe773c40a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 151.993521] RAX: ffffffffffffffda RBX: 00007fe773c40b30 RCX: 000000000045885a [ 152.000782] RDX: 00007fe773c40ad0 RSI: 0000000020001740 RDI: 00007fe773c40af0 [ 152.008044] RBP: 0000000020001740 R08: 00007fe773c40b30 R09: 00007fe773c40ad0 [ 152.015303] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000014 [ 152.022574] R13: 0000000000000000 R14: 00000000004d3eb0 R15: 000000000000003c [ 152.034752] hfsplus: unable to find HFS+ superblock 21:24:01 executing program 0: syz_open_dev$sndseq(&(0x7f0000000000)='/dev/snd/seq\x00', 0x0, 0x0) userfaultfd(0x0) syz_open_dev$mice(&(0x7f0000000100)='/dev/input/mice\x00', 0x0, 0x0) pselect6(0x40, &(0x7f00000abfc0)={0x3ffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000000000}, &(0x7f0000768000), &(0x7f00007fbfc0), &(0x7f0000f22000)={0x0, 0x989680}, &(0x7f0000f14000)={&(0x7f0000553ff8), 0x8}) [ 152.062536] 9pnet: Insufficient options for proto=fd 21:24:01 executing program 7: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$hfsplus(&(0x7f0000000040)='hfsplus\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000300), 0x0, &(0x7f0000000380)) 21:24:01 executing program 1: r0 = open$dir(&(0x7f0000000100)='./file0\x00', 0x60840, 0x0) r1 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='9p\x00', 0x0, &(0x7f00000001c0)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {'wfdno', 0x3d}, 0x2c}) 21:24:01 executing program 3: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) socket$kcm(0x2, 0x3, 0x2) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x8955, &(0x7f0000000000)=0x2) 21:24:01 executing program 2 (fault-call:0 fault-nth:61): syz_mount_image$gfs2(&(0x7f0000000040)='gfs2\x00', &(0x7f0000001740)='./file0\x00', 0x0, 0x0, &(0x7f0000001680), 0x0, &(0x7f0000000880)=ANY=[@ANYBLOB='l']) [ 152.143798] 9pnet: Insufficient options for proto=fd 21:24:01 executing program 0: syz_open_dev$sndseq(&(0x7f0000000000)='/dev/snd/seq\x00', 0x0, 0x0) userfaultfd(0x0) syz_open_dev$mice(&(0x7f0000000100)='/dev/input/mice\x00', 0x0, 0x0) pselect6(0x40, &(0x7f00000abfc0)={0x3ffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x64000000}, &(0x7f0000768000), &(0x7f00007fbfc0), &(0x7f0000f22000)={0x0, 0x989680}, &(0x7f0000f14000)={&(0x7f0000553ff8), 0x8}) [ 152.194413] hfsplus: unable to find HFS+ superblock [ 152.291247] FAULT_INJECTION: forcing a failure. [ 152.291247] name failslab, interval 1, probability 0, space 0, times 0 [ 152.302556] CPU: 1 PID: 12854 Comm: syz-executor2 Not tainted 4.18.0-rc3-next-20180706+ #1 [ 152.310963] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 152.320328] Call Trace: [ 152.322908] dump_stack+0x1c9/0x2b4 [ 152.326528] ? dump_stack_print_info.cold.2+0x52/0x52 [ 152.331709] ? __kernel_text_address+0xd/0x40 [ 152.336197] ? unwind_get_return_address+0x61/0xa0 [ 152.341146] should_fail.cold.4+0xa/0x11 [ 152.345216] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 152.350327] ? save_stack+0xa9/0xd0 [ 152.353957] ? save_stack+0x43/0xd0 [ 152.357587] ? kasan_kmalloc+0xc4/0xe0 [ 152.361472] ? kmem_cache_alloc_trace+0x152/0x780 [ 152.366325] ? __memcg_init_list_lru_node+0x185/0x2d0 [ 152.371501] ? __list_lru_init+0x4d6/0x840 [ 152.375740] ? alloc_super+0x9a6/0xb10 [ 152.379635] ? sget+0x10b/0x150 [ 152.382927] ? gfs2_mount+0x1a7/0x712 [ 152.386743] ? legacy_get_tree+0x118/0x440 [ 152.390966] ? vfs_get_tree+0x1cb/0x5c0 [ 152.394945] ? do_mount+0x6c1/0x1fb0 [ 152.398651] ? ksys_mount+0x12d/0x140 [ 152.402463] ? __x64_sys_mount+0xbe/0x150 [ 152.406608] ? do_syscall_64+0x1b9/0x820 [ 152.410659] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 152.416033] ? save_stack+0xa9/0xd0 [ 152.419658] ? lock_acquire+0x1e4/0x540 [ 152.423620] ? fs_reclaim_acquire+0x20/0x20 [ 152.427947] ? lock_downgrade+0x8f0/0x8f0 [ 152.432105] ? ksys_mount+0x12d/0x140 [ 152.435910] ? check_same_owner+0x340/0x340 [ 152.440220] ? rcu_note_context_switch+0x730/0x730 [ 152.445154] __should_failslab+0x124/0x180 [ 152.449374] should_failslab+0x9/0x14 [ 152.453161] kmem_cache_alloc_trace+0x2cb/0x780 [ 152.457830] ? kasan_kmalloc+0xc4/0xe0 [ 152.461724] __memcg_init_list_lru_node+0x185/0x2d0 [ 152.466751] ? kvfree_rcu+0x20/0x20 [ 152.470391] ? __kmalloc_node+0x47/0x70 [ 152.474380] __list_lru_init+0x4d6/0x840 [ 152.478450] ? up_write+0x7b/0x220 [ 152.481998] ? list_lru_destroy+0x500/0x500 [ 152.486348] ? prealloc_shrinker+0x124/0x450 21:24:01 executing program 6: r0 = semget$private(0x0, 0x6, 0x0) unshare(0x40000) semtimedop(r0, &(0x7f00000000c0)=[{0x0, 0xfffffffffffffff9, 0x1000}], 0x1, &(0x7f0000efe000)={0x2000}) semctl$SETALL(r0, 0x0, 0x11, &(0x7f0000000000)) 21:24:01 executing program 4: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={&(0x7f00000000c0)=@in={0x2}, 0x80, &(0x7f00000003c0), 0x0, &(0x7f0000000040)}, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x89f2, &(0x7f0000000080)='ip6tnl0\x00') 21:24:01 executing program 1: r0 = open$dir(&(0x7f0000000100)='./file0\x00', 0x60840, 0x0) r1 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='9p\x00', 0x0, &(0x7f00000001c0)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {'wfdno', 0x3d}, 0x2c}) 21:24:01 executing program 3: 21:24:01 executing program 7: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$hfsplus(&(0x7f0000000040)='hfsplus\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000300), 0x0, &(0x7f0000000380)) 21:24:01 executing program 0: syz_open_dev$sndseq(&(0x7f0000000000)='/dev/snd/seq\x00', 0x0, 0x0) userfaultfd(0x0) syz_open_dev$mice(&(0x7f0000000100)='/dev/input/mice\x00', 0x0, 0x0) pselect6(0x40, &(0x7f00000abfc0)={0x3ffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x16000000}, &(0x7f0000768000), &(0x7f00007fbfc0), &(0x7f0000f22000)={0x0, 0x989680}, &(0x7f0000f14000)={&(0x7f0000553ff8), 0x8}) 21:24:01 executing program 5: [ 152.490745] ? prealloc_shrinker+0x21c/0x450 [ 152.495153] ? inactive_list_is_low+0x850/0x850 [ 152.499818] ? __lockdep_init_map+0x105/0x590 [ 152.504342] alloc_super+0x9a6/0xb10 [ 152.508077] ? destroy_unused_super.part.11+0x110/0x110 [ 152.513433] ? lock_downgrade+0x8f0/0x8f0 [ 152.517571] ? kasan_check_read+0x11/0x20 [ 152.521705] ? do_raw_spin_trylock+0x1c0/0x1c0 [ 152.526273] ? kasan_check_write+0x14/0x20 [ 152.530526] ? do_raw_spin_lock+0xc1/0x200 [ 152.534772] sget_userns+0x276/0x860 [ 152.538491] ? gfs2_kill_sb+0x1a0/0x1a0 21:24:01 executing program 5: [ 152.542474] ? fallocate_chunk.isra.15.cold.19+0x7c/0x7c [ 152.547935] ? vfs_get_super+0x270/0x270 [ 152.552004] ? kasan_check_read+0x11/0x20 [ 152.556210] ? do_raw_spin_unlock+0xa7/0x2f0 [ 152.560635] ? do_raw_spin_trylock+0x1c0/0x1c0 [ 152.565232] ? kasan_check_write+0x14/0x20 [ 152.569514] ? do_raw_spin_lock+0xc1/0x200 [ 152.573775] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 152.579442] ? ns_capable_common+0x13f/0x170 [ 152.583866] ? gfs2_kill_sb+0x1a0/0x1a0 [ 152.587850] sget+0x10b/0x150 [ 152.590969] ? fallocate_chunk.isra.15.cold.19+0x7c/0x7c [ 152.597355] gfs2_mount+0x1a7/0x712 [ 152.601170] ? fill_super+0x1a40/0x1a40 [ 152.605158] ? check_same_owner+0x340/0x340 [ 152.609580] ? debug_mutex_init+0x2d/0x60 [ 152.613751] ? kasan_unpoison_shadow+0x35/0x50 [ 152.618349] ? kasan_kmalloc+0xc4/0xe0 [ 152.622252] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 152.627806] ? fill_super+0x1a40/0x1a40 [ 152.631787] legacy_get_tree+0x118/0x440 [ 152.635858] vfs_get_tree+0x1cb/0x5c0 [ 152.639686] ? vfs_set_fs_source+0x12c/0x180 [ 152.644094] do_mount+0x6c1/0x1fb0 [ 152.647626] ? check_same_owner+0x340/0x340 [ 152.651936] ? lock_release+0xa30/0xa30 [ 152.655903] ? copy_mount_string+0x40/0x40 [ 152.660138] ? kasan_kmalloc+0xc4/0xe0 [ 152.664021] ? kmem_cache_alloc_trace+0x318/0x780 [ 152.668869] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 152.679283] ? _copy_from_user+0xdf/0x150 [ 152.683425] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 152.688952] ? copy_mount_options+0x285/0x380 [ 152.693442] ksys_mount+0x12d/0x140 [ 152.697061] __x64_sys_mount+0xbe/0x150 [ 152.701031] do_syscall_64+0x1b9/0x820 [ 152.704924] ? finish_task_switch+0x1d3/0x870 [ 152.709432] ? syscall_return_slowpath+0x5e0/0x5e0 [ 152.714362] ? syscall_return_slowpath+0x31d/0x5e0 [ 152.719285] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 152.724301] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 152.729839] ? prepare_exit_to_usermode+0x291/0x3b0 [ 152.734843] ? perf_trace_sys_enter+0xb10/0xb10 [ 152.739588] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 152.744422] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 152.749598] RIP: 0033:0x45885a [ 152.752771] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 dd 8f fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 ba 8f fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 152.772053] RSP: 002b:00007fe773c40a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 152.779765] RAX: ffffffffffffffda RBX: 00007fe773c40b30 RCX: 000000000045885a 21:24:01 executing program 5: 21:24:01 executing program 4: 21:24:01 executing program 3: [ 152.787041] RDX: 00007fe773c40ad0 RSI: 0000000020001740 RDI: 00007fe773c40af0 [ 152.794299] RBP: 0000000020001740 R08: 00007fe773c40b30 R09: 00007fe773c40ad0 [ 152.801558] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000014 [ 152.808820] R13: 0000000000000000 R14: 00000000004d3eb0 R15: 000000000000003d [ 152.824142] 9pnet: Insufficient options for proto=fd 21:24:01 executing program 1: r0 = open$dir(&(0x7f0000000100)='./file0\x00', 0x60840, 0x0) r1 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='9p\x00', 0x0, &(0x7f00000001c0)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {'wfdno', 0x3d}, 0x2c}) 21:24:01 executing program 0: syz_open_dev$sndseq(&(0x7f0000000000)='/dev/snd/seq\x00', 0x0, 0x0) userfaultfd(0x0) syz_open_dev$mice(&(0x7f0000000100)='/dev/input/mice\x00', 0x0, 0x0) pselect6(0x40, &(0x7f00000abfc0)={0x3ffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000}, &(0x7f0000768000), &(0x7f00007fbfc0), &(0x7f0000f22000)={0x0, 0x989680}, &(0x7f0000f14000)={&(0x7f0000553ff8), 0x8}) [ 152.881413] hfsplus: unable to find HFS+ superblock 21:24:01 executing program 4: 21:24:01 executing program 2 (fault-call:0 fault-nth:62): syz_mount_image$gfs2(&(0x7f0000000040)='gfs2\x00', &(0x7f0000001740)='./file0\x00', 0x0, 0x0, &(0x7f0000001680), 0x0, &(0x7f0000000880)=ANY=[@ANYBLOB='l']) 21:24:01 executing program 5: [ 152.956808] 9pnet: Insufficient options for proto=fd [ 153.016933] FAULT_INJECTION: forcing a failure. [ 153.016933] name failslab, interval 1, probability 0, space 0, times 0 [ 153.028311] CPU: 1 PID: 12903 Comm: syz-executor2 Not tainted 4.18.0-rc3-next-20180706+ #1 [ 153.036743] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 153.046113] Call Trace: [ 153.048718] dump_stack+0x1c9/0x2b4 [ 153.052374] ? dump_stack_print_info.cold.2+0x52/0x52 [ 153.057585] ? __kernel_text_address+0xd/0x40 [ 153.062099] ? unwind_get_return_address+0x61/0xa0 [ 153.067052] should_fail.cold.4+0xa/0x11 [ 153.071143] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 153.076306] ? save_stack+0xa9/0xd0 [ 153.079977] ? save_stack+0x43/0xd0 [ 153.083633] ? kasan_kmalloc+0xc4/0xe0 [ 153.087571] ? kmem_cache_alloc_trace+0x152/0x780 [ 153.092519] ? __memcg_init_list_lru_node+0x185/0x2d0 [ 153.097731] ? __list_lru_init+0x4d6/0x840 [ 153.102071] ? alloc_super+0x9a6/0xb10 [ 153.105980] ? sget+0x10b/0x150 [ 153.109280] ? gfs2_mount+0x1a7/0x712 [ 153.113087] ? legacy_get_tree+0x118/0x440 [ 153.117315] ? vfs_get_tree+0x1cb/0x5c0 [ 153.121277] ? do_mount+0x6c1/0x1fb0 [ 153.124975] ? ksys_mount+0x12d/0x140 [ 153.128770] ? __x64_sys_mount+0xbe/0x150 [ 153.132903] ? do_syscall_64+0x1b9/0x820 [ 153.136953] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 153.142308] ? save_stack+0xa9/0xd0 [ 153.145928] ? lock_acquire+0x1e4/0x540 [ 153.149916] ? fs_reclaim_acquire+0x20/0x20 [ 153.154267] ? lock_downgrade+0x8f0/0x8f0 [ 153.158410] ? ksys_mount+0x12d/0x140 [ 153.162205] ? check_same_owner+0x340/0x340 [ 153.166516] ? rcu_note_context_switch+0x730/0x730 [ 153.171439] __should_failslab+0x124/0x180 [ 153.175686] should_failslab+0x9/0x14 [ 153.179478] kmem_cache_alloc_trace+0x2cb/0x780 [ 153.184145] ? kasan_kmalloc+0xc4/0xe0 [ 153.188034] __memcg_init_list_lru_node+0x185/0x2d0 [ 153.193051] ? kvfree_rcu+0x20/0x20 [ 153.196670] ? __kmalloc_node+0x47/0x70 [ 153.200650] __list_lru_init+0x4d6/0x840 [ 153.204699] ? up_write+0x7b/0x220 [ 153.208222] ? list_lru_destroy+0x500/0x500 [ 153.212628] ? prealloc_shrinker+0x124/0x450 [ 153.217031] ? prealloc_shrinker+0x21c/0x450 [ 153.221433] ? inactive_list_is_low+0x850/0x850 [ 153.226118] ? __lockdep_init_map+0x105/0x590 [ 153.230622] alloc_super+0x9a6/0xb10 [ 153.234330] ? destroy_unused_super.part.11+0x110/0x110 [ 153.239688] ? lock_downgrade+0x8f0/0x8f0 [ 153.245396] ? kasan_check_read+0x11/0x20 [ 153.249535] ? do_raw_spin_trylock+0x1c0/0x1c0 [ 153.254217] ? kasan_check_write+0x14/0x20 [ 153.258534] ? do_raw_spin_lock+0xc1/0x200 [ 153.262761] sget_userns+0x276/0x860 [ 153.266473] ? gfs2_kill_sb+0x1a0/0x1a0 [ 153.270454] ? fallocate_chunk.isra.15.cold.19+0x7c/0x7c [ 153.275904] ? vfs_get_super+0x270/0x270 [ 153.279966] ? kasan_check_read+0x11/0x20 [ 153.285331] ? do_raw_spin_unlock+0xa7/0x2f0 [ 153.289728] ? do_raw_spin_trylock+0x1c0/0x1c0 [ 153.294313] ? kasan_check_write+0x14/0x20 [ 153.298534] ? do_raw_spin_lock+0xc1/0x200 [ 153.302766] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 153.308297] ? ns_capable_common+0x13f/0x170 [ 153.312708] ? gfs2_kill_sb+0x1a0/0x1a0 [ 153.316687] sget+0x10b/0x150 [ 153.319784] ? fallocate_chunk.isra.15.cold.19+0x7c/0x7c [ 153.325246] gfs2_mount+0x1a7/0x712 [ 153.328881] ? fill_super+0x1a40/0x1a40 [ 153.332863] ? check_same_owner+0x340/0x340 [ 153.337186] ? debug_mutex_init+0x2d/0x60 [ 153.341328] ? kasan_unpoison_shadow+0x35/0x50 [ 153.346074] ? kasan_kmalloc+0xc4/0xe0 [ 153.349954] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 153.355496] ? fill_super+0x1a40/0x1a40 [ 153.359460] legacy_get_tree+0x118/0x440 [ 153.363514] vfs_get_tree+0x1cb/0x5c0 [ 153.367310] ? vfs_set_fs_source+0x12c/0x180 [ 153.371708] do_mount+0x6c1/0x1fb0 [ 153.375245] ? check_same_owner+0x340/0x340 [ 153.379552] ? lock_release+0xa30/0xa30 [ 153.383536] ? copy_mount_string+0x40/0x40 [ 153.387760] ? kasan_kmalloc+0xc4/0xe0 [ 153.391638] ? kmem_cache_alloc_trace+0x318/0x780 [ 153.396473] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 153.402019] ? _copy_from_user+0xdf/0x150 [ 153.406159] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 153.411726] ? copy_mount_options+0x285/0x380 [ 153.416219] ksys_mount+0x12d/0x140 [ 153.419834] __x64_sys_mount+0xbe/0x150 [ 153.423811] do_syscall_64+0x1b9/0x820 [ 153.427685] ? finish_task_switch+0x1d3/0x870 [ 153.432181] ? syscall_return_slowpath+0x5e0/0x5e0 [ 153.437098] ? syscall_return_slowpath+0x31d/0x5e0 [ 153.442045] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 153.447049] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 153.452582] ? prepare_exit_to_usermode+0x291/0x3b0 [ 153.457601] ? perf_trace_sys_enter+0xb10/0xb10 [ 153.462260] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 153.467200] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 153.472397] RIP: 0033:0x45885a [ 153.475596] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 dd 8f fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 ba 8f fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 153.494856] RSP: 002b:00007fe773c40a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 153.502552] RAX: ffffffffffffffda RBX: 00007fe773c40b30 RCX: 000000000045885a [ 153.509829] RDX: 00007fe773c40ad0 RSI: 0000000020001740 RDI: 00007fe773c40af0 [ 153.517087] RBP: 0000000020001740 R08: 00007fe773c40b30 R09: 00007fe773c40ad0 [ 153.524359] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000014 [ 153.531614] R13: 0000000000000000 R14: 00000000004d3eb0 R15: 000000000000003e 21:24:02 executing program 6: r0 = semget$private(0x0, 0x6, 0x0) unshare(0x40000) semtimedop(r0, &(0x7f00000000c0)=[{0x0, 0xfffffffffffffff9, 0x1000}], 0x1, &(0x7f0000efe000)={0x2000}) semctl$SETALL(r0, 0x0, 0x11, &(0x7f0000000000)) 21:24:02 executing program 3: 21:24:02 executing program 7: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$hfsplus(&(0x7f0000000040)='hfsplus\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000300), 0x0, &(0x7f0000000380)) 21:24:02 executing program 1: 21:24:02 executing program 0: syz_open_dev$sndseq(&(0x7f0000000000)='/dev/snd/seq\x00', 0x0, 0x0) userfaultfd(0x0) syz_open_dev$mice(&(0x7f0000000100)='/dev/input/mice\x00', 0x0, 0x0) pselect6(0x40, &(0x7f00000abfc0)={0x3ffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000}, &(0x7f0000768000), &(0x7f00007fbfc0), &(0x7f0000f22000)={0x0, 0x989680}, &(0x7f0000f14000)={&(0x7f0000553ff8), 0x8}) 21:24:02 executing program 4: 21:24:02 executing program 5: 21:24:02 executing program 2 (fault-call:0 fault-nth:63): syz_mount_image$gfs2(&(0x7f0000000040)='gfs2\x00', &(0x7f0000001740)='./file0\x00', 0x0, 0x0, &(0x7f0000001680), 0x0, &(0x7f0000000880)=ANY=[@ANYBLOB='l']) 21:24:02 executing program 1: 21:24:02 executing program 4: [ 153.689380] hfsplus: unable to find HFS+ superblock [ 153.703868] FAULT_INJECTION: forcing a failure. [ 153.703868] name failslab, interval 1, probability 0, space 0, times 0 [ 153.715409] CPU: 0 PID: 12923 Comm: syz-executor2 Not tainted 4.18.0-rc3-next-20180706+ #1 [ 153.723824] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 153.733333] Call Trace: [ 153.735931] dump_stack+0x1c9/0x2b4 [ 153.739559] ? dump_stack_print_info.cold.2+0x52/0x52 [ 153.744746] ? perf_trace_lock+0xde/0x920 [ 153.748909] should_fail.cold.4+0xa/0x11 [ 153.752978] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 153.758080] ? save_stack+0xa9/0xd0 [ 153.761703] ? save_stack+0x43/0xd0 [ 153.765335] ? kasan_kmalloc+0xc4/0xe0 [ 153.769242] ? kmem_cache_alloc_trace+0x152/0x780 [ 153.774095] ? __memcg_init_list_lru_node+0x185/0x2d0 [ 153.779274] ? __list_lru_init+0x4d6/0x840 [ 153.783500] ? alloc_super+0x9a6/0xb10 [ 153.787380] ? sget+0x10b/0x150 [ 153.790659] ? gfs2_mount+0x1a7/0x712 [ 153.794463] ? vfs_get_tree+0x1cb/0x5c0 [ 153.798443] ? do_mount+0x6c1/0x1fb0 [ 153.802167] ? ksys_mount+0x12d/0x140 [ 153.805957] ? __x64_sys_mount+0xbe/0x150 [ 153.810119] ? do_syscall_64+0x1b9/0x820 [ 153.814173] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 153.819562] ? lock_acquire+0x1e4/0x540 [ 153.823551] ? fs_reclaim_acquire+0x20/0x20 [ 153.827974] ? lock_downgrade+0x8f0/0x8f0 [ 153.832122] ? ksys_mount+0x12d/0x140 [ 153.835934] ? check_same_owner+0x340/0x340 [ 153.840266] ? rcu_note_context_switch+0x730/0x730 [ 153.845195] __should_failslab+0x124/0x180 [ 153.849430] should_failslab+0x9/0x14 [ 153.853240] kmem_cache_alloc_trace+0x2cb/0x780 [ 153.857907] ? kasan_kmalloc+0xc4/0xe0 [ 153.861804] __memcg_init_list_lru_node+0x185/0x2d0 [ 153.866822] ? kvfree_rcu+0x20/0x20 [ 153.870443] ? __kmalloc_node+0x47/0x70 [ 153.874442] __list_lru_init+0x4d6/0x840 [ 153.878504] ? up_write+0x7b/0x220 [ 153.882059] ? list_lru_destroy+0x500/0x500 [ 153.886368] ? prealloc_shrinker+0x124/0x450 [ 153.890772] ? prealloc_shrinker+0x21c/0x450 [ 153.895173] ? inactive_list_is_low+0x850/0x850 [ 153.899851] ? __lockdep_init_map+0x105/0x590 [ 153.904353] alloc_super+0x9a6/0xb10 [ 153.908064] ? destroy_unused_super.part.11+0x110/0x110 [ 153.913422] ? lock_downgrade+0x8f0/0x8f0 [ 153.917562] ? kasan_check_read+0x11/0x20 [ 153.921701] ? do_raw_spin_trylock+0x1c0/0x1c0 [ 153.926300] ? kasan_check_write+0x14/0x20 [ 153.930546] ? do_raw_spin_lock+0xc1/0x200 [ 153.934785] sget_userns+0x276/0x860 [ 153.938503] ? gfs2_kill_sb+0x1a0/0x1a0 [ 153.942492] ? fallocate_chunk.isra.15.cold.19+0x7c/0x7c [ 153.947933] ? vfs_get_super+0x270/0x270 [ 153.951991] ? kasan_check_read+0x11/0x20 [ 153.956135] ? do_raw_spin_unlock+0xa7/0x2f0 [ 153.960530] ? do_raw_spin_trylock+0x1c0/0x1c0 [ 153.965100] ? kasan_check_write+0x14/0x20 [ 153.969335] ? do_raw_spin_lock+0xc1/0x200 [ 153.973587] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 153.979139] ? ns_capable_common+0x13f/0x170 [ 153.983552] ? gfs2_kill_sb+0x1a0/0x1a0 [ 153.987512] sget+0x10b/0x150 [ 153.990619] ? fallocate_chunk.isra.15.cold.19+0x7c/0x7c [ 153.996059] gfs2_mount+0x1a7/0x712 [ 153.999696] ? fill_super+0x1a40/0x1a40 [ 154.003671] ? check_same_owner+0x340/0x340 [ 154.008000] ? debug_mutex_init+0x2d/0x60 [ 154.012164] ? kasan_unpoison_shadow+0x35/0x50 [ 154.016736] ? kasan_kmalloc+0xc4/0xe0 [ 154.020630] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 154.026172] ? fill_super+0x1a40/0x1a40 [ 154.030163] legacy_get_tree+0x118/0x440 [ 154.034232] vfs_get_tree+0x1cb/0x5c0 [ 154.038038] ? vfs_set_fs_source+0x12c/0x180 [ 154.042440] do_mount+0x6c1/0x1fb0 [ 154.045979] ? check_same_owner+0x340/0x340 [ 154.050288] ? lock_release+0xa30/0xa30 [ 154.054271] ? copy_mount_string+0x40/0x40 [ 154.058507] ? kasan_kmalloc+0xc4/0xe0 [ 154.062401] ? kmem_cache_alloc_trace+0x318/0x780 [ 154.067259] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 154.072801] ? _copy_from_user+0xdf/0x150 [ 154.076960] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 154.082513] ? copy_mount_options+0x285/0x380 [ 154.087206] ksys_mount+0x12d/0x140 [ 154.090823] __x64_sys_mount+0xbe/0x150 [ 154.094788] do_syscall_64+0x1b9/0x820 [ 154.098673] ? finish_task_switch+0x1d3/0x870 [ 154.103173] ? syscall_return_slowpath+0x5e0/0x5e0 [ 154.108103] ? syscall_return_slowpath+0x31d/0x5e0 [ 154.113035] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 154.118047] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 154.123596] ? prepare_exit_to_usermode+0x291/0x3b0 [ 154.128659] ? perf_trace_sys_enter+0xb10/0xb10 [ 154.133339] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 154.138182] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 154.143360] RIP: 0033:0x45885a [ 154.146539] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 dd 8f fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 ba 8f fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 154.165711] RSP: 002b:00007fe773c40a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 154.173410] RAX: ffffffffffffffda RBX: 00007fe773c40b30 RCX: 000000000045885a [ 154.180762] RDX: 00007fe773c40ad0 RSI: 0000000020001740 RDI: 00007fe773c40af0 21:24:03 executing program 3: 21:24:03 executing program 5: [ 154.188044] RBP: 0000000020001740 R08: 00007fe773c40b30 R09: 00007fe773c40ad0 [ 154.195312] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000014 [ 154.202569] R13: 0000000000000000 R14: 00000000004d3eb0 R15: 000000000000003f 21:24:03 executing program 2 (fault-call:0 fault-nth:64): syz_mount_image$gfs2(&(0x7f0000000040)='gfs2\x00', &(0x7f0000001740)='./file0\x00', 0x0, 0x0, &(0x7f0000001680), 0x0, &(0x7f0000000880)=ANY=[@ANYBLOB='l']) 21:24:03 executing program 3: 21:24:03 executing program 0: syz_open_dev$sndseq(&(0x7f0000000000)='/dev/snd/seq\x00', 0x0, 0x0) userfaultfd(0x0) syz_open_dev$mice(&(0x7f0000000100)='/dev/input/mice\x00', 0x0, 0x0) pselect6(0x40, &(0x7f00000abfc0)={0x3ffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6000}, &(0x7f0000768000), &(0x7f00007fbfc0), &(0x7f0000f22000)={0x0, 0x989680}, &(0x7f0000f14000)={&(0x7f0000553ff8), 0x8}) 21:24:03 executing program 5: [ 154.369231] FAULT_INJECTION: forcing a failure. [ 154.369231] name failslab, interval 1, probability 0, space 0, times 0 [ 154.380547] CPU: 0 PID: 12954 Comm: syz-executor2 Not tainted 4.18.0-rc3-next-20180706+ #1 [ 154.388957] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 154.398315] Call Trace: [ 154.400925] dump_stack+0x1c9/0x2b4 [ 154.404580] ? dump_stack_print_info.cold.2+0x52/0x52 [ 154.409791] ? __kernel_text_address+0xd/0x40 [ 154.414302] ? unwind_get_return_address+0x61/0xa0 [ 154.419250] should_fail.cold.4+0xa/0x11 [ 154.423330] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 154.428460] ? save_stack+0xa9/0xd0 [ 154.432117] ? save_stack+0x43/0xd0 [ 154.435735] ? kasan_kmalloc+0xc4/0xe0 [ 154.439642] ? kmem_cache_alloc_trace+0x152/0x780 [ 154.444488] ? __memcg_init_list_lru_node+0x185/0x2d0 [ 154.449676] ? __list_lru_init+0x4d6/0x840 [ 154.453909] ? alloc_super+0x9a6/0xb10 [ 154.457800] ? sget+0x10b/0x150 [ 154.461067] ? gfs2_mount+0x1a7/0x712 [ 154.464853] ? legacy_get_tree+0x118/0x440 [ 154.469076] ? vfs_get_tree+0x1cb/0x5c0 [ 154.473042] ? do_mount+0x6c1/0x1fb0 [ 154.476753] ? ksys_mount+0x12d/0x140 [ 154.480549] ? __x64_sys_mount+0xbe/0x150 [ 154.484690] ? do_syscall_64+0x1b9/0x820 [ 154.488737] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 154.494099] ? save_stack+0xa9/0xd0 [ 154.497726] ? lock_acquire+0x1e4/0x540 [ 154.501690] ? fs_reclaim_acquire+0x20/0x20 [ 154.505999] ? lock_downgrade+0x8f0/0x8f0 [ 154.510146] ? ksys_mount+0x12d/0x140 [ 154.513952] ? check_same_owner+0x340/0x340 [ 154.518295] ? rcu_note_context_switch+0x730/0x730 [ 154.523216] __should_failslab+0x124/0x180 [ 154.527443] should_failslab+0x9/0x14 [ 154.531259] kmem_cache_alloc_trace+0x2cb/0x780 [ 154.535931] ? kasan_kmalloc+0xc4/0xe0 [ 154.539811] __memcg_init_list_lru_node+0x185/0x2d0 [ 154.544835] ? kvfree_rcu+0x20/0x20 [ 154.548449] ? __kmalloc_node+0x47/0x70 [ 154.552426] __list_lru_init+0x4d6/0x840 [ 154.556483] ? up_write+0x7b/0x220 [ 154.560039] ? list_lru_destroy+0x500/0x500 [ 154.564347] ? prealloc_shrinker+0x124/0x450 [ 154.568752] ? prealloc_shrinker+0x21c/0x450 [ 154.573148] ? inactive_list_is_low+0x850/0x850 [ 154.577804] ? __lockdep_init_map+0x105/0x590 [ 154.582287] alloc_super+0x9a6/0xb10 [ 154.585987] ? destroy_unused_super.part.11+0x110/0x110 [ 154.591351] ? lock_downgrade+0x8f0/0x8f0 [ 154.595516] ? kasan_check_read+0x11/0x20 [ 154.599674] ? do_raw_spin_trylock+0x1c0/0x1c0 [ 154.604271] ? kasan_check_write+0x14/0x20 [ 154.608520] ? do_raw_spin_lock+0xc1/0x200 [ 154.612771] sget_userns+0x276/0x860 [ 154.616496] ? gfs2_kill_sb+0x1a0/0x1a0 [ 154.620488] ? fallocate_chunk.isra.15.cold.19+0x7c/0x7c [ 154.625942] ? vfs_get_super+0x270/0x270 [ 154.630008] ? kasan_check_read+0x11/0x20 [ 154.634167] ? do_raw_spin_unlock+0xa7/0x2f0 [ 154.638567] ? do_raw_spin_trylock+0x1c0/0x1c0 [ 154.643144] ? kasan_check_write+0x14/0x20 [ 154.647383] ? do_raw_spin_lock+0xc1/0x200 [ 154.651639] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 154.657169] ? ns_capable_common+0x13f/0x170 [ 154.661607] ? gfs2_kill_sb+0x1a0/0x1a0 [ 154.665581] sget+0x10b/0x150 [ 154.668696] ? fallocate_chunk.isra.15.cold.19+0x7c/0x7c [ 154.674151] gfs2_mount+0x1a7/0x712 [ 154.677780] ? fill_super+0x1a40/0x1a40 [ 154.681746] ? kasan_check_write+0x14/0x20 [ 154.685967] ? do_raw_spin_lock+0xc1/0x200 [ 154.690549] ? kasan_unpoison_shadow+0x35/0x50 [ 154.695131] ? kasan_kmalloc+0xc4/0xe0 [ 154.699026] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 154.704571] ? fill_super+0x1a40/0x1a40 [ 154.708552] legacy_get_tree+0x118/0x440 [ 154.712613] vfs_get_tree+0x1cb/0x5c0 [ 154.716609] ? vfs_set_fs_source+0x12c/0x180 [ 154.721019] do_mount+0x6c1/0x1fb0 [ 154.724550] ? kasan_check_write+0x14/0x20 [ 154.728798] ? copy_mount_string+0x40/0x40 [ 154.733028] ? kasan_kmalloc+0xc4/0xe0 [ 154.736909] ? kmem_cache_alloc_trace+0x318/0x780 [ 154.741764] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 154.747308] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 154.752834] ? copy_mount_options+0x285/0x380 [ 154.757335] ksys_mount+0x12d/0x140 [ 154.760979] __x64_sys_mount+0xbe/0x150 [ 154.765044] do_syscall_64+0x1b9/0x820 [ 154.768919] ? finish_task_switch+0x1d3/0x870 [ 154.773402] ? syscall_return_slowpath+0x5e0/0x5e0 [ 154.778319] ? syscall_return_slowpath+0x31d/0x5e0 [ 154.783235] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 154.788238] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 154.793848] ? prepare_exit_to_usermode+0x291/0x3b0 [ 154.799818] ? perf_trace_sys_enter+0xb10/0xb10 [ 154.804484] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 154.809330] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 154.814506] RIP: 0033:0x45885a [ 154.817677] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 dd 8f fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 ba 8f fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 154.837040] RSP: 002b:00007fe773c40a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 154.844738] RAX: ffffffffffffffda RBX: 00007fe773c40b30 RCX: 000000000045885a [ 154.852010] RDX: 00007fe773c40ad0 RSI: 0000000020001740 RDI: 00007fe773c40af0 [ 154.859280] RBP: 0000000020001740 R08: 00007fe773c40b30 R09: 00007fe773c40ad0 21:24:03 executing program 6: r0 = semget$private(0x0, 0x6, 0x0) unshare(0x40000) semop(r0, &(0x7f00008d8000)=[{0x0, 0x0, 0xffffffffffffffff}], 0x1) semctl$SETALL(r0, 0x0, 0x11, &(0x7f0000000000)) 21:24:03 executing program 7: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$hfsplus(&(0x7f0000000040)='hfsplus\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000300), 0x0, &(0x7f0000000380)) 21:24:03 executing program 1: 21:24:03 executing program 4: 21:24:03 executing program 5: 21:24:03 executing program 3: 21:24:03 executing program 1: 21:24:03 executing program 5: 21:24:03 executing program 3: mkdir(&(0x7f0000000000)='./file1\x00', 0x0) r0 = open(&(0x7f0000000080)='./file1\x00', 0x0, 0x0) mkdirat(r0, &(0x7f0000000240)='./file1\x00', 0x0) faccessat(r0, &(0x7f00000000c0)='./file1\x00', 0x1, 0x1000) [ 154.866543] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000014 [ 154.873798] R13: 0000000000000000 R14: 00000000004d3eb0 R15: 0000000000000040 21:24:03 executing program 0: syz_open_dev$sndseq(&(0x7f0000000000)='/dev/snd/seq\x00', 0x0, 0x0) userfaultfd(0x0) syz_open_dev$mice(&(0x7f0000000100)='/dev/input/mice\x00', 0x0, 0x0) pselect6(0x40, &(0x7f00000abfc0)={0x3ffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000}, &(0x7f0000768000), &(0x7f00007fbfc0), &(0x7f0000f22000)={0x0, 0x989680}, &(0x7f0000f14000)={&(0x7f0000553ff8), 0x8}) 21:24:04 executing program 2 (fault-call:0 fault-nth:65): syz_mount_image$gfs2(&(0x7f0000000040)='gfs2\x00', &(0x7f0000001740)='./file0\x00', 0x0, 0x0, &(0x7f0000001680), 0x0, &(0x7f0000000880)=ANY=[@ANYBLOB='l']) 21:24:04 executing program 4: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) r1 = dup2(r0, r0) mkdirat(r1, &(0x7f0000000100)='./file0\x00', 0x0) openat(r1, &(0x7f0000000040)='./file0\x00', 0x200, 0x97) 21:24:04 executing program 1: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) r1 = dup2(r0, r0) openat(r1, &(0x7f0000002500)='./file0\x00', 0x940, 0x81) 21:24:04 executing program 5: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) r1 = dup2(r0, r0) mkdirat(r1, &(0x7f0000000100)='./file0\x00', 0x0) openat(r1, &(0x7f0000000140)='./file0\x00', 0x200, 0x40080) 21:24:04 executing program 6: r0 = semget$private(0x0, 0x6, 0x0) unshare(0x40000) semop(r0, &(0x7f00008d8000)=[{0x0, 0x0, 0xffffffffffffffff}], 0x1) semctl$SETALL(r0, 0x0, 0x11, &(0x7f0000000000)) 21:24:04 executing program 3: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) mkdirat(r0, &(0x7f00000000c0)='./file0\x00', 0x0) r1 = dup(r0) futimesat(r1, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)={{}, {0x77359400}}) 21:24:04 executing program 4: mkdir(&(0x7f0000000500)='./file1\x00', 0x0) r0 = open(&(0x7f0000000080)='./file1\x00', 0x0, 0x0) mkdirat(r0, &(0x7f0000000100)='./file1\x00', 0x0) openat(r0, &(0x7f0000000000)='./file1\x00', 0x480000, 0x20) [ 155.175482] hfsplus: unable to find HFS+ superblock [ 155.192175] FAULT_INJECTION: forcing a failure. [ 155.192175] name failslab, interval 1, probability 0, space 0, times 0 [ 155.203600] CPU: 1 PID: 13016 Comm: syz-executor2 Not tainted 4.18.0-rc3-next-20180706+ #1 [ 155.212015] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 155.221379] Call Trace: [ 155.222651] hfsplus: unable to find HFS+ superblock [ 155.224024] dump_stack+0x1c9/0x2b4 [ 155.224049] ? dump_stack_print_info.cold.2+0x52/0x52 [ 155.224073] ? __kernel_text_address+0xd/0x40 [ 155.242371] ? unwind_get_return_address+0x61/0xa0 [ 155.247343] should_fail.cold.4+0xa/0x11 [ 155.251401] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 155.256494] ? save_stack+0xa9/0xd0 [ 155.260147] ? save_stack+0x43/0xd0 [ 155.263765] ? kasan_kmalloc+0xc4/0xe0 [ 155.267649] ? kmem_cache_alloc_trace+0x152/0x780 [ 155.272493] ? __memcg_init_list_lru_node+0x185/0x2d0 [ 155.277679] ? __list_lru_init+0x4d6/0x840 [ 155.281910] ? alloc_super+0x9a6/0xb10 [ 155.285793] ? sget+0x10b/0x150 [ 155.289068] ? gfs2_mount+0x1a7/0x712 [ 155.292854] ? legacy_get_tree+0x118/0x440 [ 155.297077] ? vfs_get_tree+0x1cb/0x5c0 [ 155.301053] ? do_mount+0x6c1/0x1fb0 [ 155.304750] ? ksys_mount+0x12d/0x140 [ 155.308534] ? __x64_sys_mount+0xbe/0x150 [ 155.312668] ? do_syscall_64+0x1b9/0x820 [ 155.316812] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 155.322163] ? __sched_text_start+0x8/0x8 [ 155.326579] ? lock_acquire+0x1e4/0x540 [ 155.330547] ? fs_reclaim_acquire+0x20/0x20 [ 155.334851] ? lock_downgrade+0x8f0/0x8f0 [ 155.338994] ? ksys_mount+0x12d/0x140 [ 155.342786] ? check_same_owner+0x340/0x340 [ 155.347105] ? rcu_note_context_switch+0x730/0x730 [ 155.352024] __should_failslab+0x124/0x180 [ 155.356253] should_failslab+0x9/0x14 [ 155.360058] kmem_cache_alloc_trace+0x2cb/0x780 [ 155.364713] ? kasan_kmalloc+0xc4/0xe0 [ 155.368587] __memcg_init_list_lru_node+0x185/0x2d0 [ 155.373587] ? kvfree_rcu+0x20/0x20 [ 155.377200] ? __kmalloc_node+0x47/0x70 [ 155.381158] __list_lru_init+0x4d6/0x840 [ 155.385204] ? up_write+0x7b/0x220 [ 155.388728] ? list_lru_destroy+0x500/0x500 [ 155.393040] ? prealloc_shrinker+0x124/0x450 [ 155.397436] ? prealloc_shrinker+0x21c/0x450 [ 155.401837] ? inactive_list_is_low+0x850/0x850 [ 155.406501] ? __lockdep_init_map+0x105/0x590 [ 155.410982] alloc_super+0x9a6/0xb10 [ 155.414703] ? destroy_unused_super.part.11+0x110/0x110 [ 155.420060] ? lock_downgrade+0x8f0/0x8f0 [ 155.424236] ? kasan_check_read+0x11/0x20 [ 155.428370] ? do_raw_spin_trylock+0x1c0/0x1c0 [ 155.432951] ? kasan_check_write+0x14/0x20 [ 155.437172] ? do_raw_spin_lock+0xc1/0x200 [ 155.441404] sget_userns+0x276/0x860 [ 155.445106] ? gfs2_kill_sb+0x1a0/0x1a0 [ 155.449066] ? fallocate_chunk.isra.15.cold.19+0x7c/0x7c [ 155.454503] ? vfs_get_super+0x270/0x270 [ 155.458564] ? kasan_check_read+0x11/0x20 [ 155.462697] ? do_raw_spin_unlock+0xa7/0x2f0 [ 155.467098] ? do_raw_spin_trylock+0x1c0/0x1c0 [ 155.471928] ? kasan_check_write+0x14/0x20 [ 155.476157] ? do_raw_spin_lock+0xc1/0x200 [ 155.480388] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 155.485913] ? ns_capable_common+0x13f/0x170 [ 155.490318] ? gfs2_kill_sb+0x1a0/0x1a0 [ 155.494293] sget+0x10b/0x150 [ 155.497420] ? fallocate_chunk.isra.15.cold.19+0x7c/0x7c [ 155.502860] gfs2_mount+0x1a7/0x712 [ 155.506477] ? fill_super+0x1a40/0x1a40 [ 155.510446] ? kasan_check_write+0x14/0x20 [ 155.514663] ? do_raw_spin_lock+0xc1/0x200 [ 155.518883] ? kasan_unpoison_shadow+0x35/0x50 [ 155.523458] ? kasan_kmalloc+0xc4/0xe0 [ 155.527341] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 155.532865] ? fill_super+0x1a40/0x1a40 [ 155.536825] legacy_get_tree+0x118/0x440 [ 155.541219] vfs_get_tree+0x1cb/0x5c0 [ 155.545021] ? vfs_set_fs_source+0x12c/0x180 [ 155.549414] do_mount+0x6c1/0x1fb0 [ 155.552950] ? check_same_owner+0x340/0x340 [ 155.557258] ? lock_release+0xa30/0xa30 [ 155.561218] ? copy_mount_string+0x40/0x40 [ 155.565448] ? kasan_kmalloc+0xc4/0xe0 [ 155.569332] ? kmem_cache_alloc_trace+0x318/0x780 [ 155.574161] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 155.579684] ? _copy_from_user+0xdf/0x150 [ 155.583828] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 155.589348] ? copy_mount_options+0x285/0x380 [ 155.593829] ksys_mount+0x12d/0x140 [ 155.597439] __x64_sys_mount+0xbe/0x150 [ 155.601408] do_syscall_64+0x1b9/0x820 [ 155.605278] ? finish_task_switch+0x1d3/0x870 [ 155.609756] ? syscall_return_slowpath+0x5e0/0x5e0 [ 155.614841] ? syscall_return_slowpath+0x31d/0x5e0 [ 155.619771] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 155.624776] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 155.630306] ? prepare_exit_to_usermode+0x291/0x3b0 [ 155.635309] ? perf_trace_sys_enter+0xb10/0xb10 [ 155.639979] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 155.644847] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 155.650025] RIP: 0033:0x45885a [ 155.653205] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 dd 8f fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 ba 8f fb ff c3 66 0f 1f 84 00 00 00 00 00 21:24:04 executing program 5: mkdir(&(0x7f0000000500)='./file1\x00', 0x0) r0 = open(&(0x7f0000000080)='./file1\x00', 0x0, 0x0) mkdirat(r0, &(0x7f00000001c0)='./file1\x00', 0x0) faccessat(r0, &(0x7f0000000140)='./file1\x00', 0x1, 0x800) 21:24:04 executing program 0: syz_open_dev$sndseq(&(0x7f0000000000)='/dev/snd/seq\x00', 0x0, 0x0) userfaultfd(0x0) syz_open_dev$mice(&(0x7f0000000100)='/dev/input/mice\x00', 0x0, 0x0) pselect6(0x40, &(0x7f00000abfc0)={0x3ffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000}, &(0x7f0000768000), &(0x7f00007fbfc0), &(0x7f0000f22000)={0x0, 0x989680}, &(0x7f0000f14000)={&(0x7f0000553ff8), 0x8}) 21:24:04 executing program 1: mkdir(&(0x7f0000000500)='./file1\x00', 0x0) r0 = open(&(0x7f0000000080)='./file1\x00', 0x0, 0x0) mkdirat(r0, &(0x7f0000000100)='./file1\x00', 0x0) openat(r0, &(0x7f0000000000)='./file1\x00', 0x100, 0x21) 21:24:04 executing program 6: r0 = semget$private(0x0, 0x6, 0x0) unshare(0x40000) semop(r0, &(0x7f00008d8000)=[{0x0, 0x0, 0xffffffffffffffff}], 0x1) semctl$SETALL(r0, 0x0, 0x11, &(0x7f0000000000)) 21:24:04 executing program 4: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) r1 = dup2(r0, r0) mkdirat(r1, &(0x7f0000000100)='./file0\x00', 0x0) openat(r0, &(0x7f00000001c0)='./file0\x00', 0x402504, 0x1) 21:24:04 executing program 7: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$hfsplus(&(0x7f0000000040)='hfsplus\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000300), 0x0, &(0x7f0000000380)) 21:24:04 executing program 3: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) mkdirat(r0, &(0x7f00000000c0)='./file0\x00', 0x0) r1 = dup(r0) futimesat(r1, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)={{}, {0x77359400}}) [ 155.672376] RSP: 002b:00007fe773c40a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 155.680080] RAX: ffffffffffffffda RBX: 00007fe773c40b30 RCX: 000000000045885a [ 155.687344] RDX: 00007fe773c40ad0 RSI: 0000000020001740 RDI: 00007fe773c40af0 [ 155.694684] RBP: 0000000020001740 R08: 00007fe773c40b30 R09: 00007fe773c40ad0 [ 155.701949] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000014 [ 155.709203] R13: 0000000000000000 R14: 00000000004d3eb0 R15: 0000000000000041 21:24:04 executing program 1: mkdir(&(0x7f0000000180)='./file1\x00', 0x0) r0 = open(&(0x7f0000000080)='./file1\x00', 0x0, 0x0) mkdirat(r0, &(0x7f0000000140)='./file1\x00', 0x0) openat(r0, &(0x7f0000000100)='./file1\x00', 0x0, 0x40) 21:24:04 executing program 6: r0 = semget$private(0x0, 0x6, 0x0) semtimedop(r0, &(0x7f00000000c0)=[{0x0, 0xfffffffffffffff9, 0x1000}], 0x1, &(0x7f0000efe000)={0x2000}) semop(r0, &(0x7f00008d8000)=[{0x0, 0x0, 0xffffffffffffffff}], 0x1) semctl$SETALL(r0, 0x0, 0x11, &(0x7f0000000000)) 21:24:04 executing program 2 (fault-call:0 fault-nth:66): syz_mount_image$gfs2(&(0x7f0000000040)='gfs2\x00', &(0x7f0000001740)='./file0\x00', 0x0, 0x0, &(0x7f0000001680), 0x0, &(0x7f0000000880)=ANY=[@ANYBLOB='l']) 21:24:04 executing program 3: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) mkdirat(r0, &(0x7f00000000c0)='./file0\x00', 0x0) r1 = dup(r0) futimesat(r1, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)={{}, {0x77359400}}) 21:24:04 executing program 4: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) r1 = dup2(r0, r0) mkdirat(r1, &(0x7f0000000100)='./file0\x00', 0x0) openat(r0, &(0x7f0000000180)='./file0\x00', 0x200, 0x110) 21:24:04 executing program 5: creat(&(0x7f0000000040)='./file0\x00', 0x108) faccessat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x20000008020005, 0x20a00) 21:24:04 executing program 0: syz_open_dev$sndseq(&(0x7f0000000000)='/dev/snd/seq\x00', 0x0, 0x0) userfaultfd(0x0) syz_open_dev$mice(&(0x7f0000000100)='/dev/input/mice\x00', 0x0, 0x0) pselect6(0x40, &(0x7f00000abfc0)={0x3ffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x60}, &(0x7f0000768000), &(0x7f00007fbfc0), &(0x7f0000f22000)={0x0, 0x989680}, &(0x7f0000f14000)={&(0x7f0000553ff8), 0x8}) [ 155.802987] hfsplus: unable to find HFS+ superblock 21:24:04 executing program 7: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$hfsplus(&(0x7f0000000040)="686673706c757304", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000300), 0x0, &(0x7f0000000380)) [ 155.901808] FAULT_INJECTION: forcing a failure. [ 155.901808] name failslab, interval 1, probability 0, space 0, times 0 [ 155.913223] CPU: 0 PID: 13061 Comm: syz-executor2 Not tainted 4.18.0-rc3-next-20180706+ #1 [ 155.921721] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 155.931088] Call Trace: [ 155.933702] dump_stack+0x1c9/0x2b4 [ 155.937421] ? dump_stack_print_info.cold.2+0x52/0x52 [ 155.942629] ? __kernel_text_address+0xd/0x40 [ 155.947234] ? unwind_get_return_address+0x61/0xa0 [ 155.952170] should_fail.cold.4+0xa/0x11 [ 155.956235] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 155.961354] ? save_stack+0xa9/0xd0 [ 155.964973] ? save_stack+0x43/0xd0 [ 155.968596] ? kasan_kmalloc+0xc4/0xe0 [ 155.972479] ? kmem_cache_alloc_trace+0x152/0x780 [ 155.977327] ? __memcg_init_list_lru_node+0x185/0x2d0 [ 155.982508] ? __list_lru_init+0x4d6/0x840 [ 155.986732] ? alloc_super+0x9a6/0xb10 [ 155.990611] ? sget+0x10b/0x150 [ 155.993888] ? gfs2_mount+0x1a7/0x712 [ 155.997694] ? legacy_get_tree+0x118/0x440 [ 156.001929] ? vfs_get_tree+0x1cb/0x5c0 [ 156.005899] ? do_mount+0x6c1/0x1fb0 [ 156.009608] ? ksys_mount+0x12d/0x140 [ 156.013396] ? __x64_sys_mount+0xbe/0x150 [ 156.017534] ? do_syscall_64+0x1b9/0x820 [ 156.021588] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 156.026957] ? save_stack+0xa9/0xd0 [ 156.030595] ? lock_acquire+0x1e4/0x540 [ 156.034558] ? fs_reclaim_acquire+0x20/0x20 [ 156.038879] ? lock_downgrade+0x8f0/0x8f0 [ 156.043014] ? ksys_mount+0x12d/0x140 [ 156.046810] ? check_same_owner+0x340/0x340 [ 156.051120] ? rcu_note_context_switch+0x730/0x730 [ 156.056039] __should_failslab+0x124/0x180 [ 156.060274] should_failslab+0x9/0x14 [ 156.064069] kmem_cache_alloc_trace+0x2cb/0x780 [ 156.068734] ? kasan_kmalloc+0xc4/0xe0 [ 156.072617] __memcg_init_list_lru_node+0x185/0x2d0 [ 156.077623] ? kvfree_rcu+0x20/0x20 [ 156.081238] ? __kmalloc_node+0x47/0x70 [ 156.085203] __list_lru_init+0x4d6/0x840 [ 156.089252] ? up_write+0x7b/0x220 [ 156.092797] ? list_lru_destroy+0x500/0x500 [ 156.097198] ? prealloc_shrinker+0x124/0x450 [ 156.101603] ? prealloc_shrinker+0x21c/0x450 [ 156.106018] ? inactive_list_is_low+0x850/0x850 [ 156.110679] ? __lockdep_init_map+0x105/0x590 [ 156.115166] alloc_super+0x9a6/0xb10 [ 156.118885] ? destroy_unused_super.part.11+0x110/0x110 [ 156.124329] ? lock_downgrade+0x8f0/0x8f0 [ 156.128494] ? kasan_check_read+0x11/0x20 [ 156.132730] ? do_raw_spin_trylock+0x1c0/0x1c0 [ 156.137311] ? kasan_check_write+0x14/0x20 [ 156.141535] ? do_raw_spin_lock+0xc1/0x200 [ 156.145773] sget_userns+0x276/0x860 [ 156.149478] ? gfs2_kill_sb+0x1a0/0x1a0 [ 156.153446] ? fallocate_chunk.isra.15.cold.19+0x7c/0x7c [ 156.158890] ? vfs_get_super+0x270/0x270 [ 156.162938] ? kasan_check_read+0x11/0x20 [ 156.167074] ? do_raw_spin_unlock+0xa7/0x2f0 [ 156.171479] ? do_raw_spin_trylock+0x1c0/0x1c0 [ 156.176052] ? kasan_check_write+0x14/0x20 [ 156.180284] ? do_raw_spin_lock+0xc1/0x200 [ 156.184527] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 156.190066] ? ns_capable_common+0x13f/0x170 [ 156.194480] ? gfs2_kill_sb+0x1a0/0x1a0 [ 156.198445] sget+0x10b/0x150 [ 156.201560] ? fallocate_chunk.isra.15.cold.19+0x7c/0x7c [ 156.207005] gfs2_mount+0x1a7/0x712 [ 156.210625] ? fill_super+0x1a40/0x1a40 [ 156.214596] ? do_raw_spin_unlock+0xa7/0x2f0 [ 156.218993] ? do_raw_spin_trylock+0x1c0/0x1c0 [ 156.223583] ? kasan_unpoison_shadow+0x35/0x50 [ 156.228152] ? kasan_kmalloc+0xc4/0xe0 [ 156.232034] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 156.237574] ? fill_super+0x1a40/0x1a40 [ 156.241536] legacy_get_tree+0x118/0x440 [ 156.245590] vfs_get_tree+0x1cb/0x5c0 [ 156.249377] ? vfs_set_fs_source+0x12c/0x180 [ 156.253778] do_mount+0x6c1/0x1fb0 [ 156.257305] ? check_same_owner+0x340/0x340 [ 156.261632] ? lock_release+0xa30/0xa30 [ 156.265597] ? copy_mount_string+0x40/0x40 [ 156.269833] ? kasan_kmalloc+0xc4/0xe0 [ 156.273730] ? kmem_cache_alloc_trace+0x318/0x780 [ 156.278568] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 156.284096] ? _copy_from_user+0xdf/0x150 [ 156.288236] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 156.293770] ? copy_mount_options+0x285/0x380 [ 156.298256] ksys_mount+0x12d/0x140 [ 156.301873] __x64_sys_mount+0xbe/0x150 [ 156.305836] do_syscall_64+0x1b9/0x820 [ 156.309710] ? finish_task_switch+0x1d3/0x870 [ 156.314198] ? syscall_return_slowpath+0x5e0/0x5e0 [ 156.319115] ? syscall_return_slowpath+0x31d/0x5e0 [ 156.324034] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 156.329049] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 156.334574] ? prepare_exit_to_usermode+0x291/0x3b0 [ 156.339576] ? perf_trace_sys_enter+0xb10/0xb10 [ 156.344232] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 156.349066] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 156.354242] RIP: 0033:0x45885a [ 156.357419] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 dd 8f fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 ba 8f fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 156.376704] RSP: 002b:00007fe773c40a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 156.384411] RAX: ffffffffffffffda RBX: 00007fe773c40b30 RCX: 000000000045885a [ 156.391682] RDX: 00007fe773c40ad0 RSI: 0000000020001740 RDI: 00007fe773c40af0 21:24:05 executing program 4: mkdir(&(0x7f0000000500)='./file1\x00', 0x0) r0 = open(&(0x7f0000000080)='./file1\x00', 0x0, 0x0) mkdirat(r0, &(0x7f0000000100)='./file1\x00', 0x0) faccessat(r0, &(0x7f0000000000)='./file1\x00', 0x1, 0x3fc) 21:24:05 executing program 1: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000100)='/dev/zero\x00', 0x8002, 0x0) write$P9_RFLUSH(r0, &(0x7f0000000000)={0xfffffeeb, 0x6d}, 0x0) [ 156.398938] RBP: 0000000020001740 R08: 00007fe773c40b30 R09: 00007fe773c40ad0 [ 156.406190] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000014 [ 156.413447] R13: 0000000000000000 R14: 00000000004d3eb0 R15: 0000000000000042 21:24:05 executing program 5: mkdir(&(0x7f0000000180)='./file1\x00', 0x0) r0 = open(&(0x7f0000000080)='./file1\x00', 0x0, 0x0) mkdirat(r0, &(0x7f0000000140)='./file1\x00', 0x0) openat(r0, &(0x7f0000000100)='./file1\x00', 0x111000, 0x40) 21:24:05 executing program 0: syz_open_dev$sndseq(&(0x7f0000000000)='/dev/snd/seq\x00', 0x0, 0x0) userfaultfd(0x0) syz_open_dev$mice(&(0x7f0000000100)='/dev/input/mice\x00', 0x0, 0x0) pselect6(0x40, &(0x7f00000abfc0)={0x3ffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10}, &(0x7f0000768000), &(0x7f00007fbfc0), &(0x7f0000f22000)={0x0, 0x989680}, &(0x7f0000f14000)={&(0x7f0000553ff8), 0x8}) 21:24:05 executing program 3: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) mkdirat(r0, &(0x7f00000000c0)='./file0\x00', 0x0) r1 = dup(r0) futimesat(r1, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)={{}, {0x77359400}}) 21:24:05 executing program 2 (fault-call:0 fault-nth:67): syz_mount_image$gfs2(&(0x7f0000000040)='gfs2\x00', &(0x7f0000001740)='./file0\x00', 0x0, 0x0, &(0x7f0000001680), 0x0, &(0x7f0000000880)=ANY=[@ANYBLOB='l']) 21:24:05 executing program 4: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) r1 = dup2(r0, r0) mkdirat(r1, &(0x7f0000000100)='./file0\x00', 0x0) openat(r0, &(0x7f0000000040)='./file0\x00', 0x8000, 0x10) 21:24:05 executing program 7: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$hfsplus(&(0x7f0000000040)='hfsplus\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000300), 0x0, &(0x7f0000000380)) 21:24:05 executing program 1: open(&(0x7f00000001c0)='./file0\x00', 0x101142, 0x0) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='9p\x00', 0x0, &(0x7f0000000340)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@dfltuid={'dfltuid', 0x3d}, 0x2c}]}}) [ 156.599842] gfs2: invalid mount option: l [ 156.604109] gfs2: can't parse mount arguments [ 156.664143] FAULT_INJECTION: forcing a failure. [ 156.664143] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 156.675996] CPU: 0 PID: 13101 Comm: syz-executor2 Not tainted 4.18.0-rc3-next-20180706+ #1 [ 156.684428] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 156.693788] Call Trace: [ 156.696421] dump_stack+0x1c9/0x2b4 [ 156.700059] ? dump_stack_print_info.cold.2+0x52/0x52 [ 156.705264] ? trace_hardirqs_on+0x10/0x10 [ 156.709497] should_fail.cold.4+0xa/0x11 [ 156.713560] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 156.718660] ? mutex_trylock+0x2b0/0x2b0 [ 156.722707] ? do_raw_spin_trylock+0x1c0/0x1c0 [ 156.727290] ? trace_hardirqs_on+0x10/0x10 [ 156.731516] ? kernfs_remove+0x1b/0x40 [ 156.735401] ? trace_hardirqs_on+0x10/0x10 [ 156.739654] ? idr_destroy+0x1c0/0x1c0 [ 156.743536] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 156.749062] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 156.754771] ? replace_slot+0xc9/0x4c0 [ 156.758654] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 156.764189] ? should_fail+0x246/0xd86 [ 156.768173] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 156.773287] __alloc_pages_nodemask+0x36e/0xdb0 [ 156.777967] ? __alloc_pages_slowpath+0x2d00/0x2d00 [ 156.782984] ? do_raw_spin_unlock+0xa7/0x2f0 [ 156.787385] ? do_raw_spin_trylock+0x1c0/0x1c0 [ 156.791965] ? do_raw_spin_lock+0xc1/0x200 [ 156.796206] ? lock_acquire+0x1e4/0x540 [ 156.800181] ? fs_reclaim_acquire+0x20/0x20 [ 156.804491] ? lock_downgrade+0x8f0/0x8f0 [ 156.808640] ? lock_release+0xa30/0xa30 [ 156.812606] ? check_same_owner+0x340/0x340 [ 156.816918] cache_grow_begin+0x91/0x710 [ 156.820975] kmem_cache_alloc_trace+0x6a5/0x780 [ 156.825652] ? device_create_file+0x1e0/0x1e0 [ 156.830244] kobject_uevent_env+0x20f/0x1110 [ 156.834652] kobject_uevent+0x1f/0x30 [ 156.838448] loop_clr_fd+0x62f/0xd60 [ 156.842170] ? loop_attr_do_show_backing_file+0x1a0/0x1a0 [ 156.847714] lo_ioctl+0x84c/0x1d00 [ 156.851285] ? lock_release+0xa30/0xa30 [ 156.855263] ? lo_rw_aio_complete+0x450/0x450 [ 156.859747] blkdev_ioctl+0x9cd/0x2030 [ 156.863624] ? lock_acquire+0x1e4/0x540 [ 156.867602] ? blkpg_ioctl+0xc40/0xc40 [ 156.871483] ? lock_release+0xa30/0xa30 [ 156.875452] ? kernel_text_address+0x79/0xf0 [ 156.879856] ? __kernel_text_address+0xd/0x40 [ 156.884351] ? unwind_get_return_address+0x61/0xa0 [ 156.889279] ? __save_stack_trace+0x8d/0xf0 [ 156.893598] ? __fget+0x4d5/0x740 [ 156.897044] ? ksys_dup3+0x690/0x690 [ 156.900748] ? __kasan_slab_free+0x11a/0x170 [ 156.905143] ? kfree+0xd9/0x260 [ 156.908414] ? ksys_mount+0xa3/0x140 [ 156.912115] ? __x64_sys_mount+0xbe/0x150 [ 156.916252] ? do_syscall_64+0x1b9/0x820 [ 156.920313] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 156.925687] block_ioctl+0xee/0x130 [ 156.929846] ? blkdev_fallocate+0x400/0x400 [ 156.934159] do_vfs_ioctl+0x1de/0x1720 [ 156.938053] ? kasan_check_write+0x14/0x20 [ 156.942276] ? do_raw_spin_lock+0xc1/0x200 [ 156.946523] ? ioctl_preallocate+0x300/0x300 [ 156.951094] ? __fget_light+0x2f7/0x440 [ 156.955059] ? fget_raw+0x20/0x20 [ 156.958506] ? trace_hardirqs_off+0xd/0x10 [ 156.962730] ? quarantine_put+0x10d/0x1b0 [ 156.966872] ? __kasan_slab_free+0x131/0x170 [ 156.971279] ? security_file_ioctl+0x94/0xc0 [ 156.975676] ksys_ioctl+0xa9/0xd0 [ 156.979121] __x64_sys_ioctl+0x73/0xb0 [ 156.983020] do_syscall_64+0x1b9/0x820 [ 156.986909] ? finish_task_switch+0x1d3/0x870 [ 156.991424] ? syscall_return_slowpath+0x5e0/0x5e0 [ 156.996356] ? syscall_return_slowpath+0x31d/0x5e0 [ 157.001291] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 157.006340] ? prepare_exit_to_usermode+0x291/0x3b0 [ 157.011355] ? perf_trace_sys_enter+0xb10/0xb10 [ 157.017085] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 157.021932] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 157.027108] RIP: 0033:0x455c97 [ 157.030282] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 7d bb fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 157.049570] RSP: 002b:00007fe773c40a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 157.057272] RAX: ffffffffffffffda RBX: 00007fe773c40b30 RCX: 0000000000455c97 [ 157.064548] RDX: 0000000000000000 RSI: 0000000000004c01 RDI: 0000000000000015 [ 157.071822] RBP: 0000000020001740 R08: 00007fe773c40b30 R09: 00007fe773c40ad0 [ 157.079083] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000014 [ 157.086344] R13: 0000000000000000 R14: 00000000004d3eb0 R15: 0000000000000043 [ 157.111396] hfsplus: unable to find HFS+ superblock [ 157.143146] hfsplus: unable to find HFS+ superblock 21:24:06 executing program 6: r0 = semget$private(0x0, 0x6, 0x0) semtimedop(r0, &(0x7f00000000c0)=[{0x0, 0xfffffffffffffff9, 0x1000}], 0x1, &(0x7f0000efe000)={0x2000}) semop(r0, &(0x7f00008d8000)=[{0x0, 0x0, 0xffffffffffffffff}], 0x1) semctl$SETALL(r0, 0x0, 0x11, &(0x7f0000000000)) 21:24:06 executing program 5: mkdir(&(0x7f0000000700)='./file0\x00', 0x0) mount$9p_rdma(&(0x7f0000000ac0)='127.0.0.1\x00', &(0x7f0000000b00)='./file0\x00', &(0x7f0000000b40)='9p\x00', 0x0, &(0x7f0000000b80)={'trans=rdma,', {'port', 0x3d}, 0x2c, {[{@rq={'rq', 0x3d}, 0x2c}]}}) 21:24:06 executing program 3: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) mkdirat(r0, &(0x7f00000000c0)='./file0\x00', 0x0) futimesat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)={{}, {0x77359400}}) 21:24:06 executing program 0: syz_open_dev$sndseq(&(0x7f0000000000)='/dev/snd/seq\x00', 0x0, 0x0) userfaultfd(0x0) syz_open_dev$mice(&(0x7f0000000100)='/dev/input/mice\x00', 0x0, 0x0) pselect6(0x40, &(0x7f00000abfc0)={0x3ffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000}, &(0x7f0000768000), &(0x7f00007fbfc0), &(0x7f0000f22000)={0x0, 0x989680}, &(0x7f0000f14000)={&(0x7f0000553ff8), 0x8}) 21:24:06 executing program 4: r0 = socket$unix(0x2, 0x6, 0x0) bind$inet(r0, &(0x7f0000000100)={0x2, 0x0, @dev={0xac, 0x14, 0x14}}, 0x10) connect$inet(r0, &(0x7f0000000140)={0x2, 0x0, @local={0xac, 0x14, 0x14, 0xaa}}, 0x10) shutdown(r0, 0x0) 21:24:06 executing program 1: open(&(0x7f00000001c0)='./file0\x00', 0x101142, 0x0) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='9p\x00', 0x0, &(0x7f0000000340)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@dfltuid={'dfltuid', 0x3d}, 0x2c}]}}) 21:24:06 executing program 2 (fault-call:0 fault-nth:68): syz_mount_image$gfs2(&(0x7f0000000040)='gfs2\x00', &(0x7f0000001740)='./file0\x00', 0x0, 0x0, &(0x7f0000001680), 0x0, &(0x7f0000000880)=ANY=[@ANYBLOB='l']) 21:24:06 executing program 7: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$hfsplus(&(0x7f0000000040)='hfsplus\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000300), 0x0, &(0x7f0000000380)) [ 157.230908] FAULT_INJECTION: forcing a failure. [ 157.230908] name failslab, interval 1, probability 0, space 0, times 0 [ 157.242313] CPU: 1 PID: 13134 Comm: syz-executor2 Not tainted 4.18.0-rc3-next-20180706+ #1 [ 157.250726] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 157.260088] Call Trace: [ 157.262693] dump_stack+0x1c9/0x2b4 [ 157.266429] ? dump_stack_print_info.cold.2+0x52/0x52 [ 157.271643] ? __kernel_text_address+0xd/0x40 [ 157.276167] ? unwind_get_return_address+0x61/0xa0 21:24:06 executing program 3: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) r1 = dup(r0) futimesat(r1, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)={{}, {0x77359400}}) 21:24:06 executing program 5: mkdir(&(0x7f0000000700)='./file0\x00', 0x0) mount$9p_rdma(&(0x7f0000000ac0)='127.0.0.1\x00', &(0x7f0000000b00)='./file0\x00', &(0x7f0000000b40)='9p\x00', 0x0, &(0x7f0000000b80)={'trans=rdma,', {'port', 0x3d}, 0x2c, {[{@rq={'rq', 0x3d}, 0x2c}]}}) 21:24:06 executing program 4: renameat2(0xffffffffffffffff, &(0x7f0000000040)="2e2f66696c65302f66696c65302f66696c6530fe", 0xffffffffffffffff, &(0x7f0000000080)='./file0/file0\x00', 0x0) [ 157.281133] should_fail.cold.4+0xa/0x11 [ 157.285229] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 157.286401] hfsplus: unable to find HFS+ superblock [ 157.290615] ? save_stack+0xa9/0xd0 [ 157.290632] ? save_stack+0x43/0xd0 [ 157.290648] ? kasan_kmalloc+0xc4/0xe0 [ 157.290665] ? kmem_cache_alloc_trace+0x152/0x780 [ 157.290680] ? __memcg_init_list_lru_node+0x185/0x2d0 [ 157.290690] ? __list_lru_init+0x4d6/0x840 [ 157.290708] ? alloc_super+0x9a6/0xb10 [ 157.325039] ? sget+0x10b/0x150 21:24:06 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x4e20, @multicast1=0xe0000001}, 0x10) connect$inet(r0, &(0x7f0000000000)={0x2, 0x4e20}, 0x10) r1 = open(&(0x7f0000000140)='./file0\x00', 0x2040, 0x0) mount$9p_fd(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='9p\x00', 0x0, &(0x7f0000000180)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c}) [ 157.328335] ? gfs2_mount+0x1a7/0x712 [ 157.332150] ? legacy_get_tree+0x118/0x440 [ 157.336398] ? vfs_get_tree+0x1cb/0x5c0 [ 157.340484] ? do_mount+0x6c1/0x1fb0 [ 157.344216] ? ksys_mount+0x12d/0x140 [ 157.348033] ? __x64_sys_mount+0xbe/0x150 [ 157.352198] ? do_syscall_64+0x1b9/0x820 [ 157.356280] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 157.361666] ? save_stack+0xa9/0xd0 [ 157.365320] ? lock_acquire+0x1e4/0x540 [ 157.369395] ? fs_reclaim_acquire+0x20/0x20 [ 157.373731] ? lock_downgrade+0x8f0/0x8f0 [ 157.377901] ? ksys_mount+0x12d/0x140 [ 157.381730] ? check_same_owner+0x340/0x340 [ 157.386161] ? rcu_note_context_switch+0x730/0x730 [ 157.391251] __should_failslab+0x124/0x180 [ 157.395519] should_failslab+0x9/0x14 [ 157.399340] kmem_cache_alloc_trace+0x2cb/0x780 [ 157.404031] ? kasan_kmalloc+0xc4/0xe0 [ 157.408032] __memcg_init_list_lru_node+0x185/0x2d0 [ 157.413068] ? kvfree_rcu+0x20/0x20 [ 157.416720] ? __kmalloc_node+0x47/0x70 [ 157.420717] __list_lru_init+0x4d6/0x840 [ 157.424975] ? up_write+0x7b/0x220 21:24:06 executing program 3: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mkdirat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x0) r0 = dup(0xffffffffffffffff) futimesat(r0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)={{}, {0x77359400}}) 21:24:06 executing program 5: mkdir(&(0x7f0000000700)='./file0\x00', 0x0) mount$9p_rdma(&(0x7f0000000ac0)='127.0.0.1\x00', &(0x7f0000000b00)='./file0\x00', &(0x7f0000000b40)='9p\x00', 0x0, &(0x7f0000000b80)={'trans=rdma,', {'port', 0x3d}, 0x2c, {[{@rq={'rq', 0x3d}, 0x2c}]}}) [ 157.428552] ? list_lru_destroy+0x500/0x500 [ 157.432893] ? prealloc_shrinker+0x124/0x450 [ 157.437408] ? prealloc_shrinker+0x21c/0x450 [ 157.441838] ? inactive_list_is_low+0x850/0x850 [ 157.446521] ? __lockdep_init_map+0x105/0x590 [ 157.451033] alloc_super+0x9a6/0xb10 [ 157.454772] ? destroy_unused_super.part.11+0x110/0x110 [ 157.460159] ? lock_downgrade+0x8f0/0x8f0 [ 157.464329] ? kasan_check_read+0x11/0x20 [ 157.468506] ? do_raw_spin_trylock+0x1c0/0x1c0 [ 157.473116] ? kasan_check_write+0x14/0x20 [ 157.477374] ? do_raw_spin_lock+0xc1/0x200 21:24:06 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x4e20, @multicast1=0xe0000001}, 0x10) connect$inet(r0, &(0x7f0000000000)={0x2, 0x4e20}, 0x10) r1 = open(&(0x7f0000000140)='./file0\x00', 0x2040, 0x0) mount$9p_fd(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='9p\x00', 0x0, &(0x7f0000000180)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c}) [ 157.481639] sget_userns+0x276/0x860 [ 157.485370] ? gfs2_kill_sb+0x1a0/0x1a0 [ 157.489368] ? fallocate_chunk.isra.15.cold.19+0x7c/0x7c [ 157.494844] ? vfs_get_super+0x270/0x270 [ 157.499014] ? kasan_check_read+0x11/0x20 [ 157.503184] ? do_raw_spin_unlock+0xa7/0x2f0 [ 157.507619] ? do_raw_spin_trylock+0x1c0/0x1c0 [ 157.512221] ? kasan_check_write+0x14/0x20 [ 157.516477] ? do_raw_spin_lock+0xc1/0x200 [ 157.520756] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 157.526318] ? ns_capable_common+0x13f/0x170 21:24:06 executing program 3: r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) mkdirat(r0, &(0x7f00000000c0)='./file0\x00', 0x0) r1 = dup(r0) futimesat(r1, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)={{}, {0x77359400}}) [ 157.530752] ? gfs2_kill_sb+0x1a0/0x1a0 [ 157.534858] sget+0x10b/0x150 [ 157.537985] ? fallocate_chunk.isra.15.cold.19+0x7c/0x7c [ 157.543540] gfs2_mount+0x1a7/0x712 [ 157.547187] ? fill_super+0x1a40/0x1a40 [ 157.551178] ? check_same_owner+0x340/0x340 [ 157.555519] ? debug_mutex_init+0x2d/0x60 [ 157.559688] ? kasan_unpoison_shadow+0x35/0x50 [ 157.564390] ? kasan_kmalloc+0xc4/0xe0 [ 157.568300] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 157.573930] ? fill_super+0x1a40/0x1a40 [ 157.577929] legacy_get_tree+0x118/0x440 [ 157.582010] vfs_get_tree+0x1cb/0x5c0 [ 157.585833] ? vfs_set_fs_source+0x12c/0x180 [ 157.590267] do_mount+0x6c1/0x1fb0 [ 157.593842] ? kasan_check_read+0x11/0x20 [ 157.598015] ? do_raw_spin_unlock+0xa7/0x2f0 [ 157.602558] ? copy_mount_string+0x40/0x40 [ 157.606827] ? kasan_kmalloc+0xc4/0xe0 [ 157.610753] ? kmem_cache_alloc_trace+0x318/0x780 [ 157.615626] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 157.621188] ? copy_mount_options+0x285/0x380 [ 157.625730] ksys_mount+0x12d/0x140 [ 157.629380] __x64_sys_mount+0xbe/0x150 [ 157.633382] do_syscall_64+0x1b9/0x820 [ 157.637296] ? syscall_return_slowpath+0x5e0/0x5e0 [ 157.642249] ? syscall_return_slowpath+0x31d/0x5e0 [ 157.647203] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 157.652239] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 157.657788] ? prepare_exit_to_usermode+0x291/0x3b0 [ 157.662806] ? perf_trace_sys_enter+0xb10/0xb10 [ 157.667487] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 157.672328] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 157.677512] RIP: 0033:0x45885a [ 157.680688] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 dd 8f fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 ba 8f fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 157.699878] RSP: 002b:00007fe773c40a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 157.707579] RAX: ffffffffffffffda RBX: 00007fe773c40b30 RCX: 000000000045885a [ 157.714850] RDX: 00007fe773c40ad0 RSI: 0000000020001740 RDI: 00007fe773c40af0 [ 157.722209] RBP: 0000000020001740 R08: 00007fe773c40b30 R09: 00007fe773c40ad0 [ 157.730257] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000014 [ 157.737520] R13: 0000000000000000 R14: 00000000004d3eb0 R15: 0000000000000044 21:24:07 executing program 6: r0 = semget$private(0x0, 0x6, 0x0) semtimedop(r0, &(0x7f00000000c0)=[{0x0, 0xfffffffffffffff9, 0x1000}], 0x1, &(0x7f0000efe000)={0x2000}) semop(r0, &(0x7f00008d8000)=[{0x0, 0x0, 0xffffffffffffffff}], 0x1) semctl$SETALL(r0, 0x0, 0x11, &(0x7f0000000000)) 21:24:07 executing program 5: mkdir(&(0x7f0000000700)='./file0\x00', 0x0) mount$9p_rdma(&(0x7f0000000ac0)='127.0.0.1\x00', &(0x7f0000000b00)='./file0\x00', &(0x7f0000000b40)='9p\x00', 0x0, &(0x7f0000000b80)={'trans=rdma,', {'port', 0x3d}, 0x2c, {[{@rq={'rq', 0x3d}, 0x2c}]}}) 21:24:07 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x4e20, @multicast1=0xe0000001}, 0x10) connect$inet(r0, &(0x7f0000000000)={0x2, 0x4e20}, 0x10) r1 = open(&(0x7f0000000140)='./file0\x00', 0x2040, 0x0) mount$9p_fd(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='9p\x00', 0x0, &(0x7f0000000180)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c}) 21:24:07 executing program 3: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) mkdirat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x0) r1 = dup(r0) futimesat(r1, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)={{}, {0x77359400}}) 21:24:07 executing program 1: open(&(0x7f00000001c0)='./file0\x00', 0x101142, 0x0) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='9p\x00', 0x0, &(0x7f0000000340)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@dfltuid={'dfltuid', 0x3d}, 0x2c}]}}) 21:24:07 executing program 2 (fault-call:0 fault-nth:69): syz_mount_image$gfs2(&(0x7f0000000040)='gfs2\x00', &(0x7f0000001740)='./file0\x00', 0x0, 0x0, &(0x7f0000001680), 0x0, &(0x7f0000000880)=ANY=[@ANYBLOB='l']) 21:24:07 executing program 7: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$hfsplus(&(0x7f0000000040)='hfsplus\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000300), 0x0, &(0x7f0000000380)) 21:24:07 executing program 0: syz_open_dev$sndseq(&(0x7f0000000000)='/dev/snd/seq\x00', 0x0, 0x0) userfaultfd(0x0) syz_open_dev$mice(&(0x7f0000000100)='/dev/input/mice\x00', 0x0, 0x0) pselect6(0x40, &(0x7f00000abfc0)={0x3ffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1600000000000000}, &(0x7f0000768000), &(0x7f00007fbfc0), &(0x7f0000f22000)={0x0, 0x989680}, &(0x7f0000f14000)={&(0x7f0000553ff8), 0x8}) [ 158.304517] gfs2: invalid mount option: l [ 158.308906] gfs2: can't parse mount arguments [ 158.323771] FAULT_INJECTION: forcing a failure. [ 158.323771] name failslab, interval 1, probability 0, space 0, times 0 [ 158.335185] CPU: 1 PID: 13189 Comm: syz-executor2 Not tainted 4.18.0-rc3-next-20180706+ #1 [ 158.343592] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 158.352959] Call Trace: [ 158.355581] dump_stack+0x1c9/0x2b4 [ 158.359199] ? dump_stack_print_info.cold.2+0x52/0x52 [ 158.364380] ? perf_trace_lock+0xde/0x920 [ 158.368524] should_fail.cold.4+0xa/0x11 [ 158.372590] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 158.377694] ? __save_stack_trace+0x8d/0xf0 [ 158.382033] ? save_stack+0x43/0xd0 [ 158.385664] ? kasan_kmalloc+0xc4/0xe0 [ 158.389548] ? kasan_slab_alloc+0x12/0x20 [ 158.393683] ? kmem_cache_alloc_node+0x144/0x780 [ 158.398438] ? alloc_uevent_skb+0x89/0x220 [ 158.402672] ? kobject_uevent_env+0x866/0x1110 [ 158.407259] ? kobject_uevent+0x1f/0x30 [ 158.411235] ? loop_clr_fd+0x62f/0xd60 [ 158.415112] ? lo_ioctl+0x84c/0x1d00 [ 158.418816] ? blkdev_ioctl+0x9cd/0x2030 [ 158.422873] ? lock_acquire+0x1e4/0x540 [ 158.426836] ? fs_reclaim_acquire+0x20/0x20 [ 158.431149] ? lock_downgrade+0x8f0/0x8f0 [ 158.435291] ? check_same_owner+0x340/0x340 [ 158.439621] ? lock_downgrade+0x8f0/0x8f0 [ 158.443762] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 158.449290] ? rcu_note_context_switch+0x730/0x730 [ 158.454220] __should_failslab+0x124/0x180 [ 158.458444] should_failslab+0x9/0x14 [ 158.462236] kmem_cache_alloc_node_trace+0x26f/0x770 [ 158.467334] ? kasan_kmalloc+0xc4/0xe0 [ 158.472172] __kmalloc_node_track_caller+0x33/0x70 [ 158.477097] __kmalloc_reserve.isra.41+0x3a/0xe0 [ 158.481840] __alloc_skb+0x155/0x790 [ 158.485541] ? skb_scrub_packet+0x490/0x490 [ 158.489849] ? lock_release+0xa30/0xa30 [ 158.493808] ? pointer+0x990/0x990 [ 158.497333] ? device_get_devnode+0x2e0/0x2e0 [ 158.501817] ? kasan_unpoison_shadow+0x35/0x50 [ 158.506396] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 158.511584] ? netlink_has_listeners+0x2cf/0x4a0 [ 158.516340] ? netlink_tap_init_net+0x3e0/0x3e0 [ 158.521009] alloc_uevent_skb+0x89/0x220 [ 158.525151] kobject_uevent_env+0x866/0x1110 [ 158.529552] kobject_uevent+0x1f/0x30 [ 158.533352] loop_clr_fd+0x62f/0xd60 [ 158.537056] ? loop_attr_do_show_backing_file+0x1a0/0x1a0 [ 158.542580] lo_ioctl+0x84c/0x1d00 [ 158.546114] ? lock_release+0xa30/0xa30 [ 158.550078] ? lo_rw_aio_complete+0x450/0x450 [ 158.554567] blkdev_ioctl+0x9cd/0x2030 [ 158.558440] ? lock_acquire+0x1e4/0x540 [ 158.562401] ? blkpg_ioctl+0xc40/0xc40 [ 158.566281] ? lock_release+0xa30/0xa30 [ 158.570242] ? kernel_text_address+0x79/0xf0 [ 158.575066] ? __kernel_text_address+0xd/0x40 [ 158.579548] ? unwind_get_return_address+0x61/0xa0 [ 158.584462] ? __save_stack_trace+0x8d/0xf0 [ 158.588776] ? __fget+0x4d5/0x740 [ 158.592214] ? ksys_dup3+0x690/0x690 [ 158.595914] ? __kasan_slab_free+0x11a/0x170 [ 158.600307] ? kfree+0xd9/0x260 [ 158.603571] ? ksys_mount+0xa3/0x140 [ 158.607266] ? __x64_sys_mount+0xbe/0x150 [ 158.611399] ? do_syscall_64+0x1b9/0x820 [ 158.615457] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 158.620813] block_ioctl+0xee/0x130 [ 158.624435] ? blkdev_fallocate+0x400/0x400 [ 158.628741] do_vfs_ioctl+0x1de/0x1720 [ 158.632615] ? kasan_check_write+0x14/0x20 [ 158.636834] ? do_raw_spin_lock+0xc1/0x200 [ 158.641054] ? ioctl_preallocate+0x300/0x300 [ 158.645445] ? __fget_light+0x2f7/0x440 [ 158.649403] ? fget_raw+0x20/0x20 [ 158.652845] ? trace_hardirqs_off+0xd/0x10 [ 158.657081] ? quarantine_put+0x10d/0x1b0 [ 158.661224] ? __kasan_slab_free+0x131/0x170 [ 158.665621] ? security_file_ioctl+0x94/0xc0 [ 158.670028] ksys_ioctl+0xa9/0xd0 [ 158.673469] __x64_sys_ioctl+0x73/0xb0 [ 158.677357] do_syscall_64+0x1b9/0x820 [ 158.681231] ? finish_task_switch+0x1d3/0x870 [ 158.685713] ? syscall_return_slowpath+0x5e0/0x5e0 [ 158.690638] ? syscall_return_slowpath+0x31d/0x5e0 [ 158.696777] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 158.701780] ? prepare_exit_to_usermode+0x291/0x3b0 [ 158.706786] ? perf_trace_sys_enter+0xb10/0xb10 [ 158.711440] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 158.716281] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 158.721894] RIP: 0033:0x455c97 [ 158.725063] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 7d bb fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 158.744274] RSP: 002b:00007fe773c40a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 21:24:07 executing program 3: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) mkdirat(r0, &(0x7f00000000c0)='./file0\x00', 0x0) r1 = dup(0xffffffffffffffff) futimesat(r1, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)={{}, {0x77359400}}) 21:24:07 executing program 5: mount$9p_rdma(&(0x7f0000000ac0)='127.0.0.1\x00', &(0x7f0000000b00)='./file0\x00', &(0x7f0000000b40)='9p\x00', 0x0, &(0x7f0000000b80)={'trans=rdma,', {'port', 0x3d}, 0x2c, {[{@rq={'rq', 0x3d}, 0x2c}]}}) 21:24:07 executing program 3: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) mkdirat(r0, &(0x7f00000000c0)='./file0\x00', 0x0) r1 = dup(r0) futimesat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)={{}, {0x77359400}}) 21:24:07 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x4e20, @multicast1=0xe0000001}, 0x10) connect$inet(r0, &(0x7f0000000000)={0x2, 0x4e20}, 0x10) r1 = open(&(0x7f0000000140)='./file0\x00', 0x2040, 0x0) mount$9p_fd(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='9p\x00', 0x0, &(0x7f0000000180)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c}) [ 158.751978] RAX: ffffffffffffffda RBX: 00007fe773c40b30 RCX: 0000000000455c97 [ 158.759230] RDX: 0000000000000000 RSI: 0000000000004c01 RDI: 0000000000000015 [ 158.766494] RBP: 0000000020001740 R08: 00007fe773c40b30 R09: 00007fe773c40ad0 [ 158.773749] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000014 [ 158.781005] R13: 0000000000000000 R14: 00000000004d3eb0 R15: 0000000000000045 21:24:07 executing program 0: syz_open_dev$sndseq(&(0x7f0000000000)='/dev/snd/seq\x00', 0x0, 0x0) userfaultfd(0x0) syz_open_dev$mice(&(0x7f0000000100)='/dev/input/mice\x00', 0x0, 0x0) pselect6(0x40, &(0x7f00000abfc0)={0x3ffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800000000000000}, &(0x7f0000768000), &(0x7f00007fbfc0), &(0x7f0000f22000)={0x0, 0x989680}, &(0x7f0000f14000)={&(0x7f0000553ff8), 0x8}) 21:24:07 executing program 1: open(&(0x7f00000001c0)='./file0\x00', 0x101142, 0x0) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='9p\x00', 0x0, &(0x7f0000000340)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@dfltuid={'dfltuid', 0x3d}, 0x2c}]}}) 21:24:07 executing program 2 (fault-call:0 fault-nth:70): syz_mount_image$gfs2(&(0x7f0000000040)='gfs2\x00', &(0x7f0000001740)='./file0\x00', 0x0, 0x0, &(0x7f0000001680), 0x0, &(0x7f0000000880)=ANY=[@ANYBLOB='l']) 21:24:08 executing program 3: r0 = socket$unix(0x2, 0x6, 0x0) connect$inet(r0, &(0x7f0000000140)={0x2, 0x0, @local={0xac, 0x14, 0x14, 0xaa}}, 0x10) recvmsg(r0, &(0x7f0000001200)={&(0x7f0000000dc0)=@hci, 0x80, &(0x7f0000001100), 0x0, &(0x7f0000001140)=""/136, 0x88}, 0x40) [ 158.924703] hfsplus: unable to find HFS+ superblock [ 158.998501] FAULT_INJECTION: forcing a failure. [ 158.998501] name failslab, interval 1, probability 0, space 0, times 0 [ 159.010027] CPU: 0 PID: 13233 Comm: syz-executor2 Not tainted 4.18.0-rc3-next-20180706+ #1 [ 159.019345] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 159.028935] Call Trace: [ 159.031556] dump_stack+0x1c9/0x2b4 [ 159.035230] ? dump_stack_print_info.cold.2+0x52/0x52 [ 159.040449] ? __kernel_text_address+0xd/0x40 [ 159.044973] ? unwind_get_return_address+0x61/0xa0 [ 159.049929] should_fail.cold.4+0xa/0x11 [ 159.054010] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 159.059204] ? save_stack+0xa9/0xd0 [ 159.062859] ? save_stack+0x43/0xd0 [ 159.066507] ? kasan_kmalloc+0xc4/0xe0 [ 159.070422] ? kmem_cache_alloc_trace+0x152/0x780 [ 159.075285] ? __memcg_init_list_lru_node+0x185/0x2d0 [ 159.080750] ? __list_lru_init+0x4d6/0x840 [ 159.085001] ? alloc_super+0x9a6/0xb10 [ 159.088908] ? sget+0x10b/0x150 [ 159.092211] ? gfs2_mount+0x1a7/0x712 [ 159.096034] ? legacy_get_tree+0x118/0x440 [ 159.100383] ? vfs_get_tree+0x1cb/0x5c0 [ 159.104371] ? do_mount+0x6c1/0x1fb0 [ 159.108098] ? ksys_mount+0x12d/0x140 [ 159.111893] ? __x64_sys_mount+0xbe/0x150 [ 159.116045] ? do_syscall_64+0x1b9/0x820 [ 159.120354] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 159.125727] ? save_stack+0xa9/0xd0 [ 159.129370] ? lock_acquire+0x1e4/0x540 [ 159.133338] ? fs_reclaim_acquire+0x20/0x20 [ 159.137656] ? lock_downgrade+0x8f0/0x8f0 [ 159.141797] ? ksys_mount+0x12d/0x140 [ 159.145608] ? check_same_owner+0x340/0x340 [ 159.149928] ? rcu_note_context_switch+0x730/0x730 [ 159.154856] __should_failslab+0x124/0x180 [ 159.159186] should_failslab+0x9/0x14 [ 159.162998] kmem_cache_alloc_trace+0x2cb/0x780 [ 159.167666] ? kasan_kmalloc+0xc4/0xe0 [ 159.171569] __memcg_init_list_lru_node+0x185/0x2d0 [ 159.176574] ? kvfree_rcu+0x20/0x20 [ 159.180197] ? __kmalloc_node+0x47/0x70 [ 159.184251] __list_lru_init+0x4d6/0x840 [ 159.188297] ? up_write+0x7b/0x220 [ 159.191836] ? list_lru_destroy+0x500/0x500 21:24:08 executing program 6: unshare(0x40000) semtimedop(0x0, &(0x7f00000000c0)=[{0x0, 0xfffffffffffffff9, 0x1000}], 0x1, &(0x7f0000efe000)={0x2000}) semop(0x0, &(0x7f00008d8000)=[{0x0, 0x0, 0xffffffffffffffff}], 0x1) semctl$SETALL(0x0, 0x0, 0x11, &(0x7f0000000000)) 21:24:08 executing program 1: open(&(0x7f00000001c0)='./file0\x00', 0x101142, 0x0) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='9p\x00', 0x0, &(0x7f0000000340)={'trans=fd,', {'rfdno', 0x3d}, 0x2c, {'wfdno', 0x3d}, 0x2c, {[{@dfltuid={'dfltuid', 0x3d}, 0x2c}]}}) 21:24:08 executing program 5: mount$9p_rdma(&(0x7f0000000ac0)='127.0.0.1\x00', &(0x7f0000000b00)='./file0\x00', &(0x7f0000000b40)='9p\x00', 0x0, &(0x7f0000000b80)={'trans=rdma,', {'port', 0x3d}, 0x2c, {[{@rq={'rq', 0x3d}, 0x2c}]}}) 21:24:08 executing program 0: syz_open_dev$sndseq(&(0x7f0000000000)='/dev/snd/seq\x00', 0x0, 0x0) userfaultfd(0x0) syz_open_dev$mice(&(0x7f0000000100)='/dev/input/mice\x00', 0x0, 0x0) pselect6(0x40, &(0x7f00000abfc0)={0x3ffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x16}, &(0x7f0000768000), &(0x7f00007fbfc0), &(0x7f0000f22000)={0x0, 0x989680}, &(0x7f0000f14000)={&(0x7f0000553ff8), 0x8}) 21:24:08 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount$9p_fd(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='9p\x00', 0x0, &(0x7f0000000f80)=ANY=[@ANYBLOB='trans=fd,port=?689=833,rfdno=3949,wfdno=1']) 21:24:08 executing program 7: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$hfsplus(&(0x7f0000000040)='hfsplus\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000300), 0x0, &(0x7f0000000380)) 21:24:08 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x4e20, @multicast1=0xe0000001}, 0x10) connect$inet(r0, &(0x7f0000000000)={0x2, 0x4e20}, 0x10) mount$9p_fd(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='9p\x00', 0x0, &(0x7f0000000180)={'trans=fd,', {'rfdno', 0x3d}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c}) [ 159.196237] ? prealloc_shrinker+0x124/0x450 [ 159.200643] ? prealloc_shrinker+0x21c/0x450 [ 159.205059] ? inactive_list_is_low+0x850/0x850 [ 159.209717] ? __lockdep_init_map+0x105/0x590 [ 159.214208] alloc_super+0x9a6/0xb10 [ 159.218025] ? destroy_unused_super.part.11+0x110/0x110 [ 159.223392] ? lock_downgrade+0x8f0/0x8f0 [ 159.227548] ? kasan_check_read+0x11/0x20 [ 159.231698] ? do_raw_spin_trylock+0x1c0/0x1c0 [ 159.236300] ? kasan_check_write+0x14/0x20 [ 159.240632] ? do_raw_spin_lock+0xc1/0x200 [ 159.244970] sget_userns+0x276/0x860 [ 159.248706] ? gfs2_kill_sb+0x1a0/0x1a0 [ 159.252703] ? fallocate_chunk.isra.15.cold.19+0x7c/0x7c [ 159.258177] ? vfs_get_super+0x270/0x270 [ 159.262255] ? kasan_check_read+0x11/0x20 [ 159.266425] ? do_raw_spin_unlock+0xa7/0x2f0 [ 159.270846] ? do_raw_spin_trylock+0x1c0/0x1c0 [ 159.275432] ? kasan_check_write+0x14/0x20 [ 159.279680] ? do_raw_spin_lock+0xc1/0x200 [ 159.283927] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 159.289465] ? ns_capable_common+0x13f/0x170 [ 159.293881] ? gfs2_kill_sb+0x1a0/0x1a0 [ 159.297855] sget+0x10b/0x150 [ 159.300955] ? fallocate_chunk.isra.15.cold.19+0x7c/0x7c [ 159.306419] gfs2_mount+0x1a7/0x712 [ 159.310056] ? fill_super+0x1a40/0x1a40 [ 159.314047] ? kasan_check_write+0x14/0x20 [ 159.318375] ? do_raw_spin_lock+0xc1/0x200 [ 159.322605] ? kasan_unpoison_shadow+0x35/0x50 [ 159.327200] ? kasan_kmalloc+0xc4/0xe0 [ 159.331082] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 159.336613] ? fill_super+0x1a40/0x1a40 [ 159.340850] legacy_get_tree+0x118/0x440 [ 159.344904] vfs_get_tree+0x1cb/0x5c0 [ 159.348688] ? vfs_set_fs_source+0x12c/0x180 [ 159.353089] do_mount+0x6c1/0x1fb0 [ 159.356617] ? kasan_check_write+0x14/0x20 [ 159.360841] ? copy_mount_string+0x40/0x40 [ 159.365080] ? kasan_kmalloc+0xc4/0xe0 [ 159.369046] ? kmem_cache_alloc_trace+0x318/0x780 [ 159.373968] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 159.380284] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 159.385811] ? copy_mount_options+0x285/0x380 [ 159.390301] ksys_mount+0x12d/0x140 [ 159.393918] __x64_sys_mount+0xbe/0x150 [ 159.397889] do_syscall_64+0x1b9/0x820 [ 159.401770] ? finish_task_switch+0x1d3/0x870 [ 159.406289] ? syscall_return_slowpath+0x5e0/0x5e0 [ 159.411216] ? syscall_return_slowpath+0x31d/0x5e0 [ 159.416149] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 159.421176] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 159.426708] ? prepare_exit_to_usermode+0x291/0x3b0 [ 159.431718] ? perf_trace_sys_enter+0xb10/0xb10 [ 159.436381] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 159.441226] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 159.446402] RIP: 0033:0x45885a [ 159.449588] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 dd 8f fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 ba 8f fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 159.468875] RSP: 002b:00007fe773c40a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 159.476584] RAX: ffffffffffffffda RBX: 00007fe773c40b30 RCX: 000000000045885a [ 159.483840] RDX: 00007fe773c40ad0 RSI: 0000000020001740 RDI: 00007fe773c40af0 [ 159.491103] RBP: 0000000020001740 R08: 00007fe773c40b30 R09: 00007fe773c40ad0 [ 159.498371] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000014 [ 159.505631] R13: 0000000000000000 R14: 00000000004d3eb0 R15: 0000000000000046 [ 159.513759] 9pnet: Insufficient options for proto=fd 21:24:08 executing program 1: open(&(0x7f00000001c0)='./file0\x00', 0x101142, 0x0) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='9p\x00', 0x0, &(0x7f0000000340)={'trans=fd,', {'rfdno', 0x3d}, 0x2c, {'wfdno', 0x3d}, 0x2c, {[{@dfltuid={'dfltuid', 0x3d}, 0x2c}]}}) 21:24:08 executing program 5: mount$9p_rdma(&(0x7f0000000ac0)='127.0.0.1\x00', &(0x7f0000000b00)='./file0\x00', &(0x7f0000000b40)='9p\x00', 0x0, &(0x7f0000000b80)={'trans=rdma,', {'port', 0x3d}, 0x2c, {[{@rq={'rq', 0x3d}, 0x2c}]}}) [ 159.560163] hfsplus: unable to find HFS+ superblock 21:24:08 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount$9p_fd(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='9p\x00', 0x0, &(0x7f0000000f80)=ANY=[@ANYBLOB='trans=fd,port=?689=833,rfdno=3949,wfdno=1']) 21:24:08 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x4e20, @multicast1=0xe0000001}, 0x10) connect$inet(r0, &(0x7f0000000000)={0x2, 0x4e20}, 0x10) mount$9p_fd(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='9p\x00', 0x0, &(0x7f0000000180)={'trans=fd,', {'rfdno', 0x3d}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c}) 21:24:08 executing program 2 (fault-call:0 fault-nth:71): syz_mount_image$gfs2(&(0x7f0000000040)='gfs2\x00', &(0x7f0000001740)='./file0\x00', 0x0, 0x0, &(0x7f0000001680), 0x0, &(0x7f0000000880)=ANY=[@ANYBLOB='l']) 21:24:08 executing program 0: syz_open_dev$sndseq(&(0x7f0000000000)='/dev/snd/seq\x00', 0x0, 0x0) userfaultfd(0x0) syz_open_dev$mice(&(0x7f0000000100)='/dev/input/mice\x00', 0x0, 0x0) pselect6(0x40, &(0x7f00000abfc0)={0x3ffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6000000000000000}, &(0x7f0000768000), &(0x7f00007fbfc0), &(0x7f0000f22000)={0x0, 0x989680}, &(0x7f0000f14000)={&(0x7f0000553ff8), 0x8}) 21:24:08 executing program 7: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$hfsplus(&(0x7f0000000040)='hfsplus\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000300), 0x0, &(0x7f0000000380)) [ 159.647804] 9pnet: Insufficient options for proto=fd 21:24:08 executing program 5: mkdir(&(0x7f0000000700)='./file0\x00', 0x0) mount$9p_rdma(&(0x7f0000000ac0)='127.0.0.1\x00', &(0x7f0000000b00)='./file0\x00', &(0x7f0000000b40)='9p\x00', 0x0, &(0x7f0000000b80)={'trans=rdma,', {'port', 0x3d}, 0x2c}) 21:24:08 executing program 1: open(&(0x7f00000001c0)='./file0\x00', 0x101142, 0x0) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='9p\x00', 0x0, &(0x7f0000000340)={'trans=fd,', {'rfdno', 0x3d}, 0x2c, {'wfdno', 0x3d}, 0x2c, {[{@dfltuid={'dfltuid', 0x3d}, 0x2c}]}}) [ 159.724934] hfsplus: unable to find HFS+ superblock [ 159.772891] 9pnet: Insufficient options for proto=fd [ 159.812975] gfs2: invalid mount option: l [ 159.817254] gfs2: can't parse mount arguments 21:24:09 executing program 6: unshare(0x0) semtimedop(0x0, &(0x7f00000000c0)=[{0x0, 0xfffffffffffffff9, 0x1000}], 0x1, &(0x7f0000efe000)={0x2000}) semop(0x0, &(0x7f00008d8000)=[{0x0, 0x0, 0xffffffffffffffff}], 0x1) semctl$SETALL(0x0, 0x0, 0x11, &(0x7f0000000000)) 21:24:09 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount$9p_fd(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='9p\x00', 0x0, &(0x7f0000000f80)=ANY=[@ANYBLOB='trans=fd,port=?689=833,rfdno=3949,wfdno=1']) 21:24:09 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x4e20, @multicast1=0xe0000001}, 0x10) connect$inet(r0, &(0x7f0000000000)={0x2, 0x4e20}, 0x10) mount$9p_fd(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='9p\x00', 0x0, &(0x7f0000000180)={'trans=fd,', {'rfdno', 0x3d}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c}) 21:24:09 executing program 0: syz_open_dev$sndseq(&(0x7f0000000000)='/dev/snd/seq\x00', 0x0, 0x0) userfaultfd(0x0) syz_open_dev$mice(&(0x7f0000000100)='/dev/input/mice\x00', 0x0, 0x0) pselect6(0x40, &(0x7f00000abfc0)={0x3ffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6400000000000000}, &(0x7f0000768000), &(0x7f00007fbfc0), &(0x7f0000f22000)={0x0, 0x989680}, &(0x7f0000f14000)={&(0x7f0000553ff8), 0x8}) 21:24:09 executing program 7: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$hfsplus(&(0x7f0000000040)='hfsplusT', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000300), 0x0, &(0x7f0000000380)) 21:24:09 executing program 5: mkdir(&(0x7f0000000700)='./file0\x00', 0x0) mount$9p_rdma(&(0x7f0000000ac0)='127.0.0.1\x00', &(0x7f0000000b00)='./file0\x00', &(0x7f0000000b40)='9p\x00', 0x0, &(0x7f0000000b80)={'trans=rdma,', {'port', 0x3d}, 0x2c}) 21:24:09 executing program 1: pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='9p\x00', 0x0, &(0x7f0000000340)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@dfltuid={'dfltuid', 0x3d}, 0x2c}]}}) 21:24:09 executing program 2: syz_mount_image$gfs2(&(0x7f0000000040)='gfs2\x00', &(0x7f0000001740)='./file0\x00', 0x0, 0x0, &(0x7f0000001680), 0x0, &(0x7f0000000880)=ANY=[@ANYBLOB='l']) 21:24:09 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x4e20, @multicast1=0xe0000001}, 0x10) r1 = open(&(0x7f0000000140)='./file0\x00', 0x2040, 0x0) mount$9p_fd(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='9p\x00', 0x0, &(0x7f0000000180)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c}) [ 160.495589] gfs2: invalid mount option: l [ 160.499885] gfs2: can't parse mount arguments 21:24:09 executing program 1: pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='9p\x00', 0x0, &(0x7f0000000340)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@dfltuid={'dfltuid', 0x3d}, 0x2c}]}}) 21:24:09 executing program 5: mkdir(&(0x7f0000000700)='./file0\x00', 0x0) mount$9p_rdma(&(0x7f0000000ac0)='127.0.0.1\x00', &(0x7f0000000b00)='./file0\x00', &(0x7f0000000b40)='9p\x00', 0x0, &(0x7f0000000b80)={'trans=rdma,', {'port', 0x3d}, 0x2c}) 21:24:09 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount$9p_fd(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='9p\x00', 0x0, &(0x7f0000000f80)=ANY=[@ANYBLOB='trans=fd,port=?689=833,rfdno=3949,wfdno=1']) 21:24:09 executing program 0: syz_open_dev$sndseq(&(0x7f0000000000)='/dev/snd/seq\x00', 0x0, 0x0) userfaultfd(0x0) syz_open_dev$mice(&(0x7f0000000100)='/dev/input/mice\x00', 0x0, 0x0) pselect6(0x40, &(0x7f00000abfc0)={0x3ffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x64000000}, &(0x7f0000768000), &(0x7f00007fbfc0), &(0x7f0000f22000)={0x0, 0x989680}, &(0x7f0000f14000)={&(0x7f0000553ff8), 0x8}) 21:24:09 executing program 7: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$hfsplus(&(0x7f0000000040)='hfsplusP', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000300), 0x0, &(0x7f0000000380)) 21:24:09 executing program 2: syz_mount_image$gfs2(&(0x7f0000000040)='\nfs2\x00', &(0x7f0000001740)='./file0\x00', 0x0, 0x0, &(0x7f0000001680), 0x0, &(0x7f0000000880)=ANY=[@ANYBLOB='l']) 21:24:09 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x4e20, @multicast1=0xe0000001}, 0x10) r1 = open(&(0x7f0000000140)='./file0\x00', 0x2040, 0x0) mount$9p_fd(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='9p\x00', 0x0, &(0x7f0000000180)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c}) 21:24:10 executing program 6: unshare(0x0) semtimedop(0x0, &(0x7f00000000c0)=[{0x0, 0xfffffffffffffff9, 0x1000}], 0x1, &(0x7f0000efe000)={0x2000}) semop(0x0, &(0x7f00008d8000)=[{0x0, 0x0, 0xffffffffffffffff}], 0x1) semctl$SETALL(0x0, 0x0, 0x11, &(0x7f0000000000)) 21:24:10 executing program 1: pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='9p\x00', 0x0, &(0x7f0000000340)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@dfltuid={'dfltuid', 0x3d}, 0x2c}]}}) 21:24:10 executing program 5: open(&(0x7f00000001c0)='./file0\x00', 0x101142, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='9p\x00', 0x1000, &(0x7f0000000300)=ANY=[]) mount$9p_unix(&(0x7f0000000600)='./file0\x00', &(0x7f0000000640)='./file0\x00', &(0x7f0000000680)='9p\x00', 0x202800, &(0x7f0000000280)={'trans=\x00'}) 21:24:10 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount$9p_fd(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='9p\x00', 0x0, &(0x7f0000000f80)=ANY=[@ANYBLOB='trans=fd,port=?689=833,rfdno=3949,wfdno=1']) 21:24:10 executing program 0: syz_open_dev$sndseq(&(0x7f0000000000)='/dev/snd/seq\x00', 0x0, 0x0) userfaultfd(0x0) syz_open_dev$mice(&(0x7f0000000100)='/dev/input/mice\x00', 0x0, 0x0) pselect6(0x40, &(0x7f00000abfc0)={0x3ffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6400}, &(0x7f0000768000), &(0x7f00007fbfc0), &(0x7f0000f22000)={0x0, 0x989680}, &(0x7f0000f14000)={&(0x7f0000553ff8), 0x8}) 21:24:10 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x4e20, @multicast1=0xe0000001}, 0x10) r1 = open(&(0x7f0000000140)='./file0\x00', 0x2040, 0x0) mount$9p_fd(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='9p\x00', 0x0, &(0x7f0000000180)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c}) 21:24:10 executing program 7: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$hfsplus(&(0x7f0000000040)='hfsplus\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000300), 0x0, &(0x7f0000000380)) 21:24:10 executing program 2: syz_mount_image$gfs2(&(0x7f0000000040)='%fs2\x00', &(0x7f0000001740)='./file0\x00', 0x0, 0x0, &(0x7f0000001680), 0x0, &(0x7f0000000880)=ANY=[@ANYBLOB='l']) [ 161.477268] hfsplus: unable to find HFS+ superblock 21:24:10 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount$9p_fd(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='9p\x00', 0x0, &(0x7f0000000f80)=ANY=[@ANYBLOB='trans=fd,port=?689=833,rfdno=3949,wfdno=1']) 21:24:10 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) connect$inet(r0, &(0x7f0000000000)={0x2, 0x4e20}, 0x10) r1 = open(&(0x7f0000000140)='./file0\x00', 0x2040, 0x0) mount$9p_fd(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='9p\x00', 0x0, &(0x7f0000000180)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c}) 21:24:10 executing program 0: syz_open_dev$sndseq(&(0x7f0000000000)='/dev/snd/seq\x00', 0x0, 0x0) userfaultfd(0x0) syz_open_dev$mice(&(0x7f0000000100)='/dev/input/mice\x00', 0x0, 0x0) pselect6(0x40, &(0x7f00000abfc0)={0x3ffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, &(0x7f0000768000), &(0x7f00007fbfc0), &(0x7f0000f22000)={0x0, 0x989680}, &(0x7f0000f14000)={&(0x7f0000553ff8), 0x8}) 21:24:10 executing program 7: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$hfsplus(&(0x7f0000000040)='hfsplus\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000300), 0x0, &(0x7f0000000380)) 21:24:10 executing program 1: open(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='9p\x00', 0x0, &(0x7f0000000340)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@dfltuid={'dfltuid', 0x3d}, 0x2c}]}}) 21:24:10 executing program 5: open(&(0x7f00000001c0)='./file0\x00', 0x101142, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='9p\x00', 0x1000, &(0x7f0000000300)=ANY=[]) mount$9p_unix(&(0x7f0000000600)='./file0\x00', &(0x7f0000000640)='./file0\x00', &(0x7f0000000680)='9p\x00', 0x202800, &(0x7f0000000280)={'trans=\x00'}) 21:24:10 executing program 2: syz_mount_image$gfs2(&(0x7f0000000040)='g%s2\x00', &(0x7f0000001740)='./file0\x00', 0x0, 0x0, &(0x7f0000001680), 0x0, &(0x7f0000000880)=ANY=[@ANYBLOB='l']) 21:24:10 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount$9p_fd(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='9p\x00', 0x0, &(0x7f0000000f80)=ANY=[@ANYBLOB='trans=fd,port=?689=833,rfdno=3949,wfdno=1']) [ 161.617704] hfsplus: unable to find HFS+ superblock 21:24:11 executing program 6: unshare(0x0) semtimedop(0x0, &(0x7f00000000c0)=[{0x0, 0xfffffffffffffff9, 0x1000}], 0x1, &(0x7f0000efe000)={0x2000}) semop(0x0, &(0x7f00008d8000)=[{0x0, 0x0, 0xffffffffffffffff}], 0x1) semctl$SETALL(0x0, 0x0, 0x11, &(0x7f0000000000)) 21:24:11 executing program 0: syz_open_dev$sndseq(&(0x7f0000000000)='/dev/snd/seq\x00', 0x0, 0x0) userfaultfd(0x0) syz_open_dev$mice(&(0x7f0000000100)='/dev/input/mice\x00', 0x0, 0x0) pselect6(0x40, &(0x7f00000abfc0)={0x3ffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x64}, &(0x7f0000768000), &(0x7f00007fbfc0), &(0x7f0000f22000)={0x0, 0x989680}, &(0x7f0000f14000)={&(0x7f0000553ff8), 0x8}) 21:24:11 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) connect$inet(r0, &(0x7f0000000000)={0x2, 0x4e20}, 0x10) r1 = open(&(0x7f0000000140)='./file0\x00', 0x2040, 0x0) mount$9p_fd(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='9p\x00', 0x0, &(0x7f0000000180)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c}) 21:24:11 executing program 5: open(&(0x7f00000001c0)='./file0\x00', 0x101142, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='9p\x00', 0x1000, &(0x7f0000000300)=ANY=[]) mount$9p_unix(&(0x7f0000000600)='./file0\x00', &(0x7f0000000640)='./file0\x00', &(0x7f0000000680)='9p\x00', 0x202800, &(0x7f0000000280)={'trans=\x00'}) 21:24:11 executing program 1: open(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='9p\x00', 0x0, &(0x7f0000000340)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@dfltuid={'dfltuid', 0x3d}, 0x2c}]}}) 21:24:11 executing program 7: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$hfsplus(&(0x7f0000000040)='hfsplus\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000300), 0x0, &(0x7f0000000380)) 21:24:11 executing program 3: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount$9p_fd(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='9p\x00', 0x0, &(0x7f0000000f80)=ANY=[@ANYBLOB='trans=fd,port=?689=833,rfdno=3949,wfdno=1']) 21:24:11 executing program 2: syz_mount_image$gfs2(&(0x7f0000000040)='g.s2\x00', &(0x7f0000001740)='./file0\x00', 0x0, 0x0, &(0x7f0000001680), 0x0, &(0x7f0000000880)=ANY=[@ANYBLOB='l']) 21:24:11 executing program 3: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount$9p_fd(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='9p\x00', 0x0, &(0x7f0000000f80)=ANY=[]) 21:24:11 executing program 5: open(&(0x7f00000001c0)='./file0\x00', 0x101142, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='9p\x00', 0x1000, &(0x7f0000000300)=ANY=[]) mount$9p_unix(&(0x7f0000000600)='./file0\x00', &(0x7f0000000640)='./file0\x00', &(0x7f0000000680)='9p\x00', 0x202800, &(0x7f0000000280)={'trans=\x00'}) [ 162.446134] hfsplus: unable to find HFS+ superblock 21:24:11 executing program 1: open(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='9p\x00', 0x0, &(0x7f0000000340)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@dfltuid={'dfltuid', 0x3d}, 0x2c}]}}) 21:24:11 executing program 7: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$hfsplus(&(0x7f0000000040)="686673706c7573ff", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000300), 0x0, &(0x7f0000000380)) 21:24:11 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) connect$inet(r0, &(0x7f0000000000)={0x2, 0x4e20}, 0x10) r1 = open(&(0x7f0000000140)='./file0\x00', 0x2040, 0x0) mount$9p_fd(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='9p\x00', 0x0, &(0x7f0000000180)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c}) 21:24:11 executing program 0: syz_open_dev$sndseq(&(0x7f0000000000)='/dev/snd/seq\x00', 0x0, 0x0) userfaultfd(0x0) syz_open_dev$mice(&(0x7f0000000100)='/dev/input/mice\x00', 0x0, 0x0) pselect6(0x40, &(0x7f00000abfc0)={0x3ffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000000000}, &(0x7f0000768000), &(0x7f00007fbfc0), &(0x7f0000f22000)={0x0, 0x989680}, &(0x7f0000f14000)={&(0x7f0000553ff8), 0x8}) [ 162.487411] 9pnet_virtio: no channels available for device (null) 21:24:11 executing program 2: syz_mount_image$gfs2(&(0x7f0000000040)='g/s2\x00', &(0x7f0000001740)='./file0\x00', 0x0, 0x0, &(0x7f0000001680), 0x0, &(0x7f0000000880)=ANY=[@ANYBLOB='l']) 21:24:11 executing program 1: open(&(0x7f00000001c0)='./file0\x00', 0x101142, 0x0) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='9p\x00', 0x0, &(0x7f0000000340)={'trans=fd,', {'rfdno', 0x3d}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@dfltuid={'dfltuid', 0x3d}, 0x2c}]}}) [ 162.648753] 9pnet: Insufficient options for proto=fd 21:24:12 executing program 6: unshare(0x40000) semtimedop(0x0, &(0x7f00000000c0), 0x0, &(0x7f0000efe000)={0x2000}) semop(0x0, &(0x7f00008d8000)=[{0x0, 0x0, 0xffffffffffffffff}], 0x1) semctl$SETALL(0x0, 0x0, 0x11, &(0x7f0000000000)) 21:24:12 executing program 3: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount$9p_fd(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='9p\x00', 0x0, &(0x7f0000000f80)=ANY=[]) 21:24:12 executing program 5: open(&(0x7f00000001c0)='./file0\x00', 0x101142, 0x0) mount$9p_unix(&(0x7f0000000600)='./file0\x00', &(0x7f0000000640)='./file0\x00', &(0x7f0000000680)='9p\x00', 0x202800, &(0x7f0000000280)={'trans=\x00'}) 21:24:12 executing program 4: bind$inet(0xffffffffffffffff, &(0x7f0000e5b000)={0x2, 0x4e20, @multicast1=0xe0000001}, 0x10) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x4e20}, 0x10) r0 = open(&(0x7f0000000140)='./file0\x00', 0x2040, 0x0) mount$9p_fd(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='9p\x00', 0x0, &(0x7f0000000180)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d}, 0x2c}) 21:24:12 executing program 0: syz_open_dev$sndseq(&(0x7f0000000000)='/dev/snd/seq\x00', 0x0, 0x0) userfaultfd(0x0) syz_open_dev$mice(&(0x7f0000000100)='/dev/input/mice\x00', 0x0, 0x0) pselect6(0x40, &(0x7f00000abfc0)={0x3ffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x16000000}, &(0x7f0000768000), &(0x7f00007fbfc0), &(0x7f0000f22000)={0x0, 0x989680}, &(0x7f0000f14000)={&(0x7f0000553ff8), 0x8}) 21:24:12 executing program 7: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$hfsplus(&(0x7f0000000040)='hfsplus\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000300), 0x0, &(0x7f0000000380)) 21:24:12 executing program 1: open(&(0x7f00000001c0)='./file0\x00', 0x101142, 0x0) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='9p\x00', 0x0, &(0x7f0000000340)={'trans=fd,', {'rfdno', 0x3d}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@dfltuid={'dfltuid', 0x3d}, 0x2c}]}}) 21:24:12 executing program 2: syz_mount_image$gfs2(&(0x7f0000000040)='g\ns2\x00', &(0x7f0000001740)='./file0\x00', 0x0, 0x0, &(0x7f0000001680), 0x0, &(0x7f0000000880)=ANY=[@ANYBLOB='l']) 21:24:12 executing program 5: open(&(0x7f00000001c0)='./file0\x00', 0x101142, 0x0) mount$9p_unix(&(0x7f0000000600)='./file0\x00', &(0x7f0000000640)='./file0\x00', &(0x7f0000000680)='9p\x00', 0x202800, &(0x7f0000000280)={'trans=\x00'}) 21:24:12 executing program 1: open(&(0x7f00000001c0)='./file0\x00', 0x101142, 0x0) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='9p\x00', 0x0, &(0x7f0000000340)={'trans=fd,', {'rfdno', 0x3d}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@dfltuid={'dfltuid', 0x3d}, 0x2c}]}}) [ 163.359938] 9pnet: Insufficient options for proto=fd [ 163.360616] 9pnet: Insufficient options for proto=fd [ 163.375474] 9pnet_virtio: no channels available for device (null) [ 163.379151] hfsplus: unable to find HFS+ superblock 21:24:12 executing program 4: bind$inet(0xffffffffffffffff, &(0x7f0000e5b000)={0x2, 0x4e20, @multicast1=0xe0000001}, 0x10) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x4e20}, 0x10) r0 = open(&(0x7f0000000140)='./file0\x00', 0x2040, 0x0) mount$9p_fd(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='9p\x00', 0x0, &(0x7f0000000180)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d}, 0x2c}) 21:24:12 executing program 0: syz_open_dev$sndseq(&(0x7f0000000000)='/dev/snd/seq\x00', 0x0, 0x0) userfaultfd(0x0) syz_open_dev$mice(&(0x7f0000000100)='/dev/input/mice\x00', 0x0, 0x0) pselect6(0x40, &(0x7f00000abfc0)={0x3ffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6000}, &(0x7f0000768000), &(0x7f00007fbfc0), &(0x7f0000f22000)={0x0, 0x989680}, &(0x7f0000f14000)={&(0x7f0000553ff8), 0x8}) 21:24:12 executing program 3: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount$9p_fd(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='9p\x00', 0x0, &(0x7f0000000f80)=ANY=[]) 21:24:12 executing program 7: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$hfsplus(&(0x7f0000000040)='hfsplus\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000300), 0x0, &(0x7f0000000380)) 21:24:12 executing program 6: unshare(0x40000) semtimedop(0x0, &(0x7f00000000c0), 0x0, &(0x7f0000efe000)={0x2000}) semop(0x0, &(0x7f00008d8000)=[{0x0, 0x0, 0xffffffffffffffff}], 0x1) semctl$SETALL(0x0, 0x0, 0x11, &(0x7f0000000000)) 21:24:12 executing program 2: syz_mount_image$gfs2(&(0x7f0000000040)='gfi2\x00', &(0x7f0000001740)='./file0\x00', 0x0, 0x0, &(0x7f0000001680), 0x0, &(0x7f0000000880)=ANY=[@ANYBLOB='l']) [ 163.503522] 9pnet: Insufficient options for proto=fd [ 163.521545] 9pnet: Insufficient options for proto=fd [ 163.543609] 9pnet_virtio: no channels available for device (null) 21:24:12 executing program 5: open(&(0x7f00000001c0)='./file0\x00', 0x101142, 0x0) mount$9p_unix(&(0x7f0000000600)='./file0\x00', &(0x7f0000000640)='./file0\x00', &(0x7f0000000680)='9p\x00', 0x202800, &(0x7f0000000280)={'trans=\x00'}) [ 163.559221] hfsplus: unable to find HFS+ superblock 21:24:12 executing program 1: open(&(0x7f00000001c0)='./file0\x00', 0x101142, 0x0) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='9p\x00', 0x0, &(0x7f0000000340)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d}, 0x2c, {[{@dfltuid={'dfltuid', 0x3d}, 0x2c}]}}) 21:24:12 executing program 6: unshare(0x40000) semtimedop(0x0, &(0x7f00000000c0), 0x0, &(0x7f0000efe000)={0x2000}) semop(0x0, &(0x7f00008d8000)=[{0x0, 0x0, 0xffffffffffffffff}], 0x1) semctl$SETALL(0x0, 0x0, 0x11, &(0x7f0000000000)) 21:24:12 executing program 4: bind$inet(0xffffffffffffffff, &(0x7f0000e5b000)={0x2, 0x4e20, @multicast1=0xe0000001}, 0x10) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x4e20}, 0x10) r0 = open(&(0x7f0000000140)='./file0\x00', 0x2040, 0x0) mount$9p_fd(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='9p\x00', 0x0, &(0x7f0000000180)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d}, 0x2c}) 21:24:12 executing program 0: syz_open_dev$sndseq(&(0x7f0000000000)='/dev/snd/seq\x00', 0x0, 0x0) userfaultfd(0x0) syz_open_dev$mice(&(0x7f0000000100)='/dev/input/mice\x00', 0x0, 0x0) pselect6(0x40, &(0x7f00000abfc0)={0x3ffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1600}, &(0x7f0000768000), &(0x7f00007fbfc0), &(0x7f0000f22000)={0x0, 0x989680}, &(0x7f0000f14000)={&(0x7f0000553ff8), 0x8}) 21:24:12 executing program 2: syz_mount_image$gfs2(&(0x7f0000000040)='gfp2\x00', &(0x7f0000001740)='./file0\x00', 0x0, 0x0, &(0x7f0000001680), 0x0, &(0x7f0000000880)=ANY=[@ANYBLOB='l']) 21:24:12 executing program 7: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$hfsplus(&(0x7f0000000040)='hfsplus\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000300), 0x0, &(0x7f0000000380)) [ 163.666736] 9pnet: Insufficient options for proto=fd 21:24:12 executing program 5: mount$9p_unix(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='9p\x00', 0x1000, &(0x7f0000000300)=ANY=[]) mount$9p_unix(&(0x7f0000000600)='./file0\x00', &(0x7f0000000640)='./file0\x00', &(0x7f0000000680)='9p\x00', 0x202800, &(0x7f0000000280)={'trans=\x00'}) 21:24:12 executing program 3: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount$9p_fd(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='9p\x00', 0x0, &(0x7f0000000f80)=ANY=[@ANYBLOB]) [ 163.694357] 9pnet: Insufficient options for proto=fd 21:24:12 executing program 1: open(&(0x7f00000001c0)='./file0\x00', 0x101142, 0x0) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='9p\x00', 0x0, &(0x7f0000000340)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d}, 0x2c, {[{@dfltuid={'dfltuid', 0x3d}, 0x2c}]}}) 21:24:12 executing program 6: unshare(0x40000) semtimedop(0x0, &(0x7f00000000c0)=[{0x0, 0x0, 0x1000}], 0x1, &(0x7f0000efe000)={0x2000}) semop(0x0, &(0x7f00008d8000)=[{0x0, 0x0, 0xffffffffffffffff}], 0x1) semctl$SETALL(0x0, 0x0, 0x11, &(0x7f0000000000)) 21:24:12 executing program 0: syz_open_dev$sndseq(&(0x7f0000000000)='/dev/snd/seq\x00', 0x0, 0x0) userfaultfd(0x0) syz_open_dev$mice(&(0x7f0000000100)='/dev/input/mice\x00', 0x0, 0x0) pselect6(0x40, &(0x7f00000abfc0)={0x3ffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000000000000}, &(0x7f0000768000), &(0x7f00007fbfc0), &(0x7f0000f22000)={0x0, 0x989680}, &(0x7f0000f14000)={&(0x7f0000553ff8), 0x8}) 21:24:12 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(0xffffffffffffffff, &(0x7f0000e5b000)={0x2, 0x4e20, @multicast1=0xe0000001}, 0x10) connect$inet(r0, &(0x7f0000000000)={0x2, 0x4e20}, 0x10) r1 = open(&(0x7f0000000140)='./file0\x00', 0x2040, 0x0) mount$9p_fd(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='9p\x00', 0x0, &(0x7f0000000180)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c}) [ 163.754206] 9pnet_virtio: no channels available for device (null) [ 163.775289] hfsplus: unable to find HFS+ superblock 21:24:12 executing program 5: mount$9p_unix(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='9p\x00', 0x1000, &(0x7f0000000300)=ANY=[]) mount$9p_unix(&(0x7f0000000600)='./file0\x00', &(0x7f0000000640)='./file0\x00', &(0x7f0000000680)='9p\x00', 0x202800, &(0x7f0000000280)={'trans=\x00'}) 21:24:12 executing program 7: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$hfsplus(&(0x7f0000000040)='hfsplus\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000300), 0x0, &(0x7f0000000380)) 21:24:12 executing program 2: syz_mount_image$gfs2(&(0x7f0000000040)='gfl2\x00', &(0x7f0000001740)='./file0\x00', 0x0, 0x0, &(0x7f0000001680), 0x0, &(0x7f0000000880)=ANY=[@ANYBLOB='l']) [ 163.831641] 9pnet: Insufficient options for proto=fd 21:24:12 executing program 3: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount$9p_fd(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='9p\x00', 0x0, &(0x7f0000000f80)=ANY=[@ANYBLOB]) [ 163.911394] hfsplus: unable to find HFS+ superblock 21:24:13 executing program 6: unshare(0x40000) semtimedop(0x0, &(0x7f00000000c0)=[{0x0, 0x0, 0x1000}], 0x1, &(0x7f0000efe000)={0x2000}) semop(0x0, &(0x7f00008d8000)=[{0x0, 0x0, 0xffffffffffffffff}], 0x1) semctl$SETALL(0x0, 0x0, 0x11, &(0x7f0000000000)) 21:24:13 executing program 0: syz_open_dev$sndseq(&(0x7f0000000000)='/dev/snd/seq\x00', 0x0, 0x0) userfaultfd(0x0) syz_open_dev$mice(&(0x7f0000000100)='/dev/input/mice\x00', 0x0, 0x0) pselect6(0x40, &(0x7f00000abfc0)={0x3ffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000000000}, &(0x7f0000768000), &(0x7f00007fbfc0), &(0x7f0000f22000)={0x0, 0x989680}, &(0x7f0000f14000)={&(0x7f0000553ff8), 0x8}) 21:24:13 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(0xffffffffffffffff, &(0x7f0000e5b000)={0x2, 0x4e20, @multicast1=0xe0000001}, 0x10) connect$inet(r0, &(0x7f0000000000)={0x2, 0x4e20}, 0x10) r1 = open(&(0x7f0000000140)='./file0\x00', 0x2040, 0x0) mount$9p_fd(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='9p\x00', 0x0, &(0x7f0000000180)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c}) 21:24:13 executing program 1: open(&(0x7f00000001c0)='./file0\x00', 0x101142, 0x0) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='9p\x00', 0x0, &(0x7f0000000340)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d}, 0x2c, {[{@dfltuid={'dfltuid', 0x3d}, 0x2c}]}}) [ 163.944997] 9pnet_virtio: no channels available for device (null) 21:24:13 executing program 5: mount$9p_unix(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='9p\x00', 0x1000, &(0x7f0000000300)=ANY=[]) mount$9p_unix(&(0x7f0000000600)='./file0\x00', &(0x7f0000000640)='./file0\x00', &(0x7f0000000680)='9p\x00', 0x202800, &(0x7f0000000280)={'trans=\x00'}) 21:24:13 executing program 2: syz_mount_image$gfs2(&(0x7f0000000040)='gf*2\x00', &(0x7f0000001740)='./file0\x00', 0x0, 0x0, &(0x7f0000001680), 0x0, &(0x7f0000000880)=ANY=[@ANYBLOB='l']) 21:24:13 executing program 7: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$hfsplus(&(0x7f0000000040)="686673706c75737f", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000300), 0x0, &(0x7f0000000380)) 21:24:13 executing program 3: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount$9p_fd(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='9p\x00', 0x0, &(0x7f0000000f80)=ANY=[@ANYBLOB]) 21:24:13 executing program 6: unshare(0x40000) semtimedop(0x0, &(0x7f00000000c0)=[{0x0, 0x0, 0x1000}], 0x1, &(0x7f0000efe000)={0x2000}) semop(0x0, &(0x7f00008d8000)=[{0x0, 0x0, 0xffffffffffffffff}], 0x1) semctl$SETALL(0x0, 0x0, 0x11, &(0x7f0000000000)) [ 164.060763] 9pnet: Insufficient options for proto=fd 21:24:13 executing program 0: syz_open_dev$sndseq(&(0x7f0000000000)='/dev/snd/seq\x00', 0x0, 0x0) userfaultfd(0x0) syz_open_dev$mice(&(0x7f0000000100)='/dev/input/mice\x00', 0x0, 0x0) pselect6(0x40, &(0x7f00000abfc0)={0x3ffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x60000000}, &(0x7f0000768000), &(0x7f00007fbfc0), &(0x7f0000f22000)={0x0, 0x989680}, &(0x7f0000f14000)={&(0x7f0000553ff8), 0x8}) 21:24:13 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(0xffffffffffffffff, &(0x7f0000e5b000)={0x2, 0x4e20, @multicast1=0xe0000001}, 0x10) connect$inet(r0, &(0x7f0000000000)={0x2, 0x4e20}, 0x10) r1 = open(&(0x7f0000000140)='./file0\x00', 0x2040, 0x0) mount$9p_fd(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='9p\x00', 0x0, &(0x7f0000000180)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c}) 21:24:13 executing program 5: open(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='9p\x00', 0x1000, &(0x7f0000000300)=ANY=[]) mount$9p_unix(&(0x7f0000000600)='./file0\x00', &(0x7f0000000640)='./file0\x00', &(0x7f0000000680)='9p\x00', 0x202800, &(0x7f0000000280)={'trans=\x00'}) 21:24:13 executing program 1: open(&(0x7f00000001c0)='./file0\x00', 0x101142, 0x0) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='9p\x00', 0x0, &(0x7f0000000340)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c}) 21:24:13 executing program 2: syz_mount_image$gfs2(&(0x7f0000000040)='gf.2\x00', &(0x7f0000001740)='./file0\x00', 0x0, 0x0, &(0x7f0000001680), 0x0, &(0x7f0000000880)=ANY=[@ANYBLOB='l']) 21:24:13 executing program 7: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$hfsplus(&(0x7f0000000040)='hfsplus\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000300), 0x0, &(0x7f0000000380)) [ 164.160965] 9pnet_virtio: no channels available for device (null) 21:24:13 executing program 6: unshare(0x40000) semtimedop(0x0, &(0x7f00000000c0)=[{0x0, 0xfffffffffffffff9}], 0x1, &(0x7f0000efe000)={0x2000}) semop(0x0, &(0x7f00008d8000)=[{0x0, 0x0, 0xffffffffffffffff}], 0x1) semctl$SETALL(0x0, 0x0, 0x11, &(0x7f0000000000)) 21:24:13 executing program 3: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount$9p_fd(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='9p\x00', 0x0, &(0x7f0000000f80)=ANY=[@ANYBLOB='trans=fd,port=?689=83']) 21:24:13 executing program 5: open(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='9p\x00', 0x1000, &(0x7f0000000300)=ANY=[]) mount$9p_unix(&(0x7f0000000600)='./file0\x00', &(0x7f0000000640)='./file0\x00', &(0x7f0000000680)='9p\x00', 0x202800, &(0x7f0000000280)={'trans=\x00'}) 21:24:13 executing program 1: open(&(0x7f00000001c0)='./file0\x00', 0x101142, 0x0) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='9p\x00', 0x0, &(0x7f0000000340)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c}) [ 164.292990] hfsplus: unable to find HFS+ superblock 21:24:13 executing program 0: syz_open_dev$sndseq(&(0x7f0000000000)='/dev/snd/seq\x00', 0x0, 0x0) userfaultfd(0x0) syz_open_dev$mice(&(0x7f0000000100)='/dev/input/mice\x00', 0x0, 0x0) pselect6(0x40, &(0x7f00000abfc0)={0x3ffffd}, &(0x7f0000768000)={0x16000000}, &(0x7f00007fbfc0), &(0x7f0000f22000)={0x0, 0x989680}, &(0x7f0000f14000)={&(0x7f0000553ff8), 0x8}) 21:24:13 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x0, @multicast1=0xe0000001}, 0x10) connect$inet(r0, &(0x7f0000000000)={0x2, 0x4e20}, 0x10) r1 = open(&(0x7f0000000140)='./file0\x00', 0x2040, 0x0) mount$9p_fd(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='9p\x00', 0x0, &(0x7f0000000180)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c}) [ 164.315264] 9pnet: Insufficient options for proto=fd 21:24:13 executing program 7: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$hfsplus(&(0x7f0000000040)='hfsplus\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000300), 0x0, &(0x7f0000000380)) 21:24:13 executing program 2: syz_mount_image$gfs2(&(0x7f0000000040)='gf02\x00', &(0x7f0000001740)='./file0\x00', 0x0, 0x0, &(0x7f0000001680), 0x0, &(0x7f0000000880)=ANY=[@ANYBLOB='l']) 21:24:13 executing program 5: open(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='9p\x00', 0x1000, &(0x7f0000000300)=ANY=[]) mount$9p_unix(&(0x7f0000000600)='./file0\x00', &(0x7f0000000640)='./file0\x00', &(0x7f0000000680)='9p\x00', 0x202800, &(0x7f0000000280)={'trans=\x00'}) 21:24:13 executing program 1: open(&(0x7f00000001c0)='./file0\x00', 0x101142, 0x0) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='9p\x00', 0x0, &(0x7f0000000340)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c}) 21:24:13 executing program 3: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount$9p_fd(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='9p\x00', 0x0, &(0x7f0000000f80)=ANY=[@ANYBLOB='trans=fd,port=?689=83']) 21:24:13 executing program 0: syz_open_dev$sndseq(&(0x7f0000000000)='/dev/snd/seq\x00', 0x0, 0x0) userfaultfd(0x0) syz_open_dev$mice(&(0x7f0000000100)='/dev/input/mice\x00', 0x0, 0x0) pselect6(0x40, &(0x7f00000abfc0)={0x3ffffd}, &(0x7f0000768000)={0x1000000}, &(0x7f00007fbfc0), &(0x7f0000f22000)={0x0, 0x989680}, &(0x7f0000f14000)={&(0x7f0000553ff8), 0x8}) [ 164.453188] hfsplus: unable to find HFS+ superblock 21:24:13 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x0, @multicast1=0xe0000001}, 0x10) connect$inet(r0, &(0x7f0000000000)={0x2, 0x4e20}, 0x10) r1 = open(&(0x7f0000000140)='./file0\x00', 0x2040, 0x0) mount$9p_fd(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='9p\x00', 0x0, &(0x7f0000000180)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c}) [ 164.519851] 9pnet: Insufficient options for proto=fd 21:24:13 executing program 5: open(&(0x7f00000001c0)='./file0\x00', 0x101142, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='9p\x00', 0x0, &(0x7f0000000300)=ANY=[]) mount$9p_unix(&(0x7f0000000600)='./file0\x00', &(0x7f0000000640)='./file0\x00', &(0x7f0000000680)='9p\x00', 0x202800, &(0x7f0000000280)={'trans=\x00'}) 21:24:13 executing program 7: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$hfsplus(&(0x7f0000000040)="686673706c75738c", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000300), 0x0, &(0x7f0000000380)) 21:24:13 executing program 2: syz_mount_image$gfs2(&(0x7f0000000040)='gfX2\x00', &(0x7f0000001740)='./file0\x00', 0x0, 0x0, &(0x7f0000001680), 0x0, &(0x7f0000000880)=ANY=[@ANYBLOB='l']) [ 164.625252] 9pnet_virtio: no channels available for device ./file0 21:24:14 executing program 6: unshare(0x40000) semtimedop(0x0, &(0x7f00000000c0)=[{0x0, 0xfffffffffffffff9}], 0x1, &(0x7f0000efe000)={0x2000}) semop(0x0, &(0x7f00008d8000)=[{0x0, 0x0, 0xffffffffffffffff}], 0x1) semctl$SETALL(0x0, 0x0, 0x11, &(0x7f0000000000)) 21:24:14 executing program 3: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount$9p_fd(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='9p\x00', 0x0, &(0x7f0000000f80)=ANY=[@ANYBLOB='trans=fd,port=?689=83']) 21:24:14 executing program 0: syz_open_dev$sndseq(&(0x7f0000000000)='/dev/snd/seq\x00', 0x0, 0x0) userfaultfd(0x0) syz_open_dev$mice(&(0x7f0000000100)='/dev/input/mice\x00', 0x0, 0x0) pselect6(0x40, &(0x7f00000abfc0)={0x3ffffd}, &(0x7f0000768000)={0x6000}, &(0x7f00007fbfc0), &(0x7f0000f22000)={0x0, 0x989680}, &(0x7f0000f14000)={&(0x7f0000553ff8), 0x8}) 21:24:14 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x0, @multicast1=0xe0000001}, 0x10) connect$inet(r0, &(0x7f0000000000)={0x2, 0x4e20}, 0x10) r1 = open(&(0x7f0000000140)='./file0\x00', 0x2040, 0x0) mount$9p_fd(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='9p\x00', 0x0, &(0x7f0000000180)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c}) 21:24:14 executing program 7: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$hfsplus(&(0x7f0000000040)='hfsplus\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000300), 0x0, &(0x7f0000000380)) 21:24:14 executing program 1: 21:24:14 executing program 2: syz_mount_image$gfs2(&(0x7f0000000040)='gfc2\x00', &(0x7f0000001740)='./file0\x00', 0x0, 0x0, &(0x7f0000001680), 0x0, &(0x7f0000000880)=ANY=[@ANYBLOB='l']) 21:24:14 executing program 5: open(&(0x7f00000001c0)='./file0\x00', 0x101142, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='9p\x00', 0x0, &(0x7f0000000300)=ANY=[]) mount$9p_unix(&(0x7f0000000600)='./file0\x00', &(0x7f0000000640)='./file0\x00', &(0x7f0000000680)='9p\x00', 0x202800, &(0x7f0000000280)={'trans=\x00'}) 21:24:14 executing program 1: 21:24:14 executing program 1: 21:24:14 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x4e20, @multicast1=0xe0000001}, 0x10) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x4e20}, 0x10) r1 = open(&(0x7f0000000140)='./file0\x00', 0x2040, 0x0) mount$9p_fd(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='9p\x00', 0x0, &(0x7f0000000180)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c}) [ 165.279671] 9pnet_virtio: no channels available for device ./file0 [ 165.290744] 9pnet: Insufficient options for proto=fd [ 165.301633] hfsplus: unable to find HFS+ superblock 21:24:14 executing program 0: syz_open_dev$sndseq(&(0x7f0000000000)='/dev/snd/seq\x00', 0x0, 0x0) userfaultfd(0x0) syz_open_dev$mice(&(0x7f0000000100)='/dev/input/mice\x00', 0x0, 0x0) pselect6(0x40, &(0x7f00000abfc0)={0x3ffffd}, &(0x7f0000768000)={0x60}, &(0x7f00007fbfc0), &(0x7f0000f22000)={0x0, 0x989680}, &(0x7f0000f14000)={&(0x7f0000553ff8), 0x8}) 21:24:14 executing program 5: open(&(0x7f00000001c0)='./file0\x00', 0x101142, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='9p\x00', 0x0, &(0x7f0000000300)=ANY=[]) mount$9p_unix(&(0x7f0000000600)='./file0\x00', &(0x7f0000000640)='./file0\x00', &(0x7f0000000680)='9p\x00', 0x202800, &(0x7f0000000280)={'trans=\x00'}) 21:24:14 executing program 3: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount$9p_fd(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='9p\x00', 0x0, &(0x7f0000000f80)=ANY=[@ANYBLOB='trans=fd,port=?689=833,rfdno=39']) 21:24:14 executing program 7: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$hfsplus(&(0x7f0000000040)='hfsplus\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000300), 0x0, &(0x7f0000000380)) 21:24:14 executing program 2: syz_mount_image$gfs2(&(0x7f0000000040)='gf#2\x00', &(0x7f0000001740)='./file0\x00', 0x0, 0x0, &(0x7f0000001680), 0x0, &(0x7f0000000880)=ANY=[@ANYBLOB='l']) [ 165.427575] 9pnet_virtio: no channels available for device ./file0 [ 165.432089] 9pnet: Insufficient options for proto=fd [ 165.471347] hfsplus: unable to find HFS+ superblock 21:24:15 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x4e20, @multicast1=0xe0000001}, 0x10) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x4e20}, 0x10) r1 = open(&(0x7f0000000140)='./file0\x00', 0x2040, 0x0) mount$9p_fd(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='9p\x00', 0x0, &(0x7f0000000180)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c}) 21:24:15 executing program 6: unshare(0x40000) semtimedop(0x0, &(0x7f00000000c0)=[{0x0, 0xfffffffffffffff9}], 0x1, &(0x7f0000efe000)={0x2000}) semop(0x0, &(0x7f00008d8000)=[{0x0, 0x0, 0xffffffffffffffff}], 0x1) semctl$SETALL(0x0, 0x0, 0x11, &(0x7f0000000000)) 21:24:15 executing program 1: 21:24:15 executing program 0: syz_open_dev$sndseq(&(0x7f0000000000)='/dev/snd/seq\x00', 0x0, 0x0) userfaultfd(0x0) syz_open_dev$mice(&(0x7f0000000100)='/dev/input/mice\x00', 0x0, 0x0) pselect6(0x40, &(0x7f00000abfc0)={0x3ffffd}, &(0x7f0000768000)={0x64}, &(0x7f00007fbfc0), &(0x7f0000f22000)={0x0, 0x989680}, &(0x7f0000f14000)={&(0x7f0000553ff8), 0x8}) 21:24:15 executing program 3: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount$9p_fd(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='9p\x00', 0x0, &(0x7f0000000f80)=ANY=[@ANYBLOB='trans=fd,port=?689=833,rfdno=39']) 21:24:15 executing program 2: syz_mount_image$gfs2(&(0x7f0000000040)='gfx2\x00', &(0x7f0000001740)='./file0\x00', 0x0, 0x0, &(0x7f0000001680), 0x0, &(0x7f0000000880)=ANY=[@ANYBLOB='l']) 21:24:15 executing program 7: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$hfsplus(&(0x7f0000000040)='hfsplus\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000300), 0x0, &(0x7f0000000380)) 21:24:15 executing program 5: open(&(0x7f00000001c0)='./file0\x00', 0x101142, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='9p\x00', 0x1000, &(0x7f0000000300)=ANY=[]) mount$9p_unix(&(0x7f0000000600)='./file0\x00', &(0x7f0000000640)='./file0\x00', &(0x7f0000000680)='9p\x00', 0x0, &(0x7f0000000280)={'trans=\x00'}) 21:24:15 executing program 1: [ 166.224084] 9pnet: Insufficient options for proto=fd [ 166.226664] 9pnet_virtio: no channels available for device ./file0 [ 166.242427] hfsplus: unable to find HFS+ superblock 21:24:15 executing program 0: syz_open_dev$sndseq(&(0x7f0000000000)='/dev/snd/seq\x00', 0x0, 0x0) userfaultfd(0x0) syz_open_dev$mice(&(0x7f0000000100)='/dev/input/mice\x00', 0x0, 0x0) pselect6(0x40, &(0x7f00000abfc0)={0x3ffffd}, &(0x7f0000768000)={0x6000000000000000}, &(0x7f00007fbfc0), &(0x7f0000f22000)={0x0, 0x989680}, &(0x7f0000f14000)={&(0x7f0000553ff8), 0x8}) 21:24:15 executing program 7: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$hfsplus(&(0x7f0000000040)='hfsplus\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000300), 0x0, &(0x7f0000000380)) 21:24:15 executing program 3: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount$9p_fd(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='9p\x00', 0x0, &(0x7f0000000f80)=ANY=[@ANYBLOB='trans=fd,port=?689=833,rfdno=39']) 21:24:15 executing program 5: open(&(0x7f00000001c0)='./file0\x00', 0x101142, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='9p\x00', 0x1000, &(0x7f0000000300)=ANY=[]) mount$9p_unix(&(0x7f0000000600)='./file0\x00', &(0x7f0000000640)='./file0\x00', &(0x7f0000000680)='9p\x00', 0x0, &(0x7f0000000280)={'trans=\x00'}) 21:24:15 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x4e20, @multicast1=0xe0000001}, 0x10) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x4e20}, 0x10) r1 = open(&(0x7f0000000140)='./file0\x00', 0x2040, 0x0) mount$9p_fd(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='9p\x00', 0x0, &(0x7f0000000180)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c}) 21:24:15 executing program 1: [ 166.365270] hfsplus: unable to find HFS+ superblock 21:24:15 executing program 2: syz_mount_image$gfs2(&(0x7f0000000040)='gfd2\x00', &(0x7f0000001740)='./file0\x00', 0x0, 0x0, &(0x7f0000001680), 0x0, &(0x7f0000000880)=ANY=[@ANYBLOB='l']) 21:24:15 executing program 1: [ 166.422061] 9pnet_virtio: no channels available for device ./file0 [ 166.434513] 9pnet: Insufficient options for proto=fd [ 166.444365] hfsplus: unable to find HFS+ superblock 21:24:16 executing program 6: unshare(0x40000) semtimedop(0x0, &(0x7f00000000c0)=[{0x0, 0xfffffffffffffff9, 0x1000}], 0x1, &(0x7f0000efe000)={0x2000}) semop(0x0, &(0x7f00008d8000), 0x0) semctl$SETALL(0x0, 0x0, 0x11, &(0x7f0000000000)) 21:24:16 executing program 7: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$hfsplus(&(0x7f0000000040)='hfsplush', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000300), 0x0, &(0x7f0000000380)) 21:24:16 executing program 0: syz_open_dev$sndseq(&(0x7f0000000000)='/dev/snd/seq\x00', 0x0, 0x0) userfaultfd(0x0) syz_open_dev$mice(&(0x7f0000000100)='/dev/input/mice\x00', 0x0, 0x0) pselect6(0x40, &(0x7f00000abfc0)={0x3ffffd}, &(0x7f0000768000)={0x6400000000000000}, &(0x7f00007fbfc0), &(0x7f0000f22000)={0x0, 0x989680}, &(0x7f0000f14000)={&(0x7f0000553ff8), 0x8}) 21:24:16 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x4e20, @multicast1=0xe0000001}, 0x10) connect$inet(r0, &(0x7f0000000000)={0x2}, 0x10) r1 = open(&(0x7f0000000140)='./file0\x00', 0x2040, 0x0) mount$9p_fd(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='9p\x00', 0x0, &(0x7f0000000180)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c}) 21:24:16 executing program 3: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount$9p_fd(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='9p\x00', 0x0, &(0x7f0000000f80)=ANY=[@ANYBLOB='trans=fd,port=?689=833,rfdno=3949,wf']) 21:24:16 executing program 5: open(&(0x7f00000001c0)='./file0\x00', 0x101142, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='9p\x00', 0x1000, &(0x7f0000000300)=ANY=[]) mount$9p_unix(&(0x7f0000000600)='./file0\x00', &(0x7f0000000640)='./file0\x00', &(0x7f0000000680)='9p\x00', 0x0, &(0x7f0000000280)={'trans=\x00'}) 21:24:16 executing program 2: syz_mount_image$gfs2(&(0x7f0000000040)='gf-2\x00', &(0x7f0000001740)='./file0\x00', 0x0, 0x0, &(0x7f0000001680), 0x0, &(0x7f0000000880)=ANY=[@ANYBLOB='l']) 21:24:16 executing program 1: 21:24:16 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000100)="025cc83d6d345f8f762070") msgsnd(0x0, &(0x7f00000019c0)={0x3, "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"}, 0xfd1, 0x0) [ 167.202175] 9pnet: Insufficient options for proto=fd [ 167.213643] 9pnet_virtio: no channels available for device ./file0 21:24:16 executing program 7: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$hfsplus(&(0x7f0000000040)='hfsplus\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000300), 0x0, &(0x7f0000000380)) 21:24:16 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x4e20, @multicast1=0xe0000001}, 0x10) connect$inet(r0, &(0x7f0000000000)={0x2}, 0x10) r1 = open(&(0x7f0000000140)='./file0\x00', 0x2040, 0x0) mount$9p_fd(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='9p\x00', 0x0, &(0x7f0000000180)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c}) 21:24:16 executing program 0: syz_open_dev$sndseq(&(0x7f0000000000)='/dev/snd/seq\x00', 0x0, 0x0) userfaultfd(0x0) syz_open_dev$mice(&(0x7f0000000100)='/dev/input/mice\x00', 0x0, 0x0) pselect6(0x40, &(0x7f00000abfc0)={0x3ffffd}, &(0x7f0000768000)={0x64000000}, &(0x7f00007fbfc0), &(0x7f0000f22000)={0x0, 0x989680}, &(0x7f0000f14000)={&(0x7f0000553ff8), 0x8}) 21:24:16 executing program 3: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount$9p_fd(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='9p\x00', 0x0, &(0x7f0000000f80)=ANY=[@ANYBLOB='trans=fd,port=?689=833,rfdno=3949,wf']) 21:24:16 executing program 5: mkdir(&(0x7f00000001c0)='./file1\x00', 0x0) mount$9p_unix(&(0x7f0000000000)='./file1\x00', &(0x7f0000000040)='./file1\x00', &(0x7f0000000140)='9p\x00', 0x0, &(0x7f0000000240)={'trans=unix,'}) 21:24:16 executing program 2: syz_mount_image$gfs2(&(0x7f0000000040)='gf+2\x00', &(0x7f0000001740)='./file0\x00', 0x0, 0x0, &(0x7f0000001680), 0x0, &(0x7f0000000880)=ANY=[@ANYBLOB='l']) 21:24:16 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x1, 0x3, &(0x7f00009ff000)=@framed={{0x18}, [], {0x95}}, &(0x7f00002bf000)='syzkaller\x00', 0x1, 0xb7, &(0x7f0000000440)=""/183}, 0x48) [ 167.354684] hfsplus: unable to find HFS+ superblock [ 167.374143] 9pnet: Insufficient options for proto=fd [ 167.389705] 9pnet: p9_fd_create_unix (14011): problem connecting socket: ./file1: -111 21:24:17 executing program 3: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount$9p_fd(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='9p\x00', 0x0, &(0x7f0000000f80)=ANY=[@ANYBLOB='trans=fd,port=?689=833,rfdno=3949,wf']) 21:24:17 executing program 6: unshare(0x40000) semtimedop(0x0, &(0x7f00000000c0)=[{0x0, 0xfffffffffffffff9, 0x1000}], 0x1, &(0x7f0000efe000)={0x2000}) semop(0x0, &(0x7f00008d8000), 0x0) semctl$SETALL(0x0, 0x0, 0x11, &(0x7f0000000000)) 21:24:17 executing program 7: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$hfsplus(&(0x7f0000000040)='hfsplus\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000300), 0x0, &(0x7f0000000380)) 21:24:17 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x4e20, @multicast1=0xe0000001}, 0x10) connect$inet(r0, &(0x7f0000000000)={0x2}, 0x10) r1 = open(&(0x7f0000000140)='./file0\x00', 0x2040, 0x0) mount$9p_fd(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='9p\x00', 0x0, &(0x7f0000000180)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c}) 21:24:17 executing program 5: mkdir(&(0x7f00000001c0)='./file1\x00', 0x0) mount$9p_unix(&(0x7f0000000000)='./file1\x00', &(0x7f0000000040)='./file1\x00', &(0x7f0000000140)='9p\x00', 0x0, &(0x7f0000000240)={'trans=unix,'}) 21:24:17 executing program 0: syz_open_dev$sndseq(&(0x7f0000000000)='/dev/snd/seq\x00', 0x0, 0x0) userfaultfd(0x0) syz_open_dev$mice(&(0x7f0000000100)='/dev/input/mice\x00', 0x0, 0x0) pselect6(0x40, &(0x7f00000abfc0)={0x3ffffd}, &(0x7f0000768000)={0x1600000000000000}, &(0x7f00007fbfc0), &(0x7f0000f22000)={0x0, 0x989680}, &(0x7f0000f14000)={&(0x7f0000553ff8), 0x8}) 21:24:17 executing program 2: syz_mount_image$gfs2(&(0x7f0000000040)='gf\n2\x00', &(0x7f0000001740)='./file0\x00', 0x0, 0x0, &(0x7f0000001680), 0x0, &(0x7f0000000880)=ANY=[@ANYBLOB='l']) 21:24:17 executing program 1: r0 = socket$inet6(0xa, 0x5, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = socket$kcm(0x2, 0x3, 0x84) r2 = socket$inet6(0xa, 0x7fd, 0x3) ioctl(r2, 0x4000008912, &(0x7f0000000100)="295ee1311f16f477671070") r3 = socket$inet6(0xa, 0x1, 0x0) ioctl(r3, 0x4000008912, &(0x7f0000000100)="295ee1311f16f477671070") socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000013000)={0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r4, 0x1, 0x1a, &(0x7f0000004ff0)={0x3, &(0x7f0000002fe8)=[{0x25, 0x0, 0x4000000000401}, {}, {0x6}]}, 0x10) r5 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_MRT6_ADD_MIF(r5, 0x29, 0xca, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x5}, 0xc) r6 = socket$inet6(0xa, 0x1, 0x0) ioctl(r6, 0x4000008912, &(0x7f00000000c0)="295ee1311f16f477671070") socketpair$inet(0x2, 0x87b000624f0f697f, 0x7, &(0x7f0000001880)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$inet6_mtu(r3, 0x29, 0x17, &(0x7f0000000480), &(0x7f00000004c0)=0x4) getsockopt$inet_sctp_SCTP_ADAPTATION_LAYER(r7, 0x84, 0x7, &(0x7f00000018c0), &(0x7f0000001900)=0x4) r8 = socket$netlink(0x10, 0x3, 0x2) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r6, 0x84, 0x6b, &(0x7f0000000380)=[@in={0x2, 0x4e20, @rand_addr=0x8001}, @in={0x2, 0x4e22, @rand_addr=0x8}, @in6={0xa, 0x4e21, 0x100, @remote={0xfe, 0x80, [], 0xbb}, 0x400}, @in6={0xa, 0x4e22, 0xffffffffffff7fff, @empty, 0x6}, @in6={0xa, 0x4e23, 0x101, @remote={0xfe, 0x80, [], 0xbb}, 0x7fff}, @in={0x2, 0x4e24, @broadcast=0xffffffff}, @in={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0xb}}, @in={0x2, 0x4e23, @broadcast=0xffffffff}, @in={0x2, 0x4e22, @loopback=0x7f000001}, @in={0x2, 0x4e21, @loopback=0x7f000001}], 0xc4) r9 = syz_genetlink_get_family_id$fou(&(0x7f0000000240)='fou\x00') sendmsg$FOU_CMD_ADD(r8, &(0x7f0000000340)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000300)={&(0x7f0000000280)={0x30, r9, 0x0, 0x70bd25, 0x25dfdbfc, {0x1}, [@FOU_ATTR_PORT={0x8, 0x1, 0x4e24}, @FOU_ATTR_IPPROTO={0x8, 0x3, 0x7f}, @FOU_ATTR_REMCSUM_NOPARTIAL={0x4, 0x5}, @FOU_ATTR_PORT={0x8, 0x1, 0x4e20}]}, 0x30}, 0x1, 0x0, 0x0, 0xc080}, 0x40000) r10 = socket$kcm(0x2, 0x5, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000180)=ANY=[], &(0x7f0000000200)="47501a00f9d3c471b4a5430b11691d81fb4b9c49106ab3a01eaa6e1494e10112f6e527a746961b2da661bc0517d1fed124f6efb4292dc4c6df52a2c0623cdc1a18767d961c26d3aa8c633a234967dfe047b15997efc5a3bb522cb0393846dcc3f6e76a288635697c642b3cc7b3b36b3d1354dd508712a1f15e3b542d8a0c0c9a73d19d952bcef7d7d5cb703b44c4f17e5f76e7a2f9c44e076fb1000000000000000000000000000000", 0x2, 0xab93031f99fda67f, &(0x7f0000000080)=""/251}, 0x48) sendmsg(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)=@nfc={0x27, 0x0, 0x2}, 0xd0b7a20e2b82d5d5, &(0x7f00000019c0)}, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r10, 0x890b, &(0x7f0000000000)) sendmsg$kcm(r1, &(0x7f0000000240)={&(0x7f0000000140)=@in={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x80, &(0x7f0000000200)}, 0x8000) sendmsg(r1, &(0x7f0000000340)={&(0x7f0000000040)=@un=@abs, 0x80, &(0x7f00000002c0)=[{&(0x7f00000000c0)="6af8a9bba3539ed9fdc711ff08dbc72e", 0x10}], 0x1, &(0x7f0000000380)}, 0x0) setsockopt$sock_int(r1, 0x1, 0xa, &(0x7f0000000000)=0xfffffffffffffffc, 0x4) 21:24:17 executing program 0: syz_open_dev$sndseq(&(0x7f0000000000)='/dev/snd/seq\x00', 0x0, 0x0) userfaultfd(0x0) syz_open_dev$mice(&(0x7f0000000100)='/dev/input/mice\x00', 0x0, 0x0) pselect6(0x40, &(0x7f00000abfc0)={0x3ffffd}, &(0x7f0000768000)={0x800000000000000}, &(0x7f00007fbfc0), &(0x7f0000f22000)={0x0, 0x989680}, &(0x7f0000f14000)={&(0x7f0000553ff8), 0x8}) [ 168.185956] 9pnet: p9_fd_create_unix (14050): problem connecting socket: ./file1: -111 [ 168.197555] raw_sendmsg: syz-executor1 forgot to set AF_INET. Fix it! [ 168.205672] 9pnet: Insufficient options for proto=fd [ 168.221711] hfsplus: unable to find HFS+ superblock 21:24:17 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x4e20, @multicast1=0xe0000001}, 0x10) connect$inet(r0, &(0x7f0000000000)={0x2, 0x4e20}, 0x10) r1 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) mount$9p_fd(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='9p\x00', 0x0, &(0x7f0000000180)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c}) 21:24:17 executing program 5: mkdir(&(0x7f00000001c0)='./file1\x00', 0x0) mount$9p_unix(&(0x7f0000000000)='./file1\x00', &(0x7f0000000040)='./file1\x00', &(0x7f0000000140)='9p\x00', 0x0, &(0x7f0000000240)={'trans=unix,'}) 21:24:17 executing program 1: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) name_to_handle_at(r0, &(0x7f0000000300)='\x00', &(0x7f0000000200)={0xc, 0x0, "a684405d"}, &(0x7f0000000100), 0x1000) 21:24:17 executing program 3: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount$9p_fd(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='9p\x00', 0x0, &(0x7f0000000f80)=ANY=[@ANYBLOB='trans=fd,port=?689=833,rfdno=3949,wfdno']) 21:24:17 executing program 7: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$hfsplus(&(0x7f0000000040)='hfsplus\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000300), 0x0, &(0x7f0000000380)) 21:24:17 executing program 2: syz_mount_image$gfs2(&(0x7f0000000040)='gfo2\x00', &(0x7f0000001740)='./file0\x00', 0x0, 0x0, &(0x7f0000001680), 0x0, &(0x7f0000000880)=ANY=[@ANYBLOB='l']) [ 168.324272] 9pnet: Insufficient options for proto=fd 21:24:17 executing program 0: syz_open_dev$sndseq(&(0x7f0000000000)='/dev/snd/seq\x00', 0x0, 0x0) userfaultfd(0x0) syz_open_dev$mice(&(0x7f0000000100)='/dev/input/mice\x00', 0x0, 0x0) pselect6(0x40, &(0x7f00000abfc0)={0x3ffffd}, &(0x7f0000768000)={0x60000000}, &(0x7f00007fbfc0), &(0x7f0000f22000)={0x0, 0x989680}, &(0x7f0000f14000)={&(0x7f0000553ff8), 0x8}) 21:24:17 executing program 3: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount$9p_fd(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='9p\x00', 0x0, &(0x7f0000000f80)=ANY=[@ANYBLOB='trans=fd,port=?689=833,rfdno=3949,wfdno']) [ 168.370190] 9pnet: p9_fd_create_unix (14078): problem connecting socket: ./file1: -111 [ 168.418819] hfsplus: unable to find HFS+ superblock [ 168.447645] 9pnet: Insufficient options for proto=fd 21:24:18 executing program 6: unshare(0x40000) semtimedop(0x0, &(0x7f00000000c0)=[{0x0, 0xfffffffffffffff9, 0x1000}], 0x1, &(0x7f0000efe000)={0x2000}) semop(0x0, &(0x7f00008d8000), 0x0) semctl$SETALL(0x0, 0x0, 0x11, &(0x7f0000000000)) 21:24:18 executing program 1: mkdir(&(0x7f00000001c0)='./file1\x00', 0x0) mkdir(&(0x7f0000000300)='./file1/../file0\x00', 0x0) 21:24:18 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x4e20, @multicast1=0xe0000001}, 0x10) connect$inet(r0, &(0x7f0000000000)={0x2, 0x4e20}, 0x10) r1 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) mount$9p_fd(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='9p\x00', 0x0, &(0x7f0000000180)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c}) 21:24:18 executing program 2: syz_mount_image$gfs2(&(0x7f0000000040)='gf%2\x00', &(0x7f0000001740)='./file0\x00', 0x0, 0x0, &(0x7f0000001680), 0x0, &(0x7f0000000880)=ANY=[@ANYBLOB='l']) 21:24:18 executing program 5: mkdir(&(0x7f00000001c0)='./file1\x00', 0x0) mount$9p_unix(&(0x7f0000000000)='./file1\x00', &(0x7f0000000040)='./file1\x00', &(0x7f0000000140)='9p\x00', 0x0, &(0x7f0000000240)={'trans=unix,'}) 21:24:18 executing program 0: syz_open_dev$sndseq(&(0x7f0000000000)='/dev/snd/seq\x00', 0x0, 0x0) userfaultfd(0x0) syz_open_dev$mice(&(0x7f0000000100)='/dev/input/mice\x00', 0x0, 0x0) pselect6(0x40, &(0x7f00000abfc0)={0x3ffffd}, &(0x7f0000768000)={0x6400}, &(0x7f00007fbfc0), &(0x7f0000f22000)={0x0, 0x989680}, &(0x7f0000f14000)={&(0x7f0000553ff8), 0x8}) 21:24:18 executing program 7: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$hfsplus(&(0x7f0000000040)="686673706c757305", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000300), 0x0, &(0x7f0000000380)) 21:24:18 executing program 3: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount$9p_fd(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='9p\x00', 0x0, &(0x7f0000000f80)=ANY=[@ANYBLOB='trans=fd,port=?689=833,rfdno=3949,wfdno']) 21:24:18 executing program 1: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x0) r1 = memfd_create(&(0x7f0000000080)="74086e750000000000000000008c00", 0x0) dup2(r1, r0) [ 169.141611] 9pnet: Insufficient options for proto=fd [ 169.143335] 9pnet: p9_fd_create_unix (14119): problem connecting socket: ./file1: -111 21:24:18 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x4e20, @multicast1=0xe0000001}, 0x10) connect$inet(r0, &(0x7f0000000000)={0x2, 0x4e20}, 0x10) r1 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) mount$9p_fd(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='9p\x00', 0x0, &(0x7f0000000180)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c}) 21:24:18 executing program 3: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount$9p_fd(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='9p\x00', 0x0, &(0x7f0000000f80)=ANY=[@ANYBLOB='trans=fd,port=?689=833,rfdno=3949,wfdno=']) 21:24:18 executing program 5: mount$9p_unix(&(0x7f0000000000)='./file1\x00', &(0x7f0000000040)='./file1\x00', &(0x7f0000000140)='9p\x00', 0x0, &(0x7f0000000240)={'trans=unix,'}) 21:24:18 executing program 2: syz_mount_image$gfs2(&(0x7f0000000040)='gfu2\x00', &(0x7f0000001740)='./file0\x00', 0x0, 0x0, &(0x7f0000001680), 0x0, &(0x7f0000000880)=ANY=[@ANYBLOB='l']) 21:24:18 executing program 7: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$hfsplus(&(0x7f0000000040)='hfsplus\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000300), 0x0, &(0x7f0000000380)) 21:24:18 executing program 0: syz_open_dev$sndseq(&(0x7f0000000000)='/dev/snd/seq\x00', 0x0, 0x0) userfaultfd(0x0) syz_open_dev$mice(&(0x7f0000000100)='/dev/input/mice\x00', 0x0, 0x0) pselect6(0x40, &(0x7f00000abfc0)={0x3ffffd}, &(0x7f0000768000)={0x1000000000000000}, &(0x7f00007fbfc0), &(0x7f0000f22000)={0x0, 0x989680}, &(0x7f0000f14000)={&(0x7f0000553ff8), 0x8}) 21:24:18 executing program 1: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup.net/syz1\x00', 0x1ff) [ 169.293920] 9pnet: Insufficient options for proto=fd [ 169.334899] hfsplus: unable to find HFS+ superblock 21:24:19 executing program 5: mount$9p_unix(&(0x7f0000000000)='./file1\x00', &(0x7f0000000040)='./file1\x00', &(0x7f0000000140)='9p\x00', 0x0, &(0x7f0000000240)={'trans=unix,'}) 21:24:19 executing program 6: unshare(0x40000) semtimedop(0x0, &(0x7f00000000c0)=[{0x0, 0xfffffffffffffff9, 0x1000}], 0x1, &(0x7f0000efe000)={0x2000}) semop(0x0, &(0x7f00008d8000)=[{}], 0x1) semctl$SETALL(0x0, 0x0, 0x11, &(0x7f0000000000)) 21:24:19 executing program 3: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount$9p_fd(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='9p\x00', 0x0, &(0x7f0000000f80)=ANY=[@ANYBLOB='trans=fd,port=?689=833,rfdno=3949,wfdno=']) 21:24:19 executing program 7: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$hfsplus(&(0x7f0000000040)='hfsplus\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000300), 0x0, &(0x7f0000000380)) 21:24:19 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x4e20, @multicast1=0xe0000001}, 0x10) connect$inet(r0, &(0x7f0000000000)={0x2, 0x4e20}, 0x10) r1 = open(&(0x7f0000000140)='./file0\x00', 0x2040, 0x0) mount$9p_fd(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='9p\x00', 0x0, &(0x7f0000000180)={'trans=fd,', {'rfdno', 0x3d}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c}) 21:24:19 executing program 0: syz_open_dev$sndseq(&(0x7f0000000000)='/dev/snd/seq\x00', 0x0, 0x0) userfaultfd(0x0) syz_open_dev$mice(&(0x7f0000000100)='/dev/input/mice\x00', 0x0, 0x0) pselect6(0x40, &(0x7f00000abfc0)={0x3ffffd}, &(0x7f0000768000)={0x10000000}, &(0x7f00007fbfc0), &(0x7f0000f22000)={0x0, 0x989680}, &(0x7f0000f14000)={&(0x7f0000553ff8), 0x8}) 21:24:19 executing program 2: syz_mount_image$gfs2(&(0x7f0000000040)='gfs\n\x00', &(0x7f0000001740)='./file0\x00', 0x0, 0x0, &(0x7f0000001680), 0x0, &(0x7f0000000880)=ANY=[@ANYBLOB='l']) 21:24:19 executing program 1: 21:24:19 executing program 1: [ 170.052761] 9pnet: Insufficient options for proto=fd [ 170.063825] 9pnet: Insufficient options for proto=fd 21:24:19 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x4e20, @multicast1=0xe0000001}, 0x10) connect$inet(r0, &(0x7f0000000000)={0x2, 0x4e20}, 0x10) r1 = open(&(0x7f0000000140)='./file0\x00', 0x2040, 0x0) mount$9p_fd(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='9p\x00', 0x0, &(0x7f0000000180)={'trans=fd,', {'rfdno', 0x3d}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c}) 21:24:19 executing program 0: syz_open_dev$sndseq(&(0x7f0000000000)='/dev/snd/seq\x00', 0x0, 0x0) userfaultfd(0x0) syz_open_dev$mice(&(0x7f0000000100)='/dev/input/mice\x00', 0x0, 0x0) pselect6(0x40, &(0x7f00000abfc0)={0x3ffffd}, &(0x7f0000768000)={0x8}, &(0x7f00007fbfc0), &(0x7f0000f22000)={0x0, 0x989680}, &(0x7f0000f14000)={&(0x7f0000553ff8), 0x8}) 21:24:19 executing program 3: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount$9p_fd(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='9p\x00', 0x0, &(0x7f0000000f80)=ANY=[@ANYBLOB='trans=fd,port=?689=833,rfdno=3949,wfdno=']) 21:24:19 executing program 1: 21:24:19 executing program 5: mount$9p_unix(&(0x7f0000000000)='./file1\x00', &(0x7f0000000040)='./file1\x00', &(0x7f0000000140)='9p\x00', 0x0, &(0x7f0000000240)={'trans=unix,'}) [ 170.126702] hfsplus: unable to find HFS+ superblock 21:24:19 executing program 2: syz_mount_image$gfs2(&(0x7f0000000040)='gfs%\x00', &(0x7f0000001740)='./file0\x00', 0x0, 0x0, &(0x7f0000001680), 0x0, &(0x7f0000000880)=ANY=[@ANYBLOB='l']) 21:24:19 executing program 1: 21:24:19 executing program 5: [ 170.238264] 9pnet: Insufficient options for proto=fd [ 170.267056] 9pnet: Insufficient options for proto=fd 21:24:20 executing program 6: unshare(0x40000) semtimedop(0x0, &(0x7f00000000c0)=[{0x0, 0xfffffffffffffff9, 0x1000}], 0x1, &(0x7f0000efe000)={0x2000}) semop(0x0, &(0x7f00008d8000)=[{}], 0x1) semctl$SETALL(0x0, 0x0, 0x11, &(0x7f0000000000)) 21:24:20 executing program 7: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$hfsplus(&(0x7f0000000040)='hfsplus\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000300), 0x0, &(0x7f0000000380)) 21:24:20 executing program 0: syz_open_dev$sndseq(&(0x7f0000000000)='/dev/snd/seq\x00', 0x0, 0x0) userfaultfd(0x0) syz_open_dev$mice(&(0x7f0000000100)='/dev/input/mice\x00', 0x0, 0x0) pselect6(0x40, &(0x7f00000abfc0)={0x3ffffd}, &(0x7f0000768000)={0x100000000000000}, &(0x7f00007fbfc0), &(0x7f0000f22000)={0x0, 0x989680}, &(0x7f0000f14000)={&(0x7f0000553ff8), 0x8}) 21:24:20 executing program 3: 21:24:20 executing program 1: 21:24:20 executing program 5: 21:24:20 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x4e20, @multicast1=0xe0000001}, 0x10) connect$inet(r0, &(0x7f0000000000)={0x2, 0x4e20}, 0x10) r1 = open(&(0x7f0000000140)='./file0\x00', 0x2040, 0x0) mount$9p_fd(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='9p\x00', 0x0, &(0x7f0000000180)={'trans=fd,', {'rfdno', 0x3d}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c}) 21:24:20 executing program 2: syz_mount_image$gfs2(&(0x7f0000000040)="676673ffff", &(0x7f0000001740)='./file0\x00', 0x0, 0x0, &(0x7f0000001680), 0x0, &(0x7f0000000880)=ANY=[@ANYBLOB='l']) 21:24:20 executing program 5: 21:24:20 executing program 3: 21:24:20 executing program 1: [ 170.992416] 9pnet: Insufficient options for proto=fd [ 171.005534] hfsplus: unable to find HFS+ superblock 21:24:20 executing program 0: syz_open_dev$sndseq(&(0x7f0000000000)='/dev/snd/seq\x00', 0x0, 0x0) userfaultfd(0x0) syz_open_dev$mice(&(0x7f0000000100)='/dev/input/mice\x00', 0x0, 0x0) pselect6(0x40, &(0x7f00000abfc0)={0x3ffffd}, &(0x7f0000768000)={0x1000000000000}, &(0x7f00007fbfc0), &(0x7f0000f22000)={0x0, 0x989680}, &(0x7f0000f14000)={&(0x7f0000553ff8), 0x8}) 21:24:20 executing program 7: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$hfsplus(&(0x7f0000000040)='hfsplus\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000300), 0x0, &(0x7f0000000380)) 21:24:20 executing program 2: syz_mount_image$gfs2(&(0x7f0000000040)='gfs2\x00', &(0x7f0000001740)='./file0\x00', 0x0, 0x0, &(0x7f0000001680), 0x0, &(0x7f0000000880)=ANY=[@ANYBLOB='l']) 21:24:20 executing program 1: 21:24:20 executing program 3: [ 171.170069] gfs2: invalid mount option: l [ 171.174410] gfs2: can't parse mount arguments [ 171.188605] hfsplus: unable to find HFS+ superblock [ 171.220949] hfsplus: unable to find HFS+ superblock [ 171.231633] gfs2: invalid mount option: l [ 171.235958] gfs2: can't parse mount arguments 21:24:20 executing program 6: unshare(0x40000) semtimedop(0x0, &(0x7f00000000c0)=[{0x0, 0xfffffffffffffff9, 0x1000}], 0x1, &(0x7f0000efe000)={0x2000}) semop(0x0, &(0x7f00008d8000)=[{}], 0x1) semctl$SETALL(0x0, 0x0, 0x11, &(0x7f0000000000)) 21:24:20 executing program 5: 21:24:20 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x4e20, @multicast1=0xe0000001}, 0x10) connect$inet(r0, &(0x7f0000000000)={0x2, 0x4e20}, 0x10) r1 = open(&(0x7f0000000140)='./file0\x00', 0x2040, 0x0) mount$9p_fd(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='9p\x00', 0x0, &(0x7f0000000180)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {'wfdno', 0x3d}, 0x2c}) 21:24:20 executing program 3: 21:24:20 executing program 1: 21:24:20 executing program 0: syz_open_dev$sndseq(&(0x7f0000000000)='/dev/snd/seq\x00', 0x0, 0x0) userfaultfd(0x0) syz_open_dev$mice(&(0x7f0000000100)='/dev/input/mice\x00', 0x0, 0x0) pselect6(0x40, &(0x7f00000abfc0)={0x3ffffd}, &(0x7f0000768000)={0x8000000}, &(0x7f00007fbfc0), &(0x7f0000f22000)={0x0, 0x989680}, &(0x7f0000f14000)={&(0x7f0000553ff8), 0x8}) 21:24:20 executing program 7: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$hfsplus(&(0x7f0000000040)='hfsplus\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000300), 0x0, &(0x7f0000000380)) 21:24:20 executing program 2: syz_mount_image$gfs2(&(0x7f0000000040)="6766733204", &(0x7f0000001740)='./file0\x00', 0x0, 0x0, &(0x7f0000001680), 0x0, &(0x7f0000000880)=ANY=[@ANYBLOB='l']) 21:24:20 executing program 3: 21:24:20 executing program 1: 21:24:20 executing program 5: [ 171.916262] 9pnet: Insufficient options for proto=fd [ 171.920046] hfsplus: unable to find HFS+ superblock 21:24:21 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x4e20, @multicast1=0xe0000001}, 0x10) connect$inet(r0, &(0x7f0000000000)={0x2, 0x4e20}, 0x10) r1 = open(&(0x7f0000000140)='./file0\x00', 0x2040, 0x0) mount$9p_fd(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='9p\x00', 0x0, &(0x7f0000000180)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {'wfdno', 0x3d}, 0x2c}) 21:24:21 executing program 0: syz_open_dev$sndseq(&(0x7f0000000000)='/dev/snd/seq\x00', 0x0, 0x0) userfaultfd(0x0) syz_open_dev$mice(&(0x7f0000000100)='/dev/input/mice\x00', 0x0, 0x0) pselect6(0x40, &(0x7f00000abfc0)={0x3ffffd}, &(0x7f0000768000)={0x1600}, &(0x7f00007fbfc0), &(0x7f0000f22000)={0x0, 0x989680}, &(0x7f0000f14000)={&(0x7f0000553ff8), 0x8}) 21:24:21 executing program 1: 21:24:21 executing program 2: syz_mount_image$gfs2(&(0x7f0000000040)="67667332e0", &(0x7f0000001740)='./file0\x00', 0x0, 0x0, &(0x7f0000001680), 0x0, &(0x7f0000000880)=ANY=[@ANYBLOB='l']) 21:24:21 executing program 7: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$hfsplus(&(0x7f0000000040)='hfsplus\t', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000300), 0x0, &(0x7f0000000380)) [ 172.037100] 9pnet: Insufficient options for proto=fd 21:24:21 executing program 0: syz_open_dev$sndseq(&(0x7f0000000000)='/dev/snd/seq\x00', 0x0, 0x0) userfaultfd(0x0) syz_open_dev$mice(&(0x7f0000000100)='/dev/input/mice\x00', 0x0, 0x0) pselect6(0x40, &(0x7f00000abfc0)={0x3ffffd}, &(0x7f0000768000)={0x10}, &(0x7f00007fbfc0), &(0x7f0000f22000)={0x0, 0x989680}, &(0x7f0000f14000)={&(0x7f0000553ff8), 0x8}) 21:24:21 executing program 5: 21:24:21 executing program 3: 21:24:21 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x4e20, @multicast1=0xe0000001}, 0x10) connect$inet(r0, &(0x7f0000000000)={0x2, 0x4e20}, 0x10) r1 = open(&(0x7f0000000140)='./file0\x00', 0x2040, 0x0) mount$9p_fd(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='9p\x00', 0x0, &(0x7f0000000180)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {'wfdno', 0x3d}, 0x2c}) 21:24:21 executing program 1: 21:24:21 executing program 7: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$hfsplus(&(0x7f0000000040)='hfsplusH', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000300), 0x0, &(0x7f0000000380)) 21:24:21 executing program 2: syz_mount_image$gfs2(&(0x7f0000000040)='gfs2\x00', &(0x7f0000001740)='./file0\x00', 0x0, 0x0, &(0x7f0000001680), 0x0, &(0x7f0000000880)=ANY=[@ANYBLOB='l']) 21:24:21 executing program 6: 21:24:21 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x30, &(0x7f00000000c0)={0x7f, {{0xa, 0x0, 0x0, @mcast2={0xff, 0x2, [], 0x1}}}}, 0x8c) [ 172.816452] gfs2: invalid mount option: l [ 172.820861] gfs2: can't parse mount arguments [ 172.847668] 9pnet: Insufficient options for proto=fd 21:24:21 executing program 1: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu\x00', 0x200002, 0x0) r1 = openat$cgroup_int(r0, &(0x7f0000000080)='cpuset.memory_spread_slab\x00', 0x2, 0x0) write$cgroup_int(r1, &(0x7f0000000040), 0x1) 21:24:21 executing program 5: keyctl$invalidate(0x12, 0x0) [ 172.868869] gfs2: invalid mount option: l [ 172.873158] gfs2: can't parse mount arguments 21:24:21 executing program 7: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$hfsplus(&(0x7f0000000040)='hfsplusM', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000300), 0x0, &(0x7f0000000380)) 21:24:22 executing program 6: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = accept4(0xffffffffffffff9c, &(0x7f0000000140)=@rc, &(0x7f0000000040)=0x80, 0x80800) getsockopt$inet6_mreq(0xffffffffffffff9c, 0x29, 0x1f, &(0x7f0000000240)={@mcast2}, &(0x7f0000000280)=0x14) sendmsg$nl_route_sched(r1, &(0x7f0000000380)={&(0x7f0000000200)={0x10}, 0xc, &(0x7f0000000340)={&(0x7f0000000300)=ANY=[@ANYBLOB="2c0000002600200300000000fedbdf250000"], 0x1}, 0x1, 0x0, 0x0, 0x40000}, 0x20004000) ioctl$sock_inet_SIOCSARP(r0, 0x8955, &(0x7f00000000c0)={{0x2, 0x200004e24, @multicast1=0xe0000001}, {0x0, @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}}, 0x2, {0x2, 0x0, @local={0xac, 0x14, 0x14, 0xaa}}, 'ip6_vti0\x00'}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000000, 0x0, 0x0, 0x0, 0x200000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x0, 0x0) setsockopt$IP_VS_SO_SET_TIMEOUT(r1, 0x0, 0x48a, &(0x7f00000003c0)={0x0, 0x45e6a3c0, 0x81}, 0xc) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) socketpair(0x11, 0xa, 0x5, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000400)='/dev/ppp\x00', 0x80, 0x0) write$cgroup_int(r3, &(0x7f00000001c0), 0x4) 21:24:22 executing program 0: syz_open_dev$sndseq(&(0x7f0000000000)='/dev/snd/seq\x00', 0x0, 0x0) userfaultfd(0x0) syz_open_dev$mice(&(0x7f0000000100)='/dev/input/mice\x00', 0x0, 0x0) pselect6(0x40, &(0x7f00000abfc0)={0x3ffffd}, &(0x7f0000768000)={0x16}, &(0x7f00007fbfc0), &(0x7f0000f22000)={0x0, 0x989680}, &(0x7f0000f14000)={&(0x7f0000553ff8), 0x8}) 21:24:22 executing program 3: r0 = syz_open_dev$sndpcmc(&(0x7f0000004fee)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) r1 = creat(&(0x7f0000000200)='./bus\x00', 0x0) write$cgroup_int(r1, &(0x7f0000000040), 0x1) r2 = open(&(0x7f000000fffa)='./bus\x00', 0x0, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x800002, 0x1012, r2, 0x0) ioctl(r0, 0xc0884123, &(0x7f0000001f64)) 21:24:22 executing program 4: r0 = syz_open_dev$loop(&(0x7f0000000400)='/dev/loop#\x00', 0x0, 0x82) memfd_create(&(0x7f00000002c0)='\x00', 0x0) ioctl$LOOP_SET_FD(r0, 0x4c04, 0xffffffffffffffff) 21:24:22 executing program 1: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu\x00', 0x200002, 0x0) r1 = openat$cgroup_int(r0, &(0x7f0000000080)='cpuset.memory_spread_slab\x00', 0x2, 0x0) write$cgroup_int(r1, &(0x7f0000000040), 0x1) 21:24:22 executing program 2: syz_mount_image$gfs2(&(0x7f0000000040)='gfs2\x00', &(0x7f0000001740)='./file0\x00', 0x0, 0x0, &(0x7f0000001680), 0x0, &(0x7f0000000880)=ANY=[@ANYBLOB='l']) 21:24:22 executing program 5: r0 = syz_open_dev$sndctrl(&(0x7f0000000000)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_UNLOCK(r0, 0xc2c45513, &(0x7f0000000040)={0x180000000000001a, 0x0, 0x0, 0x0, 'syz1\x00'}) 21:24:22 executing program 3: r0 = syz_open_dev$sndpcmc(&(0x7f0000004fee)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) r1 = creat(&(0x7f0000000200)='./bus\x00', 0x0) write$cgroup_int(r1, &(0x7f0000000040), 0x1) r2 = open(&(0x7f000000fffa)='./bus\x00', 0x0, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x800002, 0x1012, r2, 0x0) ioctl(r0, 0xc0884123, &(0x7f0000001f64)) 21:24:22 executing program 0: syz_open_dev$sndseq(&(0x7f0000000000)='/dev/snd/seq\x00', 0x0, 0x0) userfaultfd(0x0) syz_open_dev$mice(&(0x7f0000000100)='/dev/input/mice\x00', 0x0, 0x0) pselect6(0x40, &(0x7f00000abfc0)={0x3ffffd}, &(0x7f0000768000)={0x0, 0x60}, &(0x7f00007fbfc0), &(0x7f0000f22000)={0x0, 0x989680}, &(0x7f0000f14000)={&(0x7f0000553ff8), 0x8}) 21:24:22 executing program 4: socketpair(0x1, 0x1, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$inet6_dccp_buf(r0, 0x21, 0x0, &(0x7f0000000000), 0x0) 21:24:22 executing program 1: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu\x00', 0x200002, 0x0) r1 = openat$cgroup_int(r0, &(0x7f0000000080)='cpuset.memory_spread_slab\x00', 0x2, 0x0) write$cgroup_int(r1, &(0x7f0000000040), 0x1) 21:24:22 executing program 0: syz_open_dev$sndseq(&(0x7f0000000000)='/dev/snd/seq\x00', 0x0, 0x0) userfaultfd(0x0) syz_open_dev$mice(&(0x7f0000000100)='/dev/input/mice\x00', 0x0, 0x0) pselect6(0x40, &(0x7f00000abfc0)={0x3ffffd}, &(0x7f0000768000)={0x0, 0x8}, &(0x7f00007fbfc0), &(0x7f0000f22000)={0x0, 0x989680}, &(0x7f0000f14000)={&(0x7f0000553ff8), 0x8}) 21:24:22 executing program 5: syz_fuse_mount(&(0x7f0000000000)='./file0\x00', 0x0, 0xee00, 0xee00, 0x0, 0x1810000) 21:24:22 executing program 4: add_key$keyring(&(0x7f00000018c0)='keyring\x00', &(0x7f0000001900)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffd) 21:24:22 executing program 3: r0 = syz_open_dev$sndpcmc(&(0x7f0000004fee)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) r1 = creat(&(0x7f0000000200)='./bus\x00', 0x0) write$cgroup_int(r1, &(0x7f0000000040), 0x1) r2 = open(&(0x7f000000fffa)='./bus\x00', 0x0, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x800002, 0x1012, r2, 0x0) ioctl(r0, 0xc0884123, &(0x7f0000001f64)) 21:24:22 executing program 7: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$hfsplus(&(0x7f0000000040)='hfsplus\r', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000300), 0x0, &(0x7f0000000380)) [ 173.255500] gfs2: invalid mount option: l [ 173.259894] gfs2: can't parse mount arguments 21:24:22 executing program 6: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = accept4(0xffffffffffffff9c, &(0x7f0000000140)=@rc, &(0x7f0000000040)=0x80, 0x80800) getsockopt$inet6_mreq(0xffffffffffffff9c, 0x29, 0x1f, &(0x7f0000000240)={@mcast2}, &(0x7f0000000280)=0x14) sendmsg$nl_route_sched(r1, &(0x7f0000000380)={&(0x7f0000000200)={0x10}, 0xc, &(0x7f0000000340)={&(0x7f0000000300)=ANY=[@ANYBLOB="2c0000002600200300000000fedbdf250000"], 0x1}, 0x1, 0x0, 0x0, 0x40000}, 0x20004000) ioctl$sock_inet_SIOCSARP(r0, 0x8955, &(0x7f00000000c0)={{0x2, 0x200004e24, @multicast1=0xe0000001}, {0x0, @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}}, 0x2, {0x2, 0x0, @local={0xac, 0x14, 0x14, 0xaa}}, 'ip6_vti0\x00'}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000000, 0x0, 0x0, 0x0, 0x200000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x0, 0x0) setsockopt$IP_VS_SO_SET_TIMEOUT(r1, 0x0, 0x48a, &(0x7f00000003c0)={0x0, 0x45e6a3c0, 0x81}, 0xc) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) socketpair(0x11, 0xa, 0x5, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000400)='/dev/ppp\x00', 0x80, 0x0) write$cgroup_int(r3, &(0x7f00000001c0), 0x4) 21:24:22 executing program 5: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.net\x00', 0x200002, 0x0) fchdir(r0) r1 = open(&(0x7f0000ae8ff8)='./file0\x00', 0x14104a, 0x0) write$evdev(r1, &(0x7f0000037fe8)=[{}], 0x18) sendfile(r1, r1, &(0x7f0000000200), 0x80003ffd) creat(&(0x7f00000000c0)='./file0\x00', 0x0) 21:24:22 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0xcc, &(0x7f0000000040)={{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}}, {0xa, 0x0, 0x0, @mcast2={0xff, 0x2, [], 0x1}}}, 0x5c) 21:24:22 executing program 3: r0 = syz_open_dev$sndpcmc(&(0x7f0000004fee)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) r1 = creat(&(0x7f0000000200)='./bus\x00', 0x0) write$cgroup_int(r1, &(0x7f0000000040), 0x1) r2 = open(&(0x7f000000fffa)='./bus\x00', 0x0, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x800002, 0x1012, r2, 0x0) ioctl(r0, 0xc0884123, &(0x7f0000001f64)) 21:24:22 executing program 4: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) r0 = open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) mkdirat(r0, &(0x7f0000000140)='./file0\x00', 0x101) 21:24:22 executing program 0: syz_open_dev$sndseq(&(0x7f0000000000)='/dev/snd/seq\x00', 0x0, 0x0) userfaultfd(0x0) syz_open_dev$mice(&(0x7f0000000100)='/dev/input/mice\x00', 0x0, 0x0) pselect6(0x40, &(0x7f00000abfc0)={0x3ffffd}, &(0x7f0000768000)={0x0, 0x100000000000000}, &(0x7f00007fbfc0), &(0x7f0000f22000)={0x0, 0x989680}, &(0x7f0000f14000)={&(0x7f0000553ff8), 0x8}) 21:24:22 executing program 2: syz_mount_image$gfs2(&(0x7f0000000040)="67667332ff", &(0x7f0000001740)='./file0\x00', 0x0, 0x0, &(0x7f0000001680), 0x0, &(0x7f0000000880)=ANY=[@ANYBLOB='l']) [ 173.320600] gfs2: invalid mount option: l [ 173.324892] gfs2: can't parse mount arguments 21:24:22 executing program 7: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$hfsplus(&(0x7f0000000040)='hfsplus\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000300), 0x0, &(0x7f0000000380)) 21:24:22 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = accept4(0xffffffffffffff9c, &(0x7f0000000140)=@rc, &(0x7f0000000040)=0x80, 0x80800) getsockopt$inet6_mreq(0xffffffffffffff9c, 0x29, 0x1f, &(0x7f0000000240)={@mcast2}, &(0x7f0000000280)=0x14) sendmsg$nl_route_sched(r1, &(0x7f0000000380)={&(0x7f0000000200)={0x10}, 0xc, &(0x7f0000000340)={&(0x7f0000000300)=ANY=[@ANYBLOB="2c0000002600200300000000fedbdf250000"], 0x1}, 0x1, 0x0, 0x0, 0x40000}, 0x20004000) ioctl$sock_inet_SIOCSARP(r0, 0x8955, &(0x7f00000000c0)={{0x2, 0x200004e24, @multicast1=0xe0000001}, {0x0, @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}}, 0x2, {0x2, 0x0, @local={0xac, 0x14, 0x14, 0xaa}}, 'ip6_vti0\x00'}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000000, 0x0, 0x0, 0x0, 0x200000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x0, 0x0) setsockopt$IP_VS_SO_SET_TIMEOUT(r1, 0x0, 0x48a, &(0x7f00000003c0)={0x0, 0x45e6a3c0, 0x81}, 0xc) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) socketpair(0x11, 0xa, 0x5, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000400)='/dev/ppp\x00', 0x80, 0x0) write$cgroup_int(r3, &(0x7f00000001c0), 0x4) 21:24:22 executing program 4: utimes(&(0x7f0000000cc0)='./file0\x00', &(0x7f0000000d00)={{0x0, 0x2000000}}) 21:24:22 executing program 5: pipe(&(0x7f00000000c0)={0xffffffffffffffff}) ftruncate(r0, 0x0) 21:24:22 executing program 3: r0 = syz_open_dev$sndpcmc(&(0x7f0000004fee)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) r1 = creat(&(0x7f0000000200)='./bus\x00', 0x0) write$cgroup_int(r1, &(0x7f0000000040), 0x1) open(&(0x7f000000fffa)='./bus\x00', 0x0, 0x0) ioctl(r0, 0xc0884123, &(0x7f0000001f64)) 21:24:22 executing program 0: syz_open_dev$sndseq(&(0x7f0000000000)='/dev/snd/seq\x00', 0x0, 0x0) userfaultfd(0x0) syz_open_dev$mice(&(0x7f0000000100)='/dev/input/mice\x00', 0x0, 0x0) pselect6(0x40, &(0x7f00000abfc0)={0x3ffffd}, &(0x7f0000768000)={0x0, 0x6000000000000000}, &(0x7f00007fbfc0), &(0x7f0000f22000)={0x0, 0x989680}, &(0x7f0000f14000)={&(0x7f0000553ff8), 0x8}) [ 173.572232] hfsplus: unable to find HFS+ superblock 21:24:22 executing program 0: syz_open_dev$sndseq(&(0x7f0000000000)='/dev/snd/seq\x00', 0x0, 0x0) userfaultfd(0x0) syz_open_dev$mice(&(0x7f0000000100)='/dev/input/mice\x00', 0x0, 0x0) pselect6(0x40, &(0x7f00000abfc0)={0x3ffffd}, &(0x7f0000768000)={0x0, 0x6400000000000000}, &(0x7f00007fbfc0), &(0x7f0000f22000)={0x0, 0x989680}, &(0x7f0000f14000)={&(0x7f0000553ff8), 0x8}) 21:24:22 executing program 4: creat(&(0x7f0000000000)='./file0\x00', 0x0) chmod(&(0x7f0000001c00)='./file0\x00', 0x8) 21:24:22 executing program 3: r0 = syz_open_dev$sndpcmc(&(0x7f0000004fee)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) r1 = creat(&(0x7f0000000200)='./bus\x00', 0x0) write$cgroup_int(r1, &(0x7f0000000040), 0x1) open(&(0x7f000000fffa)='./bus\x00', 0x0, 0x0) ioctl(r0, 0xc0884123, &(0x7f0000001f64)) 21:24:22 executing program 6: r0 = syz_open_procfs(0x0, &(0x7f0000000000)="2f65786500000000000409004bddd9de91be10eebf000ee9a90f798058439ed554fa07424adee901d2da75af300200f5abfb9845f9e19859c9693206f2c60b0000000719e1d66e970123d893d974e5b9c3285677b2139823e5500c92ab5b94da3a7de19f063bb765b02bd5b660fb7fa898c6f5c6369c3f363068d10af833f6475bbe8b7967255b177607ba100f6c4654718232dbda64aa1f69cf9ab5b3ea3ed63452b7ebd37c9dae664e322e08ad8f6029fe8fd0b34c7117480471aeca0a3fc9eceb28509ca8a83e4f8b85131808bc5cfb4cc24e1901769c084c082712b470666b6dddf74ced693973ba1ded8b") fcntl$setlease(r0, 0x400, 0x2) 21:24:22 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) perf_event_open(&(0x7f0000000100)={0x2000000005, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={&(0x7f0000000000), 0x1}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl(r0, 0x8916, &(0x7f0000000000)) 21:24:22 executing program 0: syz_open_dev$sndseq(&(0x7f0000000000)='/dev/snd/seq\x00', 0x0, 0x0) userfaultfd(0x0) syz_open_dev$mice(&(0x7f0000000100)='/dev/input/mice\x00', 0x0, 0x0) pselect6(0x40, &(0x7f00000abfc0)={0x3ffffd}, &(0x7f0000768000)={0x0, 0x1000000}, &(0x7f00007fbfc0), &(0x7f0000f22000)={0x0, 0x989680}, &(0x7f0000f14000)={&(0x7f0000553ff8), 0x8}) 21:24:22 executing program 5: perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) creat(&(0x7f00000000c0)='./file0\x00', 0x0) mount$9p_xen(&(0x7f0000003e80)='cgroup\x00', &(0x7f0000003ec0)='./file0\x00', &(0x7f0000003f00)='9p\x00', 0x1000, &(0x7f0000003f40)=ANY=[]) 21:24:22 executing program 2: syz_mount_image$gfs2(&(0x7f0000000040)="67667332ff", &(0x7f0000001740)='./file0\x00', 0x0, 0x0, &(0x7f0000001680), 0x0, &(0x7f0000000880)=ANY=[@ANYBLOB='l']) 21:24:22 executing program 4: chdir(&(0x7f0000000040)='./file0\x00') 21:24:22 executing program 3: r0 = syz_open_dev$sndpcmc(&(0x7f0000004fee)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) r1 = creat(&(0x7f0000000200)='./bus\x00', 0x0) write$cgroup_int(r1, &(0x7f0000000040), 0x1) open(&(0x7f000000fffa)='./bus\x00', 0x0, 0x0) ioctl(r0, 0xc0884123, &(0x7f0000001f64)) 21:24:22 executing program 7: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$hfsplus(&(0x7f0000000040)='hfsplus\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000300), 0x0, &(0x7f0000000380)) [ 173.873906] hfsplus: unable to find HFS+ superblock 21:24:22 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = accept4(0xffffffffffffff9c, &(0x7f0000000140)=@rc, &(0x7f0000000040)=0x80, 0x80800) getsockopt$inet6_mreq(0xffffffffffffff9c, 0x29, 0x1f, &(0x7f0000000240)={@mcast2}, &(0x7f0000000280)=0x14) sendmsg$nl_route_sched(r1, &(0x7f0000000380)={&(0x7f0000000200)={0x10}, 0xc, &(0x7f0000000340)={&(0x7f0000000300)=ANY=[@ANYBLOB="2c0000002600200300000000fedbdf250000"], 0x1}, 0x1, 0x0, 0x0, 0x40000}, 0x20004000) ioctl$sock_inet_SIOCSARP(r0, 0x8955, &(0x7f00000000c0)={{0x2, 0x200004e24, @multicast1=0xe0000001}, {0x0, @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}}, 0x2, {0x2, 0x0, @local={0xac, 0x14, 0x14, 0xaa}}, 'ip6_vti0\x00'}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000000, 0x0, 0x0, 0x0, 0x200000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x0, 0x0) setsockopt$IP_VS_SO_SET_TIMEOUT(r1, 0x0, 0x48a, &(0x7f00000003c0)={0x0, 0x45e6a3c0, 0x81}, 0xc) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) socketpair(0x11, 0xa, 0x5, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000400)='/dev/ppp\x00', 0x80, 0x0) write$cgroup_int(r3, &(0x7f00000001c0), 0x4) 21:24:22 executing program 6: perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) add_key$keyring(&(0x7f0000000280)='keyring\x00', &(0x7f00000002c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffb) 21:24:22 executing program 0: syz_open_dev$sndseq(&(0x7f0000000000)='/dev/snd/seq\x00', 0x0, 0x0) userfaultfd(0x0) syz_open_dev$mice(&(0x7f0000000100)='/dev/input/mice\x00', 0x0, 0x0) pselect6(0x40, &(0x7f00000abfc0)={0x3ffffd}, &(0x7f0000768000)={0x0, 0x10}, &(0x7f00007fbfc0), &(0x7f0000f22000)={0x0, 0x989680}, &(0x7f0000f14000)={&(0x7f0000553ff8), 0x8}) 21:24:22 executing program 4: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup.cpu/syz0\x00', 0x1ff) perf_event_open(&(0x7f0000940000)={0x2, 0x78, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) request_key(&(0x7f0000000080)='dns_resolver\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a}, &(0x7f0000000240)='keyring\x00', 0x0) r0 = openat$zero(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/zero\x00', 0x0, 0x0) ioctl$GIO_FONT(r0, 0x4b60, &(0x7f00000001c0)=""/45) 21:24:22 executing program 3: r0 = syz_open_dev$sndpcmc(&(0x7f0000004fee)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) r1 = creat(&(0x7f0000000200)='./bus\x00', 0x0) write$cgroup_int(r1, &(0x7f0000000040), 0x1) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x800002, 0x1012, 0xffffffffffffffff, 0x0) ioctl(r0, 0xc0884123, &(0x7f0000001f64)) 21:24:22 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000000)="2f65786500000000000409004bddd9de91be10eebf000ee9a90f798058439ed554fa07424adee901d2da75af300200f5abfb9845f9e19859c9693206f2c60b0000000719e1d66e970123d893d974e5b9c3285677b2139823e5500c92ab5b94da3a7de19f063bb765b02bd5b660fb7fa898c6f5c6369c3f363068d10af833f6475bbe8b7967255b177607ba100f6c4654718232dbda64aa1f69cf9ab5b3ea3ed63452b7ebd37c9dae664e322e08ad8f6029fe8fd0b34c7117480471aeca0a3fc9eceb28509ca8a83e4f8b85131808bc5cfb4cc24e1901769c084c082712b470666b6dddf74ced693973ba1ded8b") fsetxattr(r0, &(0x7f0000000340)=ANY=[@ANYBLOB='user.p'], &(0x7f0000000140)="00000000be2b7c28f23856d597c2a535f5fb989ca67e5457783741722953fea0cf777932db11eedd7775d944ef39f1cecdba4ee057cd4d9d791ca1a1756d113eade1bc7cfbf3be0454209e569b507930db3b163307f59c878b63c7f22181326cfac1b22b092d0cc142f1118b0095ab2672cc031c78a7f96d0d1fe28e4feb89a590ff328f4a417d17fcc15b9914a5c07f0190b6bdd4d294212eeeea5b1d3054676c80ae45f7a2cb128a08d0128f19b0a81d89a104cb586c6a1946cba52840741a80a0", 0xc2, 0x0) 21:24:23 executing program 2: syz_mount_image$gfs2(&(0x7f0000000040)='gfs2`', &(0x7f0000001740)='./file0\x00', 0x0, 0x0, &(0x7f0000001680), 0x0, &(0x7f0000000880)=ANY=[@ANYBLOB='l']) 21:24:23 executing program 7: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$hfsplus(&(0x7f0000000040)='hfsplus\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000300), 0x0, &(0x7f0000000380)) 21:24:23 executing program 3: r0 = syz_open_dev$sndpcmc(&(0x7f0000004fee)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) r1 = creat(&(0x7f0000000200)='./bus\x00', 0x0) write$cgroup_int(r1, &(0x7f0000000040), 0x1) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x800002, 0x1012, 0xffffffffffffffff, 0x0) ioctl(r0, 0xc0884123, &(0x7f0000001f64)) 21:24:23 executing program 0: syz_open_dev$sndseq(&(0x7f0000000000)='/dev/snd/seq\x00', 0x0, 0x0) userfaultfd(0x0) syz_open_dev$mice(&(0x7f0000000100)='/dev/input/mice\x00', 0x0, 0x0) pselect6(0x40, &(0x7f00000abfc0)={0x3ffffd}, &(0x7f0000768000)={0x0, 0x16}, &(0x7f00007fbfc0), &(0x7f0000f22000)={0x0, 0x989680}, &(0x7f0000f14000)={&(0x7f0000553ff8), 0x8}) 21:24:23 executing program 6: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f00000001c0), 0xfffffef3) r2 = epoll_create(0x80000000000009) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r1, &(0x7f0000000040)) epoll_wait(r2, &(0x7f00000000c0)=[{}], 0x17, 0x45) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 21:24:23 executing program 4: r0 = add_key$keyring(&(0x7f0000000140)='keyring\x00', &(0x7f0000000180)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffd) request_key(&(0x7f0000000040)='user\x00', &(0x7f0000000080)={0x73, 0x79, 0x7a}, &(0x7f00000000c0)='cpuset\x00', r0) keyctl$revoke(0x3, r0) 21:24:23 executing program 5: perf_event_open(&(0x7f0000940000)={0x2, 0x78, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) request_key(&(0x7f00000001c0)='keyring\x00', &(0x7f0000000200)={0x73, 0x79, 0x7a}, &(0x7f0000000240)='keyring\x00', 0x0) 21:24:23 executing program 0: syz_open_dev$sndseq(&(0x7f0000000000)='/dev/snd/seq\x00', 0x0, 0x0) userfaultfd(0x0) syz_open_dev$mice(&(0x7f0000000100)='/dev/input/mice\x00', 0x0, 0x0) pselect6(0x40, &(0x7f00000abfc0)={0x3ffffd}, &(0x7f0000768000)={0x0, 0x1000000000000000}, &(0x7f00007fbfc0), &(0x7f0000f22000)={0x0, 0x989680}, &(0x7f0000f14000)={&(0x7f0000553ff8), 0x8}) 21:24:23 executing program 3: r0 = syz_open_dev$sndpcmc(&(0x7f0000004fee)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) r1 = creat(&(0x7f0000000200)='./bus\x00', 0x0) write$cgroup_int(r1, &(0x7f0000000040), 0x1) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x800002, 0x1012, 0xffffffffffffffff, 0x0) ioctl(r0, 0xc0884123, &(0x7f0000001f64)) 21:24:23 executing program 5: perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/sys/net/ipv4/vs/sync_sock_size\x00', 0x2, 0x0) [ 174.203224] hfsplus: unable to find HFS+ superblock 21:24:23 executing program 1: perf_event_open(&(0x7f0000940000)={0x2, 0x78, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clock_nanosleep(0x0, 0x1, &(0x7f0000000200)={0x0, 0x989680}, &(0x7f0000000140)) 21:24:23 executing program 4: r0 = add_key$keyring(&(0x7f0000000140)='keyring\x00', &(0x7f0000000180)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffd) request_key(&(0x7f0000000040)='user\x00', &(0x7f0000000080)={0x73, 0x79, 0x7a}, &(0x7f00000000c0)='cpuset\x00', r0) keyctl$revoke(0x3, r0) 21:24:23 executing program 2: syz_mount_image$gfs2(&(0x7f0000000040)='gfs2\x00', &(0x7f0000001740)='./file0\x00', 0x0, 0x0, &(0x7f0000001680), 0x0, &(0x7f0000000880)=ANY=[@ANYBLOB='l']) 21:24:23 executing program 3: r0 = syz_open_dev$sndpcmc(&(0x7f0000004fee)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) creat(&(0x7f0000000200)='./bus\x00', 0x0) r1 = open(&(0x7f000000fffa)='./bus\x00', 0x0, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x800002, 0x1012, r1, 0x0) ioctl(r0, 0xc0884123, &(0x7f0000001f64)) [ 174.243391] hfsplus: unable to find HFS+ superblock 21:24:23 executing program 5: remap_file_pages(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x2, 0x0, 0x0) 21:24:23 executing program 0: syz_open_dev$sndseq(&(0x7f0000000000)='/dev/snd/seq\x00', 0x0, 0x0) userfaultfd(0x0) syz_open_dev$mice(&(0x7f0000000100)='/dev/input/mice\x00', 0x0, 0x0) pselect6(0x40, &(0x7f00000abfc0)={0x3ffffd}, &(0x7f0000768000)={0x0, 0x1600000000000000}, &(0x7f00007fbfc0), &(0x7f0000f22000)={0x0, 0x989680}, &(0x7f0000f14000)={&(0x7f0000553ff8), 0x8}) 21:24:23 executing program 7: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$hfsplus(&(0x7f0000000040)='hfsplusX', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000300), 0x0, &(0x7f0000000380)) 21:24:23 executing program 4: r0 = add_key$keyring(&(0x7f0000000140)='keyring\x00', &(0x7f0000000180)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffd) request_key(&(0x7f0000000040)='user\x00', &(0x7f0000000080)={0x73, 0x79, 0x7a}, &(0x7f00000000c0)='cpuset\x00', r0) keyctl$revoke(0x3, r0) [ 174.318033] gfs2: invalid mount option: l [ 174.322804] gfs2: can't parse mount arguments [ 174.331292] mmap: syz-executor5 (14657) uses deprecated remap_file_pages() syscall. See Documentation/vm/remap_file_pages.rst. 21:24:23 executing program 3: r0 = syz_open_dev$sndpcmc(&(0x7f0000004fee)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000040), 0x1) r1 = open(&(0x7f000000fffa)='./bus\x00', 0x0, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x800002, 0x1012, r1, 0x0) ioctl(r0, 0xc0884123, &(0x7f0000001f64)) 21:24:23 executing program 1: r0 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$setflags(r0, 0x2, 0x0) [ 174.423669] gfs2: invalid mount option: l [ 174.427987] gfs2: can't parse mount arguments 21:24:24 executing program 7: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$hfsplus(&(0x7f0000000040)='hfsplus\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000300), 0x0, &(0x7f0000000380)) 21:24:24 executing program 4: r0 = add_key$keyring(&(0x7f0000000140)='keyring\x00', &(0x7f0000000180)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffd) request_key(&(0x7f0000000040)='user\x00', &(0x7f0000000080)={0x73, 0x79, 0x7a}, &(0x7f00000000c0)='cpuset\x00', r0) keyctl$revoke(0x3, r0) 21:24:24 executing program 6: r0 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x4, 0x0) r1 = syz_open_dev$loop(&(0x7f0000000100)='/dev/loop#\x00', 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000280)='net/udp\x00') ioctl$LOOP_SET_FD(r0, 0x4c00, r2) ioctl$LOOP_SET_FD(r1, 0x4c00, r0) 21:24:24 executing program 0: syz_open_dev$sndseq(&(0x7f0000000000)='/dev/snd/seq\x00', 0x0, 0x0) userfaultfd(0x0) syz_open_dev$mice(&(0x7f0000000100)='/dev/input/mice\x00', 0x0, 0x0) pselect6(0x40, &(0x7f00000abfc0)={0x3ffffd}, &(0x7f0000768000)={0x0, 0x800000000000000}, &(0x7f00007fbfc0), &(0x7f0000f22000)={0x0, 0x989680}, &(0x7f0000f14000)={&(0x7f0000553ff8), 0x8}) 21:24:24 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x82) ioctl$LOOP_SET_STATUS64(r0, 0x1277, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "e1d3f877e5eae453e55d7d64d00d4901baed21f7de92a8669b38ccd6260857dbf5ae46354569636517b50f805ae208258dbb7d0abe8d208f0f1bcc885c8ba93c", "fe047b3177f4fc2eb04172daa8e7d1c4c4cf144a23173b6605afb988de9bbae0932dee7e07195d78f7ddd19a37cb5aa0a5629eef628582fba5bf4af44acfe059", "ee42e3ef1d1772a9432c220303b70b708ad791139c2982fccc5d747a3131995a"}) 21:24:24 executing program 1: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) fstatfs(r0, &(0x7f0000000040)=""/42) 21:24:24 executing program 2: syz_mount_image$gfs2(&(0x7f0000000040)='gfs2\x00', &(0x7f0000001740)='./file0\x00', 0x0, 0x0, &(0x7f0000001680), 0x0, &(0x7f0000000880)=ANY=[@ANYBLOB='l']) 21:24:24 executing program 3: r0 = syz_open_dev$sndpcmc(&(0x7f0000004fee)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000040), 0x1) r1 = open(&(0x7f000000fffa)='./bus\x00', 0x0, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x800002, 0x1012, r1, 0x0) ioctl(r0, 0xc0884123, &(0x7f0000001f64)) [ 175.057606] hfsplus: unable to find HFS+ superblock [ 175.070553] gfs2: invalid mount option: l [ 175.074953] gfs2: can't parse mount arguments 21:24:24 executing program 5: perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$IPT_SO_GET_INFO(r0, 0x0, 0x40, &(0x7f0000000240)={'security\x00'}, &(0x7f00000002c0)=0x54) 21:24:24 executing program 1: mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x31, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_msfilter(r0, 0x0, 0x29, &(0x7f0000000300)={@rand_addr, @multicast2=0xe0000002}, 0x10) 21:24:24 executing program 3: r0 = syz_open_dev$sndpcmc(&(0x7f0000004fee)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000040), 0x1) r1 = open(&(0x7f000000fffa)='./bus\x00', 0x0, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x800002, 0x1012, r1, 0x0) ioctl(r0, 0xc0884123, &(0x7f0000001f64)) 21:24:24 executing program 4: r0 = add_key$keyring(&(0x7f0000000140)='keyring\x00', &(0x7f0000000180)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$revoke(0x3, r0) 21:24:24 executing program 0: syz_open_dev$sndseq(&(0x7f0000000000)='/dev/snd/seq\x00', 0x0, 0x0) userfaultfd(0x0) syz_open_dev$mice(&(0x7f0000000100)='/dev/input/mice\x00', 0x0, 0x0) pselect6(0x40, &(0x7f00000abfc0)={0x3ffffd}, &(0x7f0000768000)={0x0, 0x16000000}, &(0x7f00007fbfc0), &(0x7f0000f22000)={0x0, 0x989680}, &(0x7f0000f14000)={&(0x7f0000553ff8), 0x8}) 21:24:24 executing program 7: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$hfsplus(&(0x7f0000000040)="686673706c7573c0", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000300), 0x0, &(0x7f0000000380)) 21:24:24 executing program 6: r0 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x4, 0x0) r1 = syz_open_dev$loop(&(0x7f0000000100)='/dev/loop#\x00', 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000280)='net/udp\x00') ioctl$LOOP_SET_FD(r0, 0x4c00, r2) ioctl$LOOP_SET_FD(r1, 0x4c00, r0) [ 175.167276] gfs2: invalid mount option: l [ 175.171540] gfs2: can't parse mount arguments 21:24:24 executing program 5: linkat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x0) 21:24:24 executing program 4: r0 = add_key$keyring(&(0x7f0000000140)='keyring\x00', &(0x7f0000000180)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$revoke(0x3, r0) 21:24:24 executing program 2: syz_mount_image$gfs2(&(0x7f0000000040)='gfs2p', &(0x7f0000001740)='./file0\x00', 0x0, 0x0, &(0x7f0000001680), 0x0, &(0x7f0000000880)=ANY=[@ANYBLOB='l']) 21:24:24 executing program 1: recvfrom$unix(0xffffffffffffffff, &(0x7f0000000000)=""/102, 0x66, 0x0, &(0x7f0000000180)=@file={0x0, './file0\x00'}, 0x6e) 21:24:24 executing program 3: r0 = creat(&(0x7f0000000200)='./bus\x00', 0x0) write$cgroup_int(r0, &(0x7f0000000040), 0x1) r1 = open(&(0x7f000000fffa)='./bus\x00', 0x0, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x800002, 0x1012, r1, 0x0) ioctl(0xffffffffffffffff, 0xc0884123, &(0x7f0000001f64)) 21:24:24 executing program 0: syz_open_dev$sndseq(&(0x7f0000000000)='/dev/snd/seq\x00', 0x0, 0x0) userfaultfd(0x0) syz_open_dev$mice(&(0x7f0000000100)='/dev/input/mice\x00', 0x0, 0x0) pselect6(0x40, &(0x7f00000abfc0)={0x3ffffd}, &(0x7f0000768000)={0x0, 0x60000000}, &(0x7f00007fbfc0), &(0x7f0000f22000)={0x0, 0x989680}, &(0x7f0000f14000)={&(0x7f0000553ff8), 0x8}) 21:24:24 executing program 6: r0 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x4, 0x0) r1 = syz_open_dev$loop(&(0x7f0000000100)='/dev/loop#\x00', 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000280)='net/udp\x00') ioctl$LOOP_SET_FD(r0, 0x4c00, r2) ioctl$LOOP_SET_FD(r1, 0x4c00, r0) 21:24:24 executing program 7: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$hfsplus(&(0x7f0000000040)='hfsplus\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000300), 0x0, &(0x7f0000000380)) 21:24:24 executing program 4: r0 = add_key$keyring(&(0x7f0000000140)='keyring\x00', &(0x7f0000000180)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$revoke(0x3, r0) 21:24:24 executing program 1: mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x31, 0xffffffffffffffff, 0x0) quotactl(0x0, &(0x7f0000000380)='./file0/file0\x00', 0x0, &(0x7f0000000440)) 21:24:24 executing program 5: perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc0\x00', 0x0, 0x0) ioprio_get$uid(0x3, 0x0) 21:24:24 executing program 3: r0 = syz_open_dev$sndpcmc(&(0x7f0000004fee)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) r1 = creat(&(0x7f0000000200)='./bus\x00', 0x0) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000040), 0x1) r2 = open(&(0x7f000000fffa)='./bus\x00', 0x0, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x800002, 0x1012, r2, 0x0) ioctl(r0, 0xc0884123, &(0x7f0000001f64)) [ 175.440673] hfsplus: unable to find HFS+ superblock 21:24:24 executing program 2: syz_mount_image$gfs2(&(0x7f0000000040)='gfs2\x00', &(0x7f0000001740)='./file0\x00', 0x0, 0x0, &(0x7f0000001680), 0x0, &(0x7f0000000880)=ANY=[@ANYBLOB='l']) 21:24:24 executing program 6: r0 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x4, 0x0) r1 = syz_open_dev$loop(&(0x7f0000000100)='/dev/loop#\x00', 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000280)='net/udp\x00') ioctl$LOOP_SET_FD(r0, 0x4c00, r2) ioctl$LOOP_SET_FD(r1, 0x4c00, r0) 21:24:24 executing program 4: request_key(&(0x7f0000000040)='user\x00', &(0x7f0000000080)={0x73, 0x79, 0x7a}, &(0x7f00000000c0)='cpuset\x00', 0x0) keyctl$revoke(0x3, 0x0) 21:24:24 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) fchdir(r1) r2 = creat(&(0x7f00000001c0)='./file1\x00', 0x0) ioctl$FS_IOC_FSSETXATTR(r1, 0x401c5820, &(0x7f0000000040)={0x0, 0x3, 0xa, 0x52db, 0x1}) fallocate(r2, 0x1, 0x80000000, 0x20000005) fallocate(r2, 0x0, 0x0, 0x80003ff) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) fchdir(r3) 21:24:24 executing program 0: syz_open_dev$sndseq(&(0x7f0000000000)='/dev/snd/seq\x00', 0x0, 0x0) userfaultfd(0x0) syz_open_dev$mice(&(0x7f0000000100)='/dev/input/mice\x00', 0x0, 0x0) pselect6(0x40, &(0x7f00000abfc0)={0x3ffffd}, &(0x7f0000768000)={0x0, 0x6000}, &(0x7f00007fbfc0), &(0x7f0000f22000)={0x0, 0x989680}, &(0x7f0000f14000)={&(0x7f0000553ff8), 0x8}) 21:24:24 executing program 7: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$hfsplus(&(0x7f0000000040)='hfsplusS', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000300), 0x0, &(0x7f0000000380)) 21:24:24 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f00000001c0)="2f65786500000000000409004bddd9de91be10eebf000ee9a90f798058439ed554fa07424adee901d2da75af300200f5abfb9845f9e19859c9693206f2c60b0000000719e1d66e970123d893d974e5b9c3285677b2139823e5500c92ab5b94da3a7de19f063bb765b02bd5b660fb7fa898c6f5c6369c3f363068d10af833f6475bbe8b7967255b177607ba100f6c4654718232dbda64aa1f69cf9ab5b3ea3ed63452b7ebd37c9dae664e322e08ad8f6029fe8fd0b34c7117480471aeca0a3fc9eceb28509ca8a83e4f8b85131808bc5cfb4cc24e1901769c084c082712b470666b6dddf74ced693973ba1ded8b") fsetxattr(r0, &(0x7f0000000000)=@known='security.capability\x00', &(0x7f0000000140), 0x0, 0x0) 21:24:24 executing program 3: r0 = syz_open_dev$sndpcmc(&(0x7f0000004fee)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) r1 = creat(&(0x7f0000000200)='./bus\x00', 0x0) write$cgroup_int(r1, &(0x7f0000000040), 0x1) r2 = open(&(0x7f000000fffa)='./bus\x00', 0x0, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x1012, r2, 0x0) ioctl(r0, 0xc0884123, &(0x7f0000001f64)) [ 175.579776] gfs2: invalid mount option: l [ 175.584044] gfs2: can't parse mount arguments 21:24:24 executing program 6: r0 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x4, 0x0) r1 = syz_open_dev$loop(&(0x7f0000000100)='/dev/loop#\x00', 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000000280)='net/udp\x00') ioctl$LOOP_SET_FD(r1, 0x4c00, r0) 21:24:24 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'aead\x00', 0x0, 0x0, 'echainiv(morus640-generic)\x00'}, 0x58) 21:24:24 executing program 0: syz_open_dev$sndseq(&(0x7f0000000000)='/dev/snd/seq\x00', 0x0, 0x0) userfaultfd(0x0) syz_open_dev$mice(&(0x7f0000000100)='/dev/input/mice\x00', 0x0, 0x0) pselect6(0x40, &(0x7f00000abfc0)={0x3ffffd}, &(0x7f0000768000)={0x0, 0x64}, &(0x7f00007fbfc0), &(0x7f0000f22000)={0x0, 0x989680}, &(0x7f0000f14000)={&(0x7f0000553ff8), 0x8}) [ 175.693492] gfs2: invalid mount option: l [ 175.697739] gfs2: can't parse mount arguments 21:24:24 executing program 5: 21:24:24 executing program 4: r0 = add_key$keyring(&(0x7f0000000140)='keyring\x00', &(0x7f0000000180)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffd) request_key(&(0x7f0000000040)='user\x00', &(0x7f0000000080)={0x73, 0x79, 0x7a}, &(0x7f00000000c0)='cpuset\x00', 0x0) keyctl$revoke(0x3, r0) 21:24:24 executing program 7: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$hfsplus(&(0x7f0000000040)='hfsplus\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000300), 0x0, &(0x7f0000000380)) 21:24:24 executing program 3: r0 = syz_open_dev$sndpcmc(&(0x7f0000004fee)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) r1 = creat(&(0x7f0000000200)='./bus\x00', 0x0) write$cgroup_int(r1, &(0x7f0000000040), 0x1) r2 = open(&(0x7f000000fffa)='./bus\x00', 0x0, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x800002, 0x0, r2, 0x0) ioctl(r0, 0xc0884123, &(0x7f0000001f64)) 21:24:24 executing program 6: r0 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x4, 0x0) r1 = syz_open_dev$loop(&(0x7f0000000100)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_SET_FD(r0, 0x4c00, 0xffffffffffffffff) ioctl$LOOP_SET_FD(r1, 0x4c00, r0) 21:24:24 executing program 2: syz_mount_image$gfs2(&(0x7f0000000040)='gfs2\x00', &(0x7f0000001740)='./file0\x00', 0x0, 0x0, &(0x7f0000001680), 0x0, &(0x7f0000000880)=ANY=[@ANYBLOB='l']) 21:24:24 executing program 5: [ 175.846742] hfsplus: unable to find HFS+ superblock 21:24:24 executing program 1: 21:24:24 executing program 4: r0 = add_key$keyring(&(0x7f0000000140)='keyring\x00', &(0x7f0000000180)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffd) request_key(&(0x7f0000000040)='user\x00', &(0x7f0000000080)={0x73, 0x79, 0x7a}, &(0x7f00000000c0)='cpuset\x00', 0x0) keyctl$revoke(0x3, r0) 21:24:24 executing program 0: syz_open_dev$sndseq(&(0x7f0000000000)='/dev/snd/seq\x00', 0x0, 0x0) userfaultfd(0x0) syz_open_dev$mice(&(0x7f0000000100)='/dev/input/mice\x00', 0x0, 0x0) pselect6(0x40, &(0x7f00000abfc0)={0x3ffffd}, &(0x7f0000768000)={0x0, 0x1000000000000}, &(0x7f00007fbfc0), &(0x7f0000f22000)={0x0, 0x989680}, &(0x7f0000f14000)={&(0x7f0000553ff8), 0x8}) 21:24:24 executing program 3: r0 = syz_open_dev$sndpcmc(&(0x7f0000004fee)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) r1 = creat(&(0x7f0000000200)='./bus\x00', 0x0) write$cgroup_int(r1, &(0x7f0000000040), 0x1) r2 = open(&(0x7f000000fffa)='./bus\x00', 0x0, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x800002, 0x0, r2, 0x0) ioctl(r0, 0xc0884123, &(0x7f0000001f64)) [ 175.895889] gfs2: invalid mount option: l [ 175.900122] gfs2: can't parse mount arguments 21:24:25 executing program 6: r0 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x4, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000280)='net/udp\x00') ioctl$LOOP_SET_FD(r0, 0x4c00, r1) ioctl$LOOP_SET_FD(0xffffffffffffffff, 0x4c00, r0) 21:24:25 executing program 5: 21:24:25 executing program 1: 21:24:25 executing program 7: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$hfsplus(&(0x7f0000000040)='hfsplus\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000300), 0x0, &(0x7f0000000380)) 21:24:25 executing program 4: r0 = add_key$keyring(&(0x7f0000000140)='keyring\x00', &(0x7f0000000180)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffd) request_key(&(0x7f0000000040)='user\x00', &(0x7f0000000080)={0x73, 0x79, 0x7a}, &(0x7f00000000c0)='cpuset\x00', 0x0) keyctl$revoke(0x3, r0) [ 175.983929] gfs2: invalid mount option: l [ 175.988285] gfs2: can't parse mount arguments 21:24:25 executing program 5: r0 = syz_open_dev$sndpcmc(&(0x7f0000004fee)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) r1 = creat(&(0x7f0000000200)='./bus\x00', 0x0) write$cgroup_int(r1, &(0x7f0000000040), 0x1) r2 = open(&(0x7f000000fffa)='./bus\x00', 0x0, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x800002, 0x0, r2, 0x0) ioctl(r0, 0xc0884123, &(0x7f0000001f64)) 21:24:25 executing program 2: syz_mount_image$gfs2(&(0x7f0000000040)='gfs2\x00', &(0x7f0000001740)='./file0\x00', 0x0, 0x0, &(0x7f0000001680), 0x0, &(0x7f0000000880)=ANY=[@ANYBLOB='l']) 21:24:25 executing program 1: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$hfsplus(&(0x7f0000000040)='hfsplus\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000300), 0x0, &(0x7f0000000380)) 21:24:25 executing program 6: r0 = syz_open_dev$loop(&(0x7f0000000100)='/dev/loop#\x00', 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000280)='net/udp\x00') ioctl$LOOP_SET_FD(0xffffffffffffffff, 0x4c00, r1) ioctl$LOOP_SET_FD(r0, 0x4c00, 0xffffffffffffffff) [ 176.088010] hfsplus: unable to find HFS+ superblock 21:24:25 executing program 3: r0 = syz_open_dev$sndpcmc(&(0x7f0000004fee)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) r1 = creat(&(0x7f0000000200)='./bus\x00', 0x0) write$cgroup_int(r1, &(0x7f0000000040), 0x1) r2 = open(&(0x7f000000fffa)='./bus\x00', 0x0, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x800002, 0x0, r2, 0x0) ioctl(r0, 0xc0884123, &(0x7f0000001f64)) 21:24:25 executing program 0: syz_open_dev$sndseq(&(0x7f0000000000)='/dev/snd/seq\x00', 0x0, 0x0) userfaultfd(0x0) syz_open_dev$mice(&(0x7f0000000100)='/dev/input/mice\x00', 0x0, 0x0) pselect6(0x40, &(0x7f00000abfc0)={0x3ffffd}, &(0x7f0000768000)={0x0, 0x64000000}, &(0x7f00007fbfc0), &(0x7f0000f22000)={0x0, 0x989680}, &(0x7f0000f14000)={&(0x7f0000553ff8), 0x8}) 21:24:25 executing program 5: r0 = syz_open_dev$sndpcmc(&(0x7f0000004fee)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) r1 = creat(&(0x7f0000000200)='./bus\x00', 0x0) write$cgroup_int(r1, &(0x7f0000000040), 0x1) r2 = open(&(0x7f000000fffa)='./bus\x00', 0x0, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x800002, 0x0, r2, 0x0) ioctl(r0, 0xc0884123, &(0x7f0000001f64)) 21:24:25 executing program 4: r0 = add_key$keyring(&(0x7f0000000140)='keyring\x00', &(0x7f0000000180)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffd) request_key(&(0x7f0000000040)='user\x00', &(0x7f0000000080)={0x73, 0x79, 0x7a}, &(0x7f00000000c0)='cpuset\x00', r0) keyctl$revoke(0x3, 0x0) [ 176.157942] gfs2: invalid mount option: l [ 176.162245] gfs2: can't parse mount arguments 21:24:25 executing program 7: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$hfsplus(&(0x7f0000000040)='hfsplus\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000300), 0x0, &(0x7f0000000380)) [ 176.202388] hfsplus: unable to find HFS+ superblock 21:24:25 executing program 6: r0 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) r1 = syz_open_dev$loop(&(0x7f0000000100)='/dev/loop#\x00', 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000280)='net/udp\x00') ioctl$LOOP_SET_FD(r0, 0x4c00, r2) ioctl$LOOP_SET_FD(r1, 0x4c00, r0) [ 176.237591] gfs2: invalid mount option: l [ 176.241952] gfs2: can't parse mount arguments 21:24:25 executing program 3: r0 = syz_open_dev$sndpcmc(&(0x7f0000004fee)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) r1 = creat(&(0x7f0000000200)='./bus\x00', 0x0) write$cgroup_int(r1, &(0x7f0000000040), 0x1) r2 = open(&(0x7f000000fffa)='./bus\x00', 0x0, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x800002, 0x1012, 0xffffffffffffffff, 0x0) ioctl(r0, 0xc0884123, &(0x7f0000001f64)) [ 176.291537] hfsplus: unable to find HFS+ superblock 21:24:25 executing program 5: r0 = syz_open_dev$sndpcmc(&(0x7f0000004fee)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) r1 = creat(&(0x7f0000000200)='./bus\x00', 0x0) write$cgroup_int(r1, &(0x7f0000000040), 0x1) r2 = open(&(0x7f000000fffa)='./bus\x00', 0x0, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x800002, 0x0, r2, 0x0) ioctl(r0, 0xc0884123, &(0x7f0000001f64)) 21:24:25 executing program 1: r0 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x4, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000280)='net/udp\x00') ioctl$LOOP_SET_FD(r0, 0x4c00, r1) ioctl$LOOP_SET_FD(0xffffffffffffffff, 0x4c00, r0) 21:24:25 executing program 0: syz_open_dev$sndseq(&(0x7f0000000000)='/dev/snd/seq\x00', 0x0, 0x0) userfaultfd(0x0) syz_open_dev$mice(&(0x7f0000000100)='/dev/input/mice\x00', 0x0, 0x0) pselect6(0x40, &(0x7f00000abfc0)={0x3ffffd}, &(0x7f0000768000)={0x0, 0x10000000}, &(0x7f00007fbfc0), &(0x7f0000f22000)={0x0, 0x989680}, &(0x7f0000f14000)={&(0x7f0000553ff8), 0x8}) 21:24:25 executing program 2: syz_mount_image$gfs2(&(0x7f0000000040)='gfs2\x00', &(0x7f0000001740)='./file0\x00', 0x0, 0x0, &(0x7f0000001680), 0x0, &(0x7f0000000880)=ANY=[@ANYBLOB='l']) 21:24:25 executing program 6: r0 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x4, 0x0) r1 = syz_open_dev$loop(&(0x7f0000000100)='/dev/loop#\x00', 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000280)='net/udp\x00') ioctl$LOOP_SET_FD(0xffffffffffffffff, 0x4c00, r2) ioctl$LOOP_SET_FD(r1, 0x4c00, r0) 21:24:25 executing program 7: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$hfsplus(&(0x7f0000000040)='hfsplus\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000300), 0x0, &(0x7f0000000380)) 21:24:25 executing program 3: r0 = syz_open_dev$sndpcmc(&(0x7f0000004fee)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) r1 = creat(&(0x7f0000000200)='./bus\x00', 0x0) write$cgroup_int(r1, &(0x7f0000000040), 0x1) r2 = open(&(0x7f000000fffa)='./bus\x00', 0x0, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x800002, 0x1012, 0xffffffffffffffff, 0x0) ioctl(r0, 0xc0884123, &(0x7f0000001f64)) 21:24:25 executing program 1: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$hfsplus(&(0x7f0000000040)='hfsplusM', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000300), 0x0, &(0x7f0000000380)) 21:24:25 executing program 5: syz_open_dev$sndpcmc(&(0x7f0000004fee)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) r0 = creat(&(0x7f0000000200)='./bus\x00', 0x0) write$cgroup_int(r0, &(0x7f0000000040), 0x1) r1 = open(&(0x7f000000fffa)='./bus\x00', 0x0, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x800002, 0x0, r1, 0x0) 21:24:25 executing program 0: syz_open_dev$sndseq(&(0x7f0000000000)='/dev/snd/seq\x00', 0x0, 0x0) userfaultfd(0x0) syz_open_dev$mice(&(0x7f0000000100)='/dev/input/mice\x00', 0x0, 0x0) pselect6(0x40, &(0x7f00000abfc0)={0x3ffffd}, &(0x7f0000768000)={0x0, 0x8000000}, &(0x7f00007fbfc0), &(0x7f0000f22000)={0x0, 0x989680}, &(0x7f0000f14000)={&(0x7f0000553ff8), 0x8}) [ 176.463665] gfs2: invalid mount option: l [ 176.467912] gfs2: can't parse mount arguments 21:24:25 executing program 6: r0 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x4, 0x0) r1 = syz_open_dev$loop(&(0x7f0000000100)='/dev/loop#\x00', 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000280)='net/udp\x00') ioctl$LOOP_SET_FD(0xffffffffffffffff, 0x4c00, 0xffffffffffffffff) ioctl$LOOP_SET_FD(r1, 0x4c00, r0) [ 176.518988] hfsplus: unable to find HFS+ superblock 21:24:25 executing program 3: r0 = syz_open_dev$sndpcmc(&(0x7f0000004fee)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) r1 = creat(&(0x7f0000000200)='./bus\x00', 0x0) write$cgroup_int(r1, &(0x7f0000000040), 0x1) r2 = open(&(0x7f000000fffa)='./bus\x00', 0x0, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x800002, 0x1012, 0xffffffffffffffff, 0x0) ioctl(r0, 0xc0884123, &(0x7f0000001f64)) 21:24:25 executing program 5: syz_open_dev$sndpcmc(&(0x7f0000004fee)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) r0 = creat(&(0x7f0000000200)='./bus\x00', 0x0) write$cgroup_int(r0, &(0x7f0000000040), 0x1) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x800002, 0x0, 0xffffffffffffffff, 0x0) 21:24:25 executing program 1: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$hfsplus(&(0x7f0000000040)='hfsplus\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000300), 0x0, &(0x7f0000000380)) 21:24:25 executing program 6: r0 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x4, 0x0) r1 = syz_open_dev$loop(&(0x7f0000000100)='/dev/loop#\x00', 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000000280)='net/udp\x00') ioctl$LOOP_SET_FD(0xffffffffffffffff, 0x4c00, 0xffffffffffffffff) ioctl$LOOP_SET_FD(0xffffffffffffffff, 0x4c00, r0) 21:24:25 executing program 7: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$hfsplus(&(0x7f0000000040)='hfsplus\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000300), 0x0, &(0x7f0000000380)) 21:24:25 executing program 0: syz_open_dev$sndseq(&(0x7f0000000000)='/dev/snd/seq\x00', 0x0, 0x0) userfaultfd(0x0) syz_open_dev$mice(&(0x7f0000000100)='/dev/input/mice\x00', 0x0, 0x0) pselect6(0x40, &(0x7f00000abfc0)={0x3ffffd}, &(0x7f0000768000)={0x0, 0x6400}, &(0x7f00007fbfc0), &(0x7f0000f22000)={0x0, 0x989680}, &(0x7f0000f14000)={&(0x7f0000553ff8), 0x8}) [ 176.606275] gfs2: invalid mount option: l [ 176.610509] gfs2: can't parse mount arguments 21:24:25 executing program 3: r0 = syz_open_dev$sndpcmc(&(0x7f0000004fee)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) r1 = creat(&(0x7f0000000200)='./bus\x00', 0x0) write$cgroup_int(r1, &(0x7f0000000040), 0x1) r2 = open(&(0x7f000000fffa)='./bus\x00', 0x0, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x800002, 0x1012, r2, 0x0) ioctl(0xffffffffffffffff, 0xc0884123, &(0x7f0000001f64)) 21:24:25 executing program 2: syz_mount_image$gfs2(&(0x7f0000000040)='gfs2\x00', &(0x7f0000001740)='./file0\x00', 0x0, 0x0, &(0x7f0000001680), 0x0, &(0x7f0000000880)=ANY=[@ANYBLOB='l']) 21:24:25 executing program 5: syz_open_dev$sndpcmc(&(0x7f0000004fee)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) r0 = creat(&(0x7f0000000200)='./bus\x00', 0x0) write$cgroup_int(r0, &(0x7f0000000040), 0x1) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x800002, 0x0, 0xffffffffffffffff, 0x0) [ 176.708414] hfsplus: unable to find HFS+ superblock [ 176.717086] hfsplus: unable to find HFS+ superblock 21:24:25 executing program 6: r0 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x4, 0x0) r1 = syz_open_dev$loop(&(0x7f0000000100)='/dev/loop#\x00', 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000000280)='net/udp\x00') ioctl$LOOP_SET_FD(0xffffffffffffffff, 0x4c00, 0xffffffffffffffff) ioctl$LOOP_SET_FD(0xffffffffffffffff, 0x4c00, r0) 21:24:25 executing program 7: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$hfsplus(&(0x7f0000000040)='hfsplus\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000300), 0x0, &(0x7f0000000380)) 21:24:25 executing program 1: r0 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x4, 0x0) r1 = syz_open_dev$loop(&(0x7f0000000100)='/dev/loop#\x00', 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000000280)='net/udp\x00') ioctl$LOOP_SET_FD(0xffffffffffffffff, 0x4c00, 0xffffffffffffffff) ioctl$LOOP_SET_FD(r1, 0x4c00, r0) 21:24:25 executing program 0: syz_open_dev$sndseq(&(0x7f0000000000)='/dev/snd/seq\x00', 0x0, 0x0) userfaultfd(0x0) syz_open_dev$mice(&(0x7f0000000100)='/dev/input/mice\x00', 0x0, 0x0) pselect6(0x40, &(0x7f00000abfc0)={0x3ffffd}, &(0x7f0000768000)={0x0, 0x1600}, &(0x7f00007fbfc0), &(0x7f0000f22000)={0x0, 0x989680}, &(0x7f0000f14000)={&(0x7f0000553ff8), 0x8}) [ 176.796525] gfs2: invalid mount option: l [ 176.800823] gfs2: can't parse mount arguments 21:24:25 executing program 3: r0 = syz_open_dev$sndpcmc(&(0x7f0000004fee)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) r1 = creat(&(0x7f0000000200)='./bus\x00', 0x0) write$cgroup_int(r1, &(0x7f0000000040), 0x1) r2 = open(&(0x7f000000fffa)='./bus\x00', 0x0, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x800002, 0x1012, r2, 0x0) ioctl(r0, 0x0, &(0x7f0000001f64)) [ 176.876091] hfsplus: unable to find HFS+ superblock 21:24:25 executing program 5: syz_open_dev$sndpcmc(&(0x7f0000004fee)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) r0 = creat(&(0x7f0000000200)='./bus\x00', 0x0) write$cgroup_int(r0, &(0x7f0000000040), 0x1) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x800002, 0x0, 0xffffffffffffffff, 0x0) 21:24:25 executing program 6: r0 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x4, 0x0) r1 = syz_open_dev$loop(&(0x7f0000000100)='/dev/loop#\x00', 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000000280)='net/udp\x00') ioctl$LOOP_SET_FD(0xffffffffffffffff, 0x4c00, 0xffffffffffffffff) ioctl$LOOP_SET_FD(0xffffffffffffffff, 0x4c00, r0) 21:24:25 executing program 1: r0 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x4, 0x0) r1 = syz_open_dev$loop(&(0x7f0000000100)='/dev/loop#\x00', 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000000280)='net/udp\x00') ioctl$LOOP_SET_FD(0xffffffffffffffff, 0x4c00, 0xffffffffffffffff) ioctl$LOOP_SET_FD(r1, 0x4c00, r0) [ 176.900006] gfs2: invalid mount option: l [ 176.904284] gfs2: can't parse mount arguments 21:24:26 executing program 0: syz_open_dev$sndseq(&(0x7f0000000000)='/dev/snd/seq\x00', 0x0, 0x0) userfaultfd(0x0) syz_open_dev$mice(&(0x7f0000000100)='/dev/input/mice\x00', 0x0, 0x0) pselect6(0x40, &(0x7f00000abfc0)={0x3ffffd}, &(0x7f0000768000)={0x0, 0x0, 0x16}, &(0x7f00007fbfc0), &(0x7f0000f22000)={0x0, 0x989680}, &(0x7f0000f14000)={&(0x7f0000553ff8), 0x8}) [ 176.940475] hfsplus: unable to find HFS+ superblock 21:24:26 executing program 2: syz_mount_image$gfs2(&(0x7f0000000040)='gfs2\x00', &(0x7f0000001740)='./file0\x00', 0x0, 0x0, &(0x7f0000001680), 0x0, &(0x7f0000000880)=ANY=[@ANYBLOB='l']) 21:24:26 executing program 7: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$hfsplus(&(0x7f0000000040)='hfsplus\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000300), 0x0, &(0x7f0000000380)) 21:24:26 executing program 6: r0 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x4, 0x0) r1 = syz_open_dev$loop(&(0x7f0000000100)='/dev/loop#\x00', 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000000280)='net/udp\x00') ioctl$LOOP_SET_FD(0xffffffffffffffff, 0x4c00, 0xffffffffffffffff) ioctl$LOOP_SET_FD(r1, 0x4c00, 0xffffffffffffffff) 21:24:26 executing program 5: syz_open_dev$sndpcmc(&(0x7f0000004fee)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) creat(&(0x7f0000000200)='./bus\x00', 0x0) r0 = open(&(0x7f000000fffa)='./bus\x00', 0x0, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x800002, 0x0, r0, 0x0) 21:24:26 executing program 1: r0 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x4, 0x0) r1 = syz_open_dev$loop(&(0x7f0000000100)='/dev/loop#\x00', 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000000280)='net/udp\x00') ioctl$LOOP_SET_FD(0xffffffffffffffff, 0x4c00, 0xffffffffffffffff) ioctl$LOOP_SET_FD(r1, 0x4c00, r0) 21:24:26 executing program 0: syz_open_dev$sndseq(&(0x7f0000000000)='/dev/snd/seq\x00', 0x0, 0x0) userfaultfd(0x0) syz_open_dev$mice(&(0x7f0000000100)='/dev/input/mice\x00', 0x0, 0x0) pselect6(0x40, &(0x7f00000abfc0)={0x3ffffd}, &(0x7f0000768000)={0x0, 0x0, 0x1000000000000000}, &(0x7f00007fbfc0), &(0x7f0000f22000)={0x0, 0x989680}, &(0x7f0000f14000)={&(0x7f0000553ff8), 0x8}) 21:24:26 executing program 5: syz_open_dev$sndpcmc(&(0x7f0000004fee)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) r0 = open(&(0x7f000000fffa)='./bus\x00', 0x0, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x800002, 0x0, r0, 0x0) [ 177.084368] gfs2: invalid mount option: l [ 177.088613] gfs2: can't parse mount arguments [ 177.115610] hfsplus: unable to find HFS+ superblock 21:24:26 executing program 1: r0 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x4, 0x0) r1 = syz_open_dev$loop(&(0x7f0000000100)='/dev/loop#\x00', 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000000280)='net/udp\x00') ioctl$LOOP_SET_FD(r1, 0x4c00, r0) 21:24:26 executing program 7: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$hfsplus(&(0x7f0000000040)='hfsplus\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000300), 0x0, &(0x7f0000000380)) [ 177.173612] gfs2: invalid mount option: l [ 177.177945] gfs2: can't parse mount arguments 21:24:26 executing program 0: syz_open_dev$sndseq(&(0x7f0000000000)='/dev/snd/seq\x00', 0x0, 0x0) userfaultfd(0x0) syz_open_dev$mice(&(0x7f0000000100)='/dev/input/mice\x00', 0x0, 0x0) pselect6(0x40, &(0x7f00000abfc0)={0x3ffffd}, &(0x7f0000768000)={0x0, 0x0, 0x6400}, &(0x7f00007fbfc0), &(0x7f0000f22000)={0x0, 0x989680}, &(0x7f0000f14000)={&(0x7f0000553ff8), 0x8}) 21:24:26 executing program 5: syz_open_dev$sndpcmc(&(0x7f0000004fee)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) r0 = open(&(0x7f000000fffa)='./bus\x00', 0x0, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x800002, 0x0, r0, 0x0) 21:24:26 executing program 2: syz_mount_image$gfs2(&(0x7f0000000040)="67667332ff", &(0x7f0000001740)='./file0\x00', 0x0, 0x0, &(0x7f0000001680), 0x0, &(0x7f0000000880)=ANY=[@ANYBLOB='l']) 21:24:26 executing program 1: r0 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x4, 0x0) r1 = syz_open_dev$loop(&(0x7f0000000100)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_SET_FD(r1, 0x4c00, r0) 21:24:26 executing program 0: syz_open_dev$sndseq(&(0x7f0000000000)='/dev/snd/seq\x00', 0x0, 0x0) userfaultfd(0x0) syz_open_dev$mice(&(0x7f0000000100)='/dev/input/mice\x00', 0x0, 0x0) pselect6(0x40, &(0x7f00000abfc0)={0x3ffffd}, &(0x7f0000768000)={0x0, 0x0, 0x8}, &(0x7f00007fbfc0), &(0x7f0000f22000)={0x0, 0x989680}, &(0x7f0000f14000)={&(0x7f0000553ff8), 0x8}) [ 177.284205] hfsplus: unable to find HFS+ superblock 21:24:26 executing program 7: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$hfsplus(&(0x7f0000000040)="686673706c7573ff", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000300), 0x0, &(0x7f0000000380)) 21:24:26 executing program 1: r0 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x4, 0x0) ioctl$LOOP_SET_FD(0xffffffffffffffff, 0x4c00, r0) 21:24:26 executing program 5: syz_open_dev$sndpcmc(&(0x7f0000004fee)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) r0 = open(&(0x7f000000fffa)='./bus\x00', 0x0, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x800002, 0x0, r0, 0x0) 21:24:26 executing program 2: syz_mount_image$gfs2(&(0x7f0000000040)='gfs2l', &(0x7f0000001740)='./file0\x00', 0x0, 0x0, &(0x7f0000001680), 0x0, &(0x7f0000000880)=ANY=[@ANYBLOB='l']) 21:24:26 executing program 0: syz_open_dev$sndseq(&(0x7f0000000000)='/dev/snd/seq\x00', 0x0, 0x0) userfaultfd(0x0) syz_open_dev$mice(&(0x7f0000000100)='/dev/input/mice\x00', 0x0, 0x0) pselect6(0x40, &(0x7f00000abfc0)={0x3ffffd}, &(0x7f0000768000)={0x0, 0x0, 0x10}, &(0x7f00007fbfc0), &(0x7f0000f22000)={0x0, 0x989680}, &(0x7f0000f14000)={&(0x7f0000553ff8), 0x8}) 21:24:26 executing program 7: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$hfsplus(&(0x7f0000000040)='hfsplus\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000300), 0x0, &(0x7f0000000380)) 21:24:26 executing program 5: creat(&(0x7f0000000200)='./bus\x00', 0x0) r0 = open(&(0x7f000000fffa)='./bus\x00', 0x0, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x800002, 0x0, r0, 0x0) 21:24:26 executing program 1: r0 = syz_open_dev$loop(&(0x7f0000000100)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_SET_FD(r0, 0x4c00, 0xffffffffffffffff) 21:24:26 executing program 5: creat(&(0x7f0000000200)='./bus\x00', 0x0) r0 = open(&(0x7f000000fffa)='./bus\x00', 0x0, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x0, r0, 0x0) [ 177.510783] hfsplus: unable to find HFS+ superblock 21:24:26 executing program 0: syz_open_dev$sndseq(&(0x7f0000000000)='/dev/snd/seq\x00', 0x0, 0x0) userfaultfd(0x0) syz_open_dev$mice(&(0x7f0000000100)='/dev/input/mice\x00', 0x0, 0x0) pselect6(0x40, &(0x7f00000abfc0)={0x3ffffd}, &(0x7f0000768000)={0x0, 0x0, 0x6000000000000000}, &(0x7f00007fbfc0), &(0x7f0000f22000)={0x0, 0x989680}, &(0x7f0000f14000)={&(0x7f0000553ff8), 0x8}) 21:24:26 executing program 2: syz_mount_image$gfs2(&(0x7f0000000040)='gfs2\x00', &(0x7f0000001740)='./file0\x00', 0x0, 0x0, &(0x7f0000001680), 0x0, &(0x7f0000000880)=ANY=[@ANYBLOB='l']) 21:24:26 executing program 7: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$hfsplus(&(0x7f0000000040)='hfsplus\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000300), 0x0, &(0x7f0000000380)) 21:24:26 executing program 1: r0 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) r1 = syz_open_dev$loop(&(0x7f0000000100)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_SET_FD(r1, 0x4c00, r0) 21:24:26 executing program 5: creat(&(0x7f0000000200)='./bus\x00', 0x0) r0 = open(&(0x7f000000fffa)='./bus\x00', 0x0, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 177.617043] hfsplus: unable to find HFS+ superblock [ 177.625638] gfs2: invalid mount option: l [ 177.629887] gfs2: can't parse mount arguments 21:24:26 executing program 1: r0 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x4, 0x0) r1 = syz_open_dev$loop(&(0x7f0000000100)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_SET_FD(0xffffffffffffffff, 0x4c00, r0) 21:24:26 executing program 0: syz_open_dev$sndseq(&(0x7f0000000000)='/dev/snd/seq\x00', 0x0, 0x0) userfaultfd(0x0) syz_open_dev$mice(&(0x7f0000000100)='/dev/input/mice\x00', 0x0, 0x0) pselect6(0x40, &(0x7f00000abfc0)={0x3ffffd}, &(0x7f0000768000)={0x0, 0x0, 0x60000000}, &(0x7f00007fbfc0), &(0x7f0000f22000)={0x0, 0x989680}, &(0x7f0000f14000)={&(0x7f0000553ff8), 0x8}) 21:24:26 executing program 5: creat(&(0x7f0000000200)='./bus\x00', 0x0) r0 = open(&(0x7f000000fffa)='./bus\x00', 0x0, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x0, 0xffffffffffffffff, 0x0) 21:24:26 executing program 7: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$hfsplus(&(0x7f0000000040)='hfsplus\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000300), 0x0, &(0x7f0000000380)) 21:24:26 executing program 2: syz_mount_image$gfs2(&(0x7f0000000040)='gfs2\x00', &(0x7f0000001740)='./file0\x00', 0x0, 0x0, &(0x7f0000001680), 0x0, &(0x7f0000000880)=ANY=[@ANYBLOB='l']) [ 177.674340] gfs2: invalid mount option: l [ 177.678574] gfs2: can't parse mount arguments 21:24:26 executing program 4: r0 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x4, 0x0) syz_open_dev$loop(&(0x7f0000000100)='/dev/loop#\x00', 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000000280)='net/udp\x00') ioctl$LOOP_SET_FD(0xffffffffffffffff, 0x4c00, 0xffffffffffffffff) ioctl$LOOP_SET_FD(0xffffffffffffffff, 0x4c00, r0) 21:24:26 executing program 6: 21:24:26 executing program 3: 21:24:26 executing program 0: syz_open_dev$sndseq(&(0x7f0000000000)='/dev/snd/seq\x00', 0x0, 0x0) userfaultfd(0x0) syz_open_dev$mice(&(0x7f0000000100)='/dev/input/mice\x00', 0x0, 0x0) pselect6(0x40, &(0x7f00000abfc0)={0x3ffffd}, &(0x7f0000768000)={0x0, 0x0, 0x1000000}, &(0x7f00007fbfc0), &(0x7f0000f22000)={0x0, 0x989680}, &(0x7f0000f14000)={&(0x7f0000553ff8), 0x8}) [ 177.794429] hfsplus: unable to find HFS+ superblock 21:24:26 executing program 1: r0 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x4, 0x0) r1 = syz_open_dev$loop(&(0x7f0000000100)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_SET_FD(r1, 0x4c00, 0xffffffffffffffff) 21:24:26 executing program 3: 21:24:26 executing program 6: 21:24:26 executing program 5: creat(&(0x7f0000000200)='./bus\x00', 0x0) r0 = open(&(0x7f000000fffa)='./bus\x00', 0x0, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 177.815381] gfs2: invalid mount option: l [ 177.819643] gfs2: can't parse mount arguments 21:24:26 executing program 4: 21:24:26 executing program 6: 21:24:27 executing program 0: syz_open_dev$sndseq(&(0x7f0000000000)='/dev/snd/seq\x00', 0x0, 0x0) userfaultfd(0x0) syz_open_dev$mice(&(0x7f0000000100)='/dev/input/mice\x00', 0x0, 0x0) pselect6(0x40, &(0x7f00000abfc0)={0x3ffffd}, &(0x7f0000768000)={0x0, 0x0, 0x8000000}, &(0x7f00007fbfc0), &(0x7f0000f22000)={0x0, 0x989680}, &(0x7f0000f14000)={&(0x7f0000553ff8), 0x8}) 21:24:27 executing program 4: 21:24:27 executing program 7: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$hfsplus(&(0x7f0000000040)='hfsplus\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000300), 0x0, &(0x7f0000000380)) [ 177.930554] gfs2: invalid mount option: l [ 177.934904] gfs2: can't parse mount arguments 21:24:27 executing program 3: 21:24:27 executing program 1: 21:24:27 executing program 2: syz_mount_image$gfs2(&(0x7f0000000040)="67667332fc", &(0x7f0000001740)='./file0\x00', 0x0, 0x0, &(0x7f0000001680), 0x0, &(0x7f0000000880)=ANY=[@ANYBLOB='l']) 21:24:27 executing program 5: 21:24:27 executing program 6: [ 178.061176] hfsplus: unable to find HFS+ superblock 21:24:27 executing program 1: 21:24:27 executing program 3: 21:24:27 executing program 4: 21:24:27 executing program 0: syz_open_dev$sndseq(&(0x7f0000000000)='/dev/snd/seq\x00', 0x0, 0x0) userfaultfd(0x0) syz_open_dev$mice(&(0x7f0000000100)='/dev/input/mice\x00', 0x0, 0x0) pselect6(0x40, &(0x7f00000abfc0)={0x3ffffd}, &(0x7f0000768000)={0x0, 0x0, 0x1600}, &(0x7f00007fbfc0), &(0x7f0000f22000)={0x0, 0x989680}, &(0x7f0000f14000)={&(0x7f0000553ff8), 0x8}) 21:24:27 executing program 5: 21:24:27 executing program 7: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$hfsplus(&(0x7f0000000040)='hfsplus#', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000300), 0x0, &(0x7f0000000380)) 21:24:27 executing program 2: syz_mount_image$gfs2(&(0x7f0000000040)="67667332ff", &(0x7f0000001740)='./file0\x00', 0x0, 0x0, &(0x7f0000001680), 0x0, &(0x7f0000000880)=ANY=[@ANYBLOB='l']) 21:24:27 executing program 6: 21:24:27 executing program 4: 21:24:27 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='oom_score_adj\x00') write$cgroup_pid(r0, &(0x7f0000000100), 0x4) 21:24:27 executing program 1: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup\x00', 0x200002, 0x0) r1 = openat$cgroup_int(r0, &(0x7f0000000140)='cpu.weight\x00', 0x2, 0x0) write$cgroup_int(r1, &(0x7f00000000c0)=0x1000, 0x12) 21:24:27 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000deb000)={0x2, 0x4e23, @broadcast=0xffffffff}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f00006dc000)=[{0x6, 0x0, 0x0, 0xa1}]}, 0x10) sendto$inet(r0, &(0x7f0000000140), 0x0, 0x200007ff, &(0x7f0000deaff0)={0x2, 0x4e23}, 0x10) sendto$inet(r0, &(0x7f0000000180)="c3401c344654f3c7d9b41ba48c8e399aa4eedc3d6bd8ebd65c856a27d61154adc2b2a9763ae0201c0d32e11f38e9dd18c58f6bd779650fc30f93653bdaecf323c9f6502ceab47e58114347b289546465a5eb278de12b1989f64cc99412e36880d20c34d91051b22f6c8acc9d082b7bcdec844f667da0867d08d4154004997e317b79", 0x82, 0xfffffffffffffffc, &(0x7f0000e66000)={0x2, 0x0, @multicast2=0xe0000002}, 0x10) readv(r0, &(0x7f00000005c0)=[{&(0x7f00000004c0)=""/101, 0x65}, {&(0x7f0000000100)=""/101, 0x65}], 0x2) r1 = dup2(r0, r0) r2 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r2, 0x8912, &(0x7f0000000140)="025cc83d6d345f8f762070") sendto$inet(r1, &(0x7f0000000600)='p', 0x1, 0x0, &(0x7f0000000280)={0x2, 0x0, @local={0xac, 0x14, 0x14, 0xaa}}, 0x10) recvmsg(r0, &(0x7f0000001c00)={&(0x7f00000019c0)=@hci, 0x80, &(0x7f0000001b00)=[{&(0x7f0000001a80)=""/80, 0x50}], 0x1, &(0x7f0000001b40)=""/150, 0x96}, 0x0) 21:24:27 executing program 1: r0 = socket$can_raw(0x1d, 0x3, 0x1) setsockopt(r0, 0x65, 0x10000000002, &(0x7f0000000000)="c8d63f23", 0x4) bind$can_raw(r0, &(0x7f0000000200)={0x1d}, 0x10) close(r0) 21:24:27 executing program 0: syz_open_dev$sndseq(&(0x7f0000000000)='/dev/snd/seq\x00', 0x0, 0x0) userfaultfd(0x0) syz_open_dev$mice(&(0x7f0000000100)='/dev/input/mice\x00', 0x0, 0x0) pselect6(0x40, &(0x7f00000abfc0)={0x3ffffd}, &(0x7f0000768000)={0x0, 0x0, 0x64}, &(0x7f00007fbfc0), &(0x7f0000f22000)={0x0, 0x989680}, &(0x7f0000f14000)={&(0x7f0000553ff8), 0x8}) 21:24:27 executing program 6: perf_event_open(&(0x7f0000000100)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x93, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000000), 0x4}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 21:24:27 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) connect$inet(r0, &(0x7f0000ccb000)={0x2}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x1, 0x3, &(0x7f00000011c0)=ANY=[@ANYBLOB="180000000300000000000000000000009500000000000000"], &(0x7f00002bf000)='syzkaller\x00', 0x1, 0xb7, &(0x7f0000000440)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f00000000c0)={r0, r1}) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000300)={0xffffffffffffffff}) sendto(r3, &(0x7f0000000500)="03", 0x1, 0x0, &(0x7f00000003c0)=@pptp={0x18, 0x2, {0x0, @multicast1=0xe0000001}}, 0x80) 21:24:27 executing program 1: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) ioctl$FS_IOC_SETFSLABEL(r0, 0x41009432, &(0x7f0000000480)="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") ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) 21:24:27 executing program 1: pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f00000001c0), 0xfffffef3) read(r0, &(0x7f0000000200)=""/250, 0x50c7e3e3) madvise(&(0x7f0000a93000/0x4000)=nil, 0x4000, 0xe) mremap(&(0x7f0000a96000/0x1000)=nil, 0x1000, 0x800000, 0x3, &(0x7f0000130000/0x800000)=nil) 21:24:27 executing program 7: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$hfsplus(&(0x7f0000000040)='hfsplusB', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000300), 0x0, &(0x7f0000000380)) 21:24:27 executing program 6: perf_event_open(&(0x7f0000000100)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x93, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000000), 0x4}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 21:24:27 executing program 4: r0 = socket$inet6(0xa, 0x5, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000001c0)={'bond_slave_1\x00', 0x0}) ioctl$sock_inet6_SIOCDIFADDR(r0, 0x8918, &(0x7f0000000400)={@empty, 0x0, r1}) 21:24:27 executing program 2: syz_mount_image$gfs2(&(0x7f0000000040)='gfs2\x00', &(0x7f0000001740)='./file0\x00', 0x0, 0x0, &(0x7f0000001680), 0x0, &(0x7f0000000880)=ANY=[@ANYBLOB='l']) 21:24:27 executing program 3: r0 = socket$inet(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f0000eed000)={0x2, 0x4e21, @loopback=0x7f000001}, 0x10) r1 = socket$inet6_udp(0xa, 0x2, 0x0) mount$9p_fd(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='9p\x00', 0x0, &(0x7f0000000140)={'trans=\x00', {}, 0x2c, {'port\x00', 0x3d}, 0x2c, {[], 0x3d}}) setsockopt$inet6_int(r1, 0x29, 0x1a, &(0x7f00000f5ffc)=0xffffffff00000003, 0x4) bind$inet6(r1, &(0x7f0000710fe4)={0xa, 0x4e21}, 0x1c) r2 = socket(0x10, 0x2, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000100)='net/udp6\x00') sendfile(r2, r3, &(0x7f0000000000), 0x80000002) 21:24:27 executing program 0: syz_open_dev$sndseq(&(0x7f0000000000)='/dev/snd/seq\x00', 0x0, 0x0) userfaultfd(0x0) syz_open_dev$mice(&(0x7f0000000100)='/dev/input/mice\x00', 0x0, 0x0) pselect6(0x40, &(0x7f00000abfc0)={0x3ffffd}, &(0x7f0000768000)={0x0, 0x0, 0x6400000000000000}, &(0x7f00007fbfc0), &(0x7f0000f22000)={0x0, 0x989680}, &(0x7f0000f14000)={&(0x7f0000553ff8), 0x8}) 21:24:27 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000180)='net/wireless\x00') readv(r0, &(0x7f0000000540)=[{&(0x7f00000004c0)=""/113, 0x71}], 0x1) 21:24:27 executing program 3: mkdir(&(0x7f0000000240)='./file0\x00', 0x0) mount$9p_fd(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f00000000c0)='9p\x00', 0x1005000, &(0x7f0000000200)=ANY=[]) mount$9p_fd(0x0, &(0x7f0000000480)='./file0\x00', &(0x7f0000000140)='9p\x00', 0x3ffc, &(0x7f0000000380)={'trans=\x00', {}, 0x2c, {'port\x00', 0x3d}, 0x2c, {[], 0x3d}}) [ 178.541331] gfs2: invalid mount option: l [ 178.545610] gfs2: can't parse mount arguments 21:24:27 executing program 6: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) ioctl$FS_IOC_SETFSLABEL(0xffffffffffffffff, 0x41009432, &(0x7f0000000480)="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") ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) [ 178.599411] gfs2: invalid mount option: l [ 178.603666] gfs2: can't parse mount arguments 21:24:28 executing program 0: syz_open_dev$sndseq(&(0x7f0000000000)='/dev/snd/seq\x00', 0x0, 0x0) userfaultfd(0x0) syz_open_dev$mice(&(0x7f0000000100)='/dev/input/mice\x00', 0x0, 0x0) pselect6(0x40, &(0x7f00000abfc0)={0x3ffffd}, &(0x7f0000768000)={0x0, 0x0, 0x1600000000000000}, &(0x7f00007fbfc0), &(0x7f0000f22000)={0x0, 0x989680}, &(0x7f0000f14000)={&(0x7f0000553ff8), 0x8}) 21:24:28 executing program 7: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$hfsplus(&(0x7f0000000040)='hfsplus\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000300), 0x0, &(0x7f0000000380)) 21:24:28 executing program 4: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu\x00', 0x200002, 0x0) r1 = openat$cgroup_int(r0, &(0x7f0000000080)='cpuset.sched_relax_domain_level\x00', 0x2, 0x0) write$cgroup_int(r1, &(0x7f0000000040), 0x1) 21:24:28 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback={0x0, 0x1}}, 0x1c) listen(r0, 0x4) r1 = accept4(r0, &(0x7f0000000040)=@can, &(0x7f00000000c0)=0x80, 0x0) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) sendto$inet6(r2, &(0x7f0000e33fe0)='X', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback={0x0, 0x1}}, 0x1c) write$binfmt_script(r2, &(0x7f0000000140)=ANY=[@ANYBLOB="cc"], 0x1) shutdown(r2, 0x1) write$binfmt_misc(r1, &(0x7f0000000240)={'syz1'}, 0x34000) 21:24:28 executing program 2: syz_mount_image$gfs2(&(0x7f0000000040)='gfs2\x00', &(0x7f0000001740)='./file0\x00', 0x0, 0x0, &(0x7f0000001680), 0x0, &(0x7f0000000880)=ANY=[@ANYBLOB='l']) 21:24:28 executing program 6: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uinput\x00', 0x1, 0x0) ioctl$sock_netdev_private(r0, 0x0, &(0x7f00000000c0)) write$cgroup_int(r0, &(0x7f0000000080), 0x45c) 21:24:28 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") bpf$PROG_LOAD(0x5, &(0x7f0000008000)={0x0, 0x1, &(0x7f0000001fe8)=ANY=[@ANYBLOB="e92be282e0faa82ac3"], &(0x7f0000003ff6)='syzkaller\x00', 0x0, 0xc3, &(0x7f0000009f3d)=""/195}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x5, &(0x7f0000001fd8)=@framed={{0xffffffb7, 0x0, 0x0, 0x0, 0x0, 0x5d}, [@ldst={0x7}], {0x95}}, &(0x7f0000003ff6)='GPL\x00', 0x5, 0x437, &(0x7f000000cf3d)=""/195}, 0x48) 21:24:28 executing program 1: pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f00000001c0), 0xfffffef3) read(r0, &(0x7f0000000200)=""/250, 0x50c7e3e3) madvise(&(0x7f0000a93000/0x4000)=nil, 0x4000, 0xe) mremap(&(0x7f0000a96000/0x1000)=nil, 0x1000, 0x800000, 0x3, &(0x7f0000130000/0x800000)=nil) 21:24:28 executing program 6: syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x8a00, [], 0xaa}, @local={0xfe, 0x80, [], 0xaa}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x2}}}}}}}, &(0x7f00000002c0)) 21:24:28 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = syz_open_procfs(0x0, &(0x7f00000002c0)='oom_score_adj\x00') write$cgroup_pid(r1, &(0x7f0000000200), 0x2) 21:24:28 executing program 0: syz_open_dev$sndseq(&(0x7f0000000000)='/dev/snd/seq\x00', 0x0, 0x0) userfaultfd(0x0) syz_open_dev$mice(&(0x7f0000000100)='/dev/input/mice\x00', 0x0, 0x0) pselect6(0x40, &(0x7f00000abfc0)={0x3ffffd}, &(0x7f0000768000)={0x0, 0x0, 0x10000000}, &(0x7f00007fbfc0), &(0x7f0000f22000)={0x0, 0x989680}, &(0x7f0000f14000)={&(0x7f0000553ff8), 0x8}) [ 179.381233] gfs2: invalid mount option: l [ 179.385581] gfs2: can't parse mount arguments [ 179.406207] gfs2: invalid mount option: l [ 179.406399] hfsplus: unable to find HFS+ superblock [ 179.410449] gfs2: can't parse mount arguments 21:24:28 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000100)='/dev/snapshot\x00', 0x20601, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x4, 0x31, 0xffffffffffffffff, 0x0) write$cgroup_pid(r1, &(0x7f0000000080), 0x1) 21:24:28 executing program 7: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$hfsplus(&(0x7f0000000040)="686673706c7573f6", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000300), 0x0, &(0x7f0000000380)) 21:24:28 executing program 6: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000001240)={{{@in=@multicast1=0xe0000001, @in=@broadcast=0xffffffff, 0x0, 0x0, 0x0, 0x0, 0xa}}, {{@in=@remote={0xac, 0x14, 0x14, 0xbb}, 0x0, 0xff}, 0x0, @in=@multicast2=0xe0000002}}, 0xe8) r1 = socket$key(0xf, 0x3, 0x2) setsockopt$sock_int(r1, 0x1, 0x8, &(0x7f00000001c0), 0xfa) sendmsg$key(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)=ANY=[@ANYBLOB="020b0001020000000000400000000000"], 0x10}, 0x1}, 0x0) sendmsg$key(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x2, 0x12, 0x0, 0x0, 0x2}, 0x10}, 0x1}, 0x0) 21:24:28 executing program 2: syz_mount_image$gfs2(&(0x7f0000000040)='gfs2\x00', &(0x7f0000001740)='./file0\x00', 0x0, 0x0, &(0x7f0000001680), 0x0, &(0x7f0000000880)=ANY=[@ANYBLOB='l']) 21:24:28 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x4, 0x4, 0x4, 0xd}, 0x2c) close(r0) 21:24:28 executing program 0: syz_open_dev$sndseq(&(0x7f0000000000)='/dev/snd/seq\x00', 0x0, 0x0) userfaultfd(0x0) syz_open_dev$mice(&(0x7f0000000100)='/dev/input/mice\x00', 0x0, 0x0) pselect6(0x40, &(0x7f00000abfc0)={0x3ffffd}, &(0x7f0000768000)={0x0, 0x0, 0x16000000}, &(0x7f00007fbfc0), &(0x7f0000f22000)={0x0, 0x989680}, &(0x7f0000f14000)={&(0x7f0000553ff8), 0x8}) 21:24:28 executing program 6: socketpair$unix(0x1, 0x8000000000000001, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r1, r1) sendmsg$netlink(r2, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000019000)=[{&(0x7f00000001c0)=ANY=[@ANYRES64], 0x1}], 0x1, &(0x7f0000000040)=[@rights={0x18, 0x1, 0x1, [r0]}], 0x18}, 0x0) recvmmsg(r0, &(0x7f0000000b80)=[{{&(0x7f0000000680)=@l2, 0x80, &(0x7f0000000a40), 0x0, &(0x7f0000000ac0)=""/147, 0x93}}], 0x1, 0x62, 0x0) [ 179.550893] gfs2: invalid mount option: l [ 179.555148] gfs2: can't parse mount arguments 21:24:28 executing program 7: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$hfsplus(&(0x7f0000000040)='hfsplus\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000300), 0x0, &(0x7f0000000380)) [ 179.619897] gfs2: invalid mount option: l [ 179.624125] gfs2: can't parse mount arguments [ 179.700270] hfsplus: unable to find HFS+ superblock [ 179.758833] hfsplus: unable to find HFS+ superblock 21:24:29 executing program 5: mkdir(&(0x7f0000000180)='./file1\x00', 0x0) r0 = open(&(0x7f0000000040)='./file1\x00', 0x501043, 0x0) write$P9_RGETLOCK(r0, &(0x7f0000000100)=ANY=[], 0x0) 21:24:29 executing program 4: prctl$setendian(0x14, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r1, r1) write$cgroup_pid(r2, &(0x7f0000000040), 0x1) recvmmsg(r0, &(0x7f0000004100)=[{{&(0x7f0000001600)=@in6={0x0, 0x0, 0x0, @ipv4={[], [], @remote}}, 0x80, &(0x7f0000001580)=[{&(0x7f00000002c0)=""/4096}, {&(0x7f0000001340)=""/203}, {&(0x7f0000000140)=""/119}, {&(0x7f0000001440)=""/133}, {&(0x7f0000000000)=""/47}, {&(0x7f0000001500)=""/79}]}}], 0x2a37, 0x2, 0x0) 21:24:29 executing program 6: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000080)={"00000000000000ff00", 0x2003}) r1 = socket$packet(0x11, 0x3, 0x300) dup2(r1, r0) 21:24:29 executing program 0: syz_open_dev$sndseq(&(0x7f0000000000)='/dev/snd/seq\x00', 0x0, 0x0) userfaultfd(0x0) syz_open_dev$mice(&(0x7f0000000100)='/dev/input/mice\x00', 0x0, 0x0) pselect6(0x40, &(0x7f00000abfc0)={0x3ffffd}, &(0x7f0000768000)={0x0, 0x0, 0x64000000}, &(0x7f00007fbfc0), &(0x7f0000f22000)={0x0, 0x989680}, &(0x7f0000f14000)={&(0x7f0000553ff8), 0x8}) 21:24:29 executing program 1: pause() mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) mount(&(0x7f000000a000)='./file0\x00', &(0x7f0000000440)='./file0\x00', &(0x7f0000000300)='ramfs\x00', 0x0, &(0x7f00000007c0)) mount(&(0x7f0000d04000)='./file0\x00', &(0x7f0000903000)='./file0\x00', &(0x7f0000000480)='bdev\x00', 0x100000, &(0x7f0000000500)) mount(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='.', &(0x7f0000000040)="045b898f73", 0x1004, 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='.', &(0x7f0000000140)='vxfs\x00', 0x3080, &(0x7f0000000200)) mount(&(0x7f00000008c0)='.', &(0x7f0000000080)='.', &(0x7f00000004c0)='devtmpfs\x00', 0x5010, &(0x7f0000000380)) mount(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='.', &(0x7f0000000180)='ubifs\x00', 0x1003, 0x0) mount(&(0x7f0000377ff8)='.', &(0x7f0000187ff8)='.', &(0x7f0000753000)='mslos\x00', 0x5010, &(0x7f00000e7000)) umount2(&(0x7f0000000040)='./file0\x00', 0x2) 21:24:29 executing program 2: syz_mount_image$gfs2(&(0x7f0000000040)='gfs2\x00', &(0x7f0000001740)='./file0\x00', 0x0, 0x0, &(0x7f0000001680), 0x0, &(0x7f0000000880)=ANY=[@ANYBLOB='l']) 21:24:29 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback={0x0, 0x1}}, 0x1c) listen(r0, 0x4) r1 = accept4(r0, &(0x7f0000000040)=@can, &(0x7f00000000c0)=0x80, 0x0) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) sendto$inet6(r2, &(0x7f0000e33fe0)='X', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback={0x0, 0x1}}, 0x1c) write$binfmt_script(r2, &(0x7f0000000140)=ANY=[@ANYBLOB="cc"], 0x1) shutdown(r2, 0x1) write$binfmt_misc(r1, &(0x7f0000000240)={'syz1'}, 0x34000) 21:24:29 executing program 7: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$hfsplus(&(0x7f0000000040)='hfsplus\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000300), 0x0, &(0x7f0000000380)) 21:24:29 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r0, &(0x7f00004e8000), 0x0, 0x20000004, &(0x7f0000b63fe4)={0xa}, 0x1c) 21:24:29 executing program 0: syz_open_dev$sndseq(&(0x7f0000000000)='/dev/snd/seq\x00', 0x0, 0x0) userfaultfd(0x0) syz_open_dev$mice(&(0x7f0000000100)='/dev/input/mice\x00', 0x0, 0x0) pselect6(0x40, &(0x7f00000abfc0)={0x3ffffd}, &(0x7f0000768000)={0x0, 0x0, 0x6000}, &(0x7f00007fbfc0), &(0x7f0000f22000)={0x0, 0x989680}, &(0x7f0000f14000)={&(0x7f0000553ff8), 0x8}) [ 180.277070] gfs2: invalid mount option: l [ 180.281416] gfs2: can't parse mount arguments [ 180.312288] hfsplus: unable to find HFS+ superblock [ 180.317348] gfs2: invalid mount option: l [ 180.321680] gfs2: can't parse mount arguments 21:24:29 executing program 6: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x0, 0x0, 0x1, &(0x7f00000001c0)) r0 = socket$kcm(0xa, 0x2, 0x0) setsockopt$sock_attach_bpf(r0, 0x1, 0xf, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000340)={&(0x7f0000000100)=@generic={0x0, "cd4a71bb9a4c78b2e0ec56443f79e6dd3d11a1e5a6859a5dfa9b6452a03ae0ca59e082b55c80d8dd0c3488f537d6bf1cbf5bbe3456bc9a8bb7fa412cb74c4829d823b0fdb80b380f853358a933d8a9cc1ccca5653a9005fbb9e2c08b05b323e104a541003ff4207277d5528f51c5eb779336b3c6df938a37c330a9fde59f"}, 0x80, &(0x7f0000000300)}, 0x0) close(0xffffffffffffffff) 21:24:29 executing program 2: syz_mount_image$gfs2(&(0x7f0000000040)='gfs2\a', &(0x7f0000001740)='./file0\x00', 0x0, 0x0, &(0x7f0000001680), 0x0, &(0x7f0000000880)=ANY=[@ANYBLOB='l']) 21:24:29 executing program 7: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$hfsplus(&(0x7f0000000040)='hfsplus\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000300), 0x0, &(0x7f0000000380)) 21:24:29 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000040)="025cc83d6d345f8f660070") r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000100)='/dev/snapshot\x00', 0x20601, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x4, 0x31, 0xffffffffffffffff, 0x0) write$cgroup_pid(r1, &(0x7f0000000080), 0x1) rt_sigaction(0x11, &(0x7f0000000140), &(0x7f0000001780), 0x8, &(0x7f00000017c0)) 21:24:29 executing program 0: syz_open_dev$sndseq(&(0x7f0000000000)='/dev/snd/seq\x00', 0x0, 0x0) userfaultfd(0x0) syz_open_dev$mice(&(0x7f0000000100)='/dev/input/mice\x00', 0x0, 0x0) pselect6(0x40, &(0x7f00000abfc0)={0x3ffffd}, &(0x7f0000768000)={0x0, 0x0, 0x60}, &(0x7f00007fbfc0), &(0x7f0000f22000)={0x0, 0x989680}, &(0x7f0000f14000)={&(0x7f0000553ff8), 0x8}) 21:24:29 executing program 6: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000080)={"00000000000000ff00", 0x2003}) [ 180.466472] hfsplus: unable to find HFS+ superblock 21:24:29 executing program 7: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$hfsplus(&(0x7f0000000040)='hfsplus+', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000300), 0x0, &(0x7f0000000380)) 21:24:29 executing program 0: syz_open_dev$sndseq(&(0x7f0000000000)='/dev/snd/seq\x00', 0x0, 0x0) userfaultfd(0x0) syz_open_dev$mice(&(0x7f0000000100)='/dev/input/mice\x00', 0x0, 0x0) pselect6(0x40, &(0x7f00000abfc0)={0x3ffffd}, &(0x7f0000768000)={0x0, 0x0, 0x1000000000000}, &(0x7f00007fbfc0), &(0x7f0000f22000)={0x0, 0x989680}, &(0x7f0000f14000)={&(0x7f0000553ff8), 0x8}) 21:24:29 executing program 2: syz_mount_image$gfs2(&(0x7f0000000040)="67667332fd", &(0x7f0000001740)='./file0\x00', 0x0, 0x0, &(0x7f0000001680), 0x0, &(0x7f0000000880)=ANY=[@ANYBLOB='l']) 21:24:29 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r1, r1) write$cgroup_pid(r2, &(0x7f0000001740)=ANY=[@ANYBLOB="aa"], 0x1) write$cgroup_pid(r2, &(0x7f0000000040), 0x1) recvmmsg(r0, &(0x7f0000004100)=[{{&(0x7f0000001600)=@in6={0x0, 0x0, 0x0, @ipv4={[], [], @remote}}, 0x80, &(0x7f0000001580)=[{&(0x7f00000002c0)=""/4096}, {&(0x7f0000001340)=""/203}, {&(0x7f0000000140)=""/119}, {&(0x7f0000001440)=""/133}, {&(0x7f0000000000)=""/47}, {&(0x7f0000001500)=""/79}]}}], 0x2a37, 0x2, 0x0) 21:24:35 executing program 1: pause() mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) mount(&(0x7f000000a000)='./file0\x00', &(0x7f0000000440)='./file0\x00', &(0x7f0000000300)='ramfs\x00', 0x0, &(0x7f00000007c0)) mount(&(0x7f0000d04000)='./file0\x00', &(0x7f0000903000)='./file0\x00', &(0x7f0000000480)='bdev\x00', 0x100000, &(0x7f0000000500)) mount(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='.', &(0x7f0000000040)="045b898f73", 0x1004, 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='.', &(0x7f0000000140)='vxfs\x00', 0x3080, &(0x7f0000000200)) mount(&(0x7f00000008c0)='.', &(0x7f0000000080)='.', &(0x7f00000004c0)='devtmpfs\x00', 0x5010, &(0x7f0000000380)) mount(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='.', &(0x7f0000000180)='ubifs\x00', 0x1003, 0x0) mount(&(0x7f0000377ff8)='.', &(0x7f0000187ff8)='.', &(0x7f0000753000)='mslos\x00', 0x5010, &(0x7f00000e7000)) umount2(&(0x7f0000000040)='./file0\x00', 0x2) 21:24:35 executing program 4: prctl$setendian(0x14, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r1, r1) write$cgroup_pid(r2, &(0x7f0000000040), 0x1) recvmmsg(r0, &(0x7f0000004100)=[{{&(0x7f0000001600)=@in6={0x0, 0x0, 0x0, @ipv4={[], [], @remote}}, 0x80, &(0x7f0000001580)=[{&(0x7f00000002c0)=""/4096}, {&(0x7f0000001340)=""/203}, {&(0x7f0000000140)=""/119}, {&(0x7f0000001440)=""/133}, {&(0x7f0000000000)=""/47}, {&(0x7f0000001500)=""/79}]}}], 0x2a37, 0x2, 0x0) 21:24:35 executing program 7: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$hfsplus(&(0x7f0000000040)='hfsplusD', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000300), 0x0, &(0x7f0000000380)) 21:24:35 executing program 6: 21:24:35 executing program 0: syz_open_dev$sndseq(&(0x7f0000000000)='/dev/snd/seq\x00', 0x0, 0x0) userfaultfd(0x0) syz_open_dev$mice(&(0x7f0000000100)='/dev/input/mice\x00', 0x0, 0x0) pselect6(0x40, &(0x7f00000abfc0)={0x3ffffd}, &(0x7f0000768000)={0x0, 0x0, 0x100000000000000}, &(0x7f00007fbfc0), &(0x7f0000f22000)={0x0, 0x989680}, &(0x7f0000f14000)={&(0x7f0000553ff8), 0x8}) 21:24:35 executing program 2: syz_mount_image$gfs2(&(0x7f0000000040)='gfs2\x00', &(0x7f0000001740)='./file0\x00', 0x0, 0x0, &(0x7f0000001680), 0x0, &(0x7f0000000880)=ANY=[@ANYBLOB='l']) 21:24:35 executing program 5: 21:24:35 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback={0x0, 0x1}}, 0x1c) listen(r0, 0x4) r1 = accept4(r0, &(0x7f0000000040)=@can, &(0x7f00000000c0)=0x80, 0x0) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) sendto$inet6(r2, &(0x7f0000e33fe0)='X', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback={0x0, 0x1}}, 0x1c) write$binfmt_script(r2, &(0x7f0000000140)=ANY=[@ANYBLOB="cc"], 0x1) shutdown(r2, 0x1) write$binfmt_misc(r1, &(0x7f0000000240)={'syz1'}, 0x34000) [ 186.430159] gfs2: invalid mount option: l [ 186.434385] gfs2: can't parse mount arguments 21:24:35 executing program 6: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000100)={0x2, 0x4e20, @multicast1=0xe0000001}, 0x10) sendto$inet(r0, &(0x7f0000de1fff), 0xfffffffffffffd43, 0x20008005, &(0x7f0000db4ff0)={0x2, 0x4e20, @loopback=0x7f000001}, 0x10) recvfrom(r0, &(0x7f0000f9cf9b)=""/101, 0x6478c8501c739c9d, 0x120, 0x0, 0x35) 21:24:35 executing program 5: r0 = socket$packet(0x11, 0x2, 0x300) r1 = fcntl$dupfd(r0, 0x0, r0) bind$packet(r1, &(0x7f0000000280)={0x11, 0x5, 0x0, 0x1, 0x0, 0x6, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff]}, 0x14) 21:24:35 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f0000003040)={0x2, 0x0, @rand_addr}, 0x0) 21:24:35 executing program 6: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r1, &(0x7f0000e5b000)={0x2, 0x4e20, @multicast1=0xe0000001}, 0x10) connect$inet(r1, &(0x7f0000ccb000)={0x2, 0x0, @empty=0x700000000000000}, 0x10) listen(r1, 0x0) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20, @empty=0x700000000000000}, 0x10) 21:24:35 executing program 4: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) r1 = dup2(r0, r0) mkdirat(r1, &(0x7f0000000100)='./file0\x00', 0x0) faccessat(r1, &(0x7f0000000000)='./file0\x00', 0x5, 0x0) [ 186.706955] TCP: request_sock_TCP: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. 21:24:35 executing program 4: r0 = mq_open(&(0x7f00000000c0)='-$\x00', 0x82, 0x0, &(0x7f0000000100)) r1 = socket$inet6(0xa, 0x2, 0x0) ioctl(r1, 0x4000008912, &(0x7f0000000100)="295ee1311f16f477671070") ftruncate(r0, 0x0) mq_timedreceive(0xffffffffffffffff, &(0x7f0000000100)=""/214, 0xd6, 0x9, &(0x7f0000000200)={0x0, 0x1c9c380}) setsockopt$inet_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, &(0x7f00000006c0)={@in6={{0xa, 0x4e23, 0x3f, @local={0xfe, 0x80, [], 0xaa}, 0x401}}, 0x0, 0x87a8, 0xfffffffffffffffe, "0f6433406c2cd5fb5dccf596637432a8f0d1f602980df9463c97fabeb3b87fbdf9cd5eb04afdc723de4bcb0ec12f491fc8314ea5841c3ef474097f3eb2fe5779b2b6e42b927d25019cd9e9aee85ae2d6"}, 0xd8) r2 = getpgrp(0x0) r3 = syz_open_procfs(r2, &(0x7f0000000340)="6e65742f6970365f666c6f776c6162656c006ec03114893458edc1c9d8dc4b0d8dae982640d0e6bb51d7ff596e1c92de0eaa319198e91f0a4d43697c2bcd77f017365af160acf33bd66432ebe50c0e8bdaf7fc39feff34ef27a1397193227f4733c145e66536c6c275112520e72b3097843b5cdac480c3b1384ebf592505f88589fcd2d7") openat$full(0xffffffffffffff9c, &(0x7f0000000240)='/dev/full\x00', 0x3ff, 0x0) ptrace(0x4218, r2) r4 = socket$inet6(0xa, 0x2, 0x0) socket$inet6(0xa, 0x1000000000002, 0x0) getpgid(0x0) connect$inet6(r3, &(0x7f0000000040)={0xa, 0x3, 0x0, @ipv4={[], [0xff, 0xff], @rand_addr=0x40}, 0xffffffffffffffff}, 0x1c) mount$9p_fd(0x0, &(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='9p\x00', 0x2002002, &(0x7f0000000640)={'trans=\x00', {}, 0x2c, {'port\x00', 0x3d}, 0x2c, {[], 0x3d}}) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r4, 0x29, 0x20, &(0x7f0000000000)={@mcast1={0xff, 0x1, [], 0x1}, 0x0, 0x0, 0x2, 0x1}, 0x20) ioctl$LOOP_GET_STATUS(0xffffffffffffffff, 0x4c03, &(0x7f0000000500)) connect$netlink(r3, &(0x7f0000000080)=@kern={0x10, 0x0, 0x0, 0x100}, 0xc) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ptmx\x00', 0x2, 0x0) sysfs$1(0x1, &(0x7f00000000c0)='\x00') sendfile(r3, r3, &(0x7f00000002c0)=0x202, 0xd9) geteuid() getgid() syz_open_procfs$namespace(r2, &(0x7f0000000c00)='ns/ipc\x00') 21:24:35 executing program 6: r0 = mq_open(&(0x7f00000000c0)='-$\x00', 0x82, 0x0, &(0x7f0000000100)) r1 = socket$inet6(0xa, 0x2, 0x0) ioctl(r1, 0x4000008912, &(0x7f0000000100)="295ee1311f16f477671070") ftruncate(r0, 0x0) mq_timedreceive(0xffffffffffffffff, &(0x7f0000000100)=""/214, 0xd6, 0x9, &(0x7f0000000200)={0x0, 0x1c9c380}) setsockopt$inet_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, &(0x7f00000006c0)={@in6={{0xa, 0x4e23, 0x3f, @local={0xfe, 0x80, [], 0xaa}, 0x401}}, 0x0, 0x87a8, 0xfffffffffffffffe, "0f6433406c2cd5fb5dccf596637432a8f0d1f602980df9463c97fabeb3b87fbdf9cd5eb04afdc723de4bcb0ec12f491fc8314ea5841c3ef474097f3eb2fe5779b2b6e42b927d25019cd9e9aee85ae2d6"}, 0xd8) r2 = getpgrp(0x0) r3 = syz_open_procfs(r2, &(0x7f0000000340)="6e65742f6970365f666c6f776c6162656c006ec03114893458edc1c9d8dc4b0d8dae982640d0e6bb51d7ff596e1c92de0eaa319198e91f0a4d43697c2bcd77f017365af160acf33bd66432ebe50c0e8bdaf7fc39feff34ef27a1397193227f4733c145e66536c6c275112520e72b3097843b5cdac480c3b1384ebf592505f88589fcd2d7") openat$full(0xffffffffffffff9c, &(0x7f0000000240)='/dev/full\x00', 0x3ff, 0x0) ptrace(0x4218, r2) r4 = socket$inet6(0xa, 0x2, 0x0) ioctl$RTC_RD_TIME(r3, 0x80247009, &(0x7f0000000a00)) r5 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r5, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") getpgid(0x0) preadv(r3, &(0x7f00000009c0)=[{&(0x7f0000000400)=""/248, 0xf8}, {&(0x7f00000007c0)=""/182, 0xb6}, {&(0x7f0000000880)=""/158, 0x9e}, {&(0x7f0000000940)=""/113, 0x71}], 0x4, 0x0) connect$inet6(r3, &(0x7f0000000040)={0xa, 0x3, 0x0, @ipv4={[], [0xff, 0xff], @rand_addr=0x40}, 0xffffffffffffffff}, 0x1c) mount$9p_fd(0x0, &(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='9p\x00', 0x2002002, &(0x7f0000000640)={'trans=\x00', {}, 0x2c, {'port\x00', 0x3d}, 0x2c, {[], 0x3d}}) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r4, 0x29, 0x20, &(0x7f0000000000)={@mcast1={0xff, 0x1, [], 0x1}, 0x0, 0x0, 0x2, 0x1}, 0x20) ioctl$LOOP_GET_STATUS(0xffffffffffffffff, 0x4c03, &(0x7f0000000500)) connect$netlink(r3, &(0x7f0000000080)=@kern={0x10, 0x0, 0x0, 0x100}, 0xc) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ptmx\x00', 0x2, 0x0) sysfs$1(0x1, &(0x7f00000000c0)='\x00') sendfile(r3, r3, &(0x7f00000002c0)=0x202, 0xd9) geteuid() [ 186.781499] gfs2: invalid mount option: l [ 186.785803] gfs2: can't parse mount arguments 21:24:35 executing program 5: r0 = socket$inet6(0xa, 0x80005, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0xfffffffffffffffc, 0x1) write$binfmt_elf32(r1, &(0x7f0000000140)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x38, 0x0, 0x0, 0x1, 0x60, 0x2}, [{}]}, 0x58) 21:24:37 executing program 1: r0 = socket(0xa, 0x1, 0x0) setsockopt$inet6_MCAST_JOIN_GROUP(r0, 0x29, 0x2a, &(0x7f0000000180)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}}}}, 0x88) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x30, &(0x7f0000000440)={0x2, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}}}}, 0x90) 21:24:37 executing program 2: syz_mount_image$gfs2(&(0x7f0000000040)='gfs2\x00', &(0x7f0000001740)='./file0\x00', 0x0, 0x0, &(0x7f0000001680), 0x0, &(0x7f0000000880)=ANY=[@ANYBLOB='l']) 21:24:37 executing program 4: mmap(&(0x7f0000002000/0xc000)=nil, 0x7ffffffff000, 0x0, 0x200030, 0xffffffffffffffff, 0x0) 21:24:37 executing program 6: r0 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet_sctp6_SCTP_AUTH_DELETE_KEY(r0, 0x84, 0x19, &(0x7f00000000c0), 0x8) 21:24:37 executing program 0: syz_open_dev$sndseq(&(0x7f0000000000)='/dev/snd/seq\x00', 0x0, 0x0) userfaultfd(0x0) syz_open_dev$mice(&(0x7f0000000100)='/dev/input/mice\x00', 0x0, 0x0) pselect6(0x40, &(0x7f00000abfc0)={0x3ffffd}, &(0x7f0000768000)={0x0, 0x0, 0x800000000000000}, &(0x7f00007fbfc0), &(0x7f0000f22000)={0x0, 0x989680}, &(0x7f0000f14000)={&(0x7f0000553ff8), 0x8}) 21:24:37 executing program 5: r0 = socket$inet6(0xa, 0x80005, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0xfffffffffffffffc, 0x1) write$binfmt_elf32(r1, &(0x7f0000000140)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x38, 0x0, 0x0, 0x1, 0x60, 0x2}, [{}]}, 0x58) 21:24:37 executing program 7: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$hfsplus(&(0x7f0000000040)='hfsplus\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000300), 0x0, &(0x7f0000000380)) 21:24:37 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback={0x0, 0x1}}, 0x1c) listen(r0, 0x4) r1 = accept4(r0, &(0x7f0000000040)=@can, &(0x7f00000000c0)=0x80, 0x0) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) sendto$inet6(r2, &(0x7f0000e33fe0)='X', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback={0x0, 0x1}}, 0x1c) write$binfmt_script(r2, &(0x7f0000000140)=ANY=[@ANYBLOB="cc"], 0x1) shutdown(r2, 0x1) write$binfmt_misc(r1, &(0x7f0000000240)={'syz1'}, 0x34000) 21:24:37 executing program 4: r0 = socket(0x10, 0x3, 0x0) recvmsg(r0, &(0x7f0000000780)={0x0, 0x0, &(0x7f0000000640), 0x0, &(0x7f0000000700)=""/118, 0x76}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={&(0x7f00000001c0)={0x10}, 0xc, &(0x7f0000000100)={&(0x7f0000000900)=@getroute={0x14, 0x1a, 0x1c974209d04c2781}, 0x14}, 0x1}, 0x0) 21:24:37 executing program 6: bpf$MAP_CREATE(0x0, &(0x7f0000000340)={0x1, 0x8, 0x209e20, 0x8000000001}, 0x2c) bpf$MAP_CREATE(0x2, &(0x7f0000003000)={0x13, 0x0, 0x77fffb, 0x0, 0x730000, 0x0}, 0x2c) 21:24:37 executing program 0: syz_open_dev$sndseq(&(0x7f0000000000)='/dev/snd/seq\x00', 0x0, 0x0) userfaultfd(0x0) syz_open_dev$mice(&(0x7f0000000100)='/dev/input/mice\x00', 0x0, 0x0) pselect6(0x40, &(0x7f00000abfc0)={0x3ffffd}, &(0x7f0000768000)={0x0, 0x0, 0x0, 0x60}, &(0x7f00007fbfc0), &(0x7f0000f22000)={0x0, 0x989680}, &(0x7f0000f14000)={&(0x7f0000553ff8), 0x8}) [ 188.088322] gfs2: invalid mount option: l [ 188.092551] gfs2: can't parse mount arguments [ 188.110119] hfsplus: unable to find HFS+ superblock [ 188.132839] hfsplus: unable to find HFS+ superblock 21:24:37 executing program 7: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$hfsplus(&(0x7f0000000040)='hfsplus\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000300), 0x0, &(0x7f0000000380)) 21:24:37 executing program 5: r0 = socket$inet6(0xa, 0x80005, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0xfffffffffffffffc, 0x1) write$binfmt_elf32(r1, &(0x7f0000000140)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x38, 0x0, 0x0, 0x1, 0x60, 0x2}, [{}]}, 0x58) [ 188.161785] gfs2: invalid mount option: l [ 188.166038] gfs2: can't parse mount arguments 21:24:37 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000000c0)={'lo\x00@\x00', 0x101}) setsockopt$inet_mreqsrc(r0, 0x0, 0x27, &(0x7f0000000040)={@multicast2=0xe0000002, @remote={0xac, 0x14, 0x14, 0xbb}, @remote={0xac, 0x14, 0x14, 0xbb}}, 0xc) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'lo\x00'}) setsockopt$inet_msfilter(r0, 0x0, 0x29, &(0x7f0000000280)={@multicast2=0xe0000002, @loopback=0x7f000001, 0x0, 0x2, [@local={0xac, 0x14, 0x14, 0xaa}, @empty]}, 0x18) r1 = socket(0x10, 0x802, 0x0) sendmmsg$alg(r1, &(0x7f0000001a80)=[{0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f0000000100)="729eddd790b4df74838f87404b560073e64f6e34695cf9cac6d33e2d1348d29f18c73ffcbafd7e14c45458b255201822b06b62690bb36c3f3282ae168a883602d0a9df2b4472b4feb02893c3bcea2af3", 0x50}], 0x1, &(0x7f0000000300)=[@op={0x18, 0x117, 0x3, 0x1}, @iv={0x118, 0x117, 0x2, 0xff, "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"}, @iv={0xd0, 0x117, 0x2, 0xb9, "8c72dc23936f0b8bad00ee56e1d8e7df941bb51cee2497cbd26914044d66cf8713fd341482eb006c34e2dda730545ce7baa911d280280b62a7135298d3805a3f9eca9db801ff90257625cd341f6aad6fa7ebfdc0c6cd50645967fbe88103ae97a8f3e89ef614bb190b3471f16f42f4b20d3ca4afc0df945e3cf5f265df5dac42bcbabd95be31f8750974a68bed6450069b322afeabeca4e660ffc4f549e5b5c20b695793497f8a1e23261146661d23a9db26e0953166b5e118"}, @assoc={0x18, 0x117, 0x4}, @assoc={0x18, 0x117, 0x4, 0x7}, @op={0x18, 0x117, 0x3}, @op={0x18, 0x117, 0x3}], 0x260, 0x800}, {0x0, 0x0, &(0x7f00000017c0)=[{&(0x7f0000000640)="64838c6e8c01ca9a81658105eb43e62b8db94e6bca404ff24b5abd818aee8ab28d398bacaa31761f832a6ceb5bbc389f20c6c7980a8b6a63facc3ba882be1fbc889e7407630e2df171e1b533437ec467fdeb39ef2c97e6b9b3946ac12f7da82be8e1c12a1f10a40f56257d1c6c0d406e7bd2", 0x72}, {&(0x7f00000016c0)="f126c337febde5c2051f5d99f2cedf703c91f0ad2bde40a680aa3e", 0x1b}, {&(0x7f0000001780)='5o', 0x2}], 0x3, &(0x7f0000001840)=[@assoc={0x18, 0x117, 0x4, 0x7}, @assoc={0x18, 0x117, 0x4, 0x7e0b}, @assoc={0x18, 0x117, 0x4, 0x6}, @op={0x18, 0x117, 0x3}, @assoc={0x18, 0x117, 0x4}, @op={0x18, 0x117, 0x3, 0x1}], 0x90, 0x4008080}, {0x0, 0x0, &(0x7f0000001a00)=[{&(0x7f0000001900)="9dd7286c3b49d52f59713d22da486863f1484899274383580438b51cd8967e435e71716e8387c6c5b9eb6bd29d31cd598770e34c53b6003c6d1c8b6bb58d8646ad3d7c8ddbae320ad81166b4cc583dd09acd16adf007aa6f3c248bb2a51e0794ea47f918514aa2ee3c4800702885a145bff28068e3a7eb43b506835e8164e1db4c12720010865debfd5cf9c917a4449141244eb430513b2f43aa5f48ad2b10f62085e3322f07eea134884fb5c84bdcc5fa68e3bc19509af271d2647407d333f556ea2eb4295fa274366777da8dea208f", 0xd0}], 0x1, &(0x7f0000001a40), 0x0, 0x4008084}], 0x3, 0x40) write(r1, &(0x7f0000000080)="220000002100070700be0000090007010a00001e00003c0000ff040405000c008000", 0x22) [ 188.231879] device lo entered promiscuous mode [ 188.237551] device lo left promiscuous mode [ 188.286741] hfsplus: unable to find HFS+ superblock 21:24:37 executing program 7: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$hfsplus(&(0x7f0000000040)='hfsplus\a', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000300), 0x0, &(0x7f0000000380)) 21:24:37 executing program 2: syz_mount_image$gfs2(&(0x7f0000000040)='gfs2\x00', &(0x7f0000001740)='./file0\x00', 0x0, 0x0, &(0x7f0000001680), 0x0, &(0x7f0000000880)=ANY=[@ANYBLOB='l']) 21:24:37 executing program 0: syz_open_dev$sndseq(&(0x7f0000000000)='/dev/snd/seq\x00', 0x0, 0x0) userfaultfd(0x0) syz_open_dev$mice(&(0x7f0000000100)='/dev/input/mice\x00', 0x0, 0x0) pselect6(0x40, &(0x7f00000abfc0)={0x3ffffd}, &(0x7f0000768000)={0x0, 0x0, 0x0, 0x64}, &(0x7f00007fbfc0), &(0x7f0000f22000)={0x0, 0x989680}, &(0x7f0000f14000)={&(0x7f0000553ff8), 0x8}) [ 188.317408] device lo entered promiscuous mode 21:24:37 executing program 5: r0 = socket$inet6(0xa, 0x80005, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0xfffffffffffffffc, 0x1) write$binfmt_elf32(r1, &(0x7f0000000140)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x38, 0x0, 0x0, 0x1, 0x60, 0x2}, [{}]}, 0x58) 21:24:37 executing program 6: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x3, 0x4, 0x4, 0x101}, 0x2c) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000000)={r0, &(0x7f0000000340), &(0x7f0000000440)=""/220}, 0x18) [ 188.436067] gfs2: invalid mount option: l [ 188.440319] gfs2: can't parse mount arguments 21:24:37 executing program 7: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$hfsplus(&(0x7f0000000040)='hfsplus\n', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000300), 0x0, &(0x7f0000000380)) 21:24:37 executing program 0: syz_open_dev$sndseq(&(0x7f0000000000)='/dev/snd/seq\x00', 0x0, 0x0) userfaultfd(0x0) syz_open_dev$mice(&(0x7f0000000100)='/dev/input/mice\x00', 0x0, 0x0) pselect6(0x40, &(0x7f00000abfc0)={0x3ffffd}, &(0x7f0000768000)={0x0, 0x0, 0x0, 0x10}, &(0x7f00007fbfc0), &(0x7f0000f22000)={0x0, 0x989680}, &(0x7f0000f14000)={&(0x7f0000553ff8), 0x8}) [ 188.500430] gfs2: invalid mount option: l [ 188.504709] gfs2: can't parse mount arguments [ 188.513440] device lo left promiscuous mode 21:24:37 executing program 1: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7fffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_dccp(0x2, 0x6, 0x0) setsockopt$IP_VS_SO_SET_TIMEOUT(r0, 0x10d, 0xa, &(0x7f0000000040)={0x3}, 0xc) 21:24:37 executing program 1: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7fffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_dccp(0x2, 0x6, 0x0) setsockopt$IP_VS_SO_SET_TIMEOUT(r0, 0x10d, 0xa, &(0x7f0000000040)={0x3}, 0xc) 21:24:37 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback={0x0, 0x1}}, 0x1c) listen(r0, 0x4) r1 = accept4(r0, &(0x7f0000000040)=@can, &(0x7f00000000c0)=0x80, 0x0) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) sendto$inet6(r2, &(0x7f0000e33fe0)='X', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback={0x0, 0x1}}, 0x1c) write$binfmt_script(r2, &(0x7f0000000140)=ANY=[@ANYBLOB="cc"], 0x1) write$binfmt_misc(r1, &(0x7f0000000240)={'syz1'}, 0x34000) 21:24:37 executing program 4: openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x0, 0x0) 21:24:37 executing program 6: r0 = socket$nl_crypto(0x10, 0x3, 0x15) getsockopt$netlink(r0, 0x10e, 0x9, &(0x7f0000000340)=""/4096, &(0x7f0000000040)=0x1000) 21:24:37 executing program 1: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7fffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_dccp(0x2, 0x6, 0x0) setsockopt$IP_VS_SO_SET_TIMEOUT(r0, 0x10d, 0xa, &(0x7f0000000040)={0x3}, 0xc) 21:24:37 executing program 2: syz_mount_image$gfs2(&(0x7f0000000040)='gfs2\x00', &(0x7f0000001740)='./file0\x00', 0x0, 0x0, &(0x7f0000001680), 0x0, &(0x7f0000000880)=ANY=[@ANYBLOB='l']) 21:24:37 executing program 5: r0 = socket$inet6(0xa, 0x80005, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") write$binfmt_elf32(0xffffffffffffffff, &(0x7f0000000140)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x38, 0x0, 0x0, 0x1, 0x60, 0x2}, [{}]}, 0x58) 21:24:37 executing program 0: syz_open_dev$sndseq(&(0x7f0000000000)='/dev/snd/seq\x00', 0x0, 0x0) userfaultfd(0x0) syz_open_dev$mice(&(0x7f0000000100)='/dev/input/mice\x00', 0x0, 0x0) pselect6(0x40, &(0x7f00000abfc0)={0x3ffffd}, &(0x7f0000768000)={0x0, 0x0, 0x0, 0x1600000000000000}, &(0x7f00007fbfc0), &(0x7f0000f22000)={0x0, 0x989680}, &(0x7f0000f14000)={&(0x7f0000553ff8), 0x8}) 21:24:37 executing program 7: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$hfsplus(&(0x7f0000000040)="686673706c757303", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000300), 0x0, &(0x7f0000000380)) 21:24:38 executing program 1: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7fffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_dccp(0x2, 0x6, 0x0) setsockopt$IP_VS_SO_SET_TIMEOUT(r0, 0x10d, 0xa, &(0x7f0000000040)={0x3}, 0xc) 21:24:38 executing program 1: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7fffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$IP_VS_SO_SET_TIMEOUT(0xffffffffffffffff, 0x10d, 0xa, &(0x7f0000000040)={0x3}, 0xc) [ 188.952658] gfs2: invalid mount option: l [ 188.957007] gfs2: can't parse mount arguments 21:24:38 executing program 1: r0 = socket$inet_dccp(0x2, 0x6, 0x0) setsockopt$IP_VS_SO_SET_TIMEOUT(r0, 0x10d, 0xa, &(0x7f0000000040)={0x3}, 0xc) 21:24:38 executing program 1: r0 = socket$inet_dccp(0x2, 0x6, 0x0) setsockopt$IP_VS_SO_SET_TIMEOUT(0xffffffffffffffff, 0x10d, 0xa, &(0x7f0000000040)={0x3}, 0xc) 21:24:38 executing program 1: r0 = socket$inet_dccp(0x2, 0x6, 0x0) setsockopt$IP_VS_SO_SET_TIMEOUT(r0, 0x10d, 0xa, &(0x7f0000000040), 0xc) 21:24:38 executing program 1: r0 = socket$inet_dccp(0x2, 0x6, 0x0) setsockopt$IP_VS_SO_SET_TIMEOUT(r0, 0x10d, 0xa, &(0x7f0000000040), 0xc) 21:24:38 executing program 1: r0 = socket$inet_dccp(0x2, 0x6, 0x0) setsockopt$IP_VS_SO_SET_TIMEOUT(r0, 0x10d, 0xa, &(0x7f0000000040), 0xc) 21:24:38 executing program 0: syz_open_dev$sndseq(&(0x7f0000000000)='/dev/snd/seq\x00', 0x0, 0x0) userfaultfd(0x0) syz_open_dev$mice(&(0x7f0000000100)='/dev/input/mice\x00', 0x0, 0x0) pselect6(0x40, &(0x7f00000abfc0)={0x3ffffd}, &(0x7f0000768000)={0x0, 0x0, 0x0, 0x100000000000000}, &(0x7f00007fbfc0), &(0x7f0000f22000)={0x0, 0x989680}, &(0x7f0000f14000)={&(0x7f0000553ff8), 0x8}) [ 189.061497] gfs2: invalid mount option: l [ 189.065883] gfs2: can't parse mount arguments 21:24:38 executing program 5: socket$inet6(0xa, 0x80005, 0x0) r0 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0xfffffffffffffffc, 0x1) write$binfmt_elf32(r0, &(0x7f0000000140)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x38, 0x0, 0x0, 0x1, 0x60, 0x2}, [{}]}, 0x58) 21:24:38 executing program 6: r0 = memfd_create(&(0x7f0000000080)='}\x00', 0x0) mmap(&(0x7f0000002000/0xc000)=nil, 0xc000, 0x0, 0xd0, r0, 0x0) 21:24:38 executing program 1: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x3, 0x4, 0x4, 0x101}, 0x2c) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000000)={r0, &(0x7f0000000340), &(0x7f0000000140)=""/220}, 0x3) 21:24:38 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback={0x0, 0x1}}, 0x1c) listen(r0, 0x4) r1 = accept4(r0, &(0x7f0000000040)=@can, &(0x7f00000000c0)=0x80, 0x0) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) sendto$inet6(r2, &(0x7f0000e33fe0)='X', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback={0x0, 0x1}}, 0x1c) write$binfmt_script(r2, &(0x7f0000000140)=ANY=[@ANYBLOB="cc"], 0x1) write$binfmt_misc(r1, &(0x7f0000000240)={'syz1'}, 0x34000) 21:24:38 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x3, 0x4, 0x4, 0x101}, 0x2c) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000000c0)={r0, 0x28, &(0x7f0000000080)}, 0x10) 21:24:38 executing program 7: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$hfsplus(&(0x7f0000000040)='hfsplusH', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000300), 0x0, &(0x7f0000000380)) 21:24:38 executing program 2: syz_mount_image$gfs2(&(0x7f0000000040)='gfs2\x00', &(0x7f0000001740)='./file0\x00', 0x0, 0x0, &(0x7f0000001680), 0x0, &(0x7f0000000880)=ANY=[@ANYBLOB='l']) 21:24:38 executing program 0: syz_open_dev$sndseq(&(0x7f0000000000)='/dev/snd/seq\x00', 0x0, 0x0) userfaultfd(0x0) syz_open_dev$mice(&(0x7f0000000100)='/dev/input/mice\x00', 0x0, 0x0) pselect6(0x40, &(0x7f00000abfc0)={0x3ffffd}, &(0x7f0000768000)={0x0, 0x0, 0x0, 0x60000000}, &(0x7f00007fbfc0), &(0x7f0000f22000)={0x0, 0x989680}, &(0x7f0000f14000)={&(0x7f0000553ff8), 0x8}) 21:24:38 executing program 1: r0 = socket$nl_crypto(0x10, 0x3, 0x15) getsockopt$netlink(r0, 0x10e, 0x5, &(0x7f0000000340)=""/4096, &(0x7f0000000040)=0x1000) 21:24:38 executing program 1: r0 = socket$nl_crypto(0x10, 0x3, 0x15) getsockopt$netlink(r0, 0x10e, 0x5, &(0x7f0000000340)=""/4096, &(0x7f0000000040)=0x1000) 21:24:38 executing program 1: r0 = socket$nl_crypto(0x10, 0x3, 0x15) getsockopt$netlink(r0, 0x10e, 0x5, &(0x7f0000000340)=""/4096, &(0x7f0000000040)=0x1000) 21:24:38 executing program 1: r0 = socket$nl_crypto(0x10, 0x3, 0x15) getsockopt$netlink(r0, 0x10e, 0x5, &(0x7f0000000340)=""/4096, &(0x7f0000000040)=0x1000) 21:24:38 executing program 1: getsockopt$netlink(0xffffffffffffffff, 0x10e, 0x5, &(0x7f0000000340)=""/4096, &(0x7f0000000040)=0x1000) 21:24:38 executing program 1: r0 = socket$nl_crypto(0x10, 0x3, 0x15) getsockopt$netlink(0xffffffffffffffff, 0x10e, 0x5, &(0x7f0000000340)=""/4096, &(0x7f0000000040)=0x1000) [ 189.802242] gfs2: invalid mount option: l [ 189.806599] gfs2: can't parse mount arguments 21:24:38 executing program 6: 21:24:38 executing program 1: r0 = socket$nl_crypto(0x10, 0x3, 0x15) getsockopt$netlink(r0, 0x10e, 0x0, &(0x7f0000000340)=""/4096, &(0x7f0000000040)=0x1000) 21:24:38 executing program 5: socket$inet6(0xa, 0x80005, 0x0) r0 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0xfffffffffffffffc, 0x1) write$binfmt_elf32(r0, &(0x7f0000000140)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x38, 0x0, 0x0, 0x1, 0x60, 0x2}, [{}]}, 0x58) 21:24:38 executing program 1: 21:24:38 executing program 4: [ 189.923392] gfs2: invalid mount option: l [ 189.927646] gfs2: can't parse mount arguments 21:24:39 executing program 6: 21:24:39 executing program 0: syz_open_dev$sndseq(&(0x7f0000000000)='/dev/snd/seq\x00', 0x0, 0x0) userfaultfd(0x0) syz_open_dev$mice(&(0x7f0000000100)='/dev/input/mice\x00', 0x0, 0x0) pselect6(0x40, &(0x7f00000abfc0)={0x3ffffd}, &(0x7f0000768000)={0x0, 0x0, 0x0, 0x16}, &(0x7f00007fbfc0), &(0x7f0000f22000)={0x0, 0x989680}, &(0x7f0000f14000)={&(0x7f0000553ff8), 0x8}) 21:24:39 executing program 1: 21:24:39 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback={0x0, 0x1}}, 0x1c) listen(r0, 0x4) r1 = accept4(r0, &(0x7f0000000040)=@can, &(0x7f00000000c0)=0x80, 0x0) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) sendto$inet6(r2, &(0x7f0000e33fe0)='X', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback={0x0, 0x1}}, 0x1c) write$binfmt_script(r2, &(0x7f0000000140)=ANY=[@ANYBLOB="cc"], 0x1) write$binfmt_misc(r1, &(0x7f0000000240)={'syz1'}, 0x34000) 21:24:39 executing program 7: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$hfsplus(&(0x7f0000000040)='hfsplus\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000300), 0x0, &(0x7f0000000380)) 21:24:39 executing program 2: syz_mount_image$gfs2(&(0x7f0000000040)="67667332ff", &(0x7f0000001740)='./file0\x00', 0x0, 0x0, &(0x7f0000001680), 0x0, &(0x7f0000000880)=ANY=[@ANYBLOB='l']) 21:24:39 executing program 4: 21:24:39 executing program 5: socket$inet6(0xa, 0x80005, 0x0) r0 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0xfffffffffffffffc, 0x1) write$binfmt_elf32(r0, &(0x7f0000000140)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x38, 0x0, 0x0, 0x1, 0x60, 0x2}, [{}]}, 0x58) 21:24:39 executing program 1: 21:24:39 executing program 1: 21:24:39 executing program 1: 21:24:39 executing program 1: 21:24:39 executing program 1: 21:24:39 executing program 1: [ 190.809744] hfsplus: unable to find HFS+ superblock 21:24:39 executing program 6: 21:24:39 executing program 4: 21:24:39 executing program 1: 21:24:39 executing program 0: syz_open_dev$sndseq(&(0x7f0000000000)='/dev/snd/seq\x00', 0x0, 0x0) userfaultfd(0x0) syz_open_dev$mice(&(0x7f0000000100)='/dev/input/mice\x00', 0x0, 0x0) pselect6(0x40, &(0x7f00000abfc0)={0x3ffffd}, &(0x7f0000768000)={0x0, 0x0, 0x0, 0x8}, &(0x7f00007fbfc0), &(0x7f0000f22000)={0x0, 0x989680}, &(0x7f0000f14000)={&(0x7f0000553ff8), 0x8}) 21:24:39 executing program 1: 21:24:40 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback={0x0, 0x1}}, 0x1c) listen(r0, 0x4) r1 = accept4(r0, &(0x7f0000000040)=@can, &(0x7f00000000c0)=0x80, 0x0) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) sendto$inet6(r2, &(0x7f0000e33fe0)='X', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback={0x0, 0x1}}, 0x1c) shutdown(r2, 0x1) write$binfmt_misc(r1, &(0x7f0000000240)={'syz1'}, 0x34000) 21:24:40 executing program 5: ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r0 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0xfffffffffffffffc, 0x1) write$binfmt_elf32(r0, &(0x7f0000000140)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x38, 0x0, 0x0, 0x1, 0x60, 0x2}, [{}]}, 0x58) 21:24:40 executing program 2: syz_mount_image$gfs2(&(0x7f0000000040)='gfs2\x00', &(0x7f0000001740)='./file0\x00', 0x0, 0x0, &(0x7f0000001680), 0x0, &(0x7f0000000880)=ANY=[@ANYBLOB='l']) 21:24:40 executing program 1: 21:24:40 executing program 6: 21:24:40 executing program 7: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$hfsplus(&(0x7f0000000040)='hfsplus\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000300), 0x0, &(0x7f0000000380)) 21:24:40 executing program 4: 21:24:40 executing program 0: syz_open_dev$sndseq(&(0x7f0000000000)='/dev/snd/seq\x00', 0x0, 0x0) userfaultfd(0x0) syz_open_dev$mice(&(0x7f0000000100)='/dev/input/mice\x00', 0x0, 0x0) pselect6(0x40, &(0x7f00000abfc0)={0x3ffffd}, &(0x7f0000768000)={0x0, 0x0, 0x0, 0x16000000}, &(0x7f00007fbfc0), &(0x7f0000f22000)={0x0, 0x989680}, &(0x7f0000f14000)={&(0x7f0000553ff8), 0x8}) 21:24:40 executing program 1: 21:24:40 executing program 1: 21:24:40 executing program 1: 21:24:40 executing program 1: 21:24:40 executing program 1: 21:24:40 executing program 4: syz_emit_ethernet(0x1, &(0x7f0000000100)=ANY=[@ANYBLOB="0180c20000008c274bd4d60908060001080006040001aaaaaaaaaa00ac1414aaaaaaaaaaaaaaffffffff"], &(0x7f0000000040)) 21:24:40 executing program 1: [ 191.746859] gfs2: invalid mount option: l [ 191.751103] gfs2: can't parse mount arguments [ 191.776307] hfsplus: unable to find HFS+ superblock 21:24:40 executing program 5: ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r0 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0xfffffffffffffffc, 0x1) write$binfmt_elf32(r0, &(0x7f0000000140)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x38, 0x0, 0x0, 0x1, 0x60, 0x2}, [{}]}, 0x58) [ 191.859359] gfs2: invalid mount option: l [ 191.863745] gfs2: can't parse mount arguments 21:24:41 executing program 0: syz_open_dev$sndseq(&(0x7f0000000000)='/dev/snd/seq\x00', 0x0, 0x0) userfaultfd(0x0) syz_open_dev$mice(&(0x7f0000000100)='/dev/input/mice\x00', 0x0, 0x0) pselect6(0x40, &(0x7f00000abfc0)={0x3ffffd}, &(0x7f0000768000)={0x0, 0x0, 0x0, 0x8000000}, &(0x7f00007fbfc0), &(0x7f0000f22000)={0x0, 0x989680}, &(0x7f0000f14000)={&(0x7f0000553ff8), 0x8}) 21:24:41 executing program 6: 21:24:41 executing program 1: 21:24:41 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback={0x0, 0x1}}, 0x1c) listen(r0, 0x4) r1 = accept4(r0, &(0x7f0000000040)=@can, &(0x7f00000000c0)=0x80, 0x0) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) sendto$inet6(r2, &(0x7f0000e33fe0)='X', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback={0x0, 0x1}}, 0x1c) shutdown(r2, 0x1) write$binfmt_misc(r1, &(0x7f0000000240)={'syz1'}, 0x34000) 21:24:41 executing program 7: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$hfsplus(&(0x7f0000000040)='hfsplus\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000300), 0x0, &(0x7f0000000380)) 21:24:41 executing program 2: syz_mount_image$gfs2(&(0x7f0000000040)='gfs2\x00', &(0x7f0000001740)='./file0\x00', 0x0, 0x0, &(0x7f0000001680), 0x0, &(0x7f0000000880)=ANY=[@ANYBLOB='l']) 21:24:41 executing program 4: 21:24:41 executing program 5: ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r0 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0xfffffffffffffffc, 0x1) write$binfmt_elf32(r0, &(0x7f0000000140)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x38, 0x0, 0x0, 0x1, 0x60, 0x2}, [{}]}, 0x58) 21:24:41 executing program 1: 21:24:41 executing program 1: 21:24:41 executing program 6: 21:24:41 executing program 1: 21:24:41 executing program 1: 21:24:41 executing program 1: 21:24:41 executing program 1: [ 192.725577] gfs2: invalid mount option: l [ 192.729804] gfs2: can't parse mount arguments [ 192.739920] hfsplus: unable to find HFS+ superblock 21:24:41 executing program 1: 21:24:41 executing program 0: syz_open_dev$sndseq(&(0x7f0000000000)='/dev/snd/seq\x00', 0x0, 0x0) userfaultfd(0x0) syz_open_dev$mice(&(0x7f0000000100)='/dev/input/mice\x00', 0x0, 0x0) pselect6(0x40, &(0x7f00000abfc0)={0x3ffffd}, &(0x7f0000768000)={0x0, 0x0, 0x0, 0x6400}, &(0x7f00007fbfc0), &(0x7f0000f22000)={0x0, 0x989680}, &(0x7f0000f14000)={&(0x7f0000553ff8), 0x8}) 21:24:41 executing program 4: 21:24:41 executing program 1: [ 192.827694] gfs2: invalid mount option: l [ 192.831925] gfs2: can't parse mount arguments 21:24:42 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback={0x0, 0x1}}, 0x1c) listen(r0, 0x4) r1 = accept4(r0, &(0x7f0000000040)=@can, &(0x7f00000000c0)=0x80, 0x0) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) sendto$inet6(r2, &(0x7f0000e33fe0)='X', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback={0x0, 0x1}}, 0x1c) shutdown(r2, 0x1) write$binfmt_misc(r1, &(0x7f0000000240)={'syz1'}, 0x34000) 21:24:42 executing program 1: 21:24:42 executing program 7: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$hfsplus(&(0x7f0000000040)='hfsplus\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000300), 0x0, &(0x7f0000000380)) 21:24:42 executing program 6: 21:24:42 executing program 5: r0 = socket$inet6(0xa, 0x0, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0xfffffffffffffffc, 0x1) write$binfmt_elf32(r1, &(0x7f0000000140)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x38, 0x0, 0x0, 0x1, 0x60, 0x2}, [{}]}, 0x58) 21:24:42 executing program 2: syz_mount_image$gfs2(&(0x7f0000000040)='gfs2\x00', &(0x7f0000001740)='./file0\x00', 0x0, 0x0, &(0x7f0000001680), 0x0, &(0x7f0000000880)=ANY=[@ANYBLOB='l']) 21:24:42 executing program 4: 21:24:42 executing program 0: syz_open_dev$sndseq(&(0x7f0000000000)='/dev/snd/seq\x00', 0x0, 0x0) userfaultfd(0x0) syz_open_dev$mice(&(0x7f0000000100)='/dev/input/mice\x00', 0x0, 0x0) pselect6(0x40, &(0x7f00000abfc0)={0x3ffffd}, &(0x7f0000768000)={0x0, 0x0, 0x0, 0x6000000000000000}, &(0x7f00007fbfc0), &(0x7f0000f22000)={0x0, 0x989680}, &(0x7f0000f14000)={&(0x7f0000553ff8), 0x8}) 21:24:42 executing program 1: 21:24:42 executing program 1: 21:24:42 executing program 1: 21:24:42 executing program 4: 21:24:42 executing program 1: 21:24:42 executing program 6: [ 193.632526] gfs2: invalid mount option: l [ 193.636798] gfs2: can't parse mount arguments 21:24:42 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000001680)="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", 0x0, 0x0) r2 = dup3(r0, r1, 0x0) write$P9_RXATTRWALK(r2, &(0x7f0000000080)={0xf, 0x1f}, 0xf) 21:24:42 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000001680)="2f007e574d000330809022cfde26555dc9ecfe1974406edad38364782d63b6612854b9e49dbdcaef718197e37e870a308b1e3a798fa788a46d3025ef933e51828ab675064e2adbe9126423b4a73d68fbe99c6db2f160c69cb6cce76c27289a4f9d197354aaa5860d2383df87526baa184d90bb7729366417bc33d765e9bc2f882a13f3a9c1f60660bd4fd2fa31d2c0a775242289bce062d10d24ded5406918a66b2c75c43fe1ff458ae5cd9fec63039ba5a7b66a60ede5ccdabc7ee77660ef2358ccdff02226021384b0c235f114ed9ade92767aecc256acdeb610df42e7169f240357f735ae5fe29017e51e27252f48b95bfbbb3a865535298bdc36d71db635f41c57771db77aeaff883feb3dc3cc24bd3c036e396ad3af37945058839e812270bc40901fa654e7cc3292a82fc80c374dc07142a1c2e9d3e2528e4fdac32bcaefe910ebd3b948a3bfebef5fa8d82473c7fbf3ec763a1b613dd747d529ea70ef0298fff5661630b99a79ec8269af9be178aeca17fafb14fd3d6c99aee41d684f5d4200975a999d79ba894dbae4c1a6ef5f1e35af57d82878226d07e63a3f45967e0ee859bb6e0f3c66e68c445208bb32bb2342148aa3f413ea981dcf59c27323f4945e325ba0e69e436e55436a9324f5a458c5acb601104cf2fc7adc67a0662f5499dc4f72fd4d8f4f68ad5da52ed8c929f751f28d9d63fa34b35d4fcfe8c548eb35e3a1d08c077e7d7ea61e716e", 0x0, 0x0) r2 = dup3(r0, r1, 0x0) write$P9_RXATTRWALK(r2, &(0x7f0000000080)={0xf, 0x1f}, 0xf) [ 193.684359] hfsplus: unable to find HFS+ superblock [ 193.731472] gfs2: invalid mount option: l [ 193.735758] gfs2: can't parse mount arguments 21:24:43 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback={0x0, 0x1}}, 0x1c) listen(r0, 0x4) r1 = accept4(r0, &(0x7f0000000040)=@can, &(0x7f00000000c0)=0x80, 0x0) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) write$binfmt_script(r2, &(0x7f0000000140)=ANY=[@ANYBLOB="cc"], 0x1) shutdown(r2, 0x1) write$binfmt_misc(r1, &(0x7f0000000240)={'syz1'}, 0x34000) 21:24:43 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000001680)="2f007e574d000330809022cfde26555dc9ecfe1974406edad38364782d63b6612854b9e49dbdcaef718197e37e870a308b1e3a798fa788a46d3025ef933e51828ab675064e2adbe9126423b4a73d68fbe99c6db2f160c69cb6cce76c27289a4f9d197354aaa5860d2383df87526baa184d90bb7729366417bc33d765e9bc2f882a13f3a9c1f60660bd4fd2fa31d2c0a775242289bce062d10d24ded5406918a66b2c75c43fe1ff458ae5cd9fec63039ba5a7b66a60ede5ccdabc7ee77660ef2358ccdff02226021384b0c235f114ed9ade92767aecc256acdeb610df42e7169f240357f735ae5fe29017e51e27252f48b95bfbbb3a865535298bdc36d71db635f41c57771db77aeaff883feb3dc3cc24bd3c036e396ad3af37945058839e812270bc40901fa654e7cc3292a82fc80c374dc07142a1c2e9d3e2528e4fdac32bcaefe910ebd3b948a3bfebef5fa8d82473c7fbf3ec763a1b613dd747d529ea70ef0298fff5661630b99a79ec8269af9be178aeca17fafb14fd3d6c99aee41d684f5d4200975a999d79ba894dbae4c1a6ef5f1e35af57d82878226d07e63a3f45967e0ee859bb6e0f3c66e68c445208bb32bb2342148aa3f413ea981dcf59c27323f4945e325ba0e69e436e55436a9324f5a458c5acb601104cf2fc7adc67a0662f5499dc4f72fd4d8f4f68ad5da52ed8c929f751f28d9d63fa34b35d4fcfe8c548eb35e3a1d08c077e7d7ea61e716e", 0x0, 0x0) dup3(r0, r1, 0x0) write$P9_RREAD(r1, &(0x7f0000000300)={0xb, 0x75}, 0xb) 21:24:43 executing program 7: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$hfsplus(&(0x7f0000000040)='hfsplus\f', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000300), 0x0, &(0x7f0000000380)) 21:24:43 executing program 0: syz_open_dev$sndseq(&(0x7f0000000000)='/dev/snd/seq\x00', 0x0, 0x0) userfaultfd(0x0) syz_open_dev$mice(&(0x7f0000000100)='/dev/input/mice\x00', 0x0, 0x0) pselect6(0x40, &(0x7f00000abfc0)={0x3ffffd}, &(0x7f0000768000)={0x0, 0x0, 0x0, 0x1600}, &(0x7f00007fbfc0), &(0x7f0000f22000)={0x0, 0x989680}, &(0x7f0000f14000)={&(0x7f0000553ff8), 0x8}) 21:24:43 executing program 4: creat(&(0x7f0000000080)='./file0\x00', 0x0) faccessat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x500) 21:24:43 executing program 2: syz_mount_image$gfs2(&(0x7f0000000040)="67667332ff", &(0x7f0000001740)='./file0\x00', 0x0, 0x0, &(0x7f0000001680), 0x0, &(0x7f0000000880)=ANY=[@ANYBLOB='l']) 21:24:43 executing program 5: r0 = socket$inet6(0xa, 0x0, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0xfffffffffffffffc, 0x1) write$binfmt_elf32(r1, &(0x7f0000000140)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x38, 0x0, 0x0, 0x1, 0x60, 0x2}, [{}]}, 0x58) 21:24:43 executing program 6: creat(&(0x7f0000000040)='./file0\x00', 0x0) faccessat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x800) 21:24:43 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x48fd17b23d612ff9, 0x0) write$P9_RLERROR(r0, &(0x7f0000000080)=ANY=[], 0x0) 21:24:43 executing program 1: creat(&(0x7f0000000040)='./file0\x00', 0x108) faccessat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x20000008000005, 0x0) 21:24:43 executing program 1: r0 = open(&(0x7f00000000c0)='./file0\x00', 0x40c2, 0x0) write(r0, &(0x7f0000000400)="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", 0x200) sendfile(r0, r0, &(0x7f0000002000), 0x0) setxattr(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)=@known='user.syz\x00', &(0x7f0000000080)='\x00', 0x1, 0x3) 21:24:43 executing program 0: syz_open_dev$sndseq(&(0x7f0000000000)='/dev/snd/seq\x00', 0x0, 0x0) userfaultfd(0x0) syz_open_dev$mice(&(0x7f0000000100)='/dev/input/mice\x00', 0x0, 0x0) pselect6(0x40, &(0x7f00000abfc0)={0x3ffffd}, &(0x7f0000768000)={0x0, 0x0, 0x0, 0x6000}, &(0x7f00007fbfc0), &(0x7f0000f22000)={0x0, 0x989680}, &(0x7f0000f14000)={&(0x7f0000553ff8), 0x8}) 21:24:43 executing program 1: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) getdents(r0, &(0x7f0000000300)=""/33, 0x21) getdents(r0, &(0x7f0000000340)=""/199, 0xffffffffffffffc0) 21:24:43 executing program 1: r0 = socket$inet(0x2, 0x3, 0xff) sendto$inet(r0, &(0x7f0000000080)="9d9e4efd9c8d2598e490a221197c5da9c97535c4f54dcda5e22065dd0d76d85b2c2d80f018fb2a95fd272a211c679cec02109be8", 0x34, 0x0, &(0x7f0000000000)={0x2}, 0x10) 21:24:43 executing program 6: unshare(0x40000000) r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000140)={'lo\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000000)={&(0x7f0000000040)={0x10}, 0xc, &(0x7f00000056c0)={&(0x7f0000000080)=@setlink={0x34, 0x13, 0x403, 0x0, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_IFNAME={0x14, 0x3, 'veth1\x00'}]}, 0x34}, 0x1}, 0x0) 21:24:43 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x1d) bind$netlink(r0, &(0x7f0000000040)={0x10}, 0xc) [ 194.703959] IPVS: ftp: loaded support on port[0] = 21 [ 194.777051] veth1: renamed from lo [ 194.792046] IPVS: ftp: loaded support on port[0] = 21 [ 194.818943] veth1: renamed from lo 21:24:44 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback={0x0, 0x1}}, 0x1c) listen(r0, 0x4) r1 = accept4(r0, &(0x7f0000000040)=@can, &(0x7f00000000c0)=0x80, 0x0) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) write$binfmt_script(r2, &(0x7f0000000140)=ANY=[@ANYBLOB="cc"], 0x1) shutdown(r2, 0x1) write$binfmt_misc(r1, &(0x7f0000000240)={'syz1'}, 0x34000) 21:24:44 executing program 4: creat(&(0x7f0000000040)='./file0\x00', 0x108) faccessat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x1, 0x400000000000fff) 21:24:44 executing program 0: syz_open_dev$sndseq(&(0x7f0000000000)='/dev/snd/seq\x00', 0x0, 0x0) userfaultfd(0x0) syz_open_dev$mice(&(0x7f0000000100)='/dev/input/mice\x00', 0x0, 0x0) pselect6(0x40, &(0x7f00000abfc0)={0x3ffffd}, &(0x7f0000768000)={0x0, 0x0, 0x0, 0x800000000000000}, &(0x7f00007fbfc0), &(0x7f0000f22000)={0x0, 0x989680}, &(0x7f0000f14000)={&(0x7f0000553ff8), 0x8}) 21:24:44 executing program 7: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$hfsplus(&(0x7f0000000040)='hfsplus\x00', &(0x7f0000000080)='./file0\x00', 0xedc0, 0x0, &(0x7f0000000300), 0x0, &(0x7f0000000380)) 21:24:44 executing program 2: syz_mount_image$gfs2(&(0x7f0000000040)='gfs2\x00', &(0x7f0000001740)='./file0\x00', 0x0, 0x0, &(0x7f0000001680), 0x0, &(0x7f0000000880)=ANY=[@ANYBLOB='l']) 21:24:44 executing program 5: r0 = socket$inet6(0xa, 0x0, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0xfffffffffffffffc, 0x1) write$binfmt_elf32(r1, &(0x7f0000000140)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x38, 0x0, 0x0, 0x1, 0x60, 0x2}, [{}]}, 0x58) 21:24:44 executing program 1: creat(&(0x7f0000000040)='./file0\x00', 0x108) faccessat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x20000008020005, 0x1000) 21:24:44 executing program 6: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RREMOVE(r0, &(0x7f0000000000)={0x1, 0x7b}, 0x7) 21:24:44 executing program 1: r0 = openat$random(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x40001, 0x0) write$P9_RLERROR(r0, &(0x7f0000000100)={0x1a, 0x7, 0x0, {0xfffffdf2, 'posix_acl_access^'}}, 0x1a) 21:24:44 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x48fd17b23d612ff9, 0x0) write$P9_ROPEN(r0, &(0x7f0000000080)={0x18, 0x71}, 0x18) 21:24:44 executing program 1: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x5, 0x7e, 0x1, 0x4}, 0x2c) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000000)={r0, &(0x7f00000000c0)}, 0x10) 21:24:44 executing program 1: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000140)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000000)='tasks\x00', 0x2, 0x0) write$cgroup_pid(r1, &(0x7f0000000040), 0x12) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.net/syz0\x00', 0x1ff) 21:24:44 executing program 1: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x5, 0x7e, 0x1, 0x4}, 0x2c) bpf$MAP_LOOKUP_ELEM(0x2, &(0x7f0000000240)={r0, &(0x7f0000000100), &(0x7f0000000180)=""/162}, 0x18) 21:24:44 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000deb000)={0x2, 0x4e23, @broadcast=0xffffffff}, 0x10) sendto$inet(r0, &(0x7f0000000140), 0x0, 0x200007ff, &(0x7f0000deaff0)={0x2, 0x4e23}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000280)={{{@in6=@dev={0xfe, 0x80}, @in6, 0x0, 0x2, 0x4e23, 0x5, 0x2, 0x80, 0x80}, {0x7ff, 0x9, 0x2, 0xffffffffffffffc1, 0x0, 0xffff, 0x4, 0x7b37}, {0xb6, 0xfffffffffffffffe, 0x4, 0xba8}, 0x401, 0x0, 0x1, 0x1, 0x0, 0x3}, {{@in6=@remote={0xfe, 0x80, [], 0xbb}, 0x4d6, 0x32}, 0x0, @in6=@ipv4={[], [0xff, 0xff], @broadcast=0xffffffff}, 0x3507, 0x1, 0x0, 0x400, 0x200, 0x6, 0x8}}, 0xe8) shutdown(r0, 0x1) 21:24:44 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f00000002c0)="2f65786500000000000489004bddd9de91be10eebf000ee91e18f0c76fbb232a07424ae1e901d2da75af1f0200f5ab26d7e071fb35331ce39c5a0000") fchown(r0, 0x0, 0x0) [ 195.388093] gfs2: invalid mount option: l [ 195.392392] gfs2: can't parse mount arguments [ 195.406092] hfsplus: unable to find HFS+ superblock 21:24:44 executing program 6: add_key(&(0x7f00000000c0)='syzkaller\x00', &(0x7f0000000100)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xffffffffffffffff) exit(0x0) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x0, 0x0) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x2800, 0x0) r1 = semget(0x2, 0x0, 0x0) clock_gettime(0x0, &(0x7f0000000180)={0x0}) semtimedop(r1, &(0x7f0000000140), 0x0, &(0x7f00000001c0)={r2}) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x0, 0x0) write$P9_RLOCK(0xffffffffffffffff, &(0x7f0000000080)={0x8, 0x35}, 0x8) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) getpid() ptrace$pokeuser(0x6, 0x0, 0x0, 0x0) [ 195.460902] gfs2: invalid mount option: l [ 195.465392] gfs2: can't parse mount arguments 21:24:45 executing program 0: syz_open_dev$sndseq(&(0x7f0000000000)='/dev/snd/seq\x00', 0x0, 0x0) userfaultfd(0x0) syz_open_dev$mice(&(0x7f0000000100)='/dev/input/mice\x00', 0x0, 0x0) pselect6(0x40, &(0x7f00000abfc0)={0x3ffffd}, &(0x7f0000768000)={0x0, 0x0, 0x0, 0x6400000000000000}, &(0x7f00007fbfc0), &(0x7f0000f22000)={0x0, 0x989680}, &(0x7f0000f14000)={&(0x7f0000553ff8), 0x8}) 21:24:45 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback={0x0, 0x1}}, 0x1c) listen(r0, 0x4) r1 = accept4(r0, &(0x7f0000000040)=@can, &(0x7f00000000c0)=0x80, 0x0) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) write$binfmt_script(r2, &(0x7f0000000140)=ANY=[@ANYBLOB="cc"], 0x1) shutdown(r2, 0x1) write$binfmt_misc(r1, &(0x7f0000000240)={'syz1'}, 0x34000) 21:24:45 executing program 1: r0 = syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x82) r1 = memfd_create(&(0x7f00000000c0)='nodev\x00', 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) ioctl$LOOP_SET_STATUS64(r0, 0x1277, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "e1d3f877e5eae453e55d7d64d00d4901baed21f7de92a8669b38ccd6260857dbf5ae46354569636517b50f805ae208258dbb7d0abe8d208f0f1bcc885c8ba93c", "fe047b3177f4fc2eb04172daa8e7d1c4c4cf144a23173b6605afb988de9bbae0932dee7e07195d78f7ddd19a37cb5aa0a5629eef628582fba5bf4af44acfe059", "ee42e3ef1d1772a9432c220303b70b708ad791139c2982fccc5d747a3131995a"}) 21:24:45 executing program 7: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$hfsplus(&(0x7f0000000040)='hfsplus\x00', &(0x7f0000000080)='./file0\x00', 0xa00, 0x0, &(0x7f0000000300), 0x0, &(0x7f0000000380)) 21:24:45 executing program 5: r0 = socket$inet6(0xa, 0x80005, 0x0) ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0xfffffffffffffffc, 0x1) write$binfmt_elf32(r1, &(0x7f0000000140)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x38, 0x0, 0x0, 0x1, 0x60, 0x2}, [{}]}, 0x58) 21:24:45 executing program 2: syz_mount_image$gfs2(&(0x7f0000000040)='gfs2\x00', &(0x7f0000001740)='./file0\x00', 0x0, 0x0, &(0x7f0000001680), 0x0, &(0x7f0000000880)=ANY=[@ANYBLOB='l']) 21:24:45 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) syz_genetlink_get_family_id$fou(&(0x7f00000001c0)='fou\x00') 21:24:45 executing program 1: 21:24:45 executing program 1: 21:24:45 executing program 5: r0 = socket$inet6(0xa, 0x80005, 0x0) ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0xfffffffffffffffc, 0x1) write$binfmt_elf32(r1, &(0x7f0000000140)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x38, 0x0, 0x0, 0x1, 0x60, 0x2}, [{}]}, 0x58) [ 196.160872] gfs2: invalid mount option: l [ 196.165241] gfs2: can't parse mount arguments 21:24:45 executing program 4: 21:24:45 executing program 1: 21:24:45 executing program 1: 21:24:45 executing program 1: [ 196.224414] hfsplus: unable to find HFS+ superblock [ 196.230634] gfs2: invalid mount option: l [ 196.234851] gfs2: can't parse mount arguments 21:24:45 executing program 1: pipe(&(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup2(r0, 0xffffffffffffffff) pipe(&(0x7f0000000000)) write(r1, &(0x7f0000000100), 0x0) 21:24:45 executing program 0: syz_open_dev$sndseq(&(0x7f0000000000)='/dev/snd/seq\x00', 0x0, 0x0) userfaultfd(0x0) syz_open_dev$mice(&(0x7f0000000100)='/dev/input/mice\x00', 0x0, 0x0) pselect6(0x40, &(0x7f00000abfc0)={0x3ffffd}, &(0x7f0000768000)={0x0, 0x0, 0x0, 0x1000000000000000}, &(0x7f00007fbfc0), &(0x7f0000f22000)={0x0, 0x989680}, &(0x7f0000f14000)={&(0x7f0000553ff8), 0x8}) 21:24:45 executing program 6: 21:24:46 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback={0x0, 0x1}}, 0x1c) listen(r0, 0x4) r1 = accept4(r0, &(0x7f0000000040)=@can, &(0x7f00000000c0)=0x80, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000e33fe0)='X', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback={0x0, 0x1}}, 0x1c) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYBLOB="cc"], 0x1) shutdown(0xffffffffffffffff, 0x1) write$binfmt_misc(r1, &(0x7f0000000240)={'syz1'}, 0x34000) 21:24:46 executing program 1: dup3(0xffffffffffffff9c, 0xffffffffffffffff, 0x0) 21:24:46 executing program 2: syz_mount_image$gfs2(&(0x7f0000000040)="67667332ff", &(0x7f0000001740)='./file0\x00', 0x0, 0x0, &(0x7f0000001680), 0x0, &(0x7f0000000880)=ANY=[@ANYBLOB='l']) 21:24:46 executing program 4: 21:24:46 executing program 7: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$hfsplus(&(0x7f0000000040)='hfsplus\x00', &(0x7f0000000080)='./file0\x00', 0x4000, 0x0, &(0x7f0000000300), 0x0, &(0x7f0000000380)) 21:24:46 executing program 5: r0 = socket$inet6(0xa, 0x80005, 0x0) ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0xfffffffffffffffc, 0x1) write$binfmt_elf32(r1, &(0x7f0000000140)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x38, 0x0, 0x0, 0x1, 0x60, 0x2}, [{}]}, 0x58) 21:24:46 executing program 6: 21:24:46 executing program 0: syz_open_dev$sndseq(&(0x7f0000000000)='/dev/snd/seq\x00', 0x0, 0x0) userfaultfd(0x0) syz_open_dev$mice(&(0x7f0000000100)='/dev/input/mice\x00', 0x0, 0x0) pselect6(0x40, &(0x7f00000abfc0)={0x3ffffd}, &(0x7f0000768000)={0x0, 0x0, 0x0, 0x1000000000000}, &(0x7f00007fbfc0), &(0x7f0000f22000)={0x0, 0x989680}, &(0x7f0000f14000)={&(0x7f0000553ff8), 0x8}) 21:24:46 executing program 1: 21:24:46 executing program 1: 21:24:46 executing program 1: 21:24:46 executing program 6: 21:24:46 executing program 1: 21:24:46 executing program 1: 21:24:46 executing program 5: r0 = socket$inet6(0xa, 0x80005, 0x0) ioctl(r0, 0x0, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0xfffffffffffffffc, 0x1) write$binfmt_elf32(r1, &(0x7f0000000140)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x38, 0x0, 0x0, 0x1, 0x60, 0x2}, [{}]}, 0x58) 21:24:46 executing program 1: [ 197.104107] hfsplus: unable to find HFS+ superblock 21:24:47 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback={0x0, 0x1}}, 0x1c) listen(r0, 0x4) r1 = accept4(r0, &(0x7f0000000040)=@can, &(0x7f00000000c0)=0x80, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000e33fe0)='X', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback={0x0, 0x1}}, 0x1c) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYBLOB="cc"], 0x1) shutdown(0xffffffffffffffff, 0x1) write$binfmt_misc(r1, &(0x7f0000000240)={'syz1'}, 0x34000) 21:24:47 executing program 4: 21:24:47 executing program 1: 21:24:47 executing program 0: syz_open_dev$sndseq(&(0x7f0000000000)='/dev/snd/seq\x00', 0x0, 0x0) userfaultfd(0x0) syz_open_dev$mice(&(0x7f0000000100)='/dev/input/mice\x00', 0x0, 0x0) pselect6(0x40, &(0x7f00000abfc0)={0x3ffffd}, &(0x7f0000768000)={0x0, 0x0, 0x0, 0x10000000}, &(0x7f00007fbfc0), &(0x7f0000f22000)={0x0, 0x989680}, &(0x7f0000f14000)={&(0x7f0000553ff8), 0x8}) 21:24:47 executing program 1: 21:24:47 executing program 7: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$hfsplus(&(0x7f0000000040)='hfsplus\x00', &(0x7f0000000080)='./file0\x00', 0x5354, 0x0, &(0x7f0000000300), 0x0, &(0x7f0000000380)) 21:24:47 executing program 1: 21:24:47 executing program 2: syz_mount_image$gfs2(&(0x7f0000000040)='gfs2\x00', &(0x7f0000001740)='./file0\x00', 0x0, 0x0, &(0x7f0000001680), 0x0, &(0x7f0000000880)=ANY=[@ANYBLOB='l']) 21:24:47 executing program 6: 21:24:47 executing program 5: r0 = socket$inet6(0xa, 0x80005, 0x0) ioctl(r0, 0x0, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0xfffffffffffffffc, 0x1) write$binfmt_elf32(r1, &(0x7f0000000140)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x38, 0x0, 0x0, 0x1, 0x60, 0x2}, [{}]}, 0x58) 21:24:47 executing program 1: 21:24:47 executing program 1: 21:24:47 executing program 4: 21:24:47 executing program 1: [ 198.088380] gfs2: invalid mount option: l [ 198.092640] gfs2: can't parse mount arguments [ 198.111994] hfsplus: unable to find HFS+ superblock 21:24:47 executing program 1: 21:24:47 executing program 4: [ 198.146779] gfs2: invalid mount option: l [ 198.151090] gfs2: can't parse mount arguments [ 198.160074] hfsplus: unable to find HFS+ superblock 21:24:48 executing program 5: r0 = socket$inet6(0xa, 0x80005, 0x0) ioctl(r0, 0x0, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0xfffffffffffffffc, 0x1) write$binfmt_elf32(r1, &(0x7f0000000140)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x38, 0x0, 0x0, 0x1, 0x60, 0x2}, [{}]}, 0x58) 21:24:48 executing program 1: 21:24:48 executing program 6: 21:24:48 executing program 7: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$hfsplus(&(0x7f0000000040)='hfsplus\x00', &(0x7f0000000080)='./file0\x00', 0x6c0c, 0x0, &(0x7f0000000300), 0x0, &(0x7f0000000380)) 21:24:48 executing program 0: syz_open_dev$sndseq(&(0x7f0000000000)='/dev/snd/seq\x00', 0x0, 0x0) userfaultfd(0x0) syz_open_dev$mice(&(0x7f0000000100)='/dev/input/mice\x00', 0x0, 0x0) pselect6(0x40, &(0x7f00000abfc0)={0x3ffffd}, &(0x7f0000768000)={0x0, 0x0, 0x0, 0x1000000}, &(0x7f00007fbfc0), &(0x7f0000f22000)={0x0, 0x989680}, &(0x7f0000f14000)={&(0x7f0000553ff8), 0x8}) 21:24:48 executing program 2: syz_mount_image$gfs2(&(0x7f0000000040)='gfs2\x00', &(0x7f0000001740)='./file0\x00', 0x0, 0x0, &(0x7f0000001680), 0x0, &(0x7f0000000880)=ANY=[@ANYBLOB='l']) 21:24:48 executing program 4: 21:24:48 executing program 1: 21:24:48 executing program 1: 21:24:48 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback={0x0, 0x1}}, 0x1c) listen(r0, 0x4) r1 = accept4(r0, &(0x7f0000000040)=@can, &(0x7f00000000c0)=0x80, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000e33fe0)='X', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback={0x0, 0x1}}, 0x1c) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYBLOB="cc"], 0x1) shutdown(0xffffffffffffffff, 0x1) write$binfmt_misc(r1, &(0x7f0000000240)={'syz1'}, 0x34000) 21:24:48 executing program 1: 21:24:48 executing program 1: 21:24:48 executing program 1: 21:24:48 executing program 4: 21:24:48 executing program 6: 21:24:48 executing program 1: 21:24:48 executing program 5: r0 = socket$inet6(0xa, 0x80005, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)) r1 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0xfffffffffffffffc, 0x1) write$binfmt_elf32(r1, &(0x7f0000000140)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x38, 0x0, 0x0, 0x1, 0x60, 0x2}, [{}]}, 0x58) [ 199.029782] gfs2: invalid mount option: l [ 199.034042] gfs2: can't parse mount arguments [ 199.048811] hfsplus: unable to find HFS+ superblock 21:24:48 executing program 1: openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0xc40, 0x0) 21:24:48 executing program 1: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.net\x00', 0x200002, 0x0) fchdir(r0) r1 = open(&(0x7f0000ae8ff8)='./file0\x00', 0x14104a, 0x0) write$evdev(r1, &(0x7f0000037fe8)=[{}], 0x18) sendfile(r1, r1, &(0x7f0000000200), 0x80003ffd) creat(&(0x7f00000000c0)='./file0\x00', 0x0) add_key(&(0x7f0000000100)='cifs.spnego\x00', &(0x7f0000000140)={0x73, 0x79, 0x7a, 0x0}, 0x0, 0x0, 0xfffffffffffffffe) add_key$keyring(&(0x7f0000000180)='keyring\x00', &(0x7f00000001c0)={0x73, 0x79, 0x7a, 0x3}, 0x0, 0x0, 0xfffffffffffffff9) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000000c0)={0x0, @loopback, @local}, &(0x7f0000000200)=0xc) request_key(&(0x7f0000000040)='.dead\x00', &(0x7f0000000240)={0x73, 0x79, 0x7a}, &(0x7f0000000080)=')\x00', 0x0) 21:24:48 executing program 7: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$hfsplus(&(0x7f0000000040)='hfsplus\x00', &(0x7f0000000080)='./file0\x00', 0xffffffffffffffff, 0x0, &(0x7f0000000300), 0x0, &(0x7f0000000380)) 21:24:48 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_SIOCGIFCONF(r0, 0x8910, &(0x7f0000000040)=@req={0x20, &(0x7f0000000000)={'veth0_to_bond\x00', @ifru_hwaddr=@broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff]}}) [ 199.140974] gfs2: invalid mount option: l [ 199.145307] gfs2: can't parse mount arguments 21:24:48 executing program 2: syz_mount_image$gfs2(&(0x7f0000000040)="6766733202", &(0x7f0000001740)='./file0\x00', 0x0, 0x0, &(0x7f0000001680), 0x0, &(0x7f0000000880)=ANY=[@ANYBLOB='l']) 21:24:48 executing program 0: syz_open_dev$sndseq(&(0x7f0000000000)='/dev/snd/seq\x00', 0x0, 0x0) userfaultfd(0x0) syz_open_dev$mice(&(0x7f0000000100)='/dev/input/mice\x00', 0x0, 0x0) pselect6(0x40, &(0x7f00000abfc0)={0x3ffffd}, &(0x7f0000768000)={0x0, 0x0, 0x0, 0x64000000}, &(0x7f00007fbfc0), &(0x7f0000f22000)={0x0, 0x989680}, &(0x7f0000f14000)={&(0x7f0000553ff8), 0x8}) 21:24:48 executing program 6: unshare(0x24020400) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000100)='/dev/snapshot\x00', 0x0, 0x0) unshare(0x28020400) 21:24:48 executing program 1: r0 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x11, r0, 0x0) mremap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0x2000, 0x3, &(0x7f000000a000/0x2000)=nil) [ 199.285307] hfsplus: unable to find HFS+ superblock 21:24:48 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback={0x0, 0x1}}, 0x1c) listen(r0, 0x4) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) sendto$inet6(r1, &(0x7f0000e33fe0)='X', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback={0x0, 0x1}}, 0x1c) write$binfmt_script(r1, &(0x7f0000000140)=ANY=[@ANYBLOB="cc"], 0x1) shutdown(r1, 0x1) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000240)={'syz1'}, 0x34000) 21:24:48 executing program 5: r0 = socket$inet6(0xa, 0x80005, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)) r1 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0xfffffffffffffffc, 0x1) write$binfmt_elf32(r1, &(0x7f0000000140)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x38, 0x0, 0x0, 0x1, 0x60, 0x2}, [{}]}, 0x58) 21:24:48 executing program 4: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000001c0)='./cgroup.cpu\x00', 0x200002, 0x0) fcntl$dupfd(r0, 0x0, r0) 21:24:48 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$SG_GET_LOW_DMA(r0, 0x227a, &(0x7f0000000000)) 21:24:49 executing program 7: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$hfsplus(&(0x7f0000000040)='hfsplus\x00', &(0x7f0000000080)='./file0\x00', 0x4, 0x0, &(0x7f0000000300), 0x0, &(0x7f0000000380)) 21:24:49 executing program 0: syz_open_dev$sndseq(&(0x7f0000000000)='/dev/snd/seq\x00', 0x0, 0x0) userfaultfd(0x0) syz_open_dev$mice(&(0x7f0000000100)='/dev/input/mice\x00', 0x0, 0x0) pselect6(0x40, &(0x7f00000abfc0)={0x3ffffd}, &(0x7f0000768000)={0x0, 0x0, 0x0, 0x0, 0x16}, &(0x7f00007fbfc0), &(0x7f0000f22000)={0x0, 0x989680}, &(0x7f0000f14000)={&(0x7f0000553ff8), 0x8}) 21:24:49 executing program 6: r0 = socket$inet6_udp(0xa, 0x2, 0x0) fcntl$getflags(r0, 0xb) 21:24:49 executing program 2: syz_mount_image$gfs2(&(0x7f0000000040)='gfs2\x00', &(0x7f0000001740)='./file0\x00', 0x0, 0x0, &(0x7f0000001680), 0x0, &(0x7f0000000880)=ANY=[@ANYBLOB='l']) 21:24:49 executing program 1: migrate_pages(0x0, 0x3, &(0x7f00000001c0), &(0x7f0000000200)=0x7fffffff) 21:24:49 executing program 1: socket$inet6(0xa, 0x0, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) fchdir(r0) r1 = creat(&(0x7f00000001c0)='./file1\x00', 0x0) fallocate(r1, 0x0, 0x0, 0x80003ff) creat(&(0x7f0000000080)='./file1\x00', 0x0) 21:24:49 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000040)="2f65786500000000000035abe1e80d903e0d717ac1889a45e581c9e14a5c8f95f5d2968ae8c767e9d18fd69a") r1 = socket$inet6(0xa, 0x1000000000001, 0x0) ioctl(r1, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, &(0x7f00000000c0)={0x81}, 0x14) ioctl$fiemap(r0, 0x40086602, &(0x7f00000000c0)=ANY=[]) 21:24:49 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback={0x0, 0x1}}, 0x1c) r1 = accept4(r0, &(0x7f0000000040)=@can, &(0x7f00000000c0)=0x80, 0x0) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) sendto$inet6(r2, &(0x7f0000e33fe0)='X', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback={0x0, 0x1}}, 0x1c) write$binfmt_script(r2, &(0x7f0000000140)=ANY=[@ANYBLOB="cc"], 0x1) shutdown(r2, 0x1) write$binfmt_misc(r1, &(0x7f0000000240)={'syz1'}, 0x34000) [ 200.013236] gfs2: invalid mount option: l [ 200.017569] gfs2: can't parse mount arguments [ 200.043235] gfs2: invalid mount option: l [ 200.047619] gfs2: can't parse mount arguments [ 200.053527] hfsplus: unable to find HFS+ superblock 21:24:49 executing program 6: prctl$seccomp(0x16, 0x2, &(0x7f0000000140)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0xfffffffffffffff9}]}) accept4$packet(0xffffffffffffffff, &(0x7f0000000340), &(0x7f0000000380)=0x14, 0x0) 21:24:49 executing program 5: r0 = socket$inet6(0xa, 0x80005, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)) r1 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0xfffffffffffffffc, 0x1) write$binfmt_elf32(r1, &(0x7f0000000140)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x38, 0x0, 0x0, 0x1, 0x60, 0x2}, [{}]}, 0x58) 21:24:49 executing program 2: syz_mount_image$gfs2(&(0x7f0000000040)="6766733210", &(0x7f0000001740)='./file0\x00', 0x0, 0x0, &(0x7f0000001680), 0x0, &(0x7f0000000880)=ANY=[@ANYBLOB='l']) 21:24:49 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000001680)="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", 0x0, 0x0) r2 = dup3(r0, r1, 0x0) write$P9_RGETLOCK(r2, &(0x7f0000000280)=ANY=[], 0x0) 21:24:49 executing program 1: semctl$IPC_SET(0x0, 0x0, 0x1, &(0x7f00000004c0)) 21:24:49 executing program 0: syz_open_dev$sndseq(&(0x7f0000000000)='/dev/snd/seq\x00', 0x0, 0x0) userfaultfd(0x0) syz_open_dev$mice(&(0x7f0000000100)='/dev/input/mice\x00', 0x0, 0x0) pselect6(0x40, &(0x7f00000abfc0)={0x3ffffd}, &(0x7f0000768000)={0x0, 0x0, 0x0, 0x0, 0x100000000000000}, &(0x7f00007fbfc0), &(0x7f0000f22000)={0x0, 0x989680}, &(0x7f0000f14000)={&(0x7f0000553ff8), 0x8}) 21:24:49 executing program 1: syz_open_procfs(0x0, &(0x7f0000000540)='net/fib_trie\x00') 21:24:49 executing program 1: syz_extract_tcp_res$synack(&(0x7f00000000c0), 0x1, 0x0) 21:24:49 executing program 7: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$hfsplus(&(0x7f0000000040)='hfsplus\x00', &(0x7f0000000080)='./file0\x00', 0x23000000, 0x0, &(0x7f0000000300), 0x0, &(0x7f0000000380)) 21:24:49 executing program 4: perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$IP_VS_SO_GET_DAEMON(r0, 0x0, 0x487, &(0x7f0000000040), &(0x7f0000000300)=0x30) 21:24:49 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f00000002c0)="2f65786500000000000489004bddd9de91be10eebf000ee91e18f0c76fbb232a07424ae1e901d2da75af1f0200f5ab26d7e071fb35331ce39c5a0000") fchmod(r0, 0x0) 21:24:49 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) listen(r0, 0x4) r1 = accept4(r0, &(0x7f0000000040)=@can, &(0x7f00000000c0)=0x80, 0x0) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) sendto$inet6(r2, &(0x7f0000e33fe0)='X', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback={0x0, 0x1}}, 0x1c) write$binfmt_script(r2, &(0x7f0000000140)=ANY=[@ANYBLOB="cc"], 0x1) shutdown(r2, 0x1) write$binfmt_misc(r1, &(0x7f0000000240)={'syz1'}, 0x34000) 21:24:49 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f00000002c0)="2f65786500000000000489004bddd9de91be10eebf000ee91e18f0c76fbb232a07424ae1e901d2da75af1f0200f5ab26d7e071fb35331ce39c5a0000") fchmod(r0, 0x0) 21:24:49 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x5402, &(0x7f0000000080)={0x0, 0x0, 0x10000}) 21:24:49 executing program 1: r0 = socket$inet6(0xa, 0x0, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) fchdir(r1) r2 = creat(&(0x7f00000001c0)='./file1\x00', 0x0) ioctl$FS_IOC_FSSETXATTR(r1, 0x401c5820, &(0x7f0000000040)={0x6, 0x3, 0xa, 0x52db, 0x1}) fallocate(r2, 0x0, 0x0, 0x80003ff) 21:24:49 executing program 5: r0 = socket$inet6(0xa, 0x80005, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d34") r1 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0xfffffffffffffffc, 0x1) write$binfmt_elf32(r1, &(0x7f0000000140)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x38, 0x0, 0x0, 0x1, 0x60, 0x2}, [{}]}, 0x58) [ 200.371932] hfsplus: unable to find HFS+ superblock [ 200.431142] audit: type=1326 audit(200.410:3): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=16547 comm="syz-executor6" exe="/root/syz-executor6" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455e29 code=0xffff0000 [ 200.490235] hfsplus: unable to find HFS+ superblock 21:24:50 executing program 6: getrusage(0xfffffffffffffffd, &(0x7f0000000500)) 21:24:50 executing program 4: request_key(&(0x7f00000001c0)='dns_resolver\x00', &(0x7f0000000200)={0x73, 0x79, 0x7a}, &(0x7f0000000240)='keyring\x00', 0x0) 21:24:50 executing program 2: syz_mount_image$gfs2(&(0x7f0000000040)='gfs2\x00', &(0x7f0000001740)='./file0\x00', 0x0, 0x0, &(0x7f0000001680), 0x0, &(0x7f0000000880)=ANY=[@ANYBLOB='l']) 21:24:50 executing program 0: syz_open_dev$sndseq(&(0x7f0000000000)='/dev/snd/seq\x00', 0x0, 0x0) userfaultfd(0x0) syz_open_dev$mice(&(0x7f0000000100)='/dev/input/mice\x00', 0x0, 0x0) pselect6(0x40, &(0x7f00000abfc0)={0x3ffffd}, &(0x7f0000768000)={0x0, 0x0, 0x0, 0x0, 0x1000000000000000}, &(0x7f00007fbfc0), &(0x7f0000f22000)={0x0, 0x989680}, &(0x7f0000f14000)={&(0x7f0000553ff8), 0x8}) 21:24:50 executing program 5: r0 = socket$inet6(0xa, 0x80005, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d34") r1 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0xfffffffffffffffc, 0x1) write$binfmt_elf32(r1, &(0x7f0000000140)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x38, 0x0, 0x0, 0x1, 0x60, 0x2}, [{}]}, 0x58) 21:24:50 executing program 1: request_key(&(0x7f0000000100)='id_legacy\x00', &(0x7f00000000c0)={0x73, 0x79, 0x7a}, &(0x7f0000000080)='%:[vboxnet1${,em1dm1.\x00', 0x0) 21:24:50 executing program 7: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$hfsplus(&(0x7f0000000040)='hfsplus\x00', &(0x7f0000000080)='./file0\x00', 0x900000000000000, 0x0, &(0x7f0000000300), 0x0, &(0x7f0000000380)) 21:24:50 executing program 1: r0 = socket$inet6(0xa, 0x0, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) fchdir(r1) r2 = creat(&(0x7f00000001c0)='./file1\x00', 0x0) ioctl$FS_IOC_FSSETXATTR(r1, 0x401c5820, &(0x7f0000000040)={0x6, 0x3, 0xa, 0x52db, 0x1}) fallocate(r2, 0x0, 0x0, 0x80003ff) [ 201.025755] audit: type=1326 audit(201.024:4): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=16547 comm="syz-executor6" exe="/root/syz-executor6" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455e29 code=0xffff0000 21:24:50 executing program 5: r0 = socket$inet6(0xa, 0x80005, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d34") r1 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0xfffffffffffffffc, 0x1) write$binfmt_elf32(r1, &(0x7f0000000140)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x38, 0x0, 0x0, 0x1, 0x60, 0x2}, [{}]}, 0x58) 21:24:50 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f00000002c0)="2f65786500000000000489004bddd9de91be10eebf000ee91e18f0c76fbb232a07424ae1e901d2da75af1f0200f5ab26d7e071fb35331ce39c5a0000") flistxattr(r0, &(0x7f0000000100)=""/5, 0xc6) [ 201.110385] hfsplus: unable to find HFS+ superblock [ 201.119287] gfs2: invalid mount option: l [ 201.123604] gfs2: can't parse mount arguments 21:24:50 executing program 0: syz_open_dev$sndseq(&(0x7f0000000000)='/dev/snd/seq\x00', 0x0, 0x0) userfaultfd(0x0) syz_open_dev$mice(&(0x7f0000000100)='/dev/input/mice\x00', 0x0, 0x0) pselect6(0x40, &(0x7f00000abfc0)={0x3ffffd}, &(0x7f0000768000)={0x0, 0x0, 0x0, 0x0, 0x16000000}, &(0x7f00007fbfc0), &(0x7f0000f22000)={0x0, 0x989680}, &(0x7f0000f14000)={&(0x7f0000553ff8), 0x8}) [ 201.199701] gfs2: invalid mount option: l [ 201.203961] gfs2: can't parse mount arguments 21:24:50 executing program 7: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$hfsplus(&(0x7f0000000040)='hfsplus\x00', &(0x7f0000000080)='./file0\x00', 0xf6ffffff00000000, 0x0, &(0x7f0000000300), 0x0, &(0x7f0000000380)) 21:24:50 executing program 4: perf_event_open(&(0x7f0000940000)={0x2, 0x78, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_COUNTERS(r0, 0x0, 0x81, &(0x7f0000000080)={'broute\x00', 0x0, 0x0, 0x0, [], 0x1, &(0x7f0000000040), 0x0, [{}]}, 0x88) openat(0xffffffffffffffff, &(0x7f0000000140)='./file0\x00', 0x0, 0x0) write$P9_ROPEN(0xffffffffffffffff, &(0x7f0000000180)={0x18, 0x71}, 0x18) 21:24:50 executing program 6: perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) set_mempolicy(0x3, &(0x7f00000003c0)=0x405, 0x9) 21:24:50 executing program 1: r0 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffc) r1 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f00000000c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, r0) keyctl$describe(0x6, r1, &(0x7f0000000100)=""/70, 0x46) 21:24:50 executing program 3: bind$inet6(0xffffffffffffffff, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback={0x0, 0x1}}, 0x1c) listen(0xffffffffffffffff, 0x4) r0 = accept4(0xffffffffffffffff, &(0x7f0000000040)=@can, &(0x7f00000000c0)=0x80, 0x0) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) sendto$inet6(r1, &(0x7f0000e33fe0)='X', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback={0x0, 0x1}}, 0x1c) write$binfmt_script(r1, &(0x7f0000000140)=ANY=[@ANYBLOB="cc"], 0x1) shutdown(r1, 0x1) write$binfmt_misc(r0, &(0x7f0000000240)={'syz1'}, 0x34000) 21:24:50 executing program 2: syz_mount_image$gfs2(&(0x7f0000000040)='gfs2\x00', &(0x7f0000001740)='./file0\x00', 0x0, 0x0, &(0x7f0000001680), 0x0, &(0x7f0000000880)=ANY=[@ANYBLOB='l']) 21:24:50 executing program 5: r0 = socket$inet6(0xa, 0x80005, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f76") r1 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0xfffffffffffffffc, 0x1) write$binfmt_elf32(r1, &(0x7f0000000140)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x38, 0x0, 0x0, 0x1, 0x60, 0x2}, [{}]}, 0x58) 21:24:50 executing program 1: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000200)) r0 = socket$netlink(0x10, 0x3, 0x4) writev(r0, &(0x7f00000000c0)=[{&(0x7f0000000140)="480000001400197f09004b0101048c590188ff3f67614e495b1e2e1f72161affcf5d6f9fafab2a40e10520613057fff7e07900defeff0000e5ed5e00000000c855000000000000ac", 0x48}], 0x1) 21:24:50 executing program 1: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000200)) r0 = socket$netlink(0x10, 0x3, 0x4) writev(r0, &(0x7f00000000c0)=[{&(0x7f0000000140)="480000001400197f09004b0101048c590188ff3f67614e495b1e2e1f72161affcf5d6f9fafab2a40e10520613057fff7e07900defeff0000e5ed5e00000000c855000000000000ac", 0x48}], 0x1) 21:24:50 executing program 1: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000200)) r0 = socket$netlink(0x10, 0x3, 0x4) writev(r0, &(0x7f00000000c0)=[{&(0x7f0000000140)="480000001400197f09004b0101048c590188ff3f67614e495b1e2e1f72161affcf5d6f9fafab2a40e10520613057fff7e07900defeff0000e5ed5e00000000c855000000000000ac", 0x48}], 0x1) [ 201.330877] hfsplus: unable to find HFS+ superblock 21:24:50 executing program 0: syz_open_dev$sndseq(&(0x7f0000000000)='/dev/snd/seq\x00', 0x0, 0x0) userfaultfd(0x0) syz_open_dev$mice(&(0x7f0000000100)='/dev/input/mice\x00', 0x0, 0x0) pselect6(0x40, &(0x7f00000abfc0)={0x3ffffd}, &(0x7f0000768000)={0x0, 0x0, 0x0, 0x0, 0x1000000}, &(0x7f00007fbfc0), &(0x7f0000f22000)={0x0, 0x989680}, &(0x7f0000f14000)={&(0x7f0000553ff8), 0x8}) 21:24:50 executing program 1: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000200)) r0 = socket$netlink(0x10, 0x3, 0x4) writev(r0, &(0x7f00000000c0)=[{&(0x7f0000000140)="480000001400197f09004b0101048c590188ff3f67614e495b1e2e1f72161affcf5d6f9fafab2a40e10520613057fff7e07900defeff0000e5ed5e00000000c855000000000000ac", 0x48}], 0x1) [ 201.357735] kernel msg: ebtables bug: please report to author: Wrong nr of counters 21:24:50 executing program 1: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000200)) writev(0xffffffffffffffff, &(0x7f00000000c0)=[{&(0x7f0000000140)="480000001400197f09004b0101048c590188ff3f67614e495b1e2e1f72161affcf5d6f9fafab2a40e10520613057fff7e07900defeff0000e5ed5e00000000c855000000000000ac", 0x48}], 0x1) 21:24:50 executing program 6: perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) alarm(0x0) 21:24:50 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x4) writev(r0, &(0x7f00000000c0)=[{&(0x7f0000000140)="480000001400197f09004b0101048c590188ff3f67614e495b1e2e1f72161affcf5d6f9fafab2a40e10520613057fff7e07900defeff0000e5ed5e00000000c855000000000000ac", 0x48}], 0x1) 21:24:50 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f00000000c0)=[{&(0x7f0000000140)="480000001400197f09004b0101048c590188ff3f67614e495b1e2e1f72161affcf5d6f9fafab2a40e10520613057fff7e07900defeff0000e5ed5e00000000c855000000000000ac", 0x48}], 0x1) 21:24:50 executing program 3: r0 = socket$inet6(0xa, 0x0, 0x8010000000000084) bind$inet6(r0, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback={0x0, 0x1}}, 0x1c) listen(r0, 0x4) r1 = accept4(r0, &(0x7f0000000040)=@can, &(0x7f00000000c0)=0x80, 0x0) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) sendto$inet6(r2, &(0x7f0000e33fe0)='X', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback={0x0, 0x1}}, 0x1c) write$binfmt_script(r2, &(0x7f0000000140)=ANY=[@ANYBLOB="cc"], 0x1) shutdown(r2, 0x1) write$binfmt_misc(r1, &(0x7f0000000240)={'syz1'}, 0x34000) [ 201.405900] kernel msg: ebtables bug: please report to author: Wrong nr of counters [ 201.442994] gfs2: invalid mount option: l [ 201.447288] gfs2: can't parse mount arguments [ 201.490302] hfsplus: unable to find HFS+ superblock [ 201.510077] gfs2: invalid mount option: l [ 201.514333] gfs2: can't parse mount arguments 21:24:50 executing program 7: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$hfsplus(&(0x7f0000000040)='hfsplus\x00', &(0x7f0000000080)='./file0\x00', 0x300000000000000, 0x0, &(0x7f0000000300), 0x0, &(0x7f0000000380)) 21:24:50 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f00000000c0)=[{&(0x7f0000000140)="480000001400197f09004b0101048c590188ff3f67614e495b1e2e1f72161affcf5d6f9fafab2a40e10520613057fff7e07900defeff0000e5ed5e00000000c855000000000000ac", 0x48}], 0x1) 21:24:50 executing program 6: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000140)='/dev/uinput\x00', 0x0, 0x0) ioctl$TIOCGLCKTRMIOS(r0, 0x400c55cb, &(0x7f0000000080)) 21:24:50 executing program 5: r0 = socket$inet6(0xa, 0x80005, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f76") r1 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0xfffffffffffffffc, 0x1) write$binfmt_elf32(r1, &(0x7f0000000140)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x38, 0x0, 0x0, 0x1, 0x60, 0x2}, [{}]}, 0x58) 21:24:50 executing program 4: socket$netlink(0x10, 0x3, 0x13) 21:24:50 executing program 2: syz_mount_image$gfs2(&(0x7f0000000040)='gfs2\x00', &(0x7f0000001740)='./file0\x00', 0x0, 0x0, &(0x7f0000001680), 0x0, &(0x7f0000000880)=ANY=[@ANYBLOB='l']) 21:24:50 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f00000000c0)=[{&(0x7f0000000140)="480000001400197f09004b0101048c590188ff3f67614e495b1e2e1f72161affcf5d6f9fafab2a40e10520613057fff7e07900defeff0000e5ed5e00000000c855000000000000ac", 0x48}], 0x1) 21:24:50 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x4) writev(0xffffffffffffffff, &(0x7f00000000c0)=[{&(0x7f0000000140)="480000001400197f09004b0101048c590188ff3f67614e495b1e2e1f72161affcf5d6f9fafab2a40e10520613057fff7e07900defeff0000e5ed5e00000000c855000000000000ac", 0x48}], 0x1) 21:24:50 executing program 0: syz_open_dev$sndseq(&(0x7f0000000000)='/dev/snd/seq\x00', 0x0, 0x0) userfaultfd(0x0) syz_open_dev$mice(&(0x7f0000000100)='/dev/input/mice\x00', 0x0, 0x0) pselect6(0x40, &(0x7f00000abfc0)={0x3ffffd}, &(0x7f0000768000)={0x0, 0x0, 0x0, 0x0, 0x60000000}, &(0x7f00007fbfc0), &(0x7f0000f22000)={0x0, 0x989680}, &(0x7f0000f14000)={&(0x7f0000553ff8), 0x8}) 21:24:50 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x4) writev(r0, &(0x7f00000000c0), 0x0) 21:24:50 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x4) writev(r0, &(0x7f00000000c0), 0x0) 21:24:50 executing program 6: 21:24:50 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x4) writev(r0, &(0x7f00000000c0), 0x0) 21:24:50 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x4) writev(r0, &(0x7f00000000c0)=[{&(0x7f0000000140)}], 0x1) 21:24:50 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x4) writev(r0, &(0x7f00000000c0)=[{&(0x7f0000000140)}], 0x1) [ 201.676613] gfs2: invalid mount option: l [ 201.680833] gfs2: can't parse mount arguments 21:24:50 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback={0x0, 0x1}}, 0x1c) listen(r0, 0x4) r1 = accept4(r0, &(0x7f0000000040)=@can, &(0x7f00000000c0)=0x80, 0x0) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) sendto$inet6(r2, &(0x7f0000e33fe0)='X', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback={0x0, 0x1}}, 0x1c) write$binfmt_script(r2, &(0x7f0000000140)=ANY=[@ANYBLOB="cc"], 0x1) shutdown(r2, 0x1) write$binfmt_misc(r1, &(0x7f0000000240)={'syz1'}, 0x34000) 21:24:50 executing program 7: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$hfsplus(&(0x7f0000000040)='hfsplus\x00', &(0x7f0000000080)='./file0\x00', 0x4d500000, 0x0, &(0x7f0000000300), 0x0, &(0x7f0000000380)) 21:24:50 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x4) writev(r0, &(0x7f00000000c0)=[{&(0x7f0000000140)}], 0x1) 21:24:50 executing program 5: r0 = socket$inet6(0xa, 0x80005, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f76") r1 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0xfffffffffffffffc, 0x1) write$binfmt_elf32(r1, &(0x7f0000000140)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x38, 0x0, 0x0, 0x1, 0x60, 0x2}, [{}]}, 0x58) 21:24:50 executing program 6: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0xa, &(0x7f0000000140)=0x78, 0x4) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast=0xffffffff}, 0x10) sendto$inet(r0, &(0x7f0000a88f88), 0x29f, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback=0x7f000001}, 0x10) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000100), 0x921b527a62bfd8af) write$binfmt_elf64(r0, &(0x7f0000004ac0)=ANY=[@ANYBLOB="2b3387409ad39d668703f9c1b1254c3a92648b5a2e340d6562b7de40d3898024066e45b9fe2c0a76df48a7065ba323e2c41626b687c15904f8b4caa2c8ce1dea8c9949b41089201db033c7ba2ec623e59d47705f9e074a9d058bd8b2a0e2d97e2df35a6273ad5b490de6d33815cf77ad81327fe294c7806d09b871fd9c6126a794f7a3f0edb696d6115debab88faa460e708e00eefd93ac850210a81b56c63e294e43fe02966dfa4426914f87ce8dd592aec73863b838b73a58a2a1b91d0875bf46cead6cdc3f671eabe21b5686d75728233c45aebd353b73f7211d94aa9f05b425f18eca6bcda132660cff7a9ecf71c377f0bcb68a50d985a6c163f8e4d8659ba2c9ccc0b29667b1dc8cf2bed7d03afbdb875120ae9d012b5f53dadda67f9d8179aa004f28480ad1272cdcc0a0b70eea376c890c382c9a0189e071feed9fa39e9d1f2a71387e2cbe72e5570d06e03761c1509be93cb51306ef3833a0fd817dc99ffc2e470e05a9493337fe577ee0dd6b2e0b90e5c7cbabfb349d4b88a14f151ae9377e55f341c5879354a49425cf0c90fb6f93a321237cd01940a653657e300d75e0e2d8e675851cdb8928e435dc8b2ade1f978556d641fe5d2e593761fc50ced3841a2812fc47d3e3fab29a6018460e657280c6a237d559cf090e8ce99653c5d8bbd11baf10cf1c3f6fb164557ad0de639db9c63e88dc2fa9eeeb582bc21a2f541199d84abceccb7b55b18b75f9a3f86b4c5dbceebbea27c3a7528d894d47dbcd513b7904d9587e3537f22e44810a0e8214762bdd2877c4389db028ad0a92b"], 0x240) recvmsg(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nfc, 0x80, &(0x7f00000001c0)=[{&(0x7f0000003ac0)=""/4096, 0x1000}], 0x1, &(0x7f00000002c0)=""/20, 0x14}, 0x0) 21:24:50 executing program 4: r0 = syz_open_dev$loop(&(0x7f00000003c0)='/dev/loop#\x00', 0x0, 0x0) r1 = memfd_create(&(0x7f0000000400)="74086e750000000000000000008c00", 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "94d4341307ee5d4501d9f99b60ff2618833263db3afce629f579d0956535eb893d885a358beb7c3251f0f29874bc643a28779214cd4d8b975beeff8780d29f6c", "9a65c9632090ff2319a1f977c69149162db3db7768da42b7cb2b14a4b98944a9"}) 21:24:50 executing program 2: syz_mount_image$gfs2(&(0x7f0000000040)='gfs2\x00', &(0x7f0000001740)='./file0\x00', 0x0, 0x0, &(0x7f0000001680), 0x0, &(0x7f0000000880)=ANY=[@ANYBLOB='l']) 21:24:50 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x4) writev(r0, &(0x7f00000000c0)=[{&(0x7f0000000140)="480000001400197f09004b0101048c590188ff3f67614e495b1e2e1f72161affcf5d6f9f", 0x24}], 0x1) 21:24:50 executing program 0: syz_open_dev$sndseq(&(0x7f0000000000)='/dev/snd/seq\x00', 0x0, 0x0) userfaultfd(0x0) syz_open_dev$mice(&(0x7f0000000100)='/dev/input/mice\x00', 0x0, 0x0) pselect6(0x40, &(0x7f00000abfc0)={0x3ffffd}, &(0x7f0000768000)={0x0, 0x0, 0x0, 0x0, 0x64000000}, &(0x7f00007fbfc0), &(0x7f0000f22000)={0x0, 0x989680}, &(0x7f0000f14000)={&(0x7f0000553ff8), 0x8}) 21:24:50 executing program 4: r0 = syz_open_dev$loop(&(0x7f00000003c0)='/dev/loop#\x00', 0x0, 0x0) r1 = memfd_create(&(0x7f0000000400)="74086e750000000000000000008c00", 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "94d4341307ee5d4501d9f99b60ff2618833263db3afce629f579d0956535eb893d885a358beb7c3251f0f29874bc643a28779214cd4d8b975beeff8780d29f6c", "9a65c9632090ff2319a1f977c69149162db3db7768da42b7cb2b14a4b98944a9"}) 21:24:50 executing program 5: r0 = socket$inet6(0xa, 0x80005, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f7620") r1 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0xfffffffffffffffc, 0x1) write$binfmt_elf32(r1, &(0x7f0000000140)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x38, 0x0, 0x0, 0x1, 0x60, 0x2}, [{}]}, 0x58) 21:24:50 executing program 6: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f000000a000)='./file0\x00', &(0x7f0000026ff8)='./file0\x00', &(0x7f0000000300)='ramfs\x00', 0x0, &(0x7f00000007c0)) mount(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='.', &(0x7f0000000040)="045b898f73", 0x1004, 0x0) mount(&(0x7f00000008c0)='.', &(0x7f0000000080)='.', &(0x7f0000753000)='mslos\x00', 0x5010, &(0x7f0000000ac0)) 21:24:51 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x4) writev(r0, &(0x7f00000000c0)=[{&(0x7f0000000140)="480000001400197f09004b0101048c590188ff3f67614e495b1e2e1f72161affcf5d6f9f", 0x24}], 0x1) [ 201.878764] gfs2: invalid mount option: l [ 201.883118] gfs2: can't parse mount arguments [ 201.909717] hfsplus: unable to find HFS+ superblock 21:24:51 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x4) writev(r0, &(0x7f00000000c0)=[{&(0x7f0000000140)="480000001400197f09004b0101048c590188ff3f67614e495b1e2e1f72161affcf5d6f9f", 0x24}], 0x1) 21:24:51 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x4) writev(r0, &(0x7f00000000c0)=[{&(0x7f0000000140)="480000001400197f09004b0101048c590188ff3f67614e495b1e2e1f72161affcf5d6f9fafab2a40e10520613057fff7e07900defeff", 0x36}], 0x1) 21:24:51 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x4) writev(r0, &(0x7f00000000c0)=[{&(0x7f0000000140)="480000001400197f09004b0101048c590188ff3f67614e495b1e2e1f72161affcf5d6f9fafab2a40e10520613057fff7e07900defeff", 0x36}], 0x1) [ 202.066539] gfs2: invalid mount option: l [ 202.070920] gfs2: can't parse mount arguments [ 202.106951] gfs2: invalid mount option: l [ 202.111177] gfs2: can't parse mount arguments 21:24:51 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(0xffffffffffffffff, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback={0x0, 0x1}}, 0x1c) listen(r0, 0x4) r1 = accept4(r0, &(0x7f0000000040)=@can, &(0x7f00000000c0)=0x80, 0x0) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) sendto$inet6(r2, &(0x7f0000e33fe0)='X', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback={0x0, 0x1}}, 0x1c) write$binfmt_script(r2, &(0x7f0000000140)=ANY=[@ANYBLOB="cc"], 0x1) shutdown(r2, 0x1) write$binfmt_misc(r1, &(0x7f0000000240)={'syz1'}, 0x34000) 21:24:51 executing program 7: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$hfsplus(&(0x7f0000000040)='hfsplus\x00', &(0x7f0000000080)='./file0\x00', 0x2300, 0x0, &(0x7f0000000300), 0x0, &(0x7f0000000380)) 21:24:51 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x4) writev(r0, &(0x7f00000000c0)=[{&(0x7f0000000140)="480000001400197f09004b0101048c590188ff3f67614e495b1e2e1f72161affcf5d6f9fafab2a40e10520613057fff7e07900defeff", 0x36}], 0x1) 21:24:51 executing program 0: syz_open_dev$sndseq(&(0x7f0000000000)='/dev/snd/seq\x00', 0x0, 0x0) userfaultfd(0x0) syz_open_dev$mice(&(0x7f0000000100)='/dev/input/mice\x00', 0x0, 0x0) pselect6(0x40, &(0x7f00000abfc0)={0x3ffffd}, &(0x7f0000768000)={0x0, 0x0, 0x0, 0x0, 0x60}, &(0x7f00007fbfc0), &(0x7f0000f22000)={0x0, 0x989680}, &(0x7f0000f14000)={&(0x7f0000553ff8), 0x8}) 21:24:51 executing program 4: r0 = syz_open_dev$loop(&(0x7f00000003c0)='/dev/loop#\x00', 0x0, 0x0) r1 = memfd_create(&(0x7f0000000400)="74086e750000000000000000008c00", 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "94d4341307ee5d4501d9f99b60ff2618833263db3afce629f579d0956535eb893d885a358beb7c3251f0f29874bc643a28779214cd4d8b975beeff8780d29f6c", "9a65c9632090ff2319a1f977c69149162db3db7768da42b7cb2b14a4b98944a9"}) 21:24:51 executing program 5: r0 = socket$inet6(0xa, 0x80005, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f7620") r1 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0xfffffffffffffffc, 0x1) write$binfmt_elf32(r1, &(0x7f0000000140)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x38, 0x0, 0x0, 0x1, 0x60, 0x2}, [{}]}, 0x58) 21:24:51 executing program 6: socket$inet6_icmp_raw(0xa, 0x3, 0x3a) 21:24:51 executing program 2: syz_mount_image$gfs2(&(0x7f0000000040)="6766733203", &(0x7f0000001740)='./file0\x00', 0x0, 0x0, &(0x7f0000001680), 0x0, &(0x7f0000000880)=ANY=[@ANYBLOB='l']) 21:24:51 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x4) writev(r0, &(0x7f00000000c0)=[{&(0x7f0000000140)="480000001400197f09004b0101048c590188ff3f67614e495b1e2e1f72161affcf5d6f9fafab2a40e10520613057fff7e07900defeff0000e5ed5e00000000", 0x3f}], 0x1) 21:24:51 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x4) writev(r0, &(0x7f00000000c0)=[{&(0x7f0000000140)="480000001400197f09004b0101048c590188ff3f67614e495b1e2e1f72161affcf5d6f9fafab2a40e10520613057fff7e07900defeff0000e5ed5e00000000", 0x3f}], 0x1) 21:24:51 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x4) writev(r0, &(0x7f00000000c0)=[{&(0x7f0000000140)="480000001400197f09004b0101048c590188ff3f67614e495b1e2e1f72161affcf5d6f9fafab2a40e10520613057fff7e07900defeff0000e5ed5e00000000", 0x3f}], 0x1) 21:24:51 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x4) writev(r0, &(0x7f00000000c0)=[{&(0x7f0000000140)="480000001400197f09004b0101048c590188ff3f67614e495b1e2e1f72161affcf5d6f9fafab2a40e10520613057fff7e07900defeff0000e5ed5e00000000c855000000", 0x44}], 0x1) 21:24:51 executing program 6: mq_open(&(0x7f00000000c0)='nodev\x00', 0x0, 0x0, &(0x7f0000000300)) 21:24:51 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x4) writev(r0, &(0x7f00000000c0)=[{&(0x7f0000000140)="480000001400197f09004b0101048c590188ff3f67614e495b1e2e1f72161affcf5d6f9fafab2a40e10520613057fff7e07900defeff0000e5ed5e00000000c855000000", 0x44}], 0x1) [ 202.863459] hfsplus: unable to find HFS+ superblock 21:24:51 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x4) writev(r0, &(0x7f00000000c0)=[{&(0x7f0000000140)="480000001400197f09004b0101048c590188ff3f67614e495b1e2e1f72161affcf5d6f9fafab2a40e10520613057fff7e07900defeff0000e5ed5e00000000c855000000", 0x44}], 0x1) 21:24:51 executing program 4: r0 = syz_open_dev$loop(&(0x7f00000003c0)='/dev/loop#\x00', 0x0, 0x0) r1 = memfd_create(&(0x7f0000000400)="74086e750000000000000000008c00", 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "94d4341307ee5d4501d9f99b60ff2618833263db3afce629f579d0956535eb893d885a358beb7c3251f0f29874bc643a28779214cd4d8b975beeff8780d29f6c", "9a65c9632090ff2319a1f977c69149162db3db7768da42b7cb2b14a4b98944a9"}) [ 202.923500] hfsplus: unable to find HFS+ superblock 21:24:52 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000ef8cfd)={0xa, 0x0, 0x0, @loopback={0x0, 0x1}}, 0x1c) listen(r0, 0x4) r1 = accept4(r0, &(0x7f0000000040)=@can, &(0x7f00000000c0)=0x80, 0x0) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) sendto$inet6(r2, &(0x7f0000e33fe0)='X', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback={0x0, 0x1}}, 0x1c) write$binfmt_script(r2, &(0x7f0000000140)=ANY=[@ANYBLOB="cc"], 0x1) shutdown(r2, 0x1) write$binfmt_misc(r1, &(0x7f0000000240)={'syz1'}, 0x34000) 21:24:52 executing program 5: r0 = socket$inet6(0xa, 0x80005, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f7620") r1 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0xfffffffffffffffc, 0x1) write$binfmt_elf32(r1, &(0x7f0000000140)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x38, 0x0, 0x0, 0x1, 0x60, 0x2}, [{}]}, 0x58) 21:24:52 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x4) writev(r0, &(0x7f00000000c0)=[{&(0x7f0000000140)="480000001400197f09004b0101048c590188ff3f67614e495b1e2e1f72161affcf5d6f9fafab2a40e10520613057fff7e07900defeff0000e5ed5e00000000c8550000000000", 0x46}], 0x1) 21:24:52 executing program 0: syz_open_dev$sndseq(&(0x7f0000000000)='/dev/snd/seq\x00', 0x0, 0x0) userfaultfd(0x0) syz_open_dev$mice(&(0x7f0000000100)='/dev/input/mice\x00', 0x0, 0x0) pselect6(0x40, &(0x7f00000abfc0)={0x3ffffd}, &(0x7f0000768000)={0x0, 0x0, 0x0, 0x0, 0x10}, &(0x7f00007fbfc0), &(0x7f0000f22000)={0x0, 0x989680}, &(0x7f0000f14000)={&(0x7f0000553ff8), 0x8}) 21:24:52 executing program 6: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f000000a000)='./file0\x00', &(0x7f0000026ff8)='./file0\x00', &(0x7f0000000300)='ramfs\x00', 0x0, &(0x7f00000007c0)) mkdir(&(0x7f0000000200)='./file0/file0\x00', 0x0) 21:24:52 executing program 2: syz_mount_image$gfs2(&(0x7f0000000040)='gfs2\x00', &(0x7f0000001740)='./file0\x00', 0x0, 0x0, &(0x7f0000001680), 0x0, &(0x7f0000000880)=ANY=[@ANYBLOB='l']) 21:24:52 executing program 4: r0 = syz_open_dev$loop(&(0x7f00000003c0)='/dev/loop#\x00', 0x0, 0x0) memfd_create(&(0x7f0000000400)="74086e750000000000000000008c00", 0x0) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "94d4341307ee5d4501d9f99b60ff2618833263db3afce629f579d0956535eb893d885a358beb7c3251f0f29874bc643a28779214cd4d8b975beeff8780d29f6c", "9a65c9632090ff2319a1f977c69149162db3db7768da42b7cb2b14a4b98944a9"}) 21:24:52 executing program 7: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$hfsplus(&(0x7f0000000040)='hfsplus\x00', &(0x7f0000000080)='./file0\x00', 0x2b48, 0x0, &(0x7f0000000300), 0x0, &(0x7f0000000380)) 21:24:52 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x4) writev(r0, &(0x7f00000000c0)=[{&(0x7f0000000140)="480000001400197f09004b0101048c590188ff3f67614e495b1e2e1f72161affcf5d6f9fafab2a40e10520613057fff7e07900defeff0000e5ed5e00000000c8550000000000", 0x46}], 0x1) 21:24:52 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x4) writev(r0, &(0x7f00000000c0)=[{&(0x7f0000000140)="480000001400197f09004b0101048c590188ff3f67614e495b1e2e1f72161affcf5d6f9fafab2a40e10520613057fff7e07900defeff0000e5ed5e00000000c8550000000000", 0x46}], 0x1) 21:24:52 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x4) writev(r0, &(0x7f00000000c0)=[{&(0x7f0000000140)="480000001400197f09004b0101048c590188ff3f67614e495b1e2e1f72161affcf5d6f9fafab2a40e10520613057fff7e07900defeff0000e5ed5e00000000c855000000000000", 0x47}], 0x1) 21:24:52 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x4) writev(r0, &(0x7f00000000c0)=[{&(0x7f0000000140)="480000001400197f09004b0101048c590188ff3f67614e495b1e2e1f72161affcf5d6f9fafab2a40e10520613057fff7e07900defeff0000e5ed5e00000000c855000000000000", 0x47}], 0x1) [ 203.830221] hfsplus: unable to find HFS+ superblock 21:24:52 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x4) writev(r0, &(0x7f00000000c0)=[{&(0x7f0000000140)="480000001400197f09004b0101048c590188ff3f67614e495b1e2e1f72161affcf5d6f9fafab2a40e10520613057fff7e07900defeff0000e5ed5e00000000c855000000000000", 0x47}], 0x1) 21:24:52 executing program 6: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, &(0x7f0000a88f88), 0x29f, 0x200007fd, &(0x7f0000e68000)={0x2, 0x0, @loopback=0x7f000001}, 0x10) setsockopt$sock_int(r0, 0x1, 0x9, &(0x7f0000000100), 0x4) 21:24:52 executing program 1: 21:24:52 executing program 1: [ 203.854850] gfs2: invalid mount option: l [ 203.859121] gfs2: can't parse mount arguments [ 203.995162] gfs2: invalid mount option: l [ 203.999545] gfs2: can't parse mount arguments 21:24:53 executing program 1: 21:24:53 executing program 4: r0 = syz_open_dev$loop(&(0x7f00000003c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "94d4341307ee5d4501d9f99b60ff2618833263db3afce629f579d0956535eb893d885a358beb7c3251f0f29874bc643a28779214cd4d8b975beeff8780d29f6c", "9a65c9632090ff2319a1f977c69149162db3db7768da42b7cb2b14a4b98944a9"}) 21:24:53 executing program 5: r0 = socket$inet6(0xa, 0x80005, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x0, 0x1) write$binfmt_elf32(r1, &(0x7f0000000140)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x38, 0x0, 0x0, 0x1, 0x60, 0x2}, [{}]}, 0x58) 21:24:53 executing program 7: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$hfsplus(&(0x7f0000000040)='hfsplus\x00', &(0x7f0000000080)='./file0\x00', 0x3, 0x0, &(0x7f0000000300), 0x0, &(0x7f0000000380)) 21:24:53 executing program 0: syz_open_dev$sndseq(&(0x7f0000000000)='/dev/snd/seq\x00', 0x0, 0x0) userfaultfd(0x0) syz_open_dev$mice(&(0x7f0000000100)='/dev/input/mice\x00', 0x0, 0x0) pselect6(0x40, &(0x7f00000abfc0)={0x3ffffd}, &(0x7f0000768000)={0x0, 0x0, 0x0, 0x0, 0x8}, &(0x7f00007fbfc0), &(0x7f0000f22000)={0x0, 0x989680}, &(0x7f0000f14000)={&(0x7f0000553ff8), 0x8}) 21:24:53 executing program 6: 21:24:53 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback={0x0, 0x1}}, 0x1c) listen(0xffffffffffffffff, 0x4) r1 = accept4(r0, &(0x7f0000000040)=@can, &(0x7f00000000c0)=0x80, 0x0) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) sendto$inet6(r2, &(0x7f0000e33fe0)='X', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback={0x0, 0x1}}, 0x1c) write$binfmt_script(r2, &(0x7f0000000140)=ANY=[@ANYBLOB="cc"], 0x1) shutdown(r2, 0x1) write$binfmt_misc(r1, &(0x7f0000000240)={'syz1'}, 0x34000) 21:24:53 executing program 2: syz_mount_image$gfs2(&(0x7f0000000040)='gfs2\x00', &(0x7f0000001740)='./file0\x00', 0x0, 0x0, &(0x7f0000001680), 0x0, &(0x7f0000000880)=ANY=[@ANYBLOB='l']) 21:24:53 executing program 1: 21:24:53 executing program 1: 21:24:53 executing program 1: [ 204.850361] gfs2: invalid mount option: l [ 204.854628] gfs2: can't parse mount arguments 21:24:53 executing program 1: 21:24:53 executing program 1: 21:24:53 executing program 1: 21:24:53 executing program 4: r0 = syz_open_dev$loop(&(0x7f00000003c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "94d4341307ee5d4501d9f99b60ff2618833263db3afce629f579d0956535eb893d885a358beb7c3251f0f29874bc643a28779214cd4d8b975beeff8780d29f6c", "9a65c9632090ff2319a1f977c69149162db3db7768da42b7cb2b14a4b98944a9"}) [ 204.917878] hfsplus: unable to find HFS+ superblock 21:24:54 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback={0x0, 0x1}}, 0x1c) listen(r0, 0x0) r1 = accept4(r0, &(0x7f0000000040)=@can, &(0x7f00000000c0)=0x80, 0x0) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) sendto$inet6(r2, &(0x7f0000e33fe0)='X', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback={0x0, 0x1}}, 0x1c) write$binfmt_script(r2, &(0x7f0000000140)=ANY=[@ANYBLOB="cc"], 0x1) shutdown(r2, 0x1) write$binfmt_misc(r1, &(0x7f0000000240)={'syz1'}, 0x34000) 21:24:54 executing program 1: 21:24:54 executing program 6: 21:24:54 executing program 5: r0 = socket$inet6(0xa, 0x80005, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x0, 0x1) write$binfmt_elf32(r1, &(0x7f0000000140)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x38, 0x0, 0x0, 0x1, 0x60, 0x2}, [{}]}, 0x58) 21:24:54 executing program 1: [ 204.976476] gfs2: invalid mount option: l [ 204.980722] gfs2: can't parse mount arguments [ 204.985632] hfsplus: unable to find HFS+ superblock 21:24:54 executing program 7: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$hfsplus(&(0x7f0000000040)='hfsplus\x00', &(0x7f0000000080)='./file0\x00', 0x4858000000000000, 0x0, &(0x7f0000000300), 0x0, &(0x7f0000000380)) 21:24:54 executing program 1: 21:24:54 executing program 0: syz_open_dev$sndseq(&(0x7f0000000000)='/dev/snd/seq\x00', 0x0, 0x0) userfaultfd(0x0) syz_open_dev$mice(&(0x7f0000000100)='/dev/input/mice\x00', 0x0, 0x0) pselect6(0x40, &(0x7f00000abfc0)={0x3ffffd}, &(0x7f0000768000)={0x0, 0x0, 0x0, 0x0, 0x800000000000000}, &(0x7f00007fbfc0), &(0x7f0000f22000)={0x0, 0x989680}, &(0x7f0000f14000)={&(0x7f0000553ff8), 0x8}) 21:24:54 executing program 2: syz_mount_image$gfs2(&(0x7f0000000040)='gfs2\x00', &(0x7f0000001740)='./file0\x00', 0x0, 0x0, &(0x7f0000001680), 0x0, &(0x7f0000000880)=ANY=[@ANYBLOB='l']) 21:24:54 executing program 1: 21:24:54 executing program 6: 21:24:54 executing program 4: r0 = syz_open_dev$loop(&(0x7f00000003c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "94d4341307ee5d4501d9f99b60ff2618833263db3afce629f579d0956535eb893d885a358beb7c3251f0f29874bc643a28779214cd4d8b975beeff8780d29f6c", "9a65c9632090ff2319a1f977c69149162db3db7768da42b7cb2b14a4b98944a9"}) 21:24:54 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback={0x0, 0x1}}, 0x1c) listen(r0, 0x4) r1 = accept4(0xffffffffffffffff, &(0x7f0000000040)=@can, &(0x7f00000000c0)=0x80, 0x0) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) sendto$inet6(r2, &(0x7f0000e33fe0)='X', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback={0x0, 0x1}}, 0x1c) write$binfmt_script(r2, &(0x7f0000000140)=ANY=[@ANYBLOB="cc"], 0x1) shutdown(r2, 0x1) write$binfmt_misc(r1, &(0x7f0000000240)={'syz1'}, 0x34000) 21:24:54 executing program 1: 21:24:54 executing program 1: 21:24:54 executing program 1: 21:24:54 executing program 1: 21:24:54 executing program 1: [ 205.204155] hfsplus: unable to find HFS+ superblock 21:24:54 executing program 1: 21:24:54 executing program 5: r0 = socket$inet6(0xa, 0x80005, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x0, 0x1) write$binfmt_elf32(r1, &(0x7f0000000140)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x38, 0x0, 0x0, 0x1, 0x60, 0x2}, [{}]}, 0x58) 21:24:54 executing program 1: 21:24:54 executing program 7: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$hfsplus(&(0x7f0000000040)='hfsplus\x00', &(0x7f0000000080)='./file0\x00', 0xf5ffffff00000000, 0x0, &(0x7f0000000300), 0x0, &(0x7f0000000380)) 21:24:54 executing program 6: 21:24:54 executing program 0: syz_open_dev$sndseq(&(0x7f0000000000)='/dev/snd/seq\x00', 0x0, 0x0) userfaultfd(0x0) syz_open_dev$mice(&(0x7f0000000100)='/dev/input/mice\x00', 0x0, 0x0) pselect6(0x40, &(0x7f00000abfc0)={0x3ffffd}, &(0x7f0000768000)={0x0, 0x0, 0x0, 0x0, 0x6400000000000000}, &(0x7f00007fbfc0), &(0x7f0000f22000)={0x0, 0x989680}, &(0x7f0000f14000)={&(0x7f0000553ff8), 0x8}) [ 205.264462] gfs2: invalid mount option: l [ 205.268786] gfs2: can't parse mount arguments [ 205.351191] gfs2: invalid mount option: l [ 205.355528] gfs2: can't parse mount arguments [ 205.381486] hfsplus: unable to find HFS+ superblock 21:24:54 executing program 2: syz_mount_image$gfs2(&(0x7f0000000040)='gfs2t', &(0x7f0000001740)='./file0\x00', 0x0, 0x0, &(0x7f0000001680), 0x0, &(0x7f0000000880)=ANY=[@ANYBLOB='l']) 21:24:54 executing program 1: 21:24:54 executing program 4: memfd_create(&(0x7f0000000400)="74086e750000000000000000008c00", 0x0) ioctl$LOOP_SET_STATUS(0xffffffffffffffff, 0x4c02, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "94d4341307ee5d4501d9f99b60ff2618833263db3afce629f579d0956535eb893d885a358beb7c3251f0f29874bc643a28779214cd4d8b975beeff8780d29f6c", "9a65c9632090ff2319a1f977c69149162db3db7768da42b7cb2b14a4b98944a9"}) 21:24:54 executing program 6: 21:24:54 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback={0x0, 0x1}}, 0x1c) listen(r0, 0x4) r1 = accept4(r0, &(0x7f0000000040)=@can, &(0x7f00000000c0)=0x80, 0x0) r2 = socket$inet6_sctp(0xa, 0x0, 0x84) sendto$inet6(r2, &(0x7f0000e33fe0)='X', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback={0x0, 0x1}}, 0x1c) write$binfmt_script(r2, &(0x7f0000000140)=ANY=[@ANYBLOB="cc"], 0x1) shutdown(r2, 0x1) write$binfmt_misc(r1, &(0x7f0000000240)={'syz1'}, 0x34000) 21:24:54 executing program 5: r0 = socket$inet6(0xa, 0x80005, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0xfffffffffffffffc, 0x0) write$binfmt_elf32(r1, &(0x7f0000000140)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x38, 0x0, 0x0, 0x1, 0x60, 0x2}, [{}]}, 0x58) 21:24:54 executing program 0: syz_open_dev$sndseq(&(0x7f0000000000)='/dev/snd/seq\x00', 0x0, 0x0) userfaultfd(0x0) syz_open_dev$mice(&(0x7f0000000100)='/dev/input/mice\x00', 0x0, 0x0) pselect6(0x40, &(0x7f00000abfc0)={0x3ffffd}, &(0x7f0000768000)={0x0, 0x0, 0x0, 0x0, 0x8000000}, &(0x7f00007fbfc0), &(0x7f0000f22000)={0x0, 0x989680}, &(0x7f0000f14000)={&(0x7f0000553ff8), 0x8}) 21:24:54 executing program 1: 21:24:54 executing program 1: 21:24:54 executing program 1: 21:24:54 executing program 1: 21:24:54 executing program 7: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$hfsplus(&(0x7f0000000040)='hfsplus\x00', &(0x7f0000000080)='./file0\x00', 0x4244000000000000, 0x0, &(0x7f0000000300), 0x0, &(0x7f0000000380)) 21:24:54 executing program 6: 21:24:54 executing program 1: 21:24:54 executing program 4: memfd_create(&(0x7f0000000400)="74086e750000000000000000008c00", 0x0) ioctl$LOOP_SET_STATUS(0xffffffffffffffff, 0x4c02, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "94d4341307ee5d4501d9f99b60ff2618833263db3afce629f579d0956535eb893d885a358beb7c3251f0f29874bc643a28779214cd4d8b975beeff8780d29f6c", "9a65c9632090ff2319a1f977c69149162db3db7768da42b7cb2b14a4b98944a9"}) 21:24:54 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) getsockopt$inet_tcp_int(r0, 0x6, 0x3, &(0x7f00000001c0), &(0x7f0000000200)=0x4) 21:24:54 executing program 2: syz_mount_image$gfs2(&(0x7f0000000040)="67667332fd", &(0x7f0000001740)='./file0\x00', 0x0, 0x0, &(0x7f0000001680), 0x0, &(0x7f0000000880)=ANY=[@ANYBLOB='l']) [ 205.621157] hfsplus: unable to find HFS+ superblock 21:24:54 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = socket$nl_netfilter(0x10, 0x3, 0xc) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r1, 0x10e, 0x1, &(0x7f0000000180)=0x1, 0x4) 21:24:54 executing program 6: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000deb000)={0x2, 0x4e23, @broadcast=0xffffffff}, 0x10) sendto$inet(r0, &(0x7f0000000140), 0x0, 0x200007ff, &(0x7f0000deaff0)={0x2, 0x4e23}, 0x10) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000080)=0x40, 0x4) writev(r0, &(0x7f00000000c0)=[{&(0x7f0000000000)="17", 0x1}], 0x1) 21:24:54 executing program 5: r0 = socket$inet6(0xa, 0x80005, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0xfffffffffffffffc, 0x1) write$binfmt_elf32(0xffffffffffffffff, &(0x7f0000000140)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x38, 0x0, 0x0, 0x1, 0x60, 0x2}, [{}]}, 0x58) 21:24:55 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback={0x0, 0x1}}, 0x1c) listen(r0, 0x4) r1 = accept4(r0, &(0x7f0000000040)=@can, &(0x7f00000000c0)=0x80, 0x0) r2 = socket$inet6_sctp(0xa, 0x0, 0x84) sendto$inet6(r2, &(0x7f0000e33fe0)='X', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback={0x0, 0x1}}, 0x1c) write$binfmt_script(r2, &(0x7f0000000140)=ANY=[@ANYBLOB="cc"], 0x1) shutdown(r2, 0x1) write$binfmt_misc(r1, &(0x7f0000000240)={'syz1'}, 0x34000) 21:24:55 executing program 4: memfd_create(&(0x7f0000000400)="74086e750000000000000000008c00", 0x0) ioctl$LOOP_SET_STATUS(0xffffffffffffffff, 0x4c02, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "94d4341307ee5d4501d9f99b60ff2618833263db3afce629f579d0956535eb893d885a358beb7c3251f0f29874bc643a28779214cd4d8b975beeff8780d29f6c", "9a65c9632090ff2319a1f977c69149162db3db7768da42b7cb2b14a4b98944a9"}) 21:24:55 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000040)="025cc83d6d345f8f762070") preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000001200)=""/148, 0x94}], 0x31d, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='net/netlink\x00') preadv(r1, &(0x7f0000000100), 0x2000000000000314, 0x10400003) 21:24:55 executing program 0: syz_open_dev$sndseq(&(0x7f0000000000)='/dev/snd/seq\x00', 0x0, 0x0) userfaultfd(0x0) syz_open_dev$mice(&(0x7f0000000100)='/dev/input/mice\x00', 0x0, 0x0) pselect6(0x40, &(0x7f00000abfc0)={0x3ffffd}, &(0x7f0000768000)={0x0, 0x0, 0x0, 0x0, 0x6000}, &(0x7f00007fbfc0), &(0x7f0000f22000)={0x0, 0x989680}, &(0x7f0000f14000)={&(0x7f0000553ff8), 0x8}) 21:24:55 executing program 7: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$hfsplus(&(0x7f0000000040)='hfsplus\x00', &(0x7f0000000080)='./file0\x00', 0x20000, 0x0, &(0x7f0000000300), 0x0, &(0x7f0000000380)) 21:24:55 executing program 5: r0 = socket$inet6(0xa, 0x80005, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0xfffffffffffffffc, 0x1) write$binfmt_elf32(r1, &(0x7f0000000140)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x38, 0x0, 0x0, 0x0, 0x60, 0x2}, [{}]}, 0x58) 21:24:55 executing program 6: 21:24:55 executing program 2: syz_mount_image$gfs2(&(0x7f0000000040)='gfs2\x00', &(0x7f0000001740)='./file0\x00', 0x0, 0x0, &(0x7f0000001680), 0x0, &(0x7f0000000880)=ANY=[@ANYBLOB='l']) 21:24:55 executing program 6: [ 206.458419] gfs2: invalid mount option: l [ 206.462684] gfs2: can't parse mount arguments 21:24:55 executing program 4: r0 = syz_open_dev$loop(&(0x7f00000003c0)='/dev/loop#\x00', 0x0, 0x0) memfd_create(&(0x7f0000000400)="74086e750000000000000000008c00", 0x0) ioctl$LOOP_SET_STATUS(0xffffffffffffffff, 0x4c02, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "94d4341307ee5d4501d9f99b60ff2618833263db3afce629f579d0956535eb893d885a358beb7c3251f0f29874bc643a28779214cd4d8b975beeff8780d29f6c", "9a65c9632090ff2319a1f977c69149162db3db7768da42b7cb2b14a4b98944a9"}) 21:24:55 executing program 1: 21:24:55 executing program 1: 21:24:55 executing program 5: r0 = socket$inet6(0xa, 0x80005, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0xfffffffffffffffc, 0x1) write$binfmt_elf32(r1, &(0x7f0000000140)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x38, 0x0, 0x0, 0x0, 0x60, 0x2}, [{}]}, 0x58) 21:24:55 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000deb000)={0x2, 0x4e23, @broadcast=0xffffffff}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f00006dc000)=[{0x6, 0x0, 0x0, 0xa1}]}, 0x10) sendto$inet(r0, &(0x7f0000000140), 0x0, 0x200007ff, &(0x7f0000deaff0)={0x2, 0x4e23}, 0x10) sendto$inet(r0, &(0x7f00006fd000)="c3401c344654f3c7d9b41ba48c8e399aa4eedc3d6bd8ebd65c856a27d61154adc2b2a9763ae0201c0d32e11f38e9dd18c58f6bd779650fc30f93653bdaecf323c9f6502ceab47e58114347b289546465a5eb278de12b1989f64cc99412e36880d20c34d91051b22f6c8acc9d082b7bcdec844f667da0867d08d4154004997e317b79", 0x82, 0x0, &(0x7f0000e66000)={0x2, 0x0, @rand_addr}, 0x10) readv(r0, &(0x7f00000005c0)=[{&(0x7f00000004c0)=""/101, 0x65}, {&(0x7f0000000540)=""/101, 0x65}], 0x3a) r1 = dup2(r0, r0) sendto$inet(r1, &(0x7f0000000600)="70efd2dd52e9d54d48a7463d2744faa92abcc1f780c6b3805770a7bc3999245a429c28e74ce3b9e62ee91008cd43b65be1c9819916c3d22cc1b1bbbce446fac9ab17caa1f240eba0551773a7326e7fec25d1c43ee222ebb6e93c8f92df09c09aadac106dcce366ed7c04a1dcf8cfa7cf5ca0dfc482f7f721c2a35468f0fe548a642b", 0x82, 0x0, &(0x7f0000000280)={0x2, 0x0, @local={0xac, 0x14, 0x14, 0xaa}}, 0x10) recvmsg(r0, &(0x7f0000001c00)={&(0x7f00000019c0)=@hci, 0x80, &(0x7f0000001b00)=[{&(0x7f0000001a80)=""/80, 0x50}], 0x1, &(0x7f0000001b40)=""/150, 0x96}, 0x0) writev(r0, &(0x7f00000000c0)=[{&(0x7f0000000000)="17", 0x1}], 0x1) [ 206.543415] hfsplus: unable to find HFS+ superblock [ 206.563524] gfs2: invalid mount option: l [ 206.567887] gfs2: can't parse mount arguments 21:24:55 executing program 0: syz_open_dev$sndseq(&(0x7f0000000000)='/dev/snd/seq\x00', 0x0, 0x0) userfaultfd(0x0) syz_open_dev$mice(&(0x7f0000000100)='/dev/input/mice\x00', 0x0, 0x0) pselect6(0x40, &(0x7f00000abfc0)={0x3ffffd}, &(0x7f0000768000)={0x0, 0x0, 0x0, 0x0, 0x64}, &(0x7f00007fbfc0), &(0x7f0000f22000)={0x0, 0x989680}, &(0x7f0000f14000)={&(0x7f0000553ff8), 0x8}) 21:24:55 executing program 6: r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/route\x00') readv(r0, &(0x7f0000000200)=[{&(0x7f0000000080)=""/144, 0x90}], 0x1) readv(r0, &(0x7f0000002540)=[{&(0x7f0000001540)=""/4096, 0x1000}], 0x1) 21:24:56 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback={0x0, 0x1}}, 0x1c) listen(r0, 0x4) r1 = accept4(r0, &(0x7f0000000040)=@can, &(0x7f00000000c0)=0x80, 0x0) r2 = socket$inet6_sctp(0xa, 0x0, 0x84) sendto$inet6(r2, &(0x7f0000e33fe0)='X', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback={0x0, 0x1}}, 0x1c) write$binfmt_script(r2, &(0x7f0000000140)=ANY=[@ANYBLOB="cc"], 0x1) shutdown(r2, 0x1) write$binfmt_misc(r1, &(0x7f0000000240)={'syz1'}, 0x34000) 21:24:56 executing program 2: syz_mount_image$gfs2(&(0x7f0000000040)='gfs2\x00', &(0x7f0000001740)='./file0\x00', 0x0, 0x0, &(0x7f0000001680), 0x0, &(0x7f0000000880)=ANY=[@ANYBLOB='l']) 21:24:56 executing program 4: r0 = syz_open_dev$loop(&(0x7f00000003c0)='/dev/loop#\x00', 0x0, 0x0) memfd_create(&(0x7f0000000400)="74086e750000000000000000008c00", 0x0) ioctl$LOOP_SET_STATUS(0xffffffffffffffff, 0x4c02, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "94d4341307ee5d4501d9f99b60ff2618833263db3afce629f579d0956535eb893d885a358beb7c3251f0f29874bc643a28779214cd4d8b975beeff8780d29f6c", "9a65c9632090ff2319a1f977c69149162db3db7768da42b7cb2b14a4b98944a9"}) 21:24:56 executing program 7: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$hfsplus(&(0x7f0000000040)='hfsplus\x00', &(0x7f0000000080)='./file0\x00', 0xa000000, 0x0, &(0x7f0000000300), 0x0, &(0x7f0000000380)) 21:24:56 executing program 5: r0 = socket$inet6(0xa, 0x80005, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0xfffffffffffffffc, 0x1) write$binfmt_elf32(r1, &(0x7f0000000140)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x38, 0x0, 0x0, 0x0, 0x60, 0x2}, [{}]}, 0x58) 21:24:56 executing program 6: getrandom(&(0x7f0000000000)=""/73, 0x49, 0x3) 21:24:56 executing program 0: syz_open_dev$sndseq(&(0x7f0000000000)='/dev/snd/seq\x00', 0x0, 0x0) userfaultfd(0x0) syz_open_dev$mice(&(0x7f0000000100)='/dev/input/mice\x00', 0x0, 0x0) pselect6(0x40, &(0x7f00000abfc0)={0x3ffffd}, &(0x7f0000768000)={0x0, 0x0, 0x0, 0x0, 0x1600000000000000}, &(0x7f00007fbfc0), &(0x7f0000f22000)={0x0, 0x989680}, &(0x7f0000f14000)={&(0x7f0000553ff8), 0x8}) 21:24:56 executing program 4: r0 = syz_open_dev$loop(&(0x7f00000003c0)='/dev/loop#\x00', 0x0, 0x0) memfd_create(&(0x7f0000000400)="74086e750000000000000000008c00", 0x0) ioctl$LOOP_SET_STATUS(0xffffffffffffffff, 0x4c02, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "94d4341307ee5d4501d9f99b60ff2618833263db3afce629f579d0956535eb893d885a358beb7c3251f0f29874bc643a28779214cd4d8b975beeff8780d29f6c", "9a65c9632090ff2319a1f977c69149162db3db7768da42b7cb2b14a4b98944a9"}) [ 207.465045] gfs2: invalid mount option: l [ 207.469403] gfs2: can't parse mount arguments [ 207.488387] hfsplus: unable to find HFS+ superblock [ 207.509154] gfs2: invalid mount option: l 21:24:56 executing program 6: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='net/ip6_flowlabel\x00') dup3(r0, r1, 0x0) 21:24:56 executing program 0: syz_open_dev$sndseq(&(0x7f0000000000)='/dev/snd/seq\x00', 0x0, 0x0) userfaultfd(0x0) syz_open_dev$mice(&(0x7f0000000100)='/dev/input/mice\x00', 0x0, 0x0) pselect6(0x40, &(0x7f00000abfc0)={0x3ffffd}, &(0x7f0000768000)={0x0, 0x0, 0x0, 0x0, 0x6000000000000000}, &(0x7f00007fbfc0), &(0x7f0000f22000)={0x0, 0x989680}, &(0x7f0000f14000)={&(0x7f0000553ff8), 0x8}) 21:24:56 executing program 5: r0 = socket$inet6(0xa, 0x80005, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0xfffffffffffffffc, 0x1) write$binfmt_elf32(r1, &(0x7f0000000140)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x38, 0x0, 0x0, 0x1, 0x60}, [{}]}, 0x58) [ 207.513427] gfs2: can't parse mount arguments 21:24:56 executing program 2: syz_mount_image$gfs2(&(0x7f0000000040)='gfs2\x00', &(0x7f0000001740)='./file0\x00', 0x0, 0x0, &(0x7f0000001680), 0x0, &(0x7f0000000880)=ANY=[@ANYBLOB='l']) 21:24:56 executing program 7: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$hfsplus(&(0x7f0000000040)='hfsplus\x00', &(0x7f0000000080)='./file0\x00', 0x5000000, 0x0, &(0x7f0000000300), 0x0, &(0x7f0000000380)) 21:24:56 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000deb000)={0x2, 0x4e23, @multicast2=0xe0000002}, 0x10) sendto$inet(r0, &(0x7f0000000180), 0xfffffffffffffccb, 0x200007ff, &(0x7f0000deaff0)={0x2, 0x4e23, @loopback=0x7f000001}, 0x10) setsockopt$inet_tcp_TLS_TX(r0, 0x6, 0x1, &(0x7f0000000080)={0x303, 0x33}, 0x4) sendto$inet(r0, &(0x7f00006fd000)="c3", 0x1, 0x0, &(0x7f00000001c0)={0x2, 0x0, @rand_addr}, 0x10) 21:24:56 executing program 4: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) ioctl$int_in(r0, 0x5452, &(0x7f0000000140)=0x7) sendto$inet(r0, &(0x7f0000000140), 0x0, 0x200007ff, &(0x7f0000deaff0)={0x2}, 0x10) 21:24:56 executing program 6: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000deb000)={0x2, 0x4e23, @multicast2=0xe0000002}, 0x10) sendto$inet(r0, &(0x7f0000000180), 0xfffffffffffffccb, 0x200007ff, &(0x7f0000deaff0)={0x2, 0x4e23, @loopback=0x7f000001}, 0x10) sendto$inet(r0, &(0x7f00006fd000)="c3", 0x1, 0x81, &(0x7f00000001c0)={0x2, 0x0, @rand_addr}, 0x10) sendto$inet(r0, &(0x7f0000000000)='F', 0x1, 0x20000051, &(0x7f0000000100)={0x2, 0x0, @dev={0xac, 0x14, 0x14}}, 0x10) [ 207.648697] gfs2: invalid mount option: l [ 207.653035] gfs2: can't parse mount arguments [ 207.688776] hfsplus: unable to find HFS+ superblock [ 207.738971] gfs2: invalid mount option: l [ 207.743212] gfs2: can't parse mount arguments 21:24:57 executing program 4: syz_open_dev$sndtimer(&(0x7f0000022ff1)='/dev/snd/timer\x00', 0x0, 0x0) 21:24:57 executing program 5: r0 = socket$inet6(0xa, 0x80005, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0xfffffffffffffffc, 0x1) write$binfmt_elf32(r1, &(0x7f0000000140)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x38, 0x0, 0x0, 0x1, 0x60}, [{}]}, 0x58) 21:24:57 executing program 0: syz_open_dev$sndseq(&(0x7f0000000000)='/dev/snd/seq\x00', 0x0, 0x0) userfaultfd(0x0) syz_open_dev$mice(&(0x7f0000000100)='/dev/input/mice\x00', 0x0, 0x0) pselect6(0x40, &(0x7f00000abfc0)={0x3ffffd}, &(0x7f0000768000)={0x0, 0x0, 0x0, 0x0, 0x10000000}, &(0x7f00007fbfc0), &(0x7f0000f22000)={0x0, 0x989680}, &(0x7f0000f14000)={&(0x7f0000553ff8), 0x8}) 21:24:57 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback={0x0, 0x1}}, 0x1c) listen(r0, 0x4) r1 = accept4(r0, &(0x7f0000000040)=@can, &(0x7f00000000c0)=0x80, 0x0) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) sendto$inet6(0xffffffffffffffff, &(0x7f0000e33fe0)='X', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback={0x0, 0x1}}, 0x1c) write$binfmt_script(r2, &(0x7f0000000140)=ANY=[@ANYBLOB="cc"], 0x1) shutdown(r2, 0x1) write$binfmt_misc(r1, &(0x7f0000000240)={'syz1'}, 0x34000) 21:24:57 executing program 7: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$hfsplus(&(0x7f0000000040)='hfsplus\x00', &(0x7f0000000080)='./file0\x00', 0x7, 0x0, &(0x7f0000000300), 0x0, &(0x7f0000000380)) 21:24:57 executing program 6: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', &(0x7f0000000040)='bpf\x00', 0x0, &(0x7f0000000280)=ANY=[]) mount$bpf(0x0, &(0x7f0000000080)='./file0/../file0\x00', &(0x7f00000000c0)='bpf\x00', 0x80000, &(0x7f00000002c0)) 21:24:57 executing program 2: syz_mount_image$gfs2(&(0x7f0000000040)='gfs2\x00', &(0x7f0000001740)='./file0\x00', 0x0, 0x0, &(0x7f0000001680), 0x0, &(0x7f0000000880)=ANY=[@ANYBLOB='l']) 21:24:57 executing program 1: socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000000080)) sendmsg$kcm(0xffffffffffffffff, &(0x7f00000015c0)={&(0x7f00000000c0)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2}, 0x0, 0x2}}, 0x80, &(0x7f0000001480), 0x0, &(0x7f0000001500)=ANY=[@ANYBLOB]}, 0x0) r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001600)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x3, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff7, 0x5, @perf_config_ext={0x3}, 0x1000, 0x0, 0x17}, 0x0, 0x2, r0, 0xa) r1 = socket$kcm(0xa, 0x6, 0x0) recvmsg$kcm(r1, &(0x7f0000003180)={&(0x7f0000002e00)=@ll={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @remote}, 0x80, &(0x7f0000003140)=[{&(0x7f0000002e80)=""/219, 0xdb}], 0x1, 0x0, 0x0, 0x8}, 0x41) [ 208.453992] gfs2: invalid mount option: l [ 208.458248] gfs2: can't parse mount arguments 21:24:57 executing program 6: r0 = socket$kcm(0x29, 0x2, 0x0) perf_event_open(&(0x7f00000003c0)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmsg(r0, &(0x7f000000dc00)={&(0x7f000000d5c0)=@xdp, 0x80, &(0x7f000000da80), 0x0, &(0x7f000000db00)=""/206, 0xce}, 0x40) 21:24:57 executing program 1: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup.net/syz1\x00', 0x200002, 0x0) 21:24:57 executing program 4: r0 = socket$kcm(0xa, 0x3, 0x11) sendmsg$kcm(r0, &(0x7f0000000400)={&(0x7f0000000040)=@un=@abs, 0x80, &(0x7f0000000240), 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="5000000000000000ff0100001f000000090e8b7930b12af609f74adb8ce748a888cd47581fac34691a5843ae28c51c05f315ca76beb49aca18f3ed647bd44b4e1e7d07499b67f8ff950000000000000038000000000000000b010000a46d0000"], 0x60}, 0x0) 21:24:57 executing program 1: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x0, 0x0, 0x0, &(0x7f0000000140)) socket$kcm(0xa, 0x6, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x12, 0x0, 0x4, 0x7, 0x0, 0x1}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000180)={r0, &(0x7f0000000000), &(0x7f0000000140)}, 0x20) 21:24:57 executing program 5: r0 = socket$inet6(0xa, 0x80005, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0xfffffffffffffffc, 0x1) write$binfmt_elf32(r1, &(0x7f0000000140)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x38, 0x0, 0x0, 0x1, 0x60}, [{}]}, 0x58) [ 208.543103] hfsplus: unable to find HFS+ superblock 21:24:57 executing program 0: syz_open_dev$sndseq(&(0x7f0000000000)='/dev/snd/seq\x00', 0x0, 0x0) userfaultfd(0x0) syz_open_dev$mice(&(0x7f0000000100)='/dev/input/mice\x00', 0x0, 0x0) pselect6(0x40, &(0x7f00000abfc0)={0x3ffffd}, &(0x7f0000768000)={0x0, 0x0, 0x0, 0x0, 0x1600}, &(0x7f00007fbfc0), &(0x7f0000f22000)={0x0, 0x989680}, &(0x7f0000f14000)={&(0x7f0000553ff8), 0x8}) 21:24:57 executing program 1: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x12, 0x4, 0x4, 0x7, 0x0, 0x1}, 0x2c) bpf$MAP_DELETE_ELEM(0x3, &(0x7f00000000c0)={r0, &(0x7f00000002c0)}, 0x10) [ 208.619493] gfs2: invalid mount option: l [ 208.623776] gfs2: can't parse mount arguments 21:24:57 executing program 6: r0 = socket$kcm(0x29, 0x2, 0x0) perf_event_open(&(0x7f00000003c0)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmsg(r0, &(0x7f000000dc00)={&(0x7f000000d5c0)=@xdp, 0x80, &(0x7f000000da80), 0x0, &(0x7f000000db00)=""/206, 0xce}, 0x40) 21:24:57 executing program 1: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x12, 0x4, 0x4, 0x7, 0x0, 0x1}, 0x2c) bpf$MAP_DELETE_ELEM(0x3, &(0x7f00000000c0)={r0, &(0x7f00000002c0)}, 0x10) 21:24:57 executing program 4: r0 = socket$inet(0x2b, 0x801, 0x0) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") bind$inet(r0, &(0x7f0000000000)={0x2, 0x0, @multicast2=0xe0000002}, 0x10) listen(r0, 0x0) 21:24:57 executing program 1: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x12, 0x4, 0x4, 0x7, 0x0, 0x1}, 0x2c) bpf$MAP_DELETE_ELEM(0x3, &(0x7f00000000c0)={r0, &(0x7f00000002c0)}, 0x10) 21:24:58 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback={0x0, 0x1}}, 0x1c) listen(r0, 0x4) r1 = accept4(r0, &(0x7f0000000040)=@can, &(0x7f00000000c0)=0x80, 0x0) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) sendto$inet6(0xffffffffffffffff, &(0x7f0000e33fe0)='X', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback={0x0, 0x1}}, 0x1c) write$binfmt_script(r2, &(0x7f0000000140)=ANY=[@ANYBLOB="cc"], 0x1) shutdown(r2, 0x1) write$binfmt_misc(r1, &(0x7f0000000240)={'syz1'}, 0x34000) 21:24:58 executing program 7: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$hfsplus(&(0x7f0000000040)='hfsplus\x00', &(0x7f0000000080)='./file0\x00', 0xe00, 0x0, &(0x7f0000000300), 0x0, &(0x7f0000000380)) 21:24:58 executing program 1: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x12, 0x4, 0x4, 0x7, 0x0, 0x1}, 0x2c) bpf$MAP_DELETE_ELEM(0x3, &(0x7f00000000c0)={r0, &(0x7f00000002c0)}, 0x10) 21:24:58 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000001680)="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", 0x0, 0x0) r2 = dup3(r0, r1, 0x0) write$P9_RXATTRCREATE(r2, &(0x7f0000000000)={0x7, 0x21}, 0x7) 21:24:58 executing program 2: syz_mount_image$gfs2(&(0x7f0000000040)='gfs2\x00', &(0x7f0000001740)='./file0\x00', 0x0, 0x0, &(0x7f0000001680), 0x0, &(0x7f0000000880)=ANY=[@ANYBLOB='l']) 21:24:58 executing program 6: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)="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", 0x0, 0x0) mkdirat$cgroup(r0, &(0x7f0000000040)='syz1\x00', 0x1ff) 21:24:58 executing program 0: syz_open_dev$sndseq(&(0x7f0000000000)='/dev/snd/seq\x00', 0x0, 0x0) userfaultfd(0x0) syz_open_dev$mice(&(0x7f0000000100)='/dev/input/mice\x00', 0x0, 0x0) pselect6(0x40, &(0x7f00000abfc0)={0x3ffffd}, &(0x7f0000768000)={0x0, 0x0, 0x0, 0x0, 0x1000000000000}, &(0x7f00007fbfc0), &(0x7f0000f22000)={0x0, 0x989680}, &(0x7f0000f14000)={&(0x7f0000553ff8), 0x8}) 21:24:58 executing program 4: r0 = socket$inet(0x2b, 0x801, 0x0) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") bind$inet(r0, &(0x7f0000000000)={0x2, 0x0, @multicast2=0xe0000002}, 0x10) listen(r0, 0x0) 21:24:58 executing program 1: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_DELETE_ELEM(0x3, &(0x7f00000000c0)={0xffffffffffffffff, &(0x7f00000002c0)}, 0x10) 21:24:58 executing program 1: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_DELETE_ELEM(0x3, &(0x7f00000000c0)={0xffffffffffffffff, &(0x7f00000002c0)}, 0x10) 21:24:58 executing program 1: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_DELETE_ELEM(0x3, &(0x7f00000000c0)={0xffffffffffffffff, &(0x7f00000002c0)}, 0x10) 21:24:58 executing program 0: syz_open_dev$sndseq(&(0x7f0000000000)='/dev/snd/seq\x00', 0x0, 0x0) userfaultfd(0x0) syz_open_dev$mice(&(0x7f0000000100)='/dev/input/mice\x00', 0x0, 0x0) pselect6(0x40, &(0x7f00000abfc0)={0x3ffffd}, &(0x7f0000768000)={0x0, 0x0, 0x0, 0x0, 0x6400}, &(0x7f00007fbfc0), &(0x7f0000f22000)={0x0, 0x989680}, &(0x7f0000f14000)={&(0x7f0000553ff8), 0x8}) 21:24:58 executing program 1: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x12, 0x4, 0x4, 0x7, 0x0, 0x1}, 0x2c) bpf$MAP_DELETE_ELEM(0x3, &(0x7f00000000c0)={r0, &(0x7f00000002c0)}, 0x10) [ 209.338970] hfsplus: unable to find HFS+ superblock [ 209.345900] gfs2: invalid mount option: l [ 209.350184] gfs2: can't parse mount arguments 21:24:58 executing program 1: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x12, 0x4, 0x4, 0x7, 0x0, 0x1}, 0x2c) bpf$MAP_DELETE_ELEM(0x3, &(0x7f00000000c0)={r0, &(0x7f00000002c0)}, 0x10) 21:24:58 executing program 1: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x12, 0x4, 0x4, 0x7, 0x0, 0x1}, 0x2c) bpf$MAP_DELETE_ELEM(0x3, &(0x7f00000000c0)={r0, &(0x7f00000002c0)}, 0x10) 21:24:58 executing program 1: perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x12, 0x4, 0x4, 0x7, 0x0, 0x1}, 0x2c) bpf$MAP_DELETE_ELEM(0x3, &(0x7f00000000c0)={r0, &(0x7f00000002c0)}, 0x10) [ 209.467902] gfs2: invalid mount option: l [ 209.472163] gfs2: can't parse mount arguments 21:24:59 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback={0x0, 0x1}}, 0x1c) listen(r0, 0x4) r1 = accept4(r0, &(0x7f0000000040)=@can, &(0x7f00000000c0)=0x80, 0x0) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) sendto$inet6(0xffffffffffffffff, &(0x7f0000e33fe0)='X', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback={0x0, 0x1}}, 0x1c) write$binfmt_script(r2, &(0x7f0000000140)=ANY=[@ANYBLOB="cc"], 0x1) shutdown(r2, 0x1) write$binfmt_misc(r1, &(0x7f0000000240)={'syz1'}, 0x34000) 21:24:59 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000001680)="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", 0x0, 0x0) r2 = dup3(r0, r1, 0x0) write$P9_RSTAT(r2, &(0x7f0000000080)={0x56, 0x7d, 0x0, {0x0, 0x4f, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x2, '$+', 0x2, '^{', 0x17, "70707031ed747275737465642f277d776c616e30282c2d", 0x1, ':'}}, 0x56) 21:24:59 executing program 1: perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x12, 0x4, 0x4, 0x7, 0x0, 0x1}, 0x2c) bpf$MAP_DELETE_ELEM(0x3, &(0x7f00000000c0)={r0, &(0x7f00000002c0)}, 0x10) 21:24:59 executing program 6: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)="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", 0x0, 0x0) mkdirat$cgroup(r0, &(0x7f0000000040)='syz1\x00', 0x1ff) 21:24:59 executing program 7: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$hfsplus(&(0x7f0000000040)='hfsplus\x00', &(0x7f0000000080)='./file0\x00', 0x4442, 0x0, &(0x7f0000000300), 0x0, &(0x7f0000000380)) 21:24:59 executing program 4: r0 = socket$inet(0x2b, 0x801, 0x0) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") bind$inet(r0, &(0x7f0000000000)={0x2, 0x0, @multicast2=0xe0000002}, 0x10) listen(r0, 0x0) 21:24:59 executing program 0: syz_open_dev$sndseq(&(0x7f0000000000)='/dev/snd/seq\x00', 0x0, 0x0) userfaultfd(0x0) syz_open_dev$mice(&(0x7f0000000100)='/dev/input/mice\x00', 0x0, 0x0) pselect6(0x40, &(0x7f00000abfc0)={0x3ffffd}, &(0x7f0000768000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000000000}, &(0x7f00007fbfc0), &(0x7f0000f22000)={0x0, 0x989680}, &(0x7f0000f14000)={&(0x7f0000553ff8), 0x8}) 21:24:59 executing program 2: syz_mount_image$gfs2(&(0x7f0000000040)='gfs2\x00', &(0x7f0000001740)='./file0\x00', 0x0, 0x0, &(0x7f0000001680), 0x0, &(0x7f0000000880)=ANY=[@ANYBLOB='l']) 21:24:59 executing program 1: perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x12, 0x4, 0x4, 0x7, 0x0, 0x1}, 0x2c) bpf$MAP_DELETE_ELEM(0x3, &(0x7f00000000c0)={r0, &(0x7f00000002c0)}, 0x10) 21:24:59 executing program 1: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x12, 0x4, 0x4, 0x7, 0x0, 0x1}, 0x2c) bpf$MAP_DELETE_ELEM(0x3, &(0x7f00000000c0)={r0, &(0x7f00000002c0)}, 0x10) 21:24:59 executing program 1: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x12, 0x4, 0x4, 0x7, 0x0, 0x1}, 0x2c) bpf$MAP_DELETE_ELEM(0x3, &(0x7f00000000c0)={r0, &(0x7f00000002c0)}, 0x10) 21:24:59 executing program 1: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x12, 0x4, 0x4, 0x7, 0x0, 0x1}, 0x2c) bpf$MAP_DELETE_ELEM(0x3, &(0x7f00000000c0)={r0, &(0x7f00000002c0)}, 0x10) 21:24:59 executing program 4: r0 = socket$inet(0x2b, 0x801, 0x0) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") bind$inet(r0, &(0x7f0000000000)={0x2, 0x0, @multicast2=0xe0000002}, 0x10) listen(r0, 0x0) 21:24:59 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000001680)="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", 0x0, 0x0) dup3(r0, r1, 0x0) write$P9_RWALK(r1, &(0x7f0000000040)={0x9, 0x6f}, 0x9) [ 210.201175] gfs2: invalid mount option: l [ 210.205442] gfs2: can't parse mount arguments [ 210.220354] hfsplus: unable to find HFS+ superblock 21:24:59 executing program 1: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x0, 0x4, 0x4, 0x7, 0x0, 0x1}, 0x2c) bpf$MAP_DELETE_ELEM(0x3, &(0x7f00000000c0)={r0, &(0x7f00000002c0)}, 0x10) [ 210.252638] hfsplus: unable to find HFS+ superblock 21:24:59 executing program 1: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x0, 0x4, 0x4, 0x7, 0x0, 0x1}, 0x2c) bpf$MAP_DELETE_ELEM(0x3, &(0x7f00000000c0)={r0, &(0x7f00000002c0)}, 0x10) [ 210.306423] gfs2: invalid mount option: l [ 210.310713] gfs2: can't parse mount arguments 21:25:00 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback={0x0, 0x1}}, 0x1c) listen(r0, 0x4) r1 = accept4(r0, &(0x7f0000000040)=@can, &(0x7f00000000c0)=0x80, 0x0) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) sendto$inet6(r2, &(0x7f0000e33fe0), 0x0, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback={0x0, 0x1}}, 0x1c) write$binfmt_script(r2, &(0x7f0000000140)=ANY=[@ANYBLOB="cc"], 0x1) shutdown(r2, 0x1) write$binfmt_misc(r1, &(0x7f0000000240)={'syz1'}, 0x34000) 21:25:00 executing program 6: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)="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", 0x0, 0x0) mkdirat$cgroup(r0, &(0x7f0000000040)='syz1\x00', 0x1ff) 21:25:00 executing program 7: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$hfsplus(&(0x7f0000000040)='hfsplus\x00', &(0x7f0000000080)='./file0\x00', 0x20000000, 0x0, &(0x7f0000000300), 0x0, &(0x7f0000000380)) 21:25:00 executing program 0: syz_open_dev$sndseq(&(0x7f0000000000)='/dev/snd/seq\x00', 0x0, 0x0) userfaultfd(0x0) syz_open_dev$mice(&(0x7f0000000100)='/dev/input/mice\x00', 0x0, 0x0) pselect6(0x40, &(0x7f00000abfc0)={0x3ffffd}, &(0x7f0000768000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x800000000000000}, &(0x7f00007fbfc0), &(0x7f0000f22000)={0x0, 0x989680}, &(0x7f0000f14000)={&(0x7f0000553ff8), 0x8}) 21:25:00 executing program 1: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x0, 0x4, 0x4, 0x7, 0x0, 0x1}, 0x2c) bpf$MAP_DELETE_ELEM(0x3, &(0x7f00000000c0)={r0, &(0x7f00000002c0)}, 0x10) 21:25:00 executing program 2: syz_mount_image$gfs2(&(0x7f0000000040)='gfs2\x00', &(0x7f0000001740)='./file0\x00', 0x0, 0x0, &(0x7f0000001680), 0x0, &(0x7f0000000880)=ANY=[@ANYBLOB='l']) 21:25:00 executing program 4: r0 = socket$inet(0x2b, 0x801, 0x0) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") listen(r0, 0x0) 21:25:00 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000001680)="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", 0x0, 0x0) r2 = dup3(r0, r1, 0x0) write$P9_RAUTH(r2, &(0x7f0000000000)={0x14, 0x67}, 0x14) 21:25:00 executing program 1: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x12, 0x0, 0x4, 0x7, 0x0, 0x1}, 0x2c) bpf$MAP_DELETE_ELEM(0x3, &(0x7f00000000c0)={r0, &(0x7f00000002c0)}, 0x10) 21:25:00 executing program 1: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x12, 0x0, 0x0, 0x7, 0x0, 0x1}, 0x2c) bpf$MAP_DELETE_ELEM(0x3, &(0x7f00000000c0)={r0, &(0x7f00000002c0)}, 0x10) 21:25:00 executing program 1: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x12, 0x0, 0x0, 0x7, 0x0, 0x1}, 0x2c) bpf$MAP_DELETE_ELEM(0x3, &(0x7f00000000c0)={r0, &(0x7f00000002c0)}, 0x10) 21:25:00 executing program 4: r0 = socket$inet(0x2b, 0x801, 0x0) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") listen(r0, 0x0) 21:25:00 executing program 6: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)="2f007e574d000330809022cfde26555dc9ecfe1974406edad38364782d63b6612854b9e49dbdcaef718197e37e870a308b1e3a798fa788a46d3025ef933e51828ab675064e2adbe9126423b4a73d68fbe99c6db2f160c69cb6cce76c27289a4f9d197354aaa5860d2383df87526baa184d90bb7729366417bc33d765e9bc2f882a13f3a9c1f60660bd4fd2fa31d2c0a775242289bce062d10d24ded5406918a66b2c75c43fe1ff458ae5cd9fec63039ba5a7b66a60ede5ccdabc7ee77660ef2358ccdff02226021384b0c235f114ed9ade92767aecc256acdea010df42e7169f240357f735ae5fe29017e51e271d4ca16c57ed252f48b95bfbbb3a865535298bdc36d71db635f41c57771db77aeaff883feb3dc3cc24bd3c036e396ad3af37945058839e812270bc40901fa654e7cc3292a82fc80c374dc07142a14ddac32bcaefe910ebd3b948a3bfebef5fa8d82473c7fbf3ec763a1b613dd747d529ea70ef0298fff5661630b99a79ec8269af9be178aeca17fafb14fd3d6c99aee41d684f5d4200975a999d79ba894dbae4c1a6ef5f1e35af57d82878226d07e63a3f45967e0ee859bb6e0f3c66e68c445208bb32bb2342148aa3f413ea981dcf59c27323f4945e325ba0e69e436e55436a9324f5a458c5acb601104cf2fc7adc673cded13b347ea1e94f72fd4d8f4f68ad5da52ed8c929f751f28d9d63fa34b35d4fcfe8c548eb35e3a1d08c077e", 0x0, 0x0) mkdirat$cgroup(r0, &(0x7f0000000040)='syz1\x00', 0x1ff) 21:25:00 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)="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", 0x0, 0x0) dup3(r0, r1, 0x0) write$P9_RREMOVE(r1, &(0x7f0000000000)={0x7, 0x7b}, 0x7) 21:25:00 executing program 1: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x12, 0x0, 0x0, 0x7, 0x0, 0x1}, 0x2c) bpf$MAP_DELETE_ELEM(0x3, &(0x7f00000000c0)={r0, &(0x7f00000002c0)}, 0x10) 21:25:00 executing program 1: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x12, 0x0, 0x4, 0x0, 0x0, 0x1}, 0x2c) bpf$MAP_DELETE_ELEM(0x3, &(0x7f00000000c0)={r0, &(0x7f00000002c0)}, 0x10) [ 211.178223] gfs2: invalid mount option: l [ 211.182592] gfs2: can't parse mount arguments [ 211.188407] hfsplus: unable to find HFS+ superblock [ 211.265521] gfs2: invalid mount option: l [ 211.269808] gfs2: can't parse mount arguments 21:25:01 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback={0x0, 0x1}}, 0x1c) listen(r0, 0x4) r1 = accept4(r0, &(0x7f0000000040)=@can, &(0x7f00000000c0)=0x80, 0x0) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) sendto$inet6(r2, &(0x7f0000e33fe0), 0x0, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback={0x0, 0x1}}, 0x1c) write$binfmt_script(r2, &(0x7f0000000140)=ANY=[@ANYBLOB="cc"], 0x1) shutdown(r2, 0x1) write$binfmt_misc(r1, &(0x7f0000000240)={'syz1'}, 0x34000) 21:25:01 executing program 1: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x12, 0x0, 0x4, 0x0, 0x0, 0x1}, 0x2c) bpf$MAP_DELETE_ELEM(0x3, &(0x7f00000000c0)={r0, &(0x7f00000002c0)}, 0x10) 21:25:01 executing program 6: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000001680)="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", 0x0, 0x0) r2 = dup3(r0, r1, 0x0) write$P9_RLCREATE(r2, &(0x7f0000000100)={0x18, 0xf}, 0x18) 21:25:01 executing program 0: syz_open_dev$sndseq(&(0x7f0000000000)='/dev/snd/seq\x00', 0x0, 0x0) userfaultfd(0x0) syz_open_dev$mice(&(0x7f0000000100)='/dev/input/mice\x00', 0x0, 0x0) pselect6(0x40, &(0x7f00000abfc0)={0x3ffffd}, &(0x7f0000768000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000}, &(0x7f00007fbfc0), &(0x7f0000f22000)={0x0, 0x989680}, &(0x7f0000f14000)={&(0x7f0000553ff8), 0x8}) 21:25:01 executing program 7: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$hfsplus(&(0x7f0000000040)='hfsplus\x00', &(0x7f0000000080)='./file0\x00', 0xe, 0x0, &(0x7f0000000300), 0x0, &(0x7f0000000380)) 21:25:01 executing program 2: syz_mount_image$gfs2(&(0x7f0000000040)='gfs2\x00', &(0x7f0000001740)='./file0\x00', 0x0, 0x0, &(0x7f0000001680), 0x0, &(0x7f0000000880)=ANY=[@ANYBLOB='l']) 21:25:01 executing program 4: r0 = socket$inet(0x2b, 0x801, 0x0) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") listen(r0, 0x0) 21:25:01 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)="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", 0x0, 0x0) r2 = dup3(r0, r1, 0x0) write$P9_RRENAMEAT(r2, &(0x7f0000000080)={0x7, 0x4b}, 0x7) 21:25:01 executing program 1: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x12, 0x0, 0x4, 0x0, 0x0, 0x1}, 0x2c) bpf$MAP_DELETE_ELEM(0x3, &(0x7f00000000c0)={r0, &(0x7f00000002c0)}, 0x10) 21:25:01 executing program 1: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x12, 0x0, 0x4, 0x7, 0x0, 0x1}, 0x2c) bpf$MAP_DELETE_ELEM(0x3, &(0x7f00000000c0)={0xffffffffffffffff, &(0x7f00000002c0)}, 0x10) 21:25:01 executing program 1: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x12, 0x0, 0x4, 0x7, 0x0, 0x1}, 0x2c) bpf$MAP_DELETE_ELEM(0x3, &(0x7f00000000c0)={0xffffffffffffffff, &(0x7f00000002c0)}, 0x10) 21:25:01 executing program 4: r0 = socket$inet(0x2b, 0x801, 0x0) socket$inet6(0xa, 0x1000000000002, 0x0) bind$inet(r0, &(0x7f0000000000)={0x2, 0x0, @multicast2=0xe0000002}, 0x10) listen(r0, 0x0) 21:25:01 executing program 1: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x12, 0x0, 0x4, 0x7, 0x0, 0x1}, 0x2c) bpf$MAP_DELETE_ELEM(0x3, &(0x7f00000000c0)={0xffffffffffffffff, &(0x7f00000002c0)}, 0x10) 21:25:01 executing program 6: 21:25:01 executing program 1: [ 212.063150] gfs2: invalid mount option: l [ 212.067467] gfs2: can't parse mount arguments [ 212.079792] hfsplus: unable to find HFS+ superblock 21:25:01 executing program 1: [ 212.175236] gfs2: invalid mount option: l [ 212.179530] gfs2: can't parse mount arguments 21:25:01 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback={0x0, 0x1}}, 0x1c) listen(r0, 0x4) r1 = accept4(r0, &(0x7f0000000040)=@can, &(0x7f00000000c0)=0x80, 0x0) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) sendto$inet6(r2, &(0x7f0000e33fe0), 0x0, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback={0x0, 0x1}}, 0x1c) write$binfmt_script(r2, &(0x7f0000000140)=ANY=[@ANYBLOB="cc"], 0x1) shutdown(r2, 0x1) write$binfmt_misc(r1, &(0x7f0000000240)={'syz1'}, 0x34000) 21:25:01 executing program 1: 21:25:01 executing program 5: 21:25:01 executing program 6: 21:25:01 executing program 0: syz_open_dev$sndseq(&(0x7f0000000000)='/dev/snd/seq\x00', 0x0, 0x0) userfaultfd(0x0) syz_open_dev$mice(&(0x7f0000000100)='/dev/input/mice\x00', 0x0, 0x0) pselect6(0x40, &(0x7f00000abfc0)={0x3ffffd}, &(0x7f0000768000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000}, &(0x7f00007fbfc0), &(0x7f0000f22000)={0x0, 0x989680}, &(0x7f0000f14000)={&(0x7f0000553ff8), 0x8}) 21:25:01 executing program 4: r0 = socket$inet(0x2b, 0x801, 0x0) socket$inet6(0xa, 0x1000000000002, 0x0) bind$inet(r0, &(0x7f0000000000)={0x2, 0x0, @multicast2=0xe0000002}, 0x10) listen(r0, 0x0) 21:25:01 executing program 7: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$hfsplus(&(0x7f0000000040)='hfsplus\x00', &(0x7f0000000080)='./file0\x00', 0xffffff8c, 0x0, &(0x7f0000000300), 0x0, &(0x7f0000000380)) 21:25:01 executing program 2: syz_mount_image$gfs2(&(0x7f0000000040)="676673328c", &(0x7f0000001740)='./file0\x00', 0x0, 0x0, &(0x7f0000001680), 0x0, &(0x7f0000000880)=ANY=[@ANYBLOB='l']) 21:25:01 executing program 1: 21:25:01 executing program 1: 21:25:01 executing program 1: 21:25:01 executing program 1: 21:25:01 executing program 1: 21:25:01 executing program 6: 21:25:01 executing program 4: r0 = socket$inet(0x2b, 0x801, 0x0) socket$inet6(0xa, 0x1000000000002, 0x0) bind$inet(r0, &(0x7f0000000000)={0x2, 0x0, @multicast2=0xe0000002}, 0x10) listen(r0, 0x0) 21:25:01 executing program 1: [ 212.941153] hfsplus: unable to find HFS+ superblock 21:25:02 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback={0x0, 0x1}}, 0x1c) listen(r0, 0x4) r1 = accept4(r0, &(0x7f0000000040)=@can, &(0x7f00000000c0)=0x80, 0x0) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) sendto$inet6(r2, &(0x7f0000e33fe0)='X', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x0, 0x0, @loopback={0x0, 0x1}}, 0x1c) write$binfmt_script(r2, &(0x7f0000000140)=ANY=[@ANYBLOB="cc"], 0x1) shutdown(r2, 0x1) write$binfmt_misc(r1, &(0x7f0000000240)={'syz1'}, 0x34000) 21:25:02 executing program 1: 21:25:02 executing program 6: 21:25:02 executing program 5: 21:25:02 executing program 0: syz_open_dev$sndseq(&(0x7f0000000000)='/dev/snd/seq\x00', 0x0, 0x0) userfaultfd(0x0) syz_open_dev$mice(&(0x7f0000000100)='/dev/input/mice\x00', 0x0, 0x0) pselect6(0x40, &(0x7f00000abfc0)={0x3ffffd}, &(0x7f0000768000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x60000000}, &(0x7f00007fbfc0), &(0x7f0000f22000)={0x0, 0x989680}, &(0x7f0000f14000)={&(0x7f0000553ff8), 0x8}) 21:25:02 executing program 4: r0 = socket$inet(0x2b, 0x801, 0x0) ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") bind$inet(r0, &(0x7f0000000000)={0x2, 0x0, @multicast2=0xe0000002}, 0x10) listen(r0, 0x0) 21:25:02 executing program 7: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$hfsplus(&(0x7f0000000040)='hfsplus\x00', &(0x7f0000000080)='./file0\x00', 0x700000000000000, 0x0, &(0x7f0000000300), 0x0, &(0x7f0000000380)) 21:25:02 executing program 2: syz_mount_image$gfs2(&(0x7f0000000040)='gfs2\x00', &(0x7f0000001740)='./file0\x00', 0x0, 0x0, &(0x7f0000001680), 0x0, &(0x7f0000000880)=ANY=[@ANYBLOB='l']) 21:25:02 executing program 1: 21:25:02 executing program 1: 21:25:02 executing program 1: 21:25:02 executing program 1: [ 213.678833] gfs2: invalid mount option: l [ 213.683108] gfs2: can't parse mount arguments [ 213.711436] hfsplus: unable to find HFS+ superblock 21:25:02 executing program 1: 21:25:02 executing program 5: 21:25:02 executing program 6: 21:25:02 executing program 1: [ 213.831823] gfs2: invalid mount option: l [ 213.836082] gfs2: can't parse mount arguments 21:25:03 executing program 7: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$hfsplus(&(0x7f0000000040)='hfsplus\x00', &(0x7f0000000080)='./file0\x00', 0xa00000000000000, 0x0, &(0x7f0000000300), 0x0, &(0x7f0000000380)) 21:25:03 executing program 1: 21:25:03 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback={0x0, 0x1}}, 0x1c) listen(r0, 0x4) r1 = accept4(r0, &(0x7f0000000040)=@can, &(0x7f00000000c0)=0x80, 0x0) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) sendto$inet6(r2, &(0x7f0000e33fe0)='X', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback={0x0, 0x1}}, 0x1c) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYBLOB="cc"], 0x1) shutdown(r2, 0x1) write$binfmt_misc(r1, &(0x7f0000000240)={'syz1'}, 0x34000) 21:25:03 executing program 0: syz_open_dev$sndseq(&(0x7f0000000000)='/dev/snd/seq\x00', 0x0, 0x0) userfaultfd(0x0) syz_open_dev$mice(&(0x7f0000000100)='/dev/input/mice\x00', 0x0, 0x0) pselect6(0x40, &(0x7f00000abfc0)={0x3ffffd}, &(0x7f0000768000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x64000000}, &(0x7f00007fbfc0), &(0x7f0000f22000)={0x0, 0x989680}, &(0x7f0000f14000)={&(0x7f0000553ff8), 0x8}) 21:25:03 executing program 5: 21:25:03 executing program 6: 21:25:03 executing program 2: syz_mount_image$gfs2(&(0x7f0000000040)="67667332c0", &(0x7f0000001740)='./file0\x00', 0x0, 0x0, &(0x7f0000001680), 0x0, &(0x7f0000000880)=ANY=[@ANYBLOB='l']) 21:25:03 executing program 4: r0 = socket$inet(0x2b, 0x801, 0x0) ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") bind$inet(r0, &(0x7f0000000000)={0x2, 0x0, @multicast2=0xe0000002}, 0x10) listen(r0, 0x0) 21:25:03 executing program 1: 21:25:03 executing program 1: 21:25:03 executing program 1: 21:25:03 executing program 1: 21:25:03 executing program 1: 21:25:03 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000100)={'ip6gre0\x00', 0x0}) bind$packet(r0, &(0x7f00000000c0)={0x11, 0x0, r1, 0x1, 0x0, 0x6}, 0x14) setsockopt$packet_int(r0, 0x107, 0xa, &(0x7f0000000000)=0x2, 0x4) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) 21:25:03 executing program 6: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x5, 0x7e, 0x1, 0x4}, 0x2c) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000240)={r0, &(0x7f0000000100), &(0x7f0000000180)=""/162}, 0x18) [ 214.759109] hfsplus: unable to find HFS+ superblock 21:25:03 executing program 5: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup\x00', 0x200002, 0x0) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") openat$cgroup_int(r0, &(0x7f00000002c0)='cgroup.max.depth\x00', 0x2, 0x0) 21:25:03 executing program 7: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$hfsplus(&(0x7f0000000040)='hfsplus\x00', &(0x7f0000000080)='./file0\x00', 0x100000000000000, 0x0, &(0x7f0000000300), 0x0, &(0x7f0000000380)) 21:25:03 executing program 1: r0 = socket$inet6(0xa, 0x7, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = socket$inet_dccp(0x2, 0x6, 0x0) r2 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r2, &(0x7f0000942000)={0x2, 0x4e20, @multicast1=0xe0000001}, 0x10) connect$inet(r2, &(0x7f0000606ff0)={0x2, 0x4e20, @loopback=0x7f000001}, 0x10) setsockopt$SO_TIMESTAMPING(r2, 0x1, 0x25, &(0x7f0000000040)=0x19fd, 0x124) write$binfmt_script(r2, &(0x7f0000001440)=ANY=[@ANYBLOB="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"], 0x480) sendmsg(r2, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)=[{&(0x7f0000000080)="aa", 0x1}], 0x1}, 0x0) ioctl$sock_ifreq(r1, 0x891f, &(0x7f0000000000)={'bpq0\x00', @ifru_names='veth0_to_bridge\x00'}) socket$pptp(0x18, 0x1, 0x2) [ 214.917243] hfsplus: unable to find HFS+ superblock [ 214.935998] hfsplus: unable to find HFS+ superblock 21:25:04 executing program 2: syz_mount_image$gfs2(&(0x7f0000000040)='gfs2L', &(0x7f0000001740)='./file0\x00', 0x0, 0x0, &(0x7f0000001680), 0x0, &(0x7f0000000880)=ANY=[@ANYBLOB='l']) 21:25:04 executing program 4: r0 = socket$inet(0x2b, 0x801, 0x0) ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") bind$inet(r0, &(0x7f0000000000)={0x2, 0x0, @multicast2=0xe0000002}, 0x10) listen(r0, 0x0) 21:25:04 executing program 0: syz_open_dev$sndseq(&(0x7f0000000000)='/dev/snd/seq\x00', 0x0, 0x0) userfaultfd(0x0) syz_open_dev$mice(&(0x7f0000000100)='/dev/input/mice\x00', 0x0, 0x0) pselect6(0x40, &(0x7f00000abfc0)={0x3ffffd}, &(0x7f0000768000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000}, &(0x7f00007fbfc0), &(0x7f0000f22000)={0x0, 0x989680}, &(0x7f0000f14000)={&(0x7f0000553ff8), 0x8}) 21:25:04 executing program 6: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) sendmsg$IPVS_CMD_DEL_SERVICE(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f0000000240)={&(0x7f0000000140)={0x14, 0x0, 0x0, 0x0, 0x0, {0x3}}, 0x14}, 0x1}, 0x0) getsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000440)=""/82, &(0x7f00000004c0)=0x52) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_CPUID(r2, 0x4008ae8a, &(0x7f00000000c0)=ANY=[]) 21:25:04 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_buf(r0, 0x1, 0x1c, &(0x7f0000000040)=""/59, &(0x7f0000001100)=0x3b) 21:25:04 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback={0x0, 0x1}}, 0x1c) listen(r0, 0x4) r1 = accept4(r0, &(0x7f0000000040)=@can, &(0x7f00000000c0)=0x80, 0x0) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) sendto$inet6(r2, &(0x7f0000e33fe0)='X', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback={0x0, 0x1}}, 0x1c) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYBLOB="cc"], 0x1) shutdown(r2, 0x1) write$binfmt_misc(r1, &(0x7f0000000240)={'syz1'}, 0x34000) 21:25:04 executing program 7: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$hfsplus(&(0x7f0000000040)='hfsplus\x00', &(0x7f0000000080)='./file0\x00', 0x5848, 0x0, &(0x7f0000000300), 0x0, &(0x7f0000000380)) [ 215.540145] hfsplus: unable to find HFS+ superblock 21:25:04 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") bind$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @multicast2=0xe0000002}, 0x10) listen(0xffffffffffffffff, 0x0) 21:25:04 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f00000002c0)="2f65786500000000000489004bddd9de91be10eebf000ee91e18f0c76fbb232a07424ae1e901d2da75af1f0200f5ab26d7e071fb35331ce39c5a0000") nanosleep(&(0x7f0000000080)={0x77359400}, 0x0) syncfs(r0) getpeername$unix(0xffffffffffffffff, &(0x7f00000000c0), &(0x7f0000000000)=0x6e) 21:25:04 executing program 0: syz_open_dev$sndseq(&(0x7f0000000000)='/dev/snd/seq\x00', 0x0, 0x0) userfaultfd(0x0) syz_open_dev$mice(&(0x7f0000000100)='/dev/input/mice\x00', 0x0, 0x0) pselect6(0x40, &(0x7f00000abfc0)={0x3ffffd}, &(0x7f0000768000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x6400}, &(0x7f00007fbfc0), &(0x7f0000f22000)={0x0, 0x989680}, &(0x7f0000f14000)={&(0x7f0000553ff8), 0x8}) 21:25:04 executing program 6: syz_emit_ethernet(0x3, &(0x7f0000000080)=ANY=[@ANYBLOB="aaaaaaaaaaaaffffffffffff86dd60d8652b00140600fe0000000000000000000000000000aafe8027aa1e00000000000000000000000000aa00004e20", @ANYRES32=0x41424344, @ANYBLOB="500a000090780000"], &(0x7f00000002c0)) 21:25:04 executing program 7: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$hfsplus(&(0x7f0000000040)='hfsplus\x00', &(0x7f0000000080)='./file0\x00', 0x6, 0x0, &(0x7f0000000300), 0x0, &(0x7f0000000380)) 21:25:04 executing program 2: syz_mount_image$gfs2(&(0x7f0000000040)='gfs2\x00', &(0x7f0000001740)='./file0\x00', 0x0, 0x0, &(0x7f0000001680), 0x0, &(0x7f0000000880)=ANY=[@ANYBLOB='l']) 21:25:04 executing program 4: r0 = socket$inet(0x2b, 0x0, 0x0) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") bind$inet(r0, &(0x7f0000000000)={0x2, 0x0, @multicast2=0xe0000002}, 0x10) listen(r0, 0x0) 21:25:04 executing program 6: mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x4) r0 = socket(0xa, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000340)=@broute={'broute\x00', 0x20, 0x1, 0x90, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200000c0], 0x0, &(0x7f0000000080), &(0x7f00000000c0)=[{}, {}, {}]}, 0x108) [ 215.689554] gfs2: invalid mount option: l [ 215.693814] gfs2: can't parse mount arguments [ 215.719161] hfsplus: unable to find HFS+ superblock [ 215.738442] hfsplus: unable to find HFS+ superblock [ 215.756572] gfs2: invalid mount option: l [ 215.760924] gfs2: can't parse mount arguments [ 215.790524] kernel msg: ebtables bug: please report to author: Wrong len argument [ 215.802236] kernel msg: ebtables bug: please report to author: Wrong len argument 21:25:05 executing program 1: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup\x00', 0x200002, 0x0) r1 = openat$cgroup_int(r0, &(0x7f0000000200)='io.weight\x00', 0x2, 0x0) write$cgroup_int(r1, &(0x7f0000000080), 0x3) 21:25:05 executing program 0: syz_open_dev$sndseq(&(0x7f0000000000)='/dev/snd/seq\x00', 0x0, 0x0) userfaultfd(0x0) syz_open_dev$mice(&(0x7f0000000100)='/dev/input/mice\x00', 0x0, 0x0) pselect6(0x40, &(0x7f00000abfc0)={0x3ffffd}, &(0x7f0000768000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, &(0x7f00007fbfc0), &(0x7f0000f22000)={0x0, 0x989680}, &(0x7f0000f14000)={&(0x7f0000553ff8), 0x8}) 21:25:05 executing program 4: r0 = socket$inet(0x2b, 0x801, 0x0) r1 = socket$inet6(0xa, 0x0, 0x0) ioctl(r1, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") bind$inet(r0, &(0x7f0000000000)={0x2, 0x0, @multicast2=0xe0000002}, 0x10) listen(r0, 0x0) 21:25:05 executing program 7: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$hfsplus(&(0x7f0000000040)='hfsplus\x00', &(0x7f0000000080)='./file0\x00', 0x504d, 0x0, &(0x7f0000000300), 0x0, &(0x7f0000000380)) 21:25:05 executing program 6: r0 = socket$inet6(0xa, 0x3, 0x3) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") unshare(0x8000400) r1 = socket$inet6(0xa, 0x5, 0x0) fcntl$getown(r1, 0x9) 21:25:05 executing program 2: syz_mount_image$gfs2(&(0x7f0000000040)='gfs2\x00', &(0x7f0000001740)='./file0\x00', 0x0, 0x0, &(0x7f0000001680), 0x0, &(0x7f0000000880)=ANY=[@ANYBLOB='l']) [ 216.056295] hfsplus: unable to find HFS+ superblock [ 216.062986] gfs2: invalid mount option: l [ 216.067262] gfs2: can't parse mount arguments [ 216.099413] gfs2: invalid mount option: l [ 216.103770] gfs2: can't parse mount arguments 21:25:05 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback={0x0, 0x1}}, 0x1c) listen(r0, 0x4) r1 = accept4(r0, &(0x7f0000000040)=@can, &(0x7f00000000c0)=0x80, 0x0) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) sendto$inet6(r2, &(0x7f0000e33fe0)='X', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback={0x0, 0x1}}, 0x1c) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYBLOB="cc"], 0x1) shutdown(r2, 0x1) write$binfmt_misc(r1, &(0x7f0000000240)={'syz1'}, 0x34000) 21:25:05 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_mreq(r0, 0x29, 0x1b, &(0x7f0000000000)={@remote={0xfe, 0x80, [], 0xbb}}, 0x248) setsockopt$inet6_mreq(r0, 0x29, 0x1b, &(0x7f0000000380), 0x14) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000040)={'syz_tun\x00', 0x0}) setsockopt$inet6_mreq(r0, 0x29, 0x4000000001c, &(0x7f00000001c0)={@remote={0xfe, 0x80, [], 0xbb}, r1}, 0x14) mount$9p_xen(&(0x7f0000000080)='syz_tun\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='9p\x00', 0x1000000, &(0x7f0000000140)={'trans=\x00'}) 21:25:05 executing program 4: r0 = socket$inet(0x2b, 0x801, 0x0) r1 = socket$inet6(0xa, 0x0, 0x0) ioctl(r1, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") bind$inet(r0, &(0x7f0000000000)={0x2, 0x0, @multicast2=0xe0000002}, 0x10) listen(r0, 0x0) 21:25:05 executing program 5: r0 = syz_open_dev$sndpcmc(&(0x7f0000004fee)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) r1 = creat(&(0x7f0000000200)='./bus\x00', 0x0) write$cgroup_int(r1, &(0x7f0000000040), 0x1) r2 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r2, 0x8912, &(0x7f0000000200)="0047fc2f07d82c99240970") r3 = open(&(0x7f000000fffa)='./bus\x00', 0x0, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x800002, 0x1012, r3, 0x0) ioctl(r0, 0xc0884123, &(0x7f0000001f64)) 21:25:05 executing program 7: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$hfsplus(&(0x7f0000000040)='hfsplus\x00', &(0x7f0000000080)='./file0\x00', 0x8000000000000000, 0x0, &(0x7f0000000300), 0x0, &(0x7f0000000380)) 21:25:05 executing program 0: syz_open_dev$sndseq(&(0x7f0000000000)='/dev/snd/seq\x00', 0x0, 0x0) userfaultfd(0x0) syz_open_dev$mice(&(0x7f0000000100)='/dev/input/mice\x00', 0x0, 0x0) pselect6(0x40, &(0x7f00000abfc0)={0x3ffffd}, &(0x7f0000768000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x64}, &(0x7f00007fbfc0), &(0x7f0000f22000)={0x0, 0x989680}, &(0x7f0000f14000)={&(0x7f0000553ff8), 0x8}) 21:25:05 executing program 6: r0 = memfd_create(&(0x7f0000000080)='}\x00', 0x0) mmap(&(0x7f0000002000/0xc000)=nil, 0xc000, 0x0, 0x10, r0, 0x0) 21:25:05 executing program 2: syz_mount_image$gfs2(&(0x7f0000000040)='gfs2\x00', &(0x7f0000001740)='./file0\x00', 0x0, 0x0, &(0x7f0000001680), 0x0, &(0x7f0000000880)=ANY=[@ANYBLOB='l']) 21:25:05 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x3, &(0x7f0000001fd8)=@framed={{0xffffffb4, 0x6c, 0x0, 0x0, 0x0, 0x2000d06f}, [], {0x95}}, &(0x7f0000003ff6)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195}, 0x1f) 21:25:05 executing program 4: r0 = socket$inet(0x2b, 0x801, 0x0) r1 = socket$inet6(0xa, 0x0, 0x0) ioctl(r1, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") bind$inet(r0, &(0x7f0000000000)={0x2, 0x0, @multicast2=0xe0000002}, 0x10) listen(r0, 0x0) 21:25:05 executing program 1: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000000), 0x4) sendto$inet6(r0, &(0x7f000087dffe)='F', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x0, 0x0, @loopback={0x0, 0x1}}, 0x1c) 21:25:05 executing program 6: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uinput\x00', 0x1, 0x0) write$cgroup_int(r0, &(0x7f0000000080), 0x45c) [ 216.661411] gfs2: invalid mount option: l [ 216.665748] gfs2: can't parse mount arguments [ 216.688136] hfsplus: unable to find HFS+ superblock 21:25:05 executing program 0: syz_open_dev$sndseq(&(0x7f0000000000)='/dev/snd/seq\x00', 0x0, 0x0) userfaultfd(0x0) syz_open_dev$mice(&(0x7f0000000100)='/dev/input/mice\x00', 0x0, 0x0) pselect6(0x40, &(0x7f00000abfc0)={0x3ffffd}, &(0x7f0000768000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x10}, &(0x7f00007fbfc0), &(0x7f0000f22000)={0x0, 0x989680}, &(0x7f0000f14000)={&(0x7f0000553ff8), 0x8}) 21:25:05 executing program 7: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$hfsplus(&(0x7f0000000040)='hfsplus\x00', &(0x7f0000000080)='./file0\x00', 0x2000000000000000, 0x0, &(0x7f0000000300), 0x0, &(0x7f0000000380)) [ 216.715952] gfs2: invalid mount option: l [ 216.720454] gfs2: can't parse mount arguments 21:25:05 executing program 2: syz_mount_image$gfs2(&(0x7f0000000040)='gfs2H', &(0x7f0000001740)='./file0\x00', 0x0, 0x0, &(0x7f0000001680), 0x0, &(0x7f0000000880)=ANY=[@ANYBLOB='l']) 21:25:05 executing program 6: r0 = socket$inet6(0xa, 0x3, 0x3) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/vga_arbiter\x00', 0x1, 0x0) write$tun(r1, &(0x7f0000000180)={@void, @val, @ipx={0xffff, 0x1e, 0x0, 0x0, {@random, @current}, {@broadcast=0xffffffff, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff]}}}, 0x28) [ 216.808174] hfsplus: unable to find HFS+ superblock 21:25:06 executing program 0: syz_open_dev$sndseq(&(0x7f0000000000)='/dev/snd/seq\x00', 0x0, 0x0) userfaultfd(0x0) syz_open_dev$mice(&(0x7f0000000100)='/dev/input/mice\x00', 0x0, 0x0) pselect6(0x40, &(0x7f00000abfc0)={0x3ffffd}, &(0x7f0000768000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x1600000000000000}, &(0x7f00007fbfc0), &(0x7f0000f22000)={0x0, 0x989680}, &(0x7f0000f14000)={&(0x7f0000553ff8), 0x8}) 21:25:06 executing program 4: r0 = socket$inet(0x2b, 0x801, 0x0) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") bind$inet(r0, &(0x7f0000000000)={0x2, 0x0, @multicast2=0xe0000002}, 0x10) listen(r0, 0x0) 21:25:06 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_GET_MSR_INDEX_LIST(r0, 0xc004ae02, &(0x7f0000000140)=ANY=[@ANYRES32]) 21:25:06 executing program 7: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$hfsplus(&(0x7f0000000040)='hfsplus\x00', &(0x7f0000000080)='./file0\x00', 0x40000000, 0x0, &(0x7f0000000300), 0x0, &(0x7f0000000380)) 21:25:06 executing program 6: r0 = syz_open_procfs$namespace(0x0, &(0x7f0000000340)='ns/uts\x00') setns(r0, 0x0) 21:25:06 executing program 2: syz_mount_image$gfs2(&(0x7f0000000040)="67667332ff", &(0x7f0000001740)='./file0\x00', 0x0, 0x0, &(0x7f0000001680), 0x0, &(0x7f0000000880)=ANY=[@ANYBLOB='l']) 21:25:06 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback={0x0, 0x1}}, 0x1c) listen(r0, 0x4) r1 = accept4(r0, &(0x7f0000000040)=@can, &(0x7f00000000c0)=0x80, 0x0) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) sendto$inet6(r2, &(0x7f0000e33fe0)='X', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback={0x0, 0x1}}, 0x1c) write$binfmt_script(r2, &(0x7f0000000140)=ANY=[], 0x0) shutdown(r2, 0x1) write$binfmt_misc(r1, &(0x7f0000000240)={'syz1'}, 0x34000) 21:25:06 executing program 6: mbind(&(0x7f000052b000/0x2000)=nil, 0x2000, 0x8000000, &(0x7f0000000080), 0x0, 0x0) 21:25:06 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_GET_MSR_INDEX_LIST(r0, 0xc004ae02, &(0x7f0000000140)=ANY=[@ANYRES32]) [ 217.273441] hfsplus: unable to find HFS+ superblock 21:25:06 executing program 4: r0 = socket$inet(0x2b, 0x801, 0x0) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") bind$inet(r0, &(0x7f0000000000)={0x2, 0x0, @multicast2=0xe0000002}, 0x10) listen(r0, 0x0) 21:25:06 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETAF(r0, 0x5456, &(0x7f00000000c0)) 21:25:06 executing program 7: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$hfsplus(&(0x7f0000000040)='hfsplus\x00', &(0x7f0000000080)='./file0\x00', 0xa, 0x0, &(0x7f0000000300), 0x0, &(0x7f0000000380)) 21:25:06 executing program 0: syz_open_dev$sndseq(&(0x7f0000000000)='/dev/snd/seq\x00', 0x0, 0x0) userfaultfd(0x0) syz_open_dev$mice(&(0x7f0000000100)='/dev/input/mice\x00', 0x0, 0x0) pselect6(0x40, &(0x7f00000abfc0)={0x3ffffd}, &(0x7f0000768000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x6000000000000000}, &(0x7f00007fbfc0), &(0x7f0000f22000)={0x0, 0x989680}, &(0x7f0000f14000)={&(0x7f0000553ff8), 0x8}) 21:25:06 executing program 2: syz_mount_image$gfs2(&(0x7f0000000040)='gfs2\x00', &(0x7f0000001740)='./file0\x00', 0x0, 0x0, &(0x7f0000001680), 0x0, &(0x7f0000000880)=ANY=[@ANYBLOB='l']) 21:25:06 executing program 6: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu\x00', 0x200002, 0x0) r1 = openat$cgroup_int(r0, &(0x7f0000000340)='cpuset.memory_spread_page\x00', 0x2, 0x0) write$cgroup_int(r1, &(0x7f0000000300), 0x1) 21:25:06 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_GET_MSR_INDEX_LIST(r0, 0xc004ae02, &(0x7f0000000140)=ANY=[@ANYRES32]) 21:25:06 executing program 4: r0 = socket$inet(0x2b, 0x801, 0x0) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") bind$inet(r0, &(0x7f0000000000)={0x2, 0x0, @multicast2=0xe0000002}, 0x10) listen(r0, 0x0) 21:25:06 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x24, &(0x7f0000000100)=@nat={"6e61748800", 0x19, 0x1, 0x90, [0x200005c0, 0x0, 0x0, 0x200005f0, 0x20000620], 0x0, &(0x7f00000000c0), &(0x7f00000005c0)=[{}, {}, {}]}, 0x108) 21:25:06 executing program 1: mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f0000d04000)='./file0\x00', &(0x7f0000903000)='./file0\x00', &(0x7f0000811ffa)='bdev\x00', 0x0, &(0x7f0000444000)) 21:25:06 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$EBT_SO_GET_ENTRIES(r0, 0x0, 0x81, &(0x7f0000000440)={'broute\x00', 0x0, 0x0, 0x9b, [], 0x0, &(0x7f00000002c0), &(0x7f0000000380)=""/155}, &(0x7f00000004c0)=0x50) [ 217.619670] hfsplus: unable to find HFS+ superblock 21:25:06 executing program 1: mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f000000a000)='./file0\x00', &(0x7f0000026ff8)='./file0\x00', &(0x7f000000c000)='ramfs\x00', 0x0, &(0x7f000000a000)) mount(&(0x7f0000d04000)='./file0\x00', &(0x7f0000903000)='./file0\x00', &(0x7f0000811ffa)='bdev\x00', 0x100000, &(0x7f0000444000)) mount(&(0x7f0000000240)='./file0\x00', &(0x7f0000d78000)='.', &(0x7f0000fdb000)='ubifs\x00', 0x1003, 0x0) mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000cbeff8)='./file0\x00', &(0x7f00005f7ffa)='ramfs\x00', 0x80000, &(0x7f0000000080)) unshare(0x20000) 21:25:06 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_GET_MSR_INDEX_LIST(r0, 0xc004ae02, &(0x7f0000000140)=ANY=[@ANYRES32]) [ 217.654503] gfs2: invalid mount option: l [ 217.658819] gfs2: can't parse mount arguments [ 217.725482] gfs2: invalid mount option: l [ 217.729719] gfs2: can't parse mount arguments 21:25:07 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback={0x0, 0x1}}, 0x1c) listen(r0, 0x4) r1 = accept4(r0, &(0x7f0000000040)=@can, &(0x7f00000000c0)=0x80, 0x0) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) sendto$inet6(r2, &(0x7f0000e33fe0)='X', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback={0x0, 0x1}}, 0x1c) write$binfmt_script(r2, &(0x7f0000000140)=ANY=[], 0x0) shutdown(r2, 0x1) write$binfmt_misc(r1, &(0x7f0000000240)={'syz1'}, 0x34000) 21:25:07 executing program 1: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(&(0x7f0000000200)='./file0/file0\x00', &(0x7f0000000100)='./file0\x00', &(0x7f00000001c0)='sysfs\x00', 0x20000, &(0x7f0000000280)) 21:25:07 executing program 7: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$hfsplus(&(0x7f0000000040)='hfsplus\x00', &(0x7f0000000080)='./file0\x00', 0xfffffff6, 0x0, &(0x7f0000000300), 0x0, &(0x7f0000000380)) 21:25:07 executing program 4: r0 = socket$inet(0x2b, 0x801, 0x0) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x0, &(0x7f0000000280)="025cc83d6d345f8f762070") bind$inet(r0, &(0x7f0000000000)={0x2, 0x0, @multicast2=0xe0000002}, 0x10) listen(r0, 0x0) 21:25:07 executing program 6: execveat(0xffffffffffffffff, &(0x7f0000000080)='./file0/file0\x00', &(0x7f00000003c0), &(0x7f0000000500), 0x1100) 21:25:07 executing program 2: syz_mount_image$gfs2(&(0x7f0000000040)="67667332ff", &(0x7f0000001740)='./file0\x00', 0x0, 0x0, &(0x7f0000001680), 0x0, &(0x7f0000000880)=ANY=[@ANYBLOB='l']) 21:25:07 executing program 0: syz_open_dev$sndseq(&(0x7f0000000000)='/dev/snd/seq\x00', 0x0, 0x0) userfaultfd(0x0) syz_open_dev$mice(&(0x7f0000000100)='/dev/input/mice\x00', 0x0, 0x0) pselect6(0x40, &(0x7f00000abfc0)={0x3ffffd}, &(0x7f0000768000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x1600}, &(0x7f00007fbfc0), &(0x7f0000f22000)={0x0, 0x989680}, &(0x7f0000f14000)={&(0x7f0000553ff8), 0x8}) 21:25:07 executing program 5: ioctl$KVM_GET_MSR_INDEX_LIST(0xffffffffffffffff, 0xc004ae02, &(0x7f0000000140)=ANY=[@ANYRES32]) 21:25:07 executing program 6: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000240)='/dev/snapshot\x00', 0x0, 0x0) fcntl$setstatus(r0, 0x4, 0x4c00) 21:25:07 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r0, 0x10e, 0x1, &(0x7f0000000180)=0x1, 0x4) 21:25:07 executing program 1: syz_open_procfs(0x0, &(0x7f0000000200)="636f726564756d705f66ca9b63cdf6b4") 21:25:07 executing program 1: 21:25:07 executing program 1: 21:25:07 executing program 1: 21:25:07 executing program 1: 21:25:07 executing program 1: [ 218.188264] hfsplus: unable to find HFS+ superblock 21:25:07 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback={0x0, 0x1}}, 0x1c) listen(r0, 0x4) r1 = accept4(r0, &(0x7f0000000040)=@can, &(0x7f00000000c0)=0x80, 0x0) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) sendto$inet6(r2, &(0x7f0000e33fe0)='X', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback={0x0, 0x1}}, 0x1c) write$binfmt_script(r2, &(0x7f0000000140)=ANY=[], 0x0) shutdown(r2, 0x1) write$binfmt_misc(r1, &(0x7f0000000240)={'syz1'}, 0x34000) 21:25:07 executing program 1: 21:25:07 executing program 6: syz_open_procfs(0x0, &(0x7f0000000000)='net/bnep\x00') 21:25:07 executing program 4: r0 = socket$inet(0x2b, 0x801, 0x0) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x0, &(0x7f0000000280)="025cc83d6d345f8f762070") bind$inet(r0, &(0x7f0000000000)={0x2, 0x0, @multicast2=0xe0000002}, 0x10) listen(r0, 0x0) 21:25:07 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_GET_MSR_INDEX_LIST(0xffffffffffffffff, 0xc004ae02, &(0x7f0000000140)=ANY=[@ANYRES32]) 21:25:07 executing program 2: syz_mount_image$gfs2(&(0x7f0000000040)='gfs2h', &(0x7f0000001740)='./file0\x00', 0x0, 0x0, &(0x7f0000001680), 0x0, &(0x7f0000000880)=ANY=[@ANYBLOB='l']) 21:25:07 executing program 0: syz_open_dev$sndseq(&(0x7f0000000000)='/dev/snd/seq\x00', 0x0, 0x0) userfaultfd(0x0) syz_open_dev$mice(&(0x7f0000000100)='/dev/input/mice\x00', 0x0, 0x0) pselect6(0x40, &(0x7f00000abfc0)={0x3ffffd}, &(0x7f0000768000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x6000}, &(0x7f00007fbfc0), &(0x7f0000f22000)={0x0, 0x989680}, &(0x7f0000f14000)={&(0x7f0000553ff8), 0x8}) 21:25:07 executing program 7: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$hfsplus(&(0x7f0000000040)='hfsplus\x00', &(0x7f0000000080)='./file0\x00', 0xd, 0x0, &(0x7f0000000300), 0x0, &(0x7f0000000380)) 21:25:07 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000080)={0x0, 0x0, 0x0}, &(0x7f0000000200)=0xc) fchown(r0, 0x0, r1) 21:25:07 executing program 1: 21:25:08 executing program 1: 21:25:08 executing program 1: 21:25:08 executing program 1: 21:25:08 executing program 1: [ 218.992595] hfsplus: unable to find HFS+ superblock 21:25:08 executing program 6: 21:25:08 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_GET_MSR_INDEX_LIST(r0, 0xc004ae02, &(0x7f0000000140)=ANY=[]) [ 219.063583] hfsplus: unable to find HFS+ superblock 21:25:08 executing program 0: syz_open_dev$sndseq(&(0x7f0000000000)='/dev/snd/seq\x00', 0x0, 0x0) userfaultfd(0x0) syz_open_dev$mice(&(0x7f0000000100)='/dev/input/mice\x00', 0x0, 0x0) pselect6(0x40, &(0x7f00000abfc0)={0x3ffffd}, &(0x7f0000768000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x16000000}, &(0x7f00007fbfc0), &(0x7f0000f22000)={0x0, 0x989680}, &(0x7f0000f14000)={&(0x7f0000553ff8), 0x8}) 21:25:08 executing program 1: 21:25:08 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback={0x0, 0x1}}, 0x1c) listen(r0, 0x4) r1 = accept4(r0, &(0x7f0000000040)=@can, &(0x7f00000000c0)=0x80, 0x0) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) sendto$inet6(r2, &(0x7f0000e33fe0)='X', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback={0x0, 0x1}}, 0x1c) write$binfmt_script(r2, &(0x7f0000000140)=ANY=[@ANYBLOB], 0x0) shutdown(r2, 0x1) write$binfmt_misc(r1, &(0x7f0000000240)={'syz1'}, 0x34000) 21:25:08 executing program 6: 21:25:08 executing program 2: syz_mount_image$gfs2(&(0x7f0000000040)="67667332e0", &(0x7f0000001740)='./file0\x00', 0x0, 0x0, &(0x7f0000001680), 0x0, &(0x7f0000000880)=ANY=[@ANYBLOB='l']) 21:25:08 executing program 5: 21:25:08 executing program 7: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$hfsplus(&(0x7f0000000040)='hfsplus\x00', &(0x7f0000000080)='./file0\x00', 0x8cffffff00000000, 0x0, &(0x7f0000000300), 0x0, &(0x7f0000000380)) 21:25:08 executing program 4: r0 = socket$inet(0x2b, 0x801, 0x0) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x0, &(0x7f0000000280)="025cc83d6d345f8f762070") bind$inet(r0, &(0x7f0000000000)={0x2, 0x0, @multicast2=0xe0000002}, 0x10) listen(r0, 0x0) 21:25:08 executing program 1: 21:25:08 executing program 1: 21:25:08 executing program 1: 21:25:08 executing program 1: 21:25:08 executing program 1: 21:25:08 executing program 1: 21:25:08 executing program 1: 21:25:08 executing program 5: [ 219.868460] hfsplus: unable to find HFS+ superblock 21:25:08 executing program 0: syz_open_dev$sndseq(&(0x7f0000000000)='/dev/snd/seq\x00', 0x0, 0x0) userfaultfd(0x0) syz_open_dev$mice(&(0x7f0000000100)='/dev/input/mice\x00', 0x0, 0x0) pselect6(0x40, &(0x7f00000abfc0)={0x3ffffd}, &(0x7f0000768000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x16}, &(0x7f00007fbfc0), &(0x7f0000f22000)={0x0, 0x989680}, &(0x7f0000f14000)={&(0x7f0000553ff8), 0x8}) 21:25:08 executing program 1: 21:25:09 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback={0x0, 0x1}}, 0x1c) listen(r0, 0x4) r1 = accept4(r0, &(0x7f0000000040)=@can, &(0x7f00000000c0)=0x80, 0x0) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) sendto$inet6(r2, &(0x7f0000e33fe0)='X', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback={0x0, 0x1}}, 0x1c) write$binfmt_script(r2, &(0x7f0000000140)=ANY=[@ANYBLOB], 0x0) shutdown(r2, 0x1) write$binfmt_misc(r1, &(0x7f0000000240)={'syz1'}, 0x34000) 21:25:09 executing program 6: 21:25:09 executing program 4: r0 = socket$inet(0x2b, 0x801, 0x0) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000280)) bind$inet(r0, &(0x7f0000000000)={0x2, 0x0, @multicast2=0xe0000002}, 0x10) listen(r0, 0x0) 21:25:09 executing program 1: 21:25:09 executing program 2: syz_mount_image$gfs2(&(0x7f0000000040)="67667332e0", &(0x7f0000001740)='./file0\x00', 0x0, 0x0, &(0x7f0000001680), 0x0, &(0x7f0000000880)=ANY=[@ANYBLOB='l']) 21:25:09 executing program 7: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$hfsplus(&(0x7f0000000040)='hfsplus\x00', &(0x7f0000000080)='./file0\x00', 0x400000000000000, 0x0, &(0x7f0000000300), 0x0, &(0x7f0000000380)) 21:25:09 executing program 5: 21:25:09 executing program 0: syz_open_dev$sndseq(&(0x7f0000000000)='/dev/snd/seq\x00', 0x0, 0x0) userfaultfd(0x0) syz_open_dev$mice(&(0x7f0000000100)='/dev/input/mice\x00', 0x0, 0x0) pselect6(0x40, &(0x7f00000abfc0)={0x3ffffd}, &(0x7f0000768000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x60}, &(0x7f00007fbfc0), &(0x7f0000f22000)={0x0, 0x989680}, &(0x7f0000f14000)={&(0x7f0000553ff8), 0x8}) 21:25:09 executing program 1: 21:25:09 executing program 1: 21:25:09 executing program 1: 21:25:09 executing program 1: 21:25:09 executing program 6: 21:25:09 executing program 1: 21:25:09 executing program 1: [ 220.716988] hfsplus: unable to find HFS+ superblock 21:25:09 executing program 1: 21:25:10 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback={0x0, 0x1}}, 0x1c) listen(r0, 0x4) r1 = accept4(r0, &(0x7f0000000040)=@can, &(0x7f00000000c0)=0x80, 0x0) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) sendto$inet6(r2, &(0x7f0000e33fe0)='X', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback={0x0, 0x1}}, 0x1c) write$binfmt_script(r2, &(0x7f0000000140)=ANY=[@ANYBLOB], 0x0) shutdown(r2, 0x1) write$binfmt_misc(r1, &(0x7f0000000240)={'syz1'}, 0x34000) 21:25:10 executing program 5: 21:25:10 executing program 1: 21:25:10 executing program 4: r0 = socket$inet(0x2b, 0x801, 0x0) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000280)) bind$inet(r0, &(0x7f0000000000)={0x2, 0x0, @multicast2=0xe0000002}, 0x10) listen(r0, 0x0) 21:25:10 executing program 0: syz_open_dev$sndseq(&(0x7f0000000000)='/dev/snd/seq\x00', 0x0, 0x0) userfaultfd(0x0) syz_open_dev$mice(&(0x7f0000000100)='/dev/input/mice\x00', 0x0, 0x0) pselect6(0x40, &(0x7f00000abfc0)={0x3ffffd}, &(0x7f0000768000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x6400000000000000}, &(0x7f00007fbfc0), &(0x7f0000f22000)={0x0, 0x989680}, &(0x7f0000f14000)={&(0x7f0000553ff8), 0x8}) 21:25:10 executing program 6: 21:25:10 executing program 7: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$hfsplus(&(0x7f0000000040)='hfsplus\x00', &(0x7f0000000080)='./file0\x00', 0x200000000000000, 0x0, &(0x7f0000000300), 0x0, &(0x7f0000000380)) 21:25:10 executing program 2: syz_mount_image$gfs2(&(0x7f0000000040)='gfs2\x00', &(0x7f0000001740)='./file0\x00', 0x0, 0x0, &(0x7f0000001680), 0x0, &(0x7f0000000880)=ANY=[@ANYBLOB='l']) 21:25:10 executing program 1: 21:25:10 executing program 1: 21:25:10 executing program 1: 21:25:10 executing program 1: [ 221.556736] hfsplus: unable to find HFS+ superblock 21:25:10 executing program 1: 21:25:10 executing program 1: 21:25:10 executing program 1: 21:25:10 executing program 6: [ 221.584313] gfs2: invalid mount option: l [ 221.588620] gfs2: can't parse mount arguments [ 221.656563] gfs2: invalid mount option: l [ 221.660940] gfs2: can't parse mount arguments 21:25:11 executing program 4: r0 = socket$inet(0x2b, 0x801, 0x0) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000280)) bind$inet(r0, &(0x7f0000000000)={0x2, 0x0, @multicast2=0xe0000002}, 0x10) listen(r0, 0x0) 21:25:11 executing program 1: 21:25:11 executing program 2: syz_mount_image$gfs2(&(0x7f0000000040)='gfs2\x00', &(0x7f0000001740)='./file0\x00', 0x0, 0x0, &(0x7f0000001680), 0x0, &(0x7f0000000880)=ANY=[@ANYBLOB='l']) 21:25:11 executing program 0: syz_open_dev$sndseq(&(0x7f0000000000)='/dev/snd/seq\x00', 0x0, 0x0) userfaultfd(0x0) syz_open_dev$mice(&(0x7f0000000100)='/dev/input/mice\x00', 0x0, 0x0) pselect6(0x40, &(0x7f00000abfc0)={0x3ffffd}, &(0x7f0000768000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000000000000}, &(0x7f00007fbfc0), &(0x7f0000f22000)={0x0, 0x989680}, &(0x7f0000f14000)={&(0x7f0000553ff8), 0x8}) 21:25:11 executing program 7: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$hfsplus(&(0x7f0000000040)='hfsplus\x00', &(0x7f0000000080)='./file0\x00', 0xedc000000000, 0x0, &(0x7f0000000300), 0x0, &(0x7f0000000380)) 21:25:11 executing program 6: 21:25:11 executing program 5: 21:25:11 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback={0x0, 0x1}}, 0x1c) listen(r0, 0x4) r1 = accept4(r0, &(0x7f0000000040)=@can, &(0x7f00000000c0)=0x80, 0x0) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) sendto$inet6(r2, &(0x7f0000e33fe0)='X', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback={0x0, 0x1}}, 0x1c) write$binfmt_script(r2, &(0x7f0000000140)=ANY=[@ANYBLOB="cc"], 0x1) shutdown(0xffffffffffffffff, 0x1) write$binfmt_misc(r1, &(0x7f0000000240)={'syz1'}, 0x34000) 21:25:11 executing program 1: 21:25:11 executing program 1: 21:25:11 executing program 6: 21:25:11 executing program 1: 21:25:11 executing program 1: 21:25:11 executing program 1: 21:25:11 executing program 1: 21:25:11 executing program 6: 21:25:11 executing program 4: r0 = socket$inet(0x2b, 0x801, 0x0) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000280)="025cc83d6d34") bind$inet(r0, &(0x7f0000000000)={0x2, 0x0, @multicast2=0xe0000002}, 0x10) listen(r0, 0x0) [ 222.613330] gfs2: invalid mount option: l [ 222.617590] gfs2: can't parse mount arguments [ 222.642453] hfsplus: unable to find HFS+ superblock [ 222.675831] gfs2: invalid mount option: l [ 222.680158] gfs2: can't parse mount arguments 21:25:12 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback={0x0, 0x1}}, 0x1c) listen(r0, 0x4) r1 = accept4(r0, &(0x7f0000000040)=@can, &(0x7f00000000c0)=0x80, 0x0) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) sendto$inet6(r2, &(0x7f0000e33fe0)='X', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback={0x0, 0x1}}, 0x1c) write$binfmt_script(r2, &(0x7f0000000140)=ANY=[@ANYBLOB="cc"], 0x1) shutdown(0xffffffffffffffff, 0x1) write$binfmt_misc(r1, &(0x7f0000000240)={'syz1'}, 0x34000) 21:25:12 executing program 1: 21:25:12 executing program 5: 21:25:12 executing program 0: syz_open_dev$sndseq(&(0x7f0000000000)='/dev/snd/seq\x00', 0x0, 0x0) userfaultfd(0x0) syz_open_dev$mice(&(0x7f0000000100)='/dev/input/mice\x00', 0x0, 0x0) pselect6(0x40, &(0x7f00000abfc0)={0x3ffffd}, &(0x7f0000768000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000000000}, &(0x7f00007fbfc0), &(0x7f0000f22000)={0x0, 0x989680}, &(0x7f0000f14000)={&(0x7f0000553ff8), 0x8}) 21:25:12 executing program 6: 21:25:12 executing program 7: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$hfsplus(&(0x7f0000000040)='hfsplus\x00', &(0x7f0000000080)='./file0\x00', 0x500, 0x0, &(0x7f0000000300), 0x0, &(0x7f0000000380)) 21:25:12 executing program 2: syz_mount_image$gfs2(&(0x7f0000000040)="6766733205", &(0x7f0000001740)='./file0\x00', 0x0, 0x0, &(0x7f0000001680), 0x0, &(0x7f0000000880)=ANY=[@ANYBLOB='l']) 21:25:12 executing program 4: r0 = socket$inet(0x2b, 0x801, 0x0) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000280)="025cc83d6d34") bind$inet(r0, &(0x7f0000000000)={0x2, 0x0, @multicast2=0xe0000002}, 0x10) listen(r0, 0x0) 21:25:12 executing program 1: 21:25:12 executing program 1: 21:25:12 executing program 1: r0 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$update(0x2, r0, &(0x7f0000000080)='\b', 0x1) 21:25:12 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) getsockopt$ARPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x63, &(0x7f00000003c0)={'icmp6\x00'}, &(0x7f0000000400)=0x1e) 21:25:12 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") getpriority(0x1, 0x0) 21:25:12 executing program 4: r0 = socket$inet(0x2b, 0x801, 0x0) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000280)="025cc83d6d34") bind$inet(r0, &(0x7f0000000000)={0x2, 0x0, @multicast2=0xe0000002}, 0x10) listen(r0, 0x0) 21:25:12 executing program 6: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$LOOP_GET_STATUS64(0xffffffffffffffff, 0x4c05, &(0x7f0000000040)) perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x2000000005, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={&(0x7f0000000000), 0x1}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$EBT_SO_GET_INFO(r0, 0x0, 0x80, &(0x7f0000000080)={'nat\x00'}, &(0x7f0000000000)=0x78) 21:25:12 executing program 0: syz_open_dev$sndseq(&(0x7f0000000000)='/dev/snd/seq\x00', 0x0, 0x0) userfaultfd(0x0) syz_open_dev$mice(&(0x7f0000000100)='/dev/input/mice\x00', 0x0, 0x0) pselect6(0x40, &(0x7f00000abfc0)={0x3ffffd}, &(0x7f0000768000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x16}, &(0x7f00007fbfc0), &(0x7f0000f22000)={0x0, 0x989680}, &(0x7f0000f14000)={&(0x7f0000553ff8), 0x8}) [ 223.449147] attempt to access beyond end of device [ 223.454370] loop7: rw=2048, want=3, limit=2 [ 223.483081] hfsplus: unable to find HFS+ superblock 21:25:13 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback={0x0, 0x1}}, 0x1c) listen(r0, 0x4) r1 = accept4(r0, &(0x7f0000000040)=@can, &(0x7f00000000c0)=0x80, 0x0) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) sendto$inet6(r2, &(0x7f0000e33fe0)='X', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback={0x0, 0x1}}, 0x1c) write$binfmt_script(r2, &(0x7f0000000140)=ANY=[@ANYBLOB="cc"], 0x1) shutdown(0xffffffffffffffff, 0x1) write$binfmt_misc(r1, &(0x7f0000000240)={'syz1'}, 0x34000) 21:25:13 executing program 1: r0 = semget$private(0x0, 0x7, 0x0) semtimedop(r0, &(0x7f0000000040)=[{0x0, 0xffffffffffffffff, 0x1800}], 0x1, &(0x7f00000000c0)) 21:25:13 executing program 7: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$hfsplus(&(0x7f0000000040)='hfsplus\x00', &(0x7f0000000080)='./file0\x00', 0x23, 0x0, &(0x7f0000000300), 0x0, &(0x7f0000000380)) 21:25:13 executing program 2: syz_mount_image$gfs2(&(0x7f0000000040)="67667332f6", &(0x7f0000001740)='./file0\x00', 0x0, 0x0, &(0x7f0000001680), 0x0, &(0x7f0000000880)=ANY=[@ANYBLOB='l']) 21:25:13 executing program 4: r0 = socket$inet(0x2b, 0x801, 0x0) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f76") bind$inet(r0, &(0x7f0000000000)={0x2, 0x0, @multicast2=0xe0000002}, 0x10) listen(r0, 0x0) 21:25:13 executing program 6: 21:25:13 executing program 5: perf_event_open(&(0x7f0000940000)={0x2, 0x78, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = add_key$user(&(0x7f0000000000)='user\x00', &(0x7f00000000c0)={0x73, 0x79, 0x7a}, &(0x7f0000000140)='9', 0x1, 0xfffffffffffffffc) keyctl$invalidate(0x15, r1) 21:25:13 executing program 0: syz_open_dev$sndseq(&(0x7f0000000000)='/dev/snd/seq\x00', 0x0, 0x0) userfaultfd(0x0) syz_open_dev$mice(&(0x7f0000000100)='/dev/input/mice\x00', 0x0, 0x0) pselect6(0x40, &(0x7f00000abfc0)={0x3ffffd}, &(0x7f0000768000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6000000000000000}, &(0x7f00007fbfc0), &(0x7f0000f22000)={0x0, 0x989680}, &(0x7f0000f14000)={&(0x7f0000553ff8), 0x8}) 21:25:13 executing program 1: 21:25:13 executing program 1: socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000100)) 21:25:13 executing program 1: openat$rtc(0xffffffffffffff9c, &(0x7f0000000100)='/dev/rtc0\x00', 0x0, 0x0) perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x40000000) rt_sigpending(&(0x7f0000000040), 0x8) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f00000000c0)={'lo\x00@\x00'}) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000b80)={'syz_tun\x00'}) getsockname$packet(0xffffffffffffffff, &(0x7f0000000bc0), &(0x7f0000000c00)=0x14) msgctl$MSG_STAT(0x0, 0xb, &(0x7f0000000340)=""/211) 21:25:13 executing program 6: perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) semctl$IPC_SET(0x0, 0x0, 0x1, &(0x7f00000004c0)={{0x8, 0x0, 0x0, 0x0, 0x0, 0x5}}) 21:25:13 executing program 4: r0 = socket$inet(0x2b, 0x801, 0x0) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f76") bind$inet(r0, &(0x7f0000000000)={0x2, 0x0, @multicast2=0xe0000002}, 0x10) listen(r0, 0x0) [ 224.292518] IPVS: ftp: loaded support on port[0] = 21 [ 224.318681] hfsplus: unable to find HFS+ superblock 21:25:13 executing program 0: syz_open_dev$sndseq(&(0x7f0000000000)='/dev/snd/seq\x00', 0x0, 0x0) userfaultfd(0x0) syz_open_dev$mice(&(0x7f0000000100)='/dev/input/mice\x00', 0x0, 0x0) pselect6(0x40, &(0x7f00000abfc0)={0x3ffffd}, &(0x7f0000768000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000000000000}, &(0x7f00007fbfc0), &(0x7f0000f22000)={0x0, 0x989680}, &(0x7f0000f14000)={&(0x7f0000553ff8), 0x8}) [ 224.337920] IPVS: ftp: loaded support on port[0] = 21 21:25:13 executing program 1: perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_SIOCBRDELBR(r0, 0x89a1, &(0x7f0000000040)='vcan0\x00') 21:25:13 executing program 1: msgctl$IPC_SET(0x0, 0x1, &(0x7f00000006c0)) [ 224.435661] hfsplus: unable to find HFS+ superblock 21:25:14 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback={0x0, 0x1}}, 0x1c) listen(r0, 0x4) r1 = accept4(r0, &(0x7f0000000040)=@can, &(0x7f00000000c0)=0x80, 0x0) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) sendto$inet6(r2, &(0x7f0000e33fe0)='X', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback={0x0, 0x1}}, 0x1c) write$binfmt_script(r2, &(0x7f0000000140)=ANY=[@ANYBLOB="cc"], 0x1) shutdown(r2, 0x0) write$binfmt_misc(r1, &(0x7f0000000240)={'syz1'}, 0x34000) 21:25:14 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCGID(r1, 0x80084502, &(0x7f00000000c0)=""/36) 21:25:14 executing program 1: r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$unix(0x1, 0x200000000000001, 0x0) bind$unix(r1, &(0x7f0000366000)=@file={0x1, "e91f7189591e9233614b00"}, 0xc) listen(r1, 0x0) connect$unix(r0, &(0x7f0000000180)=@file={0x1, "e91f7189591e9233614b00"}, 0x6e) bind$unix(r0, &(0x7f0000000080)=@abs={0x1}, 0x6e) accept4$unix(r1, &(0x7f0000000300)=@abs, &(0x7f00000013c0)=0x6e, 0x0) 21:25:14 executing program 7: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$hfsplus(&(0x7f0000000040)='hfsplus\x00', &(0x7f0000000080)='./file0\x00', 0x5, 0x0, &(0x7f0000000300), 0x0, &(0x7f0000000380)) 21:25:14 executing program 2: syz_mount_image$gfs2(&(0x7f0000000040)='gfs2\x00', &(0x7f0000001740)='./file0\x00', 0x0, 0x0, &(0x7f0000001680), 0x0, &(0x7f0000000880)=ANY=[@ANYBLOB='l']) 21:25:14 executing program 6: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10, &(0x7f0000000000), 0x4) 21:25:14 executing program 4: r0 = socket$inet(0x2b, 0x801, 0x0) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f76") bind$inet(r0, &(0x7f0000000000)={0x2, 0x0, @multicast2=0xe0000002}, 0x10) listen(r0, 0x0) 21:25:14 executing program 0: syz_open_dev$sndseq(&(0x7f0000000000)='/dev/snd/seq\x00', 0x0, 0x0) userfaultfd(0x0) syz_open_dev$mice(&(0x7f0000000100)='/dev/input/mice\x00', 0x0, 0x0) pselect6(0x40, &(0x7f00000abfc0)={0x3ffffd}, &(0x7f0000768000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x16000000}, &(0x7f00007fbfc0), &(0x7f0000f22000)={0x0, 0x989680}, &(0x7f0000f14000)={&(0x7f0000553ff8), 0x8}) 21:25:14 executing program 1: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount$9p_xen(&(0x7f0000003e80)='cgroup\x00', &(0x7f0000003ec0)='./file0\x00', &(0x7f0000003f00)='9p\x00', 0x1000, &(0x7f0000003f40)=ANY=[]) pivot_root(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='.\x00') 21:25:14 executing program 1: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup\x00', 0x200002, 0x0) fchdir(r0) perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000002ff0), 0x0, &(0x7f0000000180)}, 0x0) mount$9p_xen(&(0x7f0000003e80)='cgroup\x00', &(0x7f0000003ec0)='./file0\x00', &(0x7f0000003f00)='9p\x00', 0x1000, &(0x7f0000003f40)=ANY=[]) 21:25:14 executing program 1: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) fchdir(r0) r1 = creat(&(0x7f00000001c0)='./file1\x00', 0x0) fallocate(r1, 0x0, 0x0, 0x80003ff) creat(&(0x7f0000000080)='./file1\x00', 0x0) 21:25:14 executing program 4: r0 = socket$inet(0x2b, 0x801, 0x0) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f7620") bind$inet(r0, &(0x7f0000000000)={0x2, 0x0, @multicast2=0xe0000002}, 0x10) listen(r0, 0x0) [ 225.190257] gfs2: invalid mount option: l [ 225.194494] gfs2: can't parse mount arguments [ 225.199875] hfsplus: unable to find HFS+ superblock 21:25:14 executing program 1: r0 = socket$unix(0x1, 0x1, 0x0) connect$unix(r0, &(0x7f0000000000)=@abs={0x1}, 0x6e) 21:25:14 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") getsockopt$sock_timeval(r0, 0x1, 0x15, &(0x7f00000000c0), &(0x7f0000000100)=0x10) 21:25:14 executing program 6: r0 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f00001edff0)={0x2, 0x4e20, @multicast1=0xe0000001}, 0x10) connect$inet(r0, &(0x7f0000000080)={0x2, 0x0, @loopback=0x7f000001}, 0x10) clock_gettime(0x0, &(0x7f0000000b80)={0x0}) recvmmsg(r0, &(0x7f0000000b00)=[{{&(0x7f0000000200)=@pppol2tpin6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @local}}}, 0x80, &(0x7f0000000680), 0x0, &(0x7f0000000700)=""/147, 0x93}}, {{0x0, 0x0, &(0x7f0000000a80)}}], 0x2, 0x2, &(0x7f0000000bc0)={r1}) sendto$inet(r0, &(0x7f0000000000), 0x0, 0x0, &(0x7f00000000c0)={0x2, 0x4e20, @multicast1=0xe0000001}, 0x10) 21:25:14 executing program 1: perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0x1) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f0000000200)={@local={0xfe, 0x80, [], 0xaa}, @empty, @ipv4={[], [0xff, 0xff], @multicast2=0xe0000002}}) [ 225.269571] gfs2: invalid mount option: l [ 225.273978] gfs2: can't parse mount arguments 21:25:15 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback={0x0, 0x1}}, 0x1c) listen(r0, 0x4) r1 = accept4(r0, &(0x7f0000000040)=@can, &(0x7f00000000c0)=0x80, 0x0) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) sendto$inet6(r2, &(0x7f0000e33fe0)='X', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback={0x0, 0x1}}, 0x1c) write$binfmt_script(r2, &(0x7f0000000140)=ANY=[@ANYBLOB="cc"], 0x1) shutdown(r2, 0x0) write$binfmt_misc(r1, &(0x7f0000000240)={'syz1'}, 0x34000) 21:25:15 executing program 1: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount$9p_xen(&(0x7f0000003e80)='cgroup\x00', &(0x7f0000003ec0)='./file0\x00', &(0x7f0000003f00)='9p\x00', 0x1000, &(0x7f0000003f40)=ANY=[]) mount$9p_xen(&(0x7f0000000000)="73797374656d706f7369785f61636c5f6163636573734076626f786e657431c52e5e00", &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='9p\x00', 0x101022, &(0x7f0000000140)={'trans=xen,'}) 21:25:15 executing program 0: syz_open_dev$sndseq(&(0x7f0000000000)='/dev/snd/seq\x00', 0x0, 0x0) userfaultfd(0x0) syz_open_dev$mice(&(0x7f0000000100)='/dev/input/mice\x00', 0x0, 0x0) pselect6(0x40, &(0x7f00000abfc0)={0x3ffffd}, &(0x7f0000768000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6000}, &(0x7f00007fbfc0), &(0x7f0000f22000)={0x0, 0x989680}, &(0x7f0000f14000)={&(0x7f0000553ff8), 0x8}) 21:25:15 executing program 2: syz_mount_image$gfs2(&(0x7f0000000040)='gfs2\x00', &(0x7f0000001740)='./file0\x00', 0x0, 0x0, &(0x7f0000001680), 0x0, &(0x7f0000000880)=ANY=[@ANYBLOB='l']) 21:25:15 executing program 7: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$hfsplus(&(0x7f0000000040)='hfsplus\x00', &(0x7f0000000080)='./file0\x00', 0x900, 0x0, &(0x7f0000000300), 0x0, &(0x7f0000000380)) 21:25:15 executing program 4: r0 = socket$inet(0x2b, 0x801, 0x0) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f7620") bind$inet(r0, &(0x7f0000000000)={0x2, 0x0, @multicast2=0xe0000002}, 0x10) listen(r0, 0x0) 21:25:15 executing program 5: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f000000cfe4)={0xa, 0x0, 0x0, @loopback={0x0, 0x1}}, 0x1c) perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmsg(r0, &(0x7f0000000400)={&(0x7f0000000000)=@nfc, 0x10, &(0x7f0000000080), 0x0, &(0x7f0000000100)=""/128, 0x80}, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000002ff0), 0x0, &(0x7f0000000180)}, 0x0) 21:25:15 executing program 1: r0 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$lock(r0, 0x6, &(0x7f00000000c0)={0x2}) 21:25:15 executing program 1: perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = gettid() sched_setaffinity(0x0, 0x8, &(0x7f0000000040)) syz_open_procfs(r0, &(0x7f0000000080)='fd/3\x00') 21:25:15 executing program 1: accept$inet(0xffffffffffffffff, &(0x7f0000000000), &(0x7f0000000040)=0x10) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x23, &(0x7f0000000080)={@remote, @remote, 0x0}, &(0x7f00000000c0)=0xc) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x31, 0xffffffffffffffff, 0x0) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000140)='/dev/autofs\x00', 0x1a840, 0x0) connect$packet(r1, &(0x7f0000000180)={0x11, 0xf8, r0, 0x1, 0x0, 0x6, @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}}, 0x14) r2 = socket$inet_udp(0x2, 0x2, 0x0) getrandom(&(0x7f0000000100)=""/29, 0x1d, 0x2) r3 = openat$zero(0xffffffffffffff9c, &(0x7f0000000200)='/dev/zero\x00', 0x109400, 0x0) ioctl$KDSKBLED(r3, 0x4b65, 0x2406b05a) r4 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r4, 0x8912, &(0x7f0000000280)="025cc83d6d34") perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000b32fff)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fanotify_mark(0xffffffffffffffff, 0x0, 0x0, 0xffffffffffffffff, &(0x7f0000000080)='./file0/file0\x00') setsockopt$inet_mreqsrc(r2, 0x0, 0x25, &(0x7f00000001c0)={@remote={0xac, 0x14, 0x14, 0xbb}, @multicast2=0xe0000002, @loopback=0x7f000001}, 0xfffffffffffffdbc) 21:25:15 executing program 4: r0 = socket$inet(0x2b, 0x801, 0x0) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f7620") bind$inet(r0, &(0x7f0000000000)={0x2, 0x0, @multicast2=0xe0000002}, 0x10) listen(r0, 0x0) [ 226.086412] gfs2: invalid mount option: l [ 226.090790] gfs2: can't parse mount arguments [ 226.100934] hfsplus: unable to find HFS+ superblock [ 226.125126] gfs2: invalid mount option: l [ 226.129435] gfs2: can't parse mount arguments 21:25:15 executing program 0: syz_open_dev$sndseq(&(0x7f0000000000)='/dev/snd/seq\x00', 0x0, 0x0) userfaultfd(0x0) syz_open_dev$mice(&(0x7f0000000100)='/dev/input/mice\x00', 0x0, 0x0) pselect6(0x40, &(0x7f00000abfc0)={0x3ffffd}, &(0x7f0000768000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x64}, &(0x7f00007fbfc0), &(0x7f0000f22000)={0x0, 0x989680}, &(0x7f0000f14000)={&(0x7f0000553ff8), 0x8}) 21:25:15 executing program 7: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$hfsplus(&(0x7f0000000040)='hfsplus\x00', &(0x7f0000000080)='./file0\x00', 0x600, 0x0, &(0x7f0000000300), 0x0, &(0x7f0000000380)) 21:25:15 executing program 6: semop(0x0, &(0x7f0000000040)=[{0x0, 0x9, 0x1000}, {0x0, 0x5ae}], 0x2) 21:25:15 executing program 2: syz_mount_image$gfs2(&(0x7f0000000040)='gfs2\x00', &(0x7f0000001740)='./file0\x00', 0x0, 0x0, &(0x7f0000001680), 0x0, &(0x7f0000000880)=ANY=[@ANYBLOB='l']) 21:25:15 executing program 4: r0 = socket$inet(0x2b, 0x801, 0x0) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") bind$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @multicast2=0xe0000002}, 0x10) listen(r0, 0x0) [ 226.219778] hfsplus: unable to find HFS+ superblock [ 226.276989] gfs2: invalid mount option: l [ 226.281244] gfs2: can't parse mount arguments [ 226.338185] gfs2: invalid mount option: l [ 226.342440] gfs2: can't parse mount arguments 21:25:15 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback={0x0, 0x1}}, 0x1c) listen(r0, 0x4) r1 = accept4(r0, &(0x7f0000000040)=@can, &(0x7f00000000c0)=0x80, 0x0) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) sendto$inet6(r2, &(0x7f0000e33fe0)='X', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback={0x0, 0x1}}, 0x1c) write$binfmt_script(r2, &(0x7f0000000140)=ANY=[@ANYBLOB="cc"], 0x1) shutdown(r2, 0x0) write$binfmt_misc(r1, &(0x7f0000000240)={'syz1'}, 0x34000) 21:25:15 executing program 7: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$hfsplus(&(0x7f0000000040)='hfsplus\x00', &(0x7f0000000080)='./file0\x00', 0xe000000000000, 0x0, &(0x7f0000000300), 0x0, &(0x7f0000000380)) 21:25:15 executing program 0: syz_open_dev$sndseq(&(0x7f0000000000)='/dev/snd/seq\x00', 0x0, 0x0) userfaultfd(0x0) syz_open_dev$mice(&(0x7f0000000100)='/dev/input/mice\x00', 0x0, 0x0) pselect6(0x40, &(0x7f00000abfc0)={0x3ffffd}, &(0x7f0000768000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000000000}, &(0x7f00007fbfc0), &(0x7f0000f22000)={0x0, 0x989680}, &(0x7f0000f14000)={&(0x7f0000553ff8), 0x8}) 21:25:15 executing program 6: getpeername$unix(0xffffffffffffffff, &(0x7f0000000040)=@abs, &(0x7f00000000c0)=0x6e) 21:25:15 executing program 4: r0 = socket$inet(0x2b, 0x801, 0x0) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") bind$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @multicast2=0xe0000002}, 0x10) listen(r0, 0x0) 21:25:15 executing program 2: syz_mount_image$gfs2(&(0x7f0000000040)='gfs2\n', &(0x7f0000001740)='./file0\x00', 0x0, 0x0, &(0x7f0000001680), 0x0, &(0x7f0000000880)=ANY=[@ANYBLOB='l']) 21:25:15 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) ioctl$sock_inet_SIOCGARP(r0, 0x8954, &(0x7f0000000040)={{0x2, 0x0, @local={0xac, 0x14, 0x14, 0xaa}}, {}, 0x0, {0x2, 0x0, @multicast1=0xe0000001}, 'eql\x00'}) 21:25:16 executing program 5: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f000000d000)={0xa, 0x4e20}, 0x1c) connect$inet6(r0, &(0x7f000000cfe4)={0xa, 0x4e20, 0x0, @loopback={0x0, 0x1}}, 0x1c) perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmsg(r0, &(0x7f0000000400)={&(0x7f0000000000)=@nfc, 0x10, &(0x7f0000000080), 0x0, &(0x7f0000000100)=""/128, 0x80}, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000002ff0), 0x0, &(0x7f0000000180)}, 0x0) 21:25:16 executing program 4: r0 = socket$inet(0x2b, 0x801, 0x0) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") bind$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @multicast2=0xe0000002}, 0x10) listen(r0, 0x0) [ 226.983187] hfsplus: unable to find HFS+ superblock 21:25:16 executing program 1: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc0\x00', 0x0, 0x0) ioctl$RTC_SET_TIME(r0, 0x7002, &(0x7f0000000100)) 21:25:16 executing program 0: syz_open_dev$sndseq(&(0x7f0000000000)='/dev/snd/seq\x00', 0x0, 0x0) userfaultfd(0x0) syz_open_dev$mice(&(0x7f0000000100)='/dev/input/mice\x00', 0x0, 0x0) pselect6(0x40, &(0x7f00000abfc0)={0x3ffffd}, &(0x7f0000768000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000}, &(0x7f00007fbfc0), &(0x7f0000f22000)={0x0, 0x989680}, &(0x7f0000f14000)={&(0x7f0000553ff8), 0x8}) 21:25:16 executing program 6: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount$9p_xen(&(0x7f0000003e80)='cgroup\x00', &(0x7f0000003ec0)='./file0\x00', &(0x7f0000003f00)='9p\x00', 0x1000, &(0x7f0000003f40)=ANY=[]) mount$9p_virtio(&(0x7f0000000200)='system\x00', &(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='9p\x00', 0x82800, &(0x7f00000002c0)={'trans=virtio,'}) 21:25:16 executing program 7: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$hfsplus(&(0x7f0000000040)='hfsplus\x00', &(0x7f0000000080)='./file0\x00', 0x68e60200, 0x0, &(0x7f0000000300), 0x0, &(0x7f0000000380)) 21:25:16 executing program 2: syz_mount_image$gfs2(&(0x7f0000000040)='gfs2\x00', &(0x7f0000001740)='./file0\x00', 0x0, 0x0, &(0x7f0000001680), 0x0, &(0x7f0000000880)=ANY=[@ANYBLOB='l']) 21:25:16 executing program 4: r0 = socket$inet(0x2b, 0x801, 0x0) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") bind$inet(r0, &(0x7f0000000000)={0x2, 0x0, @multicast2=0xe0000002}, 0x10) listen(0xffffffffffffffff, 0x0) 21:25:16 executing program 1: syz_open_procfs(0x0, &(0x7f00000000c0)='net/protocols\x00') [ 227.157486] gfs2: invalid mount option: l [ 227.161737] gfs2: can't parse mount arguments [ 227.183361] hfsplus: unable to find HFS+ superblock [ 227.193233] gfs2: invalid mount option: l [ 227.197469] gfs2: can't parse mount arguments 21:25:16 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback={0x0, 0x1}}, 0x1c) listen(r0, 0x4) r1 = accept4(r0, &(0x7f0000000040)=@can, &(0x7f00000000c0)=0x80, 0x0) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) sendto$inet6(r2, &(0x7f0000e33fe0)='X', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback={0x0, 0x1}}, 0x1c) write$binfmt_script(r2, &(0x7f0000000140)=ANY=[@ANYBLOB="cc"], 0x1) shutdown(r2, 0x1) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000240)={'syz1'}, 0x34000) 21:25:16 executing program 1: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r0) r1 = creat(&(0x7f0000000180)='./file0\x00', 0x0) ioctl$FS_IOC_RESVSP(r1, 0x402c5828, &(0x7f0000000200)={0x0, 0x0, 0x28000000000}) ioctl$fiemap(r1, 0xc020660b, &(0x7f0000000140)={0x0, 0x2}) 21:25:16 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x4e20, @multicast1=0xe0000001}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) sendmsg(r0, &(0x7f0000000680)={&(0x7f0000000040)=@pppoe={0x18, 0x0, {0x0, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], 'veth1_to_team\x00'}}, 0x80, &(0x7f0000000340)=[{&(0x7f00000002c0)='\t', 0x1}], 0x1, &(0x7f0000000380)}, 0x0) sendmsg(r0, &(0x7f0000000280)={&(0x7f00000000c0)=@un=@abs, 0x80, &(0x7f0000000000)=[{&(0x7f0000000200)="89", 0x1}], 0x1, &(0x7f00000006c0)}, 0x0) recvmsg(r0, &(0x7f00000113c0)={&(0x7f0000011180)=@xdp, 0x80, &(0x7f0000011280)=[{&(0x7f0000011200)=""/67, 0x43}], 0x1, &(0x7f00000112c0)=""/230, 0xe6}, 0x0) sendmsg(r0, &(0x7f0000013940)={&(0x7f0000011400)=@xdp={0x2c}, 0x80, &(0x7f0000011500)=[{&(0x7f0000011480)="ed", 0x1}], 0x1, &(0x7f0000011540)}, 0x0) recvmsg(r0, &(0x7f0000003400)={&(0x7f0000002e00)=@ll={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @remote}, 0x80, &(0x7f0000003280)=[{&(0x7f00000031c0)=""/133, 0x85}], 0x1, &(0x7f0000003300)=""/195, 0xc3}, 0x0) 21:25:16 executing program 6: pipe2$9p(&(0x7f0000000000)={0xffffffffffffffff}, 0x0) vmsplice(r0, &(0x7f0000001280)=[{&(0x7f0000001140)}], 0x1, 0x0) 21:25:16 executing program 0: syz_open_dev$sndseq(&(0x7f0000000000)='/dev/snd/seq\x00', 0x0, 0x0) userfaultfd(0x0) syz_open_dev$mice(&(0x7f0000000100)='/dev/input/mice\x00', 0x0, 0x0) pselect6(0x40, &(0x7f00000abfc0)={0x3ffffd}, &(0x7f0000768000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x64000000}, &(0x7f00007fbfc0), &(0x7f0000f22000)={0x0, 0x989680}, &(0x7f0000f14000)={&(0x7f0000553ff8), 0x8}) 21:25:16 executing program 7: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$hfsplus(&(0x7f0000000040)='hfsplus\x00', &(0x7f0000000080)='./file0\x00', 0x6000000, 0x0, &(0x7f0000000300), 0x0, &(0x7f0000000380)) 21:25:16 executing program 2: syz_mount_image$gfs2(&(0x7f0000000040)='gfs2\x00', &(0x7f0000001740)='./file0\x00', 0x0, 0x0, &(0x7f0000001680), 0x0, &(0x7f0000000880)=ANY=[@ANYBLOB='l']) [ 227.797796] gfs2: invalid mount option: l [ 227.802061] gfs2: can't parse mount arguments [ 227.811597] hfsplus: unable to find HFS+ superblock [ 227.816050] nf_conntrack: default automatic helper assignment has been turned off for security reasons and CT-based firewall rule not found. Use the iptables CT target to attach helpers instead. 21:25:16 executing program 5: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', &(0x7f0000000040)='bpf\x00', 0x0, &(0x7f0000000280)=ANY=[]) mount$bpf(0x0, &(0x7f0000000080)='./file0/../file0\x00', &(0x7f00000000c0)='bpf\x00', 0x80000, &(0x7f00000002c0)) 21:25:16 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x4e20, @multicast1=0xe0000001}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20, @empty=0x700000000000000}, 0x10) recvmsg(r0, &(0x7f00000027c0)={&(0x7f0000000080)=@in={0x0, 0x0, @multicast1}, 0x80, &(0x7f00000026c0)=[{&(0x7f00000016c0)=""/4096, 0x1000}], 0x1, &(0x7f0000002740)=""/88, 0x58}, 0x0) recvmsg(r0, &(0x7f0000000680)={&(0x7f0000000000)=@generic, 0x80, &(0x7f0000000100), 0x0, &(0x7f0000000580)=""/223, 0xdf}, 0x102) write$binfmt_aout(r0, &(0x7f00000002c0)=ANY=[@ANYBLOB="9d"], 0x1) connect$unix(0xffffffffffffffff, &(0x7f0000000140)=@abs, 0x6e) 21:25:16 executing program 7: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$hfsplus(&(0x7f0000000040)='hfsplus\x00', &(0x7f0000000080)='./file0\x00', 0x3f00000000000000, 0x0, &(0x7f0000000300), 0x0, &(0x7f0000000380)) 21:25:16 executing program 6: r0 = socket$inet(0x2, 0x2, 0x0) setsockopt$inet_int(r0, 0x0, 0x12, &(0x7f00003b9ffc)=0x40000000000800, 0x4) 21:25:16 executing program 4: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) 21:25:16 executing program 0: syz_open_dev$sndseq(&(0x7f0000000000)='/dev/snd/seq\x00', 0x0, 0x0) userfaultfd(0x0) syz_open_dev$mice(&(0x7f0000000100)='/dev/input/mice\x00', 0x0, 0x0) pselect6(0x40, &(0x7f00000abfc0)={0x3ffffd}, &(0x7f0000768000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000}, &(0x7f00007fbfc0), &(0x7f0000f22000)={0x0, 0x989680}, &(0x7f0000f14000)={&(0x7f0000553ff8), 0x8}) 21:25:16 executing program 2: syz_mount_image$gfs2(&(0x7f0000000040)='gfs2\x00', &(0x7f0000001740)='./file0\x00', 0x0, 0x0, &(0x7f0000001680), 0x0, &(0x7f0000000880)=ANY=[@ANYBLOB='l']) 21:25:17 executing program 4: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup\x00', 0x200002, 0x0) r1 = openat$cgroup_int(r0, &(0x7f0000000000)='io.max\x00', 0x2, 0x0) write$cgroup_int(r1, &(0x7f00000000c0)=ANY=[@ANYBLOB='9:4\r'], 0x4) 21:25:17 executing program 5: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', &(0x7f0000000040)='bpf\x00', 0x0, &(0x7f0000000280)=ANY=[]) mount$bpf(0x0, &(0x7f0000000080)='./file0/../file0\x00', &(0x7f00000000c0)='bpf\x00', 0x80000, &(0x7f00000002c0)) [ 227.976309] gfs2: invalid mount option: l [ 227.980732] gfs2: can't parse mount arguments [ 227.998167] hfsplus: unable to find HFS+ superblock [ 228.060766] gfs2: invalid mount option: l [ 228.065199] gfs2: can't parse mount arguments 21:25:17 executing program 5: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', &(0x7f0000000040)='bpf\x00', 0x0, &(0x7f0000000280)=ANY=[]) mount$bpf(0x0, &(0x7f0000000080)='./file0/../file0\x00', &(0x7f00000000c0)='bpf\x00', 0x80000, &(0x7f00000002c0)) 21:25:17 executing program 7: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$hfsplus(&(0x7f0000000040)='hfsplus\x00', &(0x7f0000000080)='./file0\x00', 0x600000000000000, 0x0, &(0x7f0000000300), 0x0, &(0x7f0000000380)) 21:25:17 executing program 6: sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000080)=@in6={0xa, 0x0, 0x0, @mcast2={0xff, 0x2, [], 0x1}}, 0x80, &(0x7f0000000000), 0x0, &(0x7f0000000780)=ANY=[]}, 0x0) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) recvmsg$kcm(r0, &(0x7f0000002e80)={&(0x7f0000002b40)=@hci, 0x80, &(0x7f0000002dc0)=[{&(0x7f0000002d40)=""/124, 0x7c}], 0x1, &(0x7f0000002e00)=""/79, 0x4f}, 0x0) close(r1) 21:25:17 executing program 0: syz_open_dev$sndseq(&(0x7f0000000000)='/dev/snd/seq\x00', 0x0, 0x0) userfaultfd(0x0) syz_open_dev$mice(&(0x7f0000000100)='/dev/input/mice\x00', 0x0, 0x0) pselect6(0x40, &(0x7f00000abfc0)={0x3ffffd}, &(0x7f0000768000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000000000}, &(0x7f00007fbfc0), &(0x7f0000f22000)={0x0, 0x989680}, &(0x7f0000f14000)={&(0x7f0000553ff8), 0x8}) 21:25:17 executing program 2: syz_mount_image$gfs2(&(0x7f0000000040)='gfs2\x00', &(0x7f0000001740)='./file0\x00', 0x0, 0x0, &(0x7f0000001680), 0x0, &(0x7f0000000880)=ANY=[@ANYBLOB='l']) 21:25:17 executing program 4: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup\x00', 0x200002, 0x0) r1 = openat$cgroup_int(r0, &(0x7f0000000000)='io.max\x00', 0x2, 0x0) write$cgroup_int(r1, &(0x7f00000000c0)=ANY=[@ANYBLOB='9:4\r'], 0x4) 21:25:17 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2000000000000022, &(0x7f0000356000)=0x1, 0x4) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000080)={@in6={{0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}}}, 0x0, 0x5, 0x0, "dcbd7013560987c90ebd84b6e984c7242a057f7f7f8b85f0aba26dc45e69c2db87180107eba9f36e22ba7df5228e6a97e954627eb3966137d05054d92ff0e25078b35ba8d6f9e3ab5b89afb667676ae0"}, 0xd8) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000480)='syz_tun\x00', 0x25) listen(r0, 0x0) shutdown(r0, 0x0) sendto$inet6(r0, &(0x7f0000000000)="15", 0x1, 0x200408d6, &(0x7f00000011c0)={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}}, 0x1c) 21:25:17 executing program 4: r0 = socket$inet6(0xa, 0x2000000000001, 0x0) bind$inet6(r0, &(0x7f0000402000)={0xa, 0x4e20, 0x0, @loopback={0x0, 0x1}}, 0x1c) sendto$inet6(r0, &(0x7f00007a8fff), 0x3a7, 0x20000000, &(0x7f00000001c0)={0xa, 0x4e20, 0x0, @loopback={0x0, 0x1}}, 0x1c) [ 228.690349] hfsplus: unable to find HFS+ superblock [ 228.699846] gfs2: invalid mount option: l [ 228.704154] gfs2: can't parse mount arguments [ 228.756008] gfs2: invalid mount option: l [ 228.760332] gfs2: can't parse mount arguments 21:25:17 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2000000000000022, &(0x7f0000356000)=0x1, 0x4) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000480)='syz_tun\x00', 0x25) shutdown(0xffffffffffffffff, 0x0) sendto$inet6(r0, &(0x7f0000000000), 0x0, 0x200408d6, &(0x7f00000011c0)={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}}, 0x1c) 21:25:17 executing program 0: syz_open_dev$sndseq(&(0x7f0000000000)='/dev/snd/seq\x00', 0x0, 0x0) userfaultfd(0x0) syz_open_dev$mice(&(0x7f0000000100)='/dev/input/mice\x00', 0x0, 0x0) pselect6(0x40, &(0x7f00000abfc0)={0x3ffffd}, &(0x7f0000768000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800000000000000}, &(0x7f00007fbfc0), &(0x7f0000f22000)={0x0, 0x989680}, &(0x7f0000f14000)={&(0x7f0000553ff8), 0x8}) 21:25:17 executing program 5: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', &(0x7f0000000040)='bpf\x00', 0x0, &(0x7f0000000280)=ANY=[]) mount$bpf(0x0, &(0x7f0000000080)='./file0/../file0\x00', &(0x7f00000000c0)='bpf\x00', 0x80000, &(0x7f00000002c0)) 21:25:17 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2000000000000022, &(0x7f0000356000)=0x1, 0x4) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000080)={@in6={{0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}}}, 0x0, 0x5, 0x0, "dcbd7013560987c90ebd84b6e984c7242a057f7f7f8b85f0aba26dc45e69c2db87180107eba9f36e22ba7df5228e6a97e954627eb3966137d05054d92ff0e25078b35ba8d6f9e3ab5b89afb667676ae0"}, 0xd8) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000480)='syz_tun\x00', 0x25) listen(r0, 0x0) shutdown(r0, 0x0) sendto$inet6(r0, &(0x7f0000000000)="15", 0x1, 0x200408d6, &(0x7f00000011c0)={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}}, 0x1c) 21:25:17 executing program 7: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$hfsplus(&(0x7f0000000040)='hfsplus\x00', &(0x7f0000000080)='./file0\x00', 0xffffffff00000000, 0x0, &(0x7f0000000300), 0x0, &(0x7f0000000380)) 21:25:17 executing program 2: syz_mount_image$gfs2(&(0x7f0000000040)='gfs2\t', &(0x7f0000001740)='./file0\x00', 0x0, 0x0, &(0x7f0000001680), 0x0, &(0x7f0000000880)=ANY=[@ANYBLOB='l']) 21:25:17 executing program 4: r0 = socket$inet(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="24000000250007031dfffd946fa2830020200a0009000000067fffffffffffffff00ff7e", 0x24}], 0x1}, 0x0) 21:25:18 executing program 1: 21:25:18 executing program 1: 21:25:18 executing program 1: [ 229.030325] hfsplus: unable to find HFS+ superblock 21:25:18 executing program 0: syz_open_dev$sndseq(&(0x7f0000000000)='/dev/snd/seq\x00', 0x0, 0x0) userfaultfd(0x0) syz_open_dev$mice(&(0x7f0000000100)='/dev/input/mice\x00', 0x0, 0x0) pselect6(0x40, &(0x7f00000abfc0)={0x3ffffd}, &(0x7f0000768000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1600}, &(0x7f00007fbfc0), &(0x7f0000f22000)={0x0, 0x989680}, &(0x7f0000f14000)={&(0x7f0000553ff8), 0x8}) 21:25:18 executing program 1: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$kcm(0x2, 0x5, 0x0) 21:25:18 executing program 4: r0 = socket$kcm(0xa, 0x2, 0x11) sendmsg$kcm(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000100)=@in6={0xa, 0x0, 0x0, @loopback={0x0, 0x1}}, 0x80, &(0x7f00000001c0), 0x2ab, &(0x7f0000000680)}, 0x0) recvmsg(0xffffffffffffffff, &(0x7f000000c440)={&(0x7f000000c200)=@hci, 0x80, &(0x7f000000c400)}, 0x0) sendmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000000)=@in={0xa, 0x4e23, @remote={0xac, 0x14, 0x14, 0xbb}}, 0x80, &(0x7f0000000080), 0x0, &(0x7f0000000140)}, 0x0) 21:25:18 executing program 5: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000080)='./file0/../file0\x00', &(0x7f00000000c0)='bpf\x00', 0x80000, &(0x7f00000002c0)) 21:25:18 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x12, 0x8, &(0x7f0000000080)=ANY=[@ANYBLOB="7a0af8ff00000000bfa100000000000007010000f8ffffffb702000008000000bd120000000000008500000006000000b7000000000000009500000000000000"], &(0x7f00000000c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0xa}, 0x48) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup/syz1\x00', 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f00000001c0)={r1, r0, 0x200000000000000a}, 0x10) 21:25:18 executing program 7: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$hfsplus(&(0x7f0000000040)='hfsplus\x00', &(0x7f0000000080)='./file0\x00', 0x2000000, 0x0, &(0x7f0000000300), 0x0, &(0x7f0000000380)) 21:25:18 executing program 2: syz_mount_image$gfs2(&(0x7f0000000040)='gfs2\x00', &(0x7f0000001740)='./file0\x00', 0x0, 0x0, &(0x7f0000001680), 0x0, &(0x7f0000000880)=ANY=[@ANYBLOB='l']) 21:25:18 executing program 6: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.net/syz1\x00', 0x200002, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f0000000080)) write$cgroup_pid(r1, &(0x7f0000000040), 0x12) 21:25:18 executing program 1: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$kcm(0xa, 0x6, 0x0) 21:25:18 executing program 1: [ 229.549115] [ 229.550824] ********************************************************** [ 229.557566] ** NOTICE NOTICE NOTICE NOTICE NOTICE NOTICE NOTICE ** [ 229.564295] ** ** [ 229.570997] ** trace_printk() being used. Allocating extra memory. ** [ 229.577712] ** ** [ 229.584416] ** This means that this is a DEBUG kernel and it is ** [ 229.591118] ** unsafe for production use. ** 21:25:18 executing program 6: 21:25:18 executing program 1: [ 229.597816] ** ** [ 229.604524] ** If you see this message and you are not debugging ** [ 229.611243] ** the kernel, report this immediately to your vendor! ** [ 229.614700] hfsplus: unable to find HFS+ superblock [ 229.617936] ** ** [ 229.617941] ** NOTICE NOTICE NOTICE NOTICE NOTICE NOTICE NOTICE ** [ 229.617946] ********************************************************** 21:25:18 executing program 1: [ 229.649577] gfs2: invalid mount option: l [ 229.653806] gfs2: can't parse mount arguments 21:25:18 executing program 1: 21:25:18 executing program 4: 21:25:18 executing program 1: [ 229.696851] gfs2: invalid mount option: l [ 229.701096] gfs2: can't parse mount arguments 21:25:18 executing program 0: syz_open_dev$sndseq(&(0x7f0000000000)='/dev/snd/seq\x00', 0x0, 0x0) userfaultfd(0x0) syz_open_dev$mice(&(0x7f0000000100)='/dev/input/mice\x00', 0x0, 0x0) pselect6(0x40, &(0x7f00000abfc0)={0x3ffffd}, &(0x7f0000768000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x60000000}, &(0x7f00007fbfc0), &(0x7f0000f22000)={0x0, 0x989680}, &(0x7f0000f14000)={&(0x7f0000553ff8), 0x8}) 21:25:18 executing program 5: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', &(0x7f0000000040)='bpf\x00', 0x0, &(0x7f0000000280)=ANY=[]) mount$bpf(0x0, &(0x7f0000000080)='./file0/../file0\x00', &(0x7f00000000c0)='bpf\x00', 0x80000, &(0x7f00000002c0)) 21:25:18 executing program 1: 21:25:18 executing program 7: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$hfsplus(&(0x7f0000000040)='hfsplus\x00', &(0x7f0000000080)='./file0\x00', 0x3f00, 0x0, &(0x7f0000000300), 0x0, &(0x7f0000000380)) 21:25:18 executing program 3: 21:25:18 executing program 2: syz_mount_image$gfs2(&(0x7f0000000040)='gfs2\x00', &(0x7f0000001740)='./file0\x00', 0x0, 0x0, &(0x7f0000001680), 0x0, &(0x7f0000000880)=ANY=[@ANYBLOB='l']) 21:25:18 executing program 6: 21:25:18 executing program 1: 21:25:18 executing program 4: 21:25:18 executing program 1: 21:25:18 executing program 1: 21:25:18 executing program 1: 21:25:18 executing program 1: [ 229.888102] hfsplus: unable to find HFS+ superblock 21:25:18 executing program 1: 21:25:19 executing program 1: 21:25:19 executing program 1: [ 229.920904] gfs2: invalid mount option: l [ 229.925168] gfs2: can't parse mount arguments 21:25:19 executing program 0: syz_open_dev$sndseq(&(0x7f0000000000)='/dev/snd/seq\x00', 0x0, 0x0) userfaultfd(0x0) syz_open_dev$mice(&(0x7f0000000100)='/dev/input/mice\x00', 0x0, 0x0) pselect6(0x40, &(0x7f00000abfc0)={0x3ffffd}, &(0x7f0000768000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000}, &(0x7f00007fbfc0), &(0x7f0000f22000)={0x0, 0x989680}, &(0x7f0000f14000)={&(0x7f0000553ff8), 0x8}) 21:25:19 executing program 1: 21:25:19 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', &(0x7f0000000040)='bpf\x00', 0x0, &(0x7f0000000280)=ANY=[]) mount$bpf(0x0, &(0x7f0000000080)='./file0/../file0\x00', &(0x7f00000000c0)='bpf\x00', 0x80000, &(0x7f00000002c0)) 21:25:19 executing program 6: 21:25:19 executing program 3: [ 230.022881] gfs2: invalid mount option: l [ 230.027213] gfs2: can't parse mount arguments 21:25:19 executing program 2: syz_mount_image$gfs2(&(0x7f0000000040)='gfs2\x00', &(0x7f0000001740)='./file0\x00', 0x0, 0x0, &(0x7f0000001680), 0x0, &(0x7f0000000880)=ANY=[@ANYBLOB='l']) 21:25:19 executing program 4: 21:25:19 executing program 1: 21:25:19 executing program 7: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$hfsplus(&(0x7f0000000040)='hfsplus\x00', &(0x7f0000000080)='./file0\x00', 0x9, 0x0, &(0x7f0000000300), 0x0, &(0x7f0000000380)) 21:25:19 executing program 6: 21:25:19 executing program 1: 21:25:19 executing program 1: 21:25:19 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', &(0x7f0000000040)='bpf\x00', 0x0, &(0x7f0000000280)=ANY=[]) mount$bpf(0x0, &(0x7f0000000080)='./file0/../file0\x00', &(0x7f00000000c0)='bpf\x00', 0x80000, &(0x7f00000002c0)) 21:25:19 executing program 1: 21:25:19 executing program 3: 21:25:19 executing program 1: 21:25:19 executing program 0: syz_open_dev$sndseq(&(0x7f0000000000)='/dev/snd/seq\x00', 0x0, 0x0) userfaultfd(0x0) syz_open_dev$mice(&(0x7f0000000100)='/dev/input/mice\x00', 0x0, 0x0) pselect6(0x40, &(0x7f00000abfc0)={0x3ffffd}, &(0x7f0000768000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6400}, &(0x7f00007fbfc0), &(0x7f0000f22000)={0x0, 0x989680}, &(0x7f0000f14000)={&(0x7f0000553ff8), 0x8}) 21:25:19 executing program 1: 21:25:19 executing program 1: 21:25:19 executing program 4: 21:25:19 executing program 1: [ 230.253195] gfs2: invalid mount option: l [ 230.257605] gfs2: can't parse mount arguments [ 230.271557] hfsplus: unable to find HFS+ superblock [ 230.323043] gfs2: invalid mount option: l [ 230.327323] gfs2: can't parse mount arguments 21:25:19 executing program 6: 21:25:19 executing program 1: 21:25:19 executing program 2: syz_mount_image$gfs2(&(0x7f0000000040)='gfs2\x00', &(0x7f0000001740)='./file0\x00', 0x0, 0x0, &(0x7f0000001680), 0x0, &(0x7f0000000880)=ANY=[@ANYBLOB='l']) 21:25:19 executing program 3: 21:25:19 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', &(0x7f0000000040)='bpf\x00', 0x0, &(0x7f0000000280)=ANY=[]) mount$bpf(0x0, &(0x7f0000000080)='./file0/../file0\x00', &(0x7f00000000c0)='bpf\x00', 0x80000, &(0x7f00000002c0)) 21:25:19 executing program 0: syz_open_dev$sndseq(&(0x7f0000000000)='/dev/snd/seq\x00', 0x0, 0x0) userfaultfd(0x0) syz_open_dev$mice(&(0x7f0000000100)='/dev/input/mice\x00', 0x0, 0x0) pselect6(0x40, &(0x7f00000abfc0)={0x3ffffd}, &(0x7f0000768000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, &(0x7f00007fbfc0), &(0x7f0000f22000)={0x0, 0x989680}, &(0x7f0000f14000)={&(0x7f0000553ff8), 0x8}) 21:25:19 executing program 7: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$hfsplus(&(0x7f0000000040)='hfsplus\x00', &(0x7f0000000080)='./file0\x00', 0x5453, 0x0, &(0x7f0000000300), 0x0, &(0x7f0000000380)) 21:25:19 executing program 4: 21:25:19 executing program 1: 21:25:19 executing program 1: 21:25:19 executing program 1: 21:25:19 executing program 1: 21:25:19 executing program 1: 21:25:19 executing program 6: 21:25:19 executing program 3: 21:25:19 executing program 4: 21:25:19 executing program 1: 21:25:19 executing program 1: [ 230.478101] gfs2: invalid mount option: l [ 230.482454] gfs2: can't parse mount arguments [ 230.513748] hfsplus: unable to find HFS+ superblock [ 230.546218] gfs2: invalid mount option: l [ 230.550468] gfs2: can't parse mount arguments 21:25:19 executing program 2: syz_mount_image$gfs2(&(0x7f0000000040)="67667332e0", &(0x7f0000001740)='./file0\x00', 0x0, 0x0, &(0x7f0000001680), 0x0, &(0x7f0000000880)=ANY=[@ANYBLOB='l']) 21:25:19 executing program 5: perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', &(0x7f0000000040)='bpf\x00', 0x0, &(0x7f0000000280)=ANY=[]) mount$bpf(0x0, &(0x7f0000000080)='./file0/../file0\x00', &(0x7f00000000c0)='bpf\x00', 0x80000, &(0x7f00000002c0)) 21:25:19 executing program 1: 21:25:19 executing program 0: syz_open_dev$sndseq(&(0x7f0000000000)='/dev/snd/seq\x00', 0x0, 0x0) userfaultfd(0x0) syz_open_dev$mice(&(0x7f0000000100)='/dev/input/mice\x00', 0x0, 0x0) pselect6(0x40, &(0x7f00000abfc0)={0x3ffffd}, &(0x7f0000768000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x60}, &(0x7f00007fbfc0), &(0x7f0000f22000)={0x0, 0x989680}, &(0x7f0000f14000)={&(0x7f0000553ff8), 0x8}) 21:25:19 executing program 6: 21:25:19 executing program 3: 21:25:19 executing program 7: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$hfsplus(&(0x7f0000000040)='hfsplus\x00', &(0x7f0000000080)='./file0\x00', 0x2000000000000, 0x0, &(0x7f0000000300), 0x0, &(0x7f0000000380)) 21:25:19 executing program 4: 21:25:19 executing program 1: 21:25:19 executing program 1: 21:25:19 executing program 6: 21:25:19 executing program 1: 21:25:19 executing program 1: 21:25:19 executing program 1: 21:25:19 executing program 3: 21:25:19 executing program 1: [ 230.726582] hfsplus: unable to find HFS+ superblock 21:25:19 executing program 2: syz_mount_image$gfs2(&(0x7f0000000040)='gfs2\x00', &(0x7f0000001740)='./file0\x00', 0x0, 0x0, &(0x7f0000001680), 0x0, &(0x7f0000000880)=ANY=[@ANYBLOB='l']) 21:25:19 executing program 4: 21:25:19 executing program 5: perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', &(0x7f0000000040)='bpf\x00', 0x0, &(0x7f0000000280)=ANY=[]) mount$bpf(0x0, &(0x7f0000000080)='./file0/../file0\x00', &(0x7f00000000c0)='bpf\x00', 0x80000, &(0x7f00000002c0)) 21:25:19 executing program 1: 21:25:19 executing program 0: syz_open_dev$sndseq(&(0x7f0000000000)='/dev/snd/seq\x00', 0x0, 0x0) userfaultfd(0x0) syz_open_dev$mice(&(0x7f0000000100)='/dev/input/mice\x00', 0x0, 0x0) pselect6(0x40, &(0x7f00000abfc0)={0x3ffffd}, &(0x7f0000768000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10}, &(0x7f00007fbfc0), &(0x7f0000f22000)={0x0, 0x989680}, &(0x7f0000f14000)={&(0x7f0000553ff8), 0x8}) 21:25:19 executing program 6: 21:25:19 executing program 3: 21:25:19 executing program 7: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$hfsplus(&(0x7f0000000040)='hfsplus\x00', &(0x7f0000000080)='./file0\x00', 0x48580000, 0x0, &(0x7f0000000300), 0x0, &(0x7f0000000380)) 21:25:19 executing program 1: 21:25:19 executing program 1: 21:25:20 executing program 1: 21:25:20 executing program 1: [ 230.949198] hfsplus: unable to find HFS+ superblock 21:25:20 executing program 1: 21:25:20 executing program 1: 21:25:20 executing program 1: 21:25:20 executing program 3: [ 231.064249] gfs2: invalid mount option: l [ 231.068527] gfs2: can't parse mount arguments 21:25:20 executing program 2: syz_mount_image$gfs2(&(0x7f0000000040)="67667332ff", &(0x7f0000001740)='./file0\x00', 0x0, 0x0, &(0x7f0000001680), 0x0, &(0x7f0000000880)=ANY=[@ANYBLOB='l']) 21:25:20 executing program 4: 21:25:20 executing program 1: 21:25:20 executing program 6: 21:25:20 executing program 7: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$hfsplus(&(0x7f0000000040)='hfsplus\x00', &(0x7f0000000080)='./file0\x00', 0x4244, 0x0, &(0x7f0000000300), 0x0, &(0x7f0000000380)) 21:25:20 executing program 0: syz_open_dev$sndseq(&(0x7f0000000000)='/dev/snd/seq\x00', 0x0, 0x0) userfaultfd(0x0) syz_open_dev$mice(&(0x7f0000000100)='/dev/input/mice\x00', 0x0, 0x0) pselect6(0x40, &(0x7f00000abfc0)={0x3ffffd}, &(0x7f0000768000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6400000000000000}, &(0x7f00007fbfc0), &(0x7f0000f22000)={0x0, 0x989680}, &(0x7f0000f14000)={&(0x7f0000553ff8), 0x8}) 21:25:20 executing program 5: perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', &(0x7f0000000040)='bpf\x00', 0x0, &(0x7f0000000280)=ANY=[]) mount$bpf(0x0, &(0x7f0000000080)='./file0/../file0\x00', &(0x7f00000000c0)='bpf\x00', 0x80000, &(0x7f00000002c0)) 21:25:20 executing program 3: 21:25:20 executing program 1: [ 231.119924] gfs2: invalid mount option: l [ 231.124162] gfs2: can't parse mount arguments 21:25:20 executing program 1: 21:25:20 executing program 1: 21:25:20 executing program 1: 21:25:20 executing program 6: 21:25:20 executing program 1: 21:25:20 executing program 4: 21:25:20 executing program 1: [ 231.275281] hfsplus: unable to find HFS+ superblock 21:25:20 executing program 2: syz_mount_image$gfs2(&(0x7f0000000040)='gfs2\x00', &(0x7f0000001740)='./file0\x00', 0x0, 0x0, &(0x7f0000001680), 0x0, &(0x7f0000000880)=ANY=[@ANYBLOB='l']) 21:25:20 executing program 5: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', &(0x7f0000000040)='bpf\x00', 0x0, &(0x7f0000000280)=ANY=[]) mount$bpf(0x0, &(0x7f0000000080)='./file0/../file0\x00', &(0x7f00000000c0)='bpf\x00', 0x80000, &(0x7f00000002c0)) 21:25:20 executing program 3: 21:25:20 executing program 1: 21:25:20 executing program 7: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$hfsplus(&(0x7f0000000040)='hfsplus\x00', &(0x7f0000000080)='./file0\x00', 0x4858, 0x0, &(0x7f0000000300), 0x0, &(0x7f0000000380)) 21:25:20 executing program 0: syz_open_dev$sndseq(&(0x7f0000000000)='/dev/snd/seq\x00', 0x0, 0x0) userfaultfd(0x0) syz_open_dev$mice(&(0x7f0000000100)='/dev/input/mice\x00', 0x0, 0x0) pselect6(0x40, &(0x7f00000abfc0)={0x3ffffd}, &(0x7f0000768000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1600000000000000}, &(0x7f00007fbfc0), &(0x7f0000f22000)={0x0, 0x989680}, &(0x7f0000f14000)={&(0x7f0000553ff8), 0x8}) 21:25:20 executing program 4: 21:25:20 executing program 6: 21:25:20 executing program 1: 21:25:20 executing program 1: 21:25:20 executing program 1: 21:25:20 executing program 1: 21:25:20 executing program 1: [ 231.456693] hfsplus: unable to find HFS+ superblock 21:25:20 executing program 1: 21:25:20 executing program 1: 21:25:20 executing program 3: [ 231.550489] gfs2: invalid mount option: l [ 231.554820] gfs2: can't parse mount arguments 21:25:20 executing program 2: syz_mount_image$gfs2(&(0x7f0000000040)='gfs2\x00', &(0x7f0000001740)='./file0\x00', 0x0, 0x0, &(0x7f0000001680), 0x0, &(0x7f0000000880)=ANY=[@ANYBLOB='l']) 21:25:20 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000001680)="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", 0x0, 0x0) dup3(r0, r1, 0x0) write$P9_RUNLINKAT(r1, &(0x7f00000001c0)={0x7, 0x4d}, 0x7) 21:25:20 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000001680)="2f007e574d000330809022cfde26555dc9ecfe1974406edad38364782d63b6612854b9e49dbdcaef718197e37e870a308b1e3a798fa788a46d3025ef933e51828ab675064e2adbe9126423b4a73d68fbe99c6db2f160c69cb6cce76c27289a4f9d197354aaa5860d2383df87526baa184d90bb7729366417bc33d765e9bc2f882a13f3a9c1f60660bd4fd2fa31d2c0a775242289bce062d10d24ded5406918a66b2c75c43fe1ff458ae5cd9fec63039ba5a7b66a60ede5ccdabc7ee77660ef2358ccdff02226021384b0c235f114ed9ade92767aecc256acdeb610df42e7169f240357f735ae5fe29017e51e27252f48b95bfbbb3a865535298bdc36d71db635f41c57771db77aeaff883feb3dc3cc24bd3c036e396ad3af37945058839e812270bc40901fa654e7cc3292a82fc80c374dc07142a1c2e9d3e2528e4fdac32bcaefe910ebd3b948a3bfebef5fa8d82473c7fbf3ec763a1b613dd747d529ea70ef0298fff5661630b99a79ec8269af9be178aeca17fafb14fd3d6c99aee41d684f5d4200975a999d79ba894dbae4c1a6ef5f1e35af57d82878226d07e63a3f45967e0ee859bb6e0f3c66e68c445208bb32bb2342148aa3f413ea981dcf59c27323f4945e325ba0e69e436e55436a9324f5a458c5acb601104cf2fc7adc67a0662f5499dc4f72fd4d8f4f68ad5da52ed8c929f751f28d9d63fa34b35d4fcfe8c548eb35e3a1d08c077e7d7ea61e716e", 0x0, 0x0) dup3(r0, r1, 0x0) write$P9_RREAD(r1, &(0x7f0000000340)=ANY=[], 0x0) 21:25:20 executing program 6: openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x2840, 0x140) 21:25:20 executing program 0: syz_open_dev$sndseq(&(0x7f0000000000)='/dev/snd/seq\x00', 0x0, 0x0) userfaultfd(0x0) syz_open_dev$mice(&(0x7f0000000100)='/dev/input/mice\x00', 0x0, 0x0) pselect6(0x40, &(0x7f00000abfc0)={0x3ffffd}, &(0x7f0000768000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000}, &(0x7f00007fbfc0), &(0x7f0000f22000)={0x0, 0x989680}, &(0x7f0000f14000)={&(0x7f0000553ff8), 0x8}) 21:25:20 executing program 7: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$hfsplus(&(0x7f0000000040)='hfsplus\x00', &(0x7f0000000080)='./file0\x00', 0xfffffff5, 0x0, &(0x7f0000000300), 0x0, &(0x7f0000000380)) 21:25:20 executing program 5: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', &(0x7f0000000040)='bpf\x00', 0x0, &(0x7f0000000280)=ANY=[]) mount$bpf(0x0, &(0x7f0000000080)='./file0/../file0\x00', &(0x7f00000000c0)='bpf\x00', 0x80000, &(0x7f00000002c0)) 21:25:20 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000001680)="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", 0x0, 0x0) dup3(r0, r1, 0x0) write$P9_RFSYNC(r1, &(0x7f0000000000)={0x7, 0x33}, 0x7) 21:25:20 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000001680)="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", 0x0, 0x0) dup3(r0, r1, 0x0) write$P9_RREADDIR(r1, &(0x7f0000000000)={0xb, 0x29}, 0xb) [ 231.649917] gfs2: invalid mount option: l [ 231.654218] gfs2: can't parse mount arguments 21:25:20 executing program 6: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000001680)="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", 0x0, 0x0) r2 = dup3(r0, r1, 0x0) write$P9_RREADLINK(r2, &(0x7f0000000180)={0x10, 0x17, 0x0, {0x7, './file0'}}, 0x10) 21:25:20 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000001680)="2f007e574d000330809022cfde26555dc9ecfe1974406edad38364782d63b6612854b9e49dbdcaef718197e37e870a308b1e3a798fa788a46d3025ef933e51828ab675064e2adbe9126423b4a73d68fbe99c6db2f160c69cb6cce76c27289a4f9d197354aaa5860d2383df87526baa184d90bb7729366417bc33d765e9bc2f882a13f3a9c1f60660bd4fd2fa31d2c0a775242289bce062d10d24ded5406918a66b2c75c43fe1ff458ae5cd9fec63039ba5a7b66a60ede5ccdabc7ee77660ef2358ccdff02226021384b0c235f114ed9ade92767aecc256acdeb610df42e7169f240357f735ae5fe29017e51e27252f48b95bfbbb3a865535298bdc36d71db635f41c57771db77aeaff883feb3dc3cc24bd3c036e396ad3af37945058839e812270bc40901fa654e7cc3292a82fc80c374dc07142a1c2e9d3e2528e4fdac32bcaefe910ebd3b948a3bfebef5fa8d82473c7fbf3ec763a1b613dd747d529ea70ef0298fff5661630b99a79ec8269af9be178aeca17fafb14fd3d6c99aee41d684f5d4200975a999d79ba894dbae4c1a6ef5f1e35af57d82878226d07e63a3f45967e0ee859bb6e0f3c66e68c445208bb32bb2342148aa3f413ea981dcf59c27323f4945e325ba0e69e436e55436a9324f5a458c5acb601104cf2fc7adc67a0662f5499dc4f72fd4d8f4f68ad5da52ed8c929f751f28d9d63fa34b35d4fcfe8c548eb35e3a1d08c077e7d7ea61e716e", 0x0, 0x0) symlinkat(&(0x7f0000000000)='./file0\x00', r0, &(0x7f0000000080)='./file0\x00') 21:25:20 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000001680)="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", 0x0, 0x0) symlinkat(&(0x7f0000000000)='./file0\x00', r0, &(0x7f0000000080)='./file0\x00') 21:25:20 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000001680)="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", 0x0, 0x0) symlinkat(&(0x7f0000000000)='./file0\x00', r0, &(0x7f0000000080)='./file0\x00') 21:25:20 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000001680)="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", 0x0, 0x0) symlinkat(&(0x7f0000000000)='./file0\x00', r0, &(0x7f0000000080)='./file0\x00') 21:25:20 executing program 0: syz_open_dev$sndseq(&(0x7f0000000000)='/dev/snd/seq\x00', 0x0, 0x0) userfaultfd(0x0) syz_open_dev$mice(&(0x7f0000000100)='/dev/input/mice\x00', 0x0, 0x0) pselect6(0x40, &(0x7f00000abfc0)={0x3ffffd}, &(0x7f0000768000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x64000000}, &(0x7f00007fbfc0), &(0x7f0000f22000)={0x0, 0x989680}, &(0x7f0000f14000)={&(0x7f0000553ff8), 0x8}) 21:25:20 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000001680)="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", 0x0, 0x0) dup3(r0, r1, 0x0) write$P9_RXATTRWALK(r1, &(0x7f0000000080)={0xf, 0x1f}, 0xf) [ 231.787191] hfsplus: unable to find HFS+ superblock [ 231.789353] gfs2: invalid mount option: l [ 231.796643] gfs2: can't parse mount arguments [ 231.866656] gfs2: invalid mount option: l [ 231.871526] gfs2: can't parse mount arguments 21:25:20 executing program 2: syz_mount_image$gfs2(&(0x7f0000000040)='gfs2\x00', &(0x7f0000001740)='./file0\x00', 0x0, 0x0, &(0x7f0000001680), 0x0, &(0x7f0000000880)=ANY=[@ANYBLOB='l']) 21:25:20 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000001680)="2f007e574d000330809022cfde26555dc9ecfe1974406edad38364782d63b6612854b9e49dbdcaef718197e37e870a308b1e3a798fa788a46d3025ef933e51828ab675064e2adbe9126423b4a73d68fbe99c6db2f160c69cb6cce76c27289a4f9d197354aaa5860d2383df87526baa184d90bb7729366417bc33d765e9bc2f882a13f3a9c1f60660bd4fd2fa31d2c0a775242289bce062d10d24ded5406918a66b2c75c43fe1ff458ae5cd9fec63039ba5a7b66a60ede5ccdabc7ee77660ef2358ccdff02226021384b0c235f114ed9ade92767aecc256acdeb610df42e7169f240357f735ae5fe29017e51e27252f48b95bfbbb3a865535298bdc36d71db635f41c57771db77aeaff883feb3dc3cc24bd3c036e396ad3af37945058839e812270bc40901fa654e7cc3292a82fc80c374dc07142a1c2e9d3e2528e4fdac32bcaefe910ebd3b948a3bfebef5fa8d82473c7fbf3ec763a1b613dd747d529ea70ef0298fff5661630b99a79ec8269af9be178aeca17fafb14fd3d6c99aee41d684f5d4200975a999d79ba894dbae4c1a6ef5f1e35af57d82878226d07e63a3f45967e0ee859bb6e0f3c66e68c445208bb32bb2342148aa3f413ea981dcf59c27323f4945e325ba0e69e436e55436a9324f5a458c5acb601104cf2fc7adc67a0662f5499dc4f72fd4d8f4f68ad5da52ed8c929f751f28d9d63fa34b35d4fcfe8c548eb35e3a1d08c077e7d7ea61e716e", 0x0, 0x0) r2 = dup3(r0, r1, 0x0) write$9p(r2, &(0x7f0000000080), 0x0) 21:25:20 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000001680)="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", 0x0, 0x0) dup3(r0, r1, 0x0) write$9p(r1, &(0x7f0000000080), 0x0) 21:25:20 executing program 5: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', &(0x7f0000000040)='bpf\x00', 0x0, &(0x7f0000000280)=ANY=[]) mount$bpf(0x0, &(0x7f0000000080)='./file0/../file0\x00', &(0x7f00000000c0)='bpf\x00', 0x80000, &(0x7f00000002c0)) 21:25:20 executing program 7: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$hfsplus(&(0x7f0000000040)='hfsplus\x00', &(0x7f0000000080)='./file0\x00', 0x8cffffff, 0x0, &(0x7f0000000300), 0x0, &(0x7f0000000380)) 21:25:20 executing program 6: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000001680)="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", 0x0, 0x0) r2 = dup3(r0, r1, 0x0) write$P9_RUNLINKAT(r2, &(0x7f0000000180)={0x7, 0x4d}, 0x7) 21:25:20 executing program 0: syz_open_dev$sndseq(&(0x7f0000000000)='/dev/snd/seq\x00', 0x0, 0x0) userfaultfd(0x0) syz_open_dev$mice(&(0x7f0000000100)='/dev/input/mice\x00', 0x0, 0x0) pselect6(0x40, &(0x7f00000abfc0)={0x3ffffd}, &(0x7f0000768000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6400}, &(0x7f00007fbfc0), &(0x7f0000f22000)={0x0, 0x989680}, &(0x7f0000f14000)={&(0x7f0000553ff8), 0x8}) 21:25:20 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = dup2(r0, r0) write$P9_RLINK(r1, &(0x7f00000000c0)={0x7, 0x47}, 0x7) 21:25:21 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000001680)="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", 0x0, 0x0) r2 = dup3(r0, r1, 0x0) write$P9_RGETATTR(r2, &(0x7f0000000d80)={0xa0, 0x19}, 0xa0) 21:25:21 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000001680)="2f007e574d000330809022cfde26555dc9ecfe1974406edad38364782d63b6612854b9e49dbdcaef718197e37e870a308b1e3a798fa788a46d3025ef933e51828ab675064e2adbe9126423b4a73d68fbe99c6db2f160c69cb6cce76c27289a4f9d197354aaa5860d2383df87526baa184d90bb7729366417bc33d765e9bc2f882a13f3a9c1f60660bd4fd2fa31d2c0a775242289bce062d10d24ded5406918a66b2c75c43fe1ff458ae5cd9fec63039ba5a7b66a60ede5ccdabc7ee77660ef2358ccdff02226021384b0c235f114ed9ade92767aecc256acdeb610df42e7169f240357f735ae5fe29017e51e27252f48b95bfbbb3a865535298bdc36d71db635f41c57771db77aeaff883feb3dc3cc24bd3c036e396ad3af37945058839e812270bc40901fa654e7cc3292a82fc80c374dc07142a1c2e9d3e2528e4fdac32bcaefe910ebd3b948a3bfebef5fa8d82473c7fbf3ec763a1b613dd747d529ea70ef0298fff5661630b99a79ec8269af9be178aeca17fafb14fd3d6c99aee41d684f5d4200975a999d79ba894dbae4c1a6ef5f1e35af57d82878226d07e63a3f45967e0ee859bb6e0f3c66e68c445208bb32bb2342148aa3f413ea981dcf59c27323f4945e325ba0e69e436e55436a9324f5a458c5acb601104cf2fc7adc67a0662f5499dc4f72fd4d8f4f68ad5da52ed8c929f751f28d9d63fa34b35d4fcfe8c548eb35e3a1d08c077e7d7ea61e716e", 0x0, 0x0) r2 = dup3(r0, r1, 0x0) write$P9_RSTATFS(r2, &(0x7f0000000140)={0x43, 0x9}, 0x43) 21:25:21 executing program 5: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', &(0x7f0000000040)='bpf\x00', 0x0, &(0x7f0000000280)=ANY=[]) mount$bpf(0x0, &(0x7f0000000080)='./file0/../file0\x00', &(0x7f00000000c0)='bpf\x00', 0x80000, &(0x7f00000002c0)) 21:25:21 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000001680)="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", 0x0, 0x0) dup3(r0, r1, 0x0) write$P9_ROPEN(r1, &(0x7f0000000000)={0x18, 0x71}, 0x18) 21:25:21 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000001680)="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", 0x0, 0x0) r2 = dup3(r0, r1, 0x0) write$P9_RWALK(r2, &(0x7f00000000c0)={0x9, 0x6f}, 0x9) 21:25:21 executing program 1: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000001100)='statm\x00') write$P9_RUNLINKAT(r0, &(0x7f0000000080)={0x7, 0x4d}, 0x7) 21:25:21 executing program 6: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000001680)="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", 0x0, 0x0) dup3(r0, r1, 0x0) write$P9_RGETATTR(r1, &(0x7f0000000240)={0xa0, 0x19}, 0xa0) 21:25:21 executing program 1: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000001100)='statm\x00') write$P9_ROPEN(r0, &(0x7f0000000040)={0x18, 0x71}, 0x18) [ 232.066519] gfs2: invalid mount option: l [ 232.070831] gfs2: can't parse mount arguments [ 232.122881] hfsplus: unable to find HFS+ superblock 21:25:21 executing program 2: syz_mount_image$gfs2(&(0x7f0000000040)="6766733297", &(0x7f0000001740)='./file0\x00', 0x0, 0x0, &(0x7f0000001680), 0x0, &(0x7f0000000880)=ANY=[@ANYBLOB='l']) 21:25:21 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000001680)="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", 0x0, 0x0) dup3(r0, r1, 0x0) write$P9_RXATTRCREATE(r1, &(0x7f0000000080)={0x7, 0x21}, 0x7) 21:25:21 executing program 7: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$hfsplus(&(0x7f0000000040)='hfsplus\x00', &(0x7f0000000080)='./file0\x00', 0xd000000, 0x0, &(0x7f0000000300), 0x0, &(0x7f0000000380)) 21:25:21 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = dup(r0) write$P9_RREADLINK(r1, &(0x7f00000000c0)={0x3b3e00b19556b6d2, 0x17, 0x0, {0xfffffffffffffce3, './file0'}}, 0x21f29ed0d643881b) 21:25:21 executing program 0: syz_open_dev$sndseq(&(0x7f0000000000)='/dev/snd/seq\x00', 0x0, 0x0) userfaultfd(0x0) syz_open_dev$mice(&(0x7f0000000100)='/dev/input/mice\x00', 0x0, 0x0) pselect6(0x40, &(0x7f00000abfc0)={0x3ffffd}, &(0x7f0000768000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x64}, &(0x7f00007fbfc0), &(0x7f0000f22000)={0x0, 0x989680}, &(0x7f0000f14000)={&(0x7f0000553ff8), 0x8}) 21:25:21 executing program 3: openat(0xffffffffffffff9c, &(0x7f0000000080)='.\x00', 0x101100, 0x15) 21:25:21 executing program 5: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', &(0x7f0000000040)='bpf\x00', 0x0, &(0x7f0000000280)=ANY=[]) mount$bpf(0x0, &(0x7f0000000080)='./file0/../file0\x00', &(0x7f00000000c0)='bpf\x00', 0x0, &(0x7f00000002c0)) [ 232.187089] gfs2: invalid mount option: l [ 232.191337] gfs2: can't parse mount arguments 21:25:21 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000001680)="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", 0x0, 0x0) r2 = dup3(r0, r1, 0x0) write$P9_RLINK(r2, &(0x7f0000000080)={0x7, 0x47}, 0x7) 21:25:21 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000001680)="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", 0x0, 0x0) dup3(r0, r1, 0x0) write$P9_RFLUSH(r1, &(0x7f0000000000)={0x7, 0x6d}, 0x7) 21:25:21 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = dup(r0) write$P9_RREADLINK(r1, &(0x7f00000000c0)={0x3b3e00b19556b6d2, 0x17, 0x0, {0xfffffffffffffce3, './file0'}}, 0x21f29ed0d643881b) 21:25:21 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000001680)="2f007e574d000330809022cfde26555dc9ecfe1974406edad38364782d63b6612854b9e49dbdcaef718197e37e870a308b1e3a798fa788a46d3025ef933e51828ab675064e2adbe9126423b4a73d68fbe99c6db2f160c69cb6cce76c27289a4f9d197354aaa5860d2383df87526baa184d90bb7729366417bc33d765e9bc2f882a13f3a9c1f60660bd4fd2fa31d2c0a775242289bce062d10d24ded5406918a66b2c75c43fe1ff458ae5cd9fec63039ba5a7b66a60ede5ccdabc7ee77660ef2358ccdff02226021384b0c235f114ed9ade92767aecc256acdeb610df42e7169f240357f735ae5fe29017e51e27252f48b95bfbbb3a865535298bdc36d71db635f41c57771db77aeaff883feb3dc3cc24bd3c036e396ad3af37945058839e812270bc40901fa654e7cc3292a82fc80c374dc07142a1c2e9d3e2528e4fdac32bcaefe910ebd3b948a3bfebef5fa8d82473c7fbf3ec763a1b613dd747d529ea70ef0298fff5661630b99a79ec8269af9be178aeca17fafb14fd3d6c99aee41d684f5d4200975a999d79ba894dbae4c1a6ef5f1e35af57d82878226d07e63a3f45967e0ee859bb6e0f3c66e68c445208bb32bb2342148aa3f413ea981dcf59c27323f4945e325ba0e69e436e55436a9324f5a458c5acb601104cf2fc7adc67a0662f5499dc4f72fd4d8f4f68ad5da52ed8c929f751f28d9d63fa34b35d4fcfe8c548eb35e3a1d08c077e7d7ea61e716e", 0x0, 0x0) dup3(r0, r1, 0x0) write$P9_RCREATE(r1, &(0x7f0000000080)={0x18, 0x73}, 0x18) 21:25:21 executing program 6: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000001680)="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", 0x0, 0x0) r2 = dup3(r0, r1, 0x0) write$P9_RLOPEN(r2, &(0x7f0000000000)={0x18, 0xd}, 0x18) 21:25:21 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000001680)="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", 0x0, 0x0) dup3(r0, r1, 0x0) write$P9_RREADLINK(r1, &(0x7f0000000000)={0x10, 0x17, 0x0, {0x7, './file0'}}, 0x10) 21:25:21 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000001680)="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", 0x0, 0x0) r2 = dup3(r0, r1, 0x0) write$P9_RSETATTR(r2, &(0x7f00000000c0)={0x7, 0x1b}, 0x7) 21:25:21 executing program 0: syz_open_dev$sndseq(&(0x7f0000000000)='/dev/snd/seq\x00', 0x0, 0x0) userfaultfd(0x0) syz_open_dev$mice(&(0x7f0000000100)='/dev/input/mice\x00', 0x0, 0x0) pselect6(0x40, &(0x7f00000abfc0)={0x3ffffd}, &(0x7f0000768000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10}, &(0x7f00007fbfc0), &(0x7f0000f22000)={0x0, 0x989680}, &(0x7f0000f14000)={&(0x7f0000553ff8), 0x8}) 21:25:21 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000001680)="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", 0x0, 0x0) r2 = dup3(r0, r1, 0x0) write$P9_RMKDIR(r2, &(0x7f0000000080)={0x14, 0x49}, 0x14) [ 232.423196] hfsplus: unable to find HFS+ superblock 21:25:21 executing program 2: syz_mount_image$gfs2(&(0x7f0000000040)="6766733206", &(0x7f0000001740)='./file0\x00', 0x0, 0x0, &(0x7f0000001680), 0x0, &(0x7f0000000880)=ANY=[@ANYBLOB='l']) 21:25:21 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000001680)="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", 0x0, 0x0) r2 = dup3(r0, r1, 0x0) write$P9_RSTATu(r2, &(0x7f00000002c0)={0x63, 0x7d, 0x0, {{0x0, 0x43, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x0, "", 0x8, 'vmnet1[*', 0x8, 'vmnet1[*'}, 0xb, 'security\a\\/'}}, 0x63) 21:25:21 executing program 3: pipe2$9p(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RCREATE(r0, &(0x7f0000000080)={0x18, 0x73}, 0x18) 21:25:21 executing program 5: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', &(0x7f0000000040)='bpf\x00', 0x0, &(0x7f0000000280)=ANY=[]) mount$bpf(0x0, &(0x7f0000000080)='./file0/../file0\x00', &(0x7f00000000c0)='bpf\x00', 0x0, &(0x7f00000002c0)) 21:25:21 executing program 6: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000001680)="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", 0x0, 0x0) dup3(r0, r1, 0x0) write$P9_RSTATu(r1, &(0x7f0000000340)={0x67a, 0x7d, 0x0, {{0x0, 0x665, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x8, 'vmnet1[*', 0x20e, "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", 0x20e, "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", 0x20e, "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"}}}, 0x67a) 21:25:21 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = dup(r0) write$P9_RREADLINK(r1, &(0x7f00000000c0)={0x3b3e00b19556b6d2, 0x17, 0x0, {0xfffffffffffffce3, './file0'}}, 0x21f29ed0d643881b) 21:25:21 executing program 7: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$hfsplus(&(0x7f0000000040)='hfsplus\x00', &(0x7f0000000080)='./file0\x00', 0x9000000, 0x0, &(0x7f0000000300), 0x0, &(0x7f0000000380)) 21:25:21 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000001680)="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", 0x0, 0x0) dup3(r0, r1, 0x0) write$P9_RATTACH(r1, &(0x7f0000000000)={0xffffffffffffffb1, 0x69}, 0x14) 21:25:21 executing program 1: pipe2$9p(&(0x7f0000000000)={0xffffffffffffffff}, 0x0) ioctl$int_in(r0, 0x5452, &(0x7f0000000040)) 21:25:21 executing program 1: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(&(0x7f0000000200)='./file0/file0\x00', &(0x7f0000000100)='./file0\x00', &(0x7f00000001c0)='sysfs\x00', 0x1, &(0x7f0000000280)) creat(&(0x7f0000000000)='./file0\x00', 0x0) 21:25:21 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) write$P9_RREADLINK(r0, &(0x7f0000000000)={0x10, 0x17, 0x0, {0x7, './file0'}}, 0x5d718c6d) 21:25:21 executing program 1: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x473d38e0f7f50de4, 0x80) 21:25:21 executing program 3: r0 = openat$random(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x40001, 0x0) r1 = dup2(r0, r0) write$P9_RATTACH(r1, &(0x7f0000000040)={0x14, 0x69}, 0x14) 21:25:21 executing program 0: syz_open_dev$sndseq(&(0x7f0000000000)='/dev/snd/seq\x00', 0x0, 0x0) userfaultfd(0x0) syz_open_dev$mice(&(0x7f0000000100)='/dev/input/mice\x00', 0x0, 0x0) pselect6(0x40, &(0x7f00000abfc0)={0x3ffffd}, &(0x7f0000768000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000000000}, &(0x7f00007fbfc0), &(0x7f0000f22000)={0x0, 0x989680}, &(0x7f0000f14000)={&(0x7f0000553ff8), 0x8}) 21:25:21 executing program 6: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = dup(r0) write$P9_RWRITE(r1, &(0x7f0000000040)={0xb, 0x77}, 0x32f3d512e76c27f3) [ 232.614923] hfsplus: unable to find HFS+ superblock 21:25:21 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)="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", 0x0, 0x0) dup3(r0, r1, 0x0) write$P9_RSETATTR(r1, &(0x7f0000000000)={0x7, 0x1b}, 0x7) 21:25:21 executing program 2: syz_mount_image$gfs2(&(0x7f0000000040)='gfs2\x00', &(0x7f0000001740)='./file0\x00', 0x0, 0x0, &(0x7f0000001680), 0x0, &(0x7f0000000880)=ANY=[@ANYBLOB='l']) 21:25:21 executing program 1: r0 = socket(0xa, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000080)={'veth1_to_team\x00'}) 21:25:21 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = dup(r0) write$P9_RREADLINK(r1, &(0x7f00000000c0)={0x3b3e00b19556b6d2, 0x17, 0x0, {0xfffffffffffffce3, './file0'}}, 0x21f29ed0d643881b) 21:25:21 executing program 7: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$hfsplus(&(0x7f0000000040)='hfsplus\x00', &(0x7f0000000080)='./file0\x00', 0x300, 0x0, &(0x7f0000000300), 0x0, &(0x7f0000000380)) 21:25:21 executing program 5: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', &(0x7f0000000040)='bpf\x00', 0x0, &(0x7f0000000280)=ANY=[]) mount$bpf(0x0, &(0x7f0000000080)='./file0/../file0\x00', &(0x7f00000000c0)='bpf\x00', 0x0, &(0x7f00000002c0)) 21:25:21 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000080)={@remote={0xfe, 0x80, [], 0xbb}, 0x800, 0x0, 0xff, 0x1}, 0x20) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000280)={@remote={0xfe, 0x80, [], 0xbb}, 0x800, 0x1}, 0x20) 21:25:21 executing program 6: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0x400000000000000f, &(0x7f00000000c0)=0x5, 0x4) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x33, &(0x7f0000000300)={0x1, &(0x7f00000002c0)=[{0x6}]}, 0x10) connect$inet6(r0, &(0x7f0000000000)={0xa}, 0x1c) shutdown(r0, 0x0) 21:25:21 executing program 0: syz_open_dev$sndseq(&(0x7f0000000000)='/dev/snd/seq\x00', 0x0, 0x0) userfaultfd(0x0) syz_open_dev$mice(&(0x7f0000000100)='/dev/input/mice\x00', 0x0, 0x0) pselect6(0x40, &(0x7f00000abfc0)={0x3ffffd}, &(0x7f0000768000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000000000000}, &(0x7f00007fbfc0), &(0x7f0000f22000)={0x0, 0x989680}, &(0x7f0000f14000)={&(0x7f0000553ff8), 0x8}) [ 232.876377] attempt to access beyond end of device [ 232.881421] loop7: rw=2048, want=3, limit=1 21:25:21 executing program 4: socket$nl_route(0x10, 0x3, 0x0) write$P9_RREADLINK(0xffffffffffffffff, &(0x7f00000000c0)={0x3b3e00b19556b6d2, 0x17, 0x0, {0xfffffffffffffce3, './file0'}}, 0x21f29ed0d643881b) [ 232.922211] hfsplus: unable to find HFS+ superblock 21:25:22 executing program 3: unshare(0x24020400) unshare(0x28020400) [ 232.952616] gfs2: invalid mount option: l [ 232.956890] gfs2: can't parse mount arguments 21:25:22 executing program 0: syz_open_dev$sndseq(&(0x7f0000000000)='/dev/snd/seq\x00', 0x0, 0x0) userfaultfd(0x0) syz_open_dev$mice(&(0x7f0000000100)='/dev/input/mice\x00', 0x0, 0x0) pselect6(0x40, &(0x7f00000abfc0)={0x3ffffd}, &(0x7f0000768000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000000000}, &(0x7f00007fbfc0), &(0x7f0000f22000)={0x0, 0x989680}, &(0x7f0000f14000)={&(0x7f0000553ff8), 0x8}) 21:25:22 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000040)={0x2, 0x4e20, @multicast1=0xe0000001}, 0x10) setsockopt$sock_int(r0, 0x1, 0x3c, &(0x7f0000000180)=0x80000000000001, 0x80) connect$inet(r0, &(0x7f0000000100)={0x2, 0x4e20, @loopback=0x7f000001}, 0x10) sendmmsg(r0, &(0x7f0000007080)=[{{&(0x7f0000005880)=@xdp={0x2c}, 0x80, &(0x7f0000005c40)=[{&(0x7f0000005900)="1b", 0x1}], 0x1, &(0x7f0000005c80)=ANY=[]}}], 0x1, 0x4000010) 21:25:22 executing program 4: socket$nl_route(0x10, 0x3, 0x0) write$P9_RREADLINK(0xffffffffffffffff, &(0x7f00000000c0)={0x3b3e00b19556b6d2, 0x17, 0x0, {0xfffffffffffffce3, './file0'}}, 0x21f29ed0d643881b) 21:25:22 executing program 6: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0x400000000000000f, &(0x7f00000000c0)=0x5, 0x4) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x33, &(0x7f0000000300)={0x1, &(0x7f00000002c0)=[{0x6}]}, 0x10) connect$inet6(r0, &(0x7f0000000000)={0xa}, 0x1c) shutdown(r0, 0x0) 21:25:22 executing program 7: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$hfsplus(&(0x7f0000000040)='hfsplus\x00', &(0x7f0000000080)='./file0\x00', 0xffffff7f00000000, 0x0, &(0x7f0000000300), 0x0, &(0x7f0000000380)) [ 233.053670] gfs2: invalid mount option: l [ 233.058134] gfs2: can't parse mount arguments 21:25:22 executing program 2: syz_mount_image$gfs2(&(0x7f0000000040)="676673327f", &(0x7f0000001740)='./file0\x00', 0x0, 0x0, &(0x7f0000001680), 0x0, &(0x7f0000000880)=ANY=[@ANYBLOB='l']) 21:25:22 executing program 3: socketpair(0x2, 0xa, 0x101, &(0x7f0000000040)) [ 233.179799] hfsplus: unable to find HFS+ superblock [ 233.207448] syz-executor3 uses obsolete (PF_INET,SOCK_PACKET) 21:25:22 executing program 1: shmctl$IPC_SET(0x0, 0x1, &(0x7f0000000400)) 21:25:22 executing program 0: syz_open_dev$sndseq(&(0x7f0000000000)='/dev/snd/seq\x00', 0x0, 0x0) userfaultfd(0x0) syz_open_dev$mice(&(0x7f0000000100)='/dev/input/mice\x00', 0x0, 0x0) pselect6(0x40, &(0x7f00000abfc0)={0x3ffffd}, &(0x7f0000768000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1600}, &(0x7f00007fbfc0), &(0x7f0000f22000)={0x0, 0x989680}, &(0x7f0000f14000)={&(0x7f0000553ff8), 0x8}) 21:25:22 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) sendto$inet(r0, &(0x7f000099bf26), 0x143, 0x20000000, &(0x7f0000000080)={0x2}, 0x10) sendto$inet(r0, &(0x7f0000000300), 0x0, 0x20000001, 0x0, 0x0) 21:25:22 executing program 4: socket$nl_route(0x10, 0x3, 0x0) write$P9_RREADLINK(0xffffffffffffffff, &(0x7f00000000c0)={0x3b3e00b19556b6d2, 0x17, 0x0, {0xfffffffffffffce3, './file0'}}, 0x21f29ed0d643881b) 21:25:22 executing program 6: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000080)={@remote={0xfe, 0x80, [], 0xbb}, 0x0, 0x0, 0xff, 0x1, 0x0, 0x20}, 0x20) 21:25:22 executing program 1: timer_create(0x0, &(0x7f0000000140)={0x0, 0x3e, 0x1, @tid=0xffffffffffffffff}, &(0x7f0000000180)) timer_gettime(0x0, &(0x7f00000001c0)) 21:25:22 executing program 7: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$hfsplus(&(0x7f0000000040)='hfsplus\x00', &(0x7f0000000080)='./file0\x00', 0x4000000, 0x0, &(0x7f0000000300), 0x0, &(0x7f0000000380)) 21:25:22 executing program 1: r0 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) read$eventfd(r0, &(0x7f00000000c0), 0x8) 21:25:22 executing program 2: syz_mount_image$gfs2(&(0x7f0000000040)='gfs2z', &(0x7f0000001740)='./file0\x00', 0x0, 0x0, &(0x7f0000001680), 0x0, &(0x7f0000000880)=ANY=[@ANYBLOB='l']) 21:25:22 executing program 1: r0 = socket$packet(0x11, 0x2, 0x300) sendmmsg(r0, &(0x7f0000000140)=[{{&(0x7f0000000300)=@generic={0x0, "c2491aee4bd59074e6f13e3784f6c09c9964ab49742b46df51d01cbceda9dbc90de3e7ae689f030fdf720bffceb872ce37c83dd4d5dcdd2c6121cf4c24a8abee61d775d9b3cc7cb6c33e3be2c2193732925caf846750680b9bb07cef277cd31a61ee40a69c261f0976e81fc014ab2a307030619462ced4174342004a0fdd"}, 0x80, &(0x7f0000000080), 0x0, &(0x7f0000000000)}}], 0x1, 0x0) 21:25:22 executing program 1: r0 = mq_open(&(0x7f00005a1ffb)='eth0\x00', 0x0, 0x0, &(0x7f0000000000)) mq_timedsend(r0, &(0x7f0000000040), 0x0, 0x0, 0x0) 21:25:22 executing program 3: r0 = socket$inet6(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000002fc8)={&(0x7f0000000580)=@nl=@kern={0x10}, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000200)="5500000018007f5300fe0199a4a280930a60000000a84302910000003900090035000c00020000000d000500000000000080c78b80082314e9030b1ee4ad69b167320b0051dc1338ec4400009b84136ef75afb83de", 0x55}], 0x1, &(0x7f0000000000)}, 0x0) 21:25:22 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000deb000)={0x2, 0x4e23, @multicast2=0xe0000002}, 0x10) setsockopt$sock_int(r0, 0x1, 0xa, &(0x7f00000000c0)=0xff, 0x1000002b3) sendto$inet(r0, &(0x7f0000000180), 0xfffffffffffffccb, 0x200007ff, &(0x7f0000deaff0)={0x2, 0x4e23, @loopback=0x7f000001}, 0x10) sendto$inet(r0, &(0x7f00006fd000)="c3", 0x1, 0x81, &(0x7f00000001c0)={0x2, 0x0, @rand_addr}, 0x10) sendto$inet(r0, &(0x7f0000000000)='F', 0x1, 0x20000051, &(0x7f0000000100)={0x2, 0x0, @dev={0xac, 0x14, 0x14}}, 0x10) 21:25:22 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = epoll_create(0x8) epoll_wait(r1, &(0x7f00000000c0)=[{}], 0x1, 0xfffbfffffffffffb) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000040)) 21:25:22 executing program 4: r0 = dup(0xffffffffffffffff) write$P9_RREADLINK(r0, &(0x7f00000000c0)={0x3b3e00b19556b6d2, 0x17, 0x0, {0xfffffffffffffce3, './file0'}}, 0x21f29ed0d643881b) 21:25:22 executing program 6: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x2) ioctl$KVM_SET_MP_STATE(r2, 0x4004ae99, &(0x7f00000002c0)=0x3) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000100)=[@text64={0x40, &(0x7f0000000500)="0f0866b8ed008ec066ba4000b000eed2a807000000410f01cab98e0b0000b862000000ba000000000f30b90b0800000f320fc72a8f2a60128f00000000003000000fc7aa00100000", 0x48}], 0x1, 0x0, &(0x7f0000000000), 0x1000000000000040) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_IRQ_LINE(r1, 0x4008ae61, &(0x7f0000000000)={0x0, 0x2}) 21:25:22 executing program 0: syz_open_dev$sndseq(&(0x7f0000000000)='/dev/snd/seq\x00', 0x0, 0x0) userfaultfd(0x0) syz_open_dev$mice(&(0x7f0000000100)='/dev/input/mice\x00', 0x0, 0x0) pselect6(0x40, &(0x7f00000abfc0)={0x3ffffd}, &(0x7f0000768000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, &(0x7f00007fbfc0), &(0x7f0000f22000)={0x0, 0x989680}, &(0x7f0000f14000)={&(0x7f0000553ff8), 0x8}) [ 233.488377] hfsplus: unable to find HFS+ superblock 21:25:22 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_IRQ_LINE(0xffffffffffffffff, 0x4008ae61, &(0x7f0000000000)) ioctl$KVM_GET_XCRS(r2, 0x8188aea6, &(0x7f0000000140)) 21:25:22 executing program 4: r0 = dup(0xffffffffffffffff) write$P9_RREADLINK(r0, &(0x7f00000000c0)={0x3b3e00b19556b6d2, 0x17, 0x0, {0xfffffffffffffce3, './file0'}}, 0x21f29ed0d643881b) 21:25:22 executing program 7: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$hfsplus(&(0x7f0000000040)='hfsplus\x00', &(0x7f0000000080)='./file0\x00', 0x482b0000, 0x0, &(0x7f0000000300), 0x0, &(0x7f0000000380)) 21:25:22 executing program 2: syz_mount_image$gfs2(&(0x7f0000000040)='gfs2\x00', &(0x7f0000001740)='./file0\x00', 0x4, 0x0, &(0x7f0000001680), 0x0, &(0x7f0000000880)=ANY=[@ANYBLOB='l']) 21:25:22 executing program 0: syz_open_dev$sndseq(&(0x7f0000000000)='/dev/snd/seq\x00', 0x0, 0x0) userfaultfd(0x0) syz_open_dev$mice(&(0x7f0000000100)='/dev/input/mice\x00', 0x0, 0x0) pselect6(0x40, &(0x7f00000abfc0)={0x3ffffd}, &(0x7f0000768000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800000000000000}, &(0x7f00007fbfc0), &(0x7f0000f22000)={0x0, 0x989680}, &(0x7f0000f14000)={&(0x7f0000553ff8), 0x8}) 21:25:22 executing program 4: r0 = dup(0xffffffffffffffff) write$P9_RREADLINK(r0, &(0x7f00000000c0)={0x3b3e00b19556b6d2, 0x17, 0x0, {0xfffffffffffffce3, './file0'}}, 0x21f29ed0d643881b) 21:25:22 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x858, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = getpgrp(0xffffffffffffffff) r1 = getpgrp(0xffffffffffffffff) kcmp(r0, r1, 0x4, 0xffffffffffffffff, 0xffffffffffffffff) memfd_create(&(0x7f0000000240)='net/ip6_tables_names\x00', 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) ioctl$TIOCNXCL(0xffffffffffffffff, 0x540d) ioctl$KVM_SET_MP_STATE(0xffffffffffffffff, 0x4004ae99, &(0x7f00000002c0)) [ 233.650673] hfsplus: unable to find HFS+ superblock [ 233.659558] gfs2: invalid mount option: l [ 233.663841] gfs2: can't parse mount arguments 21:25:22 executing program 7: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$hfsplus(&(0x7f0000000040)='hfsplus\x00', &(0x7f0000000080)='./file0\x00', 0x6c0c0000, 0x0, &(0x7f0000000300), 0x0, &(0x7f0000000380)) 21:25:22 executing program 0: syz_open_dev$sndseq(&(0x7f0000000000)='/dev/snd/seq\x00', 0x0, 0x0) userfaultfd(0x0) syz_open_dev$mice(&(0x7f0000000100)='/dev/input/mice\x00', 0x0, 0x0) pselect6(0x40, &(0x7f00000abfc0)={0x3ffffd}, &(0x7f0000768000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000}, &(0x7f00007fbfc0), &(0x7f0000f22000)={0x0, 0x989680}, &(0x7f0000f14000)={&(0x7f0000553ff8), 0x8}) 21:25:22 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = dup(0xffffffffffffffff) write$P9_RREADLINK(r1, &(0x7f00000000c0)={0x3b3e00b19556b6d2, 0x17, 0x0, {0xfffffffffffffce3, './file0'}}, 0x21f29ed0d643881b) 21:25:22 executing program 3: perf_event_open(&(0x7f0000aaa000)={0x2, 0x70, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setreuid(0x0, 0x0) [ 233.744983] gfs2: invalid mount option: l [ 233.749361] gfs2: can't parse mount arguments [ 233.784251] hfsplus: unable to find HFS+ superblock 21:25:23 executing program 1: syz_open_dev$vcsa(&(0x7f0000000040)='/dev/vcsa#\x00', 0x1, 0x40042) 21:25:23 executing program 2: syz_mount_image$gfs2(&(0x7f0000000040)='gfs2\x00', &(0x7f0000001740)='./file0\x00', 0x7a, 0x0, &(0x7f0000001680), 0x0, &(0x7f0000000880)=ANY=[@ANYBLOB='l']) 21:25:23 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = dup(0xffffffffffffffff) write$P9_RREADLINK(r1, &(0x7f00000000c0)={0x3b3e00b19556b6d2, 0x17, 0x0, {0xfffffffffffffce3, './file0'}}, 0x21f29ed0d643881b) [ 234.376597] gfs2: invalid mount option: l [ 234.380915] gfs2: can't parse mount arguments [ 234.395312] gfs2: invalid mount option: l [ 234.399563] gfs2: can't parse mount arguments 21:25:23 executing program 6: r0 = socket(0x4000000000000a, 0x1, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000c00)={'team0\x00', 0x0}) ioctl$sock_inet6_SIOCDIFADDR(r0, 0x8936, &(0x7f0000000c40)={@local={0xfe, 0x80, [], 0xaa}, 0x78, r1}) 21:25:23 executing program 7: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$hfsplus(&(0x7f0000000040)='hfsplus\x00', &(0x7f0000000080)='./file0\x00', 0xf5ffffff, 0x0, &(0x7f0000000300), 0x0, &(0x7f0000000380)) 21:25:23 executing program 0: syz_open_dev$sndseq(&(0x7f0000000000)='/dev/snd/seq\x00', 0x0, 0x0) userfaultfd(0x0) syz_open_dev$mice(&(0x7f0000000100)='/dev/input/mice\x00', 0x0, 0x0) pselect6(0x40, &(0x7f00000abfc0)={0x3ffffd}, &(0x7f0000768000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x60}, &(0x7f00007fbfc0), &(0x7f0000f22000)={0x0, 0x989680}, &(0x7f0000f14000)={&(0x7f0000553ff8), 0x8}) 21:25:23 executing program 3: r0 = syz_open_dev$mice(&(0x7f00000014c0)='/dev/input/mice\x00', 0x0, 0x103400) close(r0) 21:25:23 executing program 5: unlinkat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x0) 21:25:23 executing program 1: clock_gettime(0x0, &(0x7f0000000400)={0x0, 0x0}) select(0x40, &(0x7f0000000340), &(0x7f0000000380)={0x1ff}, &(0x7f00000003c0), &(0x7f0000000440)={0x0, r0/1000+10000}) 21:25:23 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = dup(0xffffffffffffffff) write$P9_RREADLINK(r1, &(0x7f00000000c0)={0x3b3e00b19556b6d2, 0x17, 0x0, {0xfffffffffffffce3, './file0'}}, 0x21f29ed0d643881b) 21:25:23 executing program 2: syz_mount_image$gfs2(&(0x7f0000000040)='gfs2\x00', &(0x7f0000001740)='./file0\x00', 0x48000000, 0x0, &(0x7f0000001680), 0x0, &(0x7f0000000880)=ANY=[@ANYBLOB='l']) 21:25:23 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x4e20, @multicast1=0xe0000001}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20, @empty=0x700000000000000}, 0x10) recvmsg(r0, &(0x7f0000000680)={&(0x7f0000000000)=@generic, 0x80, &(0x7f0000000100)=[{&(0x7f0000000480)=""/215, 0xd7}], 0x1, &(0x7f0000000580)=""/223, 0xdf}, 0x0) connect$unix(r0, &(0x7f0000000140)=@abs, 0x6e) [ 234.503693] hfsplus: unable to find HFS+ superblock 21:25:23 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) connect(r0, &(0x7f0000000000)=@in6={0xa, 0x0, 0x0, @local={0xfe, 0x80, [], 0xaa}}, 0x80) 21:25:23 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000deb000)={0x2, 0x4e23, @broadcast=0xffffffff}, 0x10) sendto$inet(r0, &(0x7f0000000140), 0x0, 0x200007ff, &(0x7f0000deaff0)={0x2, 0x4e23}, 0x10) 21:25:23 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = dup(r0) write$P9_RREADLINK(0xffffffffffffffff, &(0x7f00000000c0)={0x3b3e00b19556b6d2, 0x17, 0x0, {0xfffffffffffffce3, './file0'}}, 0x21f29ed0d643881b) 21:25:23 executing program 7: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$hfsplus(&(0x7f0000000040)='hfsplus\x00', &(0x7f0000000080)='./file0\x00', 0x68e6020000000000, 0x0, &(0x7f0000000300), 0x0, &(0x7f0000000380)) 21:25:23 executing program 2: syz_mount_image$gfs2(&(0x7f0000000040)='gfs2\x00', &(0x7f0000001740)='./file0\x00', 0xa, 0x0, &(0x7f0000001680), 0x0, &(0x7f0000000880)=ANY=[@ANYBLOB='l']) 21:25:23 executing program 6: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000000c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x9}, 0xc, &(0x7f0000000000)={&(0x7f0000000080)=@newlink={0x20, 0x10}, 0x20}, 0x1}, 0x0) [ 234.539396] gfs2: invalid mount option: l [ 234.543673] gfs2: can't parse mount arguments 21:25:23 executing program 0: syz_open_dev$sndseq(&(0x7f0000000000)='/dev/snd/seq\x00', 0x0, 0x0) userfaultfd(0x0) syz_open_dev$mice(&(0x7f0000000100)='/dev/input/mice\x00', 0x0, 0x0) pselect6(0x40, &(0x7f00000abfc0)={0x3ffffd}, &(0x7f0000768000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x16}, &(0x7f00007fbfc0), &(0x7f0000f22000)={0x0, 0x989680}, &(0x7f0000f14000)={&(0x7f0000553ff8), 0x8}) 21:25:23 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5, 0x7f, 0x1, 0x3, 0x0, 0xffffffffffffff9c}, 0x2c) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000240)={r0, &(0x7f0000000100), &(0x7f0000000180)=""/162}, 0x18) 21:25:23 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = dup(r0) write$P9_RREADLINK(0xffffffffffffffff, &(0x7f00000000c0)={0x3b3e00b19556b6d2, 0x17, 0x0, {0xfffffffffffffce3, './file0'}}, 0x21f29ed0d643881b) 21:25:23 executing program 6: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_BOOT_CPU_ID(r1, 0xae78, &(0x7f0000000080)) 21:25:23 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f00000002c0)="2f65786500000000000489004bddd9de91be10eebf000ee91e18f0c76fbb232a07424ae1e901d2da75af1f0200f5ab26d7e071fb35331ce39c5a0000") syncfs(r0) [ 234.674412] hfsplus: unable to find HFS+ superblock [ 234.682108] gfs2: invalid mount option: l [ 234.686390] gfs2: can't parse mount arguments 21:25:23 executing program 7: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$hfsplus(&(0x7f0000000040)='hfsplus\x00', &(0x7f0000000080)='./file0\x00', 0x2300000000000000, 0x0, &(0x7f0000000300), 0x0, &(0x7f0000000380)) [ 234.717570] gfs2: invalid mount option: l [ 234.721876] gfs2: can't parse mount arguments 21:25:23 executing program 0: syz_open_dev$sndseq(&(0x7f0000000000)='/dev/snd/seq\x00', 0x0, 0x0) userfaultfd(0x0) syz_open_dev$mice(&(0x7f0000000100)='/dev/input/mice\x00', 0x0, 0x0) pselect6(0x40, &(0x7f00000abfc0)={0x3ffffd}, &(0x7f0000768000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1600000000000000}, &(0x7f00007fbfc0), &(0x7f0000f22000)={0x0, 0x989680}, &(0x7f0000f14000)={&(0x7f0000553ff8), 0x8}) 21:25:23 executing program 5: 21:25:23 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = dup(r0) write$P9_RREADLINK(0xffffffffffffffff, &(0x7f00000000c0)={0x3b3e00b19556b6d2, 0x17, 0x0, {0xfffffffffffffce3, './file0'}}, 0x21f29ed0d643881b) [ 234.859578] hfsplus: unable to find HFS+ superblock 21:25:24 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x4e20, @multicast1=0xe0000001}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20, @empty=0x700000000000000}, 0x10) recvmsg(r0, &(0x7f0000000680)={&(0x7f0000000000)=@generic, 0x80, &(0x7f0000000100)=[{&(0x7f0000000480)=""/215, 0xd7}], 0x1, &(0x7f0000000580)=""/223, 0xdf}, 0x0) connect$unix(r0, &(0x7f0000000140)=@abs, 0x6e) 21:25:24 executing program 2: syz_mount_image$gfs2(&(0x7f0000000040)='gfs2\x00', &(0x7f0000001740)='./file0\x00', 0x74000000, 0x0, &(0x7f0000001680), 0x0, &(0x7f0000000880)=ANY=[@ANYBLOB='l']) 21:25:24 executing program 3: 21:25:24 executing program 6: 21:25:24 executing program 7: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$hfsplus(&(0x7f0000000040)='hfsplus\x00', &(0x7f0000000080)='./file0\x00', 0x4000000000000000, 0x0, &(0x7f0000000300), 0x0, &(0x7f0000000380)) 21:25:24 executing program 5: 21:25:24 executing program 0: syz_open_dev$sndseq(&(0x7f0000000000)='/dev/snd/seq\x00', 0x0, 0x0) userfaultfd(0x0) syz_open_dev$mice(&(0x7f0000000100)='/dev/input/mice\x00', 0x0, 0x0) pselect6(0x40, &(0x7f00000abfc0)={0x3ffffd}, &(0x7f0000768000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x16000000}, &(0x7f00007fbfc0), &(0x7f0000f22000)={0x0, 0x989680}, &(0x7f0000f14000)={&(0x7f0000553ff8), 0x8}) 21:25:24 executing program 4: 21:25:24 executing program 5: 21:25:24 executing program 3: 21:25:24 executing program 4: 21:25:24 executing program 6: 21:25:24 executing program 0: syz_open_dev$sndseq(&(0x7f0000000000)='/dev/snd/seq\x00', 0x0, 0x0) userfaultfd(0x0) syz_open_dev$mice(&(0x7f0000000100)='/dev/input/mice\x00', 0x0, 0x0) pselect6(0x40, &(0x7f00000abfc0)={0x3ffffd}, &(0x7f0000768000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000}, &(0x7f00007fbfc0), &(0x7f0000f22000)={0x0, 0x989680}, &(0x7f0000f14000)={&(0x7f0000553ff8), 0x8}) [ 235.426249] gfs2: invalid mount option: l [ 235.430770] gfs2: can't parse mount arguments [ 235.432942] hfsplus: unable to find HFS+ superblock 21:25:24 executing program 6: 21:25:24 executing program 7: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$hfsplus(&(0x7f0000000040)='hfsplus\x00', &(0x7f0000000080)='./file0\x00', 0x4d50, 0x0, &(0x7f0000000300), 0x0, &(0x7f0000000380)) 21:25:24 executing program 5: [ 235.536290] gfs2: invalid mount option: l [ 235.540583] gfs2: can't parse mount arguments [ 235.640037] hfsplus: unable to find HFS+ superblock 21:25:25 executing program 1: 21:25:25 executing program 3: 21:25:25 executing program 4: 21:25:25 executing program 6: 21:25:25 executing program 0: syz_open_dev$sndseq(&(0x7f0000000000)='/dev/snd/seq\x00', 0x0, 0x0) userfaultfd(0x0) syz_open_dev$mice(&(0x7f0000000100)='/dev/input/mice\x00', 0x0, 0x0) pselect6(0x40, &(0x7f00000abfc0)={0x3ffffd}, &(0x7f0000768000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6000000000000000}, &(0x7f00007fbfc0), &(0x7f0000f22000)={0x0, 0x989680}, &(0x7f0000f14000)={&(0x7f0000553ff8), 0x8}) 21:25:25 executing program 2: syz_mount_image$gfs2(&(0x7f0000000040)='gfs2\x00', &(0x7f0000001740)='./file0\x00', 0xe0ff, 0x0, &(0x7f0000001680), 0x0, &(0x7f0000000880)=ANY=[@ANYBLOB='l']) 21:25:25 executing program 5: 21:25:25 executing program 7: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$hfsplus(&(0x7f0000000040)='hfsplus\x00', &(0x7f0000000080)='./file0\x00', 0xe0000, 0x0, &(0x7f0000000300), 0x0, &(0x7f0000000380)) 21:25:25 executing program 1: 21:25:25 executing program 1: 21:25:25 executing program 1: 21:25:25 executing program 1: 21:25:25 executing program 4: 21:25:25 executing program 6: [ 236.283178] gfs2: invalid mount option: l [ 236.287500] gfs2: can't parse mount arguments 21:25:25 executing program 3: 21:25:25 executing program 1: 21:25:25 executing program 5: 21:25:25 executing program 1: 21:25:25 executing program 1: [ 236.357869] hfsplus: unable to find HFS+ superblock 21:25:25 executing program 1: 21:25:25 executing program 0: syz_open_dev$sndseq(&(0x7f0000000000)='/dev/snd/seq\x00', 0x0, 0x0) userfaultfd(0x0) syz_open_dev$mice(&(0x7f0000000100)='/dev/input/mice\x00', 0x0, 0x0) pselect6(0x40, &(0x7f00000abfc0)={0x3ffffd}, &(0x7f0000768000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6400000000000000}, &(0x7f00007fbfc0), &(0x7f0000f22000)={0x0, 0x989680}, &(0x7f0000f14000)={&(0x7f0000553ff8), 0x8}) [ 236.442873] gfs2: invalid mount option: l [ 236.447107] gfs2: can't parse mount arguments 21:25:25 executing program 2: syz_mount_image$gfs2(&(0x7f0000000040)='gfs2\x00', &(0x7f0000001740)='./file0\x00', 0x1000000, 0x0, &(0x7f0000001680), 0x0, &(0x7f0000000880)=ANY=[@ANYBLOB='l']) 21:25:25 executing program 1: 21:25:25 executing program 3: 21:25:25 executing program 7: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$hfsplus(&(0x7f0000000040)='hfsplus\x00', &(0x7f0000000080)='./file0\x00', 0x3000000, 0x0, &(0x7f0000000300), 0x0, &(0x7f0000000380)) 21:25:25 executing program 4: 21:25:25 executing program 6: 21:25:25 executing program 5: 21:25:25 executing program 1: 21:25:25 executing program 1: 21:25:25 executing program 0: syz_open_dev$sndseq(&(0x7f0000000000)='/dev/snd/seq\x00', 0x0, 0x0) userfaultfd(0x0) syz_open_dev$mice(&(0x7f0000000100)='/dev/input/mice\x00', 0x0, 0x0) pselect6(0x40, &(0x7f00000abfc0)={0x3ffffd}, &(0x7f0000768000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x60000000}, &(0x7f00007fbfc0), &(0x7f0000f22000)={0x0, 0x989680}, &(0x7f0000f14000)={&(0x7f0000553ff8), 0x8}) 21:25:25 executing program 1: 21:25:25 executing program 1: 21:25:25 executing program 1: 21:25:25 executing program 1: 21:25:25 executing program 1: 21:25:25 executing program 1: [ 236.678196] hfsplus: unable to find HFS+ superblock [ 236.756412] gfs2: invalid mount option: l [ 236.760658] gfs2: can't parse mount arguments [ 236.791905] gfs2: invalid mount option: l [ 236.796213] gfs2: can't parse mount arguments 21:25:25 executing program 2: syz_mount_image$gfs2(&(0x7f0000000040)='gfs2\x00', &(0x7f0000001740)='./file0\x00', 0x7009000000000000, 0x0, &(0x7f0000001680), 0x0, &(0x7f0000000880)=ANY=[@ANYBLOB='l']) 21:25:25 executing program 1: 21:25:25 executing program 3: 21:25:25 executing program 4: 21:25:25 executing program 6: 21:25:25 executing program 0: syz_open_dev$sndseq(&(0x7f0000000000)='/dev/snd/seq\x00', 0x0, 0x0) userfaultfd(0x0) syz_open_dev$mice(&(0x7f0000000100)='/dev/input/mice\x00', 0x0, 0x0) pselect6(0x40, &(0x7f00000abfc0)={0x3ffffd}, &(0x7f0000768000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6000}, &(0x7f00007fbfc0), &(0x7f0000f22000)={0x0, 0x989680}, &(0x7f0000f14000)={&(0x7f0000553ff8), 0x8}) 21:25:25 executing program 5: 21:25:25 executing program 7: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$hfsplus(&(0x7f0000000040)='hfsplus\x00', &(0x7f0000000080)='./file0\x00', 0x482b, 0x0, &(0x7f0000000300), 0x0, &(0x7f0000000380)) 21:25:25 executing program 1: 21:25:25 executing program 1: [ 236.864515] hfsplus: unable to find HFS+ superblock 21:25:25 executing program 1: 21:25:25 executing program 1: 21:25:25 executing program 6: 21:25:25 executing program 5: 21:25:25 executing program 1: 21:25:26 executing program 1: 21:25:26 executing program 7: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$hfsplus(&(0x7f0000000040)='hfsplus\x00', &(0x7f0000000080)='./file0\x00', 0x4d50000000000000, 0x0, &(0x7f0000000300), 0x0, &(0x7f0000000380)) 21:25:26 executing program 3: 21:25:26 executing program 4: 21:25:26 executing program 0: syz_open_dev$sndseq(&(0x7f0000000000)='/dev/snd/seq\x00', 0x0, 0x0) userfaultfd(0x0) syz_open_dev$mice(&(0x7f0000000100)='/dev/input/mice\x00', 0x0, 0x0) pselect6(0x40, &(0x7f00000abfc0)={0x3ffffd}, &(0x7f0000768000), &(0x7f00007fbfc0)={0x10}, &(0x7f0000f22000)={0x0, 0x989680}, &(0x7f0000f14000)={&(0x7f0000553ff8), 0x8}) 21:25:26 executing program 2: syz_mount_image$gfs2(&(0x7f0000000040)='gfs2\x00', &(0x7f0000001740)='./file0\x00', 0x200000000000000, 0x0, &(0x7f0000001680), 0x0, &(0x7f0000000880)=ANY=[@ANYBLOB='l']) 21:25:26 executing program 5: 21:25:26 executing program 1: 21:25:26 executing program 6: [ 237.037497] gfs2: invalid mount option: l [ 237.041779] gfs2: can't parse mount arguments 21:25:26 executing program 1: 21:25:26 executing program 1: 21:25:26 executing program 1: 21:25:26 executing program 1: 21:25:26 executing program 1: [ 237.165144] hfsplus: unable to find HFS+ superblock 21:25:26 executing program 1: 21:25:26 executing program 3: 21:25:26 executing program 5: 21:25:26 executing program 7: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$hfsplus(&(0x7f0000000040)='hfsplus\x00', &(0x7f0000000080)='./file0\x00', 0x1000000000000, 0x0, &(0x7f0000000300), 0x0, &(0x7f0000000380)) 21:25:26 executing program 6: 21:25:26 executing program 4: 21:25:26 executing program 0: syz_open_dev$sndseq(&(0x7f0000000000)='/dev/snd/seq\x00', 0x0, 0x0) userfaultfd(0x0) syz_open_dev$mice(&(0x7f0000000100)='/dev/input/mice\x00', 0x0, 0x0) pselect6(0x40, &(0x7f00000abfc0)={0x3ffffd}, &(0x7f0000768000), &(0x7f00007fbfc0)={0x1000000000000000}, &(0x7f0000f22000)={0x0, 0x989680}, &(0x7f0000f14000)={&(0x7f0000553ff8), 0x8}) [ 237.267211] gfs2: invalid mount option: l [ 237.271461] gfs2: can't parse mount arguments [ 237.362773] hfsplus: unable to find HFS+ superblock 21:25:26 executing program 2: syz_mount_image$gfs2(&(0x7f0000000040)='gfs2\x00', &(0x7f0000001740)='./file0\x00', 0x3f000000, 0x0, &(0x7f0000001680), 0x0, &(0x7f0000000880)=ANY=[@ANYBLOB='l']) 21:25:26 executing program 1: 21:25:26 executing program 5: 21:25:26 executing program 4: 21:25:26 executing program 6: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r0) r1 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) lseek(r1, 0x0, 0x3) 21:25:26 executing program 3: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(&(0x7f0000000200)='./file0/file0\x00', &(0x7f0000000100)='./file0\x00', &(0x7f00000001c0)='sysfs\x00', 0x0, &(0x7f0000000280)) rmdir(&(0x7f0000000080)='./file0\x00') 21:25:26 executing program 1: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) [ 237.393879] gfs2: invalid mount option: l [ 237.398212] gfs2: can't parse mount arguments [ 237.404947] hfsplus: unable to find HFS+ superblock 21:25:26 executing program 0: syz_open_dev$sndseq(&(0x7f0000000000)='/dev/snd/seq\x00', 0x0, 0x0) userfaultfd(0x0) syz_open_dev$mice(&(0x7f0000000100)='/dev/input/mice\x00', 0x0, 0x0) pselect6(0x40, &(0x7f00000abfc0)={0x3ffffd}, &(0x7f0000768000), &(0x7f00007fbfc0)={0x1000000000000}, &(0x7f0000f22000)={0x0, 0x989680}, &(0x7f0000f14000)={&(0x7f0000553ff8), 0x8}) 21:25:26 executing program 1: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) 21:25:26 executing program 5: mkdir(&(0x7f0000000300)='./control\x00', 0x0) r0 = creat(&(0x7f0000000000)='./control/file0\x00', 0x0) close(r0) 21:25:26 executing program 4: r0 = creat(&(0x7f0000000140)='./file0\x00', 0x0) lseek(r0, 0x0, 0x3) 21:25:26 executing program 1: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) 21:25:26 executing program 7: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$hfsplus(&(0x7f0000000040)='hfsplus\x00', &(0x7f0000000080)='./file0\x00', 0x3f000000, 0x0, &(0x7f0000000300), 0x0, &(0x7f0000000380)) 21:25:26 executing program 6: unlinkat(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x0) 21:25:26 executing program 3: mkdir(&(0x7f0000000240)='./file0/file0\x00', 0x0) 21:25:26 executing program 1: creat(&(0x7f0000000040)='./file0\x00', 0x0) faccessat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0) [ 237.548413] gfs2: invalid mount option: l [ 237.552697] gfs2: can't parse mount arguments [ 237.603677] hfsplus: unable to find HFS+ superblock 21:25:26 executing program 2: syz_mount_image$gfs2(&(0x7f0000000040)='gfs2\x00', &(0x7f0000001740)='./file0\x00', 0xfdfdffff, 0x0, &(0x7f0000001680), 0x0, &(0x7f0000000880)=ANY=[@ANYBLOB='l']) 21:25:26 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) connect$inet(r0, &(0x7f0000000000)={0x2}, 0x10) write(r0, &(0x7f00000001c0), 0xfffffdd1) shutdown(r0, 0x0) 21:25:26 executing program 4: syz_open_procfs(0x0, &(0x7f0000000040)='setgroups\x00') 21:25:26 executing program 6: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x4e20, @multicast1=0xe0000001}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) write$binfmt_script(r0, &(0x7f0000000400)=ANY=[@ANYBLOB='#'], 0x1) sendmsg(r0, &(0x7f0000000280)={&(0x7f00000000c0)=@un=@abs, 0x80, &(0x7f0000000000)=[{&(0x7f0000000200)="89", 0x1}], 0x1, &(0x7f00000006c0)}, 0x0) recvmsg(r0, &(0x7f0000000300)={&(0x7f0000000600)=@can, 0x80, &(0x7f0000000140), 0x0, &(0x7f0000000780)=""/144, 0x90}, 0x0) 21:25:26 executing program 3: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='net/route\x00') readv(r0, &(0x7f0000000680)=[{&(0x7f0000001380)=""/4096, 0x1000}], 0x1) 21:25:26 executing program 5: r0 = socket(0x2000000011, 0x2, 0x0) ioctl$sock_inet_SIOCDARP(r0, 0x8953, &(0x7f0000000000)={{0x2, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}}, {0x0, @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}}, 0x0, {0x2, 0x0, @loopback=0x7f000001}, 'veth0_to_bond\x00'}) 21:25:26 executing program 7: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$hfsplus(&(0x7f0000000040)='hfsplus\x00', &(0x7f0000000080)='./file0\x00', 0xf6ffffff, 0x0, &(0x7f0000000300), 0x0, &(0x7f0000000380)) 21:25:26 executing program 0: syz_open_dev$sndseq(&(0x7f0000000000)='/dev/snd/seq\x00', 0x0, 0x0) userfaultfd(0x0) syz_open_dev$mice(&(0x7f0000000100)='/dev/input/mice\x00', 0x0, 0x0) pselect6(0x40, &(0x7f00000abfc0)={0x3ffffd}, &(0x7f0000768000), &(0x7f00007fbfc0)={0x1000000}, &(0x7f0000f22000)={0x0, 0x989680}, &(0x7f0000f14000)={&(0x7f0000553ff8), 0x8}) 21:25:26 executing program 4: r0 = socket$unix(0x2, 0x40000000002, 0x88) connect$inet(r0, &(0x7f0000000080)={0x2, 0x0, @local={0xac, 0x14, 0x14, 0xaa}}, 0x10) 21:25:26 executing program 5: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r0) r1 = creat(&(0x7f0000000180)='./file0\x00', 0x0) pwrite64(r1, &(0x7f00000000c0)='^', 0x1, 0x0) ioctl$FS_IOC_RESVSP(r1, 0x402c5828, &(0x7f0000000200)={0x0, 0x0, 0x28000000000}) 21:25:26 executing program 3: pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) write(r0, &(0x7f00000001c0), 0xffffff55) fcntl$setpipe(r0, 0x407, 0x0) 21:25:26 executing program 6: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r0) r1 = creat(&(0x7f0000000200)='./bus\x00', 0x0) r2 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) sendfile(r1, r2, &(0x7f0000d83ff8), 0x8000fffffffe) [ 237.814989] gfs2: invalid mount option: l [ 237.819359] gfs2: can't parse mount arguments [ 237.845711] hfsplus: unable to find HFS+ superblock 21:25:26 executing program 4: r0 = socket$inet(0x2, 0x2, 0x0) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000469ffc)=0x7fe, 0x4) sendto$inet(r0, &(0x7f00000000c0), 0x0, 0x0, &(0x7f0000000100)={0x2, 0x4e24, @local={0xac, 0x14, 0x14, 0xaa}}, 0x10) 21:25:26 executing program 0: syz_open_dev$sndseq(&(0x7f0000000000)='/dev/snd/seq\x00', 0x0, 0x0) userfaultfd(0x0) syz_open_dev$mice(&(0x7f0000000100)='/dev/input/mice\x00', 0x0, 0x0) pselect6(0x40, &(0x7f00000abfc0)={0x3ffffd}, &(0x7f0000768000), &(0x7f00007fbfc0)={0x64000000}, &(0x7f0000f22000)={0x0, 0x989680}, &(0x7f0000f14000)={&(0x7f0000553ff8), 0x8}) [ 237.871735] gfs2: invalid mount option: l [ 237.876050] gfs2: can't parse mount arguments 21:25:27 executing program 5: r0 = socket(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000340)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}}}, {{0xa, 0x0, 0x0, @local={0xfe, 0x80, [], 0xaa}}}}, 0x108) 21:25:27 executing program 7: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$hfsplus(&(0x7f0000000040)='hfsplus\x00', &(0x7f0000000080)='./file0\x00', 0xffffff7f, 0x0, &(0x7f0000000300), 0x0, &(0x7f0000000380)) 21:25:27 executing program 2: syz_mount_image$gfs2(&(0x7f0000000040)='gfs2\x00', &(0x7f0000001740)='./file0\x00', 0xfcfdffff, 0x0, &(0x7f0000001680), 0x0, &(0x7f0000000880)=ANY=[@ANYBLOB='l']) [ 238.038499] hfsplus: unable to find HFS+ superblock [ 238.042242] gfs2: invalid mount option: l [ 238.047895] gfs2: can't parse mount arguments [ 238.074929] gfs2: invalid mount option: l [ 238.079233] gfs2: can't parse mount arguments 21:25:27 executing program 1: syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/icmp6\x00') 21:25:27 executing program 6: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='cpuset.effective_mems\x00', 0x0, 0x0) 21:25:27 executing program 4: mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) mount$9p_tcp(&(0x7f0000000000)='127.0.0.1\x00', &(0x7f0000000040)='./file1\x00', &(0x7f0000000140)='9p\x00', 0x0, &(0x7f00000001c0)={'trans=tcp,', {'port', 0x3d}, 0x2c}) 21:25:27 executing program 0: syz_open_dev$sndseq(&(0x7f0000000000)='/dev/snd/seq\x00', 0x0, 0x0) userfaultfd(0x0) syz_open_dev$mice(&(0x7f0000000100)='/dev/input/mice\x00', 0x0, 0x0) pselect6(0x40, &(0x7f00000abfc0)={0x3ffffd}, &(0x7f0000768000), &(0x7f00007fbfc0)={0x6400}, &(0x7f0000f22000)={0x0, 0x989680}, &(0x7f0000f14000)={&(0x7f0000553ff8), 0x8}) 21:25:27 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000deb000)={0x2, 0x3, @broadcast=0xffffffff}, 0x10) 21:25:27 executing program 7: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$hfsplus(&(0x7f0000000040)='hfsplus\x00', &(0x7f0000000080)='./file0\x00', 0xd00, 0x0, &(0x7f0000000300), 0x0, &(0x7f0000000380)) 21:25:27 executing program 2: syz_mount_image$gfs2(&(0x7f0000000040)='gfs2\x00', &(0x7f0000001740)='./file0\x00', 0x600, 0x0, &(0x7f0000001680), 0x0, &(0x7f0000000880)=ANY=[@ANYBLOB='l']) 21:25:27 executing program 1: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$FS_IOC_SETFSLABEL(r0, 0x41009432, &(0x7f0000000480)="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") ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) 21:25:27 executing program 5: [ 238.613016] 9pnet: p9_fd_create_tcp (19985): problem connecting socket to 127.0.0.1 [ 238.648111] gfs2: invalid mount option: l [ 238.652358] gfs2: can't parse mount arguments [ 238.662672] hfsplus: unable to find HFS+ superblock [ 238.752280] gfs2: invalid mount option: l [ 238.756551] gfs2: can't parse mount arguments 21:25:27 executing program 3: 21:25:27 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000deb000)={0x2, 0x4e23, @broadcast=0xffffffff}, 0x10) sendto$inet(r0, &(0x7f0000000140), 0x0, 0x200007ff, &(0x7f0000deaff0)={0x2, 0x4e23}, 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f00000000c0)='veth1_to_bond\x00', 0x10) r1 = dup2(r0, r0) sendto$inet(r1, &(0x7f0000000000)="ce", 0x1, 0x0, &(0x7f0000000080)={0x2, 0x0, @rand_addr}, 0x10) 21:25:27 executing program 5: 21:25:27 executing program 4: mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) mount$9p_tcp(&(0x7f0000000000)='127.0.0.1\x00', &(0x7f0000000040)='./file1\x00', &(0x7f0000000140)='9p\x00', 0x0, &(0x7f00000001c0)={'trans=tcp,', {'port', 0x3d}, 0x2c}) 21:25:27 executing program 6: 21:25:27 executing program 7: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$hfsplus(&(0x7f0000000040)='hfsplus\x00', &(0x7f0000000080)='./file0\x00', 0x2000, 0x0, &(0x7f0000000300), 0x0, &(0x7f0000000380)) 21:25:27 executing program 0: syz_open_dev$sndseq(&(0x7f0000000000)='/dev/snd/seq\x00', 0x0, 0x0) userfaultfd(0x0) syz_open_dev$mice(&(0x7f0000000100)='/dev/input/mice\x00', 0x0, 0x0) pselect6(0x40, &(0x7f00000abfc0)={0x3ffffd}, &(0x7f0000768000), &(0x7f00007fbfc0)={0x1600}, &(0x7f0000f22000)={0x0, 0x989680}, &(0x7f0000f14000)={&(0x7f0000553ff8), 0x8}) 21:25:27 executing program 2: syz_mount_image$gfs2(&(0x7f0000000040)='gfs2\x00', &(0x7f0000001740)='./file0\x00', 0x7400000000000000, 0x0, &(0x7f0000001680), 0x0, &(0x7f0000000880)=ANY=[@ANYBLOB='l']) 21:25:28 executing program 3: [ 238.928191] 9pnet: p9_fd_create_tcp (20014): problem connecting socket to 127.0.0.1 [ 238.961679] gfs2: invalid mount option: l [ 238.965947] gfs2: can't parse mount arguments 21:25:28 executing program 4: mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) mount$9p_tcp(&(0x7f0000000000)='127.0.0.1\x00', &(0x7f0000000040)='./file1\x00', &(0x7f0000000140)='9p\x00', 0x0, &(0x7f00000001c0)={'trans=tcp,', {'port', 0x3d}, 0x2c}) 21:25:28 executing program 6: 21:25:28 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$hfsplus(&(0x7f0000000040)='hfsplus\x00', &(0x7f0000000080)='./file0\x00', 0xd00, 0x0, &(0x7f0000000300), 0x0, &(0x7f0000000380)) [ 238.981600] hfsplus: unable to find HFS+ superblock 21:25:28 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$hfsplus(&(0x7f0000000040)='hfsplus\x00', &(0x7f0000000080)='./file0\x00', 0xf6ffffff, 0x0, &(0x7f0000000300), 0x0, &(0x7f0000000380)) 21:25:28 executing program 0: syz_open_dev$sndseq(&(0x7f0000000000)='/dev/snd/seq\x00', 0x0, 0x0) userfaultfd(0x0) syz_open_dev$mice(&(0x7f0000000100)='/dev/input/mice\x00', 0x0, 0x0) pselect6(0x40, &(0x7f00000abfc0)={0x3ffffd}, &(0x7f0000768000), &(0x7f00007fbfc0)={0x16}, &(0x7f0000f22000)={0x0, 0x989680}, &(0x7f0000f14000)={&(0x7f0000553ff8), 0x8}) 21:25:28 executing program 7: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$hfsplus(&(0x7f0000000040)='hfsplus\x00', &(0x7f0000000080)='./file0\x00', 0x2e668, 0x0, &(0x7f0000000300), 0x0, &(0x7f0000000380)) 21:25:28 executing program 6: syz_mount_image$gfs2(&(0x7f0000000040)='gfs2\x00', &(0x7f0000001740)='./file0\x00', 0x3f000000, 0x0, &(0x7f0000001680), 0x0, &(0x7f0000000880)=ANY=[@ANYBLOB='l']) [ 239.074604] 9pnet: p9_fd_create_tcp (20037): problem connecting socket to 127.0.0.1 [ 239.099863] hfsplus: unable to find HFS+ superblock [ 239.112129] gfs2: invalid mount option: l [ 239.116500] gfs2: can't parse mount arguments [ 239.129061] hfsplus: unable to find HFS+ superblock 21:25:28 executing program 2: syz_mount_image$gfs2(&(0x7f0000000040)='gfs2\x00', &(0x7f0000001740)='./file0\x00', 0x4800, 0x0, &(0x7f0000001680), 0x0, &(0x7f0000000880)=ANY=[@ANYBLOB='l']) [ 239.171657] gfs2: invalid mount option: l [ 239.176050] gfs2: can't parse mount arguments [ 239.195941] hfsplus: unable to find HFS+ superblock [ 239.298453] gfs2: invalid mount option: l [ 239.302701] gfs2: can't parse mount arguments [ 239.341672] gfs2: invalid mount option: l [ 239.346043] gfs2: can't parse mount arguments 21:25:28 executing program 1: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$hfsplus(&(0x7f0000000040)='hfsplus\x00', &(0x7f0000000080)='./file0\x00', 0x4858, 0x0, &(0x7f0000000300), 0x0, &(0x7f0000000380)) 21:25:28 executing program 4: mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) mount$9p_tcp(&(0x7f0000000000)='127.0.0.1\x00', &(0x7f0000000040)='./file1\x00', &(0x7f0000000140)='9p\x00', 0x0, &(0x7f00000001c0)={'trans=tcp,', {'port', 0x3d}, 0x2c}) 21:25:28 executing program 5: syz_open_dev$sndseq(&(0x7f0000000000)='/dev/snd/seq\x00', 0x0, 0x0) userfaultfd(0x0) syz_open_dev$mice(&(0x7f0000000100)='/dev/input/mice\x00', 0x0, 0x0) pselect6(0x40, &(0x7f00000abfc0)={0x3ffffd}, &(0x7f0000768000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x60000000}, &(0x7f00007fbfc0), &(0x7f0000f22000)={0x0, 0x989680}, &(0x7f0000f14000)={&(0x7f0000553ff8), 0x8}) 21:25:28 executing program 3: syz_open_dev$sndseq(&(0x7f0000000000)='/dev/snd/seq\x00', 0x0, 0x0) userfaultfd(0x0) syz_open_dev$mice(&(0x7f0000000100)='/dev/input/mice\x00', 0x0, 0x0) pselect6(0x40, &(0x7f00000abfc0)={0x3ffffd}, &(0x7f0000768000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x60}, &(0x7f00007fbfc0), &(0x7f0000f22000)={0x0, 0x989680}, &(0x7f0000f14000)={&(0x7f0000553ff8), 0x8}) 21:25:28 executing program 0: syz_open_dev$sndseq(&(0x7f0000000000)='/dev/snd/seq\x00', 0x0, 0x0) userfaultfd(0x0) syz_open_dev$mice(&(0x7f0000000100)='/dev/input/mice\x00', 0x0, 0x0) pselect6(0x40, &(0x7f00000abfc0)={0x3ffffd}, &(0x7f0000768000), &(0x7f00007fbfc0)={0x8}, &(0x7f0000f22000)={0x0, 0x989680}, &(0x7f0000f14000)={&(0x7f0000553ff8), 0x8}) 21:25:28 executing program 6: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', &(0x7f0000000040)='bpf\x00', 0x0, &(0x7f0000000280)=ANY=[]) mount$bpf(0x0, &(0x7f0000000080)='./file0/../file0\x00', &(0x7f00000000c0)='bpf\x00', 0x80000, &(0x7f00000002c0)) 21:25:28 executing program 7: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$hfsplus(&(0x7f0000000040)='hfsplus\x00', &(0x7f0000000080)='./file0\x00', 0x2, 0x0, &(0x7f0000000300), 0x0, &(0x7f0000000380)) 21:25:28 executing program 2: syz_mount_image$gfs2(&(0x7f0000000040)='gfs2\x00', &(0x7f0000001740)='./file0\x00', 0x6000, 0x0, &(0x7f0000001680), 0x0, &(0x7f0000000880)=ANY=[@ANYBLOB='l']) 21:25:28 executing program 6: syz_open_dev$sndseq(&(0x7f0000000000)='/dev/snd/seq\x00', 0x0, 0x0) userfaultfd(0x0) syz_open_dev$mice(&(0x7f0000000100)='/dev/input/mice\x00', 0x0, 0x0) pselect6(0x40, &(0x7f00000abfc0)={0x3ffffd}, &(0x7f0000768000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, &(0x7f00007fbfc0), &(0x7f0000f22000)={0x0, 0x989680}, &(0x7f0000f14000)={&(0x7f0000553ff8), 0x8}) [ 239.770009] gfs2: invalid mount option: l [ 239.771149] 9pnet: p9_fd_create_tcp (20102): problem connecting socket to 127.0.0.1 [ 239.774491] gfs2: can't parse mount arguments [ 239.787440] hfsplus: unable to find HFS+ superblock [ 239.804328] hfsplus: unable to find HFS+ superblock 21:25:28 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback={0x0, 0x1}}, 0x1c) listen(r0, 0x4) r1 = accept4(r0, &(0x7f0000000040)=@can, &(0x7f00000000c0)=0x80, 0x0) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) sendto$inet6(r2, &(0x7f0000e33fe0)='X', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback={0x0, 0x1}}, 0x1c) write$binfmt_script(r2, &(0x7f0000000140)=ANY=[@ANYBLOB="cc"], 0x1) shutdown(r2, 0x0) write$binfmt_misc(r1, &(0x7f0000000240)={'syz1'}, 0x34000) 21:25:28 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$hfsplus(&(0x7f0000000040)='hfsplus\x00', &(0x7f0000000080)='./file0\x00', 0xd, 0x0, &(0x7f0000000300), 0x0, &(0x7f0000000380)) [ 239.828887] gfs2: invalid mount option: l [ 239.833190] gfs2: can't parse mount arguments 21:25:28 executing program 3: syz_open_dev$sndseq(&(0x7f0000000000)='/dev/snd/seq\x00', 0x0, 0x0) userfaultfd(0x0) syz_open_dev$mice(&(0x7f0000000100)='/dev/input/mice\x00', 0x0, 0x0) pselect6(0x40, &(0x7f00000abfc0)={0x3ffffd}, &(0x7f0000768000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x60}, &(0x7f00007fbfc0), &(0x7f0000f22000)={0x0, 0x989680}, &(0x7f0000f14000)={&(0x7f0000553ff8), 0x8}) 21:25:28 executing program 0: syz_open_dev$sndseq(&(0x7f0000000000)='/dev/snd/seq\x00', 0x0, 0x0) userfaultfd(0x0) syz_open_dev$mice(&(0x7f0000000100)='/dev/input/mice\x00', 0x0, 0x0) pselect6(0x40, &(0x7f00000abfc0)={0x3ffffd}, &(0x7f0000768000), &(0x7f00007fbfc0)={0x1600000000000000}, &(0x7f0000f22000)={0x0, 0x989680}, &(0x7f0000f14000)={&(0x7f0000553ff8), 0x8}) 21:25:28 executing program 7: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$hfsplus(&(0x7f0000000040)='hfsplus\x00', &(0x7f0000000080)='./file0\x00', 0xd00000000000000, 0x0, &(0x7f0000000300), 0x0, &(0x7f0000000380)) [ 239.909926] hfsplus: unable to find HFS+ superblock 21:25:29 executing program 2: syz_mount_image$gfs2(&(0x7f0000000040)='gfs2\x00', &(0x7f0000001740)='./file0\x00', 0xffffff7f, 0x0, &(0x7f0000001680), 0x0, &(0x7f0000000880)=ANY=[@ANYBLOB='l']) 21:25:29 executing program 6: syz_open_dev$sndseq(&(0x7f0000000000)='/dev/snd/seq\x00', 0x0, 0x0) userfaultfd(0x0) syz_open_dev$mice(&(0x7f0000000100)='/dev/input/mice\x00', 0x0, 0x0) pselect6(0x40, &(0x7f00000abfc0)={0x3ffffd}, &(0x7f0000768000), &(0x7f00007fbfc0)={0x8}, &(0x7f0000f22000)={0x0, 0x989680}, &(0x7f0000f14000)={&(0x7f0000553ff8), 0x8}) 21:25:29 executing program 4: mount$9p_tcp(&(0x7f0000000000)='127.0.0.1\x00', &(0x7f0000000040)='./file1\x00', &(0x7f0000000140)='9p\x00', 0x0, &(0x7f00000001c0)={'trans=tcp,', {'port', 0x3d}, 0x2c}) [ 239.983465] hfsplus: unable to find HFS+ superblock 21:25:29 executing program 5: syz_open_dev$sndseq(&(0x7f0000000000)='/dev/snd/seq\x00', 0x0, 0x0) userfaultfd(0x0) syz_open_dev$mice(&(0x7f0000000100)='/dev/input/mice\x00', 0x0, 0x0) pselect6(0x40, &(0x7f00000abfc0)={0x3ffffd}, &(0x7f0000768000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x6000}, &(0x7f00007fbfc0), &(0x7f0000f22000)={0x0, 0x989680}, &(0x7f0000f14000)={&(0x7f0000553ff8), 0x8}) 21:25:29 executing program 0: syz_open_dev$sndseq(&(0x7f0000000000)='/dev/snd/seq\x00', 0x0, 0x0) userfaultfd(0x0) syz_open_dev$mice(&(0x7f0000000100)='/dev/input/mice\x00', 0x0, 0x0) pselect6(0x40, &(0x7f00000abfc0)={0x3ffffd}, &(0x7f0000768000), &(0x7f00007fbfc0)={0x6400000000000000}, &(0x7f0000f22000)={0x0, 0x989680}, &(0x7f0000f14000)={&(0x7f0000553ff8), 0x8}) 21:25:29 executing program 7: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$hfsplus(&(0x7f0000000040)='hfsplus\x00', &(0x7f0000000080)='./file0\x00', 0x7000000, 0x0, &(0x7f0000000300), 0x0, &(0x7f0000000380)) [ 240.048247] gfs2: invalid mount option: l [ 240.052561] gfs2: can't parse mount arguments 21:25:29 executing program 6: syz_mount_image$gfs2(&(0x7f0000000040)='gfs2\x00', &(0x7f0000001740)='./file0\x00', 0x0, 0x0, &(0x7f0000001680), 0x0, &(0x7f0000000880)=ANY=[@ANYBLOB='l']) 21:25:29 executing program 4: mount$9p_tcp(&(0x7f0000000000)='127.0.0.1\x00', &(0x7f0000000040)='./file1\x00', &(0x7f0000000140)='9p\x00', 0x0, &(0x7f00000001c0)={'trans=tcp,', {'port', 0x3d}, 0x2c}) 21:25:29 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$hfsplus(&(0x7f0000000040)='hfsplus\x00', &(0x7f0000000080)='./file0\x00', 0x300000000000000, 0x0, &(0x7f0000000300), 0x0, &(0x7f0000000380)) 21:25:29 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$hfsplus(&(0x7f0000000040)='hfsplus\x00', &(0x7f0000000080)='./file0\x00', 0xf6ffffff00000000, 0x0, &(0x7f0000000300), 0x0, &(0x7f0000000380)) [ 240.170288] hfsplus: unable to find HFS+ superblock 21:25:29 executing program 2: syz_mount_image$gfs2(&(0x7f0000000040)='gfs2\x00', &(0x7f0000001740)='./file0\x00', 0x6000000, 0x0, &(0x7f0000001680), 0x0, &(0x7f0000000880)=ANY=[@ANYBLOB='l']) [ 240.201228] hfsplus: unable to find HFS+ superblock [ 240.219403] gfs2: invalid mount option: l [ 240.223778] gfs2: can't parse mount arguments [ 240.328991] hfsplus: unable to find HFS+ superblock [ 240.354402] gfs2: invalid mount option: l [ 240.358694] gfs2: can't parse mount arguments 21:25:29 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback={0x0, 0x1}}, 0x1c) listen(r0, 0x4) r1 = accept4(r0, &(0x7f0000000040)=@can, &(0x7f00000000c0)=0x80, 0x0) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) sendto$inet6(r2, &(0x7f0000e33fe0)='X', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback={0x0, 0x1}}, 0x1c) write$binfmt_script(r2, &(0x7f0000000140)=ANY=[@ANYBLOB="cc"], 0x1) shutdown(r2, 0x0) write$binfmt_misc(r1, &(0x7f0000000240)={'syz1'}, 0x34000) 21:25:29 executing program 4: mount$9p_tcp(&(0x7f0000000000)='127.0.0.1\x00', &(0x7f0000000040)='./file1\x00', &(0x7f0000000140)='9p\x00', 0x0, &(0x7f00000001c0)={'trans=tcp,', {'port', 0x3d}, 0x2c}) 21:25:29 executing program 0: syz_open_dev$sndseq(&(0x7f0000000000)='/dev/snd/seq\x00', 0x0, 0x0) userfaultfd(0x0) syz_open_dev$mice(&(0x7f0000000100)='/dev/input/mice\x00', 0x0, 0x0) pselect6(0x40, &(0x7f00000abfc0)={0x3ffffd}, &(0x7f0000768000), &(0x7f00007fbfc0)={0x10000000}, &(0x7f0000f22000)={0x0, 0x989680}, &(0x7f0000f14000)={&(0x7f0000553ff8), 0x8}) 21:25:29 executing program 7: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$hfsplus(&(0x7f0000000040)='hfsplus\x00', &(0x7f0000000080)='./file0\x00', 0x42440000, 0x0, &(0x7f0000000300), 0x0, &(0x7f0000000380)) 21:25:29 executing program 6: r0 = socket$inet6(0xa, 0x80005, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f76") r1 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0xfffffffffffffffc, 0x1) write$binfmt_elf32(r1, &(0x7f0000000140)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x38, 0x0, 0x0, 0x1, 0x60, 0x2}, [{}]}, 0x58) 21:25:29 executing program 3: syz_mount_image$gfs2(&(0x7f0000000040)='gfs2\x00', &(0x7f0000001740)='./file0\x00', 0x0, 0x0, &(0x7f0000001680), 0x0, &(0x7f0000000880)=ANY=[@ANYBLOB='l']) 21:25:29 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback={0x0, 0x1}}, 0x1c) listen(r0, 0x4) r1 = accept4(r0, &(0x7f0000000040)=@can, &(0x7f00000000c0)=0x80, 0x0) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) sendto$inet6(r2, &(0x7f0000e33fe0)='X', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback={0x0, 0x1}}, 0x1c) shutdown(r2, 0x1) write$binfmt_misc(r1, &(0x7f0000000240)={'syz1'}, 0x34000) 21:25:29 executing program 2: syz_mount_image$gfs2(&(0x7f0000000040)='gfs2\x00', &(0x7f0000001740)='./file0\x00', 0x7400, 0x0, &(0x7f0000001680), 0x0, &(0x7f0000000880)=ANY=[@ANYBLOB='l']) 21:25:29 executing program 0: syz_open_dev$sndseq(&(0x7f0000000000)='/dev/snd/seq\x00', 0x0, 0x0) userfaultfd(0x0) syz_open_dev$mice(&(0x7f0000000100)='/dev/input/mice\x00', 0x0, 0x0) pselect6(0x40, &(0x7f00000abfc0)={0x3ffffd}, &(0x7f0000768000), &(0x7f00007fbfc0)={0x16000000}, &(0x7f0000f22000)={0x0, 0x989680}, &(0x7f0000f14000)={&(0x7f0000553ff8), 0x8}) 21:25:29 executing program 6: open(&(0x7f00000001c0)='./file0\x00', 0x101142, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='9p\x00', 0x0, &(0x7f0000000300)=ANY=[]) mount$9p_unix(&(0x7f0000000600)='./file0\x00', &(0x7f0000000640)='./file0\x00', &(0x7f0000000680)='9p\x00', 0x202800, &(0x7f0000000280)={'trans=\x00'}) [ 240.717780] gfs2: invalid mount option: l [ 240.722081] gfs2: can't parse mount arguments [ 240.731746] gfs2: invalid mount option: l [ 240.736093] gfs2: can't parse mount arguments [ 240.743662] hfsplus: unable to find HFS+ superblock 21:25:29 executing program 7: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$hfsplus(&(0x7f0000000040)='hfsplus\x00', &(0x7f0000000080)='./file0\x00', 0xc0ed0000, 0x0, &(0x7f0000000300), 0x0, &(0x7f0000000380)) [ 240.813913] gfs2: invalid mount option: l [ 240.818225] gfs2: can't parse mount arguments [ 240.831063] 9pnet_virtio: no channels available for device ./file0 21:25:29 executing program 6: open(&(0x7f00000001c0)='./file0\x00', 0x101142, 0x0) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='9p\x00', 0x0, &(0x7f0000000340)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c}) 21:25:29 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x4e20, @multicast1=0xe0000001}, 0x10) r1 = open(&(0x7f0000000140)='./file0\x00', 0x2040, 0x0) mount$9p_fd(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='9p\x00', 0x0, &(0x7f0000000180)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c}) 21:25:29 executing program 2: syz_mount_image$gfs2(&(0x7f0000000040)='gfs2\x00', &(0x7f0000001740)='./file0\x00', 0xffffffffffffffe0, 0x0, &(0x7f0000001680), 0x0, &(0x7f0000000880)=ANY=[@ANYBLOB='l']) 21:25:29 executing program 0: syz_open_dev$sndseq(&(0x7f0000000000)='/dev/snd/seq\x00', 0x0, 0x0) userfaultfd(0x0) syz_open_dev$mice(&(0x7f0000000100)='/dev/input/mice\x00', 0x0, 0x0) pselect6(0x40, &(0x7f00000abfc0)={0x3ffffd}, &(0x7f0000768000), &(0x7f00007fbfc0)={0x8000000}, &(0x7f0000f22000)={0x0, 0x989680}, &(0x7f0000f14000)={&(0x7f0000553ff8), 0x8}) 21:25:30 executing program 3: syz_mount_image$gfs2(&(0x7f0000000040)='gfs2\x00', &(0x7f0000001740)='./file0\x00', 0x7400, 0x0, &(0x7f0000001680), 0x0, &(0x7f0000000880)=ANY=[@ANYBLOB='l']) [ 240.952969] hfsplus: unable to find HFS+ superblock [ 240.982257] gfs2: invalid mount option: l [ 240.986662] gfs2: can't parse mount arguments [ 241.071858] gfs2: invalid mount option: l [ 241.076184] gfs2: can't parse mount arguments 21:25:30 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback={0x0, 0x1}}, 0x1c) listen(r0, 0x4) r1 = accept4(r0, &(0x7f0000000040)=@can, &(0x7f00000000c0)=0x80, 0x0) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) sendto$inet6(r2, &(0x7f0000e33fe0)='X', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback={0x0, 0x1}}, 0x1c) write$binfmt_script(r2, &(0x7f0000000140)=ANY=[@ANYBLOB="cc"], 0x1) shutdown(r2, 0x0) write$binfmt_misc(r1, &(0x7f0000000240)={'syz1'}, 0x34000) 21:25:30 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000040)="2f65786500000000000035abe1e80d903e0d717ac1889a45e581c9e14a5c8f95f5d2968ae8c767e9d18fd69a") getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000000), &(0x7f0000000080)=0xc) ioctl$fiemap(r0, 0x40086602, &(0x7f0000000080)=ANY=[]) 21:25:30 executing program 6: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_int(r0, 0x0, 0x2, &(0x7f0000000280)=0x7, 0x4) sendto$inet(r0, &(0x7f0000000100), 0x0, 0x40000000200007f7, &(0x7f00000000c0)={0x2, 0x0, @loopback=0x7f000001}, 0x10) 21:25:30 executing program 7: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$hfsplus(&(0x7f0000000040)='hfsplus\x00', &(0x7f0000000080)='./file0\x00', 0x5354000000000000, 0x0, &(0x7f0000000300), 0x0, &(0x7f0000000380)) 21:25:30 executing program 2: syz_mount_image$gfs2(&(0x7f0000000040)='gfs2\x00', &(0x7f0000001740)='./file0\x00', 0x20000000, 0x0, &(0x7f0000001680), 0x0, &(0x7f0000000880)=ANY=[@ANYBLOB='l']) 21:25:30 executing program 0: syz_open_dev$sndseq(&(0x7f0000000000)='/dev/snd/seq\x00', 0x0, 0x0) userfaultfd(0x0) syz_open_dev$mice(&(0x7f0000000100)='/dev/input/mice\x00', 0x0, 0x0) pselect6(0x40, &(0x7f00000abfc0)={0x3ffffd}, &(0x7f0000768000), &(0x7f00007fbfc0)={0x60}, &(0x7f0000f22000)={0x0, 0x989680}, &(0x7f0000f14000)={&(0x7f0000553ff8), 0x8}) 21:25:30 executing program 5: perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, &(0x7f00000000c0)='ns/ipc\x00') 21:25:30 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f000014f000)={&(0x7f00003c7ff4)={0x10}, 0xc, &(0x7f0000bd7000)={&(0x7f0000000040)=ANY=[@ANYBLOB="38010000100013070000000000000000fe8000000000000000000000000000ff00000000000000000000ffffac14ffaa00000000000000000000000000000000", @ANYRES32=0x0, @ANYBLOB="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"], 0x3}, 0x1}, 0x0) 21:25:30 executing program 6: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_mreqsrc(r0, 0x0, 0x27, &(0x7f000001b000)={@multicast1=0xe0000001, @loopback=0x7f000001, @dev={0xac, 0x14}}, 0xc) setsockopt$inet_MCAST_MSFILTER(r0, 0x0, 0x30, &(0x7f0000000200)={0x100000002, {{0x2, 0x0, @multicast1=0xe0000001}}}, 0x90) [ 241.578926] gfs2: invalid mount option: l [ 241.582518] hfsplus: unable to find HFS+ superblock [ 241.583303] gfs2: can't parse mount arguments 21:25:30 executing program 0: syz_open_dev$sndseq(&(0x7f0000000000)='/dev/snd/seq\x00', 0x0, 0x0) userfaultfd(0x0) syz_open_dev$mice(&(0x7f0000000100)='/dev/input/mice\x00', 0x0, 0x0) pselect6(0x40, &(0x7f00000abfc0)={0x3ffffd}, &(0x7f0000768000), &(0x7f00007fbfc0)={0x64}, &(0x7f0000f22000)={0x0, 0x989680}, &(0x7f0000f14000)={&(0x7f0000553ff8), 0x8}) 21:25:30 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IP_VS_SO_SET_FLUSH(r0, 0x0, 0x485, 0x0, 0x0) 21:25:30 executing program 3: r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$unix(0x1, 0x200000000000001, 0x0) bind$unix(r1, &(0x7f0000366000)=@file={0x1, "e91f7189591e9233614b00"}, 0xc) perf_event_open(&(0x7f0000940000)={0x2, 0x78, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) connect$unix(r0, &(0x7f0000000000)=@file={0x1, "e91f7189591e9233614b00"}, 0x6e) 21:25:30 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x800) ioctl$BLKSECTGET(r0, 0x1267, &(0x7f0000000040)) [ 241.629246] gfs2: invalid mount option: l [ 241.633533] gfs2: can't parse mount arguments 21:25:30 executing program 2: syz_mount_image$gfs2(&(0x7f0000000040)='gfs2\x00', &(0x7f0000001740)='./file0\x00', 0xffffffff00000000, 0x0, &(0x7f0000001680), 0x0, &(0x7f0000000880)=ANY=[@ANYBLOB='l']) 21:25:30 executing program 7: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$hfsplus(&(0x7f0000000040)='hfsplus\x00', &(0x7f0000000080)='./file0\x00', 0x500000000000000, 0x0, &(0x7f0000000300), 0x0, &(0x7f0000000380)) 21:25:30 executing program 4: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) name_to_handle_at(r0, &(0x7f0000000300)='\x00', &(0x7f0000000200)={0x81, 0x0, "a684405d6d555cb163a08e5e667c56e7fe548757c7fbaa71613db2ae0c31ca6373d891d235c367fc54c3b8a8aa24ef5f1cce0ee73ea144d2ec903a701346f0f8dcd1fc6290187762365a36372a8e5e7a1b47110718c5ad5f039d52dcb5dc9b0ca2f48c168d6db0915994dce34788d12ed958eedff287ce0e53"}, &(0x7f0000000100), 0x1000) [ 241.762454] hfsplus: unable to find HFS+ superblock [ 241.793755] gfs2: invalid mount option: l [ 241.798088] gfs2: can't parse mount arguments 21:25:31 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'uo\x00'}) 21:25:31 executing program 6: clock_gettime(0x6, &(0x7f0000000240)) 21:25:31 executing program 3: pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f00000001c0), 0xfffffef3) read(r0, &(0x7f0000000200)=""/250, 0x50c7e3e3) mremap(&(0x7f0000a96000/0x1000)=nil, 0x1000, 0x800000, 0x3, &(0x7f0000130000/0x800000)=nil) 21:25:31 executing program 5: r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = dup(r0) fcntl$setstatus(r1, 0x4, 0x800) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback={0x0, 0x1}}, 0x1c) sendto$inet6(r0, &(0x7f0000e77fff), 0x2bd, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback={0x0, 0x1}}, 0x1c) ioctl$SG_EMULATED_HOST(r1, 0x2203, &(0x7f0000000200)) getsockname$packet(r1, &(0x7f0000000080), &(0x7f00000000c0)=0x14) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000180)='syz_tun\x00', 0x10) fremovexattr(0xffffffffffffffff, &(0x7f0000000480)=ANY=[@ANYBLOB="0300000073797a5f080000008cf3bc515fea4b7df0aaf74c05ddfbf1a1a1e7da37615b84ea8e9026"]) sendmsg$nl_generic(r1, &(0x7f0000001980)={&(0x7f0000000540)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000001940)={&(0x7f00000006c0)={0xac, 0x15, 0x800, 0x70bd28, 0x25dfdbfe, {0x16}, [@typed={0x10, 0x84, @binary="a57d72d4efe269dc85"}, @nested={0x88, 0x9, [@generic="c555daf6f0ae14989e5a2e36a0088a7d1a59cc6033beb97fb038d5c88501c0e194d4443296e1dd48af7e98f606e2ca433ed8e2d88a4cafc0c6f8adb605d895e85f846390a93fdf4d20c257ce2c903e9411d5230a1cc4ca3b47171457450473ee90b5bb8fd0366429768537f565e7c48ee3b5f0c1aca0864f5cdea988b3fac2f5ef06ee"]}]}, 0xac}, 0x1, 0x0, 0x0, 0x4050}, 0x40010) r2 = open(&(0x7f0000000440)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2007fff) getxattr(&(0x7f0000000300)='./bus\x00', &(0x7f0000000340)=@random={'user.', '#selfvboxnet1\x00'}, &(0x7f0000000380)=""/45, 0x2d) sendfile(r1, r2, &(0x7f0000d83ff8), 0x8000fffffffe) flock(0xffffffffffffffff, 0x4) ioctl$sock_inet_udp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f00000001c0)) setsockopt$inet6_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x29, 0x2a, &(0x7f00000000c0)={0x2, {{0xa, 0x4e23, 0x4c, @local={0xfe, 0x80, [], 0xaa}, 0x400}}}, 0x88) setsockopt$inet6_MRT6_ADD_MFC(0xffffffffffffffff, 0x29, 0xcc, &(0x7f00000004c0)={{0xa, 0x4e23, 0xfffffffffffffffa, @mcast2={0xff, 0x2, [], 0x1}, 0x3}, {0xa, 0x4e24, 0x100000000000, @mcast2={0xff, 0x2, [], 0x1}, 0xcf}, 0xbe, [0x7, 0x1, 0x1, 0x3ff, 0x5, 0x0, 0x3f82fdd, 0x8]}, 0x5c) 21:25:31 executing program 0: syz_open_dev$sndseq(&(0x7f0000000000)='/dev/snd/seq\x00', 0x0, 0x0) userfaultfd(0x0) syz_open_dev$mice(&(0x7f0000000100)='/dev/input/mice\x00', 0x0, 0x0) pselect6(0x40, &(0x7f00000abfc0)={0x3ffffd}, &(0x7f0000768000), &(0x7f00007fbfc0)={0x100000000000000}, &(0x7f0000f22000)={0x0, 0x989680}, &(0x7f0000f14000)={&(0x7f0000553ff8), 0x8}) 21:25:31 executing program 2: syz_mount_image$gfs2(&(0x7f0000000040)='gfs2\x00', &(0x7f0000001740)='./file0\x00', 0x400000000000000, 0x0, &(0x7f0000001680), 0x0, &(0x7f0000000880)=ANY=[@ANYBLOB='l']) 21:25:31 executing program 7: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$hfsplus(&(0x7f0000000040)='hfsplus\x00', &(0x7f0000000080)='./file0\x00', 0x53540000, 0x0, &(0x7f0000000300), 0x0, &(0x7f0000000380)) 21:25:31 executing program 4: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) name_to_handle_at(r0, &(0x7f0000000300)='\x00', &(0x7f0000000200)={0x81, 0x0, "a684405d6d555cb163a08e5e667c56e7fe548757c7fbaa71613db2ae0c31ca6373d891d235c367fc54c3b8a8aa24ef5f1cce0ee73ea144d2ec903a701346f0f8dcd1fc6290187762365a36372a8e5e7a1b47110718c5ad5f039d52dcb5dc9b0ca2f48c168d6db0915994dce34788d12ed958eedff287ce0e53"}, &(0x7f0000000100), 0x1000) 21:25:31 executing program 6: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r1 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r0, 0x6) connect$inet(r1, &(0x7f0000e5c000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) ppoll(&(0x7f0000000040)=[{r1}], 0x1, &(0x7f0000000080), &(0x7f00000000c0), 0x8) 21:25:31 executing program 4: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) name_to_handle_at(r0, &(0x7f0000000300)='\x00', &(0x7f0000000200)={0x81, 0x0, "a684405d6d555cb163a08e5e667c56e7fe548757c7fbaa71613db2ae0c31ca6373d891d235c367fc54c3b8a8aa24ef5f1cce0ee73ea144d2ec903a701346f0f8dcd1fc6290187762365a36372a8e5e7a1b47110718c5ad5f039d52dcb5dc9b0ca2f48c168d6db0915994dce34788d12ed958eedff287ce0e53"}, &(0x7f0000000100), 0x1000) [ 242.426327] gfs2: invalid mount option: l [ 242.430583] gfs2: can't parse mount arguments [ 242.456883] hfsplus: unable to find HFS+ superblock [ 242.465789] gfs2: invalid mount option: l [ 242.470170] gfs2: can't parse mount arguments 21:25:31 executing program 1: socket$inet6_tcp(0xa, 0x1, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000140)='./cgroup.net/syz0\x00', 0x200002, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000000)='tasks\x00', 0x2, 0x0) write$cgroup_pid(r1, &(0x7f0000000040), 0x12) 21:25:31 executing program 1: socket$inet6_tcp(0xa, 0x1, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000140)='./cgroup.net/syz0\x00', 0x200002, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000000)='tasks\x00', 0x2, 0x0) write$cgroup_pid(r1, &(0x7f0000000040), 0x12) 21:25:31 executing program 1: socket$inet6_tcp(0xa, 0x1, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000140)='./cgroup.net/syz0\x00', 0x200002, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000000)='tasks\x00', 0x2, 0x0) write$cgroup_pid(r1, &(0x7f0000000040), 0x12) 21:25:31 executing program 7: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$hfsplus(&(0x7f0000000040)='hfsplus\x00', &(0x7f0000000080)='./file0\x00', 0x1000000, 0x0, &(0x7f0000000300), 0x0, &(0x7f0000000380)) 21:25:31 executing program 1: socket$inet6_tcp(0xa, 0x1, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000140)='./cgroup.net/syz0\x00', 0x200002, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000000)='tasks\x00', 0x2, 0x0) write$cgroup_pid(r1, &(0x7f0000000040), 0x12) 21:25:31 executing program 1: socket$inet6_tcp(0xa, 0x1, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000140)='./cgroup.net/syz0\x00', 0x200002, 0x0) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000040), 0x12) 21:25:31 executing program 0: syz_open_dev$sndseq(&(0x7f0000000000)='/dev/snd/seq\x00', 0x0, 0x0) userfaultfd(0x0) syz_open_dev$mice(&(0x7f0000000100)='/dev/input/mice\x00', 0x0, 0x0) pselect6(0x40, &(0x7f00000abfc0)={0x3ffffd}, &(0x7f0000768000), &(0x7f00007fbfc0)={0x800000000000000}, &(0x7f0000f22000)={0x0, 0x989680}, &(0x7f0000f14000)={&(0x7f0000553ff8), 0x8}) 21:25:31 executing program 1: socket$inet6_tcp(0xa, 0x1, 0x0) r0 = openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000000)='tasks\x00', 0x2, 0x0) write$cgroup_pid(r0, &(0x7f0000000040), 0x12) [ 242.676089] hfsplus: unable to find HFS+ superblock 21:25:32 executing program 3: pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f00000001c0), 0xfffffef3) read(r0, &(0x7f0000000200)=""/250, 0x50c7e3e3) mremap(&(0x7f0000a96000/0x1000)=nil, 0x1000, 0x800000, 0x3, &(0x7f0000130000/0x800000)=nil) 21:25:32 executing program 1: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000140)='./cgroup.net/syz0\x00', 0x200002, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000000)='tasks\x00', 0x2, 0x0) write$cgroup_pid(r1, &(0x7f0000000040), 0x12) 21:25:32 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r0, &(0x7f00000bc000)=@abs, 0x8) sendmmsg$unix(r1, &(0x7f00000bd000), 0x80, 0x0) close(r0) 21:25:32 executing program 4: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) name_to_handle_at(r0, &(0x7f0000000300)='\x00', &(0x7f0000000200)={0x81, 0x0, "a684405d6d555cb163a08e5e667c56e7fe548757c7fbaa71613db2ae0c31ca6373d891d235c367fc54c3b8a8aa24ef5f1cce0ee73ea144d2ec903a701346f0f8dcd1fc6290187762365a36372a8e5e7a1b47110718c5ad5f039d52dcb5dc9b0ca2f48c168d6db0915994dce34788d12ed958eedff287ce0e53"}, &(0x7f0000000100), 0x1000) 21:25:32 executing program 2: syz_mount_image$gfs2(&(0x7f0000000040)='gfs2\x00', &(0x7f0000001740)='./file0\x00', 0x2000000, 0x0, &(0x7f0000001680), 0x0, &(0x7f0000000880)=ANY=[@ANYBLOB='l']) 21:25:32 executing program 0: syz_open_dev$sndseq(&(0x7f0000000000)='/dev/snd/seq\x00', 0x0, 0x0) userfaultfd(0x0) syz_open_dev$mice(&(0x7f0000000100)='/dev/input/mice\x00', 0x0, 0x0) pselect6(0x40, &(0x7f00000abfc0)={0x3ffffd}, &(0x7f0000768000), &(0x7f00007fbfc0)={0x6000000000000000}, &(0x7f0000f22000)={0x0, 0x989680}, &(0x7f0000f14000)={&(0x7f0000553ff8), 0x8}) 21:25:32 executing program 6: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000140)='./cgroup.net/syz0\x00', 0x200002, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000000)='tasks\x00', 0x2, 0x0) socket$inet6_dccp(0xa, 0x6, 0x0) write$cgroup_pid(r1, &(0x7f0000000040), 0x12) 21:25:32 executing program 7: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$hfsplus(&(0x7f0000000040)='hfsplus\x00', &(0x7f0000000080)='./file0\x00', 0x700, 0x0, &(0x7f0000000300), 0x0, &(0x7f0000000380)) 21:25:32 executing program 1: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000140)='./cgroup.net/syz0\x00', 0x200002, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000000)='tasks\x00', 0x2, 0x0) write$cgroup_pid(r1, &(0x7f0000000040), 0x12) 21:25:32 executing program 1: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000140)='./cgroup.net/syz0\x00', 0x200002, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000000)='tasks\x00', 0x2, 0x0) write$cgroup_pid(r1, &(0x7f0000000040), 0x12) 21:25:32 executing program 1: socket$inet6_tcp(0xa, 0x1, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000140)='./cgroup.net/syz0\x00', 0x200002, 0x0) r1 = openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000000)='tasks\x00', 0x2, 0x0) write$cgroup_pid(r1, &(0x7f0000000040), 0x12) 21:25:32 executing program 1: socket$inet6_tcp(0xa, 0x1, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000140)='./cgroup.net/syz0\x00', 0x200002, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000000)='tasks\x00', 0x2, 0x0) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000040), 0x12) 21:25:32 executing program 1: pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f00000001c0), 0xfffffef3) read(r0, &(0x7f0000000200)=""/250, 0x50c7e3e3) mremap(&(0x7f0000a96000/0x1000)=nil, 0x1000, 0x800000, 0x3, &(0x7f0000130000/0x800000)=nil) [ 243.360891] gfs2: invalid mount option: l [ 243.365173] gfs2: can't parse mount arguments 21:25:32 executing program 4: name_to_handle_at(0xffffffffffffffff, &(0x7f0000000300)='\x00', &(0x7f0000000200)={0x81, 0x0, "a684405d6d555cb163a08e5e667c56e7fe548757c7fbaa71613db2ae0c31ca6373d891d235c367fc54c3b8a8aa24ef5f1cce0ee73ea144d2ec903a701346f0f8dcd1fc6290187762365a36372a8e5e7a1b47110718c5ad5f039d52dcb5dc9b0ca2f48c168d6db0915994dce34788d12ed958eedff287ce0e53"}, &(0x7f0000000100), 0x1000) 21:25:32 executing program 6: fchmodat(0xffffffffffffffff, &(0x7f0000000200)='./file0\x00', 0x0) 21:25:32 executing program 7: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$hfsplus(&(0x7f0000000040)='hfsplus\x00', &(0x7f0000000080)='./file0\x00', 0xc6c, 0x0, &(0x7f0000000300), 0x0, &(0x7f0000000380)) [ 243.414414] hfsplus: unable to find HFS+ superblock [ 243.424763] gfs2: invalid mount option: l [ 243.429030] gfs2: can't parse mount arguments [ 243.501990] hfsplus: unable to find HFS+ superblock [ 243.552768] hfsplus: unable to find HFS+ superblock 21:25:33 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x2) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_IRQ_LINE(r1, 0x4008ae61, &(0x7f0000000000)={0x0, 0x2}) 21:25:33 executing program 0: syz_open_dev$sndseq(&(0x7f0000000000)='/dev/snd/seq\x00', 0x0, 0x0) userfaultfd(0x0) syz_open_dev$mice(&(0x7f0000000100)='/dev/input/mice\x00', 0x0, 0x0) pselect6(0x40, &(0x7f00000abfc0)={0x3ffffd}, &(0x7f0000768000), &(0x7f00007fbfc0)={0x60000000}, &(0x7f0000f22000)={0x0, 0x989680}, &(0x7f0000f14000)={&(0x7f0000553ff8), 0x8}) 21:25:33 executing program 2: syz_mount_image$gfs2(&(0x7f0000000040)='gfs2\x00', &(0x7f0000001740)='./file0\x00', 0x2000000000000000, 0x0, &(0x7f0000001680), 0x0, &(0x7f0000000880)=ANY=[@ANYBLOB='l']) 21:25:33 executing program 6: r0 = socket$inet_tcp(0x2, 0xa, 0x300) read(r0, &(0x7f0000000040)=""/246, 0xf6) 21:25:33 executing program 4: name_to_handle_at(0xffffffffffffffff, &(0x7f0000000300)='\x00', &(0x7f0000000200)={0x81, 0x0, "a684405d6d555cb163a08e5e667c56e7fe548757c7fbaa71613db2ae0c31ca6373d891d235c367fc54c3b8a8aa24ef5f1cce0ee73ea144d2ec903a701346f0f8dcd1fc6290187762365a36372a8e5e7a1b47110718c5ad5f039d52dcb5dc9b0ca2f48c168d6db0915994dce34788d12ed958eedff287ce0e53"}, &(0x7f0000000100), 0x1000) 21:25:33 executing program 7: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$hfsplus(&(0x7f0000000040)='hfsplus\x00', &(0x7f0000000080)='./file0\x00', 0x482b000000000000, 0x0, &(0x7f0000000300), 0x0, &(0x7f0000000380)) 21:25:33 executing program 5: setpriority(0x1, 0x0, 0xf53b) 21:25:33 executing program 4: name_to_handle_at(0xffffffffffffffff, &(0x7f0000000300)='\x00', &(0x7f0000000200)={0x81, 0x0, "a684405d6d555cb163a08e5e667c56e7fe548757c7fbaa71613db2ae0c31ca6373d891d235c367fc54c3b8a8aa24ef5f1cce0ee73ea144d2ec903a701346f0f8dcd1fc6290187762365a36372a8e5e7a1b47110718c5ad5f039d52dcb5dc9b0ca2f48c168d6db0915994dce34788d12ed958eedff287ce0e53"}, &(0x7f0000000100), 0x1000) [ 244.245288] hfsplus: unable to find HFS+ superblock 21:25:33 executing program 1: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) 21:25:33 executing program 1: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000380)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) creat(&(0x7f0000000080)='./file0/file1\x00', 0x0) 21:25:33 executing program 0: syz_open_dev$sndseq(&(0x7f0000000000)='/dev/snd/seq\x00', 0x0, 0x0) userfaultfd(0x0) syz_open_dev$mice(&(0x7f0000000100)='/dev/input/mice\x00', 0x0, 0x0) pselect6(0x40, &(0x7f00000abfc0)={0x3ffffd}, &(0x7f0000768000), &(0x7f00007fbfc0)={0x6000}, &(0x7f0000f22000)={0x0, 0x989680}, &(0x7f0000f14000)={&(0x7f0000553ff8), 0x8}) 21:25:33 executing program 1: ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000280)) r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x4082) r1 = memfd_create(&(0x7f0000000100)="74086e750000000000000000008c00", 0x0) pwritev(r1, &(0x7f0000000340)=[{&(0x7f0000000240)='\'', 0x1}], 0x1, 0x81806) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) sendfile(r0, r0, &(0x7f0000000080), 0x102000004) 21:25:33 executing program 7: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$hfsplus(&(0x7f0000000040)='hfsplus\x00', &(0x7f0000000080)='./file0\x00', 0x6c0c000000000000, 0x0, &(0x7f0000000300), 0x0, &(0x7f0000000380)) [ 244.311580] gfs2: invalid mount option: l [ 244.315806] gfs2: can't parse mount arguments 21:25:33 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000005000)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f000000d379)={&(0x7f0000013db4)={0x20, 0x20, 0x2ff, 0x0, 0x0, {}, [@typed={0xc, 0x0, @fd}]}, 0x20}, 0x1}, 0x0) 21:25:33 executing program 1: r0 = eventfd(0x0) write$P9_RWRITE(r0, &(0x7f0000000000)={0xb, 0x77}, 0xb) 21:25:33 executing program 5: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x4) r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x1, 0x0) write$P9_RFLUSH(r0, &(0x7f0000000040)={0x7, 0x6d}, 0x7) [ 244.399699] gfs2: invalid mount option: l [ 244.404150] gfs2: can't parse mount arguments [ 244.454582] hfsplus: unable to find HFS+ superblock [ 244.481879] hfsplus: unable to find HFS+ superblock 21:25:34 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000733000)={0x5, 0x5, 0x7, 0x9}, 0x2c) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000003c0)={r0, &(0x7f00000002c0), &(0x7f0000000100)}, 0x20) 21:25:34 executing program 4: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) name_to_handle_at(0xffffffffffffffff, &(0x7f0000000300)='\x00', &(0x7f0000000200)={0x81, 0x0, "a684405d6d555cb163a08e5e667c56e7fe548757c7fbaa71613db2ae0c31ca6373d891d235c367fc54c3b8a8aa24ef5f1cce0ee73ea144d2ec903a701346f0f8dcd1fc6290187762365a36372a8e5e7a1b47110718c5ad5f039d52dcb5dc9b0ca2f48c168d6db0915994dce34788d12ed958eedff287ce0e53"}, &(0x7f0000000100), 0x1000) 21:25:34 executing program 1: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz1\x00', 0x200002, 0x0) r1 = openat$cgroup_subtree(r0, &(0x7f0000000080)='cgroup.subtree_control\x00', 0x2, 0x0) write$cgroup_subtree(r1, &(0x7f0000000200)={[{0x2b, 'memory', 0x20}]}, 0x8) 21:25:34 executing program 0: syz_open_dev$sndseq(&(0x7f0000000000)='/dev/snd/seq\x00', 0x0, 0x0) userfaultfd(0x0) syz_open_dev$mice(&(0x7f0000000100)='/dev/input/mice\x00', 0x0, 0x0) pselect6(0x40, &(0x7f00000abfc0)={0x3ffffd}, &(0x7f0000768000), &(0x7f00007fbfc0)={0x0, 0x10}, &(0x7f0000f22000)={0x0, 0x989680}, &(0x7f0000f14000)={&(0x7f0000553ff8), 0x8}) 21:25:34 executing program 2: syz_mount_image$gfs2(&(0x7f0000000040)='gfs2\x00', &(0x7f0000001740)='./file0\x00', 0x4000, 0x0, &(0x7f0000001680), 0x0, &(0x7f0000000880)=ANY=[@ANYBLOB='l']) 21:25:34 executing program 7: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$hfsplus(&(0x7f0000000040)='hfsplus\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x42440000, &(0x7f0000000300), 0x0, &(0x7f0000000380)) 21:25:34 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x9, 0x21, 0x9, 0x4, 0x2}, 0x2c) 21:25:34 executing program 6: socketpair(0x0, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) close(0xffffffffffffffff) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) r2 = getpid() perf_event_open(&(0x7f0000001740)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff}, r2, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, &(0x7f0000000780)=ANY=[@ANYBLOB="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"]) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000380)=[{&(0x7f00000000c0)=""/49, 0x31}], 0x10000023, &(0x7f00000002c0)=""/77, 0x4d}, 0x0) recvmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000040)=@ax25, 0x2, &(0x7f0000000000)=[{&(0x7f0000000080)=""/151, 0xffffff77}], 0x1, &(0x7f00000001c0)=""/17, 0xffda}, 0x3f00) sendmsg(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100), 0x47, &(0x7f0000000000)}, 0x0) 21:25:34 executing program 1: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x7f, 0x7, 0x5, 0x1}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000000c0)={r0, &(0x7f0000000100), &(0x7f0000000040)}, 0x20) r1 = bpf$MAP_CREATE(0x4, &(0x7f0000000880)={0x13, 0x0, 0x0, 0x0, 0x20000000, 0x0}, 0x2af) r2 = socket$kcm(0x2, 0x1, 0x0) sendmsg$kcm(r2, &(0x7f0000000500)={&(0x7f0000000040)=@in={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0xf}}, 0x80, &(0x7f00000001c0), 0x0, &(0x7f0000000540)}, 0x20040010) setsockopt$sock_attach_bpf(r2, 0x6, 0x22, &(0x7f0000000180)=r1, 0x4) 21:25:34 executing program 5: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x1, 0x0) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @local={0xfe, 0x80, [], 0xaa}, 0x1}, 0x80, &(0x7f0000000b00), 0x388, &(0x7f0000000740)}, 0x20004040) [ 245.244639] gfs2: invalid mount option: l [ 245.248887] gfs2: can't parse mount arguments 21:25:34 executing program 4: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) name_to_handle_at(0xffffffffffffffff, &(0x7f0000000300)='\x00', &(0x7f0000000200)={0x81, 0x0, "a684405d6d555cb163a08e5e667c56e7fe548757c7fbaa71613db2ae0c31ca6373d891d235c367fc54c3b8a8aa24ef5f1cce0ee73ea144d2ec903a701346f0f8dcd1fc6290187762365a36372a8e5e7a1b47110718c5ad5f039d52dcb5dc9b0ca2f48c168d6db0915994dce34788d12ed958eedff287ce0e53"}, &(0x7f0000000100), 0x1000) [ 245.290937] gfs2: invalid mount option: l [ 245.295189] gfs2: can't parse mount arguments 21:25:34 executing program 2: syz_mount_image$gfs2(&(0x7f0000000040)='gfs2\x00', &(0x7f0000001740)='./file0\x00', 0xfdffffff00000000, 0x0, &(0x7f0000001680), 0x0, &(0x7f0000000880)=ANY=[@ANYBLOB='l']) 21:25:34 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) connect$unix(0xffffffffffffffff, &(0x7f0000000140)=@abs, 0x6e) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x4e20, @multicast1=0xe0000001}, 0x10) sendmsg(r0, &(0x7f0000000640)={&(0x7f0000000480)=@in={0x2, 0x4e20, @local={0xac, 0x14, 0x14, 0xaa}}, 0x80, &(0x7f0000000b80), 0x0, &(0x7f0000000b00)}, 0x20040010) 21:25:34 executing program 0: syz_open_dev$sndseq(&(0x7f0000000000)='/dev/snd/seq\x00', 0x0, 0x0) userfaultfd(0x0) syz_open_dev$mice(&(0x7f0000000100)='/dev/input/mice\x00', 0x0, 0x0) pselect6(0x40, &(0x7f00000abfc0)={0x3ffffd}, &(0x7f0000768000), &(0x7f00007fbfc0)={0x0, 0x800000000000000}, &(0x7f0000f22000)={0x0, 0x989680}, &(0x7f0000f14000)={&(0x7f0000553ff8), 0x8}) [ 245.354972] hfsplus: unable to find HFS+ superblock 21:25:34 executing program 5: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x1, 0x0) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @local={0xfe, 0x80, [], 0xaa}, 0x1}, 0x80, &(0x7f0000000b00), 0x388, &(0x7f0000000740)}, 0x20004040) 21:25:34 executing program 4: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) name_to_handle_at(0xffffffffffffffff, &(0x7f0000000300)='\x00', &(0x7f0000000200)={0x81, 0x0, "a684405d6d555cb163a08e5e667c56e7fe548757c7fbaa71613db2ae0c31ca6373d891d235c367fc54c3b8a8aa24ef5f1cce0ee73ea144d2ec903a701346f0f8dcd1fc6290187762365a36372a8e5e7a1b47110718c5ad5f039d52dcb5dc9b0ca2f48c168d6db0915994dce34788d12ed958eedff287ce0e53"}, &(0x7f0000000100), 0x1000) 21:25:34 executing program 7: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$hfsplus(&(0x7f0000000040)='hfsplus\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x4d500000, &(0x7f0000000300), 0x0, &(0x7f0000000380)) 21:25:34 executing program 5: mkdir(&(0x7f0000000500)='./file1\x00', 0x0) r0 = open(&(0x7f0000000100)='./file1\x00', 0x0, 0x0) openat(r0, &(0x7f0000000200)='./file1\x00', 0x40, 0x10) [ 245.448866] gfs2: invalid mount option: l [ 245.449611] nf_conntrack: default automatic helper assignment has been turned off for security reasons and CT-based firewall rule not found. Use the iptables CT target to attach helpers instead. [ 245.453206] gfs2: can't parse mount arguments 21:25:34 executing program 0: syz_open_dev$sndseq(&(0x7f0000000000)='/dev/snd/seq\x00', 0x0, 0x0) userfaultfd(0x0) syz_open_dev$mice(&(0x7f0000000100)='/dev/input/mice\x00', 0x0, 0x0) pselect6(0x40, &(0x7f00000abfc0)={0x3ffffd}, &(0x7f0000768000), &(0x7f00007fbfc0)={0x0, 0x1000000000000000}, &(0x7f0000f22000)={0x0, 0x989680}, &(0x7f0000f14000)={&(0x7f0000553ff8), 0x8}) 21:25:34 executing program 4: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) name_to_handle_at(r0, &(0x7f0000000300)='\x00', &(0x7f0000000200)={0x8}, &(0x7f0000000100), 0x1000) 21:25:34 executing program 3: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x4) r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x1, 0x0) write$P9_RSTATFS(r0, &(0x7f0000000040)={0x43, 0x9}, 0x43) 21:25:34 executing program 5: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) r1 = dup2(r0, r0) mkdirat(r1, &(0x7f0000000100)='./file0\x00', 0x0) openat(r1, &(0x7f0000000000)='./file0\x00', 0x2600, 0xffffffffffffffff) 21:25:34 executing program 4: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) name_to_handle_at(r0, &(0x7f0000000300)='\x00', &(0x7f0000000200)={0x8}, &(0x7f0000000100), 0x1000) [ 245.641356] hfsplus: unable to find HFS+ superblock [ 245.735239] gfs2: invalid mount option: l [ 245.739671] gfs2: can't parse mount arguments 21:25:35 executing program 4: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) name_to_handle_at(r0, &(0x7f0000000300)='\x00', &(0x7f0000000200)={0x8}, &(0x7f0000000100), 0x1000) 21:25:35 executing program 0: syz_open_dev$sndseq(&(0x7f0000000000)='/dev/snd/seq\x00', 0x0, 0x0) userfaultfd(0x0) syz_open_dev$mice(&(0x7f0000000100)='/dev/input/mice\x00', 0x0, 0x0) pselect6(0x40, &(0x7f00000abfc0)={0x3ffffd}, &(0x7f0000768000), &(0x7f00007fbfc0)={0x0, 0x64000000}, &(0x7f0000f22000)={0x0, 0x989680}, &(0x7f0000f14000)={&(0x7f0000553ff8), 0x8}) 21:25:35 executing program 5: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x4) r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x1, 0x0) write$P9_RVERSION(r0, &(0x7f0000000800)={0x15, 0x65, 0xffff, 0x0, 0x8, '9P2000.L'}, 0x15) 21:25:35 executing program 7: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$hfsplus(&(0x7f0000000040)='hfsplus\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x2000000000000, &(0x7f0000000300), 0x0, &(0x7f0000000380)) 21:25:35 executing program 3: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x4) r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x1, 0x0) write$P9_RSTATFS(r0, &(0x7f0000000040)={0x43, 0x9}, 0x43) 21:25:35 executing program 2: syz_mount_image$gfs2(&(0x7f0000000040)='gfs2\x00', &(0x7f0000001740)='./file0\x00', 0x100000000000000, 0x0, &(0x7f0000001680), 0x0, &(0x7f0000000880)=ANY=[@ANYBLOB='l']) 21:25:35 executing program 6: socketpair(0x0, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) close(0xffffffffffffffff) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) r2 = getpid() perf_event_open(&(0x7f0000001740)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff}, r2, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, &(0x7f0000000780)=ANY=[@ANYBLOB="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"]) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000380)=[{&(0x7f00000000c0)=""/49, 0x31}], 0x10000023, &(0x7f00000002c0)=""/77, 0x4d}, 0x0) recvmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000040)=@ax25, 0x2, &(0x7f0000000000)=[{&(0x7f0000000080)=""/151, 0xffffff77}], 0x1, &(0x7f00000001c0)=""/17, 0xffda}, 0x3f00) sendmsg(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100), 0x47, &(0x7f0000000000)}, 0x0) 21:25:35 executing program 1: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x4) r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x1, 0x0) write$P9_RCREATE(r0, &(0x7f0000000100)={0x18, 0x73}, 0x18) 21:25:35 executing program 1: openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x20842, 0x130) 21:25:35 executing program 1: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x4) r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x1, 0x0) write$P9_RWALK(r0, &(0x7f0000000200)={0x9, 0x6f}, 0x9) 21:25:35 executing program 1: r0 = inotify_init1(0x0) fcntl$setown(r0, 0x8, 0xffffffffffffffff) fcntl$getownex(r0, 0x10, &(0x7f00000000c0)={0x0, 0x0}) ptrace$setopts(0x4206, r1, 0x0, 0x0) ptrace(0x4207, r1) ioctl$sock_inet_tcp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000002400)) ptrace$poke(0x1b, r1, &(0x7f0000002480), 0x9) 21:25:35 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000001c40)={0x2, 0x4e20, @multicast1=0xe0000001}, 0x10) sendto$inet(r0, &(0x7f0000de1fff), 0xfffffffffffffd43, 0x20008005, &(0x7f0000db4ff0)={0x2, 0x4e20, @loopback=0x7f000001}, 0x10) recvfrom(r0, &(0x7f0000f9cf9b)=""/101, 0x6478c8501c739c9d, 0x120, 0x0, 0x35) recvmmsg(r0, &(0x7f0000008d40)=[{{&(0x7f0000007840)=@l2, 0x80, &(0x7f0000008c00), 0x0, &(0x7f0000008c80)=""/177, 0xb1}}], 0x1, 0x10001, &(0x7f0000008f80)={0x77359400}) [ 246.300308] gfs2: invalid mount option: l [ 246.304641] gfs2: can't parse mount arguments 21:25:35 executing program 4: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) name_to_handle_at(r0, &(0x7f0000000300)='\x00', &(0x7f0000000200)={0x45, 0x0, "a684405d6d555cb163a08e5e667c56e7fe548757c7fbaa71613db2ae0c31ca6373d891d235c367fc54c3b8a8aa24ef5f1cce0ee73ea144d2ec903a7013"}, &(0x7f0000000100), 0x1000) 21:25:35 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCADDRT(r0, 0x890c, &(0x7f0000000000)={0x0, {0x2}, {0x2, 0x0, @local={0xac, 0x14, 0x14, 0xaa}}, {0x2, 0x0, @broadcast=0xffffffff}}) 21:25:35 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000001c0)={&(0x7f0000000200)={0x10}, 0xc, &(0x7f0000000140)={&(0x7f0000000000)=ANY=[@ANYBLOB="3400000020007f9d0000000000000000020010000000000000000000100000000c001400", @ANYRES32=0x0, @ANYBLOB="0800020000000000e2fe6fbc188a2c4265b1511b8d5b4e36d5c01559ccab7159e2eeeae275e32fbdcd2f3ed913009e928d8e31eaf79b22c569e814eb4d26cd8a0000000000000000000000"], 0x3}, 0x1}, 0x0) 21:25:35 executing program 0: syz_open_dev$sndseq(&(0x7f0000000000)='/dev/snd/seq\x00', 0x0, 0x0) userfaultfd(0x0) syz_open_dev$mice(&(0x7f0000000100)='/dev/input/mice\x00', 0x0, 0x0) pselect6(0x40, &(0x7f00000abfc0)={0x3ffffd}, &(0x7f0000768000), &(0x7f00007fbfc0)={0x0, 0x64}, &(0x7f0000f22000)={0x0, 0x989680}, &(0x7f0000f14000)={&(0x7f0000553ff8), 0x8}) 21:25:35 executing program 2: syz_mount_image$gfs2(&(0x7f0000000040)='gfs2\x00', &(0x7f0000001740)='./file0\x00', 0x3f00, 0x0, &(0x7f0000001680), 0x0, &(0x7f0000000880)=ANY=[@ANYBLOB='l']) 21:25:35 executing program 3: r0 = socket$inet6(0xa, 0x80001, 0x0) setsockopt$inet6_MCAST_JOIN_GROUP(r0, 0x29, 0x2a, &(0x7f0000fca000)={0x100000001, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}}}}, 0x88) setsockopt$inet6_group_source_req(r0, 0x29, 0x2b, &(0x7f0000a83000)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}}}, {{0xa, 0x0, 0x0, @dev={0xfe, 0x80}}}}, 0x108) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x30, &(0x7f0000000000)={0x1, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}}}, 0x0, 0x1, [{{0xa, 0x0, 0x0, @loopback={0x0, 0x1}}}]}, 0x110) 21:25:35 executing program 4: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) name_to_handle_at(r0, &(0x7f0000000300)='\x00', &(0x7f0000000200)={0x45, 0x0, "a684405d6d555cb163a08e5e667c56e7fe548757c7fbaa71613db2ae0c31ca6373d891d235c367fc54c3b8a8aa24ef5f1cce0ee73ea144d2ec903a7013"}, &(0x7f0000000100), 0x1000) [ 246.495692] hfsplus: unable to find HFS+ superblock [ 246.530439] gfs2: invalid mount option: l [ 246.534695] gfs2: can't parse mount arguments 21:25:35 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockname(r0, &(0x7f0000000100)=@ll, &(0x7f0000000180)=0x80) 21:25:35 executing program 0: syz_open_dev$sndseq(&(0x7f0000000000)='/dev/snd/seq\x00', 0x0, 0x0) userfaultfd(0x0) syz_open_dev$mice(&(0x7f0000000100)='/dev/input/mice\x00', 0x0, 0x0) pselect6(0x40, &(0x7f00000abfc0)={0x3ffffd}, &(0x7f0000768000), &(0x7f00007fbfc0)={0x0, 0x100000000000000}, &(0x7f0000f22000)={0x0, 0x989680}, &(0x7f0000f14000)={&(0x7f0000553ff8), 0x8}) 21:25:35 executing program 7: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$hfsplus(&(0x7f0000000040)='hfsplus\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x20000000, &(0x7f0000000300), 0x0, &(0x7f0000000380)) [ 246.575902] gfs2: invalid mount option: l [ 246.580170] gfs2: can't parse mount arguments [ 246.699144] hfsplus: unable to find HFS+ superblock 21:25:36 executing program 6: socketpair(0x0, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) close(0xffffffffffffffff) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) r2 = getpid() perf_event_open(&(0x7f0000001740)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff}, r2, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, &(0x7f0000000780)=ANY=[@ANYBLOB="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"]) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000380)=[{&(0x7f00000000c0)=""/49, 0x31}], 0x10000023, &(0x7f00000002c0)=""/77, 0x4d}, 0x0) recvmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000040)=@ax25, 0x2, &(0x7f0000000000)=[{&(0x7f0000000080)=""/151, 0xffffff77}], 0x1, &(0x7f00000001c0)=""/17, 0xffda}, 0x3f00) sendmsg(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100), 0x47, &(0x7f0000000000)}, 0x0) 21:25:36 executing program 2: syz_mount_image$gfs2(&(0x7f0000000040)='gfs2\x00', &(0x7f0000001740)='./file0\x00', 0xfffffdfc, 0x0, &(0x7f0000001680), 0x0, &(0x7f0000000880)=ANY=[@ANYBLOB='l']) 21:25:36 executing program 3: r0 = socket$inet6(0xa, 0x80001, 0x0) setsockopt$inet6_MCAST_JOIN_GROUP(r0, 0x29, 0x2a, &(0x7f0000fca000)={0x100000001, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}}}}, 0x88) setsockopt$inet6_group_source_req(r0, 0x29, 0x2b, &(0x7f0000a83000)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}}}, {{0xa, 0x0, 0x0, @dev={0xfe, 0x80}}}}, 0x108) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x30, &(0x7f0000000000)={0x1, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}}}, 0x0, 0x1, [{{0xa, 0x0, 0x0, @loopback={0x0, 0x1}}}]}, 0x110) 21:25:36 executing program 4: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) name_to_handle_at(r0, &(0x7f0000000300)='\x00', &(0x7f0000000200)={0x45, 0x0, "a684405d6d555cb163a08e5e667c56e7fe548757c7fbaa71613db2ae0c31ca6373d891d235c367fc54c3b8a8aa24ef5f1cce0ee73ea144d2ec903a7013"}, &(0x7f0000000100), 0x1000) 21:25:36 executing program 0: syz_open_dev$sndseq(&(0x7f0000000000)='/dev/snd/seq\x00', 0x0, 0x0) userfaultfd(0x0) syz_open_dev$mice(&(0x7f0000000100)='/dev/input/mice\x00', 0x0, 0x0) pselect6(0x40, &(0x7f00000abfc0)={0x3ffffd}, &(0x7f0000768000), &(0x7f00007fbfc0)={0x0, 0x10000000}, &(0x7f0000f22000)={0x0, 0x989680}, &(0x7f0000f14000)={&(0x7f0000553ff8), 0x8}) [ 247.295390] gfs2: invalid mount option: l [ 247.299651] gfs2: can't parse mount arguments 21:25:36 executing program 1: socketpair$unix(0x1, 0x8000000002, 0x0, &(0x7f0000d12000)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r0, &(0x7f0000000000)=@abs, 0x2d) sendmmsg$unix(r1, &(0x7f00000bd000), 0xfffffffffffffdc3, 0x0) poll(&(0x7f0000000080)=[{r1, 0x600}], 0x1, 0x532) read(r0, &(0x7f0000000240)=""/226, 0xe2) 21:25:36 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket(0x840000000002, 0x3, 0xff) bind$inet(r0, &(0x7f00000001c0)={0x2, 0x0, @local={0xac, 0x14, 0x14, 0xaa}}, 0x10) connect$inet(r1, &(0x7f0000000000)={0x2, 0x0, @multicast1=0xe0000001}, 0x10) write$binfmt_elf64(r1, &(0x7f0000000480)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x38}, [{}], "1d7b8f84794736bb30016e34fa3f3e52b3461c8eec5bf0e713cb6692419c05b2b13462efd5a609f34f5219dee48f3e3a762dc60a107fd0cf6876fa87f1ab8d1dec8bbf2b059e3f40a22581a78fdec75c5f2d0ff7379347d6b38d6e761bde71e8cca035443c", [[], [], [], []]}, 0x4dd) 21:25:36 executing program 7: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$hfsplus(&(0x7f0000000040)='hfsplus\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x40000000, &(0x7f0000000300), 0x0, &(0x7f0000000380)) 21:25:36 executing program 3: r0 = socket$inet6(0xa, 0x80001, 0x0) setsockopt$inet6_MCAST_JOIN_GROUP(r0, 0x29, 0x2a, &(0x7f0000fca000)={0x100000001, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}}}}, 0x88) setsockopt$inet6_group_source_req(r0, 0x29, 0x2b, &(0x7f0000a83000)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}}}, {{0xa, 0x0, 0x0, @dev={0xfe, 0x80}}}}, 0x108) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x30, &(0x7f0000000000)={0x1, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}}}, 0x0, 0x1, [{{0xa, 0x0, 0x0, @loopback={0x0, 0x1}}}]}, 0x110) 21:25:36 executing program 4: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) name_to_handle_at(r0, &(0x7f0000000300)='\x00', &(0x7f0000000200)={0x63, 0x0, "a684405d6d555cb163a08e5e667c56e7fe548757c7fbaa71613db2ae0c31ca6373d891d235c367fc54c3b8a8aa24ef5f1cce0ee73ea144d2ec903a701346f0f8dcd1fc6290187762365a36372a8e5e7a1b47110718c5ad5f039d52"}, &(0x7f0000000100), 0x1000) 21:25:36 executing program 0: syz_open_dev$sndseq(&(0x7f0000000000)='/dev/snd/seq\x00', 0x0, 0x0) userfaultfd(0x0) syz_open_dev$mice(&(0x7f0000000100)='/dev/input/mice\x00', 0x0, 0x0) pselect6(0x40, &(0x7f00000abfc0)={0x3ffffd}, &(0x7f0000768000), &(0x7f00007fbfc0)={0x0, 0x1000000}, &(0x7f0000f22000)={0x0, 0x989680}, &(0x7f0000f14000)={&(0x7f0000553ff8), 0x8}) 21:25:36 executing program 2: syz_mount_image$gfs2(&(0x7f0000000040)='gfs2\x00', &(0x7f0000001740)='./file0\x00', 0x300000000000000, 0x0, &(0x7f0000001680), 0x0, &(0x7f0000000880)=ANY=[@ANYBLOB='l']) 21:25:36 executing program 5: 21:25:36 executing program 3: r0 = socket$inet6(0xa, 0x80001, 0x0) setsockopt$inet6_MCAST_JOIN_GROUP(r0, 0x29, 0x2a, &(0x7f0000fca000)={0x100000001, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}}}}, 0x88) setsockopt$inet6_group_source_req(r0, 0x29, 0x2b, &(0x7f0000a83000)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}}}, {{0xa, 0x0, 0x0, @dev={0xfe, 0x80}}}}, 0x108) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x30, &(0x7f0000000000)={0x1, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}}}, 0x0, 0x1, [{{0xa, 0x0, 0x0, @loopback={0x0, 0x1}}}]}, 0x110) 21:25:36 executing program 4: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) name_to_handle_at(r0, &(0x7f0000000300)='\x00', &(0x7f0000000200)={0x63, 0x0, "a684405d6d555cb163a08e5e667c56e7fe548757c7fbaa71613db2ae0c31ca6373d891d235c367fc54c3b8a8aa24ef5f1cce0ee73ea144d2ec903a701346f0f8dcd1fc6290187762365a36372a8e5e7a1b47110718c5ad5f039d52"}, &(0x7f0000000100), 0x1000) [ 247.429992] gfs2: invalid mount option: l [ 247.434285] gfs2: can't parse mount arguments [ 247.464982] gfs2: invalid mount option: l [ 247.469259] gfs2: can't parse mount arguments 21:25:36 executing program 0: syz_open_dev$sndseq(&(0x7f0000000000)='/dev/snd/seq\x00', 0x0, 0x0) userfaultfd(0x0) syz_open_dev$mice(&(0x7f0000000100)='/dev/input/mice\x00', 0x0, 0x0) pselect6(0x40, &(0x7f00000abfc0)={0x3ffffd}, &(0x7f0000768000), &(0x7f00007fbfc0)={0x0, 0x60000000}, &(0x7f0000f22000)={0x0, 0x989680}, &(0x7f0000f14000)={&(0x7f0000553ff8), 0x8}) [ 247.574149] hfsplus: unable to find HFS+ superblock 21:25:37 executing program 6: socketpair(0x0, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) close(0xffffffffffffffff) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) r2 = getpid() perf_event_open(&(0x7f0000001740)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff}, r2, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, &(0x7f0000000780)=ANY=[@ANYBLOB="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"]) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000380)=[{&(0x7f00000000c0)=""/49, 0x31}], 0x10000023, &(0x7f00000002c0)=""/77, 0x4d}, 0x0) recvmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000040)=@ax25, 0x2, &(0x7f0000000000)=[{&(0x7f0000000080)=""/151, 0xffffff77}], 0x1, &(0x7f00000001c0)=""/17, 0xffda}, 0x3f00) sendmsg(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100), 0x47, &(0x7f0000000000)}, 0x0) 21:25:37 executing program 2: syz_mount_image$gfs2(&(0x7f0000000040)='gfs2\x00', &(0x7f0000001740)='./file0\x00', 0x3f00000000000000, 0x0, &(0x7f0000001680), 0x0, &(0x7f0000000880)=ANY=[@ANYBLOB='l']) 21:25:37 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f06762070") r1 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) fallocate(r1, 0x20, 0x0, 0xfffffeff000) 21:25:37 executing program 4: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) name_to_handle_at(r0, &(0x7f0000000300)='\x00', &(0x7f0000000200)={0x63, 0x0, "a684405d6d555cb163a08e5e667c56e7fe548757c7fbaa71613db2ae0c31ca6373d891d235c367fc54c3b8a8aa24ef5f1cce0ee73ea144d2ec903a701346f0f8dcd1fc6290187762365a36372a8e5e7a1b47110718c5ad5f039d52"}, &(0x7f0000000100), 0x1000) 21:25:37 executing program 3: r0 = socket$inet6(0xa, 0x80001, 0x0) setsockopt$inet6_MCAST_JOIN_GROUP(r0, 0x29, 0x2a, &(0x7f0000fca000)={0x100000001, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}}}}, 0x88) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x30, &(0x7f0000000000)={0x1, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}}}, 0x0, 0x1, [{{0xa, 0x0, 0x0, @loopback={0x0, 0x1}}}]}, 0x110) [ 248.259321] gfs2: invalid mount option: l [ 248.263727] gfs2: can't parse mount arguments 21:25:37 executing program 1: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x14, 0x0, 0x0, &(0x7f00000002c0)) 21:25:37 executing program 0: syz_open_dev$sndseq(&(0x7f0000000000)='/dev/snd/seq\x00', 0x0, 0x0) userfaultfd(0x0) syz_open_dev$mice(&(0x7f0000000100)='/dev/input/mice\x00', 0x0, 0x0) pselect6(0x40, &(0x7f00000abfc0)={0x3ffffd}, &(0x7f0000768000), &(0x7f00007fbfc0)={0x0, 0x6000}, &(0x7f0000f22000)={0x0, 0x989680}, &(0x7f0000f14000)={&(0x7f0000553ff8), 0x8}) 21:25:37 executing program 7: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$hfsplus(&(0x7f0000000040)='hfsplus\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x4244000000000000, &(0x7f0000000300), 0x0, &(0x7f0000000380)) 21:25:37 executing program 3: r0 = socket$inet6(0xa, 0x80001, 0x0) setsockopt$inet6_MCAST_JOIN_GROUP(r0, 0x29, 0x2a, &(0x7f0000fca000)={0x100000001, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}}}}, 0x88) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x30, &(0x7f0000000000)={0x1, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}}}, 0x0, 0x1, [{{0xa, 0x0, 0x0, @loopback={0x0, 0x1}}}]}, 0x110) 21:25:37 executing program 4: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) name_to_handle_at(r0, &(0x7f0000000300)='\x00', &(0x7f0000000200)={0x72, 0x0, "a684405d6d555cb163a08e5e667c56e7fe548757c7fbaa71613db2ae0c31ca6373d891d235c367fc54c3b8a8aa24ef5f1cce0ee73ea144d2ec903a701346f0f8dcd1fc6290187762365a36372a8e5e7a1b47110718c5ad5f039d52dcb5dc9b0ca2f48c168d6db0915994"}, &(0x7f0000000100), 0x1000) 21:25:37 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x1, 0x4, 0x4, 0x101}, 0x2c) setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, &(0x7f00000004c0), 0x14) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000000c0)={&(0x7f0000000000)='./file0/file0\x00', r0}, 0x10) 21:25:37 executing program 2: syz_mount_image$gfs2(&(0x7f0000000040)='gfs2\x00', &(0x7f0000001740)='./file0\x00', 0xedc000000000, 0x0, &(0x7f0000001680), 0x0, &(0x7f0000000880)=ANY=[@ANYBLOB='l']) 21:25:37 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2000000000000022, &(0x7f0000356000)=0x1, 0x4) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000080)={@in6={{0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}}}, 0x0, 0x5, 0x0, "dcbd7013560987c90ebd84b6e984c7242a057f7f7f8b85f0aba26dc45e69c2db87180107eba9f36e22ba7df5228e6a97e954627eb3966137d05054d92ff0e25078b35ba8d6f9e3ab5b89afb667676ae0"}, 0xd8) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000480)='syz_tun\x00', 0x25) shutdown(0xffffffffffffffff, 0x0) sendto$inet6(r0, &(0x7f0000000000), 0x0, 0x200408d6, &(0x7f00000011c0)={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}}, 0x1c) 21:25:37 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) getsockopt$inet6_int(r0, 0x29, 0x3a, &(0x7f0000000000), &(0x7f0000000040)=0x4) [ 248.513828] gfs2: invalid mount option: l [ 248.518136] gfs2: can't parse mount arguments 21:25:37 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000040)={'ip6tnl0\x00', &(0x7f0000000200)=@ethtool_drvinfo={0x3, "3746b50e61281beca8764ffbca574a52d8cfc625628b7fb8aa52942b64d8bb4d", "877110380a0cac461cd918fc94707c918aed307b2c7f9935528cdb881ae8feba", "613109b5c3582268f928717724fd9a383aed863138032ab943bc039f5bfc586d", "233f874965c94dbf8dd1c739d366d8d1b3d6a2d8ae4b62ece235af21006d3159", "691a14f8fe2bf2d29bd68e89ebccbf560e002269f28e0ddeb9571d3bd1a7e77a", "54c5d3b3e53ce51ad3e23dae"}}) 21:25:37 executing program 5: r0 = socket$inet6(0xa, 0x3, 0x9010000000000084) sendto$inet6(r0, &(0x7f0000000200)="482e0438d23d54fdc18dd61d01b1baa9", 0x10, 0x0, &(0x7f0000000040)={0xa, 0x0, 0x0, @dev={0xfe, 0x80}}, 0x1c) [ 248.566007] gfs2: invalid mount option: l [ 248.570437] gfs2: can't parse mount arguments [ 248.683689] hfsplus: unable to find HFS+ superblock 21:25:38 executing program 6: 21:25:38 executing program 1: 21:25:38 executing program 2: syz_mount_image$gfs2(&(0x7f0000000040)='gfs2\x00', &(0x7f0000001740)='./file0\x00', 0xffffff7f00000000, 0x0, &(0x7f0000001680), 0x0, &(0x7f0000000880)=ANY=[@ANYBLOB='l']) 21:25:38 executing program 4: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) name_to_handle_at(r0, &(0x7f0000000300)='\x00', &(0x7f0000000200)={0x72, 0x0, "a684405d6d555cb163a08e5e667c56e7fe548757c7fbaa71613db2ae0c31ca6373d891d235c367fc54c3b8a8aa24ef5f1cce0ee73ea144d2ec903a701346f0f8dcd1fc6290187762365a36372a8e5e7a1b47110718c5ad5f039d52dcb5dc9b0ca2f48c168d6db0915994"}, &(0x7f0000000100), 0x1000) 21:25:38 executing program 3: r0 = socket$inet6(0xa, 0x80001, 0x0) setsockopt$inet6_MCAST_JOIN_GROUP(r0, 0x29, 0x2a, &(0x7f0000fca000)={0x100000001, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}}}}, 0x88) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x30, &(0x7f0000000000)={0x1, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}}}, 0x0, 0x1, [{{0xa, 0x0, 0x0, @loopback={0x0, 0x1}}}]}, 0x110) 21:25:38 executing program 5: 21:25:38 executing program 0: syz_open_dev$sndseq(&(0x7f0000000000)='/dev/snd/seq\x00', 0x0, 0x0) userfaultfd(0x0) syz_open_dev$mice(&(0x7f0000000100)='/dev/input/mice\x00', 0x0, 0x0) pselect6(0x40, &(0x7f00000abfc0)={0x3ffffd}, &(0x7f0000768000), &(0x7f00007fbfc0)={0x0, 0x6400}, &(0x7f0000f22000)={0x0, 0x989680}, &(0x7f0000f14000)={&(0x7f0000553ff8), 0x8}) 21:25:38 executing program 7: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$hfsplus(&(0x7f0000000040)='hfsplus\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0xe0000, &(0x7f0000000300), 0x0, &(0x7f0000000380)) 21:25:38 executing program 1: 21:25:38 executing program 1: 21:25:38 executing program 1: 21:25:38 executing program 1: [ 249.168542] gfs2: invalid mount option: l [ 249.172804] gfs2: can't parse mount arguments 21:25:38 executing program 1: 21:25:38 executing program 1: 21:25:38 executing program 3: r0 = socket$inet6(0xa, 0x80001, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2b, &(0x7f0000a83000)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}}}, {{0xa, 0x0, 0x0, @dev={0xfe, 0x80}}}}, 0x108) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x30, &(0x7f0000000000)={0x1, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}}}, 0x0, 0x1, [{{0xa, 0x0, 0x0, @loopback={0x0, 0x1}}}]}, 0x110) 21:25:38 executing program 0: syz_open_dev$sndseq(&(0x7f0000000000)='/dev/snd/seq\x00', 0x0, 0x0) userfaultfd(0x0) syz_open_dev$mice(&(0x7f0000000100)='/dev/input/mice\x00', 0x0, 0x0) pselect6(0x40, &(0x7f00000abfc0)={0x3ffffd}, &(0x7f0000768000), &(0x7f00007fbfc0)={0x0, 0x16}, &(0x7f0000f22000)={0x0, 0x989680}, &(0x7f0000f14000)={&(0x7f0000553ff8), 0x8}) 21:25:38 executing program 6: 21:25:38 executing program 1: [ 249.254454] gfs2: invalid mount option: l [ 249.258735] gfs2: can't parse mount arguments 21:25:38 executing program 2: syz_mount_image$gfs2(&(0x7f0000000040)='gfs2\x00', &(0x7f0000001740)='./file0\x00', 0x500000000000000, 0x0, &(0x7f0000001680), 0x0, &(0x7f0000000880)=ANY=[@ANYBLOB='l']) 21:25:38 executing program 5: 21:25:38 executing program 4: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) name_to_handle_at(r0, &(0x7f0000000300)='\x00', &(0x7f0000000200)={0x72, 0x0, "a684405d6d555cb163a08e5e667c56e7fe548757c7fbaa71613db2ae0c31ca6373d891d235c367fc54c3b8a8aa24ef5f1cce0ee73ea144d2ec903a701346f0f8dcd1fc6290187762365a36372a8e5e7a1b47110718c5ad5f039d52dcb5dc9b0ca2f48c168d6db0915994"}, &(0x7f0000000100), 0x1000) 21:25:38 executing program 1: 21:25:38 executing program 1: [ 249.409495] hfsplus: unable to find HFS+ superblock [ 249.437938] gfs2: invalid mount option: l [ 249.442271] gfs2: can't parse mount arguments 21:25:38 executing program 5: 21:25:38 executing program 1: 21:25:38 executing program 7: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$hfsplus(&(0x7f0000000040)='hfsplus\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0xa000000, &(0x7f0000000300), 0x0, &(0x7f0000000380)) 21:25:38 executing program 3: setsockopt$inet6_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x29, 0x2a, &(0x7f0000fca000)={0x100000001, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}}}}, 0x88) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x2b, &(0x7f0000a83000)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}}}, {{0xa, 0x0, 0x0, @dev={0xfe, 0x80}}}}, 0x108) setsockopt$inet6_MCAST_MSFILTER(0xffffffffffffffff, 0x29, 0x30, &(0x7f0000000000)={0x1, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}}}, 0x0, 0x1, [{{0xa, 0x0, 0x0, @loopback={0x0, 0x1}}}]}, 0x110) 21:25:38 executing program 4: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) name_to_handle_at(r0, &(0x7f0000000300)='\x00', &(0x7f0000000200)={0x7a, 0x0, "a684405d6d555cb163a08e5e667c56e7fe548757c7fbaa71613db2ae0c31ca6373d891d235c367fc54c3b8a8aa24ef5f1cce0ee73ea144d2ec903a701346f0f8dcd1fc6290187762365a36372a8e5e7a1b47110718c5ad5f039d52dcb5dc9b0ca2f48c168d6db0915994dce34788d12ed958"}, &(0x7f0000000100), 0x1000) 21:25:38 executing program 0: syz_open_dev$sndseq(&(0x7f0000000000)='/dev/snd/seq\x00', 0x0, 0x0) userfaultfd(0x0) syz_open_dev$mice(&(0x7f0000000100)='/dev/input/mice\x00', 0x0, 0x0) pselect6(0x40, &(0x7f00000abfc0)={0x3ffffd}, &(0x7f0000768000), &(0x7f00007fbfc0)={0x0, 0x6000000000000000}, &(0x7f0000f22000)={0x0, 0x989680}, &(0x7f0000f14000)={&(0x7f0000553ff8), 0x8}) 21:25:38 executing program 6: 21:25:38 executing program 1: [ 249.486991] gfs2: invalid mount option: l [ 249.491293] gfs2: can't parse mount arguments 21:25:38 executing program 1: 21:25:38 executing program 2: syz_mount_image$gfs2(&(0x7f0000000040)='gfs2\x00', &(0x7f0000001740)='./file0\x00', 0x8cffffff, 0x0, &(0x7f0000001680), 0x0, &(0x7f0000000880)=ANY=[@ANYBLOB='l']) 21:25:38 executing program 1: 21:25:38 executing program 5: 21:25:38 executing program 1: 21:25:38 executing program 1: 21:25:38 executing program 1: 21:25:38 executing program 6: 21:25:38 executing program 4: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) name_to_handle_at(r0, &(0x7f0000000300)='\x00', &(0x7f0000000200)={0x7a, 0x0, "a684405d6d555cb163a08e5e667c56e7fe548757c7fbaa71613db2ae0c31ca6373d891d235c367fc54c3b8a8aa24ef5f1cce0ee73ea144d2ec903a701346f0f8dcd1fc6290187762365a36372a8e5e7a1b47110718c5ad5f039d52dcb5dc9b0ca2f48c168d6db0915994dce34788d12ed958"}, &(0x7f0000000100), 0x1000) 21:25:38 executing program 1: [ 249.651354] gfs2: invalid mount option: l [ 249.655730] gfs2: can't parse mount arguments [ 249.748708] gfs2: invalid mount option: l [ 249.753028] gfs2: can't parse mount arguments [ 249.790456] hfsplus: unable to find HFS+ superblock 21:25:38 executing program 7: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$hfsplus(&(0x7f0000000040)='hfsplus\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x482b, &(0x7f0000000300), 0x0, &(0x7f0000000380)) 21:25:38 executing program 3: setsockopt$inet6_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x29, 0x2a, &(0x7f0000fca000)={0x100000001, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}}}}, 0x88) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x2b, &(0x7f0000a83000)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}}}, {{0xa, 0x0, 0x0, @dev={0xfe, 0x80}}}}, 0x108) setsockopt$inet6_MCAST_MSFILTER(0xffffffffffffffff, 0x29, 0x30, &(0x7f0000000000)={0x1, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}}}, 0x0, 0x1, [{{0xa, 0x0, 0x0, @loopback={0x0, 0x1}}}]}, 0x110) 21:25:38 executing program 1: 21:25:38 executing program 0: syz_open_dev$sndseq(&(0x7f0000000000)='/dev/snd/seq\x00', 0x0, 0x0) userfaultfd(0x0) syz_open_dev$mice(&(0x7f0000000100)='/dev/input/mice\x00', 0x0, 0x0) pselect6(0x40, &(0x7f00000abfc0)={0x3ffffd}, &(0x7f0000768000), &(0x7f00007fbfc0)={0x0, 0x6400000000000000}, &(0x7f0000f22000)={0x0, 0x989680}, &(0x7f0000f14000)={&(0x7f0000553ff8), 0x8}) 21:25:38 executing program 5: 21:25:38 executing program 6: 21:25:38 executing program 4: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) name_to_handle_at(r0, &(0x7f0000000300)='\x00', &(0x7f0000000200)={0x7a, 0x0, "a684405d6d555cb163a08e5e667c56e7fe548757c7fbaa71613db2ae0c31ca6373d891d235c367fc54c3b8a8aa24ef5f1cce0ee73ea144d2ec903a701346f0f8dcd1fc6290187762365a36372a8e5e7a1b47110718c5ad5f039d52dcb5dc9b0ca2f48c168d6db0915994dce34788d12ed958"}, &(0x7f0000000100), 0x1000) 21:25:38 executing program 2: syz_mount_image$gfs2(&(0x7f0000000040)='gfs2\x00', &(0x7f0000001740)='./file0\x00', 0x7009, 0x0, &(0x7f0000001680), 0x0, &(0x7f0000000880)=ANY=[@ANYBLOB='l']) 21:25:38 executing program 1: 21:25:38 executing program 1: 21:25:38 executing program 1: 21:25:38 executing program 6: 21:25:38 executing program 3: setsockopt$inet6_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x29, 0x2a, &(0x7f0000fca000)={0x100000001, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}}}}, 0x88) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x2b, &(0x7f0000a83000)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}}}, {{0xa, 0x0, 0x0, @dev={0xfe, 0x80}}}}, 0x108) setsockopt$inet6_MCAST_MSFILTER(0xffffffffffffffff, 0x29, 0x30, &(0x7f0000000000)={0x1, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}}}, 0x0, 0x1, [{{0xa, 0x0, 0x0, @loopback={0x0, 0x1}}}]}, 0x110) 21:25:38 executing program 5: 21:25:38 executing program 1: 21:25:38 executing program 4: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) name_to_handle_at(r0, &(0x7f0000000300)='\x00', &(0x7f0000000200)={0x7e, 0x0, "a684405d6d555cb163a08e5e667c56e7fe548757c7fbaa71613db2ae0c31ca6373d891d235c367fc54c3b8a8aa24ef5f1cce0ee73ea144d2ec903a701346f0f8dcd1fc6290187762365a36372a8e5e7a1b47110718c5ad5f039d52dcb5dc9b0ca2f48c168d6db0915994dce34788d12ed958eedff287"}, &(0x7f0000000100), 0x1000) [ 249.901645] gfs2: invalid mount option: l [ 249.905910] gfs2: can't parse mount arguments [ 249.965638] gfs2: invalid mount option: l [ 249.970149] gfs2: can't parse mount arguments [ 250.057558] hfsplus: unable to find HFS+ superblock 21:25:39 executing program 7: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$hfsplus(&(0x7f0000000040)='hfsplus\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x2b48, &(0x7f0000000300), 0x0, &(0x7f0000000380)) 21:25:39 executing program 1: 21:25:39 executing program 0: syz_open_dev$sndseq(&(0x7f0000000000)='/dev/snd/seq\x00', 0x0, 0x0) userfaultfd(0x0) syz_open_dev$mice(&(0x7f0000000100)='/dev/input/mice\x00', 0x0, 0x0) pselect6(0x40, &(0x7f00000abfc0)={0x3ffffd}, &(0x7f0000768000), &(0x7f00007fbfc0)={0x0, 0x1000000000000}, &(0x7f0000f22000)={0x0, 0x989680}, &(0x7f0000f14000)={&(0x7f0000553ff8), 0x8}) 21:25:39 executing program 3: r0 = socket$inet6(0xa, 0x0, 0x0) setsockopt$inet6_MCAST_JOIN_GROUP(r0, 0x29, 0x2a, &(0x7f0000fca000)={0x100000001, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}}}}, 0x88) setsockopt$inet6_group_source_req(r0, 0x29, 0x2b, &(0x7f0000a83000)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}}}, {{0xa, 0x0, 0x0, @dev={0xfe, 0x80}}}}, 0x108) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x30, &(0x7f0000000000)={0x1, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}}}, 0x0, 0x1, [{{0xa, 0x0, 0x0, @loopback={0x0, 0x1}}}]}, 0x110) 21:25:39 executing program 2: syz_mount_image$gfs2(&(0x7f0000000040)='gfs2\x00', &(0x7f0000001740)='./file0\x00', 0xfffffdfd, 0x0, &(0x7f0000001680), 0x0, &(0x7f0000000880)=ANY=[@ANYBLOB='l']) 21:25:39 executing program 6: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r0) memfd_create(&(0x7f0000000140)=':keyringposix_acl_access^@}\x00', 0x3) r1 = dup2(r0, r0) ioctl$RTC_SET_TIME(r1, 0x4024700a, &(0x7f00000000c0)={0x3a, 0x33, 0x6, 0x9, 0x0, 0x0, 0x6, 0x131, 0xffffffffffffffff}) r2 = creat(&(0x7f0000000040)='./bus\x00', 0x0) r3 = creat(&(0x7f0000000200)='./bus\x00', 0x0) r4 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000240)='/dev/snapshot\x00', 0x101000, 0x0) ftruncate(r3, 0x8000001) fcntl$setstatus(r4, 0x4, 0x4c00) r5 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) sendfile(r2, r5, &(0x7f0000d83ff8), 0x8000fffffffe) 21:25:39 executing program 4: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) name_to_handle_at(r0, &(0x7f0000000300)='\x00', &(0x7f0000000200)={0x7e, 0x0, "a684405d6d555cb163a08e5e667c56e7fe548757c7fbaa71613db2ae0c31ca6373d891d235c367fc54c3b8a8aa24ef5f1cce0ee73ea144d2ec903a701346f0f8dcd1fc6290187762365a36372a8e5e7a1b47110718c5ad5f039d52dcb5dc9b0ca2f48c168d6db0915994dce34788d12ed958eedff287"}, &(0x7f0000000100), 0x1000) 21:25:39 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000deb000)={0x2, 0x3, @broadcast=0xffffffff}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f00006dc000)=[{0x6, 0x0, 0x0, 0xa1}]}, 0x10) sendto$inet(r0, &(0x7f00000001c0), 0x0, 0x200007ff, &(0x7f0000deaff0)={0x2, 0x3, @loopback=0x7f000001}, 0x10) sendto$inet(r0, &(0x7f00000002c0)="20d6dac772b6f65cc7c3fc9bf8d917fbd5bd28cd6ad9243ec3c3fc41fe4295b32b630b3e888a8d0eb1abd9d081c0c6655507c293ed17dcc8e25f2cb85d0e732ff34d9f574cdd31597a5e3a688fff4a8f31474711e4b8f7ab05068770f885c03286fadc1d0fd02098bd981aaf152f2da86443cc605a5cb9a63475b63d354cb1f158bd", 0x82, 0x1, &(0x7f0000000200)={0x2, 0x0, @dev={0xac, 0x14, 0x14}}, 0x10) sendto$inet(r0, &(0x7f0000000240)='h', 0x1, 0x0, &(0x7f00000001c0)={0x2, 0x0, @loopback=0x7f000001}, 0x10) recvfrom(r0, &(0x7f0000000380)=""/239, 0xff4e, 0x0, 0x0, 0x307) close(r0) 21:25:39 executing program 1: mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x1, 0x32, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000002000)={0xaa}) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000001000)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r1 = creat(&(0x7f0000000180)='./bus\x00', 0x0) write$eventfd(r1, &(0x7f0000000080), 0xfffffe5e) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x2, 0x32, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000100)='clear_refs\x00') mremap(&(0x7f0000a96000/0x1000)=nil, 0x1000, 0x800000, 0x3, &(0x7f0000130000/0x800000)=nil) ioctl$UFFDIO_ZEROPAGE(r0, 0x8010aa02, &(0x7f00000c0ff0)={{&(0x7f0000000000/0x400000)=nil, 0x400000}}) 21:25:39 executing program 4: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) name_to_handle_at(r0, &(0x7f0000000300)='\x00', &(0x7f0000000200)={0x7e, 0x0, "a684405d6d555cb163a08e5e667c56e7fe548757c7fbaa71613db2ae0c31ca6373d891d235c367fc54c3b8a8aa24ef5f1cce0ee73ea144d2ec903a701346f0f8dcd1fc6290187762365a36372a8e5e7a1b47110718c5ad5f039d52dcb5dc9b0ca2f48c168d6db0915994dce34788d12ed958eedff287"}, &(0x7f0000000100), 0x1000) [ 250.151394] gfs2: invalid mount option: l [ 250.155667] gfs2: can't parse mount arguments 21:25:39 executing program 0: syz_open_dev$sndseq(&(0x7f0000000000)='/dev/snd/seq\x00', 0x0, 0x0) userfaultfd(0x0) syz_open_dev$mice(&(0x7f0000000100)='/dev/input/mice\x00', 0x0, 0x0) pselect6(0x40, &(0x7f00000abfc0)={0x3ffffd}, &(0x7f0000768000), &(0x7f00007fbfc0)={0x0, 0x8000000}, &(0x7f0000f22000)={0x0, 0x989680}, &(0x7f0000f14000)={&(0x7f0000553ff8), 0x8}) 21:25:39 executing program 6: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r0) memfd_create(&(0x7f0000000140)=':keyringposix_acl_access^@}\x00', 0x3) r1 = dup2(r0, r0) ioctl$RTC_SET_TIME(r1, 0x4024700a, &(0x7f00000000c0)={0x3a, 0x33, 0x6, 0x9, 0x0, 0x0, 0x6, 0x131, 0xffffffffffffffff}) r2 = creat(&(0x7f0000000040)='./bus\x00', 0x0) r3 = creat(&(0x7f0000000200)='./bus\x00', 0x0) r4 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000240)='/dev/snapshot\x00', 0x101000, 0x0) ftruncate(r3, 0x8000001) fcntl$setstatus(r4, 0x4, 0x4c00) ioctl$TIOCGSID(r1, 0x5429, &(0x7f00000001c0)=0x0) prctl$setptracer(0x59616d61, r5) r6 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) sendfile(r2, r6, &(0x7f0000d83ff8), 0x8000fffffffe) 21:25:39 executing program 3: r0 = socket$inet6(0xa, 0x0, 0x0) setsockopt$inet6_MCAST_JOIN_GROUP(r0, 0x29, 0x2a, &(0x7f0000fca000)={0x100000001, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}}}}, 0x88) setsockopt$inet6_group_source_req(r0, 0x29, 0x2b, &(0x7f0000a83000)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}}}, {{0xa, 0x0, 0x0, @dev={0xfe, 0x80}}}}, 0x108) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x30, &(0x7f0000000000)={0x1, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}}}, 0x0, 0x1, [{{0xa, 0x0, 0x0, @loopback={0x0, 0x1}}}]}, 0x110) [ 250.221662] gfs2: invalid mount option: l [ 250.225917] gfs2: can't parse mount arguments [ 250.309689] hfsplus: unable to find HFS+ superblock 21:25:39 executing program 4: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) name_to_handle_at(r0, &(0x7f0000000300)='\x00', &(0x7f0000000200)={0x80, 0x0, "a684405d6d555cb163a08e5e667c56e7fe548757c7fbaa71613db2ae0c31ca6373d891d235c367fc54c3b8a8aa24ef5f1cce0ee73ea144d2ec903a701346f0f8dcd1fc6290187762365a36372a8e5e7a1b47110718c5ad5f039d52dcb5dc9b0ca2f48c168d6db0915994dce34788d12ed958eedff287ce0e"}, &(0x7f0000000100), 0x1000) 21:25:39 executing program 2: syz_mount_image$gfs2(&(0x7f0000000040)='gfs2\x00', &(0x7f0000001740)='./file0\x00', 0x1000000000, 0x0, &(0x7f0000001680), 0x0, &(0x7f0000000880)=ANY=[@ANYBLOB='l']) 21:25:39 executing program 5: 21:25:39 executing program 7: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$hfsplus(&(0x7f0000000040)='hfsplus\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x2000000000000000, &(0x7f0000000300), 0x0, &(0x7f0000000380)) 21:25:39 executing program 0: syz_open_dev$sndseq(&(0x7f0000000000)='/dev/snd/seq\x00', 0x0, 0x0) userfaultfd(0x0) syz_open_dev$mice(&(0x7f0000000100)='/dev/input/mice\x00', 0x0, 0x0) pselect6(0x40, &(0x7f00000abfc0)={0x3ffffd}, &(0x7f0000768000), &(0x7f00007fbfc0)={0x0, 0x8}, &(0x7f0000f22000)={0x0, 0x989680}, &(0x7f0000f14000)={&(0x7f0000553ff8), 0x8}) 21:25:39 executing program 3: r0 = socket$inet6(0xa, 0x0, 0x0) setsockopt$inet6_MCAST_JOIN_GROUP(r0, 0x29, 0x2a, &(0x7f0000fca000)={0x100000001, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}}}}, 0x88) setsockopt$inet6_group_source_req(r0, 0x29, 0x2b, &(0x7f0000a83000)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}}}, {{0xa, 0x0, 0x0, @dev={0xfe, 0x80}}}}, 0x108) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x30, &(0x7f0000000000)={0x1, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}}}, 0x0, 0x1, [{{0xa, 0x0, 0x0, @loopback={0x0, 0x1}}}]}, 0x110) 21:25:39 executing program 6: 21:25:39 executing program 4: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) name_to_handle_at(r0, &(0x7f0000000300)='\x00', &(0x7f0000000200)={0x80, 0x0, "a684405d6d555cb163a08e5e667c56e7fe548757c7fbaa71613db2ae0c31ca6373d891d235c367fc54c3b8a8aa24ef5f1cce0ee73ea144d2ec903a701346f0f8dcd1fc6290187762365a36372a8e5e7a1b47110718c5ad5f039d52dcb5dc9b0ca2f48c168d6db0915994dce34788d12ed958eedff287ce0e"}, &(0x7f0000000100), 0x1000) 21:25:39 executing program 5: 21:25:39 executing program 6: [ 250.433268] gfs2: invalid mount option: l [ 250.437534] gfs2: can't parse mount arguments 21:25:39 executing program 2: syz_mount_image$gfs2(&(0x7f0000000040)='gfs2\x00', &(0x7f0000001740)='./file0\x00', 0xffffffe0, 0x0, &(0x7f0000001680), 0x0, &(0x7f0000000880)=ANY=[@ANYBLOB='l']) [ 250.577438] gfs2: invalid mount option: l [ 250.581687] gfs2: can't parse mount arguments [ 250.587868] hfsplus: unable to find HFS+ superblock [ 250.657850] gfs2: invalid mount option: l [ 250.662085] gfs2: can't parse mount arguments 21:25:40 executing program 1: 21:25:40 executing program 0: syz_open_dev$sndseq(&(0x7f0000000000)='/dev/snd/seq\x00', 0x0, 0x0) userfaultfd(0x0) syz_open_dev$mice(&(0x7f0000000100)='/dev/input/mice\x00', 0x0, 0x0) pselect6(0x40, &(0x7f00000abfc0)={0x3ffffd}, &(0x7f0000768000), &(0x7f00007fbfc0)={0x0, 0x60}, &(0x7f0000f22000)={0x0, 0x989680}, &(0x7f0000f14000)={&(0x7f0000553ff8), 0x8}) 21:25:40 executing program 5: 21:25:40 executing program 6: 21:25:40 executing program 4: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) name_to_handle_at(r0, &(0x7f0000000300)='\x00', &(0x7f0000000200)={0x80, 0x0, "a684405d6d555cb163a08e5e667c56e7fe548757c7fbaa71613db2ae0c31ca6373d891d235c367fc54c3b8a8aa24ef5f1cce0ee73ea144d2ec903a701346f0f8dcd1fc6290187762365a36372a8e5e7a1b47110718c5ad5f039d52dcb5dc9b0ca2f48c168d6db0915994dce34788d12ed958eedff287ce0e"}, &(0x7f0000000100), 0x1000) 21:25:40 executing program 3: r0 = socket$inet6(0xa, 0x80001, 0x0) setsockopt$inet6_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x29, 0x2a, &(0x7f0000fca000)={0x100000001, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}}}}, 0x88) setsockopt$inet6_group_source_req(r0, 0x29, 0x2b, &(0x7f0000a83000)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}}}, {{0xa, 0x0, 0x0, @dev={0xfe, 0x80}}}}, 0x108) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x30, &(0x7f0000000000)={0x1, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}}}, 0x0, 0x1, [{{0xa, 0x0, 0x0, @loopback={0x0, 0x1}}}]}, 0x110) 21:25:40 executing program 7: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$hfsplus(&(0x7f0000000040)='hfsplus\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x900000000000000, &(0x7f0000000300), 0x0, &(0x7f0000000380)) 21:25:40 executing program 2: syz_mount_image$gfs2(&(0x7f0000000040)='gfs2\x00', &(0x7f0000001740)='./file0\x00', 0x970, 0x0, &(0x7f0000001680), 0x0, &(0x7f0000000880)=ANY=[@ANYBLOB='l']) 21:25:40 executing program 1: 21:25:40 executing program 1: 21:25:40 executing program 1: 21:25:40 executing program 4: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) name_to_handle_at(r0, &(0x7f0000000300)='\x00', &(0x7f0000000200)={0x81, 0x0, "a684405d6d555cb163a08e5e667c56e7fe548757c7fbaa71613db2ae0c31ca6373d891d235c367fc54c3b8a8aa24ef5f1cce0ee73ea144d2ec903a701346f0f8dcd1fc6290187762365a36372a8e5e7a1b47110718c5ad5f039d52dcb5dc9b0ca2f48c168d6db0915994dce34788d12ed958eedff287ce0e53"}, &(0x7f0000000100), 0x0) 21:25:40 executing program 5: 21:25:40 executing program 6: 21:25:40 executing program 1: 21:25:40 executing program 3: r0 = socket$inet6(0xa, 0x80001, 0x0) setsockopt$inet6_MCAST_JOIN_GROUP(r0, 0x29, 0x2a, &(0x7f0000fca000)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}}}}, 0x88) setsockopt$inet6_group_source_req(r0, 0x29, 0x2b, &(0x7f0000a83000)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}}}, {{0xa, 0x0, 0x0, @dev={0xfe, 0x80}}}}, 0x108) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x30, &(0x7f0000000000)={0x1, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}}}, 0x0, 0x1, [{{0xa, 0x0, 0x0, @loopback={0x0, 0x1}}}]}, 0x110) [ 251.178738] gfs2: invalid mount option: l [ 251.183000] gfs2: can't parse mount arguments 21:25:40 executing program 1: 21:25:40 executing program 0: syz_open_dev$sndseq(&(0x7f0000000000)='/dev/snd/seq\x00', 0x0, 0x0) userfaultfd(0x0) syz_open_dev$mice(&(0x7f0000000100)='/dev/input/mice\x00', 0x0, 0x0) pselect6(0x40, &(0x7f00000abfc0)={0x3ffffd}, &(0x7f0000768000), &(0x7f00007fbfc0)={0x0, 0x1600000000000000}, &(0x7f0000f22000)={0x0, 0x989680}, &(0x7f0000f14000)={&(0x7f0000553ff8), 0x8}) 21:25:40 executing program 1: 21:25:40 executing program 1: 21:25:40 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000deb000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14}}, 0x10) sendto$inet(r0, &(0x7f0000000140), 0x0, 0x20000802, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) [ 251.278904] gfs2: invalid mount option: l [ 251.283218] gfs2: can't parse mount arguments [ 251.294996] hfsplus: unable to find HFS+ superblock 21:25:40 executing program 2: syz_mount_image$gfs2(&(0x7f0000000040)='gfs2\x00', &(0x7f0000001740)='./file0\x00', 0xf6ffffff, 0x0, &(0x7f0000001680), 0x0, &(0x7f0000000880)=ANY=[@ANYBLOB='l']) 21:25:40 executing program 7: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$hfsplus(&(0x7f0000000040)='hfsplus\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x3f00, &(0x7f0000000300), 0x0, &(0x7f0000000380)) 21:25:40 executing program 5: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f00000001c0), 0xfffffef3) vmsplice(r1, &(0x7f0000000180)=[{&(0x7f0000000140)}], 0x1, 0x0) read(r0, &(0x7f0000000200)=""/250, 0x50c7e3e3) 21:25:40 executing program 4: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) name_to_handle_at(r0, &(0x7f0000000300)='\x00', &(0x7f0000000200)={0x81, 0x0, "a684405d6d555cb163a08e5e667c56e7fe548757c7fbaa71613db2ae0c31ca6373d891d235c367fc54c3b8a8aa24ef5f1cce0ee73ea144d2ec903a701346f0f8dcd1fc6290187762365a36372a8e5e7a1b47110718c5ad5f039d52dcb5dc9b0ca2f48c168d6db0915994dce34788d12ed958eedff287ce0e53"}, &(0x7f0000000100), 0x0) 21:25:40 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") capget(&(0x7f00000001c0), &(0x7f0000000200)) 21:25:40 executing program 3: r0 = socket$inet6(0xa, 0x80001, 0x0) setsockopt$inet6_MCAST_JOIN_GROUP(r0, 0x29, 0x2a, &(0x7f0000fca000)={0x100000001, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}}}}, 0x88) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x2b, &(0x7f0000a83000)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}}}, {{0xa, 0x0, 0x0, @dev={0xfe, 0x80}}}}, 0x108) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x30, &(0x7f0000000000)={0x1, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}}}, 0x0, 0x1, [{{0xa, 0x0, 0x0, @loopback={0x0, 0x1}}}]}, 0x110) 21:25:40 executing program 0: syz_open_dev$sndseq(&(0x7f0000000000)='/dev/snd/seq\x00', 0x0, 0x0) userfaultfd(0x0) syz_open_dev$mice(&(0x7f0000000100)='/dev/input/mice\x00', 0x0, 0x0) pselect6(0x40, &(0x7f00000abfc0)={0x3ffffd}, &(0x7f0000768000), &(0x7f00007fbfc0)={0x0, 0x16000000}, &(0x7f0000f22000)={0x0, 0x989680}, &(0x7f0000f14000)={&(0x7f0000553ff8), 0x8}) [ 251.437581] gfs2: invalid mount option: l [ 251.441824] gfs2: can't parse mount arguments 21:25:40 executing program 4: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) name_to_handle_at(r0, &(0x7f0000000300)='\x00', &(0x7f0000000200)={0x81, 0x0, "a684405d6d555cb163a08e5e667c56e7fe548757c7fbaa71613db2ae0c31ca6373d891d235c367fc54c3b8a8aa24ef5f1cce0ee73ea144d2ec903a701346f0f8dcd1fc6290187762365a36372a8e5e7a1b47110718c5ad5f039d52dcb5dc9b0ca2f48c168d6db0915994dce34788d12ed958eedff287ce0e53"}, &(0x7f0000000100), 0x0) 21:25:40 executing program 6: socket$packet(0x11, 0x3, 0x300) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev={0xfe, 0x80}, 0x4}, 0x1c) sendto$inet6(r0, &(0x7f0000000300), 0xfdb8, 0x4008080, &(0x7f00000000c0)={0xa, 0x4e23, 0x0, @ipv4={[], [0xff, 0xff], @multicast2=0xe0000002}}, 0x1c) socket$packet(0x11, 0x2, 0x300) sendmmsg(r0, &(0x7f00000092c0), 0x4ff, 0x0) 21:25:40 executing program 3: r0 = socket$inet6(0xa, 0x80001, 0x0) setsockopt$inet6_MCAST_JOIN_GROUP(r0, 0x29, 0x2a, &(0x7f0000fca000)={0x100000001, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}}}}, 0x88) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x2b, &(0x7f0000a83000)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}}}, {{0xa, 0x0, 0x0, @dev={0xfe, 0x80}}}}, 0x108) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x30, &(0x7f0000000000)={0x1, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}}}, 0x0, 0x1, [{{0xa, 0x0, 0x0, @loopback={0x0, 0x1}}}]}, 0x110) 21:25:40 executing program 2: syz_mount_image$gfs2(&(0x7f0000000040)='gfs2\x00', &(0x7f0000001740)='./file0\x00', 0x6800, 0x0, &(0x7f0000001680), 0x0, &(0x7f0000000880)=ANY=[@ANYBLOB='l']) 21:25:40 executing program 4: r0 = memfd_create(&(0x7f00000002c0)="bcf6", 0x0) write(r0, &(0x7f0000000300)="6963e64243ea486da3a74e3deec6fc5bb9650b5de56946c568f95d22467190ba406d59a5958d6f156c9c8a2ac4677b00000000000000000000200000f8bf", 0x3e) write$cgroup_pid(r0, &(0x7f0000000140), 0x3) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x1, 0x10, 0xffffffffffffffff, 0x0) umount2(&(0x7f0000000040)='./file0\x00', 0x0) [ 251.599719] hfsplus: unable to find HFS+ superblock 21:25:40 executing program 0: syz_open_dev$sndseq(&(0x7f0000000000)='/dev/snd/seq\x00', 0x0, 0x0) userfaultfd(0x0) syz_open_dev$mice(&(0x7f0000000100)='/dev/input/mice\x00', 0x0, 0x0) pselect6(0x40, &(0x7f00000abfc0)={0x3ffffd}, &(0x7f0000768000), &(0x7f00007fbfc0)={0x0, 0x1600}, &(0x7f0000f22000)={0x0, 0x989680}, &(0x7f0000f14000)={&(0x7f0000553ff8), 0x8}) 21:25:40 executing program 3: r0 = socket$inet6(0xa, 0x80001, 0x0) setsockopt$inet6_MCAST_JOIN_GROUP(r0, 0x29, 0x2a, &(0x7f0000fca000)={0x100000001, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}}}}, 0x88) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x2b, &(0x7f0000a83000)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}}}, {{0xa, 0x0, 0x0, @dev={0xfe, 0x80}}}}, 0x108) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x30, &(0x7f0000000000)={0x1, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}}}, 0x0, 0x1, [{{0xa, 0x0, 0x0, @loopback={0x0, 0x1}}}]}, 0x110) [ 251.641606] gfs2: invalid mount option: l [ 251.646056] gfs2: can't parse mount arguments 21:25:40 executing program 7: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$hfsplus(&(0x7f0000000040)='hfsplus\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x2300000000000000, &(0x7f0000000300), 0x0, &(0x7f0000000380)) [ 251.734690] gfs2: invalid mount option: l [ 251.739029] gfs2: can't parse mount arguments [ 251.822997] hfsplus: unable to find HFS+ superblock 21:25:41 executing program 1: 21:25:41 executing program 4: nanosleep(&(0x7f0000000000), &(0x7f0000000080)) 21:25:41 executing program 0: syz_open_dev$sndseq(&(0x7f0000000000)='/dev/snd/seq\x00', 0x0, 0x0) userfaultfd(0x0) syz_open_dev$mice(&(0x7f0000000100)='/dev/input/mice\x00', 0x0, 0x0) pselect6(0x40, &(0x7f00000abfc0)={0x3ffffd}, &(0x7f0000768000), &(0x7f00007fbfc0)={0x0, 0x0, 0x8000000}, &(0x7f0000f22000)={0x0, 0x989680}, &(0x7f0000f14000)={&(0x7f0000553ff8), 0x8}) 21:25:41 executing program 5: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup\x00', 0x200002, 0x0) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r2 = openat$cgroup_int(r0, &(0x7f00000002c0)='pids.max\x00', 0x2, 0x0) write$cgroup_int(r2, &(0x7f0000000100)=0x4c9, 0x12) 21:25:41 executing program 6: 21:25:41 executing program 2: syz_mount_image$gfs2(&(0x7f0000000040)='gfs2\x00', &(0x7f0000001740)='./file0\x00', 0xfffffff6, 0x0, &(0x7f0000001680), 0x0, &(0x7f0000000880)=ANY=[@ANYBLOB='l']) 21:25:41 executing program 3: r0 = socket$inet6(0xa, 0x80001, 0x0) setsockopt$inet6_MCAST_JOIN_GROUP(r0, 0x29, 0x2a, &(0x7f0000fca000)={0x100000001, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}}}}, 0x88) setsockopt$inet6_group_source_req(r0, 0x29, 0x0, &(0x7f0000a83000)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}}}, {{0xa, 0x0, 0x0, @dev={0xfe, 0x80}}}}, 0x108) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x30, &(0x7f0000000000)={0x1, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}}}, 0x0, 0x1, [{{0xa, 0x0, 0x0, @loopback={0x0, 0x1}}}]}, 0x110) 21:25:41 executing program 7: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$hfsplus(&(0x7f0000000040)='hfsplus\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0xffffff7f, &(0x7f0000000300), 0x0, &(0x7f0000000380)) 21:25:41 executing program 1: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup\x00', 0x200002, 0x0) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r2 = openat$cgroup_int(r0, &(0x7f0000000000)='memory.high\x00', 0x2, 0x0) write$cgroup_int(r2, &(0x7f0000000100)=0x4c9, 0x12) [ 252.331506] gfs2: invalid mount option: l [ 252.335799] gfs2: can't parse mount arguments [ 252.337504] ================================================================== [ 252.347814] BUG: KASAN: slab-out-of-bounds in find_first_bit+0xf7/0x100 [ 252.354582] Read of size 8 at addr ffff8801d69e7b90 by task syz-executor1/21242 [ 252.362032] [ 252.363677] CPU: 0 PID: 21242 Comm: syz-executor1 Not tainted 4.18.0-rc3-next-20180706+ #1 [ 252.372085] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 21:25:41 executing program 3: r0 = socket$inet6(0xa, 0x80001, 0x0) setsockopt$inet6_MCAST_JOIN_GROUP(r0, 0x29, 0x2a, &(0x7f0000fca000)={0x100000001, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}}}}, 0x88) setsockopt$inet6_group_source_req(r0, 0x29, 0x0, &(0x7f0000a83000)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}}}, {{0xa, 0x0, 0x0, @dev={0xfe, 0x80}}}}, 0x108) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x30, &(0x7f0000000000)={0x1, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}}}, 0x0, 0x1, [{{0xa, 0x0, 0x0, @loopback={0x0, 0x1}}}]}, 0x110) 21:25:41 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x4) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000040)="580000001400192340834b80040d8c5602062200010400004001000000005800004824ca944f64009400050028825a003b5fbe907902008000f0fffefffffe03edf8fef5dd00000010000100000c0900fcff4d00040e05a5", 0x58}], 0x1) 21:25:41 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu\x00', 0x200002, 0x0) r2 = openat$cgroup_int(r1, &(0x7f00000001c0)='cgroup.clone_children\x00', 0x2, 0x0) write$cgroup_int(r2, &(0x7f0000000140)=0xfffffffffffffffe, 0x12) [ 252.381512] Call Trace: [ 252.384189] dump_stack+0x1c9/0x2b4 [ 252.387874] ? dump_stack_print_info.cold.2+0x52/0x52 [ 252.393082] ? printk+0xa7/0xcf [ 252.396394] ? kmsg_dump_rewind_nolock+0xe4/0xe4 [ 252.401175] ? find_first_bit+0xf7/0x100 [ 252.405442] print_address_description+0x6c/0x20b [ 252.410321] ? find_first_bit+0xf7/0x100 [ 252.414407] kasan_report.cold.7+0x242/0x30d [ 252.418842] __asan_report_load8_noabort+0x14/0x20 [ 252.423791] find_first_bit+0xf7/0x100 [ 252.427773] shrink_slab+0x5d0/0xdb0 [ 252.431521] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 252.437109] ? unregister_memcg_shrinker.isra.39+0x50/0x50 [ 252.442872] ? shrink_active_list+0x1830/0x1830 [ 252.447581] ? zap_class+0x740/0x740 [ 252.451345] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 252.456919] ? ring_buffer_record_is_on+0xe1/0x130 [ 252.461873] ? ring_buffer_nest_end+0xb0/0xb0 [ 252.466415] shrink_node+0x429/0x16a0 [ 252.470257] ? shrink_node_memcg+0x18f0/0x18f0 [ 252.474864] ? kvm_clock_read+0x25/0x30 [ 252.478871] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 252.483920] ? ktime_get_raw_ts64+0x4f0/0x4f0 [ 252.488475] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 252.493653] do_try_to_free_pages+0x3e7/0x1290 [ 252.498268] ? shrink_node+0x16a0/0x16a0 [ 252.502398] ? check_same_owner+0x340/0x340 [ 252.506745] ? trace_hardirqs_on+0x10/0x10 [ 252.510999] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 252.516564] ? _parse_integer+0x13b/0x190 [ 252.520751] try_to_free_mem_cgroup_pages+0x49d/0xc90 [ 252.526125] ? pointer_string+0x1b0/0x1b0 21:25:41 executing program 4: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_mreq(r0, 0x29, 0x14, &(0x7f00000003c0)={@mcast1={0xff, 0x1, [], 0x1}}, 0x14) 21:25:41 executing program 5: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup\x00', 0x200002, 0x0) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r2 = openat$cgroup_int(r0, &(0x7f00000002c0)='pids.max\x00', 0x2, 0x0) write$cgroup_int(r2, &(0x7f0000000100)=0x4c9, 0x12) 21:25:41 executing program 6: mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f000000a000)='./file0\x00', &(0x7f0000026ff8)='./file0\x00', &(0x7f000000c000)='ramfs\x00', 0x0, &(0x7f000000a000)) mount(&(0x7f0000d04000)='./file0\x00', &(0x7f0000903000)='./file0\x00', &(0x7f0000811ffa)='bdev\x00', 0x100000, &(0x7f0000444000)) mount(&(0x7f0000000240)='./file0\x00', &(0x7f0000d78000)='.', &(0x7f0000fdb000)='ubifs\x00', 0x1003, 0x0) mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000cbeff8)='./file0\x00', &(0x7f00005f7ffa)='ramfs\x00', 0x80000, &(0x7f0000000080)) mount(&(0x7f0000377ff8)='.', &(0x7f0000187ff8)='.', &(0x7f0000753000)='mslos\x00', 0x5010, &(0x7f00000e7000)) mount(&(0x7f0000377ff8)='.', &(0x7f0000187ff8)='.', &(0x7f0000753000)='mslos\x00', 0x5010, &(0x7f00000e7000)) [ 252.530327] ? try_to_free_pages+0xb80/0xb80 [ 252.534763] ? memparse+0x171/0x1d0 [ 252.538412] ? get_options+0x380/0x380 [ 252.542321] ? kasan_kmalloc+0xc4/0xe0 [ 252.546223] ? __kmalloc+0x14e/0x760 [ 252.549951] ? kernfs_fop_write+0x33d/0x480 [ 252.554289] ? __vfs_write+0x117/0x9f0 [ 252.558214] ? vfs_write+0x1fc/0x560 [ 252.561947] ? ksys_write+0x101/0x260 [ 252.565765] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 252.571446] ? page_counter_memparse+0xb5/0x1e0 [ 252.576140] ? page_counter_set_low+0x180/0x180 21:25:41 executing program 3: r0 = socket$inet6(0xa, 0x80001, 0x0) setsockopt$inet6_MCAST_JOIN_GROUP(r0, 0x29, 0x2a, &(0x7f0000fca000)={0x100000001, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}}}}, 0x88) setsockopt$inet6_group_source_req(r0, 0x29, 0x0, &(0x7f0000a83000)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}}}, {{0xa, 0x0, 0x0, @dev={0xfe, 0x80}}}}, 0x108) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x30, &(0x7f0000000000)={0x1, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}}}, 0x0, 0x1, [{{0xa, 0x0, 0x0, @loopback={0x0, 0x1}}}]}, 0x110) [ 252.580830] ? cgroup_control+0x180/0x180 [ 252.585006] memory_high_write+0x283/0x310 [ 252.589453] ? mem_cgroup_css_released+0x140/0x140 [ 252.594499] ? lock_acquire+0x1e4/0x540 [ 252.598498] ? __might_fault+0x12b/0x1e0 [ 252.602590] cgroup_file_write+0x31f/0x840 [ 252.606887] ? mem_cgroup_css_released+0x140/0x140 [ 252.611871] ? cgroup_migrate_add_task+0xcd0/0xcd0 [ 252.616835] ? cgroup_migrate_add_task+0xcd0/0xcd0 [ 252.621791] kernfs_fop_write+0x2ba/0x480 [ 252.625969] __vfs_write+0x117/0x9f0 [ 252.629710] ? kernfs_fop_open+0x1020/0x1020 [ 252.634141] ? kernel_read+0x120/0x120 [ 252.638053] ? lock_release+0xa30/0xa30 [ 252.642054] ? check_same_owner+0x340/0x340 [ 252.646396] ? rcu_note_context_switch+0x730/0x730 [ 252.651436] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 252.657104] ? __sb_start_write+0x17f/0x300 [ 252.661451] vfs_write+0x1fc/0x560 [ 252.665018] ksys_write+0x101/0x260 [ 252.668669] ? __ia32_sys_read+0xb0/0xb0 [ 252.672749] ? syscall_slow_exit_work+0x500/0x500 [ 252.677645] __x64_sys_write+0x73/0xb0 [ 252.681579] do_syscall_64+0x1b9/0x820 [ 252.685487] ? finish_task_switch+0x1d3/0x870 [ 252.690007] ? syscall_return_slowpath+0x5e0/0x5e0 [ 252.694959] ? syscall_return_slowpath+0x31d/0x5e0 [ 252.699940] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 252.704984] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 252.709924] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 252.715173] RIP: 0033:0x455e29 [ 252.718367] Code: 1d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 252.737682] RSP: 002b:00007f85abd96c68 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 252.745421] RAX: ffffffffffffffda RBX: 00007f85abd976d4 RCX: 0000000000455e29 [ 252.752743] RDX: 0000000000000012 RSI: 0000000020000100 RDI: 0000000000000015 [ 252.760167] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 252.767465] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000ffffffff [ 252.774767] R13: 00000000004c2e77 R14: 00000000004d4c60 R15: 0000000000000000 [ 252.782150] [ 252.783849] Allocated by task 16900: [ 252.787604] save_stack+0x43/0xd0 [ 252.791260] kasan_kmalloc+0xc4/0xe0 [ 252.795078] __kmalloc_node+0x47/0x70 [ 252.798903] kvmalloc_node+0x65/0xf0 [ 252.802637] memcg_expand_shrinker_maps+0x1b1/0x3c0 [ 252.807671] prealloc_shrinker+0x29e/0x450 [ 252.811921] alloc_super+0x8dd/0xb10 [ 252.815670] sget_userns+0x276/0x860 [ 252.819400] sget+0x10b/0x150 [ 252.822543] gfs2_mount+0x1a7/0x712 [ 252.826190] legacy_get_tree+0x118/0x440 [ 252.830279] vfs_get_tree+0x1cb/0x5c0 [ 252.834100] do_mount+0x6c1/0x1fb0 [ 252.837687] ksys_mount+0x12d/0x140 [ 252.841379] __x64_sys_mount+0xbe/0x150 [ 252.845804] do_syscall_64+0x1b9/0x820 [ 252.849715] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 252.854910] [ 252.856537] Freed by task 4481: [ 252.859811] save_stack+0x43/0xd0 [ 252.863375] __kasan_slab_free+0x11a/0x170 [ 252.867607] kasan_slab_free+0xe/0x10 [ 252.871418] kfree+0xd9/0x260 [ 252.874529] memcg_destroy_list_lru_node.isra.9+0xaf/0x100 [ 252.880177] list_lru_destroy+0x2ac/0x500 [ 252.884374] deactivate_locked_super+0xa3/0x100 [ 252.889066] deactivate_super+0x2bb/0x320 [ 252.893237] cleanup_mnt+0xbf/0x160 [ 252.896880] __cleanup_mnt+0x16/0x20 [ 252.900595] task_work_run+0x1ec/0x2a0 [ 252.904491] exit_to_usermode_loop+0x313/0x370 [ 252.909083] do_syscall_64+0x6be/0x820 [ 252.912960] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 252.918134] [ 252.919776] The buggy address belongs to the object at ffff8801d69e7b80 [ 252.919776] which belongs to the cache kmalloc-32 of size 32 [ 252.932265] The buggy address is located 16 bytes inside of [ 252.932265] 32-byte region [ffff8801d69e7b80, ffff8801d69e7ba0) [ 252.943969] The buggy address belongs to the page: [ 252.948905] page:ffffea00075a79c0 count:1 mapcount:0 mapping:ffff8801da8001c0 index:0xffff8801d69e7fc1 [ 252.958382] flags: 0x2fffc0000000100(slab) [ 252.963414] raw: 02fffc0000000100 ffffea00075a7308 ffffea00075d7648 ffff8801da8001c0 [ 252.971304] raw: ffff8801d69e7fc1 ffff8801d69e7000 000000010000001d 0000000000000000 [ 252.979192] page dumped because: kasan: bad access detected [ 252.984917] [ 252.986542] Memory state around the buggy address: [ 252.991471] ffff8801d69e7a80: fb fb fb fb fc fc fc fc fb fb fb fb fc fc fc fc [ 252.998841] ffff8801d69e7b00: 00 00 00 fc fc fc fc fc 00 00 fc fc fc fc fc fc [ 253.006196] >ffff8801d69e7b80: 00 00 06 fc fc fc fc fc fb fb fb fb fc fc fc fc [ 253.014262] ^ [ 253.018158] ffff8801d69e7c00: fb fb fb fb fc fc fc fc 00 00 00 fc fc fc fc fc [ 253.025518] ffff8801d69e7c80: 00 00 00 fc fc fc fc fc 00 00 00 fc fc fc fc fc [ 253.032966] ================================================================== [ 253.040795] Kernel panic - not syncing: panic_on_warn set ... [ 253.040795] [ 253.048200] CPU: 0 PID: 21242 Comm: syz-executor1 Tainted: G B 4.18.0-rc3-next-20180706+ #1 [ 253.058010] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 253.067374] Call Trace: [ 253.069971] dump_stack+0x1c9/0x2b4 [ 253.073615] ? dump_stack_print_info.cold.2+0x52/0x52 [ 253.078805] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 253.083562] panic+0x238/0x4e7 [ 253.086951] ? add_taint.cold.5+0x16/0x16 [ 253.091100] ? do_raw_spin_unlock+0xa7/0x2f0 [ 253.095520] ? find_first_bit+0xf7/0x100 [ 253.099592] kasan_end_report+0x47/0x4f [ 253.103578] kasan_report.cold.7+0x76/0x30d [ 253.108179] __asan_report_load8_noabort+0x14/0x20 [ 253.113113] find_first_bit+0xf7/0x100 [ 253.116997] shrink_slab+0x5d0/0xdb0 [ 253.120718] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 253.126271] ? unregister_memcg_shrinker.isra.39+0x50/0x50 [ 253.131915] ? shrink_active_list+0x1830/0x1830 [ 253.136606] ? zap_class+0x740/0x740 [ 253.140365] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 253.145933] ? ring_buffer_record_is_on+0xe1/0x130 [ 253.150888] ? ring_buffer_nest_end+0xb0/0xb0 [ 253.155405] shrink_node+0x429/0x16a0 [ 253.159225] ? shrink_node_memcg+0x18f0/0x18f0 [ 253.163800] ? kvm_clock_read+0x25/0x30 [ 253.167782] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 253.172813] ? ktime_get_raw_ts64+0x4f0/0x4f0 [ 253.177330] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 253.182356] do_try_to_free_pages+0x3e7/0x1290 [ 253.186941] ? shrink_node+0x16a0/0x16a0 [ 253.191002] ? check_same_owner+0x340/0x340 [ 253.195332] ? trace_hardirqs_on+0x10/0x10 [ 253.199584] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 253.205116] ? _parse_integer+0x13b/0x190 [ 253.209280] try_to_free_mem_cgroup_pages+0x49d/0xc90 [ 253.214471] ? pointer_string+0x1b0/0x1b0 [ 253.218625] ? try_to_free_pages+0xb80/0xb80 [ 253.223129] ? memparse+0x171/0x1d0 [ 253.226755] ? get_options+0x380/0x380 [ 253.230641] ? kasan_kmalloc+0xc4/0xe0 [ 253.234608] ? __kmalloc+0x14e/0x760 [ 253.238330] ? kernfs_fop_write+0x33d/0x480 [ 253.242643] ? __vfs_write+0x117/0x9f0 [ 253.246532] ? vfs_write+0x1fc/0x560 [ 253.250240] ? ksys_write+0x101/0x260 [ 253.254041] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 253.259573] ? page_counter_memparse+0xb5/0x1e0 [ 253.264234] ? page_counter_set_low+0x180/0x180 [ 253.268895] ? cgroup_control+0x180/0x180 [ 253.273053] memory_high_write+0x283/0x310 [ 253.277286] ? mem_cgroup_css_released+0x140/0x140 [ 253.282221] ? lock_acquire+0x1e4/0x540 [ 253.286195] ? __might_fault+0x12b/0x1e0 [ 253.290254] cgroup_file_write+0x31f/0x840 [ 253.294494] ? mem_cgroup_css_released+0x140/0x140 [ 253.299419] ? cgroup_migrate_add_task+0xcd0/0xcd0 [ 253.304362] ? cgroup_migrate_add_task+0xcd0/0xcd0 [ 253.309283] kernfs_fop_write+0x2ba/0x480 [ 253.313429] __vfs_write+0x117/0x9f0 [ 253.317135] ? kernfs_fop_open+0x1020/0x1020 [ 253.321722] ? kernel_read+0x120/0x120 [ 253.325710] ? lock_release+0xa30/0xa30 [ 253.329689] ? check_same_owner+0x340/0x340 [ 253.334018] ? rcu_note_context_switch+0x730/0x730 [ 253.338971] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 253.344522] ? __sb_start_write+0x17f/0x300 [ 253.348857] vfs_write+0x1fc/0x560 [ 253.352408] ksys_write+0x101/0x260 [ 253.356034] ? __ia32_sys_read+0xb0/0xb0 [ 253.360088] ? syscall_slow_exit_work+0x500/0x500 [ 253.364942] __x64_sys_write+0x73/0xb0 [ 253.368829] do_syscall_64+0x1b9/0x820 [ 253.373326] ? finish_task_switch+0x1d3/0x870 [ 253.377814] ? syscall_return_slowpath+0x5e0/0x5e0 [ 253.382748] ? syscall_return_slowpath+0x31d/0x5e0 [ 253.387681] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 253.392718] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 253.397577] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 253.402758] RIP: 0033:0x455e29 [ 253.406113] Code: 1d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 253.425497] RSP: 002b:00007f85abd96c68 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 253.433213] RAX: ffffffffffffffda RBX: 00007f85abd976d4 RCX: 0000000000455e29 [ 253.440514] RDX: 0000000000000012 RSI: 0000000020000100 RDI: 0000000000000015 [ 253.447783] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 253.455066] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000ffffffff [ 253.462343] R13: 00000000004c2e77 R14: 00000000004d4c60 R15: 0000000000000000 [ 253.470402] Dumping ftrace buffer: [ 253.473956] (ftrace buffer empty) [ 253.477666] Kernel Offset: disabled [ 253.481316] Rebooting in 86400 seconds..