6284cefe948c380a888ab259373ce29cde0240085e3d6b4d5a4eb6bef0e1c4534d9a3ca5f7c6de3d1203a768ccdcde170c42459650b7dce1098f36c5e775e157500399abc583cfec66543823194c7da6dc10a3a5d271596b92d5cd317a5276e9587198a543e2637a08df72c954bd01503c009aa2ab5169046091bccb986ee374ed8763ff3b444d79eedac08ec0e0aa37d35e799da1c0520c8308f04aec6a36c2df424ae62223d761722b050ef51e0dbde2d68cca09a464cff6fea07aeb455d05b7a60b2d178dd7c6c1657c576c8b963525d337b94233fe4fc08ccf397ab29a67e10466c4386bc6cfe17d0fa738c5c70a5b825f2344988ca00b61ab00d1c9b6b8d44535d38940d93dc06e0f8897c69c8d8480843bdf92e68358c36013edd2069569d456c3c5fdf16499fa7ecebad641d92e0e7cb11dd86e541d252ef70a0d616e0807485bf838558c655cc4248c51223ae101609c914042146141734b981d3cee55cc8d0132c0092f672a7d93b81b12972cba49e5560116b6b6c0f8e547523277d68b95c9314a8d8aa373f3979845dd39033d6d2e31be727c3d89011f35cc4b510e0ce2813376dfa9d2c68cfa9ea9a46ff3dee40feaa2bc659f6f4b00f657b595765d435ff6a07b7ff7d5a0baf2c757554bacc607bbf51f132af649e87089c104924b2a743035f6d14c60386c539b79403238a91cd9bf10c9e725726c2ebf0f724043317afdebcb1cb8c39ced746f4dad41c5e2358d004360c2dc62b2ad306a1de57c3b8736836941bf60cb400fa9a7859e9833bc5fbe8e6bb3fbc543f2afbe5a7d84939bbdac487a1a1c7d2556b1897b6f8e10e83f0a0d2749340b4bb2436985beaffff428ca4bcb9f149baa877ab91af096d4ec3f9e0d637e1ee96e757d6e5f32686040ab343e29b95d28c5c125693eb91b21e6810d2c9619d939db0d7a9c2d3c9ce933b101abd8d075ad1b6cb3732761b1b1b5f28de2727ea0f8074d1593fce18c8427f14d1cc5451139a0bdf7a8f2951000eeb060a5db10b4a03829d53c45ddaeab014b086e0eeeea8509c91bc095620be8cb35824279da3dab25d78a5e59827c1fcc40b02183f4ed34688b3b7cf248cd0e3b1e62bac11b593d8832d17404544cf3f9c365c605c53f33ce3e436590f11d357eba34d32acd8e9a46f3aa108989045d6b27258d6fe8c2a2fd09b9ba1adcdca7d7334a4d53dcc61d4fee0c695dc1a46299291948ce9658bca2114ed1ed0542ebde870e4ea38eff27887d8e0f23ef46599ae93002a65dfceca345b7569d6dae1a7e191a885b4ee85432d22393724502771a1ed69992f2defec52c30b47e2e9d387a73f4150d1a44c04538a8a1c8f4efb3e475fbbd499dfb34b02260adbfb72b72da290803d2853ef680f2f06f7e7d2bda31393dea484e044b397e060e3f834adddcc0bd85ac97f00abbd6146ccea1458c1c41142c154066384acf7bfa5237668c096efc16c0f340ed2abf41d1f2508c2c05dc99e1b296bb142f508a27bfb01a53aeeee278f0fc0f27a4580047f7db1b9165b3b0061f8a06faeee16dea43c13321362b38ef75955b2fd1bd192cfa5e0e56a5c2fe66051678b491be3cbaaa23a3daef9a6d790baaf80b6ad37c6cb66a40c92162f1500d045a4036322414adbb2203b958779cb5a22240de530311d4210149d82b6194a378cc0dabe45c9f030156eab7252cfee2c6fe29b10995b5722e2e926145bebfb421b6ef48c0f2c3925fc8dbf382835f3b678669a92e91bfdf28186c1d0f6731bd2fae03b8a65c2e289a9f115b3e65d3042288df59b31a344bdc6c7e8edd6c965621450b766f493cce8053fa7fa92487aab5386d855f6378dbdebc8e7d578ac15cd12de0ab2268336603507adc658175f26637f43d048ccf046e5c1c9eb75df166db8219f1bf1995aa03c3e6c6e8f629e05c362bd27840c66dc0e00061e74cbce362c9c3ba0d390c75c76d4a75077dc0815e5400e66333400ef7179c9d5460723f4addc749ad380c5dd39fbf8456351b1d9b9ea033e042ae9eb2198e2bdfe6e78478452049980d1eeeb1c9d87d2278b57169951cfcb84dba60a763f014d06dfa943b83a13bffda83bbb5190d1a7094624eb4493e6cd7d015b2d8b863c524842abd38542aaf61842e2d8d4296853897c380a584e1d6db3ace742a12b93031d8f7c6e2214d0c89679863e815e7f283f379b19be28b431e101230bd3437707b676d25a6e9e990e60c232f065096b7855a5c479ac8aed39b91e7b191dd81b41a50cac4f6b270724313cc524f4b38dc5c3c098956e53eef052be837ef8fdf28db150b6a479580fb4d7292fed34cea6e5efe0daf244ff483fcde2c5c01f472270fe82f563d728350718af3f1294bc58b80cc516e4e72811f49f42fe778640572345d55a623968c82a1cb866fd2d44fb963ce5b7de0a716dd63c4077cfd086e9b7c897dcbe91d26db3872f8de0481538a814a78a48d46ee74b76b90edfc7e3b700bc0a166a8f4807091ec7ed1d5db72bb3dc03acddf78327db27359502ed71ac2e6cd3a3b4cb32fc5337a3dd0cb15cadf5c2fbabec40cd256a13fdac6917b772cb143a79b678a2b4b36e2a271f99827baf4daa2d5ab10931722a5ec4b48736ea51fb7188cf59e805430caba8250a339bf19ee54ec4cd60c248d775ea9bfcdda1649f2932bce625bad3841f9688bea0f894c62bfc0a2b51adf5ec64e70ba62ca41f9205adedc05fa16eb30442fac7cd0d8a884db968d31af88dd418e614d45ea7de971332df167634038df9f33ab5e2bee685e3eb2dc4f6905c267384650d236370620b2be46a36223166f39cfe9487d76193c0bdc1fea048a0e7981eff5a11fa7ebf489c28254909bacc3c9638dbb0391a627de3d05492860b33f8a31ea630751a12445b21200c2cb8ad1620a1907543d3a9c3ea4d068afe813eddbe533bc2a9a4c56c4f6426547d23025fa8fe09f95e8c113915be5a5f6031b4b947b2a5c5e4b3f1f97db29d6bff59c51d3798edff8a63de237bd11d7755b8fff3fe5940ad36a9811b4370d99e2958c26da47bea6c05e09c3a42e0e59a57abd4a71b79dc35b8af0b98865aa8c4601ec81f654c15119509c5668f5a78bd996a8d2e1d60d2e30eb297349d148fea4f39ca994ddad862246b9f3fa8a122f56686c20168ec38a86060374c885475c4bb77754660b933b40943513cfd60d3b265e0243cc3bc35c6f8c5f4893484fa33b7514016baa3bbb2d9f743d63d7350374d990dcab41c8922e37eefbcd02d492cbc92c39af5d053a1d6a1ffda2255a29dd258f924d5f1288a2d1c6b76728c1f744e85b0bccdf668647abe5c5fb513c30d9ff3ec012f60e1b0fa1a9627a3950651688ef9a1d6a579c179b0c79ec77535c547268f5a20251a9a1df73781d8471409ca8d6cccf0afb5ee92f9a52d07943dff084d566ed6cc336d271a1b15f0bb939a5db5c60bc6a50c57d4f64938e34763ea368a6d8cd3ec72ff73807b4e25e9427df09606354327a46ee4ad97d5f95a85423316afb5253ab889d6b394d1fc9ec6edc8faa6589a179d214d269c3346b3a623ca97dc5c5216e5e7d3ab590f2acdc0851118f467279b7943518113adf217aff2c18b7a263b9f025381611a86a543f9844adb82f0f569ff38196952daeaa513d978e316480002f3b71248bd1bbe9c8bc4df495c96237a88ffebb0dd1948712c6815261dcfbc181852e32a06e887ea5cccc85c207249fb111adb5c887a07f8278c6c9c87acb08cd5eedb9bf512cff771627de43ca00bc09a5e6db7bb21ceeed2029b096b2b102c725f936865e4913de8bb120a9cff6cd0b581e9385320c44b1af3cc027f1dce6c7ae11bc6efc6fb80a353340ba7a525b1dc0d6341b3f72f3350a836e089f48e93c4db1865b8eb56d2f8aeaaf57454211f96be6a72fdd7c2d2392e99ada1c1d2764d45c058cf128def78163292b731a867387ae19901d869938b59efae4701d80a7e77f5e8b5a0b28201ff2c8c24b80103f126bf20a0c327c839601b0cdcfbed2e126fa850a5eb2f6069cf40fe39870143b70d0a6385aa8c924ee1b4f3762042594171c5d04a11ae32b4e3c9654cc87367cae25a36f0346bd8119a65c626d48ed32df499cb1968a75114e42f20377d7d042ebc90cb662768729553cb771902a1244ac76ac93e3dadee6310984bb639118890ed1defc82af8544b88befe1bcc605e91afac7f6ff6c5da9c7382b5a445b3382de491d365a73c2145ea79b355c7ca304be9f4aad38c3e334d2b3593bd8aa4347267d4cd92c07f84d1f0fbf1644b10547ccdd87588ee93566c86d46fb96876dece224c1991a259e1d9aea0a02f8b1e2b66ac0b6ce727b1ac117bffe5d38a397c7", 0x1000}], 0x3, r9) recvfrom(r7, &(0x7f0000000500)=""/96, 0x60, 0x20, &(0x7f00000005c0)=@ipx={0x4, 0x1, 0x6, "6b183128f377"}, 0x80) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000200)='./file0\x00', 0x700, 0x0, &(0x7f00000024c0), 0x100032, &(0x7f00000000c0)=ANY=[@ANYBLOB]) prctl$PR_MPX_ENABLE_MANAGEMENT(0x2b) getsockopt$inet_dccp_int(0xffffffffffffffff, 0x21, 0xf, &(0x7f0000000240), 0x0) fstat(0xffffffffffffffff, &(0x7f00000006c0)) getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, &(0x7f0000000440)={0x0, 0x80}, &(0x7f00000001c0)=0xfffffffffffffd3f) ioctl$FICLONE(r1, 0x40049409, r7) setgroups(0x3, &(0x7f0000000340)=[0x0, 0x0, 0x0]) exit_group(0x1ff) shmctl$SHM_INFO(r6, 0xe, &(0x7f0000000680)=""/47) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000940)='./file0\x00', 0x0, 0x0, 0x0, 0x1000004, 0x0) 14:18:35 executing program 1: r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/expire_quiescent_template\x00', 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000140)=@security={'security\x00', 0xe, 0x4, 0x4e0, 0x1f0, 0x320, 0x0, 0x320, 0x320, 0x438, 0x438, 0x438, 0x438, 0x438, 0x4, &(0x7f0000000100), {[{{@ipv6={@local, @local, [0x0, 0xffffff00, 0xffffffff, 0xffffff00], [0xffffffff, 0xff, 0xffffffff, 0xff], 'eql\x00', 'gretap0\x00', {}, {0xff}, 0x0, 0x7fffffff, 0x2, 0x61}, 0x0, 0x188, 0x1c8, 0x0, {}, [@common=@unspec=@conntrack2={0xc0, 'conntrack\x00', 0x2, {{@ipv4=@loopback, [0xffffffff, 0xffffffff, 0x0, 0xffffffff], @ipv4=@loopback, [0x0, 0xffffffff, 0xffffff00, 0xff000000], @ipv6=@ipv4={[], [], @remote}, [0xffffff00, 0xff000000, 0xff000000, 0xff], @ipv4=@multicast2, [0xffffffff, 0xff, 0xff0000ff], 0x3, 0x1ff, 0x4, 0x4e21, 0x4e20, 0x4e22, 0x4e20, 0x28, 0x20}, 0x1c0, 0x98}}]}, @common=@unspec=@ERROR={0x40, 'ERROR\x00', 0x0, "f650bd5c77822a55c077a2b3078812467f4ab9fefc372cf333baff203cdb"}}, {{@ipv6={@remote, @mcast2, [0xff000000, 0xffffff00, 0xffffffff, 0xff000000], [0x0, 0xff, 0xff000000, 0xffffff00], 'syzkaller0\x00', 'lo\x00', {}, {0xff}, 0x2b, 0x1, 0x2, 0x23}, 0x0, 0xf0, 0x130, 0x0, {}, [@common=@hl={0x28, 'hl\x00'}]}, @common=@inet=@TCPOPTSTRIP={0x40, 'TCPOPTSTRIP\x00', 0x0, {[0xe08d, 0x6, 0xff, 0x800, 0x2, 0x7, 0x3, 0x5]}}}, {{@uncond, 0x0, 0xf0, 0x118, 0x0, {}, [@common=@hl={0x28, 'hl\x00', 0x0, {0x3, 0x604}}]}, @common=@unspec=@STANDARD={0x28, '\x00', 0x0, 0xfffffffffffffffd}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x540) ioctl$EXT4_IOC_MIGRATE(0xffffffffffffffff, 0x6609) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000800)={0x0}, &(0x7f0000000400)=0xc) getsockopt$ARPT_SO_GET_INFO(r0, 0x0, 0x60, &(0x7f0000000740)={'filter\x00'}, &(0x7f00000007c0)=0x44) r3 = getpgrp(r2) prlimit64(r3, 0x0, &(0x7f00000004c0)={0x0, 0x7ffffd}, &(0x7f00000002c0)) lremovexattr(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000480)=@random={'trusted.', 'bpf\x00'}) ioctl$RTC_RD_TIME(r0, 0x80247009, &(0x7f0000000680)) getsockopt$inet_sctp_SCTP_PR_ASSOC_STATUS(0xffffffffffffffff, 0x84, 0x73, &(0x7f0000000280)={0x0, 0x8, 0x0, 0xe0}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r4 = syz_open_dev$amidi(&(0x7f0000000100)='/dev/amidi#\x00', 0x2, 0x800) recvfrom(r4, &(0x7f0000000500)=""/96, 0x60, 0x20, &(0x7f00000005c0)=@ipx={0x4, 0x1, 0x6, "6b183128f377"}, 0x80) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000200)='./file0\x00', 0x700, 0x0, &(0x7f00000024c0), 0x100032, &(0x7f00000000c0)=ANY=[@ANYBLOB]) getsockopt$inet6_dccp_int(r0, 0x21, 0x11, &(0x7f0000000840), &(0x7f0000000880)=0x4) prctl$PR_MPX_ENABLE_MANAGEMENT(0x2b) getsockopt$inet_dccp_int(0xffffffffffffffff, 0x21, 0xf, &(0x7f0000000240), 0x0) fstat(0xffffffffffffffff, &(0x7f00000006c0)) getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, &(0x7f0000000440)={0x0, 0x80}, &(0x7f00000001c0)=0xfffffffffffffd3f) ioctl$FICLONE(r1, 0x40049409, r4) setgroups(0x3, &(0x7f0000000340)=[0x0, 0x0, 0x0]) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, 0x0) [ 2701.094676] hfs: can't find a HFS filesystem on dev loop2 [ 2701.110141] IPVS: ftp: loaded support on port[0] = 21 [ 2701.207312] hfs: can't find a HFS filesystem on dev loop2 14:18:36 executing program 3: clone(0xc2b321c6db9081e0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 14:18:36 executing program 4: r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/expire_quiescent_template\x00', 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000140)=@security={'security\x00', 0xe, 0x4, 0x4b8, 0x1f0, 0x320, 0x0, 0x320, 0x320, 0x438, 0x438, 0x438, 0x438, 0x438, 0x4, &(0x7f0000000100), {[{{@ipv6={@local, @local, [0x0, 0x0, 0xffffffff, 0xffffff00], [0xffffffff, 0xff, 0xffffffff, 0xff], 'eql\x00', 'gretap0\x00', {}, {0xff}, 0x0, 0x7fffffff, 0x2, 0x61}, 0x0, 0x188, 0x1c8, 0x0, {}, [@common=@unspec=@conntrack2={0xc0, 'conntrack\x00', 0x2, {{@ipv4=@loopback, [0xffffffff, 0xffffffff, 0x0, 0xffffffff], @ipv4=@loopback, [0x0, 0xffffffff, 0xffffff00, 0xff000000], @ipv6=@ipv4={[], [], @remote}, [0xffffff00, 0xff000000, 0xff000000, 0xff], @ipv4=@multicast2, [0xffffffff, 0xff, 0xff0000ff], 0x3, 0x1ff, 0x4, 0x4e21, 0x4e20, 0x4e22, 0x4e20, 0x28}, 0x1c0, 0x98}}]}, @common=@unspec=@ERROR={0x40, 'ERROR\x00', 0x0, "f650bd5c77822a55c077a2b3078812467f4ab9fefc372cf333baff203cdb"}}, {{@ipv6={@remote, @mcast2, [0xff000000, 0xffffff00, 0xffffffff, 0xff000000], [0x0, 0xff, 0xff000000, 0xffffff00], 'syzkaller0\x00', 'lo\x00', {}, {}, 0x2b, 0x1, 0x2, 0x23}, 0x0, 0xc8, 0x108}, @common=@inet=@TCPOPTSTRIP={0x40, 'TCPOPTSTRIP\x00', 0x0, {[0xe08d, 0x6, 0xff, 0x800, 0x2, 0x7, 0x0, 0x5]}}}, {{@uncond, 0x0, 0xf0, 0x118, 0x0, {}, [@common=@hl={0x28, 'hl\x00', 0x0, {0x3, 0x604}}]}, @common=@unspec=@STANDARD={0x28, '\x00', 0x0, 0xfffffffffffffffd}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x518) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = getpgrp(0x0) prlimit64(r2, 0x0, &(0x7f00000004c0)={0x0, 0x7ffffd}, &(0x7f00000002c0)) lremovexattr(0x0, &(0x7f0000000480)=@random={'trusted.', 'bpf\x00'}) getsockopt$inet_sctp_SCTP_PR_ASSOC_STATUS(0xffffffffffffffff, 0x84, 0x73, &(0x7f0000000280), 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r3 = syz_open_dev$amidi(&(0x7f0000000100)='/dev/amidi#\x00', 0x2, 0x800) recvfrom(0xffffffffffffffff, 0x0, 0x0, 0x20, &(0x7f00000005c0)=@ipx={0x4, 0x1, 0x6, "6b183128f377"}, 0x80) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000200)='./file0\x00', 0x700, 0x0, &(0x7f00000024c0), 0x100032, &(0x7f00000000c0)=ANY=[@ANYBLOB]) getsockopt$inet_dccp_int(0xffffffffffffffff, 0x21, 0xf, &(0x7f0000000240), 0x0) openat$ashmem(0xffffffffffffff9c, &(0x7f0000000680)='/dev/ashmem\x00', 0x10000, 0x0) fstat(0xffffffffffffffff, &(0x7f00000006c0)) getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, &(0x7f0000000440)={0x0, 0x80}, &(0x7f00000001c0)=0xfffffffffffffd3f) ioctl$FICLONE(r1, 0x40049409, r3) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, 0x0) 14:18:36 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x3, &(0x7f0000001fd8)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x15}}, &(0x7f0000000080)="47504c049c3514bf772da07ae82e76590a36f6493ec1ab91b397e42abf1ea6cd8cd77427fc9a9e2b7165f52b4107bf0a50d899dc52d013175ddb1b2f46203c2a05b722e33e556fb2e3f39a3cde1fca53640337ec956146bdbfcb115070195631de5d21a5ea9e638c2bdb78a501ca4b6ea313d82568f9382c2c3f6faba6b4ee54793b4ed26dae3e52225029bb2ac0007f77754c3f23ceda9809b9a9684a940abcaa8cfcc7133ec422e9c83888318d41e9a493f0195fe2599651b89504f5dba14625ce2366f33d95dba92f867279cabf4aceddc85a8af7a0fa68d767ce5136b9d0d1966c499cb6bf34c2988666970000000000000000000000"}, 0x48) [ 2701.248144] EXT4-fs (sda1): re-mounted. Opts: 14:18:36 executing program 2: getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) syz_mount_image$hfs(&(0x7f0000000200)='hfs\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 14:18:36 executing program 0: r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/expire_quiescent_template\x00', 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000140)=@security={'security\x00', 0xe, 0x4, 0x4e0, 0x1f0, 0x320, 0x0, 0x320, 0x320, 0x438, 0x438, 0x438, 0x438, 0x438, 0x4, &(0x7f0000000100), {[{{@ipv6={@local, @local, [0x0, 0xffffff00, 0xffffffff, 0xffffff00], [0xffffffff, 0xff, 0xffffffff, 0xff], 'eql\x00', 'gretap0\x00', {}, {0xff}, 0x0, 0x7fffffff, 0x2, 0x61}, 0x0, 0x188, 0x1c8, 0x0, {}, [@common=@unspec=@conntrack2={0xc0, 'conntrack\x00', 0x2, {{@ipv4=@loopback, [0xffffffff, 0xffffffff, 0x0, 0xffffffff], @ipv4=@loopback, [0x0, 0xffffffff, 0xffffff00, 0xff000000], @ipv6=@ipv4={[], [], @remote}, [0xffffff00, 0xff000000, 0xff000000, 0xff], @ipv4=@multicast2, [0xffffffff, 0xff, 0xff0000ff], 0x3, 0x1ff, 0x4, 0x4e21, 0x4e20, 0x4e22, 0x4e20, 0x28, 0x20}, 0x1c0, 0x98}}]}, @common=@unspec=@ERROR={0x40, 'ERROR\x00', 0x0, "f650bd5c77822a55c077a2b3078812467f4ab9fefc372cf333baff203cdb"}}, {{@ipv6={@remote, @mcast2, [0xff000000, 0xffffff00, 0xffffffff, 0xff000000], [0x0, 0xff, 0xff000000, 0xffffff00], 'syzkaller0\x00', 'lo\x00', {}, {0xff}, 0x2b, 0x1, 0x2, 0x23}, 0x0, 0xf0, 0x130, 0x0, {}, [@common=@hl={0x28, 'hl\x00'}]}, @common=@inet=@TCPOPTSTRIP={0x40, 'TCPOPTSTRIP\x00', 0x0, {[0xe08d, 0x6, 0xff, 0x800, 0x2, 0x7, 0x3, 0x5]}}}, {{@uncond, 0x0, 0xf0, 0x118, 0x0, {}, [@common=@hl={0x28, 'hl\x00', 0x0, {0x3, 0x604}}]}, @common=@unspec=@STANDARD={0x28, '\x00', 0x0, 0xfffffffffffffffd}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x540) ioctl$EXT4_IOC_MIGRATE(0xffffffffffffffff, 0x6609) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000300)={0x0, 0x0, 0x0}, &(0x7f0000000400)=0xc) getsockopt$ARPT_SO_GET_INFO(r0, 0x0, 0x60, &(0x7f0000000740)={'filter\x00'}, &(0x7f00000007c0)=0x44) r5 = getpgrp(r2) prlimit64(r5, 0x0, &(0x7f00000004c0)={0x0, 0x7ffffd}, &(0x7f00000002c0)) lremovexattr(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000480)=ANY=[@ANYBLOB='tr\\;ted.bpf\x00']) getsockopt$inet_sctp_SCTP_PR_ASSOC_STATUS(r0, 0x84, 0x73, &(0x7f0000000880)={0x0, 0x8, 0xfffffffffffffffc, 0xe4, 0x1000}, 0x0) r6 = shmget(0x1, 0x2000, 0x8, &(0x7f0000ffd000/0x2000)=nil) prctl$PR_MPX_DISABLE_MANAGEMENT(0x2c) shmctl$IPC_SET(r6, 0x1, &(0x7f0000000800)={{0x3ff, r3, r4, r3, r4, 0xe0, 0xaa}, 0xffffffff00000000, 0x6, 0x4, 0x3, r5, r2, 0x6}) mkdir(&(0x7f0000000000)='./file0\x00', 0x40) r7 = syz_open_dev$amidi(&(0x7f0000000100)='/dev/amidi#\x00', 0x2, 0x800) r8 = add_key$user(&(0x7f00000008c0)='user\x00', &(0x7f0000000900)={'syz', 0x1}, &(0x7f0000000980)="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", 0x1000, 0xfffffffffffffffb) r9 = add_key(&(0x7f0000001b80)='dns_resolver\x00', &(0x7f0000001bc0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffff9) keyctl$instantiate_iov(0x14, r8, &(0x7f0000001b40)=[{&(0x7f0000001980)="4a447254fc56ea71b3b9a9e99bc36ee930a414863402a7624550b2bd66921e43db26230fc00fd4100c606a989a41626db059446bbe17b8d5d285b6f7d68524fe817d645a68a24d67730a2e029f7950504a3aadc8a695b43215d7df7103029433b7ed7a260b0ef4c890eeac596b7fda0ab4865968dc32ef0afc2676029dce322d652f0f32f8fe5c7b7812b614122e604f28", 0x91}, {&(0x7f0000001a40)="3b2a4de0b0236474b65091d31be2cd3407bd0e512a13af7a42beaa5e7596c020aa08d78d47ddc9a2e5657d8692c5f5c09f32da1d8b8388edf77e9acd4fbdc0946654011f5ca207167ae30080922363c4bc2969ec2cb050e570279e9d3ce7e0108c6528985231f4c6c214e48908750052b64b4b6be9896a7a5210d0bb7da30ad8045b69a63378afb31cd8bf9cd5eaf94586d29c3cb5fd8ecf775e46fc04f4313be693d0c3c1b76cca803e47aacf6e37588245e4d6ffb2744ef25ad4462826af2d65a3f5c3c233f322965d435c16442d2d4fabd61023431c4f23376e15297f400b5e81a7cba57643800e0ba10ac0b1575d4d9f0b", 0xf3}, {&(0x7f0000002640)="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", 0x1000}], 0x3, r9) recvfrom(r7, &(0x7f0000000500)=""/96, 0x60, 0x20, &(0x7f00000005c0)=@ipx={0x4, 0x1, 0x6, "6b183128f377"}, 0x80) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000200)='./file0\x00', 0x700, 0x0, &(0x7f00000024c0), 0x100032, &(0x7f00000000c0)=ANY=[@ANYBLOB]) prctl$PR_MPX_ENABLE_MANAGEMENT(0x2b) getsockopt$inet_dccp_int(0xffffffffffffffff, 0x21, 0xf, &(0x7f0000000240), 0x0) fstat(0xffffffffffffffff, &(0x7f00000006c0)) getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, &(0x7f0000000440)={0x0, 0x80}, &(0x7f00000001c0)=0xfffffffffffffd3f) ioctl$FICLONE(r1, 0x40049409, r7) setgroups(0x3, &(0x7f0000000340)=[0x0, 0x0, 0x0]) exit_group(0x1ff) shmctl$SHM_INFO(r6, 0xe, &(0x7f0000000680)=""/47) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000940)='./file0\x00', 0x0, 0x0, 0x0, 0x1000004, 0x0) 14:18:36 executing program 1: r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/expire_quiescent_template\x00', 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000140)=@security={'security\x00', 0xe, 0x4, 0x4e0, 0x1f0, 0x320, 0x0, 0x320, 0x320, 0x438, 0x438, 0x438, 0x438, 0x438, 0x4, &(0x7f0000000100), {[{{@ipv6={@local, @local, [0x0, 0xffffff00, 0xffffffff, 0xffffff00], [0xffffffff, 0xff, 0xffffffff, 0xff], 'eql\x00', 'gretap0\x00', {}, {0xff}, 0x0, 0x7fffffff, 0x2, 0x61}, 0x0, 0x188, 0x1c8, 0x0, {}, [@common=@unspec=@conntrack2={0xc0, 'conntrack\x00', 0x2, {{@ipv4=@loopback, [0xffffffff, 0xffffffff, 0x0, 0xffffffff], @ipv4=@loopback, [0x0, 0xffffffff, 0xffffff00, 0xff000000], @ipv6=@ipv4={[], [], @remote}, [0xffffff00, 0xff000000, 0xff000000, 0xff], @ipv4=@multicast2, [0xffffffff, 0xff, 0xff0000ff], 0x3, 0x1ff, 0x4, 0x4e21, 0x4e20, 0x4e22, 0x4e20, 0x28, 0x20}, 0x1c0, 0x98}}]}, @common=@unspec=@ERROR={0x40, 'ERROR\x00', 0x0, "f650bd5c77822a55c077a2b3078812467f4ab9fefc372cf333baff203cdb"}}, {{@ipv6={@remote, @mcast2, [0xff000000, 0xffffff00, 0xffffffff, 0xff000000], [0x0, 0xff, 0xff000000, 0xffffff00], 'syzkaller0\x00', 'lo\x00', {}, {0xff}, 0x2b, 0x1, 0x2, 0x23}, 0x0, 0xf0, 0x130, 0x0, {}, [@common=@hl={0x28, 'hl\x00'}]}, @common=@inet=@TCPOPTSTRIP={0x40, 'TCPOPTSTRIP\x00', 0x0, {[0xe08d, 0x6, 0xff, 0x800, 0x2, 0x7, 0x3, 0x5]}}}, {{@uncond, 0x0, 0xf0, 0x118, 0x0, {}, [@common=@hl={0x28, 'hl\x00', 0x0, {0x3, 0x604}}]}, @common=@unspec=@STANDARD={0x28, '\x00', 0x0, 0xfffffffffffffffd}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x540) ioctl$EXT4_IOC_MIGRATE(0xffffffffffffffff, 0x6609) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000300)={0x0}, &(0x7f0000000400)=0xc) getsockopt$ARPT_SO_GET_INFO(r0, 0x0, 0x60, &(0x7f0000000740)={'filter\x00'}, &(0x7f00000007c0)=0x44) r3 = getpgrp(r2) prlimit64(r3, 0x0, &(0x7f00000004c0)={0x0, 0x7ffffd}, &(0x7f00000002c0)) lremovexattr(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000480)=@random={'trusted.', 'bpf\x00'}) getsockopt$inet_sctp_SCTP_PR_ASSOC_STATUS(0xffffffffffffffff, 0x84, 0x73, &(0x7f0000000280)={0x0, 0x8, 0x0, 0xe0}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r4 = syz_open_dev$amidi(&(0x7f0000000100)='/dev/amidi#\x00', 0x2, 0x800) recvfrom(r4, &(0x7f0000000500)=""/96, 0x60, 0x20, &(0x7f00000005c0)=@ipx={0x4, 0x1, 0x6, "6b183128f377"}, 0x80) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000200)='./file0\x00', 0x700, 0x0, &(0x7f00000024c0), 0x100032, &(0x7f00000000c0)=ANY=[@ANYBLOB]) prctl$PR_MPX_ENABLE_MANAGEMENT(0x2b) getsockopt$inet_dccp_int(0xffffffffffffffff, 0x21, 0xf, &(0x7f0000000240), 0x0) fstat(0xffffffffffffffff, &(0x7f00000006c0)) getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(r0, 0x84, 0x13, &(0x7f0000000440)={0x0, 0x80}, &(0x7f00000001c0)=0x8) ioctl$FICLONE(r1, 0x40049409, r4) setgroups(0x3, &(0x7f0000000340)=[0x0, 0x0, 0x0]) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) setsockopt$XDP_UMEM_COMPLETION_RING(r4, 0x11b, 0x6, &(0x7f0000000680)=0x10, 0x4) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, 0x0) 14:18:36 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x3, &(0x7f0000001fd8)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x15}}, &(0x7f0000000080)="47504c049c3514bf772da07ae82e76590a36f6493ec1ab91b397e42abf1ea6cd8cd77427fc9a9e2b7165f52b4107bf0b50d899dc52d013175ddb1b2f46203c2a05b722e33e556fb2e3f39a3cde1fca53640337ec956146bdbfcb115070195631de5d21a5ea9e638c2bdb78a501ca4b6ea313d82568f9382c2c3f6faba6b4ee54793b4ed26dae3e52225029bb2ac0007f77754c3f23ceda9809b9a9684a940abcaa8cfcc7133ec422e9c83888318d41e9a493f0195fe2599651b89504f5dba14625ce2366f33d95dba92f867279cabf4aceddc85a8af7a0fa68d767ce5136b9d0d1966c499cb6bf34c2988666970000000000000000000000"}, 0x48) [ 2701.553129] hfs: can't find a HFS filesystem on dev loop2 [ 2701.553645] IPVS: ftp: loaded support on port[0] = 21 [ 2701.620619] hfs: can't find a HFS filesystem on dev loop2 14:18:36 executing program 2: getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) syz_mount_image$hfs(&(0x7f0000000200)='hfs\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 14:18:36 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x3, &(0x7f0000001fd8)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x15}}, &(0x7f0000000080)="47504c049c3514bf772da07ae82e76590a36f6493ec1ab91b397e42abf1ea6cd8cd77427fc9a9e2b7165f52b4107bf0850d899dc52d013075ddb1b2f46203c2a05b722e33e556fb2e3f39a3cde1fca53640337ec956146bdbfcb115070195631de5d21a5ea9e638c2bdb78a501ca4b6ea313d82568f9382c2c3f6faba6b4ee54793b4ed26dae3e52225029bb2ac0007f77754c3f23ceda9809b9a9684a940abcaa8cfcc7133ec422e9c83888318d41e9a493f0195fe2599651b89504f5dba14625ce2366f33d95dba92f867279cabf4aceddc85a8af7a0fa68d767ce5136b9d0d1966c499cb6bf34c2988666970000000000000000000000"}, 0x48) [ 2701.804713] EXT4-fs (sda1): Unrecognized mount option "./file0" or missing value [ 2701.856801] IPVS: ftp: loaded support on port[0] = 21 14:18:36 executing program 0: r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/expire_quiescent_template\x00', 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000140)=@security={'security\x00', 0xe, 0x4, 0x4b8, 0x1f0, 0x320, 0x0, 0x320, 0x320, 0x438, 0x438, 0x438, 0x438, 0x438, 0x4, &(0x7f0000000100), {[{{@ipv6={@local, @local, [0x0, 0x0, 0xffffffff, 0xffffff00], [0xffffffff, 0xff, 0xffffffff, 0xff], 'eql\x00', 'gretap0\x00', {}, {0xff}, 0x0, 0x7fffffff, 0x2, 0x61}, 0x0, 0x188, 0x1c8, 0x0, {}, [@common=@unspec=@conntrack2={0xc0, 'conntrack\x00', 0x2, {{@ipv4=@loopback, [0xffffffff, 0xffffffff, 0x0, 0xffffffff], @ipv4=@loopback, [0x0, 0xffffffff, 0xffffff00, 0xff000000], @ipv6=@ipv4={[], [], @remote}, [0xffffff00, 0xff000000, 0xff000000, 0xff], @ipv4=@multicast2, [0xffffffff, 0xff, 0xff0000ff], 0x3, 0x1ff, 0x4, 0x4e21, 0x4e20, 0x4e22, 0x4e20, 0x28}, 0x1c0, 0x98}}]}, @common=@unspec=@ERROR={0x40, 'ERROR\x00', 0x0, "f650bd5c77822a55c077a2b3078812467f4ab9fefc372cf333baff203cdb"}}, {{@ipv6={@remote, @mcast2, [0xff000000, 0xffffff00, 0xffffffff, 0xff000000], [0x0, 0xff, 0xff000000, 0xffffff00], 'syzkaller0\x00', 'lo\x00', {}, {}, 0x2b, 0x1, 0x2, 0x23}, 0x0, 0xc8, 0x108}, @common=@inet=@TCPOPTSTRIP={0x40, 'TCPOPTSTRIP\x00', 0x0, {[0xe08d, 0x6, 0xff, 0x800, 0x2, 0x7, 0x0, 0x5]}}}, {{@uncond, 0x0, 0xf0, 0x118, 0x0, {}, [@common=@hl={0x28, 'hl\x00', 0x0, {0x3, 0x604}}]}, @common=@unspec=@STANDARD={0x28, '\x00', 0x0, 0xfffffffffffffffd}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x518) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000000680)) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = getpgrp(0x0) prlimit64(r2, 0x0, &(0x7f00000004c0)={0x0, 0x7ffffd}, &(0x7f00000002c0)) lremovexattr(0x0, &(0x7f0000000480)=ANY=[@ANYBLOB='trusteV.bpf\x00']) getsockopt$inet_sctp_SCTP_PR_ASSOC_STATUS(0xffffffffffffffff, 0x84, 0x73, &(0x7f0000000280), 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r3 = syz_open_dev$amidi(&(0x7f0000000100)='/dev/amidi#\x00', 0x2, 0x800) recvfrom(0xffffffffffffffff, 0x0, 0x0, 0x20, &(0x7f00000005c0)=@ipx={0x4, 0x1, 0x6, "6b183128f377"}, 0x80) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000200)='./file0\x00', 0x700, 0x0, &(0x7f00000024c0), 0x100032, &(0x7f00000000c0)=ANY=[@ANYBLOB]) getsockopt$inet_dccp_int(0xffffffffffffffff, 0x21, 0xf, &(0x7f0000000240), 0x0) fstat(0xffffffffffffffff, &(0x7f00000006c0)) getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, &(0x7f0000000440)={0x0, 0x80}, &(0x7f00000001c0)=0xfffffffffffffd3f) ioctl$FICLONE(r1, 0x40049409, r3) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, 0x0) [ 2701.956923] EXT4-fs (sda1): re-mounted. Opts: 14:18:36 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x3, &(0x7f0000001fd8)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x15}}, &(0x7f0000000080)="47504c049c3514bf772da07ae82e76590a36f6493ec1ab91b397e42abf1ea6cd8cd77427fc9a9e2b7165f52b4107bf0850d899dc52d013175ddb1b0746203c2a05b722e33e556fb2e3f39a3cde1fca53640337ec956146bdbfcb115070195631de5d21a5ea9e638c2bdb78a501ca4b6ea313d82568f9382c2c3f6faba6b4ee54793b4ed26dae3e52225029bb2ac0007f77754c3f23ceda9809b9a9684a940abcaa8cfcc7133ec422e9c83888318d41e9a493f0195fe2599651b89504f5dba14625ce2366f33d95dba92f867279cabf4aceddc85a8af7a0fa68d767ce5136b9d0d1966c499cb6bf34c2988666970000000000000000000000"}, 0x48) [ 2701.977601] hfs: can't find a HFS filesystem on dev loop2 14:18:36 executing program 4: r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/expire_quiescent_template\x00', 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000140)=@security={'security\x00', 0xe, 0x4, 0x4b8, 0x1f0, 0x320, 0x0, 0x320, 0x320, 0x438, 0x438, 0x438, 0x438, 0x438, 0x4, &(0x7f0000000100), {[{{@ipv6={@local, @local, [0x0, 0x0, 0xffffffff, 0xffffff00], [0xffffffff, 0xff, 0xffffffff, 0xff], 'eql\x00', 'gretap0\x00', {}, {0xff}, 0x0, 0x7fffffff, 0x2, 0x61}, 0x0, 0x188, 0x1c8, 0x0, {}, [@common=@unspec=@conntrack2={0xc0, 'conntrack\x00', 0x2, {{@ipv4=@loopback, [0xffffffff, 0xffffffff, 0x0, 0xffffffff], @ipv4=@loopback, [0x0, 0xffffffff, 0xffffff00, 0xff000000], @ipv6=@ipv4={[], [], @remote}, [0xffffff00, 0xff000000, 0xff000000, 0xff], @ipv4=@multicast2, [0xffffffff, 0xff, 0xff0000ff], 0x3, 0x1ff, 0x4, 0x4e21, 0x4e20, 0x4e22, 0x4e20, 0x28}, 0x1c0, 0x98}}]}, @common=@unspec=@ERROR={0x40, 'ERROR\x00', 0x0, "f650bd5c77822a55c077a2b3078812467f4ab9fefc372cf333baff203cdb"}}, {{@ipv6={@remote, @mcast2, [0xff000000, 0xffffff00, 0xffffffff, 0xff000000], [0x0, 0xff, 0xff000000, 0xffffff00], 'syzkaller0\x00', 'lo\x00', {}, {}, 0x2b, 0x1, 0x2, 0x23}, 0x0, 0xc8, 0x108}, @common=@inet=@TCPOPTSTRIP={0x40, 'TCPOPTSTRIP\x00', 0x0, {[0xe08d, 0x6, 0xff, 0x800, 0x2, 0x7, 0x0, 0x5]}}}, {{@uncond, 0x0, 0xf0, 0x118, 0x0, {}, [@common=@hl={0x28, 'hl\x00', 0x0, {0x3, 0x604}}]}, @common=@unspec=@STANDARD={0x28, '\x00', 0x0, 0xfffffffffffffffd}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x518) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = getpgrp(0x0) prlimit64(r2, 0x0, &(0x7f00000004c0)={0x0, 0x7ffffd}, &(0x7f00000002c0)) lremovexattr(0x0, &(0x7f0000000480)=@random={'trusted.', 'bpf\x00'}) getsockopt$inet_sctp_SCTP_PR_ASSOC_STATUS(0xffffffffffffffff, 0x84, 0x73, &(0x7f0000000280), 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000680)={'veth0\x00', 0x0}) recvfrom(r0, 0x0, 0x0, 0x20, &(0x7f00000005c0)=@hci={0x1f, r3}, 0xffffffffffffff35) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000200)='./file0\x00', 0x700, 0x0, &(0x7f00000024c0), 0x100032, &(0x7f00000000c0)=ANY=[@ANYBLOB]) getsockopt$inet_dccp_int(0xffffffffffffffff, 0x21, 0xf, &(0x7f0000000240), 0x0) fstat(0xffffffffffffffff, &(0x7f00000006c0)) process_vm_readv(r2, &(0x7f0000000a00)=[{&(0x7f0000000740)=""/200, 0xc8}, {&(0x7f0000000840)=""/43, 0x2b}, {&(0x7f0000000880)=""/135, 0x87}, {&(0x7f0000000940)=""/90, 0x5a}, {&(0x7f00000009c0)=""/16, 0x10}], 0x5, &(0x7f0000000b40)=[{&(0x7f0000000a80)=""/98, 0x62}, {&(0x7f0000000b00)=""/23, 0x17}], 0x2, 0x0) getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, &(0x7f0000000440)={0x0, 0x80}, &(0x7f00000001c0)=0xfffffffffffffd3f) ioctl$FICLONE(r1, 0x40049409, 0xffffffffffffffff) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) setsockopt$inet_sctp6_SCTP_NODELAY(r0, 0x84, 0x3, &(0x7f0000000b80)=0x7a8, 0x4) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, 0x0) [ 2702.127840] hfs: can't find a HFS filesystem on dev loop2 [ 2702.153723] EXT4-fs (sda1): Unrecognized mount option "./file0" or missing value 14:18:37 executing program 3: clone(0xc2b321c6db9081df, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = syz_open_dev$vivid(&(0x7f0000000000)='/dev/video#\x00', 0x3, 0x2) fchdir(r0) 14:18:37 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x3, &(0x7f0000001fd8)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x15}}, &(0x7f0000000080)="47504c049c3514bf772da07ae82e76590a36f6493ec1ab91b397e42abf1ea6cd8cd77427fc9a9e2b7165f52b4107bf0850d899dc52d013175ddb1b2f46103c2a05b722e33e556fb2e3f39a3cde1fca53640337ec956146bdbfcb115070195631de5d21a5ea9e638c2bdb78a501ca4b6ea313d82568f9382c2c3f6faba6b4ee54793b4ed26dae3e52225029bb2ac0007f77754c3f23ceda9809b9a9684a940abcaa8cfcc7133ec422e9c83888318d41e9a493f0195fe2599651b89504f5dba14625ce2366f33d95dba92f867279cabf4aceddc85a8af7a0fa68d767ce5136b9d0d1966c499cb6bf34c2988666970000000000000000000000"}, 0x48) 14:18:37 executing program 2: getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) syz_mount_image$hfs(&(0x7f0000000200)='hfs\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 14:18:37 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x3, &(0x7f0000001fd8)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x15}}, &(0x7f0000000080)="47504c049c3514bf772da07ae82e76590a36f6493ec1ab91b397e42abf1ea6cd8cd77427fc9a9e2b7165f52b4107bf0850d899dc52d013175ddb1b2f46fb3c2a05b722e33e556fb2e3f39a3cde1fca53640337ec956146bdbfcb115070195631de5d21a5ea9e638c2bdb78a501ca4b6ea313d82568f9382c2c3f6faba6b4ee54793b4ed26dae3e52225029bb2ac0007f77754c3f23ceda9809b9a9684a940abcaa8cfcc7133ec422e9c83888318d41e9a493f0195fe2599651b89504f5dba14625ce2366f33d95dba92f867279cabf4aceddc85a8af7a0fa68d767ce5136b9d0d1966c499cb6bf34c2988666970000000000000000000000"}, 0x48) [ 2702.242246] EXT4-fs (sda1): re-mounted. Opts: 14:18:37 executing program 1: r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/expire_quiescent_template\x00', 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000140)=@security={'security\x00', 0xe, 0x4, 0x4e0, 0x1f0, 0x320, 0x0, 0x320, 0x320, 0x438, 0x438, 0x438, 0x438, 0x438, 0x4, &(0x7f0000000100), {[{{@ipv6={@local, @local, [0x0, 0xffffff00, 0xffffffff, 0xffffff00], [0xffffffff, 0xff, 0xffffffff, 0xff], 'eql\x00', 'gretap0\x00', {}, {0xff}, 0x0, 0x7fffffff, 0x2, 0x61}, 0x0, 0x188, 0x1c8, 0x0, {}, [@common=@unspec=@conntrack2={0xc0, 'conntrack\x00', 0x2, {{@ipv4=@loopback, [0xffffffff, 0xffffffff, 0x0, 0xffffffff], @ipv4=@loopback, [0x0, 0xffffffff, 0xffffff00, 0xff000000], @ipv6=@ipv4={[], [], @remote}, [0xffffff00, 0xff000000, 0xff000000, 0xff], @ipv4=@multicast2, [0xffffffff, 0xff, 0xff0000ff], 0x3, 0x1ff, 0x4, 0x4e21, 0x4e20, 0x4e22, 0x4e20, 0x28, 0x20}, 0x1c0, 0x98}}]}, @common=@unspec=@ERROR={0x40, 'ERROR\x00', 0x0, "f650bd5c77822a55c077a2b3078812467f4ab9fefc372cf333baff203cdb"}}, {{@ipv6={@remote, @mcast2, [0xff000000, 0xffffff00, 0xffffffff, 0xff000000], [0x0, 0xff, 0xff000000, 0xffffff00], 'syzkaller0\x00', 'lo\x00', {}, {0xff}, 0x2b, 0x1, 0x2, 0x23}, 0x0, 0xf0, 0x130, 0x0, {}, [@common=@hl={0x28, 'hl\x00'}]}, @common=@inet=@TCPOPTSTRIP={0x40, 'TCPOPTSTRIP\x00', 0x0, {[0xe08d, 0x6, 0xff, 0x800, 0x2, 0x7, 0x3, 0x5]}}}, {{@uncond, 0x0, 0xf0, 0x118, 0x0, {}, [@common=@hl={0x28, 'hl\x00', 0x0, {0x3, 0x604}}]}, @common=@unspec=@STANDARD={0x28, '\x00', 0x0, 0xfffffffffffffffd}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x540) ioctl$EXT4_IOC_MIGRATE(0xffffffffffffffff, 0x6609) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000300)={0x0}, &(0x7f0000000400)=0xc) getsockopt$ARPT_SO_GET_INFO(r0, 0x0, 0x60, &(0x7f0000000740)={'filter\x00'}, &(0x7f00000007c0)=0x44) r3 = getpgrp(r2) prlimit64(r3, 0x0, &(0x7f00000004c0)={0x0, 0x7ffffd}, &(0x7f00000002c0)) lremovexattr(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000480)=@random={'trusted.', 'bpf\x00'}) getsockopt$inet_sctp_SCTP_PR_ASSOC_STATUS(0xffffffffffffffff, 0x84, 0x73, &(0x7f0000000280)={0x0, 0x8, 0x0, 0xe0}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r4 = syz_open_dev$amidi(&(0x7f0000000100)='/dev/amidi#\x00', 0x2, 0x800) recvfrom(r4, &(0x7f0000000500)=""/96, 0x60, 0x20, &(0x7f00000005c0)=@ipx={0x4, 0x1, 0x6, "6b183128f377"}, 0x80) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000200)='./file0\x00', 0x700, 0x0, &(0x7f00000024c0), 0x100032, &(0x7f0000000800)=ANY=[@ANYBLOB="5bbabb499430f102c4b50ad6605dc89b1cba9e458e68dfeb53fe20ec3e9dd0749869369e3a39e4507f43abc9907dfc3618dd3f2fb8dc072da12902e1a913df7599551581f3c0946590c75ffcda4068c3a3a8c814ba69391ee88d811a14fa7bc727067891d4958a922bbbfc6294d4b028d5a535a4a43e3df8a5159edb80a79b2dbed69e89e3c1d51561341654eca5b8dde2cba121cc6e5863530c2189d51be1b81d5c41938d9841e09fd061e270d4f074cbb491c74571cc59efa327dbfd6e287576f9f60f93"]) prctl$PR_MPX_ENABLE_MANAGEMENT(0x2b) getsockopt$inet_dccp_int(0xffffffffffffffff, 0x21, 0xf, &(0x7f0000000240), 0x0) fstat(0xffffffffffffffff, &(0x7f00000006c0)) getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, &(0x7f0000000440)={0x0, 0x80}, &(0x7f00000001c0)=0xfffffffffffffd3f) ioctl$FICLONE(r1, 0x40049409, r4) setgroups(0x3, &(0x7f0000000340)=[0x0, 0x0, 0x0]) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, 0x0) 14:18:37 executing program 0: r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/expire_quiescent_template\x00', 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000140)=@security={'security\x00', 0xe, 0x4, 0x4b8, 0x1f0, 0x320, 0x0, 0x320, 0x320, 0x438, 0x438, 0x438, 0x438, 0x438, 0x4, &(0x7f0000000100), {[{{@ipv6={@local, @local, [0x0, 0x0, 0xffffffff, 0xffffff00], [0xffffffff, 0xff, 0xffffffff, 0xff], 'eql\x00', 'gretap0\x00', {}, {0xff}, 0x0, 0x7fffffff, 0x2, 0x61}, 0x0, 0x188, 0x1c8, 0x0, {}, [@common=@unspec=@conntrack2={0xc0, 'conntrack\x00', 0x2, {{@ipv4=@loopback, [0xffffffff, 0xffffffff, 0x0, 0xffffffff], @ipv4=@loopback, [0x0, 0xffffffff, 0xffffff00, 0xff000000], @ipv6=@ipv4={[], [], @remote}, [0xffffff00, 0xff000000, 0xff000000, 0xff], @ipv4=@multicast2, [0xffffffff, 0xff, 0xff0000ff], 0x3, 0x1ff, 0x4, 0x4e21, 0x4e20, 0x4e22, 0x4e20, 0x28}, 0x1c0, 0x98}}]}, @common=@unspec=@ERROR={0x40, 'ERROR\x00', 0x0, "f650bd5c77822a55c077a2b3078812467f4ab9fefc372cf333baff203cdb"}}, {{@ipv6={@remote, @mcast2, [0xff000000, 0xffffff00, 0xffffffff, 0xff000000], [0x0, 0xff, 0xff000000, 0xffffff00], 'syzkaller0\x00', 'lo\x00', {}, {}, 0x2b, 0x1, 0x2, 0x23}, 0x0, 0xc8, 0x108}, @common=@inet=@TCPOPTSTRIP={0x40, 'TCPOPTSTRIP\x00', 0x0, {[0xe08d, 0x6, 0xff, 0x800, 0x2, 0x7, 0x0, 0x5]}}}, {{@uncond, 0x0, 0xf0, 0x118, 0x0, {}, [@common=@hl={0x28, 'hl\x00', 0x0, {0x3, 0x604}}]}, @common=@unspec=@STANDARD={0x28, '\x00', 0x0, 0xfffffffffffffffd}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x518) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000000680)) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = getpgrp(0x0) prlimit64(r2, 0x0, &(0x7f00000004c0)={0x0, 0x7ffffd}, &(0x7f00000002c0)) lremovexattr(0x0, &(0x7f0000000480)=ANY=[@ANYBLOB='trusteV.bpf\x00']) getsockopt$inet_sctp_SCTP_PR_ASSOC_STATUS(0xffffffffffffffff, 0x84, 0x73, &(0x7f0000000280), 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r3 = syz_open_dev$amidi(&(0x7f0000000100)='/dev/amidi#\x00', 0x2, 0x800) recvfrom(0xffffffffffffffff, 0x0, 0x0, 0x20, &(0x7f00000005c0)=@ipx={0x4, 0x1, 0x6, "6b183128f377"}, 0x80) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000200)='./file0\x00', 0x700, 0x0, &(0x7f00000024c0), 0x100032, &(0x7f00000000c0)=ANY=[@ANYBLOB]) getsockopt$inet_dccp_int(0xffffffffffffffff, 0x21, 0xf, &(0x7f0000000240), 0x0) fstat(0xffffffffffffffff, &(0x7f00000006c0)) getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, &(0x7f0000000440)={0x0, 0x80}, &(0x7f00000001c0)=0xfffffffffffffd3f) ioctl$FICLONE(r1, 0x40049409, r3) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, 0x0) [ 2702.344475] hfs: can't find a HFS filesystem on dev loop2 [ 2702.367545] IPVS: ftp: loaded support on port[0] = 21 14:18:37 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x3, &(0x7f0000001fd8)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x15}}, &(0x7f0000000080)="47504c049c3514bf772da07ae82e76590a36f6493ec1ab91b397e42abf1ea6cd8cd77427fc9a9e2b7165f52b4107bf0850d899dc52d013175ddb1b2f46203c2a0fb722e33e556fb2e3f39a3cde1fca53640337ec956146bdbfcb115070195631de5d21a5ea9e638c2bdb78a501ca4b6ea313d82568f9382c2c3f6faba6b4ee54793b4ed26dae3e52225029bb2ac0007f77754c3f23ceda9809b9a9684a940abcaa8cfcc7133ec422e9c83888318d41e9a493f0195fe2599651b89504f5dba14625ce2366f33d95dba92f867279cabf4aceddc85a8af7a0fa68d767ce5136b9d0d1966c499cb6bf34c2988666970000000000000000000000"}, 0x48) [ 2702.420420] hfs: can't find a HFS filesystem on dev loop2 [ 2702.585359] IPVS: ftp: loaded support on port[0] = 21 14:18:37 executing program 2: getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) syz_mount_image$hfs(&(0x7f0000000200)="6866737f", &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) [ 2702.620365] EXT4-fs (sda1): re-mounted. Opts: [ 2702.650191] EXT4-fs (sda1): Unrecognized mount option "[I0ĵ [ 2702.650191] `]țEhS >ti6:9PCɐ}6?/-)uUe_@hãi9荁{'xԕ+b԰(ե5>=ۀ-֞a4T쥸ˡ!nXcS !\AAapt˴EqY'n(uv" or missing value 14:18:37 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x3, &(0x7f0000001fd8)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x15}}, &(0x7f0000000080)="47504c049c3514bf772da07ae82e76590a36f6493ec1ab91b397e42abf1ea6cd8cd77427fc9a9e2b7165f52b4107bf0850d899dc52d013175ddb1b2f46203c2a09b722e33e556fb2e3f39a3cde1fca53640337ec956146bdbfcb115070195631de5d21a5ea9e638c2bdb78a501ca4b6ea313d82568f9382c2c3f6faba6b4ee54793b4ed26dae3e52225029bb2ac0007f77754c3f23ceda9809b9a9684a940abcaa8cfcc7133ec422e9c83888318d41e9a493f0195fe2599651b89504f5dba14625ce2366f33d95dba92f867279cabf4aceddc85a8af7a0fa68d767ce5136b9d0d1966c499cb6bf34c2988666970000000000000000000000"}, 0x48) [ 2702.811471] EXT4-fs (sda1): Unrecognized mount option "./file0" or missing value 14:18:37 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x3, &(0x7f0000001fd8)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x15}}, &(0x7f0000000080)="47504c049c3514bf772da07ae82e76590a36f6493ec1ab91b397e42abf1ea6cd8cd77427fc9a9e2b7165f52b4107bf0850d899dc52d013175ddb1b2f46203c2a06b722e33e556fb2e3f39a3cde1fca53640337ec956146bdbfcb115070195631de5d21a5ea9e638c2bdb78a501ca4b6ea313d82568f9382c2c3f6faba6b4ee54793b4ed26dae3e52225029bb2ac0007f77754c3f23ceda9809b9a9684a940abcaa8cfcc7133ec422e9c83888318d41e9a493f0195fe2599651b89504f5dba14625ce2366f33d95dba92f867279cabf4aceddc85a8af7a0fa68d767ce5136b9d0d1966c499cb6bf34c2988666970000000000000000000000"}, 0x48) [ 2702.888288] EXT4-fs (sda1): re-mounted. Opts: 14:18:37 executing program 3: clone(0x800200, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 14:18:37 executing program 4: r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/expire_quiescent_template\x00', 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000140)=@security={'security\x00', 0xe, 0x4, 0x4b8, 0x1f0, 0x320, 0x0, 0x320, 0x320, 0x438, 0x438, 0x438, 0x438, 0x438, 0x4, &(0x7f0000000100), {[{{@ipv6={@local, @local, [0x0, 0x0, 0xffffffff, 0xffffff00], [0xffffffff, 0xff, 0xffffffff, 0xff], 'eql\x00', 'gretap0\x00', {}, {0xff}, 0x0, 0x7fffffff, 0x2, 0x61}, 0x0, 0x188, 0x1c8, 0x0, {}, [@common=@unspec=@conntrack2={0xc0, 'conntrack\x00', 0x2, {{@ipv4=@loopback, [0xffffffff, 0xffffffff, 0x0, 0xffffffff], @ipv4=@loopback, [0x0, 0xffffffff, 0xffffff00, 0xff000000], @ipv6=@ipv4={[], [], @remote}, [0xffffff00, 0xff000000, 0xff000000, 0xff], @ipv4=@multicast2, [0xffffffff, 0xff, 0xff0000ff], 0x3, 0x1ff, 0x4, 0x4e21, 0x4e20, 0x4e22, 0x4e20, 0x28}, 0x1c0, 0x98}}]}, @common=@unspec=@ERROR={0x40, 'ERROR\x00', 0x0, "f650bd5c77822a55c077a2b3078812467f4ab9fefc372cf333baff203cdb"}}, {{@ipv6={@remote, @mcast2, [0xff000000, 0xffffff00, 0xffffffff, 0xff000000], [0x0, 0xff, 0xff000000, 0xffffff00], 'syzkaller0\x00', 'lo\x00', {}, {}, 0x2b, 0x1, 0x2, 0x23}, 0x0, 0xc8, 0x108}, @common=@inet=@TCPOPTSTRIP={0x40, 'TCPOPTSTRIP\x00', 0x0, {[0xe08d, 0x6, 0xff, 0x800, 0x2, 0x7, 0x0, 0x5]}}}, {{@uncond, 0x0, 0xf0, 0x118, 0x0, {}, [@common=@hl={0x28, 'hl\x00', 0x0, {0x3, 0x604}}]}, @common=@unspec=@STANDARD={0x28, '\x00', 0x0, 0xfffffffffffffffd}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x518) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = getpgrp(0x0) prlimit64(r2, 0x0, &(0x7f00000004c0)={0x0, 0x7ffffd}, &(0x7f00000002c0)) lremovexattr(0x0, &(0x7f0000000480)=@random={'trusted.', 'bpf\x00'}) getsockopt$inet_sctp_SCTP_PR_ASSOC_STATUS(0xffffffffffffffff, 0x84, 0x73, &(0x7f0000000280), 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r3 = syz_open_dev$amidi(&(0x7f0000000100)='/dev/amidi#\x00', 0x2, 0x800) recvfrom(0xffffffffffffffff, 0x0, 0x0, 0x20, &(0x7f00000005c0)=@ipx={0x4, 0x1, 0x6, "6b183128f377"}, 0x80) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000200)='./file0\x00', 0x700, 0x0, &(0x7f00000024c0), 0x100032, &(0x7f00000000c0)=ANY=[@ANYBLOB]) getsockopt$inet_dccp_int(0xffffffffffffffff, 0x21, 0xf, &(0x7f0000000240), 0x0) fstat(0xffffffffffffffff, &(0x7f00000006c0)) getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, &(0x7f0000000440)={0x0, 0x80}, &(0x7f00000001c0)=0xfffffffffffffd3f) syz_open_dev$amidi(&(0x7f0000000680)='/dev/amidi#\x00', 0x0, 0x200300) ioctl$FICLONE(r1, 0x40049409, r3) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, 0x0) [ 2702.918475] EXT4-fs (sda1): Unrecognized mount option "[I0ĵ [ 2702.918475] `]țEhS >ti6:9PCɐ}6?/-)uUe_@hãi9荁{'xԕ+b԰(ե5>=ۀ-֞a4T쥸ˡ!nXcS !\AAapt˴EqY'n(uv" or missing value 14:18:37 executing program 0: r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/expire_quiescent_template\x00', 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000140)=@security={'security\x00', 0xe, 0x4, 0x4b8, 0x1f0, 0x320, 0x0, 0x320, 0x320, 0x438, 0x438, 0x438, 0x438, 0x438, 0x4, &(0x7f0000000100), {[{{@ipv6={@local, @local, [0x0, 0x0, 0xffffffff, 0xffffff00], [0xffffffff, 0xff, 0xffffffff, 0xff], 'eql\x00', 'gretap0\x00', {}, {0xff}, 0x0, 0x7fffffff, 0x2, 0x61}, 0x0, 0x188, 0x1c8, 0x0, {}, [@common=@unspec=@conntrack2={0xc0, 'conntrack\x00', 0x2, {{@ipv4=@loopback, [0xffffffff, 0xffffffff, 0x0, 0xffffffff], @ipv4=@loopback, [0x0, 0xffffffff, 0xffffff00, 0xff000000], @ipv6=@ipv4={[], [], @remote}, [0xffffff00, 0xff000000, 0xff000000, 0xff], @ipv4=@multicast2, [0xffffffff, 0xff, 0xff0000ff], 0x3, 0x1ff, 0x4, 0x4e21, 0x4e20, 0x4e22, 0x4e20, 0x28}, 0x1c0, 0x98}}]}, @common=@unspec=@ERROR={0x40, 'ERROR\x00', 0x0, "f650bd5c77822a55c077a2b3078812467f4ab9fefc372cf333baff203cdb"}}, {{@ipv6={@remote, @mcast2, [0xff000000, 0xffffff00, 0xffffffff, 0xff000000], [0x0, 0xff, 0xff000000, 0xffffff00], 'syzkaller0\x00', 'lo\x00', {}, {}, 0x2b, 0x1, 0x2, 0x23}, 0x0, 0xc8, 0x108}, @common=@inet=@TCPOPTSTRIP={0x40, 'TCPOPTSTRIP\x00', 0x0, {[0xe08d, 0x6, 0xff, 0x800, 0x2, 0x7, 0x0, 0x5]}}}, {{@uncond, 0x0, 0xf0, 0x118, 0x0, {}, [@common=@hl={0x28, 'hl\x00', 0x0, {0x3, 0x604}}]}, @common=@unspec=@STANDARD={0x28, '\x00', 0x0, 0xfffffffffffffffd}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x518) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000000680)) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = getpgrp(0x0) prlimit64(r2, 0x0, &(0x7f00000004c0)={0x0, 0x7ffffd}, &(0x7f00000002c0)) lremovexattr(0x0, &(0x7f0000000480)=ANY=[@ANYBLOB='trusteV.bpf\x00']) getsockopt$inet_sctp_SCTP_PR_ASSOC_STATUS(0xffffffffffffffff, 0x84, 0x73, &(0x7f0000000280), 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r3 = syz_open_dev$amidi(&(0x7f0000000100)='/dev/amidi#\x00', 0x2, 0x800) recvfrom(0xffffffffffffffff, 0x0, 0x0, 0x20, &(0x7f00000005c0)=@ipx={0x4, 0x1, 0x6, "6b183128f377"}, 0x80) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000200)='./file0\x00', 0x700, 0x0, &(0x7f00000024c0), 0x100032, &(0x7f00000000c0)=ANY=[@ANYBLOB]) getsockopt$inet_dccp_int(0xffffffffffffffff, 0x21, 0xf, &(0x7f0000000240), 0x0) fstat(0xffffffffffffffff, &(0x7f00000006c0)) getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, &(0x7f0000000440)={0x0, 0x80}, &(0x7f00000001c0)=0xfffffffffffffd3f) ioctl$FICLONE(r1, 0x40049409, r3) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, 0x0) 14:18:37 executing program 2: getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) syz_mount_image$hfs(&(0x7f0000000200)='hfs\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 14:18:38 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x3, &(0x7f0000001fd8)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x15}}, &(0x7f0000000080)="47504c049c3514bf772da07ae82e76590a36f6493ec1ab91b397e42abf1ea6cd8cd77427fc9a9e2b7165f52b4107bf0850d899dc52d013175ddb1b2f46203c2a0db722e33e556fb2e3f39a3cde1fca53640337ec956146bdbfcb115070195631de5d21a5ea9e638c2bdb78a501ca4b6ea313d82568f9382c2c3f6faba6b4ee54793b4ed26dae3e52225029bb2ac0007f77754c3f23ceda9809b9a9684a940abcaa8cfcc7133ec422e9c83888318d41e9a493f0195fe2599651b89504f5dba14625ce2366f33d95dba92f867279cabf4aceddc85a8af7a0fa68d767ce5136b9d0d1966c499cb6bf34c2988666970000000000000000000000"}, 0x48) 14:18:38 executing program 1: r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/expire_quiescent_template\x00', 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000140)=@security={'security\x00', 0xe, 0x4, 0x4e0, 0x1f0, 0x320, 0x0, 0x320, 0x320, 0x438, 0x438, 0x438, 0x438, 0x438, 0x4, &(0x7f0000000100), {[{{@ipv6={@local, @local, [0x0, 0xffffff00, 0xffffffff, 0xffffff00], [0xffffffff, 0xff, 0xffffffff, 0xff], 'eql\x00', 'gretap0\x00', {}, {0xff}, 0x0, 0x7fffffff, 0x2, 0x61}, 0x0, 0x188, 0x1c8, 0x0, {}, [@common=@unspec=@conntrack2={0xc0, 'conntrack\x00', 0x2, {{@ipv4=@loopback, [0xffffffff, 0xffffffff, 0x0, 0xffffffff], @ipv4=@loopback, [0x0, 0xffffffff, 0xffffff00, 0xff000000], @ipv6=@ipv4={[], [], @remote}, [0xffffff00, 0xff000000, 0xff000000, 0xff], @ipv4=@multicast2, [0xffffffff, 0xff, 0xff0000ff], 0x3, 0x1ff, 0x4, 0x4e21, 0x4e20, 0x4e22, 0x4e20, 0x28, 0x20}, 0x1c0, 0x98}}]}, @common=@unspec=@ERROR={0x40, 'ERROR\x00', 0x0, "f650bd5c77822a55c077a2b3078812467f4ab9fefc372cf333baff203cdb"}}, {{@ipv6={@remote, @mcast2, [0xff000000, 0xffffff00, 0xffffffff, 0xff000000], [0x0, 0xff, 0xff000000, 0xffffff00], 'syzkaller0\x00', 'lo\x00', {}, {0xff}, 0x2b, 0x1, 0x2, 0x23}, 0x0, 0xf0, 0x130, 0x0, {}, [@common=@hl={0x28, 'hl\x00'}]}, @common=@inet=@TCPOPTSTRIP={0x40, 'TCPOPTSTRIP\x00', 0x0, {[0xe08d, 0x6, 0xff, 0x800, 0x2, 0x7, 0x3, 0x5]}}}, {{@uncond, 0x0, 0xf0, 0x118, 0x0, {}, [@common=@hl={0x28, 'hl\x00', 0x0, {0x3, 0x604}}]}, @common=@unspec=@STANDARD={0x28, '\x00', 0x0, 0xfffffffffffffffd}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x540) ioctl$EXT4_IOC_MIGRATE(0xffffffffffffffff, 0x6609) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000300)={0x0}, &(0x7f0000000400)=0xc) getsockopt$ARPT_SO_GET_INFO(r0, 0x0, 0x60, &(0x7f0000000740)={'filter\x00'}, &(0x7f00000007c0)=0x44) r3 = getpgrp(r2) prlimit64(r3, 0x0, &(0x7f00000004c0)={0x0, 0x7ffffd}, &(0x7f00000002c0)) lremovexattr(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000480)=@random={'trusted.', 'bpf\x00'}) getsockopt$inet_sctp_SCTP_PR_ASSOC_STATUS(0xffffffffffffffff, 0x84, 0x73, &(0x7f0000000280)={0x0, 0x8, 0x0, 0xe0}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r4 = syz_open_dev$amidi(&(0x7f0000000100)='/dev/amidi#\x00', 0x2, 0x800) creat(&(0x7f0000000680)='./file0\x00', 0x10) recvfrom(r4, &(0x7f0000000500)=""/96, 0x60, 0x20, &(0x7f00000005c0)=@ipx={0x4, 0x1, 0x6, "6b183128f377"}, 0x80) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000200)='./file0\x00', 0x700, 0x0, &(0x7f00000024c0), 0x100032, &(0x7f00000000c0)=ANY=[@ANYBLOB]) prctl$PR_MPX_ENABLE_MANAGEMENT(0x2b) getsockopt$inet_dccp_int(0xffffffffffffffff, 0x21, 0xf, &(0x7f0000000240), 0x0) fstat(0xffffffffffffffff, &(0x7f00000006c0)) getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, &(0x7f0000000440)={0x0, 0x80}, &(0x7f00000001c0)=0xfffffffffffffd3f) ioctl$FICLONE(r1, 0x40049409, r4) setgroups(0x3, &(0x7f0000000340)=[0x0, 0x0, 0x0]) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ceph(&(0x7f0000000800)='ceph\x00', &(0x7f0000000840)='./file0\x00', 0xdce, 0x7, &(0x7f0000001cc0)=[{&(0x7f0000000880)="63c0d64291d276aac5b2c1f095ee9eb700bdfae3ac17f58c326d613d29ae6ed1c0dadbf3722c7440a3600e7a6f5f7b851cd99cf823f6cdacf4d953747b9f4c2ff32185975ca46a2f2faf78f5c4c32f6e992005da03d6d999f0", 0x59, 0x8}, {&(0x7f0000000900)="43e36c3c57ba46d6156ff9075cd8331394fbf72498463cbf5118d0be1539b522ee0713eb4e67cbcea2a572c4c7d8912b06036335fa50498f834d81caaca6b62903a8a7094e83c5b68862df52a2f909646dd50d7ef128bf76e4eea17c9d7df8", 0x5f, 0x5}, {&(0x7f0000000980)="e38e8b1a23c7ca8342332587392ad155778682164cf292b6150ae651448b2bfb7a65e337ca12d6cb4a4a3c10fc397a6ec55fbe1268d15282162c47f10292bb63ee31bd0e7830f425bbc6a037e4ce5b6e168bb633615d2a896f361d2cf5d0c3409ac8e863fb65d2e3a388d9665e412865e5bb31e68c395ef24c1807b5ca28228c890df6641a7629fa9b5c4e03251a501ddc415850aac45396bcb36cb31de8a72b91c906bdae161cea17f619ff2d006d48bd0a8b1f45596524734fcd3240868c78328fbd72050f5be5ad4e8b25a54d2532b74a114e6f0242c40eaa0845321c12027eebb985", 0xe4, 0x4}, {&(0x7f0000000a80)="192a9bcae2e8557ee75d40699ed349cd3078b54606e229af03d62ffdb791f3cd52712ff639b978191e45dec32d1817e34d5cdf6076f9b6c37abc62906d37bca5130f1b2ab5df3b3bf899fe282ab7ef0219f2c7db9b3a34b7226575f2dc57320e000f5fd34ff187739ead4992d6968fb71403986022b387580f2205840586de", 0x7f, 0x6}, {&(0x7f0000000b00)="4605a2c93daa6ff140c35e8ebfa061a016b9d40726ec85337414b48586c463d0c3f7ab3325c46f53ff1d2445b6ecc6c7a1f31a413fb3f24ebd716796ca009cb7c43768fbd7c58bbcd7d0f5f2a02de189606a9a9ab4b9e1aa90286a2a647d5a25276811e680afa815a17011bd02f19062e6f9894333c57133a7ca0e2036f2eb9b6e901bb9cb6579eb5f33eb55815610b8fec577efb9189cb16845c55411fc82c534427fc1eb68b3da80fae03ebf96c1075c1e8be30db655591e1a47835730aa057d034545680846973a654c1d5d9ef06b689e1a", 0xd3, 0x4cb000000000}, {&(0x7f0000000c00)="111e22589e02f3ea2ee27b367eb744b7de7ca1966678cdd509bb17f13fd4edd7a8369ea402b5bb990f6d2fa31eceea4038b67dcfb49f08f4b92e50bf98092d65c05f2822a559a903b27b65174740eab3948ed170dc274b8036f43601f2a02402517dd455776bc923286ce966375a0a9a649f2832cdcdba6914953e2f361b05129cbb47f7d3f8a706f9b146f3934df106671b8c8388107b4a0463a4", 0x9b, 0xfffffffffffffe00}, {&(0x7f0000000cc0)="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", 0x1000, 0xb9be}], 0x0, &(0x7f0000001d80)='bpf\x00') syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, 0x0) 14:18:38 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x3, &(0x7f0000001fd8)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x15}}, &(0x7f0000000080)="47504c049c3514bf772da07ae82e76590a36f6493ec1ab91b397e42abf1ea6cd8cd77427fc9a9e2b7165f52b4107bf0850d899dc52d013175ddb1b2f46203c2a07b722e33e556fb2e3f39a3cde1fca53640337ec956146bdbfcb115070195631de5d21a5ea9e638c2bdb78a501ca4b6ea313d82568f9382c2c3f6faba6b4ee54793b4ed26dae3e52225029bb2ac0007f77754c3f23ceda9809b9a9684a940abcaa8cfcc7133ec422e9c83888318d41e9a493f0195fe2599651b89504f5dba14625ce2366f33d95dba92f867279cabf4aceddc85a8af7a0fa68d767ce5136b9d0d1966c499cb6bf34c2988666970000000000000000000000"}, 0x48) [ 2703.311889] hfs: can't find a HFS filesystem on dev loop2 14:18:38 executing program 4: r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/expire_quiescent_template\x00', 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000140)=@security={'security\x00', 0xe, 0x4, 0x4b8, 0x1f0, 0x320, 0x0, 0x320, 0x320, 0x438, 0x438, 0x438, 0x438, 0x438, 0x4, &(0x7f0000000100), {[{{@ipv6={@local, @local, [0x0, 0x0, 0xffffffff, 0xffffff00], [0xffffffff, 0xff, 0xffffffff, 0xff], 'eql\x00', 'gretap0\x00', {}, {0xff}, 0x0, 0x7fffffff, 0x2, 0x61}, 0x0, 0x188, 0x1c8, 0x0, {}, [@common=@unspec=@conntrack2={0xc0, 'conntrack\x00', 0x2, {{@ipv4=@loopback, [0xffffffff, 0xffffffff, 0x0, 0xffffffff], @ipv4=@loopback, [0x0, 0xffffffff, 0xffffff00, 0xff000000], @ipv6=@ipv4={[], [], @remote}, [0xffffff00, 0xff000000, 0xff000000, 0xff], @ipv4=@multicast2, [0xffffffff, 0xff, 0xff0000ff], 0x3, 0x1ff, 0x4, 0x4e21, 0x4e20, 0x4e22, 0x4e20, 0x28}, 0x1c0, 0x98}}]}, @common=@unspec=@ERROR={0x40, 'ERROR\x00', 0x0, "f650bd5c77822a55c077a2b3078812467f4ab9fefc372cf333baff203cdb"}}, {{@ipv6={@remote, @mcast2, [0xff000000, 0xffffff00, 0xffffffff, 0xff000000], [0x0, 0xff, 0xff000000, 0xffffff00], 'syzkaller0\x00', 'lo\x00', {}, {}, 0x2b, 0x1, 0x2, 0x23}, 0x0, 0xc8, 0x108}, @common=@inet=@TCPOPTSTRIP={0x40, 'TCPOPTSTRIP\x00', 0x0, {[0xe08d, 0x6, 0xff, 0x800, 0x2, 0x7, 0x0, 0x5]}}}, {{@uncond, 0x0, 0xf0, 0x118, 0x0, {}, [@common=@hl={0x28, 'hl\x00', 0x0, {0x3, 0x604}}]}, @common=@unspec=@STANDARD={0x28, '\x00', 0x0, 0xfffffffffffffffd}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x518) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpgrp(0x0) r2 = creat(&(0x7f0000000780)='./file0\x00', 0x80) prlimit64(r1, 0x0, &(0x7f00000004c0)={0x0, 0x7ffffd}, &(0x7f00000002c0)) lremovexattr(0x0, &(0x7f0000000480)=@random={'trusted.', 'bpf\x00'}) getsockopt$inet_sctp_SCTP_PR_ASSOC_STATUS(0xffffffffffffffff, 0x84, 0x73, &(0x7f0000000280), 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r3 = syz_open_dev$amidi(&(0x7f0000000100)='/dev/amidi#\x00', 0x2, 0x800) recvfrom(0xffffffffffffffff, 0x0, 0x0, 0x20, &(0x7f00000005c0)=@ipx={0x4, 0x1, 0x6, "6b183128f377"}, 0x80) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000200)='./file0\x00', 0x700, 0x0, &(0x7f00000024c0), 0x100032, &(0x7f00000000c0)=ANY=[@ANYBLOB]) getsockopt$inet_dccp_int(0xffffffffffffffff, 0x21, 0xf, &(0x7f0000000240), 0x0) fstat(0xffffffffffffffff, &(0x7f00000006c0)) getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, &(0x7f0000000440)={0x0, 0x80}, &(0x7f00000001c0)=0xfffffffffffffd3f) ioctl$FICLONE(r2, 0x40049409, r2) ioctl$DRM_IOCTL_ADD_CTX(r3, 0xc0086420, &(0x7f0000000680)={0x0}) ioctl$DRM_IOCTL_RM_CTX(r0, 0xc0086421, &(0x7f0000000740)={r4, 0x1}) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, 0x0) 14:18:38 executing program 3: clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) [ 2703.426588] hfs: can't find a HFS filesystem on dev loop2 14:18:38 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x3, &(0x7f0000001fd8)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x15}}, &(0x7f0000000080)="47504c049c3514bf772da07ae82e76590a36f6493ec1ab91b397e42abf1ea6cd8cd77427fc9a9e2b7165f52b4107bf0850d899dc52d013175ddb1b2f46203c2a15b722e33e556fb2e3f39a3cde1fca53640337ec956146bdbfcb115070195631de5d21a5ea9e638c2bdb78a501ca4b6ea313d82568f9382c2c3f6faba6b4ee54793b4ed26dae3e52225029bb2ac0007f77754c3f23ceda9809b9a9684a940abcaa8cfcc7133ec422e9c83888318d41e9a493f0195fe2599651b89504f5dba14625ce2366f33d95dba92f867279cabf4aceddc85a8af7a0fa68d767ce5136b9d0d1966c499cb6bf34c2988666970000000000000000000000"}, 0x48) 14:18:38 executing program 2: getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) syz_mount_image$hfs(&(0x7f0000000200)='hfs\x00', &(0x7f0000000280)='./file0\x00', 0xa00000000000000, 0x0, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 14:18:38 executing program 3: clone(0x10000004, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getresuid(&(0x7f0000000340), &(0x7f0000000480)=0x0, &(0x7f00000003c0)) syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000040)='./file0\x00', 0x3, 0x4, &(0x7f00000002c0)=[{&(0x7f0000000080)="3c2c57835219fe6016dadf9ab7f509f5aebd7224f265684db753dfa355f9788dfc45af1dd0c66a83c86f8c362ee930c2dd2434b8e996ae07f1287071802690f5518e760952eced704e9f05e3d696aadccc426c2c555421b55d81b61d3c7a3caf3745bff67ab6bbf7f9f356ee850504fa07940cd40261930f52491b2da865cbc77085ccd19b", 0x85, 0xa1}, {&(0x7f0000000140)="62a82041b12be38beebfb9b26907cac177c9d695fbdeb085e62cf1ce835dcdbcdb003886e9cd132a7245c194b1632dd471a11e7564dc1f415e45425b6b35417f104bf2f2fea1d859b995865fb5a47aa242074e4ee014c159a70f1f49248e404d927ee5f69d1871b1a1e04fb2", 0x6c, 0x10000}, {&(0x7f00000001c0)="cbd40a7204dd5f5557319d19ea78f9c9c1bf846661989c296f82969d0116b12af967f42c03028be2b25c782b97a9132617a2d4feb761d6bbe37b37d2dd44812381d9700780accb945fc0e44b4813a4ccd2395fc3032d3904887618a804eb4c10c1c7003c8f520e68f472e0751884aeb25ec34723076cdaed4362c9ce24a3cafdc412d09e12276cb83ccf056e88a88746af9a6648ca3cf82678ae75844a85", 0x9e, 0xff}, {&(0x7f0000000280)="9f7a39552c2f303c61ad", 0xa, 0x88}], 0x20000, &(0x7f0000000400)=ANY=[@ANYBLOB='owerriderockper=\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00', @ANYRESHEX=r0, @ANYBLOB=',utf8,sbsector=0x0000000000000003,\x00']) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000380)='/dev/null\x00', 0x200000, 0x0) write$FUSE_INTERRUPT(r1, &(0x7f00000005c0)={0x10, 0x0, 0x3}, 0x10) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, &(0x7f00000004c0)=[@in={0x2, 0x4e21, @rand_addr=0x9}, @in={0x2, 0x4e23, @rand_addr=0x9}, @in={0x2, 0x4e21, @remote}, @in={0x2, 0x4e20, @empty}, @in={0x2, 0x4e23, @multicast1}, @in6={0xa, 0x4e22, 0x7, @local, 0x6}, @in6={0xa, 0x4e24, 0x5, @remote, 0x5}, @in6={0xa, 0x4e21, 0x2, @mcast2, 0x1}, @in6={0xa, 0x4e20, 0xfffffffffffffff8, @dev={0xfe, 0x80, [], 0x19}, 0x1000}], 0xc0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r1, 0x400c6615, &(0x7f0000000580)) 14:18:38 executing program 0: r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhci\x00', 0x208800, 0x0) setsockopt$SO_VM_SOCKETS_CONNECT_TIMEOUT(r0, 0x28, 0x6, &(0x7f0000000040), 0x10) clone(0xc2b321c6db9081df, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clock_gettime(0x0, &(0x7f00000000c0)={0x0, 0x0}) utimensat(r0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)={{r1, r2/1000+10000}, {0x77359400}}, 0x100) [ 2703.712490] hfs: can't find a HFS filesystem on dev loop2 [ 2703.763060] ceph: device name is missing path (no : separator in /dev/loop1) 14:18:38 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x3, &(0x7f0000001fd8)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x15}}, &(0x7f0000000080)="47504c049c3514bf772da07ae82e76590a36f6493ec1ab91b397e42abf1ea6cd8cd77427fc9a9e2b7165f52b4107bf0850d899dc52d013175ddb1b2f46203c2a11b722e33e556fb2e3f39a3cde1fca53640337ec956146bdbfcb115070195631de5d21a5ea9e638c2bdb78a501ca4b6ea313d82568f9382c2c3f6faba6b4ee54793b4ed26dae3e52225029bb2ac0007f77754c3f23ceda9809b9a9684a940abcaa8cfcc7133ec422e9c83888318d41e9a493f0195fe2599651b89504f5dba14625ce2366f33d95dba92f867279cabf4aceddc85a8af7a0fa68d767ce5136b9d0d1966c499cb6bf34c2988666970000000000000000000000"}, 0x48) [ 2703.805890] hfs: can't find a HFS filesystem on dev loop2 [ 2703.891302] IPVS: ftp: loaded support on port[0] = 21 14:18:38 executing program 2: getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) syz_mount_image$hfs(&(0x7f0000000200)='hfs\x00', &(0x7f0000000280)='./file0\x00', 0x3000000, 0x0, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 14:18:38 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x3, &(0x7f0000001fd8)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x15}}, &(0x7f0000000080)="47504c049c3514bf772da07ae82e76590a36f6493ec1ab91b397e42abf1ea6cd8cd77427fc9a9e2b7165f52b4107bf0850d899dc52d013175ddb1b2f46203c2a08b722e33e556fb2e3f39a3cde1fca53640337ec956146bdbfcb115070195631de5d21a5ea9e638c2bdb78a501ca4b6ea313d82568f9382c2c3f6faba6b4ee54793b4ed26dae3e52225029bb2ac0007f77754c3f23ceda9809b9a9684a940abcaa8cfcc7133ec422e9c83888318d41e9a493f0195fe2599651b89504f5dba14625ce2366f33d95dba92f867279cabf4aceddc85a8af7a0fa68d767ce5136b9d0d1966c499cb6bf34c2988666970000000000000000000000"}, 0x48) 14:18:39 executing program 0: clone(0xc2b321c6db9081df, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = dup(0xffffffffffffff9c) ioctl$PPPIOCGFLAGS(r0, 0x8004745a, &(0x7f0000000180)) socketpair$unix(0x1, 0xfffffffffdfffffd, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ptrace$cont(0xffffffffffffffff, 0x0, 0x0, 0x40000000000000) ptrace$setregs(0xffffffffffffffff, 0x0, 0x4, 0x0) ptrace$cont(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = syz_open_dev$sndctrl(&(0x7f0000000000)='/dev/snd/controlC#\x00', 0x0, 0x40800) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_INFO(r1, 0xc10c5541, &(0x7f0000000040)={0x0, 0x0, 0x4, 0x0, 0x0, [], [], [], 0x2, 0xff}) 14:18:39 executing program 1: r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/expire_quiescent_template\x00', 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000140)=@security={'security\x00', 0xe, 0x4, 0x4e0, 0x1f0, 0x320, 0x0, 0x320, 0x320, 0x438, 0x438, 0x438, 0x438, 0x438, 0x4, &(0x7f0000000100), {[{{@ipv6={@local, @local, [0x0, 0xffffff00, 0xffffffff, 0xffffff00], [0xffffffff, 0xff, 0xffffffff, 0xff], 'eql\x00', 'gretap0\x00', {}, {0xff}, 0x0, 0x7fffffff, 0x2, 0x61}, 0x0, 0x188, 0x1c8, 0x0, {}, [@common=@unspec=@conntrack2={0xc0, 'conntrack\x00', 0x2, {{@ipv4=@loopback, [0xffffffff, 0xffffffff, 0x0, 0xffffffff], @ipv4=@loopback, [0x0, 0xffffffff, 0xffffff00, 0xff000000], @ipv6=@ipv4={[], [], @remote}, [0xffffff00, 0xff000000, 0xff000000, 0xff], @ipv4=@multicast2, [0xffffffff, 0xff, 0xff0000ff], 0x3, 0x1ff, 0x4, 0x4e21, 0x4e20, 0x4e22, 0x4e20, 0x28, 0x20}, 0x1c0, 0x98}}]}, @common=@unspec=@ERROR={0x40, 'ERROR\x00', 0x0, "f650bd5c77822a55c077a2b3078812467f4ab9fefc372cf333baff203cdb"}}, {{@ipv6={@remote, @mcast2, [0xff000000, 0xffffff00, 0xffffffff, 0xff000000], [0x0, 0xff, 0xff000000, 0xffffff00], 'syzkaller0\x00', 'lo\x00', {}, {0xff}, 0x2b, 0x1, 0x2, 0x23}, 0x0, 0xf0, 0x130, 0x0, {}, [@common=@hl={0x28, 'hl\x00'}]}, @common=@inet=@TCPOPTSTRIP={0x40, 'TCPOPTSTRIP\x00', 0x0, {[0xe08d, 0x6, 0xff, 0x800, 0x2, 0x7, 0x3, 0x5]}}}, {{@uncond, 0x0, 0xf0, 0x118, 0x0, {}, [@common=@hl={0x28, 'hl\x00', 0x0, {0x3, 0x604}}]}, @common=@unspec=@STANDARD={0x28, '\x00', 0x0, 0xfffffffffffffffd}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x540) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000800)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DAEMON(r0, &(0x7f00000008c0)={&(0x7f0000000680)={0x10, 0x0, 0x0, 0x10100000}, 0xc, &(0x7f0000000880)={&(0x7f0000000840)={0x1c, r1, 0x8, 0x70bd29, 0x25dfdbfd, {}, [@IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x78cc}]}, 0x1c}, 0x1, 0x0, 0x0, 0x800}, 0x10) ioctl$EXT4_IOC_MIGRATE(0xffffffffffffffff, 0x6609) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000300)={0x0}, &(0x7f0000000400)=0xc) getsockopt$ARPT_SO_GET_INFO(r0, 0x0, 0x60, &(0x7f0000000740)={'filter\x00'}, &(0x7f00000007c0)=0x44) r4 = getpgrp(r3) prlimit64(r4, 0x0, &(0x7f00000004c0)={0x0, 0x7ffffd}, &(0x7f00000002c0)) lremovexattr(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000480)=@random={'trusted.', 'bpf\x00'}) getsockopt$inet_sctp_SCTP_PR_ASSOC_STATUS(0xffffffffffffffff, 0x84, 0x73, &(0x7f0000000280)={0x0, 0x8, 0x0, 0xe0}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r5 = syz_open_dev$amidi(&(0x7f0000000100)='/dev/amidi#\x00', 0x2, 0x800) recvfrom(r5, &(0x7f0000000500)=""/96, 0x60, 0x20, &(0x7f00000005c0)=@ipx={0x4, 0x1, 0x6, "6b183128f377"}, 0x80) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000200)='./file0\x00', 0x700, 0x0, &(0x7f00000024c0), 0x100032, &(0x7f00000000c0)=ANY=[@ANYBLOB]) prctl$PR_MPX_ENABLE_MANAGEMENT(0x2b) getsockopt$inet_dccp_int(0xffffffffffffffff, 0x21, 0xf, &(0x7f0000000240), 0x0) fstat(0xffffffffffffffff, &(0x7f00000006c0)) getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, &(0x7f0000000440)={0x0, 0x80}, &(0x7f00000001c0)=0xfffffffffffffd3f) ioctl$FICLONE(r2, 0x40049409, r5) setgroups(0x3, &(0x7f0000000340)=[0x0, 0x0, 0x0]) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, 0x0) 14:18:39 executing program 3: r0 = syz_open_dev$sndpcmp(&(0x7f0000000300)='/dev/snd/pcmC#D#p\x00', 0xb, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_PORT_INFO(r0, 0x40a85323, &(0x7f00000000c0)={{0x100, 0x3}, 'port1\x00', 0x4, 0x1000, 0x8, 0x8beb, 0x8, 0x5, 0x5, 0x0, 0x1, 0x8001}) r1 = syz_open_dev$mouse(&(0x7f0000000000)='/dev/input/mouse#\x00', 0x2, 0x101000) ioctl$RNDADDENTROPY(r1, 0x40085203, &(0x7f0000000180)=ANY=[@ANYBLOB="0305000022000000e743d16ec34ed57365f7e24db7e2d00fa7c858536b2c0abf35d219316f41337aca53d0a185e0dc2643426518fbcb835e16fc0de2813e2b07a452985875087c57521a822508ec56d7f65434500e3719811785844b6f5723e52cc332dc8c53fe70d02e6c595c5868b6dd74839abc6b8d8812274ef6248761a2b539c1b26726c4ce99ca6abcc64e7f4192b16c"]) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(r0, 0x84, 0x66, &(0x7f0000000380)={0x0}, &(0x7f0000000280)=0x8) setsockopt$inet_sctp6_SCTP_ASSOCINFO(r0, 0x84, 0x1, &(0x7f00000002c0)={r2, 0x6, 0xffff, 0x4, 0x7, 0x8}, 0x14) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(r0, 0x800c6613, &(0x7f0000000040)={0x0, @aes128, 0x1, "8131a162f3e6655f"}) ioctl$TCGETA(r1, 0x5405, &(0x7f0000000080)) r3 = getgid() setgid(r3) 14:18:39 executing program 4: r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/expire_quiescent_template\x00', 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000140)=@security={'security\x00', 0xe, 0x4, 0x4b8, 0x1f0, 0x320, 0x0, 0x320, 0x320, 0x438, 0x438, 0x438, 0x438, 0x438, 0x4, &(0x7f0000000100), {[{{@ipv6={@local, @local, [0x0, 0x0, 0xffffffff, 0xffffff00], [0xffffffff, 0xff, 0xffffffff, 0xff], 'eql\x00', 'gretap0\x00', {}, {0xff}, 0x0, 0x7fffffff, 0x2, 0x61}, 0x0, 0x188, 0x1c8, 0x0, {}, [@common=@unspec=@conntrack2={0xc0, 'conntrack\x00', 0x2, {{@ipv4=@loopback, [0xffffffff, 0xffffffff, 0x0, 0xffffffff], @ipv4=@loopback, [0x0, 0xffffffff, 0xffffff00, 0xff000000], @ipv6=@ipv4={[], [], @remote}, [0xffffff00, 0xff000000, 0xff000000, 0xff], @ipv4=@multicast2, [0xffffffff, 0xff, 0xff0000ff], 0x3, 0x1ff, 0x4, 0x4e21, 0x4e20, 0x4e22, 0x4e20, 0x28}, 0x1c0, 0x98}}]}, @common=@unspec=@ERROR={0x40, 'ERROR\x00', 0x0, "f650bd5c77822a55c077a2b3078812467f4ab9fefc372cf333baff203cdb"}}, {{@ipv6={@remote, @mcast2, [0xff000000, 0xffffff00, 0xffffffff, 0xff000000], [0x0, 0xff, 0xff000000, 0xffffff00], 'syzkaller0\x00', 'lo\x00', {}, {}, 0x2b, 0x1, 0x2, 0x23}, 0x0, 0xc8, 0x108}, @common=@inet=@TCPOPTSTRIP={0x40, 'TCPOPTSTRIP\x00', 0x0, {[0xe08d, 0x6, 0xff, 0x800, 0x2, 0x7, 0x0, 0x5]}}}, {{@uncond, 0x0, 0xf0, 0x118, 0x0, {}, [@common=@hl={0x28, 'hl\x00', 0x0, {0x3, 0x604}}]}, @common=@unspec=@STANDARD={0x28, '\x00', 0x0, 0xfffffffffffffffd}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x518) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = getpgrp(0x0) prlimit64(r2, 0x0, &(0x7f00000004c0)={0x0, 0x7ffffd}, &(0x7f00000002c0)) lremovexattr(0x0, &(0x7f0000000480)=@random={'trusted.', 'bpf\x00'}) getsockopt$inet_sctp_SCTP_PR_ASSOC_STATUS(0xffffffffffffffff, 0x84, 0x73, &(0x7f0000000280), 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r3 = syz_open_dev$amidi(&(0x7f0000000100)='/dev/amidi#\x00', 0x2, 0x800) recvfrom(0xffffffffffffffff, 0x0, 0x0, 0x20, &(0x7f00000005c0)=@ipx={0x4, 0x1, 0x6, "6b183128f377"}, 0x80) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000200)='./file0\x00', 0x700, 0x0, &(0x7f00000024c0), 0x100032, &(0x7f00000000c0)=ANY=[@ANYBLOB]) getsockopt$inet_dccp_int(0xffffffffffffffff, 0x21, 0xf, &(0x7f0000000240), 0x0) fstat(0xffffffffffffffff, &(0x7f00000006c0)) getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, &(0x7f0000000440)={0x0, 0x80}, &(0x7f00000001c0)=0xfffffffffffffd3f) ioctl$FICLONE(r1, 0x40049409, r3) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000680)=@srh={0xbf, 0x4, 0x4, 0x2, 0x90ad, 0x20, 0x996a, [@ipv4={[], [], @remote}, @loopback]}, 0x28) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, 0x0) 14:18:39 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x3, &(0x7f0000001fd8)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x15}}, &(0x7f0000000080)="47504c049c3514bf772da07ae82e76590a36f6493ec1ab91b397e42abf1ea6cd8cd77427fc9a9e2b7165f52b4107bf0850d899dc52d013175ddb1b2f46203c2a10b722e33e556fb2e3f39a3cde1fca53640337ec956146bdbfcb115070195631de5d21a5ea9e638c2bdb78a501ca4b6ea313d82568f9382c2c3f6faba6b4ee54793b4ed26dae3e52225029bb2ac0007f77754c3f23ceda9809b9a9684a940abcaa8cfcc7133ec422e9c83888318d41e9a493f0195fe2599651b89504f5dba14625ce2366f33d95dba92f867279cabf4aceddc85a8af7a0fa68d767ce5136b9d0d1966c499cb6bf34c2988666970000000000000000000000"}, 0x48) 14:18:39 executing program 3: lstat(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0}) lstat(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0}) syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000040)='./file0\x00', 0xb102b8700, 0x3, &(0x7f0000000240)=[{&(0x7f0000000080)="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", 0xfc, 0x8}, {&(0x7f0000000180)="6e4fae343fcbe75f750edab4ffe869cf59917854f4c0064b2fefb89db71f83a1dbd85e8720426ce6dac8c1d994bda6e76d23aafb8234e65dd6ce69b85ba473a42f9a10", 0x43, 0x3ff}, {&(0x7f0000000200)="0cf1e6962e8e09a410cd9d6a8b06436370074e01970a", 0x16, 0xf453}], 0x10000, &(0x7f0000000440)={[{@quota_off='quota=off'}, {@noloccookie='noloccookie'}, {@quota_quantum={'quota_quantum', 0x3d, 0x7fffffff}}, {@rgrplvb='rgrplvb'}, {@rgrplvb='rgrplvb'}], [{@smackfshat={'smackfshat', 0x3d, "7db3706f7369785f61636c5f6163636573732e"}}, {@fowner_lt={'fowner<', r0}}, {@smackfsroot={'smackfsroot'}}, {@fsuuid={'fsuuid', 0x3d, {[0x62, 0x7d, 0x32, 0x66, 0x32, 0x38, 0x77, 0x77], 0x2d, [0x37, 0x38, 0x77, 0x77], 0x2d, [0x66, 0x62, 0x73, 0x7d], 0x2d, [0x33, 0x36, 0x67, 0x30], 0x2d, [0x36, 0x63, 0x67, 0x54a07f1fb49ecd59, 0x38, 0x77, 0x77, 0x7f]}}}, {@fowner_lt={'fowner<', r1}}, {@obj_user={'obj_user', 0x3d, 'self^md5sum'}}, {@smackfstransmute={'smackfstransmute', 0x3d, '[-/em0'}}, {@obj_type={'obj_type', 0x3d, '\':/{vboxnet1em0selinuxsecurityvmnet1.'}}]}) clone(0xc2b321c6db9081df, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) [ 2704.337431] hfs: can't find a HFS filesystem on dev loop2 [ 2704.345842] IPVS: ftp: loaded support on port[0] = 21 14:18:39 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x3, &(0x7f0000001fd8)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x15}}, &(0x7f0000000080)="47504c049c3514bf772da07ae82e76590a36f6493ec1ab91b397e42abf1ea6cd8cd77427fc9a9e2b7165f52b4107bf0850d899dc52d013175ddb1b2f46203c2a04b722e33e556fb2e3f39a3cde1fca53640337ec956146bdbfcb115070195631de5d21a5ea9e638c2bdb78a501ca4b6ea313d82568f9382c2c3f6faba6b4ee54793b4ed26dae3e52225029bb2ac0007f77754c3f23ceda9809b9a9684a940abcaa8cfcc7133ec422e9c83888318d41e9a493f0195fe2599651b89504f5dba14625ce2366f33d95dba92f867279cabf4aceddc85a8af7a0fa68d767ce5136b9d0d1966c499cb6bf34c2988666970000000000000000000000"}, 0x48) [ 2704.498362] gfs2: invalid mount option: fowner<00000000000000000000 14:18:39 executing program 2: getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) syz_mount_image$hfs(&(0x7f0000000200)='hfs\x00', &(0x7f0000000280)='./file0\x00', 0x1f000000, 0x0, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) [ 2704.549075] gfs2: can't parse mount arguments [ 2704.651634] IPVS: ftp: loaded support on port[0] = 21 14:18:39 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x3, &(0x7f0000001fd8)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x15}}, &(0x7f0000000080)="47504c049c3514bf772da07ae82e76590a36f6493ec1ab91b397e42abf1ea6cd8cd77427fc9a9e2b7165f52b4107bf0850d899dc52d013175ddb1b2f46203c2a13b722e33e556fb2e3f39a3cde1fca53640337ec956146bdbfcb115070195631de5d21a5ea9e638c2bdb78a501ca4b6ea313d82568f9382c2c3f6faba6b4ee54793b4ed26dae3e52225029bb2ac0007f77754c3f23ceda9809b9a9684a940abcaa8cfcc7133ec422e9c83888318d41e9a493f0195fe2599651b89504f5dba14625ce2366f33d95dba92f867279cabf4aceddc85a8af7a0fa68d767ce5136b9d0d1966c499cb6bf34c2988666970000000000000000000000"}, 0x48) [ 2704.745129] hfs: can't find a HFS filesystem on dev loop2 14:18:39 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x3, &(0x7f0000001fd8)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x15}}, &(0x7f0000000080)="47504c049c3514bf772da07ae82e76590a36f6493ec1ab91b397e42abf1ea6cd8cd77427fc9a9e2b7165f52b4107bf0850d899dc52d013175ddb1b2f46203c2a14b722e33e556fb2e3f39a3cde1fca53640337ec956146bdbfcb115070195631de5d21a5ea9e638c2bdb78a501ca4b6ea313d82568f9382c2c3f6faba6b4ee54793b4ed26dae3e52225029bb2ac0007f77754c3f23ceda9809b9a9684a940abcaa8cfcc7133ec422e9c83888318d41e9a493f0195fe2599651b89504f5dba14625ce2366f33d95dba92f867279cabf4aceddc85a8af7a0fa68d767ce5136b9d0d1966c499cb6bf34c2988666970000000000000000000000"}, 0x48) 14:18:39 executing program 1: r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/expire_quiescent_template\x00', 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000140)=@security={'security\x00', 0xe, 0x4, 0x4e0, 0x1f0, 0x320, 0x0, 0x320, 0x320, 0x438, 0x438, 0x438, 0x438, 0x438, 0x4, &(0x7f0000000100), {[{{@ipv6={@local, @local, [0x0, 0xffffff00, 0xffffffff, 0xffffff00], [0xffffffff, 0xff, 0xffffffff, 0xff], 'eql\x00', 'gretap0\x00', {}, {0xff}, 0x0, 0x7fffffff, 0x2, 0x61}, 0x0, 0x188, 0x1c8, 0x0, {}, [@common=@unspec=@conntrack2={0xc0, 'conntrack\x00', 0x2, {{@ipv4=@loopback, [0xffffffff, 0xffffffff, 0x0, 0xffffffff], @ipv4=@loopback, [0x0, 0xffffffff, 0xffffff00, 0xff000000], @ipv6=@ipv4={[], [], @remote}, [0xffffff00, 0xff000000, 0xff000000, 0xff], @ipv4=@multicast2, [0xffffffff, 0xff, 0xff0000ff], 0x3, 0x1ff, 0x4, 0x4e21, 0x4e20, 0x4e22, 0x4e20, 0x28, 0x20}, 0x1c0, 0x98}}]}, @common=@unspec=@ERROR={0x40, 'ERROR\x00', 0x0, "f650bd5c77822a55c077a2b3078812467f4ab9fefc372cf333baff203cdb"}}, {{@ipv6={@remote, @mcast2, [0xff000000, 0xffffff00, 0xffffffff, 0xff000000], [0x0, 0xff, 0xff000000, 0xffffff00], 'syzkaller0\x00', 'lo\x00', {}, {0xff}, 0x2b, 0x1, 0x2, 0x23}, 0x0, 0xf0, 0x130, 0x0, {}, [@common=@hl={0x28, 'hl\x00'}]}, @common=@inet=@TCPOPTSTRIP={0x40, 'TCPOPTSTRIP\x00', 0x0, {[0xe08d, 0x6, 0xff, 0x800, 0x2, 0x7, 0x3, 0x5]}}}, {{@uncond, 0x0, 0xf0, 0x118, 0x0, {}, [@common=@hl={0x28, 'hl\x00', 0x0, {0x3, 0x604}}]}, @common=@unspec=@STANDARD={0x28, '\x00', 0x0, 0xfffffffffffffffd}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x540) ioctl$EXT4_IOC_MIGRATE(r0, 0x6609) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000300)={0x0}, &(0x7f0000000400)=0xc) getsockopt$ARPT_SO_GET_INFO(r0, 0x0, 0x60, &(0x7f0000000740)={'filter\x00'}, &(0x7f00000007c0)=0x44) r3 = getpgrp(r2) prlimit64(r3, 0x0, &(0x7f00000004c0)={0x0, 0x7ffffd}, &(0x7f00000002c0)) lremovexattr(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000480)=@random={'trusted.', 'bpf\x00'}) getsockopt$inet_sctp_SCTP_PR_ASSOC_STATUS(0xffffffffffffffff, 0x84, 0x73, &(0x7f0000000280)={0x0, 0x8, 0x0, 0xe0}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r5 = syz_open_dev$amidi(&(0x7f0000000100)='/dev/amidi#\x00', 0x2, 0x800) recvfrom(r5, &(0x7f0000000500)=""/96, 0x60, 0x20, &(0x7f00000005c0)=@ipx={0x4, 0x1, 0x6, "6b183128f377"}, 0x80) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000200)='./file0\x00', 0x700, 0x0, &(0x7f00000024c0), 0x100032, &(0x7f0000000880)=ANY=[@ANYBLOB="90efdf3ab39d3078c6f064fcbe6eb9b928d2f861efa32c19a7e5554ea5c6f9d9645698bdec80dddc4100b05c98c637862e91a9a3bcf2419c207e728e79c5c5c8e91e283d2a068fbdf2e7e698a1d447dc4245233cdcb653feb252b338538a861e52582703c46a1a55a132e40b6e182bf13b3e4c44"]) prctl$PR_MPX_ENABLE_MANAGEMENT(0x2b) getsockopt$inet_dccp_int(0xffffffffffffffff, 0x21, 0xf, &(0x7f0000000240), 0x0) fstat(0xffffffffffffffff, &(0x7f00000006c0)) getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, &(0x7f0000000440)={0x0, 0x80}, &(0x7f00000001c0)=0xfffffffffffffd3f) ioctl$FICLONE(r1, 0x40049409, r5) setgroups(0x3, &(0x7f0000000340)=[0x0, 0x0, 0x0]) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(r0, 0x84, 0x1a, &(0x7f0000000800)={r4, 0x5f, "702570924f401ba17c9fea75e763668a9bde6d8596a349f55bf38fd6ba09680d922a4f01fd7611769826888293f8d5ce2338130c96ce7122482e7c98aa3ea55a3cb6f98be1bcd5e5cb8bbd0d885cccb132663ee35121dbe1fcd1b4110199ef"}, &(0x7f0000000680)=0x67) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, 0x0) 14:18:39 executing program 2: getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) syz_mount_image$hfs(&(0x7f0000000200)='hfs\x00', &(0x7f0000000280)='./file0\x00', 0x4000000, 0x0, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 14:18:39 executing program 0: r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/expire_quiescent_template\x00', 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000140)=@security={'security\x00', 0xe, 0x4, 0x4b8, 0x1f0, 0x320, 0x0, 0x320, 0x320, 0x438, 0x438, 0x438, 0x438, 0x438, 0x4, &(0x7f0000000100), {[{{@ipv6={@local, @local, [0x0, 0x0, 0xffffffff, 0xffffff00], [0xffffffff, 0xff, 0xffffffff, 0xff], 'eql\x00', 'gretap0\x00', {}, {0xff}, 0x0, 0x7fffffff, 0x2, 0x61}, 0x0, 0x188, 0x1c8, 0x0, {}, [@common=@unspec=@conntrack2={0xc0, 'conntrack\x00', 0x2, {{@ipv4=@loopback, [0xffffffff, 0xffffffff, 0x0, 0xffffffff], @ipv4=@loopback, [0x0, 0xffffffff, 0xffffff00, 0xff000000], @ipv6=@ipv4={[], [], @remote}, [0xffffff00, 0xff000000, 0xff000000, 0xff], @ipv4=@multicast2, [0xffffffff, 0xff, 0xff0000ff], 0x3, 0x1ff, 0x4, 0x4e21, 0x4e20, 0x4e22, 0x4e20, 0x28}, 0x1c0, 0x98}}]}, @common=@unspec=@ERROR={0x40, 'ERROR\x00', 0x0, "f650bd5c77822a55c077a2b3078812467f4ab9fefc372cf333baff203cdb"}}, {{@ipv6={@remote, @mcast2, [0xff000000, 0xffffff00, 0xffffffff, 0xff000000], [0x0, 0xff, 0xff000000, 0xffffff00], 'syzkaller0\x00', 'lo\x00', {}, {}, 0x2b, 0x1, 0x2, 0x23}, 0x0, 0xc8, 0x108}, @common=@inet=@TCPOPTSTRIP={0x40, 'TCPOPTSTRIP\x00', 0x0, {[0xe08d, 0x6, 0xff, 0x800, 0x2, 0x7, 0x0, 0x5]}}}, {{@uncond, 0x0, 0xf0, 0x118, 0x0, {}, [@common=@hl={0x28, 'hl\x00', 0x0, {0x3, 0x604}}]}, @common=@unspec=@STANDARD={0x28, '\x00', 0x0, 0xfffffffffffffffd}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x518) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpgrp(0x0) r2 = creat(&(0x7f0000000780)='./file0\x00', 0x80) prlimit64(r1, 0x0, &(0x7f00000004c0)={0x0, 0x7ffffd}, &(0x7f00000002c0)) lremovexattr(0x0, &(0x7f0000000480)=@random={'trusted.', 'bpf\x00'}) getsockopt$inet_sctp_SCTP_PR_ASSOC_STATUS(0xffffffffffffffff, 0x84, 0x73, &(0x7f0000000280), 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r3 = syz_open_dev$amidi(&(0x7f0000000100)='/dev/amidi#\x00', 0x2, 0x800) recvfrom(0xffffffffffffffff, 0x0, 0x0, 0x20, &(0x7f00000005c0)=@ipx={0x4, 0x1, 0x6, "6b183128f377"}, 0x80) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000200)='./file0\x00', 0x700, 0x0, &(0x7f00000024c0), 0x100032, &(0x7f00000000c0)=ANY=[@ANYBLOB]) getsockopt$inet_dccp_int(0xffffffffffffffff, 0x21, 0xf, &(0x7f0000000240), 0x0) fstat(0xffffffffffffffff, &(0x7f00000006c0)) getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, &(0x7f0000000440)={0x0, 0x80}, &(0x7f00000001c0)=0xfffffffffffffd3f) ioctl$FICLONE(r2, 0x40049409, r2) ioctl$DRM_IOCTL_ADD_CTX(r3, 0xc0086420, &(0x7f0000000680)={0x0}) ioctl$DRM_IOCTL_RM_CTX(r0, 0xc0086421, &(0x7f0000000740)={r4, 0x1}) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, 0x0) 14:18:39 executing program 4: r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/expire_quiescent_template\x00', 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000140)=@security={'security\x00', 0xe, 0x4, 0x4b8, 0x1f0, 0x320, 0x0, 0x320, 0x320, 0x438, 0x438, 0x438, 0x438, 0x438, 0x4, &(0x7f0000000100), {[{{@ipv6={@local, @local, [0x0, 0x0, 0xffffffff, 0xffffff00], [0xffffffff, 0xff, 0xffffffff, 0xff], 'eql\x00', 'gretap0\x00', {}, {0xff}, 0x0, 0x7fffffff, 0x2, 0x61}, 0x0, 0x188, 0x1c8, 0x0, {}, [@common=@unspec=@conntrack2={0xc0, 'conntrack\x00', 0x2, {{@ipv4=@loopback, [0xffffffff, 0xffffffff, 0x0, 0xffffffff], @ipv4=@loopback, [0x0, 0xffffffff, 0xffffff00, 0xff000000], @ipv6=@ipv4={[], [], @remote}, [0xffffff00, 0xff000000, 0xff000000, 0xff], @ipv4=@multicast2, [0xffffffff, 0xff, 0xff0000ff], 0x3, 0x1ff, 0x4, 0x4e21, 0x4e20, 0x4e22, 0x4e20, 0x28}, 0x1c0, 0x98}}]}, @common=@unspec=@ERROR={0x40, 'ERROR\x00', 0x0, "f650bd5c77822a55c077a2b3078812467f4ab9fefc372cf333baff203cdb"}}, {{@ipv6={@remote, @mcast2, [0xff000000, 0xffffff00, 0xffffffff, 0xff000000], [0x0, 0xff, 0xff000000, 0xffffff00], 'syzkaller0\x00', 'lo\x00', {}, {}, 0x2b, 0x1, 0x2, 0x23}, 0x0, 0xc8, 0x108}, @common=@inet=@TCPOPTSTRIP={0x40, 'TCPOPTSTRIP\x00', 0x0, {[0xe08d, 0x6, 0xff, 0x800, 0x2, 0x7, 0x0, 0x5]}}}, {{@uncond, 0x0, 0xf0, 0x118, 0x0, {}, [@common=@hl={0x28, 'hl\x00', 0x0, {0x3, 0x604}}]}, @common=@unspec=@STANDARD={0x28, '\x00', 0x0, 0xfffffffffffffffd}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x518) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = getpgrp(0x0) prlimit64(r2, 0x0, &(0x7f00000004c0)={0x0, 0x7ffffd}, &(0x7f00000002c0)) lremovexattr(0x0, &(0x7f0000000480)=@random={'trusted.', 'bpf\x00'}) getsockopt$inet_sctp_SCTP_PR_ASSOC_STATUS(0xffffffffffffffff, 0x84, 0x73, &(0x7f0000000280), 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r3 = syz_open_dev$amidi(&(0x7f0000000100)='/dev/amidi#\x00', 0x2, 0x800) recvfrom(0xffffffffffffffff, 0x0, 0x0, 0x20, &(0x7f00000005c0)=@ipx={0x4, 0x1, 0x6, "6b183128f377"}, 0x80) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000200)='./file0\x00', 0x700, 0x0, &(0x7f00000024c0), 0x100032, &(0x7f0000000680)=ANY=[@ANYBLOB="bf449dcf6021a97220a1bc3d7fbe6f47c852a2f3e8a27535bd018620e7d85bc71f50352f9a1696a50e6206dfd0ed215cb930c13988e1887f20c8"]) getsockopt$inet_dccp_int(0xffffffffffffffff, 0x21, 0xf, &(0x7f0000000240), 0x0) fstat(0xffffffffffffffff, &(0x7f00000006c0)) getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, &(0x7f0000000440)={0x0, 0x80}, &(0x7f00000001c0)=0xfffffffffffffd3f) ioctl$FICLONE(r1, 0x40049409, r3) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, 0x0) 14:18:39 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x3, &(0x7f0000001fd8)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x15}}, &(0x7f0000000080)="47504c049c3514bf772da07ae82e76590a36f6493ec1ab91b397e42abf1ea6cd8cd77427fc9a9e2b7165f52b4107bf0850d899dc52d013175ddb1b2f46203c2a03b722e33e556fb2e3f39a3cde1fca53640337ec956146bdbfcb115070195631de5d21a5ea9e638c2bdb78a501ca4b6ea313d82568f9382c2c3f6faba6b4ee54793b4ed26dae3e52225029bb2ac0007f77754c3f23ceda9809b9a9684a940abcaa8cfcc7133ec422e9c83888318d41e9a493f0195fe2599651b89504f5dba14625ce2366f33d95dba92f867279cabf4aceddc85a8af7a0fa68d767ce5136b9d0d1966c499cb6bf34c2988666970000000000000000000000"}, 0x48) [ 2705.133472] gfs2: invalid mount option: fowner<00000000000000000000 [ 2705.151732] hfs: can't find a HFS filesystem on dev loop2 [ 2705.194745] gfs2: can't parse mount arguments 14:18:40 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x3, &(0x7f0000001fd8)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x15}}, &(0x7f0000000080)="47504c049c3514bf772da07ae82e76590a36f6493ec1ab91b397e42abf1ea6cd8cd77427fc9a9e2b7165f52b4107bf0850d899dc52d013175ddb1b2f46203c2a0cb722e33e556fb2e3f39a3cde1fca53640337ec956146bdbfcb115070195631de5d21a5ea9e638c2bdb78a501ca4b6ea313d82568f9382c2c3f6faba6b4ee54793b4ed26dae3e52225029bb2ac0007f77754c3f23ceda9809b9a9684a940abcaa8cfcc7133ec422e9c83888318d41e9a493f0195fe2599651b89504f5dba14625ce2366f33d95dba92f867279cabf4aceddc85a8af7a0fa68d767ce5136b9d0d1966c499cb6bf34c2988666970000000000000000000000"}, 0x48) 14:18:40 executing program 2: getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) syz_mount_image$hfs(&(0x7f0000000200)='hfs\x00', &(0x7f0000000280)='./file0\x00', 0xf5ffffff, 0x0, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 14:18:40 executing program 3: prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, &(0x7f0000000180)) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='cpuacct.usage_user\x00', 0x0, 0x0) ioctl$KVM_GET_TSC_KHZ(r0, 0xaea3) ioctl$FS_IOC_SETFSLABEL(r0, 0x41009432, &(0x7f0000000040)="e426a9b72354a8b6aab4a472af7401b304f8b15fc0b5f043ea6627ffcfd139cdf36ce2f3c624c05733a4ae3e680401ec12064c48a40c167ad92815fbc7bbb012b5aedc2d77bfc6b7acab2934b24439d9894dead9d232fa07aa42449776e99109c587c5e7e651a1aebb2f46c6094b8ee7ba202cdab917dd341db00abb3800beb7feb397b7f9e9beb72bc364163b4da61a5af1a648c5585c364156384007a0eeaf5b87fbe9cf9d36a25c3acd16cb98d39716df0b52f57913ae35b38394b8776b1c86b55bbac6d8a62dd70d4fa4373305894dbdbdcca8098bf1b3cba5db929bbbaa74e0c2b6dc1afd63284a98227ed77d2b01730da5136a3ceb721e5e8b0c4d0cf4") 14:18:40 executing program 1: r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/expire_quiescent_template\x00', 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000140)=@security={'security\x00', 0xe, 0x4, 0x4e0, 0x1f0, 0x320, 0x0, 0x320, 0x320, 0x438, 0x438, 0x438, 0x438, 0x438, 0x4, &(0x7f0000000100), {[{{@ipv6={@local, @local, [0x0, 0xffffff00, 0xffffffff, 0xffffff00], [0xffffffff, 0xff, 0xffffffff, 0xff], 'eql\x00', 'gretap0\x00', {}, {0xff}, 0x0, 0x7fffffff, 0x2, 0x61}, 0x0, 0x188, 0x1c8, 0x0, {}, [@common=@unspec=@conntrack2={0xc0, 'conntrack\x00', 0x2, {{@ipv4=@loopback, [0xffffffff, 0xffffffff, 0x0, 0xffffffff], @ipv4=@loopback, [0x0, 0xffffffff, 0xffffff00, 0xff000000], @ipv6=@ipv4={[], [], @remote}, [0xffffff00, 0xff000000, 0xff000000, 0xff], @ipv4=@multicast2, [0xffffffff, 0xff, 0xff0000ff], 0x3, 0x1ff, 0x4, 0x4e21, 0x4e20, 0x4e22, 0x4e20, 0x28, 0x20}, 0x1c0, 0x98}}]}, @common=@unspec=@ERROR={0x40, 'ERROR\x00', 0x0, "f650bd5c77822a55c077a2b3078812467f4ab9fefc372cf333baff203cdb"}}, {{@ipv6={@remote, @mcast2, [0xff000000, 0xffffff00, 0xffffffff, 0xff000000], [0x0, 0xff, 0xff000000, 0xffffff00], 'syzkaller0\x00', 'lo\x00', {}, {0xff}, 0x2b, 0x1, 0x2, 0x23}, 0x0, 0xf0, 0x130, 0x0, {}, [@common=@hl={0x28, 'hl\x00'}]}, @common=@inet=@TCPOPTSTRIP={0x40, 'TCPOPTSTRIP\x00', 0x0, {[0xe08d, 0x6, 0xff, 0x800, 0x2, 0x7, 0x3, 0x5]}}}, {{@uncond, 0x0, 0xf0, 0x118, 0x0, {}, [@common=@hl={0x28, 'hl\x00', 0x0, {0x3, 0x604}}]}, @common=@unspec=@STANDARD={0x28, '\x00', 0x0, 0xfffffffffffffffd}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x540) ioctl$EXT4_IOC_MIGRATE(0xffffffffffffffff, 0x6609) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000300)={0x0}, &(0x7f0000000400)=0xc) getsockopt$ARPT_SO_GET_INFO(r0, 0x0, 0x60, &(0x7f0000000740)={'filter\x00'}, &(0x7f00000007c0)=0x44) r3 = getpgrp(r2) prlimit64(r3, 0x0, &(0x7f00000004c0)={0x0, 0x7ffffd}, &(0x7f00000002c0)) lremovexattr(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000480)=@random={'trusted.', 'bpf\x00'}) getsockopt$inet_sctp_SCTP_PR_ASSOC_STATUS(0xffffffffffffffff, 0x84, 0x73, &(0x7f0000000280)={0x0, 0x8, 0x0, 0xe0}, 0x0) mkdir(&(0x7f0000000680)='./file0\x00', 0x0) r4 = syz_open_dev$amidi(&(0x7f0000000100)='/dev/amidi#\x00', 0x2, 0x800) recvfrom(r4, &(0x7f0000000500)=""/96, 0x60, 0x20, &(0x7f00000005c0)=@ipx={0x4, 0x1, 0x6, "6b183128f377"}, 0x80) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000200)='./file0\x00', 0x700, 0x0, &(0x7f00000024c0), 0x100032, &(0x7f00000000c0)=ANY=[@ANYBLOB]) prctl$PR_MPX_ENABLE_MANAGEMENT(0x2b) getsockopt$inet_dccp_int(0xffffffffffffffff, 0x21, 0xf, &(0x7f0000000240), 0x0) fstat(0xffffffffffffffff, &(0x7f00000006c0)) getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, &(0x7f0000000440)={0x0, 0x80}, &(0x7f00000001c0)=0xfffffffffffffd3f) ioctl$FICLONE(r1, 0x40049409, r4) setgroups(0x3, &(0x7f0000000340)=[0x0, 0x0, 0x0]) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, 0x0) [ 2705.447912] hfs: can't find a HFS filesystem on dev loop2 14:18:40 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x3, &(0x7f0000001fd8)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x15}}, &(0x7f0000000080)="47504c049c3514bf772da07ae82e76590a36f6493ec1ab91b397e42abf1ea6cd8cd77427fc9a9e2b7165f52b4107bf0850d899dc52d013175ddb1b2f46203c2a0bb722e33e556fb2e3f39a3cde1fca53640337ec956146bdbfcb115070195631de5d21a5ea9e638c2bdb78a501ca4b6ea313d82568f9382c2c3f6faba6b4ee54793b4ed26dae3e52225029bb2ac0007f77754c3f23ceda9809b9a9684a940abcaa8cfcc7133ec422e9c83888318d41e9a493f0195fe2599651b89504f5dba14625ce2366f33d95dba92f867279cabf4aceddc85a8af7a0fa68d767ce5136b9d0d1966c499cb6bf34c2988666970000000000000000000000"}, 0x48) [ 2705.561315] hfs: can't find a HFS filesystem on dev loop2 14:18:40 executing program 4: r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/expire_quiescent_template\x00', 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000140)=@security={'security\x00', 0xe, 0x4, 0x4b8, 0x1f0, 0x320, 0x0, 0x320, 0x320, 0x438, 0x438, 0x438, 0x438, 0x438, 0x4, &(0x7f0000000100), {[{{@ipv6={@local, @local, [0x0, 0x0, 0xffffffff, 0xffffff00], [0xffffffff, 0xff, 0xffffffff, 0xff], 'eql\x00', 'gretap0\x00', {}, {0xff}, 0x0, 0x7fffffff, 0x2, 0x61}, 0x0, 0x188, 0x1c8, 0x0, {}, [@common=@unspec=@conntrack2={0xc0, 'conntrack\x00', 0x2, {{@ipv4=@loopback, [0xffffffff, 0xffffffff, 0x0, 0xffffffff], @ipv4=@loopback, [0x0, 0xffffffff, 0xffffff00, 0xff000000], @ipv6=@ipv4={[], [], @remote}, [0xffffff00, 0xff000000, 0xff000000, 0xff], @ipv4=@multicast2, [0xffffffff, 0xff, 0xff0000ff], 0x3, 0x1ff, 0x4, 0x4e21, 0x4e20, 0x4e22, 0x4e20, 0x28}, 0x1c0, 0x98}}]}, @common=@unspec=@ERROR={0x40, 'ERROR\x00', 0x0, "f650bd5c77822a55c077a2b3078812467f4ab9fefc372cf333baff203cdb"}}, {{@ipv6={@remote, @mcast2, [0xff000000, 0xffffff00, 0xffffffff, 0xff000000], [0x0, 0xff, 0xff000000, 0xffffff00], 'syzkaller0\x00', 'lo\x00', {}, {}, 0x2b, 0x1, 0x2, 0x23}, 0x0, 0xc8, 0x108}, @common=@inet=@TCPOPTSTRIP={0x40, 'TCPOPTSTRIP\x00', 0x0, {[0xe08d, 0x6, 0xff, 0x800, 0x2, 0x7, 0x0, 0x5]}}}, {{@uncond, 0x0, 0xf0, 0x118, 0x0, {}, [@common=@hl={0x28, 'hl\x00', 0x0, {0x3, 0x604}}]}, @common=@unspec=@STANDARD={0x28, '\x00', 0x0, 0xfffffffffffffffd}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x518) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) symlink(&(0x7f0000000680)='./file0\x00', &(0x7f0000000740)='./file0\x00') r2 = getpgrp(0x0) prlimit64(r2, 0x0, &(0x7f00000004c0)={0x0, 0x7ffffd}, &(0x7f00000002c0)) lremovexattr(0x0, &(0x7f0000000480)=@random={'trusted.', 'bpf\x00'}) getsockopt$inet_sctp_SCTP_PR_ASSOC_STATUS(0xffffffffffffffff, 0x84, 0x73, &(0x7f0000000280), 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r3 = syz_open_dev$amidi(&(0x7f0000000100)='/dev/amidi#\x00', 0x2, 0x800) recvfrom(0xffffffffffffffff, 0x0, 0x0, 0x20, &(0x7f00000005c0)=@ipx={0x4, 0x1, 0x6, "6b183128f377"}, 0x80) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000200)='./file0\x00', 0x700, 0x0, &(0x7f00000024c0), 0x100032, &(0x7f00000000c0)=ANY=[@ANYBLOB]) getsockopt$inet_dccp_int(0xffffffffffffffff, 0x21, 0xf, &(0x7f0000000240), 0x0) fstat(0xffffffffffffffff, &(0x7f00000006c0)) getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, &(0x7f0000000440)={0x0, 0x80}, &(0x7f00000001c0)=0xfffffffffffffd3f) ioctl$FICLONE(r1, 0x40049409, r3) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, 0x0) 14:18:40 executing program 2: getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) syz_mount_image$hfs(&(0x7f0000000200)='hfs\x00', &(0x7f0000000280)='./file0\x00', 0x300, 0x0, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 14:18:40 executing program 3: r0 = syz_open_dev$dspn(&(0x7f0000000040)='/dev/dsp#\x00', 0xffffffff, 0x2) setsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(r0, 0x84, 0x13, &(0x7f0000000080)=0xc432, 0x4) clone(0xc2b321c6db9081df, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vga_arbiter\x00', 0x101002, 0x0) getsockopt$inet_sctp6_SCTP_NODELAY(r1, 0x84, 0x3, &(0x7f00000000c0), &(0x7f0000000100)=0x4) 14:18:40 executing program 0: lstat(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0}) lstat(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0}) syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000040)='./file0\x00', 0xb102b8700, 0x3, &(0x7f0000000240)=[{&(0x7f0000000080)="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", 0xfc, 0x8}, {&(0x7f0000000180)="6e4fae343fcbe75f750edab4ffe869cf59917854f4c0064b2fefb89db71f83a1dbd85e8720426ce6dac8c1d994bda6e76d23aafb8234e65dd6ce69b85ba473a42f9a10", 0x43, 0x3ff}, {&(0x7f0000000200)="0cf1e6962e8e09a410cd9d6a8b06436370074e01970a", 0x16, 0xf453}], 0x10000, &(0x7f0000000440)={[{@quota_off='quota=off'}, {@noloccookie='noloccookie'}, {@quota_quantum={'quota_quantum', 0x3d, 0x7fffffff}}, {@rgrplvb='rgrplvb'}, {@rgrplvb='rgrplvb'}], [{@smackfshat={'smackfshat', 0x3d, "7db3706f7369785f61636c5f6163636573732e"}}, {@fowner_lt={'fowner<', r0}}, {@smackfsroot={'smackfsroot'}}, {@fsuuid={'fsuuid', 0x3d, {[0x62, 0x7d, 0x32, 0x66, 0x32, 0x38, 0x77, 0x77], 0x2d, [0x37, 0x38, 0x77, 0x77], 0x2d, [0x66, 0x62, 0x73, 0x7d], 0x2d, [0x33, 0x36, 0x67, 0x30], 0x2d, [0x36, 0x63, 0x67, 0x54a07f1fb49ecd59, 0x38, 0x77, 0x77, 0x7f]}}}, {@fowner_lt={'fowner<', r1}}, {@obj_user={'obj_user', 0x3d, 'self^md5sum'}}, {@smackfstransmute={'smackfstransmute', 0x3d, '[-/em0'}}, {@obj_type={'obj_type', 0x3d, '\':/{vboxnet1em0selinuxsecurityvmnet1.'}}]}) clone(0xc2b321c6db9081df, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 14:18:40 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x3, &(0x7f0000001fd8)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x15}}, &(0x7f0000000080)="47504c049c3514bf772da07ae82e76590a36f6493ec1ab91b397e42abf1ea6cd8cd77427fc9a9e2b7165f52b4107bf0850d899dc52d013175ddb1b2f46203c2a12b722e33e556fb2e3f39a3cde1fca53640337ec956146bdbfcb115070195631de5d21a5ea9e638c2bdb78a501ca4b6ea313d82568f9382c2c3f6faba6b4ee54793b4ed26dae3e52225029bb2ac0007f77754c3f23ceda9809b9a9684a940abcaa8cfcc7133ec422e9c83888318d41e9a493f0195fe2599651b89504f5dba14625ce2366f33d95dba92f867279cabf4aceddc85a8af7a0fa68d767ce5136b9d0d1966c499cb6bf34c2988666970000000000000000000000"}, 0x48) [ 2705.761615] IPVS: ftp: loaded support on port[0] = 21 [ 2705.816378] hfs: can't find a HFS filesystem on dev loop2 14:18:40 executing program 1: r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/expire_quiescent_template\x00', 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000140)=ANY=[@ANYBLOB="73656375726974790000000000000000000000000000000000000000000000000e00000004000000e0040000f001000020030000000000002003000020030000380400003804000038040000380400003804000004000000", @ANYPTR=&(0x7f0000000100)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00'], @ANYBLOB="fe8000000000000000000000000000aafe8000000000000000000000000000aa00000000ffffff00ffffffffffffff00ffffffff000000ffffffffff000000ff65716c0000000000000000000000000067726574617030000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ff000000000000000000000000000000000000ff02610000000000000000000000000000008801c801000000000000000000000000000000000000000000000000c000636f6e6e747261636b0000000000000000000000000000000000000000027f000001000000000000000000000000ffffffffffffffff00000000ffffffff7f00000100000000000000000000000300000000ffffffffffffff00ff00000000000000000000000000ffffac1414bbffffff00ff000000ff000000000000ffe0000002000000000000000000000000ffffffff000000ffff0000ff0000000003000000ff01000004004e214e204e224e20280020000000c00198000000000040004552524f5200000000000000000000000000000000000000000000000000f650bd5c77822a55c077a2b3078812467f4ab9fefc372cf333baff203cdb0000fe8000000000000000000000000000bbff020000000000000000000000000001ff000000ffffff00ffffffffff00000000000000000000ffff000000ffffff0073797a6b616c6c6572300000000000006c6f0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ff000000000000000000000000000000002b00010223000000000000000000000000000000f00030010000000000000000000000000000000000000000000000002800686c00000000000000000000000000000000000000000000000000000000000000000000000040005443504f50545354524950000000000000000000000000000000000000008de0000006000000ff000000000800000200000007000000030000000500000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f00018010000000000000000000000000000000000000000000000002800686c0000000000000000000000000000000000000000000000000000000003040000000000002800000000000000000000000000000000000000000000000000000000000000fdffffff00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000cb0c7d833b62eaac000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a800d0000000000000000000000000000000000000000000000000002800000000000000000000000000000000000000000000000000000000000000feffffff00000000"], 0x540) ioctl$EXT4_IOC_MIGRATE(0xffffffffffffffff, 0x6609) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000300)={0x0}, &(0x7f0000000400)=0xc) getsockopt$ARPT_SO_GET_INFO(r0, 0x0, 0x60, &(0x7f0000000740)={'filter\x00'}, &(0x7f00000007c0)=0x44) r3 = getpgrp(r2) prlimit64(r3, 0x0, &(0x7f00000004c0)={0x0, 0x7ffffd}, &(0x7f00000002c0)) lremovexattr(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000680)=ANY=[@ANYBLOB="841f0000000000a142ef6000000000121093c5f789d8465652d3"]) getsockopt$inet_sctp_SCTP_PR_ASSOC_STATUS(0xffffffffffffffff, 0x84, 0x73, &(0x7f0000000280)={0x0, 0x8, 0x0, 0xe0}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r4 = syz_open_dev$amidi(&(0x7f0000000100)='/dev/amidi#\x00', 0x2, 0x800) mkdir(&(0x7f0000000800)='./file0\x00', 0x41) recvfrom(r4, &(0x7f0000000500)=""/96, 0x60, 0x20, &(0x7f00000005c0)=@ipx={0x4, 0x1, 0x6, "6b183128f377"}, 0x80) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) ioctl$sock_kcm_SIOCKCMCLONE(r4, 0x89e2, &(0x7f0000000840)={r4}) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000200)='./file0\x00', 0x700, 0x0, &(0x7f00000024c0), 0x100032, &(0x7f00000000c0)=ANY=[@ANYBLOB]) prctl$PR_MPX_ENABLE_MANAGEMENT(0x2b) getsockopt$inet_dccp_int(0xffffffffffffffff, 0x21, 0xf, &(0x7f0000000240), 0x0) fstat(0xffffffffffffffff, &(0x7f00000006c0)) getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, &(0x7f0000000440)={0x0, 0x80}, &(0x7f00000001c0)=0xfffffffffffffd3f) r6 = syz_genetlink_get_family_id$nbd(&(0x7f00000008c0)='nbd\x00') sendmsg$NBD_CMD_CONNECT(r5, &(0x7f0000000980)={&(0x7f0000000880)={0x10, 0x0, 0x0, 0x41}, 0xc, &(0x7f0000000940)={&(0x7f0000000900)={0x3c, r6, 0x402, 0x70bd2a, 0x25dfdbfb, {}, [@NBD_ATTR_DEAD_CONN_TIMEOUT={0xc, 0x8, 0x7}, @NBD_ATTR_INDEX={0x8, 0x1, 0x0}, @NBD_ATTR_INDEX={0x8, 0x1, 0x0}, @NBD_ATTR_BLOCK_SIZE_BYTES={0xc, 0x3, 0x7ff}]}, 0x3c}, 0x1, 0x0, 0x0, 0x20000000}, 0x80) ioctl$FICLONE(r1, 0x40049409, r4) setgroups(0x3, &(0x7f0000000340)=[0x0, 0x0, 0x0]) r7 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_MCAST_MSFILTER(r7, 0x0, 0x21, &(0x7f00000001c0)={0x0, {{0x2, 0x0, @multicast2}}}, 0x90) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, 0x0) 14:18:40 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x3, &(0x7f0000001fd8)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x15}}, &(0x7f0000000080)="47504c049c3514bf772da07ae82e76590a36f6493ec1ab91b397e42abf1ea6cd8cd77427fc9a9e2b7165f52b4107bf0850d899dc52d013175ddb1b2f46203c2a02b722e33e556fb2e3f39a3cde1fca53640337ec956146bdbfcb115070195631de5d21a5ea9e638c2bdb78a501ca4b6ea313d82568f9382c2c3f6faba6b4ee54793b4ed26dae3e52225029bb2ac0007f77754c3f23ceda9809b9a9684a940abcaa8cfcc7133ec422e9c83888318d41e9a493f0195fe2599651b89504f5dba14625ce2366f33d95dba92f867279cabf4aceddc85a8af7a0fa68d767ce5136b9d0d1966c499cb6bf34c2988666970000000000000000000000"}, 0x48) [ 2705.936975] hfs: can't find a HFS filesystem on dev loop2 [ 2705.968474] gfs2: invalid mount option: fowner<00000000000000000000 [ 2706.010075] gfs2: can't parse mount arguments 14:18:40 executing program 2: getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) syz_mount_image$hfs(&(0x7f0000000200)='hfs\x00', &(0x7f0000000280)='./file0\x00', 0x4c00, 0x0, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) [ 2706.096362] IPVS: ftp: loaded support on port[0] = 21 14:18:41 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x3, &(0x7f0000001fd8)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x15}}, &(0x7f0000000080)="47504c049c3514bf772da07ae82e76590a36f6493ec1ab91b397e42abf1ea6cd8cd77427fc9a9e2b7165f52b4107bf0850d899dc52d013175ddb1b2f46203c2a0eb722e33e556fb2e3f39a3cde1fca53640337ec956146bdbfcb115070195631de5d21a5ea9e638c2bdb78a501ca4b6ea313d82568f9382c2c3f6faba6b4ee54793b4ed26dae3e52225029bb2ac0007f77754c3f23ceda9809b9a9684a940abcaa8cfcc7133ec422e9c83888318d41e9a493f0195fe2599651b89504f5dba14625ce2366f33d95dba92f867279cabf4aceddc85a8af7a0fa68d767ce5136b9d0d1966c499cb6bf34c2988666970000000000000000000000"}, 0x48) [ 2706.124769] IPVS: ftp: loaded support on port[0] = 21 14:18:41 executing program 4: r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/expire_quiescent_template\x00', 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000740)=ANY=[@ANYBLOB="73656375726974790000000000000000000000000000000000000000000000000e00000004000000b8040000f001000020030000000000002003000020030000380400003804000038040000380400003804000004000000", @ANYPTR=&(0x7f0000000100)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00'], @ANYBLOB="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"], 0x518) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = getpgrp(0x0) prlimit64(r2, 0x0, &(0x7f00000004c0)={0x0, 0x7ffffd}, &(0x7f00000002c0)) lremovexattr(0x0, &(0x7f0000000480)=@random={'trusted.', 'bpf\x00'}) getsockopt$inet_sctp_SCTP_PR_ASSOC_STATUS(0xffffffffffffffff, 0x84, 0x73, &(0x7f0000000280), 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r3 = syz_open_dev$amidi(&(0x7f0000000100)='/dev/amidi#\x00', 0x2, 0x800) recvfrom(0xffffffffffffffff, 0x0, 0x0, 0x20, &(0x7f00000005c0)=@ipx={0x4, 0x1, 0x6, "6b183128f377"}, 0x80) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000200)='./file0\x00', 0x700, 0x0, &(0x7f00000024c0), 0x100032, &(0x7f0000000300)=ANY=[@ANYBLOB="76001f5c914135cdc1ec1f1fe91feb9bfadd832da84c1e3cf21ac1fb27bf42baed28aa65c53efa56528427d9a7311d5c96804233b033701819a1dca83ecb073a3ba7d8e8fd38911c5d2192649cbeaffac27b3e84a12881b577b1963bf8bc4eab96824ec18f2a0106c5df4eaeaf29028891f71cc06c3d360773cfa180370831157db5fec69c07854da264e365dca4b83dcf34806a2abec22101a4fe0a09db6966f391606aada9e1b5c424a3e5f71fb83de972544b77d3d5bde2d2d088028506031cc7ab76843b87eefa71ab14ea780e3ba7a6f3e1815c9f450652eda9175c9022862bbc78"]) getsockopt$inet_dccp_int(0xffffffffffffffff, 0x21, 0xf, &(0x7f0000000240), 0x0) fstat(0xffffffffffffffff, &(0x7f00000006c0)) getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, &(0x7f0000000440)={0x0, 0x80}, &(0x7f00000001c0)=0xffffffffffffffb4) ioctl$FICLONE(r1, 0x40049409, r3) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, 0x0) futex(&(0x7f0000000180), 0x1, 0x0, &(0x7f0000000400), &(0x7f0000000500), 0x0) [ 2706.295847] hfs: can't find a HFS filesystem on dev loop2 [ 2706.305667] EXT4-fs: 12 callbacks suppressed [ 2706.305697] EXT4-fs (sda1): Unrecognized mount option "./file0" or missing value 14:18:41 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x3, &(0x7f0000001fd8)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x15}}, &(0x7f0000000080)="47504c049c3514bf772da07ae82e76590a36f6493ec1ab91b397e42abf1ea6cd8cd77427fc9a9e2b7165f52b4107bf0850d899dc52d013175ddb1b2f46203c2a0ab722e33e556fb2e3f39a3cde1fca53640337ec956146bdbfcb115070195631de5d21a5ea9e638c2bdb78a501ca4b6ea313d82568f9382c2c3f6faba6b4ee54793b4ed26dae3e52225029bb2ac0007f77754c3f23ceda9809b9a9684a940abcaa8cfcc7133ec422e9c83888318d41e9a493f0195fe2599651b89504f5dba14625ce2366f33d95dba92f867279cabf4aceddc85a8af7a0fa68d767ce5136b9d0d1966c499cb6bf34c2988666970000000000000000000000"}, 0x48) [ 2706.400571] hfs: can't find a HFS filesystem on dev loop2 [ 2706.451522] EXT4-fs (sda1): Unrecognized mount option "./file0" or missing value 14:18:41 executing program 2: getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) syz_mount_image$hfs(&(0x7f0000000200)='hfs\x00', &(0x7f0000000280)='./file0\x00', 0x9, 0x0, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 14:18:41 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x3, &(0x7f0000001fd8)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x15}}, &(0x7f0000000080)="47504c049c3514bf772da07ae82e76590a36f6493ec1ab91b397e42abf1ea6cd8cd77427fc9a9e2b7165f52b4107bf0850d899dc52d013175ddb1b2f46203c2a05b722e33e5507b2e3f39a3cde1fca53640337ec956146bdbfcb115070195631de5d21a5ea9e638c2bdb78a501ca4b6ea313d82568f9382c2c3f6faba6b4ee54793b4ed26dae3e52225029bb2ac0007f77754c3f23ceda9809b9a9684a940abcaa8cfcc7133ec422e9c83888318d41e9a493f0195fe2599651b89504f5dba14625ce2366f33d95dba92f867279cabf4aceddc85a8af7a0fa68d767ce5136b9d0d1966c499cb6bf34c2988666970000000000000000000000"}, 0x48) [ 2706.691093] EXT4-fs (sda1): re-mounted. Opts: 14:18:41 executing program 1: r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/expire_quiescent_template\x00', 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000140)=@security={'security\x00', 0xe, 0x4, 0x4e0, 0x1f0, 0x320, 0x0, 0x320, 0x320, 0x438, 0x438, 0x438, 0x438, 0x438, 0x4, &(0x7f0000000100), {[{{@ipv6={@local, @local, [0x0, 0xffffff00, 0xffffffff, 0xffffff00], [0xffffffff, 0xff, 0xffffffff, 0xff], 'eql\x00', 'gretap0\x00', {}, {0xff}, 0x0, 0x7fffffff, 0x2, 0x61}, 0x0, 0x188, 0x1c8, 0x0, {}, [@common=@unspec=@conntrack2={0xc0, 'conntrack\x00', 0x2, {{@ipv4=@loopback, [0xffffffff, 0xffffffff, 0x0, 0xffffffff], @ipv4=@loopback, [0x0, 0xffffffff, 0xffffff00, 0xff000000], @ipv6=@ipv4={[], [], @remote}, [0xffffff00, 0xff000000, 0xff000000, 0xff], @ipv4=@multicast2, [0xffffffff, 0xff, 0xff0000ff], 0x3, 0x1ff, 0x4, 0x4e21, 0x4e20, 0x4e22, 0x4e20, 0x28, 0x20}, 0x1c0, 0x98}}]}, @common=@unspec=@ERROR={0x40, 'ERROR\x00', 0x0, "f650bd5c77822a55c077a2b3078812467f4ab9fefc372cf333baff203cdb"}}, {{@ipv6={@remote, @mcast2, [0xff000000, 0xffffff00, 0xffffffff, 0xff000000], [0x0, 0xff, 0xff000000, 0xffffff00], 'syzkaller0\x00', 'lo\x00', {}, {0xff}, 0x2b, 0x1, 0x2, 0x23}, 0x0, 0xf0, 0x130, 0x0, {}, [@common=@hl={0x28, 'hl\x00'}]}, @common=@inet=@TCPOPTSTRIP={0x40, 'TCPOPTSTRIP\x00', 0x0, {[0xe08d, 0x6, 0xff, 0x800, 0x2, 0x7, 0x3, 0x5]}}}, {{@uncond, 0x0, 0xf0, 0x118, 0x0, {}, [@common=@hl={0x28, 'hl\x00', 0x0, {0x3, 0x604}}]}, @common=@unspec=@STANDARD={0x28, '\x00', 0x0, 0xfffffffffffffffd}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x540) ioctl$EXT4_IOC_MIGRATE(0xffffffffffffffff, 0x6609) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000300)={0x0}, &(0x7f0000000400)=0xc) getsockopt$ARPT_SO_GET_INFO(r0, 0x0, 0x60, &(0x7f0000000740)={'filter\x00'}, &(0x7f00000007c0)=0x44) r3 = getpgrp(r2) prlimit64(r3, 0x0, &(0x7f00000004c0)={0x0, 0x7ffffd}, &(0x7f00000002c0)) lremovexattr(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000480)=@random={'trusted.', 'bpf\x00'}) getsockopt$inet_sctp_SCTP_PR_ASSOC_STATUS(0xffffffffffffffff, 0x84, 0x73, &(0x7f0000000280)={0x0, 0x8, 0x0, 0xe0}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r4 = syz_open_dev$amidi(&(0x7f0000000100)='/dev/amidi#\x00', 0x2, 0x800) recvfrom(r4, &(0x7f0000000500)=""/96, 0x60, 0x20, &(0x7f00000005c0)=@ipx={0x4, 0x1, 0x6, "6b183128f377"}, 0x80) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000200)='./file0\x00', 0x700, 0x0, &(0x7f00000024c0), 0x100032, &(0x7f00000000c0)=ANY=[@ANYBLOB]) prctl$PR_MPX_ENABLE_MANAGEMENT(0x2b) ioctl$TUNSETPERSIST(r4, 0x400454cb, 0x1) getsockopt$inet_dccp_int(0xffffffffffffffff, 0x21, 0xf, &(0x7f0000000240), 0x0) fstat(0xffffffffffffffff, &(0x7f00000006c0)) getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, &(0x7f0000000440)={0x0, 0x80}, &(0x7f00000001c0)=0xfffffffffffffd3f) ioctl$FICLONE(r1, 0x40049409, r4) setgroups(0x3, &(0x7f0000000340)=[0x0, 0x0, 0x0]) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, 0x0) [ 2706.721062] hfs: can't find a HFS filesystem on dev loop2 [ 2706.798622] hfs: can't find a HFS filesystem on dev loop2 [ 2706.825387] EXT4-fs (sda1): Unrecognized mount option "v" or missing value [ 2707.079442] EXT4-fs (sda1): re-mounted. Opts: ,errors=continue [ 2707.174299] EXT4-fs (sda1): Unrecognized mount option "./file0" or missing value 14:18:43 executing program 3: r0 = semget$private(0x0, 0x1, 0x400) semtimedop(r0, &(0x7f0000000000)=[{0x1, 0x7fffffff, 0x800}, {0x0, 0xffffffff00000000}, {0x3, 0x7fffffff, 0x800}, {0x0, 0x0, 0x1000}, {0x3, 0x4, 0x1800}, {0x7, 0x9, 0x1800}], 0x6, &(0x7f0000000040)={0x0, 0x1c9c380}) r1 = socket$inet_smc(0x2b, 0x1, 0x0) ioctl$sock_inet_SIOCDELRT(r1, 0x890c, &(0x7f00000000c0)={0x4, {0x2, 0x4e22, @multicast1}, {0x2, 0x4e20, @loopback}, {0x2, 0x4e24, @broadcast}, 0x2, 0x5, 0x1f000000, 0x3, 0x41e4, &(0x7f0000000080)='syzkaller1\x00', 0x3f, 0x61, 0xdb56}) clone(0xc2b321c6db9081df, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 14:18:43 executing program 0: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r1 = fcntl$dupfd(r0, 0x0, r0) io_setup(0x3, &(0x7f0000000040)=0x0) io_submit(r2, 0x1, &(0x7f00000022c0)=[&(0x7f0000000100)={0x0, 0x0, 0x0, 0x1, 0x0, r1, &(0x7f0000000140)="14a4b1fb", 0x4}]) 14:18:43 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x3, &(0x7f0000001fd8)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x15}}, &(0x7f0000000080)="47504c049c3514bf772da07ae82e76590a36f6493ec1ab91b397e42abf1ea6cd8cd77427fc9a9e2b7165f52b4107bf0850d899dc52d013175ddb1b2f46203c2a05b722e33e556fb2e3f39a3cde07ca53640337ec956146bdbfcb115070195631de5d21a5ea9e638c2bdb78a501ca4b6ea313d82568f9382c2c3f6faba6b4ee54793b4ed26dae3e52225029bb2ac0007f77754c3f23ceda9809b9a9684a940abcaa8cfcc7133ec422e9c83888318d41e9a493f0195fe2599651b89504f5dba14625ce2366f33d95dba92f867279cabf4aceddc85a8af7a0fa68d767ce5136b9d0d1966c499cb6bf34c2988666970000000000000000000000"}, 0x48) 14:18:43 executing program 2: getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) syz_mount_image$hfs(&(0x7f0000000200)='hfs\x00', &(0x7f0000000280)='./file0\x00', 0x1f00, 0x0, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 14:18:43 executing program 4: r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/expire_quiescent_template\x00', 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000140)=@security={'security\x00', 0xe, 0x4, 0x4b8, 0x1f0, 0x320, 0x0, 0x320, 0x320, 0x438, 0x438, 0x438, 0x438, 0x438, 0x4, &(0x7f0000000100), {[{{@ipv6={@local, @local, [0x0, 0x0, 0xffffffff, 0xffffff00], [0xffffffff, 0xff, 0xffffffff, 0xff], 'eql\x00', 'gretap0\x00', {}, {0xff}, 0x0, 0x7fffffff, 0x2, 0x61}, 0x0, 0x188, 0x1c8, 0x0, {}, [@common=@unspec=@conntrack2={0xc0, 'conntrack\x00', 0x2, {{@ipv4=@loopback, [0xffffffff, 0xffffffff, 0x0, 0xffffffff], @ipv4=@loopback, [0x0, 0xffffffff, 0xffffff00, 0xff000000], @ipv6=@ipv4={[], [], @remote}, [0xffffff00, 0xff000000, 0xff000000, 0xff], @ipv4=@multicast2, [0xffffffff, 0xff, 0xff0000ff], 0x3, 0x1ff, 0x4, 0x4e21, 0x4e20, 0x4e22, 0x4e20, 0x28}, 0x1c0, 0x98}}]}, @common=@unspec=@ERROR={0x40, 'ERROR\x00', 0x0, "f650bd5c77822a55c077a2b3078812467f4ab9fefc372cf333baff203cdb"}}, {{@ipv6={@remote, @mcast2, [0xff000000, 0xffffff00, 0xffffffff, 0xff000000], [0x0, 0xff, 0xff000000, 0xffffff00], 'syzkaller0\x00', 'lo\x00', {}, {}, 0x2b, 0x1, 0x2, 0x23}, 0x0, 0xc8, 0x108}, @common=@inet=@TCPOPTSTRIP={0x40, 'TCPOPTSTRIP\x00', 0x0, {[0xe08d, 0x6, 0xff, 0x800, 0x2, 0x7, 0x0, 0x5]}}}, {{@uncond, 0x0, 0xf0, 0x118, 0x0, {}, [@common=@hl={0x28, 'hl\x00', 0x0, {0x3, 0x604}}]}, @common=@unspec=@STANDARD={0x28, '\x00', 0x0, 0xfffffffffffffffd}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x518) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = getpgrp(0x0) prlimit64(r2, 0x0, &(0x7f00000004c0)={0x0, 0x7ffffd}, &(0x7f00000002c0)) lremovexattr(0x0, &(0x7f0000000480)=@random={'trusted.', 'bpf\x00'}) getsockopt$inet_sctp_SCTP_PR_ASSOC_STATUS(0xffffffffffffffff, 0x84, 0x73, &(0x7f0000000280), 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r3 = syz_open_dev$amidi(&(0x7f0000000100)='/dev/amidi#\x00', 0x2, 0x800) recvfrom(0xffffffffffffffff, 0x0, 0x0, 0x20, &(0x7f00000005c0)=@ipx={0x4, 0x1, 0x6, "6b183128f377"}, 0x80) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000200)='./file0\x00', 0x700, 0x0, &(0x7f00000024c0), 0x100032, &(0x7f00000000c0)=ANY=[@ANYBLOB]) getsockopt$inet_dccp_int(0xffffffffffffffff, 0x21, 0xf, &(0x7f0000000240), 0x0) fstat(0xffffffffffffffff, &(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, &(0x7f0000000440)={0x0, 0x80}, &(0x7f00000001c0)=0xfffffffffffffd3f) ioctl$FICLONE(r1, 0x40049409, r3) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, 0x0) syz_mount_image$hfs(&(0x7f0000000680)='hfs\x00', &(0x7f0000000740)='./file0\x00', 0x3, 0x8, &(0x7f0000000d80)=[{&(0x7f0000000780)="0f2d7bda69e48c5f9df0801243e53c5eec37eb735abe9e768776a033bc979a7dfc60bb30ccbfd56010a970af00165dac5d087abbf5e4f00cff4a0c20fa8111ec42e5a24c460922426aafdf2010050ee30534dc295d6fc7c9ea72c4040f4ec459f90db43fda728615c4f48da0803e996bed137838c675c831ebf4bfb97c9d2d1b44c942416cd38c067e1b5ab21181a5cf65017224ec3fca40882ec642ec4355d85b4603752c5f19176d667279a10b3e6af3d5d095b9ea85869172b1be1335900ac280518a671c36ac20f880c2438cd4", 0xcf, 0xd8e}, {&(0x7f0000000880)="fbd5a32eb10518", 0x7, 0x7}, {&(0x7f00000008c0)="f36c3f4634e428453bda131e262b4e9a86d054dad26c8841a35bad317d8d48b4a4dfbdf090548c9024dacbba727e666b88c7b0ff3a54abc5edc22ca4e6278d13de77a6d24575f1645c691c7fa44fb85acf3d93d618fb1f5350c61f03a27a379e43902724b45117dea86c84185380b7223ce447571eec173f4a8bde1dd962ee8c24ea7cd661c3bf4987d4389155685b27fec65a2f855cceea2fed3bd50862c77c8e11", 0xa2, 0x6}, {&(0x7f0000000980)="12e18aaf7fa3da00d51f9c92bb4297238463c70e2c718c6da46c93a3e7a580240ddcb02d33ef811abc6b717c550b7232fb533f7d3e9a9f4aab3458a8ddcc737a7c16ccc85e3cd9187ef1818247498ff0f078e03ab4bb18d3c3b30fc01b3cedacbf7d0be2c4542bff93b24599228e3fa2cbfc9a49e2a41c54eda441037dd14e7f9eb1a20955b45fda7b87cd19d83fd7a42db4c85ada52876c4dbb081fc30d3194ef5db5e6338cb6b6a5b24497a037f7a7f4bb87be88c05c84ce281684fba4", 0xbe, 0x40000000000}, {&(0x7f0000000a40)="350712d29be7edd5e75f82370d16c02d645a9b0428762c81775277970165149b8ab092f85e3c46e790685e153dbb37a73709309cba7a473767f7caec53d47bd81e5a9df0f46b67a3b52ed1b9a1e545afb540ac97ca269d57618d247ef33a77df6970a2f1abfe7a32c11c8ba0ba04460f490bf1bbee775f45748c05f307cc8b3f6aeed4460be7b744bf58389beb435734d8a39204ed18f5f2629ccc7a7ffba0018af6fc04711548f2c2f23742dd6b9866062be7a561f833779b915334682aaec79f", 0xc1, 0x60}, {&(0x7f0000000b40)="09258b6080d3fc4a11a5ac68a40ee32efc83b3a48f68235e36d0c826bbbd1230f690d68023f5ece629c0e572d1bb13e1b30c23472cd8a9fb830d3c48", 0x3c, 0x5}, {&(0x7f0000000b80)="554454b2c55b9f62c0c2b98f5adde9a295de712c9eae46c9163858265d7905abe0dcbb6ed025845dbaa6626734b716700df9cb7e500550ef0b41663b0972028b9664a2fdd2acb5ce9cd7ecbc08af88dbdeca8d07d42cc4d714b27b753bf0130a1825f4b5cb34613a32d3b2c41784e6c8b8cba03ecf68bfa51e649b1b7deecd6f95ddc5e1d9d2536bc9f999ce6fd7db76eb1877d16a5ed59c109d58b970c93e07eca00d942ddda184952224a2f02626c4f82803d78280f21793f386b719d0edd3b2d6e320484021ac875927cdb79a46ffa4de71547f925a359d581cef1ee2b79b86674277e47a", 0xe6, 0x9}, {&(0x7f0000000c80)="f44abbd513d53b8608b700873ece555dc457287734d11aac78545bbce699af5065200fc0d1cb22cc9e9a7607ed7782e93530700fe399794c62bc775d05950d0d9005bc62858eff06705d7b05af62ea25bd7873f4dc22e1034baadd4e21d345a23b226722589aa910a5489cbb72be4b3f40bc9e9c0b2ee7a2d8553a039629ceecd3f1781eb4b0a448c4939e8119631b222dc2a2ff6002aa6f6b223aec55cc92e56a42a1ea6efc1f7ec9c7bed36dafc7a02879c1bb9aceb87d0228fb3968ffe6deeebd787fcc0a7e361e88a0ffc8e4402e90e12b0a07710fc93e6f6977d96812bc0cd7b95ff140d2f58e4c0864cb187f0653858957d8", 0xf5, 0x73}], 0x0, &(0x7f0000000e40)={[{@gid={'gid', 0x3d, r5}}, {@quiet='quiet'}, {@file_umask={'file_umask', 0x3d, 0x20}}, {@type={'type', 0x3d, "2b69af33"}}, {@file_umask={'file_umask', 0x3d, 0xc1}}], [{@fsuuid={'fsuuid', 0x3d, {[0x31, 0x76, 0x76, 0x32, 0x62, 0x0, 0x0, 0x3f], 0x2d, [0x33, 0x35, 0x64, 0x76], 0x2d, [0x75, 0x33, 0x77], 0x2d, [0x32, 0x31, 0x62, 0x77], 0x2d, [0x32, 0x64, 0x77, 0x31, 0x32, 0x67, 0x0, 0x7b]}}}, {@rootcontext={'rootcontext', 0x3d, 'system_u'}}, {@measure='measure'}, {@obj_role={'obj_role', 0x3d, '.lo'}}, {@fsuuid={'fsuuid', 0x3d, {[0x77, 0x3f, 0x35, 0x64, 0x61, 0x32, 0x77, 0x73], 0x2d, [0x34, 0x36, 0x7c, 0x35], 0x2d, [0x37, 0x39, 0x7f, 0x77], 0x2d, [0x73, 0x77, 0x61, 0x36], 0x2d, [0x37, 0x66, 0x66, 0x30, 0x61, 0x64, 0x7f, 0x77]}}}, {@audit='audit'}, {@fsmagic={'fsmagic', 0x3d, 0xffffffffffffff80}}, {@euid_lt={'euid<', r4}}, {@context={'context', 0x3d, 'sysadm_u'}}]}) 14:18:43 executing program 1: r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/expire_quiescent_template\x00', 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000140)=@security={'security\x00', 0xe, 0x4, 0x4e0, 0x1f0, 0x320, 0x0, 0x320, 0x320, 0x438, 0x438, 0x438, 0x438, 0x438, 0x4, &(0x7f0000000100), {[{{@ipv6={@local, @local, [0x0, 0xffffff00, 0xffffffff, 0xffffff00], [0xffffffff, 0xff, 0xffffffff, 0xff], 'eql\x00', 'gretap0\x00', {}, {0xff}, 0x0, 0x7fffffff, 0x2, 0x61}, 0x0, 0x188, 0x1c8, 0x0, {}, [@common=@unspec=@conntrack2={0xc0, 'conntrack\x00', 0x2, {{@ipv4=@loopback, [0xffffffff, 0xffffffff, 0x0, 0xffffffff], @ipv4=@loopback, [0x0, 0xffffffff, 0xffffff00, 0xff000000], @ipv6=@ipv4={[], [], @remote}, [0xffffff00, 0xff000000, 0xff000000, 0xff], @ipv4=@multicast2, [0xffffffff, 0xff, 0xff0000ff], 0x3, 0x1ff, 0x4, 0x4e21, 0x4e20, 0x4e22, 0x4e20, 0x28, 0x20}, 0x1c0, 0x98}}]}, @common=@unspec=@ERROR={0x40, 'ERROR\x00', 0x0, "f650bd5c77822a55c077a2b3078812467f4ab9fefc372cf333baff203cdb"}}, {{@ipv6={@remote, @mcast2, [0xff000000, 0xffffff00, 0xffffffff, 0xff000000], [0x0, 0xff, 0xff000000, 0xffffff00], 'syzkaller0\x00', 'lo\x00', {}, {0xff}, 0x2b, 0x1, 0x2, 0x23}, 0x0, 0xf0, 0x130, 0x0, {}, [@common=@hl={0x28, 'hl\x00'}]}, @common=@inet=@TCPOPTSTRIP={0x40, 'TCPOPTSTRIP\x00', 0x0, {[0xe08d, 0x6, 0xff, 0x800, 0x2, 0x7, 0x3, 0x5]}}}, {{@uncond, 0x0, 0xf0, 0x118, 0x0, {}, [@common=@hl={0x28, 'hl\x00', 0x0, {0x3, 0x604}}]}, @common=@unspec=@STANDARD={0x28, '\x00', 0x0, 0xfffffffffffffffd}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x540) ioctl$EXT4_IOC_MIGRATE(0xffffffffffffffff, 0x6609) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000300)={0x0}, &(0x7f0000000400)=0xc) getsockopt$ARPT_SO_GET_INFO(r0, 0x0, 0x60, &(0x7f0000000740)={'filter\x00'}, &(0x7f00000007c0)=0x44) r3 = getpgrp(r2) prlimit64(r3, 0x0, &(0x7f00000004c0)={0x0, 0x7ffffd}, &(0x7f00000002c0)) lremovexattr(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000480)=@random={'trusted.', 'bpf\x00'}) getsockopt$inet_sctp_SCTP_PR_ASSOC_STATUS(0xffffffffffffffff, 0x84, 0x73, &(0x7f0000000280)={0x0, 0x8, 0x0, 0xe0}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r4 = syz_open_dev$amidi(&(0x7f0000000100)='/dev/amidi#\x00', 0x2, 0x800) getsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r4, 0x84, 0x1e, &(0x7f0000000680), &(0x7f0000000800)=0x4) recvfrom(r4, &(0x7f0000000500)=""/96, 0x60, 0x20, &(0x7f00000005c0)=@ipx={0x4, 0x1, 0x6, "6b183128f377"}, 0x80) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) recvfrom$inet(r4, &(0x7f0000000840)=""/242, 0xf2, 0x40010000, &(0x7f0000000940)={0x2, 0x4e24, @loopback}, 0x10) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000200)='./file0\x00', 0x700, 0x0, &(0x7f00000024c0), 0x100032, &(0x7f00000000c0)=ANY=[@ANYBLOB]) prctl$PR_MPX_ENABLE_MANAGEMENT(0x2b) getsockopt$inet_dccp_int(0xffffffffffffffff, 0x21, 0xf, &(0x7f0000000240), 0x0) fstat(0xffffffffffffffff, &(0x7f00000006c0)) getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, &(0x7f0000000440)={0x0, 0x80}, &(0x7f00000001c0)=0xfffffffffffffd3f) ioctl$FICLONE(r1, 0x40049409, r4) setgroups(0x3, &(0x7f0000000340)=[0x0, 0x0, 0x0]) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) setsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r0, 0x84, 0x6, &(0x7f0000000980)={r5, @in6={{0xa, 0x4e24, 0x10000, @local, 0x20}}}, 0x84) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, 0x0) 14:18:43 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x3, &(0x7f0000001fd8)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x15}}, &(0x7f0000000080)="47504c049c3514bf772da07ae82e76590a36f6493ec1ab91b397e42abf1ea6cd8cd77427fc9a9e2b7165f52b4107bf0850d899dc52d013175ddb1b2f46203c2a05b722e33e556fb2e3f39a3cde1fca53640b37ec956146bdbfcb115070195631de5d21a5ea9e638c2bdb78a501ca4b6ea313d82568f9382c2c3f6faba6b4ee54793b4ed26dae3e52225029bb2ac0007f77754c3f23ceda9809b9a9684a940abcaa8cfcc7133ec422e9c83888318d41e9a493f0195fe2599651b89504f5dba14625ce2366f33d95dba92f867279cabf4aceddc85a8af7a0fa68d767ce5136b9d0d1966c499cb6bf34c2988666970000000000000000000000"}, 0x48) [ 2708.285676] hfs: can't find a HFS filesystem on dev loop2 14:18:43 executing program 0: r0 = syz_open_dev$binder(&(0x7f0000d59ff3)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) r1 = syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000001000/0x3000)=nil, 0x3000, 0x0, 0x20011, r1, 0x0) ioctl$BINDER_WRITE_READ(0xffffffffffffffff, 0xc0306201, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(0xffffffffffffffff, 0x40046207, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000440)={0x44, 0x0, &(0x7f0000000300)=[@transaction={0x40406300, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x18, 0x0, &(0x7f0000000200)=[@flat={0x73622a85}], 0x0}}], 0x0, 0x0, 0x0}) ioctl$BINDER_THREAD_EXIT(r0, 0x40046208, 0x0) [ 2708.409006] hfs: can't find a HFS filesystem on dev loop2 [ 2708.439788] IPVS: ftp: loaded support on port[0] = 21 14:18:43 executing program 2: getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) syz_mount_image$hfs(&(0x7f0000000200)='hfs\x00', &(0x7f0000000280)='./file0\x00', 0x900000000000000, 0x0, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) [ 2708.597684] binder: 32693:32699 transaction failed 29189/-22, size 24-0 line 2834 14:18:43 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x3, &(0x7f0000001fd8)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x15}}, &(0x7f0000000080)="47504c049c3514bf772da07ae82e76590a36f6493ec1ab91b397e42abf1ea6cd8cd77427fc9a9e2b7165f52b4107bf0850d899dc52d013175ddb1b2f46203c2a05b722e33e556fb2e3f39a3cde1fca53640237ec956146bdbfcb115070195631de5d21a5ea9e638c2bdb78a501ca4b6ea313d82568f9382c2c3f6faba6b4ee54793b4ed26dae3e52225029bb2ac0007f77754c3f23ceda9809b9a9684a940abcaa8cfcc7133ec422e9c83888318d41e9a493f0195fe2599651b89504f5dba14625ce2366f33d95dba92f867279cabf4aceddc85a8af7a0fa68d767ce5136b9d0d1966c499cb6bf34c2988666970000000000000000000000"}, 0x48) [ 2708.642972] EXT4-fs (sda1): Unrecognized mount option "./file0" or missing value [ 2708.657300] binder: undelivered TRANSACTION_ERROR: 29189 [ 2708.680349] binder_alloc: binder_alloc_mmap_handler: 32693 20001000-20004000 already mapped failed -16 14:18:43 executing program 4: r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/expire_quiescent_template\x00', 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000740)=@security={'security\x00', 0xe, 0x4, 0x4b8, 0x1f0, 0x320, 0x0, 0x320, 0x320, 0x438, 0x438, 0x438, 0x438, 0x438, 0x4, &(0x7f0000000100), {[{{@ipv6={@local, @local, [0x0, 0x0, 0xffffffff, 0xffffff00], [0xffffffff, 0xff, 0xffffffff, 0xff], 'eql\x00', 'gretap0\x00', {}, {0xff}, 0x0, 0x7fffffff, 0x2, 0x61}, 0x0, 0x188, 0x1c8, 0x0, {}, [@common=@unspec=@conntrack2={0xc0, 'conntrack\x00', 0x2, {{@ipv4=@loopback, [0xffffffff, 0xffffffff, 0x0, 0xffffffff], @ipv4=@loopback, [0x0, 0xffffffff, 0xffffff00, 0xff000000], @ipv6=@ipv4={[], [], @remote}, [0xffffff00, 0xff000000, 0xff000000, 0xff], @ipv4=@multicast2, [0xffffffff, 0xff, 0xff0000ff], 0x3, 0x1ff, 0x4, 0x4e21, 0x4e20, 0x4e22, 0x4e20, 0x28}, 0x1c0, 0x98}}]}, @common=@unspec=@ERROR={0x40, 'ERROR\x00', 0x0, "f650bd5c77822a55c077a2b3078812467f4ab9fefc372cf333baff203cdb"}}, {{@ipv6={@remote, @mcast2, [0xff000000, 0xffffff00, 0xffffffff, 0xff000000], [0x0, 0xff, 0xff000000, 0xffffff00], 'syzkaller0\x00', 'lo\x00', {}, {}, 0x2b, 0x1, 0x2, 0x23}, 0x0, 0xc8, 0x108}, @common=@inet=@TCPOPTSTRIP={0x40, 'TCPOPTSTRIP\x00', 0x0, {[0xe08d, 0x6, 0xff, 0x800, 0x2, 0x7, 0x0, 0x5]}}}, {{@uncond, 0x0, 0xf0, 0x118, 0x0, {}, [@common=@hl={0x28, 'hl\x00', 0x0, {0x3, 0x604}}]}, @common=@unspec=@STANDARD={0x28, '\x00', 0x0, 0xfffffffffffffffd}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0xfffffc84) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = getpgrp(0x0) prlimit64(r2, 0x0, &(0x7f00000004c0)={0x0, 0x7ffffd}, &(0x7f00000002c0)) lremovexattr(0x0, &(0x7f0000000480)=@random={'trusted.', 'bpf\x00'}) getsockopt$inet_sctp_SCTP_PR_ASSOC_STATUS(0xffffffffffffffff, 0x84, 0x73, &(0x7f0000000280), 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r3 = syz_open_dev$amidi(&(0x7f0000000100)='/dev/amidi#\x00', 0x2, 0x800) recvfrom(0xffffffffffffffff, 0x0, 0x0, 0x20, &(0x7f00000005c0)=@ipx={0x4, 0x1, 0x6, "6b183128f377"}, 0x80) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000200)='./file0\x00', 0x700, 0x0, &(0x7f00000024c0), 0x100032, &(0x7f00000000c0)=ANY=[@ANYBLOB]) getsockopt$inet_dccp_int(0xffffffffffffffff, 0x21, 0xf, &(0x7f0000000240), 0x0) fstat(0xffffffffffffffff, &(0x7f00000006c0)) getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, &(0x7f0000000440)={0x0, 0x80}, &(0x7f00000001c0)=0xfffffffffffffd3f) ioctl$FICLONE(r1, 0x40049409, r3) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, 0x0) setsockopt$IPT_SO_SET_ADD_COUNTERS(r3, 0x0, 0x41, &(0x7f0000000300)={'filter\x00', 0x5, [{}, {}, {}, {}, {}]}, 0x78) 14:18:43 executing program 1: r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/expire_quiescent_template\x00', 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000140)=ANY=[@ANYBLOB="73656375726974790000000000000000000000000000000000000000000000000e00000004000000e0040000f001000020030000000000002003000020030000380400003804000038040000380400003804000004000000", @ANYPTR=&(0x7f0000000800)=ANY=[@ANYBLOB="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"], @ANYBLOB="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"], 0x540) ioctl$EXT4_IOC_MIGRATE(0xffffffffffffffff, 0x6609) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000300)={0x0}, &(0x7f0000000400)=0xc) getsockopt$ARPT_SO_GET_INFO(r0, 0x0, 0x60, &(0x7f0000000740)={'filter\x00'}, &(0x7f00000007c0)=0x44) r3 = getpgrp(r2) prlimit64(r3, 0x0, &(0x7f00000004c0)={0x0, 0x7ffffd}, &(0x7f00000002c0)) lremovexattr(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000480)=@random={'trusted.', 'bpf\x00'}) getsockopt$inet_sctp_SCTP_PR_ASSOC_STATUS(0xffffffffffffffff, 0x84, 0x73, &(0x7f0000000280)={0x0, 0x8, 0x0, 0xe0}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x3) r4 = syz_open_dev$amidi(&(0x7f0000000100)='/dev/amidi#\x00', 0x2, 0x800) recvfrom(r4, &(0x7f0000000500)=""/96, 0x60, 0x20, &(0x7f00000005c0)=@ipx={0x4, 0x1, 0x6, "6b183128f377"}, 0x80) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000200)='./file0\x00', 0x700, 0x0, &(0x7f00000024c0), 0x100032, &(0x7f0000000680)=ANY=[@ANYBLOB="dbcfb175"]) prctl$PR_MPX_ENABLE_MANAGEMENT(0x2b) getsockopt$inet_dccp_int(0xffffffffffffffff, 0x21, 0xf, &(0x7f0000000240), 0x0) fstat(0xffffffffffffffff, &(0x7f00000006c0)) getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, &(0x7f0000000440)={0x0, 0x80}, &(0x7f00000001c0)=0xfffffffffffffd3f) ioctl$FICLONE(r1, 0x40049409, r4) setgroups(0x3, &(0x7f0000000340)=[0x0, 0x0, 0x0]) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, 0x0) [ 2708.749379] binder: 32693:32699 transaction failed 29189/-22, size 24-0 line 2834 [ 2708.769497] hfs: can't find a HFS filesystem on dev loop2 [ 2708.827019] binder: undelivered TRANSACTION_ERROR: 29189 [ 2708.881947] IPVS: ftp: loaded support on port[0] = 21 [ 2709.188426] EXT4-fs (sda1): Unrecognized mount option "ϱu" or missing value 14:18:44 executing program 3: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x8100, 0x0) write$nbd(r0, &(0x7f0000000040)={0x67446698, 0x1, 0x1, 0x0, 0x1, "046abbdba196399b52f83cf754fb0313751d4d55e6ace8a39acb9cb2ec057808716de266eafd32083bdf502aad20089832fbdeed30ee44ebd49c3f95f5de3c51dfe361cfd0f17841365e7b9592980c6def5bebb16b87e5300fbe932a0bb466fd3e9d9afa2ad377b5a0adb0d1a16b918f551d7d76ccfe91248d097eca24ce648e274c0d50ddcacad851d67c9e29db4c2a38570db0ddf83a25530e1951472c22c75c488f1d019ff9fd5b866c2e0f5b42f8580f60824ce2182379731736dde6347083"}, 0xd1) clone(0xc2b321c6db9081df, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 14:18:44 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x3, &(0x7f0000001fd8)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x15}}, &(0x7f0000000080)="47504c049c3514bf772da07ae82e76590a36f6493ec1ab91b397e42abf1ea6cd8cd77427fc9a9e2b7165f52b4107bf0850d899dc52d013175ddb1b2f46203c2a05b722e33e556fb2e3f39a3cde1fca53640537ec956146bdbfcb115070195631de5d21a5ea9e638c2bdb78a501ca4b6ea313d82568f9382c2c3f6faba6b4ee54793b4ed26dae3e52225029bb2ac0007f77754c3f23ceda9809b9a9684a940abcaa8cfcc7133ec422e9c83888318d41e9a493f0195fe2599651b89504f5dba14625ce2366f33d95dba92f867279cabf4aceddc85a8af7a0fa68d767ce5136b9d0d1966c499cb6bf34c2988666970000000000000000000000"}, 0x48) 14:18:44 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0x8, &(0x7f0000001000)=ANY=[@ANYBLOB="7a0af8ff750f7009bfa100000000000007010000f8ffffffb702000005000000bf130000000000008500000006000000b700000000000000950000ff00000000"], 0x0}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000001c0)={r0, 0x2800000003000000, 0xe, 0x0, &(0x7f0000000200)="a06ad876d56a0e64d082778c3938", 0x0, 0xb4b, 0x2}, 0x28) 14:18:44 executing program 2: getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) syz_mount_image$hfs(&(0x7f0000000200)='hfs\x00', &(0x7f0000000280)='./file0\x00', 0x2000000000000, 0x0, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) [ 2709.273766] EXT4-fs (sda1): re-mounted. Opts: 14:18:44 executing program 1: r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/expire_quiescent_template\x00', 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000140)=@security={'security\x00', 0xe, 0x4, 0x4e0, 0x1f0, 0x320, 0x0, 0x320, 0x320, 0x438, 0x438, 0x438, 0x438, 0x438, 0x4, &(0x7f0000000100), {[{{@ipv6={@local, @local, [0x0, 0xffffff00, 0xffffffff, 0xffffff00], [0xffffffff, 0xff, 0xffffffff, 0xff], 'eql\x00', 'gretap0\x00', {}, {0xff}, 0x0, 0x7fffffff, 0x2, 0x61}, 0x0, 0x188, 0x1c8, 0x0, {}, [@common=@unspec=@conntrack2={0xc0, 'conntrack\x00', 0x2, {{@ipv4=@loopback, [0xffffffff, 0xffffffff, 0x0, 0xffffffff], @ipv4=@loopback, [0x0, 0xffffffff, 0xffffff00, 0xff000000], @ipv6=@ipv4={[], [], @remote}, [0xffffff00, 0xff000000, 0xff000000, 0xff], @ipv4=@multicast2, [0xffffffff, 0xff, 0xff0000ff], 0x3, 0x1ff, 0x4, 0x4e21, 0x4e20, 0x4e22, 0x4e20, 0x28, 0x20}, 0x1c0, 0x98}}]}, @common=@unspec=@ERROR={0x40, 'ERROR\x00', 0x0, "f650bd5c77822a55c077a2b3078812467f4ab9fefc372cf333baff203cdb"}}, {{@ipv6={@remote, @mcast2, [0xff000000, 0xffffff00, 0xffffffff, 0xff000000], [0x0, 0xff, 0xff000000, 0xffffff00], 'syzkaller0\x00', 'lo\x00', {}, {0xff}, 0x2b, 0x1, 0x2, 0x23}, 0x0, 0xf0, 0x130, 0x0, {}, [@common=@hl={0x28, 'hl\x00'}]}, @common=@inet=@TCPOPTSTRIP={0x40, 'TCPOPTSTRIP\x00', 0x0, {[0xe08d, 0x6, 0xff, 0x800, 0x2, 0x7, 0x3, 0x5]}}}, {{@uncond, 0x0, 0xf0, 0x118, 0x0, {}, [@common=@hl={0x28, 'hl\x00', 0x0, {0x3, 0x604}}]}, @common=@unspec=@STANDARD={0x28, '\x00', 0x0, 0xfffffffffffffffd}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x540) ioctl$EXT4_IOC_MIGRATE(0xffffffffffffffff, 0x6609) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000300)={0x0}, &(0x7f0000000400)=0xc) getsockopt$ARPT_SO_GET_INFO(r0, 0x0, 0x60, &(0x7f0000000740)={'filter\x00'}, &(0x7f00000007c0)=0x44) r3 = getpgrp(r2) ioctl$KVM_IRQFD(r0, 0x4020ae76, &(0x7f0000000680)={r0, 0x8001, 0x7, r0}) prlimit64(r3, 0x0, &(0x7f00000004c0)={0x0, 0x7ffffd}, &(0x7f00000002c0)) lremovexattr(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000800)=ANY=[@ANYBLOB="de2a757374653497271be792e8aa4b99a3c6ce4800000000000000"]) getsockopt$inet_sctp_SCTP_PR_ASSOC_STATUS(0xffffffffffffffff, 0x84, 0x73, &(0x7f0000000280)={0x0, 0x8, 0x0, 0xe0}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r4 = syz_open_dev$amidi(&(0x7f0000000100)='/dev/amidi#\x00', 0x2, 0x800) recvfrom(r4, &(0x7f0000000500)=""/96, 0x60, 0x20, &(0x7f00000005c0)=@ipx={0x4, 0x1, 0x6, "6b183128f377"}, 0x80) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000200)='./file0\x00', 0x700, 0x0, &(0x7f00000024c0), 0x100032, &(0x7f00000000c0)=ANY=[@ANYBLOB]) prctl$PR_MPX_ENABLE_MANAGEMENT(0x2b) getsockopt$inet_dccp_int(0xffffffffffffffff, 0x21, 0xf, &(0x7f0000000240), 0x0) fstat(0xffffffffffffffff, &(0x7f00000006c0)) getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, &(0x7f0000000440)={0x0, 0x80}, &(0x7f00000001c0)=0xfffffffffffffd3f) ioctl$FICLONE(r1, 0x40049409, r4) setgroups(0x3, &(0x7f0000000340)=[0x0, 0x0, 0x0]) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, 0x0) 14:18:44 executing program 0: socket$inet_icmp_raw(0x2, 0x3, 0x1) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_ENABLE_CAP(r1, 0x4068aea3, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_SET_LAPIC(0xffffffffffffffff, 0x4400ae8f, 0x0) setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, 0x0, 0x0) setsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000440)=[@text32={0x20, &(0x7f00000002c0)="b9ec090000b808000000ba000000000f300fc76b07dc920080000067260fc7ac0b000f3808580026660f3880a100400000c4c2659f5d0d0fc7af0e000000660f01c80f01cf", 0x45}], 0x1, 0x0, 0x0, 0x0) fremovexattr(0xffffffffffffffff, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getcwd(0x0, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x7, &(0x7f0000000080), 0x4) r3 = getpgrp(0x0) ptrace$pokeuser(0x6, r3, 0x0, 0x0) [ 2709.412431] hfs: can't find a HFS filesystem on dev loop2 14:18:44 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x3, &(0x7f0000001fd8)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x15}}, &(0x7f0000000080)="47504c049c3514bf772da07ae82e76590a36f6493ec1ab91b397e42abf1ea6cd8cd77427fc9a9e2b7165f52b4107bf0850d899dc52d013175ddb1b2f46203c2a05b722e33e556fb2e3f39a3cde1fca53640a37ec956146bdbfcb115070195631de5d21a5ea9e638c2bdb78a501ca4b6ea313d82568f9382c2c3f6faba6b4ee54793b4ed26dae3e52225029bb2ac0007f77754c3f23ceda9809b9a9684a940abcaa8cfcc7133ec422e9c83888318d41e9a493f0195fe2599651b89504f5dba14625ce2366f33d95dba92f867279cabf4aceddc85a8af7a0fa68d767ce5136b9d0d1966c499cb6bf34c2988666970000000000000000000000"}, 0x48) [ 2709.457894] IPVS: ftp: loaded support on port[0] = 21 [ 2709.472170] EXT4-fs (sda1): Unrecognized mount option "./file0" or missing value 14:18:44 executing program 4: r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/expire_quiescent_template\x00', 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000140)=@security={'security\x00', 0xe, 0x4, 0x4b8, 0x1f0, 0x320, 0x0, 0x320, 0x320, 0x438, 0x438, 0x438, 0x438, 0x438, 0x4, &(0x7f0000000100), {[{{@ipv6={@local, @local, [0x0, 0x0, 0xffffffff, 0xffffff00], [0xffffffff, 0xff, 0xffffffff, 0xff], 'eql\x00', 'gretap0\x00', {}, {0xff}, 0x0, 0x7fffffff, 0x2, 0x61}, 0x0, 0x188, 0x1c8, 0x0, {}, [@common=@unspec=@conntrack2={0xc0, 'conntrack\x00', 0x2, {{@ipv4=@loopback, [0xffffffff, 0xffffffff, 0x0, 0xffffffff], @ipv4=@loopback, [0x0, 0xffffffff, 0xffffff00, 0xff000000], @ipv6=@ipv4={[], [], @remote}, [0xffffff00, 0xff000000, 0xff000000, 0xff], @ipv4=@multicast2, [0xffffffff, 0xff, 0xff0000ff], 0x3, 0x1ff, 0x4, 0x4e21, 0x4e20, 0x4e22, 0x4e20, 0x28}, 0x1c0, 0x98}}]}, @common=@unspec=@ERROR={0x40, 'ERROR\x00', 0x0, "f650bd5c77822a55c077a2b3078812467f4ab9fefc372cf333baff203cdb"}}, {{@ipv6={@remote, @mcast2, [0xff000000, 0xffffff00, 0xffffffff, 0xff000000], [0x0, 0xff, 0xff000000, 0xffffff00], 'syzkaller0\x00', 'lo\x00', {}, {}, 0x2b, 0x1, 0x2, 0x23}, 0x0, 0xc8, 0x108}, @common=@inet=@TCPOPTSTRIP={0x40, 'TCPOPTSTRIP\x00', 0x0, {[0xe08d, 0x6, 0xff, 0x800, 0x2, 0x7, 0x0, 0x5]}}}, {{@uncond, 0x0, 0xf0, 0x118, 0x0, {}, [@common=@hl={0x28, 'hl\x00', 0x0, {0x3, 0x604}}]}, @common=@unspec=@STANDARD={0x28, '\x00', 0x0, 0xfffffffffffffffd}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x518) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = getpid() r3 = getpgrp(r2) prlimit64(r3, 0x0, &(0x7f00000004c0)={0x0, 0x7ffffd}, &(0x7f00000002c0)) lremovexattr(0x0, &(0x7f0000000480)=@random={'trusted.', 'bpf\x00'}) getsockopt$inet_sctp_SCTP_PR_ASSOC_STATUS(0xffffffffffffffff, 0x84, 0x73, &(0x7f0000000280), 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r4 = syz_open_dev$amidi(&(0x7f0000000100)='/dev/amidi#\x00', 0x2, 0x800) recvfrom(0xffffffffffffffff, 0x0, 0x0, 0x20, &(0x7f00000005c0)=@ipx={0x4, 0x1, 0x6, "6b183128f377"}, 0x80) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000200)='./file0\x00', 0x700, 0x0, &(0x7f00000024c0), 0x100032, &(0x7f0000000680)=ANY=[@ANYBLOB="4f993412274e1832a0367c7415d053d6550b69f833c6a063ba30457b3b7cdc894e18ca99450000000000000000"]) getsockopt$inet_dccp_int(0xffffffffffffffff, 0x21, 0xf, &(0x7f0000000240), 0x0) fstat(0xffffffffffffffff, &(0x7f00000006c0)) getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, &(0x7f0000000440)={0x0, 0x80}, &(0x7f00000001c0)=0xfffffffffffffd3f) ioctl$FICLONE(r1, 0x40049409, r4) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, 0x0) [ 2709.580357] hfs: can't find a HFS filesystem on dev loop2 14:18:44 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x3, &(0x7f0000001fd8)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x15}}, &(0x7f0000000080)="47504c049c3514bf772da07ae82e76590a36f6493ec1ab91b397e42abf1ea6cd8cd77427fc9a9e2b7165f52b4107bf0850d899dc52d013175ddb1b2f46203c2a05b722e33e556fb2e3f39a3cde1fca53640307ec956146bdbfcb115070195631de5d21a5ea9e638c2bdb78a501ca4b6ea313d82568f9382c2c3f6faba6b4ee54793b4ed26dae3e52225029bb2ac0007f77754c3f23ceda9809b9a9684a940abcaa8cfcc7133ec422e9c83888318d41e9a493f0195fe2599651b89504f5dba14625ce2366f33d95dba92f867279cabf4aceddc85a8af7a0fa68d767ce5136b9d0d1966c499cb6bf34c2988666970000000000000000000000"}, 0x48) [ 2709.749225] IPVS: ftp: loaded support on port[0] = 21 14:18:44 executing program 2: getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) syz_mount_image$hfs(&(0x7f0000000200)='hfs\x00', &(0x7f0000000280)='./file0\x00', 0x40000000, 0x0, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 14:18:44 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x3, &(0x7f0000001fd8)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x15}}, &(0x7f0000000080)="47504c049c3514bf772da07ae82e76590a36f6493ec1ab91b397e42abf1ea6cd8cd77427fc9a9e2b7165f52b4107bf0850d899dc52d013175ddb1b2f46203c2a05b722e33e556fb2e3f39a3cde1fca53640337ec956146bdbfcb105070195631de5d21a5ea9e638c2bdb78a501ca4b6ea313d82568f9382c2c3f6faba6b4ee54793b4ed26dae3e52225029bb2ac0007f77754c3f23ceda9809b9a9684a940abcaa8cfcc7133ec422e9c83888318d41e9a493f0195fe2599651b89504f5dba14625ce2366f33d95dba92f867279cabf4aceddc85a8af7a0fa68d767ce5136b9d0d1966c499cb6bf34c2988666970000000000000000000000"}, 0x48) [ 2709.956613] hfs: can't find a HFS filesystem on dev loop2 14:18:44 executing program 1: r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/expire_quiescent_template\x00', 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000140)=@security={'security\x00', 0xe, 0x4, 0x4e0, 0x1f0, 0x320, 0x0, 0x320, 0x320, 0x438, 0x438, 0x438, 0x438, 0x438, 0x4, &(0x7f0000000100), {[{{@ipv6={@local, @local, [0x0, 0xffffff00, 0xffffffff, 0xffffff00], [0xffffffff, 0xff, 0xffffffff, 0xff], 'eql\x00', 'gretap0\x00', {}, {0xff}, 0x0, 0x7fffffff, 0x2, 0x61}, 0x0, 0x188, 0x1c8, 0x0, {}, [@common=@unspec=@conntrack2={0xc0, 'conntrack\x00', 0x2, {{@ipv4=@loopback, [0xffffffff, 0xffffffff, 0x0, 0xffffffff], @ipv4=@loopback, [0x0, 0xffffffff, 0xffffff00, 0xff000000], @ipv6=@ipv4={[], [], @remote}, [0xffffff00, 0xff000000, 0xff000000, 0xff], @ipv4=@multicast2, [0xffffffff, 0xff, 0xff0000ff], 0x3, 0x1ff, 0x4, 0x4e21, 0x4e20, 0x4e22, 0x4e20, 0x28, 0x20}, 0x1c0, 0x98}}]}, @common=@unspec=@ERROR={0x40, 'ERROR\x00', 0x0, "f650bd5c77822a55c077a2b3078812467f4ab9fefc372cf333baff203cdb"}}, {{@ipv6={@remote, @mcast2, [0xff000000, 0xffffff00, 0xffffffff, 0xff000000], [0x0, 0xff, 0xff000000, 0xffffff00], 'syzkaller0\x00', 'lo\x00', {}, {0xff}, 0x2b, 0x1, 0x2, 0x23}, 0x0, 0xf0, 0x130, 0x0, {}, [@common=@hl={0x28, 'hl\x00'}]}, @common=@inet=@TCPOPTSTRIP={0x40, 'TCPOPTSTRIP\x00', 0x0, {[0xe08d, 0x6, 0xff, 0x800, 0x2, 0x7, 0x3, 0x5]}}}, {{@uncond, 0x0, 0xf0, 0x118, 0x0, {}, [@common=@hl={0x28, 'hl\x00', 0x0, {0x3, 0x604}}]}, @common=@unspec=@STANDARD={0x28, '\x00', 0x0, 0xfffffffffffffffd}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x540) ioctl$EXT4_IOC_MIGRATE(0xffffffffffffffff, 0x6609) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000300)={0x0}, &(0x7f0000000400)=0xc) getsockopt$ARPT_SO_GET_INFO(r0, 0x0, 0x60, &(0x7f0000000740)={'filter\x00'}, &(0x7f00000007c0)=0x44) r3 = getpgrp(r2) prlimit64(r3, 0x0, &(0x7f00000004c0)={0x0, 0x7ffffd}, &(0x7f00000002c0)) lremovexattr(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000480)=@random={'trusted.', 'bpf\x00'}) getsockopt$inet_sctp_SCTP_PR_ASSOC_STATUS(0xffffffffffffffff, 0x84, 0x73, &(0x7f0000000280)={0x0, 0x8, 0x0, 0xe0}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r5 = syz_open_dev$amidi(&(0x7f0000000100)='/dev/amidi#\x00', 0x2, 0x800) recvfrom(r5, &(0x7f0000000500)=""/96, 0x60, 0x20, &(0x7f00000005c0)=@ipx={0x4, 0x1, 0x6, "6b183128f377"}, 0x80) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000200)='./file0\x00', 0x700, 0x0, &(0x7f00000024c0), 0x100032, &(0x7f00000000c0)=ANY=[@ANYBLOB]) prctl$PR_MPX_ENABLE_MANAGEMENT(0x2b) getsockopt$inet_dccp_int(0xffffffffffffffff, 0x21, 0xf, &(0x7f0000000240), 0x0) fstat(0xffffffffffffffff, &(0x7f00000006c0)) getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, &(0x7f0000000440)={0x0, 0x80}, &(0x7f00000001c0)=0xfffffffffffffd3f) ioctl$FICLONE(r1, 0x40049409, r5) setgroups(0x3, &(0x7f0000000340)=[0x0, 0x0, 0x0]) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, 0x0) setsockopt$inet_sctp6_SCTP_PR_SUPPORTED(r0, 0x84, 0x71, &(0x7f0000000680)={r4, 0x1}, 0x8) [ 2710.109480] hfs: can't find a HFS filesystem on dev loop2 14:18:45 executing program 3: clone(0x7ffff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 14:18:45 executing program 0: socketpair$unix(0x1, 0x200000000002, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r3, 0x4008ae89, &(0x7f0000000080)={0x7b, 0x0, [0xc0010058, 0x4000000000000], [0xc1]}) 14:18:45 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x3, &(0x7f0000001fd8)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x15}}, &(0x7f0000000080)="47504c049c3514bf772da07ae82e76590a36f6493ec1ab91b397e42abf1ea6cd8cd77427fc9a9e2b7165f52b4107bf0850d899dc52d013175ddb1b2f46203c2a05b722e33e556fb2e3f39a3cde1fca53640337ec956146bdbfcb115070195631de5d21a5ea9e638c2bdb78a501ca4b6ea313d82568f9382c2c3f6faba6b4ee54793b4ed26dae3e52225029bb2ac0007f77754c3f23ceda9809b9a9684a940abcaa8cfcc7133ec422e9c83888318d41e9a493f0195fe2599651b89504f5dba14625ce2366f33d95dba92f867279cabf4aceddc85a8af7a0fa68d767ce5136b9d0d1966c499cb6bf34c2988666970000000000000000000000", 0x4}, 0x48) 14:18:45 executing program 2: getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) syz_mount_image$hfs(&(0x7f0000000200)='hfs\x00', &(0x7f0000000280)='./file0\x00', 0xff0f, 0x0, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 14:18:45 executing program 4: r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/expire_quiescent_template\x00', 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000140)=@security={'security\x00', 0xe, 0x4, 0x4b8, 0x1f0, 0x320, 0x0, 0x320, 0x320, 0x438, 0x438, 0x438, 0x438, 0x438, 0x4, &(0x7f0000000100), {[{{@ipv6={@local, @local, [0x0, 0x0, 0xffffffff, 0xffffff00], [0xffffffff, 0xff, 0xffffffff, 0xff], 'eql\x00', 'gretap0\x00', {}, {0xff}, 0x0, 0x7fffffff, 0x2, 0x61}, 0x0, 0x188, 0x1c8, 0x0, {}, [@common=@unspec=@conntrack2={0xc0, 'conntrack\x00', 0x2, {{@ipv4=@loopback, [0xffffffff, 0xffffffff, 0x0, 0xffffffff], @ipv4=@loopback, [0x0, 0xffffffff, 0xffffff00, 0xff000000], @ipv6=@ipv4={[], [], @remote}, [0xffffff00, 0xff000000, 0xff000000, 0xff], @ipv4=@multicast2, [0xffffffff, 0xff, 0xff0000ff], 0x3, 0x1ff, 0x4, 0x4e21, 0x4e20, 0x4e22, 0x4e20, 0x28}, 0x1c0, 0x98}}]}, @common=@unspec=@ERROR={0x40, 'ERROR\x00', 0x0, "f650bd5c77822a55c077a2b3078812467f4ab9fefc372cf333baff203cdb"}}, {{@ipv6={@remote, @mcast2, [0xff000000, 0xffffff00, 0xffffffff, 0xff000000], [0x0, 0xff, 0xff000000, 0xffffff00], 'syzkaller0\x00', 'lo\x00', {}, {}, 0x2b, 0x1, 0x2, 0x23}, 0x0, 0xc8, 0x108}, @common=@inet=@TCPOPTSTRIP={0x40, 'TCPOPTSTRIP\x00', 0x0, {[0xe08d, 0x6, 0xff, 0x800, 0x2, 0x7, 0x0, 0x5]}}}, {{@uncond, 0x0, 0xf0, 0x118, 0x0, {}, [@common=@hl={0x28, 'hl\x00', 0x0, {0x3, 0x604}}]}, @common=@unspec=@STANDARD={0x28, '\x00', 0x0, 0xfffffffffffffffd}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x518) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = getpgrp(0x0) prlimit64(r2, 0x0, &(0x7f00000004c0)={0x0, 0x7ffffd}, &(0x7f00000002c0)) ioctl$SIOCSIFHWADDR(r0, 0x8924, &(0x7f0000000880)={'tunl0\x00', @dev={[], 0x17}}) lremovexattr(0x0, &(0x7f0000000740)=ANY=[@ANYBLOB="1a88d3aa4452e36b07cd737465642ee39ba5d9718727249cb759f9116928193f731f1b5dc704009fb56d4a906c38566f9fe9c6575324d94c06742a345107d250678c54aac198f7d9a31390e0f588cc6e1715ced02901d17716f0c189e9e945f62e7b62d55fade2087197e4468c06ad79b4b6b523e790f9dbe77bbfb234773097c8a5ead903ae35c32f3854f276178dcb4a48a34125c87b7659362e98693d0e36a25b36931a8acd6d677ed38e38c95702ee46f794e7c0ea6bd7360a4c5f31db11f2274d6205b7314c8633a0f98e3e003b2b7c1ef3476310867acf9d8dad693c63b42fc9d16e"]) getsockopt$inet_sctp_SCTP_PR_ASSOC_STATUS(0xffffffffffffffff, 0x84, 0x73, &(0x7f0000000280), 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r3 = syz_open_dev$amidi(&(0x7f0000000100)='/dev/amidi#\x00', 0x2, 0x800) recvfrom(0xffffffffffffffff, 0x0, 0x0, 0x20, &(0x7f00000005c0)=@ipx={0x4, 0x1, 0x6, "6b183128f377"}, 0x80) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000200)='./file0\x00', 0x700, 0x0, &(0x7f00000024c0), 0x100032, &(0x7f0000000900)=ANY=[@ANYBLOB="6d44cbc2d4e3b42305b0fee0f260308efebd476372cb5e6d26c20f71791fe916ea702716fedb518b1505c0c5bc8d2accba593420b7198e1d18f6a15977186b6df1a1cad4bf0bdde190218cfcc5ea95580311d1bbeb6111af188ebea884d1105e"]) getsockopt$inet_dccp_int(0xffffffffffffffff, 0x21, 0xf, &(0x7f0000000240), 0x0) fstat(0xffffffffffffffff, &(0x7f00000006c0)) getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, &(0x7f0000000440)={0x0, 0x80}, &(0x7f00000001c0)=0xfffffffffffffd3f) ioctl$FICLONE(r1, 0x40049409, r3) move_pages(r2, 0x7, &(0x7f0000000680)=[&(0x7f0000ffd000/0x1000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffe000/0x2000)=nil], &(0x7f0000000840)=[0x2, 0x3, 0xdb, 0x9, 0x4, 0x50e4], &(0x7f00000008c0)=[0x0, 0x0, 0x0, 0x0], 0x6) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, 0x0) 14:18:45 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x3, &(0x7f0000001fd8)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x15}}, &(0x7f0000000080)="47504c049c3514bf772da07ae82e76590a36f6493ec1ab91b397e42abf1ea6cd8cd77427fc9a9e2b7165f52b4107bf0850d899dc52d013175ddb1b2f46203c2a05b722e33e556fb2e3f39a3cde1fca53640337ec956146bdbfcb115070195631de5d21a5ea9e638c2bdb78a501ca4b6ea313d82568f9382c2c3f6faba6b4ee54793b4ed26dae3e52225029bb2ac0007f77754c3f23ceda9809b9a9684a940abcaa8cfcc7133ec422e9c83888318d41e9a493f0195fe2599651b89504f5dba14625ce2366f33d95dba92f867279cabf4aceddc85a8af7a0fa68d767ce5136b9d0d1966c499cb6bf34c2988666970000000000000000000000", 0x2}, 0x48) 14:18:45 executing program 3: clone(0x20000000000, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket$l2tp(0x18, 0x1, 0x1) [ 2710.413397] hfs: can't find a HFS filesystem on dev loop2 [ 2710.536382] hfs: can't find a HFS filesystem on dev loop2 14:18:45 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x3, &(0x7f0000001fd8)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x15}}, &(0x7f0000000080)="47504c049c3514bf772da07ae82e76590a36f6493ec1ab91b397e42abf1ea6cd8cd77427fc9a9e2b7165f52b4107bf0850d899dc52d013175ddb1b2f46203c2a05b722e33e556fb2e3f39a3cde1fca53640337ec956146bdbfcb115070195631de5d21a5ea9e638c2bdb78a501ca4b6ea313d82568f9382c2c3f6faba6b4ee54793b4ed26dae3e52225029bb2ac0007f77754c3f23ceda9809b9a9684a940abcaa8cfcc7133ec422e9c83888318d41e9a493f0195fe2599651b89504f5dba14625ce2366f33d95dba92f867279cabf4aceddc85a8af7a0fa68d767ce5136b9d0d1966c499cb6bf34c2988666970000000000000000000000", 0x1c}, 0x48) 14:18:45 executing program 2: getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) syz_mount_image$hfs(&(0x7f0000000200)='hfs\x00', &(0x7f0000000280)='./file0\x00', 0xe00, 0x0, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 14:18:45 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000940)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x48, 0x0, 0x0) syz_mount_image$bfs(&(0x7f0000000180)='bfs\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 14:18:45 executing program 1: r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/expire_quiescent_template\x00', 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000140)=@security={'security\x00', 0xe, 0x4, 0x4e0, 0x1f0, 0x320, 0x0, 0x320, 0x320, 0x438, 0x438, 0x438, 0x438, 0x438, 0x4, &(0x7f0000000100), {[{{@ipv6={@local, @local, [0x0, 0xffffff00, 0xffffffff, 0xffffff00], [0xffffffff, 0xff, 0xffffffff, 0xff], 'eql\x00', 'gretap0\x00', {}, {0xff}, 0x0, 0x7fffffff, 0x2, 0x61}, 0x0, 0x188, 0x1c8, 0x0, {}, [@common=@unspec=@conntrack2={0xc0, 'conntrack\x00', 0x2, {{@ipv4=@loopback, [0xffffffff, 0xffffffff, 0x0, 0xffffffff], @ipv4=@loopback, [0x0, 0xffffffff, 0xffffff00, 0xff000000], @ipv6=@ipv4={[], [], @remote}, [0xffffff00, 0xff000000, 0xff000000, 0xff], @ipv4=@multicast2, [0xffffffff, 0xff, 0xff0000ff], 0x3, 0x1ff, 0x4, 0x4e21, 0x4e20, 0x4e22, 0x4e20, 0x28, 0x20}, 0x1c0, 0x98}}]}, @common=@unspec=@ERROR={0x40, 'ERROR\x00', 0x0, "f650bd5c77822a55c077a2b3078812467f4ab9fefc372cf333baff203cdb"}}, {{@ipv6={@remote, @mcast2, [0xff000000, 0xffffff00, 0xffffffff, 0xff000000], [0x0, 0xff, 0xff000000, 0xffffff00], 'syzkaller0\x00', 'lo\x00', {}, {0xff}, 0x2b, 0x1, 0x2, 0x23}, 0x0, 0xf0, 0x130, 0x0, {}, [@common=@hl={0x28, 'hl\x00'}]}, @common=@inet=@TCPOPTSTRIP={0x40, 'TCPOPTSTRIP\x00', 0x0, {[0xe08d, 0x6, 0xff, 0x800, 0x2, 0x7, 0x3, 0x5]}}}, {{@uncond, 0x0, 0xf0, 0x118, 0x0, {}, [@common=@hl={0x28, 'hl\x00', 0x0, {0x3, 0x604}}]}, @common=@unspec=@STANDARD={0x28, '\x00', 0x0, 0xfffffffffffffffd}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x540) ioctl$EXT4_IOC_MIGRATE(0xffffffffffffffff, 0x6609) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000300)={0x0}, &(0x7f0000000400)=0xc) getsockopt$ARPT_SO_GET_INFO(r0, 0x0, 0x60, &(0x7f0000000740)={'filter\x00'}, &(0x7f00000007c0)=0x44) r3 = getpgrp(r2) prlimit64(r3, 0x0, &(0x7f00000004c0)={0x0, 0x7ffffd}, &(0x7f00000002c0)) lremovexattr(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000480)=@random={'trusted.', 'bpf\x00'}) getsockopt$inet_sctp_SCTP_PR_ASSOC_STATUS(0xffffffffffffffff, 0x84, 0x73, &(0x7f0000000280)={0x0, 0x8, 0x0, 0xe0}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r4 = syz_open_dev$amidi(&(0x7f0000000100)='/dev/amidi#\x00', 0x2, 0x800) recvfrom(r4, &(0x7f0000000500)=""/96, 0x60, 0x20, &(0x7f00000005c0)=@ipx={0x4, 0x1, 0x6, "6b183128f377"}, 0x80) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000200)='./file0\x00', 0x700, 0x0, &(0x7f00000024c0), 0x100032, &(0x7f00000000c0)=ANY=[@ANYBLOB]) prctl$PR_MPX_ENABLE_MANAGEMENT(0x2b) getsockopt$inet_dccp_int(0xffffffffffffffff, 0x21, 0xf, &(0x7f0000000240), 0x0) fstat(0xffffffffffffffff, &(0x7f00000006c0)) getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, &(0x7f0000000440)={0x0, 0x80}, &(0x7f00000001c0)=0xfffffffffffffd3f) ioctl$FICLONE(r1, 0x40049409, r4) setgroups(0x3, &(0x7f0000000340)=[0x0, 0x0, 0x0]) ioctl$BLKRRPART(r4, 0x125f, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, 0x0) 14:18:45 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x3, &(0x7f0000001fd8)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x15}}, &(0x7f0000000080)="47504c049c3514bf772da07ae82e76590a36f6493ec1ab91b397e42abf1ea6cd8cd77427fc9a9e2b7165f52b4107bf0850d899dc52d013175ddb1b2f46203c2a05b722e33e556fb2e3f39a3cde1fca53640337ec956146bdbfcb115070195631de5d21a5ea9e638c2bdb78a501ca4b6ea313d82568f9382c2c3f6faba6b4ee54793b4ed26dae3e52225029bb2ac0007f77754c3f23ceda9809b9a9684a940abcaa8cfcc7133ec422e9c83888318d41e9a493f0195fe2599651b89504f5dba14625ce2366f33d95dba92f867279cabf4aceddc85a8af7a0fa68d767ce5136b9d0d1966c499cb6bf34c2988666970000000000000000000000", 0x700000000000000}, 0x48) 14:18:45 executing program 3: clone(0xc2b321c69b9085df, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) prctl$PR_SET_FPEMU(0xa, 0x2) r0 = syz_open_dev$radio(&(0x7f0000000000)='/dev/radio#\x00', 0x0, 0x2) ioctl$DRM_IOCTL_MODESET_CTL(r0, 0x40086408, &(0x7f0000000040)={0x0, 0x5}) uname(&(0x7f0000000080)=""/29) 14:18:45 executing program 4: r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/expire_quiescent_template\x00', 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000140)=@security={'security\x00', 0xe, 0x4, 0x4b8, 0x1f0, 0x320, 0x0, 0x320, 0x320, 0x438, 0x438, 0x438, 0x438, 0x438, 0x4, &(0x7f0000000100), {[{{@ipv6={@local, @local, [0x0, 0x0, 0xffffffff, 0xffffff00], [0xffffffff, 0xff, 0xffffffff, 0xff], 'eql\x00', 'gretap0\x00', {}, {0xff}, 0x0, 0x7fffffff, 0x2, 0x61}, 0x0, 0x188, 0x1c8, 0x0, {}, [@common=@unspec=@conntrack2={0xc0, 'conntrack\x00', 0x2, {{@ipv4=@loopback, [0xffffffff, 0xffffffff, 0x0, 0xffffffff], @ipv4=@loopback, [0x0, 0xffffffff, 0xffffff00, 0xff000000], @ipv6=@ipv4={[], [], @remote}, [0xffffff00, 0xff000000, 0xff000000, 0xff], @ipv4=@multicast2, [0xffffffff, 0xff, 0xff0000ff], 0x3, 0x1ff, 0x4, 0x4e21, 0x4e20, 0x4e22, 0x4e20, 0x28}, 0x1c0, 0x98}}]}, @common=@unspec=@ERROR={0x40, 'ERROR\x00', 0x0, "f650bd5c77822a55c077a2b3078812467f4ab9fefc372cf333baff203cdb"}}, {{@ipv6={@remote, @mcast2, [0xff000000, 0xffffff00, 0xffffffff, 0xff000000], [0x0, 0xff, 0xff000000, 0xffffff00], 'syzkaller0\x00', 'lo\x00', {}, {}, 0x2b, 0x1, 0x2, 0x23}, 0x0, 0xc8, 0x108}, @common=@inet=@TCPOPTSTRIP={0x40, 'TCPOPTSTRIP\x00', 0x0, {[0xe08d, 0x6, 0xff, 0x800, 0x2, 0x7, 0x0, 0x5]}}}, {{@uncond, 0x0, 0xf0, 0x118, 0x0, {}, [@common=@hl={0x28, 'hl\x00', 0x0, {0x3, 0x604}}]}, @common=@unspec=@STANDARD={0x28, '\x00', 0x0, 0xfffffffffffffffd}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x518) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = getpgrp(0x0) prlimit64(r2, 0x0, &(0x7f00000004c0)={0x0, 0x7ffffd}, &(0x7f00000002c0)) lremovexattr(0x0, &(0x7f0000000480)=@random={'trusted.', 'bpf\x00'}) getsockopt$inet_sctp_SCTP_PR_ASSOC_STATUS(0xffffffffffffffff, 0x84, 0x73, &(0x7f0000000280), 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r3 = syz_open_dev$amidi(&(0x7f0000000100)='/dev/amidi#\x00', 0x2, 0x800) recvfrom(0xffffffffffffffff, 0x0, 0x0, 0x20, &(0x7f00000005c0)=@ipx={0x4, 0x1, 0x6, "6b183128f377"}, 0x80) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) fcntl$getownex(r1, 0x10, &(0x7f0000000680)) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000200)='./file0\x00', 0x700, 0x0, &(0x7f00000024c0), 0x100032, &(0x7f00000000c0)=ANY=[@ANYBLOB]) getsockopt$inet_dccp_int(0xffffffffffffffff, 0x21, 0xf, &(0x7f0000000240), 0x0) fstat(0xffffffffffffffff, &(0x7f00000006c0)) getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, &(0x7f0000000440)={0x0, 0x80}, &(0x7f00000001c0)=0xfffffffffffffd3f) syz_open_dev$media(&(0x7f0000000740)='/dev/media#\x00', 0x8, 0x102) ioctl$FICLONE(r1, 0x40049409, r3) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, 0x0) [ 2710.992698] hfs: can't find a HFS filesystem on dev loop2 14:18:45 executing program 3: ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000001100)=0x0) r1 = syz_open_procfs(r0, &(0x7f0000000000)='cpuset\x00') getsockopt$ARPT_SO_GET_INFO(r1, 0x0, 0x60, &(0x7f0000000040)={'filter\x00'}, &(0x7f00000000c0)=0x44) clone(0x8000, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$SNDRV_CTL_IOCTL_HWDEP_INFO(r1, 0x80dc5521, &(0x7f0000000100)=""/4096) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r1, 0x6, 0x23, &(0x7f0000001140)={&(0x7f0000ffb000/0x2000)=nil, 0x2000}, &(0x7f0000001180)=0x10) [ 2711.145772] hfs: can't find a HFS filesystem on dev loop2 14:18:46 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x3, &(0x7f0000001fd8)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x15}}, &(0x7f0000000080)="47504c049c3514bf772da07ae82e76590a36f6493ec1ab91b397e42abf1ea6cd8cd77427fc9a9e2b7165f52b4107bf0850d899dc52d013175ddb1b2f46203c2a05b722e33e556fb2e3f39a3cde1fca53640337ec956146bdbfcb115070195631de5d21a5ea9e638c2bdb78a501ca4b6ea313d82568f9382c2c3f6faba6b4ee54793b4ed26dae3e52225029bb2ac0007f77754c3f23ceda9809b9a9684a940abcaa8cfcc7133ec422e9c83888318d41e9a493f0195fe2599651b89504f5dba14625ce2366f33d95dba92f867279cabf4aceddc85a8af7a0fa68d767ce5136b9d0d1966c499cb6bf34c2988666970000000000000000000000", 0x300000000000000}, 0x48) 14:18:46 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000940)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x48, 0x0, 0x0) syz_mount_image$bfs(&(0x7f0000000180)='bfs\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 14:18:46 executing program 2: getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) syz_mount_image$hfs(&(0x7f0000000200)='hfs\x00', &(0x7f0000000280)='./file0\x00', 0x20000000, 0x0, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) [ 2711.377449] EXT4-fs: 3 callbacks suppressed [ 2711.377471] EXT4-fs (sda1): Unrecognized mount option "./file0" or missing value 14:18:46 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x3, &(0x7f0000001fd8)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x15}}, &(0x7f0000000080)="47504c049c3514bf772da07ae82e76590a36f6493ec1ab91b397e42abf1ea6cd8cd77427fc9a9e2b7165f52b4107bf0850d899dc52d013175ddb1b2f46203c2a05b722e33e556fb2e3f39a3cde1fca53640337ec956146bdbfcb115070195631de5d21a5ea9e638c2bdb78a501ca4b6ea313d82568f9382c2c3f6faba6b4ee54793b4ed26dae3e52225029bb2ac0007f77754c3f23ceda9809b9a9684a940abcaa8cfcc7133ec422e9c83888318d41e9a493f0195fe2599651b89504f5dba14625ce2366f33d95dba92f867279cabf4aceddc85a8af7a0fa68d767ce5136b9d0d1966c499cb6bf34c2988666970000000000000000000000", 0x1c000000}, 0x48) [ 2711.533921] EXT4-fs (sda1): re-mounted. Opts: [ 2711.539193] hfs: can't find a HFS filesystem on dev loop2 14:18:46 executing program 3: clone(0xc2b321c6db9081df, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = syz_open_dev$adsp(&(0x7f0000000100)='/dev/adsp#\x00', 0x1000, 0xfffffffffffffffe) ioctl$UI_SET_ABSBIT(r0, 0x40045567, 0x6) write$FUSE_NOTIFY_INVAL_INODE(r0, &(0x7f0000000040)={0x28, 0x2, 0x0, {0x5, 0x9, 0x6}}, 0x28) [ 2711.616513] EXT4-fs (sda1): Unrecognized mount option "./file0" or missing value 14:18:46 executing program 2: getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) syz_mount_image$hfs(&(0x7f0000000200)='hfs\x00', &(0x7f0000000280)='./file0\x00', 0x97ffffff, 0x0, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 14:18:46 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x3, &(0x7f0000001fd8)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x15}}, &(0x7f0000000080)="47504c049c3514bf772da07ae82e76590a36f6493ec1ab91b397e42abf1ea6cd8cd77427fc9a9e2b7165f52b4107bf0850d899dc52d013175ddb1b2f46203c2a05b722e33e556fb2e3f39a3cde1fca53640337ec956146bdbfcb115070195631de5d21a5ea9e638c2bdb78a501ca4b6ea313d82568f9382c2c3f6faba6b4ee54793b4ed26dae3e52225029bb2ac0007f77754c3f23ceda9809b9a9684a940abcaa8cfcc7133ec422e9c83888318d41e9a493f0195fe2599651b89504f5dba14625ce2366f33d95dba92f867279cabf4aceddc85a8af7a0fa68d767ce5136b9d0d1966c499cb6bf34c2988666970000000000000000000000", 0x17d629}, 0x48) [ 2711.692675] EXT4-fs (sda1): Unrecognized mount option "./file0" or missing value [ 2711.786496] IPVS: ftp: loaded support on port[0] = 21 14:18:46 executing program 1: r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/expire_quiescent_template\x00', 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000140)=@security={'security\x00', 0xe, 0x4, 0x4e0, 0x1f0, 0x320, 0x0, 0x320, 0x320, 0x438, 0x438, 0x438, 0x438, 0x438, 0x4, &(0x7f0000000100), {[{{@ipv6={@local, @local, [0x0, 0xffffff00, 0xffffffff, 0xffffff00], [0xffffffff, 0xff, 0xffffffff, 0xff], 'eql\x00', 'gretap0\x00', {}, {0xff}, 0x0, 0x7fffffff, 0x2, 0x61}, 0x0, 0x188, 0x1c8, 0x0, {}, [@common=@unspec=@conntrack2={0xc0, 'conntrack\x00', 0x2, {{@ipv4=@loopback, [0xffffffff, 0xffffffff, 0x0, 0xffffffff], @ipv4=@loopback, [0x0, 0xffffffff, 0xffffff00, 0xff000000], @ipv6=@ipv4={[], [], @remote}, [0xffffff00, 0xff000000, 0xff000000, 0xff], @ipv4=@multicast2, [0xffffffff, 0xff, 0xff0000ff], 0x3, 0x1ff, 0x4, 0x4e21, 0x4e20, 0x4e22, 0x4e20, 0x28, 0x20}, 0x1c0, 0x98}}]}, @common=@unspec=@ERROR={0x40, 'ERROR\x00', 0x0, "f650bd5c77822a55c077a2b3078812467f4ab9fefc372cf333baff203cdb"}}, {{@ipv6={@remote, @mcast2, [0xff000000, 0xffffff00, 0xffffffff, 0xff000000], [0x0, 0xff, 0xff000000, 0xffffff00], 'syzkaller0\x00', 'lo\x00', {}, {0xff}, 0x2b, 0x1, 0x2, 0x23}, 0x0, 0xf0, 0x130, 0x0, {}, [@common=@hl={0x28, 'hl\x00'}]}, @common=@inet=@TCPOPTSTRIP={0x40, 'TCPOPTSTRIP\x00', 0x0, {[0xe08d, 0x6, 0xff, 0x800, 0x2, 0x7, 0x3, 0x5]}}}, {{@uncond, 0x0, 0xf0, 0x118, 0x0, {}, [@common=@hl={0x28, 'hl\x00', 0x0, {0x3, 0x604}}]}, @common=@unspec=@STANDARD={0x28, '\x00', 0x0, 0xfffffffffffffffd}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x540) ioctl$EXT4_IOC_MIGRATE(0xffffffffffffffff, 0x6609) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000300)={0x0}, &(0x7f0000000400)=0xc) getsockopt$ARPT_SO_GET_INFO(r0, 0x0, 0x60, &(0x7f0000000740)={'filter\x00'}, &(0x7f00000007c0)=0x44) r3 = getpgrp(r2) prlimit64(r3, 0x0, &(0x7f00000004c0)={0x0, 0x7ffffd}, &(0x7f00000002c0)) lremovexattr(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000480)=@random={'trusted.', 'bpf\x00'}) getsockopt$inet_sctp_SCTP_PR_ASSOC_STATUS(0xffffffffffffffff, 0x84, 0x73, &(0x7f0000000280)={0x0, 0x8, 0x0, 0xe0}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r4 = syz_open_dev$amidi(&(0x7f0000000100)='/dev/amidi#\x00', 0x2, 0x800) recvfrom(r4, &(0x7f0000000500)=""/96, 0x60, 0x20, &(0x7f00000005c0)=@ipx={0x4, 0x1, 0x6, "6b183128f377"}, 0x80) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000200)='./file0\x00', 0x700, 0x0, &(0x7f00000024c0), 0x100032, &(0x7f00000000c0)=ANY=[@ANYBLOB]) prctl$PR_MPX_ENABLE_MANAGEMENT(0x2b) getsockopt$inet_dccp_int(0xffffffffffffffff, 0x21, 0xf, &(0x7f0000000240), 0x0) fstat(0xffffffffffffffff, &(0x7f00000006c0)) getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, &(0x7f0000000440)={0x0, 0x80}, &(0x7f00000001c0)=0xfffffffffffffd3f) ioctl$FICLONE(r1, 0x40049409, r4) setgroups(0x3, &(0x7f0000000340)=[0x0, 0x0, 0x0]) mkdir(&(0x7f0000000800)='./file0\x00', 0x2) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, 0x0) 14:18:46 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000940)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x48, 0x0, 0x0) syz_mount_image$bfs(&(0x7f0000000180)='bfs\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) [ 2711.850811] hfs: can't find a HFS filesystem on dev loop2 14:18:46 executing program 4: r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/expire_quiescent_template\x00', 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000140)=@security={'security\x00', 0xe, 0x4, 0x4b8, 0x1f0, 0x320, 0x0, 0x320, 0x320, 0x438, 0x438, 0x438, 0x438, 0x438, 0x4, &(0x7f0000000100), {[{{@ipv6={@local, @local, [0x0, 0x0, 0xffffffff, 0xffffff00], [0xffffffff, 0xff, 0xffffffff, 0xff], 'eql\x00', 'gretap0\x00', {}, {0xff}, 0x0, 0x7fffffff, 0x2, 0x61}, 0x0, 0x188, 0x1c8, 0x0, {}, [@common=@unspec=@conntrack2={0xc0, 'conntrack\x00', 0x2, {{@ipv4=@loopback, [0xffffffff, 0xffffffff, 0x0, 0xffffffff], @ipv4=@loopback, [0x0, 0xffffffff, 0xffffff00, 0xff000000], @ipv6=@ipv4={[], [], @remote}, [0xffffff00, 0xff000000, 0xff000000, 0xff], @ipv4=@multicast2, [0xffffffff, 0xff, 0xff0000ff], 0x3, 0x1ff, 0x4, 0x4e21, 0x4e20, 0x4e22, 0x4e20, 0x28}, 0x1c0, 0x98}}]}, @common=@unspec=@ERROR={0x40, 'ERROR\x00', 0x0, "f650bd5c77822a55c077a2b3078812467f4ab9fefc372cf333baff203cdb"}}, {{@ipv6={@remote, @mcast2, [0xff000000, 0xffffff00, 0xffffffff, 0xff000000], [0x0, 0xff, 0xff000000, 0xffffff00], 'syzkaller0\x00', 'lo\x00', {}, {}, 0x2b, 0x1, 0x2, 0x23}, 0x0, 0xc8, 0x108}, @common=@inet=@TCPOPTSTRIP={0x40, 'TCPOPTSTRIP\x00', 0x0, {[0xe08d, 0x6, 0xff, 0x800, 0x2, 0x7, 0x0, 0x5]}}}, {{@uncond, 0x0, 0xf0, 0x118, 0x0, {}, [@common=@hl={0x28, 'hl\x00', 0x0, {0x3, 0x604}}]}, @common=@unspec=@STANDARD={0x28, '\x00', 0x0, 0xfffffffffffffffd}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x518) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000042ff8)='./file0\x00', 0x80040, 0x0) fcntl$setlease(r2, 0x400, 0x0) close(r2) r3 = getpgrp(0x0) prlimit64(r3, 0x0, &(0x7f00000004c0)={0x0, 0x7ffffd}, &(0x7f00000002c0)) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000001740)={&(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ffb000/0x4000)=nil, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000000740)="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", 0x1000, r0}, 0x68) lremovexattr(0x0, &(0x7f0000000480)=@random={'trusted.', 'bpf\x00'}) getsockopt$inet_sctp_SCTP_PR_ASSOC_STATUS(0xffffffffffffffff, 0x84, 0x73, &(0x7f0000000280), 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r4 = syz_open_dev$amidi(&(0x7f0000000100)='/dev/amidi#\x00', 0x2, 0x800) ioctl$FS_IOC_RESVSP(r4, 0x40305828, &(0x7f0000000680)={0x0, 0x6, 0xffff, 0xffffffffffffff01}) recvfrom(0xffffffffffffffff, 0x0, 0x0, 0x20, &(0x7f00000005c0)=@ipx={0x4, 0x1, 0x6, "6b183128f377"}, 0x80) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000200)='./file0\x00', 0x700, 0x0, &(0x7f00000024c0), 0x100032, &(0x7f00000000c0)=ANY=[@ANYBLOB]) getsockopt$inet_dccp_int(0xffffffffffffffff, 0x21, 0xf, &(0x7f0000000240), 0x0) fstat(0xffffffffffffffff, &(0x7f00000006c0)) getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, &(0x7f0000000440)={0x0, 0x80}, &(0x7f00000001c0)=0xfffffffffffffd3f) ioctl$FICLONE(r1, 0x40049409, r4) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, 0x0) [ 2711.925099] hfs: can't find a HFS filesystem on dev loop2 14:18:46 executing program 2: getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) syz_mount_image$hfs(&(0x7f0000000200)='hfs\x00', &(0x7f0000000280)='./file0\x00', 0x7400, 0x0, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 14:18:46 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x3, &(0x7f0000001fd8)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x15}}, &(0x7f0000000080)="47504c049c3514bf772da07ae82e76590a36f6493ec1ab91b397e42abf1ea6cd8cd77427fc9a9e2b7165f52b4107bf0850d899dc52d013175ddb1b2f46203c2a05b722e33e556fb2e3f39a3cde1fca53640337ec956146bdbfcb115070195631de5d21a5ea9e638c2bdb78a501ca4b6ea313d82568f9382c2c3f6faba6b4ee54793b4ed26dae3e52225029bb2ac0007f77754c3f23ceda9809b9a9684a940abcaa8cfcc7133ec422e9c83888318d41e9a493f0195fe2599651b89504f5dba14625ce2366f33d95dba92f867279cabf4aceddc85a8af7a0fa68d767ce5136b9d0d1966c499cb6bf34c2988666970000000000000000000000", 0xffffffff00000000}, 0x48) [ 2712.224834] IPVS: ftp: loaded support on port[0] = 21 [ 2712.285733] EXT4-fs (sda1): Unrecognized mount option "./file0" or missing value [ 2712.315721] hfs: can't find a HFS filesystem on dev loop2 14:18:47 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x3, &(0x7f0000001fd8)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x15}}, &(0x7f0000000080)="47504c049c3514bf772da07ae82e76590a36f6493ec1ab91b397e42abf1ea6cd8cd77427fc9a9e2b7165f52b4107bf0850d899dc52d013175ddb1b2f46203c2a05b722e33e556fb2e3f39a3cde1fca53640337ec956146bdbfcb115070195631de5d21a5ea9e638c2bdb78a501ca4b6ea313d82568f9382c2c3f6faba6b4ee54793b4ed26dae3e52225029bb2ac0007f77754c3f23ceda9809b9a9684a940abcaa8cfcc7133ec422e9c83888318d41e9a493f0195fe2599651b89504f5dba14625ce2366f33d95dba92f867279cabf4aceddc85a8af7a0fa68d767ce5136b9d0d1966c499cb6bf34c2988666970000000000000000000000", 0x1c00000000000000}, 0x48) 14:18:47 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000940)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x48, 0x0, 0x0) syz_mount_image$bfs(&(0x7f0000000180)='bfs\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 14:18:47 executing program 2: getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) syz_mount_image$hfs(&(0x7f0000000200)='hfs\x00', &(0x7f0000000280)='./file0\x00', 0xfffffff5, 0x0, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 14:18:47 executing program 1: r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/expire_quiescent_template\x00', 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000140)=@security={'security\x00', 0xe, 0x4, 0x4e0, 0x1f0, 0x320, 0x0, 0x320, 0x320, 0x438, 0x438, 0x438, 0x438, 0x438, 0x4, &(0x7f0000000100), {[{{@ipv6={@local, @local, [0x0, 0xffffff00, 0xffffffff, 0xffffff00], [0xffffffff, 0xff, 0xffffffff, 0xff], 'eql\x00', 'gretap0\x00', {}, {0xff}, 0x0, 0x7fffffff, 0x2, 0x61}, 0x0, 0x188, 0x1c8, 0x0, {}, [@common=@unspec=@conntrack2={0xc0, 'conntrack\x00', 0x2, {{@ipv4=@loopback, [0xffffffff, 0xffffffff, 0x0, 0xffffffff], @ipv4=@loopback, [0x0, 0xffffffff, 0xffffff00, 0xff000000], @ipv6=@ipv4={[], [], @remote}, [0xffffff00, 0xff000000, 0xff000000, 0xff], @ipv4=@multicast2, [0xffffffff, 0xff, 0xff0000ff], 0x3, 0x1ff, 0x4, 0x4e21, 0x4e20, 0x4e22, 0x4e20, 0x28, 0x20}, 0x1c0, 0x98}}]}, @common=@unspec=@ERROR={0x40, 'ERROR\x00', 0x0, "f650bd5c77822a55c077a2b3078812467f4ab9fefc372cf333baff203cdb"}}, {{@ipv6={@remote, @mcast2, [0xff000000, 0xffffff00, 0xffffffff, 0xff000000], [0x0, 0xff, 0xff000000, 0xffffff00], 'syzkaller0\x00', 'lo\x00', {}, {0xff}, 0x2b, 0x1, 0x2, 0x23}, 0x0, 0xf0, 0x130, 0x0, {}, [@common=@hl={0x28, 'hl\x00'}]}, @common=@inet=@TCPOPTSTRIP={0x40, 'TCPOPTSTRIP\x00', 0x0, {[0xe08d, 0x6, 0xff, 0x800, 0x2, 0x7, 0x3, 0x5]}}}, {{@uncond, 0x0, 0xf0, 0x118, 0x0, {}, [@common=@hl={0x28, 'hl\x00', 0x0, {0x3, 0x604}}]}, @common=@unspec=@STANDARD={0x28, '\x00', 0x0, 0xfffffffffffffffd}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x540) ioctl$EXT4_IOC_MIGRATE(0xffffffffffffffff, 0x6609) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000300)={0x0}, &(0x7f0000000400)=0xc) getsockopt$ARPT_SO_GET_INFO(r0, 0x0, 0x60, &(0x7f0000000740)={'filter\x00'}, &(0x7f00000007c0)=0x44) r3 = getpgrp(r2) prlimit64(r3, 0x0, &(0x7f00000004c0)={0x0, 0x7ffffd}, &(0x7f00000002c0)) lremovexattr(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000480)=@random={'trusted.', 'bpf\x00'}) getsockopt$inet_sctp_SCTP_PR_ASSOC_STATUS(0xffffffffffffffff, 0x84, 0x73, &(0x7f0000000280)={0x0, 0x8, 0x0, 0xe0}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r5 = syz_open_dev$amidi(&(0x7f0000000100)='/dev/amidi#\x00', 0x2, 0x800) recvfrom(r5, &(0x7f0000000500)=""/96, 0x60, 0x20, &(0x7f00000005c0)=@ipx={0x4, 0x1, 0x6, "6b183128f377"}, 0x80) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000200)='./file0\x00', 0x700, 0x0, &(0x7f00000024c0), 0x100032, &(0x7f00000000c0)=ANY=[@ANYBLOB]) prctl$PR_MPX_ENABLE_MANAGEMENT(0x2b) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(r5, 0x84, 0x1a, &(0x7f0000000840)={r4, 0xb9, "85273b28de25be0bd6176d8cc4da7b85b240e7df926643f848a6ecf871d229acade077d18bd25cf6a55fd0a95008225b5f56b859d1e0d91ef78e5e6d388cd2084e8f78c10b7977353fa1b690cf277cbad656e45db3cca20771ab1ebda9cc4f3846085454f8b10a24b7ebd1dc2f26e3c9950e2621ba137c0c3b880c14ee88cf8bbf168481a61db7860564ce8a16640928aa748f5e538153f56d0e2fe8ec9dd9984444d3216b507ded204cf9d16f307da667855cac94423d9f03"}, &(0x7f0000000680)=0xc1) getsockopt$inet_dccp_int(r0, 0x21, 0x2, &(0x7f0000000800), 0x0) fstat(0xffffffffffffffff, &(0x7f00000006c0)) getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, &(0x7f0000000440)={0x0, 0x80}, &(0x7f00000001c0)=0xfffffffffffffd3f) ioctl$FICLONE(r1, 0x40049409, r5) setgroups(0x3, &(0x7f0000000340)=[0x0, 0x0, 0x0]) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) ioctl$TIOCGSID(r0, 0x5429, &(0x7f0000000940)) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, 0x0) 14:18:47 executing program 3: clone(0xc2b321c6db9081df, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) prctl$PR_TASK_PERF_EVENTS_ENABLE(0x20) r0 = syz_open_dev$adsp(&(0x7f0000000000)='/dev/adsp#\x00', 0x2, 0x200000) ioctl$SNDRV_RAWMIDI_IOCTL_STATUS(r0, 0xc0385720, &(0x7f0000000040)={0x1, {0x77359400}, 0x3, 0x780}) 14:18:47 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x3, &(0x7f0000001fd8)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x15}}, &(0x7f0000000080)="47504c049c3514bf772da07ae82e76590a36f6493ec1ab91b397e42abf1ea6cd8cd77427fc9a9e2b7165f52b4107bf0850d899dc52d013175ddb1b2f46203c2a05b722e33e556fb2e3f39a3cde1fca53640337ec956146bdbfcb115070195631de5d21a5ea9e638c2bdb78a501ca4b6ea313d82568f9382c2c3f6faba6b4ee54793b4ed26dae3e52225029bb2ac0007f77754c3f23ceda9809b9a9684a940abcaa8cfcc7133ec422e9c83888318d41e9a493f0195fe2599651b89504f5dba14625ce2366f33d95dba92f867279cabf4aceddc85a8af7a0fa68d767ce5136b9d0d1966c499cb6bf34c2988666970000000000000000000000", 0x4000000000000000}, 0x48) [ 2712.557653] EXT4-fs (sda1): Unrecognized mount option "./file0" or missing value [ 2712.620362] hfs: can't find a HFS filesystem on dev loop2 14:18:47 executing program 4: r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/expire_quiescent_template\x00', 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000140)=@security={'security\x00', 0xe, 0x4, 0x4b8, 0x1f0, 0x320, 0x0, 0x320, 0x320, 0x438, 0x438, 0x438, 0x438, 0x438, 0x4, &(0x7f0000000100), {[{{@ipv6={@local, @local, [0x0, 0x0, 0xffffffff, 0xffffff00], [0xffffffff, 0xff, 0xffffffff, 0xff], 'eql\x00', 'gretap0\x00', {}, {0xff}, 0x0, 0x7fffffff, 0x2, 0x61}, 0x0, 0x188, 0x1c8, 0x0, {}, [@common=@unspec=@conntrack2={0xc0, 'conntrack\x00', 0x2, {{@ipv4=@loopback, [0xffffffff, 0xffffffff, 0x0, 0xffffffff], @ipv4=@loopback, [0x0, 0xffffffff, 0xffffff00, 0xff000000], @ipv6=@ipv4={[], [], @remote}, [0xffffff00, 0xff000000, 0xff000000, 0xff], @ipv4=@multicast2, [0xffffffff, 0xff, 0xff0000ff], 0x3, 0x1ff, 0x4, 0x4e21, 0x4e20, 0x4e22, 0x4e20, 0x28}, 0x1c0, 0x98}}]}, @common=@unspec=@ERROR={0x40, 'ERROR\x00', 0x0, "f650bd5c77822a55c077a2b3078812467f4ab9fefc372cf333baff203cdb"}}, {{@ipv6={@remote, @mcast2, [0xff000000, 0xffffff00, 0xffffffff, 0xff000000], [0x0, 0xff, 0xff000000, 0xffffff00], 'syzkaller0\x00', 'lo\x00', {}, {}, 0x2b, 0x1, 0x2, 0x23}, 0x0, 0xc8, 0x108}, @common=@inet=@TCPOPTSTRIP={0x40, 'TCPOPTSTRIP\x00', 0x0, {[0xe08d, 0x6, 0xff, 0x800, 0x2, 0x7, 0x0, 0x5]}}}, {{@uncond, 0x0, 0xf0, 0x118, 0x0, {}, [@common=@hl={0x28, 'hl\x00', 0x0, {0x3, 0x604}}]}, @common=@unspec=@STANDARD={0x28, '\x00', 0x0, 0xfffffffffffffffd}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x518) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = getpgrp(0x0) prlimit64(r2, 0x0, &(0x7f00000004c0)={0x0, 0x7ffffd}, &(0x7f00000002c0)) lremovexattr(0x0, &(0x7f0000000480)=@random={'trusted.', 'bpf\x00'}) getsockopt$inet_sctp_SCTP_PR_ASSOC_STATUS(0xffffffffffffffff, 0x84, 0x73, &(0x7f0000000280), 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r3 = syz_open_dev$amidi(&(0x7f0000000100)='/dev/amidi#\x00', 0x2, 0x800) recvfrom(0xffffffffffffffff, 0x0, 0x0, 0x20, &(0x7f00000005c0)=@ipx={0x4, 0x1, 0x6, "6b183128f377"}, 0x80) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000200)='./file0\x00', 0x700, 0x0, &(0x7f00000024c0), 0x100032, &(0x7f0000000740)=ANY=[@ANYBLOB="8e3ad7ef53911613573d9abb8419a125531b99851cd2a35105d8a7d97d649b003b6ef3ed171b14dd51018d7acae843680e9fc91d67769a4fd6d4604dc4cf8a06e8a1343c71def53b8ef85a219d201fca700e884ac74ec9ab2f50ee41235e90a8d7f969ae7eb71683b44bf23ca6b6338a02ba49ae91b6877adbfc7e01d4dbb2e93f7755765948c40aa0a3de28b95d55701c54d30afc665db8c11d95746173f1e5cc5b45f16dfd006b3bd3ee43d8de976ea6388559db7713ccf319b81e11eb663fcb201c833af1c146b46383ed41c5c3555820595549d9233c5cabf803ff"]) getsockopt$inet_dccp_int(0xffffffffffffffff, 0x21, 0xf, &(0x7f0000000240), 0x0) fstat(0xffffffffffffffff, &(0x7f00000006c0)) getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, &(0x7f0000000440)={0x0, 0x80}, &(0x7f00000001c0)=0xfffffffffffffd3f) ioctl$FICLONE(r1, 0x40049409, r3) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, 0x0) 14:18:47 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x3, &(0x7f0000001fd8)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x15}}, &(0x7f0000000080)="47504c049c3514bf772da07ae82e76590a36f6493ec1ab91b397e42abf1ea6cd8cd77427fc9a9e2b7165f52b4107bf0850d899dc52d013175ddb1b2f46203c2a05b722e33e556fb2e3f39a3cde1fca53640337ec956146bdbfcb115070195631de5d21a5ea9e638c2bdb78a501ca4b6ea313d82568f9382c2c3f6faba6b4ee54793b4ed26dae3e52225029bb2ac0007f77754c3f23ceda9809b9a9684a940abcaa8cfcc7133ec422e9c83888318d41e9a493f0195fe2599651b89504f5dba14625ce2366f33d95dba92f867279cabf4aceddc85a8af7a0fa68d767ce5136b9d0d1966c499cb6bf34c2988666970000000000000000000000", 0x3f00000000000000}, 0x48) [ 2712.725035] hfs: can't find a HFS filesystem on dev loop2 [ 2712.747362] IPVS: ftp: loaded support on port[0] = 21 14:18:47 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000940)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x48, 0x0, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 14:18:47 executing program 2: getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) syz_mount_image$hfs(&(0x7f0000000200)='hfs\x00', &(0x7f0000000280)='./file0\x00', 0x74, 0x0, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) [ 2712.945590] EXT4-fs (sda1): re-mounted. Opts: [ 2713.058925] IPVS: ftp: loaded support on port[0] = 21 [ 2713.072790] EXT4-fs (sda1): Unrecognized mount option "./file0" or missing value 14:18:48 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x3, &(0x7f0000001fd8)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x15}}, &(0x7f0000000080)="47504c049c3514bf772da07ae82e76590a36f6493ec1ab91b397e42abf1ea6cd8cd77427fc9a9e2b7165f52b4107bf0850d899dc52d013175ddb1b2f46203c2a05b722e33e556fb2e3f39a3cde1fca53640337ec956146bdbfcb115070195631de5d21a5ea9e638c2bdb78a501ca4b6ea313d82568f9382c2c3f6faba6b4ee54793b4ed26dae3e52225029bb2ac0007f77754c3f23ceda9809b9a9684a940abcaa8cfcc7133ec422e9c83888318d41e9a493f0195fe2599651b89504f5dba14625ce2366f33d95dba92f867279cabf4aceddc85a8af7a0fa68d767ce5136b9d0d1966c499cb6bf34c2988666970000000000000000000000", 0x10}, 0x48) [ 2713.169999] hfs: can't find a HFS filesystem on dev loop2 [ 2713.288621] hfs: can't find a HFS filesystem on dev loop2 14:18:48 executing program 1: r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/expire_quiescent_template\x00', 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000140)=@security={'security\x00', 0xe, 0x4, 0x4e0, 0x1f0, 0x320, 0x0, 0x320, 0x320, 0x438, 0x438, 0x438, 0x438, 0x438, 0x4, &(0x7f0000000100), {[{{@ipv6={@local, @local, [0x0, 0xffffff00, 0xffffffff, 0xffffff00], [0xffffffff, 0xff, 0xffffffff, 0xff], 'eql\x00', 'gretap0\x00', {}, {0xff}, 0x0, 0x7fffffff, 0x2, 0x61}, 0x0, 0x188, 0x1c8, 0x0, {}, [@common=@unspec=@conntrack2={0xc0, 'conntrack\x00', 0x2, {{@ipv4=@loopback, [0xffffffff, 0xffffffff, 0x0, 0xffffffff], @ipv4=@loopback, [0x0, 0xffffffff, 0xffffff00, 0xff000000], @ipv6=@ipv4={[], [], @remote}, [0xffffff00, 0xff000000, 0xff000000, 0xff], @ipv4=@multicast2, [0xffffffff, 0xff, 0xff0000ff], 0x3, 0x1ff, 0x4, 0x4e21, 0x4e20, 0x4e22, 0x4e20, 0x28, 0x20}, 0x1c0, 0x98}}]}, @common=@unspec=@ERROR={0x40, 'ERROR\x00', 0x0, "f650bd5c77822a55c077a2b3078812467f4ab9fefc372cf333baff203cdb"}}, {{@ipv6={@remote, @mcast2, [0xff000000, 0xffffff00, 0xffffffff, 0xff000000], [0x0, 0xff, 0xff000000, 0xffffff00], 'syzkaller0\x00', 'lo\x00', {}, {0xff}, 0x2b, 0x1, 0x2, 0x23}, 0x0, 0xf0, 0x130, 0x0, {}, [@common=@hl={0x28, 'hl\x00'}]}, @common=@inet=@TCPOPTSTRIP={0x40, 'TCPOPTSTRIP\x00', 0x0, {[0xe08d, 0x6, 0xff, 0x800, 0x2, 0x7, 0x3, 0x5]}}}, {{@uncond, 0x0, 0xf0, 0x118, 0x0, {}, [@common=@hl={0x28, 'hl\x00', 0x0, {0x3, 0x604}}]}, @common=@unspec=@STANDARD={0x28, '\x00', 0x0, 0xfffffffffffffffd}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x540) ioctl$EXT4_IOC_MIGRATE(0xffffffffffffffff, 0x6609) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000300)={0x0}, &(0x7f0000000400)=0xc) getsockopt$ARPT_SO_GET_INFO(r0, 0x0, 0x60, &(0x7f0000000740)={'filter\x00'}, &(0x7f00000007c0)=0x44) r3 = getpgrp(r2) prlimit64(r3, 0x0, &(0x7f00000004c0)={0x0, 0x7ffffd}, &(0x7f00000002c0)) lremovexattr(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000480)=@random={'trusted.', 'bpf\x00'}) getsockopt$inet_sctp_SCTP_PR_ASSOC_STATUS(0xffffffffffffffff, 0x84, 0x73, &(0x7f0000000280)={0x0, 0x8, 0x0, 0xe0}, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_LOCK(r0, 0x40405514, &(0x7f0000000680)={0x4, 0x6, 0x8, 0x3, 'syz0\x00', 0x800}) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r4 = syz_open_dev$amidi(&(0x7f0000000100)='/dev/amidi#\x00', 0x2, 0x800) recvfrom(r4, &(0x7f0000000500)=""/96, 0x60, 0x20, &(0x7f00000005c0)=@ipx={0x4, 0x1, 0x6, "6b183128f377"}, 0x80) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000200)='./file0\x00', 0x700, 0x0, &(0x7f00000024c0), 0x100032, &(0x7f00000000c0)=ANY=[@ANYBLOB]) prctl$PR_MPX_ENABLE_MANAGEMENT(0x2b) getsockopt$inet_dccp_int(0xffffffffffffffff, 0x21, 0xf, &(0x7f0000000240), 0x0) fstat(0xffffffffffffffff, &(0x7f00000006c0)) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000840)={&(0x7f0000000800)='./file0\x00', 0x0, 0x8}, 0x10) getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, &(0x7f0000000440)={0x0, 0x80}, &(0x7f00000001c0)=0xfffffffffffffd3f) ioctl$FICLONE(r1, 0x40049409, r4) setgroups(0x3, &(0x7f0000000340)=[0x0, 0x0, 0x0]) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, 0x0) 14:18:48 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x3, &(0x7f0000001fd8)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x15}}, &(0x7f0000000080)="47504c049c3514bf772da07ae82e76590a36f6493ec1ab91b397e42abf1ea6cd8cd77427fc9a9e2b7165f52b4107bf0850d899dc52d013175ddb1b2f46203c2a05b722e33e556fb2e3f39a3cde1fca53640337ec956146bdbfcb115070195631de5d21a5ea9e638c2bdb78a501ca4b6ea313d82568f9382c2c3f6faba6b4ee54793b4ed26dae3e52225029bb2ac0007f77754c3f23ceda9809b9a9684a940abcaa8cfcc7133ec422e9c83888318d41e9a493f0195fe2599651b89504f5dba14625ce2366f33d95dba92f867279cabf4aceddc85a8af7a0fa68d767ce5136b9d0d1966c499cb6bf34c2988666970000000000000000000000", 0xff00000000000000}, 0x48) 14:18:48 executing program 3: r0 = syz_open_dev$vbi(&(0x7f0000000100)='/dev/vbi#\x00', 0x0, 0x2) ioctl$KVM_GET_EMULATED_CPUID(r0, 0xc008ae09, &(0x7f0000000140)=""/211) pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$KVM_S390_INTERRUPT_CPU(r2, 0x4010ae94, &(0x7f0000000040)={0x3eda3b87, 0xde, 0x3}) r3 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000080)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$read(0xb, r3, &(0x7f0000000340)=""/65, 0x41) ioctl$KVM_PPC_ALLOCATE_HTAB(r2, 0xc004aea7, &(0x7f0000000300)=0xfffffffffffff801) ioctl$KVM_PPC_ALLOCATE_HTAB(r1, 0xc004aea7, &(0x7f0000000240)=0x8) [ 2713.356430] EXT4-fs (sda1): Unrecognized mount option ":SW=%SңQا}d" or missing value 14:18:48 executing program 2: getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) syz_mount_image$hfs(&(0x7f0000000200)='hfs\x00', &(0x7f0000000280)='./file0\x00', 0x60, 0x0, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 14:18:48 executing program 4: r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/expire_quiescent_template\x00', 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000140)=@security={'security\x00', 0xe, 0x4, 0x4b8, 0x1f0, 0x320, 0x0, 0x320, 0x320, 0x438, 0x438, 0x438, 0x438, 0x438, 0x4, &(0x7f0000000100), {[{{@ipv6={@local, @local, [0x0, 0x0, 0xffffffff, 0xffffff00], [0xffffffff, 0xff, 0xffffffff, 0xff], 'eql\x00', 'gretap0\x00', {}, {0xff}, 0x0, 0x7fffffff, 0x2, 0x61}, 0x0, 0x188, 0x1c8, 0x0, {}, [@common=@unspec=@conntrack2={0xc0, 'conntrack\x00', 0x2, {{@ipv4=@loopback, [0xffffffff, 0xffffffff, 0x0, 0xffffffff], @ipv4=@loopback, [0x0, 0xffffffff, 0xffffff00, 0xff000000], @ipv6=@ipv4={[], [], @remote}, [0xffffff00, 0xff000000, 0xff000000, 0xff], @ipv4=@multicast2, [0xffffffff, 0xff, 0xff0000ff], 0x3, 0x1ff, 0x4, 0x4e21, 0x4e20, 0x4e22, 0x4e20, 0x28}, 0x1c0, 0x98}}]}, @common=@unspec=@ERROR={0x40, 'ERROR\x00', 0x0, "f650bd5c77822a55c077a2b3078812467f4ab9fefc372cf333baff203cdb"}}, {{@ipv6={@remote, @mcast2, [0xff000000, 0xffffff00, 0xffffffff, 0xff000000], [0x0, 0xff, 0xff000000, 0xffffff00], 'syzkaller0\x00', 'lo\x00', {}, {}, 0x2b, 0x1, 0x2, 0x23}, 0x0, 0xc8, 0x108}, @common=@inet=@TCPOPTSTRIP={0x40, 'TCPOPTSTRIP\x00', 0x0, {[0xe08d, 0x6, 0xff, 0x800, 0x2, 0x7, 0x0, 0x5]}}}, {{@uncond, 0x0, 0xf0, 0x118, 0x0, {}, [@common=@hl={0x28, 'hl\x00', 0x0, {0x3, 0x604}}]}, @common=@unspec=@STANDARD={0x28, '\x00', 0x0, 0xfffffffffffffffd}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x518) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpgrp(0x0) prlimit64(r1, 0x0, &(0x7f00000004c0)={0x0, 0x7ffffd}, &(0x7f00000002c0)) lremovexattr(0x0, &(0x7f0000000480)=@random={'trusted.', 'bpf\x00'}) getsockopt$inet_sctp_SCTP_PR_ASSOC_STATUS(0xffffffffffffffff, 0x84, 0x73, &(0x7f0000000280), 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) syz_open_dev$amidi(&(0x7f0000000100)='/dev/amidi#\x00', 0x2, 0x800) recvfrom(0xffffffffffffffff, 0x0, 0x0, 0x20, &(0x7f00000005c0)=@ipx={0x4, 0x1, 0x6, "6b183128f377"}, 0x80) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000200)='./file0\x00', 0x700, 0x0, &(0x7f00000024c0), 0x100032, &(0x7f00000000c0)=ANY=[@ANYBLOB]) getsockopt$inet_dccp_int(0xffffffffffffffff, 0x21, 0xf, &(0x7f0000000240), 0x0) fstat(0xffffffffffffffff, &(0x7f00000006c0)) getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, &(0x7f0000000440)={0x0, 0x80}, &(0x7f00000001c0)=0xfffffffffffffd3f) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000680)='./file0\x00', 0x0, 0x2000ffe, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, 0x0) 14:18:48 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000940)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x48, 0x0, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 14:18:48 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x3, &(0x7f0000001fd8)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x15}}, &(0x7f0000000080)="47504c049c3514bf772da07ae82e76590a36f6493ec1ab91b397e42abf1ea6cd8cd77427fc9a9e2b7165f52b4107bf0850d899dc52d013175ddb1b2f46203c2a05b722e33e556fb2e3f39a3cde1fca53640337ec956146bdbfcb115070195631de5d21a5ea9e638c2bdb78a501ca4b6ea313d82568f9382c2c3f6faba6b4ee54793b4ed26dae3e52225029bb2ac0007f77754c3f23ceda9809b9a9684a940abcaa8cfcc7133ec422e9c83888318d41e9a493f0195fe2599651b89504f5dba14625ce2366f33d95dba92f867279cabf4aceddc85a8af7a0fa68d767ce5136b9d0d1966c499cb6bf34c2988666970000000000000000000000", 0x400000000000000}, 0x48) 14:18:48 executing program 3: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000100)='/dev/snapshot\x00', 0x400800, 0x0) ioctl$FIBMAP(r0, 0x1, &(0x7f0000000080)=0x1afb6283) ioctl$sock_inet_tcp_SIOCINQ(r0, 0x541b, &(0x7f0000000040)) [ 2713.710534] hfs: can't find a HFS filesystem on dev loop2 [ 2713.713117] EXT4-fs (sda1): re-mounted. Opts: ,errors=continue 14:18:48 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x3, &(0x7f0000001fd8)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x15}}, &(0x7f0000000080)="47504c049c3514bf772da07ae82e76590a36f6493ec1ab91b397e42abf1ea6cd8cd77427fc9a9e2b7165f52b4107bf0850d899dc52d013175ddb1b2f46203c2a05b722e33e556fb2e3f39a3cde1fca53640337ec956146bdbfcb115070195631de5d21a5ea9e638c2bdb78a501ca4b6ea313d82568f9382c2c3f6faba6b4ee54793b4ed26dae3e52225029bb2ac0007f77754c3f23ceda9809b9a9684a940abcaa8cfcc7133ec422e9c83888318d41e9a493f0195fe2599651b89504f5dba14625ce2366f33d95dba92f867279cabf4aceddc85a8af7a0fa68d767ce5136b9d0d1966c499cb6bf34c2988666970000000000000000000000", 0x3000000}, 0x48) [ 2713.820961] hfs: can't find a HFS filesystem on dev loop2 14:18:48 executing program 3: clone(0xc2b321c6db9081df, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x41, 0x0) fdatasync(r0) syz_open_dev$media(&(0x7f0000000040)='/dev/media#\x00', 0x4, 0x100) r1 = getpid() syz_open_procfs$namespace(r1, &(0x7f0000000080)='ns/cgroup\x00') 14:18:48 executing program 2: getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) syz_mount_image$hfs(&(0x7f0000000200)='hfs\x00', &(0x7f0000000280)='./file0\x00', 0x6000000000000000, 0x0, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 14:18:48 executing program 1: r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000800)='/proc/sys/net/ipv4/vs/sync_qlen_max\x00', 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000140)=@security={'security\x00', 0xe, 0x4, 0x4e0, 0x1f0, 0x320, 0x0, 0x320, 0x320, 0x438, 0x438, 0x438, 0x438, 0x438, 0x4, &(0x7f0000000100), {[{{@ipv6={@local, @local, [0x0, 0xffffff00, 0xffffffff, 0xffffff00], [0xffffffff, 0xff, 0xffffffff, 0xff], 'eql\x00', 'gretap0\x00', {}, {0xff}, 0x0, 0x7fffffff, 0x2, 0x61}, 0x0, 0x188, 0x1c8, 0x0, {}, [@common=@unspec=@conntrack2={0xc0, 'conntrack\x00', 0x2, {{@ipv4=@loopback, [0xffffffff, 0xffffffff, 0x0, 0xffffffff], @ipv4=@loopback, [0x0, 0xffffffff, 0xffffff00, 0xff000000], @ipv6=@ipv4={[], [], @remote}, [0xffffff00, 0xff000000, 0xff000000, 0xff], @ipv4=@multicast2, [0xffffffff, 0xff, 0xff0000ff], 0x3, 0x1ff, 0x4, 0x4e21, 0x4e20, 0x4e22, 0x4e20, 0x28, 0x20}, 0x1c0, 0x98}}]}, @common=@unspec=@ERROR={0x40, 'ERROR\x00', 0x0, "f650bd5c77822a55c077a2b3078812467f4ab9fefc372cf333baff203cdb"}}, {{@ipv6={@remote, @mcast2, [0xff000000, 0xffffff00, 0xffffffff, 0xff000000], [0x0, 0xff, 0xff000000, 0xffffff00], 'syzkaller0\x00', 'lo\x00', {}, {0xff}, 0x2b, 0x1, 0x2, 0x23}, 0x0, 0xf0, 0x130, 0x0, {}, [@common=@hl={0x28, 'hl\x00'}]}, @common=@inet=@TCPOPTSTRIP={0x40, 'TCPOPTSTRIP\x00', 0x0, {[0xe08d, 0x6, 0xff, 0x800, 0x2, 0x7, 0x3, 0x5]}}}, {{@uncond, 0x0, 0xf0, 0x118, 0x0, {}, [@common=@hl={0x28, 'hl\x00', 0x0, {0x3, 0x604}}]}, @common=@unspec=@STANDARD={0x28, '\x00', 0x0, 0xfffffffffffffffd}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x540) ioctl$EXT4_IOC_MIGRATE(0xffffffffffffffff, 0x6609) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000300)={0x0}, &(0x7f0000000400)=0xc) ioctl$HDIO_GETGEO(r0, 0x301, &(0x7f00000009c0)) getsockopt$ARPT_SO_GET_INFO(r0, 0x0, 0x60, &(0x7f0000000740)={'filter\x00'}, &(0x7f00000007c0)=0x44) r3 = getpgrp(r2) prlimit64(r3, 0x0, &(0x7f00000004c0)={0x0, 0x7ffffd}, &(0x7f00000002c0)) lremovexattr(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000480)=@random={'trusted.', 'bpf\x00'}) getsockopt$inet_sctp_SCTP_PR_ASSOC_STATUS(0xffffffffffffffff, 0x84, 0x73, &(0x7f0000000280)={0x0, 0x8, 0x0, 0xe0}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r4 = syz_open_dev$amidi(&(0x7f0000000100)='/dev/amidi#\x00', 0x2, 0x800) vmsplice(r0, &(0x7f0000000e40)=[{&(0x7f0000000c00)="6befd94b4a58f79cfb075276916d7cdc1492f4c37fa7de3c2acf3632e18d9c0f2b5434fdffff21546e44d01efd2332801a0c29e30f4c1e24b7233a06dbfe6514e6f3c2f6eb199978a985ddc64c6c924eb17d90dc317a8798fe1a557544d8f4b9d40fbcf02816d414a4824968f4fb2ba3e5210f83", 0x74}, {&(0x7f0000000c80)="41933fe3697913dee0ee7981c5f398fef748e21949fec229071f23d7e20ed947ba0e360529b299dac8c32ef62b59c51135146aef7909b0f298973f532936692a70d48520ec5dd4c7988f711c0c8b82df90defdd9e257ab6f00bc524fc673944d1400d0c26eb1832b2a4193885ce8fad7368cf54c82e25008a98f60813e0ebfc1075208b15e43ab569c1837bc202adcd965fad998bc196c5aed188a10afa2780fff74b76d5ab877a64c2292d9461f125fbb898825a0011a5b0224233d2aba03ffddd3f3e20535", 0xc6}, {&(0x7f0000000d80)="ed20286547192d6dcf2aea55787a04ba3e1539420c6e6511db4bbed64c5e898f3100491244643e490a4cbc867e68b70cd98bdb49295bf61f0f7c55001b296c7be61c804d3287351bf086e8140736d2dbb248a35a6080d68a7d40ad3706e7dfb26d78804174d690318a9915a8d29cef6301cf7825657eb677b19a07a97c4d264a7792417baf4515fbabad5664553af4d6573f581d9db559fcef389e94e7029be1e19df6c5a5b10d1384b082f15d1bd3543606e9c9571d76c6b8", 0xb9}], 0x3, 0x9) syz_open_dev$cec(&(0x7f0000000680)='/dev/cec#\x00', 0x2, 0x2) recvfrom(r4, &(0x7f0000000500)=""/96, 0x60, 0x20, &(0x7f00000005c0)=@ipx={0x4, 0x1, 0x6, "6b183128f377"}, 0x80) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000a80)='./file0\x00', 0x700, 0x4, &(0x7f0000000a00)=[{&(0x7f0000000840)="f20044fe737547f1c7b334b55e639f8e577f04ff72bcfd40ed14a8ee45abe7b0a126e1d4659bae1b05d8e219af8fefd45874f6caf7951274b3257609660dc3e3405c93ec4c3c14463273e8218ef8d546296b7e4ba9bce6abb00e6fd153cf8b1332cdc85727f6ef9dc140feeb6bf957ce814dd56594f42a83d410f5cf463085ea65354bd07e8584e4dee799f0b41ccce25842285f6ec82f8831a94032e76ea890a8d07403ce6ac2150b976ecd71c5baee5d07245c2fb2f5016a64687c95709479006aeb5f7305ea66038516ff987b6d0972072862549a", 0xd6, 0x80000000}, {&(0x7f0000000940)="1ca0d2bec3f8477ef8bc55146af309129ee15c07d519b936416bba11199c865b00", 0x21, 0x4}, {&(0x7f0000000980)="304a91943359f54d74ad089d95581ea6e1240e181598aa924130b5a181450879b5e4d288", 0x24, 0x5}, {&(0x7f0000000ac0)="1a99a4457d47525c93b8dc4c5e556acf38ce0e2dc461f5bd04ffbb7e849e3516d3bc876d051c3c640ae04faa72c61a729f07542a2f457f15824b7862a139f885121cfce24fcb816832c4c2724ea1300923de171fb7cc8c3932", 0x59, 0xe558}], 0x100032, &(0x7f0000000b40)=ANY=[@ANYBLOB="9dbcbefcd2592ad89a8d3e8b85f7ca1ebde81d8865585c6a91dea3a8e95689380c4a2f3a24f0667c859cb903447658dffa0128850fabd13ad8d14369dc200ebfafe7009029d71d5e5aa0ba05abef71e1e0a375de3d79c670b0b12fee6950280bc45640fb357cef826f96a9ca3543a4af00d3529b729ab7ffcfbc0209d496299d14cf2dca26eaf4c743754e672aa399198508d93bfb644a676ebd"]) prctl$PR_MPX_ENABLE_MANAGEMENT(0x2b) getsockopt$inet_dccp_int(0xffffffffffffffff, 0x21, 0xf, &(0x7f0000000240), 0x0) fstat(0xffffffffffffffff, &(0x7f00000006c0)) getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, &(0x7f0000000440)={0x0, 0x80}, &(0x7f00000001c0)=0xfffffffffffffd3f) ioctl$FICLONE(r1, 0x40049409, r4) setgroups(0x3, &(0x7f0000000340)=[0x0, 0x0, 0x0]) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) gettid() syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, 0x0) 14:18:48 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000940)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x48, 0x0, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 14:18:48 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x3, &(0x7f0000001fd8)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x15}}, &(0x7f0000000080)="47504c049c3514bf772da07ae82e76590a36f6493ec1ab91b397e42abf1ea6cd8cd77427fc9a9e2b7165f52b4107bf0850d899dc52d013175ddb1b2f46203c2a05b722e33e556fb2e3f39a3cde1fca53640337ec956146bdbfcb115070195631de5d21a5ea9e638c2bdb78a501ca4b6ea313d82568f9382c2c3f6faba6b4ee54793b4ed26dae3e52225029bb2ac0007f77754c3f23ceda9809b9a9684a940abcaa8cfcc7133ec422e9c83888318d41e9a493f0195fe2599651b89504f5dba14625ce2366f33d95dba92f867279cabf4aceddc85a8af7a0fa68d767ce5136b9d0d1966c499cb6bf34c2988666970000000000000000000000", 0x40000000}, 0x48) [ 2714.038173] IPVS: ftp: loaded support on port[0] = 21 [ 2714.136270] hfs: can't find a HFS filesystem on dev loop2 14:18:49 executing program 4: r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/expire_quiescent_template\x00', 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000140)=@security={'security\x00', 0xe, 0x4, 0x4b8, 0x1f0, 0x320, 0x0, 0x320, 0x320, 0x438, 0x438, 0x438, 0x438, 0x438, 0x4, &(0x7f0000000100), {[{{@ipv6={@local, @local, [0x0, 0x0, 0xffffffff, 0xffffff00], [0xffffffff, 0xff, 0xffffffff, 0xff], 'eql\x00', 'gretap0\x00', {}, {0xff}, 0x0, 0x7fffffff, 0x2, 0x61}, 0x0, 0x188, 0x1c8, 0x0, {}, [@common=@unspec=@conntrack2={0xc0, 'conntrack\x00', 0x2, {{@ipv4=@loopback, [0xffffffff, 0xffffffff, 0x0, 0xffffffff], @ipv4=@loopback, [0x0, 0xffffffff, 0xffffff00, 0xff000000], @ipv6=@ipv4={[], [], @remote}, [0xffffff00, 0xff000000, 0xff000000, 0xff], @ipv4=@multicast2, [0xffffffff, 0xff, 0xff0000ff], 0x3, 0x1ff, 0x4, 0x4e21, 0x4e20, 0x4e22, 0x4e20, 0x28}, 0x1c0, 0x98}}]}, @common=@unspec=@ERROR={0x40, 'ERROR\x00', 0x0, "f650bd5c77822a55c077a2b3078812467f4ab9fefc372cf333baff203cdb"}}, {{@ipv6={@remote, @mcast2, [0xff000000, 0xffffff00, 0xffffffff, 0xff000000], [0x0, 0xff, 0xff000000, 0xffffff00], 'syzkaller0\x00', 'lo\x00', {}, {}, 0x2b, 0x1, 0x2, 0x23}, 0x0, 0xc8, 0x108}, @common=@inet=@TCPOPTSTRIP={0x40, 'TCPOPTSTRIP\x00', 0x0, {[0xe08d, 0x6, 0xff, 0x800, 0x2, 0x7, 0x0, 0x5]}}}, {{@uncond, 0x0, 0xf0, 0x118, 0x0, {}, [@common=@hl={0x28, 'hl\x00', 0x0, {0x3, 0x604}}]}, @common=@unspec=@STANDARD={0x28, '\x00', 0x0, 0xfffffffffffffffd}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x518) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = getpid() fcntl$setown(r1, 0x8, r2) r3 = getpgrp(0x0) prlimit64(r3, 0x0, &(0x7f00000004c0)={0x0, 0x7ffffd}, &(0x7f00000002c0)) lremovexattr(0x0, &(0x7f0000000480)=@random={'trusted.', 'bpf\x00'}) getsockopt$inet_sctp_SCTP_PR_ASSOC_STATUS(0xffffffffffffffff, 0x84, 0x73, &(0x7f0000000280), 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r4 = syz_open_dev$amidi(&(0x7f0000000100)='/dev/amidi#\x00', 0x2, 0x800) recvfrom(0xffffffffffffffff, 0x0, 0x0, 0x20, &(0x7f00000005c0)=@ipx={0x4, 0x1, 0x6, "6b183128f377"}, 0x80) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000200)='./file0\x00', 0x700, 0x0, &(0x7f00000024c0), 0x100032, &(0x7f0000000740)=ANY=[@ANYBLOB="cbc1a3ab62538183fc27e8fd80e670e5b5cacd3e745b8d0524ffa488f27ff37d26e686d2421d941e2fd5f38d840b4f63594a4b27c9c2e5c7da5fc8843fc9c88da5d87def9d8d22595ed988b041fb6312250457eca17241967828143127927652001732c365827ec8e947991ea5f8ad3e5132a54a5c3cdb3d9a806783abc5dc6ec30000000000000000000000"]) ioctl$VHOST_SET_VRING_CALL(r4, 0x4008af21, &(0x7f0000000680)={0x3, r4}) getsockopt$inet_dccp_int(0xffffffffffffffff, 0x21, 0xf, &(0x7f0000000240), 0x0) fstat(0xffffffffffffffff, &(0x7f00000006c0)) getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, &(0x7f0000000440)={0x0, 0x80}, &(0x7f00000001c0)=0xfffffffffffffd3f) ioctl$FICLONE(r1, 0x40049409, r4) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, 0x0) 14:18:49 executing program 2: getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) syz_mount_image$hfs(&(0x7f0000000200)='hfs\x00', &(0x7f0000000280)='./file0\x00', 0xf6ffffff00000000, 0x0, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 14:18:49 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x3, &(0x7f0000001fd8)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x15}}, &(0x7f0000000080)="47504c049c3514bf772da07ae82e76590a36f6493ec1ab91b397e42abf1ea6cd8cd77427fc9a9e2b7165f52b4107bf0850d899dc52d013175ddb1b2f46203c2a05b722e33e556fb2e3f39a3cde1fca53640337ec956146bdbfcb115070195631de5d21a5ea9e638c2bdb78a501ca4b6ea313d82568f9382c2c3f6faba6b4ee54793b4ed26dae3e52225029bb2ac0007f77754c3f23ceda9809b9a9684a940abcaa8cfcc7133ec422e9c83888318d41e9a493f0195fe2599651b89504f5dba14625ce2366f33d95dba92f867279cabf4aceddc85a8af7a0fa68d767ce5136b9d0d1966c499cb6bf34c2988666970000000000000000000000", 0x100000}, 0x48) 14:18:49 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000940)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$bfs(&(0x7f0000000180)='bfs\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 14:18:49 executing program 1: r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/expire_quiescent_template\x00', 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000140)=@security={'security\x00', 0xe, 0x4, 0x4e0, 0x1f0, 0x320, 0x0, 0x320, 0x320, 0x438, 0x438, 0x438, 0x438, 0x438, 0x4, &(0x7f0000000100), {[{{@ipv6={@local, @local, [0x0, 0xffffff00, 0xffffffff, 0xffffff00], [0xffffffff, 0xff, 0xffffffff, 0xff], 'eql\x00', 'gretap0\x00', {}, {0xff}, 0x0, 0x7fffffff, 0x2, 0x61}, 0x0, 0x188, 0x1c8, 0x0, {}, [@common=@unspec=@conntrack2={0xc0, 'conntrack\x00', 0x2, {{@ipv4=@loopback, [0xffffffff, 0xffffffff, 0x0, 0xffffffff], @ipv4=@loopback, [0x0, 0xffffffff, 0xffffff00, 0xff000000], @ipv6=@ipv4={[], [], @remote}, [0xffffff00, 0xff000000, 0xff000000, 0xff], @ipv4=@multicast2, [0xffffffff, 0xff, 0xff0000ff], 0x3, 0x1ff, 0x4, 0x4e21, 0x4e20, 0x4e22, 0x4e20, 0x28, 0x20}, 0x1c0, 0x98}}]}, @common=@unspec=@ERROR={0x40, 'ERROR\x00', 0x0, "f650bd5c77822a55c077a2b3078812467f4ab9fefc372cf333baff203cdb"}}, {{@ipv6={@remote, @mcast2, [0xff000000, 0xffffff00, 0xffffffff, 0xff000000], [0x0, 0xff, 0xff000000, 0xffffff00], 'syzkaller0\x00', 'lo\x00', {}, {0xff}, 0x2b, 0x1, 0x2, 0x23}, 0x0, 0xf0, 0x130, 0x0, {}, [@common=@hl={0x28, 'hl\x00'}]}, @common=@inet=@TCPOPTSTRIP={0x40, 'TCPOPTSTRIP\x00', 0x0, {[0xe08d, 0x6, 0xff, 0x800, 0x2, 0x7, 0x3, 0x5]}}}, {{@uncond, 0x0, 0xf0, 0x118, 0x0, {}, [@common=@hl={0x28, 'hl\x00', 0x0, {0x3, 0x604}}]}, @common=@unspec=@STANDARD={0x28, '\x00', 0x0, 0xfffffffffffffffd}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x540) ioctl$EXT4_IOC_MIGRATE(0xffffffffffffffff, 0x6609) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000300)={0x0}, &(0x7f0000000400)=0xc) getsockopt$ARPT_SO_GET_INFO(r0, 0x0, 0x60, &(0x7f0000000740)={'filter\x00'}, &(0x7f00000007c0)=0x44) r3 = getpgrp(r2) prlimit64(r3, 0x0, &(0x7f00000004c0)={0x0, 0x7ffffd}, &(0x7f00000002c0)) lremovexattr(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000480)=@random={'trusted.', 'bpf\x00'}) getsockopt$inet_sctp_SCTP_PR_ASSOC_STATUS(0xffffffffffffffff, 0x84, 0x73, &(0x7f0000000280)={0x0, 0x8, 0x0, 0xe0}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) ioctl$FS_IOC_FSGETXATTR(r1, 0x801c581f, &(0x7f0000000680)={0x0, 0xfffffffeffffffff, 0x7fffffff, 0x5, 0x81}) r4 = syz_open_dev$amidi(&(0x7f0000000100)='/dev/amidi#\x00', 0x2, 0x800) recvfrom(r4, &(0x7f0000000500)=""/96, 0x60, 0x20, &(0x7f00000005c0)=@ipx={0x4, 0x1, 0x6, "6b183128f377"}, 0x80) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000200)='./file0\x00', 0x700, 0x0, &(0x7f00000024c0), 0x100032, &(0x7f00000000c0)=ANY=[@ANYBLOB]) prctl$PR_MPX_ENABLE_MANAGEMENT(0x2b) getsockopt$inet_dccp_int(0xffffffffffffffff, 0x21, 0xf, &(0x7f0000000240), 0x0) fstat(0xffffffffffffffff, &(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, &(0x7f0000000440)={0x0, 0x80}, &(0x7f00000001c0)=0xfffffffffffffd3f) ioctl$FICLONE(r1, 0x40049409, r4) setgroups(0x3, &(0x7f0000000340)=[0x0, 0x0, 0x0]) ioctl$PPPIOCSMRU(r4, 0x40047452, &(0x7f0000000800)=0x7) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, 0x0) write$P9_RSTATu(r0, &(0x7f0000000840)={0x4e, 0x7d, 0x2, {{0x0, 0x38, 0x2, 0x0, {0x0, 0x3, 0x2}, 0x800000, 0xa0e2, 0x8000, 0x1, 0x1, '\'', 0x3, 'hl\x00', 0x0, "", 0x1, '\x00'}, 0x1, '^', r5, r6, r5}}, 0x4e) [ 2714.594679] hfs: can't find a HFS filesystem on dev loop2 [ 2714.652129] IPVS: ftp: loaded support on port[0] = 21 14:18:49 executing program 2: getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) syz_mount_image$hfs(&(0x7f0000000200)='hfs\x00', &(0x7f0000000280)='./file0\x00', 0x900, 0x0, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 14:18:49 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x3, &(0x7f0000001fd8)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x15}}, &(0x7f0000000080)="47504c049c3514bf772da07ae82e76590a36f6493ec1ab91b397e42abf1ea6cd8cd77427fc9a9e2b7165f52b4107bf0850d899dc52d013175ddb1b2f46203c2a05b722e33e556fb2e3f39a3cde1fca53640337ec956146bdbfcb115070195631de5d21a5ea9e638c2bdb78a501ca4b6ea313d82568f9382c2c3f6faba6b4ee54793b4ed26dae3e52225029bb2ac0007f77754c3f23ceda9809b9a9684a940abcaa8cfcc7133ec422e9c83888318d41e9a493f0195fe2599651b89504f5dba14625ce2366f33d95dba92f867279cabf4aceddc85a8af7a0fa68d767ce5136b9d0d1966c499cb6bf34c2988666970000000000000000000000", 0x2000000}, 0x48) 14:18:49 executing program 3: clone(0xd0536b00272cfcc1, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 14:18:49 executing program 4: r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/expire_quiescent_template\x00', 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000140)=ANY=[@ANYBLOB="73656377eaaee52ef3e0587e098275726974790009000000000000000000000000000000000000000000000e0000000400000017b50000f00100002003000000000000200300002003000038040000380400003804000038", @ANYPTR=&(0x7f0000000100)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00'], @ANYBLOB="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"], 0x518) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) userfaultfd(0x800) r2 = getpgrp(0x0) prlimit64(r2, 0x0, &(0x7f00000004c0)={0x0, 0x7ffffd}, &(0x7f00000002c0)) lremovexattr(0x0, &(0x7f0000000880)=ANY=[@ANYBLOB="747275737465642e6270660056821d8b67783933f61c4f332b2d53dd3f305af1acd6d6cf2ca301fbd0304d437d6da92663d97077f51d40e50d44650dda3d8a4b016343736f5bdfeb88644cf32a51"]) getsockopt$inet_sctp_SCTP_PR_ASSOC_STATUS(0xffffffffffffffff, 0x84, 0x73, &(0x7f0000000280), 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r3 = syz_open_dev$amidi(&(0x7f0000000100)='/dev/amidi#\x00', 0x2, 0x800) recvfrom(0xffffffffffffffff, 0x0, 0x0, 0x20, &(0x7f00000005c0)=@ipx={0x4, 0x1, 0x6, "6b183128f377"}, 0x80) mount$bpf(0x20000000, &(0x7f0000000680)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x810800, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000200)='./file0\x00', 0x700, 0x0, &(0x7f00000024c0), 0x100032, &(0x7f0000000740)=ANY=[@ANYBLOB="53cd427f1b2d1bfa0488614c620d459b1600abda1afd194a201296f072a8eccd881698d7f8712309f696a79f9878103246ccaf32774510181754b74de03bb595a37a0120575ff0387034ad184ac957298547bd564761663ba714e6555429b1c8a7d86857c240f489ec64f6baab9d583a48e40447627635e2dc0039f09ac534a8908259bce6a4b4b8844defd77291616c6ea3c5ceb4ef62afc24d2155a68abbf459c04ed110205d7b949bf33b8019d1baae1705004952308bf920685065929c1ba8c697"]) getsockopt$inet_dccp_int(0xffffffffffffffff, 0x21, 0xf, &(0x7f0000000240), 0x0) fstat(0xffffffffffffffff, &(0x7f00000006c0)) getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, &(0x7f0000000440)={0x0, 0x80}, &(0x7f00000001c0)=0xfffffffffffffd3f) ioctl$FICLONE(r1, 0x40049409, r3) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, 0x0) sched_setaffinity(r2, 0x8, &(0x7f0000000840)=0x4ec) [ 2714.946480] hfs: can't find a HFS filesystem on dev loop2 14:18:49 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x3, &(0x7f0000001fd8)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x15}}, &(0x7f0000000080)="47504c049c3514bf772da07ae82e76590a36f6493ec1ab91b397e42abf1ea6cd8cd77427fc9a9e2b7165f52b4107bf0850d899dc52d013175ddb1b2f46203c2a05b722e33e556fb2e3f39a3cde1fca53640337ec956146bdbfcb115070195631de5d21a5ea9e638c2bdb78a501ca4b6ea313d82568f9382c2c3f6faba6b4ee54793b4ed26dae3e52225029bb2ac0007f77754c3f23ceda9809b9a9684a940abcaa8cfcc7133ec422e9c83888318d41e9a493f0195fe2599651b89504f5dba14625ce2366f33d95dba92f867279cabf4aceddc85a8af7a0fa68d767ce5136b9d0d1966c499cb6bf34c2988666970000000000000000000000", 0x8a421800}, 0x48) 14:18:50 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000940)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$bfs(&(0x7f0000000180)='bfs\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) [ 2715.141341] hfs: can't find a HFS filesystem on dev loop2 14:18:50 executing program 1: r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/expire_quiescent_template\x00', 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000800)=ANY=[@ANYBLOB="73656375726974790000000000000000000000000000000000000000000000000e00000004000000e0040000f001000020030000000000002003000020030000380400003804000038040000380400003804000004000000", @ANYPTR=&(0x7f0000000100)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00'], @ANYBLOB="fe8000000000000000000000000000aafe8000000000000000000000000000aa00000000ffffff00ffffffffffffff00ffffffff000000ffffffffff000000ff65716c0000000000000000000000000067726474617030000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ff000000000000000000000000000000000000ff02610000000000000000000000000000008801c801000000000000000000000000000000000000000000000000c000636f6e6eaec772aa6b0000000000000000000000000000000000000000027f000001000000000000000000000000ffffffffffffffff00000000ffffffff7f00000100000000000000000000000000000000ffffffffffffff00ff00000000000000000000000000ffffac1414bbffffff00ff000000ff000000000000ffe000000000ffffffff000000ffff0000ff0000000003000000ff01000004004e214e204e224e20280020000000c00198000000000040004552524f5200000000000000000000000000000000000000000000000000f650bd5c77822a55c077a2b3078812467f4ab9fefc372cf333baff203cdb0000fe8000000000000000000000000000bbff020000000000000000000000000001ff000000ffffff00ffffffffff00000000000000000000ffff000000ffffff0073797a6b616c6c6572300000000000006c6f0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ff000000000000000000000000000000002b00010223000000000000000000000000000000f00030010000000000000000000000000000000000000000000000002800686c00000000000000000000000000000000000000000000000000000000000000000000000040005443504f50545354524950000000000000000000000000000000000000008de0000006000000ff000000000800000200000007000000030000000500000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f00018010000000000000000000000000000000000000000000000002800686c000000000000000000000000000000000000000000000000000000000304000000000000280000000000000000000000000000009cada2df08829d56110aba0400000000000000000000000000000000fdffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a800d0000000000000000000000000000000000000000000000000002800000000000000000000000000000000000000000000000000000000000000feffffff0000000081c755c472bebfa03c39935afafa02fb00000000000000000000"], 0x540) ioctl$EXT4_IOC_MIGRATE(0xffffffffffffffff, 0x6609) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000300)={0x0}, &(0x7f0000000400)=0xc) getsockopt$ARPT_SO_GET_INFO(r0, 0x0, 0x60, &(0x7f0000000740)={'filter\x00'}, &(0x7f00000007c0)=0x44) r3 = getpgrp(r2) prlimit64(r3, 0x0, &(0x7f00000004c0)={0x0, 0x7ffffd}, &(0x7f00000002c0)) lremovexattr(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000480)=@random={'trusted.', 'bpf\x00'}) getsockopt$inet_sctp_SCTP_PR_ASSOC_STATUS(0xffffffffffffffff, 0x84, 0x73, &(0x7f0000000280)={0x0, 0x8, 0x0, 0xe0}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r5 = syz_open_dev$amidi(&(0x7f0000000100)='/dev/amidi#\x00', 0x2, 0x800) getsockopt$inet_sctp_SCTP_GET_PEER_ADDRS(r5, 0x84, 0x6c, &(0x7f0000000640)={r4, 0x3d, "04f12efe280d228730b0d2f15639926cc9e1a5cb061fa6929344cc475663077d39b1dc2929522668092769113aa9183c6258d254061aa0bd13bfe0fe60"}, &(0x7f0000000180)=0x45) recvfrom(r5, &(0x7f0000000500)=""/96, 0x60, 0x20, &(0x7f00000005c0)=@ipx={0x4, 0x1, 0x6, "6b183128f377"}, 0x80) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000200)='./file0\x00', 0x700, 0x0, &(0x7f00000024c0), 0x100032, &(0x7f00000000c0)=ANY=[@ANYBLOB]) prctl$PR_MPX_ENABLE_MANAGEMENT(0x2b) getsockopt$inet_dccp_int(0xffffffffffffffff, 0x21, 0xf, &(0x7f0000000240), 0x0) fstat(0xffffffffffffffff, &(0x7f00000006c0)) getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, &(0x7f0000000440)={0x0, 0x80}, &(0x7f00000001c0)=0xfffffffffffffd3f) ioctl$FICLONE(r1, 0x40049409, r5) setgroups(0x3, &(0x7f0000000340)=[0x0, 0x0, 0x0]) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, 0x0) openat$cuse(0xffffffffffffff9c, &(0x7f0000000380)='/dev/cuse\x00', 0x2, 0x0) 14:18:50 executing program 3: clone(0xc2b321c6db9081df, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$cgroup_subtree(0xffffffffffffff9c, &(0x7f00000000c0)='cgroup.subtree_control\x00', 0x2, 0x0) r2 = dup3(r1, r0, 0x80000) ioctl$KVM_GET_DEBUGREGS(r2, 0x8080aea1, &(0x7f0000000000)) 14:18:50 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x3, &(0x7f0000001fd8)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x15}}, &(0x7f0000000080)="47504c049c3514bf772da07ae82e76590a36f6493ec1ab91b397e42abf1ea6cd8cd77427fc9a9e2b7165f52b4107bf0850d899dc52d013175ddb1b2f46203c2a05b722e33e556fb2e3f39a3cde1fca53640337ec956146bdbfcb115070195631de5d21a5ea9e638c2bdb78a501ca4b6ea313d82568f9382c2c3f6faba6b4ee54793b4ed26dae3e52225029bb2ac0007f77754c3f23ceda9809b9a9684a940abcaa8cfcc7133ec422e9c83888318d41e9a493f0195fe2599651b89504f5dba14625ce2366f33d95dba92f867279cabf4aceddc85a8af7a0fa68d767ce5136b9d0d1966c499cb6bf34c2988666970000000000000000000000", 0x3}, 0x48) 14:18:50 executing program 2: getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) syz_mount_image$hfs(&(0x7f0000000200)='hfs\x00', &(0x7f0000000280)='./file0\x00', 0x6c00, 0x0, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) [ 2715.364947] IPVS: ftp: loaded support on port[0] = 21 14:18:50 executing program 4: r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/expire_quiescent_template\x00', 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000140)=@security={'security\x00', 0xe, 0x4, 0x4b8, 0x1f0, 0x320, 0x0, 0x320, 0x320, 0x438, 0x438, 0x438, 0x438, 0x438, 0x4, &(0x7f0000000100), {[{{@ipv6={@local, @local, [0x0, 0x0, 0xffffffff, 0xffffff00], [0xffffffff, 0xff, 0xffffffff, 0xff], 'eql\x00', 'gretap0\x00', {}, {0xff}, 0x0, 0x7fffffff, 0x2, 0x61}, 0x0, 0x188, 0x1c8, 0x0, {}, [@common=@unspec=@conntrack2={0xc0, 'conntrack\x00', 0x2, {{@ipv4=@loopback, [0xffffffff, 0xffffffff, 0x0, 0xffffffff], @ipv4=@loopback, [0x0, 0xffffffff, 0xffffff00, 0xff000000], @ipv6=@ipv4={[], [], @remote}, [0xffffff00, 0xff000000, 0xff000000, 0xff], @ipv4=@multicast2, [0xffffffff, 0xff, 0xff0000ff], 0x3, 0x1ff, 0x4, 0x4e21, 0x4e20, 0x4e22, 0x4e20, 0x28}, 0x1c0, 0x98}}]}, @common=@unspec=@ERROR={0x40, 'ERROR\x00', 0x0, "f650bd5c77822a55c077a2b3078812467f4ab9fefc372cf333baff203cdb"}}, {{@ipv6={@remote, @mcast2, [0xff000000, 0xffffff00, 0xffffffff, 0xff000000], [0x0, 0xff, 0xff000000, 0xffffff00], 'syzkaller0\x00', 'lo\x00', {}, {}, 0x2b, 0x1, 0x2, 0x23}, 0x0, 0xc8, 0x108}, @common=@inet=@TCPOPTSTRIP={0x40, 'TCPOPTSTRIP\x00', 0x0, {[0xe08d, 0x6, 0xff, 0x800, 0x2, 0x7, 0x0, 0x5]}}}, {{@uncond, 0x0, 0xf0, 0x118, 0x0, {}, [@common=@hl={0x28, 'hl\x00', 0x0, {0x3, 0x604}}]}, @common=@unspec=@STANDARD={0x28, '\x00', 0x0, 0xfffffffffffffffd}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x518) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = getpgrp(0x0) prlimit64(r2, 0x0, &(0x7f00000004c0)={0x0, 0x7ffffd}, &(0x7f00000002c0)) lremovexattr(0x0, &(0x7f0000000480)=@random={'trusted.', 'bpf\x00'}) getsockopt$inet_sctp_SCTP_PR_ASSOC_STATUS(0xffffffffffffffff, 0x84, 0x73, &(0x7f0000000280), 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r3 = syz_open_dev$amidi(&(0x7f0000000100)='/dev/amidi#\x00', 0x2, 0x800) recvfrom(0xffffffffffffffff, 0x0, 0x0, 0x20, &(0x7f00000005c0)=@ipx={0x4, 0x1, 0x6, "6b183128f377"}, 0x80) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000200)='./file0\x00', 0x700, 0x0, &(0x7f00000024c0), 0x100032, &(0x7f00000000c0)=ANY=[@ANYBLOB]) getsockopt$inet_dccp_int(0xffffffffffffffff, 0x21, 0xf, &(0x7f0000000240), 0x0) fstat(0xffffffffffffffff, &(0x7f00000006c0)) ioctl$VIDIOC_S_FREQUENCY(r3, 0x402c5639, &(0x7f0000000680)={0x2, 0x2, 0x2}) getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, &(0x7f0000000440)={0x0, 0x80}, &(0x7f00000001c0)=0xfffffffffffffd3f) ioctl$FICLONE(r1, 0x40049409, r3) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, 0x0) 14:18:50 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x3, &(0x7f0000001fd8)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x15}}, &(0x7f0000000080)="47504c049c3514bf772da07ae82e76590a36f6493ec1ab91b397e42abf1ea6cd8cd77427fc9a9e2b7165f52b4107bf0850d899dc52d013175ddb1b2f46203c2a05b722e33e556fb2e3f39a3cde1fca53640337ec956146bdbfcb115070195631de5d21a5ea9e638c2bdb78a501ca4b6ea313d82568f9382c2c3f6faba6b4ee54793b4ed26dae3e52225029bb2ac0007f77754c3f23ceda9809b9a9684a940abcaa8cfcc7133ec422e9c83888318d41e9a493f0195fe2599651b89504f5dba14625ce2366f33d95dba92f867279cabf4aceddc85a8af7a0fa68d767ce5136b9d0d1966c499cb6bf34c2988666970000000000000000000000", 0x4000}, 0x48) [ 2715.533280] hfs: can't find a HFS filesystem on dev loop2 14:18:50 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000940)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$bfs(&(0x7f0000000180)='bfs\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) [ 2715.687888] hfs: can't find a HFS filesystem on dev loop2 14:18:50 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x3, &(0x7f0000001fd8)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x15}}, &(0x7f0000000080)="47504c049c3514bf772da07ae82e76590a36f6493ec1ab91b397e42abf1ea6cd8cd77427fc9a9e2b7165f52b4107bf0850d899dc52d013175ddb1b2f46203c2a05b722e33e556fb2e3f39a3cde1fca53640337ec956146bdbfcb115070195631de5d21a5ea9e638c2bdb78a501ca4b6ea313d82568f9382c2c3f6faba6b4ee54793b4ed26dae3e52225029bb2ac0007f77754c3f23ceda9809b9a9684a940abcaa8cfcc7133ec422e9c83888318d41e9a493f0195fe2599651b89504f5dba14625ce2366f33d95dba92f867279cabf4aceddc85a8af7a0fa68d767ce5136b9d0d1966c499cb6bf34c2988666970000000000000000000000", 0x200000000000000}, 0x48) 14:18:50 executing program 1: r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/expire_quiescent_template\x00', 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000140)=@security={'security\x00', 0xe, 0x4, 0x4e0, 0x1f0, 0x320, 0x0, 0x320, 0x320, 0x438, 0x438, 0x438, 0x438, 0x438, 0x4, &(0x7f0000000100), {[{{@ipv6={@local, @local, [0x0, 0xffffff00, 0xffffffff, 0xffffff00], [0xffffffff, 0xff, 0xffffffff, 0xff], 'eql\x00', 'gretap0\x00', {}, {0xff}, 0x0, 0x7fffffff, 0x2, 0x61}, 0x0, 0x188, 0x1c8, 0x0, {}, [@common=@unspec=@conntrack2={0xc0, 'conntrack\x00', 0x2, {{@ipv4=@loopback, [0xffffffff, 0xffffffff, 0x0, 0xffffffff], @ipv4=@loopback, [0x0, 0xffffffff, 0xffffff00, 0xff000000], @ipv6=@ipv4={[], [], @remote}, [0xffffff00, 0xff000000, 0xff000000, 0xff], @ipv4=@multicast2, [0xffffffff, 0xff, 0xff0000ff], 0x3, 0x1ff, 0x4, 0x4e21, 0x4e20, 0x4e22, 0x4e20, 0x28, 0x20}, 0x1c0, 0x98}}]}, @common=@unspec=@ERROR={0x40, 'ERROR\x00', 0x0, "f650bd5c77822a55c077a2b3078812467f4ab9fefc372cf333baff203cdb"}}, {{@ipv6={@remote, @mcast2, [0xff000000, 0xffffff00, 0xffffffff, 0xff000000], [0x0, 0xff, 0xff000000, 0xffffff00], 'syzkaller0\x00', 'lo\x00', {}, {0xff}, 0x2b, 0x1, 0x2, 0x23}, 0x0, 0xf0, 0x130, 0x0, {}, [@common=@hl={0x28, 'hl\x00'}]}, @common=@inet=@TCPOPTSTRIP={0x40, 'TCPOPTSTRIP\x00', 0x0, {[0xe08d, 0x6, 0xff, 0x800, 0x2, 0x7, 0x3, 0x5]}}}, {{@uncond, 0x0, 0xf0, 0x118, 0x0, {}, [@common=@hl={0x28, 'hl\x00', 0x0, {0x3, 0x604}}]}, @common=@unspec=@STANDARD={0x28, '\x00', 0x0, 0xfffffffffffffffd}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x540) ioctl$EXT4_IOC_MIGRATE(0xffffffffffffffff, 0x6609) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000300)={0x0}, &(0x7f0000000400)=0xc) getsockopt$ARPT_SO_GET_INFO(r0, 0x0, 0x60, &(0x7f0000000740)={'filter\x00'}, &(0x7f00000007c0)=0x44) r3 = getpgrp(r2) prlimit64(r3, 0x0, &(0x7f00000004c0)={0x0, 0x7ffffd}, &(0x7f00000002c0)) lremovexattr(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000480)=@random={'trusted.', 'bpf\x00'}) getsockopt$inet_sctp_SCTP_PR_ASSOC_STATUS(0xffffffffffffffff, 0x84, 0x73, &(0x7f0000000280)={0x0, 0x8, 0x0, 0xe0}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r4 = syz_open_dev$amidi(&(0x7f0000000100)='/dev/amidi#\x00', 0x2, 0x800) recvfrom(r4, &(0x7f0000000500)=""/96, 0x60, 0x20, &(0x7f00000005c0)=@ipx={0x4, 0x1, 0x6, "6b183128f377"}, 0x80) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000200)='./file0\x00', 0x700, 0x0, &(0x7f00000024c0), 0x100032, &(0x7f00000000c0)=ANY=[@ANYBLOB]) prctl$PR_MPX_ENABLE_MANAGEMENT(0x2b) getsockopt$inet_dccp_int(0xffffffffffffffff, 0x21, 0xf, &(0x7f0000000240), 0x0) fstat(r4, &(0x7f0000000880)) getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, &(0x7f0000000440)={0x0, 0x80}, &(0x7f00000001c0)=0xfffffffffffffd3f) ioctl$FICLONE(r1, 0x40049409, r4) setgroups(0x3, &(0x7f0000000340)=[0x0, 0x0, 0x0]) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, 0x0) 14:18:50 executing program 2: getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) syz_mount_image$hfs(&(0x7f0000000200)='hfs\x00', &(0x7f0000000280)='./file0\x00', 0x5, 0x0, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) [ 2715.818221] IPVS: ftp: loaded support on port[0] = 21 14:18:50 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x3, &(0x7f0000001fd8)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x15}}, &(0x7f0000000080)="47504c049c3514bf772da07ae82e76590a36f6493ec1ab91b397e42abf1ea6cd8cd77427fc9a9e2b7165f52b4107bf0850d899dc52d013175ddb1b2f46203c2a05b722e33e556fb2e3f39a3cde1fca53640337ec956146bdbfcb115070195631de5d21a5ea9e638c2bdb78a501ca4b6ea313d82568f9382c2c3f6faba6b4ee54793b4ed26dae3e52225029bb2ac0007f77754c3f23ceda9809b9a9684a940abcaa8cfcc7133ec422e9c83888318d41e9a493f0195fe2599651b89504f5dba14625ce2366f33d95dba92f867279cabf4aceddc85a8af7a0fa68d767ce5136b9d0d1966c499cb6bf34c2988666970000000000000000000000", 0x80ffffff00000000}, 0x48) 14:18:51 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000940)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x48, 0x0, 0x0) syz_mount_image$bfs(&(0x7f0000000180)='bfs\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) [ 2716.089987] hfs: can't find a HFS filesystem on dev loop2 14:18:51 executing program 3: clone(0xc2b321c6db9081df, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ashmem\x00', 0x240800, 0x0) r1 = openat$vicodec0(0xffffffffffffff9c, &(0x7f0000000040)='/dev/video36\x00', 0x2, 0x0) r2 = socket$can_raw(0x1d, 0x3, 0x1) r3 = inotify_init() r4 = dup3(0xffffffffffffffff, 0xffffffffffffff9c, 0x80000) r5 = bpf$OBJ_GET_PROG(0x7, &(0x7f00000000c0)={&(0x7f0000000080)='./file0\x00', 0x0, 0x8}, 0x10) r6 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xfff, 0x46f, 0x20, 0x33e, 0x0, 0x6, 0x8881, 0x0, 0x7fffffff, 0x80, 0xffffffffffffffc0, 0x4, 0x0, 0xffff, 0x530d, 0x6, 0x6015, 0x4, 0x81, 0x95c5, 0x100, 0x0, 0x3, 0x5, 0x6f83, 0x20, 0x0, 0x0, 0xfc49, 0x2, 0x8000, 0xfff, 0x3, 0x20000000, 0x5, 0x8001, 0x0, 0x2, 0x7, @perf_bp={&(0x7f0000000100), 0x2}, 0x2000, 0x7ff, 0xfffffffffffffffe, 0x4, 0xffff, 0x1c, 0x9}, 0xffffffffffffffff, 0xd, 0xffffffffffffffff, 0x8) ppoll(&(0x7f00000001c0)=[{r0, 0x1000}, {r1, 0x100}, {r2, 0xc000}, {r3, 0x400}, {r4, 0x8510}, {r5, 0x200}, {r6, 0x220}], 0x7, &(0x7f0000000200), &(0x7f0000000240)={0x3}, 0x8) sendfile(r2, r0, &(0x7f0000000280), 0x0) 14:18:51 executing program 4: r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/expire_quiescent_template\x00', 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000140)=@security={'security\x00', 0xe, 0x4, 0x4b8, 0x1f0, 0x320, 0x0, 0x320, 0x320, 0x438, 0x438, 0x438, 0x438, 0x438, 0x4, &(0x7f0000000100), {[{{@ipv6={@local, @local, [0x0, 0x0, 0xffffffff, 0xffffff00], [0xffffffff, 0xff, 0xffffffff, 0xff], 'eql\x00', 'gretap0\x00', {}, {0xff}, 0x0, 0x7fffffff, 0x2, 0x61}, 0x0, 0x188, 0x1c8, 0x0, {}, [@common=@unspec=@conntrack2={0xc0, 'conntrack\x00', 0x2, {{@ipv4=@loopback, [0xffffffff, 0xffffffff, 0x0, 0xffffffff], @ipv4=@loopback, [0x0, 0xffffffff, 0xffffff00, 0xff000000], @ipv6=@ipv4={[], [], @remote}, [0xffffff00, 0xff000000, 0xff000000, 0xff], @ipv4=@multicast2, [0xffffffff, 0xff, 0xff0000ff], 0x3, 0x1ff, 0x4, 0x4e21, 0x4e20, 0x4e22, 0x4e20, 0x28}, 0x1c0, 0x98}}]}, @common=@unspec=@ERROR={0x40, 'ERROR\x00', 0x0, "f650bd5c77822a55c077a2b3078812467f4ab9fefc372cf333baff203cdb"}}, {{@ipv6={@remote, @mcast2, [0xff000000, 0xffffff00, 0xffffffff, 0xff000000], [0x0, 0xff, 0xff000000, 0xffffff00], 'syzkaller0\x00', 'lo\x00', {}, {}, 0x2b, 0x1, 0x2, 0x23}, 0x0, 0xc8, 0x108}, @common=@inet=@TCPOPTSTRIP={0x40, 'TCPOPTSTRIP\x00', 0x0, {[0xe08d, 0x6, 0xff, 0x800, 0x2, 0x7, 0x0, 0x5]}}}, {{@uncond, 0x0, 0xf0, 0x118, 0x0, {}, [@common=@hl={0x28, 'hl\x00', 0x0, {0x3, 0x604}}]}, @common=@unspec=@STANDARD={0x28, '\x00', 0x0, 0xfffffffffffffffd}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x518) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCGSID(r0, 0x5429, &(0x7f0000000680)) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000000740)) gettid() fcntl$getownex(r1, 0x10, &(0x7f0000000780)) fcntl$getownex(r0, 0x10, &(0x7f00000007c0)) gettid() gettid() fcntl$getownex(r1, 0x10, &(0x7f0000000800)={0x0, 0x0}) r3 = getpgrp(r2) prlimit64(r3, 0x0, &(0x7f00000004c0)={0x0, 0x7ffffd}, &(0x7f00000002c0)) getresuid(0xffffffffffffffff, &(0x7f0000000840), &(0x7f0000000880)) lremovexattr(0x0, &(0x7f0000000480)=@random={'trusted.', 'bpf\x00'}) getsockopt$inet_sctp_SCTP_PR_ASSOC_STATUS(0xffffffffffffffff, 0x84, 0x73, &(0x7f0000000280), 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r4 = syz_open_dev$amidi(&(0x7f0000000100)='/dev/amidi#\x00', 0x2, 0x800) recvfrom(0xffffffffffffffff, 0x0, 0x0, 0x20, &(0x7f00000005c0)=@ipx={0x4, 0x1, 0x6, "6b183128f377"}, 0x80) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000200)='./file0\x00', 0x700, 0x0, &(0x7f00000024c0), 0x100032, &(0x7f00000000c0)=ANY=[@ANYBLOB]) getsockopt$inet_dccp_int(0xffffffffffffffff, 0x21, 0xf, &(0x7f0000000240), 0x0) fstat(r1, &(0x7f00000008c0)) getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, &(0x7f0000000440)={0x0, 0x80}, &(0x7f00000001c0)=0xfffffffffffffd3f) ioctl$FICLONE(r1, 0x40049409, r4) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, 0x0) [ 2716.201716] hfs: can't find a HFS filesystem on dev loop2 14:18:51 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x3, &(0x7f0000001fd8)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x15}}, &(0x7f0000000080)="47504c049c3514bf772da07ae82e76590a36f6493ec1ab91b397e42abf1ea6cd8cd77427fc9a9e2b7165f52b4107bf0850d899dc52d013175ddb1b2f46203c2a05b722e33e556fb2e3f39a3cde1fca53640337ec956146bdbfcb115070195631de5d21a5ea9e638c2bdb78a501ca4b6ea313d82568f9382c2c3f6faba6b4ee54793b4ed26dae3e52225029bb2ac0007f77754c3f23ceda9809b9a9684a940abcaa8cfcc7133ec422e9c83888318d41e9a493f0195fe2599651b89504f5dba14625ce2366f33d95dba92f867279cabf4aceddc85a8af7a0fa68d767ce5136b9d0d1966c499cb6bf34c2988666970000000000000000000000", 0xff000000}, 0x48) 14:18:51 executing program 2: getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) syz_mount_image$hfs(&(0x7f0000000200)='hfs\x00', &(0x7f0000000280)='./file0\x00', 0x4000000000000000, 0x0, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) [ 2716.418373] hfs: can't find a HFS filesystem on dev loop2 [ 2716.432442] IPVS: ftp: loaded support on port[0] = 21 14:18:51 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x3, &(0x7f0000001fd8)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x15}}, &(0x7f0000000080)="47504c049c3514bf772da07ae82e76590a36f6493ec1ab91b397e42abf1ea6cd8cd77427fc9a9e2b7165f52b4107bf0850d899dc52d013175ddb1b2f46203c2a05b722e33e556fb2e3f39a3cde1fca53640337ec956146bdbfcb115070195631de5d21a5ea9e638c2bdb78a501ca4b6ea313d82568f9382c2c3f6faba6b4ee54793b4ed26dae3e52225029bb2ac0007f77754c3f23ceda9809b9a9684a940abcaa8cfcc7133ec422e9c83888318d41e9a493f0195fe2599651b89504f5dba14625ce2366f33d95dba92f867279cabf4aceddc85a8af7a0fa68d767ce5136b9d0d1966c499cb6bf34c2988666970000000000000000000000", 0x29d61700}, 0x48) 14:18:51 executing program 1: r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/expire_quiescent_template\x00', 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000140)=ANY=[@ANYBLOB="73656375726974790000000000000000000000000000000000000000000000000e00000004000000e0040000f001000020030000000000002003000020030000380400003804000038040000380400003804000004000000", @ANYPTR=&(0x7f0000000a80)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c3783285faf4db2f1df5b55f32acd17b9ce566fa5397c144e104253951f1e2cc8a28be2d2868af53009cdb558c635c7c0607114a73d748c6c6d0de6a9a07a92d7426693d1c08b88a4c368cab1aaf413c5d5d6ffa030135b22910cedffb67b950c0197033349a9d070ebc302961b862c69027ea4da264dfd75ee6497be742abcfe4c0a58ea4b4a0d8026a638c6b6676ef68c6ac603cf706207798c1afabec960a0dfc1e14a525745e20a022ba1a26dd657d16d22e86b8a12f8c524f093a24028d1d741c94cc498d5641c9bcb7635db95aa77aa8391b333dd9295135ab97bd8272a3206ccf99abe7297b6e98a76fd0a3bbe8b58b5003dd426982a85ec50c3685ea87e522bac7f3768737b5ef49bd69d5c3b9b373273f0fa4259b8fd0549fdbff2735f69ad4d8f6afd3a275de36fb3b2af2250497765e56e016952973f668a6d96007f018b3e879dfe841baf424a697bf67"], @ANYBLOB="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"], 0x540) ioctl$EXT4_IOC_MIGRATE(0xffffffffffffffff, 0x6609) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000300)={0x0, 0x0, 0x0}, &(0x7f0000000400)=0xc) getsockopt$ARPT_SO_GET_INFO(r0, 0x0, 0x60, &(0x7f0000000740)={'filter\x00'}, &(0x7f00000007c0)=0x44) r5 = getpgrp(r2) prlimit64(r5, 0x0, &(0x7f00000004c0)={0x0, 0x7ffffd}, &(0x7f00000002c0)) lremovexattr(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000480)=@random={'trusted.', 'bpf\x00'}) getsockopt$inet_sctp_SCTP_PR_ASSOC_STATUS(0xffffffffffffffff, 0x84, 0x73, &(0x7f0000000280)={0x0, 0x8, 0x0, 0xe0}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r6 = syz_open_dev$amidi(&(0x7f0000000100)='/dev/amidi#\x00', 0x2, 0x800) mount$fuseblk(&(0x7f0000000680)='/dev/loop0\x00', &(0x7f0000000800)='\x00', &(0x7f0000000840)='fuseblk\x00', 0x80000, &(0x7f0000000880)={{'fd', 0x3d, r6}, 0x2c, {'rootmode', 0x3d, 0xa000}, 0x2c, {'user_id', 0x3d, r3}, 0x2c, {'group_id', 0x3d, r4}, 0x2c, {[{@allow_other='allow_other'}, {@max_read={'max_read', 0x3d, 0x1f}}, {@allow_other='allow_other'}, {@blksize={'blksize', 0x3d, 0xa00}}, {@max_read={'max_read', 0x3d, 0x1f}}], [{@smackfshat={'smackfshat', 0x3d, 'security\x00'}}, {@permit_directio='permit_directio'}, {@obj_user={'obj_user', 0x3d, 'conntrack\x00'}}, {@smackfsroot={'smackfsroot', 0x3d, 'trusted.'}}, {@smackfstransmute={'smackfstransmute', 0x3d, 'security\x00'}}, {@euid_lt={'euid<', r3}}]}}) recvfrom(r6, &(0x7f0000000500)=""/96, 0x60, 0x20, &(0x7f00000005c0)=@ipx={0x4, 0x1, 0x6, "6b183128f377"}, 0x80) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', &(0x7f0000000c40)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000200)='./file0\x00', 0x700, 0x0, &(0x7f00000024c0), 0x100032, &(0x7f00000000c0)=ANY=[@ANYBLOB]) prctl$PR_MPX_ENABLE_MANAGEMENT(0x2b) getsockopt$inet_dccp_int(0xffffffffffffffff, 0x21, 0xf, &(0x7f0000000240), 0x0) getpeername$packet(r0, &(0x7f0000000c80)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000cc0)=0x14) fstat(0xffffffffffffffff, &(0x7f00000006c0)) fstat(r1, &(0x7f0000000a00)) getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, &(0x7f0000000440)={0x0, 0x80}, &(0x7f00000001c0)=0xfffffffffffffd3f) ioctl$FICLONE(r1, 0x40049409, r6) setgroups(0x3, &(0x7f0000000340)=[0x0, 0x0, 0x0]) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, 0x0) [ 2716.500572] hfs: can't find a HFS filesystem on dev loop2 14:18:51 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000940)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x48, 0x0, 0x0) syz_mount_image$bfs(&(0x7f0000000180)='bfs\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 14:18:51 executing program 2: getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) syz_mount_image$hfs(&(0x7f0000000200)='hfs\x00', &(0x7f0000000280)='./file0\x00', 0xe0000, 0x0, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 14:18:51 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x3, &(0x7f0000001fd8)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x15}}, &(0x7f0000000080)="47504c049c3514bf772da07ae82e76590a36f6493ec1ab91b397e42abf1ea6cd8cd77427fc9a9e2b7165f52b4107bf0850d899dc52d013175ddb1b2f46203c2a05b722e33e556fb2e3f39a3cde1fca53640337ec956146bdbfcb115070195631de5d21a5ea9e638c2bdb78a501ca4b6ea313d82568f9382c2c3f6faba6b4ee54793b4ed26dae3e52225029bb2ac0007f77754c3f23ceda9809b9a9684a940abcaa8cfcc7133ec422e9c83888318d41e9a493f0195fe2599651b89504f5dba14625ce2366f33d95dba92f867279cabf4aceddc85a8af7a0fa68d767ce5136b9d0d1966c499cb6bf34c2988666970000000000000000000000", 0x3f00}, 0x48) [ 2716.775341] EXT4-fs: 6 callbacks suppressed [ 2716.775390] EXT4-fs (sda1): Unrecognized mount option "./file0" or missing value [ 2716.839334] hfs: can't find a HFS filesystem on dev loop2 [ 2716.876240] EXT4-fs (sda1): re-mounted. Opts: ,errors=continue 14:18:51 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000940)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x48, 0x0, 0x0) syz_mount_image$bfs(&(0x7f0000000180)='bfs\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0) 14:18:51 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x3, &(0x7f0000001fd8)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x15}}, &(0x7f0000000080)="47504c049c3514bf772da07ae82e76590a36f6493ec1ab91b397e42abf1ea6cd8cd77427fc9a9e2b7165f52b4107bf0850d899dc52d013175ddb1b2f46203c2a05b722e33e556fb2e3f39a3cde1fca53640337ec956146bdbfcb115070195631de5d21a5ea9e638c2bdb78a501ca4b6ea313d82568f9382c2c3f6faba6b4ee54793b4ed26dae3e52225029bb2ac0007f77754c3f23ceda9809b9a9684a940abcaa8cfcc7133ec422e9c83888318d41e9a493f0195fe2599651b89504f5dba14625ce2366f33d95dba92f867279cabf4aceddc85a8af7a0fa68d767ce5136b9d0d1966c499cb6bf34c2988666970000000000000000000000", 0xffff8000}, 0x48) [ 2716.900712] hfs: can't find a HFS filesystem on dev loop2 14:18:51 executing program 2: getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) syz_mount_image$hfs(&(0x7f0000000200)='hfs\x00', &(0x7f0000000280)='./file0\x00', 0x20000, 0x0, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) [ 2717.167588] EXT4-fs (sda1): Unrecognized mount option "./file0" or missing value [ 2717.254456] hfs: can't find a HFS filesystem on dev loop2 [ 2717.359952] hfs: can't find a HFS filesystem on dev loop2 14:18:52 executing program 4: r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/expire_quiescent_template\x00', 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000140)=@security={'security\x00', 0xe, 0x4, 0x4b8, 0x1f0, 0x320, 0x0, 0x320, 0x320, 0x438, 0x438, 0x438, 0x438, 0x438, 0x4, &(0x7f0000000100), {[{{@ipv6={@local, @local, [0x0, 0x0, 0xffffffff, 0xffffff00], [0xffffffff, 0xff, 0xffffffff, 0xff], 'eql\x00', 'gretap0\x00', {}, {0xff}, 0x0, 0x7fffffff, 0x2, 0x61}, 0x0, 0x188, 0x1c8, 0x0, {}, [@common=@unspec=@conntrack2={0xc0, 'conntrack\x00', 0x2, {{@ipv4=@loopback, [0xffffffff, 0xffffffff, 0x0, 0xffffffff], @ipv4=@loopback, [0x0, 0xffffffff, 0xffffff00, 0xff000000], @ipv6=@ipv4={[], [], @remote}, [0xffffff00, 0xff000000, 0xff000000, 0xff], @ipv4=@multicast2, [0xffffffff, 0xff, 0xff0000ff], 0x3, 0x1ff, 0x4, 0x4e21, 0x4e20, 0x4e22, 0x4e20, 0x28}, 0x1c0, 0x98}}]}, @common=@unspec=@ERROR={0x40, 'ERROR\x00', 0x0, "f650bd5c77822a55c077a2b3078812467f4ab9fefc372cf333baff203cdb"}}, {{@ipv6={@remote, @mcast2, [0xff000000, 0xffffff00, 0xffffffff, 0xff000000], [0x0, 0xff, 0xff000000, 0xffffff00], 'syzkaller0\x00', 'lo\x00', {}, {}, 0x2b, 0x1, 0x2, 0x23}, 0x0, 0xc8, 0x108}, @common=@inet=@TCPOPTSTRIP={0x40, 'TCPOPTSTRIP\x00', 0x0, {[0xe08d, 0x6, 0xff, 0x800, 0x2, 0x7, 0x0, 0x5]}}}, {{@uncond, 0x0, 0xf0, 0x118, 0x0, {}, [@common=@hl={0x28, 'hl\x00', 0x0, {0x3, 0x604}}]}, @common=@unspec=@STANDARD={0x28, '\x00', 0x0, 0xfffffffffffffffd}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x518) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = getpgrp(0x0) prlimit64(r2, 0x0, &(0x7f00000004c0)={0x0, 0x7ffffd}, &(0x7f00000002c0)) lremovexattr(0x0, &(0x7f0000000480)=@random={'trusted.', 'bpf\x00'}) getsockopt$inet_sctp_SCTP_PR_ASSOC_STATUS(0xffffffffffffffff, 0x84, 0x73, &(0x7f0000000280), 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r3 = syz_open_dev$amidi(&(0x7f0000000100)='/dev/amidi#\x00', 0x2, 0x800) recvfrom(0xffffffffffffffff, 0x0, 0x0, 0x20, &(0x7f00000005c0)=@ipx={0x4, 0x1, 0x6, "6b183128f377"}, 0x80) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000200)='./file0\x00', 0x700, 0x0, &(0x7f00000024c0), 0x100032, &(0x7f00000000c0)=ANY=[@ANYBLOB]) getsockopt$inet_dccp_int(0xffffffffffffffff, 0x21, 0x11, &(0x7f0000000780), 0x0) fstat(r3, &(0x7f0000000840)) getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, &(0x7f0000000440)={0x0, 0x80}, &(0x7f00000001c0)=0xfffffffffffffd3f) ioctl$FICLONE(r1, 0x40049409, r3) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, 0x0) 14:18:52 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x3, &(0x7f0000001fd8)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x15}}, &(0x7f0000000080)="47504c049c3514bf772da07ae82e76590a36f6493ec1ab91b397e42abf1ea6cd8cd77427fc9a9e2b7165f52b4107bf0850d899dc52d013175ddb1b2f46203c2a05b722e33e556fb2e3f39a3cde1fca53640337ec956146bdbfcb115070195631de5d21a5ea9e638c2bdb78a501ca4b6ea313d82568f9382c2c3f6faba6b4ee54793b4ed26dae3e52225029bb2ac0007f77754c3f23ceda9809b9a9684a940abcaa8cfcc7133ec422e9c83888318d41e9a493f0195fe2599651b89504f5dba14625ce2366f33d95dba92f867279cabf4aceddc85a8af7a0fa68d767ce5136b9d0d1966c499cb6bf34c2988666970000000000000000000000", 0xa00000000000000}, 0x48) 14:18:52 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000940)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x48, 0x0, 0x0) syz_mount_image$bfs(&(0x7f0000000180)='bfs\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0) 14:18:52 executing program 1: r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/expire_quiescent_template\x00', 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000140)=ANY=[@ANYBLOB="73656375726974790000000000000000000000000000000000000000000000000e00000004000000e0040000f001000020030000000000002003000020030000380400003804000038040000380400003804000004000000", @ANYPTR=&(0x7f0000000100)=ANY=[@ANYBLOB="000000000000000000000003000000000008005a742c0a0000000000000000000000000000000000000000000000020000000000000000000000000001f00000"], @ANYBLOB="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"], 0x540) ioctl$EXT4_IOC_MIGRATE(0xffffffffffffffff, 0x6609) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000300)={0x0}, &(0x7f0000000400)=0xc) getsockopt$ARPT_SO_GET_INFO(r0, 0x0, 0x60, &(0x7f0000000740)={'filter\x00'}, &(0x7f00000007c0)=0x44) r2 = getpgrp(r1) prlimit64(r2, 0x0, &(0x7f00000004c0)={0x0, 0x7ffffd}, &(0x7f00000002c0)) lremovexattr(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000480)=ANY=[@ANYBLOB="f2a13baa12f4642e62706600"]) getsockopt$inet_sctp_SCTP_PR_ASSOC_STATUS(0xffffffffffffffff, 0x84, 0x73, &(0x7f0000000280)={0x0, 0x8, 0x0, 0xe0}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r3 = syz_open_dev$amidi(&(0x7f0000000100)='/dev/amidi#\x00', 0x2, 0x800) r4 = syz_genetlink_get_family_id$ipvs(&(0x7f00000008c0)='IPVS\x00') sendmsg$IPVS_CMD_GET_CONFIG(r0, &(0x7f0000000a40)={&(0x7f0000000680)={0x10, 0x0, 0x0, 0x20004080}, 0xc, &(0x7f0000000a00)={&(0x7f0000000900)={0xd4, r4, 0x608, 0x70bd2c, 0x25dfdbff, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x3}, @IPVS_CMD_ATTR_SERVICE={0x40, 0x1, [@IPVS_SVC_ATTR_PROTOCOL={0x8, 0x2, 0x2f}, @IPVS_SVC_ATTR_PORT={0x8, 0x4, 0x4e23}, @IPVS_SVC_ATTR_AF={0x8, 0x1, 0xa}, @IPVS_SVC_ATTR_PROTOCOL={0x8, 0x2, 0x62}, @IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv4=@multicast1}, @IPVS_SVC_ATTR_PROTOCOL={0x8}]}, @IPVS_CMD_ATTR_DAEMON={0x78, 0x3, [@IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x1}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14}, @IPVS_DAEMON_ATTR_MCAST_TTL={0x8, 0x8, 0x6}, @IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @dev={0xac, 0x14, 0x14, 0x19}}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3, 0x81}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3, 0x3}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'bridge0\x00'}, @IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x8, 0x4, 0x800}, @IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x8, 0x4, 0x7ff}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14}]}]}, 0xd4}, 0x1, 0x0, 0x0, 0x40000}, 0x10) recvfrom(r3, &(0x7f0000000500)=""/96, 0x60, 0x20, &(0x7f00000005c0)=@ipx={0x4, 0x1, 0x6, "6b183128f377"}, 0x80) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000200)='./file0\x00', 0x700, 0x0, &(0x7f00000024c0), 0x100032, &(0x7f0000000a80)=ANY=[@ANYBLOB="c0ab9a4209b9c0705c3f9179ce41b062db33347c0c6b413671a85fce7dca193d"]) ioctl$SNDRV_SEQ_IOCTL_GET_NAMED_QUEUE(r0, 0xc08c5336, &(0x7f0000000800)={0x800000000009582, 0x6, 0x8, 'queue0\x00', 0x1000}) prctl$PR_MPX_ENABLE_MANAGEMENT(0x2b) getsockopt$inet_dccp_int(0xffffffffffffffff, 0x21, 0xf, &(0x7f0000000240), 0x0) fstat(0xffffffffffffffff, &(0x7f00000006c0)) getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, &(0x7f0000000440)={0x0, 0x80}, &(0x7f00000001c0)=0xfffffffffffffd3f) ioctl$FICLONE(r3, 0x40049409, r3) setgroups(0x3, &(0x7f0000000340)=[0x0, 0x0, 0x0]) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, 0x0) 14:18:52 executing program 3: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0xc00, 0x0) ioctl$DRM_IOCTL_RES_CTX(0xffffffffffffff9c, 0xc0106426, &(0x7f0000000080)={0x6, &(0x7f0000000040)=[{0x0}, {}, {}, {}, {}, {}]}) ioctl$DRM_IOCTL_DMA(r0, 0xc0406429, &(0x7f00000001c0)={r1, 0xa, &(0x7f00000000c0)=[0x100, 0x3, 0xc2, 0xe72, 0xc36, 0x4, 0xdd, 0x3, 0x8, 0xdbc], &(0x7f0000000100)=[0x0, 0x1, 0x8, 0x8, 0xfff, 0xf6, 0x81, 0x6a06c7e6, 0x7], 0x67, 0x2, 0x81, &(0x7f0000000140)=[0xffffffff, 0x5], &(0x7f0000000180)=[0x5]}) clone(0x800000, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 14:18:52 executing program 2: getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) syz_mount_image$hfs(&(0x7f0000000200)='hfs\x00', &(0x7f0000000280)='./file0\x00', 0x3, 0x0, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) [ 2717.891749] hfs: can't find a HFS filesystem on dev loop2 14:18:52 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x3, &(0x7f0000001fd8)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x15}}, &(0x7f0000000080)="47504c049c3514bf772da07ae82e76590a36f6493ec1ab91b397e42abf1ea6cd8cd77427fc9a9e2b7165f52b4107bf0850d899dc52d013175ddb1b2f46203c2a05b722e33e556fb2e3f39a3cde1fca53640337ec956146bdbfcb115070195631de5d21a5ea9e638c2bdb78a501ca4b6ea313d82568f9382c2c3f6faba6b4ee54793b4ed26dae3e52225029bb2ac0007f77754c3f23ceda9809b9a9684a940abcaa8cfcc7133ec422e9c83888318d41e9a493f0195fe2599651b89504f5dba14625ce2366f33d95dba92f867279cabf4aceddc85a8af7a0fa68d767ce5136b9d0d1966c499cb6bf34c2988666970000000000000000000000", 0x10000000000000}, 0x48) [ 2717.973516] EXT4-fs (sda1): Unrecognized mount option "B p\?yAb34| kA6q_}=" or missing value [ 2718.019062] hfs: can't find a HFS filesystem on dev loop2 14:18:53 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000940)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x48, 0x0, 0x0) syz_mount_image$bfs(&(0x7f0000000180)='bfs\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0) 14:18:53 executing program 3: socket$inet_icmp_raw(0x2, 0x3, 0x1) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_ENABLE_CAP(r1, 0x4068aea3, &(0x7f0000000480)={0x79}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r1, r2, &(0x7f0000fe8000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_SET_LAPIC(r2, 0x4400ae8f, &(0x7f0000001940)={"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"}) setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, 0x0, 0x0) setsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, 0x0, 0x0) getsockopt$bt_BT_SECURITY(0xffffffffffffffff, 0x112, 0x4, &(0x7f00000001c0), 0x2) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, 0x0, &(0x7f0000000100)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getcwd(0x0, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x7, &(0x7f0000000080), 0x4) r3 = getpgrp(0x0) ptrace$pokeuser(0x6, r3, 0xfffffffffffffffd, 0x9) 14:18:53 executing program 2: getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) syz_mount_image$hfs(&(0x7f0000000200)='hfs\x00', &(0x7f0000000280)='./file0\x00', 0x830e0000, 0x0, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) [ 2718.171795] EXT4-fs (sda1): Unrecognized mount option "B p\?yAb34| kA6q_}=" or missing value 14:18:53 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x3, &(0x7f0000001fd8)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x15}}, &(0x7f0000000080)="47504c049c3514bf772da07ae82e76590a36f6493ec1ab91b397e42abf1ea6cd8cd77427fc9a9e2b7165f52b4107bf0850d899dc52d013175ddb1b2f46203c2a05b722e33e556fb2e3f39a3cde1fca53640337ec956146bdbfcb115070195631de5d21a5ea9e638c2bdb78a501ca4b6ea313d82568f9382c2c3f6faba6b4ee54793b4ed26dae3e52225029bb2ac0007f77754c3f23ceda9809b9a9684a940abcaa8cfcc7133ec422e9c83888318d41e9a493f0195fe2599651b89504f5dba14625ce2366f33d95dba92f867279cabf4aceddc85a8af7a0fa68d767ce5136b9d0d1966c499cb6bf34c2988666970000000000000000000000", 0x1000000}, 0x48) 14:18:53 executing program 1: r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/expire_quiescent_template\x00', 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000140)=@security={'security\x00', 0xe, 0x4, 0x4e0, 0x1f0, 0x320, 0x0, 0x320, 0x320, 0x438, 0x438, 0x438, 0x438, 0x438, 0x4, &(0x7f0000000100), {[{{@ipv6={@local, @local, [0x0, 0xffffff00, 0xffffffff, 0xffffff00], [0xffffffff, 0xff, 0xffffffff, 0xff], 'eql\x00', 'gretap0\x00', {}, {0xff}, 0x0, 0x7fffffff, 0x2, 0x61}, 0x0, 0x188, 0x1c8, 0x0, {}, [@common=@unspec=@conntrack2={0xc0, 'conntrack\x00', 0x2, {{@ipv4=@loopback, [0xffffffff, 0xffffffff, 0x0, 0xffffffff], @ipv4=@loopback, [0x0, 0xffffffff, 0xffffff00, 0xff000000], @ipv6=@ipv4={[], [], @remote}, [0xffffff00, 0xff000000, 0xff000000, 0xff], @ipv4=@multicast2, [0xffffffff, 0xff, 0xff0000ff], 0x3, 0x1ff, 0x4, 0x4e21, 0x4e20, 0x4e22, 0x4e20, 0x28, 0x20}, 0x1c0, 0x98}}]}, @common=@unspec=@ERROR={0x40, 'ERROR\x00', 0x0, "f650bd5c77822a55c077a2b3078812467f4ab9fefc372cf333baff203cdb"}}, {{@ipv6={@remote, @mcast2, [0xff000000, 0xffffff00, 0xffffffff, 0xff000000], [0x0, 0xff, 0xff000000, 0xffffff00], 'syzkaller0\x00', 'lo\x00', {}, {0xff}, 0x2b, 0x1, 0x2, 0x23}, 0x0, 0xf0, 0x130, 0x0, {}, [@common=@hl={0x28, 'hl\x00'}]}, @common=@inet=@TCPOPTSTRIP={0x40, 'TCPOPTSTRIP\x00', 0x0, {[0xe08d, 0x6, 0xff, 0x800, 0x2, 0x7, 0x3, 0x5]}}}, {{@uncond, 0x0, 0xf0, 0x118, 0x0, {}, [@common=@hl={0x28, 'hl\x00', 0x0, {0x3, 0x604}}]}, @common=@unspec=@STANDARD={0x28, '\x00', 0x0, 0xfffffffffffffffd}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x540) ioctl$EXT4_IOC_MIGRATE(0xffffffffffffffff, 0x6609) getsockopt$inet_sctp_SCTP_DELAYED_SACK(r0, 0x84, 0x10, &(0x7f0000000680)=@assoc_value={0x0}, &(0x7f0000000800)=0x8) getsockopt$inet_sctp6_SCTP_CONTEXT(r0, 0x84, 0x11, &(0x7f0000000840)={r1, 0x2}, &(0x7f0000000880)=0x8) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000300)={0x0}, &(0x7f0000000400)=0xc) getsockopt$ARPT_SO_GET_INFO(r0, 0x0, 0x60, &(0x7f0000000740)={'filter\x00'}, &(0x7f00000007c0)=0x44) r4 = getpgrp(r3) prlimit64(r4, 0x0, &(0x7f00000009c0)={0x0, 0x7}, &(0x7f00000002c0)) lremovexattr(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000480)=@random={'trusted.', 'bpf\x00'}) getsockopt$inet_sctp_SCTP_PR_ASSOC_STATUS(0xffffffffffffffff, 0x84, 0x73, &(0x7f0000000280)={0x0, 0x8, 0x0, 0xe0}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r5 = syz_open_dev$amidi(&(0x7f0000000100)='/dev/amidi#\x00', 0x2, 0x800) recvfrom(r5, &(0x7f0000000500)=""/96, 0x60, 0x20, &(0x7f00000005c0)=@ipx={0x4, 0x1, 0x6, "6b183128f377"}, 0x80) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000200)='./file0\x00', 0x700, 0x0, &(0x7f00000024c0), 0x100032, &(0x7f00000008c0)=ANY=[@ANYBLOB="53837b01724d0589bc8e9c65212a5a74e193afafae4fdc0413917df419b6f9b5087a946887fd44435ae77ae9cf1bb22aa16a942a5ef2b346674051e647839b7d528386f3ccbdda27c1d0a636bb000b47edcfa2a3368fcc66a77cf01fb0a688d96193af60766d095476278c8ac900d02b4526420e7c637084c1da55048876381fc346fbc0621a6f1f3e9b6bbb9b77887e90c4f6eda9ee067253d148a9b8554d1ae5ae8669b296c13769dd2804203be973356c3685dd04185c77bd47197f1d651f03c4b496886ffc3e46422a78e4"]) prctl$PR_MPX_ENABLE_MANAGEMENT(0x2b) getsockopt$inet_dccp_int(0xffffffffffffffff, 0x21, 0xf, &(0x7f0000000240), 0x0) fstat(0xffffffffffffffff, &(0x7f00000006c0)) getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, &(0x7f0000000440)={0x0, 0x80}, &(0x7f00000001c0)=0xfffffffffffffd3f) ioctl$FICLONE(r2, 0x40049409, r5) setgroups(0x3, &(0x7f0000000340)=[0x0, 0x0, 0x0]) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, 0x0) [ 2718.270901] EXT4-fs (sda1): Unrecognized mount option "./file0" or missing value [ 2718.344555] kvm: vcpu 0: requested 34784 ns lapic timer period limited to 200000 ns 14:18:53 executing program 4: r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/expire_quiescent_template\x00', 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000800)=ANY=[@ANYBLOB="73656375726974790000000000000000000000000000000000000000000000000e00000004000000b8040000f001000020030000000000002003000020030000380400003804000038040000380400003804000004000000", @ANYPTR=&(0x7f0000000100)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00'], @ANYBLOB="fe8000000000000000000000000000aafe8000000000000000000000000000aa0000000000000000ffffffffffffff00ffff0300010000ffffffffff000000ff65716c0000000000000000000000000067726574617030000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ff000000000000000000000000000000000000ff02610000000000000000000000000000008801c801000000000000000000000000000000000000000000000000c000636f6e6e747261636b0000000000000000000000000000000000000000027f000001000000000000000000000000ffffffffffffffff00000000ffffffff7f00000100000000000000000000000000000000ffffffffffffff00ff00000000000000000000000000ffffac1414bbffffff00ff000000ff000000000000ffe0000002000000000000000000000000ffffffff000000ffff0000ff0000000003000000ff01000004004e214e204e224e20280000000000c00198000000000040004552524f5200000000000000000000000000000000000000000000000000f650bd5c77822a55c077a2b3078812467f4ab9fefc372cf333baff203cdb0000fe8000000000000000000000000000bbff020000000000000000000000000001ff000000ffffff00ffffffffff00000000000000000000ffff000000ffffff0073797a6b616c6c6572300000000000006c6f000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002b00010223000000000000000000000000000000c800080100000000000000000000000000000000000000000000000040005443504f50545354524950000000000000000000000000000000000000008de0000006000000ff00000000080000020000000700000000000005000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f00018010000000000000000000000000000000000000000000000002800686c0000000000000000000000000000000000000000000000000000000003040000000000002800000000000000000000000000000000000000000000000000000000000000fdffffff000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a800d0000000000000000000000000000000000000000000000000002800000000000000000000000000000000000000000000000000000000000000feffffff0000000094c8085ba61d30064d84a63e65fa9f93b749bb96b4052d3f016d8df83ea223a6df5d8ef1577ad0b00f8aa6140221fb43d14442439bdc54acb0b39beac880f62bdc37a2108088452e965de80aad202abb1a9839251cddb42c9aeeaca5a4996db0c06094425f49a63d47e2afed0feb5bbf9f9af10e5a189cf928acc6258ed312b50ce35573c3d2525d77f41f88b2726d5380a8b1625fd5e43cd77d928613dd052c4123e6d59137080522299cb479284571801760397bde7caacef4705c253e28674289aa4f94a9a46b1b6ba3b121089f836b18d0a30759ff118e03245135b6ad53e17b9bbce1fb26463909632b68b1372edfa5a93c0828cb45fb0665bed14def3285d60dcb7d9ba2ae3c4e77206385668236d8569362aa240ccf1df2812eaf04df2c75c857657c207336ecc24a82961f85faac028ff3049787dad1155c7954724dc4fa232fa1091043a732babf9ce7017e628c7a373ed94d7e9959c99417c8b48bfbc792ada074c9baf33dce3d68c32217b43d00f0d21c30c0cc7ad77c5a5b7ce06c9807a5f12d35b47f93c3e51117385fa83734ead8"], 0x518) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = getpgrp(0x0) prlimit64(r2, 0x0, &(0x7f00000004c0)={0x0, 0x7ffffd}, &(0x7f00000002c0)) lremovexattr(0x0, &(0x7f0000000480)=@random={'trusted.', 'bpf\x00'}) getsockopt$inet_sctp_SCTP_PR_ASSOC_STATUS(0xffffffffffffffff, 0x84, 0x73, &(0x7f0000000280), 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r3 = syz_open_dev$amidi(&(0x7f0000000100)='/dev/amidi#\x00', 0x2, 0x800) recvfrom(0xffffffffffffffff, 0x0, 0x0, 0x20, &(0x7f00000005c0)=@ipx={0x4, 0x1, 0x6, "6b183128f377"}, 0x80) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000200)='./file0\x00', 0x700, 0x0, &(0x7f00000024c0), 0x100032, &(0x7f00000000c0)=ANY=[@ANYBLOB]) getsockopt$inet_dccp_int(0xffffffffffffffff, 0x21, 0xf, &(0x7f0000000240), 0x0) fstat(0xffffffffffffffff, &(0x7f00000006c0)) getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, &(0x7f0000000440)={0x0, 0x80}, &(0x7f00000001c0)=0xfffffffffffffd3f) ioctl$FICLONE(r1, 0x40049409, r3) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, 0x0) 14:18:53 executing program 0: openat$kvm(0xffffffffffffff9c, &(0x7f0000000940)='/dev/kvm\x00', 0x0, 0x0) r0 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r0, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x48, 0x0, 0x0) syz_mount_image$bfs(&(0x7f0000000180)='bfs\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r0, 0xae80, 0x0) 14:18:53 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x3, &(0x7f0000001fd8)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x15}}, &(0x7f0000000080)="47504c049c3514bf772da07ae82e76590a36f6493ec1ab91b397e42abf1ea6cd8cd77427fc9a9e2b7165f52b4107bf0850d899dc52d013175ddb1b2f46203c2a05b722e33e556fb2e3f39a3cde1fca53640337ec956146bdbfcb115070195631de5d21a5ea9e638c2bdb78a501ca4b6ea313d82568f9382c2c3f6faba6b4ee54793b4ed26dae3e52225029bb2ac0007f77754c3f23ceda9809b9a9684a940abcaa8cfcc7133ec422e9c83888318d41e9a493f0195fe2599651b89504f5dba14625ce2366f33d95dba92f867279cabf4aceddc85a8af7a0fa68d767ce5136b9d0d1966c499cb6bf34c2988666970000000000000000000000", 0x43000000}, 0x48) [ 2718.514411] hfs: can't find a HFS filesystem on dev loop2 [ 2718.687918] hfs: can't find a HFS filesystem on dev loop2 14:18:53 executing program 0: openat$kvm(0xffffffffffffff9c, &(0x7f0000000940)='/dev/kvm\x00', 0x0, 0x0) r0 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r0, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x48, 0x0, 0x0) syz_mount_image$bfs(&(0x7f0000000180)='bfs\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r0, 0xae80, 0x0) 14:18:53 executing program 2: getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) syz_mount_image$hfs(&(0x7f0000000200)='hfs\x00', &(0x7f0000000280)='./file0\x00', 0x500, 0x0, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 14:18:53 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x3, &(0x7f0000001fd8)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x15}}, &(0x7f0000000080)="47504c049c3514bf772da07ae82e76590a36f6493ec1ab91b397e42abf1ea6cd8cd77427fc9a9e2b7165f52b4107bf0850d899dc52d013175ddb1b2f46203c2a05b722e33e556fb2e3f39a3cde1fca53640337ec956146bdbfcb115070195631de5d21a5ea9e638c2bdb78a501ca4b6ea313d82568f9382c2c3f6faba6b4ee54793b4ed26dae3e52225029bb2ac0007f77754c3f23ceda9809b9a9684a940abcaa8cfcc7133ec422e9c83888318d41e9a493f0195fe2599651b89504f5dba14625ce2366f33d95dba92f867279cabf4aceddc85a8af7a0fa68d767ce5136b9d0d1966c499cb6bf34c2988666970000000000000000000000", 0x1c00}, 0x48) [ 2718.816045] EXT4-fs (sda1): Unrecognized mount option "S{rMe!*ZtᓯO}zhDCZz*j*^Fg@QG}R̽'Ц6" or missing value 14:18:53 executing program 3: socket$inet_icmp_raw(0x2, 0x3, 0x1) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_ENABLE_CAP(r1, 0x4068aea3, &(0x7f0000000480)={0x79}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r1, r2, &(0x7f0000fe8000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_SET_LAPIC(r2, 0x4400ae8f, &(0x7f0000001940)={"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"}) setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, 0x0, 0x0) setsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, 0x0, 0x0) getsockopt$bt_BT_SECURITY(0xffffffffffffffff, 0x112, 0x4, &(0x7f00000001c0), 0x2) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, 0x0, &(0x7f0000000100)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getcwd(0x0, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x7, &(0x7f0000000080), 0x4) r3 = getpgrp(0x0) ptrace$pokeuser(0x6, r3, 0xfffffffffffffffd, 0x9) 14:18:53 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x3, &(0x7f0000001fd8)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x15}}, &(0x7f0000000080)="47504c049c3514bf772da07ae82e76590a36f6493ec1ab91b397e42abf1ea6cd8cd77427fc9a9e2b7165f52b4107bf0850d899dc52d013175ddb1b2f46203c2a05b722e33e556fb2e3f39a3cde1fca53640337ec956146bdbfcb115070195631de5d21a5ea9e638c2bdb78a501ca4b6ea313d82568f9382c2c3f6faba6b4ee54793b4ed26dae3e52225029bb2ac0007f77754c3f23ceda9809b9a9684a940abcaa8cfcc7133ec422e9c83888318d41e9a493f0195fe2599651b89504f5dba14625ce2366f33d95dba92f867279cabf4aceddc85a8af7a0fa68d767ce5136b9d0d1966c499cb6bf34c2988666970000000000000000000000", 0x18428a}, 0x48) [ 2719.047651] EXT4-fs (sda1): Unrecognized mount option "S{rMe!*ZtᓯO}zhDCZz*j*^Fg@QG}R̽'Ц6" or missing value [ 2719.082815] hfs: can't find a HFS filesystem on dev loop2 14:18:54 executing program 0: openat$kvm(0xffffffffffffff9c, &(0x7f0000000940)='/dev/kvm\x00', 0x0, 0x0) r0 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r0, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x48, 0x0, 0x0) syz_mount_image$bfs(&(0x7f0000000180)='bfs\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r0, 0xae80, 0x0) 14:18:54 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x3, &(0x7f0000001fd8)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x15}}, &(0x7f0000000080)="47504c049c3514bf772da07ae82e76590a36f6493ec1ab91b397e42abf1ea6cd8cd77427fc9a9e2b7165f52b4107bf0850d899dc52d013175ddb1b2f46203c2a05b722e33e556fb2e3f39a3cde1fca53640337ec956146bdbfcb115070195631de5d21a5ea9e638c2bdb78a501ca4b6ea313d82568f9382c2c3f6faba6b4ee54793b4ed26dae3e52225029bb2ac0007f77754c3f23ceda9809b9a9684a940abcaa8cfcc7133ec422e9c83888318d41e9a493f0195fe2599651b89504f5dba14625ce2366f33d95dba92f867279cabf4aceddc85a8af7a0fa68d767ce5136b9d0d1966c499cb6bf34c2988666970000000000000000000000", 0xe4ffffff00000000}, 0x48) 14:18:54 executing program 4: r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/expire_quiescent_template\x00', 0x2, 0x0) ioctl$VIDIOC_STREAMON(r0, 0x40045612, &(0x7f0000000740)=0x1ff) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000140)=@security={'security\x00', 0xe, 0x4, 0x4b8, 0x1f0, 0x320, 0x0, 0x320, 0x320, 0x438, 0x438, 0x438, 0x438, 0x438, 0x4, &(0x7f0000000100), {[{{@ipv6={@local, @local, [0x0, 0x0, 0xffffffff, 0xffffff00], [0xffffffff, 0xff, 0xffffffff, 0xff], 'eql\x00', 'gretap0\x00', {}, {0xff}, 0x0, 0x7fffffff, 0x2, 0x61}, 0x0, 0x188, 0x1c8, 0x0, {}, [@common=@unspec=@conntrack2={0xc0, 'conntrack\x00', 0x2, {{@ipv4=@loopback, [0xffffffff, 0xffffffff, 0x0, 0xffffffff], @ipv4=@loopback, [0x0, 0xffffffff, 0xffffff00, 0xff000000], @ipv6=@ipv4={[], [], @remote}, [0xffffff00, 0xff000000, 0xff000000, 0xff], @ipv4=@multicast2, [0xffffffff, 0xff, 0xff0000ff], 0x3, 0x1ff, 0x4, 0x4e21, 0x4e20, 0x4e22, 0x4e20, 0x28}, 0x1c0, 0x98}}]}, @common=@unspec=@ERROR={0x40, 'ERROR\x00', 0x0, "f650bd5c77822a55c077a2b3078812467f4ab9fefc372cf333baff203cdb"}}, {{@ipv6={@remote, @mcast2, [0xff000000, 0xffffff00, 0xffffffff, 0xff000000], [0x0, 0xff, 0xff000000, 0xffffff00], 'syzkaller0\x00', 'lo\x00', {}, {}, 0x2b, 0x1, 0x2, 0x23}, 0x0, 0xc8, 0x108}, @common=@inet=@TCPOPTSTRIP={0x40, 'TCPOPTSTRIP\x00', 0x0, {[0xe08d, 0x6, 0xff, 0x800, 0x2, 0x7, 0x0, 0x5]}}}, {{@uncond, 0x0, 0xf0, 0x118, 0x0, {}, [@common=@hl={0x28, 'hl\x00', 0x0, {0x3, 0x604}}]}, @common=@unspec=@STANDARD={0x28, '\x00', 0x0, 0xfffffffffffffffd}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x518) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = getpgrp(0x0) prlimit64(r2, 0x0, &(0x7f00000004c0)={0x0, 0x7ffffd}, &(0x7f00000002c0)) lremovexattr(0x0, &(0x7f0000000480)=@random={'trusted.', 'bpf\x00'}) getsockopt$inet_sctp_SCTP_PR_ASSOC_STATUS(0xffffffffffffffff, 0x84, 0x73, &(0x7f0000000280), 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r3 = syz_open_dev$amidi(&(0x7f0000000100)='/dev/amidi#\x00', 0x2, 0x800) recvfrom(0xffffffffffffffff, 0x0, 0x0, 0x20, &(0x7f00000005c0)=@ipx={0x4, 0x1, 0x6, "6b183128f377"}, 0x80) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000200)='./file0\x00', 0x700, 0x0, &(0x7f00000024c0), 0x100032, &(0x7f00000000c0)=ANY=[@ANYBLOB]) getsockopt$inet_dccp_int(0xffffffffffffffff, 0x21, 0xf, &(0x7f0000000240), 0x0) fstat(0xffffffffffffffff, &(0x7f00000006c0)) getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, &(0x7f0000000680)={0x0, 0x80}, &(0x7f00000001c0)=0x8) ioctl$FICLONE(r1, 0x40049409, r3) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, 0x0) 14:18:54 executing program 1: r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/expire_quiescent_template\x00', 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000140)=@security={'security\x00', 0xe, 0x4, 0x4e0, 0x1f0, 0x320, 0x0, 0x320, 0x320, 0x438, 0x438, 0x438, 0x438, 0x438, 0x4, &(0x7f0000000100), {[{{@ipv6={@local, @local, [0x0, 0xffffff00, 0xffffffff, 0xffffff00], [0xffffffff, 0xff, 0xffffffff, 0xff], 'eql\x00', 'gretap0\x00', {}, {0xff}, 0x0, 0x7fffffff, 0x2, 0x61}, 0x0, 0x188, 0x1c8, 0x0, {}, [@common=@unspec=@conntrack2={0xc0, 'conntrack\x00', 0x2, {{@ipv4=@loopback, [0xffffffff, 0xffffffff, 0x0, 0xffffffff], @ipv4=@loopback, [0x0, 0xffffffff, 0xffffff00, 0xff000000], @ipv6=@ipv4={[], [], @remote}, [0xffffff00, 0xff000000, 0xff000000, 0xff], @ipv4=@multicast2, [0xffffffff, 0xff, 0xff0000ff], 0x3, 0x1ff, 0x4, 0x4e21, 0x4e20, 0x4e22, 0x4e20, 0x28, 0x20}, 0x1c0, 0x98}}]}, @common=@unspec=@ERROR={0x40, 'ERROR\x00', 0x0, "f650bd5c77822a55c077a2b3078812467f4ab9fefc372cf333baff203cdb"}}, {{@ipv6={@remote, @mcast2, [0xff000000, 0xffffff00, 0xffffffff, 0xff000000], [0x0, 0xff, 0xff000000, 0xffffff00], 'syzkaller0\x00', 'lo\x00', {}, {0xff}, 0x2b, 0x1, 0x2, 0x23}, 0x0, 0xf0, 0x130, 0x0, {}, [@common=@hl={0x28, 'hl\x00'}]}, @common=@inet=@TCPOPTSTRIP={0x40, 'TCPOPTSTRIP\x00', 0x0, {[0xe08d, 0x6, 0xff, 0x800, 0x2, 0x7, 0x3, 0x5]}}}, {{@uncond, 0x0, 0xf0, 0x118, 0x0, {}, [@common=@hl={0x28, 'hl\x00', 0x0, {0x3, 0x604}}]}, @common=@unspec=@STANDARD={0x28, '\x00', 0x0, 0xfffffffffffffffd}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x540) ioctl$EXT4_IOC_MIGRATE(0xffffffffffffffff, 0x6609) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000300)={0x0}, &(0x7f0000000400)=0xc) getsockopt$ARPT_SO_GET_INFO(r0, 0x0, 0x60, &(0x7f0000000740)={'filter\x00'}, &(0x7f00000007c0)=0x44) r3 = getpgrp(r2) prlimit64(r3, 0x0, &(0x7f00000004c0)={0x0, 0x7ffffd}, &(0x7f00000002c0)) lremovexattr(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000480)=@random={'trusted.', 'bpf\x00'}) getsockopt$inet_sctp_SCTP_PR_ASSOC_STATUS(0xffffffffffffffff, 0x84, 0x73, &(0x7f0000000280)={0x0, 0x8, 0x0, 0xe0}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r4 = syz_open_dev$amidi(&(0x7f0000000100)='/dev/amidi#\x00', 0x2, 0x800) recvfrom(r4, &(0x7f0000000500)=""/96, 0x60, 0x20, &(0x7f00000005c0)=@ipx={0x4, 0x1, 0x6, "6b183128f377"}, 0x80) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000200)='./file0\x00', 0x700, 0x0, &(0x7f00000024c0), 0x100032, &(0x7f0000000800)=ANY=[@ANYBLOB="75179234c0ec324366a596a2fbb9b43f208cd40fe634fb4959121039276c07898c67ded8aaeaca3255e5682c17cf79f57429884b0b868f96a2724aece32d973f2691e3c6f09c83270969ef3a75a86f4f4d57256a81a94d3e44c199d45d749b145669473c28c3843f002941ee2c702c93cf2ff1f15c23098ed74609c6291b5be032ec392314b4c5de634d90103bc4cf"]) prctl$PR_MPX_ENABLE_MANAGEMENT(0x2b) getsockopt$inet_dccp_int(0xffffffffffffffff, 0x21, 0xf, &(0x7f0000000240), 0x0) fstat(0xffffffffffffffff, &(0x7f00000006c0)) getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, &(0x7f0000000440)={0x0, 0x80}, &(0x7f00000001c0)=0xfffffffffffffd3f) ioctl$FICLONE(r1, 0x40049409, r4) ioctl$sock_inet_SIOCGIFDSTADDR(r0, 0x8917, &(0x7f0000000680)={'ip6_vti0\x00', {0x2, 0x4e20, @broadcast}}) setgroups(0x3, &(0x7f0000000340)=[0x0, 0x0, 0x0]) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, 0x0) [ 2719.262522] hfs: can't find a HFS filesystem on dev loop2 [ 2719.327001] kvm: vcpu 0: requested 34784 ns lapic timer period limited to 200000 ns 14:18:54 executing program 2: getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) syz_mount_image$hfs(&(0x7f0000000200)='hfs\x00', &(0x7f0000000280)='./file0\x00', 0xe83, 0x0, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 14:18:54 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x3, &(0x7f0000001fd8)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x15}}, &(0x7f0000000080)="47504c049c3514bf772da07ae82e76590a36f6493ec1ab91b397e42abf1ea6cd8cd77427fc9a9e2b7165f52b4107bf0850d899dc52d013175ddb1b2f46203c2a05b722e33e556fb2e3f39a3cde1fca53640337ec956146bdbfcb115070195631de5d21a5ea9e638c2bdb78a501ca4b6ea313d82568f9382c2c3f6faba6b4ee54793b4ed26dae3e52225029bb2ac0007f77754c3f23ceda9809b9a9684a940abcaa8cfcc7133ec422e9c83888318d41e9a493f0195fe2599651b89504f5dba14625ce2366f33d95dba92f867279cabf4aceddc85a8af7a0fa68d767ce5136b9d0d1966c499cb6bf34c2988666970000000000000000000000", 0x100000000000000}, 0x48) 14:18:54 executing program 0: r0 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) r1 = ioctl$KVM_CREATE_VCPU(r0, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r0, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r1, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x48, 0x0, 0x0) syz_mount_image$bfs(&(0x7f0000000180)='bfs\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r1, 0xae80, 0x0) [ 2719.575922] hfs: can't find a HFS filesystem on dev loop2 [ 2719.672689] EXT4-fs (sda1): re-mounted. Opts: ,errors=continue 14:18:54 executing program 3: socket$inet_icmp_raw(0x2, 0x3, 0x1) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_ENABLE_CAP(r1, 0x4068aea3, &(0x7f0000000480)={0x79}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r1, r2, &(0x7f0000fe8000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_SET_LAPIC(r2, 0x4400ae8f, &(0x7f0000001940)={"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"}) setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, 0x0, 0x0) setsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, 0x0, 0x0) getsockopt$bt_BT_SECURITY(0xffffffffffffffff, 0x112, 0x4, &(0x7f00000001c0), 0x2) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, 0x0, &(0x7f0000000100)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getcwd(0x0, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x7, &(0x7f0000000080), 0x4) r3 = getpgrp(0x0) ptrace$pokeuser(0x6, r3, 0xfffffffffffffffd, 0x9) 14:18:54 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x3, &(0x7f0000001fd8)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x15}}, &(0x7f0000000080)="47504c049c3514bf772da07ae82e76590a36f6493ec1ab91b397e42abf1ea6cd8cd77427fc9a9e2b7165f52b4107bf0850d899dc52d013175ddb1b2f46203c2a05b722e33e556fb2e3f39a3cde1fca53640337ec956146bdbfcb115070195631de5d21a5ea9e638c2bdb78a501ca4b6ea313d82568f9382c2c3f6faba6b4ee54793b4ed26dae3e52225029bb2ac0007f77754c3f23ceda9809b9a9684a940abcaa8cfcc7133ec422e9c83888318d41e9a493f0195fe2599651b89504f5dba14625ce2366f33d95dba92f867279cabf4aceddc85a8af7a0fa68d767ce5136b9d0d1966c499cb6bf34c2988666970000000000000000000000", 0x4300000000000000}, 0x48) 14:18:54 executing program 0: r0 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) r1 = ioctl$KVM_CREATE_VCPU(r0, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r0, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r1, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x48, 0x0, 0x0) syz_mount_image$bfs(&(0x7f0000000180)='bfs\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r1, 0xae80, 0x0) [ 2719.771884] EXT4-fs (sda1): re-mounted. Opts: 14:18:54 executing program 2: getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) syz_mount_image$hfs(&(0x7f0000000200)='hfs\x00', &(0x7f0000000280)='./file0\x00', 0x4c, 0x0, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 14:18:54 executing program 0: r0 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) r1 = ioctl$KVM_CREATE_VCPU(r0, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r0, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r1, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x48, 0x0, 0x0) syz_mount_image$bfs(&(0x7f0000000180)='bfs\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r1, 0xae80, 0x0) 14:18:54 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x3, &(0x7f0000001fd8)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x15}}, &(0x7f0000000080)="47504c049c3514bf772da07ae82e76590a36f6493ec1ab91b397e42abf1ea6cd8cd77427fc9a9e2b7165f52b4107bf0850d899dc52d013175ddb1b2f46203c2a05b722e33e556fb2e3f39a3cde1fca53640337ec956146bdbfcb115070195631de5d21a5ea9e638c2bdb78a501ca4b6ea313d82568f9382c2c3f6faba6b4ee54793b4ed26dae3e52225029bb2ac0007f77754c3f23ceda9809b9a9684a940abcaa8cfcc7133ec422e9c83888318d41e9a493f0195fe2599651b89504f5dba14625ce2366f33d95dba92f867279cabf4aceddc85a8af7a0fa68d767ce5136b9d0d1966c499cb6bf34c2988666970000000000000000000000", 0x3f000000}, 0x48) 14:18:54 executing program 4: r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/expire_quiescent_template\x00', 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000140)=@security={'security\x00', 0xe, 0x4, 0x4b8, 0x1f0, 0x320, 0x0, 0x320, 0x320, 0x438, 0x438, 0x438, 0x438, 0x438, 0x4, &(0x7f0000000100), {[{{@ipv6={@local, @local, [0x0, 0x0, 0xffffffff, 0xffffff00], [0xffffffff, 0xff, 0xffffffff, 0xff], 'eql\x00', 'gretap0\x00', {}, {0xff}, 0x0, 0x7fffffff, 0x2, 0x61}, 0x0, 0x188, 0x1c8, 0x0, {}, [@common=@unspec=@conntrack2={0xc0, 'conntrack\x00', 0x2, {{@ipv4=@loopback, [0xffffffff, 0xffffffff, 0x0, 0xffffffff], @ipv4=@loopback, [0x0, 0xffffffff, 0xffffff00, 0xff000000], @ipv6=@ipv4={[], [], @remote}, [0xffffff00, 0xff000000, 0xff000000, 0xff], @ipv4=@multicast2, [0xffffffff, 0xff, 0xff0000ff], 0x3, 0x1ff, 0x4, 0x4e21, 0x4e20, 0x4e22, 0x4e20, 0x28}, 0x1c0, 0x98}}]}, @common=@unspec=@ERROR={0x40, 'ERROR\x00', 0x0, "f650bd5c77822a55c077a2b3078812467f4ab9fefc372cf333baff203cdb"}}, {{@ipv6={@remote, @mcast2, [0xff000000, 0xffffff00, 0xffffffff, 0xff000000], [0x0, 0xff, 0xff000000, 0xffffff00], 'syzkaller0\x00', 'lo\x00', {}, {}, 0x2b, 0x1, 0x2, 0x23}, 0x0, 0xc8, 0x108}, @common=@inet=@TCPOPTSTRIP={0x40, 'TCPOPTSTRIP\x00', 0x0, {[0xe08d, 0x6, 0xff, 0x800, 0x2, 0x7, 0x0, 0x5]}}}, {{@uncond, 0x0, 0xf0, 0x118, 0x0, {}, [@common=@hl={0x28, 'hl\x00', 0x0, {0x3, 0x604}}]}, @common=@unspec=@STANDARD={0x28, '\x00', 0x0, 0xfffffffffffffffd}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x518) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = getpgrp(0x0) prlimit64(r2, 0x0, &(0x7f00000004c0)={0x0, 0x7ffffd}, &(0x7f00000002c0)) lremovexattr(0x0, &(0x7f0000000480)=@random={'trusted.', 'bpf\x00'}) getsockopt$inet_sctp_SCTP_PR_ASSOC_STATUS(0xffffffffffffffff, 0x84, 0x73, &(0x7f0000000280), 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r3 = syz_open_dev$amidi(&(0x7f0000000100)='/dev/amidi#\x00', 0x2, 0x800) recvfrom(0xffffffffffffffff, 0x0, 0x0, 0x20, &(0x7f00000005c0)=@ipx={0x4, 0x1, 0x6, "6b183128f377"}, 0x80) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000200)='./file0\x00', 0x700, 0x0, &(0x7f00000024c0), 0x100032, &(0x7f00000000c0)=ANY=[@ANYBLOB]) getsockopt$inet_dccp_int(0xffffffffffffffff, 0x21, 0xf, &(0x7f0000000240), 0x0) fstat(0xffffffffffffffff, &(0x7f00000006c0)) getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, &(0x7f0000000440)={0x0, 0x80}, &(0x7f00000001c0)=0xfffffffffffffd3f) syz_mount_image$ext4(&(0x7f0000000680)='ext3\x00', &(0x7f0000000740)='./file0\x00', 0x0, 0x3, &(0x7f00000008c0)=[{&(0x7f0000000780)="18cf03fe9d7460c8f8e68d55e9923ba5d18f2916c40a917a1dc6265da6c5", 0x1e, 0x7}, {&(0x7f00000007c0)="3a326489", 0x4, 0x3f}, {&(0x7f0000000800)="eef07174fbc44a5fd209096c385e6fba9c76d8a6bff8ae047fa09ef9ec48dcdcc8f69b67eb0a1a55bd68be8fa6cdc114156ce994d6b4af44a992d954923b8b7dccc5f48384513575a50cb08d60dccced4e0208cadf32dd6d05c854f07e994407b5f889c0d14fc31ba818822f26b7397332a25b510211ce5f02050fbd7358ae072d930882d026074315964a47b4731dc87f04ac4c3deca85c54d3aca5", 0x9c}], 0x80001, &(0x7f0000000940)={[{@prjquota='prjquota'}, {@nodelalloc='nodelalloc'}, {@stripe={'stripe', 0x3d, 0x2}}], [{@seclabel='seclabel'}, {@smackfshat={'smackfshat', 0x3d, 'TCPOPTSTRIP\x00'}}, {@fsmagic={'fsmagic', 0x3d, 0x5}}, {@smackfshat={'smackfshat', 0x3d, 'conntrack\x00'}}, {@fscontext={'fscontext', 0x3d, 'system_u'}}, {@dont_measure='dont_measure'}, {@obj_role={'obj_role'}}]}) ioctl$FICLONE(r1, 0x40049409, r3) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, 0x0) [ 2720.015982] hfs: can't find a HFS filesystem on dev loop2 14:18:55 executing program 1: r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/expire_quiescent_template\x00', 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000140)=@security={'security\x00', 0xe, 0x4, 0x4e0, 0x1f0, 0x320, 0x0, 0x320, 0x320, 0x438, 0x438, 0x438, 0x438, 0x438, 0x4, &(0x7f0000000100), {[{{@ipv6={@local, @local, [0x0, 0xffffff00, 0xffffffff, 0xffffff00], [0xffffffff, 0xff, 0xffffffff, 0xff], 'eql\x00', 'gretap0\x00', {}, {0xff}, 0x0, 0x7fffffff, 0x2, 0x61}, 0x0, 0x188, 0x1c8, 0x0, {}, [@common=@unspec=@conntrack2={0xc0, 'conntrack\x00', 0x2, {{@ipv4=@loopback, [0xffffffff, 0xffffffff, 0x0, 0xffffffff], @ipv4=@loopback, [0x0, 0xffffffff, 0xffffff00, 0xff000000], @ipv6=@ipv4={[], [], @remote}, [0xffffff00, 0xff000000, 0xff000000, 0xff], @ipv4=@multicast2, [0xffffffff, 0xff, 0xff0000ff], 0x3, 0x1ff, 0x4, 0x4e21, 0x4e20, 0x4e22, 0x4e20, 0x28, 0x20}, 0x1c0, 0x98}}]}, @common=@unspec=@ERROR={0x40, 'ERROR\x00', 0x0, "f650bd5c77822a55c077a2b3078812467f4ab9fefc372cf333baff203cdb"}}, {{@ipv6={@remote, @mcast2, [0xff000000, 0xffffff00, 0xffffffff, 0xff000000], [0x0, 0xff, 0xff000000, 0xffffff00], 'syzkaller0\x00', 'lo\x00', {}, {0xff}, 0x2b, 0x1, 0x2, 0x23}, 0x0, 0xf0, 0x130, 0x0, {}, [@common=@hl={0x28, 'hl\x00'}]}, @common=@inet=@TCPOPTSTRIP={0x40, 'TCPOPTSTRIP\x00', 0x0, {[0xe08d, 0x6, 0xff, 0x800, 0x2, 0x7, 0x3, 0x5]}}}, {{@uncond, 0x0, 0xf0, 0x118, 0x0, {}, [@common=@hl={0x28, 'hl\x00', 0x0, {0x3, 0x604}}]}, @common=@unspec=@STANDARD={0x28, '\x00', 0x0, 0xfffffffffffffffd}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x540) ioctl$EXT4_IOC_MIGRATE(0xffffffffffffffff, 0x6609) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fsetxattr$security_ima(r0, &(0x7f0000000680)='security.ima\x00', &(0x7f0000000800)=@ng={0x4, 0x6, "b16d0dc4cb71323a"}, 0xa, 0x3) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000300)={0x0}, &(0x7f0000000400)=0xc) getsockopt$ARPT_SO_GET_INFO(r0, 0x0, 0x60, &(0x7f0000000740)={'filter\x00'}, &(0x7f00000007c0)=0x44) r3 = getpgrp(r2) prlimit64(r3, 0x0, &(0x7f0000000840)={0x0, 0x7ffffd}, &(0x7f00000002c0)) lremovexattr(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000480)=@random={'trusted.', 'bpf\x00'}) getsockopt$inet_sctp_SCTP_PR_ASSOC_STATUS(0xffffffffffffffff, 0x84, 0x73, &(0x7f0000000280)={0x0, 0x8, 0x0, 0xe0}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r4 = syz_open_dev$amidi(&(0x7f0000000100)='/dev/amidi#\x00', 0x2, 0x800) recvfrom(r4, &(0x7f0000000500)=""/96, 0x60, 0x20, &(0x7f00000005c0)=@ipx={0x4, 0x1, 0x6, "6b183128f377"}, 0x80) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000200)='./file0\x00', 0x700, 0x0, &(0x7f00000024c0), 0x100032, &(0x7f00000000c0)=ANY=[@ANYBLOB]) prctl$PR_MPX_ENABLE_MANAGEMENT(0x2b) getsockopt$inet_dccp_int(0xffffffffffffffff, 0x21, 0xf, &(0x7f0000000240), 0x0) fstat(0xffffffffffffffff, &(0x7f00000006c0)) getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, &(0x7f0000000440)={0x0, 0x80}, &(0x7f00000001c0)=0xfffffffffffffd3f) ioctl$FICLONE(r1, 0x40049409, r4) setgroups(0x3, &(0x7f0000000340)=[0x0, 0x0, 0x0]) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, 0x0) [ 2720.152202] hfs: can't find a HFS filesystem on dev loop2 14:18:55 executing program 2: getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) syz_mount_image$hfs(&(0x7f0000000200)='hfs\x00', &(0x7f0000000280)='./file0\x00', 0xffffffff00000000, 0x0, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 14:18:55 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x3, &(0x7f0000001fd8)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x15}}, &(0x7f0000000080)="47504c049c3514bf772da07ae82e76590a36f6493ec1ab91b397e42abf1ea6cd8cd77427fc9a9e2b7165f52b4107bf0850d899dc52d013175ddb1b2f46203c2a05b722e33e556fb2e3f39a3cde1fca53640337ec956146bdbfcb115070195631de5d21a5ea9e638c2bdb78a501ca4b6ea313d82568f9382c2c3f6faba6b4ee54793b4ed26dae3e52225029bb2ac0007f77754c3f23ceda9809b9a9684a940abcaa8cfcc7133ec422e9c83888318d41e9a493f0195fe2599651b89504f5dba14625ce2366f33d95dba92f867279cabf4aceddc85a8af7a0fa68d767ce5136b9d0d1966c499cb6bf34c2988666970000000000000000000000", 0x400000}, 0x48) 14:18:55 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x48, 0x0, 0x0) syz_mount_image$bfs(&(0x7f0000000180)='bfs\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 14:18:55 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x48) r0 = socket$kcm(0xa, 0x5, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0xf, 0x3}, 0xfffffffffffffebb) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x890b, &(0x7f0000000000)) [ 2720.397734] hfs: can't find a HFS filesystem on dev loop2 14:18:55 executing program 2: getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) syz_mount_image$hfs(&(0x7f0000000200)='hfs\x00', &(0x7f0000000280)='./file0\x00', 0x2000000000000000, 0x0, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 14:18:55 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x3, &(0x7f0000001fd8)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x15}}, &(0x7f0000000080)="47504c049c3514bf772da07ae82e76590a36f6493ec1ab91b397e42abf1ea6cd8cd77427fc9a9e2b7165f52b4107bf0850d899dc52d013175ddb1b2f46203c2a05b722e33e556fb2e3f39a3cde1fca53640337ec956146bdbfcb115070195631de5d21a5ea9e638c2bdb78a501ca4b6ea313d82568f9382c2c3f6faba6b4ee54793b4ed26dae3e52225029bb2ac0007f77754c3f23ceda9809b9a9684a940abcaa8cfcc7133ec422e9c83888318d41e9a493f0195fe2599651b89504f5dba14625ce2366f33d95dba92f867279cabf4aceddc85a8af7a0fa68d767ce5136b9d0d1966c499cb6bf34c2988666970000000000000000000000", 0x300}, 0x48) 14:18:55 executing program 4: r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/expire_quiescent_template\x00', 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000140)=@security={'security\x00', 0xe, 0x4, 0x4b8, 0x1f0, 0x320, 0x0, 0x320, 0x320, 0x438, 0x438, 0x438, 0x438, 0x438, 0x4, &(0x7f0000000100), {[{{@ipv6={@local, @local, [0x0, 0x0, 0xffffffff, 0xffffff00], [0xffffffff, 0xff, 0xffffffff, 0xff], 'eql\x00', 'gretap0\x00', {}, {0xff}, 0x0, 0x7fffffff, 0x2, 0x61}, 0x0, 0x188, 0x1c8, 0x0, {}, [@common=@unspec=@conntrack2={0xc0, 'conntrack\x00', 0x2, {{@ipv4=@loopback, [0xffffffff, 0xffffffff, 0x0, 0xffffffff], @ipv4=@loopback, [0x0, 0xffffffff, 0xffffff00, 0xff000000], @ipv6=@ipv4={[], [], @remote}, [0xffffff00, 0xff000000, 0xff000000, 0xff], @ipv4=@multicast2, [0xffffffff, 0xff, 0xff0000ff], 0x3, 0x1ff, 0x4, 0x4e21, 0x4e20, 0x4e22, 0x4e20, 0x28}, 0x1c0, 0x98}}]}, @common=@unspec=@ERROR={0x40, 'ERROR\x00', 0x0, "f650bd5c77822a55c077a2b3078812467f4ab9fefc372cf333baff203cdb"}}, {{@ipv6={@remote, @mcast2, [0xff000000, 0xffffff00, 0xffffffff, 0xff000000], [0x0, 0xff, 0xff000000, 0xffffff00], 'syzkaller0\x00', 'lo\x00', {}, {}, 0x2b, 0x1, 0x2, 0x23}, 0x0, 0xc8, 0x108}, @common=@inet=@TCPOPTSTRIP={0x40, 'TCPOPTSTRIP\x00', 0x0, {[0xe08d, 0x6, 0xff, 0x800, 0x2, 0x7, 0x0, 0x5]}}}, {{@uncond, 0x0, 0xf0, 0x118, 0x0, {}, [@common=@hl={0x28, 'hl\x00', 0x0, {0x3, 0x604}}]}, @common=@unspec=@STANDARD={0x28, '\x00', 0x0, 0xfffffffffffffffd}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x518) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = getpgrp(0x0) prlimit64(r2, 0x0, &(0x7f00000004c0)={0x0, 0x7ffffd}, &(0x7f00000002c0)) lremovexattr(0x0, &(0x7f0000000480)=@random={'trusted.', 'bpf\x00'}) getsockopt$inet_sctp_SCTP_PR_ASSOC_STATUS(0xffffffffffffffff, 0x84, 0x73, &(0x7f0000000280)={0x0}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r4 = syz_open_dev$amidi(&(0x7f0000000100)='/dev/amidi#\x00', 0x2, 0x800) recvfrom(0xffffffffffffffff, 0x0, 0x0, 0x20, &(0x7f00000005c0)=@ipx={0x4, 0x1, 0x6, "6b183128f377"}, 0x80) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000000680)={0x0, 0x6, 0x40, 0x26}) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000200)='./file0\x00', 0x700, 0x0, &(0x7f00000024c0), 0x100032, &(0x7f00000000c0)=ANY=[@ANYBLOB]) getsockopt$inet_dccp_int(0xffffffffffffffff, 0x21, 0xf, &(0x7f0000000240), 0x0) fstat(0xffffffffffffffff, &(0x7f00000006c0)) setsockopt$inet_sctp6_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f00000007c0)={r3, 0x0, 0x1, [0x3b45]}, 0xa) getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, &(0x7f0000000440)={0x0, 0x80}, &(0x7f00000001c0)=0xfffffffffffffd3f) ioctl$FICLONE(r1, 0x40049409, r4) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) ioctl$KVM_GET_MSRS(r0, 0xc008ae88, &(0x7f0000000740)={0x4, 0x0, [{}, {}, {}, {}]}) syz_mount_image$ext4(&(0x7f0000000800)='ext4\x00', &(0x7f0000000840)='./file0/file0\x00', 0x0, 0x4, &(0x7f00000009c0)=[{&(0x7f0000000880)="8a57ea3c22bad61f2d9e23332ac0e0264e70375195dbcdb1bdd7bf6ddfa4ea4407a9553ad31b6b37c7cafccc", 0x2c, 0x101}, {&(0x7f00000008c0)="510ae39b759c2b0b7ee48a163a26f5ae9d40bc1d66031f9873877bcee1ba67e3eb4060631d1f92e67745ef8def2c79817a4d9a8d70b4dcf75984cab5504ae542a9b6777d26b033", 0x47, 0x81}, {&(0x7f0000000940)="fb5dd77252f382dc3610b64b238a93def1ed20c4d5e57288401d", 0x1a, 0x4}, {&(0x7f0000000980)="d491b4951501df3a8c163e1073aa410aeb93fb1e5fef130b18e479bf838c2d59f4d8a71001f1c328", 0x28, 0xfb}], 0x48, &(0x7f0000000a40)={[{@errors_continue='errors=continue'}, {@debug='debug'}], [{@smackfshat={'smackfshat', 0x3d, 'security\x00'}}]}) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) ioctl$NBD_SET_TIMEOUT(r0, 0xab09, 0x20874000) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, 0x0) 14:18:55 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x48, 0x0, 0x0) syz_mount_image$bfs(&(0x7f0000000180)='bfs\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 14:18:55 executing program 3: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='sched\x00') exit(0x0) write$P9_RGETATTR(r0, 0x0, 0x0) 14:18:55 executing program 1: r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/expire_quiescent_template\x00', 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000140)=@security={'security\x00', 0xe, 0x4, 0x4e0, 0x1f0, 0x320, 0x0, 0x320, 0x320, 0x438, 0x438, 0x438, 0x438, 0x438, 0x4, &(0x7f0000000100), {[{{@ipv6={@local, @local, [0x0, 0xffffff00, 0xffffffff, 0xffffff00], [0xffffffff, 0xff, 0xffffffff, 0xff], 'eql\x00', 'gretap0\x00', {}, {0xff}, 0x0, 0x7fffffff, 0x2, 0x61}, 0x0, 0x188, 0x1c8, 0x0, {}, [@common=@unspec=@conntrack2={0xc0, 'conntrack\x00', 0x2, {{@ipv4=@loopback, [0xffffffff, 0xffffffff, 0x0, 0xffffffff], @ipv4=@loopback, [0x0, 0xffffffff, 0xffffff00, 0xff000000], @ipv6=@ipv4={[], [], @remote}, [0xffffff00, 0xff000000, 0xff000000, 0xff], @ipv4=@multicast2, [0xffffffff, 0xff, 0xff0000ff], 0x3, 0x1ff, 0x4, 0x4e21, 0x4e20, 0x4e22, 0x4e20, 0x28, 0x20}, 0x1c0, 0x98}}]}, @common=@unspec=@ERROR={0x40, 'ERROR\x00', 0x0, "f650bd5c77822a55c077a2b3078812467f4ab9fefc372cf333baff203cdb"}}, {{@ipv6={@remote, @mcast2, [0xff000000, 0xffffff00, 0xffffffff, 0xff000000], [0x0, 0xff, 0xff000000, 0xffffff00], 'syzkaller0\x00', 'lo\x00', {}, {0xff}, 0x2b, 0x1, 0x2, 0x23}, 0x0, 0xf0, 0x130, 0x0, {}, [@common=@hl={0x28, 'hl\x00'}]}, @common=@inet=@TCPOPTSTRIP={0x40, 'TCPOPTSTRIP\x00', 0x0, {[0xe08d, 0x6, 0xff, 0x800, 0x2, 0x7, 0x3, 0x5]}}}, {{@uncond, 0x0, 0xf0, 0x118, 0x0, {}, [@common=@hl={0x28, 'hl\x00', 0x0, {0x3, 0x604}}]}, @common=@unspec=@STANDARD={0x28, '\x00', 0x0, 0xfffffffffffffffd}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x540) ioctl$EXT4_IOC_MIGRATE(0xffffffffffffffff, 0x6609) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000300)={0x0}, &(0x7f0000000400)=0xc) getsockopt$ARPT_SO_GET_INFO(r0, 0x0, 0x60, &(0x7f0000000740)={'filter\x00'}, &(0x7f00000007c0)=0x44) r3 = getpgrp(r2) prlimit64(r3, 0x0, &(0x7f00000004c0)={0x0, 0x7ffffd}, &(0x7f00000002c0)) lremovexattr(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000800)=ANY=[@ANYBLOB="747275737465642e62706600a592b245f1d0a2d6b1e9af305f80ad7d98f5f3fe45ac5803010787fd3016f5b4fd4b8526ce0eefd16dc15e674639b343b04c36d9d516297b8be40435fbac893a938e6afc5ca4b559b03932c1296d67e33f04065c4818fff05019e9dc4f84053d599b2b078bac876c729e41e598817f62a88e9432d526159911eb9328779de8320578ac6276856adcb1ae3cc5a2d1d326dccfaed7fb"]) getsockopt$inet_sctp_SCTP_PR_ASSOC_STATUS(0xffffffffffffffff, 0x84, 0x73, &(0x7f0000000280)={0x0, 0x8, 0x0, 0xe0}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r4 = syz_open_dev$amidi(&(0x7f0000000100)='/dev/amidi#\x00', 0x2, 0x800) recvfrom(r4, &(0x7f0000000500)=""/96, 0x60, 0x20, &(0x7f00000005c0)=@ipx={0x4, 0x1, 0x6, "6b183128f377"}, 0x80) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000200)='./file0\x00', 0x700, 0x0, &(0x7f00000024c0), 0x100032, &(0x7f00000000c0)=ANY=[@ANYBLOB]) prctl$PR_MPX_ENABLE_MANAGEMENT(0x2b) getsockopt$inet_dccp_int(0xffffffffffffffff, 0x21, 0xf, &(0x7f0000000240), 0x0) fstat(0xffffffffffffffff, &(0x7f00000006c0)) ioctl$VIDIOC_SUBDEV_S_FMT(r0, 0xc0585605, &(0x7f00000008c0)={0x1, 0xffffffff, {0x800, 0x3, 0x3013, 0x5, 0x7, 0x0, 0x3, 0x7}}) getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, &(0x7f0000000440)={0x0, 0x80}, &(0x7f0000000980)=0x8) ioctl$FICLONE(r1, 0x40049409, r4) setgroups(0x3, &(0x7f0000000340)=[0x0, 0x0, 0x0]) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(r4, 0x84, 0x77, &(0x7f0000000680)={r5, 0xb7, 0x8, [0x4, 0x8, 0x8000, 0x7, 0xff, 0x0, 0x0, 0x10001]}, &(0x7f0000000940)=0x18) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, 0x0) 14:18:55 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x3, &(0x7f0000001fd8)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x15}}, &(0x7f0000000080)="47504c049c3514bf772da07ae82e76590a36f6493ec1ab91b397e42abf1ea6cd8cd77427fc9a9e2b7165f52b4107bf0850d899dc52d013175ddb1b2f46203c2a05b722e33e556fb2e3f39a3cde1fca53640337ec956146bdbfcb115070195631de5d21a5ea9e638c2bdb78a501ca4b6ea313d82568f9382c2c3f6faba6b4ee54793b4ed26dae3e52225029bb2ac0007f77754c3f23ceda9809b9a9684a940abcaa8cfcc7133ec422e9c83888318d41e9a493f0195fe2599651b89504f5dba14625ce2366f33d95dba92f867279cabf4aceddc85a8af7a0fa68d767ce5136b9d0d1966c499cb6bf34c2988666970000000000000000000000", 0xff00}, 0x48) [ 2720.878674] hfs: can't find a HFS filesystem on dev loop2 14:18:55 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x48, 0x0, 0x0) syz_mount_image$bfs(&(0x7f0000000180)='bfs\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 14:18:56 executing program 2: getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) syz_mount_image$hfs(&(0x7f0000000200)='hfs\x00', &(0x7f0000000280)='./file0\x00', 0x5000000, 0x0, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 14:18:56 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x3, &(0x7f0000001fd8)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x15}}, &(0x7f0000000080)="47504c049c3514bf772da07ae82e76590a36f6493ec1ab91b397e42abf1ea6cd8cd77427fc9a9e2b7165f52b4107bf0850d899dc52d013175ddb1b2f46203c2a05b722e33e556fb2e3f39a3cde1fca53640337ec956146bdbfcb115070195631de5d21a5ea9e638c2bdb78a501ca4b6ea313d82568f9382c2c3f6faba6b4ee54793b4ed26dae3e52225029bb2ac0007f77754c3f23ceda9809b9a9684a940abcaa8cfcc7133ec422e9c83888318d41e9a493f0195fe2599651b89504f5dba14625ce2366f33d95dba92f867279cabf4aceddc85a8af7a0fa68d767ce5136b9d0d1966c499cb6bf34c2988666970000000000000000000000", 0x7}, 0x48) 14:18:56 executing program 0: openat$kvm(0xffffffffffffff9c, &(0x7f0000000940)='/dev/kvm\x00', 0x0, 0x0) r0 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) r1 = ioctl$KVM_CREATE_VCPU(r0, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r0, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r1, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x48, 0x0, 0x0) syz_mount_image$bfs(&(0x7f0000000180)='bfs\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r1, 0xae80, 0x0) [ 2721.347567] hfs: can't find a HFS filesystem on dev loop2 14:18:56 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x3, &(0x7f0000001fd8)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x15}}, &(0x7f0000000080)="47504c049c3514bf772da07ae82e76590a36f6493ec1ab91b397e42abf1ea6cd8cd77427fc9a9e2b7165f52b4107bf0850d899dc52d013175ddb1b2f46203c2a05b722e33e556fb2e3f39a3cde1fca53640337ec956146bdbfcb115070195631de5d21a5ea9e638c2bdb78a501ca4b6ea313d82568f9382c2c3f6faba6b4ee54793b4ed26dae3e52225029bb2ac0007f77754c3f23ceda9809b9a9684a940abcaa8cfcc7133ec422e9c83888318d41e9a493f0195fe2599651b89504f5dba14625ce2366f33d95dba92f867279cabf4aceddc85a8af7a0fa68d767ce5136b9d0d1966c499cb6bf34c2988666970000000000000000000000", 0x43}, 0x48) 14:18:56 executing program 1: r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/expire_quiescent_template\x00', 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000140)=@security={'security\x00', 0xe, 0x4, 0x4e0, 0x1f0, 0x320, 0x0, 0x320, 0x320, 0x438, 0x438, 0x438, 0x438, 0x438, 0x4, &(0x7f0000000100), {[{{@ipv6={@local, @local, [0x0, 0xffffff00, 0xffffffff, 0xffffff00], [0xffffffff, 0xff, 0xffffffff, 0xff], 'eql\x00', 'gretap0\x00', {}, {0xff}, 0x0, 0x7fffffff, 0x2, 0x61}, 0x0, 0x188, 0x1c8, 0x0, {}, [@common=@unspec=@conntrack2={0xc0, 'conntrack\x00', 0x2, {{@ipv4=@loopback, [0xffffffff, 0xffffffff, 0x0, 0xffffffff], @ipv4=@loopback, [0x0, 0xffffffff, 0xffffff00, 0xff000000], @ipv6=@ipv4={[], [], @remote}, [0xffffff00, 0xff000000, 0xff000000, 0xff], @ipv4=@multicast2, [0xffffffff, 0xff, 0xff0000ff], 0x3, 0x1ff, 0x4, 0x4e21, 0x4e20, 0x4e22, 0x4e20, 0x28, 0x20}, 0x1c0, 0x98}}]}, @common=@unspec=@ERROR={0x40, 'ERROR\x00', 0x0, "f650bd5c77822a55c077a2b3078812467f4ab9fefc372cf333baff203cdb"}}, {{@ipv6={@remote, @mcast2, [0xff000000, 0xffffff00, 0xffffffff, 0xff000000], [0x0, 0xff, 0xff000000, 0xffffff00], 'syzkaller0\x00', 'lo\x00', {}, {0xff}, 0x2b, 0x1, 0x2, 0x23}, 0x0, 0xf0, 0x130, 0x0, {}, [@common=@hl={0x28, 'hl\x00'}]}, @common=@inet=@TCPOPTSTRIP={0x40, 'TCPOPTSTRIP\x00', 0x0, {[0xe08d, 0x6, 0xff, 0x800, 0x2, 0x7, 0x3, 0x5]}}}, {{@uncond, 0x0, 0xf0, 0x118, 0x0, {}, [@common=@hl={0x28, 'hl\x00', 0x0, {0x3, 0x604}}]}, @common=@unspec=@STANDARD={0x28, '\x00', 0x0, 0xfffffffffffffffd}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x540) ioctl$EXT4_IOC_MIGRATE(0xffffffffffffffff, 0x6609) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000300)={0x0}, &(0x7f0000000400)=0xc) getsockopt$ARPT_SO_GET_INFO(r0, 0x0, 0x60, &(0x7f0000000740)={'filter\x00'}, &(0x7f00000007c0)=0x44) socket$can_raw(0x1d, 0x3, 0x1) r3 = getpgrp(r2) prlimit64(r3, 0x0, &(0x7f00000004c0)={0x0, 0x7ffffd}, &(0x7f00000002c0)) lremovexattr(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000480)=@random={'trusted.', 'bpf\x00'}) getsockopt$inet_sctp_SCTP_PR_ASSOC_STATUS(0xffffffffffffffff, 0x84, 0x73, &(0x7f0000000280)={0x0, 0x8, 0x0, 0xe0}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r4 = syz_open_dev$amidi(&(0x7f0000000100)='/dev/amidi#\x00', 0x2, 0x800) recvfrom(r4, &(0x7f0000000500)=""/96, 0x60, 0x20, &(0x7f00000005c0)=@ipx={0x4, 0x1, 0x6, "6b183128f377"}, 0x80) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) openat$vhci(0xffffffffffffff9c, &(0x7f0000000800)='/dev/vhci\x00', 0x602080, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000200)='./file0\x00', 0x700, 0x0, &(0x7f00000024c0), 0x100032, &(0x7f00000000c0)=ANY=[@ANYBLOB]) prctl$PR_MPX_ENABLE_MANAGEMENT(0x2b) getsockopt$inet_dccp_int(0xffffffffffffffff, 0x21, 0xf, &(0x7f0000000240), 0x0) fstat(0xffffffffffffffff, &(0x7f00000006c0)) getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, &(0x7f0000000440)={0x0, 0x80}, &(0x7f00000001c0)=0xfffffffffffffd3f) ioctl$FICLONE(r1, 0x40049409, r4) syz_open_dev$sndpcmc(&(0x7f0000000840)='/dev/snd/pcmC#D#c\x00', 0x4, 0x80) setgroups(0x3, &(0x7f0000000340)=[0x0, 0x0, 0x0]) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) ioctl$VIDIOC_ENUM_FRAMESIZES(r4, 0xc02c564a, &(0x7f0000000680)={0x101, 0x777b5f5f, 0x3, @discrete={0x7, 0x1}}) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, 0x0) syz_open_dev$vivid(&(0x7f0000000880)='/dev/video#\x00', 0x0, 0x2) 14:18:56 executing program 4: r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/expire_quiescent_template\x00', 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000140)=@security={'security\x00', 0xe, 0x4, 0x4b8, 0x1f0, 0x320, 0x0, 0x320, 0x320, 0x438, 0x438, 0x438, 0x438, 0x438, 0x4, &(0x7f0000000100), {[{{@ipv6={@local, @local, [0x0, 0x0, 0xffffffff, 0xffffff00], [0xffffffff, 0xff, 0xffffffff, 0xff], 'eql\x00', 'gretap0\x00', {}, {0xff}, 0x0, 0x7fffffff, 0x2, 0x61}, 0x0, 0x188, 0x1c8, 0x0, {}, [@common=@unspec=@conntrack2={0xc0, 'conntrack\x00', 0x2, {{@ipv4=@loopback, [0xffffffff, 0xffffffff, 0x0, 0xffffffff], @ipv4=@loopback, [0x0, 0xffffffff, 0xffffff00, 0xff000000], @ipv6=@ipv4={[], [], @remote}, [0xffffff00, 0xff000000, 0xff000000, 0xff], @ipv4=@multicast2, [0xffffffff, 0xff, 0xff0000ff], 0x3, 0x1ff, 0x4, 0x4e21, 0x4e20, 0x4e22, 0x4e20, 0x28}, 0x1c0, 0x98}}]}, @common=@unspec=@ERROR={0x40, 'ERROR\x00', 0x0, "f650bd5c77822a55c077a2b3078812467f4ab9fefc372cf333baff203cdb"}}, {{@ipv6={@remote, @mcast2, [0xff000000, 0xffffff00, 0xffffffff, 0xff000000], [0x0, 0xff, 0xff000000, 0xffffff00], 'syzkaller0\x00', 'lo\x00', {}, {}, 0x2b, 0x1, 0x2, 0x23}, 0x0, 0xc8, 0x108}, @common=@inet=@TCPOPTSTRIP={0x40, 'TCPOPTSTRIP\x00', 0x0, {[0xe08d, 0x6, 0xff, 0x800, 0x2, 0x7, 0x0, 0x5]}}}, {{@uncond, 0x0, 0xf0, 0x118, 0x0, {}, [@common=@hl={0x28, 'hl\x00', 0x0, {0x3, 0x604}}]}, @common=@unspec=@STANDARD={0x28, '\x00', 0x0, 0xfffffffffffffffd}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x518) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = getpgrp(0x0) prlimit64(r2, 0x0, &(0x7f00000004c0)={0x0, 0x7ffffd}, &(0x7f00000002c0)) getsockopt$inet_sctp_SCTP_PR_ASSOC_STATUS(0xffffffffffffffff, 0x84, 0x73, &(0x7f0000000280), 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r3 = syz_open_dev$amidi(&(0x7f0000000100)='/dev/amidi#\x00', 0x2, 0x800) recvfrom(0xffffffffffffffff, 0x0, 0x0, 0x20, &(0x7f00000005c0)=@ipx={0x4, 0x1, 0x6, "6b183128f377"}, 0x80) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000200)='./file0\x00', 0x700, 0x0, &(0x7f00000024c0), 0x100032, &(0x7f00000000c0)=ANY=[@ANYBLOB]) getsockopt$inet_dccp_int(0xffffffffffffffff, 0x21, 0xf, &(0x7f0000000240), 0x0) fstat(0xffffffffffffffff, &(0x7f00000006c0)) getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, &(0x7f0000000440)={0x0, 0x80}, &(0x7f00000001c0)=0xfffffffffffffd3f) ioctl$FICLONE(r1, 0x40049409, r3) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, 0x0) 14:18:56 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x3, &(0x7f0000001fd8)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x15}}, &(0x7f0000000080)="47504c049c3514bf772da07ae82e76590a36f6493ec1ab91b397e42abf1ea6cd8cd77427fc9a9e2b7165f52b4107bf0850d899dc52d013175ddb1b2f46203c2a05b722e33e556fb2e3f39a3cde1fca53640337ec956146bdbfcb115070195631de5d21a5ea9e638c2bdb78a501ca4b6ea313d82568f9382c2c3f6faba6b4ee54793b4ed26dae3e52225029bb2ac0007f77754c3f23ceda9809b9a9684a940abcaa8cfcc7133ec422e9c83888318d41e9a493f0195fe2599651b89504f5dba14625ce2366f33d95dba92f867279cabf4aceddc85a8af7a0fa68d767ce5136b9d0d1966c499cb6bf34c2988666970000000000000000000000", 0x29d6170000000000}, 0x48) 14:18:56 executing program 0: openat$kvm(0xffffffffffffff9c, &(0x7f0000000940)='/dev/kvm\x00', 0x0, 0x0) r0 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) r1 = ioctl$KVM_CREATE_VCPU(r0, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r0, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r1, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x48, 0x0, 0x0) syz_mount_image$bfs(&(0x7f0000000180)='bfs\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r1, 0xae80, 0x0) 14:18:56 executing program 3: r0 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x182) r1 = memfd_create(&(0x7f0000000100)="74086e750000000000000000008c00", 0x0) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$EVIOCSMASK(r3, 0x40104593, &(0x7f0000000040)={0x0, 0x58, &(0x7f0000000500)="051f7b5b96d5cb2442f492cc054b92ff9964e8655dd3009ac416e62eef98816dd722c07d5fb2c63e7990e73f58ec30eb2d752594d2c54ebc54adf12e23722f41f8d4c29d7c510665ec7f4bfc671450cfbc0b309721383fd9"}) write(r3, &(0x7f00000001c0), 0xfffffef3) getsockopt$inet_buf(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000380)=""/240, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000140), &(0x7f0000001740)=0xc) ioctl$KIOCSOUND(r1, 0x4b2f, 0x8) pwritev(r1, &(0x7f0000000080)=[{&(0x7f00000007c0)="336057b2b31594a7a0c1da89bab1ee5bbd914088c63425070bba47fca4c1fdd3927e7bda1f76b90dd4a331ebf02b2d99da0652bd6cbd1b849144ddb27cb2408706ad76618c6d53edde7f1ebe16cfaf19b29cb8cab83ffdef2e55fe00d5fc3f94377332f7b2b065997a830243c8e2249576a01b51f0d5f1f35eb63001901291575b45cdba9c841b0bab4b334bb6b6667e24efea1084478dc7b9b7bada3bd27880cdc5c722b26f11f9ef8b1beeb6ac9a71f843ce40c81207b6b41608fef28fdead2077e0fdfb977bb3fd790db1e5a3adbcfc572de583cbc17f", 0xd8}], 0x1, 0x81805) setsockopt$IP_VS_SO_SET_EDIT(r2, 0x0, 0x483, &(0x7f0000000780)={0x40070, @local, 0x4e20, 0x1, 'none\x00', 0x20, 0x200, 0x7b}, 0x2c) sendfile(r0, r0, &(0x7f0000000000), 0x2000005) ioctl$LOOP_CLR_FD(r0, 0x4c01) ioctl$TUNDETACHFILTER(r1, 0x401054d6, 0x0) ioctl$LOOP_SET_FD(r0, 0x4c00, r1) 14:18:56 executing program 2: getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) syz_mount_image$hfs(&(0x7f0000000200)='hfs\x00', &(0x7f0000000280)='./file0\x00', 0x74000000, 0x0, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 14:18:56 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x3, &(0x7f0000001fd8)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x15}}, &(0x7f0000000080)="47504c049c3514bf772da07ae82e76590a36f6493ec1ab91b397e42abf1ea6cd8cd77427fc9a9e2b7165f52b4107bf0850d899dc52d013175ddb1b2f46203c2a05b722e33e556fb2e3f39a3cde1fca53640337ec956146bdbfcb115070195631de5d21a5ea9e638c2bdb78a501ca4b6ea313d82568f9382c2c3f6faba6b4ee54793b4ed26dae3e52225029bb2ac0007f77754c3f23ceda9809b9a9684a940abcaa8cfcc7133ec422e9c83888318d41e9a493f0195fe2599651b89504f5dba14625ce2366f33d95dba92f867279cabf4aceddc85a8af7a0fa68d767ce5136b9d0d1966c499cb6bf34c2988666970000000000000000000000", 0x8a42180000000000}, 0x48) [ 2721.788685] EXT4-fs: 7 callbacks suppressed [ 2721.788733] EXT4-fs (sda1): re-mounted. Opts: [ 2721.795503] hfs: can't find a HFS filesystem on dev loop2 14:18:56 executing program 0: openat$kvm(0xffffffffffffff9c, &(0x7f0000000940)='/dev/kvm\x00', 0x0, 0x0) r0 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) r1 = ioctl$KVM_CREATE_VCPU(r0, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r0, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r1, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x48, 0x0, 0x0) syz_mount_image$bfs(&(0x7f0000000180)='bfs\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r1, 0xae80, 0x0) 14:18:56 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x3, &(0x7f0000001fd8)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x15}}, &(0x7f0000000080)="47504c049c3514bf772da07ae82e76590a36f6493ec1ab91b397e42abf1ea6cd8cd77427fc9a9e2b7165f52b4107bf0850d899dc52d013175ddb1b2f46203c2a05b722e33e556fb2e3f39a3cde1fca53640337ec956146bdbfcb115070195631de5d21a5ea9e638c2bdb78a501ca4b6ea313d82568f9382c2c3f6faba6b4ee54793b4ed26dae3e52225029bb2ac0007f77754c3f23ceda9809b9a9684a940abcaa8cfcc7133ec422e9c83888318d41e9a493f0195fe2599651b89504f5dba14625ce2366f33d95dba92f867279cabf4aceddc85a8af7a0fa68d767ce5136b9d0d1966c499cb6bf34c2988666970000000000000000000000", 0x80ffff00000000}, 0x48) 14:18:56 executing program 2: getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) syz_mount_image$hfs(&(0x7f0000000200)='hfs\x00', &(0x7f0000000280)='./file0\x00', 0x830e, 0x0, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 14:18:56 executing program 4: r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/expire_quiescent_template\x00', 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000140)=@security={'security\x00', 0xe, 0x4, 0x4b8, 0x1f0, 0x320, 0x0, 0x320, 0x320, 0x438, 0x438, 0x438, 0x438, 0x438, 0x4, &(0x7f0000000100), {[{{@ipv6={@local, @local, [0x0, 0x0, 0xffffffff, 0xffffff00], [0xffffffff, 0xff, 0xffffffff, 0xff], 'eql\x00', 'gretap0\x00', {}, {0xff}, 0x0, 0x7fffffff, 0x2, 0x61}, 0x0, 0x188, 0x1c8, 0x0, {}, [@common=@unspec=@conntrack2={0xc0, 'conntrack\x00', 0x2, {{@ipv4=@loopback, [0xffffffff, 0xffffffff, 0x0, 0xffffffff], @ipv4=@loopback, [0x0, 0xffffffff, 0xffffff00, 0xff000000], @ipv6=@ipv4={[], [], @remote}, [0xffffff00, 0xff000000, 0xff000000, 0xff], @ipv4=@multicast2, [0xffffffff, 0xff, 0xff0000ff], 0x3, 0x1ff, 0x4, 0x4e21, 0x4e20, 0x4e22, 0x4e20, 0x28}, 0x1c0, 0x98}}]}, @common=@unspec=@ERROR={0x40, 'ERROR\x00', 0x0, "f650bd5c77822a55c077a2b3078812467f4ab9fefc372cf333baff203cdb"}}, {{@ipv6={@remote, @mcast2, [0xff000000, 0xffffff00, 0xffffffff, 0xff000000], [0x0, 0xff, 0xff000000, 0xffffff00], 'syzkaller0\x00', 'lo\x00', {}, {}, 0x2b, 0x1, 0x2, 0x23}, 0x0, 0xc8, 0x108}, @common=@inet=@TCPOPTSTRIP={0x40, 'TCPOPTSTRIP\x00', 0x0, {[0xe08d, 0x6, 0xff, 0x800, 0x2, 0x7, 0x0, 0x5]}}}, {{@uncond, 0x0, 0xf0, 0x118, 0x0, {}, [@common=@hl={0x28, 'hl\x00', 0x0, {0x3, 0x604}}]}, @common=@unspec=@STANDARD={0x28, '\x00', 0x0, 0xfffffffffffffffd}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x518) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = getpgrp(0x0) prlimit64(r2, 0x0, &(0x7f00000004c0)={0x0, 0x7ffffd}, &(0x7f00000002c0)) lremovexattr(0x0, &(0x7f0000000800)=ANY=[@ANYBLOB="747275737465642e627066007f9fe3bf510f4f9623d45bb78f29b7bec8a796d692e828a27f5bc7a5b1dd5adf0e2dd55b5bc89c6c29669fcf5009763d59461541d411dbfca78283e7b0e512cb2737513b3a74e6cc8cfe915f93c2558b96a8b790cb60839c5cd1097e5c9149341f74ed02f9049a76effe2d54c6930d797b328c9b215950cb4a4a162bc6aaab26dc931ca032f56cfa1cd9a062c5a9417c10791ee88b01e1ac4e8ed281473a9580ac5a7b3e02d0db6cc7"]) getsockopt$inet_sctp_SCTP_PR_ASSOC_STATUS(0xffffffffffffffff, 0x84, 0x73, &(0x7f0000000280), 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r3 = syz_open_dev$amidi(&(0x7f0000000100)='/dev/amidi#\x00', 0x2, 0x800) recvfrom(0xffffffffffffffff, 0x0, 0x0, 0x20, &(0x7f00000005c0)=@ipx={0x4, 0x1, 0x6, "6b183128f377"}, 0x80) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) ptrace$setsig(0x4203, r2, 0x6, &(0x7f00000007c0)={0x36, 0x3, 0x101, 0x8}) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000200)='./file0\x00', 0x700, 0x0, &(0x7f00000024c0), 0x100032, &(0x7f0000000740)=ANY=[@ANYBLOB="ce92aceb40a32e9f1024819b72d1ed2b56737a9ef44b52e81327ada7c34497c2c0ab3b885a4fdc589bd5b1e7af89c39e33d55e1668843fef499f1bd900251cfca85844d73fe98ad3ea"]) getsockopt$inet_dccp_int(0xffffffffffffffff, 0x21, 0xf, &(0x7f0000000240), 0x0) getsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r3, 0x84, 0x8, &(0x7f00000008c0), &(0x7f0000000900)=0x4) fstat(0xffffffffffffffff, &(0x7f00000006c0)) getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, &(0x7f0000000440)={0x0, 0x80}, &(0x7f00000001c0)=0xfffffffffffffd3f) ioctl$FICLONE(r1, 0x40049409, r3) mkdir(&(0x7f0000000680)='./file0\x00', 0x2050) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, 0x0) 14:18:57 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000940)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x48, 0x0, 0x0) syz_mount_image$bfs(&(0x7f0000000180)='bfs\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) [ 2722.111634] hfs: can't find a HFS filesystem on dev loop2 [ 2722.180685] hfs: can't find a HFS filesystem on dev loop2 [ 2722.325325] EXT4-fs (sda1): Unrecognized mount option "Β@.$r+VszKR'D;ZOXձ築Þ3^h?I" or missing value [ 2722.471452] EXT4-fs (sda1): Unrecognized mount option "./file0" or missing value [ 2722.510404] EXT4-fs (sda1): Unrecognized mount option "Β@.$r+VszKR'D;ZOXձ築Þ3^h?I" or missing value 14:18:58 executing program 1: r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/expire_quiescent_template\x00', 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000140)=@security={'security\x00', 0xe, 0x4, 0x4e0, 0x1f0, 0x320, 0x0, 0x320, 0x320, 0x438, 0x438, 0x438, 0x438, 0x438, 0x4, &(0x7f0000000100), {[{{@ipv6={@local, @local, [0x0, 0xffffff00, 0xffffffff, 0xffffff00], [0xffffffff, 0xff, 0xffffffff, 0xff], 'eql\x00', 'gretap0\x00', {}, {0xff}, 0x0, 0x7fffffff, 0x2, 0x61}, 0x0, 0x188, 0x1c8, 0x0, {}, [@common=@unspec=@conntrack2={0xc0, 'conntrack\x00', 0x2, {{@ipv4=@loopback, [0xffffffff, 0xffffffff, 0x0, 0xffffffff], @ipv4=@loopback, [0x0, 0xffffffff, 0xffffff00, 0xff000000], @ipv6=@ipv4={[], [], @remote}, [0xffffff00, 0xff000000, 0xff000000, 0xff], @ipv4=@multicast2, [0xffffffff, 0xff, 0xff0000ff], 0x3, 0x1ff, 0x4, 0x4e21, 0x4e20, 0x4e22, 0x4e20, 0x28, 0x20}, 0x1c0, 0x98}}]}, @common=@unspec=@ERROR={0x40, 'ERROR\x00', 0x0, "f650bd5c77822a55c077a2b3078812467f4ab9fefc372cf333baff203cdb"}}, {{@ipv6={@remote, @mcast2, [0xff000000, 0xffffff00, 0xffffffff, 0xff000000], [0x0, 0xff, 0xff000000, 0xffffff00], 'syzkaller0\x00', 'lo\x00', {}, {0xff}, 0x2b, 0x1, 0x2, 0x23}, 0x0, 0xf0, 0x130, 0x0, {}, [@common=@hl={0x28, 'hl\x00'}]}, @common=@inet=@TCPOPTSTRIP={0x40, 'TCPOPTSTRIP\x00', 0x0, {[0xe08d, 0x6, 0xff, 0x800, 0x2, 0x7, 0x3, 0x5]}}}, {{@uncond, 0x0, 0xf0, 0x118, 0x0, {}, [@common=@hl={0x28, 'hl\x00', 0x0, {0x3, 0x604}}]}, @common=@unspec=@STANDARD={0x28, '\x00', 0x0, 0xfffffffffffffffd}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x540) ioctl$EXT4_IOC_MIGRATE(0xffffffffffffffff, 0x6609) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000300)={0x0}, &(0x7f0000000400)=0xc) getsockopt$ARPT_SO_GET_INFO(r0, 0x0, 0x60, &(0x7f0000000740)={'filter\x00'}, &(0x7f00000007c0)=0x44) r3 = getpgrp(r2) prlimit64(r3, 0x0, &(0x7f00000004c0)={0x0, 0x7ffffd}, &(0x7f00000002c0)) lremovexattr(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000480)=@random={'trusted.', 'bpf\x00'}) getsockopt$inet_sctp_SCTP_PR_ASSOC_STATUS(0xffffffffffffffff, 0x84, 0x73, &(0x7f0000000280)={0x0, 0x8, 0x0, 0xe0}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r4 = syz_open_dev$amidi(&(0x7f0000000100)='/dev/amidi#\x00', 0x2, 0x800) recvfrom(r4, &(0x7f0000000500)=""/96, 0x60, 0x20, &(0x7f00000005c0)=@ipx={0x4, 0x1, 0x6, "6b183128f377"}, 0x80) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000200)='./file0\x00', 0x700, 0x0, &(0x7f00000024c0), 0x100032, &(0x7f00000000c0)=ANY=[@ANYBLOB]) getsockopt$inet_dccp_int(0xffffffffffffffff, 0x21, 0xf, &(0x7f0000000240), 0x0) fstat(0xffffffffffffffff, &(0x7f00000006c0)) getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, &(0x7f0000000440)={0x0, 0x80}, &(0x7f00000001c0)=0xfffffffffffffd3f) ioctl$FICLONE(r1, 0x40049409, r4) setgroups(0x3, &(0x7f0000000340)=[0x0, 0x0, 0x0]) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, 0x0) 14:18:58 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x3, &(0x7f0000001fd8)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x15}}, &(0x7f0000000080)="47504c049c3514bf772da07ae82e76590a36f6493ec1ab91b397e42abf1ea6cd8cd77427fc9a9e2b7165f52b4107bf0850d899dc52d013175ddb1b2f46203c2a05b722e33e556fb2e3f39a3cde1fca53640337ec956146bdbfcb115070195631de5d21a5ea9e638c2bdb78a501ca4b6ea313d82568f9382c2c3f6faba6b4ee54793b4ed26dae3e52225029bb2ac0007f77754c3f23ceda9809b9a9684a940abcaa8cfcc7133ec422e9c83888318d41e9a493f0195fe2599651b89504f5dba14625ce2366f33d95dba92f867279cabf4aceddc85a8af7a0fa68d767ce5136b9d0d1966c499cb6bf34c2988666970000000000000000000000", 0x80ffffff}, 0x48) 14:18:58 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000940)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x48, 0x0, 0x0) syz_mount_image$bfs(&(0x7f0000000180)='bfs\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 14:18:58 executing program 2: getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) syz_mount_image$hfs(&(0x7f0000000200)='hfs\x00', &(0x7f0000000280)='./file0\x00', 0x8e03, 0x0, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 14:18:58 executing program 4: r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/expire_quiescent_template\x00', 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000140)=@security={'security\x00', 0xe, 0x4, 0x4b8, 0x1f0, 0x320, 0x0, 0x320, 0x320, 0x438, 0x438, 0x438, 0x438, 0x438, 0x4, &(0x7f0000000100), {[{{@ipv6={@local, @local, [0x0, 0x0, 0xffffffff, 0xffffff00], [0xffffffff, 0xff, 0xffffffff, 0xff], 'eql\x00', 'gretap0\x00', {}, {0xff}, 0x0, 0x7fffffff, 0x2, 0x61}, 0x0, 0x188, 0x1c8, 0x0, {}, [@common=@unspec=@conntrack2={0xc0, 'conntrack\x00', 0x2, {{@ipv4=@loopback, [0xffffffff, 0xffffffff, 0x0, 0xffffffff], @ipv4=@loopback, [0x0, 0xffffffff, 0xffffff00, 0xff000000], @ipv6=@ipv4={[], [], @remote}, [0xffffff00, 0xff000000, 0xff000000, 0xff], @ipv4=@multicast2, [0xffffffff, 0xff, 0xff0000ff], 0x3, 0x1ff, 0x4, 0x4e21, 0x4e20, 0x4e22, 0x4e20, 0x28}, 0x1c0, 0x98}}]}, @common=@unspec=@ERROR={0x40, 'ERROR\x00', 0x0, "f650bd5c77822a55c077a2b3078812467f4ab9fefc372cf333baff203cdb"}}, {{@ipv6={@remote, @mcast2, [0xff000000, 0xffffff00, 0xffffffff, 0xff000000], [0x0, 0xff, 0xff000000, 0xffffff00], 'syzkaller0\x00', 'lo\x00', {}, {}, 0x2b, 0x1, 0x2, 0x23}, 0x0, 0xc8, 0x108}, @common=@inet=@TCPOPTSTRIP={0x40, 'TCPOPTSTRIP\x00', 0x0, {[0xe08d, 0x6, 0xff, 0x800, 0x2, 0x7, 0x0, 0x5]}}}, {{@uncond, 0x0, 0xf0, 0x118, 0x0, {}, [@common=@hl={0x28, 'hl\x00', 0x0, {0x3, 0x604}}]}, @common=@unspec=@STANDARD={0x28, '\x00', 0x0, 0xfffffffffffffffd}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x518) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = getpgrp(0x0) prlimit64(r2, 0x0, &(0x7f00000004c0)={0x0, 0x7ffffd}, &(0x7f00000002c0)) lremovexattr(0x0, &(0x7f0000000480)=@random={'trusted.', 'bpf\x00'}) getsockopt$inet_sctp_SCTP_PR_ASSOC_STATUS(0xffffffffffffffff, 0x84, 0x73, &(0x7f0000000280), 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r3 = syz_open_dev$amidi(&(0x7f0000000100)='/dev/amidi#\x00', 0x2, 0x800) recvfrom(0xffffffffffffffff, 0x0, 0x0, 0x20, &(0x7f00000005c0)=@ipx={0x4, 0x1, 0x6, "6b183128f377"}, 0x80) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000200)='./file0\x00', 0x700, 0x0, &(0x7f00000024c0), 0x100032, &(0x7f00000000c0)=ANY=[@ANYBLOB]) getsockopt$inet_dccp_int(0xffffffffffffffff, 0x21, 0x13, &(0x7f0000000240), 0x0) getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, &(0x7f0000000440)={0x0, 0x80}, &(0x7f00000001c0)=0xfffffffffffffd3f) ioctl$FICLONE(r1, 0x40049409, r3) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000680)='./file1\x00', 0x0, 0x0, 0x0, 0x400, 0x0) 14:18:58 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x6}, 0x1c) connect$inet6(r0, &(0x7f0000000800)={0xa, 0x4e21, 0x0, @ipv4={[], [], @local}}, 0x1c) sendmmsg(r0, &(0x7f0000007e00), 0x26e, 0x0) sendmmsg(r0, &(0x7f000000ac80), 0x400000000000302, 0x4008800) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 14:18:59 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x3, &(0x7f0000001fd8)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x15}}, &(0x7f0000000080)="47504c049c3514bf772da07ae82e76590a36f6493ec1ab91b397e42abf1ea6cd8cd77427fc9a9e2b7165f52b4107bf0850d899dc52d013175ddb1b2f46203c2a05b722e33e556fb2e3f39a3cde1fca53640337ec956146bdbfcb115070195631de5d21a5ea9e638c2bdb78a501ca4b6ea313d82568f9382c2c3f6faba6b4ee54793b4ed26dae3e52225029bb2ac0007f77754c3f23ceda9809b9a9684a940abcaa8cfcc7133ec422e9c83888318d41e9a493f0195fe2599651b89504f5dba14625ce2366f33d95dba92f867279cabf4aceddc85a8af7a0fa68d767ce5136b9d0d1966c499cb6bf34c2988666970000000000000000000000", 0xa00}, 0x48) [ 2724.152433] EXT4-fs (sda1): re-mounted. Opts: ,errors=continue [ 2724.153622] hfs: can't find a HFS filesystem on dev loop2 14:18:59 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000940)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x48, 0x0, 0x0) syz_mount_image$bfs(&(0x7f0000000180)='bfs\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) [ 2724.302742] hfs: can't find a HFS filesystem on dev loop2 14:18:59 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x3, &(0x7f0000001fd8)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x15}}, &(0x7f0000000080)="47504c049c3514bf772da07ae82e76590a36f6493ec1ab91b397e42abf1ea6cd8cd77427fc9a9e2b7165f52b4107bf0850d899dc52d013175ddb1b2f46203c2a05b722e33e556fb2e3f39a3cde1fca53640337ec956146bdbfcb115070195631de5d21a5ea9e638c2bdb78a501ca4b6ea313d82568f9382c2c3f6faba6b4ee54793b4ed26dae3e52225029bb2ac0007f77754c3f23ceda9809b9a9684a940abcaa8cfcc7133ec422e9c83888318d41e9a493f0195fe2599651b89504f5dba14625ce2366f33d95dba92f867279cabf4aceddc85a8af7a0fa68d767ce5136b9d0d1966c499cb6bf34c2988666970000000000000000000000", 0xffffffe4}, 0x48) 14:18:59 executing program 2: getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) syz_mount_image$hfs(&(0x7f0000000200)='hfs\x00', &(0x7f0000000280)='./file0\x00', 0x2, 0x0, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 14:18:59 executing program 4: r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/expire_quiescent_template\x00', 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000140)=@security={'security\x00', 0xe, 0x4, 0x4b8, 0x1f0, 0x320, 0x0, 0x320, 0x320, 0x438, 0x438, 0x438, 0x438, 0x438, 0x4, &(0x7f0000000100), {[{{@ipv6={@local, @local, [0x0, 0x0, 0xffffffff, 0xffffff00], [0xffffffff, 0xff, 0xffffffff, 0xff], 'eql\x00', 'gretap0\x00', {}, {0xff}, 0x0, 0x7fffffff, 0x2, 0x61}, 0x0, 0x188, 0x1c8, 0x0, {}, [@common=@unspec=@conntrack2={0xc0, 'conntrack\x00', 0x2, {{@ipv4=@loopback, [0xffffffff, 0xffffffff, 0x0, 0xffffffff], @ipv4=@loopback, [0x0, 0xffffffff, 0xffffff00, 0xff000000], @ipv6=@ipv4={[], [], @remote}, [0xffffff00, 0xff000000, 0xff000000, 0xff], @ipv4=@multicast2, [0xffffffff, 0xff, 0xff0000ff], 0x3, 0x1ff, 0x4, 0x4e21, 0x4e20, 0x4e22, 0x4e20, 0x28}, 0x1c0, 0x98}}]}, @common=@unspec=@ERROR={0x40, 'ERROR\x00', 0x0, "f650bd5c77822a55c077a2b3078812467f4ab9fefc372cf333baff203cdb"}}, {{@ipv6={@remote, @mcast2, [0xff000000, 0xffffff00, 0xffffffff, 0xff000000], [0x0, 0xff, 0xff000000, 0xffffff00], 'syzkaller0\x00', 'lo\x00', {}, {}, 0x2b, 0x1, 0x2, 0x23}, 0x0, 0xc8, 0x108}, @common=@inet=@TCPOPTSTRIP={0x40, 'TCPOPTSTRIP\x00', 0x0, {[0xe08d, 0x6, 0xff, 0x800, 0x2, 0x7, 0x0, 0x5]}}}, {{@uncond, 0x0, 0xf0, 0x118, 0x0, {}, [@common=@hl={0x28, 'hl\x00', 0x0, {0x3, 0x604}}]}, @common=@unspec=@STANDARD={0x28, '\x00', 0x0, 0xfffffffffffffffd}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x518) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = getpgrp(0x0) prlimit64(r2, 0x0, &(0x7f00000004c0)={0x0, 0x7ffffd}, &(0x7f00000002c0)) lremovexattr(0x0, &(0x7f0000000480)=@random={'trusted.', 'bpf\x00'}) getsockopt$inet_sctp_SCTP_PR_ASSOC_STATUS(0xffffffffffffffff, 0x84, 0x73, &(0x7f0000000280), 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r3 = syz_open_dev$amidi(&(0x7f0000000100)='/dev/amidi#\x00', 0x2, 0x800) recvfrom(0xffffffffffffffff, 0x0, 0x0, 0x20, &(0x7f00000005c0)=@ipx={0x4, 0x1, 0x6, "6b183128f377"}, 0x80) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000680)='./file0\x00', 0x700, 0x0, &(0x7f00000024c0), 0x100032, &(0x7f0000000740)=ANY=[@ANYRES64=r3]) getsockopt$inet_dccp_int(0xffffffffffffffff, 0x21, 0xf, &(0x7f0000000240), 0x0) fstat(0xffffffffffffffff, &(0x7f00000006c0)) getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, &(0x7f0000000440)={0x0, 0x80}, &(0x7f00000001c0)=0xfffffffffffffd3f) ioctl$FICLONE(r1, 0x40049409, r3) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, 0x0) 14:18:59 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x3, &(0x7f0000001fd8)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x15}}, &(0x7f0000000080)="47504c049c3514bf772da07ae82e76590a36f6493ec1ab91b397e42abf1ea6cd8cd77427fc9a9e2b7165f52b4107bf0850d899dc52d013175ddb1b2f46203c2a05b722e33e556fb2e3f39a3cde1fca53640337ec956146bdbfcb115070195631de5d21a5ea9e638c2bdb78a501ca4b6ea313d82568f9382c2c3f6faba6b4ee54793b4ed26dae3e52225029bb2ac0007f77754c3f23ceda9809b9a9684a940abcaa8cfcc7133ec422e9c83888318d41e9a493f0195fe2599651b89504f5dba14625ce2366f33d95dba92f867279cabf4aceddc85a8af7a0fa68d767ce5136b9d0d1966c499cb6bf34c2988666970000000000000000000000", 0x40000000000000}, 0x48) [ 2724.679061] EXT4-fs (sda1): Unrecognized mount option "./file0" or missing value [ 2724.696260] hfs: can't find a HFS filesystem on dev loop2 14:18:59 executing program 1: r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/expire_quiescent_template\x00', 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000140)=@security={'security\x00', 0xe, 0x4, 0x4e0, 0x1f0, 0x320, 0x0, 0x320, 0x320, 0x438, 0x438, 0x438, 0x438, 0x438, 0x4, &(0x7f0000000100), {[{{@ipv6={@local, @local, [0x0, 0xffffff00, 0xffffffff, 0xffffff00], [0xffffffff, 0xff, 0xffffffff, 0xff], 'eql\x00', 'gretap0\x00', {}, {0xff}, 0x0, 0x7fffffff, 0x2, 0x61}, 0x0, 0x188, 0x1c8, 0x0, {}, [@common=@unspec=@conntrack2={0xc0, 'conntrack\x00', 0x2, {{@ipv4=@loopback, [0xffffffff, 0xffffffff, 0x0, 0xffffffff], @ipv4=@loopback, [0x0, 0xffffffff, 0xffffff00, 0xff000000], @ipv6=@ipv4={[], [], @remote}, [0xffffff00, 0xff000000, 0xff000000, 0xff], @ipv4=@multicast2, [0xffffffff, 0xff, 0xff0000ff], 0x3, 0x1ff, 0x4, 0x4e21, 0x4e20, 0x4e22, 0x4e20, 0x28, 0x20}, 0x1c0, 0x98}}]}, @common=@unspec=@ERROR={0x40, 'ERROR\x00', 0x0, "f650bd5c77822a55c077a2b3078812467f4ab9fefc372cf333baff203cdb"}}, {{@ipv6={@remote, @mcast2, [0xff000000, 0xffffff00, 0xffffffff, 0xff000000], [0x0, 0xff, 0xff000000, 0xffffff00], 'syzkaller0\x00', 'lo\x00', {}, {0xff}, 0x2b, 0x1, 0x2, 0x23}, 0x0, 0xf0, 0x130, 0x0, {}, [@common=@hl={0x28, 'hl\x00'}]}, @common=@inet=@TCPOPTSTRIP={0x40, 'TCPOPTSTRIP\x00', 0x0, {[0xe08d, 0x6, 0xff, 0x800, 0x2, 0x7, 0x3, 0x5]}}}, {{@uncond, 0x0, 0xf0, 0x118, 0x0, {}, [@common=@hl={0x28, 'hl\x00', 0x0, {0x3, 0x604}}]}, @common=@unspec=@STANDARD={0x28, '\x00', 0x0, 0xfffffffffffffffd}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x540) ioctl$EXT4_IOC_MIGRATE(0xffffffffffffffff, 0x6609) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000300)={0x0}, &(0x7f0000000400)=0xc) getsockopt$ARPT_SO_GET_INFO(r0, 0x0, 0x60, &(0x7f0000000740)={'filter\x00'}, &(0x7f00000007c0)=0x44) r3 = getpgrp(r2) prlimit64(r3, 0x0, &(0x7f00000004c0)={0x0, 0x7ffffd}, &(0x7f00000002c0)) lremovexattr(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000480)=@random={'trusted.', 'bpf\x00'}) getsockopt$inet_sctp_SCTP_PR_ASSOC_STATUS(0xffffffffffffffff, 0x84, 0x73, &(0x7f0000000280)={0x0, 0x8, 0x0, 0xe0}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r4 = syz_open_dev$amidi(&(0x7f0000000100)='/dev/amidi#\x00', 0x2, 0x800) recvfrom(r4, &(0x7f0000000500)=""/96, 0x60, 0x20, &(0x7f00000005c0)=@ipx={0x4, 0x1, 0x6, "6b183128f377"}, 0x80) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000200)='./file0\x00', 0x700, 0x0, &(0x7f00000024c0), 0x100032, &(0x7f00000000c0)=ANY=[@ANYBLOB]) prctl$PR_MPX_ENABLE_MANAGEMENT(0x2b) getsockopt$inet_dccp_int(0xffffffffffffffff, 0x21, 0xf, &(0x7f0000000240), 0x0) fstat(0xffffffffffffffff, &(0x7f00000006c0)) getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, &(0x7f0000000440)={0x0, 0x80}, &(0x7f00000001c0)=0xfffffffffffffd3f) ioctl$FICLONE(r1, 0x40049409, r4) setgroups(0x3, &(0x7f0000000340)=[0x0, 0x0, 0x0]) recvfrom$unix(r4, &(0x7f0000000800)=""/170, 0xaa, 0x1, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, 0x0) 14:18:59 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000940)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x48, 0x0, 0x0) syz_mount_image$bfs(&(0x7f0000000180)='bfs\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 14:18:59 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x3, &(0x7f0000001fd8)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x15}}, &(0x7f0000000080)="47504c049c3514bf772da07ae82e76590a36f6493ec1ab91b397e42abf1ea6cd8cd77427fc9a9e2b7165f52b4107bf0850d899dc52d013175ddb1b2f46203c2a05b722e33e556fb2e3f39a3cde1fca53640337ec956146bdbfcb115070195631de5d21a5ea9e638c2bdb78a501ca4b6ea313d82568f9382c2c3f6faba6b4ee54793b4ed26dae3e52225029bb2ac0007f77754c3f23ceda9809b9a9684a940abcaa8cfcc7133ec422e9c83888318d41e9a493f0195fe2599651b89504f5dba14625ce2366f33d95dba92f867279cabf4aceddc85a8af7a0fa68d767ce5136b9d0d1966c499cb6bf34c2988666970000000000000000000000", 0xa000000}, 0x48) [ 2724.820405] hfs: can't find a HFS filesystem on dev loop2 14:18:59 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x6}, 0x1c) connect$inet6(r0, &(0x7f0000000800)={0xa, 0x4e21, 0x0, @ipv4={[], [], @local}}, 0x1c) sendmmsg(r0, &(0x7f0000007e00), 0x26e, 0x0) sendmmsg(r0, &(0x7f000000ac80), 0x400000000000302, 0x4008800) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 14:18:59 executing program 2: getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) syz_mount_image$hfs(&(0x7f0000000200)='hfs\x00', &(0x7f0000000280)='./file0\x00', 0x700000000000000, 0x0, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 14:18:59 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x3, &(0x7f0000001fd8)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x15}}, &(0x7f0000000080)="47504c049c3514bf772da07ae82e76590a36f6493ec1ab91b397e42abf1ea6cd8cd77427fc9a9e2b7165f52b4107bf0850d899dc52d013175ddb1b2f46203c2a05b722e33e556fb2e3f39a3cde1fca53640337ec956146bdbfcb115070195631de5d21a5ea9e638c2bdb78a501ca4b6ea313d82568f9382c2c3f6faba6b4ee54793b4ed26dae3e52225029bb2ac0007f77754c3f23ceda9809b9a9684a940abcaa8cfcc7133ec422e9c83888318d41e9a493f0195fe2599651b89504f5dba14625ce2366f33d95dba92f867279cabf4aceddc85a8af7a0fa68d767ce5136b9d0d1966c499cb6bf34c2988666970000000000000000000000", 0x4000000}, 0x48) [ 2724.925847] EXT4-fs (sda1): Unrecognized mount option "" or missing value [ 2725.121624] hfs: can't find a HFS filesystem on dev loop2 [ 2725.124009] EXT4-fs (sda1): Unrecognized mount option "" or missing value 14:19:00 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000940)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x48, 0x0, 0x0) syz_mount_image$bfs(&(0x7f0000000180)='bfs\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 14:19:00 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x3, &(0x7f0000001fd8)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x15}}, &(0x7f0000000080)="47504c049c3514bf772da07ae82e76590a36f6493ec1ab91b397e42abf1ea6cd8cd77427fc9a9e2b7165f52b4107bf0850d899dc52d013175ddb1b2f46203c2a05b722e33e556fb2e3f39a3cde1fca53640337ec956146bdbfcb115070195631de5d21a5ea9e638c2bdb78a501ca4b6ea313d82568f9382c2c3f6faba6b4ee54793b4ed26dae3e52225029bb2ac0007f77754c3f23ceda9809b9a9684a940abcaa8cfcc7133ec422e9c83888318d41e9a493f0195fe2599651b89504f5dba14625ce2366f33d95dba92f867279cabf4aceddc85a8af7a0fa68d767ce5136b9d0d1966c499cb6bf34c2988666970000000000000000000000", 0x7000000}, 0x48) 14:19:00 executing program 2: getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) syz_mount_image$hfs(&(0x7f0000000200)='hfs\x00', &(0x7f0000000280)='./file0\x00', 0x100000000000000, 0x0, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 14:19:00 executing program 4: r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/expire_quiescent_template\x00', 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000140)=ANY=[@ANYBLOB="73656375726974790000000000000000000000000000000000000000000000000e00000004007cf17bd42c2aff2c00002003000000000000200300002052421fd79f45e70c041dfd208037dfe5c900003804000004000000", @ANYPTR=&(0x7f0000000100)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00'], @ANYBLOB="fe8000000000000000000000000000aafe8000000000000000000000000000aa0000000000000000ffffffffffffff00ffffffff000000ffffffffff000000ff65716c0000000000000000000000000067726574617030000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ff000000000000000000000000000000000000ff02610000000000000000000000000000008801c801000000000000000000000000000000000000000000000000c000636f6e6e747261636b0000000000000000000000000000000000000000027f000001000000000000000000000000ffffffffffffffff00000000ffffffff7f00000100000000000000000000000000000000ffffffffffffff00ff00000000000000000000000000ffffac1414bbffffff00ff000000ff000000000000ffe0000002000000000000000000000000ffffffff000000ffff0000ff0000000003000000ff01000004004e214e204e224e20280000000000c00198000000000040004552524f5200000000000000000000000000000000000000000000000000f650bd5c77822a55c077a2b3078812467f4ab9fefc372cf333baff203cdb0000fe8000000000000000000000000000bbff020000000000000000000000000001ff000000ffffff00ffffffffff00000000000000000000ffff000000ffffff0073797a6b616c6c6572300000000000006c6f000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002b00010223000000000000000000000000000000c800080100000000000000000000000000000000000000000000000040005443504f50545354524950000000000000000000000000000000000000008de0000006000000ff000000000800000200000007000000000000000500000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f00018010000000000000000000000000000000000000000000000002800686c0000000000000000000000000000000000000000000000000000000003040000000000002800000000000000000000000000000000000000000000000000000000000000fdffffff000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a800d0000000000000000000000000000000000000000000000000002800000000000000000000000000000000000000000000000000000000000000feffffff00000000"], 0x518) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = getpgrp(0x0) prlimit64(r2, 0x0, &(0x7f00000004c0)={0x0, 0x7ffffd}, &(0x7f00000002c0)) lremovexattr(0x0, &(0x7f0000000480)=@random={'trusted.', 'bpf\x00'}) getsockopt$inet_sctp_SCTP_PR_ASSOC_STATUS(0xffffffffffffffff, 0x84, 0x73, &(0x7f0000000280), 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r3 = syz_open_dev$amidi(&(0x7f0000000100)='/dev/amidi#\x00', 0x2, 0x800) recvfrom(0xffffffffffffffff, 0x0, 0x0, 0x20, &(0x7f00000005c0)=@ipx={0x4, 0x1, 0x6, "6b183128f377"}, 0x80) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000880)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000840), 0x111, 0x9}}, 0x20) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000200)='./file0\x00', 0x700, 0x0, &(0x7f00000024c0), 0x100032, &(0x7f00000000c0)=ANY=[@ANYBLOB]) getsockopt$inet_dccp_int(0xffffffffffffffff, 0x21, 0xf, &(0x7f0000000240), 0x0) getsockopt$inet_sctp_SCTP_EVENTS(r3, 0x84, 0xb, &(0x7f00000006c0), &(0x7f0000000700)=0xb) chmod(&(0x7f0000000800)='./file1\x00', 0x20) fstat(0xffffffffffffffff, &(0x7f0000000940)) getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, &(0x7f0000000440)={0x0, 0x80}, &(0x7f00000001c0)=0xfffffffffffffd3f) ioctl$FICLONE(r1, 0x40049409, r3) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000680)={r3, 0x50, &(0x7f0000000740)={0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000007c0)=r4, 0x4) openat$dlm_control(0xffffffffffffff9c, &(0x7f00000008c0)='/dev/dlm-control\x00', 0x880, 0x0) [ 2725.353193] EXT4-fs (sda1): re-mounted. Opts: [ 2725.439786] hfs: can't find a HFS filesystem on dev loop2 [ 2725.464443] EXT4-fs (sda1): Unrecognized mount option "./file0" or missing value 14:19:00 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x3, &(0x7f0000001fd8)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x15}}, &(0x7f0000000080)="47504c049c3514bf772da07ae82e76590a36f6493ec1ab91b397e42abf1ea6cd8cd77427fc9a9e2b7165f52b4107bf0850d899dc52d013175ddb1b2f46203c2a05b722e33e556fb2e3f39a3cde1fca53640337ec956146bdbfcb115070195631de5d21a5ea9e638c2bdb78a501ca4b6ea313d82568f9382c2c3f6faba6b4ee54793b4ed26dae3e52225029bb2ac0007f77754c3f23ceda9809b9a9684a940abcaa8cfcc7133ec422e9c83888318d41e9a493f0195fe2599651b89504f5dba14625ce2366f33d95dba92f867279cabf4aceddc85a8af7a0fa68d767ce5136b9d0d1966c499cb6bf34c2988666970000000000000000000000", 0x700}, 0x48) 14:19:00 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000940)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$bfs(&(0x7f0000000180)='bfs\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 14:19:00 executing program 1: r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/expire_quiescent_template\x00', 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000140)=@security={'security\x00', 0xe, 0x4, 0x4e0, 0x1f0, 0x320, 0x0, 0x320, 0x320, 0x438, 0x438, 0x438, 0x438, 0x438, 0x4, &(0x7f0000000100), {[{{@ipv6={@local, @local, [0x0, 0xffffff00, 0xffffffff, 0xffffff00], [0xffffffff, 0xff, 0xffffffff, 0xff], 'eql\x00', 'gretap0\x00', {}, {0xff}, 0x0, 0x7fffffff, 0x2, 0x61}, 0x0, 0x188, 0x1c8, 0x0, {}, [@common=@unspec=@conntrack2={0xc0, 'conntrack\x00', 0x2, {{@ipv4=@loopback, [0xffffffff, 0xffffffff, 0x0, 0xffffffff], @ipv4=@loopback, [0x0, 0xffffffff, 0xffffff00, 0xff000000], @ipv6=@ipv4={[], [], @remote}, [0xffffff00, 0xff000000, 0xff000000, 0xff], @ipv4=@multicast2, [0xffffffff, 0xff, 0xff0000ff], 0x3, 0x1ff, 0x4, 0x4e21, 0x4e20, 0x4e22, 0x4e20, 0x28, 0x20}, 0x1c0, 0x98}}]}, @common=@unspec=@ERROR={0x40, 'ERROR\x00', 0x0, "f650bd5c77822a55c077a2b3078812467f4ab9fefc372cf333baff203cdb"}}, {{@ipv6={@remote, @mcast2, [0xff000000, 0xffffff00, 0xffffffff, 0xff000000], [0x0, 0xff, 0xff000000, 0xffffff00], 'syzkaller0\x00', 'lo\x00', {}, {0xff}, 0x2b, 0x1, 0x2, 0x23}, 0x0, 0xf0, 0x130, 0x0, {}, [@common=@hl={0x28, 'hl\x00'}]}, @common=@inet=@TCPOPTSTRIP={0x40, 'TCPOPTSTRIP\x00', 0x0, {[0xe08d, 0x6, 0xff, 0x800, 0x2, 0x7, 0x3, 0x5]}}}, {{@uncond, 0x0, 0xf0, 0x118, 0x0, {}, [@common=@hl={0x28, 'hl\x00', 0x0, {0x3, 0x604}}]}, @common=@unspec=@STANDARD={0x28, '\x00', 0x0, 0xfffffffffffffffd}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x540) ioctl$EXT4_IOC_MIGRATE(0xffffffffffffffff, 0x6609) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000300)={0x0}, &(0x7f0000000680)=0xc) getsockopt$ARPT_SO_GET_INFO(r0, 0x0, 0x60, &(0x7f0000000740)={'filter\x00'}, &(0x7f00000007c0)=0x44) r3 = getpgrp(r2) prlimit64(r3, 0x0, &(0x7f00000004c0)={0x0, 0x7ffffd}, &(0x7f00000002c0)) lremovexattr(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000480)=@random={'trusted.', 'bpf\x00'}) getsockopt$inet_sctp_SCTP_PR_ASSOC_STATUS(0xffffffffffffffff, 0x84, 0x73, &(0x7f0000000280)={0x0, 0x8, 0x0, 0xe0}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r4 = syz_open_dev$amidi(&(0x7f0000000100)='/dev/amidi#\x00', 0x2, 0x800) recvfrom(r4, &(0x7f0000000500)=""/96, 0x60, 0x20, &(0x7f00000005c0)=@ipx={0x4, 0x1, 0x6, "6b183128f377"}, 0x80) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000200)='./file0\x00', 0x700, 0x0, &(0x7f00000024c0), 0x100032, &(0x7f00000000c0)=ANY=[@ANYBLOB]) prctl$PR_MPX_ENABLE_MANAGEMENT(0x2b) getsockopt$inet_dccp_int(0xffffffffffffffff, 0x21, 0xf, &(0x7f0000000240), 0x0) fstat(0xffffffffffffffff, &(0x7f00000006c0)) getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, &(0x7f0000000440)={0x0, 0x80}, &(0x7f00000001c0)=0xfffffffffffffd3f) ioctl$FICLONE(r1, 0x40049409, r4) setgroups(0x3, &(0x7f0000000340)=[0x0, 0x0, 0x0]) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, 0x0) 14:19:00 executing program 2: getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) syz_mount_image$hfs(&(0x7f0000000200)='hfs\x00', &(0x7f0000000280)='./file0\x00', 0x60000000, 0x0, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 14:19:00 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x3, &(0x7f0000001fd8)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x15}}, &(0x7f0000000080)="47504c049c3514bf772da07ae82e76590a36f6493ec1ab91b397e42abf1ea6cd8cd77427fc9a9e2b7165f52b4107bf0850d899dc52d013175ddb1b2f46203c2a05b722e33e556fb2e3f39a3cde1fca53640337ec956146bdbfcb115070195631de5d21a5ea9e638c2bdb78a501ca4b6ea313d82568f9382c2c3f6faba6b4ee54793b4ed26dae3e52225029bb2ac0007f77754c3f23ceda9809b9a9684a940abcaa8cfcc7133ec422e9c83888318d41e9a493f0195fe2599651b89504f5dba14625ce2366f33d95dba92f867279cabf4aceddc85a8af7a0fa68d767ce5136b9d0d1966c499cb6bf34c2988666970000000000000000000000", 0x1000000000000}, 0x48) [ 2725.782901] hfs: can't find a HFS filesystem on dev loop2 [ 2725.860345] hfs: can't find a HFS filesystem on dev loop2 14:19:00 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = creat(&(0x7f00000000c0)='./bus\x00', 0x0) write$binfmt_misc(r1, &(0x7f0000000100)=ANY=[], 0xbe) truncate(&(0x7f0000000300)='./bus\x00', 0x100000) r2 = open(&(0x7f0000000000)='./bus\x00', 0x26884, 0x0) sendfile(r1, r2, 0x0, 0x8000fffffffe) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r1, 0x6612) 14:19:00 executing program 4: r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/expire_quiescent_template\x00', 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000140)=@security={'security\x00', 0xe, 0x4, 0x4b8, 0x1f0, 0x320, 0x0, 0x320, 0x320, 0x438, 0x438, 0x438, 0x438, 0x438, 0x4, &(0x7f0000000100), {[{{@ipv6={@local, @local, [0x0, 0x0, 0xffffffff, 0xffffff00], [0xffffffff, 0xff, 0xffffffff, 0xff], 'eql\x00', 'gretap0\x00', {}, {0xff}, 0x0, 0x7fffffff, 0x2, 0x61}, 0x0, 0x188, 0x1c8, 0x0, {}, [@common=@unspec=@conntrack2={0xc0, 'conntrack\x00', 0x2, {{@ipv4=@loopback, [0xffffffff, 0xffffffff, 0x0, 0xffffffff], @ipv4=@loopback, [0x0, 0xffffffff, 0xffffff00, 0xff000000], @ipv6=@ipv4={[], [], @remote}, [0xffffff00, 0xff000000, 0xff000000, 0xff], @ipv4=@multicast2, [0xffffffff, 0xff, 0xff0000ff], 0x3, 0x1ff, 0x4, 0x4e21, 0x4e20, 0x4e22, 0x4e20, 0x28}, 0x1c0, 0x98}}]}, @common=@unspec=@ERROR={0x40, 'ERROR\x00', 0x0, "f650bd5c77822a55c077a2b3078812467f4ab9fefc372cf333baff203cdb"}}, {{@ipv6={@remote, @mcast2, [0xff000000, 0xffffff00, 0xffffffff, 0xff000000], [0x0, 0xff, 0xff000000, 0xffffff00], 'syzkaller0\x00', 'lo\x00', {}, {}, 0x2b, 0x1, 0x2, 0x23}, 0x0, 0xc8, 0x108}, @common=@inet=@TCPOPTSTRIP={0x40, 'TCPOPTSTRIP\x00', 0x0, {[0xe08d, 0x6, 0xff, 0x800, 0x2, 0x7, 0x0, 0x5]}}}, {{@uncond, 0x0, 0xf0, 0x118, 0x0, {}, [@common=@hl={0x28, 'hl\x00', 0x0, {0x3, 0x604}}]}, @common=@unspec=@STANDARD={0x28, '\x00', 0x0, 0xfffffffffffffffd}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x518) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000007c0), &(0x7f0000000800)=0xc) getpid() fcntl$getownex(r1, 0x10, &(0x7f0000000840)) fcntl$getownex(r1, 0x10, &(0x7f0000000880)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000900)={0x0, r0, 0x0, 0x12, &(0x7f00000008c0)='/@L@selinuxloeth1\x00'}, 0x30) r3 = getpgrp(r2) prlimit64(r3, 0x0, &(0x7f00000004c0)={0x0, 0x7ffffd}, &(0x7f00000002c0)) lremovexattr(0x0, &(0x7f0000000480)=@random={'trusted.', 'bpf\x00'}) getsockopt$inet_sctp_SCTP_PR_ASSOC_STATUS(0xffffffffffffffff, 0x84, 0x73, &(0x7f0000000280), 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r4 = syz_open_dev$amidi(&(0x7f0000000100)='/dev/amidi#\x00', 0x2, 0x800) recvfrom(0xffffffffffffffff, 0x0, 0x0, 0x20, &(0x7f00000005c0)=@ipx={0x4, 0x1, 0x6, "6b183128f377"}, 0x80) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000200)='./file0\x00', 0x700, 0x0, &(0x7f00000024c0), 0x100032, &(0x7f00000000c0)=ANY=[@ANYBLOB]) getsockopt$inet_dccp_int(0xffffffffffffffff, 0x21, 0xf, &(0x7f0000000240), 0x0) fstat(0xffffffffffffffff, &(0x7f00000006c0)) getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, &(0x7f0000000440)={0x0, 0x80}, &(0x7f00000001c0)=0xfffffffffffffd3f) ioctl$FICLONE(r1, 0x40049409, r4) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) connect$bt_rfcomm(r4, &(0x7f0000000680)={0x1f, {0x2800000000, 0x0, 0x7, 0x1, 0xa9b, 0x8275}, 0x8a}, 0xa) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) renameat2(r0, &(0x7f0000000740)='./file0\x00', r0, &(0x7f0000000780)='./file0\x00', 0x2) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, 0x0) 14:19:01 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000940)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$bfs(&(0x7f0000000180)='bfs\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 14:19:01 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x3, &(0x7f0000001fd8)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x15}}, &(0x7f0000000080)="47504c049c3514bf772da07ae82e76590a36f6493ec1ab91b397e42abf1ea6cd8cd77427fc9a9e2b7165f52b4107bf0850d899dc52d013175ddb1b2f46203c2a05b722e33e556fb2e3f39a3cde1fca53640337ec956146bdbfcb115070195631de5d21a5ea9e638c2bdb78a501ca4b6ea313d82568f9382c2c3f6faba6b4ee54793b4ed26dae3e52225029bb2ac0007f77754c3f23ceda9809b9a9684a940abcaa8cfcc7133ec422e9c83888318d41e9a493f0195fe2599651b89504f5dba14625ce2366f33d95dba92f867279cabf4aceddc85a8af7a0fa68d767ce5136b9d0d1966c499cb6bf34c2988666970000000000000000000000", 0xe4ffffff}, 0x48) 14:19:01 executing program 2: getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) syz_mount_image$hfs(&(0x7f0000000200)='hfs\x00', &(0x7f0000000280)='./file0\x00', 0x2000000, 0x0, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 14:19:01 executing program 1: r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/expire_quiescent_template\x00', 0x2, 0x0) r1 = syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x1, 0x0) accept$inet6(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000080)=0x1c) ioctl(r1, 0xffffffffffffffb7, &(0x7f0000000080)) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000140)=@security={'security\x00', 0xe, 0x4, 0x4e0, 0x1f0, 0x320, 0x0, 0x320, 0x320, 0x438, 0x438, 0x438, 0x438, 0x438, 0x4, &(0x7f0000000100), {[{{@ipv6={@local, @local, [0x0, 0xffffff00, 0xffffffff, 0xffffff00], [0xffffffff, 0xff, 0xffffffff, 0xff], 'eql\x00', 'gretap0\x00', {}, {0xff}, 0x0, 0x7fffffff, 0x2, 0x61}, 0x0, 0x188, 0x1c8, 0x0, {}, [@common=@unspec=@conntrack2={0xc0, 'conntrack\x00', 0x2, {{@ipv4=@loopback, [0xffffffff, 0xffffffff, 0x0, 0xffffffff], @ipv4=@loopback, [0x0, 0xffffffff, 0xffffff00, 0xff000000], @ipv6=@ipv4={[], [], @remote}, [0xffffff00, 0xff000000, 0xff000000, 0xff], @ipv4=@multicast2, [0xffffffff, 0xff, 0xff0000ff], 0x3, 0x1ff, 0x4, 0x4e21, 0x4e20, 0x4e22, 0x4e20, 0x28, 0x20}, 0x1c0, 0x98}}]}, @common=@unspec=@ERROR={0x40, 'ERROR\x00', 0x0, "f650bd5c77822a55c077a2b3078812467f4ab9fefc372cf333baff203cdb"}}, {{@ipv6={@remote, @mcast2, [0xff000000, 0xffffff00, 0xffffffff, 0xff000000], [0x0, 0xff, 0xff000000, 0xffffff00], 'syzkaller0\x00', 'lo\x00', {}, {0xff}, 0x2b, 0x1, 0x2, 0x23}, 0x0, 0xf0, 0x130, 0x0, {}, [@common=@hl={0x28, 'hl\x00'}]}, @common=@inet=@TCPOPTSTRIP={0x40, 'TCPOPTSTRIP\x00', 0x0, {[0xe08d, 0x6, 0xff, 0x800, 0x2, 0x7, 0x3, 0x5]}}}, {{@uncond, 0x0, 0xf0, 0x118, 0x0, {}, [@common=@hl={0x28, 'hl\x00', 0x0, {0x3, 0x604}}]}, @common=@unspec=@STANDARD={0x28, '\x00', 0x0, 0xfffffffffffffffd}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x540) ioctl$EXT4_IOC_MIGRATE(0xffffffffffffffff, 0x6609) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000300)={0x0}, &(0x7f0000000400)=0xc) getsockopt$ARPT_SO_GET_INFO(r0, 0x0, 0x60, &(0x7f0000000740)={'filter\x00'}, &(0x7f00000007c0)=0x44) r4 = getpgrp(r3) prlimit64(r4, 0x0, &(0x7f00000004c0)={0x0, 0x7ffffd}, &(0x7f00000002c0)) lremovexattr(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000480)=@random={'trusted.', 'bpf\x00'}) getsockopt$inet_sctp_SCTP_PR_ASSOC_STATUS(0xffffffffffffffff, 0x84, 0x73, &(0x7f0000000280)={0x0, 0x8, 0x0, 0xe0}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r5 = syz_open_dev$amidi(&(0x7f0000000100)='/dev/amidi#\x00', 0x2, 0x800) recvfrom(r5, &(0x7f0000000500)=""/96, 0x60, 0x20, &(0x7f00000005c0)=@ipx={0x4, 0x1, 0x6, "6b183128f377"}, 0x80) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000200)='./file0\x00', 0x700, 0x0, &(0x7f00000024c0), 0x100032, &(0x7f00000000c0)=ANY=[@ANYBLOB]) prctl$PR_MPX_ENABLE_MANAGEMENT(0x2b) getsockopt$inet_dccp_int(0xffffffffffffffff, 0x21, 0xf, &(0x7f0000000240), 0x0) fstat(0xffffffffffffffff, &(0x7f00000006c0)) getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, &(0x7f0000000440)={0x0, 0x80}, &(0x7f00000001c0)=0xfffffffffffffd3f) ioctl$KVM_SET_CLOCK(r5, 0x4030ae7b, &(0x7f0000000680)={0x2, 0x44d2}) ioctl$FICLONE(r2, 0x40049409, r5) setgroups(0x3, &(0x7f0000000340)=[0x0, 0x0, 0x0]) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, 0x0) 14:19:01 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x3, &(0x7f0000001fd8)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x15}}, &(0x7f0000000080)="47504c049c3514bf772da07ae82e76590a36f6493ec1ab91b397e42abf1ea6cd8cd77427fc9a9e2b7165f52b4107bf0850d899dc52d013175ddb1b2f46203c2a05b722e33e556fb2e3f39a3cde1fca53640337ec956146bdbfcb115070195631de5d21a5ea9e638c2bdb78a501ca4b6ea313d82568f9382c2c3f6faba6b4ee54793b4ed26dae3e52225029bb2ac0007f77754c3f23ceda9809b9a9684a940abcaa8cfcc7133ec422e9c83888318d41e9a493f0195fe2599651b89504f5dba14625ce2366f33d95dba92f867279cabf4aceddc85a8af7a0fa68d767ce5136b9d0d1966c499cb6bf34c2988666970000000000000000000000", 0xa}, 0x48) [ 2726.185582] hfs: can't find a HFS filesystem on dev loop2 [ 2726.264439] audit: type=1804 audit(1545920341.148:560): pid=1617 uid=0 auid=4294967295 ses=4294967295 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor3" name="/root/syzkaller-testdir907560001/syzkaller.FvMhcR/33/bus" dev="sda1" ino=16615 res=1 [ 2726.265615] hfs: can't find a HFS filesystem on dev loop2 14:19:01 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x3, &(0x7f0000001fd8)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x15}}, &(0x7f0000000080)="47504c049c3514bf772da07ae82e76590a36f6493ec1ab91b397e42abf1ea6cd8cd77427fc9a9e2b7165f52b4107bf0850d899dc52d013175ddb1b2f46203c2a05b722e33e556fb2e3f39a3cde1fca53640337ec956146bdbfcb115070195631de5d21a5ea9e638c2bdb78a501ca4b6ea313d82568f9382c2c3f6faba6b4ee54793b4ed26dae3e52225029bb2ac0007f77754c3f23ceda9809b9a9684a940abcaa8cfcc7133ec422e9c83888318d41e9a493f0195fe2599651b89504f5dba14625ce2366f33d95dba92f867279cabf4aceddc85a8af7a0fa68d767ce5136b9d0d1966c499cb6bf34c2988666970000000000000000000000", 0xffffff80}, 0x48) 14:19:01 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000940)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$bfs(&(0x7f0000000180)='bfs\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) [ 2726.365232] audit: type=1800 audit(1545920341.178:561): pid=1617 uid=0 auid=4294967295 ses=4294967295 subj=_ op=collect_data cause=failed(directio) comm="syz-executor3" name="bus" dev="sda1" ino=16615 res=0 14:19:01 executing program 2: getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) syz_mount_image$hfs(&(0x7f0000000200)='hfs\x00', &(0x7f0000000280)='./file0\x00', 0x4800, 0x0, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 14:19:01 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x3, &(0x7f0000001fd8)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x15}}, &(0x7f0000000080)="47504c049c3514bf772da07ae82e76590a36f6493ec1ab91b397e42abf1ea6cd8cd77427fc9a9e2b7165f52b4107bf0850d899dc52d013175ddb1b2f46203c2a05b722e33e556fb2e3f39a3cde1fca53640337ec956146bdbfcb115070195631de5d21a5ea9e638c2bdb78a501ca4b6ea313d82568f9382c2c3f6faba6b4ee54793b4ed26dae3e52225029bb2ac0007f77754c3f23ceda9809b9a9684a940abcaa8cfcc7133ec422e9c83888318d41e9a493f0195fe2599651b89504f5dba14625ce2366f33d95dba92f867279cabf4aceddc85a8af7a0fa68d767ce5136b9d0d1966c499cb6bf34c2988666970000000000000000000000", 0x4300}, 0x48) 14:19:01 executing program 4: r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/expire_quiescent_template\x00', 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000140)=@security={'security\x00', 0xe, 0x4, 0x4b8, 0x1f0, 0x320, 0x0, 0x320, 0x320, 0x438, 0x438, 0x438, 0x438, 0x438, 0x4, &(0x7f0000000100), {[{{@ipv6={@local, @local, [0x0, 0x0, 0xffffffff, 0xffffff00], [0xffffffff, 0xff, 0xffffffff, 0xff], 'eql\x00', 'gretap0\x00', {}, {0xff}, 0x0, 0x7fffffff, 0x2, 0x61}, 0x0, 0x188, 0x1c8, 0x0, {}, [@common=@unspec=@conntrack2={0xc0, 'conntrack\x00', 0x2, {{@ipv4=@loopback, [0xffffffff, 0xffffffff, 0x0, 0xffffffff], @ipv4=@loopback, [0x0, 0xffffffff, 0xffffff00, 0xff000000], @ipv6=@ipv4={[], [], @remote}, [0xffffff00, 0xff000000, 0xff000000, 0xff], @ipv4=@multicast2, [0xffffffff, 0xff, 0xff0000ff], 0x3, 0x1ff, 0x4, 0x4e21, 0x4e20, 0x4e22, 0x4e20, 0x28}, 0x1c0, 0x98}}]}, @common=@unspec=@ERROR={0x40, 'ERROR\x00', 0x0, "f650bd5c77822a55c077a2b3078812467f4ab9fefc372cf333baff203cdb"}}, {{@ipv6={@remote, @mcast2, [0xff000000, 0xffffff00, 0xffffffff, 0xff000000], [0x0, 0xff, 0xff000000, 0xffffff00], 'syzkaller0\x00', 'lo\x00', {}, {}, 0x2b, 0x1, 0x2, 0x23}, 0x0, 0xc8, 0x108}, @common=@inet=@TCPOPTSTRIP={0x40, 'TCPOPTSTRIP\x00', 0x0, {[0xe08d, 0x6, 0xff, 0x800, 0x2, 0x7, 0x0, 0x5]}}}, {{@uncond, 0x0, 0xf0, 0x118, 0x0, {}, [@common=@hl={0x28, 'hl\x00', 0x0, {0x3, 0x604}}]}, @common=@unspec=@STANDARD={0x28, '\x00', 0x0, 0xfffffffffffffffd}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x518) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0xfffffffffffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = getpgrp(0x0) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f0000000680)={0x30, 0x5, 0x0, {0x0, 0x4, 0x200, 0x1000}}, 0x30) prlimit64(r2, 0x0, &(0x7f00000004c0)={0x0, 0x7ffffd}, &(0x7f00000002c0)) lremovexattr(0x0, &(0x7f0000000480)=@random={'trusted.', 'bpf\x00'}) getsockopt$inet_sctp_SCTP_PR_ASSOC_STATUS(0xffffffffffffffff, 0x84, 0x73, &(0x7f0000000280), 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r3 = syz_open_dev$amidi(&(0x7f0000000100)='/dev/amidi#\x00', 0x2, 0x800) recvfrom(0xffffffffffffffff, 0x0, 0x0, 0x20, &(0x7f00000005c0)=@ipx={0x4, 0x1, 0x6, "6b183128f377"}, 0x80) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000200)='./file0\x00', 0x700, 0x0, &(0x7f00000024c0), 0x100032, &(0x7f00000000c0)=ANY=[@ANYBLOB]) getsockopt$inet_dccp_int(0xffffffffffffffff, 0x21, 0xf, &(0x7f0000000240), 0x0) ftruncate(r1, 0x6) fstat(0xffffffffffffffff, &(0x7f00000006c0)) getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, &(0x7f0000000440)={0x0, 0x80}, &(0x7f00000001c0)=0xfffffffffffffd3f) ioctl$FICLONE(r1, 0x40049409, r3) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001009, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, 0x0) [ 2726.614504] audit: type=1804 audit(1545920341.498:562): pid=1623 uid=0 auid=4294967295 ses=4294967295 subj=_ op=invalid_pcr cause=ToMToU comm="syz-executor3" name="/root/syzkaller-testdir907560001/syzkaller.FvMhcR/33/bus" dev="sda1" ino=16615 res=1 14:19:01 executing program 3: clone(0xc2b321c6db9081df, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ashmem\x00', 0x240800, 0x0) r1 = openat$vicodec0(0xffffffffffffff9c, &(0x7f0000000040)='/dev/video36\x00', 0x2, 0x0) r2 = socket$can_raw(0x1d, 0x3, 0x1) r3 = inotify_init() r4 = dup3(0xffffffffffffffff, 0xffffffffffffff9c, 0x80000) r5 = bpf$OBJ_GET_PROG(0x7, &(0x7f00000000c0)={&(0x7f0000000080)='./file0\x00', 0x0, 0x8}, 0x10) r6 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xfff, 0x46f, 0x20, 0x33e, 0x0, 0x6, 0x8881, 0x0, 0x7fffffff, 0x80, 0xffffffffffffffc0, 0x4, 0x0, 0xffff, 0x530d, 0x6, 0x6015, 0x4, 0x81, 0x95c5, 0x100, 0x0, 0x3, 0x5, 0x6f83, 0x20, 0x0, 0x0, 0xfc49, 0x2, 0x8000, 0xfff, 0x3, 0x20000000, 0x5, 0x8001, 0x0, 0x2, 0x7, @perf_bp={&(0x7f0000000100), 0x2}, 0x2000, 0x7ff, 0xfffffffffffffffe, 0x4, 0xffff, 0x1c, 0x9}, 0xffffffffffffffff, 0xd, 0xffffffffffffffff, 0x8) ppoll(&(0x7f00000001c0)=[{r0, 0x1000}, {r1, 0x100}, {r2, 0xc000}, {r3, 0x400}, {r4, 0x8510}, {r5, 0x200}, {r6, 0x220}], 0x7, &(0x7f0000000200), &(0x7f0000000240)={0x3}, 0x8) sendfile(r2, r0, &(0x7f0000000280), 0x0) 14:19:01 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x3, &(0x7f0000001fd8)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x15}}, &(0x7f0000000080)="47504c049c3514bf772da07ae82e76590a36f6493ec1ab91b397e42abf1ea6cd8cd77427fc9a9e2b7165f52b4107bf0850d899dc52d013175ddb1b2f46203c2a05b722e33e556fb2e3f39a3cde1fca53640337ec956146bdbfcb115070195631de5d21a5ea9e638c2bdb78a501ca4b6ea313d82568f9382c2c3f6faba6b4ee54793b4ed26dae3e52225029bb2ac0007f77754c3f23ceda9809b9a9684a940abcaa8cfcc7133ec422e9c83888318d41e9a493f0195fe2599651b89504f5dba14625ce2366f33d95dba92f867279cabf4aceddc85a8af7a0fa68d767ce5136b9d0d1966c499cb6bf34c2988666970000000000000000000000", 0x80ffff}, 0x48) [ 2726.717536] audit: type=1804 audit(1545920341.498:563): pid=1617 uid=0 auid=4294967295 ses=4294967295 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor3" name="/root/syzkaller-testdir907560001/syzkaller.FvMhcR/33/bus" dev="sda1" ino=16615 res=1 14:19:01 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000940)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x48, 0x0, 0x0) syz_mount_image$bfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 14:19:01 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x3, &(0x7f0000001fd8)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x15}}, &(0x7f0000000080)="47504c049c3514bf772da07ae82e76590a36f6493ec1ab91b397e42abf1ea6cd8cd77427fc9a9e2b7165f52b4107bf0850d899dc52d013175ddb1b2f46203c2a05b722e33e556fb2e3f39a3cde1fca53640337ec956146bdbfcb115070195631de5d21a5ea9e638c2bdb78a501ca4b6ea313d82568f9382c2c3f6faba6b4ee54793b4ed26dae3e52225029bb2ac0007f77754c3f23ceda9809b9a9684a940abcaa8cfcc7133ec422e9c83888318d41e9a493f0195fe2599651b89504f5dba14625ce2366f33d95dba92f867279cabf4aceddc85a8af7a0fa68d767ce5136b9d0d1966c499cb6bf34c2988666970000000000000000000000", 0x0, 0x40000000000000}, 0x48) [ 2726.770596] hfs: can't find a HFS filesystem on dev loop2 [ 2726.801331] audit: type=1800 audit(1545920341.498:564): pid=1617 uid=0 auid=4294967295 ses=4294967295 subj=_ op=collect_data cause=failed(directio) comm="syz-executor3" name="bus" dev="sda1" ino=16615 res=0 [ 2726.873682] IPVS: ftp: loaded support on port[0] = 21 14:19:01 executing program 2: getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) syz_mount_image$hfs(&(0x7f0000000200)='hfs\x00', &(0x7f0000000280)='./file0\x00', 0xffffffeb, 0x0, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 14:19:01 executing program 1: r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/expire_quiescent_template\x00', 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000140)=@security={'security\x00', 0xe, 0x4, 0x4e0, 0x1f0, 0x320, 0x0, 0x320, 0x320, 0x438, 0x438, 0x438, 0x438, 0x438, 0x4, &(0x7f0000000100), {[{{@ipv6={@local, @local, [0x0, 0xffffff00, 0xffffffff, 0xffffff00], [0xffffffff, 0xff, 0xffffffff, 0xff], 'eql\x00', 'gretap0\x00', {}, {0xff}, 0x0, 0x7fffffff, 0x2, 0x61}, 0x0, 0x188, 0x1c8, 0x0, {}, [@common=@unspec=@conntrack2={0xc0, 'conntrack\x00', 0x2, {{@ipv4=@loopback, [0xffffffff, 0xffffffff, 0x0, 0xffffffff], @ipv4=@loopback, [0x0, 0xffffffff, 0xffffff00, 0xff000000], @ipv6=@ipv4={[], [], @remote}, [0xffffff00, 0xff000000, 0xff000000, 0xff], @ipv4=@multicast2, [0xffffffff, 0xff, 0xff0000ff], 0x3, 0x1ff, 0x4, 0x4e21, 0x4e20, 0x4e22, 0x4e20, 0x28, 0x20}, 0x1c0, 0x98}}]}, @common=@unspec=@ERROR={0x40, 'ERROR\x00', 0x0, "f650bd5c77822a55c077a2b3078812467f4ab9fefc372cf333baff203cdb"}}, {{@ipv6={@remote, @mcast2, [0xff000000, 0xffffff00, 0xffffffff, 0xff000000], [0x0, 0xff, 0xff000000, 0xffffff00], 'syzkaller0\x00', 'lo\x00', {}, {0xff}, 0x2b, 0x1, 0x2, 0x23}, 0x0, 0xf0, 0x130, 0x0, {}, [@common=@hl={0x28, 'hl\x00'}]}, @common=@inet=@TCPOPTSTRIP={0x40, 'TCPOPTSTRIP\x00', 0x0, {[0xe08d, 0x6, 0xff, 0x800, 0x2, 0x7, 0x3, 0x5]}}}, {{@uncond, 0x0, 0xf0, 0x118, 0x0, {}, [@common=@hl={0x28, 'hl\x00', 0x0, {0x3, 0x604}}]}, @common=@unspec=@STANDARD={0x28, '\x00', 0x0, 0xfffffffffffffffd}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x540) ioctl$EXT4_IOC_MIGRATE(0xffffffffffffffff, 0x6609) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000300)={0x0}, &(0x7f0000000400)=0xc) getsockopt$ARPT_SO_GET_INFO(r0, 0x0, 0x60, &(0x7f0000000740)={'filter\x00'}, &(0x7f00000007c0)=0x44) r3 = getpgrp(r2) prlimit64(r3, 0x0, &(0x7f00000004c0)={0x0, 0x7ffffd}, &(0x7f00000002c0)) lremovexattr(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000480)=@random={'trusted.', 'bpf\x00'}) getsockopt$inet_sctp_SCTP_PR_ASSOC_STATUS(0xffffffffffffffff, 0x84, 0x73, &(0x7f0000000280)={0x0, 0x8, 0x0, 0xe0}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r4 = syz_open_dev$amidi(&(0x7f0000000100)='/dev/amidi#\x00', 0x2, 0x800) recvfrom(r4, &(0x7f0000000500)=""/96, 0x60, 0x20, &(0x7f00000005c0)=@ipx={0x4, 0x1, 0x6, "6b183128f377"}, 0x80) accept4(r0, &(0x7f0000000800)=@rc, &(0x7f0000000680)=0xfffffffffffffc9f, 0x80000) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000200)='./file0\x00', 0x700, 0x0, &(0x7f00000024c0), 0x100032, &(0x7f00000000c0)=ANY=[@ANYBLOB]) prctl$PR_MPX_ENABLE_MANAGEMENT(0x2b) getsockopt$inet_dccp_int(0xffffffffffffffff, 0x21, 0xf, &(0x7f0000000240), 0x0) fstat(0xffffffffffffffff, &(0x7f00000006c0)) getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, &(0x7f0000000440)={0x0, 0x80}, &(0x7f00000001c0)=0xfffffffffffffd3f) ioctl$FICLONE(r1, 0x40049409, r4) setgroups(0x3, &(0x7f0000000340)=[0x0, 0x0, 0x0]) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, 0x0) 14:19:01 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x3, &(0x7f0000001fd8)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x15}}, &(0x7f0000000080)="47504c049c3514bf772da07ae82e76590a36f6493ec1ab91b397e42abf1ea6cd8cd77427fc9a9e2b7165f52b4107bf0850d899dc52d013175ddb1b2f46203c2a05b722e33e556fb2e3f39a3cde1fca53640337ec956146bdbfcb115070195631de5d21a5ea9e638c2bdb78a501ca4b6ea313d82568f9382c2c3f6faba6b4ee54793b4ed26dae3e52225029bb2ac0007f77754c3f23ceda9809b9a9684a940abcaa8cfcc7133ec422e9c83888318d41e9a493f0195fe2599651b89504f5dba14625ce2366f33d95dba92f867279cabf4aceddc85a8af7a0fa68d767ce5136b9d0d1966c499cb6bf34c2988666970000000000000000000000", 0x0, 0x100000000000000}, 0x48) [ 2727.019216] hfs: can't find a HFS filesystem on dev loop2 14:19:02 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000940)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x48, 0x0, 0x0) syz_mount_image$bfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) [ 2727.123396] EXT4-fs: 7 callbacks suppressed [ 2727.123447] EXT4-fs (sda1): re-mounted. Opts: ,errors=continue 14:19:02 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x3, &(0x7f0000001fd8)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x15}}, &(0x7f0000000080)="47504c049c3514bf772da07ae82e76590a36f6493ec1ab91b397e42abf1ea6cd8cd77427fc9a9e2b7165f52b4107bf0850d899dc52d013175ddb1b2f46203c2a05b722e33e556fb2e3f39a3cde1fca53640337ec956146bdbfcb115070195631de5d21a5ea9e638c2bdb78a501ca4b6ea313d82568f9382c2c3f6faba6b4ee54793b4ed26dae3e52225029bb2ac0007f77754c3f23ceda9809b9a9684a940abcaa8cfcc7133ec422e9c83888318d41e9a493f0195fe2599651b89504f5dba14625ce2366f33d95dba92f867279cabf4aceddc85a8af7a0fa68d767ce5136b9d0d1966c499cb6bf34c2988666970000000000000000000000", 0x0, 0x4000}, 0x48) [ 2727.199579] hfs: can't find a HFS filesystem on dev loop2 [ 2727.238010] EXT4-fs (sda1): Unrecognized mount option "./file0" or missing value [ 2727.300559] EXT4-fs (sda1): re-mounted. Opts: ,errors=continue 14:19:02 executing program 3: r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/expire_quiescent_template\x00', 0x2, 0x0) r1 = syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x1, 0x0) accept$inet6(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000080)=0x1c) ioctl(r1, 0xffffffffffffffb7, &(0x7f0000000080)) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000140)=@security={'security\x00', 0xe, 0x4, 0x4e0, 0x1f0, 0x320, 0x0, 0x320, 0x320, 0x438, 0x438, 0x438, 0x438, 0x438, 0x4, &(0x7f0000000100), {[{{@ipv6={@local, @local, [0x0, 0xffffff00, 0xffffffff, 0xffffff00], [0xffffffff, 0xff, 0xffffffff, 0xff], 'eql\x00', 'gretap0\x00', {}, {0xff}, 0x0, 0x7fffffff, 0x2, 0x61}, 0x0, 0x188, 0x1c8, 0x0, {}, [@common=@unspec=@conntrack2={0xc0, 'conntrack\x00', 0x2, {{@ipv4=@loopback, [0xffffffff, 0xffffffff, 0x0, 0xffffffff], @ipv4=@loopback, [0x0, 0xffffffff, 0xffffff00, 0xff000000], @ipv6=@ipv4={[], [], @remote}, [0xffffff00, 0xff000000, 0xff000000, 0xff], @ipv4=@multicast2, [0xffffffff, 0xff, 0xff0000ff], 0x3, 0x1ff, 0x4, 0x4e21, 0x4e20, 0x4e22, 0x4e20, 0x28, 0x20}, 0x1c0, 0x98}}]}, @common=@unspec=@ERROR={0x40, 'ERROR\x00', 0x0, "f650bd5c77822a55c077a2b3078812467f4ab9fefc372cf333baff203cdb"}}, {{@ipv6={@remote, @mcast2, [0xff000000, 0xffffff00, 0xffffffff, 0xff000000], [0x0, 0xff, 0xff000000, 0xffffff00], 'syzkaller0\x00', 'lo\x00', {}, {0xff}, 0x2b, 0x1, 0x2, 0x23}, 0x0, 0xf0, 0x130, 0x0, {}, [@common=@hl={0x28, 'hl\x00'}]}, @common=@inet=@TCPOPTSTRIP={0x40, 'TCPOPTSTRIP\x00', 0x0, {[0xe08d, 0x6, 0xff, 0x800, 0x2, 0x7, 0x3, 0x5]}}}, {{@uncond, 0x0, 0xf0, 0x118, 0x0, {}, [@common=@hl={0x28, 'hl\x00', 0x0, {0x3, 0x604}}]}, @common=@unspec=@STANDARD={0x28, '\x00', 0x0, 0xfffffffffffffffd}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x540) ioctl$EXT4_IOC_MIGRATE(0xffffffffffffffff, 0x6609) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000300)={0x0}, &(0x7f0000000400)=0xc) getsockopt$ARPT_SO_GET_INFO(r0, 0x0, 0x60, &(0x7f0000000740)={'filter\x00'}, &(0x7f00000007c0)=0x44) r4 = getpgrp(r3) prlimit64(r4, 0x0, &(0x7f00000004c0)={0x0, 0x7ffffd}, &(0x7f00000002c0)) lremovexattr(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000480)=@random={'trusted.', 'bpf\x00'}) getsockopt$inet_sctp_SCTP_PR_ASSOC_STATUS(0xffffffffffffffff, 0x84, 0x73, &(0x7f0000000280)={0x0, 0x8, 0x0, 0xe0}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r5 = syz_open_dev$amidi(&(0x7f0000000100)='/dev/amidi#\x00', 0x2, 0x800) recvfrom(r5, &(0x7f0000000500)=""/96, 0x60, 0x20, &(0x7f00000005c0)=@ipx={0x4, 0x1, 0x6, "6b183128f377"}, 0x80) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000200)='./file0\x00', 0x700, 0x0, &(0x7f00000024c0), 0x100032, &(0x7f00000000c0)=ANY=[@ANYBLOB]) prctl$PR_MPX_ENABLE_MANAGEMENT(0x2b) getsockopt$inet_dccp_int(0xffffffffffffffff, 0x21, 0xf, &(0x7f0000000240), 0x0) fstat(0xffffffffffffffff, &(0x7f00000006c0)) getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, &(0x7f0000000440)={0x0, 0x80}, &(0x7f00000001c0)=0xfffffffffffffd3f) ioctl$KVM_SET_CLOCK(r5, 0x4030ae7b, &(0x7f0000000680)={0x2, 0x44d2}) ioctl$FICLONE(r2, 0x40049409, r5) setgroups(0x3, &(0x7f0000000340)=[0x0, 0x0, 0x0]) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, 0x0) 14:19:02 executing program 2: getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) syz_mount_image$hfs(&(0x7f0000000200)='hfs\x00', &(0x7f0000000280)='./file0\x00', 0x200000000000000, 0x0, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 14:19:02 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x3, &(0x7f0000001fd8)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x15}}, &(0x7f0000000080)="47504c049c3514bf772da07ae82e76590a36f6493ec1ab91b397e42abf1ea6cd8cd77427fc9a9e2b7165f52b4107bf0850d899dc52d013175ddb1b2f46203c2a05b722e33e556fb2e3f39a3cde1fca53640337ec956146bdbfcb115070195631de5d21a5ea9e638c2bdb78a501ca4b6ea313d82568f9382c2c3f6faba6b4ee54793b4ed26dae3e52225029bb2ac0007f77754c3f23ceda9809b9a9684a940abcaa8cfcc7133ec422e9c83888318d41e9a493f0195fe2599651b89504f5dba14625ce2366f33d95dba92f867279cabf4aceddc85a8af7a0fa68d767ce5136b9d0d1966c499cb6bf34c2988666970000000000000000000000", 0x0, 0x1000000000000}, 0x48) 14:19:02 executing program 1: r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/expire_quiescent_template\x00', 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000140)=@security={'security\x00', 0xe, 0x4, 0x4e0, 0x1f0, 0x320, 0x0, 0x320, 0x320, 0x438, 0x438, 0x438, 0x438, 0x438, 0x4, &(0x7f0000000100), {[{{@ipv6={@local, @local, [0x0, 0xffffff00, 0xffffffff, 0xffffff00], [0xffffffff, 0xff, 0xffffffff, 0xff], 'eql\x00', 'gretap0\x00', {}, {0xff}, 0x0, 0x7fffffff, 0x2, 0x61}, 0x0, 0x188, 0x1c8, 0x0, {}, [@common=@unspec=@conntrack2={0xc0, 'conntrack\x00', 0x2, {{@ipv4=@loopback, [0xffffffff, 0xffffffff, 0x0, 0xffffffff], @ipv4=@loopback, [0x0, 0xffffffff, 0xffffff00, 0xff000000], @ipv6=@ipv4={[], [], @remote}, [0xffffff00, 0xff000000, 0xff000000, 0xff], @ipv4=@multicast2, [0xffffffff, 0xff, 0xff0000ff], 0x3, 0x1ff, 0x4, 0x4e21, 0x4e20, 0x4e22, 0x4e20, 0x28, 0x20}, 0x1c0, 0x98}}]}, @common=@unspec=@ERROR={0x40, 'ERROR\x00', 0x0, "f650bd5c77822a55c077a2b3078812467f4ab9fefc372cf333baff203cdb"}}, {{@ipv6={@remote, @mcast2, [0xff000000, 0xffffff00, 0xffffffff, 0xff000000], [0x0, 0xff, 0xff000000, 0xffffff00], 'syzkaller0\x00', 'lo\x00', {}, {0xff}, 0x2b, 0x1, 0x2, 0x23}, 0x0, 0xf0, 0x130, 0x0, {}, [@common=@hl={0x28, 'hl\x00'}]}, @common=@inet=@TCPOPTSTRIP={0x40, 'TCPOPTSTRIP\x00', 0x0, {[0xe08d, 0x6, 0xff, 0x800, 0x2, 0x7, 0x3, 0x5]}}}, {{@uncond, 0x0, 0xf0, 0x118, 0x0, {}, [@common=@hl={0x28, 'hl\x00', 0x0, {0x3, 0x604}}]}, @common=@unspec=@STANDARD={0x28, '\x00', 0x0, 0xfffffffffffffffd}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x540) ioctl$EXT4_IOC_MIGRATE(0xffffffffffffffff, 0x6609) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000300)={0x0}, &(0x7f0000000400)=0xc) getsockopt$ARPT_SO_GET_INFO(r0, 0x0, 0x60, &(0x7f0000000740)={'filter\x00'}, &(0x7f00000007c0)=0x44) r3 = getpgrp(r2) prlimit64(r3, 0x0, &(0x7f00000004c0)={0x0, 0x7ffffd}, &(0x7f00000002c0)) lremovexattr(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000480)=@random={'trusted.', 'bpf\x00'}) getsockopt$inet_sctp_SCTP_PR_ASSOC_STATUS(0xffffffffffffffff, 0x84, 0x73, &(0x7f0000000280)={0x0, 0x8, 0x0, 0xe0}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r4 = syz_open_dev$amidi(&(0x7f0000000100)='/dev/amidi#\x00', 0x2, 0x800) recvfrom(r4, &(0x7f0000000500)=""/96, 0x60, 0x20, &(0x7f00000005c0)=@ipx={0x4, 0x1, 0x6, "6b183128f377"}, 0x80) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000200)='./file0\x00', 0x700, 0x0, &(0x7f00000024c0), 0x100032, &(0x7f00000000c0)=ANY=[@ANYBLOB]) prctl$PR_MPX_ENABLE_MANAGEMENT(0x2b) getsockopt$inet_dccp_int(0xffffffffffffffff, 0x21, 0xf, &(0x7f0000000240), 0x0) fstat(0xffffffffffffffff, &(0x7f00000006c0)) getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, &(0x7f0000000440)={0x0, 0x80}, &(0x7f00000001c0)=0xfffffffffffffd3f) ioctl$FICLONE(r1, 0x40049409, r4) setgroups(0x3, &(0x7f0000000340)=[0x0, 0x0, 0x0]) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, 0x0) ioctl$BINDER_THREAD_EXIT(r0, 0x40046208, 0x0) 14:19:02 executing program 4: r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/expire_quiescent_template\x00', 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000140)=@security={'security\x00', 0xe, 0x4, 0x4b8, 0x1f0, 0x320, 0x0, 0x320, 0x320, 0x438, 0x438, 0x438, 0x438, 0x438, 0x4, &(0x7f0000000100), {[{{@ipv6={@local, @local, [0x0, 0x0, 0xffffffff, 0xffffff00], [0xffffffff, 0xff, 0xffffffff, 0xff], 'eql\x00', 'gretap0\x00', {}, {0xff}, 0x0, 0x7fffffff, 0x2, 0x61}, 0x0, 0x188, 0x1c8, 0x0, {}, [@common=@unspec=@conntrack2={0xc0, 'conntrack\x00', 0x2, {{@ipv4=@loopback, [0xffffffff, 0xffffffff, 0x0, 0xffffffff], @ipv4=@loopback, [0x0, 0xffffffff, 0xffffff00, 0xff000000], @ipv6=@ipv4={[], [], @remote}, [0xffffff00, 0xff000000, 0xff000000, 0xff], @ipv4=@multicast2, [0xffffffff, 0xff, 0xff0000ff], 0x3, 0x1ff, 0x4, 0x4e21, 0x4e20, 0x4e22, 0x4e20, 0x28}, 0x1c0, 0x98}}]}, @common=@unspec=@ERROR={0x40, 'ERROR\x00', 0x0, "f650bd5c77822a55c077a2b3078812467f4ab9fefc372cf333baff203cdb"}}, {{@ipv6={@remote, @mcast2, [0xff000000, 0xffffff00, 0xffffffff, 0xff000000], [0x0, 0xff, 0xff000000, 0xffffff00], 'syzkaller0\x00', 'lo\x00', {}, {}, 0x2b, 0x1, 0x2, 0x23}, 0x0, 0xc8, 0x108}, @common=@inet=@TCPOPTSTRIP={0x40, 'TCPOPTSTRIP\x00', 0x0, {[0xe08d, 0x6, 0xff, 0x800, 0x2, 0x7, 0x0, 0x5]}}}, {{@uncond, 0x0, 0xf0, 0x118, 0x0, {}, [@common=@hl={0x28, 'hl\x00', 0x0, {0x3, 0x604}}]}, @common=@unspec=@STANDARD={0x28, '\x00', 0x0, 0xfffffffffffffffd}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0xfffffffffffffe45) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpgrp(0x0) prlimit64(r1, 0x0, &(0x7f00000004c0)={0x31cf, 0x7ffffd}, &(0x7f00000002c0)) lremovexattr(0x0, &(0x7f0000000480)=@random={'trusted.', 'bpf\x00'}) r2 = openat$full(0xffffffffffffff9c, &(0x7f00000007c0)='/dev/full\x00', 0x400000, 0x0) getsockopt$bt_sco_SCO_OPTIONS(r2, 0x11, 0x1, &(0x7f0000000800)=""/188, &(0x7f00000008c0)=0xbc) getsockopt$inet_sctp_SCTP_PR_ASSOC_STATUS(0xffffffffffffffff, 0x84, 0x73, &(0x7f0000000280), 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x1) syz_open_dev$amidi(&(0x7f0000000100)='/dev/amidi#\x00', 0x2, 0x800) getsockopt$bt_BT_FLUSHABLE(r0, 0x112, 0x8, &(0x7f0000000740)=0x6, &(0x7f0000000780)=0x4) recvfrom(0xffffffffffffffff, 0x0, 0x0, 0x20, &(0x7f00000005c0)=@ipx={0x4, 0x1, 0x6, "6b183128f377"}, 0x80) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000680)='ext2\x00', &(0x7f0000000200)='./file0\x00', 0x700, 0x0, &(0x7f00000024c0), 0x100032, &(0x7f00000000c0)=ANY=[@ANYBLOB]) getsockopt$inet_dccp_int(0xffffffffffffffff, 0x21, 0xf, &(0x7f0000000240), 0x0) fstat(0xffffffffffffffff, &(0x7f00000006c0)) getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, &(0x7f0000000440)={0x0, 0x80}, &(0x7f00000001c0)=0xfffffffffffffd3f) ioctl$FICLONE(r0, 0x40049409, r0) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000940)={&(0x7f0000000900)='./file0\x00', 0x0, 0x18}, 0x10) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000980)='/dev/zero\x00', 0x40000, 0x0) [ 2727.524081] hfs: can't find a HFS filesystem on dev loop2 14:19:02 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x3, &(0x7f0000001fd8)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x15}}, &(0x7f0000000080)="47504c049c3514bf772da07ae82e76590a36f6493ec1ab91b397e42abf1ea6cd8cd77427fc9a9e2b7165f52b4107bf0850d899dc52d013175ddb1b2f46203c2a05b722e33e556fb2e3f39a3cde1fca53640337ec956146bdbfcb115070195631de5d21a5ea9e638c2bdb78a501ca4b6ea313d82568f9382c2c3f6faba6b4ee54793b4ed26dae3e52225029bb2ac0007f77754c3f23ceda9809b9a9684a940abcaa8cfcc7133ec422e9c83888318d41e9a493f0195fe2599651b89504f5dba14625ce2366f33d95dba92f867279cabf4aceddc85a8af7a0fa68d767ce5136b9d0d1966c499cb6bf34c2988666970000000000000000000000", 0x0, 0x1c00}, 0x48) 14:19:02 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000940)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x48, 0x0, 0x0) syz_mount_image$bfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 14:19:02 executing program 2: getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) syz_mount_image$hfs(&(0x7f0000000200)='hfs\x00', &(0x7f0000000280)='./file0\x00', 0xffffffffffffff7f, 0x0, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) [ 2727.791035] EXT4-fs (sda1): Unrecognized mount option "./file0" or missing value 14:19:02 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x3, &(0x7f0000001fd8)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x15}}, &(0x7f0000000080)="47504c049c3514bf772da07ae82e76590a36f6493ec1ab91b397e42abf1ea6cd8cd77427fc9a9e2b7165f52b4107bf0850d899dc52d013175ddb1b2f46203c2a05b722e33e556fb2e3f39a3cde1fca53640337ec956146bdbfcb115070195631de5d21a5ea9e638c2bdb78a501ca4b6ea313d82568f9382c2c3f6faba6b4ee54793b4ed26dae3e52225029bb2ac0007f77754c3f23ceda9809b9a9684a940abcaa8cfcc7133ec422e9c83888318d41e9a493f0195fe2599651b89504f5dba14625ce2366f33d95dba92f867279cabf4aceddc85a8af7a0fa68d767ce5136b9d0d1966c499cb6bf34c2988666970000000000000000000000", 0x0, 0xa}, 0x48) [ 2727.875702] hfs: can't find a HFS filesystem on dev loop2 [ 2727.945739] EXT4-fs (sda1): re-mounted. Opts: 14:19:02 executing program 3: r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/expire_quiescent_template\x00', 0x2, 0x0) r1 = syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x1, 0x0) accept$inet6(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000080)=0x1c) ioctl(r1, 0xffffffffffffffb7, &(0x7f0000000080)) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000140)=@security={'security\x00', 0xe, 0x4, 0x4e0, 0x1f0, 0x320, 0x0, 0x320, 0x320, 0x438, 0x438, 0x438, 0x438, 0x438, 0x4, &(0x7f0000000100), {[{{@ipv6={@local, @local, [0x0, 0xffffff00, 0xffffffff, 0xffffff00], [0xffffffff, 0xff, 0xffffffff, 0xff], 'eql\x00', 'gretap0\x00', {}, {0xff}, 0x0, 0x7fffffff, 0x2, 0x61}, 0x0, 0x188, 0x1c8, 0x0, {}, [@common=@unspec=@conntrack2={0xc0, 'conntrack\x00', 0x2, {{@ipv4=@loopback, [0xffffffff, 0xffffffff, 0x0, 0xffffffff], @ipv4=@loopback, [0x0, 0xffffffff, 0xffffff00, 0xff000000], @ipv6=@ipv4={[], [], @remote}, [0xffffff00, 0xff000000, 0xff000000, 0xff], @ipv4=@multicast2, [0xffffffff, 0xff, 0xff0000ff], 0x3, 0x1ff, 0x4, 0x4e21, 0x4e20, 0x4e22, 0x4e20, 0x28, 0x20}, 0x1c0, 0x98}}]}, @common=@unspec=@ERROR={0x40, 'ERROR\x00', 0x0, "f650bd5c77822a55c077a2b3078812467f4ab9fefc372cf333baff203cdb"}}, {{@ipv6={@remote, @mcast2, [0xff000000, 0xffffff00, 0xffffffff, 0xff000000], [0x0, 0xff, 0xff000000, 0xffffff00], 'syzkaller0\x00', 'lo\x00', {}, {0xff}, 0x2b, 0x1, 0x2, 0x23}, 0x0, 0xf0, 0x130, 0x0, {}, [@common=@hl={0x28, 'hl\x00'}]}, @common=@inet=@TCPOPTSTRIP={0x40, 'TCPOPTSTRIP\x00', 0x0, {[0xe08d, 0x6, 0xff, 0x800, 0x2, 0x7, 0x3, 0x5]}}}, {{@uncond, 0x0, 0xf0, 0x118, 0x0, {}, [@common=@hl={0x28, 'hl\x00', 0x0, {0x3, 0x604}}]}, @common=@unspec=@STANDARD={0x28, '\x00', 0x0, 0xfffffffffffffffd}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x540) ioctl$EXT4_IOC_MIGRATE(0xffffffffffffffff, 0x6609) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000300)={0x0}, &(0x7f0000000400)=0xc) getsockopt$ARPT_SO_GET_INFO(r0, 0x0, 0x60, &(0x7f0000000740)={'filter\x00'}, &(0x7f00000007c0)=0x44) r4 = getpgrp(r3) prlimit64(r4, 0x0, &(0x7f00000004c0)={0x0, 0x7ffffd}, &(0x7f00000002c0)) lremovexattr(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000480)=@random={'trusted.', 'bpf\x00'}) getsockopt$inet_sctp_SCTP_PR_ASSOC_STATUS(0xffffffffffffffff, 0x84, 0x73, &(0x7f0000000280)={0x0, 0x8, 0x0, 0xe0}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r5 = syz_open_dev$amidi(&(0x7f0000000100)='/dev/amidi#\x00', 0x2, 0x800) recvfrom(r5, &(0x7f0000000500)=""/96, 0x60, 0x20, &(0x7f00000005c0)=@ipx={0x4, 0x1, 0x6, "6b183128f377"}, 0x80) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000200)='./file0\x00', 0x700, 0x0, &(0x7f00000024c0), 0x100032, &(0x7f00000000c0)=ANY=[@ANYBLOB]) prctl$PR_MPX_ENABLE_MANAGEMENT(0x2b) getsockopt$inet_dccp_int(0xffffffffffffffff, 0x21, 0xf, &(0x7f0000000240), 0x0) fstat(0xffffffffffffffff, &(0x7f00000006c0)) getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, &(0x7f0000000440)={0x0, 0x80}, &(0x7f00000001c0)=0xfffffffffffffd3f) ioctl$KVM_SET_CLOCK(r5, 0x4030ae7b, &(0x7f0000000680)={0x2, 0x44d2}) ioctl$FICLONE(r2, 0x40049409, r5) setgroups(0x3, &(0x7f0000000340)=[0x0, 0x0, 0x0]) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, 0x0) 14:19:03 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x3, &(0x7f0000001fd8)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x15}}, &(0x7f0000000080)="47504c049c3514bf772da07ae82e76590a36f6493ec1ab91b397e42abf1ea6cd8cd77427fc9a9e2b7165f52b4107bf0850d899dc52d013175ddb1b2f46203c2a05b722e33e556fb2e3f39a3cde1fca53640337ec956146bdbfcb115070195631de5d21a5ea9e638c2bdb78a501ca4b6ea313d82568f9382c2c3f6faba6b4ee54793b4ed26dae3e52225029bb2ac0007f77754c3f23ceda9809b9a9684a940abcaa8cfcc7133ec422e9c83888318d41e9a493f0195fe2599651b89504f5dba14625ce2366f33d95dba92f867279cabf4aceddc85a8af7a0fa68d767ce5136b9d0d1966c499cb6bf34c2988666970000000000000000000000", 0x0, 0x200000000000000}, 0x48) 14:19:03 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000940)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x48, 0x0, 0x0) syz_mount_image$bfs(&(0x7f0000000180)='bfs\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0) [ 2728.098662] hfs: can't find a HFS filesystem on dev loop2 [ 2728.118196] EXT4-fs (sda1): Unrecognized mount option "./file0" or missing value 14:19:03 executing program 2: getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) syz_mount_image$hfs(&(0x7f0000000200)='hfs\x00', &(0x7f0000000280)='./file0\x00', 0x300000000000000, 0x0, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 14:19:03 executing program 1: r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000980)="2f70726f632f736b732f00000000000000002d76592f6578900c130e5cc2039ac8d6d9706972655f71755f14f302de2fbe69657363656e745f74656d70649a9c65001e682e6951c3d70cfa944f4a7f1d1adaad0008000000000000d8cb786c619610a0b6c8436538893518b8bd66d8a0c82818c9b95b20bd6134611fe9fc5d9f53da", 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000140)=@security={'security\x00', 0xe, 0x4, 0x4e0, 0x1f0, 0x320, 0x0, 0x320, 0x320, 0x438, 0x438, 0x438, 0x438, 0x438, 0x4, &(0x7f0000000100), {[{{@ipv6={@local, @local, [0x0, 0xffffff00, 0xffffffff, 0xffffff00], [0xffffffff, 0xff, 0xffffffff, 0xff], 'eql\x00', 'gretap0\x00', {}, {0xff}, 0x0, 0x7fffffff, 0x2, 0x61}, 0x0, 0x188, 0x1c8, 0x0, {}, [@common=@unspec=@conntrack2={0xc0, 'conntrack\x00', 0x2, {{@ipv4=@loopback, [0xffffffff, 0xffffffff, 0x0, 0xffffffff], @ipv4=@loopback, [0x0, 0xffffffff, 0xffffff00, 0xff000000], @ipv6=@ipv4={[], [], @remote}, [0xffffff00, 0xff000000, 0xff000000, 0xff], @ipv4=@multicast2, [0xffffffff, 0xff, 0xff0000ff], 0x3, 0x1ff, 0x4, 0x4e21, 0x4e20, 0x4e22, 0x4e20, 0x28, 0x20}, 0x1c0, 0x98}}]}, @common=@unspec=@ERROR={0x40, 'ERROR\x00', 0x0, "f650bd5c77822a55c077a2b3078812467f4ab9fefc372cf333baff203cdb"}}, {{@ipv6={@remote, @mcast2, [0xff000000, 0xffffff00, 0xffffffff, 0xff000000], [0x0, 0xff, 0xff000000, 0xffffff00], 'syzkaller0\x00', 'lo\x00', {}, {0xff}, 0x2b, 0x1, 0x2, 0x23}, 0x0, 0xf0, 0x130, 0x0, {}, [@common=@hl={0x28, 'hl\x00'}]}, @common=@inet=@TCPOPTSTRIP={0x40, 'TCPOPTSTRIP\x00', 0x0, {[0xe08d, 0x6, 0xff, 0x800, 0x2, 0x7, 0x3, 0x5]}}}, {{@uncond, 0x0, 0xf0, 0x118, 0x0, {}, [@common=@hl={0x28, 'hl\x00', 0x0, {0x3, 0x604}}]}, @common=@unspec=@STANDARD={0x28, '\x00', 0x0, 0xfffffffffffffffd}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x540) ioctl$EXT4_IOC_MIGRATE(0xffffffffffffffff, 0x6609) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000380)='/dev/ashmem\x00', 0x4002000, 0x0) ioctl$ASHMEM_SET_NAME(0xffffffffffffffff, 0x41007701, &(0x7f00000001c0)='/dev/usbmon#\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) r3 = accept4(r2, 0x0, &(0x7f0000000000), 0x0) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000100)="c7da5f1a", 0x4) r4 = syz_open_procfs(0x0, &(0x7f00000002c0)='pagemap\x00') sendfile(r3, r4, &(0x7f0000000040)=0x500, 0x10000000000443) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) madvise(&(0x7f000079c000/0x800000)=nil, 0x800000, 0xc) sigaltstack(&(0x7f0000804000/0x1000)=nil, &(0x7f0000000000)) writev(r3, &(0x7f00000006c0)=[{&(0x7f0000000600), 0x60020}], 0x1) read(r3, &(0x7f00000003c0)=""/72, 0x100000104) ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x8933, &(0x7f0000000340)={'vcan0\x00'}) ioctl$sock_inet6_SIOCSIFADDR(r3, 0x8916, &(0x7f0000000440)={@remote}) sendmsg$xdp(r3, &(0x7f0000000300)={&(0x7f0000000140), 0x10, &(0x7f0000000280)=[{&(0x7f0000000180)="9d", 0x1}], 0x1}, 0x0) bind$vsock_dgram(r3, &(0x7f0000000200)={0x28, 0x0, 0x2710, @reserved}, 0x10) ioctl$UI_SET_PROPBIT(0xffffffffffffffff, 0x4004556e, 0x11) r5 = socket$kcm(0xa, 0x6, 0x0) setsockopt$sock_attach_bpf(r5, 0x10d, 0xa, &(0x7f0000000080)=r5, 0x4) ftruncate(r5, 0x6) r6 = syz_open_dev$vbi(&(0x7f0000000040)='/dev/vbi#\x00', 0x1, 0x2) ioctl$RTC_ALM_READ(r6, 0x80247008, 0x0) ioctl$EVIOCSABS2F(r6, 0x401845ef, &(0x7f0000000200)={0x7, 0x3, 0x0, 0x20, 0x0, 0xfffffffffffffffb}) [ 2728.277246] EXT4-fs (sda1): Unrecognized mount option "./file0" or missing value 14:19:03 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x3, &(0x7f0000001fd8)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x15}}, &(0x7f0000000080)="47504c049c3514bf772da07ae82e76590a36f6493ec1ab91b397e42abf1ea6cd8cd77427fc9a9e2b7165f52b4107bf0850d899dc52d013175ddb1b2f46203c2a05b722e33e556fb2e3f39a3cde1fca53640337ec956146bdbfcb115070195631de5d21a5ea9e638c2bdb78a501ca4b6ea313d82568f9382c2c3f6faba6b4ee54793b4ed26dae3e52225029bb2ac0007f77754c3f23ceda9809b9a9684a940abcaa8cfcc7133ec422e9c83888318d41e9a493f0195fe2599651b89504f5dba14625ce2366f33d95dba92f867279cabf4aceddc85a8af7a0fa68d767ce5136b9d0d1966c499cb6bf34c2988666970000000000000000000000", 0x0, 0x4300000000000000}, 0x48) 14:19:03 executing program 4: r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/expire_quiescent_template\x00', 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000140)=@security={'security\x00', 0xe, 0x4, 0x4b8, 0x1f0, 0x320, 0x0, 0x320, 0x320, 0x438, 0x438, 0x438, 0x438, 0x438, 0x4, &(0x7f0000000100), {[{{@ipv6={@local, @local, [0x0, 0x0, 0xffffffff, 0xffffff00], [0xffffffff, 0xff, 0xffffffff, 0xff], 'eql\x00', 'gretap0\x00', {}, {0xff}, 0x0, 0x7fffffff, 0x2, 0x61}, 0x0, 0x188, 0x1c8, 0x0, {}, [@common=@unspec=@conntrack2={0xc0, 'conntrack\x00', 0x2, {{@ipv4=@loopback, [0xffffffff, 0xffffffff, 0x0, 0xffffffff], @ipv4=@loopback, [0x0, 0xffffffff, 0xffffff00, 0xff000000], @ipv6=@ipv4={[], [], @remote}, [0xffffff00, 0xff000000, 0xff000000, 0xff], @ipv4=@multicast2, [0xffffffff, 0xff, 0xff0000ff], 0x3, 0x1ff, 0x4, 0x4e21, 0x4e20, 0x4e22, 0x4e20, 0x28}, 0x1c0, 0x98}}]}, @common=@unspec=@ERROR={0x40, 'ERROR\x00', 0x0, "f650bd5c77822a55c077a2b3078812467f4ab9fefc372cf333baff203cdb"}}, {{@ipv6={@remote, @mcast2, [0xff000000, 0xffffff00, 0xffffffff, 0xff000000], [0x0, 0xff, 0xff000000, 0xffffff00], 'syzkaller0\x00', 'lo\x00', {}, {}, 0x2b, 0x1, 0x2, 0x23}, 0x0, 0xc8, 0x108}, @common=@inet=@TCPOPTSTRIP={0x40, 'TCPOPTSTRIP\x00', 0x0, {[0xe08d, 0x6, 0xff, 0x800, 0x2, 0x7, 0x0, 0x5]}}}, {{@uncond, 0x0, 0xf0, 0x118, 0x0, {}, [@common=@hl={0x28, 'hl\x00', 0x0, {0x3, 0x604}}]}, @common=@unspec=@STANDARD={0x28, '\x00', 0x0, 0xfffffffffffffffd}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x518) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = getpgrp(0x0) prlimit64(r2, 0x0, &(0x7f00000004c0)={0x0, 0x7ffffd}, &(0x7f00000002c0)) lremovexattr(0x0, &(0x7f0000000480)=@random={'trusted.', 'bpf\x00'}) getsockopt$inet_sctp_SCTP_PR_ASSOC_STATUS(0xffffffffffffffff, 0x84, 0x73, &(0x7f0000000280), 0x0) setsockopt$llc_int(r0, 0x10c, 0x6, &(0x7f0000000940)=0xffff, 0x4) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r3 = syz_open_dev$amidi(&(0x7f0000000100)='/dev/amidi#\x00', 0x2, 0x800) recvfrom(0xffffffffffffffff, 0x0, 0x0, 0x20, &(0x7f00000005c0)=@ipx={0x4, 0x1, 0x6, "6b183128f377"}, 0x80) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000200)='./file0\x00', 0x700, 0x0, &(0x7f00000024c0), 0x100032, &(0x7f00000007c0)=ANY=[@ANYBLOB="e17ed7cb13b02ccad72ffa124f2f592f0069b68903158ea2a3d7c09f49e5449acae75ba7d7c7e619648ece294824a0d24c01f916807804fa12596a5d0f68a36d4d61734233a81112541e73b3f6525c2f5f88efa01bcdc52841ba7d043e38505396b964de182ae8db5ad619dc0a090c638af9a45584b7a5f8c2875986e25777022b380d81c712188b5861813c07bcd1ecf155ed05aed32205511feb192946a4c9054fa8945becfd9303a6176d616314c0ea8872b156dfdc07dad768f48dbdcdbff2e045f355de15b2745b505577ffd0f9221ebb155ab0ac294f718b"]) getsockopt$inet_dccp_int(0xffffffffffffffff, 0x21, 0xf, &(0x7f0000000240), 0x0) fstat(0xffffffffffffffff, &(0x7f00000006c0)) ioctl$BLKTRACESETUP(r3, 0xc0481273, &(0x7f0000000740)={[], 0x0, 0x800, 0x2646, 0x5, 0xef, r2}) getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, &(0x7f0000000440)={0x0, 0x80}, &(0x7f00000001c0)=0xfffffffffffffd3f) clock_gettime(0x0, &(0x7f00000009c0)={0x0, 0x0}) utimes(&(0x7f0000000980)='.\x00', &(0x7f0000000a00)={{0x0, 0x2710}, {r4, r5/1000+30000}}) ioctl$FICLONE(r1, 0x40049409, r3) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, 0x0) ioctl$DRM_IOCTL_MODE_SETCRTC(r0, 0xc06864a2, &(0x7f00000008c0)={&(0x7f0000000680)=[0x80000001, 0x5, 0x1], 0x3, 0x8, 0x4, 0x1, 0x5, 0x100000000, {0x3, 0xfffffffffffffffd, 0x0, 0x6, 0x5, 0x401, 0x3, 0x4, 0x8, 0x9, 0x2, 0x0, 0x2, 0x9, "4ada3a5ad864409ef9353dc4951cf5a472af287ca1d4548da1d71c1138bf75e5"}}) [ 2728.446001] hfs: can't find a HFS filesystem on dev loop2 [ 2728.456578] EXT4-fs (sda1): re-mounted. Opts: 14:19:03 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x3, &(0x7f0000001fd8)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x15}}, &(0x7f0000000080)="47504c049c3514bf772da07ae82e76590a36f6493ec1ab91b397e42abf1ea6cd8cd77427fc9a9e2b7165f52b4107bf0850d899dc52d013175ddb1b2f46203c2a05b722e33e556fb2e3f39a3cde1fca53640337ec956146bdbfcb115070195631de5d21a5ea9e638c2bdb78a501ca4b6ea313d82568f9382c2c3f6faba6b4ee54793b4ed26dae3e52225029bb2ac0007f77754c3f23ceda9809b9a9684a940abcaa8cfcc7133ec422e9c83888318d41e9a493f0195fe2599651b89504f5dba14625ce2366f33d95dba92f867279cabf4aceddc85a8af7a0fa68d767ce5136b9d0d1966c499cb6bf34c2988666970000000000000000000000", 0x0, 0x80ffff}, 0x48) 14:19:03 executing program 2: getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) syz_mount_image$hfs(&(0x7f0000000200)='hfs\x00', &(0x7f0000000280)='./file0\x00', 0x1000000, 0x0, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 14:19:03 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000940)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x48, 0x0, 0x0) syz_mount_image$bfs(&(0x7f0000000180)='bfs\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0) 14:19:03 executing program 3: r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/expire_quiescent_template\x00', 0x2, 0x0) r1 = syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x1, 0x0) accept$inet6(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000080)=0x1c) ioctl(r1, 0xffffffffffffffb7, &(0x7f0000000080)) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000140)=@security={'security\x00', 0xe, 0x4, 0x4e0, 0x1f0, 0x320, 0x0, 0x320, 0x320, 0x438, 0x438, 0x438, 0x438, 0x438, 0x4, &(0x7f0000000100), {[{{@ipv6={@local, @local, [0x0, 0xffffff00, 0xffffffff, 0xffffff00], [0xffffffff, 0xff, 0xffffffff, 0xff], 'eql\x00', 'gretap0\x00', {}, {0xff}, 0x0, 0x7fffffff, 0x2, 0x61}, 0x0, 0x188, 0x1c8, 0x0, {}, [@common=@unspec=@conntrack2={0xc0, 'conntrack\x00', 0x2, {{@ipv4=@loopback, [0xffffffff, 0xffffffff, 0x0, 0xffffffff], @ipv4=@loopback, [0x0, 0xffffffff, 0xffffff00, 0xff000000], @ipv6=@ipv4={[], [], @remote}, [0xffffff00, 0xff000000, 0xff000000, 0xff], @ipv4=@multicast2, [0xffffffff, 0xff, 0xff0000ff], 0x3, 0x1ff, 0x4, 0x4e21, 0x4e20, 0x4e22, 0x4e20, 0x28, 0x20}, 0x1c0, 0x98}}]}, @common=@unspec=@ERROR={0x40, 'ERROR\x00', 0x0, "f650bd5c77822a55c077a2b3078812467f4ab9fefc372cf333baff203cdb"}}, {{@ipv6={@remote, @mcast2, [0xff000000, 0xffffff00, 0xffffffff, 0xff000000], [0x0, 0xff, 0xff000000, 0xffffff00], 'syzkaller0\x00', 'lo\x00', {}, {0xff}, 0x2b, 0x1, 0x2, 0x23}, 0x0, 0xf0, 0x130, 0x0, {}, [@common=@hl={0x28, 'hl\x00'}]}, @common=@inet=@TCPOPTSTRIP={0x40, 'TCPOPTSTRIP\x00', 0x0, {[0xe08d, 0x6, 0xff, 0x800, 0x2, 0x7, 0x3, 0x5]}}}, {{@uncond, 0x0, 0xf0, 0x118, 0x0, {}, [@common=@hl={0x28, 'hl\x00', 0x0, {0x3, 0x604}}]}, @common=@unspec=@STANDARD={0x28, '\x00', 0x0, 0xfffffffffffffffd}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x540) ioctl$EXT4_IOC_MIGRATE(0xffffffffffffffff, 0x6609) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000300)={0x0}, &(0x7f0000000400)=0xc) getsockopt$ARPT_SO_GET_INFO(r0, 0x0, 0x60, &(0x7f0000000740)={'filter\x00'}, &(0x7f00000007c0)=0x44) r4 = getpgrp(r3) prlimit64(r4, 0x0, &(0x7f00000004c0)={0x0, 0x7ffffd}, &(0x7f00000002c0)) lremovexattr(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000480)=@random={'trusted.', 'bpf\x00'}) getsockopt$inet_sctp_SCTP_PR_ASSOC_STATUS(0xffffffffffffffff, 0x84, 0x73, &(0x7f0000000280)={0x0, 0x8, 0x0, 0xe0}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r5 = syz_open_dev$amidi(&(0x7f0000000100)='/dev/amidi#\x00', 0x2, 0x800) recvfrom(r5, &(0x7f0000000500)=""/96, 0x60, 0x20, &(0x7f00000005c0)=@ipx={0x4, 0x1, 0x6, "6b183128f377"}, 0x80) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000200)='./file0\x00', 0x700, 0x0, &(0x7f00000024c0), 0x100032, &(0x7f00000000c0)=ANY=[@ANYBLOB]) prctl$PR_MPX_ENABLE_MANAGEMENT(0x2b) getsockopt$inet_dccp_int(0xffffffffffffffff, 0x21, 0xf, &(0x7f0000000240), 0x0) fstat(0xffffffffffffffff, &(0x7f00000006c0)) getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, &(0x7f0000000440)={0x0, 0x80}, &(0x7f00000001c0)=0xfffffffffffffd3f) ioctl$KVM_SET_CLOCK(r5, 0x4030ae7b, &(0x7f0000000680)={0x2, 0x44d2}) ioctl$FICLONE(r2, 0x40049409, r5) setgroups(0x3, &(0x7f0000000340)=[0x0, 0x0, 0x0]) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, 0x0) 14:19:03 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x3, &(0x7f0000001fd8)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x15}}, &(0x7f0000000080)="47504c049c3514bf772da07ae82e76590a36f6493ec1ab91b397e42abf1ea6cd8cd77427fc9a9e2b7165f52b4107bf0850d899dc52d013175ddb1b2f46203c2a05b722e33e556fb2e3f39a3cde1fca53640337ec956146bdbfcb115070195631de5d21a5ea9e638c2bdb78a501ca4b6ea313d82568f9382c2c3f6faba6b4ee54793b4ed26dae3e52225029bb2ac0007f77754c3f23ceda9809b9a9684a940abcaa8cfcc7133ec422e9c83888318d41e9a493f0195fe2599651b89504f5dba14625ce2366f33d95dba92f867279cabf4aceddc85a8af7a0fa68d767ce5136b9d0d1966c499cb6bf34c2988666970000000000000000000000", 0x0, 0x4}, 0x48) [ 2728.783546] EXT4-fs (sda1): Unrecognized mount option "~" or missing value [ 2728.796428] hfs: can't find a HFS filesystem on dev loop2 14:19:03 executing program 2: getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) syz_mount_image$hfs(&(0x7f0000000200)='hfs\x00', &(0x7f0000000280)='./file0\x00', 0xf6ffffff, 0x0, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) [ 2728.949502] EXT4-fs (sda1): Unrecognized mount option "~" or missing value [ 2728.966531] hfs: can't find a HFS filesystem on dev loop2 14:19:03 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x3, &(0x7f0000001fd8)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x15}}, &(0x7f0000000080)="47504c049c3514bf772da07ae82e76590a36f6493ec1ab91b397e42abf1ea6cd8cd77427fc9a9e2b7165f52b4107bf0850d899dc52d013175ddb1b2f46203c2a05b722e33e556fb2e3f39a3cde1fca53640337ec956146bdbfcb115070195631de5d21a5ea9e638c2bdb78a501ca4b6ea313d82568f9382c2c3f6faba6b4ee54793b4ed26dae3e52225029bb2ac0007f77754c3f23ceda9809b9a9684a940abcaa8cfcc7133ec422e9c83888318d41e9a493f0195fe2599651b89504f5dba14625ce2366f33d95dba92f867279cabf4aceddc85a8af7a0fa68d767ce5136b9d0d1966c499cb6bf34c2988666970000000000000000000000", 0x0, 0x2}, 0x48) 14:19:03 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000940)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x48, 0x0, 0x0) syz_mount_image$bfs(&(0x7f0000000180)='bfs\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0) 14:19:04 executing program 2: getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) syz_mount_image$hfs(&(0x7f0000000200)='hfs\x00', &(0x7f0000000280)='./file0\x00', 0x8000000000000000, 0x0, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) [ 2729.248384] hfs: can't find a HFS filesystem on dev loop2 14:19:04 executing program 1: r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/expire_quiescent_template\x00', 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000140)=ANY=[@ANYBLOB="73656375726974790000000000000000000000000000000000000000000000000e00000004000000e0040000f001000020030000000000002003000020030000380400003804000038040000380400003804000004000000", @ANYPTR=&(0x7f0000000800)=ANY=[@ANYBLOB="000000000000000000000000000000000000000000000000000000000045661c0000000000000000000000000000000000000000000000000000000000000000000000"], @ANYBLOB="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"], 0x540) ioctl$EXT4_IOC_MIGRATE(0xffffffffffffffff, 0x6609) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000300)={0x0}, &(0x7f0000000400)=0xc) getsockopt$ARPT_SO_GET_INFO(r0, 0x0, 0x60, &(0x7f0000000740)={'filter\x00'}, &(0x7f00000007c0)=0x44) r3 = getpgrp(r2) prlimit64(r3, 0x0, &(0x7f00000004c0)={0x0, 0x7ffffd}, &(0x7f00000002c0)) lremovexattr(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000480)=@random={'trusted.', 'bpf\x00'}) getsockopt$inet_sctp_SCTP_PR_ASSOC_STATUS(0xffffffffffffffff, 0x84, 0x73, &(0x7f0000000280)={0x0, 0x8, 0x0, 0xe0}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r4 = syz_open_dev$amidi(&(0x7f0000000100)='/dev/amidi#\x00', 0x2, 0x800) recvfrom(r4, &(0x7f0000000500)=""/96, 0x60, 0x20, &(0x7f00000005c0)=@ipx={0x4, 0x1, 0x6, "6b183128f377"}, 0x80) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000200)='./file0\x00', 0x700, 0x0, &(0x7f00000024c0), 0x100032, &(0x7f00000000c0)=ANY=[@ANYBLOB]) prctl$PR_MPX_ENABLE_MANAGEMENT(0x2b) getsockopt$inet_dccp_int(0xffffffffffffffff, 0x21, 0xf, &(0x7f0000000240), 0x0) fstat(0xffffffffffffffff, &(0x7f00000006c0)) getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, &(0x7f0000000440)={0x0, 0x80}, &(0x7f00000001c0)=0xfffffffffffffd3f) ioctl$FICLONE(r1, 0x40049409, r4) setgroups(0x3, &(0x7f0000000340)=[0x0, 0x0, 0x0]) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000002580)={'team0\x00', 0x0}) setsockopt$inet6_IPV6_PKTINFO(r0, 0x29, 0x32, &(0x7f00000025c0)={@mcast2, r5}, 0x14) sendmmsg(r0, &(0x7f0000002500)=[{{&(0x7f0000000880)=@nl=@proc={0x10, 0x0, 0x25dfdbfe, 0x80000218}, 0x80, &(0x7f0000000ac0)=[{&(0x7f0000000680)="28a5cd033791f2f1ca5aefb3", 0xc}, {&(0x7f0000000900)="fef68a8ca8850f5d3723cf8ba35f8dfa19a7aa7cabace791e6a6b2c68542a788634a4da752900c3595d388", 0x2b}, {&(0x7f0000000940)="21e7fbcfe849b509540a26bce1a8fe1adea970cf570f036ba68c9d8169d4ad1fe550d3b1599c380d3f041f8abe1cd7f90cb0f7685c46f26b713a945544c7b347cc09b543e8ab891b2bd192b4e3f13be1e16bcdcc34c3ffad1c8cb65faa0f545609620e18759571f2261eb327000703936a1dbbee93b2abba496017e80768c33279b787eca411ee6393579b04e3b1cd8da7d68a8b80991b58e4f05d78257046d6f1e843fc", 0xa4}, {&(0x7f0000000a00)="50a2b94c3df37e13bcbce3fb55fff53aa021641870dffd91ce5764939c267296130610b017be81539f6b15399292a2dd5daf65b5b4ab0f99cc75aeeabcfa0c0fd2f2d6f20703d87bfa226202c2ab645f548b745143b59ea66c0e5ae35bc53d9d501a4a0100bd33211a524b9640040fe5bde1287a9dcf5f4996729f2c1a0efb8318", 0x81}], 0x4, 0x0, 0x0, 0x10}, 0x3800000000000}, {{&(0x7f0000000b00)=@ipx={0x4, 0x3, 0x9b9d, "0ab93ac41604", 0x1}, 0x80, &(0x7f0000001d80)=[{&(0x7f0000000b80)="784782735ff499b9da1bd15150d5e24afc8b5c9125751ef5b861c31170d864817746dfe634c9331847774b8721ae45d0d2ecb7de4a1830b01f997cb03fac5f2e0903917c9b7eab1305445f412265724ef7358cd3c872e434d8bebeeafcae166c30c209ddec94", 0x66}, {&(0x7f0000000c00)="dcf4989d1a667b05b79506db57eaa87ea86833aa8614ca6c3cef9baedcbf6cd1d520b5b5bf55119632e67d3e3c2d77d113b8cbd0916bd61c1940732c7dddff306677134179fbd01c584246b99c5335161970edfdd944ebf0037cf3362078aeab3b55b52a465f743b0d074776afd2f2d58c83663cc17095b7a6b78192751693b35a14d665878a5d832a8465bf636e1b00f3b8e0a7c83ecfcb9e5c4947f9ab", 0x9e}, {&(0x7f0000000cc0)="bfa17aa655aa4fc2fc8bc86a1b569a8319ec30f945b2a10c8fc737b2129f5e8c0ee2f6c0ab16da137fec2539e8bdd6634f4593d2a5ad2c18de224f85ad85f5e74dc47c4961a316b48caca86d1160f6f78041228e333f83ba343aef542943dee81315f35fbd2fe1c534fb030b47b99aa5df8802bad6540fb8624f503c6fd2afe76c9bac620e006e7e2b532e0577c44f82a3ae5d8b4ae192304d3e612e99a69c415a8fbdb9d567c0709b9015e5ca1bf3af7933cf247451cf1293e3671eb5c41413ab3e44616de111639990f947d18f6d2c8ff5203f80f106deeb65f7dc65879ee52650dcebac2c90c4b68a7368681e968bd60ff8c78a4d08e889d9f134b4b1d09e9a24ee02ac9995093cad6492fbac962213d9f3c63d96af5ea7b96df0e5b826faccb05ecf2660c19d8fa7a6a795e110d5649b53ac9958ef92eb51749a8716f074638f1f174f9db8e653a33854eb8984f13f0d1f58b0daea9928eca14126eb7bc748d01605d82fcbdf4b5aaf0e49e1a4a1f983ed58e03476c0ac69c536238e31e52d0136488ba841c796ac6880ed8e6c2b98ac470c901704fffac7d1da197d08afc3c514cfda41171e0415b0456272655b2c573ed425052ac94e8824a77e68f7e847164d36a07a0865196e3a52c6336d7d4755c5592cd91e01fe476cb9b3a2658de244b576511624ed5b29a22553369b56b0f6e247c2c946d037e207516899850e9e1788f497a7a54b2e43754469caca418b98fe33ed9d9d11fc73cedc40a6e7ecd83d20533a78a3b7a61d693fe3ba44aa610972ce65dd06791e211dbd3b493c25abc923de0a1d8374f7aab5e2b58709a8540b575de71b3b15309b9ce42ddb7a4392b9b37402ff9ce725f156bc97c16f95b378c95cb7793b5aa7830dc2aea86db384f044986eba47f6add2a2aef4faf2802bc0d3dbf5b8c120e9e6321505e275b9f015f5a9afa7cc90aca234e33a0f7588f0e653470f5dfc4c58f46ad988415b787020b6fb0407cb5ec551936c61180ed7704ad0238bb0326ab569aaa924751bd918f4b7d3599b5749542d4de47d0325083c3fd00057e347712bbd583bcbf078f5e56eb0b7ae823ae2614cc7d26c5c49fe416d3bfd4567b9382e96612a087dde7580cffa6b14ff0036a2f6bb9f6cadd376e1f97da04541578e1c9efacec7819f6bfa3df51efaf6a1bd03928a86dcd2d41235a490ae2b13060c4de8df69948626a4cd430e04f77c2478c2942d9890c4fe8d1d8680f10bb25d44a092e13c75bdbb3b461248f0bc7817ca024d2ba3a4bf7dd14fd79cdef15d4d3347216c29c4e56f560f4ad82378ad9f15c3223b1d9e8ad3b4c60f6da5839941f57d4de35acfb6d7be5906eb2c77da3c47a70802b3bb2de354fb5e7896307ac877c78a88b7fb92fe3bd8a7925ccccc77c8171de9973891a1b385600048eb5e9b52102607666286b2e8ce500eaa416f024b87dc02baae304ba54c2342d6bdd94c886a86f4463a644490148ea4dc774eccd2a769e9275e75fa26cb452826443201ff7e0eb06e41d13bb5bb976fcfb6692eb3b8bec34d0562d85062dd84b7e741c6d99f0be3f31f61e07329bd982855d15e3550c32d48345fc8b13ccb76fca1948e20eb90716d3f78b0d6cb3dd9ba69ae6904620ad2c4f7ba681d45b8e0aecdc3f136ec1f0b67ece0e4299b72b6a7fb74d245defc0322b0ce8dc46267a8bf3eb4c3cfb1600768f918ce666e7a846fa4208066e6d40a7b1b3e4b8b372263a3a6b235e3cbb4cbb05c29e0674540f7e6517870754969387cb1ed1329fcac8388148eec60af4932ef7aad4b91c87a09afefb8ef47f444094176d80ea3cf22981e073dbb5a3ff1b68bfb09a8bcc5031f46dd893812d9fdf2565f493bb5dbe5b22f8caab8813b52120d9d794e131a831982c29c7c552ccbf32d7266da77f48b97c7b2fdda5a7010fa8f3d7e58bebf1294333a2123282567dd504f695f21e165bbde900e098dccb1ee36c513d5488136368bfca2cb3016a630dd1b12ef92cf48dd1efcc13d85a35cd99a469625635a3ad6dba46f81f5c877a5e739c0f219ce2c20e1ba0281202ebd6698a9d6725b07706b9f3c622d8564dff8972df7a6ebecee6b8f22026421f9c7108039d77a919d7f121f1cbd7d3731f7576f6fd9fb2f3fe21ee8449fabb796b692fd6120442374d4cffc36b3a3b083ea67d1794d6212a035208c4930ad6c95d89fd9f84e9668a9ba4e0ff84485626341a571b8df5ea41b3d9a4fc1a500ff9c61b4ede85e85145c6d427ffc0373d09f25ea4a9f3e2cd4731acb05e15dee8c7c333255b4254fa9c70335d936b549623673cba9bf8923a4e201e8520d86a98dae1aae18b494f974b08541332c5de1b0f6b5d94cacc039a08eaa5d7bbdfda1493fc61571af56c7aa293f1894872a75f64467a9defc1ee78740dff2be1c6b482100ac6bc54919331cd7675476b21937d1e35c059af77188af277e6c0d34cb831816d54d3710ddcd7129c5a9d53e8b07c62ccc8c073ba1f4bf4a7e2de0e30ef36a563d5e4350540396a2f5891a5d16e589b49ad843cbefe5a68a1c940db0f98355108a5360ea47b3d18c24a5c5acc9979341a054bb1744dacd8a0d5ef4c12e2851172ef2019a9946a4e51224ebc7311b4a69d5de66dbfc8881c0e0f6570de964221ad11564f8eacff44f7ccabbbdd0a5e2d18675a92dc3c81ecb5f223d16f2108853edfec7b36845e8a70148c6dc4599838ba1700e61ef4ad55a63b4cddde5de1d0309c277c6fbd35423a72d1f173a53ce1432f488d88acdbc35c006cb926285e5063ff6e65c54dca69ad5132ce040936e88ddfcbb2ea93b15819245e585bca60383d192cbaeccb90ae55d0968affffb9abf46b26849ff6f9dba07e4a5977c11aa220566d29e60044ffa2159d2506403bbe1fb249704426ed1c2c2d7441cdf3613471a33811a3d4aec16f6bcd170dd7fe7340822805890339fc0f8b4c7c710eb915b51208d9292d6784c9d2d7ab13f655a486f9d61db95c8858603fa688b73e9b200fcd340871f1ffc558fdc2c0ab199e70c81a38eb15afc70296f0913ec6b3d3abb705f6df7c42b72d91a6f1b829c5573c9f95fb7a6120d60254150096cdc4535e5408f596ce604a7439de2b1d150b57e43ed5461b5f3cf476eefad0e7c05c6cf014788a9ad283395c06b993d80dbc4bc59d2e8b66f80f9bea8832720b38ace428937f6b14f281deb9ac3c57242666d9cb85d1e3e8ce86d48b443d9c76550483b61d5b862be11a998dcd29b6bd00c725611cbe463f186e8452eeddf753d998603684dc16eb1385f453817398a5e54b01a704db52af3a2ed716a8303f09cf3f695bc813f325d25025c6569cef252cfd7175de8595b2f875220f67a7e1088a5a9bc97a7b3edb6de2c6a7b0f1e587f70fc9e4cd9409e2f6cc5aa19ea9c8c268e06a97260e28dd6652b8995cf34b6dd83ff7edb0f2b77b1d291b67f370f3049abee6da1bbfaf950edb6f273492d183b8727ae0bc3a66a55f467c48739f4ef9a3573d04f58514c4c85e71ec339aa6bdf22e8975577f0b66c7546fff5e2a9b030906318a957999b1fb568a1c0f04903664c0d59e3f94558a19afd784e4f91a358218470a57bd4e539603c91f0e262f001b91f5d6e565d90ec8bcedf59e29d2ece55f2799508b241b7cd2c821a4219c0b6d1070fe16508ef17ec4de1d87efcbe47045734ec021963f7adacd3cf73ebb3ef988eb6dc6fe98931cdc3bc63490f666e6479f91dc4baf8bc34d64c414f4dcf758b618bb7bc3eb83024b0ee2d53543a37b68444b8805a5adc7a58dca1d5bb0d6aa5753bb194e03b1e0a05eb824996fcc7c9155ad0fb9dbe09874ade54acb1c16fae0536dc3f1dd68f18723cf66db2b98b253927abde042d8a75f1bd536366ffa1331c7f52f3e603a648f6118ecd4c97d61c5ca408b5e4e87b97e7201964fd2c4d85032d12080f3fad2d168ee311fab5e0ab82f39a7353b13fa5414015300062f30e9fc75dfadd8ad808a7aa809df1dff6c88820a4f6ff0bb81f208f4bf3201d0a92114b4b7dbf22c1b18cd5064263cd4a84139146d816581734d8e8a49df13e24b4a110910b41a54b64f56116a93b510338d3ef8b94d2a89bdb659f8fffb5df72e0ba8bc50227ab7ea579053921c58a68fb8fc9d8792af0f08f69e90566ddb28fe8d1f5916eaa4efcc9ecc35fa5c65701613b32bcf1c63e6120666a55503ce9cb9ee172422957cc465ba74059d2bd3a66196a9ddd8f2dd4b4bb83ee4c14c6322a88c48600eb7d349950200aa7f0f08c8da8dc8ee03480bd68d2d18be1c3832a1bd69a38b3342c96ba0c4e6758289446d73bf2a5e90d025f2c642089d81129363d075a8eb740dda9a6a769c87a0a209a9767deee1faf462910c0276be42b09d001df60de9895ad6c80ff1f1671f5a350ae6eabbba3e519dfd72a524cc54f46c91a58ddf78a8c30b7f215ad26373541495fa925478b66f07a0587f6e543799a3c0a22954146e925be336abbbf822c2e8335655a4f947744de79aa28934753e17b5b700b712ee16841dc3e714268012424b6e61cbdf7aad2a2fba99cbc374b58b6ef8f1817a2a67bf80c24ddcab464b7aa4d4597fe36fd2114011ca8e98fa6a233c6c7a422591c475ef865a9b041a04ffee8afcc7c065b4559aef22dc2e062fd5b3102e38e23c1709fc76dbe53d577bf4af330306a3350f3351e05eba21309e904f5dd72cfe507e392789fa016f78acab55c772f066dbb6e681f9764bd2ce009c1ceb4e630e206b2ed7106d2b53830c2dfec5e8368937d7e28036820387a6f21f1d6b19bbec4b324c70ceeb8355dc00526759d4b786ade3e6f5c3456c35738973558fe70824169f0c983ad3276833458910493433a3845f4dede54f907b2a24a381647b1a5cd5399069005802ed5aa212cff6f01514944398076b42715df593f49d958f7aec8394f1d07f00ab265729d5ceec37fa3ab744e17d471c36cc96944298b08d05c015da99fb97a21e20a54300a2f56907d9b840c38ee624eaf171f53dee6b9a45debb1a942229bb58d68a6baffbc6d35a080e900d1bf2ed714a411608be8d4a273948b1d3991c6454475d1444f1e607a4f5e12db984dfb8eed2bbebcf43d20fe30f1eaef08b940a20bae1c6d9669ab43c76562c41ac04392b378bb5bddb58796379dbf13383552cf78610fb5f92cc85785cbc612512b2c78904686f7432ecf2b03b94887e416c6fcd0cd78d22f9c36ed903288920089ab1916a18c055a706471dcd0e6b175ddfd6a6bfd56f3f8a6c203558ae6327130e252457d1b733b85dd668bdd79fc2c9624db5e4b21a39ef2fe9f8214b9b455a5fdd64e2bffaea87f8404c58dd133828290314698f8ed7a8fe55765d4463c224ae10e6936ecd08c7a3ac7be5f04c5e9775fa4b7b03c430ac502779b08bd54a4ebbe57ecd9c05ca98ed484d846fbe20cf59df88c785bbbaed080d3d971b69f1e563aafd5eb17040a17c382d46ca670d4fdf7accf8d7abca5a30a9d058c37449efae602826eab779f994d396688d5028b877e96672a38064e0de6f2ca8890f5323e21f4e3824a13abd79f983c8dae598af1cc43701b113c53ba5ed699be27b0a77c7a8328b1d639a1e38366cf96e47504065b615147646bf2b9f4cd04594e0fb5ddfd36e5da1f47c9aa4280c708afad3f5fe918af068342e8d8d155d06a1be95860ece73396e356fb9d6381e1ec04823703d87359838490b23bc3bf3d0b81af11d77b97e3e8e33003c1408b24b96d4ccd28ca0fe3135719cffb7b8b110398843c9e9e7584", 0x1000}, {&(0x7f0000001cc0)="1c62bcb040d558db5b95f671bc5e761d4b6c0d78304c9513b77eb909c2f5bd8547b6a1ddd5371a565998771cba2a1c213360a7401e5879df5f374ca7c4eee059a25f476888b6357a6639b0736a2928aa340cceedb95088a6c2ba5f923b788bc3ef23b05a8656a5ca86f8836569b4c69a320b52eef74e6846a78680b96e2ed7057973b88fc8", 0x85}], 0x4, &(0x7f0000001dc0)=[{0xf0, 0x11f, 0x401, "0da34121794f2c6ac46d874507ad7697f48f18749201c84b8e1a01d86bd8795f36fdc671b804d40e18f200ff1f5dbdb5ab6912f2328af3b3697e050ce31cef15e588de0117ad9f8f23bcf68d0f42e79439dcdbd7c6c495160aebde7daf7a108dff87939eac6207698affc51b6079fdc0a6b58f781b023fc5f989ad81596b449dbc0d1f9ccf71d305017f179547afffa1bae337142d0e06b11b743da13aa6e152a7faa89c6d28669f221e6257bedc03570032ea1fa5d6e370450bda6525919d4c2b85d2390990a734b532949c5fb2eb0b96343a9370f78acb3df6"}, {0xe0, 0x0, 0x4, "b2f58d265b9dbf3d449e335047e9ea7da98410bd1bffc84c2a50eaa2f5ddbdbe06f1858dd2a134e686b4de003a1214f24f086c1ab4fbb99fc566fc91f8e2073bf0132a3d55f9e7a5f3a4af489470725080d08f9d9336c9997d7aa3866f8ce50bf675995a8a97de820c68446e377a517a97f6e4b1f8dd3372d48b4527c1b381a5851a468b9dc6b82b3e66c82a171042706b70023271857458250748ac93a4fcb12cdb9ce32bc97cc0b15accc4c7214cc05b608eafde87b091ef10df92e885ebe6f955b832bf1f6841656c4a8af4aac0c9"}, {0x28, 0x129, 0x401, "48864f4ddc5616b8c82066705b974efbc348d03f47"}, {0xf8, 0x10a, 0x8, "c91c7cf0344dccc2e5934f5d98dd63836da2ec315936ac7fd47d1e749046f83e27438cdcf1ec997450792e86dbc454cb1d88f1cbd5df3fdd5b48f6a0e5471979c5d60315ff63f3715ac53f9849cc6545be7d3a464202218cbe408e2c735e1d766c75ecc4395f5721416634809c01d5cb8ef988571dc0658ce59614c9a5771e7bdabb73f4e7224f756664787a8101dc1b51ccf63787e2911ab8c7919616df276014d6b4287045104b6385737883c5fd57fdb6efe3b7cf4f4daace88a4cd49e2a950004ed708ff1ed29b7d3da031f774ccc460c2adbdeacf3dabfee5f1e07dd78a7b"}, {0xd0, 0x111, 0x200, "7af2f406cad7fe6a4f1b1b104176a2bfdb9f340a08e2e5a0b01a88c173e25d31c1540a2fc40030a9fe3bffe83623348a0479300a7e153e5a59c0d6cf9e36d4dd51949ef871126232b2d45dde7f2bdf541778118051f0c2fb5c7c13f410efe45553d153b0ad0069730c8a2e30671fe60040a21ce6fe8f2f2fd4695dbf4cfb842d60c3a50760e91f71d5f77a57ea8d91856a3ef6b2894dff7addab9207c1cb1cc9a8a5b1318fcc0b7b6002d74a2f052ade7612f9bf238cbc0962c5"}, {0xe8, 0x11f, 0x1ff, "4715fd03ee1b0934893c08ad657c1159e72b2cdbf0e83b815dfbcb9844bcbaf8fb060d51c8e558b9274d69e6dcf3498795f6d63c4cba0b94e8cdeba9d0783990e838c223ca03268698037b04da063347e48c0227fc8ca0675657c83e462f5ff90f7204d16e10543c8f1babf9856231fa1f507889a0d58f6edacb47ba5653932b0e77f837c910b1a9e67fc0603e88c98d26ffe69b3beb6574d5c9212f097e1d70ddbcf90239bec8b31ccc29f09ec1d94c14c3b67c7fdea3268989ebc0896580e8313c6b7015735802cd4aedc6105d6e6bcbd119136c49bf0a"}, {0xc8, 0x1ff, 0x7, "6c0210c11e770793e20bdf547331106f9e73aadc58b73d5dd2ff0c8352f5cb8f8a2e9463d5e00dc02991e40f3019ad497d9feff0d5c383c55fcb25e29e3e7e40f6806807b75c186ebf80660b305f607e88d2c9c2740af443a16dbf8563405c876d532be16ba9bf811419158985f46dac3aa78f007e834ef25ebca95680f1b315a7f5466f4ab756a5a046464d32948cafa50266842000efdd58b770316fa51d366a691dac19e9182abec175b657950d39b3b1bc04b874be7e"}, {0xf0, 0x100, 0x3, "1f707cb8afc2df2406dfe3bf1a2ac38ec8f8771cfdd3efd9c1c18337f84180f80faea49fc8451a4a3b4f87681148c1a9115174e0ac1f79e5ba4debf6b06d2ae55b3f5b04fe7675506d1199dd330dc0d46372cc777006ef950e84da51f76fde15c7c257466c8ca66869439ef150bdeaf2396a36ca2c31ff885e661aa63ecee8dee5a35e1182403d76b7e9600a9a099e261938472924ea20833d565f648b5dfee5c2829796b14d0332f610659d17bdb2b2a0793f0e1706cc27edd09af1719a56b0c48abb8bfc57dbce023eac1e8e068f31c7cc4583efe95c003f4938"}, {0x18, 0x107, 0xbf56, "f8"}, {0xa8, 0x88, 0x0, "e6d4c1fb36fa069e8f583004b6d8429cbcefc25832e3a18766d2c49e33174276c745f6f5f13f1d1551e891883b18ca57132316833521d4e012fcc098160f66ea79ec5a1e98ad754ac67f9fdb597353f7d03540eaa74272e04dd291eb59905931097d3308f492c14acd92df6dcc88877f3ef6680fc8c9e2224791cd764e823b514b4207f6f227519b7f0a62653042f506b524913d8f"}], 0x720, 0x8044}, 0xfffffffffffffff8}], 0x2, 0x0) 14:19:04 executing program 4: r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/expire_quiescent_template\x00', 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000140)=@security={'security\x00', 0xe, 0x4, 0x4b8, 0x1f0, 0x320, 0x0, 0x320, 0x320, 0x438, 0x438, 0x438, 0x438, 0x438, 0x4, &(0x7f0000000100), {[{{@ipv6={@local, @local, [0x0, 0x0, 0xffffffff, 0xffffff00], [0xffffffff, 0xff, 0xffffffff, 0xff], 'eql\x00', 'gretap0\x00', {}, {0xff}, 0x0, 0x7fffffff, 0x2, 0x61}, 0x0, 0x188, 0x1c8, 0x0, {}, [@common=@unspec=@conntrack2={0xc0, 'conntrack\x00', 0x2, {{@ipv4=@loopback, [0xffffffff, 0xffffffff, 0x0, 0xffffffff], @ipv4=@loopback, [0x0, 0xffffffff, 0xffffff00, 0xff000000], @ipv6=@ipv4={[], [], @remote}, [0xffffff00, 0xff000000, 0xff000000, 0xff], @ipv4=@multicast2, [0xffffffff, 0xff, 0xff0000ff], 0x3, 0x1ff, 0x4, 0x4e21, 0x4e20, 0x4e22, 0x4e20, 0x28}, 0x1c0, 0x98}}]}, @common=@unspec=@ERROR={0x40, 'ERROR\x00', 0x0, "f650bd5c77822a55c077a2b3078812467f4ab9fefc372cf333baff203cdb"}}, {{@ipv6={@remote, @mcast2, [0xff000000, 0xffffff00, 0xffffffff, 0xff000000], [0x0, 0xff, 0xff000000, 0xffffff00], 'syzkaller0\x00', 'lo\x00', {}, {}, 0x2b, 0x1, 0x2, 0x23}, 0x0, 0xc8, 0x108}, @common=@inet=@TCPOPTSTRIP={0x40, 'TCPOPTSTRIP\x00', 0x0, {[0xe08d, 0x6, 0xff, 0x800, 0x2, 0x7, 0x0, 0x5]}}}, {{@uncond, 0x0, 0xf0, 0x118, 0x0, {}, [@common=@hl={0x28, 'hl\x00', 0x0, {0x3, 0x604}}]}, @common=@unspec=@STANDARD={0x28, '\x00', 0x0, 0xfffffffffffffffd}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x518) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = getpgrp(0x0) prlimit64(r2, 0x0, &(0x7f00000004c0)={0x0, 0x7ffffd}, &(0x7f00000002c0)) lremovexattr(0x0, &(0x7f0000000480)=@random={'trusted.', 'bpf\x00'}) getsockopt$inet_sctp_SCTP_PR_ASSOC_STATUS(0xffffffffffffffff, 0x84, 0x73, &(0x7f0000000280), 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r3 = syz_open_dev$amidi(&(0x7f0000000100)='/dev/amidi#\x00', 0x2, 0x800) recvfrom(0xffffffffffffffff, 0x0, 0x0, 0x20, &(0x7f00000005c0)=@ipx={0x4, 0x1, 0x6, "6b183128f377"}, 0x80) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000200)='./file0\x00', 0x700, 0x0, &(0x7f00000024c0), 0x100032, &(0x7f00000000c0)=ANY=[@ANYBLOB]) getsockopt$inet_dccp_int(0xffffffffffffffff, 0x21, 0xf, &(0x7f0000000240), 0x0) fstat(0xffffffffffffffff, &(0x7f00000006c0)) getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, &(0x7f0000000440)={0x0, 0x80}, &(0x7f00000001c0)=0xfffffffffffffd3f) ioctl$FICLONE(r1, 0x40049409, r3) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) getsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r0, 0x84, 0x1e, &(0x7f0000000740), &(0x7f0000000780)=0x4) chdir(&(0x7f0000000680)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, 0x0) 14:19:04 executing program 3: r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/expire_quiescent_template\x00', 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000140)=@security={'security\x00', 0xe, 0x4, 0x4b8, 0x1f0, 0x320, 0x0, 0x320, 0x320, 0x438, 0x438, 0x438, 0x438, 0x438, 0x4, &(0x7f0000000100), {[{{@ipv6={@local, @local, [0x0, 0x0, 0xffffffff, 0xffffff00], [0xffffffff, 0xff, 0xffffffff, 0xff], 'eql\x00', 'gretap0\x00', {}, {0xff}, 0x0, 0x7fffffff, 0x2, 0x61}, 0x0, 0x188, 0x1c8, 0x0, {}, [@common=@unspec=@conntrack2={0xc0, 'conntrack\x00', 0x2, {{@ipv4=@loopback, [0xffffffff, 0xffffffff, 0x0, 0xffffffff], @ipv4=@loopback, [0x0, 0xffffffff, 0xffffff00, 0xff000000], @ipv6=@ipv4={[], [], @remote}, [0xffffff00, 0xff000000, 0xff000000, 0xff], @ipv4=@multicast2, [0xffffffff, 0xff, 0xff0000ff], 0x3, 0x1ff, 0x4, 0x4e21, 0x4e20, 0x4e22, 0x4e20, 0x28}, 0x1c0, 0x98}}]}, @common=@unspec=@ERROR={0x40, 'ERROR\x00', 0x0, "f650bd5c77822a55c077a2b3078812467f4ab9fefc372cf333baff203cdb"}}, {{@ipv6={@remote, @mcast2, [0xff000000, 0xffffff00, 0xffffffff, 0xff000000], [0x0, 0xff, 0xff000000, 0xffffff00], 'syzkaller0\x00', 'lo\x00', {}, {}, 0x2b, 0x1, 0x2, 0x23}, 0x0, 0xc8, 0x108}, @common=@inet=@TCPOPTSTRIP={0x40, 'TCPOPTSTRIP\x00', 0x0, {[0xe08d, 0x6, 0xff, 0x800, 0x2, 0x7, 0x0, 0x5]}}}, {{@uncond, 0x0, 0xf0, 0x118, 0x0, {}, [@common=@hl={0x28, 'hl\x00', 0x0, {0x3, 0x604}}]}, @common=@unspec=@STANDARD={0x28, '\x00', 0x0, 0xfffffffffffffffd}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x518) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0xfffffffffffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = getpgrp(0x0) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f0000000680)={0x30, 0x5, 0x0, {0x0, 0x4, 0x200, 0x1000}}, 0x30) prlimit64(r2, 0x0, &(0x7f00000004c0)={0x0, 0x7ffffd}, &(0x7f00000002c0)) lremovexattr(0x0, &(0x7f0000000480)=@random={'trusted.', 'bpf\x00'}) getsockopt$inet_sctp_SCTP_PR_ASSOC_STATUS(0xffffffffffffffff, 0x84, 0x73, &(0x7f0000000280), 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r3 = syz_open_dev$amidi(&(0x7f0000000100)='/dev/amidi#\x00', 0x2, 0x800) recvfrom(0xffffffffffffffff, 0x0, 0x0, 0x20, &(0x7f00000005c0)=@ipx={0x4, 0x1, 0x6, "6b183128f377"}, 0x80) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000200)='./file0\x00', 0x700, 0x0, &(0x7f00000024c0), 0x100032, &(0x7f00000000c0)=ANY=[@ANYBLOB]) getsockopt$inet_dccp_int(0xffffffffffffffff, 0x21, 0xf, &(0x7f0000000240), 0x0) ftruncate(r1, 0x6) fstat(0xffffffffffffffff, &(0x7f00000006c0)) getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, &(0x7f0000000440)={0x0, 0x80}, &(0x7f00000001c0)=0xfffffffffffffd3f) ioctl$FICLONE(r1, 0x40049409, r3) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001009, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, 0x0) 14:19:04 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x3, &(0x7f0000001fd8)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x15}}, &(0x7f0000000080)="47504c049c3514bf772da07ae82e76590a36f6493ec1ab91b397e42abf1ea6cd8cd77427fc9a9e2b7165f52b4107bf0850d899dc52d013175ddb1b2f46203c2a05b722e33e556fb2e3f39a3cde1fca53640337ec956146bdbfcb115070195631de5d21a5ea9e638c2bdb78a501ca4b6ea313d82568f9382c2c3f6faba6b4ee54793b4ed26dae3e52225029bb2ac0007f77754c3f23ceda9809b9a9684a940abcaa8cfcc7133ec422e9c83888318d41e9a493f0195fe2599651b89504f5dba14625ce2366f33d95dba92f867279cabf4aceddc85a8af7a0fa68d767ce5136b9d0d1966c499cb6bf34c2988666970000000000000000000000", 0x0, 0xff00000000000000}, 0x48) 14:19:04 executing program 2: getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) syz_mount_image$hfs(&(0x7f0000000200)='hfs\x00', &(0x7f0000000280)='./file0\x00', 0x7a00000000000000, 0x0, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 14:19:04 executing program 0: r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/expire_quiescent_template\x00', 0x2, 0x0) r1 = syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x1, 0x0) accept$inet6(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000080)=0x1c) ioctl(r1, 0xffffffffffffffb7, &(0x7f0000000080)) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000140)=@security={'security\x00', 0xe, 0x4, 0x4e0, 0x1f0, 0x320, 0x0, 0x320, 0x320, 0x438, 0x438, 0x438, 0x438, 0x438, 0x4, &(0x7f0000000100), {[{{@ipv6={@local, @local, [0x0, 0xffffff00, 0xffffffff, 0xffffff00], [0xffffffff, 0xff, 0xffffffff, 0xff], 'eql\x00', 'gretap0\x00', {}, {0xff}, 0x0, 0x7fffffff, 0x2, 0x61}, 0x0, 0x188, 0x1c8, 0x0, {}, [@common=@unspec=@conntrack2={0xc0, 'conntrack\x00', 0x2, {{@ipv4=@loopback, [0xffffffff, 0xffffffff, 0x0, 0xffffffff], @ipv4=@loopback, [0x0, 0xffffffff, 0xffffff00, 0xff000000], @ipv6=@ipv4={[], [], @remote}, [0xffffff00, 0xff000000, 0xff000000, 0xff], @ipv4=@multicast2, [0xffffffff, 0xff, 0xff0000ff], 0x3, 0x1ff, 0x4, 0x4e21, 0x4e20, 0x4e22, 0x4e20, 0x28, 0x20}, 0x1c0, 0x98}}]}, @common=@unspec=@ERROR={0x40, 'ERROR\x00', 0x0, "f650bd5c77822a55c077a2b3078812467f4ab9fefc372cf333baff203cdb"}}, {{@ipv6={@remote, @mcast2, [0xff000000, 0xffffff00, 0xffffffff, 0xff000000], [0x0, 0xff, 0xff000000, 0xffffff00], 'syzkaller0\x00', 'lo\x00', {}, {0xff}, 0x2b, 0x1, 0x2, 0x23}, 0x0, 0xf0, 0x130, 0x0, {}, [@common=@hl={0x28, 'hl\x00'}]}, @common=@inet=@TCPOPTSTRIP={0x40, 'TCPOPTSTRIP\x00', 0x0, {[0xe08d, 0x6, 0xff, 0x800, 0x2, 0x7, 0x3, 0x5]}}}, {{@uncond, 0x0, 0xf0, 0x118, 0x0, {}, [@common=@hl={0x28, 'hl\x00', 0x0, {0x3, 0x604}}]}, @common=@unspec=@STANDARD={0x28, '\x00', 0x0, 0xfffffffffffffffd}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x540) ioctl$EXT4_IOC_MIGRATE(0xffffffffffffffff, 0x6609) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000300)={0x0}, &(0x7f0000000400)=0xc) getsockopt$ARPT_SO_GET_INFO(r0, 0x0, 0x60, &(0x7f0000000740)={'filter\x00'}, &(0x7f00000007c0)=0x44) r4 = getpgrp(r3) prlimit64(r4, 0x0, &(0x7f00000004c0)={0x0, 0x7ffffd}, &(0x7f00000002c0)) lremovexattr(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000480)=@random={'trusted.', 'bpf\x00'}) getsockopt$inet_sctp_SCTP_PR_ASSOC_STATUS(0xffffffffffffffff, 0x84, 0x73, &(0x7f0000000280)={0x0, 0x8, 0x0, 0xe0}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r5 = syz_open_dev$amidi(&(0x7f0000000100)='/dev/amidi#\x00', 0x2, 0x800) recvfrom(r5, &(0x7f0000000500)=""/96, 0x60, 0x20, &(0x7f00000005c0)=@ipx={0x4, 0x1, 0x6, "6b183128f377"}, 0x80) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000200)='./file0\x00', 0x700, 0x0, &(0x7f00000024c0), 0x100032, &(0x7f00000000c0)=ANY=[@ANYBLOB]) prctl$PR_MPX_ENABLE_MANAGEMENT(0x2b) getsockopt$inet_dccp_int(0xffffffffffffffff, 0x21, 0xf, &(0x7f0000000240), 0x0) fstat(0xffffffffffffffff, &(0x7f00000006c0)) getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, &(0x7f0000000440)={0x0, 0x80}, &(0x7f00000001c0)=0xfffffffffffffd3f) ioctl$KVM_SET_CLOCK(r5, 0x4030ae7b, &(0x7f0000000680)={0x2, 0x44d2}) ioctl$FICLONE(r2, 0x40049409, r5) setgroups(0x3, &(0x7f0000000340)=[0x0, 0x0, 0x0]) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, 0x0) 14:19:04 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x3, &(0x7f0000001fd8)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x15}}, &(0x7f0000000080)="47504c049c3514bf772da07ae82e76590a36f6493ec1ab91b397e42abf1ea6cd8cd77427fc9a9e2b7165f52b4107bf0850d899dc52d013175ddb1b2f46203c2a05b722e33e556fb2e3f39a3cde1fca53640337ec956146bdbfcb115070195631de5d21a5ea9e638c2bdb78a501ca4b6ea313d82568f9382c2c3f6faba6b4ee54793b4ed26dae3e52225029bb2ac0007f77754c3f23ceda9809b9a9684a940abcaa8cfcc7133ec422e9c83888318d41e9a493f0195fe2599651b89504f5dba14625ce2366f33d95dba92f867279cabf4aceddc85a8af7a0fa68d767ce5136b9d0d1966c499cb6bf34c2988666970000000000000000000000", 0x0, 0x3}, 0x48) [ 2729.562448] hfs: can't find a HFS filesystem on dev loop2 14:19:04 executing program 2: getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) syz_mount_image$hfs(&(0x7f0000000200)='hfs\x00', &(0x7f0000000280)='./file0\x00', 0x600, 0x0, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 14:19:04 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x3, &(0x7f0000001fd8)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x15}}, &(0x7f0000000080)="47504c049c3514bf772da07ae82e76590a36f6493ec1ab91b397e42abf1ea6cd8cd77427fc9a9e2b7165f52b4107bf0850d899dc52d013175ddb1b2f46203c2a05b722e33e556fb2e3f39a3cde1fca53640337ec956146bdbfcb115070195631de5d21a5ea9e638c2bdb78a501ca4b6ea313d82568f9382c2c3f6faba6b4ee54793b4ed26dae3e52225029bb2ac0007f77754c3f23ceda9809b9a9684a940abcaa8cfcc7133ec422e9c83888318d41e9a493f0195fe2599651b89504f5dba14625ce2366f33d95dba92f867279cabf4aceddc85a8af7a0fa68d767ce5136b9d0d1966c499cb6bf34c2988666970000000000000000000000", 0x0, 0x100000}, 0x48) 14:19:04 executing program 0: r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/expire_quiescent_template\x00', 0x2, 0x0) r1 = syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x1, 0x0) accept$inet6(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000080)=0x1c) ioctl(r1, 0xffffffffffffffb7, &(0x7f0000000080)) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000140)=@security={'security\x00', 0xe, 0x4, 0x4e0, 0x1f0, 0x320, 0x0, 0x320, 0x320, 0x438, 0x438, 0x438, 0x438, 0x438, 0x4, &(0x7f0000000100), {[{{@ipv6={@local, @local, [0x0, 0xffffff00, 0xffffffff, 0xffffff00], [0xffffffff, 0xff, 0xffffffff, 0xff], 'eql\x00', 'gretap0\x00', {}, {0xff}, 0x0, 0x7fffffff, 0x2, 0x61}, 0x0, 0x188, 0x1c8, 0x0, {}, [@common=@unspec=@conntrack2={0xc0, 'conntrack\x00', 0x2, {{@ipv4=@loopback, [0xffffffff, 0xffffffff, 0x0, 0xffffffff], @ipv4=@loopback, [0x0, 0xffffffff, 0xffffff00, 0xff000000], @ipv6=@ipv4={[], [], @remote}, [0xffffff00, 0xff000000, 0xff000000, 0xff], @ipv4=@multicast2, [0xffffffff, 0xff, 0xff0000ff], 0x3, 0x1ff, 0x4, 0x4e21, 0x4e20, 0x4e22, 0x4e20, 0x28, 0x20}, 0x1c0, 0x98}}]}, @common=@unspec=@ERROR={0x40, 'ERROR\x00', 0x0, "f650bd5c77822a55c077a2b3078812467f4ab9fefc372cf333baff203cdb"}}, {{@ipv6={@remote, @mcast2, [0xff000000, 0xffffff00, 0xffffffff, 0xff000000], [0x0, 0xff, 0xff000000, 0xffffff00], 'syzkaller0\x00', 'lo\x00', {}, {0xff}, 0x2b, 0x1, 0x2, 0x23}, 0x0, 0xf0, 0x130, 0x0, {}, [@common=@hl={0x28, 'hl\x00'}]}, @common=@inet=@TCPOPTSTRIP={0x40, 'TCPOPTSTRIP\x00', 0x0, {[0xe08d, 0x6, 0xff, 0x800, 0x2, 0x7, 0x3, 0x5]}}}, {{@uncond, 0x0, 0xf0, 0x118, 0x0, {}, [@common=@hl={0x28, 'hl\x00', 0x0, {0x3, 0x604}}]}, @common=@unspec=@STANDARD={0x28, '\x00', 0x0, 0xfffffffffffffffd}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x540) ioctl$EXT4_IOC_MIGRATE(0xffffffffffffffff, 0x6609) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000300)={0x0}, &(0x7f0000000400)=0xc) getsockopt$ARPT_SO_GET_INFO(r0, 0x0, 0x60, &(0x7f0000000740)={'filter\x00'}, &(0x7f00000007c0)=0x44) r4 = getpgrp(r3) prlimit64(r4, 0x0, &(0x7f00000004c0)={0x0, 0x7ffffd}, &(0x7f00000002c0)) lremovexattr(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000480)=@random={'trusted.', 'bpf\x00'}) getsockopt$inet_sctp_SCTP_PR_ASSOC_STATUS(0xffffffffffffffff, 0x84, 0x73, &(0x7f0000000280)={0x0, 0x8, 0x0, 0xe0}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r5 = syz_open_dev$amidi(&(0x7f0000000100)='/dev/amidi#\x00', 0x2, 0x800) recvfrom(r5, &(0x7f0000000500)=""/96, 0x60, 0x20, &(0x7f00000005c0)=@ipx={0x4, 0x1, 0x6, "6b183128f377"}, 0x80) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000200)='./file0\x00', 0x700, 0x0, &(0x7f00000024c0), 0x100032, &(0x7f00000000c0)=ANY=[@ANYBLOB]) prctl$PR_MPX_ENABLE_MANAGEMENT(0x2b) getsockopt$inet_dccp_int(0xffffffffffffffff, 0x21, 0xf, &(0x7f0000000240), 0x0) fstat(0xffffffffffffffff, &(0x7f00000006c0)) getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, &(0x7f0000000440)={0x0, 0x80}, &(0x7f00000001c0)=0xfffffffffffffd3f) ioctl$KVM_SET_CLOCK(r5, 0x4030ae7b, &(0x7f0000000680)={0x2, 0x44d2}) ioctl$FICLONE(r2, 0x40049409, r5) setgroups(0x3, &(0x7f0000000340)=[0x0, 0x0, 0x0]) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, 0x0) 14:19:04 executing program 4: r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/expire_quiescent_template\x00', 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000140)=@security={'security\x00', 0xe, 0x4, 0x4b8, 0x1f0, 0x320, 0x0, 0x320, 0x320, 0x438, 0x438, 0x438, 0x438, 0x438, 0x4, &(0x7f0000000100), {[{{@ipv6={@local, @local, [0x0, 0x0, 0xffffffff, 0xffffff00], [0xffffffff, 0xff, 0xffffffff, 0xff], 'eql\x00', 'gretap0\x00', {}, {0xff}, 0x0, 0x7fffffff, 0x2, 0x61}, 0x0, 0x188, 0x1c8, 0x0, {}, [@common=@unspec=@conntrack2={0xc0, 'conntrack\x00', 0x2, {{@ipv4=@loopback, [0xffffffff, 0xffffffff, 0x0, 0xffffffff], @ipv4=@loopback, [0x0, 0xffffffff, 0xffffff00, 0xff000000], @ipv6=@ipv4={[], [], @remote}, [0xffffff00, 0xff000000, 0xff000000, 0xff], @ipv4=@multicast2, [0xffffffff, 0xff, 0xff0000ff], 0x3, 0x1ff, 0x4, 0x4e21, 0x4e20, 0x4e22, 0x4e20, 0x28}, 0x1c0, 0x98}}]}, @common=@unspec=@ERROR={0x40, 'ERROR\x00', 0x0, "f650bd5c77822a55c077a2b3078812467f4ab9fefc372cf333baff203cdb"}}, {{@ipv6={@remote, @mcast2, [0xff000000, 0xffffff00, 0xffffffff, 0xff000000], [0x0, 0xff, 0xff000000, 0xffffff00], 'syzkaller0\x00', 'lo\x00', {}, {}, 0x2b, 0x1, 0x2, 0x23}, 0x0, 0xc8, 0x108}, @common=@inet=@TCPOPTSTRIP={0x40, 'TCPOPTSTRIP\x00', 0x0, {[0xe08d, 0x6, 0xff, 0x800, 0x2, 0x7, 0x0, 0x5]}}}, {{@uncond, 0x0, 0xf0, 0x118, 0x0, {}, [@common=@hl={0x28, 'hl\x00', 0x0, {0x3, 0x604}}]}, @common=@unspec=@STANDARD={0x28, '\x00', 0x0, 0xfffffffffffffffd}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x518) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = getpgrp(0x0) prlimit64(r2, 0x0, &(0x7f00000004c0)={0x0, 0x7ffffd}, &(0x7f00000002c0)) lremovexattr(0x0, &(0x7f0000000740)=ANY=[@ANYBLOB="747275737465642e627066002a49e18052efaef3b0013c1fc7e28f2bed34878d362b646871edafbee182175a2b12547bc077c4dea906e4f40c4474ab8ce33c86842ea22d2dc136993e1bd8d6bc3b8f9ea7b73db744689b614a8dd53919f2cd00000000000000047211ffbcc0f037108e0842f5e715db0bae9bf0bb7f958cc971036487459b9fd2d9a726292734f5e49d825028cc62d3295134d422e59091a4e6d089ab2259e22b03f388"]) fstat(r1, &(0x7f0000000840)={0x0, 0x0, 0x0, 0x0, 0x0}) r4 = getuid() r5 = geteuid() r6 = geteuid() r7 = getegid() fstat(r1, &(0x7f00000008c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) stat(&(0x7f0000000940)='./file0\x00', &(0x7f0000000980)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lstat(&(0x7f0000000a00)='./file0\x00', &(0x7f0000000a40)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getresgid(&(0x7f0000000ac0)=0x0, &(0x7f0000000b00), &(0x7f0000000b40)) r12 = getegid() lsetxattr$system_posix_acl(&(0x7f0000000680)='./file0\x00', &(0x7f0000000800)='system.posix_acl_default\x00', &(0x7f0000000b80)={{}, {0x1, 0x2}, [{0x2, 0x1, r3}, {0x2, 0x4, r4}, {0x2, 0x2, r5}, {0x2, 0x7, r6}], {0x4, 0x3}, [{0x8, 0x7, r7}, {0x8, 0x1, r8}, {0x8, 0x4, r9}, {0x8, 0x5, r10}, {0x8, 0x3, r11}, {0x8, 0x3, r12}], {0x10, 0x2}, {0x20, 0x4}}, 0x74, 0x1) getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, &(0x7f0000000c00)={0x401, 0x3f, 0x8001, 0x5, 0x5, 0x8001, 0x3f, 0x6}, &(0x7f0000000c40)=0x20) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(r0, 0x84, 0xf, &(0x7f0000000c80)={0x0, @in6={{0xa, 0x4e22, 0x1, @mcast2, 0xb10}}, 0x4, 0x3, 0x0, 0xffffffffffffffe1}, &(0x7f0000000d40)=0x98) getsockopt$inet_sctp_SCTP_PR_ASSOC_STATUS(0xffffffffffffffff, 0x84, 0x73, &(0x7f0000000280)={r13}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r14 = syz_open_dev$amidi(&(0x7f0000000100)='/dev/amidi#\x00', 0x2, 0x800) recvfrom(0xffffffffffffffff, 0x0, 0x0, 0x20, &(0x7f00000005c0)=@ipx={0x4, 0x1, 0x6, "6b183128f377"}, 0x80) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000200)='./file0\x00', 0x700, 0x0, &(0x7f00000024c0), 0x100032, &(0x7f00000000c0)=ANY=[@ANYBLOB]) getsockopt$inet_dccp_int(0xffffffffffffffff, 0x21, 0xf, &(0x7f0000000240), 0x0) fstat(0xffffffffffffffff, &(0x7f00000006c0)) getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, &(0x7f0000000440)={0x0, 0x80}, &(0x7f00000001c0)=0xfffffffffffffd3f) ioctl$FICLONE(r1, 0x40049409, r14) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, 0x0) [ 2729.926883] hfs: can't find a HFS filesystem on dev loop2 14:19:04 executing program 3: r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/expire_quiescent_template\x00', 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000140)=@security={'security\x00', 0xe, 0x4, 0x4e0, 0x1f0, 0x320, 0x0, 0x320, 0x320, 0x438, 0x438, 0x438, 0x438, 0x438, 0x4, &(0x7f0000000100), {[{{@ipv6={@local, @local, [0x0, 0xffffff00, 0xffffffff, 0xffffff00], [0xffffffff, 0xff, 0xffffffff, 0xff], 'eql\x00', 'gretap0\x00', {}, {0xff}, 0x0, 0x7fffffff, 0x2, 0x61}, 0x0, 0x188, 0x1c8, 0x0, {}, [@common=@unspec=@conntrack2={0xc0, 'conntrack\x00', 0x2, {{@ipv4=@loopback, [0xffffffff, 0xffffffff, 0x0, 0xffffffff], @ipv4=@loopback, [0x0, 0xffffffff, 0xffffff00, 0xff000000], @ipv6=@ipv4={[], [], @remote}, [0xffffff00, 0xff000000, 0xff000000, 0xff], @ipv4=@multicast2, [0xffffffff, 0xff, 0xff0000ff], 0x3, 0x1ff, 0x4, 0x4e21, 0x4e20, 0x4e22, 0x4e20, 0x28, 0x20}, 0x1c0, 0x98}}]}, @common=@unspec=@ERROR={0x40, 'ERROR\x00', 0x0, "f650bd5c77822a55c077a2b3078812467f4ab9fefc372cf333baff203cdb"}}, {{@ipv6={@remote, @mcast2, [0xff000000, 0xffffff00, 0xffffffff, 0xff000000], [0x0, 0xff, 0xff000000, 0xffffff00], 'syzkaller0\x00', 'lo\x00', {}, {0xff}, 0x2b, 0x1, 0x2, 0x23}, 0x0, 0xf0, 0x130, 0x0, {}, [@common=@hl={0x28, 'hl\x00'}]}, @common=@inet=@TCPOPTSTRIP={0x40, 'TCPOPTSTRIP\x00', 0x0, {[0xe08d, 0x6, 0xff, 0x800, 0x2, 0x7, 0x3, 0x5]}}}, {{@uncond, 0x0, 0xf0, 0x118, 0x0, {}, [@common=@hl={0x28, 'hl\x00', 0x0, {0x3, 0x604}}]}, @common=@unspec=@STANDARD={0x28, '\x00', 0x0, 0xfffffffffffffffd}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x540) ioctl$EXT4_IOC_MIGRATE(0xffffffffffffffff, 0x6609) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000300)={0x0}, &(0x7f0000000400)=0xc) getsockopt$ARPT_SO_GET_INFO(r0, 0x0, 0x60, &(0x7f0000000740)={'filter\x00'}, &(0x7f00000007c0)=0x44) r3 = getpgrp(r2) prlimit64(r3, 0x0, &(0x7f00000004c0)={0x0, 0x7ffffd}, &(0x7f00000002c0)) lremovexattr(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000480)=@random={'trusted.', 'bpf\x00'}) getsockopt$inet_sctp_SCTP_PR_ASSOC_STATUS(0xffffffffffffffff, 0x84, 0x73, &(0x7f0000000280)={0x0, 0x8, 0x0, 0xe0}, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_LOCK(r0, 0x40405514, &(0x7f0000000680)={0x4, 0x6, 0x8, 0x3, 'syz0\x00', 0x800}) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r4 = syz_open_dev$amidi(&(0x7f0000000100)='/dev/amidi#\x00', 0x2, 0x800) recvfrom(r4, &(0x7f0000000500)=""/96, 0x60, 0x20, &(0x7f00000005c0)=@ipx={0x4, 0x1, 0x6, "6b183128f377"}, 0x80) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000200)='./file0\x00', 0x700, 0x0, &(0x7f00000024c0), 0x100032, &(0x7f00000000c0)=ANY=[@ANYBLOB]) prctl$PR_MPX_ENABLE_MANAGEMENT(0x2b) getsockopt$inet_dccp_int(0xffffffffffffffff, 0x21, 0xf, &(0x7f0000000240), 0x0) fstat(0xffffffffffffffff, &(0x7f00000006c0)) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000840)={&(0x7f0000000800)='./file0\x00', 0x0, 0x8}, 0x10) getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, &(0x7f0000000440)={0x0, 0x80}, &(0x7f00000001c0)=0xfffffffffffffd3f) ioctl$FICLONE(r1, 0x40049409, r4) setgroups(0x3, &(0x7f0000000340)=[0x0, 0x0, 0x0]) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, 0x0) 14:19:04 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x3, &(0x7f0000001fd8)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x15}}, &(0x7f0000000080)="47504c049c3514bf772da07ae82e76590a36f6493ec1ab91b397e42abf1ea6cd8cd77427fc9a9e2b7165f52b4107bf0850d899dc52d013175ddb1b2f46203c2a05b722e33e556fb2e3f39a3cde1fca53640337ec956146bdbfcb115070195631de5d21a5ea9e638c2bdb78a501ca4b6ea313d82568f9382c2c3f6faba6b4ee54793b4ed26dae3e52225029bb2ac0007f77754c3f23ceda9809b9a9684a940abcaa8cfcc7133ec422e9c83888318d41e9a493f0195fe2599651b89504f5dba14625ce2366f33d95dba92f867279cabf4aceddc85a8af7a0fa68d767ce5136b9d0d1966c499cb6bf34c2988666970000000000000000000000", 0x0, 0x3000000}, 0x48) 14:19:04 executing program 1: r0 = memfd_create(&(0x7f0000000900)='/dev/dsp#\x00', 0x4) ioctl$KVM_GET_PIT2(r0, 0x8070ae9f, &(0x7f0000000940)) r1 = syz_open_dev$dspn(&(0x7f0000000840)='/dev/dsp#\x00', 0x0, 0x20000) getsockopt$inet_sctp_SCTP_AUTOCLOSE(r1, 0x84, 0x4, &(0x7f0000000880), &(0x7f00000008c0)=0x4) r2 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/expire_quiescent_template\x00', 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r2, 0x29, 0x40, &(0x7f0000000140)=ANY=[@ANYBLOB="73656375726974790000000000000000000000000000000000000000000000000e00000004000000e0040000f001000020030000000000002003000020030000380400003804000038040000380400003804000004000000", @ANYPTR=&(0x7f00000009c0)=ANY=[@ANYBLOB="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"], @ANYBLOB="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"], 0x540) mq_open(&(0x7f0000000680)='\x00', 0x1, 0x90, &(0x7f0000000800)={0x7f, 0xffffffffffff1549, 0x1000, 0x81, 0x80, 0x1d, 0x2, 0x3f}) ioctl$EXT4_IOC_MIGRATE(0xffffffffffffffff, 0x6609) r3 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000300)={0x0}, &(0x7f0000000400)=0xc) getsockopt$ARPT_SO_GET_INFO(r2, 0x0, 0x60, &(0x7f0000000740)={'filter\x00'}, &(0x7f00000007c0)=0x44) r5 = getpgrp(r4) prlimit64(r5, 0x0, &(0x7f00000004c0)={0x0, 0x7ffffd}, &(0x7f00000002c0)) lremovexattr(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000480)=@random={'trusted.', 'bpf\x00'}) getsockopt$inet_sctp_SCTP_PR_ASSOC_STATUS(0xffffffffffffffff, 0x84, 0x73, &(0x7f0000000280)={0x0, 0x8, 0x0, 0xe0}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r6 = syz_open_dev$amidi(&(0x7f0000000100)='/dev/amidi#\x00', 0x2, 0x800) recvfrom(r6, &(0x7f0000000500)=""/96, 0x60, 0x20, &(0x7f00000005c0)=@ipx={0x4, 0x1, 0x6, "6b183128f377"}, 0x80) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000200)='./file0\x00', 0x700, 0x0, &(0x7f00000024c0), 0x100032, &(0x7f00000000c0)=ANY=[@ANYBLOB]) prctl$PR_MPX_ENABLE_MANAGEMENT(0x2b) ioctl$UI_SET_LEDBIT(r6, 0x40045569, 0x5) getsockopt$inet_dccp_int(0xffffffffffffffff, 0x21, 0xf, &(0x7f0000000240), 0x0) fstat(0xffffffffffffffff, &(0x7f00000006c0)) getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, &(0x7f0000000440)={0x0, 0x80}, &(0x7f00000001c0)=0xfffffffffffffd3f) ioctl$FICLONE(r3, 0x40049409, r6) setgroups(0x3, &(0x7f0000000340)=[0x0, 0x0, 0x0]) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, 0x0) [ 2730.104579] hfs: can't find a HFS filesystem on dev loop2 14:19:05 executing program 2: getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) syz_mount_image$hfs(&(0x7f0000000200)='hfs\x00', &(0x7f0000000280)='./file0\x00', 0x10000000, 0x0, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 14:19:05 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x3, &(0x7f0000001fd8)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x15}}, &(0x7f0000000080)="47504c049c3514bf772da07ae82e76590a36f6493ec1ab91b397e42abf1ea6cd8cd77427fc9a9e2b7165f52b4107bf0850d899dc52d013175ddb1b2f46203c2a05b722e33e556fb2e3f39a3cde1fca53640337ec956146bdbfcb115070195631de5d21a5ea9e638c2bdb78a501ca4b6ea313d82568f9382c2c3f6faba6b4ee54793b4ed26dae3e52225029bb2ac0007f77754c3f23ceda9809b9a9684a940abcaa8cfcc7133ec422e9c83888318d41e9a493f0195fe2599651b89504f5dba14625ce2366f33d95dba92f867279cabf4aceddc85a8af7a0fa68d767ce5136b9d0d1966c499cb6bf34c2988666970000000000000000000000", 0x0, 0xffffffff00000000}, 0x48) 14:19:05 executing program 0: r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/expire_quiescent_template\x00', 0x2, 0x0) r1 = syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x1, 0x0) accept$inet6(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000080)=0x1c) ioctl(r1, 0xffffffffffffffb7, &(0x7f0000000080)) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000140)=@security={'security\x00', 0xe, 0x4, 0x4e0, 0x1f0, 0x320, 0x0, 0x320, 0x320, 0x438, 0x438, 0x438, 0x438, 0x438, 0x4, &(0x7f0000000100), {[{{@ipv6={@local, @local, [0x0, 0xffffff00, 0xffffffff, 0xffffff00], [0xffffffff, 0xff, 0xffffffff, 0xff], 'eql\x00', 'gretap0\x00', {}, {0xff}, 0x0, 0x7fffffff, 0x2, 0x61}, 0x0, 0x188, 0x1c8, 0x0, {}, [@common=@unspec=@conntrack2={0xc0, 'conntrack\x00', 0x2, {{@ipv4=@loopback, [0xffffffff, 0xffffffff, 0x0, 0xffffffff], @ipv4=@loopback, [0x0, 0xffffffff, 0xffffff00, 0xff000000], @ipv6=@ipv4={[], [], @remote}, [0xffffff00, 0xff000000, 0xff000000, 0xff], @ipv4=@multicast2, [0xffffffff, 0xff, 0xff0000ff], 0x3, 0x1ff, 0x4, 0x4e21, 0x4e20, 0x4e22, 0x4e20, 0x28, 0x20}, 0x1c0, 0x98}}]}, @common=@unspec=@ERROR={0x40, 'ERROR\x00', 0x0, "f650bd5c77822a55c077a2b3078812467f4ab9fefc372cf333baff203cdb"}}, {{@ipv6={@remote, @mcast2, [0xff000000, 0xffffff00, 0xffffffff, 0xff000000], [0x0, 0xff, 0xff000000, 0xffffff00], 'syzkaller0\x00', 'lo\x00', {}, {0xff}, 0x2b, 0x1, 0x2, 0x23}, 0x0, 0xf0, 0x130, 0x0, {}, [@common=@hl={0x28, 'hl\x00'}]}, @common=@inet=@TCPOPTSTRIP={0x40, 'TCPOPTSTRIP\x00', 0x0, {[0xe08d, 0x6, 0xff, 0x800, 0x2, 0x7, 0x3, 0x5]}}}, {{@uncond, 0x0, 0xf0, 0x118, 0x0, {}, [@common=@hl={0x28, 'hl\x00', 0x0, {0x3, 0x604}}]}, @common=@unspec=@STANDARD={0x28, '\x00', 0x0, 0xfffffffffffffffd}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x540) ioctl$EXT4_IOC_MIGRATE(0xffffffffffffffff, 0x6609) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000300)={0x0}, &(0x7f0000000400)=0xc) getsockopt$ARPT_SO_GET_INFO(r0, 0x0, 0x60, &(0x7f0000000740)={'filter\x00'}, &(0x7f00000007c0)=0x44) r4 = getpgrp(r3) prlimit64(r4, 0x0, &(0x7f00000004c0)={0x0, 0x7ffffd}, &(0x7f00000002c0)) lremovexattr(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000480)=@random={'trusted.', 'bpf\x00'}) getsockopt$inet_sctp_SCTP_PR_ASSOC_STATUS(0xffffffffffffffff, 0x84, 0x73, &(0x7f0000000280)={0x0, 0x8, 0x0, 0xe0}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r5 = syz_open_dev$amidi(&(0x7f0000000100)='/dev/amidi#\x00', 0x2, 0x800) recvfrom(r5, &(0x7f0000000500)=""/96, 0x60, 0x20, &(0x7f00000005c0)=@ipx={0x4, 0x1, 0x6, "6b183128f377"}, 0x80) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000200)='./file0\x00', 0x700, 0x0, &(0x7f00000024c0), 0x100032, &(0x7f00000000c0)=ANY=[@ANYBLOB]) prctl$PR_MPX_ENABLE_MANAGEMENT(0x2b) getsockopt$inet_dccp_int(0xffffffffffffffff, 0x21, 0xf, &(0x7f0000000240), 0x0) fstat(0xffffffffffffffff, &(0x7f00000006c0)) getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, &(0x7f0000000440)={0x0, 0x80}, &(0x7f00000001c0)=0xfffffffffffffd3f) ioctl$KVM_SET_CLOCK(r5, 0x4030ae7b, &(0x7f0000000680)={0x2, 0x44d2}) ioctl$FICLONE(r2, 0x40049409, r5) setgroups(0x3, &(0x7f0000000340)=[0x0, 0x0, 0x0]) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, 0x0) [ 2730.403336] hfs: can't find a HFS filesystem on dev loop2 14:19:05 executing program 4: r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/backup_only\x00', 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f00000007c0)=ANY=[@ANYBLOB="73656375726974790000000000000000000000000000000000000000000000000e00000004000000b8040000f001000000000000200300002003000038040000380400003804000038040000380400000400000000000000ac80c3ab11969dedb95037b2f0f5df47eb219710240c31693c01e014f0b7f7aeba9ebb6b60f77e12bc1c72f6f4b4326f708a58d0f68b1fe698532e5be3c2cd717dcb3f9045412deb6c547af73ac862ead290bd21adb8b81e08971e7cde35cc66890677c2e9452576", @ANYPTR=&(0x7f0000000100)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00'], @ANYBLOB="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"], 0x518) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = getpgrp(0x0) prlimit64(r2, 0x0, &(0x7f00000004c0)={0x0, 0x7ffffd}, &(0x7f00000002c0)) lremovexattr(0x0, &(0x7f0000000480)=@random={'trusted.', 'bpf\x00'}) openat$vsock(0xffffffffffffff9c, &(0x7f0000000680)='/dev/vsock\x00', 0x20000, 0x0) getsockopt$inet_sctp_SCTP_PR_ASSOC_STATUS(0xffffffffffffffff, 0x84, 0x73, &(0x7f0000000280), 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r3 = syz_open_dev$amidi(&(0x7f0000000100)='/dev/amidi#\x00', 0x2, 0x800) recvfrom(0xffffffffffffffff, 0x0, 0x0, 0x20, &(0x7f00000005c0)=@ipx={0x4, 0x1, 0x6, "6b183128f377"}, 0x80) mount$bpf(0x20000000, &(0x7f0000000180)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000200)='./file0\x00', 0x700, 0x0, &(0x7f00000024c0), 0x100032, &(0x7f0000000740)=ANY=[@ANYBLOB="ca9c23767ee390f33d2e125797d869173cd8efb70bc3c782e1786cc9422ac0193c5a0834541ba26e54b318007846f751e025714886e81c1790711c0ee256dacac3f7e086b3381c851e7debb1dc02c8204663920decaa1a2573ff7ffb1fe9a9d35c59654dedd0815237ff103a6e57a4a0b6b0b87f143c605287143f2aeb7a"]) getsockopt$inet_dccp_int(0xffffffffffffffff, 0x21, 0xf, &(0x7f0000000240), 0x0) fstat(0xffffffffffffffff, &(0x7f00000006c0)) getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, &(0x7f0000000440)={0x0, 0x80}, &(0x7f00000001c0)=0xfffffffffffffd3f) ioctl$FICLONE(r1, 0x40049409, r3) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, 0x0) 14:19:05 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x3, &(0x7f0000001fd8)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x15}}, &(0x7f0000000080)="47504c049c3514bf772da07ae82e76590a36f6493ec1ab91b397e42abf1ea6cd8cd77427fc9a9e2b7165f52b4107bf0850d899dc52d013175ddb1b2f46203c2a05b722e33e556fb2e3f39a3cde1fca53640337ec956146bdbfcb115070195631de5d21a5ea9e638c2bdb78a501ca4b6ea313d82568f9382c2c3f6faba6b4ee54793b4ed26dae3e52225029bb2ac0007f77754c3f23ceda9809b9a9684a940abcaa8cfcc7133ec422e9c83888318d41e9a493f0195fe2599651b89504f5dba14625ce2366f33d95dba92f867279cabf4aceddc85a8af7a0fa68d767ce5136b9d0d1966c499cb6bf34c2988666970000000000000000000000", 0x0, 0xa000000}, 0x48) [ 2730.578443] hfs: can't find a HFS filesystem on dev loop2 14:19:05 executing program 1: r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/expire_quiescent_template\x00', 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000140)=@security={'security\x00', 0xe, 0x4, 0x4e0, 0x1f0, 0x320, 0x0, 0x320, 0x320, 0x438, 0x438, 0x438, 0x438, 0x438, 0x4, &(0x7f0000000100), {[{{@ipv6={@local, @local, [0x0, 0xffffff00, 0xffffffff, 0xffffff00], [0xffffffff, 0xff, 0xffffffff, 0xff], 'eql\x00', 'gretap0\x00', {}, {0xff}, 0x0, 0x7fffffff, 0x2, 0x61}, 0x0, 0x188, 0x1c8, 0x0, {}, [@common=@unspec=@conntrack2={0xc0, 'conntrack\x00', 0x2, {{@ipv4=@loopback, [0xffffffff, 0xffffffff, 0x0, 0xffffffff], @ipv4=@loopback, [0x0, 0xffffffff, 0xffffff00, 0xff000000], @ipv6=@ipv4={[], [], @remote}, [0xffffff00, 0xff000000, 0xff000000, 0xff], @ipv4=@multicast2, [0xffffffff, 0xff, 0xff0000ff], 0x3, 0x1ff, 0x4, 0x4e21, 0x4e20, 0x4e22, 0x4e20, 0x28, 0x20}, 0x1c0, 0x98}}]}, @common=@unspec=@ERROR={0x40, 'ERROR\x00', 0x0, "f650bd5c77822a55c077a2b3078812467f4ab9fefc372cf333baff203cdb"}}, {{@ipv6={@remote, @mcast2, [0xff000000, 0xffffff00, 0xffffffff, 0xff000000], [0x0, 0xff, 0xff000000, 0xffffff00], 'syzkaller0\x00', 'lo\x00', {}, {0xff}, 0x2b, 0x1, 0x2, 0x23}, 0x0, 0xf0, 0x130, 0x0, {}, [@common=@hl={0x28, 'hl\x00'}]}, @common=@inet=@TCPOPTSTRIP={0x40, 'TCPOPTSTRIP\x00', 0x0, {[0xe08d, 0x6, 0xff, 0x800, 0x2, 0x7, 0x3, 0x5]}}}, {{@uncond, 0x0, 0xf0, 0x118, 0x0, {}, [@common=@hl={0x28, 'hl\x00', 0x0, {0x3, 0x604}}]}, @common=@unspec=@STANDARD={0x28, '\x00', 0x0, 0xfffffffffffffffd}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x540) ioctl$EXT4_IOC_MIGRATE(0xffffffffffffffff, 0x6609) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000300)={0x0}, &(0x7f0000000400)=0xc) getsockopt$ARPT_SO_GET_INFO(r0, 0x0, 0x60, &(0x7f0000000740)={'filter\x00'}, &(0x7f00000007c0)=0x44) r3 = getpgrp(r2) prlimit64(r3, 0x0, &(0x7f00000004c0)={0x0, 0x7ffffd}, &(0x7f00000002c0)) lremovexattr(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000480)=@random={'trusted.', 'bpf\x00'}) getsockopt$inet_sctp_SCTP_PR_ASSOC_STATUS(0xffffffffffffffff, 0x84, 0x73, &(0x7f0000000280)={0x0, 0x8, 0x0, 0xe0}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r4 = syz_open_dev$amidi(&(0x7f0000000100)='/dev/amidi#\x00', 0x2, 0x800) recvfrom(r4, &(0x7f0000000500)=""/96, 0x60, 0x20, &(0x7f00000005c0)=@ipx={0x4, 0x1, 0x6, "6b183128f377"}, 0x80) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000200)='./file0\x00', 0x700, 0x0, &(0x7f00000024c0), 0x100032, &(0x7f00000000c0)=ANY=[@ANYBLOB]) setsockopt$inet_sctp_SCTP_RECVRCVINFO(r4, 0x84, 0x20, &(0x7f0000000680)=0x9, 0x4) prctl$PR_MPX_ENABLE_MANAGEMENT(0x2b) getsockopt$inet_dccp_int(0xffffffffffffffff, 0x21, 0xf, &(0x7f0000000240), 0x0) fstat(0xffffffffffffffff, &(0x7f00000006c0)) getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, &(0x7f0000000440)={0x0, 0x80}, &(0x7f00000001c0)=0xfffffffffffffd3f) ioctl$FICLONE(r1, 0x40049409, r4) setgroups(0x3, &(0x7f0000000800)=[0x0, 0x0, 0x0]) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, 0x0) 14:19:05 executing program 2: getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) syz_mount_image$hfs(&(0x7f0000000200)='hfs\x00', &(0x7f0000000280)='./file0\x00', 0xfffffffb, 0x0, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 14:19:05 executing program 3: lstat(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0}) lstat(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0}) syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000040)='./file0\x00', 0xb102b8700, 0x3, &(0x7f0000000240)=[{&(0x7f0000000080)="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", 0xfc, 0x8}, {&(0x7f0000000180)="6e4fae343fcbe75f750edab4ffe869cf59917854f4c0064b2fefb89db71f83a1dbd85e8720426ce6dac8c1d994bda6e76d23aafb8234e65dd6ce69b85ba473a42f9a10", 0x43, 0x3ff}, {&(0x7f0000000200)="0cf1e6962e8e09a410cd9d6a8b06436370074e01970a", 0x16, 0xf453}], 0x10000, &(0x7f0000000440)={[{@quota_off='quota=off'}, {@noloccookie='noloccookie'}, {@quota_quantum={'quota_quantum', 0x3d, 0x7fffffff}}, {@rgrplvb='rgrplvb'}, {@rgrplvb='rgrplvb'}], [{@smackfshat={'smackfshat', 0x3d, "7db3706f7369785f61636c5f6163636573732e"}}, {@fowner_lt={'fowner<', r0}}, {@smackfsroot={'smackfsroot'}}, {@fsuuid={'fsuuid', 0x3d, {[0x62, 0x7d, 0x32, 0x66, 0x32, 0x38, 0x77, 0x77], 0x2d, [0x37, 0x38, 0x77, 0x77], 0x2d, [0x66, 0x62, 0x73, 0x7d], 0x2d, [0x33, 0x36, 0x67, 0x30], 0x2d, [0x36, 0x63, 0x67, 0x54a07f1fb49ecd59, 0x38, 0x77, 0x77, 0x7f]}}}, {@fowner_lt={'fowner<', r1}}, {@obj_user={'obj_user', 0x3d, 'self^md5sum'}}, {@smackfstransmute={'smackfstransmute', 0x3d, '[-/em0'}}, {@obj_type={'obj_type', 0x3d, '\':/{vboxnet1em0selinuxsecurityvmnet1.'}}]}) clone(0xc2b321c6db9081df, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 14:19:05 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x3, &(0x7f0000001fd8)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x15}}, &(0x7f0000000080)="47504c049c3514bf772da07ae82e76590a36f6493ec1ab91b397e42abf1ea6cd8cd77427fc9a9e2b7165f52b4107bf0850d899dc52d013175ddb1b2f46203c2a05b722e33e556fb2e3f39a3cde1fca53640337ec956146bdbfcb115070195631de5d21a5ea9e638c2bdb78a501ca4b6ea313d82568f9382c2c3f6faba6b4ee54793b4ed26dae3e52225029bb2ac0007f77754c3f23ceda9809b9a9684a940abcaa8cfcc7133ec422e9c83888318d41e9a493f0195fe2599651b89504f5dba14625ce2366f33d95dba92f867279cabf4aceddc85a8af7a0fa68d767ce5136b9d0d1966c499cb6bf34c2988666970000000000000000000000", 0x0, 0x4300}, 0x48) [ 2730.890624] hfs: can't find a HFS filesystem on dev loop2 14:19:05 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x3, &(0x7f0000001fd8)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x15}}, &(0x7f0000000080)="47504c049c3514bf772da07ae82e76590a36f6493ec1ab91b397e42abf1ea6cd8cd77427fc9a9e2b7165f52b4107bf0850d899dc52d013175ddb1b2f46203c2a05b722e33e556fb2e3f39a3cde1fca53640337ec956146bdbfcb115070195631de5d21a5ea9e638c2bdb78a501ca4b6ea313d82568f9382c2c3f6faba6b4ee54793b4ed26dae3e52225029bb2ac0007f77754c3f23ceda9809b9a9684a940abcaa8cfcc7133ec422e9c83888318d41e9a493f0195fe2599651b89504f5dba14625ce2366f33d95dba92f867279cabf4aceddc85a8af7a0fa68d767ce5136b9d0d1966c499cb6bf34c2988666970000000000000000000000", 0x0, 0x80ffff00000000}, 0x48) [ 2730.987673] hfs: can't find a HFS filesystem on dev loop2 14:19:05 executing program 0: r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/expire_quiescent_template\x00', 0x2, 0x0) r1 = syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x1, 0x0) accept$inet6(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000080)=0x1c) ioctl(r1, 0xffffffffffffffb7, &(0x7f0000000080)) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000140)=@security={'security\x00', 0xe, 0x4, 0x4e0, 0x1f0, 0x320, 0x0, 0x320, 0x320, 0x438, 0x438, 0x438, 0x438, 0x438, 0x4, &(0x7f0000000100), {[{{@ipv6={@local, @local, [0x0, 0xffffff00, 0xffffffff, 0xffffff00], [0xffffffff, 0xff, 0xffffffff, 0xff], 'eql\x00', 'gretap0\x00', {}, {0xff}, 0x0, 0x7fffffff, 0x2, 0x61}, 0x0, 0x188, 0x1c8, 0x0, {}, [@common=@unspec=@conntrack2={0xc0, 'conntrack\x00', 0x2, {{@ipv4=@loopback, [0xffffffff, 0xffffffff, 0x0, 0xffffffff], @ipv4=@loopback, [0x0, 0xffffffff, 0xffffff00, 0xff000000], @ipv6=@ipv4={[], [], @remote}, [0xffffff00, 0xff000000, 0xff000000, 0xff], @ipv4=@multicast2, [0xffffffff, 0xff, 0xff0000ff], 0x3, 0x1ff, 0x4, 0x4e21, 0x4e20, 0x4e22, 0x4e20, 0x28, 0x20}, 0x1c0, 0x98}}]}, @common=@unspec=@ERROR={0x40, 'ERROR\x00', 0x0, "f650bd5c77822a55c077a2b3078812467f4ab9fefc372cf333baff203cdb"}}, {{@ipv6={@remote, @mcast2, [0xff000000, 0xffffff00, 0xffffffff, 0xff000000], [0x0, 0xff, 0xff000000, 0xffffff00], 'syzkaller0\x00', 'lo\x00', {}, {0xff}, 0x2b, 0x1, 0x2, 0x23}, 0x0, 0xf0, 0x130, 0x0, {}, [@common=@hl={0x28, 'hl\x00'}]}, @common=@inet=@TCPOPTSTRIP={0x40, 'TCPOPTSTRIP\x00', 0x0, {[0xe08d, 0x6, 0xff, 0x800, 0x2, 0x7, 0x3, 0x5]}}}, {{@uncond, 0x0, 0xf0, 0x118, 0x0, {}, [@common=@hl={0x28, 'hl\x00', 0x0, {0x3, 0x604}}]}, @common=@unspec=@STANDARD={0x28, '\x00', 0x0, 0xfffffffffffffffd}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x540) ioctl$EXT4_IOC_MIGRATE(0xffffffffffffffff, 0x6609) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000300)={0x0}, &(0x7f0000000400)=0xc) getsockopt$ARPT_SO_GET_INFO(r0, 0x0, 0x60, &(0x7f0000000740)={'filter\x00'}, &(0x7f00000007c0)=0x44) r4 = getpgrp(r3) prlimit64(r4, 0x0, &(0x7f00000004c0)={0x0, 0x7ffffd}, &(0x7f00000002c0)) lremovexattr(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000480)=@random={'trusted.', 'bpf\x00'}) getsockopt$inet_sctp_SCTP_PR_ASSOC_STATUS(0xffffffffffffffff, 0x84, 0x73, &(0x7f0000000280)={0x0, 0x8, 0x0, 0xe0}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r5 = syz_open_dev$amidi(&(0x7f0000000100)='/dev/amidi#\x00', 0x2, 0x800) recvfrom(r5, &(0x7f0000000500)=""/96, 0x60, 0x20, &(0x7f00000005c0)=@ipx={0x4, 0x1, 0x6, "6b183128f377"}, 0x80) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000200)='./file0\x00', 0x700, 0x0, &(0x7f00000024c0), 0x100032, &(0x7f00000000c0)=ANY=[@ANYBLOB]) prctl$PR_MPX_ENABLE_MANAGEMENT(0x2b) getsockopt$inet_dccp_int(0xffffffffffffffff, 0x21, 0xf, &(0x7f0000000240), 0x0) fstat(0xffffffffffffffff, &(0x7f00000006c0)) getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, &(0x7f0000000440)={0x0, 0x80}, &(0x7f00000001c0)=0xfffffffffffffd3f) ioctl$KVM_SET_CLOCK(r5, 0x4030ae7b, &(0x7f0000000680)={0x2, 0x44d2}) ioctl$FICLONE(r2, 0x40049409, r5) setgroups(0x3, &(0x7f0000000340)=[0x0, 0x0, 0x0]) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) 14:19:06 executing program 2: getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) syz_mount_image$hfs(&(0x7f0000000200)='hfs\x00', &(0x7f0000000280)='./file0\x00', 0x23, 0x0, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) [ 2731.075769] gfs2: invalid mount option: fowner<00000000000000000000 14:19:06 executing program 4: r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/expire_quiescent_template\x00', 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000140)=@security={'security\x00', 0xe, 0x4, 0x4b8, 0x1f0, 0x320, 0x0, 0x320, 0x320, 0x438, 0x438, 0x438, 0x438, 0x438, 0x4, &(0x7f0000000100), {[{{@ipv6={@local, @local, [0x0, 0x0, 0xffffffff, 0xffffff00], [0xffffffff, 0xff, 0xffffffff, 0xff], 'eql\x00', 'gretap0\x00', {}, {0xff}, 0x0, 0x7fffffff, 0x2, 0x61}, 0x0, 0x188, 0x1c8, 0x0, {}, [@common=@unspec=@conntrack2={0xc0, 'conntrack\x00', 0x2, {{@ipv4=@loopback, [0xffffffff, 0xffffffff, 0x0, 0xffffffff], @ipv4=@loopback, [0x0, 0xffffffff, 0xffffff00, 0xff000000], @ipv6=@ipv4={[], [], @remote}, [0xffffff00, 0xff000000, 0xff000000, 0xff], @ipv4=@multicast2, [0xffffffff, 0xff, 0xff0000ff], 0x3, 0x1ff, 0x4, 0x4e21, 0x4e20, 0x4e22, 0x4e20, 0x28}, 0x1c0, 0x98}}]}, @common=@unspec=@ERROR={0x40, 'ERROR\x00', 0x0, "f650bd5c77822a55c077a2b3078812467f4ab9fefc372cf333baff203cdb"}}, {{@ipv6={@remote, @mcast2, [0xff000000, 0xffffff00, 0xffffffff, 0xff000000], [0x0, 0xff, 0xff000000, 0xffffff00], 'syzkaller0\x00', 'lo\x00', {}, {}, 0x2b, 0x1, 0x2, 0x23}, 0x0, 0xc8, 0x108}, @common=@inet=@TCPOPTSTRIP={0x40, 'TCPOPTSTRIP\x00', 0x0, {[0xe08d, 0x6, 0xff, 0x800, 0x2, 0x7, 0x0, 0x5]}}}, {{@uncond, 0x0, 0xf0, 0x118, 0x0, {}, [@common=@hl={0x28, 'hl\x00', 0x0, {0x3, 0x604}}]}, @common=@unspec=@STANDARD={0x28, '\x00', 0x0, 0xfffffffffffffffd}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x518) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = getpgrp(0x0) prlimit64(r2, 0x0, &(0x7f00000004c0)={0x0, 0x7ffffd}, &(0x7f00000002c0)) lremovexattr(0x0, &(0x7f0000000480)=@random={'trusted.', 'bpf\x00'}) getsockopt$inet_sctp_SCTP_PR_ASSOC_STATUS(0xffffffffffffffff, 0x84, 0x73, &(0x7f0000000280), 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r3 = syz_open_dev$amidi(&(0x7f0000000100)='/dev/amidi#\x00', 0x2, 0x800) recvfrom(0xffffffffffffffff, 0x0, 0x0, 0x20, &(0x7f00000005c0)=@ipx={0x4, 0x1, 0x6, "6b183128f377"}, 0x80) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000200)='./file0\x00', 0x700, 0x0, &(0x7f00000024c0), 0x100032, &(0x7f00000000c0)=ANY=[@ANYBLOB]) getsockopt$inet_dccp_int(0xffffffffffffffff, 0x21, 0xf, &(0x7f0000000240), 0x0) io_setup(0x1f, &(0x7f0000000680)=0x0) io_cancel(r4, &(0x7f0000000840)={0x0, 0x0, 0x0, 0x1, 0x0, r1, &(0x7f0000000740)="362e23d7ed09d3692bf8dff2141743c679acfde951d255627f48a70f8f59b5602cb3ae2f8885f3abe0a9145539a1cfc7ad7eaff81f1800e3dafd9e813d7600740ca05366e36ab95e83c40e13268cbeff5293e699bca61db98895a57d233023109b73d88a47964ede4b828ec7fb5b598d6cfb71072654297831425249da5a9bca58aefcfea8ffac4e5010b8d9c6137d08539afd8d046c84a88011edd1a1554393c6598b1e5f7fd1199e6724d0495f608bf92a8ad3e7170c280c1c9d23335336dba427d41e2d84b67722e057", 0xcb, 0x7, 0x0, 0x0, r0}, &(0x7f0000000880)) fstat(0xffffffffffffffff, &(0x7f00000006c0)) getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, &(0x7f0000000440)={0x0, 0x80}, &(0x7f00000001c0)=0xfffffffffffffd3f) ioctl$FICLONE(r1, 0x40049409, r3) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, 0x0) [ 2731.126291] gfs2: can't parse mount arguments 14:19:06 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x3, &(0x7f0000001fd8)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x15}}, &(0x7f0000000080)="47504c049c3514bf772da07ae82e76590a36f6493ec1ab91b397e42abf1ea6cd8cd77427fc9a9e2b7165f52b4107bf0850d899dc52d013175ddb1b2f46203c2a05b722e33e556fb2e3f39a3cde1fca53640337ec956146bdbfcb115070195631de5d21a5ea9e638c2bdb78a501ca4b6ea313d82568f9382c2c3f6faba6b4ee54793b4ed26dae3e52225029bb2ac0007f77754c3f23ceda9809b9a9684a940abcaa8cfcc7133ec422e9c83888318d41e9a493f0195fe2599651b89504f5dba14625ce2366f33d95dba92f867279cabf4aceddc85a8af7a0fa68d767ce5136b9d0d1966c499cb6bf34c2988666970000000000000000000000", 0x0, 0x7000000}, 0x48) [ 2731.184512] IPVS: ftp: loaded support on port[0] = 21 [ 2731.405232] hfs: can't find a HFS filesystem on dev loop2 14:19:06 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x3, &(0x7f0000001fd8)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x15}}, &(0x7f0000000080)="47504c049c3514bf772da07ae82e76590a36f6493ec1ab91b397e42abf1ea6cd8cd77427fc9a9e2b7165f52b4107bf0850d899dc52d013175ddb1b2f46203c2a05b722e33e556fb2e3f39a3cde1fca53640337ec956146bdbfcb115070195631de5d21a5ea9e638c2bdb78a501ca4b6ea313d82568f9382c2c3f6faba6b4ee54793b4ed26dae3e52225029bb2ac0007f77754c3f23ceda9809b9a9684a940abcaa8cfcc7133ec422e9c83888318d41e9a493f0195fe2599651b89504f5dba14625ce2366f33d95dba92f867279cabf4aceddc85a8af7a0fa68d767ce5136b9d0d1966c499cb6bf34c2988666970000000000000000000000", 0x0, 0xff00}, 0x48) 14:19:06 executing program 1: r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/expire_quiescent_template\x00', 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000140)=@security={'security\x00', 0xe, 0x4, 0x4e0, 0x1f0, 0x320, 0x0, 0x320, 0x320, 0x438, 0x438, 0x438, 0x438, 0x438, 0x4, &(0x7f0000000100), {[{{@ipv6={@local, @local, [0x0, 0xffffff00, 0xffffffff, 0xffffff00], [0xffffffff, 0xff, 0xffffffff, 0xff], 'eql\x00', 'gretap0\x00', {}, {0xff}, 0x0, 0x7fffffff, 0x2, 0x61}, 0x0, 0x188, 0x1c8, 0x0, {}, [@common=@unspec=@conntrack2={0xc0, 'conntrack\x00', 0x2, {{@ipv4=@loopback, [0xffffffff, 0xffffffff, 0x0, 0xffffffff], @ipv4=@loopback, [0x0, 0xffffffff, 0xffffff00, 0xff000000], @ipv6=@ipv4={[], [], @remote}, [0xffffff00, 0xff000000, 0xff000000, 0xff], @ipv4=@multicast2, [0xffffffff, 0xff, 0xff0000ff], 0x3, 0x1ff, 0x4, 0x4e21, 0x4e20, 0x4e22, 0x4e20, 0x28, 0x20}, 0x1c0, 0x98}}]}, @common=@unspec=@ERROR={0x40, 'ERROR\x00', 0x0, "f650bd5c77822a55c077a2b3078812467f4ab9fefc372cf333baff203cdb"}}, {{@ipv6={@remote, @mcast2, [0xff000000, 0xffffff00, 0xffffffff, 0xff000000], [0x0, 0xff, 0xff000000, 0xffffff00], 'syzkaller0\x00', 'lo\x00', {}, {0xff}, 0x2b, 0x1, 0x2, 0x23}, 0x0, 0xf0, 0x130, 0x0, {}, [@common=@hl={0x28, 'hl\x00'}]}, @common=@inet=@TCPOPTSTRIP={0x40, 'TCPOPTSTRIP\x00', 0x0, {[0xe08d, 0x6, 0xff, 0x800, 0x2, 0x7, 0x3, 0x5]}}}, {{@uncond, 0x0, 0xf0, 0x118, 0x0, {}, [@common=@hl={0x28, 'hl\x00', 0x0, {0x3, 0x604}}]}, @common=@unspec=@STANDARD={0x28, '\x00', 0x0, 0xfffffffffffffffd}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x540) ioctl$EXT4_IOC_MIGRATE(0xffffffffffffffff, 0x6609) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000300)={0x0}, &(0x7f0000000400)=0xc) getsockopt$ARPT_SO_GET_INFO(r0, 0x0, 0x60, &(0x7f0000000740)={'filter\x00'}, &(0x7f00000007c0)=0x44) r3 = getpgrp(r2) prlimit64(r3, 0x0, &(0x7f00000004c0)={0x0, 0x7ffffd}, &(0x7f00000002c0)) lremovexattr(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000480)=@random={'trusted.', 'bpf\x00'}) getsockopt$inet_sctp_SCTP_PR_ASSOC_STATUS(0xffffffffffffffff, 0x84, 0x73, &(0x7f0000000280)={0x0, 0x8, 0x0, 0xe0}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) close(r1) ioctl$LOOP_SET_CAPACITY(r0, 0x4c07) r4 = syz_open_dev$amidi(&(0x7f0000000100)='/dev/amidi#\x00', 0x2, 0x800) recvfrom(r4, &(0x7f0000000500)=""/96, 0x60, 0x20, &(0x7f00000005c0)=@ipx={0x4, 0x1, 0x6, "6b183128f377"}, 0x80) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000200)='./file0\x00', 0x700, 0x0, &(0x7f00000024c0), 0x100032, &(0x7f00000000c0)=ANY=[@ANYBLOB]) ioctl$DRM_IOCTL_FREE_BUFS(r4, 0x4010641a, &(0x7f0000000800)={0x1, &(0x7f0000000680)=[0x2]}) prctl$PR_MPX_ENABLE_MANAGEMENT(0x2b) getsockopt$inet_dccp_int(0xffffffffffffffff, 0x21, 0xf, &(0x7f0000000240), 0x0) fstat(0xffffffffffffffff, &(0x7f00000006c0)) getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, &(0x7f0000000440)={0x0, 0x80}, &(0x7f00000001c0)=0xfffffffffffffd3f) ioctl$FICLONE(r1, 0x40049409, r4) setgroups(0x3, &(0x7f0000000340)=[0x0, 0x0, 0x0]) mkdir(&(0x7f0000000880)='./file0\x00', 0x100) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, 0x0) [ 2731.558731] hfs: can't find a HFS filesystem on dev loop2 14:19:06 executing program 0: r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/expire_quiescent_template\x00', 0x2, 0x0) r1 = syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x1, 0x0) accept$inet6(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000080)=0x1c) ioctl(r1, 0xffffffffffffffb7, &(0x7f0000000080)) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000140)=@security={'security\x00', 0xe, 0x4, 0x4e0, 0x1f0, 0x320, 0x0, 0x320, 0x320, 0x438, 0x438, 0x438, 0x438, 0x438, 0x4, &(0x7f0000000100), {[{{@ipv6={@local, @local, [0x0, 0xffffff00, 0xffffffff, 0xffffff00], [0xffffffff, 0xff, 0xffffffff, 0xff], 'eql\x00', 'gretap0\x00', {}, {0xff}, 0x0, 0x7fffffff, 0x2, 0x61}, 0x0, 0x188, 0x1c8, 0x0, {}, [@common=@unspec=@conntrack2={0xc0, 'conntrack\x00', 0x2, {{@ipv4=@loopback, [0xffffffff, 0xffffffff, 0x0, 0xffffffff], @ipv4=@loopback, [0x0, 0xffffffff, 0xffffff00, 0xff000000], @ipv6=@ipv4={[], [], @remote}, [0xffffff00, 0xff000000, 0xff000000, 0xff], @ipv4=@multicast2, [0xffffffff, 0xff, 0xff0000ff], 0x3, 0x1ff, 0x4, 0x4e21, 0x4e20, 0x4e22, 0x4e20, 0x28, 0x20}, 0x1c0, 0x98}}]}, @common=@unspec=@ERROR={0x40, 'ERROR\x00', 0x0, "f650bd5c77822a55c077a2b3078812467f4ab9fefc372cf333baff203cdb"}}, {{@ipv6={@remote, @mcast2, [0xff000000, 0xffffff00, 0xffffffff, 0xff000000], [0x0, 0xff, 0xff000000, 0xffffff00], 'syzkaller0\x00', 'lo\x00', {}, {0xff}, 0x2b, 0x1, 0x2, 0x23}, 0x0, 0xf0, 0x130, 0x0, {}, [@common=@hl={0x28, 'hl\x00'}]}, @common=@inet=@TCPOPTSTRIP={0x40, 'TCPOPTSTRIP\x00', 0x0, {[0xe08d, 0x6, 0xff, 0x800, 0x2, 0x7, 0x3, 0x5]}}}, {{@uncond, 0x0, 0xf0, 0x118, 0x0, {}, [@common=@hl={0x28, 'hl\x00', 0x0, {0x3, 0x604}}]}, @common=@unspec=@STANDARD={0x28, '\x00', 0x0, 0xfffffffffffffffd}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x540) ioctl$EXT4_IOC_MIGRATE(0xffffffffffffffff, 0x6609) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000300)={0x0}, &(0x7f0000000400)=0xc) getsockopt$ARPT_SO_GET_INFO(r0, 0x0, 0x60, &(0x7f0000000740)={'filter\x00'}, &(0x7f00000007c0)=0x44) r4 = getpgrp(r3) prlimit64(r4, 0x0, &(0x7f00000004c0)={0x0, 0x7ffffd}, &(0x7f00000002c0)) lremovexattr(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000480)=@random={'trusted.', 'bpf\x00'}) getsockopt$inet_sctp_SCTP_PR_ASSOC_STATUS(0xffffffffffffffff, 0x84, 0x73, &(0x7f0000000280)={0x0, 0x8, 0x0, 0xe0}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r5 = syz_open_dev$amidi(&(0x7f0000000100)='/dev/amidi#\x00', 0x2, 0x800) recvfrom(r5, &(0x7f0000000500)=""/96, 0x60, 0x20, &(0x7f00000005c0)=@ipx={0x4, 0x1, 0x6, "6b183128f377"}, 0x80) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000200)='./file0\x00', 0x700, 0x0, &(0x7f00000024c0), 0x100032, &(0x7f00000000c0)=ANY=[@ANYBLOB]) prctl$PR_MPX_ENABLE_MANAGEMENT(0x2b) getsockopt$inet_dccp_int(0xffffffffffffffff, 0x21, 0xf, &(0x7f0000000240), 0x0) fstat(0xffffffffffffffff, &(0x7f00000006c0)) getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, &(0x7f0000000440)={0x0, 0x80}, &(0x7f00000001c0)=0xfffffffffffffd3f) ioctl$KVM_SET_CLOCK(r5, 0x4030ae7b, &(0x7f0000000680)={0x2, 0x44d2}) ioctl$FICLONE(r2, 0x40049409, r5) setgroups(0x3, &(0x7f0000000340)=[0x0, 0x0, 0x0]) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) 14:19:06 executing program 2: getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) syz_mount_image$hfs(&(0x7f0000000200)='hfs\x00', &(0x7f0000000280)='./file0\x00', 0x4c00000000000000, 0x0, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 14:19:06 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x3, &(0x7f0000001fd8)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x15}}, &(0x7f0000000080)="47504c049c3514bf772da07ae82e76590a36f6493ec1ab91b397e42abf1ea6cd8cd77427fc9a9e2b7165f52b4107bf0850d899dc52d013175ddb1b2f46203c2a05b722e33e556fb2e3f39a3cde1fca53640337ec956146bdbfcb115070195631de5d21a5ea9e638c2bdb78a501ca4b6ea313d82568f9382c2c3f6faba6b4ee54793b4ed26dae3e52225029bb2ac0007f77754c3f23ceda9809b9a9684a940abcaa8cfcc7133ec422e9c83888318d41e9a493f0195fe2599651b89504f5dba14625ce2366f33d95dba92f867279cabf4aceddc85a8af7a0fa68d767ce5136b9d0d1966c499cb6bf34c2988666970000000000000000000000", 0x0, 0x8a42180000000000}, 0x48) 14:19:06 executing program 3: lstat(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0}) lstat(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0}) syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000040)='./file0\x00', 0xb102b8700, 0x3, &(0x7f0000000240)=[{&(0x7f0000000080)="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", 0xfc, 0x8}, {&(0x7f0000000180)="6e4fae343fcbe75f750edab4ffe869cf59917854f4c0064b2fefb89db71f83a1dbd85e8720426ce6dac8c1d994bda6e76d23aafb8234e65dd6ce69b85ba473a42f9a10", 0x43, 0x3ff}, {&(0x7f0000000200)="0cf1e6962e8e09a410cd9d6a8b06436370074e01970a", 0x16, 0xf453}], 0x10000, &(0x7f0000000440)={[{@quota_off='quota=off'}, {@noloccookie='noloccookie'}, {@quota_quantum={'quota_quantum', 0x3d, 0x7fffffff}}, {@rgrplvb='rgrplvb'}, {@rgrplvb='rgrplvb'}], [{@smackfshat={'smackfshat', 0x3d, "7db3706f7369785f61636c5f6163636573732e"}}, {@fowner_lt={'fowner<', r0}}, {@smackfsroot={'smackfsroot'}}, {@fsuuid={'fsuuid', 0x3d, {[0x62, 0x7d, 0x32, 0x66, 0x32, 0x38, 0x77, 0x77], 0x2d, [0x37, 0x38, 0x77, 0x77], 0x2d, [0x66, 0x62, 0x73, 0x7d], 0x2d, [0x33, 0x36, 0x67, 0x30], 0x2d, [0x36, 0x63, 0x67, 0x54a07f1fb49ecd59, 0x38, 0x77, 0x77, 0x7f]}}}, {@fowner_lt={'fowner<', r1}}, {@obj_user={'obj_user', 0x3d, 'self^md5sum'}}, {@smackfstransmute={'smackfstransmute', 0x3d, '[-/em0'}}, {@obj_type={'obj_type', 0x3d, '\':/{vboxnet1em0selinuxsecurityvmnet1.'}}]}) clone(0xc2b321c6db9081df, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) [ 2731.891095] hfs: can't find a HFS filesystem on dev loop2 14:19:06 executing program 2: getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) syz_mount_image$hfs(&(0x7f0000000200)='hfs\x00', &(0x7f0000000280)='./file0\x00', 0x3f00, 0x0, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) [ 2732.016629] gfs2: invalid mount option: fowner<00000000000000000000 [ 2732.027079] IPVS: ftp: loaded support on port[0] = 21 14:19:06 executing program 4: r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/expire_quiescent_template\x00', 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000140)=@security={'security\x00', 0xe, 0x4, 0x4b8, 0x1f0, 0x320, 0x0, 0x320, 0x320, 0x438, 0x438, 0x438, 0x438, 0x438, 0x4, &(0x7f0000000100), {[{{@ipv6={@local, @local, [0x0, 0x0, 0xffffffff, 0xffffff00], [0xffffffff, 0xff, 0xffffffff, 0xff], 'eql\x00', 'gretap0\x00', {}, {0xff}, 0x0, 0x7fffffff, 0x2, 0x61}, 0x0, 0x188, 0x1c8, 0x0, {}, [@common=@unspec=@conntrack2={0xc0, 'conntrack\x00', 0x2, {{@ipv4=@loopback, [0xffffffff, 0xffffffff, 0x0, 0xffffffff], @ipv4=@loopback, [0x0, 0xffffffff, 0xffffff00, 0xff000000], @ipv6=@ipv4={[], [], @remote}, [0xffffff00, 0xff000000, 0xff000000, 0xff], @ipv4=@multicast2, [0xffffffff, 0xff, 0xff0000ff], 0x3, 0x1ff, 0x4, 0x4e21, 0x4e20, 0x4e22, 0x4e20, 0x28}, 0x1c0, 0x98}}]}, @common=@unspec=@ERROR={0x40, 'ERROR\x00', 0x0, "f650bd5c77822a55c077a2b3078812467f4ab9fefc372cf333baff203cdb"}}, {{@ipv6={@remote, @mcast2, [0xff000000, 0xffffff00, 0xffffffff, 0xff000000], [0x0, 0xff, 0xff000000, 0xffffff00], 'syzkaller0\x00', 'lo\x00', {}, {}, 0x2b, 0x1, 0x2, 0x23}, 0x0, 0xc8, 0x108}, @common=@inet=@TCPOPTSTRIP={0x40, 'TCPOPTSTRIP\x00', 0x0, {[0xe08d, 0x6, 0xff, 0x800, 0x2, 0x7, 0x0, 0x5]}}}, {{@uncond, 0x0, 0xf0, 0x118, 0x0, {}, [@common=@hl={0x28, 'hl\x00', 0x0, {0x3, 0x604}}]}, @common=@unspec=@STANDARD={0x28, '\x00', 0x0, 0xfffffffffffffffd}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x518) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = getpgrp(0x0) prlimit64(r2, 0x0, &(0x7f00000004c0)={0x0, 0x7ffffd}, &(0x7f00000002c0)) lremovexattr(0x0, &(0x7f0000000480)=ANY=[@ANYBLOB="74724b16fa6f8abece2aa48f"]) getsockopt$inet_sctp_SCTP_PR_ASSOC_STATUS(0xffffffffffffffff, 0x84, 0x73, &(0x7f0000000280)={0x0}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r4 = syz_open_dev$amidi(&(0x7f0000000100)='/dev/amidi#\x00', 0x2, 0x800) recvfrom(0xffffffffffffffff, 0x0, 0x0, 0x20, &(0x7f00000005c0)=@ipx={0x4, 0x1, 0x6, "6b183128f377"}, 0x80) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r0, 0x84, 0x10, &(0x7f0000000680)=@assoc_value={r3, 0x40}, &(0x7f0000000740)=0x8) vmsplice(r4, &(0x7f0000001b80)=[{&(0x7f0000000800)="612355c1a67b3c7dc33f256464e688e7f2008a121bde940e4e85bd3ed73aca884692641ca35c7edbf419a9d4", 0x2c}, {&(0x7f0000000840)="051275fb71a923a5060be20b9068b78c207507fc50566b4015ab6bf8d69de7e4baebcccdab0a09495dc2cd5290e7e15fe2370b4e653644c56a590f9e9b5e3a940c2617e4a3005ebba05240814aee103de385e523d094f996c687195f617d2f847cc6047855c2009f1aacbd6f545028f06605e15c41e8e5e0f08e2f181a27d6fb379922cc2fad2c6c9d92f94eb724c8b2c24e96f984987f9a3082e8047abf2df75cc55d40", 0xa4}, {&(0x7f0000000900)="7ff9efb6d1d9d389bd7bdac7d72f1e771dcdaa74cabfb2c020ccb3f01be4e6f2b174013e0c9c11183d9aed1f79e7eee4aa751682f1f2f7f3128b6503f31c6f242a359cdb40093f62850a246900ff1fbc31fbf2b93e1bc29c48deaed251646f364217989a37625d76fe222842980c0c1dfb2f4ea230e9dcea46531cd06089bc51dc483cff947007e03a2e9445689703b9054706c17aa1e0f79a39a84a8857b9d141526fc593471b6f2766ad7b5b77695ae9da00d1119be955350e2ce446", 0xbd}, {&(0x7f00000009c0)="8369ad9e26876e9acda8af193a54f9ead5bd483073e776317fe7c5b320f34cb483852f310e40f3178a1c2687f0bb7ac426dc2851c8785cb41f3c025c5d829c93c7234aa2384992e678049a52bc55a145ac1bbb8a4edac2a37022fae6e35686088e8afc7f772abbcd3b1689642bd528432fa39b8123b99669cafbe65568e653dd5edb861874afe1025d411df9adf738384548816f0c41666057756d885149f914799cf14741065d9c3b21b6cc409617fae5aecfd22c07f8e7d4c4e5af04c909", 0xbf}, {&(0x7f0000000a80)="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", 0x1000}, {&(0x7f0000001a80)="f3bf57de3eeaccab2b4afdf652e4d6701ee583020aa4b0dc8e1d0f5d73ffe762a5046cfe25da2e682cb059437a155ee86d3d0871e5a3e33bac2545dcd16ae2a9ddde9c914467a32a73f31175c3b4b9e7d048d5c51a6b7ad4a38589127f1bdf0bc4d433045c854770d1590818b3bacbebc149cbadacc83b152c8cd372cb7ff9cf9f2555ae534488ee8e9be665d2db5462f30ce4acc3ed0ce1c2bbc22e679297ca49056daa673225ee3963c448c29616eb785449996f7dd21c31140ce50bba3d8f6af8b1e8473a02e6c1620d2846a876999a16f78a62635dc3bcd412291d4dfe96", 0xe0}], 0x6, 0xf) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000200)='./file0\x00', 0x700, 0x0, &(0x7f00000024c0), 0x100032, &(0x7f0000000780)=ANY=[@ANYBLOB="60fc1a7bf6bdb03aba446e3df12780e4acf957b2be4c67496d6cef96301101f2bdee0b692e9294aa041bc9201e4cd230015c21f5f06263e749faf5bc6af65587c841d99fd9d71d"]) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f0000001c00)={r3, 0x5, 0x4, [0xc8, 0xff, 0x5, 0x7]}, 0x10) getsockopt$inet_dccp_int(0xffffffffffffffff, 0x21, 0xf, &(0x7f0000000240), 0x0) fstat(0xffffffffffffffff, &(0x7f00000006c0)) getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, &(0x7f0000000440)={0x0, 0x80}, &(0x7f00000001c0)=0xfffffffffffffd3f) ioctl$FICLONE(r1, 0x40049409, r4) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, 0x0) 14:19:07 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x3, &(0x7f0000001fd8)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x15}}, &(0x7f0000000080)="47504c049c3514bf772da07ae82e76590a36f6493ec1ab91b397e42abf1ea6cd8cd77427fc9a9e2b7165f52b4107bf0850d899dc52d013175ddb1b2f46203c2a05b722e33e556fb2e3f39a3cde1fca53640337ec956146bdbfcb115070195631de5d21a5ea9e638c2bdb78a501ca4b6ea313d82568f9382c2c3f6faba6b4ee54793b4ed26dae3e52225029bb2ac0007f77754c3f23ceda9809b9a9684a940abcaa8cfcc7133ec422e9c83888318d41e9a493f0195fe2599651b89504f5dba14625ce2366f33d95dba92f867279cabf4aceddc85a8af7a0fa68d767ce5136b9d0d1966c499cb6bf34c2988666970000000000000000000000", 0x0, 0x29d6170000000000}, 0x48) 14:19:07 executing program 0: r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/expire_quiescent_template\x00', 0x2, 0x0) r1 = syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x1, 0x0) accept$inet6(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000080)=0x1c) ioctl(r1, 0xffffffffffffffb7, &(0x7f0000000080)) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000140)=@security={'security\x00', 0xe, 0x4, 0x4e0, 0x1f0, 0x320, 0x0, 0x320, 0x320, 0x438, 0x438, 0x438, 0x438, 0x438, 0x4, &(0x7f0000000100), {[{{@ipv6={@local, @local, [0x0, 0xffffff00, 0xffffffff, 0xffffff00], [0xffffffff, 0xff, 0xffffffff, 0xff], 'eql\x00', 'gretap0\x00', {}, {0xff}, 0x0, 0x7fffffff, 0x2, 0x61}, 0x0, 0x188, 0x1c8, 0x0, {}, [@common=@unspec=@conntrack2={0xc0, 'conntrack\x00', 0x2, {{@ipv4=@loopback, [0xffffffff, 0xffffffff, 0x0, 0xffffffff], @ipv4=@loopback, [0x0, 0xffffffff, 0xffffff00, 0xff000000], @ipv6=@ipv4={[], [], @remote}, [0xffffff00, 0xff000000, 0xff000000, 0xff], @ipv4=@multicast2, [0xffffffff, 0xff, 0xff0000ff], 0x3, 0x1ff, 0x4, 0x4e21, 0x4e20, 0x4e22, 0x4e20, 0x28, 0x20}, 0x1c0, 0x98}}]}, @common=@unspec=@ERROR={0x40, 'ERROR\x00', 0x0, "f650bd5c77822a55c077a2b3078812467f4ab9fefc372cf333baff203cdb"}}, {{@ipv6={@remote, @mcast2, [0xff000000, 0xffffff00, 0xffffffff, 0xff000000], [0x0, 0xff, 0xff000000, 0xffffff00], 'syzkaller0\x00', 'lo\x00', {}, {0xff}, 0x2b, 0x1, 0x2, 0x23}, 0x0, 0xf0, 0x130, 0x0, {}, [@common=@hl={0x28, 'hl\x00'}]}, @common=@inet=@TCPOPTSTRIP={0x40, 'TCPOPTSTRIP\x00', 0x0, {[0xe08d, 0x6, 0xff, 0x800, 0x2, 0x7, 0x3, 0x5]}}}, {{@uncond, 0x0, 0xf0, 0x118, 0x0, {}, [@common=@hl={0x28, 'hl\x00', 0x0, {0x3, 0x604}}]}, @common=@unspec=@STANDARD={0x28, '\x00', 0x0, 0xfffffffffffffffd}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x540) ioctl$EXT4_IOC_MIGRATE(0xffffffffffffffff, 0x6609) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000300)={0x0}, &(0x7f0000000400)=0xc) getsockopt$ARPT_SO_GET_INFO(r0, 0x0, 0x60, &(0x7f0000000740)={'filter\x00'}, &(0x7f00000007c0)=0x44) r4 = getpgrp(r3) prlimit64(r4, 0x0, &(0x7f00000004c0)={0x0, 0x7ffffd}, &(0x7f00000002c0)) lremovexattr(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000480)=@random={'trusted.', 'bpf\x00'}) getsockopt$inet_sctp_SCTP_PR_ASSOC_STATUS(0xffffffffffffffff, 0x84, 0x73, &(0x7f0000000280)={0x0, 0x8, 0x0, 0xe0}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r5 = syz_open_dev$amidi(&(0x7f0000000100)='/dev/amidi#\x00', 0x2, 0x800) recvfrom(r5, &(0x7f0000000500)=""/96, 0x60, 0x20, &(0x7f00000005c0)=@ipx={0x4, 0x1, 0x6, "6b183128f377"}, 0x80) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000200)='./file0\x00', 0x700, 0x0, &(0x7f00000024c0), 0x100032, &(0x7f00000000c0)=ANY=[@ANYBLOB]) prctl$PR_MPX_ENABLE_MANAGEMENT(0x2b) getsockopt$inet_dccp_int(0xffffffffffffffff, 0x21, 0xf, &(0x7f0000000240), 0x0) fstat(0xffffffffffffffff, &(0x7f00000006c0)) getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, &(0x7f0000000440)={0x0, 0x80}, &(0x7f00000001c0)=0xfffffffffffffd3f) ioctl$KVM_SET_CLOCK(r5, 0x4030ae7b, &(0x7f0000000680)={0x2, 0x44d2}) ioctl$FICLONE(r2, 0x40049409, r5) setgroups(0x3, &(0x7f0000000340)=[0x0, 0x0, 0x0]) [ 2732.169238] gfs2: can't parse mount arguments 14:19:07 executing program 1: r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/expire_quiescent_template\x00', 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000140)=@security={'security\x00', 0xe, 0x4, 0x4e0, 0x1f0, 0x320, 0x0, 0x320, 0x320, 0x438, 0x438, 0x438, 0x438, 0x438, 0x4, &(0x7f0000000100), {[{{@ipv6={@local, @local, [0x0, 0xffffff00, 0xffffffff, 0xffffff00], [0xffffffff, 0xff, 0xffffffff, 0xff], 'eql\x00', 'gretap0\x00', {}, {0xff}, 0x0, 0x7fffffff, 0x2, 0x61}, 0x0, 0x188, 0x1c8, 0x0, {}, [@common=@unspec=@conntrack2={0xc0, 'conntrack\x00', 0x2, {{@ipv4=@loopback, [0xffffffff, 0xffffffff, 0x0, 0xffffffff], @ipv4=@loopback, [0x0, 0xffffffff, 0xffffff00, 0xff000000], @ipv6=@ipv4={[], [], @remote}, [0xffffff00, 0xff000000, 0xff000000, 0xff], @ipv4=@multicast2, [0xffffffff, 0xff, 0xff0000ff], 0x3, 0x1ff, 0x4, 0x4e21, 0x4e20, 0x4e22, 0x4e20, 0x28, 0x20}, 0x1c0, 0x98}}]}, @common=@unspec=@ERROR={0x40, 'ERROR\x00', 0x0, "f650bd5c77822a55c077a2b3078812467f4ab9fefc372cf333baff203cdb"}}, {{@ipv6={@remote, @mcast2, [0xff000000, 0xffffff00, 0xffffffff, 0xff000000], [0x0, 0xff, 0xff000000, 0xffffff00], 'syzkaller0\x00', 'lo\x00', {}, {0xff}, 0x2b, 0x1, 0x2, 0x23}, 0x0, 0xf0, 0x130, 0x0, {}, [@common=@hl={0x28, 'hl\x00'}]}, @common=@inet=@TCPOPTSTRIP={0x40, 'TCPOPTSTRIP\x00', 0x0, {[0xe08d, 0x6, 0xff, 0x800, 0x2, 0x7, 0x3, 0x5]}}}, {{@uncond, 0x0, 0xf0, 0x118, 0x0, {}, [@common=@hl={0x28, 'hl\x00', 0x0, {0x3, 0x604}}]}, @common=@unspec=@STANDARD={0x28, '\x00', 0x0, 0xfffffffffffffffd}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x540) ioctl$EXT4_IOC_MIGRATE(0xffffffffffffffff, 0x6609) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000300)={0x0}, &(0x7f0000000400)=0xc) getsockopt$ARPT_SO_GET_INFO(r0, 0x0, 0x60, &(0x7f0000000740)={'filter\x00'}, &(0x7f00000007c0)=0x44) r3 = getpgrp(r2) prlimit64(r3, 0x0, &(0x7f00000004c0)={0x0, 0x7ffffd}, &(0x7f00000002c0)) lremovexattr(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000480)=@random={'trusted.', 'bpf\x00'}) prlimit64(r3, 0x4, &(0x7f0000000680)={0x7, 0x2e}, &(0x7f0000000800)) getsockopt$inet_sctp_SCTP_PR_ASSOC_STATUS(0xffffffffffffffff, 0x84, 0x73, &(0x7f0000000280)={0x0, 0x8, 0x0, 0xe0}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r4 = syz_open_dev$amidi(&(0x7f0000000100)='/dev/amidi#\x00', 0x2, 0x800) recvfrom(r4, &(0x7f0000000500)=""/96, 0x60, 0x20, &(0x7f00000005c0)=@ipx={0x4, 0x1, 0x6, "6b183128f377"}, 0x80) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000200)='./file0\x00', 0x700, 0x0, &(0x7f00000024c0), 0x100032, &(0x7f00000000c0)=ANY=[@ANYBLOB]) prctl$PR_MPX_ENABLE_MANAGEMENT(0x2b) getsockopt$inet_dccp_int(0xffffffffffffffff, 0x21, 0xf, &(0x7f0000000240), 0x0) fstat(0xffffffffffffffff, &(0x7f00000006c0)) getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, &(0x7f0000000440)={0x0, 0x80}, &(0x7f00000001c0)=0xfffffffffffffd3f) ioctl$FICLONE(r1, 0x40049409, r4) setgroups(0x3, &(0x7f0000000340)=[0x0, 0x0, 0x0]) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, 0x0) [ 2732.234133] hfs: can't find a HFS filesystem on dev loop2 [ 2732.324873] hfs: can't find a HFS filesystem on dev loop2 14:19:07 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x3, &(0x7f0000001fd8)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x15}}, &(0x7f0000000080)="47504c049c3514bf772da07ae82e76590a36f6493ec1ab91b397e42abf1ea6cd8cd77427fc9a9e2b7165f52b4107bf0850d899dc52d013175ddb1b2f46203c2a05b722e33e556fb2e3f39a3cde1fca53640337ec956146bdbfcb115070195631de5d21a5ea9e638c2bdb78a501ca4b6ea313d82568f9382c2c3f6faba6b4ee54793b4ed26dae3e52225029bb2ac0007f77754c3f23ceda9809b9a9684a940abcaa8cfcc7133ec422e9c83888318d41e9a493f0195fe2599651b89504f5dba14625ce2366f33d95dba92f867279cabf4aceddc85a8af7a0fa68d767ce5136b9d0d1966c499cb6bf34c2988666970000000000000000000000", 0x0, 0xe4ffffff00000000}, 0x48) [ 2732.387210] EXT4-fs: 23 callbacks suppressed [ 2732.387329] EXT4-fs (sda1): re-mounted. Opts: ,errors=continue 14:19:07 executing program 2: getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) syz_mount_image$hfs(&(0x7f0000000200)='hfs\x00', &(0x7f0000000280)='./file0\x00', 0x48, 0x0, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) [ 2732.442451] EXT4-fs (sda1): Unrecognized mount option "`{:Dn='WLgIml0 i. L0\!bcIjUAٟ" or missing value 14:19:07 executing program 0: r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/expire_quiescent_template\x00', 0x2, 0x0) r1 = syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x1, 0x0) accept$inet6(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000080)=0x1c) ioctl(r1, 0xffffffffffffffb7, &(0x7f0000000080)) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000140)=@security={'security\x00', 0xe, 0x4, 0x4e0, 0x1f0, 0x320, 0x0, 0x320, 0x320, 0x438, 0x438, 0x438, 0x438, 0x438, 0x4, &(0x7f0000000100), {[{{@ipv6={@local, @local, [0x0, 0xffffff00, 0xffffffff, 0xffffff00], [0xffffffff, 0xff, 0xffffffff, 0xff], 'eql\x00', 'gretap0\x00', {}, {0xff}, 0x0, 0x7fffffff, 0x2, 0x61}, 0x0, 0x188, 0x1c8, 0x0, {}, [@common=@unspec=@conntrack2={0xc0, 'conntrack\x00', 0x2, {{@ipv4=@loopback, [0xffffffff, 0xffffffff, 0x0, 0xffffffff], @ipv4=@loopback, [0x0, 0xffffffff, 0xffffff00, 0xff000000], @ipv6=@ipv4={[], [], @remote}, [0xffffff00, 0xff000000, 0xff000000, 0xff], @ipv4=@multicast2, [0xffffffff, 0xff, 0xff0000ff], 0x3, 0x1ff, 0x4, 0x4e21, 0x4e20, 0x4e22, 0x4e20, 0x28, 0x20}, 0x1c0, 0x98}}]}, @common=@unspec=@ERROR={0x40, 'ERROR\x00', 0x0, "f650bd5c77822a55c077a2b3078812467f4ab9fefc372cf333baff203cdb"}}, {{@ipv6={@remote, @mcast2, [0xff000000, 0xffffff00, 0xffffffff, 0xff000000], [0x0, 0xff, 0xff000000, 0xffffff00], 'syzkaller0\x00', 'lo\x00', {}, {0xff}, 0x2b, 0x1, 0x2, 0x23}, 0x0, 0xf0, 0x130, 0x0, {}, [@common=@hl={0x28, 'hl\x00'}]}, @common=@inet=@TCPOPTSTRIP={0x40, 'TCPOPTSTRIP\x00', 0x0, {[0xe08d, 0x6, 0xff, 0x800, 0x2, 0x7, 0x3, 0x5]}}}, {{@uncond, 0x0, 0xf0, 0x118, 0x0, {}, [@common=@hl={0x28, 'hl\x00', 0x0, {0x3, 0x604}}]}, @common=@unspec=@STANDARD={0x28, '\x00', 0x0, 0xfffffffffffffffd}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x540) ioctl$EXT4_IOC_MIGRATE(0xffffffffffffffff, 0x6609) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000300)={0x0}, &(0x7f0000000400)=0xc) getsockopt$ARPT_SO_GET_INFO(r0, 0x0, 0x60, &(0x7f0000000740)={'filter\x00'}, &(0x7f00000007c0)=0x44) r4 = getpgrp(r3) prlimit64(r4, 0x0, &(0x7f00000004c0)={0x0, 0x7ffffd}, &(0x7f00000002c0)) lremovexattr(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000480)=@random={'trusted.', 'bpf\x00'}) getsockopt$inet_sctp_SCTP_PR_ASSOC_STATUS(0xffffffffffffffff, 0x84, 0x73, &(0x7f0000000280)={0x0, 0x8, 0x0, 0xe0}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r5 = syz_open_dev$amidi(&(0x7f0000000100)='/dev/amidi#\x00', 0x2, 0x800) recvfrom(r5, &(0x7f0000000500)=""/96, 0x60, 0x20, &(0x7f00000005c0)=@ipx={0x4, 0x1, 0x6, "6b183128f377"}, 0x80) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000200)='./file0\x00', 0x700, 0x0, &(0x7f00000024c0), 0x100032, &(0x7f00000000c0)=ANY=[@ANYBLOB]) prctl$PR_MPX_ENABLE_MANAGEMENT(0x2b) getsockopt$inet_dccp_int(0xffffffffffffffff, 0x21, 0xf, &(0x7f0000000240), 0x0) fstat(0xffffffffffffffff, &(0x7f00000006c0)) getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, &(0x7f0000000440)={0x0, 0x80}, &(0x7f00000001c0)=0xfffffffffffffd3f) ioctl$KVM_SET_CLOCK(r5, 0x4030ae7b, &(0x7f0000000680)={0x2, 0x44d2}) ioctl$FICLONE(r2, 0x40049409, r5) 14:19:07 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x3, &(0x7f0000001fd8)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x15}}, &(0x7f0000000080)="47504c049c3514bf772da07ae82e76590a36f6493ec1ab91b397e42abf1ea6cd8cd77427fc9a9e2b7165f52b4107bf0850d899dc52d013175ddb1b2f46203c2a05b722e33e556fb2e3f39a3cde1fca53640337ec956146bdbfcb115070195631de5d21a5ea9e638c2bdb78a501ca4b6ea313d82568f9382c2c3f6faba6b4ee54793b4ed26dae3e52225029bb2ac0007f77754c3f23ceda9809b9a9684a940abcaa8cfcc7133ec422e9c83888318d41e9a493f0195fe2599651b89504f5dba14625ce2366f33d95dba92f867279cabf4aceddc85a8af7a0fa68d767ce5136b9d0d1966c499cb6bf34c2988666970000000000000000000000", 0x0, 0x2000000}, 0x48) [ 2732.642955] hfs: can't find a HFS filesystem on dev loop2 14:19:07 executing program 3: lstat(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0}) lstat(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0}) syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000040)='./file0\x00', 0xb102b8700, 0x3, &(0x7f0000000240)=[{&(0x7f0000000080)="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", 0xfc, 0x8}, {&(0x7f0000000180)="6e4fae343fcbe75f750edab4ffe869cf59917854f4c0064b2fefb89db71f83a1dbd85e8720426ce6dac8c1d994bda6e76d23aafb8234e65dd6ce69b85ba473a42f9a10", 0x43, 0x3ff}, {&(0x7f0000000200)="0cf1e6962e8e09a410cd9d6a8b06436370074e01970a", 0x16, 0xf453}], 0x10000, &(0x7f0000000440)={[{@quota_off='quota=off'}, {@noloccookie='noloccookie'}, {@quota_quantum={'quota_quantum', 0x3d, 0x7fffffff}}, {@rgrplvb='rgrplvb'}, {@rgrplvb='rgrplvb'}], [{@smackfshat={'smackfshat', 0x3d, "7db3706f7369785f61636c5f6163636573732e"}}, {@fowner_lt={'fowner<', r0}}, {@smackfsroot={'smackfsroot'}}, {@fsuuid={'fsuuid', 0x3d, {[0x62, 0x7d, 0x32, 0x66, 0x32, 0x38, 0x77, 0x77], 0x2d, [0x37, 0x38, 0x77, 0x77], 0x2d, [0x66, 0x62, 0x73, 0x7d], 0x2d, [0x33, 0x36, 0x67, 0x30], 0x2d, [0x36, 0x63, 0x67, 0x54a07f1fb49ecd59, 0x38, 0x77, 0x77, 0x7f]}}}, {@fowner_lt={'fowner<', r1}}, {@obj_user={'obj_user', 0x3d, 'self^md5sum'}}, {@smackfstransmute={'smackfstransmute', 0x3d, '[-/em0'}}, {@obj_type={'obj_type', 0x3d, '\':/{vboxnet1em0selinuxsecurityvmnet1.'}}]}) clone(0xc2b321c6db9081df, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) [ 2732.777713] hfs: can't find a HFS filesystem on dev loop2 14:19:07 executing program 4: r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/expire_quiescent_template\x00', 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000140)=@security={'security\x00', 0xe, 0x4, 0x4b8, 0x1f0, 0x320, 0x0, 0x320, 0x320, 0x438, 0x438, 0x438, 0x438, 0x438, 0x4, &(0x7f0000000100), {[{{@ipv6={@local, @local, [0x0, 0x0, 0xffffffff, 0xffffff00], [0xffffffff, 0xff, 0xffffffff, 0xff], 'eql\x00', 'gretap0\x00', {}, {0xff}, 0x0, 0x7fffffff, 0x2, 0x61}, 0x0, 0x188, 0x1c8, 0x0, {}, [@common=@unspec=@conntrack2={0xc0, 'conntrack\x00', 0x2, {{@ipv4=@loopback, [0xffffffff, 0xffffffff, 0x0, 0xffffffff], @ipv4=@loopback, [0x0, 0xffffffff, 0xffffff00, 0xff000000], @ipv6=@ipv4={[], [], @remote}, [0xffffff00, 0xff000000, 0xff000000, 0xff], @ipv4=@multicast2, [0xffffffff, 0xff, 0xff0000ff], 0x3, 0x1ff, 0x4, 0x4e21, 0x4e20, 0x4e22, 0x4e20, 0x28}, 0x1c0, 0x98}}]}, @common=@unspec=@ERROR={0x40, 'ERROR\x00', 0x0, "f650bd5c77822a55c077a2b3078812467f4ab9fefc372cf333baff203cdb"}}, {{@ipv6={@remote, @mcast2, [0xff000000, 0xffffff00, 0xffffffff, 0xff000000], [0x0, 0xff, 0xff000000, 0xffffff00], 'syzkaller0\x00', 'lo\x00', {}, {}, 0x2b, 0x1, 0x2, 0x23}, 0x0, 0xc8, 0x108}, @common=@inet=@TCPOPTSTRIP={0x40, 'TCPOPTSTRIP\x00', 0x0, {[0xe08d, 0x6, 0xff, 0x800, 0x2, 0x7, 0x0, 0x5]}}}, {{@uncond, 0x0, 0xf0, 0x118, 0x0, {}, [@common=@hl={0x28, 'hl\x00', 0x0, {0x3, 0x604}}]}, @common=@unspec=@STANDARD={0x28, '\x00', 0x0, 0xfffffffffffffffd}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x518) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = getpgrp(0x0) prlimit64(r2, 0x0, &(0x7f00000004c0)={0x0, 0x7ffffd}, &(0x7f00000002c0)) lremovexattr(0x0, &(0x7f0000000480)=@random={'trusted.', 'bpf\x00'}) getsockopt$inet_sctp_SCTP_PR_ASSOC_STATUS(0xffffffffffffffff, 0x84, 0x73, &(0x7f0000000280)={0x0}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) setsockopt$inet_sctp_SCTP_PR_SUPPORTED(r0, 0x84, 0x71, &(0x7f0000000680)={r3, 0x41e1}, 0x8) setxattr$security_smack_transmute(&(0x7f0000000740)='./file1\x00', &(0x7f0000000780)='security.SMACK64TRANSMUTE\x00', &(0x7f00000007c0)='TRUE', 0x4, 0x1) r4 = syz_open_dev$amidi(&(0x7f0000000100)='/dev/amidi#\x00', 0x2, 0x800) recvfrom(0xffffffffffffffff, 0x0, 0x0, 0x20, &(0x7f00000005c0)=@ipx={0x4, 0x1, 0x6, "6b183128f377"}, 0x80) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) prctl$PR_SET_KEEPCAPS(0x8, 0x1) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000200)='./file0\x00', 0x700, 0x0, &(0x7f00000024c0), 0x100032, &(0x7f00000000c0)=ANY=[@ANYBLOB]) getsockopt$inet_dccp_int(0xffffffffffffffff, 0x21, 0xf, &(0x7f0000000240), 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000000880)={{{@in=@multicast1, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@loopback}, 0x0, @in6=@local}}, &(0x7f0000000980)=0xe8) fstat(r4, &(0x7f00000009c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) mount$fuse(0x0, &(0x7f0000000800)='./file1\x00', &(0x7f0000000840)='fuse\x00', 0x4000, &(0x7f0000000a40)={{'fd', 0x3d, r4}, 0x2c, {'rootmode', 0x3d, 0x1000}, 0x2c, {'user_id', 0x3d, r5}, 0x2c, {'group_id', 0x3d, r6}, 0x2c, {[{@allow_other='allow_other'}, {@blksize={'blksize', 0x3d, 0x1000}}, {@default_permissions='default_permissions'}, {@allow_other='allow_other'}], [{@context={'context', 0x3d, 'unconfined_u'}}, {@fsuuid={'fsuuid', 0x3d, {[0x62, 0x30, 0x31, 0x3b, 0x75, 0x38, 0x39, 0x3d], 0x2d, [0x33, 0x7f, 0x39], 0x2d, [0x64], 0x2d, [0x65, 0x39, 0x33, 0x75], 0x2d, [0x33, 0x64, 0x39, 0x75, 0x37, 0x77, 0x76, 0x65]}}}, {@smackfstransmute={'smackfstransmute', 0x3d, '#keyringGPL'}}, {@smackfshat={'smackfshat', 0x3d, 'bdev'}}, {@audit='audit'}]}}) fstat(0xffffffffffffffff, &(0x7f00000006c0)) getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, &(0x7f0000000440)={0x0, 0x80}, &(0x7f00000001c0)=0xfffffffffffffd3f) ioctl$FICLONE(r1, 0x40049409, r4) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file1\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, 0x0) [ 2732.826278] EXT4-fs (sda1): re-mounted. Opts: 14:19:07 executing program 2: getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) syz_mount_image$hfs(&(0x7f0000000200)='hfs\x00', &(0x7f0000000280)='./file0\x00', 0x2300000000000000, 0x0, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 14:19:07 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x3, &(0x7f0000001fd8)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x15}}, &(0x7f0000000080)="47504c049c3514bf772da07ae82e76590a36f6493ec1ab91b397e42abf1ea6cd8cd77427fc9a9e2b7165f52b4107bf0850d899dc52d013175ddb1b2f46203c2a05b722e33e556fb2e3f39a3cde1fca53640337ec956146bdbfcb115070195631de5d21a5ea9e638c2bdb78a501ca4b6ea313d82568f9382c2c3f6faba6b4ee54793b4ed26dae3e52225029bb2ac0007f77754c3f23ceda9809b9a9684a940abcaa8cfcc7133ec422e9c83888318d41e9a493f0195fe2599651b89504f5dba14625ce2366f33d95dba92f867279cabf4aceddc85a8af7a0fa68d767ce5136b9d0d1966c499cb6bf34c2988666970000000000000000000000", 0x0, 0x1000000}, 0x48) 14:19:07 executing program 0: r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/expire_quiescent_template\x00', 0x2, 0x0) r1 = syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x1, 0x0) accept$inet6(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000080)=0x1c) ioctl(r1, 0xffffffffffffffb7, &(0x7f0000000080)) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000140)=@security={'security\x00', 0xe, 0x4, 0x4e0, 0x1f0, 0x320, 0x0, 0x320, 0x320, 0x438, 0x438, 0x438, 0x438, 0x438, 0x4, &(0x7f0000000100), {[{{@ipv6={@local, @local, [0x0, 0xffffff00, 0xffffffff, 0xffffff00], [0xffffffff, 0xff, 0xffffffff, 0xff], 'eql\x00', 'gretap0\x00', {}, {0xff}, 0x0, 0x7fffffff, 0x2, 0x61}, 0x0, 0x188, 0x1c8, 0x0, {}, [@common=@unspec=@conntrack2={0xc0, 'conntrack\x00', 0x2, {{@ipv4=@loopback, [0xffffffff, 0xffffffff, 0x0, 0xffffffff], @ipv4=@loopback, [0x0, 0xffffffff, 0xffffff00, 0xff000000], @ipv6=@ipv4={[], [], @remote}, [0xffffff00, 0xff000000, 0xff000000, 0xff], @ipv4=@multicast2, [0xffffffff, 0xff, 0xff0000ff], 0x3, 0x1ff, 0x4, 0x4e21, 0x4e20, 0x4e22, 0x4e20, 0x28, 0x20}, 0x1c0, 0x98}}]}, @common=@unspec=@ERROR={0x40, 'ERROR\x00', 0x0, "f650bd5c77822a55c077a2b3078812467f4ab9fefc372cf333baff203cdb"}}, {{@ipv6={@remote, @mcast2, [0xff000000, 0xffffff00, 0xffffffff, 0xff000000], [0x0, 0xff, 0xff000000, 0xffffff00], 'syzkaller0\x00', 'lo\x00', {}, {0xff}, 0x2b, 0x1, 0x2, 0x23}, 0x0, 0xf0, 0x130, 0x0, {}, [@common=@hl={0x28, 'hl\x00'}]}, @common=@inet=@TCPOPTSTRIP={0x40, 'TCPOPTSTRIP\x00', 0x0, {[0xe08d, 0x6, 0xff, 0x800, 0x2, 0x7, 0x3, 0x5]}}}, {{@uncond, 0x0, 0xf0, 0x118, 0x0, {}, [@common=@hl={0x28, 'hl\x00', 0x0, {0x3, 0x604}}]}, @common=@unspec=@STANDARD={0x28, '\x00', 0x0, 0xfffffffffffffffd}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x540) ioctl$EXT4_IOC_MIGRATE(0xffffffffffffffff, 0x6609) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000300)={0x0}, &(0x7f0000000400)=0xc) getsockopt$ARPT_SO_GET_INFO(r0, 0x0, 0x60, &(0x7f0000000740)={'filter\x00'}, &(0x7f00000007c0)=0x44) r4 = getpgrp(r3) prlimit64(r4, 0x0, &(0x7f00000004c0)={0x0, 0x7ffffd}, &(0x7f00000002c0)) lremovexattr(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000480)=@random={'trusted.', 'bpf\x00'}) getsockopt$inet_sctp_SCTP_PR_ASSOC_STATUS(0xffffffffffffffff, 0x84, 0x73, &(0x7f0000000280)={0x0, 0x8, 0x0, 0xe0}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r5 = syz_open_dev$amidi(&(0x7f0000000100)='/dev/amidi#\x00', 0x2, 0x800) recvfrom(r5, &(0x7f0000000500)=""/96, 0x60, 0x20, &(0x7f00000005c0)=@ipx={0x4, 0x1, 0x6, "6b183128f377"}, 0x80) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000200)='./file0\x00', 0x700, 0x0, &(0x7f00000024c0), 0x100032, &(0x7f00000000c0)=ANY=[@ANYBLOB]) prctl$PR_MPX_ENABLE_MANAGEMENT(0x2b) getsockopt$inet_dccp_int(0xffffffffffffffff, 0x21, 0xf, &(0x7f0000000240), 0x0) fstat(0xffffffffffffffff, &(0x7f00000006c0)) getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, &(0x7f0000000440)={0x0, 0x80}, &(0x7f00000001c0)=0xfffffffffffffd3f) ioctl$KVM_SET_CLOCK(r5, 0x4030ae7b, &(0x7f0000000680)={0x2, 0x44d2}) ioctl$FICLONE(r2, 0x40049409, r5) [ 2732.975002] EXT4-fs (sda1): Unrecognized mount option "./file0" or missing value [ 2732.998895] gfs2: invalid mount option: fowner<00000000000000000000 [ 2733.076573] gfs2: can't parse mount arguments 14:19:08 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x3, &(0x7f0000001fd8)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x15}}, &(0x7f0000000080)="47504c049c3514bf772da07ae82e76590a36f6493ec1ab91b397e42abf1ea6cd8cd77427fc9a9e2b7165f52b4107bf0850d899dc52d013175ddb1b2f46203c2a05b722e33e556fb2e3f39a3cde1fca53640337ec956146bdbfcb115070195631de5d21a5ea9e638c2bdb78a501ca4b6ea313d82568f9382c2c3f6faba6b4ee54793b4ed26dae3e52225029bb2ac0007f77754c3f23ceda9809b9a9684a940abcaa8cfcc7133ec422e9c83888318d41e9a493f0195fe2599651b89504f5dba14625ce2366f33d95dba92f867279cabf4aceddc85a8af7a0fa68d767ce5136b9d0d1966c499cb6bf34c2988666970000000000000000000000", 0x0, 0x80ffffff00000000}, 0x48) 14:19:08 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000680)='net/wireless\x00') ioctl$DRM_IOCTL_MODE_GETCRTC(r0, 0xc06864a1, &(0x7f0000001880)={&(0x7f0000001840)=[0xffff, 0x9, 0x18], 0x3, 0x7fffffff, 0x0, 0x100000001, 0x8, 0x81, {0x100, 0x200, 0x3, 0x9, 0x5, 0x10000, 0x0, 0x9, 0x0, 0x1, 0x2, 0x6, 0x1, 0xff, "ba40c67ee5a6757ffc1939429e4c41a355e11259eca2fc7d2caa3de5313c2e10"}}) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/expire_quiescent_template\x00', 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f0000000140)=@security={'security\x00', 0xe, 0x4, 0x4e0, 0x1f0, 0x320, 0x0, 0x320, 0x320, 0x438, 0x438, 0x438, 0x438, 0x438, 0x4, &(0x7f0000000100), {[{{@ipv6={@local, @local, [0x0, 0xffffff00, 0xffffffff, 0xffffff00], [0xffffffff, 0xff, 0xffffffff, 0xff], 'eql\x00', 'gretap0\x00', {}, {0xff}, 0x0, 0x7fffffff, 0x2, 0x61}, 0x0, 0x188, 0x1c8, 0x0, {}, [@common=@unspec=@conntrack2={0xc0, 'conntrack\x00', 0x2, {{@ipv4=@loopback, [0xffffffff, 0xffffffff, 0x0, 0xffffffff], @ipv4=@loopback, [0x0, 0xffffffff, 0xffffff00, 0xff000000], @ipv6=@ipv4={[], [], @remote}, [0xffffff00, 0xff000000, 0xff000000, 0xff], @ipv4=@multicast2, [0xffffffff, 0xff, 0xff0000ff], 0x3, 0x1ff, 0x4, 0x4e21, 0x4e20, 0x4e22, 0x4e20, 0x28, 0x20}, 0x1c0, 0x98}}]}, @common=@unspec=@ERROR={0x40, 'ERROR\x00', 0x0, "f650bd5c77822a55c077a2b3078812467f4ab9fefc372cf333baff203cdb"}}, {{@ipv6={@remote, @mcast2, [0xff000000, 0xffffff00, 0xffffffff, 0xff000000], [0x0, 0xff, 0xff000000, 0xffffff00], 'syzkaller0\x00', 'lo\x00', {}, {0xff}, 0x2b, 0x1, 0x2, 0x23}, 0x0, 0xf0, 0x130, 0x0, {}, [@common=@hl={0x28, 'hl\x00'}]}, @common=@inet=@TCPOPTSTRIP={0x40, 'TCPOPTSTRIP\x00', 0x0, {[0xe08d, 0x6, 0xff, 0x800, 0x2, 0x7, 0x3, 0x5]}}}, {{@uncond, 0x0, 0xf0, 0x118, 0x0, {}, [@common=@hl={0x28, 'hl\x00', 0x0, {0x3, 0x604}}]}, @common=@unspec=@STANDARD={0x28, '\x00', 0x0, 0xfffffffffffffffd}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x540) ioctl$EXT4_IOC_MIGRATE(0xffffffffffffffff, 0x6609) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000300)={0x0}, &(0x7f0000000400)=0xc) getsockopt$ARPT_SO_GET_INFO(r1, 0x0, 0x60, &(0x7f0000000740)={'filter\x00'}, &(0x7f00000007c0)=0x44) r4 = getpgrp(r3) prlimit64(r4, 0x0, &(0x7f00000004c0)={0x0, 0x7ffffd}, &(0x7f00000002c0)) lremovexattr(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000480)=@random={'trusted.', 'bpf\x00'}) getsockopt$inet_sctp_SCTP_RTOINFO(r0, 0x84, 0x0, &(0x7f0000001900)={0x0, 0x4, 0x200, 0x3f}, &(0x7f0000001940)=0x10) getsockopt$inet_sctp_SCTP_PR_ASSOC_STATUS(0xffffffffffffffff, 0x84, 0x73, &(0x7f0000000280)={r5, 0x8, 0x0, 0xe0}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r6 = syz_open_dev$amidi(&(0x7f0000000100)='/dev/amidi#\x00', 0x2, 0x800) recvfrom(r6, &(0x7f0000000500)=""/96, 0x60, 0x20, &(0x7f00000005c0)=@ipx={0x4, 0x1, 0x6, "6b183128f377"}, 0x80) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000200)='./file0\x00', 0x700, 0x0, &(0x7f00000024c0), 0x100032, &(0x7f00000000c0)=ANY=[@ANYBLOB]) prctl$PR_MPX_ENABLE_MANAGEMENT(0x2b) getsockopt$inet_dccp_int(0xffffffffffffffff, 0x21, 0xf, &(0x7f0000000240), 0x0) fstat(0xffffffffffffffff, &(0x7f00000006c0)) getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, &(0x7f0000000440)={0x0, 0x80}, &(0x7f00000001c0)=0xfffffffffffffd3f) ioctl$FICLONE(r2, 0x40049409, r6) setgroups(0x3, &(0x7f0000000340)=[0x0, 0x0, 0x0]) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) write$UHID_INPUT(r1, &(0x7f0000000800)={0x8, "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", 0x1000}, 0x1006) mmap(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x2000000, 0x20810, r6, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, 0x0) [ 2733.169011] IPVS: ftp: loaded support on port[0] = 21 [ 2733.184546] hfs: can't find a HFS filesystem on dev loop2 [ 2733.230426] EXT4-fs (sda1): Unrecognized mount option "./file1" or missing value 14:19:08 executing program 0: r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/expire_quiescent_template\x00', 0x2, 0x0) r1 = syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x1, 0x0) accept$inet6(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000080)=0x1c) ioctl(r1, 0xffffffffffffffb7, &(0x7f0000000080)) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000140)=@security={'security\x00', 0xe, 0x4, 0x4e0, 0x1f0, 0x320, 0x0, 0x320, 0x320, 0x438, 0x438, 0x438, 0x438, 0x438, 0x4, &(0x7f0000000100), {[{{@ipv6={@local, @local, [0x0, 0xffffff00, 0xffffffff, 0xffffff00], [0xffffffff, 0xff, 0xffffffff, 0xff], 'eql\x00', 'gretap0\x00', {}, {0xff}, 0x0, 0x7fffffff, 0x2, 0x61}, 0x0, 0x188, 0x1c8, 0x0, {}, [@common=@unspec=@conntrack2={0xc0, 'conntrack\x00', 0x2, {{@ipv4=@loopback, [0xffffffff, 0xffffffff, 0x0, 0xffffffff], @ipv4=@loopback, [0x0, 0xffffffff, 0xffffff00, 0xff000000], @ipv6=@ipv4={[], [], @remote}, [0xffffff00, 0xff000000, 0xff000000, 0xff], @ipv4=@multicast2, [0xffffffff, 0xff, 0xff0000ff], 0x3, 0x1ff, 0x4, 0x4e21, 0x4e20, 0x4e22, 0x4e20, 0x28, 0x20}, 0x1c0, 0x98}}]}, @common=@unspec=@ERROR={0x40, 'ERROR\x00', 0x0, "f650bd5c77822a55c077a2b3078812467f4ab9fefc372cf333baff203cdb"}}, {{@ipv6={@remote, @mcast2, [0xff000000, 0xffffff00, 0xffffffff, 0xff000000], [0x0, 0xff, 0xff000000, 0xffffff00], 'syzkaller0\x00', 'lo\x00', {}, {0xff}, 0x2b, 0x1, 0x2, 0x23}, 0x0, 0xf0, 0x130, 0x0, {}, [@common=@hl={0x28, 'hl\x00'}]}, @common=@inet=@TCPOPTSTRIP={0x40, 'TCPOPTSTRIP\x00', 0x0, {[0xe08d, 0x6, 0xff, 0x800, 0x2, 0x7, 0x3, 0x5]}}}, {{@uncond, 0x0, 0xf0, 0x118, 0x0, {}, [@common=@hl={0x28, 'hl\x00', 0x0, {0x3, 0x604}}]}, @common=@unspec=@STANDARD={0x28, '\x00', 0x0, 0xfffffffffffffffd}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x540) ioctl$EXT4_IOC_MIGRATE(0xffffffffffffffff, 0x6609) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000300)={0x0}, &(0x7f0000000400)=0xc) getsockopt$ARPT_SO_GET_INFO(r0, 0x0, 0x60, &(0x7f0000000740)={'filter\x00'}, &(0x7f00000007c0)=0x44) r3 = getpgrp(r2) prlimit64(r3, 0x0, &(0x7f00000004c0)={0x0, 0x7ffffd}, &(0x7f00000002c0)) lremovexattr(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000480)=@random={'trusted.', 'bpf\x00'}) getsockopt$inet_sctp_SCTP_PR_ASSOC_STATUS(0xffffffffffffffff, 0x84, 0x73, &(0x7f0000000280)={0x0, 0x8, 0x0, 0xe0}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r4 = syz_open_dev$amidi(&(0x7f0000000100)='/dev/amidi#\x00', 0x2, 0x800) recvfrom(r4, &(0x7f0000000500)=""/96, 0x60, 0x20, &(0x7f00000005c0)=@ipx={0x4, 0x1, 0x6, "6b183128f377"}, 0x80) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000200)='./file0\x00', 0x700, 0x0, &(0x7f00000024c0), 0x100032, &(0x7f00000000c0)=ANY=[@ANYBLOB]) prctl$PR_MPX_ENABLE_MANAGEMENT(0x2b) getsockopt$inet_dccp_int(0xffffffffffffffff, 0x21, 0xf, &(0x7f0000000240), 0x0) fstat(0xffffffffffffffff, &(0x7f00000006c0)) getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, &(0x7f0000000440)={0x0, 0x80}, &(0x7f00000001c0)=0xfffffffffffffd3f) ioctl$KVM_SET_CLOCK(r4, 0x4030ae7b, &(0x7f0000000680)={0x2, 0x44d2}) 14:19:08 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x3, &(0x7f0000001fd8)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x15}}, &(0x7f0000000080)="47504c049c3514bf772da07ae82e76590a36f6493ec1ab91b397e42abf1ea6cd8cd77427fc9a9e2b7165f52b4107bf0850d899dc52d013175ddb1b2f46203c2a05b722e33e556fb2e3f39a3cde1fca53640337ec956146bdbfcb115070195631de5d21a5ea9e638c2bdb78a501ca4b6ea313d82568f9382c2c3f6faba6b4ee54793b4ed26dae3e52225029bb2ac0007f77754c3f23ceda9809b9a9684a940abcaa8cfcc7133ec422e9c83888318d41e9a493f0195fe2599651b89504f5dba14625ce2366f33d95dba92f867279cabf4aceddc85a8af7a0fa68d767ce5136b9d0d1966c499cb6bf34c2988666970000000000000000000000", 0x0, 0x8a421800}, 0x48) 14:19:08 executing program 2: getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) syz_mount_image$hfs(&(0x7f0000000200)='hfs\x00', &(0x7f0000000280)='./file0\x00', 0x4244000000000000, 0x0, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) [ 2733.400893] EXT4-fs (sda1): Unrecognized mount option "./file1" or missing value 14:19:08 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x3, &(0x7f0000001fd8)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x15}}, &(0x7f0000000080)="47504c049c3514bf772da07ae82e76590a36f6493ec1ab91b397e42abf1ea6cd8cd77427fc9a9e2b7165f52b4107bf0850d899dc52d013175ddb1b2f46203c2a05b722e33e556fb2e3f39a3cde1fca53640337ec956146bdbfcb115070195631de5d21a5ea9e638c2bdb78a501ca4b6ea313d82568f9382c2c3f6faba6b4ee54793b4ed26dae3e52225029bb2ac0007f77754c3f23ceda9809b9a9684a940abcaa8cfcc7133ec422e9c83888318d41e9a493f0195fe2599651b89504f5dba14625ce2366f33d95dba92f867279cabf4aceddc85a8af7a0fa68d767ce5136b9d0d1966c499cb6bf34c2988666970000000000000000000000", 0x0, 0xe4ffffff}, 0x48) 14:19:08 executing program 0: r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/expire_quiescent_template\x00', 0x2, 0x0) r1 = syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x1, 0x0) accept$inet6(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000080)=0x1c) ioctl(r1, 0xffffffffffffffb7, &(0x7f0000000080)) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000140)=@security={'security\x00', 0xe, 0x4, 0x4e0, 0x1f0, 0x320, 0x0, 0x320, 0x320, 0x438, 0x438, 0x438, 0x438, 0x438, 0x4, &(0x7f0000000100), {[{{@ipv6={@local, @local, [0x0, 0xffffff00, 0xffffffff, 0xffffff00], [0xffffffff, 0xff, 0xffffffff, 0xff], 'eql\x00', 'gretap0\x00', {}, {0xff}, 0x0, 0x7fffffff, 0x2, 0x61}, 0x0, 0x188, 0x1c8, 0x0, {}, [@common=@unspec=@conntrack2={0xc0, 'conntrack\x00', 0x2, {{@ipv4=@loopback, [0xffffffff, 0xffffffff, 0x0, 0xffffffff], @ipv4=@loopback, [0x0, 0xffffffff, 0xffffff00, 0xff000000], @ipv6=@ipv4={[], [], @remote}, [0xffffff00, 0xff000000, 0xff000000, 0xff], @ipv4=@multicast2, [0xffffffff, 0xff, 0xff0000ff], 0x3, 0x1ff, 0x4, 0x4e21, 0x4e20, 0x4e22, 0x4e20, 0x28, 0x20}, 0x1c0, 0x98}}]}, @common=@unspec=@ERROR={0x40, 'ERROR\x00', 0x0, "f650bd5c77822a55c077a2b3078812467f4ab9fefc372cf333baff203cdb"}}, {{@ipv6={@remote, @mcast2, [0xff000000, 0xffffff00, 0xffffffff, 0xff000000], [0x0, 0xff, 0xff000000, 0xffffff00], 'syzkaller0\x00', 'lo\x00', {}, {0xff}, 0x2b, 0x1, 0x2, 0x23}, 0x0, 0xf0, 0x130, 0x0, {}, [@common=@hl={0x28, 'hl\x00'}]}, @common=@inet=@TCPOPTSTRIP={0x40, 'TCPOPTSTRIP\x00', 0x0, {[0xe08d, 0x6, 0xff, 0x800, 0x2, 0x7, 0x3, 0x5]}}}, {{@uncond, 0x0, 0xf0, 0x118, 0x0, {}, [@common=@hl={0x28, 'hl\x00', 0x0, {0x3, 0x604}}]}, @common=@unspec=@STANDARD={0x28, '\x00', 0x0, 0xfffffffffffffffd}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x540) ioctl$EXT4_IOC_MIGRATE(0xffffffffffffffff, 0x6609) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000300)={0x0}, &(0x7f0000000400)=0xc) getsockopt$ARPT_SO_GET_INFO(r0, 0x0, 0x60, &(0x7f0000000740)={'filter\x00'}, &(0x7f00000007c0)=0x44) r3 = getpgrp(r2) prlimit64(r3, 0x0, &(0x7f00000004c0)={0x0, 0x7ffffd}, &(0x7f00000002c0)) lremovexattr(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000480)=@random={'trusted.', 'bpf\x00'}) getsockopt$inet_sctp_SCTP_PR_ASSOC_STATUS(0xffffffffffffffff, 0x84, 0x73, &(0x7f0000000280)={0x0, 0x8, 0x0, 0xe0}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r4 = syz_open_dev$amidi(&(0x7f0000000100)='/dev/amidi#\x00', 0x2, 0x800) recvfrom(r4, &(0x7f0000000500)=""/96, 0x60, 0x20, &(0x7f00000005c0)=@ipx={0x4, 0x1, 0x6, "6b183128f377"}, 0x80) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000200)='./file0\x00', 0x700, 0x0, &(0x7f00000024c0), 0x100032, &(0x7f00000000c0)=ANY=[@ANYBLOB]) prctl$PR_MPX_ENABLE_MANAGEMENT(0x2b) getsockopt$inet_dccp_int(0xffffffffffffffff, 0x21, 0xf, &(0x7f0000000240), 0x0) fstat(0xffffffffffffffff, &(0x7f00000006c0)) getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, &(0x7f0000000440)={0x0, 0x80}, &(0x7f00000001c0)=0xfffffffffffffd3f) [ 2733.565887] EXT4-fs (sda1): re-mounted. Opts: ,errors=continue [ 2733.602352] hfs: can't find a HFS filesystem on dev loop2 [ 2733.707843] hfs: can't find a HFS filesystem on dev loop2 [ 2733.859513] EXT4-fs (sda1): Unrecognized mount option "./file0" or missing value 14:19:08 executing program 3: lstat(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0}) lstat(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0}) syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000040)='./file0\x00', 0xb102b8700, 0x3, &(0x7f0000000240)=[{&(0x7f0000000080)="5731042c27af82c0a261c13f85e0cd8fccbac2b3337c904cd0ee709a7154b3e180a42abe92ffb7b08847dac187361d788c01dd02b8386a12a52a48d3230e1f9b0e9fda5ab8254be88f3272842bddebbcdfa97324ef74d89bc655ee46f4d352a7e3e97901c335ff667704cd1bc10e9560244a08a34e021cc2a6914b559d493d6f7bce4f72e44f3d308acedbdb63c4d9f2885fb33ac3377548b803c65a7afeffcfe551f50d04bc24340a6c690f1ea0362fee78fb35bf7bec7ef960631f29e6a87e0997f64cde26f3ed9b6a5380d1d9caa80ee31fa627b820181b106b38b56b225cdc352ab158e1ac939e43b04fff52db5bc48be4e05442cfcc527ece13", 0xfc, 0x8}, {&(0x7f0000000180)="6e4fae343fcbe75f750edab4ffe869cf59917854f4c0064b2fefb89db71f83a1dbd85e8720426ce6dac8c1d994bda6e76d23aafb8234e65dd6ce69b85ba473a42f9a10", 0x43, 0x3ff}, {&(0x7f0000000200)="0cf1e6962e8e09a410cd9d6a8b06436370074e01970a", 0x16, 0xf453}], 0x10000, &(0x7f0000000440)={[{@quota_off='quota=off'}, {@noloccookie='noloccookie'}, {@quota_quantum={'quota_quantum', 0x3d, 0x7fffffff}}, {@rgrplvb='rgrplvb'}, {@rgrplvb='rgrplvb'}], [{@smackfshat={'smackfshat', 0x3d, "7db3706f7369785f61636c5f6163636573732e"}}, {@fowner_lt={'fowner<', r0}}, {@smackfsroot={'smackfsroot'}}, {@fsuuid={'fsuuid', 0x3d, {[0x62, 0x7d, 0x32, 0x66, 0x32, 0x38, 0x77, 0x77], 0x2d, [0x37, 0x38, 0x77, 0x77], 0x2d, [0x66, 0x62, 0x73, 0x7d], 0x2d, [0x33, 0x36, 0x67, 0x30], 0x2d, [0x36, 0x63, 0x67, 0x54a07f1fb49ecd59, 0x38, 0x77, 0x77, 0x7f]}}}, {@fowner_lt={'fowner<', r1}}, {@obj_user={'obj_user', 0x3d, 'self^md5sum'}}, {@smackfstransmute={'smackfstransmute', 0x3d, '[-/em0'}}, {@obj_type={'obj_type', 0x3d, '\':/{vboxnet1em0selinuxsecurityvmnet1.'}}]}) 14:19:08 executing program 4: r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/expire_quiescent_template\x00', 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000140)=@security={'security\x00', 0xe, 0x4, 0x4b8, 0x1f0, 0x320, 0x0, 0x320, 0x320, 0x438, 0x438, 0x438, 0x438, 0x438, 0x4, &(0x7f0000000100), {[{{@ipv6={@local, @local, [0x0, 0x0, 0xffffffff, 0xffffff00], [0xffffffff, 0xff, 0xffffffff, 0xff], 'eql\x00', 'gretap0\x00', {}, {0xff}, 0x0, 0x7fffffff, 0x2, 0x61}, 0x0, 0x188, 0x1c8, 0x0, {}, [@common=@unspec=@conntrack2={0xc0, 'conntrack\x00', 0x2, {{@ipv4=@loopback, [0xffffffff, 0xffffffff, 0x0, 0xffffffff], @ipv4=@loopback, [0x0, 0xffffffff, 0xffffff00, 0xff000000], @ipv6=@ipv4={[], [], @remote}, [0xffffff00, 0xff000000, 0xff000000, 0xff], @ipv4=@multicast2, [0xffffffff, 0xff, 0xff0000ff], 0x3, 0x1ff, 0x4, 0x4e21, 0x4e20, 0x4e22, 0x4e20, 0x28}, 0x1c0, 0x98}}]}, @common=@unspec=@ERROR={0x40, 'ERROR\x00', 0x0, "f650bd5c77822a55c077a2b3078812467f4ab9fefc372cf333baff203cdb"}}, {{@ipv6={@remote, @mcast2, [0xff000000, 0xffffff00, 0xffffffff, 0xff000000], [0x0, 0xff, 0xff000000, 0xffffff00], 'syzkaller0\x00', 'lo\x00', {}, {}, 0x2b, 0x1, 0x2, 0x23}, 0x0, 0xc8, 0x108}, @common=@inet=@TCPOPTSTRIP={0x40, 'TCPOPTSTRIP\x00', 0x0, {[0xe08d, 0x6, 0xff, 0x800, 0x2, 0x7, 0x0, 0x5]}}}, {{@uncond, 0x0, 0xf0, 0x118, 0x0, {}, [@common=@hl={0x28, 'hl\x00', 0x0, {0x3, 0x604}}]}, @common=@unspec=@STANDARD={0x28, '\x00', 0x0, 0xfffffffffffffffd}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x518) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = getpgrp(0x0) prlimit64(r2, 0x0, &(0x7f00000004c0)={0x0, 0x7ffffd}, &(0x7f00000002c0)) lremovexattr(0x0, &(0x7f0000000480)=@random={'trusted.', 'bpf\x00'}) getsockopt$inet_sctp_SCTP_PR_ASSOC_STATUS(0xffffffffffffffff, 0x84, 0x73, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x6, 0x20000}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r3 = syz_open_dev$amidi(&(0x7f0000000100)='/dev/amidi#\x00', 0x2, 0x800) setsockopt$bt_BT_RCVMTU(r3, 0x112, 0xd, &(0x7f0000000680)=0x80000000, 0x2) recvfrom(0xffffffffffffffff, 0x0, 0x0, 0x20, &(0x7f00000005c0)=@ipx={0x4, 0x1, 0x6, "6b183128f377"}, 0x80) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000200)='./file0\x00', 0x700, 0x0, &(0x7f00000024c0), 0x100032, &(0x7f00000000c0)=ANY=[@ANYBLOB]) getsockopt$inet_dccp_int(0xffffffffffffffff, 0x21, 0xf, &(0x7f0000000240), 0x0) fstat(0xffffffffffffffff, &(0x7f00000006c0)) getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, &(0x7f0000000440)={0x0, 0x80}, &(0x7f00000001c0)=0xfffffffffffffd3f) ioctl$FICLONE(r1, 0x40049409, r3) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, 0x0) 14:19:08 executing program 2: getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) syz_mount_image$hfs(&(0x7f0000000200)='hfs\x00', &(0x7f0000000280)='./file0\x00', 0x5a020000, 0x0, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 14:19:08 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x3, &(0x7f0000001fd8)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x15}}, &(0x7f0000000080)="47504c049c3514bf772da07ae82e76590a36f6493ec1ab91b397e42abf1ea6cd8cd77427fc9a9e2b7165f52b4107bf0850d899dc52d013175ddb1b2f46203c2a05b722e33e556fb2e3f39a3cde1fca53640337ec956146bdbfcb115070195631de5d21a5ea9e638c2bdb78a501ca4b6ea313d82568f9382c2c3f6faba6b4ee54793b4ed26dae3e52225029bb2ac0007f77754c3f23ceda9809b9a9684a940abcaa8cfcc7133ec422e9c83888318d41e9a493f0195fe2599651b89504f5dba14625ce2366f33d95dba92f867279cabf4aceddc85a8af7a0fa68d767ce5136b9d0d1966c499cb6bf34c2988666970000000000000000000000", 0x0, 0x300}, 0x48) 14:19:08 executing program 1: r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/expire_quiescent_template\x00', 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000140)=@security={'security\x00', 0xe, 0x4, 0x4e0, 0x1f0, 0x320, 0x0, 0x320, 0x320, 0x438, 0x438, 0x438, 0x438, 0x438, 0x4, &(0x7f0000000100), {[{{@ipv6={@local, @local, [0x0, 0xffffff00, 0xffffffff, 0xffffff00], [0xffffffff, 0xff, 0xffffffff, 0xff], 'eql\x00', 'gretap0\x00', {}, {0xff}, 0x0, 0x7fffffff, 0x2, 0x61}, 0x0, 0x188, 0x1c8, 0x0, {}, [@common=@unspec=@conntrack2={0xc0, 'conntrack\x00', 0x2, {{@ipv4=@loopback, [0xffffffff, 0xffffffff, 0x0, 0xffffffff], @ipv4=@loopback, [0x0, 0xffffffff, 0xffffff00, 0xff000000], @ipv6=@ipv4={[], [], @remote}, [0xffffff00, 0xff000000, 0xff000000, 0xff], @ipv4=@multicast2, [0xffffffff, 0xff, 0xff0000ff], 0x3, 0x1ff, 0x4, 0x4e21, 0x4e20, 0x4e22, 0x4e20, 0x28, 0x20}, 0x1c0, 0x98}}]}, @common=@unspec=@ERROR={0x40, 'ERROR\x00', 0x0, "f650bd5c77822a55c077a2b3078812467f4ab9fefc372cf333baff203cdb"}}, {{@ipv6={@remote, @mcast2, [0xff000000, 0xffffff00, 0xffffffff, 0xff000000], [0x0, 0xff, 0xff000000, 0xffffff00], 'syzkaller0\x00', 'lo\x00', {}, {0xff}, 0x2b, 0x1, 0x2, 0x23}, 0x0, 0xf0, 0x130, 0x0, {}, [@common=@hl={0x28, 'hl\x00'}]}, @common=@inet=@TCPOPTSTRIP={0x40, 'TCPOPTSTRIP\x00', 0x0, {[0xe08d, 0x6, 0xff, 0x800, 0x2, 0x7, 0x3, 0x5]}}}, {{@uncond, 0x0, 0xf0, 0x118, 0x0, {}, [@common=@hl={0x28, 'hl\x00', 0x0, {0x3, 0x604}}]}, @common=@unspec=@STANDARD={0x28, '\x00', 0x0, 0xfffffffffffffffd}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x540) ioctl$EXT4_IOC_MIGRATE(0xffffffffffffffff, 0x6609) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000300)={0x0}, &(0x7f0000000400)=0xc) getsockopt$ARPT_SO_GET_INFO(r0, 0x0, 0x60, &(0x7f0000000740)={'filter\x00'}, &(0x7f00000007c0)=0x44) r3 = getpgrp(r2) prlimit64(r3, 0x0, &(0x7f00000004c0)={0x0, 0x7ffffd}, &(0x7f00000002c0)) lremovexattr(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000480)=@random={'trusted.', 'bpf\x00'}) getsockopt$inet_sctp_SCTP_PR_ASSOC_STATUS(0xffffffffffffffff, 0x84, 0x73, &(0x7f0000000280)={0x0, 0x8, 0x0, 0xe0}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r4 = syz_open_dev$amidi(&(0x7f0000000100)='/dev/amidi#\x00', 0x2, 0x800) ioctl$SG_GET_ACCESS_COUNT(r0, 0x2289, &(0x7f0000000680)) recvfrom(r4, &(0x7f0000000500)=""/96, 0x60, 0x20, &(0x7f00000005c0)=@ipx={0x4, 0x1, 0x6, "6b183128f377"}, 0x80) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000200)='./file0\x00', 0x700, 0x0, &(0x7f00000024c0), 0x100032, &(0x7f00000000c0)=ANY=[@ANYBLOB]) prctl$PR_MPX_ENABLE_MANAGEMENT(0x2b) getsockopt$inet_dccp_int(0xffffffffffffffff, 0x21, 0xf, &(0x7f0000000240), 0x0) fstat(0xffffffffffffffff, &(0x7f00000006c0)) ioctl$FICLONE(r1, 0x40049409, r4) setgroups(0x3, &(0x7f0000000340)=[0x0, 0x0, 0x0]) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, 0x0) 14:19:08 executing program 0: r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/expire_quiescent_template\x00', 0x2, 0x0) r1 = syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x1, 0x0) accept$inet6(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000080)=0x1c) ioctl(r1, 0xffffffffffffffb7, &(0x7f0000000080)) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000140)=@security={'security\x00', 0xe, 0x4, 0x4e0, 0x1f0, 0x320, 0x0, 0x320, 0x320, 0x438, 0x438, 0x438, 0x438, 0x438, 0x4, &(0x7f0000000100), {[{{@ipv6={@local, @local, [0x0, 0xffffff00, 0xffffffff, 0xffffff00], [0xffffffff, 0xff, 0xffffffff, 0xff], 'eql\x00', 'gretap0\x00', {}, {0xff}, 0x0, 0x7fffffff, 0x2, 0x61}, 0x0, 0x188, 0x1c8, 0x0, {}, [@common=@unspec=@conntrack2={0xc0, 'conntrack\x00', 0x2, {{@ipv4=@loopback, [0xffffffff, 0xffffffff, 0x0, 0xffffffff], @ipv4=@loopback, [0x0, 0xffffffff, 0xffffff00, 0xff000000], @ipv6=@ipv4={[], [], @remote}, [0xffffff00, 0xff000000, 0xff000000, 0xff], @ipv4=@multicast2, [0xffffffff, 0xff, 0xff0000ff], 0x3, 0x1ff, 0x4, 0x4e21, 0x4e20, 0x4e22, 0x4e20, 0x28, 0x20}, 0x1c0, 0x98}}]}, @common=@unspec=@ERROR={0x40, 'ERROR\x00', 0x0, "f650bd5c77822a55c077a2b3078812467f4ab9fefc372cf333baff203cdb"}}, {{@ipv6={@remote, @mcast2, [0xff000000, 0xffffff00, 0xffffffff, 0xff000000], [0x0, 0xff, 0xff000000, 0xffffff00], 'syzkaller0\x00', 'lo\x00', {}, {0xff}, 0x2b, 0x1, 0x2, 0x23}, 0x0, 0xf0, 0x130, 0x0, {}, [@common=@hl={0x28, 'hl\x00'}]}, @common=@inet=@TCPOPTSTRIP={0x40, 'TCPOPTSTRIP\x00', 0x0, {[0xe08d, 0x6, 0xff, 0x800, 0x2, 0x7, 0x3, 0x5]}}}, {{@uncond, 0x0, 0xf0, 0x118, 0x0, {}, [@common=@hl={0x28, 'hl\x00', 0x0, {0x3, 0x604}}]}, @common=@unspec=@STANDARD={0x28, '\x00', 0x0, 0xfffffffffffffffd}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x540) ioctl$EXT4_IOC_MIGRATE(0xffffffffffffffff, 0x6609) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000300)={0x0}, &(0x7f0000000400)=0xc) getsockopt$ARPT_SO_GET_INFO(r0, 0x0, 0x60, &(0x7f0000000740)={'filter\x00'}, &(0x7f00000007c0)=0x44) r3 = getpgrp(r2) prlimit64(r3, 0x0, &(0x7f00000004c0)={0x0, 0x7ffffd}, &(0x7f00000002c0)) lremovexattr(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000480)=@random={'trusted.', 'bpf\x00'}) getsockopt$inet_sctp_SCTP_PR_ASSOC_STATUS(0xffffffffffffffff, 0x84, 0x73, &(0x7f0000000280)={0x0, 0x8, 0x0, 0xe0}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r4 = syz_open_dev$amidi(&(0x7f0000000100)='/dev/amidi#\x00', 0x2, 0x800) recvfrom(r4, &(0x7f0000000500)=""/96, 0x60, 0x20, &(0x7f00000005c0)=@ipx={0x4, 0x1, 0x6, "6b183128f377"}, 0x80) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000200)='./file0\x00', 0x700, 0x0, &(0x7f00000024c0), 0x100032, &(0x7f00000000c0)=ANY=[@ANYBLOB]) prctl$PR_MPX_ENABLE_MANAGEMENT(0x2b) getsockopt$inet_dccp_int(0xffffffffffffffff, 0x21, 0xf, &(0x7f0000000240), 0x0) fstat(0xffffffffffffffff, &(0x7f00000006c0)) [ 2734.168831] hfs: can't find a HFS filesystem on dev loop2 [ 2734.196110] gfs2: invalid mount option: fowner<00000000000000000000 14:19:09 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x3, &(0x7f0000001fd8)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x15}}, &(0x7f0000000080)="47504c049c3514bf772da07ae82e76590a36f6493ec1ab91b397e42abf1ea6cd8cd77427fc9a9e2b7165f52b4107bf0850d899dc52d013175ddb1b2f46203c2a05b722e33e556fb2e3f39a3cde1fca53640337ec956146bdbfcb115070195631de5d21a5ea9e638c2bdb78a501ca4b6ea313d82568f9382c2c3f6faba6b4ee54793b4ed26dae3e52225029bb2ac0007f77754c3f23ceda9809b9a9684a940abcaa8cfcc7133ec422e9c83888318d41e9a493f0195fe2599651b89504f5dba14625ce2366f33d95dba92f867279cabf4aceddc85a8af7a0fa68d767ce5136b9d0d1966c499cb6bf34c2988666970000000000000000000000", 0x0, 0xffffff80}, 0x48) [ 2734.287874] gfs2: can't parse mount arguments 14:19:09 executing program 2: getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) syz_mount_image$hfs(&(0x7f0000000200)='hfs\x00', &(0x7f0000000280)='./file0\x00', 0x68000000, 0x0, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 14:19:09 executing program 0: r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/expire_quiescent_template\x00', 0x2, 0x0) r1 = syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x1, 0x0) accept$inet6(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000080)=0x1c) ioctl(r1, 0xffffffffffffffb7, &(0x7f0000000080)) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000140)=@security={'security\x00', 0xe, 0x4, 0x4e0, 0x1f0, 0x320, 0x0, 0x320, 0x320, 0x438, 0x438, 0x438, 0x438, 0x438, 0x4, &(0x7f0000000100), {[{{@ipv6={@local, @local, [0x0, 0xffffff00, 0xffffffff, 0xffffff00], [0xffffffff, 0xff, 0xffffffff, 0xff], 'eql\x00', 'gretap0\x00', {}, {0xff}, 0x0, 0x7fffffff, 0x2, 0x61}, 0x0, 0x188, 0x1c8, 0x0, {}, [@common=@unspec=@conntrack2={0xc0, 'conntrack\x00', 0x2, {{@ipv4=@loopback, [0xffffffff, 0xffffffff, 0x0, 0xffffffff], @ipv4=@loopback, [0x0, 0xffffffff, 0xffffff00, 0xff000000], @ipv6=@ipv4={[], [], @remote}, [0xffffff00, 0xff000000, 0xff000000, 0xff], @ipv4=@multicast2, [0xffffffff, 0xff, 0xff0000ff], 0x3, 0x1ff, 0x4, 0x4e21, 0x4e20, 0x4e22, 0x4e20, 0x28, 0x20}, 0x1c0, 0x98}}]}, @common=@unspec=@ERROR={0x40, 'ERROR\x00', 0x0, "f650bd5c77822a55c077a2b3078812467f4ab9fefc372cf333baff203cdb"}}, {{@ipv6={@remote, @mcast2, [0xff000000, 0xffffff00, 0xffffffff, 0xff000000], [0x0, 0xff, 0xff000000, 0xffffff00], 'syzkaller0\x00', 'lo\x00', {}, {0xff}, 0x2b, 0x1, 0x2, 0x23}, 0x0, 0xf0, 0x130, 0x0, {}, [@common=@hl={0x28, 'hl\x00'}]}, @common=@inet=@TCPOPTSTRIP={0x40, 'TCPOPTSTRIP\x00', 0x0, {[0xe08d, 0x6, 0xff, 0x800, 0x2, 0x7, 0x3, 0x5]}}}, {{@uncond, 0x0, 0xf0, 0x118, 0x0, {}, [@common=@hl={0x28, 'hl\x00', 0x0, {0x3, 0x604}}]}, @common=@unspec=@STANDARD={0x28, '\x00', 0x0, 0xfffffffffffffffd}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x540) ioctl$EXT4_IOC_MIGRATE(0xffffffffffffffff, 0x6609) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000300)={0x0}, &(0x7f0000000400)=0xc) getsockopt$ARPT_SO_GET_INFO(r0, 0x0, 0x60, &(0x7f0000000740)={'filter\x00'}, &(0x7f00000007c0)=0x44) r3 = getpgrp(r2) prlimit64(r3, 0x0, &(0x7f00000004c0)={0x0, 0x7ffffd}, &(0x7f00000002c0)) lremovexattr(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000480)=@random={'trusted.', 'bpf\x00'}) getsockopt$inet_sctp_SCTP_PR_ASSOC_STATUS(0xffffffffffffffff, 0x84, 0x73, &(0x7f0000000280)={0x0, 0x8, 0x0, 0xe0}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r4 = syz_open_dev$amidi(&(0x7f0000000100)='/dev/amidi#\x00', 0x2, 0x800) recvfrom(r4, &(0x7f0000000500)=""/96, 0x60, 0x20, &(0x7f00000005c0)=@ipx={0x4, 0x1, 0x6, "6b183128f377"}, 0x80) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000200)='./file0\x00', 0x700, 0x0, &(0x7f00000024c0), 0x100032, &(0x7f00000000c0)=ANY=[@ANYBLOB]) prctl$PR_MPX_ENABLE_MANAGEMENT(0x2b) getsockopt$inet_dccp_int(0xffffffffffffffff, 0x21, 0xf, &(0x7f0000000240), 0x0) 14:19:09 executing program 3: lstat(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0}) syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000040)='./file0\x00', 0xb102b8700, 0x3, &(0x7f0000000240)=[{&(0x7f0000000080)="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", 0xfc, 0x8}, {&(0x7f0000000180)="6e4fae343fcbe75f750edab4ffe869cf59917854f4c0064b2fefb89db71f83a1dbd85e8720426ce6dac8c1d994bda6e76d23aafb8234e65dd6ce69b85ba473a42f9a10", 0x43, 0x3ff}, {&(0x7f0000000200)="0cf1e6962e8e09a410cd9d6a8b06436370074e01970a", 0x16, 0xf453}], 0x10000, &(0x7f0000000440)={[{@quota_off='quota=off'}, {@noloccookie='noloccookie'}, {@quota_quantum={'quota_quantum', 0x3d, 0x7fffffff}}, {@rgrplvb='rgrplvb'}, {@rgrplvb='rgrplvb'}], [{@smackfshat={'smackfshat', 0x3d, "7db3706f7369785f61636c5f6163636573732e"}}, {@fowner_lt={'fowner<', r0}}, {@smackfsroot={'smackfsroot'}}, {@fsuuid={'fsuuid', 0x3d, {[0x62, 0x7d, 0x32, 0x66, 0x32, 0x38, 0x77, 0x77], 0x2d, [0x37, 0x38, 0x77, 0x77], 0x2d, [0x66, 0x62, 0x73, 0x7d], 0x2d, [0x33, 0x36, 0x67, 0x30], 0x2d, [0x36, 0x63, 0x67, 0x54a07f1fb49ecd59, 0x38, 0x77, 0x77, 0x7f]}}}, {@fowner_lt={'fowner<'}}, {@obj_user={'obj_user', 0x3d, 'self^md5sum'}}, {@smackfstransmute={'smackfstransmute', 0x3d, '[-/em0'}}, {@obj_type={'obj_type', 0x3d, '\':/{vboxnet1em0selinuxsecurityvmnet1.'}}]}) 14:19:09 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x3, &(0x7f0000001fd8)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x15}}, &(0x7f0000000080)="47504c049c3514bf772da07ae82e76590a36f6493ec1ab91b397e42abf1ea6cd8cd77427fc9a9e2b7165f52b4107bf0850d899dc52d013175ddb1b2f46203c2a05b722e33e556fb2e3f39a3cde1fca53640337ec956146bdbfcb115070195631de5d21a5ea9e638c2bdb78a501ca4b6ea313d82568f9382c2c3f6faba6b4ee54793b4ed26dae3e52225029bb2ac0007f77754c3f23ceda9809b9a9684a940abcaa8cfcc7133ec422e9c83888318d41e9a493f0195fe2599651b89504f5dba14625ce2366f33d95dba92f867279cabf4aceddc85a8af7a0fa68d767ce5136b9d0d1966c499cb6bf34c2988666970000000000000000000000", 0x0, 0x17d629}, 0x48) [ 2734.541300] EXT4-fs (sda1): re-mounted. Opts: [ 2734.560555] EXT4-fs (sda1): Unrecognized mount option "./file0" or missing value [ 2734.593376] hfs: can't find a HFS filesystem on dev loop2 14:19:09 executing program 4: r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/expire_quiescent_template\x00', 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000140)=@security={'security\x00', 0xe, 0x4, 0x4b8, 0x1f0, 0x320, 0x0, 0x320, 0x320, 0x438, 0x438, 0x438, 0x438, 0x438, 0x4, &(0x7f0000000100), {[{{@ipv6={@local, @local, [0x0, 0x0, 0xffffffff, 0xffffff00], [0xffffffff, 0xff, 0xffffffff, 0xff], 'eql\x00', 'gretap0\x00', {}, {0xff}, 0x0, 0x7fffffff, 0x2, 0x61}, 0x0, 0x188, 0x1c8, 0x0, {}, [@common=@unspec=@conntrack2={0xc0, 'conntrack\x00', 0x2, {{@ipv4=@loopback, [0xffffffff, 0xffffffff, 0x0, 0xffffffff], @ipv4=@loopback, [0x0, 0xffffffff, 0xffffff00, 0xff000000], @ipv6=@ipv4={[], [], @remote}, [0xffffff00, 0xff000000, 0xff000000, 0xff], @ipv4=@multicast2, [0xffffffff, 0xff, 0xff0000ff], 0x3, 0x1ff, 0x4, 0x4e21, 0x4e20, 0x4e22, 0x4e20, 0x28}, 0x1c0, 0x98}}]}, @common=@unspec=@ERROR={0x40, 'ERROR\x00', 0x0, "f650bd5c77822a55c077a2b3078812467f4ab9fefc372cf333baff203cdb"}}, {{@ipv6={@remote, @mcast2, [0xff000000, 0xffffff00, 0xffffffff, 0xff000000], [0x0, 0xff, 0xff000000, 0xffffff00], 'syzkaller0\x00', 'lo\x00', {}, {}, 0x2b, 0x1, 0x2, 0x23}, 0x0, 0xc8, 0x108}, @common=@inet=@TCPOPTSTRIP={0x40, 'TCPOPTSTRIP\x00', 0x0, {[0xe08d, 0x6, 0xff, 0x800, 0x2, 0x7, 0x0, 0x5]}}}, {{@uncond, 0x0, 0xf0, 0x118, 0x0, {}, [@common=@hl={0x28, 'hl\x00', 0x0, {0x3, 0x604}}]}, @common=@unspec=@STANDARD={0x28, '\x00', 0x0, 0xfffffffffffffffd}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x518) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = getpgrp(0x0) prlimit64(r2, 0x0, &(0x7f00000004c0)={0x0, 0x7ffffd}, &(0x7f00000002c0)) lremovexattr(0x0, &(0x7f0000000480)=@random={'trusted.', 'bpf\x00'}) getsockopt$inet_sctp_SCTP_PR_ASSOC_STATUS(0xffffffffffffffff, 0x84, 0x73, &(0x7f0000000280), 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r3 = syz_open_dev$amidi(&(0x7f0000000100)='/dev/amidi#\x00', 0x2, 0x800) recvfrom(0xffffffffffffffff, 0x0, 0x0, 0x20, &(0x7f0000000740)=@ipx={0x4, 0x1, 0x6, "6b183128f377"}, 0x80) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000200)='./file0\x00', 0x700, 0x0, &(0x7f00000024c0), 0x100032, &(0x7f00000000c0)=ANY=[@ANYBLOB]) getsockopt$inet_dccp_int(0xffffffffffffffff, 0x21, 0xf, &(0x7f0000000240), 0x0) fstat(0xffffffffffffffff, &(0x7f00000006c0)) getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, &(0x7f0000000440)={0x0, 0x80}, &(0x7f00000001c0)=0xfffffffffffffd3f) ioctl$FICLONE(r1, 0x40049409, r3) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, 0x0) [ 2734.714126] gfs2: invalid mount option: fowner<00000000000000000000 [ 2734.724690] gfs2: can't parse mount arguments 14:19:09 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x3, &(0x7f0000001fd8)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x15}}, &(0x7f0000000080)="47504c049c3514bf772da07ae82e76590a36f6493ec1ab91b397e42abf1ea6cd8cd77427fc9a9e2b7165f52b4107bf0850d899dc52d013175ddb1b2f46203c2a05b722e33e556fb2e3f39a3cde1fca53640337ec956146bdbfcb115070195631de5d21a5ea9e638c2bdb78a501ca4b6ea313d82568f9382c2c3f6faba6b4ee54793b4ed26dae3e52225029bb2ac0007f77754c3f23ceda9809b9a9684a940abcaa8cfcc7133ec422e9c83888318d41e9a493f0195fe2599651b89504f5dba14625ce2366f33d95dba92f867279cabf4aceddc85a8af7a0fa68d767ce5136b9d0d1966c499cb6bf34c2988666970000000000000000000000", 0x0, 0x300000000000000}, 0x48) 14:19:09 executing program 0: r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/expire_quiescent_template\x00', 0x2, 0x0) r1 = syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x1, 0x0) accept$inet6(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000080)=0x1c) ioctl(r1, 0xffffffffffffffb7, &(0x7f0000000080)) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000140)=@security={'security\x00', 0xe, 0x4, 0x4e0, 0x1f0, 0x320, 0x0, 0x320, 0x320, 0x438, 0x438, 0x438, 0x438, 0x438, 0x4, &(0x7f0000000100), {[{{@ipv6={@local, @local, [0x0, 0xffffff00, 0xffffffff, 0xffffff00], [0xffffffff, 0xff, 0xffffffff, 0xff], 'eql\x00', 'gretap0\x00', {}, {0xff}, 0x0, 0x7fffffff, 0x2, 0x61}, 0x0, 0x188, 0x1c8, 0x0, {}, [@common=@unspec=@conntrack2={0xc0, 'conntrack\x00', 0x2, {{@ipv4=@loopback, [0xffffffff, 0xffffffff, 0x0, 0xffffffff], @ipv4=@loopback, [0x0, 0xffffffff, 0xffffff00, 0xff000000], @ipv6=@ipv4={[], [], @remote}, [0xffffff00, 0xff000000, 0xff000000, 0xff], @ipv4=@multicast2, [0xffffffff, 0xff, 0xff0000ff], 0x3, 0x1ff, 0x4, 0x4e21, 0x4e20, 0x4e22, 0x4e20, 0x28, 0x20}, 0x1c0, 0x98}}]}, @common=@unspec=@ERROR={0x40, 'ERROR\x00', 0x0, "f650bd5c77822a55c077a2b3078812467f4ab9fefc372cf333baff203cdb"}}, {{@ipv6={@remote, @mcast2, [0xff000000, 0xffffff00, 0xffffffff, 0xff000000], [0x0, 0xff, 0xff000000, 0xffffff00], 'syzkaller0\x00', 'lo\x00', {}, {0xff}, 0x2b, 0x1, 0x2, 0x23}, 0x0, 0xf0, 0x130, 0x0, {}, [@common=@hl={0x28, 'hl\x00'}]}, @common=@inet=@TCPOPTSTRIP={0x40, 'TCPOPTSTRIP\x00', 0x0, {[0xe08d, 0x6, 0xff, 0x800, 0x2, 0x7, 0x3, 0x5]}}}, {{@uncond, 0x0, 0xf0, 0x118, 0x0, {}, [@common=@hl={0x28, 'hl\x00', 0x0, {0x3, 0x604}}]}, @common=@unspec=@STANDARD={0x28, '\x00', 0x0, 0xfffffffffffffffd}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x540) ioctl$EXT4_IOC_MIGRATE(0xffffffffffffffff, 0x6609) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000300)={0x0}, &(0x7f0000000400)=0xc) getsockopt$ARPT_SO_GET_INFO(r0, 0x0, 0x60, &(0x7f0000000740)={'filter\x00'}, &(0x7f00000007c0)=0x44) r3 = getpgrp(r2) prlimit64(r3, 0x0, &(0x7f00000004c0)={0x0, 0x7ffffd}, &(0x7f00000002c0)) lremovexattr(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000480)=@random={'trusted.', 'bpf\x00'}) getsockopt$inet_sctp_SCTP_PR_ASSOC_STATUS(0xffffffffffffffff, 0x84, 0x73, &(0x7f0000000280)={0x0, 0x8, 0x0, 0xe0}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r4 = syz_open_dev$amidi(&(0x7f0000000100)='/dev/amidi#\x00', 0x2, 0x800) recvfrom(r4, &(0x7f0000000500)=""/96, 0x60, 0x20, &(0x7f00000005c0)=@ipx={0x4, 0x1, 0x6, "6b183128f377"}, 0x80) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000200)='./file0\x00', 0x700, 0x0, &(0x7f00000024c0), 0x100032, &(0x7f00000000c0)=ANY=[@ANYBLOB]) prctl$PR_MPX_ENABLE_MANAGEMENT(0x2b) 14:19:09 executing program 1: r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/expire_quiescent_template\x00', 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000140)=@security={'security\x00', 0xe, 0x4, 0x4e0, 0x1f0, 0x320, 0x0, 0x320, 0x320, 0x438, 0x438, 0x438, 0x438, 0x438, 0x4, &(0x7f0000000100), {[{{@ipv6={@local, @local, [0x0, 0xffffff00, 0xffffffff, 0xffffff00], [0xffffffff, 0xff, 0xffffffff, 0xff], 'eql\x00', 'gretap0\x00', {}, {0xff}, 0x0, 0x7fffffff, 0x2, 0x61}, 0x0, 0x188, 0x1c8, 0x0, {}, [@common=@unspec=@conntrack2={0xc0, 'conntrack\x00', 0x2, {{@ipv4=@loopback, [0xffffffff, 0xffffffff, 0x0, 0xffffffff], @ipv4=@loopback, [0x0, 0xffffffff, 0xffffff00, 0xff000000], @ipv6=@ipv4={[], [], @remote}, [0xffffff00, 0xff000000, 0xff000000, 0xff], @ipv4=@multicast2, [0xffffffff, 0xff, 0xff0000ff], 0x3, 0x1ff, 0x4, 0x4e21, 0x4e20, 0x4e22, 0x4e20, 0x28, 0x20}, 0x1c0, 0x98}}]}, @common=@unspec=@ERROR={0x40, 'ERROR\x00', 0x0, "f650bd5c77822a55c077a2b3078812467f4ab9fefc372cf333baff203cdb"}}, {{@ipv6={@remote, @mcast2, [0xff000000, 0xffffff00, 0xffffffff, 0xff000000], [0x0, 0xff, 0xff000000, 0xffffff00], 'syzkaller0\x00', 'lo\x00', {}, {0xff}, 0x2b, 0x1, 0x2, 0x23}, 0x0, 0xf0, 0x130, 0x0, {}, [@common=@hl={0x28, 'hl\x00'}]}, @common=@inet=@TCPOPTSTRIP={0x40, 'TCPOPTSTRIP\x00', 0x0, {[0xe08d, 0x6, 0xff, 0x800, 0x2, 0x7, 0x3, 0x5]}}}, {{@uncond, 0x0, 0xf0, 0x118, 0x0, {}, [@common=@hl={0x28, 'hl\x00', 0x0, {0x3, 0x604}}]}, @common=@unspec=@STANDARD={0x28, '\x00', 0x0, 0xfffffffffffffffd}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0xffffffffffffff37) ioctl$EXT4_IOC_MIGRATE(0xffffffffffffffff, 0x6609) socket$inet6_udplite(0xa, 0x2, 0x88) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000300)={0x0}, &(0x7f0000000400)=0xc) getsockopt$ARPT_SO_GET_INFO(r0, 0x0, 0x60, &(0x7f0000000740)={'filter\x00'}, &(0x7f00000007c0)=0x44) r3 = getpgrp(r2) prlimit64(r3, 0x0, &(0x7f00000004c0)={0x0, 0x7ffffd}, &(0x7f00000002c0)) lremovexattr(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000480)=@random={'trusted.', 'bpf\x00'}) getsockopt$inet_sctp_SCTP_PR_ASSOC_STATUS(0xffffffffffffffff, 0x84, 0x73, &(0x7f0000000280)={0x0, 0x8, 0x0, 0xe0}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r4 = syz_open_dev$amidi(&(0x7f0000000100)='/dev/amidi#\x00', 0x2, 0x800) recvfrom(r4, &(0x7f0000000500)=""/96, 0x60, 0x20, &(0x7f00000005c0)=@ipx={0x4, 0x1, 0x6, "6b183128f377"}, 0x80) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000200)='./file0\x00', 0x700, 0x0, &(0x7f00000024c0), 0x100032, &(0x7f0000000800)=ANY=[@ANYBLOB="6be4791c13d436cdd24ec9167cb07620932f54b2386de439853107ed20f4b96913707353acba4802ee6c1ec8b4f6b78e3f0eac89e0bd24ab8fdce54e38018945ac79ef878c07ee12fde7eebf8f9186f21943dc9b11"]) prctl$PR_MPX_ENABLE_MANAGEMENT(0x2b) getsockopt$inet_dccp_int(0xffffffffffffffff, 0x21, 0xf, &(0x7f0000000240), 0x0) fstat(0xffffffffffffffff, &(0x7f0000000900)) getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, &(0x7f0000000440)={0x0, 0x80}, &(0x7f00000001c0)=0xfffffffffffffd3f) ioctl$FICLONE(r1, 0x40049409, r4) setgroups(0x3, &(0x7f0000000340)=[0x0, 0x0, 0x0]) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, 0x0) [ 2734.900755] hfs: can't find a HFS filesystem on dev loop2 14:19:09 executing program 3: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000040)='./file0\x00', 0xb102b8700, 0x3, &(0x7f0000000240)=[{&(0x7f0000000080)="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", 0xfc, 0x8}, {&(0x7f0000000180)="6e4fae343fcbe75f750edab4ffe869cf59917854f4c0064b2fefb89db71f83a1dbd85e8720426ce6dac8c1d994bda6e76d23aafb8234e65dd6ce69b85ba473a42f9a10", 0x43, 0x3ff}, {&(0x7f0000000200)="0cf1e6962e8e09a410cd9d6a8b06436370074e01970a", 0x16, 0xf453}], 0x10000, &(0x7f0000000440)={[{@quota_off='quota=off'}, {@noloccookie='noloccookie'}, {@quota_quantum={'quota_quantum', 0x3d, 0x7fffffff}}, {@rgrplvb='rgrplvb'}, {@rgrplvb='rgrplvb'}], [{@smackfshat={'smackfshat', 0x3d, "7db3706f7369785f61636c5f6163636573732e"}}, {@fowner_lt={'fowner<'}}, {@smackfsroot={'smackfsroot'}}, {@fsuuid={'fsuuid', 0x3d, {[0x62, 0x7d, 0x32, 0x66, 0x32, 0x38, 0x77, 0x77], 0x2d, [0x37, 0x38, 0x77, 0x77], 0x2d, [0x66, 0x62, 0x73, 0x7d], 0x2d, [0x33, 0x36, 0x67, 0x30], 0x2d, [0x36, 0x63, 0x67, 0x54a07f1fb49ecd59, 0x38, 0x77, 0x77, 0x7f]}}}, {@fowner_lt={'fowner<'}}, {@obj_user={'obj_user', 0x3d, 'self^md5sum'}}, {@smackfstransmute={'smackfstransmute', 0x3d, '[-/em0'}}, {@obj_type={'obj_type', 0x3d, '\':/{vboxnet1em0selinuxsecurityvmnet1.'}}]}) 14:19:09 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x3, &(0x7f0000001fd8)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x15}}, &(0x7f0000000080)="47504c049c3514bf772da07ae82e76590a36f6493ec1ab91b397e42abf1ea6cd8cd77427fc9a9e2b7165f52b4107bf0850d899dc52d013175ddb1b2f46203c2a05b722e33e556fb2e3f39a3cde1fca53640337ec956146bdbfcb115070195631de5d21a5ea9e638c2bdb78a501ca4b6ea313d82568f9382c2c3f6faba6b4ee54793b4ed26dae3e52225029bb2ac0007f77754c3f23ceda9809b9a9684a940abcaa8cfcc7133ec422e9c83888318d41e9a493f0195fe2599651b89504f5dba14625ce2366f33d95dba92f867279cabf4aceddc85a8af7a0fa68d767ce5136b9d0d1966c499cb6bf34c2988666970000000000000000000000", 0x0, 0xa00000000000000}, 0x48) 14:19:10 executing program 2: getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) syz_mount_image$hfs(&(0x7f0000000200)='hfs\x00', &(0x7f0000000280)='./file0\x00', 0x42440000, 0x0, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) [ 2735.183148] gfs2: invalid mount option: fowner<00000000000000000000 [ 2735.251141] gfs2: can't parse mount arguments [ 2735.340378] hfs: can't find a HFS filesystem on dev loop2 14:19:10 executing program 0: r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/expire_quiescent_template\x00', 0x2, 0x0) r1 = syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x1, 0x0) accept$inet6(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000080)=0x1c) ioctl(r1, 0xffffffffffffffb7, &(0x7f0000000080)) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000140)=@security={'security\x00', 0xe, 0x4, 0x4e0, 0x1f0, 0x320, 0x0, 0x320, 0x320, 0x438, 0x438, 0x438, 0x438, 0x438, 0x4, &(0x7f0000000100), {[{{@ipv6={@local, @local, [0x0, 0xffffff00, 0xffffffff, 0xffffff00], [0xffffffff, 0xff, 0xffffffff, 0xff], 'eql\x00', 'gretap0\x00', {}, {0xff}, 0x0, 0x7fffffff, 0x2, 0x61}, 0x0, 0x188, 0x1c8, 0x0, {}, [@common=@unspec=@conntrack2={0xc0, 'conntrack\x00', 0x2, {{@ipv4=@loopback, [0xffffffff, 0xffffffff, 0x0, 0xffffffff], @ipv4=@loopback, [0x0, 0xffffffff, 0xffffff00, 0xff000000], @ipv6=@ipv4={[], [], @remote}, [0xffffff00, 0xff000000, 0xff000000, 0xff], @ipv4=@multicast2, [0xffffffff, 0xff, 0xff0000ff], 0x3, 0x1ff, 0x4, 0x4e21, 0x4e20, 0x4e22, 0x4e20, 0x28, 0x20}, 0x1c0, 0x98}}]}, @common=@unspec=@ERROR={0x40, 'ERROR\x00', 0x0, "f650bd5c77822a55c077a2b3078812467f4ab9fefc372cf333baff203cdb"}}, {{@ipv6={@remote, @mcast2, [0xff000000, 0xffffff00, 0xffffffff, 0xff000000], [0x0, 0xff, 0xff000000, 0xffffff00], 'syzkaller0\x00', 'lo\x00', {}, {0xff}, 0x2b, 0x1, 0x2, 0x23}, 0x0, 0xf0, 0x130, 0x0, {}, [@common=@hl={0x28, 'hl\x00'}]}, @common=@inet=@TCPOPTSTRIP={0x40, 'TCPOPTSTRIP\x00', 0x0, {[0xe08d, 0x6, 0xff, 0x800, 0x2, 0x7, 0x3, 0x5]}}}, {{@uncond, 0x0, 0xf0, 0x118, 0x0, {}, [@common=@hl={0x28, 'hl\x00', 0x0, {0x3, 0x604}}]}, @common=@unspec=@STANDARD={0x28, '\x00', 0x0, 0xfffffffffffffffd}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x540) ioctl$EXT4_IOC_MIGRATE(0xffffffffffffffff, 0x6609) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000300)={0x0}, &(0x7f0000000400)=0xc) getsockopt$ARPT_SO_GET_INFO(r0, 0x0, 0x60, &(0x7f0000000740)={'filter\x00'}, &(0x7f00000007c0)=0x44) r3 = getpgrp(r2) prlimit64(r3, 0x0, &(0x7f00000004c0)={0x0, 0x7ffffd}, &(0x7f00000002c0)) lremovexattr(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000480)=@random={'trusted.', 'bpf\x00'}) getsockopt$inet_sctp_SCTP_PR_ASSOC_STATUS(0xffffffffffffffff, 0x84, 0x73, &(0x7f0000000280)={0x0, 0x8, 0x0, 0xe0}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r4 = syz_open_dev$amidi(&(0x7f0000000100)='/dev/amidi#\x00', 0x2, 0x800) recvfrom(r4, &(0x7f0000000500)=""/96, 0x60, 0x20, &(0x7f00000005c0)=@ipx={0x4, 0x1, 0x6, "6b183128f377"}, 0x80) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000200)='./file0\x00', 0x700, 0x0, &(0x7f00000024c0), 0x100032, &(0x7f00000000c0)=ANY=[@ANYBLOB]) prctl$PR_MPX_ENABLE_MANAGEMENT(0x2b) 14:19:10 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x3, &(0x7f0000001fd8)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x15}}, &(0x7f0000000080)="47504c049c3514bf772da07ae82e76590a36f6493ec1ab91b397e42abf1ea6cd8cd77427fc9a9e2b7165f52b4107bf0850d899dc52d013175ddb1b2f46203c2a05b722e33e556fb2e3f39a3cde1fca53640337ec956146bdbfcb115070195631de5d21a5ea9e638c2bdb78a501ca4b6ea313d82568f9382c2c3f6faba6b4ee54793b4ed26dae3e52225029bb2ac0007f77754c3f23ceda9809b9a9684a940abcaa8cfcc7133ec422e9c83888318d41e9a493f0195fe2599651b89504f5dba14625ce2366f33d95dba92f867279cabf4aceddc85a8af7a0fa68d767ce5136b9d0d1966c499cb6bf34c2988666970000000000000000000000", 0x0, 0x4000000}, 0x48) 14:19:10 executing program 3: syz_mount_image$gfs2(0x0, &(0x7f0000000040)='./file0\x00', 0xb102b8700, 0x3, &(0x7f0000000240)=[{&(0x7f0000000080)="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", 0xfc, 0x8}, {&(0x7f0000000180)="6e4fae343fcbe75f750edab4ffe869cf59917854f4c0064b2fefb89db71f83a1dbd85e8720426ce6dac8c1d994bda6e76d23aafb8234e65dd6ce69b85ba473a42f9a10", 0x43, 0x3ff}, {&(0x7f0000000200)="0cf1e6962e8e09a410cd9d6a8b06436370074e01970a", 0x16, 0xf453}], 0x10000, &(0x7f0000000440)={[{@quota_off='quota=off'}, {@noloccookie='noloccookie'}, {@quota_quantum={'quota_quantum', 0x3d, 0x7fffffff}}, {@rgrplvb='rgrplvb'}, {@rgrplvb='rgrplvb'}], [{@smackfshat={'smackfshat', 0x3d, "7db3706f7369785f61636c5f6163636573732e"}}, {@fowner_lt={'fowner<'}}, {@smackfsroot={'smackfsroot'}}, {@fsuuid={'fsuuid', 0x3d, {[0x62, 0x7d, 0x32, 0x66, 0x32, 0x38, 0x77, 0x77], 0x2d, [0x37, 0x38, 0x77, 0x77], 0x2d, [0x66, 0x62, 0x73, 0x7d], 0x2d, [0x33, 0x36, 0x67, 0x30], 0x2d, [0x36, 0x63, 0x67, 0x54a07f1fb49ecd59, 0x38, 0x77, 0x77, 0x7f]}}}, {@fowner_lt={'fowner<'}}, {@obj_user={'obj_user', 0x3d, 'self^md5sum'}}, {@smackfstransmute={'smackfstransmute', 0x3d, '[-/em0'}}, {@obj_type={'obj_type', 0x3d, '\':/{vboxnet1em0selinuxsecurityvmnet1.'}}]}) [ 2735.474327] hfs: can't find a HFS filesystem on dev loop2 14:19:10 executing program 4: r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/expire_quiescent_template\x00', 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000140)=@security={'security\x00', 0xe, 0x4, 0x4b8, 0x1f0, 0x320, 0x0, 0x320, 0x320, 0x438, 0x438, 0x438, 0x438, 0x438, 0x4, &(0x7f0000000100), {[{{@ipv6={@local, @local, [0x0, 0x0, 0xffffffff, 0xffffff00], [0xffffffff, 0xff, 0xffffffff, 0xff], 'eql\x00', 'gretap0\x00', {}, {0xff}, 0x0, 0x7fffffff, 0x2, 0x61}, 0x0, 0x188, 0x1c8, 0x0, {}, [@common=@unspec=@conntrack2={0xc0, 'conntrack\x00', 0x2, {{@ipv4=@loopback, [0xffffffff, 0xffffffff, 0x0, 0xffffffff], @ipv4=@loopback, [0x0, 0xffffffff, 0xffffff00, 0xff000000], @ipv6=@ipv4={[], [], @remote}, [0xffffff00, 0xff000000, 0xff000000, 0xff], @ipv4=@multicast2, [0xffffffff, 0xff, 0xff0000ff], 0x3, 0x1ff, 0x4, 0x4e21, 0x4e20, 0x4e22, 0x4e20, 0x28}, 0x1c0, 0x98}}]}, @common=@unspec=@ERROR={0x40, 'ERROR\x00', 0x0, "f650bd5c77822a55c077a2b3078812467f4ab9fefc372cf333baff203cdb"}}, {{@ipv6={@remote, @mcast2, [0xff000000, 0xffffff00, 0xffffffff, 0xff000000], [0x0, 0xff, 0xff000000, 0xffffff00], 'syzkaller0\x00', 'lo\x00', {}, {}, 0x2b, 0x1, 0x2, 0x23}, 0x0, 0xc8, 0x108}, @common=@inet=@TCPOPTSTRIP={0x40, 'TCPOPTSTRIP\x00', 0x0, {[0xe08d, 0x6, 0xff, 0x800, 0x2, 0x7, 0x0, 0x5]}}}, {{@uncond, 0x0, 0xf0, 0x118, 0x0, {}, [@common=@hl={0x28, 'hl\x00', 0x0, {0x3, 0x604}}]}, @common=@unspec=@STANDARD={0x28, '\x00', 0x0, 0xfffffffffffffffd}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x518) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = getpgrp(0x0) prlimit64(r2, 0x0, &(0x7f00000004c0)={0x0, 0x7ffffd}, &(0x7f00000002c0)) open(&(0x7f0000000740)='./file0\x00', 0x200040, 0x0) lremovexattr(0x0, &(0x7f0000000480)=@random={'trusted.', 'bpf\x00'}) getsockopt$inet_sctp_SCTP_PR_ASSOC_STATUS(0xffffffffffffffff, 0x84, 0x73, &(0x7f0000000280), 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r3 = syz_open_dev$amidi(&(0x7f0000000100)='/dev/amidi#\x00', 0x2, 0x800) recvfrom(0xffffffffffffffff, 0x0, 0x0, 0x20, &(0x7f00000005c0)=@ipx={0x4, 0x1, 0x6, "6b183128f377"}, 0x80) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000200)='./file0\x00', 0x700, 0x0, &(0x7f00000024c0), 0x100032, &(0x7f00000000c0)=ANY=[@ANYBLOB]) getsockopt$inet_dccp_int(0xffffffffffffffff, 0x21, 0xf, &(0x7f0000000240), 0x0) fstat(0xffffffffffffffff, &(0x7f00000006c0)) getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, &(0x7f0000000440)={0x0, 0x80}, &(0x7f00000001c0)=0xfffffffffffffd3f) ioctl$FICLONE(r1, 0x40049409, r3) mkdir(&(0x7f0000000680)='./file0\x00', 0x21) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, 0x0) 14:19:10 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x3, &(0x7f0000001fd8)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x15}}, &(0x7f0000000080)="47504c049c3514bf772da07ae82e76590a36f6493ec1ab91b397e42abf1ea6cd8cd77427fc9a9e2b7165f52b4107bf0850d899dc52d013175ddb1b2f46203c2a05b722e33e556fb2e3f39a3cde1fca53640337ec956146bdbfcb115070195631de5d21a5ea9e638c2bdb78a501ca4b6ea313d82568f9382c2c3f6faba6b4ee54793b4ed26dae3e52225029bb2ac0007f77754c3f23ceda9809b9a9684a940abcaa8cfcc7133ec422e9c83888318d41e9a493f0195fe2599651b89504f5dba14625ce2366f33d95dba92f867279cabf4aceddc85a8af7a0fa68d767ce5136b9d0d1966c499cb6bf34c2988666970000000000000000000000", 0x0, 0xffff8000}, 0x48) 14:19:10 executing program 1: r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/expire_quiescent_template\x00', 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000140)=@security={'security\x00', 0xe, 0x4, 0x4e0, 0x1f0, 0x320, 0x0, 0x320, 0x320, 0x438, 0x438, 0x438, 0x438, 0x438, 0x4, &(0x7f0000000100), {[{{@ipv6={@local, @local, [0x0, 0xffffff00, 0xffffffff, 0xffffff00], [0xffffffff, 0xff, 0xffffffff, 0xff], 'eql\x00', 'gretap0\x00', {}, {0xff}, 0x0, 0x7fffffff, 0x2, 0x61}, 0x0, 0x188, 0x1c8, 0x0, {}, [@common=@unspec=@conntrack2={0xc0, 'conntrack\x00', 0x2, {{@ipv4=@loopback, [0xffffffff, 0xffffffff, 0x0, 0xffffffff], @ipv4=@loopback, [0x0, 0xffffffff, 0xffffff00, 0xff000000], @ipv6=@ipv4={[], [], @remote}, [0xffffff00, 0xff000000, 0xff000000, 0xff], @ipv4=@multicast2, [0xffffffff, 0xff, 0xff0000ff], 0x3, 0x1ff, 0x4, 0x4e21, 0x4e20, 0x4e22, 0x4e20, 0x28, 0x20}, 0x1c0, 0x98}}]}, @common=@unspec=@ERROR={0x40, 'ERROR\x00', 0x0, "f650bd5c77822a55c077a2b3078812467f4ab9fefc372cf333baff203cdb"}}, {{@ipv6={@remote, @mcast2, [0xff000000, 0xffffff00, 0xffffffff, 0xff000000], [0x0, 0xff, 0xff000000, 0xffffff00], 'syzkaller0\x00', 'lo\x00', {}, {0xff}, 0x2b, 0x1, 0x2, 0x23}, 0x0, 0xf0, 0x130, 0x0, {}, [@common=@hl={0x28, 'hl\x00'}]}, @common=@inet=@TCPOPTSTRIP={0x40, 'TCPOPTSTRIP\x00', 0x0, {[0xe08d, 0x6, 0xff, 0x800, 0x2, 0x7, 0x3, 0x5]}}}, {{@uncond, 0x0, 0xf0, 0x118, 0x0, {}, [@common=@hl={0x28, 'hl\x00', 0x0, {0x3, 0x604}}]}, @common=@unspec=@STANDARD={0x28, '\x00', 0x0, 0xfffffffffffffffd}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x540) ioctl$EXT4_IOC_MIGRATE(0xffffffffffffffff, 0x6609) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000300)={0x0}, &(0x7f0000000400)=0xc) getsockopt$ARPT_SO_GET_INFO(r0, 0x0, 0x60, &(0x7f0000000740)={'filter\x00'}, &(0x7f00000007c0)=0x44) setsockopt$inet_sctp6_SCTP_I_WANT_MAPPED_V4_ADDR(r0, 0x84, 0xc, &(0x7f0000000680)=0x1000, 0x4) r3 = getpgrp(r2) prlimit64(r3, 0x0, &(0x7f00000004c0)={0x0, 0x7ffffd}, &(0x7f00000002c0)) lremovexattr(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000480)=@random={'trusted.', 'bpf\x00'}) getsockopt$inet_sctp_SCTP_PR_ASSOC_STATUS(0xffffffffffffffff, 0x84, 0x73, &(0x7f0000000280)={0x0, 0x8, 0x0, 0xe0}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r4 = syz_open_dev$amidi(&(0x7f0000000100)='/dev/amidi#\x00', 0x2, 0x800) recvfrom(r4, &(0x7f0000000500)=""/96, 0x60, 0x20, &(0x7f00000005c0)=@ipx={0x4, 0x1, 0x6, "6b183128f377"}, 0x80) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000200)='./file0\x00', 0x700, 0x0, &(0x7f00000024c0), 0x100032, &(0x7f00000000c0)=ANY=[@ANYBLOB]) prctl$PR_MPX_ENABLE_MANAGEMENT(0x2b) getsockopt$inet_dccp_int(0xffffffffffffffff, 0x21, 0xf, &(0x7f0000000240), 0x0) fstat(0xffffffffffffffff, &(0x7f00000006c0)) getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, &(0x7f0000000440)={0x0, 0x80}, &(0x7f00000001c0)=0xfffffffffffffd3f) ioctl$FICLONE(r1, 0x40049409, r4) setgroups(0x3, &(0x7f0000000340)=[0x0, 0x0, 0x0]) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, 0x0) 14:19:10 executing program 2: getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) syz_mount_image$hfs(&(0x7f0000000200)='hfs\x00', &(0x7f0000000280)='./file0\x00', 0x4244, 0x0, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 14:19:10 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x3, &(0x7f0000001fd8)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x15}}, &(0x7f0000000080)="47504c049c3514bf772da07ae82e76590a36f6493ec1ab91b397e42abf1ea6cd8cd77427fc9a9e2b7165f52b4107bf0850d899dc52d013175ddb1b2f46203c2a05b722e33e556fb2e3f39a3cde1fca53640337ec956146bdbfcb115070195631de5d21a5ea9e638c2bdb78a501ca4b6ea313d82568f9382c2c3f6faba6b4ee54793b4ed26dae3e52225029bb2ac0007f77754c3f23ceda9809b9a9684a940abcaa8cfcc7133ec422e9c83888318d41e9a493f0195fe2599651b89504f5dba14625ce2366f33d95dba92f867279cabf4aceddc85a8af7a0fa68d767ce5136b9d0d1966c499cb6bf34c2988666970000000000000000000000", 0x0, 0x700000000000000}, 0x48) 14:19:10 executing program 0: r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/expire_quiescent_template\x00', 0x2, 0x0) r1 = syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x1, 0x0) accept$inet6(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000080)=0x1c) ioctl(r1, 0xffffffffffffffb7, &(0x7f0000000080)) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000140)=@security={'security\x00', 0xe, 0x4, 0x4e0, 0x1f0, 0x320, 0x0, 0x320, 0x320, 0x438, 0x438, 0x438, 0x438, 0x438, 0x4, &(0x7f0000000100), {[{{@ipv6={@local, @local, [0x0, 0xffffff00, 0xffffffff, 0xffffff00], [0xffffffff, 0xff, 0xffffffff, 0xff], 'eql\x00', 'gretap0\x00', {}, {0xff}, 0x0, 0x7fffffff, 0x2, 0x61}, 0x0, 0x188, 0x1c8, 0x0, {}, [@common=@unspec=@conntrack2={0xc0, 'conntrack\x00', 0x2, {{@ipv4=@loopback, [0xffffffff, 0xffffffff, 0x0, 0xffffffff], @ipv4=@loopback, [0x0, 0xffffffff, 0xffffff00, 0xff000000], @ipv6=@ipv4={[], [], @remote}, [0xffffff00, 0xff000000, 0xff000000, 0xff], @ipv4=@multicast2, [0xffffffff, 0xff, 0xff0000ff], 0x3, 0x1ff, 0x4, 0x4e21, 0x4e20, 0x4e22, 0x4e20, 0x28, 0x20}, 0x1c0, 0x98}}]}, @common=@unspec=@ERROR={0x40, 'ERROR\x00', 0x0, "f650bd5c77822a55c077a2b3078812467f4ab9fefc372cf333baff203cdb"}}, {{@ipv6={@remote, @mcast2, [0xff000000, 0xffffff00, 0xffffffff, 0xff000000], [0x0, 0xff, 0xff000000, 0xffffff00], 'syzkaller0\x00', 'lo\x00', {}, {0xff}, 0x2b, 0x1, 0x2, 0x23}, 0x0, 0xf0, 0x130, 0x0, {}, [@common=@hl={0x28, 'hl\x00'}]}, @common=@inet=@TCPOPTSTRIP={0x40, 'TCPOPTSTRIP\x00', 0x0, {[0xe08d, 0x6, 0xff, 0x800, 0x2, 0x7, 0x3, 0x5]}}}, {{@uncond, 0x0, 0xf0, 0x118, 0x0, {}, [@common=@hl={0x28, 'hl\x00', 0x0, {0x3, 0x604}}]}, @common=@unspec=@STANDARD={0x28, '\x00', 0x0, 0xfffffffffffffffd}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x540) ioctl$EXT4_IOC_MIGRATE(0xffffffffffffffff, 0x6609) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000300)={0x0}, &(0x7f0000000400)=0xc) getsockopt$ARPT_SO_GET_INFO(r0, 0x0, 0x60, &(0x7f0000000740)={'filter\x00'}, &(0x7f00000007c0)=0x44) r3 = getpgrp(r2) prlimit64(r3, 0x0, &(0x7f00000004c0)={0x0, 0x7ffffd}, &(0x7f00000002c0)) lremovexattr(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000480)=@random={'trusted.', 'bpf\x00'}) getsockopt$inet_sctp_SCTP_PR_ASSOC_STATUS(0xffffffffffffffff, 0x84, 0x73, &(0x7f0000000280)={0x0, 0x8, 0x0, 0xe0}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r4 = syz_open_dev$amidi(&(0x7f0000000100)='/dev/amidi#\x00', 0x2, 0x800) recvfrom(r4, &(0x7f0000000500)=""/96, 0x60, 0x20, &(0x7f00000005c0)=@ipx={0x4, 0x1, 0x6, "6b183128f377"}, 0x80) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000200)='./file0\x00', 0x700, 0x0, &(0x7f00000024c0), 0x100032, &(0x7f00000000c0)=ANY=[@ANYBLOB]) 14:19:10 executing program 3: syz_mount_image$gfs2(0x0, &(0x7f0000000040)='./file0\x00', 0xb102b8700, 0x3, &(0x7f0000000240)=[{&(0x7f0000000080)="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", 0xfc, 0x8}, {&(0x7f0000000180)="6e4fae343fcbe75f750edab4ffe869cf59917854f4c0064b2fefb89db71f83a1dbd85e8720426ce6dac8c1d994bda6e76d23aafb8234e65dd6ce69b85ba473a42f9a10", 0x43, 0x3ff}, {&(0x7f0000000200)="0cf1e6962e8e09a410cd9d6a8b06436370074e01970a", 0x16, 0xf453}], 0x10000, &(0x7f0000000440)={[{@quota_off='quota=off'}, {@noloccookie='noloccookie'}, {@quota_quantum={'quota_quantum', 0x3d, 0x7fffffff}}, {@rgrplvb='rgrplvb'}, {@rgrplvb='rgrplvb'}], [{@smackfshat={'smackfshat', 0x3d, "7db3706f7369785f61636c5f6163636573732e"}}, {@fowner_lt={'fowner<'}}, {@smackfsroot={'smackfsroot'}}, {@fsuuid={'fsuuid', 0x3d, {[0x62, 0x7d, 0x32, 0x66, 0x32, 0x38, 0x77, 0x77], 0x2d, [0x37, 0x38, 0x77, 0x77], 0x2d, [0x66, 0x62, 0x73, 0x7d], 0x2d, [0x33, 0x36, 0x67, 0x30], 0x2d, [0x36, 0x63, 0x67, 0x54a07f1fb49ecd59, 0x38, 0x77, 0x77, 0x7f]}}}, {@fowner_lt={'fowner<'}}, {@obj_user={'obj_user', 0x3d, 'self^md5sum'}}, {@smackfstransmute={'smackfstransmute', 0x3d, '[-/em0'}}, {@obj_type={'obj_type', 0x3d, '\':/{vboxnet1em0selinuxsecurityvmnet1.'}}]}) [ 2735.851894] hfs: can't find a HFS filesystem on dev loop2 14:19:10 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x3, &(0x7f0000001fd8)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x15}}, &(0x7f0000000080)="47504c049c3514bf772da07ae82e76590a36f6493ec1ab91b397e42abf1ea6cd8cd77427fc9a9e2b7165f52b4107bf0850d899dc52d013175ddb1b2f46203c2a05b722e33e556fb2e3f39a3cde1fca53640337ec956146bdbfcb115070195631de5d21a5ea9e638c2bdb78a501ca4b6ea313d82568f9382c2c3f6faba6b4ee54793b4ed26dae3e52225029bb2ac0007f77754c3f23ceda9809b9a9684a940abcaa8cfcc7133ec422e9c83888318d41e9a493f0195fe2599651b89504f5dba14625ce2366f33d95dba92f867279cabf4aceddc85a8af7a0fa68d767ce5136b9d0d1966c499cb6bf34c2988666970000000000000000000000", 0x0, 0x1c00000000000000}, 0x48) 14:19:10 executing program 2: getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) syz_mount_image$hfs(&(0x7f0000000200)='hfs\x00', &(0x7f0000000280)='./file0\x00', 0x4800000000000000, 0x0, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 14:19:11 executing program 1: r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/expire_quiescent_template\x00', 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000140)=@security={'security\x00', 0xe, 0x4, 0x4e0, 0x1f0, 0x320, 0x0, 0x320, 0x320, 0x438, 0x438, 0x438, 0x438, 0x438, 0x4, &(0x7f0000000100), {[{{@ipv6={@local, @local, [0x0, 0xffffff00, 0xffffffff, 0xffffff00], [0xffffffff, 0xff, 0xffffffff, 0xff], 'eql\x00', 'gretap0\x00', {}, {0xff}, 0x0, 0x7fffffff, 0x2, 0x61}, 0x0, 0x188, 0x1c8, 0x0, {}, [@common=@unspec=@conntrack2={0xc0, 'conntrack\x00', 0x2, {{@ipv4=@loopback, [0xffffffff, 0xffffffff, 0x0, 0xffffffff], @ipv4=@loopback, [0x0, 0xffffffff, 0xffffff00, 0xff000000], @ipv6=@ipv4={[], [], @remote}, [0xffffff00, 0xff000000, 0xff000000, 0xff], @ipv4=@multicast2, [0xffffffff, 0xff, 0xff0000ff], 0x3, 0x1ff, 0x4, 0x4e21, 0x4e20, 0x4e22, 0x4e20, 0x28, 0x20}, 0x1c0, 0x98}}]}, @common=@unspec=@ERROR={0x40, 'ERROR\x00', 0x0, "f650bd5c77822a55c077a2b3078812467f4ab9fefc372cf333baff203cdb"}}, {{@ipv6={@remote, @mcast2, [0xff000000, 0xffffff00, 0xffffffff, 0xff000000], [0x0, 0xff, 0xff000000, 0xffffff00], 'syzkaller0\x00', 'lo\x00', {}, {0xff}, 0x2b, 0x1, 0x2, 0x23}, 0x0, 0xf0, 0x130, 0x0, {}, [@common=@hl={0x28, 'hl\x00'}]}, @common=@inet=@TCPOPTSTRIP={0x40, 'TCPOPTSTRIP\x00', 0x0, {[0xe08d, 0x6, 0xff, 0x800, 0x2, 0x7, 0x3, 0x5]}}}, {{@uncond, 0x0, 0xf0, 0x118, 0x0, {}, [@common=@hl={0x28, 'hl\x00', 0x0, {0x3, 0x604}}]}, @common=@unspec=@STANDARD={0x28, '\x00', 0x0, 0xfffffffffffffffd}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x540) ioctl$EXT4_IOC_MIGRATE(0xffffffffffffffff, 0x6609) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000300)={0x0}, &(0x7f0000000400)=0xc) getsockopt$ARPT_SO_GET_INFO(r0, 0x0, 0x60, &(0x7f0000000740)={'filter\x00'}, &(0x7f00000007c0)=0x44) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000680), &(0x7f0000000800)=0xc) r3 = getpgrp(r2) prlimit64(r3, 0x0, &(0x7f00000004c0)={0x0, 0x7ffffd}, &(0x7f00000002c0)) lremovexattr(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000480)=@random={'trusted.', 'bpf\x00'}) getsockopt$inet_sctp_SCTP_PR_ASSOC_STATUS(0xffffffffffffffff, 0x84, 0x73, &(0x7f0000000280)={0x0, 0x8, 0x0, 0xe0}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r4 = syz_open_dev$amidi(&(0x7f0000000100)='/dev/amidi#\x00', 0x2, 0x800) recvfrom(r4, &(0x7f0000000500)=""/96, 0x60, 0x20, &(0x7f00000005c0)=@ipx={0x4, 0x1, 0x6, "6b183128f377"}, 0x80) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000200)='./file0\x00', 0x700, 0x0, &(0x7f00000024c0), 0x100032, &(0x7f00000000c0)=ANY=[@ANYBLOB]) prctl$PR_MPX_ENABLE_MANAGEMENT(0x2b) getsockopt$inet_dccp_int(0xffffffffffffffff, 0x21, 0xf, &(0x7f0000000240), 0x0) fstat(0xffffffffffffffff, &(0x7f00000006c0)) getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, &(0x7f0000000440)={0x0, 0x80}, &(0x7f00000001c0)=0xfffffffffffffd3f) ioctl$FICLONE(r1, 0x40049409, r4) setgroups(0x3, &(0x7f0000000340)=[0x0, 0x0, 0x0]) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, 0x0) 14:19:11 executing program 3: syz_mount_image$gfs2(0x0, &(0x7f0000000040)='./file0\x00', 0xb102b8700, 0x3, &(0x7f0000000240)=[{&(0x7f0000000080)="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", 0xfc, 0x8}, {&(0x7f0000000180)="6e4fae343fcbe75f750edab4ffe869cf59917854f4c0064b2fefb89db71f83a1dbd85e8720426ce6dac8c1d994bda6e76d23aafb8234e65dd6ce69b85ba473a42f9a10", 0x43, 0x3ff}, {&(0x7f0000000200)="0cf1e6962e8e09a410cd9d6a8b06436370074e01970a", 0x16, 0xf453}], 0x10000, &(0x7f0000000440)={[{@quota_off='quota=off'}, {@noloccookie='noloccookie'}, {@quota_quantum={'quota_quantum', 0x3d, 0x7fffffff}}, {@rgrplvb='rgrplvb'}, {@rgrplvb='rgrplvb'}], [{@smackfshat={'smackfshat', 0x3d, "7db3706f7369785f61636c5f6163636573732e"}}, {@fowner_lt={'fowner<'}}, {@smackfsroot={'smackfsroot'}}, {@fsuuid={'fsuuid', 0x3d, {[0x62, 0x7d, 0x32, 0x66, 0x32, 0x38, 0x77, 0x77], 0x2d, [0x37, 0x38, 0x77, 0x77], 0x2d, [0x66, 0x62, 0x73, 0x7d], 0x2d, [0x33, 0x36, 0x67, 0x30], 0x2d, [0x36, 0x63, 0x67, 0x54a07f1fb49ecd59, 0x38, 0x77, 0x77, 0x7f]}}}, {@fowner_lt={'fowner<'}}, {@obj_user={'obj_user', 0x3d, 'self^md5sum'}}, {@smackfstransmute={'smackfstransmute', 0x3d, '[-/em0'}}, {@obj_type={'obj_type', 0x3d, '\':/{vboxnet1em0selinuxsecurityvmnet1.'}}]}) 14:19:11 executing program 4: r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/expire_quiescent_template\x00', 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000140)=@security={'security\x00', 0xe, 0x4, 0x4b8, 0x1f0, 0x320, 0x0, 0x320, 0x320, 0x438, 0x438, 0x438, 0x438, 0x438, 0x4, &(0x7f0000000100), {[{{@ipv6={@local, @local, [0x0, 0x0, 0xffffffff, 0xffffff00], [0xffffffff, 0xff, 0xffffffff, 0xff], 'eql\x00', 'gretap0\x00', {}, {0xff}, 0x0, 0x7fffffff, 0x2, 0x61}, 0x0, 0x188, 0x1c8, 0x0, {}, [@common=@unspec=@conntrack2={0xc0, 'conntrack\x00', 0x2, {{@ipv4=@loopback, [0xffffffff, 0xffffffff, 0x0, 0xffffffff], @ipv4=@loopback, [0x0, 0xffffffff, 0xffffff00, 0xff000000], @ipv6=@ipv4={[], [], @remote}, [0xffffff00, 0xff000000, 0xff000000, 0xff], @ipv4=@multicast2, [0xffffffff, 0xff, 0xff0000ff], 0x3, 0x1ff, 0x4, 0x4e21, 0x4e20, 0x4e22, 0x4e20, 0x28}, 0x1c0, 0x98}}]}, @common=@unspec=@ERROR={0x40, 'ERROR\x00', 0x0, "f650bd5c77822a55c077a2b3078812467f4ab9fefc372cf333baff203cdb"}}, {{@ipv6={@remote, @mcast2, [0xff000000, 0xffffff00, 0xffffffff, 0xff000000], [0x0, 0xff, 0xff000000, 0xffffff00], 'syzkaller0\x00', 'lo\x00', {}, {}, 0x2b, 0x1, 0x2, 0x23}, 0x0, 0xc8, 0x108}, @common=@inet=@TCPOPTSTRIP={0x40, 'TCPOPTSTRIP\x00', 0x0, {[0xe08d, 0x6, 0xff, 0x800, 0x2, 0x7, 0x0, 0x5]}}}, {{@uncond, 0x0, 0xf0, 0x118, 0x0, {}, [@common=@hl={0x28, 'hl\x00', 0x0, {0x3, 0x604}}]}, @common=@unspec=@STANDARD={0x28, '\x00', 0x0, 0xfffffffffffffffd}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x518) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = getpgrp(0x0) accept$packet(r0, &(0x7f0000000a00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000a40)=0x14) sendmsg(r0, &(0x7f0000001180)={&(0x7f0000000a80)=@xdp={0x2c, 0x6, r3, 0xd}, 0x80, &(0x7f00000010c0)=[{&(0x7f0000000b00)="8f395ae36dd796345e498597cdae65c96905f0a44cecfb5e2ed382149bde16e93e8674fe0786ec959467ec30461cfd0d86a4187108d84aaf6d5223d4", 0x3c}, {&(0x7f0000000b40)="98f53ce86f85da782e7b289ac8832e0fe767bffc55529f5d402419e43a0600e4d0ebe9c59a6061fb87e12d970a53162f3d0a2b37df02556cca161b037a1e01d2654c926433f0003cabc3b83a67", 0x4d}, {&(0x7f0000000bc0)="2079d5dcb58f196ce46232d9c6dba83ae2551e725bb5f99b2a92eaf409b8a2bbe5d2d7175c044778532847916348799d297d8a9443aad0a070cd8cb381b965659c4ad0c94b8236bf8a5b9414496fa242f2ac75ee0f4de925aff15de3ec20c0b4636548265b0976e701f2d860b2f361a56d5d71e33c5a22d01a1edfd3ae48fecd507b46fa19d65af5895ea84a01eff74f98785113b9bcb8de125c6d84f98e23b5d20b231392af5a7320", 0xa9}, {&(0x7f0000000c80)="ff89605bd715434d5d8c70e24574f063cf2e760a71bd7c67ba2987f164a8d9332e660dbaa81014899834869a1535a25d477c947cc36162369e0a858ca2a3eee425b23f6d9de74396eaa79d20a001e8971b8f5f1b0fc4000b7aa47c8d789771b5e782975e2e9e0052f35ac221e96ac9a882a54a86027fd99d24c57fb77e72fcc4996d30af29902f1a74ff7a35f51c2bb6bc61f03c286a5165c9f722cf2b46ef0dff12d42d62e7e43e5958c03f408e76073b40fde3b30da679de82fbfcf748624b2402974a76abf3494cd58d6b", 0xcc}, {&(0x7f0000000d80)="276a0763fae467d209892d4a30d08ff3293305a791f1457db990ebf464617b1e331205eb97fbfbda38aba4e925c5087bb12b697d172ee7f98ea0bc6322686ff9eadc9ffe2ff5786ed6a7d7a95412cfc46531dce7b39aaa1760d492bfbc4fad2d7000dcccd624ad00b9d5842fe4c9e9b7b6f926927eba4ad6613e25f61a20098f1e2a42b04cf441ffb59fc3f14d8df324bda18edcf8114bad6f91551cab09a0313a3916917ec5ed9b55a592b703", 0xad}, {&(0x7f0000000e40)="04ae82891a72ec4474fd86c10699ab0a0717af9d6db955c70f1dca6b454b1020a6d5bd345589bace8556c933ce93e3805737c6bcf4a737c399cd72c5a5a273673ce3e47ae038d280012fd81d268fe2", 0x4f}, {&(0x7f0000000ec0)="c7bd7c", 0x3}, {&(0x7f0000000f00)="4f4e934de094a61e106fe4a48c786ffc15b45acdbbfe5d4274e2986b43dbc10fc93cc7aa7ebff68f67a3b447dd4371eae98595c9981723eb67d2eb1de07c770e549717a4641540d0acde3d456b8c665bab31c9a8c472f1a273ad2fa9372ee0a531362e87491af7f82e60f82b654e75c1ba768e634140366eb1451cdc658ade5d6810989917069fd68fa78b9d8861388f5c4210a637c27d56f4eb17984eb68eb3689919468053e2d35fa046d13a8eda7633892b2dcd38e860978043fe4d7cd422e37e83", 0xc3}, {&(0x7f0000001000)="878f30ba571c3b55fdecb2b6bbea0b4734a83b3535d8431a89c64929d257ab65049868d9ce24ea93a78ab7f39094ae0f6b1be9e12d6a7d5f1270a4c7ae909b998ca6d6d93376e70c4c68374ec9c943fdc05dda726020cdf7cad4c60cd729f901ed6b4286b7c5ce2ac0006821fc06eb0c35fdcba7a098fbeae9eac86b8192c1e1796e106a6935938c6fc05a29258303f2c2673bb3423729d35f70e5d97bf97853661ad57954c09b7dab9a", 0xaa}], 0x9, &(0x7f0000002640)=[{0xa0, 0x105, 0x2, "276028ad6d5e5fb3294abce7991ac2330a4c836dfe2474bb0187008ab22fa6bb9300d00e3634eb64b80687e387d0d2cb32f9ceee87fa58d5962e8053d43c6d1df5e78f934cb8b90ff6b6f09e59be12c2b99752356108759e336d3aa6ba736aa3117c54b38b75a80878fe6bf149ca122ee98fc7f9589e467e604c973ed27f6b4cead72ffc2f4aab94dab15f6fca6b6b"}, {0xc8, 0x0, 0x1, "2947a493be8576a1303cd45b8602b90e14531d673398a6b5aa88c64f2b9040a5bcdc8244a20842ac6c05ee59cedbe7a1a95e7372e0af2280d1ce6aeb19a189a821a41fe571d727e552e14fbf0fee770518a911d3d71f58ceaf99d074253fa736f7d696dafd6de5989c5d8c75d6fdc6a952de549fcebf7b29d2984b12330228f8cb4c3624b98538a2b0815ad70516c8d8d04158ac68ef741248fa5c7c40ffddafd7aaa9fa90b77a0af9129fff25b681a1ef8d26aeb3"}, {0xf0, 0x0, 0x8, "1cfb502d25a1e4769a774c98f5ba46faa28ca4d244c94d4611f205490cb1f59b1be0caf65560dc606261e477422f9271e5c6d1431ff7df1950a5dbc44e63865a7779ccc212f6ef0d6ab8c4b08c8705f13dec5fb1d6d54d15a2b2f62e29861241ecc55648fb599d6870e9d0334f0f78fee7eb0ac075ea1e702d2d401490a54d5e6f95b1147a5c540d1a9fe0e33e0fb2c8312442ad4bf5bea44e0ff29e4a860ed8b7ba02d907ec45374025c6796d9680fc68a038e541d861b433b3c35c5df496d304b2b588dc1f476e587614bc83147eb594e9da44ba468e22bacc"}, {0xe0, 0x88, 0x2, "92a99360aa279ee6a76b4155bbf956033dc57e74e5771587a5acd51b50496a6628b931e2ff5b8f33941916a8698e45450c14bebca6a9a4c4cf05f3dfbab5a314a55cf6f8f301a4f3d55842e5e1ffd4e751d9dc30af2b955ab265ca2aeb477bf55297f4334c36468d6b589a1c406a6e30bd616cb402d0235016e6ed907a90705a9a579148b8b9b32e4ae1b4fbba4965c4c2394423b0965a79972ca7aebe7c4838a2ff476989bd17046f11bfeff9f24a46108444c8bf55f708846aac393b7d5b6be740097b35467e4bc6f9d0"}, {0x1010, 0x0, 0xd89, "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"}, {0x1010, 0x0, 0x9, "8aff9f07af4a5c4bca200167200f6d6132e3687c7a80c7c0ce480caca58f8b6bad08594c7d6db9811416846f534c3a39883b1d8dc572cc533e13ae140a1d1cfdd5c704a132f0f33e432d2525a685408333fd7498a0b77c556ef02c57029e1ee4f8aa3a69f8e014d7afe2d59321999bb6b0f2b75d1c8b36a09cf9dadbf234f37bad4729b583b49803f415ddbeebf5c0f8e35d1e3ba1db07688b5e85a1dcce1ef1886f74e6bee385835937f05fec4d0c687cf925436e4a7c4f271b1d507089d0709b0e51102691124817dc0eefa22ded1853ff6e16cc478b3da6b3ca27cc8f07cfc6e236fcef717a2695eb49112c3e4d845c7ba450fab3f2cff7536d0e5d3c88050333ca5fca6fe132a0341df814504abb88b6f45daf8d817eac0d2be5f219155d150631eb0951f04fb4e6a4b6200506d8c995a131971de7bdfa3a066ae1701b698280f5ef6c3234eb18c0b3c7be0dbf5491ca4c169652c3e567fba5ac5066dbf8638dd1a3852ae88ff3c766bf8858f20b6e7b55616c71e63661cacc86c403688e424eb7bd2fa118d6f70b2de7fafc081fee80e2c371e4b3ef3f00c28ccc2d7b238807930323f94ea9441f8e7aacb2646e28551d5b2f865a7338264ed11699d0c5a3a1d2ec37efa49a773dd907670bb655381d56d0955b4719e39523f0e786bd5740f93a886f29ed8e29f47692778c96e4eeaa81a629cb56c28af376e3ca31cc5ec336f865bbd795e9285b77780c4b8600abeb9aa973061bfc7ee42f8b075b7b72840d8609c2b72055e2f9417bcad539550bef6485644802984176a8ab6ce660586cd05bde9091b79ac7486179fc56ec2fd8cfa7568f41aa008a2cf887ceb1b5495331d1fb60f29e8d066963c5bbbdc80ddbcc0a4b244cebb7d7ff740b4e14c4a014c8c8d3ce25f3fb4de53a20d3ff3cf1ca60db7c2ffcf556e9a520370416f9dee6f32214b46423f71c642569120db0af21fda034baa04fbc9971779019cb975c1963be153c445e0a560eba6f6ab24f81b85bffef786e8f40935218cc3c5b87649d62d2d9842d5f3c2ec1540ee6a87ea0b45e35dc63779279edaf965261967d1f5462903f89ae4faffa7b526331d6994957e87a66af3726bd0546ace702dcbb210efcfcc13a854e32d88dd3d1b8f574ce71f22452514ef4c608ad200d0bd2a5ff3841ec54f7de6e97848a87d4eaba6abdd4112156928360afed3556beb6855cf063a32e72c671744a34a8250dd8186d3d00478e8188e2714a9b314e55dfd01add140db8139d159c9f9d7bb5941154ec8d36b6fa5ff1b6e3ee3553501c90ef69be72bf5047ae63e80d179c6dde45c46a8ba83209b866774a8af2c21075cfed05143cf2a1255fa32f4384ff3000e90bd706d86ec42b87227bbfd523957e72d34192cf6f182f919044864cc13913c8447a75e47f2644be371d9e3df14e203c61cc07a8486159d6b120d6997c294205c505a67471bec0c5e42188d6484c69fc019c3dea2ad5b25653d19efade4d14f3b832f43e65cc911c829e32c8fb7ebb58764cb4c8ab7a937c3fdd1ebb7e3f989aa2b793aab9e815204da0f98afa6e5105b6182ef3cc76dc2d276c890a65ae630a3d8507dbfd4ca178e16df32f64332d69538bf14b86515138a8375344dcad192b182625cc79921c5c9faedd154527227a72ad595e91948bf1a850aa3696cd4c727d1f418d1a16e0895963733a0f243b90fa0ebebc7a2e6aab040551f35688cc3297fae1e1473ec5724a5a0743f80b7f14aeacebcea04193517a1dc8a51043687eafc40bf2abeb472c86e72e2c6cf83e29c22361680693daa8e12e3a03625b602ded10ed05487c1cf9266eb948100d420e9c221e093286fa0424ef779790b8b71c4b825598ea1a4e20e69465f013ab89707a1ccf57113f51bf7bbfcdf31c096464d6160112fe88dd0a0eb8cacd51d1a02f17c10bf53af872c370fd9b75dd5d9f289fff6f176e33261354e471cfb74db13fc65f9404d7bf8727c71345800235ec22dd22fce36fd9a39f2d6f3f0164eab9ebd0175e67b8cd89facb3632689d1a11dce52f816b80e7260e51573de08d5584d2cf6d82e4bb8cdc51fea4981b601dfc54fd380e064bfbb64c1c4fa18242ac679d4d750fee995bdbdb0ee9f883f98c1dd3013ce2a1c90032493469521cf52cd358e76d36cb43f29aaa1494fecb994a3e02944ecb9472bffa52f36c21fd14d82b4d33014de0a66edbc02969f2b97910f64ee5a2fb8cce5e0e1c7fe3c49a2c0f2b8a5dde52c4b019abde656ce0262a2674ceeaf0014f7e55fd89dc1afcbf423c45c630debf4974575f8f2be55147f794d66634be367cb3fbbe56e5f8d3e3c1465aa1c5dcea9aec208a7ae5f2df501ccc416a72bb9ef9d169db0ac6f9db41ffbe8d626e92eaa85e0355e27d4b2bbe40fd845ba264c1184fceeed79bc5c12cd6ef1fc8f413224ee25c154e7adb62a38ff060c257d74980315d05bdbef1d3fc4e8d864fe0ee8495589c345f8370937d305cd77fc373428881b5b77b89ecff3eab1b078f805b9a743654f1da99de9fe9e9429f517729fb51e2237cf30e87ce0eefd5da3911530b46c2dc6bff5844607785e00bc34814e3941e6ce1261a31adebc5f825a5fbd1719bce61af893a4889d4dd958dda4f68d0fdb0f74532c693994c1f695037f14c5808e258fedfb8171d5f1ba26a33d71ee408c6915085fde42d615439a2738952c86903ae00e3455d8f639c7962a5231a75d4b43a40700e4ae3f3fba53cbc874212af38232857ca94edf84a6322647970a5e8303c0d649a47197c8fe12c9c1dad59fc11c1915ed4363a9e8a7518bfc7642a918208706933ecaa19f040302621ebdc2140b985ccd10372d6323baf6471dcd2f36ffb3c61cfc372f868ea47a89722dafb560bb083b1bb549d58bcf7ecbe02c71a5c5d634332d7bf2d3f6e146ebffa0eb7ddbe747b97a7a22e2beb2ad7721f5956417828884ef9c7a223ed7d583858037ceffa47f01013b4a677e3cb27e1de733a9c00aae3f28d647e00b1ed7448863413f04aa25ac6c45f32975d6ce485bde0cac8ddabf14bd914313746f09e3425ff8b76a25179eff09ea6724b88881584de96c711ca80c60af7bc72c803bf8476df25ee6019a6ddee700e196f7427ac8891900536ac0571c6532f35902a534338ba193f8fcb3849ec8f10116648605a542a0df8d0187756a81afce5e416de9cb2fe17b10d83565c133cc7e531aaa2e1bfe5ad8a1bc44cc5ac447194bf9d1ef75c8430f6c5ddb9adfa81b3f5ec46ea0c593b29c944e34c4873e82a8d7884ec00e151a97771abdd1e947b4e1d9f306b45087b4015e27c326c6aa3f1bcb23b0ac6f6b5b1f375d8acf9e277f7fefb6d41cb7ae08532a775d1dc10515fc17f734c827c52a98e8edb44c192764ec1a003659e44d716366d3eb1e195d24e0871977d379003a3a734dc0335ab519912420939b318ba1ef858c96caa9cdb649e97f08359861fadf8769a04c850dfd55100a252285473901d3392df39763b90776aa66573059173e90315641c8e256ed19fc30171274080ab9015c91d774de34ab3d9d1b222bd2dbbf8b35dd4e60bb775488a3af91186b352f17d91a04006376d22ee31e4f46f1ed1b3728ee0b2a58fd5b624178e9c45b56d04297701c67711942288649866564ceb5aa3b783831173a0a5374c512b72d4b2e8dbdfcac9ae6b8f4dc55257212abbf99aaf4d36de41d52c6b17ade698ea24ad30d6a76f6bdbdfe246a40564a5753791e32b278c30adaa1cb96c324f4997ae07f1d20d1c81bfb5bcd50ec260acfbb4d4abe8d65884c4fd3a3249099c91e7441cd0bc2bfcfc4e7587909b4191b694a9183f48d97f5f4252476abed261ccc1bcaea3598c922ccee0873f74ebd95c6863dbc08d59a398a9d2ede34f2b2354d0595094f4603e30c05db5c23ef82670b2b723fc0a04b9bc1ec02fd23bef5591b9843e86797a68cba27e7f79070eb0d93674136b975a7f114e20a7e1499aba768474547db8e35434e1da20ff0a674f49b68544383d736390d68877dd83e3b8c2744f1c03d2fa5f9e7ff657b783d4fe504224e1353e37f20690949d3af0a7123dcfb5d7bde674fa7b4fd595ca8a0e096bc9e1e98aea83a2f11ed0cb2831b15f9fcf3e7b742f739a755b3a23a1a66c14a1f30e20b2cff1a297d0dc55ed4154cbdbec109750dd5440fb7580b0753c0fff5243dabaf47cb60d73f44d71f4d166bc723cc7518e1124e9d1bf03d2bbb7414fb376504b89e71b1e087a90808aa5122fb0739fd019716fee76e7b144846087bc26f7778d2d982a0c90cad2a0befbf110e08eaa10ec69b5a09420bd5720559576753fb1fbd98b41ca47a1f47e22cc3063246954a8a54bd1d0baa1c68a4d47bc9f4bea6e776ae2d5727aa3b37ae4007b8e90c961155a025beab174203c51ae360675f03048d061a6e06b55f53ee2f27de5850394155fc6de77f83efdb68b6bd59b815ba068494cc7279f0b248cb9e119aa4f2036e51202eb4a1902b3f3548cc917b6ecba991f2cb3f7ace8fbe05aedf7988675a5f7fb929aba50035f2a1a3f9976f596e6ab469e143382d1a2ecc72223a8e976f00b919cec21e852d69315f9360c31a9cdaa7cb69e55977cdbbd3eed068be6627d421d97049cdebe37658e4c05bf2b65474ab8efc9f3b27321e38d8efd18a36b14474a5895275b0652623b008da8a58aa7ea58c6e814e2e7682716f3b6613731ed5454651d6d99272833f30da58dcc87451436feee6a7a8d8fa9d9796a116fa53b036ccb210633d85876b8dc27ec4148ed5e205ebb180971a4f2774003c7bffa2eb6c14ac97283ead56e46f1a3561cfa1700adb946f0c519e5dfff26264b20f6b01e212da1fb09792b249621316260d4656e2386667c21a27a907637448c8c0508bd6b198b5276a340b2642eec47dbaa57db353284a14be4a0991bc151d745ab6ea392bb988f8357666c77d52c8f71ca5f7af5153edd40b91effc4c759d5dc702441daf05113b0d19f7d63ab01a87ef58330110e399b6dbb1324a7e317e0ab3bfc98280d30c569332496209d8d505c7e2508c40065081ba8774634a2bdffe46cdc36fb7dafbad4e6b923df57426ad7877d773c6f8426e829a7b2d8063d55006c585e85a5ed65512bd1140a60359009e733689b96d7b1d105781771aaed087bec58dac7d5fe5039c6c9c5480cb6780670f50741021410137769f73a7755c7bf70a2bd4b7f8a01928ca33326bcc672368e6d1b00f7a01b9ebdf30f2512afc22cc2eabf717f7118f141decb3eac3dba7cbc4dd91e11faf7a86ce223a5e114714b70c0b6a213aa7ddf499a2c05f05dd333e613b8ef59e2379aa8e3204e90807bafa7b0727de15f58e0f3ac728b8ede0fc1960a446d8ee7fdfcacb2fa6b5a43881d24ec7ec2acc98a9ecce52e6441590d7792e743363d41b2960b20ebb9444577c64c89b7a5b0224e5bf23c8d406aafefa8b21659ec99d24636afa4f811e6e228cd55c99a0e400c62e41f8e36ffddc568ba48b7114e4f99a0d8730f5fa20879d8fc1d2f7ec030bd33b72368b318ff52929323d7b1a0b0eae137a1eedfb8ff6eedaaf4c54a6d5f70ad383cab5d05df04214f0585d9bb3aea048e21367dac90cd35177192dae621fdd3f3f733acec4dfff10b19200a1e2c977a8a9634550b4274fcb4ab720e23e8837ee27dda29144837306b62706e70e8047096c52899522c3c7dc9e30435e69055ecb1c6cc7a4180f2e1501516d4f8e35e80fa5a8423a9d01a6b14ca54755ef9e05ea13d5f162957a21e3375"}], 0x2358, 0x8041}, 0x800) prlimit64(r2, 0x0, &(0x7f00000004c0)={0x0, 0x7ffffd}, &(0x7f00000002c0)) lremovexattr(0x0, &(0x7f00000007c0)=ANY=[@ANYBLOB="747275737465642e62706600911bc8fc4a"]) getsockopt$inet_sctp_SCTP_PR_ASSOC_STATUS(0xffffffffffffffff, 0x84, 0x73, &(0x7f0000000280), 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r4 = syz_open_dev$amidi(&(0x7f0000000100)='/dev/amidi#\x00', 0x2, 0x800) recvfrom(0xffffffffffffffff, 0x0, 0x0, 0x20, &(0x7f00000005c0)=@ipx={0x4, 0x1, 0x6, "6b183128f377"}, 0x80) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000200)='./file0\x00', 0x700, 0x0, &(0x7f00000024c0), 0x100032, &(0x7f00000000c0)=ANY=[@ANYBLOB]) getsockopt$inet_dccp_int(0xffffffffffffffff, 0x21, 0xf, &(0x7f0000000240), 0x0) fstat(0xffffffffffffffff, &(0x7f00000006c0)) getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, &(0x7f0000000440)={0x0, 0x80}, &(0x7f00000001c0)=0xfffffffffffffd3f) accept4$unix(r4, &(0x7f0000000840)=@abs, &(0x7f00000008c0)=0x6e, 0x80000) setsockopt$bt_BT_VOICE(r0, 0x112, 0xb, &(0x7f0000000900)=0x5, 0x2) ioctl$FICLONE(r1, 0x40049409, r4) removexattr(&(0x7f0000000740)='./file0\x00', &(0x7f0000000780)=@known='security.apparmor\x00') mkdir(&(0x7f0000000000)='./file0\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) r6 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r7 = ioctl$KVM_CREATE_VM(r6, 0xae01, 0x0) r8 = ioctl$KVM_CREATE_VCPU(r7, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r7, 0x4020ae46, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x1000, &(0x7f0000ff8000/0x1000)=nil}) ioctl$KVM_ENABLE_CAP_CPU(r8, 0x4008ae89, &(0x7f0000000280)={0x77, 0x0, [0x40000000, 0x10000000800002c0, 0x40000001, 0x3]}) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) 14:19:11 executing program 0: r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/expire_quiescent_template\x00', 0x2, 0x0) r1 = syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x1, 0x0) accept$inet6(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000080)=0x1c) ioctl(r1, 0xffffffffffffffb7, &(0x7f0000000080)) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000140)=@security={'security\x00', 0xe, 0x4, 0x4e0, 0x1f0, 0x320, 0x0, 0x320, 0x320, 0x438, 0x438, 0x438, 0x438, 0x438, 0x4, &(0x7f0000000100), {[{{@ipv6={@local, @local, [0x0, 0xffffff00, 0xffffffff, 0xffffff00], [0xffffffff, 0xff, 0xffffffff, 0xff], 'eql\x00', 'gretap0\x00', {}, {0xff}, 0x0, 0x7fffffff, 0x2, 0x61}, 0x0, 0x188, 0x1c8, 0x0, {}, [@common=@unspec=@conntrack2={0xc0, 'conntrack\x00', 0x2, {{@ipv4=@loopback, [0xffffffff, 0xffffffff, 0x0, 0xffffffff], @ipv4=@loopback, [0x0, 0xffffffff, 0xffffff00, 0xff000000], @ipv6=@ipv4={[], [], @remote}, [0xffffff00, 0xff000000, 0xff000000, 0xff], @ipv4=@multicast2, [0xffffffff, 0xff, 0xff0000ff], 0x3, 0x1ff, 0x4, 0x4e21, 0x4e20, 0x4e22, 0x4e20, 0x28, 0x20}, 0x1c0, 0x98}}]}, @common=@unspec=@ERROR={0x40, 'ERROR\x00', 0x0, "f650bd5c77822a55c077a2b3078812467f4ab9fefc372cf333baff203cdb"}}, {{@ipv6={@remote, @mcast2, [0xff000000, 0xffffff00, 0xffffffff, 0xff000000], [0x0, 0xff, 0xff000000, 0xffffff00], 'syzkaller0\x00', 'lo\x00', {}, {0xff}, 0x2b, 0x1, 0x2, 0x23}, 0x0, 0xf0, 0x130, 0x0, {}, [@common=@hl={0x28, 'hl\x00'}]}, @common=@inet=@TCPOPTSTRIP={0x40, 'TCPOPTSTRIP\x00', 0x0, {[0xe08d, 0x6, 0xff, 0x800, 0x2, 0x7, 0x3, 0x5]}}}, {{@uncond, 0x0, 0xf0, 0x118, 0x0, {}, [@common=@hl={0x28, 'hl\x00', 0x0, {0x3, 0x604}}]}, @common=@unspec=@STANDARD={0x28, '\x00', 0x0, 0xfffffffffffffffd}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x540) ioctl$EXT4_IOC_MIGRATE(0xffffffffffffffff, 0x6609) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000300)={0x0}, &(0x7f0000000400)=0xc) getsockopt$ARPT_SO_GET_INFO(r0, 0x0, 0x60, &(0x7f0000000740)={'filter\x00'}, &(0x7f00000007c0)=0x44) r3 = getpgrp(r2) prlimit64(r3, 0x0, &(0x7f00000004c0)={0x0, 0x7ffffd}, &(0x7f00000002c0)) lremovexattr(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000480)=@random={'trusted.', 'bpf\x00'}) getsockopt$inet_sctp_SCTP_PR_ASSOC_STATUS(0xffffffffffffffff, 0x84, 0x73, &(0x7f0000000280)={0x0, 0x8, 0x0, 0xe0}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r4 = syz_open_dev$amidi(&(0x7f0000000100)='/dev/amidi#\x00', 0x2, 0x800) recvfrom(r4, &(0x7f0000000500)=""/96, 0x60, 0x20, &(0x7f00000005c0)=@ipx={0x4, 0x1, 0x6, "6b183128f377"}, 0x80) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) 14:19:11 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x3, &(0x7f0000001fd8)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x15}}, &(0x7f0000000080)="47504c049c3514bf772da07ae82e76590a36f6493ec1ab91b397e42abf1ea6cd8cd77427fc9a9e2b7165f52b4107bf0850d899dc52d013175ddb1b2f46203c2a05b722e33e556fb2e3f39a3cde1fca53640337ec956146bdbfcb115070195631de5d21a5ea9e638c2bdb78a501ca4b6ea313d82568f9382c2c3f6faba6b4ee54793b4ed26dae3e52225029bb2ac0007f77754c3f23ceda9809b9a9684a940abcaa8cfcc7133ec422e9c83888318d41e9a493f0195fe2599651b89504f5dba14625ce2366f33d95dba92f867279cabf4aceddc85a8af7a0fa68d767ce5136b9d0d1966c499cb6bf34c2988666970000000000000000000000", 0x0, 0x43000000}, 0x48) [ 2736.312467] hfs: can't find a HFS filesystem on dev loop2 14:19:11 executing program 3: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', 0x0, 0xb102b8700, 0x3, &(0x7f0000000240)=[{&(0x7f0000000080)="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", 0xfc, 0x8}, {&(0x7f0000000180)="6e4fae343fcbe75f750edab4ffe869cf59917854f4c0064b2fefb89db71f83a1dbd85e8720426ce6dac8c1d994bda6e76d23aafb8234e65dd6ce69b85ba473a42f9a10", 0x43, 0x3ff}, {&(0x7f0000000200)="0cf1e6962e8e09a410cd9d6a8b06436370074e01970a", 0x16, 0xf453}], 0x10000, &(0x7f0000000440)={[{@quota_off='quota=off'}, {@noloccookie='noloccookie'}, {@quota_quantum={'quota_quantum', 0x3d, 0x7fffffff}}, {@rgrplvb='rgrplvb'}, {@rgrplvb='rgrplvb'}], [{@smackfshat={'smackfshat', 0x3d, "7db3706f7369785f61636c5f6163636573732e"}}, {@fowner_lt={'fowner<'}}, {@smackfsroot={'smackfsroot'}}, {@fsuuid={'fsuuid', 0x3d, {[0x62, 0x7d, 0x32, 0x66, 0x32, 0x38, 0x77, 0x77], 0x2d, [0x37, 0x38, 0x77, 0x77], 0x2d, [0x66, 0x62, 0x73, 0x7d], 0x2d, [0x33, 0x36, 0x67, 0x30], 0x2d, [0x36, 0x63, 0x67, 0x54a07f1fb49ecd59, 0x38, 0x77, 0x77, 0x7f]}}}, {@fowner_lt={'fowner<'}}, {@obj_user={'obj_user', 0x3d, 'self^md5sum'}}, {@smackfstransmute={'smackfstransmute', 0x3d, '[-/em0'}}, {@obj_type={'obj_type', 0x3d, '\':/{vboxnet1em0selinuxsecurityvmnet1.'}}]}) 14:19:11 executing program 2: getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) syz_mount_image$hfs(&(0x7f0000000200)='hfs\x00', &(0x7f0000000280)='./file0\x00', 0x38e, 0x0, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 14:19:11 executing program 0: r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/expire_quiescent_template\x00', 0x2, 0x0) r1 = syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x1, 0x0) accept$inet6(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000080)=0x1c) ioctl(r1, 0xffffffffffffffb7, &(0x7f0000000080)) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000140)=@security={'security\x00', 0xe, 0x4, 0x4e0, 0x1f0, 0x320, 0x0, 0x320, 0x320, 0x438, 0x438, 0x438, 0x438, 0x438, 0x4, &(0x7f0000000100), {[{{@ipv6={@local, @local, [0x0, 0xffffff00, 0xffffffff, 0xffffff00], [0xffffffff, 0xff, 0xffffffff, 0xff], 'eql\x00', 'gretap0\x00', {}, {0xff}, 0x0, 0x7fffffff, 0x2, 0x61}, 0x0, 0x188, 0x1c8, 0x0, {}, [@common=@unspec=@conntrack2={0xc0, 'conntrack\x00', 0x2, {{@ipv4=@loopback, [0xffffffff, 0xffffffff, 0x0, 0xffffffff], @ipv4=@loopback, [0x0, 0xffffffff, 0xffffff00, 0xff000000], @ipv6=@ipv4={[], [], @remote}, [0xffffff00, 0xff000000, 0xff000000, 0xff], @ipv4=@multicast2, [0xffffffff, 0xff, 0xff0000ff], 0x3, 0x1ff, 0x4, 0x4e21, 0x4e20, 0x4e22, 0x4e20, 0x28, 0x20}, 0x1c0, 0x98}}]}, @common=@unspec=@ERROR={0x40, 'ERROR\x00', 0x0, "f650bd5c77822a55c077a2b3078812467f4ab9fefc372cf333baff203cdb"}}, {{@ipv6={@remote, @mcast2, [0xff000000, 0xffffff00, 0xffffffff, 0xff000000], [0x0, 0xff, 0xff000000, 0xffffff00], 'syzkaller0\x00', 'lo\x00', {}, {0xff}, 0x2b, 0x1, 0x2, 0x23}, 0x0, 0xf0, 0x130, 0x0, {}, [@common=@hl={0x28, 'hl\x00'}]}, @common=@inet=@TCPOPTSTRIP={0x40, 'TCPOPTSTRIP\x00', 0x0, {[0xe08d, 0x6, 0xff, 0x800, 0x2, 0x7, 0x3, 0x5]}}}, {{@uncond, 0x0, 0xf0, 0x118, 0x0, {}, [@common=@hl={0x28, 'hl\x00', 0x0, {0x3, 0x604}}]}, @common=@unspec=@STANDARD={0x28, '\x00', 0x0, 0xfffffffffffffffd}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x540) ioctl$EXT4_IOC_MIGRATE(0xffffffffffffffff, 0x6609) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000300)={0x0}, &(0x7f0000000400)=0xc) getsockopt$ARPT_SO_GET_INFO(r0, 0x0, 0x60, &(0x7f0000000740)={'filter\x00'}, &(0x7f00000007c0)=0x44) r3 = getpgrp(r2) prlimit64(r3, 0x0, &(0x7f00000004c0)={0x0, 0x7ffffd}, &(0x7f00000002c0)) lremovexattr(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000480)=@random={'trusted.', 'bpf\x00'}) getsockopt$inet_sctp_SCTP_PR_ASSOC_STATUS(0xffffffffffffffff, 0x84, 0x73, &(0x7f0000000280)={0x0, 0x8, 0x0, 0xe0}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r4 = syz_open_dev$amidi(&(0x7f0000000100)='/dev/amidi#\x00', 0x2, 0x800) recvfrom(r4, &(0x7f0000000500)=""/96, 0x60, 0x20, &(0x7f00000005c0)=@ipx={0x4, 0x1, 0x6, "6b183128f377"}, 0x80) 14:19:11 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x3, &(0x7f0000001fd8)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x15}}, &(0x7f0000000080)="47504c049c3514bf772da07ae82e76590a36f6493ec1ab91b397e42abf1ea6cd8cd77427fc9a9e2b7165f52b4107bf0850d899dc52d013175ddb1b2f46203c2a05b722e33e556fb2e3f39a3cde1fca53640337ec956146bdbfcb115070195631de5d21a5ea9e638c2bdb78a501ca4b6ea313d82568f9382c2c3f6faba6b4ee54793b4ed26dae3e52225029bb2ac0007f77754c3f23ceda9809b9a9684a940abcaa8cfcc7133ec422e9c83888318d41e9a493f0195fe2599651b89504f5dba14625ce2366f33d95dba92f867279cabf4aceddc85a8af7a0fa68d767ce5136b9d0d1966c499cb6bf34c2988666970000000000000000000000", 0x0, 0xff000000}, 0x48) [ 2736.815368] hfs: can't find a HFS filesystem on dev loop2 14:19:11 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x3, &(0x7f0000001fd8)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x15}}, &(0x7f0000000080)="47504c049c3514bf772da07ae82e76590a36f6493ec1ab91b397e42abf1ea6cd8cd77427fc9a9e2b7165f52b4107bf0850d899dc52d013175ddb1b2f46203c2a05b722e33e556fb2e3f39a3cde1fca53640337ec956146bdbfcb115070195631de5d21a5ea9e638c2bdb78a501ca4b6ea313d82568f9382c2c3f6faba6b4ee54793b4ed26dae3e52225029bb2ac0007f77754c3f23ceda9809b9a9684a940abcaa8cfcc7133ec422e9c83888318d41e9a493f0195fe2599651b89504f5dba14625ce2366f33d95dba92f867279cabf4aceddc85a8af7a0fa68d767ce5136b9d0d1966c499cb6bf34c2988666970000000000000000000000", 0x0, 0x3f00}, 0x48) 14:19:11 executing program 3: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', 0x0, 0xb102b8700, 0x3, &(0x7f0000000240)=[{&(0x7f0000000080)="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", 0xfc, 0x8}, {&(0x7f0000000180)="6e4fae343fcbe75f750edab4ffe869cf59917854f4c0064b2fefb89db71f83a1dbd85e8720426ce6dac8c1d994bda6e76d23aafb8234e65dd6ce69b85ba473a42f9a10", 0x43, 0x3ff}, {&(0x7f0000000200)="0cf1e6962e8e09a410cd9d6a8b06436370074e01970a", 0x16, 0xf453}], 0x10000, &(0x7f0000000440)={[{@quota_off='quota=off'}, {@noloccookie='noloccookie'}, {@quota_quantum={'quota_quantum', 0x3d, 0x7fffffff}}, {@rgrplvb='rgrplvb'}, {@rgrplvb='rgrplvb'}], [{@smackfshat={'smackfshat', 0x3d, "7db3706f7369785f61636c5f6163636573732e"}}, {@fowner_lt={'fowner<'}}, {@smackfsroot={'smackfsroot'}}, {@fsuuid={'fsuuid', 0x3d, {[0x62, 0x7d, 0x32, 0x66, 0x32, 0x38, 0x77, 0x77], 0x2d, [0x37, 0x38, 0x77, 0x77], 0x2d, [0x66, 0x62, 0x73, 0x7d], 0x2d, [0x33, 0x36, 0x67, 0x30], 0x2d, [0x36, 0x63, 0x67, 0x54a07f1fb49ecd59, 0x38, 0x77, 0x77, 0x7f]}}}, {@fowner_lt={'fowner<'}}, {@obj_user={'obj_user', 0x3d, 'self^md5sum'}}, {@smackfstransmute={'smackfstransmute', 0x3d, '[-/em0'}}, {@obj_type={'obj_type', 0x3d, '\':/{vboxnet1em0selinuxsecurityvmnet1.'}}]}) [ 2736.881230] hfs: can't find a HFS filesystem on dev loop2 14:19:11 executing program 1: r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/expire_quiescent_template\x00', 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000140)=@security={'security\x00', 0xe, 0x4, 0x4e0, 0x1f0, 0x320, 0x0, 0x320, 0x320, 0x438, 0x438, 0x438, 0x438, 0x438, 0x4, &(0x7f0000000100), {[{{@ipv6={@local, @local, [0x0, 0xffffff00, 0xffffffff, 0xffffff00], [0xffffffff, 0xff, 0xffffffff, 0xff], 'eql\x00', 'gretap0\x00', {}, {0xff}, 0x0, 0x7fffffff, 0x2, 0x61}, 0x0, 0x188, 0x1c8, 0x0, {}, [@common=@unspec=@conntrack2={0xc0, 'conntrack\x00', 0x2, {{@ipv4=@loopback, [0xffffffff, 0xffffffff, 0x0, 0xffffffff], @ipv4=@loopback, [0x0, 0xffffffff, 0xffffff00, 0xff000000], @ipv6=@ipv4={[], [], @remote}, [0xffffff00, 0xff000000, 0xff000000, 0xff], @ipv4=@multicast2, [0xffffffff, 0xff, 0xff0000ff], 0x3, 0x1ff, 0x4, 0x4e21, 0x4e20, 0x4e22, 0x4e20, 0x28, 0x20}, 0x1c0, 0x98}}]}, @common=@unspec=@ERROR={0x40, 'ERROR\x00', 0x0, "f650bd5c77822a55c077a2b3078812467f4ab9fefc372cf333baff203cdb"}}, {{@ipv6={@remote, @mcast2, [0xff000000, 0xffffff00, 0xffffffff, 0xff000000], [0x0, 0xff, 0xff000000, 0xffffff00], 'syzkaller0\x00', 'lo\x00', {}, {0xff}, 0x2b, 0x1, 0x2, 0x23}, 0x0, 0xf0, 0x130, 0x0, {}, [@common=@hl={0x28, 'hl\x00'}]}, @common=@inet=@TCPOPTSTRIP={0x40, 'TCPOPTSTRIP\x00', 0x0, {[0xe08d, 0x6, 0xff, 0x800, 0x2, 0x7, 0x3, 0x5]}}}, {{@uncond, 0x0, 0xf0, 0x118, 0x0, {}, [@common=@hl={0x28, 'hl\x00', 0x0, {0x3, 0x604}}]}, @common=@unspec=@STANDARD={0x28, '\x00', 0x0, 0xfffffffffffffffd}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x540) ioctl$EXT4_IOC_MIGRATE(0xffffffffffffffff, 0x6609) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000300)={0x0}, &(0x7f0000000400)=0xc) getsockopt$ARPT_SO_GET_INFO(r0, 0x0, 0x60, &(0x7f0000000740)={'filter\x00'}, &(0x7f00000007c0)=0x44) r3 = getpgrp(r2) prlimit64(r3, 0x0, &(0x7f00000004c0)={0x0, 0x7ffffd}, &(0x7f00000002c0)) lremovexattr(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000480)=@random={'trusted.', 'bpf\x00'}) getsockopt$inet_sctp_SCTP_PR_ASSOC_STATUS(0xffffffffffffffff, 0x84, 0x73, &(0x7f0000000280)={0x0, 0x8, 0x0, 0xe0}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r4 = syz_open_dev$amidi(&(0x7f0000000100)='/dev/amidi#\x00', 0x2, 0x800) recvfrom(r4, &(0x7f0000000500)=""/96, 0x60, 0x20, &(0x7f00000005c0)=@ipx={0x4, 0x1, 0x6, "6b183128f377"}, 0x80) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000200)='./file0\x00', 0x700, 0x0, &(0x7f00000024c0), 0x100032, &(0x7f00000000c0)=ANY=[@ANYBLOB]) prctl$PR_MPX_ENABLE_MANAGEMENT(0x2b) getsockopt$inet_dccp_int(0xffffffffffffffff, 0x21, 0xf, &(0x7f0000000240), 0x0) fstat(0xffffffffffffffff, &(0x7f00000006c0)) getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, &(0x7f0000000440)={0x0, 0x80}, &(0x7f00000001c0)=0xfffffffffffffd3f) ioctl$FICLONE(r1, 0x40049409, r4) setgroups(0x3, &(0x7f0000000340)=[0x0, 0x0, 0x0]) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r4, &(0x7f0000000840)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000800)={0xffffffffffffffff}, 0x13f, 0xb}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000880)={0x1, 0x10, 0xfa00, {&(0x7f0000000680), r5}}, 0x18) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, 0x0) 14:19:11 executing program 0: r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/expire_quiescent_template\x00', 0x2, 0x0) r1 = syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x1, 0x0) accept$inet6(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000080)=0x1c) ioctl(r1, 0xffffffffffffffb7, &(0x7f0000000080)) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000140)=@security={'security\x00', 0xe, 0x4, 0x4e0, 0x1f0, 0x320, 0x0, 0x320, 0x320, 0x438, 0x438, 0x438, 0x438, 0x438, 0x4, &(0x7f0000000100), {[{{@ipv6={@local, @local, [0x0, 0xffffff00, 0xffffffff, 0xffffff00], [0xffffffff, 0xff, 0xffffffff, 0xff], 'eql\x00', 'gretap0\x00', {}, {0xff}, 0x0, 0x7fffffff, 0x2, 0x61}, 0x0, 0x188, 0x1c8, 0x0, {}, [@common=@unspec=@conntrack2={0xc0, 'conntrack\x00', 0x2, {{@ipv4=@loopback, [0xffffffff, 0xffffffff, 0x0, 0xffffffff], @ipv4=@loopback, [0x0, 0xffffffff, 0xffffff00, 0xff000000], @ipv6=@ipv4={[], [], @remote}, [0xffffff00, 0xff000000, 0xff000000, 0xff], @ipv4=@multicast2, [0xffffffff, 0xff, 0xff0000ff], 0x3, 0x1ff, 0x4, 0x4e21, 0x4e20, 0x4e22, 0x4e20, 0x28, 0x20}, 0x1c0, 0x98}}]}, @common=@unspec=@ERROR={0x40, 'ERROR\x00', 0x0, "f650bd5c77822a55c077a2b3078812467f4ab9fefc372cf333baff203cdb"}}, {{@ipv6={@remote, @mcast2, [0xff000000, 0xffffff00, 0xffffffff, 0xff000000], [0x0, 0xff, 0xff000000, 0xffffff00], 'syzkaller0\x00', 'lo\x00', {}, {0xff}, 0x2b, 0x1, 0x2, 0x23}, 0x0, 0xf0, 0x130, 0x0, {}, [@common=@hl={0x28, 'hl\x00'}]}, @common=@inet=@TCPOPTSTRIP={0x40, 'TCPOPTSTRIP\x00', 0x0, {[0xe08d, 0x6, 0xff, 0x800, 0x2, 0x7, 0x3, 0x5]}}}, {{@uncond, 0x0, 0xf0, 0x118, 0x0, {}, [@common=@hl={0x28, 'hl\x00', 0x0, {0x3, 0x604}}]}, @common=@unspec=@STANDARD={0x28, '\x00', 0x0, 0xfffffffffffffffd}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x540) ioctl$EXT4_IOC_MIGRATE(0xffffffffffffffff, 0x6609) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000300)={0x0}, &(0x7f0000000400)=0xc) getsockopt$ARPT_SO_GET_INFO(r0, 0x0, 0x60, &(0x7f0000000740)={'filter\x00'}, &(0x7f00000007c0)=0x44) r3 = getpgrp(r2) prlimit64(r3, 0x0, &(0x7f00000004c0)={0x0, 0x7ffffd}, &(0x7f00000002c0)) lremovexattr(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000480)=@random={'trusted.', 'bpf\x00'}) getsockopt$inet_sctp_SCTP_PR_ASSOC_STATUS(0xffffffffffffffff, 0x84, 0x73, &(0x7f0000000280)={0x0, 0x8, 0x0, 0xe0}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) syz_open_dev$amidi(&(0x7f0000000100)='/dev/amidi#\x00', 0x2, 0x800) 14:19:11 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x3, &(0x7f0000001fd8)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x15}}, &(0x7f0000000080)="47504c049c3514bf772da07ae82e76590a36f6493ec1ab91b397e42abf1ea6cd8cd77427fc9a9e2b7165f52b4107bf0850d899dc52d013175ddb1b2f46203c2a05b722e33e556fb2e3f39a3cde1fca53640337ec956146bdbfcb115070195631de5d21a5ea9e638c2bdb78a501ca4b6ea313d82568f9382c2c3f6faba6b4ee54793b4ed26dae3e52225029bb2ac0007f77754c3f23ceda9809b9a9684a940abcaa8cfcc7133ec422e9c83888318d41e9a493f0195fe2599651b89504f5dba14625ce2366f33d95dba92f867279cabf4aceddc85a8af7a0fa68d767ce5136b9d0d1966c499cb6bf34c2988666970000000000000000000000", 0x0, 0x10}, 0x48) 14:19:12 executing program 4: r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/expire_quiescent_template\x00', 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000140)=@security={'security\x00', 0xe, 0x4, 0x4b8, 0x1f0, 0x320, 0x0, 0x320, 0x320, 0x438, 0x438, 0x438, 0x438, 0x438, 0x4, &(0x7f0000000100), {[{{@ipv6={@local, @local, [0x0, 0x0, 0xffffffff, 0xffffff00], [0xffffffff, 0xff, 0xffffffff, 0xff], 'eql\x00', 'gretap0\x00', {}, {0xff}, 0x0, 0x7fffffff, 0x2, 0x61}, 0x0, 0x188, 0x1c8, 0x0, {}, [@common=@unspec=@conntrack2={0xc0, 'conntrack\x00', 0x2, {{@ipv4=@loopback, [0xffffffff, 0xffffffff, 0x0, 0xffffffff], @ipv4=@loopback, [0x0, 0xffffffff, 0xffffff00, 0xff000000], @ipv6=@ipv4={[], [], @remote}, [0xffffff00, 0xff000000, 0xff000000, 0xff], @ipv4=@multicast2, [0xffffffff, 0xff, 0xff0000ff], 0x3, 0x1ff, 0x4, 0x4e21, 0x4e20, 0x4e22, 0x4e20, 0x28}, 0x1c0, 0x98}}]}, @common=@unspec=@ERROR={0x40, 'ERROR\x00', 0x0, "f650bd5c77822a55c077a2b3078812467f4ab9fefc372cf333baff203cdb"}}, {{@ipv6={@remote, @mcast2, [0xff000000, 0xffffff00, 0xffffffff, 0xff000000], [0x0, 0xff, 0xff000000, 0xffffff00], 'syzkaller0\x00', 'lo\x00', {}, {}, 0x2b, 0x1, 0x2, 0x23}, 0x0, 0xc8, 0x108}, @common=@inet=@TCPOPTSTRIP={0x40, 'TCPOPTSTRIP\x00', 0x0, {[0xe08d, 0x6, 0xff, 0x800, 0x2, 0x7, 0x0, 0x5]}}}, {{@uncond, 0x0, 0xf0, 0x118, 0x0, {}, [@common=@hl={0x28, 'hl\x00', 0x0, {0x3, 0x604}}]}, @common=@unspec=@STANDARD={0x28, '\x00', 0x0, 0xfffffffffffffffd}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x518) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = getpgrp(0x0) prlimit64(r2, 0x0, &(0x7f00000004c0)={0x0, 0x7ffffd}, &(0x7f00000002c0)) lremovexattr(0x0, &(0x7f0000000480)=@random={'trusted.', 'bpf\x00'}) getsockopt$inet_sctp_SCTP_PR_ASSOC_STATUS(0xffffffffffffffff, 0x84, 0x73, &(0x7f0000000280), 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r3 = syz_open_dev$amidi(&(0x7f0000000100)='/dev/amidi#\x00', 0x2, 0x800) recvfrom(0xffffffffffffffff, 0x0, 0x0, 0x20, &(0x7f00000005c0)=@ipx={0x4, 0x1, 0x6, "6b183128f377"}, 0x80) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000200)='./file0\x00', 0x700, 0x0, &(0x7f00000024c0), 0x100032, &(0x7f00000000c0)=ANY=[@ANYBLOB]) getsockopt$inet_dccp_int(0xffffffffffffffff, 0x21, 0xf, &(0x7f0000000240), 0x0) fstat(0xffffffffffffffff, &(0x7f00000006c0)) write$uinput_user_dev(r3, &(0x7f0000000740)={'syz0\x00', {0x80000001, 0x0, 0x8, 0x5}, 0x8, [0x8a4, 0x7e0c, 0x0, 0x0, 0x81, 0x1, 0x2, 0x5, 0x1, 0x40, 0x7, 0x3, 0xc7ef, 0x0, 0x1000, 0xa7, 0x3, 0xffff, 0x2, 0x9, 0x8001, 0xfffffffffffffc01, 0x1, 0x9, 0xffffffff, 0xf08, 0x2, 0x4, 0x3f, 0x400, 0x7, 0x80000001, 0x60, 0x400, 0x1, 0xe22, 0x8, 0x7, 0x7, 0x44, 0x1, 0x3, 0xf14, 0x1, 0x8000, 0x4, 0x6, 0xffffffff, 0x0, 0x3, 0x4, 0x3, 0x7, 0x1934, 0x8001, 0x100000000, 0x8, 0x1, 0x6, 0xd5, 0x9, 0x2, 0x0, 0x5], [0x800, 0xc7, 0x6, 0xfffffffffffff308, 0x3, 0x3, 0xc5a6, 0x2, 0x800, 0x1ff, 0x6, 0x100000000, 0x8, 0x0, 0x7, 0x8, 0x3f, 0x3, 0x9, 0x5, 0xf000, 0x9, 0x0, 0x0, 0xaed7, 0x7, 0xfffffffffffffffc, 0x8001, 0x9, 0x5, 0x9f9, 0xfffffffffffffffb, 0x1, 0x7f, 0xce, 0xffff, 0x2, 0x6, 0x1, 0x5, 0x8, 0xff, 0x4, 0xff, 0x1, 0x1, 0x0, 0x0, 0x7, 0x2, 0xfffffffffffffffb, 0x80000000, 0xdbfa, 0x401, 0xffffffff80000001, 0x8000, 0x6, 0x1, 0x0, 0xfffffffffffffffa, 0x8, 0x3, 0x7, 0x80000001], [0x5, 0x42ea, 0x9, 0x1, 0x7, 0x8001, 0x101, 0x9, 0x2, 0x10001, 0x9, 0xff, 0x7fff, 0xbc8c, 0x0, 0x0, 0x7, 0x6, 0xffffffff, 0x8, 0x8000000000000000, 0x4, 0x3, 0x20, 0x4, 0x5, 0xffffffff, 0x0, 0x3e, 0xfffffffffffffffe, 0xffffffff, 0x8, 0x4, 0xb84, 0x5bc, 0x9, 0x6, 0x401, 0xfffffffffffffff9, 0x7, 0x5, 0x9, 0x8, 0x6, 0x6, 0x64, 0xfffffffffffffffd, 0x3, 0x7c, 0x80, 0x0, 0xe84f, 0x4, 0x2, 0x4, 0x4, 0x5, 0x9, 0x5, 0x6, 0x7, 0x2, 0xfffffffffffffff9, 0x3f], [0x9, 0x35, 0x3f, 0x5, 0x6, 0x7f, 0xffffffffffffffff, 0x100000001, 0x9e6, 0x6, 0xa0d, 0x800000, 0x7ff, 0x2, 0x7ff, 0x8001, 0xfffffffffffffffb, 0x1, 0xfde, 0x9, 0x2fe7, 0xffffffff, 0xffff, 0x4, 0x10, 0x0, 0x1ff, 0xfffffffffffeffff, 0x42f33006, 0x9e, 0x0, 0xe19, 0x4, 0x921a, 0xffffffff, 0x0, 0x2, 0x82c2, 0x5, 0x20, 0x1, 0x7fffffff, 0xfffffffffffff017, 0x61a, 0x4, 0x40, 0x1ff, 0x8b, 0xfffffffffffffff9, 0x9, 0x4, 0xff, 0x1ff, 0x3, 0x20, 0x1, 0x13, 0x0, 0x0, 0x3, 0x6, 0x7fffffff, 0x4000000000, 0xdc4]}, 0x45c) getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, &(0x7f0000000440)={0x0, 0x80}, &(0x7f00000001c0)=0xfffffffffffffd3f) ioctl$FICLONE(r1, 0x40049409, r3) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, 0x0) 14:19:12 executing program 2: getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) syz_mount_image$hfs(&(0x7f0000000200)='hfs\x00', &(0x7f0000000280)='./file0\x00', 0xffffff97, 0x0, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 14:19:12 executing program 3: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', 0x0, 0xb102b8700, 0x3, &(0x7f0000000240)=[{&(0x7f0000000080)="5731042c27af82c0a261c13f85e0cd8fccbac2b3337c904cd0ee709a7154b3e180a42abe92ffb7b08847dac187361d788c01dd02b8386a12a52a48d3230e1f9b0e9fda5ab8254be88f3272842bddebbcdfa97324ef74d89bc655ee46f4d352a7e3e97901c335ff667704cd1bc10e9560244a08a34e021cc2a6914b559d493d6f7bce4f72e44f3d308acedbdb63c4d9f2885fb33ac3377548b803c65a7afeffcfe551f50d04bc24340a6c690f1ea0362fee78fb35bf7bec7ef960631f29e6a87e0997f64cde26f3ed9b6a5380d1d9caa80ee31fa627b820181b106b38b56b225cdc352ab158e1ac939e43b04fff52db5bc48be4e05442cfcc527ece13", 0xfc, 0x8}, {&(0x7f0000000180)="6e4fae343fcbe75f750edab4ffe869cf59917854f4c0064b2fefb89db71f83a1dbd85e8720426ce6dac8c1d994bda6e76d23aafb8234e65dd6ce69b85ba473a42f9a10", 0x43, 0x3ff}, {&(0x7f0000000200)="0cf1e6962e8e09a410cd9d6a8b06436370074e01970a", 0x16, 0xf453}], 0x10000, &(0x7f0000000440)={[{@quota_off='quota=off'}, {@noloccookie='noloccookie'}, {@quota_quantum={'quota_quantum', 0x3d, 0x7fffffff}}, {@rgrplvb='rgrplvb'}, {@rgrplvb='rgrplvb'}], [{@smackfshat={'smackfshat', 0x3d, "7db3706f7369785f61636c5f6163636573732e"}}, {@fowner_lt={'fowner<'}}, {@smackfsroot={'smackfsroot'}}, {@fsuuid={'fsuuid', 0x3d, {[0x62, 0x7d, 0x32, 0x66, 0x32, 0x38, 0x77, 0x77], 0x2d, [0x37, 0x38, 0x77, 0x77], 0x2d, [0x66, 0x62, 0x73, 0x7d], 0x2d, [0x33, 0x36, 0x67, 0x30], 0x2d, [0x36, 0x63, 0x67, 0x54a07f1fb49ecd59, 0x38, 0x77, 0x77, 0x7f]}}}, {@fowner_lt={'fowner<'}}, {@obj_user={'obj_user', 0x3d, 'self^md5sum'}}, {@smackfstransmute={'smackfstransmute', 0x3d, '[-/em0'}}, {@obj_type={'obj_type', 0x3d, '\':/{vboxnet1em0selinuxsecurityvmnet1.'}}]}) 14:19:12 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x3, &(0x7f0000001fd8)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x15}}, &(0x7f0000000080)="47504c049c3514bf772da07ae82e76590a36f6493ec1ab91b397e42abf1ea6cd8cd77427fc9a9e2b7165f52b4107bf0850d899dc52d013175ddb1b2f46203c2a05b722e33e556fb2e3f39a3cde1fca53640337ec956146bdbfcb115070195631de5d21a5ea9e638c2bdb78a501ca4b6ea313d82568f9382c2c3f6faba6b4ee54793b4ed26dae3e52225029bb2ac0007f77754c3f23ceda9809b9a9684a940abcaa8cfcc7133ec422e9c83888318d41e9a493f0195fe2599651b89504f5dba14625ce2366f33d95dba92f867279cabf4aceddc85a8af7a0fa68d767ce5136b9d0d1966c499cb6bf34c2988666970000000000000000000000", 0x0, 0x18428a}, 0x48) 14:19:12 executing program 0: r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/expire_quiescent_template\x00', 0x2, 0x0) r1 = syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x1, 0x0) accept$inet6(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000080)=0x1c) ioctl(r1, 0xffffffffffffffb7, &(0x7f0000000080)) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000140)=@security={'security\x00', 0xe, 0x4, 0x4e0, 0x1f0, 0x320, 0x0, 0x320, 0x320, 0x438, 0x438, 0x438, 0x438, 0x438, 0x4, &(0x7f0000000100), {[{{@ipv6={@local, @local, [0x0, 0xffffff00, 0xffffffff, 0xffffff00], [0xffffffff, 0xff, 0xffffffff, 0xff], 'eql\x00', 'gretap0\x00', {}, {0xff}, 0x0, 0x7fffffff, 0x2, 0x61}, 0x0, 0x188, 0x1c8, 0x0, {}, [@common=@unspec=@conntrack2={0xc0, 'conntrack\x00', 0x2, {{@ipv4=@loopback, [0xffffffff, 0xffffffff, 0x0, 0xffffffff], @ipv4=@loopback, [0x0, 0xffffffff, 0xffffff00, 0xff000000], @ipv6=@ipv4={[], [], @remote}, [0xffffff00, 0xff000000, 0xff000000, 0xff], @ipv4=@multicast2, [0xffffffff, 0xff, 0xff0000ff], 0x3, 0x1ff, 0x4, 0x4e21, 0x4e20, 0x4e22, 0x4e20, 0x28, 0x20}, 0x1c0, 0x98}}]}, @common=@unspec=@ERROR={0x40, 'ERROR\x00', 0x0, "f650bd5c77822a55c077a2b3078812467f4ab9fefc372cf333baff203cdb"}}, {{@ipv6={@remote, @mcast2, [0xff000000, 0xffffff00, 0xffffffff, 0xff000000], [0x0, 0xff, 0xff000000, 0xffffff00], 'syzkaller0\x00', 'lo\x00', {}, {0xff}, 0x2b, 0x1, 0x2, 0x23}, 0x0, 0xf0, 0x130, 0x0, {}, [@common=@hl={0x28, 'hl\x00'}]}, @common=@inet=@TCPOPTSTRIP={0x40, 'TCPOPTSTRIP\x00', 0x0, {[0xe08d, 0x6, 0xff, 0x800, 0x2, 0x7, 0x3, 0x5]}}}, {{@uncond, 0x0, 0xf0, 0x118, 0x0, {}, [@common=@hl={0x28, 'hl\x00', 0x0, {0x3, 0x604}}]}, @common=@unspec=@STANDARD={0x28, '\x00', 0x0, 0xfffffffffffffffd}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x540) ioctl$EXT4_IOC_MIGRATE(0xffffffffffffffff, 0x6609) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000300)={0x0}, &(0x7f0000000400)=0xc) getsockopt$ARPT_SO_GET_INFO(r0, 0x0, 0x60, &(0x7f0000000740)={'filter\x00'}, &(0x7f00000007c0)=0x44) r3 = getpgrp(r2) prlimit64(r3, 0x0, &(0x7f00000004c0)={0x0, 0x7ffffd}, &(0x7f00000002c0)) lremovexattr(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000480)=@random={'trusted.', 'bpf\x00'}) getsockopt$inet_sctp_SCTP_PR_ASSOC_STATUS(0xffffffffffffffff, 0x84, 0x73, &(0x7f0000000280)={0x0, 0x8, 0x0, 0xe0}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) [ 2737.325714] hfs: can't find a HFS filesystem on dev loop2 [ 2737.464064] EXT4-fs: 12 callbacks suppressed [ 2737.464140] EXT4-fs (sda1): re-mounted. Opts: 14:19:12 executing program 2: getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) syz_mount_image$hfs(&(0x7f0000000200)='hfs\x00', &(0x7f0000000280)='./file0\x00', 0x400000000000000, 0x0, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 14:19:12 executing program 3: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x3, &(0x7f0000000240)=[{&(0x7f0000000080)="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", 0xfc, 0x8}, {&(0x7f0000000180)="6e4fae343fcbe75f750edab4ffe869cf59917854f4c0064b2fefb89db71f83a1dbd85e8720426ce6dac8c1d994bda6e76d23aafb8234e65dd6ce69b85ba473a42f9a10", 0x43, 0x3ff}, {&(0x7f0000000200)="0cf1e6962e8e09a410cd9d6a8b06436370074e01970a", 0x16, 0xf453}], 0x10000, &(0x7f0000000440)={[{@quota_off='quota=off'}, {@noloccookie='noloccookie'}, {@quota_quantum={'quota_quantum', 0x3d, 0x7fffffff}}, {@rgrplvb='rgrplvb'}, {@rgrplvb='rgrplvb'}], [{@smackfshat={'smackfshat', 0x3d, "7db3706f7369785f61636c5f6163636573732e"}}, {@fowner_lt={'fowner<'}}, {@smackfsroot={'smackfsroot'}}, {@fsuuid={'fsuuid', 0x3d, {[0x62, 0x7d, 0x32, 0x66, 0x32, 0x38, 0x77, 0x77], 0x2d, [0x37, 0x38, 0x77, 0x77], 0x2d, [0x66, 0x62, 0x73, 0x7d], 0x2d, [0x33, 0x36, 0x67, 0x30], 0x2d, [0x36, 0x63, 0x67, 0x54a07f1fb49ecd59, 0x38, 0x77, 0x77, 0x7f]}}}, {@fowner_lt={'fowner<'}}, {@obj_user={'obj_user', 0x3d, 'self^md5sum'}}, {@smackfstransmute={'smackfstransmute', 0x3d, '[-/em0'}}, {@obj_type={'obj_type', 0x3d, '\':/{vboxnet1em0selinuxsecurityvmnet1.'}}]}) 14:19:12 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x3, &(0x7f0000001fd8)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x15}}, &(0x7f0000000080)="47504c049c3514bf772da07ae82e76590a36f6493ec1ab91b397e42abf1ea6cd8cd77427fc9a9e2b7165f52b4107bf0850d899dc52d013175ddb1b2f46203c2a05b722e33e556fb2e3f39a3cde1fca53640337ec956146bdbfcb115070195631de5d21a5ea9e638c2bdb78a501ca4b6ea313d82568f9382c2c3f6faba6b4ee54793b4ed26dae3e52225029bb2ac0007f77754c3f23ceda9809b9a9684a940abcaa8cfcc7133ec422e9c83888318d41e9a493f0195fe2599651b89504f5dba14625ce2366f33d95dba92f867279cabf4aceddc85a8af7a0fa68d767ce5136b9d0d1966c499cb6bf34c2988666970000000000000000000000", 0x0, 0x3f00000000000000}, 0x48) [ 2737.597230] EXT4-fs (sda1): re-mounted. Opts: [ 2737.628584] gfs2: invalid mount option: fowner<00000000000000000000 [ 2737.641604] gfs2: can't parse mount arguments [ 2737.646609] EXT4-fs (sda1): Unrecognized mount option "./file0" or missing value 14:19:12 executing program 0: r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/expire_quiescent_template\x00', 0x2, 0x0) r1 = syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x1, 0x0) accept$inet6(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000080)=0x1c) ioctl(r1, 0xffffffffffffffb7, &(0x7f0000000080)) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000140)=@security={'security\x00', 0xe, 0x4, 0x4e0, 0x1f0, 0x320, 0x0, 0x320, 0x320, 0x438, 0x438, 0x438, 0x438, 0x438, 0x4, &(0x7f0000000100), {[{{@ipv6={@local, @local, [0x0, 0xffffff00, 0xffffffff, 0xffffff00], [0xffffffff, 0xff, 0xffffffff, 0xff], 'eql\x00', 'gretap0\x00', {}, {0xff}, 0x0, 0x7fffffff, 0x2, 0x61}, 0x0, 0x188, 0x1c8, 0x0, {}, [@common=@unspec=@conntrack2={0xc0, 'conntrack\x00', 0x2, {{@ipv4=@loopback, [0xffffffff, 0xffffffff, 0x0, 0xffffffff], @ipv4=@loopback, [0x0, 0xffffffff, 0xffffff00, 0xff000000], @ipv6=@ipv4={[], [], @remote}, [0xffffff00, 0xff000000, 0xff000000, 0xff], @ipv4=@multicast2, [0xffffffff, 0xff, 0xff0000ff], 0x3, 0x1ff, 0x4, 0x4e21, 0x4e20, 0x4e22, 0x4e20, 0x28, 0x20}, 0x1c0, 0x98}}]}, @common=@unspec=@ERROR={0x40, 'ERROR\x00', 0x0, "f650bd5c77822a55c077a2b3078812467f4ab9fefc372cf333baff203cdb"}}, {{@ipv6={@remote, @mcast2, [0xff000000, 0xffffff00, 0xffffffff, 0xff000000], [0x0, 0xff, 0xff000000, 0xffffff00], 'syzkaller0\x00', 'lo\x00', {}, {0xff}, 0x2b, 0x1, 0x2, 0x23}, 0x0, 0xf0, 0x130, 0x0, {}, [@common=@hl={0x28, 'hl\x00'}]}, @common=@inet=@TCPOPTSTRIP={0x40, 'TCPOPTSTRIP\x00', 0x0, {[0xe08d, 0x6, 0xff, 0x800, 0x2, 0x7, 0x3, 0x5]}}}, {{@uncond, 0x0, 0xf0, 0x118, 0x0, {}, [@common=@hl={0x28, 'hl\x00', 0x0, {0x3, 0x604}}]}, @common=@unspec=@STANDARD={0x28, '\x00', 0x0, 0xfffffffffffffffd}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x540) ioctl$EXT4_IOC_MIGRATE(0xffffffffffffffff, 0x6609) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000300)={0x0}, &(0x7f0000000400)=0xc) getsockopt$ARPT_SO_GET_INFO(r0, 0x0, 0x60, &(0x7f0000000740)={'filter\x00'}, &(0x7f00000007c0)=0x44) r3 = getpgrp(r2) prlimit64(r3, 0x0, &(0x7f00000004c0)={0x0, 0x7ffffd}, &(0x7f00000002c0)) lremovexattr(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000480)=@random={'trusted.', 'bpf\x00'}) getsockopt$inet_sctp_SCTP_PR_ASSOC_STATUS(0xffffffffffffffff, 0x84, 0x73, &(0x7f0000000280)={0x0, 0x8, 0x0, 0xe0}, 0x0) [ 2737.698966] hfs: can't find a HFS filesystem on dev loop2 14:19:12 executing program 1: r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/expire_quiescent_template\x00', 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f00000008c0)=ANY=[@ANYBLOB="73656375726974790000000000000000000000000000000000000000000000000e00000004000000e0040000f001000020030000000000002003000020030000380400003804000038040000380400003804000004000000c907102d1c7a622368d2162136ceaa18ee2ee55f5f41fd45098209c497d6ab7e1c4a76deea6c6fe693a59f04a221806540ee2bf71de309687839aa0776dbe28e9e0c48071ed00d6acdd5bf08e61e4ff4728b2cadafd6749e67a408b59f974470cd8304f74b14875255d63c09473cee912c972bc8cc6ac5230458db622ad99f1e93ed5a75ca4dc27eec896f667ea7dbba7e7585c73ac9b381740d485a35f1437d8fa86d23363e3c7b910b07482a87581e87b6", @ANYPTR=&(0x7f0000000100)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00'], @ANYBLOB="fe8000000000000000000000000000aafe8000000000000000000000000000aa00000000ffffff00ffffffffffffff00ffffffff000000ffffffffff000000ff65716c0000000000000000000000000067726574617030000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ff000000000000000000000000000000000000ff02610000000000000000000000000000008801c801000000000000000000000000000000000000000000000000c000636f6e6e747261636b0000000000000000000000000000000000000000027f000001000000000000000000000000ffffffffffffffff00000000ffffffff7f00000100000000000000000000000000000000ffffffffffffff00ff00000000000000000000000000ffffac1414bbffffff00ff000000ff000000000000ffe0000002000000000000000000000000ffffffff000000ffff0000ff0000000003000000ff01000004004e214e204e224e20280020000000c00198000000000040004552524f5200000000000000000000000000000000000000000000000000f650bd5c77822a55c077a2b3078812467f4ab9fefc372cf333baff203cdb0000fe8000000000000000000000000000bbff020000000000000000000000000001ff000000ffffff00ffffffffff00000000000000000000ffff000000ffffff0073797a6b616c6c6572300000000000006c6f0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ff000000000000000000000000000000002b00010223000000000000000000000000000000f00030010000000000000000000000000000000000000000000000002800686c00000000000000000000000000000000000000000000000000000000000000000000000040005443504f50545354524950000000000000000000000000000000000000008de0000006000000ff000000000800000200000007000000030000000500000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f00018010000000000000000000000000000000000000000000000002800686c0000000000000000000000000000000000000000000000000000000003040000000000002800000000000000000000000000000000000000000000000000000000000000fdffffff000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a800d0000000000000000000000000000000000000000000000000002800000000000000000000000000000000000000000000000000000000000000feffffff00000000"], 0x540) ioctl$EXT4_IOC_MIGRATE(0xffffffffffffffff, 0x6609) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000300)={0x0}, &(0x7f0000000400)=0xc) getsockopt$ARPT_SO_GET_INFO(r0, 0x0, 0x60, &(0x7f0000000740)={'filter\x00'}, &(0x7f00000007c0)=0x44) r3 = getpgrp(r2) prlimit64(r3, 0x0, &(0x7f00000004c0)={0x0, 0x7ffffd}, &(0x7f00000002c0)) lremovexattr(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000480)=@random={'trusted.', 'bpf\x00'}) ioctl$DRM_IOCTL_SET_UNIQUE(r0, 0x40106410, &(0x7f0000000880)={0x44, &(0x7f0000000800)="4d58bfce9990daa578defb7578993744983baa7cb9279fe585ab3f65c19bc671ba3871792ed611ab2d7370b2196c5af49b311a2a5c8c3382cf6c034cc771667278b2658d"}) socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_sctp_SCTP_PR_ASSOC_STATUS(0xffffffffffffffff, 0x84, 0x73, &(0x7f0000000280)={0x0, 0x8, 0x0, 0xe0}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) getsockopt$EBT_SO_GET_INFO(r0, 0x0, 0x80, &(0x7f0000000ec0)={'nat\x00'}, &(0x7f0000000180)=0x78) openat$null(0xffffffffffffff9c, &(0x7f0000000680)='/dev/null\x00', 0x200, 0x0) r4 = syz_open_dev$amidi(&(0x7f0000000380)='/dev/amidi#\x00', 0x2, 0x40801) getpgid(r2) recvfrom(r4, &(0x7f0000000500)=""/96, 0x60, 0x20, &(0x7f00000005c0)=@ipx={0x4, 0x1, 0x6, "6b183128f377"}, 0x80) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000200)='./file0\x00', 0x6fd, 0x0, &(0x7f0000000580), 0x100032, &(0x7f00000000c0)=ANY=[@ANYBLOB]) prctl$PR_MPX_ENABLE_MANAGEMENT(0x2b) getsockopt$inet_dccp_int(0xffffffffffffffff, 0x21, 0xf, &(0x7f0000000240), 0x0) fstat(0xffffffffffffffff, &(0x7f00000006c0)) getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, &(0x7f0000000440)={0x0, 0x80}, &(0x7f00000001c0)=0xfffffffffffffd3f) ioctl$FICLONE(r1, 0x40049409, r4) setgroups(0x3, &(0x7f0000000340)=[0x0, 0x0, 0x0]) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) fsync(r4) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, 0x0) 14:19:12 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x3, &(0x7f0000001fd8)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x15}}, &(0x7f0000000080)="47504c049c3514bf772da07ae82e76590a36f6493ec1ab91b397e42abf1ea6cd8cd77427fc9a9e2b7165f52b4107bf0850d899dc52d013175ddb1b2f46203c2a05b722e33e556fb2e3f39a3cde1fca53640337ec956146bdbfcb115070195631de5d21a5ea9e638c2bdb78a501ca4b6ea313d82568f9382c2c3f6faba6b4ee54793b4ed26dae3e52225029bb2ac0007f77754c3f23ceda9809b9a9684a940abcaa8cfcc7133ec422e9c83888318d41e9a493f0195fe2599651b89504f5dba14625ce2366f33d95dba92f867279cabf4aceddc85a8af7a0fa68d767ce5136b9d0d1966c499cb6bf34c2988666970000000000000000000000", 0x0, 0x1c000000}, 0x48) 14:19:12 executing program 3: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x10000, &(0x7f0000000440)={[{@quota_off='quota=off'}, {@noloccookie='noloccookie'}, {@quota_quantum={'quota_quantum', 0x3d, 0x7fffffff}}, {@rgrplvb='rgrplvb'}, {@rgrplvb='rgrplvb'}], [{@smackfshat={'smackfshat', 0x3d, "7db3706f7369785f61636c5f6163636573732e"}}, {@fowner_lt={'fowner<'}}, {@smackfsroot={'smackfsroot'}}, {@fsuuid={'fsuuid', 0x3d, {[0x62, 0x7d, 0x32, 0x66, 0x32, 0x38, 0x77, 0x77], 0x2d, [0x37, 0x38, 0x77, 0x77], 0x2d, [0x66, 0x62, 0x73, 0x7d], 0x2d, [0x33, 0x36, 0x67, 0x30], 0x2d, [0x36, 0x63, 0x67, 0x54a07f1fb49ecd59, 0x38, 0x77, 0x77, 0x7f]}}}, {@fowner_lt={'fowner<'}}, {@obj_user={'obj_user', 0x3d, 'self^md5sum'}}, {@smackfstransmute={'smackfstransmute', 0x3d, '[-/em0'}}, {@obj_type={'obj_type', 0x3d, '\':/{vboxnet1em0selinuxsecurityvmnet1.'}}]}) 14:19:12 executing program 4: r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/expire_quiescent_template\x00', 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000140)=@security={'security\x00', 0xe, 0x4, 0x4b8, 0x1f0, 0x320, 0x0, 0x320, 0x320, 0x438, 0x438, 0x438, 0x438, 0x438, 0x4, &(0x7f0000000100), {[{{@ipv6={@local, @local, [0x0, 0x0, 0xffffffff, 0xffffff00], [0xffffffff, 0xff, 0xffffffff, 0xff], 'eql\x00', 'gretap0\x00', {}, {0xff}, 0x0, 0x7fffffff, 0x2, 0x61}, 0x0, 0x188, 0x1c8, 0x0, {}, [@common=@unspec=@conntrack2={0xc0, 'conntrack\x00', 0x2, {{@ipv4=@loopback, [0xffffffff, 0xffffffff, 0x0, 0xffffffff], @ipv4=@loopback, [0x0, 0xffffffff, 0xffffff00, 0xff000000], @ipv6=@ipv4={[], [], @remote}, [0xffffff00, 0xff000000, 0xff000000, 0xff], @ipv4=@multicast2, [0xffffffff, 0xff, 0xff0000ff], 0x3, 0x1ff, 0x4, 0x4e21, 0x4e20, 0x4e22, 0x4e20, 0x28}, 0x1c0, 0x98}}]}, @common=@unspec=@ERROR={0x40, 'ERROR\x00', 0x0, "f650bd5c77822a55c077a2b3078812467f4ab9fefc372cf333baff203cdb"}}, {{@ipv6={@remote, @mcast2, [0xff000000, 0xffffff00, 0xffffffff, 0xff000000], [0x0, 0xff, 0xff000000, 0xffffff00], 'syzkaller0\x00', 'lo\x00', {}, {}, 0x2b, 0x1, 0x2, 0x23}, 0x0, 0xc8, 0x108}, @common=@inet=@TCPOPTSTRIP={0x40, 'TCPOPTSTRIP\x00', 0x0, {[0xe08d, 0x6, 0xff, 0x800, 0x2, 0x7, 0x0, 0x5]}}}, {{@uncond, 0x0, 0xf0, 0x118, 0x0, {}, [@common=@hl={0x28, 'hl\x00', 0x0, {0x3, 0x604}}]}, @common=@unspec=@STANDARD={0x28, '\x00', 0x0, 0xfffffffffffffffd}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x518) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = getpgrp(0x0) prlimit64(r2, 0x0, &(0x7f00000004c0)={0x0, 0x7ffffd}, &(0x7f00000002c0)) lremovexattr(0x0, &(0x7f0000000480)=@random={'trusted.', 'bpf\x00'}) getsockopt$inet_sctp_SCTP_PR_ASSOC_STATUS(0xffffffffffffffff, 0x84, 0x73, &(0x7f0000000280), 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r3 = syz_open_dev$amidi(&(0x7f0000000100)='/dev/amidi#\x00', 0x2, 0x800) recvfrom(0xffffffffffffffff, 0x0, 0x0, 0x20, &(0x7f00000005c0)=@ipx={0x4, 0x1, 0x6, "6b183128f377"}, 0x80) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000200)='./file0\x00', 0x700, 0x0, &(0x7f00000024c0), 0x100032, &(0x7f00000000c0)=ANY=[@ANYBLOB]) getsockopt$inet_dccp_int(0xffffffffffffffff, 0x21, 0xf, &(0x7f0000000240), 0x0) ioctl$VIDIOC_G_FBUF(r3, 0x8030560a, &(0x7f0000000680)={0x4, 0x40, &(0x7f0000000740)="1664acb30279ae133998156c3f69ba5b9d3c2db531b0507480236b6f43df3fe7bbe9c608c139b0da47791f1f0382f889762205d8a9d0cbbe6c7b92ed335bd3b40d6497aacc8812d5bce7ce32fff4d6327adace0d145ca8d9b449784922794c7209aa804aaf2b38bc721d7ceecc88ff4df731f5527ae76b148e81b84ae636d0abce397abe7441e60f7d86d57ba168c37e8e7ee0fcbf003c1f9aad2f3c52f177d4f8e2ff70965d70c5cdaa13c3fbe4fabf5384236d4477eddbff4eef8c49b64f3b1dde13f9f4fddff44e1cf16d081877", {0x81c, 0xcdd7, 0x32314d48, 0x0, 0x0, 0xff, 0x0, 0xd00e}}) fstat(0xffffffffffffffff, &(0x7f00000006c0)) getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, &(0x7f0000000440)={0x0, 0x80}, &(0x7f00000001c0)=0xfffffffffffffd3f) ioctl$FICLONE(r1, 0x40049409, r3) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, 0x0) 14:19:12 executing program 0: r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/expire_quiescent_template\x00', 0x2, 0x0) r1 = syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x1, 0x0) accept$inet6(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000080)=0x1c) ioctl(r1, 0xffffffffffffffb7, &(0x7f0000000080)) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000140)=@security={'security\x00', 0xe, 0x4, 0x4e0, 0x1f0, 0x320, 0x0, 0x320, 0x320, 0x438, 0x438, 0x438, 0x438, 0x438, 0x4, &(0x7f0000000100), {[{{@ipv6={@local, @local, [0x0, 0xffffff00, 0xffffffff, 0xffffff00], [0xffffffff, 0xff, 0xffffffff, 0xff], 'eql\x00', 'gretap0\x00', {}, {0xff}, 0x0, 0x7fffffff, 0x2, 0x61}, 0x0, 0x188, 0x1c8, 0x0, {}, [@common=@unspec=@conntrack2={0xc0, 'conntrack\x00', 0x2, {{@ipv4=@loopback, [0xffffffff, 0xffffffff, 0x0, 0xffffffff], @ipv4=@loopback, [0x0, 0xffffffff, 0xffffff00, 0xff000000], @ipv6=@ipv4={[], [], @remote}, [0xffffff00, 0xff000000, 0xff000000, 0xff], @ipv4=@multicast2, [0xffffffff, 0xff, 0xff0000ff], 0x3, 0x1ff, 0x4, 0x4e21, 0x4e20, 0x4e22, 0x4e20, 0x28, 0x20}, 0x1c0, 0x98}}]}, @common=@unspec=@ERROR={0x40, 'ERROR\x00', 0x0, "f650bd5c77822a55c077a2b3078812467f4ab9fefc372cf333baff203cdb"}}, {{@ipv6={@remote, @mcast2, [0xff000000, 0xffffff00, 0xffffffff, 0xff000000], [0x0, 0xff, 0xff000000, 0xffffff00], 'syzkaller0\x00', 'lo\x00', {}, {0xff}, 0x2b, 0x1, 0x2, 0x23}, 0x0, 0xf0, 0x130, 0x0, {}, [@common=@hl={0x28, 'hl\x00'}]}, @common=@inet=@TCPOPTSTRIP={0x40, 'TCPOPTSTRIP\x00', 0x0, {[0xe08d, 0x6, 0xff, 0x800, 0x2, 0x7, 0x3, 0x5]}}}, {{@uncond, 0x0, 0xf0, 0x118, 0x0, {}, [@common=@hl={0x28, 'hl\x00', 0x0, {0x3, 0x604}}]}, @common=@unspec=@STANDARD={0x28, '\x00', 0x0, 0xfffffffffffffffd}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x540) ioctl$EXT4_IOC_MIGRATE(0xffffffffffffffff, 0x6609) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000300)={0x0}, &(0x7f0000000400)=0xc) getsockopt$ARPT_SO_GET_INFO(r0, 0x0, 0x60, &(0x7f0000000740)={'filter\x00'}, &(0x7f00000007c0)=0x44) r3 = getpgrp(r2) prlimit64(r3, 0x0, &(0x7f00000004c0)={0x0, 0x7ffffd}, &(0x7f00000002c0)) lremovexattr(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000480)=@random={'trusted.', 'bpf\x00'}) [ 2737.899203] hfs: can't find a HFS filesystem on dev loop2 14:19:12 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x3, &(0x7f0000001fd8)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x15}}, &(0x7f0000000080)="47504c049c3514bf772da07ae82e76590a36f6493ec1ab91b397e42abf1ea6cd8cd77427fc9a9e2b7165f52b4107bf0850d899dc52d013175ddb1b2f46203c2a05b722e33e556fb2e3f39a3cde1fca53640337ec956146bdbfcb115070195631de5d21a5ea9e638c2bdb78a501ca4b6ea313d82568f9382c2c3f6faba6b4ee54793b4ed26dae3e52225029bb2ac0007f77754c3f23ceda9809b9a9684a940abcaa8cfcc7133ec422e9c83888318d41e9a493f0195fe2599651b89504f5dba14625ce2366f33d95dba92f867279cabf4aceddc85a8af7a0fa68d767ce5136b9d0d1966c499cb6bf34c2988666970000000000000000000000", 0x0, 0xa00}, 0x48) 14:19:12 executing program 2: getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) syz_mount_image$hfs(&(0x7f0000000200)='hfs\x00', &(0x7f0000000280)='./file0\x00', 0xf5ffffff00000000, 0x0, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) [ 2737.994637] gfs2: invalid mount option: fowner<00000000000000000000 14:19:12 executing program 0: r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/expire_quiescent_template\x00', 0x2, 0x0) r1 = syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x1, 0x0) accept$inet6(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000080)=0x1c) ioctl(r1, 0xffffffffffffffb7, &(0x7f0000000080)) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000140)=@security={'security\x00', 0xe, 0x4, 0x4e0, 0x1f0, 0x320, 0x0, 0x320, 0x320, 0x438, 0x438, 0x438, 0x438, 0x438, 0x4, &(0x7f0000000100), {[{{@ipv6={@local, @local, [0x0, 0xffffff00, 0xffffffff, 0xffffff00], [0xffffffff, 0xff, 0xffffffff, 0xff], 'eql\x00', 'gretap0\x00', {}, {0xff}, 0x0, 0x7fffffff, 0x2, 0x61}, 0x0, 0x188, 0x1c8, 0x0, {}, [@common=@unspec=@conntrack2={0xc0, 'conntrack\x00', 0x2, {{@ipv4=@loopback, [0xffffffff, 0xffffffff, 0x0, 0xffffffff], @ipv4=@loopback, [0x0, 0xffffffff, 0xffffff00, 0xff000000], @ipv6=@ipv4={[], [], @remote}, [0xffffff00, 0xff000000, 0xff000000, 0xff], @ipv4=@multicast2, [0xffffffff, 0xff, 0xff0000ff], 0x3, 0x1ff, 0x4, 0x4e21, 0x4e20, 0x4e22, 0x4e20, 0x28, 0x20}, 0x1c0, 0x98}}]}, @common=@unspec=@ERROR={0x40, 'ERROR\x00', 0x0, "f650bd5c77822a55c077a2b3078812467f4ab9fefc372cf333baff203cdb"}}, {{@ipv6={@remote, @mcast2, [0xff000000, 0xffffff00, 0xffffffff, 0xff000000], [0x0, 0xff, 0xff000000, 0xffffff00], 'syzkaller0\x00', 'lo\x00', {}, {0xff}, 0x2b, 0x1, 0x2, 0x23}, 0x0, 0xf0, 0x130, 0x0, {}, [@common=@hl={0x28, 'hl\x00'}]}, @common=@inet=@TCPOPTSTRIP={0x40, 'TCPOPTSTRIP\x00', 0x0, {[0xe08d, 0x6, 0xff, 0x800, 0x2, 0x7, 0x3, 0x5]}}}, {{@uncond, 0x0, 0xf0, 0x118, 0x0, {}, [@common=@hl={0x28, 'hl\x00', 0x0, {0x3, 0x604}}]}, @common=@unspec=@STANDARD={0x28, '\x00', 0x0, 0xfffffffffffffffd}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x540) ioctl$EXT4_IOC_MIGRATE(0xffffffffffffffff, 0x6609) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000300)={0x0}, &(0x7f0000000400)=0xc) getsockopt$ARPT_SO_GET_INFO(r0, 0x0, 0x60, &(0x7f0000000740)={'filter\x00'}, &(0x7f00000007c0)=0x44) r3 = getpgrp(r2) prlimit64(r3, 0x0, &(0x7f00000004c0)={0x0, 0x7ffffd}, &(0x7f00000002c0)) [ 2738.141314] gfs2: can't parse mount arguments [ 2738.185751] hfs: can't find a HFS filesystem on dev loop2 14:19:13 executing program 0: r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/expire_quiescent_template\x00', 0x2, 0x0) r1 = syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x1, 0x0) accept$inet6(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000080)=0x1c) ioctl(r1, 0xffffffffffffffb7, &(0x7f0000000080)) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000140)=@security={'security\x00', 0xe, 0x4, 0x4e0, 0x1f0, 0x320, 0x0, 0x320, 0x320, 0x438, 0x438, 0x438, 0x438, 0x438, 0x4, &(0x7f0000000100), {[{{@ipv6={@local, @local, [0x0, 0xffffff00, 0xffffffff, 0xffffff00], [0xffffffff, 0xff, 0xffffffff, 0xff], 'eql\x00', 'gretap0\x00', {}, {0xff}, 0x0, 0x7fffffff, 0x2, 0x61}, 0x0, 0x188, 0x1c8, 0x0, {}, [@common=@unspec=@conntrack2={0xc0, 'conntrack\x00', 0x2, {{@ipv4=@loopback, [0xffffffff, 0xffffffff, 0x0, 0xffffffff], @ipv4=@loopback, [0x0, 0xffffffff, 0xffffff00, 0xff000000], @ipv6=@ipv4={[], [], @remote}, [0xffffff00, 0xff000000, 0xff000000, 0xff], @ipv4=@multicast2, [0xffffffff, 0xff, 0xff0000ff], 0x3, 0x1ff, 0x4, 0x4e21, 0x4e20, 0x4e22, 0x4e20, 0x28, 0x20}, 0x1c0, 0x98}}]}, @common=@unspec=@ERROR={0x40, 'ERROR\x00', 0x0, "f650bd5c77822a55c077a2b3078812467f4ab9fefc372cf333baff203cdb"}}, {{@ipv6={@remote, @mcast2, [0xff000000, 0xffffff00, 0xffffffff, 0xff000000], [0x0, 0xff, 0xff000000, 0xffffff00], 'syzkaller0\x00', 'lo\x00', {}, {0xff}, 0x2b, 0x1, 0x2, 0x23}, 0x0, 0xf0, 0x130, 0x0, {}, [@common=@hl={0x28, 'hl\x00'}]}, @common=@inet=@TCPOPTSTRIP={0x40, 'TCPOPTSTRIP\x00', 0x0, {[0xe08d, 0x6, 0xff, 0x800, 0x2, 0x7, 0x3, 0x5]}}}, {{@uncond, 0x0, 0xf0, 0x118, 0x0, {}, [@common=@hl={0x28, 'hl\x00', 0x0, {0x3, 0x604}}]}, @common=@unspec=@STANDARD={0x28, '\x00', 0x0, 0xfffffffffffffffd}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x540) ioctl$EXT4_IOC_MIGRATE(0xffffffffffffffff, 0x6609) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000300)={0x0}, &(0x7f0000000400)=0xc) getsockopt$ARPT_SO_GET_INFO(r0, 0x0, 0x60, &(0x7f0000000740)={'filter\x00'}, &(0x7f00000007c0)=0x44) getpgrp(r2) 14:19:13 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x3, &(0x7f0000001fd8)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x15}}, &(0x7f0000000080)="47504c049c3514bf772da07ae82e76590a36f6493ec1ab91b397e42abf1ea6cd8cd77427fc9a9e2b7165f52b4107bf0850d899dc52d013175ddb1b2f46203c2a05b722e33e556fb2e3f39a3cde1fca53640337ec956146bdbfcb115070195631de5d21a5ea9e638c2bdb78a501ca4b6ea313d82568f9382c2c3f6faba6b4ee54793b4ed26dae3e52225029bb2ac0007f77754c3f23ceda9809b9a9684a940abcaa8cfcc7133ec422e9c83888318d41e9a493f0195fe2599651b89504f5dba14625ce2366f33d95dba92f867279cabf4aceddc85a8af7a0fa68d767ce5136b9d0d1966c499cb6bf34c2988666970000000000000000000000", 0x0, 0x7}, 0x48) 14:19:13 executing program 3: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000440)={[{@quota_off='quota=off'}, {@noloccookie='noloccookie'}, {@quota_quantum={'quota_quantum', 0x3d, 0x7fffffff}}, {@rgrplvb='rgrplvb'}, {@rgrplvb='rgrplvb'}], [{@smackfshat={'smackfshat', 0x3d, "7db3706f7369785f61636c5f6163636573732e"}}, {@fowner_lt={'fowner<'}}, {@smackfsroot={'smackfsroot'}}, {@fsuuid={'fsuuid', 0x3d, {[0x62, 0x7d, 0x32, 0x66, 0x32, 0x38, 0x77, 0x77], 0x2d, [0x37, 0x38, 0x77, 0x77], 0x2d, [0x66, 0x62, 0x73, 0x7d], 0x2d, [0x33, 0x36, 0x67, 0x30], 0x2d, [0x36, 0x63, 0x67, 0x54a07f1fb49ecd59, 0x38, 0x77, 0x77, 0x7f]}}}, {@fowner_lt={'fowner<'}}, {@obj_user={'obj_user', 0x3d, 'self^md5sum'}}, {@smackfstransmute={'smackfstransmute', 0x3d, '[-/em0'}}, {@obj_type={'obj_type', 0x3d, '\':/{vboxnet1em0selinuxsecurityvmnet1.'}}]}) 14:19:13 executing program 2: getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) syz_mount_image$hfs(&(0x7f0000000200)='hfs\x00', &(0x7f0000000280)='./file0\x00', 0x800000000000000, 0x0, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) [ 2738.347579] EXT4-fs (sda1): re-mounted. Opts: [ 2738.504451] EXT4-fs (sda1): Unrecognized mount option "./file0" or missing value [ 2738.518620] gfs2: invalid mount option: fowner<00000000000000000000 [ 2738.553383] gfs2: can't parse mount arguments 14:19:13 executing program 1: r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/expire_quiescent_template\x00', 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000140)=@security={'security\x00', 0xe, 0x4, 0x4e0, 0x1f0, 0x320, 0x0, 0x320, 0x320, 0x438, 0x438, 0x438, 0x438, 0x438, 0x4, &(0x7f0000000100), {[{{@ipv6={@local, @local, [0x0, 0xffffff00, 0xffffffff, 0xffffff00], [0xffffffff, 0xff, 0xffffffff, 0xff], 'eql\x00', 'gretap0\x00', {}, {0xff}, 0x0, 0x7fffffff, 0x2, 0x61}, 0x0, 0x188, 0x1c8, 0x0, {}, [@common=@unspec=@conntrack2={0xc0, 'conntrack\x00', 0x2, {{@ipv4=@loopback, [0xffffffff, 0xffffffff, 0x0, 0xffffffff], @ipv4=@loopback, [0x0, 0xffffffff, 0xffffff00, 0xff000000], @ipv6=@ipv4={[], [], @remote}, [0xffffff00, 0xff000000, 0xff000000, 0xff], @ipv4=@multicast2, [0xffffffff, 0xff, 0xff0000ff], 0x3, 0x1ff, 0x4, 0x4e21, 0x4e20, 0x4e22, 0x4e20, 0x28, 0x20}, 0x1c0, 0x98}}]}, @common=@unspec=@ERROR={0x40, 'ERROR\x00', 0x0, "f650bd5c77822a55c077a2b3078812467f4ab9fefc372cf333baff203cdb"}}, {{@ipv6={@remote, @mcast2, [0xff000000, 0xffffff00, 0xffffffff, 0xff000000], [0x0, 0xff, 0xff000000, 0xffffff00], 'syzkaller0\x00', 'lo\x00', {}, {0xff}, 0x2b, 0x1, 0x2, 0x23}, 0x0, 0xf0, 0x130, 0x0, {}, [@common=@hl={0x28, 'hl\x00'}]}, @common=@inet=@TCPOPTSTRIP={0x40, 'TCPOPTSTRIP\x00', 0x0, {[0xe08d, 0x6, 0xff, 0x800, 0x2, 0x7, 0x3, 0x5]}}}, {{@uncond, 0x0, 0xf0, 0x118, 0x0, {}, [@common=@hl={0x28, 'hl\x00', 0x0, {0x3, 0x604}}]}, @common=@unspec=@STANDARD={0x28, '\x00', 0x0, 0xfffffffffffffffd}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x540) ioctl$EXT4_IOC_MIGRATE(0xffffffffffffffff, 0x6609) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000300)={0x0}, &(0x7f0000000400)=0xc) getsockopt$ARPT_SO_GET_INFO(r0, 0x0, 0x60, &(0x7f0000000740)={'filter\x00'}, &(0x7f00000007c0)=0x44) r3 = getpgrp(r2) prlimit64(r3, 0x0, &(0x7f00000004c0)={0x0, 0x7ffffd}, &(0x7f00000002c0)) lremovexattr(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000480)=@random={'trusted.', 'bpf\x00'}) getsockopt$inet_sctp_SCTP_PR_ASSOC_STATUS(0xffffffffffffffff, 0x84, 0x73, &(0x7f0000000280)={0x0, 0x8, 0x0, 0xe0}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r4 = syz_open_dev$amidi(&(0x7f0000000100)='/dev/amidi#\x00', 0x2, 0x800) recvfrom(r4, &(0x7f0000000500)=""/96, 0x60, 0x20, &(0x7f00000005c0)=@ipx={0x4, 0x1, 0x6, "6b183128f377"}, 0x80) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000200)='./file0\x00', 0x700, 0x0, &(0x7f00000024c0), 0x100032, &(0x7f00000000c0)=ANY=[@ANYBLOB]) prctl$PR_MPX_ENABLE_MANAGEMENT(0x2b) getsockopt$inet_dccp_int(0xffffffffffffffff, 0x21, 0xf, &(0x7f0000000240), 0x0) fstat(0xffffffffffffffff, &(0x7f00000006c0)) getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, &(0x7f0000000440)={0x0, 0x80}, &(0x7f00000001c0)=0xfffffffffffffd3f) ioctl$FICLONE(r1, 0x40049409, r4) ioctl$sock_netdev_private(r4, 0x89f8, &(0x7f0000000800)="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") setgroups(0x3, &(0x7f0000000340)=[0x0, 0x0, 0x0]) setsockopt$netlink_NETLINK_BROADCAST_ERROR(r0, 0x10e, 0x4, &(0x7f0000000680)=0x7, 0x4) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, 0x0) 14:19:13 executing program 4: r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/expire_quiescent_template\x00', 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000140)=@security={'security\x00', 0xe, 0x4, 0x4b8, 0x1f0, 0x320, 0x0, 0x320, 0x320, 0x438, 0x438, 0x438, 0x438, 0x438, 0x4, &(0x7f0000000100), {[{{@ipv6={@local, @local, [0x0, 0x0, 0xffffffff, 0xffffff00], [0xffffffff, 0xff, 0xffffffff, 0xff], 'eql\x00', 'gretap0\x00', {}, {0xff}, 0x0, 0x7fffffff, 0x2, 0x61}, 0x0, 0x188, 0x1c8, 0x0, {}, [@common=@unspec=@conntrack2={0xc0, 'conntrack\x00', 0x2, {{@ipv4=@loopback, [0xffffffff, 0xffffffff, 0x0, 0xffffffff], @ipv4=@loopback, [0x0, 0xffffffff, 0xffffff00, 0xff000000], @ipv6=@ipv4={[], [], @remote}, [0xffffff00, 0xff000000, 0xff000000, 0xff], @ipv4=@multicast2, [0xffffffff, 0xff, 0xff0000ff], 0x3, 0x1ff, 0x4, 0x4e21, 0x4e20, 0x4e22, 0x4e20, 0x28}, 0x1c0, 0x98}}]}, @common=@unspec=@ERROR={0x40, 'ERROR\x00', 0x0, "f650bd5c77822a55c077a2b3078812467f4ab9fefc372cf333baff203cdb"}}, {{@ipv6={@remote, @mcast2, [0xff000000, 0xffffff00, 0xffffffff, 0xff000000], [0x0, 0xff, 0xff000000, 0xffffff00], 'syzkaller0\x00', 'lo\x00', {}, {}, 0x2b, 0x1, 0x2, 0x23}, 0x0, 0xc8, 0x108}, @common=@inet=@TCPOPTSTRIP={0x40, 'TCPOPTSTRIP\x00', 0x0, {[0xe08d, 0x6, 0xff, 0x800, 0x2, 0x7, 0x0, 0x5]}}}, {{@uncond, 0x0, 0xf0, 0x118, 0x0, {}, [@common=@hl={0x28, 'hl\x00', 0x0, {0x3, 0x604}}]}, @common=@unspec=@STANDARD={0x28, '\x00', 0x0, 0xfffffffffffffffd}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x518) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = getpgrp(0x0) prlimit64(r2, 0x0, &(0x7f00000004c0)={0x0, 0x7ffffd}, &(0x7f00000002c0)) lremovexattr(0x0, &(0x7f0000000480)=@random={'trusted.', 'bpf\x00'}) getsockopt$inet_sctp_SCTP_PR_ASSOC_STATUS(0xffffffffffffffff, 0x84, 0x73, &(0x7f0000000280), 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r3 = syz_open_dev$amidi(&(0x7f0000000100)='/dev/amidi#\x00', 0x2, 0x800) recvfrom(0xffffffffffffffff, 0x0, 0x0, 0x20, &(0x7f00000005c0)=@ipx={0x4, 0x1, 0x6, "6b183128f377"}, 0x80) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000680)='./file0\x00', 0x2000000000000000, 0x0, &(0x7f00000024c0), 0x100032, &(0x7f0000000780)=ANY=[@ANYBLOB]) getsockopt$inet_dccp_int(0xffffffffffffffff, 0x21, 0xf, &(0x7f0000000240), 0x0) fstat(0xffffffffffffffff, &(0x7f00000006c0)) getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, &(0x7f0000000440)={0x0, 0x80}, &(0x7f00000001c0)=0xfffffffffffffd3f) ioctl$FICLONE(r1, 0x40049409, r3) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, 0x0) 14:19:13 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x3, &(0x7f0000001fd8)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x15}}, &(0x7f0000000080)="47504c049c3514bf772da07ae82e76590a36f6493ec1ab91b397e42abf1ea6cd8cd77427fc9a9e2b7165f52b4107bf0850d899dc52d013175ddb1b2f46203c2a05b722e33e556fb2e3f39a3cde1fca53640337ec956146bdbfcb115070195631de5d21a5ea9e638c2bdb78a501ca4b6ea313d82568f9382c2c3f6faba6b4ee54793b4ed26dae3e52225029bb2ac0007f77754c3f23ceda9809b9a9684a940abcaa8cfcc7133ec422e9c83888318d41e9a493f0195fe2599651b89504f5dba14625ce2366f33d95dba92f867279cabf4aceddc85a8af7a0fa68d767ce5136b9d0d1966c499cb6bf34c2988666970000000000000000000000", 0x0, 0x4000000000000000}, 0x48) 14:19:13 executing program 0: r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/expire_quiescent_template\x00', 0x2, 0x0) r1 = syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x1, 0x0) accept$inet6(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000080)=0x1c) ioctl(r1, 0xffffffffffffffb7, &(0x7f0000000080)) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000140)=@security={'security\x00', 0xe, 0x4, 0x4e0, 0x1f0, 0x320, 0x0, 0x320, 0x320, 0x438, 0x438, 0x438, 0x438, 0x438, 0x4, &(0x7f0000000100), {[{{@ipv6={@local, @local, [0x0, 0xffffff00, 0xffffffff, 0xffffff00], [0xffffffff, 0xff, 0xffffffff, 0xff], 'eql\x00', 'gretap0\x00', {}, {0xff}, 0x0, 0x7fffffff, 0x2, 0x61}, 0x0, 0x188, 0x1c8, 0x0, {}, [@common=@unspec=@conntrack2={0xc0, 'conntrack\x00', 0x2, {{@ipv4=@loopback, [0xffffffff, 0xffffffff, 0x0, 0xffffffff], @ipv4=@loopback, [0x0, 0xffffffff, 0xffffff00, 0xff000000], @ipv6=@ipv4={[], [], @remote}, [0xffffff00, 0xff000000, 0xff000000, 0xff], @ipv4=@multicast2, [0xffffffff, 0xff, 0xff0000ff], 0x3, 0x1ff, 0x4, 0x4e21, 0x4e20, 0x4e22, 0x4e20, 0x28, 0x20}, 0x1c0, 0x98}}]}, @common=@unspec=@ERROR={0x40, 'ERROR\x00', 0x0, "f650bd5c77822a55c077a2b3078812467f4ab9fefc372cf333baff203cdb"}}, {{@ipv6={@remote, @mcast2, [0xff000000, 0xffffff00, 0xffffffff, 0xff000000], [0x0, 0xff, 0xff000000, 0xffffff00], 'syzkaller0\x00', 'lo\x00', {}, {0xff}, 0x2b, 0x1, 0x2, 0x23}, 0x0, 0xf0, 0x130, 0x0, {}, [@common=@hl={0x28, 'hl\x00'}]}, @common=@inet=@TCPOPTSTRIP={0x40, 'TCPOPTSTRIP\x00', 0x0, {[0xe08d, 0x6, 0xff, 0x800, 0x2, 0x7, 0x3, 0x5]}}}, {{@uncond, 0x0, 0xf0, 0x118, 0x0, {}, [@common=@hl={0x28, 'hl\x00', 0x0, {0x3, 0x604}}]}, @common=@unspec=@STANDARD={0x28, '\x00', 0x0, 0xfffffffffffffffd}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x540) ioctl$EXT4_IOC_MIGRATE(0xffffffffffffffff, 0x6609) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000300), &(0x7f0000000400)=0xc) getsockopt$ARPT_SO_GET_INFO(r0, 0x0, 0x60, &(0x7f0000000740)={'filter\x00'}, &(0x7f00000007c0)=0x44) [ 2738.593038] hfs: can't find a HFS filesystem on dev loop2 [ 2738.674682] hfs: can't find a HFS filesystem on dev loop2 14:19:13 executing program 3: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 14:19:13 executing program 0: r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/expire_quiescent_template\x00', 0x2, 0x0) r1 = syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x1, 0x0) accept$inet6(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000080)=0x1c) ioctl(r1, 0xffffffffffffffb7, &(0x7f0000000080)) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000140)=@security={'security\x00', 0xe, 0x4, 0x4e0, 0x1f0, 0x320, 0x0, 0x320, 0x320, 0x438, 0x438, 0x438, 0x438, 0x438, 0x4, &(0x7f0000000100), {[{{@ipv6={@local, @local, [0x0, 0xffffff00, 0xffffffff, 0xffffff00], [0xffffffff, 0xff, 0xffffffff, 0xff], 'eql\x00', 'gretap0\x00', {}, {0xff}, 0x0, 0x7fffffff, 0x2, 0x61}, 0x0, 0x188, 0x1c8, 0x0, {}, [@common=@unspec=@conntrack2={0xc0, 'conntrack\x00', 0x2, {{@ipv4=@loopback, [0xffffffff, 0xffffffff, 0x0, 0xffffffff], @ipv4=@loopback, [0x0, 0xffffffff, 0xffffff00, 0xff000000], @ipv6=@ipv4={[], [], @remote}, [0xffffff00, 0xff000000, 0xff000000, 0xff], @ipv4=@multicast2, [0xffffffff, 0xff, 0xff0000ff], 0x3, 0x1ff, 0x4, 0x4e21, 0x4e20, 0x4e22, 0x4e20, 0x28, 0x20}, 0x1c0, 0x98}}]}, @common=@unspec=@ERROR={0x40, 'ERROR\x00', 0x0, "f650bd5c77822a55c077a2b3078812467f4ab9fefc372cf333baff203cdb"}}, {{@ipv6={@remote, @mcast2, [0xff000000, 0xffffff00, 0xffffffff, 0xff000000], [0x0, 0xff, 0xff000000, 0xffffff00], 'syzkaller0\x00', 'lo\x00', {}, {0xff}, 0x2b, 0x1, 0x2, 0x23}, 0x0, 0xf0, 0x130, 0x0, {}, [@common=@hl={0x28, 'hl\x00'}]}, @common=@inet=@TCPOPTSTRIP={0x40, 'TCPOPTSTRIP\x00', 0x0, {[0xe08d, 0x6, 0xff, 0x800, 0x2, 0x7, 0x3, 0x5]}}}, {{@uncond, 0x0, 0xf0, 0x118, 0x0, {}, [@common=@hl={0x28, 'hl\x00', 0x0, {0x3, 0x604}}]}, @common=@unspec=@STANDARD={0x28, '\x00', 0x0, 0xfffffffffffffffd}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x540) ioctl$EXT4_IOC_MIGRATE(0xffffffffffffffff, 0x6609) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000300), &(0x7f0000000400)=0xc) 14:19:13 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x3, &(0x7f0000001fd8)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x15}}, &(0x7f0000000080)="47504c049c3514bf772da07ae82e76590a36f6493ec1ab91b397e42abf1ea6cd8cd77427fc9a9e2b7165f52b4107bf0850d899dc52d013175ddb1b2f46203c2a05b722e33e556fb2e3f39a3cde1fca53640337ec956146bdbfcb115070195631de5d21a5ea9e638c2bdb78a501ca4b6ea313d82568f9382c2c3f6faba6b4ee54793b4ed26dae3e52225029bb2ac0007f77754c3f23ceda9809b9a9684a940abcaa8cfcc7133ec422e9c83888318d41e9a493f0195fe2599651b89504f5dba14625ce2366f33d95dba92f867279cabf4aceddc85a8af7a0fa68d767ce5136b9d0d1966c499cb6bf34c2988666970000000000000000000000", 0x0, 0x3f000000}, 0x48) 14:19:13 executing program 2: getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) syz_mount_image$hfs(&(0x7f0000000200)='hfs\x00', &(0x7f0000000280)='./file0\x00', 0x97ffffff00000000, 0x0, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) [ 2738.878151] gfs2: not a GFS2 filesystem 14:19:13 executing program 0: r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/expire_quiescent_template\x00', 0x2, 0x0) r1 = syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x1, 0x0) accept$inet6(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000080)=0x1c) ioctl(r1, 0xffffffffffffffb7, &(0x7f0000000080)) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000140)=@security={'security\x00', 0xe, 0x4, 0x4e0, 0x1f0, 0x320, 0x0, 0x320, 0x320, 0x438, 0x438, 0x438, 0x438, 0x438, 0x4, &(0x7f0000000100), {[{{@ipv6={@local, @local, [0x0, 0xffffff00, 0xffffffff, 0xffffff00], [0xffffffff, 0xff, 0xffffffff, 0xff], 'eql\x00', 'gretap0\x00', {}, {0xff}, 0x0, 0x7fffffff, 0x2, 0x61}, 0x0, 0x188, 0x1c8, 0x0, {}, [@common=@unspec=@conntrack2={0xc0, 'conntrack\x00', 0x2, {{@ipv4=@loopback, [0xffffffff, 0xffffffff, 0x0, 0xffffffff], @ipv4=@loopback, [0x0, 0xffffffff, 0xffffff00, 0xff000000], @ipv6=@ipv4={[], [], @remote}, [0xffffff00, 0xff000000, 0xff000000, 0xff], @ipv4=@multicast2, [0xffffffff, 0xff, 0xff0000ff], 0x3, 0x1ff, 0x4, 0x4e21, 0x4e20, 0x4e22, 0x4e20, 0x28, 0x20}, 0x1c0, 0x98}}]}, @common=@unspec=@ERROR={0x40, 'ERROR\x00', 0x0, "f650bd5c77822a55c077a2b3078812467f4ab9fefc372cf333baff203cdb"}}, {{@ipv6={@remote, @mcast2, [0xff000000, 0xffffff00, 0xffffffff, 0xff000000], [0x0, 0xff, 0xff000000, 0xffffff00], 'syzkaller0\x00', 'lo\x00', {}, {0xff}, 0x2b, 0x1, 0x2, 0x23}, 0x0, 0xf0, 0x130, 0x0, {}, [@common=@hl={0x28, 'hl\x00'}]}, @common=@inet=@TCPOPTSTRIP={0x40, 'TCPOPTSTRIP\x00', 0x0, {[0xe08d, 0x6, 0xff, 0x800, 0x2, 0x7, 0x3, 0x5]}}}, {{@uncond, 0x0, 0xf0, 0x118, 0x0, {}, [@common=@hl={0x28, 'hl\x00', 0x0, {0x3, 0x604}}]}, @common=@unspec=@STANDARD={0x28, '\x00', 0x0, 0xfffffffffffffffd}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x540) ioctl$EXT4_IOC_MIGRATE(0xffffffffffffffff, 0x6609) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 14:19:13 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x3, &(0x7f0000001fd8)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x15}}, &(0x7f0000000080)="47504c049c3514bf772da07ae82e76590a36f6493ec1ab91b397e42abf1ea6cd8cd77427fc9a9e2b7165f52b4107bf0850d899dc52d013175ddb1b2f46203c2a05b722e33e556fb2e3f39a3cde1fca53640337ec956146bdbfcb115070195631de5d21a5ea9e638c2bdb78a501ca4b6ea313d82568f9382c2c3f6faba6b4ee54793b4ed26dae3e52225029bb2ac0007f77754c3f23ceda9809b9a9684a940abcaa8cfcc7133ec422e9c83888318d41e9a493f0195fe2599651b89504f5dba14625ce2366f33d95dba92f867279cabf4aceddc85a8af7a0fa68d767ce5136b9d0d1966c499cb6bf34c2988666970000000000000000000000", 0x0, 0x80ffffff}, 0x48) [ 2738.988027] EXT4-fs (sda1): re-mounted. Opts: ,errors=continue [ 2739.023335] hfs: can't find a HFS filesystem on dev loop2 [ 2739.045100] EXT4-fs (sda1): re-mounted. Opts: 14:19:13 executing program 3: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) [ 2739.124036] hfs: can't find a HFS filesystem on dev loop2 [ 2739.131573] EXT4-fs (sda1): Unrecognized mount option "./file0" or missing value 14:19:14 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x3, &(0x7f0000001fd8)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x15}}, &(0x7f0000000080)="47504c049c3514bf772da07ae82e76590a36f6493ec1ab91b397e42abf1ea6cd8cd77427fc9a9e2b7165f52b4107bf0850d899dc52d013175ddb1b2f46203c2a05b722e33e556fb2e3f39a3cde1fca53640337ec956146bdbfcb115070195631de5d21a5ea9e638c2bdb78a501ca4b6ea313d82568f9382c2c3f6faba6b4ee54793b4ed26dae3e52225029bb2ac0007f77754c3f23ceda9809b9a9684a940abcaa8cfcc7133ec422e9c83888318d41e9a493f0195fe2599651b89504f5dba14625ce2366f33d95dba92f867279cabf4aceddc85a8af7a0fa68d767ce5136b9d0d1966c499cb6bf34c2988666970000000000000000000000", 0x0, 0x1c}, 0x48) [ 2739.302038] gfs2: not a GFS2 filesystem 14:19:14 executing program 1: r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/expire_quiescent_template\x00', 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000140)=@security={'security\x00', 0xe, 0x4, 0x4e0, 0x1f0, 0x320, 0x0, 0x320, 0x320, 0x438, 0x438, 0x438, 0x438, 0x438, 0x4, &(0x7f0000000100), {[{{@ipv6={@local, @local, [0x0, 0xffffff00, 0xffffffff, 0xffffff00], [0xffffffff, 0xff, 0xffffffff, 0xff], 'eql\x00', 'gretap0\x00', {}, {0xff}, 0x0, 0x7fffffff, 0x2, 0x61}, 0x0, 0x188, 0x1c8, 0x0, {}, [@common=@unspec=@conntrack2={0xc0, 'conntrack\x00', 0x2, {{@ipv4=@loopback, [0xffffffff, 0xffffffff, 0x0, 0xffffffff], @ipv4=@loopback, [0x0, 0xffffffff, 0xffffff00, 0xff000000], @ipv6=@ipv4={[], [], @remote}, [0xffffff00, 0xff000000, 0xff000000, 0xff], @ipv4=@multicast2, [0xffffffff, 0xff, 0xff0000ff], 0x3, 0x1ff, 0x4, 0x4e21, 0x4e20, 0x4e22, 0x4e20, 0x28, 0x20}, 0x1c0, 0x98}}]}, @common=@unspec=@ERROR={0x40, 'ERROR\x00', 0x0, "f650bd5c77822a55c077a2b3078812467f4ab9fefc372cf333baff203cdb"}}, {{@ipv6={@remote, @mcast2, [0xff000000, 0xffffff00, 0xffffffff, 0xff000000], [0x0, 0xff, 0xff000000, 0xffffff00], 'syzkaller0\x00', 'lo\x00', {}, {0xff}, 0x2b, 0x1, 0x2, 0x23}, 0x0, 0xf0, 0x130, 0x0, {}, [@common=@hl={0x28, 'hl\x00'}]}, @common=@inet=@TCPOPTSTRIP={0x40, 'TCPOPTSTRIP\x00', 0x0, {[0xe08d, 0x6, 0xff, 0x800, 0x2, 0x7, 0x3, 0x5]}}}, {{@uncond, 0x0, 0xf0, 0x118, 0x0, {}, [@common=@hl={0x28, 'hl\x00', 0x0, {0x3, 0x604}}]}, @common=@unspec=@STANDARD={0x28, '\x00', 0x0, 0xfffffffffffffffd}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x540) ioctl$EXT4_IOC_MIGRATE(0xffffffffffffffff, 0x6609) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000300)={0x0}, &(0x7f0000000400)=0xc) getsockopt$ARPT_SO_GET_INFO(r0, 0x0, 0x60, &(0x7f0000000740)={'filter\x00'}, &(0x7f00000007c0)=0x44) r3 = getpgrp(r2) prlimit64(r3, 0x0, &(0x7f00000004c0)={0x0, 0x7ffffd}, &(0x7f00000002c0)) lremovexattr(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000480)=ANY=[@ANYBLOB="747275737465640e62708700"]) getsockopt$inet_sctp_SCTP_PR_ASSOC_STATUS(0xffffffffffffffff, 0x84, 0x73, &(0x7f0000000280)={0x0, 0x8, 0x0, 0xe0}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r4 = syz_open_dev$amidi(&(0x7f0000000100)='/dev/amidi#\x00', 0x2, 0x800) recvfrom(r4, &(0x7f0000000500)=""/96, 0x60, 0x20, &(0x7f00000005c0)=@ipx={0x4, 0x1, 0x6, "6b183128f377"}, 0x80) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000200)='./file0\x00', 0x700, 0x0, &(0x7f00000024c0), 0x100032, &(0x7f00000000c0)=ANY=[@ANYBLOB]) prctl$PR_MPX_ENABLE_MANAGEMENT(0x2b) getsockopt$inet_dccp_int(0xffffffffffffffff, 0x21, 0xf, &(0x7f0000000240), 0x0) fstat(0xffffffffffffffff, &(0x7f00000006c0)) getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, &(0x7f0000000440)={0x0, 0x80}, &(0x7f00000001c0)=0xfffffffffffffd3f) ioctl$FICLONE(r1, 0x40049409, r4) setgroups(0x3, &(0x7f0000000340)=[0x0, 0x0, 0x0]) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, 0x0) 14:19:14 executing program 4: r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/expire_quiescent_template\x00', 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000140)=@security={'security\x00', 0xe, 0x4, 0x4b8, 0x1f0, 0x320, 0x0, 0x320, 0x320, 0x438, 0x438, 0x438, 0x438, 0x438, 0x4, &(0x7f0000000100), {[{{@ipv6={@local, @local, [0x0, 0x0, 0xffffffff, 0xffffff00], [0xffffffff, 0xff, 0xffffffff, 0xff], 'eql\x00', 'gretap0\x00', {}, {0xff}, 0x0, 0x7fffffff, 0x2, 0x61}, 0x0, 0x188, 0x1c8, 0x0, {}, [@common=@unspec=@conntrack2={0xc0, 'conntrack\x00', 0x2, {{@ipv4=@loopback, [0xffffffff, 0xffffffff, 0x0, 0xffffffff], @ipv4=@loopback, [0x0, 0xffffffff, 0xffffff00, 0xff000000], @ipv6=@ipv4={[], [], @remote}, [0xffffff00, 0xff000000, 0xff000000, 0xff], @ipv4=@multicast2, [0xffffffff, 0xff, 0xff0000ff], 0x3, 0x1ff, 0x4, 0x4e21, 0x4e20, 0x4e22, 0x4e20, 0x28}, 0x1c0, 0x98}}]}, @common=@unspec=@ERROR={0x40, 'ERROR\x00', 0x0, "f650bd5c77822a55c077a2b3078812467f4ab9fefc372cf333baff203cdb"}}, {{@ipv6={@remote, @mcast2, [0xff000000, 0xffffff00, 0xffffffff, 0xff000000], [0x0, 0xff, 0xff000000, 0xffffff00], 'syzkaller0\x00', 'lo\x00', {}, {}, 0x2b, 0x1, 0x2, 0x23}, 0x0, 0xc8, 0x108}, @common=@inet=@TCPOPTSTRIP={0x40, 'TCPOPTSTRIP\x00', 0x0, {[0xe08d, 0x6, 0xff, 0x800, 0x2, 0x7, 0x0, 0x5]}}}, {{@uncond, 0x0, 0xf0, 0x118, 0x0, {}, [@common=@hl={0x28, 'hl\x00', 0x0, {0x3, 0x604}}]}, @common=@unspec=@STANDARD={0x28, '\x00', 0x0, 0xfffffffffffffffd}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x518) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = getpgrp(0x0) prlimit64(r2, 0x0, &(0x7f00000004c0)={0x0, 0x7ffffd}, &(0x7f00000002c0)) lremovexattr(0x0, &(0x7f0000000480)=@random={'trusted.', 'bpf\x00'}) getsockopt$inet_sctp_SCTP_PR_ASSOC_STATUS(0xffffffffffffffff, 0x84, 0x73, &(0x7f0000000280), 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r3 = syz_open_dev$amidi(&(0x7f0000000100)='/dev/amidi#\x00', 0x2, 0x800) recvfrom(0xffffffffffffffff, 0x0, 0x0, 0x20, &(0x7f00000005c0)=@ipx={0x4, 0x1, 0x6, "6b183128f377"}, 0x80) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000200)='./file0\x00', 0x700, 0x0, &(0x7f00000024c0), 0x100032, &(0x7f00000000c0)=ANY=[@ANYBLOB]) getsockopt$inet_dccp_int(0xffffffffffffffff, 0x21, 0xf, &(0x7f0000000240), 0x0) write$uinput_user_dev(r0, &(0x7f0000001880)={'syz0\x00', {0x9, 0x5, 0x4a, 0x1}, 0x3c, [0x401, 0x2, 0x6, 0x8, 0x7, 0x8001, 0x0, 0x401, 0x7, 0x2, 0x100000001, 0x1, 0x0, 0x20, 0x100000001, 0x5, 0x100, 0x6, 0x9, 0x7, 0x7, 0x57f, 0x0, 0xd821, 0x4, 0x4, 0x0, 0xffffffffffffffff, 0xfffffffffffeffff, 0x7fff, 0xe0, 0xfffffffffffffff9, 0xfffffffffffffffd, 0x100000000, 0x5, 0x1, 0x0, 0x7fff, 0x995d, 0x9e, 0xfff, 0x8, 0x97f3, 0x2, 0x91, 0x8000, 0x7, 0x937, 0x7fff, 0x4, 0xfff, 0x1, 0x13, 0x200, 0x6, 0x100000001, 0x5, 0x3, 0x2, 0xffffffffffffffc0, 0xa76, 0x1, 0x4, 0x6], [0x8, 0x7fffffff, 0x41a60090, 0x1, 0x4, 0xffffffffffff8000, 0x1, 0x7, 0x7fffffff, 0x73e8, 0x4, 0x1, 0xfffffffffffffffb, 0x2, 0x3, 0x4, 0xfffffffffffffffd, 0xe26, 0x9, 0x4, 0x8416, 0x2, 0x800, 0xeb, 0xfffffffffffffffd, 0x3ff, 0x2, 0x60, 0x5, 0x6, 0x10000, 0x81, 0x8, 0x400, 0x2, 0x3, 0x7fffffff, 0x8, 0x6, 0x9, 0x9, 0x6, 0x0, 0x0, 0x0, 0x1, 0x6, 0xffffffff, 0x9, 0xe36, 0x2, 0x10000, 0x5, 0x2a, 0x1ff, 0x6, 0x3, 0x1f, 0x3, 0x10000, 0x6, 0xffffffffffffff51, 0x3, 0x4], [0x800, 0x2, 0x1000, 0x9, 0x61, 0x1, 0x400, 0x8, 0x0, 0x7, 0x98, 0x1, 0x81, 0x3, 0x401, 0x2b, 0x1, 0x800, 0x80000000, 0x4, 0x1, 0xca, 0x2, 0xffffffff, 0xc3, 0x2, 0x100000000, 0x7fffffff, 0xfffffffffffffffb, 0x9, 0x7, 0x64d, 0x200, 0x4000000000000, 0x1ff, 0x40, 0x100, 0x100000000, 0x40, 0x7, 0x1, 0x1, 0x8, 0x6, 0x6, 0x85, 0x0, 0x42, 0x1, 0xaf4, 0x100, 0x7, 0x8, 0x8d4, 0x7, 0x7, 0x3, 0x8b0, 0x81, 0xff7b, 0x5, 0x4, 0x62, 0x400], [0x0, 0x5, 0x4, 0x100, 0x10001, 0x9, 0x6, 0x5, 0x4, 0x3, 0x800, 0x1, 0x80000000, 0x6, 0xffffffff, 0x8, 0xfffffffffffffff8, 0x522bf8a, 0x29, 0x2, 0x2a, 0x100, 0xffffffff, 0x9, 0x100000001, 0x192c, 0x7f, 0x1, 0x80000001, 0x257, 0x9, 0x6, 0x2, 0x4, 0x7ff, 0x1, 0xff, 0x10000, 0x100000000, 0x7, 0xfff, 0x0, 0x0, 0x25ae72b7, 0xff, 0x20, 0x100000000, 0x2, 0x2dae, 0x0, 0x101, 0x4, 0x8, 0x7, 0x2, 0xdc, 0x8, 0x0, 0x8, 0x1f, 0x1, 0xfbf, 0xffff, 0x8a34]}, 0x45c) fstat(0xffffffffffffffff, &(0x7f00000006c0)) getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, &(0x7f0000000440)={0x0, 0x80}, &(0x7f00000001c0)=0xfffffffffffffd3f) ioctl$FICLONE(r1, 0x40049409, r3) ioctl$SG_IO(r0, 0x2285, &(0x7f0000001800)={0x0, 0xfffffffffffffffb, 0x4d, 0x4, @scatter={0x0, 0x0, &(0x7f0000000680)}, &(0x7f0000000740)="258a54717d77a16e7c1b0a5dc157485c08bc330cb2b63920c910a1384657745bf66cb3105dfe973ae38b6b59684ebe1ac4fbba60ae961908ee58201e58c3970ca5247ff2c65b01b2e592e7e236", &(0x7f00000007c0)=""/4096, 0xffff, 0x10022, 0xffffffffffffffff, &(0x7f00000017c0)}) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, 0x0) 14:19:14 executing program 2: getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) syz_mount_image$hfs(&(0x7f0000000200)='hfs\x00', &(0x7f0000000280)='./file0\x00', 0xebffffff00000000, 0x0, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 14:19:14 executing program 0: r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/expire_quiescent_template\x00', 0x2, 0x0) r1 = syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x1, 0x0) accept$inet6(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000080)=0x1c) ioctl(r1, 0xffffffffffffffb7, &(0x7f0000000080)) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000140)=@security={'security\x00', 0xe, 0x4, 0x4e0, 0x1f0, 0x320, 0x0, 0x320, 0x320, 0x438, 0x438, 0x438, 0x438, 0x438, 0x4, &(0x7f0000000100), {[{{@ipv6={@local, @local, [0x0, 0xffffff00, 0xffffffff, 0xffffff00], [0xffffffff, 0xff, 0xffffffff, 0xff], 'eql\x00', 'gretap0\x00', {}, {0xff}, 0x0, 0x7fffffff, 0x2, 0x61}, 0x0, 0x188, 0x1c8, 0x0, {}, [@common=@unspec=@conntrack2={0xc0, 'conntrack\x00', 0x2, {{@ipv4=@loopback, [0xffffffff, 0xffffffff, 0x0, 0xffffffff], @ipv4=@loopback, [0x0, 0xffffffff, 0xffffff00, 0xff000000], @ipv6=@ipv4={[], [], @remote}, [0xffffff00, 0xff000000, 0xff000000, 0xff], @ipv4=@multicast2, [0xffffffff, 0xff, 0xff0000ff], 0x3, 0x1ff, 0x4, 0x4e21, 0x4e20, 0x4e22, 0x4e20, 0x28, 0x20}, 0x1c0, 0x98}}]}, @common=@unspec=@ERROR={0x40, 'ERROR\x00', 0x0, "f650bd5c77822a55c077a2b3078812467f4ab9fefc372cf333baff203cdb"}}, {{@ipv6={@remote, @mcast2, [0xff000000, 0xffffff00, 0xffffffff, 0xff000000], [0x0, 0xff, 0xff000000, 0xffffff00], 'syzkaller0\x00', 'lo\x00', {}, {0xff}, 0x2b, 0x1, 0x2, 0x23}, 0x0, 0xf0, 0x130, 0x0, {}, [@common=@hl={0x28, 'hl\x00'}]}, @common=@inet=@TCPOPTSTRIP={0x40, 'TCPOPTSTRIP\x00', 0x0, {[0xe08d, 0x6, 0xff, 0x800, 0x2, 0x7, 0x3, 0x5]}}}, {{@uncond, 0x0, 0xf0, 0x118, 0x0, {}, [@common=@hl={0x28, 'hl\x00', 0x0, {0x3, 0x604}}]}, @common=@unspec=@STANDARD={0x28, '\x00', 0x0, 0xfffffffffffffffd}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x540) ioctl$EXT4_IOC_MIGRATE(0xffffffffffffffff, 0x6609) 14:19:14 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x3, &(0x7f0000001fd8)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x15}}, &(0x7f0000000080)="47504c049c3514bf772da07ae82e76590a36f6493ec1ab91b397e42abf1ea6cd8cd77427fc9a9e2b7165f52b4107bf0850d899dc52d013175ddb1b2f46203c2a05b722e33e556fb2e3f39a3cde1fca53640337ec956146bdbfcb115070195631de5d21a5ea9e638c2bdb78a501ca4b6ea313d82568f9382c2c3f6faba6b4ee54793b4ed26dae3e52225029bb2ac0007f77754c3f23ceda9809b9a9684a940abcaa8cfcc7133ec422e9c83888318d41e9a493f0195fe2599651b89504f5dba14625ce2366f33d95dba92f867279cabf4aceddc85a8af7a0fa68d767ce5136b9d0d1966c499cb6bf34c2988666970000000000000000000000", 0x0, 0x10000000000000}, 0x48) [ 2739.479855] hfs: can't find a HFS filesystem on dev loop2 14:19:14 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x3, &(0x7f0000001fd8)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x15}}, &(0x7f0000000080)="47504c049c3514bf772da07ae82e76590a36f6493ec1ab91b397e42abf1ea6cd8cd77427fc9a9e2b7165f52b4107bf0850d899dc52d013175ddb1b2f46203c2a05b722e33e556fb2e3f39a3cde1fca53640337ec956146bdbfcb115070195631de5d21a5ea9e638c2bdb78a501ca4b6ea313d82568f9382c2c3f6faba6b4ee54793b4ed26dae3e52225029bb2ac0007f77754c3f23ceda9809b9a9684a940abcaa8cfcc7133ec422e9c83888318d41e9a493f0195fe2599651b89504f5dba14625ce2366f33d95dba92f867279cabf4aceddc85a8af7a0fa68d767ce5136b9d0d1966c499cb6bf34c2988666970000000000000000000000", 0x0, 0x400000}, 0x48) 14:19:14 executing program 3: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 14:19:14 executing program 0: r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/expire_quiescent_template\x00', 0x2, 0x0) r1 = syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x1, 0x0) accept$inet6(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000080)=0x1c) ioctl(r1, 0xffffffffffffffb7, &(0x7f0000000080)) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000140)=@security={'security\x00', 0xe, 0x4, 0x4e0, 0x1f0, 0x320, 0x0, 0x320, 0x320, 0x438, 0x438, 0x438, 0x438, 0x438, 0x4, &(0x7f0000000100), {[{{@ipv6={@local, @local, [0x0, 0xffffff00, 0xffffffff, 0xffffff00], [0xffffffff, 0xff, 0xffffffff, 0xff], 'eql\x00', 'gretap0\x00', {}, {0xff}, 0x0, 0x7fffffff, 0x2, 0x61}, 0x0, 0x188, 0x1c8, 0x0, {}, [@common=@unspec=@conntrack2={0xc0, 'conntrack\x00', 0x2, {{@ipv4=@loopback, [0xffffffff, 0xffffffff, 0x0, 0xffffffff], @ipv4=@loopback, [0x0, 0xffffffff, 0xffffff00, 0xff000000], @ipv6=@ipv4={[], [], @remote}, [0xffffff00, 0xff000000, 0xff000000, 0xff], @ipv4=@multicast2, [0xffffffff, 0xff, 0xff0000ff], 0x3, 0x1ff, 0x4, 0x4e21, 0x4e20, 0x4e22, 0x4e20, 0x28, 0x20}, 0x1c0, 0x98}}]}, @common=@unspec=@ERROR={0x40, 'ERROR\x00', 0x0, "f650bd5c77822a55c077a2b3078812467f4ab9fefc372cf333baff203cdb"}}, {{@ipv6={@remote, @mcast2, [0xff000000, 0xffffff00, 0xffffffff, 0xff000000], [0x0, 0xff, 0xff000000, 0xffffff00], 'syzkaller0\x00', 'lo\x00', {}, {0xff}, 0x2b, 0x1, 0x2, 0x23}, 0x0, 0xf0, 0x130, 0x0, {}, [@common=@hl={0x28, 'hl\x00'}]}, @common=@inet=@TCPOPTSTRIP={0x40, 'TCPOPTSTRIP\x00', 0x0, {[0xe08d, 0x6, 0xff, 0x800, 0x2, 0x7, 0x3, 0x5]}}}, {{@uncond, 0x0, 0xf0, 0x118, 0x0, {}, [@common=@hl={0x28, 'hl\x00', 0x0, {0x3, 0x604}}]}, @common=@unspec=@STANDARD={0x28, '\x00', 0x0, 0xfffffffffffffffd}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x540) [ 2739.573437] hfs: can't find a HFS filesystem on dev loop2 14:19:14 executing program 2: getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) syz_mount_image$hfs(&(0x7f0000000200)='hfs\x00', &(0x7f0000000280)='./file0\x00', 0x6c, 0x0, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) [ 2739.741078] EXT4-fs (sda1): re-mounted. Opts: ,errors=continue [ 2739.780566] gfs2: not a GFS2 filesystem 14:19:14 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x3, &(0x7f0000001fd8)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x15}}, &(0x7f0000000080)="47504c049c3514bf772da07ae82e76590a36f6493ec1ab91b397e42abf1ea6cd8cd77427fc9a9e2b7165f52b4107bf0850d899dc52d013175ddb1b2f46203c2a05b722e33e556fb2e3f39a3cde1fca53640337ec956146bdbfcb115070195631de5d21a5ea9e638c2bdb78a501ca4b6ea313d82568f9382c2c3f6faba6b4ee54793b4ed26dae3e52225029bb2ac0007f77754c3f23ceda9809b9a9684a940abcaa8cfcc7133ec422e9c83888318d41e9a493f0195fe2599651b89504f5dba14625ce2366f33d95dba92f867279cabf4aceddc85a8af7a0fa68d767ce5136b9d0d1966c499cb6bf34c2988666970000000000000000000000", 0x0, 0x40000000}, 0x48) [ 2739.813720] EXT4-fs (sda1): re-mounted. Opts: 14:19:14 executing program 0: openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/expire_quiescent_template\x00', 0x2, 0x0) r0 = syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x1, 0x0) accept$inet6(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000080)=0x1c) ioctl(r0, 0xffffffffffffffb7, &(0x7f0000000080)) [ 2739.887557] hfs: can't find a HFS filesystem on dev loop2 14:19:14 executing program 3: r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/expire_quiescent_template\x00', 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000140)=@security={'security\x00', 0xe, 0x4, 0x4b8, 0x1f0, 0x320, 0x0, 0x320, 0x320, 0x438, 0x438, 0x438, 0x438, 0x438, 0x4, &(0x7f0000000100), {[{{@ipv6={@local, @local, [0x0, 0x0, 0xffffffff, 0xffffff00], [0xffffffff, 0xff, 0xffffffff, 0xff], 'eql\x00', 'gretap0\x00', {}, {0xff}, 0x0, 0x7fffffff, 0x2, 0x61}, 0x0, 0x188, 0x1c8, 0x0, {}, [@common=@unspec=@conntrack2={0xc0, 'conntrack\x00', 0x2, {{@ipv4=@loopback, [0xffffffff, 0xffffffff, 0x0, 0xffffffff], @ipv4=@loopback, [0x0, 0xffffffff, 0xffffff00, 0xff000000], @ipv6=@ipv4={[], [], @remote}, [0xffffff00, 0xff000000, 0xff000000, 0xff], @ipv4=@multicast2, [0xffffffff, 0xff, 0xff0000ff], 0x3, 0x1ff, 0x4, 0x4e21, 0x4e20, 0x4e22, 0x4e20, 0x28}, 0x1c0, 0x98}}]}, @common=@unspec=@ERROR={0x40, 'ERROR\x00', 0x0, "f650bd5c77822a55c077a2b3078812467f4ab9fefc372cf333baff203cdb"}}, {{@ipv6={@remote, @mcast2, [0xff000000, 0xffffff00, 0xffffffff, 0xff000000], [0x0, 0xff, 0xff000000, 0xffffff00], 'syzkaller0\x00', 'lo\x00', {}, {}, 0x2b, 0x1, 0x2, 0x23}, 0x0, 0xc8, 0x108}, @common=@inet=@TCPOPTSTRIP={0x40, 'TCPOPTSTRIP\x00', 0x0, {[0xe08d, 0x6, 0xff, 0x800, 0x2, 0x7, 0x0, 0x5]}}}, {{@uncond, 0x0, 0xf0, 0x118, 0x0, {}, [@common=@hl={0x28, 'hl\x00', 0x0, {0x3, 0x604}}]}, @common=@unspec=@STANDARD={0x28, '\x00', 0x0, 0xfffffffffffffffd}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x518) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = getpgrp(0x0) accept$packet(r0, &(0x7f0000000a00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000a40)=0x14) sendmsg(r0, &(0x7f0000001180)={&(0x7f0000000a80)=@xdp={0x2c, 0x6, r3, 0xd}, 0x80, &(0x7f00000010c0)=[{&(0x7f0000000b00)="8f395ae36dd796345e498597cdae65c96905f0a44cecfb5e2ed382149bde16e93e8674fe0786ec959467ec30461cfd0d86a4187108d84aaf6d5223d4", 0x3c}, {&(0x7f0000000b40)="98f53ce86f85da782e7b289ac8832e0fe767bffc55529f5d402419e43a0600e4d0ebe9c59a6061fb87e12d970a53162f3d0a2b37df02556cca161b037a1e01d2654c926433f0003cabc3b83a67", 0x4d}, {&(0x7f0000000bc0)="2079d5dcb58f196ce46232d9c6dba83ae2551e725bb5f99b2a92eaf409b8a2bbe5d2d7175c044778532847916348799d297d8a9443aad0a070cd8cb381b965659c4ad0c94b8236bf8a5b9414496fa242f2ac75ee0f4de925aff15de3ec20c0b4636548265b0976e701f2d860b2f361a56d5d71e33c5a22d01a1edfd3ae48fecd507b46fa19d65af5895ea84a01eff74f98785113b9bcb8de125c6d84f98e23b5d20b231392af5a7320", 0xa9}, {&(0x7f0000000c80)="ff89605bd715434d5d8c70e24574f063cf2e760a71bd7c67ba2987f164a8d9332e660dbaa81014899834869a1535a25d477c947cc36162369e0a858ca2a3eee425b23f6d9de74396eaa79d20a001e8971b8f5f1b0fc4000b7aa47c8d789771b5e782975e2e9e0052f35ac221e96ac9a882a54a86027fd99d24c57fb77e72fcc4996d30af29902f1a74ff7a35f51c2bb6bc61f03c286a5165c9f722cf2b46ef0dff12d42d62e7e43e5958c03f408e76073b40fde3b30da679de82fbfcf748624b2402974a76abf3494cd58d6b", 0xcc}, {&(0x7f0000000d80)="276a0763fae467d209892d4a30d08ff3293305a791f1457db990ebf464617b1e331205eb97fbfbda38aba4e925c5087bb12b697d172ee7f98ea0bc6322686ff9eadc9ffe2ff5786ed6a7d7a95412cfc46531dce7b39aaa1760d492bfbc4fad2d7000dcccd624ad00b9d5842fe4c9e9b7b6f926927eba4ad6613e25f61a20098f1e2a42b04cf441ffb59fc3f14d8df324bda18edcf8114bad6f91551cab09a0313a3916917ec5ed9b55a592b703", 0xad}, {&(0x7f0000000e40)="04ae82891a72ec4474fd86c10699ab0a0717af9d6db955c70f1dca6b454b1020a6d5bd345589bace8556c933ce93e3805737c6bcf4a737c399cd72c5a5a273673ce3e47ae038d280012fd81d268fe2", 0x4f}, {&(0x7f0000000ec0)="c7bd7c", 0x3}, {&(0x7f0000000f00)="4f4e934de094a61e106fe4a48c786ffc15b45acdbbfe5d4274e2986b43dbc10fc93cc7aa7ebff68f67a3b447dd4371eae98595c9981723eb67d2eb1de07c770e549717a4641540d0acde3d456b8c665bab31c9a8c472f1a273ad2fa9372ee0a531362e87491af7f82e60f82b654e75c1ba768e634140366eb1451cdc658ade5d6810989917069fd68fa78b9d8861388f5c4210a637c27d56f4eb17984eb68eb3689919468053e2d35fa046d13a8eda7633892b2dcd38e860978043fe4d7cd422e37e83", 0xc3}, {&(0x7f0000001000)="878f30ba571c3b55fdecb2b6bbea0b4734a83b3535d8431a89c64929d257ab65049868d9ce24ea93a78ab7f39094ae0f6b1be9e12d6a7d5f1270a4c7ae909b998ca6d6d93376e70c4c68374ec9c943fdc05dda726020cdf7cad4c60cd729f901ed6b4286b7c5ce2ac0006821fc06eb0c35fdcba7a098fbeae9eac86b8192c1e1796e106a6935938c6fc05a29258303f2c2673bb3423729d35f70e5d97bf97853661ad57954c09b7dab9a", 0xaa}], 0x9, &(0x7f0000002640)=[{0xa0, 0x105, 0x2, "276028ad6d5e5fb3294abce7991ac2330a4c836dfe2474bb0187008ab22fa6bb9300d00e3634eb64b80687e387d0d2cb32f9ceee87fa58d5962e8053d43c6d1df5e78f934cb8b90ff6b6f09e59be12c2b99752356108759e336d3aa6ba736aa3117c54b38b75a80878fe6bf149ca122ee98fc7f9589e467e604c973ed27f6b4cead72ffc2f4aab94dab15f6fca6b6b"}, {0xc8, 0x0, 0x1, "2947a493be8576a1303cd45b8602b90e14531d673398a6b5aa88c64f2b9040a5bcdc8244a20842ac6c05ee59cedbe7a1a95e7372e0af2280d1ce6aeb19a189a821a41fe571d727e552e14fbf0fee770518a911d3d71f58ceaf99d074253fa736f7d696dafd6de5989c5d8c75d6fdc6a952de549fcebf7b29d2984b12330228f8cb4c3624b98538a2b0815ad70516c8d8d04158ac68ef741248fa5c7c40ffddafd7aaa9fa90b77a0af9129fff25b681a1ef8d26aeb3"}, {0xf0, 0x0, 0x8, "1cfb502d25a1e4769a774c98f5ba46faa28ca4d244c94d4611f205490cb1f59b1be0caf65560dc606261e477422f9271e5c6d1431ff7df1950a5dbc44e63865a7779ccc212f6ef0d6ab8c4b08c8705f13dec5fb1d6d54d15a2b2f62e29861241ecc55648fb599d6870e9d0334f0f78fee7eb0ac075ea1e702d2d401490a54d5e6f95b1147a5c540d1a9fe0e33e0fb2c8312442ad4bf5bea44e0ff29e4a860ed8b7ba02d907ec45374025c6796d9680fc68a038e541d861b433b3c35c5df496d304b2b588dc1f476e587614bc83147eb594e9da44ba468e22bacc"}, {0xe0, 0x88, 0x2, "92a99360aa279ee6a76b4155bbf956033dc57e74e5771587a5acd51b50496a6628b931e2ff5b8f33941916a8698e45450c14bebca6a9a4c4cf05f3dfbab5a314a55cf6f8f301a4f3d55842e5e1ffd4e751d9dc30af2b955ab265ca2aeb477bf55297f4334c36468d6b589a1c406a6e30bd616cb402d0235016e6ed907a90705a9a579148b8b9b32e4ae1b4fbba4965c4c2394423b0965a79972ca7aebe7c4838a2ff476989bd17046f11bfeff9f24a46108444c8bf55f708846aac393b7d5b6be740097b35467e4bc6f9d0"}, {0x1010, 0x0, 0xd89, "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"}, {0x1010, 0x0, 0x9, "8aff9f07af4a5c4bca200167200f6d6132e3687c7a80c7c0ce480caca58f8b6bad08594c7d6db9811416846f534c3a39883b1d8dc572cc533e13ae140a1d1cfdd5c704a132f0f33e432d2525a685408333fd7498a0b77c556ef02c57029e1ee4f8aa3a69f8e014d7afe2d59321999bb6b0f2b75d1c8b36a09cf9dadbf234f37bad4729b583b49803f415ddbeebf5c0f8e35d1e3ba1db07688b5e85a1dcce1ef1886f74e6bee385835937f05fec4d0c687cf925436e4a7c4f271b1d507089d0709b0e51102691124817dc0eefa22ded1853ff6e16cc478b3da6b3ca27cc8f07cfc6e236fcef717a2695eb49112c3e4d845c7ba450fab3f2cff7536d0e5d3c88050333ca5fca6fe132a0341df814504abb88b6f45daf8d817eac0d2be5f219155d150631eb0951f04fb4e6a4b6200506d8c995a131971de7bdfa3a066ae1701b698280f5ef6c3234eb18c0b3c7be0dbf5491ca4c169652c3e567fba5ac5066dbf8638dd1a3852ae88ff3c766bf8858f20b6e7b55616c71e63661cacc86c403688e424eb7bd2fa118d6f70b2de7fafc081fee80e2c371e4b3ef3f00c28ccc2d7b238807930323f94ea9441f8e7aacb2646e28551d5b2f865a7338264ed11699d0c5a3a1d2ec37efa49a773dd907670bb655381d56d0955b4719e39523f0e786bd5740f93a886f29ed8e29f47692778c96e4eeaa81a629cb56c28af376e3ca31cc5ec336f865bbd795e9285b77780c4b8600abeb9aa973061bfc7ee42f8b075b7b72840d8609c2b72055e2f9417bcad539550bef6485644802984176a8ab6ce660586cd05bde9091b79ac7486179fc56ec2fd8cfa7568f41aa008a2cf887ceb1b5495331d1fb60f29e8d066963c5bbbdc80ddbcc0a4b244cebb7d7ff740b4e14c4a014c8c8d3ce25f3fb4de53a20d3ff3cf1ca60db7c2ffcf556e9a520370416f9dee6f32214b46423f71c642569120db0af21fda034baa04fbc9971779019cb975c1963be153c445e0a560eba6f6ab24f81b85bffef786e8f40935218cc3c5b87649d62d2d9842d5f3c2ec1540ee6a87ea0b45e35dc63779279edaf965261967d1f5462903f89ae4faffa7b526331d6994957e87a66af3726bd0546ace702dcbb210efcfcc13a854e32d88dd3d1b8f574ce71f22452514ef4c608ad200d0bd2a5ff3841ec54f7de6e97848a87d4eaba6abdd4112156928360afed3556beb6855cf063a32e72c671744a34a8250dd8186d3d00478e8188e2714a9b314e55dfd01add140db8139d159c9f9d7bb5941154ec8d36b6fa5ff1b6e3ee3553501c90ef69be72bf5047ae63e80d179c6dde45c46a8ba83209b866774a8af2c21075cfed05143cf2a1255fa32f4384ff3000e90bd706d86ec42b87227bbfd523957e72d34192cf6f182f919044864cc13913c8447a75e47f2644be371d9e3df14e203c61cc07a8486159d6b120d6997c294205c505a67471bec0c5e42188d6484c69fc019c3dea2ad5b25653d19efade4d14f3b832f43e65cc911c829e32c8fb7ebb58764cb4c8ab7a937c3fdd1ebb7e3f989aa2b793aab9e815204da0f98afa6e5105b6182ef3cc76dc2d276c890a65ae630a3d8507dbfd4ca178e16df32f64332d69538bf14b86515138a8375344dcad192b182625cc79921c5c9faedd154527227a72ad595e91948bf1a850aa3696cd4c727d1f418d1a16e0895963733a0f243b90fa0ebebc7a2e6aab040551f35688cc3297fae1e1473ec5724a5a0743f80b7f14aeacebcea04193517a1dc8a51043687eafc40bf2abeb472c86e72e2c6cf83e29c22361680693daa8e12e3a03625b602ded10ed05487c1cf9266eb948100d420e9c221e093286fa0424ef779790b8b71c4b825598ea1a4e20e69465f013ab89707a1ccf57113f51bf7bbfcdf31c096464d6160112fe88dd0a0eb8cacd51d1a02f17c10bf53af872c370fd9b75dd5d9f289fff6f176e33261354e471cfb74db13fc65f9404d7bf8727c71345800235ec22dd22fce36fd9a39f2d6f3f0164eab9ebd0175e67b8cd89facb3632689d1a11dce52f816b80e7260e51573de08d5584d2cf6d82e4bb8cdc51fea4981b601dfc54fd380e064bfbb64c1c4fa18242ac679d4d750fee995bdbdb0ee9f883f98c1dd3013ce2a1c90032493469521cf52cd358e76d36cb43f29aaa1494fecb994a3e02944ecb9472bffa52f36c21fd14d82b4d33014de0a66edbc02969f2b97910f64ee5a2fb8cce5e0e1c7fe3c49a2c0f2b8a5dde52c4b019abde656ce0262a2674ceeaf0014f7e55fd89dc1afcbf423c45c630debf4974575f8f2be55147f794d66634be367cb3fbbe56e5f8d3e3c1465aa1c5dcea9aec208a7ae5f2df501ccc416a72bb9ef9d169db0ac6f9db41ffbe8d626e92eaa85e0355e27d4b2bbe40fd845ba264c1184fceeed79bc5c12cd6ef1fc8f413224ee25c154e7adb62a38ff060c257d74980315d05bdbef1d3fc4e8d864fe0ee8495589c345f8370937d305cd77fc373428881b5b77b89ecff3eab1b078f805b9a743654f1da99de9fe9e9429f517729fb51e2237cf30e87ce0eefd5da3911530b46c2dc6bff5844607785e00bc34814e3941e6ce1261a31adebc5f825a5fbd1719bce61af893a4889d4dd958dda4f68d0fdb0f74532c693994c1f695037f14c5808e258fedfb8171d5f1ba26a33d71ee408c6915085fde42d615439a2738952c86903ae00e3455d8f639c7962a5231a75d4b43a40700e4ae3f3fba53cbc874212af38232857ca94edf84a6322647970a5e8303c0d649a47197c8fe12c9c1dad59fc11c1915ed4363a9e8a7518bfc7642a918208706933ecaa19f040302621ebdc2140b985ccd10372d6323baf6471dcd2f36ffb3c61cfc372f868ea47a89722dafb560bb083b1bb549d58bcf7ecbe02c71a5c5d634332d7bf2d3f6e146ebffa0eb7ddbe747b97a7a22e2beb2ad7721f5956417828884ef9c7a223ed7d583858037ceffa47f01013b4a677e3cb27e1de733a9c00aae3f28d647e00b1ed7448863413f04aa25ac6c45f32975d6ce485bde0cac8ddabf14bd914313746f09e3425ff8b76a25179eff09ea6724b88881584de96c711ca80c60af7bc72c803bf8476df25ee6019a6ddee700e196f7427ac8891900536ac0571c6532f35902a534338ba193f8fcb3849ec8f10116648605a542a0df8d0187756a81afce5e416de9cb2fe17b10d83565c133cc7e531aaa2e1bfe5ad8a1bc44cc5ac447194bf9d1ef75c8430f6c5ddb9adfa81b3f5ec46ea0c593b29c944e34c4873e82a8d7884ec00e151a97771abdd1e947b4e1d9f306b45087b4015e27c326c6aa3f1bcb23b0ac6f6b5b1f375d8acf9e277f7fefb6d41cb7ae08532a775d1dc10515fc17f734c827c52a98e8edb44c192764ec1a003659e44d716366d3eb1e195d24e0871977d379003a3a734dc0335ab519912420939b318ba1ef858c96caa9cdb649e97f08359861fadf8769a04c850dfd55100a252285473901d3392df39763b90776aa66573059173e90315641c8e256ed19fc30171274080ab9015c91d774de34ab3d9d1b222bd2dbbf8b35dd4e60bb775488a3af91186b352f17d91a04006376d22ee31e4f46f1ed1b3728ee0b2a58fd5b624178e9c45b56d04297701c67711942288649866564ceb5aa3b783831173a0a5374c512b72d4b2e8dbdfcac9ae6b8f4dc55257212abbf99aaf4d36de41d52c6b17ade698ea24ad30d6a76f6bdbdfe246a40564a5753791e32b278c30adaa1cb96c324f4997ae07f1d20d1c81bfb5bcd50ec260acfbb4d4abe8d65884c4fd3a3249099c91e7441cd0bc2bfcfc4e7587909b4191b694a9183f48d97f5f4252476abed261ccc1bcaea3598c922ccee0873f74ebd95c6863dbc08d59a398a9d2ede34f2b2354d0595094f4603e30c05db5c23ef82670b2b723fc0a04b9bc1ec02fd23bef5591b9843e86797a68cba27e7f79070eb0d93674136b975a7f114e20a7e1499aba768474547db8e35434e1da20ff0a674f49b68544383d736390d68877dd83e3b8c2744f1c03d2fa5f9e7ff657b783d4fe504224e1353e37f20690949d3af0a7123dcfb5d7bde674fa7b4fd595ca8a0e096bc9e1e98aea83a2f11ed0cb2831b15f9fcf3e7b742f739a755b3a23a1a66c14a1f30e20b2cff1a297d0dc55ed4154cbdbec109750dd5440fb7580b0753c0fff5243dabaf47cb60d73f44d71f4d166bc723cc7518e1124e9d1bf03d2bbb7414fb376504b89e71b1e087a90808aa5122fb0739fd019716fee76e7b144846087bc26f7778d2d982a0c90cad2a0befbf110e08eaa10ec69b5a09420bd5720559576753fb1fbd98b41ca47a1f47e22cc3063246954a8a54bd1d0baa1c68a4d47bc9f4bea6e776ae2d5727aa3b37ae4007b8e90c961155a025beab174203c51ae360675f03048d061a6e06b55f53ee2f27de5850394155fc6de77f83efdb68b6bd59b815ba068494cc7279f0b248cb9e119aa4f2036e51202eb4a1902b3f3548cc917b6ecba991f2cb3f7ace8fbe05aedf7988675a5f7fb929aba50035f2a1a3f9976f596e6ab469e143382d1a2ecc72223a8e976f00b919cec21e852d69315f9360c31a9cdaa7cb69e55977cdbbd3eed068be6627d421d97049cdebe37658e4c05bf2b65474ab8efc9f3b27321e38d8efd18a36b14474a5895275b0652623b008da8a58aa7ea58c6e814e2e7682716f3b6613731ed5454651d6d99272833f30da58dcc87451436feee6a7a8d8fa9d9796a116fa53b036ccb210633d85876b8dc27ec4148ed5e205ebb180971a4f2774003c7bffa2eb6c14ac97283ead56e46f1a3561cfa1700adb946f0c519e5dfff26264b20f6b01e212da1fb09792b249621316260d4656e2386667c21a27a907637448c8c0508bd6b198b5276a340b2642eec47dbaa57db353284a14be4a0991bc151d745ab6ea392bb988f8357666c77d52c8f71ca5f7af5153edd40b91effc4c759d5dc702441daf05113b0d19f7d63ab01a87ef58330110e399b6dbb1324a7e317e0ab3bfc98280d30c569332496209d8d505c7e2508c40065081ba8774634a2bdffe46cdc36fb7dafbad4e6b923df57426ad7877d773c6f8426e829a7b2d8063d55006c585e85a5ed65512bd1140a60359009e733689b96d7b1d105781771aaed087bec58dac7d5fe5039c6c9c5480cb6780670f50741021410137769f73a7755c7bf70a2bd4b7f8a01928ca33326bcc672368e6d1b00f7a01b9ebdf30f2512afc22cc2eabf717f7118f141decb3eac3dba7cbc4dd91e11faf7a86ce223a5e114714b70c0b6a213aa7ddf499a2c05f05dd333e613b8ef59e2379aa8e3204e90807bafa7b0727de15f58e0f3ac728b8ede0fc1960a446d8ee7fdfcacb2fa6b5a43881d24ec7ec2acc98a9ecce52e6441590d7792e743363d41b2960b20ebb9444577c64c89b7a5b0224e5bf23c8d406aafefa8b21659ec99d24636afa4f811e6e228cd55c99a0e400c62e41f8e36ffddc568ba48b7114e4f99a0d8730f5fa20879d8fc1d2f7ec030bd33b72368b318ff52929323d7b1a0b0eae137a1eedfb8ff6eedaaf4c54a6d5f70ad383cab5d05df04214f0585d9bb3aea048e21367dac90cd35177192dae621fdd3f3f733acec4dfff10b19200a1e2c977a8a9634550b4274fcb4ab720e23e8837ee27dda29144837306b62706e70e8047096c52899522c3c7dc9e30435e69055ecb1c6cc7a4180f2e1501516d4f8e35e80fa5a8423a9d01a6b14ca54755ef9e05ea13d5f162957a21e3375"}], 0x2358, 0x8041}, 0x800) prlimit64(r2, 0x0, &(0x7f00000004c0)={0x0, 0x7ffffd}, &(0x7f00000002c0)) lremovexattr(0x0, &(0x7f00000007c0)=ANY=[@ANYBLOB="747275737465642e62706600911bc8fc4a"]) getsockopt$inet_sctp_SCTP_PR_ASSOC_STATUS(0xffffffffffffffff, 0x84, 0x73, &(0x7f0000000280), 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r4 = syz_open_dev$amidi(&(0x7f0000000100)='/dev/amidi#\x00', 0x2, 0x800) recvfrom(0xffffffffffffffff, 0x0, 0x0, 0x20, &(0x7f00000005c0)=@ipx={0x4, 0x1, 0x6, "6b183128f377"}, 0x80) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000200)='./file0\x00', 0x700, 0x0, &(0x7f00000024c0), 0x100032, &(0x7f00000000c0)=ANY=[@ANYBLOB]) getsockopt$inet_dccp_int(0xffffffffffffffff, 0x21, 0xf, &(0x7f0000000240), 0x0) fstat(0xffffffffffffffff, &(0x7f00000006c0)) getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, &(0x7f0000000440)={0x0, 0x80}, &(0x7f00000001c0)=0xfffffffffffffd3f) accept4$unix(r4, &(0x7f0000000840)=@abs, &(0x7f00000008c0)=0x6e, 0x80000) setsockopt$bt_BT_VOICE(r0, 0x112, 0xb, &(0x7f0000000900)=0x5, 0x2) ioctl$FICLONE(r1, 0x40049409, r4) removexattr(&(0x7f0000000740)='./file0\x00', &(0x7f0000000780)=@known='security.apparmor\x00') mkdir(&(0x7f0000000000)='./file0\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) r6 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r7 = ioctl$KVM_CREATE_VM(r6, 0xae01, 0x0) r8 = ioctl$KVM_CREATE_VCPU(r7, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r7, 0x4020ae46, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x1000, &(0x7f0000ff8000/0x1000)=nil}) ioctl$KVM_ENABLE_CAP_CPU(r8, 0x4008ae89, &(0x7f0000000280)={0x77, 0x0, [0x40000000, 0x10000000800002c0, 0x40000001, 0x3]}) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) 14:19:15 executing program 1: r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/expire_quiescent_template\x00', 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000140)=@security={'security\x00', 0xe, 0x4, 0x4e0, 0x1f0, 0x320, 0x0, 0x320, 0x320, 0x438, 0x438, 0x438, 0x438, 0x438, 0x4, &(0x7f0000000100), {[{{@ipv6={@local, @local, [0x0, 0xffffff00, 0xffffffff, 0xffffff00], [0xffffffff, 0xff, 0xffffffff, 0xff], 'eql\x00', 'gretap0\x00', {}, {0xff}, 0x0, 0x7fffffff, 0x2, 0x61}, 0x0, 0x188, 0x1c8, 0x0, {}, [@common=@unspec=@conntrack2={0xc0, 'conntrack\x00', 0x2, {{@ipv4=@loopback, [0xffffffff, 0xffffffff, 0x0, 0xffffffff], @ipv4=@loopback, [0x0, 0xffffffff, 0xffffff00, 0xff000000], @ipv6=@ipv4={[], [], @remote}, [0xffffff00, 0xff000000, 0xff000000, 0xff], @ipv4=@multicast2, [0xffffffff, 0xff, 0xff0000ff], 0x3, 0x1ff, 0x4, 0x4e21, 0x4e20, 0x4e22, 0x4e20, 0x28, 0x20}, 0x1c0, 0x98}}]}, @common=@unspec=@ERROR={0x40, 'ERROR\x00', 0x0, "f650bd5c77822a55c077a2b3078812467f4ab9fefc372cf333baff203cdb"}}, {{@ipv6={@remote, @mcast2, [0xff000000, 0xffffff00, 0xffffffff, 0xff000000], [0x0, 0xff, 0xff000000, 0xffffff00], 'syzkaller0\x00', 'lo\x00', {}, {0xff}, 0x2b, 0x1, 0x2, 0x23}, 0x0, 0xf0, 0x130, 0x0, {}, [@common=@hl={0x28, 'hl\x00'}]}, @common=@inet=@TCPOPTSTRIP={0x40, 'TCPOPTSTRIP\x00', 0x0, {[0xe08d, 0x6, 0xff, 0x800, 0x2, 0x7, 0x3, 0x5]}}}, {{@uncond, 0x0, 0xf0, 0x118, 0x0, {}, [@common=@hl={0x28, 'hl\x00', 0x0, {0x3, 0x604}}]}, @common=@unspec=@STANDARD={0x28, '\x00', 0x0, 0xfffffffffffffffd}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x540) ioctl$EXT4_IOC_MIGRATE(0xffffffffffffffff, 0x6609) write$binfmt_elf32(r0, &(0x7f0000000800)={{0x7f, 0x45, 0x4c, 0x46, 0x876, 0x5, 0x7, 0x2, 0x7, 0x3, 0x3, 0x9, 0x3b0, 0x38, 0x25d, 0x69, 0x0, 0x20, 0x1, 0x2, 0xe1, 0x7}, [{0x2, 0x8, 0x93, 0x81, 0x0, 0x9, 0x6090, 0x7f}, {0x0, 0x13, 0xd8e, 0x7, 0x55, 0x1, 0x6, 0x1}], "62a541e8379c4b210b5406814eccc8a66357b857499ae207359b2be76b885057073cd7e221f69ccff3b53772bc0c09c5f1b2d554e7ca998a4cb7938a1ce4bc1d16da8c65accc96f5012c3eaa34acbe31bdfca9c1fbb5b49f7074ea40a95446f47a4114885e6726a0bcc0835c3be9d11029c058296344fb28a4abf81ec290ce1940508fa6db51a116da9c1cdda59414928a2f795b4f50d1cbc8ae075c6b8bab5a4536d72208", [[], [], [], [], [], [], [], [], []]}, 0xa1d) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000300)={0x0}, &(0x7f0000000400)=0xc) ioctl$KVM_SET_TSS_ADDR(r0, 0xae47, 0xd000) getsockopt$ARPT_SO_GET_INFO(r0, 0x0, 0x60, &(0x7f0000000740)={'filter\x00'}, &(0x7f00000007c0)=0x44) r3 = getpgrp(r2) prlimit64(r3, 0x0, &(0x7f00000004c0)={0x0, 0x7ffffd}, &(0x7f00000002c0)) lremovexattr(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000480)=@random={'trusted.', 'bpf\x00'}) getsockopt$inet_sctp_SCTP_PR_ASSOC_STATUS(0xffffffffffffffff, 0x84, 0x73, &(0x7f0000000280)={0x0, 0x8, 0x0, 0xe0}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r4 = syz_open_dev$amidi(&(0x7f0000000100)='/dev/amidi#\x00', 0x2, 0x800) recvfrom(r4, &(0x7f0000000500)=""/96, 0x60, 0x20, &(0x7f00000005c0)=@ipx={0x4, 0x1, 0x6, "6b183128f377"}, 0x80) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000200)='./file0\x00', 0x700, 0x0, &(0x7f00000024c0), 0x100032, &(0x7f00000000c0)=ANY=[@ANYBLOB]) prctl$PR_MPX_ENABLE_MANAGEMENT(0x2b) getsockopt$inet_dccp_int(0xffffffffffffffff, 0x21, 0xf, &(0x7f0000000240), 0x0) fstat(0xffffffffffffffff, &(0x7f00000006c0)) getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, &(0x7f0000000440)={0x0, 0x80}, &(0x7f00000001c0)=0xfffffffffffffd3f) chroot(&(0x7f0000000680)='./file0\x00') ioctl$FICLONE(r4, 0x40049409, r4) setgroups(0x3, &(0x7f0000000340)=[0x0, 0x0, 0x0]) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, 0x0) 14:19:15 executing program 4: r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/expire_quiescent_template\x00', 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000140)=@security={'security\x00', 0xe, 0x4, 0x4b8, 0x1f0, 0x320, 0x0, 0x320, 0x320, 0x438, 0x438, 0x438, 0x438, 0x438, 0x4, &(0x7f0000000100), {[{{@ipv6={@local, @local, [0x0, 0x0, 0xffffffff, 0xffffff00], [0xffffffff, 0xff, 0xffffffff, 0xff], 'eql\x00', 'gretap0\x00', {}, {0xff}, 0x0, 0x7fffffff, 0x2, 0x61}, 0x0, 0x188, 0x1c8, 0x0, {}, [@common=@unspec=@conntrack2={0xc0, 'conntrack\x00', 0x2, {{@ipv4=@loopback, [0xffffffff, 0xffffffff, 0x0, 0xffffffff], @ipv4=@loopback, [0x0, 0xffffffff, 0xffffff00, 0xff000000], @ipv6=@ipv4={[], [], @remote}, [0xffffff00, 0xff000000, 0xff000000, 0xff], @ipv4=@multicast2, [0xffffffff, 0xff, 0xff0000ff], 0x3, 0x1ff, 0x4, 0x4e21, 0x4e20, 0x4e22, 0x4e20, 0x28}, 0x1c0, 0x98}}]}, @common=@unspec=@ERROR={0x40, 'ERROR\x00', 0x0, "f650bd5c77822a55c077a2b3078812467f4ab9fefc372cf333baff203cdb"}}, {{@ipv6={@remote, @mcast2, [0xff000000, 0xffffff00, 0xffffffff, 0xff000000], [0x0, 0xff, 0xff000000, 0xffffff00], 'syzkaller0\x00', 'lo\x00', {}, {}, 0x2b, 0x1, 0x2, 0x23}, 0x0, 0xc8, 0x108}, @common=@inet=@TCPOPTSTRIP={0x40, 'TCPOPTSTRIP\x00', 0x0, {[0xe08d, 0x6, 0xff, 0x800, 0x2, 0x7, 0x0, 0x5]}}}, {{@uncond, 0x0, 0xf0, 0x118, 0x0, {}, [@common=@hl={0x28, 'hl\x00', 0x0, {0x3, 0x604}}]}, @common=@unspec=@STANDARD={0x28, '\x00', 0x0, 0xfffffffffffffffd}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x518) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = getpgrp(0x0) prlimit64(r2, 0x0, &(0x7f00000004c0)={0x0, 0x7ffffd}, &(0x7f00000002c0)) lremovexattr(0x0, &(0x7f0000000480)=@random={'trusted.', 'bpf\x00'}) getsockopt$inet_sctp_SCTP_PR_ASSOC_STATUS(0xffffffffffffffff, 0x84, 0x73, &(0x7f0000000280), 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r3 = syz_open_dev$amidi(&(0x7f0000000100)='/dev/amidi#\x00', 0x2, 0x800) recvfrom(0xffffffffffffffff, 0x0, 0x0, 0x20, &(0x7f00000005c0)=@ipx={0x4, 0x1, 0x6, "6b183128f377"}, 0x80) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000200)='./file0\x00', 0x700, 0x0, &(0x7f00000024c0), 0x100032, &(0x7f00000000c0)=ANY=[@ANYBLOB]) getsockopt$inet_dccp_int(0xffffffffffffffff, 0x21, 0xf, &(0x7f0000000240), 0x0) fstat(0xffffffffffffffff, &(0x7f00000006c0)) getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, &(0x7f0000000440)={0x0, 0x80}, &(0x7f00000001c0)=0xfffffffffffffd3f) ioctl$FICLONE(r1, 0x40049409, r3) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x400, 0x0) 14:19:15 executing program 0: openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/expire_quiescent_template\x00', 0x2, 0x0) r0 = syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x1, 0x0) ioctl(r0, 0xffffffffffffffb7, &(0x7f0000000080)) 14:19:15 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x3, &(0x7f0000001fd8)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x15}}, &(0x7f0000000080)="47504c049c3514bf772da07ae82e76590a36f6493ec1ab91b397e42abf1ea6cd8cd77427fc9a9e2b7165f52b4107bf0850d899dc52d013175ddb1b2f46203c2a05b722e33e556fb2e3f39a3cde1fca53640337ec956146bdbfcb115070195631de5d21a5ea9e638c2bdb78a501ca4b6ea313d82568f9382c2c3f6faba6b4ee54793b4ed26dae3e52225029bb2ac0007f77754c3f23ceda9809b9a9684a940abcaa8cfcc7133ec422e9c83888318d41e9a493f0195fe2599651b89504f5dba14625ce2366f33d95dba92f867279cabf4aceddc85a8af7a0fa68d767ce5136b9d0d1966c499cb6bf34c2988666970000000000000000000000", 0x0, 0x43}, 0x48) [ 2740.242830] hfs: can't find a HFS filesystem on dev loop2 14:19:15 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x3, &(0x7f0000001fd8)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x15}}, &(0x7f0000000080)="47504c049c3514bf772da07ae82e76590a36f6493ec1ab91b397e42abf1ea6cd8cd77427fc9a9e2b7165f52b4107bf0850d899dc52d013175ddb1b2f46203c2a05b722e33e556fb2e3f39a3cde1fca53640337ec956146bdbfcb115070195631de5d21a5ea9e638c2bdb78a501ca4b6ea313d82568f9382c2c3f6faba6b4ee54793b4ed26dae3e52225029bb2ac0007f77754c3f23ceda9809b9a9684a940abcaa8cfcc7133ec422e9c83888318d41e9a493f0195fe2599651b89504f5dba14625ce2366f33d95dba92f867279cabf4aceddc85a8af7a0fa68d767ce5136b9d0d1966c499cb6bf34c2988666970000000000000000000000", 0x0, 0x400000000000000}, 0x48) 14:19:15 executing program 0: openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/expire_quiescent_template\x00', 0x2, 0x0) accept$inet6(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000080)=0x1c) ioctl(0xffffffffffffffff, 0xffffffffffffffb7, &(0x7f0000000080)) 14:19:15 executing program 2: getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) syz_mount_image$hfs(&(0x7f0000000200)='hfs\x00', &(0x7f0000000280)='./file0\x00', 0x5354000000000000, 0x0, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 14:19:15 executing program 3: r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/backup_only\x00', 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f00000007c0)=ANY=[@ANYBLOB="73656375726974790000000000000000000000000000000000000000000000000e00000004000000b8040000f001000000000000200300002003000038040000380400003804000038040000380400000400000000000000ac80c3ab11969dedb95037b2f0f5df47eb219710240c31693c01e014f0b7f7aeba9ebb6b60f77e12bc1c72f6f4b4326f708a58d0f68b1fe698532e5be3c2cd717dcb3f9045412deb6c547af73ac862ead290bd21adb8b81e08971e7cde35cc66890677c2e9452576", @ANYPTR=&(0x7f0000000100)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00'], @ANYBLOB="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"], 0x518) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = getpgrp(0x0) prlimit64(r2, 0x0, &(0x7f00000004c0)={0x0, 0x7ffffd}, &(0x7f00000002c0)) lremovexattr(0x0, &(0x7f0000000480)=@random={'trusted.', 'bpf\x00'}) openat$vsock(0xffffffffffffff9c, &(0x7f0000000680)='/dev/vsock\x00', 0x20000, 0x0) getsockopt$inet_sctp_SCTP_PR_ASSOC_STATUS(0xffffffffffffffff, 0x84, 0x73, &(0x7f0000000280), 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r3 = syz_open_dev$amidi(&(0x7f0000000100)='/dev/amidi#\x00', 0x2, 0x800) recvfrom(0xffffffffffffffff, 0x0, 0x0, 0x20, &(0x7f00000005c0)=@ipx={0x4, 0x1, 0x6, "6b183128f377"}, 0x80) mount$bpf(0x20000000, &(0x7f0000000180)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000200)='./file0\x00', 0x700, 0x0, &(0x7f00000024c0), 0x100032, &(0x7f0000000740)=ANY=[@ANYBLOB="ca9c23767ee390f33d2e125797d869173cd8efb70bc3c782e1786cc9422ac0193c5a0834541ba26e54b318007846f751e025714886e81c1790711c0ee256dacac3f7e086b3381c851e7debb1dc02c8204663920decaa1a2573ff7ffb1fe9a9d35c59654dedd0815237ff103a6e57a4a0b6b0b87f143c605287143f2aeb7a"]) getsockopt$inet_dccp_int(0xffffffffffffffff, 0x21, 0xf, &(0x7f0000000240), 0x0) fstat(0xffffffffffffffff, &(0x7f00000006c0)) getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, &(0x7f0000000440)={0x0, 0x80}, &(0x7f00000001c0)=0xfffffffffffffd3f) ioctl$FICLONE(r1, 0x40049409, r3) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, 0x0) 14:19:15 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x3, &(0x7f0000001fd8)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x15}}, &(0x7f0000000080)="47504c049c3514bf772da07ae82e76590a36f6493ec1ab91b397e42abf1ea6cd8cd77427fc9a9e2b7165f52b4107bf0850d899dc52d013175ddb1b2f46203c2a05b722e33e556fb2e3f39a3cde1fca53640337ec956146bdbfcb115070195631de5d21a5ea9e638c2bdb78a501ca4b6ea313d82568f9382c2c3f6faba6b4ee54793b4ed26dae3e52225029bb2ac0007f77754c3f23ceda9809b9a9684a940abcaa8cfcc7133ec422e9c83888318d41e9a493f0195fe2599651b89504f5dba14625ce2366f33d95dba92f867279cabf4aceddc85a8af7a0fa68d767ce5136b9d0d1966c499cb6bf34c2988666970000000000000000000000", 0x0, 0x29d61700}, 0x48) 14:19:15 executing program 0: r0 = syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x1, 0x0) accept$inet6(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000080)=0x1c) ioctl(r0, 0xffffffffffffffb7, &(0x7f0000000080)) [ 2740.621790] hfs: can't find a HFS filesystem on dev loop2 14:19:15 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x3, &(0x7f0000001fd8)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x15}}, &(0x7f0000000080)="47504c049c3514bf772da07ae82e76590a36f6493ec1ab91b397e42abf1ea6cd8cd77427fc9a9e2b7165f52b4107bf0850d899dc52d013175ddb1b2f46203c2a05b722e33e556fb2e3f39a3cde1fca53640337ec956146bdbfcb115070195631de5d21a5ea9e638c2bdb78a501ca4b6ea313d82568f9382c2c3f6faba6b4ee54793b4ed26dae3e52225029bb2ac0007f77754c3f23ceda9809b9a9684a940abcaa8cfcc7133ec422e9c83888318d41e9a493f0195fe2599651b89504f5dba14625ce2366f33d95dba92f867279cabf4aceddc85a8af7a0fa68d767ce5136b9d0d1966c499cb6bf34c2988666970000000000000000000000", 0x0, 0x700}, 0x48) 14:19:15 executing program 1: r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/expire_quiescent_template\x00', 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000140)=@security={'security\x00', 0xe, 0x4, 0x4e0, 0x1f0, 0x320, 0x0, 0x320, 0x320, 0x438, 0x438, 0x438, 0x438, 0x438, 0x4, &(0x7f0000000100), {[{{@ipv6={@local, @local, [0x0, 0xffffff00, 0xffffffff, 0xffffff00], [0xffffffff, 0xff, 0xffffffff, 0xff], 'eql\x00', 'gretap0\x00', {}, {0xff}, 0x0, 0x7fffffff, 0x2, 0x61}, 0x0, 0x188, 0x1c8, 0x0, {}, [@common=@unspec=@conntrack2={0xc0, 'conntrack\x00', 0x2, {{@ipv4=@loopback, [0xffffffff, 0xffffffff, 0x0, 0xffffffff], @ipv4=@loopback, [0x0, 0xffffffff, 0xffffff00, 0xff000000], @ipv6=@ipv4={[], [], @remote}, [0xffffff00, 0xff000000, 0xff000000, 0xff], @ipv4=@multicast2, [0xffffffff, 0xff, 0xff0000ff], 0x3, 0x1ff, 0x4, 0x4e21, 0x4e20, 0x4e22, 0x4e20, 0x28, 0x20}, 0x1c0, 0x98}}]}, @common=@unspec=@ERROR={0x40, 'ERROR\x00', 0x0, "f650bd5c77822a55c077a2b3078812467f4ab9fefc372cf333baff203cdb"}}, {{@ipv6={@remote, @mcast2, [0xff000000, 0xffffff00, 0xffffffff, 0xff000000], [0x0, 0xff, 0xff000000, 0xffffff00], 'syzkaller0\x00', 'lo\x00', {}, {0xff}, 0x2b, 0x1, 0x2, 0x23}, 0x0, 0xf0, 0x130, 0x0, {}, [@common=@hl={0x28, 'hl\x00'}]}, @common=@inet=@TCPOPTSTRIP={0x40, 'TCPOPTSTRIP\x00', 0x0, {[0xe08d, 0x6, 0xff, 0x800, 0x2, 0x7, 0x3, 0x5]}}}, {{@uncond, 0x0, 0xf0, 0x118, 0x0, {}, [@common=@hl={0x28, 'hl\x00', 0x0, {0x3, 0x604}}]}, @common=@unspec=@STANDARD={0x28, '\x00', 0x0, 0xfffffffffffffffd}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x540) ioctl$EXT4_IOC_MIGRATE(0xffffffffffffffff, 0x6609) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000300)={0x0}, &(0x7f0000000400)=0xc) getsockopt$ARPT_SO_GET_INFO(r0, 0x0, 0x60, &(0x7f0000000740)={'filter\x00'}, &(0x7f00000007c0)=0x44) r3 = getpgrp(r2) prlimit64(r3, 0x0, &(0x7f00000004c0)={0x0, 0x7ffffd}, &(0x7f00000002c0)) lremovexattr(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000480)=@random={'trusted.', 'bpf\x00'}) getsockopt$inet_sctp_SCTP_PR_ASSOC_STATUS(0xffffffffffffffff, 0x84, 0x73, &(0x7f0000000280)={0x0, 0x8, 0x0, 0xe0}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r4 = syz_open_dev$amidi(&(0x7f0000000100)='/dev/amidi#\x00', 0x2, 0x800) recvfrom(r4, &(0x7f0000000500)=""/96, 0x60, 0x20, &(0x7f00000005c0)=@ipx={0x4, 0x1, 0x6, "6b183128f377"}, 0x80) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) ioctl$KVM_GET_DEVICE_ATTR(r4, 0x4018aee2, &(0x7f0000000800)={0x0, 0xffffffff, 0x1004, &(0x7f0000000680)=0x7fff}) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000200)='./file0\x00', 0x700, 0x0, &(0x7f00000024c0), 0x100032, &(0x7f00000000c0)=ANY=[@ANYBLOB]) prctl$PR_MPX_ENABLE_MANAGEMENT(0x2b) getsockopt$inet_dccp_int(0xffffffffffffffff, 0x21, 0xf, &(0x7f0000000240), 0x0) fstat(0xffffffffffffffff, &(0x7f00000006c0)) getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, &(0x7f0000000440)={0x0, 0x80}, &(0x7f00000001c0)=0xfffffffffffffd3f) ioctl$FICLONE(r1, 0x40049409, r4) setgroups(0x3, &(0x7f0000000340)=[0x0, 0x0, 0x0]) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, 0x0) 14:19:15 executing program 2: getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) syz_mount_image$hfs(&(0x7f0000000200)='hfs\x00', &(0x7f0000000280)='./file0\x00', 0x600000000000000, 0x0, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 14:19:15 executing program 0: r0 = syz_open_dev$dri(0x0, 0x1, 0x0) accept$inet6(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000080)=0x1c) ioctl(r0, 0xffffffffffffffb7, &(0x7f0000000080)) [ 2740.994229] hfs: can't find a HFS filesystem on dev loop2 14:19:15 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x3, &(0x7f0000001fd8)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x15}}, &(0x7f0000000080)="47504c049c3514bf772da07ae82e76590a36f6493ec1ab91b397e42abf1ea6cd8cd77427fc9a9e2b7165f52b4107bf0850d899dc52d013175ddb1b2f46203c2a05b722e33e556fb2e3f39a3cde1fca53640337ec956146bdbfcb115070195631de5d21a5ea9e638c2bdb78a501ca4b6ea313d82568f9382c2c3f6faba6b4ee54793b4ed26dae3e52225029bb2ac0007f77754c3f23ceda9809b9a9684a940abcaa8cfcc7133ec422e9c83888318d41e9a493f0195fe2599651b89504f5dba14625ce2366f33d95dba92f867279cabf4aceddc85a8af7a0fa68d767ce5136b9d0d1966c499cb6bf34c2988666970000000000000000000000", 0x0, 0xffffffe4}, 0x48) 14:19:15 executing program 4: r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/expire_quiescent_template\x00', 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000140)=@security={'security\x00', 0xe, 0x4, 0x4b8, 0x1f0, 0x320, 0x0, 0x320, 0x320, 0x438, 0x438, 0x438, 0x438, 0x438, 0x4, &(0x7f0000000100), {[{{@ipv6={@local, @local, [0x0, 0x0, 0xffffffff, 0xffffff00], [0xffffffff, 0xff, 0xffffffff, 0xff], 'eql\x00', 'gretap0\x00', {}, {0xff}, 0x0, 0x7fffffff, 0x2, 0x61}, 0x0, 0x188, 0x1c8, 0x0, {}, [@common=@unspec=@conntrack2={0xc0, 'conntrack\x00', 0x2, {{@ipv4=@loopback, [0xffffffff, 0xffffffff, 0x0, 0xffffffff], @ipv4=@loopback, [0x0, 0xffffffff, 0xffffff00, 0xff000000], @ipv6=@ipv4={[], [], @remote}, [0xffffff00, 0xff000000, 0xff000000, 0xff], @ipv4=@multicast2, [0xffffffff, 0xff, 0xff0000ff], 0x3, 0x1ff, 0x4, 0x4e21, 0x4e20, 0x4e22, 0x4e20, 0x28}, 0x1c0, 0x98}}]}, @common=@unspec=@ERROR={0x40, 'ERROR\x00', 0x0, "f650bd5c77822a55c077a2b3078812467f4ab9fefc372cf333baff203cdb"}}, {{@ipv6={@remote, @mcast2, [0xff000000, 0xffffff00, 0xffffffff, 0xff000000], [0x0, 0xff, 0xff000000, 0xffffff00], 'syzkaller0\x00', 'lo\x00', {}, {}, 0x2b, 0x1, 0x2, 0x23}, 0x0, 0xc8, 0x108}, @common=@inet=@TCPOPTSTRIP={0x40, 'TCPOPTSTRIP\x00', 0x0, {[0xe08d, 0x6, 0xff, 0x800, 0x2, 0x7, 0x0, 0x5]}}}, {{@uncond, 0x0, 0xf0, 0x118, 0x0, {}, [@common=@hl={0x28, 'hl\x00', 0x0, {0x3, 0x604}}]}, @common=@unspec=@STANDARD={0x28, '\x00', 0x0, 0xfffffffffffffffd}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x518) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = getpgrp(0x0) prlimit64(r2, 0x0, &(0x7f00000004c0)={0x0, 0x7ffffd}, &(0x7f00000002c0)) lremovexattr(0x0, &(0x7f0000000480)=@random={'trusted.', 'bpf\x00'}) getsockopt$inet_sctp_SCTP_PR_ASSOC_STATUS(0xffffffffffffffff, 0x84, 0x73, &(0x7f0000000280), 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r3 = syz_open_dev$amidi(&(0x7f0000000100)='/dev/amidi#\x00', 0x2, 0x800) recvfrom(0xffffffffffffffff, 0x0, 0x0, 0x20, &(0x7f00000005c0)=@ipx={0x4, 0x1, 0x6, "6b183128f377"}, 0x80) r4 = geteuid() mount$bpf(0x0, &(0x7f0000000680)='./file0\x00', &(0x7f0000000740)='bpf\x00', 0x40000, &(0x7f0000000780)={[{@mode={'mode', 0x3d, 0x8001}}, {@mode={'mode', 0x3d, 0x7ff}}, {@mode={'mode', 0x3d, 0x80000000}}, {@mode={'mode', 0x3d, 0x7}}, {@mode={'mode', 0x3d, 0x3}}, {@mode={'mode', 0x3d, 0xffffffffffffffff}}], [{@uid_gt={'uid>', r4}}, {@obj_type={'obj_type', 0x3d, 'lo:'}}]}) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000200)='./file0\x00', 0x700, 0x0, &(0x7f00000024c0), 0x100032, &(0x7f00000000c0)=ANY=[@ANYBLOB]) getsockopt$inet_dccp_int(0xffffffffffffffff, 0x21, 0xf, &(0x7f0000000240), 0x0) fstat(0xffffffffffffffff, &(0x7f00000006c0)) getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, &(0x7f0000000440)={0x0, 0x80}, &(0x7f00000001c0)=0xfffffffffffffd3f) ioctl$FICLONE(r1, 0x40049409, r3) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, 0x0) 14:19:15 executing program 3: clone(0xc2b321c6db9081df, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = syz_open_dev$midi(&(0x7f0000000000)='/dev/midi#\x00', 0x7, 0x18e81) ioctl$KVM_SET_IDENTITY_MAP_ADDR(r0, 0x4008ae48, &(0x7f0000000040)=0x10f002) 14:19:16 executing program 0: r0 = syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x0, 0x0) accept$inet6(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000080)=0x1c) ioctl(r0, 0xffffffffffffffb7, &(0x7f0000000080)) [ 2741.143103] hfs: can't find a HFS filesystem on dev loop2 14:19:16 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x3, &(0x7f0000001fd8)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x15}}, &(0x7f0000000080)="47504c049c3514bf772da07ae82e76590a36f6493ec1ab91b397e42abf1ea6cd8cd77427fc9a9e2b7165f52b4107bf0850d899dc52d013175ddb1b2f46203c2a05b722e33e556fb2e3f39a3cde1fca53640337ec956146bdbfcb115070195631de5d21a5ea9e638c2bdb78a501ca4b6ea313d82568f9382c2c3f6faba6b4ee54793b4ed26dae3e52225029bb2ac0007f77754c3f23ceda9809b9a9684a940abcaa8cfcc7133ec422e9c83888318d41e9a493f0195fe2599651b89504f5dba14625ce2366f33d95dba92f867279cabf4aceddc85a8af7a0fa68d767ce5136b9d0d1966c499cb6bf34c2988666970000000000000000000000", 0x0, 0x0, 0x0, 0x4}, 0x48) 14:19:16 executing program 2: getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) syz_mount_image$hfs(&(0x7f0000000200)='hfs\x00', &(0x7f0000000280)='./file0\x00', 0x8cffffff, 0x0, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) [ 2741.295609] IPVS: ftp: loaded support on port[0] = 21 14:19:16 executing program 0: r0 = syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x1, 0x0) accept$inet6(0xffffffffffffffff, 0x0, &(0x7f0000000080)) ioctl(r0, 0xffffffffffffffb7, &(0x7f0000000080)) 14:19:16 executing program 1: r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/expire_quiescent_template\x00', 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000140)=@security={'security\x00', 0xe, 0x4, 0x4e0, 0x1f0, 0x320, 0x0, 0x320, 0x320, 0x438, 0x438, 0x438, 0x438, 0x438, 0x4, &(0x7f0000000100), {[{{@ipv6={@local, @local, [0x0, 0xffffff00, 0xffffffff, 0xffffff00], [0xffffffff, 0xff, 0xffffffff, 0xff], 'eql\x00', 'gretap0\x00', {}, {0xff}, 0x0, 0x7fffffff, 0x2, 0x61}, 0x0, 0x188, 0x1c8, 0x0, {}, [@common=@unspec=@conntrack2={0xc0, 'conntrack\x00', 0x2, {{@ipv4=@loopback, [0xffffffff, 0xffffffff, 0x0, 0xffffffff], @ipv4=@loopback, [0x0, 0xffffffff, 0xffffff00, 0xff000000], @ipv6=@ipv4={[], [], @remote}, [0xffffff00, 0xff000000, 0xff000000, 0xff], @ipv4=@multicast2, [0xffffffff, 0xff, 0xff0000ff], 0x3, 0x1ff, 0x4, 0x4e21, 0x4e20, 0x4e22, 0x4e20, 0x28, 0x20}, 0x1c0, 0x98}}]}, @common=@unspec=@ERROR={0x40, 'ERROR\x00', 0x0, "f650bd5c77822a55c077a2b3078812467f4ab9fefc372cf333baff203cdb"}}, {{@ipv6={@remote, @mcast2, [0xff000000, 0xffffff00, 0xffffffff, 0xff000000], [0x0, 0xff, 0xff000000, 0xffffff00], 'syzkaller0\x00', 'lo\x00', {}, {0xff}, 0x2b, 0x1, 0x2, 0x23}, 0x0, 0xf0, 0x130, 0x0, {}, [@common=@hl={0x28, 'hl\x00'}]}, @common=@inet=@TCPOPTSTRIP={0x40, 'TCPOPTSTRIP\x00', 0x0, {[0xe08d, 0x6, 0xff, 0x800, 0x2, 0x7, 0x3, 0x5]}}}, {{@uncond, 0x0, 0xf0, 0x118, 0x0, {}, [@common=@hl={0x28, 'hl\x00', 0x0, {0x3, 0x604}}]}, @common=@unspec=@STANDARD={0x28, '\x00', 0x0, 0xfffffffffffffffd}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x540) ioctl$EXT4_IOC_MIGRATE(0xffffffffffffffff, 0x6609) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000300)={0x0}, &(0x7f0000000400)=0xc) getsockopt$ARPT_SO_GET_INFO(r0, 0x0, 0x60, &(0x7f0000000740)={'filter\x00'}, &(0x7f00000007c0)=0x44) r3 = getpgrp(r2) prlimit64(r3, 0x0, &(0x7f00000004c0)={0x0, 0x7ffffd}, &(0x7f00000002c0)) lremovexattr(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000480)=ANY=[@ANYBLOB="747275010000002e62706600"]) getsockopt$inet_sctp_SCTP_PR_ASSOC_STATUS(0xffffffffffffffff, 0x84, 0x73, &(0x7f0000000280)={0x0, 0x8, 0x0, 0xe0}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r4 = syz_open_dev$amidi(&(0x7f0000000100)='/dev/amidi#\x00', 0x2, 0x800) recvfrom(r4, &(0x7f0000000500)=""/96, 0x60, 0x20, &(0x7f00000005c0)=@ipx={0x4, 0x1, 0x6, "6b183128f377"}, 0x80) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000200)='./file0\x00', 0x700, 0x0, &(0x7f00000024c0), 0x100032, &(0x7f00000000c0)=ANY=[@ANYBLOB]) prctl$PR_MPX_ENABLE_MANAGEMENT(0x2b) getsockopt$inet_dccp_int(0xffffffffffffffff, 0x21, 0xf, &(0x7f0000000240), 0x0) fstat(0xffffffffffffffff, &(0x7f00000006c0)) getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, &(0x7f0000000440)={0x0, 0x80}, &(0x7f00000001c0)=0xfffffffffffffd3f) ioctl$FICLONE(r1, 0x40049409, r4) openat$rfkill(0xffffffffffffff9c, &(0x7f0000000680)='/dev/rfkill\x00', 0x800, 0x0) setgroups(0x3, &(0x7f0000000340)=[0x0, 0x0, 0x0]) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, 0x0) [ 2741.446615] hfs: can't find a HFS filesystem on dev loop2 14:19:16 executing program 0: r0 = syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x1, 0x0) accept$inet6(0xffffffffffffffff, &(0x7f0000000040), 0x0) ioctl(r0, 0xffffffffffffffb7, &(0x7f0000000080)) 14:19:16 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x3, &(0x7f0000001fd8)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x15}}, &(0x7f0000000080)="47504c049c3514bf772da07ae82e76590a36f6493ec1ab91b397e42abf1ea6cd8cd77427fc9a9e2b7165f52b4107bf0850d899dc52d013175ddb1b2f46203c2a05b722e33e556fb2e3f39a3cde1fca53640337ec956146bdbfcb115070195631de5d21a5ea9e638c2bdb78a501ca4b6ea313d82568f9382c2c3f6faba6b4ee54793b4ed26dae3e52225029bb2ac0007f77754c3f23ceda9809b9a9684a940abcaa8cfcc7133ec422e9c83888318d41e9a493f0195fe2599651b89504f5dba14625ce2366f33d95dba92f867279cabf4aceddc85a8af7a0fa68d767ce5136b9d0d1966c499cb6bf34c2988666970000000000000000000000", 0x0, 0x0, 0x0, 0x29d61700}, 0x48) 14:19:16 executing program 2: getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) syz_mount_image$hfs(&(0x7f0000000200)='hfs\x00', &(0x7f0000000280)='./file0\x00', 0x6000000, 0x0, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 14:19:16 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x3, &(0x7f0000001fd8)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x15}}, &(0x7f0000000080)="47504c049c3514bf772da07ae82e76590a36f6493ec1ab91b397e42abf1ea6cd8cd77427fc9a9e2b7165f52b4107bf0850d899dc52d013175ddb1b2f46203c2a05b722e33e556fb2e3f39a3cde1fca53640337ec956146bdbfcb115070195631de5d21a5ea9e638c2bdb78a501ca4b6ea313d82568f9382c2c3f6faba6b4ee54793b4ed26dae3e52225029bb2ac0007f77754c3f23ceda9809b9a9684a940abcaa8cfcc7133ec422e9c83888318d41e9a493f0195fe2599651b89504f5dba14625ce2366f33d95dba92f867279cabf4aceddc85a8af7a0fa68d767ce5136b9d0d1966c499cb6bf34c2988666970000000000000000000000", 0x0, 0x0, 0x0, 0x43000000}, 0x48) 14:19:16 executing program 0: syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x1, 0x0) accept$inet6(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000080)=0x1c) ioctl(0xffffffffffffffff, 0xffffffffffffffb7, &(0x7f0000000080)) 14:19:16 executing program 4: r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/expire_quiescent_template\x00', 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000140)=@security={'security\x00', 0xe, 0x4, 0x4b8, 0x1f0, 0x320, 0x0, 0x320, 0x320, 0x438, 0x438, 0x438, 0x438, 0x438, 0x4, &(0x7f0000000100), {[{{@ipv6={@local, @local, [0x0, 0x0, 0xffffffff, 0xffffff00], [0xffffffff, 0xff, 0xffffffff, 0xff], 'eql\x00', 'gretap0\x00', {}, {0xff}, 0x0, 0x7fffffff, 0x2, 0x61}, 0x0, 0x188, 0x1c8, 0x0, {}, [@common=@unspec=@conntrack2={0xc0, 'conntrack\x00', 0x2, {{@ipv4=@loopback, [0xffffffff, 0xffffffff, 0x0, 0xffffffff], @ipv4=@loopback, [0x0, 0xffffffff, 0xffffff00, 0xff000000], @ipv6=@ipv4={[], [], @remote}, [0xffffff00, 0xff000000, 0xff000000, 0xff], @ipv4=@multicast2, [0xffffffff, 0xff, 0xff0000ff], 0x3, 0x1ff, 0x4, 0x4e21, 0x4e20, 0x4e22, 0x4e20, 0x28}, 0x1c0, 0x98}}]}, @common=@unspec=@ERROR={0x40, 'ERROR\x00', 0x0, "f650bd5c77822a55c077a2b3078812467f4ab9fefc372cf333baff203cdb"}}, {{@ipv6={@remote, @mcast2, [0xff000000, 0xffffff00, 0xffffffff, 0xff000000], [0x0, 0xff, 0xff000000, 0xffffff00], 'syzkaller0\x00', 'lo\x00', {}, {}, 0x2b, 0x1, 0x2, 0x23}, 0x0, 0xc8, 0x108}, @common=@inet=@TCPOPTSTRIP={0x40, 'TCPOPTSTRIP\x00', 0x0, {[0xe08d, 0x6, 0xff, 0x800, 0x2, 0x7, 0x0, 0x5]}}}, {{@uncond, 0x0, 0xf0, 0x118, 0x0, {}, [@common=@hl={0x28, 'hl\x00', 0x0, {0x3, 0x604}}]}, @common=@unspec=@STANDARD={0x28, '\x00', 0x0, 0xfffffffffffffffd}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x518) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = getpgrp(0x0) prlimit64(r2, 0x0, &(0x7f00000004c0)={0x0, 0x7ffffd}, &(0x7f00000002c0)) lremovexattr(0x0, &(0x7f0000000480)=@random={'trusted.', 'bpf\x00'}) getsockopt$inet_sctp_SCTP_PR_ASSOC_STATUS(0xffffffffffffffff, 0x84, 0x73, &(0x7f0000000280)={0x0}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r4 = syz_open_dev$amidi(&(0x7f0000000100)='/dev/amidi#\x00', 0x2, 0x800) recvfrom(0xffffffffffffffff, 0x0, 0x0, 0x20, &(0x7f00000005c0)=@ipx={0x4, 0x1, 0x6, "6b183128f377"}, 0x80) getsockopt$SO_COOKIE(r0, 0x1, 0x39, &(0x7f0000000680), &(0x7f0000000800)=0x8) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000200)='./file0\x00', 0x700, 0x0, &(0x7f00000024c0), 0x100032, &(0x7f0000000740)=ANY=[@ANYBLOB="ff766180f06dd1d4a4cc41ff15ed541bbc6f42d3a1648d36527e965742376006ab32ef21e6dfc86e2f7bd7eb4fe3aa67b6e661257d0e33a57215e00e371fd762fff66cea3e81471a46f5389bfce53b73e6245b05bb083fbf26dd76ffdd4a202e88458213816269a23c05f8b055fe253740cb511571af5b470881b9f761232baf217b22689b34453d5f654988541e08a7024d6a24cb36c185"]) getsockopt$inet_dccp_int(0xffffffffffffffff, 0x21, 0xf, &(0x7f0000000240), 0x0) fstat(0xffffffffffffffff, &(0x7f00000006c0)) getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, &(0x7f0000000840)={r3, 0x8}, &(0x7f0000000880)=0x8) ioctl$FICLONE(r1, 0x40049409, r4) mkdir(&(0x7f0000000900)='./file0\x00', 0x40) mlockall(0x3) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, 0x0) [ 2741.782235] hfs: can't find a HFS filesystem on dev loop2 [ 2741.867429] hfs: can't find a HFS filesystem on dev loop2 14:19:16 executing program 3: clone(0xc2b321c6db9081df, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = accept4(0xffffffffffffffff, &(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @mcast2}, &(0x7f0000000140)=0x80, 0x800) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, &(0x7f0000000180)={'ah\x00'}, &(0x7f00000001c0)=0x1e) 14:19:16 executing program 0: r0 = syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x1, 0x0) accept$inet6(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000080)=0x1c) ioctl(r0, 0x0, &(0x7f0000000080)) 14:19:16 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x3, &(0x7f0000001fd8)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x15}}, &(0x7f0000000080)="47504c049c3514bf772da07ae82e76590a36f6493ec1ab91b397e42abf1ea6cd8cd77427fc9a9e2b7165f52b4107bf0850d899dc52d013175ddb1b2f46203c2a05b722e33e556fb2e3f39a3cde1fca53640337ec956146bdbfcb115070195631de5d21a5ea9e638c2bdb78a501ca4b6ea313d82568f9382c2c3f6faba6b4ee54793b4ed26dae3e52225029bb2ac0007f77754c3f23ceda9809b9a9684a940abcaa8cfcc7133ec422e9c83888318d41e9a493f0195fe2599651b89504f5dba14625ce2366f33d95dba92f867279cabf4aceddc85a8af7a0fa68d767ce5136b9d0d1966c499cb6bf34c2988666970000000000000000000000", 0x0, 0x0, 0x0, 0x100000}, 0x48) 14:19:16 executing program 2: getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) syz_mount_image$hfs(&(0x7f0000000200)='hfs\x00', &(0x7f0000000280)='./file0\x00', 0x2300, 0x0, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 14:19:17 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x3, &(0x7f0000001fd8)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x15}}, &(0x7f0000000080)="47504c049c3514bf772da07ae82e76590a36f6493ec1ab91b397e42abf1ea6cd8cd77427fc9a9e2b7165f52b4107bf0850d899dc52d013175ddb1b2f46203c2a05b722e33e556fb2e3f39a3cde1fca53640337ec956146bdbfcb115070195631de5d21a5ea9e638c2bdb78a501ca4b6ea313d82568f9382c2c3f6faba6b4ee54793b4ed26dae3e52225029bb2ac0007f77754c3f23ceda9809b9a9684a940abcaa8cfcc7133ec422e9c83888318d41e9a493f0195fe2599651b89504f5dba14625ce2366f33d95dba92f867279cabf4aceddc85a8af7a0fa68d767ce5136b9d0d1966c499cb6bf34c2988666970000000000000000000000", 0x0, 0x0, 0x0, 0x40000000}, 0x48) [ 2742.133593] IPVS: ftp: loaded support on port[0] = 21 14:19:17 executing program 1: r0 = syz_open_dev$midi(&(0x7f0000000840)='/dev/midi#\x00', 0xffffffff00000001, 0x40) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, &(0x7f0000000880)={0x0, @in={{0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x1b}}}, 0x9, 0x9}, &(0x7f0000000940)=0x90) getsockopt$inet_sctp_SCTP_ASSOCINFO(r0, 0x84, 0x1, &(0x7f0000000980)={r1, 0xfffffffffffff001, 0xfffffffffffffff7, 0x5, 0x200, 0xe0}, &(0x7f00000009c0)=0x14) r2 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/expire_quiescent_template\x00', 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r2, 0x29, 0x40, &(0x7f0000000140)=@security={'security\x00', 0xe, 0x4, 0x4e0, 0x1f0, 0x320, 0x0, 0x320, 0x320, 0x438, 0x438, 0x438, 0x438, 0x438, 0x4, &(0x7f0000000100), {[{{@ipv6={@local, @local, [0x0, 0xffffff00, 0xffffffff, 0xffffff00], [0xffffffff, 0xff, 0xffffffff, 0xff], 'eql\x00', 'gretap0\x00', {}, {0xff}, 0x0, 0x7fffffff, 0x2, 0x61}, 0x0, 0x188, 0x1c8, 0x0, {}, [@common=@unspec=@conntrack2={0xc0, 'conntrack\x00', 0x2, {{@ipv4=@loopback, [0xffffffff, 0xffffffff, 0x0, 0xffffffff], @ipv4=@loopback, [0x0, 0xffffffff, 0xffffff00, 0xff000000], @ipv6=@ipv4={[], [], @remote}, [0xffffff00, 0xff000000, 0xff000000, 0xff], @ipv4=@multicast2, [0xffffffff, 0xff, 0xff0000ff], 0x3, 0x1ff, 0x4, 0x4e21, 0x4e20, 0x4e22, 0x4e20, 0x28, 0x20}, 0x1c0, 0x98}}]}, @common=@unspec=@ERROR={0x40, 'ERROR\x00', 0x0, "f650bd5c77822a55c077a2b3078812467f4ab9fefc372cf333baff203cdb"}}, {{@ipv6={@remote, @mcast2, [0xff000000, 0xffffff00, 0xffffffff, 0xff000000], [0x0, 0xff, 0xff000000, 0xffffff00], 'syzkaller0\x00', 'lo\x00', {}, {0xff}, 0x2b, 0x1, 0x2, 0x23}, 0x0, 0xf0, 0x130, 0x0, {}, [@common=@hl={0x28, 'hl\x00'}]}, @common=@inet=@TCPOPTSTRIP={0x40, 'TCPOPTSTRIP\x00', 0x0, {[0xe08d, 0x6, 0xff, 0x800, 0x2, 0x7, 0x3, 0x5]}}}, {{@uncond, 0x0, 0xf0, 0x118, 0x0, {}, [@common=@hl={0x28, 'hl\x00', 0x0, {0x3, 0x604}}]}, @common=@unspec=@STANDARD={0x28, '\x00', 0x0, 0xfffffffffffffffd}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x540) ioctl$EXT4_IOC_MIGRATE(0xffffffffffffffff, 0x6609) r3 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000300)={0x0}, &(0x7f0000000400)=0xc) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000001c00)={r0, &(0x7f0000000b80)="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", &(0x7f0000001b80)=""/107}, 0x18) getsockopt$ARPT_SO_GET_INFO(r2, 0x0, 0x60, &(0x7f0000000740)={'filter\x00'}, &(0x7f00000007c0)=0x44) r5 = getpgrp(r4) prlimit64(r5, 0x0, &(0x7f00000004c0)={0x0, 0x7ffffd}, &(0x7f00000002c0)) lremovexattr(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000480)=@random={'trusted.', 'bpf\x00'}) getsockopt$inet_sctp_SCTP_PR_ASSOC_STATUS(0xffffffffffffffff, 0x84, 0x73, &(0x7f0000000280)={0x0, 0x8, 0x0, 0xe0}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r2, 0x84, 0x66, &(0x7f0000000680)={r6, 0x6}, &(0x7f0000000800)=0x8) r7 = syz_open_dev$amidi(&(0x7f0000000100)='/dev/amidi#\x00', 0x2, 0x800) recvfrom(r7, &(0x7f0000000500)=""/96, 0x60, 0x20, &(0x7f00000005c0)=@ipx={0x4, 0x1, 0x6, "6b183128f377"}, 0x80) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000200)='./file0\x00', 0x700, 0x0, &(0x7f00000024c0), 0x100032, &(0x7f0000000a00)=ANY=[@ANYBLOB="976a23d6a5fa24bc1eece93c152c226cb08bcdb088578ad2cb1992384c8500b6dffabeadc30273f64fca9402fa22c2797ba51929ac5bcaaad264595d1b2075a1cf9b5442976d27d828e42e78b9b9e459c0d2322e828ccd6b5df352fc330d552731f4cb2922737a9233338a96fc580000010071f57f23ab40a4c407bac460e4812693941ff00589b96c7236c89eb6a237bbf4209a252ae07e9a9a3c3c68a032a85c2b8bbf54a9180e6bb4e6108592591d821f62302bac21bcf2f6ee629ef986d162abcd34f0e89b157bacab50845a9a934b6eb448d25b86d298427d8cb6035a9c508c6a262135b714478d5304efd49dcc596ac0dd78316ede96ed3473230b3db0b58d6486b6fceaeb0f312863ac185467cd98a1b0d95c8e61d37dbf8069602acde138e7bfb17388d91694876ed1c608bb17d626466f1ef3758c20bdb29092bcf5a9d087ac6bc0ad00753ac1b48a335ae7bdf9a3f09235d4244590b306090a518bc2b855882f35b9254e116022606dd67a03606d"]) prctl$PR_MPX_ENABLE_MANAGEMENT(0x2b) getsockopt$inet_dccp_int(0xffffffffffffffff, 0x21, 0xf, &(0x7f0000000240), 0x0) fstat(0xffffffffffffffff, &(0x7f00000006c0)) getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, &(0x7f0000000440)={0x0, 0x80}, &(0x7f00000001c0)=0xfffffffffffffd3f) ioctl$FICLONE(r3, 0x40049409, r7) setgroups(0x3, &(0x7f0000000340)=[0x0, 0x0, 0x0]) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, 0x0) 14:19:17 executing program 0: r0 = syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x1, 0x0) accept$inet6(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000080)=0x1c) ioctl(r0, 0x0, &(0x7f0000000080)) [ 2742.317357] hfs: can't find a HFS filesystem on dev loop2 14:19:17 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x3, &(0x7f0000001fd8)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x15}}, &(0x7f0000000080)="47504c049c3514bf772da07ae82e76590a36f6493ec1ab91b397e42abf1ea6cd8cd77427fc9a9e2b7165f52b4107bf0850d899dc52d013175ddb1b2f46203c2a05b722e33e556fb2e3f39a3cde1fca53640337ec956146bdbfcb115070195631de5d21a5ea9e638c2bdb78a501ca4b6ea313d82568f9382c2c3f6faba6b4ee54793b4ed26dae3e52225029bb2ac0007f77754c3f23ceda9809b9a9684a940abcaa8cfcc7133ec422e9c83888318d41e9a493f0195fe2599651b89504f5dba14625ce2366f33d95dba92f867279cabf4aceddc85a8af7a0fa68d767ce5136b9d0d1966c499cb6bf34c2988666970000000000000000000000", 0x0, 0x0, 0x0, 0x3000000}, 0x48) 14:19:17 executing program 0: r0 = syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x1, 0x0) accept$inet6(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000080)=0x1c) ioctl(r0, 0x0, &(0x7f0000000080)) [ 2742.437456] hfs: can't find a HFS filesystem on dev loop2 14:19:17 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x3, &(0x7f0000001fd8)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x15}}, &(0x7f0000000080)="47504c049c3514bf772da07ae82e76590a36f6493ec1ab91b397e42abf1ea6cd8cd77427fc9a9e2b7165f52b4107bf0850d899dc52d013175ddb1b2f46203c2a05b722e33e556fb2e3f39a3cde1fca53640337ec956146bdbfcb115070195631de5d21a5ea9e638c2bdb78a501ca4b6ea313d82568f9382c2c3f6faba6b4ee54793b4ed26dae3e52225029bb2ac0007f77754c3f23ceda9809b9a9684a940abcaa8cfcc7133ec422e9c83888318d41e9a493f0195fe2599651b89504f5dba14625ce2366f33d95dba92f867279cabf4aceddc85a8af7a0fa68d767ce5136b9d0d1966c499cb6bf34c2988666970000000000000000000000", 0x0, 0x0, 0x0, 0x4300}, 0x48) 14:19:17 executing program 2: getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) syz_mount_image$hfs(&(0x7f0000000200)='hfs\x00', &(0x7f0000000280)='./file0\x00', 0x6000, 0x0, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) [ 2742.715941] EXT4-fs: 15 callbacks suppressed [ 2742.715991] EXT4-fs (sda1): re-mounted. Opts: [ 2742.726637] hfs: can't find a HFS filesystem on dev loop2 [ 2742.806048] EXT4-fs (sda1): Unrecognized mount option "j#֥$<" or missing value [ 2742.867745] hfs: can't find a HFS filesystem on dev loop2 [ 2742.885507] EXT4-fs (sda1): re-mounted. Opts: [ 2743.009614] EXT4-fs (sda1): Unrecognized mount option "vamԤAToBӡd6R~WB7`2!n/{Oga%}3r7bl>GF8;s$[?&vJ .Ebi<U%7@Qq[Ga#+!{"h4E=_eITMj$6" or missing value 14:19:18 executing program 4: r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/expire_quiescent_template\x00', 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000140)=@security={'security\x00', 0xe, 0x4, 0x4b8, 0x1f0, 0x320, 0x0, 0x320, 0x320, 0x438, 0x438, 0x438, 0x438, 0x438, 0x4, &(0x7f0000000100), {[{{@ipv6={@local, @local, [0x0, 0x0, 0xffffffff, 0xffffff00], [0xffffffff, 0xff, 0xffffffff, 0xff], 'eql\x00', 'gretap0\x00', {}, {0xff}, 0x0, 0x7fffffff, 0x2, 0x61}, 0x0, 0x188, 0x1c8, 0x0, {}, [@common=@unspec=@conntrack2={0xc0, 'conntrack\x00', 0x2, {{@ipv4=@loopback, [0xffffffff, 0xffffffff, 0x0, 0xffffffff], @ipv4=@loopback, [0x0, 0xffffffff, 0xffffff00, 0xff000000], @ipv6=@ipv4={[], [], @remote}, [0xffffff00, 0xff000000, 0xff000000, 0xff], @ipv4=@multicast2, [0xffffffff, 0xff, 0xff0000ff], 0x3, 0x1ff, 0x4, 0x4e21, 0x4e20, 0x4e22, 0x4e20, 0x28}, 0x1c0, 0x98}}]}, @common=@unspec=@ERROR={0x40, 'ERROR\x00', 0x0, "f650bd5c77822a55c077a2b3078812467f4ab9fefc372cf333baff203cdb"}}, {{@ipv6={@remote, @mcast2, [0xff000000, 0xffffff00, 0xffffffff, 0xff000000], [0x0, 0xff, 0xff000000, 0xffffff00], 'syzkaller0\x00', 'lo\x00', {}, {}, 0x2b, 0x1, 0x2, 0x23}, 0x0, 0xc8, 0x108}, @common=@inet=@TCPOPTSTRIP={0x40, 'TCPOPTSTRIP\x00', 0x0, {[0xe08d, 0x6, 0xff, 0x800, 0x2, 0x7, 0x0, 0x5]}}}, {{@uncond, 0x0, 0xf0, 0x118, 0x0, {}, [@common=@hl={0x28, 'hl\x00', 0x0, {0x3, 0x604}}]}, @common=@unspec=@STANDARD={0x28, '\x00', 0x0, 0xfffffffffffffffd}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x518) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = getpgrp(0x0) prlimit64(r2, 0x0, &(0x7f00000004c0)={0x0, 0x7ffffd}, &(0x7f00000002c0)) lremovexattr(0x0, &(0x7f0000000480)=@random={'trusted.', 'bpf\x00'}) getsockopt$inet_sctp_SCTP_PR_ASSOC_STATUS(0xffffffffffffffff, 0x84, 0x73, &(0x7f0000000280), 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r3 = syz_open_dev$amidi(&(0x7f0000000100)='/dev/amidi#\x00', 0x2, 0x800) recvfrom(0xffffffffffffffff, 0x0, 0x0, 0x20, &(0x7f00000005c0)=@ipx={0x4, 0x1, 0x6, "6b183128f377"}, 0x80) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000200)='./file0\x00', 0x700, 0x0, &(0x7f00000024c0), 0x100032, &(0x7f00000000c0)=ANY=[@ANYBLOB]) getsockopt$inet_dccp_int(0xffffffffffffffff, 0x21, 0xf, &(0x7f0000000240), 0x0) fstat(0xffffffffffffffff, &(0x7f00000006c0)) getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, &(0x7f0000000440)={0x0, 0x80}, &(0x7f00000001c0)=0xfffffffffffffd3f) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(r0, 0xc0505405, &(0x7f0000000740)={{0x3, 0x2, 0x9, 0x3, 0x1}, 0x50d3, 0x0, 0x40}) ioctl$FICLONE(r1, 0x40049409, r3) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, 0x0) 14:19:18 executing program 0: r0 = syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x1, 0x0) accept$inet6(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000080)=0x1c) ioctl(r0, 0xffffffffffffffb7, 0x0) 14:19:18 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x3, &(0x7f0000001fd8)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x15}}, &(0x7f0000000080)="47504c049c3514bf772da07ae82e76590a36f6493ec1ab91b397e42abf1ea6cd8cd77427fc9a9e2b7165f52b4107bf0850d899dc52d013175ddb1b2f46203c2a05b722e33e556fb2e3f39a3cde1fca53640337ec956146bdbfcb115070195631de5d21a5ea9e638c2bdb78a501ca4b6ea313d82568f9382c2c3f6faba6b4ee54793b4ed26dae3e52225029bb2ac0007f77754c3f23ceda9809b9a9684a940abcaa8cfcc7133ec422e9c83888318d41e9a493f0195fe2599651b89504f5dba14625ce2366f33d95dba92f867279cabf4aceddc85a8af7a0fa68d767ce5136b9d0d1966c499cb6bf34c2988666970000000000000000000000", 0x0, 0x0, 0x0, 0xffffff80}, 0x48) 14:19:18 executing program 3: clone(0xc2b321c6db9081df, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clock_gettime(0x0, &(0x7f0000002f40)={0x0, 0x0}) recvmmsg(0xffffffffffffffff, &(0x7f0000002e00)=[{{&(0x7f0000000000)=@ax25, 0x80, &(0x7f00000001c0)=[{&(0x7f0000000080)=""/236, 0xec}, {&(0x7f0000000180)=""/20, 0x14}], 0x2, &(0x7f0000000200)=""/195, 0xc3, 0xea}, 0x3}, {{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000300)=""/218, 0xda}, {&(0x7f0000000400)=""/42, 0xffffffb3}, {&(0x7f0000000440)=""/131, 0x83}, {&(0x7f0000000500)=""/200, 0xc8}, {&(0x7f0000000600)=""/228, 0xe4}], 0x5, 0x0, 0x0, 0xabd1}, 0x100}, {{&(0x7f0000000780)=@rc, 0x80, &(0x7f0000001900)=[{&(0x7f0000000800)=""/96, 0x60}, {&(0x7f0000000880)=""/4096, 0x1000}, {&(0x7f0000001880)=""/68, 0x44}], 0x3, &(0x7f0000001940)=""/195, 0xc3, 0x21}, 0x6}, {{&(0x7f0000001a40)=@rc, 0x80, &(0x7f0000001b00)=[{&(0x7f0000001ac0)=""/30, 0x1e}], 0xb0, &(0x7f0000001b40)=""/212, 0xd4, 0x8}, 0x80000000}, {{&(0x7f0000001c40)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @empty}}}, 0x80, &(0x7f0000002dc0)=[{&(0x7f0000003000)=""/4096, 0x1000}, {&(0x7f0000002cc0)=""/215, 0xd7}], 0x2, 0x0, 0x0, 0x3}, 0xc4eb}], 0x5, 0x60, &(0x7f0000002f80)={r0, r1+10000000}) setsockopt$netlink_NETLINK_CAP_ACK(r2, 0x10e, 0xa, &(0x7f0000002fc0)=0x3, 0x4) 14:19:18 executing program 1: r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/expire_quiescent_template\x00', 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000140)=ANY=[@ANYBLOB="73656375726974790000000000000000000000000000000000000000000000000e00000004000000e0040000f001000020030000000000002003000020030000380400003804000038040000380400003804000004000000", @ANYPTR=&(0x7f0000000980)=ANY=[@ANYBLOB="000000000000000000030000000000000000000000000000000000000000000000000000000000000000003e00190000000000cc2fad6198f86ed0d4ae8c3cd17161c46896eeb1d6c7d76510d5f8b030101338fa34dc3d2d03b339ba7c8c85aa51a981d1ceba59c3c4175fd4ed37fabb2314aa2d14de28660f0b834c7f58f3ef21a02e7b143d41300e06bf9934bbdc545e552770db702bc4c031dd8d67a3"], @ANYBLOB="fe8000000000000000000000000000aafe8000000000000000000000000000aa00000000ffffff00ffffffffffffff00ffffffff000000ffffffffff000000ff65716c0000000000000000000000000067726574617030000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ff000000000000000000000000000000000000ff02610000000000000000000000000000008801c801000000000000000000000000000000000000000000000000c000636f6e6e747261636b0000000000000000000000000000000000000000027f000001000000000000000000000000ffffffffffffffff00000000ffffffff7f00000100000000000000000000000000000000ffffffffffffff00ff00000000000000000000000000ffffac1414bbffffff00ff000000ff000000000000ffe0000002000000000000000000000000ffffffff000000ffff0000ff0000000003000000ff01000004004e214e204e224e20280020000000c00198000000000040004552524f5200000000000000000000000000000000000000000000000000f650bd5c77822a55c077a2b3078812467f4ab9fefc372cf333baff203cdb0000fe8000000000000000000000000000bbff020000000000000000000000000001ff000000ffffff00ffffffffff00000000000000000000ffff000000ffffff0073797a6b616c6c6572300000000000006c6f0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ff000000000000000000000000000000002b00010223000000000000000000000000000000f00030010000000000000000000000000000000000000000000000002800686c00000000000000000000000000000000000000000000000000000000000000000000000040005443504f50545354524950000000000000000000000000000000000000008de0000006000000ff000000000800000200000007000000030000000500000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f00018010000000000000000000000000000000000000000000000002800686c0000000000000000000000000000000000000000000000000000000003040000000000002800000000000000000000000000000000000000000000000000000000000000fdffffff000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a800d0000000000000000000000000000000000000000000000000002800000000000000000000000000000000000000000000000000000000000000feffffff00000000"], 0x540) ioctl$EXT4_IOC_MIGRATE(0xffffffffffffffff, 0x6609) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000300)={0x0}, &(0x7f0000000400)=0xc) getsockopt$ARPT_SO_GET_INFO(r0, 0x0, 0x60, &(0x7f0000000740)={'filter\x00'}, &(0x7f00000007c0)=0x44) r3 = getpgrp(r2) prlimit64(r3, 0x0, &(0x7f00000004c0)={0x0, 0x7ffffd}, &(0x7f00000002c0)) lremovexattr(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000880)=ANY=[@ANYBLOB="747275737465642e62706600eea8f8e963148adb1c8066d99f64c157c783d52d88859b4de6266bdb6ef12c229a5c1c673fa69b4c4cae2d2e15101e2e0d2705284f779192456c88628b704bc66dfe48cd2a336e11df9215e040f9b9b146fc74d4e3f8d9c8b7c21e8870ae6d1bd9893224e01744b6fa15a27529373562857d87e6e3351e5293f1ba8c843f3b2b3976b7bb0dbc31e090464fb16aeb46309880327601ed6d3b49ed00d66ad37a156555e3406944e3ef1c9ea00a063c175767493c68fe66f0247353d12141845e40"]) getsockopt$inet_sctp_SCTP_PR_ASSOC_STATUS(0xffffffffffffffff, 0x84, 0x73, &(0x7f0000000280)={0x0, 0x8, 0x0, 0xe0}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) getsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r0, 0x84, 0x8, &(0x7f0000000a40), &(0x7f0000000a80)=0x4) r4 = syz_open_dev$amidi(&(0x7f0000000100)='/dev/amidi#\x00', 0x2, 0x800) recvfrom(r4, &(0x7f0000000500)=""/96, 0x60, 0x20, &(0x7f00000005c0)=@ipx={0x4, 0x1, 0x6, "6b183128f377"}, 0x80) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) ioctl$sock_kcm_SIOCKCMATTACH(r4, 0x89e0, &(0x7f0000000ac0)={r0, r4}) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000200)='./file0\x00', 0x700, 0x0, &(0x7f00000024c0), 0x100032, &(0x7f00000000c0)=ANY=[@ANYBLOB]) prctl$PR_MPX_ENABLE_MANAGEMENT(0x2b) getsockopt$inet_dccp_int(0xffffffffffffffff, 0x21, 0xf, &(0x7f0000000240), 0x0) fstat(0xffffffffffffffff, &(0x7f00000006c0)) getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, &(0x7f0000000440)={0x0, 0x80}, &(0x7f00000001c0)=0xfffffffffffffd3f) ioctl$FICLONE(r1, 0x40049409, r4) setgroups(0x3, &(0x7f0000000340)=[0x0, 0x0, 0x0]) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) accept$nfc_llcp(r0, &(0x7f0000000800), &(0x7f0000000680)=0x60) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, 0x0) 14:19:18 executing program 2: getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) syz_mount_image$hfs(&(0x7f0000000200)='hfs\x00', &(0x7f0000000280)='./file0\x00', 0xc0ed0000, 0x0, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) [ 2743.287260] IPVS: ftp: loaded support on port[0] = 21 14:19:18 executing program 0: clone(0xc29321c6db9081dd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = syz_open_dev$media(&(0x7f00000000c0)='/dev/media#\x00', 0x4, 0x20000) ioctl$UI_SET_SWBIT(r0, 0x4004556d, 0x1) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(0xffffffffffffffff, 0x84, 0x70, &(0x7f0000000100)={0x0, @in={{0x2, 0x4e22, @rand_addr=0x51b5}}, [0x3, 0x7ff, 0x9, 0xf422, 0xff, 0x7, 0x100000001, 0x9, 0x3, 0x8, 0xfffffffffffffffe, 0xe26c, 0x80000000000, 0x101, 0x200]}, &(0x7f0000000200)=0x100) ioctl$TUNSETTXFILTER(r0, 0x400454d1, &(0x7f0000000040)=ANY=[@ANYBLOB="01002eaabb00000000000000c1ae8967fc000000000000000000000000000001000000d62cde7ee0be6e13bd67cb384a2862b0d82f4be632a043ab53"]) r2 = dup3(r0, r0, 0x80000) pread64(r2, &(0x7f00000003c0)=""/117, 0x75, 0x0) getsockopt$inet_sctp6_SCTP_PR_ASSOC_STATUS(0xffffffffffffff9c, 0x84, 0x73, &(0x7f0000000240)={0x0, 0x1000, 0x30, 0x8, 0x16a1}, &(0x7f0000000280)=0x18) getsockopt$inet_sctp6_SCTP_STATUS(r0, 0x84, 0xe, &(0x7f00000002c0)={r1, 0x3, 0x6, 0x210, 0x8001, 0x3, 0x200, 0x8, {r3, @in={{0x2, 0x4e21, @rand_addr=0x3}}, 0x7a5, 0xffffffffffffff17, 0x10000, 0x2, 0x7ff}}, &(0x7f0000000380)=0xb0) ioctl$SG_EMULATED_HOST(r0, 0x2203, &(0x7f0000000080)) ioctl$BLKRAGET(r2, 0x1263, &(0x7f0000000000)) 14:19:18 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x3, &(0x7f0000001fd8)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x15}}, &(0x7f0000000080)="47504c049c3514bf772da07ae82e76590a36f6493ec1ab91b397e42abf1ea6cd8cd77427fc9a9e2b7165f52b4107bf0850d899dc52d013175ddb1b2f46203c2a05b722e33e556fb2e3f39a3cde1fca53640337ec956146bdbfcb115070195631de5d21a5ea9e638c2bdb78a501ca4b6ea313d82568f9382c2c3f6faba6b4ee54793b4ed26dae3e52225029bb2ac0007f77754c3f23ceda9809b9a9684a940abcaa8cfcc7133ec422e9c83888318d41e9a493f0195fe2599651b89504f5dba14625ce2366f33d95dba92f867279cabf4aceddc85a8af7a0fa68d767ce5136b9d0d1966c499cb6bf34c2988666970000000000000000000000", 0x0, 0x0, 0x0, 0x1c}, 0x48) [ 2743.327833] hfs: can't find a HFS filesystem on dev loop2 [ 2743.439574] IPVS: ftp: loaded support on port[0] = 21 14:19:18 executing program 2: getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) syz_mount_image$hfs(&(0x7f0000000200)='hfs\x00', &(0x7f0000000280)='./file0\x00', 0xe000000000000, 0x0, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 14:19:18 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x3, &(0x7f0000001fd8)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x15}}, &(0x7f0000000080)="47504c049c3514bf772da07ae82e76590a36f6493ec1ab91b397e42abf1ea6cd8cd77427fc9a9e2b7165f52b4107bf0850d899dc52d013175ddb1b2f46203c2a05b722e33e556fb2e3f39a3cde1fca53640337ec956146bdbfcb115070195631de5d21a5ea9e638c2bdb78a501ca4b6ea313d82568f9382c2c3f6faba6b4ee54793b4ed26dae3e52225029bb2ac0007f77754c3f23ceda9809b9a9684a940abcaa8cfcc7133ec422e9c83888318d41e9a493f0195fe2599651b89504f5dba14625ce2366f33d95dba92f867279cabf4aceddc85a8af7a0fa68d767ce5136b9d0d1966c499cb6bf34c2988666970000000000000000000000", 0x0, 0x0, 0x0, 0x3f00000000000000}, 0x48) [ 2743.543263] EXT4-fs (sda1): re-mounted. Opts: [ 2743.676482] EXT4-fs (sda1): Unrecognized mount option "./file0" or missing value 14:19:18 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x3, &(0x7f0000001fd8)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x15}}, &(0x7f0000000080)="47504c049c3514bf772da07ae82e76590a36f6493ec1ab91b397e42abf1ea6cd8cd77427fc9a9e2b7165f52b4107bf0850d899dc52d013175ddb1b2f46203c2a05b722e33e556fb2e3f39a3cde1fca53640337ec956146bdbfcb115070195631de5d21a5ea9e638c2bdb78a501ca4b6ea313d82568f9382c2c3f6faba6b4ee54793b4ed26dae3e52225029bb2ac0007f77754c3f23ceda9809b9a9684a940abcaa8cfcc7133ec422e9c83888318d41e9a493f0195fe2599651b89504f5dba14625ce2366f33d95dba92f867279cabf4aceddc85a8af7a0fa68d767ce5136b9d0d1966c499cb6bf34c2988666970000000000000000000000", 0x0, 0x0, 0x0, 0x4000000000000000}, 0x48) 14:19:18 executing program 3: r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/expire_quiescent_template\x00', 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000140)=@security={'security\x00', 0xe, 0x4, 0x4e0, 0x1f0, 0x320, 0x0, 0x320, 0x320, 0x438, 0x438, 0x438, 0x438, 0x438, 0x4, &(0x7f0000000100), {[{{@ipv6={@local, @local, [0x0, 0xffffff00, 0xffffffff, 0xffffff00], [0xffffffff, 0xff, 0xffffffff, 0xff], 'eql\x00', 'gretap0\x00', {}, {0xff}, 0x0, 0x7fffffff, 0x2, 0x61}, 0x0, 0x188, 0x1c8, 0x0, {}, [@common=@unspec=@conntrack2={0xc0, 'conntrack\x00', 0x2, {{@ipv4=@loopback, [0xffffffff, 0xffffffff, 0x0, 0xffffffff], @ipv4=@loopback, [0x0, 0xffffffff, 0xffffff00, 0xff000000], @ipv6=@ipv4={[], [], @remote}, [0xffffff00, 0xff000000, 0xff000000, 0xff], @ipv4=@multicast2, [0xffffffff, 0xff, 0xff0000ff], 0x3, 0x1ff, 0x4, 0x4e21, 0x4e20, 0x4e22, 0x4e20, 0x28, 0x20}, 0x1c0, 0x98}}]}, @common=@unspec=@ERROR={0x40, 'ERROR\x00', 0x0, "f650bd5c77822a55c077a2b3078812467f4ab9fefc372cf333baff203cdb"}}, {{@ipv6={@remote, @mcast2, [0xff000000, 0xffffff00, 0xffffffff, 0xff000000], [0x0, 0xff, 0xff000000, 0xffffff00], 'syzkaller0\x00', 'lo\x00', {}, {0xff}, 0x2b, 0x1, 0x2, 0x23}, 0x0, 0xf0, 0x130, 0x0, {}, [@common=@hl={0x28, 'hl\x00'}]}, @common=@inet=@TCPOPTSTRIP={0x40, 'TCPOPTSTRIP\x00', 0x0, {[0xe08d, 0x6, 0xff, 0x800, 0x2, 0x7, 0x3, 0x5]}}}, {{@uncond, 0x0, 0xf0, 0x118, 0x0, {}, [@common=@hl={0x28, 'hl\x00', 0x0, {0x3, 0x604}}]}, @common=@unspec=@STANDARD={0x28, '\x00', 0x0, 0xfffffffffffffffd}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x540) ioctl$EXT4_IOC_MIGRATE(0xffffffffffffffff, 0x6609) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000300)={0x0}, &(0x7f0000000400)=0xc) getsockopt$ARPT_SO_GET_INFO(r0, 0x0, 0x60, &(0x7f0000000740)={'filter\x00'}, &(0x7f00000007c0)=0x44) r3 = getpgrp(r2) prlimit64(r3, 0x0, &(0x7f00000004c0)={0x0, 0x7ffffd}, &(0x7f00000002c0)) lremovexattr(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000480)=@random={'trusted.', 'bpf\x00'}) getsockopt$inet_sctp_SCTP_PR_ASSOC_STATUS(0xffffffffffffffff, 0x84, 0x73, &(0x7f0000000280)={0x0, 0x8, 0x0, 0xe0}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r4 = syz_open_dev$amidi(&(0x7f0000000100)='/dev/amidi#\x00', 0x2, 0x800) recvfrom(r4, &(0x7f0000000500)=""/96, 0x60, 0x20, &(0x7f00000005c0)=@ipx={0x4, 0x1, 0x6, "6b183128f377"}, 0x80) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000200)='./file0\x00', 0x700, 0x8, &(0x7f00000024c0), 0x100032, &(0x7f00000000c0)=ANY=[@ANYBLOB]) prctl$PR_MPX_ENABLE_MANAGEMENT(0x2b) getsockopt$inet_dccp_int(0xffffffffffffffff, 0x21, 0xf, &(0x7f0000000240), 0x0) fstat(0xffffffffffffffff, &(0x7f00000006c0)) getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, &(0x7f0000000440)={0x0, 0x80}, &(0x7f00000001c0)=0xfffffffffffffd3f) ioctl$FICLONE(r1, 0x40049409, r4) setgroups(0x3, &(0x7f0000000340)=[0x0, 0x0, 0x0]) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, 0x0) [ 2743.732748] hfs: can't find a HFS filesystem on dev loop2 [ 2743.770090] EXT4-fs (sda1): re-mounted. Opts: [ 2743.794477] hfs: can't find a HFS filesystem on dev loop2 14:19:18 executing program 4: r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/expire_quiescent_template\x00', 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000140)=@security={'security\x00', 0xe, 0x4, 0x4b8, 0x1f0, 0x320, 0x0, 0x320, 0x320, 0x438, 0x438, 0x438, 0x438, 0x438, 0x4, &(0x7f0000000100), {[{{@ipv6={@local, @local, [0x0, 0x0, 0xffffffff, 0xffffff00], [0xffffffff, 0xff, 0xffffffff, 0xff], 'eql\x00', 'gretap0\x00', {}, {0xff}, 0x0, 0x7fffffff, 0x2, 0x61}, 0x0, 0x188, 0x1c8, 0x0, {}, [@common=@unspec=@conntrack2={0xc0, 'conntrack\x00', 0x2, {{@ipv4=@loopback, [0xffffffff, 0xffffffff, 0x0, 0xffffffff], @ipv4=@loopback, [0x0, 0xffffffff, 0xffffff00, 0xff000000], @ipv6=@ipv4={[], [], @remote}, [0xffffff00, 0xff000000, 0xff000000, 0xff], @ipv4=@multicast2, [0xffffffff, 0xff, 0xff0000ff], 0x3, 0x1ff, 0x4, 0x4e21, 0x4e20, 0x4e22, 0x4e20, 0x28}, 0x1c0, 0x98}}]}, @common=@unspec=@ERROR={0x40, 'ERROR\x00', 0x0, "f650bd5c77822a55c077a2b3078812467f4ab9fefc372cf333baff203cdb"}}, {{@ipv6={@remote, @mcast2, [0xff000000, 0xffffff00, 0xffffffff, 0xff000000], [0x0, 0xff, 0xff000000, 0xffffff00], 'syzkaller0\x00', 'lo\x00', {}, {}, 0x2b, 0x1, 0x2, 0x23}, 0x0, 0xc8, 0x108}, @common=@inet=@TCPOPTSTRIP={0x40, 'TCPOPTSTRIP\x00', 0x0, {[0xe08d, 0x6, 0xff, 0x800, 0x2, 0x7, 0x0, 0x5]}}}, {{@uncond, 0x0, 0xf0, 0x118, 0x0, {}, [@common=@hl={0x28, 'hl\x00', 0x0, {0x3, 0x604}}]}, @common=@unspec=@STANDARD={0x28, '\x00', 0x0, 0xfffffffffffffffd}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x518) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = getpgrp(0x0) prlimit64(r2, 0x0, &(0x7f00000004c0)={0x0, 0x7ffffd}, &(0x7f00000002c0)) lremovexattr(0x0, &(0x7f0000000480)=@random={'trusted.', 'bpf\x00'}) getsockopt$inet_sctp_SCTP_PR_ASSOC_STATUS(0xffffffffffffffff, 0x84, 0x73, &(0x7f0000000280), 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r3 = syz_open_dev$amidi(&(0x7f0000000100)='/dev/amidi#\x00', 0x2, 0x800) recvfrom(0xffffffffffffffff, 0x0, 0x0, 0x20, &(0x7f00000005c0)=@ipx={0x4, 0x1, 0x6, "6b183128f377"}, 0x80) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000200)='./file0\x00', 0x700, 0x0, &(0x7f00000024c0), 0x100032, &(0x7f00000000c0)=ANY=[@ANYBLOB]) getsockopt$inet_dccp_int(0xffffffffffffffff, 0x21, 0xf, &(0x7f0000000240), 0x0) fstat(0xffffffffffffffff, &(0x7f00000006c0)) getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, &(0x7f0000000440)={0x0, 0x80}, &(0x7f00000001c0)=0xfffffffffffffd3f) syz_mount_image$minix(&(0x7f0000000680)='minix\x00', &(0x7f0000000740)='./file0\x00', 0x9, 0x3, &(0x7f00000009c0)=[{&(0x7f0000000780)="19b75c0c01d90c007d813bbc9177346e9b0346d16a3b78e94589904f2d3e9aa5bf03c3be9087bb0cf6de1e76297068f1456eab00de66cb3ffabd3059e3090701d43836c7e739ec6ce30200b12fd6873dec4ec9eb1c4f1f53e98e2ed13ad85af83e8caf0a16a4f88d4659334bac122d4a384a5fa5820f22fd2136e23effc05c5c326930498635806b47eb6f0341468c12bc7327d95f8a82fb65dc7e74dbbadc2f88b7833ffbd11c91c7ccba6a6f2e2c5c17b97a63953a12e75c235746a44f407408a1f9d806136db3c6927ce4b2280d75efe21926de2ffcf1594cdded01320bf6f18ea188ea014b25b9088d6b84265cd43b67dcbfe9d9", 0xf6, 0x7e}, {&(0x7f0000000880)="aef94b50d512186d675eb272ebb927ee813b874698bff7511699d780b11e1267a2406fa713136a50663e6046009101dfff32f6554255e7caf36cfc8951664b5747b9b49e26d8c9b6afe9627316bb0987153479aa4ba8f6700c434601f61e191408840795be24b84c048f5c75532d40936337feb38d81168143ad75e179cec0948fb4da86659e336420235976ae90", 0x8e, 0x7fffffff}, {&(0x7f0000000940)="97a396f70dea26a9e1c057fad38d22e8dea0030ddfcbde008513f10e22887ce04e139bb640c5114db7670c6e372ad729ba55d639994052741c3e31d20b0f35c3a08a17e38c06e7efd687d2937f0fb325c8ca7ca9ecb7923cd0448478c50ae59fe203823b031f18298811e758e6fae75e7955d8e534b7f4b420950e7672", 0x7d, 0x3f}], 0x8, 0x0) ioctl$FICLONE(r1, 0x40049409, r3) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, 0x0) 14:19:18 executing program 1: r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/expire_quiescent_template\x00', 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f00000008c0)=ANY=[@ANYBLOB="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", @ANYPTR=&(0x7f0000000100)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00'], @ANYBLOB="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"], 0x540) ioctl$EXT4_IOC_MIGRATE(0xffffffffffffffff, 0x6609) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000300)={0x0}, &(0x7f0000000400)=0xc) getsockopt$ARPT_SO_GET_INFO(r0, 0x0, 0x60, &(0x7f0000000f80)={'filter\x00'}, &(0x7f00000007c0)=0xfef8) r3 = getpgrp(r2) prlimit64(r3, 0x0, &(0x7f00000004c0)={0x0, 0x7ffffd}, &(0x7f00000002c0)) lremovexattr(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000480)=@random={'trusted.', 'bpf\x00'}) getsockopt$inet_sctp_SCTP_PR_ASSOC_STATUS(0xffffffffffffffff, 0x84, 0x73, &(0x7f0000000280)={0x0, 0x8, 0x0, 0xe0}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) setsockopt$RDS_RECVERR(r0, 0x114, 0x5, &(0x7f0000000800)=0x1, 0x4) r4 = syz_open_dev$amidi(&(0x7f0000000100)='/dev/amidi#\x00', 0x2, 0x800) getsockopt$sock_timeval(r0, 0x1, 0x15, &(0x7f0000000180), &(0x7f0000000380)=0x10) recvfrom(r4, &(0x7f0000000500)=""/96, 0x60, 0x20, &(0x7f00000005c0)=@ipx={0x4, 0x1, 0x6, "6b183128f377"}, 0x80) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000200)='./file0\x00', 0x700, 0x0, &(0x7f00000024c0), 0x100032, &(0x7f00000000c0)=ANY=[@ANYBLOB]) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r4, 0x6, 0x23, &(0x7f0000000840)={&(0x7f0000ffc000/0x2000)=nil, 0x2000}, &(0x7f0000000880)=0x10) prctl$PR_MPX_ENABLE_MANAGEMENT(0x2b) getsockopt$inet_dccp_int(0xffffffffffffffff, 0x21, 0xf, &(0x7f0000000240), 0x0) fstat(0xffffffffffffffff, &(0x7f00000006c0)) getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, &(0x7f0000000440)={0x0, 0x80}, &(0x7f00000001c0)=0xfffffffffffffd3f) ioctl$FICLONE(r1, 0x40049409, r4) setgroups(0x3, &(0x7f0000000340)=[0x0, 0x0, 0x0]) fcntl$getownex(r4, 0x10, &(0x7f0000000680)) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) writev(r1, &(0x7f0000000680), 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, 0x0) prctl$PR_MCE_KILL(0x21, 0x0, 0x2) 14:19:18 executing program 2: getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) syz_mount_image$hfs(&(0x7f0000000200)='hfs\x00', &(0x7f0000000280)='./file0\x00', 0x6c00000000000000, 0x0, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 14:19:18 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x3, &(0x7f0000001fd8)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x15}}, &(0x7f0000000080)="47504c049c3514bf772da07ae82e76590a36f6493ec1ab91b397e42abf1ea6cd8cd77427fc9a9e2b7165f52b4107bf0850d899dc52d013175ddb1b2f46203c2a05b722e33e556fb2e3f39a3cde1fca53640337ec956146bdbfcb115070195631de5d21a5ea9e638c2bdb78a501ca4b6ea313d82568f9382c2c3f6faba6b4ee54793b4ed26dae3e52225029bb2ac0007f77754c3f23ceda9809b9a9684a940abcaa8cfcc7133ec422e9c83888318d41e9a493f0195fe2599651b89504f5dba14625ce2366f33d95dba92f867279cabf4aceddc85a8af7a0fa68d767ce5136b9d0d1966c499cb6bf34c2988666970000000000000000000000", 0x0, 0x0, 0x0, 0x80ffff}, 0x48) 14:19:18 executing program 0: r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/expire_quiescent_template\x00', 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000140)=@security={'security\x00', 0xe, 0x4, 0x4e0, 0x1f0, 0x320, 0x0, 0x320, 0x320, 0x438, 0x438, 0x438, 0x438, 0x438, 0x4, &(0x7f0000000100), {[{{@ipv6={@local, @local, [0x0, 0xffffff00, 0xffffffff, 0xffffff00], [0xffffffff, 0xff, 0xffffffff, 0xff], 'eql\x00', 'gretap0\x00', {}, {0xff}, 0x0, 0x7fffffff, 0x2, 0x61}, 0x0, 0x188, 0x1c8, 0x0, {}, [@common=@unspec=@conntrack2={0xc0, 'conntrack\x00', 0x2, {{@ipv4=@loopback, [0xffffffff, 0xffffffff, 0x0, 0xffffffff], @ipv4=@loopback, [0x0, 0xffffffff, 0xffffff00, 0xff000000], @ipv6=@ipv4={[], [], @remote}, [0xffffff00, 0xff000000, 0xff000000, 0xff], @ipv4=@multicast2, [0xffffffff, 0xff, 0xff0000ff], 0x3, 0x1ff, 0x4, 0x4e21, 0x4e20, 0x4e22, 0x4e20, 0x28, 0x20}, 0x1c0, 0x98}}]}, @common=@unspec=@ERROR={0x40, 'ERROR\x00', 0x0, "f650bd5c77822a55c077a2b3078812467f4ab9fefc372cf333baff203cdb"}}, {{@ipv6={@remote, @mcast2, [0xff000000, 0xffffff00, 0xffffffff, 0xff000000], [0x0, 0xff, 0xff000000, 0xffffff00], 'syzkaller0\x00', 'lo\x00', {}, {0xff}, 0x2b, 0x1, 0x2, 0x23}, 0x0, 0xf0, 0x130, 0x0, {}, [@common=@hl={0x28, 'hl\x00'}]}, @common=@inet=@TCPOPTSTRIP={0x40, 'TCPOPTSTRIP\x00', 0x0, {[0xe08d, 0x6, 0xff, 0x800, 0x2, 0x7, 0x3, 0x5]}}}, {{@uncond, 0x0, 0xf0, 0x118, 0x0, {}, [@common=@hl={0x28, 'hl\x00', 0x0, {0x3, 0x604}}]}, @common=@unspec=@STANDARD={0x28, '\x00', 0x0, 0xfffffffffffffffd}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x540) ioctl$EXT4_IOC_MIGRATE(0xffffffffffffffff, 0x6609) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000300)={0x0}, &(0x7f0000000400)=0xc) getsockopt$ARPT_SO_GET_INFO(r0, 0x0, 0x60, &(0x7f0000000740)={'filter\x00'}, &(0x7f00000007c0)=0x44) r3 = getpgrp(r2) prlimit64(r3, 0x0, &(0x7f00000004c0)={0x0, 0x7ffffd}, &(0x7f00000002c0)) lremovexattr(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000480)=@random={'trusted.', 'bpf\x00'}) getsockopt$inet_sctp_SCTP_PR_ASSOC_STATUS(0xffffffffffffffff, 0x84, 0x73, &(0x7f0000000280)={0x0, 0x8, 0x0, 0xe0}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r4 = syz_open_dev$amidi(&(0x7f0000000100)='/dev/amidi#\x00', 0x2, 0x800) recvfrom(r4, &(0x7f0000000500)=""/96, 0x60, 0x20, &(0x7f00000005c0)=@ipx={0x4, 0x1, 0x6, "6b183128f377"}, 0x80) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000200)='./file0\x00', 0x700, 0x4c00000000000000, &(0x7f00000024c0), 0x100032, &(0x7f00000000c0)=ANY=[@ANYBLOB]) prctl$PR_MPX_ENABLE_MANAGEMENT(0x2b) getsockopt$inet_dccp_int(0xffffffffffffffff, 0x21, 0xf, &(0x7f0000000240), 0x0) fstat(0xffffffffffffffff, &(0x7f00000006c0)) getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, &(0x7f0000000440)={0x0, 0x80}, &(0x7f00000001c0)=0xfffffffffffffd3f) ioctl$FICLONE(r1, 0x40049409, r4) setgroups(0x3, &(0x7f0000000340)=[0x0, 0x0, 0x0]) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, 0x0) [ 2744.062439] hfs: can't find a HFS filesystem on dev loop2 14:19:19 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x3, &(0x7f0000001fd8)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x15}}, &(0x7f0000000080)="47504c049c3514bf772da07ae82e76590a36f6493ec1ab91b397e42abf1ea6cd8cd77427fc9a9e2b7165f52b4107bf0850d899dc52d013175ddb1b2f46203c2a05b722e33e556fb2e3f39a3cde1fca53640337ec956146bdbfcb115070195631de5d21a5ea9e638c2bdb78a501ca4b6ea313d82568f9382c2c3f6faba6b4ee54793b4ed26dae3e52225029bb2ac0007f77754c3f23ceda9809b9a9684a940abcaa8cfcc7133ec422e9c83888318d41e9a493f0195fe2599651b89504f5dba14625ce2366f33d95dba92f867279cabf4aceddc85a8af7a0fa68d767ce5136b9d0d1966c499cb6bf34c2988666970000000000000000000000", 0x0, 0x0, 0x0, 0x3f000000}, 0x48) [ 2744.153586] hfs: can't find a HFS filesystem on dev loop2 [ 2744.160467] EXT4-fs (sda1): re-mounted. Opts: ,errors=continue [ 2744.214829] EXT4-fs (sda1): re-mounted. Opts: ,errors=continue [ 2744.308015] EXT4-fs (sda1): Unrecognized mount option "./file0" or missing value 14:19:19 executing program 2: getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) syz_mount_image$hfs(&(0x7f0000000200)='hfs\x00', &(0x7f0000000280)='./file0\x00', 0xa, 0x0, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 14:19:19 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x3, &(0x7f0000001fd8)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x15}}, &(0x7f0000000080)="47504c049c3514bf772da07ae82e76590a36f6493ec1ab91b397e42abf1ea6cd8cd77427fc9a9e2b7165f52b4107bf0850d899dc52d013175ddb1b2f46203c2a05b722e33e556fb2e3f39a3cde1fca53640337ec956146bdbfcb115070195631de5d21a5ea9e638c2bdb78a501ca4b6ea313d82568f9382c2c3f6faba6b4ee54793b4ed26dae3e52225029bb2ac0007f77754c3f23ceda9809b9a9684a940abcaa8cfcc7133ec422e9c83888318d41e9a493f0195fe2599651b89504f5dba14625ce2366f33d95dba92f867279cabf4aceddc85a8af7a0fa68d767ce5136b9d0d1966c499cb6bf34c2988666970000000000000000000000", 0x0, 0x0, 0x0, 0xe4ffffff}, 0x48) 14:19:19 executing program 3: r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/expire_quiescent_template\x00', 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000140)=@security={'security\x00', 0xe, 0x4, 0x4b8, 0x1f0, 0x320, 0x0, 0x320, 0x320, 0x438, 0x438, 0x438, 0x438, 0x438, 0x4, &(0x7f0000000100), {[{{@ipv6={@local, @local, [0x0, 0x0, 0xffffffff, 0xffffff00], [0xffffffff, 0xff, 0xffffffff, 0xff], 'eql\x00', 'gretap0\x00', {}, {0xff}, 0x0, 0x7fffffff, 0x2, 0x61}, 0x0, 0x188, 0x1c8, 0x0, {}, [@common=@unspec=@conntrack2={0xc0, 'conntrack\x00', 0x2, {{@ipv4=@loopback, [0xffffffff, 0xffffffff, 0x0, 0xffffffff], @ipv4=@loopback, [0x0, 0xffffffff, 0xffffff00, 0xff000000], @ipv6=@ipv4={[], [], @remote}, [0xffffff00, 0xff000000, 0xff000000, 0xff], @ipv4=@multicast2, [0xffffffff, 0xff, 0xff0000ff], 0x3, 0x1ff, 0x4, 0x4e21, 0x4e20, 0x4e22, 0x4e20, 0x28}, 0x1c0, 0x98}}]}, @common=@unspec=@ERROR={0x40, 'ERROR\x00', 0x0, "f650bd5c77822a55c077a2b3078812467f4ab9fefc372cf333baff203cdb"}}, {{@ipv6={@remote, @mcast2, [0xff000000, 0xffffff00, 0xffffffff, 0xff000000], [0x0, 0xff, 0xff000000, 0xffffff00], 'syzkaller0\x00', 'lo\x00', {}, {}, 0x2b, 0x1, 0x2, 0x23}, 0x0, 0xc8, 0x108}, @common=@inet=@TCPOPTSTRIP={0x40, 'TCPOPTSTRIP\x00', 0x0, {[0xe08d, 0x6, 0xff, 0x800, 0x2, 0x7, 0x0, 0x5]}}}, {{@uncond, 0x0, 0xf0, 0x118, 0x0, {}, [@common=@hl={0x28, 'hl\x00', 0x0, {0x3, 0x604}}]}, @common=@unspec=@STANDARD={0x28, '\x00', 0x0, 0xfffffffffffffffd}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x518) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = getpgrp(0x0) prlimit64(r2, 0x0, &(0x7f00000004c0)={0x0, 0x7ffffd}, &(0x7f00000002c0)) lremovexattr(0x0, &(0x7f0000000480)=@random={'trusted.', 'bpf\x00'}) getsockopt$inet_sctp_SCTP_PR_ASSOC_STATUS(0xffffffffffffffff, 0x84, 0x73, &(0x7f0000000280), 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r3 = syz_open_dev$amidi(&(0x7f0000000100)='/dev/amidi#\x00', 0x2, 0x800) recvfrom(0xffffffffffffffff, 0x0, 0x0, 0x20, &(0x7f00000005c0)=@ipx={0x4, 0x1, 0x6, "6b183128f377"}, 0x80) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000200)='./file0\x00', 0x700, 0x0, &(0x7f00000024c0), 0x100032, &(0x7f00000000c0)=ANY=[@ANYBLOB]) getsockopt$inet_dccp_int(0xffffffffffffffff, 0x21, 0xf, &(0x7f0000000240), 0x0) fstat(0xffffffffffffffff, &(0x7f00000006c0)) getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, &(0x7f0000000440)={0x0, 0x80}, &(0x7f00000001c0)=0xfffffffffffffd3f) ioctl$FICLONE(r1, 0x40049409, r3) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x10001d, 0x0) 14:19:19 executing program 1: r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/expire_quiescent_template\x00', 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000140)=ANY=[@ANYBLOB="73656375726974790600000000000000000000000000000000000000000000000e00000004000000e0040000f001000020030000000000002003000020030000380400003804000038040000380400003804000004000000", @ANYPTR=&(0x7f0000000100)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00'], @ANYBLOB="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"], 0x540) ioctl$EXT4_IOC_MIGRATE(0xffffffffffffffff, 0x6609) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000300)={0x0}, &(0x7f0000000400)=0xc) getsockopt$ARPT_SO_GET_INFO(r0, 0x0, 0x60, &(0x7f0000000740)={'filter\x00'}, &(0x7f00000007c0)=0x44) r3 = getpgrp(r2) prlimit64(r3, 0x0, &(0x7f00000004c0)={0x0, 0x7ffffd}, &(0x7f00000002c0)) lremovexattr(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000480)=@random={'trusted.', 'bpf\x00'}) getsockopt$inet_sctp_SCTP_PR_ASSOC_STATUS(0xffffffffffffffff, 0x84, 0x73, &(0x7f0000000280)={0x0, 0x8, 0x0, 0xe0}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r4 = syz_open_dev$amidi(&(0x7f0000000100)='/dev/amidi#\x00', 0x2, 0x800) recvfrom(r4, &(0x7f0000000500)=""/96, 0x60, 0x20, &(0x7f00000005c0)=@ipx={0x4, 0x1, 0x6, "6b183128f377"}, 0x80) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000200)='./file0\x00', 0x700, 0x0, &(0x7f00000024c0), 0x100032, &(0x7f00000000c0)=ANY=[@ANYBLOB]) prctl$PR_MPX_ENABLE_MANAGEMENT(0x2b) getsockopt$inet_dccp_int(0xffffffffffffffff, 0x21, 0xf, &(0x7f0000000240), 0x0) fstat(0xffffffffffffffff, &(0x7f00000006c0)) getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, &(0x7f0000000440)={0x0, 0x80}, &(0x7f00000001c0)=0xfffffffffffffd3f) ioctl$FICLONE(r1, 0x40049409, r4) setgroups(0x3, &(0x7f0000000340)=[0x0, 0x0, 0x0]) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, 0x0) 14:19:19 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x3, &(0x7f0000001fd8)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x15}}, &(0x7f0000000080)="47504c049c3514bf772da07ae82e76590a36f6493ec1ab91b397e42abf1ea6cd8cd77427fc9a9e2b7165f52b4107bf0850d899dc52d013175ddb1b2f46203c2a05b722e33e556fb2e3f39a3cde1fca53640337ec956146bdbfcb115070195631de5d21a5ea9e638c2bdb78a501ca4b6ea313d82568f9382c2c3f6faba6b4ee54793b4ed26dae3e52225029bb2ac0007f77754c3f23ceda9809b9a9684a940abcaa8cfcc7133ec422e9c83888318d41e9a493f0195fe2599651b89504f5dba14625ce2366f33d95dba92f867279cabf4aceddc85a8af7a0fa68d767ce5136b9d0d1966c499cb6bf34c2988666970000000000000000000000", 0x0, 0x0, 0x0, 0x1000000}, 0x48) 14:19:19 executing program 4: r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/expire_quiescent_template\x00', 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000140)=@security={'security\x00', 0xe, 0x4, 0x4b8, 0x1f0, 0x320, 0x0, 0x320, 0x320, 0x438, 0x438, 0x438, 0x438, 0x438, 0x4, &(0x7f0000000100), {[{{@ipv6={@local, @local, [0x0, 0x0, 0xffffffff, 0xffffff00], [0xffffffff, 0xff, 0xffffffff, 0xff], 'eql\x00', 'gretap0\x00', {}, {0xff}, 0x0, 0x7fffffff, 0x2, 0x61}, 0x0, 0x188, 0x1c8, 0x0, {}, [@common=@unspec=@conntrack2={0xc0, 'conntrack\x00', 0x2, {{@ipv4=@loopback, [0xffffffff, 0xffffffff, 0x0, 0xffffffff], @ipv4=@loopback, [0x0, 0xffffffff, 0xffffff00, 0xff000000], @ipv6=@ipv4={[], [], @remote}, [0xffffff00, 0xff000000, 0xff000000, 0xff], @ipv4=@multicast2, [0xffffffff, 0xff, 0xff0000ff], 0x3, 0x1ff, 0x4, 0x4e21, 0x4e20, 0x4e22, 0x4e20, 0x28}, 0x1c0, 0x98}}]}, @common=@unspec=@ERROR={0x40, 'ERROR\x00', 0x0, "f650bd5c77822a55c077a2b3078812467f4ab9fefc372cf333baff203cdb"}}, {{@ipv6={@remote, @mcast2, [0xff000000, 0xffffff00, 0xffffffff, 0xff000000], [0x0, 0xff, 0xff000000, 0xffffff00], 'syzkaller0\x00', 'lo\x00', {}, {}, 0x2b, 0x1, 0x2, 0x23}, 0x0, 0xc8, 0x108}, @common=@inet=@TCPOPTSTRIP={0x40, 'TCPOPTSTRIP\x00', 0x0, {[0xe08d, 0x6, 0xff, 0x800, 0x2, 0x7, 0x0, 0x5]}}}, {{@uncond, 0x0, 0xf0, 0x118, 0x0, {}, [@common=@hl={0x28, 'hl\x00', 0x0, {0x3, 0x604}}]}, @common=@unspec=@STANDARD={0x28, '\x00', 0x0, 0xfffffffffffffffd}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x518) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCGSID(r0, 0x5429, &(0x7f0000000740)) ioctl$TIOCGPGRP(r0, 0x540f, &(0x7f0000000780)) getpgrp(0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000007c0), &(0x7f0000000800)=0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000880)={0xffffffffffffffff, r1, 0x0, 0xc, &(0x7f0000000840)='TCPOPTSTRIP\x00', 0xffffffffffffffff}, 0x30) fcntl$getownex(r1, 0x10, &(0x7f00000008c0)) getpgid(0xffffffffffffffff) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000900)) r2 = gettid() r3 = getpgrp(r2) prlimit64(r3, 0x0, &(0x7f00000004c0)={0x0, 0x7ffffd}, &(0x7f00000002c0)) lremovexattr(0x0, &(0x7f0000000480)=@random={'trusted.', 'bpf\x00'}) getsockopt$inet_sctp_SCTP_PR_ASSOC_STATUS(0xffffffffffffffff, 0x84, 0x73, &(0x7f0000000280), 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r4 = syz_open_dev$amidi(&(0x7f0000000100)='/dev/amidi#\x00', 0x2, 0x800) recvfrom(0xffffffffffffffff, 0x0, 0x0, 0x20, &(0x7f00000005c0)=@ipx={0x4, 0x1, 0x6, "6b183128f377"}, 0x80) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000200)='./file0\x00', 0x700, 0x0, &(0x7f00000024c0), 0x100032, &(0x7f00000000c0)=ANY=[@ANYBLOB]) getsockopt$inet_dccp_int(0xffffffffffffffff, 0x21, 0xf, &(0x7f0000000240), 0x0) fstat(0xffffffffffffffff, &(0x7f00000006c0)) getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, &(0x7f0000000440)={0x0, 0x80}, &(0x7f00000001c0)=0xfffffffffffffd3f) ioctl$FICLONE(r1, 0x40049409, r4) setsockopt$sock_int(r4, 0x1, 0x3f, &(0x7f0000000680)=0x3, 0x4) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, 0x0) [ 2744.642796] hfs: can't find a HFS filesystem on dev loop2 14:19:19 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x3, &(0x7f0000001fd8)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x15}}, &(0x7f0000000080)="47504c049c3514bf772da07ae82e76590a36f6493ec1ab91b397e42abf1ea6cd8cd77427fc9a9e2b7165f52b4107bf0850d899dc52d013175ddb1b2f46203c2a05b722e33e556fb2e3f39a3cde1fca53640337ec956146bdbfcb115070195631de5d21a5ea9e638c2bdb78a501ca4b6ea313d82568f9382c2c3f6faba6b4ee54793b4ed26dae3e52225029bb2ac0007f77754c3f23ceda9809b9a9684a940abcaa8cfcc7133ec422e9c83888318d41e9a493f0195fe2599651b89504f5dba14625ce2366f33d95dba92f867279cabf4aceddc85a8af7a0fa68d767ce5136b9d0d1966c499cb6bf34c2988666970000000000000000000000", 0x0, 0x0, 0x0, 0x700}, 0x48) [ 2744.708025] hfs: can't find a HFS filesystem on dev loop2 14:19:19 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x3, &(0x7f0000001fd8)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x15}}, &(0x7f0000000080)="47504c049c3514bf772da07ae82e76590a36f6493ec1ab91b397e42abf1ea6cd8cd77427fc9a9e2b7165f52b4107bf0850d899dc52d013175ddb1b2f46203c2a05b722e33e556fb2e3f39a3cde1fca53640337ec956146bdbfcb115070195631de5d21a5ea9e638c2bdb78a501ca4b6ea313d82568f9382c2c3f6faba6b4ee54793b4ed26dae3e52225029bb2ac0007f77754c3f23ceda9809b9a9684a940abcaa8cfcc7133ec422e9c83888318d41e9a493f0195fe2599651b89504f5dba14625ce2366f33d95dba92f867279cabf4aceddc85a8af7a0fa68d767ce5136b9d0d1966c499cb6bf34c2988666970000000000000000000000", 0x0, 0x0, 0x0, 0xe4ffffff}, 0x48) 14:19:19 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x3, &(0x7f0000001fd8)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x15}}, &(0x7f0000000080)="47504c049c3514bf772da07ae82e76590a36f6493ec1ab91b397e42abf1ea6cd8cd77427fc9a9e2b7165f52b4107bf0850d899dc52d013175ddb1b2f46203c2a05b722e33e556fb2e3f39a3cde1fca53640337ec956146bdbfcb115070195631de5d21a5ea9e638c2bdb78a501ca4b6ea313d82568f9382c2c3f6faba6b4ee54793b4ed26dae3e52225029bb2ac0007f77754c3f23ceda9809b9a9684a940abcaa8cfcc7133ec422e9c83888318d41e9a493f0195fe2599651b89504f5dba14625ce2366f33d95dba92f867279cabf4aceddc85a8af7a0fa68d767ce5136b9d0d1966c499cb6bf34c2988666970000000000000000000000", 0x0, 0x0, 0x0, 0x2}, 0x48) 14:19:19 executing program 2: getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) syz_mount_image$hfs(&(0x7f0000000200)='hfs\x00', &(0x7f0000000280)='./file0\x00', 0xfdffffff00000000, 0x0, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 14:19:19 executing program 0: r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/expire_quiescent_template\x00', 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000140)=@security={'security\x00', 0xe, 0x4, 0x4e0, 0x1f0, 0x320, 0x0, 0x320, 0x320, 0x438, 0x438, 0x438, 0x438, 0x438, 0x4, &(0x7f0000000100), {[{{@ipv6={@local, @local, [0x0, 0xffffff00, 0xffffffff, 0xffffff00], [0xffffffff, 0xff, 0xffffffff, 0xff], 'eql\x00', 'gretap0\x00', {}, {0xff}, 0x0, 0x7fffffff, 0x2, 0x61}, 0x0, 0x188, 0x1c8, 0x0, {}, [@common=@unspec=@conntrack2={0xc0, 'conntrack\x00', 0x2, {{@ipv4=@loopback, [0xffffffff, 0xffffffff, 0x0, 0xffffffff], @ipv4=@loopback, [0x0, 0xffffffff, 0xffffff00, 0xff000000], @ipv6=@ipv4={[], [], @remote}, [0xffffff00, 0xff000000, 0xff000000, 0xff], @ipv4=@multicast2, [0xffffffff, 0xff, 0xff0000ff], 0x3, 0x1ff, 0x4, 0x4e21, 0x4e20, 0x4e22, 0x4e20, 0x28, 0x20}, 0x1c0, 0x98}}]}, @common=@unspec=@ERROR={0x40, 'ERROR\x00', 0x0, "f650bd5c77822a55c077a2b3078812467f4ab9fefc372cf333baff203cdb"}}, {{@ipv6={@remote, @mcast2, [0xff000000, 0xffffff00, 0xffffffff, 0xff000000], [0x0, 0xff, 0xff000000, 0xffffff00], 'syzkaller0\x00', 'lo\x00', {}, {0xff}, 0x2b, 0x1, 0x2, 0x23}, 0x0, 0xf0, 0x130, 0x0, {}, [@common=@hl={0x28, 'hl\x00'}]}, @common=@inet=@TCPOPTSTRIP={0x40, 'TCPOPTSTRIP\x00', 0x0, {[0xe08d, 0x6, 0xff, 0x800, 0x2, 0x7, 0x3, 0x5]}}}, {{@uncond, 0x0, 0xf0, 0x118, 0x0, {}, [@common=@hl={0x28, 'hl\x00', 0x0, {0x3, 0x604}}]}, @common=@unspec=@STANDARD={0x28, '\x00', 0x0, 0xfffffffffffffffd}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x540) ioctl$EXT4_IOC_MIGRATE(0xffffffffffffffff, 0x6609) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000300)={0x0}, &(0x7f0000000400)=0xc) getsockopt$ARPT_SO_GET_INFO(r0, 0x0, 0x60, &(0x7f0000000740)={'filter\x00'}, &(0x7f00000007c0)=0x44) r3 = getpgrp(r2) prlimit64(r3, 0x0, &(0x7f00000004c0)={0x0, 0x7ffffd}, &(0x7f00000002c0)) lremovexattr(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000480)=@random={'trusted.', 'bpf\x00'}) getsockopt$inet_sctp_SCTP_PR_ASSOC_STATUS(0xffffffffffffffff, 0x84, 0x73, &(0x7f0000000280)={0x0, 0x8, 0x0, 0xe0}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r4 = syz_open_dev$amidi(&(0x7f0000000100)='/dev/amidi#\x00', 0x2, 0x800) recvfrom(r4, &(0x7f0000000500)=""/96, 0x60, 0x20, &(0x7f00000005c0)=@ipx={0x4, 0x1, 0x6, "6b183128f377"}, 0x80) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000200)='./file0\x00', 0x700, 0x7400, &(0x7f00000024c0), 0x100032, &(0x7f00000000c0)=ANY=[@ANYBLOB]) prctl$PR_MPX_ENABLE_MANAGEMENT(0x2b) getsockopt$inet_dccp_int(0xffffffffffffffff, 0x21, 0xf, &(0x7f0000000240), 0x0) fstat(0xffffffffffffffff, &(0x7f00000006c0)) getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, &(0x7f0000000440)={0x0, 0x80}, &(0x7f00000001c0)=0xfffffffffffffd3f) ioctl$FICLONE(r1, 0x40049409, r4) setgroups(0x3, &(0x7f0000000340)=[0x0, 0x0, 0x0]) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, 0x0) 14:19:19 executing program 3: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x40502, 0x0) ioctl$VIDIOC_DBG_G_CHIP_INFO(r0, 0xc0c85666, &(0x7f00000000c0)={{0x5, @name="8da71ba9178f2b3a1a67495e75bbcbfaba00843aea0a3d6605ee28290b49f387"}, "c778b974413d3aad4a67fa8399a4f93ad00f7cb422b67d62b710b271e1522b11", 0x1}) getpeername$packet(r0, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000080)=0x14) clone(0xc2b321c6db9081df, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) [ 2745.067176] hfs: can't find a HFS filesystem on dev loop2 14:19:20 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x3, &(0x7f0000001fd8)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x15}}, &(0x7f0000000080)="47504c049c3514bf772da07ae82e76590a36f6493ec1ab91b397e42abf1ea6cd8cd77427fc9a9e2b7165f52b4107bf0850d899dc52d013175ddb1b2f46203c2a05b722e33e556fb2e3f39a3cde1fca53640337ec956146bdbfcb115070195631de5d21a5ea9e638c2bdb78a501ca4b6ea313d82568f9382c2c3f6faba6b4ee54793b4ed26dae3e52225029bb2ac0007f77754c3f23ceda9809b9a9684a940abcaa8cfcc7133ec422e9c83888318d41e9a493f0195fe2599651b89504f5dba14625ce2366f33d95dba92f867279cabf4aceddc85a8af7a0fa68d767ce5136b9d0d1966c499cb6bf34c2988666970000000000000000000000", 0x0, 0x0, 0x0, 0x17d629}, 0x48) 14:19:20 executing program 1: r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/expire_quiescent_template\x00', 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000140)=@security={'security\x00', 0xe, 0x4, 0x4e0, 0x1f0, 0x320, 0x0, 0x320, 0x320, 0x438, 0x438, 0x438, 0x438, 0x438, 0x4, &(0x7f0000000100), {[{{@ipv6={@local, @local, [0x0, 0xffffff00, 0xffffffff, 0xffffff00], [0xffffffff, 0xff, 0xffffffff, 0xff], 'eql\x00', 'gretap0\x00', {}, {0xff}, 0x0, 0x7fffffff, 0x2, 0x61}, 0x0, 0x188, 0x1c8, 0x0, {}, [@common=@unspec=@conntrack2={0xc0, 'conntrack\x00', 0x2, {{@ipv4=@loopback, [0xffffffff, 0xffffffff, 0x0, 0xffffffff], @ipv4=@loopback, [0x0, 0xffffffff, 0xffffff00, 0xff000000], @ipv6=@ipv4={[], [], @remote}, [0xffffff00, 0xff000000, 0xff000000, 0xff], @ipv4=@multicast2, [0xffffffff, 0xff, 0xff0000ff], 0x3, 0x1ff, 0x4, 0x4e21, 0x4e20, 0x4e22, 0x4e20, 0x28, 0x20}, 0x1c0, 0x98}}]}, @common=@unspec=@ERROR={0x40, 'ERROR\x00', 0x0, "f650bd5c77822a55c077a2b3078812467f4ab9fefc372cf333baff203cdb"}}, {{@ipv6={@remote, @mcast2, [0xff000000, 0xffffff00, 0xffffffff, 0xff000000], [0x0, 0xff, 0xff000000, 0xffffff00], 'syzkaller0\x00', 'lo\x00', {}, {0xff}, 0x2b, 0x1, 0x2, 0x23}, 0x0, 0xf0, 0x130, 0x0, {}, [@common=@hl={0x28, 'hl\x00'}]}, @common=@inet=@TCPOPTSTRIP={0x40, 'TCPOPTSTRIP\x00', 0x0, {[0xe08d, 0x6, 0xff, 0x800, 0x2, 0x7, 0x3, 0x5]}}}, {{@uncond, 0x0, 0xf0, 0x118, 0x0, {}, [@common=@hl={0x28, 'hl\x00', 0x0, {0x3, 0x604}}]}, @common=@unspec=@STANDARD={0x28, '\x00', 0x0, 0xfffffffffffffffd}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x540) ioctl$EXT4_IOC_MIGRATE(0xffffffffffffffff, 0x6609) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000300)={0x0}, &(0x7f0000000400)=0xc) getsockopt$ARPT_SO_GET_INFO(r0, 0x0, 0x60, &(0x7f0000000740)={'filter\x00'}, &(0x7f00000007c0)=0x44) r3 = getpgrp(r2) prlimit64(r3, 0x0, &(0x7f00000004c0)={0x0, 0x7ffffd}, &(0x7f00000002c0)) lremovexattr(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000800)=ANY=[@ANYBLOB="747275737465642e62706600a652d8b8d5a0a367f48302078499ac0127aa46d7463486e04b01bcc388f5f540977172fbf96c5842c72bf17103555df582740eeb016035bcca6f3de954d0f04ca615"]) getsockopt$inet_sctp_SCTP_PR_ASSOC_STATUS(0xffffffffffffffff, 0x84, 0x73, &(0x7f0000000280)={0x0, 0x8, 0x0, 0xe0}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r4 = syz_open_dev$amidi(&(0x7f0000000100)='/dev/amidi#\x00', 0x2, 0x800) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(r1, 0x40106614, &(0x7f0000000680)={0x0, @aes256}) recvfrom(r4, &(0x7f0000000500)=""/96, 0x60, 0x20, &(0x7f00000005c0)=@ipx={0x4, 0x1, 0x6, "6b183128f377"}, 0x80) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000200)='./file0\x00', 0x700, 0x0, &(0x7f00000024c0), 0x100032, &(0x7f00000000c0)=ANY=[@ANYBLOB]) prctl$PR_MPX_ENABLE_MANAGEMENT(0x2b) getsockopt$inet_dccp_int(0xffffffffffffffff, 0x21, 0xf, &(0x7f0000000240), 0x0) fstat(0xffffffffffffffff, &(0x7f00000006c0)) getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, &(0x7f0000000440)={0x0, 0x80}, &(0x7f00000001c0)=0xfffffffffffffd3f) ioctl$FICLONE(r1, 0x40049409, r4) setgroups(0x3, &(0x7f0000000340)=[0x0, 0x0, 0x0]) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, 0x0) 14:19:20 executing program 2: getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) syz_mount_image$hfs(&(0x7f0000000200)='hfs\x00', &(0x7f0000000280)='./file0\x00', 0xffffff7f00000000, 0x0, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) [ 2745.316080] IPVS: ftp: loaded support on port[0] = 21 14:19:20 executing program 4: r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/expire_quiescent_template\x00', 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000140)=@security={'security\x00', 0xe, 0x4, 0x4b8, 0x1f0, 0x320, 0x0, 0x320, 0x320, 0x438, 0x438, 0x438, 0x438, 0x438, 0x4, &(0x7f0000000100), {[{{@ipv6={@local, @local, [0x0, 0x0, 0xffffffff, 0xffffff00], [0xffffffff, 0xff, 0xffffffff, 0xff], 'eql\x00', 'gretap0\x00', {}, {0xff}, 0x0, 0x7fffffff, 0x2, 0x61}, 0x0, 0x188, 0x1c8, 0x0, {}, [@common=@unspec=@conntrack2={0xc0, 'conntrack\x00', 0x2, {{@ipv4=@loopback, [0xffffffff, 0xffffffff, 0x0, 0xffffffff], @ipv4=@loopback, [0x0, 0xffffffff, 0xffffff00, 0xff000000], @ipv6=@ipv4={[], [], @remote}, [0xffffff00, 0xff000000, 0xff000000, 0xff], @ipv4=@multicast2, [0xffffffff, 0xff, 0xff0000ff], 0x3, 0x1ff, 0x4, 0x4e21, 0x4e20, 0x4e22, 0x4e20, 0x28}, 0x1c0, 0x98}}]}, @common=@unspec=@ERROR={0x40, 'ERROR\x00', 0x0, "f650bd5c77822a55c077a2b3078812467f4ab9fefc372cf333baff203cdb"}}, {{@ipv6={@remote, @mcast2, [0xff000000, 0xffffff00, 0xffffffff, 0xff000000], [0x0, 0xff, 0xff000000, 0xffffff00], 'syzkaller0\x00', 'lo\x00', {}, {}, 0x2b, 0x1, 0x2, 0x23}, 0x0, 0xc8, 0x108}, @common=@inet=@TCPOPTSTRIP={0x40, 'TCPOPTSTRIP\x00', 0x0, {[0xe08d, 0x6, 0xff, 0x800, 0x2, 0x7, 0x0, 0x5]}}}, {{@uncond, 0x0, 0xf0, 0x118, 0x0, {}, [@common=@hl={0x28, 'hl\x00', 0x0, {0x3, 0x604}}]}, @common=@unspec=@STANDARD={0x28, '\x00', 0x0, 0xfffffffffffffffd}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x518) r1 = openat$dsp(0xffffffffffffff9c, &(0x7f00000007c0)='/dev/dsp\x00', 0x101000, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = getpgrp(0x0) prlimit64(r2, 0x0, &(0x7f00000004c0)={0x0, 0x7ffffd}, &(0x7f00000002c0)) lremovexattr(0x0, &(0x7f0000000740)=ANY=[@ANYBLOB="3f7de5e37465642e62706600a118382d756e946cce02ecd83e98efb26b14ba3af927dc8cb8789801aed14fa7701b9144b62ee87687e7cd4d740193fbfa6cde9a35202da6fa1dc8716f6c59fc08b7c1db0130a9d03da6734d4585a0cb62bc7c35fa46d578302bd80734282836084e78fa52d5a2044ad035be2c"]) getsockopt$inet_sctp_SCTP_PR_ASSOC_STATUS(0xffffffffffffffff, 0x84, 0x73, &(0x7f0000000280), 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) accept4$alg(r0, 0x0, 0x0, 0x800) r3 = syz_open_dev$amidi(&(0x7f0000000100)='/dev/amidi#\x00', 0x2, 0x800) recvfrom(0xffffffffffffffff, 0x0, 0x0, 0x20, &(0x7f00000005c0)=@ipx={0x4, 0x1, 0x6, "6b183128f377"}, 0x80) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000200)='./file0\x00', 0x700, 0x0, &(0x7f00000024c0), 0x100032, &(0x7f00000000c0)=ANY=[@ANYBLOB]) getsockopt$inet_dccp_int(0xffffffffffffffff, 0x21, 0xf, &(0x7f0000000240), 0x0) fstat(0xffffffffffffffff, &(0x7f00000006c0)) getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, &(0x7f0000000440)={0x0, 0x7d}, &(0x7f0000000680)=0x8) ioctl$FICLONE(r1, 0x40049409, r3) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, 0x0) 14:19:20 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x3, &(0x7f0000001fd8)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x15}}, &(0x7f0000000080)="47504c049c3514bf772da07ae82e76590a36f6493ec1ab91b397e42abf1ea6cd8cd77427fc9a9e2b7165f52b4107bf0850d899dc52d013175ddb1b2f46203c2a05b722e33e556fb2e3f39a3cde1fca53640337ec956146bdbfcb115070195631de5d21a5ea9e638c2bdb78a501ca4b6ea313d82568f9382c2c3f6faba6b4ee54793b4ed26dae3e52225029bb2ac0007f77754c3f23ceda9809b9a9684a940abcaa8cfcc7133ec422e9c83888318d41e9a493f0195fe2599651b89504f5dba14625ce2366f33d95dba92f867279cabf4aceddc85a8af7a0fa68d767ce5136b9d0d1966c499cb6bf34c2988666970000000000000000000000", 0x0, 0x0, 0x0, 0xa00000000000000}, 0x48) [ 2745.459611] hfs: can't find a HFS filesystem on dev loop2 [ 2745.552579] hfs: can't find a HFS filesystem on dev loop2 14:19:20 executing program 0: r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/expire_quiescent_template\x00', 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000140)=@security={'security\x00', 0xe, 0x4, 0x4b8, 0x1f0, 0x320, 0x0, 0x320, 0x320, 0x438, 0x438, 0x438, 0x438, 0x438, 0x4, &(0x7f0000000100), {[{{@ipv6={@local, @local, [0x0, 0x0, 0xffffffff, 0xffffff00], [0xffffffff, 0xff, 0xffffffff, 0xff], 'eql\x00', 'gretap0\x00', {}, {0xff}, 0x0, 0x7fffffff, 0x2, 0x61}, 0x0, 0x188, 0x1c8, 0x0, {}, [@common=@unspec=@conntrack2={0xc0, 'conntrack\x00', 0x2, {{@ipv4=@loopback, [0xffffffff, 0xffffffff, 0x0, 0xffffffff], @ipv4=@loopback, [0x0, 0xffffffff, 0xffffff00, 0xff000000], @ipv6=@ipv4={[], [], @remote}, [0xffffff00, 0xff000000, 0xff000000, 0xff], @ipv4=@multicast2, [0xffffffff, 0xff, 0xff0000ff], 0x3, 0x1ff, 0x4, 0x4e21, 0x4e20, 0x4e22, 0x4e20, 0x28}, 0x1c0, 0x98}}]}, @common=@unspec=@ERROR={0x40, 'ERROR\x00', 0x0, "f650bd5c77822a55c077a2b3078812467f4ab9fefc372cf333baff203cdb"}}, {{@ipv6={@remote, @mcast2, [0xff000000, 0xffffff00, 0xffffffff, 0xff000000], [0x0, 0xff, 0xff000000, 0xffffff00], 'syzkaller0\x00', 'lo\x00', {}, {}, 0x2b, 0x1, 0x2, 0x23}, 0x0, 0xc8, 0x108}, @common=@inet=@TCPOPTSTRIP={0x40, 'TCPOPTSTRIP\x00', 0x0, {[0xe08d, 0x6, 0xff, 0x800, 0x2, 0x7, 0x0, 0x5]}}}, {{@uncond, 0x0, 0xf0, 0x118, 0x0, {}, [@common=@hl={0x28, 'hl\x00', 0x0, {0x3, 0x604}}]}, @common=@unspec=@STANDARD={0x28, '\x00', 0x0, 0xfffffffffffffffd}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x518) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = getpgrp(0x0) prlimit64(r2, 0x0, &(0x7f00000004c0)={0x0, 0x7ffffd}, &(0x7f00000002c0)) lremovexattr(0x0, &(0x7f0000000480)=@random={'trusted.', 'bpf\x00'}) getsockopt$inet_sctp_SCTP_PR_ASSOC_STATUS(0xffffffffffffffff, 0x84, 0x73, &(0x7f0000000280), 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r3 = syz_open_dev$amidi(&(0x7f0000000100)='/dev/amidi#\x00', 0x2, 0x800) recvfrom(0xffffffffffffffff, 0x0, 0x0, 0x20, &(0x7f00000005c0)=@ipx={0x4, 0x1, 0x6, "6b183128f377"}, 0x80) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000200)='./file0\x00', 0x700, 0x0, &(0x7f00000024c0), 0x100032, &(0x7f00000000c0)=ANY=[@ANYBLOB]) getsockopt$inet_dccp_int(0xffffffffffffffff, 0x21, 0xf, &(0x7f0000000240), 0x0) fstat(0xffffffffffffffff, &(0x7f00000006c0)) getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, &(0x7f0000000440)={0x0, 0x80}, &(0x7f00000001c0)=0xfffffffffffffd3f) ioctl$FICLONE(r1, 0x40049409, r3) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x108003, 0x0) 14:19:20 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x3, &(0x7f0000001fd8)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x15}}, &(0x7f0000000080)="47504c049c3514bf772da07ae82e76590a36f6493ec1ab91b397e42abf1ea6cd8cd77427fc9a9e2b7165f52b4107bf0850d899dc52d013175ddb1b2f46203c2a05b722e33e556fb2e3f39a3cde1fca53640337ec956146bdbfcb115070195631de5d21a5ea9e638c2bdb78a501ca4b6ea313d82568f9382c2c3f6faba6b4ee54793b4ed26dae3e52225029bb2ac0007f77754c3f23ceda9809b9a9684a940abcaa8cfcc7133ec422e9c83888318d41e9a493f0195fe2599651b89504f5dba14625ce2366f33d95dba92f867279cabf4aceddc85a8af7a0fa68d767ce5136b9d0d1966c499cb6bf34c2988666970000000000000000000000", 0x0, 0x0, 0x0, 0x8a421800}, 0x48) 14:19:20 executing program 2: getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) syz_mount_image$hfs(&(0x7f0000000200)='hfs\x00', &(0x7f0000000280)='./file0\x00', 0xedc0, 0x0, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 14:19:20 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x3, &(0x7f0000001fd8)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x15}}, &(0x7f0000000080)="47504c049c3514bf772da07ae82e76590a36f6493ec1ab91b397e42abf1ea6cd8cd77427fc9a9e2b7165f52b4107bf0850d899dc52d013175ddb1b2f46203c2a05b722e33e556fb2e3f39a3cde1fca53640337ec956146bdbfcb115070195631de5d21a5ea9e638c2bdb78a501ca4b6ea313d82568f9382c2c3f6faba6b4ee54793b4ed26dae3e52225029bb2ac0007f77754c3f23ceda9809b9a9684a940abcaa8cfcc7133ec422e9c83888318d41e9a493f0195fe2599651b89504f5dba14625ce2366f33d95dba92f867279cabf4aceddc85a8af7a0fa68d767ce5136b9d0d1966c499cb6bf34c2988666970000000000000000000000", 0x0, 0x0, 0x0, 0xffff8000}, 0x48) [ 2745.971724] hfs: can't find a HFS filesystem on dev loop2 14:19:20 executing program 3 (fault-call:2 fault-nth:0): r0 = syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x1, 0x0) accept$inet6(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000080)=0x1c) ioctl(r0, 0xffffffffffffffb7, &(0x7f0000000080)) 14:19:21 executing program 4: r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/expire_quiescent_template\x00', 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000140)=@security={'security\x00', 0xe, 0x4, 0x4b8, 0x1f0, 0x320, 0x0, 0x320, 0x320, 0x438, 0x438, 0x438, 0x438, 0x438, 0x4, &(0x7f0000000100), {[{{@ipv6={@local, @local, [0x0, 0x0, 0xffffffff, 0xffffff00], [0xffffffff, 0xff, 0xffffffff, 0xff], 'eql\x00', 'gretap0\x00', {}, {0xff}, 0x0, 0x7fffffff, 0x2, 0x61}, 0x0, 0x188, 0x1c8, 0x0, {}, [@common=@unspec=@conntrack2={0xc0, 'conntrack\x00', 0x2, {{@ipv4=@loopback, [0xffffffff, 0xffffffff, 0x0, 0xffffffff], @ipv4=@loopback, [0x0, 0xffffffff, 0xffffff00, 0xff000000], @ipv6=@ipv4={[], [], @remote}, [0xffffff00, 0xff000000, 0xff000000, 0xff], @ipv4=@multicast2, [0xffffffff, 0xff, 0xff0000ff], 0x3, 0x1ff, 0x4, 0x4e21, 0x4e20, 0x4e22, 0x4e20, 0x28}, 0x1c0, 0x98}}]}, @common=@unspec=@ERROR={0x40, 'ERROR\x00', 0x0, "f650bd5c77822a55c077a2b3078812467f4ab9fefc372cf333baff203cdb"}}, {{@ipv6={@remote, @mcast2, [0xff000000, 0xffffff00, 0xffffffff, 0xff000000], [0x0, 0xff, 0xff000000, 0xffffff00], 'syzkaller0\x00', 'lo\x00', {}, {}, 0x2b, 0x1, 0x2, 0x23}, 0x0, 0xc8, 0x108}, @common=@inet=@TCPOPTSTRIP={0x40, 'TCPOPTSTRIP\x00', 0x0, {[0xe08d, 0x6, 0xff, 0x800, 0x2, 0x7, 0x0, 0x5]}}}, {{@uncond, 0x0, 0xf0, 0x118, 0x0, {}, [@common=@hl={0x28, 'hl\x00', 0x0, {0x3, 0x604}}]}, @common=@unspec=@STANDARD={0x28, '\x00', 0x0, 0xfffffffffffffffd}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x518) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = getpgrp(0x0) prlimit64(r2, 0x0, &(0x7f00000004c0)={0x0, 0x7ffffd}, &(0x7f00000002c0)) lremovexattr(0x0, &(0x7f0000000480)=@random={'trusted.', 'bpf\x00'}) getsockopt$inet_sctp_SCTP_PR_ASSOC_STATUS(0xffffffffffffffff, 0x84, 0x73, &(0x7f0000000280), 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r3 = syz_open_dev$amidi(&(0x7f0000000100)='/dev/amidi#\x00', 0x2, 0x800) ioctl$LOOP_SET_FD(r0, 0x4c00, r3) recvfrom(0xffffffffffffffff, 0x0, 0x0, 0x20, &(0x7f00000005c0)=@ipx={0x4, 0x1, 0x6, "6b183128f377"}, 0x80) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000780)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000740)={0xffffffffffffffff}, 0x111, 0x3}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r3, &(0x7f00000007c0)={0x10, 0x30, 0xfa00, {&(0x7f0000000680), 0x1, {0xa, 0x4e22, 0x6, @mcast1, 0x82d39}, r4}}, 0x38) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000200)='./file0\x00', 0x700, 0x0, &(0x7f00000024c0), 0x100032, &(0x7f00000000c0)=ANY=[@ANYBLOB]) getsockopt$inet_dccp_int(0xffffffffffffffff, 0x21, 0xf, &(0x7f0000000240), 0x0) fstat(0xffffffffffffffff, &(0x7f00000006c0)) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000800)='/proc/sys/net/ipv4/vs/expire_quiescent_template\x00') getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, &(0x7f0000000440)={0x0, 0x80}, &(0x7f00000001c0)=0xfffffffffffffd3f) ioctl$FICLONE(r1, 0x40049409, r3) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0xfe0b, 0x0, 0x100020, 0x0) [ 2746.157143] FAULT_INJECTION: forcing a failure. [ 2746.157143] name failslab, interval 1, probability 0, space 0, times 0 [ 2746.191840] hfs: can't find a HFS filesystem on dev loop2 [ 2746.218039] CPU: 0 PID: 3418 Comm: syz-executor3 Not tainted 4.20.0-rc5+ #142 [ 2746.225383] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2746.234757] Call Trace: [ 2746.237373] dump_stack+0x244/0x39d [ 2746.241023] ? dump_stack_print_info.cold.1+0x20/0x20 [ 2746.246234] should_fail.cold.4+0xa/0x17 [ 2746.250500] ? __lock_acquire+0x62f/0x4c20 [ 2746.254762] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 2746.259884] ? dput.part.25+0x26d/0x860 [ 2746.263876] ? zap_class+0x640/0x640 [ 2746.267600] ? zap_class+0x640/0x640 [ 2746.271347] ? find_held_lock+0x36/0x1c0 [ 2746.275443] ? perf_trace_sched_process_exec+0x860/0x860 [ 2746.281006] ? drm_unbind_agp+0x20/0x20 [ 2746.285008] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2746.290570] __should_failslab+0x124/0x180 [ 2746.294826] should_failslab+0x9/0x14 [ 2746.298638] __kmalloc+0x2e0/0x760 [ 2746.302194] ? check_preemption_disabled+0x48/0x280 [ 2746.307233] ? drm_ioctl+0x48d/0xb00 [ 2746.310968] drm_ioctl+0x48d/0xb00 [ 2746.314680] ? drm_mode_cursor_common+0x9e0/0x9e0 [ 2746.319534] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2746.325090] ? drm_ioctl_kernel+0x330/0x330 [ 2746.329441] ? smk_tskacc+0x3dd/0x520 [ 2746.333268] ? smack_privileged+0xd0/0xd0 [ 2746.337450] ? drm_ioctl_kernel+0x330/0x330 [ 2746.341793] do_vfs_ioctl+0x1de/0x1790 [ 2746.345696] ? __lock_is_held+0xb5/0x140 [ 2746.349774] ? ioctl_preallocate+0x300/0x300 [ 2746.354200] ? smk_curacc+0x7f/0xa0 [ 2746.357850] ? smack_file_ioctl+0x210/0x3c0 [ 2746.362193] ? fget_raw+0x20/0x20 [ 2746.365665] ? smack_file_lock+0x2e0/0x2e0 [ 2746.369919] ? fput+0x130/0x1a0 [ 2746.373211] ? do_syscall_64+0x9a/0x820 [ 2746.377196] ? do_syscall_64+0x9a/0x820 [ 2746.381194] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2746.386748] ? security_file_ioctl+0x94/0xc0 [ 2746.391273] ksys_ioctl+0xa9/0xd0 [ 2746.394744] __x64_sys_ioctl+0x73/0xb0 [ 2746.398730] do_syscall_64+0x1b9/0x820 [ 2746.402630] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 2746.408008] ? syscall_return_slowpath+0x5e0/0x5e0 [ 2746.412946] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 2746.417804] ? trace_hardirqs_on_caller+0x310/0x310 [ 2746.422844] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 2746.427901] ? prepare_exit_to_usermode+0x291/0x3b0 [ 2746.432941] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 2746.437800] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2746.442998] RIP: 0033:0x457569 [ 2746.446213] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 14:19:21 executing program 1: r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/expire_quiescent_template\x00', 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000140)=@security={'security\x00', 0xe, 0x4, 0x4e0, 0x1f0, 0x320, 0x0, 0x320, 0x320, 0x438, 0x438, 0x438, 0x438, 0x438, 0x4, &(0x7f0000000100), {[{{@ipv6={@local, @local, [0x0, 0xffffff00, 0xffffffff, 0xffffff00], [0xffffffff, 0xff, 0xffffffff, 0xff], 'eql\x00', 'gretap0\x00', {}, {0xff}, 0x0, 0x7fffffff, 0x2, 0x61}, 0x0, 0x188, 0x1c8, 0x0, {}, [@common=@unspec=@conntrack2={0xc0, 'conntrack\x00', 0x2, {{@ipv4=@loopback, [0xffffffff, 0xffffffff, 0x0, 0xffffffff], @ipv4=@loopback, [0x0, 0xffffffff, 0xffffff00, 0xff000000], @ipv6=@ipv4={[], [], @remote}, [0xffffff00, 0xff000000, 0xff000000, 0xff], @ipv4=@multicast2, [0xffffffff, 0xff, 0xff0000ff], 0x3, 0x1ff, 0x4, 0x4e21, 0x4e20, 0x4e22, 0x4e20, 0x28, 0x20}, 0x1c0, 0x98}}]}, @common=@unspec=@ERROR={0x40, 'ERROR\x00', 0x0, "f650bd5c77822a55c077a2b3078812467f4ab9fefc372cf333baff203cdb"}}, {{@ipv6={@remote, @mcast2, [0xff000000, 0xffffff00, 0xffffffff, 0xff000000], [0x0, 0xff, 0xff000000, 0xffffff00], 'syzkaller0\x00', 'lo\x00', {}, {0xff}, 0x2b, 0x1, 0x2, 0x23}, 0x0, 0xf0, 0x130, 0x0, {}, [@common=@hl={0x28, 'hl\x00'}]}, @common=@inet=@TCPOPTSTRIP={0x40, 'TCPOPTSTRIP\x00', 0x0, {[0xe08d, 0x6, 0xff, 0x800, 0x2, 0x7, 0x3, 0x5]}}}, {{@uncond, 0x0, 0xf0, 0x118, 0x0, {}, [@common=@hl={0x28, 'hl\x00', 0x0, {0x3, 0x604}}]}, @common=@unspec=@STANDARD={0x28, '\x00', 0x0, 0xfffffffffffffffd}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x540) ioctl$EXT4_IOC_MIGRATE(0xffffffffffffffff, 0x6609) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000300)={0x0}, &(0x7f0000000400)=0xc) getsockopt$ARPT_SO_GET_INFO(r0, 0x0, 0x60, &(0x7f0000000740)={'filter\x00'}, &(0x7f00000007c0)=0x44) r3 = getpgrp(r2) prlimit64(r3, 0x0, &(0x7f00000004c0)={0x0, 0x7ffffd}, &(0x7f00000002c0)) lremovexattr(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000480)=@random={'trusted.', 'bpf\x00'}) getsockopt$inet_sctp_SCTP_PR_ASSOC_STATUS(0xffffffffffffffff, 0x84, 0x73, &(0x7f0000000280)={0x0, 0x8, 0x0, 0xe0}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r4 = syz_open_dev$amidi(&(0x7f0000000100)='/dev/amidi#\x00', 0x2, 0x800) recvfrom(r4, &(0x7f0000000500)=""/96, 0x60, 0x20, &(0x7f00000005c0)=@ipx={0x4, 0x1, 0x6, "6b183128f377"}, 0x80) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000200)='./file0\x00', 0x700, 0x0, &(0x7f00000024c0), 0x100032, &(0x7f00000000c0)=ANY=[@ANYBLOB]) prctl$PR_MPX_ENABLE_MANAGEMENT(0x2b) ioctl$DRM_IOCTL_ADD_CTX(r0, 0xc0086420, &(0x7f0000000680)={0x0}) ioctl$DRM_IOCTL_DMA(r0, 0xc0406429, &(0x7f0000000900)={r5, 0x3, &(0x7f0000000800)=[0x400, 0x400, 0x6], &(0x7f0000000840)=[0x43b, 0x70, 0x4], 0x42, 0x8, 0xa8, &(0x7f0000000880)=[0x80000000, 0x1, 0x4, 0xfc4, 0x1f, 0x9, 0xffffffffffffffc0, 0x2], &(0x7f00000008c0)=[0x2, 0x3, 0x6]}) getsockopt$inet_dccp_int(0xffffffffffffffff, 0x21, 0xf, &(0x7f0000000240), 0x0) fstat(0xffffffffffffffff, &(0x7f00000006c0)) getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, &(0x7f0000000440)={0x0, 0x80}, &(0x7f00000001c0)=0xfffffffffffffd3f) ioctl$FICLONE(r1, 0x40049409, r4) setgroups(0x3, &(0x7f0000000340)=[0x0, 0x0, 0x0]) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, 0x0) 14:19:21 executing program 0 (fault-call:0 fault-nth:0): syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 14:19:21 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x3, &(0x7f0000001fd8)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x15}}, &(0x7f0000000080)="47504c049c3514bf772da07ae82e76590a36f6493ec1ab91b397e42abf1ea6cd8cd77427fc9a9e2b7165f52b4107bf0850d899dc52d013175ddb1b2f46203c2a05b722e33e556fb2e3f39a3cde1fca53640337ec956146bdbfcb115070195631de5d21a5ea9e638c2bdb78a501ca4b6ea313d82568f9382c2c3f6faba6b4ee54793b4ed26dae3e52225029bb2ac0007f77754c3f23ceda9809b9a9684a940abcaa8cfcc7133ec422e9c83888318d41e9a493f0195fe2599651b89504f5dba14625ce2366f33d95dba92f867279cabf4aceddc85a8af7a0fa68d767ce5136b9d0d1966c499cb6bf34c2988666970000000000000000000000", 0x0, 0x0, 0x0, 0x4000}, 0x48) [ 2746.465138] RSP: 002b:00007f2cf34e0c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 2746.472860] RAX: ffffffffffffffda RBX: 00007f2cf34e0c90 RCX: 0000000000457569 [ 2746.480238] RDX: 0000000020000080 RSI: ffffffffffffffb7 RDI: 0000000000000003 [ 2746.487509] RBP: 000000000072bf00 R08: 0000000000000000 R09: 0000000000000000 [ 2746.494783] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f2cf34e16d4 [ 2746.502059] R13: 00000000004be7f7 R14: 00000000004cebe0 R15: 0000000000000004 14:19:21 executing program 2: getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) syz_mount_image$hfs(&(0x7f0000000200)='hfs\x00', &(0x7f0000000280)='./file0\x00', 0xa000000, 0x0, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) [ 2746.623431] FAULT_INJECTION: forcing a failure. [ 2746.623431] name failslab, interval 1, probability 0, space 0, times 0 14:19:21 executing program 3 (fault-call:2 fault-nth:1): r0 = syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x1, 0x0) accept$inet6(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000080)=0x1c) ioctl(r0, 0xffffffffffffffb7, &(0x7f0000000080)) [ 2746.713137] CPU: 0 PID: 3430 Comm: syz-executor0 Not tainted 4.20.0-rc5+ #142 [ 2746.720483] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2746.729857] Call Trace: [ 2746.732472] dump_stack+0x244/0x39d [ 2746.736591] ? dump_stack_print_info.cold.1+0x20/0x20 [ 2746.741810] ? lock_downgrade+0x900/0x900 [ 2746.745992] should_fail.cold.4+0xa/0x17 [ 2746.750092] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 2746.755242] ? lock_downgrade+0x900/0x900 [ 2746.759431] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 2746.764993] ? proc_fail_nth_write+0x9e/0x210 [ 2746.769520] ? proc_cwd_link+0x1d0/0x1d0 [ 2746.773614] ? find_held_lock+0x36/0x1c0 [ 2746.777719] ? perf_trace_sched_process_exec+0x860/0x860 [ 2746.778452] FAULT_INJECTION: forcing a failure. [ 2746.778452] name failslab, interval 1, probability 0, space 0, times 0 [ 2746.783194] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2746.783217] __should_failslab+0x124/0x180 [ 2746.783237] should_failslab+0x9/0x14 [ 2746.783252] __kmalloc+0x2e0/0x760 14:19:21 executing program 4: r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/expire_quiescent_template\x00', 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000140)=ANY=[@ANYBLOB="73656375726974790000000000000000000000000000000000000000000000000e00000004000000b8040000f001000020030000000000002003000020030000380400003804000038040000380400003804000004000000", @ANYPTR=&(0x7f00000008c0)=ANY=[@ANYBLOB="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"], @ANYBLOB="fe8000000000000000000000000000aafe8000000000000000000000000000aa0000000000000000ffffffffffffff00ffffffff000000ffffffffff000000ff65716c0000000000000000000000000067726574617030000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ff000000000000000000000000000000000000ff02610000000000000000000000000000008801c801000000000000000000000000000000000000000000000000c000636f6e6e747261636b0000000000000000000000000000000000000000027f000001000000000000000000000000ffffffffffffffff00000000ffffffff7f00000100000000000000000000000000000000ffffffffffffff00ff00000000000000000000000000ffffac1414bbffffff00ff000000ff000000000000ffe0000002000000000000000000000000ffffffff000000ffff0000ff0000000003000000ff01000004004e214e204e224e20280000000000c00198000000000040004552524f5200000000000000000000000000000000000000000000000000f650bd5c77822a55c077a2b3078812467f4ab9fefc372cf333baff203cdb0000fe8000000000000000000000000000bbff020000000000000000000000000001ff000000ffffff00ffffffffff00000000000000000000ffff000000ffffff0073797a6b616c6c6572300000000000006c6f000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002b00010223000000000000000000000000000000c800080100000000000000000000000000000000000000000000000040005443504f50545354524950000000000000000000000000000000000000008de0000006000000ff000000000800000200000007000000000000000500000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f00018010000000000000000000000000000000000000000000000002800686c0000000000000000000000000000000000000000000000000000000003040000000000002800000000000000000000000000000000000000000000000000000000000000fdffffff000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a800d0000000000000000000000000000000000000000000000000002800000000000000000000000000000000000000000000000000000000000000feffffff00000000"], 0x518) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffff9c, 0x8904, &(0x7f0000000880)) r2 = getpgid(0xffffffffffffffff) r3 = getpgrp(r2) prlimit64(r3, 0x0, &(0x7f00000004c0)={0x0, 0x7ffffd}, &(0x7f00000002c0)) lremovexattr(0x0, &(0x7f0000000480)=@random={'trusted.', 'bpf\x00'}) r4 = shmget(0x3, 0xf000, 0x7c000020, &(0x7f0000fef000/0xf000)=nil) shmctl$IPC_INFO(r4, 0x3, &(0x7f0000000a00)=""/231) getsockopt$inet_sctp_SCTP_PR_ASSOC_STATUS(0xffffffffffffffff, 0x84, 0x73, &(0x7f0000000280), 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r5 = syz_open_dev$amidi(&(0x7f0000000100)='/dev/amidi#\x00', 0x2, 0x800) recvfrom(0xffffffffffffffff, 0x0, 0x0, 0x20, &(0x7f00000005c0)=@ipx={0x4, 0x1, 0x6, "6b183128f377"}, 0x80) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) r6 = syz_open_dev$vcsn(&(0x7f0000000680)='/dev/vcs#\x00', 0x80, 0x20000) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000200)='./file0\x00', 0x700, 0x0, &(0x7f00000024c0), 0x100032, &(0x7f0000000780)=ANY=[@ANYBLOB="0f11707e4d24735afb4117833b9bdded8691c514ef8d27967bc7d464e07ada079abf3c5dd5fdc2cdfef5fd1270e0ee4c7816a00feb5d975d849f0dd46104c61110039aea7a77bf32ceb45c9cbce357d9e5f8e51f8c078510032a31b3925f3d24801bcdab8c601a197548812c82889facf0919917a7dd35dd62a57904696b47bf9dfb87e2233eb6c6f7859abc0c6ad0cf1921ee0957b3848aacc33afb1adc86c235afa5d8a749bbd5ebcf4816d43f8a042b809843d77125d9e8f55a32075e46cbaba59e9c1d5ffef79ee95e1e9fc13afe760b73ff0df956005b87c034bb5dfd447a74be"]) getsockopt$inet_dccp_int(0xffffffffffffffff, 0x21, 0xf, &(0x7f0000000240), 0x0) fstat(0xffffffffffffffff, &(0x7f00000006c0)) getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, &(0x7f0000000440)={0x0, 0x80}, &(0x7f00000001c0)=0xfffffffffffffd3f) ioctl$FICLONE(r1, 0x40049409, r5) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) ioctl$sock_inet_udp_SIOCINQ(r6, 0x541b, &(0x7f0000000740)) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, 0x0) [ 2746.783275] ? strncpy_from_user+0x5a0/0x5a0 [ 2746.783292] ? fput+0x130/0x1a0 [ 2746.783308] ? do_syscall_64+0x9a/0x820 [ 2746.783320] ? __x64_sys_memfd_create+0x142/0x4f0 [ 2746.783330] ? do_syscall_64+0x9a/0x820 [ 2746.783345] __x64_sys_memfd_create+0x142/0x4f0 [ 2746.783366] ? memfd_fcntl+0x1910/0x1910 [ 2746.841486] do_syscall_64+0x1b9/0x820 [ 2746.845388] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 2746.850767] ? syscall_return_slowpath+0x5e0/0x5e0 [ 2746.855705] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 2746.860561] ? trace_hardirqs_on_caller+0x310/0x310 [ 2746.865589] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 2746.870620] ? prepare_exit_to_usermode+0x291/0x3b0 [ 2746.875654] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 2746.880516] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2746.885711] RIP: 0033:0x457569 [ 2746.888916] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2746.908191] RSP: 002b:00007f49544a3a88 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 2746.915912] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 0000000000457569 [ 2746.923194] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00000000004bc787 [ 2746.930560] RBP: 000000000072bf00 R08: 0000000000000000 R09: 00000000fbad8001 [ 2746.937839] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f49544a46d4 [ 2746.945126] R13: 00000000004c5005 R14: 00000000004d8c00 R15: 0000000000000003 [ 2746.952429] CPU: 1 PID: 3443 Comm: syz-executor3 Not tainted 4.20.0-rc5+ #142 [ 2746.959723] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2746.969076] Call Trace: [ 2746.971669] dump_stack+0x244/0x39d [ 2746.975296] ? dump_stack_print_info.cold.1+0x20/0x20 [ 2746.980482] ? mark_held_locks+0x130/0x130 [ 2746.984711] ? up_write+0x7b/0x220 [ 2746.988253] should_fail.cold.4+0xa/0x17 [ 2746.992315] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 2746.997450] ? __drm_mode_object_find+0x33/0x210 [ 2747.002206] ? perf_trace_sched_process_exec+0x860/0x860 [ 2747.007650] ? zap_class+0x640/0x640 [ 2747.011365] ? zap_class+0x640/0x640 [ 2747.015077] ? find_held_lock+0x36/0x1c0 [ 2747.019137] ? __lock_is_held+0xb5/0x140 [ 2747.023198] ? perf_trace_sched_process_exec+0x860/0x860 [ 2747.028640] ? perf_trace_sched_process_exec+0x860/0x860 [ 2747.034098] __should_failslab+0x124/0x180 [ 2747.038330] should_failslab+0x9/0x14 [ 2747.042124] kmem_cache_alloc_trace+0x2d7/0x750 [ 2747.046786] ? drm_modeset_lock+0x178/0x5c0 [ 2747.051131] drm_atomic_state_alloc+0xb8/0x110 [ 2747.055710] drm_atomic_helper_disable_plane+0x3a/0x200 [ 2747.061071] __setplane_atomic+0x2a3/0x330 [ 2747.065312] setplane_internal+0x127/0x370 [ 2747.069542] ? __setplane_internal+0x5e0/0x5e0 [ 2747.074137] ? mutex_unlock+0xd/0x10 [ 2747.077840] ? __drm_mode_object_find+0xb8/0x210 [ 2747.082592] drm_mode_setplane+0x567/0x830 [ 2747.086818] ? drm_is_current_master+0x51/0x140 [ 2747.091484] drm_ioctl_kernel+0x278/0x330 [ 2747.095624] ? drm_mode_cursor_common+0x9e0/0x9e0 [ 2747.100546] ? drm_setversion+0x8b0/0x8b0 [ 2747.104688] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 2747.110246] ? _copy_from_user+0xdf/0x150 [ 2747.114391] drm_ioctl+0x57e/0xb00 [ 2747.117921] ? drm_mode_cursor_common+0x9e0/0x9e0 [ 2747.122767] ? drm_ioctl_kernel+0x330/0x330 [ 2747.127098] ? smk_tskacc+0x3dd/0x520 [ 2747.130896] ? smack_privileged+0xd0/0xd0 [ 2747.135039] ? drm_ioctl_kernel+0x330/0x330 [ 2747.139355] do_vfs_ioctl+0x1de/0x1790 [ 2747.143236] ? __lock_is_held+0xb5/0x140 [ 2747.147290] ? ioctl_preallocate+0x300/0x300 [ 2747.151707] ? smk_curacc+0x7f/0xa0 [ 2747.155332] ? smack_file_ioctl+0x210/0x3c0 [ 2747.159643] ? fget_raw+0x20/0x20 [ 2747.163095] ? smack_file_lock+0x2e0/0x2e0 [ 2747.167326] ? fput+0x130/0x1a0 [ 2747.170598] ? do_syscall_64+0x9a/0x820 [ 2747.174564] ? do_syscall_64+0x9a/0x820 [ 2747.178537] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2747.184067] ? security_file_ioctl+0x94/0xc0 [ 2747.188475] ksys_ioctl+0xa9/0xd0 [ 2747.191921] __x64_sys_ioctl+0x73/0xb0 [ 2747.195800] do_syscall_64+0x1b9/0x820 [ 2747.199681] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 2747.205044] ? syscall_return_slowpath+0x5e0/0x5e0 [ 2747.209971] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 2747.214807] ? trace_hardirqs_on_caller+0x310/0x310 [ 2747.219820] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 2747.224827] ? prepare_exit_to_usermode+0x291/0x3b0 [ 2747.229939] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 2747.234779] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2747.239959] RIP: 0033:0x457569 [ 2747.243144] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2747.262038] RSP: 002b:00007f2cf34e0c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 2747.269765] RAX: ffffffffffffffda RBX: 00007f2cf34e0c90 RCX: 0000000000457569 [ 2747.277029] RDX: 0000000020000080 RSI: ffffffffffffffb7 RDI: 0000000000000003 [ 2747.284288] RBP: 000000000072bf00 R08: 0000000000000000 R09: 0000000000000000 [ 2747.291547] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f2cf34e16d4 [ 2747.298805] R13: 00000000004be7f7 R14: 00000000004cebe0 R15: 0000000000000004 14:19:22 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x3, &(0x7f0000001fd8)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x15}}, &(0x7f0000000080)="47504c049c3514bf772da07ae82e76590a36f6493ec1ab91b397e42abf1ea6cd8cd77427fc9a9e2b7165f52b4107bf0850d899dc52d013175ddb1b2f46203c2a05b722e33e556fb2e3f39a3cde1fca53640337ec956146bdbfcb115070195631de5d21a5ea9e638c2bdb78a501ca4b6ea313d82568f9382c2c3f6faba6b4ee54793b4ed26dae3e52225029bb2ac0007f77754c3f23ceda9809b9a9684a940abcaa8cfcc7133ec422e9c83888318d41e9a493f0195fe2599651b89504f5dba14625ce2366f33d95dba92f867279cabf4aceddc85a8af7a0fa68d767ce5136b9d0d1966c499cb6bf34c2988666970000000000000000000000", 0x0, 0x0, 0x0, 0xffffffff00000000}, 0x48) [ 2747.322109] hfs: can't find a HFS filesystem on dev loop2 14:19:22 executing program 3 (fault-call:2 fault-nth:2): r0 = syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x1, 0x0) accept$inet6(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000080)=0x1c) ioctl(r0, 0xffffffffffffffb7, &(0x7f0000000080)) [ 2747.443164] hfs: can't find a HFS filesystem on dev loop2 14:19:22 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x3, &(0x7f0000001fd8)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x15}}, &(0x7f0000000080)="47504c049c3514bf772da07ae82e76590a36f6493ec1ab91b397e42abf1ea6cd8cd77427fc9a9e2b7165f52b4107bf0850d899dc52d013175ddb1b2f46203c2a05b722e33e556fb2e3f39a3cde1fca53640337ec956146bdbfcb115070195631de5d21a5ea9e638c2bdb78a501ca4b6ea313d82568f9382c2c3f6faba6b4ee54793b4ed26dae3e52225029bb2ac0007f77754c3f23ceda9809b9a9684a940abcaa8cfcc7133ec422e9c83888318d41e9a493f0195fe2599651b89504f5dba14625ce2366f33d95dba92f867279cabf4aceddc85a8af7a0fa68d767ce5136b9d0d1966c499cb6bf34c2988666970000000000000000000000", 0x0, 0x0, 0x0, 0x10}, 0x48) 14:19:22 executing program 2: getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) syz_mount_image$hfs(&(0x7f0000000200)='hfs\x00', &(0x7f0000000280)='./file0\x00', 0xff0f0000, 0x0, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) [ 2747.599698] FAULT_INJECTION: forcing a failure. [ 2747.599698] name failslab, interval 1, probability 0, space 0, times 0 [ 2747.632661] CPU: 0 PID: 3466 Comm: syz-executor3 Not tainted 4.20.0-rc5+ #142 [ 2747.639994] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2747.649373] Call Trace: [ 2747.651986] dump_stack+0x244/0x39d [ 2747.655630] ? dump_stack_print_info.cold.1+0x20/0x20 [ 2747.660848] ? rcu_softirq_qs+0x20/0x20 [ 2747.664844] ? unwind_dump+0x190/0x190 [ 2747.668766] should_fail.cold.4+0xa/0x17 [ 2747.672856] ? is_bpf_text_address+0xd3/0x170 [ 2747.677373] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 2747.682506] ? __kernel_text_address+0xd/0x40 [ 2747.687014] ? unwind_get_return_address+0x61/0xa0 [ 2747.691969] ? zap_class+0x640/0x640 [ 2747.695714] ? find_held_lock+0x36/0x1c0 [ 2747.699814] ? __lock_is_held+0xb5/0x140 [ 2747.703906] ? perf_trace_sched_process_exec+0x860/0x860 [ 2747.709372] ? zap_class+0x640/0x640 [ 2747.713109] __should_failslab+0x124/0x180 [ 2747.717362] should_failslab+0x9/0x14 [ 2747.721186] __kmalloc+0x2e0/0x760 [ 2747.724744] ? __lock_is_held+0xb5/0x140 [ 2747.728826] ? drm_atomic_state_init+0x171/0x3b0 [ 2747.733598] drm_atomic_state_init+0x171/0x3b0 [ 2747.738203] ? rcu_read_lock_sched_held+0x14f/0x180 [ 2747.743341] ? __drm_atomic_state_free+0xf0/0xf0 [ 2747.748127] drm_atomic_state_alloc+0xd0/0x110 [ 2747.752729] drm_atomic_helper_disable_plane+0x3a/0x200 [ 2747.758115] __setplane_atomic+0x2a3/0x330 [ 2747.762368] setplane_internal+0x127/0x370 [ 2747.766637] ? __setplane_internal+0x5e0/0x5e0 [ 2747.771246] ? mutex_unlock+0xd/0x10 [ 2747.774972] ? __drm_mode_object_find+0xb8/0x210 [ 2747.779748] drm_mode_setplane+0x567/0x830 [ 2747.784009] ? drm_is_current_master+0x51/0x140 [ 2747.788705] drm_ioctl_kernel+0x278/0x330 [ 2747.792865] ? drm_mode_cursor_common+0x9e0/0x9e0 [ 2747.797724] ? drm_setversion+0x8b0/0x8b0 [ 2747.801906] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 2747.807454] ? _copy_from_user+0xdf/0x150 [ 2747.811623] drm_ioctl+0x57e/0xb00 [ 2747.815173] ? drm_mode_cursor_common+0x9e0/0x9e0 [ 2747.820044] ? drm_ioctl_kernel+0x330/0x330 [ 2747.824386] ? smk_tskacc+0x3dd/0x520 [ 2747.828210] ? smack_privileged+0xd0/0xd0 [ 2747.832369] ? drm_ioctl_kernel+0x330/0x330 [ 2747.836698] do_vfs_ioctl+0x1de/0x1790 [ 2747.840599] ? __lock_is_held+0xb5/0x140 [ 2747.844669] ? ioctl_preallocate+0x300/0x300 14:19:22 executing program 0 (fault-call:0 fault-nth:1): syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) [ 2747.849084] ? smk_curacc+0x7f/0xa0 [ 2747.852725] ? smack_file_ioctl+0x210/0x3c0 [ 2747.857056] ? fget_raw+0x20/0x20 [ 2747.860529] ? smack_file_lock+0x2e0/0x2e0 [ 2747.864779] ? fput+0x130/0x1a0 [ 2747.868076] ? do_syscall_64+0x9a/0x820 [ 2747.872074] ? do_syscall_64+0x9a/0x820 [ 2747.876067] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2747.881617] ? security_file_ioctl+0x94/0xc0 [ 2747.886051] ksys_ioctl+0xa9/0xd0 [ 2747.889516] __x64_sys_ioctl+0x73/0xb0 [ 2747.893399] do_syscall_64+0x1b9/0x820 [ 2747.897276] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 2747.902631] ? syscall_return_slowpath+0x5e0/0x5e0 [ 2747.907550] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 2747.912386] ? trace_hardirqs_on_caller+0x310/0x310 [ 2747.917394] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 2747.922400] ? prepare_exit_to_usermode+0x291/0x3b0 [ 2747.927406] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 2747.932257] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2747.937577] RIP: 0033:0x457569 [ 2747.940768] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2747.959663] RSP: 002b:00007f2cf34e0c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 2747.967371] RAX: ffffffffffffffda RBX: 00007f2cf34e0c90 RCX: 0000000000457569 [ 2747.974632] RDX: 0000000020000080 RSI: ffffffffffffffb7 RDI: 0000000000000003 [ 2747.981995] RBP: 000000000072bf00 R08: 0000000000000000 R09: 0000000000000000 [ 2747.989263] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f2cf34e16d4 [ 2747.996532] R13: 00000000004be7f7 R14: 00000000004cebe0 R15: 0000000000000004 14:19:23 executing program 3 (fault-call:2 fault-nth:3): r0 = syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x1, 0x0) accept$inet6(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000080)=0x1c) ioctl(r0, 0xffffffffffffffb7, &(0x7f0000000080)) [ 2748.126239] EXT4-fs: 16 callbacks suppressed [ 2748.126292] EXT4-fs (sda1): Unrecognized mount option "p~M$sZA;톑'{dz<]pLx]] azw2δ\W*1_=$ͫ`uH" or missing value [ 2748.199667] FAULT_INJECTION: forcing a failure. [ 2748.199667] name failslab, interval 1, probability 0, space 0, times 0 [ 2748.262724] FAULT_INJECTION: forcing a failure. [ 2748.262724] name failslab, interval 1, probability 0, space 0, times 0 [ 2748.265910] CPU: 0 PID: 3483 Comm: syz-executor0 Not tainted 4.20.0-rc5+ #142 [ 2748.281265] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2748.290635] Call Trace: [ 2748.293245] dump_stack+0x244/0x39d [ 2748.296888] ? dump_stack_print_info.cold.1+0x20/0x20 [ 2748.302107] should_fail.cold.4+0xa/0x17 [ 2748.306195] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 2748.311315] ? find_held_lock+0x36/0x1c0 [ 2748.315391] ? zap_class+0x640/0x640 [ 2748.319112] ? __lock_acquire+0x62f/0x4c20 [ 2748.323455] ? lock_downgrade+0x900/0x900 [ 2748.327608] ? check_preemption_disabled+0x48/0x280 [ 2748.332632] ? find_held_lock+0x36/0x1c0 [ 2748.336716] ? expand_files.part.8+0x571/0x9a0 [ 2748.341308] ? perf_trace_sched_process_exec+0x860/0x860 [ 2748.346771] ? find_held_lock+0x36/0x1c0 [ 2748.350844] __should_failslab+0x124/0x180 [ 2748.355088] should_failslab+0x9/0x14 [ 2748.358893] kmem_cache_alloc+0x2be/0x730 [ 2748.363058] ? shmem_destroy_callback+0xc0/0xc0 [ 2748.367737] shmem_alloc_inode+0x1b/0x40 [ 2748.371810] alloc_inode+0x63/0x190 [ 2748.375445] new_inode_pseudo+0x71/0x1a0 [ 2748.379529] ? prune_icache_sb+0x1c0/0x1c0 [ 2748.383779] ? _raw_spin_unlock+0x2c/0x50 [ 2748.387945] new_inode+0x1c/0x40 [ 2748.391922] shmem_get_inode+0xf1/0x920 [ 2748.395915] ? shmem_encode_fh+0x340/0x340 [ 2748.400176] ? lock_downgrade+0x900/0x900 [ 2748.404344] ? lock_release+0xa00/0xa00 [ 2748.408334] ? perf_trace_sched_process_exec+0x860/0x860 [ 2748.413818] ? usercopy_warn+0x110/0x110 [ 2748.417911] __shmem_file_setup.part.50+0x83/0x2a0 [ 2748.422854] shmem_file_setup+0x65/0x90 [ 2748.426838] __x64_sys_memfd_create+0x2af/0x4f0 [ 2748.431517] ? memfd_fcntl+0x1910/0x1910 [ 2748.435597] do_syscall_64+0x1b9/0x820 [ 2748.439498] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 2748.444874] ? syscall_return_slowpath+0x5e0/0x5e0 [ 2748.449811] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 2748.454665] ? trace_hardirqs_on_caller+0x310/0x310 [ 2748.459693] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 2748.464720] ? prepare_exit_to_usermode+0x291/0x3b0 [ 2748.469775] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 2748.474640] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2748.479836] RIP: 0033:0x457569 [ 2748.483040] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2748.501947] RSP: 002b:00007f49544a3a88 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 2748.509676] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 0000000000457569 [ 2748.516952] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00000000004bc787 [ 2748.524233] RBP: 000000000072bf00 R08: 0000000000000000 R09: 00000000fbad8001 [ 2748.531508] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f49544a46d4 [ 2748.538782] R13: 00000000004c5005 R14: 00000000004d8c00 R15: 0000000000000003 [ 2748.546087] CPU: 1 PID: 3487 Comm: syz-executor3 Not tainted 4.20.0-rc5+ #142 [ 2748.553387] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2748.562760] Call Trace: [ 2748.565375] dump_stack+0x244/0x39d [ 2748.569025] ? dump_stack_print_info.cold.1+0x20/0x20 [ 2748.574236] ? __kernel_text_address+0xd/0x40 [ 2748.578747] ? unwind_get_return_address+0x61/0xa0 [ 2748.583700] should_fail.cold.4+0xa/0x17 [ 2748.587784] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 2748.592918] ? save_stack+0x43/0xd0 [ 2748.596567] ? kasan_kmalloc+0xc7/0xe0 [ 2748.600466] ? __kmalloc+0x15b/0x760 [ 2748.604186] ? drm_atomic_state_init+0x171/0x3b0 [ 2748.609058] ? drm_atomic_state_alloc+0xd0/0x110 [ 2748.614068] ? zap_class+0x640/0x640 [ 2748.617770] ? drm_mode_setplane+0x567/0x830 [ 2748.622172] ? drm_ioctl_kernel+0x278/0x330 [ 2748.626483] ? drm_ioctl+0x57e/0xb00 [ 2748.630184] ? do_vfs_ioctl+0x1de/0x1790 [ 2748.634235] ? ksys_ioctl+0xa9/0xd0 [ 2748.637852] ? __x64_sys_ioctl+0x73/0xb0 [ 2748.641904] ? do_syscall_64+0x1b9/0x820 [ 2748.645969] ? find_held_lock+0x36/0x1c0 [ 2748.650025] ? __lock_is_held+0xb5/0x140 [ 2748.654147] ? nl80211_send_regdom.constprop.78+0x3e8/0x5b0 [ 2748.659868] ? perf_trace_sched_process_exec+0x860/0x860 [ 2748.665318] __should_failslab+0x124/0x180 [ 2748.669553] should_failslab+0x9/0x14 [ 2748.673344] __kmalloc+0x2e0/0x760 [ 2748.676876] ? __lock_is_held+0xb5/0x140 [ 2748.680929] ? drm_atomic_state_init+0x20b/0x3b0 [ 2748.685684] drm_atomic_state_init+0x20b/0x3b0 [ 2748.690260] ? rcu_read_lock_sched_held+0x14f/0x180 [ 2748.695285] ? __drm_atomic_state_free+0xf0/0xf0 [ 2748.700041] drm_atomic_state_alloc+0xd0/0x110 [ 2748.704622] drm_atomic_helper_disable_plane+0x3a/0x200 [ 2748.709983] __setplane_atomic+0x2a3/0x330 [ 2748.714212] setplane_internal+0x127/0x370 [ 2748.718448] ? __setplane_internal+0x5e0/0x5e0 [ 2748.723036] ? mutex_unlock+0xd/0x10 [ 2748.726748] ? __drm_mode_object_find+0xb8/0x210 [ 2748.731500] drm_mode_setplane+0x567/0x830 [ 2748.736096] ? drm_is_current_master+0x51/0x140 [ 2748.740770] drm_ioctl_kernel+0x278/0x330 [ 2748.744910] ? drm_mode_cursor_common+0x9e0/0x9e0 [ 2748.749745] ? drm_setversion+0x8b0/0x8b0 [ 2748.753891] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 2748.759426] ? _copy_from_user+0xdf/0x150 [ 2748.763572] drm_ioctl+0x57e/0xb00 [ 2748.767101] ? drm_mode_cursor_common+0x9e0/0x9e0 [ 2748.771948] ? drm_ioctl_kernel+0x330/0x330 [ 2748.776267] ? smk_tskacc+0x3dd/0x520 [ 2748.780063] ? smack_privileged+0xd0/0xd0 [ 2748.784203] ? drm_ioctl_kernel+0x330/0x330 [ 2748.788516] do_vfs_ioctl+0x1de/0x1790 [ 2748.792396] ? __lock_is_held+0xb5/0x140 [ 2748.796451] ? ioctl_preallocate+0x300/0x300 [ 2748.800855] ? smk_curacc+0x7f/0xa0 [ 2748.804473] ? smack_file_ioctl+0x210/0x3c0 [ 2748.808784] ? fget_raw+0x20/0x20 [ 2748.812230] ? smack_file_lock+0x2e0/0x2e0 [ 2748.816463] ? fput+0x130/0x1a0 [ 2748.819738] ? do_syscall_64+0x9a/0x820 [ 2748.823704] ? do_syscall_64+0x9a/0x820 [ 2748.827675] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2748.833204] ? security_file_ioctl+0x94/0xc0 [ 2748.837614] ksys_ioctl+0xa9/0xd0 [ 2748.841063] __x64_sys_ioctl+0x73/0xb0 [ 2748.844950] do_syscall_64+0x1b9/0x820 [ 2748.848828] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 2748.854185] ? syscall_return_slowpath+0x5e0/0x5e0 [ 2748.859104] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 2748.863950] ? trace_hardirqs_on_caller+0x310/0x310 [ 2748.869046] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 2748.874072] ? prepare_exit_to_usermode+0x291/0x3b0 [ 2748.879084] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 2748.883927] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2748.889117] RIP: 0033:0x457569 [ 2748.892301] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 14:19:23 executing program 1: r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/expire_quiescent_template\x00', 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000140)=@security={'security\x00', 0xe, 0x4, 0x4e0, 0x1f0, 0x320, 0x0, 0x320, 0x320, 0x438, 0x438, 0x438, 0x438, 0x438, 0x4, &(0x7f0000000100), {[{{@ipv6={@local, @local, [0x0, 0xffffff00, 0xffffffff, 0xffffff00], [0xffffffff, 0xff, 0xffffffff, 0xff], 'eql\x00', 'gretap0\x00', {}, {0xff}, 0x0, 0x7fffffff, 0x2, 0x61}, 0x0, 0x188, 0x1c8, 0x0, {}, [@common=@unspec=@conntrack2={0xc0, 'conntrack\x00', 0x2, {{@ipv4=@loopback, [0xffffffff, 0xffffffff, 0x0, 0xffffffff], @ipv4=@loopback, [0x0, 0xffffffff, 0xffffff00, 0xff000000], @ipv6=@ipv4={[], [], @remote}, [0xffffff00, 0xff000000, 0xff000000, 0xff], @ipv4=@multicast2, [0xffffffff, 0xff, 0xff0000ff], 0x3, 0x1ff, 0x4, 0x4e21, 0x4e20, 0x4e22, 0x4e20, 0x28, 0x20}, 0x1c0, 0x98}}]}, @common=@unspec=@ERROR={0x40, 'ERROR\x00', 0x0, "f650bd5c77822a55c077a2b3078812467f4ab9fefc372cf333baff203cdb"}}, {{@ipv6={@remote, @mcast2, [0xff000000, 0xffffff00, 0xffffffff, 0xff000000], [0x0, 0xff, 0xff000000, 0xffffff00], 'syzkaller0\x00', 'lo\x00', {}, {0xff}, 0x2b, 0x1, 0x2, 0x23}, 0x0, 0xf0, 0x130, 0x0, {}, [@common=@hl={0x28, 'hl\x00'}]}, @common=@inet=@TCPOPTSTRIP={0x40, 'TCPOPTSTRIP\x00', 0x0, {[0xe08d, 0x6, 0xff, 0x800, 0x2, 0x7, 0x3, 0x5]}}}, {{@uncond, 0x0, 0xf0, 0x118, 0x0, {}, [@common=@hl={0x28, 'hl\x00', 0x0, {0x3, 0x604}}]}, @common=@unspec=@STANDARD={0x28, '\x00', 0x0, 0xfffffffffffffffd}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x540) ioctl$EXT4_IOC_MIGRATE(0xffffffffffffffff, 0x6609) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000300)={0x0}, &(0x7f0000000400)=0xc) getsockopt$ARPT_SO_GET_INFO(r0, 0x0, 0x60, &(0x7f0000000740)={'filter\x00'}, &(0x7f00000007c0)=0x44) getpgrp(r2) prctl$PR_GET_NAME(0x10, &(0x7f0000000800)=""/233) lremovexattr(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000480)=@random={'trusted.', 'bpf\x00'}) getsockopt$inet_sctp_SCTP_PR_ASSOC_STATUS(0xffffffffffffffff, 0x84, 0x73, &(0x7f0000000280)={0x0, 0x8, 0x0, 0xe0}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r3 = syz_open_dev$amidi(&(0x7f0000000100)='/dev/amidi#\x00', 0x2, 0x800) recvfrom(r3, &(0x7f0000000500)=""/96, 0x60, 0x20, &(0x7f00000005c0)=@ipx={0x4, 0x1, 0x6, "6b183128f377"}, 0x80) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000200)='./file0\x00', 0x700, 0x0, &(0x7f00000024c0), 0x100032, &(0x7f00000000c0)=ANY=[@ANYBLOB]) prctl$PR_MPX_ENABLE_MANAGEMENT(0x2b) getsockopt$inet_dccp_int(0xffffffffffffffff, 0x21, 0xf, &(0x7f0000000240), 0x0) fstat(0xffffffffffffffff, &(0x7f00000006c0)) getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, &(0x7f0000000440)={0x0, 0x80}, &(0x7f00000001c0)=0xfffffffffffffd3f) vmsplice(r0, &(0x7f0000000680), 0x0, 0x1) ioctl$FICLONE(r1, 0x40049409, r3) setgroups(0x3, &(0x7f0000000340)=[0x0, 0x0, 0x0]) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, 0x0) 14:19:23 executing program 4: r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/expire_quiescent_template\x00', 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000140)=ANY=[@ANYBLOB="73656375726974790000000000000000000000000000000000000000000000000e00000004000000b8040000f001000020030000000000002003000020030000380400003804000038040000380400003804000004000000", @ANYPTR=&(0x7f0000000100)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00'], @ANYBLOB="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"], 0x518) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = getpgrp(0x0) prlimit64(r2, 0x0, &(0x7f00000004c0)={0x0, 0x7ffffd}, &(0x7f00000002c0)) lremovexattr(0x0, &(0x7f0000000480)=@random={'trusted.', 'bpf\x00'}) getsockopt$inet_sctp_SCTP_PR_ASSOC_STATUS(0xffffffffffffffff, 0x84, 0x73, &(0x7f0000000280), 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r3 = syz_open_dev$amidi(&(0x7f0000000100)='/dev/amidi#\x00', 0x2, 0x800) recvfrom(0xffffffffffffffff, 0x0, 0x0, 0x20, &(0x7f00000005c0)=@ipx={0x4, 0x1, 0x6, "6b183128f377"}, 0x80) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000200)='./file0\x00', 0x700, 0x0, &(0x7f00000024c0), 0x100032, &(0x7f00000000c0)=ANY=[@ANYBLOB]) getsockopt$inet_dccp_int(0xffffffffffffffff, 0x21, 0xf, &(0x7f0000000240), 0x0) fstat(0xffffffffffffffff, &(0x7f00000006c0)) getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, &(0x7f0000000440)={0x0, 0x80}, &(0x7f00000001c0)=0xfffffffffffffd3f) ioctl$FICLONE(r1, 0x40049409, r3) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, 0x0) 14:19:23 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x3, &(0x7f0000001fd8)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x15}}, &(0x7f0000000080)="47504c049c3514bf772da07ae82e76590a36f6493ec1ab91b397e42abf1ea6cd8cd77427fc9a9e2b7165f52b4107bf0850d899dc52d013175ddb1b2f46203c2a05b722e33e556fb2e3f39a3cde1fca53640337ec956146bdbfcb115070195631de5d21a5ea9e638c2bdb78a501ca4b6ea313d82568f9382c2c3f6faba6b4ee54793b4ed26dae3e52225029bb2ac0007f77754c3f23ceda9809b9a9684a940abcaa8cfcc7133ec422e9c83888318d41e9a493f0195fe2599651b89504f5dba14625ce2366f33d95dba92f867279cabf4aceddc85a8af7a0fa68d767ce5136b9d0d1966c499cb6bf34c2988666970000000000000000000000", 0x0, 0x0, 0x0, 0x3}, 0x48) 14:19:23 executing program 0 (fault-call:0 fault-nth:2): syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) [ 2748.911686] RSP: 002b:00007f2cf34e0c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 2748.919389] RAX: ffffffffffffffda RBX: 00007f2cf34e0c90 RCX: 0000000000457569 [ 2748.926649] RDX: 0000000020000080 RSI: ffffffffffffffb7 RDI: 0000000000000003 [ 2748.933907] RBP: 000000000072bf00 R08: 0000000000000000 R09: 0000000000000000 [ 2748.941176] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f2cf34e16d4 [ 2748.948437] R13: 00000000004be7f7 R14: 00000000004cebe0 R15: 0000000000000004 [ 2748.960153] hfs: can't find a HFS filesystem on dev loop2 14:19:23 executing program 3 (fault-call:2 fault-nth:4): r0 = syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x1, 0x0) accept$inet6(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000080)=0x1c) ioctl(r0, 0xffffffffffffffb7, &(0x7f0000000080)) 14:19:23 executing program 2: getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) syz_mount_image$hfs(&(0x7f0000000200)='hfs\x00', &(0x7f0000000280)='./file0\x00', 0xf4ffffff, 0x0, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) [ 2749.046102] FAULT_INJECTION: forcing a failure. [ 2749.046102] name failslab, interval 1, probability 0, space 0, times 0 [ 2749.075929] CPU: 1 PID: 3496 Comm: syz-executor0 Not tainted 4.20.0-rc5+ #142 [ 2749.083271] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2749.092776] Call Trace: [ 2749.095410] dump_stack+0x244/0x39d [ 2749.099097] ? dump_stack_print_info.cold.1+0x20/0x20 [ 2749.104353] ? find_held_lock+0x36/0x1c0 [ 2749.108472] should_fail.cold.4+0xa/0x17 [ 2749.112595] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 2749.117746] ? rcu_read_unlock_special+0x1c0/0x1c0 [ 2749.122708] ? kasan_check_read+0x11/0x20 [ 2749.126871] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 2749.132155] ? rcu_softirq_qs+0x20/0x20 [ 2749.136134] ? rcu_softirq_qs+0x20/0x20 [ 2749.140114] ? unwind_dump+0x190/0x190 [ 2749.144020] ? is_bpf_text_address+0xd3/0x170 [ 2749.148519] ? kernel_text_address+0x79/0xf0 [ 2749.152951] ? __kernel_text_address+0xd/0x40 [ 2749.157449] ? unwind_get_return_address+0x61/0xa0 [ 2749.162386] ? __save_stack_trace+0x8d/0xf0 [ 2749.166727] ? perf_trace_sched_process_exec+0x860/0x860 [ 2749.172183] ? save_stack+0x43/0xd0 [ 2749.175824] ? kasan_kmalloc+0xc7/0xe0 [ 2749.179718] ? kasan_slab_alloc+0x12/0x20 [ 2749.183870] ? kmem_cache_alloc+0x12e/0x730 [ 2749.188186] ? shmem_alloc_inode+0x1b/0x40 [ 2749.192419] __should_failslab+0x124/0x180 [ 2749.196673] should_failslab+0x9/0x14 [ 2749.200467] kmem_cache_alloc+0x2be/0x730 [ 2749.204620] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 2749.209625] ? map_id_range_down+0x1ee/0x430 [ 2749.214030] new_inode_smack+0x20/0xb0 [ 2749.217917] smack_inode_alloc_security+0x92/0x100 [ 2749.222838] security_inode_alloc+0x73/0xd0 [ 2749.227151] inode_init_always+0x68f/0xd80 [ 2749.231379] ? get_nr_inodes+0x120/0x120 [ 2749.235434] ? rcu_pm_notify+0xc0/0xc0 [ 2749.239321] ? rcu_read_lock_sched_held+0x14f/0x180 [ 2749.244327] ? kmem_cache_alloc+0x33a/0x730 [ 2749.248644] ? shmem_alloc_inode+0x1b/0x40 [ 2749.252870] ? shmem_destroy_callback+0xc0/0xc0 [ 2749.257532] alloc_inode+0x80/0x190 [ 2749.261149] new_inode_pseudo+0x71/0x1a0 [ 2749.265197] ? prune_icache_sb+0x1c0/0x1c0 [ 2749.269427] ? _raw_spin_unlock+0x2c/0x50 [ 2749.273572] new_inode+0x1c/0x40 [ 2749.276936] shmem_get_inode+0xf1/0x920 [ 2749.280909] ? shmem_encode_fh+0x340/0x340 [ 2749.285133] ? lock_downgrade+0x900/0x900 [ 2749.289271] ? lock_release+0xa00/0xa00 [ 2749.293235] ? perf_trace_sched_process_exec+0x860/0x860 [ 2749.298678] ? usercopy_warn+0x110/0x110 [ 2749.302735] __shmem_file_setup.part.50+0x83/0x2a0 [ 2749.307660] shmem_file_setup+0x65/0x90 [ 2749.311626] __x64_sys_memfd_create+0x2af/0x4f0 [ 2749.316285] ? memfd_fcntl+0x1910/0x1910 [ 2749.320348] do_syscall_64+0x1b9/0x820 [ 2749.324229] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 2749.329589] ? syscall_return_slowpath+0x5e0/0x5e0 [ 2749.334508] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 2749.339346] ? trace_hardirqs_on_caller+0x310/0x310 [ 2749.344355] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 2749.349362] ? prepare_exit_to_usermode+0x291/0x3b0 [ 2749.354371] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 2749.359210] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2749.364389] RIP: 0033:0x457569 [ 2749.367586] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2749.386477] RSP: 002b:00007f49544a3a88 EFLAGS: 00000246 ORIG_RAX: 000000000000013f 14:19:24 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x3, &(0x7f0000001fd8)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x15}}, &(0x7f0000000080)="47504c049c3514bf772da07ae82e76590a36f6493ec1ab91b397e42abf1ea6cd8cd77427fc9a9e2b7165f52b4107bf0850d899dc52d013175ddb1b2f46203c2a05b722e33e556fb2e3f39a3cde1fca53640337ec956146bdbfcb115070195631de5d21a5ea9e638c2bdb78a501ca4b6ea313d82568f9382c2c3f6faba6b4ee54793b4ed26dae3e52225029bb2ac0007f77754c3f23ceda9809b9a9684a940abcaa8cfcc7133ec422e9c83888318d41e9a493f0195fe2599651b89504f5dba14625ce2366f33d95dba92f867279cabf4aceddc85a8af7a0fa68d767ce5136b9d0d1966c499cb6bf34c2988666970000000000000000000000", 0x0, 0x0, 0x0, 0x300000000000000}, 0x48) 14:19:24 executing program 0 (fault-call:0 fault-nth:3): syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) [ 2749.394178] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 0000000000457569 [ 2749.401438] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00000000004bc787 [ 2749.408696] RBP: 000000000072bf00 R08: 0000000000000000 R09: 00000000fbad8001 [ 2749.415957] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f49544a46d4 [ 2749.423217] R13: 00000000004c5005 R14: 00000000004d8c00 R15: 0000000000000003 [ 2749.562546] FAULT_INJECTION: forcing a failure. [ 2749.562546] name failslab, interval 1, probability 0, space 0, times 0 14:19:24 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x3, &(0x7f0000001fd8)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x15}}, &(0x7f0000000080)="47504c049c3514bf772da07ae82e76590a36f6493ec1ab91b397e42abf1ea6cd8cd77427fc9a9e2b7165f52b4107bf0850d899dc52d013175ddb1b2f46203c2a05b722e33e556fb2e3f39a3cde1fca53640337ec956146bdbfcb115070195631de5d21a5ea9e638c2bdb78a501ca4b6ea313d82568f9382c2c3f6faba6b4ee54793b4ed26dae3e52225029bb2ac0007f77754c3f23ceda9809b9a9684a940abcaa8cfcc7133ec422e9c83888318d41e9a493f0195fe2599651b89504f5dba14625ce2366f33d95dba92f867279cabf4aceddc85a8af7a0fa68d767ce5136b9d0d1966c499cb6bf34c2988666970000000000000000000000", 0x0, 0x0, 0x0, 0x4000000}, 0x48) 14:19:24 executing program 2: getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) syz_mount_image$hfs(&(0x7f0000000200)='hfs\x00', &(0x7f0000000280)='./file0\x00', 0x7, 0x0, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) [ 2749.602704] FAULT_INJECTION: forcing a failure. [ 2749.602704] name failslab, interval 1, probability 0, space 0, times 0 [ 2749.657502] CPU: 1 PID: 3511 Comm: syz-executor3 Not tainted 4.20.0-rc5+ #142 [ 2749.664846] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2749.674229] Call Trace: [ 2749.676848] dump_stack+0x244/0x39d [ 2749.680518] ? dump_stack_print_info.cold.1+0x20/0x20 [ 2749.685754] should_fail.cold.4+0xa/0x17 [ 2749.689850] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 2749.694989] ? kasan_kmalloc+0xc7/0xe0 [ 2749.698908] ? zap_class+0x640/0x640 [ 2749.702644] ? drm_atomic_helper_disable_plane+0x3a/0x200 [ 2749.708207] ? __setplane_atomic+0x2a3/0x330 [ 2749.712638] ? do_vfs_ioctl+0x1de/0x1790 [ 2749.716717] ? ksys_ioctl+0xa9/0xd0 [ 2749.720367] ? __x64_sys_ioctl+0x73/0xb0 [ 2749.724449] ? do_syscall_64+0x1b9/0x820 [ 2749.728533] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2749.733924] ? zap_class+0x640/0x640 [ 2749.737675] ? find_held_lock+0x36/0x1c0 [ 2749.741765] ? __lock_is_held+0xb5/0x140 [ 2749.745850] ? perf_trace_sched_process_exec+0x860/0x860 [ 2749.751337] ? ww_mutex_lock_interruptible+0x41/0xb0 [ 2749.756462] __should_failslab+0x124/0x180 [ 2749.756483] should_failslab+0x9/0x14 [ 2749.756500] kmem_cache_alloc_trace+0x2d7/0x750 [ 2749.756516] ? drm_atomic_state_init+0x27a/0x3b0 [ 2749.756539] ? rcu_read_lock_sched_held+0x14f/0x180 [ 2749.756624] vkms_plane_duplicate_state+0x49/0x120 [ 2749.756645] drm_atomic_get_plane_state+0x225/0x560 [ 2749.756668] drm_atomic_helper_disable_plane+0x7b/0x200 [ 2749.756686] __setplane_atomic+0x2a3/0x330 [ 2749.756708] setplane_internal+0x127/0x370 [ 2749.756733] ? __setplane_internal+0x5e0/0x5e0 [ 2749.756760] ? mutex_unlock+0xd/0x10 [ 2749.756776] ? __drm_mode_object_find+0xb8/0x210 [ 2749.756796] drm_mode_setplane+0x567/0x830 [ 2749.756813] ? drm_is_current_master+0x51/0x140 [ 2749.756836] drm_ioctl_kernel+0x278/0x330 [ 2749.756852] ? drm_mode_cursor_common+0x9e0/0x9e0 [ 2749.756876] ? drm_setversion+0x8b0/0x8b0 [ 2749.756896] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 2749.756911] ? _copy_from_user+0xdf/0x150 [ 2749.756930] drm_ioctl+0x57e/0xb00 [ 2749.756945] ? drm_mode_cursor_common+0x9e0/0x9e0 [ 2749.756968] ? drm_ioctl_kernel+0x330/0x330 [ 2749.756995] ? smk_tskacc+0x3dd/0x520 [ 2749.757019] ? smack_privileged+0xd0/0xd0 [ 2749.757039] ? drm_ioctl_kernel+0x330/0x330 [ 2749.757056] do_vfs_ioctl+0x1de/0x1790 [ 2749.757070] ? __lock_is_held+0xb5/0x140 [ 2749.757088] ? ioctl_preallocate+0x300/0x300 [ 2749.844114] ? smk_curacc+0x7f/0xa0 [ 2749.844136] ? smack_file_ioctl+0x210/0x3c0 [ 2749.844150] ? fget_raw+0x20/0x20 [ 2749.844167] ? smack_file_lock+0x2e0/0x2e0 [ 2749.844191] ? fput+0x130/0x1a0 [ 2749.844209] ? do_syscall_64+0x9a/0x820 [ 2749.844224] ? do_syscall_64+0x9a/0x820 [ 2749.844244] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2749.844261] ? security_file_ioctl+0x94/0xc0 [ 2749.844281] ksys_ioctl+0xa9/0xd0 [ 2749.844300] __x64_sys_ioctl+0x73/0xb0 [ 2749.844317] do_syscall_64+0x1b9/0x820 [ 2749.844333] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 2749.844351] ? syscall_return_slowpath+0x5e0/0x5e0 [ 2749.844366] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 2749.844385] ? trace_hardirqs_on_caller+0x310/0x310 [ 2749.844402] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 2749.844416] ? prepare_exit_to_usermode+0x291/0x3b0 [ 2749.844435] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 2749.901395] EXT4-fs (sda1): Unrecognized mount option "./file0" or missing value [ 2749.901504] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2749.901521] RIP: 0033:0x457569 [ 2749.939235] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2749.939244] RSP: 002b:00007f2cf34e0c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 2749.939258] RAX: ffffffffffffffda RBX: 00007f2cf34e0c90 RCX: 0000000000457569 [ 2749.939267] RDX: 0000000020000080 RSI: ffffffffffffffb7 RDI: 0000000000000003 [ 2749.939277] RBP: 000000000072bf00 R08: 0000000000000000 R09: 0000000000000000 [ 2749.939286] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f2cf34e16d4 [ 2749.939295] R13: 00000000004be7f7 R14: 00000000004cebe0 R15: 0000000000000004 [ 2749.940880] CPU: 1 PID: 3517 Comm: syz-executor0 Not tainted 4.20.0-rc5+ #142 [ 2749.949136] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2749.949142] Call Trace: [ 2749.949164] dump_stack+0x244/0x39d [ 2749.949185] ? dump_stack_print_info.cold.1+0x20/0x20 [ 2749.949215] should_fail.cold.4+0xa/0x17 [ 2749.949235] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 2749.949253] ? __kernel_text_address+0xd/0x40 [ 2749.949268] ? unwind_get_return_address+0x61/0xa0 [ 2749.949287] ? __lockdep_init_map+0x105/0x590 [ 2749.949303] ? lockdep_init_map+0x9/0x10 [ 2749.949315] ? debug_mutex_init+0x2d/0x60 [ 2749.949333] ? find_held_lock+0x36/0x1c0 [ 2749.949367] ? perf_trace_sched_process_exec+0x860/0x860 [ 2749.949390] __should_failslab+0x124/0x180 [ 2749.949410] should_failslab+0x9/0x14 [ 2750.124757] kmem_cache_alloc+0x2be/0x730 [ 2750.128901] ? mpol_shared_policy_init+0x235/0x650 [ 2750.133825] ? current_time+0x72/0x1b0 [ 2750.137716] __d_alloc+0xc8/0xb90 [ 2750.141166] ? shrink_dcache_for_umount+0x2b0/0x2b0 [ 2750.146174] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 2750.151270] ? ktime_get_coarse_real_ts64+0x22e/0x370 [ 2750.156450] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2750.161984] ? timespec64_trunc+0xea/0x180 [ 2750.166209] ? inode_init_owner+0x340/0x340 [ 2750.170529] ? _raw_spin_unlock+0x2c/0x50 [ 2750.174686] ? current_time+0x131/0x1b0 [ 2750.178652] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2750.184179] ? __lockdep_init_map+0x105/0x590 [ 2750.188669] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 2750.194198] ? lockdep_annotate_inode_mutex_key+0x5b/0x70 [ 2750.199733] d_alloc_pseudo+0x1d/0x30 [ 2750.203531] alloc_file_pseudo+0x158/0x3f0 [ 2750.207761] ? alloc_file+0x4d0/0x4d0 [ 2750.211564] ? usercopy_warn+0x110/0x110 [ 2750.215627] __shmem_file_setup.part.50+0x110/0x2a0 [ 2750.220639] shmem_file_setup+0x65/0x90 [ 2750.224618] __x64_sys_memfd_create+0x2af/0x4f0 [ 2750.229283] ? memfd_fcntl+0x1910/0x1910 [ 2750.233345] do_syscall_64+0x1b9/0x820 [ 2750.237340] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 2750.242698] ? syscall_return_slowpath+0x5e0/0x5e0 [ 2750.247635] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 2750.252474] ? trace_hardirqs_on_caller+0x310/0x310 [ 2750.257495] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 2750.262511] ? prepare_exit_to_usermode+0x291/0x3b0 [ 2750.267521] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 2750.272362] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2750.277541] RIP: 0033:0x457569 [ 2750.280729] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2750.299623] RSP: 002b:00007f49544a3a88 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 2750.307327] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 0000000000457569 [ 2750.314588] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00000000004bc787 [ 2750.321847] RBP: 000000000072bf00 R08: 0000000000000000 R09: 00000000fbad8001 [ 2750.329109] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f49544a46d4 [ 2750.336383] R13: 00000000004c5005 R14: 00000000004d8c00 R15: 0000000000000003 14:19:25 executing program 3 (fault-call:2 fault-nth:5): r0 = syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x1, 0x0) accept$inet6(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000080)=0x1c) ioctl(r0, 0xffffffffffffffb7, &(0x7f0000000080)) [ 2750.430760] hfs: can't find a HFS filesystem on dev loop2 [ 2750.444742] EXT4-fs (sda1): Unrecognized mount option "./file0" or missing value [ 2750.507090] FAULT_INJECTION: forcing a failure. [ 2750.507090] name failslab, interval 1, probability 0, space 0, times 0 [ 2750.524591] EXT4-fs (sda1): Unrecognized mount option "./file0" or missing value [ 2750.552503] hfs: can't find a HFS filesystem on dev loop2 [ 2750.587053] CPU: 1 PID: 3552 Comm: syz-executor3 Not tainted 4.20.0-rc5+ #142 14:19:25 executing program 0: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) [ 2750.594401] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2750.603774] Call Trace: [ 2750.606404] dump_stack+0x244/0x39d [ 2750.610061] ? dump_stack_print_info.cold.1+0x20/0x20 [ 2750.615283] ? __kernel_text_address+0xd/0x40 [ 2750.619823] ? unwind_get_return_address+0x61/0xa0 [ 2750.624800] should_fail.cold.4+0xa/0x17 [ 2750.628898] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 2750.634030] ? save_stack+0x43/0xd0 [ 2750.637672] ? kasan_kmalloc+0xc7/0xe0 [ 2750.641582] ? kmem_cache_alloc_trace+0x152/0x750 [ 2750.646462] ? vkms_plane_duplicate_state+0x49/0x120 14:19:25 executing program 1: r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/expire_quiescent_template\x00', 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000140)=@security={'security\x00', 0xe, 0x4, 0x4e0, 0x1f0, 0x320, 0x0, 0x320, 0x320, 0x438, 0x438, 0x438, 0x438, 0x438, 0x4, &(0x7f0000000100), {[{{@ipv6={@local, @local, [0x0, 0xffffff00, 0xffffffff, 0xffffff00], [0xffffffff, 0xff, 0xffffffff, 0xff], 'eql\x00', 'gretap0\x00', {}, {0xff}, 0x0, 0x7fffffff, 0x2, 0x61}, 0x0, 0x188, 0x1c8, 0x0, {}, [@common=@unspec=@conntrack2={0xc0, 'conntrack\x00', 0x2, {{@ipv4=@loopback, [0xffffffff, 0xffffffff, 0x0, 0xffffffff], @ipv4=@loopback, [0x0, 0xffffffff, 0xffffff00, 0xff000000], @ipv6=@ipv4={[], [], @remote}, [0xffffff00, 0xff000000, 0xff000000, 0xff], @ipv4=@multicast2, [0xffffffff, 0xff, 0xff0000ff], 0x3, 0x1ff, 0x4, 0x4e21, 0x4e20, 0x4e22, 0x4e20, 0x28, 0x20}, 0x1c0, 0x98}}]}, @common=@unspec=@ERROR={0x40, 'ERROR\x00', 0x0, "f650bd5c77822a55c077a2b3078812467f4ab9fefc372cf333baff203cdb"}}, {{@ipv6={@remote, @mcast2, [0xff000000, 0xffffff00, 0xffffffff, 0xff000000], [0x0, 0xff, 0xff000000, 0xffffff00], 'syzkaller0\x00', 'lo\x00', {}, {0xff}, 0x2b, 0x1, 0x2, 0x23}, 0x0, 0xf0, 0x130, 0x0, {}, [@common=@hl={0x28, 'hl\x00'}]}, @common=@inet=@TCPOPTSTRIP={0x40, 'TCPOPTSTRIP\x00', 0x0, {[0xe08d, 0x6, 0xff, 0x800, 0x2, 0x7, 0x3, 0x5]}}}, {{@uncond, 0x0, 0xf0, 0x118, 0x0, {}, [@common=@hl={0x28, 'hl\x00', 0x0, {0x3, 0x604}}]}, @common=@unspec=@STANDARD={0x28, '\x00', 0x0, 0xfffffffffffffffd}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x540) ioctl$EXT4_IOC_MIGRATE(0xffffffffffffffff, 0x6609) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000300)={0x0}, &(0x7f0000000400)=0xc) getsockopt$ARPT_SO_GET_INFO(r0, 0x0, 0x60, &(0x7f0000000740)={'filter\x00'}, &(0x7f00000007c0)=0x44) r3 = getpgrp(r2) prlimit64(r3, 0x0, &(0x7f00000004c0)={0x0, 0x7ffffd}, &(0x7f00000002c0)) lremovexattr(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000480)=@random={'trusted.', 'bpf\x00'}) getsockopt$inet_sctp_SCTP_PR_ASSOC_STATUS(0xffffffffffffffff, 0x84, 0x73, &(0x7f0000000280)={0x0, 0x8, 0x0, 0xe0}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r4 = syz_open_dev$amidi(&(0x7f0000000100)='/dev/amidi#\x00', 0x2, 0x800) recvfrom(r4, &(0x7f0000000500)=""/96, 0x60, 0x20, &(0x7f00000005c0)=@ipx={0x4, 0x1, 0x6, "6b183128f377"}, 0x80) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) write$tun(r0, &(0x7f0000000680)={@val={0x0, 0xa01}, @void, @mpls={[{0x1, 0x7f, 0x400, 0x4}, {0x4527, 0x3ff, 0x6, 0x5}, {0x3, 0x4, 0x401, 0xff}], @llc={@llc={0xfe, 0x0, "b356"}}}}, 0x14) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000200)='./file0\x00', 0x700, 0x0, &(0x7f00000024c0), 0x100032, &(0x7f00000000c0)=ANY=[@ANYBLOB]) prctl$PR_MPX_ENABLE_MANAGEMENT(0x2b) getsockopt$inet_dccp_int(0xffffffffffffffff, 0x21, 0xf, &(0x7f0000000240), 0x0) fstat(0xffffffffffffffff, &(0x7f00000006c0)) getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, &(0x7f0000000440)={0x0, 0x80}, &(0x7f00000001c0)=0xfffffffffffffd3f) ioctl$FICLONE(r1, 0x40049409, r4) setgroups(0x3, &(0x7f0000000340)=[0x0, 0x0, 0x0]) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, 0x0) [ 2750.651604] ? drm_atomic_get_plane_state+0x225/0x560 [ 2750.656832] ? zap_class+0x640/0x640 [ 2750.660572] ? drm_mode_setplane+0x567/0x830 [ 2750.665004] ? drm_ioctl_kernel+0x278/0x330 [ 2750.669351] ? drm_ioctl+0x57e/0xb00 [ 2750.673079] ? do_vfs_ioctl+0x1de/0x1790 [ 2750.677157] ? ksys_ioctl+0xa9/0xd0 [ 2750.680810] ? __x64_sys_ioctl+0x73/0xb0 [ 2750.684902] ? do_syscall_64+0x1b9/0x820 [ 2750.688992] ? find_held_lock+0x36/0x1c0 [ 2750.693084] ? __lock_is_held+0xb5/0x140 [ 2750.697169] ? perf_trace_sched_process_exec+0x860/0x860 [ 2750.702661] __should_failslab+0x124/0x180 [ 2750.706917] should_failslab+0x9/0x14 [ 2750.710726] kmem_cache_alloc_trace+0x2d7/0x750 [ 2750.715400] ? drm_atomic_state_init+0x27a/0x3b0 [ 2750.720166] ? rcu_read_lock_sched_held+0x14f/0x180 [ 2750.725199] vkms_plane_duplicate_state+0x92/0x120 [ 2750.730163] drm_atomic_get_plane_state+0x225/0x560 [ 2750.735752] drm_atomic_helper_disable_plane+0x7b/0x200 [ 2750.741150] __setplane_atomic+0x2a3/0x330 [ 2750.745797] setplane_internal+0x127/0x370 [ 2750.750076] ? __setplane_internal+0x5e0/0x5e0 [ 2750.754687] ? mutex_unlock+0xd/0x10 [ 2750.758415] ? __drm_mode_object_find+0xb8/0x210 [ 2750.763205] drm_mode_setplane+0x567/0x830 [ 2750.767470] ? drm_is_current_master+0x51/0x140 [ 2750.772148] drm_ioctl_kernel+0x278/0x330 [ 2750.776316] ? drm_mode_cursor_common+0x9e0/0x9e0 [ 2750.781173] ? drm_setversion+0x8b0/0x8b0 [ 2750.785352] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 2750.790903] ? _copy_from_user+0xdf/0x150 [ 2750.795137] drm_ioctl+0x57e/0xb00 [ 2750.798711] ? drm_mode_cursor_common+0x9e0/0x9e0 [ 2750.803558] ? drm_ioctl_kernel+0x330/0x330 [ 2750.807888] ? smk_tskacc+0x3dd/0x520 [ 2750.811691] ? smack_privileged+0xd0/0xd0 [ 2750.815844] ? drm_ioctl_kernel+0x330/0x330 [ 2750.820173] do_vfs_ioctl+0x1de/0x1790 [ 2750.824104] ? __lock_is_held+0xb5/0x140 [ 2750.828198] ? ioctl_preallocate+0x300/0x300 [ 2750.832624] ? smk_curacc+0x7f/0xa0 [ 2750.836242] ? smack_file_ioctl+0x210/0x3c0 [ 2750.840550] ? fget_raw+0x20/0x20 [ 2750.844082] ? smack_file_lock+0x2e0/0x2e0 [ 2750.848312] ? fput+0x130/0x1a0 [ 2750.851583] ? do_syscall_64+0x9a/0x820 [ 2750.855551] ? do_syscall_64+0x9a/0x820 [ 2750.859521] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2750.865068] ? security_file_ioctl+0x94/0xc0 [ 2750.869472] ksys_ioctl+0xa9/0xd0 [ 2750.872921] __x64_sys_ioctl+0x73/0xb0 [ 2750.876805] do_syscall_64+0x1b9/0x820 [ 2750.880683] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 2750.886045] ? syscall_return_slowpath+0x5e0/0x5e0 [ 2750.890970] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 2750.895809] ? trace_hardirqs_on_caller+0x310/0x310 [ 2750.900823] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 2750.906334] ? prepare_exit_to_usermode+0x291/0x3b0 [ 2750.911367] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 2750.916203] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2750.921390] RIP: 0033:0x457569 [ 2750.924593] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2750.943482] RSP: 002b:00007f2cf34e0c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 14:19:25 executing program 4: r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/expire_quiescent_template\x00', 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000140)=@security={'security\x00', 0xe, 0x4, 0x4b8, 0x1f0, 0x320, 0x0, 0x320, 0x320, 0x438, 0x438, 0x438, 0x438, 0x438, 0x4, &(0x7f0000000100), {[{{@ipv6={@local, @local, [0x0, 0x0, 0xffffffff, 0xffffff00], [0xffffffff, 0xff, 0xffffffff, 0xff], 'eql\x00', 'gretap0\x00', {}, {0xff}, 0x0, 0x7fffffff, 0x2, 0x61}, 0x0, 0x188, 0x1c8, 0x0, {}, [@common=@unspec=@conntrack2={0xc0, 'conntrack\x00', 0x2, {{@ipv4=@loopback, [0xffffffff, 0xffffffff, 0x0, 0xffffffff], @ipv4=@loopback, [0x0, 0xffffffff, 0xffffff00, 0xff000000], @ipv6=@ipv4={[], [], @remote}, [0xffffff00, 0xff000000, 0xff000000, 0xff], @ipv4=@multicast2, [0xffffffff, 0xff, 0xff0000ff], 0x3, 0x1ff, 0x4, 0x4e21, 0x4e20, 0x4e22, 0x4e20, 0x28}, 0x1c0, 0x98}}]}, @common=@unspec=@ERROR={0x40, 'ERROR\x00', 0x0, "f650bd5c77822a55c077a2b3078812467f4ab9fefc372cf333baff203cdb"}}, {{@ipv6={@remote, @mcast2, [0xff000000, 0xffffff00, 0xffffffff, 0xff000000], [0x0, 0xff, 0xff000000, 0xffffff00], 'syzkaller0\x00', 'lo\x00', {}, {}, 0x2b, 0x1, 0x2, 0x23}, 0x0, 0xc8, 0x108}, @common=@inet=@TCPOPTSTRIP={0x40, 'TCPOPTSTRIP\x00', 0x0, {[0xe08d, 0x6, 0xff, 0x800, 0x2, 0x7, 0x0, 0x5]}}}, {{@uncond, 0x0, 0xf0, 0x118, 0x0, {}, [@common=@hl={0x28, 'hl\x00', 0x0, {0x3, 0x604}}]}, @common=@unspec=@STANDARD={0x28, '\x00', 0x0, 0xfffffffffffffffd}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x518) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = getpgrp(0x0) prlimit64(r2, 0x0, &(0x7f00000004c0)={0x0, 0x7ffffd}, &(0x7f00000002c0)) lremovexattr(0x0, &(0x7f0000000480)=@random={'trusted.', 'bpf\x00'}) getsockopt$inet_sctp_SCTP_PR_ASSOC_STATUS(0xffffffffffffffff, 0x84, 0x73, &(0x7f0000000280), 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r3 = syz_open_dev$amidi(&(0x7f0000000100)='/dev/amidi#\x00', 0x2, 0x800) recvfrom(0xffffffffffffffff, 0x0, 0x0, 0x20, &(0x7f00000005c0)=@ipx={0x4, 0x1, 0x6, "6b183128f377"}, 0x80) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000200)='./file0\x00', 0x700, 0x0, &(0x7f00000024c0), 0x100032, &(0x7f0000000740)=ANY=[@ANYBLOB="c6e257181641265d8d7d048d7b0997abd93aa532ec5a4815a0ccc6b4f235b018a9e14cd1ac971d63e7901bc9e4dd805801d51508e6478d6d73246c60081d7b8ef3c105da267b3707400e79c22b87a291d5b75f4d7f5c4c995f3f9abd470024a77895c002ed60b046ce7779e7b781dc54764189281495f469a908746abf958a885f185fde146b6a541f699f7edc7d59408bf5b20ec3e356c4d02c273dc7e5c188109509a694d3dae2e569f29133fe848e3127b049edba35f3f3fa392cd71dfe0f71f218923c14be2b163b09"]) getpeername$packet(r3, &(0x7f0000000680)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000840)=0x14) bind$can_raw(r0, &(0x7f0000000880)={0x1d, r4}, 0x10) getsockopt$inet_dccp_int(0xffffffffffffffff, 0x21, 0xf, &(0x7f0000000240), 0x0) fstat(0xffffffffffffffff, &(0x7f00000006c0)) getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, &(0x7f0000000440)={0x0, 0x80}, &(0x7f00000001c0)=0xfffffffffffffd3f) ioctl$FICLONE(r1, 0x40049409, r3) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, 0x0) 14:19:25 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x3, &(0x7f0000001fd8)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x15}}, &(0x7f0000000080)="47504c049c3514bf772da07ae82e76590a36f6493ec1ab91b397e42abf1ea6cd8cd77427fc9a9e2b7165f52b4107bf0850d899dc52d013175ddb1b2f46203c2a05b722e33e556fb2e3f39a3cde1fca53640337ec956146bdbfcb115070195631de5d21a5ea9e638c2bdb78a501ca4b6ea313d82568f9382c2c3f6faba6b4ee54793b4ed26dae3e52225029bb2ac0007f77754c3f23ceda9809b9a9684a940abcaa8cfcc7133ec422e9c83888318d41e9a493f0195fe2599651b89504f5dba14625ce2366f33d95dba92f867279cabf4aceddc85a8af7a0fa68d767ce5136b9d0d1966c499cb6bf34c2988666970000000000000000000000", 0x0, 0x0, 0x0, 0x4300000000000000}, 0x48) [ 2750.951183] RAX: ffffffffffffffda RBX: 00007f2cf34e0c90 RCX: 0000000000457569 [ 2750.958443] RDX: 0000000020000080 RSI: ffffffffffffffb7 RDI: 0000000000000003 [ 2750.965702] RBP: 000000000072bf00 R08: 0000000000000000 R09: 0000000000000000 [ 2750.972963] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f2cf34e16d4 [ 2750.980245] R13: 00000000004be7f7 R14: 00000000004cebe0 R15: 0000000000000004 [ 2750.989559] WARNING: CPU: 1 PID: 3552 at drivers/gpu/drm/vkms/vkms_plane.c:26 vkms_plane_duplicate_state+0x9f/0x120 [ 2751.000160] Kernel panic - not syncing: panic_on_warn set ... [ 2751.006068] CPU: 1 PID: 3552 Comm: syz-executor3 Not tainted 4.20.0-rc5+ #142 [ 2751.013356] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2751.022725] Call Trace: [ 2751.025352] dump_stack+0x244/0x39d [ 2751.029002] ? dump_stack_print_info.cold.1+0x20/0x20 [ 2751.034227] panic+0x2ad/0x55c [ 2751.037439] ? add_taint.cold.5+0x16/0x16 [ 2751.041606] ? __warn.cold.8+0x5/0x45 [ 2751.045546] ? vkms_plane_duplicate_state+0x9f/0x120 [ 2751.050662] __warn.cold.8+0x20/0x45 [ 2751.054368] ? rcu_softirq_qs+0x20/0x20 [ 2751.058347] ? vkms_plane_duplicate_state+0x9f/0x120 [ 2751.063450] report_bug+0x254/0x2d0 [ 2751.067069] do_error_trap+0x11b/0x200 [ 2751.070946] do_invalid_op+0x36/0x40 [ 2751.074648] ? vkms_plane_duplicate_state+0x9f/0x120 [ 2751.079748] invalid_op+0x14/0x20 [ 2751.083201] RIP: 0010:vkms_plane_duplicate_state+0x9f/0x120 [ 2751.088901] Code: 00 0f 85 86 00 00 00 48 8b 3d 7d 7d db 04 ba f8 00 00 00 be c0 80 60 00 e8 2e ea 76 fd 48 85 c0 49 89 c5 75 13 e8 61 de 33 fd <0f> 0b 48 c7 c7 a0 26 7b 88 e8 87 2a 1a fd e8 4e de 33 fd 48 8d bb [ 2751.107793] RSP: 0018:ffff88817fec76f8 EFLAGS: 00010246 [ 2751.113169] RAX: 0000000000040000 RBX: ffff8881cd3dd400 RCX: ffffc900065ea000 [ 2751.120449] RDX: 0000000000040000 RSI: ffffffff844bbd5f RDI: 0000000000000286 [ 2751.127717] RBP: ffff88817fec7710 R08: ffff8881d44643c0 R09: ffffed103b5e5b5f [ 2751.134979] R10: ffffed103b5e5b5f R11: ffff8881daf2dafb R12: ffff8881d3202940 [ 2751.142263] R13: 0000000000000000 R14: 0000000000000000 R15: ffff88817fec7860 [ 2751.149545] ? vkms_plane_duplicate_state+0x9f/0x120 [ 2751.154642] ? vkms_plane_duplicate_state+0x9f/0x120 [ 2751.159754] drm_atomic_get_plane_state+0x225/0x560 [ 2751.164773] drm_atomic_helper_disable_plane+0x7b/0x200 [ 2751.170139] __setplane_atomic+0x2a3/0x330 [ 2751.174391] setplane_internal+0x127/0x370 [ 2751.178628] ? __setplane_internal+0x5e0/0x5e0 [ 2751.183209] ? mutex_unlock+0xd/0x10 [ 2751.186914] ? __drm_mode_object_find+0xb8/0x210 [ 2751.191679] drm_mode_setplane+0x567/0x830 [ 2751.195927] ? drm_is_current_master+0x51/0x140 [ 2751.200594] drm_ioctl_kernel+0x278/0x330 [ 2751.204732] ? drm_mode_cursor_common+0x9e0/0x9e0 [ 2751.209571] ? drm_setversion+0x8b0/0x8b0 [ 2751.213745] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 2751.219275] ? _copy_from_user+0xdf/0x150 [ 2751.223418] drm_ioctl+0x57e/0xb00 [ 2751.226967] ? drm_mode_cursor_common+0x9e0/0x9e0 [ 2751.231807] ? drm_ioctl_kernel+0x330/0x330 [ 2751.236123] ? smk_tskacc+0x3dd/0x520 [ 2751.239919] ? smack_privileged+0xd0/0xd0 [ 2751.244059] ? drm_ioctl_kernel+0x330/0x330 [ 2751.248371] do_vfs_ioctl+0x1de/0x1790 [ 2751.252254] ? __lock_is_held+0xb5/0x140 [ 2751.256317] ? ioctl_preallocate+0x300/0x300 [ 2751.260723] ? smk_curacc+0x7f/0xa0 [ 2751.264355] ? smack_file_ioctl+0x210/0x3c0 [ 2751.268662] ? fget_raw+0x20/0x20 [ 2751.272114] ? smack_file_lock+0x2e0/0x2e0 [ 2751.276344] ? fput+0x130/0x1a0 [ 2751.279614] ? do_syscall_64+0x9a/0x820 [ 2751.283586] ? do_syscall_64+0x9a/0x820 [ 2751.287561] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2751.293090] ? security_file_ioctl+0x94/0xc0 [ 2751.297489] ksys_ioctl+0xa9/0xd0 [ 2751.300932] __x64_sys_ioctl+0x73/0xb0 [ 2751.304814] do_syscall_64+0x1b9/0x820 [ 2751.308693] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 2751.314049] ? syscall_return_slowpath+0x5e0/0x5e0 [ 2751.319077] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 2751.323923] ? trace_hardirqs_on_caller+0x310/0x310 [ 2751.328929] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 2751.333938] ? prepare_exit_to_usermode+0x291/0x3b0 [ 2751.338958] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 2751.343809] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2751.348987] RIP: 0033:0x457569 [ 2751.352184] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2751.371089] RSP: 002b:00007f2cf34e0c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 2751.378794] RAX: ffffffffffffffda RBX: 00007f2cf34e0c90 RCX: 0000000000457569 [ 2751.386057] RDX: 0000000020000080 RSI: ffffffffffffffb7 RDI: 0000000000000003 [ 2751.393320] RBP: 000000000072bf00 R08: 0000000000000000 R09: 0000000000000000 [ 2751.400607] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f2cf34e16d4 [ 2751.407878] R13: 00000000004be7f7 R14: 00000000004cebe0 R15: 0000000000000004 [ 2751.416532] Kernel Offset: disabled [ 2751.420447] Rebooting in 86400 seconds..