0000000000)={0x0, 0x14, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000200)=0x0) timer_settime(r2, 0x0, &(0x7f0000000180)={{0x0, 0x989680}, {0x0, 0x1c9c380}}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) creat(&(0x7f0000000280)='./file0\x00', 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) pwrite64(0xffffffffffffffff, 0x0, 0xffffff90, 0x0) io_setup(0x0, &(0x7f0000000180)) pwrite64(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f00000002c0)={0xffffffffffffffff, 0x10, &(0x7f0000000280)={&(0x7f0000000240)=""/43, 0x2b}}, 0x10) 18:43:01 executing program 3: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sync() r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snd/seq\x00', 0x0) r1 = dup(0xffffffffffffffff) setsockopt$inet_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000180)='lp\x00', 0x3) r2 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) r3 = socket$inet6(0xa, 0x3, 0x6) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r3, 0x29, 0x20, &(0x7f0000000300)={@mcast2, 0x10000, 0x0, 0x102, 0x8000003}, 0x20) r4 = syz_open_dev$sndctrl(&(0x7f0000000340)='/dev/snd/controlC#\x00', 0x20, 0x0) ioctl$FS_IOC_ENABLE_VERITY(r4, 0x40806685, &(0x7f0000000480)={0x1, 0x3, 0x1000, 0xd7, &(0x7f0000000640)="b1ba807a1a806758ad5999c1406f12d425166038605caae8b695d03f2f4215b3853dc3431d741e26d8e38079065fd430d103133b97ba91d666c322fcb3ed4f5d67cd70e5a899bf12f2f205d49d37f2a04f5fbd9df163698098122d8d71810e68e188c26eafb478fc4142698997090017067bd9ddc79d7e08da1051a22f57f862dbc0199eba8490394971a3485a8485db282ecaa7ceb2bd14369cd3dcd016377cae058e33bd7e357f091425fcc190d832c6c7716208925f08e558a6cc0c68bf58a855d48b1f7ffbf18219f8bd9585a495abca27dce31a1b", 0x4, 0x0, &(0x7f0000000380)="0db9a0e0"}) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, 0x0, 0x0) connect$inet6(r3, &(0x7f0000000500)={0xa, 0x0, 0x40f7, @mcast2, 0x7ff}, 0x9) r5 = syz_open_procfs(0x0, &(0x7f0000000600)='auxv\x00') sendfile(r3, r5, &(0x7f0000000240)=0x202, 0x4000000000dc) r6 = syz_genetlink_get_family_id$nbd(&(0x7f0000000140)='nbd\x00') sendmsg$NBD_CMD_RECONFIGURE(r5, &(0x7f0000000200)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)=ANY=[@ANYBLOB="14000040", @ANYRES16=r6, @ANYBLOB="050c27bd7000ffdbdf2503000000"], 0x14}, 0x1, 0x0, 0x0, 0x4}, 0x8040) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000002c0)={&(0x7f0000000180), 0xc, &(0x7f0000000280)={&(0x7f00000003c0)=ANY=[@ANYBLOB="200000007327342f348e88dd57a3edec97c2682cfee36a2a8cc9468314dafdc3f48431607737ba75d26429ecb13828688ba2cde331893c4c380137bcfb5cd33990f0b1eb2ec5821010d7a6b424af80385738e1a3e0c62d60b580fd3ee974a65051f65283570a27a11a895a051aa8", @ANYRES16=r6, @ANYBLOB="00022abd7000fbdbdf25020000000c0002008b01d44900000000"], 0x20}, 0x1, 0x0, 0x0, 0x4880}, 0x20000000) sendmsg$NBD_CMD_STATUS(r1, &(0x7f0000000240)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x38, r6, 0x100, 0x70bd2c, 0x25dfdbfb, {}, [@NBD_ATTR_DEAD_CONN_TIMEOUT={0xc, 0x8, 0x7fff}, @NBD_ATTR_SIZE_BYTES={0xc, 0x2, 0x8}, @NBD_ATTR_SIZE_BYTES={0xc, 0x2, 0x6}]}, 0x38}, 0x1, 0x0, 0x0, 0x10}, 0x4004080) connect$nfc_raw(r1, &(0x7f00000000c0)={0x27, 0x1}, 0x10) ioctl$SNDRV_SEQ_IOCTL_QUERY_SUBS(r0, 0xc0a85352, &(0x7f0000000040)) 18:43:01 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) sigaltstack(&(0x7f0000ffc000/0x2000)=nil, &(0x7f0000000100)) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f00000000c0)={@mcast1, 0x800, 0x0, 0x103, 0x1}, 0x20) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f00000000c0)={@loopback, 0x800, 0x0, 0x103, 0x2}, 0x20) getsockopt$inet_sctp6_SCTP_EVENTS(r0, 0x84, 0xb, &(0x7f0000000080), &(0x7f00000000c0)=0xe) mprotect(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x200000e) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x10, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b4050000000000006110140000000000c6000000000000184cf85c0095000000"], &(0x7f0000003ff6)='GPL\x00', 0x4, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x1dd}, 0x48) 18:43:01 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000100)=0x1) ioctl$TCGETS(r0, 0x8924, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000100)=0x1) ioctl$TCGETS(r1, 0x8924, 0x0) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x400101, 0x0) ioctl$TIOCSETD(r2, 0x5423, &(0x7f0000000100)=0x1) ioctl$TCGETS(r2, 0x8924, 0x0) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r3, 0x5423, &(0x7f0000000100)=0x1) ioctl$TCGETS(r3, 0x8924, 0x0) r4 = socket$inet6(0xa, 0x3, 0x6) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x20008000004001fe) ioctl$NS_GET_PARENT(r5, 0xb702, 0x0) r6 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x0, 0x0) r7 = dup(r6) ioctl$sock_ifreq(r7, 0x8929, &(0x7f00000000c0)={'ip6_vti0\x00', @ifru_flags}) 18:43:01 executing program 0: read$FUSE(0xffffffffffffffff, &(0x7f0000000580), 0x1000) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) timer_create(0x0, &(0x7f00000001c0)={0x0, 0x3e}, &(0x7f0000000340)) open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) openat$audio(0xffffffffffffff9c, 0x0, 0x200, 0x0) fallocate(r0, 0x10, 0x0, 0x8020001) getsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(0xffffffffffffffff, 0x84, 0x76, &(0x7f0000000180), &(0x7f00000002c0)=0x8) r1 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) syz_init_net_socket$nfc_raw(0x27, 0x5, 0x0) r2 = socket(0x200000000000011, 0x3, 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f00000003c0)={'netdevsim0\x00', 0x0}) bind$packet(r2, &(0x7f0000000240)={0x11, 0x0, r4}, 0x14) getsockname$packet(r2, &(0x7f0000000500), &(0x7f0000000040)=0x10eef0f1) sendmsg$IPCTNL_MSG_CT_DELETE(r2, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000400)=ANY=[@ANYBLOB="2c0000000201001700ffffffff000000800001000008000c40003f00001f1a49ba2b1ecb0950856b01734f821b2a0a1756957e85fb7894135fbab0eb20ead3ff941b7b8857b1493b8270be1338abdb2066e89ab05e7bfc59929e4da4769ca4720a4544ab4e3936f3fe9befb2b2a1de742b26db04066e11533eb5d0d5062240418454353553a6ef8e238ba9a2b1e91b7b80ed5f3336bba5dee5573a42786392eec674aadf7b41"], 0x1}, 0x1, 0x0, 0x0, 0x40040c7}, 0x4000041) r5 = creat(&(0x7f0000000300)='./file0\x00', 0x0) write$P9_RREMOVE(r5, &(0x7f0000000280), 0x1033b) fdatasync(r5) ioctl$EXT4_IOC_MOVE_EXT(r1, 0xc028660f, &(0x7f0000000200)={0x0, r5, 0xe}) 18:43:01 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b405000000000000611000c6000300000000889500"/32], &(0x7f0000003ff6)='GPL\x00', 0x4, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x1dd}, 0x48) 18:43:02 executing program 3: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sync() r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snd/seq\x00', 0x0) r1 = dup(0xffffffffffffffff) setsockopt$inet_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000180)='lp\x00', 0x3) r2 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) r3 = socket$inet6(0xa, 0x3, 0x6) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r3, 0x29, 0x20, &(0x7f0000000300)={@mcast2, 0x10000, 0x0, 0x102, 0x8000003}, 0x20) r4 = syz_open_dev$sndctrl(&(0x7f0000000340)='/dev/snd/controlC#\x00', 0x20, 0x0) ioctl$FS_IOC_ENABLE_VERITY(r4, 0x40806685, &(0x7f0000000480)={0x1, 0x3, 0x1000, 0xd7, &(0x7f0000000640)="b1ba807a1a806758ad5999c1406f12d425166038605caae8b695d03f2f4215b3853dc3431d741e26d8e38079065fd430d103133b97ba91d666c322fcb3ed4f5d67cd70e5a899bf12f2f205d49d37f2a04f5fbd9df163698098122d8d71810e68e188c26eafb478fc4142698997090017067bd9ddc79d7e08da1051a22f57f862dbc0199eba8490394971a3485a8485db282ecaa7ceb2bd14369cd3dcd016377cae058e33bd7e357f091425fcc190d832c6c7716208925f08e558a6cc0c68bf58a855d48b1f7ffbf18219f8bd9585a495abca27dce31a1b", 0x4, 0x0, &(0x7f0000000380)="0db9a0e0"}) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, 0x0, 0x0) connect$inet6(r3, &(0x7f0000000500)={0xa, 0x0, 0x40f7, @mcast2, 0x7ff}, 0x9) r5 = syz_open_procfs(0x0, &(0x7f0000000600)='auxv\x00') sendfile(r3, r5, &(0x7f0000000240)=0x202, 0x4000000000dc) r6 = syz_genetlink_get_family_id$nbd(&(0x7f0000000140)='nbd\x00') sendmsg$NBD_CMD_RECONFIGURE(r5, &(0x7f0000000200)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)=ANY=[@ANYBLOB="14000040", @ANYRES16=r6, @ANYBLOB="050c27bd7000ffdbdf2503000000"], 0x14}, 0x1, 0x0, 0x0, 0x4}, 0x8040) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000002c0)={&(0x7f0000000180), 0xc, &(0x7f0000000280)={&(0x7f00000003c0)=ANY=[@ANYBLOB="200000007327342f348e88dd57a3edec97c2682cfee36a2a8cc9468314dafdc3f48431607737ba75d26429ecb13828688ba2cde331893c4c380137bcfb5cd33990f0b1eb2ec5821010d7a6b424af80385738e1a3e0c62d60b580fd3ee974a65051f65283570a27a11a895a051aa8", @ANYRES16=r6, @ANYBLOB="00022abd7000fbdbdf25020000000c0002008b01d44900000000"], 0x20}, 0x1, 0x0, 0x0, 0x4880}, 0x20000000) sendmsg$NBD_CMD_STATUS(r1, &(0x7f0000000240)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x38, r6, 0x100, 0x70bd2c, 0x25dfdbfb, {}, [@NBD_ATTR_DEAD_CONN_TIMEOUT={0xc, 0x8, 0x7fff}, @NBD_ATTR_SIZE_BYTES={0xc, 0x2, 0x8}, @NBD_ATTR_SIZE_BYTES={0xc, 0x2, 0x6}]}, 0x38}, 0x1, 0x0, 0x0, 0x10}, 0x4004080) connect$nfc_raw(r1, &(0x7f00000000c0)={0x27, 0x1}, 0x10) ioctl$SNDRV_SEQ_IOCTL_QUERY_SUBS(r0, 0xc0a85352, &(0x7f0000000040)) 18:43:02 executing program 5: r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ttyS3\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000080)=0x7) 18:43:02 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = syz_open_dev$vbi(&(0x7f0000000040)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_REQBUFS(r1, 0xc0145608, &(0x7f0000000080)={0x81, 0x5, 0x2}) ioctl$VIDIOC_QBUF(r1, 0xc058565d, &(0x7f0000000140)={0x0, 0x5, 0x4, 0x0, 0x0, {}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "bc4c74c7"}, 0x0, 0x2, @planes, 0x10ff00}) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = fcntl$dupfd(0xffffffffffffffff, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) inotify_init1(0x800) dup3(r0, r1, 0x0) 18:43:02 executing program 1: sysinfo(&(0x7f0000000080)=""/92) syz_emit_ethernet(0x2, &(0x7f0000000040)=ANY=[@ANYRES16, @ANYRES32=0x0], 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x101002, 0x8) 18:43:02 executing program 2: ioctl$TIOCSSERIAL(0xffffffffffffffff, 0x541e, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x7f, 0x0, 0x20000e0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r0 = socket$unix(0x1, 0x2, 0x0) r1 = syz_open_dev$usbmon(0x0, 0x45, 0x0) r2 = accept(r1, &(0x7f00000002c0)=@x25, &(0x7f0000000540)=0x80) r3 = geteuid() r4 = memfd_create(&(0x7f0000000000)='dummY0\x00', 0x0) r5 = socket$inet6(0xa, 0x3, 0x6) r6 = dup(r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) ioctl$RTC_PIE_OFF(r6, 0x7006) r7 = geteuid() fsetxattr$system_posix_acl(r4, &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f0000000480)=ANY=[@ANYBLOB="021f00000000002aff010000", @ANYRES32=0x0, @ANYBLOB='\x00\x00\x00\x00', @ANYRES32=r7, @ANYBLOB="040000000700000008000000", @ANYRES32=0x0, @ANYBLOB="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"], 0x7, 0x0) sendmsg$NL80211_CMD_START_SCHED_SCAN(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000240)={&(0x7f0000000e40)=ANY=[@ANYBLOB="555ecb83f2427a6788ba7a5ebea8f0deba2c71a0cd0a82ddcf8ea3b4", @ANYRES32=r2, @ANYBLOB="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", @ANYRES16=r3, @ANYRESOCT=r7, @ANYRESHEX=0x0], 0x6}, 0x1, 0x0, 0x0, 0x40008c1}, 0x24000811) syz_mount_image$hfsplus(&(0x7f0000000080)='hfsplus\x00', &(0x7f0000000180)='./file0\x00', 0x6, 0x7, &(0x7f0000000540)=[{&(0x7f00000001c0)="88ea87c9c1f5b697cdac97c38b27f3a1ccda958936b5c71bfa37", 0x1a, 0x1}, {&(0x7f0000000200)="6963e59ebb27031d19886e92a92f6da5a73cfcc20df92b579d0cdef6541fa08ca5e87db2f3a742b2ec3c706118f761335c79b2381f43ec9274adc5e669fd69ca5bba5dc9a9b2b2905381a7394f6324dd815364d93abc0d2dede3eb1911ec995a2c7523aaec67b6d76b7c8a", 0x6b, 0x7a98bf69}, {&(0x7f00000002c0)="fd2417684e0f127d95907057df234274307cef9f5f6614f8b4c632cbaf527d409a9408c6b4687770a77be8309bdbc6ce03e9f01265ca74d01ccc4cf7d704f0b1ee05a97b9ccb1a68b2a3dc62cdc193e9646dd0945aa229f0dd54602d045891dd658c53c1e5f2dea41a47bcda3b8ee288cdf7db1282d7cdcaa6a498aee98f344176335da06c3e58335b5803fea394f35e3f6a9339571c92bfd74ecb39e2c1d069071839b3567db352d882c2963552737e2b0abc7b17d2ff9d08af750edd02731777ee698de0ba43b01a8e8042b3a93c77175528a2aa31e3e15104b7036db9b996cb0b9f54cf3f55d9b7", 0xe9, 0x9}, {&(0x7f00000003c0)="a67c9774ca0a38ff89c47ec035e9e6375707fe8551e0a2293e2c1824c03148d8a7be380ba79b14683fb3", 0x2a, 0x2}, {&(0x7f0000000400)="1e507d", 0x3, 0x314}, {&(0x7f0000000440), 0x0, 0x4}, {&(0x7f0000000480)="717256b42e3b965c0888092da09e8653f8b15bffb9cd3f58a45fde55715f2e5233222879843d6304fb5724df3647244ad527163618d847070ff47dbcd364c1b8dd3eeb7e29251f6914615d98572a9600e626214de796c07046438fbcb0e93426d79144542c0cd00bded74996474a74e47324345dfdf63b4df4d7ba57e21e70165fd08b91b35954fc8599", 0x8a, 0x7}], 0x810090, &(0x7f0000000600)={[{@umask={'umask', 0x3d, 0x89}}, {@force='force'}], [{@subj_type={'subj_type', 0x3d, 'mime_typeL'}}, {@dont_appraise='dont_appraise'}, {@fscontext={'fscontext', 0x3d, 'root'}}, {@obj_type={'obj_type', 0x3d, '+{\\eth0&.self\xea'}}, {@audit='audit'}, {@fscontext={'fscontext', 0x3d, 'staff_u'}}, {@fowner_lt={'fowner<', r7}}, {@rootcontext={'rootcontext', 0x3d, 'staff_u'}}]}) r8 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000280)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000040000000001000000004000000040010080002e360e59acaa4f37be5a0000ffff53ef", 0x261, 0x400}], 0x1, 0x0) socket$bt_hidp(0x1f, 0x3, 0x6) r9 = syz_genetlink_get_family_id$batadv(&(0x7f00000006c0)='batadv\x00') sendmsg$BATADV_CMD_GET_MESH(0xffffffffffffffff, &(0x7f0000000780)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000740)={&(0x7f0000000700)={0x34, r9, 0x200, 0x70bd2c, 0x25dfdbfe, {}, [@BATADV_ATTR_GW_BANDWIDTH_UP={0x8, 0x32, 0x7}, @BATADV_ATTR_TPMETER_TEST_TIME={0x8, 0xb, 0x87d5896}, @BATADV_ATTR_AGGREGATED_OGMS_ENABLED={0x5, 0x29, 0x1}, @BATADV_ATTR_ISOLATION_MARK={0x8, 0x2b, 0x3}]}, 0x34}, 0x1, 0x0, 0x0, 0x240088c0}, 0x200008c0) [ 247.472812][ T8441] sp0: Synchronizing with TNC 18:43:02 executing program 3: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sync() r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snd/seq\x00', 0x0) r1 = dup(0xffffffffffffffff) setsockopt$inet_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000180)='lp\x00', 0x3) r2 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) r3 = socket$inet6(0xa, 0x3, 0x6) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r3, 0x29, 0x20, &(0x7f0000000300)={@mcast2, 0x10000, 0x0, 0x102, 0x8000003}, 0x20) r4 = syz_open_dev$sndctrl(&(0x7f0000000340)='/dev/snd/controlC#\x00', 0x20, 0x0) ioctl$FS_IOC_ENABLE_VERITY(r4, 0x40806685, &(0x7f0000000480)={0x1, 0x3, 0x1000, 0xd7, &(0x7f0000000640)="b1ba807a1a806758ad5999c1406f12d425166038605caae8b695d03f2f4215b3853dc3431d741e26d8e38079065fd430d103133b97ba91d666c322fcb3ed4f5d67cd70e5a899bf12f2f205d49d37f2a04f5fbd9df163698098122d8d71810e68e188c26eafb478fc4142698997090017067bd9ddc79d7e08da1051a22f57f862dbc0199eba8490394971a3485a8485db282ecaa7ceb2bd14369cd3dcd016377cae058e33bd7e357f091425fcc190d832c6c7716208925f08e558a6cc0c68bf58a855d48b1f7ffbf18219f8bd9585a495abca27dce31a1b", 0x4, 0x0, &(0x7f0000000380)="0db9a0e0"}) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, 0x0, 0x0) connect$inet6(r3, &(0x7f0000000500)={0xa, 0x0, 0x40f7, @mcast2, 0x7ff}, 0x9) r5 = syz_open_procfs(0x0, &(0x7f0000000600)='auxv\x00') sendfile(r3, r5, &(0x7f0000000240)=0x202, 0x4000000000dc) r6 = syz_genetlink_get_family_id$nbd(&(0x7f0000000140)='nbd\x00') sendmsg$NBD_CMD_RECONFIGURE(r5, &(0x7f0000000200)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)=ANY=[@ANYBLOB="14000040", @ANYRES16=r6, @ANYBLOB="050c27bd7000ffdbdf2503000000"], 0x14}, 0x1, 0x0, 0x0, 0x4}, 0x8040) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000002c0)={&(0x7f0000000180), 0xc, &(0x7f0000000280)={&(0x7f00000003c0)=ANY=[@ANYBLOB="200000007327342f348e88dd57a3edec97c2682cfee36a2a8cc9468314dafdc3f48431607737ba75d26429ecb13828688ba2cde331893c4c380137bcfb5cd33990f0b1eb2ec5821010d7a6b424af80385738e1a3e0c62d60b580fd3ee974a65051f65283570a27a11a895a051aa8", @ANYRES16=r6, @ANYBLOB="00022abd7000fbdbdf25020000000c0002008b01d44900000000"], 0x20}, 0x1, 0x0, 0x0, 0x4880}, 0x20000000) sendmsg$NBD_CMD_STATUS(r1, &(0x7f0000000240)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x38, r6, 0x100, 0x70bd2c, 0x25dfdbfb, {}, [@NBD_ATTR_DEAD_CONN_TIMEOUT={0xc, 0x8, 0x7fff}, @NBD_ATTR_SIZE_BYTES={0xc, 0x2, 0x8}, @NBD_ATTR_SIZE_BYTES={0xc, 0x2, 0x6}]}, 0x38}, 0x1, 0x0, 0x0, 0x10}, 0x4004080) connect$nfc_raw(r1, &(0x7f00000000c0)={0x27, 0x1}, 0x10) ioctl$SNDRV_SEQ_IOCTL_QUERY_SUBS(r0, 0xc0a85352, &(0x7f0000000040)) 18:43:02 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)=ANY=[@ANYRES16=r0], 0x1}}, 0x0) [ 247.593014][ T8450] SELinux: duplicate or incompatible mount options 18:43:02 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x20, &(0x7f00000000c0)={@mcast1, 0x800, 0x0, 0x103, 0x1}, 0x20) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x20, &(0x7f00000000c0)={@loopback, 0x800, 0x0, 0x103, 0x2}, 0x20) getsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r1, 0x6, 0x1d, &(0x7f0000000000), &(0x7f0000000080)=0x14) bind$inet(r0, &(0x7f0000000040)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r0, 0x0, 0x10b, 0x200007fe, &(0x7f0000000100)={0x2, 0x10004e23, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) perf_event_open(&(0x7f0000000240)={0x1, 0x70, 0x5, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2b42f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7, 0x5}, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r2, 0x0) r3 = socket(0x200000000000011, 0x3, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) ioctl$ASHMEM_SET_NAME(r5, 0x41007701, &(0x7f0000000180)='eth1.vboxnet1(\x00') ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f00000003c0)={'netdevsim0\x00', 0x0}) bind$packet(r3, &(0x7f0000000240)={0x11, 0x0, r6}, 0x14) getsockname$packet(r3, &(0x7f0000000500), &(0x7f0000000040)=0x10eef0f1) setsockopt$XDP_TX_RING(r3, 0x11b, 0x3, &(0x7f0000000140)=0x4000, 0x4) sendto$inet(r0, &(0x7f0000d7cfcb), 0xffffffffffffffef, 0x60, 0x0, 0x10) [ 247.708132][ T8450] EXT4-fs (loop2): unsupported inode size: 0 [ 247.723849][ T8450] EXT4-fs (loop2): blocksize: 1024 18:43:02 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = syz_open_dev$vbi(&(0x7f0000000040)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_REQBUFS(r1, 0xc0145608, &(0x7f0000000080)={0x81, 0x5, 0x2}) ioctl$VIDIOC_QBUF(r1, 0xc058565d, &(0x7f0000000140)={0x0, 0x5, 0x4, 0x0, 0x0, {}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "bc4c74c7"}, 0x0, 0x2, @planes, 0x10ff00}) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = fcntl$dupfd(0xffffffffffffffff, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) inotify_init1(0x800) dup3(r0, r1, 0x0) 18:43:03 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000100)=0x1) ioctl$TCGETS(r0, 0x8924, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000100)=0x1) ioctl$TCGETS(r1, 0x8924, 0x0) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x400101, 0x0) ioctl$TIOCSETD(r2, 0x5423, &(0x7f0000000100)=0x1) ioctl$TCGETS(r2, 0x8924, 0x0) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r3, 0x5423, &(0x7f0000000100)=0x1) ioctl$TCGETS(r3, 0x8924, 0x0) r4 = socket$inet6(0xa, 0x3, 0x6) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x20008000004001fe) ioctl$NS_GET_PARENT(r5, 0xb702, 0x0) r6 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x0, 0x0) r7 = dup(r6) ioctl$sock_ifreq(r7, 0x8929, &(0x7f00000000c0)={'ip6_vti0\x00', @ifru_flags}) 18:43:03 executing program 3: mknod$loop(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000300)={{{@in6=@rand_addr="a5ca8a45786efee7416a5afc01a81151", @in6=@remote}, {}, {}, 0xffffffff}, {{@in=@broadcast}, 0x0, @in=@empty}}, 0xe8) syz_mount_image$cifs(&(0x7f00000000c0)='cifs\x00', &(0x7f0000000140)='./file0\x00', 0x1, 0x9, &(0x7f0000000940)=[{&(0x7f00000001c0)="b491df62c8fbe30bc3492058d305f44ec87cde234780be8ec8d52949b64722762b710c5aa294f847a1e67ee0fda2c07aefcf0e71ac414288da5a2e048bb6c3ad852f71c82e73669acb12625159b7a46adea9c54f9f63337efcd10613fb526968b8d508c7649d3416df694aca7a4e570a74328ffd3355bbda42d77952e9238f3d47819e75baad5ad52c10dc28acbc11dbac6fb16180126f8002a7ea93f7082bb23510a07455065a73fdfb39ed2846d8f285f2d94b3762f0976728b0ba104f29a35e", 0xc1, 0x7f}, {&(0x7f0000000400)="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", 0xfb, 0x1f}, {&(0x7f0000000500)="5703b3b0397d1e64c5a7fb3899060c12ee57a7c95d02058cdb56039d265eec53a06f0bc8dd886244705b0805ac4b7018f529b047acd3e8ec8e288dd8f1135a2df52d0de648407d498a470a2514db9c3098c383b4611260f4b2be536ebc2cececc987860567d9e746255aa75ab35766ea2b424a36863203a5d64c4c890f23dd02d16493b8986cf85a3a760a6365df0b", 0x8f, 0x2}, {&(0x7f00000005c0)="f6219b0e6175a46081c60ed9cea29bb2867d3f012ebea6c0af931b65920ae3b7cc01c1f1a0d283a909ff1265fffc6658d8a09060e80c5b9ec7d1287f257132abc6c8a3d7d504ee4e3c66d6adad9300e3b2ccf0af90e6d4402e60c94198cd2903af2a7a4fa4458ae437f9abb74cc4ebb0c51012bcce8c94f09be7cc9e845225f32b7939f2b8d86046c21eee9bc7592add15740cdefdee311d671705d57fac3c338fbcb76d5742f2d592490a7a1b8992e335d983f6503e93026284d154c45cacb4a24984a94357ae9690aa66bfd82b3567128fc9853de4a951b8255cbe883f5275cd944a9cd3344c95cd86854df25c8e9a8e65", 0xf2, 0x1}, {&(0x7f00000002c0)="25b711e0c7cc239e970f8bffc7809a85", 0x10}, {&(0x7f00000006c0)="1009abe3edaa4776f01848078707a90eb4d6f5f88abbec9fbf27aa71e80ed439a9c83606b98cc486ad63e33eb293803ab9473807891c93425f2b46c8364f6c713c11e0f8236381c00f4db89a251799bf94ea25850d9a4e44e56981c7caae05327d00e5cff251acc87d", 0x69, 0xdb4f}, {&(0x7f0000000740)="12e29da16b94dccd0802a488fc373bdc8fae5d22b29122bb4c0ba8c350c733ec9e42cb277ef1dbca371ebe3297fff8b32ec22b9476d5643e6998fae71caed0963757b6eb91b9878405fdd9cb1867f07fe2dd5dbba97f010e88362e3af4eee5cd23644396a45894688766c8b4b93df053a17f80bdadc3af35959e2f76861d8df816cd6aac0c0652c5f82807496c29de19b113a21dca1e0facf11d95bb5ec2c8fe52a9d73363ba9fcf0defe19055da319c533d125389eb6af5a76f40d7de8015828fc9afa2897fc776f64bff7894f3be436aeefb9e01e1454d4850426393d820426dc8c403871e26863cc1c91f3dd4ec53", 0xf0, 0x7956}, {&(0x7f0000000840)="d1343ff186a176fbb6c88f132796125032e949ab85fc6d8164739414023e3bae6a51a00e11e17efd9a89883fcf4e4dee5a904077c4d37283fa884732739861216e5d124e9cf8b8a6638d228db1025448c0f82f6b9e22cb4751d25e580cd62af00544525aa9", 0x65, 0x8001}, {&(0x7f00000008c0)="b31443af00cce3bc5481abaeaa2d1414c499587071ab489694551206b73dcbbe2782654f0a13de37a9d0cd30dd5b1621a4dca992f0d3227060aa33c830dde8d82685a84a284805e3fbfb8f59bf78270f5f64ae259f7604d19fd3e0d90f395c513609ce3c49bef1", 0x67, 0xf3}], 0x1150000, &(0x7f0000000a40)='bfs\x00') syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000180)="cefaad1bb83c000040dc", 0xff0f}], 0xc102, 0x0) open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) 18:43:03 executing program 2: pipe2$9p(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) r2 = dup(r1) write$FUSE_BMAP(r2, &(0x7f0000000000)={0x18}, 0x18) write$FUSE_NOTIFY_RETRIEVE(r2, &(0x7f00000000c0)={0x14c}, 0x26f) r3 = syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0xc4, 0x1) r4 = syz_open_dev$usbmon(0x0, 0x45, 0x0) r5 = accept(r4, &(0x7f00000002c0)=@x25, &(0x7f0000000540)=0x80) r6 = geteuid() r7 = memfd_create(&(0x7f0000000000)='dummY0\x00', 0x0) r8 = geteuid() fsetxattr$system_posix_acl(r7, &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f0000001400)=ANY=[@ANYBLOB="021f00000000002aff010000", @ANYRES32=0x0, @ANYRESHEX, @ANYRES32=r8, @ANYBLOB="040000000700000008000000", @ANYRES32=0x0, @ANYBLOB="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"], 0x7, 0x0) sendmsg$NL80211_CMD_START_SCHED_SCAN(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000240)={&(0x7f0000000e40)=ANY=[@ANYBLOB="555ecb83f2427a6788ba7a5ebea8f0deba2c71a0cd0a82ddcf8ea3b4", @ANYRES32=r5, @ANYBLOB="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", @ANYRES16=r6, @ANYRESOCT=r8, @ANYRESHEX=0x0], 0x6}, 0x1, 0x0, 0x0, 0x40008c1}, 0x24000811) mount$9p_fd(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='9p\x00', 0x300000, &(0x7f00000003c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r3}, 0x2c, {[], [{@measure='measure'}, {@smackfstransmute={'smackfstransmute', 0x3d, 'wfdno'}}, {@hash='hash'}, {@obj_role={'obj_role', 0x3d, 'rfdno'}}, {@euid_lt={'euid<', r8}}, {@rootcontext={'rootcontext', 0x3d, 'sysadm_u'}}, {@audit='audit'}, {@hash='hash'}]}}) r9 = syz_open_procfs(0x0, &(0x7f00000001c0)='mounts\x00') sendmsg$NL80211_CMD_START_SCHED_SCAN(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000240)={&(0x7f0000000e40)=ANY=[@ANYBLOB="555ecb83f2427a6788ba7a5ebea8f0deba2c71a0cd0a82ddcf8ea3b4", @ANYRES32, @ANYBLOB="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", @ANYRES16, @ANYRESOCT, @ANYRESHEX=0x0], 0x6}, 0x1, 0x0, 0x0, 0x40008c1}, 0x24000811) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f0000000440)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000400)={&(0x7f0000000800)=ANY=[@ANYBLOB="ac010000162c339e6baccd78e3dbdf25e0000002000007000000000000000000ac1414bb0000000000000000000000004e24fffd4e200a840800a01f01000000", @ANYRES32=0x0, @ANYRES32, @ANYBLOB="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"], 0x4}, 0x1, 0x0, 0x0, 0x40}, 0x44035) syz_mount_image$hfs(&(0x7f0000000280)='hfs\x00', &(0x7f0000000340)='./file0\x00', 0x9, 0x5, &(0x7f0000000a00)=[{&(0x7f0000000380)="ba0bdf0fa091b95d50abf81ff35c9bbc3090daef6444f6d686fac5af78c98d6cd06353fc0395894ef2c43324c661600644df", 0x32, 0x4}, {&(0x7f00000006c0)="6b9e07097ae1195d86b5f04e74b4ec75b6a1616c68ccffe59f106885acfe66dae17079bd8b1a55757d235c0233c0c0550126cdc889f4a82bcf41fbbc0b0d1868fc085e2f5f9013693821fa3ba19d85d284a90750a31061b2d02f7e7ebceadb062b4e3336edc3438cce2bd0f395a6411d65349615874d83d9d7dbfc6c779ad382b55a1394352017f17c49635f462bd32057dcaf68ce1949e95d0cb4b60c324359e010b74fd774bbfb0ddc773ba178de7d198452ca397ee45e3b0b6bdfa4b5f95744b26cde8e4fd3914849f20553b559b3954547c646d49db5868a9f7bc61686", 0xdf, 0x9}, {&(0x7f00000007c0)="e011efd0b5d3b2ee423c7d10ec5668e65725697ac253146950b2adcac7df787c590540deedced9b95e2f756e6f15f988dd9819b6c25caef341ee889c05c98a052b960890aca1a8ee44fe7b71b09fce06877731e97dd20fb3367f00d0fe91c58776164340cc8cbef5e63db58bbf9bf10cbde2fcf040de7aae19d73731c856afa73b68b94693452a2eaa5dfd62b32c29", 0x8f, 0x8}, {&(0x7f0000000880)="294f8af240d1c3f41da017eba28798048cf6ecf595ed447efe434ef402df7d057ebaa0a780f7e18fdb06a963a299749ce2ff100a18720c494633050b3dc5959687ba6bf4f9ec501df49c3aa9044691ab319ad5c8e623633013ad238b331d1f5301791f07097d3ba0d192ff06e47c56e096b91079b3e2bd", 0x77, 0x401}, {&(0x7f0000000900)="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", 0xff, 0x7ff}], 0x804002, &(0x7f0000000bc0)=ANY=[@ANYBLOB="706172743d3078303030303030303030303030303130312c6469725f756d61736b3d30303030303030303030303030303030303133373435372c63726561746f723ded5d4af42c7375626a5f757365723d6f626a5f726f6c652c7569643d", @ANYRESDEC=0x0, @ANYBLOB="2c726f6f74636f78743d73f97361646d5f752c00b28c59c480b6c7842ec5329e65148a27d2551d1989d6819eaebf90ef4e0d0133771d888b32c5cca1d7d0be5acd4efaf14065616f640f88977736ffd7c80ecd2ef285076abf7a02bdf64443c59572c8eac41670256a753b23795c68b45efaae99a8a6c85c529362c0e1bf65fe1a2809517951859c8fb2e2a679c7a2a544a7a67738de6acac06fc778624c9f2f3c31e9e64680bfbd2e602a3548cf5e4a2af435b0325170a0f8fecab8"]) r10 = socket$inet_udp(0x2, 0x2, 0x0) sendfile(r10, r9, 0x0, 0x8d9) 18:43:03 executing program 1: syz_mount_image$gfs2(&(0x7f0000000100)='gfs2\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)={[{@hostdata={'hostdata', 0x3d, 'ppp1GPL'}}]}) 18:43:03 executing program 0: r0 = socket(0x11, 0x0, 0x8) kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGSKNS(r0, 0x894c, &(0x7f0000000140)=0x7fffffff) r1 = syz_genetlink_get_family_id$wireguard(&(0x7f0000000440)='wireguard\x00') sendmsg$WG_CMD_SET_DEVICE(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000000)={0x28, r1, 0x409, 0x0, 0x0, {}, [@WGDEVICE_A_IFNAME={0x14, 0x2, 'wg1\x00'}]}, 0x28}}, 0x0) sendmsg$WG_CMD_SET_DEVICE(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000080)={&(0x7f00000002c0)={0x6dc, r1, 0x900, 0x70bd26, 0x25dfdbfb, {}, [@WGDEVICE_A_PEERS={0x6b4, 0x8, 0x0, 0x1, [{0x388, 0x0, 0x0, 0x1, [@WGPEER_A_PROTOCOL_VERSION={0x8}, @WGPEER_A_PROTOCOL_VERSION={0x8}, @WGPEER_A_PRESHARED_KEY={0x24, 0x2, "a216511c435c211c8b1876295ab283693cc824e9acf6fbf2ac2d91c879d7f623"}, @WGPEER_A_ALLOWEDIPS={0x50, 0x9, 0x0, 0x1, [{0x4c, 0x0, 0x0, 0x1, [@ipv6={{0x6}, {0x14, 0x2, @dev={0xfe, 0x80, [], 0x3d}}, {0x5, 0x3, 0x3}}, @ipv6={{0x6}, {0x14, 0x2, @ipv4={[], [], @local}}, {0x5}}]}]}, @WGPEER_A_ALLOWEDIPS={0x2d4, 0x9, 0x0, 0x1, [{0x28, 0x0, 0x0, 0x1, [@ipv6={{0x6}, {0x14, 0x2, @dev={0xfe, 0x80, [], 0x2c}}, {0x5, 0x3, 0x3}}]}, {0x70, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @broadcast}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @loopback}, {0x5, 0x3, 0x1}}, @ipv6={{0x6}, {0x14, 0x2, @loopback}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @broadcast}, {0x5, 0x3, 0x1}}]}, {0x4c, 0x0, 0x0, 0x1, [@ipv6={{0x6}, {0x14, 0x2, @mcast2}, {0x5, 0x3, 0x1}}, @ipv6={{0x6}, {0x14, 0x2, @remote}, {0x5, 0x3, 0x2}}]}, {0x94, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @broadcast}, {0x5, 0x3, 0x1}}, @ipv6={{0x6}, {0x14, 0x2, @mcast2}, {0x5, 0x3, 0x1}}, @ipv4={{0x6}, {0x8, 0x2, @multicast1}, {0x5, 0x3, 0x1}}, @ipv4={{0x6}, {0x8, 0x2, @remote}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @ipv4={[], [], @loopback}}, {0x5, 0x3, 0x2}}]}, {0xe8, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @local}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @broadcast}, {0x5, 0x3, 0x3}}, @ipv4={{0x6}, {0x8, 0x2, @rand_addr=0x7}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @ipv4={[], [], @multicast2}}, {0x5, 0x3, 0x2}}, @ipv4={{0x6}, {0x8, 0x2, @remote}, {0x5, 0x3, 0x3}}, @ipv6={{0x6}, {0x14, 0x2, @remote}, {0x5, 0x3, 0x2}}, @ipv6={{0x6}, {0x14, 0x2, @mcast1}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @rand_addr=0x7fffffff}, {0x5, 0x3, 0x1}}]}, {0x70, 0x0, 0x0, 0x1, [@ipv6={{0x6}, {0x14, 0x2, @local}, {0x5, 0x3, 0x1}}, @ipv6={{0x6}, {0x14, 0x2, @loopback}, {0x5, 0x3, 0x3}}, @ipv6={{0x6}, {0x14, 0x2, @ipv4={[], [], @initdev={0xac, 0x1e, 0x1, 0x0}}}, {0x5, 0x3, 0x1}}]}]}, @WGPEER_A_PERSISTENT_KEEPALIVE_INTERVAL={0x6, 0x5, 0x4}, @WGPEER_A_PUBLIC_KEY={0x24, 0x1, @c_g='\xf4M\xa3g\xa8\x8e\xe6VO\x02\x02\x11Eg\'\b/\\\xeb\xee\x8b\x1b\xf5\xebs74\x1bE\x9b9\"'}]}, {0x4}, {0x64, 0x0, 0x0, 0x1, [@WGPEER_A_PROTOCOL_VERSION={0x8}, @WGPEER_A_PERSISTENT_KEEPALIVE_INTERVAL={0x6, 0x5, 0x8000}, @WGPEER_A_PROTOCOL_VERSION={0x8}, @WGPEER_A_ENDPOINT4={0x14, 0x4, {0x2, 0x4e21, @rand_addr=0x502}}, @WGPEER_A_PROTOCOL_VERSION={0x8}, @WGPEER_A_PROTOCOL_VERSION={0x8}, @WGPEER_A_PRESHARED_KEY={0x24, 0x2, "932078af3650be84f513b55ff5237b46c175e92d1c5d7b461e9681a6e1b50522"}]}, {0x30, 0x0, 0x0, 0x1, [@WGPEER_A_PROTOCOL_VERSION={0x8}, @WGPEER_A_PRESHARED_KEY={0x24, 0x2, "618c0616825931b756dc0d812f8bc20d7bb12265482dd8183e6f1568fa435f6e"}]}, {0x28, 0x0, 0x0, 0x1, [@WGPEER_A_PRESHARED_KEY={0x24, 0x2, "d60fddadf6d783c6af83466858f2d14d1dd17860467523689d0682bd5f83f970"}]}, {0x1f0, 0x0, 0x0, 0x1, [@WGPEER_A_ENDPOINT6={0x20, 0x4, {0xa, 0x4e24, 0x8, @remote, 0x2}}, @WGPEER_A_PROTOCOL_VERSION={0x8}, @WGPEER_A_PRESHARED_KEY={0x24, 0x2, "5a94b23bd25539daaf722f5d65c0188285365b23efe5f133490dc559ed288d99"}, @WGPEER_A_FLAGS={0x8, 0x3, 0x7}, @WGPEER_A_PERSISTENT_KEEPALIVE_INTERVAL={0x6, 0x5, 0x73}, @WGPEER_A_ENDPOINT4={0x14, 0x4, {0x2, 0x4e23, @multicast2}}, @WGPEER_A_ALLOWEDIPS={0x174, 0x9, 0x0, 0x1, [{0x70, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @loopback}, {0x5, 0x3, 0x2}}, @ipv6={{0x6}, {0x14, 0x2, @local}, {0x5, 0x3, 0x3}}, @ipv4={{0x6}, {0x8, 0x2, @rand_addr=0x9}, {0x5, 0x3, 0x3}}, @ipv4={{0x6}, {0x8, 0x2, @dev={0xac, 0x14, 0x14, 0x18}}, {0x5, 0x3, 0x2}}]}, {0x100, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @local}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @initdev={0xac, 0x1e, 0x1, 0x0}}, {0x5, 0x3, 0x3}}, @ipv4={{0x6}, {0x8, 0x2, @remote}, {0x5, 0x3, 0x3}}, @ipv6={{0x6}, {0x14, 0x2, @local}, {0x5, 0x3, 0x3}}, @ipv6={{0x6}, {0x14, 0x2, @mcast1}, {0x5, 0x3, 0x2}}, @ipv6={{0x6}, {0x14, 0x2, @initdev={0xfe, 0x88, [], 0x1, 0x0}}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @dev={0xfe, 0x80, [], 0x30}}, {0x5, 0x3, 0x3}}, @ipv6={{0x6}, {0x14, 0x2, @remote}, {0x5, 0x3, 0x3}}]}]}, @WGPEER_A_PROTOCOL_VERSION={0x8}]}, {0x3c, 0x0, 0x0, 0x1, [@WGPEER_A_PERSISTENT_KEEPALIVE_INTERVAL={0x6, 0x5, 0x1}, @WGPEER_A_ENDPOINT6={0x20, 0x4, {0xa, 0x4e24, 0x1ff, @ipv4={[], [], @remote}, 0x7409}}, @WGPEER_A_PERSISTENT_KEEPALIVE_INTERVAL={0x6, 0x5, 0x200}, @WGPEER_A_PERSISTENT_KEEPALIVE_INTERVAL={0x6, 0x5, 0xc0d7}]}, {0x3c, 0x0, 0x0, 0x1, [@WGPEER_A_ENDPOINT4={0x14, 0x4, {0x2, 0x4e22, @multicast2}}, @WGPEER_A_PRESHARED_KEY={0x24, 0x2, "06b3d136a753da193283955fb31f5d09bea80602d82560bbf05b34efacd3096a"}]}]}, @WGDEVICE_A_IFNAME={0x14, 0x2, 'wg0\x00'}]}, 0x6dc}, 0x1, 0x0, 0x0, 0x4090}, 0x0) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x80000000000002, &(0x7f0000000040)=0x76, 0x4) bind$inet(r2, &(0x7f0000000280)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r2, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0xa5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet(r2, &(0x7f00000012c0)="0c268a927f116588b967481241ba7860ac5cf65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95425a3a07e758044ab4ea6f7ae55d88fecf90b1c7511bf746bec66ba", 0xfe6a, 0x20c49a, 0x0, 0x27) 18:43:03 executing program 5: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x9, 0x0, 0x0, 0x0, 0x0, 0x2, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x4, @perf_config_ext={0x8000000000000005}}, 0x0, 0x9, 0xffffffffffffffff, 0xe) r0 = openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'\x00', 0x7132}) ioctl$TUNATTACHFILTER(0xffffffffffffffff, 0x400454d1, &(0x7f0000000200)={0x51, 0x0}) ioctl$TUNGETFEATURES(r0, 0x800454cf, &(0x7f0000000040)) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='memory.current\x00', 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000440)={0xffffffffffffffff, 0x0, 0x67, 0x0, &(0x7f0000000240)="058966798c9b6a39c5f1490ff22a3442f91f2d42f1ed19a443f140a2050f22712effbadd556ba2a6d0781fde42f7ef4ed401ade55a6c48928c4713ca8265c8b6f8d66735c7f7aad48abb949b3ececd39003b873a16c301ac636f4c28fe7034e2e4c83d4d336d97", 0x0, 0x0, 0x0, 0x1, 0x0, &(0x7f0000000080)="9b", &(0x7f0000000540)}, 0x40) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000140)='threaded\x00', 0x9) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400, 0x4, @perf_bp={0x0, 0xc}, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r1, &(0x7f0000000700)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="1400000024001705d21b80788c63940d0424fc60100011400a2f0000051982c1375b3e37096b088000f01700d1bd", 0x2e}], 0x1}, 0x600) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000180)={0x0, 0xfffffffffffffc9b, &(0x7f00000000c0)={&(0x7f0000000340)=ANY=[@ANYBLOB="3400000010000104539302000000000000000000", @ANYRES32, @ANYBLOB="ddffffffffffffff140012000c0001006272696467650000040002004a8c1b6a238e3c4a2aaaf50c71a903efb4ed6f549d620cab62d981eb6d374923a2b1597449331902ca8bdf6a7b128fe8476d4d6652037756d0ac81399ac0582b151d141fe83ed1d9132ab02d67c1c5acd5789c4893db25c5630cca8a430aeff83d56f554ff14196fa347774c415acdeb046e3cf870dd52c26f6c603b8f3e34d021af63b3cfa8316e16c38ca72e58c356fde87643e8b809318f8d222ce63317ded42fa3aa394ade7dfe439c6479605528726a068cdc76a22067b3534442da88bc90000000000000000000000000f6a0d707"], 0x34}}, 0x0) getpeername$netlink(r2, &(0x7f0000000100), &(0x7f0000000300)=0xc) [ 248.619252][ T8531] gfs2: not a GFS2 filesystem [ 248.696492][ T8527] hfs: unable to parse mount options [ 248.724080][ T8529] BFS-fs: bfs_fill_super(): Inode 0x00000004 corrupted on loop3 [ 248.733137][ T8546] device bridge1 entered promiscuous mode [ 248.766804][ T8531] gfs2: not a GFS2 filesystem 18:43:03 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0xb00000000065808, 0x0) openat(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x14e00, 0x97) r3 = socket$inet6(0xa, 0x3, 0x6) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = socket$inet6(0xa, 0x3, 0x6) r6 = dup(r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) r7 = socket$inet6(0xa, 0x3, 0x6) r8 = dup(r7) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) socket$inet6(0xa, 0x3, 0x6) r9 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='cpuacct.usage_percpu_sys\x00', 0x7a05, 0x1700) r10 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x7a05, 0x1700) pwrite64(r10, &(0x7f0000000200)="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", 0x200, 0x1000) sendfile(r9, r2, 0x0, 0x100000001) 18:43:03 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000940)='tmpfs\x00', 0x0, 0x0) mount$9p_unix(&(0x7f0000000040)='./bus/file1\x00', &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='9p\x00', 0x4000, &(0x7f0000000180)={'trans=unix,', {[{@version_L='version=9p2000.L'}, {@cache_none='cache=none'}, {@noextend='noextend'}], [{@subj_user={'subj_user'}}]}}) chdir(&(0x7f0000000300)='./file0\x00') mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000300)='./bus\x00', 0x0) creat(&(0x7f00000000c0)='./bus/file1\x00', 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./bus\x00', &(0x7f0000000400)='overlay\x00', 0x0, &(0x7f0000000300)=ANY=[@ANYBLOB='lowerdir=./bus,workdir=./file1,upperdir=./file0']) link(&(0x7f0000000200)='./bus/file1\x00', &(0x7f00000002c0)='./bus/file0\x00') [ 248.980526][ T27] audit: type=1804 audit(1585420983.779:9): pid=8578 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=open_writers comm="syz-executor.2" name="/root/syzkaller-testdir081568817/syzkaller.oWt3fS/6/memory.events" dev="sda1" ino=15798 res=1 [ 249.158632][ T27] audit: type=1800 audit(1585420983.779:10): pid=8578 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=collect_data cause=failed(directio) comm="syz-executor.2" name="memory.events" dev="sda1" ino=15798 res=0 [ 249.206686][ T8584] 9pnet: p9_fd_create_unix (8584): problem connecting socket: ./bus/file1: -2 [ 249.343502][ T27] audit: type=1804 audit(1585420983.789:11): pid=8578 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=ToMToU comm="syz-executor.2" name="/root/syzkaller-testdir081568817/syzkaller.oWt3fS/6/memory.events" dev="sda1" ino=15798 res=1 18:43:04 executing program 2: write$cgroup_pid(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000c00)=ANY=[@ANYRES64], 0x8}, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000680)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x222}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0xe80, 0xff000000, &(0x7f00000000c0)="b9ff03c6630d698cb89e0bf088ca1fffffff0e000000631177fbac141440e0", 0x0, 0x9}, 0x28) [ 249.425927][ T8584] 9pnet: p9_fd_create_unix (8584): problem connecting socket: ./bus/file1: -111 18:43:04 executing program 1: syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="ebe7f68fdb66732e666134000204015b66000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x17e, 0x0) write$binfmt_aout(r1, &(0x7f0000000500)=ANY=[@ANYBLOB="b0e91249"], 0x4) ioctl$USBDEVFS_DISCONNECT_CLAIM(r0, 0x8108551b, &(0x7f0000000300)={0x4595, 0x1, "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"}) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000000280)='./bus\x00') sendfile(r1, r1, &(0x7f00000001c0), 0x8080fffffffe) creat(&(0x7f0000000780)='./file0\x00', 0x0) sendmsg$inet6(0xffffffffffffffff, &(0x7f0000001840)={0x0, 0x0, 0x0}, 0x0) [ 249.494232][ T27] audit: type=1800 audit(1585420983.889:12): pid=8581 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=collect_data cause=failed(directio) comm="syz-executor.2" name="memory.events" dev="sda1" ino=15798 res=0 [ 249.563448][ T27] audit: type=1804 audit(1585420983.919:13): pid=8578 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=ToMToU comm="syz-executor.2" name="/root/syzkaller-testdir081568817/syzkaller.oWt3fS/6/memory.events" dev="sda1" ino=15798 res=1 18:43:04 executing program 5: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x9, 0x0, 0x0, 0x0, 0x0, 0x2, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x4, @perf_config_ext={0x8000000000000005}}, 0x0, 0x9, 0xffffffffffffffff, 0xe) r0 = openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'\x00', 0x7132}) ioctl$TUNATTACHFILTER(0xffffffffffffffff, 0x400454d1, &(0x7f0000000200)={0x51, 0x0}) ioctl$TUNGETFEATURES(r0, 0x800454cf, &(0x7f0000000040)) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='memory.current\x00', 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000440)={0xffffffffffffffff, 0x0, 0x67, 0x0, &(0x7f0000000240)="058966798c9b6a39c5f1490ff22a3442f91f2d42f1ed19a443f140a2050f22712effbadd556ba2a6d0781fde42f7ef4ed401ade55a6c48928c4713ca8265c8b6f8d66735c7f7aad48abb949b3ececd39003b873a16c301ac636f4c28fe7034e2e4c83d4d336d97", 0x0, 0x0, 0x0, 0x1, 0x0, &(0x7f0000000080)="9b", &(0x7f0000000540)}, 0x40) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000140)='threaded\x00', 0x9) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400, 0x4, @perf_bp={0x0, 0xc}, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r1, &(0x7f0000000700)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="1400000024001705d21b80788c63940d0424fc60100011400a2f0000051982c1375b3e37096b088000f01700d1bd", 0x2e}], 0x1}, 0x600) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000180)={0x0, 0xfffffffffffffc9b, &(0x7f00000000c0)={&(0x7f0000000340)=ANY=[@ANYBLOB="3400000010000104539302000000000000000000", @ANYRES32, @ANYBLOB="ddffffffffffffff140012000c0001006272696467650000040002004a8c1b6a238e3c4a2aaaf50c71a903efb4ed6f549d620cab62d981eb6d374923a2b1597449331902ca8bdf6a7b128fe8476d4d6652037756d0ac81399ac0582b151d141fe83ed1d9132ab02d67c1c5acd5789c4893db25c5630cca8a430aeff83d56f554ff14196fa347774c415acdeb046e3cf870dd52c26f6c603b8f3e34d021af63b3cfa8316e16c38ca72e58c356fde87643e8b809318f8d222ce63317ded42fa3aa394ade7dfe439c6479605528726a068cdc76a22067b3534442da88bc90000000000000000000000000f6a0d707"], 0x34}}, 0x0) getpeername$netlink(r2, &(0x7f0000000100), &(0x7f0000000300)=0xc) 18:43:04 executing program 1: syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="ebe7f68fdb66732e666134000204015b66000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x17e, 0x0) write$binfmt_aout(r1, &(0x7f0000000500)=ANY=[@ANYBLOB="b0e91249"], 0x4) ioctl$USBDEVFS_DISCONNECT_CLAIM(r0, 0x8108551b, &(0x7f0000000300)={0x4595, 0x1, "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"}) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000000280)='./bus\x00') sendfile(r1, r1, &(0x7f00000001c0), 0x8080fffffffe) creat(&(0x7f0000000780)='./file0\x00', 0x0) sendmsg$inet6(0xffffffffffffffff, &(0x7f0000001840)={0x0, 0x0, 0x0}, 0x0) [ 249.941921][ T27] audit: type=1804 audit(1585420984.739:14): pid=8616 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=ToMToU comm="syz-executor.1" name="/root/syzkaller-testdir382713517/syzkaller.zEAI5K/8/file0/file0" dev="loop1" ino=23 res=1 18:43:05 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000100)=0x1) ioctl$TCGETS(r0, 0x8924, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000100)=0x1) ioctl$TCGETS(r1, 0x8924, 0x0) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x400101, 0x0) ioctl$TIOCSETD(r2, 0x5423, &(0x7f0000000100)=0x1) ioctl$TCGETS(r2, 0x8924, 0x0) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r3, 0x5423, &(0x7f0000000100)=0x1) ioctl$TCGETS(r3, 0x8924, 0x0) r4 = socket$inet6(0xa, 0x3, 0x6) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x20008000004001fe) ioctl$NS_GET_PARENT(r5, 0xb702, 0x0) r6 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x0, 0x0) r7 = dup(r6) ioctl$sock_ifreq(r7, 0x8929, &(0x7f00000000c0)={'ip6_vti0\x00', @ifru_flags}) 18:43:05 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) r5 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f00000003c0)={'netdevsim0\x00'}) r6 = socket$nl_generic(0x10, 0x3, 0x10) r7 = syz_genetlink_get_family_id$smc(&(0x7f0000000280)='SMC_PNETID\x00') sendmsg$SMC_PNETID_ADD(r6, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000000)={0x14, r7, 0x1, 0x70bd2d}, 0x14}}, 0x0) sendmsg$SMC_PNETID_FLUSH(r5, &(0x7f0000000380)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x4d2ca010}, 0xc, &(0x7f0000000340)={&(0x7f00000002c0)={0x60, r7, 0x400, 0x70bd2d, 0x25dfdbfe, {}, [@SMC_PNETID_ETHNAME={0x14, 0x2, 'nr0\x00'}, @SMC_PNETID_IBPORT={0x5, 0x4, 0x1}, @SMC_PNETID_IBNAME={0x9, 0x3, 'syz2\x00'}, @SMC_PNETID_IBNAME={0x9, 0x3, 'syz0\x00'}, @SMC_PNETID_IBNAME={0x9, 0x3, 'syz2\x00'}, @SMC_PNETID_NAME={0x9, 0x1, 'syz2\x00'}]}, 0x60}, 0x1, 0x0, 0x0, 0x4000000}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000400)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r4, @ANYBLOB="0000000000000000280012000c000100766574680000000018000200fd0001000000000023c0306554362dddcb892ef8051404bde5afbe08b8c5236b93b9797b4409f6e370d1515d2e1fa63259e6d4bd05752981", @ANYRES32=0x0, @ANYBLOB="b3ef461584d1f8f0"], 0x48}}, 0x0) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x4000000, &(0x7f0000000280)={&(0x7f00000000c0)=ANY=[@ANYBLOB="280000001000250800"/20, @ANYRES32=r4, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\b\x00\n\x00\r\x00\x00\x00'], 0x28}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000640)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x0, 0x0, 0x3, r4}}, 0x20}}, 0x0) 18:43:05 executing program 2: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x9, 0x0, 0x0, 0x0, 0x0, 0x2, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x4, @perf_config_ext={0x8000000000000005}}, 0x0, 0x9, 0xffffffffffffffff, 0xe) r0 = openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'\x00', 0x7132}) ioctl$TUNATTACHFILTER(0xffffffffffffffff, 0x400454d1, &(0x7f0000000200)={0x51, 0x0}) ioctl$TUNGETFEATURES(r0, 0x800454cf, &(0x7f0000000040)) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='memory.current\x00', 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000440)={0xffffffffffffffff, 0x0, 0x67, 0x0, &(0x7f0000000240)="058966798c9b6a39c5f1490ff22a3442f91f2d42f1ed19a443f140a2050f22712effbadd556ba2a6d0781fde42f7ef4ed401ade55a6c48928c4713ca8265c8b6f8d66735c7f7aad48abb949b3ececd39003b873a16c301ac636f4c28fe7034e2e4c83d4d336d97", 0x0, 0x0, 0x0, 0x1, 0x0, &(0x7f0000000080)="9b", &(0x7f0000000540)}, 0x40) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000140)='threaded\x00', 0x9) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400, 0x4, @perf_bp={0x0, 0xc}, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r1, &(0x7f0000000700)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="1400000024001705d21b80788c63940d0424fc60100011400a2f0000051982c1375b3e37096b088000f01700d1bd", 0x2e}], 0x1}, 0x600) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000180)={0x0, 0xfffffffffffffc9b, &(0x7f00000000c0)={&(0x7f0000000340)=ANY=[@ANYBLOB="3400000010000104539302000000000000000000", @ANYRES32, @ANYBLOB="ddffffffffffffff140012000c0001006272696467650000040002004a8c1b6a238e3c4a2aaaf50c71a903efb4ed6f549d620cab62d981eb6d374923a2b1597449331902ca8bdf6a7b128fe8476d4d6652037756d0ac81399ac0582b151d141fe83ed1d9132ab02d67c1c5acd5789c4893db25c5630cca8a430aeff83d56f554ff14196fa347774c415acdeb046e3cf870dd52c26f6c603b8f3e34d021af63b3cfa8316e16c38ca72e58c356fde87643e8b809318f8d222ce63317ded42fa3aa394ade7dfe439c6479605528726a068cdc76a22067b3534442da88bc90000000000000000000000000f6a0d707"], 0x34}}, 0x0) getpeername$netlink(r2, &(0x7f0000000100), &(0x7f0000000300)=0xc) [ 250.457555][ T8651] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.3'. [ 250.487233][ T8652] device bridge1 entered promiscuous mode 18:43:05 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x11, 0x2, 0x0) bind(r1, &(0x7f0000000080)=@generic={0x11, "000001000000000008fc9d71fc00000000000000f8ffff002e0b3836005404b0d6301a4ce875f2e3ff5f163ee340b76795008000f8000000000104003c5811039e15775027ecce66fd792bbf0e5bf5ff9b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ff42c65400"}, 0x80) getsockname$packet(r1, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) sendmsg$nl_route_sched(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=@newchain={0x24, 0x5e, 0x1, 0x0, 0x0, {0x0, 0x0, 0x0, r2, {0xdaa}, {0x0, 0xfff6}}}, 0x24}}, 0x0) 18:43:05 executing program 1: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0xe, &(0x7f00000001c0)={0x401, 0x400000008d}, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(0xffffffffffffffff, 0x4020ae46, 0x0) syz_extract_tcp_res$synack(&(0x7f0000000040), 0x1, 0x0) ioctl$SNDRV_RAWMIDI_IOCTL_STATUS32(0xffffffffffffffff, 0xc0245720, 0x0) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000240)={[0x400, 0xcf5a, 0x0, 0x100000000, 0x0, 0x7, 0xf, 0x400, 0x9, 0x5, 0x5, 0x10000, 0xffffffff, 0x0, 0x80000001, 0x1], 0x4, 0x10800}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x3, 0x0) r3 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000180)='/dev/hwrng\x00', 0x3c2, 0x0) r4 = geteuid() r5 = memfd_create(&(0x7f0000000000)='dummY0\x00', 0x0) r6 = geteuid() fsetxattr$system_posix_acl(r5, &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f0000000480)=ANY=[@ANYBLOB="021f00000000002aff010000", @ANYRES32=0x0, @ANYBLOB='\x00\x00\x00\x00', @ANYRES32=r6, @ANYBLOB="040000000700000008000000", @ANYRES32=0x0, @ANYBLOB="10000200000000082000000000000000bf6ba308525fb82df4d1ae00a29f40e06b000000000000000000000000000000cb967802a35d8cf51cd8a6b0caae714e399af327eca1a4e4fe36e2648cd3bcc59a1b37cd350944aa459f1d304fa8b17722736a44510363745431f26bc2e31a60a275bc6211731f0361878aa0c2930a0e00920006e9fdb4eae261d4c02c1fe9c5659f5d672bf342eacd48f6806b463b3a94083644525ad3670c2a888ee1a4fa9bd178b4e2f2b734cb2a8c260efb90130bc6afd43aeee4e5410c904bfaeebd4782454044c095cad8923b8682629a5a67f101a1a2fcd828392f1507dfecad1c2530c84da1c9dc457ed82cbc622bbe9273159cef38d5c5c3c72797d7b4f6b463bf6a0eadd053bd82a4cf6c8ba5536c23c99bd67a59f429027cdaaf18a497760080f7241c3040b51458adb47b2c786d3fe8d48315d12079bd4b28d6ecb69b0dfdc3c6c4fe56db1cd32fcdc10aac13394f9e8a71905f5dfb08b69f24225ee86859e1c48fdd8c4439c3f5f6c270d31102feb71a9767c3de68861b96b58a608d21719f1b789f0f1fba2fb4f9240779306ed9310459ffd4c371b7527c0b8b7ed9adaffd1f957a6ed65564e58cc382d03569cfd74881641dfa7d367e3688d020a8b64658a1599d203795be8979ecee265946763d878c2ebcdac5b964b90b9964874c1967537a79ebf30dde0040d0acf11dac"], 0x7, 0x0) sendmsg$NL80211_CMD_START_SCHED_SCAN(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000240)={&(0x7f0000000e40)=ANY=[@ANYBLOB="555ecb83f2427a6788ba7a5ebea8f0deba2c71a0cd0a82ddcf8ea3b4", @ANYRES32, @ANYBLOB="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", @ANYRES16=r4, @ANYRESOCT=r6, @ANYRESHEX=0x0], 0x6}, 0x1, 0x0, 0x0, 0x40008c1}, 0x24000811) sendmsg$nl_xfrm(r3, &(0x7f0000000440)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000400)={&(0x7f0000000800)=ANY=[@ANYBLOB="ac010000162c339e6baccd78e3dbdf25e0000002000007000000000000000000ac1414bb0000000000000000000000004e24fffd4e200a840800a01f01000000", @ANYRES32=0x0, @ANYRES32=r4, @ANYBLOB="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"], 0x4}, 0x1, 0x0, 0x0, 0x40}, 0x44035) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000300)={{{@in6=@remote, @in=@local, 0x4e20, 0x2, 0x4e22, 0x1, 0x2, 0x80, 0x0, 0x2c, 0x0, r4}, {0x5, 0x1, 0x5, 0x1, 0x4, 0xfffffffffffffff9, 0xabd, 0x3f}, {0x190b4bc8, 0xab97, 0xffff, 0x8000}, 0x80000001, 0x6e6bbc, 0x1, 0x0, 0x3, 0x3}, {{@in=@broadcast, 0x4d6, 0xff}, 0xa, @in6=@rand_addr="fcfc054d1c7da7fb3b447c5c07a68191", 0x0, 0x3, 0x1, 0xff, 0x1f, 0x66d, 0x6}}, 0xe8) [ 251.047742][ T8630] FAT-fs (loop1): error, invalid access to FAT (entry 0x00006500) [ 251.056489][ T8630] FAT-fs (loop1): Filesystem has been set read-only [ 251.264739][ T8641] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.3'. 18:43:06 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00', 0x420000015001}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000140)={'syzkaller1\x00', {0x7, 0x0, @empty}}) write$tun(r0, &(0x7f0000000680)=ANY=[@ANYBLOB="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"], 0xfca) 18:43:06 executing program 2: syz_emit_ethernet(0x46, &(0x7f0000000480)=ANY=[@ANYBLOB="ffffffffffffaaaaaaaaaaaa86dd60a4f20800103aeffe8000100000000000000d00000000aaff02000000000000000000000000000186009078000000000000000000000020"], 0x0) socket$nl_audit(0x10, 0x3, 0x9) r0 = openat$ttyprintk(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ttyprintk\x00', 0x101080, 0x0) syz_open_dev$video(&(0x7f0000000140)='/dev/video#\x00', 0x9, 0x480140) ioctl$GIO_SCRNMAP(r0, 0x4b40, &(0x7f0000000040)=""/246) [ 251.424771][ T8697] L1TF CPU bug present and SMT on, data leak possible. See CVE-2018-3646 and https://www.kernel.org/doc/html/latest/admin-guide/hw-vuln/l1tf.html for details. 18:43:06 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000780)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'\x00', 0x1132}) ioctl$TUNATTACHFILTER(r0, 0x401054d5, &(0x7f0000000080)={0x1, &(0x7f0000000000)=[{0x6}]}) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f00000003c0)={'netdevsim0\x00'}) r3 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000240)='nl80211\x00') sendmsg$NL80211_CMD_GET_MPP(r2, &(0x7f0000003380)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000003340)={&(0x7f0000003300)={0x3c, r3, 0x200, 0x70bd25, 0x25dfdbfb, {}, [@NL80211_ATTR_WIPHY={0x8, 0x1, 0x2}, @NL80211_ATTR_WIPHY={0x8, 0x1, 0x3}, @NL80211_ATTR_MAC={0xa}, @NL80211_ATTR_WDEV={0xc, 0x99, {0x2, 0xffffffffffffffff}}]}, 0x3c}, 0x1, 0x0, 0x0, 0x4000000}, 0x4000080) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x20, &(0x7f00000000c0)={@mcast1, 0x800, 0x0, 0x103, 0x1}, 0x20) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x20, &(0x7f00000000c0)={@loopback, 0x800, 0x0, 0x103, 0x2}, 0x20) sendmmsg(r1, &(0x7f0000003280)=[{{&(0x7f00000000c0)=@x25={0x9, @null=' \x00'}, 0x80, &(0x7f00000005c0)=[{&(0x7f00000007c0)="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", 0x1000}, {&(0x7f0000000140)}, {&(0x7f0000000180)="76e8c07f4c291972405329f478c1c5019fbdb5edaca002266a9a964b5f3f8a0505e950c7595771e0cde1a665db18e9ee585dc92ec84b1f2f05e904a10960b63f8ce71ca40c6eea6966f8c4eb9cdc1b0a4532d7d54c0f57128c43f7bc9648301ff66d06d34991c6676c2aad3a2bbf5af0725b1172da746beb924516adc91edf37209713b75bb2a5e7ee540bdd", 0x8c}, {&(0x7f0000000240)}, {&(0x7f0000000280)="2f845bf8cd6a58e3ec7ba12724d59ff99054d3e4883c72e14b2122b2cb8d74e03fe7ac98133ab0428fa0c6ced9e58c399a120cfb519fcb0bfcb85976d77448ce793f68e4fdf26ec7e71e55a76c05be1f4cd6cef2f49b8bc77166f211489af7ce5309965eb50eefde00add660103434d4049fa8c447545bbfd81290167dcc700e71a3b3716ebc018c4ac188071d0765f270cfad557650f011c625f1edd3511b79fce1ff52b20945edf577ba7d0a237fba60293f11c960fa8ee2a78600c7348f77", 0xc0}, {&(0x7f0000000340)="5894b180090cdd0ac6e0302f62d22d837a65cf34d5c050afee7669fa05335feb05b05b665d46476da9e11d1e283571a351f263e1367102daa1aea71d848eb01b192aeb7419016962d8caea6d6c37d36b4445cae966fb3e486a13fd8ec12e025e9012ddb4ab3d05f2a6cc20dac36ee979fa1214672b76ae7c32cdad8ca618f7edbed70e922fd40301f94294465413c0ceba58f63d56a27a5b9c67d6", 0x9b}, {&(0x7f0000000400)="cad679a550842550b9c3239341d12c0e287dbbac04f7d8394e18433a636f04063621541914074f280b06d9a5a67e95d81d0c1c85a8598f688d34b3bea132b95f5aa3e535c0386dce421592e3e5ae96fa40f9cfed6d857b84bb97ff0901d210b3893f1602c212cd787160198c3e1d50f7d7c7b5cbd404aafd849fcfc87fede4507ece86a0d06acb211f9039f37c534acc8c", 0x91}, {&(0x7f00000004c0)="7e3d0cc3215f5698397ae857febcc280f74ce5d87b6390e03b8f3a289a1f068290e439059e467de2101c444183e3c257d10de0229287788a0a6b9595779325f77f0761e568c54c973e7ceb35495de4e5a45a7ed83fcc5b6aed449f5d74aa93a5c5639e0ccc3101d0f15476d86eb99b25b0da29d144a27f7106cfdb5865af5eb51831cf47736b8fb108221113bac191f55c468778001df228c69c0916133173f4e42004088281de4eee75f8d54001090ff37041aebe34a0b87cc17f8f2e4d9781c088a9d4c0545d2ddbb3019f909fafdddc4b85285b1ba7333dd6d7b05b4d876a5d81ebe008", 0xe5}], 0x8, &(0x7f00000017c0)=[{0xa0, 0x117, 0x8241, "bdd72e725eb4fdd445d691e230f1130c638a0ef64f2ccbdf69672a6b32847e9f697a17f4db12960f85237b862f8c5f7b2ac470b21ad8c4f2b3b70399f0160f6526ad1172ef72c5fd48928ca7cd31d181fde1850f9ef4817c44815edc4da95212a669b666b15cd99b5047c7dbcc81b3e07b038772d350798dd47e19df65086ea4fcec3e5e8c4944b3ff650e"}, {0xc8, 0x6, 0xffff, "f5c13c6ac36fd5391937af8bcb90fa8cb5d3a65d87bc35f432eb9fb56db50104d109828614f408097bc372944289b9a3fb59004c4913bb095a9b760480534966a7f3e805e6d86297e4e89fff07c12a1d4c4bb3d5b484d4419e560ba342dc0dd2b0679c72adaaf6e6e22e84649324acffc7cddfcb5ccadca03a4a5f0ae7d2b858e309060efeb17306a5f04938a5f090269bccd7eca5f0ee1c7da86b4c28a76452ac12483549fea0ed780868e1c0a9f1a079be88bcad9775"}, {0x60, 0x113, 0x3, "9e19fc57c9edc20b757a35d0dc2babde62c2be6aa06f09a9aadfe49ebeaf199c1b4894acb348e443c0b692c19b6d6f7f0f646352e4034eec860c0883a00f2d070ad073ef3969ef9239c0e8"}, {0xc0, 0x100, 0x1, "d79a86b1762b7601da58719b7700db60fc02509dd8e455ca29ab9876cee62520c1390b4cb5c70a1bf7723f200ada761b575e89cca246dfd9b8f8c55d0b19d52d4bce2795f0c1101a7cebae42a8fa5d2d85f133c61da8ad59ef3f45a54bbc77b52d78c4301cfa5c6865ad09d6c1500c0b881141f3c62089770006ef64ca8eb8d272c864d3cbfc3a45812fd578a92272ce4b0ac4b0e64124d803b2d91770c920290729cb5e05b570b454"}, {0x70, 0x10c, 0x8001, "19f9abc04286212ffc2d48dcfa2596847084fca70a15458c2ef1ef1e0e7223c2d4bfb154bf9ebf97cec33913c30e083168ad9a5f60233712fe5369f369759a987ef7f5650d7699977841200aeaed74bed0878adff2b55d4b1d9275"}, {0xc8, 0x100, 0x8000, "6253cd5c13dc7d53244bb7a544b6801690ad4b2d8f6535f78a1353545faa72a52e21b1de35061406cc6a43bc90adba02c7cf88aa666505d620bc520ba631bf549f2fb79222b7ddd27c8a5dae5dc048c82b5fb17fbfa93b36c55f83150c600709220a63c814e2acb8f74773d2dda7f9d86ab0661b6a56b003d2d2be6462ce7b894e5da7470fe960cf53281e31abb319758a1d74170fea574fc398da1cb41b07b5b7e7b4e9ba584bd3c043ebb203a34c8c302eada04f82ea6f"}, {0x48, 0x118, 0x5, "1edf0b9cb6de70ea7b240301d1e7f5e1cd64268ccb77eaf2129e3ad81eacf4c096c920d2961c358f416537b0ac8f96ee412e"}], 0x408}}, {{0x0, 0x0, &(0x7f0000002f40)=[{&(0x7f0000000640)="acb236bd54781cb6be017ea59521d4069b8cec7891f04d0e071541579d34e6e6e62515c3c6e47ae3924f7b7bec41000db3638167b542181d5a1acdc73fd4ef62c8b82e6d9afb4694786044ec177b0197be2c6317cc36557b90b3957255b5b7d155875af63716ae518072b8caf6f0fecf7a7b884b8112e49826bb269eae4efed6202ccba30404f13fdeb2e991eba1", 0x8e}, {&(0x7f0000001c00)="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", 0x1000}, {&(0x7f0000002c00)="1fd8a007082dbb74e0df7839cf0d6ace89ce5cb41a72ebbafdffd0a17486d3492e23fe4215d44ffc714e9afc45333c140fb76877f4e0b613975ab82f1696bb646a037a07f61d33c1d161c56f0a85ef28e15bdaceff88d9e1f10623da66674484cc3ef0d2121b0ad63ac14d7d9ab9c5844cef6adc0bb2e9ab8ed1a473b19aae1c78069e05c3ded0cae680100b25e402c3a002528d9a31a427fdb4ebd29176bc819ad96214b8c80bf04f", 0xa9}, {&(0x7f0000002cc0)="daf235dd9a3b6d49f29e98d3c44727e072dc51cea1efcd9ee3f109066df0601758771d1ba69b5e50f1f4f28d6669687df958ad3a79fff0c9b88ca080daabe46c67c36f3fb3c7e000ec531ff3877ac59a39ec73a845948f0a426ed0b44f10b4f887ede88b5ab4ac66781a42808e695a4dec166288e6f1e9a1693d4efee9cf936d3cb292c18c0b5203c354227dc81b7d9e46b86457fbb461a8845afdf1bf06f4975bfaf5b2688469822df7ccb382e0bef4b7a0ebcf09dff8ad4df83470d376b7d06e22b1985be0b2a11e2971b2aaa44dc80a7287bcfb5ec8e73667d2acd47f12bc86e9fc11005ec4736775b7f8542492aedb9100cd647d8c58", 0xf8}, {&(0x7f0000000700)="6c5f586b4ae0c90876bf066f597f47311a1a970d6d2df3db65b22195ed69d6e2a580df2bfc68aebcf89774671a91e18ab615b7f99eda46ed6458d9ee236463c81e364fcf84a2874cef017345cf7999ea10e1af6e201b2199524bb4a64ba413a1c34b", 0x62}, {&(0x7f0000002dc0)="0efcc957652109b667b4e3f71968d6e55d5c49cbc058f2b3ba3aa9d5e2975b933d0c4e30806f4667fd8e7278f026ca226784fa9ae2b0c800b8586e38bbfb0f2272b4662b27aee942049753baaf5524922c9aa4148b098c72b0e96bac92fb198e01226f759d6594131f38b33170a4182b57426cdfbc5923c8766e25e20145a193fc4787977464d6bdc8ed7a69078caf2953424d67157a66ba909b37895a19949c33cbbae1283e4b8ce192b153728332d1b1254ed4b4afd98174891d6bdc6715a827f27828541cfda1a0538170762453dd9616cb34ff36792bf862ab703626c21f82dc098e67aa668954098bc5d3", 0xed}, {&(0x7f0000002ec0)="fa5f09e7c86387fe98858a3a9adaa7491351fe348db8fd99ea3de7660a72b9d7c95fca6b4733bfeca871bb50e879802f5d7b77ef661ea9e4a8acc70f3f4a1454eceb47c8307038fff49e0e4d23d49232e5d6c3ad62c3b0b554d74bf6b2809549", 0x60}], 0x7, &(0x7f0000002fc0)=[{0xe0, 0x110, 0x3, "634dac801425fec93770058df36afa16ed4805a464aa55668707fe506e379d01031255dee904f8eb0f5de61c98ebeefe7ee4e84b609f824bd60d5a17c5de3a70fb240a2448f4b6eb7efd93b15c4eba69190e4c3d1f9ac3c121ec9884150385ca2a53a1f462bea9b56751f7aae53bc7102a301f1aafaf74861d04340872ff56f089e1d9c69327cb93c3a9e1a0b05a0095c8d59eb083aa6d0bf4031f59b676ea1e3f6b022903d5c8ee38bc0645c9a0a5d2a848d53cefb6b05522a6676fcde26745366f2286865862dfaf4d"}, {0x88, 0x10c, 0x5, "4bdfd0c955410e4870cbfe5e0ecfb7dc38da483b7640b199dfaff0fd91f5ae537f290e61090f55c8f59b97cf176da445d83dc2cdca6e1fe194cc650ba149ab08c9dfe557bceb2a3f36c84c9171808511f2942bc4adee058cc3e628c3cb2579d9d883e7a9b40f153e8ad0a6e90da1569cb28cc63035"}, {0xd8, 0x10c, 0x7ff, "5d80bf78f1ad7c1c09e1b582a7106eac94382956340bd13847732ae256aae460417b03d82fc765d0c83c0db2bd2d67a14623d85ddacc2182dc07e3a0b3341b14fa3c46f97d397cd839b5192965096a6b65d3ac5680e4b20b09e96d51101d2778d88a78c7ba318f62357c0de75070c7b4170bcd52c347baf13d598c9913053951bb589859da46b379a45df7cb019a377fd9477b2fdf9617d3369f1f806fca16e520a2abc274d83723194acba4da08ff52b3b6c75fa2fa92b05ca50a89ef37040f4484f68db617919c"}, {0x10, 0x119, 0x80000001}, {0x68, 0x112, 0x1ff, "bbc59bfcace3a39b1009fd55fe0b509d86e6aa5a6964ed8a8083267f56af3cf95e4d7de962c9e73e0e4af1dc410e64cbc726b72f7d7fa0e6161fcefe884c741902fbbf3055857909d548763c383493e9592d8a60be4c6051"}], 0x2b8}}], 0x2, 0x48080) close(r0) r4 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) 18:43:06 executing program 2: sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000004c0)=ANY=[@ANYBLOB="50000000100005070a00000002da6e0600000000", @ANYRES32=0x0, @ANYBLOB="00000000000000001c0012800b00010062726964676500000c00028008001500000000000a0001000080c2000000000008000a00", @ANYRES32, @ANYBLOB="824b135e6addce890bbe69e9f2b8463f4308a6a6074119f6b9d07b9d3c865622c9694740296dd99c86b13af26bf0dfa7"], 0x5}, 0x1, 0x0, 0x0, 0x24000004}, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000001cc0)="080db5055e0bcfe847a071") r1 = socket(0x10, 0x8000000000000003, 0x0) sendmmsg(r1, &(0x7f0000000000), 0x40000000000024a, 0x0) 18:43:06 executing program 1: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0xe, &(0x7f00000001c0)={0x401, 0x400000008d}, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(0xffffffffffffffff, 0x4020ae46, 0x0) syz_extract_tcp_res$synack(&(0x7f0000000040), 0x1, 0x0) ioctl$SNDRV_RAWMIDI_IOCTL_STATUS32(0xffffffffffffffff, 0xc0245720, 0x0) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000240)={[0x400, 0xcf5a, 0x0, 0x100000000, 0x0, 0x7, 0xf, 0x400, 0x9, 0x5, 0x5, 0x10000, 0xffffffff, 0x0, 0x80000001, 0x1], 0x4, 0x10800}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x3, 0x0) r3 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000180)='/dev/hwrng\x00', 0x3c2, 0x0) r4 = geteuid() r5 = memfd_create(&(0x7f0000000000)='dummY0\x00', 0x0) r6 = geteuid() fsetxattr$system_posix_acl(r5, &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f0000000480)=ANY=[@ANYBLOB="021f00000000002aff010000", @ANYRES32=0x0, @ANYBLOB='\x00\x00\x00\x00', @ANYRES32=r6, @ANYBLOB="040000000700000008000000", @ANYRES32=0x0, @ANYBLOB="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"], 0x7, 0x0) sendmsg$NL80211_CMD_START_SCHED_SCAN(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000240)={&(0x7f0000000e40)=ANY=[@ANYBLOB="555ecb83f2427a6788ba7a5ebea8f0deba2c71a0cd0a82ddcf8ea3b4", @ANYRES32, @ANYBLOB="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", @ANYRES16=r4, @ANYRESOCT=r6, @ANYRESHEX=0x0], 0x6}, 0x1, 0x0, 0x0, 0x40008c1}, 0x24000811) sendmsg$nl_xfrm(r3, &(0x7f0000000440)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000400)={&(0x7f0000000800)=ANY=[@ANYBLOB="ac010000162c339e6baccd78e3dbdf25e0000002000007000000000000000000ac1414bb0000000000000000000000004e24fffd4e200a840800a01f01000000", @ANYRES32=0x0, @ANYRES32=r4, @ANYBLOB="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"], 0x4}, 0x1, 0x0, 0x0, 0x40}, 0x44035) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000300)={{{@in6=@remote, @in=@local, 0x4e20, 0x2, 0x4e22, 0x1, 0x2, 0x80, 0x0, 0x2c, 0x0, r4}, {0x5, 0x1, 0x5, 0x1, 0x4, 0xfffffffffffffff9, 0xabd, 0x3f}, {0x190b4bc8, 0xab97, 0xffff, 0x8000}, 0x80000001, 0x6e6bbc, 0x1, 0x0, 0x3, 0x3}, {{@in=@broadcast, 0x4d6, 0xff}, 0xa, @in6=@rand_addr="fcfc054d1c7da7fb3b447c5c07a68191", 0x0, 0x3, 0x1, 0xff, 0x1f, 0x66d, 0x6}}, 0xe8) 18:43:07 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) mount$fuseblk(&(0x7f0000000080)='/dev/loop0\x00', 0x0, 0x0, 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000011000/0x18000)=nil, &(0x7f00000008c0)=[@text32={0x20, &(0x7f00000000c0)="b805000000b9510000000f01c10f46a78900000066ba2100b067ee66ba4100edb9800000c00f3266ba400066ed0f30c4c271de9d0000000066b808008ed0660f38806f000f011c2666b8bf008ee0", 0x4e}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r3 = socket(0x200000000000011, 0x3, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f00000003c0)={'netdevsim0\x00', 0x0}) bind$packet(r3, &(0x7f0000000240)={0x11, 0x0, r5}, 0x14) getsockname$packet(r3, &(0x7f0000000500), &(0x7f0000000040)=0x10eef0f1) bind$ax25(r3, &(0x7f0000000140)={{0x3, @null, 0x1}, [@bcast, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}]}, 0x48) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_CREATE_PIT2(r1, 0x4040ae77, &(0x7f0000000000)) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000380)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4cb], 0x100000}) ioctl$KVM_RUN(r2, 0xae80, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000017000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 18:43:07 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) write$FUSE_LK(0xffffffffffffffff, 0x0, 0x0) write$FUSE_LSEEK(0xffffffffffffffff, &(0x7f0000000040)={0x18, 0x0, 0x6, {0x9}}, 0x18) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(0xffffffffffffff9c, 0x84, 0x6d, &(0x7f00000000c0)=ANY=[@ANYBLOB="3f00fd00e0bbb557f3b0b9374200000000778e8739ad15be3b6c4a12a38fa49a987fbd3c236bfa1c251b4a45bfe30f444dc5e314658f01005fa401002c9249dd44be32dc79a3fe1584a53a"], 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000100), &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) 18:43:07 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000100)=0x1) ioctl$TCGETS(r0, 0x8924, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000100)=0x1) ioctl$TCGETS(r1, 0x8924, 0x0) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x400101, 0x0) ioctl$TIOCSETD(r2, 0x5423, &(0x7f0000000100)=0x1) ioctl$TCGETS(r2, 0x8924, 0x0) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r3, 0x5423, &(0x7f0000000100)=0x1) ioctl$TCGETS(r3, 0x8924, 0x0) r4 = socket$inet6(0xa, 0x3, 0x6) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x20008000004001fe) ioctl$NS_GET_PARENT(r5, 0xb702, 0x0) r6 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x0, 0x0) r7 = dup(r6) ioctl$sock_ifreq(r7, 0x8929, &(0x7f00000000c0)={'ip6_vti0\x00', @ifru_flags}) 18:43:07 executing program 2: socket$inet6(0xa, 0x2, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x3, 0x6) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$PPPIOCGNPMODE(r2, 0xc008744c, &(0x7f00000001c0)={0x8029, 0x2}) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000200)=ANY=[@ANYBLOB="0020d80c6b8f4d0500", @ANYRES32=0x0], &(0x7f000095dffc)=0x2) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000180)='/dev/sequencer\x00', 0x400, 0x0) setsockopt$inet6_MRT6_ADD_MIF(0xffffffffffffffff, 0x29, 0xca, &(0x7f0000000000)={0x7f, 0x1, 0x80, 0x8000, 0x80000001}, 0xc) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x600, 0x3ef, 0xde, 0x3f00000000000000, 0x100000000000000, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) ioctl$sock_inet6_SIOCADDRT(r0, 0x89a0, &(0x7f00000005c0)={@local={0xfe, 0x80, [0x0, 0xfeff0000]}, @ipv4={[], [], @loopback}, @ipv4={[], [], @loopback}, 0x0, 0x0, 0x4}) ioctl$TIOCSSERIAL(0xffffffffffffffff, 0x541e, &(0x7f0000000100)={0x0, 0xca, 0x0, 0x0, 0x3, 0x0, 0xee3160a4, 0x400, 0x0, 0x6, 0x3, 0x1, 0x3, 0x25, 0x0, 0x7, 0x5}) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x8031, 0xffffffffffffffff, 0x0) r3 = gettid() capset(&(0x7f00000000c0)={0x20080522}, &(0x7f0000000100)) ptrace$getsig(0x4202, 0x0, 0x7f, &(0x7f0000000240)) capset(&(0x7f00000000c0)={0x20080522, r3}, &(0x7f0000000100)) r4 = syz_open_procfs(r3, &(0x7f0000000040)='net/udp6\x00') write$P9_RLINK(r4, &(0x7f0000000080)={0x7, 0x47, 0x2}, 0x7) 18:43:07 executing program 5: r0 = gettid() capset(&(0x7f00000000c0)={0x20080522, r0}, &(0x7f0000000100)) perf_event_open(&(0x7f0000000340)={0x5, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x2}, r0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r1) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r2) socket$nl_route(0x10, 0x3, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000280)='/dev/vcs\x00', 0x0, 0x0) socket(0x1, 0x803, 0x0) socket$nl_route(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000100)) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket(0x1, 0x803, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000180)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @vcan={{0x9, 0x1, 'vcan\x00'}, {0x4}}}, @IFLA_MASTER={0x8, 0xa, r5}]}, 0x3c}}, 0x0) r6 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r6, 0x29, 0x20, &(0x7f00000000c0)={@mcast1, 0x800, 0x0, 0x103, 0x1}, 0x20) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r6, 0x29, 0x20, &(0x7f00000000c0)={@loopback, 0x800, 0x0, 0x103, 0x2}, 0x20) recvfrom(r6, &(0x7f00000003c0)=""/215, 0xd7, 0x80000001, 0x0, 0x0) 18:43:07 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0x20000000021) setsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000001000)={0x10000, 0x4, 0x100, 0x400}, 0x6) r1 = socket(0x11, 0x80002, 0x0) setsockopt$packet_int(r1, 0x107, 0x9, &(0x7f0000000280)=0xc, 0x4) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x2, 0x0) bind$packet(r1, &(0x7f0000000480)={0x11, 0x3, 0x0, 0x1, 0x0, 0x6, @local}, 0x14) setsockopt(r1, 0x107, 0x5, &(0x7f0000001000), 0xc5) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @local, 0x9}, 0x1c) r2 = socket$inet6(0xa, 0x3, 0x6) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$SNDRV_TIMER_IOCTL_STATUS64(r3, 0x80605414, &(0x7f0000000080)) sendto$inet6(r0, &(0x7f0000000000), 0xff19, 0x0, 0x0, 0x101aa) 18:43:08 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000100)=0x1) ioctl$TCGETS(r0, 0x8924, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000100)=0x1) ioctl$TCGETS(r1, 0x8924, 0x0) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x400101, 0x0) ioctl$TIOCSETD(r2, 0x5423, &(0x7f0000000100)=0x1) ioctl$TCGETS(r2, 0x8924, 0x0) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r3, 0x5423, &(0x7f0000000100)=0x1) ioctl$TCGETS(r3, 0x8924, 0x0) r4 = socket$inet6(0xa, 0x3, 0x6) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x20008000004001fe) ioctl$NS_GET_PARENT(r5, 0xb702, 0x0) r6 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x0, 0x0) dup(r6) 18:43:08 executing program 3: r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_PCM_IOCTL_HW_PARAMS(0xffffffffffffffff, 0xc2604111, 0x0) ioctl$sock_inet_SIOCSIFBRDADDR(0xffffffffffffffff, 0x891a, &(0x7f0000000140)={'\x00', {0x2, 0x0, @local}}) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x64) epoll_wait(0xffffffffffffffff, 0x0, 0x0, 0x3) fallocate(r1, 0x0, 0x0, 0x7) fallocate(0xffffffffffffffff, 0xc, 0x0, 0x3ff) sched_setattr(0x0, 0x0, 0x0) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r2, 0x5423, &(0x7f00000003c0)=0x15) write(0xffffffffffffffff, &(0x7f0000000040), 0x0) socket$inet6_sctp(0xa, 0x0, 0x84) mmap$perf(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0xb, 0x100010, r1, 0x9) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, 0x0) 18:43:08 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) select(0x40, &(0x7f0000000000)={0x40fa2, 0x0, 0x0, 0x8000, 0x2fe00000004005, 0xffffffff}, 0x0, 0x0, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000400)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) r3 = semget(0x3, 0x0, 0x1) semctl$IPC_RMID(r3, 0x0, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_REGISTER_COALESCED_MMIO(r1, 0x4010ae67, &(0x7f00000001c0)={0x0, 0x113000}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_NMI(r2, 0xae9a) setsockopt$TIPC_DEST_DROPPABLE(r5, 0x10f, 0x81, &(0x7f0000000080)=0x2, 0x4) vmsplice(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000000040)="cbecbd4280786b229bf92fce6f05bb0fb08d027f7f45c3", 0x17}], 0x1, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 18:43:08 executing program 2: mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000300)='/dev/fuse\x00', 0x2, 0x0) r0 = socket$inet6(0xa, 0x3, 0x6) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = syz_open_dev$usbmon(0x0, 0x45, 0x0) r3 = accept(r2, &(0x7f00000002c0)=@x25, &(0x7f0000000540)=0x80) r4 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000180)='/dev/hwrng\x00', 0x3c2, 0x0) r5 = geteuid() r6 = openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000040)='/sys/kernel/debug/binder/transactions\x00', 0x0, 0x0) ioctl$KVM_GET_PIT2(r6, 0x8070ae9f, &(0x7f0000000080)) r7 = memfd_create(&(0x7f0000000000)='dummY0\x00', 0x0) r8 = geteuid() fsetxattr$system_posix_acl(r7, &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f00000009c0)=ANY=[@ANYBLOB="021f00000000002aff010000", @ANYRES32=0x0, @ANYBLOB='\x00\x00\x00\x00', @ANYRES32=r8, @ANYBLOB="040000000000000000", @ANYRES32=0x0, @ANYBLOB="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"/515], 0x7, 0x0) sendmsg$NL80211_CMD_START_SCHED_SCAN(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000240)={&(0x7f0000000e40)=ANY=[@ANYBLOB="555ecb83f2427a6788ba7a5ebea8f0deba2c71a0cd0a82ddcf8ea3b4", @ANYRES32=r3, @ANYBLOB="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", @ANYRES16=r5, @ANYRESOCT=r8, @ANYRESHEX=0x0], 0x6}, 0x1, 0x0, 0x0, 0x40008c1}, 0x24000811) sendmsg$nl_xfrm(r4, &(0x7f0000000440)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000400)={&(0x7f0000000800)=ANY=[@ANYBLOB="ac010000162c339e6baccd78e3dbdf25e0000002000007000000000000000000ac1414bb0000000000000000000000004e24fffd4e200a840800a01f01000000", @ANYRES32=0x0, @ANYRES32=r5, @ANYBLOB="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"], 0x4}, 0x1, 0x0, 0x0, 0x40}, 0x44035) r9 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r9, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) getgroups(0x2, &(0x7f0000000200)=[0x0, r10]) fchownat(r1, &(0x7f0000000000)='./file0\x00', r5, r10, 0x1000) 18:43:08 executing program 2: r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000000)={0x0, 0x0, 0x0}, &(0x7f0000000040)=0xc) syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000017c0)={[{@gid={'gid', 0x3d, r1}}]}) syz_read_part_table(0x7bb7, 0x8, &(0x7f00000005c0)=[{&(0x7f0000000140)="f296d659ca8717535a4fe5bce259941db8293bf5d47dfd927e441917abcb9b34fd2a7e9ef8c3afc63cb690881dda23cfe7f65cbce9bc1038869595d5e0a4ca2f762d5b101f1244e94bf1b776af9164717a0f8a2e32e8eeeca963d80de4e29ae00aa538fe6f75cb517a8c550ab67fcdfe9b1a9f05f02c33dfdbe2b50a7b", 0x7d, 0x7f}, {&(0x7f00000001c0)="602b38edff7af6aa97f52fb703ea94aecb68304b1d1cce4810690b18c02398243238a6afaf3c14be45914ab17fad4fb6a1fac169eb70953da1c39ca68f33487fd7eb46e4c01112c49ee44c62c190aa1ee8f3f26ce9711978e936d3079e5dcf95cf91659a2e4be8c683371b59d16a446847c01e8722e85068d132de8f7e2300586f5a", 0x82, 0x100000001}, {&(0x7f0000000280)="cbcb8f05982f751b302b2a3d8f2efe982d1f467a5b74a28d9e26c678a799d4c32f416efc37f2ee66e37e3276c00c250d35605412d08cb0ce356e3726e91be40fce8ed4228be305808b4c8d77f20a4add70212043a464b31aa52125f6f506260ebc7ca79323d3a2c89d17158cf0f85dc47eef0f540655eea43800c9f19c572907c2d1fe0e9a3995c076df008042fec43374d3184f4adee4703aa3c2ffa8dd5a1daf3a9edf59eabc91d5cb389f6a1bbb6fc6a963db6df7dc7295ec5457f73c753ab75dc3db2d81e1df68", 0xc9}, {&(0x7f0000000380)="09c94e78e805c751f8e9c97f86a8bee56d788385306e4d71ff5431511d9582f74d0df93d52006eda0287c05323e687c210dfadc139b3a76a031183353ca2a9ae4406b9599d1b0ad770a0ac243cc52401fa398b8b18d2ffc2c63e67b724e11c5aaaf65f69e0d83dac229a1fa76bef1e780187b5d9f8dc5e24dca238f441670e7be528585c3ade3d5466482fe70c10c2741865f59d4037e3f733bccdf1912a04508d5b746a43ea0f59582535efafc0e054203ad9cb653edb833a0ee16ebbcbcd5662d3f11153", 0xc5}, {&(0x7f0000000480)="e4b378d3bea306003e368747484787a49989e8ff56ada913abab6449e6df81b86d69b6d60fcb9a8f0f4dd3be27a06712b186b150193e75453b58b9cedfe3cfb1d0ec3944c9f45efd435036136e14b8118ff0b4d7a59011a8b86815fd203c68ef97aee03377fa5db0df4cc1d8c6721dfdf4e6822e5244272c9924fa8b2b142448d321ee0b70d4b1d741910e77c0e2b9250e", 0x91, 0x9}, {&(0x7f00000000c0)="5aaa3799f112272e3a5cfc762c153ac8b1a1f6c4ce0beb87799ecdadf725870e", 0x20, 0x5293}, {&(0x7f0000000540)="da47752df18bb0fa6d7f9185be150aa9f0945fe05112e3c4821efa34748b66ed3392fc57ac5d3250f3d78a9bf5fbd5cd15", 0x31, 0x7e74}, {&(0x7f0000000580)="ca8aa0da9ce536f57cf458040fd30564819c2f90e8f4dee6aa65f1502c686e3e7dabc097a47cfd41cce74d730260fb6b71b0ca2d34", 0x35}]) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) r4 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r5 = ioctl$KVM_CREATE_VM(r4, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r5, 0xae60) dup3(r5, r3, 0x0) ioctl$KVM_CREATE_VCPU(r5, 0xae41, 0x0) [ 253.989616][ T8822] kvm: emulating exchange as write 18:43:08 executing program 5: getsockname$packet(0xffffffffffffffff, 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x35d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x256f9d8f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x0, 0x0) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0xe00001, 0x0) getsockopt$inet_sctp6_SCTP_ADAPTATION_LAYER(r1, 0x84, 0x7, &(0x7f0000000180), &(0x7f00000001c0)=0x4) getsockopt$TIPC_CONN_TIMEOUT(r1, 0x10f, 0x82, &(0x7f0000000040), &(0x7f0000000140)=0x4) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000100)=0x14) 18:43:08 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup2(r2, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r4, 0x5423, &(0x7f0000000100)=0x1) ioctl$TCGETS(r4, 0x8924, 0x0) ioctl$TCSBRKP(r4, 0x5425, 0x8001) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000000)='syz_tun\x00', 0x2df) connect$inet(r0, &(0x7f0000000140)={0x2, 0x0, @initdev}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f0000000080)={0x0, 0x6, 0x43}, 0x14) setsockopt$inet_tcp_int(r0, 0x6, 0x4000000000013, &(0x7f0000000100), 0x4) sendto(r0, &(0x7f0000000180)="d8", 0x1, 0x0, 0x0, 0x0) sendto(r0, &(0x7f00000002c0)='$', 0x1, 0x0, 0x0, 0x0) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, 0x0, 0x0) close(r0) [ 254.128971][ T8843] hfs: gid requires an argument [ 254.147742][ T8843] hfs: unable to parse mount options 18:43:09 executing program 5: getsockname$packet(0xffffffffffffffff, 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x35d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x256f9d8f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x0, 0x0) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0xe00001, 0x0) getsockopt$inet_sctp6_SCTP_ADAPTATION_LAYER(r1, 0x84, 0x7, &(0x7f0000000180), &(0x7f00000001c0)=0x4) getsockopt$TIPC_CONN_TIMEOUT(r1, 0x10f, 0x82, &(0x7f0000000040), &(0x7f0000000140)=0x4) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000100)=0x14) [ 254.426668][ T8851] hfs: gid requires an argument [ 254.468899][ T8851] hfs: unable to parse mount options 18:43:09 executing program 2: r0 = syz_open_dev$swradio(&(0x7f00000000c0)='/dev/swradio#\x00', 0xffffffffffffffff, 0x2) ioctl$VIDIOC_CREATE_BUFS(r0, 0xc100565c, &(0x7f0000000240)={0x0, 0x9, 0x0, {0xb, @pix={0xfffffffd, 0x2, 0x32314d48}}, 0x67d0}) r1 = socket(0x200000000000011, 0x3, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f00000003c0)={'netdevsim0\x00', 0x0}) bind$packet(r1, &(0x7f0000000240)={0x11, 0x0, r3}, 0x14) getsockname$packet(r1, &(0x7f0000000500), &(0x7f0000000040)=0x10eef0f1) setsockopt$pppl2tp_PPPOL2TP_SO_RECVSEQ(r1, 0x111, 0x2, 0x1, 0x4) 18:43:09 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000100)=0x1) ioctl$TCGETS(r0, 0x8924, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000100)=0x1) ioctl$TCGETS(r1, 0x8924, 0x0) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x400101, 0x0) ioctl$TIOCSETD(r2, 0x5423, &(0x7f0000000100)=0x1) ioctl$TCGETS(r2, 0x8924, 0x0) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r3, 0x5423, &(0x7f0000000100)=0x1) ioctl$TCGETS(r3, 0x8924, 0x0) r4 = socket$inet6(0xa, 0x3, 0x6) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x20008000004001fe) ioctl$NS_GET_PARENT(r5, 0xb702, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x0, 0x0) 18:43:09 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x20000000}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = memfd_create(&(0x7f0000000340), 0x0) r1 = getpgid(0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) ptrace$getenv(0x4201, r1, 0xffff, &(0x7f0000000000)) ftruncate(r0, 0x800799c) mmap(&(0x7f0000200000/0x400000)=nil, 0x400000, 0xa601, 0x2012, r0, 0x0) geteuid() mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2) fsync(0xffffffffffffffff) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) 18:43:09 executing program 5: getsockname$packet(0xffffffffffffffff, 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x35d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x256f9d8f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x0, 0x0) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0xe00001, 0x0) getsockopt$inet_sctp6_SCTP_ADAPTATION_LAYER(r1, 0x84, 0x7, &(0x7f0000000180), &(0x7f00000001c0)=0x4) getsockopt$TIPC_CONN_TIMEOUT(r1, 0x10f, 0x82, &(0x7f0000000040), &(0x7f0000000140)=0x4) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000100)=0x14) 18:43:09 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup2(r2, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r4, 0x5423, &(0x7f0000000100)=0x1) ioctl$TCGETS(r4, 0x8924, 0x0) ioctl$TCSBRKP(r4, 0x5425, 0x8001) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000000)='syz_tun\x00', 0x2df) connect$inet(r0, &(0x7f0000000140)={0x2, 0x0, @initdev}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f0000000080)={0x0, 0x6, 0x43}, 0x14) setsockopt$inet_tcp_int(r0, 0x6, 0x4000000000013, &(0x7f0000000100), 0x4) sendto(r0, &(0x7f0000000180)="d8", 0x1, 0x0, 0x0, 0x0) sendto(r0, &(0x7f00000002c0)='$', 0x1, 0x0, 0x0, 0x0) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, 0x0, 0x0) close(r0) 18:43:18 executing program 3: syz_emit_ethernet(0x2e, &(0x7f0000000000)={@local, @remote, @void, {@ipv4={0x800, @generic={{0x8, 0x4, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x2f, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, @initdev={0xac, 0x1e, 0xfc, 0x0}, {[@lsrr={0x83, 0x7, 0x34, [@dev={0xac, 0x14, 0x14, 0xf}]}, @ssrr={0x89, 0x3}]}}}}}}, 0x0) r0 = socket(0x200000000000011, 0x3, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f00000003c0)={'netdevsim0\x00', 0x0}) bind$packet(r0, &(0x7f0000000240)={0x11, 0x0, r2}, 0x14) getsockname$packet(r0, &(0x7f0000000500), &(0x7f0000000040)=0x10eef0f1) r3 = syz_genetlink_get_family_id$tipc(&(0x7f0000000080)='TIPC\x00') sendmsg$TIPC_CMD_DISABLE_BEARER(r0, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x2c, r3, 0x400, 0x70bd26, 0x25dfdbff, {{}, {}, {0x10, 0x13, @l2={'eth', 0x3a, 'vxcan1\x00'}}}, ["", "", "", "", "", "", "", "", ""]}, 0x2c}, 0x1, 0x0, 0x0, 0x2404c800}, 0x400) 18:43:18 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0xd, 0x4, &(0x7f00000000c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x7}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x5, 0x1, 0x1c}]}, &(0x7f0000000140)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) 18:43:18 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup2(r2, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r4, 0x5423, &(0x7f0000000100)=0x1) ioctl$TCGETS(r4, 0x8924, 0x0) ioctl$TCSBRKP(r4, 0x5425, 0x8001) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000000)='syz_tun\x00', 0x2df) connect$inet(r0, &(0x7f0000000140)={0x2, 0x0, @initdev}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f0000000080)={0x0, 0x6, 0x43}, 0x14) setsockopt$inet_tcp_int(r0, 0x6, 0x4000000000013, &(0x7f0000000100), 0x4) sendto(r0, &(0x7f0000000180)="d8", 0x1, 0x0, 0x0, 0x0) sendto(r0, &(0x7f00000002c0)='$', 0x1, 0x0, 0x0, 0x0) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, 0x0, 0x0) close(r0) 18:43:18 executing program 2: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x3, 0x19) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x12) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in=@multicast1}}, {{@in6}, 0x0, @in6=@loopback}}, 0xe8) setsockopt$inet_msfilter(r0, 0x0, 0x29, &(0x7f0000000100)=ANY=[@ANYBLOB="e0000002ac1414aa0000000002000000ac1414aa00000012a199f8a888a92bf46e20a9b78003d91876c932b5895c305382e6bd5ef923a781916392dd240ffb4b0a9d61332a4569740308b3daf955906d6c220f70e197d806a8914ec6756451b74dbca80cdffe2bbd5e435106414f9d0f140a0e15ec35ebf1092b450d49ce2e4190c5cf13096a3c67d74410c2553f14cecbc349043410e50c61d23827b25271251748a1363c2cdf2131074890fb1db349f2c66e22a09ebefefee4a7f810194f21fcaecbb80fe28396ffff000072bcd8"], 0x18) r1 = socket$inet6(0xa, 0x3, 0x6) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$SG_SET_FORCE_PACK_ID(r2, 0x227b, &(0x7f00000002c0)=0x1) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000200)=""/148, 0x94}], 0x1, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000140)='net/mcfilter\x00') preadv(r3, &(0x7f0000000480), 0x10000000000002a1, 0x0) 18:43:18 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000100)=0x1) ioctl$TCGETS(r0, 0x8924, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000100)=0x1) ioctl$TCGETS(r1, 0x8924, 0x0) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x400101, 0x0) ioctl$TIOCSETD(r2, 0x5423, &(0x7f0000000100)=0x1) ioctl$TCGETS(r2, 0x8924, 0x0) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r3, 0x5423, &(0x7f0000000100)=0x1) ioctl$TCGETS(r3, 0x8924, 0x0) r4 = socket$inet6(0xa, 0x3, 0x6) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x20008000004001fe) ioctl$NS_GET_PARENT(r5, 0xb702, 0x0) 18:43:18 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_TIMEOUT_NEW(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000000)={0x34, 0x0, 0x8, 0x101, 0x0, 0x0, {}, [@CTA_TIMEOUT_NAME={0x9, 0x1, 'syz1\x00'}, @CTA_TIMEOUT_L4PROTO={0x5}, @CTA_TIMEOUT_DATA={0x4, 0x4, 0x0, 0x1, @sctp}, @CTA_TIMEOUT_L3PROTO={0x6, 0x2, 0x1, 0x0, 0x2}]}, 0x34}}, 0x0) sendmsg$NLBL_CIPSOV4_C_ADD(r1, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x110}, 0xc, &(0x7f00000000c0)={&(0x7f0000000200)={0x2ec, 0x0, 0x10, 0x70bd2d, 0x25dfdbfe, {}, [@NLBL_CIPSOV4_A_MLSLVLLST={0x5c, 0x8, 0x0, 0x1, [{0x14, 0x7, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0xaf}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x2385d571}]}, {0xc, 0x7, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x5e3a187a}]}, {0x14, 0x7, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x3458139e}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x15173bc3}]}, {0x24, 0x7, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0xf3}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x5e}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x7c234f52}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x6f681df7}]}]}, @NLBL_CIPSOV4_A_MLSLVLLST={0x90, 0x8, 0x0, 0x1, [{0x34, 0x7, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0xa0}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x40e4c855}, @NLBL_CIPSOV4_A_MLSLVLREM={0x0, 0x6, 0x9d}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0xef}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x7ea1a09c}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x748d6116}]}, {0x3c, 0x7, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x4c}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x9d}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x48}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x4c}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x7b178eac}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x87f8171}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0xe3}]}, {0x1c, 0x7, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x120f01c}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x2b}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x62e8b458}]}]}, @NLBL_CIPSOV4_A_TAGLST={0x24, 0x4, 0x0, 0x1, [{0x5}, {0x5, 0x3, 0x1}, {0x5, 0x3, 0x1}, {0x5}]}, @NLBL_CIPSOV4_A_DOI={0x8, 0x1, 0x3}, @NLBL_CIPSOV4_A_MTYPE={0x8}, @NLBL_CIPSOV4_A_MLSLVLLST={0xac, 0x8, 0x0, 0x1, [{0x14, 0x7, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0xb4}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x76ce676e}]}, {0x3c, 0x7, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x5674766d}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x11}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x9395205}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x8d}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0xcf}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x125730d6}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0xbb}]}, {0x14, 0x7, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0xe5}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x645ffa5c}]}, {0x14, 0x7, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0xab}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x6b2fc06f}]}, {0x14, 0x7, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x176ac45d}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x30}]}, {0x1c, 0x7, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0xd6}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0xc3}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x1d}]}]}, @NLBL_CIPSOV4_A_MLSCATLST={0x78, 0xc, 0x0, 0x1, [{0x1c, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x67904094}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x64a721a}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x374}]}, {0x4c, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0xbfb98ab}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x557116ed}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x7975}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x7eea576a}, @NLBL_CIPSOV4_A_MLSCATREM={0x0, 0xa, 0x1583}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x13bf}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x323f}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x1}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x58e10df}]}, {0xc, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xf88d}]}]}, @NLBL_CIPSOV4_A_MLSCATLST={0x34, 0xc, 0x0, 0x1, [{0x14, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x7ba3}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x1b19}]}, {0x1c, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x6f3b}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x59e71a58}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x9fa0}]}]}, @NLBL_CIPSOV4_A_TAGLST={0x34, 0x4, 0x0, 0x1, [{0x1d, 0x3, 0x7}, {0x5, 0x3, 0x2}, {0x5, 0x3, 0x5}, {0x5, 0x3, 0x5}, {0x5, 0x3, 0x7}, {0x5, 0x3, 0x6}]}, @NLBL_CIPSOV4_A_TAGLST={0x2c, 0x4, 0x0, 0x1, [{0x5, 0x3, 0x2}, {0x5, 0x3, 0x2}, {0x5, 0x3, 0x2}, {0x5, 0x3, 0x2}, {0x5, 0x3, 0x7}]}]}, 0x2ec}, 0x1, 0x0, 0x0, 0x40044}, 0x40094) sendfile(r2, r1, 0x0, 0x100000001) 18:43:18 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$ARPT_SO_SET_REPLACE(r0, 0xa02000000000000, 0x60, &(0x7f0000000540)=ANY=[@ANYBLOB="66696c74657200000000000000000000000000000000000000000000000000000400000004000000c0030000d8020000e8000000e8000000d8020000d8020000d8020000040000000000000000000000000000000000000031494ce70000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c000e8000000000000000000000000000000000000000000000000002800434c4153534946590000000000000000000000000000000000000000000000000000007f000001ac1e00010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000006c6f000000000000000000000000fc8b11c5000000000000000000000000000000000000000000000000000000000000000000000000c000e8000000000000000000000000000000000000000000000000002800000000000000000000000000000000000000000000000000000000000000feffffff00000000e00000017f00000100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000007465616d300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c0000801000000000000000000000000000000000000000000000000480049444c4554494d45520000000000000000000000000000000000000000000500000073797a2ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c000e80000000000000006f61a59d2329ba6000000000000000000002800000000000000000000000000000000000000000000000000000000000000feffffff"], 0x1) r1 = socket$inet6(0xa, 0x3, 0x6) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r3, 0x5423, &(0x7f0000000100)=0x1) ioctl$TCGETS(r3, 0x8924, 0x0) ioctl$VIDIOC_DQBUF(r2, 0xc0585611, &(0x7f0000000000)={0x7, 0xc, 0x4, 0x2, 0x451c, {0x0, 0x2710}, {0x4, 0xc, 0x4, 0x7, 0x7, 0x37, "b03fe2d8"}, 0x6, 0x1, @userptr=0x445, 0x5, 0x0, r3}) setsockopt$inet_sctp_SCTP_I_WANT_MAPPED_V4_ADDR(r4, 0x84, 0xc, &(0x7f0000000080)=0x20, 0x4) 18:43:18 executing program 3: r0 = perf_event_open(&(0x7f0000000000)={0x1000000000000001, 0x70, 0x5, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x220b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x5}, 0x40, 0x0, 0x8000, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0xffffffffffffffff, 0x11, r1, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r1) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) r4 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r5 = ioctl$KVM_CREATE_VM(r4, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r5, 0xae60) dup3(r5, r3, 0x0) ioctl$KVM_REINJECT_CONTROL(r5, 0xae71, &(0x7f00000000c0)={0x7}) socket$inet(0x2, 0x4000000000000001, 0x0) getpid() r6 = socket$unix(0x1, 0x1, 0x0) bind$unix(r6, &(0x7f0000003000)=@abs={0x1}, 0x8) listen(r6, 0x0) r7 = socket$unix(0x1, 0x1, 0x0) connect(r7, &(0x7f0000985ff8)=@un=@abs={0x1}, 0x8) r8 = socket$unix(0x1, 0x1, 0x0) connect(r8, &(0x7f0000985ff8)=@un=@abs={0x1}, 0x8) [ 263.986870][ T27] audit: type=1804 audit(1585420998.790:15): pid=9342 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir058269571/syzkaller.JtFICr/12/cgroup.controllers" dev="sda1" ino=15830 res=1 18:43:19 executing program 2: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x3, 0x19) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x12) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in=@multicast1}}, {{@in6}, 0x0, @in6=@loopback}}, 0xe8) setsockopt$inet_msfilter(r0, 0x0, 0x29, &(0x7f0000000100)=ANY=[@ANYBLOB="e0000002ac1414aa0000000002000000ac1414aa00000012a199f8a888a92bf46e20a9b78003d91876c932b5895c305382e6bd5ef923a781916392dd240ffb4b0a9d61332a4569740308b3daf955906d6c220f70e197d806a8914ec6756451b74dbca80cdffe2bbd5e435106414f9d0f140a0e15ec35ebf1092b450d49ce2e4190c5cf13096a3c67d74410c2553f14cecbc349043410e50c61d23827b25271251748a1363c2cdf2131074890fb1db349f2c66e22a09ebefefee4a7f810194f21fcaecbb80fe28396ffff000072bcd8"], 0x18) r1 = socket$inet6(0xa, 0x3, 0x6) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$SG_SET_FORCE_PACK_ID(r2, 0x227b, &(0x7f00000002c0)=0x1) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000200)=""/148, 0x94}], 0x1, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000140)='net/mcfilter\x00') preadv(r3, &(0x7f0000000480), 0x10000000000002a1, 0x0) 18:43:19 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet6(0xa, 0x3, 0x6) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$KVM_GET_DEBUGREGS(r2, 0x8080aea1, &(0x7f0000000440)) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x4e20, @multicast1}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000030000000000000026d0000095002b000000000093adffa82255f674412d020000000000005ab527ee3697f57fe12ea7509e1fcfb0b3f4279e7b3460dd37536bedf6ba6bda6d2afee33025a30b45bdcf1d273683626e00dc254d570dca6b78ad833488cfe4109ed2049edd0d69613d3cd61f00158e6e0e8632151d72ab8abaa965230000000000000000e258f82b6ce72313a075bb49c52fa55342a620c30209377fb22746ecf59f45a2443630fcb5b4f9eb5e84b1af1a8a2b36f8799632b6ca6f6977e334a4eefcd56eb6ee1e3f9b8916446f0a8c2a8a507cab0b04000000d1417bde5c829a765a78ccdc890943ecc2916f1407088b81195bb112a3471cbfe82eb5ca3f9e42049028900fb38ffa35e4712eefd64494210ebd0724bbe33ca3aff5ac814e7ea0fa4ad937d91f1484f0d64eed8f4d661aa8eaa7a384736c8fc4c37b9377557bfa4dd1f7ea38b88686a46f6b93c9cbadb95c9161826942fc0ae0b11ae00a15aed2db19b59f94477d15d4a9c27c6b6d9d6053ef16f9f7d3e972dd8565c735e1fee580c9301fef96be02958a62808b84b79b177627c9d10c5ac3918f25baa0e94af1e167584298f1242e75760e858018194fb268bceefe4e91691740163a8599f1bb238165398e3f670e"], &(0x7f00002bf000)='syzkaller\x00', 0x4, 0x175, &(0x7f0000000040)=""/183}, 0x48) r4 = socket$kcm(0x29, 0x5, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r4, 0x89e0, &(0x7f0000000380)={r0, r3}) r5 = socket$netlink(0x10, 0x3, 0x0) socket$packet(0x11, 0x0, 0x300) ioctl(r5, 0x1000008912, &(0x7f0000000000)="080db5055e0bcfe847a071") socket$key(0xf, 0x3, 0x2) sendmsg$rds(r4, &(0x7f0000002940)={0x0, 0x0, &(0x7f0000002800)=[{&(0x7f0000002980)=""/4112, 0xfffffde7}], 0x1}, 0x0) write(r4, 0x0, 0x0) [ 264.430569][ T9384] nf_conntrack: default automatic helper assignment has been turned off for security reasons and CT-based firewall rule not found. Use the iptables CT target to attach helpers instead. 18:43:19 executing program 0: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f00002cd000/0x3000)=nil, 0x3000, 0x2, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x7a05, 0x1700) sendfile(r2, r1, 0x0, 0x100000001) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0xb00000000065808, 0x0) r4 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) syz_genetlink_get_family_id$SEG6(0x0) sendmsg$SEG6_CMD_DUMPHMAC(0xffffffffffffffff, 0x0, 0x0) preadv(r3, &(0x7f0000001300)=[{&(0x7f0000000200)=""/4096, 0x3ff800}], 0x1, 0x0) pivot_root(0x0, 0x0) r5 = socket$inet6(0xa, 0x3, 0x6) r6 = dup(r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) io_uring_enter(r6, 0x8, 0x1, 0x2, &(0x7f0000000100)={[0x7]}, 0x8) 18:43:19 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet(0x10, 0x1, 0x28e) sendmsg(r3, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)="24000000200007041dfffd946f610500020000e8fe02080100010800080011000400ff7e00ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf540000000000", 0x4c}], 0x1, 0x0, 0xfffffffffffffe13}, 0x0) ioctl$RTC_VL_READ(0xffffffffffffffff, 0x80047013, &(0x7f0000000080)) 18:43:19 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000340)=ANY=[@ANYBLOB="3400000010000104539302000000000000000000", @ANYRES32, @ANYBLOB="ddffffffffffffff140012000c0001006272696467650000040002004a8c1b6a238e3c4a2aaaf50c71a903efb4ed6f549d620cab62d981eb6d374923a2b1597449331902ca8bdf6a7b128fe8476d4d6652037756d0ac81399ac0582b151d141fe83ed1d9132ab02d67c1c5acd5789c4893db25c5630cca8a430aeff83d56f554ff14196fa347774c415acdeb046e3cf870dd52c26f6c603b8f3e34d021af63b3cfa8316e16c38ca72e58c356fde87643e8b809318f8d222ce63317ded42fa3aa394ade7dfe439c6479605528726a068cdc76a22067b3534442da88bc90000000000000000000000000f6a0d707"], 0x34}}, 0x0) getsockopt$netlink(r0, 0x10e, 0x5, &(0x7f0000000000)=""/212, &(0x7f0000000100)=0xd4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x404}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmdt(0x0) socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(0xffffffffffffffff, 0x84, 0x64, 0x0, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) socket$kcm(0x11, 0xa, 0x300) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x4000000000000, 0x40, &(0x7f0000000a00)=ANY=[@ANYBLOB="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"], 0x1) 18:43:19 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000100)=0x1) ioctl$TCGETS(r0, 0x8924, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000100)=0x1) ioctl$TCGETS(r1, 0x8924, 0x0) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x400101, 0x0) ioctl$TIOCSETD(r2, 0x5423, &(0x7f0000000100)=0x1) ioctl$TCGETS(r2, 0x8924, 0x0) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r3, 0x5423, &(0x7f0000000100)=0x1) ioctl$TCGETS(r3, 0x8924, 0x0) r4 = socket$inet6(0xa, 0x3, 0x6) dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x20008000004001fe) [ 264.803269][ T27] audit: type=1804 audit(1585420999.600:16): pid=9408 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir058269571/syzkaller.JtFICr/13/memory.events" dev="sda1" ino=15821 res=1 18:43:19 executing program 2: ioctl$TIOCSPTLCK(0xffffffffffffffff, 0x40045431, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000380)) r2 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$TCSETAW(0xffffffffffffffff, 0x5407, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1000, &(0x7f0000000000/0x1000)=nil}) ioctl$KVM_SET_REGS(r3, 0x4090ae82, &(0x7f00000001c0)={[0x0, 0x0, 0x0, 0x2000020, 0xffffffffffffffff, 0x0, 0x4cb]}) ioctl$KVM_RUN(r3, 0xae80, 0x0) r4 = socket$inet6(0xa, 0x2, 0x0) sendfile(r4, 0xffffffffffffffff, &(0x7f0000000040), 0x0) r5 = add_key$user(&(0x7f0000000040)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)='X', 0x1, 0xfffffffffffffffe) keyctl$update(0x2, r5, &(0x7f00000006c0)="c0ca1cdbaa1aedbbed80dddaa28e15b9449e2e82cca4244c40ffd0fd4e6631c7d3d86e1339de17344340b02dd527f2d8b3ae6c1db3594e657da33c3ec668f143974a65753472df5319a6b83e1e86b8f2666c61a2e700d1c1e0ae1fc52494bd4885a5c64e9007d39fa11313805290dd6342f9775f01a02ec88f6bee22f25a377a9b143abba1264586d2779088006d5f9be82b00f10287031623f73470264cc5897f18f357aad6deb3883da88ae2266664933785a3ce72bb224a441437ea93c217", 0xc0) r6 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x9a, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000080)={r6, r5, r6}, &(0x7f00000009c0)=""/240, 0x4a3, 0x0) keyctl$dh_compute(0x17, &(0x7f0000000180)={0x0, r5}, &(0x7f0000000280)=""/145, 0x91, 0x0) openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000000)='/proc/capi/capi20\x00', 0x0, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) [ 264.903221][ T27] audit: type=1800 audit(1585420999.600:17): pid=9408 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=collect_data cause=failed(directio) comm="syz-executor.0" name="memory.events" dev="sda1" ino=15821 res=0 18:43:19 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x13, 0x4, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], &(0x7f00000000c0)='GPL\x00', 0x4, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000100)=0x1) ioctl$TCGETS(r1, 0x8924, 0x0) ioctl$KDDELIO(r1, 0x4b35, 0x9) [ 264.968676][ T9415] device bridge1 entered promiscuous mode 18:43:19 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$ARPT_SO_SET_REPLACE(r0, 0xa02000000000000, 0x60, &(0x7f0000000540)=ANY=[@ANYBLOB="66696c74657200000000000000000000000000000000000000000000000000000400000004000000c0030000d8020000e8000000e8000000d8020000d8020000d8020000040000000000000000000000000000000000000031494ce70000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c000e8000000000000000000000000000000000000000000000000002800434c4153534946590000000000000000000000000000000000000000000000000000007f000001ac1e00010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000006c6f000000000000000000000000fc8b11c5000000000000000000000000000000000000000000000000000000000000000000000000c000e8000000000000000000000000000000000000000000000000002800000000000000000000000000000000000000000000000000000000000000feffffff00000000e00000017f00000100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000007465616d300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c0000801000000000000000000000000000000000000000000000000480049444c4554494d45520000000000000000000000000000000000000000000500000073797a2ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c000e80000000000000006f61a59d2329ba6000000000000000000002800000000000000000000000000000000000000000000000000000000000000feffffff"], 0x1) r1 = socket$inet6(0xa, 0x3, 0x6) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r3, 0x5423, &(0x7f0000000100)=0x1) ioctl$TCGETS(r3, 0x8924, 0x0) ioctl$VIDIOC_DQBUF(r2, 0xc0585611, &(0x7f0000000000)={0x7, 0xc, 0x4, 0x2, 0x451c, {0x0, 0x2710}, {0x4, 0xc, 0x4, 0x7, 0x7, 0x37, "b03fe2d8"}, 0x6, 0x1, @userptr=0x445, 0x5, 0x0, r3}) setsockopt$inet_sctp_SCTP_I_WANT_MAPPED_V4_ADDR(r4, 0x84, 0xc, &(0x7f0000000080)=0x20, 0x4) 18:43:20 executing program 3: r0 = perf_event_open(&(0x7f0000000000)={0x1000000000000001, 0x70, 0x5, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x220b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x5}, 0x40, 0x0, 0x8000, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0xffffffffffffffff, 0x11, r1, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r1) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) r4 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r5 = ioctl$KVM_CREATE_VM(r4, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r5, 0xae60) dup3(r5, r3, 0x0) ioctl$KVM_REINJECT_CONTROL(r5, 0xae71, &(0x7f00000000c0)={0x7}) socket$inet(0x2, 0x4000000000000001, 0x0) getpid() r6 = socket$unix(0x1, 0x1, 0x0) bind$unix(r6, &(0x7f0000003000)=@abs={0x1}, 0x8) listen(r6, 0x0) r7 = socket$unix(0x1, 0x1, 0x0) connect(r7, &(0x7f0000985ff8)=@un=@abs={0x1}, 0x8) r8 = socket$unix(0x1, 0x1, 0x0) connect(r8, &(0x7f0000985ff8)=@un=@abs={0x1}, 0x8) 18:43:20 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) getpid() perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffff7fffffffff, 0xffffffffffffffff, 0x0) openat$ocfs2_control(0xffffffffffffff9c, 0x0, 0x0, 0x0) pipe(0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="c7da5f1a", 0x4) r1 = accept4(r0, 0x0, 0x0, 0x0) fcntl$setstatus(r1, 0x4, 0x2800) r2 = syz_open_procfs(0x0, &(0x7f0000000080)='pagemap\x00') openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x80000, 0x0) sendfile(r1, r2, 0x0, 0x10000000000443) [ 265.564823][ T27] audit: type=1804 audit(1585421000.360:18): pid=9476 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir058269571/syzkaller.JtFICr/13/memory.events" dev="sda1" ino=15821 res=1 18:43:20 executing program 5: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x2, 0x0) r2 = socket$inet6(0xa, 0x3, 0x6) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r4, 0x5423, &(0x7f0000000100)=0x1) ioctl$TCGETS(r4, 0x8924, 0x0) ioctl$LOOP_SET_FD(r3, 0x4c00, r4) sendmsg$kcm(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000006c0)=[{&(0x7f00000000c0)="2e00000010008188040f80ecdb4cb9cca7480ef436000000e3bd6efb440009000e000a0010000000028000001201", 0x2e}], 0x1}, 0x0) [ 265.723102][ T27] audit: type=1800 audit(1585421000.360:19): pid=9476 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=collect_data cause=failed(directio) comm="syz-executor.0" name="memory.events" dev="sda1" ino=15821 res=0 18:43:20 executing program 1: r0 = open(&(0x7f0000000040)='./file0\x00', 0x200c2, 0x0) r1 = creat(&(0x7f0000000080)='./file0\x00', 0x0) r2 = fanotify_init(0x0, 0x0) fanotify_mark(r2, 0x105, 0x101b, r1, 0x0) write$binfmt_elf64(r0, &(0x7f0000000200)=ANY=[@ANYBLOB="ed8ebdc405544b1de9ff9a510a556023b6d24112ccba9ecbaea5e8dd24f24b3ac273c81c2b7c8c5b06d007e4c0072fab72c7d711beb15f4313966fe3a4fa"], 0x3e) open(&(0x7f0000000000)='./file0\x00', 0x408100, 0x1) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r0, &(0x7f00000001c0), 0xa198) [ 265.810551][ T27] audit: type=1804 audit(1585421000.410:20): pid=9403 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir058269571/syzkaller.JtFICr/13/cgroup.controllers" dev="sda1" ino=15822 res=1 18:43:20 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000100)=0x1) ioctl$TCGETS(r0, 0x8924, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000100)=0x1) ioctl$TCGETS(r1, 0x8924, 0x0) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x400101, 0x0) ioctl$TIOCSETD(r2, 0x5423, &(0x7f0000000100)=0x1) ioctl$TCGETS(r2, 0x8924, 0x0) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r3, 0x5423, &(0x7f0000000100)=0x1) ioctl$TCGETS(r3, 0x8924, 0x0) r4 = socket$inet6(0xa, 0x3, 0x6) dup(r4) 18:43:20 executing program 0: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) openat$audio(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/audio\x00', 0x101800, 0x0) close(r2) socket$nl_netfilter(0x10, 0x3, 0xc) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r3, r3) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) sendmsg$TIPC_NL_MON_PEER_GET(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000180)={0x30, 0x0, 0x0, 0x0, 0x0, {}, [@TIPC_NLA_MON={0x1c, 0x9, 0x0, 0x1, [@TIPC_NLA_MON_ACTIVATION_THRESHOLD={0xfffffffffffffe50}, @TIPC_NLA_MON_REF={0x8}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8}]}]}, 0x30}}, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x4001fd) ioctl$TUNSETLINK(0xffffffffffffffff, 0x400454cd, 0x8) r4 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r4, 0x5423, &(0x7f0000000100)=0x1) ioctl$TCGETS(r4, 0x8924, 0x0) r5 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r5, 0x5423, &(0x7f0000000100)=0x1) ioctl$TCGETS(r5, 0x8924, 0x0) sendmsg$IPCTNL_MSG_CT_NEW(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000140)=ANY=[@ANYPTR64=&(0x7f0000000040)=ANY=[@ANYRESOCT=r4, @ANYPTR64=&(0x7f0000000000)=ANY=[@ANYRESHEX=r1, @ANYRESDEC], @ANYPTR, @ANYRESDEC, @ANYRES16=r5, @ANYRESDEC=r0]], 0x1}}, 0x4020000) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xfd53) splice(r0, 0x0, r2, 0x0, 0x400000, 0x0) [ 265.925818][ T9495] netlink: 'syz-executor.5': attribute type 10 has an invalid length. [ 265.939174][ T27] audit: type=1804 audit(1585421000.410:21): pid=9408 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=ToMToU comm="syz-executor.0" name="/root/syzkaller-testdir058269571/syzkaller.JtFICr/13/cgroup.controllers" dev="sda1" ino=15822 res=1 [ 265.964180][ T9495] team0: Device veth0_vlan is up. Set it down before adding it as a team port [ 266.085509][ T27] audit: type=1804 audit(1585421000.650:22): pid=9480 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir058269571/syzkaller.JtFICr/13/cgroup.controllers" dev="sda1" ino=15822 res=1 [ 266.313776][ T9533] netlink: 'syz-executor.5': attribute type 10 has an invalid length. [ 266.354709][ T9533] team0: Device veth0_vlan is up. Set it down before adding it as a team port 18:43:21 executing program 5: syz_mount_image$hfsplus(&(0x7f0000000000)='hfsplus\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x1c000, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f00000000c0)={@mcast1, 0x800, 0x0, 0x103, 0x1}, 0x20) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f00000000c0)={@loopback, 0x800, 0x0, 0x103, 0x2}, 0x20) r1 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x20, &(0x7f00000000c0)={@mcast1, 0x800, 0x0, 0x103, 0x1}, 0x20) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x20, &(0x7f00000000c0)={@loopback, 0x800, 0x0, 0x103, 0x2}, 0x20) sendmmsg$sock(r0, &(0x7f0000000680)=[{{&(0x7f0000000040)=@pppol2tpv3={0x18, 0x1, {0x0, r1, {0x2, 0x4e22, @multicast2}, 0x1, 0x0, 0x1, 0x4}}, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000180)="ec969e108edc6312e0638c2cfb769c728620a4cae499e43fd9272f3e175bcd1f6b448d19b9546dd9472dc838ee46bb9641caec95ffeb1d9b78d0df7d0a6fdb30395092053f85d1ec503ea1c427cf247c3a6f085adb21503c99e283eb4eccb6a868b4a6f788874a5bb2f33aeb5d713cd30322c21c3a59a59f7b7f154a13203090dc64f3bf0f3993dff322ac7c643385c5eb93011a136ce42606b92d28cab991e8d3cadb46d24a4baec79ef04ba0820edb369b89b41e72537ef7a55193c86ad5efd1ecc892c487699f76bd793657d9ecfbb60bc06cb7c763b96fc264f42da8898f88cd59570967e2a7b116fc8983971ed22c58514fac8b767ff1aa2356", 0xfc}], 0x1, &(0x7f0000000280)=[@timestamping={{0x14, 0x1, 0x25, 0xffff}}, @txtime={{0x18, 0x1, 0x3d, 0x4}}, @timestamping={{0x14, 0x1, 0x25, 0x6}}, @txtime={{0x18, 0x1, 0x3d, 0x5}}], 0x60}}, {{&(0x7f0000000300)=@sco={0x1f, @none}, 0x80, &(0x7f0000000540)=[{&(0x7f0000000100)="184e0c3103637ae1d8657550e669dd55c4e6e8", 0x13}, {&(0x7f0000000380)="1a570bdae2971131c63797d02a937c8867d16a29cf4a8d050a340ca69d73d0551a44212d14df1a0ec9e0ea87ca11541058845bd90a39fc48dc9dedee36c502ef3eb047486131841ac78f6136a207deb25c2adde8852f9cc82c65232abeaf9768afb611590d5bb01fd4385937d8a52e80e25a6ca18fe7842fd6775bee5f4f8baf67e3ede720468e96f8cf6ce49c647b7c09633fde1b0ff80055bc7b2b82b3864cb049c1a0adc50ae585bbe30ca0a82c900ab677", 0xb3}, {&(0x7f0000000440)="bba5fa632a7ae64691ddb14a6b50a8ca04f7ea3cbaca638d4a84ade10a8ee98a049961ad6052b703f078c99517ef7f91ed00ed1b9951d252f2c6f01c8b29afba5b1f99d6c7acc6d795fb6f3d258d2f9b329286e747a140d3ec9ea01d404440a183d106f0aaecf65897a179bf60ae52fe1f365f0721a245ad01acb82d2484ba40da91ab3c670b2c94f6edf5985d820848515816fc09327c507e565d18f875", 0x9e}, {&(0x7f0000000500)="cad65ed02c223807c9d0f7a2aec8033a0ba45d9f73bdc3ef1c399b064ffad282", 0x20}], 0x4, &(0x7f0000000580)=[@mark={{0x14, 0x1, 0x24, 0x3ff}}, @txtime={{0x18, 0x1, 0x3d, 0xff}}, @mark={{0x14, 0x1, 0x24, 0x6a81}}, @mark={{0x14, 0x1, 0x24, 0x81}}, @timestamping={{0x14, 0x1, 0x25, 0x8}}, @timestamping={{0x14, 0x1, 0x25, 0xfffffe00}}, @timestamping={{0x14, 0x1, 0x25, 0xffffffff}}, @txtime={{0x18}}, @mark={{0x14, 0x1, 0x24, 0x6}}, @txtime={{0x18, 0x1, 0x3d, 0x10001}}], 0xf0}}], 0x2, 0x4000000) 18:43:21 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000240)=ANY=[@ANYBLOB="4c00000010003b0e0000000000000000b778000048b5cf9354b236b0c958fc13d616406c0bf2ad646859df2b43789c3ab536a06151ea9bda9f2d6f1cc9ada5258e83e7593047ecee63f805a5473d0574530af661a035dfa2505aa780e190655087a7e8f857c12c06b8e98d598df395f00703717feb0629ce9e35a5b5e22ad901f430b6dd9e39dc6b0c446324f0ecda26e3213fcacd116378115f37836ba11dd66e1c7c0c8d35aae9e46e6a5270ef987ba082d8245cc55678", @ANYRES32=0x0, @ANYBLOB="00000000000000002c0012800a00010063666873690000001c0002800800020000000000080001f4ff0000000800050000000000"], 0x4c}}, 0x0) 18:43:21 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = socket$inet6(0xa, 0x3, 0x6) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) faccessat(r2, &(0x7f0000000040)='./file0\x00', 0x50, 0x200) ioctl$KDSKBENT(r0, 0x4b47, &(0x7f0000000000)={0x81}) [ 267.008860][ T9577] netlink: 44 bytes leftover after parsing attributes in process `syz-executor.3'. 18:43:25 executing program 2: ioctl$TIOCSPTLCK(0xffffffffffffffff, 0x40045431, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000380)) r2 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$TCSETAW(0xffffffffffffffff, 0x5407, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1000, &(0x7f0000000000/0x1000)=nil}) ioctl$KVM_SET_REGS(r3, 0x4090ae82, &(0x7f00000001c0)={[0x0, 0x0, 0x0, 0x2000020, 0xffffffffffffffff, 0x0, 0x4cb]}) ioctl$KVM_RUN(r3, 0xae80, 0x0) r4 = socket$inet6(0xa, 0x2, 0x0) sendfile(r4, 0xffffffffffffffff, &(0x7f0000000040), 0x0) r5 = add_key$user(&(0x7f0000000040)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)='X', 0x1, 0xfffffffffffffffe) keyctl$update(0x2, r5, &(0x7f00000006c0)="c0ca1cdbaa1aedbbed80dddaa28e15b9449e2e82cca4244c40ffd0fd4e6631c7d3d86e1339de17344340b02dd527f2d8b3ae6c1db3594e657da33c3ec668f143974a65753472df5319a6b83e1e86b8f2666c61a2e700d1c1e0ae1fc52494bd4885a5c64e9007d39fa11313805290dd6342f9775f01a02ec88f6bee22f25a377a9b143abba1264586d2779088006d5f9be82b00f10287031623f73470264cc5897f18f357aad6deb3883da88ae2266664933785a3ce72bb224a441437ea93c217", 0xc0) r6 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x9a, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000080)={r6, r5, r6}, &(0x7f00000009c0)=""/240, 0x4a3, 0x0) keyctl$dh_compute(0x17, &(0x7f0000000180)={0x0, r5}, &(0x7f0000000280)=""/145, 0x91, 0x0) openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000000)='/proc/capi/capi20\x00', 0x0, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) 18:43:25 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000100)=0x1) ioctl$TCGETS(r0, 0x8924, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000100)=0x1) ioctl$TCGETS(r1, 0x8924, 0x0) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x400101, 0x0) ioctl$TIOCSETD(r2, 0x5423, &(0x7f0000000100)=0x1) ioctl$TCGETS(r2, 0x8924, 0x0) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r3, 0x5423, &(0x7f0000000100)=0x1) ioctl$TCGETS(r3, 0x8924, 0x0) r4 = socket$inet6(0xa, 0x3, 0x6) dup(r4) 18:43:25 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x8100, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e002e000000e8bd6efb250314000e000100240248ff050005001201", 0x2e}], 0x1, 0x0, 0x0, 0xa}, 0x0) r1 = socket$inet6(0xa, 0x3, 0x6) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$BINDER_SET_CONTEXT_MGR(r2, 0x40046207, 0x0) 18:43:25 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000100)=0x1) ioctl$TCGETS(r0, 0x8924, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000100)=0x1) ioctl$TCGETS(r1, 0x8924, 0x0) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x400101, 0x0) ioctl$TIOCSETD(r2, 0x5423, &(0x7f0000000100)=0x1) ioctl$TCGETS(r2, 0x8924, 0x0) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r3, 0x5423, &(0x7f0000000100)=0x1) ioctl$TCGETS(r3, 0x8924, 0x0) r4 = socket$inet6(0xa, 0x3, 0x6) dup(r4) 18:43:25 executing program 5: perf_event_open(&(0x7f0000000480)={0x1, 0x70, 0x0, 0x0, 0x5, 0x0, 0x0, 0x40007f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x4, 0xf4}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000100)=0x1) ioctl$TCGETS(r0, 0x8924, 0x0) ioctl$TIOCSTI(r0, 0x5412, 0x1) keyctl$join(0x1, &(0x7f0000000040)={'syz', 0x2}) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) ioctl$KVM_SET_PIT2(0xffffffffffffffff, 0x4070aea0, &(0x7f0000000140)={[{0x7f, 0x3, 0x7, 0x6, 0x1, 0x9, 0x8, 0x3, 0x7, 0xd0, 0x3f, 0x5, 0x3}, {0xc40c, 0x20, 0x2, 0x0, 0x86, 0x79, 0x80, 0x5, 0x2, 0x2, 0x3f, 0x7, 0x2}, {0x6, 0x400, 0x7, 0x72, 0x7, 0x5, 0xf, 0x5f, 0x7, 0x0, 0x2, 0x81, 0x7}], 0x94}) r3 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) ioctl$TIOCL_UNBLANKSCREEN(r0, 0x541c, &(0x7f0000000080)) r4 = ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r4, 0xae60) dup3(r4, r2, 0x0) r5 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r5, 0x5423, &(0x7f0000000100)=0x1) ioctl$TCGETS(r5, 0x8924, 0x0) fcntl$dupfd(r5, 0x406, r2) ioctl$KVM_SET_IRQCHIP(r2, 0xc208ae62, &(0x7f0000000240)={0x1, 0x0, @ioapic={0x2, 0x0, 0x0, 0x0, 0x0, [{}, {}, {}, {}, {}, {0x0, 0xff}, {}, {}, {}, {0x0, 0x0, 0x0, [], 0x59}, {}, {}, {}, {}, {}, {0x0, 0x0, 0x0, [], 0x7}, {}, {}, {}, {}, {}, {}, {}, {0xff}]}}) ioctl$KVM_ASSIGN_SET_MSIX_ENTRY(r2, 0x4010ae74, &(0x7f0000000000)={0x209, 0x2, 0xff40}) 18:43:25 executing program 0: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) openat$audio(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/audio\x00', 0x101800, 0x0) close(r2) socket$nl_netfilter(0x10, 0x3, 0xc) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r3, r3) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) sendmsg$TIPC_NL_MON_PEER_GET(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000180)={0x30, 0x0, 0x0, 0x0, 0x0, {}, [@TIPC_NLA_MON={0x1c, 0x9, 0x0, 0x1, [@TIPC_NLA_MON_ACTIVATION_THRESHOLD={0xfffffffffffffe50}, @TIPC_NLA_MON_REF={0x8}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8}]}]}, 0x30}}, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x4001fd) ioctl$TUNSETLINK(0xffffffffffffffff, 0x400454cd, 0x8) r4 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r4, 0x5423, &(0x7f0000000100)=0x1) ioctl$TCGETS(r4, 0x8924, 0x0) r5 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r5, 0x5423, &(0x7f0000000100)=0x1) ioctl$TCGETS(r5, 0x8924, 0x0) sendmsg$IPCTNL_MSG_CT_NEW(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000140)=ANY=[@ANYPTR64=&(0x7f0000000040)=ANY=[@ANYRESOCT=r4, @ANYPTR64=&(0x7f0000000000)=ANY=[@ANYRESHEX=r1, @ANYRESDEC], @ANYPTR, @ANYRESDEC, @ANYRES16=r5, @ANYRESDEC=r0]], 0x1}}, 0x4020000) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xfd53) splice(r0, 0x0, r2, 0x0, 0x400000, 0x0) 18:43:26 executing program 3: ioctl$TIOCSPTLCK(0xffffffffffffffff, 0x40045431, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000380)) r2 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$TCSETAW(0xffffffffffffffff, 0x5407, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1000, &(0x7f0000000000/0x1000)=nil}) ioctl$KVM_SET_REGS(r3, 0x4090ae82, &(0x7f00000001c0)={[0x0, 0x0, 0x0, 0x2000020, 0xffffffffffffffff, 0x0, 0x4cb]}) ioctl$KVM_RUN(r3, 0xae80, 0x0) r4 = socket$inet6(0xa, 0x2, 0x0) sendfile(r4, 0xffffffffffffffff, &(0x7f0000000040), 0x0) r5 = add_key$user(&(0x7f0000000040)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)='X', 0x1, 0xfffffffffffffffe) keyctl$update(0x2, r5, &(0x7f00000006c0)="c0ca1cdbaa1aedbbed80dddaa28e15b9449e2e82cca4244c40ffd0fd4e6631c7d3d86e1339de17344340b02dd527f2d8b3ae6c1db3594e657da33c3ec668f143974a65753472df5319a6b83e1e86b8f2666c61a2e700d1c1e0ae1fc52494bd4885a5c64e9007d39fa11313805290dd6342f9775f01a02ec88f6bee22f25a377a9b143abba1264586d2779088006d5f9be82b00f10287031623f73470264cc5897f18f357aad6deb3883da88ae2266664933785a3ce72bb224a441437ea93c217", 0xc0) r6 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x9a, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000080)={r6, r5, r6}, &(0x7f00000009c0)=""/240, 0x4a3, 0x0) keyctl$dh_compute(0x17, &(0x7f0000000180)={0x0, r5}, &(0x7f0000000280)=""/145, 0x91, 0x0) openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000000)='/proc/capi/capi20\x00', 0x0, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) 18:43:26 executing program 0: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) openat$audio(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/audio\x00', 0x101800, 0x0) close(r2) socket$nl_netfilter(0x10, 0x3, 0xc) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r3, r3) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) sendmsg$TIPC_NL_MON_PEER_GET(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000180)={0x30, 0x0, 0x0, 0x0, 0x0, {}, [@TIPC_NLA_MON={0x1c, 0x9, 0x0, 0x1, [@TIPC_NLA_MON_ACTIVATION_THRESHOLD={0xfffffffffffffe50}, @TIPC_NLA_MON_REF={0x8}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8}]}]}, 0x30}}, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x4001fd) ioctl$TUNSETLINK(0xffffffffffffffff, 0x400454cd, 0x8) r4 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r4, 0x5423, &(0x7f0000000100)=0x1) ioctl$TCGETS(r4, 0x8924, 0x0) r5 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r5, 0x5423, &(0x7f0000000100)=0x1) ioctl$TCGETS(r5, 0x8924, 0x0) sendmsg$IPCTNL_MSG_CT_NEW(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000140)=ANY=[@ANYPTR64=&(0x7f0000000040)=ANY=[@ANYRESOCT=r4, @ANYPTR64=&(0x7f0000000000)=ANY=[@ANYRESHEX=r1, @ANYRESDEC], @ANYPTR, @ANYRESDEC, @ANYRES16=r5, @ANYRESDEC=r0]], 0x1}}, 0x4020000) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xfd53) splice(r0, 0x0, r2, 0x0, 0x400000, 0x0) 18:43:27 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000100)=0x1) ioctl$TCGETS(r0, 0x8924, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000100)=0x1) ioctl$TCGETS(r1, 0x8924, 0x0) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x400101, 0x0) ioctl$TIOCSETD(r2, 0x5423, &(0x7f0000000100)=0x1) ioctl$TCGETS(r2, 0x8924, 0x0) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r3, 0x5423, &(0x7f0000000100)=0x1) ioctl$TCGETS(r3, 0x8924, 0x0) r4 = socket$inet6(0xa, 0x3, 0x6) dup(r4) 18:43:27 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x61c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0x200000000000011, 0x3, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f00000003c0)={'netdevsim0\x00', 0x0}) bind$packet(r0, &(0x7f0000000240)={0x11, 0x0, r2}, 0x14) getsockname$packet(r0, &(0x7f0000000500), &(0x7f0000000040)=0x10eef0f1) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f0000000000)={0x4, 0x9, 0x9, 0x3, 0x1ff}, 0x14) socket$nl_xfrm(0x10, 0x3, 0x6) unshare(0x40000000) 18:43:27 executing program 5: perf_event_open(&(0x7f0000000480)={0x1, 0x70, 0x0, 0x0, 0x5, 0x0, 0x0, 0x40007f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x4, 0xf4}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000100)=0x1) ioctl$TCGETS(r0, 0x8924, 0x0) ioctl$TIOCSTI(r0, 0x5412, 0x1) keyctl$join(0x1, &(0x7f0000000040)={'syz', 0x2}) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) ioctl$KVM_SET_PIT2(0xffffffffffffffff, 0x4070aea0, &(0x7f0000000140)={[{0x7f, 0x3, 0x7, 0x6, 0x1, 0x9, 0x8, 0x3, 0x7, 0xd0, 0x3f, 0x5, 0x3}, {0xc40c, 0x20, 0x2, 0x0, 0x86, 0x79, 0x80, 0x5, 0x2, 0x2, 0x3f, 0x7, 0x2}, {0x6, 0x400, 0x7, 0x72, 0x7, 0x5, 0xf, 0x5f, 0x7, 0x0, 0x2, 0x81, 0x7}], 0x94}) r3 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) ioctl$TIOCL_UNBLANKSCREEN(r0, 0x541c, &(0x7f0000000080)) r4 = ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r4, 0xae60) dup3(r4, r2, 0x0) r5 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r5, 0x5423, &(0x7f0000000100)=0x1) ioctl$TCGETS(r5, 0x8924, 0x0) fcntl$dupfd(r5, 0x406, r2) ioctl$KVM_SET_IRQCHIP(r2, 0xc208ae62, &(0x7f0000000240)={0x1, 0x0, @ioapic={0x2, 0x0, 0x0, 0x0, 0x0, [{}, {}, {}, {}, {}, {0x0, 0xff}, {}, {}, {}, {0x0, 0x0, 0x0, [], 0x59}, {}, {}, {}, {}, {}, {0x0, 0x0, 0x0, [], 0x7}, {}, {}, {}, {}, {}, {}, {}, {0xff}]}}) ioctl$KVM_ASSIGN_SET_MSIX_ENTRY(r2, 0x4010ae74, &(0x7f0000000000)={0x209, 0x2, 0xff40}) [ 272.609628][ T9885] IPVS: ftp: loaded support on port[0] = 21 18:43:27 executing program 0: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) openat$audio(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/audio\x00', 0x101800, 0x0) close(r2) socket$nl_netfilter(0x10, 0x3, 0xc) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r3, r3) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) sendmsg$TIPC_NL_MON_PEER_GET(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000180)={0x30, 0x0, 0x0, 0x0, 0x0, {}, [@TIPC_NLA_MON={0x1c, 0x9, 0x0, 0x1, [@TIPC_NLA_MON_ACTIVATION_THRESHOLD={0xfffffffffffffe50}, @TIPC_NLA_MON_REF={0x8}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8}]}]}, 0x30}}, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x4001fd) ioctl$TUNSETLINK(0xffffffffffffffff, 0x400454cd, 0x8) r4 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r4, 0x5423, &(0x7f0000000100)=0x1) ioctl$TCGETS(r4, 0x8924, 0x0) r5 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r5, 0x5423, &(0x7f0000000100)=0x1) ioctl$TCGETS(r5, 0x8924, 0x0) sendmsg$IPCTNL_MSG_CT_NEW(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000140)=ANY=[@ANYPTR64=&(0x7f0000000040)=ANY=[@ANYRESOCT=r4, @ANYPTR64=&(0x7f0000000000)=ANY=[@ANYRESHEX=r1, @ANYRESDEC], @ANYPTR, @ANYRESDEC, @ANYRES16=r5, @ANYRESDEC=r0]], 0x1}}, 0x4020000) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xfd53) splice(r0, 0x0, r2, 0x0, 0x400000, 0x0) [ 273.301656][ T9956] IPVS: ftp: loaded support on port[0] = 21 [ 273.706531][ T21] tipc: TX() has been purged, node left! 18:43:32 executing program 2: ioctl$TIOCSPTLCK(0xffffffffffffffff, 0x40045431, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000380)) r2 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$TCSETAW(0xffffffffffffffff, 0x5407, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1000, &(0x7f0000000000/0x1000)=nil}) ioctl$KVM_SET_REGS(r3, 0x4090ae82, &(0x7f00000001c0)={[0x0, 0x0, 0x0, 0x2000020, 0xffffffffffffffff, 0x0, 0x4cb]}) ioctl$KVM_RUN(r3, 0xae80, 0x0) r4 = socket$inet6(0xa, 0x2, 0x0) sendfile(r4, 0xffffffffffffffff, &(0x7f0000000040), 0x0) r5 = add_key$user(&(0x7f0000000040)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)='X', 0x1, 0xfffffffffffffffe) keyctl$update(0x2, r5, &(0x7f00000006c0)="c0ca1cdbaa1aedbbed80dddaa28e15b9449e2e82cca4244c40ffd0fd4e6631c7d3d86e1339de17344340b02dd527f2d8b3ae6c1db3594e657da33c3ec668f143974a65753472df5319a6b83e1e86b8f2666c61a2e700d1c1e0ae1fc52494bd4885a5c64e9007d39fa11313805290dd6342f9775f01a02ec88f6bee22f25a377a9b143abba1264586d2779088006d5f9be82b00f10287031623f73470264cc5897f18f357aad6deb3883da88ae2266664933785a3ce72bb224a441437ea93c217", 0xc0) r6 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x9a, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000080)={r6, r5, r6}, &(0x7f00000009c0)=""/240, 0x4a3, 0x0) keyctl$dh_compute(0x17, &(0x7f0000000180)={0x0, r5}, &(0x7f0000000280)=""/145, 0x91, 0x0) openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000000)='/proc/capi/capi20\x00', 0x0, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) 18:43:32 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000100)=0x1) ioctl$TCGETS(r0, 0x8924, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000100)=0x1) ioctl$TCGETS(r1, 0x8924, 0x0) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x400101, 0x0) ioctl$TIOCSETD(r2, 0x5423, &(0x7f0000000100)=0x1) ioctl$TCGETS(r2, 0x8924, 0x0) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r3, 0x5423, &(0x7f0000000100)=0x1) ioctl$TCGETS(r3, 0x8924, 0x0) socket$inet6(0xa, 0x3, 0x6) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x20008000004001fe) 18:43:32 executing program 5: perf_event_open(&(0x7f0000000480)={0x1, 0x70, 0x0, 0x0, 0x5, 0x0, 0x0, 0x40007f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x4, 0xf4}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000100)=0x1) ioctl$TCGETS(r0, 0x8924, 0x0) ioctl$TIOCSTI(r0, 0x5412, 0x1) keyctl$join(0x1, &(0x7f0000000040)={'syz', 0x2}) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) ioctl$KVM_SET_PIT2(0xffffffffffffffff, 0x4070aea0, &(0x7f0000000140)={[{0x7f, 0x3, 0x7, 0x6, 0x1, 0x9, 0x8, 0x3, 0x7, 0xd0, 0x3f, 0x5, 0x3}, {0xc40c, 0x20, 0x2, 0x0, 0x86, 0x79, 0x80, 0x5, 0x2, 0x2, 0x3f, 0x7, 0x2}, {0x6, 0x400, 0x7, 0x72, 0x7, 0x5, 0xf, 0x5f, 0x7, 0x0, 0x2, 0x81, 0x7}], 0x94}) r3 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) ioctl$TIOCL_UNBLANKSCREEN(r0, 0x541c, &(0x7f0000000080)) r4 = ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r4, 0xae60) dup3(r4, r2, 0x0) r5 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r5, 0x5423, &(0x7f0000000100)=0x1) ioctl$TCGETS(r5, 0x8924, 0x0) fcntl$dupfd(r5, 0x406, r2) ioctl$KVM_SET_IRQCHIP(r2, 0xc208ae62, &(0x7f0000000240)={0x1, 0x0, @ioapic={0x2, 0x0, 0x0, 0x0, 0x0, [{}, {}, {}, {}, {}, {0x0, 0xff}, {}, {}, {}, {0x0, 0x0, 0x0, [], 0x59}, {}, {}, {}, {}, {}, {0x0, 0x0, 0x0, [], 0x7}, {}, {}, {}, {}, {}, {}, {}, {0xff}]}}) ioctl$KVM_ASSIGN_SET_MSIX_ENTRY(r2, 0x4010ae74, &(0x7f0000000000)={0x209, 0x2, 0xff40}) 18:43:32 executing program 0: r0 = perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x3, 0x5) delete_module(&(0x7f0000000000)='$\x00', 0x800) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = memfd_create(&(0x7f0000000000), 0x0) dup2(r0, r3) mmap(&(0x7f0000200000/0x400000)=nil, 0x400002, 0x1, 0x2011, r3, 0x0) 18:43:32 executing program 0: r0 = perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x3, 0x5) delete_module(&(0x7f0000000000)='$\x00', 0x800) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = memfd_create(&(0x7f0000000000), 0x0) dup2(r0, r3) mmap(&(0x7f0000200000/0x400000)=nil, 0x400002, 0x1, 0x2011, r3, 0x0) 18:43:33 executing program 5: syz_emit_ethernet(0x2de, &(0x7f0000000000)={@multicast, @broadcast, @void, {@ipv6={0x86dd, @icmpv6={0x0, 0x6, "a0f009", 0x2a8, 0x3a, 0xff, @dev, @mcast2, {[], @ndisc_redir={0x89, 0x0, 0x0, [], @mcast2, @remote, [{0x4, 0x5, "ff245780dd04e6e97165aa99a299f38cfb39528ea03d8e49ffff5da4ca5c78f4f9b520683238fc4b7471ab919d"}, {0x0, 0x7, "0f9ba7912c819ec5e9c05a915cb12d3c0a2955cd3fdb2773ac449996a9f5f1c558221e257047705becc5f1a6f26c3f21368410aaa27f1885d257"}, {0x0, 0x3, "db2d57dfc6a68ed5b104b956183336c15df527d1b2e8a5385d56"}, {0x0, 0x16, "d4cfe8ff7d89a47d2d2cd182de313fa9b0a68cf22a124194e45fb29f39a160fbf9f9d153274cd35c57e422e0ad6d77be3f5a2539f16d33717454943ca28b82c234a71c38c95af67d8c718b099a131c676509f551691618e391d8b82a88add30c890d0120ed407963769d56f7ecf2ce0444e759a8213b4f615db024465037d016707ef36f421924b87258e9696a726560824f1cedb39f24fe89f4be6c4db4714c1111efdd6a2a27add81eb0028f477e9aa0"}, {0x0, 0xb, "63cb972e69600615705133aad9e371b16c542317deafafa98e553e07595fb6d9764695060f970cec1c6f37cb827067e4c29401dc8d3113186d59bdbacebb76ba31e935bc467f0381fe455a933c358a364ebf139d328a397327f02eae"}, {0x0, 0x1d, "3eba9db5725d42a122887a35fb2bfe9d06736049e997fda28fb0eda718180aee3f12c8c7521396a43c01212e793f627e5ee22d804aa82b7b7a6f36a9083d5f9feb3bf75e7fe63cee3255b09f95f5f4c8937f73970e3e1a7613fcc45f0a8fe7906a20cbddd0af62b8a976a28d808f01091018a73b870e8280e7232a5cb6224684ddffc35399368cecc7673f769a96c1308945e8ba883f20ae10a941f94a128ec77040e45f77ae3feec4429490e3e250ece734c59be10901012dba528f0f70d5c4d4001cc598200e39eee1a0e65aef2c05e7d39459960c49c039934377691c042bc639d8d9a585"}]}}}}}}, 0x0) 18:43:33 executing program 3: ioctl$TIOCSPTLCK(0xffffffffffffffff, 0x40045431, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000380)) r2 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$TCSETAW(0xffffffffffffffff, 0x5407, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1000, &(0x7f0000000000/0x1000)=nil}) ioctl$KVM_SET_REGS(r3, 0x4090ae82, &(0x7f00000001c0)={[0x0, 0x0, 0x0, 0x2000020, 0xffffffffffffffff, 0x0, 0x4cb]}) ioctl$KVM_RUN(r3, 0xae80, 0x0) r4 = socket$inet6(0xa, 0x2, 0x0) sendfile(r4, 0xffffffffffffffff, &(0x7f0000000040), 0x0) r5 = add_key$user(&(0x7f0000000040)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)='X', 0x1, 0xfffffffffffffffe) keyctl$update(0x2, r5, &(0x7f00000006c0)="c0ca1cdbaa1aedbbed80dddaa28e15b9449e2e82cca4244c40ffd0fd4e6631c7d3d86e1339de17344340b02dd527f2d8b3ae6c1db3594e657da33c3ec668f143974a65753472df5319a6b83e1e86b8f2666c61a2e700d1c1e0ae1fc52494bd4885a5c64e9007d39fa11313805290dd6342f9775f01a02ec88f6bee22f25a377a9b143abba1264586d2779088006d5f9be82b00f10287031623f73470264cc5897f18f357aad6deb3883da88ae2266664933785a3ce72bb224a441437ea93c217", 0xc0) r6 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x9a, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000080)={r6, r5, r6}, &(0x7f00000009c0)=""/240, 0x4a3, 0x0) keyctl$dh_compute(0x17, &(0x7f0000000180)={0x0, r5}, &(0x7f0000000280)=""/145, 0x91, 0x0) openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000000)='/proc/capi/capi20\x00', 0x0, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) 18:43:33 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$IPCTNL_MSG_EXP_DELETE(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000280)={&(0x7f0000000080)={0x1b4, 0x2, 0x2, 0x801, 0x0, 0x0, {0x7, 0x0, 0x5}, [@CTA_EXPECT_NAT={0x110, 0xa, 0x0, 0x1, [@CTA_EXPECT_NAT_TUPLE={0xc, 0x2, 0x0, 0x1, [@CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}]}, @CTA_EXPECT_NAT_DIR={0x8}, @CTA_EXPECT_NAT_TUPLE={0x30, 0x2, 0x0, 0x1, [@CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @remote}, {0x14, 0x4, @empty}}}]}, @CTA_EXPECT_NAT_DIR={0x8}, @CTA_EXPECT_NAT_TUPLE={0x48, 0x2, 0x0, 0x1, [@CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x11}}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x3}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}, @CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @rand_addr=0x90000}, {0x8}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x84}}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}]}, @CTA_EXPECT_NAT_TUPLE={0x78, 0x2, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @rand_addr=0x7}, {0x8, 0x2, @multicast2}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x11}}, @CTA_TUPLE_ZONE={0x6}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x11}}, @CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @loopback}, {0x14, 0x4, @ipv4={[], [], @local}}}}, @CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @broadcast}, {0x8, 0x2, @loopback}}}]}]}, @CTA_EXPECT_CLASS={0x8, 0x9, 0x1, 0x0, 0xfa}, @CTA_EXPECT_ID={0x8, 0x5, 0x1, 0x0, 0x66e}, @CTA_EXPECT_FN={0x13, 0xb, 'callforwarding\x00'}, @CTA_EXPECT_TUPLE={0x6c, 0x2, 0x0, 0x1, [@CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x21}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x21}}, @CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @broadcast}, {0x8, 0x2, @dev={0xac, 0x14, 0x14, 0x11}}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x2f}}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x3}, @CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @dev={0xac, 0x14, 0x14, 0x1b}}, {0x8, 0x2, @loopback}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}]}]}, 0x1b4}, 0x1, 0x0, 0x0, 0x40800}, 0x10) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f000000cb80)=ANY=[@ANYBLOB="280000001e000101000000000000000007000000", @ANYRES32=0x0, @ANYBLOB="e4000000000000e007000a00", @ANYRES32, @ANYBLOB="190574d548246fcc8a963a1d3994b01828fa9697ad68946753e669300774065369ef22955d912316da22b7f58ec5630d1b93c25f85f0fade30d1f334c85614ce6241f44ba26dc657267521beced26bbb79ef5c9ff08327f68d014a9ef4cce8dfac4d5afbf88b1ae71e47f95469773209818b60693cc35227198c75d639905ab88d8c8b0b7da04a023b85132e01267286ec8a55dd2db99e99e96c64cf5fa7dfcc59590ee82ae067b58e64449a6bb31be667de6f6c5a8f90575c3f0adb3267855eedf474a979029b28c19f50a210fcd416a0dac9bc8d8906c677385d4f0ad990be649675f1a706be2aae820c3c1f3b454dca4cfefd69536377d9d71630751fc6360f80e27114f9b6a6b06f3b86d30ff5c56a56aa718f75791b708a0def20e385c16ad81f12b32d6646a6bc22ee782fbf34616762317e9d8f3b1dc2f9347496abc2525e8fb67eb0700627d6867cad6b8a38b371c4ce5503825ac6a6ef634cd204359a205edea7cc5d8f6ee61d89984e6075"], 0x28}}, 0x0) r1 = socket$inet6(0xa, 0x3, 0x6) r2 = dup(r1) setsockopt$inet6_dccp_buf(r2, 0x21, 0x80, &(0x7f0000000300)="2d40b92a218ab160de0350b1f2248256b48a0d4fe2988c058de8faaacfa1e3c4d76f242d1c7bceda188ab8296cb4cd3b81126ce495f193ce5fd75f1dd3bd25e2881c90a20fab467d0ce22049d78cba2853e3295eec326a9d298e54a7e48dd35d14483a3fe176b40bd1fd983c627eb2c78ff65436c5f07f83d06967051b8fd478de37acc8af03d57d746dc28af2b9d5fcc9cbced16973ccbe50f5ec652eb2477dd148b78522a40e88b906acbd5fef61a4bc9914af6497f266bc", 0xb9) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$DRM_IOCTL_SET_MASTER(r2, 0x641e) 18:43:33 executing program 5: syz_emit_ethernet(0x4a, &(0x7f0000000e80)=ANY=[@ANYBLOB="aaaaaaaa5ecbcdeb5d09a79031edfe74aaaaffffffffffff86dd6000004000142c00fe8000000000000000000000000000bbfe80000000000000", @ANYRES32=0x41424344, @ANYRES32=0x41424344, @ANYBLOB="5000000090780000"], 0x0) [ 279.223787][T10178] netlink: 'syz-executor.0': attribute type 10 has an invalid length. [ 279.261982][T10183] netlink: 'syz-executor.0': attribute type 10 has an invalid length. 18:43:34 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000100)=0x1) ioctl$TCGETS(r0, 0x8924, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000100)=0x1) ioctl$TCGETS(r1, 0x8924, 0x0) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x400101, 0x0) ioctl$TIOCSETD(r2, 0x5423, &(0x7f0000000100)=0x1) ioctl$TCGETS(r2, 0x8924, 0x0) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r3, 0x5423, &(0x7f0000000100)=0x1) ioctl$TCGETS(r3, 0x8924, 0x0) socket$inet6(0xa, 0x3, 0x6) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x20008000004001fe) 18:43:34 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000180)=ANY=[@ANYBLOB="4c00000010000507003000fd07000079a7aa4f0130056ec4263759b5ef5c03e383e6446c26", @ANYRES32=0x0, @ANYBLOB="000000000000000024001280080001006772650018000280040012000600020000000000060002000500000008000a00", @ANYRES32, @ANYBLOB], 0x4c}}, 0x0) 18:43:34 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x200000000000011, 0x3, 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f00000003c0)={'netdevsim0\x00', 0x0}) pipe2(&(0x7f0000000000)={0xffffffffffffffff}, 0x80800) r6 = socket$nl_generic(0x10, 0x3, 0x10) r7 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000140)='l2tp\x00') getsockname$packet(0xffffffffffffffff, &(0x7f0000000500), &(0x7f0000000040)=0x10eef0f1) r8 = socket$inet6_sctp(0xa, 0x1, 0x84) r9 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r9, 0x84, 0xd, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) getsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r8, 0x84, 0x7d, &(0x7f0000000080)={r10}, &(0x7f00000000c0)=0x8) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, &(0x7f0000000400)={r10, @in={{0x2, 0x4e20, @empty}}, 0xffff, 0x7, 0x6, 0x3f, 0x7f, 0x3ff, 0x4}, &(0x7f0000000280)=0x9c) sendmsg$L2TP_CMD_TUNNEL_CREATE(r6, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000340)=ANY=[@ANYBLOB='<\x00\x00\x00', @ANYRES16=r7, @ANYBLOB="230900000000000000000100000005000700000000000800090000000000060002000100000008000a000000000008001700", @ANYRES32, @ANYBLOB="31950cef5ddfd2fb1ec396462878b1f972c74cd537"], 0x3c}}, 0x0) sendmsg$L2TP_CMD_SESSION_MODIFY(r5, &(0x7f00000001c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000180)={&(0x7f0000000100)=ANY=[@ANYBLOB="2c817fe9", @ANYRES16=r7, @ANYBLOB="08002abd7000fbdbdf25070000000c00100001000000000000000c0010000700000000000000"], 0x2c}, 0x1, 0x0, 0x0, 0x8001}, 0x4000000) bind$packet(r2, &(0x7f0000000240)={0x11, 0x0, r4}, 0x14) getsockname$packet(r2, &(0x7f0000000500)={0x11, 0x0, 0x0}, &(0x7f0000000040)=0x10eef0f1) sendmsg$nl_route(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000000c0)=ANY=[@ANYBLOB="340000001000010800"/20, @ANYRES32=r11, @ANYBLOB="0000000000000000140c0003000000000000000000"], 0x34}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000540)=ANY=[@ANYBLOB="cb9942354f70f7e76b6536e292a49ea57263e2d06aed1000", @ANYRES32=r11, @ANYBLOB="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"], 0x3}}, 0x48800) [ 279.722328][T10196] netlink: 44 bytes leftover after parsing attributes in process `syz-executor.5'. [ 279.766308][T10195] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.0'. [ 279.817870][T10202] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.0'. 18:43:37 executing program 2: ioctl$TIOCSPTLCK(0xffffffffffffffff, 0x40045431, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000380)) r2 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$TCSETAW(0xffffffffffffffff, 0x5407, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1000, &(0x7f0000000000/0x1000)=nil}) ioctl$KVM_SET_REGS(r3, 0x4090ae82, &(0x7f00000001c0)={[0x0, 0x0, 0x0, 0x2000020, 0xffffffffffffffff, 0x0, 0x4cb]}) ioctl$KVM_RUN(r3, 0xae80, 0x0) r4 = socket$inet6(0xa, 0x2, 0x0) sendfile(r4, 0xffffffffffffffff, &(0x7f0000000040), 0x0) r5 = add_key$user(&(0x7f0000000040)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)='X', 0x1, 0xfffffffffffffffe) keyctl$update(0x2, r5, &(0x7f00000006c0)="c0ca1cdbaa1aedbbed80dddaa28e15b9449e2e82cca4244c40ffd0fd4e6631c7d3d86e1339de17344340b02dd527f2d8b3ae6c1db3594e657da33c3ec668f143974a65753472df5319a6b83e1e86b8f2666c61a2e700d1c1e0ae1fc52494bd4885a5c64e9007d39fa11313805290dd6342f9775f01a02ec88f6bee22f25a377a9b143abba1264586d2779088006d5f9be82b00f10287031623f73470264cc5897f18f357aad6deb3883da88ae2266664933785a3ce72bb224a441437ea93c217", 0xc0) r6 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x9a, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000080)={r6, r5, r6}, &(0x7f00000009c0)=""/240, 0x4a3, 0x0) keyctl$dh_compute(0x17, &(0x7f0000000180)={0x0, r5}, &(0x7f0000000280)=""/145, 0x91, 0x0) openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000000)='/proc/capi/capi20\x00', 0x0, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) 18:43:37 executing program 5: socket$inet6_tcp(0xa, 0x1, 0x0) socket$inet6(0xa, 0x2, 0x0) syz_open_dev$usbmon(&(0x7f0000000100)='/dev/usbmon#\x00', 0x0, 0x0) pipe(&(0x7f0000000140)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x10000, 0x7ff}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000240)={0x0, 0x0}) pselect6(0x40, &(0x7f0000000080), 0x0, &(0x7f0000000140)={0x1ff}, &(0x7f0000000200)={0x0, r0+30000000}, 0x0) 18:43:37 executing program 0: socket$inet6(0xa, 0x6, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f00000000c0)={@mcast1, 0x800, 0x0, 0x103, 0x1}, 0x20) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f00000000c0)={@loopback, 0x800, 0x0, 0x103, 0x2}, 0x20) getsockopt$inet_sctp6_SCTP_EVENTS(r0, 0x84, 0xb, &(0x7f0000000040), &(0x7f0000000080)=0xe) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$DRM_IOCTL_RM_CTX(0xffffffffffffffff, 0xc0086421, &(0x7f0000000300)={0x0, 0x1}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB='lockproto=lock_nolock,locktable=.']) 18:43:37 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000100)=0x1) ioctl$TCGETS(r0, 0x8924, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000100)=0x1) ioctl$TCGETS(r1, 0x8924, 0x0) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x400101, 0x0) ioctl$TIOCSETD(r2, 0x5423, &(0x7f0000000100)=0x1) ioctl$TCGETS(r2, 0x8924, 0x0) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r3, 0x5423, &(0x7f0000000100)=0x1) ioctl$TCGETS(r3, 0x8924, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x20008000004001fe) [ 282.405768][ T27] audit: type=1400 audit(1585421017.212:23): avc: denied { create } for pid=10288 comm="syz-executor.0" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dccp_socket permissive=1 [ 282.669219][T10292] gfs2: fsid=.: Trying to join cluster "lock_nolock", "." [ 282.739824][T10292] gfs2: fsid=.: Now mounting FS... 18:43:37 executing program 5: perf_event_open(&(0x7f0000000340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) syz_open_dev$tty20(0xc, 0x4, 0x0) r1 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) keyctl$KEYCTL_PKEY_QUERY(0x18, 0x0, 0x0, &(0x7f0000000140)='&\x00', &(0x7f0000000180)) ioctl$SNDCTL_DSP_NONBLOCK(0xffffffffffffffff, 0x500e, 0x0) mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x3000003, 0x5c831, 0xffffffffffffffff, 0x0) r2 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140)='/dev/snapshot\x00', 0x0, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140)='/dev/snapshot\x00', 0x0, 0x0) sendmsg$SMC_PNETID_ADD(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000005c0)=ANY=[@ANYBLOB='@\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="01000000000000000000d052daec97f9eb0900010073797a30000000000900030073797a31000000001400020076657468305fab6eb53918a03ef50e0fcc8310584f82b200325d792870c81bd41d61b7f4941308980cb810f4b9cfecc542fa9f5d1108a2ed50d9141a78b7193d6cfd3bc7d7c5d4bf70ea28d0d910c57637169c39bf21cbaeb23678fabb2b36faf0cfada6481266cda5950be456d4bbef024fb99676792d3bc74617171272ee654a9821f6462a4b0effc7506643ee75064ee3e278a127ea0078c5cb7154b4d962451d6d8722beef5fa48825a485e2cb72debc78f05f6440f1bbbb16e4bcdff6e362b53ae9fab3009c67f021e9d2fb484c7742e2a7acfa9ff90330f38c601c9cc1a31e94072171238aa2332e108d8a09a95e71ecc9a44e59204e73e28628d9c5e50d0e1e6f53cf8534130bbab4de48cf513eed301275c0269eb809f4fe5e6c4f9ad62b59b510def121b1c5345eb4012ccc75a16b7a4abdc13a4a752af32135b0f3b04113f3bbc9a69c5f70f6eeba86c339393c8a3fc7368c5613"], 0x40}}, 0x0) sendmsg$SMC_PNETID_DEL(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f00000000c0)={&(0x7f00000004c0)=ANY=[@ANYBLOB='8\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="000026bd7000fddbdf250300000005000401010000000900030073797a0100001ee70500040002000000050004000200009a43b29285d3ead200461047115f31170418acecc44852add52aa6a415ff1ae97faa39f47d662f055cd421ed3c707e6f26a3e1ba357697d0d4fad4d8443a3606b3ceb6f82c3ffb93a41da065bbab3cabd7b16819aa5a12e7cae25b6a715f836c62cda236ff6f69723d4b594c38545ad0db61f1a64a9758fe2d71b220752596827d556bf59fe17035f21fae4ef6691c"], 0x3}, 0x1, 0x0, 0x0, 0x2400c000}, 0x0) syz_genetlink_get_family_id$SEG6(&(0x7f0000000000)='SEG6\x00') r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000100)='/dev/cachefiles\x00', 0x101000, 0x0) syz_kvm_setup_cpu$x86(r1, r3, &(0x7f00001da000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x3a) r4 = socket$inet6(0xa, 0x3, 0x6) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) ioctl$PPPIOCSACTIVE(r5, 0x40107446, &(0x7f0000000280)={0xa, &(0x7f00000001c0)=[{0x8, 0x9, 0x7, 0x6}, {0x0, 0x1, 0x0, 0x5}, {0x5, 0x7f, 0x74, 0x3}, {0x0, 0x7f, 0x4, 0x7}, {0x7, 0x20}, {0x0, 0x4, 0x8, 0x8}, {0x2, 0xff, 0x9, 0x43}, {0x91, 0x0, 0xc1}, {0x4, 0x33, 0x7f, 0xffff}, {0x3f, 0x3, 0x5, 0x7}]}) [ 282.834768][T10292] gfs2: not a GFS2 filesystem [ 282.839899][T10292] gfs2: fsid=.: can't read superblock [ 282.884343][T10292] gfs2: fsid=.: can't read superblock: -22 18:43:38 executing program 0: socket$inet6(0xa, 0x6, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f00000000c0)={@mcast1, 0x800, 0x0, 0x103, 0x1}, 0x20) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f00000000c0)={@loopback, 0x800, 0x0, 0x103, 0x2}, 0x20) getsockopt$inet_sctp6_SCTP_EVENTS(r0, 0x84, 0xb, &(0x7f0000000040), &(0x7f0000000080)=0xe) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$DRM_IOCTL_RM_CTX(0xffffffffffffffff, 0xc0086421, &(0x7f0000000300)={0x0, 0x1}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB='lockproto=lock_nolock,locktable=.']) [ 283.490198][T10351] gfs2: fsid=.: Trying to join cluster "lock_nolock", "." [ 283.517770][T10351] gfs2: fsid=.: Now mounting FS... [ 283.548322][T10351] gfs2: not a GFS2 filesystem [ 283.563590][T10351] gfs2: fsid=.: can't read superblock [ 283.596794][T10351] gfs2: fsid=.: can't read superblock: -22 18:43:40 executing program 3: ioctl$TIOCSPTLCK(0xffffffffffffffff, 0x40045431, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000380)) r2 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$TCSETAW(0xffffffffffffffff, 0x5407, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1000, &(0x7f0000000000/0x1000)=nil}) ioctl$KVM_SET_REGS(r3, 0x4090ae82, &(0x7f00000001c0)={[0x0, 0x0, 0x0, 0x2000020, 0xffffffffffffffff, 0x0, 0x4cb]}) ioctl$KVM_RUN(r3, 0xae80, 0x0) r4 = socket$inet6(0xa, 0x2, 0x0) sendfile(r4, 0xffffffffffffffff, &(0x7f0000000040), 0x0) r5 = add_key$user(&(0x7f0000000040)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)='X', 0x1, 0xfffffffffffffffe) keyctl$update(0x2, r5, &(0x7f00000006c0)="c0ca1cdbaa1aedbbed80dddaa28e15b9449e2e82cca4244c40ffd0fd4e6631c7d3d86e1339de17344340b02dd527f2d8b3ae6c1db3594e657da33c3ec668f143974a65753472df5319a6b83e1e86b8f2666c61a2e700d1c1e0ae1fc52494bd4885a5c64e9007d39fa11313805290dd6342f9775f01a02ec88f6bee22f25a377a9b143abba1264586d2779088006d5f9be82b00f10287031623f73470264cc5897f18f357aad6deb3883da88ae2266664933785a3ce72bb224a441437ea93c217", 0xc0) r6 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x9a, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000080)={r6, r5, r6}, &(0x7f00000009c0)=""/240, 0x4a3, 0x0) keyctl$dh_compute(0x17, &(0x7f0000000180)={0x0, r5}, &(0x7f0000000280)=""/145, 0x91, 0x0) openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000000)='/proc/capi/capi20\x00', 0x0, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) 18:43:40 executing program 5: perf_event_open(&(0x7f0000000340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) syz_open_dev$tty20(0xc, 0x4, 0x0) r1 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) keyctl$KEYCTL_PKEY_QUERY(0x18, 0x0, 0x0, &(0x7f0000000140)='&\x00', &(0x7f0000000180)) ioctl$SNDCTL_DSP_NONBLOCK(0xffffffffffffffff, 0x500e, 0x0) mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x3000003, 0x5c831, 0xffffffffffffffff, 0x0) r2 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140)='/dev/snapshot\x00', 0x0, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140)='/dev/snapshot\x00', 0x0, 0x0) sendmsg$SMC_PNETID_ADD(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000005c0)=ANY=[@ANYBLOB='@\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="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"], 0x40}}, 0x0) sendmsg$SMC_PNETID_DEL(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f00000000c0)={&(0x7f00000004c0)=ANY=[@ANYBLOB='8\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="000026bd7000fddbdf250300000005000401010000000900030073797a0100001ee70500040002000000050004000200009a43b29285d3ead200461047115f31170418acecc44852add52aa6a415ff1ae97faa39f47d662f055cd421ed3c707e6f26a3e1ba357697d0d4fad4d8443a3606b3ceb6f82c3ffb93a41da065bbab3cabd7b16819aa5a12e7cae25b6a715f836c62cda236ff6f69723d4b594c38545ad0db61f1a64a9758fe2d71b220752596827d556bf59fe17035f21fae4ef6691c"], 0x3}, 0x1, 0x0, 0x0, 0x2400c000}, 0x0) syz_genetlink_get_family_id$SEG6(&(0x7f0000000000)='SEG6\x00') r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000100)='/dev/cachefiles\x00', 0x101000, 0x0) syz_kvm_setup_cpu$x86(r1, r3, &(0x7f00001da000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x3a) r4 = socket$inet6(0xa, 0x3, 0x6) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) ioctl$PPPIOCSACTIVE(r5, 0x40107446, &(0x7f0000000280)={0xa, &(0x7f00000001c0)=[{0x8, 0x9, 0x7, 0x6}, {0x0, 0x1, 0x0, 0x5}, {0x5, 0x7f, 0x74, 0x3}, {0x0, 0x7f, 0x4, 0x7}, {0x7, 0x20}, {0x0, 0x4, 0x8, 0x8}, {0x2, 0xff, 0x9, 0x43}, {0x91, 0x0, 0xc1}, {0x4, 0x33, 0x7f, 0xffff}, {0x3f, 0x3, 0x5, 0x7}]}) 18:43:40 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000100)=0x1) ioctl$TCGETS(r0, 0x8924, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000100)=0x1) ioctl$TCGETS(r1, 0x8924, 0x0) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x400101, 0x0) ioctl$TIOCSETD(r2, 0x5423, &(0x7f0000000100)=0x1) ioctl$TCGETS(r2, 0x8924, 0x0) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r3, 0x5423, &(0x7f0000000100)=0x1) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x20008000004001fe) 18:43:40 executing program 0: socket$inet6(0xa, 0x6, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f00000000c0)={@mcast1, 0x800, 0x0, 0x103, 0x1}, 0x20) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f00000000c0)={@loopback, 0x800, 0x0, 0x103, 0x2}, 0x20) getsockopt$inet_sctp6_SCTP_EVENTS(r0, 0x84, 0xb, &(0x7f0000000040), &(0x7f0000000080)=0xe) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$DRM_IOCTL_RM_CTX(0xffffffffffffffff, 0xc0086421, &(0x7f0000000300)={0x0, 0x1}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB='lockproto=lock_nolock,locktable=.']) 18:43:40 executing program 1: r0 = socket(0x11, 0x800000003, 0x8) bind(r0, &(0x7f0000000280)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x58) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x80000000000002, &(0x7f0000000040)=0x76, 0x4) getpid() bind$inet(r1, &(0x7f0000000280)={0x2, 0x4e23, @broadcast}, 0x10) r2 = socket$inet6(0xa, 0x3, 0x6) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(0xffffffffffffffff, 0xc02064b2, &(0x7f00000000c0)={0x0, 0x1, 0x8, 0x0, 0x0}) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(r3, 0xc02064b2, &(0x7f0000000140)={0x400, 0x6, 0x86a6, 0x7, r4}) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000000480)={0x0, &(0x7f0000000100)}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000180)='vegas\x00', 0x6) bind$inet6(0xffffffffffffffff, 0x0, 0x0) listen(0xffffffffffffffff, 0x0) pipe(0x0) ioctl$VIDIOC_G_EXT_CTRLS(0xffffffffffffffff, 0xc0205647, &(0x7f0000000080)={0xf000000, 0x0, 0x2c1d, r1, 0x0, &(0x7f0000000000)={0x0, 0x23a4}}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0xfffffffffffffffd}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet(r1, &(0x7f00000012c0)="0c268a927f1f6588b967481241ba7860ac5cf65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95425a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0xfe6a, 0x20c49a, 0x0, 0x27) [ 285.591916][T10382] gfs2: fsid=.: Trying to join cluster "lock_nolock", "." [ 285.625298][T10382] gfs2: fsid=.: Now mounting FS... [ 285.676376][T10382] gfs2: not a GFS2 filesystem [ 285.714349][T10382] gfs2: fsid=.: can't read superblock [ 285.780755][T10382] gfs2: fsid=.: can't read superblock: -22 18:43:40 executing program 5: syz_open_dev$loop(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x7fff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) semctl$IPC_RMID(0x0, 0x0, 0x0) ioctl$DRM_IOCTL_MODE_GETFB(0xffffffffffffffff, 0xc01c64ad, 0x0) getpid() semctl$IPC_INFO(0x0, 0x0, 0x3, &(0x7f0000000000)=""/152) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x600, 0x3ef, 0x0, 0x3f00000000000000, 0x100000000000000, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) ioctl$sock_inet6_SIOCADDRT(r0, 0x89a0, &(0x7f0000000100)={@local={0xfe, 0x80, [0x0, 0xfeff0000]}, @empty, @loopback}) r1 = creat(&(0x7f0000000040)='./file0\x00', 0x0) ioctl$FITRIM(0xffffffffffffffff, 0xc0185879, 0x0) write$binfmt_script(r1, &(0x7f0000000c80)=ANY=[@ANYBLOB="2321202e2f66696c6530665ede2b7465000000790a3533c80ff3fafb38f5d4a57f340558528754b6ef2f5864011909a5186d66e2ce28d34f098d206e3520cc69ef370aceb87973e0b8607e811915c55619303679d8f6c75653e8045d544ed5ecc5"], 0x61) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x14569d0eeb5fa152, &(0x7f0000000340)=0x10, 0x4) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x28031, 0xffffffffffffffff, 0x0) add_key$user(&(0x7f0000000bc0)='user\x00', 0x0, &(0x7f0000000c40), 0x0, 0xfffffffffffffff8) r2 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$SNDRV_TIMER_IOCTL_PARAMS(r2, 0x40505412, &(0x7f0000000380)={0x1, 0x8, 0x1ff, 0x0, 0xd}) ioctl$RNDZAPENTCNT(0xffffffffffffffff, 0x5204, &(0x7f00000001c0)=0x20) 18:43:43 executing program 2: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) sendmsg$NFT_MSG_GETRULE(0xffffffffffffffff, 0x0, 0x0) r0 = open(&(0x7f00000009c0)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x800002, 0x11, r0, 0x0) r1 = creat(&(0x7f00000002c0)='./bus\x00', 0x0) ftruncate(r1, 0x8200) openat$vga_arbiter(0xffffffffffffff9c, 0x0, 0x8002, 0x0) pwritev(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x510, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) fcntl$F_GET_RW_HINT(r1, 0x40b, &(0x7f0000000000)) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000002dc0), 0x0, 0x24008001) r2 = socket$netlink(0x10, 0x3, 0x0) recvmmsg(r2, &(0x7f0000002d80), 0x4000000000006b9, 0x1a002, &(0x7f0000000180)={0x77359400}) sendmsg$nl_generic(r2, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000f00)=ANY=[@ANYBLOB="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"], 0x14}}, 0x0) sched_setattr(0x0, 0x0, 0x0) 18:43:43 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) getpid() perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xd}}, 0x0, 0xffffff7fffffffff, 0xffffffffffffffff, 0x0) openat$ocfs2_control(0xffffffffffffff9c, 0x0, 0x0, 0x0) pipe(0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="c7da5f1a", 0x4) r1 = accept4(r0, 0x0, 0x0, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r2, 0x29, 0x20, &(0x7f00000000c0)={@mcast1, 0x800, 0x0, 0x103, 0x1}, 0x20) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r2, 0x29, 0x20, &(0x7f00000000c0)={@initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x800, 0x0, 0x3, 0xa, 0x0, 0x7}, 0x4) r3 = socket$inet6_sctp(0xa, 0x1, 0x84) r4 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r4, 0x84, 0xd, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) getsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r3, 0x84, 0x7d, &(0x7f0000000080)={r5}, &(0x7f00000000c0)=0x8) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(0xffffffffffffffff, 0x84, 0x22, &(0x7f0000000000)={0x5, 0x1, 0x5, 0xfffffffb}, &(0x7f0000000040)=0x5f) fcntl$setstatus(r1, 0x4, 0x2800) r6 = syz_open_procfs(0x0, &(0x7f0000000080)='pagemap\x00') sendfile(r1, r6, 0x0, 0x10000000000443) 18:43:43 executing program 5: syz_open_dev$loop(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x7fff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) semctl$IPC_RMID(0x0, 0x0, 0x0) ioctl$DRM_IOCTL_MODE_GETFB(0xffffffffffffffff, 0xc01c64ad, 0x0) getpid() semctl$IPC_INFO(0x0, 0x0, 0x3, &(0x7f0000000000)=""/152) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x600, 0x3ef, 0x0, 0x3f00000000000000, 0x100000000000000, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) ioctl$sock_inet6_SIOCADDRT(r0, 0x89a0, &(0x7f0000000100)={@local={0xfe, 0x80, [0x0, 0xfeff0000]}, @empty, @loopback}) r1 = creat(&(0x7f0000000040)='./file0\x00', 0x0) ioctl$FITRIM(0xffffffffffffffff, 0xc0185879, 0x0) write$binfmt_script(r1, &(0x7f0000000c80)=ANY=[@ANYBLOB="2321202e2f66696c6530665ede2b7465000000790a3533c80ff3fafb38f5d4a57f340558528754b6ef2f5864011909a5186d66e2ce28d34f098d206e3520cc69ef370aceb87973e0b8607e811915c55619303679d8f6c75653e8045d544ed5ecc5"], 0x61) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x14569d0eeb5fa152, &(0x7f0000000340)=0x10, 0x4) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x28031, 0xffffffffffffffff, 0x0) add_key$user(&(0x7f0000000bc0)='user\x00', 0x0, &(0x7f0000000c40), 0x0, 0xfffffffffffffff8) r2 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$SNDRV_TIMER_IOCTL_PARAMS(r2, 0x40505412, &(0x7f0000000380)={0x1, 0x8, 0x1ff, 0x0, 0xd}) ioctl$RNDZAPENTCNT(0xffffffffffffffff, 0x5204, &(0x7f00000001c0)=0x20) 18:43:43 executing program 0: socket$inet6(0xa, 0x6, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f00000000c0)={@mcast1, 0x800, 0x0, 0x103, 0x1}, 0x20) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f00000000c0)={@loopback, 0x800, 0x0, 0x103, 0x2}, 0x20) getsockopt$inet_sctp6_SCTP_EVENTS(r0, 0x84, 0xb, &(0x7f0000000040), &(0x7f0000000080)=0xe) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$DRM_IOCTL_RM_CTX(0xffffffffffffffff, 0xc0086421, &(0x7f0000000300)={0x0, 0x1}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB='lockproto=lock_nolock,locktable=.']) 18:43:43 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000100)=0x1) ioctl$TCGETS(r0, 0x8924, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000100)=0x1) ioctl$TCGETS(r1, 0x8924, 0x0) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x400101, 0x0) ioctl$TIOCSETD(r2, 0x5423, &(0x7f0000000100)=0x1) ioctl$TCGETS(r2, 0x8924, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x20008000004001fe) [ 288.543795][T10469] gfs2: fsid=.: Trying to join cluster "lock_nolock", "." [ 288.551685][T10469] gfs2: fsid=.: Now mounting FS... [ 288.573433][T10469] gfs2: not a GFS2 filesystem [ 288.581276][T10469] gfs2: fsid=.: can't read superblock [ 288.587702][T10469] gfs2: fsid=.: can't read superblock: -22 18:43:43 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) writev(r0, &(0x7f0000001900)=[{&(0x7f0000000400)="b19462c33f5d8115ec7c43e324cb91c04ab79a9d9a68d1bedd9044dc0e34f7ffffffffffffff47ffb59892f2c7713ce44d0acec8d57d0ac439e24d4c7e6160356492dc21a4f94e67be791ec34221e762cd0f50ebc08b5a9a3d7b2c10a61673280de1dd14e0bf57bf9afebd301941e2b3259c1506b98db698f5c9b319958d545d4e4d1db301dee1263e963665de6964774a1a8c82bda902ab3a57a6cb5fec6f469af8ca336c8e52ba6aae6eda763e8e5cca04f77089bb16d1cd0f75f6fe2a4f2f8f875d8be12571eec5", 0xc9}, {&(0x7f00000001c0)="357664a6eb136a8c093aeda6ca78c84b1cc4ac9bb07939d040b691d81fe0f6c040df718502a23459a7c34ddf57b5325b6d8391372a758d24b206927b31fab6942f2c896931cc3c319c3633ad5cfe171a2f68d83077637bb27a168f7117", 0x5d}, {&(0x7f0000000b80)="c384a235c07e956b29b267882cfb178ce04249deacee3abfac8f28ae462fb6194d2f3aa45c47f460f355269a3a64677c88bea56e51f0430f966e6d04a53b1b08fc5078250e8552cf4741c9cb0d637bf35b12c12a9b93507ca951ea11d3ec305a2c0f2b4b5784550e15b7a00b6d51ed5bfe50a63002b993f7b8676258a966ade264397671329361afd56004a714456023081c1c05f4839a36f8e3ed150481df4d7a5a75dcf11304449f402c7149ef0eb79e04d74e3324822e5e52429c6904da9f5a5f83bbbd5952202d9cae9aa77aa52e5f67bfa794a372a3af66c5c35462f92e3380b75f02723f4adfc11b1385cbd01b955985e742c217915fe15aa246ce9f3fa005dbc18e212274e3b2c4cab361b7647ded189a3bc1c463845bfe15cbd1081cccff7616a40e9eeb4c89e645e18b0b7b98f4e027814cb9be8d5fc7f5633b6993b4f705695eed127abb3f1effb8069498bc3435c27993de76e914d32bc1a2c99eff42720a6607c59fcb64893a1bf5719c07d67f88e0d366e06c01e9520e066d0b345f9077e45d75ee0c77e1eadfd6acebc3d0dc3a9dd757f25d2878c50f92a98bf433d39eae91f0454eb83c2830f6350ffe1d7edcb157b1f60ceff280841c5652e256ea722735856d8e2f738f189b3d2513e73673b87eb30953b99a574135e2f18c28690a390aafc7c084aac75c24fad6ab4fafe9a28e789c08f9a602347042e5ea28014226df109b8df4d1df2ea262be6611721760294551fefb31620240c11c2879903f565d011bf2487de0ea3a6fadfab1b7ddbdd5d01305200fa7b660e52b6ce88e3361a047db3de5a633f6bd88da147cfafc3cb8219eb5adf708a51400e8218f2f256109534386fe36133668a93f55740a51cafb59feeaa950a44bb99f49e7aa1e20e3368c98d5100d0b3cb3f64950cb15a7b246ff7f5faea4a1fb3e37602e581af0680cf8439a27d0176baecb941b1b2bc8c7260c2c0b57d3735601974e920aa4b26fea4b8ca5da482021d20aae36de67dc416474488e9ad3f75d50a7d7ce26852b9e91e80686d102a07dbc4de3551cb7297b864dfb071696e698a16ec92e4126cccdb50744fe5507e7ebafd08e371de8ed78f90dab46d3b16e57331710f9c5e3e8e9c019540e8cf4a55bd0164cb7ba88c90dbb55848230dd70b7cff4356db5c4c0c286ebf08399a035704f13b10bf155877308924ef19622013ef1b4664ef6f9cdc280a8bdc4559ed69d420b57613eba88b997c63674cbd8f3ad1279a48e054a61bb6f347d75115d90d7504111fe0d89959c2e32ff80d4f226b615c35e0de58fce9a3c7d88a816b32c9c9eb7afb04971285fe11a3def66c3073ab2894cb742f0d6259ece71d6799dba2c3fd98c372072739874a1b599cf437dd37486a89a4be528f752928f09444749434ed2bd7da64bd9482f7ec7cc592f7991e181f033bcc57059f7ebbaad0f1552f34b5c8eb0a18a1a6b401d5a1e86758409de383b346506056a8c81e6e913f5dd6a7a92c89d2593c541a63f467e3372175c4f32f04bb1078c9143cecb6ac3db83a81396ba65216a9920da000000000000000000c7b92cbc3a9b0cbfaf09d8ac434dd1ff9cc850e8e22de829815a5051806e1c6cfb5bef3557bc95537e7097be0342b6817c046bcab785ef4928be7024630882", 0x49e}], 0x3) mmap(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x1, 0x10012, r1, 0x0) r2 = socket$inet6(0xa, 0x3, 0x6) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$VHOST_GET_VRING_BASE(r0, 0xc008af12, &(0x7f0000000240)) openat$cgroup_ro(r3, &(0x7f0000000140)='pids.events\x00', 0x0, 0x0) sendmsg$NFT_MSG_GETGEN(r0, &(0x7f0000000100)={&(0x7f0000000000), 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x14, 0x10, 0xa, 0x301, 0x0, 0x0, {0x5}, ["", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x4000000}, 0x10) r4 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r4, 0x29, 0x20, &(0x7f00000000c0)={@mcast1, 0x800, 0x0, 0x103, 0x1}, 0x20) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r4, 0x29, 0x20, &(0x7f00000000c0)={@loopback, 0x800, 0x0, 0x103, 0x2}, 0x20) getsockopt$inet_sctp6_SCTP_ASSOCINFO(r4, 0x84, 0x1, &(0x7f0000000280)={0x0, 0x9, 0x0, 0x3f, 0xffffffff, 0xffff8000}, &(0x7f00000002c0)=0x14) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, &(0x7f0000000300)={r5}, &(0x7f0000000340)=0x8) r6 = socket$nl_audit(0x10, 0x3, 0x9) getsockopt$netlink(r6, 0x10e, 0x4, 0x0, &(0x7f0000000580)) 18:43:45 executing program 3: ioctl$TIOCSPTLCK(0xffffffffffffffff, 0x40045431, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000380)) r2 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$TCSETAW(0xffffffffffffffff, 0x5407, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1000, &(0x7f0000000000/0x1000)=nil}) ioctl$KVM_SET_REGS(r3, 0x4090ae82, &(0x7f00000001c0)={[0x0, 0x0, 0x0, 0x2000020, 0xffffffffffffffff, 0x0, 0x4cb]}) ioctl$KVM_RUN(r3, 0xae80, 0x0) r4 = socket$inet6(0xa, 0x2, 0x0) sendfile(r4, 0xffffffffffffffff, &(0x7f0000000040), 0x0) r5 = add_key$user(&(0x7f0000000040)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)='X', 0x1, 0xfffffffffffffffe) keyctl$update(0x2, r5, &(0x7f00000006c0)="c0ca1cdbaa1aedbbed80dddaa28e15b9449e2e82cca4244c40ffd0fd4e6631c7d3d86e1339de17344340b02dd527f2d8b3ae6c1db3594e657da33c3ec668f143974a65753472df5319a6b83e1e86b8f2666c61a2e700d1c1e0ae1fc52494bd4885a5c64e9007d39fa11313805290dd6342f9775f01a02ec88f6bee22f25a377a9b143abba1264586d2779088006d5f9be82b00f10287031623f73470264cc5897f18f357aad6deb3883da88ae2266664933785a3ce72bb224a441437ea93c217", 0xc0) r6 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x9a, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000080)={r6, r5, r6}, &(0x7f00000009c0)=""/240, 0x4a3, 0x0) keyctl$dh_compute(0x17, &(0x7f0000000180)={0x0, r5}, &(0x7f0000000280)=""/145, 0x91, 0x0) openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000000)='/proc/capi/capi20\x00', 0x0, 0x0) 18:43:45 executing program 0: socket$inet6(0xa, 0x6, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f00000000c0)={@mcast1, 0x800, 0x0, 0x103, 0x1}, 0x20) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f00000000c0)={@loopback, 0x800, 0x0, 0x103, 0x2}, 0x20) getsockopt$inet_sctp6_SCTP_EVENTS(r0, 0x84, 0xb, &(0x7f0000000040), &(0x7f0000000080)=0xe) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$DRM_IOCTL_RM_CTX(0xffffffffffffffff, 0xc0086421, &(0x7f0000000300)={0x0, 0x1}) syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB='lockproto=lock_nolock,locktable=.']) 18:43:45 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) r1 = socket(0x200000000000011, 0x3, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f00000003c0)={'netdevsim0\x00', 0x0}) bind$packet(r1, &(0x7f0000000240)={0x11, 0x0, r3}, 0x14) getsockname$packet(r1, &(0x7f0000000500), &(0x7f0000000040)=0x10eef0f1) getsockopt$bt_BT_POWER(r1, 0x112, 0x9, &(0x7f0000000000)=0x7, &(0x7f0000000040)=0x1) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000240)="0f05", 0x2}], 0x1, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000400)=ANY=[@ANYBLOB="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"], 0x0, 0xfe}, 0x20) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0xd) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r4 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r4, 0x29, 0x20, &(0x7f00000000c0)={@mcast1, 0x800, 0x0, 0x103, 0x1}, 0x20) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r4, 0x29, 0x20, &(0x7f00000000c0)={@loopback, 0x800, 0x0, 0x103, 0x2}, 0x20) getsockopt$inet6_buf(r4, 0x29, 0xcd, &(0x7f0000000140)=""/84, &(0x7f0000000080)=0x54) ptrace$cont(0x7, r0, 0x0, 0x0) 18:43:45 executing program 1: r0 = memfd_create(&(0x7f0000000580)='-B\xd5NI\xc5j\xbappp\xf0\b\x84\xa2m\x00:)\x00\xbb\x8d\xac\xacva}knh#\b\x00\x00\x00\xc0:\x9cc\x10d\xee\xa9\x8bCc\xad\x89\x9ck\xde\xc5\xe9\xaa\x9b\xc3\x14\xd2\xd1y\x1f\x9e\x856\xddU\xa9=\xcdJx\xaa\x8f~\xb90a\xa9\xb2\x04K\x98\x93?\x88Q\xf7\xd6\x1d\xa1\xce\x8b\x19\xea\xef\xe3\xab\xb6\xa5$4\xd6\xfe7\x0f\xe7\xd9$\xce(\xabN\xae\xc9\xbd\xd3g@\xe1\'s\x0e\x90\xf2\xcdr\xb8(\xb8\xd9\xa3\xc4p\xf4\\>A\x11U\x99\x8d\xa3\x86\xb7\x1d\x87z\xd3\xc4\xdf\x13/\x97Yy\x8b{\x1df\x8d/\x90\xd3<\xf8\x18\xa4\x88\xcf\x048\xb4\xbe\xfa\xa5\xb7\xd6\xa5&);\x1br\xd2a\xf2\x8b\xa7\x15\xbe\x95\xeb\x1bB\xacoyP\xbb\x1c\xb9S-\xe0oK\xac\x00;S\x8a\x01\xd2\xca<\x04\xaf\x04\x9a\x9d\x84\xa5\x94J>F\xc5V\xc6\xfa\x8e\v\xe1\x82\x03`\xf8\xca\xf4\x89\r^Z44\x91\xeb\xf4$\xf3\x1d\xd5\xbd\xb6ZZ\xd8\xfdS\r\x98\x06/\x9a%m\xcf\xab u\xa6Fw\xde\xb4?\r\xbdK\xfb\xf2\x13\xb3\xfa\x00\xaaP\xc9t\x7f\'\xba\x12', 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000100)=0x1) ioctl$TCGETS(r1, 0x8924, 0x0) pwrite64(r1, &(0x7f0000000240)="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", 0x101, 0x0) mmap(&(0x7f0000001000/0x4000)=nil, 0x4000, 0x4, 0x11, r0, 0x0) symlink(&(0x7f0000001000)='./file0\x00', &(0x7f0000000040)='./file0\x00') rename(&(0x7f0000000140)='./file0\x00', &(0x7f0000000080)='./file0/file0\x00') 18:43:45 executing program 5: statx(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x2000, 0x800, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0}) syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x9, 0x0, &(0x7f00000000c0), 0x200000, &(0x7f0000000240)={[{@part={'part', 0x3d, 0xa14}}, {@file_umask={'file_umask', 0x3d, 0x657936f8}}, {@type={'type', 0x3d, "6d6d69c8"}}], [{@fsmagic={'fsmagic', 0x3d, 0x6be0}}, {@obj_type={'obj_type', 0x3d, '@%\'em1\x00'}}, {@euid_lt={'euid<', r0}}, {@fsuuid={'fsuuid', 0x3d, {[0x32, 0x36, 0x65, 0x64, 0x36, 0x64, 0x39, 0x30], 0x2d, [0x66, 0x61, 0x65, 0x37], 0x2d, [0x64, 0x62, 0x64, 0x30], 0x2d, [0x36, 0x37, 0x64, 0x35], 0x2d, [0x61, 0x61, 0x31, 0x63, 0x5a, 0x38, 0x63, 0x36]}}}, {@dont_appraise='dont_appraise'}]}) r1 = openat$md(0xffffffffffffff9c, &(0x7f0000000080)='/dev/md0\x00', 0x0, 0x0) ioctl$BLKALIGNOFF(r1, 0x127a, &(0x7f00000000c0)) ioctl$BLKPG(r1, 0x40140921, 0x0) 18:43:45 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000100)=0x1) ioctl$TCGETS(r0, 0x8924, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000100)=0x1) ioctl$TCGETS(r1, 0x8924, 0x0) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x400101, 0x0) ioctl$TIOCSETD(r2, 0x5423, &(0x7f0000000100)=0x1) ioctl$TCGETS(r2, 0x8924, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x20008000004001fe) [ 290.291836][T10530] hfs: unable to parse mount options [ 290.302088][T10528] gfs2: fsid=.: Trying to join cluster "lock_nolock", "." [ 290.350675][T10528] gfs2: fsid=.: Now mounting FS... [ 290.396329][T10530] hfs: unable to parse mount options [ 290.422683][T10528] gfs2: not a GFS2 filesystem 18:43:45 executing program 2: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) getsockopt$bt_BT_RCVMTU(r0, 0x112, 0xd, 0x0, &(0x7f0000000080)) r1 = socket(0x200000000000011, 0x3, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r2, 0x29, 0x20, &(0x7f00000000c0)={@mcast1, 0x800, 0x0, 0x103, 0x1}, 0x20) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r2, 0x29, 0x20, &(0x7f00000000c0)={@loopback, 0x800, 0x0, 0x103, 0x2}, 0x20) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket(0x200000000000011, 0x3, 0x0) r5 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f00000003c0)={'netdevsim0\x00', 0x0}) bind$packet(r4, &(0x7f0000000240)={0x11, 0x0, r6}, 0x14) getsockname$packet(r4, &(0x7f0000000500)={0x11, 0x0, 0x0}, &(0x7f0000000040)=0x10eef0f1) sendmsg$NL80211_CMD_SET_WIPHY_NETNS(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000240)={0x20, 0x0, 0x83, 0x0, 0x0, {}, [@NL80211_ATTR_WDEV={0xc, 0x99, {0x0, 0x2}}]}, 0x20}}, 0x0) sendmsg$NL80211_CMD_GET_KEY(r4, &(0x7f00000017c0)={&(0x7f0000001680)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000001780)={&(0x7f00000016c0)={0x84, 0x0, 0x10, 0x70bd2c, 0x25dfdbfc, {}, [@NL80211_ATTR_KEY_IDX={0x5, 0x8, 0x1}, @NL80211_ATTR_KEY_IDX={0x5}, @NL80211_ATTR_KEY={0x30, 0x50, 0x0, 0x1, [@NL80211_KEY_IDX={0x5, 0x2, 0x3}, @NL80211_KEY_DEFAULT_TYPES={0x24, 0x8, 0x0, 0x1, [@NL80211_KEY_DEFAULT_TYPE_MULTICAST={0x4}, @NL80211_KEY_DEFAULT_TYPE_UNICAST={0x4}, @NL80211_KEY_DEFAULT_TYPE_MULTICAST={0x4}, @NL80211_KEY_DEFAULT_TYPE_UNICAST={0x4}, @NL80211_KEY_DEFAULT_TYPE_MULTICAST={0x4}, @NL80211_KEY_DEFAULT_TYPE_UNICAST={0x4}, @NL80211_KEY_DEFAULT_TYPE_MULTICAST={0x4}, @NL80211_KEY_DEFAULT_TYPE_UNICAST={0x4}]}]}, @NL80211_ATTR_MAC={0xa, 0x6, @link_local}, @NL80211_ATTR_KEY={0x18, 0x50, 0x0, 0x1, [@NL80211_KEY_DATA_WEP104={0x11, 0x1, "177185126b18c80a6101c8e433"}]}, @NL80211_ATTR_MAC={0xa}]}, 0x84}, 0x1, 0x0, 0x0, 0x20000004}, 0x4001) sendmsg$nl_route(r3, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000000c0)=@newlink={0x34, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, r7}, [@IFLA_VFINFO_LIST={0x14, 0x16, 0x0, 0x1, [{0x10, 0x1, 0x0, 0x1, [@IFLA_VF_TX_RATE={0xc}]}]}]}, 0x34}}, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f0000001640)={'vxcan1\x00', r7}) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f00000003c0)={'netdevsim0\x00', 0x0}) bind$packet(r1, &(0x7f0000000240)={0x11, 0x0, r8}, 0x14) getsockname$packet(r1, &(0x7f0000000500), &(0x7f0000000040)=0x10eef0f1) recvmsg$can_bcm(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000001500)=[{&(0x7f00000000c0)=""/140, 0x8c}, {&(0x7f0000000000)=""/33, 0x21}, {&(0x7f0000000180)=""/233, 0xe9}, {&(0x7f0000000280)=""/232, 0xe8}, {&(0x7f0000000380)=""/173, 0xad}, {&(0x7f0000000440)=""/4096, 0x1000}, {&(0x7f0000001440)=""/167, 0xa7}], 0x7, &(0x7f0000001580)=""/150, 0x96}, 0x2) [ 290.474852][T10528] gfs2: fsid=.: can't read superblock [ 290.519529][T10528] gfs2: fsid=.: can't read superblock: -22 18:43:45 executing program 5: statx(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x2000, 0x800, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0}) syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x9, 0x0, &(0x7f00000000c0), 0x200000, &(0x7f0000000240)={[{@part={'part', 0x3d, 0xa14}}, {@file_umask={'file_umask', 0x3d, 0x657936f8}}, {@type={'type', 0x3d, "6d6d69c8"}}], [{@fsmagic={'fsmagic', 0x3d, 0x6be0}}, {@obj_type={'obj_type', 0x3d, '@%\'em1\x00'}}, {@euid_lt={'euid<', r0}}, {@fsuuid={'fsuuid', 0x3d, {[0x32, 0x36, 0x65, 0x64, 0x36, 0x64, 0x39, 0x30], 0x2d, [0x66, 0x61, 0x65, 0x37], 0x2d, [0x64, 0x62, 0x64, 0x30], 0x2d, [0x36, 0x37, 0x64, 0x35], 0x2d, [0x61, 0x61, 0x31, 0x63, 0x5a, 0x38, 0x63, 0x36]}}}, {@dont_appraise='dont_appraise'}]}) r1 = openat$md(0xffffffffffffff9c, &(0x7f0000000080)='/dev/md0\x00', 0x0, 0x0) ioctl$BLKALIGNOFF(r1, 0x127a, &(0x7f00000000c0)) ioctl$BLKPG(r1, 0x40140921, 0x0) 18:43:45 executing program 0: socket$inet6(0xa, 0x6, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f00000000c0)={@mcast1, 0x800, 0x0, 0x103, 0x1}, 0x20) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f00000000c0)={@loopback, 0x800, 0x0, 0x103, 0x2}, 0x20) getsockopt$inet_sctp6_SCTP_EVENTS(r0, 0x84, 0xb, &(0x7f0000000040), &(0x7f0000000080)=0xe) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$DRM_IOCTL_RM_CTX(0xffffffffffffffff, 0xc0086421, &(0x7f0000000300)={0x0, 0x1}) syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB='lockproto=lock_nolock,locktable=.']) [ 290.822144][T10584] hfs: unable to parse mount options 18:43:45 executing program 5: statx(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x2000, 0x800, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0}) syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x9, 0x0, &(0x7f00000000c0), 0x200000, &(0x7f0000000240)={[{@part={'part', 0x3d, 0xa14}}, {@file_umask={'file_umask', 0x3d, 0x657936f8}}, {@type={'type', 0x3d, "6d6d69c8"}}], [{@fsmagic={'fsmagic', 0x3d, 0x6be0}}, {@obj_type={'obj_type', 0x3d, '@%\'em1\x00'}}, {@euid_lt={'euid<', r0}}, {@fsuuid={'fsuuid', 0x3d, {[0x32, 0x36, 0x65, 0x64, 0x36, 0x64, 0x39, 0x30], 0x2d, [0x66, 0x61, 0x65, 0x37], 0x2d, [0x64, 0x62, 0x64, 0x30], 0x2d, [0x36, 0x37, 0x64, 0x35], 0x2d, [0x61, 0x61, 0x31, 0x63, 0x5a, 0x38, 0x63, 0x36]}}}, {@dont_appraise='dont_appraise'}]}) r1 = openat$md(0xffffffffffffff9c, &(0x7f0000000080)='/dev/md0\x00', 0x0, 0x0) ioctl$BLKALIGNOFF(r1, 0x127a, &(0x7f00000000c0)) ioctl$BLKPG(r1, 0x40140921, 0x0) 18:43:45 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000100)=0x1) ioctl$TCGETS(r0, 0x8924, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000100)=0x1) ioctl$TCGETS(r1, 0x8924, 0x0) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x400101, 0x0) ioctl$TIOCSETD(r2, 0x5423, &(0x7f0000000100)=0x1) ioctl$TCGETS(r2, 0x8924, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x20008000004001fe) [ 290.931806][T10595] gfs2: fsid=.: Trying to join cluster "lock_nolock", "." [ 290.964748][T10595] gfs2: fsid=.: Now mounting FS... [ 291.020739][T10595] gfs2: not a GFS2 filesystem [ 291.040761][T10595] gfs2: fsid=.: can't read superblock 18:43:45 executing program 1: socket$inet6(0xa, 0x6, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f00000000c0)={@mcast1, 0x800, 0x0, 0x103, 0x1}, 0x20) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f00000000c0)={@loopback, 0x800, 0x0, 0x103, 0x2}, 0x20) getsockopt$inet_sctp6_SCTP_EVENTS(r0, 0x84, 0xb, &(0x7f0000000040), &(0x7f0000000080)=0xe) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$DRM_IOCTL_RM_CTX(0xffffffffffffffff, 0xc0086421, &(0x7f0000000300)={0x0, 0x1}) syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB='lockproto=lock_nolock,locktable=.']) [ 291.066017][T10595] gfs2: fsid=.: can't read superblock: -22 [ 291.168907][T10606] hfs: unable to parse mount options [ 291.316816][T10614] gfs2: fsid=.: Trying to join cluster "lock_nolock", "." [ 291.342537][T10614] gfs2: fsid=.: Now mounting FS... [ 291.383870][T10614] gfs2: not a GFS2 filesystem [ 291.413986][T10614] gfs2: fsid=.: can't read superblock [ 291.460115][T10614] gfs2: fsid=.: can't read superblock: -22 18:43:46 executing program 3: ioctl$TIOCSPTLCK(0xffffffffffffffff, 0x40045431, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000380)) r2 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$TCSETAW(0xffffffffffffffff, 0x5407, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1000, &(0x7f0000000000/0x1000)=nil}) ioctl$KVM_SET_REGS(r3, 0x4090ae82, &(0x7f00000001c0)={[0x0, 0x0, 0x0, 0x2000020, 0xffffffffffffffff, 0x0, 0x4cb]}) ioctl$KVM_RUN(r3, 0xae80, 0x0) r4 = socket$inet6(0xa, 0x2, 0x0) sendfile(r4, 0xffffffffffffffff, &(0x7f0000000040), 0x0) r5 = add_key$user(&(0x7f0000000040)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)='X', 0x1, 0xfffffffffffffffe) keyctl$update(0x2, r5, &(0x7f00000006c0)="c0ca1cdbaa1aedbbed80dddaa28e15b9449e2e82cca4244c40ffd0fd4e6631c7d3d86e1339de17344340b02dd527f2d8b3ae6c1db3594e657da33c3ec668f143974a65753472df5319a6b83e1e86b8f2666c61a2e700d1c1e0ae1fc52494bd4885a5c64e9007d39fa11313805290dd6342f9775f01a02ec88f6bee22f25a377a9b143abba1264586d2779088006d5f9be82b00f10287031623f73470264cc5897f18f357aad6deb3883da88ae2266664933785a3ce72bb224a441437ea93c217", 0xc0) r6 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x9a, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000080)={r6, r5, r6}, &(0x7f00000009c0)=""/240, 0x4a3, 0x0) keyctl$dh_compute(0x17, &(0x7f0000000180)={0x0, r5}, &(0x7f0000000280)=""/145, 0x91, 0x0) openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000000)='/proc/capi/capi20\x00', 0x0, 0x0) 18:43:46 executing program 5: statx(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x2000, 0x800, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0}) syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x9, 0x0, &(0x7f00000000c0), 0x200000, &(0x7f0000000240)={[{@part={'part', 0x3d, 0xa14}}, {@file_umask={'file_umask', 0x3d, 0x657936f8}}, {@type={'type', 0x3d, "6d6d69c8"}}], [{@fsmagic={'fsmagic', 0x3d, 0x6be0}}, {@obj_type={'obj_type', 0x3d, '@%\'em1\x00'}}, {@euid_lt={'euid<', r0}}, {@fsuuid={'fsuuid', 0x3d, {[0x32, 0x36, 0x65, 0x64, 0x36, 0x64, 0x39, 0x30], 0x2d, [0x66, 0x61, 0x65, 0x37], 0x2d, [0x64, 0x62, 0x64, 0x30], 0x2d, [0x36, 0x37, 0x64, 0x35], 0x2d, [0x61, 0x61, 0x31, 0x63, 0x5a, 0x38, 0x63, 0x36]}}}, {@dont_appraise='dont_appraise'}]}) r1 = openat$md(0xffffffffffffff9c, &(0x7f0000000080)='/dev/md0\x00', 0x0, 0x0) ioctl$BLKALIGNOFF(r1, 0x127a, &(0x7f00000000c0)) ioctl$BLKPG(r1, 0x40140921, 0x0) 18:43:46 executing program 2: socket$inet6(0xa, 0x6, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f00000000c0)={@mcast1, 0x800, 0x0, 0x103, 0x1}, 0x20) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f00000000c0)={@loopback, 0x800, 0x0, 0x103, 0x2}, 0x20) getsockopt$inet_sctp6_SCTP_EVENTS(r0, 0x84, 0xb, &(0x7f0000000040), &(0x7f0000000080)=0xe) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$DRM_IOCTL_RM_CTX(0xffffffffffffffff, 0xc0086421, &(0x7f0000000300)={0x0, 0x1}) syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB='lockproto=lock_nolock,locktable=.']) 18:43:46 executing program 0: socket$inet6(0xa, 0x6, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f00000000c0)={@mcast1, 0x800, 0x0, 0x103, 0x1}, 0x20) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f00000000c0)={@loopback, 0x800, 0x0, 0x103, 0x2}, 0x20) getsockopt$inet_sctp6_SCTP_EVENTS(r0, 0x84, 0xb, &(0x7f0000000040), &(0x7f0000000080)=0xe) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$DRM_IOCTL_RM_CTX(0xffffffffffffffff, 0xc0086421, &(0x7f0000000300)={0x0, 0x1}) syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB='lockproto=lock_nolock,locktable=.']) 18:43:46 executing program 1: socket$inet6(0xa, 0x6, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f00000000c0)={@mcast1, 0x800, 0x0, 0x103, 0x1}, 0x20) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f00000000c0)={@loopback, 0x800, 0x0, 0x103, 0x2}, 0x20) getsockopt$inet_sctp6_SCTP_EVENTS(r0, 0x84, 0xb, &(0x7f0000000040), &(0x7f0000000080)=0xe) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$DRM_IOCTL_RM_CTX(0xffffffffffffffff, 0xc0086421, &(0x7f0000000300)={0x0, 0x1}) syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB='lockproto=lock_nolock,locktable=.']) 18:43:46 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000100)=0x1) ioctl$TCGETS(r0, 0x8924, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000100)=0x1) ioctl$TCGETS(r1, 0x8924, 0x0) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x400101, 0x0) ioctl$TIOCSETD(r2, 0x5423, &(0x7f0000000100)=0x1) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x20008000004001fe) [ 291.819009][T10650] gfs2: fsid=.: Trying to join cluster "lock_nolock", "." [ 291.820646][T10652] hfs: unable to parse mount options [ 291.827028][T10651] sysfs: cannot create duplicate filename '/fs/gfs2/.' [ 291.845380][T10650] gfs2: fsid=.: Now mounting FS... [ 291.860974][T10651] CPU: 1 PID: 10651 Comm: syz-executor.0 Not tainted 5.6.0-rc7-syzkaller #0 [ 291.869686][T10651] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 291.879738][T10651] Call Trace: [ 291.883194][T10651] dump_stack+0x188/0x20d [ 291.887591][T10651] sysfs_warn_dup.cold+0x1c/0x2d [ 291.892545][T10651] sysfs_create_dir_ns+0x233/0x290 [ 291.897654][T10651] ? sysfs_create_mount_point+0xb0/0xb0 [ 291.903332][T10651] ? rwlock_bug.part.0+0x90/0x90 [ 291.909003][T10651] ? rcu_read_lock_any_held.part.0+0x50/0x50 [ 291.915061][T10651] ? do_raw_spin_unlock+0x171/0x260 [ 291.920262][T10651] kobject_add_internal+0x2ca/0x990 [ 291.925499][T10651] ? kfree+0x1a1/0x2b0 [ 291.929569][T10651] kobject_init_and_add+0x101/0x160 [ 291.934779][T10651] ? kobject_add_internal+0x990/0x990 [ 291.940189][T10651] ? vsnprintf+0x2c6/0x14f0 [ 291.944734][T10651] gfs2_sys_fs_add+0x18d/0x350 [ 291.949500][T10651] ? recover_store+0x170/0x170 [ 291.954258][T10651] ? snprintf+0xbb/0xf0 [ 291.958529][T10651] ? set_blocksize+0x24f/0x2c0 [ 291.963302][T10651] ? memcpy+0x35/0x50 [ 291.967312][T10651] gfs2_fill_super+0x1360/0x250a [ 291.972287][T10651] ? gfs2_reconfigure+0x1010/0x1010 [ 291.978086][T10651] ? snprintf+0xbb/0xf0 [ 291.982253][T10651] ? vsprintf+0x30/0x30 [ 291.986443][T10651] ? wait_for_completion+0x3c0/0x3c0 [ 291.991734][T10651] ? set_blocksize+0x24f/0x2c0 [ 291.996524][T10651] get_tree_bdev+0x3f8/0x710 [ 292.001103][T10651] ? gfs2_reconfigure+0x1010/0x1010 [ 292.006292][T10651] gfs2_get_tree+0x4a/0x270 [ 292.010789][T10651] vfs_get_tree+0x89/0x2f0 [ 292.015213][T10651] do_mount+0x1306/0x1a60 [ 292.019551][T10651] ? copy_mount_string+0x40/0x40 [ 292.024518][T10651] ? _copy_from_user+0x123/0x190 [ 292.029494][T10651] __x64_sys_mount+0x18f/0x230 [ 292.034285][T10651] do_syscall_64+0xf6/0x7d0 [ 292.038788][T10651] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 292.044680][T10651] RIP: 0033:0x45f29a [ 292.048570][T10651] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 4d 8c fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 2a 8c fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 292.068603][T10651] RSP: 002b:00007f9b69b9ca68 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 292.077023][T10651] RAX: ffffffffffffffda RBX: 00007f9b69b9d6d4 RCX: 000000000045f29a [ 292.084999][T10651] RDX: 00007f9b69b9cae0 RSI: 0000000020000380 RDI: 00007f9b69b9cb00 [ 292.092969][T10651] RBP: 000000000076bf00 R08: 00007f9b69b9cb40 R09: 00007f9b69b9cae0 [ 292.100939][T10651] R10: 0000000000000000 R11: 0000000000000206 R12: 00000000ffffffff [ 292.108897][T10651] R13: 0000000000000bde R14: 00000000004cdfcc R15: 000000000076bf0c [ 292.137028][T10650] gfs2: not a GFS2 filesystem [ 292.156444][T10665] sysfs: cannot create duplicate filename '/fs/gfs2/.' [ 292.159665][T10650] gfs2: fsid=.: can't read superblock [ 292.181129][T10650] gfs2: fsid=.: can't read superblock: -22 [ 292.183023][T10665] CPU: 1 PID: 10665 Comm: syz-executor.1 Not tainted 5.6.0-rc7-syzkaller #0 [ 292.195661][T10665] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 292.205724][T10665] Call Trace: [ 292.209047][T10665] dump_stack+0x188/0x20d [ 292.213434][T10665] sysfs_warn_dup.cold+0x1c/0x2d [ 292.218394][T10665] sysfs_create_dir_ns+0x233/0x290 [ 292.223556][T10665] ? sysfs_create_mount_point+0xb0/0xb0 [ 292.229124][T10665] ? rwlock_bug.part.0+0x90/0x90 [ 292.234083][T10665] ? rcu_read_lock_any_held.part.0+0x50/0x50 [ 292.240095][T10665] ? do_raw_spin_unlock+0x171/0x260 [ 292.245349][T10665] kobject_add_internal+0x2ca/0x990 [ 292.250590][T10665] ? kfree+0x1a1/0x2b0 [ 292.254695][T10665] kobject_init_and_add+0x101/0x160 [ 292.259926][T10665] ? kobject_add_internal+0x990/0x990 [ 292.265325][T10665] ? vsnprintf+0x2c6/0x14f0 [ 292.269877][T10665] gfs2_sys_fs_add+0x18d/0x350 [ 292.274678][T10665] ? recover_store+0x170/0x170 [ 292.279628][T10665] ? snprintf+0xbb/0xf0 [ 292.283823][T10665] ? set_blocksize+0x24f/0x2c0 [ 292.288615][T10665] ? memcpy+0x35/0x50 [ 292.292643][T10665] gfs2_fill_super+0x1360/0x250a [ 292.297617][T10665] ? gfs2_reconfigure+0x1010/0x1010 [ 292.302817][T10665] ? snprintf+0xbb/0xf0 [ 292.307101][T10665] ? vsprintf+0x30/0x30 [ 292.311260][T10665] ? wait_for_completion+0x3c0/0x3c0 [ 292.316536][T10665] ? set_blocksize+0x24f/0x2c0 [ 292.321299][T10665] get_tree_bdev+0x3f8/0x710 [ 292.325894][T10665] ? gfs2_reconfigure+0x1010/0x1010 [ 292.331083][T10665] gfs2_get_tree+0x4a/0x270 [ 292.335578][T10665] vfs_get_tree+0x89/0x2f0 [ 292.339981][T10665] do_mount+0x1306/0x1a60 [ 292.344321][T10665] ? copy_mount_string+0x40/0x40 [ 292.349264][T10665] ? _copy_from_user+0x123/0x190 [ 292.354205][T10665] __x64_sys_mount+0x18f/0x230 [ 292.358970][T10665] do_syscall_64+0xf6/0x7d0 [ 292.363485][T10665] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 292.369369][T10665] RIP: 0033:0x45f29a [ 292.373267][T10665] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 4d 8c fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 2a 8c fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 292.392869][T10665] RSP: 002b:00007f2b476d4a68 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 292.401272][T10665] RAX: ffffffffffffffda RBX: 00007f2b476d56d4 RCX: 000000000045f29a [ 292.409229][T10665] RDX: 00007f2b476d4ae0 RSI: 0000000020000380 RDI: 00007f2b476d4b00 [ 292.417190][T10665] RBP: 000000000076bf00 R08: 00007f2b476d4b40 R09: 00007f2b476d4ae0 [ 292.425146][T10665] R10: 0000000000000000 R11: 0000000000000206 R12: 00000000ffffffff [ 292.433120][T10665] R13: 0000000000000bde R14: 00000000004cdfcc R15: 000000000076bf0c 18:43:47 executing program 5: statx(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x2000, 0x800, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0}) syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x9, 0x0, &(0x7f00000000c0), 0x200000, &(0x7f0000000240)={[{@part={'part', 0x3d, 0xa14}}, {@file_umask={'file_umask', 0x3d, 0x657936f8}}, {@type={'type', 0x3d, "6d6d69c8"}}], [{@fsmagic={'fsmagic', 0x3d, 0x6be0}}, {@obj_type={'obj_type', 0x3d, '@%\'em1\x00'}}, {@euid_lt={'euid<', r0}}, {@fsuuid={'fsuuid', 0x3d, {[0x32, 0x36, 0x65, 0x64, 0x36, 0x64, 0x39, 0x30], 0x2d, [0x66, 0x61, 0x65, 0x37], 0x2d, [0x64, 0x62, 0x64, 0x30], 0x2d, [0x36, 0x37, 0x64, 0x35], 0x2d, [0x61, 0x61, 0x31, 0x63, 0x5a, 0x38, 0x63, 0x36]}}}, {@dont_appraise='dont_appraise'}]}) r1 = openat$md(0xffffffffffffff9c, &(0x7f0000000080)='/dev/md0\x00', 0x0, 0x0) ioctl$BLKPG(r1, 0x40140921, 0x0) [ 292.463166][T10651] kobject_add_internal failed for . with -EEXIST, don't try to register things with the same name in the same directory. [ 292.477826][T10651] gfs2: fsid=.: error -17 adding sysfs files 18:43:47 executing program 0: socket$inet6(0xa, 0x6, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f00000000c0)={@mcast1, 0x800, 0x0, 0x103, 0x1}, 0x20) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f00000000c0)={@loopback, 0x800, 0x0, 0x103, 0x2}, 0x20) getsockopt$inet_sctp6_SCTP_EVENTS(r0, 0x84, 0xb, &(0x7f0000000040), &(0x7f0000000080)=0xe) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB='lockproto=lock_nolock,locktable=.']) 18:43:47 executing program 2: socket$inet6(0xa, 0x6, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f00000000c0)={@mcast1, 0x800, 0x0, 0x103, 0x1}, 0x20) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f00000000c0)={@loopback, 0x800, 0x0, 0x103, 0x2}, 0x20) getsockopt$inet_sctp6_SCTP_EVENTS(r0, 0x84, 0xb, &(0x7f0000000040), &(0x7f0000000080)=0xe) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$DRM_IOCTL_RM_CTX(0xffffffffffffffff, 0xc0086421, &(0x7f0000000300)={0x0, 0x1}) syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB='lockproto=lock_nolock,locktable=.']) 18:43:47 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000100)=0x1) ioctl$TCGETS(r0, 0x8924, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000100)=0x1) ioctl$TCGETS(r1, 0x8924, 0x0) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x400101, 0x0) ioctl$TIOCSETD(r2, 0x5423, &(0x7f0000000100)=0x1) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x20008000004001fe) [ 292.707927][T10691] hfs: unable to parse mount options 18:43:47 executing program 5: statx(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x2000, 0x800, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0}) syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x9, 0x0, &(0x7f00000000c0), 0x200000, &(0x7f0000000240)={[{@part={'part', 0x3d, 0xa14}}, {@file_umask={'file_umask', 0x3d, 0x657936f8}}, {@type={'type', 0x3d, "6d6d69c8"}}], [{@fsmagic={'fsmagic', 0x3d, 0x6be0}}, {@obj_type={'obj_type', 0x3d, '@%\'em1\x00'}}, {@euid_lt={'euid<', r0}}, {@fsuuid={'fsuuid', 0x3d, {[0x32, 0x36, 0x65, 0x64, 0x36, 0x64, 0x39, 0x30], 0x2d, [0x66, 0x61, 0x65, 0x37], 0x2d, [0x64, 0x62, 0x64, 0x30], 0x2d, [0x36, 0x37, 0x64, 0x35], 0x2d, [0x61, 0x61, 0x31, 0x63, 0x5a, 0x38, 0x63, 0x36]}}}, {@dont_appraise='dont_appraise'}]}) r1 = openat$md(0xffffffffffffff9c, &(0x7f0000000080)='/dev/md0\x00', 0x0, 0x0) ioctl$BLKPG(r1, 0x40140921, 0x0) [ 292.868847][T10703] gfs2: fsid=.: Trying to join cluster "lock_nolock", "." 18:43:47 executing program 5: statx(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x2000, 0x800, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0}) syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x9, 0x0, &(0x7f00000000c0), 0x200000, &(0x7f0000000240)={[{@part={'part', 0x3d, 0xa14}}, {@file_umask={'file_umask', 0x3d, 0x657936f8}}, {@type={'type', 0x3d, "6d6d69c8"}}], [{@fsmagic={'fsmagic', 0x3d, 0x6be0}}, {@obj_type={'obj_type', 0x3d, '@%\'em1\x00'}}, {@euid_lt={'euid<', r0}}, {@fsuuid={'fsuuid', 0x3d, {[0x32, 0x36, 0x65, 0x64, 0x36, 0x64, 0x39, 0x30], 0x2d, [0x66, 0x61, 0x65, 0x37], 0x2d, [0x64, 0x62, 0x64, 0x30], 0x2d, [0x36, 0x37, 0x64, 0x35], 0x2d, [0x61, 0x61, 0x31, 0x63, 0x5a, 0x38, 0x63, 0x36]}}}, {@dont_appraise='dont_appraise'}]}) r1 = openat$md(0xffffffffffffff9c, &(0x7f0000000080)='/dev/md0\x00', 0x0, 0x0) ioctl$BLKPG(r1, 0x40140921, 0x0) [ 292.913741][T10712] hfs: unable to parse mount options [ 292.944711][T10698] sysfs: cannot create duplicate filename '/fs/gfs2/.' [ 292.974601][T10703] gfs2: fsid=.: Now mounting FS... [ 293.008847][T10698] CPU: 1 PID: 10698 Comm: syz-executor.0 Not tainted 5.6.0-rc7-syzkaller #0 [ 293.017561][T10698] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 293.027626][T10698] Call Trace: [ 293.030945][T10698] dump_stack+0x188/0x20d [ 293.035319][T10698] sysfs_warn_dup.cold+0x1c/0x2d [ 293.040282][T10698] sysfs_create_dir_ns+0x233/0x290 [ 293.045426][T10698] ? sysfs_create_mount_point+0xb0/0xb0 [ 293.050995][T10698] ? rwlock_bug.part.0+0x90/0x90 [ 293.055967][T10698] ? do_raw_spin_unlock+0x171/0x260 [ 293.061299][T10698] kobject_add_internal+0x2ca/0x990 [ 293.066518][T10698] ? kfree+0x1a1/0x2b0 [ 293.070620][T10698] kobject_init_and_add+0x101/0x160 [ 293.075843][T10698] ? kobject_add_internal+0x990/0x990 [ 293.081242][T10698] ? vsnprintf+0x2c6/0x14f0 [ 293.085804][T10698] gfs2_sys_fs_add+0x18d/0x350 [ 293.090588][T10698] ? recover_store+0x170/0x170 [ 293.095378][T10698] ? snprintf+0xbb/0xf0 [ 293.099565][T10698] ? set_blocksize+0x24f/0x2c0 [ 293.104349][T10698] ? memcpy+0x35/0x50 [ 293.108358][T10698] gfs2_fill_super+0x1360/0x250a [ 293.113334][T10698] ? gfs2_reconfigure+0x1010/0x1010 [ 293.118558][T10698] ? smp_apic_timer_interrupt+0x1b6/0x600 [ 293.124292][T10698] ? retint_kernel+0x2b/0x2b [ 293.128900][T10698] ? set_blocksize+0x24f/0x2c0 [ 293.133684][T10698] get_tree_bdev+0x3f8/0x710 [ 293.138294][T10698] ? gfs2_reconfigure+0x1010/0x1010 [ 293.143514][T10698] gfs2_get_tree+0x4a/0x270 [ 293.146435][T10665] kobject_add_internal failed for . with -EEXIST, don't try to register things with the same name in the same directory. [ 293.148034][T10698] vfs_get_tree+0x89/0x2f0 [ 293.148054][T10698] do_mount+0x1306/0x1a60 [ 293.148077][T10698] ? copy_mount_string+0x40/0x40 [ 293.165940][T10665] gfs2: fsid=.: error -17 adding sysfs files [ 293.169417][T10698] ? _copy_from_user+0x123/0x190 [ 293.169453][T10698] __x64_sys_mount+0x18f/0x230 [ 293.190107][T10698] do_syscall_64+0xf6/0x7d0 [ 293.194650][T10698] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 293.200556][T10698] RIP: 0033:0x45f29a [ 293.204474][T10698] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 4d 8c fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 2a 8c fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 293.224127][T10698] RSP: 002b:00007f9b69b9ca68 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 293.232555][T10698] RAX: ffffffffffffffda RBX: 00007f9b69b9d6d4 RCX: 000000000045f29a [ 293.240540][T10698] RDX: 00007f9b69b9cae0 RSI: 0000000020000380 RDI: 00007f9b69b9cb00 [ 293.248523][T10698] RBP: 000000000076bf00 R08: 00007f9b69b9cb40 R09: 00007f9b69b9cae0 [ 293.256513][T10698] R10: 0000000000000000 R11: 0000000000000206 R12: 00000000ffffffff [ 293.264598][T10698] R13: 0000000000000bde R14: 00000000004cdfcc R15: 000000000076bf0c [ 293.293244][T10703] gfs2: not a GFS2 filesystem [ 293.303530][T10703] gfs2: fsid=.: can't read superblock [ 293.315081][T10703] gfs2: fsid=.: can't read superblock: -22 [ 293.357767][T10723] hfs: unable to parse mount options [ 293.433531][T10698] kobject_add_internal failed for . with -EEXIST, don't try to register things with the same name in the same directory. [ 293.446816][T10698] gfs2: fsid=.: error -17 adding sysfs files 18:43:48 executing program 3: ioctl$TIOCSPTLCK(0xffffffffffffffff, 0x40045431, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000380)) r2 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$TCSETAW(0xffffffffffffffff, 0x5407, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1000, &(0x7f0000000000/0x1000)=nil}) ioctl$KVM_SET_REGS(r3, 0x4090ae82, &(0x7f00000001c0)={[0x0, 0x0, 0x0, 0x2000020, 0xffffffffffffffff, 0x0, 0x4cb]}) ioctl$KVM_RUN(r3, 0xae80, 0x0) r4 = socket$inet6(0xa, 0x2, 0x0) sendfile(r4, 0xffffffffffffffff, &(0x7f0000000040), 0x0) r5 = add_key$user(&(0x7f0000000040)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)='X', 0x1, 0xfffffffffffffffe) keyctl$update(0x2, r5, &(0x7f00000006c0)="c0ca1cdbaa1aedbbed80dddaa28e15b9449e2e82cca4244c40ffd0fd4e6631c7d3d86e1339de17344340b02dd527f2d8b3ae6c1db3594e657da33c3ec668f143974a65753472df5319a6b83e1e86b8f2666c61a2e700d1c1e0ae1fc52494bd4885a5c64e9007d39fa11313805290dd6342f9775f01a02ec88f6bee22f25a377a9b143abba1264586d2779088006d5f9be82b00f10287031623f73470264cc5897f18f357aad6deb3883da88ae2266664933785a3ce72bb224a441437ea93c217", 0xc0) r6 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x9a, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000080)={r6, r5, r6}, &(0x7f00000009c0)=""/240, 0x4a3, 0x0) keyctl$dh_compute(0x17, &(0x7f0000000180)={0x0, r5}, &(0x7f0000000280)=""/145, 0x91, 0x0) openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000000)='/proc/capi/capi20\x00', 0x0, 0x0) 18:43:48 executing program 1: socket$inet6(0xa, 0x6, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f00000000c0)={@mcast1, 0x800, 0x0, 0x103, 0x1}, 0x20) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f00000000c0)={@loopback, 0x800, 0x0, 0x103, 0x2}, 0x20) getsockopt$inet_sctp6_SCTP_EVENTS(r0, 0x84, 0xb, &(0x7f0000000040), &(0x7f0000000080)=0xe) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$DRM_IOCTL_RM_CTX(0xffffffffffffffff, 0xc0086421, &(0x7f0000000300)={0x0, 0x1}) syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB='lockproto=lock_nolock,locktable=.']) 18:43:48 executing program 5: statx(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x2000, 0x800, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0}) syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x9, 0x0, &(0x7f00000000c0), 0x200000, &(0x7f0000000240)={[{@part={'part', 0x3d, 0xa14}}, {@file_umask={'file_umask', 0x3d, 0x657936f8}}, {@type={'type', 0x3d, "6d6d69c8"}}], [{@fsmagic={'fsmagic', 0x3d, 0x6be0}}, {@obj_type={'obj_type', 0x3d, '@%\'em1\x00'}}, {@euid_lt={'euid<', r0}}, {@fsuuid={'fsuuid', 0x3d, {[0x32, 0x36, 0x65, 0x64, 0x36, 0x64, 0x39, 0x30], 0x2d, [0x66, 0x61, 0x65, 0x37], 0x2d, [0x64, 0x62, 0x64, 0x30], 0x2d, [0x36, 0x37, 0x64, 0x35], 0x2d, [0x61, 0x61, 0x31, 0x63, 0x5a, 0x38, 0x63, 0x36]}}}, {@dont_appraise='dont_appraise'}]}) ioctl$BLKALIGNOFF(0xffffffffffffffff, 0x127a, &(0x7f00000000c0)) ioctl$BLKPG(0xffffffffffffffff, 0x40140921, 0x0) 18:43:48 executing program 0: socket$inet6(0xa, 0x6, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f00000000c0)={@mcast1, 0x800, 0x0, 0x103, 0x1}, 0x20) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f00000000c0)={@loopback, 0x800, 0x0, 0x103, 0x2}, 0x20) getsockopt$inet_sctp6_SCTP_EVENTS(r0, 0x84, 0xb, &(0x7f0000000040), &(0x7f0000000080)=0xe) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB='lockproto=lock_nolock,locktable=.']) 18:43:48 executing program 2: socket$inet6(0xa, 0x6, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f00000000c0)={@mcast1, 0x800, 0x0, 0x103, 0x1}, 0x20) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f00000000c0)={@loopback, 0x800, 0x0, 0x103, 0x2}, 0x20) getsockopt$inet_sctp6_SCTP_EVENTS(r0, 0x84, 0xb, &(0x7f0000000040), &(0x7f0000000080)=0xe) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$DRM_IOCTL_RM_CTX(0xffffffffffffffff, 0xc0086421, &(0x7f0000000300)={0x0, 0x1}) syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB='lockproto=lock_nolock,locktable=.']) [ 293.657017][T10757] gfs2: fsid=.: Trying to join cluster "lock_nolock", "." [ 293.675403][T10762] hfs: unable to parse mount options 18:43:48 executing program 5: statx(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x2000, 0x800, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0}) syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x9, 0x0, &(0x7f00000000c0), 0x200000, &(0x7f0000000240)={[{@part={'part', 0x3d, 0xa14}}, {@file_umask={'file_umask', 0x3d, 0x657936f8}}, {@type={'type', 0x3d, "6d6d69c8"}}], [{@fsmagic={'fsmagic', 0x3d, 0x6be0}}, {@obj_type={'obj_type', 0x3d, '@%\'em1\x00'}}, {@euid_lt={'euid<', r0}}, {@fsuuid={'fsuuid', 0x3d, {[0x32, 0x36, 0x65, 0x64, 0x36, 0x64, 0x39, 0x30], 0x2d, [0x66, 0x61, 0x65, 0x37], 0x2d, [0x64, 0x62, 0x64, 0x30], 0x2d, [0x36, 0x37, 0x64, 0x35], 0x2d, [0x61, 0x61, 0x31, 0x63, 0x5a, 0x38, 0x63, 0x36]}}}, {@dont_appraise='dont_appraise'}]}) ioctl$BLKALIGNOFF(0xffffffffffffffff, 0x127a, &(0x7f00000000c0)) ioctl$BLKPG(0xffffffffffffffff, 0x40140921, 0x0) [ 293.697660][T10757] gfs2: fsid=.: Now mounting FS... [ 293.711401][T10757] gfs2: not a GFS2 filesystem [ 293.719782][T10757] gfs2: fsid=.: can't read superblock [ 293.740219][T10757] gfs2: fsid=.: can't read superblock: -22 18:43:48 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000100)=0x1) ioctl$TCGETS(r0, 0x8924, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000100)=0x1) ioctl$TCGETS(r1, 0x8924, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x400101, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x20008000004001fe) [ 293.865372][T10768] gfs2: fsid=.: Trying to join cluster "lock_nolock", "." [ 293.880979][T10768] gfs2: fsid=.: Now mounting FS... [ 293.893729][T10774] sysfs: cannot create duplicate filename '/fs/gfs2/.' [ 293.898111][T10768] gfs2: not a GFS2 filesystem [ 293.900711][T10774] CPU: 1 PID: 10774 Comm: syz-executor.2 Not tainted 5.6.0-rc7-syzkaller #0 [ 293.900720][T10774] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 293.900726][T10774] Call Trace: [ 293.900752][T10774] dump_stack+0x188/0x20d [ 293.900779][T10774] sysfs_warn_dup.cold+0x1c/0x2d [ 293.900800][T10774] sysfs_create_dir_ns+0x233/0x290 [ 293.911259][T10781] hfs: unable to parse mount options [ 293.914195][T10774] ? sysfs_create_mount_point+0xb0/0xb0 [ 293.914216][T10774] ? rwlock_bug.part.0+0x90/0x90 [ 293.914238][T10774] ? rcu_read_lock_any_held.part.0+0x50/0x50 [ 293.914255][T10774] ? do_raw_spin_unlock+0x171/0x260 [ 293.914276][T10774] kobject_add_internal+0x2ca/0x990 [ 293.914291][T10774] ? kfree+0x1a1/0x2b0 [ 293.914316][T10774] kobject_init_and_add+0x101/0x160 [ 293.924744][T10768] gfs2: fsid=.: can't read superblock [ 293.927693][T10774] ? kobject_add_internal+0x990/0x990 [ 293.927719][T10774] ? vsnprintf+0x2c6/0x14f0 [ 293.927758][T10774] gfs2_sys_fs_add+0x18d/0x350 [ 293.927775][T10774] ? recover_store+0x170/0x170 [ 293.927795][T10774] ? snprintf+0xbb/0xf0 [ 293.932393][T10768] gfs2: fsid=.: can't read superblock: -22 [ 293.937195][T10774] ? set_blocksize+0x24f/0x2c0 [ 293.937213][T10774] ? memcpy+0x35/0x50 [ 293.937237][T10774] gfs2_fill_super+0x1360/0x250a [ 293.937276][T10774] ? gfs2_reconfigure+0x1010/0x1010 [ 293.937294][T10774] ? snprintf+0xbb/0xf0 [ 293.937309][T10774] ? vsprintf+0x30/0x30 [ 293.937335][T10774] ? wait_for_completion+0x3c0/0x3c0 [ 293.937350][T10774] ? set_blocksize+0x24f/0x2c0 [ 293.937378][T10774] get_tree_bdev+0x3f8/0x710 [ 293.937397][T10774] ? gfs2_reconfigure+0x1010/0x1010 [ 294.066177][T10774] gfs2_get_tree+0x4a/0x270 [ 294.070740][T10774] vfs_get_tree+0x89/0x2f0 [ 294.075175][T10774] do_mount+0x1306/0x1a60 [ 294.079533][T10774] ? copy_mount_string+0x40/0x40 [ 294.084510][T10774] ? _copy_from_user+0x123/0x190 [ 294.089486][T10774] __x64_sys_mount+0x18f/0x230 [ 294.094283][T10774] do_syscall_64+0xf6/0x7d0 [ 294.098807][T10774] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 294.104704][T10774] RIP: 0033:0x45f29a [ 294.108614][T10774] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 4d 8c fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 2a 8c fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 294.128505][T10774] RSP: 002b:00007f004a751a68 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 294.136935][T10774] RAX: ffffffffffffffda RBX: 00007f004a7526d4 RCX: 000000000045f29a [ 294.144919][T10774] RDX: 00007f004a751ae0 RSI: 0000000020000380 RDI: 00007f004a751b00 [ 294.152911][T10774] RBP: 000000000076bf00 R08: 00007f004a751b40 R09: 00007f004a751ae0 18:43:49 executing program 1: socket$inet6(0xa, 0x6, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f00000000c0)={@mcast1, 0x800, 0x0, 0x103, 0x1}, 0x20) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f00000000c0)={@loopback, 0x800, 0x0, 0x103, 0x2}, 0x20) getsockopt$inet_sctp6_SCTP_EVENTS(r0, 0x84, 0xb, &(0x7f0000000040), &(0x7f0000000080)=0xe) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB='lockproto=lock_nolock,locktable=.']) [ 294.160893][T10774] R10: 0000000000000000 R11: 0000000000000206 R12: 00000000ffffffff [ 294.168885][T10774] R13: 0000000000000bde R14: 00000000004cdfcc R15: 000000000076bf0c 18:43:49 executing program 5: statx(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x2000, 0x800, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0}) syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x9, 0x0, &(0x7f00000000c0), 0x200000, &(0x7f0000000240)={[{@part={'part', 0x3d, 0xa14}}, {@file_umask={'file_umask', 0x3d, 0x657936f8}}, {@type={'type', 0x3d, "6d6d69c8"}}], [{@fsmagic={'fsmagic', 0x3d, 0x6be0}}, {@obj_type={'obj_type', 0x3d, '@%\'em1\x00'}}, {@euid_lt={'euid<', r0}}, {@fsuuid={'fsuuid', 0x3d, {[0x32, 0x36, 0x65, 0x64, 0x36, 0x64, 0x39, 0x30], 0x2d, [0x66, 0x61, 0x65, 0x37], 0x2d, [0x64, 0x62, 0x64, 0x30], 0x2d, [0x36, 0x37, 0x64, 0x35], 0x2d, [0x61, 0x61, 0x31, 0x63, 0x5a, 0x38, 0x63, 0x36]}}}, {@dont_appraise='dont_appraise'}]}) ioctl$BLKALIGNOFF(0xffffffffffffffff, 0x127a, &(0x7f00000000c0)) ioctl$BLKPG(0xffffffffffffffff, 0x40140921, 0x0) [ 294.212922][T10774] kobject_add_internal failed for . with -EEXIST, don't try to register things with the same name in the same directory. [ 294.225734][T10774] gfs2: fsid=.: error -17 adding sysfs files 18:43:49 executing program 0: socket$inet6(0xa, 0x6, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f00000000c0)={@mcast1, 0x800, 0x0, 0x103, 0x1}, 0x20) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f00000000c0)={@loopback, 0x800, 0x0, 0x103, 0x2}, 0x20) getsockopt$inet_sctp6_SCTP_EVENTS(r0, 0x84, 0xb, &(0x7f0000000040), &(0x7f0000000080)=0xe) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB='lockproto=lock_nolock,locktable=.']) [ 294.378148][T10803] hfs: unable to parse mount options 18:43:49 executing program 2: socket$inet6(0xa, 0x6, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f00000000c0)={@mcast1, 0x800, 0x0, 0x103, 0x1}, 0x20) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f00000000c0)={@loopback, 0x800, 0x0, 0x103, 0x2}, 0x20) getsockopt$inet_sctp6_SCTP_EVENTS(r0, 0x84, 0xb, &(0x7f0000000040), &(0x7f0000000080)=0xe) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB='lockproto=lock_nolock,locktable=.']) 18:43:49 executing program 5: statx(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x2000, 0x800, &(0x7f0000000140)) r0 = openat$md(0xffffffffffffff9c, &(0x7f0000000080)='/dev/md0\x00', 0x0, 0x0) ioctl$BLKALIGNOFF(r0, 0x127a, &(0x7f00000000c0)) ioctl$BLKPG(r0, 0x40140921, 0x0) [ 294.555777][T10807] gfs2: fsid=.: Trying to join cluster "lock_nolock", "." [ 294.567825][T10807] gfs2: fsid=.: Now mounting FS... [ 294.589135][T10807] gfs2: not a GFS2 filesystem [ 294.590665][T10812] sysfs: cannot create duplicate filename '/fs/gfs2/.' [ 294.596844][T10807] gfs2: fsid=.: can't read superblock [ 294.611905][T10812] CPU: 1 PID: 10812 Comm: syz-executor.0 Not tainted 5.6.0-rc7-syzkaller #0 [ 294.618518][T10807] gfs2: fsid=.: can't read superblock: -22 [ 294.620616][T10812] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 294.620623][T10812] Call Trace: [ 294.620648][T10812] dump_stack+0x188/0x20d [ 294.620675][T10812] sysfs_warn_dup.cold+0x1c/0x2d [ 294.620695][T10812] sysfs_create_dir_ns+0x233/0x290 [ 294.620715][T10812] ? sysfs_create_mount_point+0xb0/0xb0 [ 294.620732][T10812] ? rwlock_bug.part.0+0x90/0x90 [ 294.620752][T10812] ? rcu_read_lock_any_held.part.0+0x50/0x50 [ 294.670824][T10812] ? do_raw_spin_unlock+0x171/0x260 [ 294.676052][T10812] kobject_add_internal+0x2ca/0x990 [ 294.681265][T10812] ? kfree+0x1a1/0x2b0 [ 294.685463][T10812] kobject_init_and_add+0x101/0x160 [ 294.690886][T10812] ? kobject_add_internal+0x990/0x990 [ 294.696412][T10812] gfs2_sys_fs_add+0x18d/0x350 [ 294.701209][T10812] ? recover_store+0x170/0x170 [ 294.706008][T10812] ? snprintf+0xbb/0xf0 [ 294.710180][T10812] ? smp_apic_timer_interrupt+0xd0/0x600 [ 294.715866][T10812] gfs2_fill_super+0x1360/0x250a [ 294.720831][T10812] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 294.726325][T10812] ? gfs2_reconfigure+0x1010/0x1010 [ 294.731545][T10812] ? set_blocksize+0x4a/0x2c0 [ 294.736246][T10812] ? set_blocksize+0x58/0x2c0 [ 294.741131][T10812] ? __sanitizer_cov_trace_pc+0x22/0x50 [ 294.746718][T10812] ? set_blocksize+0x24f/0x2c0 [ 294.751521][T10812] get_tree_bdev+0x3f8/0x710 [ 294.756127][T10812] ? gfs2_reconfigure+0x1010/0x1010 [ 294.761346][T10812] gfs2_get_tree+0x4a/0x270 [ 294.765875][T10812] vfs_get_tree+0x89/0x2f0 [ 294.770345][T10812] do_mount+0x1306/0x1a60 [ 294.774731][T10812] ? copy_mount_string+0x40/0x40 [ 294.779717][T10812] ? _copy_from_user+0x123/0x190 [ 294.784946][T10812] __x64_sys_mount+0x18f/0x230 [ 294.789745][T10812] do_syscall_64+0xf6/0x7d0 [ 294.794280][T10812] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 294.800189][T10812] RIP: 0033:0x45f29a [ 294.804095][T10812] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 4d 8c fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 2a 8c fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 294.823709][T10812] RSP: 002b:00007f9b69b9ca68 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 294.832136][T10812] RAX: ffffffffffffffda RBX: 00007f9b69b9d6d4 RCX: 000000000045f29a [ 294.840151][T10812] RDX: 00007f9b69b9cae0 RSI: 0000000020000380 RDI: 00007f9b69b9cb00 [ 294.848157][T10812] RBP: 000000000076bf00 R08: 00007f9b69b9cb40 R09: 00007f9b69b9cae0 [ 294.856147][T10812] R10: 0000000000000000 R11: 0000000000000206 R12: 00000000ffffffff [ 294.864133][T10812] R13: 0000000000000bde R14: 00000000004cdfcc R15: 000000000076bf0c [ 294.889817][T10812] kobject_add_internal failed for . with -EEXIST, don't try to register things with the same name in the same directory. [ 294.908139][T10812] gfs2: fsid=.: error -17 adding sysfs files [ 295.125750][T10823] gfs2: fsid=.: Trying to join cluster "lock_nolock", "." [ 295.186800][T10823] gfs2: fsid=.: Now mounting FS... [ 295.207583][T10823] gfs2: not a GFS2 filesystem [ 295.218188][T10823] gfs2: fsid=.: can't read superblock [ 295.232076][T10823] gfs2: fsid=.: can't read superblock: -22 18:43:51 executing program 3: ioctl$TIOCSPTLCK(0xffffffffffffffff, 0x40045431, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000380)) r2 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$TCSETAW(0xffffffffffffffff, 0x5407, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1000, &(0x7f0000000000/0x1000)=nil}) ioctl$KVM_SET_REGS(r3, 0x4090ae82, &(0x7f00000001c0)={[0x0, 0x0, 0x0, 0x2000020, 0xffffffffffffffff, 0x0, 0x4cb]}) ioctl$KVM_RUN(r3, 0xae80, 0x0) r4 = socket$inet6(0xa, 0x2, 0x0) sendfile(r4, 0xffffffffffffffff, &(0x7f0000000040), 0x0) r5 = add_key$user(&(0x7f0000000040)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)='X', 0x1, 0xfffffffffffffffe) keyctl$update(0x2, r5, &(0x7f00000006c0)="c0ca1cdbaa1aedbbed80dddaa28e15b9449e2e82cca4244c40ffd0fd4e6631c7d3d86e1339de17344340b02dd527f2d8b3ae6c1db3594e657da33c3ec668f143974a65753472df5319a6b83e1e86b8f2666c61a2e700d1c1e0ae1fc52494bd4885a5c64e9007d39fa11313805290dd6342f9775f01a02ec88f6bee22f25a377a9b143abba1264586d2779088006d5f9be82b00f10287031623f73470264cc5897f18f357aad6deb3883da88ae2266664933785a3ce72bb224a441437ea93c217", 0xc0) r6 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x9a, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000080)={r6, r5, r6}, &(0x7f00000009c0)=""/240, 0x4a3, 0x0) keyctl$dh_compute(0x17, &(0x7f0000000180)={0x0, r5}, &(0x7f0000000280)=""/145, 0x91, 0x0) 18:43:51 executing program 5: statx(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x2000, 0x800, &(0x7f0000000140)) r0 = openat$md(0xffffffffffffff9c, &(0x7f0000000080)='/dev/md0\x00', 0x0, 0x0) ioctl$BLKALIGNOFF(r0, 0x127a, &(0x7f00000000c0)) ioctl$BLKPG(r0, 0x40140921, 0x0) 18:43:51 executing program 0: socket$inet6(0xa, 0x6, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f00000000c0)={@mcast1, 0x800, 0x0, 0x103, 0x1}, 0x20) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f00000000c0)={@loopback, 0x800, 0x0, 0x103, 0x2}, 0x20) getsockopt$inet_sctp6_SCTP_EVENTS(r0, 0x84, 0xb, &(0x7f0000000040), &(0x7f0000000080)=0xe) ioctl$DRM_IOCTL_RM_CTX(0xffffffffffffffff, 0xc0086421, &(0x7f0000000300)={0x0, 0x1}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB='lockproto=lock_nolock,locktable=.']) 18:43:51 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000100)=0x1) ioctl$TCGETS(r0, 0x8924, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000100)=0x1) ioctl$TCGETS(r1, 0x8924, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x400101, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x20008000004001fe) 18:43:51 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000100)=0x1) ioctl$TCGETS(r0, 0x8924, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000100)=0x1) ioctl$TCGETS(r1, 0x8924, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x20008000004001fe) 18:43:51 executing program 2: socket$inet6(0xa, 0x6, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f00000000c0)={@mcast1, 0x800, 0x0, 0x103, 0x1}, 0x20) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f00000000c0)={@loopback, 0x800, 0x0, 0x103, 0x2}, 0x20) getsockopt$inet_sctp6_SCTP_EVENTS(r0, 0x84, 0xb, &(0x7f0000000040), &(0x7f0000000080)=0xe) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB='lockproto=lock_nolock,locktable=.']) 18:43:52 executing program 5: statx(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x2000, 0x800, &(0x7f0000000140)) r0 = openat$md(0xffffffffffffff9c, &(0x7f0000000080)='/dev/md0\x00', 0x0, 0x0) ioctl$BLKALIGNOFF(r0, 0x127a, &(0x7f00000000c0)) ioctl$BLKPG(r0, 0x40140921, 0x0) [ 297.245574][T10869] gfs2: fsid=.: Trying to join cluster "lock_nolock", "." [ 297.265177][T10874] sysfs: cannot create duplicate filename '/fs/gfs2/.' [ 297.273061][T10869] gfs2: fsid=.: Now mounting FS... [ 297.280558][T10874] CPU: 0 PID: 10874 Comm: syz-executor.2 Not tainted 5.6.0-rc7-syzkaller #0 [ 297.289266][T10874] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 297.299331][T10874] Call Trace: [ 297.302649][T10874] dump_stack+0x188/0x20d [ 297.307017][T10874] sysfs_warn_dup.cold+0x1c/0x2d [ 297.311983][T10874] sysfs_create_dir_ns+0x233/0x290 [ 297.317120][T10874] ? sysfs_create_mount_point+0xb0/0xb0 [ 297.322693][T10874] ? rwlock_bug.part.0+0x90/0x90 [ 297.327668][T10874] ? do_raw_spin_unlock+0x171/0x260 [ 297.332900][T10874] kobject_add_internal+0x2ca/0x990 [ 297.338415][T10874] ? kfree+0x1a1/0x2b0 [ 297.342519][T10874] kobject_init_and_add+0x101/0x160 [ 297.347768][T10874] ? kobject_add_internal+0x990/0x990 [ 297.353171][T10874] ? vsnprintf+0x2c6/0x14f0 [ 297.357742][T10874] gfs2_sys_fs_add+0x18d/0x350 [ 297.362532][T10874] ? recover_store+0x170/0x170 [ 297.367442][T10874] ? snprintf+0xbb/0xf0 [ 297.371628][T10874] ? set_blocksize+0x24f/0x2c0 [ 297.376419][T10874] ? memcpy+0x35/0x50 [ 297.380431][T10874] gfs2_fill_super+0x1360/0x250a [ 297.385406][T10874] ? gfs2_reconfigure+0x1010/0x1010 [ 297.390627][T10874] ? snprintf+0xbb/0xf0 [ 297.394803][T10874] ? vsprintf+0x30/0x30 [ 297.398984][T10874] ? wait_for_completion+0x3c0/0x3c0 [ 297.404291][T10874] ? set_blocksize+0x24f/0x2c0 [ 297.409092][T10874] get_tree_bdev+0x3f8/0x710 [ 297.413702][T10874] ? gfs2_reconfigure+0x1010/0x1010 [ 297.418932][T10874] gfs2_get_tree+0x4a/0x270 [ 297.423608][T10874] vfs_get_tree+0x89/0x2f0 [ 297.428064][T10874] do_mount+0x1306/0x1a60 [ 297.432535][T10874] ? copy_mount_string+0x40/0x40 [ 297.437596][T10874] ? _copy_from_user+0x123/0x190 [ 297.442576][T10874] __x64_sys_mount+0x18f/0x230 [ 297.447375][T10874] do_syscall_64+0xf6/0x7d0 [ 297.451904][T10874] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 297.457928][T10874] RIP: 0033:0x45f29a [ 297.461843][T10874] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 4d 8c fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 2a 8c fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 297.481634][T10874] RSP: 002b:00007f004a751a68 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 297.490062][T10874] RAX: ffffffffffffffda RBX: 00007f004a7526d4 RCX: 000000000045f29a 18:43:52 executing program 5: syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x9, 0x0, &(0x7f00000000c0), 0x200000, &(0x7f0000000240)={[{@part={'part', 0x3d, 0xa14}}, {@file_umask={'file_umask', 0x3d, 0x657936f8}}, {@type={'type', 0x3d, "6d6d69c8"}}], [{@fsmagic={'fsmagic', 0x3d, 0x6be0}}, {@obj_type={'obj_type', 0x3d, '@%\'em1\x00'}}, {@euid_lt={'euid<'}}, {@fsuuid={'fsuuid', 0x3d, {[0x32, 0x36, 0x65, 0x64, 0x36, 0x64, 0x39, 0x30], 0x2d, [0x66, 0x61, 0x65, 0x37], 0x2d, [0x64, 0x62, 0x64, 0x30], 0x2d, [0x36, 0x37, 0x64, 0x35], 0x2d, [0x61, 0x61, 0x31, 0x63, 0x5a, 0x38, 0x63, 0x36]}}}, {@dont_appraise='dont_appraise'}]}) r0 = openat$md(0xffffffffffffff9c, &(0x7f0000000080)='/dev/md0\x00', 0x0, 0x0) ioctl$BLKALIGNOFF(r0, 0x127a, &(0x7f00000000c0)) ioctl$BLKPG(r0, 0x40140921, 0x0) [ 297.498049][T10874] RDX: 00007f004a751ae0 RSI: 0000000020000380 RDI: 00007f004a751b00 [ 297.506039][T10874] RBP: 000000000076bf00 R08: 00007f004a751b40 R09: 00007f004a751ae0 [ 297.514032][T10874] R10: 0000000000000000 R11: 0000000000000206 R12: 00000000ffffffff [ 297.522119][T10874] R13: 0000000000000bde R14: 00000000004cdfcc R15: 000000000076bf0c 18:43:52 executing program 5: syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x9, 0x0, &(0x7f00000000c0), 0x200000, &(0x7f0000000240)={[{@part={'part', 0x3d, 0xa14}}, {@file_umask={'file_umask', 0x3d, 0x657936f8}}, {@type={'type', 0x3d, "6d6d69c8"}}], [{@fsmagic={'fsmagic', 0x3d, 0x6be0}}, {@obj_type={'obj_type', 0x3d, '@%\'em1\x00'}}, {@euid_lt={'euid<'}}, {@fsuuid={'fsuuid', 0x3d, {[0x32, 0x36, 0x65, 0x64, 0x36, 0x64, 0x39, 0x30], 0x2d, [0x66, 0x61, 0x65, 0x37], 0x2d, [0x64, 0x62, 0x64, 0x30], 0x2d, [0x36, 0x37, 0x64, 0x35], 0x2d, [0x61, 0x61, 0x31, 0x63, 0x5a, 0x38, 0x63, 0x36]}}}, {@dont_appraise='dont_appraise'}]}) r0 = openat$md(0xffffffffffffff9c, &(0x7f0000000080)='/dev/md0\x00', 0x0, 0x0) ioctl$BLKALIGNOFF(r0, 0x127a, &(0x7f00000000c0)) ioctl$BLKPG(r0, 0x40140921, 0x0) [ 297.560787][T10869] gfs2: not a GFS2 filesystem [ 297.576654][T10911] hfs: unable to parse mount options [ 297.580977][T10869] gfs2: fsid=.: can't read superblock [ 297.585227][T10874] kobject_add_internal failed for . with -EEXIST, don't try to register things with the same name in the same directory. [ 297.605093][T10869] gfs2: fsid=.: can't read superblock: -22 [ 297.621854][T10874] gfs2: fsid=.: error -17 adding sysfs files 18:43:52 executing program 0: socket$inet6(0xa, 0x6, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f00000000c0)={@mcast1, 0x800, 0x0, 0x103, 0x1}, 0x20) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f00000000c0)={@loopback, 0x800, 0x0, 0x103, 0x2}, 0x20) getsockopt$inet_sctp6_SCTP_EVENTS(r0, 0x84, 0xb, &(0x7f0000000040), &(0x7f0000000080)=0xe) ioctl$DRM_IOCTL_RM_CTX(0xffffffffffffffff, 0xc0086421, &(0x7f0000000300)={0x0, 0x1}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB='lockproto=lock_nolock,locktable=.']) 18:43:52 executing program 2: socket$inet6(0xa, 0x6, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f00000000c0)={@mcast1, 0x800, 0x0, 0x103, 0x1}, 0x20) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f00000000c0)={@loopback, 0x800, 0x0, 0x103, 0x2}, 0x20) getsockopt$inet_sctp6_SCTP_EVENTS(r0, 0x84, 0xb, &(0x7f0000000040), &(0x7f0000000080)=0xe) ioctl$DRM_IOCTL_RM_CTX(0xffffffffffffffff, 0xc0086421, &(0x7f0000000300)={0x0, 0x1}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB='lockproto=lock_nolock,locktable=.']) [ 298.021488][T10925] hfs: unable to parse mount options 18:43:52 executing program 5: syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x9, 0x0, &(0x7f00000000c0), 0x200000, &(0x7f0000000240)={[{@part={'part', 0x3d, 0xa14}}, {@file_umask={'file_umask', 0x3d, 0x657936f8}}, {@type={'type', 0x3d, "6d6d69c8"}}], [{@fsmagic={'fsmagic', 0x3d, 0x6be0}}, {@obj_type={'obj_type', 0x3d, '@%\'em1\x00'}}, {@euid_lt={'euid<'}}, {@fsuuid={'fsuuid', 0x3d, {[0x32, 0x36, 0x65, 0x64, 0x36, 0x64, 0x39, 0x30], 0x2d, [0x66, 0x61, 0x65, 0x37], 0x2d, [0x64, 0x62, 0x64, 0x30], 0x2d, [0x36, 0x37, 0x64, 0x35], 0x2d, [0x61, 0x61, 0x31, 0x63, 0x5a, 0x38, 0x63, 0x36]}}}, {@dont_appraise='dont_appraise'}]}) r0 = openat$md(0xffffffffffffff9c, &(0x7f0000000080)='/dev/md0\x00', 0x0, 0x0) ioctl$BLKALIGNOFF(r0, 0x127a, &(0x7f00000000c0)) ioctl$BLKPG(r0, 0x40140921, 0x0) [ 298.336282][T10943] hfs: unable to parse mount options [ 298.363054][T10935] gfs2: fsid=.: Trying to join cluster "lock_nolock", "." [ 298.433786][T10935] gfs2: fsid=.: Now mounting FS... [ 298.445879][T10935] gfs2: not a GFS2 filesystem [ 298.448378][T10938] sysfs: cannot create duplicate filename '/fs/gfs2/.' [ 298.452843][T10935] gfs2: fsid=.: can't read superblock [ 298.472190][T10938] CPU: 1 PID: 10938 Comm: syz-executor.2 Not tainted 5.6.0-rc7-syzkaller #0 [ 298.480906][T10938] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 298.491077][T10938] Call Trace: [ 298.492827][T10935] gfs2: fsid=.: can't read superblock: -22 [ 298.494409][T10938] dump_stack+0x188/0x20d [ 298.494441][T10938] sysfs_warn_dup.cold+0x1c/0x2d [ 298.509496][T10938] sysfs_create_dir_ns+0x233/0x290 [ 298.514644][T10938] ? sysfs_create_mount_point+0xb0/0xb0 [ 298.520349][T10938] ? rwlock_bug.part.0+0x90/0x90 [ 298.526008][T10938] ? do_raw_spin_unlock+0x171/0x260 [ 298.531237][T10938] kobject_add_internal+0x2ca/0x990 [ 298.536461][T10938] ? kfree+0x1a1/0x2b0 [ 298.540557][T10938] kobject_init_and_add+0x101/0x160 [ 298.545780][T10938] ? kobject_add_internal+0x990/0x990 [ 298.551175][T10938] ? vsnprintf+0x2c6/0x14f0 [ 298.555712][T10938] gfs2_sys_fs_add+0x18d/0x350 [ 298.560477][T10938] ? recover_store+0x170/0x170 [ 298.565252][T10938] ? snprintf+0xbb/0xf0 [ 298.569423][T10938] ? set_blocksize+0x24f/0x2c0 [ 298.574202][T10938] ? memcpy+0x35/0x50 [ 298.578215][T10938] gfs2_fill_super+0x1360/0x250a [ 298.583177][T10938] ? gfs2_reconfigure+0x1010/0x1010 [ 298.588379][T10938] ? snprintf+0xbb/0xf0 [ 298.592559][T10938] ? vsprintf+0x30/0x30 [ 298.596757][T10938] ? wait_for_completion+0x3c0/0x3c0 [ 298.602148][T10938] ? set_blocksize+0x24f/0x2c0 [ 298.607050][T10938] get_tree_bdev+0x3f8/0x710 [ 298.611678][T10938] ? gfs2_reconfigure+0x1010/0x1010 [ 298.616892][T10938] gfs2_get_tree+0x4a/0x270 [ 298.621417][T10938] vfs_get_tree+0x89/0x2f0 [ 298.625837][T10938] do_mount+0x1306/0x1a60 [ 298.630179][T10938] ? copy_mount_string+0x40/0x40 [ 298.635162][T10938] ? _copy_from_user+0x123/0x190 [ 298.640132][T10938] __x64_sys_mount+0x18f/0x230 [ 298.644915][T10938] do_syscall_64+0xf6/0x7d0 [ 298.649433][T10938] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 298.655340][T10938] RIP: 0033:0x45f29a [ 298.659237][T10938] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 4d 8c fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 2a 8c fb ff c3 66 0f 1f 84 00 00 00 00 00 18:43:53 executing program 3: ioctl$TIOCSPTLCK(0xffffffffffffffff, 0x40045431, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000380)) r2 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$TCSETAW(0xffffffffffffffff, 0x5407, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1000, &(0x7f0000000000/0x1000)=nil}) ioctl$KVM_SET_REGS(r3, 0x4090ae82, &(0x7f00000001c0)={[0x0, 0x0, 0x0, 0x2000020, 0xffffffffffffffff, 0x0, 0x4cb]}) ioctl$KVM_RUN(r3, 0xae80, 0x0) r4 = socket$inet6(0xa, 0x2, 0x0) sendfile(r4, 0xffffffffffffffff, &(0x7f0000000040), 0x0) r5 = add_key$user(&(0x7f0000000040)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)='X', 0x1, 0xfffffffffffffffe) keyctl$update(0x2, r5, &(0x7f00000006c0)="c0ca1cdbaa1aedbbed80dddaa28e15b9449e2e82cca4244c40ffd0fd4e6631c7d3d86e1339de17344340b02dd527f2d8b3ae6c1db3594e657da33c3ec668f143974a65753472df5319a6b83e1e86b8f2666c61a2e700d1c1e0ae1fc52494bd4885a5c64e9007d39fa11313805290dd6342f9775f01a02ec88f6bee22f25a377a9b143abba1264586d2779088006d5f9be82b00f10287031623f73470264cc5897f18f357aad6deb3883da88ae2266664933785a3ce72bb224a441437ea93c217", 0xc0) r6 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x9a, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000080)={r6, r5, r6}, &(0x7f00000009c0)=""/240, 0x4a3, 0x0) keyctl$dh_compute(0x17, &(0x7f0000000180)={0x0, r5}, &(0x7f0000000280)=""/145, 0x91, 0x0) 18:43:53 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000100)=0x1) ioctl$TCGETS(r0, 0x8924, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000100)=0x1) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x20008000004001fe) 18:43:53 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000100)=0x1) ioctl$TCGETS(r0, 0x8924, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000100)=0x1) ioctl$TCGETS(r1, 0x8924, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x400101, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x20008000004001fe) 18:43:53 executing program 5: statx(0xffffffffffffff9c, 0x0, 0x2000, 0x800, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0}) syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x9, 0x0, &(0x7f00000000c0), 0x200000, &(0x7f0000000240)={[{@part={'part', 0x3d, 0xa14}}, {@file_umask={'file_umask', 0x3d, 0x657936f8}}, {@type={'type', 0x3d, "6d6d69c8"}}], [{@fsmagic={'fsmagic', 0x3d, 0x6be0}}, {@obj_type={'obj_type', 0x3d, '@%\'em1\x00'}}, {@euid_lt={'euid<', r0}}, {@fsuuid={'fsuuid', 0x3d, {[0x32, 0x36, 0x65, 0x64, 0x36, 0x64, 0x39, 0x30], 0x2d, [0x66, 0x61, 0x65, 0x37], 0x2d, [0x64, 0x62, 0x64, 0x30], 0x2d, [0x36, 0x37, 0x64, 0x35], 0x2d, [0x61, 0x61, 0x31, 0x63, 0x5a, 0x38, 0x63, 0x36]}}}, {@dont_appraise='dont_appraise'}]}) r1 = openat$md(0xffffffffffffff9c, &(0x7f0000000080)='/dev/md0\x00', 0x0, 0x0) ioctl$BLKALIGNOFF(r1, 0x127a, &(0x7f00000000c0)) ioctl$BLKPG(r1, 0x40140921, 0x0) [ 298.679469][T10938] RSP: 002b:00007f004a751a68 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 298.687988][T10938] RAX: ffffffffffffffda RBX: 00007f004a7526d4 RCX: 000000000045f29a [ 298.696002][T10938] RDX: 00007f004a751ae0 RSI: 0000000020000380 RDI: 00007f004a751b00 [ 298.703990][T10938] RBP: 000000000076bf00 R08: 00007f004a751b40 R09: 00007f004a751ae0 [ 298.711973][T10938] R10: 0000000000000000 R11: 0000000000000206 R12: 00000000ffffffff [ 298.719958][T10938] R13: 0000000000000bde R14: 00000000004cdfcc R15: 000000000076bf0c 18:43:53 executing program 0: socket$inet6(0xa, 0x6, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f00000000c0)={@mcast1, 0x800, 0x0, 0x103, 0x1}, 0x20) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f00000000c0)={@loopback, 0x800, 0x0, 0x103, 0x2}, 0x20) ioctl$DRM_IOCTL_RM_CTX(0xffffffffffffffff, 0xc0086421, &(0x7f0000000300)={0x0, 0x1}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB='lockproto=lock_nolock,locktable=.']) [ 298.829045][T10958] hfs: unable to parse mount options 18:43:53 executing program 5: statx(0xffffffffffffff9c, 0x0, 0x2000, 0x800, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0}) syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x9, 0x0, &(0x7f00000000c0), 0x200000, &(0x7f0000000240)={[{@part={'part', 0x3d, 0xa14}}, {@file_umask={'file_umask', 0x3d, 0x657936f8}}, {@type={'type', 0x3d, "6d6d69c8"}}], [{@fsmagic={'fsmagic', 0x3d, 0x6be0}}, {@obj_type={'obj_type', 0x3d, '@%\'em1\x00'}}, {@euid_lt={'euid<', r0}}, {@fsuuid={'fsuuid', 0x3d, {[0x32, 0x36, 0x65, 0x64, 0x36, 0x64, 0x39, 0x30], 0x2d, [0x66, 0x61, 0x65, 0x37], 0x2d, [0x64, 0x62, 0x64, 0x30], 0x2d, [0x36, 0x37, 0x64, 0x35], 0x2d, [0x61, 0x61, 0x31, 0x63, 0x5a, 0x38, 0x63, 0x36]}}}, {@dont_appraise='dont_appraise'}]}) r1 = openat$md(0xffffffffffffff9c, &(0x7f0000000080)='/dev/md0\x00', 0x0, 0x0) ioctl$BLKALIGNOFF(r1, 0x127a, &(0x7f00000000c0)) ioctl$BLKPG(r1, 0x40140921, 0x0) [ 298.927123][T10938] kobject_add_internal failed for . with -EEXIST, don't try to register things with the same name in the same directory. [ 298.948249][T10938] gfs2: fsid=.: error -17 adding sysfs files 18:43:53 executing program 2: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$nl_route(0x10, 0x3, 0x0) splice(r0, 0x0, r2, 0x0, 0x1420000a77, 0x0) ioctl$TCSETSF(0xffffffffffffffff, 0x5412, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, "000000000001f8ffffffffffff00002000"}) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="9000000019001fb2b9409ac00ac9a37b802078020011000504000006740009", 0x1f, 0x0, 0x0, 0x0) write$binfmt_elf64(r1, &(0x7f0000000000)=ANY=[], 0xfffffd88) [ 299.054257][T10988] hfs: unable to parse mount options 18:43:53 executing program 5: statx(0xffffffffffffff9c, 0x0, 0x2000, 0x800, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0}) syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x9, 0x0, &(0x7f00000000c0), 0x200000, &(0x7f0000000240)={[{@part={'part', 0x3d, 0xa14}}, {@file_umask={'file_umask', 0x3d, 0x657936f8}}, {@type={'type', 0x3d, "6d6d69c8"}}], [{@fsmagic={'fsmagic', 0x3d, 0x6be0}}, {@obj_type={'obj_type', 0x3d, '@%\'em1\x00'}}, {@euid_lt={'euid<', r0}}, {@fsuuid={'fsuuid', 0x3d, {[0x32, 0x36, 0x65, 0x64, 0x36, 0x64, 0x39, 0x30], 0x2d, [0x66, 0x61, 0x65, 0x37], 0x2d, [0x64, 0x62, 0x64, 0x30], 0x2d, [0x36, 0x37, 0x64, 0x35], 0x2d, [0x61, 0x61, 0x31, 0x63, 0x5a, 0x38, 0x63, 0x36]}}}, {@dont_appraise='dont_appraise'}]}) r1 = openat$md(0xffffffffffffff9c, &(0x7f0000000080)='/dev/md0\x00', 0x0, 0x0) ioctl$BLKALIGNOFF(r1, 0x127a, &(0x7f00000000c0)) ioctl$BLKPG(r1, 0x40140921, 0x0) [ 299.184990][T10984] gfs2: fsid=.: Trying to join cluster "lock_nolock", "." [ 299.225961][T10984] gfs2: fsid=.: Now mounting FS... [ 299.262468][T10984] gfs2: not a GFS2 filesystem [ 299.284131][T10984] gfs2: fsid=.: can't read superblock [ 299.309014][T10984] gfs2: fsid=.: can't read superblock: -22 [ 299.320179][T11012] hfs: unable to parse mount options [ 299.370922][T11011] selinux_netlink_send: 6 callbacks suppressed [ 299.370937][T11011] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=11011 comm=syz-executor.2 [ 299.493943][T11011] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=11011 comm=syz-executor.2 18:43:54 executing program 5: statx(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x0, 0x800, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0}) syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x9, 0x0, &(0x7f00000000c0), 0x200000, &(0x7f0000000240)={[{@part={'part', 0x3d, 0xa14}}, {@file_umask={'file_umask', 0x3d, 0x657936f8}}, {@type={'type', 0x3d, "6d6d69c8"}}], [{@fsmagic={'fsmagic', 0x3d, 0x6be0}}, {@obj_type={'obj_type', 0x3d, '@%\'em1\x00'}}, {@euid_lt={'euid<', r0}}, {@fsuuid={'fsuuid', 0x3d, {[0x32, 0x36, 0x65, 0x64, 0x36, 0x64, 0x39, 0x30], 0x2d, [0x66, 0x61, 0x65, 0x37], 0x2d, [0x64, 0x62, 0x64, 0x30], 0x2d, [0x36, 0x37, 0x64, 0x35], 0x2d, [0x61, 0x61, 0x31, 0x63, 0x5a, 0x38, 0x63, 0x36]}}}, {@dont_appraise='dont_appraise'}]}) r1 = openat$md(0xffffffffffffff9c, &(0x7f0000000080)='/dev/md0\x00', 0x0, 0x0) ioctl$BLKALIGNOFF(r1, 0x127a, &(0x7f00000000c0)) ioctl$BLKPG(r1, 0x40140921, 0x0) 18:43:54 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000100)=0x1) ioctl$TCGETS(r0, 0x8924, 0x0) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, &(0x7f0000000100)=0x1) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x20008000004001fe) [ 299.617783][T11011] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=11011 comm=syz-executor.2 [ 299.725049][T11011] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=11011 comm=syz-executor.2 [ 299.778376][T11011] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=11011 comm=syz-executor.2 18:43:54 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000100)=0x1) ioctl$TCGETS(r0, 0x8924, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000100)=0x1) ioctl$TCGETS(r1, 0x8924, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x400101, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x20008000004001fe) 18:43:54 executing program 0: socket$inet6(0xa, 0x6, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f00000000c0)={@mcast1, 0x800, 0x0, 0x103, 0x1}, 0x20) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f00000000c0)={@loopback, 0x800, 0x0, 0x103, 0x2}, 0x20) ioctl$DRM_IOCTL_RM_CTX(0xffffffffffffffff, 0xc0086421, &(0x7f0000000300)={0x0, 0x1}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB='lockproto=lock_nolock,locktable=.']) [ 299.828911][T11021] hfs: unable to parse mount options [ 299.891866][T11011] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=11011 comm=syz-executor.2 [ 299.920688][T11011] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=11011 comm=syz-executor.2 [ 299.941725][T11011] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=11011 comm=syz-executor.2 [ 299.962007][T11011] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=11011 comm=syz-executor.2 [ 300.059477][T11011] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=11011 comm=syz-executor.2 [ 300.285585][T11039] gfs2: fsid=.: Trying to join cluster "lock_nolock", "." [ 300.336537][T11039] gfs2: fsid=.: Now mounting FS... [ 300.389298][T11039] gfs2: not a GFS2 filesystem [ 300.396120][T11039] gfs2: fsid=.: can't read superblock [ 300.401880][T11039] gfs2: fsid=.: can't read superblock: -22 18:43:55 executing program 3: ioctl$TIOCSPTLCK(0xffffffffffffffff, 0x40045431, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000380)) r2 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$TCSETAW(0xffffffffffffffff, 0x5407, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1000, &(0x7f0000000000/0x1000)=nil}) ioctl$KVM_SET_REGS(r3, 0x4090ae82, &(0x7f00000001c0)={[0x0, 0x0, 0x0, 0x2000020, 0xffffffffffffffff, 0x0, 0x4cb]}) ioctl$KVM_RUN(r3, 0xae80, 0x0) r4 = socket$inet6(0xa, 0x2, 0x0) sendfile(r4, 0xffffffffffffffff, &(0x7f0000000040), 0x0) r5 = add_key$user(&(0x7f0000000040)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)='X', 0x1, 0xfffffffffffffffe) keyctl$update(0x2, r5, &(0x7f00000006c0)="c0ca1cdbaa1aedbbed80dddaa28e15b9449e2e82cca4244c40ffd0fd4e6631c7d3d86e1339de17344340b02dd527f2d8b3ae6c1db3594e657da33c3ec668f143974a65753472df5319a6b83e1e86b8f2666c61a2e700d1c1e0ae1fc52494bd4885a5c64e9007d39fa11313805290dd6342f9775f01a02ec88f6bee22f25a377a9b143abba1264586d2779088006d5f9be82b00f10287031623f73470264cc5897f18f357aad6deb3883da88ae2266664933785a3ce72bb224a441437ea93c217", 0xc0) r6 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x9a, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000080)={r6, r5, r6}, &(0x7f00000009c0)=""/240, 0x4a3, 0x0) 18:43:55 executing program 5: statx(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x0, 0x800, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0}) syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x9, 0x0, &(0x7f00000000c0), 0x200000, &(0x7f0000000240)={[{@part={'part', 0x3d, 0xa14}}, {@file_umask={'file_umask', 0x3d, 0x657936f8}}, {@type={'type', 0x3d, "6d6d69c8"}}], [{@fsmagic={'fsmagic', 0x3d, 0x6be0}}, {@obj_type={'obj_type', 0x3d, '@%\'em1\x00'}}, {@euid_lt={'euid<', r0}}, {@fsuuid={'fsuuid', 0x3d, {[0x32, 0x36, 0x65, 0x64, 0x36, 0x64, 0x39, 0x30], 0x2d, [0x66, 0x61, 0x65, 0x37], 0x2d, [0x64, 0x62, 0x64, 0x30], 0x2d, [0x36, 0x37, 0x64, 0x35], 0x2d, [0x61, 0x61, 0x31, 0x63, 0x5a, 0x38, 0x63, 0x36]}}}, {@dont_appraise='dont_appraise'}]}) r1 = openat$md(0xffffffffffffff9c, &(0x7f0000000080)='/dev/md0\x00', 0x0, 0x0) ioctl$BLKALIGNOFF(r1, 0x127a, &(0x7f00000000c0)) ioctl$BLKPG(r1, 0x40140921, 0x0) 18:43:55 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000100)=0x1) ioctl$TCGETS(r0, 0x8924, 0x0) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, &(0x7f0000000100)=0x1) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x20008000004001fe) 18:43:55 executing program 2: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000040)='/dev/nullb0\x00', 0x0, 0x0) perf_event_open(&(0x7f00000012c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$nullb(0xffffffffffffff9c, &(0x7f0000001000)='/dev/nullb0\x00', 0x105042, 0x0) sendfile(r1, r0, 0x0, 0x80006) socketpair$unix(0x1, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_MON_PEER_GET(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000140)={0x0}, 0x1, 0x0, 0x0, 0x40004}, 0x4008015) [ 300.688900][T11070] hfs: unable to parse mount options 18:43:55 executing program 5: statx(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x0, 0x800, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0}) syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x9, 0x0, &(0x7f00000000c0), 0x200000, &(0x7f0000000240)={[{@part={'part', 0x3d, 0xa14}}, {@file_umask={'file_umask', 0x3d, 0x657936f8}}, {@type={'type', 0x3d, "6d6d69c8"}}], [{@fsmagic={'fsmagic', 0x3d, 0x6be0}}, {@obj_type={'obj_type', 0x3d, '@%\'em1\x00'}}, {@euid_lt={'euid<', r0}}, {@fsuuid={'fsuuid', 0x3d, {[0x32, 0x36, 0x65, 0x64, 0x36, 0x64, 0x39, 0x30], 0x2d, [0x66, 0x61, 0x65, 0x37], 0x2d, [0x64, 0x62, 0x64, 0x30], 0x2d, [0x36, 0x37, 0x64, 0x35], 0x2d, [0x61, 0x61, 0x31, 0x63, 0x5a, 0x38, 0x63, 0x36]}}}, {@dont_appraise='dont_appraise'}]}) r1 = openat$md(0xffffffffffffff9c, &(0x7f0000000080)='/dev/md0\x00', 0x0, 0x0) ioctl$BLKALIGNOFF(r1, 0x127a, &(0x7f00000000c0)) ioctl$BLKPG(r1, 0x40140921, 0x0) 18:43:55 executing program 0: socket$inet6(0xa, 0x6, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f00000000c0)={@mcast1, 0x800, 0x0, 0x103, 0x1}, 0x20) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f00000000c0)={@loopback, 0x800, 0x0, 0x103, 0x2}, 0x20) ioctl$DRM_IOCTL_RM_CTX(0xffffffffffffffff, 0xc0086421, &(0x7f0000000300)={0x0, 0x1}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB='lockproto=lock_nolock,locktable=.']) 18:43:55 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000100)=0x1) ioctl$TCGETS(r0, 0x8924, 0x0) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, &(0x7f0000000100)=0x1) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x20008000004001fe) [ 300.965574][T11092] hfs: unable to parse mount options 18:43:55 executing program 2: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000040)='/dev/nullb0\x00', 0x0, 0x0) perf_event_open(&(0x7f00000012c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$nullb(0xffffffffffffff9c, &(0x7f0000001000)='/dev/nullb0\x00', 0x105042, 0x0) sendfile(r1, r0, 0x0, 0x80006) socketpair$unix(0x1, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_MON_PEER_GET(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000140)={0x0}, 0x1, 0x0, 0x0, 0x40004}, 0x4008015) 18:43:55 executing program 5: statx(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x2000, 0x0, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0}) syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x9, 0x0, &(0x7f00000000c0), 0x200000, &(0x7f0000000240)={[{@part={'part', 0x3d, 0xa14}}, {@file_umask={'file_umask', 0x3d, 0x657936f8}}, {@type={'type', 0x3d, "6d6d69c8"}}], [{@fsmagic={'fsmagic', 0x3d, 0x6be0}}, {@obj_type={'obj_type', 0x3d, '@%\'em1\x00'}}, {@euid_lt={'euid<', r0}}, {@fsuuid={'fsuuid', 0x3d, {[0x32, 0x36, 0x65, 0x64, 0x36, 0x64, 0x39, 0x30], 0x2d, [0x66, 0x61, 0x65, 0x37], 0x2d, [0x64, 0x62, 0x64, 0x30], 0x2d, [0x36, 0x37, 0x64, 0x35], 0x2d, [0x61, 0x61, 0x31, 0x63, 0x5a, 0x38, 0x63, 0x36]}}}, {@dont_appraise='dont_appraise'}]}) r1 = openat$md(0xffffffffffffff9c, &(0x7f0000000080)='/dev/md0\x00', 0x0, 0x0) ioctl$BLKALIGNOFF(r1, 0x127a, &(0x7f00000000c0)) ioctl$BLKPG(r1, 0x40140921, 0x0) 18:43:55 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000100)=0x1) ioctl$TCGETS(r0, 0x8924, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000100)=0x1) ioctl$TCGETS(r1, 0x8924, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x400101, 0x0) [ 301.283239][T11098] gfs2: fsid=.: Trying to join cluster "lock_nolock", "." [ 301.328113][T11098] gfs2: fsid=.: Now mounting FS... [ 301.342865][T11115] hfs: unable to parse mount options [ 301.368119][T11098] gfs2: not a GFS2 filesystem 18:43:56 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, r2, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r2, 0x2401, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x2400, 0x0) [ 301.399968][T11098] gfs2: fsid=.: can't read superblock 18:43:56 executing program 5: statx(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x2000, 0x0, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0}) syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x9, 0x0, &(0x7f00000000c0), 0x200000, &(0x7f0000000240)={[{@part={'part', 0x3d, 0xa14}}, {@file_umask={'file_umask', 0x3d, 0x657936f8}}, {@type={'type', 0x3d, "6d6d69c8"}}], [{@fsmagic={'fsmagic', 0x3d, 0x6be0}}, {@obj_type={'obj_type', 0x3d, '@%\'em1\x00'}}, {@euid_lt={'euid<', r0}}, {@fsuuid={'fsuuid', 0x3d, {[0x32, 0x36, 0x65, 0x64, 0x36, 0x64, 0x39, 0x30], 0x2d, [0x66, 0x61, 0x65, 0x37], 0x2d, [0x64, 0x62, 0x64, 0x30], 0x2d, [0x36, 0x37, 0x64, 0x35], 0x2d, [0x61, 0x61, 0x31, 0x63, 0x5a, 0x38, 0x63, 0x36]}}}, {@dont_appraise='dont_appraise'}]}) r1 = openat$md(0xffffffffffffff9c, &(0x7f0000000080)='/dev/md0\x00', 0x0, 0x0) ioctl$BLKALIGNOFF(r1, 0x127a, &(0x7f00000000c0)) ioctl$BLKPG(r1, 0x40140921, 0x0) [ 301.443888][T11098] gfs2: fsid=.: can't read superblock: -22 [ 301.561342][T11139] hfs: unable to parse mount options 18:44:01 executing program 3: ioctl$TIOCSPTLCK(0xffffffffffffffff, 0x40045431, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000380)) r2 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$TCSETAW(0xffffffffffffffff, 0x5407, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1000, &(0x7f0000000000/0x1000)=nil}) ioctl$KVM_SET_REGS(r3, 0x4090ae82, &(0x7f00000001c0)={[0x0, 0x0, 0x0, 0x2000020, 0xffffffffffffffff, 0x0, 0x4cb]}) ioctl$KVM_RUN(r3, 0xae80, 0x0) r4 = socket$inet6(0xa, 0x2, 0x0) sendfile(r4, 0xffffffffffffffff, &(0x7f0000000040), 0x0) r5 = add_key$user(&(0x7f0000000040)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)='X', 0x1, 0xfffffffffffffffe) keyctl$update(0x2, r5, &(0x7f00000006c0)="c0ca1cdbaa1aedbbed80dddaa28e15b9449e2e82cca4244c40ffd0fd4e6631c7d3d86e1339de17344340b02dd527f2d8b3ae6c1db3594e657da33c3ec668f143974a65753472df5319a6b83e1e86b8f2666c61a2e700d1c1e0ae1fc52494bd4885a5c64e9007d39fa11313805290dd6342f9775f01a02ec88f6bee22f25a377a9b143abba1264586d2779088006d5f9be82b00f10287031623f73470264cc5897f18f357aad6deb3883da88ae2266664933785a3ce72bb224a441437ea93c217", 0xc0) add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x9a, 0xfffffffffffffffd) 18:44:01 executing program 2: socket$pppl2tp(0x18, 0x1, 0x1) socket$inet6(0xa, 0x2, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) msgctl$IPC_RMID(0x0, 0x0) 18:44:01 executing program 5: statx(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x2000, 0x0, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0}) syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x9, 0x0, &(0x7f00000000c0), 0x200000, &(0x7f0000000240)={[{@part={'part', 0x3d, 0xa14}}, {@file_umask={'file_umask', 0x3d, 0x657936f8}}, {@type={'type', 0x3d, "6d6d69c8"}}], [{@fsmagic={'fsmagic', 0x3d, 0x6be0}}, {@obj_type={'obj_type', 0x3d, '@%\'em1\x00'}}, {@euid_lt={'euid<', r0}}, {@fsuuid={'fsuuid', 0x3d, {[0x32, 0x36, 0x65, 0x64, 0x36, 0x64, 0x39, 0x30], 0x2d, [0x66, 0x61, 0x65, 0x37], 0x2d, [0x64, 0x62, 0x64, 0x30], 0x2d, [0x36, 0x37, 0x64, 0x35], 0x2d, [0x61, 0x61, 0x31, 0x63, 0x5a, 0x38, 0x63, 0x36]}}}, {@dont_appraise='dont_appraise'}]}) r1 = openat$md(0xffffffffffffff9c, &(0x7f0000000080)='/dev/md0\x00', 0x0, 0x0) ioctl$BLKALIGNOFF(r1, 0x127a, &(0x7f00000000c0)) ioctl$BLKPG(r1, 0x40140921, 0x0) 18:44:01 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000100)=0x1) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000100)=0x1) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x20008000004001fe) 18:44:01 executing program 0: socket$inet6(0xa, 0x6, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f00000000c0)={@mcast1, 0x800, 0x0, 0x103, 0x1}, 0x20) getsockopt$inet_sctp6_SCTP_EVENTS(r0, 0x84, 0xb, &(0x7f0000000040), &(0x7f0000000080)=0xe) ioctl$DRM_IOCTL_RM_CTX(0xffffffffffffffff, 0xc0086421, &(0x7f0000000300)={0x0, 0x1}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB='lockproto=lock_nolock,locktable=.']) 18:44:01 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000100)=0x1) ioctl$TCGETS(r0, 0x8924, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000100)=0x1) ioctl$TCGETS(r1, 0x8924, 0x0) [ 307.026916][T11303] hfs: unable to parse mount options 18:44:02 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_ASSIGN_SET_MSIX_ENTRY(0xffffffffffffffff, 0x4010ae74, 0x0) ioctl$KVM_SET_GUEST_DEBUG(r2, 0x4048ae9b, &(0x7f0000000100)={0xe8003}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000380)) ioctl$KVM_SMI(r2, 0xaeb7) ioctl$KVM_RUN(r2, 0xae80, 0x0) [ 307.112577][T11304] gfs2: fsid=.: Trying to join cluster "lock_nolock", "." [ 307.120431][T11304] gfs2: fsid=.: Now mounting FS... [ 307.129139][T11304] gfs2: not a GFS2 filesystem [ 307.135169][T11304] gfs2: fsid=.: can't read superblock [ 307.141556][T11304] gfs2: fsid=.: can't read superblock: -22 18:44:02 executing program 5: statx(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x2000, 0x800, 0x0) syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x9, 0x0, &(0x7f00000000c0), 0x200000, &(0x7f0000000240)={[{@part={'part', 0x3d, 0xa14}}, {@file_umask={'file_umask', 0x3d, 0x657936f8}}, {@type={'type', 0x3d, "6d6d69c8"}}], [{@fsmagic={'fsmagic', 0x3d, 0x6be0}}, {@obj_type={'obj_type', 0x3d, '@%\'em1\x00'}}, {@euid_lt={'euid<'}}, {@fsuuid={'fsuuid', 0x3d, {[0x32, 0x36, 0x65, 0x64, 0x36, 0x64, 0x39, 0x30], 0x2d, [0x66, 0x61, 0x65, 0x37], 0x2d, [0x64, 0x62, 0x64, 0x30], 0x2d, [0x36, 0x37, 0x64, 0x35], 0x2d, [0x61, 0x61, 0x31, 0x63, 0x5a, 0x38, 0x63, 0x36]}}}, {@dont_appraise='dont_appraise'}]}) r0 = openat$md(0xffffffffffffff9c, &(0x7f0000000080)='/dev/md0\x00', 0x0, 0x0) ioctl$BLKALIGNOFF(r0, 0x127a, &(0x7f00000000c0)) ioctl$BLKPG(r0, 0x40140921, 0x0) 18:44:02 executing program 2: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000040)='/dev/nullb0\x00', 0x0, 0x0) perf_event_open(&(0x7f00000012c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$nullb(0xffffffffffffff9c, &(0x7f0000001000)='/dev/nullb0\x00', 0x105042, 0x0) sendfile(r1, r0, 0x0, 0x80006) socketpair$unix(0x1, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_MON_PEER_GET(0xffffffffffffffff, 0x0, 0x0) 18:44:02 executing program 3: ioctl$TIOCSPTLCK(0xffffffffffffffff, 0x40045431, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000380)) r2 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$TCSETAW(0xffffffffffffffff, 0x5407, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1000, &(0x7f0000000000/0x1000)=nil}) ioctl$KVM_SET_REGS(r3, 0x4090ae82, &(0x7f00000001c0)={[0x0, 0x0, 0x0, 0x2000020, 0xffffffffffffffff, 0x0, 0x4cb]}) ioctl$KVM_RUN(r3, 0xae80, 0x0) r4 = socket$inet6(0xa, 0x2, 0x0) sendfile(r4, 0xffffffffffffffff, &(0x7f0000000040), 0x0) r5 = add_key$user(&(0x7f0000000040)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)='X', 0x1, 0xfffffffffffffffe) keyctl$update(0x2, r5, &(0x7f00000006c0)="c0ca1cdbaa1aedbbed80dddaa28e15b9449e2e82cca4244c40ffd0fd4e6631c7d3d86e1339de17344340b02dd527f2d8b3ae6c1db3594e657da33c3ec668f143974a65753472df5319a6b83e1e86b8f2666c61a2e700d1c1e0ae1fc52494bd4885a5c64e9007d39fa11313805290dd6342f9775f01a02ec88f6bee22f25a377a9b143abba1264586d2779088006d5f9be82b00f10287031623f73470264cc5897f18f357aad6deb3883da88ae2266664933785a3ce72bb224a441437ea93c217", 0xc0) add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x9a, 0xfffffffffffffffd) [ 307.608651][T11360] hfs: unable to parse mount options 18:44:02 executing program 0: socket$inet6(0xa, 0x6, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f00000000c0)={@mcast1, 0x800, 0x0, 0x103, 0x1}, 0x20) getsockopt$inet_sctp6_SCTP_EVENTS(r0, 0x84, 0xb, &(0x7f0000000040), &(0x7f0000000080)=0xe) ioctl$DRM_IOCTL_RM_CTX(0xffffffffffffffff, 0xc0086421, &(0x7f0000000300)={0x0, 0x1}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB='lockproto=lock_nolock,locktable=.']) 18:44:02 executing program 5: statx(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x2000, 0x800, 0x0) syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x9, 0x0, &(0x7f00000000c0), 0x200000, &(0x7f0000000240)={[{@part={'part', 0x3d, 0xa14}}, {@file_umask={'file_umask', 0x3d, 0x657936f8}}, {@type={'type', 0x3d, "6d6d69c8"}}], [{@fsmagic={'fsmagic', 0x3d, 0x6be0}}, {@obj_type={'obj_type', 0x3d, '@%\'em1\x00'}}, {@euid_lt={'euid<'}}, {@fsuuid={'fsuuid', 0x3d, {[0x32, 0x36, 0x65, 0x64, 0x36, 0x64, 0x39, 0x30], 0x2d, [0x66, 0x61, 0x65, 0x37], 0x2d, [0x64, 0x62, 0x64, 0x30], 0x2d, [0x36, 0x37, 0x64, 0x35], 0x2d, [0x61, 0x61, 0x31, 0x63, 0x5a, 0x38, 0x63, 0x36]}}}, {@dont_appraise='dont_appraise'}]}) r0 = openat$md(0xffffffffffffff9c, &(0x7f0000000080)='/dev/md0\x00', 0x0, 0x0) ioctl$BLKALIGNOFF(r0, 0x127a, &(0x7f00000000c0)) ioctl$BLKPG(r0, 0x40140921, 0x0) 18:44:02 executing program 5: statx(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x2000, 0x800, 0x0) syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x9, 0x0, &(0x7f00000000c0), 0x200000, &(0x7f0000000240)={[{@part={'part', 0x3d, 0xa14}}, {@file_umask={'file_umask', 0x3d, 0x657936f8}}, {@type={'type', 0x3d, "6d6d69c8"}}], [{@fsmagic={'fsmagic', 0x3d, 0x6be0}}, {@obj_type={'obj_type', 0x3d, '@%\'em1\x00'}}, {@euid_lt={'euid<'}}, {@fsuuid={'fsuuid', 0x3d, {[0x32, 0x36, 0x65, 0x64, 0x36, 0x64, 0x39, 0x30], 0x2d, [0x66, 0x61, 0x65, 0x37], 0x2d, [0x64, 0x62, 0x64, 0x30], 0x2d, [0x36, 0x37, 0x64, 0x35], 0x2d, [0x61, 0x61, 0x31, 0x63, 0x5a, 0x38, 0x63, 0x36]}}}, {@dont_appraise='dont_appraise'}]}) r0 = openat$md(0xffffffffffffff9c, &(0x7f0000000080)='/dev/md0\x00', 0x0, 0x0) ioctl$BLKALIGNOFF(r0, 0x127a, &(0x7f00000000c0)) ioctl$BLKPG(r0, 0x40140921, 0x0) 18:44:02 executing program 5: statx(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x2000, 0x800, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0}) syz_mount_image$hfs(0x0, &(0x7f0000000040)='./file0\x00', 0x9, 0x0, &(0x7f00000000c0), 0x200000, &(0x7f0000000240)={[{@part={'part', 0x3d, 0xa14}}, {@file_umask={'file_umask', 0x3d, 0x657936f8}}, {@type={'type', 0x3d, "6d6d69c8"}}], [{@fsmagic={'fsmagic', 0x3d, 0x6be0}}, {@obj_type={'obj_type', 0x3d, '@%\'em1\x00'}}, {@euid_lt={'euid<', r0}}, {@fsuuid={'fsuuid', 0x3d, {[0x32, 0x36, 0x65, 0x64, 0x36, 0x64, 0x39, 0x30], 0x2d, [0x66, 0x61, 0x65, 0x37], 0x2d, [0x64, 0x62, 0x64, 0x30], 0x2d, [0x36, 0x37, 0x64, 0x35], 0x2d, [0x61, 0x61, 0x31, 0x63, 0x5a, 0x38, 0x63, 0x36]}}}, {@dont_appraise='dont_appraise'}]}) r1 = openat$md(0xffffffffffffff9c, &(0x7f0000000080)='/dev/md0\x00', 0x0, 0x0) ioctl$BLKALIGNOFF(r1, 0x127a, &(0x7f00000000c0)) ioctl$BLKPG(r1, 0x40140921, 0x0) [ 307.843555][T11380] hfs: unable to parse mount options 18:44:02 executing program 2: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000040)='/dev/nullb0\x00', 0x0, 0x0) perf_event_open(&(0x7f00000012c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$nullb(0xffffffffffffff9c, &(0x7f0000001000)='/dev/nullb0\x00', 0x105042, 0x0) sendfile(r1, r0, 0x0, 0x80006) socketpair$unix(0x1, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_MON_PEER_GET(0xffffffffffffffff, 0x0, 0x0) 18:44:02 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x0, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000100)=0x1) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x20008000004001fe) 18:44:02 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000100)=0x1) ioctl$TCGETS(r0, 0x8924, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000100)=0x1) [ 308.041618][T11383] gfs2: fsid=.: Trying to join cluster "lock_nolock", "." [ 308.054332][T11383] gfs2: fsid=.: Now mounting FS... [ 308.069542][T11383] gfs2: not a GFS2 filesystem [ 308.090410][T11383] gfs2: fsid=.: can't read superblock [ 308.114043][T11383] gfs2: fsid=.: can't read superblock: -22 18:44:03 executing program 2: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000040)='/dev/nullb0\x00', 0x0, 0x0) perf_event_open(&(0x7f00000012c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$nullb(0xffffffffffffff9c, &(0x7f0000001000)='/dev/nullb0\x00', 0x105042, 0x0) sendfile(r1, r0, 0x0, 0x80006) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000100)) sendmsg$TIPC_NL_MON_PEER_GET(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x14, 0x0, 0x100, 0x70bd28, 0x25dfdbfb}, 0x14}, 0x1, 0x0, 0x0, 0x40004}, 0x4008015) 18:44:03 executing program 0: socket$inet6(0xa, 0x6, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f00000000c0)={@mcast1, 0x800, 0x0, 0x103, 0x1}, 0x20) getsockopt$inet_sctp6_SCTP_EVENTS(r0, 0x84, 0xb, &(0x7f0000000040), &(0x7f0000000080)=0xe) ioctl$DRM_IOCTL_RM_CTX(0xffffffffffffffff, 0xc0086421, &(0x7f0000000300)={0x0, 0x1}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB='lockproto=lock_nolock,locktable=.']) 18:44:03 executing program 5: statx(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x2000, 0x800, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0}) syz_mount_image$hfs(0x0, &(0x7f0000000040)='./file0\x00', 0x9, 0x0, &(0x7f00000000c0), 0x200000, &(0x7f0000000240)={[{@part={'part', 0x3d, 0xa14}}, {@file_umask={'file_umask', 0x3d, 0x657936f8}}, {@type={'type', 0x3d, "6d6d69c8"}}], [{@fsmagic={'fsmagic', 0x3d, 0x6be0}}, {@obj_type={'obj_type', 0x3d, '@%\'em1\x00'}}, {@euid_lt={'euid<', r0}}, {@fsuuid={'fsuuid', 0x3d, {[0x32, 0x36, 0x65, 0x64, 0x36, 0x64, 0x39, 0x30], 0x2d, [0x66, 0x61, 0x65, 0x37], 0x2d, [0x64, 0x62, 0x64, 0x30], 0x2d, [0x36, 0x37, 0x64, 0x35], 0x2d, [0x61, 0x61, 0x31, 0x63, 0x5a, 0x38, 0x63, 0x36]}}}, {@dont_appraise='dont_appraise'}]}) r1 = openat$md(0xffffffffffffff9c, &(0x7f0000000080)='/dev/md0\x00', 0x0, 0x0) ioctl$BLKALIGNOFF(r1, 0x127a, &(0x7f00000000c0)) ioctl$BLKPG(r1, 0x40140921, 0x0) 18:44:03 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000100)=0x1) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x20008000004001fe) [ 308.856753][T11435] gfs2: fsid=.: Trying to join cluster "lock_nolock", "." [ 308.871277][T11435] gfs2: fsid=.: Now mounting FS... [ 308.891147][T11435] gfs2: not a GFS2 filesystem [ 308.954217][T11435] gfs2: fsid=.: can't read superblock [ 309.019702][T11435] gfs2: fsid=.: can't read superblock: -22 18:44:04 executing program 3: ioctl$TIOCSPTLCK(0xffffffffffffffff, 0x40045431, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000380)) r2 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$TCSETAW(0xffffffffffffffff, 0x5407, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1000, &(0x7f0000000000/0x1000)=nil}) ioctl$KVM_SET_REGS(r3, 0x4090ae82, &(0x7f00000001c0)={[0x0, 0x0, 0x0, 0x2000020, 0xffffffffffffffff, 0x0, 0x4cb]}) ioctl$KVM_RUN(r3, 0xae80, 0x0) r4 = socket$inet6(0xa, 0x2, 0x0) sendfile(r4, 0xffffffffffffffff, &(0x7f0000000040), 0x0) r5 = add_key$user(&(0x7f0000000040)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)='X', 0x1, 0xfffffffffffffffe) keyctl$update(0x2, r5, &(0x7f00000006c0)="c0ca1cdbaa1aedbbed80dddaa28e15b9449e2e82cca4244c40ffd0fd4e6631c7d3d86e1339de17344340b02dd527f2d8b3ae6c1db3594e657da33c3ec668f143974a65753472df5319a6b83e1e86b8f2666c61a2e700d1c1e0ae1fc52494bd4885a5c64e9007d39fa11313805290dd6342f9775f01a02ec88f6bee22f25a377a9b143abba1264586d2779088006d5f9be82b00f10287031623f73470264cc5897f18f357aad6deb3883da88ae2266664933785a3ce72bb224a441437ea93c217", 0xc0) add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x9a, 0xfffffffffffffffd) 18:44:04 executing program 2: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000040)='/dev/nullb0\x00', 0x0, 0x0) perf_event_open(&(0x7f00000012c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$nullb(0xffffffffffffff9c, &(0x7f0000001000)='/dev/nullb0\x00', 0x105042, 0x0) sendfile(r1, r0, 0x0, 0x80006) socketpair$unix(0x1, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_MON_PEER_GET(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000100)={0x14, 0x0, 0x100, 0x0, 0x25dfdbfb}, 0x14}, 0x1, 0x0, 0x0, 0x40004}, 0x0) 18:44:04 executing program 5: statx(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x2000, 0x800, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0}) syz_mount_image$hfs(0x0, &(0x7f0000000040)='./file0\x00', 0x9, 0x0, &(0x7f00000000c0), 0x200000, &(0x7f0000000240)={[{@part={'part', 0x3d, 0xa14}}, {@file_umask={'file_umask', 0x3d, 0x657936f8}}, {@type={'type', 0x3d, "6d6d69c8"}}], [{@fsmagic={'fsmagic', 0x3d, 0x6be0}}, {@obj_type={'obj_type', 0x3d, '@%\'em1\x00'}}, {@euid_lt={'euid<', r0}}, {@fsuuid={'fsuuid', 0x3d, {[0x32, 0x36, 0x65, 0x64, 0x36, 0x64, 0x39, 0x30], 0x2d, [0x66, 0x61, 0x65, 0x37], 0x2d, [0x64, 0x62, 0x64, 0x30], 0x2d, [0x36, 0x37, 0x64, 0x35], 0x2d, [0x61, 0x61, 0x31, 0x63, 0x5a, 0x38, 0x63, 0x36]}}}, {@dont_appraise='dont_appraise'}]}) r1 = openat$md(0xffffffffffffff9c, &(0x7f0000000080)='/dev/md0\x00', 0x0, 0x0) ioctl$BLKALIGNOFF(r1, 0x127a, &(0x7f00000000c0)) ioctl$BLKPG(r1, 0x40140921, 0x0) 18:44:04 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000100)=0x1) ioctl$TCGETS(r0, 0x8924, 0x0) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, &(0x7f0000000100)=0x1) 18:44:04 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000100)=0x1) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x20008000004001fe) 18:44:04 executing program 0: socket$inet6(0xa, 0x6, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f00000000c0)={@loopback, 0x800, 0x0, 0x103, 0x2}, 0x20) getsockopt$inet_sctp6_SCTP_EVENTS(r0, 0x84, 0xb, &(0x7f0000000040), &(0x7f0000000080)=0xe) ioctl$DRM_IOCTL_RM_CTX(0xffffffffffffffff, 0xc0086421, &(0x7f0000000300)={0x0, 0x1}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB='lockproto=lock_nolock,locktable=.']) 18:44:04 executing program 5: statx(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x2000, 0x800, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0}) syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', 0x0, 0x9, 0x0, &(0x7f00000000c0), 0x200000, &(0x7f0000000240)={[{@part={'part', 0x3d, 0xa14}}, {@file_umask={'file_umask', 0x3d, 0x657936f8}}, {@type={'type', 0x3d, "6d6d69c8"}}], [{@fsmagic={'fsmagic', 0x3d, 0x6be0}}, {@obj_type={'obj_type', 0x3d, '@%\'em1\x00'}}, {@euid_lt={'euid<', r0}}, {@fsuuid={'fsuuid', 0x3d, {[0x32, 0x36, 0x65, 0x64, 0x36, 0x64, 0x39, 0x30], 0x2d, [0x66, 0x61, 0x65, 0x37], 0x2d, [0x64, 0x62, 0x64, 0x30], 0x2d, [0x36, 0x37, 0x64, 0x35], 0x2d, [0x61, 0x61, 0x31, 0x63, 0x5a, 0x38, 0x63, 0x36]}}}, {@dont_appraise='dont_appraise'}]}) r1 = openat$md(0xffffffffffffff9c, &(0x7f0000000080)='/dev/md0\x00', 0x0, 0x0) ioctl$BLKALIGNOFF(r1, 0x127a, &(0x7f00000000c0)) ioctl$BLKPG(r1, 0x40140921, 0x0) 18:44:04 executing program 5: statx(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x2000, 0x800, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0}) syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', 0x0, 0x9, 0x0, &(0x7f00000000c0), 0x200000, &(0x7f0000000240)={[{@part={'part', 0x3d, 0xa14}}, {@file_umask={'file_umask', 0x3d, 0x657936f8}}, {@type={'type', 0x3d, "6d6d69c8"}}], [{@fsmagic={'fsmagic', 0x3d, 0x6be0}}, {@obj_type={'obj_type', 0x3d, '@%\'em1\x00'}}, {@euid_lt={'euid<', r0}}, {@fsuuid={'fsuuid', 0x3d, {[0x32, 0x36, 0x65, 0x64, 0x36, 0x64, 0x39, 0x30], 0x2d, [0x66, 0x61, 0x65, 0x37], 0x2d, [0x64, 0x62, 0x64, 0x30], 0x2d, [0x36, 0x37, 0x64, 0x35], 0x2d, [0x61, 0x61, 0x31, 0x63, 0x5a, 0x38, 0x63, 0x36]}}}, {@dont_appraise='dont_appraise'}]}) r1 = openat$md(0xffffffffffffff9c, &(0x7f0000000080)='/dev/md0\x00', 0x0, 0x0) ioctl$BLKALIGNOFF(r1, 0x127a, &(0x7f00000000c0)) ioctl$BLKPG(r1, 0x40140921, 0x0) 18:44:04 executing program 2: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) writev(r0, &(0x7f00000005c0)=[{&(0x7f0000000040)="9f8194be5ace602f096d07ff00cd66299667b70536342623b372d82fefa01f9a2d83297f99b4e597f4e9fad324868e83f474d0c35449712f00c51c638e6aea4a8dee825286b31a260e60482bb0b4179b3164", 0xff7c}], 0x1) [ 309.789276][T11510] gfs2: fsid=.: Trying to join cluster "lock_nolock", "." [ 309.813001][T11510] gfs2: fsid=.: Now mounting FS... 18:44:04 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000100)=0x1) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x20008000004001fe) 18:44:04 executing program 5: statx(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x2000, 0x800, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0}) syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', 0x0, 0x9, 0x0, &(0x7f00000000c0), 0x200000, &(0x7f0000000240)={[{@part={'part', 0x3d, 0xa14}}, {@file_umask={'file_umask', 0x3d, 0x657936f8}}, {@type={'type', 0x3d, "6d6d69c8"}}], [{@fsmagic={'fsmagic', 0x3d, 0x6be0}}, {@obj_type={'obj_type', 0x3d, '@%\'em1\x00'}}, {@euid_lt={'euid<', r0}}, {@fsuuid={'fsuuid', 0x3d, {[0x32, 0x36, 0x65, 0x64, 0x36, 0x64, 0x39, 0x30], 0x2d, [0x66, 0x61, 0x65, 0x37], 0x2d, [0x64, 0x62, 0x64, 0x30], 0x2d, [0x36, 0x37, 0x64, 0x35], 0x2d, [0x61, 0x61, 0x31, 0x63, 0x5a, 0x38, 0x63, 0x36]}}}, {@dont_appraise='dont_appraise'}]}) r1 = openat$md(0xffffffffffffff9c, &(0x7f0000000080)='/dev/md0\x00', 0x0, 0x0) ioctl$BLKALIGNOFF(r1, 0x127a, &(0x7f00000000c0)) ioctl$BLKPG(r1, 0x40140921, 0x0) 18:44:04 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000100)=0x1) ioctl$TCGETS(r0, 0x8924, 0x0) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, &(0x7f0000000100)=0x1) [ 309.844310][T11510] gfs2: not a GFS2 filesystem [ 309.859278][T11510] gfs2: fsid=.: can't read superblock [ 309.880262][T11510] gfs2: fsid=.: can't read superblock: -22 18:44:05 executing program 3: ioctl$TIOCSPTLCK(0xffffffffffffffff, 0x40045431, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000380)) r2 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$TCSETAW(0xffffffffffffffff, 0x5407, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1000, &(0x7f0000000000/0x1000)=nil}) ioctl$KVM_SET_REGS(r3, 0x4090ae82, &(0x7f00000001c0)={[0x0, 0x0, 0x0, 0x2000020, 0xffffffffffffffff, 0x0, 0x4cb]}) ioctl$KVM_RUN(r3, 0xae80, 0x0) r4 = socket$inet6(0xa, 0x2, 0x0) sendfile(r4, 0xffffffffffffffff, &(0x7f0000000040), 0x0) r5 = add_key$user(&(0x7f0000000040)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)='X', 0x1, 0xfffffffffffffffe) keyctl$update(0x2, r5, &(0x7f00000006c0)="c0ca1cdbaa1aedbbed80dddaa28e15b9449e2e82cca4244c40ffd0fd4e6631c7d3d86e1339de17344340b02dd527f2d8b3ae6c1db3594e657da33c3ec668f143974a65753472df5319a6b83e1e86b8f2666c61a2e700d1c1e0ae1fc52494bd4885a5c64e9007d39fa11313805290dd6342f9775f01a02ec88f6bee22f25a377a9b143abba1264586d2779088006d5f9be82b00f10287031623f73470264cc5897f18f357aad6deb3883da88ae2266664933785a3ce72bb224a441437ea93c217", 0xc0) 18:44:05 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000240)={0x0, 0x1c6, &(0x7f0000000080)={&(0x7f0000000880)=ANY=[@ANYBLOB="480000002400070500"/20, @ANYRES32, @ANYBLOB="00000000ffffffff0000000008000100636273001c0002000b00010000000000070000000500000000feff0000000000000000a2e387d63e7217590578003f91160e12e5cab38ea6d1c505d0df915a3f958c8b0b000030"], 0x48}}, 0x0) 18:44:05 executing program 5: statx(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x2000, 0x800, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0}) syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f00000000c0), 0x200000, &(0x7f0000000240)={[{@part={'part', 0x3d, 0xa14}}, {@file_umask={'file_umask', 0x3d, 0x657936f8}}, {@type={'type', 0x3d, "6d6d69c8"}}], [{@fsmagic={'fsmagic', 0x3d, 0x6be0}}, {@obj_type={'obj_type', 0x3d, '@%\'em1\x00'}}, {@euid_lt={'euid<', r0}}, {@fsuuid={'fsuuid', 0x3d, {[0x32, 0x36, 0x65, 0x64, 0x36, 0x64, 0x39, 0x30], 0x2d, [0x66, 0x61, 0x65, 0x37], 0x2d, [0x64, 0x62, 0x64, 0x30], 0x2d, [0x36, 0x37, 0x64, 0x35], 0x2d, [0x61, 0x61, 0x31, 0x63, 0x5a, 0x38, 0x63, 0x36]}}}, {@dont_appraise='dont_appraise'}]}) r1 = openat$md(0xffffffffffffff9c, &(0x7f0000000080)='/dev/md0\x00', 0x0, 0x0) ioctl$BLKALIGNOFF(r1, 0x127a, &(0x7f00000000c0)) ioctl$BLKPG(r1, 0x40140921, 0x0) 18:44:05 executing program 0: socket$inet6(0xa, 0x6, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f00000000c0)={@loopback, 0x800, 0x0, 0x103, 0x2}, 0x20) getsockopt$inet_sctp6_SCTP_EVENTS(r0, 0x84, 0xb, &(0x7f0000000040), &(0x7f0000000080)=0xe) ioctl$DRM_IOCTL_RM_CTX(0xffffffffffffffff, 0xc0086421, &(0x7f0000000300)={0x0, 0x1}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB='lockproto=lock_nolock,locktable=.']) 18:44:05 executing program 2: r0 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) r1 = socket$inet6(0xa, 0x80002, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x400806e, &(0x7f00000000c0)={0xa, 0x4e24, 0x0, @dev}, 0x1c) sendto$inet6(r1, &(0x7f00000009c0)="c7cfcaaa22e10542fca5c0195350f15147657e0bfc59d383a47190db88690e6fedc3040ab5809ae02a54cd429cc3338c5afa0c9dce3f91950d1f567f358ac21154159130e88cbb6c43197813b2f23f3e442f80877490b393408142ebcfea6821f543e5ee9e27032e2b75d78f1b79f5a6bb6f0645e267770ef7e8f3a92148091217450ce8581e54223eeb6486205a209bf1fe854d211c03f8c3140fc3979d824082990d119473d20e94f253c9621fac339560ae46cb24b88bf2d01559bb658e343257b90f233b81bc5c398be3bbddb23a1e5d37149eb0f4a333726cf6d5b7647306559155f1c69d6bfd145b83576f2df4d85f271fd4119db923e2412c66dd954eb59dddc7e1fd286a83971b2ba1c63b4f99702cf91f3d1ecffb8ae189c79b403805e83650c251a564942896f205640c23b0cf51fe9bd931f54a343794710a9cd53cef20938edddb2bfa3c1f72f8e79e41e30fb8f9d314abd999ba396521b6c10bec7bc9d0745a80299342f5cf89eb9d94044258fbb18cec1cdbbc016a773d3ae41e3e30248e716fd0873d31454902cbe7dcf7d644dfadc255d99652b5ed5a5b1a75e3ad49cf80178678402e9d3a755d009889b2e6138f81dc02eedcc353aceb2f7781aea08aa91be7e1e2416ba3d555b1f2237f68c5d7dcfcb1b917c292a35d6d7e7cf2cb1dd6dba5a50ce55c4638d7d38cb7afd8da02f281ab69392bc6531eb03eb97c1d075e3342c244861d04bcad8991b8f588e48ad7fe218d2f5e604bb31c59241245b485210fe418af3d6377b59d5ab128497efeced38cc5036b1f34cb89674b5179219f34b9e8e1849695d7c23cce77eb8f038ef9f2cd69d1c9e2d6b46610adbadbdad857a77f59d38cb5120709716b87c52a48de249b231d7e39985b8b58094c0d7b4c6d1671a8ff9d2daaca94df2adcff6420077df0ddbc66d00b141ffc6e28bed09a19056e52a905a72c99a04af56b22da83135808ba2bfe87a39753447e78500d16bdad52d97df73d4852a79e7ec6910701b712cfd58c62b3ade86cf6ff0cd78719fa1ae81640381cb33f4f6b03c913e820cf9eb9b5cf7df9c878596c9ac9444cad118673fe339b4b7287b310ecff4742bfea2612d79d418293f0dfe14bc819c466473438ad71ea3b1386d17a9038b1f5a9285481500f84f4c7eabbf2eb071a101c69cce8e7495bda4c28a4e88f6a258abf58579c290eeb742b2678daab3ecc8c2bf97d89e89472901e254dd63ca7d918f8a7523161e29b28f64b285da7bb4a17d0ad734c321623e246bb0b5aaa08e8e7ac42b74ba83c70a8ca80068400be6adc3f4b01ba1050b54e6e4cf72fb567fbd27b74b2bfa7b7cabc6938851c13c6df7d5aaca79afd89b5e925379b959c7929ddfa3399695343f435772d70e5cfa3550377d23f50011ad5657e94c464cd43eb85496fd3b03bcb2d9278ceb432194d9893ffa747dfe85309f256c910e31e81dcd3cd8a13744fc2874737a2ff34bf8c89f15da7cc0853434117d744e30360b38ef1a063f9ee506f048e9980054e6c5c5688d04ece6067ac55bccc9a7773a2c4e21c039d153622130faff9fd675d64ad7284bd011b9b224713a721b4b731", 0x471, 0xc001, 0x0, 0x0) r2 = open(&(0x7f0000000040)='./bus\x00', 0x17e, 0x0) write$binfmt_aout(r2, 0x0, 0x0) sendto$inet6(r1, &(0x7f0000000440)="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", 0x13c, 0x400c000, 0x0, 0xfffffeb3) setsockopt$inet6_mtu(r1, 0x29, 0x17, &(0x7f0000000140)=0x4, 0xff2f) setsockopt$inet6_udp_int(r1, 0x11, 0x1, &(0x7f0000000000), 0xa4) [ 310.470705][T11568] hfs: unable to parse mount options 18:44:05 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000100)=0x1) ioctl$TCGETS(r0, 0x8924, 0x0) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, &(0x7f0000000100)=0x1) 18:44:05 executing program 5: statx(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x2000, 0x800, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0}) syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f00000000c0), 0x200000, &(0x7f0000000240)={[{@part={'part', 0x3d, 0xa14}}, {@file_umask={'file_umask', 0x3d, 0x657936f8}}, {@type={'type', 0x3d, "6d6d69c8"}}], [{@fsmagic={'fsmagic', 0x3d, 0x6be0}}, {@obj_type={'obj_type', 0x3d, '@%\'em1\x00'}}, {@euid_lt={'euid<', r0}}, {@fsuuid={'fsuuid', 0x3d, {[0x32, 0x36, 0x65, 0x64, 0x36, 0x64, 0x39, 0x30], 0x2d, [0x66, 0x61, 0x65, 0x37], 0x2d, [0x64, 0x62, 0x64, 0x30], 0x2d, [0x36, 0x37, 0x64, 0x35], 0x2d, [0x61, 0x61, 0x31, 0x63, 0x5a, 0x38, 0x63, 0x36]}}}, {@dont_appraise='dont_appraise'}]}) r1 = openat$md(0xffffffffffffff9c, &(0x7f0000000080)='/dev/md0\x00', 0x0, 0x0) ioctl$BLKALIGNOFF(r1, 0x127a, &(0x7f00000000c0)) ioctl$BLKPG(r1, 0x40140921, 0x0) 18:44:05 executing program 4: openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x0, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000100)=0x1) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x20008000004001fe) [ 310.653806][T11572] gfs2: fsid=.: Trying to join cluster "lock_nolock", "." 18:44:05 executing program 5: statx(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x2000, 0x800, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0}) syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f00000000c0), 0x200000, &(0x7f0000000240)={[{@part={'part', 0x3d, 0xa14}}, {@file_umask={'file_umask', 0x3d, 0x657936f8}}, {@type={'type', 0x3d, "6d6d69c8"}}], [{@fsmagic={'fsmagic', 0x3d, 0x6be0}}, {@obj_type={'obj_type', 0x3d, '@%\'em1\x00'}}, {@euid_lt={'euid<', r0}}, {@fsuuid={'fsuuid', 0x3d, {[0x32, 0x36, 0x65, 0x64, 0x36, 0x64, 0x39, 0x30], 0x2d, [0x66, 0x61, 0x65, 0x37], 0x2d, [0x64, 0x62, 0x64, 0x30], 0x2d, [0x36, 0x37, 0x64, 0x35], 0x2d, [0x61, 0x61, 0x31, 0x63, 0x5a, 0x38, 0x63, 0x36]}}}, {@dont_appraise='dont_appraise'}]}) r1 = openat$md(0xffffffffffffff9c, &(0x7f0000000080)='/dev/md0\x00', 0x0, 0x0) ioctl$BLKALIGNOFF(r1, 0x127a, &(0x7f00000000c0)) ioctl$BLKPG(r1, 0x40140921, 0x0) [ 310.696027][T11572] gfs2: fsid=.: Now mounting FS... [ 310.707549][T11587] hfs: unable to parse mount options [ 310.734825][T11572] gfs2: not a GFS2 filesystem [ 310.754645][T11572] gfs2: fsid=.: can't read superblock [ 310.792393][T11572] gfs2: fsid=.: can't read superblock: -22 [ 310.934411][T11606] hfs: unable to parse mount options 18:44:05 executing program 5: statx(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x2000, 0x800, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0}) syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x9, 0x0, 0x0, 0x200000, &(0x7f0000000240)={[{@part={'part', 0x3d, 0xa14}}, {@file_umask={'file_umask', 0x3d, 0x657936f8}}, {@type={'type', 0x3d, "6d6d69c8"}}], [{@fsmagic={'fsmagic', 0x3d, 0x6be0}}, {@obj_type={'obj_type', 0x3d, '@%\'em1\x00'}}, {@euid_lt={'euid<', r0}}, {@fsuuid={'fsuuid', 0x3d, {[0x32, 0x36, 0x65, 0x64, 0x36, 0x64, 0x39, 0x30], 0x2d, [0x66, 0x61, 0x65, 0x37], 0x2d, [0x64, 0x62, 0x64, 0x30], 0x2d, [0x36, 0x37, 0x64, 0x35], 0x2d, [0x61, 0x61, 0x31, 0x63, 0x5a, 0x38, 0x63, 0x36]}}}, {@dont_appraise='dont_appraise'}]}) r1 = openat$md(0xffffffffffffff9c, &(0x7f0000000080)='/dev/md0\x00', 0x0, 0x0) ioctl$BLKALIGNOFF(r1, 0x127a, &(0x7f00000000c0)) ioctl$BLKPG(r1, 0x40140921, 0x0) 18:44:06 executing program 4: openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x0, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000100)=0x1) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x20008000004001fe) 18:44:06 executing program 0: socket$inet6(0xa, 0x6, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f00000000c0)={@loopback, 0x800, 0x0, 0x103, 0x2}, 0x20) getsockopt$inet_sctp6_SCTP_EVENTS(r0, 0x84, 0xb, &(0x7f0000000040), &(0x7f0000000080)=0xe) ioctl$DRM_IOCTL_RM_CTX(0xffffffffffffffff, 0xc0086421, &(0x7f0000000300)={0x0, 0x1}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB='lockproto=lock_nolock,locktable=.']) 18:44:06 executing program 3: ioctl$TIOCSPTLCK(0xffffffffffffffff, 0x40045431, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000380)) r2 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$TCSETAW(0xffffffffffffffff, 0x5407, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1000, &(0x7f0000000000/0x1000)=nil}) ioctl$KVM_SET_REGS(r3, 0x4090ae82, &(0x7f00000001c0)={[0x0, 0x0, 0x0, 0x2000020, 0xffffffffffffffff, 0x0, 0x4cb]}) ioctl$KVM_RUN(r3, 0xae80, 0x0) r4 = socket$inet6(0xa, 0x2, 0x0) sendfile(r4, 0xffffffffffffffff, &(0x7f0000000040), 0x0) r5 = add_key$user(&(0x7f0000000040)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)='X', 0x1, 0xfffffffffffffffe) keyctl$update(0x2, r5, &(0x7f00000006c0)="c0ca1cdbaa1aedbbed80dddaa28e15b9449e2e82cca4244c40ffd0fd4e6631c7d3d86e1339de17344340b02dd527f2d8b3ae6c1db3594e657da33c3ec668f143974a65753472df5319a6b83e1e86b8f2666c61a2e700d1c1e0ae1fc52494bd4885a5c64e9007d39fa11313805290dd6342f9775f01a02ec88f6bee22f25a377a9b143abba1264586d2779088006d5f9be82b00f10287031623f73470264cc5897f18f357aad6deb3883da88ae2266664933785a3ce72bb224a441437ea93c217", 0xc0) 18:44:06 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000100)=0x1) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000100)=0x1) [ 311.364006][T11616] hfs: unable to parse mount options 18:44:06 executing program 5: statx(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x2000, 0x800, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0}) syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x9, 0x0, 0x0, 0x200000, &(0x7f0000000240)={[{@part={'part', 0x3d, 0xa14}}, {@file_umask={'file_umask', 0x3d, 0x657936f8}}, {@type={'type', 0x3d, "6d6d69c8"}}], [{@fsmagic={'fsmagic', 0x3d, 0x6be0}}, {@obj_type={'obj_type', 0x3d, '@%\'em1\x00'}}, {@euid_lt={'euid<', r0}}, {@fsuuid={'fsuuid', 0x3d, {[0x32, 0x36, 0x65, 0x64, 0x36, 0x64, 0x39, 0x30], 0x2d, [0x66, 0x61, 0x65, 0x37], 0x2d, [0x64, 0x62, 0x64, 0x30], 0x2d, [0x36, 0x37, 0x64, 0x35], 0x2d, [0x61, 0x61, 0x31, 0x63, 0x5a, 0x38, 0x63, 0x36]}}}, {@dont_appraise='dont_appraise'}]}) r1 = openat$md(0xffffffffffffff9c, &(0x7f0000000080)='/dev/md0\x00', 0x0, 0x0) ioctl$BLKALIGNOFF(r1, 0x127a, &(0x7f00000000c0)) ioctl$BLKPG(r1, 0x40140921, 0x0) [ 311.564200][T11621] gfs2: fsid=.: Trying to join cluster "lock_nolock", "." [ 311.581698][T11621] gfs2: fsid=.: Now mounting FS... [ 311.599285][T11621] gfs2: not a GFS2 filesystem [ 311.604655][T11621] gfs2: fsid=.: can't read superblock [ 311.612369][T11621] gfs2: fsid=.: can't read superblock: -22 [ 311.693595][T11646] hfs: unable to parse mount options 18:44:06 executing program 2: open(0x0, 0xc000, 0x1e0) close(0xffffffffffffffff) gettid() r0 = getpid() sched_setattr(r0, 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x9}, 0x0) getpid() sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5, 0x0, 0x0, 0x3}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, 0x0, 0x0, 0x0, 0x0) pipe(0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) r2 = open(0x0, 0x0, 0x0) sendfile(r2, 0xffffffffffffffff, 0x0, 0x10000) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x2, 0x1, 0x0, 0x3}, 0x0) syz_genetlink_get_family_id$nl80211(0x0) r3 = openat$ttyS3(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ttyS3\x00', 0x0, 0x0) ioctl$TCSETSW(r3, 0x5453, 0x0) 18:44:06 executing program 4: openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x0, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000100)=0x1) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x20008000004001fe) 18:44:06 executing program 5: statx(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x2000, 0x800, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0}) syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x9, 0x0, 0x0, 0x200000, &(0x7f0000000240)={[{@part={'part', 0x3d, 0xa14}}, {@file_umask={'file_umask', 0x3d, 0x657936f8}}, {@type={'type', 0x3d, "6d6d69c8"}}], [{@fsmagic={'fsmagic', 0x3d, 0x6be0}}, {@obj_type={'obj_type', 0x3d, '@%\'em1\x00'}}, {@euid_lt={'euid<', r0}}, {@fsuuid={'fsuuid', 0x3d, {[0x32, 0x36, 0x65, 0x64, 0x36, 0x64, 0x39, 0x30], 0x2d, [0x66, 0x61, 0x65, 0x37], 0x2d, [0x64, 0x62, 0x64, 0x30], 0x2d, [0x36, 0x37, 0x64, 0x35], 0x2d, [0x61, 0x61, 0x31, 0x63, 0x5a, 0x38, 0x63, 0x36]}}}, {@dont_appraise='dont_appraise'}]}) r1 = openat$md(0xffffffffffffff9c, &(0x7f0000000080)='/dev/md0\x00', 0x0, 0x0) ioctl$BLKALIGNOFF(r1, 0x127a, &(0x7f00000000c0)) ioctl$BLKPG(r1, 0x40140921, 0x0) 18:44:06 executing program 0: socket$inet6(0xa, 0x6, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, &(0x7f00000000c0)={@mcast1, 0x800, 0x0, 0x103, 0x1}, 0x20) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, &(0x7f00000000c0)={@loopback, 0x800, 0x0, 0x103, 0x2}, 0x20) getsockopt$inet_sctp6_SCTP_EVENTS(0xffffffffffffffff, 0x84, 0xb, &(0x7f0000000040), &(0x7f0000000080)=0xe) ioctl$DRM_IOCTL_RM_CTX(0xffffffffffffffff, 0xc0086421, &(0x7f0000000300)={0x0, 0x1}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB='lockproto=lock_nolock,locktable=.']) 18:44:07 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$sock_int(r0, 0x1, 0xf, &(0x7f0000d1c000)=0x6, 0x4) bind$inet6(r0, &(0x7f00000001c0)={0xa, 0xce20, 0x0, @rand_addr="ffffffe000"}, 0x1c) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) setxattr$security_evm(0x0, 0x0, 0x0, 0x0, 0x0) connect$pppl2tp(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) setsockopt$sock_int(r1, 0x1, 0xf, &(0x7f0000d1c000)=0x6, 0x4) bind$inet6(r1, &(0x7f00000001c0)={0xa, 0xce20, 0x0, @rand_addr="ffffffe000"}, 0x1c) [ 312.142001][T11670] hfs: unable to parse mount options 18:44:07 executing program 5: statx(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x2000, 0x800, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0}) syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x9, 0x0, &(0x7f00000000c0), 0x0, &(0x7f0000000240)={[{@part={'part', 0x3d, 0xa14}}, {@file_umask={'file_umask', 0x3d, 0x657936f8}}, {@type={'type', 0x3d, "6d6d69c8"}}], [{@fsmagic={'fsmagic', 0x3d, 0x6be0}}, {@obj_type={'obj_type', 0x3d, '@%\'em1\x00'}}, {@euid_lt={'euid<', r0}}, {@fsuuid={'fsuuid', 0x3d, {[0x32, 0x36, 0x65, 0x64, 0x36, 0x64, 0x39, 0x30], 0x2d, [0x66, 0x61, 0x65, 0x37], 0x2d, [0x64, 0x62, 0x64, 0x30], 0x2d, [0x36, 0x37, 0x64, 0x35], 0x2d, [0x61, 0x61, 0x31, 0x63, 0x5a, 0x38, 0x63, 0x36]}}}, {@dont_appraise='dont_appraise'}]}) r1 = openat$md(0xffffffffffffff9c, &(0x7f0000000080)='/dev/md0\x00', 0x0, 0x0) ioctl$BLKALIGNOFF(r1, 0x127a, &(0x7f00000000c0)) ioctl$BLKPG(r1, 0x40140921, 0x0) [ 312.216898][T11674] gfs2: fsid=.: Trying to join cluster "lock_nolock", "." [ 312.322960][T11674] gfs2: fsid=.: Now mounting FS... 18:44:07 executing program 4: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x0, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000100)=0x1) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x20008000004001fe) [ 312.389542][T11674] gfs2: not a GFS2 filesystem 18:44:07 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x0, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000100)=0x1) [ 312.441010][T11674] gfs2: fsid=.: can't read superblock 18:44:07 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$sock_int(r0, 0x1, 0xf, &(0x7f0000d1c000)=0x6, 0x4) bind$inet6(r0, &(0x7f00000001c0)={0xa, 0xce20, 0x0, @rand_addr="ffffffe000"}, 0x1c) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) setxattr$security_evm(0x0, 0x0, 0x0, 0x0, 0x0) connect$pppl2tp(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) setsockopt$sock_int(r1, 0x1, 0xf, &(0x7f0000d1c000)=0x6, 0x4) bind$inet6(r1, &(0x7f00000001c0)={0xa, 0xce20, 0x0, @rand_addr="ffffffe000"}, 0x1c) [ 312.493246][T11674] gfs2: fsid=.: can't read superblock: -22 [ 312.514719][T11701] hfs: unable to parse mount options 18:44:07 executing program 3: ioctl$TIOCSPTLCK(0xffffffffffffffff, 0x40045431, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000380)) r2 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$TCSETAW(0xffffffffffffffff, 0x5407, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1000, &(0x7f0000000000/0x1000)=nil}) ioctl$KVM_SET_REGS(r3, 0x4090ae82, &(0x7f00000001c0)={[0x0, 0x0, 0x0, 0x2000020, 0xffffffffffffffff, 0x0, 0x4cb]}) ioctl$KVM_RUN(r3, 0xae80, 0x0) r4 = socket$inet6(0xa, 0x2, 0x0) sendfile(r4, 0xffffffffffffffff, &(0x7f0000000040), 0x0) r5 = add_key$user(&(0x7f0000000040)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)='X', 0x1, 0xfffffffffffffffe) keyctl$update(0x2, r5, &(0x7f00000006c0)="c0ca1cdbaa1aedbbed80dddaa28e15b9449e2e82cca4244c40ffd0fd4e6631c7d3d86e1339de17344340b02dd527f2d8b3ae6c1db3594e657da33c3ec668f143974a65753472df5319a6b83e1e86b8f2666c61a2e700d1c1e0ae1fc52494bd4885a5c64e9007d39fa11313805290dd6342f9775f01a02ec88f6bee22f25a377a9b143abba1264586d2779088006d5f9be82b00f10287031623f73470264cc5897f18f357aad6deb3883da88ae2266664933785a3ce72bb224a441437ea93c217", 0xc0) 18:44:07 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000029000/0x18000)=nil, &(0x7f0000000240)=[@text32={0x20, &(0x7f00000000c0)="b9800000c00f3235010000000f309a0900000065002ed8ddc74424008fc4bd87c7442402c43a727fc7442406000000000f011424f30f090f013a360f06c4c18d72d68366baa100ed", 0xfffffffffffffeb4}], 0xb3e, 0x0, 0x0, 0xfffffe41) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f00000002c0)={[0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0xc62]}) ioctl$KVM_RUN(r2, 0xae80, 0x0) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x2, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x0, 0x0, 0x80}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 18:44:07 executing program 5: statx(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x2000, 0x800, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0}) syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x9, 0x0, &(0x7f00000000c0), 0x0, &(0x7f0000000240)={[{@part={'part', 0x3d, 0xa14}}, {@file_umask={'file_umask', 0x3d, 0x657936f8}}, {@type={'type', 0x3d, "6d6d69c8"}}], [{@fsmagic={'fsmagic', 0x3d, 0x6be0}}, {@obj_type={'obj_type', 0x3d, '@%\'em1\x00'}}, {@euid_lt={'euid<', r0}}, {@fsuuid={'fsuuid', 0x3d, {[0x32, 0x36, 0x65, 0x64, 0x36, 0x64, 0x39, 0x30], 0x2d, [0x66, 0x61, 0x65, 0x37], 0x2d, [0x64, 0x62, 0x64, 0x30], 0x2d, [0x36, 0x37, 0x64, 0x35], 0x2d, [0x61, 0x61, 0x31, 0x63, 0x5a, 0x38, 0x63, 0x36]}}}, {@dont_appraise='dont_appraise'}]}) r1 = openat$md(0xffffffffffffff9c, &(0x7f0000000080)='/dev/md0\x00', 0x0, 0x0) ioctl$BLKALIGNOFF(r1, 0x127a, &(0x7f00000000c0)) ioctl$BLKPG(r1, 0x40140921, 0x0) 18:44:07 executing program 0: socket$inet6(0xa, 0x6, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, &(0x7f00000000c0)={@mcast1, 0x800, 0x0, 0x103, 0x1}, 0x20) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, &(0x7f00000000c0)={@loopback, 0x800, 0x0, 0x103, 0x2}, 0x20) getsockopt$inet_sctp6_SCTP_EVENTS(0xffffffffffffffff, 0x84, 0xb, &(0x7f0000000040), &(0x7f0000000080)=0xe) ioctl$DRM_IOCTL_RM_CTX(0xffffffffffffffff, 0xc0086421, &(0x7f0000000300)={0x0, 0x1}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB='lockproto=lock_nolock,locktable=.']) 18:44:07 executing program 5: statx(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x2000, 0x800, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0}) syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x9, 0x0, &(0x7f00000000c0), 0x0, &(0x7f0000000240)={[{@part={'part', 0x3d, 0xa14}}, {@file_umask={'file_umask', 0x3d, 0x657936f8}}, {@type={'type', 0x3d, "6d6d69c8"}}], [{@fsmagic={'fsmagic', 0x3d, 0x6be0}}, {@obj_type={'obj_type', 0x3d, '@%\'em1\x00'}}, {@euid_lt={'euid<', r0}}, {@fsuuid={'fsuuid', 0x3d, {[0x32, 0x36, 0x65, 0x64, 0x36, 0x64, 0x39, 0x30], 0x2d, [0x66, 0x61, 0x65, 0x37], 0x2d, [0x64, 0x62, 0x64, 0x30], 0x2d, [0x36, 0x37, 0x64, 0x35], 0x2d, [0x61, 0x61, 0x31, 0x63, 0x5a, 0x38, 0x63, 0x36]}}}, {@dont_appraise='dont_appraise'}]}) r1 = openat$md(0xffffffffffffff9c, &(0x7f0000000080)='/dev/md0\x00', 0x0, 0x0) ioctl$BLKALIGNOFF(r1, 0x127a, &(0x7f00000000c0)) ioctl$BLKPG(r1, 0x40140921, 0x0) [ 312.942814][T11730] hfs: unable to parse mount options 18:44:07 executing program 4: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x0, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000100)=0x1) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x20008000004001fe) [ 313.054501][T11727] kvm [11726]: vcpu0, guest rIP: 0xcc disabled perfctr wrmsr: 0x186 data 0x1 18:44:08 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000100)=0x1) [ 313.110228][T11727] kvm [11726]: vcpu0, guest rIP: 0xcc disabled perfctr wrmsr: 0x186 data 0x1 [ 313.152373][T11727] kvm [11726]: vcpu0, guest rIP: 0xcc disabled perfctr wrmsr: 0x186 data 0x1 [ 313.163098][T11727] kvm [11726]: vcpu0, guest rIP: 0xcc disabled perfctr wrmsr: 0x186 data 0x1 [ 313.191137][T11749] hfs: unable to parse mount options [ 313.197428][T11727] kvm [11726]: vcpu0, guest rIP: 0xcc disabled perfctr wrmsr: 0x186 data 0x1 [ 313.215082][T11727] kvm [11726]: vcpu0, guest rIP: 0xcc disabled perfctr wrmsr: 0x186 data 0x1 [ 313.241649][T11727] kvm [11726]: vcpu0, guest rIP: 0xcc disabled perfctr wrmsr: 0x186 data 0x1 [ 313.250841][T11727] kvm [11726]: vcpu0, guest rIP: 0xcc disabled perfctr wrmsr: 0x186 data 0x1 [ 313.274032][T11727] kvm [11726]: vcpu0, guest rIP: 0xcc disabled perfctr wrmsr: 0x186 data 0x1 [ 313.282742][T11745] gfs2: fsid=.: Trying to join cluster "lock_nolock", "." [ 313.290661][T11727] kvm [11726]: vcpu0, guest rIP: 0xcc disabled perfctr wrmsr: 0x186 data 0x1 18:44:08 executing program 5: statx(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x2000, 0x800, &(0x7f0000000140)) syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x9, 0x0, &(0x7f00000000c0), 0x200000, 0x0) r0 = openat$md(0xffffffffffffff9c, &(0x7f0000000080)='/dev/md0\x00', 0x0, 0x0) ioctl$BLKALIGNOFF(r0, 0x127a, &(0x7f00000000c0)) ioctl$BLKPG(r0, 0x40140921, 0x0) [ 313.313285][T11745] gfs2: fsid=.: Now mounting FS... [ 313.353163][T11745] gfs2: not a GFS2 filesystem [ 313.369536][T11745] gfs2: fsid=.: can't read superblock 18:44:08 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x88d}, 0x0) getpid() sched_setattr(0x0, &(0x7f0000000040)={0x38}, 0x0) pipe(&(0x7f0000000ac0)={0xffffffffffffffff, 0xffffffffffffffff}) write(r0, &(0x7f0000000340), 0x41395527) pipe(0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) vmsplice(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x3ff, 0x0) keyctl$update(0x2, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x41, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffff9, 0x5}, 0x0, 0x0, 0x0, 0x1, 0x1}, 0x0, 0xb, 0xffffffffffffffff, 0x0) msync(&(0x7f0000952000/0x2000)=nil, 0x87abbe8d1cc6ad9, 0x4) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) 18:44:08 executing program 3: ioctl$TIOCSPTLCK(0xffffffffffffffff, 0x40045431, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000380)) r2 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$TCSETAW(0xffffffffffffffff, 0x5407, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1000, &(0x7f0000000000/0x1000)=nil}) ioctl$KVM_SET_REGS(r3, 0x4090ae82, &(0x7f00000001c0)={[0x0, 0x0, 0x0, 0x2000020, 0xffffffffffffffff, 0x0, 0x4cb]}) ioctl$KVM_RUN(r3, 0xae80, 0x0) r4 = socket$inet6(0xa, 0x2, 0x0) sendfile(r4, 0xffffffffffffffff, &(0x7f0000000040), 0x0) keyctl$update(0x2, 0x0, &(0x7f00000006c0)="c0ca1cdbaa1aedbbed80dddaa28e15b9449e2e82cca4244c40ffd0fd4e6631c7d3d86e1339de17344340b02dd527f2d8b3ae6c1db3594e657da33c3ec668f143974a65753472df5319a6b83e1e86b8f2666c61a2e700d1c1e0ae1fc52494bd4885a5c64e9007d39fa11313805290dd6342f9775f01a02ec88f6bee22f25a377a9b143abba1264586d2779088006d5f9be82b00f10287031623f73470264cc5897f18f357aad6deb3883da88ae2266664933785a3ce72bb224a441437ea93c217", 0xc0) add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x9a, 0xfffffffffffffffd) 18:44:08 executing program 4: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x0, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000100)=0x1) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x20008000004001fe) [ 313.397605][T11745] gfs2: fsid=.: can't read superblock: -22 [ 313.416512][T11773] hfs: can't find a HFS filesystem on dev loop5 18:44:08 executing program 5: statx(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x2000, 0x800, &(0x7f0000000140)) syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x9, 0x0, &(0x7f00000000c0), 0x200000, 0x0) r0 = openat$md(0xffffffffffffff9c, &(0x7f0000000080)='/dev/md0\x00', 0x0, 0x0) ioctl$BLKALIGNOFF(r0, 0x127a, &(0x7f00000000c0)) ioctl$BLKPG(r0, 0x40140921, 0x0) [ 313.725050][T11785] hfs: can't find a HFS filesystem on dev loop5 18:44:08 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000100)=0x1) 18:44:08 executing program 5: statx(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x2000, 0x800, &(0x7f0000000140)) syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x9, 0x0, &(0x7f00000000c0), 0x200000, 0x0) r0 = openat$md(0xffffffffffffff9c, &(0x7f0000000080)='/dev/md0\x00', 0x0, 0x0) ioctl$BLKALIGNOFF(r0, 0x127a, &(0x7f00000000c0)) ioctl$BLKPG(r0, 0x40140921, 0x0) 18:44:08 executing program 0: setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, &(0x7f00000000c0)={@mcast1, 0x800, 0x0, 0x103, 0x1}, 0x20) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, &(0x7f00000000c0)={@loopback, 0x800, 0x0, 0x103, 0x2}, 0x20) getsockopt$inet_sctp6_SCTP_EVENTS(0xffffffffffffffff, 0x84, 0xb, &(0x7f0000000040), &(0x7f0000000080)=0xe) ioctl$DRM_IOCTL_RM_CTX(0xffffffffffffffff, 0xc0086421, &(0x7f0000000300)={0x0, 0x1}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB='lockproto=lock_nolock,locktable=.']) 18:44:08 executing program 4: socketpair$unix(0x1, 0x5, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x0, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000100)=0x1) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x20008000004001fe) 18:44:08 executing program 3: ioctl$TIOCSPTLCK(0xffffffffffffffff, 0x40045431, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000380)) r2 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$TCSETAW(0xffffffffffffffff, 0x5407, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1000, &(0x7f0000000000/0x1000)=nil}) ioctl$KVM_SET_REGS(r3, 0x4090ae82, &(0x7f00000001c0)={[0x0, 0x0, 0x0, 0x2000020, 0xffffffffffffffff, 0x0, 0x4cb]}) ioctl$KVM_RUN(r3, 0xae80, 0x0) r4 = socket$inet6(0xa, 0x2, 0x0) sendfile(r4, 0xffffffffffffffff, &(0x7f0000000040), 0x0) keyctl$update(0x2, 0x0, &(0x7f00000006c0)="c0ca1cdbaa1aedbbed80dddaa28e15b9449e2e82cca4244c40ffd0fd4e6631c7d3d86e1339de17344340b02dd527f2d8b3ae6c1db3594e657da33c3ec668f143974a65753472df5319a6b83e1e86b8f2666c61a2e700d1c1e0ae1fc52494bd4885a5c64e9007d39fa11313805290dd6342f9775f01a02ec88f6bee22f25a377a9b143abba1264586d2779088006d5f9be82b00f10287031623f73470264cc5897f18f357aad6deb3883da88ae2266664933785a3ce72bb224a441437ea93c217", 0xc0) add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x9a, 0xfffffffffffffffd) [ 314.014700][T11813] hfs: can't find a HFS filesystem on dev loop5 18:44:08 executing program 5: statx(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x2000, 0x800, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0}) syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x9, 0x0, &(0x7f00000000c0), 0x200000, &(0x7f0000000240)={[{@part={'part', 0x3d, 0xa14}}, {@file_umask={'file_umask', 0x3d, 0x657936f8}}], [{@fsmagic={'fsmagic', 0x3d, 0x6be0}}, {@obj_type={'obj_type', 0x3d, '@%\'em1\x00'}}, {@euid_lt={'euid<', r0}}, {@fsuuid={'fsuuid', 0x3d, {[0x32, 0x36, 0x65, 0x64, 0x36, 0x64, 0x39, 0x30], 0x2d, [0x66, 0x61, 0x65, 0x37], 0x2d, [0x64, 0x62, 0x64, 0x30], 0x2d, [0x36, 0x37, 0x64, 0x35], 0x2d, [0x61, 0x61, 0x31, 0x63, 0x5a, 0x38, 0x63, 0x36]}}}, {@dont_appraise='dont_appraise'}]}) r1 = openat$md(0xffffffffffffff9c, &(0x7f0000000080)='/dev/md0\x00', 0x0, 0x0) ioctl$BLKALIGNOFF(r1, 0x127a, &(0x7f00000000c0)) ioctl$BLKPG(r1, 0x40140921, 0x0) [ 314.097929][T11817] gfs2: fsid=.: Trying to join cluster "lock_nolock", "." [ 314.120336][T11817] gfs2: fsid=.: Now mounting FS... 18:44:09 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000100)=0x1) [ 314.154794][T11817] gfs2: not a GFS2 filesystem [ 314.179450][T11817] gfs2: fsid=.: can't read superblock [ 314.206069][T11817] gfs2: fsid=.: can't read superblock: -22 [ 314.233191][T11836] hfs: unable to parse mount options 18:44:09 executing program 2: r0 = openat$adsp1(0xffffffffffffff9c, &(0x7f0000000040)='/dev/adsp1\x00', 0x0, 0x0) ioctl$SNDCTL_DSP_STEREO(r0, 0x8010500d, &(0x7f0000000080)) 18:44:09 executing program 3: ioctl$TIOCSPTLCK(0xffffffffffffffff, 0x40045431, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000380)) r2 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$TCSETAW(0xffffffffffffffff, 0x5407, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1000, &(0x7f0000000000/0x1000)=nil}) ioctl$KVM_SET_REGS(r3, 0x4090ae82, &(0x7f00000001c0)={[0x0, 0x0, 0x0, 0x2000020, 0xffffffffffffffff, 0x0, 0x4cb]}) ioctl$KVM_RUN(r3, 0xae80, 0x0) r4 = socket$inet6(0xa, 0x2, 0x0) sendfile(r4, 0xffffffffffffffff, &(0x7f0000000040), 0x0) keyctl$update(0x2, 0x0, &(0x7f00000006c0)="c0ca1cdbaa1aedbbed80dddaa28e15b9449e2e82cca4244c40ffd0fd4e6631c7d3d86e1339de17344340b02dd527f2d8b3ae6c1db3594e657da33c3ec668f143974a65753472df5319a6b83e1e86b8f2666c61a2e700d1c1e0ae1fc52494bd4885a5c64e9007d39fa11313805290dd6342f9775f01a02ec88f6bee22f25a377a9b143abba1264586d2779088006d5f9be82b00f10287031623f73470264cc5897f18f357aad6deb3883da88ae2266664933785a3ce72bb224a441437ea93c217", 0xc0) add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x9a, 0xfffffffffffffffd) 18:44:09 executing program 5: statx(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x2000, 0x800, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0}) syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x9, 0x0, &(0x7f00000000c0), 0x200000, &(0x7f0000000240)={[{@part={'part', 0x3d, 0xa14}}, {@file_umask={'file_umask', 0x3d, 0x657936f8}}], [{@fsmagic={'fsmagic', 0x3d, 0x6be0}}, {@obj_type={'obj_type', 0x3d, '@%\'em1\x00'}}, {@euid_lt={'euid<', r0}}, {@fsuuid={'fsuuid', 0x3d, {[0x32, 0x36, 0x65, 0x64, 0x36, 0x64, 0x39, 0x30], 0x2d, [0x66, 0x61, 0x65, 0x37], 0x2d, [0x64, 0x62, 0x64, 0x30], 0x2d, [0x36, 0x37, 0x64, 0x35], 0x2d, [0x61, 0x61, 0x31, 0x63, 0x5a, 0x38, 0x63, 0x36]}}}, {@dont_appraise='dont_appraise'}]}) r1 = openat$md(0xffffffffffffff9c, &(0x7f0000000080)='/dev/md0\x00', 0x0, 0x0) ioctl$BLKALIGNOFF(r1, 0x127a, &(0x7f00000000c0)) ioctl$BLKPG(r1, 0x40140921, 0x0) 18:44:09 executing program 0: setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, &(0x7f00000000c0)={@mcast1, 0x800, 0x0, 0x103, 0x1}, 0x20) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, &(0x7f00000000c0)={@loopback, 0x800, 0x0, 0x103, 0x2}, 0x20) getsockopt$inet_sctp6_SCTP_EVENTS(0xffffffffffffffff, 0x84, 0xb, &(0x7f0000000040), &(0x7f0000000080)=0xe) ioctl$DRM_IOCTL_RM_CTX(0xffffffffffffffff, 0xc0086421, &(0x7f0000000300)={0x0, 0x1}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB='lockproto=lock_nolock,locktable=.']) 18:44:09 executing program 4: socketpair$unix(0x1, 0x5, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x0, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000100)=0x1) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x20008000004001fe) 18:44:09 executing program 2: socket$inet6(0xa, 0x5, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) syz_open_procfs(0x0, &(0x7f0000000600)='net/if_inet6\x00') eventfd2(0x0, 0x0) eventfd2(0x0, 0x0) fcntl$dupfd(r0, 0x0, r0) socket$inet6_tcp(0xa, 0x1, 0x0) pipe2(&(0x7f0000002380), 0x0) pipe(&(0x7f0000000100)) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x1, 0x803, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x5603}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macvlan={{0xc, 0x1, 'macvlan\x00'}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r3}]}, 0x3c}}, 0x0) [ 314.615164][T11860] hfs: unable to parse mount options 18:44:09 executing program 1: openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x0, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000100)=0x1) 18:44:09 executing program 5: statx(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x2000, 0x800, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0}) syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x9, 0x0, &(0x7f00000000c0), 0x200000, &(0x7f0000000240)={[{@part={'part', 0x3d, 0xa14}}, {@file_umask={'file_umask', 0x3d, 0x657936f8}}], [{@fsmagic={'fsmagic', 0x3d, 0x6be0}}, {@obj_type={'obj_type', 0x3d, '@%\'em1\x00'}}, {@euid_lt={'euid<', r0}}, {@fsuuid={'fsuuid', 0x3d, {[0x32, 0x36, 0x65, 0x64, 0x36, 0x64, 0x39, 0x30], 0x2d, [0x66, 0x61, 0x65, 0x37], 0x2d, [0x64, 0x62, 0x64, 0x30], 0x2d, [0x36, 0x37, 0x64, 0x35], 0x2d, [0x61, 0x61, 0x31, 0x63, 0x5a, 0x38, 0x63, 0x36]}}}, {@dont_appraise='dont_appraise'}]}) r1 = openat$md(0xffffffffffffff9c, &(0x7f0000000080)='/dev/md0\x00', 0x0, 0x0) ioctl$BLKALIGNOFF(r1, 0x127a, &(0x7f00000000c0)) ioctl$BLKPG(r1, 0x40140921, 0x0) [ 314.810069][T11867] gfs2: fsid=.: Trying to join cluster "lock_nolock", "." [ 314.866170][T11867] gfs2: fsid=.: Now mounting FS... 18:44:09 executing program 5: statx(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x2000, 0x800, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0}) syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x9, 0x0, &(0x7f00000000c0), 0x200000, &(0x7f0000000240)={[{@part={'part', 0x3d, 0xa14}}, {@type={'type', 0x3d, "6d6d69c8"}}], [{@fsmagic={'fsmagic', 0x3d, 0x6be0}}, {@obj_type={'obj_type', 0x3d, '@%\'em1\x00'}}, {@euid_lt={'euid<', r0}}, {@fsuuid={'fsuuid', 0x3d, {[0x32, 0x36, 0x65, 0x64, 0x36, 0x64, 0x39, 0x30], 0x2d, [0x66, 0x61, 0x65, 0x37], 0x2d, [0x64, 0x62, 0x64, 0x30], 0x2d, [0x36, 0x37, 0x64, 0x35], 0x2d, [0x61, 0x61, 0x31, 0x63, 0x5a, 0x38, 0x63, 0x36]}}}, {@dont_appraise='dont_appraise'}]}) r1 = openat$md(0xffffffffffffff9c, &(0x7f0000000080)='/dev/md0\x00', 0x0, 0x0) ioctl$BLKALIGNOFF(r1, 0x127a, &(0x7f00000000c0)) ioctl$BLKPG(r1, 0x40140921, 0x0) [ 314.933968][T11867] gfs2: not a GFS2 filesystem [ 314.953986][T11886] hfs: unable to parse mount options [ 314.962231][T11876] device bridge0 entered promiscuous mode [ 314.977054][T11867] gfs2: fsid=.: can't read superblock [ 315.000951][T11867] gfs2: fsid=.: can't read superblock: -22 18:44:09 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x88d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) socket$inet6(0xa, 0x2, 0x0) pipe(&(0x7f0000000ac0)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000340), 0x41395527) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) write$binfmt_aout(r3, &(0x7f0000000a40)=ANY=[], 0x0) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) clone(0x503, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_open_procfs(0x0, 0x0) ioctl$sock_inet_SIOCSARP(0xffffffffffffffff, 0x8955, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x3ff, 0x0) keyctl$update(0x2, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffff9, 0x5}, 0x0, 0x0, 0x0, 0x1, 0x1}, 0x0, 0xb, 0xffffffffffffffff, 0x0) msync(&(0x7f0000952000/0x2000)=nil, 0x87abbe8d1cc6ad9, 0x4) socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, &(0x7f0000000140)) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) [ 315.176665][T11908] hfs: unable to parse mount options 18:44:10 executing program 5: statx(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x2000, 0x800, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0}) syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x9, 0x0, &(0x7f00000000c0), 0x200000, &(0x7f0000000240)={[{@part={'part', 0x3d, 0xa14}}, {@type={'type', 0x3d, "6d6d69c8"}}], [{@fsmagic={'fsmagic', 0x3d, 0x6be0}}, {@obj_type={'obj_type', 0x3d, '@%\'em1\x00'}}, {@euid_lt={'euid<', r0}}, {@fsuuid={'fsuuid', 0x3d, {[0x32, 0x36, 0x65, 0x64, 0x36, 0x64, 0x39, 0x30], 0x2d, [0x66, 0x61, 0x65, 0x37], 0x2d, [0x64, 0x62, 0x64, 0x30], 0x2d, [0x36, 0x37, 0x64, 0x35], 0x2d, [0x61, 0x61, 0x31, 0x63, 0x5a, 0x38, 0x63, 0x36]}}}, {@dont_appraise='dont_appraise'}]}) r1 = openat$md(0xffffffffffffff9c, &(0x7f0000000080)='/dev/md0\x00', 0x0, 0x0) ioctl$BLKALIGNOFF(r1, 0x127a, &(0x7f00000000c0)) ioctl$BLKPG(r1, 0x40140921, 0x0) 18:44:10 executing program 2: r0 = fanotify_init(0x0, 0x0) r1 = epoll_create1(0x0) r2 = epoll_create1(0x0) r3 = fcntl$dupfd(r2, 0x2, 0xffffffffffffffff) close(r3) r4 = fcntl$dupfd(r1, 0x2, 0xffffffffffffffff) fanotify_mark(r0, 0x125, 0x800000b, r4, 0x0) 18:44:10 executing program 2: 18:44:10 executing program 3: ioctl$TIOCSPTLCK(0xffffffffffffffff, 0x40045431, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000380)) r2 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$TCSETAW(0xffffffffffffffff, 0x5407, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1000, &(0x7f0000000000/0x1000)=nil}) ioctl$KVM_SET_REGS(r3, 0x4090ae82, &(0x7f00000001c0)={[0x0, 0x0, 0x0, 0x2000020, 0xffffffffffffffff, 0x0, 0x4cb]}) ioctl$KVM_RUN(r3, 0xae80, 0x0) socket$inet6(0xa, 0x2, 0x0) r4 = add_key$user(&(0x7f0000000040)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)='X', 0x1, 0xfffffffffffffffe) keyctl$update(0x2, r4, &(0x7f00000006c0)="c0ca1cdbaa1aedbbed80dddaa28e15b9449e2e82cca4244c40ffd0fd4e6631c7d3d86e1339de17344340b02dd527f2d8b3ae6c1db3594e657da33c3ec668f143974a65753472df5319a6b83e1e86b8f2666c61a2e700d1c1e0ae1fc52494bd4885a5c64e9007d39fa11313805290dd6342f9775f01a02ec88f6bee22f25a377a9b143abba1264586d2779088006d5f9be82b00f10287031623f73470264cc5897f18f357aad6deb3883da88ae2266664933785a3ce72bb224a441437ea93c217", 0xc0) add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x9a, 0xfffffffffffffffd) [ 315.416939][T11924] hfs: unable to parse mount options 18:44:10 executing program 5: statx(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x2000, 0x800, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0}) syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x9, 0x0, &(0x7f00000000c0), 0x200000, &(0x7f0000000240)={[{@part={'part', 0x3d, 0xa14}}, {@type={'type', 0x3d, "6d6d69c8"}}], [{@fsmagic={'fsmagic', 0x3d, 0x6be0}}, {@obj_type={'obj_type', 0x3d, '@%\'em1\x00'}}, {@euid_lt={'euid<', r0}}, {@fsuuid={'fsuuid', 0x3d, {[0x32, 0x36, 0x65, 0x64, 0x36, 0x64, 0x39, 0x30], 0x2d, [0x66, 0x61, 0x65, 0x37], 0x2d, [0x64, 0x62, 0x64, 0x30], 0x2d, [0x36, 0x37, 0x64, 0x35], 0x2d, [0x61, 0x61, 0x31, 0x63, 0x5a, 0x38, 0x63, 0x36]}}}, {@dont_appraise='dont_appraise'}]}) r1 = openat$md(0xffffffffffffff9c, &(0x7f0000000080)='/dev/md0\x00', 0x0, 0x0) ioctl$BLKALIGNOFF(r1, 0x127a, &(0x7f00000000c0)) ioctl$BLKPG(r1, 0x40140921, 0x0) 18:44:10 executing program 0: setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, 0x0, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, &(0x7f00000000c0)={@loopback, 0x800, 0x0, 0x103, 0x2}, 0x20) getsockopt$inet_sctp6_SCTP_EVENTS(0xffffffffffffffff, 0x84, 0xb, &(0x7f0000000040), &(0x7f0000000080)=0xe) ioctl$DRM_IOCTL_RM_CTX(0xffffffffffffffff, 0xc0086421, &(0x7f0000000300)={0x0, 0x1}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB='lockproto=lock_nolock,locktable=.']) 18:44:10 executing program 2: 18:44:10 executing program 4: socketpair$unix(0x1, 0x5, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x0, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000100)=0x1) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x20008000004001fe) 18:44:10 executing program 1: openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000100)=0x1) 18:44:10 executing program 2: [ 315.675457][T11941] hfs: unable to parse mount options 18:44:10 executing program 2: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) getsockopt$bt_l2cap_L2CAP_CONNINFO(r0, 0x6, 0x2, 0x0, &(0x7f00000001c0)) 18:44:10 executing program 5: statx(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x2000, 0x800, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0}) syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x9, 0x0, &(0x7f00000000c0), 0x200000, &(0x7f0000000240)={[{@part={'part', 0x3d, 0xa14}}, {@file_umask={'file_umask'}}, {@type={'type', 0x3d, "6d6d69c8"}}], [{@fsmagic={'fsmagic', 0x3d, 0x6be0}}, {@obj_type={'obj_type', 0x3d, '@%\'em1\x00'}}, {@euid_lt={'euid<', r0}}, {@fsuuid={'fsuuid', 0x3d, {[0x32, 0x36, 0x65, 0x64, 0x36, 0x64, 0x39, 0x30], 0x2d, [0x66, 0x61, 0x65, 0x37], 0x2d, [0x64, 0x62, 0x64, 0x30], 0x2d, [0x36, 0x37, 0x64, 0x35], 0x2d, [0x61, 0x61, 0x31, 0x63, 0x5a, 0x38, 0x63, 0x36]}}}, {@dont_appraise='dont_appraise'}]}) r1 = openat$md(0xffffffffffffff9c, &(0x7f0000000080)='/dev/md0\x00', 0x0, 0x0) ioctl$BLKALIGNOFF(r1, 0x127a, &(0x7f00000000c0)) ioctl$BLKPG(r1, 0x40140921, 0x0) 18:44:10 executing program 2: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) getsockopt$bt_l2cap_L2CAP_CONNINFO(r0, 0x6, 0x2, 0x0, &(0x7f00000001c0)) 18:44:10 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000100)=0x1) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x20008000004001fe) [ 315.893998][T11952] gfs2: fsid=.: Trying to join cluster "lock_nolock", "." [ 315.913074][T11952] gfs2: fsid=.: Now mounting FS... [ 315.929626][T11952] gfs2: not a GFS2 filesystem [ 315.961249][T11952] gfs2: fsid=.: can't read superblock [ 315.996288][T11952] gfs2: fsid=.: can't read superblock: -22 [ 316.003731][T11974] hfs: unable to parse mount options 18:44:10 executing program 1: openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000100)=0x1) 18:44:11 executing program 3: ioctl$TIOCSPTLCK(0xffffffffffffffff, 0x40045431, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000380)) r2 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$TCSETAW(0xffffffffffffffff, 0x5407, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1000, &(0x7f0000000000/0x1000)=nil}) ioctl$KVM_SET_REGS(r3, 0x4090ae82, &(0x7f00000001c0)={[0x0, 0x0, 0x0, 0x2000020, 0xffffffffffffffff, 0x0, 0x4cb]}) ioctl$KVM_RUN(r3, 0xae80, 0x0) socket$inet6(0xa, 0x2, 0x0) r4 = add_key$user(&(0x7f0000000040)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)='X', 0x1, 0xfffffffffffffffe) keyctl$update(0x2, r4, &(0x7f00000006c0)="c0ca1cdbaa1aedbbed80dddaa28e15b9449e2e82cca4244c40ffd0fd4e6631c7d3d86e1339de17344340b02dd527f2d8b3ae6c1db3594e657da33c3ec668f143974a65753472df5319a6b83e1e86b8f2666c61a2e700d1c1e0ae1fc52494bd4885a5c64e9007d39fa11313805290dd6342f9775f01a02ec88f6bee22f25a377a9b143abba1264586d2779088006d5f9be82b00f10287031623f73470264cc5897f18f357aad6deb3883da88ae2266664933785a3ce72bb224a441437ea93c217", 0xc0) add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x9a, 0xfffffffffffffffd) 18:44:11 executing program 2: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) getsockopt$bt_l2cap_L2CAP_CONNINFO(r0, 0x6, 0x2, 0x0, &(0x7f00000001c0)) 18:44:11 executing program 5: statx(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x2000, 0x800, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0}) syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x9, 0x0, &(0x7f00000000c0), 0x200000, &(0x7f0000000240)={[{@part={'part', 0x3d, 0xa14}}, {@file_umask={'file_umask'}}, {@type={'type', 0x3d, "6d6d69c8"}}], [{@fsmagic={'fsmagic', 0x3d, 0x6be0}}, {@obj_type={'obj_type', 0x3d, '@%\'em1\x00'}}, {@euid_lt={'euid<', r0}}, {@fsuuid={'fsuuid', 0x3d, {[0x32, 0x36, 0x65, 0x64, 0x36, 0x64, 0x39, 0x30], 0x2d, [0x66, 0x61, 0x65, 0x37], 0x2d, [0x64, 0x62, 0x64, 0x30], 0x2d, [0x36, 0x37, 0x64, 0x35], 0x2d, [0x61, 0x61, 0x31, 0x63, 0x5a, 0x38, 0x63, 0x36]}}}, {@dont_appraise='dont_appraise'}]}) r1 = openat$md(0xffffffffffffff9c, &(0x7f0000000080)='/dev/md0\x00', 0x0, 0x0) ioctl$BLKALIGNOFF(r1, 0x127a, &(0x7f00000000c0)) ioctl$BLKPG(r1, 0x40140921, 0x0) 18:44:11 executing program 2: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) getsockopt$bt_l2cap_L2CAP_CONNINFO(r0, 0x6, 0x2, 0x0, &(0x7f00000001c0)) 18:44:11 executing program 0: setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, 0x0, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, &(0x7f00000000c0)={@loopback, 0x800, 0x0, 0x103, 0x2}, 0x20) getsockopt$inet_sctp6_SCTP_EVENTS(0xffffffffffffffff, 0x84, 0xb, &(0x7f0000000040), &(0x7f0000000080)=0xe) ioctl$DRM_IOCTL_RM_CTX(0xffffffffffffffff, 0xc0086421, &(0x7f0000000300)={0x0, 0x1}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB='lockproto=lock_nolock,locktable=.']) 18:44:11 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000100)=0x1) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x20008000004001fe) 18:44:11 executing program 2: getsockopt$bt_l2cap_L2CAP_CONNINFO(0xffffffffffffffff, 0x6, 0x2, 0x0, &(0x7f00000001c0)) [ 316.597503][T12017] hfs: unable to parse mount options 18:44:11 executing program 1: openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000100)=0x1) 18:44:11 executing program 2: getsockopt$bt_l2cap_L2CAP_CONNINFO(0xffffffffffffffff, 0x6, 0x2, 0x0, &(0x7f00000001c0)) 18:44:11 executing program 1: openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000100)=0x1) 18:44:11 executing program 5: statx(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x2000, 0x800, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0}) syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x9, 0x0, &(0x7f00000000c0), 0x200000, &(0x7f0000000240)={[{@part={'part', 0x3d, 0xa14}}, {@file_umask={'file_umask'}}, {@type={'type', 0x3d, "6d6d69c8"}}], [{@fsmagic={'fsmagic', 0x3d, 0x6be0}}, {@obj_type={'obj_type', 0x3d, '@%\'em1\x00'}}, {@euid_lt={'euid<', r0}}, {@fsuuid={'fsuuid', 0x3d, {[0x32, 0x36, 0x65, 0x64, 0x36, 0x64, 0x39, 0x30], 0x2d, [0x66, 0x61, 0x65, 0x37], 0x2d, [0x64, 0x62, 0x64, 0x30], 0x2d, [0x36, 0x37, 0x64, 0x35], 0x2d, [0x61, 0x61, 0x31, 0x63, 0x5a, 0x38, 0x63, 0x36]}}}, {@dont_appraise='dont_appraise'}]}) r1 = openat$md(0xffffffffffffff9c, &(0x7f0000000080)='/dev/md0\x00', 0x0, 0x0) ioctl$BLKALIGNOFF(r1, 0x127a, &(0x7f00000000c0)) ioctl$BLKPG(r1, 0x40140921, 0x0) [ 316.730178][T12019] gfs2: fsid=.: Trying to join cluster "lock_nolock", "." [ 316.787163][T12019] gfs2: fsid=.: Now mounting FS... 18:44:11 executing program 1: openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000100)=0x1) [ 316.814375][T12019] gfs2: not a GFS2 filesystem [ 316.823044][T12019] gfs2: fsid=.: can't read superblock [ 316.840834][T12019] gfs2: fsid=.: can't read superblock: -22 [ 316.944017][T12050] hfs: unable to parse mount options 18:44:12 executing program 3: ioctl$TIOCSPTLCK(0xffffffffffffffff, 0x40045431, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000380)) r2 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$TCSETAW(0xffffffffffffffff, 0x5407, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1000, &(0x7f0000000000/0x1000)=nil}) ioctl$KVM_SET_REGS(r3, 0x4090ae82, &(0x7f00000001c0)={[0x0, 0x0, 0x0, 0x2000020, 0xffffffffffffffff, 0x0, 0x4cb]}) ioctl$KVM_RUN(r3, 0xae80, 0x0) socket$inet6(0xa, 0x2, 0x0) r4 = add_key$user(&(0x7f0000000040)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)='X', 0x1, 0xfffffffffffffffe) keyctl$update(0x2, r4, &(0x7f00000006c0)="c0ca1cdbaa1aedbbed80dddaa28e15b9449e2e82cca4244c40ffd0fd4e6631c7d3d86e1339de17344340b02dd527f2d8b3ae6c1db3594e657da33c3ec668f143974a65753472df5319a6b83e1e86b8f2666c61a2e700d1c1e0ae1fc52494bd4885a5c64e9007d39fa11313805290dd6342f9775f01a02ec88f6bee22f25a377a9b143abba1264586d2779088006d5f9be82b00f10287031623f73470264cc5897f18f357aad6deb3883da88ae2266664933785a3ce72bb224a441437ea93c217", 0xc0) add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x9a, 0xfffffffffffffffd) 18:44:12 executing program 2: getsockopt$bt_l2cap_L2CAP_CONNINFO(0xffffffffffffffff, 0x6, 0x2, 0x0, &(0x7f00000001c0)) 18:44:12 executing program 1: openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, &(0x7f0000000100)=0x1) 18:44:12 executing program 5: statx(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x2000, 0x800, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0}) syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x9, 0x0, &(0x7f00000000c0), 0x200000, &(0x7f0000000240)={[{@file_umask={'file_umask', 0x3d, 0x657936f8}}, {@type={'type', 0x3d, "6d6d69c8"}}], [{@fsmagic={'fsmagic', 0x3d, 0x6be0}}, {@obj_type={'obj_type', 0x3d, '@%\'em1\x00'}}, {@euid_lt={'euid<', r0}}, {@fsuuid={'fsuuid', 0x3d, {[0x32, 0x36, 0x65, 0x64, 0x36, 0x64, 0x39, 0x30], 0x2d, [0x66, 0x61, 0x65, 0x37], 0x2d, [0x64, 0x62, 0x64, 0x30], 0x2d, [0x36, 0x37, 0x64, 0x35], 0x2d, [0x61, 0x61, 0x31, 0x63, 0x5a, 0x38, 0x63, 0x36]}}}, {@dont_appraise='dont_appraise'}]}) r1 = openat$md(0xffffffffffffff9c, &(0x7f0000000080)='/dev/md0\x00', 0x0, 0x0) ioctl$BLKALIGNOFF(r1, 0x127a, &(0x7f00000000c0)) ioctl$BLKPG(r1, 0x40140921, 0x0) 18:44:12 executing program 0: setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, 0x0, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, &(0x7f00000000c0)={@loopback, 0x800, 0x0, 0x103, 0x2}, 0x20) getsockopt$inet_sctp6_SCTP_EVENTS(0xffffffffffffffff, 0x84, 0xb, &(0x7f0000000040), &(0x7f0000000080)=0xe) ioctl$DRM_IOCTL_RM_CTX(0xffffffffffffffff, 0xc0086421, &(0x7f0000000300)={0x0, 0x1}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB='lockproto=lock_nolock,locktable=.']) 18:44:12 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000100)=0x1) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x20008000004001fe) 18:44:12 executing program 1: openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, &(0x7f0000000100)=0x1) 18:44:12 executing program 2: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x0, 0x0) getsockopt$bt_l2cap_L2CAP_CONNINFO(r0, 0x6, 0x2, 0x0, &(0x7f00000001c0)) [ 317.383623][T12070] hfs: unable to parse mount options 18:44:12 executing program 2: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x0, 0x0) getsockopt$bt_l2cap_L2CAP_CONNINFO(r0, 0x6, 0x2, 0x0, &(0x7f00000001c0)) 18:44:12 executing program 5: statx(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x2000, 0x800, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0}) syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x9, 0x0, &(0x7f00000000c0), 0x200000, &(0x7f0000000240)={[{@file_umask={'file_umask', 0x3d, 0x657936f8}}, {@type={'type', 0x3d, "6d6d69c8"}}], [{@fsmagic={'fsmagic', 0x3d, 0x6be0}}, {@obj_type={'obj_type', 0x3d, '@%\'em1\x00'}}, {@euid_lt={'euid<', r0}}, {@fsuuid={'fsuuid', 0x3d, {[0x32, 0x36, 0x65, 0x64, 0x36, 0x64, 0x39, 0x30], 0x2d, [0x66, 0x61, 0x65, 0x37], 0x2d, [0x64, 0x62, 0x64, 0x30], 0x2d, [0x36, 0x37, 0x64, 0x35], 0x2d, [0x61, 0x61, 0x31, 0x63, 0x5a, 0x38, 0x63, 0x36]}}}, {@dont_appraise='dont_appraise'}]}) r1 = openat$md(0xffffffffffffff9c, &(0x7f0000000080)='/dev/md0\x00', 0x0, 0x0) ioctl$BLKALIGNOFF(r1, 0x127a, &(0x7f00000000c0)) ioctl$BLKPG(r1, 0x40140921, 0x0) 18:44:12 executing program 1: openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, &(0x7f0000000100)=0x1) 18:44:12 executing program 2: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x0, 0x0) getsockopt$bt_l2cap_L2CAP_CONNINFO(r0, 0x6, 0x2, 0x0, &(0x7f00000001c0)) [ 317.549625][T12093] hfs: unable to parse mount options [ 317.550412][T12085] gfs2: fsid=.: Trying to join cluster "lock_nolock", "." [ 317.612464][T12085] gfs2: fsid=.: Now mounting FS... [ 317.654196][T12085] gfs2: not a GFS2 filesystem [ 317.692142][T12085] gfs2: fsid=.: can't read superblock [ 317.731937][T12085] gfs2: fsid=.: can't read superblock: -22 18:44:12 executing program 3: ioctl$TIOCSPTLCK(0xffffffffffffffff, 0x40045431, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000380)) r2 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$TCSETAW(0xffffffffffffffff, 0x5407, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1000, &(0x7f0000000000/0x1000)=nil}) ioctl$KVM_SET_REGS(r3, 0x4090ae82, &(0x7f00000001c0)={[0x0, 0x0, 0x0, 0x2000020, 0xffffffffffffffff, 0x0, 0x4cb]}) ioctl$KVM_RUN(r3, 0xae80, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000040), 0x0) r4 = add_key$user(&(0x7f0000000040)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)='X', 0x1, 0xfffffffffffffffe) keyctl$update(0x2, r4, &(0x7f00000006c0)="c0ca1cdbaa1aedbbed80dddaa28e15b9449e2e82cca4244c40ffd0fd4e6631c7d3d86e1339de17344340b02dd527f2d8b3ae6c1db3594e657da33c3ec668f143974a65753472df5319a6b83e1e86b8f2666c61a2e700d1c1e0ae1fc52494bd4885a5c64e9007d39fa11313805290dd6342f9775f01a02ec88f6bee22f25a377a9b143abba1264586d2779088006d5f9be82b00f10287031623f73470264cc5897f18f357aad6deb3883da88ae2266664933785a3ce72bb224a441437ea93c217", 0xc0) add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x9a, 0xfffffffffffffffd) 18:44:12 executing program 5: statx(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x2000, 0x800, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0}) syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x9, 0x0, &(0x7f00000000c0), 0x200000, &(0x7f0000000240)={[{@file_umask={'file_umask', 0x3d, 0x657936f8}}, {@type={'type', 0x3d, "6d6d69c8"}}], [{@fsmagic={'fsmagic', 0x3d, 0x6be0}}, {@obj_type={'obj_type', 0x3d, '@%\'em1\x00'}}, {@euid_lt={'euid<', r0}}, {@fsuuid={'fsuuid', 0x3d, {[0x32, 0x36, 0x65, 0x64, 0x36, 0x64, 0x39, 0x30], 0x2d, [0x66, 0x61, 0x65, 0x37], 0x2d, [0x64, 0x62, 0x64, 0x30], 0x2d, [0x36, 0x37, 0x64, 0x35], 0x2d, [0x61, 0x61, 0x31, 0x63, 0x5a, 0x38, 0x63, 0x36]}}}, {@dont_appraise='dont_appraise'}]}) r1 = openat$md(0xffffffffffffff9c, &(0x7f0000000080)='/dev/md0\x00', 0x0, 0x0) ioctl$BLKALIGNOFF(r1, 0x127a, &(0x7f00000000c0)) ioctl$BLKPG(r1, 0x40140921, 0x0) 18:44:12 executing program 1: openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, 0x0) 18:44:12 executing program 2: syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) getsockopt$bt_l2cap_L2CAP_CONNINFO(0xffffffffffffffff, 0x6, 0x2, 0x0, &(0x7f00000001c0)) 18:44:12 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x0, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000100)=0x1) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x20008000004001fe) 18:44:12 executing program 0: setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, 0x0, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_EVENTS(0xffffffffffffffff, 0x84, 0xb, &(0x7f0000000040), &(0x7f0000000080)=0xe) ioctl$DRM_IOCTL_RM_CTX(0xffffffffffffffff, 0xc0086421, &(0x7f0000000300)={0x0, 0x1}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB='lockproto=lock_nolock,locktable=.']) 18:44:13 executing program 2: syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) getsockopt$bt_l2cap_L2CAP_CONNINFO(0xffffffffffffffff, 0x6, 0x2, 0x0, &(0x7f00000001c0)) 18:44:13 executing program 1: openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, 0x0) [ 318.169914][T12117] hfs: unable to parse mount options 18:44:13 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x0, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000100)=0x1) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x20008000004001fe) 18:44:13 executing program 5: statx(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x2000, 0x800, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0}) syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x9, 0x0, &(0x7f00000000c0), 0x200000, &(0x7f0000000240)={[{@part={'part'}}, {@file_umask={'file_umask', 0x3d, 0x657936f8}}, {@type={'type', 0x3d, "6d6d69c8"}}], [{@fsmagic={'fsmagic', 0x3d, 0x6be0}}, {@obj_type={'obj_type', 0x3d, '@%\'em1\x00'}}, {@euid_lt={'euid<', r0}}, {@fsuuid={'fsuuid', 0x3d, {[0x32, 0x36, 0x65, 0x64, 0x36, 0x64, 0x39, 0x30], 0x2d, [0x66, 0x61, 0x65, 0x37], 0x2d, [0x64, 0x62, 0x64, 0x30], 0x2d, [0x36, 0x37, 0x64, 0x35], 0x2d, [0x61, 0x61, 0x31, 0x63, 0x5a, 0x38, 0x63, 0x36]}}}, {@dont_appraise='dont_appraise'}]}) r1 = openat$md(0xffffffffffffff9c, &(0x7f0000000080)='/dev/md0\x00', 0x0, 0x0) ioctl$BLKALIGNOFF(r1, 0x127a, &(0x7f00000000c0)) ioctl$BLKPG(r1, 0x40140921, 0x0) 18:44:13 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x0, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000100)=0x1) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x20008000004001fe) [ 318.240239][T12116] gfs2: fsid=.: Trying to join cluster "lock_nolock", "." [ 318.256348][T12116] gfs2: fsid=.: Now mounting FS... [ 318.265250][T12116] gfs2: not a GFS2 filesystem [ 318.270291][T12116] gfs2: fsid=.: can't read superblock [ 318.276289][T12116] gfs2: fsid=.: can't read superblock: -22 18:44:13 executing program 2: syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) getsockopt$bt_l2cap_L2CAP_CONNINFO(0xffffffffffffffff, 0x6, 0x2, 0x0, &(0x7f00000001c0)) [ 318.456352][T12139] hfs: unable to parse mount options 18:44:13 executing program 3: ioctl$TIOCSPTLCK(0xffffffffffffffff, 0x40045431, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000380)) r2 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$TCSETAW(0xffffffffffffffff, 0x5407, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1000, &(0x7f0000000000/0x1000)=nil}) ioctl$KVM_SET_REGS(r3, 0x4090ae82, &(0x7f00000001c0)={[0x0, 0x0, 0x0, 0x2000020, 0xffffffffffffffff, 0x0, 0x4cb]}) ioctl$KVM_RUN(r3, 0xae80, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000040), 0x0) r4 = add_key$user(&(0x7f0000000040)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)='X', 0x1, 0xfffffffffffffffe) keyctl$update(0x2, r4, &(0x7f00000006c0)="c0ca1cdbaa1aedbbed80dddaa28e15b9449e2e82cca4244c40ffd0fd4e6631c7d3d86e1339de17344340b02dd527f2d8b3ae6c1db3594e657da33c3ec668f143974a65753472df5319a6b83e1e86b8f2666c61a2e700d1c1e0ae1fc52494bd4885a5c64e9007d39fa11313805290dd6342f9775f01a02ec88f6bee22f25a377a9b143abba1264586d2779088006d5f9be82b00f10287031623f73470264cc5897f18f357aad6deb3883da88ae2266664933785a3ce72bb224a441437ea93c217", 0xc0) add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x9a, 0xfffffffffffffffd) 18:44:13 executing program 1: openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, 0x0) 18:44:13 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, &(0x7f0000000100)=0x1) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x20008000004001fe) 18:44:13 executing program 2: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) getsockopt$bt_l2cap_L2CAP_CONNINFO(r0, 0x6, 0x2, 0x0, 0x0) 18:44:13 executing program 1: openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000100)) 18:44:13 executing program 0: setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, 0x0, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_EVENTS(0xffffffffffffffff, 0x84, 0xb, &(0x7f0000000040), &(0x7f0000000080)=0xe) ioctl$DRM_IOCTL_RM_CTX(0xffffffffffffffff, 0xc0086421, &(0x7f0000000300)={0x0, 0x1}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB='lockproto=lock_nolock,locktable=.']) 18:44:13 executing program 5: statx(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x2000, 0x800, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0}) syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x9, 0x0, &(0x7f00000000c0), 0x200000, &(0x7f0000000240)={[{@part={'part'}}, {@file_umask={'file_umask', 0x3d, 0x657936f8}}, {@type={'type', 0x3d, "6d6d69c8"}}], [{@fsmagic={'fsmagic', 0x3d, 0x6be0}}, {@obj_type={'obj_type', 0x3d, '@%\'em1\x00'}}, {@euid_lt={'euid<', r0}}, {@fsuuid={'fsuuid', 0x3d, {[0x32, 0x36, 0x65, 0x64, 0x36, 0x64, 0x39, 0x30], 0x2d, [0x66, 0x61, 0x65, 0x37], 0x2d, [0x64, 0x62, 0x64, 0x30], 0x2d, [0x36, 0x37, 0x64, 0x35], 0x2d, [0x61, 0x61, 0x31, 0x63, 0x5a, 0x38, 0x63, 0x36]}}}, {@dont_appraise='dont_appraise'}]}) r1 = openat$md(0xffffffffffffff9c, &(0x7f0000000080)='/dev/md0\x00', 0x0, 0x0) ioctl$BLKALIGNOFF(r1, 0x127a, &(0x7f00000000c0)) ioctl$BLKPG(r1, 0x40140921, 0x0) 18:44:13 executing program 2: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) getsockopt$bt_l2cap_L2CAP_CONNINFO(r0, 0x6, 0x2, 0x0, 0x0) 18:44:13 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, &(0x7f0000000100)=0x1) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x20008000004001fe) 18:44:13 executing program 1: openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000100)) 18:44:13 executing program 2: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) getsockopt$bt_l2cap_L2CAP_CONNINFO(r0, 0x6, 0x2, 0x0, 0x0) 18:44:13 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, &(0x7f0000000100)=0x1) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x20008000004001fe) [ 318.879079][T12165] hfs: unable to parse mount options [ 319.078855][T12171] gfs2: fsid=.: Trying to join cluster "lock_nolock", "." [ 319.103910][T12171] gfs2: fsid=.: Now mounting FS... [ 319.116645][T12171] gfs2: not a GFS2 filesystem [ 319.123532][T12171] gfs2: fsid=.: can't read superblock [ 319.129025][T12171] gfs2: fsid=.: can't read superblock: -22 18:44:14 executing program 3: ioctl$TIOCSPTLCK(0xffffffffffffffff, 0x40045431, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000380)) r2 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$TCSETAW(0xffffffffffffffff, 0x5407, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1000, &(0x7f0000000000/0x1000)=nil}) ioctl$KVM_SET_REGS(r3, 0x4090ae82, &(0x7f00000001c0)={[0x0, 0x0, 0x0, 0x2000020, 0xffffffffffffffff, 0x0, 0x4cb]}) ioctl$KVM_RUN(r3, 0xae80, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000040), 0x0) r4 = add_key$user(&(0x7f0000000040)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)='X', 0x1, 0xfffffffffffffffe) keyctl$update(0x2, r4, &(0x7f00000006c0)="c0ca1cdbaa1aedbbed80dddaa28e15b9449e2e82cca4244c40ffd0fd4e6631c7d3d86e1339de17344340b02dd527f2d8b3ae6c1db3594e657da33c3ec668f143974a65753472df5319a6b83e1e86b8f2666c61a2e700d1c1e0ae1fc52494bd4885a5c64e9007d39fa11313805290dd6342f9775f01a02ec88f6bee22f25a377a9b143abba1264586d2779088006d5f9be82b00f10287031623f73470264cc5897f18f357aad6deb3883da88ae2266664933785a3ce72bb224a441437ea93c217", 0xc0) add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x9a, 0xfffffffffffffffd) 18:44:14 executing program 1: openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000100)) 18:44:14 executing program 5: statx(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x2000, 0x800, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0}) syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x9, 0x0, &(0x7f00000000c0), 0x200000, &(0x7f0000000240)={[{@part={'part'}}, {@file_umask={'file_umask', 0x3d, 0x657936f8}}, {@type={'type', 0x3d, "6d6d69c8"}}], [{@fsmagic={'fsmagic', 0x3d, 0x6be0}}, {@obj_type={'obj_type', 0x3d, '@%\'em1\x00'}}, {@euid_lt={'euid<', r0}}, {@fsuuid={'fsuuid', 0x3d, {[0x32, 0x36, 0x65, 0x64, 0x36, 0x64, 0x39, 0x30], 0x2d, [0x66, 0x61, 0x65, 0x37], 0x2d, [0x64, 0x62, 0x64, 0x30], 0x2d, [0x36, 0x37, 0x64, 0x35], 0x2d, [0x61, 0x61, 0x31, 0x63, 0x5a, 0x38, 0x63, 0x36]}}}, {@dont_appraise='dont_appraise'}]}) r1 = openat$md(0xffffffffffffff9c, &(0x7f0000000080)='/dev/md0\x00', 0x0, 0x0) ioctl$BLKALIGNOFF(r1, 0x127a, &(0x7f00000000c0)) ioctl$BLKPG(r1, 0x40140921, 0x0) 18:44:14 executing program 2: write$FUSE_NOTIFY_RETRIEVE(0xffffffffffffffff, &(0x7f0000000040)={0x30}, 0x30) r0 = socket$inet(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)=[{0x0}], 0x1}, 0x0) recvmmsg(r0, &(0x7f0000001380), 0x4000056, 0x0, &(0x7f0000000200)={0x77359400}) connect(r0, &(0x7f0000000140)=@in6={0xa, 0x0, 0xfffffffe, @loopback, 0x1}, 0x80) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet(0x10, 0x3, 0x0) sendmsg(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000440)="4c0000001200ff09fffefd956fa283b7270fd917df226c24a6008000000000000000683540150024001d001fc41180b598bc593ab6821148a730de33a49868c62b2ca654a6613b6aabf35d0f", 0x4c}], 0x1}, 0x0) openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ttyS3\x00', 0x0, 0x0) ioctl$TIOCGSERIAL(0xffffffffffffffff, 0x541e, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$TIOCGICOUNT(0xffffffffffffffff, 0x545d, 0x0) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfc00}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x34144cbc44157b99, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmmsg(r1, &(0x7f0000001380), 0x4000000000000f0, 0x0, &(0x7f0000000200)={0x77359400}) syz_emit_ethernet(0x1, &(0x7f0000001640)=ANY=[@ANYRESDEC], 0x0) epoll_create1(0x0) ioctl$RTC_WKALM_SET(0xffffffffffffffff, 0x4028700f, &(0x7f0000000280)={0x0, 0x4, {0x22, 0x120015, 0x7, 0x7, 0x0, 0x0, 0x2, 0x2e, 0xffffffffffffffff}}) getgroups(0x1, &(0x7f00000001c0)=[0x0]) 18:44:14 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x0, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x20008000004001fe) 18:44:14 executing program 0: setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, 0x0, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_EVENTS(0xffffffffffffffff, 0x84, 0xb, &(0x7f0000000040), &(0x7f0000000080)=0xe) ioctl$DRM_IOCTL_RM_CTX(0xffffffffffffffff, 0xc0086421, &(0x7f0000000300)={0x0, 0x1}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB='lockproto=lock_nolock,locktable=.']) [ 319.629644][T12208] hfs: unable to parse mount options [ 319.653930][T12218] netlink: 44 bytes leftover after parsing attributes in process `syz-executor.2'. [ 319.663923][T12218] netlink: 44 bytes leftover after parsing attributes in process `syz-executor.2'. [ 319.680368][T12218] netlink: 44 bytes leftover after parsing attributes in process `syz-executor.2'. 18:44:14 executing program 1: r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x0, 0x0) poll(&(0x7f0000000180)=[{r0}], 0x1, 0xffff) ioctl$int_in(r0, 0xc0045005, &(0x7f00000000c0)=0x40000) 18:44:14 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x0, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x20008000004001fe) [ 319.705171][T12218] netlink: 44 bytes leftover after parsing attributes in process `syz-executor.2'. [ 319.717872][T12218] netlink: 44 bytes leftover after parsing attributes in process `syz-executor.2'. [ 319.732440][T12218] netlink: 44 bytes leftover after parsing attributes in process `syz-executor.2'. [ 319.746208][T12218] netlink: 44 bytes leftover after parsing attributes in process `syz-executor.2'. [ 319.769582][T12218] netlink: 44 bytes leftover after parsing attributes in process `syz-executor.2'. 18:44:14 executing program 5: statx(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x2000, 0x800, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0}) syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x9, 0x0, &(0x7f00000000c0), 0x200000, &(0x7f0000000240)={[{@part={'part', 0x3d, 0xa14}}, {@file_umask={'file_umask', 0x3d, 0x657936f8}}, {@type={'type', 0x3d, "6d6d69c8"}}], [{@fsmagic={'fsmagic', 0x3d, 0x6be0}}, {@obj_type={'obj_type', 0x3d, '@%\'em1\x00'}}, {@euid_lt={'euid<', r0}}, {@fsuuid={'fsuuid', 0x3d, {[0x32, 0x36, 0x65, 0x64, 0x36, 0x64, 0x39, 0x30], 0x2d, [0x66, 0x61, 0x65, 0x37], 0x2d, [0x64, 0x62, 0x64, 0x30], 0x2d, [0x36, 0x37, 0x64, 0x35], 0x2d, [0x61, 0x61, 0x31, 0x63, 0x5a, 0x38, 0x63, 0x36]}}}]}) r1 = openat$md(0xffffffffffffff9c, &(0x7f0000000080)='/dev/md0\x00', 0x0, 0x0) ioctl$BLKALIGNOFF(r1, 0x127a, &(0x7f00000000c0)) ioctl$BLKPG(r1, 0x40140921, 0x0) [ 319.825421][T12218] netlink: 44 bytes leftover after parsing attributes in process `syz-executor.2'. [ 319.829291][T12211] gfs2: fsid=.: Trying to join cluster "lock_nolock", "." [ 319.859667][T12218] netlink: 44 bytes leftover after parsing attributes in process `syz-executor.2'. [ 319.926963][T12211] gfs2: fsid=.: Now mounting FS... 18:44:14 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x0, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x20008000004001fe) [ 319.956450][T12211] gfs2: not a GFS2 filesystem [ 319.973803][T12211] gfs2: fsid=.: can't read superblock [ 319.993441][T12211] gfs2: fsid=.: can't read superblock: -22 [ 320.024380][T12237] hfs: unable to parse mount options 18:44:15 executing program 5: statx(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x2000, 0x800, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0}) syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x9, 0x0, &(0x7f00000000c0), 0x200000, &(0x7f0000000240)={[{@part={'part', 0x3d, 0xa14}}, {@file_umask={'file_umask', 0x3d, 0x657936f8}}, {@type={'type', 0x3d, "6d6d69c8"}}], [{@fsmagic={'fsmagic', 0x3d, 0x6be0}}, {@obj_type={'obj_type', 0x3d, '@%\'em1\x00'}}, {@euid_lt={'euid<', r0}}, {@fsuuid={'fsuuid', 0x3d, {[0x32, 0x36, 0x65, 0x64, 0x36, 0x64, 0x39, 0x30], 0x2d, [0x66, 0x61, 0x65, 0x37], 0x2d, [0x64, 0x62, 0x64, 0x30], 0x2d, [0x36, 0x37, 0x64, 0x35], 0x2d, [0x61, 0x61, 0x31, 0x63, 0x5a, 0x38, 0x63, 0x36]}}}]}) r1 = openat$md(0xffffffffffffff9c, &(0x7f0000000080)='/dev/md0\x00', 0x0, 0x0) ioctl$BLKALIGNOFF(r1, 0x127a, &(0x7f00000000c0)) ioctl$BLKPG(r1, 0x40140921, 0x0) 18:44:15 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x0, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000100)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x20008000004001fe) [ 320.336701][T12251] hfs: unable to parse mount options 18:44:15 executing program 3: ioctl$TIOCSPTLCK(0xffffffffffffffff, 0x40045431, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000380)) r2 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$TCSETAW(0xffffffffffffffff, 0x5407, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1000, &(0x7f0000000000/0x1000)=nil}) ioctl$KVM_SET_REGS(r3, 0x4090ae82, &(0x7f00000001c0)={[0x0, 0x0, 0x0, 0x2000020, 0xffffffffffffffff, 0x0, 0x4cb]}) r4 = socket$inet6(0xa, 0x2, 0x0) sendfile(r4, 0xffffffffffffffff, &(0x7f0000000040), 0x0) r5 = add_key$user(&(0x7f0000000040)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)='X', 0x1, 0xfffffffffffffffe) keyctl$update(0x2, r5, &(0x7f00000006c0)="c0ca1cdbaa1aedbbed80dddaa28e15b9449e2e82cca4244c40ffd0fd4e6631c7d3d86e1339de17344340b02dd527f2d8b3ae6c1db3594e657da33c3ec668f143974a65753472df5319a6b83e1e86b8f2666c61a2e700d1c1e0ae1fc52494bd4885a5c64e9007d39fa11313805290dd6342f9775f01a02ec88f6bee22f25a377a9b143abba1264586d2779088006d5f9be82b00f10287031623f73470264cc5897f18f357aad6deb3883da88ae2266664933785a3ce72bb224a441437ea93c217", 0xc0) add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x9a, 0xfffffffffffffffd) 18:44:15 executing program 0: setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, 0x0, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_EVENTS(0xffffffffffffffff, 0x84, 0xb, 0x0, &(0x7f0000000080)) ioctl$DRM_IOCTL_RM_CTX(0xffffffffffffffff, 0xc0086421, &(0x7f0000000300)={0x0, 0x1}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB='lockproto=lock_nolock,locktable=.']) 18:44:15 executing program 5: statx(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x2000, 0x800, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0}) syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x9, 0x0, &(0x7f00000000c0), 0x200000, &(0x7f0000000240)={[{@part={'part', 0x3d, 0xa14}}, {@file_umask={'file_umask', 0x3d, 0x657936f8}}, {@type={'type', 0x3d, "6d6d69c8"}}], [{@fsmagic={'fsmagic', 0x3d, 0x6be0}}, {@obj_type={'obj_type', 0x3d, '@%\'em1\x00'}}, {@euid_lt={'euid<', r0}}, {@fsuuid={'fsuuid', 0x3d, {[0x32, 0x36, 0x65, 0x64, 0x36, 0x64, 0x39, 0x30], 0x2d, [0x66, 0x61, 0x65, 0x37], 0x2d, [0x64, 0x62, 0x64, 0x30], 0x2d, [0x36, 0x37, 0x64, 0x35], 0x2d, [0x61, 0x61, 0x31, 0x63, 0x5a, 0x38, 0x63, 0x36]}}}]}) r1 = openat$md(0xffffffffffffff9c, &(0x7f0000000080)='/dev/md0\x00', 0x0, 0x0) ioctl$BLKALIGNOFF(r1, 0x127a, &(0x7f00000000c0)) ioctl$BLKPG(r1, 0x40140921, 0x0) 18:44:15 executing program 2: write$FUSE_NOTIFY_RETRIEVE(0xffffffffffffffff, &(0x7f0000000040)={0x30}, 0x30) r0 = socket$inet(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)=[{0x0}], 0x1}, 0x0) recvmmsg(r0, &(0x7f0000001380), 0x4000056, 0x0, &(0x7f0000000200)={0x77359400}) connect(r0, &(0x7f0000000140)=@in6={0xa, 0x0, 0xfffffffe, @loopback, 0x1}, 0x80) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet(0x10, 0x3, 0x0) sendmsg(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000440)="4c0000001200ff09fffefd956fa283b7270fd917df226c24a6008000000000000000683540150024001d001fc41180b598bc593ab6821148a730de33a49868c62b2ca654a6613b6aabf35d0f", 0x4c}], 0x1}, 0x0) openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ttyS3\x00', 0x0, 0x0) ioctl$TIOCGSERIAL(0xffffffffffffffff, 0x541e, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$TIOCGICOUNT(0xffffffffffffffff, 0x545d, 0x0) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfc00}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x34144cbc44157b99, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmmsg(r1, &(0x7f0000001380), 0x4000000000000f0, 0x0, &(0x7f0000000200)={0x77359400}) syz_emit_ethernet(0x1, &(0x7f0000001640)=ANY=[@ANYRESDEC], 0x0) epoll_create1(0x0) ioctl$RTC_WKALM_SET(0xffffffffffffffff, 0x4028700f, &(0x7f0000000280)={0x0, 0x4, {0x22, 0x120015, 0x7, 0x7, 0x0, 0x0, 0x2, 0x2e, 0xffffffffffffffff}}) getgroups(0x1, &(0x7f00000001c0)=[0x0]) 18:44:15 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x0, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000100)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x20008000004001fe) [ 320.586812][T12264] hfs: unable to parse mount options 18:44:15 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x0, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000100)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x20008000004001fe) 18:44:15 executing program 1: r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x0, 0x0) poll(&(0x7f0000000180)=[{r0}], 0x1, 0xffff) ioctl$int_in(r0, 0xc0045005, &(0x7f00000000c0)=0x40000) 18:44:15 executing program 5: statx(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x2000, 0x800, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0}) syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x9, 0x0, &(0x7f00000000c0), 0x200000, &(0x7f0000000240)={[{@part={'part', 0x3d, 0xa14}}, {@file_umask={'file_umask', 0x3d, 0x657936f8}}, {@type={'type', 0x3d, "6d6d69c8"}}], [{@fsmagic={'fsmagic', 0x3d, 0x6be0}}, {@obj_type={'obj_type', 0x3d, '@%\'em1\x00'}}, {@euid_lt={'euid<', r0}}, {@dont_appraise='dont_appraise'}]}) r1 = openat$md(0xffffffffffffff9c, &(0x7f0000000080)='/dev/md0\x00', 0x0, 0x0) ioctl$BLKALIGNOFF(r1, 0x127a, &(0x7f00000000c0)) ioctl$BLKPG(r1, 0x40140921, 0x0) 18:44:15 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x0, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000100)=0x1) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) [ 320.819481][T12263] gfs2: fsid=.: Trying to join cluster "lock_nolock", "." [ 320.853900][T12263] gfs2: fsid=.: Now mounting FS... [ 320.879284][T12263] gfs2: not a GFS2 filesystem [ 320.888182][T12263] gfs2: fsid=.: can't read superblock [ 320.902860][T12263] gfs2: fsid=.: can't read superblock: -22 [ 320.923298][T12295] hfs: unable to parse mount options 18:44:15 executing program 3: ioctl$TIOCSPTLCK(0xffffffffffffffff, 0x40045431, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000380)) r2 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$TCSETAW(0xffffffffffffffff, 0x5407, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1000, &(0x7f0000000000/0x1000)=nil}) ioctl$KVM_SET_REGS(r3, 0x4090ae82, &(0x7f00000001c0)={[0x0, 0x0, 0x0, 0x2000020, 0xffffffffffffffff, 0x0, 0x4cb]}) r4 = socket$inet6(0xa, 0x2, 0x0) sendfile(r4, 0xffffffffffffffff, &(0x7f0000000040), 0x0) r5 = add_key$user(&(0x7f0000000040)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)='X', 0x1, 0xfffffffffffffffe) keyctl$update(0x2, r5, &(0x7f00000006c0)="c0ca1cdbaa1aedbbed80dddaa28e15b9449e2e82cca4244c40ffd0fd4e6631c7d3d86e1339de17344340b02dd527f2d8b3ae6c1db3594e657da33c3ec668f143974a65753472df5319a6b83e1e86b8f2666c61a2e700d1c1e0ae1fc52494bd4885a5c64e9007d39fa11313805290dd6342f9775f01a02ec88f6bee22f25a377a9b143abba1264586d2779088006d5f9be82b00f10287031623f73470264cc5897f18f357aad6deb3883da88ae2266664933785a3ce72bb224a441437ea93c217", 0xc0) add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x9a, 0xfffffffffffffffd) 18:44:16 executing program 5: statx(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x2000, 0x800, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0}) syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x9, 0x0, &(0x7f00000000c0), 0x200000, &(0x7f0000000240)={[{@part={'part', 0x3d, 0xa14}}, {@file_umask={'file_umask', 0x3d, 0x657936f8}}, {@type={'type', 0x3d, "6d6d69c8"}}], [{@fsmagic={'fsmagic', 0x3d, 0x6be0}}, {@obj_type={'obj_type', 0x3d, '@%\'em1\x00'}}, {@euid_lt={'euid<', r0}}, {@dont_appraise='dont_appraise'}]}) r1 = openat$md(0xffffffffffffff9c, &(0x7f0000000080)='/dev/md0\x00', 0x0, 0x0) ioctl$BLKALIGNOFF(r1, 0x127a, &(0x7f00000000c0)) ioctl$BLKPG(r1, 0x40140921, 0x0) 18:44:16 executing program 0: setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, 0x0, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_EVENTS(0xffffffffffffffff, 0x84, 0xb, 0x0, &(0x7f0000000080)) ioctl$DRM_IOCTL_RM_CTX(0xffffffffffffffff, 0xc0086421, &(0x7f0000000300)={0x0, 0x1}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB='lockproto=lock_nolock,locktable=.']) [ 321.320293][T12317] hfs: unable to parse mount options 18:44:16 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x0, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000100)=0x1) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) 18:44:16 executing program 5: statx(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x2000, 0x800, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0}) syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x9, 0x0, &(0x7f00000000c0), 0x200000, &(0x7f0000000240)={[{@part={'part', 0x3d, 0xa14}}, {@file_umask={'file_umask', 0x3d, 0x657936f8}}, {@type={'type', 0x3d, "6d6d69c8"}}], [{@fsmagic={'fsmagic', 0x3d, 0x6be0}}, {@obj_type={'obj_type', 0x3d, '@%\'em1\x00'}}, {@euid_lt={'euid<', r0}}, {@dont_appraise='dont_appraise'}]}) r1 = openat$md(0xffffffffffffff9c, &(0x7f0000000080)='/dev/md0\x00', 0x0, 0x0) ioctl$BLKALIGNOFF(r1, 0x127a, &(0x7f00000000c0)) ioctl$BLKPG(r1, 0x40140921, 0x0) 18:44:16 executing program 2: write$FUSE_NOTIFY_RETRIEVE(0xffffffffffffffff, &(0x7f0000000040)={0x30}, 0x30) r0 = socket$inet(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)=[{0x0}], 0x1}, 0x0) recvmmsg(r0, &(0x7f0000001380), 0x4000056, 0x0, &(0x7f0000000200)={0x77359400}) connect(r0, &(0x7f0000000140)=@in6={0xa, 0x0, 0xfffffffe, @loopback, 0x1}, 0x80) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet(0x10, 0x3, 0x0) sendmsg(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000440)="4c0000001200ff09fffefd956fa283b7270fd917df226c24a6008000000000000000683540150024001d001fc41180b598bc593ab6821148a730de33a49868c62b2ca654a6613b6aabf35d0f", 0x4c}], 0x1}, 0x0) openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ttyS3\x00', 0x0, 0x0) ioctl$TIOCGSERIAL(0xffffffffffffffff, 0x541e, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$TIOCGICOUNT(0xffffffffffffffff, 0x545d, 0x0) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfc00}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x34144cbc44157b99, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmmsg(r1, &(0x7f0000001380), 0x4000000000000f0, 0x0, &(0x7f0000000200)={0x77359400}) syz_emit_ethernet(0x1, &(0x7f0000001640)=ANY=[@ANYRESDEC], 0x0) epoll_create1(0x0) ioctl$RTC_WKALM_SET(0xffffffffffffffff, 0x4028700f, &(0x7f0000000280)={0x0, 0x4, {0x22, 0x120015, 0x7, 0x7, 0x0, 0x0, 0x2, 0x2e, 0xffffffffffffffff}}) getgroups(0x1, &(0x7f00000001c0)=[0x0]) [ 321.527297][T12324] gfs2: fsid=.: Trying to join cluster "lock_nolock", "." [ 321.559128][T12324] gfs2: fsid=.: Now mounting FS... [ 321.590895][T12324] gfs2: not a GFS2 filesystem [ 321.602403][T12336] hfs: unable to parse mount options [ 321.611328][T12324] gfs2: fsid=.: can't read superblock [ 321.633579][T12324] gfs2: fsid=.: can't read superblock: -22 18:44:16 executing program 5: statx(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x2000, 0x800, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0}) syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x9, 0x0, &(0x7f00000000c0), 0x200000, &(0x7f0000000240)={[{@part={'part', 0x3d, 0xa14}}, {@file_umask={'file_umask', 0x3d, 0x657936f8}}, {@type={'type', 0x3d, "6d6d69c8"}}], [{@fsmagic={'fsmagic', 0x3d, 0x6be0}}, {@obj_type={'obj_type', 0x3d, '@%\'em1\x00'}}, {@euid_lt={'euid<', r0}}, {@fsuuid={'fsuuid', 0x3d, {[0x32, 0x36, 0x65, 0x64, 0x36, 0x64, 0x39], 0x2d, [0x66, 0x61, 0x65, 0x37], 0x2d, [0x64, 0x62, 0x64, 0x30], 0x2d, [0x36, 0x37, 0x64, 0x35], 0x2d, [0x61, 0x61, 0x31, 0x63, 0x5a, 0x38, 0x63, 0x36]}}}, {@dont_appraise='dont_appraise'}]}) r1 = openat$md(0xffffffffffffff9c, &(0x7f0000000080)='/dev/md0\x00', 0x0, 0x0) ioctl$BLKALIGNOFF(r1, 0x127a, &(0x7f00000000c0)) ioctl$BLKPG(r1, 0x40140921, 0x0) 18:44:16 executing program 1: 18:44:16 executing program 1: [ 321.809059][T12349] hfs: unable to parse mount options 18:44:16 executing program 3: ioctl$TIOCSPTLCK(0xffffffffffffffff, 0x40045431, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000380)) r2 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$TCSETAW(0xffffffffffffffff, 0x5407, 0x0) ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1000, &(0x7f0000000000/0x1000)=nil}) r3 = socket$inet6(0xa, 0x2, 0x0) sendfile(r3, 0xffffffffffffffff, &(0x7f0000000040), 0x0) r4 = add_key$user(&(0x7f0000000040)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)='X', 0x1, 0xfffffffffffffffe) keyctl$update(0x2, r4, &(0x7f00000006c0)="c0ca1cdbaa1aedbbed80dddaa28e15b9449e2e82cca4244c40ffd0fd4e6631c7d3d86e1339de17344340b02dd527f2d8b3ae6c1db3594e657da33c3ec668f143974a65753472df5319a6b83e1e86b8f2666c61a2e700d1c1e0ae1fc52494bd4885a5c64e9007d39fa11313805290dd6342f9775f01a02ec88f6bee22f25a377a9b143abba1264586d2779088006d5f9be82b00f10287031623f73470264cc5897f18f357aad6deb3883da88ae2266664933785a3ce72bb224a441437ea93c217", 0xc0) add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x9a, 0xfffffffffffffffd) 18:44:16 executing program 5: statx(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x2000, 0x800, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0}) syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x9, 0x0, &(0x7f00000000c0), 0x200000, &(0x7f0000000240)={[{@part={'part', 0x3d, 0xa14}}, {@file_umask={'file_umask', 0x3d, 0x657936f8}}, {@type={'type', 0x3d, "6d6d69c8"}}], [{@fsmagic={'fsmagic', 0x3d, 0x6be0}}, {@obj_type={'obj_type', 0x3d, '@%\'em1\x00'}}, {@euid_lt={'euid<', r0}}, {@fsuuid={'fsuuid', 0x3d, {[0x32, 0x36, 0x65, 0x64, 0x36, 0x64, 0x39], 0x2d, [0x66, 0x61, 0x65, 0x37], 0x2d, [0x64, 0x62, 0x64, 0x30], 0x2d, [0x36, 0x37, 0x64, 0x35], 0x2d, [0x61, 0x61, 0x31, 0x63, 0x5a, 0x38, 0x63, 0x36]}}}, {@dont_appraise='dont_appraise'}]}) r1 = openat$md(0xffffffffffffff9c, &(0x7f0000000080)='/dev/md0\x00', 0x0, 0x0) ioctl$BLKALIGNOFF(r1, 0x127a, &(0x7f00000000c0)) ioctl$BLKPG(r1, 0x40140921, 0x0) 18:44:16 executing program 1: 18:44:16 executing program 0: setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, 0x0, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_EVENTS(0xffffffffffffffff, 0x84, 0xb, 0x0, &(0x7f0000000080)) ioctl$DRM_IOCTL_RM_CTX(0xffffffffffffffff, 0xc0086421, &(0x7f0000000300)={0x0, 0x1}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB='lockproto=lock_nolock,locktable=.']) 18:44:16 executing program 1: 18:44:17 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x0, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000100)=0x1) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) [ 322.213127][T12370] hfs: unable to parse mount options 18:44:17 executing program 5: statx(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x2000, 0x800, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0}) syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x9, 0x0, &(0x7f00000000c0), 0x200000, &(0x7f0000000240)={[{@part={'part', 0x3d, 0xa14}}, {@file_umask={'file_umask', 0x3d, 0x657936f8}}, {@type={'type', 0x3d, "6d6d69c8"}}], [{@fsmagic={'fsmagic', 0x3d, 0x6be0}}, {@obj_type={'obj_type', 0x3d, '@%\'em1\x00'}}, {@euid_lt={'euid<', r0}}, {@fsuuid={'fsuuid', 0x3d, {[0x32, 0x36, 0x65, 0x64, 0x36, 0x64, 0x39], 0x2d, [0x66, 0x61, 0x65, 0x37], 0x2d, [0x64, 0x62, 0x64, 0x30], 0x2d, [0x36, 0x37, 0x64, 0x35], 0x2d, [0x61, 0x61, 0x31, 0x63, 0x5a, 0x38, 0x63, 0x36]}}}, {@dont_appraise='dont_appraise'}]}) r1 = openat$md(0xffffffffffffff9c, &(0x7f0000000080)='/dev/md0\x00', 0x0, 0x0) ioctl$BLKALIGNOFF(r1, 0x127a, &(0x7f00000000c0)) ioctl$BLKPG(r1, 0x40140921, 0x0) 18:44:17 executing program 1: [ 322.318908][T12369] gfs2: fsid=.: Trying to join cluster "lock_nolock", "." [ 322.365458][T12369] gfs2: fsid=.: Now mounting FS... [ 322.394984][T12369] gfs2: not a GFS2 filesystem [ 322.399797][T12369] gfs2: fsid=.: can't read superblock [ 322.443763][T12369] gfs2: fsid=.: can't read superblock: -22 [ 322.485346][T12393] hfs: unable to parse mount options 18:44:17 executing program 2: 18:44:17 executing program 1: 18:44:17 executing program 5: statx(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x2000, 0x800, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0}) syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x9, 0x0, &(0x7f00000000c0), 0x200000, &(0x7f0000000240)={[{@part={'part', 0x3d, 0xa14}}, {@file_umask={'file_umask', 0x3d, 0x657936f8}}, {@type={'type', 0x3d, "6d6d69c8"}}], [{@fsmagic={'fsmagic', 0x3d, 0x6be0}}, {@obj_type={'obj_type', 0x3d, '@%\'em1\x00'}}, {@euid_lt={'euid<', r0}}, {@fsuuid={'fsuuid', 0x3d, {[0x32, 0x36, 0x65, 0x64, 0x36, 0x64, 0x0, 0x30], 0x2d, [0x66, 0x61, 0x65, 0x37], 0x2d, [0x64, 0x62, 0x64, 0x30], 0x2d, [0x36, 0x37, 0x64, 0x35], 0x2d, [0x61, 0x61, 0x31, 0x63, 0x5a, 0x38, 0x63, 0x36]}}}, {@dont_appraise='dont_appraise'}]}) r1 = openat$md(0xffffffffffffff9c, &(0x7f0000000080)='/dev/md0\x00', 0x0, 0x0) ioctl$BLKALIGNOFF(r1, 0x127a, &(0x7f00000000c0)) ioctl$BLKPG(r1, 0x40140921, 0x0) 18:44:17 executing program 3: ioctl$TIOCSPTLCK(0xffffffffffffffff, 0x40045431, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000380)) r2 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$TCSETAW(0xffffffffffffffff, 0x5407, 0x0) ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1000, &(0x7f0000000000/0x1000)=nil}) r3 = socket$inet6(0xa, 0x2, 0x0) sendfile(r3, 0xffffffffffffffff, &(0x7f0000000040), 0x0) r4 = add_key$user(&(0x7f0000000040)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)='X', 0x1, 0xfffffffffffffffe) keyctl$update(0x2, r4, &(0x7f00000006c0)="c0ca1cdbaa1aedbbed80dddaa28e15b9449e2e82cca4244c40ffd0fd4e6631c7d3d86e1339de17344340b02dd527f2d8b3ae6c1db3594e657da33c3ec668f143974a65753472df5319a6b83e1e86b8f2666c61a2e700d1c1e0ae1fc52494bd4885a5c64e9007d39fa11313805290dd6342f9775f01a02ec88f6bee22f25a377a9b143abba1264586d2779088006d5f9be82b00f10287031623f73470264cc5897f18f357aad6deb3883da88ae2266664933785a3ce72bb224a441437ea93c217", 0xc0) add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x9a, 0xfffffffffffffffd) 18:44:17 executing program 0: setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, 0x0, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_EVENTS(0xffffffffffffffff, 0x84, 0xb, &(0x7f0000000040), 0x0) ioctl$DRM_IOCTL_RM_CTX(0xffffffffffffffff, 0xc0086421, &(0x7f0000000300)={0x0, 0x1}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB='lockproto=lock_nolock,locktable=.']) 18:44:17 executing program 4: 18:44:17 executing program 1: 18:44:17 executing program 2: 18:44:17 executing program 1: [ 322.871512][T12406] hfs: unable to parse mount options 18:44:17 executing program 5: statx(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x2000, 0x800, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0}) syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x9, 0x0, &(0x7f00000000c0), 0x200000, &(0x7f0000000240)={[{@part={'part', 0x3d, 0xa14}}, {@file_umask={'file_umask', 0x3d, 0x657936f8}}, {@type={'type', 0x3d, "6d6d69c8"}}], [{@fsmagic={'fsmagic', 0x3d, 0x6be0}}, {@obj_type={'obj_type', 0x3d, '@%\'em1\x00'}}, {@euid_lt={'euid<', r0}}, {@fsuuid={'fsuuid', 0x3d, {[0x32, 0x36, 0x65, 0x64, 0x36, 0x64, 0x0, 0x30], 0x2d, [0x66, 0x61, 0x65, 0x37], 0x2d, [0x64, 0x62, 0x64, 0x30], 0x2d, [0x36, 0x37, 0x64, 0x35], 0x2d, [0x61, 0x61, 0x31, 0x63, 0x5a, 0x38, 0x63, 0x36]}}}, {@dont_appraise='dont_appraise'}]}) r1 = openat$md(0xffffffffffffff9c, &(0x7f0000000080)='/dev/md0\x00', 0x0, 0x0) ioctl$BLKALIGNOFF(r1, 0x127a, &(0x7f00000000c0)) ioctl$BLKPG(r1, 0x40140921, 0x0) 18:44:17 executing program 4: 18:44:17 executing program 2: 18:44:17 executing program 2: 18:44:17 executing program 1: 18:44:17 executing program 2: [ 323.080865][T12423] hfs: unable to parse mount options [ 323.091200][T12415] gfs2: fsid=.: Trying to join cluster "lock_nolock", "." [ 323.123880][T12415] gfs2: fsid=.: Now mounting FS... [ 323.168661][T12415] gfs2: not a GFS2 filesystem [ 323.191059][T12415] gfs2: fsid=.: can't read superblock 18:44:18 executing program 3: ioctl$TIOCSPTLCK(0xffffffffffffffff, 0x40045431, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000380)) r2 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$TCSETAW(0xffffffffffffffff, 0x5407, 0x0) ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$inet6(0xa, 0x2, 0x0) sendfile(r3, 0xffffffffffffffff, &(0x7f0000000040), 0x0) r4 = add_key$user(&(0x7f0000000040)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)='X', 0x1, 0xfffffffffffffffe) keyctl$update(0x2, r4, &(0x7f00000006c0)="c0ca1cdbaa1aedbbed80dddaa28e15b9449e2e82cca4244c40ffd0fd4e6631c7d3d86e1339de17344340b02dd527f2d8b3ae6c1db3594e657da33c3ec668f143974a65753472df5319a6b83e1e86b8f2666c61a2e700d1c1e0ae1fc52494bd4885a5c64e9007d39fa11313805290dd6342f9775f01a02ec88f6bee22f25a377a9b143abba1264586d2779088006d5f9be82b00f10287031623f73470264cc5897f18f357aad6deb3883da88ae2266664933785a3ce72bb224a441437ea93c217", 0xc0) add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x9a, 0xfffffffffffffffd) [ 323.231173][T12415] gfs2: fsid=.: can't read superblock: -22 18:44:18 executing program 0: setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, 0x0, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_EVENTS(0xffffffffffffffff, 0x84, 0xb, &(0x7f0000000040), 0x0) ioctl$DRM_IOCTL_RM_CTX(0xffffffffffffffff, 0xc0086421, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB='lockproto=lock_nolock,locktable=.']) 18:44:18 executing program 4: 18:44:18 executing program 5: statx(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x2000, 0x800, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0}) syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x9, 0x0, &(0x7f00000000c0), 0x200000, &(0x7f0000000240)={[{@part={'part', 0x3d, 0xa14}}, {@file_umask={'file_umask', 0x3d, 0x657936f8}}, {@type={'type', 0x3d, "6d6d69c8"}}], [{@fsmagic={'fsmagic', 0x3d, 0x6be0}}, {@obj_type={'obj_type', 0x3d, '@%\'em1\x00'}}, {@euid_lt={'euid<', r0}}, {@fsuuid={'fsuuid', 0x3d, {[0x32, 0x36, 0x65, 0x64, 0x36, 0x64, 0x0, 0x30], 0x2d, [0x66, 0x61, 0x65, 0x37], 0x2d, [0x64, 0x62, 0x64, 0x30], 0x2d, [0x36, 0x37, 0x64, 0x35], 0x2d, [0x61, 0x61, 0x31, 0x63, 0x5a, 0x38, 0x63, 0x36]}}}, {@dont_appraise='dont_appraise'}]}) r1 = openat$md(0xffffffffffffff9c, &(0x7f0000000080)='/dev/md0\x00', 0x0, 0x0) ioctl$BLKALIGNOFF(r1, 0x127a, &(0x7f00000000c0)) ioctl$BLKPG(r1, 0x40140921, 0x0) 18:44:18 executing program 1: 18:44:18 executing program 2: 18:44:18 executing program 3: ioctl$TIOCSPTLCK(0xffffffffffffffff, 0x40045431, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000380)) r2 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$TCSETAW(0xffffffffffffffff, 0x5407, 0x0) ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$inet6(0xa, 0x2, 0x0) sendfile(r3, 0xffffffffffffffff, &(0x7f0000000040), 0x0) r4 = add_key$user(&(0x7f0000000040)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)='X', 0x1, 0xfffffffffffffffe) keyctl$update(0x2, r4, &(0x7f00000006c0)="c0ca1cdbaa1aedbbed80dddaa28e15b9449e2e82cca4244c40ffd0fd4e6631c7d3d86e1339de17344340b02dd527f2d8b3ae6c1db3594e657da33c3ec668f143974a65753472df5319a6b83e1e86b8f2666c61a2e700d1c1e0ae1fc52494bd4885a5c64e9007d39fa11313805290dd6342f9775f01a02ec88f6bee22f25a377a9b143abba1264586d2779088006d5f9be82b00f10287031623f73470264cc5897f18f357aad6deb3883da88ae2266664933785a3ce72bb224a441437ea93c217", 0xc0) add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x9a, 0xfffffffffffffffd) 18:44:18 executing program 2: 18:44:18 executing program 1: 18:44:18 executing program 4: [ 323.613045][T12446] hfs: unable to parse mount options 18:44:18 executing program 5: statx(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x2000, 0x800, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0}) syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x9, 0x0, &(0x7f00000000c0), 0x200000, &(0x7f0000000240)={[{@part={'part', 0x3d, 0xa14}}, {@file_umask={'file_umask', 0x3d, 0x657936f8}}, {@type={'type', 0x3d, "6d6d69c8"}}], [{@fsmagic={'fsmagic', 0x3d, 0x6be0}}, {@obj_type={'obj_type', 0x3d, '@%\'em1\x00'}}, {@euid_lt={'euid<', r0}}, {@fsuuid={'fsuuid', 0x3d, {[0x32, 0x36, 0x65, 0x64, 0x36, 0x0, 0x39, 0x30], 0x2d, [0x66, 0x61, 0x65, 0x37], 0x2d, [0x64, 0x62, 0x64, 0x30], 0x2d, [0x36, 0x37, 0x64, 0x35], 0x2d, [0x61, 0x61, 0x31, 0x63, 0x5a, 0x38, 0x63, 0x36]}}}, {@dont_appraise='dont_appraise'}]}) r1 = openat$md(0xffffffffffffff9c, &(0x7f0000000080)='/dev/md0\x00', 0x0, 0x0) ioctl$BLKALIGNOFF(r1, 0x127a, &(0x7f00000000c0)) ioctl$BLKPG(r1, 0x40140921, 0x0) 18:44:18 executing program 2: 18:44:18 executing program 4: [ 323.752064][T12454] gfs2: fsid=.: Trying to join cluster "lock_nolock", "." [ 323.797574][T12454] gfs2: fsid=.: Now mounting FS... [ 323.806707][T12454] gfs2: not a GFS2 filesystem [ 323.824480][T12463] hfs: unable to parse mount options [ 323.830816][T12454] gfs2: fsid=.: can't read superblock [ 323.836378][T12454] gfs2: fsid=.: can't read superblock: -22 18:44:18 executing program 0: setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, 0x0, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_EVENTS(0xffffffffffffffff, 0x84, 0xb, &(0x7f0000000040), 0x0) ioctl$DRM_IOCTL_RM_CTX(0xffffffffffffffff, 0xc0086421, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB='lockproto=lock_nolock,locktable=.']) 18:44:18 executing program 1: syz_emit_ethernet(0x2a, &(0x7f0000000d40)={@link_local={0x1, 0x80, 0xc2, 0x0, 0xff}, @local, @void, {@arp={0x806, @ether_ipv4={0x1, 0x800, 0x6, 0x4, 0x1, @random="15ea2f422a82", @rand_addr=0x4000000, @link_local, @dev}}}}, 0x0) 18:44:18 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, "eaffff5390000000000100ef93185d00"}) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETA(r0, 0x5406, &(0x7f0000000040)={0x0, 0x0, 0x0, 0xa7d, 0x0, "db4c3a857d00"}) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000200)={0xffffffdb, 0x0, 0x0, 0x0, 0x0, "f4ffbc9cfe010000edfe00e100"}) 18:44:18 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, "eaffff5390000000000100ef93185d00"}) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETA(r0, 0x5406, &(0x7f0000000040)={0x0, 0x0, 0x0, 0xa7d, 0x0, "db4c3a857d00"}) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000200)={0x4c, 0x0, 0x0, 0x0, 0x0, "f4ffbc9cfe010000edfe00e100"}) 18:44:18 executing program 5: statx(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x2000, 0x800, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0}) syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x9, 0x0, &(0x7f00000000c0), 0x200000, &(0x7f0000000240)={[{@part={'part', 0x3d, 0xa14}}, {@file_umask={'file_umask', 0x3d, 0x657936f8}}, {@type={'type', 0x3d, "6d6d69c8"}}], [{@fsmagic={'fsmagic', 0x3d, 0x6be0}}, {@obj_type={'obj_type', 0x3d, '@%\'em1\x00'}}, {@euid_lt={'euid<', r0}}, {@fsuuid={'fsuuid', 0x3d, {[0x32, 0x36, 0x65, 0x64, 0x36, 0x0, 0x39, 0x30], 0x2d, [0x66, 0x61, 0x65, 0x37], 0x2d, [0x64, 0x62, 0x64, 0x30], 0x2d, [0x36, 0x37, 0x64, 0x35], 0x2d, [0x61, 0x61, 0x31, 0x63, 0x5a, 0x38, 0x63, 0x36]}}}, {@dont_appraise='dont_appraise'}]}) r1 = openat$md(0xffffffffffffff9c, &(0x7f0000000080)='/dev/md0\x00', 0x0, 0x0) ioctl$BLKALIGNOFF(r1, 0x127a, &(0x7f00000000c0)) ioctl$BLKPG(r1, 0x40140921, 0x0) 18:44:18 executing program 3: ioctl$TIOCSPTLCK(0xffffffffffffffff, 0x40045431, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000380)) r2 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$TCSETAW(0xffffffffffffffff, 0x5407, 0x0) ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$inet6(0xa, 0x2, 0x0) sendfile(r3, 0xffffffffffffffff, &(0x7f0000000040), 0x0) r4 = add_key$user(&(0x7f0000000040)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)='X', 0x1, 0xfffffffffffffffe) keyctl$update(0x2, r4, &(0x7f00000006c0)="c0ca1cdbaa1aedbbed80dddaa28e15b9449e2e82cca4244c40ffd0fd4e6631c7d3d86e1339de17344340b02dd527f2d8b3ae6c1db3594e657da33c3ec668f143974a65753472df5319a6b83e1e86b8f2666c61a2e700d1c1e0ae1fc52494bd4885a5c64e9007d39fa11313805290dd6342f9775f01a02ec88f6bee22f25a377a9b143abba1264586d2779088006d5f9be82b00f10287031623f73470264cc5897f18f357aad6deb3883da88ae2266664933785a3ce72bb224a441437ea93c217", 0xc0) add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x9a, 0xfffffffffffffffd) 18:44:19 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, "eaffff5390000000000100ef93185d00"}) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETA(r0, 0x5406, &(0x7f0000000040)={0x0, 0x0, 0x0, 0xa7d, 0x0, "db4c3a857d00"}) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000200)={0x1a, 0x0, 0x0, 0x0, 0x0, "f4ffbc9cfe010000edfe00e100"}) [ 324.218283][T12485] hfs: unable to parse mount options 18:44:19 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, "eaffff5390000000000100ef93185d00"}) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000200)={0x1a, 0x0, 0x0, 0x0, 0x0, "f4ffbc9cfe010000edfe00e100"}) 18:44:19 executing program 2: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x0, 0x2812, r0, 0x0) mmap(&(0x7f0000004000/0x4000)=nil, 0x4000, 0x0, 0x32, 0xffffffffffffffff, 0x0) munlock(&(0x7f0000002000/0x2000)=nil, 0x2000) 18:44:19 executing program 5: statx(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x2000, 0x800, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0}) syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x9, 0x0, &(0x7f00000000c0), 0x200000, &(0x7f0000000240)={[{@part={'part', 0x3d, 0xa14}}, {@file_umask={'file_umask', 0x3d, 0x657936f8}}, {@type={'type', 0x3d, "6d6d69c8"}}], [{@fsmagic={'fsmagic', 0x3d, 0x6be0}}, {@obj_type={'obj_type', 0x3d, '@%\'em1\x00'}}, {@euid_lt={'euid<', r0}}, {@fsuuid={'fsuuid', 0x3d, {[0x32, 0x36, 0x65, 0x64, 0x36, 0x0, 0x39, 0x30], 0x2d, [0x66, 0x61, 0x65, 0x37], 0x2d, [0x64, 0x62, 0x64, 0x30], 0x2d, [0x36, 0x37, 0x64, 0x35], 0x2d, [0x61, 0x61, 0x31, 0x63, 0x5a, 0x38, 0x63, 0x36]}}}, {@dont_appraise='dont_appraise'}]}) r1 = openat$md(0xffffffffffffff9c, &(0x7f0000000080)='/dev/md0\x00', 0x0, 0x0) ioctl$BLKALIGNOFF(r1, 0x127a, &(0x7f00000000c0)) ioctl$BLKPG(r1, 0x40140921, 0x0) 18:44:19 executing program 4: syz_emit_ethernet(0x3a, &(0x7f0000000000)=ANY=[@ANYBLOB="0180c2000000aaaaaaaaaa0081000300080045000028000000000002907800000000e081327bf1ff907800"/58], 0x0) [ 324.449962][T12508] hfs: unable to parse mount options 18:44:19 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f00000002c0)=ANY=[@ANYBLOB="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"], 0x1) r1 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r1, &(0x7f0000000180)={0x2, 0x0, @local}, 0x10) sendmmsg(r1, &(0x7f0000007fc0), 0x400000000000030, 0x0) [ 324.479430][T12496] gfs2: fsid=.: Trying to join cluster "lock_nolock", "." [ 324.516888][T12496] gfs2: fsid=.: Now mounting FS... [ 324.547630][T12496] gfs2: not a GFS2 filesystem [ 324.576916][T12496] gfs2: fsid=.: can't read superblock [ 324.615600][T12496] gfs2: fsid=.: can't read superblock: -22 [ 324.662130][T12520] x_tables: duplicate underflow at hook 2 [ 324.696479][T12520] x_tables: duplicate underflow at hook 2 18:44:19 executing program 0: setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, 0x0, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_EVENTS(0xffffffffffffffff, 0x84, 0xb, &(0x7f0000000040), 0x0) ioctl$DRM_IOCTL_RM_CTX(0xffffffffffffffff, 0xc0086421, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB='lockproto=lock_nolock,locktable=.']) 18:44:19 executing program 2: r0 = msgget$private(0x0, 0x0) msgsnd(r0, &(0x7f0000000180)=ANY=[@ANYBLOB="95"], 0x1, 0x0) 18:44:19 executing program 1: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup/syz1\x00', 0x200002, 0x0) fchdir(r0) r1 = creat(&(0x7f0000000680)='./bus\x00', 0x0) r2 = creat(&(0x7f0000000100)='./bus\x00', 0x18) lseek(r1, 0xb6b, 0x0) fsetxattr$system_posix_acl(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) stat(&(0x7f00000003c0)='./file0\x00', 0x0) fallocate(r2, 0x0, 0x0, 0x7fff) r3 = open(&(0x7f0000001840)='./bus\x00', 0x0, 0x0) sendfile(r1, r3, 0x0, 0x8400fffffffa) lseek(r1, 0x0, 0x3) 18:44:19 executing program 5: statx(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x2000, 0x800, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0}) syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x9, 0x0, &(0x7f00000000c0), 0x200000, &(0x7f0000000240)={[{@part={'part', 0x3d, 0xa14}}, {@file_umask={'file_umask', 0x3d, 0x657936f8}}, {@type={'type', 0x3d, "6d6d69c8"}}], [{@fsmagic={'fsmagic', 0x3d, 0x6be0}}, {@obj_type={'obj_type', 0x3d, '@%\'em1\x00'}}, {@euid_lt={'euid<', r0}}, {@fsuuid={'fsuuid', 0x3d, {[0x32, 0x36, 0x65, 0x64, 0x0, 0x64, 0x39, 0x30], 0x2d, [0x66, 0x61, 0x65, 0x37], 0x2d, [0x64, 0x62, 0x64, 0x30], 0x2d, [0x36, 0x37, 0x64, 0x35], 0x2d, [0x61, 0x61, 0x31, 0x63, 0x5a, 0x38, 0x63, 0x36]}}}, {@dont_appraise='dont_appraise'}]}) r1 = openat$md(0xffffffffffffff9c, &(0x7f0000000080)='/dev/md0\x00', 0x0, 0x0) ioctl$BLKALIGNOFF(r1, 0x127a, &(0x7f00000000c0)) ioctl$BLKPG(r1, 0x40140921, 0x0) 18:44:19 executing program 3: ioctl$TIOCSPTLCK(0xffffffffffffffff, 0x40045431, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000380)) r2 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$TCSETAW(0xffffffffffffffff, 0x5407, 0x0) ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) r3 = socket$inet6(0xa, 0x2, 0x0) sendfile(r3, 0xffffffffffffffff, &(0x7f0000000040), 0x0) r4 = add_key$user(&(0x7f0000000040)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)='X', 0x1, 0xfffffffffffffffe) keyctl$update(0x2, r4, &(0x7f00000006c0)="c0ca1cdbaa1aedbbed80dddaa28e15b9449e2e82cca4244c40ffd0fd4e6631c7d3d86e1339de17344340b02dd527f2d8b3ae6c1db3594e657da33c3ec668f143974a65753472df5319a6b83e1e86b8f2666c61a2e700d1c1e0ae1fc52494bd4885a5c64e9007d39fa11313805290dd6342f9775f01a02ec88f6bee22f25a377a9b143abba1264586d2779088006d5f9be82b00f10287031623f73470264cc5897f18f357aad6deb3883da88ae2266664933785a3ce72bb224a441437ea93c217", 0xc0) add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x9a, 0xfffffffffffffffd) 18:44:19 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clock_nanosleep(0xfffffffffffffff6, 0x0, &(0x7f00000002c0), 0x0) 18:44:19 executing program 4: splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x2a7) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() setsockopt$inet6_int(r0, 0x29, 0x48, 0x0, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x20) wait4(0x0, 0x0, 0x0, 0x0) [ 325.074247][T12539] hfs: unable to parse mount options 18:44:19 executing program 2: r0 = socket$phonet_pipe(0x23, 0x5, 0x2) connect$phonet_pipe(r0, &(0x7f0000000140), 0x10) 18:44:20 executing program 5: statx(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x2000, 0x800, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0}) syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x9, 0x0, &(0x7f00000000c0), 0x200000, &(0x7f0000000240)={[{@part={'part', 0x3d, 0xa14}}, {@file_umask={'file_umask', 0x3d, 0x657936f8}}, {@type={'type', 0x3d, "6d6d69c8"}}], [{@fsmagic={'fsmagic', 0x3d, 0x6be0}}, {@obj_type={'obj_type', 0x3d, '@%\'em1\x00'}}, {@euid_lt={'euid<', r0}}, {@fsuuid={'fsuuid', 0x3d, {[0x32, 0x36, 0x65, 0x64, 0x0, 0x64, 0x39, 0x30], 0x2d, [0x66, 0x61, 0x65, 0x37], 0x2d, [0x64, 0x62, 0x64, 0x30], 0x2d, [0x36, 0x37, 0x64, 0x35], 0x2d, [0x61, 0x61, 0x31, 0x63, 0x5a, 0x38, 0x63, 0x36]}}}, {@dont_appraise='dont_appraise'}]}) r1 = openat$md(0xffffffffffffff9c, &(0x7f0000000080)='/dev/md0\x00', 0x0, 0x0) ioctl$BLKALIGNOFF(r1, 0x127a, &(0x7f00000000c0)) ioctl$BLKPG(r1, 0x40140921, 0x0) [ 325.119572][ T27] audit: type=1804 audit(1585421059.916:24): pid=12542 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir382713517/syzkaller.zEAI5K/76/bus" dev="sda1" ino=15921 res=1 [ 325.270026][T12548] gfs2: fsid=.: Trying to join cluster "lock_nolock", "." [ 325.289492][T12548] gfs2: fsid=.: Now mounting FS... [ 325.307243][T12562] hfs: unable to parse mount options [ 325.318126][T12548] gfs2: not a GFS2 filesystem [ 325.325497][T12548] gfs2: fsid=.: can't read superblock [ 325.333575][T12548] gfs2: fsid=.: can't read superblock: -22 18:44:20 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xd744aad4b10bc156, &(0x7f0000000080)=[{&(0x7f0000000040)="5a48000024007106d25a80648c63940d0424fc60464811400a2f0000051982c137153e370907088000f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0xf0ffff}, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") 18:44:20 executing program 5: statx(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x2000, 0x800, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0}) syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x9, 0x0, &(0x7f00000000c0), 0x200000, &(0x7f0000000240)={[{@part={'part', 0x3d, 0xa14}}, {@file_umask={'file_umask', 0x3d, 0x657936f8}}, {@type={'type', 0x3d, "6d6d69c8"}}], [{@fsmagic={'fsmagic', 0x3d, 0x6be0}}, {@obj_type={'obj_type', 0x3d, '@%\'em1\x00'}}, {@euid_lt={'euid<', r0}}, {@fsuuid={'fsuuid', 0x3d, {[0x32, 0x36, 0x65, 0x64, 0x0, 0x64, 0x39, 0x30], 0x2d, [0x66, 0x61, 0x65, 0x37], 0x2d, [0x64, 0x62, 0x64, 0x30], 0x2d, [0x36, 0x37, 0x64, 0x35], 0x2d, [0x61, 0x61, 0x31, 0x63, 0x5a, 0x38, 0x63, 0x36]}}}, {@dont_appraise='dont_appraise'}]}) r1 = openat$md(0xffffffffffffff9c, &(0x7f0000000080)='/dev/md0\x00', 0x0, 0x0) ioctl$BLKALIGNOFF(r1, 0x127a, &(0x7f00000000c0)) ioctl$BLKPG(r1, 0x40140921, 0x0) 18:44:20 executing program 0: setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, 0x0, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_EVENTS(0xffffffffffffffff, 0x84, 0xb, &(0x7f0000000040), 0x0) ioctl$DRM_IOCTL_RM_CTX(0xffffffffffffffff, 0xc0086421, &(0x7f0000000300)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB='lockproto=lock_nolock,locktable=.']) 18:44:20 executing program 5: statx(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x2000, 0x800, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0}) syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x9, 0x0, &(0x7f00000000c0), 0x200000, &(0x7f0000000240)={[{@part={'part', 0x3d, 0xa14}}, {@file_umask={'file_umask', 0x3d, 0x657936f8}}, {@type={'type', 0x3d, "6d6d69c8"}}], [{@fsmagic={'fsmagic', 0x3d, 0x6be0}}, {@obj_type={'obj_type', 0x3d, '@%\'em1\x00'}}, {@euid_lt={'euid<', r0}}, {@fsuuid={'fsuuid', 0x3d, {[0x32, 0x36, 0x65, 0x0, 0x36, 0x64, 0x39, 0x30], 0x2d, [0x66, 0x61, 0x65, 0x37], 0x2d, [0x64, 0x62, 0x64, 0x30], 0x2d, [0x36, 0x37, 0x64, 0x35], 0x2d, [0x61, 0x61, 0x31, 0x63, 0x5a, 0x38, 0x63, 0x36]}}}, {@dont_appraise='dont_appraise'}]}) r1 = openat$md(0xffffffffffffff9c, &(0x7f0000000080)='/dev/md0\x00', 0x0, 0x0) ioctl$BLKALIGNOFF(r1, 0x127a, &(0x7f00000000c0)) ioctl$BLKPG(r1, 0x40140921, 0x0) [ 325.753166][T12582] hfs: unable to parse mount options 18:44:20 executing program 2: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) bind$netrom(r0, &(0x7f0000000240)={{0x6, @rose}, [@default, @bcast, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @default]}, 0x48) accept4$netrom(r0, &(0x7f0000000080)={{0x3, @rose}, [@default, @remote, @remote, @bcast, @rose, @netrom, @default, @bcast]}, &(0x7f0000000100)=0x48, 0x80000) r1 = socket$inet_tcp(0x2, 0x1, 0x0) socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r1, &(0x7f0000000200)={0x2, 0x4e20, @multicast1}, 0x10) connect$inet(r1, &(0x7f0000000000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x17}}, 0x10) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000040)='sit0\x00', 0x10) sendmmsg$inet(r1, &(0x7f0000003b40)=[{{0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000001940)="a5", 0xc01}], 0x1, 0x0, 0x0, 0x1cb}}, {{0x0, 0x0, &(0x7f0000000680)=[{&(0x7f0000000600)="da", 0x220908}], 0x1}}], 0x4000000000001cc, 0x4000000) [ 325.892298][T12591] gfs2: fsid=.: Trying to join cluster "lock_nolock", "." [ 325.943272][T12591] gfs2: fsid=.: Now mounting FS... [ 325.958113][ T27] audit: type=1804 audit(1585421060.756:25): pid=12601 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=ToMToU comm="syz-executor.1" name="/root/syzkaller-testdir382713517/syzkaller.zEAI5K/76/bus" dev="sda1" ino=15921 res=1 [ 325.992784][T12591] gfs2: not a GFS2 filesystem [ 325.997830][T12591] gfs2: fsid=.: can't read superblock [ 326.011276][T12591] gfs2: fsid=.: can't read superblock: -22 [ 326.077055][T12605] nf_conntrack: default automatic helper assignment has been turned off for security reasons and CT-based firewall rule not found. Use the iptables CT target to attach helpers instead. [ 326.114084][T12606] hfs: unable to parse mount options 18:44:21 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x6, 0x4, &(0x7f0000000200)=@framed={{0x18, 0x2}, [@call={0x85, 0x0, 0x0, 0x2c}]}, &(0x7f00000000c0)='GPL\x00', 0x4, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000013c0)={r0, 0x0, 0x0, 0x2a, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, &(0x7f0000001200)="17", 0x0}, 0x40) 18:44:21 executing program 4: syz_emit_ethernet(0xe, &(0x7f0000000000)={@multicast, @dev, @void, {@generic={0x88f5}}}, 0x0) [ 326.138327][ T27] audit: type=1804 audit(1585421060.806:26): pid=12554 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=ToMToU comm="syz-executor.1" name="/root/syzkaller-testdir382713517/syzkaller.zEAI5K/76/bus" dev="sda1" ino=15921 res=1 [ 326.313088][ T27] audit: type=1804 audit(1585421060.936:27): pid=12604 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir382713517/syzkaller.zEAI5K/76/bus" dev="sda1" ino=15921 res=1 18:44:21 executing program 3: ioctl$TIOCSPTLCK(0xffffffffffffffff, 0x40045431, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000380)) r2 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$TCSETAW(0xffffffffffffffff, 0x5407, 0x0) ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) r3 = socket$inet6(0xa, 0x2, 0x0) sendfile(r3, 0xffffffffffffffff, &(0x7f0000000040), 0x0) r4 = add_key$user(&(0x7f0000000040)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)='X', 0x1, 0xfffffffffffffffe) keyctl$update(0x2, r4, &(0x7f00000006c0)="c0ca1cdbaa1aedbbed80dddaa28e15b9449e2e82cca4244c40ffd0fd4e6631c7d3d86e1339de17344340b02dd527f2d8b3ae6c1db3594e657da33c3ec668f143974a65753472df5319a6b83e1e86b8f2666c61a2e700d1c1e0ae1fc52494bd4885a5c64e9007d39fa11313805290dd6342f9775f01a02ec88f6bee22f25a377a9b143abba1264586d2779088006d5f9be82b00f10287031623f73470264cc5897f18f357aad6deb3883da88ae2266664933785a3ce72bb224a441437ea93c217", 0xc0) add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x9a, 0xfffffffffffffffd) 18:44:21 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000200)={0x2, 0x4e20, @multicast1}, 0x10) connect$inet(r0, &(0x7f0000000000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x17}}, 0x10) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") getpeername(r0, &(0x7f0000000080)=@un=@abs, &(0x7f0000000100)=0x80) 18:44:21 executing program 2: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) bind$netrom(r0, &(0x7f0000000240)={{0x6, @rose}, [@default, @bcast, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @default]}, 0x48) accept4$netrom(r0, &(0x7f0000000080)={{0x3, @rose}, [@default, @remote, @remote, @bcast, @rose, @netrom, @default, @bcast]}, &(0x7f0000000100)=0x48, 0x80000) r1 = socket$inet_tcp(0x2, 0x1, 0x0) socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r1, &(0x7f0000000200)={0x2, 0x4e20, @multicast1}, 0x10) connect$inet(r1, &(0x7f0000000000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x17}}, 0x10) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000040)='sit0\x00', 0x10) sendmmsg$inet(r1, &(0x7f0000003b40)=[{{0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000001940)="a5", 0xc01}], 0x1, 0x0, 0x0, 0x1cb}}, {{0x0, 0x0, &(0x7f0000000680)=[{&(0x7f0000000600)="da", 0x220908}], 0x1}}], 0x4000000000001cc, 0x4000000) 18:44:21 executing program 5: statx(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x2000, 0x800, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0}) syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x9, 0x0, &(0x7f00000000c0), 0x200000, &(0x7f0000000240)={[{@part={'part', 0x3d, 0xa14}}, {@file_umask={'file_umask', 0x3d, 0x657936f8}}, {@type={'type', 0x3d, "6d6d69c8"}}], [{@fsmagic={'fsmagic', 0x3d, 0x6be0}}, {@obj_type={'obj_type', 0x3d, '@%\'em1\x00'}}, {@euid_lt={'euid<', r0}}, {@fsuuid={'fsuuid', 0x3d, {[0x32, 0x36, 0x65, 0x0, 0x36, 0x64, 0x39, 0x30], 0x2d, [0x66, 0x61, 0x65, 0x37], 0x2d, [0x64, 0x62, 0x64, 0x30], 0x2d, [0x36, 0x37, 0x64, 0x35], 0x2d, [0x61, 0x61, 0x31, 0x63, 0x5a, 0x38, 0x63, 0x36]}}}, {@dont_appraise='dont_appraise'}]}) r1 = openat$md(0xffffffffffffff9c, &(0x7f0000000080)='/dev/md0\x00', 0x0, 0x0) ioctl$BLKALIGNOFF(r1, 0x127a, &(0x7f00000000c0)) ioctl$BLKPG(r1, 0x40140921, 0x0) 18:44:21 executing program 0: setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, 0x0, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_EVENTS(0xffffffffffffffff, 0x84, 0xb, &(0x7f0000000040), 0x0) ioctl$DRM_IOCTL_RM_CTX(0xffffffffffffffff, 0xc0086421, &(0x7f0000000300)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB='lockproto=lock_nolock,locktable=.']) 18:44:21 executing program 1: r0 = epoll_create(0x4) dup(r0) [ 326.870790][T12636] nf_conntrack: default automatic helper assignment has been turned off for security reasons and CT-based firewall rule not found. Use the iptables CT target to attach helpers instead. 18:44:21 executing program 1: msgsnd(0x0, &(0x7f0000000000), 0xfffffffffffffd57, 0x0) 18:44:21 executing program 4: r0 = socket(0x1f, 0x5, 0x0) recvmsg(r0, &(0x7f0000000400)={0x0, 0x0, 0x0}, 0x843) [ 326.984164][T12643] hfs: unable to parse mount options 18:44:21 executing program 2: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) bind$netrom(r0, &(0x7f0000000240)={{0x6, @rose}, [@default, @bcast, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @default]}, 0x48) accept4$netrom(r0, &(0x7f0000000080)={{0x3, @rose}, [@default, @remote, @remote, @bcast, @rose, @netrom, @default, @bcast]}, &(0x7f0000000100)=0x48, 0x80000) r1 = socket$inet_tcp(0x2, 0x1, 0x0) socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r1, &(0x7f0000000200)={0x2, 0x4e20, @multicast1}, 0x10) connect$inet(r1, &(0x7f0000000000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x17}}, 0x10) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000040)='sit0\x00', 0x10) sendmmsg$inet(r1, &(0x7f0000003b40)=[{{0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000001940)="a5", 0xc01}], 0x1, 0x0, 0x0, 0x1cb}}, {{0x0, 0x0, &(0x7f0000000680)=[{&(0x7f0000000600)="da", 0x220908}], 0x1}}], 0x4000000000001cc, 0x4000000) 18:44:21 executing program 5: statx(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x2000, 0x800, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0}) syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x9, 0x0, &(0x7f00000000c0), 0x200000, &(0x7f0000000240)={[{@part={'part', 0x3d, 0xa14}}, {@file_umask={'file_umask', 0x3d, 0x657936f8}}, {@type={'type', 0x3d, "6d6d69c8"}}], [{@fsmagic={'fsmagic', 0x3d, 0x6be0}}, {@obj_type={'obj_type', 0x3d, '@%\'em1\x00'}}, {@euid_lt={'euid<', r0}}, {@fsuuid={'fsuuid', 0x3d, {[0x32, 0x36, 0x65, 0x0, 0x36, 0x64, 0x39, 0x30], 0x2d, [0x66, 0x61, 0x65, 0x37], 0x2d, [0x64, 0x62, 0x64, 0x30], 0x2d, [0x36, 0x37, 0x64, 0x35], 0x2d, [0x61, 0x61, 0x31, 0x63, 0x5a, 0x38, 0x63, 0x36]}}}, {@dont_appraise='dont_appraise'}]}) r1 = openat$md(0xffffffffffffff9c, &(0x7f0000000080)='/dev/md0\x00', 0x0, 0x0) ioctl$BLKALIGNOFF(r1, 0x127a, &(0x7f00000000c0)) ioctl$BLKPG(r1, 0x40140921, 0x0) 18:44:21 executing program 1: socket(0x1f, 0x5, 0x0) [ 327.070349][T12641] gfs2: fsid=.: Trying to join cluster "lock_nolock", "." [ 327.105740][T12641] gfs2: fsid=.: Now mounting FS... 18:44:22 executing program 4: sync() mknod$loop(&(0x7f0000000040)='./file0\x00', 0x0, 0x1) rename(&(0x7f0000000500)='./file0\x00', &(0x7f0000000540)='./file1\x00') utimes(&(0x7f0000000080)='./file1/file0\x00', 0x0) [ 327.153133][T12641] gfs2: not a GFS2 filesystem [ 327.180332][T12641] gfs2: fsid=.: can't read superblock [ 327.215461][T12641] gfs2: fsid=.: can't read superblock: -22 18:44:22 executing program 3: ioctl$TIOCSPTLCK(0xffffffffffffffff, 0x40045431, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000380)) r2 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$TCSETAW(0xffffffffffffffff, 0x5407, 0x0) ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) r3 = socket$inet6(0xa, 0x2, 0x0) sendfile(r3, 0xffffffffffffffff, &(0x7f0000000040), 0x0) r4 = add_key$user(&(0x7f0000000040)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)='X', 0x1, 0xfffffffffffffffe) keyctl$update(0x2, r4, &(0x7f00000006c0)="c0ca1cdbaa1aedbbed80dddaa28e15b9449e2e82cca4244c40ffd0fd4e6631c7d3d86e1339de17344340b02dd527f2d8b3ae6c1db3594e657da33c3ec668f143974a65753472df5319a6b83e1e86b8f2666c61a2e700d1c1e0ae1fc52494bd4885a5c64e9007d39fa11313805290dd6342f9775f01a02ec88f6bee22f25a377a9b143abba1264586d2779088006d5f9be82b00f10287031623f73470264cc5897f18f357aad6deb3883da88ae2266664933785a3ce72bb224a441437ea93c217", 0xc0) add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x9a, 0xfffffffffffffffd) 18:44:22 executing program 1: r0 = openat$pidfd(0xffffffffffffff9c, &(0x7f0000000740)='/proc/self\x00', 0x0, 0x0) r1 = memfd_create(&(0x7f0000000040)='trustedeth1vboxnet1vboxnet1user\x00', 0x0) mmap(&(0x7f0000000000/0x1000)=nil, 0x1000, 0x0, 0x812, r1, 0x0) syncfs(r0) close(r0) socketpair(0x1, 0x3, 0x0, 0x0) [ 327.234527][T12665] hfs: unable to parse mount options 18:44:22 executing program 2: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) bind$netrom(r0, &(0x7f0000000240)={{0x6, @rose}, [@default, @bcast, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @default]}, 0x48) accept4$netrom(r0, &(0x7f0000000080)={{0x3, @rose}, [@default, @remote, @remote, @bcast, @rose, @netrom, @default, @bcast]}, &(0x7f0000000100)=0x48, 0x80000) r1 = socket$inet_tcp(0x2, 0x1, 0x0) socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r1, &(0x7f0000000200)={0x2, 0x4e20, @multicast1}, 0x10) connect$inet(r1, &(0x7f0000000000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x17}}, 0x10) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000040)='sit0\x00', 0x10) sendmmsg$inet(r1, &(0x7f0000003b40)=[{{0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000001940)="a5", 0xc01}], 0x1, 0x0, 0x0, 0x1cb}}, {{0x0, 0x0, &(0x7f0000000680)=[{&(0x7f0000000600)="da", 0x220908}], 0x1}}], 0x4000000000001cc, 0x4000000) 18:44:22 executing program 1: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='cmdline\x00') write$P9_RREAD(r0, 0x0, 0x0) 18:44:22 executing program 0: setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, 0x0, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_EVENTS(0xffffffffffffffff, 0x84, 0xb, &(0x7f0000000040), 0x0) ioctl$DRM_IOCTL_RM_CTX(0xffffffffffffffff, 0xc0086421, &(0x7f0000000300)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB='lockproto=lock_nolock,locktable=.']) 18:44:22 executing program 3: ioctl$TIOCSPTLCK(0xffffffffffffffff, 0x40045431, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000380)) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$TCSETAW(0xffffffffffffffff, 0x5407, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) sendfile(r2, 0xffffffffffffffff, &(0x7f0000000040), 0x0) r3 = add_key$user(&(0x7f0000000040)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)='X', 0x1, 0xfffffffffffffffe) keyctl$update(0x2, r3, &(0x7f00000006c0)="c0ca1cdbaa1aedbbed80dddaa28e15b9449e2e82cca4244c40ffd0fd4e6631c7d3d86e1339de17344340b02dd527f2d8b3ae6c1db3594e657da33c3ec668f143974a65753472df5319a6b83e1e86b8f2666c61a2e700d1c1e0ae1fc52494bd4885a5c64e9007d39fa11313805290dd6342f9775f01a02ec88f6bee22f25a377a9b143abba1264586d2779088006d5f9be82b00f10287031623f73470264cc5897f18f357aad6deb3883da88ae2266664933785a3ce72bb224a441437ea93c217", 0xc0) add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x9a, 0xfffffffffffffffd) 18:44:22 executing program 5: statx(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x2000, 0x800, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0}) syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x9, 0x0, &(0x7f00000000c0), 0x200000, &(0x7f0000000240)={[{@part={'part', 0x3d, 0xa14}}, {@file_umask={'file_umask', 0x3d, 0x657936f8}}, {@type={'type', 0x3d, "6d6d69c8"}}], [{@fsmagic={'fsmagic', 0x3d, 0x6be0}}, {@obj_type={'obj_type', 0x3d, '@%\'em1\x00'}}, {@euid_lt={'euid<', r0}}, {@fsuuid={'fsuuid', 0x3d, {[0x32, 0x36, 0x0, 0x64, 0x36, 0x64, 0x39, 0x30], 0x2d, [0x66, 0x61, 0x65, 0x37], 0x2d, [0x64, 0x62, 0x64, 0x30], 0x2d, [0x36, 0x37, 0x64, 0x35], 0x2d, [0x61, 0x61, 0x31, 0x63, 0x5a, 0x38, 0x63, 0x36]}}}, {@dont_appraise='dont_appraise'}]}) r1 = openat$md(0xffffffffffffff9c, &(0x7f0000000080)='/dev/md0\x00', 0x0, 0x0) ioctl$BLKALIGNOFF(r1, 0x127a, &(0x7f00000000c0)) ioctl$BLKPG(r1, 0x40140921, 0x0) 18:44:22 executing program 1: r0 = open$dir(&(0x7f0000000280)='./file0\x00', 0x105040, 0x0) fcntl$getownex(r0, 0x10, &(0x7f0000000740)) 18:44:22 executing program 4: openat$pidfd(0xffffffffffffff9c, &(0x7f0000000240)='/proc/self\x00', 0x303000, 0x0) 18:44:22 executing program 4: socketpair$unix(0x1, 0x10000000000005, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='cpuacct.usage_percpu_user\x00', 0x275a, 0x0) r2 = dup3(r0, r1, 0x0) setsockopt$inet6_MRT6_ADD_MFC(r2, 0x29, 0xcc, 0x0, 0x0) [ 327.735483][ T27] audit: type=1800 audit(1585421062.537:28): pid=12697 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=collect_data cause=failed(directio) comm="syz-executor.1" name="file0" dev="sda1" ino=15745 res=0 [ 327.770979][T12702] hfs: unable to parse mount options [ 327.776763][T12698] gfs2: fsid=.: Trying to join cluster "lock_nolock", "." 18:44:22 executing program 2: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) bind$netrom(r0, &(0x7f0000000240)={{0x6, @rose}, [@default, @bcast, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @default]}, 0x48) accept4$netrom(r0, &(0x7f0000000080)={{0x3, @rose}, [@default, @remote, @remote, @bcast, @rose, @netrom, @default, @bcast]}, &(0x7f0000000100)=0x48, 0x80000) r1 = socket$inet_tcp(0x2, 0x1, 0x0) socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r1, &(0x7f0000000200)={0x2, 0x4e20, @multicast1}, 0x10) connect$inet(r1, &(0x7f0000000000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x17}}, 0x10) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000040)='sit0\x00', 0x10) 18:44:22 executing program 1: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='cmdline\x00') write$binfmt_misc(r0, 0x0, 0x0) 18:44:22 executing program 5: statx(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x2000, 0x800, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0}) syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x9, 0x0, &(0x7f00000000c0), 0x200000, &(0x7f0000000240)={[{@part={'part', 0x3d, 0xa14}}, {@file_umask={'file_umask', 0x3d, 0x657936f8}}, {@type={'type', 0x3d, "6d6d69c8"}}], [{@fsmagic={'fsmagic', 0x3d, 0x6be0}}, {@obj_type={'obj_type', 0x3d, '@%\'em1\x00'}}, {@euid_lt={'euid<', r0}}, {@fsuuid={'fsuuid', 0x3d, {[0x32, 0x36, 0x0, 0x64, 0x36, 0x64, 0x39, 0x30], 0x2d, [0x66, 0x61, 0x65, 0x37], 0x2d, [0x64, 0x62, 0x64, 0x30], 0x2d, [0x36, 0x37, 0x64, 0x35], 0x2d, [0x61, 0x61, 0x31, 0x63, 0x5a, 0x38, 0x63, 0x36]}}}, {@dont_appraise='dont_appraise'}]}) r1 = openat$md(0xffffffffffffff9c, &(0x7f0000000080)='/dev/md0\x00', 0x0, 0x0) ioctl$BLKALIGNOFF(r1, 0x127a, &(0x7f00000000c0)) ioctl$BLKPG(r1, 0x40140921, 0x0) [ 327.785627][ T27] audit: type=1800 audit(1585421062.597:29): pid=12697 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=collect_data cause=failed(directio) comm="syz-executor.1" name="file0" dev="sda1" ino=15745 res=0 [ 327.819471][T12698] gfs2: fsid=.: Now mounting FS... 18:44:22 executing program 2: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) bind$netrom(r0, &(0x7f0000000240)={{0x6, @rose}, [@default, @bcast, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @default]}, 0x48) accept4$netrom(r0, &(0x7f0000000080)={{0x3, @rose}, [@default, @remote, @remote, @bcast, @rose, @netrom, @default, @bcast]}, &(0x7f0000000100)=0x48, 0x80000) r1 = socket$inet_tcp(0x2, 0x1, 0x0) socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r1, &(0x7f0000000200)={0x2, 0x4e20, @multicast1}, 0x10) connect$inet(r1, &(0x7f0000000000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x17}}, 0x10) [ 327.865542][T12698] gfs2: not a GFS2 filesystem 18:44:22 executing program 4: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) open$dir(&(0x7f0000000040)='./file0\x00', 0x200, 0x0) 18:44:22 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) write$P9_RVERSION(r1, 0x0, 0x0) [ 327.901651][T12698] gfs2: fsid=.: can't read superblock [ 327.931516][T12698] gfs2: fsid=.: can't read superblock: -22 [ 328.001708][T12717] hfs: unable to parse mount options 18:44:23 executing program 0: setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, 0x0, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_EVENTS(0xffffffffffffffff, 0x84, 0xb, &(0x7f0000000040), 0x0) ioctl$DRM_IOCTL_RM_CTX(0xffffffffffffffff, 0xc0086421, &(0x7f0000000300)={0x0, 0x1}) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB='lockproto=lock_nolock,locktable=.']) 18:44:23 executing program 2: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) bind$netrom(r0, &(0x7f0000000240)={{0x6, @rose}, [@default, @bcast, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @default]}, 0x48) accept4$netrom(r0, &(0x7f0000000080)={{0x3, @rose}, [@default, @remote, @remote, @bcast, @rose, @netrom, @default, @bcast]}, &(0x7f0000000100)=0x48, 0x80000) r1 = socket$inet_tcp(0x2, 0x1, 0x0) socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r1, &(0x7f0000000200)={0x2, 0x4e20, @multicast1}, 0x10) 18:44:23 executing program 1: socketpair$unix(0x1, 0x10000000000005, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x10000000000005, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r0, 0x0, r1) setsockopt$inet6_mtu(r2, 0x29, 0x17, 0x0, 0x0) 18:44:23 executing program 4: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000380)='/dev/zero\x00', 0x0, 0x0) read(r0, 0x0, 0x0) 18:44:23 executing program 3: ioctl$TIOCSPTLCK(0xffffffffffffffff, 0x40045431, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000380)) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$TCSETAW(0xffffffffffffffff, 0x5407, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) sendfile(r2, 0xffffffffffffffff, &(0x7f0000000040), 0x0) r3 = add_key$user(&(0x7f0000000040)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)='X', 0x1, 0xfffffffffffffffe) keyctl$update(0x2, r3, &(0x7f00000006c0)="c0ca1cdbaa1aedbbed80dddaa28e15b9449e2e82cca4244c40ffd0fd4e6631c7d3d86e1339de17344340b02dd527f2d8b3ae6c1db3594e657da33c3ec668f143974a65753472df5319a6b83e1e86b8f2666c61a2e700d1c1e0ae1fc52494bd4885a5c64e9007d39fa11313805290dd6342f9775f01a02ec88f6bee22f25a377a9b143abba1264586d2779088006d5f9be82b00f10287031623f73470264cc5897f18f357aad6deb3883da88ae2266664933785a3ce72bb224a441437ea93c217", 0xc0) add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x9a, 0xfffffffffffffffd) 18:44:23 executing program 5: statx(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x2000, 0x800, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0}) syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x9, 0x0, &(0x7f00000000c0), 0x200000, &(0x7f0000000240)={[{@part={'part', 0x3d, 0xa14}}, {@file_umask={'file_umask', 0x3d, 0x657936f8}}, {@type={'type', 0x3d, "6d6d69c8"}}], [{@fsmagic={'fsmagic', 0x3d, 0x6be0}}, {@obj_type={'obj_type', 0x3d, '@%\'em1\x00'}}, {@euid_lt={'euid<', r0}}, {@fsuuid={'fsuuid', 0x3d, {[0x32, 0x36, 0x0, 0x64, 0x36, 0x64, 0x39, 0x30], 0x2d, [0x66, 0x61, 0x65, 0x37], 0x2d, [0x64, 0x62, 0x64, 0x30], 0x2d, [0x36, 0x37, 0x64, 0x35], 0x2d, [0x61, 0x61, 0x31, 0x63, 0x5a, 0x38, 0x63, 0x36]}}}, {@dont_appraise='dont_appraise'}]}) r1 = openat$md(0xffffffffffffff9c, &(0x7f0000000080)='/dev/md0\x00', 0x0, 0x0) ioctl$BLKALIGNOFF(r1, 0x127a, &(0x7f00000000c0)) ioctl$BLKPG(r1, 0x40140921, 0x0) 18:44:23 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f00000000c0)='.\x00', 0x0, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) r2 = dup2(r1, r0) getsockopt$inet_mreq(r2, 0x0, 0x20, &(0x7f0000000180)={@local, @multicast2}, &(0x7f00000001c0)=0x8) 18:44:23 executing program 2: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) bind$netrom(r0, &(0x7f0000000240)={{0x6, @rose}, [@default, @bcast, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @default]}, 0x48) accept4$netrom(r0, &(0x7f0000000080)={{0x3, @rose}, [@default, @remote, @remote, @bcast, @rose, @netrom, @default, @bcast]}, &(0x7f0000000100)=0x48, 0x80000) socket$inet_tcp(0x2, 0x1, 0x0) socket$inet_udp(0x2, 0x2, 0x0) 18:44:23 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='cpuacct.stat\x00', 0x275a, 0x0) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000000040)=0x0) sched_getaffinity(r1, 0x8, &(0x7f0000000080)) [ 328.431117][T12742] hfs: unable to parse mount options [ 328.514657][T12751] gfs2: fsid=.: Trying to join cluster "lock_nolock", "." [ 328.571859][T12751] gfs2: fsid=.: Now mounting FS... 18:44:23 executing program 5: statx(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x2000, 0x800, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0}) syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x9, 0x0, &(0x7f00000000c0), 0x200000, &(0x7f0000000240)={[{@part={'part', 0x3d, 0xa14}}, {@file_umask={'file_umask', 0x3d, 0x657936f8}}, {@type={'type', 0x3d, "6d6d69c8"}}], [{@fsmagic={'fsmagic', 0x3d, 0x6be0}}, {@obj_type={'obj_type', 0x3d, '@%\'em1\x00'}}, {@euid_lt={'euid<', r0}}, {@fsuuid={'fsuuid', 0x3d, {[0x32, 0x0, 0x65, 0x64, 0x36, 0x64, 0x39, 0x30], 0x2d, [0x66, 0x61, 0x65, 0x37], 0x2d, [0x64, 0x62, 0x64, 0x30], 0x2d, [0x36, 0x37, 0x64, 0x35], 0x2d, [0x61, 0x61, 0x31, 0x63, 0x5a, 0x38, 0x63, 0x36]}}}, {@dont_appraise='dont_appraise'}]}) r1 = openat$md(0xffffffffffffff9c, &(0x7f0000000080)='/dev/md0\x00', 0x0, 0x0) ioctl$BLKALIGNOFF(r1, 0x127a, &(0x7f00000000c0)) ioctl$BLKPG(r1, 0x40140921, 0x0) 18:44:23 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f00000000c0)='.\x00', 0x0, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) dup2(r1, r0) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r0, 0x541b, &(0x7f0000000040)={'batadv_slave_0\x00'}) [ 328.641781][T12751] gfs2: not a GFS2 filesystem 18:44:23 executing program 2: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) bind$netrom(r0, &(0x7f0000000240)={{0x6, @rose}, [@default, @bcast, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @default]}, 0x48) accept4$netrom(r0, &(0x7f0000000080)={{0x3, @rose}, [@default, @remote, @remote, @bcast, @rose, @netrom, @default, @bcast]}, &(0x7f0000000100)=0x48, 0x80000) socket$inet_tcp(0x2, 0x1, 0x0) [ 328.688612][T12751] gfs2: fsid=.: can't read superblock [ 328.727198][T12751] gfs2: fsid=.: can't read superblock: -22 [ 328.788255][T12774] hfs: unable to parse mount options 18:44:23 executing program 0: setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, 0x0, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_EVENTS(0xffffffffffffffff, 0x84, 0xb, &(0x7f0000000040), 0x0) ioctl$DRM_IOCTL_RM_CTX(0xffffffffffffffff, 0xc0086421, &(0x7f0000000300)={0x0, 0x1}) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB='lockproto=lock_nolock,locktable=.']) 18:44:23 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) openat$cgroup_int(0xffffffffffffffff, &(0x7f00000005c0)='cpuset.memory_spread_page\x00', 0x2, 0x0) ioctl$KVM_SET_GUEST_DEBUG(r2, 0x4048ae9b, &(0x7f0000000100)={0xe8003, 0x0, [0x0, 0x0, 0x0, 0x0, 0x100000000000]}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000380)) ioctl$KVM_SMI(r2, 0xaeb7) ioctl$KVM_RUN(r2, 0xae80, 0x0) 18:44:23 executing program 2: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) bind$netrom(r0, &(0x7f0000000240)={{0x6, @rose}, [@default, @bcast, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @default]}, 0x48) accept4$netrom(r0, &(0x7f0000000080)={{0x3, @rose}, [@default, @remote, @remote, @bcast, @rose, @netrom, @default, @bcast]}, &(0x7f0000000100)=0x48, 0x80000) 18:44:23 executing program 1: preadv(0xffffffffffffffff, &(0x7f00000017c0), 0x11c, 0x0) r0 = memfd_create(&(0x7f0000000100)='\vem1\xc1\xf8\xa6\x8dN\xc0\xa3w\xe2\xcb\xa2\xba\xe5\xf4\x97\xac#*\xff', 0x0) write(r0, &(0x7f0000000040)="0600", 0x2) write$FUSE_NOTIFY_STORE(r0, &(0x7f0000001040)=ANY=[@ANYBLOB="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"], 0xe) sendfile(r0, r0, &(0x7f0000001000), 0xffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x7000)=nil, 0x7000, 0x80000000004, 0x11, r0, 0x0) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) socketpair$unix(0x1, 0x5, 0x0, &(0x7f000001a000)={0xffffffffffffffff, 0xffffffffffffffff}) socket$inet_icmp_raw(0x2, 0x3, 0x1) socket$unix(0x1, 0x1, 0x0) write$P9_RREMOVE(0xffffffffffffffff, &(0x7f0000000740)={0x7}, 0x7) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f000002eff0)={0x32b, &(0x7f0000000000)=[{}]}, 0x10) [ 329.129175][T12797] gfs2: fsid=.: Trying to join cluster "lock_nolock", "." [ 329.152713][T12797] gfs2: fsid=.: Now mounting FS... [ 329.160095][T12797] gfs2: not a GFS2 filesystem [ 329.170565][T12797] gfs2: fsid=.: can't read superblock [ 329.207853][T12797] gfs2: fsid=.: can't read superblock: -22 18:44:24 executing program 3: ioctl$TIOCSPTLCK(0xffffffffffffffff, 0x40045431, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000380)) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$TCSETAW(0xffffffffffffffff, 0x5407, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) sendfile(r2, 0xffffffffffffffff, &(0x7f0000000040), 0x0) r3 = add_key$user(&(0x7f0000000040)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)='X', 0x1, 0xfffffffffffffffe) keyctl$update(0x2, r3, &(0x7f00000006c0)="c0ca1cdbaa1aedbbed80dddaa28e15b9449e2e82cca4244c40ffd0fd4e6631c7d3d86e1339de17344340b02dd527f2d8b3ae6c1db3594e657da33c3ec668f143974a65753472df5319a6b83e1e86b8f2666c61a2e700d1c1e0ae1fc52494bd4885a5c64e9007d39fa11313805290dd6342f9775f01a02ec88f6bee22f25a377a9b143abba1264586d2779088006d5f9be82b00f10287031623f73470264cc5897f18f357aad6deb3883da88ae2266664933785a3ce72bb224a441437ea93c217", 0xc0) add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x9a, 0xfffffffffffffffd) 18:44:24 executing program 5: statx(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x2000, 0x800, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0}) syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x9, 0x0, &(0x7f00000000c0), 0x200000, &(0x7f0000000240)={[{@part={'part', 0x3d, 0xa14}}, {@file_umask={'file_umask', 0x3d, 0x657936f8}}, {@type={'type', 0x3d, "6d6d69c8"}}], [{@fsmagic={'fsmagic', 0x3d, 0x6be0}}, {@obj_type={'obj_type', 0x3d, '@%\'em1\x00'}}, {@euid_lt={'euid<', r0}}, {@fsuuid={'fsuuid', 0x3d, {[0x32, 0x0, 0x65, 0x64, 0x36, 0x64, 0x39, 0x30], 0x2d, [0x66, 0x61, 0x65, 0x37], 0x2d, [0x64, 0x62, 0x64, 0x30], 0x2d, [0x36, 0x37, 0x64, 0x35], 0x2d, [0x61, 0x61, 0x31, 0x63, 0x5a, 0x38, 0x63, 0x36]}}}, {@dont_appraise='dont_appraise'}]}) r1 = openat$md(0xffffffffffffff9c, &(0x7f0000000080)='/dev/md0\x00', 0x0, 0x0) ioctl$BLKALIGNOFF(r1, 0x127a, &(0x7f00000000c0)) ioctl$BLKPG(r1, 0x40140921, 0x0) 18:44:24 executing program 2: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) bind$netrom(r0, &(0x7f0000000240)={{0x6, @rose}, [@default, @bcast, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @default]}, 0x48) 18:44:24 executing program 4: r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @remote, 0x3}, 0x1c) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") getsockopt$inet6_int(r0, 0x29, 0x1, 0x0, &(0x7f0000000140)) 18:44:24 executing program 0: setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, 0x0, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_EVENTS(0xffffffffffffffff, 0x84, 0xb, &(0x7f0000000040), 0x0) ioctl$DRM_IOCTL_RM_CTX(0xffffffffffffffff, 0xc0086421, &(0x7f0000000300)={0x0, 0x1}) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB='lockproto=lock_nolock,locktable=.']) 18:44:24 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) 18:44:24 executing program 2: bind$netrom(0xffffffffffffffff, &(0x7f0000000240)={{0x6, @rose}, [@default, @bcast, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @default]}, 0x48) 18:44:24 executing program 4: recvfrom$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000480)={0x2, 0x70, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) shmctl$IPC_RMID(0x0, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$DRM_IOCTL_MODE_ADDFB(0xffffffffffffffff, 0xc01c64ae, &(0x7f0000000100)={0xfffffffd}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f00000002c0)={[0x9, 0x0, 0x0, 0x1000000, 0x0, 0x0, 0x62160555, 0x0, 0x2000000000000005, 0x0, 0x0, 0x0, 0x0, 0x6]}) ioctl$KVM_RUN(r2, 0xae80, 0x0) perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x11, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x0, 0x4}, 0x40000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000500)) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) socket(0x0, 0x0, 0x0) close(0xffffffffffffffff) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000000)={0x0, 0x0}, 0x0) setuid(r3) [ 329.819704][T12821] gfs2: fsid=.: Trying to join cluster "lock_nolock", "." [ 329.846544][T12827] hfs: unable to parse mount options [ 329.852134][T12821] gfs2: fsid=.: Now mounting FS... 18:44:24 executing program 1: mknodat(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) 18:44:24 executing program 5: statx(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x2000, 0x800, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0}) syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x9, 0x0, &(0x7f00000000c0), 0x200000, &(0x7f0000000240)={[{@part={'part', 0x3d, 0xa14}}, {@file_umask={'file_umask', 0x3d, 0x657936f8}}, {@type={'type', 0x3d, "6d6d69c8"}}], [{@fsmagic={'fsmagic', 0x3d, 0x6be0}}, {@obj_type={'obj_type', 0x3d, '@%\'em1\x00'}}, {@euid_lt={'euid<', r0}}, {@fsuuid={'fsuuid', 0x3d, {[0x32, 0x0, 0x65, 0x64, 0x36, 0x64, 0x39, 0x30], 0x2d, [0x66, 0x61, 0x65, 0x37], 0x2d, [0x64, 0x62, 0x64, 0x30], 0x2d, [0x36, 0x37, 0x64, 0x35], 0x2d, [0x61, 0x61, 0x31, 0x63, 0x5a, 0x38, 0x63, 0x36]}}}, {@dont_appraise='dont_appraise'}]}) r1 = openat$md(0xffffffffffffff9c, &(0x7f0000000080)='/dev/md0\x00', 0x0, 0x0) ioctl$BLKALIGNOFF(r1, 0x127a, &(0x7f00000000c0)) ioctl$BLKPG(r1, 0x40140921, 0x0) [ 329.882366][T12821] gfs2: not a GFS2 filesystem [ 329.900371][T12821] gfs2: fsid=.: can't read superblock 18:44:24 executing program 2: bind$netrom(0xffffffffffffffff, &(0x7f0000000240)={{0x6, @rose}, [@default, @bcast, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @default]}, 0x48) [ 329.936586][T12821] gfs2: fsid=.: can't read superblock: -22 18:44:24 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000300)={'syz_tun\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000002400)=@newlink={0x64, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r2}, [@IFLA_LINKINFO={0x44, 0x12, 0x0, 0x1, @bridge_slave={{0x11, 0x1, 'bridge_slave\x00'}, {0x2c, 0x5, 0x0, 0x1, [@IFLA_BRPORT_STATE={0x5}, @IFLA_BRPORT_PROXYARP={0x5, 0xa, 0x1}, @IFLA_BRPORT_LEARNING={0x5}, @IFLA_BRPORT_COST={0x8, 0x3, 0x8}, @IFLA_BRPORT_PRIORITY={0x6}]}}}]}, 0x64}}, 0x0) [ 330.120325][T12846] hfs: unable to parse mount options 18:44:25 executing program 3: ioctl$TIOCSPTLCK(0xffffffffffffffff, 0x40045431, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000380)) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) sendfile(r2, 0xffffffffffffffff, &(0x7f0000000040), 0x0) r3 = add_key$user(&(0x7f0000000040)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)='X', 0x1, 0xfffffffffffffffe) keyctl$update(0x2, r3, &(0x7f00000006c0)="c0ca1cdbaa1aedbbed80dddaa28e15b9449e2e82cca4244c40ffd0fd4e6631c7d3d86e1339de17344340b02dd527f2d8b3ae6c1db3594e657da33c3ec668f143974a65753472df5319a6b83e1e86b8f2666c61a2e700d1c1e0ae1fc52494bd4885a5c64e9007d39fa11313805290dd6342f9775f01a02ec88f6bee22f25a377a9b143abba1264586d2779088006d5f9be82b00f10287031623f73470264cc5897f18f357aad6deb3883da88ae2266664933785a3ce72bb224a441437ea93c217", 0xc0) add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x9a, 0xfffffffffffffffd) 18:44:25 executing program 2: bind$netrom(0xffffffffffffffff, &(0x7f0000000240)={{0x6, @rose}, [@default, @bcast, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @default]}, 0x48) 18:44:25 executing program 0: setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, 0x0, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_EVENTS(0xffffffffffffffff, 0x84, 0xb, &(0x7f0000000040), 0x0) ioctl$DRM_IOCTL_RM_CTX(0xffffffffffffffff, 0xc0086421, &(0x7f0000000300)={0x0, 0x1}) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB='lockproto=lock_nolock,locktable=.']) 18:44:25 executing program 5: statx(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x2000, 0x800, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0}) syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x9, 0x0, &(0x7f00000000c0), 0x200000, &(0x7f0000000240)={[{@part={'part', 0x3d, 0xa14}}, {@file_umask={'file_umask', 0x3d, 0x657936f8}}, {@type={'type', 0x3d, "6d6d69c8"}}], [{@fsmagic={'fsmagic', 0x3d, 0x6be0}}, {@obj_type={'obj_type', 0x3d, '@%\'em1\x00'}}, {@euid_lt={'euid<', r0}}, {@fsuuid={'fsuuid', 0x3d, {[0x0, 0x36, 0x65, 0x64, 0x36, 0x64, 0x39, 0x30], 0x2d, [0x66, 0x61, 0x65, 0x37], 0x2d, [0x64, 0x62, 0x64, 0x30], 0x2d, [0x36, 0x37, 0x64, 0x35], 0x2d, [0x61, 0x61, 0x31, 0x63, 0x5a, 0x38, 0x63, 0x36]}}}, {@dont_appraise='dont_appraise'}]}) r1 = openat$md(0xffffffffffffff9c, &(0x7f0000000080)='/dev/md0\x00', 0x0, 0x0) ioctl$BLKALIGNOFF(r1, 0x127a, &(0x7f00000000c0)) ioctl$BLKPG(r1, 0x40140921, 0x0) 18:44:25 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x10000000013, &(0x7f0000000180)=0x1, 0x233) setsockopt$sock_timeval(r2, 0x1, 0x15, &(0x7f0000000040)={0x0, 0x2710}, 0x10) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000000)='vcan0\x00', 0x10) connect$inet(r2, &(0x7f00000000c0)={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r2, 0x6, 0x1d, &(0x7f0000000100)={0x0, 0x81, 0x200}, 0x14) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xff01) splice(r0, 0x0, r2, 0x0, 0x10003, 0x0) ioctl$ASHMEM_GET_PIN_STATUS(0xffffffffffffffff, 0x7709, 0x0) 18:44:25 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_NR_MMU_PAGES(r1, 0xae44, 0xaf8) 18:44:25 executing program 2: syz_init_net_socket$netrom(0x6, 0x5, 0x0) bind$netrom(0xffffffffffffffff, &(0x7f0000000240)={{0x6, @rose}, [@default, @bcast, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @default]}, 0x48) [ 330.701837][T12888] gfs2: fsid=.: Trying to join cluster "lock_nolock", "." [ 330.718601][T12889] hfs: unable to parse mount options [ 330.790611][T12888] gfs2: fsid=.: Now mounting FS... 18:44:25 executing program 4: r0 = memfd_create(&(0x7f0000000380)='security.selinux\x00', 0x0) mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x11, r0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000200)='ns\x00') getdents64(r1, 0x0, 0x0) 18:44:25 executing program 5: statx(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x2000, 0x800, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0}) syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x9, 0x0, &(0x7f00000000c0), 0x200000, &(0x7f0000000240)={[{@part={'part', 0x3d, 0xa14}}, {@file_umask={'file_umask', 0x3d, 0x657936f8}}, {@type={'type', 0x3d, "6d6d69c8"}}], [{@fsmagic={'fsmagic', 0x3d, 0x6be0}}, {@obj_type={'obj_type', 0x3d, '@%\'em1\x00'}}, {@euid_lt={'euid<', r0}}, {@fsuuid={'fsuuid', 0x3d, {[0x0, 0x36, 0x65, 0x64, 0x36, 0x64, 0x39, 0x30], 0x2d, [0x66, 0x61, 0x65, 0x37], 0x2d, [0x64, 0x62, 0x64, 0x30], 0x2d, [0x36, 0x37, 0x64, 0x35], 0x2d, [0x61, 0x61, 0x31, 0x63, 0x5a, 0x38, 0x63, 0x36]}}}, {@dont_appraise='dont_appraise'}]}) r1 = openat$md(0xffffffffffffff9c, &(0x7f0000000080)='/dev/md0\x00', 0x0, 0x0) ioctl$BLKALIGNOFF(r1, 0x127a, &(0x7f00000000c0)) ioctl$BLKPG(r1, 0x40140921, 0x0) [ 330.859490][T12888] gfs2: not a GFS2 filesystem [ 330.902525][T12888] gfs2: fsid=.: can't read superblock 18:44:25 executing program 2: syz_init_net_socket$netrom(0x6, 0x5, 0x0) bind$netrom(0xffffffffffffffff, &(0x7f0000000240)={{0x6, @rose}, [@default, @bcast, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @default]}, 0x48) [ 330.953257][T12888] gfs2: fsid=.: can't read superblock: -22 [ 331.079647][T12919] hfs: unable to parse mount options 18:44:26 executing program 5: statx(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x2000, 0x800, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0}) syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x9, 0x0, &(0x7f00000000c0), 0x200000, &(0x7f0000000240)={[{@part={'part', 0x3d, 0xa14}}, {@file_umask={'file_umask', 0x3d, 0x657936f8}}, {@type={'type', 0x3d, "6d6d69c8"}}], [{@fsmagic={'fsmagic', 0x3d, 0x6be0}}, {@obj_type={'obj_type', 0x3d, '@%\'em1\x00'}}, {@euid_lt={'euid<', r0}}, {@fsuuid={'fsuuid', 0x3d, {[0x0, 0x36, 0x65, 0x64, 0x36, 0x64, 0x39, 0x30], 0x2d, [0x66, 0x61, 0x65, 0x37], 0x2d, [0x64, 0x62, 0x64, 0x30], 0x2d, [0x36, 0x37, 0x64, 0x35], 0x2d, [0x61, 0x61, 0x31, 0x63, 0x5a, 0x38, 0x63, 0x36]}}}, {@dont_appraise='dont_appraise'}]}) r1 = openat$md(0xffffffffffffff9c, &(0x7f0000000080)='/dev/md0\x00', 0x0, 0x0) ioctl$BLKALIGNOFF(r1, 0x127a, &(0x7f00000000c0)) ioctl$BLKPG(r1, 0x40140921, 0x0) 18:44:26 executing program 4: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup3(r0, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) [ 331.382893][T12937] hfs: unable to parse mount options 18:44:26 executing program 3: ioctl$TIOCSPTLCK(0xffffffffffffffff, 0x40045431, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000380)) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) sendfile(r2, 0xffffffffffffffff, &(0x7f0000000040), 0x0) r3 = add_key$user(&(0x7f0000000040)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)='X', 0x1, 0xfffffffffffffffe) keyctl$update(0x2, r3, &(0x7f00000006c0)="c0ca1cdbaa1aedbbed80dddaa28e15b9449e2e82cca4244c40ffd0fd4e6631c7d3d86e1339de17344340b02dd527f2d8b3ae6c1db3594e657da33c3ec668f143974a65753472df5319a6b83e1e86b8f2666c61a2e700d1c1e0ae1fc52494bd4885a5c64e9007d39fa11313805290dd6342f9775f01a02ec88f6bee22f25a377a9b143abba1264586d2779088006d5f9be82b00f10287031623f73470264cc5897f18f357aad6deb3883da88ae2266664933785a3ce72bb224a441437ea93c217", 0xc0) add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x9a, 0xfffffffffffffffd) 18:44:26 executing program 2: syz_init_net_socket$netrom(0x6, 0x5, 0x0) bind$netrom(0xffffffffffffffff, &(0x7f0000000240)={{0x6, @rose}, [@default, @bcast, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @default]}, 0x48) 18:44:26 executing program 0: setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, 0x0, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_EVENTS(0xffffffffffffffff, 0x84, 0xb, &(0x7f0000000040), 0x0) ioctl$DRM_IOCTL_RM_CTX(0xffffffffffffffff, 0xc0086421, &(0x7f0000000300)={0x0, 0x1}) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB='lockproto=lock_nolock,locktable=.']) 18:44:26 executing program 5: statx(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x2000, 0x800, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0}) syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x9, 0x0, &(0x7f00000000c0), 0x200000, &(0x7f0000000240)={[{@part={'part', 0x3d, 0xa14}}, {@file_umask={'file_umask', 0x3d, 0x657936f8}}, {@type={'type', 0x3d, "6d6d69c8"}}], [{@fsmagic={'fsmagic', 0x3d, 0x6be0}}, {@obj_type={'obj_type', 0x3d, '@%\'em1\x00'}}, {@euid_lt={'euid<', r0}}, {@fsuuid={'fsuuid', 0x3d, {[0x32, 0x36, 0x65, 0x64, 0x36, 0x64, 0x39, 0x30], 0x2d, [0x66, 0x61, 0x65], 0x2d, [0x64, 0x62, 0x64, 0x30], 0x2d, [0x36, 0x37, 0x64, 0x35], 0x2d, [0x61, 0x61, 0x31, 0x63, 0x5a, 0x38, 0x63, 0x36]}}}, {@dont_appraise='dont_appraise'}]}) r1 = openat$md(0xffffffffffffff9c, &(0x7f0000000080)='/dev/md0\x00', 0x0, 0x0) ioctl$BLKALIGNOFF(r1, 0x127a, &(0x7f00000000c0)) ioctl$BLKPG(r1, 0x40140921, 0x0) 18:44:26 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x4f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x220007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) recvmmsg(r0, &(0x7f00000070c0)=[{{0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000240)=""/64, 0x40}, {&(0x7f00000013c0)=""/4096, 0x1000}], 0x2}, 0x4009d7}, {{&(0x7f0000000640)=@vsock={0x28, 0x0, 0x0, @local}, 0x80, &(0x7f0000000840)=[{0x0}], 0x1}}], 0x2, 0x100, 0x0) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000600), 0x4) sendto$inet(r0, &(0x7f00000012c0)="0c268a927f1f6588b967481241ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0xfe6a, 0x11, 0x0, 0x170) 18:44:26 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x10000000013, &(0x7f0000000180)=0x1, 0x233) setsockopt$sock_timeval(r2, 0x1, 0x15, &(0x7f0000000040)={0x0, 0x2710}, 0x10) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000000)='vcan0\x00', 0x10) connect$inet(r2, &(0x7f00000000c0)={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r2, 0x6, 0x1d, &(0x7f0000000100)={0x0, 0x81, 0x200}, 0x14) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xff01) splice(r0, 0x0, r2, 0x0, 0x10003, 0x0) ioctl$ASHMEM_GET_PIN_STATUS(0xffffffffffffffff, 0x7709, 0x0) 18:44:26 executing program 2: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) bind$netrom(r0, 0x0, 0x0) [ 331.777982][T12952] gfs2: fsid=.: Trying to join cluster "lock_nolock", "." [ 331.786141][T12951] hfs: unable to parse mount options [ 331.827062][T12952] gfs2: fsid=.: Now mounting FS... 18:44:26 executing program 5: statx(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x2000, 0x800, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0}) syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x9, 0x0, &(0x7f00000000c0), 0x200000, &(0x7f0000000240)={[{@part={'part', 0x3d, 0xa14}}, {@file_umask={'file_umask', 0x3d, 0x657936f8}}, {@type={'type', 0x3d, "6d6d69c8"}}], [{@fsmagic={'fsmagic', 0x3d, 0x6be0}}, {@obj_type={'obj_type', 0x3d, '@%\'em1\x00'}}, {@euid_lt={'euid<', r0}}, {@fsuuid={'fsuuid', 0x3d, {[0x32, 0x36, 0x65, 0x64, 0x36, 0x64, 0x39, 0x30], 0x2d, [0x66, 0x61, 0x65], 0x2d, [0x64, 0x62, 0x64, 0x30], 0x2d, [0x36, 0x37, 0x64, 0x35], 0x2d, [0x61, 0x61, 0x31, 0x63, 0x5a, 0x38, 0x63, 0x36]}}}, {@dont_appraise='dont_appraise'}]}) r1 = openat$md(0xffffffffffffff9c, &(0x7f0000000080)='/dev/md0\x00', 0x0, 0x0) ioctl$BLKALIGNOFF(r1, 0x127a, &(0x7f00000000c0)) ioctl$BLKPG(r1, 0x40140921, 0x0) [ 331.855424][T12952] gfs2: not a GFS2 filesystem [ 331.929674][T12952] gfs2: fsid=.: can't read superblock [ 331.936655][T12952] gfs2: fsid=.: can't read superblock: -22 [ 331.945975][T12973] hfs: unable to parse mount options 18:44:26 executing program 2: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) bind$netrom(r0, 0x0, 0x0) 18:44:27 executing program 5: statx(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x2000, 0x800, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0}) syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x9, 0x0, &(0x7f00000000c0), 0x200000, &(0x7f0000000240)={[{@part={'part', 0x3d, 0xa14}}, {@file_umask={'file_umask', 0x3d, 0x657936f8}}, {@type={'type', 0x3d, "6d6d69c8"}}], [{@fsmagic={'fsmagic', 0x3d, 0x6be0}}, {@obj_type={'obj_type', 0x3d, '@%\'em1\x00'}}, {@euid_lt={'euid<', r0}}, {@fsuuid={'fsuuid', 0x3d, {[0x32, 0x36, 0x65, 0x64, 0x36, 0x64, 0x39, 0x30], 0x2d, [0x66, 0x61, 0x65], 0x2d, [0x64, 0x62, 0x64, 0x30], 0x2d, [0x36, 0x37, 0x64, 0x35], 0x2d, [0x61, 0x61, 0x31, 0x63, 0x5a, 0x38, 0x63, 0x36]}}}, {@dont_appraise='dont_appraise'}]}) r1 = openat$md(0xffffffffffffff9c, &(0x7f0000000080)='/dev/md0\x00', 0x0, 0x0) ioctl$BLKALIGNOFF(r1, 0x127a, &(0x7f00000000c0)) ioctl$BLKPG(r1, 0x40140921, 0x0) 18:44:27 executing program 0: setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, 0x0, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_EVENTS(0xffffffffffffffff, 0x84, 0xb, &(0x7f0000000040), 0x0) ioctl$DRM_IOCTL_RM_CTX(0xffffffffffffffff, 0xc0086421, &(0x7f0000000300)={0x0, 0x1}) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB='lockproto=lock_nolock,locktable=.']) 18:44:27 executing program 2: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) bind$netrom(r0, 0x0, 0x0) 18:44:27 executing program 2: r0 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(r0, &(0x7f0000000140)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x0, @rand_addr=0xdd}}, 0x24) sendmmsg(r0, &(0x7f0000005c00)=[{{0x0, 0xfffffffffffffd95, 0x0, 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="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"], 0x18}}], 0x1, 0x0) 18:44:27 executing program 3: ioctl$TIOCSPTLCK(0xffffffffffffffff, 0x40045431, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000380)) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) sendfile(r2, 0xffffffffffffffff, &(0x7f0000000040), 0x0) r3 = add_key$user(&(0x7f0000000040)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)='X', 0x1, 0xfffffffffffffffe) keyctl$update(0x2, r3, &(0x7f00000006c0)="c0ca1cdbaa1aedbbed80dddaa28e15b9449e2e82cca4244c40ffd0fd4e6631c7d3d86e1339de17344340b02dd527f2d8b3ae6c1db3594e657da33c3ec668f143974a65753472df5319a6b83e1e86b8f2666c61a2e700d1c1e0ae1fc52494bd4885a5c64e9007d39fa11313805290dd6342f9775f01a02ec88f6bee22f25a377a9b143abba1264586d2779088006d5f9be82b00f10287031623f73470264cc5897f18f357aad6deb3883da88ae2266664933785a3ce72bb224a441437ea93c217", 0xc0) add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x9a, 0xfffffffffffffffd) [ 332.358455][T12985] gfs2: fsid=.: Trying to join cluster "lock_nolock", "." [ 332.366407][T12985] gfs2: fsid=.: Now mounting FS... [ 332.372252][T12985] gfs2: not a GFS2 filesystem [ 332.377075][T12985] gfs2: fsid=.: can't read superblock [ 332.383076][T12985] gfs2: fsid=.: can't read superblock: -22 18:44:27 executing program 1: shmctl$SHM_STAT_ANY(0x0, 0xf, &(0x7f0000000180)) [ 332.443376][T12989] hfs: unable to parse mount options 18:44:27 executing program 2: r0 = bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0x2, 0x4, 0x4, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000]}, 0x3c) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000080)={r0, &(0x7f0000000200)}, 0x20) 18:44:27 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000740)={0x3, 0x2, 0xf000, 0x1000, &(0x7f0000000000/0x1000)=nil}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfb]}) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) sendmsg$RDMA_NLDEV_CMD_RES_CM_ID_GET(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000080)={0x10, 0x140b, 0x0, 0x0, 0x25dfdbfc}, 0x10}}, 0x0) ioctl$KVM_NMI(r2, 0xae9a) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000640)) ioctl$KVM_RUN(r2, 0xae80, 0x0) 18:44:27 executing program 5: statx(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x2000, 0x800, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0}) syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x9, 0x0, &(0x7f00000000c0), 0x200000, &(0x7f0000000240)={[{@part={'part', 0x3d, 0xa14}}, {@file_umask={'file_umask', 0x3d, 0x657936f8}}, {@type={'type', 0x3d, "6d6d69c8"}}], [{@fsmagic={'fsmagic', 0x3d, 0x6be0}}, {@obj_type={'obj_type', 0x3d, '@%\'em1\x00'}}, {@euid_lt={'euid<', r0}}, {@fsuuid={'fsuuid', 0x3d, {[0x32, 0x36, 0x65, 0x64, 0x36, 0x64, 0x39, 0x30], 0x2d, [0x66, 0x61, 0x0, 0x37], 0x2d, [0x64, 0x62, 0x64, 0x30], 0x2d, [0x36, 0x37, 0x64, 0x35], 0x2d, [0x61, 0x61, 0x31, 0x63, 0x5a, 0x38, 0x63, 0x36]}}}, {@dont_appraise='dont_appraise'}]}) r1 = openat$md(0xffffffffffffff9c, &(0x7f0000000080)='/dev/md0\x00', 0x0, 0x0) ioctl$BLKALIGNOFF(r1, 0x127a, &(0x7f00000000c0)) ioctl$BLKPG(r1, 0x40140921, 0x0) 18:44:27 executing program 0: setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, 0x0, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_EVENTS(0xffffffffffffffff, 0x84, 0xb, &(0x7f0000000040), 0x0) ioctl$DRM_IOCTL_RM_CTX(0xffffffffffffffff, 0xc0086421, &(0x7f0000000300)={0x0, 0x1}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB='lockproto=lock_nolock,locktable=.']) 18:44:27 executing program 1: r0 = socket$unix(0x1, 0x5, 0x0) bind$unix(r0, &(0x7f0000000080)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) clone(0x40000000007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount$9p_fd(0x0, &(0x7f0000000000)='\xe9\x1fq\x89Y\x1e\x923aK\x00', &(0x7f0000000040)='9p\x00', 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno'}}) 18:44:27 executing program 2: pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) write$binfmt_misc(r1, &(0x7f0000000240)=ANY=[@ANYBLOB="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"], 0x3ff) r4 = dup2(r3, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) bind$inet(r2, &(0x7f0000000000)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0xb}}, 0x10) connect$inet(r2, &(0x7f0000000040)={0x2, 0x0, @multicast2}, 0x10) splice(r0, 0x0, r2, 0x0, 0x10005, 0x0) 18:44:27 executing program 1: [ 332.697302][T13013] hfs: unable to parse mount options [ 332.767646][T13022] 9pnet: Insufficient options for proto=fd 18:44:27 executing program 5: statx(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x2000, 0x800, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0}) syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x9, 0x0, &(0x7f00000000c0), 0x200000, &(0x7f0000000240)={[{@part={'part', 0x3d, 0xa14}}, {@file_umask={'file_umask', 0x3d, 0x657936f8}}, {@type={'type', 0x3d, "6d6d69c8"}}], [{@fsmagic={'fsmagic', 0x3d, 0x6be0}}, {@obj_type={'obj_type', 0x3d, '@%\'em1\x00'}}, {@euid_lt={'euid<', r0}}, {@fsuuid={'fsuuid', 0x3d, {[0x32, 0x36, 0x65, 0x64, 0x36, 0x64, 0x39, 0x30], 0x2d, [0x66, 0x61, 0x0, 0x37], 0x2d, [0x64, 0x62, 0x64, 0x30], 0x2d, [0x36, 0x37, 0x64, 0x35], 0x2d, [0x61, 0x61, 0x31, 0x63, 0x5a, 0x38, 0x63, 0x36]}}}, {@dont_appraise='dont_appraise'}]}) r1 = openat$md(0xffffffffffffff9c, &(0x7f0000000080)='/dev/md0\x00', 0x0, 0x0) ioctl$BLKALIGNOFF(r1, 0x127a, &(0x7f00000000c0)) ioctl$BLKPG(r1, 0x40140921, 0x0) [ 332.813976][T13019] gfs2: fsid=.: Trying to join cluster "lock_nolock", "." [ 332.845359][T13019] gfs2: fsid=.: Now mounting FS... 18:44:27 executing program 4: 18:44:27 executing program 2: [ 332.869025][T13019] gfs2: not a GFS2 filesystem [ 332.889171][T13019] gfs2: fsid=.: can't read superblock [ 332.914512][T13019] gfs2: fsid=.: can't read superblock: -22 [ 332.985048][T13040] hfs: unable to parse mount options 18:44:28 executing program 3: ioctl$TIOCSPTLCK(0xffffffffffffffff, 0x40045431, 0x0) openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) sendfile(r1, 0xffffffffffffffff, &(0x7f0000000040), 0x0) r2 = add_key$user(&(0x7f0000000040)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)='X', 0x1, 0xfffffffffffffffe) keyctl$update(0x2, r2, &(0x7f00000006c0)="c0ca1cdbaa1aedbbed80dddaa28e15b9449e2e82cca4244c40ffd0fd4e6631c7d3d86e1339de17344340b02dd527f2d8b3ae6c1db3594e657da33c3ec668f143974a65753472df5319a6b83e1e86b8f2666c61a2e700d1c1e0ae1fc52494bd4885a5c64e9007d39fa11313805290dd6342f9775f01a02ec88f6bee22f25a377a9b143abba1264586d2779088006d5f9be82b00f10287031623f73470264cc5897f18f357aad6deb3883da88ae2266664933785a3ce72bb224a441437ea93c217", 0xc0) add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x9a, 0xfffffffffffffffd) 18:44:28 executing program 1: 18:44:28 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) shmctl$IPC_INFO(0x0, 0x3, 0x0) 18:44:28 executing program 2: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) readv(r1, &(0x7f0000000580)=[{&(0x7f0000000680)=""/213, 0xd5}], 0x1) 18:44:28 executing program 0: setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, 0x0, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_EVENTS(0xffffffffffffffff, 0x84, 0xb, &(0x7f0000000040), 0x0) ioctl$DRM_IOCTL_RM_CTX(0xffffffffffffffff, 0xc0086421, &(0x7f0000000300)={0x0, 0x1}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB='lockproto=lock_nolock,locktable=.']) 18:44:28 executing program 5: statx(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x2000, 0x800, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0}) syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x9, 0x0, &(0x7f00000000c0), 0x200000, &(0x7f0000000240)={[{@part={'part', 0x3d, 0xa14}}, {@file_umask={'file_umask', 0x3d, 0x657936f8}}, {@type={'type', 0x3d, "6d6d69c8"}}], [{@fsmagic={'fsmagic', 0x3d, 0x6be0}}, {@obj_type={'obj_type', 0x3d, '@%\'em1\x00'}}, {@euid_lt={'euid<', r0}}, {@fsuuid={'fsuuid', 0x3d, {[0x32, 0x36, 0x65, 0x64, 0x36, 0x64, 0x39, 0x30], 0x2d, [0x66, 0x61, 0x0, 0x37], 0x2d, [0x64, 0x62, 0x64, 0x30], 0x2d, [0x36, 0x37, 0x64, 0x35], 0x2d, [0x61, 0x61, 0x31, 0x63, 0x5a, 0x38, 0x63, 0x36]}}}, {@dont_appraise='dont_appraise'}]}) r1 = openat$md(0xffffffffffffff9c, &(0x7f0000000080)='/dev/md0\x00', 0x0, 0x0) ioctl$BLKALIGNOFF(r1, 0x127a, &(0x7f00000000c0)) ioctl$BLKPG(r1, 0x40140921, 0x0) 18:44:28 executing program 1: 18:44:28 executing program 4: [ 333.283553][T13062] hfs: unable to parse mount options [ 333.317677][T13061] gfs2: fsid=.: Trying to join cluster "lock_nolock", "." [ 333.328503][T13061] gfs2: fsid=.: Now mounting FS... 18:44:28 executing program 5: statx(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x2000, 0x800, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0}) syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x9, 0x0, &(0x7f00000000c0), 0x200000, &(0x7f0000000240)={[{@part={'part', 0x3d, 0xa14}}, {@file_umask={'file_umask', 0x3d, 0x657936f8}}, {@type={'type', 0x3d, "6d6d69c8"}}], [{@fsmagic={'fsmagic', 0x3d, 0x6be0}}, {@obj_type={'obj_type', 0x3d, '@%\'em1\x00'}}, {@euid_lt={'euid<', r0}}, {@fsuuid={'fsuuid', 0x3d, {[0x32, 0x36, 0x65, 0x64, 0x36, 0x64, 0x39, 0x30], 0x2d, [0x66, 0x0, 0x65, 0x37], 0x2d, [0x64, 0x62, 0x64, 0x30], 0x2d, [0x36, 0x37, 0x64, 0x35], 0x2d, [0x61, 0x61, 0x31, 0x63, 0x5a, 0x38, 0x63, 0x36]}}}, {@dont_appraise='dont_appraise'}]}) r1 = openat$md(0xffffffffffffff9c, &(0x7f0000000080)='/dev/md0\x00', 0x0, 0x0) ioctl$BLKALIGNOFF(r1, 0x127a, &(0x7f00000000c0)) ioctl$BLKPG(r1, 0x40140921, 0x0) [ 333.348033][T13061] gfs2: not a GFS2 filesystem 18:44:28 executing program 2: [ 333.373212][T13061] gfs2: fsid=.: can't read superblock [ 333.385011][T13061] gfs2: fsid=.: can't read superblock: -22 18:44:28 executing program 4: 18:44:28 executing program 1: 18:44:28 executing program 3: ioctl$TIOCSPTLCK(0xffffffffffffffff, 0x40045431, 0x0) openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) sendfile(r1, 0xffffffffffffffff, &(0x7f0000000040), 0x0) r2 = add_key$user(&(0x7f0000000040)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)='X', 0x1, 0xfffffffffffffffe) keyctl$update(0x2, r2, &(0x7f00000006c0)="c0ca1cdbaa1aedbbed80dddaa28e15b9449e2e82cca4244c40ffd0fd4e6631c7d3d86e1339de17344340b02dd527f2d8b3ae6c1db3594e657da33c3ec668f143974a65753472df5319a6b83e1e86b8f2666c61a2e700d1c1e0ae1fc52494bd4885a5c64e9007d39fa11313805290dd6342f9775f01a02ec88f6bee22f25a377a9b143abba1264586d2779088006d5f9be82b00f10287031623f73470264cc5897f18f357aad6deb3883da88ae2266664933785a3ce72bb224a441437ea93c217", 0xc0) add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x9a, 0xfffffffffffffffd) 18:44:28 executing program 0: setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, 0x0, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_EVENTS(0xffffffffffffffff, 0x84, 0xb, &(0x7f0000000040), 0x0) ioctl$DRM_IOCTL_RM_CTX(0xffffffffffffffff, 0xc0086421, &(0x7f0000000300)={0x0, 0x1}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB='lockproto=lock_nolock,locktable=.']) [ 333.586037][T13077] hfs: unable to parse mount options 18:44:28 executing program 5: statx(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x2000, 0x800, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0}) syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x9, 0x0, &(0x7f00000000c0), 0x200000, &(0x7f0000000240)={[{@part={'part', 0x3d, 0xa14}}, {@file_umask={'file_umask', 0x3d, 0x657936f8}}, {@type={'type', 0x3d, "6d6d69c8"}}], [{@fsmagic={'fsmagic', 0x3d, 0x6be0}}, {@obj_type={'obj_type', 0x3d, '@%\'em1\x00'}}, {@euid_lt={'euid<', r0}}, {@fsuuid={'fsuuid', 0x3d, {[0x32, 0x36, 0x65, 0x64, 0x36, 0x64, 0x39, 0x30], 0x2d, [0x66, 0x0, 0x65, 0x37], 0x2d, [0x64, 0x62, 0x64, 0x30], 0x2d, [0x36, 0x37, 0x64, 0x35], 0x2d, [0x61, 0x61, 0x31, 0x63, 0x5a, 0x38, 0x63, 0x36]}}}, {@dont_appraise='dont_appraise'}]}) r1 = openat$md(0xffffffffffffff9c, &(0x7f0000000080)='/dev/md0\x00', 0x0, 0x0) ioctl$BLKALIGNOFF(r1, 0x127a, &(0x7f00000000c0)) ioctl$BLKPG(r1, 0x40140921, 0x0) 18:44:28 executing program 2: 18:44:28 executing program 4: 18:44:28 executing program 1: 18:44:28 executing program 4: [ 333.762114][T13093] gfs2: fsid=.: Trying to join cluster "lock_nolock", "." [ 333.773574][T13093] gfs2: fsid=.: Now mounting FS... [ 333.790911][T13093] gfs2: not a GFS2 filesystem [ 333.798373][T13093] gfs2: fsid=.: can't read superblock 18:44:28 executing program 2: 18:44:28 executing program 4: 18:44:28 executing program 1: 18:44:28 executing program 3: ioctl$TIOCSPTLCK(0xffffffffffffffff, 0x40045431, 0x0) openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) sendfile(r1, 0xffffffffffffffff, &(0x7f0000000040), 0x0) r2 = add_key$user(&(0x7f0000000040)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)='X', 0x1, 0xfffffffffffffffe) keyctl$update(0x2, r2, &(0x7f00000006c0)="c0ca1cdbaa1aedbbed80dddaa28e15b9449e2e82cca4244c40ffd0fd4e6631c7d3d86e1339de17344340b02dd527f2d8b3ae6c1db3594e657da33c3ec668f143974a65753472df5319a6b83e1e86b8f2666c61a2e700d1c1e0ae1fc52494bd4885a5c64e9007d39fa11313805290dd6342f9775f01a02ec88f6bee22f25a377a9b143abba1264586d2779088006d5f9be82b00f10287031623f73470264cc5897f18f357aad6deb3883da88ae2266664933785a3ce72bb224a441437ea93c217", 0xc0) add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x9a, 0xfffffffffffffffd) [ 333.807211][T13093] gfs2: fsid=.: can't read superblock: -22 [ 333.811932][T13098] hfs: unable to parse mount options 18:44:28 executing program 5: statx(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x2000, 0x800, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0}) syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x9, 0x0, &(0x7f00000000c0), 0x200000, &(0x7f0000000240)={[{@part={'part', 0x3d, 0xa14}}, {@file_umask={'file_umask', 0x3d, 0x657936f8}}, {@type={'type', 0x3d, "6d6d69c8"}}], [{@fsmagic={'fsmagic', 0x3d, 0x6be0}}, {@obj_type={'obj_type', 0x3d, '@%\'em1\x00'}}, {@euid_lt={'euid<', r0}}, {@fsuuid={'fsuuid', 0x3d, {[0x32, 0x36, 0x65, 0x64, 0x36, 0x64, 0x39, 0x30], 0x2d, [0x66, 0x0, 0x65, 0x37], 0x2d, [0x64, 0x62, 0x64, 0x30], 0x2d, [0x36, 0x37, 0x64, 0x35], 0x2d, [0x61, 0x61, 0x31, 0x63, 0x5a, 0x38, 0x63, 0x36]}}}, {@dont_appraise='dont_appraise'}]}) r1 = openat$md(0xffffffffffffff9c, &(0x7f0000000080)='/dev/md0\x00', 0x0, 0x0) ioctl$BLKALIGNOFF(r1, 0x127a, &(0x7f00000000c0)) ioctl$BLKPG(r1, 0x40140921, 0x0) 18:44:28 executing program 2: 18:44:28 executing program 0: setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, 0x0, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_EVENTS(0xffffffffffffffff, 0x84, 0xb, &(0x7f0000000040), 0x0) ioctl$DRM_IOCTL_RM_CTX(0xffffffffffffffff, 0xc0086421, &(0x7f0000000300)={0x0, 0x1}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB='lockproto=lock_nolock,locktable=.']) 18:44:28 executing program 4: 18:44:28 executing program 1: 18:44:28 executing program 2: 18:44:28 executing program 1: 18:44:28 executing program 2: 18:44:29 executing program 4: [ 334.117289][T13115] hfs: unable to parse mount options 18:44:29 executing program 5: statx(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x2000, 0x800, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0}) syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x9, 0x0, &(0x7f00000000c0), 0x200000, &(0x7f0000000240)={[{@part={'part', 0x3d, 0xa14}}, {@file_umask={'file_umask', 0x3d, 0x657936f8}}, {@type={'type', 0x3d, "6d6d69c8"}}], [{@fsmagic={'fsmagic', 0x3d, 0x6be0}}, {@obj_type={'obj_type', 0x3d, '@%\'em1\x00'}}, {@euid_lt={'euid<', r0}}, {@fsuuid={'fsuuid', 0x3d, {[0x32, 0x36, 0x65, 0x64, 0x36, 0x64, 0x39, 0x30], 0x2d, [0x0, 0x61, 0x65, 0x37], 0x2d, [0x64, 0x62, 0x64, 0x30], 0x2d, [0x36, 0x37, 0x64, 0x35], 0x2d, [0x61, 0x61, 0x31, 0x63, 0x5a, 0x38, 0x63, 0x36]}}}, {@dont_appraise='dont_appraise'}]}) r1 = openat$md(0xffffffffffffff9c, &(0x7f0000000080)='/dev/md0\x00', 0x0, 0x0) ioctl$BLKALIGNOFF(r1, 0x127a, &(0x7f00000000c0)) ioctl$BLKPG(r1, 0x40140921, 0x0) 18:44:29 executing program 1: [ 334.410514][T13121] gfs2: fsid=.: Trying to join cluster "lock_nolock", "." [ 334.466917][T13121] gfs2: fsid=.: Now mounting FS... [ 334.476888][T13134] hfs: unable to parse mount options [ 334.495472][T13121] gfs2: not a GFS2 filesystem [ 334.508030][T13121] gfs2: fsid=.: can't read superblock [ 334.518136][T13121] gfs2: fsid=.: can't read superblock: -22 18:44:29 executing program 3: ioctl$TIOCSPTLCK(0xffffffffffffffff, 0x40045431, 0x0) openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) getpid() perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) sendfile(r0, 0xffffffffffffffff, &(0x7f0000000040), 0x0) r1 = add_key$user(&(0x7f0000000040)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)='X', 0x1, 0xfffffffffffffffe) keyctl$update(0x2, r1, &(0x7f00000006c0)="c0ca1cdbaa1aedbbed80dddaa28e15b9449e2e82cca4244c40ffd0fd4e6631c7d3d86e1339de17344340b02dd527f2d8b3ae6c1db3594e657da33c3ec668f143974a65753472df5319a6b83e1e86b8f2666c61a2e700d1c1e0ae1fc52494bd4885a5c64e9007d39fa11313805290dd6342f9775f01a02ec88f6bee22f25a377a9b143abba1264586d2779088006d5f9be82b00f10287031623f73470264cc5897f18f357aad6deb3883da88ae2266664933785a3ce72bb224a441437ea93c217", 0xc0) add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x9a, 0xfffffffffffffffd) 18:44:29 executing program 2: 18:44:29 executing program 4: 18:44:29 executing program 1: 18:44:29 executing program 5: statx(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x2000, 0x800, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0}) syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x9, 0x0, &(0x7f00000000c0), 0x200000, &(0x7f0000000240)={[{@part={'part', 0x3d, 0xa14}}, {@file_umask={'file_umask', 0x3d, 0x657936f8}}, {@type={'type', 0x3d, "6d6d69c8"}}], [{@fsmagic={'fsmagic', 0x3d, 0x6be0}}, {@obj_type={'obj_type', 0x3d, '@%\'em1\x00'}}, {@euid_lt={'euid<', r0}}, {@fsuuid={'fsuuid', 0x3d, {[0x32, 0x36, 0x65, 0x64, 0x36, 0x64, 0x39, 0x30], 0x2d, [0x0, 0x61, 0x65, 0x37], 0x2d, [0x64, 0x62, 0x64, 0x30], 0x2d, [0x36, 0x37, 0x64, 0x35], 0x2d, [0x61, 0x61, 0x31, 0x63, 0x5a, 0x38, 0x63, 0x36]}}}, {@dont_appraise='dont_appraise'}]}) r1 = openat$md(0xffffffffffffff9c, &(0x7f0000000080)='/dev/md0\x00', 0x0, 0x0) ioctl$BLKALIGNOFF(r1, 0x127a, &(0x7f00000000c0)) ioctl$BLKPG(r1, 0x40140921, 0x0) 18:44:29 executing program 0: setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, 0x0, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_EVENTS(0xffffffffffffffff, 0x84, 0xb, &(0x7f0000000040), 0x0) ioctl$DRM_IOCTL_RM_CTX(0xffffffffffffffff, 0xc0086421, &(0x7f0000000300)={0x0, 0x1}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB='lockproto=lock_nolock,locktable=.']) 18:44:29 executing program 2: 18:44:29 executing program 4: 18:44:29 executing program 3: ioctl$TIOCSPTLCK(0xffffffffffffffff, 0x40045431, 0x0) openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) getpid() perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) sendfile(r0, 0xffffffffffffffff, &(0x7f0000000040), 0x0) r1 = add_key$user(&(0x7f0000000040)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)='X', 0x1, 0xfffffffffffffffe) keyctl$update(0x2, r1, &(0x7f00000006c0)="c0ca1cdbaa1aedbbed80dddaa28e15b9449e2e82cca4244c40ffd0fd4e6631c7d3d86e1339de17344340b02dd527f2d8b3ae6c1db3594e657da33c3ec668f143974a65753472df5319a6b83e1e86b8f2666c61a2e700d1c1e0ae1fc52494bd4885a5c64e9007d39fa11313805290dd6342f9775f01a02ec88f6bee22f25a377a9b143abba1264586d2779088006d5f9be82b00f10287031623f73470264cc5897f18f357aad6deb3883da88ae2266664933785a3ce72bb224a441437ea93c217", 0xc0) add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x9a, 0xfffffffffffffffd) 18:44:29 executing program 1: 18:44:29 executing program 3: ioctl$TIOCSPTLCK(0xffffffffffffffff, 0x40045431, 0x0) openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) sendfile(r0, 0xffffffffffffffff, &(0x7f0000000040), 0x0) r1 = add_key$user(&(0x7f0000000040)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)='X', 0x1, 0xfffffffffffffffe) keyctl$update(0x2, r1, &(0x7f00000006c0)="c0ca1cdbaa1aedbbed80dddaa28e15b9449e2e82cca4244c40ffd0fd4e6631c7d3d86e1339de17344340b02dd527f2d8b3ae6c1db3594e657da33c3ec668f143974a65753472df5319a6b83e1e86b8f2666c61a2e700d1c1e0ae1fc52494bd4885a5c64e9007d39fa11313805290dd6342f9775f01a02ec88f6bee22f25a377a9b143abba1264586d2779088006d5f9be82b00f10287031623f73470264cc5897f18f357aad6deb3883da88ae2266664933785a3ce72bb224a441437ea93c217", 0xc0) add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x9a, 0xfffffffffffffffd) [ 334.968303][T13153] hfs: unable to parse mount options 18:44:29 executing program 2: 18:44:29 executing program 1: [ 335.090712][T13157] gfs2: fsid=.: Trying to join cluster "lock_nolock", "." [ 335.099339][T13157] gfs2: fsid=.: Now mounting FS... 18:44:30 executing program 5: statx(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x2000, 0x800, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0}) syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x9, 0x0, &(0x7f00000000c0), 0x200000, &(0x7f0000000240)={[{@part={'part', 0x3d, 0xa14}}, {@file_umask={'file_umask', 0x3d, 0x657936f8}}, {@type={'type', 0x3d, "6d6d69c8"}}], [{@fsmagic={'fsmagic', 0x3d, 0x6be0}}, {@obj_type={'obj_type', 0x3d, '@%\'em1\x00'}}, {@euid_lt={'euid<', r0}}, {@fsuuid={'fsuuid', 0x3d, {[0x32, 0x36, 0x65, 0x64, 0x36, 0x64, 0x39, 0x30], 0x2d, [0x0, 0x61, 0x65, 0x37], 0x2d, [0x64, 0x62, 0x64, 0x30], 0x2d, [0x36, 0x37, 0x64, 0x35], 0x2d, [0x61, 0x61, 0x31, 0x63, 0x5a, 0x38, 0x63, 0x36]}}}, {@dont_appraise='dont_appraise'}]}) r1 = openat$md(0xffffffffffffff9c, &(0x7f0000000080)='/dev/md0\x00', 0x0, 0x0) ioctl$BLKALIGNOFF(r1, 0x127a, &(0x7f00000000c0)) ioctl$BLKPG(r1, 0x40140921, 0x0) 18:44:30 executing program 4: [ 335.131850][T13157] gfs2: not a GFS2 filesystem [ 335.137255][T13157] gfs2: fsid=.: can't read superblock [ 335.143030][T13157] gfs2: fsid=.: can't read superblock: -22 18:44:30 executing program 2: 18:44:30 executing program 3: ioctl$TIOCSPTLCK(0xffffffffffffffff, 0x40045431, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) sendfile(r0, 0xffffffffffffffff, &(0x7f0000000040), 0x0) r1 = add_key$user(&(0x7f0000000040)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)='X', 0x1, 0xfffffffffffffffe) keyctl$update(0x2, r1, &(0x7f00000006c0)="c0ca1cdbaa1aedbbed80dddaa28e15b9449e2e82cca4244c40ffd0fd4e6631c7d3d86e1339de17344340b02dd527f2d8b3ae6c1db3594e657da33c3ec668f143974a65753472df5319a6b83e1e86b8f2666c61a2e700d1c1e0ae1fc52494bd4885a5c64e9007d39fa11313805290dd6342f9775f01a02ec88f6bee22f25a377a9b143abba1264586d2779088006d5f9be82b00f10287031623f73470264cc5897f18f357aad6deb3883da88ae2266664933785a3ce72bb224a441437ea93c217", 0xc0) add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x9a, 0xfffffffffffffffd) 18:44:30 executing program 0: setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, 0x0, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_EVENTS(0xffffffffffffffff, 0x84, 0xb, &(0x7f0000000040), 0x0) ioctl$DRM_IOCTL_RM_CTX(0xffffffffffffffff, 0xc0086421, &(0x7f0000000300)={0x0, 0x1}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB='lockproto=lock_nolock,locktable=.']) 18:44:30 executing program 2: 18:44:30 executing program 4: 18:44:30 executing program 1: 18:44:30 executing program 4: [ 335.472019][T13176] hfs: unable to parse mount options 18:44:30 executing program 5: statx(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x2000, 0x800, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0}) syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x9, 0x0, &(0x7f00000000c0), 0x200000, &(0x7f0000000240)={[{@part={'part', 0x3d, 0xa14}}, {@file_umask={'file_umask', 0x3d, 0x657936f8}}, {@type={'type', 0x3d, "6d6d69c8"}}], [{@fsmagic={'fsmagic', 0x3d, 0x6be0}}, {@obj_type={'obj_type', 0x3d, '@%\'em1\x00'}}, {@euid_lt={'euid<', r0}}, {@fsuuid={'fsuuid', 0x3d, {[0x32, 0x36, 0x65, 0x64, 0x36, 0x64, 0x39, 0x30], 0x2d, [0x66, 0x61, 0x65, 0x37], 0x2d, [0x64, 0x62, 0x64], 0x2d, [0x36, 0x37, 0x64, 0x35], 0x2d, [0x61, 0x61, 0x31, 0x63, 0x5a, 0x38, 0x63, 0x36]}}}, {@dont_appraise='dont_appraise'}]}) r1 = openat$md(0xffffffffffffff9c, &(0x7f0000000080)='/dev/md0\x00', 0x0, 0x0) ioctl$BLKALIGNOFF(r1, 0x127a, &(0x7f00000000c0)) ioctl$BLKPG(r1, 0x40140921, 0x0) 18:44:30 executing program 2: 18:44:30 executing program 1: 18:44:30 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) sendfile(r0, 0xffffffffffffffff, &(0x7f0000000040), 0x0) r1 = add_key$user(&(0x7f0000000040)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)='X', 0x1, 0xfffffffffffffffe) keyctl$update(0x2, r1, &(0x7f00000006c0)="c0ca1cdbaa1aedbbed80dddaa28e15b9449e2e82cca4244c40ffd0fd4e6631c7d3d86e1339de17344340b02dd527f2d8b3ae6c1db3594e657da33c3ec668f143974a65753472df5319a6b83e1e86b8f2666c61a2e700d1c1e0ae1fc52494bd4885a5c64e9007d39fa11313805290dd6342f9775f01a02ec88f6bee22f25a377a9b143abba1264586d2779088006d5f9be82b00f10287031623f73470264cc5897f18f357aad6deb3883da88ae2266664933785a3ce72bb224a441437ea93c217", 0xc0) add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x9a, 0xfffffffffffffffd) 18:44:30 executing program 4: 18:44:30 executing program 2: [ 335.755787][T13198] hfs: unable to parse mount options 18:44:30 executing program 1: [ 336.011006][T13196] gfs2: fsid=.: Trying to join cluster "lock_nolock", "." [ 336.030895][T13196] gfs2: fsid=.: Now mounting FS... [ 336.047743][T13196] gfs2: not a GFS2 filesystem [ 336.076045][T13196] gfs2: fsid=.: can't read superblock [ 336.096047][T13196] gfs2: fsid=.: can't read superblock: -22 18:44:31 executing program 0: setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, 0x0, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_EVENTS(0xffffffffffffffff, 0x84, 0xb, &(0x7f0000000040), 0x0) ioctl$DRM_IOCTL_RM_CTX(0xffffffffffffffff, 0xc0086421, &(0x7f0000000300)={0x0, 0x1}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB='lockproto=lock_nolock,locktable=.']) 18:44:31 executing program 2: 18:44:31 executing program 4: 18:44:31 executing program 5: statx(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x2000, 0x800, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0}) syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x9, 0x0, &(0x7f00000000c0), 0x200000, &(0x7f0000000240)={[{@part={'part', 0x3d, 0xa14}}, {@file_umask={'file_umask', 0x3d, 0x657936f8}}, {@type={'type', 0x3d, "6d6d69c8"}}], [{@fsmagic={'fsmagic', 0x3d, 0x6be0}}, {@obj_type={'obj_type', 0x3d, '@%\'em1\x00'}}, {@euid_lt={'euid<', r0}}, {@fsuuid={'fsuuid', 0x3d, {[0x32, 0x36, 0x65, 0x64, 0x36, 0x64, 0x39, 0x30], 0x2d, [0x66, 0x61, 0x65, 0x37], 0x2d, [0x64, 0x62, 0x64], 0x2d, [0x36, 0x37, 0x64, 0x35], 0x2d, [0x61, 0x61, 0x31, 0x63, 0x5a, 0x38, 0x63, 0x36]}}}, {@dont_appraise='dont_appraise'}]}) r1 = openat$md(0xffffffffffffff9c, &(0x7f0000000080)='/dev/md0\x00', 0x0, 0x0) ioctl$BLKALIGNOFF(r1, 0x127a, &(0x7f00000000c0)) ioctl$BLKPG(r1, 0x40140921, 0x0) 18:44:31 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) sendfile(r0, 0xffffffffffffffff, &(0x7f0000000040), 0x0) r1 = add_key$user(&(0x7f0000000040)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)='X', 0x1, 0xfffffffffffffffe) keyctl$update(0x2, r1, &(0x7f00000006c0)="c0ca1cdbaa1aedbbed80dddaa28e15b9449e2e82cca4244c40ffd0fd4e6631c7d3d86e1339de17344340b02dd527f2d8b3ae6c1db3594e657da33c3ec668f143974a65753472df5319a6b83e1e86b8f2666c61a2e700d1c1e0ae1fc52494bd4885a5c64e9007d39fa11313805290dd6342f9775f01a02ec88f6bee22f25a377a9b143abba1264586d2779088006d5f9be82b00f10287031623f73470264cc5897f18f357aad6deb3883da88ae2266664933785a3ce72bb224a441437ea93c217", 0xc0) add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x9a, 0xfffffffffffffffd) 18:44:31 executing program 1: 18:44:31 executing program 4: 18:44:31 executing program 2: 18:44:31 executing program 1: 18:44:31 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) sendfile(r0, 0xffffffffffffffff, &(0x7f0000000040), 0x0) r1 = add_key$user(&(0x7f0000000040)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)='X', 0x1, 0xfffffffffffffffe) keyctl$update(0x2, r1, &(0x7f00000006c0)="c0ca1cdbaa1aedbbed80dddaa28e15b9449e2e82cca4244c40ffd0fd4e6631c7d3d86e1339de17344340b02dd527f2d8b3ae6c1db3594e657da33c3ec668f143974a65753472df5319a6b83e1e86b8f2666c61a2e700d1c1e0ae1fc52494bd4885a5c64e9007d39fa11313805290dd6342f9775f01a02ec88f6bee22f25a377a9b143abba1264586d2779088006d5f9be82b00f10287031623f73470264cc5897f18f357aad6deb3883da88ae2266664933785a3ce72bb224a441437ea93c217", 0xc0) add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x9a, 0xfffffffffffffffd) [ 336.516536][T13237] hfs: unable to parse mount options 18:44:31 executing program 2: 18:44:31 executing program 4: [ 336.643941][T13242] gfs2: fsid=.: Trying to join cluster "lock_nolock", "." [ 336.686555][T13242] gfs2: fsid=.: Now mounting FS... [ 336.715240][T13242] gfs2: not a GFS2 filesystem [ 336.743950][T13242] gfs2: fsid=.: can't read superblock [ 336.770316][T13242] gfs2: fsid=.: can't read superblock: -22 18:44:31 executing program 0: setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, 0x0, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_EVENTS(0xffffffffffffffff, 0x84, 0xb, &(0x7f0000000040), 0x0) ioctl$DRM_IOCTL_RM_CTX(0xffffffffffffffff, 0xc0086421, &(0x7f0000000300)={0x0, 0x1}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB='lockproto=lock_nolock,locktable=.']) 18:44:31 executing program 5: statx(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x2000, 0x800, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0}) syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x9, 0x0, &(0x7f00000000c0), 0x200000, &(0x7f0000000240)={[{@part={'part', 0x3d, 0xa14}}, {@file_umask={'file_umask', 0x3d, 0x657936f8}}, {@type={'type', 0x3d, "6d6d69c8"}}], [{@fsmagic={'fsmagic', 0x3d, 0x6be0}}, {@obj_type={'obj_type', 0x3d, '@%\'em1\x00'}}, {@euid_lt={'euid<', r0}}, {@fsuuid={'fsuuid', 0x3d, {[0x32, 0x36, 0x65, 0x64, 0x36, 0x64, 0x39, 0x30], 0x2d, [0x66, 0x61, 0x65, 0x37], 0x2d, [0x64, 0x62, 0x64], 0x2d, [0x36, 0x37, 0x64, 0x35], 0x2d, [0x61, 0x61, 0x31, 0x63, 0x5a, 0x38, 0x63, 0x36]}}}, {@dont_appraise='dont_appraise'}]}) r1 = openat$md(0xffffffffffffff9c, &(0x7f0000000080)='/dev/md0\x00', 0x0, 0x0) ioctl$BLKALIGNOFF(r1, 0x127a, &(0x7f00000000c0)) ioctl$BLKPG(r1, 0x40140921, 0x0) 18:44:31 executing program 1: 18:44:31 executing program 3: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) sendfile(r0, 0xffffffffffffffff, &(0x7f0000000040), 0x0) r1 = add_key$user(&(0x7f0000000040)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)='X', 0x1, 0xfffffffffffffffe) keyctl$update(0x2, r1, &(0x7f00000006c0)="c0ca1cdbaa1aedbbed80dddaa28e15b9449e2e82cca4244c40ffd0fd4e6631c7d3d86e1339de17344340b02dd527f2d8b3ae6c1db3594e657da33c3ec668f143974a65753472df5319a6b83e1e86b8f2666c61a2e700d1c1e0ae1fc52494bd4885a5c64e9007d39fa11313805290dd6342f9775f01a02ec88f6bee22f25a377a9b143abba1264586d2779088006d5f9be82b00f10287031623f73470264cc5897f18f357aad6deb3883da88ae2266664933785a3ce72bb224a441437ea93c217", 0xc0) add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x9a, 0xfffffffffffffffd) 18:44:31 executing program 2: 18:44:31 executing program 4: 18:44:31 executing program 3: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) sendfile(r0, 0xffffffffffffffff, &(0x7f0000000040), 0x0) r1 = add_key$user(&(0x7f0000000040)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)='X', 0x1, 0xfffffffffffffffe) keyctl$update(0x2, r1, &(0x7f00000006c0)="c0ca1cdbaa1aedbbed80dddaa28e15b9449e2e82cca4244c40ffd0fd4e6631c7d3d86e1339de17344340b02dd527f2d8b3ae6c1db3594e657da33c3ec668f143974a65753472df5319a6b83e1e86b8f2666c61a2e700d1c1e0ae1fc52494bd4885a5c64e9007d39fa11313805290dd6342f9775f01a02ec88f6bee22f25a377a9b143abba1264586d2779088006d5f9be82b00f10287031623f73470264cc5897f18f357aad6deb3883da88ae2266664933785a3ce72bb224a441437ea93c217", 0xc0) add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x9a, 0xfffffffffffffffd) 18:44:31 executing program 4: 18:44:31 executing program 1: 18:44:31 executing program 2: [ 337.092345][T13267] hfs: unable to parse mount options 18:44:32 executing program 5: statx(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x2000, 0x800, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0}) syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x9, 0x0, &(0x7f00000000c0), 0x200000, &(0x7f0000000240)={[{@part={'part', 0x3d, 0xa14}}, {@file_umask={'file_umask', 0x3d, 0x657936f8}}, {@type={'type', 0x3d, "6d6d69c8"}}], [{@fsmagic={'fsmagic', 0x3d, 0x6be0}}, {@obj_type={'obj_type', 0x3d, '@%\'em1\x00'}}, {@euid_lt={'euid<', r0}}, {@fsuuid={'fsuuid', 0x3d, {[0x32, 0x36, 0x65, 0x64, 0x36, 0x64, 0x39, 0x30], 0x2d, [0x66, 0x61, 0x65, 0x37], 0x2d, [0x64, 0x62, 0x0, 0x30], 0x2d, [0x36, 0x37, 0x64, 0x35], 0x2d, [0x61, 0x61, 0x31, 0x63, 0x5a, 0x38, 0x63, 0x36]}}}, {@dont_appraise='dont_appraise'}]}) r1 = openat$md(0xffffffffffffff9c, &(0x7f0000000080)='/dev/md0\x00', 0x0, 0x0) ioctl$BLKALIGNOFF(r1, 0x127a, &(0x7f00000000c0)) ioctl$BLKPG(r1, 0x40140921, 0x0) 18:44:32 executing program 1: [ 337.246564][T13271] gfs2: fsid=.: Trying to join cluster "lock_nolock", "." [ 337.266453][T13271] gfs2: fsid=.: Now mounting FS... [ 337.278077][T13271] gfs2: not a GFS2 filesystem [ 337.285509][T13271] gfs2: fsid=.: can't read superblock [ 337.292204][T13271] gfs2: fsid=.: can't read superblock: -22 [ 337.443156][T13284] hfs: unable to parse mount options 18:44:32 executing program 4: 18:44:32 executing program 2: 18:44:32 executing program 3: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) sendfile(r0, 0xffffffffffffffff, &(0x7f0000000040), 0x0) r1 = add_key$user(&(0x7f0000000040)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)='X', 0x1, 0xfffffffffffffffe) keyctl$update(0x2, r1, &(0x7f00000006c0)="c0ca1cdbaa1aedbbed80dddaa28e15b9449e2e82cca4244c40ffd0fd4e6631c7d3d86e1339de17344340b02dd527f2d8b3ae6c1db3594e657da33c3ec668f143974a65753472df5319a6b83e1e86b8f2666c61a2e700d1c1e0ae1fc52494bd4885a5c64e9007d39fa11313805290dd6342f9775f01a02ec88f6bee22f25a377a9b143abba1264586d2779088006d5f9be82b00f10287031623f73470264cc5897f18f357aad6deb3883da88ae2266664933785a3ce72bb224a441437ea93c217", 0xc0) add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x9a, 0xfffffffffffffffd) 18:44:32 executing program 1: 18:44:32 executing program 0: setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, 0x0, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_EVENTS(0xffffffffffffffff, 0x84, 0xb, &(0x7f0000000040), 0x0) ioctl$DRM_IOCTL_RM_CTX(0xffffffffffffffff, 0xc0086421, &(0x7f0000000300)={0x0, 0x1}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB='lockproto=lock_nolock,locktable=.']) 18:44:32 executing program 5: statx(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x2000, 0x800, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0}) syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x9, 0x0, &(0x7f00000000c0), 0x200000, &(0x7f0000000240)={[{@part={'part', 0x3d, 0xa14}}, {@file_umask={'file_umask', 0x3d, 0x657936f8}}, {@type={'type', 0x3d, "6d6d69c8"}}], [{@fsmagic={'fsmagic', 0x3d, 0x6be0}}, {@obj_type={'obj_type', 0x3d, '@%\'em1\x00'}}, {@euid_lt={'euid<', r0}}, {@fsuuid={'fsuuid', 0x3d, {[0x32, 0x36, 0x65, 0x64, 0x36, 0x64, 0x39, 0x30], 0x2d, [0x66, 0x61, 0x65, 0x37], 0x2d, [0x64, 0x62, 0x0, 0x30], 0x2d, [0x36, 0x37, 0x64, 0x35], 0x2d, [0x61, 0x61, 0x31, 0x63, 0x5a, 0x38, 0x63, 0x36]}}}, {@dont_appraise='dont_appraise'}]}) r1 = openat$md(0xffffffffffffff9c, &(0x7f0000000080)='/dev/md0\x00', 0x0, 0x0) ioctl$BLKALIGNOFF(r1, 0x127a, &(0x7f00000000c0)) ioctl$BLKPG(r1, 0x40140921, 0x0) 18:44:32 executing program 4: 18:44:32 executing program 1: 18:44:32 executing program 2: 18:44:32 executing program 3: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) sendfile(r0, 0xffffffffffffffff, &(0x7f0000000040), 0x0) r1 = add_key$user(&(0x7f0000000040)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)='X', 0x1, 0xfffffffffffffffe) keyctl$update(0x2, r1, &(0x7f00000006c0)="c0ca1cdbaa1aedbbed80dddaa28e15b9449e2e82cca4244c40ffd0fd4e6631c7d3d86e1339de17344340b02dd527f2d8b3ae6c1db3594e657da33c3ec668f143974a65753472df5319a6b83e1e86b8f2666c61a2e700d1c1e0ae1fc52494bd4885a5c64e9007d39fa11313805290dd6342f9775f01a02ec88f6bee22f25a377a9b143abba1264586d2779088006d5f9be82b00f10287031623f73470264cc5897f18f357aad6deb3883da88ae2266664933785a3ce72bb224a441437ea93c217", 0xc0) add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x9a, 0xfffffffffffffffd) [ 337.686035][T13297] hfs: unable to parse mount options 18:44:32 executing program 5: statx(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x2000, 0x800, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0}) syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x9, 0x0, &(0x7f00000000c0), 0x200000, &(0x7f0000000240)={[{@part={'part', 0x3d, 0xa14}}, {@file_umask={'file_umask', 0x3d, 0x657936f8}}, {@type={'type', 0x3d, "6d6d69c8"}}], [{@fsmagic={'fsmagic', 0x3d, 0x6be0}}, {@obj_type={'obj_type', 0x3d, '@%\'em1\x00'}}, {@euid_lt={'euid<', r0}}, {@fsuuid={'fsuuid', 0x3d, {[0x32, 0x36, 0x65, 0x64, 0x36, 0x64, 0x39, 0x30], 0x2d, [0x66, 0x61, 0x65, 0x37], 0x2d, [0x64, 0x62, 0x0, 0x30], 0x2d, [0x36, 0x37, 0x64, 0x35], 0x2d, [0x61, 0x61, 0x31, 0x63, 0x5a, 0x38, 0x63, 0x36]}}}, {@dont_appraise='dont_appraise'}]}) r1 = openat$md(0xffffffffffffff9c, &(0x7f0000000080)='/dev/md0\x00', 0x0, 0x0) ioctl$BLKALIGNOFF(r1, 0x127a, &(0x7f00000000c0)) ioctl$BLKPG(r1, 0x40140921, 0x0) [ 337.783825][T13303] gfs2: fsid=.: Trying to join cluster "lock_nolock", "." 18:44:32 executing program 1: 18:44:32 executing program 2: 18:44:32 executing program 4: [ 337.830443][T13303] gfs2: fsid=.: Now mounting FS... 18:44:32 executing program 3: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) sendfile(r0, 0xffffffffffffffff, &(0x7f0000000040), 0x0) r1 = add_key$user(&(0x7f0000000040)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)='X', 0x1, 0xfffffffffffffffe) keyctl$update(0x2, r1, &(0x7f00000006c0)="c0ca1cdbaa1aedbbed80dddaa28e15b9449e2e82cca4244c40ffd0fd4e6631c7d3d86e1339de17344340b02dd527f2d8b3ae6c1db3594e657da33c3ec668f143974a65753472df5319a6b83e1e86b8f2666c61a2e700d1c1e0ae1fc52494bd4885a5c64e9007d39fa11313805290dd6342f9775f01a02ec88f6bee22f25a377a9b143abba1264586d2779088006d5f9be82b00f10287031623f73470264cc5897f18f357aad6deb3883da88ae2266664933785a3ce72bb224a441437ea93c217", 0xc0) add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x9a, 0xfffffffffffffffd) [ 337.867098][T13303] gfs2: not a GFS2 filesystem [ 337.898071][T13314] hfs: unable to parse mount options [ 337.904352][T13303] gfs2: fsid=.: can't read superblock 18:44:32 executing program 4: [ 337.941329][T13303] gfs2: fsid=.: can't read superblock: -22 18:44:33 executing program 0: setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, 0x0, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_EVENTS(0xffffffffffffffff, 0x84, 0xb, &(0x7f0000000040), 0x0) ioctl$DRM_IOCTL_RM_CTX(0xffffffffffffffff, 0xc0086421, &(0x7f0000000300)={0x0, 0x1}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$gfs2(0x0, &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB='lockproto=lock_nolock,locktable=.']) 18:44:33 executing program 1: 18:44:33 executing program 2: 18:44:33 executing program 5: statx(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x2000, 0x800, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0}) syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x9, 0x0, &(0x7f00000000c0), 0x200000, &(0x7f0000000240)={[{@part={'part', 0x3d, 0xa14}}, {@file_umask={'file_umask', 0x3d, 0x657936f8}}, {@type={'type', 0x3d, "6d6d69c8"}}], [{@fsmagic={'fsmagic', 0x3d, 0x6be0}}, {@obj_type={'obj_type', 0x3d, '@%\'em1\x00'}}, {@euid_lt={'euid<', r0}}, {@fsuuid={'fsuuid', 0x3d, {[0x32, 0x36, 0x65, 0x64, 0x36, 0x64, 0x39, 0x30], 0x2d, [0x66, 0x61, 0x65, 0x37], 0x2d, [0x64, 0x0, 0x64, 0x30], 0x2d, [0x36, 0x37, 0x64, 0x35], 0x2d, [0x61, 0x61, 0x31, 0x63, 0x5a, 0x38, 0x63, 0x36]}}}, {@dont_appraise='dont_appraise'}]}) r1 = openat$md(0xffffffffffffff9c, &(0x7f0000000080)='/dev/md0\x00', 0x0, 0x0) ioctl$BLKALIGNOFF(r1, 0x127a, &(0x7f00000000c0)) ioctl$BLKPG(r1, 0x40140921, 0x0) 18:44:33 executing program 3: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) sendfile(r0, 0xffffffffffffffff, &(0x7f0000000040), 0x0) r1 = add_key$user(&(0x7f0000000040)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)='X', 0x1, 0xfffffffffffffffe) keyctl$update(0x2, r1, &(0x7f00000006c0)="c0ca1cdbaa1aedbbed80dddaa28e15b9449e2e82cca4244c40ffd0fd4e6631c7d3d86e1339de17344340b02dd527f2d8b3ae6c1db3594e657da33c3ec668f143974a65753472df5319a6b83e1e86b8f2666c61a2e700d1c1e0ae1fc52494bd4885a5c64e9007d39fa11313805290dd6342f9775f01a02ec88f6bee22f25a377a9b143abba1264586d2779088006d5f9be82b00f10287031623f73470264cc5897f18f357aad6deb3883da88ae2266664933785a3ce72bb224a441437ea93c217", 0xc0) add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x9a, 0xfffffffffffffffd) 18:44:33 executing program 4: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000000300)={0x2, 0x70, 0x669, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$VIDIOC_SUBDEV_G_SELECTION(r0, 0xc040563d, 0x0) syz_open_dev$media(0x0, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)}}, 0x20) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f0000002940)='\'\xc4\'\v\xec\xe4\t\xc5r\x12-\x90\xda\x9a\x94\x02\xec\xea\x10\x90\x03\xcb\xf8\x1b6\xa5(\xd6\xd3\x93\xd3\xdf\x85P\x19G7Q\v\xdcHv~Qa\xf3\xd4\xfc(\x83\xfb\xf8)\xf6\x8a$\xb1\x90\xeb\'~\xa0\xd8\xc8\xe8\x94#\xcd\xd5Kp\xbf\xc0\x8d7\x1b?A(\xe8^\x9c\xff\x0f\x1ck\xbc\x95\x05\xcd\x17\xf7\x15o\xd4\xdc4\x84uw\xa6w\x0f\xea`1\xec\xb4\x04\xd5\r\x8d\xde\x1f]\x15\xe5\xe8\xd00\xe5\x8d\x9c\x9ec+\x02\x1d\xffa5\x94\xab\xddNe\xfe\x8c\xc4q\xbb#f\xc1\xb9\x81W\xa4$)!\v\x9b\xa7\b\x91\xe5\xeb\x88\x1c\x0f\xb2.Tr\xe4\x99\x9e\x03\xb4\xd2\xf9KW\xce\xd1cC\xd5\xcf\x97\xa9\xeab\xda\xd6:\xa91q\xf7\xc5\xc0C\xd1\'\x89\xee\x84T:\x88x\xe2\x83\xf2r\xf4&t@\x9e\xa4qf\xdf\xf4\xb5\x01\\a\x85\xd3\xe0\xb7\n\xe7\xed\x84Q\xd7s\xcd4B\xcbQ\xa4\x9f[\x99\xdfJ%\xa8\xfc\xe3`\xc1JA\xc9\xbc\xd4~}\xce\xe8\xfejH\x8fb\xdd\xbcJ\vk\'\xe7Q\xfd\xaaA`\xb5\xa1\xe4\xf8\x9eG\xcfb\xe8@\x04\xe1\xf8\xacU)(S\xed\xffA\xfaqt\xb6-\x9b5\xf6\x1e\x13$e\n\xc7\x9b\xb0X\xb6\xd4\t\x99^^\xc2>J\x16\xd0\x8c\xecy*\xa0\a\xe9Ar\xa6\xb4n9j\xe5\xba\x8a\n\xce2\xcf_\x1b.t)\x8d09A[-\xf6\xe7\xe8\x1f\x92>\xb8\xd4>-\xacY\x9e\x88\x96\xa7\xfa\xdaoL\xa6\xec\xe8\xd5\xbfaf\xd7\xfc\x03\x91w)\xcd\x1f\xbe\xc9R\xcfz\x03\xec\br\x83\x8bM-\xf8X\xfd\"\xb4RV\x7f\xda\xd3\xd4h\x1c\xdb\xbe\xa4U\xec\xcd\'\xbc\xd22\x85{,\xe6-,6\x9d\x85\xb4fL\b\x98\xe9@\xee\xc2.\xb3\xd6w\x10\x94\xb5%D\xe8\r\xfe\x98G\x82\fx,\xa2J\x12\x03ec\xd5e-\x1f6\xe7\xb6\xd9\xcf0J\xed\xb7\x9b\xfd\xfc\x00EQ\x1f\x00D\xc95\xdeG +\x1bp\xf4\t\x94\x87\xf1ZbO\xa6\xe9\f`u\xda\xb3\x1d\xf9\x94\x80\xc1\x17\xde(_\xa7\xe7\x11\x9a\xac\x8c\xb1\xd71\xc5\xe9\xd3n\xc2\xa4\x98P\x9aF\xc2\x93\xad@\xa9h\x96\x1b]2\x88\xf3\xd8\xc798\x8c\x9f\xd4W4\xf1}\aD\xa0\xd8\xda\xf4\x1bEx(t|\xf4Y\xfaJ\xc2GS\xc9R\xb5\xda\xa8\x9b\xaa\x01\xe2~\xd8f.#\x94\xbf\x85z\xbf\xa0x62L\x1f\x91\xd2\x1e%\x88\x1f\f\xabb\x8ds\x93\x9e\xed\xd2\xdb\x02\x0e\xcf\xf5\xaf\xc8>+\x03e\xb7\xba\xb9}\xca\xfc\xe8\xed\x9b\xa2\x9ey\bMv\x8f\x8a8\xfd;\x9a5J\xee\x9a\xae\x83>$\x8a6\x05P\x8c\x05\xb8\r\xcf\xdd\x15/\xa9\xa1\xd4\x87{\xc9I4\xe3 i\xa4\xc5\xe5l\x03?\xfdM&\xc0a9}h\x8ef\x10!\xf0\x99\x80\xb72\xcc\x06\'+\xf0\xa1\a\xeeSGH\x12\x068S7s\xd3\xdaT\"\xa9jk\xed\xa2IyM\xa3&t\xfeA\xa9\"\xb4\xec\xdex\x00\x80`p\x91\x84\xbfK\xb6\x00\xa7\xa2\x06\xce\xc8X\x7f\xd1@\xf1\xcf\xdf\xae\xdb\r\xf6h\xdf\xc6+\xac\r\x9f\xc2D\xdf\xd6\xde`\xa4\xd1=\x1b\x8d\xf4\xbe#\tH\x06;a(`\xdcw\x1dc_\v\x046j\xf9`\r\xc0\a\x8d\x12:l\xc7j3E\xd7\xcaX\x97\xad\x93\xea\x99\xca\xd7m\xb8\x1e1\xb6Nz\"U/\x0eP\b=\x01W\xcd\xf1x\x85\xf4&\xe7\xf9W\x06\xa4\xf8&\xbc\xf4\xd0\xd2\xd1W\xee\x9a\xdd\xdbu\x0e\x9aV\xe2\xc5\x84`Bu\x12\xa8/=\x17\xc4F\x11\xdfm-)\xd9hc\xba\xb7\x91\xd9\x11\x9a,\x19\xf4]\xa7Y@B\x1f') 18:44:33 executing program 1: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$media(0x0, 0x0, 0x0) ioctl$VIDIOC_SUBDEV_G_SELECTION(r0, 0xc040563d, 0x0) r1 = syz_open_dev$media(&(0x7f0000000240)='/dev/media#\x00', 0x0, 0x0) ioctl$EVIOCGKEY(r1, 0xc0487c04, &(0x7f0000000000)=""/226) getsockopt$bt_BT_SECURITY(0xffffffffffffffff, 0x112, 0x4, 0x0, 0x0) syz_open_dev$media(&(0x7f0000000240)='/dev/media#\x00', 0x0, 0x0) syz_open_dev$media(0x0, 0x0, 0x0) write$RDMA_USER_CM_CMD_BIND(0xffffffffffffffff, 0x0, 0x0) 18:44:33 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) sendfile(r0, 0xffffffffffffffff, &(0x7f0000000040), 0x0) r1 = add_key$user(&(0x7f0000000040)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)='X', 0x1, 0xfffffffffffffffe) keyctl$update(0x2, r1, &(0x7f00000006c0)="c0ca1cdbaa1aedbbed80dddaa28e15b9449e2e82cca4244c40ffd0fd4e6631c7d3d86e1339de17344340b02dd527f2d8b3ae6c1db3594e657da33c3ec668f143974a65753472df5319a6b83e1e86b8f2666c61a2e700d1c1e0ae1fc52494bd4885a5c64e9007d39fa11313805290dd6342f9775f01a02ec88f6bee22f25a377a9b143abba1264586d2779088006d5f9be82b00f10287031623f73470264cc5897f18f357aad6deb3883da88ae2266664933785a3ce72bb224a441437ea93c217", 0xc0) add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x9a, 0xfffffffffffffffd) 18:44:33 executing program 2: [ 338.383364][T13333] hfs: unable to parse mount options 18:44:33 executing program 5: statx(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x2000, 0x800, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0}) syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x9, 0x0, &(0x7f00000000c0), 0x200000, &(0x7f0000000240)={[{@part={'part', 0x3d, 0xa14}}, {@file_umask={'file_umask', 0x3d, 0x657936f8}}, {@type={'type', 0x3d, "6d6d69c8"}}], [{@fsmagic={'fsmagic', 0x3d, 0x6be0}}, {@obj_type={'obj_type', 0x3d, '@%\'em1\x00'}}, {@euid_lt={'euid<', r0}}, {@fsuuid={'fsuuid', 0x3d, {[0x32, 0x36, 0x65, 0x64, 0x36, 0x64, 0x39, 0x30], 0x2d, [0x66, 0x61, 0x65, 0x37], 0x2d, [0x64, 0x0, 0x64, 0x30], 0x2d, [0x36, 0x37, 0x64, 0x35], 0x2d, [0x61, 0x61, 0x31, 0x63, 0x5a, 0x38, 0x63, 0x36]}}}, {@dont_appraise='dont_appraise'}]}) r1 = openat$md(0xffffffffffffff9c, &(0x7f0000000080)='/dev/md0\x00', 0x0, 0x0) ioctl$BLKALIGNOFF(r1, 0x127a, &(0x7f00000000c0)) ioctl$BLKPG(r1, 0x40140921, 0x0) 18:44:33 executing program 0: setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, 0x0, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_EVENTS(0xffffffffffffffff, 0x84, 0xb, &(0x7f0000000040), 0x0) ioctl$DRM_IOCTL_RM_CTX(0xffffffffffffffff, 0xc0086421, &(0x7f0000000300)={0x0, 0x1}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$gfs2(0x0, &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB='lockproto=lock_nolock,locktable=.']) 18:44:33 executing program 4: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000000300)={0x2, 0x70, 0x669, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$VIDIOC_SUBDEV_G_SELECTION(r0, 0xc040563d, 0x0) syz_open_dev$media(0x0, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)}}, 0x20) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f0000002940)='\'\xc4\'\v\xec\xe4\t\xc5r\x12-\x90\xda\x9a\x94\x02\xec\xea\x10\x90\x03\xcb\xf8\x1b6\xa5(\xd6\xd3\x93\xd3\xdf\x85P\x19G7Q\v\xdcHv~Qa\xf3\xd4\xfc(\x83\xfb\xf8)\xf6\x8a$\xb1\x90\xeb\'~\xa0\xd8\xc8\xe8\x94#\xcd\xd5Kp\xbf\xc0\x8d7\x1b?A(\xe8^\x9c\xff\x0f\x1ck\xbc\x95\x05\xcd\x17\xf7\x15o\xd4\xdc4\x84uw\xa6w\x0f\xea`1\xec\xb4\x04\xd5\r\x8d\xde\x1f]\x15\xe5\xe8\xd00\xe5\x8d\x9c\x9ec+\x02\x1d\xffa5\x94\xab\xddNe\xfe\x8c\xc4q\xbb#f\xc1\xb9\x81W\xa4$)!\v\x9b\xa7\b\x91\xe5\xeb\x88\x1c\x0f\xb2.Tr\xe4\x99\x9e\x03\xb4\xd2\xf9KW\xce\xd1cC\xd5\xcf\x97\xa9\xeab\xda\xd6:\xa91q\xf7\xc5\xc0C\xd1\'\x89\xee\x84T:\x88x\xe2\x83\xf2r\xf4&t@\x9e\xa4qf\xdf\xf4\xb5\x01\\a\x85\xd3\xe0\xb7\n\xe7\xed\x84Q\xd7s\xcd4B\xcbQ\xa4\x9f[\x99\xdfJ%\xa8\xfc\xe3`\xc1JA\xc9\xbc\xd4~}\xce\xe8\xfejH\x8fb\xdd\xbcJ\vk\'\xe7Q\xfd\xaaA`\xb5\xa1\xe4\xf8\x9eG\xcfb\xe8@\x04\xe1\xf8\xacU)(S\xed\xffA\xfaqt\xb6-\x9b5\xf6\x1e\x13$e\n\xc7\x9b\xb0X\xb6\xd4\t\x99^^\xc2>J\x16\xd0\x8c\xecy*\xa0\a\xe9Ar\xa6\xb4n9j\xe5\xba\x8a\n\xce2\xcf_\x1b.t)\x8d09A[-\xf6\xe7\xe8\x1f\x92>\xb8\xd4>-\xacY\x9e\x88\x96\xa7\xfa\xdaoL\xa6\xec\xe8\xd5\xbfaf\xd7\xfc\x03\x91w)\xcd\x1f\xbe\xc9R\xcfz\x03\xec\br\x83\x8bM-\xf8X\xfd\"\xb4RV\x7f\xda\xd3\xd4h\x1c\xdb\xbe\xa4U\xec\xcd\'\xbc\xd22\x85{,\xe6-,6\x9d\x85\xb4fL\b\x98\xe9@\xee\xc2.\xb3\xd6w\x10\x94\xb5%D\xe8\r\xfe\x98G\x82\fx,\xa2J\x12\x03ec\xd5e-\x1f6\xe7\xb6\xd9\xcf0J\xed\xb7\x9b\xfd\xfc\x00EQ\x1f\x00D\xc95\xdeG +\x1bp\xf4\t\x94\x87\xf1ZbO\xa6\xe9\f`u\xda\xb3\x1d\xf9\x94\x80\xc1\x17\xde(_\xa7\xe7\x11\x9a\xac\x8c\xb1\xd71\xc5\xe9\xd3n\xc2\xa4\x98P\x9aF\xc2\x93\xad@\xa9h\x96\x1b]2\x88\xf3\xd8\xc798\x8c\x9f\xd4W4\xf1}\aD\xa0\xd8\xda\xf4\x1bEx(t|\xf4Y\xfaJ\xc2GS\xc9R\xb5\xda\xa8\x9b\xaa\x01\xe2~\xd8f.#\x94\xbf\x85z\xbf\xa0x62L\x1f\x91\xd2\x1e%\x88\x1f\f\xabb\x8ds\x93\x9e\xed\xd2\xdb\x02\x0e\xcf\xf5\xaf\xc8>+\x03e\xb7\xba\xb9}\xca\xfc\xe8\xed\x9b\xa2\x9ey\bMv\x8f\x8a8\xfd;\x9a5J\xee\x9a\xae\x83>$\x8a6\x05P\x8c\x05\xb8\r\xcf\xdd\x15/\xa9\xa1\xd4\x87{\xc9I4\xe3 i\xa4\xc5\xe5l\x03?\xfdM&\xc0a9}h\x8ef\x10!\xf0\x99\x80\xb72\xcc\x06\'+\xf0\xa1\a\xeeSGH\x12\x068S7s\xd3\xdaT\"\xa9jk\xed\xa2IyM\xa3&t\xfeA\xa9\"\xb4\xec\xdex\x00\x80`p\x91\x84\xbfK\xb6\x00\xa7\xa2\x06\xce\xc8X\x7f\xd1@\xf1\xcf\xdf\xae\xdb\r\xf6h\xdf\xc6+\xac\r\x9f\xc2D\xdf\xd6\xde`\xa4\xd1=\x1b\x8d\xf4\xbe#\tH\x06;a(`\xdcw\x1dc_\v\x046j\xf9`\r\xc0\a\x8d\x12:l\xc7j3E\xd7\xcaX\x97\xad\x93\xea\x99\xca\xd7m\xb8\x1e1\xb6Nz\"U/\x0eP\b=\x01W\xcd\xf1x\x85\xf4&\xe7\xf9W\x06\xa4\xf8&\xbc\xf4\xd0\xd2\xd1W\xee\x9a\xdd\xdbu\x0e\x9aV\xe2\xc5\x84`Bu\x12\xa8/=\x17\xc4F\x11\xdfm-)\xd9hc\xba\xb7\x91\xd9\x11\x9a,\x19\xf4]\xa7Y@B\x1f') 18:44:33 executing program 2: 18:44:33 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) sendfile(r0, 0xffffffffffffffff, &(0x7f0000000040), 0x0) r1 = add_key$user(&(0x7f0000000040)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)='X', 0x1, 0xfffffffffffffffe) keyctl$update(0x2, r1, &(0x7f00000006c0)="c0ca1cdbaa1aedbbed80dddaa28e15b9449e2e82cca4244c40ffd0fd4e6631c7d3d86e1339de17344340b02dd527f2d8b3ae6c1db3594e657da33c3ec668f143974a65753472df5319a6b83e1e86b8f2666c61a2e700d1c1e0ae1fc52494bd4885a5c64e9007d39fa11313805290dd6342f9775f01a02ec88f6bee22f25a377a9b143abba1264586d2779088006d5f9be82b00f10287031623f73470264cc5897f18f357aad6deb3883da88ae2266664933785a3ce72bb224a441437ea93c217", 0xc0) add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x9a, 0xfffffffffffffffd) [ 338.613976][T13354] hfs: unable to parse mount options 18:44:33 executing program 5: statx(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x2000, 0x800, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0}) syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x9, 0x0, &(0x7f00000000c0), 0x200000, &(0x7f0000000240)={[{@part={'part', 0x3d, 0xa14}}, {@file_umask={'file_umask', 0x3d, 0x657936f8}}, {@type={'type', 0x3d, "6d6d69c8"}}], [{@fsmagic={'fsmagic', 0x3d, 0x6be0}}, {@obj_type={'obj_type', 0x3d, '@%\'em1\x00'}}, {@euid_lt={'euid<', r0}}, {@fsuuid={'fsuuid', 0x3d, {[0x32, 0x36, 0x65, 0x64, 0x36, 0x64, 0x39, 0x30], 0x2d, [0x66, 0x61, 0x65, 0x37], 0x2d, [0x64, 0x0, 0x64, 0x30], 0x2d, [0x36, 0x37, 0x64, 0x35], 0x2d, [0x61, 0x61, 0x31, 0x63, 0x5a, 0x38, 0x63, 0x36]}}}, {@dont_appraise='dont_appraise'}]}) r1 = openat$md(0xffffffffffffff9c, &(0x7f0000000080)='/dev/md0\x00', 0x0, 0x0) ioctl$BLKALIGNOFF(r1, 0x127a, &(0x7f00000000c0)) ioctl$BLKPG(r1, 0x40140921, 0x0) 18:44:33 executing program 1: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$media(0x0, 0x0, 0x0) ioctl$VIDIOC_SUBDEV_G_SELECTION(r0, 0xc040563d, 0x0) r1 = syz_open_dev$media(&(0x7f0000000240)='/dev/media#\x00', 0x0, 0x0) ioctl$EVIOCGKEY(r1, 0xc0487c04, &(0x7f0000000000)=""/226) getsockopt$bt_BT_SECURITY(0xffffffffffffffff, 0x112, 0x4, 0x0, 0x0) syz_open_dev$media(&(0x7f0000000240)='/dev/media#\x00', 0x0, 0x0) syz_open_dev$media(0x0, 0x0, 0x0) write$RDMA_USER_CM_CMD_BIND(0xffffffffffffffff, 0x0, 0x0) 18:44:33 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) sendfile(r0, 0xffffffffffffffff, &(0x7f0000000040), 0x0) r1 = add_key$user(&(0x7f0000000040)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)='X', 0x1, 0xfffffffffffffffe) keyctl$update(0x2, r1, &(0x7f00000006c0)="c0ca1cdbaa1aedbbed80dddaa28e15b9449e2e82cca4244c40ffd0fd4e6631c7d3d86e1339de17344340b02dd527f2d8b3ae6c1db3594e657da33c3ec668f143974a65753472df5319a6b83e1e86b8f2666c61a2e700d1c1e0ae1fc52494bd4885a5c64e9007d39fa11313805290dd6342f9775f01a02ec88f6bee22f25a377a9b143abba1264586d2779088006d5f9be82b00f10287031623f73470264cc5897f18f357aad6deb3883da88ae2266664933785a3ce72bb224a441437ea93c217", 0xc0) add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x9a, 0xfffffffffffffffd) 18:44:33 executing program 2: [ 338.877768][T13370] hfs: unable to parse mount options 18:44:33 executing program 5: statx(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x2000, 0x800, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0}) syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x9, 0x0, &(0x7f00000000c0), 0x200000, &(0x7f0000000240)={[{@part={'part', 0x3d, 0xa14}}, {@file_umask={'file_umask', 0x3d, 0x657936f8}}, {@type={'type', 0x3d, "6d6d69c8"}}], [{@fsmagic={'fsmagic', 0x3d, 0x6be0}}, {@obj_type={'obj_type', 0x3d, '@%\'em1\x00'}}, {@euid_lt={'euid<', r0}}, {@fsuuid={'fsuuid', 0x3d, {[0x32, 0x36, 0x65, 0x64, 0x36, 0x64, 0x39, 0x30], 0x2d, [0x66, 0x61, 0x65, 0x37], 0x2d, [0x0, 0x62, 0x64, 0x30], 0x2d, [0x36, 0x37, 0x64, 0x35], 0x2d, [0x61, 0x61, 0x31, 0x63, 0x5a, 0x38, 0x63, 0x36]}}}, {@dont_appraise='dont_appraise'}]}) r1 = openat$md(0xffffffffffffff9c, &(0x7f0000000080)='/dev/md0\x00', 0x0, 0x0) ioctl$BLKALIGNOFF(r1, 0x127a, &(0x7f00000000c0)) ioctl$BLKPG(r1, 0x40140921, 0x0) 18:44:33 executing program 4: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000000300)={0x2, 0x70, 0x669, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$VIDIOC_SUBDEV_G_SELECTION(r0, 0xc040563d, 0x0) syz_open_dev$media(0x0, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)}}, 0x20) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f0000002940)='\'\xc4\'\v\xec\xe4\t\xc5r\x12-\x90\xda\x9a\x94\x02\xec\xea\x10\x90\x03\xcb\xf8\x1b6\xa5(\xd6\xd3\x93\xd3\xdf\x85P\x19G7Q\v\xdcHv~Qa\xf3\xd4\xfc(\x83\xfb\xf8)\xf6\x8a$\xb1\x90\xeb\'~\xa0\xd8\xc8\xe8\x94#\xcd\xd5Kp\xbf\xc0\x8d7\x1b?A(\xe8^\x9c\xff\x0f\x1ck\xbc\x95\x05\xcd\x17\xf7\x15o\xd4\xdc4\x84uw\xa6w\x0f\xea`1\xec\xb4\x04\xd5\r\x8d\xde\x1f]\x15\xe5\xe8\xd00\xe5\x8d\x9c\x9ec+\x02\x1d\xffa5\x94\xab\xddNe\xfe\x8c\xc4q\xbb#f\xc1\xb9\x81W\xa4$)!\v\x9b\xa7\b\x91\xe5\xeb\x88\x1c\x0f\xb2.Tr\xe4\x99\x9e\x03\xb4\xd2\xf9KW\xce\xd1cC\xd5\xcf\x97\xa9\xeab\xda\xd6:\xa91q\xf7\xc5\xc0C\xd1\'\x89\xee\x84T:\x88x\xe2\x83\xf2r\xf4&t@\x9e\xa4qf\xdf\xf4\xb5\x01\\a\x85\xd3\xe0\xb7\n\xe7\xed\x84Q\xd7s\xcd4B\xcbQ\xa4\x9f[\x99\xdfJ%\xa8\xfc\xe3`\xc1JA\xc9\xbc\xd4~}\xce\xe8\xfejH\x8fb\xdd\xbcJ\vk\'\xe7Q\xfd\xaaA`\xb5\xa1\xe4\xf8\x9eG\xcfb\xe8@\x04\xe1\xf8\xacU)(S\xed\xffA\xfaqt\xb6-\x9b5\xf6\x1e\x13$e\n\xc7\x9b\xb0X\xb6\xd4\t\x99^^\xc2>J\x16\xd0\x8c\xecy*\xa0\a\xe9Ar\xa6\xb4n9j\xe5\xba\x8a\n\xce2\xcf_\x1b.t)\x8d09A[-\xf6\xe7\xe8\x1f\x92>\xb8\xd4>-\xacY\x9e\x88\x96\xa7\xfa\xdaoL\xa6\xec\xe8\xd5\xbfaf\xd7\xfc\x03\x91w)\xcd\x1f\xbe\xc9R\xcfz\x03\xec\br\x83\x8bM-\xf8X\xfd\"\xb4RV\x7f\xda\xd3\xd4h\x1c\xdb\xbe\xa4U\xec\xcd\'\xbc\xd22\x85{,\xe6-,6\x9d\x85\xb4fL\b\x98\xe9@\xee\xc2.\xb3\xd6w\x10\x94\xb5%D\xe8\r\xfe\x98G\x82\fx,\xa2J\x12\x03ec\xd5e-\x1f6\xe7\xb6\xd9\xcf0J\xed\xb7\x9b\xfd\xfc\x00EQ\x1f\x00D\xc95\xdeG +\x1bp\xf4\t\x94\x87\xf1ZbO\xa6\xe9\f`u\xda\xb3\x1d\xf9\x94\x80\xc1\x17\xde(_\xa7\xe7\x11\x9a\xac\x8c\xb1\xd71\xc5\xe9\xd3n\xc2\xa4\x98P\x9aF\xc2\x93\xad@\xa9h\x96\x1b]2\x88\xf3\xd8\xc798\x8c\x9f\xd4W4\xf1}\aD\xa0\xd8\xda\xf4\x1bEx(t|\xf4Y\xfaJ\xc2GS\xc9R\xb5\xda\xa8\x9b\xaa\x01\xe2~\xd8f.#\x94\xbf\x85z\xbf\xa0x62L\x1f\x91\xd2\x1e%\x88\x1f\f\xabb\x8ds\x93\x9e\xed\xd2\xdb\x02\x0e\xcf\xf5\xaf\xc8>+\x03e\xb7\xba\xb9}\xca\xfc\xe8\xed\x9b\xa2\x9ey\bMv\x8f\x8a8\xfd;\x9a5J\xee\x9a\xae\x83>$\x8a6\x05P\x8c\x05\xb8\r\xcf\xdd\x15/\xa9\xa1\xd4\x87{\xc9I4\xe3 i\xa4\xc5\xe5l\x03?\xfdM&\xc0a9}h\x8ef\x10!\xf0\x99\x80\xb72\xcc\x06\'+\xf0\xa1\a\xeeSGH\x12\x068S7s\xd3\xdaT\"\xa9jk\xed\xa2IyM\xa3&t\xfeA\xa9\"\xb4\xec\xdex\x00\x80`p\x91\x84\xbfK\xb6\x00\xa7\xa2\x06\xce\xc8X\x7f\xd1@\xf1\xcf\xdf\xae\xdb\r\xf6h\xdf\xc6+\xac\r\x9f\xc2D\xdf\xd6\xde`\xa4\xd1=\x1b\x8d\xf4\xbe#\tH\x06;a(`\xdcw\x1dc_\v\x046j\xf9`\r\xc0\a\x8d\x12:l\xc7j3E\xd7\xcaX\x97\xad\x93\xea\x99\xca\xd7m\xb8\x1e1\xb6Nz\"U/\x0eP\b=\x01W\xcd\xf1x\x85\xf4&\xe7\xf9W\x06\xa4\xf8&\xbc\xf4\xd0\xd2\xd1W\xee\x9a\xdd\xdbu\x0e\x9aV\xe2\xc5\x84`Bu\x12\xa8/=\x17\xc4F\x11\xdfm-)\xd9hc\xba\xb7\x91\xd9\x11\x9a,\x19\xf4]\xa7Y@B\x1f') 18:44:33 executing program 1: 18:44:33 executing program 2: r0 = openat$vcs(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) ioctl$TIOCGLCKTRMIOS(r0, 0x5456, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r1 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) r2 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ioctl$EXT4_IOC_SETFLAGS(r2, 0x40086602, &(0x7f0000000000)) fstatfs(0xffffffffffffffff, &(0x7f0000000180)=""/52) fchdir(r1) r3 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x4a) perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x20000000000000, 0x0, 0x0, 0x0, 0x0, 0x400}, 0x0, 0x0, 0xffffffffffffffff, 0x3) syz_mount_image$hfsplus(&(0x7f00000000c0)='hfsplus\x00', 0x0, 0x0, 0x3, &(0x7f0000000780)=[{&(0x7f0000000180), 0x0, 0xffff}, {&(0x7f00000009c0), 0x0, 0x1}, {&(0x7f0000000600), 0x0, 0x5}], 0x3168028, &(0x7f0000000600)=ANY=[@ANYBLOB="6465ed59e79131b6342b0042fb32fbae2aa9e62fa2f6221155687c0f373b8595a800e4e984bc5b1976b3d5ce513e04d34a88402ef788188fa9c254fd14ad2de60fc466bf4615c79460ef4ce94a123e2f"]) write$P9_RREADLINK(r3, &(0x7f0000000300)=ANY=[@ANYBLOB="3a258211f674a7724bdef64346bc14816593c04768b7b0f781d1d3abf9d1a51c4b0fe1e77551a8bd676825f508300200000040847bc2fdffe8cd918b03fe412915d8a5c51817c3ff01a1f62a471e85445d8f244f6be479ffffffffff8756ea7d486588272169d8b90f1d7106f5776f7894ee47382b88117e669c6e3203053a6a05995f5ed199fcf8722be75fa42c080601d48e7081161161a2793d1429196b4d9182f7c46359a074285b251aca195af3b2887cc79d0cedcc0b7e7f95c7d70472f7d3981e50042390a546375c8c1f1734a24583e1f8066319e93802eda50f3fb22ab8d6dc3d2afd102b71b6c5c2f2c915b6c3fc45000000000100000046a6fc39740aac6f2282f8b15f099d7cf2a2d80f132077b478cebc5552e149a3fdf5c67af8823cc16279c344d3d9158f99dc221feff389f5e8971dc6b291ec0a98d98a3c1ea1cc9bfc33b883e16e1324f8fea4778898f5687c14f050c05759bc64b38591d841b3dd8328d2b4307a16ac1ac39e64a2796125d025db97995d0e54ac5d52bd0dfbc715079d2b064faedaa03f2aad82e0da2ddc02efea1c79dd6035d22963336cafb2c6365ddc83305d810a68d722482b8841624a2db1a66b1468717a4a2e750eda2368d72ceb1f461c22076068d6b27e1048dc5a26e6254dbc2eb02cce7fe4"], 0x1e0) readv(r3, &(0x7f0000000580)=[{&(0x7f0000000680)=""/213, 0xd5}, {&(0x7f0000000880)=""/152, 0x98}, {&(0x7f0000000940)=""/4096, 0x1000}, {0x0}, {&(0x7f0000001940)=""/247, 0xf7}], 0x5) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x509, 0x0, 0x6, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r3, r3, &(0x7f0000000000), 0x8080fffffffe) 18:44:33 executing program 0: setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, 0x0, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_EVENTS(0xffffffffffffffff, 0x84, 0xb, &(0x7f0000000040), 0x0) ioctl$DRM_IOCTL_RM_CTX(0xffffffffffffffff, 0xc0086421, &(0x7f0000000300)={0x0, 0x1}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$gfs2(0x0, &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB='lockproto=lock_nolock,locktable=.']) 18:44:33 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) sendfile(r0, 0xffffffffffffffff, &(0x7f0000000040), 0x0) r1 = add_key$user(&(0x7f0000000040)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)='X', 0x1, 0xfffffffffffffffe) keyctl$update(0x2, r1, &(0x7f00000006c0)="c0ca1cdbaa1aedbbed80dddaa28e15b9449e2e82cca4244c40ffd0fd4e6631c7d3d86e1339de17344340b02dd527f2d8b3ae6c1db3594e657da33c3ec668f143974a65753472df5319a6b83e1e86b8f2666c61a2e700d1c1e0ae1fc52494bd4885a5c64e9007d39fa11313805290dd6342f9775f01a02ec88f6bee22f25a377a9b143abba1264586d2779088006d5f9be82b00f10287031623f73470264cc5897f18f357aad6deb3883da88ae2266664933785a3ce72bb224a441437ea93c217", 0xc0) add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x9a, 0xfffffffffffffffd) 18:44:34 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000f5dfe4)={0xa, 0x4e20}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x4098000, &(0x7f0000000240)={0xa, 0x4e20, 0x0, @mcast2}, 0x1c) setsockopt$sock_int(r0, 0x1, 0x2a, &(0x7f0000000040), 0x4) recvmmsg(r0, &(0x7f0000008880), 0x45b, 0x44000102, 0x0) sendto$inet6(r0, &(0x7f0000000000)="b4", 0x1, 0x0, 0x0, 0x0) 18:44:34 executing program 4: perf_event_open(&(0x7f0000000bc0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpgid(0x0) r0 = syz_open_dev$loop(&(0x7f0000000100)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000080)={[], 0x0, 0x400, 0x5b3, 0x0, 0x100000005}) io_setup(0xfe, 0x0) [ 339.175484][T13387] hfs: unable to parse mount options 18:44:34 executing program 5: statx(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x2000, 0x800, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0}) syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x9, 0x0, &(0x7f00000000c0), 0x200000, &(0x7f0000000240)={[{@part={'part', 0x3d, 0xa14}}, {@file_umask={'file_umask', 0x3d, 0x657936f8}}, {@type={'type', 0x3d, "6d6d69c8"}}], [{@fsmagic={'fsmagic', 0x3d, 0x6be0}}, {@obj_type={'obj_type', 0x3d, '@%\'em1\x00'}}, {@euid_lt={'euid<', r0}}, {@fsuuid={'fsuuid', 0x3d, {[0x32, 0x36, 0x65, 0x64, 0x36, 0x64, 0x39, 0x30], 0x2d, [0x66, 0x61, 0x65, 0x37], 0x2d, [0x0, 0x62, 0x64, 0x30], 0x2d, [0x36, 0x37, 0x64, 0x35], 0x2d, [0x61, 0x61, 0x31, 0x63, 0x5a, 0x38, 0x63, 0x36]}}}, {@dont_appraise='dont_appraise'}]}) r1 = openat$md(0xffffffffffffff9c, &(0x7f0000000080)='/dev/md0\x00', 0x0, 0x0) ioctl$BLKALIGNOFF(r1, 0x127a, &(0x7f00000000c0)) ioctl$BLKPG(r1, 0x40140921, 0x0) 18:44:34 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) sendfile(r0, 0xffffffffffffffff, &(0x7f0000000040), 0x0) r1 = add_key$user(&(0x7f0000000040)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)='X', 0x1, 0xfffffffffffffffe) keyctl$update(0x2, r1, &(0x7f00000006c0)="c0ca1cdbaa1aedbbed80dddaa28e15b9449e2e82cca4244c40ffd0fd4e6631c7d3d86e1339de17344340b02dd527f2d8b3ae6c1db3594e657da33c3ec668f143974a65753472df5319a6b83e1e86b8f2666c61a2e700d1c1e0ae1fc52494bd4885a5c64e9007d39fa11313805290dd6342f9775f01a02ec88f6bee22f25a377a9b143abba1264586d2779088006d5f9be82b00f10287031623f73470264cc5897f18f357aad6deb3883da88ae2266664933785a3ce72bb224a441437ea93c217", 0xc0) add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x9a, 0xfffffffffffffffd) [ 339.390750][T13412] hfs: unable to parse mount options 18:44:34 executing program 5: statx(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x2000, 0x800, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0}) syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x9, 0x0, &(0x7f00000000c0), 0x200000, &(0x7f0000000240)={[{@part={'part', 0x3d, 0xa14}}, {@file_umask={'file_umask', 0x3d, 0x657936f8}}, {@type={'type', 0x3d, "6d6d69c8"}}], [{@fsmagic={'fsmagic', 0x3d, 0x6be0}}, {@obj_type={'obj_type', 0x3d, '@%\'em1\x00'}}, {@euid_lt={'euid<', r0}}, {@fsuuid={'fsuuid', 0x3d, {[0x32, 0x36, 0x65, 0x64, 0x36, 0x64, 0x39, 0x30], 0x2d, [0x66, 0x61, 0x65, 0x37], 0x2d, [0x0, 0x62, 0x64, 0x30], 0x2d, [0x36, 0x37, 0x64, 0x35], 0x2d, [0x61, 0x61, 0x31, 0x63, 0x5a, 0x38, 0x63, 0x36]}}}, {@dont_appraise='dont_appraise'}]}) r1 = openat$md(0xffffffffffffff9c, &(0x7f0000000080)='/dev/md0\x00', 0x0, 0x0) ioctl$BLKALIGNOFF(r1, 0x127a, &(0x7f00000000c0)) ioctl$BLKPG(r1, 0x40140921, 0x0) 18:44:34 executing program 1: socket$netlink(0x10, 0x3, 0x0) socket$inet6(0xa, 0x4, 0x3) socket$inet_icmp_raw(0x2, 0x3, 0x1) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ttyS3\x00', 0x184000, 0x0) r0 = gettid() wait4(0x0, 0x0, 0x0, 0x0) munlockall() vmsplice(0xffffffffffffffff, &(0x7f0000000100), 0x0, 0x0) inotify_init() process_vm_writev(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x33) ptrace$cont(0x7, r0, 0x0, 0x0) 18:44:34 executing program 4: write$binfmt_misc(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7c, 0x204, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mprotect(&(0x7f0000005000/0x3000)=nil, 0x3000, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_int(r0, 0x6, 0x19, &(0x7f0000000100)=0x6, 0x4) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000140)='bic\x00', 0x4) sendto$inet(r0, &(0x7f00000012c0)="0c268a927f1f6588b967481241ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0xfe6a, 0x11, 0x0, 0x27) 18:44:34 executing program 0: setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, 0x0, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_EVENTS(0xffffffffffffffff, 0x84, 0xb, &(0x7f0000000040), 0x0) ioctl$DRM_IOCTL_RM_CTX(0xffffffffffffffff, 0xc0086421, &(0x7f0000000300)={0x0, 0x1}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB='lockproto=lock_nolock,locktable=.']) [ 339.571477][T13392] FAT-fs (loop2): error, fat_get_cluster: invalid cluster chain (i_pos 17) [ 339.592153][T13392] FAT-fs (loop2): Filesystem has been set read-only [ 339.604422][T13392] FAT-fs (loop2): error, fat_free: invalid cluster chain (i_pos 17) 18:44:34 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x0, 0x0) sendfile(r0, 0xffffffffffffffff, &(0x7f0000000040), 0x0) r1 = add_key$user(&(0x7f0000000040)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)='X', 0x1, 0xfffffffffffffffe) keyctl$update(0x2, r1, &(0x7f00000006c0)="c0ca1cdbaa1aedbbed80dddaa28e15b9449e2e82cca4244c40ffd0fd4e6631c7d3d86e1339de17344340b02dd527f2d8b3ae6c1db3594e657da33c3ec668f143974a65753472df5319a6b83e1e86b8f2666c61a2e700d1c1e0ae1fc52494bd4885a5c64e9007d39fa11313805290dd6342f9775f01a02ec88f6bee22f25a377a9b143abba1264586d2779088006d5f9be82b00f10287031623f73470264cc5897f18f357aad6deb3883da88ae2266664933785a3ce72bb224a441437ea93c217", 0xc0) add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x9a, 0xfffffffffffffffd) [ 339.656054][T13422] hfs: unable to parse mount options 18:44:34 executing program 2: r0 = openat$vcs(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) ioctl$TIOCGLCKTRMIOS(r0, 0x5456, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r1 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) r2 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ioctl$EXT4_IOC_SETFLAGS(r2, 0x40086602, &(0x7f0000000000)) fstatfs(0xffffffffffffffff, &(0x7f0000000180)=""/52) fchdir(r1) r3 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x4a) perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x20000000000000, 0x0, 0x0, 0x0, 0x0, 0x400}, 0x0, 0x0, 0xffffffffffffffff, 0x3) syz_mount_image$hfsplus(&(0x7f00000000c0)='hfsplus\x00', 0x0, 0x0, 0x3, &(0x7f0000000780)=[{&(0x7f0000000180), 0x0, 0xffff}, {&(0x7f00000009c0), 0x0, 0x1}, {&(0x7f0000000600), 0x0, 0x5}], 0x3168028, &(0x7f0000000600)=ANY=[@ANYBLOB="6465ed59e79131b6342b0042fb32fbae2aa9e62fa2f6221155687c0f373b8595a800e4e984bc5b1976b3d5ce513e04d34a88402ef788188fa9c254fd14ad2de60fc466bf4615c79460ef4ce94a123e2f"]) write$P9_RREADLINK(r3, &(0x7f0000000300)=ANY=[@ANYBLOB="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"], 0x1e0) readv(r3, &(0x7f0000000580)=[{&(0x7f0000000680)=""/213, 0xd5}, {&(0x7f0000000880)=""/152, 0x98}, {&(0x7f0000000940)=""/4096, 0x1000}, {0x0}, {&(0x7f0000001940)=""/247, 0xf7}], 0x5) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x509, 0x0, 0x6, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r3, r3, &(0x7f0000000000), 0x8080fffffffe) 18:44:34 executing program 5: statx(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x2000, 0x800, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0}) syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x9, 0x0, &(0x7f00000000c0), 0x200000, &(0x7f0000000240)={[{@part={'part', 0x3d, 0xa14}}, {@file_umask={'file_umask', 0x3d, 0x657936f8}}, {@type={'type', 0x3d, "6d6d69c8"}}], [{@fsmagic={'fsmagic', 0x3d, 0x6be0}}, {@obj_type={'obj_type', 0x3d, '@%\'em1\x00'}}, {@euid_lt={'euid<', r0}}, {@fsuuid={'fsuuid', 0x3d, {[0x32, 0x36, 0x65, 0x64, 0x36, 0x64, 0x39, 0x30], 0x2d, [0x66, 0x61, 0x65, 0x37], 0x2d, [0x64, 0x62, 0x64, 0x30], 0x2d, [0x36, 0x37, 0x64], 0x2d, [0x61, 0x61, 0x31, 0x63, 0x5a, 0x38, 0x63, 0x36]}}}, {@dont_appraise='dont_appraise'}]}) r1 = openat$md(0xffffffffffffff9c, &(0x7f0000000080)='/dev/md0\x00', 0x0, 0x0) ioctl$BLKALIGNOFF(r1, 0x127a, &(0x7f00000000c0)) ioctl$BLKPG(r1, 0x40140921, 0x0) 18:44:34 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000300)={0x2, 0x70, 0x669, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$media(0x0, 0x0, 0x0) syz_open_dev$media(&(0x7f0000000240)='/dev/media#\x00', 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000002940)='\'\xc4\'\v\xec\xe4\t\xc5r\x12-\x90\xda\x9a\x94\x02\xec\xea\x10\x90\x03\xcb\xf8\x1b6\xa5(\xd6\xd3\x93\xd3\xdf\x85P\x19G7Q\v\xdcHv~Qa\xf3\xd4\xfc(\x83\xfb\xf8)\xf6\x8a$\xb1\x90\xeb\'~\xa0\xd8\xc8\xe8\x94#\xcd\xd5Kp\xbf\xc0\x8d7\x1b?A(\xe8^\x9c\xff\x0f\x1ck\xbc\x95\x05\xcd\x17\xf7\x15o\xd4\xdc4\x84uw\xa6w\x0f\xea`1\xec\xb4\x04\xd5\r\x8d\xde\x1f]\x15\xe5\xe8\xd00\xe5\x8d\x9c\x9ec+\x02\x1d\xffa5\x94\xab\xddNe\xfe\x8c\xc4q\xbb#f\xc1\xb9\x81W\xa4$)!\v\x9b\xa7\b\x91\xe5\xeb\x88\x1c\x0f\xb2.Tr\xe4\x99\x9e\x03\xb4\xd2\xf9KW\xce\xd1cC\xd5\xcf\x97\xa9\xeab\xda\xd6:\xa91q\xf7\xc5\xc0C\xd1\'\x89\xee\x84T:\x88x\xe2\x83\xf2r\xf4&t@\x9e\xa4qf\xdf\xf4\xb5\x01\\a\x85\xd3\xe0\xb7\n\xe7\xed\x84Q\xd7s\xcd4B\xcbQ\xa4\x9f[\x99\xdfJ%\xa8\xfc\xe3`\xc1JA\xc9\xbc\xd4~}\xce\xe8\xfejH\x8fb\xdd\xbcJ\vk\'\xe7Q\xfd\xaaA`\xb5\xa1\xe4\xf8\x9eG\xcfb\xe8@\x04\xe1\xf8\xacU)(S\xed\xffA\xfaqt\xb6-\x9b5\xf6\x1e\x13$e\n\xc7\x9b\xb0X\xb6\xd4\t\x99^^\xc2>J\x16\xd0\x8c\xecy*\xa0\a\xe9Ar\xa6\xb4n9j\xe5\xba\x8a\n\xce2\xcf_\x1b.t)\x8d09A[-\xf6\xe7\xe8\x1f\x92>\xb8\xd4>-\xacY\x9e\x88\x96\xa7\xfa\xdaoL\xa6\xec\xe8\xd5\xbfaf\xd7\xfc\x03\x91w)\xcd\x1f\xbe\xc9R\xcfz\x03\xec\br\x83\x8bM-\xf8X\xfd\"\xb4RV\x7f\xda\xd3\xd4h\x1c\xdb\xbe\xa4U\xec\xcd\'\xbc\xd22\x85{,\xe6-,6\x9d\x85\xb4fL\b\x98\xe9@\xee\xc2.\xb3\xd6w\x10\x94\xb5%D\xe8\r\xfe\x98G\x82\fx,\xa2J\x12\x03ec\xd5e-\x1f6\xe7\xb6\xd9\xcf0J\xed\xb7\x9b\xfd\xfc\x00EQ\x1f\x00D\xc95\xdeG +\x1bp\xf4\t\x94\x87\xf1ZbO\xa6\xe9\f`u\xda\xb3\x1d\xf9\x94\x80\xc1\x17\xde(_\xa7\xe7\x11\x9a\xac\x8c\xb1\xd71\xc5\xe9\xd3n\xc2\xa4\x98P\x9aF\xc2\x93\xad@\xa9h\x96\x1b]2\x88\xf3\xd8\xc798\x8c\x9f\xd4W4\xf1}\aD\xa0\xd8\xda\xf4\x1bEx(t|\xf4Y\xfaJ\xc2GS\xc9R\xb5\xda\xa8\x9b\xaa\x01\xe2~\xd8f.#\x94\xbf\x85z\xbf\xa0x62L\x1f\x91\xd2\x1e%\x88\x1f\f\xabb\x8ds\x93\x9e\xed\xd2\xdb\x02\x0e\xcf\xf5\xaf\xc8>+\x03e\xb7\xba\xb9}\xca\xfc\xe8\xed\x9b\xa2\x9ey\bMv\x8f\x8a8\xfd;\x9a5J\xee\x9a\xae\x83>$\x8a6\x05P\x8c\x05\xb8\r\xcf\xdd\x15/\xa9\xa1\xd4\x87{\xc9I4\xe3 i\xa4\xc5\xe5l\x03?\xfdM&\xc0a9}h\x8ef\x10!\xf0\x99\x80\xb72\xcc\x06\'+\xf0\xa1\a\xeeSGH\x12\x068S7s\xd3\xdaT\"\xa9jk\xed\xa2IyM\xa3&t\xfeA\xa9\"\xb4\xec\xdex\x00\x80`p\x91\x84\xbfK\xb6\x00\xa7\xa2\x06\xce\xc8X\x7f\xd1@\xf1\xcf\xdf\xae\xdb\r\xf6h\xdf\xc6+\xac\r\x9f\xc2D\xdf\xd6\xde`\xa4\xd1=\x1b\x8d\xf4\xbe#\tH\x06;a(`\xdcw\x1dc_\v\x046j\xf9`\r\xc0\a\x8d\x12:l\xc7j3E\xd7\xcaX\x97\xad\x93\xea\x99\xca\xd7m\xb8\x1e1\xb6Nz\"U/\x0eP\b=\x01W\xcd\xf1x\x85\xf4&\xe7\xf9W\x06\xa4\xf8&\xbc\xf4\xd0\xd2\xd1W\xee\x9a\xdd\xdbu\x0e\x9aV\xe2\xc5\x84`Bu\x12\xa8/=\x17\xc4F\x11\xdfm-)\xd9hc\xba\xb7\x91\xd9\x11\x9a,\x19\xf4]\xa7Y@B\x1f') 18:44:34 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x0, 0x0) sendfile(r0, 0xffffffffffffffff, &(0x7f0000000040), 0x0) r1 = add_key$user(&(0x7f0000000040)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)='X', 0x1, 0xfffffffffffffffe) keyctl$update(0x2, r1, &(0x7f00000006c0)="c0ca1cdbaa1aedbbed80dddaa28e15b9449e2e82cca4244c40ffd0fd4e6631c7d3d86e1339de17344340b02dd527f2d8b3ae6c1db3594e657da33c3ec668f143974a65753472df5319a6b83e1e86b8f2666c61a2e700d1c1e0ae1fc52494bd4885a5c64e9007d39fa11313805290dd6342f9775f01a02ec88f6bee22f25a377a9b143abba1264586d2779088006d5f9be82b00f10287031623f73470264cc5897f18f357aad6deb3883da88ae2266664933785a3ce72bb224a441437ea93c217", 0xc0) add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x9a, 0xfffffffffffffffd) 18:44:34 executing program 0: setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, 0x0, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_EVENTS(0xffffffffffffffff, 0x84, 0xb, &(0x7f0000000040), 0x0) ioctl$DRM_IOCTL_RM_CTX(0xffffffffffffffff, 0xc0086421, &(0x7f0000000300)={0x0, 0x1}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB='lockproto=lock_nolock,locktable=.']) 18:44:34 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xa) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000280)=ANY=[@ANYBLOB="4800000010000507000000000000000000000002", @ANYRES32=r3, @ANYBLOB="0000400000000002280012000c0001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB="0000848aaf2f6eb2993a15a8ec45991c100e1817086f00eb35e70a1ad0d362b47b8c8ff683a2d82e0cf4df0b8c4cb48360dc0b8cb043599c9c4f504e0fa4e7a34d1f70f46ea1e1024632d140980dc29eeff367ec3e89f4a4c20de9609e37f2f84b0d398c27cbd8043c113a7b335e322c5ac0bd6cdc3bf3bfc863823d12b4a809c33b8639d7e3267c909fb647903296de60d3339ef0191106e0691a792ad9dfe644c6cc55acf4702e2149cf37744b7146dd4f70148779a55ac648323648c6fd0f39d07e3d5d936f0b95a5"], 0x48}}, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r4, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000240)=@ipv4_newaddr={0x20, 0x14, 0x121, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, r3}, [@IFA_LOCAL={0x8, 0x2, @local}]}, 0x20}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000003c0)=@ipv4_deladdr={0x20, 0x15, 0x1, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, r3}, [@IFA_LOCAL={0x8, 0x2, @local}]}, 0x20}}, 0x0) [ 339.978329][T13449] hfs: unable to parse mount options 18:44:34 executing program 5: statx(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x2000, 0x800, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0}) syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x9, 0x0, &(0x7f00000000c0), 0x200000, &(0x7f0000000240)={[{@part={'part', 0x3d, 0xa14}}, {@file_umask={'file_umask', 0x3d, 0x657936f8}}, {@type={'type', 0x3d, "6d6d69c8"}}], [{@fsmagic={'fsmagic', 0x3d, 0x6be0}}, {@obj_type={'obj_type', 0x3d, '@%\'em1\x00'}}, {@euid_lt={'euid<', r0}}, {@fsuuid={'fsuuid', 0x3d, {[0x32, 0x36, 0x65, 0x64, 0x36, 0x64, 0x39, 0x30], 0x2d, [0x66, 0x61, 0x65, 0x37], 0x2d, [0x64, 0x62, 0x64, 0x30], 0x2d, [0x36, 0x37, 0x64], 0x2d, [0x61, 0x61, 0x31, 0x63, 0x5a, 0x38, 0x63, 0x36]}}}, {@dont_appraise='dont_appraise'}]}) r1 = openat$md(0xffffffffffffff9c, &(0x7f0000000080)='/dev/md0\x00', 0x0, 0x0) ioctl$BLKALIGNOFF(r1, 0x127a, &(0x7f00000000c0)) ioctl$BLKPG(r1, 0x40140921, 0x0) 18:44:35 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x0, 0x0) sendfile(r0, 0xffffffffffffffff, &(0x7f0000000040), 0x0) r1 = add_key$user(&(0x7f0000000040)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)='X', 0x1, 0xfffffffffffffffe) keyctl$update(0x2, r1, &(0x7f00000006c0)="c0ca1cdbaa1aedbbed80dddaa28e15b9449e2e82cca4244c40ffd0fd4e6631c7d3d86e1339de17344340b02dd527f2d8b3ae6c1db3594e657da33c3ec668f143974a65753472df5319a6b83e1e86b8f2666c61a2e700d1c1e0ae1fc52494bd4885a5c64e9007d39fa11313805290dd6342f9775f01a02ec88f6bee22f25a377a9b143abba1264586d2779088006d5f9be82b00f10287031623f73470264cc5897f18f357aad6deb3883da88ae2266664933785a3ce72bb224a441437ea93c217", 0xc0) add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x9a, 0xfffffffffffffffd) [ 340.230283][T13474] hfs: unable to parse mount options 18:44:35 executing program 5: statx(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x2000, 0x800, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0}) syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x9, 0x0, &(0x7f00000000c0), 0x200000, &(0x7f0000000240)={[{@part={'part', 0x3d, 0xa14}}, {@file_umask={'file_umask', 0x3d, 0x657936f8}}, {@type={'type', 0x3d, "6d6d69c8"}}], [{@fsmagic={'fsmagic', 0x3d, 0x6be0}}, {@obj_type={'obj_type', 0x3d, '@%\'em1\x00'}}, {@euid_lt={'euid<', r0}}, {@fsuuid={'fsuuid', 0x3d, {[0x32, 0x36, 0x65, 0x64, 0x36, 0x64, 0x39, 0x30], 0x2d, [0x66, 0x61, 0x65, 0x37], 0x2d, [0x64, 0x62, 0x64, 0x30], 0x2d, [0x36, 0x37, 0x64], 0x2d, [0x61, 0x61, 0x31, 0x63, 0x5a, 0x38, 0x63, 0x36]}}}, {@dont_appraise='dont_appraise'}]}) r1 = openat$md(0xffffffffffffff9c, &(0x7f0000000080)='/dev/md0\x00', 0x0, 0x0) ioctl$BLKALIGNOFF(r1, 0x127a, &(0x7f00000000c0)) ioctl$BLKPG(r1, 0x40140921, 0x0) 18:44:35 executing program 4: write$binfmt_misc(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7c, 0x204, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mprotect(&(0x7f0000005000/0x3000)=nil, 0x3000, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_int(r0, 0x6, 0x19, &(0x7f0000000100)=0x6, 0x4) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000140)='bic\x00', 0x4) sendto$inet(r0, &(0x7f00000012c0)="0c268a927f1f6588b967481241ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0xfe6a, 0x11, 0x0, 0x27) 18:44:35 executing program 0: setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, 0x0, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_EVENTS(0xffffffffffffffff, 0x84, 0xb, &(0x7f0000000040), 0x0) ioctl$DRM_IOCTL_RM_CTX(0xffffffffffffffff, 0xc0086421, &(0x7f0000000300)={0x0, 0x1}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB='lockproto=lock_nolock,locktable=.']) 18:44:35 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x2, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000040), 0x0) r0 = add_key$user(&(0x7f0000000040)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)='X', 0x1, 0xfffffffffffffffe) keyctl$update(0x2, r0, &(0x7f00000006c0)="c0ca1cdbaa1aedbbed80dddaa28e15b9449e2e82cca4244c40ffd0fd4e6631c7d3d86e1339de17344340b02dd527f2d8b3ae6c1db3594e657da33c3ec668f143974a65753472df5319a6b83e1e86b8f2666c61a2e700d1c1e0ae1fc52494bd4885a5c64e9007d39fa11313805290dd6342f9775f01a02ec88f6bee22f25a377a9b143abba1264586d2779088006d5f9be82b00f10287031623f73470264cc5897f18f357aad6deb3883da88ae2266664933785a3ce72bb224a441437ea93c217", 0xc0) add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x9a, 0xfffffffffffffffd) [ 340.562050][T13489] hfs: unable to parse mount options [ 340.596846][T13454] FAT-fs (loop2): error, fat_get_cluster: invalid cluster chain (i_pos 17) [ 340.645158][T13454] FAT-fs (loop2): Filesystem has been set read-only [ 340.699955][T13454] FAT-fs (loop2): error, fat_free: invalid cluster chain (i_pos 17) 18:44:35 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$lock(r0, 0x7, &(0x7f0000002000)) fcntl$lock(r0, 0x5, &(0x7f0000000180)) 18:44:35 executing program 0: setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, 0x0, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_EVENTS(0xffffffffffffffff, 0x84, 0xb, &(0x7f0000000040), 0x0) ioctl$DRM_IOCTL_RM_CTX(0xffffffffffffffff, 0xc0086421, &(0x7f0000000300)={0x0, 0x1}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 18:44:35 executing program 5: statx(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x2000, 0x800, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0}) syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x9, 0x0, &(0x7f00000000c0), 0x200000, &(0x7f0000000240)={[{@part={'part', 0x3d, 0xa14}}, {@file_umask={'file_umask', 0x3d, 0x657936f8}}, {@type={'type', 0x3d, "6d6d69c8"}}], [{@fsmagic={'fsmagic', 0x3d, 0x6be0}}, {@obj_type={'obj_type', 0x3d, '@%\'em1\x00'}}, {@euid_lt={'euid<', r0}}, {@fsuuid={'fsuuid', 0x3d, {[0x32, 0x36, 0x65, 0x64, 0x36, 0x64, 0x39, 0x30], 0x2d, [0x66, 0x61, 0x65, 0x37], 0x2d, [0x64, 0x62, 0x64, 0x30], 0x2d, [0x36, 0x37, 0x0, 0x35], 0x2d, [0x61, 0x61, 0x31, 0x63, 0x5a, 0x38, 0x63, 0x36]}}}, {@dont_appraise='dont_appraise'}]}) r1 = openat$md(0xffffffffffffff9c, &(0x7f0000000080)='/dev/md0\x00', 0x0, 0x0) ioctl$BLKALIGNOFF(r1, 0x127a, &(0x7f00000000c0)) ioctl$BLKPG(r1, 0x40140921, 0x0) 18:44:35 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x2, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000040), 0x0) r0 = add_key$user(&(0x7f0000000040)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)='X', 0x1, 0xfffffffffffffffe) keyctl$update(0x2, r0, &(0x7f00000006c0)="c0ca1cdbaa1aedbbed80dddaa28e15b9449e2e82cca4244c40ffd0fd4e6631c7d3d86e1339de17344340b02dd527f2d8b3ae6c1db3594e657da33c3ec668f143974a65753472df5319a6b83e1e86b8f2666c61a2e700d1c1e0ae1fc52494bd4885a5c64e9007d39fa11313805290dd6342f9775f01a02ec88f6bee22f25a377a9b143abba1264586d2779088006d5f9be82b00f10287031623f73470264cc5897f18f357aad6deb3883da88ae2266664933785a3ce72bb224a441437ea93c217", 0xc0) add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x9a, 0xfffffffffffffffd) [ 340.996711][T13512] hfs: unable to parse mount options 18:44:35 executing program 5: statx(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x2000, 0x800, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0}) syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x9, 0x0, &(0x7f00000000c0), 0x200000, &(0x7f0000000240)={[{@part={'part', 0x3d, 0xa14}}, {@file_umask={'file_umask', 0x3d, 0x657936f8}}, {@type={'type', 0x3d, "6d6d69c8"}}], [{@fsmagic={'fsmagic', 0x3d, 0x6be0}}, {@obj_type={'obj_type', 0x3d, '@%\'em1\x00'}}, {@euid_lt={'euid<', r0}}, {@fsuuid={'fsuuid', 0x3d, {[0x32, 0x36, 0x65, 0x64, 0x36, 0x64, 0x39, 0x30], 0x2d, [0x66, 0x61, 0x65, 0x37], 0x2d, [0x64, 0x62, 0x64, 0x30], 0x2d, [0x36, 0x37, 0x0, 0x35], 0x2d, [0x61, 0x61, 0x31, 0x63, 0x5a, 0x38, 0x63, 0x36]}}}, {@dont_appraise='dont_appraise'}]}) r1 = openat$md(0xffffffffffffff9c, &(0x7f0000000080)='/dev/md0\x00', 0x0, 0x0) ioctl$BLKALIGNOFF(r1, 0x127a, &(0x7f00000000c0)) ioctl$BLKPG(r1, 0x40140921, 0x0) [ 341.065219][T13511] gfs2: not a GFS2 filesystem 18:44:36 executing program 1: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) keyctl$get_persistent(0x16, 0x0, 0x0) syz_open_dev$media(0x0, 0x0, 0x0) ioctl$VIDIOC_SUBDEV_G_SELECTION(r0, 0xc040563d, 0x0) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_BIND(r1, &(0x7f00000000c0)={0x14, 0x88, 0xfa00, {r2, 0x30, 0x0, @ib}}, 0x90) 18:44:36 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x2, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000040), 0x0) r0 = add_key$user(&(0x7f0000000040)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)='X', 0x1, 0xfffffffffffffffe) keyctl$update(0x2, r0, &(0x7f00000006c0)="c0ca1cdbaa1aedbbed80dddaa28e15b9449e2e82cca4244c40ffd0fd4e6631c7d3d86e1339de17344340b02dd527f2d8b3ae6c1db3594e657da33c3ec668f143974a65753472df5319a6b83e1e86b8f2666c61a2e700d1c1e0ae1fc52494bd4885a5c64e9007d39fa11313805290dd6342f9775f01a02ec88f6bee22f25a377a9b143abba1264586d2779088006d5f9be82b00f10287031623f73470264cc5897f18f357aad6deb3883da88ae2266664933785a3ce72bb224a441437ea93c217", 0xc0) add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x9a, 0xfffffffffffffffd) 18:44:36 executing program 0: setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, 0x0, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_EVENTS(0xffffffffffffffff, 0x84, 0xb, &(0x7f0000000040), 0x0) ioctl$DRM_IOCTL_RM_CTX(0xffffffffffffffff, 0xc0086421, &(0x7f0000000300)={0x0, 0x1}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 18:44:36 executing program 2: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = getpid() sched_setscheduler(r0, 0x5, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x8, 0x88, 0x0, 0x0, 0x0, 0x8, 0x108, 0x5, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7, 0x8}, 0x100, 0x1, 0x55, 0x6, 0x8, 0x0, 0x68}, r0, 0x0, 0xffffffffffffffff, 0x0) socket$nl_generic(0x10, 0x3, 0x10) syz_open_procfs(0x0, &(0x7f0000000000)='sched\x00') perf_event_open(&(0x7f000025c000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) socket(0x1, 0x0, 0x0) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000300)=ANY=[@ANYBLOB="74000000100001040000ff080000000000000000", @ANYRES32=0x0, @ANYBLOB="00000000008a0200440012800b0001006970766c616e00003400028006000100010000000600020003000000060002000200000006000200020000000600010001000000060002000000000008000500", @ANYRES32, @ANYBLOB='\b\x00\n\x00', @ANYRES32, @ANYBLOB], 0x74}}, 0x0) [ 341.243778][T13525] hfs: unable to parse mount options 18:44:36 executing program 4: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) pipe(&(0x7f0000000180)) socket$inet6_tcp(0xa, 0x1, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/bus/input/devices\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000040)={0x0, 0x0}) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000200)={0x1ff}, &(0x7f0000000440)={0x0, r0+30000000}, 0x0) 18:44:36 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) sendfile(r0, 0xffffffffffffffff, 0x0, 0x0) r1 = add_key$user(&(0x7f0000000040)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)='X', 0x1, 0xfffffffffffffffe) keyctl$update(0x2, r1, &(0x7f00000006c0)="c0ca1cdbaa1aedbbed80dddaa28e15b9449e2e82cca4244c40ffd0fd4e6631c7d3d86e1339de17344340b02dd527f2d8b3ae6c1db3594e657da33c3ec668f143974a65753472df5319a6b83e1e86b8f2666c61a2e700d1c1e0ae1fc52494bd4885a5c64e9007d39fa11313805290dd6342f9775f01a02ec88f6bee22f25a377a9b143abba1264586d2779088006d5f9be82b00f10287031623f73470264cc5897f18f357aad6deb3883da88ae2266664933785a3ce72bb224a441437ea93c217", 0xc0) add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x9a, 0xfffffffffffffffd) 18:44:36 executing program 5: statx(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x2000, 0x800, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0}) syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x9, 0x0, &(0x7f00000000c0), 0x200000, &(0x7f0000000240)={[{@part={'part', 0x3d, 0xa14}}, {@file_umask={'file_umask', 0x3d, 0x657936f8}}, {@type={'type', 0x3d, "6d6d69c8"}}], [{@fsmagic={'fsmagic', 0x3d, 0x6be0}}, {@obj_type={'obj_type', 0x3d, '@%\'em1\x00'}}, {@euid_lt={'euid<', r0}}, {@fsuuid={'fsuuid', 0x3d, {[0x32, 0x36, 0x65, 0x64, 0x36, 0x64, 0x39, 0x30], 0x2d, [0x66, 0x61, 0x65, 0x37], 0x2d, [0x64, 0x62, 0x64, 0x30], 0x2d, [0x36, 0x37, 0x0, 0x35], 0x2d, [0x61, 0x61, 0x31, 0x63, 0x5a, 0x38, 0x63, 0x36]}}}, {@dont_appraise='dont_appraise'}]}) r1 = openat$md(0xffffffffffffff9c, &(0x7f0000000080)='/dev/md0\x00', 0x0, 0x0) ioctl$BLKALIGNOFF(r1, 0x127a, &(0x7f00000000c0)) ioctl$BLKPG(r1, 0x40140921, 0x0) 18:44:36 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) sendfile(r0, 0xffffffffffffffff, 0x0, 0x0) r1 = add_key$user(0x0, &(0x7f0000000000)={'syz'}, &(0x7f0000000380)='X', 0x1, 0xfffffffffffffffe) keyctl$update(0x2, r1, &(0x7f00000006c0)="c0ca1cdbaa1aedbbed80dddaa28e15b9449e2e82cca4244c40ffd0fd4e6631c7d3d86e1339de17344340b02dd527f2d8b3ae6c1db3594e657da33c3ec668f143974a65753472df5319a6b83e1e86b8f2666c61a2e700d1c1e0ae1fc52494bd4885a5c64e9007d39fa11313805290dd6342f9775f01a02ec88f6bee22f25a377a9b143abba1264586d2779088006d5f9be82b00f10287031623f73470264cc5897f18f357aad6deb3883da88ae2266664933785a3ce72bb224a441437ea93c217", 0xc0) add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x9a, 0xfffffffffffffffd) [ 341.537623][T13535] gfs2: not a GFS2 filesystem 18:44:36 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) socket$inet_udp(0x2, 0x2, 0x0) r2 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r2, 0x107, 0x12, &(0x7f0000000100)={0x0, 0x3}, 0x4) [ 341.630075][T13547] hfs: unable to parse mount options 18:44:36 executing program 5: statx(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x2000, 0x800, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0}) syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x9, 0x0, &(0x7f00000000c0), 0x200000, &(0x7f0000000240)={[{@part={'part', 0x3d, 0xa14}}, {@file_umask={'file_umask', 0x3d, 0x657936f8}}, {@type={'type', 0x3d, "6d6d69c8"}}], [{@fsmagic={'fsmagic', 0x3d, 0x6be0}}, {@obj_type={'obj_type', 0x3d, '@%\'em1\x00'}}, {@euid_lt={'euid<', r0}}, {@fsuuid={'fsuuid', 0x3d, {[0x32, 0x36, 0x65, 0x64, 0x36, 0x64, 0x39, 0x30], 0x2d, [0x66, 0x61, 0x65, 0x37], 0x2d, [0x64, 0x62, 0x64, 0x30], 0x2d, [0x36, 0x0, 0x64, 0x35], 0x2d, [0x61, 0x61, 0x31, 0x63, 0x5a, 0x38, 0x63, 0x36]}}}, {@dont_appraise='dont_appraise'}]}) r1 = openat$md(0xffffffffffffff9c, &(0x7f0000000080)='/dev/md0\x00', 0x0, 0x0) ioctl$BLKALIGNOFF(r1, 0x127a, &(0x7f00000000c0)) ioctl$BLKPG(r1, 0x40140921, 0x0) 18:44:36 executing program 0: setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, 0x0, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_EVENTS(0xffffffffffffffff, 0x84, 0xb, &(0x7f0000000040), 0x0) ioctl$DRM_IOCTL_RM_CTX(0xffffffffffffffff, 0xc0086421, &(0x7f0000000300)={0x0, 0x1}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) [ 341.775478][T13539] bridge1: port 1(ipvlan2) entered blocking state 18:44:36 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) sendfile(r0, 0xffffffffffffffff, 0x0, 0x0) r1 = add_key$user(0x0, &(0x7f0000000000)={'syz'}, &(0x7f0000000380)='X', 0x1, 0xfffffffffffffffe) keyctl$update(0x2, r1, &(0x7f00000006c0)="c0ca1cdbaa1aedbbed80dddaa28e15b9449e2e82cca4244c40ffd0fd4e6631c7d3d86e1339de17344340b02dd527f2d8b3ae6c1db3594e657da33c3ec668f143974a65753472df5319a6b83e1e86b8f2666c61a2e700d1c1e0ae1fc52494bd4885a5c64e9007d39fa11313805290dd6342f9775f01a02ec88f6bee22f25a377a9b143abba1264586d2779088006d5f9be82b00f10287031623f73470264cc5897f18f357aad6deb3883da88ae2266664933785a3ce72bb224a441437ea93c217", 0xc0) add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x9a, 0xfffffffffffffffd) [ 341.821459][T13539] bridge1: port 1(ipvlan2) entered disabled state [ 341.963417][T13570] hfs: unable to parse mount options 18:44:36 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) sendfile(r0, 0xffffffffffffffff, 0x0, 0x0) r1 = add_key$user(0x0, &(0x7f0000000000)={'syz'}, &(0x7f0000000380)='X', 0x1, 0xfffffffffffffffe) keyctl$update(0x2, r1, &(0x7f00000006c0)="c0ca1cdbaa1aedbbed80dddaa28e15b9449e2e82cca4244c40ffd0fd4e6631c7d3d86e1339de17344340b02dd527f2d8b3ae6c1db3594e657da33c3ec668f143974a65753472df5319a6b83e1e86b8f2666c61a2e700d1c1e0ae1fc52494bd4885a5c64e9007d39fa11313805290dd6342f9775f01a02ec88f6bee22f25a377a9b143abba1264586d2779088006d5f9be82b00f10287031623f73470264cc5897f18f357aad6deb3883da88ae2266664933785a3ce72bb224a441437ea93c217", 0xc0) add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x9a, 0xfffffffffffffffd) 18:44:36 executing program 5: statx(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x2000, 0x800, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0}) syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x9, 0x0, &(0x7f00000000c0), 0x200000, &(0x7f0000000240)={[{@part={'part', 0x3d, 0xa14}}, {@file_umask={'file_umask', 0x3d, 0x657936f8}}, {@type={'type', 0x3d, "6d6d69c8"}}], [{@fsmagic={'fsmagic', 0x3d, 0x6be0}}, {@obj_type={'obj_type', 0x3d, '@%\'em1\x00'}}, {@euid_lt={'euid<', r0}}, {@fsuuid={'fsuuid', 0x3d, {[0x32, 0x36, 0x65, 0x64, 0x36, 0x64, 0x39, 0x30], 0x2d, [0x66, 0x61, 0x65, 0x37], 0x2d, [0x64, 0x62, 0x64, 0x30], 0x2d, [0x36, 0x0, 0x64, 0x35], 0x2d, [0x61, 0x61, 0x31, 0x63, 0x5a, 0x38, 0x63, 0x36]}}}, {@dont_appraise='dont_appraise'}]}) r1 = openat$md(0xffffffffffffff9c, &(0x7f0000000080)='/dev/md0\x00', 0x0, 0x0) ioctl$BLKALIGNOFF(r1, 0x127a, &(0x7f00000000c0)) ioctl$BLKPG(r1, 0x40140921, 0x0) [ 342.071784][T13569] gfs2: not a GFS2 filesystem 18:44:37 executing program 0: setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, 0x0, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_EVENTS(0xffffffffffffffff, 0x84, 0xb, &(0x7f0000000040), 0x0) ioctl$DRM_IOCTL_RM_CTX(0xffffffffffffffff, 0xc0086421, &(0x7f0000000300)={0x0, 0x1}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=ANY=[]) [ 342.266476][T13593] hfs: unable to parse mount options 18:44:37 executing program 2: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = getpid() sched_setscheduler(r0, 0x5, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x8, 0x88, 0x0, 0x0, 0x0, 0x8, 0x108, 0x5, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7, 0x8}, 0x100, 0x1, 0x55, 0x6, 0x8, 0x0, 0x68}, r0, 0x0, 0xffffffffffffffff, 0x0) socket$nl_generic(0x10, 0x3, 0x10) syz_open_procfs(0x0, &(0x7f0000000000)='sched\x00') perf_event_open(&(0x7f000025c000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) socket(0x1, 0x0, 0x0) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000300)=ANY=[@ANYBLOB="74000000100001040000ff080000000000000000", @ANYRES32=0x0, @ANYBLOB="00000000008a0200440012800b0001006970766c616e00003400028006000100010000000600020003000000060002000200000006000200020000000600010001000000060002000000000008000500", @ANYRES32, @ANYBLOB='\b\x00\n\x00', @ANYRES32, @ANYBLOB], 0x74}}, 0x0) 18:44:37 executing program 4: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) pipe(&(0x7f0000000180)) socket$inet6_tcp(0xa, 0x1, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/bus/input/devices\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000040)={0x0, 0x0}) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000200)={0x1ff}, &(0x7f0000000440)={0x0, r0+30000000}, 0x0) 18:44:37 executing program 1: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_subtree(r0, &(0x7f0000000340)='cgroup.subtree_control\x00', 0x2, 0x0) write$cgroup_subtree(r1, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], 0x5) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = fcntl$dupfd(r3, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) write$cgroup_subtree(r1, &(0x7f00000000c0)={[{0x2b, 'cpu'}]}, 0x5) 18:44:37 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) sendfile(r0, 0xffffffffffffffff, 0x0, 0x0) r1 = add_key$user(&(0x7f0000000040)='user\x00', 0x0, &(0x7f0000000380)='X', 0x1, 0xfffffffffffffffe) keyctl$update(0x2, r1, &(0x7f00000006c0)="c0ca1cdbaa1aedbbed80dddaa28e15b9449e2e82cca4244c40ffd0fd4e6631c7d3d86e1339de17344340b02dd527f2d8b3ae6c1db3594e657da33c3ec668f143974a65753472df5319a6b83e1e86b8f2666c61a2e700d1c1e0ae1fc52494bd4885a5c64e9007d39fa11313805290dd6342f9775f01a02ec88f6bee22f25a377a9b143abba1264586d2779088006d5f9be82b00f10287031623f73470264cc5897f18f357aad6deb3883da88ae2266664933785a3ce72bb224a441437ea93c217", 0xc0) add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x9a, 0xfffffffffffffffd) 18:44:37 executing program 5: statx(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x2000, 0x800, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0}) syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x9, 0x0, &(0x7f00000000c0), 0x200000, &(0x7f0000000240)={[{@part={'part', 0x3d, 0xa14}}, {@file_umask={'file_umask', 0x3d, 0x657936f8}}, {@type={'type', 0x3d, "6d6d69c8"}}], [{@fsmagic={'fsmagic', 0x3d, 0x6be0}}, {@obj_type={'obj_type', 0x3d, '@%\'em1\x00'}}, {@euid_lt={'euid<', r0}}, {@fsuuid={'fsuuid', 0x3d, {[0x32, 0x36, 0x65, 0x64, 0x36, 0x64, 0x39, 0x30], 0x2d, [0x66, 0x61, 0x65, 0x37], 0x2d, [0x64, 0x62, 0x64, 0x30], 0x2d, [0x36, 0x0, 0x64, 0x35], 0x2d, [0x61, 0x61, 0x31, 0x63, 0x5a, 0x38, 0x63, 0x36]}}}, {@dont_appraise='dont_appraise'}]}) r1 = openat$md(0xffffffffffffff9c, &(0x7f0000000080)='/dev/md0\x00', 0x0, 0x0) ioctl$BLKALIGNOFF(r1, 0x127a, &(0x7f00000000c0)) ioctl$BLKPG(r1, 0x40140921, 0x0) [ 342.541456][T13607] gfs2: not a GFS2 filesystem 18:44:37 executing program 0: setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, 0x0, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_EVENTS(0xffffffffffffffff, 0x84, 0xb, &(0x7f0000000040), 0x0) ioctl$DRM_IOCTL_RM_CTX(0xffffffffffffffff, 0xc0086421, &(0x7f0000000300)={0x0, 0x1}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=ANY=[]) [ 342.661425][T13613] bridge1: port 1(ipvlan2) entered blocking state [ 342.697567][T13613] bridge1: port 1(ipvlan2) entered disabled state 18:44:37 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) sendfile(r0, 0xffffffffffffffff, 0x0, 0x0) r1 = add_key$user(&(0x7f0000000040)='user\x00', 0x0, &(0x7f0000000380)='X', 0x1, 0xfffffffffffffffe) keyctl$update(0x2, r1, &(0x7f00000006c0)="c0ca1cdbaa1aedbbed80dddaa28e15b9449e2e82cca4244c40ffd0fd4e6631c7d3d86e1339de17344340b02dd527f2d8b3ae6c1db3594e657da33c3ec668f143974a65753472df5319a6b83e1e86b8f2666c61a2e700d1c1e0ae1fc52494bd4885a5c64e9007d39fa11313805290dd6342f9775f01a02ec88f6bee22f25a377a9b143abba1264586d2779088006d5f9be82b00f10287031623f73470264cc5897f18f357aad6deb3883da88ae2266664933785a3ce72bb224a441437ea93c217", 0xc0) add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x9a, 0xfffffffffffffffd) [ 342.715755][T13624] hfs: unable to parse mount options 18:44:37 executing program 5: statx(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x2000, 0x800, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0}) syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x9, 0x0, &(0x7f00000000c0), 0x200000, &(0x7f0000000240)={[{@part={'part', 0x3d, 0xa14}}, {@file_umask={'file_umask', 0x3d, 0x657936f8}}, {@type={'type', 0x3d, "6d6d69c8"}}], [{@fsmagic={'fsmagic', 0x3d, 0x6be0}}, {@obj_type={'obj_type', 0x3d, '@%\'em1\x00'}}, {@euid_lt={'euid<', r0}}, {@fsuuid={'fsuuid', 0x3d, {[0x32, 0x36, 0x65, 0x64, 0x36, 0x64, 0x39, 0x30], 0x2d, [0x66, 0x61, 0x65, 0x37], 0x2d, [0x64, 0x62, 0x64, 0x30], 0x2d, [0x0, 0x37, 0x64, 0x35], 0x2d, [0x61, 0x61, 0x31, 0x63, 0x5a, 0x38, 0x63, 0x36]}}}, {@dont_appraise='dont_appraise'}]}) r1 = openat$md(0xffffffffffffff9c, &(0x7f0000000080)='/dev/md0\x00', 0x0, 0x0) ioctl$BLKALIGNOFF(r1, 0x127a, &(0x7f00000000c0)) ioctl$BLKPG(r1, 0x40140921, 0x0) 18:44:37 executing program 1: keyctl$get_persistent(0x16, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$EVIOCGKEY(0xffffffffffffffff, 0xc0487c04, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, 'hash\x00', 0x0, 0x0, 'tgr192-generic\x00'}, 0x58) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) accept(r1, &(0x7f00000005c0)=@rc, 0x0) [ 342.887722][T13635] gfs2: not a GFS2 filesystem 18:44:37 executing program 0: setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, 0x0, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_EVENTS(0xffffffffffffffff, 0x84, 0xb, &(0x7f0000000040), 0x0) ioctl$DRM_IOCTL_RM_CTX(0xffffffffffffffff, 0xc0086421, &(0x7f0000000300)={0x0, 0x1}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=ANY=[]) 18:44:37 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) sendfile(r0, 0xffffffffffffffff, 0x0, 0x0) r1 = add_key$user(&(0x7f0000000040)='user\x00', 0x0, &(0x7f0000000380)='X', 0x1, 0xfffffffffffffffe) keyctl$update(0x2, r1, &(0x7f00000006c0)="c0ca1cdbaa1aedbbed80dddaa28e15b9449e2e82cca4244c40ffd0fd4e6631c7d3d86e1339de17344340b02dd527f2d8b3ae6c1db3594e657da33c3ec668f143974a65753472df5319a6b83e1e86b8f2666c61a2e700d1c1e0ae1fc52494bd4885a5c64e9007d39fa11313805290dd6342f9775f01a02ec88f6bee22f25a377a9b143abba1264586d2779088006d5f9be82b00f10287031623f73470264cc5897f18f357aad6deb3883da88ae2266664933785a3ce72bb224a441437ea93c217", 0xc0) add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x9a, 0xfffffffffffffffd) [ 343.010501][T13645] hfs: unable to parse mount options 18:44:37 executing program 5: statx(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x2000, 0x800, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0}) syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x9, 0x0, &(0x7f00000000c0), 0x200000, &(0x7f0000000240)={[{@part={'part', 0x3d, 0xa14}}, {@file_umask={'file_umask', 0x3d, 0x657936f8}}, {@type={'type', 0x3d, "6d6d69c8"}}], [{@fsmagic={'fsmagic', 0x3d, 0x6be0}}, {@obj_type={'obj_type', 0x3d, '@%\'em1\x00'}}, {@euid_lt={'euid<', r0}}, {@fsuuid={'fsuuid', 0x3d, {[0x32, 0x36, 0x65, 0x64, 0x36, 0x64, 0x39, 0x30], 0x2d, [0x66, 0x61, 0x65, 0x37], 0x2d, [0x64, 0x62, 0x64, 0x30], 0x2d, [0x0, 0x37, 0x64, 0x35], 0x2d, [0x61, 0x61, 0x31, 0x63, 0x5a, 0x38, 0x63, 0x36]}}}, {@dont_appraise='dont_appraise'}]}) r1 = openat$md(0xffffffffffffff9c, &(0x7f0000000080)='/dev/md0\x00', 0x0, 0x0) ioctl$BLKALIGNOFF(r1, 0x127a, &(0x7f00000000c0)) ioctl$BLKPG(r1, 0x40140921, 0x0) 18:44:37 executing program 2: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0x1}) r4 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r4, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @empty}}) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x1000000c8) splice(r0, 0x0, r2, 0x0, 0x10005, 0x0) [ 343.134727][T13649] gfs2: not a GFS2 filesystem [ 343.253869][T13658] hfs: unable to parse mount options 18:44:38 executing program 4: r0 = socket$inet(0x2, 0x3, 0x2) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") getsockopt(r0, 0x0, 0xcf, 0x0, 0x0) 18:44:38 executing program 1: syz_mount_image$tmpfs(&(0x7f0000000000)='tmpfs\x00', &(0x7f00000006c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)={[{@mpol={'mpol', 0x3d, {'interleave', '=static', @void}}}]}) 18:44:38 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) sendfile(r0, 0xffffffffffffffff, 0x0, 0x0) r1 = add_key$user(&(0x7f0000000040)='user\x00', &(0x7f0000000000)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$update(0x2, r1, &(0x7f00000006c0)="c0ca1cdbaa1aedbbed80dddaa28e15b9449e2e82cca4244c40ffd0fd4e6631c7d3d86e1339de17344340b02dd527f2d8b3ae6c1db3594e657da33c3ec668f143974a65753472df5319a6b83e1e86b8f2666c61a2e700d1c1e0ae1fc52494bd4885a5c64e9007d39fa11313805290dd6342f9775f01a02ec88f6bee22f25a377a9b143abba1264586d2779088006d5f9be82b00f10287031623f73470264cc5897f18f357aad6deb3883da88ae2266664933785a3ce72bb224a441437ea93c217", 0xc0) add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x9a, 0xfffffffffffffffd) 18:44:38 executing program 0: setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, 0x0, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_EVENTS(0xffffffffffffffff, 0x84, 0xb, &(0x7f0000000040), 0x0) ioctl$DRM_IOCTL_RM_CTX(0xffffffffffffffff, 0xc0086421, &(0x7f0000000300)={0x0, 0x1}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB]) 18:44:38 executing program 5: statx(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x2000, 0x800, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0}) syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x9, 0x0, &(0x7f00000000c0), 0x200000, &(0x7f0000000240)={[{@part={'part', 0x3d, 0xa14}}, {@file_umask={'file_umask', 0x3d, 0x657936f8}}, {@type={'type', 0x3d, "6d6d69c8"}}], [{@fsmagic={'fsmagic', 0x3d, 0x6be0}}, {@obj_type={'obj_type', 0x3d, '@%\'em1\x00'}}, {@euid_lt={'euid<', r0}}, {@fsuuid={'fsuuid', 0x3d, {[0x32, 0x36, 0x65, 0x64, 0x36, 0x64, 0x39, 0x30], 0x2d, [0x66, 0x61, 0x65, 0x37], 0x2d, [0x64, 0x62, 0x64, 0x30], 0x2d, [0x0, 0x37, 0x64, 0x35], 0x2d, [0x61, 0x61, 0x31, 0x63, 0x5a, 0x38, 0x63, 0x36]}}}, {@dont_appraise='dont_appraise'}]}) r1 = openat$md(0xffffffffffffff9c, &(0x7f0000000080)='/dev/md0\x00', 0x0, 0x0) ioctl$BLKALIGNOFF(r1, 0x127a, &(0x7f00000000c0)) ioctl$BLKPG(r1, 0x40140921, 0x0) [ 343.527915][T13675] gfs2: not a GFS2 filesystem 18:44:38 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) sendfile(r0, 0xffffffffffffffff, 0x0, 0x0) r1 = add_key$user(&(0x7f0000000040)='user\x00', &(0x7f0000000000)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$update(0x2, r1, &(0x7f00000006c0)="c0ca1cdbaa1aedbbed80dddaa28e15b9449e2e82cca4244c40ffd0fd4e6631c7d3d86e1339de17344340b02dd527f2d8b3ae6c1db3594e657da33c3ec668f143974a65753472df5319a6b83e1e86b8f2666c61a2e700d1c1e0ae1fc52494bd4885a5c64e9007d39fa11313805290dd6342f9775f01a02ec88f6bee22f25a377a9b143abba1264586d2779088006d5f9be82b00f10287031623f73470264cc5897f18f357aad6deb3883da88ae2266664933785a3ce72bb224a441437ea93c217", 0xc0) add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x9a, 0xfffffffffffffffd) 18:44:38 executing program 4: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) close(0xffffffffffffffff) close(0xffffffffffffffff) fsetxattr$trusted_overlay_origin(0xffffffffffffffff, &(0x7f0000000100)='trusted.overlay.origin\x00', &(0x7f0000000140)='y\x00', 0x2, 0x0) mount(0x0, 0x0, 0x0, 0x0, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) write(r0, &(0x7f00000001c0), 0xfffffef3) openat$procfs(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/bus/input/devices\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000040)={0x0, 0x0}) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000200)={0x1ff}, &(0x7f0000000440)={0x0, r1+30000000}, 0x0) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) [ 343.580356][T13680] hfs: unable to parse mount options 18:44:38 executing program 0: setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, 0x0, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_EVENTS(0xffffffffffffffff, 0x84, 0xb, &(0x7f0000000040), 0x0) ioctl$DRM_IOCTL_RM_CTX(0xffffffffffffffff, 0xc0086421, &(0x7f0000000300)={0x0, 0x1}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB]) 18:44:38 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) sendfile(r0, 0xffffffffffffffff, 0x0, 0x0) r1 = add_key$user(&(0x7f0000000040)='user\x00', &(0x7f0000000000)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$update(0x2, r1, &(0x7f00000006c0)="c0ca1cdbaa1aedbbed80dddaa28e15b9449e2e82cca4244c40ffd0fd4e6631c7d3d86e1339de17344340b02dd527f2d8b3ae6c1db3594e657da33c3ec668f143974a65753472df5319a6b83e1e86b8f2666c61a2e700d1c1e0ae1fc52494bd4885a5c64e9007d39fa11313805290dd6342f9775f01a02ec88f6bee22f25a377a9b143abba1264586d2779088006d5f9be82b00f10287031623f73470264cc5897f18f357aad6deb3883da88ae2266664933785a3ce72bb224a441437ea93c217", 0xc0) add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x9a, 0xfffffffffffffffd) 18:44:38 executing program 5: statx(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x2000, 0x800, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0}) syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x9, 0x0, &(0x7f00000000c0), 0x200000, &(0x7f0000000240)={[{@part={'part', 0x3d, 0xa14}}, {@file_umask={'file_umask', 0x3d, 0x657936f8}}, {@type={'type', 0x3d, "6d6d69c8"}}], [{@fsmagic={'fsmagic', 0x3d, 0x6be0}}, {@obj_type={'obj_type', 0x3d, '@%\'em1\x00'}}, {@euid_lt={'euid<', r0}}, {@fsuuid={'fsuuid', 0x3d, {[0x32, 0x36, 0x65, 0x64, 0x36, 0x64, 0x39, 0x30], 0x2d, [0x66, 0x61, 0x65, 0x37], 0x2d, [0x64, 0x62, 0x64, 0x30], 0x2d, [0x36, 0x37, 0x64, 0x35], 0x2d, [0x61, 0x61, 0x31, 0x63, 0x5a, 0x38, 0x63]}}}, {@dont_appraise='dont_appraise'}]}) r1 = openat$md(0xffffffffffffff9c, &(0x7f0000000080)='/dev/md0\x00', 0x0, 0x0) ioctl$BLKALIGNOFF(r1, 0x127a, &(0x7f00000000c0)) ioctl$BLKPG(r1, 0x40140921, 0x0) 18:44:38 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000040)='nl80211\x00') sendmsg$NL80211_CMD_NEW_INTERFACE(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000000c0)={0x14, r2, 0x405, 0x0, 0x0, {0x7e}}, 0x14}}, 0x0) [ 343.877915][T13707] hfs: unable to parse mount options [ 343.931020][T13708] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 [ 343.969011][T13701] gfs2: not a GFS2 filesystem 18:44:39 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x8) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x9, 0x1, 0x80, 0x400}, 0x3c) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086602, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000100)) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000cc0)={0x0, 0x0, &(0x7f0000000a40), &(0x7f0000000280), 0x400, r1}, 0x38) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$BPF_MAP_LOOKUP_AND_DELETE_BATCH(0x19, &(0x7f0000000040)={0x0, &(0x7f0000000200)=""/163, &(0x7f00000002c0), &(0x7f0000000080), 0x3, r1}, 0x38) 18:44:39 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) sendfile(r0, 0xffffffffffffffff, 0x0, 0x0) r1 = add_key$user(&(0x7f0000000040)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380), 0x0, 0xfffffffffffffffe) keyctl$update(0x2, r1, &(0x7f00000006c0)="c0ca1cdbaa1aedbbed80dddaa28e15b9449e2e82cca4244c40ffd0fd4e6631c7d3d86e1339de17344340b02dd527f2d8b3ae6c1db3594e657da33c3ec668f143974a65753472df5319a6b83e1e86b8f2666c61a2e700d1c1e0ae1fc52494bd4885a5c64e9007d39fa11313805290dd6342f9775f01a02ec88f6bee22f25a377a9b143abba1264586d2779088006d5f9be82b00f10287031623f73470264cc5897f18f357aad6deb3883da88ae2266664933785a3ce72bb224a441437ea93c217", 0xc0) add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x9a, 0xfffffffffffffffd) 18:44:39 executing program 1: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x0, 0x2812, r0, 0x0) perf_event_open(&(0x7f00000000c0)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1081}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = dup3(r1, r2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) mmap(&(0x7f0000004000/0x4000)=nil, 0x4000, 0x0, 0x32, 0xffffffffffffffff, 0x0) 18:44:39 executing program 5: statx(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x2000, 0x800, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0}) syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x9, 0x0, &(0x7f00000000c0), 0x200000, &(0x7f0000000240)={[{@part={'part', 0x3d, 0xa14}}, {@file_umask={'file_umask', 0x3d, 0x657936f8}}, {@type={'type', 0x3d, "6d6d69c8"}}], [{@fsmagic={'fsmagic', 0x3d, 0x6be0}}, {@obj_type={'obj_type', 0x3d, '@%\'em1\x00'}}, {@euid_lt={'euid<', r0}}, {@fsuuid={'fsuuid', 0x3d, {[0x32, 0x36, 0x65, 0x64, 0x36, 0x64, 0x39, 0x30], 0x2d, [0x66, 0x61, 0x65, 0x37], 0x2d, [0x64, 0x62, 0x64, 0x30], 0x2d, [0x36, 0x37, 0x64, 0x35], 0x2d, [0x61, 0x61, 0x31, 0x63, 0x5a, 0x38, 0x63]}}}, {@dont_appraise='dont_appraise'}]}) r1 = openat$md(0xffffffffffffff9c, &(0x7f0000000080)='/dev/md0\x00', 0x0, 0x0) ioctl$BLKALIGNOFF(r1, 0x127a, &(0x7f00000000c0)) ioctl$BLKPG(r1, 0x40140921, 0x0) 18:44:39 executing program 0: setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, 0x0, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_EVENTS(0xffffffffffffffff, 0x84, 0xb, &(0x7f0000000040), 0x0) ioctl$DRM_IOCTL_RM_CTX(0xffffffffffffffff, 0xc0086421, &(0x7f0000000300)={0x0, 0x1}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB]) 18:44:39 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) sendfile(r0, 0xffffffffffffffff, 0x0, 0x0) r1 = add_key$user(&(0x7f0000000040)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380), 0x0, 0xfffffffffffffffe) keyctl$update(0x2, r1, &(0x7f00000006c0)="c0ca1cdbaa1aedbbed80dddaa28e15b9449e2e82cca4244c40ffd0fd4e6631c7d3d86e1339de17344340b02dd527f2d8b3ae6c1db3594e657da33c3ec668f143974a65753472df5319a6b83e1e86b8f2666c61a2e700d1c1e0ae1fc52494bd4885a5c64e9007d39fa11313805290dd6342f9775f01a02ec88f6bee22f25a377a9b143abba1264586d2779088006d5f9be82b00f10287031623f73470264cc5897f18f357aad6deb3883da88ae2266664933785a3ce72bb224a441437ea93c217", 0xc0) add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x9a, 0xfffffffffffffffd) 18:44:39 executing program 4: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x2, 0x0) write$uinput_user_dev(r0, &(0x7f0000000d00)={'syz1\x00'}, 0x45c) ioctl$UI_DEV_SETUP(r0, 0x5501, 0x0) write$input_event(r0, &(0x7f0000000000)={{0x77359400}, 0x15}, 0xfe4f) [ 344.712785][T13737] hfs: unable to parse mount options [ 344.821599][T13731] gfs2: not a GFS2 filesystem 18:44:39 executing program 5: statx(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x2000, 0x800, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0}) syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x9, 0x0, &(0x7f00000000c0), 0x200000, &(0x7f0000000240)={[{@part={'part', 0x3d, 0xa14}}, {@file_umask={'file_umask', 0x3d, 0x657936f8}}, {@type={'type', 0x3d, "6d6d69c8"}}], [{@fsmagic={'fsmagic', 0x3d, 0x6be0}}, {@obj_type={'obj_type', 0x3d, '@%\'em1\x00'}}, {@euid_lt={'euid<', r0}}, {@fsuuid={'fsuuid', 0x3d, {[0x32, 0x36, 0x65, 0x64, 0x36, 0x64, 0x39, 0x30], 0x2d, [0x66, 0x61, 0x65, 0x37], 0x2d, [0x64, 0x62, 0x64, 0x30], 0x2d, [0x36, 0x37, 0x64, 0x35], 0x2d, [0x61, 0x61, 0x31, 0x63, 0x5a, 0x38, 0x63]}}}, {@dont_appraise='dont_appraise'}]}) r1 = openat$md(0xffffffffffffff9c, &(0x7f0000000080)='/dev/md0\x00', 0x0, 0x0) ioctl$BLKALIGNOFF(r1, 0x127a, &(0x7f00000000c0)) ioctl$BLKPG(r1, 0x40140921, 0x0) 18:44:39 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x8) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x9, 0x1, 0x80, 0x400}, 0x3c) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086602, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000100)) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000cc0)={0x0, 0x0, &(0x7f0000000a40), &(0x7f0000000280), 0x400, r1}, 0x38) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$BPF_MAP_LOOKUP_AND_DELETE_BATCH(0x19, &(0x7f0000000040)={0x0, &(0x7f0000000200)=""/163, &(0x7f00000002c0), &(0x7f0000000080), 0x3, r1}, 0x38) 18:44:39 executing program 0: setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, 0x0, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_EVENTS(0xffffffffffffffff, 0x84, 0xb, &(0x7f0000000040), 0x0) ioctl$DRM_IOCTL_RM_CTX(0xffffffffffffffff, 0xc0086421, &(0x7f0000000300)={0x0, 0x1}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB='lockproto=lock_no']) [ 344.877522][T13747] input: syz1 as /devices/virtual/input/input5 18:44:39 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000340)=[{&(0x7f0000000100)="1400000052008102a00f80854a36b8ab959916fb", 0x14}], 0x1}, 0x0) recvmsg$kcm(r0, &(0x7f0000001b40)={0x0, 0x0, 0x0}, 0x0) recvmsg$kcm(r0, &(0x7f0000001d80)={0x0, 0x0, 0x0}, 0x0) recvmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, 0x0}, 0x0) 18:44:39 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) sendfile(r0, 0xffffffffffffffff, 0x0, 0x0) r1 = add_key$user(&(0x7f0000000040)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380), 0x0, 0xfffffffffffffffe) keyctl$update(0x2, r1, &(0x7f00000006c0)="c0ca1cdbaa1aedbbed80dddaa28e15b9449e2e82cca4244c40ffd0fd4e6631c7d3d86e1339de17344340b02dd527f2d8b3ae6c1db3594e657da33c3ec668f143974a65753472df5319a6b83e1e86b8f2666c61a2e700d1c1e0ae1fc52494bd4885a5c64e9007d39fa11313805290dd6342f9775f01a02ec88f6bee22f25a377a9b143abba1264586d2779088006d5f9be82b00f10287031623f73470264cc5897f18f357aad6deb3883da88ae2266664933785a3ce72bb224a441437ea93c217", 0xc0) add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x9a, 0xfffffffffffffffd) [ 344.997992][T13753] input: syz1 as /devices/virtual/input/input6 18:44:39 executing program 4: r0 = perf_event_open(&(0x7f0000000bc0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x6100, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmget$private(0x0, 0x3000, 0x0, &(0x7f0000ffb000/0x3000)=nil) shmctl$SHM_STAT(0x0, 0xd, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x24, 0x0, &(0x7f0000000000)) accept(0xffffffffffffffff, 0x0, &(0x7f0000000540)) syz_genetlink_get_family_id$nl80211(&(0x7f0000000700)='nl80211\x00') r1 = geteuid() geteuid() sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000800)=ANY=[@ANYRES32=0x0, @ANYRES32=r1], 0x2}}, 0x0) fsetxattr$trusted_overlay_upper(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) gettid() getpgid(0x0) r2 = syz_open_dev$loop(&(0x7f0000000100)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) ioctl$BLKTRACESETUP(r2, 0xc0481273, 0x0) perf_event_open(0x0, 0x0, 0x0, r0, 0x0) socket$inet(0x2, 0x0, 0x0) [ 345.046458][T13760] hfs: unable to parse mount options 18:44:40 executing program 1: syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000280)={[{@gqnoenforce='gqnoenforce'}, {@largeio='largeio'}]}) 18:44:40 executing program 5: statx(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x2000, 0x800, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0}) syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x9, 0x0, &(0x7f00000000c0), 0x200000, &(0x7f0000000240)={[{@part={'part', 0x3d, 0xa14}}, {@file_umask={'file_umask', 0x3d, 0x657936f8}}, {@type={'type', 0x3d, "6d6d69c8"}}], [{@fsmagic={'fsmagic', 0x3d, 0x6be0}}, {@obj_type={'obj_type', 0x3d, '@%\'em1\x00'}}, {@euid_lt={'euid<', r0}}, {@fsuuid={'fsuuid', 0x3d, {[0x32, 0x36, 0x65, 0x64, 0x36, 0x64, 0x39, 0x30], 0x2d, [0x66, 0x61, 0x65, 0x37], 0x2d, [0x64, 0x62, 0x64, 0x30], 0x2d, [0x36, 0x37, 0x64, 0x35], 0x2d, [0x61, 0x61, 0x31, 0x63, 0x5a, 0x38, 0x0, 0x36]}}}, {@dont_appraise='dont_appraise'}]}) r1 = openat$md(0xffffffffffffff9c, &(0x7f0000000080)='/dev/md0\x00', 0x0, 0x0) ioctl$BLKALIGNOFF(r1, 0x127a, &(0x7f00000000c0)) ioctl$BLKPG(r1, 0x40140921, 0x0) 18:44:40 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) sendfile(r0, 0xffffffffffffffff, 0x0, 0x0) add_key$user(&(0x7f0000000040)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)='X', 0x1, 0xfffffffffffffffe) keyctl$update(0x2, 0x0, &(0x7f00000006c0)="c0ca1cdbaa1aedbbed80dddaa28e15b9449e2e82cca4244c40ffd0fd4e6631c7d3d86e1339de17344340b02dd527f2d8b3ae6c1db3594e657da33c3ec668f143974a65753472df5319a6b83e1e86b8f2666c61a2e700d1c1e0ae1fc52494bd4885a5c64e9007d39fa11313805290dd6342f9775f01a02ec88f6bee22f25a377a9b143abba1264586d2779088006d5f9be82b00f10287031623f73470264cc5897f18f357aad6deb3883da88ae2266664933785a3ce72bb224a441437ea93c217", 0xc0) add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x9a, 0xfffffffffffffffd) [ 345.250885][T13773] gfs2: not a GFS2 filesystem 18:44:40 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000300)={'syz_tun\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000002400)=@newlink={0x4c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r2}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @bridge_slave={{0x11, 0x1, 'bridge_slave\x00'}, {0x14, 0x5, 0x0, 0x1, [@IFLA_BRPORT_STATE={0x5}, @IFLA_BRPORT_COST={0x8, 0x3, 0x8}]}}}]}, 0x4c}}, 0x0) 18:44:40 executing program 0: setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, 0x0, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_EVENTS(0xffffffffffffffff, 0x84, 0xb, &(0x7f0000000040), 0x0) ioctl$DRM_IOCTL_RM_CTX(0xffffffffffffffff, 0xc0086421, &(0x7f0000000300)={0x0, 0x1}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB='lockproto=lock_no']) 18:44:40 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) sendfile(r0, 0xffffffffffffffff, 0x0, 0x0) add_key$user(&(0x7f0000000040)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)='X', 0x1, 0xfffffffffffffffe) keyctl$update(0x2, 0x0, &(0x7f00000006c0)="c0ca1cdbaa1aedbbed80dddaa28e15b9449e2e82cca4244c40ffd0fd4e6631c7d3d86e1339de17344340b02dd527f2d8b3ae6c1db3594e657da33c3ec668f143974a65753472df5319a6b83e1e86b8f2666c61a2e700d1c1e0ae1fc52494bd4885a5c64e9007d39fa11313805290dd6342f9775f01a02ec88f6bee22f25a377a9b143abba1264586d2779088006d5f9be82b00f10287031623f73470264cc5897f18f357aad6deb3883da88ae2266664933785a3ce72bb224a441437ea93c217", 0xc0) add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x9a, 0xfffffffffffffffd) [ 345.406840][T13790] hfs: unable to parse mount options 18:44:40 executing program 4: r0 = syz_open_dev$loop(&(0x7f0000000240)='/dev/loop#\x00', 0x0, 0x1100082) r1 = memfd_create(0x0, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) ioctl$LOOP_SET_CAPACITY(r0, 0x4c07) [ 345.456739][T13783] XFS (loop1): Invalid superblock magic number 18:44:40 executing program 5: statx(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x2000, 0x800, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0}) syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x9, 0x0, &(0x7f00000000c0), 0x200000, &(0x7f0000000240)={[{@part={'part', 0x3d, 0xa14}}, {@file_umask={'file_umask', 0x3d, 0x657936f8}}, {@type={'type', 0x3d, "6d6d69c8"}}], [{@fsmagic={'fsmagic', 0x3d, 0x6be0}}, {@obj_type={'obj_type', 0x3d, '@%\'em1\x00'}}, {@euid_lt={'euid<', r0}}, {@fsuuid={'fsuuid', 0x3d, {[0x32, 0x36, 0x65, 0x64, 0x36, 0x64, 0x39, 0x30], 0x2d, [0x66, 0x61, 0x65, 0x37], 0x2d, [0x64, 0x62, 0x64, 0x30], 0x2d, [0x36, 0x37, 0x64, 0x35], 0x2d, [0x61, 0x61, 0x31, 0x63, 0x5a, 0x38, 0x0, 0x36]}}}, {@dont_appraise='dont_appraise'}]}) r1 = openat$md(0xffffffffffffff9c, &(0x7f0000000080)='/dev/md0\x00', 0x0, 0x0) ioctl$BLKALIGNOFF(r1, 0x127a, &(0x7f00000000c0)) ioctl$BLKPG(r1, 0x40140921, 0x0) 18:44:40 executing program 2: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$TIOCL_SETSEL(r0, 0x541c, &(0x7f0000000100)) ioctl$TIOCL_SETSEL(r0, 0x541c, &(0x7f0000000100)={0x2, {0x2, 0x0, 0x0, 0x800}}) socket$inet6(0xa, 0x0, 0x0) 18:44:40 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x240900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = socket$inet6(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r2, 0x29, 0x40, &(0x7f0000000ac0)=@raw={'raw\x00', 0x3c1, 0x3, 0x2f0, 0x0, 0x130, 0x0, 0x130, 0x130, 0x220, 0x220, 0x220, 0x220, 0x220, 0x3, 0x0, {[{{@uncond, 0x0, 0x110, 0x130, 0x0, {}, [@common=@unspec=@connlimit={{0x40, 'connlimit\x00'}}, @common=@inet=@set2={{0x28, 'set\x00'}}]}, @unspec=@NOTRACK={0x20, 'NOTRACK\x00'}}, {{@uncond, 0x0, 0xa8, 0xf0}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'pptp\x00'}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x350) [ 345.597296][T13803] gfs2: not a GFS2 filesystem 18:44:40 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) sendfile(r0, 0xffffffffffffffff, 0x0, 0x0) add_key$user(&(0x7f0000000040)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)='X', 0x1, 0xfffffffffffffffe) keyctl$update(0x2, 0x0, &(0x7f00000006c0)="c0ca1cdbaa1aedbbed80dddaa28e15b9449e2e82cca4244c40ffd0fd4e6631c7d3d86e1339de17344340b02dd527f2d8b3ae6c1db3594e657da33c3ec668f143974a65753472df5319a6b83e1e86b8f2666c61a2e700d1c1e0ae1fc52494bd4885a5c64e9007d39fa11313805290dd6342f9775f01a02ec88f6bee22f25a377a9b143abba1264586d2779088006d5f9be82b00f10287031623f73470264cc5897f18f357aad6deb3883da88ae2266664933785a3ce72bb224a441437ea93c217", 0xc0) add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x9a, 0xfffffffffffffffd) 18:44:40 executing program 0: setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, 0x0, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_EVENTS(0xffffffffffffffff, 0x84, 0xb, &(0x7f0000000040), 0x0) ioctl$DRM_IOCTL_RM_CTX(0xffffffffffffffff, 0xc0086421, &(0x7f0000000300)={0x0, 0x1}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB='lockproto=lock_no']) [ 345.789976][T13817] hfs: unable to parse mount options [ 345.792584][T13830] Cannot find set identified by id 0 to match [ 345.911363][T13783] XFS (loop1): Invalid superblock magic number [ 345.966268][T13843] gfs2: not a GFS2 filesystem 18:44:41 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket(0x10, 0x80002, 0x0) bind$netlink(r1, &(0x7f0000177ff4)={0x10, 0x0, 0x1}, 0xc) write(r1, &(0x7f0000000140)="2600000022004701050000000000000005006d20002b1f000a4a51f1ee839cd53400b017ca5b", 0x26) connect$netlink(r1, &(0x7f00000014c0)=@proc={0x10, 0x0, 0x1}, 0xc) setsockopt$sock_int(r1, 0x1, 0x8, &(0x7f0000b4bffc), 0x4) sendto(r1, 0x0, 0x0, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f0000000780), 0x3ffffffffffff81, 0x2, 0x0) r2 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 18:44:41 executing program 4: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x2, 0x0) write$uinput_user_dev(r0, &(0x7f0000000d00)={'syz1\x00', {}, 0x41}, 0x45c) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket(0x200000000000011, 0x3, 0x0) r3 = dup3(r2, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$UI_DEV_SETUP(r0, 0x5501, 0x0) 18:44:41 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) sendfile(r0, 0xffffffffffffffff, 0x0, 0x0) r1 = add_key$user(&(0x7f0000000040)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)='X', 0x1, 0xfffffffffffffffe) keyctl$update(0x2, r1, 0x0, 0x0) add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x9a, 0xfffffffffffffffd) 18:44:41 executing program 5: statx(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x2000, 0x800, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0}) syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x9, 0x0, &(0x7f00000000c0), 0x200000, &(0x7f0000000240)={[{@part={'part', 0x3d, 0xa14}}, {@file_umask={'file_umask', 0x3d, 0x657936f8}}, {@type={'type', 0x3d, "6d6d69c8"}}], [{@fsmagic={'fsmagic', 0x3d, 0x6be0}}, {@obj_type={'obj_type', 0x3d, '@%\'em1\x00'}}, {@euid_lt={'euid<', r0}}, {@fsuuid={'fsuuid', 0x3d, {[0x32, 0x36, 0x65, 0x64, 0x36, 0x64, 0x39, 0x30], 0x2d, [0x66, 0x61, 0x65, 0x37], 0x2d, [0x64, 0x62, 0x64, 0x30], 0x2d, [0x36, 0x37, 0x64, 0x35], 0x2d, [0x61, 0x61, 0x31, 0x63, 0x5a, 0x38, 0x0, 0x36]}}}, {@dont_appraise='dont_appraise'}]}) r1 = openat$md(0xffffffffffffff9c, &(0x7f0000000080)='/dev/md0\x00', 0x0, 0x0) ioctl$BLKALIGNOFF(r1, 0x127a, &(0x7f00000000c0)) ioctl$BLKPG(r1, 0x40140921, 0x0) 18:44:41 executing program 2: mknod(&(0x7f0000000040)='./bus\x00', 0x40, 0x0) prctl$PR_SET_NO_NEW_PRIVS(0x26, 0x1) lsetxattr$security_capability(&(0x7f00000000c0)='./bus\x00', &(0x7f0000000100)='security.capability\x00', &(0x7f0000000140)=@v3, 0x18, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) 18:44:41 executing program 0: setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, 0x0, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_EVENTS(0xffffffffffffffff, 0x84, 0xb, &(0x7f0000000040), 0x0) ioctl$DRM_IOCTL_RM_CTX(0xffffffffffffffff, 0xc0086421, &(0x7f0000000300)={0x0, 0x1}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB='lockproto=lock_nolock,loc']) [ 346.328516][T13869] input: syz1 as /devices/virtual/input/input7 [ 346.373532][T13870] hfs: unable to parse mount options 18:44:41 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) sendfile(r0, 0xffffffffffffffff, 0x0, 0x0) r1 = add_key$user(&(0x7f0000000040)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)='X', 0x1, 0xfffffffffffffffe) keyctl$update(0x2, r1, 0x0, 0x0) add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x9a, 0xfffffffffffffffd) 18:44:41 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x61c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000400)=ANY=[@ANYBLOB="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"], 0x8) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x4}, 0x1c) r1 = syz_open_procfs(0x0, &(0x7f0000000880)='pagemap\x00') sendfile(r0, r1, 0x0, 0xa808) 18:44:41 executing program 5: statx(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x2000, 0x800, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0}) syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x9, 0x0, &(0x7f00000000c0), 0x200000, &(0x7f0000000240)={[{@part={'part', 0x3d, 0xa14}}, {@file_umask={'file_umask', 0x3d, 0x657936f8}}, {@type={'type', 0x3d, "6d6d69c8"}}], [{@fsmagic={'fsmagic', 0x3d, 0x6be0}}, {@obj_type={'obj_type', 0x3d, '@%\'em1\x00'}}, {@euid_lt={'euid<', r0}}, {@fsuuid={'fsuuid', 0x3d, {[0x32, 0x36, 0x65, 0x64, 0x36, 0x64, 0x39, 0x30], 0x2d, [0x66, 0x61, 0x65, 0x37], 0x2d, [0x64, 0x62, 0x64, 0x30], 0x2d, [0x36, 0x37, 0x64, 0x35], 0x2d, [0x61, 0x61, 0x31, 0x63, 0x5a, 0x0, 0x63, 0x36]}}}, {@dont_appraise='dont_appraise'}]}) r1 = openat$md(0xffffffffffffff9c, &(0x7f0000000080)='/dev/md0\x00', 0x0, 0x0) ioctl$BLKALIGNOFF(r1, 0x127a, &(0x7f00000000c0)) ioctl$BLKPG(r1, 0x40140921, 0x0) [ 346.509253][T13891] input: syz1 as /devices/virtual/input/input8 [ 346.525343][T13868] gfs2: Unknown parameter 'loc' 18:44:41 executing program 0: setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, 0x0, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_EVENTS(0xffffffffffffffff, 0x84, 0xb, &(0x7f0000000040), 0x0) ioctl$DRM_IOCTL_RM_CTX(0xffffffffffffffff, 0xc0086421, &(0x7f0000000300)={0x0, 0x1}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB='lockproto=lock_nolock,loc']) 18:44:41 executing program 4: r0 = epoll_create1(0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) sendto$inet(r1, 0x0, 0x0, 0x20000000, &(0x7f0000000080), 0x10) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f0000000000)) 18:44:41 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) sendfile(r0, 0xffffffffffffffff, 0x0, 0x0) r1 = add_key$user(&(0x7f0000000040)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)='X', 0x1, 0xfffffffffffffffe) keyctl$update(0x2, r1, 0x0, 0x0) add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x9a, 0xfffffffffffffffd) [ 346.785954][T13909] hfs: unable to parse mount options [ 346.981394][T13916] gfs2: Unknown parameter 'loc' 18:44:45 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/ip_vs\x00') r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x8000000000006, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) ioctl(r2, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") sendfile(r1, r0, 0x0, 0x7ffff000) 18:44:45 executing program 5: statx(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x2000, 0x800, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0}) syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x9, 0x0, &(0x7f00000000c0), 0x200000, &(0x7f0000000240)={[{@part={'part', 0x3d, 0xa14}}, {@file_umask={'file_umask', 0x3d, 0x657936f8}}, {@type={'type', 0x3d, "6d6d69c8"}}], [{@fsmagic={'fsmagic', 0x3d, 0x6be0}}, {@obj_type={'obj_type', 0x3d, '@%\'em1\x00'}}, {@euid_lt={'euid<', r0}}, {@fsuuid={'fsuuid', 0x3d, {[0x32, 0x36, 0x65, 0x64, 0x36, 0x64, 0x39, 0x30], 0x2d, [0x66, 0x61, 0x65, 0x37], 0x2d, [0x64, 0x62, 0x64, 0x30], 0x2d, [0x36, 0x37, 0x64, 0x35], 0x2d, [0x61, 0x61, 0x31, 0x63, 0x5a, 0x0, 0x63, 0x36]}}}, {@dont_appraise='dont_appraise'}]}) r1 = openat$md(0xffffffffffffff9c, &(0x7f0000000080)='/dev/md0\x00', 0x0, 0x0) ioctl$BLKALIGNOFF(r1, 0x127a, &(0x7f00000000c0)) ioctl$BLKPG(r1, 0x40140921, 0x0) 18:44:45 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x61c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000400)=ANY=[@ANYBLOB="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"], 0x8) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x4}, 0x1c) r1 = syz_open_procfs(0x0, &(0x7f0000000880)='pagemap\x00') sendfile(r0, r1, 0x0, 0xa808) 18:44:45 executing program 4: r0 = socket$inet6(0xa, 0x3, 0x3e) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendmsg(r0, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0xc100) sendmsg(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000140)="b1", 0x1}], 0x1}, 0x8000) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000340), 0x41395527) setsockopt$inet6_int(r0, 0x29, 0x7, &(0x7f0000000000), 0x244) sendto$inet6(r0, &(0x7f0000000280)='P', 0x1, 0x0, 0x0, 0x0) 18:44:45 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) sendfile(r0, 0xffffffffffffffff, 0x0, 0x0) r1 = add_key$user(&(0x7f0000000040)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)='X', 0x1, 0xfffffffffffffffe) keyctl$update(0x2, r1, &(0x7f00000006c0), 0x0) add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x9a, 0xfffffffffffffffd) 18:44:45 executing program 0: setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, 0x0, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_EVENTS(0xffffffffffffffff, 0x84, 0xb, &(0x7f0000000040), 0x0) ioctl$DRM_IOCTL_RM_CTX(0xffffffffffffffff, 0xc0086421, &(0x7f0000000300)={0x0, 0x1}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB='lockproto=lock_nolock,loc']) 18:44:45 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) sendfile(r0, 0xffffffffffffffff, 0x0, 0x0) r1 = add_key$user(&(0x7f0000000040)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)='X', 0x1, 0xfffffffffffffffe) keyctl$update(0x2, r1, &(0x7f00000006c0), 0x0) add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x9a, 0xfffffffffffffffd) 18:44:45 executing program 2: r0 = socket$inet(0x2, 0x4000000805, 0x0) r1 = socket$inet_sctp(0x2, 0x5, 0x84) r2 = dup3(r0, r1, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, &(0x7f0000000240)=[@in={0x2, 0x4e20, @loopback}], 0x10) sendto$inet(r2, &(0x7f0000fa3fff)='\t', 0x1, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) sendto$inet(r1, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r1, 0x84, 0x1d, &(0x7f000025e000)={0x2, [0x0, 0x0]}, &(0x7f0000a8a000)=0xc) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r2, 0x84, 0x6c, &(0x7f000059aff8)={r3}, &(0x7f0000000100)=0x8) [ 350.468279][T13981] hfs: unable to parse mount options 18:44:45 executing program 2: r0 = syz_open_dev$dri(&(0x7f0000000100)='/dev/dri/card#\x00', 0x1, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000300)='./cgroup.net/syz0\x00', 0x1ff) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$DRM_IOCTL_MODE_GETPLANERESOURCES(r0, 0xc01064b5, &(0x7f00000001c0)={&(0x7f00000000c0)=[0x0, 0x0, 0x0, 0x0], 0x4}) r2 = socket(0x800000010, 0x1000000002, 0x0) sendmmsg$alg(r2, &(0x7f0000000140)=[{0x2, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000100)}], 0x492492492492601, 0x0) r3 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0) ioctl$KVM_GET_SUPPORTED_CPUID(r3, 0xc008ae05, &(0x7f0000000340)=""/236) getpeername$netlink(r2, &(0x7f0000000280), &(0x7f00000002c0)=0xc) r4 = dup(r1) r5 = syz_open_dev$audion(&(0x7f0000000040)='/dev/audio#\x00', 0x80, 0x80) ioctl$RTC_PLL_GET(r5, 0x80207011, &(0x7f0000000080)) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8f03b3ba2e08359, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x21, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PIO_UNIMAPCLR(r5, 0x4b68, &(0x7f0000000240)={0xcf, 0xffe0, 0x1}) ioctl(r0, 0xfffffbfffff3ffa7, &(0x7f0000000140)) setsockopt$CAN_RAW_RECV_OWN_MSGS(r5, 0x65, 0x4, &(0x7f0000000200), 0x4) 18:44:45 executing program 5: statx(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x2000, 0x800, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0}) syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x9, 0x0, &(0x7f00000000c0), 0x200000, &(0x7f0000000240)={[{@part={'part', 0x3d, 0xa14}}, {@file_umask={'file_umask', 0x3d, 0x657936f8}}, {@type={'type', 0x3d, "6d6d69c8"}}], [{@fsmagic={'fsmagic', 0x3d, 0x6be0}}, {@obj_type={'obj_type', 0x3d, '@%\'em1\x00'}}, {@euid_lt={'euid<', r0}}, {@fsuuid={'fsuuid', 0x3d, {[0x32, 0x36, 0x65, 0x64, 0x36, 0x64, 0x39, 0x30], 0x2d, [0x66, 0x61, 0x65, 0x37], 0x2d, [0x64, 0x62, 0x64, 0x30], 0x2d, [0x36, 0x37, 0x64, 0x35], 0x2d, [0x61, 0x61, 0x31, 0x63, 0x5a, 0x0, 0x63, 0x36]}}}, {@dont_appraise='dont_appraise'}]}) r1 = openat$md(0xffffffffffffff9c, &(0x7f0000000080)='/dev/md0\x00', 0x0, 0x0) ioctl$BLKALIGNOFF(r1, 0x127a, &(0x7f00000000c0)) ioctl$BLKPG(r1, 0x40140921, 0x0) [ 350.531667][T13979] gfs2: Unknown parameter 'loc' 18:44:45 executing program 1: syz_emit_ethernet(0x6e, &(0x7f0000000000)={@broadcast, @broadcast, @void, {@ipv6={0x86dd, @icmpv6={0x0, 0x6, "a5f008", 0x38, 0x3a, 0x0, @local={0xfe, 0x80, [0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd, 0x0, 0xff]}, @mcast2, {[], @pkt_toobig={0x2, 0x0, 0x0, 0x0, {0x0, 0x6, "47c0e4", 0x0, 0x2f, 0x0, @rand_addr="554195c44d9b82f4eda8d9598700ac25", @local, [@routing]}}}}}}}, 0x0) 18:44:45 executing program 0: setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, 0x0, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_EVENTS(0xffffffffffffffff, 0x84, 0xb, &(0x7f0000000040), 0x0) ioctl$DRM_IOCTL_RM_CTX(0xffffffffffffffff, 0xc0086421, &(0x7f0000000300)={0x0, 0x1}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB='lockproto=lock_nolock,locktab']) 18:44:45 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) sendfile(r0, 0xffffffffffffffff, 0x0, 0x0) r1 = add_key$user(&(0x7f0000000040)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)='X', 0x1, 0xfffffffffffffffe) keyctl$update(0x2, r1, &(0x7f00000006c0), 0x0) add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x9a, 0xfffffffffffffffd) 18:44:45 executing program 1: r0 = socket$inet(0x2, 0x4000000805, 0x0) r1 = socket$inet_sctp(0x2, 0x5, 0x84) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = dup(r2) r4 = dup3(r0, r3, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, &(0x7f0000000240)=[@in={0x2, 0x4e20, @loopback}], 0x10) sendto$inet(r1, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r1, 0x84, 0x1d, &(0x7f000025e000)={0x1, [0x0]}, &(0x7f0000a8a000)=0x8) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r4, 0x84, 0x9, &(0x7f000059aff8)={r5}, &(0x7f000034f000)=0x2059b000) [ 350.745637][T14002] hfs: unable to parse mount options 18:44:45 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) sendfile(r0, 0xffffffffffffffff, 0x0, 0x0) r1 = add_key$user(&(0x7f0000000040)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)='X', 0x1, 0xfffffffffffffffe) keyctl$update(0x2, r1, &(0x7f00000006c0)="c0ca1cdbaa1aedbbed80dddaa28e15b9449e2e82cca4244c40ffd0fd4e6631c7d3d86e1339de17344340b02dd527f2d8b3ae6c1db3594e657da33c3ec668f143974a65753472df5319a6b83e1e86b8f2666c61a2e700d1c1e0ae1fc52494bd48", 0x60) add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x9a, 0xfffffffffffffffd) [ 350.868182][T14009] gfs2: Unknown parameter 'locktab' 18:44:46 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r3, 0xae60) dup3(r3, r1, 0x0) ioctl$KVM_SET_IRQCHIP(r3, 0x8208ae63, &(0x7f0000000700)={0x1, 0x0, @pic={0x0, 0x9, 0x0, 0x7f}}) ioctl$KVM_IRQ_LINE(r1, 0x4008ae61, &(0x7f00000000c0)={0x0, 0xffff0000}) 18:44:46 executing program 2: syz_emit_ethernet(0x126, &(0x7f0000000000)={@broadcast, @broadcast, @void, {@ipv6={0x86dd, @icmpv6={0x0, 0x6, "a5f008", 0xf0, 0x3a, 0x0, @local={0xfe, 0x80, [0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd, 0x0, 0xff]}, @mcast2, {[], @pkt_toobig={0x2, 0x0, 0x0, 0x0, {0x1, 0x6, "47c0e4", 0x200, 0x2f, 0x0, @rand_addr="554195c44d9b82f4eda8d9598700ac25", @local, [@routing={0x2e, 0x0, 0x1}, @routing={0x2c, 0x2, 0x2, 0x0, 0x0, [@initdev={0xfe, 0x88, [], 0x1, 0x0}]}, @routing={0x0, 0xc, 0x2, 0x0, 0x0, [@loopback, @remote, @local, @dev={0xfe, 0x80, [], 0x35}, @loopback, @empty]}, @srh={0x2, 0x6, 0x4, 0x3, 0x2, 0x90, 0xffff, [@remote, @remote, @mcast2]}]}}}}}}}, 0x0) 18:44:46 executing program 5: statx(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x2000, 0x800, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0}) syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x9, 0x0, &(0x7f00000000c0), 0x200000, &(0x7f0000000240)={[{@part={'part', 0x3d, 0xa14}}, {@file_umask={'file_umask', 0x3d, 0x657936f8}}, {@type={'type', 0x3d, "6d6d69c8"}}], [{@fsmagic={'fsmagic', 0x3d, 0x6be0}}, {@obj_type={'obj_type', 0x3d, '@%\'em1\x00'}}, {@euid_lt={'euid<', r0}}, {@fsuuid={'fsuuid', 0x3d, {[0x32, 0x36, 0x65, 0x64, 0x36, 0x64, 0x39, 0x30], 0x2d, [0x66, 0x61, 0x65, 0x37], 0x2d, [0x64, 0x62, 0x64, 0x30], 0x2d, [0x36, 0x37, 0x64, 0x35], 0x2d, [0x61, 0x61, 0x31, 0x63, 0x0, 0x38, 0x63, 0x36]}}}, {@dont_appraise='dont_appraise'}]}) r1 = openat$md(0xffffffffffffff9c, &(0x7f0000000080)='/dev/md0\x00', 0x0, 0x0) ioctl$BLKALIGNOFF(r1, 0x127a, &(0x7f00000000c0)) ioctl$BLKPG(r1, 0x40140921, 0x0) 18:44:46 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) sendfile(r0, 0xffffffffffffffff, 0x0, 0x0) r1 = add_key$user(&(0x7f0000000040)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)='X', 0x1, 0xfffffffffffffffe) keyctl$update(0x2, r1, &(0x7f00000006c0)="c0ca1cdbaa1aedbbed80dddaa28e15b9449e2e82cca4244c40ffd0fd4e6631c7d3d86e1339de17344340b02dd527f2d8b3ae6c1db3594e657da33c3ec668f143974a65753472df5319a6b83e1e86b8f2666c61a2e700d1c1e0ae1fc52494bd48", 0x60) add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x9a, 0xfffffffffffffffd) 18:44:46 executing program 0: setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, 0x0, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_EVENTS(0xffffffffffffffff, 0x84, 0xb, &(0x7f0000000040), 0x0) ioctl$DRM_IOCTL_RM_CTX(0xffffffffffffffff, 0xc0086421, &(0x7f0000000300)={0x0, 0x1}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB='lockproto=lock_nolock,locktab']) 18:44:46 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000080)='vegas\x00', 0x6) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e20, @broadcast}, 0x10) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000380)) sendto$inet(r0, &(0x7f0000000200), 0xfffffffffffffeb4, 0x20008011, &(0x7f0000db4ff0)={0x2, 0x4e20, @loopback=0xac14140d}, 0x10) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = dup2(r2, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) syz_genetlink_get_family_id$batadv(0x0) socket$inet6_tcp(0xa, 0x1, 0x0) recvfrom(r0, &(0x7f0000000100)=""/94, 0xffffffffffffff5e, 0x0, 0x0, 0x0) [ 351.397694][T14041] hfs: unable to parse mount options 18:44:46 executing program 2: syz_emit_ethernet(0x126, &(0x7f0000000000)={@broadcast, @broadcast, @void, {@ipv6={0x86dd, @icmpv6={0x0, 0x6, "a5f008", 0xf0, 0x3a, 0x0, @local={0xfe, 0x80, [0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd, 0x0, 0xff]}, @mcast2, {[], @pkt_toobig={0x2, 0x0, 0x0, 0x0, {0x1, 0x6, "47c0e4", 0x200, 0x2f, 0x0, @rand_addr="554195c44d9b82f4eda8d9598700ac25", @local, [@routing={0x2e, 0x0, 0x1}, @routing={0x2c, 0x2, 0x2, 0x0, 0x0, [@initdev={0xfe, 0x88, [], 0x1, 0x0}]}, @routing={0x0, 0xc, 0x2, 0x0, 0x0, [@loopback, @remote, @local, @dev={0xfe, 0x80, [], 0x35}, @loopback, @empty]}, @srh={0x2, 0x6, 0x4, 0x3, 0x2, 0x90, 0xffff, [@remote, @remote, @mcast2]}]}}}}}}}, 0x0) [ 351.422113][T14033] gfs2: Unknown parameter 'locktab' 18:44:46 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) sendfile(r0, 0xffffffffffffffff, 0x0, 0x0) r1 = add_key$user(&(0x7f0000000040)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)='X', 0x1, 0xfffffffffffffffe) keyctl$update(0x2, r1, &(0x7f00000006c0)="c0ca1cdbaa1aedbbed80dddaa28e15b9449e2e82cca4244c40ffd0fd4e6631c7d3d86e1339de17344340b02dd527f2d8b3ae6c1db3594e657da33c3ec668f143974a65753472df5319a6b83e1e86b8f2666c61a2e700d1c1e0ae1fc52494bd48", 0x60) add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x9a, 0xfffffffffffffffd) 18:44:46 executing program 0: setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, 0x0, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_EVENTS(0xffffffffffffffff, 0x84, 0xb, &(0x7f0000000040), 0x0) ioctl$DRM_IOCTL_RM_CTX(0xffffffffffffffff, 0xc0086421, &(0x7f0000000300)={0x0, 0x1}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB='lockproto=lock_nolock,locktab']) 18:44:46 executing program 4: r0 = socket$inet(0x2, 0x2, 0x0) connect$inet(r0, &(0x7f00000002c0)={0x2, 0x4e20, @loopback}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) 18:44:46 executing program 5: statx(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x2000, 0x800, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0}) syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x9, 0x0, &(0x7f00000000c0), 0x200000, &(0x7f0000000240)={[{@part={'part', 0x3d, 0xa14}}, {@file_umask={'file_umask', 0x3d, 0x657936f8}}, {@type={'type', 0x3d, "6d6d69c8"}}], [{@fsmagic={'fsmagic', 0x3d, 0x6be0}}, {@obj_type={'obj_type', 0x3d, '@%\'em1\x00'}}, {@euid_lt={'euid<', r0}}, {@fsuuid={'fsuuid', 0x3d, {[0x32, 0x36, 0x65, 0x64, 0x36, 0x64, 0x39, 0x30], 0x2d, [0x66, 0x61, 0x65, 0x37], 0x2d, [0x64, 0x62, 0x64, 0x30], 0x2d, [0x36, 0x37, 0x64, 0x35], 0x2d, [0x61, 0x61, 0x31, 0x63, 0x0, 0x38, 0x63, 0x36]}}}, {@dont_appraise='dont_appraise'}]}) r1 = openat$md(0xffffffffffffff9c, &(0x7f0000000080)='/dev/md0\x00', 0x0, 0x0) ioctl$BLKALIGNOFF(r1, 0x127a, &(0x7f00000000c0)) ioctl$BLKPG(r1, 0x40140921, 0x0) 18:44:46 executing program 2: clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f0000000000)=ANY=[@ANYBLOB="66696c74657200000000000000000000000000000000000076bc108c89c900040000000000000e00000000000000b80400006802190000000000780100007801000068020000e8030000e8030000e8030000e8030000e8"], 0x1) 18:44:46 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) sendfile(r0, 0xffffffffffffffff, 0x0, 0x0) r1 = add_key$user(&(0x7f0000000040)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)='X', 0x1, 0xfffffffffffffffe) keyctl$update(0x2, r1, &(0x7f00000006c0)="c0ca1cdbaa1aedbbed80dddaa28e15b9449e2e82cca4244c40ffd0fd4e6631c7d3d86e1339de17344340b02dd527f2d8b3ae6c1db3594e657da33c3ec668f143974a65753472df5319a6b83e1e86b8f2666c61a2e700d1c1e0ae1fc52494bd4885a5c64e9007d39fa11313805290dd6342f9775f01a02ec88f6bee22f25a377a9b143abba1264586d2779088006d5f9b", 0x90) add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x9a, 0xfffffffffffffffd) 18:44:46 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r3, 0xae60) dup3(r3, r1, 0x0) ioctl$KVM_SET_IRQCHIP(r3, 0x8208ae63, &(0x7f0000000700)={0x0, 0x0, @ioapic={0x1, 0x0, 0x0, 0x0, 0x0, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0, 0x0, [], 0x3}, {}, {}, {0x1f}, {}, {}, {}, {}, {}, {0x96}]}}) ioctl$KVM_IRQ_LINE(r1, 0x4008ae61, &(0x7f00000000c0)={0x0, 0xffff0000}) 18:44:46 executing program 2: perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7fffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r0, &(0x7f00000001c0)=ANY=[@ANYRES16], 0xffba) [ 351.713449][T14073] hfs: unable to parse mount options [ 351.725657][T14069] gfs2: Unknown parameter 'locktab' 18:44:46 executing program 0: setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, 0x0, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_EVENTS(0xffffffffffffffff, 0x84, 0xb, &(0x7f0000000040), 0x0) ioctl$DRM_IOCTL_RM_CTX(0xffffffffffffffff, 0xc0086421, &(0x7f0000000300)={0x0, 0x1}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB='lockproto=lock_nolock,locktable']) 18:44:46 executing program 5: statx(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x2000, 0x800, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0}) syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x9, 0x0, &(0x7f00000000c0), 0x200000, &(0x7f0000000240)={[{@part={'part', 0x3d, 0xa14}}, {@file_umask={'file_umask', 0x3d, 0x657936f8}}, {@type={'type', 0x3d, "6d6d69c8"}}], [{@fsmagic={'fsmagic', 0x3d, 0x6be0}}, {@obj_type={'obj_type', 0x3d, '@%\'em1\x00'}}, {@euid_lt={'euid<', r0}}, {@fsuuid={'fsuuid', 0x3d, {[0x32, 0x36, 0x65, 0x64, 0x36, 0x64, 0x39, 0x30], 0x2d, [0x66, 0x61, 0x65, 0x37], 0x2d, [0x64, 0x62, 0x64, 0x30], 0x2d, [0x36, 0x37, 0x64, 0x35], 0x2d, [0x61, 0x61, 0x31, 0x63, 0x0, 0x38, 0x63, 0x36]}}}, {@dont_appraise='dont_appraise'}]}) r1 = openat$md(0xffffffffffffff9c, &(0x7f0000000080)='/dev/md0\x00', 0x0, 0x0) ioctl$BLKALIGNOFF(r1, 0x127a, &(0x7f00000000c0)) ioctl$BLKPG(r1, 0x40140921, 0x0) [ 352.061257][T14114] hfs: unable to parse mount options 18:44:47 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r3, 0xae60) dup3(r3, r1, 0x0) ioctl$KVM_SET_IRQCHIP(r3, 0x8208ae63, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x3}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) timerfd_create(0x0, 0x0) ioctl$KVM_SET_IRQCHIP(0xffffffffffffffff, 0x8208ae63, &(0x7f0000000240)={0x0, 0x0, @ioapic={0x2, 0x0, 0x1e4, 0x6, 0x0, [{0x8, 0x2, 0x80, [], 0x80}, {0x3, 0xbc, 0x0, [], 0x7}, {0x0, 0x1f, 0x0, [], 0x3}, {0x0, 0x7f}, {0xe1, 0xff, 0x8, [], 0x2}, {0x0, 0x1f, 0x5}, {0x0, 0xff}, {0x7, 0x0, 0x7f, [], 0x5}, {0x1, 0x0, 0x1, [], 0x2}, {0x0, 0x5, 0x40}, {0x80, 0x6, 0xdc}, {0xff, 0x0, 0x6, [], 0x8}, {0x63, 0x81, 0x13, [], 0x9}, {0x6, 0xa0, 0x0, [], 0xee}, {0x8, 0x1f}, {0x3f, 0x2, 0x1f, [], 0xa4}, {0x0, 0x6f, 0x3}, {0x3, 0x5}, {0x0, 0x2, 0x9f, [], 0xa1}, {0xca, 0xba, 0x2, [], 0x80}, {0x81, 0x0, 0x1f, [], 0x2}, {0x7f, 0x4, 0xff}, {0x1, 0x0, 0xc0, [], 0x2}, {0x8f, 0x13}]}}) ioctl$KVM_IRQ_LINE(r1, 0x4008ae61, &(0x7f00000000c0)) 18:44:47 executing program 4: socket$packet(0x11, 0xa, 0x300) syz_emit_ethernet(0x66, &(0x7f00000003c0)={@local, @remote, @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x0, 0x0, 0x58, 0x0, 0x0, 0x0, 0x2f, 0x0, @dev, @initdev={0xac, 0x1e, 0x0, 0x0}}, {{0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x6558}}}}}}, 0x0) 18:44:47 executing program 2: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f00000003c0)=@raw={'raw\x00', 0x3c1, 0x3, 0x328, 0x17c, 0x17c, 0x17c, 0x4803, 0x5, 0x260, 0x260, 0x260, 0x260, 0x260, 0x3, 0x0, {[{{@uncond=[0x0, 0x1d, 0x3, 0x0, 0x0, 0x0, 0x98, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6], 0x0, 0x114, 0x17c, 0x52020000, {}, [@common=@unspec=@connbytes={{0x70, 'connbytes\x00'}}, @common=@unspec=@statistic={{0x38, 'statistic\x00'}}]}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'netbios-ns\x00', 'syz1\x00'}}}, {{@uncond=[0xff], 0x0, 0xa4, 0xe4}, @common=@inet=@TCPOPTSTRIP={0x40, 'TCPOPTSTRIP\x00'}}], {{[], 0x0, 0xa4, 0xc8}, {0x24}}}}, 0x384) 18:44:47 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) sendfile(r0, 0xffffffffffffffff, 0x0, 0x0) r1 = add_key$user(&(0x7f0000000040)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)='X', 0x1, 0xfffffffffffffffe) keyctl$update(0x2, r1, &(0x7f00000006c0)="c0ca1cdbaa1aedbbed80dddaa28e15b9449e2e82cca4244c40ffd0fd4e6631c7d3d86e1339de17344340b02dd527f2d8b3ae6c1db3594e657da33c3ec668f143974a65753472df5319a6b83e1e86b8f2666c61a2e700d1c1e0ae1fc52494bd4885a5c64e9007d39fa11313805290dd6342f9775f01a02ec88f6bee22f25a377a9b143abba1264586d2779088006d5f9b", 0x90) add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x9a, 0xfffffffffffffffd) 18:44:47 executing program 5: statx(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x2000, 0x800, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0}) syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x9, 0x0, &(0x7f00000000c0), 0x200000, &(0x7f0000000240)={[{@part={'part', 0x3d, 0xa14}}, {@file_umask={'file_umask', 0x3d, 0x657936f8}}, {@type={'type', 0x3d, "6d6d69c8"}}], [{@fsmagic={'fsmagic', 0x3d, 0x6be0}}, {@obj_type={'obj_type', 0x3d, '@%\'em1\x00'}}, {@euid_lt={'euid<', r0}}, {@fsuuid={'fsuuid', 0x3d, {[0x32, 0x36, 0x65, 0x64, 0x36, 0x64, 0x39, 0x30], 0x2d, [0x66, 0x61, 0x65, 0x37], 0x2d, [0x64, 0x62, 0x64, 0x30], 0x2d, [0x36, 0x37, 0x64, 0x35], 0x2d, [0x61, 0x61, 0x31, 0x0, 0x5a, 0x38, 0x63, 0x36]}}}, {@dont_appraise='dont_appraise'}]}) r1 = openat$md(0xffffffffffffff9c, &(0x7f0000000080)='/dev/md0\x00', 0x0, 0x0) ioctl$BLKALIGNOFF(r1, 0x127a, &(0x7f00000000c0)) ioctl$BLKPG(r1, 0x40140921, 0x0) [ 352.147316][T14106] gfs2: Bad value for 'locktable' 18:44:47 executing program 0: setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, 0x0, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_EVENTS(0xffffffffffffffff, 0x84, 0xb, &(0x7f0000000040), 0x0) ioctl$DRM_IOCTL_RM_CTX(0xffffffffffffffff, 0xc0086421, &(0x7f0000000300)={0x0, 0x1}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB='lockproto=lock_nolock,locktable']) [ 352.328803][T14132] hfs: unable to parse mount options 18:44:47 executing program 4: clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_inet_SIOCGIFBRDADDR(r1, 0x8919, &(0x7f0000000000)={'ip6tnl0\x00', {0x2, 0x0, @loopback}}) tkill(r0, 0xb) ptrace$setopts(0x4206, r0, 0x0, 0x0) wait4(0x0, 0x0, 0x0, 0x0) 18:44:47 executing program 5: statx(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x2000, 0x800, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0}) syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x9, 0x0, &(0x7f00000000c0), 0x200000, &(0x7f0000000240)={[{@part={'part', 0x3d, 0xa14}}, {@file_umask={'file_umask', 0x3d, 0x657936f8}}, {@type={'type', 0x3d, "6d6d69c8"}}], [{@fsmagic={'fsmagic', 0x3d, 0x6be0}}, {@obj_type={'obj_type', 0x3d, '@%\'em1\x00'}}, {@euid_lt={'euid<', r0}}, {@fsuuid={'fsuuid', 0x3d, {[0x32, 0x36, 0x65, 0x64, 0x36, 0x64, 0x39, 0x30], 0x2d, [0x66, 0x61, 0x65, 0x37], 0x2d, [0x64, 0x62, 0x64, 0x30], 0x2d, [0x36, 0x37, 0x64, 0x35], 0x2d, [0x61, 0x61, 0x31, 0x0, 0x5a, 0x38, 0x63, 0x36]}}}, {@dont_appraise='dont_appraise'}]}) r1 = openat$md(0xffffffffffffff9c, &(0x7f0000000080)='/dev/md0\x00', 0x0, 0x0) ioctl$BLKALIGNOFF(r1, 0x127a, &(0x7f00000000c0)) ioctl$BLKPG(r1, 0x40140921, 0x0) 18:44:47 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) sendfile(r0, 0xffffffffffffffff, 0x0, 0x0) r1 = add_key$user(&(0x7f0000000040)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)='X', 0x1, 0xfffffffffffffffe) keyctl$update(0x2, r1, &(0x7f00000006c0)="c0ca1cdbaa1aedbbed80dddaa28e15b9449e2e82cca4244c40ffd0fd4e6631c7d3d86e1339de17344340b02dd527f2d8b3ae6c1db3594e657da33c3ec668f143974a65753472df5319a6b83e1e86b8f2666c61a2e700d1c1e0ae1fc52494bd4885a5c64e9007d39fa11313805290dd6342f9775f01a02ec88f6bee22f25a377a9b143abba1264586d2779088006d5f9b", 0x90) add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x9a, 0xfffffffffffffffd) 18:44:47 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r3, 0xae60) dup3(r3, r1, 0x0) ioctl$KVM_SET_IRQCHIP(0xffffffffffffffff, 0x8208ae63, &(0x7f0000000700)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1, 0x3}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) timerfd_create(0x2, 0x0) ioctl$KVM_SET_IRQCHIP(0xffffffffffffffff, 0x8208ae63, &(0x7f0000000240)={0x2, 0x0, @ioapic={0x0, 0x0, 0x1e4, 0x0, 0x0, [{0x8, 0x2, 0x80, [], 0x80}, {0x3, 0xbc, 0x2}, {0x3, 0x0, 0x0, [], 0x3}, {}, {0xe1, 0x0, 0x8, [], 0x2}, {0x0, 0x1f, 0x5}, {0x35, 0xff}, {0x0, 0xa0}, {0x1, 0x9, 0x0, [], 0x2}, {0x0, 0x5, 0x40, [], 0x17}, {0x80, 0x6, 0xdc}, {0x0, 0x0, 0x0, [], 0x8}, {0x0, 0x81, 0x13}, {}, {0x0, 0x1f}, {0x0, 0x2, 0x1f}, {0x0, 0x0, 0x3}, {}, {}, {0x0, 0xba}, {0x81, 0x5, 0x1f}, {0x7f, 0x0, 0xff}, {0x1}, {0x0, 0x0, 0x6, [], 0x1}]}}) ioctl$KVM_IRQ_LINE(r1, 0x4008ae61, &(0x7f00000000c0)) [ 352.439983][T14138] gfs2: Bad value for 'locktable' 18:44:47 executing program 0: setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, 0x0, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_EVENTS(0xffffffffffffffff, 0x84, 0xb, &(0x7f0000000040), 0x0) ioctl$DRM_IOCTL_RM_CTX(0xffffffffffffffff, 0xc0086421, &(0x7f0000000300)={0x0, 0x1}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB='lockproto=lock_nolock,locktable']) 18:44:47 executing program 4: syz_mount_image$ext4(&(0x7f0000000140)='ext3\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000000c0)="25bca274769e620a2734fa0095e0612687ecb86a548802a902000000000000004e2f98b579a782d270146d0e0206e73ba8c63cd7dcc6760253ef", 0x3a, 0x400}], 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB='dioread_nolock']) 18:44:47 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r0, &(0x7f00000003c0)={0x2, 0x4e23, @broadcast}, 0x61) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) writev(r0, &(0x7f00000004c0)=[{&(0x7f00000008c0)="0a99b3e3930870dcd4c6d68e6abe088a5accdbe6dc85ed63bcee4834cd53f8a19cfad53574230c17377b8f0c69b09d01000000cf550f05d219f9c6ca195d3b4e29f3230cdd08cd5f1c946bee78e546d580a203030f47d70c95a97fe501000000ffffffff8ef5e2f7ee4f47c1a036e37e87414e615396eeb918828e0000000000003b9bd6b7f46843cd7400000000000000000000da4150cc06507aca4a15ec5bf48efd96e80a2e03ae10c1121d40311509db5b21f3694c4823f7d8b6cab1156cf3a6e5178587f78bdf8d2b17d8e2ac357cce3c1a78ac1acbc9ad2f62068db51337e68ba4860d8e9146f7cdaccafeb0319f1519793da30956cb27e3b9e805f34ce953b1ffc09662fba750bc6cd4cc82dfbb3a09b935528e4de7169e3a1706af3c6af5332aaaf76430d0dc979df4c6b90747d460d545f6208e75ad5ad2fe7b71ea361a0424bd48cf8406809c5d929969c248cf772118c3fd0c409e3414665dbec6d297f8da0206ade88d3176ef4d09d865aa0be1d2b33622e44ff453a198", 0x17d}], 0x1) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000100)='bbr\x00', 0x4) write$binfmt_script(r0, &(0x7f0000000a40)=ANY=[@ANYBLOB="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", @ANYRESOCT], 0x1a0) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000140)=0xda6, 0x4) recvmmsg(r0, &(0x7f0000005980)=[{{0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000200)=""/231, 0xe7}], 0x1}}], 0x1, 0x40000100, 0x0) sendto$inet(r0, &(0x7f00000012c0)="1e268a927f1f6588b967481241ba7860005cf65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95425a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0xfe6a, 0x11, 0x0, 0x27) [ 352.620560][T14167] hfs: unable to parse mount options 18:44:47 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r3, 0xae60) dup3(r3, r1, 0x0) ioctl$KVM_SET_IRQCHIP(0xffffffffffffffff, 0x8208ae63, &(0x7f0000000700)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1, 0x3}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) timerfd_create(0x2, 0x0) ioctl$KVM_SET_IRQCHIP(0xffffffffffffffff, 0x8208ae63, &(0x7f0000000240)={0x2, 0x0, @ioapic={0x0, 0x0, 0x1e4, 0x0, 0x0, [{0x8, 0x2, 0x80, [], 0x80}, {0x3, 0xbc, 0x2}, {0x3, 0x0, 0x0, [], 0x3}, {}, {0xe1, 0x0, 0x8, [], 0x2}, {0x0, 0x1f, 0x5}, {0x35, 0xff}, {0x0, 0xa0}, {0x1, 0x9, 0x0, [], 0x2}, {0x0, 0x5, 0x40, [], 0x17}, {0x80, 0x6, 0xdc}, {0x0, 0x0, 0x0, [], 0x8}, {0x0, 0x81, 0x13}, {}, {0x0, 0x1f}, {0x0, 0x2, 0x1f}, {0x0, 0x0, 0x3}, {}, {}, {0x0, 0xba}, {0x81, 0x5, 0x1f}, {0x7f, 0x0, 0xff}, {0x1}, {0x0, 0x0, 0x6, [], 0x1}]}}) ioctl$KVM_IRQ_LINE(r1, 0x4008ae61, &(0x7f00000000c0)) 18:44:47 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) sendfile(r0, 0xffffffffffffffff, 0x0, 0x0) r1 = add_key$user(&(0x7f0000000040)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)='X', 0x1, 0xfffffffffffffffe) keyctl$update(0x2, r1, &(0x7f00000006c0)="c0ca1cdbaa1aedbbed80dddaa28e15b9449e2e82cca4244c40ffd0fd4e6631c7d3d86e1339de17344340b02dd527f2d8b3ae6c1db3594e657da33c3ec668f143974a65753472df5319a6b83e1e86b8f2666c61a2e700d1c1e0ae1fc52494bd48", 0x60) add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x9a, 0xfffffffffffffffd) 18:44:47 executing program 5: statx(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x2000, 0x800, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0}) syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x9, 0x0, &(0x7f00000000c0), 0x200000, &(0x7f0000000240)={[{@part={'part', 0x3d, 0xa14}}, {@file_umask={'file_umask', 0x3d, 0x657936f8}}, {@type={'type', 0x3d, "6d6d69c8"}}], [{@fsmagic={'fsmagic', 0x3d, 0x6be0}}, {@obj_type={'obj_type', 0x3d, '@%\'em1\x00'}}, {@euid_lt={'euid<', r0}}, {@fsuuid={'fsuuid', 0x3d, {[0x32, 0x36, 0x65, 0x64, 0x36, 0x64, 0x39, 0x30], 0x2d, [0x66, 0x61, 0x65, 0x37], 0x2d, [0x64, 0x62, 0x64, 0x30], 0x2d, [0x36, 0x37, 0x64, 0x35], 0x2d, [0x61, 0x61, 0x31, 0x0, 0x5a, 0x38, 0x63, 0x36]}}}, {@dont_appraise='dont_appraise'}]}) r1 = openat$md(0xffffffffffffff9c, &(0x7f0000000080)='/dev/md0\x00', 0x0, 0x0) ioctl$BLKALIGNOFF(r1, 0x127a, &(0x7f00000000c0)) ioctl$BLKPG(r1, 0x40140921, 0x0) [ 352.816783][T14197] EXT4-fs (loop4): Mount option "dioread_nolock" incompatible with ext3 [ 352.852865][T14178] gfs2: Bad value for 'locktable' 18:44:47 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000200)={0x2, 0x4e20, @multicast1}, 0x10) connect$inet(r0, &(0x7f0000000000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x1f}}, 0x10) sendmmsg$inet(r0, &(0x7f0000003040)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0, 0x0, &(0x7f00000030c0)=[@ip_ttl={{0x10}}], 0x10}}], 0x2, 0x0) 18:44:47 executing program 0: setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, 0x0, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_EVENTS(0xffffffffffffffff, 0x84, 0xb, &(0x7f0000000040), 0x0) ioctl$DRM_IOCTL_RM_CTX(0xffffffffffffffff, 0xc0086421, &(0x7f0000000300)={0x0, 0x1}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB='lockproto=lock_nolock,locktable=']) 18:44:47 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) sendfile(r0, 0xffffffffffffffff, 0x0, 0x0) r1 = add_key$user(&(0x7f0000000040)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)='X', 0x1, 0xfffffffffffffffe) keyctl$update(0x2, r1, &(0x7f00000006c0)="c0ca1cdbaa1aedbbed80dddaa28e15b9449e2e82cca4244c40ffd0fd4e6631c7d3d86e1339de17344340b02dd527f2d8b3ae6c1db3594e657da33c3ec668f143974a65753472df5319a6b83e1e86b8f2666c61a2e700d1c1e0ae1fc52494bd48", 0x60) add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x9a, 0xfffffffffffffffd) [ 352.989215][T14197] EXT4-fs (loop4): Mount option "dioread_nolock" incompatible with ext3 18:44:47 executing program 4: perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xa1, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000733000)={0x5, 0x5, 0x7, 0x9}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f00004f9fe4)={0xc, 0x4, 0x4, 0x100000001, 0x0, r0}, 0x2c) [ 353.100133][T14219] hfs: unable to parse mount options 18:44:48 executing program 5: statx(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x2000, 0x800, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0}) syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x9, 0x0, &(0x7f00000000c0), 0x200000, &(0x7f0000000240)={[{@part={'part', 0x3d, 0xa14}}, {@file_umask={'file_umask', 0x3d, 0x657936f8}}, {@type={'type', 0x3d, "6d6d69c8"}}], [{@fsmagic={'fsmagic', 0x3d, 0x6be0}}, {@obj_type={'obj_type', 0x3d, '@%\'em1\x00'}}, {@euid_lt={'euid<', r0}}, {@fsuuid={'fsuuid', 0x3d, {[0x32, 0x36, 0x65, 0x64, 0x36, 0x64, 0x39, 0x30], 0x2d, [0x66, 0x61, 0x65, 0x37], 0x2d, [0x64, 0x62, 0x64, 0x30], 0x2d, [0x36, 0x37, 0x64, 0x35], 0x2d, [0x61, 0x61, 0x0, 0x63, 0x5a, 0x38, 0x63, 0x36]}}}, {@dont_appraise='dont_appraise'}]}) r1 = openat$md(0xffffffffffffff9c, &(0x7f0000000080)='/dev/md0\x00', 0x0, 0x0) ioctl$BLKALIGNOFF(r1, 0x127a, &(0x7f00000000c0)) ioctl$BLKPG(r1, 0x40140921, 0x0) 18:44:48 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) sendfile(r0, 0xffffffffffffffff, 0x0, 0x0) r1 = add_key$user(&(0x7f0000000040)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)='X', 0x1, 0xfffffffffffffffe) keyctl$update(0x2, r1, &(0x7f00000006c0)="c0ca1cdbaa1aedbbed80dddaa28e15b9449e2e82cca4244c40ffd0fd4e6631c7d3d86e1339de17344340b02dd527f2d8b3ae6c1db3594e657da33c3ec668f143974a65753472df5319a6b83e1e86b8f2666c61a2e700d1c1e0ae1fc52494bd48", 0x60) add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x9a, 0xfffffffffffffffd) 18:44:48 executing program 2: ioctl$KVM_SET_SREGS(0xffffffffffffffff, 0x4138ae84, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x268}], 0x0, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) [ 353.305937][T14243] FAT-fs (loop2): Directory bread(block 1) failed [ 353.318559][T14245] hfs: unable to parse mount options [ 353.324012][T14243] FAT-fs (loop2): Directory bread(block 2) failed [ 353.326834][T14229] gfs2: Bad value for 'locktable' [ 353.332767][T14243] FAT-fs (loop2): Directory bread(block 3) failed [ 353.343872][T14243] FAT-fs (loop2): Directory bread(block 4) failed 18:44:48 executing program 5: statx(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x2000, 0x800, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0}) syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x9, 0x0, &(0x7f00000000c0), 0x200000, &(0x7f0000000240)={[{@part={'part', 0x3d, 0xa14}}, {@file_umask={'file_umask', 0x3d, 0x657936f8}}, {@type={'type', 0x3d, "6d6d69c8"}}], [{@fsmagic={'fsmagic', 0x3d, 0x6be0}}, {@obj_type={'obj_type', 0x3d, '@%\'em1\x00'}}, {@euid_lt={'euid<', r0}}, {@fsuuid={'fsuuid', 0x3d, {[0x32, 0x36, 0x65, 0x64, 0x36, 0x64, 0x39, 0x30], 0x2d, [0x66, 0x61, 0x65, 0x37], 0x2d, [0x64, 0x62, 0x64, 0x30], 0x2d, [0x36, 0x37, 0x64, 0x35], 0x2d, [0x61, 0x61, 0x0, 0x63, 0x5a, 0x38, 0x63, 0x36]}}}, {@dont_appraise='dont_appraise'}]}) r1 = openat$md(0xffffffffffffff9c, &(0x7f0000000080)='/dev/md0\x00', 0x0, 0x0) ioctl$BLKALIGNOFF(r1, 0x127a, &(0x7f00000000c0)) ioctl$BLKPG(r1, 0x40140921, 0x0) [ 353.350968][T14243] FAT-fs (loop2): Directory bread(block 5) failed [ 353.360361][T14243] FAT-fs (loop2): Directory bread(block 6) failed [ 353.374124][T14243] FAT-fs (loop2): Directory bread(block 7) failed [ 353.384610][T14243] FAT-fs (loop2): Directory bread(block 8) failed 18:44:48 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r0, &(0x7f00000003c0)={0x2, 0x4e23, @broadcast}, 0x61) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) writev(r0, &(0x7f00000004c0)=[{&(0x7f00000008c0)="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", 0x17d}], 0x1) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000100)='bbr\x00', 0x4) write$binfmt_script(r0, &(0x7f0000000a40)=ANY=[@ANYBLOB="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", @ANYRESOCT], 0x1a1) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000140)=0xda6, 0x4) recvmmsg(r0, &(0x7f0000005980)=[{{0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000200)=""/231, 0xe7}], 0x1}}], 0x1, 0x40000100, 0x0) sendto$inet(r0, &(0x7f00000012c0)="1e268a927f1f6588b967481241ba7860005cf65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95425a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0xfe6a, 0x11, 0x0, 0x27) ioctl(0xffffffffffffffff, 0x0, &(0x7f00000001c0)) 18:44:48 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) sendfile(r0, 0xffffffffffffffff, 0x0, 0x0) r1 = add_key$user(&(0x7f0000000040)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)='X', 0x1, 0xfffffffffffffffe) keyctl$update(0x2, r1, &(0x7f00000006c0)="c0ca1cdbaa1aedbbed80dddaa28e15b9449e2e82cca4244c40ffd0fd4e6631c7d3d86e1339de17344340b02dd527f2d8b3ae6c1db3594e657da33c3ec668f143974a65753472df5319a6b83e1e86b8f2666c61a2e700d1c1e0ae1fc52494bd4885a5c64e9007d39fa11313805290dd6342f9775f01a02ec8", 0x78) add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x9a, 0xfffffffffffffffd) 18:44:48 executing program 2: ioctl$KVM_SET_SREGS(0xffffffffffffffff, 0x4138ae84, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x268}], 0x0, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) 18:44:48 executing program 4: r0 = dup(0xffffffffffffffff) r1 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r1, &(0x7f00000000c0)={0xa, 0x0, 0x1, @rand_addr="000000000000000000008d00"}, 0x1c) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r2, 0x29, 0x40, &(0x7f00000003c0)=@raw={'raw\x00', 0x3c1, 0x3, 0x328, 0x17c, 0x17c, 0x17c, 0x4803, 0x0, 0x260, 0x260, 0x260, 0x260, 0x260, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6], 0x0, 0x114, 0x17c, 0x52020000, {}, [@common=@unspec=@connbytes={{0x38, 'connbytes\x00'}}, @common=@unspec=@statistic={{0x38, 'statistic\x00'}}]}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'netbios-ns\x00', 'syz1\x00'}}}, {{@uncond, 0x0, 0xa4, 0xe4}, @common=@inet=@TCPOPTSTRIP={0x40, 'TCPOPTSTRIP\x00'}}], {{[], 0x0, 0xa4, 0xc8}, {0x24}}}}, 0x384) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) setuid(0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='fuse\x00', 0x2, &(0x7f0000000100)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0xa000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@default_permissions='default_permissions'}, {@allow_other='allow_other'}, {@default_permissions='default_permissions'}, {@allow_other='allow_other'}, {@blksize={'blksize'}}], [{@euid_gt={'euid>'}}, {@defcontext={'defcontext', 0x3d, 'user_u'}}, {@uid_eq={'uid', 0x3d, r4}}, {@appraise_type='appraise_type=imasig'}, {@audit='audit'}, {@smackfsfloor={'smackfsfloor', 0x3d, 'syz1\x00'}}, {@fowner_eq={'fowner', 0x3d, r5}}]}}) sendmmsg(r1, &(0x7f0000006d00)=[{{0x0, 0x1000500, 0x0, 0x0, 0x0, 0x0, 0x4}}], 0xc6, 0x0) [ 353.419449][T14243] FAT-fs (loop2): Directory bread(block 9) failed [ 353.440789][T14243] FAT-fs (loop2): Directory bread(block 10) failed 18:44:48 executing program 0: setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, 0x0, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_EVENTS(0xffffffffffffffff, 0x84, 0xb, &(0x7f0000000040), 0x0) ioctl$DRM_IOCTL_RM_CTX(0xffffffffffffffff, 0xc0086421, &(0x7f0000000300)={0x0, 0x1}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB='lockproto=lock_nolock,locktable=']) 18:44:48 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) sendfile(r0, 0xffffffffffffffff, 0x0, 0x0) r1 = add_key$user(&(0x7f0000000040)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)='X', 0x1, 0xfffffffffffffffe) keyctl$update(0x2, r1, &(0x7f00000006c0)="c0ca1cdbaa1aedbbed80dddaa28e15b9449e2e82cca4244c40ffd0fd4e6631c7d3d86e1339de17344340b02dd527f2d8b3ae6c1db3594e657da33c3ec668f143974a65753472df5319a6b83e1e86b8f2666c61a2e700d1c1e0ae1fc52494bd4885a5c64e9007d39fa11313805290dd6342f9775f01a02ec8", 0x78) add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x9a, 0xfffffffffffffffd) [ 353.659707][T14265] FAT-fs (loop2): Directory bread(block 1) failed [ 353.736489][T14265] FAT-fs (loop2): Directory bread(block 2) failed [ 353.752364][T14269] gfs2: Bad value for 'locktable' [ 353.770030][T14274] hfs: unable to parse mount options 18:44:48 executing program 0: setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, 0x0, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_EVENTS(0xffffffffffffffff, 0x84, 0xb, &(0x7f0000000040), 0x0) ioctl$DRM_IOCTL_RM_CTX(0xffffffffffffffff, 0xc0086421, &(0x7f0000000300)={0x0, 0x1}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB='lockproto=lock_nolock,locktable=']) 18:44:48 executing program 4: perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xa1, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000040)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x20008fbf, &(0x7f0000000100)={0x2, 0x10004e23, @loopback}, 0x10) [ 353.795176][T14265] FAT-fs (loop2): Directory bread(block 3) failed [ 353.829199][T14265] FAT-fs (loop2): Directory bread(block 4) failed 18:44:48 executing program 5: statx(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x2000, 0x800, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0}) syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x9, 0x0, &(0x7f00000000c0), 0x200000, &(0x7f0000000240)={[{@part={'part', 0x3d, 0xa14}}, {@file_umask={'file_umask', 0x3d, 0x657936f8}}, {@type={'type', 0x3d, "6d6d69c8"}}], [{@fsmagic={'fsmagic', 0x3d, 0x6be0}}, {@obj_type={'obj_type', 0x3d, '@%\'em1\x00'}}, {@euid_lt={'euid<', r0}}, {@fsuuid={'fsuuid', 0x3d, {[0x32, 0x36, 0x65, 0x64, 0x36, 0x64, 0x39, 0x30], 0x2d, [0x66, 0x61, 0x65, 0x37], 0x2d, [0x64, 0x62, 0x64, 0x30], 0x2d, [0x36, 0x37, 0x64, 0x35], 0x2d, [0x61, 0x61, 0x0, 0x63, 0x5a, 0x38, 0x63, 0x36]}}}, {@dont_appraise='dont_appraise'}]}) r1 = openat$md(0xffffffffffffff9c, &(0x7f0000000080)='/dev/md0\x00', 0x0, 0x0) ioctl$BLKALIGNOFF(r1, 0x127a, &(0x7f00000000c0)) ioctl$BLKPG(r1, 0x40140921, 0x0) 18:44:48 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) sendfile(r0, 0xffffffffffffffff, 0x0, 0x0) r1 = add_key$user(&(0x7f0000000040)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)='X', 0x1, 0xfffffffffffffffe) keyctl$update(0x2, r1, &(0x7f00000006c0)="c0ca1cdbaa1aedbbed80dddaa28e15b9449e2e82cca4244c40ffd0fd4e6631c7d3d86e1339de17344340b02dd527f2d8b3ae6c1db3594e657da33c3ec668f143974a65753472df5319a6b83e1e86b8f2666c61a2e700d1c1e0ae1fc52494bd4885a5c64e9007d39fa11313805290dd6342f9775f01a02ec8", 0x78) add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x9a, 0xfffffffffffffffd) [ 353.850736][T14265] FAT-fs (loop2): Directory bread(block 5) failed [ 353.882197][T14265] FAT-fs (loop2): Directory bread(block 6) failed [ 353.904096][T14265] FAT-fs (loop2): Directory bread(block 7) failed [ 353.925038][T14265] FAT-fs (loop2): Directory bread(block 8) failed [ 353.942139][T14265] FAT-fs (loop2): Directory bread(block 9) failed [ 353.978391][T14265] FAT-fs (loop2): Directory bread(block 10) failed [ 354.006159][T14286] gfs2: Bad value for 'locktable' 18:44:48 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) sendfile(r0, 0xffffffffffffffff, 0x0, 0x0) r1 = add_key$user(&(0x7f0000000040)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)='X', 0x1, 0xfffffffffffffffe) keyctl$update(0x2, r1, &(0x7f00000006c0)="c0ca1cdbaa1aedbbed80dddaa28e15b9449e2e82cca4244c40ffd0fd4e6631c7d3d86e1339de17344340b02dd527f2d8b3ae6c1db3594e657da33c3ec668f143974a65753472df5319a6b83e1e86b8f2666c61a2e700d1c1e0ae1fc52494bd4885a5c64e9007d39fa11313805290dd6342f9775f01a02ec88f6bee22f25a377a9b143abb", 0x84) add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x9a, 0xfffffffffffffffd) 18:44:48 executing program 4: [ 354.097204][T14295] hfs: unable to parse mount options 18:44:49 executing program 1: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x268}], 0x0, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) 18:44:49 executing program 5: statx(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x2000, 0x800, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0}) syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x9, 0x0, &(0x7f00000000c0), 0x200000, &(0x7f0000000240)={[{@part={'part', 0x3d, 0xa14}}, {@file_umask={'file_umask', 0x3d, 0x657936f8}}, {@type={'type', 0x3d, "6d6d69c8"}}], [{@fsmagic={'fsmagic', 0x3d, 0x6be0}}, {@obj_type={'obj_type', 0x3d, '@%\'em1\x00'}}, {@euid_lt={'euid<', r0}}, {@fsuuid={'fsuuid', 0x3d, {[0x32, 0x36, 0x65, 0x64, 0x36, 0x64, 0x39, 0x30], 0x2d, [0x66, 0x61, 0x65, 0x37], 0x2d, [0x64, 0x62, 0x64, 0x30], 0x2d, [0x36, 0x37, 0x64, 0x35], 0x2d, [0x61, 0x0, 0x31, 0x63, 0x5a, 0x38, 0x63, 0x36]}}}, {@dont_appraise='dont_appraise'}]}) r1 = openat$md(0xffffffffffffff9c, &(0x7f0000000080)='/dev/md0\x00', 0x0, 0x0) ioctl$BLKALIGNOFF(r1, 0x127a, &(0x7f00000000c0)) ioctl$BLKPG(r1, 0x40140921, 0x0) 18:44:49 executing program 0: 18:44:49 executing program 2: 18:44:49 executing program 4: clone(0x4340100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$unix(0x1, 0x2, 0x0) bind$unix(r0, &(0x7f0000000040)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r1 = fanotify_init(0x0, 0x0) mount$9p_fd(0x0, &(0x7f0000000000)='\xe9\x1fq\x89Y\x1e\x923aK\x00', &(0x7f0000000180)='9p\x00', 0x0, &(0x7f0000000240)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@msize={'msize', 0x3d, 0x2eaaa657}}]}}) 18:44:49 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) sendfile(r0, 0xffffffffffffffff, 0x0, 0x0) r1 = add_key$user(&(0x7f0000000040)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)='X', 0x1, 0xfffffffffffffffe) keyctl$update(0x2, r1, &(0x7f00000006c0)="c0ca1cdbaa1aedbbed80dddaa28e15b9449e2e82cca4244c40ffd0fd4e6631c7d3d86e1339de17344340b02dd527f2d8b3ae6c1db3594e657da33c3ec668f143974a65753472df5319a6b83e1e86b8f2666c61a2e700d1c1e0ae1fc52494bd4885a5c64e9007d39fa11313805290dd6342f9775f01a02ec8", 0x78) add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x9a, 0xfffffffffffffffd) 18:44:49 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) r1 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000180)={'lo\x00', 0x0}) bind$packet(r0, &(0x7f0000000040)={0x11, 0x0, r2, 0x1, 0x0, 0x6, @local}, 0x14) readv(r0, &(0x7f0000000140)=[{&(0x7f00000001c0)=""/119, 0x77}], 0x1) 18:44:49 executing program 4: 18:44:49 executing program 2: [ 354.529565][T14315] hfs: unable to parse mount options 18:44:49 executing program 5: statx(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x2000, 0x800, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0}) syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x9, 0x0, &(0x7f00000000c0), 0x200000, &(0x7f0000000240)={[{@part={'part', 0x3d, 0xa14}}, {@file_umask={'file_umask', 0x3d, 0x657936f8}}, {@type={'type', 0x3d, "6d6d69c8"}}], [{@fsmagic={'fsmagic', 0x3d, 0x6be0}}, {@obj_type={'obj_type', 0x3d, '@%\'em1\x00'}}, {@euid_lt={'euid<', r0}}, {@fsuuid={'fsuuid', 0x3d, {[0x32, 0x36, 0x65, 0x64, 0x36, 0x64, 0x39, 0x30], 0x2d, [0x66, 0x61, 0x65, 0x37], 0x2d, [0x64, 0x62, 0x64, 0x30], 0x2d, [0x36, 0x37, 0x64, 0x35], 0x2d, [0x61, 0x0, 0x31, 0x63, 0x5a, 0x38, 0x63, 0x36]}}}, {@dont_appraise='dont_appraise'}]}) r1 = openat$md(0xffffffffffffff9c, &(0x7f0000000080)='/dev/md0\x00', 0x0, 0x0) ioctl$BLKALIGNOFF(r1, 0x127a, &(0x7f00000000c0)) ioctl$BLKPG(r1, 0x40140921, 0x0) 18:44:49 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) sendfile(r0, 0xffffffffffffffff, 0x0, 0x0) r1 = add_key$user(&(0x7f0000000040)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)='X', 0x1, 0xfffffffffffffffe) keyctl$update(0x2, r1, &(0x7f00000006c0)="c0ca1cdbaa1aedbbed80dddaa28e15b9449e2e82cca4244c40ffd0fd4e6631c7d3d86e1339de17344340b02dd527f2d8b3ae6c1db3594e657da33c3ec668f143974a65753472df5319a6b83e1e86b8f2666c61a2e700d1c1e0ae1fc52494bd4885a5c64e9007d39fa1131380", 0x6c) add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x9a, 0xfffffffffffffffd) 18:44:49 executing program 4: 18:44:49 executing program 1: 18:44:49 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) sendfile(r0, 0xffffffffffffffff, 0x0, 0x0) r1 = add_key$user(&(0x7f0000000040)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)='X', 0x1, 0xfffffffffffffffe) keyctl$update(0x2, r1, &(0x7f00000006c0)="c0ca1cdbaa1aedbbed80dddaa28e15b9449e2e82cca4244c40ffd0fd4e6631c7d3d86e1339de17344340b02dd527f2d8b3ae6c1db3594e657da33c3ec668f143974a65753472df5319a6b83e1e86b8f2666c61a2e700d1c1e0ae1fc52494bd4885a5c64e9007d39fa1131380", 0x6c) add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x9a, 0xfffffffffffffffd) 18:44:49 executing program 2: 18:44:49 executing program 4: [ 354.787627][T14335] hfs: unable to parse mount options 18:44:49 executing program 1: 18:44:49 executing program 2: 18:44:50 executing program 0: 18:44:50 executing program 5: statx(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x2000, 0x800, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0}) syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x9, 0x0, &(0x7f00000000c0), 0x200000, &(0x7f0000000240)={[{@part={'part', 0x3d, 0xa14}}, {@file_umask={'file_umask', 0x3d, 0x657936f8}}, {@type={'type', 0x3d, "6d6d69c8"}}], [{@fsmagic={'fsmagic', 0x3d, 0x6be0}}, {@obj_type={'obj_type', 0x3d, '@%\'em1\x00'}}, {@euid_lt={'euid<', r0}}, {@fsuuid={'fsuuid', 0x3d, {[0x32, 0x36, 0x65, 0x64, 0x36, 0x64, 0x39, 0x30], 0x2d, [0x66, 0x61, 0x65, 0x37], 0x2d, [0x64, 0x62, 0x64, 0x30], 0x2d, [0x36, 0x37, 0x64, 0x35], 0x2d, [0x61, 0x0, 0x31, 0x63, 0x5a, 0x38, 0x63, 0x36]}}}, {@dont_appraise='dont_appraise'}]}) r1 = openat$md(0xffffffffffffff9c, &(0x7f0000000080)='/dev/md0\x00', 0x0, 0x0) ioctl$BLKALIGNOFF(r1, 0x127a, &(0x7f00000000c0)) ioctl$BLKPG(r1, 0x40140921, 0x0) 18:44:50 executing program 1: 18:44:50 executing program 4: 18:44:50 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) sendfile(r0, 0xffffffffffffffff, 0x0, 0x0) r1 = add_key$user(&(0x7f0000000040)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)='X', 0x1, 0xfffffffffffffffe) keyctl$update(0x2, r1, &(0x7f00000006c0)="c0ca1cdbaa1aedbbed80dddaa28e15b9449e2e82cca4244c40ffd0fd4e6631c7d3d86e1339de17344340b02dd527f2d8b3ae6c1db3594e657da33c3ec668f143974a65753472df5319a6b83e1e86b8f2666c61a2e700d1c1e0ae1fc52494bd48", 0x60) add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x9a, 0xfffffffffffffffd) 18:44:50 executing program 2: 18:44:50 executing program 1: 18:44:50 executing program 0: 18:44:50 executing program 4: 18:44:50 executing program 2: [ 355.317699][T14358] hfs: unable to parse mount options 18:44:50 executing program 0: 18:44:50 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) sendfile(r0, 0xffffffffffffffff, 0x0, 0x0) r1 = add_key$user(&(0x7f0000000040)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)='X', 0x1, 0xfffffffffffffffe) keyctl$update(0x2, r1, &(0x7f00000006c0)="c0ca1cdbaa1aedbbed80dddaa28e15b9449e2e82cca4244c40ffd0fd4e6631c7d3d86e1339de17344340b02dd527f2d8b3ae6c1db3594e657da33c3ec668f143974a65753472df5319a6b83e1e86b8f2666c61a2", 0x54) add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x9a, 0xfffffffffffffffd) 18:44:50 executing program 5: statx(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x2000, 0x800, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0}) syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x9, 0x0, &(0x7f00000000c0), 0x200000, &(0x7f0000000240)={[{@part={'part', 0x3d, 0xa14}}, {@file_umask={'file_umask', 0x3d, 0x657936f8}}, {@type={'type', 0x3d, "6d6d69c8"}}], [{@fsmagic={'fsmagic', 0x3d, 0x6be0}}, {@obj_type={'obj_type', 0x3d, '@%\'em1\x00'}}, {@euid_lt={'euid<', r0}}, {@fsuuid={'fsuuid', 0x3d, {[0x32, 0x36, 0x65, 0x64, 0x36, 0x64, 0x39, 0x30], 0x2d, [0x66, 0x61, 0x65, 0x37], 0x2d, [0x64, 0x62, 0x64, 0x30], 0x2d, [0x36, 0x37, 0x64, 0x35], 0x2d, [0x0, 0x61, 0x31, 0x63, 0x5a, 0x38, 0x63, 0x36]}}}, {@dont_appraise='dont_appraise'}]}) r1 = openat$md(0xffffffffffffff9c, &(0x7f0000000080)='/dev/md0\x00', 0x0, 0x0) ioctl$BLKALIGNOFF(r1, 0x127a, &(0x7f00000000c0)) ioctl$BLKPG(r1, 0x40140921, 0x0) 18:44:50 executing program 4: 18:44:50 executing program 1: 18:44:50 executing program 2: 18:44:50 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) sendfile(r0, 0xffffffffffffffff, 0x0, 0x0) r1 = add_key$user(&(0x7f0000000040)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)='X', 0x1, 0xfffffffffffffffe) keyctl$update(0x2, r1, &(0x7f00000006c0)="c0ca1cdbaa1aedbbed80dddaa28e15b9449e2e82cca4244c40ffd0fd4e6631c7d3d86e1339de17344340b02dd527f2d8b3ae6c1db3594e657da33c3ec668f143974a65753472df53", 0x48) add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x9a, 0xfffffffffffffffd) 18:44:50 executing program 0: 18:44:50 executing program 4: 18:44:50 executing program 1: 18:44:50 executing program 2: [ 355.663573][T14376] hfs: unable to parse mount options 18:44:50 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) sendfile(r0, 0xffffffffffffffff, 0x0, 0x0) r1 = add_key$user(&(0x7f0000000040)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)='X', 0x1, 0xfffffffffffffffe) keyctl$update(0x2, r1, &(0x7f00000006c0)="c0ca1cdbaa1aedbbed80dddaa28e15b9449e2e82cca4244c40ffd0fd4e6631c7d3d86e1339de17344340b02dd527f2d8b3ae6c1db3594e657da33c3ec668f143974a65753472df53", 0x48) add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x9a, 0xfffffffffffffffd) 18:44:50 executing program 5: statx(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x2000, 0x800, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0}) syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x9, 0x0, &(0x7f00000000c0), 0x200000, &(0x7f0000000240)={[{@part={'part', 0x3d, 0xa14}}, {@file_umask={'file_umask', 0x3d, 0x657936f8}}, {@type={'type', 0x3d, "6d6d69c8"}}], [{@fsmagic={'fsmagic', 0x3d, 0x6be0}}, {@obj_type={'obj_type', 0x3d, '@%\'em1\x00'}}, {@euid_lt={'euid<', r0}}, {@fsuuid={'fsuuid', 0x3d, {[0x32, 0x36, 0x65, 0x64, 0x36, 0x64, 0x39, 0x30], 0x2d, [0x66, 0x61, 0x65, 0x37], 0x2d, [0x64, 0x62, 0x64, 0x30], 0x2d, [0x36, 0x37, 0x64, 0x35], 0x2d, [0x0, 0x61, 0x31, 0x63, 0x5a, 0x38, 0x63, 0x36]}}}, {@dont_appraise='dont_appraise'}]}) r1 = openat$md(0xffffffffffffff9c, &(0x7f0000000080)='/dev/md0\x00', 0x0, 0x0) ioctl$BLKALIGNOFF(r1, 0x127a, &(0x7f00000000c0)) ioctl$BLKPG(r1, 0x40140921, 0x0) 18:44:50 executing program 4: 18:44:50 executing program 0: 18:44:50 executing program 2: 18:44:50 executing program 1: 18:44:50 executing program 2: 18:44:50 executing program 1: 18:44:50 executing program 4: [ 355.951961][T14394] hfs: unable to parse mount options 18:44:50 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) sendfile(r0, 0xffffffffffffffff, 0x0, 0x0) r1 = add_key$user(&(0x7f0000000040)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)='X', 0x1, 0xfffffffffffffffe) keyctl$update(0x2, r1, &(0x7f00000006c0)="c0ca1cdbaa1aedbbed80dddaa28e15b9449e2e82cca4244c40ffd0fd4e6631c7d3d86e1339de17344340b02dd527f2d8b3ae6c1db3594e657da33c3e", 0x3c) add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x9a, 0xfffffffffffffffd) 18:44:50 executing program 5: statx(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x2000, 0x800, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0}) syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x9, 0x0, &(0x7f00000000c0), 0x200000, &(0x7f0000000240)={[{@part={'part', 0x3d, 0xa14}}, {@file_umask={'file_umask', 0x3d, 0x657936f8}}, {@type={'type', 0x3d, "6d6d69c8"}}], [{@fsmagic={'fsmagic', 0x3d, 0x6be0}}, {@obj_type={'obj_type', 0x3d, '@%\'em1\x00'}}, {@euid_lt={'euid<', r0}}, {@fsuuid={'fsuuid', 0x3d, {[0x32, 0x36, 0x65, 0x64, 0x36, 0x64, 0x39, 0x30], 0x2d, [0x66, 0x61, 0x65, 0x37], 0x2d, [0x64, 0x62, 0x64, 0x30], 0x2d, [0x36, 0x37, 0x64, 0x35], 0x2d, [0x0, 0x61, 0x31, 0x63, 0x5a, 0x38, 0x63, 0x36]}}}, {@dont_appraise='dont_appraise'}]}) r1 = openat$md(0xffffffffffffff9c, &(0x7f0000000080)='/dev/md0\x00', 0x0, 0x0) ioctl$BLKALIGNOFF(r1, 0x127a, &(0x7f00000000c0)) ioctl$BLKPG(r1, 0x40140921, 0x0) 18:44:50 executing program 0: 18:44:50 executing program 2: 18:44:50 executing program 1: 18:44:51 executing program 0: 18:44:51 executing program 4: 18:44:51 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) sendfile(r0, 0xffffffffffffffff, 0x0, 0x0) r1 = add_key$user(&(0x7f0000000040)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)='X', 0x1, 0xfffffffffffffffe) keyctl$update(0x2, r1, &(0x7f00000006c0)="c0ca1cdbaa1aedbbed80dddaa28e15b9449e2e82cca4244c40ffd0fd4e6631c7d3d86e1339de17344340b02dd527f2d8b3ae6c1db3594e657da33c3e", 0x3c) add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x9a, 0xfffffffffffffffd) 18:44:51 executing program 4: [ 356.248712][T14410] hfs: unable to parse mount options 18:44:51 executing program 2: 18:44:51 executing program 1: 18:44:51 executing program 5: statx(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x2000, 0x800, &(0x7f0000000140)) syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x9, 0x0, &(0x7f00000000c0), 0x200000, &(0x7f0000000240)={[{@part={'part', 0x3d, 0xa14}}, {@file_umask={'file_umask', 0x3d, 0x657936f8}}, {@type={'type', 0x3d, "6d6d69c8"}}], [{@fsmagic={'fsmagic', 0x3d, 0x6be0}}, {@obj_type={'obj_type', 0x3d, '@%\'em1\x00'}}, {@fsuuid={'fsuuid', 0x3d, {[0x32, 0x36, 0x65, 0x64, 0x36, 0x64, 0x39, 0x30], 0x2d, [0x66, 0x61, 0x65, 0x37], 0x2d, [0x64, 0x62, 0x64, 0x30], 0x2d, [0x36, 0x37, 0x64, 0x35], 0x2d, [0x61, 0x61, 0x31, 0x63, 0x5a, 0x38, 0x63, 0x36]}}}, {@dont_appraise='dont_appraise'}]}) r0 = openat$md(0xffffffffffffff9c, &(0x7f0000000080)='/dev/md0\x00', 0x0, 0x0) ioctl$BLKALIGNOFF(r0, 0x127a, &(0x7f00000000c0)) ioctl$BLKPG(r0, 0x40140921, 0x0) 18:44:51 executing program 0: 18:44:51 executing program 2: 18:44:51 executing program 4: 18:44:51 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) sendfile(r0, 0xffffffffffffffff, 0x0, 0x0) r1 = add_key$user(&(0x7f0000000040)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)='X', 0x1, 0xfffffffffffffffe) keyctl$update(0x2, r1, &(0x7f00000006c0)="c0ca1cdbaa1aedbbed80dddaa28e15b9449e2e82cca4244c40ffd0fd4e6631c7d3d86e1339de17344340b02dd527f2d8b3ae6c1db3594e657da33c3e", 0x3c) add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x9a, 0xfffffffffffffffd) 18:44:51 executing program 1: 18:44:51 executing program 0: [ 356.600980][T14433] hfs: unable to parse mount options 18:44:51 executing program 5: statx(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x2000, 0x800, &(0x7f0000000140)) syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x9, 0x0, &(0x7f00000000c0), 0x200000, &(0x7f0000000240)={[{@part={'part', 0x3d, 0xa14}}, {@file_umask={'file_umask', 0x3d, 0x657936f8}}, {@type={'type', 0x3d, "6d6d69c8"}}], [{@fsmagic={'fsmagic', 0x3d, 0x6be0}}, {@obj_type={'obj_type', 0x3d, '@%\'em1\x00'}}, {@fsuuid={'fsuuid', 0x3d, {[0x32, 0x36, 0x65, 0x64, 0x36, 0x64, 0x39, 0x30], 0x2d, [0x66, 0x61, 0x65, 0x37], 0x2d, [0x64, 0x62, 0x64, 0x30], 0x2d, [0x36, 0x37, 0x64, 0x35], 0x2d, [0x61, 0x61, 0x31, 0x63, 0x5a, 0x38, 0x63, 0x36]}}}, {@dont_appraise='dont_appraise'}]}) r0 = openat$md(0xffffffffffffff9c, &(0x7f0000000080)='/dev/md0\x00', 0x0, 0x0) ioctl$BLKALIGNOFF(r0, 0x127a, &(0x7f00000000c0)) ioctl$BLKPG(r0, 0x40140921, 0x0) 18:44:51 executing program 4: 18:44:51 executing program 2: 18:44:51 executing program 1: 18:44:51 executing program 4: 18:44:51 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) sendfile(r0, 0xffffffffffffffff, 0x0, 0x0) r1 = add_key$user(&(0x7f0000000040)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)='X', 0x1, 0xfffffffffffffffe) keyctl$update(0x2, r1, &(0x7f00000006c0)="c0ca1cdbaa1aedbbed80dddaa28e15b9449e2e82cca4244c40ffd0fd4e6631c7d3d86e1339de17344340b02dd527f2d8b3ae6c1db3594e657da33c3ec668f143974a", 0x42) add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x9a, 0xfffffffffffffffd) 18:44:51 executing program 0: [ 356.824945][T14446] hfs: unable to parse mount options 18:44:51 executing program 2: 18:44:51 executing program 1: 18:44:51 executing program 5: statx(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x2000, 0x800, &(0x7f0000000140)) syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x9, 0x0, &(0x7f00000000c0), 0x200000, &(0x7f0000000240)={[{@part={'part', 0x3d, 0xa14}}, {@file_umask={'file_umask', 0x3d, 0x657936f8}}, {@type={'type', 0x3d, "6d6d69c8"}}], [{@fsmagic={'fsmagic', 0x3d, 0x6be0}}, {@obj_type={'obj_type', 0x3d, '@%\'em1\x00'}}, {@fsuuid={'fsuuid', 0x3d, {[0x32, 0x36, 0x65, 0x64, 0x36, 0x64, 0x39, 0x30], 0x2d, [0x66, 0x61, 0x65, 0x37], 0x2d, [0x64, 0x62, 0x64, 0x30], 0x2d, [0x36, 0x37, 0x64, 0x35], 0x2d, [0x61, 0x61, 0x31, 0x63, 0x5a, 0x38, 0x63, 0x36]}}}, {@dont_appraise='dont_appraise'}]}) r0 = openat$md(0xffffffffffffff9c, &(0x7f0000000080)='/dev/md0\x00', 0x0, 0x0) ioctl$BLKALIGNOFF(r0, 0x127a, &(0x7f00000000c0)) ioctl$BLKPG(r0, 0x40140921, 0x0) 18:44:51 executing program 4: 18:44:51 executing program 0: 18:44:51 executing program 2: 18:44:51 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) sendfile(r0, 0xffffffffffffffff, 0x0, 0x0) r1 = add_key$user(&(0x7f0000000040)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)='X', 0x1, 0xfffffffffffffffe) keyctl$update(0x2, r1, &(0x7f00000006c0)="c0ca1cdbaa1aedbbed80dddaa28e15b9449e2e82cca4244c40ffd0fd4e6631c7d3d86e1339de17344340b02dd527f2d8b3ae6c1db3594e657da33c3e", 0x3c) add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x9a, 0xfffffffffffffffd) 18:44:51 executing program 1: 18:44:51 executing program 4: [ 357.095109][T14460] hfs: unable to parse mount options 18:44:52 executing program 5: statx(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x2000, 0x800, &(0x7f0000000140)) syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x9, 0x0, &(0x7f00000000c0), 0x200000, &(0x7f0000000240)={[{@part={'part', 0x3d, 0xa14}}, {@file_umask={'file_umask', 0x3d, 0x657936f8}}, {@type={'type', 0x3d, "6d6d69c8"}}], [{@fsmagic={'fsmagic', 0x3d, 0x6be0}}, {@obj_type={'obj_type', 0x3d, '@%\'em1\x00'}}, {@euid_lt={'euid<'}}, {@fsuuid={'fsuuid', 0x3d, {[0x32, 0x36, 0x65, 0x64, 0x36, 0x64, 0x39, 0x30], 0x2d, [0x66, 0x61, 0x65, 0x37], 0x2d, [0x64, 0x62, 0x64, 0x30], 0x2d, [0x36, 0x37, 0x64, 0x35], 0x2d, [0x61, 0x61, 0x31, 0x63, 0x5a, 0x38, 0x63, 0x36]}}}, {@dont_appraise='dont_appraise'}]}) r0 = openat$md(0xffffffffffffff9c, &(0x7f0000000080)='/dev/md0\x00', 0x0, 0x0) ioctl$BLKALIGNOFF(r0, 0x127a, &(0x7f00000000c0)) ioctl$BLKPG(r0, 0x40140921, 0x0) 18:44:52 executing program 2: 18:44:52 executing program 0: 18:44:52 executing program 1: 18:44:52 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) sendfile(r0, 0xffffffffffffffff, 0x0, 0x0) r1 = add_key$user(&(0x7f0000000040)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)='X', 0x1, 0xfffffffffffffffe) keyctl$update(0x2, r1, &(0x7f00000006c0)="c0ca1cdbaa1aedbbed80dddaa28e15b9449e2e82cca4244c40ffd0fd4e6631c7d3d86e1339de17344340b02dd527f2d8b3ae6c1db3594e657da33c3e", 0x3c) add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x9a, 0xfffffffffffffffd) 18:44:52 executing program 0: 18:44:52 executing program 4: 18:44:52 executing program 2: [ 357.342507][T14475] hfs: unable to parse mount options 18:44:52 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) sendfile(r0, 0xffffffffffffffff, 0x0, 0x0) r1 = add_key$user(&(0x7f0000000040)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)='X', 0x1, 0xfffffffffffffffe) keyctl$update(0x2, r1, &(0x7f00000006c0)="c0ca1cdbaa1aedbbed80dddaa28e15b9449e2e82cca4244c40ffd0fd4e6631c7d3d86e1339de17344340b02dd527f2d8b3ae6c1db3594e657da33c3e", 0x3c) add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x9a, 0xfffffffffffffffd) 18:44:52 executing program 5: statx(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x2000, 0x800, &(0x7f0000000140)) syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x9, 0x0, &(0x7f00000000c0), 0x200000, &(0x7f0000000240)={[{@part={'part', 0x3d, 0xa14}}, {@file_umask={'file_umask', 0x3d, 0x657936f8}}, {@type={'type', 0x3d, "6d6d69c8"}}], [{@fsmagic={'fsmagic', 0x3d, 0x6be0}}, {@obj_type={'obj_type', 0x3d, '@%\'em1\x00'}}, {@euid_lt={'euid<'}}, {@fsuuid={'fsuuid', 0x3d, {[0x32, 0x36, 0x65, 0x64, 0x36, 0x64, 0x39, 0x30], 0x2d, [0x66, 0x61, 0x65, 0x37], 0x2d, [0x64, 0x62, 0x64, 0x30], 0x2d, [0x36, 0x37, 0x64, 0x35], 0x2d, [0x61, 0x61, 0x31, 0x63, 0x5a, 0x38, 0x63, 0x36]}}}, {@dont_appraise='dont_appraise'}]}) r0 = openat$md(0xffffffffffffff9c, &(0x7f0000000080)='/dev/md0\x00', 0x0, 0x0) ioctl$BLKALIGNOFF(r0, 0x127a, &(0x7f00000000c0)) ioctl$BLKPG(r0, 0x40140921, 0x0) 18:44:52 executing program 2: 18:44:52 executing program 4: 18:44:52 executing program 1: 18:44:52 executing program 0: 18:44:52 executing program 1: 18:44:52 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) sendfile(r0, 0xffffffffffffffff, 0x0, 0x0) r1 = add_key$user(&(0x7f0000000040)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)='X', 0x1, 0xfffffffffffffffe) keyctl$update(0x2, r1, &(0x7f00000006c0)="c0ca1cdbaa1aedbbed80dddaa28e15b9449e2e82cca4244c40ffd0fd4e6631c7d3d86e1339de17344340b02dd527f2d8b3ae6c1db3594e657da33c3ec668f1", 0x3f) add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x9a, 0xfffffffffffffffd) [ 357.617365][T14491] hfs: unable to parse mount options 18:44:52 executing program 4: 18:44:52 executing program 2: 18:44:52 executing program 1: 18:44:52 executing program 5: statx(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x2000, 0x800, &(0x7f0000000140)) syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x9, 0x0, &(0x7f00000000c0), 0x200000, &(0x7f0000000240)={[{@part={'part', 0x3d, 0xa14}}, {@file_umask={'file_umask', 0x3d, 0x657936f8}}, {@type={'type', 0x3d, "6d6d69c8"}}], [{@fsmagic={'fsmagic', 0x3d, 0x6be0}}, {@obj_type={'obj_type', 0x3d, '@%\'em1\x00'}}, {@euid_lt={'euid<'}}, {@fsuuid={'fsuuid', 0x3d, {[0x32, 0x36, 0x65, 0x64, 0x36, 0x64, 0x39, 0x30], 0x2d, [0x66, 0x61, 0x65, 0x37], 0x2d, [0x64, 0x62, 0x64, 0x30], 0x2d, [0x36, 0x37, 0x64, 0x35], 0x2d, [0x61, 0x61, 0x31, 0x63, 0x5a, 0x38, 0x63, 0x36]}}}, {@dont_appraise='dont_appraise'}]}) r0 = openat$md(0xffffffffffffff9c, &(0x7f0000000080)='/dev/md0\x00', 0x0, 0x0) ioctl$BLKALIGNOFF(r0, 0x127a, &(0x7f00000000c0)) ioctl$BLKPG(r0, 0x40140921, 0x0) 18:44:52 executing program 0: 18:44:52 executing program 2: 18:44:52 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) sendfile(r0, 0xffffffffffffffff, 0x0, 0x0) r1 = add_key$user(&(0x7f0000000040)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)='X', 0x1, 0xfffffffffffffffe) keyctl$update(0x2, r1, &(0x7f00000006c0)="c0ca1cdbaa1aedbbed80dddaa28e15b9449e2e82cca4244c40ffd0fd4e6631c7d3d86e1339de17344340b02dd527f2d8b3ae6c1db3594e657da33c3e", 0x3c) add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x9a, 0xfffffffffffffffd) 18:44:52 executing program 4: [ 357.874830][T14505] hfs: unable to parse mount options 18:44:52 executing program 0: 18:44:52 executing program 5: statx(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x2000, 0x800, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0}) syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x9, 0x0, &(0x7f00000000c0), 0x200000, &(0x7f0000000240)={[{@part={'part', 0x3d, 0xa14}}, {@file_umask={'file_umask', 0x3d, 0x657936f8}}, {@type={'type', 0x3d, "6d6d69c8"}}], [{@fsmagic={'fsmagic', 0x3d, 0x6be0}}, {@euid_lt={'euid<', r0}}, {@fsuuid={'fsuuid', 0x3d, {[0x32, 0x36, 0x65, 0x64, 0x36, 0x64, 0x39, 0x30], 0x2d, [0x66, 0x61, 0x65, 0x37], 0x2d, [0x64, 0x62, 0x64, 0x30], 0x2d, [0x36, 0x37, 0x64, 0x35], 0x2d, [0x61, 0x61, 0x31, 0x63, 0x5a, 0x38, 0x63, 0x36]}}}, {@dont_appraise='dont_appraise'}]}) r1 = openat$md(0xffffffffffffff9c, &(0x7f0000000080)='/dev/md0\x00', 0x0, 0x0) ioctl$BLKALIGNOFF(r1, 0x127a, &(0x7f00000000c0)) ioctl$BLKPG(r1, 0x40140921, 0x0) 18:44:52 executing program 1: 18:44:52 executing program 2: 18:44:52 executing program 4: 18:44:52 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) sendfile(r0, 0xffffffffffffffff, 0x0, 0x0) r1 = add_key$user(&(0x7f0000000040)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)='X', 0x1, 0xfffffffffffffffe) keyctl$update(0x2, r1, &(0x7f00000006c0)="c0ca1cdbaa1aedbbed80dddaa28e15b9449e2e82cca4244c40ffd0fd4e6631c7d3d86e1339de17344340b02dd527f2d8b3ae6c1db3594e657da33c3e", 0x3c) add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x9a, 0xfffffffffffffffd) 18:44:52 executing program 0: 18:44:52 executing program 1: [ 358.110802][T14518] hfs: unable to parse mount options 18:44:53 executing program 2: 18:44:53 executing program 5: statx(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x2000, 0x800, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0}) syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x9, 0x0, &(0x7f00000000c0), 0x200000, &(0x7f0000000240)={[{@part={'part', 0x3d, 0xa14}}, {@file_umask={'file_umask', 0x3d, 0x657936f8}}, {@type={'type', 0x3d, "6d6d69c8"}}], [{@fsmagic={'fsmagic', 0x3d, 0x6be0}}, {@euid_lt={'euid<', r0}}, {@fsuuid={'fsuuid', 0x3d, {[0x32, 0x36, 0x65, 0x64, 0x36, 0x64, 0x39, 0x30], 0x2d, [0x66, 0x61, 0x65, 0x37], 0x2d, [0x64, 0x62, 0x64, 0x30], 0x2d, [0x36, 0x37, 0x64, 0x35], 0x2d, [0x61, 0x61, 0x31, 0x63, 0x5a, 0x38, 0x63, 0x36]}}}, {@dont_appraise='dont_appraise'}]}) r1 = openat$md(0xffffffffffffff9c, &(0x7f0000000080)='/dev/md0\x00', 0x0, 0x0) ioctl$BLKALIGNOFF(r1, 0x127a, &(0x7f00000000c0)) ioctl$BLKPG(r1, 0x40140921, 0x0) 18:44:53 executing program 0: 18:44:53 executing program 4: 18:44:53 executing program 1: 18:44:53 executing program 4: 18:44:53 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) sendfile(r0, 0xffffffffffffffff, 0x0, 0x0) r1 = add_key$user(&(0x7f0000000040)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)='X', 0x1, 0xfffffffffffffffe) keyctl$update(0x2, r1, &(0x7f00000006c0)="c0ca1cdbaa1aedbbed80dddaa28e15b9449e2e82cca4244c40ffd0fd4e6631c7d3d86e1339de17344340b02dd527f2d8b3ae6c1db3594e657da33c3e", 0x3c) add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x9a, 0xfffffffffffffffd) 18:44:53 executing program 2: [ 358.342208][T14532] hfs: unable to parse mount options 18:44:53 executing program 0: 18:44:53 executing program 5: statx(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x2000, 0x800, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0}) syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x9, 0x0, &(0x7f00000000c0), 0x200000, &(0x7f0000000240)={[{@part={'part', 0x3d, 0xa14}}, {@file_umask={'file_umask', 0x3d, 0x657936f8}}, {@type={'type', 0x3d, "6d6d69c8"}}], [{@fsmagic={'fsmagic', 0x3d, 0x6be0}}, {@euid_lt={'euid<', r0}}, {@fsuuid={'fsuuid', 0x3d, {[0x32, 0x36, 0x65, 0x64, 0x36, 0x64, 0x39, 0x30], 0x2d, [0x66, 0x61, 0x65, 0x37], 0x2d, [0x64, 0x62, 0x64, 0x30], 0x2d, [0x36, 0x37, 0x64, 0x35], 0x2d, [0x61, 0x61, 0x31, 0x63, 0x5a, 0x38, 0x63, 0x36]}}}, {@dont_appraise='dont_appraise'}]}) r1 = openat$md(0xffffffffffffff9c, &(0x7f0000000080)='/dev/md0\x00', 0x0, 0x0) ioctl$BLKALIGNOFF(r1, 0x127a, &(0x7f00000000c0)) ioctl$BLKPG(r1, 0x40140921, 0x0) 18:44:53 executing program 1: 18:44:53 executing program 4: 18:44:53 executing program 2: 18:44:53 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) sendfile(r0, 0xffffffffffffffff, 0x0, 0x0) r1 = add_key$user(&(0x7f0000000040)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)='X', 0x1, 0xfffffffffffffffe) keyctl$update(0x2, r1, &(0x7f00000006c0)="c0ca1cdbaa1aedbbed80dddaa28e15b9449e2e82cca4244c40ffd0fd4e6631c7d3d86e1339de17344340b02dd527f2d8b3ae6c1db3594e657da33c3ec668", 0x3e) add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x9a, 0xfffffffffffffffd) 18:44:53 executing program 0: 18:44:53 executing program 1: 18:44:53 executing program 4: [ 358.597469][T14545] hfs: unable to parse mount options 18:44:53 executing program 2: 18:44:53 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) sendfile(r0, 0xffffffffffffffff, 0x0, 0x0) r1 = add_key$user(&(0x7f0000000040)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)='X', 0x1, 0xfffffffffffffffe) keyctl$update(0x2, r1, &(0x7f00000006c0)="c0ca1cdbaa1aedbbed80dddaa28e15b9449e2e82cca4244c40ffd0fd4e6631c7d3d86e1339de17344340b02dd527f2d8b3ae6c1db3594e657da33c3ec668", 0x3e) add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x9a, 0xfffffffffffffffd) 18:44:53 executing program 5: statx(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x2000, 0x800, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0}) syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x9, 0x0, &(0x7f00000000c0), 0x200000, &(0x7f0000000240)={[{@part={'part', 0x3d, 0xa14}}, {@file_umask={'file_umask', 0x3d, 0x657936f8}}, {@type={'type', 0x3d, "6d6d69c8"}}], [{@obj_type={'obj_type', 0x3d, '@%\'em1\x00'}}, {@euid_lt={'euid<', r0}}, {@fsuuid={'fsuuid', 0x3d, {[0x32, 0x36, 0x65, 0x64, 0x36, 0x64, 0x39, 0x30], 0x2d, [0x66, 0x61, 0x65, 0x37], 0x2d, [0x64, 0x62, 0x64, 0x30], 0x2d, [0x36, 0x37, 0x64, 0x35], 0x2d, [0x61, 0x61, 0x31, 0x63, 0x5a, 0x38, 0x63, 0x36]}}}, {@dont_appraise='dont_appraise'}]}) r1 = openat$md(0xffffffffffffff9c, &(0x7f0000000080)='/dev/md0\x00', 0x0, 0x0) ioctl$BLKALIGNOFF(r1, 0x127a, &(0x7f00000000c0)) ioctl$BLKPG(r1, 0x40140921, 0x0) 18:44:53 executing program 4: 18:44:53 executing program 0: 18:44:53 executing program 1: 18:44:53 executing program 2: 18:44:53 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) sendfile(r0, 0xffffffffffffffff, 0x0, 0x0) r1 = add_key$user(&(0x7f0000000040)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)='X', 0x1, 0xfffffffffffffffe) keyctl$update(0x2, r1, &(0x7f00000006c0)="c0ca1cdbaa1aedbbed80dddaa28e15b9449e2e82cca4244c40ffd0fd4e6631c7d3d86e1339de17344340b02dd527f2d8b3ae6c1db3594e657da33c3ec668", 0x3e) add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x9a, 0xfffffffffffffffd) 18:44:53 executing program 0: 18:44:53 executing program 4: 18:44:53 executing program 2: [ 358.897380][T14563] hfs: unable to parse mount options 18:44:53 executing program 1: 18:44:53 executing program 5: statx(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x2000, 0x800, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0}) syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x9, 0x0, &(0x7f00000000c0), 0x200000, &(0x7f0000000240)={[{@part={'part', 0x3d, 0xa14}}, {@file_umask={'file_umask', 0x3d, 0x657936f8}}, {@type={'type', 0x3d, "6d6d69c8"}}], [{@obj_type={'obj_type', 0x3d, '@%\'em1\x00'}}, {@euid_lt={'euid<', r0}}, {@fsuuid={'fsuuid', 0x3d, {[0x32, 0x36, 0x65, 0x64, 0x36, 0x64, 0x39, 0x30], 0x2d, [0x66, 0x61, 0x65, 0x37], 0x2d, [0x64, 0x62, 0x64, 0x30], 0x2d, [0x36, 0x37, 0x64, 0x35], 0x2d, [0x61, 0x61, 0x31, 0x63, 0x5a, 0x38, 0x63, 0x36]}}}, {@dont_appraise='dont_appraise'}]}) r1 = openat$md(0xffffffffffffff9c, &(0x7f0000000080)='/dev/md0\x00', 0x0, 0x0) ioctl$BLKALIGNOFF(r1, 0x127a, &(0x7f00000000c0)) ioctl$BLKPG(r1, 0x40140921, 0x0) 18:44:53 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) sendfile(r0, 0xffffffffffffffff, 0x0, 0x0) r1 = add_key$user(&(0x7f0000000040)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)='X', 0x1, 0xfffffffffffffffe) keyctl$update(0x2, r1, &(0x7f00000006c0)="c0ca1cdbaa1aedbbed80dddaa28e15b9449e2e82cca4244c40ffd0fd4e6631c7d3d86e1339de17344340b02dd527f2d8b3ae6c1db3594e657da33c3ec668f1", 0x3f) add_key$user(0x0, &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x0, 0xfffffffffffffffd) 18:44:53 executing program 0: 18:44:53 executing program 4: 18:44:53 executing program 2: 18:44:53 executing program 1: 18:44:54 executing program 0: [ 359.162077][T14580] hfs: unable to parse mount options 18:44:54 executing program 2: 18:44:54 executing program 5: statx(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x2000, 0x800, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0}) syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x9, 0x0, &(0x7f00000000c0), 0x200000, &(0x7f0000000240)={[{@part={'part', 0x3d, 0xa14}}, {@file_umask={'file_umask', 0x3d, 0x657936f8}}, {@type={'type', 0x3d, "6d6d69c8"}}], [{@obj_type={'obj_type', 0x3d, '@%\'em1\x00'}}, {@euid_lt={'euid<', r0}}, {@fsuuid={'fsuuid', 0x3d, {[0x32, 0x36, 0x65, 0x64, 0x36, 0x64, 0x39, 0x30], 0x2d, [0x66, 0x61, 0x65, 0x37], 0x2d, [0x64, 0x62, 0x64, 0x30], 0x2d, [0x36, 0x37, 0x64, 0x35], 0x2d, [0x61, 0x61, 0x31, 0x63, 0x5a, 0x38, 0x63, 0x36]}}}, {@dont_appraise='dont_appraise'}]}) r1 = openat$md(0xffffffffffffff9c, &(0x7f0000000080)='/dev/md0\x00', 0x0, 0x0) ioctl$BLKALIGNOFF(r1, 0x127a, &(0x7f00000000c0)) ioctl$BLKPG(r1, 0x40140921, 0x0) 18:44:54 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) sendfile(r0, 0xffffffffffffffff, 0x0, 0x0) r1 = add_key$user(&(0x7f0000000040)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)='X', 0x1, 0xfffffffffffffffe) keyctl$update(0x2, r1, &(0x7f00000006c0)="c0ca1cdbaa1aedbbed80dddaa28e15b9449e2e82cca4244c40ffd0fd4e6631c7d3d86e1339de17344340b02dd527f2d8b3ae6c1db3594e657da33c3ec668f1", 0x3f) add_key$user(0x0, &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x0, 0xfffffffffffffffd) 18:44:54 executing program 4: 18:44:54 executing program 1: 18:44:54 executing program 0: 18:44:54 executing program 2: 18:44:54 executing program 4: 18:44:54 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) sendfile(r0, 0xffffffffffffffff, 0x0, 0x0) r1 = add_key$user(&(0x7f0000000040)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)='X', 0x1, 0xfffffffffffffffe) keyctl$update(0x2, r1, &(0x7f00000006c0)="c0ca1cdbaa1aedbbed80dddaa28e15b9449e2e82cca4244c40ffd0fd4e6631c7d3d86e1339de17344340b02dd527f2d8b3ae6c1db3594e657da33c3ec668f1", 0x3f) add_key$user(0x0, &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x0, 0xfffffffffffffffd) 18:44:54 executing program 1: 18:44:54 executing program 2: [ 359.415329][T14594] hfs: unable to parse mount options 18:44:54 executing program 0: 18:44:54 executing program 2: 18:44:54 executing program 5: statx(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x2000, 0x800, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0}) syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x9, 0x0, &(0x7f00000000c0), 0x200000, &(0x7f0000000240)={[{@part={'part', 0x3d, 0xa14}}, {@file_umask={'file_umask', 0x3d, 0x657936f8}}, {@type={'type', 0x3d, "6d6d69c8"}}], [{@fsmagic={'fsmagic'}}, {@obj_type={'obj_type', 0x3d, '@%\'em1\x00'}}, {@euid_lt={'euid<', r0}}, {@fsuuid={'fsuuid', 0x3d, {[0x32, 0x36, 0x65, 0x64, 0x36, 0x64, 0x39, 0x30], 0x2d, [0x66, 0x61, 0x65, 0x37], 0x2d, [0x64, 0x62, 0x64, 0x30], 0x2d, [0x36, 0x37, 0x64, 0x35], 0x2d, [0x61, 0x61, 0x31, 0x63, 0x5a, 0x38, 0x63, 0x36]}}}, {@dont_appraise='dont_appraise'}]}) r1 = openat$md(0xffffffffffffff9c, &(0x7f0000000080)='/dev/md0\x00', 0x0, 0x0) ioctl$BLKALIGNOFF(r1, 0x127a, &(0x7f00000000c0)) ioctl$BLKPG(r1, 0x40140921, 0x0) 18:44:54 executing program 4: 18:44:54 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) sendfile(r0, 0xffffffffffffffff, 0x0, 0x0) r1 = add_key$user(&(0x7f0000000040)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)='X', 0x1, 0xfffffffffffffffe) keyctl$update(0x2, r1, &(0x7f00000006c0)="c0ca1cdbaa1aedbbed80dddaa28e15b9449e2e82cca4244c40ffd0fd4e6631c7d3d86e1339de17344340b02dd527f2d8b3ae6c1db3594e657da33c3ec668f1", 0x3f) add_key$user(&(0x7f0000000200)='user\x00', 0x0, &(0x7f00000000c0), 0x0, 0xfffffffffffffffd) 18:44:54 executing program 2: 18:44:54 executing program 1: 18:44:54 executing program 0: 18:44:54 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) sendfile(r0, 0xffffffffffffffff, 0x0, 0x0) r1 = add_key$user(&(0x7f0000000040)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)='X', 0x1, 0xfffffffffffffffe) keyctl$update(0x2, r1, &(0x7f00000006c0)="c0ca1cdbaa1aedbbed80dddaa28e15b9449e2e82cca4244c40ffd0fd4e6631c7d3d86e1339de17344340b02dd527f2d8b3ae6c1db3594e657da33c3ec668f1", 0x3f) add_key$user(&(0x7f0000000200)='user\x00', 0x0, &(0x7f00000000c0), 0x0, 0xfffffffffffffffd) [ 359.760093][T14618] hfs: unable to parse mount options 18:44:54 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) r4 = dup3(r3, r1, 0x0) r5 = eventfd(0x0) ioctl$KVM_HYPERV_EVENTFD(r4, 0x4018aebd, &(0x7f0000000100)={0x0, r5}) 18:44:54 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x240900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket$inet_icmp_raw(0x2, 0x3, 0x1) dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r2, 0x29, 0x40, &(0x7f0000000ac0)=@raw={'raw\x00', 0x3c1, 0x3, 0x2f0, 0x0, 0x130, 0x0, 0x130, 0x130, 0x220, 0x220, 0x220, 0x220, 0x220, 0x3, 0x0, {[{{@uncond, 0x0, 0x110, 0x130, 0x0, {}, [@common=@unspec=@connlimit={{0x40, 'connlimit\x00'}}, @common=@inet=@set2={{0x28, 'set\x00'}}]}, @unspec=@NOTRACK={0x20, 'NOTRACK\x00'}}, {{@uncond, 0x0, 0xa8, 0xf0}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'pptp\x00'}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x350) 18:44:54 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000000)={{0x1b, 0x5b, 0x7, 0x7, 0x0, 0x3f, 0x37, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1068, 0x40}}, 0x40) 18:44:54 executing program 5: statx(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x2000, 0x800, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0}) syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x9, 0x0, &(0x7f00000000c0), 0x200000, &(0x7f0000000240)={[{@part={'part', 0x3d, 0xa14}}, {@file_umask={'file_umask', 0x3d, 0x657936f8}}, {@type={'type', 0x3d, "6d6d69c8"}}], [{@fsmagic={'fsmagic'}}, {@obj_type={'obj_type', 0x3d, '@%\'em1\x00'}}, {@euid_lt={'euid<', r0}}, {@fsuuid={'fsuuid', 0x3d, {[0x32, 0x36, 0x65, 0x64, 0x36, 0x64, 0x39, 0x30], 0x2d, [0x66, 0x61, 0x65, 0x37], 0x2d, [0x64, 0x62, 0x64, 0x30], 0x2d, [0x36, 0x37, 0x64, 0x35], 0x2d, [0x61, 0x61, 0x31, 0x63, 0x5a, 0x38, 0x63, 0x36]}}}, {@dont_appraise='dont_appraise'}]}) r1 = openat$md(0xffffffffffffff9c, &(0x7f0000000080)='/dev/md0\x00', 0x0, 0x0) ioctl$BLKALIGNOFF(r1, 0x127a, &(0x7f00000000c0)) ioctl$BLKPG(r1, 0x40140921, 0x0) 18:44:54 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r0, &(0x7f00000003c0)={0x2, 0x4e23, @broadcast}, 0x61) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) writev(r0, &(0x7f00000004c0)=[{&(0x7f00000008c0)="0a99b3e3930870dcd4c6d68e6abe088a5accdbe6dc85ed63bcee4834cd53f8a19cfad53574230c17377b8f0c69b09d01000000cf550f05d219f9c6ca195d3b4e29f3230cdd08cd5f1c946bee78e546d580a203030f47d70c95a97fe501000000ffffffff8ef5e2f7ee4f47c1a036e37e87414e615396eeb918828e0000000000003b9bd6b7f46843cd7400000000000000000000da4150cc06507aca4a15ec5bf48efd96e80a2e03ae10c1121d40311509db5b21f3694c4823f7d8b6cab1156cf3a6e5178587f78bdf", 0xc9}], 0x1) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000100)='bbr\x00', 0x4) recvmmsg(r0, &(0x7f0000005980)=[{{0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000200)=""/231, 0xe7}], 0x1}}], 0x1, 0x0, 0x0) sendto$inet(r0, &(0x7f00000012c0)="1e268a927f1f6588b967481241ba7860005cf65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95425a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0xfe6a, 0x11, 0x0, 0x27) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") 18:44:54 executing program 4: [ 359.967134][T14635] Cannot find set identified by id 0 to match 18:44:54 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) sendfile(r0, 0xffffffffffffffff, 0x0, 0x0) r1 = add_key$user(&(0x7f0000000040)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)='X', 0x1, 0xfffffffffffffffe) keyctl$update(0x2, r1, &(0x7f00000006c0)="c0ca1cdbaa1aedbbed80dddaa28e15b9449e2e82cca4244c40ffd0fd4e6631c7d3d86e1339de17344340b02dd527f2d8b3ae6c1db3594e657da33c3ec668f1", 0x3f) add_key$user(&(0x7f0000000200)='user\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffd) 18:44:54 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) r4 = dup3(r3, r1, 0x0) r5 = eventfd(0x0) ioctl$KVM_HYPERV_EVENTFD(r4, 0x4018aebd, &(0x7f0000000100)={0x0, r5}) 18:44:54 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000000)={{0x1b, 0x5b, 0x7, 0x7, 0x0, 0x3f, 0x37, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1068, 0x40}}, 0x40) [ 360.066550][T14650] hfs: unable to parse mount options 18:44:54 executing program 4: 18:44:55 executing program 5: statx(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x2000, 0x800, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0}) syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x9, 0x0, &(0x7f00000000c0), 0x200000, &(0x7f0000000240)={[{@part={'part', 0x3d, 0xa14}}, {@file_umask={'file_umask', 0x3d, 0x657936f8}}, {@type={'type', 0x3d, "6d6d69c8"}}], [{@fsmagic={'fsmagic'}}, {@obj_type={'obj_type', 0x3d, '@%\'em1\x00'}}, {@euid_lt={'euid<', r0}}, {@fsuuid={'fsuuid', 0x3d, {[0x32, 0x36, 0x65, 0x64, 0x36, 0x64, 0x39, 0x30], 0x2d, [0x66, 0x61, 0x65, 0x37], 0x2d, [0x64, 0x62, 0x64, 0x30], 0x2d, [0x36, 0x37, 0x64, 0x35], 0x2d, [0x61, 0x61, 0x31, 0x63, 0x5a, 0x38, 0x63, 0x36]}}}, {@dont_appraise='dont_appraise'}]}) r1 = openat$md(0xffffffffffffff9c, &(0x7f0000000080)='/dev/md0\x00', 0x0, 0x0) ioctl$BLKALIGNOFF(r1, 0x127a, &(0x7f00000000c0)) ioctl$BLKPG(r1, 0x40140921, 0x0) 18:44:55 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f00000004c0)='net/ipv6_route\x00') read$snddsp(r0, 0x0, 0x0) 18:44:55 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) sendfile(r0, 0xffffffffffffffff, 0x0, 0x0) r1 = add_key$user(&(0x7f0000000040)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)='X', 0x1, 0xfffffffffffffffe) keyctl$update(0x2, r1, &(0x7f00000006c0)="c0ca1cdbaa1aedbbed80dddaa28e15b9449e2e82cca4244c40ffd0fd4e6631c7d3d86e1339de17344340b02dd527f2d8b3ae6c1db3594e657da33c3ec668f1", 0x3f) add_key$user(&(0x7f0000000200)='user\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffd) 18:44:55 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) r4 = dup3(r3, r1, 0x0) r5 = eventfd(0x0) ioctl$KVM_HYPERV_EVENTFD(r4, 0x4018aebd, &(0x7f0000000100)={0x0, r5}) 18:44:55 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000000)={{0x1b, 0x5b, 0x7, 0x7, 0x0, 0x3f, 0x37, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1068, 0x40}}, 0x40) 18:44:55 executing program 4: open(&(0x7f00000000c0)='./file0\x00', 0x40c2, 0x0) syz_mount_image$minix(&(0x7f00000000c0)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x6c000000, 0x1, &(0x7f0000000240)=[{&(0x7f0000000100)="600084e002000a00900cda40ff1ad5c98f13", 0x12, 0x400}], 0x8003, 0x0) mount(0x0, &(0x7f0000000280)='./file0\x00', 0x0, 0x200020, 0x0) setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) [ 360.431216][T14685] hfs: unable to parse mount options 18:44:55 executing program 0: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) msgget$private(0x0, 0x0) msgrcv(0x0, 0x0, 0x0, 0x0, 0x0) [ 360.617025][ T27] audit: type=1800 audit(1585421095.419:30): pid=14701 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=collect_data cause=failed(directio) comm="syz-executor.4" name="file0" dev="sda1" ino=15921 res=0 18:44:55 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000000)={{0x1b, 0x5b, 0x7, 0x7, 0x0, 0x3f, 0x37, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1068, 0x40}}, 0x40) 18:44:55 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) sendfile(r0, 0xffffffffffffffff, 0x0, 0x0) r1 = add_key$user(&(0x7f0000000040)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)='X', 0x1, 0xfffffffffffffffe) keyctl$update(0x2, r1, &(0x7f00000006c0)="c0ca1cdbaa1aedbbed80dddaa28e15b9449e2e82cca4244c40ffd0fd4e6631c7d3d86e1339de17344340b02dd527f2d8b3ae6c1db3594e657da33c3ec668f1", 0x3f) add_key$user(&(0x7f0000000200)='user\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffd) 18:44:55 executing program 5: statx(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x2000, 0x800, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0}) syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x9, 0x0, &(0x7f00000000c0), 0x200000, &(0x7f0000000240)={[{@part={'part', 0x3d, 0xa14}}, {@file_umask={'file_umask', 0x3d, 0x657936f8}}, {@type={'type', 0x3d, "6d6d69c8"}}], [{@fsmagic={'fsmagic', 0x3d, 0x6be0}}, {@obj_type={'obj_type', 0x3d, '@%\'em1\x00'}}, {@euid_lt={'euid<', r0}}, {@fsuuid={'fsuuid', 0x3d, {[0x32, 0x36, 0x65, 0x64, 0x36, 0x64, 0x39, 0x30], 0x2d, [0x66, 0x61, 0x65, 0x37], 0x2d, [0x64, 0x62, 0x64, 0x30], 0x2d, [0x36, 0x37, 0x64, 0x35], 0x2d, [0x61, 0x61, 0x31, 0x63, 0x5a, 0x38, 0x63, 0x36]}}}, {@dont_appraise='dont_appraise'}]}) r1 = openat$md(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$BLKALIGNOFF(r1, 0x127a, &(0x7f00000000c0)) ioctl$BLKPG(r1, 0x40140921, 0x0) 18:44:55 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) r4 = dup3(r3, r1, 0x0) r5 = eventfd(0x0) ioctl$KVM_HYPERV_EVENTFD(r4, 0x4018aebd, &(0x7f0000000100)={0x0, r5}) [ 360.664992][T14701] MINIX-fs: mounting unchecked file system, running fsck is recommended 18:44:55 executing program 1: write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000000)={{0x1b, 0x5b, 0x7, 0x7, 0x0, 0x3f, 0x37, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1068, 0x40}}, 0x40) [ 360.762357][T14710] MINIX-fs warning: remounting unchecked fs, running fsck is recommended [ 360.799832][T14708] hfs: unable to parse mount options 18:44:55 executing program 3: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000003980)={[{@noacl='noacl'}]}) 18:44:55 executing program 1: write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000000)={{0x1b, 0x5b, 0x7, 0x7, 0x0, 0x3f, 0x37, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1068, 0x40}}, 0x40) 18:44:55 executing program 4: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = msgget$private(0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x80000007ffffffe) msgctl$IPC_SET(r0, 0x1, &(0x7f0000000540)) msgsnd(0x0, &(0x7f0000000000)={0x2}, 0x8, 0x800) msgrcv(0x0, 0x0, 0x0, 0x0, 0x0) 18:44:55 executing program 5: statx(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x2000, 0x800, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0}) syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x9, 0x0, &(0x7f00000000c0), 0x200000, &(0x7f0000000240)={[{@part={'part', 0x3d, 0xa14}}, {@file_umask={'file_umask', 0x3d, 0x657936f8}}, {@type={'type', 0x3d, "6d6d69c8"}}], [{@fsmagic={'fsmagic', 0x3d, 0x6be0}}, {@obj_type={'obj_type', 0x3d, '@%\'em1\x00'}}, {@euid_lt={'euid<', r0}}, {@fsuuid={'fsuuid', 0x3d, {[0x32, 0x36, 0x65, 0x64, 0x36, 0x64, 0x39, 0x30], 0x2d, [0x66, 0x61, 0x65, 0x37], 0x2d, [0x64, 0x62, 0x64, 0x30], 0x2d, [0x36, 0x37, 0x64, 0x35], 0x2d, [0x61, 0x61, 0x31, 0x63, 0x5a, 0x38, 0x63, 0x36]}}}, {@dont_appraise='dont_appraise'}]}) r1 = openat$md(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$BLKALIGNOFF(r1, 0x127a, &(0x7f00000000c0)) ioctl$BLKPG(r1, 0x40140921, 0x0) 18:44:55 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) r4 = dup3(r3, r1, 0x0) ioctl$KVM_HYPERV_EVENTFD(r4, 0x4018aebd, &(0x7f0000000100)) [ 360.958417][ T7431] minix_free_inode: bit 1 already cleared 18:44:55 executing program 1: write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000000)={{0x1b, 0x5b, 0x7, 0x7, 0x0, 0x3f, 0x37, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1068, 0x40}}, 0x40) [ 361.064880][T14736] hfs: unable to parse mount options [ 361.094654][T14739] gfs2: not a GFS2 filesystem [ 361.215104][T14739] gfs2: not a GFS2 filesystem 18:44:56 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r0, &(0x7f00000003c0)={0x2, 0x4e23, @broadcast}, 0x61) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) writev(r0, &(0x7f00000004c0)=[{&(0x7f00000008c0)="0a99b3e3930870dcd4c6d68e6abe088a5accdbe6dc85ed63bcee4834cd53f8a19cfad53574230c17377b8f0c69b09d01000000cf550f05d219f9c6ca195d3b4e29f3230cdd08cd5f1c946bee78e546d580a203030f47d70c95a97fe501000000ffffffff8ef5e2f7ee4f47c1a036e37e87414e615396eeb918828e0000000000003b9bd6b7f46843cd7400000000000000000000da4150cc06507aca4a15ec5bf48efd96e80a2e03ae10c1121d40311509db5b21f3694c4823f7d8b6cab1156cf3a6e5178587f78bdf8d2b17d8e2ac357cce3c1a78ac1acbc9ad2f62068db51337e68ba4860d8e9146f7cdaccafeb0319f1519793da30956cb27e3b9e805f34ce953b1ffc09662fba750bc6cd4cc82dfbb3a09b935528e4de7169e3a1706af3c6af5332aaaf76430d0dc979df4c6b90747d460d545f6208e75ad5ad2fe7b71ea361a0424bd48cf8406809c5d929969c248cf772118c3fd0c409e3414665dbec6d297f8da0206ade88d3176ef4d09d865aa0be1d2b33622e44ff453a198", 0x17d}], 0x1) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000100)='bbr\x00', 0x4) write$binfmt_script(r0, &(0x7f0000000a40)=ANY=[@ANYBLOB="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", @ANYRESOCT], 0x123) recvmmsg(r0, &(0x7f0000005980)=[{{0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000200)=""/231, 0xe7}], 0x1}}], 0x1, 0x0, 0x0) sendto$inet(r0, &(0x7f00000012c0)="1e268a927f1f6588b967481241ba7860005cf65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95425a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0xfe6a, 0x11, 0x0, 0x27) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") 18:44:56 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000000)={{0x1b, 0x5b, 0x7, 0x7, 0x0, 0x3f, 0x37, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1068, 0x40}}, 0x40) 18:44:56 executing program 5: statx(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x2000, 0x800, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0}) syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x9, 0x0, &(0x7f00000000c0), 0x200000, &(0x7f0000000240)={[{@part={'part', 0x3d, 0xa14}}, {@file_umask={'file_umask', 0x3d, 0x657936f8}}, {@type={'type', 0x3d, "6d6d69c8"}}], [{@fsmagic={'fsmagic', 0x3d, 0x6be0}}, {@obj_type={'obj_type', 0x3d, '@%\'em1\x00'}}, {@euid_lt={'euid<', r0}}, {@fsuuid={'fsuuid', 0x3d, {[0x32, 0x36, 0x65, 0x64, 0x36, 0x64, 0x39, 0x30], 0x2d, [0x66, 0x61, 0x65, 0x37], 0x2d, [0x64, 0x62, 0x64, 0x30], 0x2d, [0x36, 0x37, 0x64, 0x35], 0x2d, [0x61, 0x61, 0x31, 0x63, 0x5a, 0x38, 0x63, 0x36]}}}, {@dont_appraise='dont_appraise'}]}) r1 = openat$md(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$BLKALIGNOFF(r1, 0x127a, &(0x7f00000000c0)) ioctl$BLKPG(r1, 0x40140921, 0x0) 18:44:56 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) r4 = dup3(r3, r1, 0x0) ioctl$KVM_HYPERV_EVENTFD(r4, 0x4018aebd, &(0x7f0000000100)) 18:44:56 executing program 3: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000003980)={[{@noacl='noacl'}]}) 18:44:56 executing program 1: syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000000)={{0x1b, 0x5b, 0x7, 0x7, 0x0, 0x3f, 0x37, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1068, 0x40}}, 0x40) [ 361.846002][T14783] gfs2: not a GFS2 filesystem [ 361.865839][T14782] hfs: unable to parse mount options 18:44:56 executing program 1: syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000000)={{0x1b, 0x5b, 0x7, 0x7, 0x0, 0x3f, 0x37, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1068, 0x40}}, 0x40) 18:44:56 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) r4 = dup3(r3, r1, 0x0) ioctl$KVM_HYPERV_EVENTFD(r4, 0x4018aebd, &(0x7f0000000100)) 18:44:56 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000dc0)=ANY=[@ANYBLOB="680000001000010400"/20, @ANYRES32, @ANYBLOB="0000000000000000480012800e00010069703667726574617000000034000280050008000200000008000100", @ANYRES32=0x0, @ANYBLOB="08000300080007000800140004000000250008000100"/32], 0x68}}, 0x0) 18:44:56 executing program 5: statx(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x2000, 0x800, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0}) syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x9, 0x0, &(0x7f00000000c0), 0x200000, &(0x7f0000000240)={[{@part={'part', 0x3d, 0xa14}}, {@file_umask={'file_umask', 0x3d, 0x657936f8}}, {@type={'type', 0x3d, "6d6d69c8"}}], [{@fsmagic={'fsmagic', 0x3d, 0x6be0}}, {@obj_type={'obj_type', 0x3d, '@%\'em1\x00'}}, {@euid_lt={'euid<', r0}}, {@fsuuid={'fsuuid', 0x3d, {[0x32, 0x36, 0x65, 0x64, 0x36, 0x64, 0x39, 0x30], 0x2d, [0x66, 0x61, 0x65, 0x37], 0x2d, [0x64, 0x62, 0x64, 0x30], 0x2d, [0x36, 0x37, 0x64, 0x35], 0x2d, [0x61, 0x61, 0x31, 0x63, 0x5a, 0x38, 0x63, 0x36]}}}, {@dont_appraise='dont_appraise'}]}) r1 = openat$md(0xffffffffffffff9c, &(0x7f0000000080)='/dev/md0\x00', 0x0, 0x0) ioctl$BLKALIGNOFF(0xffffffffffffffff, 0x127a, &(0x7f00000000c0)) ioctl$BLKPG(r1, 0x40140921, 0x0) 18:44:56 executing program 3: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000003980)={[{@noacl='noacl'}]}) 18:44:56 executing program 1: syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000000)={{0x1b, 0x5b, 0x7, 0x7, 0x0, 0x3f, 0x37, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1068, 0x40}}, 0x40) [ 362.251345][T14826] hfs: unable to parse mount options [ 362.257388][T14831] netlink: 'syz-executor.4': attribute type 3 has an invalid length. [ 362.275912][T14832] gfs2: not a GFS2 filesystem [ 362.306545][T14831] __nla_validate_parse: 71 callbacks suppressed [ 362.306554][T14831] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.4'. 18:44:57 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup3(r0, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r3 = syz_open_procfs(0x0, &(0x7f0000000040)='io\x00') r4 = syz_open_dev$tty1(0xc, 0x4, 0x1) sendfile(r4, r3, 0x0, 0x81) 18:44:57 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r2 = eventfd(0x0) ioctl$KVM_HYPERV_EVENTFD(0xffffffffffffffff, 0x4018aebd, &(0x7f0000000100)={0x0, r2}) 18:44:57 executing program 3: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000003980)={[{@noacl='noacl'}]}) 18:44:57 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, 0x0, 0x0) 18:44:57 executing program 5: statx(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x2000, 0x800, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0}) syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x9, 0x0, &(0x7f00000000c0), 0x200000, &(0x7f0000000240)={[{@part={'part', 0x3d, 0xa14}}, {@file_umask={'file_umask', 0x3d, 0x657936f8}}, {@type={'type', 0x3d, "6d6d69c8"}}], [{@fsmagic={'fsmagic', 0x3d, 0x6be0}}, {@obj_type={'obj_type', 0x3d, '@%\'em1\x00'}}, {@euid_lt={'euid<', r0}}, {@fsuuid={'fsuuid', 0x3d, {[0x32, 0x36, 0x65, 0x64, 0x36, 0x64, 0x39, 0x30], 0x2d, [0x66, 0x61, 0x65, 0x37], 0x2d, [0x64, 0x62, 0x64, 0x30], 0x2d, [0x36, 0x37, 0x64, 0x35], 0x2d, [0x61, 0x61, 0x31, 0x63, 0x5a, 0x38, 0x63, 0x36]}}}, {@dont_appraise='dont_appraise'}]}) r1 = openat$md(0xffffffffffffff9c, &(0x7f0000000080)='/dev/md0\x00', 0x0, 0x0) ioctl$BLKALIGNOFF(0xffffffffffffffff, 0x127a, &(0x7f00000000c0)) ioctl$BLKPG(r1, 0x40140921, 0x0) 18:44:57 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000000)={{0x1b, 0x5b, 0x7, 0x7, 0x0, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}}, 0x40) 18:44:57 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, 0x0, 0x0) [ 362.581430][T14846] hfs: unable to parse mount options [ 362.603214][T14843] gfs2: not a GFS2 filesystem 18:44:57 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r2 = eventfd(0x0) ioctl$KVM_HYPERV_EVENTFD(0xffffffffffffffff, 0x4018aebd, &(0x7f0000000100)={0x0, r2}) 18:44:57 executing program 5: statx(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x2000, 0x800, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0}) syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x9, 0x0, &(0x7f00000000c0), 0x200000, &(0x7f0000000240)={[{@part={'part', 0x3d, 0xa14}}, {@file_umask={'file_umask', 0x3d, 0x657936f8}}, {@type={'type', 0x3d, "6d6d69c8"}}], [{@fsmagic={'fsmagic', 0x3d, 0x6be0}}, {@obj_type={'obj_type', 0x3d, '@%\'em1\x00'}}, {@euid_lt={'euid<', r0}}, {@fsuuid={'fsuuid', 0x3d, {[0x32, 0x36, 0x65, 0x64, 0x36, 0x64, 0x39, 0x30], 0x2d, [0x66, 0x61, 0x65, 0x37], 0x2d, [0x64, 0x62, 0x64, 0x30], 0x2d, [0x36, 0x37, 0x64, 0x35], 0x2d, [0x61, 0x61, 0x31, 0x63, 0x5a, 0x38, 0x63, 0x36]}}}, {@dont_appraise='dont_appraise'}]}) r1 = openat$md(0xffffffffffffff9c, &(0x7f0000000080)='/dev/md0\x00', 0x0, 0x0) ioctl$BLKALIGNOFF(0xffffffffffffffff, 0x127a, &(0x7f00000000c0)) ioctl$BLKPG(r1, 0x40140921, 0x0) 18:44:57 executing program 4: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000740)={0x0, 0x2, 0x0, 0x1000, &(0x7f0000000000/0x1000)=nil}) ioctl$KVM_SET_REGS(0xffffffffffffffff, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x6]}) r2 = dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, 0x0, 0x0) ioctl$KVM_SET_REGS(0xffffffffffffffff, 0x4090ae82, &(0x7f0000000640)) 18:44:57 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, 0x0, 0x0) 18:44:57 executing program 3: syz_mount_image$gfs2(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000003980)={[{@noacl='noacl'}]}) 18:44:57 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000180)={0x26, 'aead\x00', 0x0, 0x0, 'rfc4309(aegis128-aesni)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)="21012d", 0x3) 18:44:57 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r2 = eventfd(0x0) ioctl$KVM_HYPERV_EVENTFD(0xffffffffffffffff, 0x4018aebd, &(0x7f0000000100)={0x0, r2}) 18:44:57 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000000)={{0x1b, 0x5b, 0x7, 0x7, 0x0, 0x0, 0x37, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1068, 0x40}}, 0x40) [ 362.966271][T14887] hfs: unable to parse mount options 18:44:57 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r2 = dup3(0xffffffffffffffff, r1, 0x0) r3 = eventfd(0x0) ioctl$KVM_HYPERV_EVENTFD(r2, 0x4018aebd, &(0x7f0000000100)={0x0, r3}) 18:44:57 executing program 3: syz_mount_image$gfs2(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000003980)={[{@noacl='noacl'}]}) 18:44:57 executing program 5: statx(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x2000, 0x800, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0}) syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x9, 0x0, &(0x7f00000000c0), 0x200000, &(0x7f0000000240)={[{@part={'part', 0x3d, 0xa14}}, {@file_umask={'file_umask', 0x3d, 0x657936f8}}, {@type={'type', 0x3d, "6d6d69c8"}}], [{@fsmagic={'fsmagic', 0x3d, 0x6be0}}, {@obj_type={'obj_type', 0x3d, '@%\'em1\x00'}}, {@euid_lt={'euid<', r0}}, {@fsuuid={'fsuuid', 0x3d, {[0x32, 0x36, 0x65, 0x64, 0x36, 0x64, 0x39, 0x30], 0x2d, [0x66, 0x61, 0x65, 0x37], 0x2d, [0x64, 0x62, 0x64, 0x30], 0x2d, [0x36, 0x37, 0x64, 0x35], 0x2d, [0x61, 0x61, 0x31, 0x63, 0x5a, 0x38, 0x63, 0x36]}}}, {@dont_appraise='dont_appraise'}]}) r1 = openat$md(0xffffffffffffff9c, &(0x7f0000000080)='/dev/md0\x00', 0x0, 0x0) ioctl$BLKALIGNOFF(r1, 0x127a, 0x0) ioctl$BLKPG(r1, 0x40140921, 0x0) 18:44:58 executing program 4: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) ioctl$FITRIM(r0, 0xc0185879, 0x0) ioctl$FITRIM(r0, 0xc0185879, &(0x7f00000000c0)={0xd000000, 0xffffffff}) 18:44:58 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r2 = dup3(0xffffffffffffffff, r1, 0x0) r3 = eventfd(0x0) ioctl$KVM_HYPERV_EVENTFD(r2, 0x4018aebd, &(0x7f0000000100)={0x0, r3}) 18:44:58 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000000)={{0x1b, 0x5b, 0x7, 0x7, 0x0, 0x0, 0x37, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1068, 0x40}}, 0x40) [ 363.314178][T14932] hfs: unable to parse mount options 18:44:58 executing program 5: statx(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x2000, 0x800, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0}) syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x9, 0x0, &(0x7f00000000c0), 0x200000, &(0x7f0000000240)={[{@part={'part', 0x3d, 0xa14}}, {@file_umask={'file_umask', 0x3d, 0x657936f8}}, {@type={'type', 0x3d, "6d6d69c8"}}], [{@fsmagic={'fsmagic', 0x3d, 0x6be0}}, {@obj_type={'obj_type', 0x3d, '@%\'em1\x00'}}, {@euid_lt={'euid<', r0}}, {@fsuuid={'fsuuid', 0x3d, {[0x32, 0x36, 0x65, 0x64, 0x36, 0x64, 0x39, 0x30], 0x2d, [0x66, 0x61, 0x65, 0x37], 0x2d, [0x64, 0x62, 0x64, 0x30], 0x2d, [0x36, 0x37, 0x64, 0x35], 0x2d, [0x61, 0x61, 0x31, 0x63, 0x5a, 0x38, 0x63, 0x36]}}}, {@dont_appraise='dont_appraise'}]}) r1 = openat$md(0xffffffffffffff9c, &(0x7f0000000080)='/dev/md0\x00', 0x0, 0x0) ioctl$BLKALIGNOFF(r1, 0x127a, 0x0) ioctl$BLKPG(r1, 0x40140921, 0x0) 18:44:58 executing program 0: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_SET_VRING_BASE(r0, 0xaf01, 0x0) bind(0xffffffffffffffff, 0x0, 0x0) 18:44:58 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r2 = dup3(0xffffffffffffffff, r1, 0x0) r3 = eventfd(0x0) ioctl$KVM_HYPERV_EVENTFD(r2, 0x4018aebd, &(0x7f0000000100)={0x0, r3}) 18:44:58 executing program 3: syz_mount_image$gfs2(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000003980)={[{@noacl='noacl'}]}) 18:44:58 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000000)={{0x1b, 0x5b, 0x7, 0x7, 0x0, 0x0, 0x37, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1068, 0x40}}, 0x40) 18:44:58 executing program 4: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) ioctl$FITRIM(r0, 0xc0185879, 0x0) ioctl$FITRIM(r0, 0xc0185879, &(0x7f00000000c0)={0xd000000, 0xffffffff}) 18:44:58 executing program 5: statx(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x2000, 0x800, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0}) syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x9, 0x0, &(0x7f00000000c0), 0x200000, &(0x7f0000000240)={[{@part={'part', 0x3d, 0xa14}}, {@file_umask={'file_umask', 0x3d, 0x657936f8}}, {@type={'type', 0x3d, "6d6d69c8"}}], [{@fsmagic={'fsmagic', 0x3d, 0x6be0}}, {@obj_type={'obj_type', 0x3d, '@%\'em1\x00'}}, {@euid_lt={'euid<', r0}}, {@fsuuid={'fsuuid', 0x3d, {[0x32, 0x36, 0x65, 0x64, 0x36, 0x64, 0x39, 0x30], 0x2d, [0x66, 0x61, 0x65, 0x37], 0x2d, [0x64, 0x62, 0x64, 0x30], 0x2d, [0x36, 0x37, 0x64, 0x35], 0x2d, [0x61, 0x61, 0x31, 0x63, 0x5a, 0x38, 0x63, 0x36]}}}, {@dont_appraise='dont_appraise'}]}) r1 = openat$md(0xffffffffffffff9c, &(0x7f0000000080)='/dev/md0\x00', 0x0, 0x0) ioctl$BLKALIGNOFF(r1, 0x127a, 0x0) ioctl$BLKPG(r1, 0x40140921, 0x0) [ 363.555491][T14958] hfs: unable to parse mount options 18:44:58 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) r3 = dup3(r2, r1, 0x0) r4 = eventfd(0x0) ioctl$KVM_HYPERV_EVENTFD(r3, 0x4018aebd, &(0x7f0000000100)={0x0, r4}) 18:44:58 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000000)={{0x1b, 0x5b, 0x7, 0x7, 0x0, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1068, 0x40}}, 0x40) 18:44:58 executing program 4: r0 = socket(0x11, 0x800000003, 0x0) getsockopt$packet_buf(r0, 0x107, 0x6, 0x0, &(0x7f0000000100)) 18:44:58 executing program 3: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000003980)={[{@noacl='noacl'}]}) 18:44:58 executing program 0: r0 = syz_open_dev$radio(&(0x7f0000000000)='/dev/radio#\x00', 0x2, 0x2) ioctl$VIDIOC_QUERY_EXT_CTRL(r0, 0xc0e85667, &(0x7f0000000080)={0x0, 0x100, "093210981618bc4db68094ababc9c5f378348c477565623d7d4579bf7eac6027"}) 18:44:58 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000000)={{0x1b, 0x5b, 0x7, 0x7, 0x0, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1068, 0x40}}, 0x40) 18:44:58 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) r3 = dup3(r2, r1, 0x0) r4 = eventfd(0x0) ioctl$KVM_HYPERV_EVENTFD(r3, 0x4018aebd, &(0x7f0000000100)={0x0, r4}) [ 363.859166][T14989] hfs: unable to parse mount options 18:44:58 executing program 5: statx(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x2000, 0x800, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0}) syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x9, 0x0, &(0x7f00000000c0), 0x200000, &(0x7f0000000240)={[{@part={'part', 0x3d, 0xa14}}, {@file_umask={'file_umask', 0x3d, 0x657936f8}}, {@type={'type', 0x3d, "6d6d69c8"}}], [{@fsmagic={'fsmagic', 0x3d, 0x6be0}}, {@obj_type={'obj_type', 0x3d, '@%\'em1\x00'}}, {@euid_lt={'euid<', r0}}, {@fsuuid={'fsuuid', 0x3d, {[0x32, 0x36, 0x65, 0x64, 0x36, 0x64, 0x39, 0x30], 0x2d, [0x66, 0x61, 0x65, 0x37], 0x2d, [0x64, 0x62, 0x64, 0x30], 0x2d, [0x36, 0x37, 0x64, 0x35], 0x2d, [0x61, 0x61, 0x31, 0x63, 0x5a, 0x38, 0x63, 0x36]}}}, {@dont_appraise='dont_appraise'}]}) r1 = openat$md(0xffffffffffffff9c, &(0x7f0000000080)='/dev/md0\x00', 0x0, 0x0) ioctl$BLKALIGNOFF(r1, 0x127a, &(0x7f00000000c0)) ioctl$BLKPG(0xffffffffffffffff, 0x40140921, 0x0) 18:44:58 executing program 0: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) pipe(0x0) fcntl$setpipe(r1, 0x407, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bind$inet(r2, &(0x7f0000000080)={0x2, 0x0, @local}, 0x10) connect$inet(r2, &(0x7f0000000040)={0x2, 0x0, @multicast1}, 0x10) splice(r0, 0x0, r2, 0x0, 0x30005, 0x0) setsockopt$inet_opts(r2, 0x0, 0x4, 0x0, 0x0) 18:44:58 executing program 4: socket$packet(0x11, 0x0, 0x300) r0 = socket$inet_udp(0x2, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet_opts(r0, 0x0, 0x4, 0x0, 0x0) 18:44:58 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000000)={{0x1b, 0x5b, 0x7, 0x7, 0x0, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1068, 0x40}}, 0x40) 18:44:58 executing program 3: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000003980)={[{@noacl='noacl'}]}) 18:44:59 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) r3 = dup3(r2, r1, 0x0) r4 = eventfd(0x0) ioctl$KVM_HYPERV_EVENTFD(r3, 0x4018aebd, &(0x7f0000000100)={0x0, r4}) 18:44:59 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000000)={{0x1b, 0x5b, 0x7, 0x7, 0x0, 0x3f, 0x37, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}}, 0x40) 18:44:59 executing program 4: socket$packet(0x11, 0x0, 0x300) r0 = socket$inet_udp(0x2, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet_opts(r0, 0x0, 0x4, 0x0, 0x0) [ 364.249086][T15026] hfs: unable to parse mount options 18:44:59 executing program 3: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000003980)={[{@noacl='noacl'}]}) 18:44:59 executing program 2: openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = dup3(r1, 0xffffffffffffffff, 0x0) r3 = eventfd(0x0) ioctl$KVM_HYPERV_EVENTFD(r2, 0x4018aebd, &(0x7f0000000100)={0x0, r3}) 18:44:59 executing program 5: statx(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x2000, 0x800, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0}) syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x9, 0x0, &(0x7f00000000c0), 0x200000, &(0x7f0000000240)={[{@part={'part', 0x3d, 0xa14}}, {@file_umask={'file_umask', 0x3d, 0x657936f8}}, {@type={'type', 0x3d, "6d6d69c8"}}], [{@fsmagic={'fsmagic', 0x3d, 0x6be0}}, {@obj_type={'obj_type', 0x3d, '@%\'em1\x00'}}, {@euid_lt={'euid<', r0}}, {@fsuuid={'fsuuid', 0x3d, {[0x32, 0x36, 0x65, 0x64, 0x36, 0x64, 0x39, 0x30], 0x2d, [0x66, 0x61, 0x65, 0x37], 0x2d, [0x64, 0x62, 0x64, 0x30], 0x2d, [0x36, 0x37, 0x64, 0x35], 0x2d, [0x61, 0x61, 0x31, 0x63, 0x5a, 0x38, 0x63, 0x36]}}}, {@dont_appraise='dont_appraise'}]}) r1 = openat$md(0xffffffffffffff9c, &(0x7f0000000080)='/dev/md0\x00', 0x0, 0x0) ioctl$BLKALIGNOFF(r1, 0x127a, &(0x7f00000000c0)) ioctl$BLKPG(0xffffffffffffffff, 0x40140921, 0x0) 18:44:59 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000000)={{0x1b, 0x5b, 0x7, 0x7, 0x0, 0x3f, 0x37, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}}, 0x40) 18:44:59 executing program 2: openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = dup3(r1, 0xffffffffffffffff, 0x0) r3 = eventfd(0x0) ioctl$KVM_HYPERV_EVENTFD(r2, 0x4018aebd, &(0x7f0000000100)={0x0, r3}) [ 364.657810][T15062] hfs: unable to parse mount options 18:44:59 executing program 0: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) lookup_dcookie(0x25, &(0x7f0000000080)=""/82, 0x52) 18:44:59 executing program 4: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) sendto$inet(r0, 0x0, 0x0, 0x200007fd, 0x0, 0x0) fremovexattr(r0, &(0x7f0000000040)=@known='trusted.overlay.impure\x00') sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x80000007ffffffe) 18:44:59 executing program 3: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 18:44:59 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000000)={{0x1b, 0x5b, 0x7, 0x7, 0x0, 0x3f, 0x37, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}}, 0x40) 18:44:59 executing program 2: openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = dup3(r1, 0xffffffffffffffff, 0x0) r3 = eventfd(0x0) ioctl$KVM_HYPERV_EVENTFD(r2, 0x4018aebd, &(0x7f0000000100)={0x0, r3}) 18:44:59 executing program 5: statx(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x2000, 0x800, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0}) syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x9, 0x0, &(0x7f00000000c0), 0x200000, &(0x7f0000000240)={[{@part={'part', 0x3d, 0xa14}}, {@file_umask={'file_umask', 0x3d, 0x657936f8}}, {@type={'type', 0x3d, "6d6d69c8"}}], [{@fsmagic={'fsmagic', 0x3d, 0x6be0}}, {@obj_type={'obj_type', 0x3d, '@%\'em1\x00'}}, {@euid_lt={'euid<', r0}}, {@fsuuid={'fsuuid', 0x3d, {[0x32, 0x36, 0x65, 0x64, 0x36, 0x64, 0x39, 0x30], 0x2d, [0x66, 0x61, 0x65, 0x37], 0x2d, [0x64, 0x62, 0x64, 0x30], 0x2d, [0x36, 0x37, 0x64, 0x35], 0x2d, [0x61, 0x61, 0x31, 0x63, 0x5a, 0x38, 0x63, 0x36]}}}, {@dont_appraise='dont_appraise'}]}) r1 = openat$md(0xffffffffffffff9c, &(0x7f0000000080)='/dev/md0\x00', 0x0, 0x0) ioctl$BLKALIGNOFF(r1, 0x127a, &(0x7f00000000c0)) ioctl$BLKPG(0xffffffffffffffff, 0x40140921, 0x0) [ 365.022999][T15089] hfs: unable to parse mount options 18:44:59 executing program 2: r0 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = dup3(r2, r0, 0x0) r4 = eventfd(0x0) ioctl$KVM_HYPERV_EVENTFD(r3, 0x4018aebd, &(0x7f0000000100)={0x0, r4}) 18:44:59 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000180)={0x26, 'aead\x00', 0x0, 0x0, 'rfc4309(aegis128-aesni)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x5, 0x0, 0x8) 18:44:59 executing program 0: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) socket$inet_icmp_raw(0x2, 0x3, 0x1) write(r1, &(0x7f00000001c0), 0xfffffef3) openat$procfs(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/bus/input/devices\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000200)={0x1ff}, 0x0, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528ac06}], 0x1, 0x0) [ 365.061175][T15094] gfs2: not a GFS2 filesystem 18:45:00 executing program 3: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 18:45:00 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=ANY=[]}, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$FS_IOC_FSGETXATTR(r0, 0x801c581f, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x7}) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r4 = ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0) r5 = eventfd(0x0) ioctl$KVM_IRQFD(0xffffffffffffffff, 0x4020ae76, &(0x7f0000000000)={r5}) ioctl$KVM_CREATE_IRQCHIP(r4, 0xae60) r6 = eventfd(0x0) ioctl$KVM_IRQFD(0xffffffffffffffff, 0x4020ae76, &(0x7f0000000000)) r7 = dup3(r4, r2, 0x0) ioctl$KVM_IRQFD(r7, 0x4020ae76, &(0x7f0000000080)={r6}) ioctl$DRM_IOCTL_MODE_PAGE_FLIP(0xffffffffffffffff, 0xc01864b0, &(0x7f0000000100)={0x1, 0x4, 0x0, 0xa2, 0x3}) 18:45:00 executing program 4: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) ioctl$FITRIM(r0, 0x6611, 0x0) 18:45:00 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000180)={0x26, 'aead\x00', 0x0, 0x0, 'rfc4309(aegis128-aesni)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x5, 0x0, 0x8) 18:45:00 executing program 2: r0 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = dup3(r2, r0, 0x0) r4 = eventfd(0x0) ioctl$KVM_HYPERV_EVENTFD(r3, 0x4018aebd, &(0x7f0000000100)={0x0, r4}) [ 365.351541][T15121] gfs2: not a GFS2 filesystem 18:45:00 executing program 4: r0 = syz_open_dev$radio(&(0x7f0000000000)='/dev/radio#\x00', 0x2, 0x2) ioctl$VIDIOC_QUERY_EXT_CTRL(r0, 0xc0e85667, &(0x7f0000000180)={0xddaf77e171d2abd1, 0x0, "093210981618bc4db68094ababc9c5ff0334ac477565623d7d4579bf7eac6027"}) 18:45:00 executing program 3: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 18:45:00 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000180)={0x26, 'aead\x00', 0x0, 0x0, 'rfc4309(aegis128-aesni)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x5, 0x0, 0x8) 18:45:00 executing program 2: r0 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = dup3(r2, r0, 0x0) r4 = eventfd(0x0) ioctl$KVM_HYPERV_EVENTFD(r3, 0x4018aebd, &(0x7f0000000100)={0x0, r4}) [ 365.618108][T15148] gfs2: not a GFS2 filesystem 18:45:00 executing program 3: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000003980)) 18:45:00 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000180)={0x26, 'aead\x00', 0x0, 0x0, 'rfc4309(aegis128-aesni)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x5, 0x0, 0x8) [ 365.796881][T15173] gfs2: not a GFS2 filesystem 18:45:01 executing program 5: openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snd/seq\x00', 0x4000) 18:45:01 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = gettid() process_vm_writev(r0, &(0x7f0000c22000)=[{&(0x7f000034afa4)=""/1, 0x7ffff000}], 0x3de, &(0x7f0000c22fa0)=[{&(0x7f0000000080)=""/1, 0x2034afa5}], 0x1, 0x0) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) sendfile(r1, 0xffffffffffffffff, 0x0, 0x81) 18:45:01 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) r4 = dup3(r3, r1, 0x0) r5 = eventfd(0x0) ioctl$KVM_HYPERV_EVENTFD(r4, 0x4018aebd, &(0x7f0000000100)={0x0, r5}) 18:45:01 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x5, 0x0, 0x8) 18:45:01 executing program 0: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) socket$inet_icmp_raw(0x2, 0x3, 0x1) write(r1, &(0x7f00000001c0), 0xfffffef3) openat$procfs(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/bus/input/devices\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000200)={0x1ff}, 0x0, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528ac06}], 0x1, 0x0) 18:45:01 executing program 3: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000003980)) 18:45:01 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x5, 0x0, 0x8) [ 366.308009][T15199] gfs2: not a GFS2 filesystem 18:45:01 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) r4 = dup3(r3, r1, 0x0) r5 = eventfd(0x0) ioctl$KVM_HYPERV_EVENTFD(r4, 0x4018aebd, &(0x7f0000000100)={0x0, r5}) 18:45:01 executing program 3: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000003980)) 18:45:01 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'aead\x00', 0x0, 0x0, 'aegis128-aesni\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x5, 0x0, 0x0) 18:45:01 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x5, 0x0, 0x8) 18:45:01 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) r4 = dup3(r3, r1, 0x0) r5 = eventfd(0x0) ioctl$KVM_HYPERV_EVENTFD(r4, 0x4018aebd, &(0x7f0000000100)={0x0, r5}) 18:45:01 executing program 1: bind$alg(0xffffffffffffffff, &(0x7f0000000180)={0x26, 'aead\x00', 0x0, 0x0, 'rfc4309(aegis128-aesni)\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x5, 0x0, 0x8) [ 366.653488][T15231] gfs2: not a GFS2 filesystem 18:45:01 executing program 1: bind$alg(0xffffffffffffffff, &(0x7f0000000180)={0x26, 'aead\x00', 0x0, 0x0, 'rfc4309(aegis128-aesni)\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x5, 0x0, 0x8) 18:45:01 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)={0x18, 0x22, 0x1, 0x0, 0x0, {0x4}, [@nested={0x4, 0xe}]}, 0x18}}, 0x0) 18:45:01 executing program 2: openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r0 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = dup3(r2, r0, 0x0) r4 = eventfd(0x0) ioctl$KVM_HYPERV_EVENTFD(r3, 0x4018aebd, &(0x7f0000000100)={0x0, r4}) 18:45:02 executing program 0: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$rdma_cm(0xffffffffffffff9c, 0x0, 0x2, 0x0) r0 = socket(0x11, 0x800000003, 0x0) getsockname$packet(r0, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000003c0)=0x10) bpf$BPF_GET_BTF_INFO(0xf, 0x0, 0x0) 18:45:02 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000000)={{0x1b, 0x5b, 0x7, 0x7, 0x0, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1063, 0x40}}, 0x40) 18:45:02 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = gettid() process_vm_writev(r0, &(0x7f0000c22000)=[{&(0x7f000034afa4)=""/1, 0x7ffff000}], 0x3de, &(0x7f0000c22fa0)=[{&(0x7f0000000080)=""/1, 0x2034afa5}], 0x1, 0x0) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) sendfile(r1, 0xffffffffffffffff, 0x0, 0x81) 18:45:02 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000180)={0x26, 'aead\x00', 0x0, 0x0, 'rfc4309(aegis128-aesni)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x5000) 18:45:02 executing program 1: bind$alg(0xffffffffffffffff, &(0x7f0000000180)={0x26, 'aead\x00', 0x0, 0x0, 'rfc4309(aegis128-aesni)\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x5, 0x0, 0x8) 18:45:02 executing program 2: openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r0 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = dup3(r2, r0, 0x0) r4 = eventfd(0x0) ioctl$KVM_HYPERV_EVENTFD(r3, 0x4018aebd, &(0x7f0000000100)={0x0, r4}) 18:45:02 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x4e20, @multicast1}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000030000000000000026d0000095002b000000000093adffa82255f674412d020000000000005ab527ee3697f57fe12ea7509e1fcff1ed4436f7054f26b0b3f4279e7b34603cdd37536bedf6ba6b34f981aa2563e96dda6d2afee33025a30b45bdcf1d273683626e00dc254d570dca6b78ad833488cfe4109ed2049edd0d69613d3cd61f00158e6eee8532151d72ab8abaa9652300000000000000cc587424363dc6ad7f3bbf424c6e6cafbe9309aaa218a52001a3cd753441f0db74596fa5388b7d2e13c504"], &(0x7f00002bf000)='syzkaller\x00', 0x4, 0x436, &(0x7f0000000040)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x5, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f0000000380)={r0, r1}) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = dup2(r3, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) sendmsg$rds(r2, &(0x7f0000002940)={0x0, 0x0, &(0x7f0000002800)=[{&(0x7f0000002980)=""/4112, 0x1010}], 0x1}, 0x0) write(r2, 0x0, 0x0) recvmmsg(r2, &(0x7f00000002c0), 0x3ffffff00000002, 0x0, 0x0) 18:45:02 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000180)={0x26, 'aead\x00', 0x0, 0x0, 'rfc4309(aegis128-aesni)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x5, 0x0, 0x8) 18:45:02 executing program 3: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setpriority(0x0, 0x0, 0x0) 18:45:02 executing program 2: openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r0 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = dup3(r2, r0, 0x0) r4 = eventfd(0x0) ioctl$KVM_HYPERV_EVENTFD(r3, 0x4018aebd, &(0x7f0000000100)={0x0, r4}) [ 367.514692][T15282] nf_conntrack: default automatic helper assignment has been turned off for security reasons and CT-based firewall rule not found. Use the iptables CT target to attach helpers instead. 18:45:02 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000180)={0x26, 'aead\x00', 0x0, 0x0, 'rfc4309(aegis128-aesni)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x5, 0x0, 0x8) 18:45:02 executing program 0: setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, &(0x7f0000000080)={{0x0, @dev, 0x0, 0x0, 'rr\x00', 0x0, 0x7}, {@empty}}, 0x44) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x268}], 0x0, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = creat(&(0x7f0000000280)='./file0\x00', 0x0) write$binfmt_elf64(r1, &(0x7f0000000080)=ANY=[], 0xce024b8b) 18:45:02 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) r4 = dup3(r3, r1, 0x0) r5 = eventfd(0x0) ioctl$KVM_HYPERV_EVENTFD(r4, 0x4018aebd, &(0x7f0000000100)={0x0, r5}) 18:45:02 executing program 3: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = gettid() process_vm_writev(r0, &(0x7f0000c22000)=[{&(0x7f000034afa4)=""/1, 0x7ffff000}], 0x3de, &(0x7f0000c22fa0)=[{&(0x7f0000000080)=""/1, 0x2034afa5}], 0x1, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) 18:45:02 executing program 4: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mlock2(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x0) 18:45:02 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000180)={0x26, 'aead\x00', 0x0, 0x0, 'rfc4309(aegis128-aesni)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x5, 0x0, 0x8) 18:45:02 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) r4 = dup3(r3, r1, 0x0) r5 = eventfd(0x0) ioctl$KVM_HYPERV_EVENTFD(r4, 0x4018aebd, &(0x7f0000000100)={0x0, r5}) [ 367.920891][T15304] FAT-fs (loop0): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 18:45:02 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x5, 0x0, 0x8) 18:45:03 executing program 5: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) ioctl$FITRIM(r0, 0x6612, 0x0) 18:45:03 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) r4 = dup3(r3, r1, 0x0) r5 = eventfd(0x0) ioctl$KVM_HYPERV_EVENTFD(r4, 0x4018aebd, &(0x7f0000000100)={0x0, r5}) 18:45:03 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x5, 0x0, 0x8) 18:45:03 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000000)={{0x1b, 0x5b, 0x7, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1063, 0x40}}, 0x40) 18:45:03 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB="3800000000000000290000000400000078040409000000c0073510fbffac00b408000000fab771172100000020001000004e5e000038802286006653282429c6faf0807d8906c82b5cf22ada9e4335ca229fe213d1af62b4f7660320177563c42107670e660000000000005265f999baa8636685f0b085adedbe57b985398d189fd88872b4e7eaf16be8b3a33a7722ab44"], 0x91}, 0x8000) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$FS_IOC_FSGETXATTR(r0, 0x801c581f, 0x0) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r4 = ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0) r5 = eventfd(0x0) ioctl$KVM_IRQFD(0xffffffffffffffff, 0x4020ae76, &(0x7f0000000000)={r5}) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_GROUP_ADD(r5, 0x40286608, &(0x7f00000000c0)={0x81, 0xc4a, 0xe11, 0x7fff, 0x2, 0x1}) ioctl$KVM_CREATE_IRQCHIP(r4, 0xae60) r6 = eventfd(0x0) ioctl$KVM_IRQFD(r4, 0x4020ae76, &(0x7f0000000000)) r7 = dup3(r4, r2, 0x0) ioctl$KVM_IRQFD(r7, 0x4020ae76, &(0x7f0000000080)={r6}) ioctl$DRM_IOCTL_MODE_PAGE_FLIP(r7, 0xc01864b0, &(0x7f0000000100)={0x1, 0x4, 0x0, 0xa2, 0x3}) [ 368.429864][ T27] audit: type=1804 audit(1585421103.230:31): pid=15333 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=ToMToU comm="syz-executor.0" name="/root/syzkaller-testdir058269571/syzkaller.JtFICr/149/file0/file0" dev="loop0" ino=32 res=1 18:45:03 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x4e20, @multicast1}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000030000000000000026d0000095002b000000000093adffa82255f674412d020000000000005ab527ee3697f57fe12ea7509e1fcff1ed4436f7054f26b0b3f4279e7b34603cdd37536bedf6ba6b34f981aa2563e96dda6d2afee33025a30b45bdcf1d273683626e00dc254d570dca6b78ad833488cfe4109ed2049edd0d69613d3cd61f00158e6eee8532151d72ab8abaa9652300000000000000cc587424363dc6ad7f3bbf424c6e6cafbe9309aaa218a52001a3cd753441f0db74596fa5388b7d2e13c504"], &(0x7f00002bf000)='syzkaller\x00', 0x4, 0x436, &(0x7f0000000040)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x5, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f0000000380)={r0, r1}) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = dup2(r3, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) sendmsg$rds(r2, &(0x7f0000002940)={0x0, 0x0, &(0x7f0000002800)=[{&(0x7f0000002980)=""/4112, 0x1010}], 0x1}, 0x0) write(r2, 0x0, 0x0) recvmmsg(r2, &(0x7f00000002c0), 0x3ffffff00000004, 0x0, 0x0) 18:45:03 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x5, 0x0, 0x8) 18:45:03 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) r3 = dup3(r2, r1, 0x0) r4 = eventfd(0x0) ioctl$KVM_HYPERV_EVENTFD(r3, 0x4018aebd, &(0x7f0000000100)={0x0, r4}) 18:45:03 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000000)={{0x1b, 0x5b, 0x7, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1063, 0x40}}, 0x40) 18:45:03 executing program 5: r0 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fb0\x00', 0x501, 0x0) ioctl$FITRIM(r0, 0xc0185879, 0x0) [ 368.739096][ T21] FAT-fs (loop0): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 18:45:03 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000180)={0x26, 'aead\x00', 0x0, 0x0, 'rfc4309(aegis128-aesni)\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x5, 0x0, 0x8) 18:45:03 executing program 5: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$packet(0x11, 0x0, 0x300) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, 0x0, 0x0) r3 = socket$inet_udp(0x2, 0x2, 0x0) pipe(0x0) ioctl$RTC_EPOCH_SET(0xffffffffffffffff, 0x4008700e, 0x5a6) fcntl$setpipe(r1, 0x407, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_KEY_STATUS(0xffffffffffffffff, 0xc080661a, &(0x7f0000000180)={{0x2, 0x0, @descriptor="da4f84255a804e16"}}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000240)='/proc/sysvipc/msg\x00', 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_wireguard(r2, 0x8933, &(0x7f0000000100)={'wg0\x00', 0x0}) ioctl$sock_inet6_SIOCSIFADDR(r4, 0x8916, &(0x7f0000000140)={@empty, 0x5f, r5}) bind$inet(r3, &(0x7f0000000080)={0x2, 0x0, @local}, 0x10) connect$inet(r3, &(0x7f0000000040)={0x2, 0x0, @multicast1}, 0x10) splice(r0, 0x0, r3, 0x0, 0x30005, 0x0) setsockopt$inet_opts(r3, 0x0, 0x4, 0x0, 0x0) 18:45:03 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet_opts(r0, 0x0, 0x4, 0x0, 0x0) 18:45:03 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB="3800000000000000290000000400000078040409000000c0073510fbffac00b408000000fab771172100000020001000004e5e000038802286006653282429c6faf0807d8906c82b5cf22ada9e4335ca229fe213d1af62b4f7660320177563c42107670e660000000000005265f999baa8636685f0b085adedbe57b985398d189fd88872b4e7eaf16be8b3a33a7722ab44"], 0x91}, 0x8000) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$FS_IOC_FSGETXATTR(r0, 0x801c581f, 0x0) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r4 = ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0) r5 = eventfd(0x0) ioctl$KVM_IRQFD(0xffffffffffffffff, 0x4020ae76, &(0x7f0000000000)={r5}) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_GROUP_ADD(r5, 0x40286608, &(0x7f00000000c0)={0x81, 0xc4a, 0xe11, 0x7fff, 0x2, 0x1}) ioctl$KVM_CREATE_IRQCHIP(r4, 0xae60) r6 = eventfd(0x0) ioctl$KVM_IRQFD(r4, 0x4020ae76, &(0x7f0000000000)) r7 = dup3(r4, r2, 0x0) ioctl$KVM_IRQFD(r7, 0x4020ae76, &(0x7f0000000080)={r6}) ioctl$DRM_IOCTL_MODE_PAGE_FLIP(r7, 0xc01864b0, &(0x7f0000000100)={0x1, 0x4, 0x0, 0xa2, 0x3}) 18:45:03 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) r3 = dup3(r2, r1, 0x0) r4 = eventfd(0x0) ioctl$KVM_HYPERV_EVENTFD(r3, 0x4018aebd, &(0x7f0000000100)={0x0, r4}) 18:45:03 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000180)={0x26, 'aead\x00', 0x0, 0x0, 'rfc4309(aegis128-aesni)\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x5, 0x0, 0x8) 18:45:03 executing program 4: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller1\x00', 0x420000015001}) r1 = socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000140)={'syzkaller1\x00', {0x7, 0x0, @empty}}) ioctl$TUNSETVNETBE(r0, 0x400454de, &(0x7f0000000000)=0x1) write$tun(r0, &(0x7f00000003c0)=ANY=[@ANYBLOB="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"/296], 0xfdef) [ 369.061643][T15377] nf_conntrack: default automatic helper assignment has been turned off for security reasons and CT-based firewall rule not found. Use the iptables CT target to attach helpers instead. 18:45:04 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x4e20, @multicast1}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000030000000000000026d0000095002b000000000093adffa82255f674412d020000000000005ab527ee3697f57fe12ea7509e1fcff1ed4436f7054f26b0b3f4279e7b34603cdd37536bedf6ba6b34f981aa2563e96dda6d2afee33025a30b45bdcf1d273683626e00dc254d570dca6b78ad833488cfe4109ed2049edd0d69613d3cd61f00158e6eee8532151d72ab8abaa9652300000000000000cc587424363dc6ad7f3bbf424c6e6cafbe9309aaa218a52001a3cd753441f0db74596fa5388b7d2e13c504"], &(0x7f00002bf000)='syzkaller\x00', 0x4, 0x436, &(0x7f0000000040)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x5, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f0000000380)={r0, r1}) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = dup2(r3, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) sendmsg$rds(r2, &(0x7f0000002940)={0x0, 0x0, &(0x7f0000002800)=[{&(0x7f0000002980)=""/4112, 0x1010}], 0x1}, 0x0) write(r2, 0x0, 0x0) recvmmsg(r2, &(0x7f00000002c0), 0x3ffffff00000004, 0x0, 0x0) 18:45:04 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000180)={0x26, 'aead\x00', 0x0, 0x0, 'rfc4309(aegis128-aesni)\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x5, 0x0, 0x8) 18:45:04 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) r3 = dup3(r2, r1, 0x0) r4 = eventfd(0x0) ioctl$KVM_HYPERV_EVENTFD(r3, 0x4018aebd, &(0x7f0000000100)={0x0, r4}) 18:45:04 executing program 1: r0 = getpid() sched_setscheduler(r0, 0x0, &(0x7f00000001c0)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) sendmsg$FOU_CMD_GET(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000100)=ANY=[@ANYBLOB="0300000000000800000400000000e9ca"], 0x1}}, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f00000000c0)=[@textreal={0x8, &(0x7f0000000080)="baa100b000eef36cba2100ec66b9800000c00f326635001000000f30bad104ecc80080d267d9f8f30f1bb429000f20c06635200000000f22c067f3af", 0x3c}], 0x1, 0x0, 0x0, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x1000, &(0x7f0000000000/0x1000)=nil}) ioctl$KVM_SET_REGS(r3, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff], 0x1f000}) ioctl$KVM_RUN(r3, 0xae80, 0x0) 18:45:04 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB="3800000000000000290000000400000078040409000000c0073510fbffac00b408000000fab771172100000020001000004e5e000038802286006653282429c6faf0807d8906c82b5cf22ada9e4335ca229fe213d1af62b4f7660320177563c42107670e660000000000005265f999baa8636685f0b085adedbe57b985398d189fd88872b4e7eaf16be8b3a33a7722ab44"], 0x91}, 0x8000) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$FS_IOC_FSGETXATTR(r0, 0x801c581f, 0x0) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r4 = ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0) r5 = eventfd(0x0) ioctl$KVM_IRQFD(0xffffffffffffffff, 0x4020ae76, &(0x7f0000000000)={r5}) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_GROUP_ADD(r5, 0x40286608, &(0x7f00000000c0)={0x81, 0xc4a, 0xe11, 0x7fff, 0x2, 0x1}) ioctl$KVM_CREATE_IRQCHIP(r4, 0xae60) r6 = eventfd(0x0) ioctl$KVM_IRQFD(r4, 0x4020ae76, &(0x7f0000000000)) r7 = dup3(r4, r2, 0x0) ioctl$KVM_IRQFD(r7, 0x4020ae76, &(0x7f0000000080)={r6}) ioctl$DRM_IOCTL_MODE_PAGE_FLIP(r7, 0xc01864b0, &(0x7f0000000100)={0x1, 0x4, 0x0, 0xa2, 0x3}) 18:45:04 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) r3 = dup3(0xffffffffffffffff, r1, 0x0) r4 = eventfd(0x0) ioctl$KVM_HYPERV_EVENTFD(r3, 0x4018aebd, &(0x7f0000000100)={0x0, r4}) 18:45:04 executing program 5: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) ioctl$FITRIM(0xffffffffffffffff, 0xc0185879, 0x0) ioctl$FITRIM(r0, 0xc0185879, &(0x7f00000000c0)={0x0, 0xffffffff}) 18:45:04 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) r3 = dup3(0xffffffffffffffff, r1, 0x0) r4 = eventfd(0x0) ioctl$KVM_HYPERV_EVENTFD(r3, 0x4018aebd, &(0x7f0000000100)={0x0, r4}) 18:45:04 executing program 1: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f00000004c0)='net/ipv6_route\x00') ioctl$RTC_WKALM_RD(0xffffffffffffffff, 0x80287010, 0x0) msgsnd(0x0, &(0x7f0000000140)=ANY=[@ANYBLOB="cc"], 0x1, 0x0) write$RDMA_USER_CM_CMD_LISTEN(0xffffffffffffffff, &(0x7f0000000140)={0x7, 0x8}, 0x10) 18:45:04 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB="3800000000000000290000000400000078040409000000c0073510fbffac00b408000000fab771172100000020001000004e5e000038802286006653282429c6faf0807d8906c82b5cf22ada9e4335ca229fe213d1af62b4f7660320177563c42107670e660000000000005265f999baa8636685f0b085adedbe57b985398d189fd88872b4e7eaf16be8b3a33a7722ab44"], 0x91}, 0x8000) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$FS_IOC_FSGETXATTR(r0, 0x801c581f, 0x0) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r4 = ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0) r5 = eventfd(0x0) ioctl$KVM_IRQFD(0xffffffffffffffff, 0x4020ae76, &(0x7f0000000000)={r5}) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_GROUP_ADD(r5, 0x40286608, &(0x7f00000000c0)={0x81, 0xc4a, 0xe11, 0x7fff, 0x2, 0x1}) ioctl$KVM_CREATE_IRQCHIP(r4, 0xae60) r6 = eventfd(0x0) ioctl$KVM_IRQFD(r4, 0x4020ae76, &(0x7f0000000000)) r7 = dup3(r4, r2, 0x0) ioctl$KVM_IRQFD(r7, 0x4020ae76, &(0x7f0000000080)={r6}) ioctl$DRM_IOCTL_MODE_PAGE_FLIP(r7, 0xc01864b0, &(0x7f0000000100)={0x1, 0x4, 0x0, 0xa2, 0x3}) 18:45:05 executing program 0: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mlock2(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x0) 18:45:05 executing program 4: ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x541b, &(0x7f0000000700)={'macsec0\x00', @broadcast}) recvmsg(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, &(0x7f00000008c0)=[{0x0}], 0x1, &(0x7f0000000940)=""/186, 0xba}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) close(0xffffffffffffffff) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000b80)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x374}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1ff}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r0, 0x18000000000002a0, 0x26, 0x0, &(0x7f00000006c0)="b9ff031a000d698cb89e40f02cead5dc57ee41dea43e63a377fb7f11c72be949eb4be1977d48", 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) close(0xffffffffffffffff) 18:45:05 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) r3 = dup3(0xffffffffffffffff, r1, 0x0) r4 = eventfd(0x0) ioctl$KVM_HYPERV_EVENTFD(r3, 0x4018aebd, &(0x7f0000000100)={0x0, r4}) 18:45:05 executing program 1: r0 = socket$kcm(0x2, 0x200000000000001, 0x0) sendmsg$inet(r0, &(0x7f0000000fc0)={&(0x7f0000000000)={0x2, 0x0, @remote}, 0x10, 0x0}, 0x24000844) recvmsg(r0, &(0x7f0000007580)={0x0, 0x0, 0x0}, 0x0) 18:45:05 executing program 5: r0 = socket$kcm(0xa, 0x802, 0x88) sendmsg$kcm(r0, &(0x7f0000000240)={&(0x7f0000000080)=@in6={0xa, 0x4e24, 0x0, @loopback}, 0x80, 0x0}, 0x8000) gettid() perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={&(0x7f0000000100)=@nl=@unspec={0x871f000000000000, 0x2a77, 0xfc90009}, 0x300, &(0x7f0000000040)=[{&(0x7f0000000280), 0xff8f}], 0x1, &(0x7f0000001280)}, 0xb80b) r1 = socket$kcm(0xa, 0x802, 0x88) sendmsg$kcm(r1, &(0x7f0000000240)={&(0x7f0000000080)=@in6={0xa, 0x4e24, 0x0, @mcast2}, 0x80, 0x0}, 0x8000) sendmsg$kcm(r1, &(0x7f0000000000)={&(0x7f0000000100)=@nl=@unspec={0x871f000000000000, 0x2a77, 0xfc90009}, 0x300, &(0x7f0000000040)=[{&(0x7f0000000280), 0xff8f}], 0x1, &(0x7f0000001280)}, 0x0) 18:45:05 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$kcm(0x10, 0x800000000002, 0x0) perf_event_open(&(0x7f0000000100)={0x2, 0x70, 0x615, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000080)) socketpair(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair(0x0, 0x0, 0x0, &(0x7f0000000000)) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8946, &(0x7f0000000340)='lo\x00\x96o\xd6Q\xb1Y\xa9\xc8J,`\xd2\x98\x00\x00\x00 ') 18:45:05 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB="3800000000000000290000000400000078040409000000c0073510fbffac00b408000000fab771172100000020001000004e5e000038802286006653282429c6faf0807d8906c82b5cf22ada9e4335ca229fe213d1af62b4f7660320177563c42107670e660000000000005265f999baa8636685f0b085adedbe57b985398d189fd88872b4e7eaf16be8b3a33a7722ab44"], 0x91}, 0x8000) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$FS_IOC_FSGETXATTR(r0, 0x801c581f, 0x0) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r4 = ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0) r5 = eventfd(0x0) ioctl$KVM_IRQFD(0xffffffffffffffff, 0x4020ae76, &(0x7f0000000000)={r5}) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_GROUP_ADD(r5, 0x40286608, &(0x7f00000000c0)={0x81, 0xc4a, 0xe11, 0x7fff, 0x2, 0x1}) ioctl$KVM_CREATE_IRQCHIP(r4, 0xae60) r6 = eventfd(0x0) ioctl$KVM_IRQFD(r4, 0x4020ae76, &(0x7f0000000000)) r7 = dup3(r4, r2, 0x0) ioctl$KVM_IRQFD(r7, 0x4020ae76, &(0x7f0000000080)={r6}) 18:45:05 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)={0x48, 0x2, 0x6, 0x5, 0xa, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_TYPENAME={0xd, 0x3, 'hash:net\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}]}, 0x48}}, 0x0) 18:45:05 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = dup3(r2, 0xffffffffffffffff, 0x0) r4 = eventfd(0x0) ioctl$KVM_HYPERV_EVENTFD(r3, 0x4018aebd, &(0x7f0000000100)={0x0, r4}) 18:45:05 executing program 5: r0 = socket$inet6(0xa, 0x802, 0x0) setsockopt$inet6_buf(r0, 0x29, 0x39, &(0x7f0000068fe8)="ff0204000000000100000000000000000000000000000205", 0x18) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f00004d4fe4)={0xa, 0x4e20, 0x0, @dev}, 0x1c) 18:45:06 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000003e40)={0x17, 0x0, 0x75, 0x1}, 0x3c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={r1, 0x0}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={r1, 0x0, &(0x7f0000000280)}, 0x20) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000040)=r1, 0x4) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x18000000000002e0, 0xe10, 0x0, &(0x7f00000004c0)="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", 0x0, 0xfd, 0x6000000000000000, 0xfffffffffffffe7e, 0x1d4}, 0x28) 18:45:06 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e0000002c008151e00f80ecdb4cb904054865160b00010004000100000c00190e00060000000001000000000300", 0x2e}], 0x1}, 0x0) 18:45:06 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB="3800000000000000290000000400000078040409000000c0073510fbffac00b408000000fab771172100000020001000004e5e000038802286006653282429c6faf0807d8906c82b5cf22ada9e4335ca229fe213d1af62b4f7660320177563c42107670e660000000000005265f999baa8636685f0b085adedbe57b985398d189fd88872b4e7eaf16be8b3a33a7722ab44"], 0x91}, 0x8000) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$FS_IOC_FSGETXATTR(r0, 0x801c581f, 0x0) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r4 = ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0) r5 = eventfd(0x0) ioctl$KVM_IRQFD(0xffffffffffffffff, 0x4020ae76, &(0x7f0000000000)={r5}) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_GROUP_ADD(r5, 0x40286608, &(0x7f00000000c0)={0x81, 0xc4a, 0xe11, 0x7fff, 0x2, 0x1}) ioctl$KVM_CREATE_IRQCHIP(r4, 0xae60) r6 = eventfd(0x0) ioctl$KVM_IRQFD(r4, 0x4020ae76, &(0x7f0000000000)) r7 = dup3(r4, r2, 0x0) ioctl$KVM_IRQFD(r7, 0x4020ae76, &(0x7f0000000080)={r6}) 18:45:06 executing program 4: ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x541b, &(0x7f0000000700)={'macsec0\x00', @broadcast}) recvmsg(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, &(0x7f00000008c0)=[{0x0}], 0x1, &(0x7f0000000940)=""/186, 0xba}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) close(0xffffffffffffffff) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000b80)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000eeffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400050000000404000001007d60b7030000000000007a0a00fe00000000850000000d000000b70000000000000095000000000000001c26d2bff0fa454225b2efe59bb842889c95ef1ba79618689974e65251a831de1911e7ce9427b8fe59cc6bf6d3d8e0d9a32d87a43133851864cf48cbb64f52c8197a991a5ad5b2b132abe5a4ff9e3d04d6bd832c0cd77ee508b4f79ce77748c4d0f7074eb8fc284872b4dcc8c365d99548b4fc3d8640f90c0c6b060f2a67d98f03848c8e3868229bba8647ca373da549ae6c972806fc7de1d287ed25f137d95275fbd100dd1046e9b0febe762635bd20f62a827bc127fd8969a01c5a6deca9cedd561e7d955df8a6cda5047fbead7ee7e76d4b870024b85bfc7f64b4d1a13e79c4fb0b7773bc90cb99eded466d80b3843327277c3727ab0f1373f4effda7e880eb5e807e180dd7b2b87ffd5f455dd7ec613366c646f31b60e7197f04403a0382ad7b10ec0750914550713acbf4227d0ac1bc4b4cc097a2a902d050f439ac617e25d0937ed80abb39ee2fa21394026993e4d3ff80ad720000000000000000"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x374}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1ff}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r0, 0x18000000000002a0, 0x26, 0x0, &(0x7f00000006c0)="b9ff031a000d698cb89e40f02cead5dc57ee41dea43e63a377fb7f11c72be949eb4be1977d48", 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) close(0xffffffffffffffff) 18:45:06 executing program 5: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x2, 0x200000000000001, 0x0) sendmsg$inet(r1, &(0x7f0000000fc0)={&(0x7f0000000000)={0x2, 0x4001, @remote}, 0x10, 0x0}, 0x24000844) close(r1) 18:45:06 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = dup3(r2, 0xffffffffffffffff, 0x0) r4 = eventfd(0x0) ioctl$KVM_HYPERV_EVENTFD(r3, 0x4018aebd, &(0x7f0000000100)={0x0, r4}) 18:45:06 executing program 1: r0 = socket$kcm(0x11, 0x200000000000002, 0x300) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x5, &(0x7f0000000240)=ANY=[@ANYBLOB="bf16000000000000b70700000100f0ff5070000000000000480000000800000095000000000000002ba7e1d30cb599e83f24a3aa81d36bb7019c13bd23212fb56f040026fbfefc41056bdc17487902317142fac7e78ce74a2c75a7be168c1886d0d4d94f2f4e345c652fbc1626cca2a28d35806151ee988e6e06c8cedf7ceb9fc404000000c588b277beee1cbf9b0a4def23d410f6accd3641110bec4e90a6341865c3f5ab3e89cf6c662ed4148d3b3e22278d00031e5388ee5c867de2c6211d6ececb0cd2b6d357b8580218ce7400dae15cb7947c491b8bc46b8eda1868720000074e468ee23fd2f73902ebcfcf498227759800011b405b433a8acd715f5888b2007f0000000000000000010000000000000600000000309329170ee5b56780260ed606a10f58fa64533500000000000000000000000031000000000000000008e75a89faffbfb11b7dc6ea31001e846c12423a169f87463ad6f7c2e8ee1a39244960b318778f2a047f6d5bc24fef5d7d617de7a6520655a80d0900f4d433623c850af895abba14f6fbd7fbad2a431ab9142f3a06d54740a4bc5e32bd378af7c9676a08e774c487e32d198e7e5bb395b4ec7bf48cabecead649f96ea24d32872c494360cb5d46ce680eeb80157eb23f9902519a693b85c655fa73103170cbc496d7122051385e7e87a2db762cbb253fbd76b9117c1a11d18aa21a0c5f0c28999a639c0376678be35ffe91ff799a11d9b219c00c369a12bf8685b862d0dbdd956cbda1bae489bcef5ae59136aaacc59608f4d4e6067338b521a0f2e2467a6c435ad5b800262a5da053ced5e95394e500000072737638ac44fb61310e2df511c60b3c88113996a81fb64bce5eb95ce91738640ff7ae6ed6b62086e699955926934389cdf9bc99473ffd86fe9ce05268bf8a3958f2206cdc7095682c14f10be1075832956762b2dcc6251e7b4c11c58217bf84d263e8778e6e8ffe4ea50b076446f35efffc806b340658342d2d9e1ef68c6ef3e98407d2fcefb34a5eae871903ece51c895ddbb76122b1222e4da37177fe833e4fcaa67997e92a206ebd085bd9f9ce91d3fdd50fefe6c1dc0e302789aca24a890664ec56e5a17f45ba5e8bd311a40030d5c1ce75ffff996a80153ac677bb43f8a63dd390d18f0239b41da1a52383a4c6768ca1bb66b8fb3c5000f6f246df20356ae073b1df08ae2c268b0073bb99d88d741a5546e76caf4b6b1387ff37ec13d262dae0260be74cdf7bb6d3107597430ef5bbd476bb9d69b2aef9f3cb644b939daf2a45e7c50782c7aa055dd066fd0fffe3c66f5c343afb78a7cfd852f3e05c089887d7df2ff4f9982030019421af6b78ff9c444a17091875cfe4eab0e7f5c635d8d646c885f820ce59ecc731deba3998c27b815f7b0acba754c01ed8bf1bbac14da8c6a2b966d861f9dd547abf817063b549adefcc925909f6d9e72e9b15e5603eb5f80b58fd76e45d249401307e3a0df2bc46c84799aa792cdaeb6cfb858e577dacff607ba513250e13ae696cd6ed7d318190a93b96e07927efca6b8d1f5980994690bbe002db5146439d906a0d4a879600c361f84202ef065214b15666cdca81091b69acee2c7ce0821fc19e0891f0b53469f935c5ac4218eeff5f2d23a430fa44c30ce84b93c97a23e6c97953faf4420638489e6a6ded6d8c414a87b652b95278e99b06dbb6be1557951854c01dbc2d061827ae6349a045b780893771524a424335b9fc34612f6ee9f09141057262530b7c2f7c9b969938779736ece7b470078ac0b1b4b528000000009866e9994ca9096672ec9f3800c2fc35ba6516e542624c47bdba76a816c3a3dd6c3fa87a3ec91df199a9af91a7babf2b8d0e7b77e6dfb4bbc98114d3edb920ae3052016969dda57847b7054f7b097efba91dfdf40f"], &(0x7f0000000140)='GPL\x00'}, 0x48) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000180)=r1, 0x4) r2 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r3, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="2e48000024000705d21b80788c63940d0424fc60100011400a2f034f051982c1375b3e37096b088000f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x20000000}, 0x0) 18:45:06 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0xe6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000000c0)="2e000000360081aee4050cecff0e00fa378b25db4cb904e473730e55cff26d1b0e001200030000005e510befccd7", 0x2e}], 0x1, 0x0, 0x0, 0x88a8ffff00000000}, 0x0) 18:45:06 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB="3800000000000000290000000400000078040409000000c0073510fbffac00b408000000fab771172100000020001000004e5e000038802286006653282429c6faf0807d8906c82b5cf22ada9e4335ca229fe213d1af62b4f7660320177563c42107670e660000000000005265f999baa8636685f0b085adedbe57b985398d189fd88872b4e7eaf16be8b3a33a7722ab44"], 0x91}, 0x8000) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$FS_IOC_FSGETXATTR(r0, 0x801c581f, 0x0) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r4 = ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0) r5 = eventfd(0x0) ioctl$KVM_IRQFD(0xffffffffffffffff, 0x4020ae76, &(0x7f0000000000)={r5}) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_GROUP_ADD(r5, 0x40286608, &(0x7f00000000c0)={0x81, 0xc4a, 0xe11, 0x7fff, 0x2, 0x1}) ioctl$KVM_CREATE_IRQCHIP(r4, 0xae60) r6 = eventfd(0x0) ioctl$KVM_IRQFD(r4, 0x4020ae76, &(0x7f0000000000)) r7 = dup3(r4, r2, 0x0) ioctl$KVM_IRQFD(r7, 0x4020ae76, &(0x7f0000000080)={r6}) [ 371.975130][T15576] selinux_netlink_send: 5 callbacks suppressed [ 371.975148][T15576] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=54 sclass=netlink_route_socket pid=15576 comm=syz-executor.0 [ 372.032903][T15578] netlink: 18442 bytes leftover after parsing attributes in process `syz-executor.1'. 18:45:06 executing program 5: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0xa, 0x802, 0x88) sendmsg$kcm(r1, &(0x7f0000000240)={&(0x7f0000000080)=@in6={0xa, 0x4e24, 0x0, @mcast2}, 0x80, 0x0}, 0x8000) write$cgroup_subtree(r1, 0x0, 0x0) 18:45:07 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = dup3(r2, 0xffffffffffffffff, 0x0) r4 = eventfd(0x0) ioctl$KVM_HYPERV_EVENTFD(r3, 0x4018aebd, &(0x7f0000000100)={0x0, r4}) 18:45:07 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB="3800000000000000290000000400000078040409000000c0073510fbffac00b408000000fab771172100000020001000004e5e000038802286006653282429c6faf0807d8906c82b5cf22ada9e4335ca229fe213d1af62b4f7660320177563c42107670e660000000000005265f999baa8636685f0b085adedbe57b985398d189fd88872b4e7eaf16be8b3a33a7722ab44"], 0x91}, 0x8000) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$FS_IOC_FSGETXATTR(r0, 0x801c581f, 0x0) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r4 = ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0) r5 = eventfd(0x0) ioctl$KVM_IRQFD(0xffffffffffffffff, 0x4020ae76, &(0x7f0000000000)={r5}) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_GROUP_ADD(r5, 0x40286608, &(0x7f00000000c0)={0x81, 0xc4a, 0xe11, 0x7fff, 0x2, 0x1}) ioctl$KVM_CREATE_IRQCHIP(r4, 0xae60) eventfd(0x0) ioctl$KVM_IRQFD(r4, 0x4020ae76, &(0x7f0000000000)) r6 = dup3(r4, r2, 0x0) ioctl$DRM_IOCTL_MODE_PAGE_FLIP(r6, 0xc01864b0, &(0x7f0000000100)={0x1, 0x4, 0x0, 0xa2, 0x3}) 18:45:07 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0xe6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000000c0)="2e000000360081aee4050cecff0e00fa378b25db4cb904e473730e55cff26d1b0e001200030000005e510befccd7", 0x2e}], 0x1, 0x0, 0x0, 0x88a8ffff00000000}, 0x0) [ 372.345828][T15613] netlink: 18442 bytes leftover after parsing attributes in process `syz-executor.1'. 18:45:07 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) write$cgroup_int(r0, &(0x7f0000000140), 0x12) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) [ 372.441599][T15613] sysfs: cannot create duplicate filename '/class/ieee80211/ [ 372.441599][T15613] !O‚Á7[>7' [ 372.520002][T15628] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=54 sclass=netlink_route_socket pid=15628 comm=syz-executor.0 [ 372.537572][T15613] CPU: 1 PID: 15613 Comm: syz-executor.1 Not tainted 5.6.0-rc7-syzkaller #0 [ 372.546294][T15613] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 372.556366][T15613] Call Trace: [ 372.559715][T15613] dump_stack+0x188/0x20d [ 372.564098][T15613] sysfs_warn_dup.cold+0x1c/0x2d [ 372.569065][T15613] sysfs_do_create_link_sd.isra.0+0x119/0x130 [ 372.575162][T15613] sysfs_create_link+0x61/0xc0 [ 372.580019][T15613] device_add+0x71c/0x1bc0 [ 372.584516][T15613] ? __alloc_pages_nodemask+0x5fc/0x820 [ 372.590082][T15613] ? uevent_show+0x360/0x360 [ 372.594781][T15613] ? ieee80211_set_bitrate_flags+0x20b/0x5c0 [ 372.600796][T15613] wiphy_register+0x1c46/0x2720 [ 372.605693][T15613] ? wiphy_unregister+0xf90/0xf90 [ 372.610766][T15613] ? __kmalloc+0x629/0x7a0 [ 372.615283][T15613] ? ieee80211_register_hw+0xbea/0x3760 [ 372.620885][T15613] ? ieee80211_cs_list_valid+0x198/0x280 [ 372.626714][T15613] ieee80211_register_hw+0x141d/0x3760 [ 372.632212][T15613] ? ieee80211_ifa_changed+0xdc0/0xdc0 [ 372.637698][T15613] ? rcu_read_lock_sched_held+0x9c/0xd0 [ 372.643240][T15613] ? rcu_read_lock_any_held.part.0+0x50/0x50 [ 372.649239][T15613] ? memset+0x20/0x40 [ 372.653285][T15613] ? __hrtimer_init+0x134/0x260 [ 372.659670][T15613] mac80211_hwsim_new_radio+0x2187/0x43d0 [ 372.665388][T15613] ? vprintk_func+0x81/0x17e [ 372.670013][T15613] ? hwsim_register_received_nl+0x400/0x400 [ 372.675930][T15613] hwsim_new_radio_nl+0x905/0xf60 [ 372.680976][T15613] ? mac80211_hwsim_new_radio+0x43d0/0x43d0 [ 372.686899][T15613] ? cap_capable+0x1eb/0x250 [ 372.691563][T15613] ? genl_family_rcv_msg_attrs_parse+0x1bd/0x320 [ 372.697900][T15613] ? genl_family_rcv_msg_attrs_parse+0x1c7/0x320 [ 372.704258][T15613] genl_rcv_msg+0x627/0xdf0 [ 372.708777][T15613] ? genl_family_rcv_msg_attrs_parse+0x320/0x320 [ 372.715143][T15613] ? __kasan_kmalloc.constprop.0+0xbf/0xd0 [ 372.721003][T15613] netlink_rcv_skb+0x15a/0x410 [ 372.726127][T15613] ? genl_family_rcv_msg_attrs_parse+0x320/0x320 [ 372.732465][T15613] ? netlink_ack+0xa10/0xa10 [ 372.737099][T15613] genl_rcv+0x24/0x40 [ 372.741075][T15613] netlink_unicast+0x537/0x740 [ 372.745852][T15613] ? netlink_attachskb+0x810/0x810 [ 372.751024][T15613] ? _copy_from_iter_full+0x25c/0x870 [ 372.756409][T15613] netlink_sendmsg+0x882/0xe10 [ 372.761187][T15613] ? netlink_unicast+0x740/0x740 [ 372.766147][T15613] ? netlink_unicast+0x740/0x740 [ 372.771142][T15613] sock_sendmsg+0xcf/0x120 [ 372.775557][T15613] ____sys_sendmsg+0x6b9/0x7d0 [ 372.782352][T15613] ? kernel_sendmsg+0x50/0x50 [ 372.787118][T15613] ? mark_lock+0xbc/0x1220 [ 372.791675][T15613] ___sys_sendmsg+0x100/0x170 [ 372.796376][T15613] ? sendmsg_copy_msghdr+0x70/0x70 [ 372.801601][T15613] ? __fget_files+0x329/0x4f0 [ 372.806419][T15613] ? ksys_dup3+0x3c0/0x3c0 [ 372.810830][T15613] ? lock_acquire+0x197/0x420 [ 372.815562][T15613] ? __might_fault+0xef/0x1d0 [ 372.820252][T15613] ? __fget_light+0x208/0x270 [ 372.825052][T15613] __sys_sendmsg+0xec/0x1b0 [ 372.829574][T15613] ? __sys_sendmsg_sock+0xb0/0xb0 [ 372.834834][T15613] ? __x64_sys_futex+0x380/0x4f0 [ 372.839842][T15613] ? trace_hardirqs_off_caller+0x55/0x230 [ 372.845836][T15613] ? do_syscall_64+0x21/0x7d0 [ 372.850811][T15613] do_syscall_64+0xf6/0x7d0 [ 372.855460][T15613] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 372.861449][T15613] RIP: 0033:0x45c849 18:45:07 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) dup3(r3, r1, 0x0) r4 = eventfd(0x0) ioctl$KVM_HYPERV_EVENTFD(0xffffffffffffffff, 0x4018aebd, &(0x7f0000000100)={0x0, r4}) [ 372.865399][T15613] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 372.885022][T15613] RSP: 002b:00007f2b476b3c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 372.893887][T15613] RAX: ffffffffffffffda RBX: 00007f2b476b46d4 RCX: 000000000045c849 [ 372.901858][T15613] RDX: 0000000000000000 RSI: 0000000020000000 RDI: 0000000000000006 [ 372.909823][T15613] RBP: 000000000076bfa0 R08: 0000000000000000 R09: 0000000000000000 [ 372.917797][T15613] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000ffffffff [ 372.925780][T15613] R13: 00000000000009f5 R14: 00000000004ccac9 R15: 000000000076bfac 18:45:08 executing program 4: ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x541b, &(0x7f0000000700)={'macsec0\x00', @broadcast}) recvmsg(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, &(0x7f00000008c0)=[{0x0}], 0x1, &(0x7f0000000940)=""/186, 0xba}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) close(0xffffffffffffffff) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000b80)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000eeffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400050000000404000001007d60b7030000000000007a0a00fe00000000850000000d000000b70000000000000095000000000000001c26d2bff0fa454225b2efe59bb842889c95ef1ba79618689974e65251a831de1911e7ce9427b8fe59cc6bf6d3d8e0d9a32d87a43133851864cf48cbb64f52c8197a991a5ad5b2b132abe5a4ff9e3d04d6bd832c0cd77ee508b4f79ce77748c4d0f7074eb8fc284872b4dcc8c365d99548b4fc3d8640f90c0c6b060f2a67d98f03848c8e3868229bba8647ca373da549ae6c972806fc7de1d287ed25f137d95275fbd100dd1046e9b0febe762635bd20f62a827bc127fd8969a01c5a6deca9cedd561e7d955df8a6cda5047fbead7ee7e76d4b870024b85bfc7f64b4d1a13e79c4fb0b7773bc90cb99eded466d80b3843327277c3727ab0f1373f4effda7e880eb5e807e180dd7b2b87ffd5f455dd7ec613366c646f31b60e7197f04403a0382ad7b10ec0750914550713acbf4227d0ac1bc4b4cc097a2a902d050f439ac617e25d0937ed80abb39ee2fa21394026993e4d3ff80ad720000000000000000"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x374}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1ff}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r0, 0x18000000000002a0, 0x26, 0x0, &(0x7f00000006c0)="b9ff031a000d698cb89e40f02cead5dc57ee41dea43e63a377fb7f11c72be949eb4be1977d48", 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) close(0xffffffffffffffff) 18:45:08 executing program 5: ioctl$TUNSETIFINDEX(0xffffffffffffffff, 0x400454da, 0x0) r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x4, &(0x7f0000000080)=[{&(0x7f0000000200)="2e0400005400810ce00f80ecdb4cb9f207c804a00d00000002002efb0a0002000a0ada1b40d805000300c50083b8", 0xfec9}], 0x1, 0x0, 0x0, 0x5865}, 0x0) 18:45:08 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) dup3(r3, r1, 0x0) r4 = eventfd(0x0) ioctl$KVM_HYPERV_EVENTFD(0xffffffffffffffff, 0x4018aebd, &(0x7f0000000100)={0x0, r4}) 18:45:08 executing program 1: r0 = socket$kcm(0x11, 0x200000000000002, 0x300) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x5, &(0x7f0000000240)=ANY=[@ANYBLOB="bf16000000000000b70700000100f0ff5070000000000000480000000800000095000000000000002ba7e1d30cb599e83f24a3aa81d36bb7019c13bd23212fb56f040026fbfefc41056bdc17487902317142fac7e78ce74a2c75a7be168c1886d0d4d94f2f4e345c652fbc1626cca2a28d35806151ee988e6e06c8cedf7ceb9fc404000000c588b277beee1cbf9b0a4def23d410f6accd3641110bec4e90a6341865c3f5ab3e89cf6c662ed4148d3b3e22278d00031e5388ee5c867de2c6211d6ececb0cd2b6d357b8580218ce7400dae15cb7947c491b8bc46b8eda1868720000074e468ee23fd2f73902ebcfcf498227759800011b405b433a8acd715f5888b2007f0000000000000000010000000000000600000000309329170ee5b56780260ed606a10f58fa64533500000000000000000000000031000000000000000008e75a89faffbfb11b7dc6ea31001e846c12423a169f87463ad6f7c2e8ee1a39244960b318778f2a047f6d5bc24fef5d7d617de7a6520655a80d0900f4d433623c850af895abba14f6fbd7fbad2a431ab9142f3a06d54740a4bc5e32bd378af7c9676a08e774c487e32d198e7e5bb395b4ec7bf48cabecead649f96ea24d32872c494360cb5d46ce680eeb80157eb23f9902519a693b85c655fa73103170cbc496d7122051385e7e87a2db762cbb253fbd76b9117c1a11d18aa21a0c5f0c28999a639c0376678be35ffe91ff799a11d9b219c00c369a12bf8685b862d0dbdd956cbda1bae489bcef5ae59136aaacc59608f4d4e6067338b521a0f2e2467a6c435ad5b800262a5da053ced5e95394e500000072737638ac44fb61310e2df511c60b3c88113996a81fb64bce5eb95ce91738640ff7ae6ed6b62086e699955926934389cdf9bc99473ffd86fe9ce05268bf8a3958f2206cdc7095682c14f10be1075832956762b2dcc6251e7b4c11c58217bf84d263e8778e6e8ffe4ea50b076446f35efffc806b340658342d2d9e1ef68c6ef3e98407d2fcefb34a5eae871903ece51c895ddbb76122b1222e4da37177fe833e4fcaa67997e92a206ebd085bd9f9ce91d3fdd50fefe6c1dc0e302789aca24a890664ec56e5a17f45ba5e8bd311a40030d5c1ce75ffff996a80153ac677bb43f8a63dd390d18f0239b41da1a52383a4c6768ca1bb66b8fb3c5000f6f246df20356ae073b1df08ae2c268b0073bb99d88d741a5546e76caf4b6b1387ff37ec13d262dae0260be74cdf7bb6d3107597430ef5bbd476bb9d69b2aef9f3cb644b939daf2a45e7c50782c7aa055dd066fd0fffe3c66f5c343afb78a7cfd852f3e05c089887d7df2ff4f9982030019421af6b78ff9c444a17091875cfe4eab0e7f5c635d8d646c885f820ce59ecc731deba3998c27b815f7b0acba754c01ed8bf1bbac14da8c6a2b966d861f9dd547abf817063b549adefcc925909f6d9e72e9b15e5603eb5f80b58fd76e45d249401307e3a0df2bc46c84799aa792cdaeb6cfb858e577dacff607ba513250e13ae696cd6ed7d318190a93b96e07927efca6b8d1f5980994690bbe002db5146439d906a0d4a879600c361f84202ef065214b15666cdca81091b69acee2c7ce0821fc19e0891f0b53469f935c5ac4218eeff5f2d23a430fa44c30ce84b93c97a23e6c97953faf4420638489e6a6ded6d8c414a87b652b95278e99b06dbb6be1557951854c01dbc2d061827ae6349a045b780893771524a424335b9fc34612f6ee9f09141057262530b7c2f7c9b969938779736ece7b470078ac0b1b4b528000000009866e9994ca9096672ec9f3800c2fc35ba6516e542624c47bdba76a816c3a3dd6c3fa87a3ec91df199a9af91a7babf2b8d0e7b77e6dfb4bbc98114d3edb920ae3052016969dda57847b7054f7b097efba91dfdf40f"], &(0x7f0000000140)='GPL\x00'}, 0x48) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000180)=r1, 0x4) r2 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r3, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="2e48000024000705d21b80788c63940d0424fc60100011400a2f034f051982c1375b3e37096b088000f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x20000000}, 0x0) 18:45:08 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0xe6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000000c0)="2e000000360081aee4050cecff0e00fa378b25db4cb904e473730e55cff26d1b0e001200030000005e510befccd7", 0x2e}], 0x1, 0x0, 0x0, 0x88a8ffff00000000}, 0x0) 18:45:08 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB="3800000000000000290000000400000078040409000000c0073510fbffac00b408000000fab771172100000020001000004e5e000038802286006653282429c6faf0807d8906c82b5cf22ada9e4335ca229fe213d1af62b4f7660320177563c42107670e660000000000005265f999baa8636685f0b085adedbe57b985398d189fd88872b4e7eaf16be8b3a33a7722ab44"], 0x91}, 0x8000) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$FS_IOC_FSGETXATTR(r0, 0x801c581f, 0x0) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r4 = ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0) r5 = eventfd(0x0) ioctl$KVM_IRQFD(0xffffffffffffffff, 0x4020ae76, &(0x7f0000000000)={r5}) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_GROUP_ADD(r5, 0x40286608, &(0x7f00000000c0)={0x81, 0xc4a, 0xe11, 0x7fff, 0x2, 0x1}) ioctl$KVM_CREATE_IRQCHIP(r4, 0xae60) eventfd(0x0) ioctl$KVM_IRQFD(r4, 0x4020ae76, &(0x7f0000000000)) r6 = dup3(r4, r2, 0x0) ioctl$DRM_IOCTL_MODE_PAGE_FLIP(r6, 0xc01864b0, &(0x7f0000000100)={0x1, 0x4, 0x0, 0xa2, 0x3}) [ 373.788365][T15661] netlink: 1046 bytes leftover after parsing attributes in process `syz-executor.5'. [ 373.832410][T15661] PF_BRIDGE: br_mdb_parse() with invalid attr [ 373.877653][T15670] netlink: 1046 bytes leftover after parsing attributes in process `syz-executor.5'. 18:45:08 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) dup3(r3, r1, 0x0) r4 = eventfd(0x0) ioctl$KVM_HYPERV_EVENTFD(0xffffffffffffffff, 0x4018aebd, &(0x7f0000000100)={0x0, r4}) [ 373.945654][T15674] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=54 sclass=netlink_route_socket pid=15674 comm=syz-executor.0 [ 373.963509][T15670] PF_BRIDGE: br_mdb_parse() with invalid attr [ 374.011201][T15678] netlink: 18442 bytes leftover after parsing attributes in process `syz-executor.1'. 18:45:08 executing program 5: bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000100)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000200)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r1, &(0x7f0000000040), 0x12) 18:45:09 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB="3800000000000000290000000400000078040409000000c0073510fbffac00b408000000fab771172100000020001000004e5e000038802286006653282429c6faf0807d8906c82b5cf22ada9e4335ca229fe213d1af62b4f7660320177563c42107670e660000000000005265f999baa8636685f0b085adedbe57b985398d189fd88872b4e7eaf16be8b3a33a7722ab44"], 0x91}, 0x8000) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$FS_IOC_FSGETXATTR(r0, 0x801c581f, 0x0) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r4 = ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0) r5 = eventfd(0x0) ioctl$KVM_IRQFD(0xffffffffffffffff, 0x4020ae76, &(0x7f0000000000)={r5}) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_GROUP_ADD(r5, 0x40286608, &(0x7f00000000c0)={0x81, 0xc4a, 0xe11, 0x7fff, 0x2, 0x1}) ioctl$KVM_CREATE_IRQCHIP(r4, 0xae60) eventfd(0x0) ioctl$KVM_IRQFD(r4, 0x4020ae76, &(0x7f0000000000)) r6 = dup3(r4, r2, 0x0) ioctl$DRM_IOCTL_MODE_PAGE_FLIP(r6, 0xc01864b0, &(0x7f0000000100)={0x1, 0x4, 0x0, 0xa2, 0x3}) 18:45:09 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0xe6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000000c0)="2e000000360081aee4050cecff0e00fa378b25db4cb904e473730e55cff26d1b0e001200030000005e510befccd7", 0x2e}], 0x1, 0x0, 0x0, 0x88a8ffff00000000}, 0x0) [ 374.150704][T15678] sysfs: cannot create duplicate filename '/class/ieee80211/ [ 374.150704][T15678] !O‚Á7[>7' [ 374.232817][T15678] CPU: 1 PID: 15678 Comm: syz-executor.1 Not tainted 5.6.0-rc7-syzkaller #0 [ 374.241555][T15678] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 374.251627][T15678] Call Trace: [ 374.254937][T15678] dump_stack+0x188/0x20d [ 374.259324][T15678] sysfs_warn_dup.cold+0x1c/0x2d [ 374.264377][T15678] sysfs_do_create_link_sd.isra.0+0x119/0x130 [ 374.270582][T15678] sysfs_create_link+0x61/0xc0 [ 374.275380][T15678] device_add+0x71c/0x1bc0 18:45:09 executing program 4: ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x541b, &(0x7f0000000700)={'macsec0\x00', @broadcast}) recvmsg(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, &(0x7f00000008c0)=[{0x0}], 0x1, &(0x7f0000000940)=""/186, 0xba}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) close(0xffffffffffffffff) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000b80)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x374}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1ff}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r0, 0x18000000000002a0, 0x26, 0x0, &(0x7f00000006c0)="b9ff031a000d698cb89e40f02cead5dc57ee41dea43e63a377fb7f11c72be949eb4be1977d48", 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) close(0xffffffffffffffff) [ 374.280094][T15678] ? uevent_show+0x360/0x360 [ 374.284906][T15678] ? ieee80211_set_bitrate_flags+0x20b/0x5c0 [ 374.290914][T15678] wiphy_register+0x1c46/0x2720 [ 374.295833][T15678] ? wiphy_unregister+0xf90/0xf90 [ 374.301166][T15678] ? __kmalloc+0x629/0x7a0 [ 374.305603][T15678] ? ieee80211_register_hw+0xbea/0x3760 [ 374.311179][T15678] ? ieee80211_cs_list_valid+0x198/0x280 [ 374.316884][T15678] ieee80211_register_hw+0x141d/0x3760 [ 374.322475][T15678] ? ieee80211_ifa_changed+0xdc0/0xdc0 [ 374.328181][T15678] ? rcu_read_lock_sched_held+0x9c/0xd0 [ 374.333930][T15678] ? rcu_read_lock_any_held.part.0+0x50/0x50 [ 374.339941][T15678] ? memset+0x20/0x40 [ 374.344668][T15678] ? __hrtimer_init+0x134/0x260 [ 374.350059][T15678] mac80211_hwsim_new_radio+0x2187/0x43d0 [ 374.356403][T15678] ? vprintk_func+0x81/0x17e [ 374.361624][T15678] ? hwsim_register_received_nl+0x400/0x400 [ 374.367750][T15678] hwsim_new_radio_nl+0x905/0xf60 [ 374.373013][T15678] ? mac80211_hwsim_new_radio+0x43d0/0x43d0 [ 374.379297][T15678] ? cap_capable+0x1eb/0x250 [ 374.384112][T15678] ? genl_family_rcv_msg_attrs_parse+0x1bd/0x320 [ 374.391751][T15678] ? genl_family_rcv_msg_attrs_parse+0x1c7/0x320 [ 374.398116][T15678] genl_rcv_msg+0x627/0xdf0 [ 374.402665][T15678] ? genl_family_rcv_msg_attrs_parse+0x320/0x320 [ 374.409145][T15678] ? __lockdep_free_key_range+0x110/0x110 [ 374.414998][T15678] netlink_rcv_skb+0x15a/0x410 [ 374.420259][T15678] ? genl_family_rcv_msg_attrs_parse+0x320/0x320 [ 374.426914][T15678] ? netlink_ack+0xa10/0xa10 [ 374.431576][T15678] genl_rcv+0x24/0x40 [ 374.435561][T15678] netlink_unicast+0x537/0x740 [ 374.440372][T15678] ? netlink_attachskb+0x810/0x810 [ 374.445511][T15678] ? _copy_from_iter_full+0x25c/0x870 [ 374.450917][T15678] netlink_sendmsg+0x882/0xe10 [ 374.455716][T15678] ? netlink_unicast+0x740/0x740 [ 374.460867][T15678] ? netlink_unicast+0x740/0x740 [ 374.465997][T15678] sock_sendmsg+0xcf/0x120 [ 374.470412][T15678] ____sys_sendmsg+0x6b9/0x7d0 [ 374.475177][T15678] ? kernel_sendmsg+0x50/0x50 [ 374.479899][T15678] ? mark_lock+0xbc/0x1220 [ 374.484346][T15678] ___sys_sendmsg+0x100/0x170 [ 374.489030][T15678] ? sendmsg_copy_msghdr+0x70/0x70 [ 374.494184][T15678] ? __fget_files+0x329/0x4f0 [ 374.498880][T15678] ? ksys_dup3+0x3c0/0x3c0 [ 374.503286][T15678] ? lock_acquire+0x197/0x420 [ 374.507981][T15678] ? __might_fault+0xef/0x1d0 [ 374.512669][T15678] ? __fget_light+0x208/0x270 [ 374.517391][T15678] __sys_sendmsg+0xec/0x1b0 [ 374.521909][T15678] ? __sys_sendmsg_sock+0xb0/0xb0 [ 374.526979][T15678] ? __x64_sys_futex+0x380/0x4f0 [ 374.531943][T15678] ? trace_hardirqs_off_caller+0x55/0x230 [ 374.537668][T15678] ? do_syscall_64+0x21/0x7d0 [ 374.542348][T15678] do_syscall_64+0xf6/0x7d0 [ 374.546854][T15678] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 374.552761][T15678] RIP: 0033:0x45c849 [ 374.556658][T15678] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 374.576364][T15678] RSP: 002b:00007f2b476b3c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 374.584775][T15678] RAX: ffffffffffffffda RBX: 00007f2b476b46d4 RCX: 000000000045c849 [ 374.592742][T15678] RDX: 0000000000000000 RSI: 0000000020000000 RDI: 0000000000000005 [ 374.600704][T15678] RBP: 000000000076bfa0 R08: 0000000000000000 R09: 0000000000000000 [ 374.608710][T15678] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000ffffffff [ 374.616697][T15678] R13: 00000000000009f5 R14: 00000000004ccac9 R15: 000000000076bfac [ 374.677225][T15700] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=54 sclass=netlink_route_socket pid=15700 comm=syz-executor.0 18:45:09 executing program 5: bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000100)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000200)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r1, &(0x7f0000000040), 0x12) 18:45:10 executing program 5: bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000100)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000200)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r1, &(0x7f0000000040), 0x12) 18:45:10 executing program 5: bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000100)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000200)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r1, &(0x7f0000000040), 0x12) 18:45:10 executing program 4: getpid() ioctl$PERF_EVENT_IOC_REFRESH(0xffffffffffffffff, 0x2402, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) r0 = socket$kcm(0x10, 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000000c0)="2e00000010008188040f80ecdb4cb9cca7480ef43c000000e3bd6efb440009000e000a0010000000028000811201", 0x2e}], 0x2}, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0xfffffff5) 18:45:10 executing program 1: r0 = socket$kcm(0x11, 0x200000000000002, 0x300) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x5, &(0x7f0000000240)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='GPL\x00'}, 0x48) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000180)=r1, 0x4) r2 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r3, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="2e48000024000705d21b80788c63940d0424fc60100011400a2f034f051982c1375b3e37096b088000f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x20000000}, 0x0) 18:45:10 executing program 5: bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000100)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000040), 0x12) 18:45:10 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB="3800000000000000290000000400000078040409000000c0073510fbffac00b408000000fab771172100000020001000004e5e000038802286006653282429c6faf0807d8906c82b5cf22ada9e4335ca229fe213d1af62b4f7660320177563c42107670e660000000000005265f999baa8636685f0b085adedbe57b985398d189fd88872b4e7eaf16be8b3a33a7722ab44"], 0x91}, 0x8000) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$FS_IOC_FSGETXATTR(r0, 0x801c581f, 0x0) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) r4 = eventfd(0x0) ioctl$KVM_IRQFD(0xffffffffffffffff, 0x4020ae76, &(0x7f0000000000)={r4}) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_GROUP_ADD(r4, 0x40286608, &(0x7f00000000c0)={0x81, 0xc4a, 0xe11, 0x7fff, 0x2, 0x1}) ioctl$KVM_CREATE_IRQCHIP(r3, 0xae60) r5 = eventfd(0x0) ioctl$KVM_IRQFD(r3, 0x4020ae76, &(0x7f0000000000)) ioctl$KVM_IRQFD(0xffffffffffffffff, 0x4020ae76, &(0x7f0000000080)={r5}) ioctl$DRM_IOCTL_MODE_PAGE_FLIP(0xffffffffffffffff, 0xc01864b0, &(0x7f0000000100)={0x1, 0x4, 0x0, 0xa2, 0x3}) [ 375.980109][T15737] netlink: 'syz-executor.4': attribute type 10 has an invalid length. 18:45:10 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) r4 = dup3(r3, r1, 0x0) eventfd(0x0) ioctl$KVM_HYPERV_EVENTFD(r4, 0x4018aebd, 0x0) 18:45:10 executing program 5: bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000100)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000040), 0x12) [ 376.049285][T15742] netlink: 18442 bytes leftover after parsing attributes in process `syz-executor.1'. 18:45:11 executing program 5: bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000100)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000040), 0x12) [ 376.099508][T15737] team0: Device ipvlan1 failed to register rx_handler 18:45:11 executing program 0: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(0xffffffffffffffff, 0x2402, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000900)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x18000000000002e0, 0xe80, 0x0, &(0x7f0000000280)="b95b03b700030700009e40f086dd1fffffe100004000638477fbac14143fe0004301c699da153f08a0e6e380f6010af683317585d7473f1cab4439f0f570ff155bc5f73ba3f8bb99a6e8ded1ce485cf058105cd981b42493481cd659416a2e10c9119664f36eb00b33", 0x0, 0xfd, 0x6000000000000000}, 0x28) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0xfffffff5) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000100)) ioctl$PERF_EVENT_IOC_REFRESH(0xffffffffffffffff, 0x2402, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(0xffffffffffffffff, 0x2402, 0xe43) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000300)='cgroup.controllers\x00') 18:45:11 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB="3800000000000000290000000400000078040409000000c0073510fbffac00b408000000fab771172100000020001000004e5e000038802286006653282429c6faf0807d8906c82b5cf22ada9e4335ca229fe213d1af62b4f7660320177563c42107670e660000000000005265f999baa8636685f0b085adedbe57b985398d189fd88872b4e7eaf16be8b3a33a7722ab44"], 0x91}, 0x8000) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$FS_IOC_FSGETXATTR(r0, 0x801c581f, 0x0) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) r4 = eventfd(0x0) ioctl$KVM_IRQFD(0xffffffffffffffff, 0x4020ae76, &(0x7f0000000000)={r4}) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_GROUP_ADD(r4, 0x40286608, &(0x7f00000000c0)={0x81, 0xc4a, 0xe11, 0x7fff, 0x2, 0x1}) ioctl$KVM_CREATE_IRQCHIP(r3, 0xae60) r5 = eventfd(0x0) ioctl$KVM_IRQFD(r3, 0x4020ae76, &(0x7f0000000000)) ioctl$KVM_IRQFD(0xffffffffffffffff, 0x4020ae76, &(0x7f0000000080)={r5}) ioctl$DRM_IOCTL_MODE_PAGE_FLIP(0xffffffffffffffff, 0xc01864b0, &(0x7f0000000100)={0x1, 0x4, 0x0, 0xa2, 0x3}) 18:45:11 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) r4 = dup3(r3, r1, 0x0) eventfd(0x0) ioctl$KVM_HYPERV_EVENTFD(r4, 0x4018aebd, 0x0) 18:45:11 executing program 5: bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000100)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) r0 = openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000200)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r0, &(0x7f0000000040), 0x12) 18:45:11 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) r4 = dup3(r3, r1, 0x0) eventfd(0x0) ioctl$KVM_HYPERV_EVENTFD(r4, 0x4018aebd, 0x0) [ 376.683966][T15742] sysfs: cannot create duplicate filename '/class/ieee80211/ [ 376.683966][T15742] !O‚Á7[>7' [ 376.697490][T15737] syz-executor.4 (15737) used greatest stack depth: 23136 bytes left [ 376.733609][T15742] CPU: 0 PID: 15742 Comm: syz-executor.1 Not tainted 5.6.0-rc7-syzkaller #0 [ 376.742338][T15742] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 376.752502][T15742] Call Trace: [ 376.755819][T15742] dump_stack+0x188/0x20d [ 376.760174][T15742] sysfs_warn_dup.cold+0x1c/0x2d [ 376.765126][T15742] sysfs_do_create_link_sd.isra.0+0x119/0x130 [ 376.771211][T15742] sysfs_create_link+0x61/0xc0 [ 376.775983][T15742] device_add+0x71c/0x1bc0 [ 376.780396][T15742] ? uevent_show+0x360/0x360 [ 376.784991][T15742] ? ieee80211_set_bitrate_flags+0x20b/0x5c0 [ 376.790970][T15742] wiphy_register+0x1c46/0x2720 [ 376.795821][T15742] ? wiphy_unregister+0xf90/0xf90 [ 376.800846][T15742] ? __kmalloc+0x629/0x7a0 [ 376.805247][T15742] ? ieee80211_register_hw+0xbea/0x3760 [ 376.810785][T15742] ? ieee80211_cs_list_valid+0x198/0x280 [ 376.816590][T15742] ieee80211_register_hw+0x141d/0x3760 [ 376.822562][T15742] ? ieee80211_ifa_changed+0xdc0/0xdc0 [ 376.828032][T15742] ? rcu_read_lock_sched_held+0x9c/0xd0 [ 376.833580][T15742] ? rcu_read_lock_any_held.part.0+0x50/0x50 [ 376.839584][T15742] ? memset+0x20/0x40 [ 376.843565][T15742] ? __hrtimer_init+0x134/0x260 [ 376.848521][T15742] mac80211_hwsim_new_radio+0x2187/0x43d0 [ 376.854266][T15742] ? vprintk_func+0x81/0x17e [ 376.858892][T15742] ? hwsim_register_received_nl+0x400/0x400 [ 376.864812][T15742] hwsim_new_radio_nl+0x905/0xf60 [ 376.869854][T15742] ? mac80211_hwsim_new_radio+0x43d0/0x43d0 [ 376.875753][T15742] ? cap_capable+0x1eb/0x250 [ 376.881158][T15742] ? genl_family_rcv_msg_attrs_parse+0x1bd/0x320 [ 376.887491][T15742] ? genl_family_rcv_msg_attrs_parse+0x1c7/0x320 [ 376.893949][T15742] genl_rcv_msg+0x627/0xdf0 [ 376.898473][T15742] ? genl_family_rcv_msg_attrs_parse+0x320/0x320 [ 376.904980][T15742] ? __lockdep_free_key_range+0x110/0x110 [ 376.910738][T15742] netlink_rcv_skb+0x15a/0x410 [ 376.915502][T15742] ? genl_family_rcv_msg_attrs_parse+0x320/0x320 [ 376.921848][T15742] ? netlink_ack+0xa10/0xa10 [ 376.926885][T15742] genl_rcv+0x24/0x40 [ 376.930890][T15742] netlink_unicast+0x537/0x740 [ 376.935754][T15742] ? netlink_attachskb+0x810/0x810 [ 376.940880][T15742] ? _copy_from_iter_full+0x25c/0x870 [ 376.946298][T15742] netlink_sendmsg+0x882/0xe10 [ 376.951176][T15742] ? netlink_unicast+0x740/0x740 [ 376.956148][T15742] ? netlink_unicast+0x740/0x740 [ 376.961102][T15742] sock_sendmsg+0xcf/0x120 [ 376.965634][T15742] ____sys_sendmsg+0x6b9/0x7d0 [ 376.970426][T15742] ? kernel_sendmsg+0x50/0x50 [ 376.975471][T15742] ? mark_lock+0xbc/0x1220 [ 376.979918][T15742] ___sys_sendmsg+0x100/0x170 [ 376.985104][T15742] ? sendmsg_copy_msghdr+0x70/0x70 [ 376.990328][T15742] ? __fget_files+0x329/0x4f0 [ 376.995083][T15742] ? ksys_dup3+0x3c0/0x3c0 [ 376.999806][T15742] ? lock_acquire+0x197/0x420 [ 377.004666][T15742] ? __might_fault+0xef/0x1d0 [ 377.009395][T15742] ? __fget_light+0x208/0x270 [ 377.014124][T15742] __sys_sendmsg+0xec/0x1b0 [ 377.018630][T15742] ? __sys_sendmsg_sock+0xb0/0xb0 [ 377.023695][T15742] ? trace_hardirqs_off_caller+0x55/0x230 [ 377.033903][T15742] ? do_syscall_64+0x21/0x7d0 [ 377.038629][T15742] do_syscall_64+0xf6/0x7d0 [ 377.043492][T15742] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 377.049545][T15742] RIP: 0033:0x45c849 [ 377.053439][T15742] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 377.073238][T15742] RSP: 002b:00007f2b476b3c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e 18:45:11 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="0a48000036000535d25a80648c63940d0224fc605a0000000a000400030082c137153e370935018000f01700d1bd", 0x33fe0}], 0x1}, 0x0) [ 377.081682][T15742] RAX: ffffffffffffffda RBX: 00007f2b476b46d4 RCX: 000000000045c849 [ 377.089658][T15742] RDX: 0000000000000000 RSI: 0000000020000000 RDI: 0000000000000006 [ 377.098055][T15742] RBP: 000000000076bfa0 R08: 0000000000000000 R09: 0000000000000000 [ 377.106044][T15742] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000ffffffff [ 377.114007][T15742] R13: 00000000000009f5 R14: 00000000004ccac9 R15: 000000000076bfac [ 377.300223][T15810] netlink: 'syz-executor.4': attribute type 1 has an invalid length. [ 377.323812][T15810] netlink: 4826 bytes leftover after parsing attributes in process `syz-executor.4'. 18:45:12 executing program 1: r0 = socket$kcm(0x11, 0x200000000000002, 0x300) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x5, &(0x7f0000000240)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='GPL\x00'}, 0x48) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000180)=r1, 0x4) r2 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r3, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="2e48000024000705d21b80788c63940d0424fc60100011400a2f034f051982c1375b3e37096b088000f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x20000000}, 0x0) 18:45:12 executing program 5: bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000100)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) r0 = openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000200)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r0, &(0x7f0000000040), 0x12) 18:45:12 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB="3800000000000000290000000400000078040409000000c0073510fbffac00b408000000fab771172100000020001000004e5e000038802286006653282429c6faf0807d8906c82b5cf22ada9e4335ca229fe213d1af62b4f7660320177563c42107670e660000000000005265f999baa8636685f0b085adedbe57b985398d189fd88872b4e7eaf16be8b3a33a7722ab44"], 0x91}, 0x8000) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$FS_IOC_FSGETXATTR(r0, 0x801c581f, 0x0) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) r4 = eventfd(0x0) ioctl$KVM_IRQFD(0xffffffffffffffff, 0x4020ae76, &(0x7f0000000000)={r4}) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_GROUP_ADD(r4, 0x40286608, &(0x7f00000000c0)={0x81, 0xc4a, 0xe11, 0x7fff, 0x2, 0x1}) ioctl$KVM_CREATE_IRQCHIP(r3, 0xae60) r5 = eventfd(0x0) ioctl$KVM_IRQFD(r3, 0x4020ae76, &(0x7f0000000000)) ioctl$KVM_IRQFD(0xffffffffffffffff, 0x4020ae76, &(0x7f0000000080)={r5}) ioctl$DRM_IOCTL_MODE_PAGE_FLIP(0xffffffffffffffff, 0xc01864b0, &(0x7f0000000100)={0x1, 0x4, 0x0, 0xa2, 0x3}) 18:45:12 executing program 0: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000540)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x3d}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000740)={r1, 0x4000a0, 0x15, 0x5ac484bb51fa106a, &(0x7f0000000040)="4d50b441e692763513ef874565020007000112bbf32d9fd08805892fd398e4000000001375bc847d142d1523389037a1d4f5631813cf7037fd584b4af7507a849ce80deea1a57733a5e3730fbef42ab9bedd390775bf809fbcf2a71f32d41a1f7ff3b5483107766a8bd0033d44e6ef7b526c8c67aa9847e283c6cdccbd627ad1094342b1840b506814cb319132533f6d740d9643d0c6dc8481d0c9643dd3e0aa6e1be581aca3ea9377136ce8dd480207fba7af225672c63802beb9647a5fbe90781e147e92eae8d9d79d0d", 0x0, 0x23, 0x0, 0x22d, 0x1000000}, 0x28) 18:45:12 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) r4 = dup3(r3, r1, 0x0) eventfd(0x0) ioctl$KVM_HYPERV_EVENTFD(r4, 0x4018aebd, &(0x7f0000000100)) [ 377.556625][T15816] netlink: 'syz-executor.4': attribute type 1 has an invalid length. [ 377.588000][T15816] netlink: 4826 bytes leftover after parsing attributes in process `syz-executor.4'. [ 377.613743][T15822] ------------[ cut here ]------------ [ 377.619908][T15822] hsr_addr_subst_dest: Unknown node [ 377.626115][T15822] WARNING: CPU: 1 PID: 15822 at net/hsr/hsr_framereg.c:321 hsr_addr_subst_dest+0x36c/0x440 [ 377.636293][T15822] Kernel panic - not syncing: panic_on_warn set ... [ 377.643073][T15822] CPU: 1 PID: 15822 Comm: syz-executor.0 Not tainted 5.6.0-rc7-syzkaller #0 [ 377.652052][T15822] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 377.662582][T15822] Call Trace: [ 377.665892][T15822] dump_stack+0x188/0x20d [ 377.670888][T15822] ? hsr_addr_subst_dest+0x2d0/0x440 [ 377.676629][T15822] panic+0x2e3/0x75c [ 377.680586][T15822] ? add_taint.cold+0x16/0x16 [ 377.685357][T15822] ? __probe_kernel_read+0x188/0x1d0 [ 377.690670][T15822] ? __warn.cold+0x14/0x35 [ 377.695232][T15822] ? hsr_addr_subst_dest+0x36c/0x440 [ 377.700623][T15822] __warn.cold+0x2f/0x35 [ 377.705020][T15822] ? irq_work_queue+0xd2/0x100 [ 377.709810][T15822] ? hsr_addr_subst_dest+0x36c/0x440 [ 377.715211][T15822] report_bug+0x27b/0x2f0 [ 377.719860][T15822] do_error_trap+0x12b/0x220 [ 377.724607][T15822] ? hsr_addr_subst_dest+0x36c/0x440 [ 377.732194][T15822] do_invalid_op+0x32/0x40 [ 377.738390][T15822] ? hsr_addr_subst_dest+0x36c/0x440 [ 377.743797][T15822] invalid_op+0x23/0x30 [ 377.748144][T15822] RIP: 0010:hsr_addr_subst_dest+0x36c/0x440 [ 377.754056][T15822] Code: 89 de e8 d7 3c c1 f9 84 db 75 d4 e8 9e 3b c1 f9 48 c7 c6 20 a9 d9 88 48 c7 c7 e0 a7 d9 88 c6 05 9f 45 b0 02 01 e8 7c 4c 93 f9 <0f> 0b eb b1 e8 7b 3b c1 f9 0f b6 1d 8b 45 b0 02 31 ff 89 de e8 9b [ 377.773840][T15822] RSP: 0018:ffffc900017e74f0 EFLAGS: 00010282 [ 377.780006][T15822] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 0000000000000000 [ 377.787978][T15822] RDX: 000000000000c687 RSI: ffffffff815c06c1 RDI: fffff520002fce90 [ 377.795966][T15822] RBP: 000000000100bff3 R08: ffff888045b32300 R09: ffffed1015ce45c9 [ 377.804080][T15822] R10: ffffed1015ce45c8 R11: ffff8880ae722e43 R12: 0000000001000700 [ 377.812265][T15822] R13: ffff888056ad6ba0 R14: 000000000000bb12 R15: ffff888056ad6ba0 [ 377.820557][T15822] ? vprintk_func+0x81/0x17e [ 377.825363][T15822] hsr_forward_skb+0x134b/0x1d00 [ 377.830383][T15822] hsr_dev_xmit+0x78/0xd0 [ 377.835126][T15822] dev_hard_start_xmit+0x1a4/0x9b0 [ 377.840332][T15822] __dev_queue_xmit+0x25e1/0x30a0 [ 377.845679][T15822] ? __kasan_kmalloc.constprop.0+0xbf/0xd0 [ 377.851938][T15822] ? kmem_cache_alloc_node_trace+0x240/0x790 [ 377.858151][T15822] ? netdev_core_pick_tx+0x2e0/0x2e0 [ 377.863540][T15822] ? skb_release_data+0x128/0x8b0 [ 377.868616][T15822] ? skb_headers_offset_update+0x15a/0x2a0 [ 377.874432][T15822] ? pskb_expand_head+0x558/0x1020 [ 377.879610][T15822] ? __bpf_redirect+0x769/0xc60 [ 377.884495][T15822] __bpf_redirect+0x769/0xc60 [ 377.889261][T15822] ? skb_ensure_writable+0xe5/0x450 [ 377.894472][T15822] bpf_clone_redirect+0x2b7/0x430 [ 377.899506][T15822] ? mark_lock+0xbc/0x1220 [ 377.903986][T15822] bpf_prog_f9bdc51a988dbf58+0xca0/0x1000 [ 377.909731][T15822] ? __lock_acquire+0x14bd/0x3ca0 [ 377.914808][T15822] ? __lock_acquire+0x80b/0x3ca0 [ 377.919754][T15822] ? find_held_lock+0x2d/0x110 [ 377.924520][T15822] ? bpf_test_run+0x180/0xc70 [ 377.929346][T15822] ? lock_downgrade+0x7f0/0x7f0 [ 377.934411][T15822] ? bpf_test_run+0x180/0xc70 [ 377.939124][T15822] ? ktime_get+0xff/0x2f0 [ 377.943727][T15822] ? lockdep_hardirqs_on+0x417/0x5d0 [ 377.949903][T15822] ? ktime_get+0x1f8/0x2f0 [ 377.954348][T15822] bpf_test_run+0x3c4/0xc70 [ 377.959197][T15822] ? __phys_addr+0x9a/0x110 [ 377.963949][T15822] ? bpf_test_finish.isra.0+0x4f0/0x4f0 [ 377.969594][T15822] ? __build_skb+0x53/0x60 [ 377.974024][T15822] bpf_prog_test_run_skb+0xa6c/0x1480 [ 377.979699][T15822] ? bpf_test_init.isra.0+0x230/0x230 [ 377.985195][T15822] ? fput_many+0x2f/0x1a0 [ 377.989557][T15822] ? bpf_test_init.isra.0+0x230/0x230 [ 377.994997][T15822] __do_sys_bpf+0xba7/0x4050 [ 377.999594][T15822] ? lock_acquire+0x197/0x420 [ 378.004444][T15822] ? __might_fault+0xef/0x1d0 [ 378.009211][T15822] ? bpf_prog_load+0x15f0/0x15f0 [ 378.014254][T15822] ? __might_fault+0x190/0x1d0 [ 378.019016][T15822] ? _copy_to_user+0x107/0x150 [ 378.023884][T15822] ? put_timespec64+0xcb/0x120 [ 378.028917][T15822] ? ns_to_kernel_old_timeval+0x100/0x100 [ 378.034756][T15822] ? __ia32_sys_clock_settime+0x260/0x260 [ 378.040713][T15822] ? trace_hardirqs_off_caller+0x55/0x230 [ 378.046470][T15822] do_syscall_64+0xf6/0x7d0 [ 378.051018][T15822] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 378.056954][T15822] RIP: 0033:0x45c849 [ 378.060938][T15822] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 378.080631][T15822] RSP: 002b:00007f9b69b9cc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 378.089556][T15822] RAX: ffffffffffffffda RBX: 00007f9b69b9d6d4 RCX: 000000000045c849 [ 378.098358][T15822] RDX: 0000000000000028 RSI: 0000000020000740 RDI: 000000000000000a [ 378.107329][T15822] RBP: 000000000076bf00 R08: 0000000000000000 R09: 0000000000000000 [ 378.115760][T15822] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000ffffffff [ 378.123913][T15822] R13: 0000000000000059 R14: 00000000004c2f70 R15: 000000000076bf0c [ 378.134294][T15822] Kernel Offset: disabled [ 378.138820][T15822] Rebooting in 86400 seconds..