4f52ea71e294b4443db1ded2bef94cda255e8b8d358c240f0364427132b327060bcaceab8ef2116c7a74cad189f4f0ac013271b8fb5e4547"]) 03:53:25 executing program 4: r0 = socket(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0xcb00000000000000}, 0xc, &(0x7f0000000900)={&(0x7f0000000040)={0x14, 0x1e, 0x201}, 0x14}, 0x1}, 0x0) [ 1444.283773] hfsplus: unable to parse mount options [ 1444.305256] hfsplus: unable to parse mount options 03:53:26 executing program 2: r0 = syz_open_dev$sndseq(&(0x7f0000dcc000)='/dev/snd/seq\x00', 0x0, 0x2) read(r0, &(0x7f0000fb6000)=""/28, 0x3f0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000418f50)={{0x80}, "0a4ceaa05d9a00000000000000039b3fd4cec307e8ef3d13eb790ec9c65abaf90d229db692542e5b78f8b29e0a27800f0000000000000009fb42f376589701a4", 0xa9824f69d1376637, 0x10800a}) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000380)={0xbf, @tick, 0x0, {0x0, 0x100}}) write$binfmt_script(r0, &(0x7f0000000000)=ANY=[], 0x0) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x40140, 0x0) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000080)='IPVS\x00') sendmsg$IPVS_CMD_SET_SERVICE(r1, &(0x7f0000000280)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x820}, 0xc, &(0x7f0000000240)={&(0x7f00000001c0)={0x54, r2, 0x1, 0x70bd26, 0x25dfdbff, {0x2}, [@IPVS_CMD_ATTR_DAEMON={0x28, 0x3, [@IPVS_DAEMON_ATTR_MCAST_TTL={0x8, 0x8, 0x7}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @local={0xfe, 0x80, [], 0xaa}}, @IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @loopback=0x7f000001}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x80000001}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x81}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x6}]}, 0x54}, 0x1, 0x0, 0x0, 0x800}, 0x40800) ioctl$EVIOCGUNIQ(r1, 0x80404508, &(0x7f0000000100)=""/135) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f00000002c0)={{}, 'port0\x00'}) fcntl$setflags(r1, 0x2, 0x1) openat$sequencer2(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer2\x00', 0x0, 0x0) 03:53:26 executing program 1: r0 = socket(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x6500}, 0xc, &(0x7f0000000900)={&(0x7f0000000040)={0x14, 0x1e, 0x201}, 0x14}, 0x1}, 0x0) 03:53:26 executing program 3: ioctl$BLKDISCARD(0xffffffffffffffff, 0x1277, &(0x7f0000000180)) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140)='/dev/snapshot\x00', 0x0, 0x0) fcntl$addseals(0xffffffffffffffff, 0x409, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f0000000000), &(0x7f00000000c0)=0x8) ioctl$EVIOCGLED(0xffffffffffffffff, 0x80404519, &(0x7f0000000580)=""/236) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x0, 0x0) ioctl$EVIOCGKEYCODE_V2(0xffffffffffffffff, 0x80284504, &(0x7f00000003c0)=""/188) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c82, 0x0) 03:53:26 executing program 7: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f000000d000)={0xa, 0x4e20}, 0x1c) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}, 0xb}, 0x1c) syz_emit_ethernet(0x3e, &(0x7f00000001c0)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @random="e829f650db0f", [], {@ipv6={0x86dd, {0x0, 0x6, "50a09c", 0x8, 0xffffff11, 0x0, @remote={0xfe, 0x80, [], 0xbb}, @local={0xfe, 0x80, [], 0xaa}, {[], @udp={0x0, 0x4e20, 0x8}}}}}}, &(0x7f0000000040)) syz_emit_ethernet(0x3e, &(0x7f0000000000)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], {@ipv6={0x86dd, {0x0, 0x6, "50a09c", 0x8, 0xffffff11, 0x0, @remote={0xfe, 0x80, [], 0xbb}, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x689], 0xaa}, {[], @udp={0x300, 0x4e20, 0x8}}}}}}, &(0x7f0000000040)) 03:53:26 executing program 5: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer2\x00', 0x0, 0x0) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000040)="025cc83d6d345f8f762070") ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r0, 0x40085112, &(0x7f0000b18000)={{0xffffff93}, {0xffffffa0}, 0x0, 0x0, 0x0, [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff030000]}) 03:53:26 executing program 4: r0 = socket(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x8100}, 0xc, &(0x7f0000000900)={&(0x7f0000000040)={0x14, 0x1e, 0x201}, 0x14}, 0x1}, 0x0) 03:53:26 executing program 0: ioctl$BLKDISCARD(0xffffffffffffffff, 0x1277, &(0x7f0000000180)) r0 = syz_open_dev$usbmon(&(0x7f0000000080)='/dev/usbmon#\x00', 0xff, 0x4000) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140)='/dev/snapshot\x00', 0x0, 0x0) fcntl$addseals(r1, 0x409, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(r0, 0x84, 0x7c, &(0x7f0000000040)={0x0, 0x2, 0x9}, &(0x7f0000000100)=0x8) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f0000000000)={r2, 0x1}, &(0x7f00000000c0)=0x8) ioctl$EVIOCGLED(0xffffffffffffffff, 0x80404519, &(0x7f0000000580)=""/236) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x3c, 0x0) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x0) 03:53:26 executing program 6: socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) accept$inet6(r0, 0x0, &(0x7f00000000c0)) r1 = socket(0x11, 0xa, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000640)={0x0, 0x0, 0x0}, &(0x7f0000000680)=0xc) syz_mount_image$hfsplus(&(0x7f0000000240)='hfsplus\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, &(0x7f00000005c0), 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="6769f23d65800000008834c54d6bf065189534ec6842f326260f10e673b315a691b17e1e0530b2e8d739bb1906c0acc7d49e1807743c0ca9e0000091d52075df47fe9ce0529e00000000000000000000000000000000", @ANYRESHEX=r2, @ANYBLOB=',\x00']) r3 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x200) write$P9_RLOPEN(r3, &(0x7f0000000040)={0x18, 0xd, 0x1, {{0x0, 0x2, 0x2}, 0xfffffffffffffffc}}, 0x18) [ 1444.998116] hfsplus: unable to parse mount options 03:53:26 executing program 4: r0 = socket(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x701}, 0xc, &(0x7f0000000900)={&(0x7f0000000040)={0x14, 0x1e, 0x201}, 0x14}, 0x1}, 0x0) 03:53:26 executing program 3: ioctl$BLKDISCARD(0xffffffffffffffff, 0x1277, &(0x7f0000000180)) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140)='/dev/snapshot\x00', 0x0, 0x0) fcntl$addseals(0xffffffffffffffff, 0x409, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f0000000000), &(0x7f00000000c0)=0x8) ioctl$EVIOCGLED(0xffffffffffffffff, 0x80404519, &(0x7f0000000580)=""/236) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x3c, 0x0) ioctl$EVIOCGKEYCODE_V2(0xffffffffffffffff, 0x80284504, &(0x7f00000003c0)=""/188) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c82, 0x0) 03:53:26 executing program 7: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f000000d000)={0xa, 0x4e20}, 0x1c) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}, 0xb}, 0x1c) syz_emit_ethernet(0x3e, &(0x7f00000001c0)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @random="e829f650db0f", [], {@ipv6={0x86dd, {0x0, 0x6, "50a09c", 0x8, 0xffffff11, 0x0, @remote={0xfe, 0x80, [], 0xbb}, @local={0xfe, 0x80, [], 0xaa}, {[], @udp={0x0, 0x4e20, 0x8}}}}}}, &(0x7f0000000040)) syz_emit_ethernet(0x3e, &(0x7f0000000000)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], {@ipv6={0x86dd, {0x0, 0x6, "50a09c", 0x8, 0xffffff11, 0x0, @remote={0xfe, 0x80, [], 0xbb}, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8100000000000000], 0xaa}, {[], @udp={0x300, 0x4e20, 0x8}}}}}}, &(0x7f0000000040)) 03:53:26 executing program 1: r0 = socket(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0xe200}, 0xc, &(0x7f0000000900)={&(0x7f0000000040)={0x14, 0x1e, 0x201}, 0x14}, 0x1}, 0x0) 03:53:26 executing program 5: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer2\x00', 0x0, 0x0) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000040)="025cc83d6d345f8f762070") ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r0, 0x40085112, &(0x7f0000b18000)={{0xffffff93}, {0xffffffa0}, 0x0, 0x0, 0x0, [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff03]}) [ 1445.278704] hfsplus: unable to parse mount options 03:53:26 executing program 6: r0 = socket(0x11, 0xa, 0x0) getsockopt$IP_VS_SO_GET_DESTS(r0, 0x0, 0x484, &(0x7f0000000000)=""/22, &(0x7f0000000040)=0x16) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000640)={0x0, 0x0, 0x0}, &(0x7f0000000680)=0xc) sched_setparam(r1, &(0x7f0000000080)=0x3) syz_mount_image$hfsplus(&(0x7f0000000100)='hfsplus\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, &(0x7f00000005c0), 0x0, &(0x7f00000006c0)={[{@gid={'gid', 0x3d, r2}, 0x2c}]}) ioctl$EVIOCGMASK(r0, 0x80104592, &(0x7f00000000c0)={0x17, 0xbc, &(0x7f0000000140)="4659d244483d4317c87793b853b414962f4ffaa4351627ac745dd3e2edfb99ad0ea7ae988b9fec66dd89bbbedeb12be3b3d227197e9201e44adb019e0e4dbb0e60046d19cafe034a78b771e64d06e05e2dc6c2f62d854ee6ce9ec6c523d19f6545a1d37c90ccbc55caa9855424226dc198ee45d95f0613dffc7051d20387d29ae93081771992ce792eb0d0e1b70c8f70b02075f15ffd79f8ed400a6aa8cc0d375ab432634ede0b03692a60d8ceeb0d88abfd37d3629d09ae7bf2a6c7"}) 03:53:26 executing program 1: r0 = socket(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x1c00}, 0xc, &(0x7f0000000900)={&(0x7f0000000040)={0x14, 0x1e, 0x201}, 0x14}, 0x1}, 0x0) 03:53:26 executing program 3: ioctl$BLKDISCARD(0xffffffffffffffff, 0x1277, &(0x7f0000000180)) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140)='/dev/snapshot\x00', 0x0, 0x0) fcntl$addseals(0xffffffffffffffff, 0x409, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f0000000000), &(0x7f00000000c0)=0x8) ioctl$EVIOCGLED(0xffffffffffffffff, 0x80404519, &(0x7f0000000580)=""/236) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x3c, 0x0) ioctl$EVIOCGKEYCODE_V2(0xffffffffffffffff, 0x80284504, &(0x7f00000003c0)=""/188) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c82, 0x0) [ 1445.684346] hfsplus: gid requires an argument [ 1445.688967] hfsplus: unable to parse mount options [ 1445.708047] hfsplus: gid requires an argument [ 1445.712676] hfsplus: unable to parse mount options 03:53:27 executing program 2: r0 = syz_open_dev$sndseq(&(0x7f0000dcc000)='/dev/snd/seq\x00', 0x0, 0x2) read(r0, &(0x7f0000fb6000)=""/28, 0x3f0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000418f50)={{0x80}, "0a4ceaa05d9a00000000000000039b3fd4cec307e8ef3d13eb790ec9c65abaf90d229db692542e5b78f8b29e0a27800f0000000000000009fb42f376589701a4", 0xa9824f69d1376637, 0x10800a}) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000240)={0xbf}) write$binfmt_script(r0, &(0x7f0000000000)=ANY=[], 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f00000002c0)={{}, 'port0\x00'}) openat$sequencer2(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer2\x00', 0x0, 0x0) 03:53:27 executing program 4: r0 = socket(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x198}, 0xc, &(0x7f0000000900)={&(0x7f0000000040)={0x14, 0x1e, 0x201}, 0x14}, 0x1}, 0x0) 03:53:27 executing program 5: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer2\x00', 0x0, 0x0) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000040)="025cc83d6d345f8f762070") ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r0, 0x40085112, &(0x7f0000b18000)={{0xffffff93}, {0xffffffa0}, 0x0, 0x0, 0x0, [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8]}) 03:53:27 executing program 7: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f000000d000)={0xa, 0x4e20}, 0x1c) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}, 0xb}, 0x1c) syz_emit_ethernet(0x3e, &(0x7f00000001c0)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @random="e829f650db0f", [], {@ipv6={0x86dd, {0x0, 0x6, "50a09c", 0x8, 0xffffff11, 0x0, @remote={0xfe, 0x80, [], 0xbb}, @local={0xfe, 0x80, [], 0xaa}, {[], @udp={0x0, 0x4e20, 0x8}}}}}}, &(0x7f0000000040)) syz_emit_ethernet(0x3e, &(0x7f0000000000)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], {@ipv6={0x86dd, {0x0, 0x6, "50a09c", 0x8, 0xffffff11, 0x0, @remote={0xfe, 0x80, [], 0xbb}, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80ffffff], 0xaa}, {[], @udp={0x300, 0x4e20, 0x8}}}}}}, &(0x7f0000000040)) 03:53:27 executing program 0: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000100)='/dev/full\x00', 0x2000, 0x0) ioctl$BLKDISCARD(r0, 0x1277, &(0x7f0000000040)) syz_open_dev$usbmon(&(0x7f0000000080)='/dev/usbmon#\x00', 0xff, 0x4000) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140)='/dev/snapshot\x00', 0x0, 0x0) fcntl$addseals(0xffffffffffffffff, 0x409, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f0000000000), &(0x7f00000000c0)=0x8) ioctl$EVIOCGLED(0xffffffffffffffff, 0x80404519, &(0x7f0000000580)=""/236) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x3c, 0x0) ioctl$EVIOCGKEYCODE_V2(0xffffffffffffffff, 0x80284504, &(0x7f00000003c0)=""/188) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) r2 = semget(0x1, 0x2, 0x4) semctl$IPC_INFO(r2, 0x1, 0x3, &(0x7f00000001c0)=""/151) 03:53:27 executing program 1: r0 = socket(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x1b0}, 0xc, &(0x7f0000000900)={&(0x7f0000000040)={0x14, 0x1e, 0x201}, 0x14}, 0x1}, 0x0) 03:53:27 executing program 3: ioctl$BLKDISCARD(0xffffffffffffffff, 0x1277, &(0x7f0000000180)) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140)='/dev/snapshot\x00', 0x0, 0x0) fcntl$addseals(0xffffffffffffffff, 0x409, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f0000000000), &(0x7f00000000c0)=0x8) ioctl$EVIOCGLED(0xffffffffffffffff, 0x80404519, &(0x7f0000000580)=""/236) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x3c, 0x0) ioctl$EVIOCGKEYCODE_V2(0xffffffffffffffff, 0x80284504, &(0x7f00000003c0)=""/188) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c82, 0x0) 03:53:27 executing program 6: openat$ion(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ion\x00', 0x40000, 0x0) r0 = socket(0x11, 0xa, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000640)={0x0, 0x0, 0x0}, &(0x7f0000000680)=0xc) syz_mount_image$hfsplus(&(0x7f0000000240)='hfsplus\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, &(0x7f00000005c0), 0x0, &(0x7f00000006c0)={[{@gid={'gid', 0x3d, r1}, 0x2c}]}) 03:53:27 executing program 1: r0 = socket(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x53}, 0xc, &(0x7f0000000900)={&(0x7f0000000040)={0x14, 0x1e, 0x201}, 0x14}, 0x1}, 0x0) [ 1446.366921] hfsplus: gid requires an argument [ 1446.371552] hfsplus: unable to parse mount options 03:53:27 executing program 3: ioctl$BLKDISCARD(0xffffffffffffffff, 0x1277, &(0x7f0000000180)) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140)='/dev/snapshot\x00', 0x0, 0x0) fcntl$addseals(0xffffffffffffffff, 0x409, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f0000000000), &(0x7f00000000c0)=0x8) ioctl$EVIOCGLED(0xffffffffffffffff, 0x80404519, &(0x7f0000000580)=""/236) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x3c, 0x0) ioctl$EVIOCGKEYCODE_V2(0xffffffffffffffff, 0x80284504, &(0x7f00000003c0)=""/188) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c82, 0x0) 03:53:27 executing program 7: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f000000d000)={0xa, 0x4e20}, 0x1c) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}, 0xb}, 0x1c) syz_emit_ethernet(0x3e, &(0x7f00000001c0)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @random="e829f650db0f", [], {@ipv6={0x86dd, {0x0, 0x6, "50a09c", 0x8, 0xffffff11, 0x0, @remote={0xfe, 0x80, [], 0xbb}, @local={0xfe, 0x80, [], 0xaa}, {[], @udp={0x0, 0x4e20, 0x8}}}}}}, &(0x7f0000000040)) syz_emit_ethernet(0x3e, &(0x7f0000000000)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], {@ipv6={0x86dd, {0x0, 0x6, "50a09c", 0x8, 0xffffff11, 0x0, @remote={0xfe, 0x80, [], 0xbb}, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffca88], 0xaa}, {[], @udp={0x300, 0x4e20, 0x8}}}}}}, &(0x7f0000000040)) 03:53:28 executing program 4: r0 = socket(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x7d}, 0xc, &(0x7f0000000900)={&(0x7f0000000040)={0x14, 0x1e, 0x201}, 0x14}, 0x1}, 0x0) 03:53:28 executing program 5: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer2\x00', 0x0, 0x0) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000040)="025cc83d6d345f8f762070") ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r0, 0x40085112, &(0x7f0000b18000)={{0xffffff93}, {0xffffffa0}, 0x0, 0x0, 0x0, [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4]}) 03:53:28 executing program 1: r0 = socket(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x8501000000000000}, 0xc, &(0x7f0000000900)={&(0x7f0000000040)={0x14, 0x1e, 0x201}, 0x14}, 0x1}, 0x0) 03:53:28 executing program 4: r0 = socket(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x1b00000000000000}, 0xc, &(0x7f0000000900)={&(0x7f0000000040)={0x14, 0x1e, 0x201}, 0x14}, 0x1}, 0x0) 03:53:28 executing program 7: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f000000d000)={0xa, 0x4e20}, 0x1c) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}, 0xb}, 0x1c) syz_emit_ethernet(0x3e, &(0x7f00000001c0)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @random="e829f650db0f", [], {@ipv6={0x86dd, {0x0, 0x6, "50a09c", 0x8, 0xffffff11, 0x0, @remote={0xfe, 0x80, [], 0xbb}, @local={0xfe, 0x80, [], 0xaa}, {[], @udp={0x0, 0x4e20, 0x8}}}}}}, &(0x7f0000000040)) syz_emit_ethernet(0x3e, &(0x7f0000000000)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], {@ipv6={0x86dd, {0x0, 0x6, "50a09c", 0x8, 0xffffff11, 0x0, @remote={0xfe, 0x80, [], 0xbb}, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6488], 0xaa}, {[], @udp={0x300, 0x4e20, 0x8}}}}}}, &(0x7f0000000040)) 03:53:29 executing program 2: r0 = syz_open_dev$sndseq(&(0x7f0000dcc000)='/dev/snd/seq\x00', 0x0, 0x2) read(r0, &(0x7f0000fb6000)=""/28, 0x3f0) socketpair(0x11, 0x5, 0x6, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$inet6_MRT6_ADD_MFC(r1, 0x29, 0xcc, &(0x7f0000000380)={{0xa, 0x4e23, 0x1, @mcast1={0xff, 0x1, [], 0x1}, 0x3}, {0xa, 0x4e21, 0x1ff, @ipv4={[], [0xff, 0xff]}}, 0x7, [0x3, 0x80, 0xdb7c, 0x100, 0x8, 0xfffffffffffffffc, 0x5, 0x8]}, 0x5c) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000418f50)={{0x80}, "0a4ceaa05d9a00000000000000039b3fd4cec307e8ef3d13eb790ec9c65abaf90d229db692542e5b78f8b29e0a27800f0000000000000009fb42f376589701a4", 0xa9824f69d1376637, 0x10800a}) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000240)={0xbf}) r2 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer\x00', 0x20000, 0x0) getsockopt$inet_sctp_SCTP_PR_SUPPORTED(0xffffffffffffffff, 0x84, 0x71, &(0x7f0000000140)={0x0, 0x3}, &(0x7f0000000180)=0x8) setsockopt$inet_sctp_SCTP_RTOINFO(r2, 0x84, 0x0, &(0x7f00000001c0)={r3, 0xffffffffffffffc1, 0x0, 0x400000000000000}, 0x10) write$binfmt_script(r0, &(0x7f0000000000)=ANY=[], 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f00000002c0)={{}, 'port0\x00'}) r4 = openat$sequencer2(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer2\x00', 0x0, 0x0) getsockopt$ARPT_SO_GET_INFO(r4, 0x0, 0x60, &(0x7f0000000000)={'filter\x00'}, &(0x7f0000000080)=0x44) 03:53:29 executing program 5: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer2\x00', 0x0, 0x0) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000040)="025cc83d6d345f8f762070") ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r0, 0x40085112, &(0x7f0000b18000)={{0xffffff93}, {0xffffffa0}, 0x0, 0x0, 0x0, [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x500000000000000]}) 03:53:29 executing program 6: r0 = socket(0x11, 0xa, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000640)={0x0, 0x0, 0x0}, &(0x7f0000000680)=0xc) syz_mount_image$nfs4(&(0x7f00000000c0)='nfs4\x00', &(0x7f0000000100)='./file0\x00', 0x2, 0x1, &(0x7f0000000180)=[{&(0x7f0000000140)="deefce9cdfe12fed190c7ab10d6d1dce3b50db3905a66532d71aca18a756736ad9e7f58db4fb52f0b13605d476b9f53e750dbeec8ea8297d89", 0x39, 0x1000}], 0x40000, &(0x7f00000001c0)='wlan1\x00') getsockopt$IPT_SO_GET_INFO(r0, 0x0, 0x40, &(0x7f0000000000)={'nat\x00'}, &(0x7f0000000080)=0x54) syz_mount_image$hfsplus(&(0x7f0000000240)='hfsplus\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, &(0x7f00000005c0), 0x0, &(0x7f00000006c0)={[{@gid={'gid', 0x3d, r1}, 0x2c}]}) 03:53:29 executing program 1: r0 = socket(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x5a000000}, 0xc, &(0x7f0000000900)={&(0x7f0000000040)={0x14, 0x1e, 0x201}, 0x14}, 0x1}, 0x0) 03:53:29 executing program 0: ioctl$BLKDISCARD(0xffffffffffffffff, 0x1277, &(0x7f0000000180)) r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000200)='/proc/sys/net/ipv4/vs/drop_entry\x00', 0x2, 0x0) ioctl$KVM_GET_REGS(r0, 0x8090ae81, &(0x7f0000000300)) r1 = syz_open_dev$usbmon(&(0x7f00000001c0)='/dev/usbmon#\x00', 0xff, 0x4000) r2 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140)='/dev/snapshot\x00', 0x0, 0x0) fcntl$addseals(0xffffffffffffffff, 0x409, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TUNGETVNETHDRSZ(r2, 0x800454d7, &(0x7f0000000100)) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f0000000000)={0x0}, &(0x7f00000000c0)=0x8) ioctl$EVIOCGLED(r2, 0x80404519, &(0x7f0000000480)=""/236) r4 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x2040, 0x0) ioctl$EVIOCGKEYCODE_V2(0xffffffffffffffff, 0x80284504, &(0x7f00000003c0)=""/188) setsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r1, 0x84, 0x6, &(0x7f0000000580)={r3, @in6={{0xa, 0x4e20, 0xfff, @dev={0xfe, 0x80, [], 0xf}, 0x1}}}, 0x84) ioctl$LOOP_CTL_REMOVE(r4, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r4, 0x4c80, 0x0) setsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r2, 0x84, 0x13, &(0x7f0000000080)=0x1000, 0x4) ioctl$sock_inet_SIOCSIFPFLAGS(r2, 0x8934, &(0x7f0000000040)={'gretap0\x00', 0x3}) 03:53:29 executing program 4: r0 = socket(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x3b000000}, 0xc, &(0x7f0000000900)={&(0x7f0000000040)={0x14, 0x1e, 0x201}, 0x14}, 0x1}, 0x0) 03:53:29 executing program 7: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f000000d000)={0xa, 0x4e20}, 0x1c) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}, 0xb}, 0x1c) syz_emit_ethernet(0x3e, &(0x7f00000001c0)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @random="e829f650db0f", [], {@ipv6={0x86dd, {0x0, 0x6, "50a09c", 0x8, 0xffffff11, 0x0, @remote={0xfe, 0x80, [], 0xbb}, @local={0xfe, 0x80, [], 0xaa}, {[], @udp={0x0, 0x4e20, 0x8}}}}}}, &(0x7f0000000040)) syz_emit_ethernet(0x3e, &(0x7f0000000000)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], {@ipv6={0x86dd, {0x0, 0x6, "50a09c", 0x8, 0xffffff11, 0x0, @remote={0xfe, 0x80, [], 0xbb}, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000000000], 0xaa}, {[], @udp={0x300, 0x4e20, 0x8}}}}}}, &(0x7f0000000040)) 03:53:29 executing program 3: ioctl$BLKDISCARD(0xffffffffffffffff, 0x1277, &(0x7f0000000180)) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140)='/dev/snapshot\x00', 0x0, 0x0) fcntl$addseals(0xffffffffffffffff, 0x409, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f0000000000), &(0x7f00000000c0)=0x8) ioctl$EVIOCGLED(0xffffffffffffffff, 0x80404519, &(0x7f0000000580)=""/236) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x3c, 0x0) ioctl$EVIOCGKEYCODE_V2(0xffffffffffffffff, 0x80284504, &(0x7f00000003c0)=""/188) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c82, 0x0) 03:53:29 executing program 5: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer2\x00', 0x0, 0x0) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000040)="025cc83d6d345f8f762070") ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r0, 0x40085112, &(0x7f0000b18000)={{0xffffff93}, {0xffffffa0}, 0x0, 0x0, 0x0, [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000000000]}) [ 1447.723229] hfsplus: gid requires an argument [ 1447.727879] hfsplus: unable to parse mount options 03:53:29 executing program 7: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f000000d000)={0xa, 0x4e20}, 0x1c) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}, 0xb}, 0x1c) syz_emit_ethernet(0x3e, &(0x7f00000001c0)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @random="e829f650db0f", [], {@ipv6={0x86dd, {0x0, 0x6, "50a09c", 0x8, 0xffffff11, 0x0, @remote={0xfe, 0x80, [], 0xbb}, @local={0xfe, 0x80, [], 0xaa}, {[], @udp={0x0, 0x4e20, 0x8}}}}}}, &(0x7f0000000040)) syz_emit_ethernet(0x3e, &(0x7f0000000000)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], {@ipv6={0x86dd, {0x0, 0x6, "50a09c", 0x8, 0xffffff11, 0x0, @remote={0xfe, 0x80, [], 0xbb}, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80350000], 0xaa}, {[], @udp={0x300, 0x4e20, 0x8}}}}}}, &(0x7f0000000040)) 03:53:29 executing program 4: r0 = socket(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x1500}, 0xc, &(0x7f0000000900)={&(0x7f0000000040)={0x14, 0x1e, 0x201}, 0x14}, 0x1}, 0x0) 03:53:29 executing program 1: r0 = socket(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x9501000000000000}, 0xc, &(0x7f0000000900)={&(0x7f0000000040)={0x14, 0x1e, 0x201}, 0x14}, 0x1}, 0x0) 03:53:29 executing program 3: ioctl$BLKDISCARD(0xffffffffffffffff, 0x1277, &(0x7f0000000180)) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140)='/dev/snapshot\x00', 0x0, 0x0) fcntl$addseals(0xffffffffffffffff, 0x409, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f0000000000), &(0x7f00000000c0)=0x8) ioctl$EVIOCGLED(0xffffffffffffffff, 0x80404519, &(0x7f0000000580)=""/236) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x3c, 0x0) ioctl$EVIOCGKEYCODE_V2(0xffffffffffffffff, 0x80284504, &(0x7f00000003c0)=""/188) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c82, 0x0) 03:53:29 executing program 6: r0 = socket(0x11, 0xa, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000640)={0x0, 0x0, 0x0}, &(0x7f0000000680)=0xc) syz_mount_image$hfsplus(&(0x7f0000000240)='hfsplus\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x7, &(0x7f0000000400)=[{&(0x7f0000000000)="abb0ed0bd0a8fcbcc4b77586ae31effa970079f49b13b6e305afada2d34cbade0e63c3a2331a9fda68c2", 0x2a, 0xd8ca}, {&(0x7f0000000040)="b6ed820624576e5976465c5bdc1483ad7217ad16eb2445ed060f728873bd28e6624aacf4e8b53024bbeb6950a25a4b9e9abe658e17d18488de8917ec0cf3dd", 0xfffffffffffffed6, 0x80000000}, {&(0x7f0000000080)="cb73455d5286e7ded2813bc1a3c985e1bb0edf2dda7e00b1ba26160db1e0dc34af076d2d73eaf9e03cacb3f9d3932183f4dc66e1b7950ea2070ec4f603076804e2e1d85b5225bc7c7c797d078d75d5d02dd9d721e6053cea21829ffb28aa81204367c3237b48508fb5c8bfc7ac0f319227848a9119719637b7943fb4f31e5475bb45ba", 0x83, 0x9}, {&(0x7f0000000140)="c4540f9e50f02edd09c88e9eb011ff94b6d9458c935c5d38442e2b1868363bf4e6fb2b42f2c56a4adf7231c3785ad2821443107eea4ce58759ad244342024e5d9b1a92c444d536ff011b398d3f6761453fc7947d262a38e1101096c178374667b7c6bfe7b87a9d735d509da93baacc61805cbc9d1f6b567c50dd10dd9343d7fc75c8aa18b5d8961dcbb177a8559f6a6f819b03cf98c0", 0x96, 0x1000}, {&(0x7f0000000700)="a3569885ca73abaddeb83e0e2af68851eccd28ea32909a7ce21c704c60611cd962c2f75a52e674084c0c38332010ca042877b5dbf013df7ea8cb7ee8dba65b40826cab39445213526431cde8a4f3272238bc0beadd9e20cce0214e1866e85844ad29f32e5b20e3af9a3488400bedd9b629e01176627dbb1e2c7fb842ce3404e2e9195ecf819bfffe36452dd1e2276a59e772fabb71e537313a7808cc01daedf5e4af8b4b6282891b92e291a5471557373bf389a9d2d3c755a95e2aadcb27990f0f5d02037e0904d55b27dca81110b6144bfd4abc766d8a8bc658526bb3614c6ec56b3be81f5d0d49f121b49886651d493059029a2019712b1ef278a7c6fb56c7b718866cc049bd9ecf2a06a4bd07ec3596504a803afb9867994808e1697695230f525b40bcb6197905f9097c3f3ef3777baedc4253d5b1e74ea95fbe1bfee24b3fe91b7e60d1ceed5dd6a6fce98d608257901e8c1678021bbf92a4b7e1852fd4d632909f0b6193fd33c2d9e32708ef6708a42cfa976002c587f586adfd87695333316e864c32aa94f54e65bd7eb8558681e4420850a1df66c159c0762172dc3318af1e09ed040dbbbccb927a633891813598a3a9a0d73eced6360e9d4f10262ace0048994722c3f632b227b84c7b3998a3c637478f1266620da05508c07946f10832f876fe6932f4d5a6cb842f2cbb1ef1d9af4c660aaaf2d14acfd9dcc8686ba6cc74945f65eea82b200db1350562b70df7df1aeae673f57fe03b9d66363e339d4d170a68f37535dbf698a68aa421628490ae18dddb2270f656d6195ad281cb73f177875a08ad4704195bd767709e4dbbc1841e4ef892866c8ed68402bcd904d9ef15e9ffc226e0d3fda1cfae6ad71ca1fe1dc230a6dd7519a30e3a4543e15229fffe7fe00b684ed1bf29a6bec88b91cae90c5e992bb1526074374163daf9d8f32d1e865b64f344978e426569499415f0239afba80dd1eddd0ae4f862bc7c3fab28c7ffca8487d8035e761a8a28c6500bdf76aa160340f076ebf5f5ec505d22b20295b8e38f119da73b71382f2bd22e6302ed6a5c369a6c6dde73cc5e1c229fce7c2511cef0253cd562f016ee33ffa35e3075466727ba970655cdd9d9ce1572150ffa5e24eebccf1c5b884dae1c4a8931e7098d77f27f3c8e2d624c07d613e6cec078ce75eb251392aaef5c7f771bb125768c97a0cc33cc3a7dc021d2bd385666412d45680b9762b17333938beff26f55247050e49729bf28dcde0a46448de66efd3fd9794920e36e22204d7839ba5d000642515492f3b6f7317e44a5a013cb7be5686c2f68190e29077020cec45c506811ba35ff5d7fb3d63c4624eb991d6a4881c2a65c3b0b04afb7ee0b00522385e3d8225e5fcc490fcd890c74a1f47bfa817966c2dcc098363edca873ae42d7df06f50ae55ac2f5d2f668b193ab0c5feade820cda6f69f25638ff58d604f09d57387226c5e90cbefb72e4003f27155ecda3a6cabd692b1ded4a2e0d19541266b8384c568a708a50c96f726449c7f40d53bc2a5e08f6a9e755e259b19178c3f504c07d0cdfd81fddf65e6183cc25e7e3c27e9a0bebfc8e745fec482ff6273575464d455b172bdb011642ec1099caca228fbc6c2ed94359cd05b6c08269af67a611761d151cb59bba163a453c7b20fa052e4e778d9d5a01d9f8d05308e5b544eecf8d0004b665c2ef859dff8b72dda7c935407efbbaf7253d53b1770bf48ec2b5be696543f24d3ab124a8bef1344fe2a44d84e257036ac81a1bcef630ca3c2d8546e38ed7ffee8d13f8aa751e0c4ea71aca0d257b65494d068d6139cd1bdc3f22500e787db5e84057cf611df7bb93812f497fff71f04a70e4c25ae9fe8a67ed6569ad1a51e0c0a91b94d93f24fa6ab23419bace05391a8227f805e1ab93759a237156a995ba3e9115543356250fad9a63c380e58fdacffe5cb3594e787200258a42f3f3e17212b7267bb4ba2108c43ca78a5548a48006e7ab1d72ca39beb614545477c6faa5cbc3955b32180c8940c34e74d1efeb8b08daaf4cc029a2bbf33bac2aa4db0f2e698ece13759174dba3ee9b5410ba456cc2fc24a0f8d1921761cf171f59b1cedf5121e5662f908251391ba923bba93fbc3c6d1e2047c90c6a6d093fa453c634ab955e7e124c4d3bd66b50f9012b4cfb0768079c3cff1a96ecd1abf883dcc75a7bc3c900ddc9a75db9b5f9aa6ad1d11fdaf1f34406875028f80db6061321a25ed0bc9380b24b665da07fe3e8e7e213dd2da058df5a7082b3d33d41923b0ec5b35ffc10541e60b77456a0d58501f36384042430e84e538c2c2aff4bf19b36a6ab78e78eface975a8e9f875ff32ee8bdb04a9e30a570aac1d4761a2bf5e0d7acd3150a56b11a90d61401b3c368107ed5cef04fb31878b5e4a9854d35c70ff2decec4abe5d10dad44f6c7a2d6fe2ac4b0c60bbcddedbb5ca5879c101834e89a6cd27048c313668c096b5ce2845fd38c888a12391f269b27b2f932b9e02c2041d1c6f457f683586684442c6472388e1ce1648ead6e564f655533f11b591f8601300261c9578d393b8b8d73949be03801d78152a1011db254d59ceb7b6ab814d015c36c15a218edc5798477dab2038af578a5c898d7af4fa97c309acd0529cc76ba13cbbab4518ad08e8e017a580c9f618a2bfdac029db6582ed25096c226937971196c447b00496b4a47bfab2f94719aa796f5e9cc5054b795e4f68dedc8a0483a9d71f3bac47eb0cebc3f294f44b0aedce6ed97324eb6fc3c6a899bd635beba13900c8265074ccedaf35720b0f948f581b89ec207982b5c25b6f6ec2d18f21da523d9c3e359a1757dad4bd8b8a38a303eecd958f4e18631c6c8217136d9d69a872d56d5cf7b59b4343b39f50854fe0f2c5ccecf06424482083f3768109ddd692b0fcd1c7b82cce0da30d6dfb6ae3041479dc45dedf7850bcea3ef43acbb3aeacfb7d37486674c42d726d506258e73bd0fd100d933c360b6d1e3f2811a57575129243a2717e9fc9ce4539beac706551871c17bd357f051a5667b60ac72dbe967bc05eec6ade0675eb5e7884a402df864984c0a608982879994435576b242b513f8775389697f9cba153664da75d5abb325673ec9d314350164a1f981bb8b5376623be2fdec51af6d70920a5f20d729223e18b53c6ab35ad8fb05f3a2124b2feea1faa02cbdd63085ebc53e55e05b01b0ceefc109695303634af4c877ce987a360453f72f090e715c45c77be5da4757ac68777c09ee47303d5db9886fbc1747dcdef108b3a014f08878d0e20d663a618d3037ccab0937de71677641ef149f489c13b8e6887154848f762b8674a27f47c374e2f0f39b228efe3b09e0b53345cf44830429f65c8b29e4fafd4865baa97339b5b7d1a97e664e51cfd66ff50a4d08861bd28ad260902cdd32da10fb8dabddc1e90ea7f0e360343cfaa163f20255fd0d280461ad787647001e0c1d087a3c382eb9c1102a38b82819ebaf036903424b65c6f022f31a5ee4c38f661c518d5becdda25fe8e59ba2a9dd40c129cd85b3519b3bab5c303cb31ea520bbb1223783e6d68597e36c7c118dc56ae1522c1e80a33b4e3fe37bcee804d21f891e17bc7f47571cf1ea2a7ebf0aaec7cf62521a98016b3c75fae1103a160b31b5d93968040dc8957cb40f4ccb70163f6ebd0f26595807b009faaf04aaac5c1fb34ff9929ed08789ed10da69f7854a57979dbc4d791acef0cbb7bf6ef4d6c33a75ffe80a3254fca151d33039a00d32243265580297139f4883d34d2c4a462982a6b525a43a8e4f23e03078cae69cfb80221dbcb7c895ad78bc832e5730a20c63d0a8888176120ddf29de9570d92c19e4108d385fd28e6152f4e8271335550d6c879acb6f595abd2742c479e36b034b3ff0128f2d77c2a8e3912696c502015fc5c80b6afa7d18eae7460ce6b3c44db2e876316365ec97de4ed8204deb18cca2fbcebbc802c933c8a28c09b79003e96874190ad9a20ff5a993feefd77c2e2d7b40d22e822a44bb4083f2b264956b1312102457eb8498f3aec335a871e57c505cdb7ec39d6b270926f772136403080df751e72a1e920dd4d4db811d1ae9db53cb12d37d7704a52583466dd4a6079e32347cc3e4bc00520e33eda9057345292985030640cc93642443d6142edc840abcae9fc395c9c5edd6a2070968a1cc4e7512270696c03cfe8b0a8f68b01e50e62fde154386dbce50bb9611091f3b219abd27162c7647e1d30b4419249d668e628625e3dc7ca41878df758fb214250a104936254feca03a0a38abb78a810af6fa3ffc0128ba0ebff88b41ef49f3855dfac56bbe067eaca09d1b50a05e0259061432b852ff37bf0a4d2ffab9c57f241574c679ce916b98358eed97097ce48a79250b6d3c699fb3367bdff6ece022ef18b31034cdc2478e6f6a6e7945a6a225827342bb3d2eabe21e0e625766daeee14c07db2d816ffee79dd965f1c6c6ab9cdaf3891b9a74259710061162f8404fe5e01ea963e956fc4dc10d1aa3afa1b9513fb64069f4c1166625ec6bd54dd1c433873167dc61efbd28689574608f18e3d1985298ccaac4c3e43956cd7cd547281e1327a96a53152c910d224c5ce7e53958dc2ecce15a7c8578dff47254c8ec72c9b1d48b09cb980221dea7c70355c02adf0ba60cc958430ba369d0b8b1683ab9d93a9906a2cca9b13b85d1066a6acdde645e8a14a97c4c3edd7e2fff6e448986168e5b219f3feccaa719640a573c7d3e639018bf0669e120980ff837d1282f13a98d7a85d13548d49a314f66c63cf8c7d5b36566f9aaff25ad7b0649bd5265f48d3e4f163e89f9f6adac52d705e46f917ee435704f468b49a1f69283f9f0b59d27ca076fcaedc9f750dccb469454aba5e551f430ba88414181e5b4bbddd958129fcd90121be7b85f818e2f1262476135c73c9529b9c38c0d4f363c694fe1ac33cdadec1daba0273bc8895ed914eaaaed30bc465b262d37d12ce31c563a06ec597f8205b4cfe89a4919dd04374869f6c9f7d46e832bcd6162c70eb549cf0cbe61f72d81b933d0ef0347a2f5da471a185909bf6a771ce653857f8c406717738a08fffe1bb12ad6f2941fb089741892e2f014791581047bbc91e31ff9da9a0951a24874d94ee55555825ba348a4ee5ca9390aa3cc7686f9f0579392bc915510307d24d078d1250029abc64a9657ea1c55bffaa17007683ec0b900fadc4c90cb6494a7f3abae3fe0b2247e30e42a8c75d43f164dd674ac348c7d2ecbbbc23375779abd996228fe7cd0cfb1eb542e00847b7e9513104b4f49929a7d90f186793d354382cf17c2aa28c273aa289c2e2f158d480dc13607b81fc5bf4cce9ac0d2553990ce4e66a9457c2a84923afec006dbc03e9835c26ea990fe016f0548d9851a2d2a51293c4ae51a8a8aca5c8216d9e8f08ff949c64e63f794d43d9e6f72b08f42376d3069d4ca3113e593a2d99d4ffdade3e42ecafd0ba75b6b731423dd3c0505aca1e9041e4d9d7ddd708ae6fc305a3430aeef80a3a72861f9ec2b5cf90d29158274a3aa6f4330ab2cdc659826fc23ee94dbaee4224e723e072af54a049b73a26b4d56c30f47540967d2650533880e09c724bfb3b11820004b347767b552bc897dcc91d3a7a9f40826ae7e3282ff2b3d4c4e23ff5bd3fda27d4bb7351180667909bce4294ed4493f4046cf67f76be9cfb328b73f66093672636a3dab951ee5b2b513153001f48117169b17152f157dfa1fe1c27e213286beab6a46f6dc995eed600c2947dd5661f0808f9e18ab", 0x1000, 0x2}, {&(0x7f0000000300)="52f50e7127d9c007c6d2f8861bbe3de66771ee8b335c5d9c77835c5b7d72f4b38c9002020340c8aff813a43c562c65eae39ae5a6f07548774b6b4733cffd81106c30ebae0045eb26d4b609eebc2b5e30a8b473962ca89be106a31325831f42de1ac75697b52ab81dcdb09a862bee92f7600ff840065eb8b46a62977e63b6e463d7c78a03e6ec87cb3fa03cdab1523cfd0e98076da35cee7c1b5612fcf6932199085aa19a4c9bb96b0f87922fa8611dc7f4255cfca969c8e20e1f2dd52673aa2dec918c9503403b221bf8c2cf7d76a7d3667f47bc5af1934f67380af224c903e989dc3581fe45", 0x63, 0x7}, {&(0x7f0000001700)="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", 0x1000, 0xfffffffffffffe00}], 0x0, &(0x7f00000006c0)={[{@gid={'gid', 0x3d, r1}, 0x2c}]}) 03:53:29 executing program 4: r0 = socket(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x87010000}, 0xc, &(0x7f0000000900)={&(0x7f0000000040)={0x14, 0x1e, 0x201}, 0x14}, 0x1}, 0x0) 03:53:29 executing program 7: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f000000d000)={0xa, 0x4e20}, 0x1c) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}, 0xb}, 0x1c) syz_emit_ethernet(0x3e, &(0x7f00000001c0)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @random="e829f650db0f", [], {@ipv6={0x86dd, {0x0, 0x6, "50a09c", 0x8, 0xffffff11, 0x0, @remote={0xfe, 0x80, [], 0xbb}, @local={0xfe, 0x80, [], 0xaa}, {[], @udp={0x0, 0x4e20, 0x8}}}}}}, &(0x7f0000000040)) syz_emit_ethernet(0x3e, &(0x7f0000000000)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], {@ipv6={0x86dd, {0x0, 0x6, "50a09c", 0x8, 0xffffff11, 0x0, @remote={0xfe, 0x80, [], 0xbb}, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000], 0xaa}, {[], @udp={0x300, 0x4e20, 0x8}}}}}}, &(0x7f0000000040)) [ 1448.640551] hfsplus: gid requires an argument [ 1448.645159] hfsplus: unable to parse mount options [ 1448.793522] hfsplus: gid requires an argument [ 1448.798160] hfsplus: unable to parse mount options 03:53:30 executing program 2: r0 = syz_open_dev$sndseq(&(0x7f0000dcc000)='/dev/snd/seq\x00', 0x0, 0x2) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000418f50)={{0x80}, "0a4ceaa05d9a00000000000000039b3fd4cec307e8ef3d13eb790ec9c65abaf90d229db692542e5b78f8b29e0a27800f0000000000000009fb42f376589701a4", 0xa9824f69d1376637, 0x10800a}) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000240)={0xbf}) write$binfmt_script(r0, &(0x7f0000000000)=ANY=[], 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f00000002c0)={{}, 'port0\x00'}) openat$sequencer2(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer2\x00', 0x0, 0x0) 03:53:30 executing program 1: r0 = socket(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x84010000}, 0xc, &(0x7f0000000900)={&(0x7f0000000040)={0x14, 0x1e, 0x201}, 0x14}, 0x1}, 0x0) 03:53:30 executing program 5: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer2\x00', 0x0, 0x0) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000040)="025cc83d6d345f8f762070") ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r0, 0x40085112, &(0x7f0000b18000)={{0xffffff93}, {0xffffffa0}, 0x0, 0x0, 0x0, [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5000000]}) 03:53:30 executing program 0: ioctl$BLKDISCARD(0xffffffffffffffff, 0x1277, &(0x7f0000000180)) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000001c0)='memory.swap.current\x00', 0x0, 0x0) ioctl$KVM_SET_PIT2(r0, 0x4070aea0, &(0x7f0000000200)={[{0x9, 0x3742, 0xbb1f, 0x9, 0x1000, 0x40, 0x8001, 0x8, 0x8, 0x9, 0x40, 0x2, 0x9}, {0x7fb8, 0x5, 0x20, 0x707, 0x57, 0x100000001, 0x7, 0x800, 0xfff, 0x0, 0x61c, 0x10000, 0xa3a6}, {0xff, 0x10000, 0x7, 0x2, 0x1f, 0xff, 0x0, 0x534, 0x9, 0x0, 0x2, 0x6e30, 0xbe}], 0x9a1a}) r1 = syz_open_dev$usbmon(&(0x7f0000000080)='/dev/usbmon#\x00', 0xff, 0x4000) r2 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140)='/dev/snapshot\x00', 0x0, 0x0) fcntl$addseals(0xffffffffffffffff, 0x409, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f0000000000), &(0x7f00000000c0)=0x8) ioctl$EVIOCGLED(0xffffffffffffffff, 0x80404519, &(0x7f0000000580)=""/236) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000280)='/dev/loop-control\x00', 0x1000010001, 0x0) ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$EVIOCGKEYCODE_V2(0xffffffffffffffff, 0x80284504, &(0x7f00000003c0)=""/188) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x0) getsockopt$inet6_udp_int(r2, 0x11, 0xa, &(0x7f0000000040), &(0x7f0000000100)=0x4) 03:53:30 executing program 3: 03:53:30 executing program 4: r0 = socket(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0xc00}, 0xc, &(0x7f0000000900)={&(0x7f0000000040)={0x14, 0x1e, 0x201}, 0x14}, 0x1}, 0x0) 03:53:30 executing program 7: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f000000d000)={0xa, 0x4e20}, 0x1c) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}, 0xb}, 0x1c) syz_emit_ethernet(0x3e, &(0x7f00000001c0)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @random="e829f650db0f", [], {@ipv6={0x86dd, {0x0, 0x6, "50a09c", 0x8, 0xffffff11, 0x0, @remote={0xfe, 0x80, [], 0xbb}, @local={0xfe, 0x80, [], 0xaa}, {[], @udp={0x0, 0x4e20, 0x8}}}}}}, &(0x7f0000000040)) syz_emit_ethernet(0x3e, &(0x7f0000000000)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], {@ipv6={0x86dd, {0x0, 0x6, "50a09c", 0x8, 0xffffff11, 0x0, @remote={0xfe, 0x80, [], 0xbb}, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc0ffffff00000000], 0xaa}, {[], @udp={0x300, 0x4e20, 0x8}}}}}}, &(0x7f0000000040)) 03:53:30 executing program 6: r0 = socket(0x11, 0xa, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000640)={0x0, 0x0, 0x0}, &(0x7f0000000680)=0xc) syz_mount_image$hfsplus(&(0x7f0000000240)='hfsplus\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, &(0x7f00000005c0), 0x0, &(0x7f00000006c0)=ANY=[@ANYBLOB="6702003d", @ANYRESHEX=r2, @ANYBLOB=',\x00']) sched_setaffinity(r1, 0x8, &(0x7f00000003c0)=0x9) syz_mount_image$nfs4(&(0x7f0000000000)='nfs4\x00', &(0x7f0000000040)='./file0\x00', 0x1, 0x3, &(0x7f00000001c0)=[{&(0x7f0000000080)="b0b918803e7305b9bf3dee1f87593471fd97b3", 0x13, 0x1}, {&(0x7f00000000c0)="3cb57caa178090ffe6a69b1b66047c2b254a0d7608c55db93d82f2a98553d8775bb08486da0a8ef36ffc570bce862ca27088d00e2be1f003450ae137cf0713ef851dc2d55152b796a97193c6c9611b7996c89a8aa362eabbbd3ae00dba2fe3cced7b3a0d3693eee9c385cb65ac48579e467b748186ac71ff832cb4fa7eae104df5f6c5d22cc80533fe6ff2531b4d9df5f605e60d6eabf41ada4c314f57a5b033c51ff7827e0371f5cc96e5a2ff5272d72dcc7a23771f0d033d187acf7bd258542a61040cb12d26ec0ca7c1bf5ae00e78", 0xd0, 0x6c7}, {&(0x7f0000000300)="44260c91d590e89f7a96a08f0c32a04bbfbb1226634f52bb5319db3a24605e2d209933c425f67a9484fc50b552f24095b2959c5b835fb5f01589f8561148b81980ad88f04ee18285ceb9643149f1922969e8d272d26508c19fea6779f24710f03f843b45af6c5eeb99ab9bf3c60897e287e694cbd9f341c1bb86e8a0e0a8ed270292d2cd351e50eabf395cdd04549f", 0x8f, 0x8}], 0x2000, &(0x7f0000000280)='hfsplus\x00') 03:53:30 executing program 1: r0 = socket(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x2101}, 0xc, &(0x7f0000000900)={&(0x7f0000000040)={0x14, 0x1e, 0x201}, 0x14}, 0x1}, 0x0) 03:53:30 executing program 3: 03:53:30 executing program 4: r0 = socket(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0xc2}, 0xc, &(0x7f0000000900)={&(0x7f0000000040)={0x14, 0x1e, 0x201}, 0x14}, 0x1}, 0x0) 03:53:30 executing program 7: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f000000d000)={0xa, 0x4e20}, 0x1c) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}, 0xb}, 0x1c) syz_emit_ethernet(0x3e, &(0x7f00000001c0)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @random="e829f650db0f", [], {@ipv6={0x86dd, {0x0, 0x6, "50a09c", 0x8, 0xffffff11, 0x0, @remote={0xfe, 0x80, [], 0xbb}, @local={0xfe, 0x80, [], 0xaa}, {[], @udp={0x0, 0x4e20, 0x8}}}}}}, &(0x7f0000000040)) syz_emit_ethernet(0x3e, &(0x7f0000000000)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], {@ipv6={0x86dd, {0x0, 0x6, "50a09c", 0x8, 0xffffff11, 0x0, @remote={0xfe, 0x80, [], 0xbb}, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000000000], 0xaa}, {[], @udp={0x300, 0x4e20, 0x8}}}}}}, &(0x7f0000000040)) 03:53:30 executing program 5: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer2\x00', 0x0, 0x0) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000040)="025cc83d6d345f8f762070") ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r0, 0x40085112, &(0x7f0000b18000)={{0xffffff93}, {0xffffffa0}, 0x0, 0x0, 0x0, [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000]}) 03:53:30 executing program 0: ioctl$BLKDISCARD(0xffffffffffffffff, 0x1277, &(0x7f0000000180)) r0 = syz_open_dev$usbmon(&(0x7f0000000080)='/dev/usbmon#\x00', 0xff, 0x4000) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140)='/dev/snapshot\x00', 0x0, 0x0) fcntl$addseals(0xffffffffffffffff, 0x409, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f0000000000), &(0x7f00000000c0)=0x8) ioctl$EVIOCGLED(0xffffffffffffffff, 0x80404519, &(0x7f0000000580)=""/236) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x3c, 0x0) ioctl$EVIOCGKEYCODE_V2(0xffffffffffffffff, 0x80284504, &(0x7f00000003c0)=""/188) ioctl$SCSI_IOCTL_GET_PCI(r0, 0x5387, &(0x7f0000000040)) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) 03:53:30 executing program 2: r0 = syz_open_dev$sndseq(&(0x7f0000dcc000)='/dev/snd/seq\x00', 0x0, 0x2) read(r0, &(0x7f0000fb6000)=""/28, 0x3f0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000418f50)={{0x80}, "0a4ceaa05d9a00000000000000039b3fd4cec307e8ef3d13eb790ec9c65abaf90d229db692542e5b78f8b29e0a27800f0000000000000009fb42f376589701a4", 0xa9824f69d1376637, 0x10800a}) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000240)={0xbe, @tick, 0x0, {0x0, 0x100000000}}) write$binfmt_script(r0, &(0x7f0000000000)=ANY=[], 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f00000002c0)={{}, 'port0\x00'}) openat$sequencer2(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer2\x00', 0x0, 0x0) [ 1449.232572] hfsplus: unable to parse mount options 03:53:30 executing program 3: 03:53:30 executing program 1: r0 = socket(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x1801}, 0xc, &(0x7f0000000900)={&(0x7f0000000040)={0x14, 0x1e, 0x201}, 0x14}, 0x1}, 0x0) 03:53:30 executing program 4: r0 = socket(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1c}, 0xc, &(0x7f0000000900)={&(0x7f0000000040)={0x14, 0x1e, 0x201}, 0x14}, 0x1}, 0x0) [ 1449.280557] hfsplus: unable to parse mount options 03:53:30 executing program 6: r0 = socket(0x2, 0x1, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000640)={0x0, 0x0, 0x0}, &(0x7f0000000680)=0xc) syz_mount_image$hfsplus(&(0x7f0000000240)='hfsplus\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, &(0x7f00000005c0), 0x0, &(0x7f00000006c0)={[{@gid={'gid', 0x3d, r1}, 0x2c}]}) connect$l2tp(r0, &(0x7f0000000000)=@pppol2tpin6={0x18, 0x1, {0x0, r0, 0x3, 0x2, 0x3, 0x0, {0xa, 0x4e20, 0xfff, @dev={0xfe, 0x80, [], 0x20}, 0xb82}}}, 0x32) 03:53:30 executing program 7: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f000000d000)={0xa, 0x4e20}, 0x1c) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}, 0xb}, 0x1c) syz_emit_ethernet(0x3e, &(0x7f00000001c0)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @random="e829f650db0f", [], {@ipv6={0x86dd, {0x0, 0x6, "50a09c", 0x8, 0xffffff11, 0x0, @remote={0xfe, 0x80, [], 0xbb}, @local={0xfe, 0x80, [], 0xaa}, {[], @udp={0x0, 0x4e20, 0x8}}}}}}, &(0x7f0000000040)) syz_emit_ethernet(0x3e, &(0x7f0000000000)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], {@ipv6={0x86dd, {0x0, 0x6, "50a09c", 0x8, 0xffffff11, 0x0, @remote={0xfe, 0x80, [], 0xbb}, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x88a8ffff], 0xaa}, {[], @udp={0x300, 0x4e20, 0x8}}}}}}, &(0x7f0000000040)) 03:53:30 executing program 5: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer2\x00', 0x0, 0x0) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000040)="025cc83d6d345f8f762070") ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r0, 0x40085112, &(0x7f0000b18000)={{0xffffff93}, {0xffffffa0}, 0x0, 0x0, 0x0, [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x500]}) 03:53:31 executing program 3: 03:53:31 executing program 1: r0 = socket(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x125}, 0xc, &(0x7f0000000900)={&(0x7f0000000040)={0x14, 0x1e, 0x201}, 0x14}, 0x1}, 0x0) 03:53:31 executing program 7: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f000000d000)={0xa, 0x4e20}, 0x1c) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}, 0xb}, 0x1c) syz_emit_ethernet(0x3e, &(0x7f00000001c0)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @random="e829f650db0f", [], {@ipv6={0x86dd, {0x0, 0x6, "50a09c", 0x8, 0xffffff11, 0x0, @remote={0xfe, 0x80, [], 0xbb}, @local={0xfe, 0x80, [], 0xaa}, {[], @udp={0x0, 0x4e20, 0x8}}}}}}, &(0x7f0000000040)) syz_emit_ethernet(0x3e, &(0x7f0000000000)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], {@ipv6={0x86dd, {0x0, 0x6, "50a09c", 0x8, 0xffffff11, 0x0, @remote={0xfe, 0x80, [], 0xbb}, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb00], 0xaa}, {[], @udp={0x300, 0x4e20, 0x8}}}}}}, &(0x7f0000000040)) 03:53:31 executing program 4: r0 = socket(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x3d00000000000000}, 0xc, &(0x7f0000000900)={&(0x7f0000000040)={0x14, 0x1e, 0x201}, 0x14}, 0x1}, 0x0) 03:53:31 executing program 5: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer2\x00', 0x0, 0x0) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000040)="025cc83d6d345f8f762070") ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r0, 0x40085112, &(0x7f0000b18000)={{0xffffff93}, {0xffffffa0}, 0x0, 0x0, 0x0, [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffdfd]}) 03:53:31 executing program 0: ioctl$BLKDISCARD(0xffffffffffffffff, 0x1277, &(0x7f0000000180)) syz_open_dev$usbmon(&(0x7f0000000080)='/dev/usbmon#\x00', 0xff, 0x4000) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140)='/dev/snapshot\x00', 0x0, 0x0) fcntl$addseals(0xffffffffffffffff, 0x409, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$adsp(&(0x7f0000000040)='/dev/adsp#\x00', 0x4, 0x8042) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f0000000000), &(0x7f00000000c0)=0x8) ioctl$EVIOCGLED(0xffffffffffffffff, 0x80404519, &(0x7f0000000580)=""/236) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x3c, 0x0) ioctl$EVIOCGKEYCODE_V2(0xffffffffffffffff, 0x80284504, &(0x7f00000003c0)=""/188) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) 03:53:31 executing program 6: r0 = socket(0x11, 0xa, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000640)={0x0, 0x0, 0x0}, &(0x7f0000000680)=0xc) syz_mount_image$hfsplus(&(0x7f0000000240)='hfsplus\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, &(0x7f00000005c0), 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="06cfa8a00c2b0358c3a516bf3513861393b9b2761a6e0300000000000000ed61a5254c664f88ebfe37de116ab74fcc64ae5762842d39e8226e0ddbeed0d908f0e221f4e1dbfeca776234ba36cd03b4d2de5f040f1b6232674ed18da20128707ef841ff6eaa4c0b2104d065c4a04bfc90c443b0aa2ff7cc659e6931df8f94c31df9d74a61439af73641223bbe9222727156ad7e0e333bfaea7127a679f1966fe4ec953988", @ANYRESHEX=r1, @ANYBLOB=',\x00']) 03:53:31 executing program 3: [ 1449.678117] hfsplus: gid requires an argument [ 1449.682791] hfsplus: unable to parse mount options [ 1449.708945] hfsplus: gid requires an argument [ 1449.714185] hfsplus: unable to parse mount options 03:53:31 executing program 1: r0 = socket(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0xce00000000000000}, 0xc, &(0x7f0000000900)={&(0x7f0000000040)={0x14, 0x1e, 0x201}, 0x14}, 0x1}, 0x0) [ 1450.201069] hfsplus: unable to parse mount options [ 1450.219198] hfsplus: unable to parse mount options 03:53:32 executing program 2: r0 = syz_open_dev$sndseq(&(0x7f0000dcc000)='/dev/snd/seq\x00', 0x0, 0x2) read(r0, &(0x7f0000fb6000)=""/28, 0x3f0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000418f50)={{0x80}, "0a4ceaa05d9a00000000000000039b3fd4cec307e8ef3d13eb790ec9c65abaf90d229db692542e5b78f8b29e0a27800f0000000000000009fb42f376589701a4", 0xa9824f69d1376637, 0x10800a}) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000240)={0xbf}) write$binfmt_script(r0, &(0x7f0000000000)=ANY=[], 0x0) semget(0x3, 0x2, 0xd4) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f00000002c0)={{}, 'port0\x00'}) openat$sequencer2(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer2\x00', 0x0, 0x0) 03:53:32 executing program 4: r0 = socket(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0xd9000000}, 0xc, &(0x7f0000000900)={&(0x7f0000000040)={0x14, 0x1e, 0x201}, 0x14}, 0x1}, 0x0) 03:53:32 executing program 5: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer2\x00', 0x0, 0x0) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000040)="025cc83d6d345f8f762070") ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r0, 0x40085112, &(0x7f0000b18000)={{0xffffff93}, {0xffffffa0}, 0x0, 0x0, 0x0, [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd]}) 03:53:32 executing program 7: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f000000d000)={0xa, 0x4e20}, 0x1c) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}, 0xb}, 0x1c) syz_emit_ethernet(0x3e, &(0x7f00000001c0)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @random="e829f650db0f", [], {@ipv6={0x86dd, {0x0, 0x6, "50a09c", 0x8, 0xffffff11, 0x0, @remote={0xfe, 0x80, [], 0xbb}, @local={0xfe, 0x80, [], 0xaa}, {[], @udp={0x0, 0x4e20, 0x8}}}}}}, &(0x7f0000000040)) syz_emit_ethernet(0x3e, &(0x7f0000000000)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], {@ipv6={0x86dd, {0x0, 0x6, "50a09c", 0x8, 0xffffff11, 0x0, @remote={0xfe, 0x80, [], 0xbb}, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x89060000], 0xaa}, {[], @udp={0x300, 0x4e20, 0x8}}}}}}, &(0x7f0000000040)) 03:53:32 executing program 3: 03:53:32 executing program 1: r0 = socket(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x3a010000}, 0xc, &(0x7f0000000900)={&(0x7f0000000040)={0x14, 0x1e, 0x201}, 0x14}, 0x1}, 0x0) 03:53:32 executing program 0: ioctl$BLKDISCARD(0xffffffffffffffff, 0x1277, &(0x7f0000000180)) syz_open_dev$usbmon(&(0x7f0000000080)='/dev/usbmon#\x00', 0xff, 0x4000) r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140)='/dev/snapshot\x00', 0x0, 0x0) write$binfmt_elf32(r0, &(0x7f0000000680)={{0x7f, 0x45, 0x4c, 0x46, 0x4, 0x3, 0x47, 0x3, 0x2, 0x3, 0x3e, 0x5, 0x24e, 0x38, 0x384, 0x9, 0x1, 0x20, 0x1, 0x400, 0x4, 0x1000}, [{0x6474e551, 0x1, 0x6, 0x6, 0xfff, 0x1, 0xfff, 0x1741}], "eb243be7ac76261c661f11e67e0da0b95f59a0278663b7ca342a6ce2", [[], [], [], [], [], [], [], [], []]}, 0x974) fcntl$addseals(0xffffffffffffffff, 0x409, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f0000000000), &(0x7f00000000c0)=0x8) ioctl$EVIOCGLED(0xffffffffffffffff, 0x80404519, &(0x7f0000000580)=""/236) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x3c, 0x0) ioctl$EVIOCGKEYCODE_V2(0xffffffffffffffff, 0x80284504, &(0x7f00000003c0)=""/188) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) r2 = dup2(r0, r0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) 03:53:32 executing program 6: r0 = socket(0x11, 0xa, 0x0) setsockopt$inet6_tcp_buf(r0, 0x6, 0x3f, &(0x7f00000000c0)="a7fe028b8943abaf53d52f150604f52368afafb02f2d93b6197400d3079c3f86af2a55ca9ad2e33a588ba62196f6caf0eaeacd543d1e6411e16164", 0x3b) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000640)={0x0, 0x0, 0x0}, &(0x7f0000000680)=0xc) accept4$unix(r0, &(0x7f0000000000), &(0x7f0000000080)=0x6e, 0x80800) syz_mount_image$hfsplus(&(0x7f0000000240)='hfsplus\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, &(0x7f00000005c0), 0x0, &(0x7f00000006c0)={[{@gid={'gid', 0x3d, r1}, 0x2c}]}) 03:53:32 executing program 3: 03:53:32 executing program 7: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f000000d000)={0xa, 0x4e20}, 0x1c) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}, 0xb}, 0x1c) syz_emit_ethernet(0x3e, &(0x7f00000001c0)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @random="e829f650db0f", [], {@ipv6={0x86dd, {0x0, 0x6, "50a09c", 0x8, 0xffffff11, 0x0, @remote={0xfe, 0x80, [], 0xbb}, @local={0xfe, 0x80, [], 0xaa}, {[], @udp={0x0, 0x4e20, 0x8}}}}}}, &(0x7f0000000040)) syz_emit_ethernet(0x3e, &(0x7f0000000000)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], {@ipv6={0x86dd, {0x0, 0x6, "50a09c", 0x8, 0xffffff11, 0x0, @remote={0xfe, 0x80, [], 0xbb}, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3000000], 0xaa}, {[], @udp={0x300, 0x4e20, 0x8}}}}}}, &(0x7f0000000040)) 03:53:32 executing program 4: r0 = socket(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0xc6}, 0xc, &(0x7f0000000900)={&(0x7f0000000040)={0x14, 0x1e, 0x201}, 0x14}, 0x1}, 0x0) 03:53:32 executing program 1: r0 = socket(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x3000}, 0xc, &(0x7f0000000900)={&(0x7f0000000040)={0x14, 0x1e, 0x201}, 0x14}, 0x1}, 0x0) 03:53:32 executing program 5: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer2\x00', 0x0, 0x0) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000040)="025cc83d6d345f8f762070") ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r0, 0x40085112, &(0x7f0000b18000)={{0xffffff93}, {0xffffffa0}, 0x0, 0x0, 0x0, [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff]}) [ 1450.614107] hfsplus: gid requires an argument [ 1450.618724] hfsplus: unable to parse mount options 03:53:32 executing program 0: ioctl$BLKDISCARD(0xffffffffffffffff, 0x1277, &(0x7f0000000180)) r0 = syz_open_dev$usbmon(&(0x7f0000000080)='/dev/usbmon#\x00', 0xff, 0x4000) r1 = accept4$packet(r0, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @dev}, &(0x7f0000000100)=0x14, 0x800) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140)='/dev/snapshot\x00', 0x0, 0x0) fcntl$addseals(r1, 0x409, 0x21) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$full(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/full\x00', 0x400, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f0000000000), &(0x7f00000000c0)=0x8) ioctl$EVIOCGLED(0xffffffffffffffff, 0x80404519, &(0x7f0000000580)=""/236) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x3c, 0x0) ioctl$EVIOCGKEYCODE_V2(0xffffffffffffffff, 0x80284504, &(0x7f00000003c0)=""/188) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) 03:53:32 executing program 6: r0 = socket(0x10000413, 0xa, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000640), &(0x7f0000000680)=0xc) syz_mount_image$hfsplus(&(0x7f0000000140)='hfsplus\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, &(0x7f00000005c0), 0x0, &(0x7f0000000180)=ANY=[]) setsockopt$inet6_dccp_buf(r0, 0x21, 0xc, &(0x7f0000000000)="14001582b7b1dd8156946a076e665b818dbfc7f941aec5ea6f7c0ea27231eccf21c2a4421e3879032e485bd657c2a55952e199ec47a2679b458036bcafb1eaf910414b0d47b9cce612545c678a14cde8fb0b45e4281287d0d3256263636fb669301baa299b029773e9c9b475b4693d08d34ce353c5f1aa3e9806fc30ee", 0x7d) ioctl$sock_inet_SIOCSARP(r0, 0x8955, &(0x7f00000000c0)={{0x2, 0x4e21, @rand_addr=0x20}, {0x6, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0x1e}}, 0x44, {0x2, 0x4e23, @multicast1=0xe0000001}, 'veth1_to_bond\x00'}) [ 1450.661558] hfsplus: gid requires an argument [ 1450.666257] hfsplus: unable to parse mount options 03:53:32 executing program 3: [ 1451.029441] hfsplus: unable to find HFS+ superblock [ 1451.051860] hfsplus: unable to find HFS+ superblock 03:53:33 executing program 2: r0 = syz_open_dev$sndseq(&(0x7f0000dcc000)='/dev/snd/seq\x00', 0x0, 0x2) read(r0, &(0x7f0000fb6000)=""/28, 0x3f0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000418f50)={{0x80}, "0a4ceaa05d9a00000000000000039b3fd4cec307e8ef3d13eb790ec9c65abaf90d229db692542e5b78f8b29e0a27800f0000000000000009fb42f376589701a4", 0xa9824f69d1376637, 0x10800a}) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000240)={0xbf}) write$binfmt_script(r0, &(0x7f0000000000)=ANY=[], 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f00000002c0)={{}, 'port0\x00'}) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x0, 0x0) 03:53:33 executing program 4: r0 = socket(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1600000000000000}, 0xc, &(0x7f0000000900)={&(0x7f0000000040)={0x14, 0x1e, 0x201}, 0x14}, 0x1}, 0x0) 03:53:33 executing program 7: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f000000d000)={0xa, 0x4e20}, 0x1c) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}, 0xb}, 0x1c) syz_emit_ethernet(0x3e, &(0x7f00000001c0)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @random="e829f650db0f", [], {@ipv6={0x86dd, {0x0, 0x6, "50a09c", 0x8, 0xffffff11, 0x0, @remote={0xfe, 0x80, [], 0xbb}, @local={0xfe, 0x80, [], 0xaa}, {[], @udp={0x0, 0x4e20, 0x8}}}}}}, &(0x7f0000000040)) syz_emit_ethernet(0x3e, &(0x7f0000000000)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], {@ipv6={0x86dd, {0x0, 0x6, "50a09c", 0x8, 0xffffff11, 0x0, @remote={0xfe, 0x80, [], 0xbb}, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x500], 0xaa}, {[], @udp={0x300, 0x4e20, 0x8}}}}}}, &(0x7f0000000040)) 03:53:33 executing program 1: r0 = socket(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x12d}, 0xc, &(0x7f0000000900)={&(0x7f0000000040)={0x14, 0x1e, 0x201}, 0x14}, 0x1}, 0x0) 03:53:33 executing program 5: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer2\x00', 0x0, 0x0) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000040)="025cc83d6d345f8f762070") ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r0, 0x40085112, &(0x7f0000b18000)={{0xffffff93}, {0xffffffa0}, 0x0, 0x0, 0x0, [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f00000000000000]}) 03:53:33 executing program 3: 03:53:33 executing program 0: r0 = syz_open_dev$usbmon(&(0x7f0000000080)='/dev/usbmon#\x00', 0xff, 0x4000) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140)='/dev/snapshot\x00', 0x0, 0x0) fcntl$addseals(0xffffffffffffffff, 0x409, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f0000000000), &(0x7f00000000c0)=0x8) ioctl$EVIOCGBITSW(r0, 0x80404525, &(0x7f0000000480)=""/156) ioctl$EVIOCGLED(0xffffffffffffffff, 0x80404519, &(0x7f0000000580)=""/236) ioctl$sock_bt_bnep_BNEPCONNDEL(r0, 0x400442c9, &(0x7f0000000040)={0x0, @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}}) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000180)={{{@in=@remote, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@local}, 0x0, @in6=@loopback}}, &(0x7f0000000280)=0xe8) ioctl$SG_GET_TIMEOUT(r1, 0x2202, 0x0) connect$packet(r0, &(0x7f0000000300)={0x11, 0xf8, r2, 0x1, 0x3f, 0x6, @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}}, 0x14) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x3c, 0x0) ioctl$EVIOCGKEYCODE_V2(0xffffffffffffffff, 0x80284504, &(0x7f00000003c0)=""/188) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x0) 03:53:33 executing program 6: r0 = socket(0x11, 0xa, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000640)={0x0, 0x0, 0x0}, &(0x7f0000000680)=0xc) prctl$getreaper(0x0, &(0x7f0000000000)) r2 = syz_open_dev$audion(&(0x7f0000000040)='/dev/audio#\x00', 0xfff, 0x28000) clock_gettime(0x0, &(0x7f00000000c0)={0x0, 0x0}) syz_mount_image$hfsplus(&(0x7f0000000140)='hfsplus\x00', &(0x7f0000000180)='./file0\x00', 0x3, 0x2, &(0x7f00000001c0)=[{&(0x7f0000000300)="79f526b68ff84fcccfa08468ee43989e81c30200236d022995cab18ab79122c1e2d19ccee9a457562ee9023a7433f10570dfdaae14eb280aace37e0acd85da78098804631127057021a27cfea46562ce6fe7d23a0cc4543bbc4bc269eabefcbb25cc875fdd79591e485bbf156e4018a49ce93855d7cd28a68aaad8c143078ea6c1d15d90c8634846ee92dbadfe1b721e16e9c12c26914e4353a36e80f8c97b42bd480b602c6fb07e5001ecd3a6789bee6be88cfc02f3437aa67971b81a6c07ce9575", 0xc2, 0x7}, {&(0x7f0000000400)="9bc47708035f8f6e59e583733fc906dd1ebe52e3d950efa06b030cff1cbac5ad4cb95332c291a021da4e823de318ea57baa8bf770daa43cc22ae53d4798cf569309e98b940e43fe739d806b2751f662a176c3e3e152ca88e1b96c31883db1edfaaec5f1b9126f87e436f9064c72b531d409d6610dde665ded592a27ef13223a20dda2cdae1254780d15c6a9e", 0x8c, 0x7f}], 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"]) utimensat(r2, &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)={{0x0, 0x7530}, {r3, r4/1000+10000}}, 0x100) syz_mount_image$hfsplus(&(0x7f0000000240)='hfsplus\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, &(0x7f00000005c0), 0x0, &(0x7f00000006c0)={[{@gid={'gid', 0x3d, r1}, 0x2c}]}) 03:53:33 executing program 7: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f000000d000)={0xa, 0x4e20}, 0x1c) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}, 0xb}, 0x1c) syz_emit_ethernet(0x3e, &(0x7f00000001c0)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @random="e829f650db0f", [], {@ipv6={0x86dd, {0x0, 0x6, "50a09c", 0x8, 0xffffff11, 0x0, @remote={0xfe, 0x80, [], 0xbb}, @local={0xfe, 0x80, [], 0xaa}, {[], @udp={0x0, 0x4e20, 0x8}}}}}}, &(0x7f0000000040)) syz_emit_ethernet(0x3e, &(0x7f0000000000)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], {@ipv6={0x86dd, {0x0, 0x6, "50a09c", 0x8, 0xffffff11, 0x0, @remote={0xfe, 0x80, [], 0xbb}, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800e], 0xaa}, {[], @udp={0x300, 0x4e20, 0x8}}}}}}, &(0x7f0000000040)) 03:53:33 executing program 3: 03:53:33 executing program 5: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer2\x00', 0x0, 0x0) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000040)="025cc83d6d345f8f762070") ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r0, 0x40085112, &(0x7f0000b18000)={{0xffffff93}, {0xffffffa0}, 0x0, 0x0, 0x0, [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800000000000000]}) 03:53:33 executing program 4: r0 = socket(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0xe400000000000000}, 0xc, &(0x7f0000000900)={&(0x7f0000000040)={0x14, 0x1e, 0x201}, 0x14}, 0x1}, 0x0) 03:53:33 executing program 1: r0 = socket(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x7801000000000000}, 0xc, &(0x7f0000000900)={&(0x7f0000000040)={0x14, 0x1e, 0x201}, 0x14}, 0x1}, 0x0) [ 1451.944060] hfsplus: unable to parse mount options 03:53:33 executing program 3: [ 1451.972493] hfsplus: gid requires an argument [ 1451.977121] hfsplus: unable to parse mount options 03:53:33 executing program 1: r0 = socket(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4101000000000000}, 0xc, &(0x7f0000000900)={&(0x7f0000000040)={0x14, 0x1e, 0x201}, 0x14}, 0x1}, 0x0) 03:53:33 executing program 7: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f000000d000)={0xa, 0x4e20}, 0x1c) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}, 0xb}, 0x1c) syz_emit_ethernet(0x3e, &(0x7f00000001c0)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @random="e829f650db0f", [], {@ipv6={0x86dd, {0x0, 0x6, "50a09c", 0x8, 0xffffff11, 0x0, @remote={0xfe, 0x80, [], 0xbb}, @local={0xfe, 0x80, [], 0xaa}, {[], @udp={0x0, 0x4e20, 0x8}}}}}}, &(0x7f0000000040)) syz_emit_ethernet(0x3e, &(0x7f0000000000)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], {@ipv6={0x86dd, {0x0, 0x6, "50a09c", 0x8, 0xffffff11, 0x0, @remote={0xfe, 0x80, [], 0xbb}, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2800000000000000], 0xaa}, {[], @udp={0x300, 0x4e20, 0x8}}}}}}, &(0x7f0000000040)) 03:53:34 executing program 2: r0 = syz_open_dev$sndseq(&(0x7f0000dcc000)='/dev/snd/seq\x00', 0x0, 0x2) read(r0, &(0x7f0000fb6000)=""/28, 0x3f0) r1 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x20000, 0x0) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(0xffffffffffffff9c, 0x84, 0x71, &(0x7f0000000040)={0x0, 0xfffffffffffffffb}, &(0x7f0000000080)=0x8) setsockopt$inet_sctp_SCTP_AUTH_DEACTIVATE_KEY(r1, 0x84, 0x23, &(0x7f0000000100)={r2, 0xecac}, 0x8) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000418f50)={{0x80}, "0a4ceaa05d9a00000000000000039b3fd4cec307e8ef3d13eb790ec9c65abaf90d229db692542e5b78f8b29e0a27800f0000000000000009fb42f376589701a4", 0xa9824f69d1376639, 0x10800a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000240)={0xbf}) write$binfmt_script(r0, &(0x7f0000000000)=ANY=[], 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f00000002c0)={{}, 'port0\x00'}) ioctl$sock_bt_hidp_HIDPCONNADD(r1, 0x400448c8, &(0x7f0000000380)={r1, r1, 0x2fe6, 0x2, &(0x7f00000001c0)="be80b674d05efb83c5591a7299c7a2106101727c82ecb5bbf636d39bac30165c5775bbc4165882f3ea987c5519edcdd618a6c65fc6a5ea6c779e04b3eb66ad92cdf39dbfe2", 0xffffffffffffff45, 0x8, 0xdaf, 0x0, 0x3aa, 0x6e, 0x33a, "0f1c86a506c1965d47b6100e8c2f12f5fc17492e9aee9e3ae27932f51fddb0f65589ddd5bf63002f81b358bded769e4ce99a83abd9ef179c5b580b521fed9b9d3c9a17105b0f6d6f9bbea1bae20553c340737ef45f121d4ab98f771ec70cf43b7a85fafa945b651f439ec386a9596c593baac0ee8fae25a0730d294bf79401bb19cc97f153562621f2bec64403a189b5"}) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r1, 0x84, 0x72, &(0x7f0000000140)={r2, 0xffffffff, 0x10}, &(0x7f0000000180)=0xc) openat$sequencer2(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer2\x00', 0x0, 0x0) 03:53:34 executing program 6: r0 = socket(0x11, 0xa, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000640)={0x0, 0x0, 0x0}, &(0x7f0000000680)=0xc) fchmodat(r0, &(0x7f0000000080)='./file1\x00', 0x8) syz_mount_image$hfsplus(&(0x7f0000000240)='hfsplus\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, &(0x7f00000005c0), 0x0, &(0x7f00000006c0)=ANY=[@ANYBLOB='gid=', @ANYRESHEX=r1, @ANYBLOB='(\x00']) r2 = syz_open_dev$audion(&(0x7f0000000000)='/dev/audio#\x00', 0xe6ef, 0x2000) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x4, 0x7ff, 0x7fff, 0x7fffffff, 0x1b, r2, 0x1000}, 0x2c) 03:53:34 executing program 4: r0 = socket(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x5201}, 0xc, &(0x7f0000000900)={&(0x7f0000000040)={0x14, 0x1e, 0x201}, 0x14}, 0x1}, 0x0) 03:53:34 executing program 5: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer2\x00', 0x0, 0x0) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000040)="025cc83d6d345f8f762070") ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r0, 0x40085112, &(0x7f0000b18000)={{0xffffff93}, {0xffffffa0}, 0x0, 0x0, 0x0, [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfdfdffff]}) 03:53:34 executing program 0: ioctl$BLKDISCARD(0xffffffffffffffff, 0x1277, &(0x7f0000000180)) r0 = syz_open_dev$usbmon(&(0x7f0000000080)='/dev/usbmon#\x00', 0xff, 0x4000) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140)='/dev/snapshot\x00', 0x0, 0x0) fcntl$addseals(0xffffffffffffffff, 0x409, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f0000000000), &(0x7f00000000c0)=0x8) ioctl$EVIOCGLED(0xffffffffffffffff, 0x80404519, &(0x7f0000000580)=""/236) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x3c, 0x0) ioctl$EVIOCGKEYCODE_V2(0xffffffffffffffff, 0x80284504, &(0x7f00000003c0)=""/188) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) r3 = request_key(&(0x7f0000000100)='.request_key_auth\x00', &(0x7f00000001c0)={0x73, 0x79, 0x7a, 0x2}, &(0x7f0000000200)='/dev/snd/controlC#\x00', 0xfffffffffffffff9) r4 = add_key(&(0x7f0000000240)='.request_key_auth\x00', &(0x7f0000000280)={0x73, 0x79, 0x7a, 0x2}, &(0x7f0000000480)="282b28312351817f433beb0dd89868e057e5274d52122a085c37fbf7adf1b987ccdc5a3d0a2b36b9d8e395fcf123468c2834141f3b7e734dadbca89920397790c43f319900aca9cf83eeda467f7675be039c6a3f4f246e5e0d0bd1c62dbb7de581fa18216af30b18fe482bd5c978280d35cf5155b9989be5245435f57f5b3ff95185335194e23dffc1955f7bb048a3017ca681e022fbcec0ff6766a9baa5258a577bd8c8dc924478c3d6bd35916c4b4fd0078dd8b7a6be2feee4d9cc858e3366e1807ea654602c13aed8e115a5c56dd847e6bb8c95ddf0d83a3e7232dd490951455933f00550f1b22b0c8cf410fb", 0xee, 0xfffffffffffffff8) keyctl$negate(0xd, r3, 0x6703d01f, r4) getsockname$packet(r1, &(0x7f00000022c0)={0x0, 0x0, 0x0}, &(0x7f0000002300)=0x14) connect$can_bcm(r2, &(0x7f0000002340)={0x1d, r5}, 0x10) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x800, 0x4080) ioctl$LOOP_CTL_GET_FREE(r2, 0x4c82) r6 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r6) 03:53:34 executing program 1: r0 = socket(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x50000000}, 0xc, &(0x7f0000000900)={&(0x7f0000000040)={0x14, 0x1e, 0x201}, 0x14}, 0x1}, 0x0) 03:53:34 executing program 3: 03:53:34 executing program 7: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f000000d000)={0xa, 0x4e20}, 0x1c) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}, 0xb}, 0x1c) syz_emit_ethernet(0x3e, &(0x7f00000001c0)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @random="e829f650db0f", [], {@ipv6={0x86dd, {0x0, 0x6, "50a09c", 0x8, 0xffffff11, 0x0, @remote={0xfe, 0x80, [], 0xbb}, @local={0xfe, 0x80, [], 0xaa}, {[], @udp={0x0, 0x4e20, 0x8}}}}}}, &(0x7f0000000040)) syz_emit_ethernet(0x3e, &(0x7f0000000000)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], {@ipv6={0x86dd, {0x0, 0x6, "50a09c", 0x8, 0xffffff11, 0x0, @remote={0xfe, 0x80, [], 0xbb}, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7], 0xaa}, {[], @udp={0x300, 0x4e20, 0x8}}}}}}, &(0x7f0000000040)) 03:53:34 executing program 3: [ 1453.107613] hfsplus: unable to parse mount options 03:53:34 executing program 1: r0 = socket(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x18f}, 0xc, &(0x7f0000000900)={&(0x7f0000000040)={0x14, 0x1e, 0x201}, 0x14}, 0x1}, 0x0) 03:53:34 executing program 4: r0 = socket(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8c}, 0xc, &(0x7f0000000900)={&(0x7f0000000040)={0x14, 0x1e, 0x201}, 0x14}, 0x1}, 0x0) 03:53:34 executing program 7: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f000000d000)={0xa, 0x4e20}, 0x1c) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}, 0xb}, 0x1c) syz_emit_ethernet(0x3e, &(0x7f00000001c0)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @random="e829f650db0f", [], {@ipv6={0x86dd, {0x0, 0x6, "50a09c", 0x8, 0xffffff11, 0x0, @remote={0xfe, 0x80, [], 0xbb}, @local={0xfe, 0x80, [], 0xaa}, {[], @udp={0x0, 0x4e20, 0x8}}}}}}, &(0x7f0000000040)) syz_emit_ethernet(0x3e, &(0x7f0000000000)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], {@ipv6={0x86dd, {0x0, 0x6, "50a09c", 0x8, 0xffffff11, 0x0, @remote={0xfe, 0x80, [], 0xbb}, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffc0], 0xaa}, {[], @udp={0x300, 0x4e20, 0x8}}}}}}, &(0x7f0000000040)) 03:53:34 executing program 5: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer2\x00', 0x0, 0x0) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000040)="025cc83d6d345f8f762070") ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r0, 0x40085112, &(0x7f0000b18000)={{0xffffff93}, {0xffffffa0}, 0x0, 0x0, 0x0, [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000]}) 03:53:34 executing program 6: r0 = socket(0x11, 0xa, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000640)={0x0, 0x0, 0x0}, &(0x7f0000000680)=0xc) r2 = creat(&(0x7f0000000300)='./file0\x00', 0xfffffffffffffffe) ioctl$KVM_SET_LAPIC(r2, 0x4400ae8f, &(0x7f0000000700)={"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"}) syz_mount_image$hfsplus(&(0x7f0000000240)='hfsplus\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, &(0x7f00000005c0), 0x0, &(0x7f00000006c0)=ANY=[@ANYBLOB='\x00\x00\x00\x00', @ANYRESHEX=r1, @ANYBLOB=',\x00']) getgroups(0x1, &(0x7f0000000140)=[r1]) pipe2(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x84800) ioctl$EVIOCGABS20(r3, 0x80184560, &(0x7f0000000040)=""/219) getsockopt$inet6_int(r2, 0x29, 0x3a, &(0x7f0000000180), &(0x7f00000001c0)=0x4) 03:53:34 executing program 3: 03:53:34 executing program 0: ioctl$BLKDISCARD(0xffffffffffffffff, 0x1277, &(0x7f0000000180)) syz_open_dev$usbmon(&(0x7f0000000080)='/dev/usbmon#\x00', 0xff, 0x4000) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140)='/dev/snapshot\x00', 0x0, 0x0) fcntl$addseals(0xffffffffffffffff, 0x409, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f0000000000), &(0x7f00000000c0)=0x8) ioctl$EVIOCGLED(0xffffffffffffffff, 0x80404519, &(0x7f0000000580)=""/236) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x3c, 0x0) ioctl$KVM_SET_LAPIC(r0, 0x4400ae8f, &(0x7f0000000680)={"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"}) ioctl$EVIOCGKEYCODE_V2(0xffffffffffffffff, 0x80284504, &(0x7f00000003c0)=""/188) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) [ 1453.541492] hfsplus: unable to find HFS+ superblock [ 1453.600128] hfsplus: unable to find HFS+ superblock 03:53:35 executing program 2: r0 = syz_open_dev$sndseq(&(0x7f0000dcc000)='/dev/snd/seq\x00', 0x0, 0x2) read(r0, &(0x7f0000fb6000)=""/28, 0x3f0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000418f50)={{0x80}, "0a4ceaa05d9a00000000000000039b3fd4cec307e8ef3d13eb790ec9c65abaf90d229db692542e5b78f8b29e0a27800f0000000000000009fb42f376589701a4", 0xa9824f69d1376637, 0x10800a}) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000240)={0xbf}) write$binfmt_script(r0, &(0x7f0000000000)=ANY=[], 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000000100)={{0x100000000, 0x1}, 'port0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x3, 0x4}) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer2\x00', 0x0, 0x0) getpeername(r1, &(0x7f0000000000)=@pppol2tpin6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @remote}}}, &(0x7f0000000080)=0x80) 03:53:35 executing program 1: r0 = socket(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x11}, 0xc, &(0x7f0000000900)={&(0x7f0000000040)={0x14, 0x1e, 0x201}, 0x14}, 0x1}, 0x0) 03:53:35 executing program 4: r0 = socket(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8401000000000000}, 0xc, &(0x7f0000000900)={&(0x7f0000000040)={0x14, 0x1e, 0x201}, 0x14}, 0x1}, 0x0) 03:53:35 executing program 7: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f000000d000)={0xa, 0x4e20}, 0x1c) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}, 0xb}, 0x1c) syz_emit_ethernet(0x3e, &(0x7f00000001c0)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @random="e829f650db0f", [], {@ipv6={0x86dd, {0x0, 0x6, "50a09c", 0x8, 0xffffff11, 0x0, @remote={0xfe, 0x80, [], 0xbb}, @local={0xfe, 0x80, [], 0xaa}, {[], @udp={0x0, 0x4e20, 0x8}}}}}}, &(0x7f0000000040)) syz_emit_ethernet(0x3e, &(0x7f0000000000)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], {@ipv6={0x86dd, {0x0, 0x6, "50a09c", 0x8, 0xffffff11, 0x0, @remote={0xfe, 0x80, [], 0xbb}, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8847000000000000], 0xaa}, {[], @udp={0x300, 0x4e20, 0x8}}}}}}, &(0x7f0000000040)) 03:53:35 executing program 5: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer2\x00', 0x0, 0x0) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000040)="025cc83d6d345f8f762070") ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r0, 0x40085112, &(0x7f0000b18000)={{0xffffff93}, {0xffffffa0}, 0x0, 0x0, 0x0, [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x500000000000000]}) 03:53:35 executing program 3: 03:53:35 executing program 6: r0 = socket(0x11, 0xa, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000000)={0x0, 0x0, 0x0}, &(0x7f0000000680)=0xc) syz_mount_image$hfsplus(&(0x7f0000000240)='hfsplus\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, &(0x7f00000005c0), 0x0, &(0x7f00000006c0)={[{@gid={'gid', 0x3d, r1}, 0x2c}]}) 03:53:35 executing program 0: ioctl$BLKDISCARD(0xffffffffffffffff, 0x1277, &(0x7f0000000180)) syz_open_dev$usbmon(&(0x7f0000000080)='/dev/usbmon#\x00', 0x5, 0x4000) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140)='/dev/snapshot\x00', 0x0, 0x0) fcntl$addseals(0xffffffffffffffff, 0x409, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f0000000000), &(0x7f00000000c0)=0x8) ioctl$EVIOCGLED(0xffffffffffffffff, 0x80404519, &(0x7f0000000580)=""/236) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x3c, 0x0) ioctl$EVIOCGKEYCODE_V2(0xffffffffffffffff, 0x80284504, &(0x7f00000003c0)=""/188) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) 03:53:36 executing program 3: 03:53:36 executing program 4: r0 = socket(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0xde000000}, 0xc, &(0x7f0000000900)={&(0x7f0000000040)={0x14, 0x1e, 0x201}, 0x14}, 0x1}, 0x0) 03:53:36 executing program 7: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f000000d000)={0xa, 0x4e20}, 0x1c) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}, 0xb}, 0x1c) syz_emit_ethernet(0x3e, &(0x7f00000001c0)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @random="e829f650db0f", [], {@ipv6={0x86dd, {0x0, 0x6, "50a09c", 0x8, 0xffffff11, 0x0, @remote={0xfe, 0x80, [], 0xbb}, @local={0xfe, 0x80, [], 0xaa}, {[], @udp={0x0, 0x4e20, 0x8}}}}}}, &(0x7f0000000040)) syz_emit_ethernet(0x3e, &(0x7f0000000000)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], {@ipv6={0x86dd, {0x0, 0x6, "50a09c", 0x8, 0xffffff11, 0x0, @remote={0xfe, 0x80, [], 0xbb}, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800000000000000], 0xaa}, {[], @udp={0x300, 0x4e20, 0x8}}}}}}, &(0x7f0000000040)) 03:53:36 executing program 1: r0 = socket(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x2500}, 0xc, &(0x7f0000000900)={&(0x7f0000000040)={0x14, 0x1e, 0x201}, 0x14}, 0x1}, 0x0) 03:53:36 executing program 5: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer2\x00', 0x0, 0x0) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000040)="025cc83d6d345f8f762070") ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r0, 0x40085112, &(0x7f0000b18000)={{0xffffff93}, {0xffffffa0}, 0x0, 0x0, 0x0, [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000]}) [ 1454.760605] hfsplus: gid requires an argument [ 1454.765247] hfsplus: unable to parse mount options 03:53:36 executing program 3: 03:53:36 executing program 1: r0 = socket(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0xf500}, 0xc, &(0x7f0000000900)={&(0x7f0000000040)={0x14, 0x1e, 0x201}, 0x14}, 0x1}, 0x0) 03:53:36 executing program 5: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer2\x00', 0x0, 0x0) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000040)="025cc83d6d345f8f762070") ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r0, 0x40085112, &(0x7f0000b18000)={{0xffffff93}, {0xffffffa0}, 0x0, 0x0, 0x0, [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f000000]}) [ 1454.863000] hfsplus: gid requires an argument [ 1454.867656] hfsplus: unable to parse mount options 03:53:37 executing program 2: r0 = syz_open_dev$sndseq(&(0x7f0000dcc000)='/dev/snd/seq\x00', 0x0, 0x2) read(r0, &(0x7f0000fb6000)=""/28, 0x3f0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000418f50)={{0x80}, "0a4ceaa05d9a0000000000001000003fd4790ec9c65abaf90d229dc792542e5b78f8b29e0a27800f000000e442f376580100", 0xa9824f69d1376635, 0x10800a, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x7}) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000240)={0xbf, @tick, 0x0, {}, 0x10000000}) r1 = syz_open_dev$sndpcmc(&(0x7f0000000000)='/dev/snd/pcmC#D#c\x00', 0x9, 0x40) accept$nfc_llcp(r1, 0x0, &(0x7f0000000040)) write$binfmt_script(r0, &(0x7f0000000000)=ANY=[], 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f00000002c0)={{}, 'port0\x00'}) openat$sequencer2(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer2\x00', 0x321000, 0x0) 03:53:37 executing program 4: r0 = socket(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0xe100}, 0xc, &(0x7f0000000900)={&(0x7f0000000040)={0x14, 0x1e, 0x201}, 0x14}, 0x1}, 0x0) 03:53:37 executing program 7: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f000000d000)={0xa, 0x4e20}, 0x1c) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}, 0xb}, 0x1c) syz_emit_ethernet(0x3e, &(0x7f00000001c0)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @random="e829f650db0f", [], {@ipv6={0x86dd, {0x0, 0x6, "50a09c", 0x8, 0xffffff11, 0x0, @remote={0xfe, 0x80, [], 0xbb}, @local={0xfe, 0x80, [], 0xaa}, {[], @udp={0x0, 0x4e20, 0x8}}}}}}, &(0x7f0000000040)) syz_emit_ethernet(0x3e, &(0x7f0000000000)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], {@ipv6={0x86dd, {0x0, 0x6, "50a09c", 0x8, 0xffffff11, 0x0, @remote={0xfe, 0x80, [], 0xbb}, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8], 0xaa}, {[], @udp={0x300, 0x4e20, 0x8}}}}}}, &(0x7f0000000040)) 03:53:37 executing program 0: ioctl$BLKDISCARD(0xffffffffffffffff, 0x1277, &(0x7f0000000180)) syz_open_dev$usbmon(&(0x7f0000000080)='/dev/usbmon#\x00', 0xff, 0x4000) r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140)='/dev/snapshot\x00', 0x0, 0x0) fcntl$addseals(0xffffffffffffffff, 0x409, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f0000000000), &(0x7f00000000c0)=0x8) ioctl$EVIOCGLED(0xffffffffffffffff, 0x80404519, &(0x7f0000000580)=""/236) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x3c, 0x0) ioctl$EVIOCGKEYCODE_V2(0xffffffffffffffff, 0x80284504, &(0x7f00000003c0)=""/188) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) ioctl$RTC_PLL_GET(r0, 0x80207011, &(0x7f0000000040)) 03:53:37 executing program 3: 03:53:37 executing program 6: r0 = socket(0x11, 0xa, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000640)={0x0, 0x0, 0x0}, &(0x7f0000000040)=0xc) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000700)=ANY=[@ANYBLOB="73656375726974790000000000000000000000000000000000000000000000000e000000040000004803000000000000e8010000e80100001001000010010000b0020000b0020000b0020000b0020000b002000004000000", @ANYPTR=&(0x7f0000000000)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00'], @ANYBLOB="ac14140aac1414bb00000000ffffffff766574683000000000000000000000006270713000000000000000000000000000000000000000000000000000000000000000000000000000000000ff0000000000000000000000000000007e00020e0000000000000000000000000000e800100100000000000000000000000000000000000000000000000028007463706d73730000000000000000000000000000000000000000000000000100000001000000280069636d700000000000000000000000000000000000000000000000000000050803010000000028004e46515545554500000000000000000000000000000000000000000000030400000101000000ffffffffe0000001000000ff0000626f6e6430000000000000000000000067726530000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ff0000000000000000000000000000006700024000000000000000000000000000009800d80000000000000000000000000000000000000000000000000040004c4f4700000000000000000000000000000000000000000000000000000000204ba8d6dd155167e2e8086d514869912ba6c7b6886f91bdee0335184d28900000000000000000000000000000000000000000bef7e600000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000009800c8000000000000000000000000000000000000000000000000003000534554000000000000000000000000000000000000000000000000000002ff7f08ff060001097f00000009000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000007000980000000000000000000000000000000000000000002800000000000000000000000000000000000000000000000000000000000000feffffff0000000000000000000000000088000000"], 0x3a8) syz_mount_image$hfsplus(&(0x7f0000000240)='hfsplus\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, &(0x7f00000005c0), 0x0, &(0x7f00000006c0)={[{@gid={'gid', 0x3d, r1}, 0x2c}]}) 03:53:37 executing program 1: r0 = socket(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x7501}, 0xc, &(0x7f0000000900)={&(0x7f0000000040)={0x14, 0x1e, 0x201}, 0x14}, 0x1}, 0x0) 03:53:37 executing program 5: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer2\x00', 0x0, 0x0) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000040)="025cc83d6d345f8f762070") ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r0, 0x40085112, &(0x7f0000b18000)={{0xffffff93}, {0xffffffa0}, 0x0, 0x0, 0x0, [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfdffffff]}) 03:53:37 executing program 3: 03:53:37 executing program 7: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f000000d000)={0xa, 0x4e20}, 0x1c) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}, 0xb}, 0x1c) syz_emit_ethernet(0x3e, &(0x7f00000001c0)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @random="e829f650db0f", [], {@ipv6={0x86dd, {0x0, 0x6, "50a09c", 0x8, 0xffffff11, 0x0, @remote={0xfe, 0x80, [], 0xbb}, @local={0xfe, 0x80, [], 0xaa}, {[], @udp={0x0, 0x4e20, 0x8}}}}}}, &(0x7f0000000040)) syz_emit_ethernet(0x3e, &(0x7f0000000000)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], {@ipv6={0x86dd, {0x0, 0x6, "50a09c", 0x8, 0xffffff11, 0x0, @remote={0xfe, 0x80, [], 0xbb}, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x300000000000000], 0xaa}, {[], @udp={0x300, 0x4e20, 0x8}}}}}}, &(0x7f0000000040)) 03:53:37 executing program 1: r0 = socket(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x9a00}, 0xc, &(0x7f0000000900)={&(0x7f0000000040)={0x14, 0x1e, 0x201}, 0x14}, 0x1}, 0x0) 03:53:37 executing program 5: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer2\x00', 0x0, 0x0) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000040)="025cc83d6d345f8f762070") ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r0, 0x40085112, &(0x7f0000b18000)={{0xffffff93}, {0xffffffa0}, 0x0, 0x0, 0x0, [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f00]}) 03:53:37 executing program 4: r0 = socket(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0xa01}, 0xc, &(0x7f0000000900)={&(0x7f0000000040)={0x14, 0x1e, 0x201}, 0x14}, 0x1}, 0x0) [ 1456.017668] hfsplus: gid requires an argument [ 1456.022322] hfsplus: unable to parse mount options 03:53:37 executing program 0: ioctl$BLKDISCARD(0xffffffffffffffff, 0x1277, &(0x7f0000000180)) r0 = syz_open_dev$usbmon(&(0x7f0000000040)='/dev/usbmon#\x00', 0xff, 0x4000) ioctl$KVM_GET_NR_MMU_PAGES(r0, 0xae45, 0x5) pivot_root(&(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='./file0\x00') openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140)='/dev/snapshot\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f0000000000), &(0x7f00000000c0)=0x8) ioctl$EVIOCGLED(r0, 0x80404519, &(0x7f0000000580)=""/236) unlinkat(r0, &(0x7f0000000280)='./file0\x00', 0x200) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x3c, 0x0) ioctl$EVIOCGKEYCODE_V2(0xffffffffffffffff, 0x80284504, &(0x7f00000003c0)=""/188) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000240)={r0, &(0x7f00000001c0)="135d7ea356b856b0c0865667700059e99a8af9bf577174a422f20288bcef550eee17b0d872160abca9b5a7237c37c48275455145907732777befa487269d6000f2e27eee3bdfa4b0a7b1a92a909e621c88ccb40a86a4f057bf6ee9ef", &(0x7f0000000300)="a48ea4247c81a4866479f51cf291ff39bc038261b80baf566191bda22b3c1133a75e2a99e3ab4a77f04333b5b6e86e67556871eba86b3b331695b93bf23be0d48b1e187d999674cd7d2f7584deef1ae305649982154658e5c3d39b81a20d2ab2d02ea69d3ebf524c2f6385bb17370d31d53e071cba30938e1027d097bc1225ce2781aa4741b2ef365a2614a692d65c0946"}, 0x5e) r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000480)='/dev/snapshot\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) 03:53:37 executing program 3: 03:53:37 executing program 6: r0 = socket(0x11, 0xa, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000640)={0x0, 0x0, 0x0}, &(0x7f0000000680)=0xc) r2 = memfd_create(&(0x7f0000000000)='hfsplus\x00', 0x1) fchmodat(r2, &(0x7f0000000040)='./file0\x00', 0x0) accept$unix(r0, &(0x7f0000000080), &(0x7f0000000100)=0x6e) getsockopt$llc_int(0xffffffffffffffff, 0x10c, 0xb, &(0x7f0000000340), &(0x7f0000000380)=0x4) syz_mount_image$hfsplus(&(0x7f0000000240)='hfsplus\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000080), 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB="dbaff22faa1eaee4c812247e71ee909125fe767fe883315f306332f9b35c07202613485abc036191fe31fd29a34bb2863742bcafaf1a7ca699223ec303ae28ff6a96eac9f507790d38c588dc18150c0bbb828c4ce38534242f823ea451d5246cb608882f23358744b8b28843de0ee380aadf7499c19f16ed164555e1a0b2ca3d5b07818f4f336ef4bf6990e5c492c637f2463c5602e8e468664f0a80e4683047a8a9ea8a423b52029ad8087572f9fbd5d50e74f46d9deb7f2e61bfefe03e814f48c31027f1f5", @ANYRESHEX=r1, @ANYBLOB=',\x00']) setsockopt$bt_BT_POWER(r2, 0x112, 0x9, &(0x7f0000000280)=0x8, 0x1) [ 1456.547462] hfsplus: unable to parse mount options [ 1456.571857] hfsplus: unable to parse mount options 03:53:38 executing program 2: r0 = syz_open_dev$sndseq(&(0x7f0000dcc000)='/dev/snd/seq\x00', 0x0, 0x2) read(r0, &(0x7f0000fb6000)=""/28, 0x3f0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000418f50)={{0x80}, "0a4ceaa05d9a00000000000000039b3fd4cec307e8ef3d13eb790ec9c65abaf90d229db692542e5b78f8b29e0a27800f0000000000000009fb42f376589701a4", 0xa9824f69d1376637, 0x10800a}) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000240)={0xbf}) write$binfmt_script(r0, &(0x7f0000000000)=ANY=[], 0x0) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffff9c, 0x84, 0x18, &(0x7f0000000040)={0x0, 0xdc1}, &(0x7f0000000080)=0x8) getsockopt$inet_sctp_SCTP_MAXSEG(r2, 0x84, 0xd, &(0x7f0000000100)=@assoc_id=r3, &(0x7f0000000140)=0x4) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f0000000380)={{{@in=@loopback, @in=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@broadcast}, 0x0, @in6=@loopback}}, &(0x7f00000001c0)=0xe8) r5 = geteuid() r6 = getpid() r7 = getuid() r8 = getpid() getsockopt$inet_IP_IPSEC_POLICY(r2, 0x0, 0x10, &(0x7f0000001e80)={{{@in6=@remote, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{}, 0x0, @in6=@local}}, &(0x7f0000001f80)=0xe8) getresgid(&(0x7f0000001fc0), &(0x7f0000002000), &(0x7f0000002040)=0x0) r11 = getpgid(0xffffffffffffffff) getsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f0000002080)={{{@in6=@remote, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@dev}, 0x0, @in6=@loopback}}, &(0x7f0000002180)=0xe8) getgroups(0x1, &(0x7f00000021c0)=[0xee01]) r14 = getpgrp(0x0) stat(&(0x7f0000002200)='./file0\x00', &(0x7f0000002240)={0x0, 0x0, 0x0, 0x0, 0x0}) lstat(&(0x7f00000022c0)='./file0\x00', &(0x7f0000002300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) sendmsg$netlink(r2, &(0x7f0000002440)={&(0x7f0000000180)=@proc={0x10, 0x0, 0x25dfdbfe, 0x100000}, 0xc, &(0x7f0000001e00)=[{&(0x7f0000000480)={0x1568, 0x32, 0x201, 0x70bd2a, 0x25dfdbfd, "", [@typed={0x4, 0x95}, @typed={0x18, 0x43, @str='\\@selinux/%self:)\x00'}, @nested={0x1e8, 0x46, [@typed={0x8, 0x75, @uid=r4}, @generic="be35d8b9db58ea2abfdbe1bbd24d265de916b6b7feee2283e655a5567a113ac117", @generic="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", @generic="6d465b2b43efde947198a0606df0f7d31c9ce9b22ead44c270054241b4835a55d3bea84bbc45d86ec3bd935148e3ab2a787fa4b7b0c27af4c7031ae5c6f52a2238c6d7d7c43a274f974dffa79fb3bfcb7abda5939bc0b3efad441a1f9ebf69ab2e2277540f068d00f9535b57bdf95df3f15eec51d111e06fd524e880f95b1c8b9961420aa332af81b1259803871fb2e70e6fca9a5303a4cfad9dcb5c0b5693cbd18faf1d128198ecf71a577fd43b36b6405fe9e929e5a77498", @typed={0x8, 0x80, @u32=0x3}]}, @generic="d8da6ae965021c249be4c06ed6609e1dec8a3d9c9ca0aab975f78edba0bcfdd14976c38c25ace01b807af65d3e7f675b1e501974e40e3f71db7082598e875f", @nested={0x1128, 0x38, [@typed={0x8, 0x3e, @uid=r5}, @typed={0x8, 0xa, @fd=r1}, @generic="e92edba831610d97bed52e6aa1e002315bfca1db8255d683d5680b24df41d9f0c5c6f947207cf4eec710e260caf62375b02bfd96d23ba5b5490c0b5269987a19082cfb54b00d67c6fc74b8a7365758abb3c6098be370023a77610c03e1975fb54f28a9411041521ff292b40145581feff32626266f65693c5a458949da3077f0e584ca5f21a2659594448947d19eb474675bc81473008993d0ee1845ae1ec478b61a1a0e1a0b0cc4d70130f7aa3988c941064761075c46dcbb11c33e063b50d3330eb7feb021e798c781f7391143e5", @typed={0x44, 0x3f, @str="0a4ceaa05d9a00000000000000039b3fd4cec307e8ef3d13eb790ec9c65abaf90d229db692542e5b78f8b29e0a27800f0000000000000009fb42f376589701a4"}, @generic="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"]}, @nested={0x178, 0x78, [@generic="adc4d0d7c2db0daec6680df12a749a7308b84fb35a8820983dac06aa062b00807cb2934645f0d24e54b913af11c9c5c813e1899440ced70a87e4002d3fcdf412a148b0df11ff6ebecbbd9c65b17d19a55c5acb458fdf69a5612423ecab27e55ec87e8c4ffc512a88f67c3f70efb5d6702d93ec982582d753ba920879eb51132c7905b469af568d29335d944a791418f545f2c2707826287a476e9738a6a32e9fb440ca19229681522c3cf3c6e203481f35da7be84d57837299f5", @typed={0x8, 0x30, @pid=r6}, @generic="eb559bd0f626e9390adf45c04bc9fa2987152b9cf67d1e997b49ad35db6d988c76495181444e53b8e8482b63b14ad612b04153ec2d3a4aebd66b6ba32fa8a4de4221ef0d1101e3061543da434d70bfeeaa0a83d726c796f87f6ba16805dd0f310aa78ff76c48b36347a934b9271f1438c48960e9bea8ff3a1ac4d3198eb51e33c0b23ce98cbc7984248ca3be191c3120e84a7b97e12d93fd8bb5bfbfe06617706733b4384d738a35fe6a5d4a1b0e56"]}, @nested={0x74, 0x2b, [@generic="191e37fbea810dcded95d62cc6ca7f76d7b6f7f950a4c177d6de8e4ba7e5ef2d344a3aa1cfef5c571f5fc8159b264a3ff84c545593cfd0f317136758d713789c9aa172788888fbbbbd4f03d396349030fe9dfd005ace942981a61d59c78511cfcb10dc97430bb1", @typed={0x8, 0x94, @u32=0x3ff}]}]}, 0x1568}, {&(0x7f0000000200)={0x1c, 0x35, 0x408, 0x70bd27, 0x25dfdbfb, "", [@typed={0xc, 0x26, @u64}]}, 0x1c}, {&(0x7f0000001a00)={0x84, 0x29, 0x0, 0x70bd2c, 0x25dfdbfc, "", [@nested={0x5c, 0x24, [@generic="95ede36ce9ae5d933b60323b6a27260d5b9483bd845031e1ed85ac4efc6ce7101e9b67b430eae0bacf26d0b9b1042fbd67b34be438f598208deb67d57f4b194c77c8de94", @typed={0x8, 0x93, @uid=r7}, @typed={0xc, 0x8, @u64=0x7}]}, @typed={0x8, 0x51, @ipv4=@local={0xac, 0x14, 0x14, 0xaa}}, @typed={0xc, 0x2d, @u64=0x4}, @typed={0x4, 0x7a}]}, 0x84}, {&(0x7f0000001ac0)={0x22c, 0x1a, 0x1, 0x70bd29, 0x25dfdbff, "", [@generic="3b72ab668f4ad31050a5d28832920675618b9d0ba796668584e43f0413c12b335b64042615b429dfed05e4f055fe841fbc504495b8325a5d3d9a559560c9c9e871ac2e6538e0a888396e1a42a12583f23431cda02be5f642dc8d3aa70822d7262ae35f2dbbdd1193569867af3801d487b6ddf17eea9164a87f3a7588dae614b866185b", @generic="296059271454d97b181ac62a5e21799e4301795a8ae0d0186782f01435a2e1f5d33b52be806434694c0c2905c7206b90229974cff2a267659505f3f2012a4b659fb0d4e9d06ab769c79e197ded9b985fe1ad30c410ca4f1222435f307d5089d4213c58d2178050669f05dfd868a20a979e7e7ea89b367a868c391cd5e99ab8aa8fbe7a701c34a37804187397c9cbc6585f6f369ae4cad586e89945317fb51f0fee3e99fc80daa68539b3bc561fc2761887c0147d36e38e53fedeed5179c53cd58b21e34e6a20a63c600df423fcae1f269acc079563b9823482c6700afee81e6413570f47ab3203", @generic="184758c8e1dfbe2890290f46836d6789fb55703a9f3defb93dcad044283b42964ad5d21df458d7ea46c05aa14a5567f8672208f05ed232a5d96f18d5a54501f7f6f194c8c89ee0ffffd14fdd5979ff3af096ee757efecc82cbb0391ac975c02988b076525b2c53255c22e63c52c7886206cdaed87b532f077ee97514fa0d79d58f446973e9a9620da42d52629a9ddd68e37387", @typed={0x14, 0xa, @ipv6=@mcast1={0xff, 0x1, [], 0x1}}, @typed={0x8, 0x24, @ipv4=@multicast1=0xe0000001}]}, 0x22c}, {&(0x7f0000001d00)={0x50, 0x1d, 0x2, 0x70bd28, 0x25dfdbfe, "", [@nested={0x40, 0x21, [@generic="2eccb1e57241c57677cb1250b12b9509536b0c10e3a7a883f0c09c809f8a8bf8f336ea71da1d964c88a9e3520e16a57f84e9983b", @typed={0x8, 0x8c, @ipv4=@local={0xac, 0x14, 0x14, 0xaa}}]}]}, 0x50}, {&(0x7f0000001d80)={0x74, 0x1b, 0x511, 0x70bd29, 0x25dfdbfd, "", [@typed={0x8, 0x71, @fd=r0}, @generic="150f33131621f77c6b2cda561f50a6da323697678188de2e00b618e115d906e2a64bbc41381300dd2d2641e395c239858cac4c7176c0b86ae14e8d64ee2776bf55a96208c9462d61906ae9c4e64b68bce5b4cc2591", @typed={0x4, 0x52}]}, 0x74}], 0x6, &(0x7f0000002380)=[@cred={0x20, 0x1, 0x2, r8, r9, r10}, @rights={0x18, 0x1, 0x1, [r1]}, @rights={0x18, 0x1, 0x1, [r2]}, @cred={0x20, 0x1, 0x2, r11, r12, r13}, @cred={0x20, 0x1, 0x2, r14, r15, r16}, @rights={0x20, 0x1, 0x1, [r1, r1, r2, r2]}], 0xb0, 0x90}, 0x80) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f00000002c0)={{}, 'port0\x00'}) openat$sequencer2(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer2\x00', 0x0, 0x0) 03:53:38 executing program 1: r0 = socket(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x182}, 0xc, &(0x7f0000000900)={&(0x7f0000000040)={0x14, 0x1e, 0x201}, 0x14}, 0x1}, 0x0) 03:53:38 executing program 4: r0 = socket(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x2700}, 0xc, &(0x7f0000000900)={&(0x7f0000000040)={0x14, 0x1e, 0x201}, 0x14}, 0x1}, 0x0) 03:53:38 executing program 7: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f000000d000)={0xa, 0x4e20}, 0x1c) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}, 0xb}, 0x1c) syz_emit_ethernet(0x3e, &(0x7f00000001c0)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @random="e829f650db0f", [], {@ipv6={0x86dd, {0x0, 0x6, "50a09c", 0x8, 0xffffff11, 0x0, @remote={0xfe, 0x80, [], 0xbb}, @local={0xfe, 0x80, [], 0xaa}, {[], @udp={0x0, 0x4e20, 0x8}}}}}}, &(0x7f0000000040)) syz_emit_ethernet(0x3e, &(0x7f0000000000)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], {@ipv6={0x86dd, {0x0, 0x6, "50a09c", 0x8, 0xffffff11, 0x0, @remote={0xfe, 0x80, [], 0xbb}, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf0ffffffffffff], 0xaa}, {[], @udp={0x300, 0x4e20, 0x8}}}}}}, &(0x7f0000000040)) 03:53:38 executing program 3: 03:53:38 executing program 5: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer2\x00', 0x0, 0x0) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000040)="025cc83d6d345f8f762070") ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r0, 0x40085112, &(0x7f0000b18000)={{0xffffff93}, {0xffffffa0}, 0x0, 0x0, 0x0, [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5]}) 03:53:38 executing program 0: ioctl$BLKDISCARD(0xffffffffffffffff, 0x1277, &(0x7f0000000180)) syz_open_dev$usbmon(&(0x7f0000000080)='/dev/usbmon#\x00', 0xff, 0x4000) r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140)='/dev/snapshot\x00', 0x0, 0x0) fcntl$addseals(0xffffffffffffffff, 0x409, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f0000000000), &(0x7f00000000c0)=0x8) ioctl$EVIOCGLED(0xffffffffffffffff, 0x80404519, &(0x7f0000000580)=""/236) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x3c, 0x0) ioctl$EVIOCGKEYCODE_V2(0xffffffffffffffff, 0x80284504, &(0x7f00000003c0)=""/188) r2 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) ioctl$FS_IOC_FSSETXATTR(r0, 0x401c5820, &(0x7f0000000040)={0x800, 0x80000001, 0x101, 0x0, 0x3}) 03:53:38 executing program 6: r0 = socket(0x11, 0xa, 0x0) getsockopt$IP_VS_SO_GET_DESTS(r0, 0x0, 0x484, &(0x7f0000000180)=""/114, &(0x7f0000000200)=0x72) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000640)={0x0, 0x0, 0x0}, &(0x7f0000000680)=0xc) symlink(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00') syz_mount_image$hfsplus(&(0x7f0000000240)='hfsplus\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, &(0x7f00000005c0), 0x0, &(0x7f00000006c0)={[{@gid={'gid', 0x3d, r1}, 0x2c}]}) getsockname$unix(r0, &(0x7f00000000c0), &(0x7f0000000140)=0x6e) pipe2(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}, 0x84800) ioctl$KVM_CHECK_EXTENSION(r2, 0xae03, 0x1) setsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r0, 0x84, 0x1e, &(0x7f0000000000)=0x6, 0x4) 03:53:38 executing program 3: 03:53:38 executing program 4: r0 = socket(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8500}, 0xc, &(0x7f0000000900)={&(0x7f0000000040)={0x14, 0x1e, 0x201}, 0x14}, 0x1}, 0x0) 03:53:38 executing program 7: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f000000d000)={0xa, 0x4e20}, 0x1c) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}, 0xb}, 0x1c) syz_emit_ethernet(0x3e, &(0x7f00000001c0)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @random="e829f650db0f", [], {@ipv6={0x86dd, {0x0, 0x6, "50a09c", 0x8, 0xffffff11, 0x0, @remote={0xfe, 0x80, [], 0xbb}, @local={0xfe, 0x80, [], 0xaa}, {[], @udp={0x0, 0x4e20, 0x8}}}}}}, &(0x7f0000000040)) syz_emit_ethernet(0x3e, &(0x7f0000000000)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], {@ipv6={0x86dd, {0x0, 0x6, "50a09c", 0x8, 0xffffff11, 0x0, @remote={0xfe, 0x80, [], 0xbb}, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4888], 0xaa}, {[], @udp={0x300, 0x4e20, 0x8}}}}}}, &(0x7f0000000040)) 03:53:38 executing program 1: r0 = socket(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x33000000}, 0xc, &(0x7f0000000900)={&(0x7f0000000040)={0x14, 0x1e, 0x201}, 0x14}, 0x1}, 0x0) 03:53:38 executing program 5: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer2\x00', 0x0, 0x0) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000040)="025cc83d6d345f8f762070") ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r0, 0x40085112, &(0x7f0000b18000)={{0xffffff93}, {0xffffffa0}, 0x0, 0x0, 0x0, [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfdfdffff00000000]}) 03:53:39 executing program 6: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/net/pfkey\x00', 0x440801, 0x0) ioctl$KVM_GET_TSC_KHZ(r0, 0xaea3) r1 = socket(0x11, 0xa, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000640)={0x0, 0x0, 0x0}, &(0x7f0000000080)=0xfffffe91) syz_mount_image$hfsplus(&(0x7f0000000240)='hfsplus\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, &(0x7f00000005c0), 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='gid=', @ANYRESHEX=r2, @ANYBLOB="459abd25a01a543addebd86b221d11cff15ea2a1aabfc17db8b6ed68ecd5828f123b163109f1da712b96f678a81148fe65e63862225366a1150abed309a770af581712e21aa8b3dddac17a98c4"]) 03:53:39 executing program 1: r0 = socket(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x3f010000}, 0xc, &(0x7f0000000900)={&(0x7f0000000040)={0x14, 0x1e, 0x201}, 0x14}, 0x1}, 0x0) 03:53:39 executing program 4: r0 = socket(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x9300}, 0xc, &(0x7f0000000900)={&(0x7f0000000040)={0x14, 0x1e, 0x201}, 0x14}, 0x1}, 0x0) [ 1457.746834] hfsplus: unable to parse mount options [ 1457.767234] hfsplus: unable to parse mount options 03:53:40 executing program 2: r0 = syz_open_dev$sndseq(&(0x7f0000dcc000)='/dev/snd/seq\x00', 0x0, 0x2) r1 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x800, 0x0) ioctl$GIO_FONT(r1, 0x4b60, &(0x7f0000000140)=""/17) read(r0, &(0x7f0000fb6000)=""/28, 0x3f0) ioctl$TIOCNXCL(r1, 0x540d) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000418f50)={{0x80}, "0a4ceaa05d9a00000000000000039b3fd4cec307e8ef3d13eb790ec9c65abaf90d229db692542e5b78f8b29e0a27800f0000000000000009fb42f376589701a4", 0xa9824f69d1376637, 0x10800a}) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000000)={0x10, @time={0x0, 0x989680}, 0x0, {}, 0x0, 0xffffffffffffffff}) write$binfmt_script(r0, &(0x7f0000000000)=ANY=[], 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f00000002c0)={{}, 'port0\x00'}) openat$audio(0xffffffffffffff9c, &(0x7f0000000180)='/dev/audio\x00', 0x802, 0x0) r2 = openat$sequencer2(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer2\x00', 0x0, 0x0) ioctl$TUNSETVNETHDRSZ(r2, 0x400454d8, &(0x7f0000000080)=0x7) 03:53:40 executing program 3: 03:53:40 executing program 7: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f000000d000)={0xa, 0x4e20}, 0x1c) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}, 0xb}, 0x1c) syz_emit_ethernet(0x3e, &(0x7f00000001c0)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @random="e829f650db0f", [], {@ipv6={0x86dd, {0x0, 0x6, "50a09c", 0x8, 0xffffff11, 0x0, @remote={0xfe, 0x80, [], 0xbb}, @local={0xfe, 0x80, [], 0xaa}, {[], @udp={0x0, 0x4e20, 0x8}}}}}}, &(0x7f0000000040)) syz_emit_ethernet(0x3e, &(0x7f0000000000)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], {@ipv6={0x86dd, {0x0, 0x6, "50a09c", 0x8, 0xffffff11, 0x0, @remote={0xfe, 0x80, [], 0xbb}, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x30000000], 0xaa}, {[], @udp={0x300, 0x4e20, 0x8}}}}}}, &(0x7f0000000040)) 03:53:40 executing program 1: r0 = socket(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x5701}, 0xc, &(0x7f0000000900)={&(0x7f0000000040)={0x14, 0x1e, 0x201}, 0x14}, 0x1}, 0x0) 03:53:40 executing program 5: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer2\x00', 0x0, 0x0) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000040)="025cc83d6d345f8f762070") ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r0, 0x40085112, &(0x7f0000b18000)={{0xffffff93}, {0xffffffa0}, 0x0, 0x0, 0x0, [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfdffffff00000000]}) 03:53:40 executing program 0: ioctl$BLKDISCARD(0xffffffffffffffff, 0x1277, &(0x7f0000000180)) syz_open_dev$usbmon(&(0x7f0000000080)='/dev/usbmon#\x00', 0xff, 0x4000) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140)='/dev/snapshot\x00', 0x0, 0x0) fcntl$addseals(0xffffffffffffffff, 0x409, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f0000000000), &(0x7f00000000c0)=0xfffffffffffffcc9) ioctl$EVIOCGLED(0xffffffffffffffff, 0x80404519, &(0x7f0000000580)=""/236) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x3c, 0x0) ioctl$EVIOCGKEYCODE_V2(0xffffffffffffffff, 0x80284504, &(0x7f00000003c0)=""/188) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) 03:53:40 executing program 4: r0 = socket(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x41}, 0xc, &(0x7f0000000900)={&(0x7f0000000040)={0x14, 0x1e, 0x201}, 0x14}, 0x1}, 0x0) 03:53:40 executing program 6: r0 = socket(0x11, 0xa, 0x0) getresuid(&(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000640)={0x0, 0x0, 0x0}, &(0x7f0000000680)=0xc) syz_mount_image$hfsplus(&(0x7f0000000240)='hfsplus\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, &(0x7f00000005c0), 0x0, &(0x7f00000006c0)={[{@gid={'gid', 0x3d, r1}, 0x2c}]}) 03:53:40 executing program 3: 03:53:40 executing program 5: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer2\x00', 0x0, 0x0) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000040)="025cc83d6d345f8f762070") ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r0, 0x40085112, &(0x7f0000b18000)={{0xffffff93}, {0xffffffa0}, 0x0, 0x0, 0x0, [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x500]}) 03:53:40 executing program 4: r0 = socket(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x2301}, 0xc, &(0x7f0000000900)={&(0x7f0000000040)={0x14, 0x1e, 0x201}, 0x14}, 0x1}, 0x0) 03:53:40 executing program 1: r0 = socket(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x201}, 0xc, &(0x7f0000000900)={&(0x7f0000000040)={0x14, 0x1e, 0x201}, 0x14}, 0x1}, 0x0) 03:53:40 executing program 7: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f000000d000)={0xa, 0x4e20}, 0x1c) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}, 0xb}, 0x1c) syz_emit_ethernet(0x3e, &(0x7f00000001c0)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @random="e829f650db0f", [], {@ipv6={0x86dd, {0x0, 0x6, "50a09c", 0x8, 0xffffff11, 0x0, @remote={0xfe, 0x80, [], 0xbb}, @local={0xfe, 0x80, [], 0xaa}, {[], @udp={0x0, 0x4e20, 0x8}}}}}}, &(0x7f0000000040)) syz_emit_ethernet(0x3e, &(0x7f0000000000)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], {@ipv6={0x86dd, {0x0, 0x6, "50a09c", 0x8, 0xffffff11, 0x0, @remote={0xfe, 0x80, [], 0xbb}, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf000], 0xaa}, {[], @udp={0x300, 0x4e20, 0x8}}}}}}, &(0x7f0000000040)) [ 1458.816694] hfsplus: gid requires an argument [ 1458.821297] hfsplus: unable to parse mount options 03:53:40 executing program 1: r0 = socket(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x3c010000}, 0xc, &(0x7f0000000900)={&(0x7f0000000040)={0x14, 0x1e, 0x201}, 0x14}, 0x1}, 0x0) 03:53:40 executing program 6: r0 = socket(0x11, 0xa, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000640)={0x0, 0x0, 0x0}, &(0x7f0000000680)=0xc) syz_mount_image$hfsplus(&(0x7f0000000240)='hfsplus\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, &(0x7f00000005c0), 0x0, &(0x7f00000006c0)={[{@gid={'gid', 0x3d, r1}, 0x2c}]}) ioctl$KVM_SET_CLOCK(r0, 0x4030ae7b, &(0x7f0000000000)={0x80, 0x7f}) getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, &(0x7f0000000040)={0x7, 0x0, 0x0, 0x8001, 0x1, 0x100, 0x7, 0xffffffffffff3a16, 0x0}, &(0x7f0000000080)=0x20) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r0, 0x84, 0x1a, &(0x7f0000000300)=ANY=[@ANYRES32=r2, @ANYBLOB="e400000005d654cce964b0f53a15aa281acc0e188e294b0f90c59fae521ac2ba03ed772ed9935c3e4128d6cfee44bb5c08c28d598c8a18425e4bb94ea98cfa6f75055c28bc2872fea7d778ee68abf7f7ab719d47027730e76646500e681d6dbf850c5efb397f7480a14d9852a091493ca91a519b5a492f7b038e61e33327e1b68e98d03b3fb7f8dc83e4a73bcde4e02e57e3bc44ac2ed7f1ee8dab03f717d5beae4ce250f204de4d87a86cb358cedf410c6a0b9ef3e9a0324f51244f7c4881da00f1be60d7a7915041fbe0b23e42544e3c2286e31a50138dc7895b32e8e115fa5a38c4598ac5fb899537c3c09202e8b19cd75ee6af1260ac2be1d7070300ea7337c2e07eedc19d6f4c2d2e7cfa9d5aeb7c89b53d28d01022d6ffcf9d9b85cf2800000000000000"], &(0x7f00000001c0)=0xec) [ 1459.026227] hfsplus: gid requires an argument [ 1459.030895] hfsplus: unable to parse mount options 03:53:40 executing program 3: [ 1459.401629] hfsplus: gid requires an argument [ 1459.406326] hfsplus: unable to parse mount options [ 1459.444539] hfsplus: gid requires an argument [ 1459.449329] hfsplus: unable to parse mount options 03:53:41 executing program 2: r0 = syz_open_dev$sndseq(&(0x7f0000dcc000)='/dev/snd/seq\x00', 0x0, 0x2) read(r0, &(0x7f0000fb6000)=""/28, 0x3f0) r1 = socket$netlink(0x10, 0x3, 0x200033) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'syz_tun\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f00000018c0)={&(0x7f00000002c0)={0x10}, 0xc, &(0x7f0000001880)={&(0x7f00000004c0)=@setlink={0x34, 0x13, 0x105, 0x0, 0x0, {0x0, 0x0, 0x0, r2}, [@IFLA_XDP={0x14, 0x2b, [@nested={0x10, 0x3, [@typed={0x18, 0x0, @fd}]}]}]}, 0x34}, 0x1}, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000418f50)={{0x80}, "0a4ceaa05d9a00000000000000039b3fd4cec307e8ef3d13eb790ec9c65abaf90d229db692542e5b78f8b29e0a27800f0000000000000009fb42f376589701a4", 0xa9824f69d1376637, 0x10800a}) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000240)={0xbf, @tick, 0x0, {0x0, 0x1}}) write$binfmt_script(r0, &(0x7f0000000000)=ANY=[], 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f00000002c0)={{}, 'port0\x00'}) openat$sequencer2(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer2\x00', 0x0, 0x0) 03:53:41 executing program 4: r0 = socket(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x9c01000000000000}, 0xc, &(0x7f0000000900)={&(0x7f0000000040)={0x14, 0x1e, 0x201}, 0x14}, 0x1}, 0x0) 03:53:41 executing program 5: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer2\x00', 0x0, 0x0) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000040)="025cc83d6d345f8f762070") ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r0, 0x40085112, &(0x7f0000b18000)={{0xffffff93}, {0xffffffa0}, 0x0, 0x0, 0x0, [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400000000000000]}) 03:53:41 executing program 7: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f000000d000)={0xa, 0x4e20}, 0x1c) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}, 0xb}, 0x1c) syz_emit_ethernet(0x3e, &(0x7f00000001c0)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @random="e829f650db0f", [], {@ipv6={0x86dd, {0x0, 0x6, "50a09c", 0x8, 0xffffff11, 0x0, @remote={0xfe, 0x80, [], 0xbb}, @local={0xfe, 0x80, [], 0xaa}, {[], @udp={0x0, 0x4e20, 0x8}}}}}}, &(0x7f0000000040)) syz_emit_ethernet(0x3e, &(0x7f0000000000)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], {@ipv6={0x86dd, {0x0, 0x6, "50a09c", 0x8, 0xffffff11, 0x0, @remote={0xfe, 0x80, [], 0xbb}, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8864], 0xaa}, {[], @udp={0x300, 0x4e20, 0x8}}}}}}, &(0x7f0000000040)) 03:53:41 executing program 1: r0 = socket(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x5c01}, 0xc, &(0x7f0000000900)={&(0x7f0000000040)={0x14, 0x1e, 0x201}, 0x14}, 0x1}, 0x0) 03:53:41 executing program 0: ioctl$BLKDISCARD(0xffffffffffffffff, 0x1277, &(0x7f0000000180)) syz_open_dev$usbmon(&(0x7f0000000080)='/dev/usbmon#\x00', 0xff, 0x4000) r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140)='/dev/snapshot\x00', 0x0, 0x0) fcntl$addseals(0xffffffffffffffff, 0x409, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f0000000000)={0x0}, &(0x7f00000000c0)=0x8) ioctl$EVIOCGLED(0xffffffffffffffff, 0x80404519, &(0x7f0000000580)=""/236) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x3c, 0x0) ioctl$EVIOCGKEYCODE_V2(0xffffffffffffffff, 0x80284504, &(0x7f00000003c0)=""/188) getsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(r0, 0x84, 0x75, &(0x7f0000000100)={r2, 0x40}, &(0x7f00000001c0)=0x8) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x0) syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x8001, 0x20000) 03:53:41 executing program 3: 03:53:41 executing program 6: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x4000, 0x0) unlinkat(r0, &(0x7f0000000040)='./file0\x00', 0x200) r1 = socket(0x11, 0xa, 0x101) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000000140)) setsockopt$bt_hci_HCI_FILTER(r1, 0x0, 0x2, &(0x7f00000000c0)={0x4, 0x5, 0x9, 0x4}, 0x10) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000640)={0x0, 0x0, 0x0}, &(0x7f0000000680)=0xfffffffffffffe85) syz_mount_image$hfsplus(&(0x7f0000000240)='hfsplus\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, &(0x7f00000005c0), 0x0, &(0x7f00000006c0)={[{@gid={'gid', 0x3d, r2}, 0x2c}]}) openat$cgroup_ro(r0, &(0x7f0000000080)='cpuset.memory_pressure\x00', 0x0, 0x0) 03:53:41 executing program 4: r0 = socket(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x33010000}, 0xc, &(0x7f0000000900)={&(0x7f0000000040)={0x14, 0x1e, 0x201}, 0x14}, 0x1}, 0x0) 03:53:41 executing program 3: 03:53:41 executing program 5: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer2\x00', 0x0, 0x0) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000040)="025cc83d6d345f8f762070") ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r0, 0x40085112, &(0x7f0000b18000)={{0xffffff93}, {0xffffffa0}, 0x0, 0x0, 0x0, [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f00000000000000]}) 03:53:41 executing program 7: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f000000d000)={0xa, 0x4e20}, 0x1c) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}, 0xb}, 0x1c) syz_emit_ethernet(0x3e, &(0x7f00000001c0)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @random="e829f650db0f", [], {@ipv6={0x86dd, {0x0, 0x6, "50a09c", 0x8, 0xffffff11, 0x0, @remote={0xfe, 0x80, [], 0xbb}, @local={0xfe, 0x80, [], 0xaa}, {[], @udp={0x0, 0x4e20, 0x8}}}}}}, &(0x7f0000000040)) syz_emit_ethernet(0x3e, &(0x7f0000000000)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], {@ipv6={0x86dd, {0x0, 0x6, "50a09c", 0x8, 0xffffff11, 0x0, @remote={0xfe, 0x80, [], 0xbb}, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000000000], 0xaa}, {[], @udp={0x300, 0x4e20, 0x8}}}}}}, &(0x7f0000000040)) 03:53:41 executing program 1: r0 = socket(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0xd500}, 0xc, &(0x7f0000000900)={&(0x7f0000000040)={0x14, 0x1e, 0x201}, 0x14}, 0x1}, 0x0) [ 1460.253665] hfsplus: unable to find HFS+ superblock [ 1460.296110] hfsplus: unable to find HFS+ superblock 03:53:41 executing program 3: 03:53:41 executing program 6: r0 = socket(0x11, 0xa, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000440)={{{@in=@multicast1, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@local}, 0x0, @in6=@mcast2}}, &(0x7f0000000540)=0xe8) mount$9p_tcp(&(0x7f0000000380)='127.0.0.1\x00', &(0x7f00000003c0)='./file0\x00', &(0x7f0000000400)='9p\x00', 0x2101000, &(0x7f0000000580)={'trans=tcp,', {'port', 0x3d, 0x4e21}, 0x2c, {[{@debug={'debug', 0x3d, 0x4}, 0x2c}, {@version_u='version=9p2000.u', 0x2c}, {@dfltuid={'dfltuid', 0x3d, r1}, 0x2c}, {@mmap='mmap', 0x2c}, {@msize={'msize', 0x3d, 0x4}, 0x2c}]}}) r2 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_threshold\x00', 0x2, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x103001, 0x0) ioctl$KVM_X86_SETUP_MCE(r2, 0x4008ae9c, &(0x7f0000000040)={0xf, 0x1, 0x8}) sendmsg$kcm(r2, &(0x7f0000000340)={&(0x7f0000000100)=@nfc_llcp={0x27, 0x1, 0x1, 0x0, 0x1000000020, 0x4e79a7b4, "18fdc07598f8dae2ecb28226f7dde2ebdd235af457a2b3abb5b3bf0c000c34a2d5030328691f3ef81bfb9d8ab450f932f07b5f43afe391665b29c94ece33dc", 0xf}, 0x80, &(0x7f0000000300)=[{&(0x7f0000000180)="bad4da9b109fa88da424ebad3024179d7d4e915e5bb66ecc9bfc9d439199c382403b4f3dacb4fb76f41260ae81a4131f9a0a73f2b87ea09b1edd9baaa9b3517767de155fd83735f14cddfe4072cbdc94c930791e764b1006dc788472db0eaa100b983c9546fe0baf8e33905b7f84ab872255c83afcfa15c69ae22186ea0f97a1100b37b7f247ca7442969bdfb3bd6ede14c461943e1e35dbd74d5a066d6829deef", 0xa1}, {&(0x7f0000000280)="a6b95236b318ff748498a8e66f2710b798e7b2ca9f3d93f0f2c9b535b1c15a90ca7806828749eea414f2773cd72f0bdb", 0x30}], 0x2, &(0x7f0000000700)=[{0xf0, 0x113, 0xff, "fb15a2a33594c82dfdc052953b0fee7093e4704fbbe496ea43f29dc699ca75ddcba76a6967d47480325021d53b812331707deab760a6cf51d6b613f8b490c960e38595bb0585263af77913bf8f9ef392da8872f5d49c8827e378580cbb01e0677e58e2a2296397da40bb0fda50e1c12e5b577d17c063642af592c7d148a82bbd66a17fd191096798237fbc85e3bdbd9d239f2a9ff662a9ee933926d38b6af7d445867577a05861fa86c0a72d9c959295881801b3a83765d081937bbbb8506fc99a84efc95352f6d012c280fcfd24a5e1d97814221375f7c911242dd5e0"}, {0x80, 0x1ff, 0x691, "2556aaf3cae7061b7e68807874703aedc68100734fffb431974247097a4948442fde5f1890dec1c5f993f99a27c9451c0fbaaef649032e106911d7540d8d1733ae4e7fd135f6cb48fbb72734a557675acda23dc92a452d59c6a46943896de392c95edb882963609951b8ab9a"}, {0x1010, 0x13f, 0xd9c0, "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"}, {0x90, 0x19f, 0x1b, "4019877b088911b04d6fd6346b864e04c92855c44deb59927cfb7567d529f1d0242da11ced566aa2a336593a42ee2458a921e1724acea795666076c0ab6fba585741c1bfb78a22c07d558176b9cf47d381eee9ffc22b9f334f3e03527cdb04c05f25dae4c5b3b5ed909d9ef58086ba4ad567310cc83c3e1a7d752ccbb3bf8e05"}, {0x18, 0x119, 0x0, "98c1189f"}, {0x38, 0x29, 0x0, "079ece351087e63672b292a6f453896c5d7d799e35fde6a4aa6062255b5af36b854dabec"}, {0x18, 0x10e, 0x2, "1d"}, {0xd0, 0x103, 0x2, "bb7b0251b729518044ee84aaf3c497549eae6dd6afac6557776c533c16c6974e0f3cbfde79115b407be17a50ca90bb43fd0c9603855b5b7be8ae486f8242f95a50636380e31ed08cb02d3eae66404e85dcde3abd6887088a4181f68f6d2e60859dcd103090017e5877fcbcff8901b55114c11add27e1d92b075c847d2f5ef4affdbf5c6a782e1ff34546e6c3eacbd0bd792713ce56cf81c91f6b1f7c7dd18be614519c3619564025b0ca1bb25867023d0a2d588da42ebd0ce45ba6"}, {0x60, 0x116, 0xfffffffffffff801, "f19df8f85c4c42757858dd44b6f062be14b6dabf0e646d46004a56b498dff397bdf49e0e173e72eb3258bb03c0802f1546d77b44b3c84083db1080a7b8ff16c39673eda80ba8e97a04374c7429"}], 0x13a8}, 0x4000800) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000000c0)={0x0, 0x0, 0x0}, &(0x7f0000000680)=0xffffffffffffffec) syz_mount_image$hfsplus(&(0x7f0000000240)='hfsplus\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0xaaaaaaaaaaaae1d, &(0x7f00000005c0), 0x0, &(0x7f00000006c0)=ANY=[@ANYBLOB='gid=', @ANYRESHEX=r3, @ANYBLOB="b15b"]) 03:53:41 executing program 0: r0 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000100)='/dev/rfkill\x00', 0x10000, 0x0) ioctl$BLKDISCARD(r0, 0x1277, &(0x7f0000000040)) syz_open_dev$usbmon(&(0x7f0000000080)='/dev/usbmon#\x00', 0xff, 0x4000) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140)='/dev/snapshot\x00', 0x0, 0x0) fcntl$addseals(0xffffffffffffffff, 0x409, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f0000000000), &(0x7f00000000c0)=0x8) ioctl$EVIOCGLED(0xffffffffffffffff, 0x80404519, &(0x7f0000000580)=""/236) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x3c, 0x0) ioctl$EVIOCGKEYCODE_V2(0xffffffffffffffff, 0x80284504, &(0x7f00000003c0)=""/188) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) [ 1460.979215] hfsplus: unable to parse mount options [ 1461.041863] hfsplus: unable to parse mount options 03:53:42 executing program 5: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer2\x00', 0x0, 0x0) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000040)="025cc83d6d345f8f762070") ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r0, 0x40085112, &(0x7f0000b18000)={{0xffffff93}, {0xffffffa0}, 0x0, 0x0, 0x0, [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff030000]}) 03:53:42 executing program 4: r0 = socket(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x21010000}, 0xc, &(0x7f0000000900)={&(0x7f0000000040)={0x14, 0x1e, 0x201}, 0x14}, 0x1}, 0x0) 03:53:42 executing program 1: r0 = socket(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x3600000000000000}, 0xc, &(0x7f0000000900)={&(0x7f0000000040)={0x14, 0x1e, 0x201}, 0x14}, 0x1}, 0x0) 03:53:42 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000002c0)={'team_slave_0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000200)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f00000001c0)={&(0x7f00000000c0)=@ipv4_newroute={0x28, 0x18, 0x301, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, [@RTA_MULTIPATH={0xc, 0x9, {0x8, 0x0, 0x0, r1}}]}, 0x28}, 0x1}, 0x0) 03:53:42 executing program 7: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f000000d000)={0xa, 0x4e20}, 0x1c) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}, 0xb}, 0x1c) syz_emit_ethernet(0x3e, &(0x7f00000001c0)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @random="e829f650db0f", [], {@ipv6={0x86dd, {0x0, 0x6, "50a09c", 0x8, 0xffffff11, 0x0, @remote={0xfe, 0x80, [], 0xbb}, @local={0xfe, 0x80, [], 0xaa}, {[], @udp={0x0, 0x4e20, 0x8}}}}}}, &(0x7f0000000040)) syz_emit_ethernet(0x3e, &(0x7f0000000000)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], {@ipv6={0x86dd, {0x0, 0x6, "50a09c", 0x8, 0xffffff11, 0x0, @remote={0xfe, 0x80, [], 0xbb}, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000], 0xaa}, {[], @udp={0x300, 0x4e20, 0x8}}}}}}, &(0x7f0000000040)) 03:53:42 executing program 0: ioctl$BLKDISCARD(0xffffffffffffffff, 0x1277, &(0x7f0000000180)) syz_open_dev$usbmon(&(0x7f0000000080)='/dev/usbmon#\x00', 0xff, 0x4000) r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140)='/dev/snapshot\x00', 0x0, 0x0) fcntl$addseals(0xffffffffffffffff, 0x409, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f0000000000), &(0x7f00000000c0)=0x8) ioctl$EVIOCGLED(0xffffffffffffffff, 0x80404519, &(0x7f0000000580)=""/236) write$FUSE_NOTIFY_STORE(r0, &(0x7f0000000040)={0x30, 0x4, 0x0, {0x3, 0x8, 0x8, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}}, 0x30) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x3c, 0x0) ioctl$EVIOCGKEYCODE_V2(0xffffffffffffffff, 0x80284504, &(0x7f00000003c0)=""/188) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) 03:53:42 executing program 2: r0 = syz_open_dev$sndseq(&(0x7f0000dcc000)='/dev/snd/seq\x00', 0x0, 0x2) read(r0, &(0x7f0000fb6000)=""/28, 0x3f0) r1 = syz_open_dev$midi(&(0x7f0000000080)='/dev/midi#\x00', 0x7ff, 0x101000) recvmsg$kcm(r1, &(0x7f0000002400)={&(0x7f0000000100)=@nfc, 0x80, &(0x7f0000002380)=[{&(0x7f0000001380)=""/4096, 0x1000}, {&(0x7f0000000180)=""/238, 0xee}, {&(0x7f0000000280)=""/48, 0x30}], 0x3, &(0x7f00000023c0)=""/13, 0xd, 0x4}, 0x1) flistxattr(r0, &(0x7f0000000380)=""/4096, 0x1000) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000418f50)={{0x80}, "0a4ceaa05d9a00000000000000039b3fd4cec307e8ef3d13eb790ec9c65abaf90d229db692542e5b78f8b29e0a27800f0000000000000009fb42f376589701a4", 0xa9824f69d1376637, 0x10800a}) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000000)={0xbf}) write$binfmt_script(r0, &(0x7f0000000000)=ANY=[], 0x0) socketpair$inet(0x2, 0x807, 0x9, &(0x7f0000002440)) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f00000002c0)={{0xfffffffffffffffd}, "706f7274190000000001000100000000000000470d00", 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x20}) openat$sequencer2(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer2\x00', 0x0, 0x0) 03:53:42 executing program 6: r0 = socket(0x11, 0xa, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000640)={0x0, 0x0, 0x0}, &(0x7f0000000680)=0xc) syz_mount_image$hfsplus(&(0x7f0000000000)='hfsplus\x00', &(0x7f0000000040)='./file0\x00', 0xffff, 0xa, &(0x7f0000000700)=[{&(0x7f0000000080)="b5a528727fee1c1ed7eff8958ed25f383ec0192d2ea306f03d22364baf9e0e3779c7e57c287b8fca7ab16d11ef94f9133e75ff28e84b7d3f8641486d4df6b987303ef3a1bcfa767eea0c09d6b011231f7d7726353a951e83a5071527344ae5ccc168d4b0d96ea27214b1c8a420c3646257a06f5623b1fc1808569a1224cc6bdb2f1c684ecd84355cea1e94d28848536364833fff9aad8b72a32f0442cd4d53989a23dbb72335474aeef240ccc1894884b0d39ebbc06aa66eba56d0aa498e43fb176b55651a828bb104353727a377d1fbe65f0afdcb1b13f78d04", 0xda, 0x2}, {&(0x7f0000000180)="3e26fe1cb229be7bff00e508c9431b8401b17f4e420748942aad3977284a6e7c70e87948ff59478b27f63fa89501fb8099931e3acdbf6afe9928ba8851d2d06bce41467588aa8cb538aca579450aef729af9ab044cb52cbc082918ae607571d84dfbde8630738dfe3516", 0x6a, 0x6}, {&(0x7f0000000200), 0x0, 0x7fffffff}, {&(0x7f0000000300)="3ae9950b8c0125e4395a9f080f669c7a082237741ce448a4292ce103d0cdb4e859d89c9375dd3d8b7626f63fd8ecd1683785d36c9e0ae0bd776635bf8ff235ff779c76fcd4c65280bbf2286ebca791e618100bf6e6d84f03e2283ccc0414d340424b3e824239e225c867c3017ad421812ec9ba", 0x73, 0x200}, {&(0x7f0000000380)="49fdd77729c01c74aa12d5d08cfea7df391311f38f3b41cd6d6813cfd012f62514df499cac230ba9cf83ce7b67f82abe11d1aa23d02fc46fe284b1b0462be2ae726753e00324199cd0d5", 0x4a, 0x5}, {&(0x7f0000000280)="46e23effc2", 0x5, 0x100}, {&(0x7f0000000400)="95ead73f9ac786cc6246562dd94e084e3ac0eb3208f25a2f02bbb90e7e2e7882a2ea96e0574f4647261714616212ae482cbfd24ee33d334963327f24ddeb3a63a55387ceac1656da9d3f6ee6132b1bc26c0fa8097f60972e9ac6ea", 0x5b, 0x5}, {&(0x7f0000000480)='u', 0x1, 0x40}, {&(0x7f00000004c0)="f32162589210fc6a08f2b906711f0c8173270df7e5cff8e2276303da2b36ee2e384040cba5116cb7d9163ba686e7f10bef5e46a69c39c637bee6b376ec29d7c8dbde095c2508b719ff17ce3233624854eefdf2653834103ea67ae69e8396be3f839ababbab6af3edad484a27938a9e64d86a58cb522c3b97e67e7c7819de26", 0x7f, 0x9}, {&(0x7f0000000540)="c7b18147c8f5f305e5395c403f48a6e26d587038d062f6358dc76b1fdf1352f26a8193078968594386cd474f2070f5d20affb90f2e3a508685dd3c32e159ecaae96b1b3395399edb6e3e65c0aa635e9347dc4bfaa00e4d3ccc711dbbd0f6ad5709a5ebc8107938cc8e8642b8b3f1029eb6bb1713f4bfab1c9f57b2754a0099463e77dffc7f521854616e59f6c1f5f5df2971cb5f28062b79ab09a18cff2933dc1f2a98eb37c9a055335925a2", 0xac, 0x8ccd}], 0x14, &(0x7f0000000800)={[{@session={'session', 0x3d, 0x2}, 0x2c}, {@part={'part', 0x3d, 0x5}, 0x2c}, {@session={'session', 0x3d, 0xcae}, 0x2c}, {@umask={'umask', 0x3d, 0x9}, 0x2c}]}) syz_mount_image$hfsplus(&(0x7f0000000240)='hfsplus\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, &(0x7f00000005c0), 0x8e8aa23891128be5, &(0x7f00000006c0)={[{@gid={'gid', 0x3d, r1}, 0x2c}]}) [ 1461.384951] hfsplus: invalid session number or type of track [ 1461.390913] hfsplus: unable to find HFS+ superblock 03:53:43 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000001, &(0x7f0000000140)=0x400, 0x62) bind$inet(r0, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1=0xe0000001}, 0x10) sendto$inet(r0, &(0x7f0000a88f88), 0x29f, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback=0x7f000001}, 0x10) recvmsg(r0, &(0x7f0000001d40)={&(0x7f0000000380)=@pppol2tp={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @multicast2}}}, 0x80, &(0x7f0000000100), 0x0, &(0x7f0000000680)=""/44, 0x2c}, 0x0) write$binfmt_elf64(r0, &(0x7f0000000280)=ANY=[@ANYBLOB="7f"], 0x1) 03:53:43 executing program 1: r0 = socket(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0xa001000000000000}, 0xc, &(0x7f0000000900)={&(0x7f0000000040)={0x14, 0x1e, 0x201}, 0x14}, 0x1}, 0x0) 03:53:43 executing program 5: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer2\x00', 0x0, 0x0) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000040)="025cc83d6d345f8f762070") ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r0, 0x40085112, &(0x7f0000b18000)={{0xffffff93}, {0xffffffa0}, 0x0, 0x0, 0x0, [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd]}) 03:53:43 executing program 4: r0 = socket(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4e01}, 0xc, &(0x7f0000000900)={&(0x7f0000000040)={0x14, 0x1e, 0x201}, 0x14}, 0x1}, 0x0) 03:53:43 executing program 7: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f000000d000)={0xa, 0x4e20}, 0x1c) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}, 0xb}, 0x1c) syz_emit_ethernet(0x3e, &(0x7f00000001c0)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @random="e829f650db0f", [], {@ipv6={0x86dd, {0x0, 0x6, "50a09c", 0x8, 0xffffff11, 0x0, @remote={0xfe, 0x80, [], 0xbb}, @local={0xfe, 0x80, [], 0xaa}, {[], @udp={0x0, 0x4e20, 0x8}}}}}}, &(0x7f0000000040)) syz_emit_ethernet(0x3e, &(0x7f0000000000)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], {@ipv6={0x86dd, {0x0, 0x6, "50a09c", 0x8, 0xffffff11, 0x0, @remote={0xfe, 0x80, [], 0xbb}, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x28000000], 0xaa}, {[], @udp={0x300, 0x4e20, 0x8}}}}}}, &(0x7f0000000040)) [ 1461.547490] hfsplus: invalid session number or type of track [ 1461.553456] hfsplus: unable to find HFS+ superblock 03:53:43 executing program 1: r0 = socket(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x6e01000000000000}, 0xc, &(0x7f0000000900)={&(0x7f0000000040)={0x14, 0x1e, 0x201}, 0x14}, 0x1}, 0x0) 03:53:43 executing program 4: r0 = socket(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x115}, 0xc, &(0x7f0000000900)={&(0x7f0000000040)={0x14, 0x1e, 0x201}, 0x14}, 0x1}, 0x0) 03:53:43 executing program 6: r0 = socket(0x80015, 0x800, 0x4) getpid() getsockopt$llc_int(r0, 0x10c, 0x4, &(0x7f0000000000), &(0x7f0000000040)=0x4) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000640)={0x0, 0x0, 0x0}, &(0x7f0000000680)=0xc) syz_mount_image$hfsplus(&(0x7f0000000240)='hfsplus\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, &(0x7f00000005c0), 0x0, &(0x7f00000006c0)=ANY=[@ANYBLOB='Rid=', @ANYRESHEX=r1, @ANYBLOB="2c02"]) 03:53:43 executing program 5: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer2\x00', 0x0, 0x0) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000040)="025cc83d6d345f8f762070") ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r0, 0x40085112, &(0x7f0000b18000)={{0xffffff93}, {0xffffffa0}, 0x0, 0x0, 0x0, [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffdfd]}) 03:53:43 executing program 7: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f000000d000)={0xa, 0x4e20}, 0x1c) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}, 0xb}, 0x1c) syz_emit_ethernet(0x3e, &(0x7f00000001c0)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @random="e829f650db0f", [], {@ipv6={0x86dd, {0x0, 0x6, "50a09c", 0x8, 0xffffff11, 0x0, @remote={0xfe, 0x80, [], 0xbb}, @local={0xfe, 0x80, [], 0xaa}, {[], @udp={0x0, 0x4e20, 0x8}}}}}}, &(0x7f0000000040)) syz_emit_ethernet(0x3e, &(0x7f0000000000)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], {@ipv6={0x86dd, {0x0, 0x6, "50a09c", 0x8, 0xffffff11, 0x0, @remote={0xfe, 0x80, [], 0xbb}, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4305], 0xaa}, {[], @udp={0x300, 0x4e20, 0x8}}}}}}, &(0x7f0000000040)) 03:53:43 executing program 0: ioctl$BLKDISCARD(0xffffffffffffffff, 0x1277, &(0x7f0000000180)) r0 = syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x9, 0x200400) write$P9_RFLUSH(r0, &(0x7f0000000100)={0x7, 0x6d, 0x1}, 0x7) syz_open_dev$usbmon(&(0x7f0000000080)='/dev/usbmon#\x00', 0xff, 0x4000) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140)='/dev/snapshot\x00', 0x0, 0x0) fcntl$addseals(0xffffffffffffffff, 0x409, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f0000000000), &(0x7f00000000c0)=0x8) ioctl$EVIOCGLED(0xffffffffffffffff, 0x80404519, &(0x7f0000000580)=""/236) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x3c, 0x0) ioctl$EVIOCGKEYCODE_V2(0xffffffffffffffff, 0x80284504, &(0x7f00000003c0)=""/188) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) 03:53:43 executing program 1: r0 = socket(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x52010000}, 0xc, &(0x7f0000000900)={&(0x7f0000000040)={0x14, 0x1e, 0x201}, 0x14}, 0x1}, 0x0) 03:53:43 executing program 4: r0 = socket(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0xe9000000}, 0xc, &(0x7f0000000900)={&(0x7f0000000040)={0x14, 0x1e, 0x201}, 0x14}, 0x1}, 0x0) 03:53:43 executing program 7: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f000000d000)={0xa, 0x4e20}, 0x1c) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}, 0xb}, 0x1c) syz_emit_ethernet(0x3e, &(0x7f00000001c0)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @random="e829f650db0f", [], {@ipv6={0x86dd, {0x0, 0x6, "50a09c", 0x8, 0xffffff11, 0x0, @remote={0xfe, 0x80, [], 0xbb}, @local={0xfe, 0x80, [], 0xaa}, {[], @udp={0x0, 0x4e20, 0x8}}}}}}, &(0x7f0000000040)) syz_emit_ethernet(0x3e, &(0x7f0000000000)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], {@ipv6={0x86dd, {0x0, 0x6, "50a09c", 0x8, 0xffffff11, 0x0, @remote={0xfe, 0x80, [], 0xbb}, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4], 0xaa}, {[], @udp={0x300, 0x4e20, 0x8}}}}}}, &(0x7f0000000040)) [ 1462.109218] hfsplus: unable to parse mount options [ 1462.127157] hfsplus: unable to parse mount options 03:53:44 executing program 2: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x40000, 0x0) ioctl$INOTIFY_IOC_SETNEXTWD(r0, 0x40044900, 0x6) r1 = syz_open_dev$sndseq(&(0x7f0000000080)='/dev/snd/seq\x00', 0x0, 0x4) read(r1, &(0x7f0000fb6000)=""/28, 0x3f0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r1, 0xc0a85320, &(0x7f0000418f50)={{0x80}, "0a4ceaa05d9a00000000000000039b3fd4cec307e8ef3d13eb790ec9c65abaf90d229db692542e5b78f8b29e0a27800f0000000000000009fb42f376589701a4", 0xa9824f69d1376637, 0x10800a}) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r1, 0x4040534e, &(0x7f0000000240)={0xbf}) write$binfmt_script(r1, &(0x7f0000000000)=ANY=[], 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r1, 0xc0a85320, &(0x7f00000002c0)={{}, 'port0\x00'}) openat$sequencer2(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer2\x00', 0x0, 0x0) 03:53:44 executing program 5: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer2\x00', 0x0, 0x0) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000040)="025cc83d6d345f8f762070") ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r0, 0x40085112, &(0x7f0000b18000)={{0xffffff93}, {0xffffffa0}, 0x0, 0x0, 0x0, [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000000000]}) 03:53:44 executing program 1: r0 = socket(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x24000000}, 0xc, &(0x7f0000000900)={&(0x7f0000000040)={0x14, 0x1e, 0x201}, 0x14}, 0x1}, 0x0) 03:53:44 executing program 4: r0 = socket(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4001000000000000}, 0xc, &(0x7f0000000900)={&(0x7f0000000040)={0x14, 0x1e, 0x201}, 0x14}, 0x1}, 0x0) 03:53:44 executing program 7: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f000000d000)={0xa, 0x4e20}, 0x1c) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}, 0xb}, 0x1c) syz_emit_ethernet(0x3e, &(0x7f00000001c0)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @random="e829f650db0f", [], {@ipv6={0x86dd, {0x0, 0x6, "50a09c", 0x8, 0xffffff11, 0x0, @remote={0xfe, 0x80, [], 0xbb}, @local={0xfe, 0x80, [], 0xaa}, {[], @udp={0x0, 0x4e20, 0x8}}}}}}, &(0x7f0000000040)) syz_emit_ethernet(0x3e, &(0x7f0000000000)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], {@ipv6={0x86dd, {0x0, 0x6, "50a09c", 0x8, 0xffffff11, 0x0, @remote={0xfe, 0x80, [], 0xbb}, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3580], 0xaa}, {[], @udp={0x300, 0x4e20, 0x8}}}}}}, &(0x7f0000000040)) 03:53:44 executing program 0: ioctl$BLKDISCARD(0xffffffffffffffff, 0x1277, &(0x7f0000000180)) r0 = syz_open_dev$usbmon(&(0x7f0000000080)='/dev/usbmon#\x00', 0xff, 0x4000) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140)='/dev/snapshot\x00', 0x0, 0x0) fcntl$addseals(0xffffffffffffffff, 0x409, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f0000000000), &(0x7f00000000c0)=0x8) ioctl$EVIOCGLED(0xffffffffffffffff, 0x80404519, &(0x7f0000000580)=""/236) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x3c, 0x0) ioctl$EVIOCGKEYCODE_V2(0xffffffffffffffff, 0x80284504, &(0x7f00000003c0)=""/188) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) r3 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r3) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) 03:53:44 executing program 6: ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffff9c, 0x89e2, &(0x7f0000000600)={0xffffffffffffffff}) getsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(0xffffffffffffffff, 0x84, 0x75, &(0x7f0000001700)={0x0, 0xfffffffffffffff9}, &(0x7f0000001740)=0x8) setsockopt$inet_sctp_SCTP_RESET_ASSOC(r0, 0x84, 0x78, &(0x7f0000001840)=r1, 0x3cb2502ed03390cd) r2 = socket(0x11, 0xa, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000640)={0x0, 0x0, 0x0}, &(0x7f0000000680)=0xc) syz_mount_image$msdos(&(0x7f0000000000)='msdos\x00', &(0x7f0000000040)='./file0\x00', 0x9, 0x7, &(0x7f0000000540)=[{&(0x7f0000000080)="494d1eb6920933d6cb198e9ae919a20087da369591ea57f981e292dcdf0e107b061971be572209edf47c2a63d800052ed5dc6f9201f950d876a74a1ce619db1f5b11c0f378791ce9290dbf53cf99607b7983bb58d4a33e0be9431a42653974dcde88c66aeb64978172b267974e1f7bf272c70cb580414adddee657390a7c1e29a6aa19c6d32dff3388ae9c01edffdd89a3a1cd97d27bfb150776df92947b223e2c72e75fbaa914dfd74e9bb03d4dae73cae00a7735", 0xb5, 0x9}, {&(0x7f0000000700)="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", 0x1000, 0x3}, {&(0x7f0000000140)="38843fccfd84f6ebe849737478adfda9154b3f520503c3873a3c4a4eef4baf697f527bb9fc7b27c392d69f1cba8cf8a275daa45ae1f8150df6254b014ee81ae2952b0cc0528df85d096817c3465725a71cdc08fcfbf6a21c8b87ab5bc210903ef44dfa83bc3d6f095b81bcadd9c0c36ad1de61266e7e991f0fcebc71d0189aad9c2609768349fa697d34831dfaea34a2e8", 0x91, 0x1}, {&(0x7f0000000300)="7137de01d0aa1e3c33efac46ae0b6ffc61ebcb9c0cc6e07a14969a54c157a56dbad9439dfdbcc0a64d8a1c0a91816a3bb331e42f98e7f49a6d9fa83a43e056134df4d7e8230b33e8daf3e487a025823767cf54dfd3feeb4b3cd1ab2f323b49015eb59b71c4b25890dc01142ae4a325f17a10f48d8d435c5bfe7a7b890bc5bd4b8d2f764f102dcc9ef025c85dbe66f656391b884adad5f6a9490aa49228efe28403d33f4204", 0xa5}, {&(0x7f0000000200)="b9975861fc84b625c7f2b310e8d8719683dc40b22964db3c97bbc40c00f72eb13805", 0x22, 0x1}, {&(0x7f00000003c0)="40952a566b714e06f2c3bb212ad2ffb27d2a008439c85adc10a9c3a8546b7ad6db4d3a55564d54ddec3bffeea953f060e3054ee54557e80ced12c2ffdd45ba2a154b2dbf14144bf68ff7ffcd65111a938c558302066e2117b3d632dbf77801d09f53887869ae66233fc022d1e3546a50c663e67a800deb69b5803cc5b7b68b8b012ac6d25d1922e0b0c6e1fde980ea7f0005603669614df97952c737cc8e61a21f", 0xa1, 0x4}, {&(0x7f0000000480)="2dbec4ea0d29072be6ac5d1683c69eeaa68624a1a7bbaf87a5c4b6461cc728f3be5736cbc930715eef8e01cea9021476daee100fa898139bc3ad3ce5c26bb3ac653d0f60a9c2e50bf9211d517ba1215db1638060369e12ae4fb11069c1b516426e033d08ff45507560ef2fe1d9bfebc3c9c0ef3ee3e4bca99ecf37b6f826aea2fe37f1a1d8b64b91c6d82a365537eb79609e3fc9f74cb3bc08242a5c738c6133f0", 0xa1, 0x83dc}], 0x80, &(0x7f0000000280)={[{@dots='dots', 0x2c}, {@dots='dots', 0x2c}, {@dots='dots', 0x2c}, {@nodots='nodots', 0x2c}]}) syz_mount_image$hfsplus(&(0x7f0000000240)='hfsplus\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, &(0x7f00000005c0), 0x0, &(0x7f00000006c0)={[{@gid={'gid', 0x3d, r3}, 0x2c}]}) 03:53:44 executing program 3: accept$unix(0xffffffffffffffff, &(0x7f0000000500)=@abs, &(0x7f0000000480)=0x6e) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) r0 = creat(&(0x7f00000000c0)='./file0/file0\x00', 0x100) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fallocate(r0, 0x1, 0x800000, 0x8) statfs(&(0x7f0000000140)='./file0/file0\x00', &(0x7f0000000380)=""/229) personality(0x4100001) llistxattr(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000680)=""/236, 0xec) time(&(0x7f0000000280)) open(&(0x7f0000000240)='./file0/file0\x00', 0x200, 0x18) 03:53:44 executing program 4: r0 = socket(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x54010000}, 0xc, &(0x7f0000000900)={&(0x7f0000000040)={0x14, 0x1e, 0x201}, 0x14}, 0x1}, 0x0) 03:53:44 executing program 1: r0 = socket(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x86010000}, 0xc, &(0x7f0000000900)={&(0x7f0000000040)={0x14, 0x1e, 0x201}, 0x14}, 0x1}, 0x0) 03:53:44 executing program 7: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f000000d000)={0xa, 0x4e20}, 0x1c) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}, 0xb}, 0x1c) syz_emit_ethernet(0x3e, &(0x7f00000001c0)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @random="e829f650db0f", [], {@ipv6={0x86dd, {0x0, 0x6, "50a09c", 0x8, 0xffffff11, 0x0, @remote={0xfe, 0x80, [], 0xbb}, @local={0xfe, 0x80, [], 0xaa}, {[], @udp={0x0, 0x4e20, 0x8}}}}}}, &(0x7f0000000040)) syz_emit_ethernet(0x3e, &(0x7f0000000000)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], {@ipv6={0x86dd, {0x0, 0x6, "50a09c", 0x8, 0xffffff11, 0x0, @remote={0xfe, 0x80, [], 0xbb}, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd], 0xaa}, {[], @udp={0x300, 0x4e20, 0x8}}}}}}, &(0x7f0000000040)) 03:53:44 executing program 5: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer2\x00', 0x0, 0x0) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000040)="025cc83d6d345f8f762070") ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r0, 0x40085112, &(0x7f0000b18000)={{0xffffff93}, {0xffffffa0}, 0x0, 0x0, 0x0, [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000]}) [ 1462.930878] FAT-fs (loop6): invalid media value (0x2a) [ 1462.936279] FAT-fs (loop6): Can't find a valid FAT filesystem 03:53:44 executing program 0: ioctl$BLKDISCARD(0xffffffffffffffff, 0x1277, &(0x7f0000000180)) syz_open_dev$usbmon(&(0x7f0000000080)='/dev/usbmon#\x00', 0xff, 0x4000) r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140)='/dev/snapshot\x00', 0x0, 0x0) fcntl$addseals(0xffffffffffffffff, 0x409, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f0000000000), &(0x7f00000000c0)=0x8) ioctl$EVIOCGLED(0xffffffffffffffff, 0x80404519, &(0x7f0000000580)=""/236) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x1d, &(0x7f0000000040)={0x5, [0x0, 0x0, 0x0, 0x0, 0x0]}, &(0x7f0000000100)=0x18) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x3c, 0x0) ioctl$EVIOCGKEYCODE_V2(0xffffffffffffffff, 0x80284504, &(0x7f00000003c0)=""/188) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$KVM_KVMCLOCK_CTRL(r0, 0xaead) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) [ 1462.991310] hfsplus: gid requires an argument [ 1462.995938] hfsplus: unable to parse mount options 03:53:44 executing program 4: r0 = socket(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0xaa01}, 0xc, &(0x7f0000000900)={&(0x7f0000000040)={0x14, 0x1e, 0x201}, 0x14}, 0x1}, 0x0) 03:53:44 executing program 1: r0 = socket(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x2501}, 0xc, &(0x7f0000000900)={&(0x7f0000000040)={0x14, 0x1e, 0x201}, 0x14}, 0x1}, 0x0) [ 1463.041468] hfsplus: gid requires an argument [ 1463.046131] hfsplus: unable to parse mount options 03:53:44 executing program 7: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f000000d000)={0xa, 0x4e20}, 0x1c) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}, 0xb}, 0x1c) syz_emit_ethernet(0x3e, &(0x7f00000001c0)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @random="e829f650db0f", [], {@ipv6={0x86dd, {0x0, 0x6, "50a09c", 0x8, 0xffffff11, 0x0, @remote={0xfe, 0x80, [], 0xbb}, @local={0xfe, 0x80, [], 0xaa}, {[], @udp={0x0, 0x4e20, 0x8}}}}}}, &(0x7f0000000040)) syz_emit_ethernet(0x3e, &(0x7f0000000000)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], {@ipv6={0x86dd, {0x0, 0x6, "50a09c", 0x8, 0xffffff11, 0x0, @remote={0xfe, 0x80, [], 0xbb}, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3], 0xaa}, {[], @udp={0x300, 0x4e20, 0x8}}}}}}, &(0x7f0000000040)) 03:53:45 executing program 2: r0 = syz_open_dev$sndseq(&(0x7f0000dcc000)='/dev/snd/seq\x00', 0x0, 0x2) read(r0, &(0x7f0000fb6000)=""/28, 0x3f0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000418f50)={{0x80}, "0a4ceaa05d9a00000000000000039b3fd4cec307e8ef3d13eb790ec9c65abaf90d229db692542e5b78f8b29e0a27800f0000000000000009fb42f376589701a4", 0xa9824f69d1376637, 0x100000}) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000240)={0xbf}) write$binfmt_script(r0, &(0x7f0000000000)=ANY=[], 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='tracefs\x00', 0x800, &(0x7f0000000100)="98fdd8c3aa0047870cc9") r1 = syz_open_dev$adsp(&(0x7f0000000140)='/dev/adsp#\x00', 0x9, 0x600181) ioctl$HDIO_GETGEO(r1, 0x301, &(0x7f0000000180)) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f00000002c0)={{}, 'port0\x00'}) openat$sequencer2(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer2\x00', 0x0, 0x0) 03:53:45 executing program 6: socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFCONF(r0, 0x8910, &(0x7f0000000140)=@buf={0xe9, &(0x7f0000000040)="2ef7ba0d7a5f7cb8023100c53dc28ded1ae5d4c0a50d2a5a10064eaf0c885f94769f6cc7d64ae0345224d3da99866479ac7a1c9ce6bd283eabc4ce88fe5fdedd07b2dbdf9f2c6a345f3961d9c03bc5268b22ca9055f1b0d1c3e7b8fceca3c1455cfe26d15b968f539e5c6c7058b88b3a1f2da982fc3cdef2f25b28ef54c4e8375d6abb126bf544a71f9d310a0dfbb02fc82f4c0f5509366d6042d6740f0141ea4f0ec8b45c2c00caa93775de220c7dc5c1707ae4c1ab99b1b3702bc16df2bca7927205752df366437327f119abd8896b5e175144545f8e899bee7968d8dc0fc9ec4a6c17af77edabef"}) r1 = socket(0x11, 0xa, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000640)={0x0, 0x0, 0x0}, &(0x7f0000000680)=0xc) syz_mount_image$hfsplus(&(0x7f0000000240)='hfsplus\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, &(0x7f00000005c0), 0x0, &(0x7f00000006c0)={[{@gid={'gid', 0x3d, r2}, 0x2c}]}) 03:53:45 executing program 5: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer2\x00', 0x0, 0x0) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000040)="025cc83d6d345f8f762070") ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r0, 0x40085112, &(0x7f0000b18000)={{0xffffff93}, {0xffffffa0}, 0x0, 0x0, 0x0, [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfdfdffff]}) 03:53:45 executing program 1: r0 = socket(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x85}, 0xc, &(0x7f0000000900)={&(0x7f0000000040)={0x14, 0x1e, 0x201}, 0x14}, 0x1}, 0x0) 03:53:45 executing program 4: r0 = socket(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x6a00}, 0xc, &(0x7f0000000900)={&(0x7f0000000040)={0x14, 0x1e, 0x201}, 0x14}, 0x1}, 0x0) 03:53:45 executing program 7: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f000000d000)={0xa, 0x4e20}, 0x1c) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}, 0xb}, 0x1c) syz_emit_ethernet(0x3e, &(0x7f00000001c0)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @random="e829f650db0f", [], {@ipv6={0x86dd, {0x0, 0x6, "50a09c", 0x8, 0xffffff11, 0x0, @remote={0xfe, 0x80, [], 0xbb}, @local={0xfe, 0x80, [], 0xaa}, {[], @udp={0x0, 0x4e20, 0x8}}}}}}, &(0x7f0000000040)) syz_emit_ethernet(0x3e, &(0x7f0000000000)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], {@ipv6={0x86dd, {0x0, 0x6, "50a09c", 0x8, 0xffffff11, 0x0, @remote={0xfe, 0x80, [], 0xbb}, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7000000], 0xaa}, {[], @udp={0x300, 0x4e20, 0x8}}}}}}, &(0x7f0000000040)) 03:53:45 executing program 0: ioctl$BLKDISCARD(0xffffffffffffffff, 0x1277, &(0x7f0000000180)) r0 = syz_open_dev$usbmon(&(0x7f0000000080)='/dev/usbmon#\x00', 0xff, 0x4000) ioctl$KVM_PPC_GET_SMMU_INFO(r0, 0x8250aea6, &(0x7f00000001c0)=""/118) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140)='/dev/snapshot\x00', 0x0, 0x0) fcntl$addseals(0xffffffffffffffff, 0x409, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f0000000000), &(0x7f00000000c0)=0x8) ioctl$EVIOCGLED(0xffffffffffffffff, 0x80404519, &(0x7f0000000580)=""/236) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x3c, 0x0) ioctl$EVIOCGKEYCODE_V2(0xffffffffffffffff, 0x80284504, &(0x7f00000003c0)=""/188) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) 03:53:45 executing program 3: accept$unix(0xffffffffffffffff, &(0x7f0000000500)=@abs, &(0x7f0000000480)=0x6e) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) r0 = creat(&(0x7f00000000c0)='./file0/file0\x00', 0x100) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fallocate(r0, 0x1, 0x800000, 0x8) statfs(&(0x7f0000000140)='./file0/file0\x00', &(0x7f0000000380)=""/229) personality(0x4100001) llistxattr(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000680)=""/236, 0xec) time(&(0x7f0000000280)) open(&(0x7f0000000240)='./file0/file0\x00', 0x200, 0x18) 03:53:45 executing program 1: r0 = socket(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0xa6}, 0xc, &(0x7f0000000900)={&(0x7f0000000040)={0x14, 0x1e, 0x201}, 0x14}, 0x1}, 0x0) 03:53:45 executing program 4: r0 = socket(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x500}, 0xc, &(0x7f0000000900)={&(0x7f0000000040)={0x14, 0x1e, 0x201}, 0x14}, 0x1}, 0x0) 03:53:45 executing program 7: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f000000d000)={0xa, 0x4e20}, 0x1c) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}, 0xb}, 0x1c) syz_emit_ethernet(0x3e, &(0x7f00000001c0)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @random="e829f650db0f", [], {@ipv6={0x86dd, {0x0, 0x6, "50a09c", 0x8, 0xffffff11, 0x0, @remote={0xfe, 0x80, [], 0xbb}, @local={0xfe, 0x80, [], 0xaa}, {[], @udp={0x0, 0x4e20, 0x8}}}}}}, &(0x7f0000000040)) syz_emit_ethernet(0x3e, &(0x7f0000000000)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], {@ipv6={0x86dd, {0x0, 0x6, "50a09c", 0x8, 0xffffff11, 0x0, @remote={0xfe, 0x80, [], 0xbb}, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80ffffff00000000], 0xaa}, {[], @udp={0x300, 0x4e20, 0x8}}}}}}, &(0x7f0000000040)) 03:53:45 executing program 5: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer2\x00', 0x0, 0x0) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000040)="025cc83d6d345f8f762070") ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r0, 0x40085112, &(0x7f0000b18000)={{0xffffff93}, {0xffffffa0}, 0x0, 0x0, 0x0, [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff]}) [ 1464.195395] hfsplus: gid requires an argument [ 1464.200068] hfsplus: unable to parse mount options 03:53:45 executing program 1: r0 = socket(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x3800000000000000}, 0xc, &(0x7f0000000900)={&(0x7f0000000040)={0x14, 0x1e, 0x201}, 0x14}, 0x1}, 0x0) 03:53:45 executing program 1: r0 = socket(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x5a000000}, 0xc, &(0x7f0000000900)={&(0x7f0000000040)={0x14, 0x1e, 0x201}, 0x14}, 0x1}, 0x0) [ 1464.406448] hfsplus: gid requires an argument [ 1464.411178] hfsplus: unable to parse mount options 03:53:46 executing program 4: r0 = socket(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x3e01}, 0xc, &(0x7f0000000900)={&(0x7f0000000040)={0x14, 0x1e, 0x201}, 0x14}, 0x1}, 0x0) 03:53:46 executing program 1: r0 = socket(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0xf0000000}, 0xc, &(0x7f0000000900)={&(0x7f0000000040)={0x14, 0x1e, 0x201}, 0x14}, 0x1}, 0x0) 03:53:46 executing program 2: r0 = syz_open_dev$sndseq(&(0x7f00000011c0)='/dev/snd/seq\x00', 0x0, 0x2) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) setsockopt$inet6_group_source_req(r1, 0x29, 0x2c, &(0x7f00000000c0)={0x0, {{0xa, 0x0, 0x0, @mcast2={0xff, 0x2, [], 0x1}}}, {{0xa, 0x0, 0x0, @mcast2={0xff, 0x2, [], 0x1}}}}, 0x108) read(r0, &(0x7f0000fb6000)=""/28, 0x3f0) getsockopt$IP_VS_SO_GET_VERSION(r1, 0x0, 0x480, &(0x7f0000001180), &(0x7f0000001200)=0x40) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000418f50)={{0x80}, "0a4ceaa05d9a00000000000000039b3fd4cec307e8ef3d13eb790ec9c65abaf90d229db692542e5b78f8b29e0a27800f0000000000000009fb42f376589701a4", 0xa9824f69d1376637, 0x10800a}) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000240)={0xbf}) write$binfmt_script(r0, &(0x7f0000000000)=ANY=[], 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f00000002c0)={{}, 'port0\x00'}) r2 = openat$sequencer2(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer2\x00', 0x0, 0x0) recvmmsg(r2, &(0x7f0000001000)=[{{&(0x7f0000000000)=@xdp, 0x80, &(0x7f0000000080)=[{&(0x7f0000000100)=""/91, 0x5b}], 0x1, &(0x7f0000000380)=""/247, 0xf7, 0x100}, 0x8}, {{&(0x7f0000000180)=@pppol2tpv3in6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @dev}}}, 0x80, &(0x7f00000007c0)=[{&(0x7f0000000480)=""/92, 0x5c}, {&(0x7f0000000500)=""/75, 0x4b}, {&(0x7f0000000580)=""/74, 0x4a}, {&(0x7f0000000600)=""/178, 0xb2}, {&(0x7f0000000200)=""/9, 0x9}, {&(0x7f00000006c0)=""/211, 0xd3}], 0x6, &(0x7f0000000840)=""/68, 0x44, 0x7ff}, 0x8}, {{&(0x7f00000008c0)=@ethernet={0x0, @dev}, 0x80, &(0x7f0000000b80)=[{&(0x7f0000000940)=""/118, 0x76}, {&(0x7f00000009c0)=""/208, 0xd0}, {&(0x7f0000000ac0)=""/60, 0x3c}, {&(0x7f0000000b00)=""/118, 0x76}], 0x4, &(0x7f0000000bc0)=""/166, 0xa6, 0x1}, 0x80010}, {{&(0x7f0000000c80)=@ll={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @remote}, 0x80, &(0x7f0000000d40)=[{&(0x7f0000000d00)=""/47, 0x2f}], 0x1, 0x0, 0x0, 0x6}, 0x2}, {{&(0x7f0000000d80)=@alg, 0x80, &(0x7f0000000ec0)=[{&(0x7f0000000e00)=""/164, 0xa4}], 0x1, &(0x7f0000000f00)=""/225, 0xe1, 0x800}, 0xffffffffffff7fff}], 0x5, 0x1, &(0x7f0000001140)={0x0, 0x1c9c380}) 03:53:46 executing program 0: ioctl$BLKDISCARD(0xffffffffffffffff, 0x1277, &(0x7f0000000180)) syz_open_dev$usbmon(&(0x7f0000000080)='/dev/usbmon#\x00', 0xff, 0x4000) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140)='/dev/snapshot\x00', 0x0, 0x0) fcntl$addseals(0xffffffffffffffff, 0x409, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0xfffffffffffffffc, @perf_bp={&(0x7f0000abe000)}, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f0000000000), &(0x7f00000000c0)=0x8) ioctl$EVIOCGLED(0xffffffffffffffff, 0x80404519, &(0x7f0000000580)=""/236) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x2000, 0x0) ioctl$EVIOCGKEYCODE_V2(0xffffffffffffffff, 0x80284504, &(0x7f00000003c0)=""/188) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) 03:53:46 executing program 7: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f000000d000)={0xa, 0x4e20}, 0x1c) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}, 0xb}, 0x1c) syz_emit_ethernet(0x3e, &(0x7f00000001c0)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @random="e829f650db0f", [], {@ipv6={0x86dd, {0x0, 0x6, "50a09c", 0x8, 0xffffff11, 0x0, @remote={0xfe, 0x80, [], 0xbb}, @local={0xfe, 0x80, [], 0xaa}, {[], @udp={0x0, 0x4e20, 0x8}}}}}}, &(0x7f0000000040)) syz_emit_ethernet(0x3e, &(0x7f0000000000)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], {@ipv6={0x86dd, {0x0, 0x6, "50a09c", 0x8, 0xffffff11, 0x0, @remote={0xfe, 0x80, [], 0xbb}, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x88640000], 0xaa}, {[], @udp={0x300, 0x4e20, 0x8}}}}}}, &(0x7f0000000040)) 03:53:46 executing program 6: r0 = socket(0x11, 0xa, 0x400) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000640)={0x0, 0x0, 0x0}, &(0x7f0000000680)=0xc) syz_mount_image$hfsplus(&(0x7f0000000240)='hfsplus\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, &(0x7f00000005c0), 0x0, &(0x7f00000006c0)={[{@gid={'gid', 0x3d, r1}, 0x2c}]}) 03:53:46 executing program 4: r0 = socket(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x400000000000000}, 0xc, &(0x7f0000000900)={&(0x7f0000000040)={0x14, 0x1e, 0x201}, 0x14}, 0x1}, 0x0) 03:53:46 executing program 5: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer2\x00', 0x0, 0x0) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000040)="025cc83d6d345f8f762070") ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r0, 0x40085112, &(0x7f0000b18000)={{0xffffff93}, {0xffffffa0}, 0x0, 0x0, 0x0, [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff03000000000000]}) 03:53:46 executing program 1: r0 = socket(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0xca00}, 0xc, &(0x7f0000000900)={&(0x7f0000000040)={0x14, 0x1e, 0x201}, 0x14}, 0x1}, 0x0) 03:53:46 executing program 3: accept$unix(0xffffffffffffffff, &(0x7f0000000500)=@abs, &(0x7f0000000480)=0x6e) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) r0 = creat(&(0x7f00000000c0)='./file0/file0\x00', 0x100) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fallocate(r0, 0x1, 0x800000, 0x8) statfs(&(0x7f0000000140)='./file0/file0\x00', &(0x7f0000000380)=""/229) personality(0x4100001) llistxattr(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000680)=""/236, 0xec) time(&(0x7f0000000280)) open(&(0x7f0000000240)='./file0/file0\x00', 0x200, 0x18) 03:53:46 executing program 1: r0 = socket(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x300}, 0xc, &(0x7f0000000900)={&(0x7f0000000040)={0x14, 0x1e, 0x201}, 0x14}, 0x1}, 0x0) 03:53:47 executing program 4: r0 = socket(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x7b}, 0xc, &(0x7f0000000900)={&(0x7f0000000040)={0x14, 0x1e, 0x201}, 0x14}, 0x1}, 0x0) 03:53:47 executing program 7: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f000000d000)={0xa, 0x4e20}, 0x1c) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}, 0xb}, 0x1c) syz_emit_ethernet(0x3e, &(0x7f00000001c0)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @random="e829f650db0f", [], {@ipv6={0x86dd, {0x0, 0x6, "50a09c", 0x8, 0xffffff11, 0x0, @remote={0xfe, 0x80, [], 0xbb}, @local={0xfe, 0x80, [], 0xaa}, {[], @udp={0x0, 0x4e20, 0x8}}}}}}, &(0x7f0000000040)) syz_emit_ethernet(0x3e, &(0x7f0000000000)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], {@ipv6={0x86dd, {0x0, 0x6, "50a09c", 0x8, 0xffffff11, 0x0, @remote={0xfe, 0x80, [], 0xbb}, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8906], 0xaa}, {[], @udp={0x300, 0x4e20, 0x8}}}}}}, &(0x7f0000000040)) 03:53:47 executing program 5: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer2\x00', 0x0, 0x0) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000040)="025cc83d6d345f8f762070") ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r0, 0x40085112, &(0x7f0000b18000)={{0xffffff93}, {0xffffffa0}, 0x0, 0x0, 0x0, [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5000000]}) [ 1465.420144] hfsplus: gid requires an argument [ 1465.424857] hfsplus: unable to parse mount options 03:53:47 executing program 1: r0 = socket(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x7}, 0xc, &(0x7f0000000900)={&(0x7f0000000040)={0x14, 0x1e, 0x201}, 0x14}, 0x1}, 0x0) 03:53:47 executing program 6: r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000200)='/dev/hwrng\x00', 0x10000, 0x0) ioctl$KVM_ASSIGN_DEV_IRQ(r0, 0x4040ae70, &(0x7f0000000280)={0x6, 0x8, 0x4, 0x404}) r1 = socket(0x11, 0xa, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000640)={0x0, 0x0, 0x0}, &(0x7f0000000680)=0xc) syz_mount_image$hfsplus(&(0x7f0000000240)='hfsplus\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, &(0x7f00000005c0), 0x0, &(0x7f00000006c0)={[{@gid={'gid', 0x3d, r2}, 0x2c}]}) kexec_load(0xfffffffffffffff7, 0x6, &(0x7f0000000700)=[{&(0x7f0000000000)="fca4262d326c803a889a8fa34647199bbd41407aa2831b80c54322c3577b32cd39f8d462269f68f1cfe8deea31cd4199869a34ee5d5950b986f79de8404b64c2220b5fd0f95a4b734db4a5fba430a59a36d5f73465d0975068c1096e299f99a47f6601586ad6827ca9288883b00faa8c0e6af7391584686591750907dc408a5be57c9d1590040a77a1642da9ec73ad2916a9fe43ec701292f93ddd8aeeb4f216cf44471a521deb754347b73a10feb1c6ec4eced980f4c83bb74c42d2fcade9da82017490fe662d34e5984f3033f3a5", 0xcf, 0x7, 0xfff}, {&(0x7f0000000100)="4769677a97bea095fe605d814faa3ff25637c496ef55d1ccb8a6f7f4b2b8e0bd4b7a0b80afe47576fe4d7304191a740b802a3cfdbd", 0x35, 0x5, 0x200}, {&(0x7f0000000140)="a9930d812a79771dd877d0a20c8c29fe0e5777d4880af00954cc716691ab83dac35740ed58c6c95aafb845ab381a484ed9a69288ac8a8614c5a8e1bb3c1d9dd4f25f3d20f9b38efa666696d512f5ae2453fe5f3fb1a9c0125fb8868f0409bdff231dd680d6ee9e495de95e01ecf5efb682f8dc71180ebb48d95e8d08d77f41345bc8534c5581de5e7d4e49d2cebe6468adb9", 0x92, 0x8, 0x1ee}, {&(0x7f0000000300)="133837cf0c5d7ba16d35ed6420f3428761ffa62fe51761f367ec275681f8cdcfad9bef0611ebc2bd1b6891e6025350b3fe77b676cfa1f50ef54037d19150eb294265ff79f31c569c76f01bd616be35a57fbbf4ef425a7d27296f7934710cd61b9ef230b12bb1da84ad30553bade6209f43aafbd861e0b902130c52e0a87f1b5615487a6f264c76b6dfb64842", 0x8c, 0x0, 0x1}, {&(0x7f00000003c0)="dbd4db64f8699d281b0cb6768e2dd3b7b98045e36a56ccc1e41c0bfbfa62392d307d81e65c1835b8059f86cc9937860be7b1c7a95677e2f4eecc64b65d1b0adcfca3ada2e5f989dd3001e6bbff7c77deb4a325d2dabc7c7be665016289224db5432e149eb194d82c8d07465dc4ae09d880e18387c300a1883d23e3c3dd7755b4b7f29e52f696fd4a64a28a011562b476836cf79ff7e52577bb2148191cbbe906aa8c7a23e03f31daa2b269cd4613e90f60122bac15d80825394016c66542eb2f1d6ab8578d620107a22da5cf7243cf0e26909dad1a0a5c074f", 0xd9, 0x40, 0x4}, {&(0x7f00000004c0)="311c6809aa2493960176b763718ea18ae772728edadf6ac4f8192e5cd7aafbfbc276057a9406b28669cf38264fd9f57e6d741d53570a74eacf67db1bdb82537a9f3b5f6b78298c2573da5706a74e24f2e84134c75d175b54a4289060b3222d3a01fbbdb7460c510f24e5648cb4e858da0042d7b7d7946f688a028ba35d85e10ff85a516d45a2225b3db0471ba9c4e9b0a742fc808b67850f6d6e1b373868138bccbea0ac5afa6499cc169e12a050a03feb86b4cc5d7ffc19231dfd50e2faff7677275ad38374956f9d994783f8d54df29ea499885bf7b1d6c629f4", 0xdb, 0xd0, 0x8}], 0x160000) [ 1465.659345] hfsplus: gid requires an argument [ 1465.664090] hfsplus: unable to parse mount options 03:53:47 executing program 7: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f000000d000)={0xa, 0x4e20}, 0x1c) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}, 0xb}, 0x1c) syz_emit_ethernet(0x3e, &(0x7f00000001c0)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @random="e829f650db0f", [], {@ipv6={0x86dd, {0x0, 0x6, "50a09c", 0x8, 0xffffff11, 0x0, @remote={0xfe, 0x80, [], 0xbb}, @local={0xfe, 0x80, [], 0xaa}, {[], @udp={0x0, 0x4e20, 0x8}}}}}}, &(0x7f0000000040)) syz_emit_ethernet(0x3e, &(0x7f0000000000)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], {@ipv6={0x86dd, {0x0, 0x6, "50a09c", 0x8, 0xffffff11, 0x0, @remote={0xfe, 0x80, [], 0xbb}, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff000000000000], 0xaa}, {[], @udp={0x300, 0x4e20, 0x8}}}}}}, &(0x7f0000000040)) 03:53:47 executing program 4: r0 = socket(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x124}, 0xc, &(0x7f0000000900)={&(0x7f0000000040)={0x14, 0x1e, 0x201}, 0x14}, 0x1}, 0x0) [ 1465.907687] hfsplus: gid requires an argument [ 1465.912325] hfsplus: unable to parse mount options [ 1465.938142] hfsplus: gid requires an argument [ 1465.942738] hfsplus: unable to parse mount options 03:53:48 executing program 2: r0 = syz_open_dev$sndseq(&(0x7f0000000000)='/dev/snd/seq\x00', 0x0, 0x2) read(r0, &(0x7f0000fb6000)=""/28, 0x3f0) fcntl$F_SET_RW_HINT(r0, 0x40c, &(0x7f0000000040)=0x7) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000418f50)={{0x80}, "0a4ceaa05d9a00000000000000039b3fd4cec307e8ef3d13eb790ec9c65abaf90d229db692542e5b78f8b29e0a27800f0000000000000009fb42f376589701a4", 0xa9824f69d1376637, 0x10800a}) r1 = syz_open_dev$sndpcmc(&(0x7f0000000080)='/dev/snd/pcmC#D#c\x00', 0xff, 0x2000) ioctl$TCSETAF(r1, 0x5408, &(0x7f0000000100)={0x9, 0x0, 0x0, 0x1, 0x3, 0x0, 0x4, 0x8, 0x800, 0x80000001}) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000240)={0xbf}) write$binfmt_script(r0, &(0x7f0000000000)=ANY=[], 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f00000002c0)={{}, 'port0\x00'}) openat$sequencer2(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer2\x00', 0x0, 0x0) 03:53:48 executing program 1: r0 = socket(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0xf6}, 0xc, &(0x7f0000000900)={&(0x7f0000000040)={0x14, 0x1e, 0x201}, 0x14}, 0x1}, 0x0) 03:53:48 executing program 5: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer2\x00', 0x0, 0x0) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000040)="025cc83d6d345f8f762070") ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r0, 0x40085112, &(0x7f0000b18000)={{0xffffff93}, {0xffffffa0}, 0x0, 0x0, 0x0, [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000]}) 03:53:48 executing program 0: ioctl$BLKDISCARD(0xffffffffffffffff, 0x1277, &(0x7f0000000180)) r0 = syz_open_dev$usbmon(&(0x7f0000000080)='/dev/usbmon#\x00', 0xff, 0x4000) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140)='/dev/snapshot\x00', 0x0, 0x0) ioctl$KVM_S390_VCPU_FAULT(r0, 0x4008ae52, &(0x7f0000000040)=0x3) fcntl$addseals(0xffffffffffffffff, 0x409, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f0000000000), &(0x7f00000000c0)=0x8) ioctl$EVIOCGLED(0xffffffffffffffff, 0x80404519, &(0x7f0000000580)=""/236) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x3c, 0x0) ioctl$EVIOCGKEYCODE_V2(0xffffffffffffffff, 0x80284504, &(0x7f00000003c0)=""/188) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) 03:53:48 executing program 6: r0 = socket(0x11, 0xa, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000640)={0x0, 0x0, 0x0}, &(0x7f0000000680)=0xc) syz_mount_image$hfsplus(&(0x7f0000000240)='hfsplus\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x8d, &(0x7f0000000480)=[{&(0x7f0000000300)="7fbcc2074ffd39a5cdb8b017a83d9ba39db1f5fce7ab848e63950b999b9d9df164552b2533189f80c751fd427ca12cd48aef0bcc8fe1c5fb642e3111acdbab260d725d17f9bc0311789bfac9aebcc8b01a0a0e1e405380f224c9c3130c057063f3862e68fd183c51ba2b759e76ac0f57211f4571e2094a232d739c508d75a212ed87efcb575c853032abca5018308cb35e222e54bcea9c937972fa7429c3945d5febd749a6febe", 0x0, 0x7f}, {&(0x7f00000003c0)="be7756cef3468b09207245874d51ca0f0a6791499a976972f0097701ed6d8200f31311c10a7033dc7a0d697926419ddf0bdb975f3985efdb6cbfbc4a37298f70178fa08856b2d893fe7cd7a648c90d175c832e8f6c6251150b115da324c8d5c4fd32ed7d6f74600f91257162c3596980d23c667aacb19bc40307f497de3b105272ad584738e508fe9d3784a5dab91538b4b555bb3d6e5e9a815b45cedae740ce9c2a741500563bf0f0acf13196", 0x0, 0x3}, {&(0x7f00000001c0)="255d23d29df2e0bf147eb7fef34e67bee6c293e870f0b5b5241ff4fd4460be5426cc3f2c98b22a4b0e0ccfb1bdfa0ae8223bc045b13f46a3f47c4aef00c6d7195a3977232792205583b2fd6e1133b2be46b0ee4ea8f89adb647cb953eda01fcd5a17", 0x0, 0x7f}], 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='gid=', @ANYRESHEX=r1, @ANYBLOB="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"]) r2 = syz_open_dev$dmmidi(&(0x7f0000000280)='/dev/dmmidi#\x00', 0x5e, 0x1) ioctl$KVM_X86_SETUP_MCE(r2, 0x4008ae9c, &(0x7f0000000500)={0x13, 0x4, 0x3ff}) setsockopt$inet_sctp_SCTP_AUTOCLOSE(r2, 0x84, 0x4, &(0x7f0000000540)=0x91, 0x4) 03:53:48 executing program 7: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f000000d000)={0xa, 0x4e20}, 0x1c) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}, 0xb}, 0x1c) syz_emit_ethernet(0x3e, &(0x7f00000001c0)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @random="e829f650db0f", [], {@ipv6={0x86dd, {0x0, 0x6, "50a09c", 0x8, 0xffffff11, 0x0, @remote={0xfe, 0x80, [], 0xbb}, @local={0xfe, 0x80, [], 0xaa}, {[], @udp={0x0, 0x4e20, 0x8}}}}}}, &(0x7f0000000040)) syz_emit_ethernet(0x3e, &(0x7f0000000000)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], {@ipv6={0x86dd, {0x0, 0x6, "50a09c", 0x8, 0xffffff11, 0x0, @remote={0xfe, 0x80, [], 0xbb}, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x43050000], 0xaa}, {[], @udp={0x300, 0x4e20, 0x8}}}}}}, &(0x7f0000000040)) 03:53:48 executing program 4: r0 = socket(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0xb700000000000000}, 0xc, &(0x7f0000000900)={&(0x7f0000000040)={0x14, 0x1e, 0x201}, 0x14}, 0x1}, 0x0) 03:53:48 executing program 3: r0 = syz_open_dev$binder(&(0x7f0000000080)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) r1 = syz_open_dev$binder(&(0x7f0000009ff3)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r1, 0x40046207, 0x0) mmap(&(0x7f0000010000/0x1000)=nil, 0x1000, 0x0, 0x20011, r1, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000180)={0x3c, 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB='\x00c@@\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00 \x00\x00\x00\x00\x00\x00\x00\b\x00\x00\x00\x00\x00\x00\x00', @ANYPTR=&(0x7f0000001540)=ANY=[@ANYBLOB="00000000000000000dd7d1cbc9fd1652fdc869b35757871a54b8024cab7bbc7afa32fc99af41ca4006f6ce692ecfba3f5cb5fe63f3591127f385a47326618f0d0fb71485a179d0c7a47fd3ddccfb1dd7b5177769ab1bb2add547b330dfcbfa68115aa257ca92318fa3d47772db5409500be1b48ffe610696d73da8133e450fd2f0c9cec22c82a5f52d44fce92c"]], 0x0, 0xfdfd, &(0x7f00000000c0)}) 03:53:48 executing program 4: r0 = socket(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0xe01000000000000}, 0xc, &(0x7f0000000900)={&(0x7f0000000040)={0x14, 0x1e, 0x201}, 0x14}, 0x1}, 0x0) 03:53:48 executing program 1: r0 = socket(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x111}, 0xc, &(0x7f0000000900)={&(0x7f0000000040)={0x14, 0x1e, 0x201}, 0x14}, 0x1}, 0x0) 03:53:48 executing program 5: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer2\x00', 0x0, 0x0) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000040)="025cc83d6d345f8f762070") ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r0, 0x40085112, &(0x7f0000b18000)={{0xffffff93}, {0xffffffa0}, 0x0, 0x0, 0x0, [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff03]}) 03:53:48 executing program 7: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f000000d000)={0xa, 0x4e20}, 0x1c) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}, 0xb}, 0x1c) syz_emit_ethernet(0x3e, &(0x7f00000001c0)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @random="e829f650db0f", [], {@ipv6={0x86dd, {0x0, 0x6, "50a09c", 0x8, 0xffffff11, 0x0, @remote={0xfe, 0x80, [], 0xbb}, @local={0xfe, 0x80, [], 0xaa}, {[], @udp={0x0, 0x4e20, 0x8}}}}}}, &(0x7f0000000040)) syz_emit_ethernet(0x3e, &(0x7f0000000000)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], {@ipv6={0x86dd, {0x0, 0x6, "50a09c", 0x8, 0xffffff11, 0x0, @remote={0xfe, 0x80, [], 0xbb}, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000], 0xaa}, {[], @udp={0x300, 0x4e20, 0x8}}}}}}, &(0x7f0000000040)) [ 1466.948086] binder: 4747:4761 got transaction with invalid offsets ptr [ 1466.964484] binder: 4747:4761 transaction failed 29201/-14, size 32-8 line 2995 [ 1467.005901] binder: BINDER_SET_CONTEXT_MGR already set [ 1467.012413] binder: 4747:4765 ioctl 40046207 0 returned -16 [ 1467.032488] binder_alloc: 4747: binder_alloc_buf, no vma [ 1467.038286] binder: 4747:4765 transaction failed 29189/-3, size 32-8 line 2967 03:53:48 executing program 3: ioctl$BLKDISCARD(0xffffffffffffffff, 0x1277, &(0x7f0000000180)) r0 = syz_open_dev$usbmon(&(0x7f0000000080)='/dev/usbmon#\x00', 0xff, 0x4000) ioctl$KVM_PPC_GET_SMMU_INFO(r0, 0x8250aea6, &(0x7f00000001c0)=""/118) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140)='/dev/snapshot\x00', 0x0, 0x0) fcntl$addseals(0xffffffffffffffff, 0x409, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f0000000000), &(0x7f00000000c0)=0x8) ioctl$EVIOCGLED(0xffffffffffffffff, 0x80404519, &(0x7f0000000580)=""/236) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x3c, 0x0) ioctl$EVIOCGKEYCODE_V2(0xffffffffffffffff, 0x80284504, &(0x7f00000003c0)=""/188) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) [ 1467.062854] binder: undelivered TRANSACTION_ERROR: 29201 [ 1467.078657] binder: undelivered TRANSACTION_ERROR: 29189 [ 1467.245302] hfsplus: unable to parse mount options [ 1467.266493] hfsplus: unable to parse mount options 03:53:48 executing program 6: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x2000, 0x0) ioctl$TCSETAF(r0, 0x5408, &(0x7f0000000040)={0xee09, 0x0, 0xbd52, 0x1, 0x9, 0xe2, 0x5, 0xaa, 0x8, 0x7}) r1 = socket(0x11, 0xa, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000640)={0x0, 0x0, 0x0}, &(0x7f0000000680)=0xc) syz_mount_image$hfsplus(&(0x7f0000000240)='hfsplus\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, &(0x7f00000005c0), 0x0, &(0x7f00000006c0)={[{@gid={'gid', 0x3d, r2}, 0x2c}]}) 03:53:48 executing program 0: ioctl$BLKDISCARD(0xffffffffffffffff, 0x1277, &(0x7f0000000180)) syz_open_dev$usbmon(&(0x7f0000000080)='/dev/usbmon#\x00', 0xff, 0x4000) r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140)='/dev/snapshot\x00', 0x0, 0x0) fcntl$addseals(0xffffffffffffffff, 0x409, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f0000000000), &(0x7f00000000c0)=0x8) ioctl$EVIOCGLED(r0, 0x80404519, &(0x7f0000000580)=""/236) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x3c, 0x0) ioctl$EVIOCGKEYCODE_V2(0xffffffffffffffff, 0x80284504, &(0x7f00000003c0)=""/188) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) 03:53:48 executing program 4: r0 = socket(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x7201000000000000}, 0xc, &(0x7f0000000900)={&(0x7f0000000040)={0x14, 0x1e, 0x201}, 0x14}, 0x1}, 0x0) [ 1467.942589] hfsplus: gid requires an argument [ 1467.947313] hfsplus: unable to parse mount options [ 1467.965679] hfsplus: gid requires an argument [ 1467.970456] hfsplus: unable to parse mount options 03:53:49 executing program 2: r0 = syz_open_dev$sndseq(&(0x7f0000dcc000)='/dev/snd/seq\x00', 0x0, 0x2) read(r0, &(0x7f0000fb6000)=""/28, 0x3f0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000418f50)={{0x80}, "0a4ceaa05d9a00000000000000039b3fd4cec307e8ef3d13eb790ec9c65abaf90d229db692542e5b78f8b29e0a27800f0000000000000009fb42f376589701a4", 0xa9824f69d1376637, 0x10800a}) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000240)={0xbf}) write$binfmt_script(r0, &(0x7f0000000000)=ANY=[], 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f00000002c0)={{}, 'port0\x00'}) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer2\x00', 0x0, 0x0) setsockopt$l2tp_PPPOL2TP_SO_REORDERTO(r1, 0x111, 0x5, 0x0, 0x4) 03:53:49 executing program 1: r0 = socket(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0xb401000000000000}, 0xc, &(0x7f0000000900)={&(0x7f0000000040)={0x14, 0x1e, 0x201}, 0x14}, 0x1}, 0x0) 03:53:49 executing program 7: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f000000d000)={0xa, 0x4e20}, 0x1c) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}, 0xb}, 0x1c) syz_emit_ethernet(0x3e, &(0x7f00000001c0)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @random="e829f650db0f", [], {@ipv6={0x86dd, {0x0, 0x6, "50a09c", 0x8, 0xffffff11, 0x0, @remote={0xfe, 0x80, [], 0xbb}, @local={0xfe, 0x80, [], 0xaa}, {[], @udp={0x0, 0x4e20, 0x8}}}}}}, &(0x7f0000000040)) syz_emit_ethernet(0x3e, &(0x7f0000000000)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], {@ipv6={0x86dd, {0x0, 0x6, "50a09c", 0x8, 0xffffff11, 0x0, @remote={0xfe, 0x80, [], 0xbb}, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6000000], 0xaa}, {[], @udp={0x300, 0x4e20, 0x8}}}}}}, &(0x7f0000000040)) 03:53:49 executing program 5: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer2\x00', 0x0, 0x0) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000040)="025cc83d6d345f8f762070") ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r0, 0x40085112, &(0x7f0000b18000)={{0xffffff93}, {0xffffffa0}, 0x0, 0x0, 0x0, [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4]}) 03:53:49 executing program 3: ioctl$BLKDISCARD(0xffffffffffffffff, 0x1277, &(0x7f0000000180)) r0 = syz_open_dev$usbmon(&(0x7f0000000080)='/dev/usbmon#\x00', 0xff, 0x4000) ioctl$KVM_PPC_GET_SMMU_INFO(r0, 0x8250aea6, &(0x7f00000001c0)=""/118) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140)='/dev/snapshot\x00', 0x0, 0x0) fcntl$addseals(0xffffffffffffffff, 0x409, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f0000000000), &(0x7f00000000c0)=0x8) ioctl$EVIOCGLED(0xffffffffffffffff, 0x80404519, &(0x7f0000000580)=""/236) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x3c, 0x0) ioctl$EVIOCGKEYCODE_V2(0xffffffffffffffff, 0x80284504, &(0x7f00000003c0)=""/188) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) 03:53:49 executing program 4: r0 = socket(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x7c01}, 0xc, &(0x7f0000000900)={&(0x7f0000000040)={0x14, 0x1e, 0x201}, 0x14}, 0x1}, 0x0) 03:53:49 executing program 0: ioctl$BLKDISCARD(0xffffffffffffffff, 0x1277, &(0x7f0000000180)) r0 = syz_open_dev$usbmon(&(0x7f0000000080)='/dev/usbmon#\x00', 0xff, 0x4000) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140)='/dev/snapshot\x00', 0x0, 0x0) fcntl$addseals(0xffffffffffffffff, 0x409, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f0000000000), &(0x7f00000000c0)=0x8) ioctl$EVIOCGRAB(r1, 0x40044590, &(0x7f0000000040)=0x1) ioctl$EVIOCGLED(0xffffffffffffffff, 0x80404519, &(0x7f0000000580)=""/236) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x3c, 0x0) ioctl$EVIOCGKEYCODE_V2(0xffffffffffffffff, 0x80284504, &(0x7f00000003c0)=""/188) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) r3 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_ADD(r1, 0x4c80, r3) 03:53:49 executing program 6: r0 = socket(0x11, 0xa, 0x0) stat(&(0x7f0000000280)='./file0\x00', &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0}) accept$nfc_llcp(r0, &(0x7f0000000580), &(0x7f0000000080)=0x60) syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000040)='./file0/file0\x00', 0xffffffffffff7fff, 0x4, &(0x7f00000001c0)=[{&(0x7f0000000080), 0x0, 0xe00}, {&(0x7f00000000c0)="d3b055b83f155e0c08a7610188ec59af1b55f058a392e41adb33683842b3f7a1c120d2cf50ca20b6ae0427fde05b5dbae87bd8cb6d67ff1cf7c4572ada406da33913a01ad1e5379a8cf8154c5ce36990b86dd104bae02644c82a9f62230f79da28c9ab0ebf653f3d216698b36349a669d74f56b2a8d9496974512446aef01b8ae959128413e9c5c828c04f19bcdefc1460cab15960315bd3d9ad97d90fa4def7757c77438375f6223918695040962916e3e0e8372bb060e01f8506bc3ab3e4f1fe2eac15f27fc38b293e68d09986b0bb34698f5d3668518eeb", 0xd9, 0x1}, {&(0x7f0000000300)="3bcd7f7af7b6c81b4f801f457c187fe8522178511aae72467e581083c4c04e4f097a81231b3bd65cf0c50d2106300b2063425482921ebac110a7cdab68f620ca94c06dc89eb0ebcbc922dad0a0bce78eb1b7f9d587250b078f1448868342ae3645fbb717033f83685657e8b4031b0bd6825654a1bf7df6425a6d2aebf60b7061218fabbc39c2a1a3ba2d391b5417482f6ed86d2a6a62e5327e69ba18c3fe7255751b954a609acb140aaf26916aeaa36d6679e91fe99d6e223cec", 0xba, 0x9}, {&(0x7f00000003c0)="fa8271fe6318a7e2492182a532b47421984a621c9711dd8d1297bf0816a71cf8d75aa802d1b53dc82cd434892d87ab6bb15024206786ffbde747c9894c588422e60f2fdee96f63433f02bc2ac742d6fd88f399ab21fb92762a975e195458dd98b930f112b8e0f72959940cd335bb44ca7dc27c62e1d456cdbedf873d2e91aaa3aae7c4f38baa27b6fc0c6513b7ea085d", 0x90, 0x8000}], 0x20, &(0x7f0000000500)={[{@hide='hide', 0x2c}, {@session={'session', 0x3d, 0x41}, 0x2c}, {@uid={'uid', 0x3d, r1}, 0x2c}, {@map_acorn='map=acorn', 0x2c}, {@overriderock='overriderockperm', 0x2c}]}) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000640), &(0x7f0000000680)=0xc) 03:53:49 executing program 7: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f000000d000)={0xa, 0x4e20}, 0x1c) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}, 0xb}, 0x1c) syz_emit_ethernet(0x3e, &(0x7f00000001c0)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @random="e829f650db0f", [], {@ipv6={0x86dd, {0x0, 0x6, "50a09c", 0x8, 0xffffff11, 0x0, @remote={0xfe, 0x80, [], 0xbb}, @local={0xfe, 0x80, [], 0xaa}, {[], @udp={0x0, 0x4e20, 0x8}}}}}}, &(0x7f0000000040)) syz_emit_ethernet(0x3e, &(0x7f0000000000)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], {@ipv6={0x86dd, {0x0, 0x6, "50a09c", 0x8, 0xffffff11, 0x0, @remote={0xfe, 0x80, [], 0xbb}, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8100], 0xaa}, {[], @udp={0x300, 0x4e20, 0x8}}}}}}, &(0x7f0000000040)) 03:53:50 executing program 4: r0 = socket(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8301}, 0xc, &(0x7f0000000900)={&(0x7f0000000040)={0x14, 0x1e, 0x201}, 0x14}, 0x1}, 0x0) 03:53:50 executing program 1: r0 = socket(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x9201000000000000}, 0xc, &(0x7f0000000900)={&(0x7f0000000040)={0x14, 0x1e, 0x201}, 0x14}, 0x1}, 0x0) 03:53:50 executing program 5: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer2\x00', 0x0, 0x0) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000040)="025cc83d6d345f8f762070") ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r0, 0x40085112, &(0x7f0000b18000)={{0xffffff93}, {0xffffffa0}, 0x0, 0x0, 0x0, [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8]}) 03:53:50 executing program 6: r0 = socket(0x11, 0xa, 0x0) r1 = dup(r0) ioctl$KVM_X86_SET_MCE(r1, 0x4040ae9e, &(0x7f0000000200)={0x1000000000000000, 0x3000, 0x1000, 0xf, 0x1b}) r2 = syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x40000) write$RDMA_USER_CM_CMD_GET_EVENT(r2, &(0x7f00000001c0)={0xc, 0x8, 0xfa00, {&(0x7f0000000040)}}, 0x10) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000640)={0x0, 0x0, 0x0}, &(0x7f0000000680)=0xc) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000300)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000280), 0x2, 0x100f}}, 0x20) syz_mount_image$hfsplus(&(0x7f0000000240)='hfsplus\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, &(0x7f00000005c0), 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="6769643d559883b1c0893e1bca371ced9a95396b20ce72046add2f97f2b4b0430082f47b9a18283d6840f249df9bc80de8a035c9ac6f92546097e2f6fd4758d6b44165d8", @ANYRESHEX=r3, @ANYBLOB='@\x00']) 03:53:50 executing program 0: ioctl$BLKDISCARD(0xffffffffffffffff, 0x1277, &(0x7f0000000180)) r0 = syz_open_dev$usbmon(&(0x7f0000000080)='/dev/usbmon#\x00', 0xff, 0x4000) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140)='/dev/snapshot\x00', 0x0, 0x0) fcntl$addseals(0xffffffffffffffff, 0x409, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f0000000000), &(0x7f00000000c0)=0x8) ioctl$EVIOCGLED(0xffffffffffffffff, 0x80404519, &(0x7f0000000580)=""/236) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x3c, 0x0) getsockopt$inet_mreqn(r1, 0x0, 0x27, &(0x7f0000000280)={@broadcast, @remote, 0x0}, &(0x7f0000000380)=0xc) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000002800)={'veth0_to_team\x00', r3}) ioctl$EVIOCGKEYCODE_V2(0xffffffffffffffff, 0x80284504, &(0x7f00000003c0)=""/188) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000300)={0x1, &(0x7f0000000240)=[{0x5, 0x9}]}, 0x10) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) r5 = syz_genetlink_get_family_id$team(&(0x7f0000000100)='team\x00') sendmsg$TEAM_CMD_OPTIONS_SET(r0, &(0x7f0000000200)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f00000001c0)={&(0x7f0000000680)={0x430, r5, 0x4, 0x70bd28, 0x25dfdbfd, {0x1}, [{{0x8, 0x1, r4}, {0x78, 0x2, [{0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x8, 0x3, 0x6}, {0x4, 0x4}}, {0x8, 0x6, r3}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x8, 0x3, 0x3}, {0x8, 0x4, 0x4}}}]}}, {{0x8, 0x1, r3}, {0x178, 0x2, [{0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x8, 0x3, 0x3}, {0x8, 0x4, 0x8}}}, {0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x8, 0x3, 0x3}, {0x8, 0x4, r4}}}, {0x54, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x8, 0x3, 0xb}, {0x24, 0x4, [{0x9, 0x1c, 0x6, 0x7}, {0xfff, 0x80000000, 0x8, 0x4}, {0x7, 0x9, 0x3ff, 0x5}, {0x7, 0x5}]}}}, {0x38, 0x1, @notify_peers_interval={{0x24, 0x1, 'notify_peers_interval\x00'}, {0x8, 0x3, 0x3}, {0x8, 0x4, 0x1}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8, 0x3, 0x3}, {0x8, 0x4, 0x6}}}, {0x40, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x8, 0x3, 0x5}, {0x10, 0x4, 'roundrobin\x00'}}}]}}, {{0x8, 0x1, r3}, {0xa0, 0x2, [{0x40, 0x1, @lb_port_stats={{{0x24, 0x1, 'lb_port_stats\x00'}, {0x8, 0x3, 0xb}, {0x8, 0x4, 0xc}}, {0x8, 0x6, r3}}}, {0x5c, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x8, 0x3, 0xb}, {0x2c, 0x4, [{0x80000000, 0x8, 0x9, 0x4}, {0x4, 0x6, 0xdb1}, {0x7, 0x2, 0x100000000, 0x6}, {0x9, 0x4, 0x3f3b, 0x1}, {0x9, 0x7fffffff, 0x3, 0x8}]}}}]}}, {{0x8, 0x1, r3}, {0x16c, 0x2, [{0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x8, 0x3, 0x3}, {0x8, 0x4, 0x6}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x8, 0x3, 0x3}, {0x8, 0x4, 0x2}}}, {0x40, 0x1, @lb_port_stats={{{0x24, 0x1, 'lb_port_stats\x00'}, {0x8, 0x3, 0xb}, {0x8, 0x4, 0x8}}, {0x8, 0x6, r4}}}, {0x40, 0x1, @queue_id={{{0x24, 0x1, 'queue_id\x00'}, {0x8, 0x3, 0x3}, {0x8, 0x4, 0x8}}, {0x8, 0x6, r3}}}, {0x3c, 0x1, @user_linkup={{{0x24, 0x1, 'user_linkup\x00'}, {0x8, 0x3, 0x6}, {0x4, 0x4}}, {0x8, 0x6, r4}}}, {0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x8, 0x3, 0x6}, {0x4, 0x4}}, {0x8, 0x6, r3}}}]}}]}, 0x430}, 0x1, 0x0, 0x0, 0x20000880}, 0x1) 03:53:50 executing program 1: r0 = socket(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4e00}, 0xc, &(0x7f0000000900)={&(0x7f0000000040)={0x14, 0x1e, 0x201}, 0x14}, 0x1}, 0x0) 03:53:50 executing program 7: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f000000d000)={0xa, 0x4e20}, 0x1c) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}, 0xb}, 0x1c) syz_emit_ethernet(0x3e, &(0x7f00000001c0)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @random="e829f650db0f", [], {@ipv6={0x86dd, {0x0, 0x6, "50a09c", 0x8, 0xffffff11, 0x0, @remote={0xfe, 0x80, [], 0xbb}, @local={0xfe, 0x80, [], 0xaa}, {[], @udp={0x0, 0x4e20, 0x8}}}}}}, &(0x7f0000000040)) syz_emit_ethernet(0x3e, &(0x7f0000000000)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], {@ipv6={0x86dd, {0x0, 0x6, "50a09c", 0x8, 0xffffff11, 0x0, @remote={0xfe, 0x80, [], 0xbb}, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2800], 0xaa}, {[], @udp={0x300, 0x4e20, 0x8}}}}}}, &(0x7f0000000040)) [ 1469.109352] hfsplus: unable to parse mount options 03:53:51 executing program 2: r0 = syz_open_dev$sndseq(&(0x7f0000dcc000)='/dev/snd/seq\x00', 0x0, 0x2) read(r0, &(0x7f0000fb6000)=""/28, 0x3f0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000418f50)={{0x80}, "0a4ceaa05d9a00000000000000039b3fd4cec307e8ef3d13eb790ec9c65abaf90d229db692542e5b78f8b29e0a27800f0000000000000009fb42f376589701a4", 0xa9824f69d1376637, 0x10800a}) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000240)={0xbf}) write$binfmt_script(r0, &(0x7f0000000000)=ANY=[], 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f00000002c0)={{}, 'port1\x00'}) r1 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dsp\x00', 0x480040, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r1, 0x84, 0x1d, &(0x7f0000000040)={0x9, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, &(0x7f0000000080)=0x28) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r1, 0x84, 0x18, &(0x7f0000000100)={r2, 0x81}, &(0x7f0000000140)=0x8) openat$sequencer2(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer2\x00', 0x0, 0x0) 03:53:51 executing program 3: ioctl$BLKDISCARD(0xffffffffffffffff, 0x1277, &(0x7f0000000180)) r0 = syz_open_dev$usbmon(&(0x7f0000000080)='/dev/usbmon#\x00', 0xff, 0x4000) ioctl$KVM_PPC_GET_SMMU_INFO(r0, 0x8250aea6, &(0x7f00000001c0)=""/118) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140)='/dev/snapshot\x00', 0x0, 0x0) fcntl$addseals(0xffffffffffffffff, 0x409, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f0000000000), &(0x7f00000000c0)=0x8) ioctl$EVIOCGLED(0xffffffffffffffff, 0x80404519, &(0x7f0000000580)=""/236) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x3c, 0x0) ioctl$EVIOCGKEYCODE_V2(0xffffffffffffffff, 0x80284504, &(0x7f00000003c0)=""/188) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) 03:53:51 executing program 5: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer2\x00', 0x0, 0x0) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000040)="025cc83d6d345f8f762070") ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r0, 0x40085112, &(0x7f0000b18000)={{0xffffff93}, {0xffffffa0}, 0x0, 0x0, 0x0, [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800000000000000]}) 03:53:51 executing program 4: r0 = socket(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0xc3}, 0xc, &(0x7f0000000900)={&(0x7f0000000040)={0x14, 0x1e, 0x201}, 0x14}, 0x1}, 0x0) 03:53:51 executing program 1: r0 = socket(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x7c00000000000000}, 0xc, &(0x7f0000000900)={&(0x7f0000000040)={0x14, 0x1e, 0x201}, 0x14}, 0x1}, 0x0) 03:53:51 executing program 7: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f000000d000)={0xa, 0x4e20}, 0x1c) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}, 0xb}, 0x1c) syz_emit_ethernet(0x3e, &(0x7f00000001c0)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @random="e829f650db0f", [], {@ipv6={0x86dd, {0x0, 0x6, "50a09c", 0x8, 0xffffff11, 0x0, @remote={0xfe, 0x80, [], 0xbb}, @local={0xfe, 0x80, [], 0xaa}, {[], @udp={0x0, 0x4e20, 0x8}}}}}}, &(0x7f0000000040)) syz_emit_ethernet(0x3e, &(0x7f0000000000)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], {@ipv6={0x86dd, {0x0, 0x6, "50a09c", 0x8, 0xffffff11, 0x0, @remote={0xfe, 0x80, [], 0xbb}, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffa888], 0xaa}, {[], @udp={0x300, 0x4e20, 0x8}}}}}}, &(0x7f0000000040)) 03:53:51 executing program 6: r0 = socket(0x11, 0xa, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000640)={0x0, 0x0, 0x0}, &(0x7f0000000680)=0xc) syz_mount_image$hfsplus(&(0x7f0000000240)='hfsplus\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, &(0x7f00000005c0), 0x0, &(0x7f00000006c0)=ANY=[@ANYBLOB='tid=', @ANYRESHEX=r1, @ANYBLOB=',\x00']) 03:53:51 executing program 0: ioctl$BLKDISCARD(0xffffffffffffffff, 0x1277, &(0x7f0000000180)) syz_open_dev$usbmon(&(0x7f0000000080)='/dev/usbmon#\x00', 0xff, 0x4000) r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140)='/dev/snapshot\x00', 0x0, 0x0) fcntl$addseals(0xffffffffffffffff, 0x409, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f0000000000), &(0x7f00000000c0)=0x8) ioctl$EVIOCGLED(0xffffffffffffffff, 0x80404519, &(0x7f0000000580)=""/236) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x3c, 0x0) ioctl$EVIOCGKEYCODE_V2(0xffffffffffffffff, 0x80284504, &(0x7f00000003c0)=""/188) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000100)='IPVS\x00') sendmsg$IPVS_CMD_DEL_DEST(r0, &(0x7f0000000280)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000240)={&(0x7f00000001c0)={0x74, r2, 0x200, 0x70bd2b, 0x25dfdbff, {0x7}, [@IPVS_CMD_ATTR_DEST={0x14, 0x2, [@IPVS_DEST_ATTR_PERSIST_CONNS={0x8, 0x9, 0x10001}, @IPVS_DEST_ATTR_PORT={0x8, 0x2, 0x4e23}]}, @IPVS_CMD_ATTR_SERVICE={0x4c, 0x1, [@IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0x4d}, @IPVS_SVC_ATTR_SCHED_NAME={0x8, 0x6, 'fo\x00'}, @IPVS_SVC_ATTR_FWMARK={0x8, 0x5, 0x4}, @IPVS_SVC_ATTR_FWMARK={0x8, 0x5, 0x4}, @IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0xc}, @IPVS_SVC_ATTR_PE_NAME={0x8, 0xb, 'sip\x00'}, @IPVS_SVC_ATTR_PE_NAME={0x8, 0xb, 'sip\x00'}, @IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8, 0x9a}, @IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8, 0x6}]}]}, 0x74}, 0x1, 0x0, 0x0, 0x1}, 0x20000000) [ 1469.815995] hfsplus: unable to parse mount options 03:53:51 executing program 4: r0 = socket(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x5010000}, 0xc, &(0x7f0000000900)={&(0x7f0000000040)={0x14, 0x1e, 0x201}, 0x14}, 0x1}, 0x0) 03:53:51 executing program 7: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f000000d000)={0xa, 0x4e20}, 0x1c) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}, 0xb}, 0x1c) syz_emit_ethernet(0x3e, &(0x7f00000001c0)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @random="e829f650db0f", [], {@ipv6={0x86dd, {0x0, 0x6, "50a09c", 0x8, 0xffffff11, 0x0, @remote={0xfe, 0x80, [], 0xbb}, @local={0xfe, 0x80, [], 0xaa}, {[], @udp={0x0, 0x4e20, 0x8}}}}}}, &(0x7f0000000040)) syz_emit_ethernet(0x3e, &(0x7f0000000000)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], {@ipv6={0x86dd, {0x0, 0x6, "50a09c", 0x8, 0xffffff11, 0x0, @remote={0xfe, 0x80, [], 0xbb}, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffff5], 0xaa}, {[], @udp={0x300, 0x4e20, 0x8}}}}}}, &(0x7f0000000040)) 03:53:51 executing program 1: r0 = socket(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8400}, 0xc, &(0x7f0000000900)={&(0x7f0000000040)={0x14, 0x1e, 0x201}, 0x14}, 0x1}, 0x0) 03:53:51 executing program 5: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer2\x00', 0x0, 0x0) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000040)="025cc83d6d345f8f762070") ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r0, 0x40085112, &(0x7f0000b18000)={{0xffffff93}, {0xffffffa0}, 0x0, 0x0, 0x0, [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000000000]}) 03:53:51 executing program 1: r0 = socket(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x42}, 0xc, &(0x7f0000000900)={&(0x7f0000000040)={0x14, 0x1e, 0x201}, 0x14}, 0x1}, 0x0) 03:53:51 executing program 3: ioctl$BLKDISCARD(0xffffffffffffffff, 0x1277, &(0x7f0000000180)) r0 = syz_open_dev$usbmon(&(0x7f0000000080)='/dev/usbmon#\x00', 0xff, 0x4000) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140)='/dev/snapshot\x00', 0x0, 0x0) fcntl$addseals(0xffffffffffffffff, 0x409, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f0000000000), &(0x7f00000000c0)=0x8) ioctl$EVIOCGLED(0xffffffffffffffff, 0x80404519, &(0x7f0000000580)=""/236) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x3c, 0x0) ioctl$EVIOCGKEYCODE_V2(0xffffffffffffffff, 0x80284504, &(0x7f00000003c0)=""/188) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) r3 = request_key(&(0x7f0000000100)='.request_key_auth\x00', &(0x7f00000001c0)={0x73, 0x79, 0x7a, 0x2}, &(0x7f0000000200)='/dev/snd/controlC#\x00', 0xfffffffffffffff9) r4 = add_key(&(0x7f0000000240)='.request_key_auth\x00', &(0x7f0000000280)={0x73, 0x79, 0x7a, 0x2}, &(0x7f0000000480)="282b28312351817f433beb0dd89868e057e5274d52122a085c37fbf7adf1b987ccdc5a3d0a2b36b9d8e395fcf123468c2834141f3b7e734dadbca89920397790c43f319900aca9cf83eeda467f7675be039c6a3f4f246e5e0d0bd1c62dbb7de581fa18216af30b18fe482bd5c978280d35cf5155b9989be5245435f57f5b3ff95185335194e23dffc1955f7bb048a3017ca681e022fbcec0ff6766a9baa5258a577bd8c8dc924478c3d6bd35916c4b4fd0078dd8b7a6be2feee4d9cc858e3366e1807ea654602c13aed8e115a5c56dd847e6bb8c95ddf0d83a3e7232dd490951455933f00550f1b22b0c8cf410fb", 0xee, 0xfffffffffffffff8) keyctl$negate(0xd, r3, 0x6703d01f, r4) getsockname$packet(r1, &(0x7f00000022c0)={0x0, 0x0, 0x0}, &(0x7f0000002300)=0x14) connect$can_bcm(r2, &(0x7f0000002340)={0x1d, r5}, 0x10) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x800, 0x4080) ioctl$LOOP_CTL_GET_FREE(r2, 0x4c82) r6 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r6) [ 1470.165883] hfsplus: unable to parse mount options 03:53:51 executing program 6: r0 = socket(0x11, 0xa, 0x9) bind$nfc_llcp(r0, &(0x7f0000000000)={0x27, 0x1, 0x2, 0x7, 0x4, 0x6, "b43e2b9b96ecaa18ad362293acf9dfea3e1eb34a9770dd58bf362d4596c0a1e9643262873b12b0280914f9a855a028f508f6a03a30f03ff4830a6c7882da9d", 0x3f}, 0x60) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000640)={0x0, 0x0, 0x0}, &(0x7f0000000680)=0xc) syz_mount_image$hfsplus(&(0x7f0000000240)='hfsplus\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, &(0x7f00000005c0), 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB='gid=', @ANYRESHEX=r1, @ANYBLOB="2cb78c60d3c12ecf846991f371deb40012f576bf0957630f6365db8b09af3e6a4b46a27388b335fc055187bcad8cb919d52102ef0c25044c6f4c165676e3594f24f4eade7b316dab7d69c950b95451"]) 03:53:51 executing program 1: r0 = socket(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0xee}, 0xc, &(0x7f0000000900)={&(0x7f0000000040)={0x14, 0x1e, 0x201}, 0x14}, 0x1}, 0x0) [ 1470.482951] hfsplus: gid requires an argument [ 1470.487696] hfsplus: unable to parse mount options [ 1470.510653] hfsplus: gid requires an argument [ 1470.515406] hfsplus: unable to parse mount options 03:53:52 executing program 2: r0 = syz_open_dev$sndseq(&(0x7f0000dcc000)='/dev/snd/seq\x00', 0x0, 0x2) read(r0, &(0x7f0000fb6000)=""/28, 0x3f0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000418f50)={{0x80}, "0a4ceaa05d9a00000000000000039b3fd4cec307e8ef3d13eb790ec9c65abaf90d229db692542e5b78f8b29e0a27800f0000000000000009fb42f376589701a4", 0xa9824f69d1376637, 0x10800a}) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000240)={0xbf}) write$binfmt_script(r0, &(0x7f0000000000)=ANY=[], 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f00000002c0)={{}, 'port0\x00'}) openat$sequencer2(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer2\x00', 0x0, 0x0) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000000)) 03:53:52 executing program 5: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer2\x00', 0x0, 0x0) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000040)="025cc83d6d345f8f762070") ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r0, 0x40085112, &(0x7f0000b18000)={{0xffffff93}, {0xffffffa0}, 0x0, 0x0, 0x0, [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f000000]}) 03:53:52 executing program 4: r0 = socket(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0xb6010000}, 0xc, &(0x7f0000000900)={&(0x7f0000000040)={0x14, 0x1e, 0x201}, 0x14}, 0x1}, 0x0) 03:53:52 executing program 7: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f000000d000)={0xa, 0x4e20}, 0x1c) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}, 0xb}, 0x1c) syz_emit_ethernet(0x3e, &(0x7f00000001c0)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @random="e829f650db0f", [], {@ipv6={0x86dd, {0x0, 0x6, "50a09c", 0x8, 0xffffff11, 0x0, @remote={0xfe, 0x80, [], 0xbb}, @local={0xfe, 0x80, [], 0xaa}, {[], @udp={0x0, 0x4e20, 0x8}}}}}}, &(0x7f0000000040)) syz_emit_ethernet(0x3e, &(0x7f0000000000)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], {@ipv6={0x86dd, {0x0, 0x6, "50a09c", 0x8, 0xffffff11, 0x0, @remote={0xfe, 0x80, [], 0xbb}, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2], 0xaa}, {[], @udp={0x300, 0x4e20, 0x8}}}}}}, &(0x7f0000000040)) 03:53:52 executing program 1: r0 = socket(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x2300000000000000}, 0xc, &(0x7f0000000900)={&(0x7f0000000040)={0x14, 0x1e, 0x201}, 0x14}, 0x1}, 0x0) 03:53:52 executing program 0: ioctl$BLKDISCARD(0xffffffffffffffff, 0x1277, &(0x7f0000000180)) syz_open_dev$usbmon(&(0x7f0000000080)='/dev/usbmon#\x00', 0xff, 0x4000) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140)='/dev/snapshot\x00', 0x0, 0x0) fcntl$addseals(0xffffffffffffffff, 0x409, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f0000000000), &(0x7f00000000c0)=0x8) ioctl$EVIOCGLED(0xffffffffffffffff, 0x80404519, &(0x7f0000000580)=""/236) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x3c, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) 03:53:52 executing program 3: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000100)='/dev/full\x00', 0x2000, 0x0) ioctl$BLKDISCARD(r0, 0x1277, &(0x7f0000000040)) syz_open_dev$usbmon(&(0x7f0000000080)='/dev/usbmon#\x00', 0xff, 0x4000) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140)='/dev/snapshot\x00', 0x0, 0x0) fcntl$addseals(0xffffffffffffffff, 0x409, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f0000000000), &(0x7f00000000c0)=0x8) ioctl$EVIOCGLED(0xffffffffffffffff, 0x80404519, &(0x7f0000000580)=""/236) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x3c, 0x0) ioctl$EVIOCGKEYCODE_V2(0xffffffffffffffff, 0x80284504, &(0x7f00000003c0)=""/188) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) r2 = semget(0x1, 0x2, 0x4) semctl$IPC_INFO(r2, 0x1, 0x3, &(0x7f00000001c0)=""/151) 03:53:52 executing program 6: readlink(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)=""/61, 0x3d) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000640)={0x0, 0x0, 0x0}, &(0x7f0000000680)=0xc) syz_mount_image$hfsplus(&(0x7f0000000240)='hfsplus\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, &(0x7f00000005c0), 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB="6869337190aaf711c1e2643d", @ANYRESHEX=r0, @ANYBLOB=',\x00']) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000000c0)={'syzkaller1\x00', {0x2, 0x4e21, @remote={0xac, 0x14, 0x14, 0xbb}}}) r1 = syz_open_dev$evdev(&(0x7f0000000100)='/dev/input/event#\x00', 0x726a165b, 0x4) ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) mount(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='cgroup\x00', 0xc0000, 0x0) 03:53:52 executing program 7: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f000000d000)={0xa, 0x4e20}, 0x1c) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}, 0xb}, 0x1c) syz_emit_ethernet(0x3e, &(0x7f00000001c0)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @random="e829f650db0f", [], {@ipv6={0x86dd, {0x0, 0x6, "50a09c", 0x8, 0xffffff11, 0x0, @remote={0xfe, 0x80, [], 0xbb}, @local={0xfe, 0x80, [], 0xaa}, {[], @udp={0x0, 0x4e20, 0x8}}}}}}, &(0x7f0000000040)) syz_emit_ethernet(0x3e, &(0x7f0000000000)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], {@ipv6={0x86dd, {0x0, 0x6, "50a09c", 0x8, 0xffffff11, 0x0, @remote={0xfe, 0x80, [], 0xbb}, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6], 0xaa}, {[], @udp={0x300, 0x4e20, 0x8}}}}}}, &(0x7f0000000040)) 03:53:52 executing program 4: r0 = socket(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0xf0ffff}, 0xc, &(0x7f0000000900)={&(0x7f0000000040)={0x14, 0x1e, 0x201}, 0x14}, 0x1}, 0x0) 03:53:52 executing program 1: r0 = socket(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0xbb01000000000000}, 0xc, &(0x7f0000000900)={&(0x7f0000000040)={0x14, 0x1e, 0x201}, 0x14}, 0x1}, 0x0) 03:53:52 executing program 5: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer2\x00', 0x0, 0x0) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000040)="025cc83d6d345f8f762070") ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r0, 0x40085112, &(0x7f0000b18000)={{0xffffff93}, {0xffffffa0}, 0x0, 0x0, 0x0, [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000]}) 03:53:52 executing program 1: r0 = socket(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0xc8000000}, 0xc, &(0x7f0000000900)={&(0x7f0000000040)={0x14, 0x1e, 0x201}, 0x14}, 0x1}, 0x0) 03:53:52 executing program 1: r0 = socket(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x901}, 0xc, &(0x7f0000000900)={&(0x7f0000000040)={0x14, 0x1e, 0x201}, 0x14}, 0x1}, 0x0) [ 1471.383045] hfsplus: unable to parse mount options 03:53:53 executing program 0: ioctl$BLKDISCARD(0xffffffffffffffff, 0x1277, &(0x7f0000000180)) syz_open_dev$usbmon(&(0x7f0000000080)='/dev/usbmon#\x00', 0xff, 0x4000) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140)='/dev/snapshot\x00', 0x0, 0x0) fcntl$addseals(0xffffffffffffffff, 0x409, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f0000000000), &(0x7f00000000c0)=0x8) ioctl$EVIOCGLED(0xffffffffffffffff, 0x80404519, &(0x7f0000000580)=""/236) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x3c, 0x0) ioctl$EVIOCGKEYCODE_V2(0xffffffffffffffff, 0x80284504, &(0x7f00000003c0)=""/188) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) mount$9p_tcp(&(0x7f0000000040)='127.0.0.1\x00', &(0x7f0000000100)='./file0\x00', &(0x7f00000001c0)='9p\x00', 0x100801, &(0x7f0000000200)={'trans=tcp,', {'port', 0x3d, 0x4e23}, 0x2c, {[{@loose='loose', 0x2c}]}}) 03:53:53 executing program 1: r0 = socket(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x104}, 0xc, &(0x7f0000000900)={&(0x7f0000000040)={0x14, 0x1e, 0x201}, 0x14}, 0x1}, 0x0) [ 1471.621425] hfsplus: unable to parse mount options 03:53:53 executing program 2: r0 = syz_open_dev$sndseq(&(0x7f0000dcc000)='/dev/snd/seq\x00', 0x0, 0x2) read(r0, &(0x7f0000fb6000)=""/28, 0x3f0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000418f50)={{0x80}, "0a4ceaa05d9a00000000000000039b3fd4cec307e8ef3d13eb790ec9c65abaf90d229db692542e5b78f8b29e0a27800f0000000000000009fb42f376589701a4", 0xa9824f69d1376637, 0x10800a}) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000240)={0xbf}) write$binfmt_script(r0, &(0x7f0000000000)=ANY=[], 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f00000002c0)={{}, 'port0\x00'}) openat$sequencer2(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer2\x00', 0x8a200, 0x0) 03:53:53 executing program 7: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f000000d000)={0xa, 0x4e20}, 0x1c) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}, 0xb}, 0x1c) syz_emit_ethernet(0x3e, &(0x7f00000001c0)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @random="e829f650db0f", [], {@ipv6={0x86dd, {0x0, 0x6, "50a09c", 0x8, 0xffffff11, 0x0, @remote={0xfe, 0x80, [], 0xbb}, @local={0xfe, 0x80, [], 0xaa}, {[], @udp={0x0, 0x4e20, 0x8}}}}}}, &(0x7f0000000040)) syz_emit_ethernet(0x3e, &(0x7f0000000000)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], {@ipv6={0x86dd, {0x0, 0x6, "50a09c", 0x8, 0xffffff11, 0x0, @remote={0xfe, 0x80, [], 0xbb}, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4788], 0xaa}, {[], @udp={0x300, 0x4e20, 0x8}}}}}}, &(0x7f0000000040)) 03:53:53 executing program 5: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer2\x00', 0x0, 0x0) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000040)="025cc83d6d345f8f762070") ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r0, 0x40085112, &(0x7f0000b18000)={{0xffffff93}, {0xffffffa0}, 0x0, 0x0, 0x0, [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f00]}) 03:53:53 executing program 4: r0 = socket(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x117}, 0xc, &(0x7f0000000900)={&(0x7f0000000040)={0x14, 0x1e, 0x201}, 0x14}, 0x1}, 0x0) 03:53:53 executing program 1: r0 = socket(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x14d}, 0xc, &(0x7f0000000900)={&(0x7f0000000040)={0x14, 0x1e, 0x201}, 0x14}, 0x1}, 0x0) 03:53:53 executing program 6: r0 = socket(0x11, 0xa, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000000)={0x0, 0x0, 0x0}, &(0x7f0000000680)=0xc) syz_mount_image$hfsplus(&(0x7f0000000240)='hfsplus\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, &(0x7f00000005c0), 0x0, &(0x7f00000006c0)={[{@gid={'gid', 0x3d, r1}, 0x2c}]}) 03:53:53 executing program 0: ioctl$BLKDISCARD(0xffffffffffffffff, 0x1277, &(0x7f0000000180)) r0 = syz_open_dev$usbmon(&(0x7f0000000080)='/dev/usbmon#\x00', 0xff, 0x4000) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140)='/dev/snapshot\x00', 0x0, 0x0) fcntl$addseals(0xffffffffffffffff, 0x409, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f0000000000), &(0x7f00000000c0)=0x8) ioctl$EVIOCGLED(0xffffffffffffffff, 0x80404519, &(0x7f0000000580)=""/236) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x3c, 0x0) ioctl$EVIOCGKEYCODE_V2(0xffffffffffffffff, 0x80284504, &(0x7f00000003c0)=""/188) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f00000001c0)={{{@in=@broadcast}}, {{@in6=@remote}, 0x0, @in6=@local}}, &(0x7f0000000040)=0xe8) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) 03:53:53 executing program 3: ioctl$BLKDISCARD(0xffffffffffffffff, 0x1277, &(0x7f0000000180)) syz_open_dev$usbmon(&(0x7f0000000080)='/dev/usbmon#\x00', 0xff, 0x4000) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140)='/dev/snapshot\x00', 0x0, 0x0) fcntl$addseals(0xffffffffffffffff, 0x409, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f0000000000), &(0x7f00000000c0)=0x8) ioctl$EVIOCGLED(0xffffffffffffffff, 0x80404519, &(0x7f0000000580)=""/236) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x3c, 0x0) ioctl$EVIOCGKEYCODE_V2(0xffffffffffffffff, 0x80284504, &(0x7f00000003c0)=""/188) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x2, 0x0) 03:53:54 executing program 4: r0 = socket(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000900)={&(0x7f0000000040)={0x14, 0x1e, 0x201}, 0x14}, 0x1}, 0x0) 03:53:54 executing program 7: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f000000d000)={0xa, 0x4e20}, 0x1c) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}, 0xb}, 0x1c) syz_emit_ethernet(0x3e, &(0x7f00000001c0)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @random="e829f650db0f", [], {@ipv6={0x86dd, {0x0, 0x6, "50a09c", 0x8, 0xffffff11, 0x0, @remote={0xfe, 0x80, [], 0xbb}, @local={0xfe, 0x80, [], 0xaa}, {[], @udp={0x0, 0x4e20, 0x8}}}}}}, &(0x7f0000000040)) syz_emit_ethernet(0x3e, &(0x7f0000000000)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], {@ipv6={0x86dd, {0x0, 0x6, "50a09c", 0x8, 0xffffff11, 0x0, @remote={0xfe, 0x80, [], 0xbb}, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5000000], 0xaa}, {[], @udp={0x300, 0x4e20, 0x8}}}}}}, &(0x7f0000000040)) 03:53:54 executing program 1: r0 = socket(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0xda00000000000000}, 0xc, &(0x7f0000000900)={&(0x7f0000000040)={0x14, 0x1e, 0x201}, 0x14}, 0x1}, 0x0) 03:53:54 executing program 5: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer2\x00', 0x0, 0x0) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000040)="025cc83d6d345f8f762070") ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r0, 0x40085112, &(0x7f0000b18000)={{0xffffff93}, {0xffffffa0}, 0x0, 0x0, 0x0, [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffdfd]}) [ 1472.625948] hfsplus: gid requires an argument [ 1472.630738] hfsplus: unable to parse mount options 03:53:54 executing program 1: r0 = socket(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0xd200000000000000}, 0xc, &(0x7f0000000900)={&(0x7f0000000040)={0x14, 0x1e, 0x201}, 0x14}, 0x1}, 0x0) 03:53:54 executing program 0: ioctl$BLKDISCARD(0xffffffffffffffff, 0x1277, &(0x7f0000000180)) syz_open_dev$usbmon(&(0x7f0000000080)='/dev/usbmon#\x00', 0xff, 0x4000) r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140)='/dev/snapshot\x00', 0x0, 0x0) fcntl$addseals(0xffffffffffffffff, 0x409, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f0000000000), &(0x7f00000000c0)=0x8) ioctl$EVIOCGLED(0xffffffffffffffff, 0x80404519, &(0x7f0000000580)=""/236) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0xbc, 0x0) ioctl$EVIOCGKEYCODE_V2(r0, 0x80284504, &(0x7f00000003c0)=""/188) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) 03:53:54 executing program 3 (fault-call:8 fault-nth:0): ioctl$BLKDISCARD(0xffffffffffffffff, 0x1277, &(0x7f0000000180)) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140)='/dev/snapshot\x00', 0x0, 0x0) fcntl$addseals(0xffffffffffffffff, 0x409, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f0000000000), &(0x7f00000000c0)=0x8) ioctl$EVIOCGLED(0xffffffffffffffff, 0x80404519, &(0x7f0000000580)=""/236) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x3c, 0x0) ioctl$EVIOCGKEYCODE_V2(0xffffffffffffffff, 0x80284504, &(0x7f00000003c0)=""/188) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c82, 0x0) [ 1472.859166] hfsplus: gid requires an argument [ 1472.863907] hfsplus: unable to parse mount options 03:53:54 executing program 6: r0 = socket(0x11, 0xa, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000640)={0x0, 0x0, 0x0}, &(0x7f0000000680)=0xc) syz_mount_image$hfsplus(&(0x7f0000000240)='hfsplus\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, &(0x7f00000005c0), 0x0, &(0x7f00000006c0)={[{@gid={'gid', 0x3d, r1}, 0x2c}]}) socket$nl_generic(0x10, 0x3, 0x10) lremovexattr(&(0x7f0000000280)='./file0\x00', &(0x7f0000000440)=@known='security.ima\x00') syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='\x00', 0x0, 0x3, &(0x7f00000001c0)=[{&(0x7f0000000080)="1d0bfd612cd2f50794575d0f5215208a11cc0bf2b593c528db905ecad85eb37b0ebd223282c9411a1a1bab23bdb5d1ab572a5805b86f6a6867e0d1a98719835c0e79fcd61b0f46fdfe4027d47e7ce1b876a4fbb380007f4794dd226feba4f8a1e7f3efa85be7970026641b0227bfa2cdbf06f35ada3590307b5cc4542852f476a746ba7e32a1a2322a0d81f7ed3420ea967a053c7ddf37b91889f79ee2f040f4a8e6e51427bedd2bd06b790b08d28d88eb11e6e53ee60f1b34e408f3a66df34173c66d1cdc6127a818019cf164d69fa7929f095fee5e588c493d630450a4023fbbbf0acabd9b0c3bc03307d10b", 0xed, 0x4}, {&(0x7f0000000180)="852bc187329745489476df7c282786051f1baeffaccef24ff2bf", 0x1a, 0x392}, {&(0x7f0000000300)="04588ed06a0e385b2a1a33666d34e7bd8a66620c809dbf5b691ff39198c02d9ea3c2012d4b22fddead79cb0c24b9faddfea3c14ed9eb8e162f7f6f7f17248ea76f1abf2d0fab3d106f52972b689c18f01375be54e779d2fa075e7c72fc9fe78533dea29aeccf3723c4f3557b560e508a583216796f1df3bb1e3f2334ffd35453a3913f4f12cd66394a776079d4546119c9", 0x91, 0x9}], 0x20008, &(0x7f00000003c0)={[{@quiet='quiet', 0x2c}, {@part={'part', 0x3d, 0x400}, 0x2c}, {@part={'part', 0x3d, 0xffff}, 0x2c}, {@iocharset={'iocharset', 0x3d, 'cp950'}, 0x2c}, {@part={'part', 0x3d, 0x1}, 0x2c}, {@gid={'gid', 0x3d, r1}, 0x2c}]}) [ 1473.500578] hfsplus: gid requires an argument [ 1473.505286] hfsplus: unable to parse mount options [ 1473.596572] hfsplus: gid requires an argument [ 1473.601215] hfsplus: unable to parse mount options 03:53:55 executing program 2: r0 = syz_open_dev$sndseq(&(0x7f0000dcc000)='/dev/snd/seq\x00', 0x0, 0x2) read(r0, &(0x7f0000fb6000)=""/28, 0x3f0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000418f50)={{0x80}, "0a4ceaa05d9a00000000000000039b3fd4cec307e8ef3d13eb790ec9c65abaf90d229db692542e5b78f8b29e0a27800f0000000000000009fb42f376589701a4", 0xa9824f69d1376637, 0x10800a}) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000240)={0xbf}) write$binfmt_script(r0, &(0x7f0000000000)=ANY=[], 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f00000002c0)={{}, 'port0\x00'}) ioctl$SNDRV_TIMER_IOCTL_GPARAMS(r0, 0x40485404, &(0x7f0000000000)={{0x3, 0x3, 0x3ff, 0x3, 0x1}, 0x401, 0x4}) openat$sequencer2(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer2\x00', 0x0, 0x0) 03:53:55 executing program 5: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer2\x00', 0x0, 0x0) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000040)="025cc83d6d345f8f762070") ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r0, 0x40085112, &(0x7f0000b18000)={{0xffffff93}, {0xffffffa0}, 0x0, 0x0, 0x0, [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400000000000000]}) 03:53:55 executing program 4: r0 = socket(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x2000000000000000}, 0xc, &(0x7f0000000900)={&(0x7f0000000040)={0x14, 0x1e, 0x201}, 0x14}, 0x1}, 0x0) 03:53:55 executing program 7: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f000000d000)={0xa, 0x4e20}, 0x1c) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}, 0xb}, 0x1c) syz_emit_ethernet(0x3e, &(0x7f00000001c0)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @random="e829f650db0f", [], {@ipv6={0x86dd, {0x0, 0x6, "50a09c", 0x8, 0xffffff11, 0x0, @remote={0xfe, 0x80, [], 0xbb}, @local={0xfe, 0x80, [], 0xaa}, {[], @udp={0x0, 0x4e20, 0x8}}}}}}, &(0x7f0000000040)) syz_emit_ethernet(0x3e, &(0x7f0000000000)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], {@ipv6={0x86dd, {0x0, 0x6, "50a09c", 0x8, 0xffffff11, 0x0, @remote={0xfe, 0x80, [], 0xbb}, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4305000000000000], 0xaa}, {[], @udp={0x300, 0x4e20, 0x8}}}}}}, &(0x7f0000000040)) 03:53:55 executing program 1: r0 = socket(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0xb8010000}, 0xc, &(0x7f0000000900)={&(0x7f0000000040)={0x14, 0x1e, 0x201}, 0x14}, 0x1}, 0x0) 03:53:55 executing program 3: ioctl$BLKDISCARD(0xffffffffffffffff, 0x1277, &(0x7f0000000180)) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140)='/dev/snapshot\x00', 0x0, 0x0) fcntl$addseals(0xffffffffffffffff, 0x409, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f0000000000), &(0x7f00000000c0)=0x8) ioctl$EVIOCGLED(0xffffffffffffffff, 0x80404519, &(0x7f0000000580)=""/236) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x3c, 0x0) ioctl$EVIOCGKEYCODE_V2(0xffffffffffffffff, 0x80284504, &(0x7f00000003c0)=""/188) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c82, 0x0) 03:53:55 executing program 0: ioctl$BLKDISCARD(0xffffffffffffffff, 0x1277, &(0x7f0000000180)) r0 = syz_open_dev$usbmon(&(0x7f0000000080)='/dev/usbmon#\x00', 0xff, 0x4000) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140)='/dev/snapshot\x00', 0x0, 0x0) fcntl$addseals(0xffffffffffffffff, 0x409, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) connect$bt_rfcomm(r0, &(0x7f0000000040)={0x1f, {0x8, 0x3f, 0x0, 0x3ff, 0x5, 0x5}, 0x3}, 0xa) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f0000000000), &(0x7f00000000c0)=0x8) ioctl$EVIOCGLED(0xffffffffffffffff, 0x80404519, &(0x7f0000000580)=""/236) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x3c, 0x0) ioctl$EVIOCGKEYCODE_V2(0xffffffffffffffff, 0x80284504, &(0x7f00000003c0)=""/188) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r2}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) read$FUSE(r2, &(0x7f0000001000), 0x1000) stat(&(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000240)) stat(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)) write$FUSE_INIT(r2, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) read$FUSE(r2, &(0x7f0000001000), 0x1000) write$FUSE_ENTRY(r2, &(0x7f0000002000)={0x90, 0xfffffffffffffff9, 0x2}, 0x90) read$FUSE(r2, &(0x7f0000001000), 0x1000) write$FUSE_ENTRY(r2, &(0x7f0000003000)={0x90, 0x0, 0x3, {0x2, 0x0, 0x0, 0x1f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000}}}, 0x90) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) 03:53:55 executing program 6: r0 = socket(0x11, 0xa, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000640)={0x0, 0x0, 0x0}, &(0x7f0000000680)=0x3) getsockname$llc(r0, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local}, &(0x7f0000000040)=0x10) syz_mount_image$hfsplus(&(0x7f0000000240)='hfsplus\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, &(0x7f00000005c0), 0x0, &(0x7f00000006c0)={[{@gid={'gid', 0x3d, r1}, 0x2c}]}) 03:53:55 executing program 1: r0 = socket(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8501000000000000}, 0xc, &(0x7f0000000900)={&(0x7f0000000040)={0x14, 0x1e, 0x201}, 0x14}, 0x1}, 0x0) 03:53:55 executing program 5: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer2\x00', 0x0, 0x0) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000040)="025cc83d6d345f8f762070") ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r0, 0x40085112, &(0x7f0000b18000)={{0xffffff93}, {0xffffffa0}, 0x0, 0x0, 0x0, [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfdffffff]}) [ 1474.042662] hfsplus: unable to find HFS+ superblock 03:53:55 executing program 4: r0 = socket(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x401000000000000}, 0xc, &(0x7f0000000900)={&(0x7f0000000040)={0x14, 0x1e, 0x201}, 0x14}, 0x1}, 0x0) 03:53:55 executing program 7: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f000000d000)={0xa, 0x4e20}, 0x1c) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}, 0xb}, 0x1c) syz_emit_ethernet(0x3e, &(0x7f00000001c0)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @random="e829f650db0f", [], {@ipv6={0x86dd, {0x0, 0x6, "50a09c", 0x8, 0xffffff11, 0x0, @remote={0xfe, 0x80, [], 0xbb}, @local={0xfe, 0x80, [], 0xaa}, {[], @udp={0x0, 0x4e20, 0x8}}}}}}, &(0x7f0000000040)) syz_emit_ethernet(0x3e, &(0x7f0000000000)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], {@ipv6={0x86dd, {0x0, 0x6, "50a09c", 0x8, 0xffffff11, 0x0, @remote={0xfe, 0x80, [], 0xbb}, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3000000000000000], 0xaa}, {[], @udp={0x300, 0x4e20, 0x8}}}}}}, &(0x7f0000000040)) 03:53:55 executing program 3: ioctl$BLKDISCARD(0xffffffffffffffff, 0x1277, &(0x7f0000000180)) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140)='/dev/snapshot\x00', 0x0, 0x0) fcntl$addseals(0xffffffffffffffff, 0x409, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f0000000000), &(0x7f00000000c0)=0x8) ioctl$EVIOCGLED(0xffffffffffffffff, 0x80404519, &(0x7f0000000580)=""/236) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x3c, 0x0) ioctl$EVIOCGKEYCODE_V2(0xffffffffffffffff, 0x80284504, &(0x7f00000003c0)=""/188) ioctl$LOOP_CTL_REMOVE(r0, 0x5421, 0x0) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c82, 0x0) [ 1474.118501] hfsplus: unable to find HFS+ superblock 03:53:55 executing program 6: r0 = socket(0x11, 0xa, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000640)={0x0, 0x0, 0x0}, &(0x7f0000000680)=0xc) syz_mount_image$hfsplus(&(0x7f0000000240)='hfsplus\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, &(0x7f00000005c0), 0x0, &(0x7f00000006c0)=ANY=[@ANYBLOB='gid=', @ANYRESHEX=r1, @ANYBLOB="a358"]) ioctl$sock_SIOCOUTQNSD(r0, 0x894b, &(0x7f0000000000)) 03:53:55 executing program 1: r0 = socket(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x2000000000000000}, 0xc, &(0x7f0000000900)={&(0x7f0000000040)={0x14, 0x1e, 0x201}, 0x14}, 0x1}, 0x0) 03:53:55 executing program 3: ioctl$BLKDISCARD(0xffffffffffffffff, 0x1277, &(0x7f0000000180)) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140)='/dev/snapshot\x00', 0x0, 0x0) fcntl$addseals(0xffffffffffffffff, 0x409, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f0000000000), &(0x7f00000000c0)=0x8) ioctl$EVIOCGLED(0xffffffffffffffff, 0x80404519, &(0x7f0000000580)=""/236) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x3c, 0x0) ioctl$EVIOCGKEYCODE_V2(0xffffffffffffffff, 0x80284504, &(0x7f00000003c0)=""/188) ioctl$LOOP_CTL_REMOVE(r0, 0x4020940d, 0x0) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c82, 0x0) [ 1474.449543] hfsplus: unable to parse mount options [ 1474.465403] hfsplus: unable to parse mount options 03:53:56 executing program 2: r0 = syz_open_dev$sndseq(&(0x7f0000dcc000)='/dev/snd/seq\x00', 0x0, 0x2) read(r0, &(0x7f0000fb6000)=""/28, 0x3f0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000418f50)={{0x80}, "0a4ceaa05d9a00000000000000039b3fd4cec307e8ef3d13eb790ec9c65abaf90d229db692542e5b78f8b29e0a27800f0000000000000009fb42f376589701a4", 0xa9824f69d1376637, 0x10800a}) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000240)={0xbf}) write$binfmt_script(r0, &(0x7f0000000000)=ANY=[], 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f00000002c0)={{}, 'port0\x00'}) socketpair$inet(0x2, 0x7, 0x6, &(0x7f0000000000)) openat$sequencer2(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer2\x00', 0x0, 0x0) 03:53:56 executing program 4: r0 = socket(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1100}, 0xc, &(0x7f0000000900)={&(0x7f0000000040)={0x14, 0x1e, 0x201}, 0x14}, 0x1}, 0x0) 03:53:56 executing program 5: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer2\x00', 0x0, 0x0) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000040)="025cc83d6d345f8f762070") ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r0, 0x40085112, &(0x7f0000b18000)={{0xffffff93}, {0xffffffa0}, 0x0, 0x0, 0x0, [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x500]}) 03:53:56 executing program 7: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f000000d000)={0xa, 0x4e20}, 0x1c) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}, 0xb}, 0x1c) syz_emit_ethernet(0x3e, &(0x7f00000001c0)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @random="e829f650db0f", [], {@ipv6={0x86dd, {0x0, 0x6, "50a09c", 0x8, 0xffffff11, 0x0, @remote={0xfe, 0x80, [], 0xbb}, @local={0xfe, 0x80, [], 0xaa}, {[], @udp={0x0, 0x4e20, 0x8}}}}}}, &(0x7f0000000040)) syz_emit_ethernet(0x3e, &(0x7f0000000000)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], {@ipv6={0x86dd, {0x0, 0x6, "50a09c", 0x8, 0xffffff11, 0x0, @remote={0xfe, 0x80, [], 0xbb}, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd00], 0xaa}, {[], @udp={0x300, 0x4e20, 0x8}}}}}}, &(0x7f0000000040)) 03:53:56 executing program 6: r0 = socket(0x11, 0xa, 0x0) r1 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x8, 0x101000) ioctl$EVIOCSKEYCODE_V2(r1, 0x40284504, &(0x7f0000000040)={0x1, 0x1e, 0x7ff, 0x4, "1fbfd88676161c9fa47f6828a04efa4ebdaa8509cf1c1eae810e7ebbf2c012e8"}) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000640)={0x0, 0x0, 0x0}, &(0x7f0000000680)=0xc) syz_mount_image$hfsplus(&(0x7f0000000240)='hfsplus\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, &(0x7f00000005c0), 0x0, &(0x7f00000006c0)=ANY=[@ANYBLOB="1b48f064", @ANYRESHEX=r2, @ANYBLOB=',\x00']) fchmod(r0, 0x100) ioctl$EVIOCGABS3F(r1, 0x8018457f, &(0x7f0000000080)=""/236) 03:53:56 executing program 3: ioctl$BLKDISCARD(0xffffffffffffffff, 0x1277, &(0x7f0000000180)) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140)='/dev/snapshot\x00', 0x0, 0x0) fcntl$addseals(0xffffffffffffffff, 0x409, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f0000000000), &(0x7f00000000c0)=0x8) ioctl$EVIOCGLED(0xffffffffffffffff, 0x80404519, &(0x7f0000000580)=""/236) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x3c, 0x0) ioctl$EVIOCGKEYCODE_V2(0xffffffffffffffff, 0x80284504, &(0x7f00000003c0)=""/188) ioctl$LOOP_CTL_REMOVE(r0, 0xc020660b, 0x0) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c82, 0x0) 03:53:56 executing program 0: ioctl$BLKDISCARD(0xffffffffffffffff, 0x1277, &(0x7f0000000180)) r0 = syz_open_dev$usbmon(&(0x7f0000000080)='/dev/usbmon#\x00', 0xff, 0x4000) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000100)='/dev/snapshot\x00', 0x0, 0x0) fcntl$addseals(0xffffffffffffffff, 0x409, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f0000000000), &(0x7f00000000c0)=0x8) ioctl$EVIOCGLED(0xffffffffffffffff, 0x80404519, &(0x7f0000000580)=""/236) ioctl$SNDRV_TIMER_IOCTL_SELECT(r0, 0x40345410, &(0x7f0000000140)={{0xffffffffffffffff, 0x2, 0x0, 0x3, 0x20}}) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x3c, 0x0) ioctl$EVIOCGKEYCODE_V2(0xffffffffffffffff, 0x80284504, &(0x7f00000003c0)=""/188) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x0) ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f0000000040)=0x0) fcntl$setown(r2, 0x8, r4) 03:53:56 executing program 1: r0 = socket(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0xeb}, 0xc, &(0x7f0000000900)={&(0x7f0000000040)={0x14, 0x1e, 0x201}, 0x14}, 0x1}, 0x0) 03:53:56 executing program 4: r0 = socket(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0xed}, 0xc, &(0x7f0000000900)={&(0x7f0000000040)={0x14, 0x1e, 0x201}, 0x14}, 0x1}, 0x0) 03:53:56 executing program 7: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f000000d000)={0xa, 0x4e20}, 0x1c) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}, 0xb}, 0x1c) syz_emit_ethernet(0x3e, &(0x7f00000001c0)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @random="e829f650db0f", [], {@ipv6={0x86dd, {0x0, 0x6, "50a09c", 0x8, 0xffffff11, 0x0, @remote={0xfe, 0x80, [], 0xbb}, @local={0xfe, 0x80, [], 0xaa}, {[], @udp={0x0, 0x4e20, 0x8}}}}}}, &(0x7f0000000040)) syz_emit_ethernet(0x3e, &(0x7f0000000000)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], {@ipv6={0x86dd, {0x0, 0x6, "50a09c", 0x8, 0xffffff11, 0x0, @remote={0xfe, 0x80, [], 0xbb}, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8847], 0xaa}, {[], @udp={0x300, 0x4e20, 0x8}}}}}}, &(0x7f0000000040)) [ 1475.270148] hfsplus: unable to parse mount options 03:53:56 executing program 5: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer2\x00', 0x0, 0x0) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000040)="025cc83d6d345f8f762070") ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r0, 0x40085112, &(0x7f0000b18000)={{0xffffff93}, {0xffffffa0}, 0x0, 0x0, 0x0, [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x500000000000000]}) 03:53:56 executing program 3: ioctl$BLKDISCARD(0xffffffffffffffff, 0x1277, &(0x7f0000000180)) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140)='/dev/snapshot\x00', 0x0, 0x0) fcntl$addseals(0xffffffffffffffff, 0x409, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f0000000000), &(0x7f00000000c0)=0x8) ioctl$EVIOCGLED(0xffffffffffffffff, 0x80404519, &(0x7f0000000580)=""/236) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x3c, 0x0) ioctl$EVIOCGKEYCODE_V2(0xffffffffffffffff, 0x80284504, &(0x7f00000003c0)=""/188) ioctl$LOOP_CTL_REMOVE(r0, 0x4c80, 0x0) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c82, 0x0) [ 1475.326948] hfsplus: unable to parse mount options 03:53:56 executing program 1: r0 = socket(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x6e}, 0xc, &(0x7f0000000900)={&(0x7f0000000040)={0x14, 0x1e, 0x201}, 0x14}, 0x1}, 0x0) 03:53:56 executing program 6: r0 = socket(0x11, 0xa, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000640)={0x0, 0x0, 0x0}, &(0x7f0000000680)=0xc) getxattr(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)=@known='security.evm\x00', &(0x7f0000000080)=""/97, 0x61) syz_mount_image$hfsplus(&(0x7f0000000240)='hfsplus\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, &(0x7f00000005c0), 0x0, &(0x7f00000006c0)={[{@gid={'gid', 0x3d, r1}, 0x2c}]}) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0xcc, &(0x7f00000001c0)={{0xa, 0x4e23, 0x3, @remote={0xfe, 0x80, [], 0xbb}, 0x2205}, {0xa, 0x4e21, 0x8, @loopback={0x0, 0x1}, 0x4}, 0x3, [0xd75, 0x5, 0x80000000, 0x7fffffff, 0x80000001, 0xd51, 0xfffffffffffffff7, 0x1]}, 0x5c) ioctl$sock_SIOCSIFBR(r0, 0x8941, &(0x7f0000000180)=@get={0x1, &(0x7f0000000100)=""/72, 0x9}) 03:53:57 executing program 4: r0 = socket(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0xfffffffffffff000}, 0xc, &(0x7f0000000900)={&(0x7f0000000040)={0x14, 0x1e, 0x201}, 0x14}, 0x1}, 0x0) 03:53:57 executing program 7: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f000000d000)={0xa, 0x4e20}, 0x1c) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}, 0xb}, 0x1c) syz_emit_ethernet(0x3e, &(0x7f00000001c0)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @random="e829f650db0f", [], {@ipv6={0x86dd, {0x0, 0x6, "50a09c", 0x8, 0xffffff11, 0x0, @remote={0xfe, 0x80, [], 0xbb}, @local={0xfe, 0x80, [], 0xaa}, {[], @udp={0x0, 0x4e20, 0x8}}}}}}, &(0x7f0000000040)) syz_emit_ethernet(0x3e, &(0x7f0000000000)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], {@ipv6={0x86dd, {0x0, 0x6, "50a09c", 0x8, 0xffffff11, 0x0, @remote={0xfe, 0x80, [], 0xbb}, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd00000000000000], 0xaa}, {[], @udp={0x300, 0x4e20, 0x8}}}}}}, &(0x7f0000000040)) [ 1475.910421] hfsplus: gid requires an argument [ 1475.915100] hfsplus: unable to parse mount options [ 1475.943326] hfsplus: gid requires an argument [ 1475.948203] hfsplus: unable to parse mount options 03:53:57 executing program 2: r0 = syz_open_dev$sndseq(&(0x7f0000dcc000)='/dev/snd/seq\x00', 0x0, 0x2) read(r0, &(0x7f0000fb6000)=""/28, 0x3f0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000418f50)={{0x80}, "0a4ceaa05d9a00000000000000039b3fd4cec307e8ef3d13eb790ec9c65abaf90d229db692542e5b78f8b29e0a27800f0000000000000009fb42f376589701a4", 0xa9824f69d1376637, 0x10800a}) r1 = msgget$private(0x0, 0xb) msgctl$MSG_STAT(r1, 0xb, &(0x7f0000000000)=""/27) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000240)={0xbf}) write$binfmt_script(r0, &(0x7f0000000000)=ANY=[], 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f00000002c0)={{}, 'port0\x00'}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000000040)={{{@in6=@ipv4={[], [], @broadcast}, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@loopback}, 0x0, @in6}}, &(0x7f0000000140)=0xe8) stat(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0}) setreuid(r2, r3) 03:53:57 executing program 5: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer2\x00', 0x0, 0x0) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000040)="025cc83d6d345f8f762070") ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r0, 0x40085112, &(0x7f0000b18000)={{0xffffff93}, {0xffffffa0}, 0x0, 0x0, 0x0, [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfdfdffff00000000]}) 03:53:57 executing program 1: r0 = socket(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x54}, 0xc, &(0x7f0000000900)={&(0x7f0000000040)={0x14, 0x1e, 0x201}, 0x14}, 0x1}, 0x0) 03:53:57 executing program 3: ioctl$BLKDISCARD(0xffffffffffffffff, 0x1277, &(0x7f0000000180)) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140)='/dev/snapshot\x00', 0x0, 0x0) fcntl$addseals(0xffffffffffffffff, 0x409, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f0000000000), &(0x7f00000000c0)=0x8) ioctl$EVIOCGLED(0xffffffffffffffff, 0x80404519, &(0x7f0000000580)=""/236) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x3c, 0x0) ioctl$EVIOCGKEYCODE_V2(0xffffffffffffffff, 0x80284504, &(0x7f00000003c0)=""/188) ioctl$LOOP_CTL_REMOVE(r0, 0xc0189436, 0x0) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c82, 0x0) 03:53:57 executing program 7: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f000000d000)={0xa, 0x4e20}, 0x1c) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}, 0xb}, 0x1c) syz_emit_ethernet(0x3e, &(0x7f00000001c0)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @random="e829f650db0f", [], {@ipv6={0x86dd, {0x0, 0x6, "50a09c", 0x8, 0xffffff11, 0x0, @remote={0xfe, 0x80, [], 0xbb}, @local={0xfe, 0x80, [], 0xaa}, {[], @udp={0x0, 0x4e20, 0x8}}}}}}, &(0x7f0000000040)) syz_emit_ethernet(0x3e, &(0x7f0000000000)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], {@ipv6={0x86dd, {0x0, 0x6, "50a09c", 0x8, 0xffffff11, 0x0, @remote={0xfe, 0x80, [], 0xbb}, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffff000], 0xaa}, {[], @udp={0x300, 0x4e20, 0x8}}}}}}, &(0x7f0000000040)) 03:53:57 executing program 0: ioctl$BLKDISCARD(0xffffffffffffffff, 0x1277, &(0x7f0000000180)) r0 = syz_open_dev$usbmon(&(0x7f0000000080)='/dev/usbmon#\x00', 0xff, 0x4000) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140)='/dev/snapshot\x00', 0x0, 0x0) fcntl$addseals(0xffffffffffffffff, 0x409, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f0000000000), &(0x7f00000000c0)=0x8) ioctl$EVIOCGLED(0xffffffffffffffff, 0x80404519, &(0x7f0000000580)=""/236) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000100)='IPVS\x00') getsockopt$inet_sctp6_SCTP_HMAC_IDENT(r0, 0x84, 0x16, &(0x7f0000000280)={0x1, [0x3e0c800000]}, &(0x7f0000000300)=0x6) sendmsg$IPVS_CMD_GET_SERVICE(r1, &(0x7f0000000240)={&(0x7f0000000040)={0x10}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x38, r2, 0x28, 0x70bd29, 0x25dfdbfe, {0x4}, [@IPVS_CMD_ATTR_DAEMON={0xc, 0x3, [@IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @dev={0xac, 0x14, 0x14, 0x13}}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x7f}]}, 0x38}, 0x1, 0x0, 0x0, 0x10}, 0x4000000) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x3c, 0x0) epoll_create1(0x80000) ioctl$EVIOCGKEYCODE_V2(0xffffffffffffffff, 0x80284504, &(0x7f00000003c0)=""/188) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) fcntl$getown(r3, 0x9) ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x0) 03:53:57 executing program 4: r0 = socket(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4f00}, 0xc, &(0x7f0000000900)={&(0x7f0000000040)={0x14, 0x1e, 0x201}, 0x14}, 0x1}, 0x0) 03:53:57 executing program 6: r0 = socket(0x8, 0x5, 0xfffffffffffffffd) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000640)={0x0, 0x0, 0x0}, &(0x7f0000000680)=0xc) syz_mount_image$hfsplus(&(0x7f0000000240)='hfsplus\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, &(0x7f00000005c0), 0x0, &(0x7f00000006c0)={[{@gid={'gid', 0x3d, r1}, 0x2c}]}) 03:53:57 executing program 1: r0 = socket(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4d01000000000000}, 0xc, &(0x7f0000000900)={&(0x7f0000000040)={0x14, 0x1e, 0x201}, 0x14}, 0x1}, 0x0) 03:53:57 executing program 5: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer2\x00', 0x0, 0x0) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000040)="025cc83d6d345f8f762070") ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r0, 0x40085112, &(0x7f0000b18000)={{0xffffff93}, {0xffffffa0}, 0x0, 0x0, 0x0, [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff03000000000000]}) 03:53:57 executing program 4: r0 = socket(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x7a00}, 0xc, &(0x7f0000000900)={&(0x7f0000000040)={0x14, 0x1e, 0x201}, 0x14}, 0x1}, 0x0) 03:53:58 executing program 3: ioctl$BLKDISCARD(0xffffffffffffffff, 0x1277, &(0x7f0000000180)) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140)='/dev/snapshot\x00', 0x0, 0x0) fcntl$addseals(0xffffffffffffffff, 0x409, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f0000000000), &(0x7f00000000c0)=0x8) ioctl$EVIOCGLED(0xffffffffffffffff, 0x80404519, &(0x7f0000000580)=""/236) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x3c, 0x0) ioctl$EVIOCGKEYCODE_V2(0xffffffffffffffff, 0x80284504, &(0x7f00000003c0)=""/188) ioctl$LOOP_CTL_REMOVE(r0, 0x5452, 0x0) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c82, 0x0) 03:53:58 executing program 7: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f000000d000)={0xa, 0x4e20}, 0x1c) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}, 0xb}, 0x1c) syz_emit_ethernet(0x3e, &(0x7f00000001c0)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @random="e829f650db0f", [], {@ipv6={0x86dd, {0x0, 0x6, "50a09c", 0x8, 0xffffff11, 0x0, @remote={0xfe, 0x80, [], 0xbb}, @local={0xfe, 0x80, [], 0xaa}, {[], @udp={0x0, 0x4e20, 0x8}}}}}}, &(0x7f0000000040)) syz_emit_ethernet(0x3e, &(0x7f0000000000)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], {@ipv6={0x86dd, {0x0, 0x6, "50a09c", 0x8, 0xffffff11, 0x0, @remote={0xfe, 0x80, [], 0xbb}, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf0ffff], 0xaa}, {[], @udp={0x300, 0x4e20, 0x8}}}}}}, &(0x7f0000000040)) [ 1476.434844] hfsplus: unable to find HFS+ superblock 03:53:58 executing program 1: r0 = socket(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x9800000000000000}, 0xc, &(0x7f0000000900)={&(0x7f0000000040)={0x14, 0x1e, 0x201}, 0x14}, 0x1}, 0x0) 03:53:58 executing program 3: ioctl$BLKDISCARD(0xffffffffffffffff, 0x1277, &(0x7f0000000180)) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140)='/dev/snapshot\x00', 0x0, 0x0) fcntl$addseals(0xffffffffffffffff, 0x409, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f0000000000), &(0x7f00000000c0)=0x8) ioctl$EVIOCGLED(0xffffffffffffffff, 0x80404519, &(0x7f0000000580)=""/236) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x3c, 0x0) ioctl$EVIOCGKEYCODE_V2(0xffffffffffffffff, 0x80284504, &(0x7f00000003c0)=""/188) ioctl$LOOP_CTL_REMOVE(r0, 0x4c82, 0x0) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c82, 0x0) 03:53:58 executing program 5: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer2\x00', 0x0, 0x0) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000040)="025cc83d6d345f8f762070") ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r0, 0x40085112, &(0x7f0000b18000)={{0xffffff93}, {0xffffffa0}, 0x0, 0x0, 0x0, [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f00000000000000]}) [ 1476.828614] hfsplus: unable to find HFS+ superblock 03:53:59 executing program 2: r0 = syz_open_dev$sndseq(&(0x7f0000dcc000)='/dev/snd/seq\x00', 0x0, 0x2) read(r0, &(0x7f0000fb6000)=""/28, 0x3f0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000418f50)={{0x80}, "0a4ceaa05d9a00000000000000039b3fd4cec307e8ef3d13eb790ec9c65abaf90d229db692542e5b78f8b29e0a27800f0000000000000009fb42f376589701a4", 0xa9824f69d1376637, 0x10800a}) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000240)={0xbf}) write$binfmt_script(r0, &(0x7f0000000000)=ANY=[], 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f00000002c0)={{}, 'port0\x00'}) ioctl$sock_SIOCGPGRP(0xffffffffffffff9c, 0x8904, &(0x7f0000000000)=0x0) r2 = getpid() kcmp(r1, r2, 0x7, r0, r0) openat$sequencer2(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer2\x00', 0x0, 0x0) 03:53:59 executing program 4: r0 = socket(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0xd500}, 0xc, &(0x7f0000000900)={&(0x7f0000000040)={0x14, 0x1e, 0x201}, 0x14}, 0x1}, 0x0) 03:53:59 executing program 7: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f000000d000)={0xa, 0x4e20}, 0x1c) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}, 0xb}, 0x1c) syz_emit_ethernet(0x3e, &(0x7f00000001c0)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @random="e829f650db0f", [], {@ipv6={0x86dd, {0x0, 0x6, "50a09c", 0x8, 0xffffff11, 0x0, @remote={0xfe, 0x80, [], 0xbb}, @local={0xfe, 0x80, [], 0xaa}, {[], @udp={0x0, 0x4e20, 0x8}}}}}}, &(0x7f0000000040)) syz_emit_ethernet(0x3e, &(0x7f0000000000)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], {@ipv6={0x86dd, {0x0, 0x6, "50a09c", 0x8, 0xffffff11, 0x0, @remote={0xfe, 0x80, [], 0xbb}, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x300], 0xaa}, {[], @udp={0x300, 0x4e20, 0x8}}}}}}, &(0x7f0000000040)) 03:53:59 executing program 1: r0 = socket(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x53000000}, 0xc, &(0x7f0000000900)={&(0x7f0000000040)={0x14, 0x1e, 0x201}, 0x14}, 0x1}, 0x0) 03:53:59 executing program 6: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x4880, 0x0) r1 = socket(0x11, 0xa, 0x0) getsockopt$inet_tcp_int(r0, 0x6, 0x18, &(0x7f00000000c0), &(0x7f0000000100)=0x4) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000000)={0x0, 0x0, 0x0}, &(0x7f0000000080)=0x1) syz_mount_image$hfsplus(&(0x7f0000000240)='hfsplus\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, &(0x7f00000005c0), 0x0, &(0x7f00000006c0)={[{@gid={'gid', 0x3d, r2}, 0x2c}]}) 03:53:59 executing program 5: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer2\x00', 0x0, 0x0) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000040)="025cc83d6d345f8f762070") ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r0, 0x40085112, &(0x7f0000b18000)={{0xffffff93}, {0xffffffa0}, 0x0, 0x0, 0x0, [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000]}) 03:53:59 executing program 0: ioctl$BLKDISCARD(0xffffffffffffffff, 0x1277, &(0x7f0000000180)) r0 = syz_open_dev$usbmon(&(0x7f0000000080)='/dev/usbmon#\x00', 0xff, 0x4000) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140)='/dev/snapshot\x00', 0x0, 0x0) fcntl$addseals(0xffffffffffffffff, 0x409, 0x0) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(r0, 0x84, 0x7b, &(0x7f0000000040)={0x0, 0x8}, &(0x7f0000000100)=0x8) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(r1, 0x84, 0x1a, &(0x7f00000001c0)={r2, 0x42, "52ea163be7395314eae3b7f7e7ab811eae7b97b6160141aeacddae7fb3f44a813ca2f2c498628b52701f7458695cfc13c264a7ff761bf531292a9a849a5f3e6de66a"}, &(0x7f0000000240)=0x4a) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f0000000000), &(0x7f00000000c0)=0x8) ioctl$EVIOCGLED(0xffffffffffffffff, 0x80404519, &(0x7f0000000580)=""/236) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x3c, 0x0) ioctl$EVIOCGKEYCODE_V2(0xffffffffffffffff, 0x80284504, &(0x7f00000003c0)=""/188) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x0) 03:53:59 executing program 3: ioctl$BLKDISCARD(0xffffffffffffffff, 0x1277, &(0x7f0000000180)) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140)='/dev/snapshot\x00', 0x0, 0x0) fcntl$addseals(0xffffffffffffffff, 0x409, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f0000000000), &(0x7f00000000c0)=0x8) ioctl$EVIOCGLED(0xffffffffffffffff, 0x80404519, &(0x7f0000000580)=""/236) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x3c, 0x0) ioctl$EVIOCGKEYCODE_V2(0xffffffffffffffff, 0x80284504, &(0x7f00000003c0)=""/188) ioctl$LOOP_CTL_REMOVE(r0, 0xc0045878, 0x0) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c82, 0x0) 03:53:59 executing program 7: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f000000d000)={0xa, 0x4e20}, 0x1c) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}, 0xb}, 0x1c) syz_emit_ethernet(0x3e, &(0x7f00000001c0)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @random="e829f650db0f", [], {@ipv6={0x86dd, {0x0, 0x6, "50a09c", 0x8, 0xffffff11, 0x0, @remote={0xfe, 0x80, [], 0xbb}, @local={0xfe, 0x80, [], 0xaa}, {[], @udp={0x0, 0x4e20, 0x8}}}}}}, &(0x7f0000000040)) syz_emit_ethernet(0x3e, &(0x7f0000000000)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], {@ipv6={0x86dd, {0x0, 0x6, "50a09c", 0x8, 0xffffff11, 0x0, @remote={0xfe, 0x80, [], 0xbb}, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffdd86], 0xaa}, {[], @udp={0x300, 0x4e20, 0x8}}}}}}, &(0x7f0000000040)) 03:53:59 executing program 1: r0 = socket(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x9600000000000000}, 0xc, &(0x7f0000000900)={&(0x7f0000000040)={0x14, 0x1e, 0x201}, 0x14}, 0x1}, 0x0) 03:53:59 executing program 4: r0 = socket(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x5d01}, 0xc, &(0x7f0000000900)={&(0x7f0000000040)={0x14, 0x1e, 0x201}, 0x14}, 0x1}, 0x0) 03:53:59 executing program 3: ioctl$BLKDISCARD(0xffffffffffffffff, 0x1277, &(0x7f0000000180)) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140)='/dev/snapshot\x00', 0x0, 0x0) fcntl$addseals(0xffffffffffffffff, 0x409, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f0000000000), &(0x7f00000000c0)=0x8) ioctl$EVIOCGLED(0xffffffffffffffff, 0x80404519, &(0x7f0000000580)=""/236) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x3c, 0x0) ioctl$EVIOCGKEYCODE_V2(0xffffffffffffffff, 0x80284504, &(0x7f00000003c0)=""/188) ioctl$LOOP_CTL_REMOVE(r0, 0x2, 0x0) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c82, 0x0) 03:53:59 executing program 5: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer2\x00', 0x0, 0x0) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000040)="025cc83d6d345f8f762070") ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r0, 0x40085112, &(0x7f0000b18000)={{0xffffff93}, {0xffffffa0}, 0x0, 0x0, 0x0, [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5000000]}) [ 1478.063302] hfsplus: unable to find HFS+ superblock [ 1478.091730] hfsplus: unable to find HFS+ superblock 03:53:59 executing program 1: r0 = socket(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x201000000000000}, 0xc, &(0x7f0000000900)={&(0x7f0000000040)={0x14, 0x1e, 0x201}, 0x14}, 0x1}, 0x0) 03:53:59 executing program 7: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f000000d000)={0xa, 0x4e20}, 0x1c) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}, 0xb}, 0x1c) syz_emit_ethernet(0x3e, &(0x7f00000001c0)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @random="e829f650db0f", [], {@ipv6={0x86dd, {0x0, 0x6, "50a09c", 0x8, 0xffffff11, 0x0, @remote={0xfe, 0x80, [], 0xbb}, @local={0xfe, 0x80, [], 0xaa}, {[], @udp={0x0, 0x4e20, 0x8}}}}}}, &(0x7f0000000040)) syz_emit_ethernet(0x3e, &(0x7f0000000000)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], {@ipv6={0x86dd, {0x0, 0x6, "50a09c", 0x8, 0xffffff11, 0x0, @remote={0xfe, 0x80, [], 0xbb}, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x86ddffff], 0xaa}, {[], @udp={0x300, 0x4e20, 0x8}}}}}}, &(0x7f0000000040)) 03:53:59 executing program 3: ioctl$BLKDISCARD(0xffffffffffffffff, 0x1277, &(0x7f0000000180)) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140)='/dev/snapshot\x00', 0x0, 0x0) fcntl$addseals(0xffffffffffffffff, 0x409, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f0000000000), &(0x7f00000000c0)=0x8) ioctl$EVIOCGLED(0xffffffffffffffff, 0x80404519, &(0x7f0000000580)=""/236) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x3c, 0x0) ioctl$EVIOCGKEYCODE_V2(0xffffffffffffffff, 0x80284504, &(0x7f00000003c0)=""/188) ioctl$LOOP_CTL_REMOVE(r0, 0x5450, 0x0) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c82, 0x0) 03:54:00 executing program 2: r0 = syz_open_dev$sndseq(&(0x7f0000dcc000)='/dev/snd/seq\x00', 0x0, 0x2) read(r0, &(0x7f0000fb6000)=""/28, 0x3f0) pipe2(&(0x7f0000000080)={0xffffffffffffffff}, 0x80000) ioctl$VHOST_SET_VRING_KICK(r1, 0x4008af20, &(0x7f0000000100)={0x2}) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000418f50)={{0x80}, "0a4ceaa05d9a00000000000000039b3fd4cec307e8ef3d13eb790ec9c65abaf90d229db692542e5b78f8b29e0a27800f0000000000000009fb42f376589701a4", 0xa9824f69d1376637, 0x10800a}) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000240)={0xbf}) write$binfmt_script(r0, &(0x7f0000000000)=ANY=[], 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f00000002c0)={{}, 'port0\x00'}) vmsplice(r0, &(0x7f0000000040)=[{&(0x7f0000000000)="3c79adb594a0cbf24a1682f2066cbd32c2ecf05e3586f3c0b98f6aacedd6b0", 0x1f}], 0x1, 0x1) openat$sequencer2(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer2\x00', 0x0, 0x0) 03:54:00 executing program 4: r0 = socket(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0xd800}, 0xc, &(0x7f0000000900)={&(0x7f0000000040)={0x14, 0x1e, 0x201}, 0x14}, 0x1}, 0x0) 03:54:00 executing program 0: ioctl$BLKDISCARD(0xffffffffffffffff, 0x1277, &(0x7f0000000180)) syz_open_dev$usbmon(&(0x7f0000000080)='/dev/usbmon#\x00', 0xff, 0x4000) r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140)='/dev/snapshot\x00', 0x0, 0x0) fcntl$addseals(r0, 0x409, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f0000000000), &(0x7f00000000c0)=0x8) ioctl$EVIOCGLED(0xffffffffffffffff, 0x80404519, &(0x7f0000000580)=""/236) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x3c, 0x0) getsockopt$bt_rfcomm_RFCOMM_CONNINFO(r0, 0x12, 0x2, &(0x7f00000001c0)=""/123, &(0x7f0000000040)=0x7b) ioctl$EVIOCGKEYCODE_V2(0xffffffffffffffff, 0x80284504, &(0x7f00000003c0)=""/188) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) 03:54:00 executing program 1: r0 = socket(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x95000000}, 0xc, &(0x7f0000000900)={&(0x7f0000000040)={0x14, 0x1e, 0x201}, 0x14}, 0x1}, 0x0) 03:54:00 executing program 6: r0 = socket(0x11, 0xa, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000640)={0x0, 0x0, 0x0}, &(0x7f0000000680)=0xc) r2 = creat(&(0x7f0000000000)='./file0\x00', 0x108) ioctl$KDSKBSENT(r2, 0x4b49, &(0x7f0000000040)="8aec83f84644685520b2dbd08cdc4e736913803d8c19857a9555476a28362662b2a29be56d9ee9b0783b6d8ab20432847d865ebc527ae914526e61c3bfd34ffa3e91e612f21979bc57722146596d634ddb08673f1e54aceb40ca35efabd6cbd327c4d0352c86b623e2a2754d2d6159b01237576416c84b91a76f2e1a0038272a93f77dd14391a087e8971618a9968dcf3b58e6fb1002212df0cbe2") syz_mount_image$hfsplus(&(0x7f0000000240)='hfsplus\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, &(0x7f00000005c0), 0x0, &(0x7f00000006c0)={[{@gid={'gid', 0x3d, r1}, 0x2c}]}) 03:54:00 executing program 7: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f000000d000)={0xa, 0x4e20}, 0x1c) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}, 0xb}, 0x1c) syz_emit_ethernet(0x3e, &(0x7f00000001c0)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @random="e829f650db0f", [], {@ipv6={0x86dd, {0x0, 0x6, "50a09c", 0x8, 0xffffff11, 0x0, @remote={0xfe, 0x80, [], 0xbb}, @local={0xfe, 0x80, [], 0xaa}, {[], @udp={0x0, 0x4e20, 0x8}}}}}}, &(0x7f0000000040)) syz_emit_ethernet(0x3e, &(0x7f0000000000)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], {@ipv6={0x86dd, {0x0, 0x6, "50a09c", 0x8, 0xffffff11, 0x0, @remote={0xfe, 0x80, [], 0xbb}, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc0ffffff], 0xaa}, {[], @udp={0x300, 0x4e20, 0x8}}}}}}, &(0x7f0000000040)) 03:54:00 executing program 5: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer2\x00', 0x0, 0x0) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000040)="025cc83d6d345f8f762070") ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r0, 0x40085112, &(0x7f0000b18000)={{0xffffff93}, {0xffffffa0}, 0x0, 0x0, 0x0, [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfdfdffff]}) 03:54:00 executing program 3: ioctl$BLKDISCARD(0xffffffffffffffff, 0x1277, &(0x7f0000000180)) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140)='/dev/snapshot\x00', 0x0, 0x0) fcntl$addseals(0xffffffffffffffff, 0x409, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f0000000000), &(0x7f00000000c0)=0x8) ioctl$EVIOCGLED(0xffffffffffffffff, 0x80404519, &(0x7f0000000580)=""/236) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x3c, 0x0) ioctl$EVIOCGKEYCODE_V2(0xffffffffffffffff, 0x80284504, &(0x7f00000003c0)=""/188) ioctl$LOOP_CTL_REMOVE(r0, 0x40049409, 0x0) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c82, 0x0) 03:54:00 executing program 4: r0 = socket(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x106}, 0xc, &(0x7f0000000900)={&(0x7f0000000040)={0x14, 0x1e, 0x201}, 0x14}, 0x1}, 0x0) 03:54:00 executing program 1: r0 = socket(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x700}, 0xc, &(0x7f0000000900)={&(0x7f0000000040)={0x14, 0x1e, 0x201}, 0x14}, 0x1}, 0x0) 03:54:00 executing program 7: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f000000d000)={0xa, 0x4e20}, 0x1c) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}, 0xb}, 0x1c) syz_emit_ethernet(0x3e, &(0x7f00000001c0)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @random="e829f650db0f", [], {@ipv6={0x86dd, {0x0, 0x6, "50a09c", 0x8, 0xffffff11, 0x0, @remote={0xfe, 0x80, [], 0xbb}, @local={0xfe, 0x80, [], 0xaa}, {[], @udp={0x0, 0x4e20, 0x8}}}}}}, &(0x7f0000000040)) syz_emit_ethernet(0x3e, &(0x7f0000000000)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], {@ipv6={0x86dd, {0x0, 0x6, "50a09c", 0x8, 0xffffff11, 0x0, @remote={0xfe, 0x80, [], 0xbb}, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8035], 0xaa}, {[], @udp={0x300, 0x4e20, 0x8}}}}}}, &(0x7f0000000040)) 03:54:00 executing program 5: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer2\x00', 0x0, 0x0) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000040)="025cc83d6d345f8f762070") ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r0, 0x40085112, &(0x7f0000b18000)={{0xffffff93}, {0xffffffa0}, 0x0, 0x0, 0x0, [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff03]}) 03:54:00 executing program 3: ioctl$BLKDISCARD(0xffffffffffffffff, 0x1277, &(0x7f0000000180)) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140)='/dev/snapshot\x00', 0x0, 0x0) fcntl$addseals(0xffffffffffffffff, 0x409, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f0000000000), &(0x7f00000000c0)=0x8) ioctl$EVIOCGLED(0xffffffffffffffff, 0x80404519, &(0x7f0000000580)=""/236) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x3c, 0x0) ioctl$EVIOCGKEYCODE_V2(0xffffffffffffffff, 0x80284504, &(0x7f00000003c0)=""/188) ioctl$LOOP_CTL_REMOVE(r0, 0x5451, 0x0) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c82, 0x0) [ 1479.212424] hfsplus: gid requires an argument [ 1479.217241] hfsplus: unable to parse mount options 03:54:00 executing program 1: r0 = socket(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x301000000000000}, 0xc, &(0x7f0000000900)={&(0x7f0000000040)={0x14, 0x1e, 0x201}, 0x14}, 0x1}, 0x0) 03:54:01 executing program 1: r0 = socket(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x6100000000000000}, 0xc, &(0x7f0000000900)={&(0x7f0000000040)={0x14, 0x1e, 0x201}, 0x14}, 0x1}, 0x0) [ 1479.533809] hfsplus: gid requires an argument [ 1479.538442] hfsplus: unable to parse mount options 03:54:01 executing program 4: r0 = socket(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4d}, 0xc, &(0x7f0000000900)={&(0x7f0000000040)={0x14, 0x1e, 0x201}, 0x14}, 0x1}, 0x0) 03:54:02 executing program 2: r0 = syz_open_dev$sndseq(&(0x7f0000dcc000)='/dev/snd/seq\x00', 0x0, 0x2) read(r0, &(0x7f0000000040)=""/28, 0xfeed) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000418f50)={{0x80}, "0a4ceaa05d9a00000000000000039b3fd4cec307e8ef3d13eb790ec9c65abaf90d229db692542e5b78f8b29e0a27800f0000000000000009fb42f376589701a4", 0xa9824f69d1376637, 0x10800a}) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000240)={0xbf}) write$binfmt_script(r0, &(0x7f0000000000)=ANY=[], 0x0) fchdir(r0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f00000002c0)={{}, 'port0\x00'}) openat$sequencer2(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer2\x00', 0x0, 0x0) 03:54:02 executing program 6: r0 = socket(0x11, 0xa, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000640)={0x0, 0x0, 0x0}, &(0x7f0000000680)=0xc) syz_mount_image$hfsplus(&(0x7f0000000240)='hfsplus\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, &(0x7f00000005c0), 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='gid=', @ANYRESHEX=r1, @ANYBLOB="0002070000d866e261b081550200"]) 03:54:02 executing program 7: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f000000d000)={0xa, 0x4e20}, 0x1c) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}, 0xb}, 0x1c) syz_emit_ethernet(0x3e, &(0x7f00000001c0)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @random="e829f650db0f", [], {@ipv6={0x86dd, {0x0, 0x6, "50a09c", 0x8, 0xffffff11, 0x0, @remote={0xfe, 0x80, [], 0xbb}, @local={0xfe, 0x80, [], 0xaa}, {[], @udp={0x0, 0x4e20, 0x8}}}}}}, &(0x7f0000000040)) syz_emit_ethernet(0x3e, &(0x7f0000000000)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], {@ipv6={0x86dd, {0x0, 0x6, "50a09c", 0x8, 0xffffff11, 0x0, @remote={0xfe, 0x80, [], 0xbb}, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffff000], 0xaa}, {[], @udp={0x300, 0x4e20, 0x8}}}}}}, &(0x7f0000000040)) 03:54:02 executing program 0: ioctl$BLKDISCARD(0xffffffffffffffff, 0x1277, &(0x7f0000000180)) r0 = syz_open_dev$usbmon(&(0x7f0000000080)='/dev/usbmon#\x00', 0xff, 0x4000) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140)='/dev/snapshot\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r1, 0x84, 0x66, &(0x7f0000000000), &(0x7f00000000c0)=0x8) ioctl$EVIOCGLED(r0, 0x80404519, &(0x7f00000001c0)=""/236) time(&(0x7f0000000100)) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x3c, 0x0) write$P9_RFLUSH(r0, &(0x7f0000000040)={0x7, 0x6d, 0x2}, 0x7) ioctl$EVIOCGKEYCODE_V2(0xffffffffffffffff, 0x80284504, &(0x7f00000003c0)=""/188) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0xcc, &(0x7f0000001840)={{0xa, 0x4e23, 0x1, @remote={0xfe, 0x80, [], 0xbb}, 0x1}, {0xa, 0x4e22, 0x7ac, @dev={0xfe, 0x80, [], 0x1c}, 0x9}, 0x9, [0xcb, 0xb0, 0xfffffffffffffffc, 0x5, 0x3f, 0x8, 0x8, 0x10001]}, 0x5c) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) r3 = ioctl$LOOP_CTL_GET_FREE(r2, 0x4c82) r4 = geteuid() sendmsg$nl_netfilter(r0, &(0x7f0000000380)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x8010000}, 0xc, &(0x7f0000000340)={&(0x7f0000000480)={0x13b0, 0xe, 0x9, 0x0, 0x70bd29, 0x25dfdbfb, {0x7, 0x0, 0x9}, [@nested={0x11dc, 0x37, [@generic="bcee25e027b2c115a6e46f8d12b9221ae664c9515da39212cc696f2c8e6c32b391d071ec1c1f63f123934caf14eb57ab4949ca004fb7a29152e196795b3fed985600d9bfa862fd14d81c0fa26dd79a7f556b471ecfe2278dcdad7aaeb955", @typed={0x8, 0x48, @uid=r4}, @generic="8e19871a5ce82ec2f0fd70106282322f020757b18085bc159afed990d76a05a914ecad769db43cbab6faec00a940c6630af82d8006f77c87a6575ecaeff271015d03b83fabf88b654c5639339ddce3752af0e06f", @generic="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", @typed={0x8, 0x5a, @ipv4=@dev={0xac, 0x14, 0x14, 0x18}}, @typed={0x8, 0x9, @u32=0xfff}, @generic="2701e59c9c3ab6f92abdaeb27cae82e457d02d95453c4b22843be825f45e900f171c7ce4a84032f467fca1d9e51061ab17095b0a28d49c17e8b06a8c684e7bd05227066a147adc238761010d515f1e1a60490d1af1045013730f76c3465eae83c5a15c82adfa0261f5a7327be88083fcc9a22a65d7cf12c85578c72c97327ea71dc01181f4eda2adf670ae273ad5e9f0aa7d000a16ca09deb474c4e1d8211bb2de302ae3875a09ffcc79f44d09771760749bbfb4b362c5272a4f41988de7544412039f7986d99b4a23c7850363e1c032c5b71018cb5f41454f5f87a4aad295e33aa1623efaed876036a9483b57286947071e0c21", @typed={0x18, 0x78, @str='/dev/loop-control\x00'}]}, @nested={0x40, 0x65, [@generic="3999d84daf3c117f0d7c5455a328ddc1de2ffd4e2d414dd4218c435a4173ef0ac0d4e7736eba7f6ab15bcbe8a61c0b89244d0dca2ae6e65de745"]}, @nested={0xcc, 0x43, [@generic="2e23da21ca922ac6eff89bc1e629d2e9f4d2affae6a34331f79a8c56cdb6796273800614ea4ff71942638764bcb3c92695ad17a762dd1435fe6b43289f4e2cb62e71c31158a9f9a1145a4dedbccd57b3162065b97b3d854cbcdf5b2861d058cb386dd7b59d8dc06744ba9b8ca00809ba64ef3005fa2e1f58af7bc43ec04a4c02466a792c2c90de1e760077c33eebe7f937810fdaa330a822174c2928d7ebf77a7fd19f9b0852310e54a75a7f0aa09fd64f9c51f3088c4b3670ec1a56db619b", @typed={0x8, 0x1a, @u32=0x17acc1b4}]}, @typed={0x14, 0x4a, @str='/dev/snapshot\x00'}, @nested={0x88, 0x40, [@typed={0x8, 0x1d, @ipv4=@rand_addr=0x8696}, @generic="72b07c1603cd436ae2e4f92a0e750a3c4b7209cc152e2edd3b5cca5e911bf450d9796ca71ea53dfa007f390efb1d6bde2c57ebf91d65e4d3f6471cc13909514b98f22874e90fd3bc2531bd82b3bf4a8e7fc267babff8f276332142eba034e00bfbae65ba6b081c1664cd0724b6ccef4dfc10033d0aac2771b44ee5"]}, @generic="9234f3e22d3a1e8969aa33203cbe42ce50a7e78446ae42"]}, 0x13b0}, 0x1, 0x0, 0x0, 0x4000000}, 0x4081) ioctl$LOOP_CTL_ADD(r1, 0x4c80, r3) 03:54:02 executing program 3: ioctl$BLKDISCARD(0xffffffffffffffff, 0x1277, &(0x7f0000000180)) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140)='/dev/snapshot\x00', 0x0, 0x0) fcntl$addseals(0xffffffffffffffff, 0x409, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f0000000000), &(0x7f00000000c0)=0x8) ioctl$EVIOCGLED(0xffffffffffffffff, 0x80404519, &(0x7f0000000580)=""/236) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x3c, 0x0) ioctl$EVIOCGKEYCODE_V2(0xffffffffffffffff, 0x80284504, &(0x7f00000003c0)=""/188) ioctl$LOOP_CTL_REMOVE(r0, 0xc0045878, 0x0) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c82, 0x0) 03:54:02 executing program 5: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer2\x00', 0x0, 0x0) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000040)="025cc83d6d345f8f762070") ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r0, 0x40085112, &(0x7f0000b18000)={{0xffffff93}, {0xffffffa0}, 0x0, 0x0, 0x0, [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff]}) 03:54:02 executing program 1: r0 = socket(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4c01000000000000}, 0xc, &(0x7f0000000900)={&(0x7f0000000040)={0x14, 0x1e, 0x201}, 0x14}, 0x1}, 0x0) 03:54:02 executing program 4: r0 = socket(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x166}, 0xc, &(0x7f0000000900)={&(0x7f0000000040)={0x14, 0x1e, 0x201}, 0x14}, 0x1}, 0x0) [ 1480.601748] hfsplus: gid requires an argument [ 1480.606505] hfsplus: unable to parse mount options 03:54:02 executing program 1: r0 = socket(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x24010000}, 0xc, &(0x7f0000000900)={&(0x7f0000000040)={0x14, 0x1e, 0x201}, 0x14}, 0x1}, 0x0) 03:54:02 executing program 7: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f000000d000)={0xa, 0x4e20}, 0x1c) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}, 0xb}, 0x1c) syz_emit_ethernet(0x3e, &(0x7f00000001c0)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @random="e829f650db0f", [], {@ipv6={0x86dd, {0x0, 0x6, "50a09c", 0x8, 0xffffff11, 0x0, @remote={0xfe, 0x80, [], 0xbb}, @local={0xfe, 0x80, [], 0xaa}, {[], @udp={0x0, 0x4e20, 0x8}}}}}}, &(0x7f0000000040)) syz_emit_ethernet(0x3e, &(0x7f0000000000)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], {@ipv6={0x86dd, {0x0, 0x6, "50a09c", 0x8, 0xffffff11, 0x0, @remote={0xfe, 0x80, [], 0xbb}, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400000000000000], 0xaa}, {[], @udp={0x300, 0x4e20, 0x8}}}}}}, &(0x7f0000000040)) 03:54:02 executing program 4: r0 = socket(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x9401000000000000}, 0xc, &(0x7f0000000900)={&(0x7f0000000040)={0x14, 0x1e, 0x201}, 0x14}, 0x1}, 0x0) 03:54:02 executing program 5: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer2\x00', 0x0, 0x0) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000040)="025cc83d6d345f8f762070") ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r0, 0x40085112, &(0x7f0000b18000)={{0xffffff93}, {0xffffffa0}, 0x0, 0x0, 0x0, [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd]}) 03:54:02 executing program 3: ioctl$BLKDISCARD(0xffffffffffffffff, 0x1277, &(0x7f0000000180)) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140)='/dev/snapshot\x00', 0x0, 0x0) fcntl$addseals(0xffffffffffffffff, 0x409, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f0000000000), &(0x7f00000000c0)=0x8) ioctl$EVIOCGLED(0xffffffffffffffff, 0x80404519, &(0x7f0000000580)=""/236) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x3c, 0x0) ioctl$EVIOCGKEYCODE_V2(0xffffffffffffffff, 0x80284504, &(0x7f00000003c0)=""/188) ioctl$LOOP_CTL_REMOVE(r0, 0x5460, 0x0) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c82, 0x0) 03:54:02 executing program 0: ioctl$BLKDISCARD(0xffffffffffffffff, 0x1277, &(0x7f0000000180)) r0 = syz_open_dev$usbmon(&(0x7f0000000080)='/dev/usbmon#\x00', 0xff, 0x4000) syz_mount_image$xfs(&(0x7f0000000100)='xfs\x00', &(0x7f00000001c0)='./file0\x00', 0xffffffffffffffff, 0x5, &(0x7f0000000680)=[{&(0x7f0000000200)="1de877850ce11ac46b3f5c49d91fb43443d111b7a969f64ce68ace220b7d693c905ae9ec2bd36c8b20643da8a2e7a9df255dd5bd40353e13f5ba1a0d760f2464d0ea180722a1c19b4fb2a457fb64b5335fa6fbf34a27a094da060a367c020b590f2145969c590bc02689", 0x6a, 0x4ce}, {&(0x7f0000000280)="566991f7d253903fe137e32020e385a653c86e4e91129539cf484cb1c4d2c414e8939e922e0a9c7f086907c7573da4604c5f18cf153281539036bcc8365c3b11e0f7eabf7ae939a04ebb09f9443a8b8b09933d94b9e7f0aaa52f3c41e41f6bd822f28096a4abb5e7ca6097f0190f4d4b6a11d4ad48e458", 0x77}, {&(0x7f0000000300)="43675c6cb5c24980d423c07b53bd52e05ba58f1347854d325ca5b0ebfd80b435079642ee7e9ed812fca3314af1fafb", 0x2f, 0x3}, {&(0x7f0000000340)="b20d8b226f9e2e77bd9fc7b9af46ff611919bf5d0073a551d451df5b970e52d34302817ed89e133785842fa11c5d21d337d0ef788b0f6fb58c80a9833820679b69ccdd8fdb864445771f77383b78318fb9bff0931dd102f58e03a474a69e9fca52a0ca8e78c1fd63eaa36bae62480d0d8767410745b67cbae98191cfcd737aa2", 0x80, 0xfffffffffffffffa}, {&(0x7f0000000480)="2c20d4b7a43ab5638a69c5f687e7cf39f70fd35b6a4f1d3e1a167329241d5adc0cfed749ec210fd1b7d62373c44574e5fd4a1663e5acb189f853347f0d93b93516795048be7c513bd856af636307b7bd350e452afc6ac3ba8b27a2c8bb33afc37a69d785bce8748de7b6203a96975bc00051c001972a11ff46376194c344f3ee97da6125bdea6e", 0x87, 0x1}], 0x200000, &(0x7f0000000700)={[{@discard='discard', 0x2c}, {@norecovery='norecovery', 0x2c}, {@logbsize={'logbsize', 0x3d, [0x30, 0x2d, 0x31]}, 0x2c}, {@usrquota='usrquota', 0x2c}, {@swidth={'swidth', 0x3d, 0x8}, 0x2c}]}) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140)='/dev/snapshot\x00', 0x0, 0x0) fcntl$addseals(0xffffffffffffffff, 0x409, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$kcm(r0, &(0x7f0000000cc0)={&(0x7f0000000780)=@nfc={0x27, 0x1, 0x0, 0x7}, 0x80, &(0x7f0000000bc0)=[{&(0x7f0000000800)="b5b3685dfd92c1aeb4b0d22228a404fc44df54d1c574e99f6d28024964ded409669685a985380c874f7355c6696aaecf22b6f4ac9cb2e0701ce038cbc1bda1429381b54fa6e689387ae3d8ead051bd952aeb806d1b24334a38e207e1a687cf11e8c6b964fe91bf2d1ebacf9274d74005683608fe14bc31ae0fe928fa9444288b813e1c8c9b233dded08ded1fc9b153a76c", 0x91}, {&(0x7f00000008c0)="b797ed79fd45a2650d4abba44aa18c015b826acc73ae111048f108ca7b6f082b403c8bfd4136e06d6f4d047fdcdc0d4aaa0f538687f4707308547f549a25834479639b57d18213602be9bf4b88c12289f0b756fa41853e668d960bc210d6610f571b1ca95307f73859071f07db00f8df601fc5e38af38d4a4faa707cde1dd723078c744f60766d60182189bd1dbba2e0c77617483a7ec9c0109b3722d78ae56f24bcbdbe90b6f08fb2e83ca17fbf9b41041b523f601a9f1958325d266e20225d3b94eb5ea9afb21f511b600b7d85be08516f11b336eeac88a68071da70dc773f7b61627c", 0xe4}, {&(0x7f00000009c0)="cd1d189f825ea7476f7bbf7acfa5b340dfb79b743643cf3ac6ae8614c843119575c8a383531a189df3c9b4f18efd4d59aff2834c65d11773c6aa5b378f69a4bd9a32201aa8deeeef344e9f2639d614a51b8d1ff94558b35ceaa003e025ccd6d0b2edc4432cd603fd898bfb3798aa9dfb7f7d24e574e6ed507d5638b331bfd1c64127da1b7dc1e34b6df86b181c6d6a559e2249584d57696f", 0x98}, {&(0x7f0000000540)="d24fb7a044b0b078b9ce974e1bcae03158b408c81f5945eb6ba160cb0c83ebdee30465bc2bfb7d4b844d5fdc274132148d4d5b8fae32ce09311beb2a9d", 0x3d}, {&(0x7f0000000a80)="7116edabbc002495340a2103eedb2288805bcd559a125a81d447f6205c505dd98fcec558b1205ff0f6ec85557a40066220c5b36deacbd6ee9486824e51815e3b1c18715a3fc29378aa79581679d651ef16546d9d00bdf56d6098f541e945041d60e5d924d9362f6190980a1b77b9dd2c2ba9edf7bd885e8d2da6f75aae4624f832635c58e8e5fdcd15216321d0daf279773b271d049d64bed1b77597d442e6e14122e9b196ef40618cc8df89bf887a51d8d9a380a56de2d78918e3e6f831ec76ae34f7155ea34bc30e6f4dd72a3476b96e4c25d53f94b523b9cc392331739f0e5a95f40cda4b32b970d52bece88c", 0xee}, {&(0x7f0000000b80)="db9539fea6416a610be1901070", 0xd}], 0x6, &(0x7f0000000d80)=ANY=[@ANYBLOB="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"], 0x80, 0x8085}, 0x80) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f0000000000), &(0x7f00000000c0)=0x8) ioctl$EVIOCGLED(0xffffffffffffffff, 0x80404519, &(0x7f0000000580)=""/236) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x3c, 0x0) ioctl$EVIOCGKEYCODE_V2(0xffffffffffffffff, 0x80284504, &(0x7f00000003c0)=""/188) fcntl$getownex(r1, 0x10, &(0x7f0000000d00)={0x0, 0x0}) ioctl$SNDRV_CTL_IOCTL_TLV_READ(r0, 0xc008551a, &(0x7f0000000d40)={0x6, 0x20, [0x100000001, 0x2b76, 0x4, 0x9, 0x4, 0x800, 0x101, 0x3f]}) ptrace$setopts(0x4206, r2, 0x400, 0x100000) r3 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r3) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) [ 1480.656309] hfsplus: gid requires an argument [ 1480.660996] hfsplus: unable to parse mount options 03:54:02 executing program 6: r0 = socket(0xa, 0x80007, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000640)={0x0, 0x0, 0x0}, &(0x7f0000000680)=0xc) r2 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x2000, 0x0) ioctl$VHOST_SET_FEATURES(r2, 0x4008af00, &(0x7f0000000040)=0x8000000) syz_mount_image$hfsplus(&(0x7f0000000240)='hfsplus\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, &(0x7f00000005c0), 0x0, &(0x7f00000006c0)={[{@gid={'gid', 0x3d, r1}, 0x2c}]}) 03:54:02 executing program 7: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f000000d000)={0xa, 0x4e20}, 0x1c) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}, 0xb}, 0x1c) syz_emit_ethernet(0x3e, &(0x7f00000001c0)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @random="e829f650db0f", [], {@ipv6={0x86dd, {0x0, 0x6, "50a09c", 0x8, 0xffffff11, 0x0, @remote={0xfe, 0x80, [], 0xbb}, @local={0xfe, 0x80, [], 0xaa}, {[], @udp={0x0, 0x4e20, 0x8}}}}}}, &(0x7f0000000040)) syz_emit_ethernet(0x3e, &(0x7f0000000000)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], {@ipv6={0x86dd, {0x0, 0x6, "50a09c", 0x8, 0xffffff11, 0x0, @remote={0xfe, 0x80, [], 0xbb}, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8848000000000000], 0xaa}, {[], @udp={0x300, 0x4e20, 0x8}}}}}}, &(0x7f0000000040)) [ 1481.123046] hfsplus: unable to find HFS+ superblock [ 1481.163536] hfsplus: unable to find HFS+ superblock 03:54:03 executing program 2: r0 = syz_open_dev$sndseq(&(0x7f0000dcc000)='/dev/snd/seq\x00', 0x0, 0x2) read(r0, &(0x7f0000fb6000)=""/28, 0x21) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000418f50)={{0x80}, "0a4ceaa05d9a00000000000000039b3fd4cec307e8ef3d13eb790ec9c65abaf90d229db692542e5b78f8b29e0a27800f0000000000000009fb42f376589701a4", 0xa9824f69d1376637, 0x10800a}) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000240)={0xbf}) timer_create(0x2, &(0x7f0000000480)={0x0, 0x4, 0x5, @thr={&(0x7f0000000380)="8364087c71607d0cf5697c7e5846e20026e831861dbe0387728a0fdc8872101f73b3d1bf625b896b23aa258b85eeaf6e21c8e1611e423bac02992ca7d980a1cd40ecdae6bf18e19dbef6c6771fde5c0fa6dc739bbdd158cb5ebbab524788078bf7c50c8a02bce2c0ef5a8180db77fc3c0a63b30ccbce456f4bb3683dc259335393d264b6daef83ec5edbbba3a25ce8e69491dd33a9b485d7aaaf810852ef1213663b6ff0fac004c63d3a4327093773df069d492eec90a5c14326c6a03a4b117a57675e1d47dbbe8abe1d809c1387b1", &(0x7f00000001c0)="7307db8576758bed8b93febe1adbe13e2e58a590ebb4891306c21bab383eed18c43a3e22d3bda04585a4734ebc76fe33bac7f3b80fd0b70301f617bdb9b2f251bcdcee15a8093020b6fc38975d639607bd721e30"}}, &(0x7f00000004c0)=0x0) timer_delete(r1) write$binfmt_script(r0, &(0x7f0000000000)=ANY=[], 0x0) r2 = accept4$nfc_llcp(0xffffffffffffff9c, &(0x7f0000000000), &(0x7f0000000080)=0x60, 0x80800) r3 = syz_open_dev$midi(&(0x7f00000006c0)='/dev/midi#\x00', 0x2, 0x2000) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40082404, &(0x7f0000000700)=0x3) setsockopt$nfc_llcp_NFC_LLCP_MIUX(r2, 0x118, 0x1, &(0x7f0000000100), 0x4) r4 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000500)='/dev/sequencer2\x00', r0}, 0x10) statx(r4, &(0x7f0000000580)='./file0\x00', 0x500, 0x80, &(0x7f00000005c0)) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f00000002c0)={{0x0, 0x4}, 'port0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}) r5 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000180)='/dev/sequencer2\x00', 0x408a80, 0x0) renameat(r5, &(0x7f00000000c0)='./file0\x00', r5, &(0x7f0000000140)='./file0\x00') 03:54:03 executing program 3: ioctl$BLKDISCARD(0xffffffffffffffff, 0x1277, &(0x7f0000000180)) r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140)='/dev/snapshot\x00', 0x0, 0x0) fcntl$addseals(0xffffffffffffffff, 0x409, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f0000000000), &(0x7f00000000c0)=0x8) setsockopt$l2tp_PPPOL2TP_SO_LNSMODE(r0, 0x111, 0x4, 0x1, 0x4) ioctl$EVIOCGLED(0xffffffffffffffff, 0x80404519, &(0x7f0000000580)=""/236) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x3c, 0x0) ioctl$EVIOCGKEYCODE_V2(0xffffffffffffffff, 0x80284504, &(0x7f00000003c0)=""/188) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c82, 0x0) 03:54:03 executing program 5: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer2\x00', 0x0, 0x0) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000040)="025cc83d6d345f8f762070") ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r0, 0x40085112, &(0x7f0000b18000)={{0xffffff93}, {0xffffffa0}, 0x0, 0x0, 0x0, [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8]}) 03:54:03 executing program 1: r0 = socket(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x9701}, 0xc, &(0x7f0000000900)={&(0x7f0000000040)={0x14, 0x1e, 0x201}, 0x14}, 0x1}, 0x0) 03:54:03 executing program 4: r0 = socket(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x146}, 0xc, &(0x7f0000000900)={&(0x7f0000000040)={0x14, 0x1e, 0x201}, 0x14}, 0x1}, 0x0) 03:54:03 executing program 7: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f000000d000)={0xa, 0x4e20}, 0x1c) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}, 0xb}, 0x1c) syz_emit_ethernet(0x3e, &(0x7f00000001c0)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @random="e829f650db0f", [], {@ipv6={0x86dd, {0x0, 0x6, "50a09c", 0x8, 0xffffff11, 0x0, @remote={0xfe, 0x80, [], 0xbb}, @local={0xfe, 0x80, [], 0xaa}, {[], @udp={0x0, 0x4e20, 0x8}}}}}}, &(0x7f0000000040)) syz_emit_ethernet(0x3e, &(0x7f0000000000)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], {@ipv6={0x86dd, {0x0, 0x6, "50a09c", 0x8, 0xffffff11, 0x0, @remote={0xfe, 0x80, [], 0xbb}, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf5ffffff], 0xaa}, {[], @udp={0x300, 0x4e20, 0x8}}}}}}, &(0x7f0000000040)) 03:54:03 executing program 0: ioctl$BLKDISCARD(0xffffffffffffffff, 0x1277, &(0x7f0000000180)) syz_open_dev$usbmon(&(0x7f0000000080)='/dev/usbmon#\x00', 0xff, 0x4000) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140)='/dev/snapshot\x00', 0x0, 0x0) fcntl$addseals(0xffffffffffffffff, 0x409, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f0000000000), &(0x7f00000000c0)=0x8) ioctl$EVIOCGLED(0xffffffffffffffff, 0x80404519, &(0x7f00000001c0)=""/236) socket(0xf, 0x80a, 0x7fffffff) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x3c, 0x0) ioctl$EVIOCGKEYCODE_V2(0xffffffffffffffff, 0x80284504, &(0x7f00000003c0)=""/188) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) 03:54:03 executing program 6: r0 = syz_open_dev$sndpcmc(&(0x7f0000000000)='/dev/snd/pcmC#D#c\x00', 0x7f, 0x0) getsockname$packet(0xffffffffffffff9c, &(0x7f0000000080)={0x0, 0x0, 0x0}, &(0x7f00000000c0)=0x14) connect$packet(r0, &(0x7f0000000100)={0x11, 0xff, r1, 0x1, 0x2, 0x6, @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}}, 0x14) r2 = socket(0x11, 0xa, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000640)={0x0, 0x0, 0x0}, &(0x7f0000000680)=0xc) getsockopt$inet_dccp_int(r2, 0x21, 0x6, &(0x7f0000000040), &(0x7f0000000140)=0x4) syz_mount_image$hfsplus(&(0x7f0000000240)='hfsplus\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, &(0x7f00000005c0), 0x0, &(0x7f00000006c0)=ANY=[@ANYBLOB, @ANYRESHEX=r3, @ANYBLOB="2301"]) 03:54:03 executing program 5: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer2\x00', 0x0, 0x0) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000040)="025cc83d6d345f8f762070") ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r0, 0x40085112, &(0x7f0000b18000)={{0xffffff93}, {0xffffffa0}, 0x0, 0x0, 0x0, [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfdffffff00000000]}) 03:54:03 executing program 7: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f000000d000)={0xa, 0x4e20}, 0x1c) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}, 0xb}, 0x1c) syz_emit_ethernet(0x3e, &(0x7f00000001c0)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @random="e829f650db0f", [], {@ipv6={0x86dd, {0x0, 0x6, "50a09c", 0x8, 0xffffff11, 0x0, @remote={0xfe, 0x80, [], 0xbb}, @local={0xfe, 0x80, [], 0xaa}, {[], @udp={0x0, 0x4e20, 0x8}}}}}}, &(0x7f0000000040)) syz_emit_ethernet(0x3e, &(0x7f0000000000)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], {@ipv6={0x86dd, {0x0, 0x6, "50a09c", 0x8, 0xffffff11, 0x0, @remote={0xfe, 0x80, [], 0xbb}, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x700000000000000], 0xaa}, {[], @udp={0x300, 0x4e20, 0x8}}}}}}, &(0x7f0000000040)) 03:54:03 executing program 4: r0 = socket(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x84010000}, 0xc, &(0x7f0000000900)={&(0x7f0000000040)={0x14, 0x1e, 0x201}, 0x14}, 0x1}, 0x0) 03:54:03 executing program 3: ioctl$BLKDISCARD(0xffffffffffffffff, 0x1277, &(0x7f0000000180)) r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140)='/dev/snapshot\x00', 0x0, 0x0) fcntl$addseals(r0, 0x409, 0x0) socket$inet_smc(0x2b, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f0000000000), &(0x7f00000000c0)=0x8) ioctl$EVIOCGLED(0xffffffffffffffff, 0x80404519, &(0x7f0000000580)=""/236) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f00000001c0)={{{@in6, @in=@multicast1}}, {{@in6=@mcast1}, 0x0, @in=@remote}}, &(0x7f0000000040)=0xe8) ioctl$TIOCGETD(r0, 0x5424, &(0x7f0000000100)) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x443fc, 0x0) ioctl$KVM_SET_BOOT_CPU_ID(r0, 0xae78, &(0x7f0000000080)=0x2) ioctl$EVIOCGKEYCODE_V2(0xffffffffffffffff, 0x80284504, &(0x7f00000003c0)=""/188) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c82, 0x0) ioctl$SNDRV_SEQ_IOCTL_DELETE_QUEUE(r0, 0x408c5333, &(0x7f0000000300)={0x7fff, 0x400, 0xaed, 'queue0\x00', 0x6}) 03:54:03 executing program 1: r0 = socket(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x501000000000000}, 0xc, &(0x7f0000000900)={&(0x7f0000000040)={0x14, 0x1e, 0x201}, 0x14}, 0x1}, 0x0) 03:54:03 executing program 1: r0 = socket(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x11010000}, 0xc, &(0x7f0000000900)={&(0x7f0000000040)={0x14, 0x1e, 0x201}, 0x14}, 0x1}, 0x0) [ 1482.032147] hfsplus: unable to parse mount options [ 1482.072810] hfsplus: unable to parse mount options 03:54:03 executing program 7: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f000000d000)={0xa, 0x4e20}, 0x1c) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}, 0xb}, 0x1c) syz_emit_ethernet(0x3e, &(0x7f00000001c0)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @random="e829f650db0f", [], {@ipv6={0x86dd, {0x0, 0x6, "50a09c", 0x8, 0xffffff11, 0x0, @remote={0xfe, 0x80, [], 0xbb}, @local={0xfe, 0x80, [], 0xaa}, {[], @udp={0x0, 0x4e20, 0x8}}}}}}, &(0x7f0000000040)) syz_emit_ethernet(0x3e, &(0x7f0000000000)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], {@ipv6={0x86dd, {0x0, 0x6, "50a09c", 0x8, 0xffffff11, 0x0, @remote={0xfe, 0x80, [], 0xbb}, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb000000], 0xaa}, {[], @udp={0x300, 0x4e20, 0x8}}}}}}, &(0x7f0000000040)) 03:54:03 executing program 4: r0 = socket(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8d}, 0xc, &(0x7f0000000900)={&(0x7f0000000040)={0x14, 0x1e, 0x201}, 0x14}, 0x1}, 0x0) 03:54:04 executing program 2: r0 = syz_open_dev$sndseq(&(0x7f0000000000)='/dev/snd/seq\x00', 0x0, 0x2) read(r0, &(0x7f0000fb6000)=""/28, 0xfffffffffffffe74) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000418f50)={{0x80}, "0a4ceaa05d9a00000000000000039b3fd4cec307e8ef3d13eb790ec9c65abaf90d229db692542e5b78f8b29e0a27800f0000000000000009fb42f376589701a4", 0xa9824f69d1376637, 0x10800a}) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000240)={0xbf}) write$binfmt_script(r0, &(0x7f0000000000)=ANY=[], 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f00000002c0)={{}, 'port0\x00'}) openat$sequencer2(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer2\x00', 0x0, 0x0) 03:54:04 executing program 5: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer2\x00', 0x0, 0x0) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000040)="025cc83d6d345f8f762070") ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r0, 0x40085112, &(0x7f0000b18000)={{0xffffff93}, {0xffffffa0}, 0x0, 0x0, 0x0, [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800000000000000]}) 03:54:04 executing program 3: ioctl$BLKDISCARD(0xffffffffffffffff, 0x1277, &(0x7f0000000180)) r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140)='/dev/snapshot\x00', 0x0, 0x0) fcntl$addseals(0xffffffffffffffff, 0x409, 0x0) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/vga_arbiter\x00', 0x1, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f0000000000), &(0x7f00000000c0)=0x8) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$EVIOCGLED(0xffffffffffffffff, 0x80404519, &(0x7f0000000580)=""/236) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x80, 0x0) ioctl$EVIOCGKEYCODE_V2(0xffffffffffffffff, 0x80284504, &(0x7f00000003c0)=""/188) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) r4 = ioctl$LOOP_CTL_GET_FREE(r2, 0x4c82) ioctl$LOOP_CTL_ADD(r3, 0x4c82, r4) getsockopt$inet_sctp6_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000040), &(0x7f0000000080)=0x4) 03:54:04 executing program 6: r0 = socket(0x11, 0xa, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000640)={0x0, 0x0, 0x0}, &(0x7f0000000680)=0xc) socketpair(0x9, 0x4, 0xff, &(0x7f0000000000)={0xffffffffffffffff}) ioctl$VHOST_SET_OWNER(r2, 0xaf01, 0x0) syz_mount_image$hfsplus(&(0x7f0000000240)='hfsplus\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, &(0x7f00000005c0), 0x0, &(0x7f00000006c0)={[{@gid={'gid', 0x3d, r1}, 0x2c}]}) 03:54:04 executing program 0: ioctl$BLKDISCARD(0xffffffffffffffff, 0x1277, &(0x7f0000000180)) syz_open_dev$usbmon(&(0x7f0000000080)='/dev/usbmon#\x00', 0xff, 0x4000) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140)='/dev/snapshot\x00', 0x0, 0x0) fcntl$addseals(0xffffffffffffffff, 0x409, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f0000000000), &(0x7f00000000c0)=0x8) pwrite64(r0, &(0x7f00000001c0)="9d732d57b327d1d4fa462886807d009552e56c769010ce195a5e93cd520d103e4df443c48eea375778bddf099b548ae25fea106b66b2440da91f0d5782e033cfb6b4b8aabaacc84337025887dd03f05c1f92758710ca0919d361d6a73d59bb487a9350f0e36fc9c64052284028efd0df655ba313e3a4f0b817355f63b558bfc26badcae8a8c69c96d5e8df301856234f2092fd18d8404fd4", 0x98, 0x28) ioctl$EVIOCGLED(0xffffffffffffffff, 0x80404519, &(0x7f0000000580)=""/236) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x3c, 0x0) ioctl$EVIOCGKEYCODE_V2(0xffffffffffffffff, 0x80284504, &(0x7f00000003c0)=""/188) mprotect(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x5) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) 03:54:04 executing program 1: r0 = socket(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4701}, 0xc, &(0x7f0000000900)={&(0x7f0000000040)={0x14, 0x1e, 0x201}, 0x14}, 0x1}, 0x0) 03:54:04 executing program 4: r0 = socket(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x6b01000000000000}, 0xc, &(0x7f0000000900)={&(0x7f0000000040)={0x14, 0x1e, 0x201}, 0x14}, 0x1}, 0x0) 03:54:04 executing program 7: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f000000d000)={0xa, 0x4e20}, 0x1c) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}, 0xb}, 0x1c) syz_emit_ethernet(0x3e, &(0x7f00000001c0)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @random="e829f650db0f", [], {@ipv6={0x86dd, {0x0, 0x6, "50a09c", 0x8, 0xffffff11, 0x0, @remote={0xfe, 0x80, [], 0xbb}, @local={0xfe, 0x80, [], 0xaa}, {[], @udp={0x0, 0x4e20, 0x8}}}}}}, &(0x7f0000000040)) syz_emit_ethernet(0x3e, &(0x7f0000000000)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], {@ipv6={0x86dd, {0x0, 0x6, "50a09c", 0x8, 0xffffff11, 0x0, @remote={0xfe, 0x80, [], 0xbb}, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x700], 0xaa}, {[], @udp={0x300, 0x4e20, 0x8}}}}}}, &(0x7f0000000040)) 03:54:04 executing program 4: r0 = socket(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0xac000000}, 0xc, &(0x7f0000000900)={&(0x7f0000000040)={0x14, 0x1e, 0x201}, 0x14}, 0x1}, 0x0) 03:54:04 executing program 1: r0 = socket(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x56010000}, 0xc, &(0x7f0000000900)={&(0x7f0000000040)={0x14, 0x1e, 0x201}, 0x14}, 0x1}, 0x0) 03:54:04 executing program 5: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer2\x00', 0x0, 0x0) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000040)="025cc83d6d345f8f762070") ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r0, 0x40085112, &(0x7f0000b18000)={{0xffffff93}, {0xffffffa0}, 0x0, 0x0, 0x0, [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff030000]}) 03:54:04 executing program 3: ioctl$BLKDISCARD(0xffffffffffffffff, 0x1277, &(0x7f0000000180)) r0 = syz_open_dev$dmmidi(&(0x7f0000000040)='/dev/dmmidi#\x00', 0x2, 0xc00) ioctl$EVIOCGID(r0, 0x80084502, &(0x7f0000001680)=""/4096) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140)='/dev/snapshot\x00', 0x0, 0x0) fcntl$addseals(0xffffffffffffffff, 0x409, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f0000000000), &(0x7f00000000c0)=0x8) ioctl$EVIOCGLED(0xffffffffffffffff, 0x80404519, &(0x7f0000000580)=""/236) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x3c, 0x0) r3 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dsp\x00', 0x40, 0x0) ioctl$EVIOCGKEYCODE_V2(0xffffffffffffffff, 0x80284504, &(0x7f00000003c0)=""/188) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) setsockopt$inet_tcp_TLS_RX(r3, 0x6, 0x2, &(0x7f0000000100)={0x303, 0x33}, 0x4) r4 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r4) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c82, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TIMER(r3, 0xc0605345, &(0x7f0000000200)={0xb882, 0x2, {0xffffffffffffffff, 0x2, 0x0, 0x2, 0x5}}) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/loop-control\x00', 0x1, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(r1, 0x84, 0x1e, &(0x7f0000000280), 0x4) 03:54:04 executing program 7: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f000000d000)={0xa, 0x4e20}, 0x1c) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}, 0xb}, 0x1c) syz_emit_ethernet(0x3e, &(0x7f00000001c0)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @random="e829f650db0f", [], {@ipv6={0x86dd, {0x0, 0x6, "50a09c", 0x8, 0xffffff11, 0x0, @remote={0xfe, 0x80, [], 0xbb}, @local={0xfe, 0x80, [], 0xaa}, {[], @udp={0x0, 0x4e20, 0x8}}}}}}, &(0x7f0000000040)) syz_emit_ethernet(0x3e, &(0x7f0000000000)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], {@ipv6={0x86dd, {0x0, 0x6, "50a09c", 0x8, 0xffffff11, 0x0, @remote={0xfe, 0x80, [], 0xbb}, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81000000], 0xaa}, {[], @udp={0x300, 0x4e20, 0x8}}}}}}, &(0x7f0000000040)) 03:54:04 executing program 2: r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000200)='/dev/hwrng\x00', 0x40400, 0x0) setsockopt$SO_VM_SOCKETS_BUFFER_MIN_SIZE(r0, 0x28, 0x1, &(0x7f0000000140)=0x8, 0x8) r1 = syz_open_dev$sndseq(&(0x7f0000dcc000)='/dev/snd/seq\x00', 0x0, 0x2) read(r1, &(0x7f0000fb6000)=""/28, 0x3f0) r2 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x0, 0x0) getsockopt$bt_BT_FLUSHABLE(r2, 0x112, 0x8, &(0x7f0000000040)=0x7, &(0x7f0000000080)=0x4) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r1, 0xc0a85320, &(0x7f0000418f50)={{0x80}, "0a4ceaa05d9a00000000000000039b3fd4cec307e8ef3d13eb790ec9c65abaf90d229db692542e5b78f8b29e0a27800f0000000000000009fb42f376589701a4", 0xa9824f69d1376637, 0x10800a}) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r1, 0x4040534e, &(0x7f0000000240)={0xbf}) write$binfmt_script(r1, &(0x7f0000000380)=ANY=[@ANYRES64=r2, @ANYBLOB="1a042082389898d805f79a0404aa80945af161606854c8a6f7baf7a7a9544a36d6d473d6ddf013b85ea82521c6d0e1a9182e9a5edae3a16a5b87d9a8dffa4852298b507e1c0557ff7bd9c4844f7915deb9e1ac82ff1234f6d3cb142e7cdc607fb141db342037b630a6fdde15716d72a422035474d7e687c78751f1f48c2cb0b7d1c1eac3eb577b238166d1627b6bf59baad96cba30b173198910c2d1bc6150f1fb93e5c4d806e257f9475faa57f8d402a0e7c6f7b29cb58bbe6ff42d667f67e4d7fe6182a08cebad546988d6e300a696b4296a5ef09b0a26d5536c6f9b5db94e1a327f1b66c1e559a4952572d9494fc4f021b0195d6fc293", @ANYRESHEX=r1, @ANYRES32, @ANYRESDEC=r2, @ANYPTR, @ANYRESDEC=r1], 0x146) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r1, 0xc0a85320, &(0x7f00000002c0)={{}, 'port0\x00'}) openat$sequencer2(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer2\x00', 0x0, 0x0) 03:54:05 executing program 1: r0 = socket(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x6001}, 0xc, &(0x7f0000000900)={&(0x7f0000000040)={0x14, 0x1e, 0x201}, 0x14}, 0x1}, 0x0) 03:54:05 executing program 1: r0 = socket(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x143}, 0xc, &(0x7f0000000900)={&(0x7f0000000040)={0x14, 0x1e, 0x201}, 0x14}, 0x1}, 0x0) [ 1483.605355] hfsplus: gid requires an argument [ 1483.610112] hfsplus: unable to parse mount options 03:54:05 executing program 4: r0 = socket(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x6901}, 0xc, &(0x7f0000000900)={&(0x7f0000000040)={0x14, 0x1e, 0x201}, 0x14}, 0x1}, 0x0) 03:54:05 executing program 7: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f000000d000)={0xa, 0x4e20}, 0x1c) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}, 0xb}, 0x1c) syz_emit_ethernet(0x3e, &(0x7f00000001c0)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @random="e829f650db0f", [], {@ipv6={0x86dd, {0x0, 0x6, "50a09c", 0x8, 0xffffff11, 0x0, @remote={0xfe, 0x80, [], 0xbb}, @local={0xfe, 0x80, [], 0xaa}, {[], @udp={0x0, 0x4e20, 0x8}}}}}}, &(0x7f0000000040)) syz_emit_ethernet(0x3e, &(0x7f0000000000)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], {@ipv6={0x86dd, {0x0, 0x6, "50a09c", 0x8, 0xffffff11, 0x0, @remote={0xfe, 0x80, [], 0xbb}, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x806], 0xaa}, {[], @udp={0x300, 0x4e20, 0x8}}}}}}, &(0x7f0000000040)) 03:54:05 executing program 5: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer2\x00', 0x0, 0x0) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000040)="025cc83d6d345f8f762070") ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r0, 0x40085112, &(0x7f0000b18000)={{0xffffff93}, {0xffffffa0}, 0x0, 0x0, 0x0, [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000]}) 03:54:05 executing program 6: r0 = socket(0x11, 0xa, 0x0) openat$autofs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/autofs\x00', 0x100, 0x0) openat$audio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/audio\x00', 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000640)={0x0, 0x0, 0x0}, &(0x7f0000000680)=0xc) syz_mount_image$hfsplus(&(0x7f0000000240)='hfsplus\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000080)="ed59bc8859e63ee902d8a016489e98796f474e811cd66180621d7f167c6b3893418a37cda783b1f7061b650407cfce594b169a04e0d522934ebffb6de9f4740d0720bdeb94c993d1bf199c0e7c1fb2523717ed0048b3dafeb8e837f9af2c02588202be360a234705107be369d951e0f9b0b5eab9bc0c45688a1db2a15c4fba54ce7b22b4a16bc2c89f96e08745b8af341172261fa40c0de32b3bf3a1dc5dc8caf292c6a351fc9992047fd1289b8a8b7fb8dfdae2c21851b63a141833ddbe8e44e47e777ce794b3e35083ae5c5fb48dda15c193f739316db888f894ae2ed84261879c6e7e55d022647a95fba60b39d3d22da526b39ea2", 0xf6, 0x9}, {&(0x7f0000000300)="03c9ae2b57ff8ac5d615b6cd4eb47cf02042ccc7234fb26c9a903da200cb2431beb8cdb379a86f7814135432c4f4bd07fe1381513cd71707080069ac08083d93f4d3b229b6b665e9c3c2ad78dd5428fd5903631e32abc13f6948e31422a353b85c584a530ede90c961f4ee6597926ccbd2150f64080357954607bc4e1ef78c0f6fdbefbec8e80d001078729ed290d40facea557e2d8d75ddbc48d198cb0ee3b568d07c5da2a884d9a29799201f48ac4bc7096a0c9db1ce015e7f0739bb29dd2883d95c2528cb313f72cbd0515cefcfeca8c1d280341584bafc47b85d467914581fc013f29c3edef235d7c3e55875c3", 0xef, 0x7fff}], 0x0, &(0x7f00000006c0)={[{@gid={'gid', 0x3d, r1}, 0x2c}]}) 03:54:05 executing program 1: r0 = socket(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x5300000000000000}, 0xc, &(0x7f0000000900)={&(0x7f0000000040)={0x14, 0x1e, 0x201}, 0x14}, 0x1}, 0x0) 03:54:05 executing program 0: ioctl$BLKDISCARD(0xffffffffffffffff, 0x1277, &(0x7f0000000180)) r0 = syz_open_dev$usbmon(&(0x7f0000000080)='/dev/usbmon#\x00', 0xff, 0x4000) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140)='/dev/snapshot\x00', 0x0, 0x0) fcntl$addseals(0xffffffffffffffff, 0x409, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f0000000000), &(0x7f00000000c0)=0x8) ioctl$EVIOCGLED(0xffffffffffffffff, 0x80404519, &(0x7f0000000580)=""/236) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x3c, 0x0) ioctl$EVIOCGKEYCODE_V2(0xffffffffffffffff, 0x80284504, &(0x7f00000003c0)=""/188) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) r2 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r2) 03:54:05 executing program 3: ioctl$BLKDISCARD(0xffffffffffffffff, 0x1277, &(0x7f0000000180)=0x3) r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140)='/dev/snapshot\x00', 0x0, 0x0) fcntl$addseals(0xffffffffffffffff, 0x409, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f0000000000), &(0x7f00000000c0)=0x8) ioctl$EVIOCGLED(0xffffffffffffffff, 0x80404519, &(0x7f0000000580)=""/236) mq_getsetattr(r0, &(0x7f0000000040)={0x401, 0x2, 0x5, 0x121a46a7, 0x400, 0x3f, 0x2000000, 0x80000000}, &(0x7f0000000080)) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x3c, 0x0) ioctl$EVIOCGKEYCODE_V2(0xffffffffffffffff, 0x80284504, &(0x7f00000003c0)=""/188) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c82, 0x0) [ 1483.874800] hfsplus: gid requires an argument [ 1483.879465] hfsplus: unable to parse mount options 03:54:05 executing program 4: r0 = socket(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x3c}, 0xc, &(0x7f0000000900)={&(0x7f0000000040)={0x14, 0x1e, 0x201}, 0x14}, 0x1}, 0x0) 03:54:05 executing program 7: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f000000d000)={0xa, 0x4e20}, 0x1c) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}, 0xb}, 0x1c) syz_emit_ethernet(0x3e, &(0x7f00000001c0)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @random="e829f650db0f", [], {@ipv6={0x86dd, {0x0, 0x6, "50a09c", 0x8, 0xffffff11, 0x0, @remote={0xfe, 0x80, [], 0xbb}, @local={0xfe, 0x80, [], 0xaa}, {[], @udp={0x0, 0x4e20, 0x8}}}}}}, &(0x7f0000000040)) syz_emit_ethernet(0x3e, &(0x7f0000000000)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], {@ipv6={0x86dd, {0x0, 0x6, "50a09c", 0x8, 0xffffff11, 0x0, @remote={0xfe, 0x80, [], 0xbb}, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x28], 0xaa}, {[], @udp={0x300, 0x4e20, 0x8}}}}}}, &(0x7f0000000040)) 03:54:05 executing program 5: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer2\x00', 0x0, 0x0) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000040)="025cc83d6d345f8f762070") ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r0, 0x40085112, &(0x7f0000b18000)={{0xffffff93}, {0xffffffa0}, 0x0, 0x0, 0x0, [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4]}) 03:54:05 executing program 1: r0 = socket(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x2a00000000000000}, 0xc, &(0x7f0000000900)={&(0x7f0000000040)={0x14, 0x1e, 0x201}, 0x14}, 0x1}, 0x0) 03:54:05 executing program 3: ioctl$BLKDISCARD(0xffffffffffffffff, 0x1277, &(0x7f0000000180)) r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x101, 0x0) ioctl$EVIOCSABS20(r0, 0x401845e0, &(0x7f0000000080)={0x9fb7, 0xffffffffffffff6f, 0x8, 0x7, 0x5, 0x1}) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140)='/dev/snapshot\x00', 0x0, 0x0) fcntl$addseals(0xffffffffffffffff, 0x409, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f0000000000), &(0x7f00000000c0)=0x8) ioctl$EVIOCGLED(0xffffffffffffffff, 0x80404519, &(0x7f0000000580)=""/236) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x3c, 0x0) ioctl$EVIOCGKEYCODE_V2(0xffffffffffffffff, 0x80284504, &(0x7f00000003c0)=""/188) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c82, 0x0) ioctl$KDADDIO(r0, 0x4b34, 0x8) 03:54:05 executing program 0: ioctl$BLKDISCARD(0xffffffffffffffff, 0x1277, &(0x7f0000000180)) r0 = syz_open_dev$usbmon(&(0x7f0000000080)='/dev/usbmon#\x00', 0xff, 0x4000) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140)='/dev/snapshot\x00', 0x0, 0x0) fcntl$addseals(0xffffffffffffffff, 0x409, 0x0) ioctl$sock_SIOCOUTQNSD(r0, 0x894b, &(0x7f0000000040)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r1) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f0000000000), &(0x7f00000000c0)=0x8) ioctl$EVIOCGLED(0xffffffffffffffff, 0x80404519, &(0x7f0000000580)=""/236) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x3c, 0x0) ioctl$EVIOCGKEYCODE_V2(0xffffffffffffffff, 0x80284504, &(0x7f00000003c0)=""/188) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) [ 1484.134763] hfsplus: gid requires an argument [ 1484.139464] hfsplus: unable to parse mount options [ 1484.186845] hfsplus: gid requires an argument [ 1484.191477] hfsplus: unable to parse mount options 03:54:06 executing program 2: r0 = syz_open_dev$sndseq(&(0x7f0000dcc000)='/dev/snd/seq\x00', 0x0, 0x2) read(r0, &(0x7f0000fb6000)=""/28, 0x3f0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000418f50)={{0x80}, "0a4ceaa05d9a00000000000000039b3fd4cec307e8ef3d13eb790ec9c65abaf90d229db692542e5b78f8b29e0a27800f0000000000000009fb42f376589701a4", 0xa9824f69d1376637, 0x10800a}) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000240)={0xbf}) write$binfmt_script(r0, &(0x7f0000000000)=ANY=[], 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f00000002c0)={{}, 'port0\x00'}) r1 = syz_open_dev$adsp(&(0x7f0000000000)='/dev/adsp#\x00', 0x8001, 0x6040) ioctl$KVM_GET_SUPPORTED_CPUID(r1, 0xc008ae05, &(0x7f0000000040)=""/127) openat$sequencer2(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer2\x00', 0x0, 0x0) 03:54:06 executing program 4: r0 = socket(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x6c000000}, 0xc, &(0x7f0000000900)={&(0x7f0000000040)={0x14, 0x1e, 0x201}, 0x14}, 0x1}, 0x0) 03:54:06 executing program 1: r0 = socket(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1a010000}, 0xc, &(0x7f0000000900)={&(0x7f0000000040)={0x14, 0x1e, 0x201}, 0x14}, 0x1}, 0x0) 03:54:06 executing program 5: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer2\x00', 0x0, 0x0) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000040)="025cc83d6d345f8f762070") ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r0, 0x40085112, &(0x7f0000b18000)={{0xffffff93}, {0xffffffa0}, 0x0, 0x0, 0x0, [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5]}) 03:54:06 executing program 7: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f000000d000)={0xa, 0x4e20}, 0x1c) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}, 0xb}, 0x1c) syz_emit_ethernet(0x3e, &(0x7f00000001c0)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @random="e829f650db0f", [], {@ipv6={0x86dd, {0x0, 0x6, "50a09c", 0x8, 0xffffff11, 0x0, @remote={0xfe, 0x80, [], 0xbb}, @local={0xfe, 0x80, [], 0xaa}, {[], @udp={0x0, 0x4e20, 0x8}}}}}}, &(0x7f0000000040)) syz_emit_ethernet(0x3e, &(0x7f0000000000)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], {@ipv6={0x86dd, {0x0, 0x6, "50a09c", 0x8, 0xffffff11, 0x0, @remote={0xfe, 0x80, [], 0xbb}, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x88a8ffff00000000], 0xaa}, {[], @udp={0x300, 0x4e20, 0x8}}}}}}, &(0x7f0000000040)) 03:54:06 executing program 6: r0 = socket(0x5, 0xa, 0xff) getsockopt$inet_sctp_SCTP_MAX_BURST(r0, 0x84, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x4) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000640), &(0x7f00000000c0)=0xc) remap_file_pages(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0xc, 0x1f, 0x800) r1 = syz_open_dev$dmmidi(&(0x7f0000000100)='/dev/dmmidi#\x00', 0x1, 0x20802) ioctl$KVM_CHECK_EXTENSION(r1, 0xae03, 0xea) setsockopt$bt_hci_HCI_TIME_STAMP(r0, 0x0, 0x3, &(0x7f0000000080), 0x4) 03:54:06 executing program 3: ioctl$BLKDISCARD(0xffffffffffffffff, 0x1277, &(0x7f0000000180)) r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140)='/dev/snapshot\x00', 0x0, 0x0) fcntl$addseals(0xffffffffffffffff, 0x409, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f0000000000), &(0x7f00000000c0)=0x8) ioctl$EVIOCGLED(0xffffffffffffffff, 0x80404519, &(0x7f0000000580)=""/236) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x3c, 0x0) ioctl$EVIOCGKEYCODE_V2(0xffffffffffffffff, 0x80284504, &(0x7f00000003c0)=""/188) getsockopt$bt_rfcomm_RFCOMM_CONNINFO(r0, 0x12, 0x2, &(0x7f0000000680)=""/4096, &(0x7f0000000040)=0x1000) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c82, 0x0) 03:54:06 executing program 0: ioctl$BLKDISCARD(0xffffffffffffffff, 0x1277, &(0x7f0000000180)) r0 = syz_open_dev$usbmon(&(0x7f0000000080)='/dev/usbmon#\x00', 0xff, 0x4000) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140)='/dev/snapshot\x00', 0x0, 0x0) ioctl$EVIOCGMASK(r0, 0x80104592, &(0x7f0000000040)={0x12, 0x9b, &(0x7f00000001c0)="0707d805637ceaff9503e4450065bf989845d075387f78dc3b5f53ed1991201d0020554f9b0fa33c306e65ee433f88bca770fedb42b52d1c1b2fa66e803cea7838f3c7f734ce6fc73cb16ae1e140e81b49a42581e1ae7a84aa4beda8e30efb1aaeaa91852197576ef116cd71fdd63a84c6daa832fac6ae1fa71c8b6402793275166e2c54738066352cdf7686541fd6da7c64b8c42cedde8f501732"}) fcntl$addseals(0xffffffffffffffff, 0x409, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f0000000000), &(0x7f00000000c0)=0x8) ioctl$EVIOCGLED(0xffffffffffffffff, 0x80404519, &(0x7f0000000580)=""/236) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x3c, 0x0) ioctl$EVIOCGKEYCODE_V2(0xffffffffffffffff, 0x80284504, &(0x7f00000003c0)=""/188) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) 03:54:06 executing program 7: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f000000d000)={0xa, 0x4e20}, 0x1c) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}, 0xb}, 0x1c) syz_emit_ethernet(0x3e, &(0x7f00000001c0)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @random="e829f650db0f", [], {@ipv6={0x86dd, {0x0, 0x6, "50a09c", 0x8, 0xffffff11, 0x0, @remote={0xfe, 0x80, [], 0xbb}, @local={0xfe, 0x80, [], 0xaa}, {[], @udp={0x0, 0x4e20, 0x8}}}}}}, &(0x7f0000000040)) syz_emit_ethernet(0x3e, &(0x7f0000000000)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], {@ipv6={0x86dd, {0x0, 0x6, "50a09c", 0x8, 0xffffff11, 0x0, @remote={0xfe, 0x80, [], 0xbb}, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb00000000000000], 0xaa}, {[], @udp={0x300, 0x4e20, 0x8}}}}}}, &(0x7f0000000040)) 03:54:06 executing program 4: r0 = socket(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0xc3000000}, 0xc, &(0x7f0000000900)={&(0x7f0000000040)={0x14, 0x1e, 0x201}, 0x14}, 0x1}, 0x0) 03:54:06 executing program 1: r0 = socket(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4200}, 0xc, &(0x7f0000000900)={&(0x7f0000000040)={0x14, 0x1e, 0x201}, 0x14}, 0x1}, 0x0) 03:54:06 executing program 5: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer2\x00', 0x0, 0x0) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000040)="025cc83d6d345f8f762070") ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r0, 0x40085112, &(0x7f0000b18000)={{0xffffff93}, {0xffffffa0}, 0x0, 0x0, 0x0, [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000]}) 03:54:06 executing program 6: r0 = socket(0x11, 0xa, 0x0) setsockopt$inet_mreq(r0, 0x0, 0x24, &(0x7f0000000000)={@rand_addr=0xfff, @loopback=0x7f000001}, 0xffffffffffffffbb) ioctl$EVIOCSABS0(r0, 0x401845c0, &(0x7f0000000040)={0x3, 0x0, 0x20, 0x5, 0x0, 0x80}) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000640)={0x0, 0x0, 0x0}, &(0x7f0000000680)=0xc) syz_mount_image$hfsplus(&(0x7f0000000240)='hfsplus\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, &(0x7f00000005c0), 0x0, &(0x7f00000006c0)={[{@gid={'gid', 0x3d, r1}, 0x2c}]}) 03:54:06 executing program 3: ioctl$BLKDISCARD(0xffffffffffffffff, 0x1277, &(0x7f0000000180)) r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140)='/dev/snapshot\x00', 0x0, 0x0) fcntl$addseals(0xffffffffffffffff, 0x409, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f0000000000), &(0x7f00000000c0)=0x8) ioctl$EVIOCGLED(0xffffffffffffffff, 0x80404519, &(0x7f0000000580)=""/236) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x3c, 0x0) ioctl$EVIOCGKEYCODE_V2(0xffffffffffffffff, 0x80284504, &(0x7f00000003c0)=""/188) r2 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c82, 0x0) 03:54:06 executing program 0: ioctl$BLKDISCARD(0xffffffffffffffff, 0x1277, &(0x7f0000000180)) r0 = syz_open_dev$usbmon(&(0x7f0000000080)='/dev/usbmon#\x00', 0xff, 0x4000) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140)='/dev/snapshot\x00', 0x0, 0x0) fcntl$addseals(0xffffffffffffffff, 0x409, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f0000000000), &(0x7f00000000c0)=0x8) ioctl$EVIOCGLED(0xffffffffffffffff, 0x80404519, &(0x7f0000000580)=""/236) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x3c, 0x0) ioctl$EVIOCGKEYCODE_V2(0xffffffffffffffff, 0x80284504, &(0x7f00000003c0)=""/188) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f00000001c0)=[@in={0x2, 0x4e21, @rand_addr=0x1}, @in6={0xa, 0x4e20, 0x9, @mcast2={0xff, 0x2, [], 0x1}, 0x800}, @in6={0xa, 0x4e22, 0x1, @remote={0xfe, 0x80, [], 0xbb}, 0x401}], 0x48) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffff9c, 0x4c82) ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) r3 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r3) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) 03:54:06 executing program 1: r0 = socket(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x5b00000000000000}, 0xc, &(0x7f0000000900)={&(0x7f0000000040)={0x14, 0x1e, 0x201}, 0x14}, 0x1}, 0x0) [ 1485.066673] hfsplus: gid requires an argument [ 1485.071347] hfsplus: unable to parse mount options [ 1485.097786] hfsplus: gid requires an argument [ 1485.102475] hfsplus: unable to parse mount options 03:54:07 executing program 2: r0 = syz_open_dev$sndseq(&(0x7f0000dcc000)='/dev/snd/seq\x00', 0x0, 0x2) read(r0, &(0x7f0000fb6000)=""/28, 0x4e7) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000418f50)={{0x80}, "0a4ceaa05d9a00000000000000039b3fd4cec307e8ef3d13eb790ec9c65abaf90d229db692542e5b78f8b29e0a27800f0000000000000009fb42f376589701a4", 0xa9824f69d1376637, 0x10800a}) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000240)={0xbf}) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x2000, 0x0) ioctl$EVIOCGKEY(r1, 0x80404518, &(0x7f0000000100)=""/151) write$binfmt_script(r0, &(0x7f0000000000)=ANY=[], 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f00000002c0)={{}, 'port0\x00'}) openat$sequencer2(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer2\x00', 0x0, 0x0) 03:54:07 executing program 4: r0 = socket(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x36010000}, 0xc, &(0x7f0000000900)={&(0x7f0000000040)={0x14, 0x1e, 0x201}, 0x14}, 0x1}, 0x0) 03:54:07 executing program 7: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f000000d000)={0xa, 0x4e20}, 0x1c) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}, 0xb}, 0x1c) syz_emit_ethernet(0x3e, &(0x7f00000001c0)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @random="e829f650db0f", [], {@ipv6={0x86dd, {0x0, 0x6, "50a09c", 0x8, 0xffffff11, 0x0, @remote={0xfe, 0x80, [], 0xbb}, @local={0xfe, 0x80, [], 0xaa}, {[], @udp={0x0, 0x4e20, 0x8}}}}}}, &(0x7f0000000040)) syz_emit_ethernet(0x3e, &(0x7f0000000000)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], {@ipv6={0x86dd, {0x0, 0x6, "50a09c", 0x8, 0xffffff11, 0x0, @remote={0xfe, 0x80, [], 0xbb}, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x500000000000000], 0xaa}, {[], @udp={0x300, 0x4e20, 0x8}}}}}}, &(0x7f0000000040)) 03:54:07 executing program 5: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer2\x00', 0x0, 0x0) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000040)="025cc83d6d345f8f762070") ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r0, 0x40085112, &(0x7f0000b18000)={{0xffffff93}, {0xffffffa0}, 0x0, 0x0, 0x0, [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfdffffff]}) 03:54:07 executing program 6: r0 = socket(0x11, 0xa, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000640)={0x0, 0x0, 0x0}, &(0x7f0000000680)=0xc) syz_mount_image$hfsplus(&(0x7f0000000240)='hfsplus\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, &(0x7f00000005c0), 0x0, &(0x7f00000006c0)={[{@gid={'gid', 0x3d, r1}, 0x2c}]}) connect$unix(r0, &(0x7f0000000000)=@file={0x0, './file0\x00'}, 0x6e) 03:54:07 executing program 3: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/cuse\x00', 0x80000, 0x0) ioctl$BLKDISCARD(r0, 0x1277, &(0x7f0000000180)=0xfffffffffffffffc) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140)='/dev/snapshot\x00', 0x0, 0x0) fcntl$addseals(0xffffffffffffffff, 0x409, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f0000000000), &(0x7f00000000c0)=0x8) ioctl$EVIOCGLED(0xffffffffffffffff, 0x80404519, &(0x7f0000000580)=""/236) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x3c, 0x0) r3 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/mixer\x00', 0x404000, 0x0) ioctl$EVIOCGKEYCODE_V2(0xffffffffffffffff, 0x80284504, &(0x7f00000003c0)=""/188) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) ioctl$LOOP_CTL_GET_FREE(r3, 0x4c82) read(r1, &(0x7f00000001c0)=""/85, 0x55) ioctl$LOOP_CTL_GET_FREE(r3, 0x4c82) ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x200000, 0x0) ioctl$LOOP_CTL_GET_FREE(r2, 0x4c82) ioctl$LOOP_CTL_GET_FREE(r3, 0x4c82) ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) r4 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_ADD(r3, 0x4c82, r4) 03:54:07 executing program 1: r0 = socket(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8e010000}, 0xc, &(0x7f0000000900)={&(0x7f0000000040)={0x14, 0x1e, 0x201}, 0x14}, 0x1}, 0x0) 03:54:07 executing program 0: ioctl$BLKDISCARD(0xffffffffffffffff, 0x1277, &(0x7f0000000180)) syz_open_dev$usbmon(&(0x7f0000000080)='/dev/usbmon#\x00', 0xff, 0x4000) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140)='/dev/snapshot\x00', 0x0, 0x0) fcntl$addseals(0xffffffffffffffff, 0x409, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f0000000000)={0x0, 0x400000000000000}, &(0x7f0000000040)=0x8) ioctl$EVIOCGLED(0xffffffffffffffff, 0x80404519, &(0x7f0000000580)=""/236) munlock(&(0x7f0000ffc000/0x2000)=nil, 0x2000) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x3c, 0x0) ioctl$EVIOCGKEYCODE_V2(0xffffffffffffffff, 0x80284504, &(0x7f00000003c0)=""/188) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) [ 1486.169616] hfsplus: gid requires an argument [ 1486.174320] hfsplus: unable to parse mount options [ 1486.192010] hfsplus: gid requires an argument [ 1486.196733] hfsplus: unable to parse mount options 03:54:07 executing program 7: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f000000d000)={0xa, 0x4e20}, 0x1c) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}, 0xb}, 0x1c) syz_emit_ethernet(0x3e, &(0x7f00000001c0)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @random="e829f650db0f", [], {@ipv6={0x86dd, {0x0, 0x6, "50a09c", 0x8, 0xffffff11, 0x0, @remote={0xfe, 0x80, [], 0xbb}, @local={0xfe, 0x80, [], 0xaa}, {[], @udp={0x0, 0x4e20, 0x8}}}}}}, &(0x7f0000000040)) syz_emit_ethernet(0x3e, &(0x7f0000000000)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], {@ipv6={0x86dd, {0x0, 0x6, "50a09c", 0x8, 0xffffff11, 0x0, @remote={0xfe, 0x80, [], 0xbb}, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb], 0xaa}, {[], @udp={0x300, 0x4e20, 0x8}}}}}}, &(0x7f0000000040)) 03:54:07 executing program 1: r0 = socket(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x19000000}, 0xc, &(0x7f0000000900)={&(0x7f0000000040)={0x14, 0x1e, 0x201}, 0x14}, 0x1}, 0x0) 03:54:07 executing program 4: r0 = socket(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0xa601000000000000}, 0xc, &(0x7f0000000900)={&(0x7f0000000040)={0x14, 0x1e, 0x201}, 0x14}, 0x1}, 0x0) 03:54:07 executing program 6: r0 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x8, 0x26140) ioctl$KVM_SET_MP_STATE(r0, 0x4004ae99, &(0x7f0000000040)=0x4) r1 = socket(0x11, 0xa, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000640)={0x0, 0x0, 0x0}, &(0x7f0000000680)=0xc) syz_mount_image$hfsplus(&(0x7f0000000240)='hfsplus\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, &(0x7f00000005c0), 0x0, &(0x7f00000006c0)={[{@gid={'gid', 0x3d, r2}, 0x2c}]}) syz_mount_image$hfsplus(&(0x7f00000000c0)='hfsplus\x00', &(0x7f0000000100)='./file0\x00', 0xfffffffffffffffd, 0x3, &(0x7f0000000400)=[{&(0x7f0000000140)="f9cc37cb64458e5f591f19d81daac1660a25dfa35d280bd58e40c7a4f8fee1d5e9c87380b5d5e901235e0fec802ea77cdbd588870a448338b1844d40a12876b7297cb0ea6b307a2910a80bd57aabf76f5c37b99a1dde4f70405d58c8e2736dd6c6a9c26f973a0b71228c995a41ae481fd4a97323e325c38cab45b2e3f6aa56acac05d641eff3da187f3c6f305260cc4a3c3f88a11135da22e28ca74218f73021a8b1202f4445d2f490f7d1f224cf352a02dc", 0xb2, 0x5}, {&(0x7f0000000200)="594a7067f67d42f016bfb2bfd478152e085b91ddedbbc4373661a4742b5a3ba3846591fad2aadefc0b", 0x29, 0x89}, {&(0x7f0000000300)="dc80bc47c40392bca334c9f0a32c5d5842c4d95adf740924b4d5b62063f365f59b15d53c13626672eec17011a564365c127bff0023f19a658dc9e66e043ffd3d20a8b396324b90866c735c963ca141c38a9d3af4df598acf6539c5bb0f65fdf1d0f37ed2a6818079a45edecfe1528f9a98d775c5e19d254f3d2a5ca95f8d5103aa80f4bdcb86023e8400c95ada594888b26edc89b3e3ce8eca004f89ba022db637714ab0df4756c74567b078bd8bb8c167a7bf3fe8975d7ec0a8c65ecbfbd3a89d94082b007121aebcd94ca9892cfb77493c29701d7d1f8dcdcbc7cf719afae617dc575f212b", 0xe6, 0x3}], 0x1000000, &(0x7f0000000280)={[{@decompose='decompose', 0x2c}, {@gid={'gid', 0x3d, r2}, 0x2c}]}) ioctl$VHOST_SET_VRING_BUSYLOOP_TIMEOUT(r0, 0x4008af23, &(0x7f0000000080)={0x3, 0x8}) 03:54:07 executing program 5: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer2\x00', 0x0, 0x0) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000040)="025cc83d6d345f8f762070") ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r0, 0x40085112, &(0x7f0000b18000)={{0xffffff93}, {0xffffffa0}, 0x0, 0x0, 0x0, [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f00]}) 03:54:08 executing program 1: r0 = socket(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x9401000000000000}, 0xc, &(0x7f0000000900)={&(0x7f0000000040)={0x14, 0x1e, 0x201}, 0x14}, 0x1}, 0x0) 03:54:08 executing program 1: r0 = socket(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0xb00000000000000}, 0xc, &(0x7f0000000900)={&(0x7f0000000040)={0x14, 0x1e, 0x201}, 0x14}, 0x1}, 0x0) 03:54:08 executing program 3: ioctl$BLKDISCARD(0xffffffffffffffff, 0x1277, &(0x7f0000000180)) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x40, 0x0) fcntl$addseals(0xffffffffffffffff, 0x409, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f0000000000), &(0x7f00000000c0)=0x8) ioctl$EVIOCGLED(0xffffffffffffffff, 0x80404519, &(0x7f0000000580)=""/236) syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x88d1, 0x400) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x3c, 0x0) ioctl$EVIOCGKEYCODE_V2(0xffffffffffffffff, 0x80284504, &(0x7f00000003c0)=""/188) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c82, 0x0) [ 1486.630916] hfsplus: gid requires an argument [ 1486.635529] hfsplus: unable to parse mount options [ 1486.668438] hfsplus: gid requires an argument [ 1486.673152] hfsplus: unable to parse mount options [ 1486.692517] hfsplus: gid requires an argument [ 1486.697199] hfsplus: unable to parse mount options [ 1486.720463] hfsplus: gid requires an argument [ 1486.725251] hfsplus: unable to parse mount options 03:54:08 executing program 5: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer2\x00', 0x0, 0x0) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000040)="025cc83d6d345f8f762070") ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r0, 0x40085112, &(0x7f0000b18000)={{0xffffff93}, {0xffffffa0}, 0x0, 0x0, 0x0, [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f00000000000000]}) 03:54:08 executing program 0: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='cpu.stat\x00', 0x0, 0x0) r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000100)='/dev/zero\x00', 0x2, 0x0) dup(0xffffffffffffff9c) r1 = syz_open_dev$mice(&(0x7f0000000200)='/dev/input/mice\x00', 0x0, 0x0) ioctl$BLKDISCARD(r1, 0x1277, &(0x7f00000001c0)=0x3) r2 = syz_open_dev$usbmon(&(0x7f0000000080)='/dev/usbmon#\x00', 0xff, 0x4000) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140)='/dev/snapshot\x00', 0x0, 0x0) fcntl$addseals(r2, 0x409, 0x800002) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f0000000000), &(0x7f00000000c0)=0x8) ioctl$EVIOCGLED(r0, 0x80404519, &(0x7f0000000780)=""/236) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x3c, 0x0) ioctl$EVIOCGKEYCODE_V2(0xffffffffffffffff, 0x80284504, &(0x7f00000003c0)=""/188) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) openat$dsp(0xffffffffffffff9c, &(0x7f0000000180)='/dev/dsp\x00', 0x240000, 0x0) ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x0) 03:54:08 executing program 4: r0 = socket(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x9f000000}, 0xc, &(0x7f0000000900)={&(0x7f0000000040)={0x14, 0x1e, 0x201}, 0x14}, 0x1}, 0x0) 03:54:08 executing program 1: r0 = socket(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0xad00000000000000}, 0xc, &(0x7f0000000900)={&(0x7f0000000040)={0x14, 0x1e, 0x201}, 0x14}, 0x1}, 0x0) 03:54:09 executing program 2: r0 = syz_open_dev$sndseq(&(0x7f0000dcc000)='/dev/snd/seq\x00', 0x0, 0x3) read(r0, &(0x7f0000fb6000)=""/28, 0x3f0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000418f50)={{0x80}, "0a4ceaa05d9a00000000000000039b3fd4cec307e8ef3d13eb790ec9c65abaf90d229db692542e5b78f8b29e0a27800f0000000000000009fb42f376589701a4", 0xa9824f69d1376637, 0x10800a}) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000240)={0xbf}) write$binfmt_script(r0, &(0x7f0000000000)=ANY=[], 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f00000002c0)={{}, 'port0\x00'}) openat$sequencer2(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer2\x00', 0x0, 0x0) 03:54:09 executing program 7: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f000000d000)={0xa, 0x4e20}, 0x1c) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}, 0xb}, 0x1c) syz_emit_ethernet(0x3e, &(0x7f00000001c0)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @random="e829f650db0f", [], {@ipv6={0x86dd, {0x0, 0x6, "50a09c", 0x8, 0xffffff11, 0x0, @remote={0xfe, 0x80, [], 0xbb}, @local={0xfe, 0x80, [], 0xaa}, {[], @udp={0x0, 0x4e20, 0x8}}}}}}, &(0x7f0000000040)) syz_emit_ethernet(0x3e, &(0x7f0000000000)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], {@ipv6={0x86dd, {0x0, 0x6, "50a09c", 0x8, 0xffffff11, 0x0, @remote={0xfe, 0x80, [], 0xbb}, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8848], 0xaa}, {[], @udp={0x300, 0x4e20, 0x8}}}}}}, &(0x7f0000000040)) 03:54:09 executing program 6: r0 = socket(0x11, 0xa, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000640)={0x0, 0x0, 0x0}, &(0x7f0000000680)=0xc) r2 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x0, 0x0) write$P9_RATTACH(r2, &(0x7f0000000040)={0x14, 0x69, 0x1, {0x2, 0x2, 0x8}}, 0x14) accept4$unix(r2, &(0x7f0000000080), &(0x7f0000000100)=0x6e, 0x80000) syz_mount_image$hfsplus(&(0x7f0000000240)='hfsplus\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, &(0x7f00000005c0), 0x0, &(0x7f00000006c0)={[{@gid={'gid', 0x3d, r1}, 0x2c}]}) 03:54:09 executing program 3: ioctl$BLKDISCARD(0xffffffffffffffff, 0x1277, &(0x7f0000000180)) r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x20000000000001, 0x0) fcntl$addseals(0xffffffffffffffff, 0x409, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f0000000000), &(0x7f00000000c0)=0x8) ioctl$EVIOCGLED(0xffffffffffffffff, 0x80404519, &(0x7f0000000580)=""/236) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x3c, 0x0) ioctl$EVIOCGKEYCODE_V2(r0, 0x80284504, &(0x7f00000003c0)=""/188) ioctl$KDGKBENT(r0, 0x4b46, &(0x7f0000000040)={0x6, 0x7f, 0x5}) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c82, 0x0) 03:54:09 executing program 4: r0 = socket(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x163}, 0xc, &(0x7f0000000900)={&(0x7f0000000040)={0x14, 0x1e, 0x201}, 0x14}, 0x1}, 0x0) 03:54:09 executing program 1: r0 = socket(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x3f00}, 0xc, &(0x7f0000000900)={&(0x7f0000000040)={0x14, 0x1e, 0x201}, 0x14}, 0x1}, 0x0) 03:54:09 executing program 5: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer2\x00', 0x0, 0x0) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000040)="025cc83d6d345f8f762070") ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r0, 0x40085112, &(0x7f0000b18000)={{0xffffff93}, {0xffffffa0}, 0x0, 0x0, 0x0, [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x500000000000000]}) 03:54:09 executing program 7: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f000000d000)={0xa, 0x4e20}, 0x1c) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}, 0xb}, 0x1c) syz_emit_ethernet(0x3e, &(0x7f00000001c0)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @random="e829f650db0f", [], {@ipv6={0x86dd, {0x0, 0x6, "50a09c", 0x8, 0xffffff11, 0x0, @remote={0xfe, 0x80, [], 0xbb}, @local={0xfe, 0x80, [], 0xaa}, {[], @udp={0x0, 0x4e20, 0x8}}}}}}, &(0x7f0000000040)) syz_emit_ethernet(0x3e, &(0x7f0000000000)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], {@ipv6={0x86dd, {0x0, 0x6, "50a09c", 0x8, 0xffffff11, 0x0, @remote={0xfe, 0x80, [], 0xbb}, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2800000000000000], 0xaa}, {[], @udp={0x300, 0x4e20, 0x8}}}}}}, &(0x7f0000000040)) 03:54:09 executing program 1: r0 = socket(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x138}, 0xc, &(0x7f0000000900)={&(0x7f0000000040)={0x14, 0x1e, 0x201}, 0x14}, 0x1}, 0x0) 03:54:09 executing program 3: ioctl$BLKDISCARD(0xffffffffffffffff, 0x1277, &(0x7f0000000180)) r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x0, 0x0) fcntl$addseals(0xffffffffffffffff, 0x409, 0x0) r1 = getpgid(0x0) wait4(r1, &(0x7f0000000280), 0x0, &(0x7f0000000300)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f0000000000), &(0x7f00000000c0)=0x8) ioctl$EVIOCGLED(0xffffffffffffffff, 0x80404519, &(0x7f0000000580)=""/236) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x3c, 0x0) ioctl$EVIOCGKEYCODE_V2(0xffffffffffffffff, 0x80284504, &(0x7f00000003c0)=""/188) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) accept4(r0, &(0x7f0000000100)=@xdp={0x0, 0x0, 0x0}, &(0x7f00000001c0)=0x80, 0x800) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f0000000200)={@mcast2={0xff, 0x2, [], 0x1}, @local={0xfe, 0x80, [], 0xaa}, @ipv4={[], [0xff, 0xff], @loopback=0x7f000001}, 0x4, 0x8, 0x966, 0x500, 0x7, 0x400000, r2}) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c82, 0x0) write$P9_RMKDIR(r0, &(0x7f0000000040)={0x14, 0x49, 0x1, {0x18, 0x4, 0x4}}, 0x14) [ 1487.789437] hfsplus: gid requires an argument [ 1487.794077] hfsplus: unable to parse mount options 03:54:09 executing program 0: ioctl$BLKDISCARD(0xffffffffffffffff, 0x1277, &(0x7f0000000180)) r0 = syz_open_dev$usbmon(&(0x7f0000000080)='/dev/usbmon#\x00', 0xff, 0x4000) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140)='/dev/snapshot\x00', 0x0, 0x0) fcntl$addseals(0xffffffffffffffff, 0x409, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f0000000000), &(0x7f00000000c0)=0x8) ioctl$EVIOCGLED(0xffffffffffffffff, 0x80404519, &(0x7f0000000580)=""/236) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x3c, 0x0) ioctl$EVIOCGKEYCODE_V2(0xffffffffffffffff, 0x80284504, &(0x7f00000003c0)=""/188) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) getsockopt$inet_sctp6_SCTP_I_WANT_MAPPED_V4_ADDR(r0, 0x84, 0xc, &(0x7f0000000040), &(0x7f0000000100)=0x4) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) 03:54:09 executing program 7: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f000000d000)={0xa, 0x4e20}, 0x1c) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}, 0xb}, 0x1c) syz_emit_ethernet(0x3e, &(0x7f00000001c0)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @random="e829f650db0f", [], {@ipv6={0x86dd, {0x0, 0x6, "50a09c", 0x8, 0xffffff11, 0x0, @remote={0xfe, 0x80, [], 0xbb}, @local={0xfe, 0x80, [], 0xaa}, {[], @udp={0x0, 0x4e20, 0x8}}}}}}, &(0x7f0000000040)) syz_emit_ethernet(0x3e, &(0x7f0000000000)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], {@ipv6={0x86dd, {0x0, 0x6, "50a09c", 0x8, 0xffffff11, 0x0, @remote={0xfe, 0x80, [], 0xbb}, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x600], 0xaa}, {[], @udp={0x300, 0x4e20, 0x8}}}}}}, &(0x7f0000000040)) [ 1487.863268] hfsplus: gid requires an argument [ 1487.867959] hfsplus: unable to parse mount options 03:54:09 executing program 4: r0 = socket(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x185}, 0xc, &(0x7f0000000900)={&(0x7f0000000040)={0x14, 0x1e, 0x201}, 0x14}, 0x1}, 0x0) 03:54:09 executing program 1: r0 = socket(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0xc400000000000000}, 0xc, &(0x7f0000000900)={&(0x7f0000000040)={0x14, 0x1e, 0x201}, 0x14}, 0x1}, 0x0) 03:54:09 executing program 5: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer2\x00', 0x0, 0x0) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000040)="025cc83d6d345f8f762070") ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r0, 0x40085112, &(0x7f0000b18000)={{0xffffff93}, {0xffffffa0}, 0x0, 0x0, 0x0, [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000000000]}) 03:54:09 executing program 2: r0 = syz_open_dev$sndseq(&(0x7f0000dcc000)='/dev/snd/seq\x00', 0x0, 0x2) read(r0, &(0x7f0000fb6000)=""/28, 0x3f0) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x80000, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX(r1, 0x84, 0x6e, &(0x7f0000000040)=[@in6={0xa, 0x4e20, 0x0, @remote={0xfe, 0x80, [], 0xbb}, 0xfffffffffffffffb}, @in6={0xa, 0x4e23, 0x5, @mcast1={0xff, 0x1, [], 0x1}, 0xffff}, @in6={0xa, 0x4e21, 0x8000, @empty, 0x100000001}, @in6={0xa, 0x4e23, 0x5, @remote={0xfe, 0x80, [], 0xbb}, 0x40}, @in={0x2, 0x4e22, @loopback=0x7f000001}], 0x80) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000418f50)={{0x80}, "0a4ceaa05d9a00000000000000039b3fd4cec307e8ef3d13eb790ec9c65abaf90d229db692542e5b78f8b29e0a27800f0000000000000009fb42f376589701a4", 0xa9824f69d1376637, 0x10800a}) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000240)={0xbf}) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000140)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DEST(r1, &(0x7f0000000200)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x12040120}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x24, r2, 0x204, 0x70bd28, 0x25dfdbfe, {0x5}, [@IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x5}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x100000001}]}, 0x24}, 0x1, 0x0, 0x0, 0x800}, 0x40000) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_CLIENT(r1, 0x404c534a, &(0x7f00000003c0)={0x8, 0x3, 0x2}) r3 = socket$can_raw(0x1d, 0x3, 0x1) r4 = syz_genetlink_get_family_id$team(&(0x7f0000000480)='team\x00') getsockopt$inet_mreqn(r1, 0x0, 0x20, &(0x7f00000004c0)={@local, @empty, 0x0}, &(0x7f0000000500)=0xc) getsockopt$inet_mreqn(r1, 0x0, 0x24, &(0x7f0000000540)={@multicast2, @loopback, 0x0}, &(0x7f0000000580)=0xc) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f00000006c0)={{{@in6=@ipv4={[], [], @multicast2}, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@dev}, 0x0, @in6=@loopback}}, &(0x7f00000007c0)=0xe8) getsockname$packet(r1, &(0x7f0000000800)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @random}, &(0x7f0000000840)=0x14) accept4$packet(r1, &(0x7f0000000c00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @dev}, &(0x7f0000000c40)=0x14, 0x800) getsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f0000000d80)={0x0, @remote, @remote}, &(0x7f0000000dc0)=0xc) getsockopt$inet_mreqn(r1, 0x0, 0x23, &(0x7f0000000e00)={@local, @remote, 0x0}, &(0x7f0000000e40)=0xc) getsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f0000001040)={0x0, @multicast1, @multicast2}, &(0x7f0000001080)=0xc) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f00000013c0)={'veth0_to_bond\x00', 0x0}) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f0000001600)={'team0\x00', 0x0}) getsockopt$inet_mreqn(r1, 0x0, 0x27, &(0x7f0000001640)={@dev, @broadcast, 0x0}, &(0x7f0000001680)=0xc) getsockopt$inet6_mreq(r0, 0x29, 0x14, &(0x7f00000016c0)={@mcast1, 0x0}, &(0x7f0000001700)=0x14) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000001740)={'ipddp0\x00', 0x0}) getsockopt$inet_mreqn(r1, 0x0, 0x27, &(0x7f0000001840)={@multicast1, @local, 0x0}, &(0x7f0000001880)=0xc) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f00000018c0)={{{@in=@remote, @in6=@ipv4={[], [], @local}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in=@multicast2}}, &(0x7f00000019c0)=0xe8) getsockopt$inet6_mreq(r1, 0x29, 0x1f, &(0x7f0000001a00)={@mcast2, 0x0}, &(0x7f0000001a40)=0x14) getsockopt$inet6_mreq(r1, 0x29, 0x1d, &(0x7f0000001d80)={@ipv4={[], [], @remote}, 0x0}, &(0x7f0000001dc0)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000001f40)={{{@in=@rand_addr, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{}, 0x0, @in6=@local}}, &(0x7f0000002040)=0xe8) getsockname$packet(r1, &(0x7f0000002080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @link_local}, &(0x7f00000020c0)=0x14) getpeername$packet(r1, &(0x7f0000003980)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @link_local}, &(0x7f00000039c0)=0x14) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f0000003a00)={{{@in6=@mcast1, @in6=@ipv4={[], [], @multicast2}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@dev}, 0x0, @in=@multicast1}}, &(0x7f0000003b00)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000003d80)={{{@in6=@mcast2, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast2}, 0x0, @in6=@local}}, &(0x7f0000003e80)=0xe8) getsockname$packet(r0, &(0x7f0000004000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @link_local}, &(0x7f0000004040)=0x14) getsockopt$inet_mreqn(r1, 0x0, 0x27, &(0x7f0000004080)={@multicast2, @local, 0x0}, &(0x7f00000040c0)=0xc) sendmsg$TEAM_CMD_OPTIONS_SET(r1, &(0x7f0000004b40)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x5000000}, 0xc, &(0x7f0000004b00)={&(0x7f0000004100)={0x9d0, r4, 0x121, 0x70bd2a, 0x25dfdbfd, {0x1}, [{{0x8, 0x1, r5}, {0x234, 0x2, [{0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x8, 0x3, 0x3}, {0x8, 0x4, 0xfffffffffffff001}}}, {0x40, 0x1, @queue_id={{{0x24, 0x1, 'queue_id\x00'}, {0x8, 0x3, 0x3}, {0x8, 0x4, 0x6}}, {0x8, 0x6, r6}}}, {0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x8, 0x3, 0x3}, {0x8, 0x4, r7}}}, {0x38, 0x1, @notify_peers_interval={{0x24, 0x1, 'notify_peers_interval\x00'}, {0x8, 0x3, 0x3}, {0x8, 0x4, 0x1}}}, {0x4c, 0x1, @lb_tx_method={{0x24, 0x1, 'lb_tx_method\x00'}, {0x8, 0x3, 0x5}, {0x1c, 0x4, 'hash_to_port_mapping\x00'}}}, {0x40, 0x1, @queue_id={{{0x24, 0x1, 'queue_id\x00'}, {0x8, 0x3, 0x3}, {0x8, 0x4, 0x20}}, {0x8, 0x6, r8}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x8, 0x3, 0x3}, {0x8, 0x4, 0x3}}}, {0x4c, 0x1, @lb_tx_method={{0x24, 0x1, 'lb_tx_method\x00'}, {0x8, 0x3, 0x5}, {0x1c, 0x4, 'hash_to_port_mapping\x00'}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x8, 0x3, 0x3}, {0x8, 0x4, 0x1000}}}]}}, {{0x8, 0x1, r9}, {0x22c, 0x2, [{0x38, 0x1, @notify_peers_count={{0x24, 0x1, 'notify_peers_count\x00'}, {0x8, 0x3, 0x3}, {0x8, 0x4, 0xfffffffffffffffc}}}, {0x40, 0x1, @lb_port_stats={{{0x24, 0x1, 'lb_port_stats\x00'}, {0x8, 0x3, 0xb}, {0x8, 0x4, 0x9}}, {0x8, 0x6, r10}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24, 0x1, 'lb_tx_hash_to_port_mapping\x00'}, {0x8, 0x3, 0x3}, {0x8, 0x4, r11}}, {0x8, 0x7}}}, {0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x8, 0x3, 0x3}, {0x8, 0x4, r12}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x8, 0x3, 0x6}, {0x4, 0x4}}, {0x8, 0x6, r13}}}, {0x44, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x8, 0x3, 0x5}, {0x14, 0x4, 'activebackup\x00'}}}, {0x3c, 0x1, @user_linkup={{{0x24, 0x1, 'user_linkup\x00'}, {0x8, 0x3, 0x6}, {0x4, 0x4}}, {0x8, 0x6, r14}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x8, 0x3, 0x6}, {0x4, 0x4}}, {0x8, 0x6, r15}}}, {0x40, 0x1, @lb_port_stats={{{0x24, 0x1, 'lb_port_stats\x00'}, {0x8, 0x3, 0xb}, {0x8, 0x4, 0x5}}, {0x8, 0x6, r16}}}]}}, {{0x8, 0x1, r17}, {0xb0, 0x2, [{0x3c, 0x1, @user_linkup={{{0x24, 0x1, 'user_linkup\x00'}, {0x8, 0x3, 0x6}, {0x4, 0x4}}, {0x8, 0x6, r18}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x8, 0x3, 0x3}, {0x8, 0x4, 0x12}}}, {0x38, 0x1, @notify_peers_interval={{0x24, 0x1, 'notify_peers_interval\x00'}, {0x8, 0x3, 0x3}, {0x8, 0x4, 0x9}}}]}}, {{0x8, 0x1, r19}, {0x130, 0x2, [{0x40, 0x1, @priority={{{0x24, 0x1, 'priority\x00'}, {0x8, 0x3, 0xe}, {0x8, 0x4, 0x2}}, {0x8, 0x6, r20}}}, {0x3c, 0x1, @user_linkup={{{0x24, 0x1, 'user_linkup\x00'}, {0x8, 0x3, 0x6}, {0x4, 0x4}}, {0x8, 0x6, r21}}}, {0x40, 0x1, @queue_id={{{0x24, 0x1, 'queue_id\x00'}, {0x8, 0x3, 0x3}, {0x8, 0x4}}, {0x8, 0x6, r22}}}, {0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x8, 0x3, 0x3}, {0x8, 0x4, r23}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x8, 0x3, 0x3}, {0x8, 0x4, 0x1f}}}]}}, {{0x8, 0x1, r24}, {0x1a8, 0x2, [{0x74, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x8, 0x3, 0xb}, {0x44, 0x4, [{0x40, 0x8, 0x2, 0x20}, {0x8, 0x0, 0x1, 0xe8}, {0x9, 0xff, 0x5, 0x401}, {0x7, 0x401, 0xffffffff, 0x5}, {0x3f, 0x4, 0xff, 0x3f}, {0x7, 0x80, 0x46, 0x6}, {0x6, 0x20, 0x400, 0x40}, {0x3, 0x8cb, 0x5, 0xe5}]}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x8, 0x3, 0x3}, {0x8, 0x4, 0x6b8}}}, {0x40, 0x1, @priority={{{0x24, 0x1, 'priority\x00'}, {0x8, 0x3, 0xe}, {0x8, 0x4, 0x8}}, {0x8, 0x6, r25}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24, 0x1, 'lb_tx_hash_to_port_mapping\x00'}, {0x8, 0x3, 0x3}, {0x8, 0x4, r26}}, {0x8, 0x7}}}, {0x3c, 0x1, @lb_tx_method={{0x24, 0x1, 'lb_tx_method\x00'}, {0x8, 0x3, 0x5}, {0xc, 0x4, 'hash\x00'}}}, {0x3c, 0x1, @lb_tx_method={{0x24, 0x1, 'lb_tx_method\x00'}, {0x8, 0x3, 0x5}, {0xc, 0x4, 'hash\x00'}}}]}}, {{0x8, 0x1, r27}, {0x1a4, 0x2, [{0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x8, 0x3, 0x3}, {0x8, 0x4, 0x101}}}, {0x44, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x8, 0x3, 0x5}, {0x14, 0x4, 'activebackup\x00'}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x8, 0x3, 0x3}, {0x8, 0x4, 0x7}}}, {0x38, 0x1, @notify_peers_interval={{0x24, 0x1, 'notify_peers_interval\x00'}, {0x8, 0x3, 0x3}, {0x8, 0x4, 0xd56}}}, {0x40, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x8, 0x3, 0x5}, {0x10, 0x4, 'broadcast\x00'}}}, {0x3c, 0x1, @user_linkup={{{0x24, 0x1, 'user_linkup\x00'}, {0x8, 0x3, 0x6}, {0x4, 0x4}}, {0x8, 0x6, r28}}}, {0x38, 0x1, @notify_peers_count={{0x24, 0x1, 'notify_peers_count\x00'}, {0x8, 0x3, 0x3}, {0x8, 0x4, 0x6}}}]}}]}, 0x9d0}, 0x1, 0x0, 0x0, 0x40}, 0x880) write$binfmt_script(r0, &(0x7f0000000000)=ANY=[], 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f00000002c0)={{}, 'port0\x00'}) r29 = openat$sequencer2(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer2\x00', 0x0, 0x0) ioctl$VT_GETMODE(r29, 0x5601, &(0x7f0000000380)) 03:54:09 executing program 6: r0 = socket(0x11, 0xa, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000640)={0x0, 0x0, 0x0}, &(0x7f0000000680)=0xc) syz_mount_image$hfsplus(&(0x7f0000000240)='hfsplus\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, &(0x7f00000005c0), 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='gid=', @ANYRESHEX=r1, @ANYBLOB="2c87c3da3e8bd900"]) exit(0x5) 03:54:09 executing program 3: ioctl$BLKDISCARD(0xffffffffffffffff, 0x1277, &(0x7f0000000180)=0x3) r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x0, 0x0) r1 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/qat_adf_ctl\x00', 0x40, 0x0) renameat(r0, &(0x7f0000000080)='./file0\x00', r1, &(0x7f00000001c0)='./file0\x00') r2 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140)='/dev/snapshot\x00', 0x0, 0x0) r3 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) setsockopt$IP_VS_SO_SET_STARTDAEMON(r0, 0x0, 0x48b, &(0x7f0000000300)={0x0, 'team_slave_0\x00', 0x3}, 0x18) ioctl$LOOP_CTL_ADD(r2, 0x4c80, r3) fcntl$addseals(0xffffffffffffffff, 0x409, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000081, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}, 0x800000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fstat(r2, &(0x7f0000000340)) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f0000000000)={0x0}, &(0x7f00000000c0)=0x8) ioctl$EVIOCGLED(0xffffffffffffffff, 0x80404519, &(0x7f0000000580)=""/236) setsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(r0, 0x84, 0x1f, &(0x7f0000000200)={r4, @in={{0x2, 0x4e21, @loopback=0x7f000001}}, 0x80, 0x39}, 0x90) r5 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x3c, 0x0) ioctl$EVIOCGKEYCODE_V2(0xffffffffffffffff, 0x80284504, &(0x7f00000003c0)=""/188) ioctl$LOOP_CTL_REMOVE(r5, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c82, 0x0) 03:54:09 executing program 7: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f000000d000)={0xa, 0x4e20}, 0x1c) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}, 0xb}, 0x1c) syz_emit_ethernet(0x3e, &(0x7f00000001c0)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @random="e829f650db0f", [], {@ipv6={0x86dd, {0x0, 0x6, "50a09c", 0x8, 0xffffff11, 0x0, @remote={0xfe, 0x80, [], 0xbb}, @local={0xfe, 0x80, [], 0xaa}, {[], @udp={0x0, 0x4e20, 0x8}}}}}}, &(0x7f0000000040)) syz_emit_ethernet(0x3e, &(0x7f0000000000)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], {@ipv6={0x86dd, {0x0, 0x6, "50a09c", 0x8, 0xffffff11, 0x0, @remote={0xfe, 0x80, [], 0xbb}, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd000000], 0xaa}, {[], @udp={0x300, 0x4e20, 0x8}}}}}}, &(0x7f0000000040)) 03:54:09 executing program 1: r0 = socket(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0xdc00000000000000}, 0xc, &(0x7f0000000900)={&(0x7f0000000040)={0x14, 0x1e, 0x201}, 0x14}, 0x1}, 0x0) 03:54:09 executing program 4: r0 = socket(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x7301000000000000}, 0xc, &(0x7f0000000900)={&(0x7f0000000040)={0x14, 0x1e, 0x201}, 0x14}, 0x1}, 0x0) [ 1488.305790] QAT: Invalid ioctl 03:54:09 executing program 5: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer2\x00', 0x0, 0x0) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000040)="025cc83d6d345f8f762070") ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r0, 0x40085112, &(0x7f0000b18000)={{0xffffff93}, {0xffffffa0}, 0x0, 0x0, 0x0, [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000]}) 03:54:09 executing program 1: r0 = socket(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x41000000}, 0xc, &(0x7f0000000900)={&(0x7f0000000040)={0x14, 0x1e, 0x201}, 0x14}, 0x1}, 0x0) 03:54:10 executing program 1: r0 = socket(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x6601}, 0xc, &(0x7f0000000900)={&(0x7f0000000040)={0x14, 0x1e, 0x201}, 0x14}, 0x1}, 0x0) [ 1488.514170] QAT: Invalid ioctl [ 1488.524593] hfsplus: gid requires an argument [ 1488.529205] hfsplus: unable to parse mount options 03:54:10 executing program 5: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer2\x00', 0x0, 0x0) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000040)="025cc83d6d345f8f762070") ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r0, 0x40085112, &(0x7f0000b18000)={{0xffffff93}, {0xffffffa0}, 0x0, 0x0, 0x0, [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x500]}) 03:54:10 executing program 3: ioctl$BLKDISCARD(0xffffffffffffffff, 0x1277, &(0x7f0000000180)) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140)='/dev/snapshot\x00', 0x0, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f00000001c0)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f0000000180)={&(0x7f0000000040)={0x14, 0x38, 0x219}, 0x14}, 0x1}, 0x0) fcntl$addseals(0xffffffffffffffff, 0x409, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f0000000000), &(0x7f00000000c0)=0x8) ioctl$EVIOCGLED(0xffffffffffffffff, 0x80404519, &(0x7f0000000580)=""/236) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x3c, 0x0) ioctl$EVIOCGKEYCODE_V2(0xffffffffffffffff, 0x80284504, &(0x7f00000003c0)=""/188) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c82, 0x0) 03:54:10 executing program 0: ioctl$BLKDISCARD(0xffffffffffffffff, 0x1277, &(0x7f0000000180)) r0 = syz_open_dev$usbmon(&(0x7f0000000080)='/dev/usbmon#\x00', 0xff, 0x4000) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140)='/dev/snapshot\x00', 0x0, 0x0) fcntl$addseals(0xffffffffffffffff, 0x409, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f0000000000), &(0x7f00000000c0)=0x8) ftruncate(r0, 0x1000) ioctl$EVIOCGLED(0xffffffffffffffff, 0x80404519, &(0x7f0000000580)=""/236) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x3c, 0x0) ioctl$EVIOCGKEYCODE_V2(0xffffffffffffffff, 0x80284504, &(0x7f00000003c0)=""/188) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) 03:54:10 executing program 4: r0 = socket(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0xa500}, 0xc, &(0x7f0000000900)={&(0x7f0000000040)={0x14, 0x1e, 0x201}, 0x14}, 0x1}, 0x0) 03:54:10 executing program 7: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f000000d000)={0xa, 0x4e20}, 0x1c) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}, 0xb}, 0x1c) syz_emit_ethernet(0x3e, &(0x7f00000001c0)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @random="e829f650db0f", [], {@ipv6={0x86dd, {0x0, 0x6, "50a09c", 0x8, 0xffffff11, 0x0, @remote={0xfe, 0x80, [], 0xbb}, @local={0xfe, 0x80, [], 0xaa}, {[], @udp={0x0, 0x4e20, 0x8}}}}}}, &(0x7f0000000040)) syz_emit_ethernet(0x3e, &(0x7f0000000000)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], {@ipv6={0x86dd, {0x0, 0x6, "50a09c", 0x8, 0xffffff11, 0x0, @remote={0xfe, 0x80, [], 0xbb}, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5000000], 0xaa}, {[], @udp={0x300, 0x4e20, 0x8}}}}}}, &(0x7f0000000040)) 03:54:10 executing program 1: r0 = socket(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x112}, 0xc, &(0x7f0000000900)={&(0x7f0000000040)={0x14, 0x1e, 0x201}, 0x14}, 0x1}, 0x0) 03:54:10 executing program 4: r0 = socket(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x6c}, 0xc, &(0x7f0000000900)={&(0x7f0000000040)={0x14, 0x1e, 0x201}, 0x14}, 0x1}, 0x0) [ 1489.114852] hfsplus: gid requires an argument [ 1489.119445] hfsplus: unable to parse mount options 03:54:10 executing program 2: r0 = syz_open_dev$sndseq(&(0x7f0000dcc000)='/dev/snd/seq\x00', 0x0, 0x2) read(r0, &(0x7f0000fb6000)=""/28, 0x3f0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000418f50)={{0x80}, "0a4ceaa05d9a00000000000000039b3fd4cec307e8ef3d13eb790ec9c65abaf90d229db692542e5b78f8b29e0a27800f0000000000000009fb42f376589701a4", 0xa9824f69d1376637, 0x10800a}) pipe(&(0x7f0000000000)={0xffffffffffffffff}) write$RDMA_USER_CM_CMD_GET_EVENT(r1, &(0x7f0000000040)={0xc, 0x8, 0xfa00, {&(0x7f0000000380)}}, 0x10) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000240)={0xbf}) write$binfmt_script(r0, &(0x7f0000000000)=ANY=[], 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f00000002c0)={{}, 'port0\x00'}) openat$sequencer2(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer2\x00', 0x0, 0x0) 03:54:10 executing program 7: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f000000d000)={0xa, 0x4e20}, 0x1c) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}, 0xb}, 0x1c) syz_emit_ethernet(0x3e, &(0x7f00000001c0)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @random="e829f650db0f", [], {@ipv6={0x86dd, {0x0, 0x6, "50a09c", 0x8, 0xffffff11, 0x0, @remote={0xfe, 0x80, [], 0xbb}, @local={0xfe, 0x80, [], 0xaa}, {[], @udp={0x0, 0x4e20, 0x8}}}}}}, &(0x7f0000000040)) syz_emit_ethernet(0x3e, &(0x7f0000000000)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], {@ipv6={0x86dd, {0x0, 0x6, "50a09c", 0x8, 0xffffff11, 0x0, @remote={0xfe, 0x80, [], 0xbb}, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000000000], 0xaa}, {[], @udp={0x300, 0x4e20, 0x8}}}}}}, &(0x7f0000000040)) 03:54:10 executing program 5: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer2\x00', 0x0, 0x0) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000040)="025cc83d6d345f8f762070") ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r0, 0x40085112, &(0x7f0000b18000)={{0xffffff93}, {0xffffffa0}, 0x0, 0x0, 0x0, [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff03]}) 03:54:10 executing program 1: r0 = socket(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x2801}, 0xc, &(0x7f0000000900)={&(0x7f0000000040)={0x14, 0x1e, 0x201}, 0x14}, 0x1}, 0x0) 03:54:10 executing program 3: ioctl$BLKDISCARD(0xffffffffffffffff, 0x1277, &(0x7f0000000180)) r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140)='/dev/snapshot\x00', 0x0, 0x0) fcntl$addseals(0xffffffffffffffff, 0x409, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f0000000000), &(0x7f00000000c0)=0x8) ioctl$EVIOCGLED(0xffffffffffffffff, 0x80404519, &(0x7f0000000580)=""/236) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x3c, 0x0) ioctl$EVIOCGKEYCODE_V2(0xffffffffffffffff, 0x80284504, &(0x7f00000003c0)=""/188) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) r2 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_ADD(r1, 0x4c80, r2) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c82, 0x0) 03:54:11 executing program 4: r0 = socket(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000900)={&(0x7f0000000040)={0x14, 0x1e, 0x201}, 0x14}, 0x1}, 0x0) 03:54:11 executing program 0: ioctl$BLKDISCARD(0xffffffffffffffff, 0x1277, &(0x7f0000000180)) syz_open_dev$usbmon(&(0x7f0000000080)='/dev/usbmon#\x00', 0xff, 0x4000) r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140)='/dev/snapshot\x00', 0x0, 0x0) fcntl$addseals(0xffffffffffffffff, 0x409, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r0, 0x84, 0x66, &(0x7f0000000000)={0x0, 0x4000001}, &(0x7f0000000040)=0x8) ioctl$EVIOCGLED(0xffffffffffffffff, 0x80404519, &(0x7f0000000580)=""/236) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x3c, 0x0) ioctl$EVIOCGKEYCODE_V2(0xffffffffffffffff, 0x80284504, &(0x7f00000003c0)=""/188) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) 03:54:11 executing program 6: r0 = socket(0x11, 0xa, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000640)={0x0, 0x0, 0x0}, &(0x7f0000000680)=0xc) syz_mount_image$hfsplus(&(0x7f0000000240)='hfsplus\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, &(0x7f00000005c0), 0x0, &(0x7f00000006c0)={[{@gid={'gid', 0x3d, r1}, 0x2c}]}) r2 = dup(r0) ioctl$KVM_PPC_ALLOCATE_HTAB(r2, 0xc004aea7, &(0x7f0000000000)) 03:54:11 executing program 4: r0 = socket(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x3e00}, 0xc, &(0x7f0000000900)={&(0x7f0000000040)={0x14, 0x1e, 0x201}, 0x14}, 0x1}, 0x0) 03:54:11 executing program 1: r0 = socket(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x3c00}, 0xc, &(0x7f0000000900)={&(0x7f0000000040)={0x14, 0x1e, 0x201}, 0x14}, 0x1}, 0x0) 03:54:11 executing program 7: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f000000d000)={0xa, 0x4e20}, 0x1c) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}, 0xb}, 0x1c) syz_emit_ethernet(0x3e, &(0x7f00000001c0)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @random="e829f650db0f", [], {@ipv6={0x86dd, {0x0, 0x6, "50a09c", 0x8, 0xffffff11, 0x0, @remote={0xfe, 0x80, [], 0xbb}, @local={0xfe, 0x80, [], 0xaa}, {[], @udp={0x0, 0x4e20, 0x8}}}}}}, &(0x7f0000000040)) syz_emit_ethernet(0x3e, &(0x7f0000000000)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], {@ipv6={0x86dd, {0x0, 0x6, "50a09c", 0x8, 0xffffff11, 0x0, @remote={0xfe, 0x80, [], 0xbb}, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8906000000000000], 0xaa}, {[], @udp={0x300, 0x4e20, 0x8}}}}}}, &(0x7f0000000040)) 03:54:11 executing program 5: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer2\x00', 0x0, 0x0) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000040)="025cc83d6d345f8f762070") ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r0, 0x40085112, &(0x7f0000b18000)={{0xffffff93}, {0xffffffa0}, 0x0, 0x0, 0x0, [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4]}) 03:54:11 executing program 3: r0 = syz_open_dev$admmidi(&(0x7f0000000040)='/dev/admmidi#\x00', 0x200, 0x8000) r1 = syz_genetlink_get_family_id$team(&(0x7f0000000100)='team\x00') sendmsg$TEAM_CMD_OPTIONS_GET(r0, &(0x7f0000000340)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000300)={&(0x7f0000000280)=ANY=[@ANYBLOB="04000000", @ANYRES16=r1, @ANYBLOB="120029bd7000fedbdf2502000000"], 0x14}, 0x1, 0x0, 0x0, 0x4000001}, 0x800) ioctl$BLKDISCARD(0xffffffffffffffff, 0x1277, &(0x7f0000000180)) ioctl$PERF_EVENT_IOC_REFRESH(r0, 0x2402, 0x40) r2 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140)='/dev/snapshot\x00', 0x0, 0x0) fcntl$addseals(r0, 0x409, 0x0) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f0000000000), &(0x7f00000000c0)=0x8) ioctl$EVIOCGLED(0xffffffffffffffff, 0x80404519, &(0x7f0000000580)=""/236) r4 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x3c, 0x0) timerfd_settime(r0, 0x1, &(0x7f0000000500)={{}, {0x0, 0x1c9c380}}, &(0x7f0000000540)) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r3, 0xc0a85352, &(0x7f00000001c0)={{0x9, 0xffffffff}, 'port0\x00', 0x26, 0x100000, 0x7, 0x4, 0xc1, 0x1, 0x7, 0x0, 0x1, 0x4}) ioctl$EVIOCGKEYCODE_V2(0xffffffffffffffff, 0x80284504, &(0x7f00000003c0)=""/188) ioctl$LOOP_CTL_REMOVE(r4, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c82, 0x0) clock_gettime(0x0, &(0x7f0000000380)={0x0, 0x0}) timerfd_settime(r2, 0x1, &(0x7f0000000480)={{}, {r5, r6+30000000}}, &(0x7f00000004c0)) [ 1489.632447] hfsplus: gid requires an argument [ 1489.637070] hfsplus: unable to parse mount options 03:54:11 executing program 4: r0 = socket(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1901}, 0xc, &(0x7f0000000900)={&(0x7f0000000040)={0x14, 0x1e, 0x201}, 0x14}, 0x1}, 0x0) 03:54:11 executing program 7: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f000000d000)={0xa, 0x4e20}, 0x1c) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}, 0xb}, 0x1c) syz_emit_ethernet(0x3e, &(0x7f00000001c0)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @random="e829f650db0f", [], {@ipv6={0x86dd, {0x0, 0x6, "50a09c", 0x8, 0xffffff11, 0x0, @remote={0xfe, 0x80, [], 0xbb}, @local={0xfe, 0x80, [], 0xaa}, {[], @udp={0x0, 0x4e20, 0x8}}}}}}, &(0x7f0000000040)) syz_emit_ethernet(0x3e, &(0x7f0000000000)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], {@ipv6={0x86dd, {0x0, 0x6, "50a09c", 0x8, 0xffffff11, 0x0, @remote={0xfe, 0x80, [], 0xbb}, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4], 0xaa}, {[], @udp={0x300, 0x4e20, 0x8}}}}}}, &(0x7f0000000040)) 03:54:11 executing program 1: r0 = socket(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x5b01}, 0xc, &(0x7f0000000900)={&(0x7f0000000040)={0x14, 0x1e, 0x201}, 0x14}, 0x1}, 0x0) [ 1489.844304] hfsplus: gid requires an argument [ 1489.848915] hfsplus: unable to parse mount options 03:54:12 executing program 2: r0 = syz_open_dev$sndseq(&(0x7f0000dcc000)='/dev/snd/seq\x00', 0x0, 0x2) syz_open_dev$sndseq(&(0x7f0000000000)='/dev/snd/seq\x00', 0x0, 0x321083) read(r0, &(0x7f0000fb6000)=""/28, 0x3f0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000418f50)={{0x80}, "0a4ceaa05d9a00000000000000039b3fd4cec307e8ef3d13eb790ec9c65abaf90d229db692542e5b78f8b29e0a27800f0000000000000009fb42f376589701a4", 0xa9824f69d1376637, 0x10800a}) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000240)={0xbf, @tick=0x4}) write$binfmt_script(r0, &(0x7f0000000000)=ANY=[], 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f00000002c0)={{}, 'port0\x00'}) openat$sequencer2(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer2\x00', 0x0, 0x0) poll(&(0x7f0000000040)=[{r0, 0x1a0}, {r0, 0x2204}], 0x2, 0x4000000e3) 03:54:12 executing program 1: r0 = socket(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x2701}, 0xc, &(0x7f0000000900)={&(0x7f0000000040)={0x14, 0x1e, 0x201}, 0x14}, 0x1}, 0x0) 03:54:12 executing program 0: ioctl$BLKDISCARD(0xffffffffffffffff, 0x1277, &(0x7f0000000180)) syz_open_dev$usbmon(&(0x7f0000000080)='/dev/usbmon#\x00', 0xff, 0x4000) r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140)='/dev/snapshot\x00', 0x0, 0x0) fcntl$addseals(0xffffffffffffffff, 0x409, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EVIOCGUNIQ(r0, 0x80404508, &(0x7f00000001c0)=""/243) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f0000000000), &(0x7f00000000c0)=0x8) ioctl$EVIOCGLED(0xffffffffffffffff, 0x80404519, &(0x7f0000000580)=""/236) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x3c, 0x0) ioctl$EVIOCGKEYCODE_V2(0xffffffffffffffff, 0x80284504, &(0x7f00000003c0)=""/188) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) dup2(r0, r0) 03:54:12 executing program 7: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f000000d000)={0xa, 0x4e20}, 0x1c) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}, 0xb}, 0x1c) syz_emit_ethernet(0x3e, &(0x7f00000001c0)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @random="e829f650db0f", [], {@ipv6={0x86dd, {0x0, 0x6, "50a09c", 0x8, 0xffffff11, 0x0, @remote={0xfe, 0x80, [], 0xbb}, @local={0xfe, 0x80, [], 0xaa}, {[], @udp={0x0, 0x4e20, 0x8}}}}}}, &(0x7f0000000040)) syz_emit_ethernet(0x3e, &(0x7f0000000000)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], {@ipv6={0x86dd, {0x0, 0x6, "50a09c", 0x8, 0xffffff11, 0x0, @remote={0xfe, 0x80, [], 0xbb}, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80ffffff], 0xaa}, {[], @udp={0x300, 0x4e20, 0x8}}}}}}, &(0x7f0000000040)) 03:54:12 executing program 6: r0 = socket(0xe, 0x80000, 0xfffffffffffffffe) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='rdma.current\x00', 0x0, 0x0) ioctl$EVIOCGRAB(r1, 0x40044590, &(0x7f0000000040)=0x540) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000640)={0x0, 0x0, 0x0}, &(0x7f0000000680)=0xc) syz_mount_image$hfsplus(&(0x7f0000000240)='hfsplus\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, &(0x7f00000005c0), 0x0, &(0x7f00000006c0)={[{@gid={'gid', 0x3d, r2}, 0x2c}]}) 03:54:12 executing program 4: r0 = socket(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0xa1}, 0xc, &(0x7f0000000900)={&(0x7f0000000040)={0x14, 0x1e, 0x201}, 0x14}, 0x1}, 0x0) 03:54:12 executing program 5: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer2\x00', 0x0, 0x0) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000040)="025cc83d6d345f8f762070") ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r0, 0x40085112, &(0x7f0000b18000)={{0xffffff93}, {0xffffffa0}, 0x0, 0x0, 0x0, [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400000000000000]}) 03:54:12 executing program 3: ioctl$BLKDISCARD(0xffffffffffffffff, 0x1277, &(0x7f0000000180)) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140)='/dev/snapshot\x00', 0x0, 0x0) fcntl$addseals(0xffffffffffffffff, 0x409, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f0000000000), &(0x7f00000000c0)=0x60) ioctl$EVIOCGLED(0xffffffffffffffff, 0x80404519, &(0x7f0000000580)=""/236) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vga_arbiter\x00', 0x202, 0x0) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x3c, 0x0) ioctl$EVIOCGKEYCODE_V2(0xffffffffffffffff, 0x80284504, &(0x7f00000003c0)=""/188) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c82, 0x0) 03:54:12 executing program 1: r0 = socket(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1a3}, 0xc, &(0x7f0000000900)={&(0x7f0000000040)={0x14, 0x1e, 0x201}, 0x14}, 0x1}, 0x0) 03:54:12 executing program 3: ioctl$BLKDISCARD(0xffffffffffffffff, 0x1277, &(0x7f0000000180)) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140)='/dev/snapshot\x00', 0x0, 0x0) fcntl$addseals(0xffffffffffffffff, 0x409, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f0000000000), &(0x7f00000000c0)=0x8) socket$key(0xf, 0x3, 0x2) ioctl$EVIOCGLED(0xffffffffffffffff, 0x80404519, &(0x7f0000000580)=""/236) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x3c, 0x0) ioctl$EVIOCGKEYCODE_V2(0xffffffffffffffff, 0x80284504, &(0x7f00000003c0)=""/188) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c82, 0x0) 03:54:12 executing program 4: r0 = socket(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x7c}, 0xc, &(0x7f0000000900)={&(0x7f0000000040)={0x14, 0x1e, 0x201}, 0x14}, 0x1}, 0x0) 03:54:12 executing program 7: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f000000d000)={0xa, 0x4e20}, 0x1c) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}, 0xb}, 0x1c) syz_emit_ethernet(0x3e, &(0x7f00000001c0)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @random="e829f650db0f", [], {@ipv6={0x86dd, {0x0, 0x6, "50a09c", 0x8, 0xffffff11, 0x0, @remote={0xfe, 0x80, [], 0xbb}, @local={0xfe, 0x80, [], 0xaa}, {[], @udp={0x0, 0x4e20, 0x8}}}}}}, &(0x7f0000000040)) syz_emit_ethernet(0x3e, &(0x7f0000000000)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], {@ipv6={0x86dd, {0x0, 0x6, "50a09c", 0x8, 0xffffff11, 0x0, @remote={0xfe, 0x80, [], 0xbb}, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x88caffff], 0xaa}, {[], @udp={0x300, 0x4e20, 0x8}}}}}}, &(0x7f0000000040)) 03:54:12 executing program 5: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer2\x00', 0x0, 0x0) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000040)="025cc83d6d345f8f762070") ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r0, 0x40085112, &(0x7f0000b18000)={{0xffffff93}, {0xffffffa0}, 0x0, 0x0, 0x0, [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfdffffff00000000]}) 03:54:12 executing program 1: r0 = socket(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0xd01000000000000}, 0xc, &(0x7f0000000900)={&(0x7f0000000040)={0x14, 0x1e, 0x201}, 0x14}, 0x1}, 0x0) 03:54:12 executing program 1: r0 = socket(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0xc00e000000000000}, 0xc, &(0x7f0000000900)={&(0x7f0000000040)={0x14, 0x1e, 0x201}, 0x14}, 0x1}, 0x0) [ 1491.085914] hfsplus: unable to find HFS+ superblock 03:54:12 executing program 4: r0 = socket(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8000000000000000}, 0xc, &(0x7f0000000900)={&(0x7f0000000040)={0x14, 0x1e, 0x201}, 0x14}, 0x1}, 0x0) [ 1491.286163] hfsplus: unable to find HFS+ superblock 03:54:13 executing program 2: r0 = syz_open_dev$sndseq(&(0x7f0000dcc000)='/dev/snd/seq\x00', 0x0, 0x2) read(r0, &(0x7f0000fb6000)=""/28, 0x3f0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000418f50)={{0x80}, "0a4ceaa05d9a00000000000000039b3fd4cec307e8ef3d13eb790ec9c65abaf90d229db692542e5b78f8b29e0a27800f0000000000000009fb42f376589701a4", 0xa9824f69d1376637, 0x10800a}) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000240)={0xbf}) write$binfmt_script(r0, &(0x7f0000000000)=ANY=[], 0x0) dup2(r0, r0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f00000002c0)={{}, 'port0\x00'}) openat$sequencer2(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer2\x00', 0x0, 0x0) 03:54:13 executing program 5: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer2\x00', 0x0, 0x0) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000040)="025cc83d6d345f8f762070") ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r0, 0x40085112, &(0x7f0000b18000)={{0xffffff93}, {0xffffffa0}, 0x0, 0x0, 0x0, [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff]}) 03:54:13 executing program 7: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f000000d000)={0xa, 0x4e20}, 0x1c) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}, 0xb}, 0x1c) syz_emit_ethernet(0x3e, &(0x7f00000001c0)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @random="e829f650db0f", [], {@ipv6={0x86dd, {0x0, 0x6, "50a09c", 0x8, 0xffffff11, 0x0, @remote={0xfe, 0x80, [], 0xbb}, @local={0xfe, 0x80, [], 0xaa}, {[], @udp={0x0, 0x4e20, 0x8}}}}}}, &(0x7f0000000040)) syz_emit_ethernet(0x3e, &(0x7f0000000000)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], {@ipv6={0x86dd, {0x0, 0x6, "50a09c", 0x8, 0xffffff11, 0x0, @remote={0xfe, 0x80, [], 0xbb}, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x89060000], 0xaa}, {[], @udp={0x300, 0x4e20, 0x8}}}}}}, &(0x7f0000000040)) 03:54:13 executing program 1: r0 = socket(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x63000000}, 0xc, &(0x7f0000000900)={&(0x7f0000000040)={0x14, 0x1e, 0x201}, 0x14}, 0x1}, 0x0) 03:54:13 executing program 0 (fault-call:10 fault-nth:0): r0 = syz_open_dev$vcsa(&(0x7f0000000100)='/dev/vcsa#\x00', 0x5, 0x101000) ioctl$BLKDISCARD(r0, 0x1277, &(0x7f0000000180)=0x5f) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140)='/dev/snapshot\x00', 0x0, 0x0) connect$nfc_llcp(r1, &(0x7f0000000300)={0x27, 0x0, 0x0, 0x6, 0x0, 0x0, "f44825e9da257dcd22512d531f545cf0bce08002f76d5e9bd3d1dcb3f649bf7ba49078f877ce09f903ed489ab0bbf0f088675b47312412edd6bd577062eb34", 0x1c}, 0x60) fcntl$addseals(0xffffffffffffffff, 0x409, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EVIOCGLED(r1, 0x80404519, &(0x7f0000000580)=""/236) ioctl$FS_IOC_SETFSLABEL(r2, 0x41009432, &(0x7f0000000480)="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") r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x3c, 0x0) ioctl$EVIOCGKEYCODE_V2(0xffffffffffffffff, 0x80284504, &(0x7f00000003c0)=""/188) ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x0) 03:54:13 executing program 3: ioctl$BLKDISCARD(0xffffffffffffffff, 0x1277, &(0x7f0000000180)) r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140)='/dev/snapshot\x00', 0x0, 0x0) fcntl$addseals(0xffffffffffffffff, 0x409, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f0000000000)={0x0}, &(0x7f00000000c0)=0x8) ioctl$EVIOCGLED(0xffffffffffffffff, 0x80404519, &(0x7f0000000580)=""/236) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x3c, 0x0) ioctl$EVIOCGKEYCODE_V2(0xffffffffffffffff, 0x80284504, &(0x7f00000003c0)=""/188) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) r3 = syz_genetlink_get_family_id$team(&(0x7f0000000080)='team\x00') accept$packet(r0, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @dev}, &(0x7f00000001c0)=0x14) getsockname$packet(r0, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @broadcast}, &(0x7f0000000240)=0x14) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000280)={'vcan0\x00', 0x0}) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x27, &(0x7f0000003c00)={@rand_addr, @rand_addr, 0x0}, &(0x7f0000003c40)=0xc) syz_open_dev$ndb(&(0x7f0000000340)='/dev/nbd#\x00', 0x0, 0x200) accept4$packet(r0, &(0x7f0000003c80)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @link_local}, &(0x7f0000003cc0)=0x14, 0x80000) recvmsg(r0, &(0x7f0000003ec0)={&(0x7f0000003d00)=@xdp={0x0, 0x0, 0x0}, 0x80, &(0x7f0000003e80)=[{&(0x7f0000003d80)=""/237, 0xed}], 0x1, 0x0, 0x0, 0x4}, 0x2000) ioctl$SIOCSIFHWADDR(r0, 0x8924, &(0x7f0000000300)={'team0\x00', @link_local={0x1, 0x80, 0xc2}}) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000003f00)={{{@in6=@dev, @in=@rand_addr, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in6=@dev}}, &(0x7f0000004000)=0xe8) semget$private(0x0, 0x0, 0x140) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000004040)={'team_slave_0\x00', 0x0}) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000004080)={{{@in6=@mcast2, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}, 0x0, @in=@multicast1}}, &(0x7f0000004180)=0xe8) sendmsg$TEAM_CMD_NOOP(r0, &(0x7f0000004640)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000004600)={&(0x7f00000041c0)=ANY=[@ANYBLOB="04040000", @ANYRES16=r3, @ANYBLOB="010028bd7000200000000000000008000100", @ANYRES32=r4, @ANYBLOB="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", @ANYRES32=r5, @ANYBLOB="3c00010024000100757365725f6c696e6b75705f656e61626c65640000000000000000000000000008000300060000000400040008000600", @ANYRES32=r6, @ANYBLOB="38000100240001006d636173745f72656a6f696e5f636f756e740000000000000000000000000000080003000300000008000400020000003c00010024000100757365725f6c696e6b757000000000000000000000000000000000000000000008000300060000000400040008000600", @ANYRES32=r7, @ANYBLOB="08000100", @ANYRES32=r8, @ANYBLOB="e400020038000100240001006e6f746966795f70656572735f636f756e7400000000000000000000000000000800030003000000080004004e0f00003800010024000100616374697665706f727400000000000000000000000000000000000000000000080003000300000008000400", @ANYRES32=r9, @ANYBLOB="38000100240001006d636173745f72656a6f696e5f696e74657276616c00000000000000000000000800030003000000080004000700000038000100240001006e6f746966795f70656572735f636f756e7400000000000000000000000000000800030003000000080004000100000008000100", @ANYRES32=r10, @ANYBLOB="0c01020054000100240001006270665f686173685f66756e6300000000000000000000000000000000000000080003000b0000002400040087000408010000000500060004000000ffff07d9020000000004ff00000000003c00010024000100656e61626c65640000000000000000000000000000000000000000000000000008000300060000000400040008000600", @ANYRES32=r11, @ANYBLOB="38000100240001006e6f746966795f70656572735f636f756e7400000000000000000000000000000800030003000000080004008100000040000100240001006c625f74785f686173685f746f5f706f72745f6d617070696e67000000000000080003000300000008000400", @ANYRES32=r12, @ANYBLOB='\b\x00\a\x00\x00\x00\x00\x00'], 0x404}, 0x1, 0x0, 0x0, 0x20008000}, 0x40) setsockopt$inet_sctp_SCTP_CONTEXT(r0, 0x84, 0x11, &(0x7f0000000380)={r1, 0x9}, 0x8) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c82, 0x0) 03:54:13 executing program 6: r0 = socket(0x11, 0xa, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000640)={0x0, 0x0, 0x0}, &(0x7f0000000680)=0xc) syz_mount_image$hfsplus(&(0x7f0000000240)='hfsplus\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, &(0x7f00000005c0), 0x0, &(0x7f00000006c0)={[{@gid={'gid', 0x3d, r1}, 0x2c}]}) r2 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qat_adf_ctl\x00', 0x10100, 0x0) ioctl$KDDISABIO(r2, 0x4b37) 03:54:13 executing program 4: r0 = socket(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x9e010000}, 0xc, &(0x7f0000000900)={&(0x7f0000000040)={0x14, 0x1e, 0x201}, 0x14}, 0x1}, 0x0) 03:54:13 executing program 7: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f000000d000)={0xa, 0x4e20}, 0x1c) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}, 0xb}, 0x1c) syz_emit_ethernet(0x3e, &(0x7f00000001c0)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @random="e829f650db0f", [], {@ipv6={0x86dd, {0x0, 0x6, "50a09c", 0x8, 0xffffff11, 0x0, @remote={0xfe, 0x80, [], 0xbb}, @local={0xfe, 0x80, [], 0xaa}, {[], @udp={0x0, 0x4e20, 0x8}}}}}}, &(0x7f0000000040)) syz_emit_ethernet(0x3e, &(0x7f0000000000)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], {@ipv6={0x86dd, {0x0, 0x6, "50a09c", 0x8, 0xffffff11, 0x0, @remote={0xfe, 0x80, [], 0xbb}, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000], 0xaa}, {[], @udp={0x300, 0x4e20, 0x8}}}}}}, &(0x7f0000000040)) 03:54:13 executing program 5: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer2\x00', 0x0, 0x0) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000040)="025cc83d6d345f8f762070") ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r0, 0x40085112, &(0x7f0000b18000)={{0xffffff93}, {0xffffffa0}, 0x0, 0x0, 0x0, [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff03000000000000]}) 03:54:13 executing program 3: ioctl$BLKDISCARD(0xffffffffffffffff, 0x1277, &(0x7f0000000180)) r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140)='/dev/snapshot\x00', 0x0, 0x0) fcntl$addseals(0xffffffffffffffff, 0x409, 0x0) write$RDMA_USER_CM_CMD_GET_EVENT(r0, &(0x7f0000000900)={0xc, 0x8, 0xfa00, {&(0x7f0000000780)}}, 0x10) r1 = request_key(&(0x7f0000000300)='.request_key_auth\x00', &(0x7f0000000340)={0x73, 0x79, 0x7a, 0x2}, &(0x7f0000000380)='/dev/snapshot\x00', 0xfffffffffffffff9) add_key$user(&(0x7f0000000100)='user\x00', &(0x7f00000002c0)={0x73, 0x79, 0x7a, 0x0}, &(0x7f0000000680)="17556f452b0a27335d7fe5f350276d5e1420cf47c22d8a78513bdd4cdbbd724ec8ce0694d69e7aa52169f1b9b744fd62233720b8f5d45d5d4366bdb713b7233e1c3a7ddaf95d2a2ea49b2ccbc3609ff44b734a222197da2b7bae5318e5a295f754ad2bb095be371627631b29719bd3d3fe9dc61e46cca6e0a9eb82627be4f8beb30adc76a5b3ae248d4ecb88a8f0fdba38c33343d9ff0defdc441006125ff4b61070a2d40bfe98a734934a2cc03ff215a0c834fd8cafeacdc3a3a6fc9527e45575ed35c49cb0d2e4e079699cbabe563d6da3470078", 0xd5, r1) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f0000000000), &(0x7f00000000c0)=0x8) ioctl$EVIOCGLED(0xffffffffffffffff, 0x80404519, &(0x7f0000000580)=""/236) ioctl$EVIOCGKEYCODE_V2(0xffffffffffffffff, 0x80284504, &(0x7f00000003c0)=""/188) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c82, 0x0) ioctl$VHOST_SET_VRING_ADDR(r0, 0x4028af11, &(0x7f0000000080)={0x0, 0x1, &(0x7f0000000040)=""/37, &(0x7f00000001c0)=""/221, &(0x7f0000000480)=""/225}) 03:54:13 executing program 4: r0 = socket(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x152}, 0xc, &(0x7f0000000900)={&(0x7f0000000040)={0x14, 0x1e, 0x201}, 0x14}, 0x1}, 0x0) [ 1492.062766] hfsplus: gid requires an argument [ 1492.067410] hfsplus: unable to parse mount options 03:54:13 executing program 1: r0 = socket(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0xd200}, 0xc, &(0x7f0000000900)={&(0x7f0000000040)={0x14, 0x1e, 0x201}, 0x14}, 0x1}, 0x0) [ 1492.125779] FAULT_INJECTION: forcing a failure. [ 1492.125779] name failslab, interval 1, probability 0, space 0, times 0 [ 1492.137825] CPU: 0 PID: 5779 Comm: syz-executor0 Not tainted 4.18.0-rc4+ #144 [ 1492.145119] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1492.154567] Call Trace: [ 1492.157168] dump_stack+0x1c9/0x2b4 [ 1492.160820] ? dump_stack_print_info.cold.2+0x52/0x52 [ 1492.166029] should_fail.cold.4+0xa/0x1a [ 1492.170102] ? print_usage_bug+0xc0/0xc0 [ 1492.174177] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 1492.179356] ? mutex_trylock+0x2b0/0x2b0 [ 1492.183431] ? graph_lock+0x170/0x170 [ 1492.187249] ? retint_kernel+0x10/0x10 [ 1492.191151] ? find_held_lock+0x36/0x1c0 [ 1492.195223] ? __lock_is_held+0xb5/0x140 [ 1492.199299] ? check_same_owner+0x340/0x340 [ 1492.203627] ? rcu_note_context_switch+0x730/0x730 [ 1492.208567] __should_failslab+0x124/0x180 [ 1492.212821] should_failslab+0x9/0x14 [ 1492.216629] kmem_cache_alloc_trace+0x2cb/0x780 [ 1492.221365] loop_add+0x9f/0x9d0 [ 1492.224756] ? loop_lookup+0x105/0x230 [ 1492.228648] ? loop_queue_rq+0x660/0x660 [ 1492.232724] loop_control_ioctl+0x199/0x540 [ 1492.237051] ? loop_add+0x9d0/0x9d0 [ 1492.240684] ? expand_files.part.8+0x9c0/0x9c0 [ 1492.245273] ? kasan_check_write+0x14/0x20 [ 1492.249510] ? __mutex_unlock_slowpath+0x197/0x8c0 [ 1492.254450] ? loop_add+0x9d0/0x9d0 [ 1492.258220] do_vfs_ioctl+0x1de/0x1720 [ 1492.262118] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1492.266887] ? ioctl_preallocate+0x300/0x300 [ 1492.271299] ? __fget_light+0x2f7/0x440 [ 1492.275283] ? fget_raw+0x20/0x20 [ 1492.278741] ? __f_unlock_pos+0x19/0x20 [ 1492.282728] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1492.288268] ? fput+0x130/0x1a0 [ 1492.291556] ? ksys_write+0x1ae/0x260 [ 1492.295366] ? security_file_ioctl+0x94/0xc0 [ 1492.299779] ksys_ioctl+0xa9/0xd0 [ 1492.303246] __x64_sys_ioctl+0x73/0xb0 [ 1492.307873] do_syscall_64+0x1b9/0x820 [ 1492.311764] ? syscall_slow_exit_work+0x500/0x500 [ 1492.316613] ? syscall_return_slowpath+0x5e0/0x5e0 [ 1492.321548] ? syscall_return_slowpath+0x31d/0x5e0 [ 1492.328419] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe [ 1492.333801] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1492.338668] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1492.343862] RIP: 0033:0x455a79 [ 1492.347048] Code: 1d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1492.366441] RSP: 002b:00007f420d477c68 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1492.374157] RAX: ffffffffffffffda RBX: 00007f420d4786d4 RCX: 0000000000455a79 [ 1492.381427] RDX: 0000000000000000 RSI: 0000000000004c80 RDI: 0000000000000015 [ 1492.388698] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 1492.395984] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000016 [ 1492.403257] R13: 00000000004bdfb1 R14: 00000000004ccab0 R15: 0000000000000000 03:54:14 executing program 0 (fault-call:10 fault-nth:1): r0 = syz_open_dev$vcsa(&(0x7f0000000100)='/dev/vcsa#\x00', 0x5, 0x101000) ioctl$BLKDISCARD(r0, 0x1277, &(0x7f0000000180)=0x5f) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140)='/dev/snapshot\x00', 0x0, 0x0) connect$nfc_llcp(r1, &(0x7f0000000300)={0x27, 0x0, 0x0, 0x6, 0x0, 0x0, "f44825e9da257dcd22512d531f545cf0bce08002f76d5e9bd3d1dcb3f649bf7ba49078f877ce09f903ed489ab0bbf0f088675b47312412edd6bd577062eb34", 0x1c}, 0x60) fcntl$addseals(0xffffffffffffffff, 0x409, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EVIOCGLED(r1, 0x80404519, &(0x7f0000000580)=""/236) ioctl$FS_IOC_SETFSLABEL(r2, 0x41009432, &(0x7f0000000480)="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") r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x3c, 0x0) ioctl$EVIOCGKEYCODE_V2(0xffffffffffffffff, 0x80284504, &(0x7f00000003c0)=""/188) ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x0) [ 1492.431184] hfsplus: gid requires an argument [ 1492.435862] hfsplus: unable to parse mount options 03:54:14 executing program 6: r0 = socket(0x11, 0xa, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000640)={0x0, 0x0, 0x0}, &(0x7f0000000680)=0xc) syz_mount_image$hfsplus(&(0x7f0000000240)='hfsplus\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, &(0x7f00000005c0), 0x0, &(0x7f00000006c0)=ANY=[@ANYBLOB='gid=', @ANYRESHEX=r1, @ANYBLOB="eb22"]) socket$nl_generic(0x10, 0x3, 0x10) setsockopt$inet_sctp6_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000000)=0x9, 0x4) 03:54:14 executing program 7: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f000000d000)={0xa, 0x4e20}, 0x1c) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}, 0xb}, 0x1c) syz_emit_ethernet(0x3e, &(0x7f00000001c0)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @random="e829f650db0f", [], {@ipv6={0x86dd, {0x0, 0x6, "50a09c", 0x8, 0xffffff11, 0x0, @remote={0xfe, 0x80, [], 0xbb}, @local={0xfe, 0x80, [], 0xaa}, {[], @udp={0x0, 0x4e20, 0x8}}}}}}, &(0x7f0000000040)) syz_emit_ethernet(0x3e, &(0x7f0000000000)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], {@ipv6={0x86dd, {0x0, 0x6, "50a09c", 0x8, 0xffffff11, 0x0, @remote={0xfe, 0x80, [], 0xbb}, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3000], 0xaa}, {[], @udp={0x300, 0x4e20, 0x8}}}}}}, &(0x7f0000000040)) [ 1492.653908] FAULT_INJECTION: forcing a failure. [ 1492.653908] name failslab, interval 1, probability 0, space 0, times 0 [ 1492.666294] CPU: 1 PID: 5799 Comm: syz-executor0 Not tainted 4.18.0-rc4+ #144 [ 1492.673578] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1492.683020] Call Trace: [ 1492.685627] dump_stack+0x1c9/0x2b4 [ 1492.689269] ? dump_stack_print_info.cold.2+0x52/0x52 [ 1492.694476] ? should_fail.cold.4+0x5/0x1a [ 1492.698723] should_fail.cold.4+0xa/0x1a [ 1492.702795] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 1492.707909] ? __schedule+0x884/0x1ed0 [ 1492.711825] ? retint_kernel+0x10/0x10 [ 1492.715726] ? __sched_text_start+0x8/0x8 [ 1492.719887] ? __lock_is_held+0xb5/0x140 [ 1492.723965] ? check_same_owner+0x340/0x340 [ 1492.728302] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1492.733070] __should_failslab+0x124/0x180 [ 1492.737316] should_failslab+0x9/0x14 [ 1492.741127] kmem_cache_alloc_node_trace+0x26f/0x770 [ 1492.746249] __kmalloc_node+0x33/0x70 [ 1492.750066] blk_mq_alloc_tag_set+0x385/0xad0 [ 1492.754570] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1492.760153] ? blk_mq_update_nr_hw_queues+0x510/0x510 [ 1492.765353] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 1492.770380] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1492.775147] loop_add+0x2be/0x9d0 [ 1492.778607] ? loop_queue_rq+0x660/0x660 [ 1492.782692] loop_control_ioctl+0x199/0x540 [ 1492.787017] ? loop_add+0x9d0/0x9d0 [ 1492.790649] ? loop_add+0x9d0/0x9d0 [ 1492.794293] ? loop_add+0x9d0/0x9d0 [ 1492.797956] do_vfs_ioctl+0x1de/0x1720 [ 1492.801856] ? retint_kernel+0x10/0x10 [ 1492.805750] ? ioctl_preallocate+0x300/0x300 [ 1492.810169] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1492.814937] ? retint_kernel+0x10/0x10 [ 1492.818839] ? security_file_ioctl+0x20/0xc0 [ 1492.823256] ? security_file_ioctl+0x27/0xc0 [ 1492.827673] ? security_file_ioctl+0x94/0xc0 [ 1492.832085] ksys_ioctl+0xa9/0xd0 [ 1492.835556] __x64_sys_ioctl+0x73/0xb0 [ 1492.839562] do_syscall_64+0x1b9/0x820 [ 1492.843472] ? syscall_slow_exit_work+0x500/0x500 [ 1492.848324] ? syscall_return_slowpath+0x5e0/0x5e0 [ 1492.853290] ? syscall_return_slowpath+0x31d/0x5e0 [ 1492.858230] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe [ 1492.863610] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1492.868465] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1492.873664] RIP: 0033:0x455a79 [ 1492.876861] Code: 1d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1492.896336] RSP: 002b:00007f420d477c68 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1492.904072] RAX: ffffffffffffffda RBX: 00007f420d4786d4 RCX: 0000000000455a79 [ 1492.911344] RDX: 0000000000000000 RSI: 0000000000004c80 RDI: 0000000000000015 [ 1492.918616] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 1492.925884] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000016 [ 1492.933175] R13: 00000000004bdfb1 R14: 00000000004ccab0 R15: 0000000000000001 [ 1493.014973] hfsplus: unable to parse mount options [ 1493.054945] hfsplus: unable to parse mount options 03:54:14 executing program 2: r0 = syz_open_dev$sndseq(&(0x7f0000000000)='/dev/snd/seq\x00', 0x0, 0x3) read(r0, &(0x7f0000fb6000)=""/28, 0x3f0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000418f50)={{0x80}, "0a4ceaa05d9a00000000000000039b3fd4cec307e8ef3d13eb790ec9c65abaf90d229db692542e5b78f8b29e0a27800f0000000000000009fb42f376589701a4", 0xa9824f69d1376637, 0x10800a}) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000240)={0xbf}) write$binfmt_script(r0, &(0x7f0000000000)=ANY=[], 0x0) r1 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000400)='/dev/qat_adf_ctl\x00', 0x1, 0x0) getsockopt$bt_BT_POWER(r1, 0x112, 0x9, &(0x7f0000000440)=0x8, &(0x7f0000000480)=0x1) ioctl$FS_IOC_FSSETXATTR(r0, 0x401c5820, &(0x7f0000000040)={0x2, 0xffffffff9aaff883, 0x5, 0x1f, 0x9}) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f00000002c0)={{}, 'port0\x00'}) openat$sequencer2(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer2\x00', 0x0, 0x0) 03:54:14 executing program 5: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer2\x00', 0x0, 0x0) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000040)="025cc83d6d345f8f762070") ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r0, 0x40085112, &(0x7f0000b18000)={{0xffffff93}, {0xffffffa0}, 0x0, 0x0, 0x0, [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfdfdffff00000000]}) 03:54:14 executing program 1: r0 = socket(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x2700000000000000}, 0xc, &(0x7f0000000900)={&(0x7f0000000040)={0x14, 0x1e, 0x201}, 0x14}, 0x1}, 0x0) 03:54:14 executing program 4: r0 = socket(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x3601000000000000}, 0xc, &(0x7f0000000900)={&(0x7f0000000040)={0x14, 0x1e, 0x201}, 0x14}, 0x1}, 0x0) 03:54:14 executing program 3: ioctl$BLKDISCARD(0xffffffffffffffff, 0x1277, &(0x7f0000000180)) r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140)='/dev/snapshot\x00', 0x0, 0x0) fcntl$addseals(0xffffffffffffffff, 0x409, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f0000000000), &(0x7f00000000c0)=0x8) ioctl$EVIOCGLED(0xffffffffffffffff, 0x80404519, &(0x7f0000000580)=""/236) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x3c, 0x0) ioctl$EVIOCGKEYCODE_V2(0xffffffffffffffff, 0x80284504, &(0x7f00000003c0)=""/188) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$SCSI_IOCTL_SYNC(r0, 0x4) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c82, 0x0) 03:54:14 executing program 0 (fault-call:10 fault-nth:2): r0 = syz_open_dev$vcsa(&(0x7f0000000100)='/dev/vcsa#\x00', 0x5, 0x101000) ioctl$BLKDISCARD(r0, 0x1277, &(0x7f0000000180)=0x5f) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140)='/dev/snapshot\x00', 0x0, 0x0) connect$nfc_llcp(r1, &(0x7f0000000300)={0x27, 0x0, 0x0, 0x6, 0x0, 0x0, "f44825e9da257dcd22512d531f545cf0bce08002f76d5e9bd3d1dcb3f649bf7ba49078f877ce09f903ed489ab0bbf0f088675b47312412edd6bd577062eb34", 0x1c}, 0x60) fcntl$addseals(0xffffffffffffffff, 0x409, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EVIOCGLED(r1, 0x80404519, &(0x7f0000000580)=""/236) ioctl$FS_IOC_SETFSLABEL(r2, 0x41009432, &(0x7f0000000480)="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") r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x3c, 0x0) ioctl$EVIOCGKEYCODE_V2(0xffffffffffffffff, 0x80284504, &(0x7f00000003c0)=""/188) ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x0) 03:54:14 executing program 6: r0 = socket(0x11, 0xa, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000080)={0x0, 0x0, 0x0}, &(0x7f00000000c0)=0x680a6648) syz_mount_image$hfsplus(&(0x7f0000000240)='hfsplus\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, &(0x7f00000005c0), 0x0, &(0x7f00000006c0)={[{@gid={'gid', 0x3d, r1}, 0x2c}]}) 03:54:15 executing program 7: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f000000d000)={0xa, 0x4e20}, 0x1c) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}, 0xb}, 0x1c) syz_emit_ethernet(0x3e, &(0x7f00000001c0)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @random="e829f650db0f", [], {@ipv6={0x86dd, {0x0, 0x6, "50a09c", 0x8, 0xffffff11, 0x0, @remote={0xfe, 0x80, [], 0xbb}, @local={0xfe, 0x80, [], 0xaa}, {[], @udp={0x0, 0x4e20, 0x8}}}}}}, &(0x7f0000000040)) syz_emit_ethernet(0x3e, &(0x7f0000000000)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], {@ipv6={0x86dd, {0x0, 0x6, "50a09c", 0x8, 0xffffff11, 0x0, @remote={0xfe, 0x80, [], 0xbb}, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x300], 0xaa}, {[], @udp={0x300, 0x4e20, 0x8}}}}}}, &(0x7f0000000040)) 03:54:15 executing program 1: r0 = socket(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x5d}, 0xc, &(0x7f0000000900)={&(0x7f0000000040)={0x14, 0x1e, 0x201}, 0x14}, 0x1}, 0x0) 03:54:15 executing program 4: r0 = socket(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x35000000}, 0xc, &(0x7f0000000900)={&(0x7f0000000040)={0x14, 0x1e, 0x201}, 0x14}, 0x1}, 0x0) [ 1493.554083] hfsplus: gid requires an argument [ 1493.558713] hfsplus: unable to parse mount options [ 1493.571197] FAULT_INJECTION: forcing a failure. [ 1493.571197] name failslab, interval 1, probability 0, space 0, times 0 [ 1493.583111] CPU: 1 PID: 5824 Comm: syz-executor0 Not tainted 4.18.0-rc4+ #144 [ 1493.590413] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1493.599784] Call Trace: [ 1493.602396] dump_stack+0x1c9/0x2b4 [ 1493.606051] ? dump_stack_print_info.cold.2+0x52/0x52 [ 1493.611296] ? should_fail.cold.4+0x5/0x1a [ 1493.615642] should_fail.cold.4+0xa/0x1a [ 1493.619719] ? unwind_get_return_address+0x61/0xa0 [ 1493.624675] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 1493.629802] ? graph_lock+0x170/0x170 [ 1493.633626] ? save_stack+0xa9/0xd0 [ 1493.637279] ? find_held_lock+0x36/0x1c0 [ 1493.641370] ? __lock_is_held+0xb5/0x140 [ 1493.645465] ? check_same_owner+0x340/0x340 [ 1493.649808] ? rcu_note_context_switch+0x730/0x730 [ 1493.654764] __should_failslab+0x124/0x180 [ 1493.659022] should_failslab+0x9/0x14 [ 1493.662840] kmem_cache_alloc_node_trace+0x26f/0x770 [ 1493.667957] ? retint_kernel+0x10/0x10 [ 1493.671870] __kmalloc_node+0x33/0x70 [ 1493.675697] blk_mq_alloc_tag_set+0x41c/0xad0 [ 1493.680225] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1493.685789] ? blk_mq_update_nr_hw_queues+0x510/0x510 [ 1493.691005] ? loop_add+0xec/0x9d0 [ 1493.694574] ? loop_add+0xfa/0x9d0 [ 1493.698132] loop_add+0x2be/0x9d0 [ 1493.701604] ? loop_lookup+0x105/0x230 [ 1493.705513] ? loop_queue_rq+0x660/0x660 [ 1493.709597] loop_control_ioctl+0x199/0x540 [ 1493.713955] ? loop_add+0x9d0/0x9d0 [ 1493.717586] ? retint_kernel+0x10/0x10 [ 1493.721496] ? do_vfs_ioctl+0xd1/0x1720 [ 1493.725474] ? loop_add+0x9d0/0x9d0 [ 1493.729114] do_vfs_ioctl+0x1de/0x1720 [ 1493.733016] ? __lock_is_held+0xb5/0x140 [ 1493.737094] ? ioctl_preallocate+0x300/0x300 [ 1493.741525] ? __fget_light+0x2f7/0x440 [ 1493.745527] ? fget_raw+0x20/0x20 [ 1493.748994] ? __sb_end_write+0xac/0xe0 [ 1493.752990] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1493.758545] ? fput+0x130/0x1a0 [ 1493.761850] ? ksys_write+0x1ae/0x260 [ 1493.765672] ? security_file_ioctl+0x94/0xc0 [ 1493.770102] ksys_ioctl+0xa9/0xd0 [ 1493.773577] __x64_sys_ioctl+0x73/0xb0 [ 1493.777489] do_syscall_64+0x1b9/0x820 [ 1493.781394] ? syscall_slow_exit_work+0x500/0x500 [ 1493.786287] ? syscall_return_slowpath+0x5e0/0x5e0 [ 1493.791238] ? syscall_return_slowpath+0x31d/0x5e0 [ 1493.796212] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1493.801776] ? retint_user+0x18/0x18 [ 1493.805519] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1493.810396] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1493.815596] RIP: 0033:0x455a79 [ 1493.818781] Code: 1d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1493.838203] RSP: 002b:00007f420d477c68 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1493.845936] RAX: ffffffffffffffda RBX: 00007f420d4786d4 RCX: 0000000000455a79 03:54:15 executing program 3: ioctl$BLKDISCARD(0xffffffffffffffff, 0x1277, &(0x7f0000000180)) r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140)='/dev/snapshot\x00', 0x0, 0x0) fcntl$addseals(0xffffffffffffffff, 0x409, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f0000000000)={0x0}, &(0x7f00000000c0)=0x8) getsockopt$inet_sctp_SCTP_PR_STREAM_STATUS(r0, 0x84, 0x74, &(0x7f0000000040)=""/35, &(0x7f0000000080)=0x23) ioctl$EVIOCGLED(0xffffffffffffffff, 0x80404519, &(0x7f0000000580)=""/236) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x3c, 0x0) ioctl$EVIOCGKEYCODE_V2(0xffffffffffffffff, 0x80284504, &(0x7f00000003c0)=""/188) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r0, 0x84, 0x8, &(0x7f0000000280)=0x80, 0x4) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r0, 0x84, 0x1f, &(0x7f00000001c0)={r1, @in={{0x2, 0x4e20, @rand_addr=0x100000001}}, 0xfffffffffffffff8, 0x800}, &(0x7f0000000100)=0x90) fcntl$setstatus(r0, 0x4, 0x4000) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c82, 0x0) 03:54:15 executing program 7: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f000000d000)={0xa, 0x4e20}, 0x1c) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}, 0xb}, 0x1c) syz_emit_ethernet(0x3e, &(0x7f00000001c0)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @random="e829f650db0f", [], {@ipv6={0x86dd, {0x0, 0x6, "50a09c", 0x8, 0xffffff11, 0x0, @remote={0xfe, 0x80, [], 0xbb}, @local={0xfe, 0x80, [], 0xaa}, {[], @udp={0x0, 0x4e20, 0x8}}}}}}, &(0x7f0000000040)) syz_emit_ethernet(0x3e, &(0x7f0000000000)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], {@ipv6={0x86dd, {0x0, 0x6, "50a09c", 0x8, 0xffffff11, 0x0, @remote={0xfe, 0x80, [], 0xbb}, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff000000000000], 0xaa}, {[], @udp={0x300, 0x4e20, 0x8}}}}}}, &(0x7f0000000040)) 03:54:15 executing program 1: r0 = socket(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0xc400}, 0xc, &(0x7f0000000900)={&(0x7f0000000040)={0x14, 0x1e, 0x201}, 0x14}, 0x1}, 0x0) 03:54:15 executing program 1: r0 = socket(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x3800}, 0xc, &(0x7f0000000900)={&(0x7f0000000040)={0x14, 0x1e, 0x201}, 0x14}, 0x1}, 0x0) 03:54:15 executing program 5: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer2\x00', 0x0, 0x0) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000040)="025cc83d6d345f8f762070") ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r0, 0x40085112, &(0x7f0000b18000)={{0xffffff93}, {0xffffffa0}, 0x0, 0x0, 0x0, [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfdfdffff]}) [ 1493.853218] RDX: 0000000000000000 RSI: 0000000000004c80 RDI: 0000000000000016 [ 1493.860508] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 1493.867805] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000017 [ 1493.875094] R13: 00000000004bdfb1 R14: 00000000004ccab0 R15: 0000000000000002 03:54:15 executing program 0 (fault-call:10 fault-nth:3): r0 = syz_open_dev$vcsa(&(0x7f0000000100)='/dev/vcsa#\x00', 0x5, 0x101000) ioctl$BLKDISCARD(r0, 0x1277, &(0x7f0000000180)=0x5f) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140)='/dev/snapshot\x00', 0x0, 0x0) connect$nfc_llcp(r1, &(0x7f0000000300)={0x27, 0x0, 0x0, 0x6, 0x0, 0x0, "f44825e9da257dcd22512d531f545cf0bce08002f76d5e9bd3d1dcb3f649bf7ba49078f877ce09f903ed489ab0bbf0f088675b47312412edd6bd577062eb34", 0x1c}, 0x60) fcntl$addseals(0xffffffffffffffff, 0x409, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EVIOCGLED(r1, 0x80404519, &(0x7f0000000580)=""/236) ioctl$FS_IOC_SETFSLABEL(r2, 0x41009432, &(0x7f0000000480)="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") r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x3c, 0x0) ioctl$EVIOCGKEYCODE_V2(0xffffffffffffffff, 0x80284504, &(0x7f00000003c0)=""/188) ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x0) [ 1493.906058] hfsplus: gid requires an argument [ 1493.910703] hfsplus: unable to parse mount options 03:54:15 executing program 2: r0 = syz_open_dev$sndseq(&(0x7f0000dcc000)='/dev/snd/seq\x00', 0x0, 0x2) read(r0, &(0x7f0000fb6000)=""/28, 0x3f0) pipe(&(0x7f00000008c0)={0xffffffffffffffff}) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000418f50)={{0x80}, "0a4ceaa05d9a00000000000000039b3fd4cec307e8ef3d13eb790ec9c65abaf90d229db692542e5b78f8b29e0a27800f0000000000000009fb42f376589701a4", 0xa9824f69d1376637, 0x10800a}) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000240)={0xbf}) recvmsg$kcm(0xffffffffffffff9c, &(0x7f0000000800)={&(0x7f0000000100)=@pppol2tpv3={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @rand_addr}}}, 0x80, &(0x7f0000000700)=[{&(0x7f0000000180)=""/170, 0xaa}, {&(0x7f0000000380)=""/140, 0x8c}, {&(0x7f0000000440)=""/204, 0xcc}, {&(0x7f0000000540)=""/36, 0x24}, {&(0x7f0000000580)=""/7, 0x7}, {&(0x7f00000005c0)=""/205, 0xcd}, {&(0x7f00000006c0)=""/35, 0x23}], 0x7, &(0x7f0000000780)=""/113, 0x71, 0x6}, 0x100) getsockopt$inet_sctp6_SCTP_MAX_BURST(r2, 0x84, 0x14, &(0x7f0000000840), &(0x7f0000000880)=0x4) write$binfmt_script(r0, &(0x7f0000000000)=ANY=[], 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f00000002c0)={{}, 'port0\x00'}) r3 = openat$sequencer2(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer2\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(r3, 0x84, 0x7c, &(0x7f0000000000)={0x0, 0x40, 0x8}, &(0x7f0000000040)=0x8) mount$9p_virtio(&(0x7f0000000900)=')posix_acl_accessbdev[vmnet0ppp1\x00', &(0x7f0000000940)='./file0\x00', &(0x7f0000000980)='9p\x00', 0x28080c, &(0x7f00000009c0)={'trans=virtio,', {[{@noextend='noextend', 0x2c}, {@cache_mmap='cache=mmap', 0x2c}, {@access_any='access=any', 0x2c}]}}) setsockopt$inet_sctp_SCTP_AUTH_DELETE_KEY(r1, 0x84, 0x19, &(0x7f0000000080)={r4, 0x6}, 0x8) 03:54:15 executing program 6: r0 = socket(0x11, 0xa, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000640)={0x0, 0x0, 0x0}, &(0x7f0000000680)=0xc) syz_mount_image$hfsplus(&(0x7f0000000240)='hfsplus\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, &(0x7f00000005c0), 0x0, &(0x7f00000006c0)={[{@gid={'gid', 0x3d, r1}, 0x2c}]}) r2 = syz_genetlink_get_family_id$team(&(0x7f0000000040)='team\x00') getsockopt$inet_mreqn(r0, 0x0, 0x20, &(0x7f0000000180)={@dev, @remote, 0x0}, &(0x7f00000001c0)=0xc) getsockopt$inet_mreqn(r0, 0x0, 0x0, &(0x7f0000000200)={@empty, @local, 0x0}, &(0x7f0000000280)=0xc) accept4$packet(r0, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @random}, &(0x7f0000000380)=0x14, 0x80000) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000000480)={{{@in6=@dev, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}}}, &(0x7f0000000580)=0xe8) getsockopt$inet6_mreq(r0, 0x29, 0x1f, &(0x7f00000005c0)={@loopback, 0x0}, &(0x7f0000000600)=0x14) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000700)={'team0\x00', 0x0}) getsockopt$inet_mreqn(r0, 0x0, 0x23, &(0x7f0000000740)={@multicast2, @remote, 0x0}, &(0x7f0000000780)=0xc) getpeername$packet(r0, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @random}, &(0x7f0000000800)=0x14) getsockopt$inet6_mreq(r0, 0x29, 0x14, &(0x7f0000000840)={@remote, 0x0}, &(0x7f0000000880)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000900)={{{@in=@remote, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={[], [], @loopback}}, 0x0, @in6=@dev}}, &(0x7f0000000a00)=0xe8) getpeername$packet(r0, &(0x7f0000000a40)={0x0, 0x0, 0x0}, &(0x7f0000000a80)=0x14) accept$packet(r0, &(0x7f00000020c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @link_local}, &(0x7f0000002100)=0x14) getsockopt$inet_pktinfo(r0, 0x0, 0x8, &(0x7f0000002140)={0x0, @local, @broadcast}, &(0x7f0000002180)=0xc) getsockopt$inet_sctp_SCTP_PR_ASSOC_STATUS(r0, 0x84, 0x73, &(0x7f0000000080)={0x0, 0x2, 0x0, 0x1a5d, 0x1}, &(0x7f00000000c0)=0x18) setsockopt$inet_sctp_SCTP_RESET_ASSOC(r0, 0x84, 0x78, &(0x7f0000000100)=r16, 0x4) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f00000021c0)={'vcan0\x00', 0x0}) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000002200)={{{@in6=@local, @in=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@dev}, 0x0, @in6=@remote}}, &(0x7f0000002300)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000002340)={'team0\x00', 0x0}) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000002380)={{{@in6=@mcast1, @in, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@loopback}, 0x0, @in6=@loopback}}, &(0x7f0000002480)=0xe8) accept4$packet(r0, &(0x7f00000024c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @broadcast}, &(0x7f0000002500)=0x14, 0x800) accept$packet(r0, &(0x7f0000002540)={0x0, 0x0, 0x0}, &(0x7f0000002580)=0x14) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f00000025c0)={'vcan0\x00', 0x0}) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000002600)={'veth0\x00', 0x0}) sendmsg$TEAM_CMD_PORT_LIST_GET(r0, &(0x7f0000002e00)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x10200040}, 0xc, &(0x7f0000002dc0)={&(0x7f0000000ac0)=ANY=[@ANYBLOB='p\a\x00\x00', @ANYRES16=r2, @ANYBLOB="030526bd7000ffdbdf250300000008000100", @ANYRES32=r3, @ANYBLOB="34010200400001002400010071756575655f69640000000000000000000000000000000000000000000000000800030003000000080004000100000008000600", @ANYRES32=r4, @ANYBLOB="3c00010024000100757365725f6c696e6b75705f656e61626c65640000000000000000000000000008000300060000000400040008000600", @ANYRES32=r5, @ANYBLOB="3c00010024020100757365656e61626c6564adb91abdbf655a00e816d92008b1268f72fe7ee285d35c00000008000300060000000400040008000600", @ANYRES32=r6, @ANYBLOB="40000100240001006c625f74785f686173685f746f5f706f72745f6d617070696e67000000000000080003000300000008000400", @ANYRES32=r7, @ANYBLOB="080007000000000038000100240001006d636173745f72656a6f696e5f636f756e740000000000000000000000000000080003000300000008000400fc31a01708000100", @ANYRES32=r8, @ANYBLOB="0400020008000100", @ANYRES32=r9, @ANYBLOB="ac00020038000100240001006c625f73746174735f726566726573685f696e74657276616c000000000000000800030003000000080004000600000038000100240001006d636173745f72656a6f696e5f636f756e7400000000000000000000000000000800030003000000080004000100000038000100240001006d636173745f72656a6f696e5f636f756e740000000000000000000000000000080003000300000008000400ff0f000008000100", @ANYRES32=r10, @ANYBLOB="3c0102003c00010024000100757365725f6c696e6b75705f656e61626c65640000000000000000000000000008000300060000000400040008000600", @ANYRES32=r11, @ANYBLOB="38000100240001006e6f746966795f70656572735f636f756e740000000000000000000000000000080003000300000008000400ff7f00003c00010024000100757365725f6c696e6b757000000000000000000000000000000000000000000008000300060000000400040008000600", @ANYRES32=r12, @ANYBLOB="4c000100240001006c625f74785f6d6574686f64000000000000000000000000000000000000000008000300050000001c000400686173685f746f5f706f72745f6d617070696e67000000003c00010024000100757365725f6c696e6b75705f656e61626c65640000000000000000000000000008000300060000000400040008000600", @ANYRES32=r13, @ANYBLOB="08000100", @ANYRES32=r14, @ANYBLOB="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", @ANYRES32=r15, @ANYBLOB="40000100240001006c625f74785f686173685f746f5f706f72745f6d617070696e67000000000000080003000300000008000400", @ANYRES32=r17, @ANYBLOB="080007000000000008000100", @ANYRES32=r18, @ANYBLOB="ac00020038000100240001006d636173745f72656a6f696e5f636f756e7400000000000000000000000000000800030003000000080004002000000038000100240001006e6f746966795f70656572735f636f756e7400000000000000000000000000000800030003000000080004000000000038000100240001006c625f73746174735f726566726573685f696e74657276616c00000000000000080003000300000008000400b8ffffff08000100", @ANYRES32=r19, @ANYBLOB="0400020008000100", @ANYRES32=r20, @ANYBLOB="7400020038000100240001006d636173745f72656a6f696e5f636f756e7400000000000000000000000000000800030003000000080004000300000038000100240001006d636173745f72656a6f696e5f696e74657276616c00000000000000000000000800030003000000080004000400000008000100", @ANYRES32=r21, @ANYBLOB="4800020044000100240001006270665f686173685f66756e6300000000000000000000000000000000000000080003000b000000140004009600ff01060000002e0c081d0500000008000100", @ANYRES32=r22, @ANYBLOB="4001020040000100240001006d6f6465000000000000000000000000000000000000000000000000000000000800030005000000100004006c6f616462616c616e6365003800010024000100616374697665706f727400000000000000000000000000000000000000000000080003000300000008000400", @ANYRES32=r23, @ANYBLOB="40000100240001006d6f6465000000000000000000000000000000000000000000000000000000000800030005000000100004006c6f616462616c616e6365003800010024000100616374697665706f727400000000000000000000000000000000000000000000080003000300000008000400", @ANYRES32=r24, @ANYBLOB="4c000100240001006c625f74785f6d6574686f64000000000000000000000000000000000000000008000300050000001c000400686173685f746f5f706f72745f6d617070696e6700000000"], 0x770}, 0x1, 0x0, 0x0, 0x80}, 0x80) 03:54:15 executing program 4: r0 = socket(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4d000000}, 0xc, &(0x7f0000000900)={&(0x7f0000000040)={0x14, 0x1e, 0x201}, 0x14}, 0x1}, 0x0) 03:54:15 executing program 1: r0 = socket(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0xbb00000000000000}, 0xc, &(0x7f0000000900)={&(0x7f0000000040)={0x14, 0x1e, 0x201}, 0x14}, 0x1}, 0x0) 03:54:15 executing program 7: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f000000d000)={0xa, 0x4e20}, 0x1c) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}, 0xb}, 0x1c) syz_emit_ethernet(0x3e, &(0x7f00000001c0)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @random="e829f650db0f", [], {@ipv6={0x86dd, {0x0, 0x6, "50a09c", 0x8, 0xffffff11, 0x0, @remote={0xfe, 0x80, [], 0xbb}, @local={0xfe, 0x80, [], 0xaa}, {[], @udp={0x0, 0x4e20, 0x8}}}}}}, &(0x7f0000000040)) syz_emit_ethernet(0x3e, &(0x7f0000000000)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], {@ipv6={0x86dd, {0x0, 0x6, "50a09c", 0x8, 0xffffff11, 0x0, @remote={0xfe, 0x80, [], 0xbb}, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x700000000000000], 0xaa}, {[], @udp={0x300, 0x4e20, 0x8}}}}}}, &(0x7f0000000040)) 03:54:15 executing program 3: ioctl$BLKDISCARD(0xffffffffffffffff, 0x1277, &(0x7f0000000180)) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140)='/dev/snapshot\x00', 0x0, 0x0) fcntl$addseals(0xffffffffffffffff, 0x409, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f0000000000), &(0x7f00000000c0)=0x8) ioctl$EVIOCGLED(0xffffffffffffffff, 0x80404519, &(0x7f0000000580)=""/236) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x3c, 0x0) userfaultfd(0x80000) ioctl$EVIOCGKEYCODE_V2(0xffffffffffffffff, 0x80284504, &(0x7f00000003c0)=""/188) r2 = getpid() perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x100000001, 0x1, 0x7, 0x0, 0xc546, 0x100, 0x8, 0x1, 0x2, 0x9, 0x5, 0x2, 0x3, 0x8001, 0x9, 0x1, 0x1f, 0x7, 0x10000, 0x5, 0x3, 0x7, 0x1, 0x6, 0x4, 0xfdd5, 0xd6, 0x8, 0x5, 0x5e6, 0x1, 0x378, 0x5, 0x9, 0x0, 0x0, 0x9, 0x0, @perf_config_ext={0x2, 0xfffffffffffff001}, 0x100, 0x9, 0x5, 0x4, 0x100000000, 0x2, 0x9}, r2, 0x3, r0, 0x2) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c82, 0x0) 03:54:15 executing program 5: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer2\x00', 0x0, 0x0) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000040)="025cc83d6d345f8f762070") ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r0, 0x40085112, &(0x7f0000b18000)={{0xffffff93}, {0xffffffa0}, 0x0, 0x0, 0x0, [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000]}) [ 1494.091071] FAULT_INJECTION: forcing a failure. [ 1494.091071] name failslab, interval 1, probability 0, space 0, times 0 [ 1494.102961] CPU: 1 PID: 5855 Comm: syz-executor0 Not tainted 4.18.0-rc4+ #144 [ 1494.110257] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1494.119611] Call Trace: [ 1494.122218] dump_stack+0x1c9/0x2b4 [ 1494.125857] ? dump_stack_print_info.cold.2+0x52/0x52 [ 1494.131052] ? should_fail.cold.4+0x5/0x1a [ 1494.135297] should_fail.cold.4+0xa/0x1a [ 1494.139368] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 1494.144479] ? kernel_text_address+0x79/0xf0 [ 1494.148893] ? __kernel_text_address+0xd/0x40 [ 1494.153393] ? graph_lock+0x170/0x170 [ 1494.157197] ? __save_stack_trace+0x8d/0xf0 [ 1494.161527] ? find_held_lock+0x36/0x1c0 [ 1494.165599] ? __lock_is_held+0xb5/0x140 [ 1494.169676] ? check_same_owner+0x340/0x340 [ 1494.174007] ? rcu_note_context_switch+0x730/0x730 [ 1494.178959] __should_failslab+0x124/0x180 [ 1494.183200] should_failslab+0x9/0x14 [ 1494.187017] kmem_cache_alloc_node_trace+0x26f/0x770 [ 1494.192125] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1494.197691] ? find_next_bit+0x104/0x130 [ 1494.201762] blk_mq_init_tags+0x79/0x2b0 [ 1494.205829] blk_mq_alloc_rq_map+0x9f/0x220 [ 1494.210170] __blk_mq_alloc_rq_map+0xb1/0x2e0 [ 1494.214674] blk_mq_alloc_tag_set+0x627/0xad0 [ 1494.219180] ? blk_mq_update_nr_hw_queues+0x510/0x510 [ 1494.224373] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1494.229140] loop_add+0x2be/0x9d0 [ 1494.232599] ? loop_queue_rq+0x660/0x660 [ 1494.236663] ? loop_control_ioctl+0x17c/0x540 [ 1494.241161] ? loop_control_ioctl+0x18a/0x540 [ 1494.245661] loop_control_ioctl+0x199/0x540 [ 1494.249984] ? loop_add+0x9d0/0x9d0 [ 1494.253618] ? retint_kernel+0x10/0x10 [ 1494.257515] ? do_vfs_ioctl+0x123/0x1720 [ 1494.261589] ? loop_add+0x9d0/0x9d0 [ 1494.265218] do_vfs_ioctl+0x1de/0x1720 [ 1494.269129] ? retint_kernel+0x10/0x10 [ 1494.273021] ? ioctl_preallocate+0x300/0x300 [ 1494.277448] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1494.282214] ? retint_kernel+0x10/0x10 [ 1494.286108] ? security_file_ioctl+0x20/0xc0 [ 1494.290520] ? security_file_ioctl+0x27/0xc0 [ 1494.294931] ? security_file_ioctl+0x94/0xc0 [ 1494.299428] ksys_ioctl+0xa9/0xd0 [ 1494.302887] __x64_sys_ioctl+0x73/0xb0 [ 1494.306795] do_syscall_64+0x1b9/0x820 [ 1494.310706] ? syscall_slow_exit_work+0x500/0x500 [ 1494.315559] ? syscall_return_slowpath+0x5e0/0x5e0 [ 1494.320492] ? syscall_return_slowpath+0x31d/0x5e0 [ 1494.325445] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe [ 1494.330816] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1494.335670] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1494.340859] RIP: 0033:0x455a79 [ 1494.344045] Code: 1d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1494.363445] RSP: 002b:00007f420d477c68 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1494.371158] RAX: ffffffffffffffda RBX: 00007f420d4786d4 RCX: 0000000000455a79 [ 1494.378425] RDX: 0000000000000000 RSI: 0000000000004c80 RDI: 0000000000000016 [ 1494.385715] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 1494.392990] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000017 [ 1494.400261] R13: 00000000004bdfb1 R14: 00000000004ccab0 R15: 0000000000000003 [ 1494.417993] blk-mq: reduced tag depth (128 -> 64) 03:54:16 executing program 1: r0 = socket(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x56000000}, 0xc, &(0x7f0000000900)={&(0x7f0000000040)={0x14, 0x1e, 0x201}, 0x14}, 0x1}, 0x0) 03:54:16 executing program 0 (fault-call:10 fault-nth:4): r0 = syz_open_dev$vcsa(&(0x7f0000000100)='/dev/vcsa#\x00', 0x5, 0x101000) ioctl$BLKDISCARD(r0, 0x1277, &(0x7f0000000180)=0x5f) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140)='/dev/snapshot\x00', 0x0, 0x0) connect$nfc_llcp(r1, &(0x7f0000000300)={0x27, 0x0, 0x0, 0x6, 0x0, 0x0, "f44825e9da257dcd22512d531f545cf0bce08002f76d5e9bd3d1dcb3f649bf7ba49078f877ce09f903ed489ab0bbf0f088675b47312412edd6bd577062eb34", 0x1c}, 0x60) fcntl$addseals(0xffffffffffffffff, 0x409, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EVIOCGLED(r1, 0x80404519, &(0x7f0000000580)=""/236) ioctl$FS_IOC_SETFSLABEL(r2, 0x41009432, &(0x7f0000000480)="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") r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x3c, 0x0) ioctl$EVIOCGKEYCODE_V2(0xffffffffffffffff, 0x80284504, &(0x7f00000003c0)=""/188) ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x0) 03:54:16 executing program 4: r0 = socket(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0xc0}, 0xc, &(0x7f0000000900)={&(0x7f0000000040)={0x14, 0x1e, 0x201}, 0x14}, 0x1}, 0x0) 03:54:16 executing program 7: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f000000d000)={0xa, 0x4e20}, 0x1c) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}, 0xb}, 0x1c) syz_emit_ethernet(0x3e, &(0x7f00000001c0)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @random="e829f650db0f", [], {@ipv6={0x86dd, {0x0, 0x6, "50a09c", 0x8, 0xffffff11, 0x0, @remote={0xfe, 0x80, [], 0xbb}, @local={0xfe, 0x80, [], 0xaa}, {[], @udp={0x0, 0x4e20, 0x8}}}}}}, &(0x7f0000000040)) syz_emit_ethernet(0x3e, &(0x7f0000000000)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], {@ipv6={0x86dd, {0x0, 0x6, "50a09c", 0x8, 0xffffff11, 0x0, @remote={0xfe, 0x80, [], 0xbb}, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000], 0xaa}, {[], @udp={0x300, 0x4e20, 0x8}}}}}}, &(0x7f0000000040)) 03:54:16 executing program 3: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140)='/dev/snapshot\x00', 0x0, 0x0) fcntl$addseals(0xffffffffffffffff, 0x409, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f0000000000), &(0x7f00000000c0)=0x8) ioctl$EVIOCGLED(0xffffffffffffffff, 0x80404519, &(0x7f0000000580)=""/236) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x3c, 0x0) ioctl$EVIOCGKEYCODE_V2(0xffffffffffffffff, 0x80284504, &(0x7f00000003c0)=""/188) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c82, 0x0) 03:54:16 executing program 5: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer2\x00', 0x0, 0x0) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000040)="025cc83d6d345f8f762070") ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r0, 0x40085112, &(0x7f0000b18000)={{0xffffff93}, {0xffffffa0}, 0x0, 0x0, 0x0, [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8]}) [ 1494.616753] hfsplus: gid requires an argument [ 1494.621366] hfsplus: unable to parse mount options [ 1494.655676] hfsplus: gid requires an argument [ 1494.660336] hfsplus: unable to parse mount options [ 1494.790774] FAULT_INJECTION: forcing a failure. [ 1494.790774] name failslab, interval 1, probability 0, space 0, times 0 [ 1494.802497] CPU: 1 PID: 5880 Comm: syz-executor0 Not tainted 4.18.0-rc4+ #144 [ 1494.809790] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1494.819156] Call Trace: [ 1494.821761] dump_stack+0x1c9/0x2b4 [ 1494.825417] ? dump_stack_print_info.cold.2+0x52/0x52 [ 1494.830652] should_fail.cold.4+0xa/0x1a [ 1494.834748] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 1494.839882] ? retint_kernel+0x10/0x10 [ 1494.843790] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 1494.848832] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1494.853622] ? retint_kernel+0x10/0x10 [ 1494.857583] ? lock_is_held_type+0x18b/0x210 [ 1494.862036] ? check_same_owner+0x340/0x340 [ 1494.866390] ? kasan_kmalloc+0xc4/0xe0 [ 1494.870302] ? kmem_cache_alloc_node_trace+0x150/0x770 [ 1494.875605] ? blk_mq_init_tags+0x79/0x2b0 [ 1494.879890] ? rcu_note_context_switch+0x730/0x730 [ 1494.884837] ? loop_add+0x2be/0x9d0 [ 1494.888484] ? loop_control_ioctl+0x199/0x540 [ 1494.893041] __should_failslab+0x124/0x180 [ 1494.897307] should_failslab+0x9/0x14 [ 1494.901126] kmem_cache_alloc_node_trace+0x26f/0x770 [ 1494.906246] ? mark_held_locks+0xc9/0x160 [ 1494.910423] __kmalloc_node+0x33/0x70 [ 1494.914260] sbitmap_init_node+0x290/0x450 [ 1494.918514] sbitmap_queue_init_node+0xb2/0x850 [ 1494.923204] ? sbitmap_init_node+0x450/0x450 [ 1494.927627] ? rcu_read_lock_sched_held+0x108/0x120 [ 1494.932671] ? kmem_cache_alloc_node_trace+0x34e/0x770 [ 1494.937968] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1494.943520] ? find_next_bit+0x104/0x130 [ 1494.947604] blk_mq_init_tags+0x11b/0x2b0 [ 1494.951797] blk_mq_alloc_rq_map+0x9f/0x220 [ 1494.956157] __blk_mq_alloc_rq_map+0xb1/0x2e0 [ 1494.960668] blk_mq_alloc_tag_set+0x627/0xad0 [ 1494.965183] ? blk_mq_update_nr_hw_queues+0x510/0x510 [ 1494.970395] loop_add+0x2be/0x9d0 [ 1494.973860] ? loop_lookup+0x105/0x230 [ 1494.977788] ? loop_queue_rq+0x660/0x660 [ 1494.982043] loop_control_ioctl+0x199/0x540 [ 1494.986382] ? loop_add+0x9d0/0x9d0 [ 1494.990015] ? loop_add+0x9d0/0x9d0 [ 1494.993659] ? loop_add+0x9d0/0x9d0 [ 1494.997294] do_vfs_ioctl+0x1de/0x1720 [ 1495.001196] ? __lock_is_held+0xb5/0x140 [ 1495.005267] ? ioctl_preallocate+0x300/0x300 [ 1495.009683] ? __fget_light+0x2f7/0x440 [ 1495.013673] ? fget_raw+0x20/0x20 [ 1495.017135] ? __sb_end_write+0xac/0xe0 [ 1495.021120] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1495.026663] ? fput+0x130/0x1a0 [ 1495.029946] ? ksys_write+0x1ae/0x260 [ 1495.033755] ? retint_kernel+0x10/0x10 [ 1495.037653] ? security_file_ioctl+0x94/0xc0 [ 1495.042074] ksys_ioctl+0xa9/0xd0 [ 1495.045538] __x64_sys_ioctl+0x73/0xb0 [ 1495.049433] do_syscall_64+0x1b9/0x820 [ 1495.053340] ? syscall_slow_exit_work+0x500/0x500 [ 1495.058192] ? syscall_return_slowpath+0x5e0/0x5e0 [ 1495.063133] ? syscall_return_slowpath+0x31d/0x5e0 [ 1495.068081] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1495.073630] ? retint_user+0x18/0x18 [ 1495.077363] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1495.082223] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1495.087423] RIP: 0033:0x455a79 [ 1495.090784] Code: 1d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1495.110204] RSP: 002b:00007f420d477c68 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1495.117934] RAX: ffffffffffffffda RBX: 00007f420d4786d4 RCX: 0000000000455a79 [ 1495.125236] RDX: 0000000000000000 RSI: 0000000000004c80 RDI: 0000000000000016 [ 1495.132516] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 03:54:16 executing program 1: r0 = socket(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x12b}, 0xc, &(0x7f0000000900)={&(0x7f0000000040)={0x14, 0x1e, 0x201}, 0x14}, 0x1}, 0x0) 03:54:16 executing program 6: r0 = socket(0x11, 0xa, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000640)={0x0, 0x0, 0x0}, &(0x7f0000000680)=0xc) syz_mount_image$hfsplus(&(0x7f0000000240)='hfsplus\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, &(0x7f00000005c0), 0x0, &(0x7f00000006c0)=ANY=[@ANYBLOB='gid=', @ANYRESHEX=r1, @ANYBLOB='\x00\x00']) [ 1495.140706] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000017 [ 1495.147982] R13: 00000000004bdfb1 R14: 00000000004ccab0 R15: 0000000000000004 [ 1495.169905] blk-mq: reduced tag depth (128 -> 64) 03:54:16 executing program 4: r0 = socket(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x6501000000000000}, 0xc, &(0x7f0000000900)={&(0x7f0000000040)={0x14, 0x1e, 0x201}, 0x14}, 0x1}, 0x0) [ 1495.393064] hfsplus: gid requires an argument [ 1495.397811] hfsplus: unable to parse mount options [ 1495.418921] hfsplus: gid requires an argument [ 1495.423642] hfsplus: unable to parse mount options 03:54:17 executing program 2: r0 = syz_open_dev$sndseq(&(0x7f0000dcc000)='/dev/snd/seq\x00', 0x0, 0x2) read(r0, &(0x7f0000fb6000)=""/28, 0x3f0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000418f50)={{0x80}, "0a4ceaa05d9a00000000000000039b3fd4cec307e8ef3d13eb790ec9c65abaf90d229db692542e5b78f8b29e0a27800f0000000000000009fb42f376589701a4", 0xa9824f69d1376637, 0x10800a}) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000240)={0xbf}) write$binfmt_script(r0, &(0x7f0000000000)=ANY=[], 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f00000002c0)={{}, 'port0\x00'}) r1 = dup2(r0, r0) setsockopt$inet_sctp_SCTP_AUTOCLOSE(r1, 0x84, 0x4, &(0x7f0000000000)=0x6, 0x4) openat$sequencer2(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer2\x00', 0x0, 0x0) 03:54:17 executing program 1: r0 = socket(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1f00000000000000}, 0xc, &(0x7f0000000900)={&(0x7f0000000040)={0x14, 0x1e, 0x201}, 0x14}, 0x1}, 0x0) 03:54:17 executing program 0 (fault-call:10 fault-nth:5): r0 = syz_open_dev$vcsa(&(0x7f0000000100)='/dev/vcsa#\x00', 0x5, 0x101000) ioctl$BLKDISCARD(r0, 0x1277, &(0x7f0000000180)=0x5f) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140)='/dev/snapshot\x00', 0x0, 0x0) connect$nfc_llcp(r1, &(0x7f0000000300)={0x27, 0x0, 0x0, 0x6, 0x0, 0x0, "f44825e9da257dcd22512d531f545cf0bce08002f76d5e9bd3d1dcb3f649bf7ba49078f877ce09f903ed489ab0bbf0f088675b47312412edd6bd577062eb34", 0x1c}, 0x60) fcntl$addseals(0xffffffffffffffff, 0x409, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EVIOCGLED(r1, 0x80404519, &(0x7f0000000580)=""/236) ioctl$FS_IOC_SETFSLABEL(r2, 0x41009432, &(0x7f0000000480)="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") r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x3c, 0x0) ioctl$EVIOCGKEYCODE_V2(0xffffffffffffffff, 0x80284504, &(0x7f00000003c0)=""/188) ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x0) 03:54:17 executing program 3: ioctl$BLKDISCARD(0xffffffffffffffff, 0x1277, &(0x7f0000000180)) r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140)='/dev/snapshot\x00', 0x0, 0x0) fcntl$addseals(r0, 0x409, 0xa) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f0000000040)={0x0, 0x3, 0x4, [0x0, 0xfffffffffffffff9, 0xd6c, 0x3d6]}, &(0x7f0000000080)=0x10) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r0, 0x84, 0x66, &(0x7f0000000000)={r1}, &(0x7f00000000c0)=0x8) ioctl$EVIOCGLED(0xffffffffffffffff, 0x80404519, &(0x7f0000000580)=""/236) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x3c, 0x0) socket$rds(0x15, 0x5, 0x0) ioctl$EVIOCGKEYCODE_V2(0xffffffffffffffff, 0x80284504, &(0x7f00000003c0)=""/188) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c82, 0x0) 03:54:17 executing program 5: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer2\x00', 0x0, 0x0) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000040)="025cc83d6d345f8f762070") ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r0, 0x40085112, &(0x7f0000b18000)={{0xffffff93}, {0xffffffa0}, 0x0, 0x0, 0x0, [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffdfd]}) 03:54:17 executing program 7: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f000000d000)={0xa, 0x4e20}, 0x1c) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}, 0xb}, 0x1c) syz_emit_ethernet(0x3e, &(0x7f00000001c0)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @random="e829f650db0f", [], {@ipv6={0x86dd, {0x0, 0x6, "50a09c", 0x8, 0xffffff11, 0x0, @remote={0xfe, 0x80, [], 0xbb}, @local={0xfe, 0x80, [], 0xaa}, {[], @udp={0x0, 0x4e20, 0x8}}}}}}, &(0x7f0000000040)) syz_emit_ethernet(0x3e, &(0x7f0000000000)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], {@ipv6={0x86dd, {0x0, 0x6, "50a09c", 0x8, 0xffffff11, 0x0, @remote={0xfe, 0x80, [], 0xbb}, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8100], 0xaa}, {[], @udp={0x300, 0x4e20, 0x8}}}}}}, &(0x7f0000000040)) 03:54:17 executing program 4: r0 = socket(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0xb201000000000000}, 0xc, &(0x7f0000000900)={&(0x7f0000000040)={0x14, 0x1e, 0x201}, 0x14}, 0x1}, 0x0) 03:54:17 executing program 6: r0 = socket(0x11, 0xa, 0x0) r1 = syz_open_dev$vcsa(&(0x7f0000000100)='/dev/vcsa#\x00', 0x5, 0x80201) getsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(r0, 0x84, 0x75, &(0x7f0000000180)={0x0, 0x9}, &(0x7f00000001c0)=0x8) r3 = getpid() sched_setattr(r3, &(0x7f0000000080)={0x0, 0x2, 0x0, 0x0, 0x1}, 0x0) r4 = timerfd_create(0x0, 0x0) readv(r4, &(0x7f0000000140)=[{&(0x7f0000000000)=""/146, 0x30af}], 0x3f2) clone(0x1287000, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f00000001c0), &(0x7f0000000200)) setsockopt$inet_sctp6_SCTP_MAXSEG(r0, 0x84, 0xd, &(0x7f0000000200)=@assoc_value={r2, 0x1ff}, 0x8) ioctl$SCSI_IOCTL_GET_BUS_NUMBER(r1, 0x5386, &(0x7f0000000140)) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000640)={0x0, 0x0, 0x0}, &(0x7f0000000680)=0xc) syz_mount_image$hfsplus(&(0x7f0000000240)='hfsplus\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, &(0x7f00000005c0), 0x0, &(0x7f00000006c0)={[{@gid={'gid', 0x3d, r5}, 0x2c}]}) getsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r0, 0x84, 0x75, &(0x7f0000000000)={0x0, 0x5}, &(0x7f0000000040)=0x8) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f0000000080)=ANY=[@ANYRES32=r6, @ANYBLOB], &(0x7f00000000c0)=0x12) [ 1495.834672] FAULT_INJECTION: forcing a failure. [ 1495.834672] name failslab, interval 1, probability 0, space 0, times 0 [ 1495.846473] CPU: 0 PID: 5914 Comm: syz-executor0 Not tainted 4.18.0-rc4+ #144 [ 1495.853770] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1495.863139] Call Trace: [ 1495.865754] dump_stack+0x1c9/0x2b4 [ 1495.869401] ? dump_stack_print_info.cold.2+0x52/0x52 [ 1495.874657] ? should_fail+0x18a/0xbed [ 1495.878576] should_fail.cold.4+0xa/0x1a [ 1495.882663] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 1495.887788] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 1495.892828] ? graph_lock+0x170/0x170 [ 1495.896677] ? find_held_lock+0x36/0x1c0 [ 1495.900759] ? __lock_is_held+0xb5/0x140 [ 1495.904854] ? check_same_owner+0x340/0x340 [ 1495.909198] ? rcu_note_context_switch+0x730/0x730 [ 1495.914143] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1495.918919] __should_failslab+0x124/0x180 [ 1495.923179] should_failslab+0x9/0x14 [ 1495.926986] kmem_cache_alloc_node_trace+0x26f/0x770 [ 1495.932132] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 1495.937246] ? find_next_bit+0x104/0x130 [ 1495.941373] sbitmap_queue_init_node+0x330/0x850 [ 1495.946186] ? sbitmap_init_node+0x450/0x450 [ 1495.950638] ? rcu_read_lock_sched_held+0x108/0x120 [ 1495.955678] ? kmem_cache_alloc_node_trace+0x34e/0x770 [ 1495.960969] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1495.966527] ? find_next_bit+0x104/0x130 [ 1495.970607] blk_mq_init_tags+0x11b/0x2b0 [ 1495.974770] blk_mq_alloc_rq_map+0x9f/0x220 [ 1495.979139] __blk_mq_alloc_rq_map+0xb1/0x2e0 03:54:17 executing program 7: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f000000d000)={0xa, 0x4e20}, 0x1c) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}, 0xb}, 0x1c) syz_emit_ethernet(0x3e, &(0x7f00000001c0)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @random="e829f650db0f", [], {@ipv6={0x86dd, {0x0, 0x6, "50a09c", 0x8, 0xffffff11, 0x0, @remote={0xfe, 0x80, [], 0xbb}, @local={0xfe, 0x80, [], 0xaa}, {[], @udp={0x0, 0x4e20, 0x8}}}}}}, &(0x7f0000000040)) syz_emit_ethernet(0x3e, &(0x7f0000000000)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], {@ipv6={0x86dd, {0x0, 0x6, "50a09c", 0x8, 0xffffff11, 0x0, @remote={0xfe, 0x80, [], 0xbb}, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4888], 0xaa}, {[], @udp={0x300, 0x4e20, 0x8}}}}}}, &(0x7f0000000040)) 03:54:17 executing program 5: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer2\x00', 0x0, 0x0) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000040)="025cc83d6d345f8f762070") ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r0, 0x40085112, &(0x7f0000b18000)={{0xffffff93}, {0xffffffa0}, 0x0, 0x0, 0x0, [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5]}) 03:54:17 executing program 1: r0 = socket(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x78000000}, 0xc, &(0x7f0000000900)={&(0x7f0000000040)={0x14, 0x1e, 0x201}, 0x14}, 0x1}, 0x0) 03:54:17 executing program 4: r0 = socket(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0xc00e0000}, 0xc, &(0x7f0000000900)={&(0x7f0000000040)={0x14, 0x1e, 0x201}, 0x14}, 0x1}, 0x0) [ 1495.983663] blk_mq_alloc_tag_set+0x627/0xad0 [ 1495.988184] ? blk_mq_update_nr_hw_queues+0x510/0x510 [ 1495.993392] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 1495.998451] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1496.003628] loop_add+0x2be/0x9d0 [ 1496.007129] ? loop_queue_rq+0x660/0x660 [ 1496.011220] loop_control_ioctl+0x199/0x540 [ 1496.015561] ? loop_add+0x9d0/0x9d0 [ 1496.019199] ? expand_files.part.8+0x9c0/0x9c0 [ 1496.023797] ? kasan_check_write+0x14/0x20 [ 1496.028048] ? loop_add+0x9d0/0x9d0 [ 1496.031682] do_vfs_ioctl+0x1de/0x1720 [ 1496.035586] ? ioctl_preallocate+0x300/0x300 [ 1496.040012] ? retint_kernel+0x10/0x10 [ 1496.043913] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 1496.048940] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1496.053718] ? retint_kernel+0x10/0x10 [ 1496.057660] ? security_file_ioctl+0x94/0xc0 [ 1496.062079] ksys_ioctl+0xa9/0xd0 [ 1496.065546] __x64_sys_ioctl+0x73/0xb0 [ 1496.069458] do_syscall_64+0x1b9/0x820 [ 1496.073368] ? syscall_slow_exit_work+0x500/0x500 [ 1496.078231] ? syscall_return_slowpath+0x5e0/0x5e0 [ 1496.083173] ? syscall_return_slowpath+0x31d/0x5e0 [ 1496.088118] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1496.093669] ? retint_user+0x18/0x18 [ 1496.097399] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1496.102262] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1496.107460] RIP: 0033:0x455a79 [ 1496.110651] Code: 1d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 03:54:17 executing program 3: openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0x800, 0x0) syz_open_procfs(0x0, &(0x7f0000000100)='net/rfcomm\x00') r0 = openat$nullb(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/nullb0\x00', 0x200, 0x0) ioctl$BLKDISCARD(r0, 0x1277, &(0x7f0000000040)=0x1) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140)='/dev/snapshot\x00', 0x0, 0x0) fcntl$addseals(0xffffffffffffffff, 0x409, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f0000000000), &(0x7f00000000c0)=0x8) ioctl$EVIOCGLED(0xffffffffffffffff, 0x80404519, &(0x7f0000000580)=""/236) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x3c, 0x0) ioctl$EVIOCGKEYCODE_V2(0xffffffffffffffff, 0x80284504, &(0x7f00000003c0)=""/188) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c82, 0x0) [ 1496.130043] RSP: 002b:00007f420d477c68 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1496.137780] RAX: ffffffffffffffda RBX: 00007f420d4786d4 RCX: 0000000000455a79 [ 1496.145065] RDX: 0000000000000000 RSI: 0000000000004c80 RDI: 0000000000000015 [ 1496.152348] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 1496.159636] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000016 [ 1496.166940] R13: 00000000004bdfb1 R14: 00000000004ccab0 R15: 0000000000000005 [ 1496.179041] blk-mq: reduced tag depth (128 -> 64) 03:54:18 executing program 1: r0 = socket(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x22000000}, 0xc, &(0x7f0000000900)={&(0x7f0000000040)={0x14, 0x1e, 0x201}, 0x14}, 0x1}, 0x0) 03:54:18 executing program 0 (fault-call:10 fault-nth:6): r0 = syz_open_dev$vcsa(&(0x7f0000000100)='/dev/vcsa#\x00', 0x5, 0x101000) ioctl$BLKDISCARD(r0, 0x1277, &(0x7f0000000180)=0x5f) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140)='/dev/snapshot\x00', 0x0, 0x0) connect$nfc_llcp(r1, &(0x7f0000000300)={0x27, 0x0, 0x0, 0x6, 0x0, 0x0, "f44825e9da257dcd22512d531f545cf0bce08002f76d5e9bd3d1dcb3f649bf7ba49078f877ce09f903ed489ab0bbf0f088675b47312412edd6bd577062eb34", 0x1c}, 0x60) fcntl$addseals(0xffffffffffffffff, 0x409, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EVIOCGLED(r1, 0x80404519, &(0x7f0000000580)=""/236) ioctl$FS_IOC_SETFSLABEL(r2, 0x41009432, &(0x7f0000000480)="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") r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x3c, 0x0) ioctl$EVIOCGKEYCODE_V2(0xffffffffffffffff, 0x80284504, &(0x7f00000003c0)=""/188) ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x0) 03:54:18 executing program 4: r0 = socket(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8801}, 0xc, &(0x7f0000000900)={&(0x7f0000000040)={0x14, 0x1e, 0x201}, 0x14}, 0x1}, 0x0) [ 1496.619004] hfsplus: gid requires an argument [ 1496.623857] hfsplus: unable to parse mount options [ 1496.709837] FAULT_INJECTION: forcing a failure. [ 1496.709837] name failslab, interval 1, probability 0, space 0, times 0 [ 1496.721633] CPU: 1 PID: 5945 Comm: syz-executor0 Not tainted 4.18.0-rc4+ #144 [ 1496.728942] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1496.738311] Call Trace: [ 1496.740939] dump_stack+0x1c9/0x2b4 [ 1496.744595] ? dump_stack_print_info.cold.2+0x52/0x52 [ 1496.749810] ? finish_task_switch+0x1d3/0x870 [ 1496.754313] ? finish_task_switch+0x18a/0x870 [ 1496.759598] should_fail.cold.4+0xa/0x1a [ 1496.763704] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 1496.768841] ? __schedule+0x884/0x1ed0 [ 1496.772756] ? __sched_text_start+0x8/0x8 [ 1496.776932] ? retint_kernel+0x10/0x10 [ 1496.780835] ? __lock_is_held+0xb5/0x140 [ 1496.784918] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1496.789813] ? check_same_owner+0x340/0x340 [ 1496.794154] __should_failslab+0x124/0x180 [ 1496.798383] should_failslab+0x9/0x14 [ 1496.802179] kmem_cache_alloc_node_trace+0x26f/0x770 [ 1496.807278] ? init_wait_entry+0x1c0/0x1c0 [ 1496.811507] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 1496.816521] sbitmap_queue_init_node+0x330/0x850 [ 1496.821271] ? sbitmap_init_node+0x450/0x450 [ 1496.825691] ? rcu_read_lock_sched_held+0x108/0x120 [ 1496.830697] ? kmem_cache_alloc_node_trace+0x34e/0x770 [ 1496.835971] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1496.841519] ? find_next_bit+0x104/0x130 [ 1496.845582] blk_mq_init_tags+0x17c/0x2b0 [ 1496.849727] blk_mq_alloc_rq_map+0x9f/0x220 [ 1496.854057] __blk_mq_alloc_rq_map+0xb1/0x2e0 [ 1496.858547] blk_mq_alloc_tag_set+0x627/0xad0 [ 1496.863038] ? retint_kernel+0x10/0x10 [ 1496.866922] ? blk_mq_update_nr_hw_queues+0x510/0x510 [ 1496.872118] ? loop_add+0x14d/0x9d0 [ 1496.875734] loop_add+0x2be/0x9d0 [ 1496.879176] ? loop_queue_rq+0x660/0x660 [ 1496.883241] loop_control_ioctl+0x199/0x540 [ 1496.887567] ? loop_add+0x9d0/0x9d0 [ 1496.891209] ? retint_kernel+0x10/0x10 [ 1496.895114] ? do_vfs_ioctl+0x178/0x1720 [ 1496.899181] ? loop_add+0x9d0/0x9d0 [ 1496.902812] do_vfs_ioctl+0x1de/0x1720 [ 1496.906708] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 1496.911732] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1496.916580] ? ioctl_preallocate+0x300/0x300 [ 1496.920991] ? __fget_light+0x2f7/0x440 [ 1496.924966] ? fget_raw+0x20/0x20 [ 1496.928424] ? retint_kernel+0x10/0x10 [ 1496.932319] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 1496.937343] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1496.942112] ? security_file_ioctl+0x94/0xc0 [ 1496.946530] ksys_ioctl+0xa9/0xd0 [ 1496.949991] __x64_sys_ioctl+0x73/0xb0 [ 1496.953885] do_syscall_64+0x1b9/0x820 [ 1496.957780] ? finish_task_switch+0x1d3/0x870 [ 1496.962293] ? syscall_return_slowpath+0x5e0/0x5e0 [ 1496.967237] ? syscall_return_slowpath+0x31d/0x5e0 [ 1496.972183] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe [ 1496.977731] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1496.982590] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1496.987783] RIP: 0033:0x455a79 [ 1496.990985] Code: 1d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1497.010385] RSP: 002b:00007f420d477c68 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1497.018107] RAX: ffffffffffffffda RBX: 00007f420d4786d4 RCX: 0000000000455a79 [ 1497.025377] RDX: 0000000000000000 RSI: 0000000000004c80 RDI: 0000000000000016 [ 1497.032647] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 1497.039922] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000017 [ 1497.047200] R13: 00000000004bdfb1 R14: 00000000004ccab0 R15: 0000000000000006 [ 1497.076981] blk-mq: reduced tag depth (128 -> 64) 03:54:18 executing program 2: r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x2) read(r0, &(0x7f0000fb6000)=""/28, 0x3f0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000418f50)={{0x80}, "0a4ceaa05d9a00000000000000039b3fd4cec307e8ef3d13eb790ec9c65abaf90d229db692542e5b78f8b29e0a27800f0000000000000009fb42f376589701a4", 0xa9824f69d1376637, 0x10800a}) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000240)={0xbf}) write$binfmt_script(r0, &(0x7f0000001440)=ANY=[@ANYRESHEX=r0, @ANYRESDEC=r0, @ANYRES64=r0, @ANYRES32=0x0, @ANYRESHEX=r0, @ANYRES16=r0, @ANYPTR64=&(0x7f0000000100)=ANY=[@ANYPTR64=&(0x7f0000000080)=ANY=[@ANYRES64=r0, @ANYPTR, @ANYPTR64]], @ANYBLOB="16a4bdb452e907322f8377fa5edb44e0b66ada1e40487d3d7170092e15b875cdadbbe19558b4e618c5a9acd00eba770c8481a3ad446aa5f5db3e2657a8bc6fe5def4787ac8f42bd539562a0cb28cb14a8daf63fdfaca9c31d0f5991d70987bd8460f8ddbab9f36d86ca63f3c6c2958237c99e1595ab4f8b29f24f74c72b6ce5ee57990440be524e329ce4c27a7b54777974cf9958a27d5e951874720edbac17f411bafa7db26290db8a37905a11cc86c66050dfb47fd91", @ANYPTR=&(0x7f0000000140)=ANY=[@ANYPTR64=&(0x7f0000000380)=ANY=[@ANYRESDEC, @ANYBLOB="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", @ANYPTR64, @ANYRESDEC=r0, @ANYRESHEX=0x0, @ANYBLOB="6e86fe130a888b0d3efe924eb5ed76ba7d7c5861231b41136e4be0111d38d399e3aa820318f8ad0845d8b91d708459472d85507c6b4ba2cfd226e454", @ANYPTR64, @ANYRESDEC=r0, @ANYRESOCT=r0, @ANYPTR], @ANYRESDEC=0x0, @ANYBLOB="b66b0e55aa20fe97cf11e6217384f6c62fce31c38d9a7beb369f68912c789671ba41d5a640c29bc78411cf3713fd7b6d62a163e547f01094ea5462a7a3bcd5bc226252ec311b5aaac38b9dc2b40a720dab5a12727930878a69be6bc0769d92ad300f75459a08a564", @ANYRESHEX=r0, @ANYRESHEX=r0], @ANYRES64=r0], 0xfffffffffffffe33) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f00000002c0)={{}, 'port0\x00'}) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer2\x00', 0x0, 0x0) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000200)='/dev/sequencer2\x00', 0x20000, 0x0) write$P9_RLINK(r1, &(0x7f0000000000)={0x7, 0x47, 0x2}, 0x17c) 03:54:18 executing program 5: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer2\x00', 0x0, 0x0) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000040)="025cc83d6d345f8f762070") ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r0, 0x40085112, &(0x7f0000b18000)={{0xffffff93}, {0xffffffa0}, 0x0, 0x0, 0x0, [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5000000]}) 03:54:18 executing program 7: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f000000d000)={0xa, 0x4e20}, 0x1c) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}, 0xb}, 0x1c) syz_emit_ethernet(0x3e, &(0x7f00000001c0)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @random="e829f650db0f", [], {@ipv6={0x86dd, {0x0, 0x6, "50a09c", 0x8, 0xffffff11, 0x0, @remote={0xfe, 0x80, [], 0xbb}, @local={0xfe, 0x80, [], 0xaa}, {[], @udp={0x0, 0x4e20, 0x8}}}}}}, &(0x7f0000000040)) syz_emit_ethernet(0x3e, &(0x7f0000000000)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], {@ipv6={0x86dd, {0x0, 0x6, "50a09c", 0x8, 0xffffff11, 0x0, @remote={0xfe, 0x80, [], 0xbb}, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800e000000000000], 0xaa}, {[], @udp={0x300, 0x4e20, 0x8}}}}}}, &(0x7f0000000040)) 03:54:18 executing program 4: r0 = socket(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x7d00}, 0xc, &(0x7f0000000900)={&(0x7f0000000040)={0x14, 0x1e, 0x201}, 0x14}, 0x1}, 0x0) 03:54:18 executing program 3: ioctl$BLKDISCARD(0xffffffffffffffff, 0x1277, &(0x7f0000000180)) r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140)='/dev/snapshot\x00', 0x0, 0x0) fcntl$addseals(0xffffffffffffffff, 0x409, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f0000000000), &(0x7f00000000c0)=0x8) ioctl$EVIOCGLED(0xffffffffffffffff, 0x80404519, &(0x7f0000000580)=""/236) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x3c, 0x0) ioctl$EVIOCGKEYCODE_V2(0xffffffffffffffff, 0x80284504, &(0x7f00000003c0)=""/188) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c82, 0x0) ioctl$EVIOCSABS20(r0, 0x401845e0, &(0x7f0000000040)={0x9, 0xfffffffffffffccb, 0x1, 0x9, 0x0, 0xfffffffffffffc00}) 03:54:18 executing program 1: r0 = socket(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8401}, 0xc, &(0x7f0000000900)={&(0x7f0000000040)={0x14, 0x1e, 0x201}, 0x14}, 0x1}, 0x0) 03:54:18 executing program 6: r0 = socket(0x11, 0xa, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000640)={0x0, 0x0, 0x0}, &(0x7f0000000680)=0xc) syz_mount_image$hfsplus(&(0x7f0000000240)='hfsplus\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, &(0x7f00000005c0), 0x0, &(0x7f00000006c0)=ANY=[@ANYBLOB='gid=', @ANYRESHEX=r1, @ANYBLOB="d8b6"]) r2 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0x3, 0x0) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_NEXT_DEVICE(r2, 0xc0045540, &(0x7f0000000040)=0xffffffffffffa9ec) ioctl$DMA_BUF_IOCTL_SYNC(r2, 0x40086200, &(0x7f0000000080)=0x4) ioctl$KVM_SET_DEBUGREGS(r2, 0x4080aea2, &(0x7f00000000c0)={[0xf000, 0x7001, 0xd002, 0x6000], 0x7, 0x80, 0x8}) 03:54:18 executing program 0 (fault-call:10 fault-nth:7): r0 = syz_open_dev$vcsa(&(0x7f0000000100)='/dev/vcsa#\x00', 0x5, 0x101000) ioctl$BLKDISCARD(r0, 0x1277, &(0x7f0000000180)=0x5f) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140)='/dev/snapshot\x00', 0x0, 0x0) connect$nfc_llcp(r1, &(0x7f0000000300)={0x27, 0x0, 0x0, 0x6, 0x0, 0x0, "f44825e9da257dcd22512d531f545cf0bce08002f76d5e9bd3d1dcb3f649bf7ba49078f877ce09f903ed489ab0bbf0f088675b47312412edd6bd577062eb34", 0x1c}, 0x60) fcntl$addseals(0xffffffffffffffff, 0x409, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EVIOCGLED(r1, 0x80404519, &(0x7f0000000580)=""/236) ioctl$FS_IOC_SETFSLABEL(r2, 0x41009432, &(0x7f0000000480)="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") r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x3c, 0x0) ioctl$EVIOCGKEYCODE_V2(0xffffffffffffffff, 0x80284504, &(0x7f00000003c0)=""/188) ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x0) 03:54:18 executing program 4: r0 = socket(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x94}, 0xc, &(0x7f0000000900)={&(0x7f0000000040)={0x14, 0x1e, 0x201}, 0x14}, 0x1}, 0x0) 03:54:18 executing program 1: r0 = socket(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x17b}, 0xc, &(0x7f0000000900)={&(0x7f0000000040)={0x14, 0x1e, 0x201}, 0x14}, 0x1}, 0x0) 03:54:18 executing program 7: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f000000d000)={0xa, 0x4e20}, 0x1c) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}, 0xb}, 0x1c) syz_emit_ethernet(0x3e, &(0x7f00000001c0)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @random="e829f650db0f", [], {@ipv6={0x86dd, {0x0, 0x6, "50a09c", 0x8, 0xffffff11, 0x0, @remote={0xfe, 0x80, [], 0xbb}, @local={0xfe, 0x80, [], 0xaa}, {[], @udp={0x0, 0x4e20, 0x8}}}}}}, &(0x7f0000000040)) syz_emit_ethernet(0x3e, &(0x7f0000000000)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], {@ipv6={0x86dd, {0x0, 0x6, "50a09c", 0x8, 0xffffff11, 0x0, @remote={0xfe, 0x80, [], 0xbb}, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb00000000000000], 0xaa}, {[], @udp={0x300, 0x4e20, 0x8}}}}}}, &(0x7f0000000040)) 03:54:18 executing program 5: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer2\x00', 0x0, 0x0) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000040)="025cc83d6d345f8f762070") ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r0, 0x40085112, &(0x7f0000b18000)={{0xffffff93}, {0xffffffa0}, 0x0, 0x0, 0x0, [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f000000]}) [ 1497.399632] hfsplus: unable to parse mount options 03:54:18 executing program 3: ioctl$BLKDISCARD(0xffffffffffffffff, 0x1277, &(0x7f0000000180)) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000040)='/dev/snapshot\x00', 0x0, 0x0) fcntl$addseals(0xffffffffffffffff, 0x409, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f0000000000), &(0x7f00000000c0)=0x8) ioctl$EVIOCGLED(0xffffffffffffffff, 0x80404519, &(0x7f0000000580)=""/236) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x3c, 0x0) socket$rds(0x15, 0x5, 0x0) ioctl$EVIOCGKEYCODE_V2(0xffffffffffffffff, 0x80284504, &(0x7f00000003c0)=""/188) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c82, 0x0) [ 1497.426985] hfsplus: unable to parse mount options 03:54:19 executing program 6: r0 = socket(0x11, 0xa, 0x0) mount$9p_unix(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='9p\x00', 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB='trans=union=9p2000,\x00']) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000100)={0x0, 0x0, 0x0}, &(0x7f0000000680)=0xc) bpf$OBJ_GET_MAP(0x7, &(0x7f00000001c0)={&(0x7f0000000180)='./file0\x00'}, 0x10) syz_open_dev$rtc(&(0x7f0000000140)='/dev/rtc#\x00', 0x6, 0x400000) syz_mount_image$hfsplus(&(0x7f0000000240)='hfsplus\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, &(0x7f00000005c0), 0x0, &(0x7f00000006c0)={[{@gid={'gid', 0x3d, r1}, 0x2c}]}) [ 1497.491905] FAULT_INJECTION: forcing a failure. [ 1497.491905] name failslab, interval 1, probability 0, space 0, times 0 [ 1497.503499] CPU: 1 PID: 5974 Comm: syz-executor0 Not tainted 4.18.0-rc4+ #144 [ 1497.510785] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1497.520142] Call Trace: [ 1497.522742] dump_stack+0x1c9/0x2b4 [ 1497.526383] ? dump_stack_print_info.cold.2+0x52/0x52 [ 1497.531580] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1497.536961] should_fail.cold.4+0xa/0x1a [ 1497.541031] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 1497.546153] ? graph_lock+0x170/0x170 [ 1497.549965] ? __lock_is_held+0xb5/0x140 [ 1497.554034] ? __lockdep_init_map+0x105/0x590 [ 1497.558533] ? __lockdep_init_map+0x105/0x590 [ 1497.563036] ? __lock_is_held+0xb5/0x140 [ 1497.567097] ? __init_waitqueue_head+0x9e/0x150 [ 1497.571788] ? check_same_owner+0x340/0x340 [ 1497.576113] ? sbitmap_queue_init_node+0xce/0x850 [ 1497.580960] ? rcu_note_context_switch+0x730/0x730 [ 1497.585900] __should_failslab+0x124/0x180 [ 1497.590147] should_failslab+0x9/0x14 [ 1497.593958] kmem_cache_alloc_node_trace+0x26f/0x770 [ 1497.599086] ? retint_kernel+0x10/0x10 [ 1497.602987] __kmalloc_node+0x33/0x70 [ 1497.606794] blk_mq_alloc_rq_map+0xcc/0x220 [ 1497.612538] __blk_mq_alloc_rq_map+0xb1/0x2e0 [ 1497.617047] blk_mq_alloc_tag_set+0x627/0xad0 [ 1497.621553] ? blk_mq_update_nr_hw_queues+0x510/0x510 [ 1497.626770] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1497.631537] loop_add+0x2be/0x9d0 [ 1497.634995] ? loop_queue_rq+0x660/0x660 [ 1497.639241] loop_control_ioctl+0x199/0x540 [ 1497.643565] ? loop_add+0x9d0/0x9d0 [ 1497.647196] ? retint_kernel+0x10/0x10 [ 1497.651083] ? loop_add+0x9d0/0x9d0 [ 1497.654717] ? do_vfs_ioctl+0x178/0x1720 [ 1497.658779] ? loop_add+0x9d0/0x9d0 [ 1497.662408] do_vfs_ioctl+0x1de/0x1720 [ 1497.666326] ? ioctl_preallocate+0x300/0x300 [ 1497.670746] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 1497.675771] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1497.680537] ? retint_kernel+0x10/0x10 [ 1497.684433] ? ksys_ioctl+0x62/0xd0 [ 1497.688066] ? write_comp_data+0xa/0x70 [ 1497.692065] ksys_ioctl+0xa9/0xd0 [ 1497.695523] __x64_sys_ioctl+0x73/0xb0 [ 1497.699429] do_syscall_64+0x1b9/0x820 [ 1497.703320] ? syscall_slow_exit_work+0x500/0x500 [ 1497.708168] ? syscall_return_slowpath+0x5e0/0x5e0 [ 1497.713125] ? syscall_return_slowpath+0x31d/0x5e0 [ 1497.718063] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe [ 1497.723432] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1497.728299] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1497.733493] RIP: 0033:0x455a79 [ 1497.736682] Code: 1d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1497.756083] RSP: 002b:00007f420d477c68 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1497.763797] RAX: ffffffffffffffda RBX: 00007f420d4786d4 RCX: 0000000000455a79 [ 1497.771072] RDX: 0000000000000000 RSI: 0000000000004c80 RDI: 0000000000000016 [ 1497.778343] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 1497.785618] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000017 03:54:19 executing program 4: r0 = socket(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0xb4010000}, 0xc, &(0x7f0000000900)={&(0x7f0000000040)={0x14, 0x1e, 0x201}, 0x14}, 0x1}, 0x0) [ 1497.792886] R13: 00000000004bdfb1 R14: 00000000004ccab0 R15: 0000000000000007 [ 1497.803857] blk-mq: reduced tag depth (128 -> 64) 03:54:19 executing program 0 (fault-call:10 fault-nth:8): r0 = syz_open_dev$vcsa(&(0x7f0000000100)='/dev/vcsa#\x00', 0x5, 0x101000) ioctl$BLKDISCARD(r0, 0x1277, &(0x7f0000000180)=0x5f) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140)='/dev/snapshot\x00', 0x0, 0x0) connect$nfc_llcp(r1, &(0x7f0000000300)={0x27, 0x0, 0x0, 0x6, 0x0, 0x0, "f44825e9da257dcd22512d531f545cf0bce08002f76d5e9bd3d1dcb3f649bf7ba49078f877ce09f903ed489ab0bbf0f088675b47312412edd6bd577062eb34", 0x1c}, 0x60) fcntl$addseals(0xffffffffffffffff, 0x409, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EVIOCGLED(r1, 0x80404519, &(0x7f0000000580)=""/236) ioctl$FS_IOC_SETFSLABEL(r2, 0x41009432, &(0x7f0000000480)="64098ceb11469210e1fa92c76a76762b420a730851d9c9ce1d2745bac5fca8796f1aba309faf35268b4d45ac04ac0ec6f2cebf8f0ac8391dd8cef0da84895505ef6fc4062016210998b92c121630e66d984a620a4a40b4b63bebedc75ae3e140c654a4f80fec3a6af81841856baae4ad83438f32d9e08e5219c8b832403b86aa723d75cb839059d9d094ba7a3510a5acd071b9c1f441886fb396511cb44257e86695b1b4b84218118e0045593d869765e8f850cc6a534e5f114b22d73ba2a903943a32cebbff720180ba6531e240d9a3759e2287b1a64f950a5b1e402580731d395128e3b81fd4c76b233a384200aa015eb779ce7140613e374a38caa9d18b34") r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x3c, 0x0) ioctl$EVIOCGKEYCODE_V2(0xffffffffffffffff, 0x80284504, &(0x7f00000003c0)=""/188) ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x0) [ 1498.185435] hfsplus: gid requires an argument [ 1498.190061] hfsplus: unable to parse mount options [ 1498.217527] 9pnet: Could not find request transport: union=9p2000 [ 1498.235751] FAULT_INJECTION: forcing a failure. [ 1498.235751] name failslab, interval 1, probability 0, space 0, times 0 [ 1498.247237] CPU: 1 PID: 5995 Comm: syz-executor0 Not tainted 4.18.0-rc4+ #144 [ 1498.254523] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1498.263892] Call Trace: [ 1498.266551] dump_stack+0x1c9/0x2b4 [ 1498.270211] ? dump_stack_print_info.cold.2+0x52/0x52 [ 1498.275439] should_fail.cold.4+0xa/0x1a [ 1498.279513] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 1498.284622] ? depot_save_stack+0x191/0x470 [ 1498.288952] ? graph_lock+0x170/0x170 [ 1498.292763] ? save_stack+0xa9/0xd0 [ 1498.296474] ? save_stack+0x43/0xd0 [ 1498.300115] ? kasan_kmalloc+0xc4/0xe0 [ 1498.304013] ? __kmalloc_node+0x47/0x70 [ 1498.308003] ? blk_mq_alloc_rq_map+0xcc/0x220 [ 1498.312502] ? __blk_mq_alloc_rq_map+0xb1/0x2e0 [ 1498.317171] ? blk_mq_alloc_tag_set+0x627/0xad0 [ 1498.321848] ? loop_add+0x2be/0x9d0 [ 1498.325478] ? loop_control_ioctl+0x199/0x540 [ 1498.329997] ? __lock_is_held+0xb5/0x140 [ 1498.334102] ? check_same_owner+0x340/0x340 [ 1498.338427] ? rcu_note_context_switch+0x730/0x730 [ 1498.343364] __should_failslab+0x124/0x180 [ 1498.347604] should_failslab+0x9/0x14 [ 1498.351413] kmem_cache_alloc_node_trace+0x26f/0x770 [ 1498.356521] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1498.362080] ? kasan_unpoison_shadow+0x35/0x50 [ 1498.366677] __kmalloc_node+0x33/0x70 [ 1498.370482] blk_mq_alloc_rq_map+0x10d/0x220 [ 1498.374927] __blk_mq_alloc_rq_map+0xb1/0x2e0 [ 1498.379460] blk_mq_alloc_tag_set+0x627/0xad0 [ 1498.383965] ? blk_mq_update_nr_hw_queues+0x510/0x510 [ 1498.389182] loop_add+0x2be/0x9d0 [ 1498.392652] ? loop_lookup+0x105/0x230 [ 1498.396548] ? loop_queue_rq+0x660/0x660 [ 1498.400625] loop_control_ioctl+0x199/0x540 [ 1498.404949] ? loop_add+0x9d0/0x9d0 [ 1498.408580] ? retint_kernel+0x10/0x10 [ 1498.412484] ? do_vfs_ioctl+0x123/0x1720 [ 1498.416549] ? loop_add+0x9d0/0x9d0 [ 1498.420201] do_vfs_ioctl+0x1de/0x1720 [ 1498.424092] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1498.428853] ? ioctl_preallocate+0x300/0x300 [ 1498.433259] ? __fget_light+0x2f7/0x440 [ 1498.437233] ? fget_raw+0x20/0x20 [ 1498.440689] ? fput+0x1f/0x1a0 [ 1498.443886] ? fput+0x24/0x1a0 [ 1498.447080] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1498.452617] ? fput+0x130/0x1a0 [ 1498.455900] ? ksys_write+0x1ae/0x260 [ 1498.459707] ? security_file_ioctl+0x94/0xc0 [ 1498.464120] ksys_ioctl+0xa9/0xd0 [ 1498.467579] __x64_sys_ioctl+0x73/0xb0 [ 1498.471470] do_syscall_64+0x1b9/0x820 [ 1498.475358] ? finish_task_switch+0x1d3/0x870 [ 1498.479858] ? syscall_return_slowpath+0x5e0/0x5e0 [ 1498.484794] ? syscall_return_slowpath+0x31d/0x5e0 [ 1498.489735] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe [ 1498.495113] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1498.500250] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1498.505447] RIP: 0033:0x455a79 [ 1498.508630] Code: 1d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1498.528012] RSP: 002b:00007f420d477c68 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1498.535733] RAX: ffffffffffffffda RBX: 00007f420d4786d4 RCX: 0000000000455a79 [ 1498.543009] RDX: 0000000000000000 RSI: 0000000000004c80 RDI: 0000000000000016 [ 1498.550279] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 1498.557545] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000017 [ 1498.564818] R13: 00000000004bdfb1 R14: 00000000004ccab0 R15: 0000000000000008 [ 1498.577933] blk-mq: reduced tag depth (128 -> 64) 03:54:20 executing program 2: r0 = syz_open_dev$sndseq(&(0x7f0000dcc000)='/dev/snd/seq\x00', 0x0, 0x2) read(r0, &(0x7f0000fb6000)=""/28, 0x3f0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000418f50)={{0x80}, "0a4ceaa05d9a00000000000000039b3fd4cec307e8ef3d13eb790ec9c65abaf90d229db692542e5b78f8b29e0a27800f0000000000000009fb42f376589701a4", 0xa9824f69d1376637, 0x10800a}) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000240)={0xbf}) r1 = semget$private(0x0, 0x4, 0x84) semtimedop(r1, &(0x7f0000000000)=[{0x3, 0x9, 0x1000}, {0x2, 0x4, 0x1000}], 0x2, &(0x7f0000000040)={0x0, 0x1c9c380}) write$binfmt_script(r0, &(0x7f0000000000)=ANY=[], 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f00000002c0)={{}, 'port0\x00'}) openat$sequencer2(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer2\x00', 0x0, 0x0) 03:54:20 executing program 1: r0 = socket(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x18b}, 0xc, &(0x7f0000000900)={&(0x7f0000000040)={0x14, 0x1e, 0x201}, 0x14}, 0x1}, 0x0) 03:54:20 executing program 5: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer2\x00', 0x0, 0x0) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000040)="025cc83d6d345f8f762070") ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r0, 0x40085112, &(0x7f0000b18000)={{0xffffff93}, {0xffffffa0}, 0x0, 0x0, 0x0, [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd]}) 03:54:20 executing program 7: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f000000d000)={0xa, 0x4e20}, 0x1c) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}, 0xb}, 0x1c) syz_emit_ethernet(0x3e, &(0x7f00000001c0)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @random="e829f650db0f", [], {@ipv6={0x86dd, {0x0, 0x6, "50a09c", 0x8, 0xffffff11, 0x0, @remote={0xfe, 0x80, [], 0xbb}, @local={0xfe, 0x80, [], 0xaa}, {[], @udp={0x0, 0x4e20, 0x8}}}}}}, &(0x7f0000000040)) syz_emit_ethernet(0x3e, &(0x7f0000000000)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], {@ipv6={0x86dd, {0x0, 0x6, "50a09c", 0x8, 0xffffff11, 0x0, @remote={0xfe, 0x80, [], 0xbb}, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7000000], 0xaa}, {[], @udp={0x300, 0x4e20, 0x8}}}}}}, &(0x7f0000000040)) 03:54:20 executing program 3: ioctl$BLKDISCARD(0xffffffffffffffff, 0x1277, &(0x7f0000000180)) r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140)='/dev/snapshot\x00', 0x0, 0x0) fcntl$addseals(0xffffffffffffffff, 0x409, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f0000000000), &(0x7f00000000c0)=0x8) ioctl$EVIOCGLED(0xffffffffffffffff, 0x80404519, &(0x7f0000000580)=""/236) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x3c, 0x0) ioctl$TIOCGPGRP(r0, 0x540f, &(0x7f0000000040)=0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f00000001c0)={[], 0x80000000, 0x7f, 0xc47e, 0x2, 0x800, r2}) ioctl$EVIOCGKEYCODE_V2(0xffffffffffffffff, 0x80284504, &(0x7f00000003c0)=""/188) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c82, 0x0) 03:54:20 executing program 4: r0 = socket(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0xffffff7f}, 0xc, &(0x7f0000000900)={&(0x7f0000000040)={0x14, 0x1e, 0x201}, 0x14}, 0x1}, 0x0) 03:54:20 executing program 6: r0 = socket(0x11, 0x9, 0x8001) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000640)={0x0, 0x0, 0x0}, &(0x7f0000000680)=0xc) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e23, 0x2, @empty, 0x4}, 0x1c) syz_mount_image$hfsplus(&(0x7f0000000240)='hfsplus\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, &(0x7f00000005c0), 0x0, &(0x7f00000006c0)={[{@gid={'gid', 0x3d, r1}, 0x2c}]}) 03:54:20 executing program 0 (fault-call:10 fault-nth:9): r0 = syz_open_dev$vcsa(&(0x7f0000000100)='/dev/vcsa#\x00', 0x5, 0x101000) ioctl$BLKDISCARD(r0, 0x1277, &(0x7f0000000180)=0x5f) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140)='/dev/snapshot\x00', 0x0, 0x0) connect$nfc_llcp(r1, &(0x7f0000000300)={0x27, 0x0, 0x0, 0x6, 0x0, 0x0, "f44825e9da257dcd22512d531f545cf0bce08002f76d5e9bd3d1dcb3f649bf7ba49078f877ce09f903ed489ab0bbf0f088675b47312412edd6bd577062eb34", 0x1c}, 0x60) fcntl$addseals(0xffffffffffffffff, 0x409, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EVIOCGLED(r1, 0x80404519, &(0x7f0000000580)=""/236) ioctl$FS_IOC_SETFSLABEL(r2, 0x41009432, &(0x7f0000000480)="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") r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x3c, 0x0) ioctl$EVIOCGKEYCODE_V2(0xffffffffffffffff, 0x80284504, &(0x7f00000003c0)=""/188) ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x0) 03:54:20 executing program 4: r0 = socket(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x9e000000}, 0xc, &(0x7f0000000900)={&(0x7f0000000040)={0x14, 0x1e, 0x201}, 0x14}, 0x1}, 0x0) 03:54:20 executing program 5: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer2\x00', 0x0, 0x0) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000040)="025cc83d6d345f8f762070") ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r0, 0x40085112, &(0x7f0000b18000)={{0xffffff93}, {0xffffffa0}, 0x0, 0x0, 0x0, [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800000000000000]}) 03:54:20 executing program 1: r0 = socket(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x24}, 0xc, &(0x7f0000000900)={&(0x7f0000000040)={0x14, 0x1e, 0x201}, 0x14}, 0x1}, 0x0) 03:54:20 executing program 7: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f000000d000)={0xa, 0x4e20}, 0x1c) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}, 0xb}, 0x1c) syz_emit_ethernet(0x3e, &(0x7f00000001c0)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @random="e829f650db0f", [], {@ipv6={0x86dd, {0x0, 0x6, "50a09c", 0x8, 0xffffff11, 0x0, @remote={0xfe, 0x80, [], 0xbb}, @local={0xfe, 0x80, [], 0xaa}, {[], @udp={0x0, 0x4e20, 0x8}}}}}}, &(0x7f0000000040)) syz_emit_ethernet(0x3e, &(0x7f0000000000)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], {@ipv6={0x86dd, {0x0, 0x6, "50a09c", 0x8, 0xffffff11, 0x0, @remote={0xfe, 0x80, [], 0xbb}, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8100000000000000], 0xaa}, {[], @udp={0x300, 0x4e20, 0x8}}}}}}, &(0x7f0000000040)) 03:54:20 executing program 3: ioctl$BLKDISCARD(0xffffffffffffffff, 0x1277, &(0x7f0000000040)) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140)='/dev/snapshot\x00', 0x0, 0x0) fcntl$addseals(0xffffffffffffffff, 0x409, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f0000000000), &(0x7f00000000c0)=0x8) ioctl$EVIOCGLED(0xffffffffffffffff, 0x80404519, &(0x7f0000000580)=""/236) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x3c, 0x0) ioctl$EVIOCGKEYCODE_V2(0xffffffffffffffff, 0x80284504, &(0x7f00000003c0)=""/188) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c82, 0x0) [ 1498.956050] FAULT_INJECTION: forcing a failure. [ 1498.956050] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1498.968126] CPU: 1 PID: 6027 Comm: syz-executor0 Not tainted 4.18.0-rc4+ #144 [ 1498.975428] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1498.984794] Call Trace: [ 1498.987400] dump_stack+0x1c9/0x2b4 [ 1498.991042] ? dump_stack_print_info.cold.2+0x52/0x52 [ 1498.996242] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 1499.001287] should_fail.cold.4+0xa/0x1a [ 1499.005363] ? mark_held_locks+0xc9/0x160 [ 1499.009554] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 1499.014700] ? graph_lock+0x170/0x170 [ 1499.018531] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1499.023309] ? retint_kernel+0x10/0x10 [ 1499.027224] ? __lock_is_held+0xb5/0x140 [ 1499.031306] ? check_same_owner+0x340/0x340 [ 1499.035640] ? print_usage_bug+0xc0/0xc0 [ 1499.039710] ? rcu_note_context_switch+0x730/0x730 [ 1499.044649] ? is_bpf_text_address+0xd7/0x170 [ 1499.049165] __alloc_pages_nodemask+0x36e/0xdb0 [ 1499.053849] ? mark_held_locks+0xc9/0x160 [ 1499.058011] ? __alloc_pages_slowpath+0x2d90/0x2d90 [ 1499.063039] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 1499.068066] ? retint_kernel+0x10/0x10 [ 1499.071965] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 1499.077015] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1499.081804] ? retint_kernel+0x10/0x10 [ 1499.085710] ? blk_mq_alloc_rqs+0x3a9/0x9c0 [ 1499.090058] ? blk_mq_alloc_rqs+0x30e/0x9c0 [ 1499.094393] blk_mq_alloc_rqs+0x31f/0x9c0 [ 1499.098557] ? retint_kernel+0x10/0x10 [ 1499.102454] ? blk_mq_alloc_rq_map+0x220/0x220 [ 1499.107056] ? blk_mq_alloc_rq_map+0x142/0x220 [ 1499.111667] __blk_mq_alloc_rq_map+0x15f/0x2e0 [ 1499.116266] blk_mq_alloc_tag_set+0x627/0xad0 [ 1499.120798] ? blk_mq_update_nr_hw_queues+0x510/0x510 [ 1499.126008] loop_add+0x2be/0x9d0 [ 1499.129473] ? loop_lookup+0x105/0x230 [ 1499.133366] ? loop_queue_rq+0x660/0x660 [ 1499.137440] loop_control_ioctl+0x199/0x540 [ 1499.142611] ? loop_add+0x9d0/0x9d0 [ 1499.146275] ? expand_files.part.8+0x9c0/0x9c0 [ 1499.150866] ? kasan_check_write+0x14/0x20 [ 1499.155109] ? __mutex_unlock_slowpath+0x197/0x8c0 [ 1499.160048] ? loop_add+0x9d0/0x9d0 [ 1499.163683] do_vfs_ioctl+0x1de/0x1720 [ 1499.167588] ? ioctl_preallocate+0x300/0x300 [ 1499.172003] ? __fget_light+0x2f7/0x440 [ 1499.175985] ? fget_raw+0x20/0x20 [ 1499.179448] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 1499.184476] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1499.189272] ? retint_kernel+0x10/0x10 [ 1499.193168] ? security_file_ioctl+0x94/0xc0 [ 1499.197602] ksys_ioctl+0xa9/0xd0 [ 1499.201063] __x64_sys_ioctl+0x73/0xb0 [ 1499.204971] do_syscall_64+0x1b9/0x820 [ 1499.208867] ? syscall_slow_exit_work+0x500/0x500 [ 1499.213723] ? syscall_return_slowpath+0x5e0/0x5e0 [ 1499.218663] ? syscall_return_slowpath+0x31d/0x5e0 [ 1499.223630] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1499.229186] ? retint_user+0x18/0x18 [ 1499.232933] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1499.238036] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1499.243237] RIP: 0033:0x455a79 [ 1499.246423] Code: 1d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1499.265809] RSP: 002b:00007f420d477c68 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1499.273535] RAX: ffffffffffffffda RBX: 00007f420d4786d4 RCX: 0000000000455a79 [ 1499.280807] RDX: 0000000000000000 RSI: 0000000000004c80 RDI: 0000000000000016 [ 1499.288094] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 1499.295368] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000017 03:54:20 executing program 4: r0 = socket(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0xb3010000}, 0xc, &(0x7f0000000900)={&(0x7f0000000040)={0x14, 0x1e, 0x201}, 0x14}, 0x1}, 0x0) 03:54:20 executing program 5: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer2\x00', 0x0, 0x0) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000040)="025cc83d6d345f8f762070") ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r0, 0x40085112, &(0x7f0000b18000)={{0xffffff93}, {0xffffffa0}, 0x0, 0x0, 0x0, [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff030000]}) [ 1499.302642] R13: 00000000004bdfb1 R14: 00000000004ccab0 R15: 0000000000000009 03:54:20 executing program 1: r0 = socket(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x61010000}, 0xc, &(0x7f0000000900)={&(0x7f0000000040)={0x14, 0x1e, 0x201}, 0x14}, 0x1}, 0x0) [ 1499.446594] hfsplus: unable to find HFS+ superblock 03:54:21 executing program 2: r0 = syz_open_dev$sndseq(&(0x7f0000dcc000)='/dev/snd/seq\x00', 0x0, 0x2) read(r0, &(0x7f0000fb6000)=""/28, 0x3f0) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000240)={0xbf}) write$binfmt_script(r0, &(0x7f0000000000)=ANY=[], 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f00000002c0)={{}, 'port0\x00'}) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer2\x00', 0x0, 0x0) ioctl$EVIOCGBITSW(r1, 0x80404525, &(0x7f0000000000)=""/90) 03:54:21 executing program 6: r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x8000, 0x0) accept$inet6(r0, &(0x7f0000000040)={0x0, 0x0, 0x0, @mcast2}, &(0x7f0000000080)=0x1c) r1 = socket(0x11, 0xa, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000640)={0x0, 0x0, 0x0}, &(0x7f0000000680)=0xc) write$P9_RVERSION(r0, &(0x7f00000000c0)={0x15, 0x65, 0xffff, 0x8000000, 0x8, '9P2000.u'}, 0x15) syz_mount_image$hfsplus(&(0x7f0000000240)='hfsplus\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, &(0x7f00000005c0), 0x0, &(0x7f00000006c0)={[{@gid={'gid', 0x3d, r2}, 0x2c}]}) 03:54:21 executing program 0 (fault-call:10 fault-nth:10): r0 = syz_open_dev$vcsa(&(0x7f0000000100)='/dev/vcsa#\x00', 0x5, 0x101000) ioctl$BLKDISCARD(r0, 0x1277, &(0x7f0000000180)=0x5f) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140)='/dev/snapshot\x00', 0x0, 0x0) connect$nfc_llcp(r1, &(0x7f0000000300)={0x27, 0x0, 0x0, 0x6, 0x0, 0x0, "f44825e9da257dcd22512d531f545cf0bce08002f76d5e9bd3d1dcb3f649bf7ba49078f877ce09f903ed489ab0bbf0f088675b47312412edd6bd577062eb34", 0x1c}, 0x60) fcntl$addseals(0xffffffffffffffff, 0x409, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EVIOCGLED(r1, 0x80404519, &(0x7f0000000580)=""/236) ioctl$FS_IOC_SETFSLABEL(r2, 0x41009432, &(0x7f0000000480)="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") r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x3c, 0x0) ioctl$EVIOCGKEYCODE_V2(0xffffffffffffffff, 0x80284504, &(0x7f00000003c0)=""/188) ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x0) 03:54:21 executing program 1: r0 = socket(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4e01000000000000}, 0xc, &(0x7f0000000900)={&(0x7f0000000040)={0x14, 0x1e, 0x201}, 0x14}, 0x1}, 0x0) 03:54:21 executing program 7: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f000000d000)={0xa, 0x4e20}, 0x1c) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}, 0xb}, 0x1c) syz_emit_ethernet(0x3e, &(0x7f00000001c0)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @random="e829f650db0f", [], {@ipv6={0x86dd, {0x0, 0x6, "50a09c", 0x8, 0xffffff11, 0x0, @remote={0xfe, 0x80, [], 0xbb}, @local={0xfe, 0x80, [], 0xaa}, {[], @udp={0x0, 0x4e20, 0x8}}}}}}, &(0x7f0000000040)) syz_emit_ethernet(0x3e, &(0x7f0000000000)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], {@ipv6={0x86dd, {0x0, 0x6, "50a09c", 0x8, 0xffffff11, 0x0, @remote={0xfe, 0x80, [], 0xbb}, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000000000], 0xaa}, {[], @udp={0x300, 0x4e20, 0x8}}}}}}, &(0x7f0000000040)) 03:54:21 executing program 5: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer2\x00', 0x0, 0x0) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000040)="025cc83d6d345f8f762070") ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r0, 0x40085112, &(0x7f0000b18000)={{0xffffff93}, {0xffffffa0}, 0x0, 0x0, 0x0, [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8]}) 03:54:21 executing program 4: r0 = socket(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0xde00}, 0xc, &(0x7f0000000900)={&(0x7f0000000040)={0x14, 0x1e, 0x201}, 0x14}, 0x1}, 0x0) 03:54:21 executing program 3: r0 = creat(&(0x7f0000000080)='./file0\x00', 0xe1) ioctl$BLKDISCARD(r0, 0x1277, &(0x7f0000000180)) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140)='/dev/snapshot\x00', 0x0, 0x0) fcntl$addseals(0xffffffffffffffff, 0x409, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f0000000000), &(0x7f00000000c0)=0x8) ioctl$EVIOCGLED(0xffffffffffffffff, 0x80404519, &(0x7f0000000580)=""/236) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x3c, 0x0) ioctl$EVIOCGKEYCODE_V2(0xffffffffffffffff, 0x80284504, &(0x7f00000003c0)=""/188) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c82, 0x0) 03:54:21 executing program 1: r0 = socket(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0xab010000}, 0xc, &(0x7f0000000900)={&(0x7f0000000040)={0x14, 0x1e, 0x201}, 0x14}, 0x1}, 0x0) 03:54:21 executing program 7: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f000000d000)={0xa, 0x4e20}, 0x1c) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}, 0xb}, 0x1c) syz_emit_ethernet(0x3e, &(0x7f00000001c0)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @random="e829f650db0f", [], {@ipv6={0x86dd, {0x0, 0x6, "50a09c", 0x8, 0xffffff11, 0x0, @remote={0xfe, 0x80, [], 0xbb}, @local={0xfe, 0x80, [], 0xaa}, {[], @udp={0x0, 0x4e20, 0x8}}}}}}, &(0x7f0000000040)) syz_emit_ethernet(0x3e, &(0x7f0000000000)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], {@ipv6={0x86dd, {0x0, 0x6, "50a09c", 0x8, 0xffffff11, 0x0, @remote={0xfe, 0x80, [], 0xbb}, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffff000], 0xaa}, {[], @udp={0x300, 0x4e20, 0x8}}}}}}, &(0x7f0000000040)) [ 1500.015128] hfsplus: gid requires an argument [ 1500.019773] hfsplus: unable to parse mount options [ 1500.049321] FAULT_INJECTION: forcing a failure. [ 1500.049321] name failslab, interval 1, probability 0, space 0, times 0 [ 1500.060850] CPU: 1 PID: 6066 Comm: syz-executor0 Not tainted 4.18.0-rc4+ #144 [ 1500.068145] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1500.077521] Call Trace: [ 1500.080161] dump_stack+0x1c9/0x2b4 [ 1500.083820] ? dump_stack_print_info.cold.2+0x52/0x52 [ 1500.089036] ? finish_task_switch+0x1d3/0x870 [ 1500.093551] ? finish_task_switch+0x18a/0x870 [ 1500.098111] should_fail.cold.4+0xa/0x1a [ 1500.102206] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 1500.107342] ? __schedule+0x884/0x1ed0 [ 1500.111253] ? print_usage_bug+0xc0/0xc0 [ 1500.115427] ? __sched_text_start+0x8/0x8 [ 1500.119598] ? find_held_lock+0x36/0x1c0 [ 1500.123694] ? retint_kernel+0x10/0x10 [ 1500.127618] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 1500.132674] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1500.137478] __should_failslab+0x124/0x180 [ 1500.141745] should_failslab+0x9/0x14 [ 1500.145567] kmem_cache_alloc_node+0x272/0x780 [ 1500.150189] blk_alloc_queue_node+0xfb/0xf50 [ 1500.154668] ? blk_mq_alloc_rqs+0x7bc/0x9c0 [ 1500.159043] ? blk_init_allocated_queue+0x600/0x600 [ 1500.164087] ? lockdep_init_map+0x9/0x10 [ 1500.168168] ? debug_mutex_init+0x2d/0x60 [ 1500.172343] ? __mutex_init+0x1f7/0x290 [ 1500.176333] ? __ia32_sys_membarrier+0x150/0x150 [ 1500.181133] ? retint_kernel+0x10/0x10 [ 1500.185039] ? blk_mq_alloc_tag_set+0x633/0xad0 [ 1500.189733] ? blk_mq_alloc_tag_set+0x50e/0xad0 [ 1500.194420] ? retint_kernel+0x10/0x10 [ 1500.198327] ? blk_mq_update_nr_hw_queues+0x510/0x510 [ 1500.203535] blk_mq_init_queue+0x4b/0xb0 [ 1500.207609] loop_add+0x33d/0x9d0 [ 1500.211081] ? loop_lookup+0x105/0x230 [ 1500.214978] ? loop_queue_rq+0x660/0x660 [ 1500.219057] loop_control_ioctl+0x199/0x540 [ 1500.223566] ? loop_add+0x9d0/0x9d0 [ 1500.227206] ? retint_kernel+0x10/0x10 [ 1500.231116] ? do_vfs_ioctl+0x178/0x1720 [ 1500.235189] ? loop_add+0x9d0/0x9d0 [ 1500.238826] do_vfs_ioctl+0x1de/0x1720 [ 1500.242730] ? __lock_is_held+0xb5/0x140 [ 1500.246888] ? ioctl_preallocate+0x300/0x300 [ 1500.251324] ? __fget_light+0x2f7/0x440 [ 1500.255303] ? fget_raw+0x20/0x20 [ 1500.258766] ? retint_kernel+0x10/0x10 [ 1500.262670] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 1500.267868] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1500.272641] ? retint_kernel+0x10/0x10 [ 1500.276537] ? security_file_ioctl+0x94/0xc0 [ 1500.280959] ksys_ioctl+0xa9/0xd0 [ 1500.284423] __x64_sys_ioctl+0x73/0xb0 [ 1500.288322] do_syscall_64+0x1b9/0x820 [ 1500.292225] ? syscall_slow_exit_work+0x500/0x500 [ 1500.297096] ? syscall_return_slowpath+0x5e0/0x5e0 [ 1500.302039] ? syscall_return_slowpath+0x31d/0x5e0 [ 1500.306992] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe [ 1500.312378] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1500.317240] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1500.322441] RIP: 0033:0x455a79 [ 1500.325634] Code: 1d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1500.345015] RSP: 002b:00007f420d477c68 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1500.352740] RAX: ffffffffffffffda RBX: 00007f420d4786d4 RCX: 0000000000455a79 03:54:21 executing program 3: ioctl$BLKDISCARD(0xffffffffffffffff, 0x1277, &(0x7f0000000180)) r0 = syz_open_dev$amidi(&(0x7f0000000300)='/dev/amidi#\x00', 0x118166cb, 0x20100) accept$inet6(r0, &(0x7f0000000340), &(0x7f0000000100)=0x1c) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000480)='/dev/snapshot\x00', 0xffffffffffffffff, 0x0) fcntl$addseals(0xffffffffffffffff, 0x409, 0x0) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r1, 0x6, 0x23, &(0x7f0000000240)={&(0x7f0000ffc000/0x4000)=nil, 0x4000}, &(0x7f0000000280)=0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f0000000000), &(0x7f00000000c0)=0x8) ioctl$EVIOCGLED(0xffffffffffffffff, 0x80404519, &(0x7f0000000580)=""/236) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x3c, 0x0) r3 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000080)='IPVS\x00') sendmsg$IPVS_CMD_SET_INFO(r1, &(0x7f0000000200)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f00000001c0)={&(0x7f00000004c0)=ANY=[@ANYBLOB="1c000000", @ANYRES16=r3, @ANYBLOB="040029bd7049a6d25fdbb9f4ff8e0f2077b5aaf6ebff7f000800090005000000"], 0x1c}, 0x1, 0x0, 0x0, 0x80}, 0x10) ioctl$EVIOCGKEYCODE_V2(0xffffffffffffffff, 0x80284504, &(0x7f00000003c0)=""/188) open(&(0x7f0000000140)='./file0\x00', 0x140, 0x11) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c82, 0x0) ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) 03:54:21 executing program 5: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer2\x00', 0x0, 0x0) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000040)="025cc83d6d345f8f762070") ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r0, 0x40085112, &(0x7f0000b18000)={{0xffffff93}, {0xffffffa0}, 0x0, 0x0, 0x0, [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5]}) 03:54:21 executing program 4: r0 = socket(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4700}, 0xc, &(0x7f0000000900)={&(0x7f0000000040)={0x14, 0x1e, 0x201}, 0x14}, 0x1}, 0x0) [ 1500.360037] RDX: 0000000000000000 RSI: 0000000000004c80 RDI: 0000000000000016 [ 1500.367310] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 1500.374587] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000017 [ 1500.381869] R13: 00000000004bdfb1 R14: 00000000004ccab0 R15: 000000000000000a 03:54:22 executing program 1: r0 = socket(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1301}, 0xc, &(0x7f0000000900)={&(0x7f0000000040)={0x14, 0x1e, 0x201}, 0x14}, 0x1}, 0x0) 03:54:22 executing program 6: bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="0ee545cf000000000000006f388000006a0a00fffffff6005d"], &(0x7f0000000080)='syzkaller\x00', 0x0, 0xce, &(0x7f0000000180)=""/206}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x8, 0x5, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000000000000000000000010000500000000000000000000000000000009500000000000000"], &(0x7f00000004c0)="73797a6b584e3e2f9afed6d0ee3d5d5de2f791e4545b69c564e359a02949ab535c1b25caa665b968d2f1a32e3febe4189befa5f044722bae83e5b6959e392e8d24e41b4ce153c97b5a23e135e38d3b1d14ad7a9eeb7069347fee053569544f1a0000000000000000", 0x80000001, 0x466, &(0x7f0000000300)=""/187}, 0x48) r0 = socket(0x11, 0xa, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000640)={0x0, 0x0, 0x0}, &(0x7f0000000680)=0xc) syz_mount_image$hfsplus(&(0x7f0000000240)='hfsplus\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, &(0x7f00000005c0), 0x0, &(0x7f00000006c0)={[{@gid={'gid', 0x3d, r1}, 0x2c}]}) 03:54:22 executing program 7: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f000000d000)={0xa, 0x4e20}, 0x1c) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}, 0xb}, 0x1c) syz_emit_ethernet(0x3e, &(0x7f00000001c0)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @random="e829f650db0f", [], {@ipv6={0x86dd, {0x0, 0x6, "50a09c", 0x8, 0xffffff11, 0x0, @remote={0xfe, 0x80, [], 0xbb}, @local={0xfe, 0x80, [], 0xaa}, {[], @udp={0x0, 0x4e20, 0x8}}}}}}, &(0x7f0000000040)) syz_emit_ethernet(0x3e, &(0x7f0000000000)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], {@ipv6={0x86dd, {0x0, 0x6, "50a09c", 0x8, 0xffffff11, 0x0, @remote={0xfe, 0x80, [], 0xbb}, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf0], 0xaa}, {[], @udp={0x300, 0x4e20, 0x8}}}}}}, &(0x7f0000000040)) [ 1500.634698] hfsplus: gid requires an argument [ 1500.639703] hfsplus: unable to parse mount options [ 1500.659973] hfsplus: gid requires an argument [ 1500.664702] hfsplus: unable to parse mount options 03:54:22 executing program 2: r0 = syz_open_dev$sndseq(&(0x7f0000dcc000)='/dev/snd/seq\x00', 0x0, 0x2) read(r0, &(0x7f0000fb6000)=""/28, 0x3f0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000418f50)={{0x80}, "0a4ceaa05d9a00000000000000039b3fd4cec307e8ef3d13eb790ec9c65abaf90d229db692542e5b78f8b29e0a27800f0000000000000009fb42f376589701a4", 0xa9824f69d1376637, 0x10800a}) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000240)={0xbf}) write$binfmt_script(r0, &(0x7f0000000000)=ANY=[], 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f00000002c0)={{}, 'port0\x00'}) openat$cuse(0xffffffffffffff9c, &(0x7f0000000500)='/dev/cuse\x00', 0x408b00, 0x0) socketpair(0x4, 0x8000a, 0x9, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) execveat(r1, &(0x7f0000000040)='./file0\x00', &(0x7f0000000180)=[&(0x7f0000000080)='GPL\x00', &(0x7f0000000100)='}lo$\x00', &(0x7f0000000140)='md5sum&}md5sum\x00'], &(0x7f00000004c0)=[&(0x7f00000001c0)='md5summime_type\x00', &(0x7f0000000200)='%++%\\nodev\\security\x00', &(0x7f0000000380)=':!,\x00', &(0x7f00000003c0)='/dev/sequencer2\x00', &(0x7f0000000400)='port0\x00', &(0x7f0000000440)='+\x00', &(0x7f0000000480)='.\x00'], 0x1000) openat$sequencer2(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer2\x00', 0x0, 0x0) 03:54:22 executing program 4: r0 = socket(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x79}, 0xc, &(0x7f0000000900)={&(0x7f0000000040)={0x14, 0x1e, 0x201}, 0x14}, 0x1}, 0x0) 03:54:22 executing program 3: ioctl$BLKDISCARD(0xffffffffffffffff, 0x1277, &(0x7f0000000180)) r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140)='/dev/snapshot\x00', 0x0, 0x0) fcntl$addseals(0xffffffffffffffff, 0x409, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f0000000000), &(0x7f00000000c0)=0x8) ioctl$EVIOCGLED(0xffffffffffffffff, 0x80404519, &(0x7f0000000580)=""/236) setsockopt$packet_fanout_data(r0, 0x107, 0x16, &(0x7f0000000080)={0x6, &(0x7f0000000040)=[{0x2, 0x8001, 0x3f, 0x800}, {0x100000001, 0x8, 0x6d, 0x1e}, {0x20, 0x5e1, 0x3f, 0x100000001}, {0xad0, 0x101, 0x671, 0xffffffff00000001}, {0x6, 0x0, 0x0, 0x5}, {0x0, 0x0, 0x2, 0x5f}]}, 0x10) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x3c, 0x0) ioctl$EVIOCGKEYCODE_V2(0xffffffffffffffff, 0x80284504, &(0x7f00000003c0)=""/188) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c82, 0x0) 03:54:22 executing program 5: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer2\x00', 0x0, 0x0) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000040)="025cc83d6d345f8f762070") ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r0, 0x40085112, &(0x7f0000b18000)={{0xffffff93}, {0xffffffa0}, 0x0, 0x0, 0x0, [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff03000000000000]}) 03:54:22 executing program 0 (fault-call:10 fault-nth:11): r0 = syz_open_dev$vcsa(&(0x7f0000000100)='/dev/vcsa#\x00', 0x5, 0x101000) ioctl$BLKDISCARD(r0, 0x1277, &(0x7f0000000180)=0x5f) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140)='/dev/snapshot\x00', 0x0, 0x0) connect$nfc_llcp(r1, &(0x7f0000000300)={0x27, 0x0, 0x0, 0x6, 0x0, 0x0, "f44825e9da257dcd22512d531f545cf0bce08002f76d5e9bd3d1dcb3f649bf7ba49078f877ce09f903ed489ab0bbf0f088675b47312412edd6bd577062eb34", 0x1c}, 0x60) fcntl$addseals(0xffffffffffffffff, 0x409, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EVIOCGLED(r1, 0x80404519, &(0x7f0000000580)=""/236) ioctl$FS_IOC_SETFSLABEL(r2, 0x41009432, &(0x7f0000000480)="64098ceb11469210e1fa92c76a76762b420a730851d9c9ce1d2745bac5fca8796f1aba309faf35268b4d45ac04ac0ec6f2cebf8f0ac8391dd8cef0da84895505ef6fc4062016210998b92c121630e66d984a620a4a40b4b63bebedc75ae3e140c654a4f80fec3a6af81841856baae4ad83438f32d9e08e5219c8b832403b86aa723d75cb839059d9d094ba7a3510a5acd071b9c1f441886fb396511cb44257e86695b1b4b84218118e0045593d869765e8f850cc6a534e5f114b22d73ba2a903943a32cebbff720180ba6531e240d9a3759e2287b1a64f950a5b1e402580731d395128e3b81fd4c76b233a384200aa015eb779ce7140613e374a38caa9d18b34") r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x3c, 0x0) ioctl$EVIOCGKEYCODE_V2(0xffffffffffffffff, 0x80284504, &(0x7f00000003c0)=""/188) ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x0) 03:54:22 executing program 1: r0 = socket(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x7c}, 0xc, &(0x7f0000000900)={&(0x7f0000000040)={0x14, 0x1e, 0x201}, 0x14}, 0x1}, 0x0) 03:54:22 executing program 6: r0 = socket(0x11, 0x407, 0xfffffffffffffffd) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000640)={0x0, 0x0, 0x0}, &(0x7f0000000680)=0xc) syz_mount_image$hfsplus(&(0x7f0000000240)='hfsplus\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, &(0x7f00000005c0), 0x0, &(0x7f00000006c0)={[{@gid={'gid', 0x3d, r1}, 0x2c}]}) 03:54:22 executing program 7: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f000000d000)={0xa, 0x4e20}, 0x1c) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}, 0xb}, 0x1c) syz_emit_ethernet(0x3e, &(0x7f00000001c0)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @random="e829f650db0f", [], {@ipv6={0x86dd, {0x0, 0x6, "50a09c", 0x8, 0xffffff11, 0x0, @remote={0xfe, 0x80, [], 0xbb}, @local={0xfe, 0x80, [], 0xaa}, {[], @udp={0x0, 0x4e20, 0x8}}}}}}, &(0x7f0000000040)) syz_emit_ethernet(0x3e, &(0x7f0000000000)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], {@ipv6={0x86dd, {0x0, 0x6, "50a09c", 0x8, 0xffffff11, 0x0, @remote={0xfe, 0x80, [], 0xbb}, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x88a8ffff00000000], 0xaa}, {[], @udp={0x300, 0x4e20, 0x8}}}}}}, &(0x7f0000000040)) [ 1501.343627] hfsplus: unable to find HFS+ superblock 03:54:22 executing program 1: r0 = socket(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0xbd000000}, 0xc, &(0x7f0000000900)={&(0x7f0000000040)={0x14, 0x1e, 0x201}, 0x14}, 0x1}, 0x0) 03:54:22 executing program 5: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer2\x00', 0x0, 0x0) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000040)="025cc83d6d345f8f762070") ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r0, 0x40085112, &(0x7f0000b18000)={{0xffffff93}, {0xffffffa0}, 0x0, 0x0, 0x0, [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f00000000000000]}) [ 1501.389787] hfsplus: unable to find HFS+ superblock 03:54:22 executing program 4: r0 = socket(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8a00}, 0xc, &(0x7f0000000900)={&(0x7f0000000040)={0x14, 0x1e, 0x201}, 0x14}, 0x1}, 0x0) 03:54:22 executing program 7: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f000000d000)={0xa, 0x4e20}, 0x1c) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}, 0xb}, 0x1c) syz_emit_ethernet(0x3e, &(0x7f00000001c0)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @random="e829f650db0f", [], {@ipv6={0x86dd, {0x0, 0x6, "50a09c", 0x8, 0xffffff11, 0x0, @remote={0xfe, 0x80, [], 0xbb}, @local={0xfe, 0x80, [], 0xaa}, {[], @udp={0x0, 0x4e20, 0x8}}}}}}, &(0x7f0000000040)) syz_emit_ethernet(0x3e, &(0x7f0000000000)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], {@ipv6={0x86dd, {0x0, 0x6, "50a09c", 0x8, 0xffffff11, 0x0, @remote={0xfe, 0x80, [], 0xbb}, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8dffffff00000000], 0xaa}, {[], @udp={0x300, 0x4e20, 0x8}}}}}}, &(0x7f0000000040)) 03:54:22 executing program 3: ioctl$BLKDISCARD(0xffffffffffffffff, 0x1277, &(0x7f0000000180)) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140)='/dev/snapshot\x00', 0x0, 0x0) fcntl$addseals(0xffffffffffffffff, 0x409, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x800, 0x5) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f0000000000), &(0x7f00000000c0)=0x8) ioctl$EVIOCGLED(0xffffffffffffffff, 0x80404519, &(0x7f0000000580)=""/236) fcntl$addseals(r0, 0x409, 0x8) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x3c, 0x0) ioctl$EVIOCGKEYCODE_V2(0xffffffffffffffff, 0x80284504, &(0x7f00000003c0)=""/188) getpid() ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c82, 0x0) [ 1501.423813] FAULT_INJECTION: forcing a failure. [ 1501.423813] name failslab, interval 1, probability 0, space 0, times 0 [ 1501.435392] CPU: 1 PID: 6122 Comm: syz-executor0 Not tainted 4.18.0-rc4+ #144 [ 1501.442683] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1501.452048] Call Trace: [ 1501.454660] dump_stack+0x1c9/0x2b4 [ 1501.458301] ? dump_stack_print_info.cold.2+0x52/0x52 [ 1501.463535] ? should_fail+0x105/0xbed [ 1501.467439] should_fail.cold.4+0xa/0x1a [ 1501.471508] ? mark_held_locks+0xc9/0x160 [ 1501.475675] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 1501.480815] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 1501.485837] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1501.490590] ? graph_lock+0x170/0x170 [ 1501.494394] ? find_held_lock+0x36/0x1c0 [ 1501.498474] ? __lock_is_held+0xb5/0x140 [ 1501.502552] ? check_same_owner+0x340/0x340 [ 1501.506884] ? rcu_note_context_switch+0x730/0x730 [ 1501.511835] __should_failslab+0x124/0x180 [ 1501.516092] should_failslab+0x9/0x14 03:54:23 executing program 1: r0 = socket(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x6b01}, 0xc, &(0x7f0000000900)={&(0x7f0000000040)={0x14, 0x1e, 0x201}, 0x14}, 0x1}, 0x0) [ 1501.519924] kmem_cache_alloc_node_trace+0x26f/0x770 [ 1501.525073] ? lockdep_init_map+0x9/0x10 [ 1501.529173] ? __init_waitqueue_head+0x9e/0x150 [ 1501.533858] ? init_wait_entry+0x1c0/0x1c0 [ 1501.538114] __kmalloc_node+0x33/0x70 [ 1501.541935] ? mempool_alloc_slab+0x60/0x60 [ 1501.546273] mempool_init_node+0x12e/0x560 [ 1501.550519] ? mempool_free+0x370/0x370 [ 1501.554516] ? mempool_free+0x370/0x370 [ 1501.558505] ? mempool_alloc_slab+0x60/0x60 [ 1501.562846] mempool_init+0x3d/0x50 [ 1501.566495] bioset_init+0x3d3/0x830 [ 1501.570233] ? bioset_exit+0x370/0x370 [ 1501.574137] ? loop_info64_from_compat+0x940/0x940 [ 1501.579097] blk_alloc_queue_node+0x28f/0xf50 [ 1501.583608] ? blk_mq_alloc_rqs+0x7bc/0x9c0 [ 1501.587951] ? blk_init_allocated_queue+0x600/0x600 [ 1501.592987] ? lockdep_init_map+0x9/0x10 [ 1501.597060] ? debug_mutex_init+0x2d/0x60 [ 1501.601219] ? __mutex_init+0x1f7/0x290 [ 1501.605202] ? __ia32_sys_membarrier+0x150/0x150 [ 1501.609974] ? mark_held_locks+0xc9/0x160 [ 1501.614131] ? retint_kernel+0x10/0x10 [ 1501.618034] ? trace_hardirqs_on_caller+0x421/0x5c0 03:54:23 executing program 1: r0 = socket(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x9501}, 0xc, &(0x7f0000000900)={&(0x7f0000000040)={0x14, 0x1e, 0x201}, 0x14}, 0x1}, 0x0) [ 1501.623061] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1501.627828] ? retint_kernel+0x10/0x10 [ 1501.631732] blk_mq_init_queue+0x4b/0xb0 [ 1501.636005] loop_add+0x33d/0x9d0 [ 1501.639464] ? loop_lookup+0x105/0x230 [ 1501.643359] ? loop_queue_rq+0x660/0x660 [ 1501.647431] loop_control_ioctl+0x199/0x540 [ 1501.651762] ? loop_add+0x9d0/0x9d0 [ 1501.655410] ? expand_files.part.8+0x9c0/0x9c0 [ 1501.660007] ? retint_kernel+0x10/0x10 [ 1501.663910] ? loop_add+0x9d0/0x9d0 [ 1501.667547] do_vfs_ioctl+0x1de/0x1720 [ 1501.671455] ? __fget_light+0x155/0x440 [ 1501.675450] ? retint_kernel+0x10/0x10 [ 1501.679356] ? ioctl_preallocate+0x300/0x300 [ 1501.683791] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1501.688569] ? retint_kernel+0x10/0x10 [ 1501.692483] ? security_file_ioctl+0x20/0xc0 [ 1501.696905] ? security_file_ioctl+0x8c/0xc0 [ 1501.701331] ? security_file_ioctl+0x94/0xc0 [ 1501.705767] ksys_ioctl+0xa9/0xd0 [ 1501.709240] __x64_sys_ioctl+0x73/0xb0 [ 1501.713151] do_syscall_64+0x1b9/0x820 [ 1501.717059] ? syscall_slow_exit_work+0x500/0x500 03:54:23 executing program 1: r0 = socket(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0xa4000000}, 0xc, &(0x7f0000000900)={&(0x7f0000000040)={0x14, 0x1e, 0x201}, 0x14}, 0x1}, 0x0) [ 1501.721920] ? syscall_return_slowpath+0x5e0/0x5e0 [ 1501.726864] ? syscall_return_slowpath+0x31d/0x5e0 [ 1501.731807] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1501.737353] ? retint_user+0x18/0x18 [ 1501.741172] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1501.746034] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1501.751235] RIP: 0033:0x455a79 [ 1501.754425] Code: 1d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1501.773835] RSP: 002b:00007f420d477c68 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1501.781567] RAX: ffffffffffffffda RBX: 00007f420d4786d4 RCX: 0000000000455a79 [ 1501.788861] RDX: 0000000000000000 RSI: 0000000000004c80 RDI: 0000000000000015 [ 1501.796146] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 1501.803428] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000016 [ 1501.810712] R13: 00000000004bdfb1 R14: 00000000004ccab0 R15: 000000000000000b 03:54:23 executing program 2: r0 = syz_open_dev$sndseq(&(0x7f0000dcc000)='/dev/snd/seq\x00', 0x0, 0x2) read(r0, &(0x7f0000fb6000)=""/28, 0x3f0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000418f50)={{0x80}, "0a4ceaa05d9a00000000000000039b3fd4cec307e8ef3d13eb790ec9c65abaf90d229db692542e5b78f8b29e0a27800f0000000000000009fb42f376589701a4", 0xa9824f69d1376637, 0x10800a}) socket$bt_hidp(0x1f, 0x3, 0x6) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000240)={0xbf}) write$binfmt_script(r0, &(0x7f0000000000)=ANY=[], 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f00000002c0)={{}, 'port0\x00'}) openat$sequencer2(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer2\x00', 0x0, 0x0) getsockopt$inet_buf(r0, 0x0, 0x24, &(0x7f0000000000)=""/30, &(0x7f0000000040)=0x1e) 03:54:23 executing program 1: r0 = socket(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x174}, 0xc, &(0x7f0000000900)={&(0x7f0000000040)={0x14, 0x1e, 0x201}, 0x14}, 0x1}, 0x0) 03:54:23 executing program 6: r0 = socket(0x11, 0xa, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000640)={0x0, 0x0, 0x0}, &(0x7f0000000680)=0xc) syz_mount_image$hfsplus(&(0x7f0000000240)='hfsplus\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, &(0x7f00000005c0), 0x0, &(0x7f00000006c0)={[{@gid={'gid', 0x3d, r1}, 0x2c}]}) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x1d, &(0x7f0000000000)={0x6, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, &(0x7f0000000100)=0xffffff7f) setsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(r0, 0x84, 0x7b, &(0x7f0000000080)={r2, 0x7fffffff}, 0x8) 03:54:23 executing program 0 (fault-call:10 fault-nth:12): r0 = syz_open_dev$vcsa(&(0x7f0000000100)='/dev/vcsa#\x00', 0x5, 0x101000) ioctl$BLKDISCARD(r0, 0x1277, &(0x7f0000000180)=0x5f) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140)='/dev/snapshot\x00', 0x0, 0x0) connect$nfc_llcp(r1, &(0x7f0000000300)={0x27, 0x0, 0x0, 0x6, 0x0, 0x0, "f44825e9da257dcd22512d531f545cf0bce08002f76d5e9bd3d1dcb3f649bf7ba49078f877ce09f903ed489ab0bbf0f088675b47312412edd6bd577062eb34", 0x1c}, 0x60) fcntl$addseals(0xffffffffffffffff, 0x409, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EVIOCGLED(r1, 0x80404519, &(0x7f0000000580)=""/236) ioctl$FS_IOC_SETFSLABEL(r2, 0x41009432, &(0x7f0000000480)="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") r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x3c, 0x0) ioctl$EVIOCGKEYCODE_V2(0xffffffffffffffff, 0x80284504, &(0x7f00000003c0)=""/188) ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x0) 03:54:23 executing program 4: r0 = socket(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x9f01}, 0xc, &(0x7f0000000900)={&(0x7f0000000040)={0x14, 0x1e, 0x201}, 0x14}, 0x1}, 0x0) 03:54:23 executing program 7: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f000000d000)={0xa, 0x4e20}, 0x1c) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}, 0xb}, 0x1c) syz_emit_ethernet(0x3e, &(0x7f00000001c0)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @random="e829f650db0f", [], {@ipv6={0x86dd, {0x0, 0x6, "50a09c", 0x8, 0xffffff11, 0x0, @remote={0xfe, 0x80, [], 0xbb}, @local={0xfe, 0x80, [], 0xaa}, {[], @udp={0x0, 0x4e20, 0x8}}}}}}, &(0x7f0000000040)) syz_emit_ethernet(0x3e, &(0x7f0000000000)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], {@ipv6={0x86dd, {0x0, 0x6, "50a09c", 0x8, 0xffffff11, 0x0, @remote={0xfe, 0x80, [], 0xbb}, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x700], 0xaa}, {[], @udp={0x300, 0x4e20, 0x8}}}}}}, &(0x7f0000000040)) 03:54:23 executing program 5: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer2\x00', 0x0, 0x0) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000040)="025cc83d6d345f8f762070") ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r0, 0x40085112, &(0x7f0000b18000)={{0xffffff93}, {0xffffffa0}, 0x0, 0x0, 0x0, [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfdffffff]}) 03:54:23 executing program 3: ioctl$BLKDISCARD(0xffffffffffffffff, 0x1277, &(0x7f0000000180)) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140)='/dev/snapshot\x00', 0x0, 0x0) fcntl$addseals(0xffffffffffffffff, 0x409, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f0000000000), &(0x7f00000000c0)=0x8) ioctl$EVIOCGLED(0xffffffffffffffff, 0x80404519, &(0x7f0000000580)=""/236) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x3c, 0x0) ioctl$EVIOCGKEYCODE_V2(0xffffffffffffffff, 0x80284504, &(0x7f00000003c0)=""/188) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c82, 0x0) [ 1502.497247] FAULT_INJECTION: forcing a failure. [ 1502.497247] name failslab, interval 1, probability 0, space 0, times 0 [ 1502.509178] CPU: 1 PID: 6167 Comm: syz-executor0 Not tainted 4.18.0-rc4+ #144 [ 1502.516483] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1502.525853] Call Trace: [ 1502.528471] dump_stack+0x1c9/0x2b4 [ 1502.532738] ? dump_stack_print_info.cold.2+0x52/0x52 [ 1502.537974] should_fail.cold.4+0xa/0x1a [ 1502.542132] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 1502.547304] ? __schedule+0x884/0x1ed0 [ 1502.551221] ? save_stack+0xa9/0xd0 [ 1502.554902] ? __sched_text_start+0x8/0x8 [ 1502.559070] ? find_held_lock+0x36/0x1c0 [ 1502.563162] ? __lock_is_held+0xb5/0x140 [ 1502.567276] ? check_same_owner+0x340/0x340 [ 1502.571626] __should_failslab+0x124/0x180 [ 1502.575889] should_failslab+0x9/0x14 [ 1502.579712] kmem_cache_alloc+0x2af/0x760 [ 1502.583884] ? mempool_free+0x370/0x370 [ 1502.587873] mempool_alloc_slab+0x44/0x60 [ 1502.592034] mempool_init_node+0x2d5/0x560 [ 1502.596291] ? do_raw_spin_trylock+0x1c0/0x1c0 [ 1502.600887] ? mempool_free+0x370/0x370 [ 1502.604889] ? mempool_alloc_slab+0x60/0x60 [ 1502.609221] mempool_init+0x3d/0x50 [ 1502.612864] bioset_init+0x3d3/0x830 [ 1502.616595] ? bioset_exit+0x370/0x370 [ 1502.620496] ? loop_info64_from_compat+0x940/0x940 [ 1502.625453] blk_alloc_queue_node+0x28f/0xf50 [ 1502.629960] ? blk_mq_alloc_rqs+0x7bc/0x9c0 [ 1502.634302] ? blk_init_allocated_queue+0x600/0x600 [ 1502.639399] ? lockdep_init_map+0x9/0x10 [ 1502.643512] ? debug_mutex_init+0x2d/0x60 [ 1502.647678] ? __mutex_init+0x1f7/0x290 [ 1502.651665] ? __ia32_sys_membarrier+0x150/0x150 [ 1502.656442] ? blk_mq_alloc_rq_map+0x142/0x220 [ 1502.661051] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1502.666600] ? __blk_mq_alloc_rq_map+0x17d/0x2e0 [ 1502.671370] ? blk_mq_alloc_tag_set+0x50e/0xad0 [ 1502.676056] ? blk_mq_update_nr_hw_queues+0x510/0x510 [ 1502.681259] blk_mq_init_queue+0x4b/0xb0 [ 1502.685333] loop_add+0x33d/0x9d0 [ 1502.688791] ? loop_lookup+0x105/0x230 [ 1502.692683] ? loop_queue_rq+0x660/0x660 [ 1502.696760] loop_control_ioctl+0x199/0x540 [ 1502.701086] ? loop_add+0x9d0/0x9d0 [ 1502.704723] ? retint_kernel+0x10/0x10 [ 1502.708645] ? do_vfs_ioctl+0x123/0x1720 [ 1502.712711] ? loop_add+0x9d0/0x9d0 [ 1502.716342] do_vfs_ioctl+0x1de/0x1720 [ 1502.720240] ? check_memory_region+0x117/0x1b0 [ 1502.724834] ? ioctl_preallocate+0x300/0x300 [ 1502.729268] ? __fget_light+0x2f7/0x440 [ 1502.733252] ? fget_raw+0x20/0x20 [ 1502.736726] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1502.742269] ? fput+0x130/0x1a0 [ 1502.745560] ? ksys_write+0x1ae/0x260 [ 1502.749372] ? retint_kernel+0x10/0x10 [ 1502.753271] ? security_file_ioctl+0x94/0xc0 [ 1502.757775] ksys_ioctl+0xa9/0xd0 [ 1502.761239] __x64_sys_ioctl+0x73/0xb0 [ 1502.765136] do_syscall_64+0x1b9/0x820 [ 1502.769034] ? syscall_slow_exit_work+0x500/0x500 [ 1502.773886] ? syscall_return_slowpath+0x5e0/0x5e0 [ 1502.778823] ? syscall_return_slowpath+0x31d/0x5e0 [ 1502.783852] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1502.789402] ? retint_user+0x18/0x18 [ 1502.793140] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1502.797996] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1502.803888] RIP: 0033:0x455a79 [ 1502.807074] Code: 1d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1502.826460] RSP: 002b:00007f420d477c68 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1502.834202] RAX: ffffffffffffffda RBX: 00007f420d4786d4 RCX: 0000000000455a79 [ 1502.841479] RDX: 0000000000000000 RSI: 0000000000004c80 RDI: 0000000000000016 03:54:24 executing program 4: r0 = socket(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x103}, 0xc, &(0x7f0000000900)={&(0x7f0000000040)={0x14, 0x1e, 0x201}, 0x14}, 0x1}, 0x0) 03:54:24 executing program 7: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f000000d000)={0xa, 0x4e20}, 0x1c) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}, 0xb}, 0x1c) syz_emit_ethernet(0x3e, &(0x7f00000001c0)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @random="e829f650db0f", [], {@ipv6={0x86dd, {0x0, 0x6, "50a09c", 0x8, 0xffffff11, 0x0, @remote={0xfe, 0x80, [], 0xbb}, @local={0xfe, 0x80, [], 0xaa}, {[], @udp={0x0, 0x4e20, 0x8}}}}}}, &(0x7f0000000040)) syz_emit_ethernet(0x3e, &(0x7f0000000000)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], {@ipv6={0x86dd, {0x0, 0x6, "50a09c", 0x8, 0xffffff11, 0x0, @remote={0xfe, 0x80, [], 0xbb}, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffff8d], 0xaa}, {[], @udp={0x300, 0x4e20, 0x8}}}}}}, &(0x7f0000000040)) [ 1502.848753] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 1502.856025] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000017 [ 1502.863298] R13: 00000000004bdfb1 R14: 00000000004ccab0 R15: 000000000000000c [ 1502.884709] hfsplus: gid requires an argument [ 1502.889346] hfsplus: unable to parse mount options 03:54:24 executing program 5: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer2\x00', 0x0, 0x0) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000040)="025cc83d6d345f8f762070") ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r0, 0x40085112, &(0x7f0000b18000)={{0xffffff93}, {0xffffffa0}, 0x0, 0x0, 0x0, [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfdfdffff]}) 03:54:24 executing program 3: ioctl$BLKDISCARD(0xffffffffffffffff, 0x1277, &(0x7f0000000180)) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140)='/dev/snapshot\x00', 0x0, 0x0) fcntl$addseals(0xffffffffffffffff, 0x409, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f0000000000), &(0x7f00000000c0)=0x8) ioctl$EVIOCGLED(0xffffffffffffffff, 0x80404519, &(0x7f0000000580)=""/236) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x10000040, 0x0) ioctl$EVIOCGKEYCODE_V2(0xffffffffffffffff, 0x80284504, &(0x7f00000003c0)=""/188) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c82, 0x0) 03:54:24 executing program 1: r0 = socket(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0xaf01000000000000}, 0xc, &(0x7f0000000900)={&(0x7f0000000040)={0x14, 0x1e, 0x201}, 0x14}, 0x1}, 0x0) 03:54:24 executing program 4: r0 = socket(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0xe600}, 0xc, &(0x7f0000000900)={&(0x7f0000000040)={0x14, 0x1e, 0x201}, 0x14}, 0x1}, 0x0) [ 1502.986812] hfsplus: gid requires an argument [ 1502.991601] hfsplus: unable to parse mount options 03:54:24 executing program 7: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f000000d000)={0xa, 0x4e20}, 0x1c) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}, 0xb}, 0x1c) syz_emit_ethernet(0x3e, &(0x7f00000001c0)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @random="e829f650db0f", [], {@ipv6={0x86dd, {0x0, 0x6, "50a09c", 0x8, 0xffffff11, 0x0, @remote={0xfe, 0x80, [], 0xbb}, @local={0xfe, 0x80, [], 0xaa}, {[], @udp={0x0, 0x4e20, 0x8}}}}}}, &(0x7f0000000040)) syz_emit_ethernet(0x3e, &(0x7f0000000000)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], {@ipv6={0x86dd, {0x0, 0x6, "50a09c", 0x8, 0xffffff11, 0x0, @remote={0xfe, 0x80, [], 0xbb}, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8035000000000000], 0xaa}, {[], @udp={0x300, 0x4e20, 0x8}}}}}}, &(0x7f0000000040)) 03:54:24 executing program 6: r0 = socket(0x11, 0xd, 0xfffffffffffffffe) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000640)={0x0, 0x0, 0x0}, &(0x7f0000000680)=0xc) setsockopt$netlink_NETLINK_TX_RING(r0, 0x10e, 0x7, &(0x7f0000000280)={0x4, 0x509, 0x5, 0x4}, 0x10) syz_mount_image$hfsplus(&(0x7f0000000240)='hfsplus\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, &(0x7f00000005c0), 0x0, &(0x7f00000006c0)={[{@gid={'gid', 0x3d, r1}, 0x2c}]}) [ 1503.292727] hfsplus: unable to find HFS+ superblock 03:54:25 executing program 2: r0 = syz_open_dev$sndseq(&(0x7f0000dcc000)='/dev/snd/seq\x00', 0x0, 0x2) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(r0, 0x40505331, &(0x7f0000000100)={{0x1, 0x9}, {0x7ff, 0x8}, 0x7, 0x2, 0x8}) getsockopt$IP_VS_SO_GET_DAEMON(r1, 0x0, 0x487, &(0x7f0000000000), &(0x7f0000000040)=0x30) read(r0, &(0x7f0000fb6000)=""/28, 0x3f0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000418f50)={{0x80}, "0a4ceaa05d9a00000000000000039b3fd4cec307e8ef3d13eb790ec9c65abaf90d229db692542e5b78f8b29e0a27800f0000000000000009fb42f376589701a4", 0xa9824f69d1376637, 0x10800a}) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000240)={0xbf}) write$binfmt_script(r0, &(0x7f0000000000)=ANY=[], 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f00000002c0)={{}, 'port0\x00'}) openat$sequencer2(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer2\x00', 0x0, 0x0) 03:54:25 executing program 0 (fault-call:10 fault-nth:13): r0 = syz_open_dev$vcsa(&(0x7f0000000100)='/dev/vcsa#\x00', 0x5, 0x101000) ioctl$BLKDISCARD(r0, 0x1277, &(0x7f0000000180)=0x5f) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140)='/dev/snapshot\x00', 0x0, 0x0) connect$nfc_llcp(r1, &(0x7f0000000300)={0x27, 0x0, 0x0, 0x6, 0x0, 0x0, "f44825e9da257dcd22512d531f545cf0bce08002f76d5e9bd3d1dcb3f649bf7ba49078f877ce09f903ed489ab0bbf0f088675b47312412edd6bd577062eb34", 0x1c}, 0x60) fcntl$addseals(0xffffffffffffffff, 0x409, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EVIOCGLED(r1, 0x80404519, &(0x7f0000000580)=""/236) ioctl$FS_IOC_SETFSLABEL(r2, 0x41009432, &(0x7f0000000480)="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") r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x3c, 0x0) ioctl$EVIOCGKEYCODE_V2(0xffffffffffffffff, 0x80284504, &(0x7f00000003c0)=""/188) ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x0) 03:54:25 executing program 4: r0 = socket(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0xc300}, 0xc, &(0x7f0000000900)={&(0x7f0000000040)={0x14, 0x1e, 0x201}, 0x14}, 0x1}, 0x0) 03:54:25 executing program 3: ioctl$BLKDISCARD(0xffffffffffffffff, 0x1277, &(0x7f0000000180)) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140)='/dev/snapshot\x00', 0x0, 0x0) fcntl$addseals(0xffffffffffffffff, 0x409, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f0000000100), &(0x7f0000000040)=0x8) ioctl$EVIOCGLED(0xffffffffffffffff, 0x80404519, &(0x7f0000000580)=""/236) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x3c, 0x0) openat$cuse(0xffffffffffffff9c, &(0x7f0000000000)='/dev/cuse\x00', 0x2180, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) syz_open_dev$amidi(&(0x7f0000000080)='/dev/amidi#\x00', 0x9, 0x200) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c82, 0x0) 03:54:25 executing program 1: r0 = socket(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4a010000}, 0xc, &(0x7f0000000900)={&(0x7f0000000040)={0x14, 0x1e, 0x201}, 0x14}, 0x1}, 0x0) 03:54:25 executing program 5: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer2\x00', 0x0, 0x0) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000040)="025cc83d6d345f8f762070") ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r0, 0x40085112, &(0x7f0000b18000)={{0xffffff93}, {0xffffffa0}, 0x0, 0x0, 0x0, [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000]}) 03:54:25 executing program 7: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f000000d000)={0xa, 0x4e20}, 0x1c) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}, 0xb}, 0x1c) syz_emit_ethernet(0x3e, &(0x7f00000001c0)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @random="e829f650db0f", [], {@ipv6={0x86dd, {0x0, 0x6, "50a09c", 0x8, 0xffffff11, 0x0, @remote={0xfe, 0x80, [], 0xbb}, @local={0xfe, 0x80, [], 0xaa}, {[], @udp={0x0, 0x4e20, 0x8}}}}}}, &(0x7f0000000040)) syz_emit_ethernet(0x3e, &(0x7f0000000000)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], {@ipv6={0x86dd, {0x0, 0x6, "50a09c", 0x8, 0xffffff11, 0x0, @remote={0xfe, 0x80, [], 0xbb}, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x88480000], 0xaa}, {[], @udp={0x300, 0x4e20, 0x8}}}}}}, &(0x7f0000000040)) 03:54:25 executing program 6: r0 = socket(0x11, 0xa, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000640)={0x0, 0x0, 0x0}, &(0x7f0000000680)=0xc) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000000)) syz_mount_image$hfsplus(&(0x7f0000000240)='hfsplus\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, &(0x7f00000005c0), 0x0, &(0x7f00000006c0)={[{@gid={'gid', 0x3d, r1}, 0x2c}]}) 03:54:25 executing program 5: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer2\x00', 0x0, 0x0) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000040)="025cc83d6d345f8f762070") ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r0, 0x40085112, &(0x7f0000b18000)={{0xffffff93}, {0xffffffa0}, 0x0, 0x0, 0x0, [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffdfd]}) [ 1504.113658] hfsplus: gid requires an argument [ 1504.118727] hfsplus: unable to parse mount options 03:54:25 executing program 4: r0 = socket(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0xfb00000000000000}, 0xc, &(0x7f0000000900)={&(0x7f0000000040)={0x14, 0x1e, 0x201}, 0x14}, 0x1}, 0x0) 03:54:25 executing program 1: r0 = socket(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0xf8000000}, 0xc, &(0x7f0000000900)={&(0x7f0000000040)={0x14, 0x1e, 0x201}, 0x14}, 0x1}, 0x0) 03:54:25 executing program 3: ioctl$BLKDISCARD(0xffffffffffffffff, 0x1277, &(0x7f0000000180)) r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140)='/dev/snapshot\x00', 0x0, 0x0) fcntl$addseals(r0, 0x409, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f0000000000), &(0x7f00000000c0)=0x8) ioctl$EVIOCGLED(0xffffffffffffffff, 0x80404519, &(0x7f0000000580)=""/236) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000080)='/dev/loop-control\x00', 0x20000003c, 0x0) ioctl$EVIOCGKEYCODE_V2(0xffffffffffffffff, 0x80284504, &(0x7f00000003c0)=""/188) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c82, 0x0) 03:54:25 executing program 7: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f000000d000)={0xa, 0x4e20}, 0x1c) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}, 0xb}, 0x1c) syz_emit_ethernet(0x3e, &(0x7f00000001c0)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @random="e829f650db0f", [], {@ipv6={0x86dd, {0x0, 0x6, "50a09c", 0x8, 0xffffff11, 0x0, @remote={0xfe, 0x80, [], 0xbb}, @local={0xfe, 0x80, [], 0xaa}, {[], @udp={0x0, 0x4e20, 0x8}}}}}}, &(0x7f0000000040)) syz_emit_ethernet(0x3e, &(0x7f0000000000)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], {@ipv6={0x86dd, {0x0, 0x6, "50a09c", 0x8, 0xffffff11, 0x0, @remote={0xfe, 0x80, [], 0xbb}, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6488], 0xaa}, {[], @udp={0x300, 0x4e20, 0x8}}}}}}, &(0x7f0000000040)) [ 1504.190254] FAULT_INJECTION: forcing a failure. [ 1504.190254] name failslab, interval 1, probability 0, space 0, times 0 [ 1504.202059] CPU: 0 PID: 6223 Comm: syz-executor0 Not tainted 4.18.0-rc4+ #144 [ 1504.209337] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1504.218721] Call Trace: [ 1504.221324] dump_stack+0x1c9/0x2b4 [ 1504.224978] ? dump_stack_print_info.cold.2+0x52/0x52 [ 1504.230266] ? finish_task_switch+0x1d3/0x870 [ 1504.234765] ? finish_task_switch+0x18a/0x870 [ 1504.239278] should_fail.cold.4+0xa/0x1a [ 1504.243355] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 1504.248469] ? __schedule+0x884/0x1ed0 [ 1504.252358] ? do_vfs_ioctl+0x1de/0x1720 [ 1504.256419] ? ksys_ioctl+0xa9/0xd0 [ 1504.260074] ? __sched_text_start+0x8/0x8 [ 1504.264226] ? find_held_lock+0x36/0x1c0 [ 1504.268326] ? __lock_is_held+0xb5/0x140 [ 1504.272407] ? check_same_owner+0x340/0x340 [ 1504.276745] __should_failslab+0x124/0x180 [ 1504.280994] should_failslab+0x9/0x14 [ 1504.284809] kmem_cache_alloc+0x2af/0x760 [ 1504.288969] ? kasan_kmalloc+0xc4/0xe0 [ 1504.292869] ? mempool_alloc_slab+0x44/0x60 [ 1504.297219] ? mempool_free+0x370/0x370 [ 1504.301209] ? mempool_free+0x370/0x370 [ 1504.305188] mempool_alloc_slab+0x44/0x60 [ 1504.310055] mempool_init_node+0x2d5/0x560 [ 1504.314303] ? mempool_free+0x370/0x370 [ 1504.318282] ? mempool_alloc_slab+0x60/0x60 [ 1504.322606] mempool_init+0x3d/0x50 [ 1504.326244] bioset_init+0x3d3/0x830 [ 1504.329964] ? bioset_exit+0x370/0x370 [ 1504.333855] ? loop_info64_from_compat+0x940/0x940 [ 1504.338799] ? blk_mq_alloc_rqs+0x679/0x9c0 [ 1504.343137] blk_alloc_queue_node+0x28f/0xf50 [ 1504.347641] ? print_usage_bug+0xc0/0xc0 [ 1504.351715] ? blk_init_allocated_queue+0x600/0x600 [ 1504.356740] ? lockdep_init_map+0x9/0x10 [ 1504.360890] ? debug_mutex_init+0x2d/0x60 [ 1504.365044] ? __mutex_init+0x1f7/0x290 [ 1504.369029] ? mark_held_locks+0xc9/0x160 [ 1504.373185] ? retint_kernel+0x10/0x10 [ 1504.377079] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 1504.382103] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1504.386871] ? retint_kernel+0x10/0x10 [ 1504.390769] ? blk_mq_init_queue+0x11/0xb0 [ 1504.395012] blk_mq_init_queue+0x4b/0xb0 [ 1504.399077] loop_add+0x33d/0x9d0 [ 1504.402534] ? loop_lookup+0x105/0x230 [ 1504.406422] ? loop_queue_rq+0x660/0x660 [ 1504.410497] loop_control_ioctl+0x199/0x540 [ 1504.414826] ? loop_add+0x9d0/0x9d0 [ 1504.418461] ? expand_files.part.8+0x9c0/0x9c0 [ 1504.423048] ? kasan_check_write+0x14/0x20 [ 1504.427289] ? loop_add+0x9d0/0x9d0 [ 1504.430921] do_vfs_ioctl+0x1de/0x1720 [ 1504.434821] ? ioctl_preallocate+0x300/0x300 [ 1504.439232] ? __fget_light+0x2f7/0x440 [ 1504.443207] ? __schedule+0x1ed0/0x1ed0 [ 1504.447273] ? fget_raw+0x20/0x20 [ 1504.450732] ? __sb_end_write+0xac/0xe0 [ 1504.454716] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1504.460258] ? exit_to_usermode_loop+0x8c/0x370 [ 1504.464938] ? security_file_ioctl+0x94/0xc0 [ 1504.469351] ksys_ioctl+0xa9/0xd0 [ 1504.472812] __x64_sys_ioctl+0x73/0xb0 [ 1504.476706] do_syscall_64+0x1b9/0x820 [ 1504.480598] ? syscall_slow_exit_work+0x500/0x500 [ 1504.485533] ? syscall_return_slowpath+0x5e0/0x5e0 [ 1504.490473] ? syscall_return_slowpath+0x31d/0x5e0 [ 1504.495415] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe [ 1504.500796] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1504.505649] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1504.510842] RIP: 0033:0x455a79 [ 1504.514026] Code: 1d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1504.533401] RSP: 002b:00007f420d477c68 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 03:54:26 executing program 6: r0 = socket(0x11, 0xf, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000640)={0x0, 0x0, 0x0}, &(0x7f0000000680)=0xc) syz_mount_image$hfsplus(&(0x7f0000000240)='hfsplus\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, &(0x7f00000005c0), 0x0, &(0x7f00000006c0)={[{@gid={'gid', 0x3d, r1}, 0x2c}]}) 03:54:26 executing program 0 (fault-call:10 fault-nth:14): r0 = syz_open_dev$vcsa(&(0x7f0000000100)='/dev/vcsa#\x00', 0x5, 0x101000) ioctl$BLKDISCARD(r0, 0x1277, &(0x7f0000000180)=0x5f) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140)='/dev/snapshot\x00', 0x0, 0x0) connect$nfc_llcp(r1, &(0x7f0000000300)={0x27, 0x0, 0x0, 0x6, 0x0, 0x0, "f44825e9da257dcd22512d531f545cf0bce08002f76d5e9bd3d1dcb3f649bf7ba49078f877ce09f903ed489ab0bbf0f088675b47312412edd6bd577062eb34", 0x1c}, 0x60) fcntl$addseals(0xffffffffffffffff, 0x409, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EVIOCGLED(r1, 0x80404519, &(0x7f0000000580)=""/236) ioctl$FS_IOC_SETFSLABEL(r2, 0x41009432, &(0x7f0000000480)="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") r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x3c, 0x0) ioctl$EVIOCGKEYCODE_V2(0xffffffffffffffff, 0x80284504, &(0x7f00000003c0)=""/188) ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x0) [ 1504.541146] RAX: ffffffffffffffda RBX: 00007f420d4786d4 RCX: 0000000000455a79 [ 1504.548426] RDX: 0000000000000000 RSI: 0000000000004c80 RDI: 0000000000000016 [ 1504.555704] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 1504.562999] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000017 [ 1504.570271] R13: 00000000004bdfb1 R14: 00000000004ccab0 R15: 000000000000000d 03:54:26 executing program 1: r0 = socket(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x76}, 0xc, &(0x7f0000000900)={&(0x7f0000000040)={0x14, 0x1e, 0x201}, 0x14}, 0x1}, 0x0) [ 1504.766414] hfsplus: unable to find HFS+ superblock [ 1504.848291] hfsplus: unable to find HFS+ superblock [ 1504.859763] FAULT_INJECTION: forcing a failure. [ 1504.859763] name failslab, interval 1, probability 0, space 0, times 0 [ 1504.872795] CPU: 1 PID: 6250 Comm: syz-executor0 Not tainted 4.18.0-rc4+ #144 [ 1504.880088] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1504.889443] Call Trace: [ 1504.892046] dump_stack+0x1c9/0x2b4 [ 1504.895686] ? dump_stack_print_info.cold.2+0x52/0x52 [ 1504.900891] ? __save_stack_trace+0x8d/0xf0 [ 1504.905236] should_fail.cold.4+0xa/0x1a [ 1504.909315] ? mark_held_locks+0xc9/0x160 [ 1504.913476] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 1504.918594] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 1504.923619] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1504.928381] ? graph_lock+0x170/0x170 [ 1504.932195] ? find_held_lock+0x36/0x1c0 [ 1504.936278] ? __lock_is_held+0xb5/0x140 [ 1504.940359] ? check_same_owner+0x340/0x340 [ 1504.944689] ? rcu_note_context_switch+0x730/0x730 [ 1504.949626] ? __lock_is_held+0xb5/0x140 [ 1504.953694] __should_failslab+0x124/0x180 [ 1504.957937] should_failslab+0x9/0x14 [ 1504.961755] kmem_cache_alloc_node_trace+0x26f/0x770 [ 1504.966920] ? lockdep_init_map+0x9/0x10 [ 1504.970997] ? __init_waitqueue_head+0x9e/0x150 [ 1504.975673] ? init_wait_entry+0x1c0/0x1c0 [ 1504.979921] __kmalloc_node+0x33/0x70 [ 1504.983736] ? mempool_alloc_slab+0x60/0x60 [ 1504.988068] mempool_init_node+0x12e/0x560 [ 1504.992323] ? mempool_free+0x370/0x370 [ 1504.996305] ? mempool_alloc_slab+0x60/0x60 [ 1505.000637] mempool_init+0x3d/0x50 [ 1505.004274] bioset_init+0x63b/0x830 [ 1505.008000] ? bioset_exit+0x370/0x370 [ 1505.011927] ? loop_info64_from_compat+0x940/0x940 [ 1505.016879] blk_alloc_queue_node+0x28f/0xf50 [ 1505.021379] ? blk_mq_alloc_rqs+0x7bc/0x9c0 [ 1505.025711] ? blk_init_allocated_queue+0x600/0x600 [ 1505.030733] ? lockdep_init_map+0x9/0x10 [ 1505.034806] ? debug_mutex_init+0x2d/0x60 [ 1505.038961] ? __mutex_init+0x1f7/0x290 [ 1505.042945] ? __ia32_sys_membarrier+0x150/0x150 [ 1505.047725] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1505.053272] ? __blk_mq_alloc_rq_map+0x17d/0x2e0 [ 1505.058038] ? blk_mq_alloc_tag_set+0x50e/0xad0 [ 1505.062716] ? blk_mq_update_nr_hw_queues+0x510/0x510 [ 1505.067925] blk_mq_init_queue+0x4b/0xb0 [ 1505.071991] loop_add+0x33d/0x9d0 [ 1505.075447] ? loop_lookup+0x105/0x230 [ 1505.079338] ? loop_queue_rq+0x660/0x660 [ 1505.083407] loop_control_ioctl+0x199/0x540 [ 1505.087733] ? loop_add+0x9d0/0x9d0 [ 1505.091367] ? expand_files.part.8+0x9c0/0x9c0 [ 1505.095963] ? kasan_check_write+0x14/0x20 [ 1505.100209] ? __mutex_unlock_slowpath+0x197/0x8c0 [ 1505.105160] ? loop_add+0x9d0/0x9d0 [ 1505.108795] do_vfs_ioctl+0x1de/0x1720 [ 1505.112690] ? __lock_is_held+0xb5/0x140 [ 1505.116764] ? ioctl_preallocate+0x300/0x300 [ 1505.121176] ? __fget_light+0x2f7/0x440 [ 1505.125155] ? fget_raw+0x20/0x20 [ 1505.128613] ? retint_kernel+0x10/0x10 [ 1505.132506] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 1505.137614] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1505.143013] ? security_file_ioctl+0x94/0xc0 [ 1505.147432] ksys_ioctl+0xa9/0xd0 [ 1505.150890] __x64_sys_ioctl+0x73/0xb0 [ 1505.154783] ? do_syscall_64+0xca/0x820 [ 1505.158760] do_syscall_64+0x1b9/0x820 [ 1505.162650] ? syscall_slow_exit_work+0x500/0x500 [ 1505.167583] ? syscall_return_slowpath+0x5e0/0x5e0 [ 1505.172516] ? syscall_return_slowpath+0x31d/0x5e0 [ 1505.177457] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe [ 1505.182831] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1505.187684] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1505.192875] RIP: 0033:0x455a79 [ 1505.196057] Code: 1d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1505.215444] RSP: 002b:00007f420d477c68 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1505.223164] RAX: ffffffffffffffda RBX: 00007f420d4786d4 RCX: 0000000000455a79 [ 1505.230437] RDX: 0000000000000000 RSI: 0000000000004c80 RDI: 0000000000000016 [ 1505.237708] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 1505.244979] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000017 [ 1505.252247] R13: 00000000004bdfb1 R14: 00000000004ccab0 R15: 000000000000000e 03:54:27 executing program 2: r0 = syz_open_dev$sndseq(&(0x7f0000dcc000)='/dev/snd/seq\x00', 0x0, 0x2) read(r0, &(0x7f0000fb6000)=""/28, 0x3f0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000418f50)={{0x80}, "0a4ceaa05d9a00000000000000039b3fd4cec307e8ef3d13eb790ec9c65abaf90d229db692542e5b78f8b29e0a27800f0000000000000009fb42f376589701a4", 0xa9824f69d1376637, 0x8000010800a}) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000240)={0xbf}) write$binfmt_script(r0, &(0x7f0000000000)=ANY=[], 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f00000002c0)={{}, 'port0\x00'}) openat$sequencer2(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer2\x00', 0x0, 0x0) 03:54:27 executing program 7: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f000000d000)={0xa, 0x4e20}, 0x1c) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}, 0xb}, 0x1c) syz_emit_ethernet(0x3e, &(0x7f00000001c0)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @random="e829f650db0f", [], {@ipv6={0x86dd, {0x0, 0x6, "50a09c", 0x8, 0xffffff11, 0x0, @remote={0xfe, 0x80, [], 0xbb}, @local={0xfe, 0x80, [], 0xaa}, {[], @udp={0x0, 0x4e20, 0x8}}}}}}, &(0x7f0000000040)) syz_emit_ethernet(0x3e, &(0x7f0000000000)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], {@ipv6={0x86dd, {0x0, 0x6, "50a09c", 0x8, 0xffffff11, 0x0, @remote={0xfe, 0x80, [], 0xbb}, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe80], 0xaa}, {[], @udp={0x300, 0x4e20, 0x8}}}}}}, &(0x7f0000000040)) 03:54:27 executing program 5: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer2\x00', 0x0, 0x0) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000040)="025cc83d6d345f8f762070") ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r0, 0x40085112, &(0x7f0000b18000)={{0xffffff93}, {0xffffffa0}, 0x0, 0x0, 0x0, [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd]}) 03:54:27 executing program 4: r0 = socket(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0xd5}, 0xc, &(0x7f0000000900)={&(0x7f0000000040)={0x14, 0x1e, 0x201}, 0x14}, 0x1}, 0x0) 03:54:27 executing program 3: ioctl$BLKDISCARD(0xffffffffffffffff, 0x1277, &(0x7f0000000180)) r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140)='/dev/snapshot\x00', 0x0, 0x0) fcntl$addseals(0xffffffffffffffff, 0x409, 0x0) ioctl$KVM_INTERRUPT(r0, 0x4004ae86, &(0x7f0000000040)=0x23f9) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f0000000000), &(0x7f00000000c0)=0x8) ioctl$EVIOCGLED(0xffffffffffffffff, 0x80404519, &(0x7f0000000580)=""/236) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x3c, 0x0) ioctl$EVIOCGKEYCODE_V2(0xffffffffffffffff, 0x80284504, &(0x7f00000003c0)=""/188) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c82, 0x0) 03:54:27 executing program 1: r0 = socket(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x39000000}, 0xc, &(0x7f0000000900)={&(0x7f0000000040)={0x14, 0x1e, 0x201}, 0x14}, 0x1}, 0x0) 03:54:27 executing program 6: r0 = socket(0x11, 0xa, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000640)={0x0, 0x0, 0x0}, &(0x7f0000000140)=0xc) r2 = syz_open_dev$mouse(&(0x7f00000000c0)='/dev/input/mouse#\x00', 0x4, 0x40002) ioctl$KVM_GET_CLOCK(r2, 0x8030ae7c, &(0x7f0000000100)) getsockopt$inet_sctp6_SCTP_NODELAY(r0, 0x84, 0x3, &(0x7f0000000000), &(0x7f0000000040)=0x4) syz_mount_image$hfsplus(&(0x7f0000000240)='hfsplus\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, &(0x7f00000005c0), 0x0, &(0x7f00000006c0)={[{@gid={'gid', 0x3d, r1}, 0x2c}]}) syz_extract_tcp_res$synack(&(0x7f0000000080), 0x1, 0x0) 03:54:27 executing program 0 (fault-call:10 fault-nth:15): r0 = syz_open_dev$vcsa(&(0x7f0000000100)='/dev/vcsa#\x00', 0x5, 0x101000) ioctl$BLKDISCARD(r0, 0x1277, &(0x7f0000000180)=0x5f) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140)='/dev/snapshot\x00', 0x0, 0x0) connect$nfc_llcp(r1, &(0x7f0000000300)={0x27, 0x0, 0x0, 0x6, 0x0, 0x0, "f44825e9da257dcd22512d531f545cf0bce08002f76d5e9bd3d1dcb3f649bf7ba49078f877ce09f903ed489ab0bbf0f088675b47312412edd6bd577062eb34", 0x1c}, 0x60) fcntl$addseals(0xffffffffffffffff, 0x409, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EVIOCGLED(r1, 0x80404519, &(0x7f0000000580)=""/236) ioctl$FS_IOC_SETFSLABEL(r2, 0x41009432, &(0x7f0000000480)="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") r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x3c, 0x0) ioctl$EVIOCGKEYCODE_V2(0xffffffffffffffff, 0x80284504, &(0x7f00000003c0)=""/188) ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x0) 03:54:27 executing program 7: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f000000d000)={0xa, 0x4e20}, 0x1c) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}, 0xb}, 0x1c) syz_emit_ethernet(0x3e, &(0x7f00000001c0)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @random="e829f650db0f", [], {@ipv6={0x86dd, {0x0, 0x6, "50a09c", 0x8, 0xffffff11, 0x0, @remote={0xfe, 0x80, [], 0xbb}, @local={0xfe, 0x80, [], 0xaa}, {[], @udp={0x0, 0x4e20, 0x8}}}}}}, &(0x7f0000000040)) syz_emit_ethernet(0x3e, &(0x7f0000000000)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], {@ipv6={0x86dd, {0x0, 0x6, "50a09c", 0x8, 0xffffff11, 0x0, @remote={0xfe, 0x80, [], 0xbb}, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800000000000000], 0xaa}, {[], @udp={0x300, 0x4e20, 0x8}}}}}}, &(0x7f0000000040)) 03:54:27 executing program 1: r0 = socket(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x17000000}, 0xc, &(0x7f0000000900)={&(0x7f0000000040)={0x14, 0x1e, 0x201}, 0x14}, 0x1}, 0x0) 03:54:27 executing program 4: r0 = socket(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x13}, 0xc, &(0x7f0000000900)={&(0x7f0000000040)={0x14, 0x1e, 0x201}, 0x14}, 0x1}, 0x0) 03:54:27 executing program 3: ioctl$BLKDISCARD(0xffffffffffffffff, 0x1277, &(0x7f0000000180)) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x2000, 0x0) fcntl$addseals(0xffffffffffffffff, 0x409, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f0000000000), &(0x7f00000000c0)=0x8) ioctl$EVIOCGLED(0xffffffffffffffff, 0x80404519, &(0x7f0000000580)=""/236) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x3c, 0x0) ioctl$EVIOCGKEYCODE_V2(0xffffffffffffffff, 0x80284504, &(0x7f00000003c0)=""/188) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c82, 0x0) [ 1505.730689] hfsplus: gid requires an argument [ 1505.735345] hfsplus: unable to parse mount options 03:54:27 executing program 5: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer2\x00', 0x0, 0x0) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000040)="025cc83d6d345f8f762070") ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r0, 0x40085112, &(0x7f0000b18000)={{0xffffff93}, {0xffffffa0}, 0x0, 0x0, 0x0, [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000000000]}) [ 1505.795872] FAULT_INJECTION: forcing a failure. [ 1505.795872] name failslab, interval 1, probability 0, space 0, times 0 [ 1505.808755] CPU: 0 PID: 6272 Comm: syz-executor0 Not tainted 4.18.0-rc4+ #144 [ 1505.816061] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1505.825418] Call Trace: [ 1505.828017] dump_stack+0x1c9/0x2b4 [ 1505.831660] ? dump_stack_print_info.cold.2+0x52/0x52 [ 1505.836867] ? finish_task_switch+0x1d3/0x870 [ 1505.841380] ? finish_task_switch+0x18a/0x870 [ 1505.845893] should_fail.cold.4+0xa/0x1a [ 1505.849964] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 1505.855078] ? __schedule+0x884/0x1ed0 [ 1505.858973] ? save_stack+0xa9/0xd0 [ 1505.862615] ? __sched_text_start+0x8/0x8 [ 1505.866788] ? find_held_lock+0x36/0x1c0 [ 1505.870860] ? __lock_is_held+0xb5/0x140 [ 1505.874942] ? check_same_owner+0x340/0x340 [ 1505.879277] __should_failslab+0x124/0x180 [ 1505.883520] should_failslab+0x9/0x14 [ 1505.887325] kmem_cache_alloc+0x2af/0x760 [ 1505.891500] ? kasan_unpoison_shadow+0x35/0x50 [ 1505.896093] ? kasan_kmalloc+0xc4/0xe0 [ 1505.899991] ? mempool_free+0x370/0x370 [ 1505.903998] mempool_alloc_slab+0x44/0x60 [ 1505.908191] mempool_init_node+0x2d5/0x560 [ 1505.912442] ? mempool_free+0x370/0x370 [ 1505.916429] ? mempool_alloc_slab+0x60/0x60 [ 1505.920764] mempool_init+0x3d/0x50 [ 1505.924399] bioset_init+0x63b/0x830 [ 1505.928124] ? bioset_exit+0x370/0x370 [ 1505.932015] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1505.936783] blk_alloc_queue_node+0x28f/0xf50 [ 1505.941293] ? blk_init_allocated_queue+0x600/0x600 [ 1505.946322] ? lockdep_init_map+0x9/0x10 [ 1505.950392] ? debug_mutex_init+0x2d/0x60 [ 1505.954553] ? __mutex_init+0x1f7/0x290 [ 1505.958540] ? __ia32_sys_membarrier+0x150/0x150 [ 1505.963308] ? mark_held_locks+0xc9/0x160 [ 1505.967467] ? retint_kernel+0x10/0x10 [ 1505.971362] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 1505.976392] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1505.981160] ? retint_kernel+0x10/0x10 [ 1505.985112] blk_mq_init_queue+0x4b/0xb0 [ 1505.989528] loop_add+0x33d/0x9d0 [ 1505.992983] ? loop_lookup+0x105/0x230 [ 1505.996874] ? loop_queue_rq+0x660/0x660 [ 1506.000950] loop_control_ioctl+0x199/0x540 [ 1506.005277] ? loop_add+0x9d0/0x9d0 [ 1506.008911] ? expand_files.part.8+0x9c0/0x9c0 [ 1506.013508] ? kasan_check_write+0x14/0x20 [ 1506.017756] ? __mutex_unlock_slowpath+0x197/0x8c0 [ 1506.022699] ? loop_add+0x9d0/0x9d0 [ 1506.026333] do_vfs_ioctl+0x1de/0x1720 [ 1506.030231] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1506.034998] ? ioctl_preallocate+0x300/0x300 [ 1506.039410] ? __fget_light+0x2f7/0x440 [ 1506.043389] ? fget_raw+0x20/0x20 [ 1506.046848] ? ksys_write+0x1fc/0x260 [ 1506.050676] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1506.056217] ? fput+0x130/0x1a0 [ 1506.059505] ? ksys_write+0x1ae/0x260 [ 1506.063312] ? security_file_ioctl+0x94/0xc0 [ 1506.067728] ksys_ioctl+0xa9/0xd0 [ 1506.071195] __x64_sys_ioctl+0x73/0xb0 [ 1506.075093] do_syscall_64+0x1b9/0x820 [ 1506.078985] ? finish_task_switch+0x1d3/0x870 [ 1506.083512] ? syscall_return_slowpath+0x5e0/0x5e0 [ 1506.088447] ? syscall_return_slowpath+0x31d/0x5e0 [ 1506.093478] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe [ 1506.098854] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1506.103727] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1506.108937] RIP: 0033:0x455a79 [ 1506.112118] Code: 1d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1506.131872] RSP: 002b:00007f420d477c68 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1506.139604] RAX: ffffffffffffffda RBX: 00007f420d4786d4 RCX: 0000000000455a79 03:54:27 executing program 0 (fault-call:10 fault-nth:16): r0 = syz_open_dev$vcsa(&(0x7f0000000100)='/dev/vcsa#\x00', 0x5, 0x101000) ioctl$BLKDISCARD(r0, 0x1277, &(0x7f0000000180)=0x5f) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140)='/dev/snapshot\x00', 0x0, 0x0) connect$nfc_llcp(r1, &(0x7f0000000300)={0x27, 0x0, 0x0, 0x6, 0x0, 0x0, "f44825e9da257dcd22512d531f545cf0bce08002f76d5e9bd3d1dcb3f649bf7ba49078f877ce09f903ed489ab0bbf0f088675b47312412edd6bd577062eb34", 0x1c}, 0x60) fcntl$addseals(0xffffffffffffffff, 0x409, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EVIOCGLED(r1, 0x80404519, &(0x7f0000000580)=""/236) ioctl$FS_IOC_SETFSLABEL(r2, 0x41009432, &(0x7f0000000480)="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") r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x3c, 0x0) ioctl$EVIOCGKEYCODE_V2(0xffffffffffffffff, 0x80284504, &(0x7f00000003c0)=""/188) ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x0) [ 1506.146881] RDX: 0000000000000000 RSI: 0000000000004c80 RDI: 0000000000000015 [ 1506.154180] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 1506.161454] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000016 [ 1506.168727] R13: 00000000004bdfb1 R14: 00000000004ccab0 R15: 000000000000000f [ 1506.179638] hfsplus: gid requires an argument [ 1506.184245] hfsplus: unable to parse mount options 03:54:27 executing program 6: r0 = socket(0x11, 0x400e, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000640)={0x0, 0x0, 0x0}, &(0x7f0000000680)=0xc) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000000)={'vcan0\x00', {0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x17}}}) r2 = socket$inet_sctp(0x2, 0x800000000000001, 0x84) setsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(r2, 0x84, 0x9, &(0x7f00000000c0), 0x8) syz_mount_image$hfsplus(&(0x7f0000000240)='hfsplus\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000000100)="3ff128917e0dc304f6ec35718c03024135a8fa63d894cf446012a30d8872753e59ac1450c431de376f82bf948c5191b85ac98d317216db08c343c16cb55a6debd455ab3c61b3497d792be1b1dd98ec7d6b1db3445bd8bc5d94d8f4a0332fd918f08f5588c3ac95946050e08d59555ac6a7476f8959e158f6ebafa701d95f133eb86780f5e27bccaa847f", 0x8a, 0x2}, {&(0x7f0000000300)="1d2a03c3022bb88bd7668f403556c02e896f9dbe812301872fd09abbfb4ddd4bc5f56c8d47e650a007f4e7ecad894f21877baa649a82ec0adec00456d4d3c321d2b6bc9f6fbe4cc9a7774106f8ed67819dfcf56888ab54757608d8789873f4d0337a8417b41d8cacfa860faf3d51efe0ef5f985808ed7515cd277c73c1deaca701b2a548537500f0b1c4b5a32a2b045eaa7f51075e1d14f0", 0x98, 0x10001}], 0x1, &(0x7f00000006c0)={[{@gid={'gid', 0x3d, r1}, 0x2c}]}) 03:54:27 executing program 1: r0 = socket(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0xc500000000000000}, 0xc, &(0x7f0000000900)={&(0x7f0000000040)={0x14, 0x1e, 0x201}, 0x14}, 0x1}, 0x0) [ 1506.546685] hfsplus: unable to find HFS+ superblock [ 1506.564510] FAULT_INJECTION: forcing a failure. [ 1506.564510] name failslab, interval 1, probability 0, space 0, times 0 [ 1506.575992] CPU: 1 PID: 6297 Comm: syz-executor0 Not tainted 4.18.0-rc4+ #144 [ 1506.583277] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1506.592646] Call Trace: [ 1506.595261] dump_stack+0x1c9/0x2b4 [ 1506.598932] ? dump_stack_print_info.cold.2+0x52/0x52 [ 1506.604162] ? should_fail+0xdf/0xbed [ 1506.608418] should_fail.cold.4+0xa/0x1a [ 1506.612677] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 1506.617794] ? kasan_kmalloc+0xc4/0xe0 [ 1506.621927] ? kasan_slab_alloc+0x12/0x20 [ 1506.626104] ? kmem_cache_alloc+0x12e/0x760 [ 1506.630441] ? mempool_alloc_slab+0x44/0x60 [ 1506.634770] ? mempool_init_node+0x2d5/0x560 [ 1506.639191] ? mempool_init+0x3d/0x50 [ 1506.642997] ? bioset_init+0x63b/0x830 [ 1506.647135] ? graph_lock+0x170/0x170 [ 1506.650944] ? do_vfs_ioctl+0x1de/0x1720 [ 1506.655021] ? ksys_ioctl+0xa9/0xd0 [ 1506.658663] ? __x64_sys_ioctl+0x73/0xb0 [ 1506.662734] ? do_syscall_64+0x1b9/0x820 [ 1506.666812] ? find_held_lock+0x36/0x1c0 [ 1506.670888] ? __lock_is_held+0xb5/0x140 [ 1506.674985] ? check_same_owner+0x340/0x340 [ 1506.679325] ? retint_kernel+0x10/0x10 [ 1506.683226] ? rcu_note_context_switch+0x730/0x730 [ 1506.688180] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 1506.693217] __should_failslab+0x124/0x180 [ 1506.697476] should_failslab+0x9/0x14 [ 1506.701293] kmem_cache_alloc+0x2af/0x760 [ 1506.705455] ? mempool_free+0x370/0x370 [ 1506.709442] ? mempool_free+0x370/0x370 [ 1506.713425] mempool_alloc_slab+0x44/0x60 [ 1506.717601] mempool_init_node+0x2d5/0x560 [ 1506.721858] ? mempool_free+0x370/0x370 [ 1506.725846] ? mempool_alloc_slab+0x60/0x60 [ 1506.730193] mempool_init+0x3d/0x50 [ 1506.733834] bioset_init+0x63b/0x830 [ 1506.737559] ? bioset_exit+0x370/0x370 [ 1506.741475] ? loop_info64_from_compat+0x940/0x940 [ 1506.746432] blk_alloc_queue_node+0x28f/0xf50 [ 1506.750938] ? blk_mq_alloc_rqs+0x7bc/0x9c0 [ 1506.755284] ? blk_init_allocated_queue+0x600/0x600 [ 1506.760312] ? lockdep_init_map+0x9/0x10 [ 1506.764375] ? debug_mutex_init+0x2d/0x60 [ 1506.768529] ? __mutex_init+0x1f7/0x290 [ 1506.772510] ? __ia32_sys_membarrier+0x150/0x150 [ 1506.777288] ? mark_held_locks+0xc9/0x160 [ 1506.781443] ? retint_kernel+0x10/0x10 [ 1506.785337] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 1506.790357] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1506.795124] ? retint_kernel+0x10/0x10 [ 1506.799024] blk_mq_init_queue+0x4b/0xb0 [ 1506.803099] loop_add+0x33d/0x9d0 [ 1506.806561] ? loop_lookup+0x105/0x230 [ 1506.810452] ? loop_queue_rq+0x660/0x660 [ 1506.814528] loop_control_ioctl+0x199/0x540 [ 1506.818861] ? loop_add+0x9d0/0x9d0 [ 1506.822510] ? expand_files.part.8+0x9c0/0x9c0 [ 1506.827119] ? __mutex_unlock_slowpath+0x197/0x8c0 [ 1506.832066] ? loop_add+0x9d0/0x9d0 [ 1506.835707] do_vfs_ioctl+0x1de/0x1720 [ 1506.839611] ? __lock_is_held+0xb5/0x140 [ 1506.843677] ? ioctl_preallocate+0x300/0x300 [ 1506.848094] ? __fget_light+0x2f7/0x440 [ 1506.852078] ? fget_raw+0x20/0x20 [ 1506.855547] ? __sb_end_write+0xac/0xe0 [ 1506.859543] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1506.865094] ? fput+0x130/0x1a0 [ 1506.868467] ? ksys_write+0x1ae/0x260 [ 1506.872276] ? security_file_ioctl+0x94/0xc0 [ 1506.876695] ksys_ioctl+0xa9/0xd0 [ 1506.880158] __x64_sys_ioctl+0x73/0xb0 [ 1506.884055] do_syscall_64+0x1b9/0x820 [ 1506.887949] ? finish_task_switch+0x1d3/0x870 [ 1506.892449] ? syscall_return_slowpath+0x5e0/0x5e0 [ 1506.897382] ? syscall_return_slowpath+0x31d/0x5e0 [ 1506.902322] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1506.907863] ? retint_user+0x18/0x18 [ 1506.911584] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1506.916437] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1506.921630] RIP: 0033:0x455a79 [ 1506.924812] Code: 1d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1506.944192] RSP: 002b:00007f420d477c68 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1506.951905] RAX: ffffffffffffffda RBX: 00007f420d4786d4 RCX: 0000000000455a79 [ 1506.959175] RDX: 0000000000000000 RSI: 0000000000004c80 RDI: 0000000000000016 [ 1506.966455] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 1506.973729] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000017 [ 1506.980999] R13: 00000000004bdfb1 R14: 00000000004ccab0 R15: 0000000000000010 03:54:28 executing program 7: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f000000d000)={0xa, 0x4e20}, 0x1c) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}, 0xb}, 0x1c) syz_emit_ethernet(0x3e, &(0x7f00000001c0)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @random="e829f650db0f", [], {@ipv6={0x86dd, {0x0, 0x6, "50a09c", 0x8, 0xffffff11, 0x0, @remote={0xfe, 0x80, [], 0xbb}, @local={0xfe, 0x80, [], 0xaa}, {[], @udp={0x0, 0x4e20, 0x8}}}}}}, &(0x7f0000000040)) syz_emit_ethernet(0x3e, &(0x7f0000000000)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], {@ipv6={0x86dd, {0x0, 0x6, "50a09c", 0x8, 0xffffff11, 0x0, @remote={0xfe, 0x80, [], 0xbb}, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x88caffff00000000], 0xaa}, {[], @udp={0x300, 0x4e20, 0x8}}}}}}, &(0x7f0000000040)) 03:54:28 executing program 4: r0 = socket(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4b01000000000000}, 0xc, &(0x7f0000000900)={&(0x7f0000000040)={0x14, 0x1e, 0x201}, 0x14}, 0x1}, 0x0) 03:54:28 executing program 3: ioctl$BLKDISCARD(0xffffffffffffffff, 0x1277, &(0x7f0000000180)) r0 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='/dev/snapshot\x00', 0xffffffffffffff9c}, 0x10) name_to_handle_at(r0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000680)=ANY=[@ANYBLOB="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"], &(0x7f0000000300), 0x1400) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140)='/dev/snapshot\x00', 0x0, 0x0) fcntl$addseals(0xffffffffffffffff, 0x409, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f0000000000), &(0x7f00000000c0)=0x8) ioctl$EVIOCGLED(0xffffffffffffffff, 0x80404519, &(0x7f0000000580)=""/236) fcntl$addseals(r0, 0x409, 0x9) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x3c, 0x0) syz_mount_image$xfs(&(0x7f00000001c0)='xfs\x00', &(0x7f0000000200)='./file0\x00', 0x9b, 0x8, &(0x7f0000000bc0)=[{&(0x7f0000000240)="7985c78c49648448c40af7d85629d9621f45bc0e41f8cce27ac7ed200152d8b5ba253ed5bc5196ecf5bd167b9c2d7d00fef1f561c72cc28db68cf7a08a56fc0778b91b7e7024ff9696", 0x49, 0x7}, {&(0x7f0000000340)="2878277a9b8d8b1903b0c00899b01876a4a9a191eff8206bd2684e374e0e73fac74609bde087ced8d0b1eecdc3d16d2fe4f78247", 0x34, 0x658d}, {&(0x7f0000000380)="1cedbcf9173c7aa5edd7c2c770b49233f89dabac30eccdf386c84d0c9525fce2997ae545bdf056b3a245c6744220c1902ea9f416884cc824e3bf", 0x3a, 0xf}, {&(0x7f0000000480)="018613c71dea6074ecfd6cf3698f3877458a9ba0aabc71479ec0ae12479a8909e2305a64384a76a8a9c61c8bbc5c9b414d28f396942a38ad529c28b2fdd0ad64279fce7518b887097a74a405b41a0f577fc3f5a0a9ddb1fd4a4db0cf4c56a6d2a372e3bde11930158c7501440b973e5a775f1299433236283a5d842c20fa1052cad169f1777229c735ee5517f5c50aced866a612", 0x94}, {&(0x7f0000000800)="0922231192b3642baefa2cec8ad434bdb51577480315c8ff4beb4eb1f7c66af426ac14f257d1fb6d2e1dbe9e89b9715611d717e0d5de83358f65d0cf165dd147a50c09e32a54ce4148cdd1f09953bddb4120471df8b749dbe511597d32986ec76e42a3b2fc0f077aa7466caded8496eb18aca30bedd3aed41866c814cd4d0189b4ac132c86271cbf4662a6a571862ad9b84294a51470a488a321088f7ed7dc94f124199b286c0e28567777eea8cd351f93ffebd52d7cbd2662aa68855280deb3abbafe79a514f8f512bd45664ce597f6852859b17bc49564ccd73a57c7c37d6aa0ce39d7541111df04a9d0703bd66fa11505b10a", 0xf4, 0x6}, {&(0x7f0000000900)="3adbf7718b40e52e6e1f9f6cee1d22b553737b975df0e2292375e9486d8a6a84b67d8277caf1d431b2a5c60413baf4adb37a74857df6ebc6366bef5f49b488ad8ee39d1f4fd59dce13fe15fd56aab02af25ce9190e914f3fbc225acefe6fd238c6f15b6bbb0c138f2fba17c0fe5398c5992856034a5d95311410e2e1078ac2e96f641785fa37e338e7c0f9a9cdc510930cb6eb9014713d47df0bca31d44cac13552d6ebe92c0feb4252d20f9b56178f9d5abd4444b1fb4b3b548441c8396741e9b5baeef1d0c0836ce506a2f03d0ee8095c9fa3e7d4ba6154a37f1eb9e9395bd79b7adeaa64608ccc3e3ba5ef5f0c80421b0ff718a99", 0xf6, 0x7}, {&(0x7f0000000a00)="39047599d3091e8d72985312d65f6f18f999c5b1aec1e471e5304599487d761f30e3bdcc920570c5e50ec02f80ca488dba51474b9ee6920feccb36dfc8f1003d63255437dfe9a3aee301230cc047bdba30b3a6ff1fb7aad30da4ed93941dcded64fdbc2bd9a83f120e17b372504fd5befaad6afe2451c68f2870218ad833cfe0bf493ee67791efc0f77009a9246ce2dd4e36a88187f91d89dc0b0ffb19bd9e7cdf", 0xa1, 0x7fffffff}, {&(0x7f0000000ac0)="b97e472a096098721d1a7d03ee802c9ad4e146d11de569d49a73d2770843430cb9625765b1584c972adde1cc88df44db35b9ac42bb2318031b37b7946316fbc732f7b942d05f0daae5f53b63ea3ed7c35e899c72d7545ee79811d194a087dc067bbe0ff8534127ca907ced877bd653ad05973fe804dc2c3f5c442e360042c22591eb4413ed926e1443a00332deeb08bb6a361ae0fc8edef1872882a266aa0f7a8c996fb61d02111d68ce24a81abf124ff807d516b1a1890ac9a9e0db16293513f3d25bb2348abb0b87b3109f54409d03f141d7e83a9843", 0xd7, 0x4}], 0x140400, &(0x7f0000000540)={[{@dax='dax', 0x2c}, {@uquota='uquota', 0x2c}, {@largeio='largeio', 0x2c}, {@lazytime='lazytime', 0x2c}, {@inode64='inode64', 0x2c}, {@usrquota='usrquota', 0x2c}, {@noalign='noalign', 0x2c}]}) ioctl$EVIOCGKEYCODE_V2(0xffffffffffffffff, 0x80284504, &(0x7f00000003c0)=""/188) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c82, 0x0) 03:54:28 executing program 5: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer2\x00', 0x0, 0x0) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000040)="025cc83d6d345f8f762070") ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r0, 0x40085112, &(0x7f0000b18000)={{0xffffff93}, {0xffffffa0}, 0x0, 0x0, 0x0, [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000]}) 03:54:28 executing program 2: r0 = syz_open_dev$sndseq(&(0x7f0000dcc000)='/dev/snd/seq\x00', 0x0, 0x2) read(r0, &(0x7f0000fb6000)=""/28, 0x3f0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000418f50)={{0x80}, "0a4ceaa05d9a00000000000000039b3fd4cec307e8ef3d13eb790ec9c65abaf90d229db692542e5b78f8b29e0a27800f0000000000000009fb42f376589701a4", 0xa9824f69d1376637, 0x10800a}) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000240)={0xbf}) write$binfmt_script(r0, &(0x7f0000000000)=ANY=[], 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x400, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f00000002c0)={{}, 'port0\x00'}) openat$sequencer2(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer2\x00', 0x0, 0x0) 03:54:28 executing program 6: r0 = socket(0x11, 0xa, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000640)={0x0}, &(0x7f0000000680)=0xc) syz_mount_image$hfsplus(&(0x7f0000000240)='hfsplus\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x5, &(0x7f0000000300)=[{&(0x7f0000000000)="8a10769746dc36393d1ac360fcba58d8bfdf9440ee1178a0a0e9b243d47d", 0x1e}, {&(0x7f0000000700)="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", 0x1000, 0x4}, {&(0x7f0000000040)="89d3540af33795c303acc5a6fe1e66271a0cbd4147b505be6791275512386527866e923bf68169da254f20a1c85d349357b6e4e4150833d23af88a488f3087403b8dfdd20ea6ec7d452b01ebc42f0152f96de5c80892ab9973edb4fbdd8988e121ca49e100b6c36661376092a2f68cdc5c851ef6db7960a41825b2d22311f5e16d665c20b33f5bf689e104c40ccc0976d23bdc801caf1c340f7424d94b727ebca49ef778a8c7a6a9ae35f8cd7867737af85f3a765e3343a3d06a82aaeaee957eac0dd2daad680795863770b8aadc5fe14a57da628d85c63fa9", 0xd9, 0x10001}, {&(0x7f0000000140)="2c6ac6c2497d554c171c0f5923e36536665f2102d9612992221d178d78ad9134ad9d93001df5d82e34ca951abaa22aefc687dba09eab9030eda22ad9e6b57bb7391f8aef95a02d26e11e3ae27593fe6165c92fbc0c7128f823466b78f00b6f5be419a9b7b8326ebacde52fdb6aaf3351ec05e2079700effe66aa328bde3fa6aed252b0964d015433d486e6a5d2609efd4d50b7883113a396722276ef14", 0x9d}, {&(0x7f0000000200)="44baaa87793754d32f9f578788589be479f0cb0367a9fff288ca342717719434276dac3635b4264a77a93a8146268cf1a31822848eb3360f63ad", 0x3a, 0xffff}], 0x0, &(0x7f00000006c0)=ANY=[@ANYBLOB='nQdecompose,\x00']) waitid(0x0, r1, 0x0, 0x1, &(0x7f0000000380)) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000280)) 03:54:28 executing program 0 (fault-call:10 fault-nth:17): r0 = syz_open_dev$vcsa(&(0x7f0000000100)='/dev/vcsa#\x00', 0x5, 0x101000) ioctl$BLKDISCARD(r0, 0x1277, &(0x7f0000000180)=0x5f) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140)='/dev/snapshot\x00', 0x0, 0x0) connect$nfc_llcp(r1, &(0x7f0000000300)={0x27, 0x0, 0x0, 0x6, 0x0, 0x0, "f44825e9da257dcd22512d531f545cf0bce08002f76d5e9bd3d1dcb3f649bf7ba49078f877ce09f903ed489ab0bbf0f088675b47312412edd6bd577062eb34", 0x1c}, 0x60) fcntl$addseals(0xffffffffffffffff, 0x409, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EVIOCGLED(r1, 0x80404519, &(0x7f0000000580)=""/236) ioctl$FS_IOC_SETFSLABEL(r2, 0x41009432, &(0x7f0000000480)="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") r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x3c, 0x0) ioctl$EVIOCGKEYCODE_V2(0xffffffffffffffff, 0x80284504, &(0x7f00000003c0)=""/188) ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x0) 03:54:28 executing program 1: r0 = socket(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1b010000}, 0xc, &(0x7f0000000900)={&(0x7f0000000040)={0x14, 0x1e, 0x201}, 0x14}, 0x1}, 0x0) 03:54:28 executing program 3: r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vga_arbiter\x00', 0x600940, 0x0) ioctl$BLKDISCARD(r0, 0x1277, &(0x7f0000000040)=0x2000000000000000) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140)='/dev/snapshot\x00', 0x0, 0x0) fcntl$addseals(0xffffffffffffffff, 0x409, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f0000000000)={0x0}, &(0x7f00000000c0)=0x8) ioctl$EVIOCGLED(0xffffffffffffffff, 0x80404519, &(0x7f0000000580)=""/236) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x3c, 0x0) ioctl$EVIOCGKEYCODE_V2(0xffffffffffffffff, 0x80284504, &(0x7f00000003c0)=""/188) r3 = ioctl$LOOP_CTL_GET_FREE(r2, 0x4c82) mprotect(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x4) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, r3) mprotect(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x2000004) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r0, 0x84, 0x18, &(0x7f0000000180)={r1, 0x40}, &(0x7f00000001c0)=0x8) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c82, 0x0) setsockopt$kcm_KCM_RECV_DISABLE(r0, 0x119, 0x1, &(0x7f0000000100)=0x2, 0x4) 03:54:28 executing program 7: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f000000d000)={0xa, 0x4e20}, 0x1c) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}, 0xb}, 0x1c) syz_emit_ethernet(0x3e, &(0x7f00000001c0)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @random="e829f650db0f", [], {@ipv6={0x86dd, {0x0, 0x6, "50a09c", 0x8, 0xffffff11, 0x0, @remote={0xfe, 0x80, [], 0xbb}, @local={0xfe, 0x80, [], 0xaa}, {[], @udp={0x0, 0x4e20, 0x8}}}}}}, &(0x7f0000000040)) syz_emit_ethernet(0x3e, &(0x7f0000000000)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], {@ipv6={0x86dd, {0x0, 0x6, "50a09c", 0x8, 0xffffff11, 0x0, @remote={0xfe, 0x80, [], 0xbb}, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x88640000], 0xaa}, {[], @udp={0x300, 0x4e20, 0x8}}}}}}, &(0x7f0000000040)) 03:54:28 executing program 4: r0 = socket(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x5e01000000000000}, 0xc, &(0x7f0000000900)={&(0x7f0000000040)={0x14, 0x1e, 0x201}, 0x14}, 0x1}, 0x0) 03:54:28 executing program 5: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer2\x00', 0x0, 0x0) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000040)="025cc83d6d345f8f762070") ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r0, 0x40085112, &(0x7f0000b18000)={{0xffffff93}, {0xffffffa0}, 0x0, 0x0, 0x0, [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400000000000000]}) [ 1507.262134] hfsplus: unable to parse mount options [ 1507.309293] FAULT_INJECTION: forcing a failure. [ 1507.309293] name failslab, interval 1, probability 0, space 0, times 0 [ 1507.321245] CPU: 0 PID: 6328 Comm: syz-executor0 Not tainted 4.18.0-rc4+ #144 [ 1507.328576] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1507.337938] Call Trace: [ 1507.340546] dump_stack+0x1c9/0x2b4 [ 1507.344185] ? dump_stack_print_info.cold.2+0x52/0x52 [ 1507.349394] should_fail.cold.4+0xa/0x1a [ 1507.353469] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 1507.358610] ? __schedule+0x884/0x1ed0 [ 1507.362507] ? retint_kernel+0x10/0x10 [ 1507.366417] ? __sched_text_start+0x8/0x8 [ 1507.370581] ? __lock_is_held+0xb5/0x140 [ 1507.374659] ? check_same_owner+0x340/0x340 [ 1507.378998] __should_failslab+0x124/0x180 [ 1507.383242] should_failslab+0x9/0x14 [ 1507.387323] kmem_cache_alloc+0x2af/0x760 [ 1507.391484] ? mempool_alloc_slab+0x44/0x60 [ 1507.395825] ? mempool_free+0x370/0x370 [ 1507.399805] ? mempool_free+0x370/0x370 [ 1507.403787] mempool_alloc_slab+0x44/0x60 [ 1507.407943] mempool_init_node+0x2d5/0x560 [ 1507.412192] ? mempool_free+0x370/0x370 [ 1507.416169] ? mempool_alloc_slab+0x60/0x60 [ 1507.420495] mempool_init+0x3d/0x50 [ 1507.424135] bioset_init+0x63b/0x830 [ 1507.427881] ? bioset_exit+0x370/0x370 [ 1507.431778] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1507.436553] blk_alloc_queue_node+0x28f/0xf50 [ 1507.441055] ? print_usage_bug+0xc0/0xc0 [ 1507.445126] ? blk_init_allocated_queue+0x600/0x600 [ 1507.450158] ? mark_held_locks+0xc9/0x160 [ 1507.454360] ? retint_kernel+0x10/0x10 [ 1507.458264] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 1507.463294] ? mark_held_locks+0xc9/0x160 [ 1507.467458] ? retint_kernel+0x10/0x10 [ 1507.471449] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 1507.476477] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1507.481251] ? retint_kernel+0x10/0x10 [ 1507.485180] blk_mq_init_queue+0x4b/0xb0 [ 1507.489251] loop_add+0x33d/0x9d0 [ 1507.492719] ? loop_lookup+0x105/0x230 [ 1507.496617] ? loop_queue_rq+0x660/0x660 [ 1507.500698] loop_control_ioctl+0x199/0x540 [ 1507.505026] ? loop_add+0x9d0/0x9d0 [ 1507.508665] ? retint_kernel+0x10/0x10 [ 1507.512566] ? do_vfs_ioctl+0x178/0x1720 [ 1507.516634] ? loop_add+0x9d0/0x9d0 [ 1507.520268] do_vfs_ioctl+0x1de/0x1720 [ 1507.524167] ? ioctl_preallocate+0x300/0x300 [ 1507.528580] ? __fget_light+0x2f7/0x440 [ 1507.532559] ? __schedule+0x1ed0/0x1ed0 [ 1507.536542] ? fget_raw+0x20/0x20 [ 1507.540001] ? __sb_end_write+0xac/0xe0 [ 1507.543982] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1507.549534] ? exit_to_usermode_loop+0x8c/0x370 [ 1507.554220] ? security_file_ioctl+0x94/0xc0 [ 1507.558640] ksys_ioctl+0xa9/0xd0 [ 1507.562101] __x64_sys_ioctl+0x73/0xb0 [ 1507.565995] do_syscall_64+0x1b9/0x820 [ 1507.569889] ? syscall_slow_exit_work+0x500/0x500 [ 1507.574740] ? syscall_return_slowpath+0x5e0/0x5e0 [ 1507.579676] ? syscall_return_slowpath+0x31d/0x5e0 [ 1507.584618] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe [ 1507.589996] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1507.594852] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1507.600044] RIP: 0033:0x455a79 [ 1507.603233] Code: 1d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1507.622622] RSP: 002b:00007f420d477c68 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1507.630346] RAX: ffffffffffffffda RBX: 00007f420d4786d4 RCX: 0000000000455a79 [ 1507.637620] RDX: 0000000000000000 RSI: 0000000000004c80 RDI: 0000000000000016 [ 1507.644894] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 1507.652168] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000017 03:54:29 executing program 6: r0 = socket(0x11, 0xa, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2c, &(0x7f0000000300)={0x7, {{0xa, 0x4e22, 0x200, @loopback={0x0, 0x1}, 0x6}}, {{0xa, 0x4e20, 0x400, @empty, 0x1fc0}}}, 0x108) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000640)={0x0, 0x0, 0x0}, &(0x7f0000000000)=0xc) syz_mount_image$hfsplus(&(0x7f0000000240)='hfsplus\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, &(0x7f00000005c0), 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB="bacf05c50c334be47a8f65698b770703b525eaecf4006bc8e3e6f055a1662e26d4ab9580bf5e463d8f81d6f826b04fef41dc0427a9f6433907a5f6f8199d5b039bc40ca9b36b139a659b0c68e65b2a991f0bfae60d8f894739f20b39f3b613ebd424a76a544557a742788ce4800480e4040000000000000000000000c321891c2d95fd399cc600", @ANYRESHEX=r1, @ANYBLOB=',\x00']) accept4(r0, 0x0, &(0x7f0000000100), 0x80800) 03:54:29 executing program 1: r0 = socket(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0xa3000000}, 0xc, &(0x7f0000000900)={&(0x7f0000000040)={0x14, 0x1e, 0x201}, 0x14}, 0x1}, 0x0) [ 1507.659443] R13: 00000000004bdfb1 R14: 00000000004ccab0 R15: 0000000000000011 [ 1507.669752] hfsplus: unable to parse mount options 03:54:29 executing program 0 (fault-call:10 fault-nth:18): r0 = syz_open_dev$vcsa(&(0x7f0000000100)='/dev/vcsa#\x00', 0x5, 0x101000) ioctl$BLKDISCARD(r0, 0x1277, &(0x7f0000000180)=0x5f) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140)='/dev/snapshot\x00', 0x0, 0x0) connect$nfc_llcp(r1, &(0x7f0000000300)={0x27, 0x0, 0x0, 0x6, 0x0, 0x0, "f44825e9da257dcd22512d531f545cf0bce08002f76d5e9bd3d1dcb3f649bf7ba49078f877ce09f903ed489ab0bbf0f088675b47312412edd6bd577062eb34", 0x1c}, 0x60) fcntl$addseals(0xffffffffffffffff, 0x409, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EVIOCGLED(r1, 0x80404519, &(0x7f0000000580)=""/236) ioctl$FS_IOC_SETFSLABEL(r2, 0x41009432, &(0x7f0000000480)="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") r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x3c, 0x0) ioctl$EVIOCGKEYCODE_V2(0xffffffffffffffff, 0x80284504, &(0x7f00000003c0)=""/188) ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x0) 03:54:29 executing program 4: r0 = socket(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0xc000000000000000}, 0xc, &(0x7f0000000900)={&(0x7f0000000040)={0x14, 0x1e, 0x201}, 0x14}, 0x1}, 0x0) 03:54:29 executing program 7: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f000000d000)={0xa, 0x4e20}, 0x1c) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}, 0xb}, 0x1c) syz_emit_ethernet(0x3e, &(0x7f00000001c0)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @random="e829f650db0f", [], {@ipv6={0x86dd, {0x0, 0x6, "50a09c", 0x8, 0xffffff11, 0x0, @remote={0xfe, 0x80, [], 0xbb}, @local={0xfe, 0x80, [], 0xaa}, {[], @udp={0x0, 0x4e20, 0x8}}}}}}, &(0x7f0000000040)) syz_emit_ethernet(0x3e, &(0x7f0000000000)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], {@ipv6={0x86dd, {0x0, 0x6, "50a09c", 0x8, 0xffffff11, 0x0, @remote={0xfe, 0x80, [], 0xbb}, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x28], 0xaa}, {[], @udp={0x300, 0x4e20, 0x8}}}}}}, &(0x7f0000000040)) 03:54:29 executing program 5: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer2\x00', 0x0, 0x0) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000040)="025cc83d6d345f8f762070") ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r0, 0x40085112, &(0x7f0000b18000)={{0xffffff93}, {0xffffffa0}, 0x0, 0x0, 0x0, [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfdffffff00000000]}) 03:54:29 executing program 3: ioctl$BLKDISCARD(0xffffffffffffffff, 0x1277, &(0x7f0000000180)) r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140)='/dev/snapshot\x00', 0x0, 0x0) fcntl$addseals(0xffffffffffffffff, 0x409, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f0000000000), &(0x7f00000000c0)=0x8) ioctl$EVIOCGLED(0xffffffffffffffff, 0x80404519, &(0x7f0000000580)=""/236) r2 = getpid() fcntl$lock(r1, 0x7, &(0x7f0000000040)={0x0, 0x5, 0x1, 0x5, r2}) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x3c, 0x0) write$FUSE_LK(r0, &(0x7f0000000080)={0x28, 0x0, 0x6, {{0xc62, 0xdfc, 0x1, r2}}}, 0x28) r4 = semget$private(0x0, 0x3, 0x0) semctl$SEM_STAT(r4, 0x4, 0x12, &(0x7f00000001c0)=""/134) ioctl$EVIOCGKEYCODE_V2(0xffffffffffffffff, 0x80284504, &(0x7f00000003c0)=""/188) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x4c0400}, 0xc, &(0x7f0000000280)={&(0x7f0000000680)=@gettaction={0x128, 0x32, 0x0, 0x70bd28, 0x25dfdbfe, {0x0, 0x400}, [@action_gd=@TCA_ACT_TAB={0xa4, 0x1, [{0x10, 0x16, @TCA_ACT_KIND={0x8, 0x1, 'xt\x00'}}, {0x14, 0x1c, @TCA_ACT_KIND={0xc, 0x1, 'gact\x00'}}, {0x10, 0x15, @TCA_ACT_INDEX={0x8, 0x3, 0x1ff}}, {0x10, 0x18, @TCA_ACT_INDEX={0x8, 0x3, 0x200}}, {0x14, 0x1b, @TCA_ACT_KIND={0xc, 0x1, 'gact\x00'}}, {0x10, 0x6, @TCA_ACT_KIND={0x8, 0x1, 'ipt\x00'}}, {0x10, 0x1b, @TCA_ACT_KIND={0x8, 0x1, 'bpf\x00'}}, {0x14, 0x1d, @TCA_ACT_KIND={0xc, 0x1, 'sample\x00'}}, {0x14, 0x1e, @TCA_ACT_KIND={0xc, 0x1, 'vlan\x00'}}]}, @action_gd=@TCA_ACT_TAB={0x68, 0x1, [{0x10, 0xe, @TCA_ACT_INDEX={0x8, 0x3, 0x3}}, {0x10, 0x5, @TCA_ACT_KIND={0x8, 0x1, 'nat\x00'}}, {0x10, 0x9, @TCA_ACT_INDEX={0x8, 0x3, 0x4fb}}, {0x10, 0x16, @TCA_ACT_INDEX={0x8, 0x3, 0x5}}, {0x14, 0xb, @TCA_ACT_KIND={0xc, 0x1, 'sample\x00'}}, {0x10, 0xd, @TCA_ACT_INDEX={0x8, 0x3, 0x3}}]}, @action_dump_flags=@TCA_ROOT_TIME_DELTA={0x8, 0x4, 0x5}]}, 0x128}, 0x1, 0x0, 0x0, 0x4000000}, 0x4000814) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c82, 0x0) 03:54:29 executing program 1: r0 = socket(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x6100}, 0xc, &(0x7f0000000900)={&(0x7f0000000040)={0x14, 0x1e, 0x201}, 0x14}, 0x1}, 0x0) [ 1507.928481] FAULT_INJECTION: forcing a failure. [ 1507.928481] name failslab, interval 1, probability 0, space 0, times 0 [ 1507.940110] CPU: 1 PID: 6354 Comm: syz-executor0 Not tainted 4.18.0-rc4+ #144 [ 1507.947404] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1507.956775] Call Trace: [ 1507.959389] dump_stack+0x1c9/0x2b4 [ 1507.963048] ? dump_stack_print_info.cold.2+0x52/0x52 [ 1507.968280] should_fail.cold.4+0xa/0x1a [ 1507.972370] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 1507.977501] ? retint_kernel+0x10/0x10 [ 1507.981417] ? graph_lock+0x170/0x170 [ 1507.985273] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1507.990063] ? retint_kernel+0x10/0x10 [ 1507.996234] ? __lock_is_held+0xb5/0x140 [ 1508.000339] ? check_same_owner+0x340/0x340 [ 1508.004677] ? rcu_note_context_switch+0x730/0x730 [ 1508.009718] __should_failslab+0x124/0x180 [ 1508.013966] should_failslab+0x9/0x14 [ 1508.017789] kmem_cache_alloc_trace+0x2cb/0x780 [ 1508.022477] ? _raw_spin_unlock_irqrestore+0x74/0xc0 [ 1508.027602] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 1508.032649] wb_congested_get_create+0x1d2/0x470 [ 1508.037428] ? wb_wakeup_delayed+0xf0/0xf0 [ 1508.041680] ? __lockdep_init_map+0x105/0x590 [ 1508.046194] wb_init+0x636/0xa00 [ 1508.049592] ? print_usage_bug+0xc0/0xc0 [ 1508.053670] ? bdi_put+0x180/0x180 [ 1508.057214] ? bdi_alloc_node+0x67/0xe0 [ 1508.061209] ? __lockdep_init_map+0x105/0x590 [ 1508.065711] ? loop_control_ioctl+0x199/0x540 [ 1508.070221] ? lockdep_init_map+0x9/0x10 [ 1508.074294] ? debug_mutex_init+0x2d/0x60 [ 1508.078455] ? __ia32_sys_membarrier+0x150/0x150 [ 1508.083223] ? __lockdep_init_map+0x105/0x590 [ 1508.087769] ? __init_waitqueue_head+0x9e/0x150 [ 1508.092459] ? init_wait_entry+0x1c0/0x1c0 [ 1508.096719] bdi_init+0x375/0x540 [ 1508.100187] ? wb_init+0xa00/0xa00 [ 1508.103735] ? bdi_alloc_node+0x67/0xe0 [ 1508.107742] ? bdi_alloc_node+0x67/0xe0 [ 1508.111723] ? rcu_read_lock_sched_held+0x108/0x120 [ 1508.116748] ? kmem_cache_alloc_node_trace+0x34e/0x770 [ 1508.122034] ? bioset_exit+0x370/0x370 [ 1508.125937] ? loop_info64_from_compat+0x940/0x940 [ 1508.130889] bdi_alloc_node+0x81/0xe0 [ 1508.134702] blk_alloc_queue_node+0x2bf/0xf50 [ 1508.139212] ? blk_init_allocated_queue+0x600/0x600 [ 1508.144242] ? lockdep_init_map+0x9/0x10 [ 1508.148311] ? debug_mutex_init+0x2d/0x60 [ 1508.152471] ? __mutex_init+0x1f7/0x290 [ 1508.156459] ? __ia32_sys_membarrier+0x150/0x150 [ 1508.161228] ? blk_mq_alloc_rqs+0x7bc/0x9c0 [ 1508.165557] ? blk_mq_alloc_rqs+0x805/0x9c0 [ 1508.169897] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1508.175441] ? __blk_mq_alloc_rq_map+0x17d/0x2e0 [ 1508.180210] ? blk_mq_alloc_tag_set+0x50e/0xad0 [ 1508.184926] ? blk_mq_update_nr_hw_queues+0x510/0x510 [ 1508.190170] blk_mq_init_queue+0x4b/0xb0 [ 1508.194246] loop_add+0x33d/0x9d0 [ 1508.197709] ? loop_lookup+0x105/0x230 [ 1508.201606] ? loop_queue_rq+0x660/0x660 [ 1508.205677] ? __sanitizer_cov_trace_switch+0x40/0x90 [ 1508.210880] loop_control_ioctl+0x199/0x540 [ 1508.215213] ? loop_add+0x9d0/0x9d0 [ 1508.218852] ? expand_files.part.8+0x9c0/0x9c0 [ 1508.223447] ? kasan_check_write+0x14/0x20 [ 1508.227694] ? loop_add+0x9d0/0x9d0 [ 1508.231335] do_vfs_ioctl+0x1de/0x1720 [ 1508.235246] ? ioctl_preallocate+0x300/0x300 [ 1508.239670] ? __fget_light+0x2f7/0x440 [ 1508.243649] ? __schedule+0x1ed0/0x1ed0 [ 1508.247628] ? fget_raw+0x20/0x20 [ 1508.251092] ? retint_kernel+0x10/0x10 [ 1508.255002] ? exit_to_usermode_loop+0xb5/0x370 [ 1508.259685] ? security_file_ioctl+0x94/0xc0 [ 1508.264114] ksys_ioctl+0xa9/0xd0 [ 1508.267599] __x64_sys_ioctl+0x73/0xb0 [ 1508.271508] do_syscall_64+0x1b9/0x820 [ 1508.275405] ? finish_task_switch+0x1d3/0x870 [ 1508.279910] ? syscall_return_slowpath+0x5e0/0x5e0 [ 1508.284852] ? syscall_return_slowpath+0x31d/0x5e0 [ 1508.289801] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1508.295518] ? retint_user+0x18/0x18 [ 1508.299253] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1508.304116] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1508.309321] RIP: 0033:0x455a79 [ 1508.312511] Code: 1d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1508.331895] RSP: 002b:00007f420d477c68 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1508.339613] RAX: ffffffffffffffda RBX: 00007f420d4786d4 RCX: 0000000000455a79 [ 1508.346889] RDX: 0000000000000000 RSI: 0000000000004c80 RDI: 0000000000000016 [ 1508.354170] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 1508.361445] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000017 [ 1508.368721] R13: 00000000004bdfb1 R14: 00000000004ccab0 R15: 0000000000000012 [ 1508.379706] hfsplus: unable to parse mount options 03:54:30 executing program 7: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f000000d000)={0xa, 0x4e20}, 0x1c) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}, 0xb}, 0x1c) syz_emit_ethernet(0x3e, &(0x7f00000001c0)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @random="e829f650db0f", [], {@ipv6={0x86dd, {0x0, 0x6, "50a09c", 0x8, 0xffffff11, 0x0, @remote={0xfe, 0x80, [], 0xbb}, @local={0xfe, 0x80, [], 0xaa}, {[], @udp={0x0, 0x4e20, 0x8}}}}}}, &(0x7f0000000040)) syz_emit_ethernet(0x3e, &(0x7f0000000000)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], {@ipv6={0x86dd, {0x0, 0x6, "50a09c", 0x8, 0xffffff11, 0x0, @remote={0xfe, 0x80, [], 0xbb}, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffc0], 0xaa}, {[], @udp={0x300, 0x4e20, 0x8}}}}}}, &(0x7f0000000040)) 03:54:30 executing program 5: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer2\x00', 0x0, 0x0) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000040)="025cc83d6d345f8f762070") ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r0, 0x40085112, &(0x7f0000b18000)={{0xffffff93}, {0xffffffa0}, 0x0, 0x0, 0x0, [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f00]}) 03:54:30 executing program 1: r0 = socket(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x195}, 0xc, &(0x7f0000000900)={&(0x7f0000000040)={0x14, 0x1e, 0x201}, 0x14}, 0x1}, 0x0) 03:54:30 executing program 3: ioctl$BLKDISCARD(0xffffffffffffffff, 0x1277, &(0x7f0000000180)) r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140)='/dev/snapshot\x00', 0x0, 0x0) fcntl$addseals(0xffffffffffffffff, 0x409, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpeername$packet(r0, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @remote}, &(0x7f0000000240)=0x14) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000280)={r1, 0x1, 0x6, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0x10}}, 0x10) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f0000000000), &(0x7f00000000c0)=0x8) ioctl$EVIOCGLED(0xffffffffffffffff, 0x80404519, &(0x7f0000000580)=""/236) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x3c, 0x0) ioctl$EVIOCGKEYCODE_V2(0xffffffffffffffff, 0x80284504, &(0x7f00000003c0)=""/188) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c82, 0x0) 03:54:30 executing program 0 (fault-call:10 fault-nth:19): r0 = syz_open_dev$vcsa(&(0x7f0000000100)='/dev/vcsa#\x00', 0x5, 0x101000) ioctl$BLKDISCARD(r0, 0x1277, &(0x7f0000000180)=0x5f) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140)='/dev/snapshot\x00', 0x0, 0x0) connect$nfc_llcp(r1, &(0x7f0000000300)={0x27, 0x0, 0x0, 0x6, 0x0, 0x0, "f44825e9da257dcd22512d531f545cf0bce08002f76d5e9bd3d1dcb3f649bf7ba49078f877ce09f903ed489ab0bbf0f088675b47312412edd6bd577062eb34", 0x1c}, 0x60) fcntl$addseals(0xffffffffffffffff, 0x409, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EVIOCGLED(r1, 0x80404519, &(0x7f0000000580)=""/236) ioctl$FS_IOC_SETFSLABEL(r2, 0x41009432, &(0x7f0000000480)="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") r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x3c, 0x0) ioctl$EVIOCGKEYCODE_V2(0xffffffffffffffff, 0x80284504, &(0x7f00000003c0)=""/188) ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x0) 03:54:30 executing program 2: r0 = syz_open_dev$sndseq(&(0x7f0000dcc000)='/dev/snd/seq\x00', 0x0, 0x2) openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/qat_adf_ctl\x00', 0x80000, 0x0) read(r0, &(0x7f0000fb6000)=""/28, 0x3f0) socketpair$inet6_sctp(0xa, 0x5, 0x84, &(0x7f0000001400)={0xffffffffffffffff}) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_REM(r1, 0x84, 0x65, &(0x7f0000001440)=[@in6={0xa, 0x4e21, 0x1, @empty, 0x6}, @in={0x2, 0x4e24, @broadcast=0xffffffff}], 0x2c) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000418f50)={{0x80}, 'port1\x00', 0xa9824f69d1376637, 0x200000000000, 0xa69, 0xfffffffffffffffd, 0x0, 0x0, 0x17, 0x0, 0x0, 0x81}) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000240)={0xbf}) stat(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)) write$binfmt_script(r0, &(0x7f0000000000)=ANY=[], 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f00000002c0)={{}, 'port0\x00'}) openat$sequencer2(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer2\x00', 0x0, 0x0) [ 1508.422572] hfsplus: unable to parse mount options 03:54:30 executing program 4: r0 = socket(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x5f000000}, 0xc, &(0x7f0000000900)={&(0x7f0000000040)={0x14, 0x1e, 0x201}, 0x14}, 0x1}, 0x0) 03:54:30 executing program 6: r0 = socket(0x11, 0xa, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000640)={0x0, 0x0, 0x0}, &(0x7f0000000680)=0xc) syz_mount_image$hfsplus(&(0x7f0000000240)='hfsplus\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, &(0x7f00000005c0), 0x0, &(0x7f00000006c0)={[{@gid={'gid', 0x3d, r1}, 0x2c}]}) accept4$packet(r0, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @broadcast}, &(0x7f0000000040)=0x14, 0x80000) ioctl$sock_inet6_SIOCSIFDSTADDR(r0, 0x8918, &(0x7f0000000080)={@loopback={0x0, 0x1}, 0x7e, r2}) 03:54:30 executing program 1: r0 = socket(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0xf4}, 0xc, &(0x7f0000000900)={&(0x7f0000000040)={0x14, 0x1e, 0x201}, 0x14}, 0x1}, 0x0) 03:54:30 executing program 7: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f000000d000)={0xa, 0x4e20}, 0x1c) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}, 0xb}, 0x1c) syz_emit_ethernet(0x3e, &(0x7f00000001c0)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @random="e829f650db0f", [], {@ipv6={0x86dd, {0x0, 0x6, "50a09c", 0x8, 0xffffff11, 0x0, @remote={0xfe, 0x80, [], 0xbb}, @local={0xfe, 0x80, [], 0xaa}, {[], @udp={0x0, 0x4e20, 0x8}}}}}}, &(0x7f0000000040)) syz_emit_ethernet(0x3e, &(0x7f0000000000)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], {@ipv6={0x86dd, {0x0, 0x6, "50a09c", 0x8, 0xffffff11, 0x0, @remote={0xfe, 0x80, [], 0xbb}, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x806000000000000], 0xaa}, {[], @udp={0x300, 0x4e20, 0x8}}}}}}, &(0x7f0000000040)) 03:54:30 executing program 3: ioctl$BLKDISCARD(0xffffffffffffffff, 0x1277, &(0x7f0000000180)) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140)='/dev/snapshot\x00', 0x0, 0x0) fcntl$addseals(0xffffffffffffffff, 0x409, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f0000000000), &(0x7f00000000c0)=0x8) ioctl$EVIOCGLED(0xffffffffffffffff, 0x80404519, &(0x7f0000000580)=""/236) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x3c, 0x0) ioctl$EVIOCGKEYCODE_V2(0xffffffffffffffff, 0x80284504, &(0x7f00000003c0)=""/188) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c82, 0x0) arch_prctl(0x1003, &(0x7f00000001c0)="78b73ec15fd1cb64beadb4b61801ded4d528325da4a48cf1de26b728b884aeb9a756435b932436f00a8a09cfa993ba1204402dd6f94e4d9277d57bdcb70f616004e7675eaf01f60597b9cfb987a44a4bab7952f1303a9a0c6bdb4bf6070e6dda0e434d35adca4f4e03872a3da15bb9a2adc60889ce8e7b98dedad61f884ab3c97aabc9bf89f87b0b74a9724715f1b138d341f7e298a4907a488618a6e29c9910fe598866ed936698c8dcdd9a19b4dd74660646f60de6c8a1") 03:54:30 executing program 4: r0 = socket(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x9c00}, 0xc, &(0x7f0000000900)={&(0x7f0000000040)={0x14, 0x1e, 0x201}, 0x14}, 0x1}, 0x0) 03:54:30 executing program 5: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer2\x00', 0x0, 0x0) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000040)="025cc83d6d345f8f762070") ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r0, 0x40085112, &(0x7f0000b18000)={{0xffffff93}, {0xffffffa0}, 0x0, 0x0, 0x0, [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x500]}) [ 1508.699396] FAULT_INJECTION: forcing a failure. [ 1508.699396] name failslab, interval 1, probability 0, space 0, times 0 [ 1508.711216] CPU: 1 PID: 6392 Comm: syz-executor0 Not tainted 4.18.0-rc4+ #144 [ 1508.718516] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1508.727952] Call Trace: [ 1508.730565] dump_stack+0x1c9/0x2b4 [ 1508.734223] ? dump_stack_print_info.cold.2+0x52/0x52 [ 1508.739452] should_fail.cold.4+0xa/0x1a [ 1508.743546] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 1508.748686] ? __schedule+0x884/0x1ed0 [ 1508.752608] ? mark_held_locks+0xc9/0x160 [ 1508.756790] ? retint_kernel+0x10/0x10 [ 1508.760702] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 1508.765736] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1508.770525] ? retint_kernel+0x10/0x10 [ 1508.774446] ? __should_failslab+0xea/0x180 [ 1508.778795] __should_failslab+0x124/0x180 [ 1508.783056] should_failslab+0x9/0x14 [ 1508.786876] kmem_cache_alloc_node_trace+0x26f/0x770 [ 1508.792001] ? bioset_exit+0x370/0x370 [ 1508.795920] ? loop_info64_from_compat+0x940/0x940 [ 1508.800881] bdi_alloc_node+0x67/0xe0 [ 1508.804719] blk_alloc_queue_node+0x2bf/0xf50 [ 1508.809235] ? blk_mq_alloc_rqs+0x7bc/0x9c0 [ 1508.813590] ? blk_init_allocated_queue+0x600/0x600 [ 1508.818633] ? lockdep_init_map+0x9/0x10 [ 1508.822704] ? debug_mutex_init+0x2d/0x60 [ 1508.826860] ? __mutex_init+0x1f7/0x290 [ 1508.830847] ? __ia32_sys_membarrier+0x150/0x150 [ 1508.835626] ? blk_mq_alloc_rq_map+0x142/0x220 [ 1508.840222] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1508.845772] ? __blk_mq_alloc_rq_map+0x17d/0x2e0 [ 1508.850547] ? blk_mq_alloc_tag_set+0x50e/0xad0 [ 1508.855237] ? blk_mq_update_nr_hw_queues+0x510/0x510 [ 1508.860445] blk_mq_init_queue+0x4b/0xb0 [ 1508.864520] loop_add+0x33d/0x9d0 [ 1508.867989] ? loop_lookup+0x105/0x230 [ 1508.871879] ? loop_queue_rq+0x660/0x660 [ 1508.875967] loop_control_ioctl+0x199/0x540 [ 1508.880317] ? loop_add+0x9d0/0x9d0 [ 1508.883947] ? loop_add+0x9d0/0x9d0 [ 1508.887584] ? loop_add+0x9d0/0x9d0 [ 1508.891216] do_vfs_ioctl+0x1de/0x1720 [ 1508.895134] ? __lock_is_held+0xb5/0x140 [ 1508.899217] ? ioctl_preallocate+0x300/0x300 [ 1508.903629] ? __fget_light+0x2f7/0x440 [ 1508.907612] ? fget_raw+0x20/0x20 [ 1508.911072] ? __sb_end_write+0xac/0xe0 [ 1508.915058] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1508.920603] ? fput+0x130/0x1a0 [ 1508.923908] ? ksys_write+0x1ae/0x260 [ 1508.927721] ? security_file_ioctl+0x94/0xc0 [ 1508.932137] ksys_ioctl+0xa9/0xd0 [ 1508.935595] __x64_sys_ioctl+0x73/0xb0 [ 1508.939488] do_syscall_64+0x1b9/0x820 [ 1508.943381] ? syscall_slow_exit_work+0x500/0x500 [ 1508.948235] ? syscall_return_slowpath+0x5e0/0x5e0 [ 1508.953182] ? syscall_return_slowpath+0x31d/0x5e0 [ 1508.958123] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1508.963671] ? retint_user+0x18/0x18 [ 1508.967404] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1508.972263] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1508.977460] RIP: 0033:0x455a79 [ 1508.980645] Code: 1d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1509.000029] RSP: 002b:00007f420d477c68 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1509.007745] RAX: ffffffffffffffda RBX: 00007f420d4786d4 RCX: 0000000000455a79 [ 1509.015016] RDX: 0000000000000000 RSI: 0000000000004c80 RDI: 0000000000000016 [ 1509.022285] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 1509.029555] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000017 [ 1509.036826] R13: 00000000004bdfb1 R14: 00000000004ccab0 R15: 0000000000000013 03:54:30 executing program 1: r0 = socket(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x140}, 0xc, &(0x7f0000000900)={&(0x7f0000000040)={0x14, 0x1e, 0x201}, 0x14}, 0x1}, 0x0) [ 1509.049646] hfsplus: gid requires an argument [ 1509.054282] hfsplus: unable to parse mount options 03:54:30 executing program 3: ioctl$BLKDISCARD(0xffffffffffffffff, 0x1277, &(0x7f0000000180)) r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140)='/dev/snapshot\x00', 0x0, 0x0) flock(r0, 0x2) fcntl$addseals(0xffffffffffffffff, 0x409, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f0000000000), &(0x7f00000000c0)=0x8) ioctl$EVIOCGLED(0xffffffffffffffff, 0x80404519, &(0x7f0000000580)=""/236) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x3c, 0x0) ioctl$EVIOCGKEYCODE_V2(0xffffffffffffffff, 0x80284504, &(0x7f00000003c0)=""/188) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c82, 0x0) 03:54:30 executing program 0 (fault-call:10 fault-nth:20): r0 = syz_open_dev$vcsa(&(0x7f0000000100)='/dev/vcsa#\x00', 0x5, 0x101000) ioctl$BLKDISCARD(r0, 0x1277, &(0x7f0000000180)=0x5f) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140)='/dev/snapshot\x00', 0x0, 0x0) connect$nfc_llcp(r1, &(0x7f0000000300)={0x27, 0x0, 0x0, 0x6, 0x0, 0x0, "f44825e9da257dcd22512d531f545cf0bce08002f76d5e9bd3d1dcb3f649bf7ba49078f877ce09f903ed489ab0bbf0f088675b47312412edd6bd577062eb34", 0x1c}, 0x60) fcntl$addseals(0xffffffffffffffff, 0x409, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EVIOCGLED(r1, 0x80404519, &(0x7f0000000580)=""/236) ioctl$FS_IOC_SETFSLABEL(r2, 0x41009432, &(0x7f0000000480)="64098ceb11469210e1fa92c76a76762b420a730851d9c9ce1d2745bac5fca8796f1aba309faf35268b4d45ac04ac0ec6f2cebf8f0ac8391dd8cef0da84895505ef6fc4062016210998b92c121630e66d984a620a4a40b4b63bebedc75ae3e140c654a4f80fec3a6af81841856baae4ad83438f32d9e08e5219c8b832403b86aa723d75cb839059d9d094ba7a3510a5acd071b9c1f441886fb396511cb44257e86695b1b4b84218118e0045593d869765e8f850cc6a534e5f114b22d73ba2a903943a32cebbff720180ba6531e240d9a3759e2287b1a64f950a5b1e402580731d395128e3b81fd4c76b233a384200aa015eb779ce7140613e374a38caa9d18b34") r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x3c, 0x0) ioctl$EVIOCGKEYCODE_V2(0xffffffffffffffff, 0x80284504, &(0x7f00000003c0)=""/188) ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x0) 03:54:30 executing program 4: r0 = socket(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0xbd}, 0xc, &(0x7f0000000900)={&(0x7f0000000040)={0x14, 0x1e, 0x201}, 0x14}, 0x1}, 0x0) 03:54:30 executing program 7: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f000000d000)={0xa, 0x4e20}, 0x1c) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}, 0xb}, 0x1c) syz_emit_ethernet(0x3e, &(0x7f00000001c0)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @random="e829f650db0f", [], {@ipv6={0x86dd, {0x0, 0x6, "50a09c", 0x8, 0xffffff11, 0x0, @remote={0xfe, 0x80, [], 0xbb}, @local={0xfe, 0x80, [], 0xaa}, {[], @udp={0x0, 0x4e20, 0x8}}}}}}, &(0x7f0000000040)) syz_emit_ethernet(0x3e, &(0x7f0000000000)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], {@ipv6={0x86dd, {0x0, 0x6, "50a09c", 0x8, 0xffffff11, 0x0, @remote={0xfe, 0x80, [], 0xbb}, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x300000000000000], 0xaa}, {[], @udp={0x300, 0x4e20, 0x8}}}}}}, &(0x7f0000000040)) 03:54:30 executing program 5: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer2\x00', 0x0, 0x0) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000040)="025cc83d6d345f8f762070") ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r0, 0x40085112, &(0x7f0000b18000)={{0xffffff93}, {0xffffffa0}, 0x0, 0x0, 0x0, [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4]}) 03:54:30 executing program 1: r0 = socket(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x9500000000000000}, 0xc, &(0x7f0000000900)={&(0x7f0000000040)={0x14, 0x1e, 0x201}, 0x14}, 0x1}, 0x0) [ 1509.167893] hfsplus: gid requires an argument [ 1509.172505] hfsplus: unable to parse mount options 03:54:30 executing program 6: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000640)={0x0, 0x0, 0x0}, &(0x7f0000000680)=0xc) r1 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/cuse\x00', 0x800, 0x0) ioctl$SCSI_IOCTL_SYNC(r1, 0x4) syz_mount_image$hfsplus(&(0x7f0000000240)='hfsplus\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, &(0x7f00000005c0), 0x0, &(0x7f00000006c0)={[{@gid={'gid', 0x3d, r0}, 0x2c}]}) r2 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dsp\x00', 0x0, 0x0) r3 = inotify_add_watch(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x20000000) inotify_rm_watch(r2, r3) [ 1509.497302] FAULT_INJECTION: forcing a failure. [ 1509.497302] name failslab, interval 1, probability 0, space 0, times 0 [ 1509.510220] CPU: 0 PID: 6424 Comm: syz-executor0 Not tainted 4.18.0-rc4+ #144 [ 1509.517508] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1509.526862] Call Trace: [ 1509.529465] dump_stack+0x1c9/0x2b4 [ 1509.533101] ? dump_stack_print_info.cold.2+0x52/0x52 [ 1509.538313] should_fail.cold.4+0xa/0x1a [ 1509.542732] ? kasan_check_write+0x14/0x20 [ 1509.546989] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 1509.552099] ? graph_lock+0x170/0x170 [ 1509.555907] ? wait_for_completion+0x8d0/0x8d0 [ 1509.560496] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 1509.565524] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1509.570291] ? graph_lock+0x170/0x170 [ 1509.574105] ? find_held_lock+0x36/0x1c0 [ 1509.578192] ? __lock_is_held+0xb5/0x140 [ 1509.582279] ? check_same_owner+0x340/0x340 [ 1509.586623] ? rcu_note_context_switch+0x730/0x730 [ 1509.591571] ? pcpu_balance_workfn+0x1700/0x1700 [ 1509.596347] ? trace_hardirqs_on+0xd/0x10 [ 1509.600599] __should_failslab+0x124/0x180 [ 1509.604845] should_failslab+0x9/0x14 [ 1509.608658] kmem_cache_alloc_node_trace+0x26f/0x770 [ 1509.613774] ? debug_object_free+0x690/0x690 [ 1509.618204] blkg_alloc+0x124/0x810 [ 1509.621874] ? blkcg_reset_stats+0x3e0/0x3e0 [ 1509.626288] ? lockdep_init_map+0x9/0x10 [ 1509.630383] ? debug_mutex_init+0x2d/0x60 [ 1509.634543] ? __mutex_init+0x1f7/0x290 [ 1509.638526] ? __lockdep_init_map+0x105/0x590 [ 1509.643038] ? kasan_check_write+0x14/0x20 [ 1509.647284] ? percpu_ref_init+0x1f8/0x290 [ 1509.651525] ? blk_delay_queue+0x1a0/0x1a0 [ 1509.655771] ? percpu_ref_noop_confirm_switch+0x10/0x10 [ 1509.661149] blkcg_init_queue+0x27/0x480 [ 1509.665228] blk_alloc_queue_node+0x9c2/0xf50 [ 1509.669740] ? blk_mq_alloc_rqs+0x7bc/0x9c0 [ 1509.674078] ? blk_init_allocated_queue+0x600/0x600 [ 1509.679115] ? lockdep_init_map+0x9/0x10 [ 1509.683184] ? debug_mutex_init+0x2d/0x60 [ 1509.687345] ? __mutex_init+0x1f7/0x290 [ 1509.691351] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1509.697071] ? __blk_mq_alloc_rq_map+0x17d/0x2e0 [ 1509.701935] ? blk_mq_update_nr_hw_queues+0x510/0x510 [ 1509.707134] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 1509.712178] blk_mq_init_queue+0x4b/0xb0 [ 1509.716254] loop_add+0x33d/0x9d0 [ 1509.719715] ? loop_queue_rq+0x660/0x660 [ 1509.723785] ? loop_control_ioctl+0x17c/0x540 [ 1509.728301] loop_control_ioctl+0x199/0x540 [ 1509.732659] ? loop_add+0x9d0/0x9d0 [ 1509.736299] ? expand_files.part.8+0x9c0/0x9c0 [ 1509.740894] ? kasan_check_write+0x14/0x20 [ 1509.745154] ? loop_add+0x9d0/0x9d0 [ 1509.748786] do_vfs_ioctl+0x1de/0x1720 [ 1509.752681] ? ioctl_preallocate+0x300/0x300 [ 1509.757091] ? __fget_light+0x2f7/0x440 [ 1509.761070] ? __schedule+0x1ed0/0x1ed0 [ 1509.765078] ? fget_raw+0x20/0x20 [ 1509.768547] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1509.774103] ? exit_to_usermode_loop+0x8c/0x370 [ 1509.778795] ? security_file_ioctl+0x94/0xc0 [ 1509.783213] ksys_ioctl+0xa9/0xd0 [ 1509.786679] __x64_sys_ioctl+0x73/0xb0 [ 1509.790580] do_syscall_64+0x1b9/0x820 [ 1509.794475] ? syscall_slow_exit_work+0x500/0x500 [ 1509.799335] ? syscall_return_slowpath+0x5e0/0x5e0 [ 1509.804271] ? syscall_return_slowpath+0x31d/0x5e0 [ 1509.809218] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe [ 1509.814596] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1509.819462] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1509.824658] RIP: 0033:0x455a79 [ 1509.827845] Code: 1d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1509.847232] RSP: 002b:00007f420d477c68 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1509.854950] RAX: ffffffffffffffda RBX: 00007f420d4786d4 RCX: 0000000000455a79 [ 1509.862228] RDX: 0000000000000000 RSI: 0000000000004c80 RDI: 0000000000000016 [ 1509.869504] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 1509.876960] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000017 [ 1509.884240] R13: 00000000004bdfb1 R14: 00000000004ccab0 R15: 0000000000000014 [ 1509.897352] hfsplus: unable to find HFS+ superblock 03:54:31 executing program 2: r0 = syz_open_dev$sndseq(&(0x7f0000dcc000)='/dev/snd/seq\x00', 0x0, 0x2) read(r0, &(0x7f0000fb6000)=""/28, 0x3f0) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) bind$bt_l2cap(r1, &(0x7f0000000000)={0x1f}, 0xe) setsockopt$bt_l2cap_L2CAP_OPTIONS(r1, 0x6, 0x1, &(0x7f0000000080)={0x0, 0xffffffff, 0x0, 0x1}, 0xc) listen(r1, 0x0) ioctl$SNDRV_CTL_IOCTL_HWDEP_NEXT_DEVICE(r0, 0xc0045520, &(0x7f0000000000)=0xa00e) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000418f50)={{0x80}, "0a4ceaa05d9a00000000000000039b3fd4cec307e8ef3d13eb790ec9c65abaf90d229db692542e5b78f8b29e0a27800f0000000000000009fb42f376589701a4", 0xa9824f69d1376637, 0x10800a}) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000240)={0xbf}) write$binfmt_script(r0, &(0x7f0000000000)=ANY=[], 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f00000002c0)={{}, 'port0\x00'}) openat$sequencer2(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer2\x00', 0x0, 0x0) 03:54:31 executing program 3: ioctl$BLKDISCARD(0xffffffffffffffff, 0x1277, &(0x7f0000000180)) r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140)='/dev/snapshot\x00', 0x0, 0x0) fcntl$addseals(0xffffffffffffffff, 0x409, 0x0) ioctl$TCXONC(r0, 0x540a, 0x1) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f0000000000), &(0x7f00000000c0)=0x8) ioctl$EVIOCGLED(0xffffffffffffffff, 0x80404519, &(0x7f0000000580)=""/236) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x3c, 0x0) open_by_handle_at(r1, &(0x7f0000000040)={0x65, 0x1000, "3d7ab34c76161ee90d9bd0dab220285cb7f49ab718bd543dfacaba5eaec520d72d7033f1ab56ef8f7ba74dba85e317712cee7cd238f4c19036efafbbefdf8d8b28b1f66c8b9021fd2289784b16d1912946ceda9946c0b666dcdd1864fd"}, 0x4002) ioctl$EVIOCGKEYCODE_V2(0xffffffffffffffff, 0x80284504, &(0x7f00000003c0)=""/188) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c82, 0x0) 03:54:31 executing program 4: r0 = socket(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8700}, 0xc, &(0x7f0000000900)={&(0x7f0000000040)={0x14, 0x1e, 0x201}, 0x14}, 0x1}, 0x0) 03:54:31 executing program 5: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer2\x00', 0x0, 0x0) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000040)="025cc83d6d345f8f762070") ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r0, 0x40085112, &(0x7f0000b18000)={{0xffffff93}, {0xffffffa0}, 0x0, 0x0, 0x0, [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff]}) 03:54:31 executing program 7: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f000000d000)={0xa, 0x4e20}, 0x1c) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}, 0xb}, 0x1c) syz_emit_ethernet(0x3e, &(0x7f00000001c0)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @random="e829f650db0f", [], {@ipv6={0x86dd, {0x0, 0x6, "50a09c", 0x8, 0xffffff11, 0x0, @remote={0xfe, 0x80, [], 0xbb}, @local={0xfe, 0x80, [], 0xaa}, {[], @udp={0x0, 0x4e20, 0x8}}}}}}, &(0x7f0000000040)) syz_emit_ethernet(0x3e, &(0x7f0000000000)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], {@ipv6={0x86dd, {0x0, 0x6, "50a09c", 0x8, 0xffffff11, 0x0, @remote={0xfe, 0x80, [], 0xbb}, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8864000000000000], 0xaa}, {[], @udp={0x300, 0x4e20, 0x8}}}}}}, &(0x7f0000000040)) 03:54:31 executing program 1: r0 = socket(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0xaf01}, 0xc, &(0x7f0000000900)={&(0x7f0000000040)={0x14, 0x1e, 0x201}, 0x14}, 0x1}, 0x0) 03:54:31 executing program 0 (fault-call:10 fault-nth:21): r0 = syz_open_dev$vcsa(&(0x7f0000000100)='/dev/vcsa#\x00', 0x5, 0x101000) ioctl$BLKDISCARD(r0, 0x1277, &(0x7f0000000180)=0x5f) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140)='/dev/snapshot\x00', 0x0, 0x0) connect$nfc_llcp(r1, &(0x7f0000000300)={0x27, 0x0, 0x0, 0x6, 0x0, 0x0, "f44825e9da257dcd22512d531f545cf0bce08002f76d5e9bd3d1dcb3f649bf7ba49078f877ce09f903ed489ab0bbf0f088675b47312412edd6bd577062eb34", 0x1c}, 0x60) fcntl$addseals(0xffffffffffffffff, 0x409, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EVIOCGLED(r1, 0x80404519, &(0x7f0000000580)=""/236) ioctl$FS_IOC_SETFSLABEL(r2, 0x41009432, &(0x7f0000000480)="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") r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x3c, 0x0) ioctl$EVIOCGKEYCODE_V2(0xffffffffffffffff, 0x80284504, &(0x7f00000003c0)=""/188) ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x0) [ 1509.925467] hfsplus: unable to find HFS+ superblock 03:54:31 executing program 6: r0 = socket(0x11, 0xa, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000640)={0x0, 0x0, 0x0}, &(0x7f0000000680)=0xc) syz_mount_image$hfsplus(&(0x7f0000000240)='hfsplus\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, &(0x7f00000005c0), 0x0, &(0x7f00000006c0)=ANY=[@ANYBLOB='gid=', @ANYRESHEX=r1, @ANYBLOB="00d6"]) 03:54:31 executing program 3: ioctl$BLKDISCARD(0xffffffffffffffff, 0x1277, &(0x7f0000000180)) r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140)='/dev/snapshot\x00', 0x0, 0x0) fcntl$addseals(0xffffffffffffffff, 0x409, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f0000000000), &(0x7f00000000c0)=0x8) ioctl$EVIOCGLED(0xffffffffffffffff, 0x80404519, &(0x7f0000000580)=""/236) ioctl$KVM_GET_MP_STATE(r0, 0x8004ae98, &(0x7f0000000080)) socketpair$inet(0x2, 0xb, 0x7, &(0x7f0000000240)) syz_genetlink_get_family_id$team(&(0x7f0000000040)='team\x00') r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x3c, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000100)={r0, r0, 0x2, 0x2}, 0x10) ioctl$EVIOCGKEYCODE_V2(0xffffffffffffffff, 0x80284504, &(0x7f00000003c0)=""/188) write$FUSE_INIT(r0, &(0x7f00000001c0)={0x50, 0xffffffffffffffda, 0x7, {0x7, 0x1b, 0x4, 0x10000, 0x8, 0x4, 0x18, 0xe22}}, 0x50) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c82, 0x0) 03:54:31 executing program 4: r0 = socket(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x9401}, 0xc, &(0x7f0000000900)={&(0x7f0000000040)={0x14, 0x1e, 0x201}, 0x14}, 0x1}, 0x0) 03:54:31 executing program 1: r0 = socket(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x5001}, 0xc, &(0x7f0000000900)={&(0x7f0000000040)={0x14, 0x1e, 0x201}, 0x14}, 0x1}, 0x0) 03:54:31 executing program 5: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer2\x00', 0x0, 0x0) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000040)="025cc83d6d345f8f762070") ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r0, 0x40085112, &(0x7f0000b18000)={{0xffffff93}, {0xffffffa0}, 0x0, 0x0, 0x0, [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x500000000000000]}) 03:54:31 executing program 7: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f000000d000)={0xa, 0x4e20}, 0x1c) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}, 0xb}, 0x1c) syz_emit_ethernet(0x3e, &(0x7f00000001c0)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @random="e829f650db0f", [], {@ipv6={0x86dd, {0x0, 0x6, "50a09c", 0x8, 0xffffff11, 0x0, @remote={0xfe, 0x80, [], 0xbb}, @local={0xfe, 0x80, [], 0xaa}, {[], @udp={0x0, 0x4e20, 0x8}}}}}}, &(0x7f0000000040)) syz_emit_ethernet(0x3e, &(0x7f0000000000)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], {@ipv6={0x86dd, {0x0, 0x6, "50a09c", 0x8, 0xffffff11, 0x0, @remote={0xfe, 0x80, [], 0xbb}, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x500], 0xaa}, {[], @udp={0x300, 0x4e20, 0x8}}}}}}, &(0x7f0000000040)) [ 1510.241799] hfsplus: gid requires an argument [ 1510.246492] hfsplus: unable to parse mount options [ 1510.253069] FAULT_INJECTION: forcing a failure. [ 1510.253069] name failslab, interval 1, probability 0, space 0, times 0 [ 1510.264881] CPU: 1 PID: 6464 Comm: syz-executor0 Not tainted 4.18.0-rc4+ #144 [ 1510.272175] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1510.281557] Call Trace: [ 1510.284163] dump_stack+0x1c9/0x2b4 [ 1510.287804] ? dump_stack_print_info.cold.2+0x52/0x52 [ 1510.293013] should_fail.cold.4+0xa/0x1a [ 1510.297090] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 1510.302229] ? lock_downgrade+0x8f0/0x8f0 [ 1510.306411] ? graph_lock+0x170/0x170 [ 1510.310257] ? kasan_check_read+0x11/0x20 [ 1510.314417] ? do_raw_spin_unlock+0xa7/0x2f0 [ 1510.318843] ? find_held_lock+0x36/0x1c0 [ 1510.322919] ? __lock_is_held+0xb5/0x140 [ 1510.327000] ? check_same_owner+0x340/0x340 [ 1510.331333] ? rcu_note_context_switch+0x730/0x730 [ 1510.336272] __should_failslab+0x124/0x180 03:54:31 executing program 3: ioctl$BLKDISCARD(0xffffffffffffffff, 0x1277, &(0x7f0000000180)) r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140)='/dev/snapshot\x00', 0x0, 0x0) fcntl$addseals(0xffffffffffffffff, 0x409, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f0000000000), &(0x7f00000000c0)=0x8) ioctl$EVIOCGLED(0xffffffffffffffff, 0x80404519, &(0x7f0000000580)=""/236) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x3c, 0x0) ioctl$EVIOCGKEYCODE_V2(0xffffffffffffffff, 0x80284504, &(0x7f00000003c0)=""/188) setsockopt$EBT_SO_SET_COUNTERS(r0, 0x0, 0x81, &(0x7f0000000680)={'broute\x00', 0x0, 0x0, 0x0, [], 0x9, &(0x7f0000000040)=[{}, {}], 0x0, [{}, {}, {}, {}, {}, {}, {}, {}, {}]}, 0x108) lstat(&(0x7f0000000080)='./file0\x00', &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0}) getresuid(&(0x7f0000000100)=0x0, &(0x7f0000000240), &(0x7f0000000280)) fstat(r0, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(r2, r3, r4) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c82, 0x0) 03:54:31 executing program 1: r0 = socket(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4301000000000000}, 0xc, &(0x7f0000000900)={&(0x7f0000000040)={0x14, 0x1e, 0x201}, 0x14}, 0x1}, 0x0) [ 1510.340523] should_failslab+0x9/0x14 [ 1510.344378] kmem_cache_alloc_node_trace+0x26f/0x770 [ 1510.349498] ? lock_downgrade+0x8f0/0x8f0 [ 1510.353657] blk_throtl_init+0xca/0x630 [ 1510.357659] ? rcu_is_watching+0x8c/0x150 [ 1510.361833] ? do_raw_spin_trylock+0x1c0/0x1c0 [ 1510.366428] ? blk_throtl_drain+0x800/0x800 [ 1510.370776] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 1510.375826] blkcg_init_queue+0x1ef/0x480 [ 1510.380002] blk_alloc_queue_node+0x9c2/0xf50 [ 1510.384530] ? blk_mq_alloc_rqs+0x7bc/0x9c0 03:54:31 executing program 4: r0 = socket(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0xfe00000000000000}, 0xc, &(0x7f0000000900)={&(0x7f0000000040)={0x14, 0x1e, 0x201}, 0x14}, 0x1}, 0x0) [ 1510.388893] ? blk_init_allocated_queue+0x600/0x600 [ 1510.393923] ? lockdep_init_map+0x9/0x10 [ 1510.397990] ? debug_mutex_init+0x2d/0x60 [ 1510.402151] ? __mutex_init+0x1f7/0x290 [ 1510.406151] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1510.411691] ? __blk_mq_alloc_rq_map+0x17d/0x2e0 [ 1510.416466] ? blk_mq_update_nr_hw_queues+0x510/0x510 [ 1510.421693] blk_mq_init_queue+0x4b/0xb0 [ 1510.425791] loop_add+0x33d/0x9d0 [ 1510.429252] ? loop_lookup+0x105/0x230 [ 1510.433144] ? loop_queue_rq+0x660/0x660 [ 1510.437219] loop_control_ioctl+0x199/0x540 [ 1510.441562] ? loop_add+0x9d0/0x9d0 [ 1510.445199] ? expand_files.part.8+0x9c0/0x9c0 [ 1510.449793] ? kasan_check_write+0x14/0x20 [ 1510.454038] ? __mutex_unlock_slowpath+0x197/0x8c0 [ 1510.458980] ? loop_add+0x9d0/0x9d0 [ 1510.462611] do_vfs_ioctl+0x1de/0x1720 [ 1510.466505] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1510.471272] ? retint_kernel+0x10/0x10 [ 1510.475187] ? ioctl_preallocate+0x300/0x300 [ 1510.479602] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1510.484370] ? retint_kernel+0x10/0x10 [ 1510.488273] ? security_file_ioctl+0x20/0xc0 [ 1510.492686] ? security_file_ioctl+0x27/0xc0 [ 1510.497101] ? security_file_ioctl+0x94/0xc0 [ 1510.501514] ksys_ioctl+0xa9/0xd0 [ 1510.504974] __x64_sys_ioctl+0x73/0xb0 [ 1510.508885] do_syscall_64+0x1b9/0x820 [ 1510.512785] ? finish_task_switch+0x1d3/0x870 [ 1510.517290] ? syscall_return_slowpath+0x5e0/0x5e0 [ 1510.522230] ? syscall_return_slowpath+0x31d/0x5e0 [ 1510.527205] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe [ 1510.532678] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1510.537543] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1510.542740] RIP: 0033:0x455a79 [ 1510.545930] Code: 1d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1510.565307] RSP: 002b:00007f420d477c68 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1510.573029] RAX: ffffffffffffffda RBX: 00007f420d4786d4 RCX: 0000000000455a79 [ 1510.580308] RDX: 0000000000000000 RSI: 0000000000004c80 RDI: 0000000000000016 [ 1510.587601] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 1510.594964] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000017 [ 1510.602237] R13: 00000000004bdfb1 R14: 00000000004ccab0 R15: 0000000000000015 [ 1510.634936] hfsplus: gid requires an argument [ 1510.639603] hfsplus: unable to parse mount options 03:54:32 executing program 2: r0 = syz_open_dev$sndseq(&(0x7f0000dcc000)='/dev/snd/seq\x00', 0x0, 0x2) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x10800, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffff9c, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000040)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_BIND(r1, &(0x7f0000000100)={0x14, 0x88, 0xfa00, {r2, 0x30, 0x0, @in={0x2, 0x4e24, @broadcast=0xffffffff}}}, 0x90) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000418f50)={{0x80}, "0a4ceaa05d9a00000000000000039b3fd4cec307e8ef3d13eb790ec9c65abaf90d229db692542e5b78f8b29e0a27800f0000000000000009fb42f376589701a4", 0xa9824f69d1376637, 0x10800a}) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000240)={0xbf}) write$binfmt_script(r0, &(0x7f0000000000)=ANY=[], 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f00000002c0)={{}, 'port0\x00', 0x40000000000000, 0x0, 0x0, 0x2047}) openat$ipvs(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/sys/net/ipv4/vs/amemthresh\x00', 0x2, 0x0) openat$sequencer2(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer2\x00', 0x0, 0x0) 03:54:32 executing program 0 (fault-call:10 fault-nth:22): r0 = syz_open_dev$vcsa(&(0x7f0000000100)='/dev/vcsa#\x00', 0x5, 0x101000) ioctl$BLKDISCARD(r0, 0x1277, &(0x7f0000000180)=0x5f) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140)='/dev/snapshot\x00', 0x0, 0x0) connect$nfc_llcp(r1, &(0x7f0000000300)={0x27, 0x0, 0x0, 0x6, 0x0, 0x0, "f44825e9da257dcd22512d531f545cf0bce08002f76d5e9bd3d1dcb3f649bf7ba49078f877ce09f903ed489ab0bbf0f088675b47312412edd6bd577062eb34", 0x1c}, 0x60) fcntl$addseals(0xffffffffffffffff, 0x409, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EVIOCGLED(r1, 0x80404519, &(0x7f0000000580)=""/236) ioctl$FS_IOC_SETFSLABEL(r2, 0x41009432, &(0x7f0000000480)="64098ceb11469210e1fa92c76a76762b420a730851d9c9ce1d2745bac5fca8796f1aba309faf35268b4d45ac04ac0ec6f2cebf8f0ac8391dd8cef0da84895505ef6fc4062016210998b92c121630e66d984a620a4a40b4b63bebedc75ae3e140c654a4f80fec3a6af81841856baae4ad83438f32d9e08e5219c8b832403b86aa723d75cb839059d9d094ba7a3510a5acd071b9c1f441886fb396511cb44257e86695b1b4b84218118e0045593d869765e8f850cc6a534e5f114b22d73ba2a903943a32cebbff720180ba6531e240d9a3759e2287b1a64f950a5b1e402580731d395128e3b81fd4c76b233a384200aa015eb779ce7140613e374a38caa9d18b34") r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x3c, 0x0) ioctl$EVIOCGKEYCODE_V2(0xffffffffffffffff, 0x80284504, &(0x7f00000003c0)=""/188) ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x0) 03:54:32 executing program 7: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f000000d000)={0xa, 0x4e20}, 0x1c) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}, 0xb}, 0x1c) syz_emit_ethernet(0x3e, &(0x7f00000001c0)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @random="e829f650db0f", [], {@ipv6={0x86dd, {0x0, 0x6, "50a09c", 0x8, 0xffffff11, 0x0, @remote={0xfe, 0x80, [], 0xbb}, @local={0xfe, 0x80, [], 0xaa}, {[], @udp={0x0, 0x4e20, 0x8}}}}}}, &(0x7f0000000040)) syz_emit_ethernet(0x3e, &(0x7f0000000000)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], {@ipv6={0x86dd, {0x0, 0x6, "50a09c", 0x8, 0xffffff11, 0x0, @remote={0xfe, 0x80, [], 0xbb}, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffa888], 0xaa}, {[], @udp={0x300, 0x4e20, 0x8}}}}}}, &(0x7f0000000040)) 03:54:32 executing program 6: r0 = socket(0x11, 0xa, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) r2 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000180)={'bond_slave_1\x00', 0x0}) setsockopt$packet_add_memb(r1, 0x107, 0x1, &(0x7f0000000000)={r3, 0x8, 0x6, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff]}, 0x10) r4 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer\x00', 0x40000, 0x0) write$P9_RAUTH(r4, &(0x7f0000000100)={0x14, 0x67, 0x1, {0x40, 0x0, 0x8}}, 0x14) setsockopt(r0, 0x9, 0xcd0b, &(0x7f0000000000)="866bedfcfec32c56744b82ba3328639e6fe9722f37a4a83064a6a7ffae0800f0f3cda448bd577bcea1cb3bd999b049a231c1ca8d9da5d772f8f5285282c0922df5661b181fc94c71eabbd84470a6273fcb92e0d76c950806494caf9451eaf1ddc750f617e5653f391bf87d989c5bb11b2a61c8cb5d37e77c61274d14a0383db8453fe8c8b8616c96e4fa36dac4899318ea542769d32beee713031a0005d458dd3c09c03e04fb19dceb", 0xa9) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000640)={0x0, 0x0, 0x0}, &(0x7f0000000680)=0xc) syz_mount_image$hfsplus(&(0x7f0000000240)='hfsplus\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, &(0x7f00000005c0), 0x0, &(0x7f00000006c0)={[{@gid={'gid', 0x3d, r5}, 0x2c}]}) 03:54:32 executing program 5: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer2\x00', 0x0, 0x0) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000040)="025cc83d6d345f8f762070") ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r0, 0x40085112, &(0x7f0000b18000)={{0xffffff93}, {0xffffffa0}, 0x0, 0x0, 0x0, [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800000000000000]}) 03:54:32 executing program 4: r0 = socket(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x130}, 0xc, &(0x7f0000000900)={&(0x7f0000000040)={0x14, 0x1e, 0x201}, 0x14}, 0x1}, 0x0) 03:54:32 executing program 3: ioctl$BLKDISCARD(0xffffffffffffffff, 0x1277, &(0x7f0000000180)) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140)='/dev/snapshot\x00', 0x0, 0x0) fcntl$addseals(0xffffffffffffffff, 0x409, 0x0) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = syz_open_procfs(0x0, &(0x7f0000000240)='net/rt_acct\x00') lseek(r1, 0x4000000, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f0000000000), &(0x7f00000000c0)=0x8) ioctl$EVIOCGLED(0xffffffffffffffff, 0x80404519, &(0x7f0000000580)=""/236) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x3c, 0x0) ioctl$EVIOCGKEYCODE_V2(0xffffffffffffffff, 0x80284504, &(0x7f00000003c0)=""/188) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) r3 = ioctl$LOOP_CTL_GET_FREE(r2, 0x4c82) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c82, r3) 03:54:32 executing program 1: r0 = socket(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x3701000000000000}, 0xc, &(0x7f0000000900)={&(0x7f0000000040)={0x14, 0x1e, 0x201}, 0x14}, 0x1}, 0x0) 03:54:32 executing program 5: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer2\x00', 0x0, 0x0) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000040)="025cc83d6d345f8f762070") ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r0, 0x40085112, &(0x7f0000b18000)={{0xffffff93}, {0xffffffa0}, 0x0, 0x0, 0x0, [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfdfdffff00000000]}) [ 1511.242208] hfsplus: gid requires an argument [ 1511.246849] hfsplus: unable to parse mount options 03:54:32 executing program 4: r0 = socket(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x183}, 0xc, &(0x7f0000000900)={&(0x7f0000000040)={0x14, 0x1e, 0x201}, 0x14}, 0x1}, 0x0) 03:54:32 executing program 7: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f000000d000)={0xa, 0x4e20}, 0x1c) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}, 0xb}, 0x1c) syz_emit_ethernet(0x3e, &(0x7f00000001c0)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @random="e829f650db0f", [], {@ipv6={0x86dd, {0x0, 0x6, "50a09c", 0x8, 0xffffff11, 0x0, @remote={0xfe, 0x80, [], 0xbb}, @local={0xfe, 0x80, [], 0xaa}, {[], @udp={0x0, 0x4e20, 0x8}}}}}}, &(0x7f0000000040)) syz_emit_ethernet(0x3e, &(0x7f0000000000)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], {@ipv6={0x86dd, {0x0, 0x6, "50a09c", 0x8, 0xffffff11, 0x0, @remote={0xfe, 0x80, [], 0xbb}, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffff000], 0xaa}, {[], @udp={0x300, 0x4e20, 0x8}}}}}}, &(0x7f0000000040)) 03:54:32 executing program 1: r0 = socket(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1c000000}, 0xc, &(0x7f0000000900)={&(0x7f0000000040)={0x14, 0x1e, 0x201}, 0x14}, 0x1}, 0x0) 03:54:32 executing program 3: ioctl$BLKDISCARD(0xffffffffffffffff, 0x1277, &(0x7f0000000180)) r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140)='/dev/snapshot\x00', 0x0, 0x0) fcntl$addseals(0xffffffffffffffff, 0x409, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f0000000000)={0x0}, &(0x7f00000000c0)=0x8) ioctl$EVIOCGLED(0xffffffffffffffff, 0x80404519, &(0x7f0000000580)=""/236) getsockopt$inet_sctp6_SCTP_STATUS(r0, 0x84, 0xe, &(0x7f00000001c0)={r2, 0x0, 0x3, 0x2, 0x712, 0x6, 0xfffffffffffffffc, 0x1ff, {r2, @in={{0x2, 0x4e21, @remote={0xac, 0x14, 0x14, 0xbb}}}, 0x2, 0x401, 0x5, 0x2, 0x20}}, &(0x7f0000000040)=0xb0) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000280)='/dev/loop-control\x00', 0x3d, 0x0) ioctl$EVIOCGKEYCODE_V2(0xffffffffffffffff, 0x80284504, &(0x7f00000003c0)=""/188) splice(r1, &(0x7f0000000080), r3, &(0x7f0000000100)=0x40, 0x8, 0x0) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c82, 0x0) [ 1511.321515] FAULT_INJECTION: forcing a failure. [ 1511.321515] name failslab, interval 1, probability 0, space 0, times 0 [ 1511.333174] CPU: 1 PID: 6507 Comm: syz-executor0 Not tainted 4.18.0-rc4+ #144 [ 1511.340469] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1511.349838] Call Trace: [ 1511.352452] dump_stack+0x1c9/0x2b4 [ 1511.356106] ? dump_stack_print_info.cold.2+0x52/0x52 [ 1511.361316] ? pcpu_next_fit_region.constprop.23+0x334/0x410 [ 1511.367160] should_fail.cold.4+0xa/0x1a [ 1511.371241] ? kasan_check_write+0x14/0x20 [ 1511.375508] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 1511.380667] ? graph_lock+0x170/0x170 [ 1511.384513] ? wait_for_completion+0x8d0/0x8d0 [ 1511.389122] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 1511.394164] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1511.398948] ? graph_lock+0x170/0x170 [ 1511.402773] ? find_held_lock+0x36/0x1c0 [ 1511.406856] ? __lock_is_held+0xb5/0x140 [ 1511.410943] ? check_same_owner+0x340/0x340 [ 1511.415281] ? rcu_note_context_switch+0x730/0x730 [ 1511.420228] ? pcpu_balance_workfn+0x1700/0x1700 [ 1511.425005] __should_failslab+0x124/0x180 [ 1511.429273] should_failslab+0x9/0x14 [ 1511.433104] kmem_cache_alloc_node_trace+0x26f/0x770 [ 1511.438221] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 1511.443251] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1511.448021] blkg_alloc+0x124/0x810 [ 1511.451660] ? blkcg_reset_stats+0x3e0/0x3e0 [ 1511.456080] ? debug_check_no_locks_freed+0x8d/0x280 [ 1511.461207] ? __lockdep_init_map+0x105/0x590 [ 1511.465720] ? kasan_check_write+0x14/0x20 [ 1511.469961] ? percpu_ref_init+0x1f8/0x290 [ 1511.474200] ? blk_delay_queue+0x1a0/0x1a0 [ 1511.478443] ? percpu_ref_noop_confirm_switch+0x10/0x10 [ 1511.483824] blkcg_init_queue+0x27/0x480 [ 1511.487895] blk_alloc_queue_node+0x9c2/0xf50 [ 1511.492399] ? print_usage_bug+0xc0/0xc0 [ 1511.496472] ? blk_init_allocated_queue+0x600/0x600 [ 1511.501498] ? lockdep_init_map+0x9/0x10 [ 1511.505562] ? debug_mutex_init+0x2d/0x60 [ 1511.509716] ? __mutex_init+0x1f7/0x290 [ 1511.513703] ? mark_held_locks+0xc9/0x160 [ 1511.517877] ? retint_kernel+0x10/0x10 [ 1511.521772] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1511.526537] ? retint_kernel+0x10/0x10 [ 1511.530435] ? blk_mq_init_queue+0x11/0xb0 [ 1511.534686] blk_mq_init_queue+0x4b/0xb0 [ 1511.538751] loop_add+0x33d/0x9d0 [ 1511.542210] ? loop_lookup+0x105/0x230 [ 1511.546097] ? loop_queue_rq+0x660/0x660 [ 1511.550169] loop_control_ioctl+0x199/0x540 [ 1511.554490] ? loop_add+0x9d0/0x9d0 [ 1511.558118] ? retint_kernel+0x10/0x10 [ 1511.562020] ? do_vfs_ioctl+0x178/0x1720 [ 1511.566085] ? loop_add+0x9d0/0x9d0 [ 1511.569712] do_vfs_ioctl+0x1de/0x1720 [ 1511.573603] ? __lock_is_held+0xb5/0x140 [ 1511.577666] ? ioctl_preallocate+0x300/0x300 [ 1511.582079] ? __fget_light+0x2f7/0x440 [ 1511.586056] ? fget_raw+0x20/0x20 [ 1511.589541] ? retint_kernel+0x10/0x10 [ 1511.593452] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 1511.598472] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1511.603248] ? security_file_ioctl+0x94/0xc0 [ 1511.607660] ksys_ioctl+0xa9/0xd0 [ 1511.611124] __x64_sys_ioctl+0x73/0xb0 [ 1511.615014] do_syscall_64+0x1b9/0x820 [ 1511.618903] ? syscall_slow_exit_work+0x500/0x500 [ 1511.623748] ? syscall_return_slowpath+0x5e0/0x5e0 [ 1511.628685] ? syscall_return_slowpath+0x31d/0x5e0 [ 1511.633640] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe [ 1511.639023] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1511.643889] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1511.649168] RIP: 0033:0x455a79 [ 1511.652350] Code: 1d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1511.671733] RSP: 002b:00007f420d477c68 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1511.679448] RAX: ffffffffffffffda RBX: 00007f420d4786d4 RCX: 0000000000455a79 [ 1511.686720] RDX: 0000000000000000 RSI: 0000000000004c80 RDI: 0000000000000015 [ 1511.693992] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 1511.701261] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000016 [ 1511.708531] R13: 00000000004bdfb1 R14: 00000000004ccab0 R15: 0000000000000016 03:54:33 executing program 3: ioctl$BLKDISCARD(0xffffffffffffffff, 0x1277, &(0x7f0000000180)) r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140)='/dev/snapshot\x00', 0x0, 0x0) openat$cgroup_subtree(r0, &(0x7f0000000100)='cgroup.subtree_control\x00', 0x2, 0x0) fcntl$addseals(0xffffffffffffffff, 0x409, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f0000000000), &(0x7f00000000c0)=0x8) ioctl$EVIOCGLED(0xffffffffffffffff, 0x80404519, &(0x7f0000000580)=""/236) getpeername$inet(r0, &(0x7f0000000040)={0x0, 0x0, @multicast1}, &(0x7f0000000080)=0x10) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x3c, 0x0) ioctl$EVIOCGKEYCODE_V2(0xffffffffffffffff, 0x80284504, &(0x7f00000003c0)=""/188) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c82, 0x0) 03:54:33 executing program 0 (fault-call:10 fault-nth:23): r0 = syz_open_dev$vcsa(&(0x7f0000000100)='/dev/vcsa#\x00', 0x5, 0x101000) ioctl$BLKDISCARD(r0, 0x1277, &(0x7f0000000180)=0x5f) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140)='/dev/snapshot\x00', 0x0, 0x0) connect$nfc_llcp(r1, &(0x7f0000000300)={0x27, 0x0, 0x0, 0x6, 0x0, 0x0, "f44825e9da257dcd22512d531f545cf0bce08002f76d5e9bd3d1dcb3f649bf7ba49078f877ce09f903ed489ab0bbf0f088675b47312412edd6bd577062eb34", 0x1c}, 0x60) fcntl$addseals(0xffffffffffffffff, 0x409, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EVIOCGLED(r1, 0x80404519, &(0x7f0000000580)=""/236) ioctl$FS_IOC_SETFSLABEL(r2, 0x41009432, &(0x7f0000000480)="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") r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x3c, 0x0) ioctl$EVIOCGKEYCODE_V2(0xffffffffffffffff, 0x80284504, &(0x7f00000003c0)=""/188) ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x0) [ 1511.745746] hfsplus: gid requires an argument [ 1511.750391] hfsplus: unable to parse mount options 03:54:33 executing program 1: r0 = socket(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0xbf01}, 0xc, &(0x7f0000000900)={&(0x7f0000000040)={0x14, 0x1e, 0x201}, 0x14}, 0x1}, 0x0) 03:54:33 executing program 5: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer2\x00', 0x0, 0x0) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000040)="025cc83d6d345f8f762070") ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r0, 0x40085112, &(0x7f0000b18000)={{0xffffff93}, {0xffffffa0}, 0x0, 0x0, 0x0, [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f000000]}) 03:54:33 executing program 4: r0 = socket(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0xb8}, 0xc, &(0x7f0000000900)={&(0x7f0000000040)={0x14, 0x1e, 0x201}, 0x14}, 0x1}, 0x0) 03:54:33 executing program 7: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f000000d000)={0xa, 0x4e20}, 0x1c) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}, 0xb}, 0x1c) syz_emit_ethernet(0x3e, &(0x7f00000001c0)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @random="e829f650db0f", [], {@ipv6={0x86dd, {0x0, 0x6, "50a09c", 0x8, 0xffffff11, 0x0, @remote={0xfe, 0x80, [], 0xbb}, @local={0xfe, 0x80, [], 0xaa}, {[], @udp={0x0, 0x4e20, 0x8}}}}}}, &(0x7f0000000040)) syz_emit_ethernet(0x3e, &(0x7f0000000000)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], {@ipv6={0x86dd, {0x0, 0x6, "50a09c", 0x8, 0xffffff11, 0x0, @remote={0xfe, 0x80, [], 0xbb}, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd00], 0xaa}, {[], @udp={0x300, 0x4e20, 0x8}}}}}}, &(0x7f0000000040)) 03:54:33 executing program 6: lstat(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)) r0 = syz_open_dev$vcsa(&(0x7f00000000c0)='/dev/vcsa#\x00', 0x3, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000000100)={{0x1, 0x8}, 'port0\x00', 0x2, 0x80000, 0x7, 0x3ea1, 0x3f8c, 0x10000, 0x5, 0x0, 0x2, 0x6}) r1 = socket(0x11, 0xa, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000640)={0x0, 0x0, 0x0}, &(0x7f0000000680)=0xc) syz_mount_image$hfsplus(&(0x7f0000000240)='hfsplus\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, &(0x7f00000005c0), 0x0, &(0x7f00000006c0)={[{@gid={'gid', 0x3d, r2}, 0x2c}]}) 03:54:33 executing program 2: r0 = syz_open_dev$sndseq(&(0x7f0000dcc000)='/dev/snd/seq\x00', 0x0, 0x2) read(r0, &(0x7f0000fb6000)=""/28, 0x3f0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000418f50)={{0x80}, "0a4ceaa05d9a00000000000000039b3fd4cec307e8ef3d13eb790ec9c65abaf90d229db692542e5b78f8b29e0a27800f0000000000000009fb42f376589701a4", 0xa9824f69d1376637, 0x10800a}) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000240)={0xbf}) write$binfmt_script(r0, &(0x7f0000000000)=ANY=[], 0x0) r1 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$sock_int(r1, 0x1, 0xc, &(0x7f0000000540)=0xe87, 0x4) r2 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000400)='/dev/rfkill\x00', 0x8000, 0x0) sendto$inet6(r2, &(0x7f0000000440)="8ceb78e5f8c8bab3cd733992aabb99fa25bcc542430ed0d58c936bd3ebb18e34ae1b676d3bd214c0aa8ad8f69565ea74136a85f5f598ebae8ce518ad6f22164a527124f62e117ba9f128f7b1a41e75841459", 0x52, 0x20000014, &(0x7f00000004c0)={0xa, 0x4e23, 0x6, @loopback={0x0, 0x1}}, 0x1c) ioctl$KVM_GET_MSRS(r2, 0xc008ae88, &(0x7f0000000680)=ANY=[@ANYBLOB="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"]) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f00000002c0)={{}, 'port0\x00'}) ioctl$KVM_SMI(r2, 0xaeb7) r3 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x80, 0x0) ioctl$KDGETMODE(r3, 0x4b3b, &(0x7f0000000500)) read(r0, &(0x7f00000007c0)=""/156, 0x9c) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffff9c, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000040)={0xffffffffffffffff}, 0x111, 0x7}}, 0xfeac) ioctl$ION_IOC_HEAP_QUERY(r2, 0xc0184908, &(0x7f00000008c0)={0x34, 0x0, &(0x7f0000000880)}) write$RDMA_USER_CM_CMD_MIGRATE_ID(r3, &(0x7f0000000940)={0x12, 0x10, 0xfa00, {&(0x7f0000000900), r4, r3}}, 0x18) write$RDMA_USER_CM_CMD_INIT_QP_ATTR(r3, &(0x7f00000001c0)={0xb, 0x10, 0xfa00, {&(0x7f0000000100), r4, 0x9}}, 0x18) r5 = openat$sequencer2(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer2\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(r0, 0x84, 0x7b, &(0x7f0000000080)={0x0, 0x9}, &(0x7f0000000380)=0x8) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r5, 0x84, 0xa, &(0x7f00000003c0)={0x520d, 0xf6f, 0x4, 0x3, 0x8, 0x1ff, 0x2, 0x81c, r6}, 0x20) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_CLIENT(r0, 0xc04c5349, &(0x7f0000000580)={0x20000000000000, 0x6, 0x1}) getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(r2, 0x84, 0x13, &(0x7f0000000600)={r6}, &(0x7f0000000640)=0x8) 03:54:33 executing program 3: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x4000, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_LOCK(r0, 0x40405514, &(0x7f0000000080)={0x9, 0x5, 0x81, 0x4, '\x00', 0x1}) ioctl$BLKDISCARD(0xffffffffffffffff, 0x1277, &(0x7f0000000180)) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140)='/dev/snapshot\x00', 0x0, 0x0) fcntl$addseals(0xffffffffffffffff, 0x409, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f0000000000), &(0x7f00000000c0)=0x8) ioctl$EVIOCGLED(0xffffffffffffffff, 0x80404519, &(0x7f0000000580)=""/236) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x404, 0x0) ioctl$EVIOCGKEYCODE_V2(0xffffffffffffffff, 0x80284504, &(0x7f00000003c0)=""/188) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c82, 0x0) 03:54:33 executing program 1: r0 = socket(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1a1}, 0xc, &(0x7f0000000900)={&(0x7f0000000040)={0x14, 0x1e, 0x201}, 0x14}, 0x1}, 0x0) 03:54:33 executing program 4: r0 = socket(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x9500000000000000}, 0xc, &(0x7f0000000900)={&(0x7f0000000040)={0x14, 0x1e, 0x201}, 0x14}, 0x1}, 0x0) [ 1512.022017] FAULT_INJECTION: forcing a failure. [ 1512.022017] name failslab, interval 1, probability 0, space 0, times 0 [ 1512.034377] CPU: 1 PID: 6532 Comm: syz-executor0 Not tainted 4.18.0-rc4+ #144 [ 1512.041668] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1512.051024] Call Trace: [ 1512.053620] dump_stack+0x1c9/0x2b4 [ 1512.057256] ? dump_stack_print_info.cold.2+0x52/0x52 [ 1512.062458] should_fail.cold.4+0xa/0x1a [ 1512.066526] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 1512.071641] ? __schedule+0x884/0x1ed0 [ 1512.075541] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1512.080302] ? __sched_text_start+0x8/0x8 [ 1512.084452] ? retint_kernel+0x10/0x10 [ 1512.088351] ? __lock_is_held+0xb5/0x140 [ 1512.092429] ? check_same_owner+0x340/0x340 [ 1512.096761] __should_failslab+0x124/0x180 [ 1512.101004] should_failslab+0x9/0x14 [ 1512.104817] kmem_cache_alloc_node_trace+0x26f/0x770 [ 1512.109944] ? lock_downgrade+0x8f0/0x8f0 [ 1512.114112] blk_throtl_init+0xca/0x630 [ 1512.118102] ? rcu_is_watching+0x8c/0x150 [ 1512.122256] ? blk_throtl_drain+0x800/0x800 [ 1512.126618] ? _raw_spin_unlock_irq+0x56/0x70 [ 1512.131148] blkcg_init_queue+0x1ef/0x480 [ 1512.135305] blk_alloc_queue_node+0x9c2/0xf50 [ 1512.139803] ? blk_mq_alloc_rqs+0x7bc/0x9c0 [ 1512.144138] ? blk_init_allocated_queue+0x600/0x600 [ 1512.149159] ? lockdep_init_map+0x9/0x10 [ 1512.153223] ? debug_mutex_init+0x2d/0x60 [ 1512.157373] ? __mutex_init+0x1f7/0x290 [ 1512.161367] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1512.166912] ? __blk_mq_alloc_rq_map+0x17d/0x2e0 [ 1512.171700] ? blk_mq_update_nr_hw_queues+0x510/0x510 [ 1512.176904] blk_mq_init_queue+0x4b/0xb0 [ 1512.180972] loop_add+0x33d/0x9d0 [ 1512.184429] ? loop_lookup+0x105/0x230 [ 1512.188322] ? loop_queue_rq+0x660/0x660 [ 1512.192392] loop_control_ioctl+0x199/0x540 [ 1512.196717] ? loop_add+0x9d0/0x9d0 [ 1512.200347] ? expand_files.part.8+0x9c0/0x9c0 [ 1512.204969] ? kasan_check_write+0x14/0x20 [ 1512.209212] ? __mutex_unlock_slowpath+0x197/0x8c0 [ 1512.214146] ? loop_add+0x9d0/0x9d0 [ 1512.217780] do_vfs_ioctl+0x1de/0x1720 03:54:33 executing program 7: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f000000d000)={0xa, 0x4e20}, 0x1c) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}, 0xb}, 0x1c) syz_emit_ethernet(0x3e, &(0x7f00000001c0)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @random="e829f650db0f", [], {@ipv6={0x86dd, {0x0, 0x6, "50a09c", 0x8, 0xffffff11, 0x0, @remote={0xfe, 0x80, [], 0xbb}, @local={0xfe, 0x80, [], 0xaa}, {[], @udp={0x0, 0x4e20, 0x8}}}}}}, &(0x7f0000000040)) syz_emit_ethernet(0x3e, &(0x7f0000000000)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], {@ipv6={0x86dd, {0x0, 0x6, "50a09c", 0x8, 0xffffff11, 0x0, @remote={0xfe, 0x80, [], 0xbb}, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80350000], 0xaa}, {[], @udp={0x300, 0x4e20, 0x8}}}}}}, &(0x7f0000000040)) 03:54:33 executing program 5: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer2\x00', 0x0, 0x0) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000040)="025cc83d6d345f8f762070") ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r0, 0x40085112, &(0x7f0000b18000)={{0xffffff93}, {0xffffffa0}, 0x0, 0x0, 0x0, [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5000000]}) [ 1512.221671] ? __lock_is_held+0xb5/0x140 [ 1512.225741] ? ioctl_preallocate+0x300/0x300 [ 1512.230151] ? __fget_light+0x2f7/0x440 [ 1512.234139] ? fget_raw+0x20/0x20 [ 1512.237618] ? __sb_end_write+0xac/0xe0 [ 1512.241622] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1512.247195] ? fput+0x130/0x1a0 [ 1512.250488] ? ksys_write+0x1ae/0x260 [ 1512.254303] ? security_file_ioctl+0x94/0xc0 [ 1512.258728] ksys_ioctl+0xa9/0xd0 [ 1512.262203] __x64_sys_ioctl+0x73/0xb0 [ 1512.266109] do_syscall_64+0x1b9/0x820 [ 1512.270005] ? finish_task_switch+0x1d3/0x870 [ 1512.274523] ? syscall_return_slowpath+0x5e0/0x5e0 [ 1512.279477] ? syscall_return_slowpath+0x31d/0x5e0 [ 1512.284435] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe [ 1512.289851] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1512.294745] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1512.299951] RIP: 0033:0x455a79 [ 1512.303179] Code: 1d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1512.322530] RSP: 002b:00007f420d477c68 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1512.330260] RAX: ffffffffffffffda RBX: 00007f420d4786d4 RCX: 0000000000455a79 [ 1512.337543] RDX: 0000000000000000 RSI: 0000000000004c80 RDI: 0000000000000015 [ 1512.344827] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 1512.352101] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000016 [ 1512.359373] R13: 00000000004bdfb1 R14: 00000000004ccab0 R15: 0000000000000017 03:54:33 executing program 3: ioctl$BLKDISCARD(0xffffffffffffffff, 0x1277, &(0x7f0000000180)) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000040)='/dev/snapshot\x00', 0x0, 0x0) fcntl$addseals(0xffffffffffffffff, 0x409, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f0000000000), &(0x7f00000000c0)=0x8) ioctl$EVIOCGLED(0xffffffffffffffff, 0x80404519, &(0x7f0000000580)=""/236) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x3c, 0x0) geteuid() ioctl$EVIOCGKEYCODE_V2(0xffffffffffffffff, 0x80284504, &(0x7f00000003c0)=""/188) writev(r0, &(0x7f0000000680)=[{&(0x7f00000001c0)="d69d8fb66b4b5b0f72b2c0c4b337e73b2b48c83f18c43f23ebd888c055bb2690438998e1c0f94a8e18acda4f8f1f385ee3f3d6b42cda634c54d5de6fd7ff4034cabbaf52709c1293a9e09941c61b127fae6fd21df0a768d01230ff6d23d574594978265d06a5fe846b3329c46ab1272cfb0ac1213c51442fabc0e10a1af1ab647b2f1969ec51503aed2bde641e1e97dab295d86618", 0x95}, {&(0x7f0000000080)="be52d955404566aa623004112bbbc410600bf0cd517acafbbd37217019fe", 0x1e}, {&(0x7f0000000300)="8b39d33438d3467faacc30e70a7dd7e8765a8740e5c888f26086696e7c0aeb99d6d8d4d1a7a7e572da1bca420e0caa513caa64e51ac90479232835fa31128b702f5e7c3dc97aa83cc9e7ce30a0ada95890234bb0a8f0a3743a9c488fc5adacca14f71aa5fb64a788b0372d92d12c9822c386aa5899ccd85fe43848e7948c82ff9a6149e91d9c7e2b2d7433e11671098c80e1bca6c9d5", 0x96}, {&(0x7f0000000100)="e0709b9986eb00668472b2212f0158e2b3486d9fa1d6f0a2466cc71beb65edf2a1b4b085d3327e9fc15220f26f4aa86dbe4bbb9ce36dcb51dc144fdd819c8a9b90e65c6cc4d029", 0x47}, {&(0x7f0000000480)="5787a540f0bbb59580e109ae96f46ebe87cf4d6fc4bf219760dc144a9eaf0e466745e23361d634dc37898228176ddff09065d6c0e7eacad13c7c5636c213e2d9b590da93e2bcb9c819d4a71bcfd6e8326f38450756e98f1ddc8b156ba30ed292fe7ea77c26167342abee59ab809ed86face2864d89099ac13df2c65ef9e9b5f4dbbb22feca2e9470b64c2cc711959e81a120b97bcfa92d52c1b94783bcb5b09046", 0xa1}], 0x5) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c82, 0x0) 03:54:33 executing program 0 (fault-call:10 fault-nth:24): r0 = syz_open_dev$vcsa(&(0x7f0000000100)='/dev/vcsa#\x00', 0x5, 0x101000) ioctl$BLKDISCARD(r0, 0x1277, &(0x7f0000000180)=0x5f) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140)='/dev/snapshot\x00', 0x0, 0x0) connect$nfc_llcp(r1, &(0x7f0000000300)={0x27, 0x0, 0x0, 0x6, 0x0, 0x0, "f44825e9da257dcd22512d531f545cf0bce08002f76d5e9bd3d1dcb3f649bf7ba49078f877ce09f903ed489ab0bbf0f088675b47312412edd6bd577062eb34", 0x1c}, 0x60) fcntl$addseals(0xffffffffffffffff, 0x409, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EVIOCGLED(r1, 0x80404519, &(0x7f0000000580)=""/236) ioctl$FS_IOC_SETFSLABEL(r2, 0x41009432, &(0x7f0000000480)="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") r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x3c, 0x0) ioctl$EVIOCGKEYCODE_V2(0xffffffffffffffff, 0x80284504, &(0x7f00000003c0)=""/188) ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x0) 03:54:34 executing program 1: r0 = socket(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0xed00000000000000}, 0xc, &(0x7f0000000900)={&(0x7f0000000040)={0x14, 0x1e, 0x201}, 0x14}, 0x1}, 0x0) [ 1512.401832] hfsplus: gid requires an argument [ 1512.406557] hfsplus: unable to parse mount options 03:54:34 executing program 7: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f000000d000)={0xa, 0x4e20}, 0x1c) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}, 0xb}, 0x1c) syz_emit_ethernet(0x3e, &(0x7f00000001c0)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @random="e829f650db0f", [], {@ipv6={0x86dd, {0x0, 0x6, "50a09c", 0x8, 0xffffff11, 0x0, @remote={0xfe, 0x80, [], 0xbb}, @local={0xfe, 0x80, [], 0xaa}, {[], @udp={0x0, 0x4e20, 0x8}}}}}}, &(0x7f0000000040)) syz_emit_ethernet(0x3e, &(0x7f0000000000)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], {@ipv6={0x86dd, {0x0, 0x6, "50a09c", 0x8, 0xffffff11, 0x0, @remote={0xfe, 0x80, [], 0xbb}, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800e], 0xaa}, {[], @udp={0x300, 0x4e20, 0x8}}}}}}, &(0x7f0000000040)) 03:54:34 executing program 5: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer2\x00', 0x0, 0x0) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000040)="025cc83d6d345f8f762070") ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r0, 0x40085112, &(0x7f0000b18000)={{0xffffff93}, {0xffffffa0}, 0x0, 0x0, 0x0, [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff030000]}) 03:54:34 executing program 6: r0 = socket(0x11, 0xa, 0x0) getsockopt$inet_mtu(r0, 0x0, 0xa, &(0x7f0000000040), &(0x7f00000000c0)=0x4) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000640), &(0x7f0000000680)=0xc) recvmmsg(r1, &(0x7f0000000000), 0x0, 0x40, 0x0) syz_mount_image$hfsplus(&(0x7f0000000240)='hfsplus\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0xfffffffffffffffd, &(0x7f0000000100)=ANY=[@ANYBLOB="4a236e5930ac2b13f471ba336e9434e169d8cc77c404e6a2ef918a5975459e3731c1648e02ed5acdcdcd84b5cc6861c5fccca11fee8a488b241d5ba32f61731baa"]) [ 1512.458375] hfsplus: gid requires an argument [ 1512.463088] hfsplus: unable to parse mount options 03:54:34 executing program 4: r0 = socket(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0xa800}, 0xc, &(0x7f0000000900)={&(0x7f0000000040)={0x14, 0x1e, 0x201}, 0x14}, 0x1}, 0x0) 03:54:34 executing program 7: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f000000d000)={0xa, 0x4e20}, 0x1c) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}, 0xb}, 0x1c) syz_emit_ethernet(0x3e, &(0x7f00000001c0)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @random="e829f650db0f", [], {@ipv6={0x86dd, {0x0, 0x6, "50a09c", 0x8, 0xffffff11, 0x0, @remote={0xfe, 0x80, [], 0xbb}, @local={0xfe, 0x80, [], 0xaa}, {[], @udp={0x0, 0x4e20, 0x8}}}}}}, &(0x7f0000000040)) syz_emit_ethernet(0x3e, &(0x7f0000000000)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], {@ipv6={0x86dd, {0x0, 0x6, "50a09c", 0x8, 0xffffff11, 0x0, @remote={0xfe, 0x80, [], 0xbb}, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8060000], 0xaa}, {[], @udp={0x300, 0x4e20, 0x8}}}}}}, &(0x7f0000000040)) 03:54:34 executing program 1: r0 = socket(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0xa000000}, 0xc, &(0x7f0000000900)={&(0x7f0000000040)={0x14, 0x1e, 0x201}, 0x14}, 0x1}, 0x0) 03:54:34 executing program 3: ioctl$BLKDISCARD(0xffffffffffffffff, 0x1277, &(0x7f0000000180)) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140)='/dev/snapshot\x00', 0x0, 0x0) fcntl$addseals(0xffffffffffffffff, 0x409, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f0000000000)={0x0, 0x4080000000000}, &(0x7f00000000c0)=0x9c) ioctl$EVIOCGLED(0xffffffffffffffff, 0x80404519, &(0x7f0000000580)=""/236) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x3c, 0x0) ioctl$EVIOCGKEYCODE_V2(0xffffffffffffffff, 0x80284504, &(0x7f00000003c0)=""/188) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c82, 0x0) [ 1512.737442] FAULT_INJECTION: forcing a failure. [ 1512.737442] name failslab, interval 1, probability 0, space 0, times 0 [ 1512.749093] CPU: 1 PID: 6572 Comm: syz-executor0 Not tainted 4.18.0-rc4+ #144 [ 1512.756385] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1512.765752] Call Trace: [ 1512.768358] dump_stack+0x1c9/0x2b4 [ 1512.772016] ? dump_stack_print_info.cold.2+0x52/0x52 [ 1512.777245] should_fail.cold.4+0xa/0x1a [ 1512.781337] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 1512.786467] ? __debug_object_init+0x581/0x12e0 [ 1512.791160] ? print_usage_bug+0xc0/0xc0 [ 1512.795251] ? graph_lock+0x170/0x170 [ 1512.799339] ? debug_object_free+0x690/0x690 [ 1512.803783] ? find_held_lock+0x36/0x1c0 [ 1512.807886] ? __lock_is_held+0xb5/0x140 [ 1512.812023] ? check_same_owner+0x340/0x340 [ 1512.816375] ? rcu_note_context_switch+0x730/0x730 [ 1512.821344] __should_failslab+0x124/0x180 [ 1512.825618] should_failslab+0x9/0x14 [ 1512.829446] kmem_cache_alloc_node_trace+0x26f/0x770 [ 1512.834621] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1512.839418] throtl_pd_alloc+0xdd/0x980 [ 1512.843420] ? blk_throtl_dispatch_work_fn+0x4b0/0x4b0 [ 1512.848767] ? _raw_spin_unlock_irq+0x56/0x70 [ 1512.853305] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1512.858880] ? blk_throtl_dispatch_work_fn+0x4b0/0x4b0 [ 1512.864207] blkcg_activate_policy+0xf4/0x580 [ 1512.868731] blk_throtl_init+0x3d3/0x630 [ 1512.872804] ? blk_throtl_drain+0x800/0x800 [ 1512.877138] ? _raw_spin_unlock_irq+0x56/0x70 [ 1512.881641] blkcg_init_queue+0x1ef/0x480 [ 1512.885804] blk_alloc_queue_node+0x9c2/0xf50 [ 1512.890308] ? blk_mq_alloc_rqs+0x7bc/0x9c0 [ 1512.894646] ? blk_init_allocated_queue+0x600/0x600 [ 1512.899673] ? mark_held_locks+0xc9/0x160 [ 1512.903837] ? retint_kernel+0x10/0x10 [ 1512.907739] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 1512.912770] ? mark_held_locks+0xc9/0x160 [ 1512.916927] ? retint_kernel+0x10/0x10 [ 1512.921004] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 1512.926033] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1512.930803] ? retint_kernel+0x10/0x10 [ 1512.934706] blk_mq_init_queue+0x4b/0xb0 [ 1512.938770] loop_add+0x33d/0x9d0 [ 1512.942226] ? loop_queue_rq+0x660/0x660 [ 1512.946301] loop_control_ioctl+0x199/0x540 [ 1512.950638] ? loop_add+0x9d0/0x9d0 [ 1512.954274] ? expand_files.part.8+0x9c0/0x9c0 [ 1512.958862] ? kasan_check_write+0x14/0x20 [ 1512.963109] ? __mutex_unlock_slowpath+0x197/0x8c0 [ 1512.968057] ? loop_add+0x9d0/0x9d0 [ 1512.971694] do_vfs_ioctl+0x1de/0x1720 [ 1512.975597] ? __lock_is_held+0xb5/0x140 [ 1512.979669] ? ioctl_preallocate+0x300/0x300 [ 1512.984084] ? __fget_light+0x2f7/0x440 [ 1512.988758] ? fget_raw+0x20/0x20 [ 1512.992223] ? retint_kernel+0x10/0x10 [ 1512.996124] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 1513.001152] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1513.005938] ? security_file_ioctl+0x94/0xc0 [ 1513.010362] ksys_ioctl+0xa9/0xd0 [ 1513.013828] __x64_sys_ioctl+0x73/0xb0 [ 1513.017734] do_syscall_64+0x1b9/0x820 [ 1513.021633] ? syscall_slow_exit_work+0x500/0x500 [ 1513.026487] ? syscall_return_slowpath+0x5e0/0x5e0 [ 1513.031435] ? syscall_return_slowpath+0x31d/0x5e0 [ 1513.036379] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1513.041925] ? retint_user+0x18/0x18 [ 1513.045651] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1513.050509] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1513.055710] RIP: 0033:0x455a79 [ 1513.058894] Code: 1d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1513.078276] RSP: 002b:00007f420d477c68 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1513.086020] RAX: ffffffffffffffda RBX: 00007f420d4786d4 RCX: 0000000000455a79 [ 1513.093294] RDX: 0000000000000000 RSI: 0000000000004c80 RDI: 0000000000000015 [ 1513.100674] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 1513.107949] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000016 [ 1513.115223] R13: 00000000004bdfb1 R14: 00000000004ccab0 R15: 0000000000000018 03:54:34 executing program 2: r0 = dup3(0xffffffffffffff9c, 0xffffffffffffffff, 0x80000) getsockopt$ARPT_SO_GET_INFO(r0, 0x0, 0x60, &(0x7f0000000400)={'filter\x00'}, &(0x7f0000000000)=0x44) r1 = syz_open_dev$sndseq(&(0x7f0000dcc000)='/dev/snd/seq\x00', 0x0, 0x2) read(r1, &(0x7f0000fb6000)=""/28, 0x3f0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r1, 0xc0a85320, &(0x7f0000418f50)={{0x80}, "0a4ceaa05d9a00000000000000039b3fd4cec307e8ef3d13eb790ec9c65abaf90d229db692542e5b78f8b29e0a27800f0000000000000009fb42f376589701a4", 0xa9824f69d1376637, 0x10800a}) r2 = openat$uinput(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/uinput\x00', 0x101000, 0x0) ioctl$KVM_GET_DEBUGREGS(r2, 0x8080aea1, &(0x7f00000001c0)) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRS(0xffffffffffffff9c, 0x84, 0x6d, &(0x7f0000000100)={0x0, 0x8b, "ac05cf9c3938c1f3ca983455a3bafa034d8d41e025c5ad280500c2b9045f76c5a370c80a4577eeb707515c0c8dac04ffd6da9d918402e1efbe1f8067fdd96c762d0f47dac41bd6eff27d228c42cfe16a0bea7520983c5d2ee27317fd0981007c79b0ca81d6bb0f00a20d9eb190a649acb0c0e84fac5fc41ba28f98305f490a9d1b8c2747d6acc74b633362"}, &(0x7f0000000040)=0x93) setsockopt$inet_sctp_SCTP_CONTEXT(r2, 0x84, 0x11, &(0x7f0000000080)={r3, 0xec}, 0x8) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r1, 0x4040534e, &(0x7f0000000240)={0xbf}) write$binfmt_script(r1, &(0x7f0000000000)=ANY=[], 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r1, 0xc0a85320, &(0x7f00000002c0)={{}, 'port0\x00'}) openat$sequencer2(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer2\x00', 0x0, 0x0) 03:54:34 executing program 5: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer2\x00', 0x0, 0x0) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000040)="025cc83d6d345f8f762070") ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r0, 0x40085112, &(0x7f0000b18000)={{0xffffff93}, {0xffffffa0}, 0x0, 0x0, 0x0, [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000]}) 03:54:34 executing program 1: r0 = socket(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x73000000}, 0xc, &(0x7f0000000900)={&(0x7f0000000040)={0x14, 0x1e, 0x201}, 0x14}, 0x1}, 0x0) 03:54:34 executing program 6: r0 = socket(0x4, 0x10000000000a, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000640)={0x0, 0x0, 0x0}, &(0x7f0000000680)=0xc) syz_mount_image$hfsplus(&(0x7f0000000240)='hfsplus\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, &(0x7f00000005c0), 0x0, &(0x7f00000006c0)={[{@gid={'gid', 0x3d, r1}, 0x2c}]}) getsockopt$XDP_MMAP_OFFSETS(r0, 0x11b, 0x1, &(0x7f0000000000), &(0x7f0000000080)=0x60) 03:54:34 executing program 3: ioctl$BLKDISCARD(0xffffffffffffffff, 0x1277, &(0x7f0000000180)) r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140)='/dev/snapshot\x00', 0x0, 0x0) ioctl$sock_inet_udp_SIOCINQ(r0, 0x541b, &(0x7f0000000040)) fcntl$addseals(0xffffffffffffffff, 0x409, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f0000000000), &(0x7f00000000c0)=0x8) ioctl$EVIOCGLED(0xffffffffffffffff, 0x80404519, &(0x7f0000000580)=""/236) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x3c, 0x0) ioctl$EVIOCGKEYCODE_V2(0xffffffffffffffff, 0x80284504, &(0x7f00000003c0)=""/188) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c82, 0x0) 03:54:34 executing program 4: r0 = socket(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x7100}, 0xc, &(0x7f0000000900)={&(0x7f0000000040)={0x14, 0x1e, 0x201}, 0x14}, 0x1}, 0x0) 03:54:34 executing program 0 (fault-call:10 fault-nth:25): r0 = syz_open_dev$vcsa(&(0x7f0000000100)='/dev/vcsa#\x00', 0x5, 0x101000) ioctl$BLKDISCARD(r0, 0x1277, &(0x7f0000000180)=0x5f) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140)='/dev/snapshot\x00', 0x0, 0x0) connect$nfc_llcp(r1, &(0x7f0000000300)={0x27, 0x0, 0x0, 0x6, 0x0, 0x0, "f44825e9da257dcd22512d531f545cf0bce08002f76d5e9bd3d1dcb3f649bf7ba49078f877ce09f903ed489ab0bbf0f088675b47312412edd6bd577062eb34", 0x1c}, 0x60) fcntl$addseals(0xffffffffffffffff, 0x409, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EVIOCGLED(r1, 0x80404519, &(0x7f0000000580)=""/236) ioctl$FS_IOC_SETFSLABEL(r2, 0x41009432, &(0x7f0000000480)="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") r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x3c, 0x0) ioctl$EVIOCGKEYCODE_V2(0xffffffffffffffff, 0x80284504, &(0x7f00000003c0)=""/188) ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x0) 03:54:34 executing program 7: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f000000d000)={0xa, 0x4e20}, 0x1c) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}, 0xb}, 0x1c) syz_emit_ethernet(0x3e, &(0x7f00000001c0)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @random="e829f650db0f", [], {@ipv6={0x86dd, {0x0, 0x6, "50a09c", 0x8, 0xffffff11, 0x0, @remote={0xfe, 0x80, [], 0xbb}, @local={0xfe, 0x80, [], 0xaa}, {[], @udp={0x0, 0x4e20, 0x8}}}}}}, &(0x7f0000000040)) syz_emit_ethernet(0x3e, &(0x7f0000000000)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], {@ipv6={0x86dd, {0x0, 0x6, "50a09c", 0x8, 0xffffff11, 0x0, @remote={0xfe, 0x80, [], 0xbb}, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x86ddffff], 0xaa}, {[], @udp={0x300, 0x4e20, 0x8}}}}}}, &(0x7f0000000040)) 03:54:35 executing program 4: r0 = socket(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x99}, 0xc, &(0x7f0000000900)={&(0x7f0000000040)={0x14, 0x1e, 0x201}, 0x14}, 0x1}, 0x0) 03:54:35 executing program 7: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f000000d000)={0xa, 0x4e20}, 0x1c) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}, 0xb}, 0x1c) syz_emit_ethernet(0x3e, &(0x7f00000001c0)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @random="e829f650db0f", [], {@ipv6={0x86dd, {0x0, 0x6, "50a09c", 0x8, 0xffffff11, 0x0, @remote={0xfe, 0x80, [], 0xbb}, @local={0xfe, 0x80, [], 0xaa}, {[], @udp={0x0, 0x4e20, 0x8}}}}}}, &(0x7f0000000040)) syz_emit_ethernet(0x3e, &(0x7f0000000000)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], {@ipv6={0x86dd, {0x0, 0x6, "50a09c", 0x8, 0xffffff11, 0x0, @remote={0xfe, 0x80, [], 0xbb}, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3000000], 0xaa}, {[], @udp={0x300, 0x4e20, 0x8}}}}}}, &(0x7f0000000040)) 03:54:35 executing program 5: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer2\x00', 0x0, 0x0) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000040)="025cc83d6d345f8f762070") ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r0, 0x40085112, &(0x7f0000b18000)={{0xffffff93}, {0xffffffa0}, 0x0, 0x0, 0x0, [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff03]}) 03:54:35 executing program 3: ioctl$BLKDISCARD(0xffffffffffffffff, 0x1277, &(0x7f0000000180)) r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140)='/dev/snapshot\x00', 0x0, 0x0) fcntl$addseals(0xffffffffffffffff, 0x409, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(r0, &(0x7f00000069c0)=[{{&(0x7f0000000040)=@sco, 0x80, &(0x7f0000000280)=[{&(0x7f0000000100)=""/21, 0x15}, {&(0x7f00000001c0)=""/142, 0x8e}, {&(0x7f0000000480)=""/244, 0xf4}], 0x3, &(0x7f0000000300)=""/167, 0xa7, 0x8}, 0x7}, {{&(0x7f0000000680)=@nl, 0x80, &(0x7f0000000880)=[{&(0x7f0000000700)=""/111, 0x6f}, {&(0x7f0000000780)=""/143, 0x8f}, {&(0x7f0000000840)=""/7, 0x7}], 0x3, 0x0, 0x0, 0x401}, 0x9}, {{&(0x7f00000008c0)=@in6, 0x80, &(0x7f0000001d40)=[{&(0x7f0000000940)=""/75, 0x4b}, {&(0x7f00000009c0)=""/4096, 0x1000}, {&(0x7f00000019c0)=""/97, 0x61}, {&(0x7f0000001a40)=""/188, 0xbc}, {&(0x7f0000001b00)=""/130, 0x82}, {&(0x7f0000001bc0)=""/200, 0xc8}, {&(0x7f0000001cc0)=""/92, 0x5c}], 0x7, &(0x7f0000001dc0)=""/99, 0x63, 0xb1b}, 0x81}, {{&(0x7f0000001e40)=@in6={0x0, 0x0, 0x0, @dev}, 0x80, &(0x7f0000003240)=[{&(0x7f0000001ec0)=""/27, 0x1b}, {&(0x7f0000001f00)=""/157, 0x9d}, {&(0x7f0000001fc0)=""/122, 0x7a}, {&(0x7f0000002040)=""/145, 0x91}, {&(0x7f0000002100)=""/77, 0x4d}, {&(0x7f0000002180)=""/137, 0x89}, {&(0x7f0000002240)=""/4096, 0x1000}], 0x7, &(0x7f00000032c0)=""/171, 0xab, 0x10001}, 0x5}, {{&(0x7f0000003380)=@generic, 0x80, &(0x7f00000036c0)=[{&(0x7f0000003400)}, {&(0x7f0000003440)=""/77, 0x4d}, {&(0x7f00000034c0)=""/4, 0x4}, {&(0x7f0000003500)}, {&(0x7f0000003540)=""/178, 0xb2}, {&(0x7f0000003600)=""/150, 0x96}], 0x6, 0x0, 0x0, 0x7e2}, 0x5}, {{&(0x7f0000003740)=@pppol2tpv3in6, 0x80, &(0x7f00000049c0)=[{&(0x7f00000037c0)=""/238, 0xee}, {&(0x7f00000038c0)=""/209, 0xd1}, {&(0x7f00000039c0)=""/4096, 0x1000}], 0x3, 0x0, 0x0, 0x3}, 0x6ce5437d}, {{&(0x7f0000004a00)=@pppol2tpv3={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @multicast2}}}, 0x80, &(0x7f0000004c00)=[{&(0x7f0000004a80)}, {&(0x7f0000004ac0)=""/89, 0x59}, {&(0x7f0000004b40)=""/8, 0x8}, {&(0x7f0000004b80)=""/102, 0x66}], 0x4, 0x0, 0x0, 0x401}, 0xb3ab}, {{0x0, 0x0, &(0x7f00000060c0)=[{&(0x7f0000004c40)=""/200, 0xc8}, {&(0x7f0000004d40)=""/4096, 0x1000}, {&(0x7f0000005d40)=""/108, 0x6c}, {&(0x7f0000005dc0)=""/86, 0x56}, {&(0x7f0000005e40)=""/199, 0xc7}, {&(0x7f0000005f40)=""/96, 0x60}, {&(0x7f0000005fc0)=""/132, 0x84}, {&(0x7f0000006080)=""/29, 0x1d}], 0x8, 0x0, 0x0, 0xffffffff000}, 0x40}, {{&(0x7f0000006140)=@xdp={0x0, 0x0, 0x0}, 0x80, &(0x7f0000006880)=[{&(0x7f00000061c0)=""/106, 0x6a}, {&(0x7f0000006240)=""/26, 0x1a}, {&(0x7f0000006280)=""/247, 0xf7}, {&(0x7f0000006380)=""/4, 0x4}, {&(0x7f00000063c0)=""/197, 0xc5}, {&(0x7f00000064c0)=""/153, 0x99}, {&(0x7f0000006580)=""/168, 0xa8}, {&(0x7f0000006640)=""/228, 0xe4}, {&(0x7f0000006740)}, {&(0x7f0000006780)=""/193, 0xc1}], 0xa, &(0x7f0000006940)=""/82, 0x52, 0x1}, 0xf3}], 0x9, 0x10022, &(0x7f0000006c00)) setsockopt$packet_drop_memb(r0, 0x107, 0x2, &(0x7f0000006c40)={r1, 0x1, 0x6, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff]}, 0x10) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f0000000000), &(0x7f00000000c0)=0x8) ioctl$EVIOCGLED(0xffffffffffffffff, 0x80404519, &(0x7f0000000580)=""/236) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x3c, 0x0) ioctl$EVIOCGKEYCODE_V2(0xffffffffffffffff, 0x80284504, &(0x7f00000003c0)=""/188) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c82, 0x0) 03:54:35 executing program 1: r0 = socket(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0xa01}, 0xc, &(0x7f0000000900)={&(0x7f0000000040)={0x14, 0x1e, 0x201}, 0x14}, 0x1}, 0x0) [ 1513.490938] hfsplus: unable to find HFS+ superblock [ 1513.519967] FAULT_INJECTION: forcing a failure. [ 1513.519967] name failslab, interval 1, probability 0, space 0, times 0 [ 1513.531785] CPU: 1 PID: 6619 Comm: syz-executor0 Not tainted 4.18.0-rc4+ #144 [ 1513.539079] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1513.548545] Call Trace: [ 1513.551148] dump_stack+0x1c9/0x2b4 [ 1513.554816] ? dump_stack_print_info.cold.2+0x52/0x52 [ 1513.560053] should_fail.cold.4+0xa/0x1a [ 1513.564159] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 1513.569291] ? save_stack+0x43/0xd0 [ 1513.572952] ? kasan_kmalloc+0xc4/0xe0 [ 1513.576864] ? throtl_pd_alloc+0xdd/0x980 [ 1513.581038] ? blkcg_activate_policy+0xf4/0x580 [ 1513.585739] ? __lock_is_held+0xb5/0x140 [ 1513.589831] ? __lockdep_init_map+0x105/0x590 [ 1513.594355] ? lockdep_init_map+0x9/0x10 [ 1513.598460] ? throtl_pd_offline+0x210/0x210 [ 1513.602922] ? __lock_is_held+0xb5/0x140 [ 1513.607007] __should_failslab+0x124/0x180 [ 1513.611265] should_failslab+0x9/0x14 [ 1513.615077] kmem_cache_alloc_node_trace+0x5a/0x770 [ 1513.620110] ? lock_acquire+0x1e4/0x540 [ 1513.624096] ? blkcg_activate_policy+0x12c/0x580 [ 1513.628869] throtl_pd_alloc+0xdd/0x980 [ 1513.632864] ? blk_throtl_dispatch_work_fn+0x4b0/0x4b0 [ 1513.638171] ? kasan_check_write+0x14/0x20 [ 1513.642417] ? do_raw_spin_lock+0xc1/0x200 [ 1513.646673] ? blk_throtl_dispatch_work_fn+0x4b0/0x4b0 [ 1513.651968] blkcg_activate_policy+0x221/0x580 [ 1513.656610] blk_throtl_init+0x3d3/0x630 [ 1513.660693] ? blk_throtl_drain+0x800/0x800 [ 1513.665039] ? _raw_spin_unlock_irq+0x56/0x70 [ 1513.669550] blkcg_init_queue+0x1ef/0x480 [ 1513.673719] blk_alloc_queue_node+0x9c2/0xf50 [ 1513.678235] ? blk_init_allocated_queue+0x600/0x600 [ 1513.683264] ? lockdep_init_map+0x9/0x10 [ 1513.687337] ? debug_mutex_init+0x2d/0x60 [ 1513.691507] ? __mutex_init+0x1f7/0x290 [ 1513.695509] ? mark_held_locks+0xc9/0x160 [ 1513.699682] ? retint_kernel+0x10/0x10 [ 1513.703596] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 1513.708639] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1513.713429] ? retint_kernel+0x10/0x10 [ 1513.717350] blk_mq_init_queue+0x4b/0xb0 [ 1513.721430] loop_add+0x33d/0x9d0 [ 1513.724904] ? loop_lookup+0x105/0x230 [ 1513.728795] ? loop_queue_rq+0x660/0x660 [ 1513.732870] loop_control_ioctl+0x199/0x540 [ 1513.737200] ? loop_add+0x9d0/0x9d0 [ 1513.740838] ? retint_kernel+0x10/0x10 [ 1513.744745] ? do_vfs_ioctl+0x123/0x1720 [ 1513.748816] ? loop_add+0x9d0/0x9d0 [ 1513.752457] do_vfs_ioctl+0x1de/0x1720 [ 1513.756363] ? __lock_is_held+0xb5/0x140 [ 1513.760440] ? ioctl_preallocate+0x300/0x300 [ 1513.764861] ? __fget_light+0x2f7/0x440 [ 1513.768846] ? fget_raw+0x20/0x20 [ 1513.772311] ? __sb_end_write+0xac/0xe0 [ 1513.776300] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1513.781845] ? fput+0x130/0x1a0 [ 1513.785132] ? ksys_write+0x1ae/0x260 [ 1513.788946] ? security_file_ioctl+0x94/0xc0 [ 1513.794064] ksys_ioctl+0xa9/0xd0 [ 1513.797530] __x64_sys_ioctl+0x73/0xb0 [ 1513.801429] do_syscall_64+0x1b9/0x820 [ 1513.805326] ? syscall_slow_exit_work+0x500/0x500 [ 1513.810181] ? syscall_return_slowpath+0x5e0/0x5e0 [ 1513.815125] ? syscall_return_slowpath+0x31d/0x5e0 [ 1513.820068] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1513.825622] ? retint_user+0x18/0x18 [ 1513.829360] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1513.834227] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1513.839427] RIP: 0033:0x455a79 [ 1513.842615] Code: 1d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1513.862002] RSP: 002b:00007f420d477c68 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1513.869732] RAX: ffffffffffffffda RBX: 00007f420d4786d4 RCX: 0000000000455a79 [ 1513.877013] RDX: 0000000000000000 RSI: 0000000000004c80 RDI: 0000000000000016 [ 1513.884287] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 1513.893004] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000017 [ 1513.900897] R13: 00000000004bdfb1 R14: 00000000004ccab0 R15: 0000000000000019 03:54:35 executing program 1: r0 = socket(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0xf00000000000000}, 0xc, &(0x7f0000000900)={&(0x7f0000000040)={0x14, 0x1e, 0x201}, 0x14}, 0x1}, 0x0) 03:54:35 executing program 1: r0 = socket(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0xd3}, 0xc, &(0x7f0000000900)={&(0x7f0000000040)={0x14, 0x1e, 0x201}, 0x14}, 0x1}, 0x0) 03:54:35 executing program 6: r0 = socket(0x11, 0xb, 0x6) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000640)={0x0, 0x0, 0x0}, &(0x7f0000000680)=0xffffffffffffffdb) syz_mount_image$hfsplus(&(0x7f0000000240)='hfsplus\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, &(0x7f00000005c0), 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="676964ef3d", @ANYRESHEX=r1, @ANYBLOB=',\x00']) ioctl$FS_IOC_FSGETXATTR(r0, 0x801c581f, &(0x7f00000000c0)={0xff, 0x8, 0x10000, 0x8000, 0x1}) fcntl$setpipe(r0, 0x407, 0x8000) accept$inet6(r0, &(0x7f0000000040)={0x0, 0x0, 0x0, @dev}, &(0x7f0000000080)=0x1c) [ 1514.344186] hfsplus: unable to parse mount options [ 1514.386576] hfsplus: unable to parse mount options 03:54:36 executing program 2: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x80000, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r0, 0x4020ae46, &(0x7f0000000040)={0x10200, 0x3, 0x551da1641adacc2b, 0x1000, &(0x7f0000fff000/0x1000)=nil}) r1 = syz_open_dev$sndseq(&(0x7f0000dcc000)='/dev/snd/seq\x00', 0x0, 0x2) read(r1, &(0x7f0000fb6000)=""/28, 0x3f0) write$binfmt_misc(r1, &(0x7f0000000100)={'syz0', "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"}, 0x102) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r1, 0xc0a85320, &(0x7f0000418f50)={{0x80}, "0a4ceaa05d9a00000000000000039b3fd4cec307e8ef3d13eb790ec9c65abaf90d229db692542e5b78f8b29e0a27800f0000000000000009fb42f376589701a4", 0xa9824f69d1376637, 0x10800a}) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r1, 0x4040534e, &(0x7f0000000240)={0xbf}) write$binfmt_script(r1, &(0x7f0000000000)=ANY=[], 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r1, 0xc0a85320, &(0x7f00000002c0)={{}, 'port0\x00', 0x0, 0x0, 0x0, 0x0, 0x8000000100000000, 0x0, 0xf4}) openat$sequencer2(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer2\x00', 0x0, 0x0) 03:54:36 executing program 1: r0 = socket(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0xdd}, 0xc, &(0x7f0000000900)={&(0x7f0000000040)={0x14, 0x1e, 0x201}, 0x14}, 0x1}, 0x0) 03:54:36 executing program 3: ioctl$BLKDISCARD(0xffffffffffffffff, 0x1277, &(0x7f0000000180)) r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140)='/dev/snapshot\x00', 0x0, 0x0) fcntl$addseals(0xffffffffffffffff, 0x409, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) accept4$inet6(r0, &(0x7f0000000040)={0x0, 0x0, 0x0, @remote}, &(0x7f0000000080)=0x1c, 0x80800) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f0000000000), &(0x7f00000000c0)=0x8) ioctl$TIOCSBRK(r0, 0x5427) ioctl$EVIOCGLED(0xffffffffffffffff, 0x80404519, &(0x7f0000000580)=""/236) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x3c, 0x0) ioctl$EVIOCGKEYCODE_V2(0xffffffffffffffff, 0x80284504, &(0x7f00000003c0)=""/188) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) fcntl$setsig(r1, 0xa, 0x15) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c82, 0x0) 03:54:36 executing program 0 (fault-call:10 fault-nth:26): r0 = syz_open_dev$vcsa(&(0x7f0000000100)='/dev/vcsa#\x00', 0x5, 0x101000) ioctl$BLKDISCARD(r0, 0x1277, &(0x7f0000000180)=0x5f) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140)='/dev/snapshot\x00', 0x0, 0x0) connect$nfc_llcp(r1, &(0x7f0000000300)={0x27, 0x0, 0x0, 0x6, 0x0, 0x0, "f44825e9da257dcd22512d531f545cf0bce08002f76d5e9bd3d1dcb3f649bf7ba49078f877ce09f903ed489ab0bbf0f088675b47312412edd6bd577062eb34", 0x1c}, 0x60) fcntl$addseals(0xffffffffffffffff, 0x409, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EVIOCGLED(r1, 0x80404519, &(0x7f0000000580)=""/236) ioctl$FS_IOC_SETFSLABEL(r2, 0x41009432, &(0x7f0000000480)="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") r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x3c, 0x0) ioctl$EVIOCGKEYCODE_V2(0xffffffffffffffff, 0x80284504, &(0x7f00000003c0)=""/188) ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x0) 03:54:36 executing program 4: r0 = socket(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x89010000}, 0xc, &(0x7f0000000900)={&(0x7f0000000040)={0x14, 0x1e, 0x201}, 0x14}, 0x1}, 0x0) 03:54:36 executing program 5: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer2\x00', 0x0, 0x0) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000040)="025cc83d6d345f8f762070") ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r0, 0x40085112, &(0x7f0000b18000)={{0xffffff93}, {0xffffffa0}, 0x0, 0x0, 0x0, [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff03000000000000]}) 03:54:36 executing program 7: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f000000d000)={0xa, 0x4e20}, 0x1c) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}, 0xb}, 0x1c) syz_emit_ethernet(0x3e, &(0x7f00000001c0)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @random="e829f650db0f", [], {@ipv6={0x86dd, {0x0, 0x6, "50a09c", 0x8, 0xffffff11, 0x0, @remote={0xfe, 0x80, [], 0xbb}, @local={0xfe, 0x80, [], 0xaa}, {[], @udp={0x0, 0x4e20, 0x8}}}}}}, &(0x7f0000000040)) syz_emit_ethernet(0x3e, &(0x7f0000000000)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], {@ipv6={0x86dd, {0x0, 0x6, "50a09c", 0x8, 0xffffff11, 0x0, @remote={0xfe, 0x80, [], 0xbb}, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7], 0xaa}, {[], @udp={0x300, 0x4e20, 0x8}}}}}}, &(0x7f0000000040)) 03:54:36 executing program 6: r0 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0x100000000, 0x200040) getsockopt$inet_sctp6_SCTP_AUTOCLOSE(r0, 0x84, 0x4, &(0x7f0000000040), &(0x7f0000000080)=0x4) r1 = socket(0x11, 0xa, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000640)={0x0, 0x0, 0x0}, &(0x7f0000000680)=0xc) syz_mount_image$hfsplus(&(0x7f0000000240)='hfsplus\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, &(0x7f00000005c0), 0x0, &(0x7f00000006c0)=ANY=[@ANYBLOB="01000000", @ANYRESHEX=r2, @ANYBLOB=',\x00']) [ 1514.681899] hfsplus: unable to parse mount options 03:54:36 executing program 7: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f000000d000)={0xa, 0x4e20}, 0x1c) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}, 0xb}, 0x1c) syz_emit_ethernet(0x3e, &(0x7f00000001c0)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @random="e829f650db0f", [], {@ipv6={0x86dd, {0x0, 0x6, "50a09c", 0x8, 0xffffff11, 0x0, @remote={0xfe, 0x80, [], 0xbb}, @local={0xfe, 0x80, [], 0xaa}, {[], @udp={0x0, 0x4e20, 0x8}}}}}}, &(0x7f0000000040)) syz_emit_ethernet(0x3e, &(0x7f0000000000)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], {@ipv6={0x86dd, {0x0, 0x6, "50a09c", 0x8, 0xffffff11, 0x0, @remote={0xfe, 0x80, [], 0xbb}, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x86ddffff00000000], 0xaa}, {[], @udp={0x300, 0x4e20, 0x8}}}}}}, &(0x7f0000000040)) 03:54:36 executing program 1: r0 = socket(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0xe4000000}, 0xc, &(0x7f0000000900)={&(0x7f0000000040)={0x14, 0x1e, 0x201}, 0x14}, 0x1}, 0x0) 03:54:36 executing program 5: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer2\x00', 0x0, 0x0) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000040)="025cc83d6d345f8f762070") ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r0, 0x40085112, &(0x7f0000b18000)={{0xffffff93}, {0xffffffa0}, 0x0, 0x0, 0x0, [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000]}) 03:54:36 executing program 4: r0 = socket(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8f}, 0xc, &(0x7f0000000900)={&(0x7f0000000040)={0x14, 0x1e, 0x201}, 0x14}, 0x1}, 0x0) [ 1514.730378] hfsplus: unable to parse mount options 03:54:36 executing program 3: ioctl$BLKDISCARD(0xffffffffffffffff, 0x1277, &(0x7f0000000180)) r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140)='/dev/snapshot\x00', 0x0, 0x0) fcntl$addseals(0xffffffffffffffff, 0x409, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f0000000000), &(0x7f00000000c0)=0x8) ioctl$EVIOCGLED(r0, 0x80404519, &(0x7f0000000580)=""/236) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x3c, 0x0) ioctl$EVIOCGKEYCODE_V2(0xffffffffffffffff, 0x80284504, &(0x7f00000003c0)=""/188) ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) r2 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r2) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c82, 0x0) sendto$inet(r0, &(0x7f00000001c0)="61d4336f6b6201a1efd99ca884d2b7543ad82a1270dc4389c7647ddb8e465f6cd6116eddde8591ea9c1f385165860c33fa2893d5d794501efc27ac57fe85a9425b8581129e8e011820dd2ab626c00ba1dc73abf18a09ec4869aac374b9dc", 0x5e, 0x24004854, &(0x7f0000000240)={0x2, 0x4e20, @multicast2=0xe0000002}, 0x10) setsockopt$IP_VS_SO_SET_STARTDAEMON(r0, 0x0, 0x48b, &(0x7f0000000040)={0x3, 'bridge0\x00', 0x3}, 0x18) time(&(0x7f0000000100)) socket$inet_dccp(0x2, 0x6, 0x0) ioctl$sock_inet_SIOCSIFPFLAGS(r0, 0x8934, &(0x7f0000000080)={'team_slave_1\x00', 0x8000}) 03:54:36 executing program 6: r0 = socket(0x11, 0xa, 0x0) getsockopt$inet_sctp_SCTP_RECVNXTINFO(r0, 0x84, 0x21, &(0x7f0000000000), &(0x7f0000000040)=0x4) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000640)={0x0, 0x0, 0x0}, &(0x7f0000000680)=0xc) syz_mount_image$hfsplus(&(0x7f0000000240)='hfsplus\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, &(0x7f00000005c0), 0x0, &(0x7f00000006c0)={[{@gid={'gid', 0x3d, r1}, 0x2c}]}) [ 1514.874617] FAULT_INJECTION: forcing a failure. [ 1514.874617] name failslab, interval 1, probability 0, space 0, times 0 [ 1514.886738] CPU: 0 PID: 6665 Comm: syz-executor0 Not tainted 4.18.0-rc4+ #144 [ 1514.894021] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1514.903395] Call Trace: [ 1514.905998] dump_stack+0x1c9/0x2b4 [ 1514.909634] ? dump_stack_print_info.cold.2+0x52/0x52 [ 1514.914866] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1514.919677] should_fail.cold.4+0xa/0x1a [ 1514.923756] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 1514.928873] ? graph_lock+0x170/0x170 [ 1514.932683] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1514.938231] ? mark_held_locks+0xc9/0x160 [ 1514.942387] ? retint_kernel+0x10/0x10 [ 1514.946281] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 1514.951305] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1514.956258] ? __should_failslab+0xea/0x180 [ 1514.960590] __should_failslab+0x124/0x180 [ 1514.964834] should_failslab+0x9/0x14 [ 1514.968643] kmem_cache_alloc_node_trace+0x26f/0x770 [ 1514.973758] ? retint_kernel+0x10/0x10 [ 1514.977666] __kmalloc_node+0x33/0x70 [ 1514.981484] blk_mq_init_allocated_queue+0x228/0x15a0 [ 1514.986688] ? blk_init_allocated_queue+0x600/0x600 [ 1514.991713] ? lockdep_init_map+0x9/0x10 [ 1514.995784] ? blk_mq_map_swqueue+0xae0/0xae0 [ 1515.000285] ? __mutex_init+0x1f7/0x290 [ 1515.004287] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1515.009839] ? __blk_mq_alloc_rq_map+0x17d/0x2e0 [ 1515.014620] ? blk_mq_update_nr_hw_queues+0x510/0x510 [ 1515.019822] blk_mq_init_queue+0x63/0xb0 [ 1515.023898] loop_add+0x33d/0x9d0 [ 1515.027357] ? loop_lookup+0x105/0x230 [ 1515.031251] ? loop_queue_rq+0x660/0x660 [ 1515.035754] ? loop_control_ioctl+0xa0/0x540 [ 1515.040170] loop_control_ioctl+0x199/0x540 [ 1515.044524] ? loop_add+0x9d0/0x9d0 [ 1515.048422] ? expand_files.part.8+0x9c0/0x9c0 [ 1515.053014] ? kasan_check_write+0x14/0x20 [ 1515.057259] ? loop_add+0x9d0/0x9d0 [ 1515.060897] do_vfs_ioctl+0x1de/0x1720 [ 1515.064796] ? ioctl_preallocate+0x300/0x300 [ 1515.069219] ? __fget_light+0x2f7/0x440 [ 1515.073206] ? __schedule+0x1ed0/0x1ed0 [ 1515.077191] ? fget_raw+0x20/0x20 [ 1515.080654] ? __sb_end_write+0xac/0xe0 [ 1515.084641] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1515.090187] ? exit_to_usermode_loop+0x8c/0x370 [ 1515.095685] ? security_file_ioctl+0x94/0xc0 [ 1515.100099] ksys_ioctl+0xa9/0xd0 [ 1515.103564] __x64_sys_ioctl+0x73/0xb0 [ 1515.107461] do_syscall_64+0x1b9/0x820 [ 1515.111354] ? syscall_slow_exit_work+0x500/0x500 [ 1515.116208] ? syscall_return_slowpath+0x5e0/0x5e0 [ 1515.121144] ? syscall_return_slowpath+0x31d/0x5e0 [ 1515.126088] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe [ 1515.131465] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1515.136326] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1515.141533] RIP: 0033:0x455a79 [ 1515.144721] Code: 1d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1515.164102] RSP: 002b:00007f420d477c68 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 03:54:36 executing program 0 (fault-call:10 fault-nth:27): r0 = syz_open_dev$vcsa(&(0x7f0000000100)='/dev/vcsa#\x00', 0x5, 0x101000) ioctl$BLKDISCARD(r0, 0x1277, &(0x7f0000000180)=0x5f) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140)='/dev/snapshot\x00', 0x0, 0x0) connect$nfc_llcp(r1, &(0x7f0000000300)={0x27, 0x0, 0x0, 0x6, 0x0, 0x0, "f44825e9da257dcd22512d531f545cf0bce08002f76d5e9bd3d1dcb3f649bf7ba49078f877ce09f903ed489ab0bbf0f088675b47312412edd6bd577062eb34", 0x1c}, 0x60) fcntl$addseals(0xffffffffffffffff, 0x409, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EVIOCGLED(r1, 0x80404519, &(0x7f0000000580)=""/236) ioctl$FS_IOC_SETFSLABEL(r2, 0x41009432, &(0x7f0000000480)="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") r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x3c, 0x0) ioctl$EVIOCGKEYCODE_V2(0xffffffffffffffff, 0x80284504, &(0x7f00000003c0)=""/188) ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x0) [ 1515.171818] RAX: ffffffffffffffda RBX: 00007f420d4786d4 RCX: 0000000000455a79 [ 1515.179094] RDX: 0000000000000000 RSI: 0000000000004c80 RDI: 0000000000000015 [ 1515.186364] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 1515.193634] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000016 [ 1515.200909] R13: 00000000004bdfb1 R14: 00000000004ccab0 R15: 000000000000001a 03:54:36 executing program 1: r0 = socket(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x9501000000000000}, 0xc, &(0x7f0000000900)={&(0x7f0000000040)={0x14, 0x1e, 0x201}, 0x14}, 0x1}, 0x0) [ 1515.470519] hfsplus: gid requires an argument [ 1515.475178] hfsplus: unable to parse mount options [ 1515.502534] hfsplus: gid requires an argument [ 1515.507166] hfsplus: unable to parse mount options [ 1515.574914] FAULT_INJECTION: forcing a failure. [ 1515.574914] name failslab, interval 1, probability 0, space 0, times 0 [ 1515.586563] CPU: 0 PID: 6693 Comm: syz-executor0 Not tainted 4.18.0-rc4+ #144 [ 1515.593863] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1515.603221] Call Trace: [ 1515.605837] dump_stack+0x1c9/0x2b4 [ 1515.609498] ? dump_stack_print_info.cold.2+0x52/0x52 [ 1515.614704] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1515.619486] should_fail.cold.4+0xa/0x1a [ 1515.623565] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 1515.628726] ? graph_lock+0x170/0x170 [ 1515.632546] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1515.638100] ? pcpu_alloc+0x190/0x13a0 [ 1515.642008] ? find_held_lock+0x36/0x1c0 [ 1515.646094] ? __lock_is_held+0xb5/0x140 [ 1515.650179] ? check_same_owner+0x340/0x340 [ 1515.654504] ? blk_mq_can_queue+0x50/0x50 [ 1515.658662] ? rcu_note_context_switch+0x730/0x730 [ 1515.663600] ? kobject_init+0x23a/0x2f0 [ 1515.667585] __should_failslab+0x124/0x180 [ 1515.671837] should_failslab+0x9/0x14 [ 1515.675648] kmem_cache_alloc_node_trace+0x26f/0x770 [ 1515.680764] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 1515.685787] ? find_next_bit+0x104/0x130 [ 1515.689869] __kmalloc_node+0x33/0x70 [ 1515.693680] blk_mq_init_allocated_queue+0x228/0x15a0 [ 1515.698885] ? blk_init_allocated_queue+0x600/0x600 [ 1515.703924] ? lockdep_init_map+0x9/0x10 [ 1515.708005] ? blk_mq_map_swqueue+0xae0/0xae0 [ 1515.712521] ? __mutex_init+0x1f7/0x290 [ 1515.716551] ? mark_held_locks+0xc9/0x160 [ 1515.720715] ? retint_kernel+0x10/0x10 [ 1515.724613] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 1515.729811] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1515.734588] ? retint_kernel+0x10/0x10 [ 1515.738495] blk_mq_init_queue+0x63/0xb0 [ 1515.742563] loop_add+0x33d/0x9d0 [ 1515.746035] ? loop_lookup+0x105/0x230 [ 1515.749932] ? loop_queue_rq+0x660/0x660 [ 1515.754011] loop_control_ioctl+0x199/0x540 [ 1515.758445] ? loop_add+0x9d0/0x9d0 [ 1515.762080] ? retint_kernel+0x10/0x10 [ 1515.765988] ? do_vfs_ioctl+0xd1/0x1720 [ 1515.769972] ? loop_add+0x9d0/0x9d0 [ 1515.773606] do_vfs_ioctl+0x1de/0x1720 [ 1515.777501] ? __lock_is_held+0xb5/0x140 [ 1515.781569] ? ioctl_preallocate+0x300/0x300 [ 1515.785982] ? __fget_light+0x2f7/0x440 [ 1515.789962] ? fget_raw+0x20/0x20 [ 1515.793444] ? __sb_end_write+0xac/0xe0 [ 1515.797431] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1515.802976] ? fput+0x130/0x1a0 [ 1515.806266] ? ksys_write+0x1ae/0x260 [ 1515.810079] ? security_file_ioctl+0x94/0xc0 [ 1515.814507] ksys_ioctl+0xa9/0xd0 [ 1515.817977] __x64_sys_ioctl+0x73/0xb0 [ 1515.821876] do_syscall_64+0x1b9/0x820 [ 1515.825769] ? syscall_slow_exit_work+0x500/0x500 [ 1515.830622] ? syscall_return_slowpath+0x5e0/0x5e0 [ 1515.835557] ? syscall_return_slowpath+0x31d/0x5e0 [ 1515.840512] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe [ 1515.845893] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1515.850750] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1515.855948] RIP: 0033:0x455a79 03:54:37 executing program 2: r0 = syz_open_dev$sndseq(&(0x7f0000dcc000)='/dev/snd/seq\x00', 0x0, 0x2) read(r0, &(0x7f0000fb6000)=""/28, 0x3f0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000418f50)={{0x80}, "0a4ceaa05d9a00000000000000039b3fd4cec307e8ef3d13eb790ec9c65abaf90d229db692542e5b78f8b29e0a27800f0000000000000009fb42f376589701a4", 0xa9824f69d1376637, 0x10800a}) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000240)={0xbf}) write$binfmt_script(r0, &(0x7f0000000000)=ANY=[], 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f00000002c0)={{}, 'port0\x00'}) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer2\x00', 0x0, 0x0) getsockopt$IPT_SO_GET_ENTRIES(r1, 0x0, 0x41, &(0x7f0000000000)={'raw\x00', 0x19, "ca0e7e9fca3190d363a53863b76cfc036f36f478f07bb63625"}, &(0x7f0000000040)=0x3d) 03:54:37 executing program 5: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer2\x00', 0x0, 0x0) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000040)="025cc83d6d345f8f762070") ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r0, 0x40085112, &(0x7f0000b18000)={{0xffffff93}, {0xffffffa0}, 0x0, 0x0, 0x0, [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000]}) 03:54:37 executing program 7: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f000000d000)={0xa, 0x4e20}, 0x1c) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}, 0xb}, 0x1c) syz_emit_ethernet(0x3e, &(0x7f00000001c0)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @random="e829f650db0f", [], {@ipv6={0x86dd, {0x0, 0x6, "50a09c", 0x8, 0xffffff11, 0x0, @remote={0xfe, 0x80, [], 0xbb}, @local={0xfe, 0x80, [], 0xaa}, {[], @udp={0x0, 0x4e20, 0x8}}}}}}, &(0x7f0000000040)) syz_emit_ethernet(0x3e, &(0x7f0000000000)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], {@ipv6={0x86dd, {0x0, 0x6, "50a09c", 0x8, 0xffffff11, 0x0, @remote={0xfe, 0x80, [], 0xbb}, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd00000000000000], 0xaa}, {[], @udp={0x300, 0x4e20, 0x8}}}}}}, &(0x7f0000000040)) 03:54:37 executing program 4: r0 = socket(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x5400}, 0xc, &(0x7f0000000900)={&(0x7f0000000040)={0x14, 0x1e, 0x201}, 0x14}, 0x1}, 0x0) 03:54:37 executing program 3: ioctl$BLKDISCARD(0xffffffffffffffff, 0x1277, &(0x7f0000000180)) r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140)='/dev/snapshot\x00', 0x0, 0x0) r1 = semget(0x1, 0x3, 0x645) ioctl$TIOCGPGRP(r0, 0x540f, &(0x7f00000001c0)) semop(r1, &(0x7f0000000100)=[{0x2, 0x9, 0x1800}, {0x0, 0xc8}, {0x0, 0x7, 0x1000}], 0x3) fcntl$addseals(0xffffffffffffffff, 0x409, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f0000000000), &(0x7f00000000c0)=0x8) ioctl$EVIOCGLED(0xffffffffffffffff, 0x80404519, &(0x7f0000000580)=""/236) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x3c, 0x0) ioctl$EVIOCGKEYCODE_V2(r0, 0x80284504, &(0x7f00000003c0)=""/188) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) r3 = getuid() getgroups(0x5, &(0x7f0000000200)=[0xffffffffffffffff, 0xee01, 0xee00, 0xffffffffffffffff, 0x0]) getresuid(&(0x7f0000000240), &(0x7f0000000280), &(0x7f0000000300)=0x0) getresgid(&(0x7f0000000340)=0x0, &(0x7f0000000380), &(0x7f0000000480)) semctl$IPC_SET(r1, 0x0, 0x1, &(0x7f00000004c0)={{0x6, r3, r4, r5, r6, 0x0, 0x4}, 0x8, 0x0, 0x3ff}) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c82, 0x0) getsockopt$inet_sctp_SCTP_MAX_BURST(r0, 0x84, 0x14, &(0x7f0000000040), &(0x7f0000000080)=0x4) 03:54:37 executing program 6: r0 = socket(0x11, 0xa, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000080)={0x0, 0x0, 0x0}, &(0x7f0000000040)=0xd1954b64) syz_mount_image$hfsplus(&(0x7f0000000240)='hfsplus\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, &(0x7f00000005c0), 0x0, &(0x7f00000006c0)={[{@gid={'gid', 0x3d, r1}, 0x2c}]}) 03:54:37 executing program 1: r0 = socket(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0xb801}, 0xc, &(0x7f0000000900)={&(0x7f0000000040)={0x14, 0x1e, 0x201}, 0x14}, 0x1}, 0x0) [ 1515.859132] Code: 1d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1515.878516] RSP: 002b:00007f420d477c68 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1515.886244] RAX: ffffffffffffffda RBX: 00007f420d4786d4 RCX: 0000000000455a79 [ 1515.893523] RDX: 0000000000000000 RSI: 0000000000004c80 RDI: 0000000000000016 [ 1515.900800] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 1515.908078] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000017 [ 1515.915350] R13: 00000000004bdfb1 R14: 00000000004ccab0 R15: 000000000000001b 03:54:37 executing program 0 (fault-call:10 fault-nth:28): r0 = syz_open_dev$vcsa(&(0x7f0000000100)='/dev/vcsa#\x00', 0x5, 0x101000) ioctl$BLKDISCARD(r0, 0x1277, &(0x7f0000000180)=0x5f) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140)='/dev/snapshot\x00', 0x0, 0x0) connect$nfc_llcp(r1, &(0x7f0000000300)={0x27, 0x0, 0x0, 0x6, 0x0, 0x0, "f44825e9da257dcd22512d531f545cf0bce08002f76d5e9bd3d1dcb3f649bf7ba49078f877ce09f903ed489ab0bbf0f088675b47312412edd6bd577062eb34", 0x1c}, 0x60) fcntl$addseals(0xffffffffffffffff, 0x409, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EVIOCGLED(r1, 0x80404519, &(0x7f0000000580)=""/236) ioctl$FS_IOC_SETFSLABEL(r2, 0x41009432, &(0x7f0000000480)="64098ceb11469210e1fa92c76a76762b420a730851d9c9ce1d2745bac5fca8796f1aba309faf35268b4d45ac04ac0ec6f2cebf8f0ac8391dd8cef0da84895505ef6fc4062016210998b92c121630e66d984a620a4a40b4b63bebedc75ae3e140c654a4f80fec3a6af81841856baae4ad83438f32d9e08e5219c8b832403b86aa723d75cb839059d9d094ba7a3510a5acd071b9c1f441886fb396511cb44257e86695b1b4b84218118e0045593d869765e8f850cc6a534e5f114b22d73ba2a903943a32cebbff720180ba6531e240d9a3759e2287b1a64f950a5b1e402580731d395128e3b81fd4c76b233a384200aa015eb779ce7140613e374a38caa9d18b34") r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x3c, 0x0) ioctl$EVIOCGKEYCODE_V2(0xffffffffffffffff, 0x80284504, &(0x7f00000003c0)=""/188) ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x0) 03:54:37 executing program 4: r0 = socket(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x57010000}, 0xc, &(0x7f0000000900)={&(0x7f0000000040)={0x14, 0x1e, 0x201}, 0x14}, 0x1}, 0x0) 03:54:37 executing program 3: ioctl$BLKDISCARD(0xffffffffffffffff, 0x1277, &(0x7f0000000100)) r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140)='/dev/snapshot\x00', 0x0, 0x0) fcntl$addseals(0xffffffffffffffff, 0x409, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f0000000000), &(0x7f00000000c0)=0x8) ioctl$EVIOCGLED(0xffffffffffffffff, 0x80404519, &(0x7f0000000580)=""/236) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x3c, 0x0) ioctl$EVIOCGKEYCODE_V2(0xffffffffffffffff, 0x80284504, &(0x7f00000003c0)=""/188) ioctl$sock_inet_tcp_SIOCOUTQNSD(r0, 0x894b, &(0x7f0000000080)) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c82, 0x0) setsockopt$inet_sctp_SCTP_RECVNXTINFO(r0, 0x84, 0x21, &(0x7f0000000040)=0x401, 0x4) 03:54:37 executing program 7: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f000000d000)={0xa, 0x4e20}, 0x1c) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}, 0xb}, 0x1c) syz_emit_ethernet(0x3e, &(0x7f00000001c0)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @random="e829f650db0f", [], {@ipv6={0x86dd, {0x0, 0x6, "50a09c", 0x8, 0xffffff11, 0x0, @remote={0xfe, 0x80, [], 0xbb}, @local={0xfe, 0x80, [], 0xaa}, {[], @udp={0x0, 0x4e20, 0x8}}}}}}, &(0x7f0000000040)) syz_emit_ethernet(0x3e, &(0x7f0000000000)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], {@ipv6={0x86dd, {0x0, 0x6, "50a09c", 0x8, 0xffffff11, 0x0, @remote={0xfe, 0x80, [], 0xbb}, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc0ffffff], 0xaa}, {[], @udp={0x300, 0x4e20, 0x8}}}}}}, &(0x7f0000000040)) 03:54:37 executing program 5: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer2\x00', 0x0, 0x0) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000040)="025cc83d6d345f8f762070") ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r0, 0x40085112, &(0x7f0000b18000)={{0xffffff93}, {0xffffffa0}, 0x0, 0x0, 0x0, [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f000000]}) 03:54:37 executing program 1: r0 = socket(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8d01000000000000}, 0xc, &(0x7f0000000900)={&(0x7f0000000040)={0x14, 0x1e, 0x201}, 0x14}, 0x1}, 0x0) [ 1516.230788] hfsplus: unable to find HFS+ superblock [ 1516.258733] hfsplus: unable to find HFS+ superblock 03:54:37 executing program 7: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f000000d000)={0xa, 0x4e20}, 0x1c) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}, 0xb}, 0x1c) syz_emit_ethernet(0x3e, &(0x7f00000001c0)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @random="e829f650db0f", [], {@ipv6={0x86dd, {0x0, 0x6, "50a09c", 0x8, 0xffffff11, 0x0, @remote={0xfe, 0x80, [], 0xbb}, @local={0xfe, 0x80, [], 0xaa}, {[], @udp={0x0, 0x4e20, 0x8}}}}}}, &(0x7f0000000040)) syz_emit_ethernet(0x3e, &(0x7f0000000000)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], {@ipv6={0x86dd, {0x0, 0x6, "50a09c", 0x8, 0xffffff11, 0x0, @remote={0xfe, 0x80, [], 0xbb}, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6], 0xaa}, {[], @udp={0x300, 0x4e20, 0x8}}}}}}, &(0x7f0000000040)) 03:54:37 executing program 4: r0 = socket(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x6c01000000000000}, 0xc, &(0x7f0000000900)={&(0x7f0000000040)={0x14, 0x1e, 0x201}, 0x14}, 0x1}, 0x0) 03:54:37 executing program 3: ioctl$BLKDISCARD(0xffffffffffffffff, 0x1277, &(0x7f0000000180)) r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140)='/dev/snapshot\x00', 0x0, 0x0) fcntl$addseals(0xffffffffffffffff, 0x409, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f0000000000), &(0x7f00000000c0)=0x8) ioctl$EVIOCGLED(0xffffffffffffffff, 0x80404519, &(0x7f0000000580)=""/236) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x3c, 0x0) ioctl$EVIOCGKEYCODE_V2(0xffffffffffffffff, 0x80284504, &(0x7f0000000480)=""/188) eventfd2(0x101, 0x801) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c82, 0x0) ioctl$KVM_PPC_GET_PVINFO(r0, 0x4080aea1, &(0x7f00000001c0)=""/167) [ 1516.339300] FAULT_INJECTION: forcing a failure. [ 1516.339300] name failslab, interval 1, probability 0, space 0, times 0 [ 1516.350848] CPU: 1 PID: 6731 Comm: syz-executor0 Not tainted 4.18.0-rc4+ #144 [ 1516.358140] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1516.367512] Call Trace: [ 1516.370127] dump_stack+0x1c9/0x2b4 [ 1516.373791] ? dump_stack_print_info.cold.2+0x52/0x52 [ 1516.379013] ? print_usage_bug+0xc0/0xc0 [ 1516.383116] should_fail.cold.4+0xa/0x1a [ 1516.387204] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 1516.392333] ? graph_lock+0x170/0x170 [ 1516.396158] ? mark_held_locks+0xc9/0x160 [ 1516.400336] ? find_held_lock+0x36/0x1c0 [ 1516.404424] ? __lock_is_held+0xb5/0x140 [ 1516.408510] ? check_same_owner+0x340/0x340 [ 1516.412850] ? __sanitizer_cov_trace_pc+0x48/0x50 [ 1516.417721] ? rcu_note_context_switch+0x730/0x730 [ 1516.422679] ? kobject_init+0x23a/0x2f0 [ 1516.426679] __should_failslab+0x124/0x180 [ 1516.430941] should_failslab+0x9/0x14 [ 1516.434766] kmem_cache_alloc_node_trace+0x26f/0x770 [ 1516.439896] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 1516.444935] ? find_next_bit+0x104/0x130 [ 1516.449032] __kmalloc_node+0x33/0x70 [ 1516.452873] blk_mq_init_allocated_queue+0x228/0x15a0 [ 1516.458095] ? blk_init_allocated_queue+0x600/0x600 [ 1516.463132] ? mark_held_locks+0xc9/0x160 [ 1516.467303] ? blk_mq_map_swqueue+0xae0/0xae0 [ 1516.471820] ? retint_kernel+0x10/0x10 [ 1516.475727] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 1516.480761] ? retint_kernel+0x10/0x10 [ 1516.484672] ? blk_mq_alloc_tag_set+0x509/0xad0 [ 1516.489355] ? blk_mq_update_nr_hw_queues+0x510/0x510 [ 1516.494554] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 1516.499586] blk_mq_init_queue+0x63/0xb0 [ 1516.503658] loop_add+0x33d/0x9d0 [ 1516.507117] ? loop_lookup+0x105/0x230 [ 1516.511010] ? loop_queue_rq+0x660/0x660 [ 1516.515090] loop_control_ioctl+0x199/0x540 [ 1516.519418] ? loop_add+0x9d0/0x9d0 [ 1516.523050] ? retint_kernel+0x10/0x10 [ 1516.526947] ? do_vfs_ioctl+0xd1/0x1720 [ 1516.530926] ? loop_add+0x9d0/0x9d0 [ 1516.534562] do_vfs_ioctl+0x1de/0x1720 [ 1516.538464] ? __lock_is_held+0xb5/0x140 [ 1516.542539] ? ioctl_preallocate+0x300/0x300 [ 1516.546961] ? __fget_light+0x2f7/0x440 [ 1516.551728] ? fget_raw+0x20/0x20 [ 1516.555194] ? retint_kernel+0x10/0x10 [ 1516.559095] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 1516.564122] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1516.568890] ? security_file_ioctl+0x94/0xc0 [ 1516.573305] ksys_ioctl+0xa9/0xd0 [ 1516.576767] __x64_sys_ioctl+0x73/0xb0 [ 1516.580662] ? do_syscall_64+0xca/0x820 [ 1516.584768] do_syscall_64+0x1b9/0x820 [ 1516.588663] ? syscall_slow_exit_work+0x500/0x500 [ 1516.593514] ? syscall_return_slowpath+0x5e0/0x5e0 [ 1516.598452] ? syscall_return_slowpath+0x31d/0x5e0 [ 1516.603401] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe [ 1516.608785] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1516.613647] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1516.618848] RIP: 0033:0x455a79 [ 1516.622078] Code: 1d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1516.641729] RSP: 002b:00007f420d477c68 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1516.649640] RAX: ffffffffffffffda RBX: 00007f420d4786d4 RCX: 0000000000455a79 [ 1516.656973] RDX: 0000000000000000 RSI: 0000000000004c80 RDI: 0000000000000015 [ 1516.664278] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 1516.671557] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000016 [ 1516.679077] R13: 00000000004bdfb1 R14: 00000000004ccab0 R15: 000000000000001c 03:54:38 executing program 2: r0 = syz_open_dev$sndseq(&(0x7f0000dcc000)='/dev/snd/seq\x00', 0x0, 0x2) read(r0, &(0x7f0000fb6000)=""/28, 0x3f0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000418f50)={{0x80}, "0a4ceaa05d9a00000000000000039b3fd4cec307e8ef3d13eb790ec9c65abaf90d229db692542e5b78f8b29e0a27800f0000000000000009fb42f376589701a4", 0xa9824f69d1376637, 0x10800a}) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000240)={0xbf}) write$binfmt_script(r0, &(0x7f0000000000)=ANY=[], 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f00000002c0)={{}, 'port0\x00'}) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0xfffffffffffffffd, 0x0) 03:54:38 executing program 6: bpf$PROG_LOAD(0x5, &(0x7f0000008000)={0x0, 0x1, &(0x7f0000001fe8)=ANY=[@ANYBLOB="e900000000000063cf"], &(0x7f0000003ff6)='syzkaller\x00', 0x0, 0xc3, &(0x7f0000009f3d)=""/195}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x5, &(0x7f0000001fd8)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0xffffff84}, [@ldst={0x65, 0x0, 0x5}], {0x95}}, &(0x7f0000003ff6)='GPL\x00', 0x5, 0x437, &(0x7f000000cf3d)=""/195}, 0x48) 03:54:38 executing program 1: r0 = socket(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x9e00000000000000}, 0xc, &(0x7f0000000900)={&(0x7f0000000040)={0x14, 0x1e, 0x201}, 0x14}, 0x1}, 0x0) 03:54:38 executing program 5: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer2\x00', 0x0, 0x0) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000040)="025cc83d6d345f8f762070") ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r0, 0x40085112, &(0x7f0000b18000)={{0xffffff93}, {0xffffffa0}, 0x0, 0x0, 0x0, [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8]}) 03:54:38 executing program 3: ioctl$BLKDISCARD(0xffffffffffffffff, 0x1277, &(0x7f0000000180)) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140)='/dev/snapshot\x00', 0x0, 0x0) fcntl$addseals(0xffffffffffffffff, 0x409, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f0000000000), &(0x7f00000000c0)=0x8) ioctl$EVIOCGLED(0xffffffffffffffff, 0x80404519, &(0x7f0000000580)=""/236) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x3c, 0x0) ioctl$EVIOCGKEYCODE_V2(0xffffffffffffffff, 0x80284504, &(0x7f00000003c0)=""/188) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c82, 0x0) 03:54:38 executing program 7: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f000000d000)={0xa, 0x4e20}, 0x1c) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}, 0xb}, 0x1c) syz_emit_ethernet(0x3e, &(0x7f00000001c0)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @random="e829f650db0f", [], {@ipv6={0x86dd, {0x0, 0x6, "50a09c", 0x8, 0xffffff11, 0x0, @remote={0xfe, 0x80, [], 0xbb}, @local={0xfe, 0x80, [], 0xaa}, {[], @udp={0x0, 0x4e20, 0x8}}}}}}, &(0x7f0000000040)) syz_emit_ethernet(0x3e, &(0x7f0000000000)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], {@ipv6={0x86dd, {0x0, 0x6, "50a09c", 0x8, 0xffffff11, 0x0, @remote={0xfe, 0x80, [], 0xbb}, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5], 0xaa}, {[], @udp={0x300, 0x4e20, 0x8}}}}}}, &(0x7f0000000040)) 03:54:38 executing program 4: r0 = socket(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0xb900000000000000}, 0xc, &(0x7f0000000900)={&(0x7f0000000040)={0x14, 0x1e, 0x201}, 0x14}, 0x1}, 0x0) 03:54:38 executing program 0 (fault-call:10 fault-nth:29): r0 = syz_open_dev$vcsa(&(0x7f0000000100)='/dev/vcsa#\x00', 0x5, 0x101000) ioctl$BLKDISCARD(r0, 0x1277, &(0x7f0000000180)=0x5f) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140)='/dev/snapshot\x00', 0x0, 0x0) connect$nfc_llcp(r1, &(0x7f0000000300)={0x27, 0x0, 0x0, 0x6, 0x0, 0x0, "f44825e9da257dcd22512d531f545cf0bce08002f76d5e9bd3d1dcb3f649bf7ba49078f877ce09f903ed489ab0bbf0f088675b47312412edd6bd577062eb34", 0x1c}, 0x60) fcntl$addseals(0xffffffffffffffff, 0x409, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EVIOCGLED(r1, 0x80404519, &(0x7f0000000580)=""/236) ioctl$FS_IOC_SETFSLABEL(r2, 0x41009432, &(0x7f0000000480)="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") r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x3c, 0x0) ioctl$EVIOCGKEYCODE_V2(0xffffffffffffffff, 0x80284504, &(0x7f00000003c0)=""/188) ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x0) [ 1517.258613] FAULT_INJECTION: forcing a failure. [ 1517.258613] name failslab, interval 1, probability 0, space 0, times 0 [ 1517.270669] CPU: 0 PID: 6750 Comm: syz-executor0 Not tainted 4.18.0-rc4+ #144 [ 1517.277967] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1517.287331] Call Trace: [ 1517.289942] dump_stack+0x1c9/0x2b4 [ 1517.293641] ? dump_stack_print_info.cold.2+0x52/0x52 [ 1517.298855] ? blk_mq_realloc_hw_ctxs+0x10d/0x1390 [ 1517.303818] should_fail.cold.4+0xa/0x1a [ 1517.308085] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 1517.313202] ? retint_kernel+0x10/0x10 [ 1517.317101] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1517.321875] ? retint_kernel+0x10/0x10 [ 1517.325797] ? check_same_owner+0x340/0x340 [ 1517.330132] ? __kernel_text_address+0xd/0x40 [ 1517.334633] ? rcu_note_context_switch+0x730/0x730 [ 1517.339571] __should_failslab+0x124/0x180 [ 1517.343816] should_failslab+0x9/0x14 [ 1517.347619] kmem_cache_alloc_node_trace+0x26f/0x770 [ 1517.352730] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1517.358272] ? find_next_bit+0x104/0x130 [ 1517.362347] __kmalloc_node+0x33/0x70 [ 1517.366170] blk_mq_realloc_hw_ctxs+0x2b5/0x1390 [ 1517.370938] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 1517.375970] ? blk_mq_free_map_and_requests+0x160/0x160 [ 1517.381343] ? retint_kernel+0x10/0x10 [ 1517.385239] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 1517.390284] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1517.395052] ? retint_kernel+0x10/0x10 [ 1517.398959] blk_mq_init_allocated_queue+0x2c0/0x15a0 [ 1517.404190] ? lockdep_init_map+0x9/0x10 [ 1517.408258] ? blk_mq_map_swqueue+0xae0/0xae0 [ 1517.412782] ? __mutex_init+0x1f7/0x290 [ 1517.416799] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1517.422343] ? __blk_mq_alloc_rq_map+0x17d/0x2e0 [ 1517.427133] ? retint_kernel+0x10/0x10 [ 1517.431031] ? blk_mq_update_nr_hw_queues+0x510/0x510 [ 1517.436250] blk_mq_init_queue+0x63/0xb0 [ 1517.440334] loop_add+0x33d/0x9d0 [ 1517.443806] ? loop_lookup+0x105/0x230 [ 1517.447701] ? loop_queue_rq+0x660/0x660 [ 1517.451791] loop_control_ioctl+0x199/0x540 [ 1517.456130] ? loop_add+0x9d0/0x9d0 [ 1517.459766] ? expand_files.part.8+0x9c0/0x9c0 [ 1517.464360] ? kasan_check_write+0x14/0x20 [ 1517.468605] ? __mutex_unlock_slowpath+0x197/0x8c0 [ 1517.473543] ? loop_add+0x9d0/0x9d0 [ 1517.477192] do_vfs_ioctl+0x1de/0x1720 [ 1517.481090] ? __lock_is_held+0xb5/0x140 [ 1517.485155] ? ioctl_preallocate+0x300/0x300 [ 1517.489564] ? __fget_light+0x2f7/0x440 [ 1517.493542] ? fget_raw+0x20/0x20 [ 1517.496998] ? __sb_end_write+0xac/0xe0 [ 1517.500982] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1517.506521] ? fput+0x130/0x1a0 [ 1517.509805] ? ksys_write+0x1ae/0x260 [ 1517.513634] ? security_file_ioctl+0x94/0xc0 [ 1517.518050] ksys_ioctl+0xa9/0xd0 [ 1517.521512] __x64_sys_ioctl+0x73/0xb0 [ 1517.525422] do_syscall_64+0x1b9/0x820 [ 1517.529313] ? syscall_slow_exit_work+0x500/0x500 [ 1517.534166] ? syscall_return_slowpath+0x5e0/0x5e0 [ 1517.539116] ? syscall_return_slowpath+0x31d/0x5e0 [ 1517.544058] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe [ 1517.549432] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1517.554323] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1517.559520] RIP: 0033:0x455a79 [ 1517.562708] Code: 1d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1517.582106] RSP: 002b:00007f420d477c68 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1517.589829] RAX: ffffffffffffffda RBX: 00007f420d4786d4 RCX: 0000000000455a79 [ 1517.597101] RDX: 0000000000000000 RSI: 0000000000004c80 RDI: 0000000000000016 03:54:39 executing program 5: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer2\x00', 0x0, 0x0) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000040)="025cc83d6d345f8f762070") ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r0, 0x40085112, &(0x7f0000b18000)={{0xffffff93}, {0xffffffa0}, 0x0, 0x0, 0x0, [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4]}) 03:54:39 executing program 7: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f000000d000)={0xa, 0x4e20}, 0x1c) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}, 0xb}, 0x1c) syz_emit_ethernet(0x3e, &(0x7f00000001c0)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @random="e829f650db0f", [], {@ipv6={0x86dd, {0x0, 0x6, "50a09c", 0x8, 0xffffff11, 0x0, @remote={0xfe, 0x80, [], 0xbb}, @local={0xfe, 0x80, [], 0xaa}, {[], @udp={0x0, 0x4e20, 0x8}}}}}}, &(0x7f0000000040)) syz_emit_ethernet(0x3e, &(0x7f0000000000)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], {@ipv6={0x86dd, {0x0, 0x6, "50a09c", 0x8, 0xffffff11, 0x0, @remote={0xfe, 0x80, [], 0xbb}, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb], 0xaa}, {[], @udp={0x300, 0x4e20, 0x8}}}}}}, &(0x7f0000000040)) 03:54:39 executing program 4: r0 = socket(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x9801}, 0xc, &(0x7f0000000900)={&(0x7f0000000040)={0x14, 0x1e, 0x201}, 0x14}, 0x1}, 0x0) 03:54:39 executing program 1: r0 = socket(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0xb300}, 0xc, &(0x7f0000000900)={&(0x7f0000000040)={0x14, 0x1e, 0x201}, 0x14}, 0x1}, 0x0) 03:54:39 executing program 3: ioctl$BLKDISCARD(0xffffffffffffffff, 0x1277, &(0x7f0000000180)) r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140)='/dev/snapshot\x00', 0x0, 0x0) fcntl$addseals(0xffffffffffffffff, 0x409, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f0000000000), &(0x7f00000000c0)=0x8) ioctl$EVIOCGLED(0xffffffffffffffff, 0x80404519, &(0x7f0000000580)=""/236) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x3c, 0x0) ioctl$EVIOCGKEYCODE_V2(0xffffffffffffffff, 0x80284504, &(0x7f00000003c0)=""/188) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c82, 0x0) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x30, &(0x7f0000000680)={0x8, {{0xa, 0x4e22, 0xe1, @dev={0xfe, 0x80, [], 0x19}, 0x8e89}}, 0x0, 0x6, [{{0xa, 0x4e22, 0x6, @mcast1={0xff, 0x1, [], 0x1}, 0x209d4d74}}, {{0xa, 0x4e20, 0x3f, @mcast2={0xff, 0x2, [], 0x1}, 0x1f}}, {{0xa, 0x4e24, 0x8, @local={0xfe, 0x80, [], 0xaa}, 0x3}}, {{0xa, 0x4e24, 0x2, @mcast1={0xff, 0x1, [], 0x1}, 0x1f}}, {{0xa, 0x4e20, 0x6, @remote={0xfe, 0x80, [], 0xbb}, 0x7ff}}, {{0xa, 0x4e24, 0x5, @remote={0xfe, 0x80, [], 0xbb}, 0x4c82fcaf}}]}, 0x390) [ 1517.604388] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 1517.611666] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000017 [ 1517.618934] R13: 00000000004bdfb1 R14: 00000000004ccab0 R15: 000000000000001d 03:54:39 executing program 0 (fault-call:10 fault-nth:30): r0 = syz_open_dev$vcsa(&(0x7f0000000100)='/dev/vcsa#\x00', 0x5, 0x101000) ioctl$BLKDISCARD(r0, 0x1277, &(0x7f0000000180)=0x5f) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140)='/dev/snapshot\x00', 0x0, 0x0) connect$nfc_llcp(r1, &(0x7f0000000300)={0x27, 0x0, 0x0, 0x6, 0x0, 0x0, "f44825e9da257dcd22512d531f545cf0bce08002f76d5e9bd3d1dcb3f649bf7ba49078f877ce09f903ed489ab0bbf0f088675b47312412edd6bd577062eb34", 0x1c}, 0x60) fcntl$addseals(0xffffffffffffffff, 0x409, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EVIOCGLED(r1, 0x80404519, &(0x7f0000000580)=""/236) ioctl$FS_IOC_SETFSLABEL(r2, 0x41009432, &(0x7f0000000480)="64098ceb11469210e1fa92c76a76762b420a730851d9c9ce1d2745bac5fca8796f1aba309faf35268b4d45ac04ac0ec6f2cebf8f0ac8391dd8cef0da84895505ef6fc4062016210998b92c121630e66d984a620a4a40b4b63bebedc75ae3e140c654a4f80fec3a6af81841856baae4ad83438f32d9e08e5219c8b832403b86aa723d75cb839059d9d094ba7a3510a5acd071b9c1f441886fb396511cb44257e86695b1b4b84218118e0045593d869765e8f850cc6a534e5f114b22d73ba2a903943a32cebbff720180ba6531e240d9a3759e2287b1a64f950a5b1e402580731d395128e3b81fd4c76b233a384200aa015eb779ce7140613e374a38caa9d18b34") r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x3c, 0x0) ioctl$EVIOCGKEYCODE_V2(0xffffffffffffffff, 0x80284504, &(0x7f00000003c0)=""/188) ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x0) 03:54:39 executing program 6: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)="2f02726f75702e7374617000", 0x2761, 0x0) write$cgroup_type(r0, &(0x7f00000000c0)='threaded\x00', 0xfffffc7b) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000000)='cgroup.type\x00') 03:54:39 executing program 1: r0 = socket(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x11f}, 0xc, &(0x7f0000000900)={&(0x7f0000000040)={0x14, 0x1e, 0x201}, 0x14}, 0x1}, 0x0) [ 1518.056259] FAULT_INJECTION: forcing a failure. [ 1518.056259] name failslab, interval 1, probability 0, space 0, times 0 [ 1518.067973] CPU: 1 PID: 6779 Comm: syz-executor0 Not tainted 4.18.0-rc4+ #144 [ 1518.075264] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1518.084633] Call Trace: [ 1518.087245] dump_stack+0x1c9/0x2b4 [ 1518.091942] ? dump_stack_print_info.cold.2+0x52/0x52 [ 1518.097159] ? finish_task_switch+0x1d3/0x870 [ 1518.101671] ? finish_task_switch+0x18a/0x870 [ 1518.106193] should_fail.cold.4+0xa/0x1a [ 1518.110283] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 1518.115411] ? __schedule+0x884/0x1ed0 [ 1518.119313] ? unwind_get_return_address+0x61/0xa0 [ 1518.124268] ? __sched_text_start+0x8/0x8 [ 1518.128434] ? find_held_lock+0x36/0x1c0 [ 1518.132526] ? __lock_is_held+0xb5/0x140 [ 1518.136625] ? check_same_owner+0x340/0x340 [ 1518.140980] __should_failslab+0x124/0x180 [ 1518.145240] should_failslab+0x9/0x14 [ 1518.149059] kmem_cache_alloc_node_trace+0x26f/0x770 [ 1518.154184] ? __lock_is_held+0xb5/0x140 [ 1518.158263] ? memset_erms+0xb/0x10 [ 1518.161916] blk_alloc_flush_queue+0xcd/0x3e0 [ 1518.166426] ? blk_insert_flush+0xb00/0xb00 [ 1518.170772] ? kasan_unpoison_shadow+0x35/0x50 [ 1518.175375] ? kasan_kmalloc+0xc4/0xe0 [ 1518.179293] ? __kmalloc_node+0x47/0x70 [ 1518.183295] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 1518.188447] ? blk_mq_sched_init_hctx+0x117/0x1a0 [ 1518.193322] blk_mq_realloc_hw_ctxs+0x97e/0x1390 [ 1518.198122] ? blk_mq_free_map_and_requests+0x160/0x160 [ 1518.203514] ? __lock_is_held+0xb5/0x140 [ 1518.207605] ? __kmalloc_node+0x33/0x70 [ 1518.211605] ? rcu_read_lock_sched_held+0x108/0x120 [ 1518.216648] ? kmem_cache_alloc_node_trace+0x34e/0x770 [ 1518.221951] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 1518.226995] ? kasan_unpoison_shadow+0x35/0x50 [ 1518.231602] ? kasan_kmalloc+0xc4/0xe0 [ 1518.235522] blk_mq_init_allocated_queue+0x2c0/0x15a0 [ 1518.240743] ? lockdep_init_map+0x9/0x10 [ 1518.244852] ? blk_mq_map_swqueue+0xae0/0xae0 [ 1518.249372] ? __mutex_init+0x1f7/0x290 [ 1518.253388] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1518.258950] ? __blk_mq_alloc_rq_map+0x17d/0x2e0 [ 1518.263742] ? blk_mq_update_nr_hw_queues+0x510/0x510 [ 1518.268961] blk_mq_init_queue+0x63/0xb0 [ 1518.273080] loop_add+0x33d/0x9d0 [ 1518.276584] ? loop_lookup+0x105/0x230 [ 1518.280488] ? loop_queue_rq+0x660/0x660 [ 1518.284573] ? __sanitizer_cov_trace_switch+0x11/0x90 [ 1518.289787] loop_control_ioctl+0x199/0x540 [ 1518.294130] ? loop_add+0x9d0/0x9d0 [ 1518.297768] ? loop_add+0x9d0/0x9d0 [ 1518.301419] ? loop_add+0x9d0/0x9d0 [ 1518.305062] do_vfs_ioctl+0x1de/0x1720 [ 1518.308966] ? retint_kernel+0x10/0x10 [ 1518.312877] ? ioctl_preallocate+0x300/0x300 [ 1518.317307] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1518.322089] ? retint_kernel+0x10/0x10 [ 1518.326011] ? security_file_ioctl+0x20/0xc0 [ 1518.330440] ? security_file_ioctl+0x27/0xc0 [ 1518.334876] ? security_file_ioctl+0x94/0xc0 [ 1518.339309] ksys_ioctl+0xa9/0xd0 [ 1518.342784] __x64_sys_ioctl+0x73/0xb0 [ 1518.346695] do_syscall_64+0x1b9/0x820 [ 1518.350607] ? syscall_slow_exit_work+0x500/0x500 [ 1518.355473] ? syscall_return_slowpath+0x5e0/0x5e0 [ 1518.360453] ? syscall_return_slowpath+0x31d/0x5e0 [ 1518.365410] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1518.370974] ? retint_user+0x18/0x18 [ 1518.374715] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1518.379585] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1518.384788] RIP: 0033:0x455a79 [ 1518.387982] Code: 1d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1518.407384] RSP: 002b:00007f420d477c68 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1518.415138] RAX: ffffffffffffffda RBX: 00007f420d4786d4 RCX: 0000000000455a79 [ 1518.422453] RDX: 0000000000000000 RSI: 0000000000004c80 RDI: 0000000000000015 [ 1518.429739] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 1518.437023] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000016 [ 1518.444308] R13: 00000000004bdfb1 R14: 00000000004ccab0 R15: 000000000000001e 03:54:40 executing program 2: r0 = syz_open_dev$sndseq(&(0x7f0000dcc000)='/dev/snd/seq\x00', 0x0, 0x2) read(r0, &(0x7f0000fb6000)=""/28, 0x3f0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000418f50)={{0x80, 0x6}, "0a4ceaa05d9a00000000000000039b3fd4cec307e8ef3d13eb790ec9c65abaf90d229db692542e5b78f8b29e0a27800f0000000000000009fb42f376589701a4", 0xa9824f69d1376637, 0x10800a, 0x0, 0x0, 0x1, 0x100, 0x0, 0x0, 0x3}) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000240)={0xbf}) write$binfmt_script(r0, &(0x7f0000000000)=ANY=[], 0x0) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) fchmod(r1, 0x8) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f00000002c0)={{0x7}, 'port0\x00', 0x0, 0x120400, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x4}) 03:54:40 executing program 7: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f000000d000)={0xa, 0x4e20}, 0x1c) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}, 0xb}, 0x1c) syz_emit_ethernet(0x3e, &(0x7f00000001c0)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @random="e829f650db0f", [], {@ipv6={0x86dd, {0x0, 0x6, "50a09c", 0x8, 0xffffff11, 0x0, @remote={0xfe, 0x80, [], 0xbb}, @local={0xfe, 0x80, [], 0xaa}, {[], @udp={0x0, 0x4e20, 0x8}}}}}}, &(0x7f0000000040)) syz_emit_ethernet(0x3e, &(0x7f0000000000)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], {@ipv6={0x86dd, {0x0, 0x6, "50a09c", 0x8, 0xffffff11, 0x0, @remote={0xfe, 0x80, [], 0xbb}, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4305], 0xaa}, {[], @udp={0x300, 0x4e20, 0x8}}}}}}, &(0x7f0000000040)) 03:54:40 executing program 3: ioctl$BLKDISCARD(0xffffffffffffffff, 0x1277, &(0x7f0000000180)) r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140)='/dev/snapshot\x00', 0x0, 0x0) io_setup(0x100000001, &(0x7f0000000100)) fcntl$addseals(0xffffffffffffffff, 0x409, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f0000000000), &(0x7f00000000c0)=0x8) ioctl$sock_inet_SIOCRTMSG(r0, 0x890d, &(0x7f00000001c0)={0xec2, {0x2, 0x4e23, @rand_addr=0x100000001}, {0x2, 0x4e21, @multicast2=0xe0000002}, {0x2, 0x4e22, @local={0xac, 0x14, 0x14, 0xaa}}, 0x80, 0x8000, 0x9, 0x0, 0x100000001, &(0x7f0000000080)='syzkaller1\x00', 0x2, 0x80000001}) ioctl$EVIOCGLED(0xffffffffffffffff, 0x80404519, &(0x7f0000000580)=""/236) open$dir(&(0x7f0000000040)='./file0\x00', 0x4000, 0x21) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x3c, 0x0) ioctl$EVIOCGKEYCODE_V2(0xffffffffffffffff, 0x80284504, &(0x7f00000003c0)=""/188) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c82, 0x0) 03:54:40 executing program 5: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer2\x00', 0x0, 0x0) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000040)="025cc83d6d345f8f762070") ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r0, 0x40085112, &(0x7f0000b18000)={{0xffffff93}, {0xffffffa0}, 0x0, 0x0, 0x0, [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800000000000000]}) 03:54:40 executing program 4: r0 = socket(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0xfb}, 0xc, &(0x7f0000000900)={&(0x7f0000000040)={0x14, 0x1e, 0x201}, 0x14}, 0x1}, 0x0) 03:54:40 executing program 0 (fault-call:10 fault-nth:31): r0 = syz_open_dev$vcsa(&(0x7f0000000100)='/dev/vcsa#\x00', 0x5, 0x101000) ioctl$BLKDISCARD(r0, 0x1277, &(0x7f0000000180)=0x5f) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140)='/dev/snapshot\x00', 0x0, 0x0) connect$nfc_llcp(r1, &(0x7f0000000300)={0x27, 0x0, 0x0, 0x6, 0x0, 0x0, "f44825e9da257dcd22512d531f545cf0bce08002f76d5e9bd3d1dcb3f649bf7ba49078f877ce09f903ed489ab0bbf0f088675b47312412edd6bd577062eb34", 0x1c}, 0x60) fcntl$addseals(0xffffffffffffffff, 0x409, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EVIOCGLED(r1, 0x80404519, &(0x7f0000000580)=""/236) ioctl$FS_IOC_SETFSLABEL(r2, 0x41009432, &(0x7f0000000480)="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") r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x3c, 0x0) ioctl$EVIOCGKEYCODE_V2(0xffffffffffffffff, 0x80284504, &(0x7f00000003c0)=""/188) ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x0) 03:54:40 executing program 1: r0 = socket(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1001}, 0xc, &(0x7f0000000900)={&(0x7f0000000040)={0x14, 0x1e, 0x201}, 0x14}, 0x1}, 0x0) 03:54:40 executing program 1: r0 = socket(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x6401}, 0xc, &(0x7f0000000900)={&(0x7f0000000040)={0x14, 0x1e, 0x201}, 0x14}, 0x1}, 0x0) 03:54:40 executing program 6: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'aegis128-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(0xffffffffffffffff, &(0x7f0000001380)={0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f00000004c0)=[@assoc={0x18, 0x117, 0x4}], 0x18}, 0x0) write$binfmt_script(r1, &(0x7f0000000100)=ANY=[], 0x302) readv(r1, &(0x7f00000000c0), 0x10000000000002b6) 03:54:40 executing program 4: r0 = socket(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8d01000000000000}, 0xc, &(0x7f0000000900)={&(0x7f0000000040)={0x14, 0x1e, 0x201}, 0x14}, 0x1}, 0x0) 03:54:40 executing program 7: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f000000d000)={0xa, 0x4e20}, 0x1c) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}, 0xb}, 0x1c) syz_emit_ethernet(0x3e, &(0x7f00000001c0)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @random="e829f650db0f", [], {@ipv6={0x86dd, {0x0, 0x6, "50a09c", 0x8, 0xffffff11, 0x0, @remote={0xfe, 0x80, [], 0xbb}, @local={0xfe, 0x80, [], 0xaa}, {[], @udp={0x0, 0x4e20, 0x8}}}}}}, &(0x7f0000000040)) syz_emit_ethernet(0x3e, &(0x7f0000000000)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], {@ipv6={0x86dd, {0x0, 0x6, "50a09c", 0x8, 0xffffff11, 0x0, @remote={0xfe, 0x80, [], 0xbb}, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81000000], 0xaa}, {[], @udp={0x300, 0x4e20, 0x8}}}}}}, &(0x7f0000000040)) 03:54:40 executing program 3: ioctl$BLKDISCARD(0xffffffffffffffff, 0x1277, &(0x7f0000000180)) r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140)='/dev/snapshot\x00', 0x0, 0x0) fcntl$addseals(0xffffffffffffffff, 0x409, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f0000000000), &(0x7f00000000c0)=0x8) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r3, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000100)=[@text64={0x40, &(0x7f00000000c0)="c4824da82b66ba2100b801000000efb9270900000f323640a7650f30c4e2899c8e02000000f02046452ef3440f6fb800f0ff7fc42101dbc40f2047", 0x3b}], 0x1, 0x0, &(0x7f0000000080), 0x0) ioctl$KVM_SET_CPUID(r4, 0x4008ae8a, &(0x7f00000002c0)=ANY=[@ANYBLOB="0100000000000000010000000000000018000000ff"]) ioctl$KVM_SET_MSRS(r4, 0x4008ae89, &(0x7f0000000040)=ANY=[@ANYBLOB="01000000001e00fb034d564b0000000001"]) ioctl$KVM_ENABLE_CAP_CPU(r4, 0x4008ae89, &(0x7f00000001c0)={0x2, 0x0, [0x48b, 0x0, 0x400000b7, 0x100]}) r5 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r5) ioctl$EVIOCGLED(0xffffffffffffffff, 0x80404519, &(0x7f0000000580)=""/236) r6 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x3c, 0x0) ioctl$EVIOCGKEYCODE_V2(0xffffffffffffffff, 0x80284504, &(0x7f00000003c0)=""/188) ioctl$LOOP_CTL_REMOVE(r6, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c82, 0x0) 03:54:40 executing program 5: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer2\x00', 0x0, 0x0) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000040)="025cc83d6d345f8f762070") ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r0, 0x40085112, &(0x7f0000b18000)={{0xffffff93}, {0xffffffa0}, 0x0, 0x0, 0x0, [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400000000000000]}) [ 1519.067318] FAULT_INJECTION: forcing a failure. [ 1519.067318] name failslab, interval 1, probability 0, space 0, times 0 [ 1519.079798] CPU: 1 PID: 6805 Comm: syz-executor0 Not tainted 4.18.0-rc4+ #144 [ 1519.087083] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1519.096439] Call Trace: [ 1519.099057] dump_stack+0x1c9/0x2b4 [ 1519.102697] ? dump_stack_print_info.cold.2+0x52/0x52 [ 1519.107898] ? finish_task_switch+0x1d3/0x870 [ 1519.112400] ? finish_task_switch+0x18a/0x870 [ 1519.116913] should_fail.cold.4+0xa/0x1a [ 1519.120985] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 1519.126100] ? __schedule+0x884/0x1ed0 [ 1519.130022] ? __sched_text_start+0x8/0x8 [ 1519.134193] ? find_held_lock+0x36/0x1c0 [ 1519.139216] ? __lock_is_held+0xb5/0x140 [ 1519.143308] ? check_same_owner+0x340/0x340 [ 1519.147657] __should_failslab+0x124/0x180 [ 1519.151924] should_failslab+0x9/0x14 [ 1519.155738] kmem_cache_alloc_node_trace+0x26f/0x770 [ 1519.160849] ? __kmalloc_node+0x33/0x70 [ 1519.164834] ? __kmalloc_node+0x33/0x70 [ 1519.168816] ? rcu_read_lock_sched_held+0x108/0x120 [ 1519.173852] __kmalloc_node+0x33/0x70 [ 1519.177664] sbitmap_init_node+0x290/0x450 [ 1519.181909] blk_mq_realloc_hw_ctxs+0x747/0x1390 [ 1519.186688] ? blk_mq_free_map_and_requests+0x160/0x160 [ 1519.192072] ? __lock_is_held+0xb5/0x140 [ 1519.196154] ? __kmalloc_node+0x33/0x70 [ 1519.200142] ? __kmalloc_node+0x33/0x70 [ 1519.204206] ? rcu_read_lock_sched_held+0x108/0x120 [ 1519.209285] ? kmem_cache_alloc_node_trace+0x34e/0x770 [ 1519.214585] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 1519.219626] ? kasan_unpoison_shadow+0x35/0x50 [ 1519.224227] ? kasan_kmalloc+0xc4/0xe0 [ 1519.228143] blk_mq_init_allocated_queue+0x2c0/0x15a0 [ 1519.233374] ? lockdep_init_map+0x9/0x10 [ 1519.237449] ? blk_mq_map_swqueue+0xae0/0xae0 [ 1519.241955] ? __mutex_init+0x1f7/0x290 [ 1519.245958] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1519.251516] ? __blk_mq_alloc_rq_map+0x17d/0x2e0 [ 1519.256310] ? blk_mq_update_nr_hw_queues+0x510/0x510 [ 1519.261542] blk_mq_init_queue+0x63/0xb0 [ 1519.265633] loop_add+0x33d/0x9d0 [ 1519.269115] ? loop_lookup+0x105/0x230 [ 1519.273032] ? loop_queue_rq+0x660/0x660 [ 1519.277116] ? debug_lockdep_rcu_enabled.part.1+0x37/0x60 [ 1519.282685] loop_control_ioctl+0x199/0x540 [ 1519.287030] ? loop_add+0x9d0/0x9d0 [ 1519.290681] ? expand_files.part.8+0x9c0/0x9c0 [ 1519.295294] ? kasan_check_write+0x14/0x20 [ 1519.299568] ? loop_add+0x9d0/0x9d0 [ 1519.303216] do_vfs_ioctl+0x1de/0x1720 [ 1519.307131] ? ioctl_preallocate+0x300/0x300 [ 1519.311566] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 1519.316612] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1519.321400] ? retint_kernel+0x10/0x10 [ 1519.325315] ? ksys_ioctl+0x98/0xd0 [ 1519.328964] ksys_ioctl+0xa9/0xd0 [ 1519.332434] __x64_sys_ioctl+0x73/0xb0 [ 1519.336342] do_syscall_64+0x1b9/0x820 [ 1519.340253] ? syscall_slow_exit_work+0x500/0x500 [ 1519.345115] ? syscall_return_slowpath+0x5e0/0x5e0 [ 1519.350076] ? syscall_return_slowpath+0x31d/0x5e0 [ 1519.355031] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe [ 1519.360420] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1519.365291] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1519.373268] RIP: 0033:0x455a79 [ 1519.376454] Code: 1d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1519.395836] RSP: 002b:00007f420d477c68 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1519.403557] RAX: ffffffffffffffda RBX: 00007f420d4786d4 RCX: 0000000000455a79 [ 1519.410835] RDX: 0000000000000000 RSI: 0000000000004c80 RDI: 0000000000000015 [ 1519.418156] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 1519.425447] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000016 [ 1519.432722] R13: 00000000004bdfb1 R14: 00000000004ccab0 R15: 000000000000001f 03:54:41 executing program 0 (fault-call:10 fault-nth:32): r0 = syz_open_dev$vcsa(&(0x7f0000000100)='/dev/vcsa#\x00', 0x5, 0x101000) ioctl$BLKDISCARD(r0, 0x1277, &(0x7f0000000180)=0x5f) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140)='/dev/snapshot\x00', 0x0, 0x0) connect$nfc_llcp(r1, &(0x7f0000000300)={0x27, 0x0, 0x0, 0x6, 0x0, 0x0, "f44825e9da257dcd22512d531f545cf0bce08002f76d5e9bd3d1dcb3f649bf7ba49078f877ce09f903ed489ab0bbf0f088675b47312412edd6bd577062eb34", 0x1c}, 0x60) fcntl$addseals(0xffffffffffffffff, 0x409, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EVIOCGLED(r1, 0x80404519, &(0x7f0000000580)=""/236) ioctl$FS_IOC_SETFSLABEL(r2, 0x41009432, &(0x7f0000000480)="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") r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x3c, 0x0) ioctl$EVIOCGKEYCODE_V2(0xffffffffffffffff, 0x80284504, &(0x7f00000003c0)=""/188) ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x0) 03:54:41 executing program 7: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f000000d000)={0xa, 0x4e20}, 0x1c) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}, 0xb}, 0x1c) syz_emit_ethernet(0x3e, &(0x7f00000001c0)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @random="e829f650db0f", [], {@ipv6={0x86dd, {0x0, 0x6, "50a09c", 0x8, 0xffffff11, 0x0, @remote={0xfe, 0x80, [], 0xbb}, @local={0xfe, 0x80, [], 0xaa}, {[], @udp={0x0, 0x4e20, 0x8}}}}}}, &(0x7f0000000040)) syz_emit_ethernet(0x3e, &(0x7f0000000000)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], {@ipv6={0x86dd, {0x0, 0x6, "50a09c", 0x8, 0xffffff11, 0x0, @remote={0xfe, 0x80, [], 0xbb}, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x806], 0xaa}, {[], @udp={0x300, 0x4e20, 0x8}}}}}}, &(0x7f0000000040)) 03:54:41 executing program 6: r0 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r0, &(0x7f0000e11ff0)=[{&(0x7f0000000100)="580000001400192340834b80040d8c560a02000000ff81004e227e00000058000b4824ca944f64009400050028925aa8000000000000008000f0ffffffff09000000fff5dd00000010000100050c0c00fcff0000040e05a5", 0x58}], 0x1) [ 1519.738061] FAULT_INJECTION: forcing a failure. [ 1519.738061] name failslab, interval 1, probability 0, space 0, times 0 [ 1519.750502] CPU: 0 PID: 6829 Comm: syz-executor0 Not tainted 4.18.0-rc4+ #144 [ 1519.757785] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1519.767142] Call Trace: [ 1519.769750] dump_stack+0x1c9/0x2b4 [ 1519.773396] ? dump_stack_print_info.cold.2+0x52/0x52 [ 1519.778605] ? lock_release+0xa30/0xa30 [ 1519.782677] ? check_same_owner+0x340/0x340 [ 1519.787019] should_fail.cold.4+0xa/0x1a [ 1519.791094] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 1519.796217] ? __mutex_lock+0x7e8/0x1820 [ 1519.800294] ? elevator_init_mq+0x7f/0x160 [ 1519.804543] ? graph_lock+0x170/0x170 [ 1519.808455] ? _raw_spin_unlock_irqrestore+0x74/0xc0 [ 1519.813671] ? find_held_lock+0x36/0x1c0 [ 1519.817757] ? __lock_is_held+0xb5/0x140 [ 1519.821850] ? check_same_owner+0x340/0x340 [ 1519.826795] ? rcu_note_context_switch+0x730/0x730 [ 1519.831739] ? mark_held_locks+0xc9/0x160 [ 1519.835902] __should_failslab+0x124/0x180 [ 1519.840178] should_failslab+0x9/0x14 [ 1519.843990] kmem_cache_alloc_node_trace+0x26f/0x770 [ 1519.849113] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1519.854666] ? find_next_bit+0x104/0x130 [ 1519.858746] blk_mq_init_tags+0x79/0x2b0 [ 1519.862825] blk_mq_alloc_rq_map+0x9f/0x220 [ 1519.867163] blk_mq_sched_alloc_tags.isra.13+0x7b/0x160 [ 1519.872631] blk_mq_init_sched+0x1e1/0x5a0 [ 1519.876890] elevator_init_mq+0xd7/0x160 [ 1519.881000] blk_mq_init_allocated_queue+0xf34/0x15a0 [ 1519.886329] ? blk_mq_map_swqueue+0xae0/0xae0 [ 1519.890851] ? __mutex_init+0x1f7/0x290 [ 1519.894876] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1519.900528] ? __blk_mq_alloc_rq_map+0x17d/0x2e0 [ 1519.905325] ? blk_mq_update_nr_hw_queues+0x510/0x510 [ 1519.910887] blk_mq_init_queue+0x63/0xb0 [ 1519.914986] loop_add+0x33d/0x9d0 [ 1519.918461] ? loop_lookup+0x105/0x230 [ 1519.922363] ? loop_queue_rq+0x660/0x660 [ 1519.926449] loop_control_ioctl+0x199/0x540 [ 1519.930813] ? loop_add+0x9d0/0x9d0 [ 1519.934451] ? expand_files.part.8+0x9c0/0x9c0 [ 1519.939046] ? kasan_check_write+0x14/0x20 [ 1519.943320] ? __mutex_unlock_slowpath+0x197/0x8c0 [ 1519.948260] ? loop_add+0x9d0/0x9d0 [ 1519.952077] do_vfs_ioctl+0x1de/0x1720 [ 1519.955977] ? __lock_is_held+0xb5/0x140 [ 1519.960753] ? ioctl_preallocate+0x300/0x300 [ 1519.965173] ? __fget_light+0x2f7/0x440 [ 1519.969156] ? fget_raw+0x20/0x20 [ 1519.972618] ? __sb_end_write+0xac/0xe0 [ 1519.976603] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1519.982143] ? fput+0x130/0x1a0 [ 1519.985432] ? ksys_write+0x1ae/0x260 [ 1519.989250] ? security_file_ioctl+0x94/0xc0 [ 1519.993669] ksys_ioctl+0xa9/0xd0 [ 1519.997139] __x64_sys_ioctl+0x73/0xb0 [ 1520.001054] do_syscall_64+0x1b9/0x820 [ 1520.004953] ? syscall_slow_exit_work+0x500/0x500 [ 1520.009841] ? syscall_return_slowpath+0x5e0/0x5e0 [ 1520.014796] ? syscall_return_slowpath+0x31d/0x5e0 [ 1520.019745] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1520.025318] ? retint_user+0x18/0x18 [ 1520.029046] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1520.033909] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1520.039106] RIP: 0033:0x455a79 [ 1520.042296] Code: 1d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1520.061860] RSP: 002b:00007f420d477c68 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1520.069593] RAX: ffffffffffffffda RBX: 00007f420d4786d4 RCX: 0000000000455a79 [ 1520.076872] RDX: 0000000000000000 RSI: 0000000000004c80 RDI: 0000000000000016 [ 1520.084146] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 1520.091452] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000017 [ 1520.098765] R13: 00000000004bdfb1 R14: 00000000004ccab0 R15: 0000000000000020 03:54:41 executing program 1: r0 = socket(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x35}, 0xc, &(0x7f0000000900)={&(0x7f0000000040)={0x14, 0x1e, 0x201}, 0x14}, 0x1}, 0x0) 03:54:41 executing program 5: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer2\x00', 0x0, 0x0) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000040)="025cc83d6d345f8f762070") ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r0, 0x40085112, &(0x7f0000b18000)={{0xffffff93}, {0xffffffa0}, 0x0, 0x0, 0x0, [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfdffffff00000000]}) 03:54:41 executing program 4: r0 = socket(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x9000000000000000}, 0xc, &(0x7f0000000900)={&(0x7f0000000040)={0x14, 0x1e, 0x201}, 0x14}, 0x1}, 0x0) 03:54:41 executing program 0 (fault-call:10 fault-nth:33): r0 = syz_open_dev$vcsa(&(0x7f0000000100)='/dev/vcsa#\x00', 0x5, 0x101000) ioctl$BLKDISCARD(r0, 0x1277, &(0x7f0000000180)=0x5f) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140)='/dev/snapshot\x00', 0x0, 0x0) connect$nfc_llcp(r1, &(0x7f0000000300)={0x27, 0x0, 0x0, 0x6, 0x0, 0x0, "f44825e9da257dcd22512d531f545cf0bce08002f76d5e9bd3d1dcb3f649bf7ba49078f877ce09f903ed489ab0bbf0f088675b47312412edd6bd577062eb34", 0x1c}, 0x60) fcntl$addseals(0xffffffffffffffff, 0x409, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EVIOCGLED(r1, 0x80404519, &(0x7f0000000580)=""/236) ioctl$FS_IOC_SETFSLABEL(r2, 0x41009432, &(0x7f0000000480)="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") r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x3c, 0x0) ioctl$EVIOCGKEYCODE_V2(0xffffffffffffffff, 0x80284504, &(0x7f00000003c0)=""/188) ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x0) 03:54:41 executing program 2: r0 = syz_open_dev$sndseq(&(0x7f0000dcc000)='/dev/snd/seq\x00', 0x0, 0x2) syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x200, 0x200800) read(r0, &(0x7f0000fb6000)=""/28, 0x3f0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000418f50)={{0x80}, "0a4ceaa05d9a00000000000000039b3fd4cec307e8ef3d13eb790ec9c65abaf90d229db692542e5b78f8b29e0a27800f0000000000000009fb42f376589701a4", 0xa9824f69d1376637, 0x10800a}) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000240)={0xbf}) write$binfmt_script(r0, &(0x7f0000000000)=ANY=[], 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f00000002c0)={{}, 'port0\x00'}) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0x0, 0x0) 03:54:41 executing program 3: ioctl$BLKDISCARD(0xffffffffffffffff, 0x1277, &(0x7f0000000180)) r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140)='/dev/snapshot\x00', 0x0, 0x0) fcntl$addseals(0xffffffffffffffff, 0x409, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$IP_VS_SO_SET_DEL(r0, 0x0, 0x484, &(0x7f0000000100)={0x73, @dev={0xac, 0x14, 0x14, 0x14}, 0x4e23, 0x4, 'lblc\x00', 0x0, 0x5, 0x2f}, 0x2c) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f0000000000), &(0x7f00000000c0)=0x8) recvmsg$kcm(r0, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f00000001c0)=""/47, 0x2f}, {&(0x7f0000000800)=""/69, 0x45}, {&(0x7f0000000880)=""/240, 0xf0}], 0x3, &(0x7f0000000780)=""/66, 0xa}, 0x1) ioctl$EVIOCGLED(0xffffffffffffffff, 0x80404519, &(0x7f0000000580)=""/236) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x3c, 0x0) ioctl$VHOST_SET_OWNER(r0, 0xaf01, 0x0) ioctl$EVIOCGKEYCODE_V2(0xffffffffffffffff, 0x80284504, &(0x7f00000003c0)=""/188) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) r3 = fcntl$getown(r1, 0x9) sched_setscheduler(r3, 0x3, &(0x7f0000000040)=0x200) setsockopt$inet_sctp6_SCTP_FRAGMENT_INTERLEAVE(r0, 0x84, 0x12, &(0x7f0000000080)=0x6, 0x4) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c82, 0x0) 03:54:41 executing program 6: r0 = syz_open_dev$binder(&(0x7f0000001000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r0, 0x40046207, 0x0) r1 = syz_open_dev$binder(&(0x7f0000000200)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) r2 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r2, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000012000)={0x8, 0x0, &(0x7f0000000b80)=[@acquire={0x40046305}], 0x0, 0x0, &(0x7f0000000b40)}) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000b40)={0x18, 0x0, &(0x7f0000000e80)=[@acquire={0x40046305}, @request_death={0x400c630e}], 0x0, 0x0, &(0x7f00000001c0)}) 03:54:41 executing program 7: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f000000d000)={0xa, 0x4e20}, 0x1c) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}, 0xb}, 0x1c) syz_emit_ethernet(0x3e, &(0x7f00000001c0)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @random="e829f650db0f", [], {@ipv6={0x86dd, {0x0, 0x6, "50a09c", 0x8, 0xffffff11, 0x0, @remote={0xfe, 0x80, [], 0xbb}, @local={0xfe, 0x80, [], 0xaa}, {[], @udp={0x0, 0x4e20, 0x8}}}}}}, &(0x7f0000000040)) syz_emit_ethernet(0x3e, &(0x7f0000000000)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], {@ipv6={0x86dd, {0x0, 0x6, "50a09c", 0x8, 0xffffff11, 0x0, @remote={0xfe, 0x80, [], 0xbb}, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3000000000000000], 0xaa}, {[], @udp={0x300, 0x4e20, 0x8}}}}}}, &(0x7f0000000040)) 03:54:42 executing program 1: r0 = socket(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0xcf}, 0xc, &(0x7f0000000900)={&(0x7f0000000040)={0x14, 0x1e, 0x201}, 0x14}, 0x1}, 0x0) 03:54:42 executing program 5: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer2\x00', 0x0, 0x0) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000040)="025cc83d6d345f8f762070") ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r0, 0x40085112, &(0x7f0000b18000)={{0xffffff93}, {0xffffffa0}, 0x0, 0x0, 0x0, [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfdffffff]}) [ 1520.453344] binder: BINDER_SET_CONTEXT_MGR already set [ 1520.492914] binder: 6851:6858 ioctl 40046207 0 returned -16 [ 1520.496816] FAULT_INJECTION: forcing a failure. [ 1520.496816] name failslab, interval 1, probability 0, space 0, times 0 [ 1520.510509] CPU: 1 PID: 6852 Comm: syz-executor0 Not tainted 4.18.0-rc4+ #144 [ 1520.517826] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1520.527197] Call Trace: [ 1520.529821] dump_stack+0x1c9/0x2b4 [ 1520.533487] ? dump_stack_print_info.cold.2+0x52/0x52 [ 1520.538717] should_fail.cold.4+0xa/0x1a [ 1520.542819] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 1520.548081] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 1520.553130] ? graph_lock+0x170/0x170 [ 1520.556969] ? find_held_lock+0x36/0x1c0 [ 1520.561057] ? __lock_is_held+0xb5/0x140 [ 1520.565156] ? check_same_owner+0x340/0x340 [ 1520.569515] ? rcu_note_context_switch+0x730/0x730 [ 1520.574478] __should_failslab+0x124/0x180 [ 1520.578743] should_failslab+0x9/0x14 [ 1520.582744] kmem_cache_alloc_node_trace+0x26f/0x770 [ 1520.587884] ? rcu_read_lock_sched_held+0x108/0x120 [ 1520.593726] ? kmem_cache_alloc_node_trace+0x34e/0x770 [ 1520.599252] __kmalloc_node+0x33/0x70 [ 1520.603181] blk_alloc_flush_queue+0x180/0x3e0 [ 1520.607792] ? blk_insert_flush+0xb00/0xb00 [ 1520.612151] ? retint_kernel+0x10/0x10 [ 1520.616080] ? blk_mq_sched_init_hctx+0x1f/0x1a0 [ 1520.620870] ? blk_mq_sched_init_hctx+0x42/0x1a0 [ 1520.625672] ? blk_mq_sched_init_hctx+0x117/0x1a0 [ 1520.630551] blk_mq_realloc_hw_ctxs+0x97e/0x1390 [ 1520.635353] ? blk_mq_free_map_and_requests+0x160/0x160 [ 1520.640754] ? __lock_is_held+0xb5/0x140 [ 1520.644849] ? __kmalloc_node+0x33/0x70 [ 1520.648849] ? rcu_read_lock_sched_held+0x108/0x120 [ 1520.653891] ? kmem_cache_alloc_node_trace+0x34e/0x770 [ 1520.659203] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 1520.664262] ? kasan_unpoison_shadow+0x35/0x50 [ 1520.668874] ? kasan_kmalloc+0xc4/0xe0 [ 1520.672788] blk_mq_init_allocated_queue+0x2c0/0x15a0 [ 1520.678006] ? lockdep_init_map+0x9/0x10 [ 1520.682089] ? blk_mq_map_swqueue+0xae0/0xae0 [ 1520.686600] ? __mutex_init+0x1f7/0x290 [ 1520.690598] ? retint_kernel+0x10/0x10 [ 1520.694513] ? __mutex_init+0x1f/0x290 [ 1520.698431] ? blk_mq_update_nr_hw_queues+0x510/0x510 [ 1520.703645] blk_mq_init_queue+0x63/0xb0 [ 1520.707728] loop_add+0x33d/0x9d0 [ 1520.711368] ? loop_lookup+0x105/0x230 [ 1520.715357] ? loop_queue_rq+0x660/0x660 [ 1520.719437] loop_control_ioctl+0x199/0x540 [ 1520.723770] ? loop_add+0x9d0/0x9d0 [ 1520.727585] ? expand_files.part.8+0x9c0/0x9c0 [ 1520.732184] ? kasan_check_write+0x14/0x20 [ 1520.736431] ? __mutex_unlock_slowpath+0x197/0x8c0 [ 1520.741377] ? loop_add+0x9d0/0x9d0 [ 1520.745025] do_vfs_ioctl+0x1de/0x1720 [ 1520.748932] ? __lock_is_held+0xb5/0x140 [ 1520.753015] ? ioctl_preallocate+0x300/0x300 [ 1520.757432] ? __fget_light+0x2f7/0x440 [ 1520.761423] ? fget_raw+0x20/0x20 [ 1520.764892] ? __sb_end_write+0xac/0xe0 [ 1520.768895] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1520.774447] ? fput+0x130/0x1a0 [ 1520.777754] ? ksys_write+0x1ae/0x260 [ 1520.781564] ? retint_kernel+0x10/0x10 [ 1520.785470] ? security_file_ioctl+0x94/0xc0 [ 1520.789889] ksys_ioctl+0xa9/0xd0 [ 1520.793362] __x64_sys_ioctl+0x73/0xb0 [ 1520.797262] do_syscall_64+0x1b9/0x820 [ 1520.801159] ? syscall_slow_exit_work+0x500/0x500 [ 1520.806013] ? syscall_return_slowpath+0x5e0/0x5e0 [ 1520.810984] ? syscall_return_slowpath+0x31d/0x5e0 [ 1520.815947] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe [ 1520.821334] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1520.826211] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1520.831420] RIP: 0033:0x455a79 [ 1520.834612] Code: 1d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 03:54:42 executing program 7: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f000000d000)={0xa, 0x4e20}, 0x1c) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}, 0xb}, 0x1c) syz_emit_ethernet(0x3e, &(0x7f00000001c0)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @random="e829f650db0f", [], {@ipv6={0x86dd, {0x0, 0x6, "50a09c", 0x8, 0xffffff11, 0x0, @remote={0xfe, 0x80, [], 0xbb}, @local={0xfe, 0x80, [], 0xaa}, {[], @udp={0x0, 0x4e20, 0x8}}}}}}, &(0x7f0000000040)) syz_emit_ethernet(0x3e, &(0x7f0000000000)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], {@ipv6={0x86dd, {0x0, 0x6, "50a09c", 0x8, 0xffffff11, 0x0, @remote={0xfe, 0x80, [], 0xbb}, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x88a8ffff], 0xaa}, {[], @udp={0x300, 0x4e20, 0x8}}}}}}, &(0x7f0000000040)) 03:54:42 executing program 3: ioctl$BLKDISCARD(0xffffffffffffffff, 0x1277, &(0x7f0000000040)) r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140)='/dev/snapshot\x00', 0x0, 0x0) fcntl$addseals(0xffffffffffffffff, 0x409, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f0000000000), &(0x7f00000000c0)=0x8) ioctl$EVIOCGLED(0xffffffffffffffff, 0x80404519, &(0x7f0000000580)=""/236) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x3c, 0x0) ioctl$EVIOCGKEYCODE_V2(0xffffffffffffffff, 0x80284504, &(0x7f00000003c0)=""/188) ioctl$SNDRV_SEQ_IOCTL_DELETE_PORT(r0, 0x40a85321, &(0x7f0000000180)={{0x5}, 'port0\x00', 0x8, 0x20, 0x80000001, 0x2, 0x7, 0x8, 0x4, 0x0, 0x4, 0xdc}) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c82, 0x0) 03:54:42 executing program 4: r0 = socket(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0xf0000000}, 0xc, &(0x7f0000000900)={&(0x7f0000000040)={0x14, 0x1e, 0x201}, 0x14}, 0x1}, 0x0) 03:54:42 executing program 6: socketpair$unix(0x1, 0x10000000000005, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0) getsockname$unix(r0, &(0x7f0000000000)=@abs, &(0x7f00000001c0)=0xffffff22) [ 1520.854029] RSP: 002b:00007f420d477c68 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1520.861755] RAX: ffffffffffffffda RBX: 00007f420d4786d4 RCX: 0000000000455a79 [ 1520.869040] RDX: 0000000000000000 RSI: 0000000000004c80 RDI: 0000000000000016 [ 1520.876320] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 1520.883603] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000017 [ 1520.890884] R13: 00000000004bdfb1 R14: 00000000004ccab0 R15: 0000000000000021 03:54:42 executing program 1: r0 = socket(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0xa000}, 0xc, &(0x7f0000000900)={&(0x7f0000000040)={0x14, 0x1e, 0x201}, 0x14}, 0x1}, 0x0) 03:54:42 executing program 3: ioctl$BLKDISCARD(0xffffffffffffffff, 0x1277, &(0x7f0000000180)) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140)='/dev/snapshot\x00', 0x0, 0x0) fcntl$addseals(0xffffffffffffffff, 0x409, 0x0) r0 = socket$inet_sctp(0x2, 0x5, 0x84) sendmmsg$inet_sctp(r0, &(0x7f00000026c0)=[{&(0x7f0000001280)=@in={0x2, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}}, 0x10, &(0x7f0000002500)=[{&(0x7f0000002480)="95", 0x1}], 0x1, &(0x7f0000002600)=[@dstaddrv4={0x18, 0x84, 0x7, @remote={0xac, 0x14, 0x14, 0xbb}}], 0x18}], 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f0000000000), &(0x7f00000000c0)=0x8) ioctl$EVIOCGLED(0xffffffffffffffff, 0x80404519, &(0x7f0000000580)=""/236) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x3c, 0x0) ioctl$EVIOCGKEYCODE_V2(0xffffffffffffffff, 0x80284504, &(0x7f00000003c0)=""/188) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c82, 0x0) 03:54:42 executing program 4: r0 = socket(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0xf8000000}, 0xc, &(0x7f0000000900)={&(0x7f0000000040)={0x14, 0x1e, 0x201}, 0x14}, 0x1}, 0x0) 03:54:42 executing program 5: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer2\x00', 0x0, 0x0) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000040)="025cc83d6d345f8f762070") ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r0, 0x40085112, &(0x7f0000b18000)={{0xffffff93}, {0xffffffa0}, 0x0, 0x0, 0x0, [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffdfd]}) 03:54:42 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") bpf$PROG_LOAD(0x5, &(0x7f0000008000)={0x0, 0x1, &(0x7f0000001fe8)=ANY=[@ANYBLOB="e900000000000063cf"], &(0x7f0000003ff6)='syzkaller\x00', 0x0, 0xc3, &(0x7f0000009f3d)=""/195}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x5, &(0x7f0000001fd8)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0xffffffaf}, [@ldst={0x65, 0x0, 0x5, 0x0, 0x0, 0x0, 0xffffffb0}], {0x95}}, &(0x7f0000003ff6)='GPL\x00', 0x5, 0x437, &(0x7f000000cf3d)=""/195}, 0x48) 03:54:42 executing program 0 (fault-call:10 fault-nth:34): r0 = syz_open_dev$vcsa(&(0x7f0000000100)='/dev/vcsa#\x00', 0x5, 0x101000) ioctl$BLKDISCARD(r0, 0x1277, &(0x7f0000000180)=0x5f) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140)='/dev/snapshot\x00', 0x0, 0x0) connect$nfc_llcp(r1, &(0x7f0000000300)={0x27, 0x0, 0x0, 0x6, 0x0, 0x0, "f44825e9da257dcd22512d531f545cf0bce08002f76d5e9bd3d1dcb3f649bf7ba49078f877ce09f903ed489ab0bbf0f088675b47312412edd6bd577062eb34", 0x1c}, 0x60) fcntl$addseals(0xffffffffffffffff, 0x409, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EVIOCGLED(r1, 0x80404519, &(0x7f0000000580)=""/236) ioctl$FS_IOC_SETFSLABEL(r2, 0x41009432, &(0x7f0000000480)="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") r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x3c, 0x0) ioctl$EVIOCGKEYCODE_V2(0xffffffffffffffff, 0x80284504, &(0x7f00000003c0)=""/188) ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x0) [ 1521.376209] FAULT_INJECTION: forcing a failure. [ 1521.376209] name failslab, interval 1, probability 0, space 0, times 0 [ 1521.388706] CPU: 0 PID: 6891 Comm: syz-executor0 Not tainted 4.18.0-rc4+ #144 [ 1521.396079] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1521.405477] Call Trace: [ 1521.408089] dump_stack+0x1c9/0x2b4 [ 1521.411738] ? dump_stack_print_info.cold.2+0x52/0x52 [ 1521.416957] should_fail.cold.4+0xa/0x1a [ 1521.421038] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 1521.426386] ? __schedule+0x884/0x1ed0 [ 1521.430295] ? __sched_text_start+0x8/0x8 [ 1521.434628] ? find_held_lock+0x36/0x1c0 [ 1521.438707] ? __lock_is_held+0xb5/0x140 [ 1521.442786] ? check_same_owner+0x340/0x340 [ 1521.447117] ? retint_kernel+0x10/0x10 [ 1521.451026] __should_failslab+0x124/0x180 [ 1521.455278] should_failslab+0x9/0x14 [ 1521.459101] kmem_cache_alloc_node_trace+0x26f/0x770 [ 1521.464223] sbitmap_queue_init_node+0x330/0x850 [ 1521.469306] ? sbitmap_init_node+0x450/0x450 [ 1521.473728] ? rcu_read_lock_sched_held+0x108/0x120 [ 1521.478756] ? kmem_cache_alloc_node_trace+0x34e/0x770 [ 1521.484042] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1521.489587] ? find_next_bit+0x104/0x130 [ 1521.493664] blk_mq_init_tags+0x11b/0x2b0 [ 1521.497827] blk_mq_alloc_rq_map+0x9f/0x220 [ 1521.502167] blk_mq_sched_alloc_tags.isra.13+0x7b/0x160 [ 1521.507557] blk_mq_init_sched+0x1e1/0x5a0 [ 1521.511838] elevator_init_mq+0xd7/0x160 [ 1521.515918] blk_mq_init_allocated_queue+0xf34/0x15a0 [ 1521.521130] ? blk_mq_map_swqueue+0xae0/0xae0 [ 1521.525656] ? __mutex_init+0x1f7/0x290 [ 1521.529669] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1521.535224] ? __blk_mq_alloc_rq_map+0x17d/0x2e0 [ 1521.540000] ? blk_mq_update_nr_hw_queues+0x510/0x510 [ 1521.545205] blk_mq_init_queue+0x63/0xb0 [ 1521.549276] loop_add+0x33d/0x9d0 [ 1521.552740] ? loop_lookup+0x105/0x230 [ 1521.556635] ? loop_queue_rq+0x660/0x660 [ 1521.560713] loop_control_ioctl+0x199/0x540 [ 1521.565040] ? loop_add+0x9d0/0x9d0 [ 1521.568678] ? retint_kernel+0x10/0x10 [ 1521.572576] ? do_vfs_ioctl+0x123/0x1720 [ 1521.576639] ? loop_add+0x9d0/0x9d0 [ 1521.580275] do_vfs_ioctl+0x1de/0x1720 [ 1521.584175] ? ioctl_preallocate+0x300/0x300 [ 1521.588587] ? __fget_light+0x2f7/0x440 [ 1521.592563] ? __schedule+0x1ed0/0x1ed0 [ 1521.596547] ? fget_raw+0x20/0x20 [ 1521.600008] ? __sb_end_write+0xac/0xe0 [ 1521.603995] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1521.609537] ? exit_to_usermode_loop+0x8c/0x370 [ 1521.614221] ? security_file_ioctl+0x94/0xc0 [ 1521.618636] ksys_ioctl+0xa9/0xd0 [ 1521.622100] __x64_sys_ioctl+0x73/0xb0 [ 1521.626016] do_syscall_64+0x1b9/0x820 [ 1521.629910] ? syscall_slow_exit_work+0x500/0x500 [ 1521.634766] ? syscall_return_slowpath+0x5e0/0x5e0 [ 1521.639719] ? syscall_return_slowpath+0x31d/0x5e0 [ 1521.644663] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe [ 1521.650056] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1521.654918] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1521.660115] RIP: 0033:0x455a79 [ 1521.663300] Code: 1d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1521.682684] RSP: 002b:00007f420d477c68 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1521.690402] RAX: ffffffffffffffda RBX: 00007f420d4786d4 RCX: 0000000000455a79 [ 1521.697677] RDX: 0000000000000000 RSI: 0000000000004c80 RDI: 0000000000000016 [ 1521.704954] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 1521.712227] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000017 [ 1521.719502] R13: 00000000004bdfb1 R14: 00000000004ccab0 R15: 0000000000000022 03:54:43 executing program 2: r0 = syz_open_dev$sndseq(&(0x7f0000dcc000)='/dev/snd/seq\x00', 0x0, 0x2) read(r0, &(0x7f0000fb6000)=""/28, 0xd3701f01db68fd9) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000418f50)={{0x80}, "0a4ceaa05d9a00000000000000039b3fd4cec307e8ef3d13eb790ec9c65abaf90d229db692542e5b78f8b29e0a27800f0000000000000009fb42f376589701a4", 0xa9824f69d1376637, 0x10800a}) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000240)={0xbf}) write$binfmt_script(r0, &(0x7f0000000000)=ANY=[], 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f00000002c0)={{}, 'port0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000}) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer2\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r1, 0x84, 0x22, &(0x7f0000000000)={0x9, 0x2, 0x1, 0x9, 0x0}, &(0x7f0000000040)=0x10) setsockopt$inet_sctp_SCTP_AUTH_DELETE_KEY(r1, 0x84, 0x19, &(0x7f0000000080)={r2, 0x80}, 0x8) 03:54:43 executing program 7: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f000000d000)={0xa, 0x4e20}, 0x1c) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}, 0xb}, 0x1c) syz_emit_ethernet(0x3e, &(0x7f00000001c0)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @random="e829f650db0f", [], {@ipv6={0x86dd, {0x0, 0x6, "50a09c", 0x8, 0xffffff11, 0x0, @remote={0xfe, 0x80, [], 0xbb}, @local={0xfe, 0x80, [], 0xaa}, {[], @udp={0x0, 0x4e20, 0x8}}}}}}, &(0x7f0000000040)) syz_emit_ethernet(0x3e, &(0x7f0000000000)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], {@ipv6={0x86dd, {0x0, 0x6, "50a09c", 0x8, 0xffffff11, 0x0, @remote={0xfe, 0x80, [], 0xbb}, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb000000], 0xaa}, {[], @udp={0x300, 0x4e20, 0x8}}}}}}, &(0x7f0000000040)) 03:54:43 executing program 1: r0 = socket(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0xe300}, 0xc, &(0x7f0000000900)={&(0x7f0000000040)={0x14, 0x1e, 0x201}, 0x14}, 0x1}, 0x0) 03:54:43 executing program 3: ioctl$BLKDISCARD(0xffffffffffffffff, 0x1277, &(0x7f0000000180)) r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140)='/dev/snapshot\x00', 0x0, 0x0) fcntl$addseals(0xffffffffffffffff, 0x409, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f0000000000), &(0x7f00000000c0)=0x8) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x1, &(0x7f00000001c0)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_ADDR(r0, &(0x7f0000000800)={0x15, 0x110, 0xfa00, {r2, 0x2, 0x0, 0x0, 0x0, @ib={0x1b, 0x8, 0x5f, {"ecdd84e36f95044bec90587691ba5c1c"}, 0x9, 0x10001, 0x8}, @ib={0x1b, 0x1f, 0x33, {"f46a4d826c6ff666be1bba554ad307ba"}, 0xc3f, 0x0, 0x200}}}, 0x118) ioctl$EVIOCGLED(0xffffffffffffffff, 0x80404519, &(0x7f0000000580)=""/236) write$RDMA_USER_CM_CMD_GET_EVENT(r0, &(0x7f0000000040)={0xc, 0x8, 0xfa00, {&(0x7f0000000680)}}, 0x10) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x3c, 0x0) ioctl$EVIOCGKEYCODE_V2(0xffffffffffffffff, 0x80284504, &(0x7f00000003c0)=""/188) ioctl$TIOCGSID(r0, 0x5429, &(0x7f0000000080)=0x0) ioctl$VT_SETMODE(r0, 0x5602, &(0x7f0000000240)={0x4, 0x101, 0x9, 0x8, 0xffffffffffffffff}) write$P9_RGETLOCK(r0, &(0x7f0000000100)=ANY=[@ANYBLOB="2400000037020000000000000000040000000000", @ANYRES32=r4, @ANYBLOB="0600766d6e657431"], 0x24) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c82, 0x0) 03:54:43 executing program 5: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer2\x00', 0x0, 0x0) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000040)="025cc83d6d345f8f762070") ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r0, 0x40085112, &(0x7f0000b18000)={{0xffffff93}, {0xffffffa0}, 0x0, 0x0, 0x0, [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff]}) 03:54:43 executing program 6: mkdir(&(0x7f0000632000)='./file0\x00', 0x0) mount(&(0x7f000000a000)='./file0\x00', &(0x7f0000014ff8)='./file0\x00', &(0x7f0000014000)='proc\x00', 0x0, &(0x7f0000fc9000)) r0 = open(&(0x7f0000032ff8)='./file0\x00', 0x0, 0x0) faccessat(r0, &(0x7f0000000000)='./bus\x00', 0x3, 0x0) 03:54:43 executing program 4: r0 = socket(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x7f01}, 0xc, &(0x7f0000000900)={&(0x7f0000000040)={0x14, 0x1e, 0x201}, 0x14}, 0x1}, 0x0) 03:54:43 executing program 0 (fault-call:10 fault-nth:35): r0 = syz_open_dev$vcsa(&(0x7f0000000100)='/dev/vcsa#\x00', 0x5, 0x101000) ioctl$BLKDISCARD(r0, 0x1277, &(0x7f0000000180)=0x5f) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140)='/dev/snapshot\x00', 0x0, 0x0) connect$nfc_llcp(r1, &(0x7f0000000300)={0x27, 0x0, 0x0, 0x6, 0x0, 0x0, "f44825e9da257dcd22512d531f545cf0bce08002f76d5e9bd3d1dcb3f649bf7ba49078f877ce09f903ed489ab0bbf0f088675b47312412edd6bd577062eb34", 0x1c}, 0x60) fcntl$addseals(0xffffffffffffffff, 0x409, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EVIOCGLED(r1, 0x80404519, &(0x7f0000000580)=""/236) ioctl$FS_IOC_SETFSLABEL(r2, 0x41009432, &(0x7f0000000480)="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") r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x3c, 0x0) ioctl$EVIOCGKEYCODE_V2(0xffffffffffffffff, 0x80284504, &(0x7f00000003c0)=""/188) ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x0) 03:54:43 executing program 1: r0 = socket(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x7501000000000000}, 0xc, &(0x7f0000000900)={&(0x7f0000000040)={0x14, 0x1e, 0x201}, 0x14}, 0x1}, 0x0) 03:54:43 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x2000, 0xda) ioctl$BLKDISCARD(r0, 0x1277, &(0x7f0000000100)=0x1) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140)='/dev/snapshot\x00', 0x0, 0x0) mlock(&(0x7f0000ffc000/0x2000)=nil, 0x2000) fcntl$addseals(0xffffffffffffffff, 0x409, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f0000000000), &(0x7f00000000c0)=0x8) dup2(r0, r2) ioctl$EVIOCGLED(0xffffffffffffffff, 0x80404519, &(0x7f0000000580)=""/236) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x3c, 0x0) ioctl$EVIOCGKEYCODE_V2(0xffffffffffffffff, 0x80284504, &(0x7f00000003c0)=""/188) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) ioctl$sock_SIOCGIFBR(r1, 0x8940, &(0x7f0000000180)=@add_del={0x2, &(0x7f0000000080)='bond_slave_1\x00', 0x90c}) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c82, 0x0) 03:54:43 executing program 7: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f000000d000)={0xa, 0x4e20}, 0x1c) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}, 0xb}, 0x1c) syz_emit_ethernet(0x3e, &(0x7f00000001c0)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @random="e829f650db0f", [], {@ipv6={0x86dd, {0x0, 0x6, "50a09c", 0x8, 0xffffff11, 0x0, @remote={0xfe, 0x80, [], 0xbb}, @local={0xfe, 0x80, [], 0xaa}, {[], @udp={0x0, 0x4e20, 0x8}}}}}}, &(0x7f0000000040)) syz_emit_ethernet(0x3e, &(0x7f0000000000)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], {@ipv6={0x86dd, {0x0, 0x6, "50a09c", 0x8, 0xffffff11, 0x0, @remote={0xfe, 0x80, [], 0xbb}, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8dffffff], 0xaa}, {[], @udp={0x300, 0x4e20, 0x8}}}}}}, &(0x7f0000000040)) 03:54:43 executing program 4: r0 = socket(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0xda}, 0xc, &(0x7f0000000900)={&(0x7f0000000040)={0x14, 0x1e, 0x201}, 0x14}, 0x1}, 0x0) 03:54:43 executing program 5: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer2\x00', 0x0, 0x0) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000040)="025cc83d6d345f8f762070") ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r0, 0x40085112, &(0x7f0000b18000)={{0xffffff93}, {0xffffffa0}, 0x0, 0x0, 0x0, [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000000000]}) 03:54:43 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") sendto$inet6(r0, &(0x7f00000000c0), 0x0, 0x0, &(0x7f0000000140)={0xa, 0x4e23, 0x0, @mcast1={0xff, 0x1, [], 0x1}, 0x7}, 0x1c) 03:54:43 executing program 2: r0 = syz_open_dev$sndseq(&(0x7f0000dcc000)='/dev/snd/seq\x00', 0x0, 0x2) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/hwrng\x00', 0x8000, 0x0) getsockopt$inet_sctp6_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, &(0x7f0000000200)=@assoc_value={0x0, 0x100000001}, &(0x7f0000000380)=0x8) getsockopt$inet_sctp_SCTP_ASSOCINFO(r1, 0x84, 0x1, &(0x7f00000003c0)={r2, 0x4, 0x8, 0x81, 0x100000000}, &(0x7f0000000400)=0x14) read(r0, &(0x7f0000fb6000)=""/28, 0x3f0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000418f50)={{0x80}, "0a4ceaa05d9a00000000000000039b3fd4cec307e8ef3d13eb790ec9c65abaf90d229db692542e5b78f8b29e0a27800f0000000000000009fb42f376589701a4", 0xa9824f69d1376637, 0x10800a}) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000240)={0x220, @tick, 0x0, {}, 0x0, 0x3}) write$binfmt_script(r0, &(0x7f0000000000)=ANY=[], 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f00000002c0)={{}, 'port0\x00'}) ioctl$TUNSETVNETLE(r1, 0x400454dc, &(0x7f0000000440)=0x1) r3 = openat$sequencer2(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer2\x00', 0x0, 0x0) setsockopt$inet_sctp6_SCTP_I_WANT_MAPPED_V4_ADDR(r3, 0x84, 0xc, &(0x7f0000000480)=0x6, 0x4) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(r3, 0x84, 0x66, &(0x7f0000000000)={0x0, 0x9}, &(0x7f0000000040)=0x8) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r3, 0x84, 0x6d, &(0x7f0000000100)={r4, 0x8d, "760e61d05c8186e182f617eb51aa0d1b7c87a67ef46fa2ec01f498a7067ea6e88cde76413a89e05c7af14943b646f554e64a72a2117e514a2a492575b2659fe332c333e17eba56bc605860afb6807d39a1c57ca3732bc086ce868f7160fb05da47cdddf50a5a894212ef6091b6d17de3170a94d8f2adab36ce83d33b4eb4ec861d1dd76f0e7c9fead18957abc7"}, &(0x7f0000000080)=0x95) [ 1522.150669] FAULT_INJECTION: forcing a failure. [ 1522.150669] name failslab, interval 1, probability 0, space 0, times 0 [ 1522.163096] CPU: 0 PID: 6910 Comm: syz-executor0 Not tainted 4.18.0-rc4+ #144 [ 1522.170386] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1522.179745] Call Trace: [ 1522.182379] dump_stack+0x1c9/0x2b4 [ 1522.186021] ? dump_stack_print_info.cold.2+0x52/0x52 [ 1522.191225] ? finish_task_switch+0x1d3/0x870 [ 1522.195797] ? finish_task_switch+0x18a/0x870 [ 1522.200329] should_fail.cold.4+0xa/0x1a [ 1522.204419] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 1522.209550] ? __schedule+0x884/0x1ed0 [ 1522.213457] ? __sched_text_start+0x8/0x8 [ 1522.217714] ? find_held_lock+0x36/0x1c0 [ 1522.221800] ? __lock_is_held+0xb5/0x140 [ 1522.225884] ? check_same_owner+0x340/0x340 [ 1522.230216] ? kasan_kmalloc+0xc4/0xe0 [ 1522.234118] ? kmem_cache_alloc_node_trace+0x150/0x770 [ 1522.239413] ? blk_mq_init_sched+0x1e1/0x5a0 [ 1522.243840] ? elevator_init_mq+0xd7/0x160 [ 1522.248094] ? blk_mq_init_allocated_queue+0xf34/0x15a0 [ 1522.253477] __should_failslab+0x124/0x180 [ 1522.257728] should_failslab+0x9/0x14 [ 1522.261541] kmem_cache_alloc_node_trace+0x26f/0x770 [ 1522.266660] ? mark_held_locks+0xc9/0x160 [ 1522.270827] __kmalloc_node+0x33/0x70 [ 1522.274640] sbitmap_init_node+0x290/0x450 [ 1522.278886] sbitmap_queue_init_node+0xb2/0x850 [ 1522.283569] ? sbitmap_init_node+0x450/0x450 [ 1522.288041] ? rcu_read_lock_sched_held+0x108/0x120 [ 1522.293185] ? kmem_cache_alloc_node_trace+0x34e/0x770 [ 1522.298483] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1522.304034] ? find_next_bit+0x104/0x130 [ 1522.309133] blk_mq_init_tags+0x11b/0x2b0 [ 1522.313313] blk_mq_alloc_rq_map+0x9f/0x220 [ 1522.317658] blk_mq_sched_alloc_tags.isra.13+0x7b/0x160 [ 1522.323031] blk_mq_init_sched+0x1e1/0x5a0 [ 1522.327293] elevator_init_mq+0xd7/0x160 [ 1522.331420] blk_mq_init_allocated_queue+0xf34/0x15a0 [ 1522.336656] ? blk_mq_map_swqueue+0xae0/0xae0 [ 1522.341160] ? __mutex_init+0x1f7/0x290 [ 1522.345158] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1522.350710] ? __blk_mq_alloc_rq_map+0x17d/0x2e0 [ 1522.355485] ? blk_mq_update_nr_hw_queues+0x510/0x510 [ 1522.360696] blk_mq_init_queue+0x63/0xb0 [ 1522.364768] loop_add+0x33d/0x9d0 [ 1522.368231] ? loop_lookup+0x105/0x230 [ 1522.372163] ? loop_queue_rq+0x660/0x660 [ 1522.376245] loop_control_ioctl+0x199/0x540 [ 1522.380588] ? loop_add+0x9d0/0x9d0 [ 1522.384228] ? retint_kernel+0x10/0x10 [ 1522.388133] ? do_vfs_ioctl+0x123/0x1720 [ 1522.392197] ? loop_add+0x9d0/0x9d0 [ 1522.395834] do_vfs_ioctl+0x1de/0x1720 [ 1522.399737] ? ioctl_preallocate+0x300/0x300 [ 1522.404156] ? __fget_light+0x2f7/0x440 [ 1522.408138] ? __schedule+0x1ed0/0x1ed0 [ 1522.412118] ? fget_raw+0x20/0x20 [ 1522.415588] ? retint_kernel+0x10/0x10 [ 1522.419504] ? exit_to_usermode_loop+0xb5/0x370 [ 1522.424223] ? security_file_ioctl+0x94/0xc0 [ 1522.428647] ksys_ioctl+0xa9/0xd0 [ 1522.432118] __x64_sys_ioctl+0x73/0xb0 [ 1522.436030] do_syscall_64+0x1b9/0x820 [ 1522.439959] ? syscall_slow_exit_work+0x500/0x500 [ 1522.444830] ? syscall_return_slowpath+0x5e0/0x5e0 [ 1522.449810] ? syscall_return_slowpath+0x31d/0x5e0 [ 1522.454779] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1522.460338] ? retint_user+0x18/0x18 [ 1522.464069] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1522.468932] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1522.474130] RIP: 0033:0x455a79 [ 1522.477312] Code: 1d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1522.496690] RSP: 002b:00007f420d477c68 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1522.504434] RAX: ffffffffffffffda RBX: 00007f420d4786d4 RCX: 0000000000455a79 [ 1522.511709] RDX: 0000000000000000 RSI: 0000000000004c80 RDI: 0000000000000015 [ 1522.518985] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 1522.526270] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000016 [ 1522.533548] R13: 00000000004bdfb1 R14: 00000000004ccab0 R15: 0000000000000023 03:54:44 executing program 1: r0 = socket(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0xd7000000}, 0xc, &(0x7f0000000900)={&(0x7f0000000040)={0x14, 0x1e, 0x201}, 0x14}, 0x1}, 0x0) 03:54:44 executing program 0 (fault-call:10 fault-nth:36): r0 = syz_open_dev$vcsa(&(0x7f0000000100)='/dev/vcsa#\x00', 0x5, 0x101000) ioctl$BLKDISCARD(r0, 0x1277, &(0x7f0000000180)=0x5f) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140)='/dev/snapshot\x00', 0x0, 0x0) connect$nfc_llcp(r1, &(0x7f0000000300)={0x27, 0x0, 0x0, 0x6, 0x0, 0x0, "f44825e9da257dcd22512d531f545cf0bce08002f76d5e9bd3d1dcb3f649bf7ba49078f877ce09f903ed489ab0bbf0f088675b47312412edd6bd577062eb34", 0x1c}, 0x60) fcntl$addseals(0xffffffffffffffff, 0x409, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EVIOCGLED(r1, 0x80404519, &(0x7f0000000580)=""/236) ioctl$FS_IOC_SETFSLABEL(r2, 0x41009432, &(0x7f0000000480)="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") r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x3c, 0x0) ioctl$EVIOCGKEYCODE_V2(0xffffffffffffffff, 0x80284504, &(0x7f00000003c0)=""/188) ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x0) 03:54:44 executing program 3: ioctl$BLKDISCARD(0xffffffffffffffff, 0x1277, &(0x7f0000000180)) r0 = accept(0xffffffffffffffff, 0x0, &(0x7f0000000200)) fsync(r0) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140)='/dev/snapshot\x00', 0x0, 0x0) fcntl$addseals(0xffffffffffffffff, 0x409, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000080)={0xffffffffffffffff}}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r1, &(0x7f00000001c0)={0x1, 0x10, 0xfa00, {&(0x7f0000000040), r2}}, 0x18) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f0000000000), &(0x7f00000000c0)=0x8) ioctl$EVIOCGLED(0xffffffffffffffff, 0x80404519, &(0x7f0000000580)=""/236) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x3c, 0x0) ioctl$EVIOCGKEYCODE_V2(0xffffffffffffffff, 0x80284504, &(0x7f00000003c0)=""/188) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c82, 0x0) 03:54:44 executing program 7: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f000000d000)={0xa, 0x4e20}, 0x1c) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}, 0xb}, 0x1c) syz_emit_ethernet(0x3e, &(0x7f00000001c0)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @random="e829f650db0f", [], {@ipv6={0x86dd, {0x0, 0x6, "50a09c", 0x8, 0xffffff11, 0x0, @remote={0xfe, 0x80, [], 0xbb}, @local={0xfe, 0x80, [], 0xaa}, {[], @udp={0x0, 0x4e20, 0x8}}}}}}, &(0x7f0000000040)) syz_emit_ethernet(0x3e, &(0x7f0000000000)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], {@ipv6={0x86dd, {0x0, 0x6, "50a09c", 0x8, 0xffffff11, 0x0, @remote={0xfe, 0x80, [], 0xbb}, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6000000], 0xaa}, {[], @udp={0x300, 0x4e20, 0x8}}}}}}, &(0x7f0000000040)) 03:54:44 executing program 4: r0 = socket(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8600000000000000}, 0xc, &(0x7f0000000900)={&(0x7f0000000040)={0x14, 0x1e, 0x201}, 0x14}, 0x1}, 0x0) 03:54:44 executing program 5: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer2\x00', 0x0, 0x0) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000040)="025cc83d6d345f8f762070") ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r0, 0x40085112, &(0x7f0000b18000)={{0xffffff93}, {0xffffffa0}, 0x0, 0x0, 0x0, [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x500]}) 03:54:44 executing program 6: 03:54:44 executing program 1: r0 = socket(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x9c}, 0xc, &(0x7f0000000900)={&(0x7f0000000040)={0x14, 0x1e, 0x201}, 0x14}, 0x1}, 0x0) [ 1522.820411] FAULT_INJECTION: forcing a failure. [ 1522.820411] name failslab, interval 1, probability 0, space 0, times 0 [ 1522.832509] CPU: 1 PID: 6942 Comm: syz-executor0 Not tainted 4.18.0-rc4+ #144 [ 1522.839804] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1522.849168] Call Trace: [ 1522.851778] dump_stack+0x1c9/0x2b4 [ 1522.855504] ? dump_stack_print_info.cold.2+0x52/0x52 [ 1522.860717] should_fail.cold.4+0xa/0x1a [ 1522.864806] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 1522.869929] ? print_usage_bug+0xc0/0xc0 [ 1522.874003] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1522.879551] ? graph_lock+0x170/0x170 [ 1522.883364] ? print_usage_bug+0xc0/0xc0 [ 1522.887445] ? find_held_lock+0x36/0x1c0 [ 1522.891527] ? __lock_is_held+0xb5/0x140 [ 1522.895602] ? __irqentry_text_end+0x62258/0x1f97a8 [ 1522.900644] ? check_same_owner+0x340/0x340 [ 1522.904983] ? rcu_note_context_switch+0x730/0x730 [ 1522.909927] ? retint_kernel+0x10/0x10 [ 1522.913828] __should_failslab+0x124/0x180 [ 1522.918077] should_failslab+0x9/0x14 [ 1522.921890] kmem_cache_alloc_node_trace+0x26f/0x770 [ 1522.927104] ? find_next_bit+0x6f/0x130 [ 1522.931089] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 1522.936115] ? find_next_bit+0x104/0x130 [ 1522.940391] sbitmap_queue_init_node+0x330/0x850 [ 1522.945184] ? sbitmap_init_node+0x450/0x450 [ 1522.949639] ? rcu_read_lock_sched_held+0x108/0x120 [ 1522.969034] ? kmem_cache_alloc_node_trace+0x34e/0x770 [ 1522.974342] ? blk_mq_init_tags+0x2f/0x2b0 [ 1522.978600] blk_mq_init_tags+0x11b/0x2b0 [ 1522.982767] blk_mq_alloc_rq_map+0x9f/0x220 [ 1522.987105] blk_mq_sched_alloc_tags.isra.13+0x7b/0x160 [ 1522.992492] blk_mq_init_sched+0x1e1/0x5a0 [ 1522.996751] elevator_init_mq+0xd7/0x160 [ 1523.000999] blk_mq_init_allocated_queue+0xf34/0x15a0 [ 1523.006207] ? blk_mq_map_swqueue+0xae0/0xae0 [ 1523.010726] ? __mutex_init+0x1f7/0x290 [ 1523.014724] ? retint_kernel+0x10/0x10 [ 1523.018650] ? __mutex_init+0x1f/0x290 [ 1523.022565] ? blk_mq_update_nr_hw_queues+0x510/0x510 [ 1523.027772] blk_mq_init_queue+0x63/0xb0 [ 1523.031846] loop_add+0x33d/0x9d0 [ 1523.035348] ? loop_lookup+0x105/0x230 [ 1523.039264] ? loop_queue_rq+0x660/0x660 [ 1523.043339] loop_control_ioctl+0x199/0x540 [ 1523.047860] ? loop_add+0x9d0/0x9d0 [ 1523.051509] ? expand_files.part.8+0x9c0/0x9c0 [ 1523.056114] ? kasan_check_write+0x14/0x20 [ 1523.060363] ? loop_add+0x9d0/0x9d0 [ 1523.063996] do_vfs_ioctl+0x1de/0x1720 [ 1523.067895] ? ioctl_preallocate+0x300/0x300 [ 1523.072311] ? __fget_light+0x2f7/0x440 [ 1523.076292] ? __schedule+0x1ed0/0x1ed0 [ 1523.080272] ? fget_raw+0x20/0x20 [ 1523.083740] ? __sb_end_write+0xac/0xe0 [ 1523.087732] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1523.093283] ? exit_to_usermode_loop+0x8c/0x370 [ 1523.097965] ? security_file_ioctl+0x94/0xc0 [ 1523.102384] ksys_ioctl+0xa9/0xd0 [ 1523.105851] __x64_sys_ioctl+0x73/0xb0 [ 1523.109761] do_syscall_64+0x1b9/0x820 [ 1523.113654] ? syscall_slow_exit_work+0x500/0x500 [ 1523.118526] ? syscall_return_slowpath+0x5e0/0x5e0 [ 1523.123466] ? syscall_return_slowpath+0x31d/0x5e0 [ 1523.128411] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1523.133965] ? retint_user+0x18/0x18 [ 1523.138656] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1523.143517] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1523.148716] RIP: 0033:0x455a79 [ 1523.151904] Code: 1d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1523.171278] RSP: 002b:00007f420d477c68 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1523.178997] RAX: ffffffffffffffda RBX: 00007f420d4786d4 RCX: 0000000000455a79 [ 1523.186271] RDX: 0000000000000000 RSI: 0000000000004c80 RDI: 0000000000000016 [ 1523.193546] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 1523.200824] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000017 [ 1523.208285] R13: 00000000004bdfb1 R14: 00000000004ccab0 R15: 0000000000000024 03:54:44 executing program 3: ioctl$BLKDISCARD(0xffffffffffffffff, 0x1277, &(0x7f0000000180)) r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140)='/dev/snapshot\x00', 0x0, 0x0) fcntl$addseals(0xffffffffffffffff, 0x409, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f0000000000), &(0x7f00000000c0)=0x8) ioctl$BLKPBSZGET(r0, 0x127b, &(0x7f0000000040)) ioctl$EVIOCGLED(0xffffffffffffffff, 0x80404519, &(0x7f0000000580)=""/236) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x3c, 0x0) ioctl$EVIOCGKEYCODE_V2(0xffffffffffffffff, 0x80284504, &(0x7f00000003c0)=""/188) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c82, 0x0) 03:54:44 executing program 0 (fault-call:10 fault-nth:37): r0 = syz_open_dev$vcsa(&(0x7f0000000100)='/dev/vcsa#\x00', 0x5, 0x101000) ioctl$BLKDISCARD(r0, 0x1277, &(0x7f0000000180)=0x5f) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140)='/dev/snapshot\x00', 0x0, 0x0) connect$nfc_llcp(r1, &(0x7f0000000300)={0x27, 0x0, 0x0, 0x6, 0x0, 0x0, "f44825e9da257dcd22512d531f545cf0bce08002f76d5e9bd3d1dcb3f649bf7ba49078f877ce09f903ed489ab0bbf0f088675b47312412edd6bd577062eb34", 0x1c}, 0x60) fcntl$addseals(0xffffffffffffffff, 0x409, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EVIOCGLED(r1, 0x80404519, &(0x7f0000000580)=""/236) ioctl$FS_IOC_SETFSLABEL(r2, 0x41009432, &(0x7f0000000480)="64098ceb11469210e1fa92c76a76762b420a730851d9c9ce1d2745bac5fca8796f1aba309faf35268b4d45ac04ac0ec6f2cebf8f0ac8391dd8cef0da84895505ef6fc4062016210998b92c121630e66d984a620a4a40b4b63bebedc75ae3e140c654a4f80fec3a6af81841856baae4ad83438f32d9e08e5219c8b832403b86aa723d75cb839059d9d094ba7a3510a5acd071b9c1f441886fb396511cb44257e86695b1b4b84218118e0045593d869765e8f850cc6a534e5f114b22d73ba2a903943a32cebbff720180ba6531e240d9a3759e2287b1a64f950a5b1e402580731d395128e3b81fd4c76b233a384200aa015eb779ce7140613e374a38caa9d18b34") r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x3c, 0x0) ioctl$EVIOCGKEYCODE_V2(0xffffffffffffffff, 0x80284504, &(0x7f00000003c0)=""/188) ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x0) 03:54:44 executing program 4: r0 = socket(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x9a00000000000000}, 0xc, &(0x7f0000000900)={&(0x7f0000000040)={0x14, 0x1e, 0x201}, 0x14}, 0x1}, 0x0) 03:54:44 executing program 7: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f000000d000)={0xa, 0x4e20}, 0x1c) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}, 0xb}, 0x1c) syz_emit_ethernet(0x3e, &(0x7f00000001c0)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @random="e829f650db0f", [], {@ipv6={0x86dd, {0x0, 0x6, "50a09c", 0x8, 0xffffff11, 0x0, @remote={0xfe, 0x80, [], 0xbb}, @local={0xfe, 0x80, [], 0xaa}, {[], @udp={0x0, 0x4e20, 0x8}}}}}}, &(0x7f0000000040)) syz_emit_ethernet(0x3e, &(0x7f0000000000)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], {@ipv6={0x86dd, {0x0, 0x6, "50a09c", 0x8, 0xffffff11, 0x0, @remote={0xfe, 0x80, [], 0xbb}, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2800], 0xaa}, {[], @udp={0x300, 0x4e20, 0x8}}}}}}, &(0x7f0000000040)) 03:54:44 executing program 1: r0 = socket(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x9d01000000000000}, 0xc, &(0x7f0000000900)={&(0x7f0000000040)={0x14, 0x1e, 0x201}, 0x14}, 0x1}, 0x0) 03:54:44 executing program 6: 03:54:44 executing program 5: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer2\x00', 0x0, 0x0) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000040)="025cc83d6d345f8f762070") ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r0, 0x40085112, &(0x7f0000b18000)={{0xffffff93}, {0xffffffa0}, 0x0, 0x0, 0x0, [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd]}) [ 1523.590203] FAULT_INJECTION: forcing a failure. [ 1523.590203] name failslab, interval 1, probability 0, space 0, times 0 [ 1523.602212] CPU: 0 PID: 6960 Comm: syz-executor0 Not tainted 4.18.0-rc4+ #144 [ 1523.609511] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1523.618866] Call Trace: [ 1523.621472] dump_stack+0x1c9/0x2b4 [ 1523.625140] ? dump_stack_print_info.cold.2+0x52/0x52 [ 1523.630461] should_fail.cold.4+0xa/0x1a [ 1523.634538] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 1523.639655] ? __schedule+0x884/0x1ed0 [ 1523.643553] ? __sched_text_start+0x8/0x8 [ 1523.647705] ? find_held_lock+0x36/0x1c0 [ 1523.651776] ? __lock_is_held+0xb5/0x140 [ 1523.655852] ? check_same_owner+0x340/0x340 [ 1523.660189] __should_failslab+0x124/0x180 [ 1523.664436] should_failslab+0x9/0x14 [ 1523.668241] kmem_cache_alloc_node_trace+0x26f/0x770 [ 1523.673360] sbitmap_queue_init_node+0x330/0x850 [ 1523.678127] ? sbitmap_init_node+0x450/0x450 [ 1523.682542] ? retint_kernel+0x10/0x10 [ 1523.686473] blk_mq_init_tags+0x17c/0x2b0 [ 1523.690655] blk_mq_alloc_rq_map+0x9f/0x220 [ 1523.695011] blk_mq_sched_alloc_tags.isra.13+0x7b/0x160 [ 1523.700405] ? blk_mq_init_sched+0x1d/0x5a0 [ 1523.704754] blk_mq_init_sched+0x1e1/0x5a0 [ 1523.709103] elevator_init_mq+0xd7/0x160 [ 1523.713208] blk_mq_init_allocated_queue+0xf34/0x15a0 [ 1523.718425] ? blk_mq_map_swqueue+0xae0/0xae0 [ 1523.722953] ? __mutex_init+0x1f7/0x290 [ 1523.726970] ? retint_kernel+0x10/0x10 [ 1523.730897] ? blk_mq_update_nr_hw_queues+0x510/0x510 [ 1523.736095] blk_mq_init_queue+0x63/0xb0 03:54:45 executing program 2: r0 = syz_open_dev$sndseq(&(0x7f0000dcc000)='/dev/snd/seq\x00', 0x0, 0x2) read(r0, &(0x7f0000fb6000)=""/28, 0x3f0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000418f50)={{0x80}, "0a4ceaa05d9a00000000000000039b3fd4cec307e8ef3d13eb790ec9c65abaf90d229db692542e5b78f8b29e0a27800f0000000000000009fb42f376589701a4", 0xa9824f69d1376637, 0x10800a}) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000240)={0xbf}) write$binfmt_script(r0, &(0x7f0000000100)=ANY=[@ANYBLOB="1f48b4672ba8a8d20ded8595dda9b640b9b62b495f3aed5848a492e007cec03db3f2b9e63a887247e9ca21579229054a77459a8afd58e5e8be", @ANYRESOCT=r0, @ANYRESDEC=r0, @ANYRESDEC, @ANYRESHEX=r0], 0x8a) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f00000002c0)={{}, 'port0\x00'}) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer2\x00', 0x0, 0x0) getsockopt$kcm_KCM_RECV_DISABLE(r1, 0x119, 0x1, &(0x7f0000000000), 0x4) 03:54:45 executing program 3: ioctl$BLKDISCARD(0xffffffffffffffff, 0x1277, &(0x7f0000000180)) r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000940)='/dev/hwrng\x00', 0x0, 0x0) ioctl$EVIOCSCLOCKID(r0, 0x400445a0, &(0x7f0000000980)=0x7fffffff) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140)='/dev/snapshot\x00', 0x0, 0x0) ioctl$KVM_ASSIGN_SET_MSIX_ENTRY(r1, 0x4010ae74, &(0x7f0000000080)={0x1, 0x10001, 0x3}) fcntl$addseals(0xffffffffffffffff, 0x409, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f0000000040), &(0x7f00000000c0)=0x34e) ioctl$EVIOCGKEYCODE(r1, 0x80084504, &(0x7f00000001c0)=""/117) ioctl$EVIOCGLED(0xffffffffffffffff, 0x80404519, &(0x7f0000000580)=""/236) bind$llc(r2, &(0x7f0000000000)={0x1a, 0x0, 0xff, 0x4, 0xda, 0x101, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xe}}, 0x10) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x3c, 0x0) ioctl$EVIOCGKEYCODE_V2(0xffffffffffffffff, 0x80284504, &(0x7f00000003c0)=""/188) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) ioctl$SG_IO(r1, 0x2285, &(0x7f00000008c0)={0x0, 0xfffffffffffffffb, 0x19, 0x1, @scatter={0x5, 0x0, &(0x7f00000007c0)=[{&(0x7f0000000240)=""/84, 0x54}, {&(0x7f0000000300)=""/116, 0x74}, {&(0x7f0000000480)=""/235, 0xeb}, {&(0x7f0000000680)=""/90, 0x5a}, {&(0x7f0000000700)=""/135, 0x87}]}, &(0x7f0000000100)="daa7167d43dfa532d25b33d0c9ec37fd1f5ce6d11d89638a98", &(0x7f0000000840)=""/85, 0x0, 0x10, 0xffffffffffffffff, &(0x7f0000000380)}) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c82, 0x0) 03:54:45 executing program 4: r0 = socket(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0xc1000000}, 0xc, &(0x7f0000000900)={&(0x7f0000000040)={0x14, 0x1e, 0x201}, 0x14}, 0x1}, 0x0) 03:54:45 executing program 7: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f000000d000)={0xa, 0x4e20}, 0x1c) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}, 0xb}, 0x1c) syz_emit_ethernet(0x3e, &(0x7f00000001c0)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @random="e829f650db0f", [], {@ipv6={0x86dd, {0x0, 0x6, "50a09c", 0x8, 0xffffff11, 0x0, @remote={0xfe, 0x80, [], 0xbb}, @local={0xfe, 0x80, [], 0xaa}, {[], @udp={0x0, 0x4e20, 0x8}}}}}}, &(0x7f0000000040)) syz_emit_ethernet(0x3e, &(0x7f0000000000)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], {@ipv6={0x86dd, {0x0, 0x6, "50a09c", 0x8, 0xffffff11, 0x0, @remote={0xfe, 0x80, [], 0xbb}, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8864], 0xaa}, {[], @udp={0x300, 0x4e20, 0x8}}}}}}, &(0x7f0000000040)) [ 1523.740171] loop_add+0x33d/0x9d0 [ 1523.743635] ? loop_lookup+0x105/0x230 [ 1523.747535] ? loop_queue_rq+0x660/0x660 [ 1523.751613] loop_control_ioctl+0x199/0x540 [ 1523.755953] ? loop_add+0x9d0/0x9d0 [ 1523.759594] ? expand_files.part.8+0x9c0/0x9c0 [ 1523.764191] ? kasan_check_write+0x14/0x20 [ 1523.768432] ? __mutex_unlock_slowpath+0x197/0x8c0 [ 1523.773371] ? loop_add+0x9d0/0x9d0 [ 1523.777003] do_vfs_ioctl+0x1de/0x1720 [ 1523.780900] ? __lock_is_held+0xb5/0x140 [ 1523.784968] ? ioctl_preallocate+0x300/0x300 [ 1523.789381] ? __fget_light+0x2f7/0x440 [ 1523.793359] ? fget_raw+0x20/0x20 [ 1523.796819] ? retint_kernel+0x10/0x10 [ 1523.800712] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 1523.805739] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1523.810505] ? security_file_ioctl+0x94/0xc0 [ 1523.814917] ksys_ioctl+0xa9/0xd0 [ 1523.818380] __x64_sys_ioctl+0x73/0xb0 [ 1523.822271] ? do_syscall_64+0xca/0x820 [ 1523.826254] do_syscall_64+0x1b9/0x820 [ 1523.830151] ? syscall_slow_exit_work+0x500/0x500 [ 1523.835003] ? syscall_return_slowpath+0x5e0/0x5e0 [ 1523.839939] ? syscall_return_slowpath+0x31d/0x5e0 [ 1523.844881] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1523.850429] ? retint_user+0x18/0x18 [ 1523.854160] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1523.859034] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1523.864244] RIP: 0033:0x455a79 [ 1523.867428] Code: 1d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1523.886808] RSP: 002b:00007f420d477c68 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1523.894552] RAX: ffffffffffffffda RBX: 00007f420d4786d4 RCX: 0000000000455a79 [ 1523.901832] RDX: 0000000000000000 RSI: 0000000000004c80 RDI: 0000000000000015 [ 1523.909108] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 1523.916385] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000016 [ 1523.923682] R13: 00000000004bdfb1 R14: 00000000004ccab0 R15: 0000000000000025 03:54:45 executing program 0 (fault-call:10 fault-nth:38): r0 = syz_open_dev$vcsa(&(0x7f0000000100)='/dev/vcsa#\x00', 0x5, 0x101000) ioctl$BLKDISCARD(r0, 0x1277, &(0x7f0000000180)=0x5f) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140)='/dev/snapshot\x00', 0x0, 0x0) connect$nfc_llcp(r1, &(0x7f0000000300)={0x27, 0x0, 0x0, 0x6, 0x0, 0x0, "f44825e9da257dcd22512d531f545cf0bce08002f76d5e9bd3d1dcb3f649bf7ba49078f877ce09f903ed489ab0bbf0f088675b47312412edd6bd577062eb34", 0x1c}, 0x60) fcntl$addseals(0xffffffffffffffff, 0x409, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EVIOCGLED(r1, 0x80404519, &(0x7f0000000580)=""/236) ioctl$FS_IOC_SETFSLABEL(r2, 0x41009432, &(0x7f0000000480)="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") r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x3c, 0x0) ioctl$EVIOCGKEYCODE_V2(0xffffffffffffffff, 0x80284504, &(0x7f00000003c0)=""/188) ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x0) 03:54:45 executing program 1: r0 = socket(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x6601000000000000}, 0xc, &(0x7f0000000900)={&(0x7f0000000040)={0x14, 0x1e, 0x201}, 0x14}, 0x1}, 0x0) 03:54:45 executing program 6: 03:54:45 executing program 5: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer2\x00', 0x0, 0x0) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000040)="025cc83d6d345f8f762070") ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r0, 0x40085112, &(0x7f0000b18000)={{0xffffff93}, {0xffffffa0}, 0x0, 0x0, 0x0, [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000]}) 03:54:45 executing program 3: ioctl$BLKDISCARD(0xffffffffffffffff, 0x1277, &(0x7f0000000180)) r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140)='/dev/snapshot\x00', 0x0, 0x0) fcntl$addseals(0xffffffffffffffff, 0x409, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f0000000000), &(0x7f00000000c0)=0x8) ioctl$EVIOCGLED(0xffffffffffffffff, 0x80404519, &(0x7f0000000580)=""/236) ioctl$sock_inet_SIOCGIFADDR(r0, 0x8915, &(0x7f0000000040)={'bridge_slave_1\x00', {0x2, 0x4e22, @multicast2=0xe0000002}}) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x3c, 0x0) ioctl$EVIOCGKEYCODE_V2(0xffffffffffffffff, 0x80284504, &(0x7f00000003c0)=""/188) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c82, 0x0) 03:54:45 executing program 7: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f000000d000)={0xa, 0x4e20}, 0x1c) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}, 0xb}, 0x1c) syz_emit_ethernet(0x3e, &(0x7f00000001c0)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @random="e829f650db0f", [], {@ipv6={0x86dd, {0x0, 0x6, "50a09c", 0x8, 0xffffff11, 0x0, @remote={0xfe, 0x80, [], 0xbb}, @local={0xfe, 0x80, [], 0xaa}, {[], @udp={0x0, 0x4e20, 0x8}}}}}}, &(0x7f0000000040)) syz_emit_ethernet(0x3e, &(0x7f0000000000)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], {@ipv6={0x86dd, {0x0, 0x6, "50a09c", 0x8, 0xffffff11, 0x0, @remote={0xfe, 0x80, [], 0xbb}, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x608], 0xaa}, {[], @udp={0x300, 0x4e20, 0x8}}}}}}, &(0x7f0000000040)) 03:54:45 executing program 1: r0 = socket(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0xf7}, 0xc, &(0x7f0000000900)={&(0x7f0000000040)={0x14, 0x1e, 0x201}, 0x14}, 0x1}, 0x0) 03:54:45 executing program 4: r0 = socket(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x2701000000000000}, 0xc, &(0x7f0000000900)={&(0x7f0000000040)={0x14, 0x1e, 0x201}, 0x14}, 0x1}, 0x0) 03:54:45 executing program 6: [ 1524.315794] FAULT_INJECTION: forcing a failure. [ 1524.315794] name failslab, interval 1, probability 0, space 0, times 0 [ 1524.327636] CPU: 1 PID: 6982 Comm: syz-executor0 Not tainted 4.18.0-rc4+ #144 [ 1524.334923] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1524.344288] Call Trace: [ 1524.346933] dump_stack+0x1c9/0x2b4 [ 1524.350571] ? dump_stack_print_info.cold.2+0x52/0x52 [ 1524.355769] ? finish_task_switch+0x1d3/0x870 [ 1524.360264] ? finish_task_switch+0x18a/0x870 [ 1524.364778] should_fail.cold.4+0xa/0x1a [ 1524.368849] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 1524.373966] ? __schedule+0x884/0x1ed0 [ 1524.377961] ? __sched_text_start+0x8/0x8 [ 1524.382113] ? __lockdep_init_map+0x105/0x590 [ 1524.386622] ? __lock_is_held+0xb5/0x140 [ 1524.390684] ? __init_waitqueue_head+0x9e/0x150 [ 1524.395367] ? check_same_owner+0x340/0x340 [ 1524.399692] ? sbitmap_queue_init_node+0xce/0x850 [ 1524.404544] __should_failslab+0x124/0x180 [ 1524.408786] should_failslab+0x9/0x14 [ 1524.412602] kmem_cache_alloc_node_trace+0x26f/0x770 [ 1524.417722] __kmalloc_node+0x33/0x70 [ 1524.421551] blk_mq_alloc_rq_map+0xcc/0x220 [ 1524.425880] blk_mq_sched_alloc_tags.isra.13+0x7b/0x160 [ 1524.431272] blk_mq_init_sched+0x1e1/0x5a0 [ 1524.435522] elevator_init_mq+0xd7/0x160 [ 1524.439589] blk_mq_init_allocated_queue+0xf34/0x15a0 [ 1524.444791] ? blk_mq_map_swqueue+0xae0/0xae0 [ 1524.449292] ? __mutex_init+0x1f7/0x290 [ 1524.453287] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1524.458830] ? __blk_mq_alloc_rq_map+0x17d/0x2e0 [ 1524.463607] ? blk_mq_update_nr_hw_queues+0x510/0x510 [ 1524.468803] blk_mq_init_queue+0x63/0xb0 [ 1524.472886] loop_add+0x33d/0x9d0 [ 1524.476342] ? loop_lookup+0x105/0x230 [ 1524.480229] ? loop_queue_rq+0x660/0x660 [ 1524.484301] loop_control_ioctl+0x199/0x540 [ 1524.488634] ? loop_add+0x9d0/0x9d0 [ 1524.492269] ? expand_files.part.8+0x9c0/0x9c0 [ 1524.496861] ? kasan_check_write+0x14/0x20 [ 1524.501103] ? loop_add+0x9d0/0x9d0 [ 1524.504732] do_vfs_ioctl+0x1de/0x1720 [ 1524.508890] ? ioctl_preallocate+0x300/0x300 [ 1524.513309] ? __fget_light+0x2f7/0x440 [ 1524.517283] ? __schedule+0x1ed0/0x1ed0 [ 1524.521260] ? fget_raw+0x20/0x20 [ 1524.524716] ? retint_kernel+0x10/0x10 [ 1524.528638] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 1524.533660] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1524.538427] ? retint_kernel+0x10/0x10 [ 1524.542340] ? security_file_ioctl+0x94/0xc0 [ 1524.546755] ksys_ioctl+0xa9/0xd0 [ 1524.550215] __x64_sys_ioctl+0x73/0xb0 [ 1524.554108] do_syscall_64+0x1b9/0x820 [ 1524.558013] ? syscall_slow_exit_work+0x500/0x500 [ 1524.562864] ? syscall_return_slowpath+0x5e0/0x5e0 [ 1524.567799] ? syscall_return_slowpath+0x31d/0x5e0 [ 1524.572741] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe [ 1524.578112] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1524.582973] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1524.588168] RIP: 0033:0x455a79 [ 1524.591351] Code: 1d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 03:54:46 executing program 0 (fault-call:10 fault-nth:39): r0 = syz_open_dev$vcsa(&(0x7f0000000100)='/dev/vcsa#\x00', 0x5, 0x101000) ioctl$BLKDISCARD(r0, 0x1277, &(0x7f0000000180)=0x5f) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140)='/dev/snapshot\x00', 0x0, 0x0) connect$nfc_llcp(r1, &(0x7f0000000300)={0x27, 0x0, 0x0, 0x6, 0x0, 0x0, "f44825e9da257dcd22512d531f545cf0bce08002f76d5e9bd3d1dcb3f649bf7ba49078f877ce09f903ed489ab0bbf0f088675b47312412edd6bd577062eb34", 0x1c}, 0x60) fcntl$addseals(0xffffffffffffffff, 0x409, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EVIOCGLED(r1, 0x80404519, &(0x7f0000000580)=""/236) ioctl$FS_IOC_SETFSLABEL(r2, 0x41009432, &(0x7f0000000480)="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") r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x3c, 0x0) ioctl$EVIOCGKEYCODE_V2(0xffffffffffffffff, 0x80284504, &(0x7f00000003c0)=""/188) ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x0) [ 1524.611015] RSP: 002b:00007f420d477c68 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1524.618740] RAX: ffffffffffffffda RBX: 00007f420d4786d4 RCX: 0000000000455a79 [ 1524.626014] RDX: 0000000000000000 RSI: 0000000000004c80 RDI: 0000000000000016 [ 1524.633283] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 1524.640552] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000017 [ 1524.647827] R13: 00000000004bdfb1 R14: 00000000004ccab0 R15: 0000000000000026 03:54:46 executing program 5: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer2\x00', 0x0, 0x0) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000040)="025cc83d6d345f8f762070") ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r0, 0x40085112, &(0x7f0000b18000)={{0xffffff93}, {0xffffffa0}, 0x0, 0x0, 0x0, [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5000000]}) 03:54:46 executing program 3: ioctl$BLKDISCARD(0xffffffffffffffff, 0x1277, &(0x7f0000000300)) r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140)='/dev/snapshot\x00', 0x0, 0x0) fcntl$addseals(0xffffffffffffffff, 0x409, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$ASHMEM_SET_PROT_MASK(r0, 0x40087705, &(0x7f0000000040)={0x5, 0x401}) write$cgroup_type(r0, &(0x7f0000000080)='threaded\x00', 0x9) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f0000000000), &(0x7f00000000c0)=0x8) ioctl$EVIOCGLED(0xffffffffffffffff, 0x80404519, &(0x7f0000000580)=""/236) mq_timedsend(r1, &(0x7f0000000480)="4cf6c8509ac41cf8fb9556700ac58e8f680992c52358e558cb93a79fb7ed45904ac5ccb033a4a9c8012867542bf49e51cc6a62c552fdbb545dfd078b0f225dcd650cefc406e4d407a5480a310f04198b40e0c669d8cc12dce70229a381ad6e43a678b0503e919aa7497e0aba30fa87bc20039443be914f78620dde23933db7c229dbd64ed580ba066a02a847dd59a82f706485c4997f3f5b0abafb417145582c9ece1435e83bdaf9b7cd1c2fbd04a8a1073d55d47b4fb74b4532059349929ef27c53ed91f9e02a104cbd8996d2bc306c7dd90b1849d06265be7defc7723790ec2b58940c01338774", 0xe8, 0x4, &(0x7f0000000280)) write$binfmt_misc(r0, &(0x7f0000000680)=ANY=[@ANYBLOB="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"], 0x9b) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x3c, 0x0) ioctl$TUNATTACHFILTER(r0, 0x401054d5, &(0x7f0000000240)={0x1, &(0x7f0000000100)=[{0xffffffffb2fe2653, 0x100000000000, 0x9, 0x5}]}) ioctl$EVIOCGKEYCODE_V2(0xffffffffffffffff, 0x80284504, &(0x7f00000003c0)=""/188) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) mkdirat$cgroup(r0, &(0x7f0000000180)='syz0\x00', 0x1ff) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c82, 0x0) ioctl$EVIOCGVERSION(r0, 0x80044501, &(0x7f00000001c0)=""/119) [ 1525.013832] FAULT_INJECTION: forcing a failure. [ 1525.013832] name failslab, interval 1, probability 0, space 0, times 0 [ 1525.025778] CPU: 0 PID: 7003 Comm: syz-executor0 Not tainted 4.18.0-rc4+ #144 [ 1525.033074] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1525.042520] Call Trace: [ 1525.045122] dump_stack+0x1c9/0x2b4 [ 1525.048771] ? dump_stack_print_info.cold.2+0x52/0x52 [ 1525.053973] ? should_fail+0x886/0xbed [ 1525.057875] ? check_memory_region+0xc0/0x1b0 [ 1525.062397] should_fail.cold.4+0xa/0x1a [ 1525.066519] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 1525.071633] ? mark_held_locks+0xc9/0x160 [ 1525.075854] ? retint_kernel+0x10/0x10 [ 1525.079759] ? graph_lock+0x170/0x170 [ 1525.083572] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1525.088352] ? retint_kernel+0x10/0x10 [ 1525.092269] ? __lock_is_held+0xb5/0x140 [ 1525.096356] ? check_same_owner+0x340/0x340 [ 1525.100698] ? rcu_note_context_switch+0x730/0x730 [ 1525.105661] __should_failslab+0x124/0x180 [ 1525.109924] should_failslab+0x9/0x14 [ 1525.113749] kmem_cache_alloc_node_trace+0x26f/0x770 [ 1525.118868] ? kasan_unpoison_shadow+0x35/0x50 [ 1525.123484] __kmalloc_node+0x33/0x70 [ 1525.127313] blk_mq_alloc_rq_map+0x10d/0x220 [ 1525.131761] blk_mq_sched_alloc_tags.isra.13+0x7b/0x160 [ 1525.137151] blk_mq_init_sched+0x1e1/0x5a0 [ 1525.141415] elevator_init_mq+0xd7/0x160 [ 1525.145493] blk_mq_init_allocated_queue+0xf34/0x15a0 [ 1525.150696] ? blk_mq_map_swqueue+0xae0/0xae0 [ 1525.155199] ? __mutex_init+0x1f7/0x290 [ 1525.159202] ? blk_mq_alloc_rq_map+0x142/0x220 03:54:46 executing program 2: r0 = syz_open_dev$sndseq(&(0x7f0000dcc000)='/dev/snd/seq\x00', 0x0, 0x2) read(r0, &(0x7f0000fb6000)=""/28, 0x3f0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000418f50)={{0x80}, "0a4ceaa05d9a00000000000000039b3fd4cec307e8ef3d13eb790ec9c65abaf90d229db692542e5b78f8b29e0a27800f0000000000000009fb42f376589701a4", 0xa9824f69d1376637, 0x10800a}) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000240)={0xbf}) write$binfmt_script(r0, &(0x7f0000000000)=ANY=[], 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f00000002c0)={{}, 'port0\x00'}) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer2\x00', 0x0, 0x0) r2 = fcntl$getown(r0, 0x9) ptrace$setsig(0x4203, r2, 0x9, &(0x7f0000000000)={0x14, 0x9, 0x80000001, 0x8}) ioctl$TIOCSCTTY(r1, 0x540e, 0x68) 03:54:46 executing program 4: r0 = socket(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1d01000000000000}, 0xc, &(0x7f0000000900)={&(0x7f0000000040)={0x14, 0x1e, 0x201}, 0x14}, 0x1}, 0x0) 03:54:46 executing program 1: r0 = socket(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x3d00000000000000}, 0xc, &(0x7f0000000900)={&(0x7f0000000040)={0x14, 0x1e, 0x201}, 0x14}, 0x1}, 0x0) 03:54:46 executing program 7: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f000000d000)={0xa, 0x4e20}, 0x1c) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}, 0xb}, 0x1c) syz_emit_ethernet(0x3e, &(0x7f00000001c0)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @random="e829f650db0f", [], {@ipv6={0x86dd, {0x0, 0x6, "50a09c", 0x8, 0xffffff11, 0x0, @remote={0xfe, 0x80, [], 0xbb}, @local={0xfe, 0x80, [], 0xaa}, {[], @udp={0x0, 0x4e20, 0x8}}}}}}, &(0x7f0000000040)) syz_emit_ethernet(0x3e, &(0x7f0000000000)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], {@ipv6={0x86dd, {0x0, 0x6, "50a09c", 0x8, 0xffffff11, 0x0, @remote={0xfe, 0x80, [], 0xbb}, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4788], 0xaa}, {[], @udp={0x300, 0x4e20, 0x8}}}}}}, &(0x7f0000000040)) 03:54:46 executing program 6: 03:54:46 executing program 5: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer2\x00', 0x0, 0x0) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000040)="025cc83d6d345f8f762070") ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r0, 0x40085112, &(0x7f0000b18000)={{0xffffff93}, {0xffffffa0}, 0x0, 0x0, 0x0, [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x500000000000000]}) [ 1525.163810] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1525.169362] ? __blk_mq_alloc_rq_map+0x17d/0x2e0 [ 1525.174150] ? blk_mq_update_nr_hw_queues+0x510/0x510 [ 1525.179374] blk_mq_init_queue+0x63/0xb0 [ 1525.183471] loop_add+0x33d/0x9d0 [ 1525.186951] ? loop_lookup+0x105/0x230 [ 1525.190866] ? loop_queue_rq+0x660/0x660 [ 1525.194951] loop_control_ioctl+0x199/0x540 [ 1525.199285] ? loop_add+0x9d0/0x9d0 [ 1525.202916] ? retint_kernel+0x10/0x10 [ 1525.206817] ? do_vfs_ioctl+0x123/0x1720 [ 1525.210881] ? loop_add+0x9d0/0x9d0 [ 1525.214513] do_vfs_ioctl+0x1de/0x1720 [ 1525.218412] ? ioctl_preallocate+0x300/0x300 [ 1525.222853] ? __fget_light+0x2f7/0x440 [ 1525.226833] ? __schedule+0x1ed0/0x1ed0 [ 1525.230814] ? fget_raw+0x20/0x20 [ 1525.234277] ? __sb_end_write+0xac/0xe0 [ 1525.238267] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1525.243844] ? exit_to_usermode_loop+0x8c/0x370 [ 1525.248547] ? security_file_ioctl+0x94/0xc0 [ 1525.252972] ksys_ioctl+0xa9/0xd0 [ 1525.256436] __x64_sys_ioctl+0x73/0xb0 [ 1525.260333] do_syscall_64+0x1b9/0x820 [ 1525.264229] ? syscall_slow_exit_work+0x500/0x500 [ 1525.269078] ? syscall_return_slowpath+0x5e0/0x5e0 [ 1525.274015] ? syscall_return_slowpath+0x31d/0x5e0 [ 1525.278967] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe [ 1525.284341] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1525.289200] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1525.294392] RIP: 0033:0x455a79 [ 1525.297578] Code: 1d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1525.316966] RSP: 002b:00007f420d477c68 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1525.324708] RAX: ffffffffffffffda RBX: 00007f420d4786d4 RCX: 0000000000455a79 [ 1525.332003] RDX: 0000000000000000 RSI: 0000000000004c80 RDI: 0000000000000016 [ 1525.339389] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 1525.346684] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000017 [ 1525.353958] R13: 00000000004bdfb1 R14: 00000000004ccab0 R15: 0000000000000027 03:54:46 executing program 3: r0 = syz_open_dev$dmmidi(&(0x7f0000000040)='/dev/dmmidi#\x00', 0x9, 0x105002) ioctl$SNDRV_CTL_IOCTL_ELEM_LIST(r0, 0xc0505510, &(0x7f00000001c0)={0x101, 0x7, 0x3, 0x80, &(0x7f0000000680)=[{}, {}, {}, {}, {}, {}, {}]}) ioctl$BLKDISCARD(r0, 0x1277, &(0x7f0000000100)) write$P9_ROPEN(r0, &(0x7f0000000080)={0x18, 0x71, 0x1, {{0x10, 0x3, 0x7}}}, 0x18) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140)='/dev/snapshot\x00', 0x0, 0x0) fcntl$addseals(0xffffffffffffffff, 0x409, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f0000000000), &(0x7f00000000c0)=0x8) ioctl$EVIOCGLED(0xffffffffffffffff, 0x80404519, &(0x7f0000000580)=""/236) ioctl$BLKREPORTZONE(r1, 0xc0101282, &(0x7f0000000840)={0x6, 0x9, 0x0, [{0x9, 0x0, 0x0, 0x2, 0x9, 0x0, 0x3f}, {0xff, 0xbd, 0x40, 0x9, 0x4, 0x8, 0x8001}, {0x6, 0x706, 0x2, 0x7, 0x100000000, 0x9}, {0x20, 0x0, 0x81, 0xfd, 0x6, 0x3, 0x1ff}, {0xe0a0, 0x9, 0x8001, 0x20, 0x3, 0x3ff, 0x7ff}, {0x800, 0x8, 0x100, 0x3, 0x10000, 0x1, 0x3}, {0xad2, 0x9, 0x7fff, 0x100, 0x6, 0x1, 0x1f}, {0x7, 0x2, 0x0, 0x8, 0x5, 0xfff, 0x8001}, {0x400, 0x2, 0x4, 0x0, 0x5e, 0x80000000}]}) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000280)='/dev/loop-control\x00', 0x0, 0x0) ioctl$EVIOCGKEYCODE_V2(0xffffffffffffffff, 0x80284504, &(0x7f00000003c0)=""/188) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c82, 0x0) 03:54:46 executing program 1: r0 = socket(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0xbf00000000000000}, 0xc, &(0x7f0000000900)={&(0x7f0000000040)={0x14, 0x1e, 0x201}, 0x14}, 0x1}, 0x0) 03:54:47 executing program 0 (fault-call:10 fault-nth:40): r0 = syz_open_dev$vcsa(&(0x7f0000000100)='/dev/vcsa#\x00', 0x5, 0x101000) ioctl$BLKDISCARD(r0, 0x1277, &(0x7f0000000180)=0x5f) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140)='/dev/snapshot\x00', 0x0, 0x0) connect$nfc_llcp(r1, &(0x7f0000000300)={0x27, 0x0, 0x0, 0x6, 0x0, 0x0, "f44825e9da257dcd22512d531f545cf0bce08002f76d5e9bd3d1dcb3f649bf7ba49078f877ce09f903ed489ab0bbf0f088675b47312412edd6bd577062eb34", 0x1c}, 0x60) fcntl$addseals(0xffffffffffffffff, 0x409, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EVIOCGLED(r1, 0x80404519, &(0x7f0000000580)=""/236) ioctl$FS_IOC_SETFSLABEL(r2, 0x41009432, &(0x7f0000000480)="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") r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x3c, 0x0) ioctl$EVIOCGKEYCODE_V2(0xffffffffffffffff, 0x80284504, &(0x7f00000003c0)=""/188) ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x0) 03:54:47 executing program 6: 03:54:47 executing program 4: r0 = socket(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0xc600000000000000}, 0xc, &(0x7f0000000900)={&(0x7f0000000040)={0x14, 0x1e, 0x201}, 0x14}, 0x1}, 0x0) 03:54:47 executing program 7: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f000000d000)={0xa, 0x4e20}, 0x1c) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}, 0xb}, 0x1c) syz_emit_ethernet(0x3e, &(0x7f00000001c0)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @random="e829f650db0f", [], {@ipv6={0x86dd, {0x0, 0x6, "50a09c", 0x8, 0xffffff11, 0x0, @remote={0xfe, 0x80, [], 0xbb}, @local={0xfe, 0x80, [], 0xaa}, {[], @udp={0x0, 0x4e20, 0x8}}}}}}, &(0x7f0000000040)) syz_emit_ethernet(0x3e, &(0x7f0000000000)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], {@ipv6={0x86dd, {0x0, 0x6, "50a09c", 0x8, 0xffffff11, 0x0, @remote={0xfe, 0x80, [], 0xbb}, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb00], 0xaa}, {[], @udp={0x300, 0x4e20, 0x8}}}}}}, &(0x7f0000000040)) 03:54:47 executing program 6: 03:54:47 executing program 5: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer2\x00', 0x0, 0x0) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000040)="025cc83d6d345f8f762070") ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r0, 0x40085112, &(0x7f0000b18000)={{0xffffff93}, {0xffffffa0}, 0x0, 0x0, 0x0, [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfdfdffff]}) 03:54:47 executing program 7: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f000000d000)={0xa, 0x4e20}, 0x1c) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}, 0xb}, 0x1c) syz_emit_ethernet(0x3e, &(0x7f00000001c0)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @random="e829f650db0f", [], {@ipv6={0x86dd, {0x0, 0x6, "50a09c", 0x8, 0xffffff11, 0x0, @remote={0xfe, 0x80, [], 0xbb}, @local={0xfe, 0x80, [], 0xaa}, {[], @udp={0x0, 0x4e20, 0x8}}}}}}, &(0x7f0000000040)) syz_emit_ethernet(0x3e, &(0x7f0000000000)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], {@ipv6={0x86dd, {0x0, 0x6, "50a09c", 0x8, 0xffffff11, 0x0, @remote={0xfe, 0x80, [], 0xbb}, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x600000000000000], 0xaa}, {[], @udp={0x300, 0x4e20, 0x8}}}}}}, &(0x7f0000000040)) 03:54:47 executing program 1: r0 = socket(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x2a000000}, 0xc, &(0x7f0000000900)={&(0x7f0000000040)={0x14, 0x1e, 0x201}, 0x14}, 0x1}, 0x0) [ 1525.816104] FAULT_INJECTION: forcing a failure. [ 1525.816104] name failslab, interval 1, probability 0, space 0, times 0 [ 1525.828060] CPU: 1 PID: 7037 Comm: syz-executor0 Not tainted 4.18.0-rc4+ #144 [ 1525.835364] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1525.844735] Call Trace: [ 1525.847345] dump_stack+0x1c9/0x2b4 [ 1525.850996] ? dump_stack_print_info.cold.2+0x52/0x52 [ 1525.856233] ? finish_task_switch+0x1d3/0x870 [ 1525.860754] ? finish_task_switch+0x18a/0x870 [ 1525.865376] should_fail.cold.4+0xa/0x1a [ 1525.869466] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 1525.874700] ? __schedule+0x884/0x1ed0 [ 1525.878619] ? __sched_text_start+0x8/0x8 [ 1525.882799] ? find_held_lock+0x36/0x1c0 [ 1525.886894] ? __lock_is_held+0xb5/0x140 [ 1525.890999] ? check_same_owner+0x340/0x340 [ 1525.895343] ? retint_kernel+0x10/0x10 [ 1525.899278] __should_failslab+0x124/0x180 [ 1525.903717] should_failslab+0x9/0x14 [ 1525.907541] kmem_cache_alloc_node_trace+0x26f/0x770 [ 1525.912676] ? blk_mq_alloc_rqs+0x7ea/0x9c0 [ 1525.917046] elevator_alloc+0x82/0x200 [ 1525.920967] dd_init_queue+0x9f/0x600 [ 1525.924800] ? dd_exit_queue+0x250/0x250 [ 1525.928884] ? __kmalloc_node+0x47/0x70 [ 1525.932878] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1525.938427] ? blk_mq_sched_alloc_tags.isra.13+0xee/0x160 [ 1525.943981] blk_mq_init_sched+0x27b/0x5a0 [ 1525.948238] elevator_init_mq+0xd7/0x160 [ 1525.952314] blk_mq_init_allocated_queue+0xf34/0x15a0 [ 1525.957523] ? blk_mq_map_swqueue+0xae0/0xae0 [ 1525.962025] ? __mutex_init+0x1f7/0x290 [ 1525.966018] ? mark_held_locks+0xc9/0x160 [ 1525.970179] ? retint_kernel+0x10/0x10 [ 1525.974113] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 1525.979160] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1525.983932] ? retint_kernel+0x10/0x10 [ 1525.987867] blk_mq_init_queue+0x63/0xb0 [ 1525.991940] loop_add+0x33d/0x9d0 [ 1525.995399] ? loop_lookup+0x105/0x230 [ 1525.999293] ? loop_queue_rq+0x660/0x660 [ 1526.003370] loop_control_ioctl+0x199/0x540 [ 1526.007717] ? loop_add+0x9d0/0x9d0 [ 1526.011349] ? retint_kernel+0x10/0x10 [ 1526.015248] ? do_vfs_ioctl+0x123/0x1720 [ 1526.019314] ? loop_add+0x9d0/0x9d0 [ 1526.022957] do_vfs_ioctl+0x1de/0x1720 [ 1526.026854] ? __lock_is_held+0xb5/0x140 [ 1526.030932] ? ioctl_preallocate+0x300/0x300 [ 1526.035343] ? __fget_light+0x2f7/0x440 [ 1526.039324] ? fget_raw+0x20/0x20 [ 1526.042784] ? retint_kernel+0x10/0x10 [ 1526.046879] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 1526.051904] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1526.056670] ? security_file_ioctl+0x94/0xc0 [ 1526.061084] ksys_ioctl+0xa9/0xd0 [ 1526.064544] __x64_sys_ioctl+0x73/0xb0 [ 1526.068449] do_syscall_64+0x1b9/0x820 [ 1526.072345] ? syscall_slow_exit_work+0x500/0x500 [ 1526.077197] ? syscall_return_slowpath+0x5e0/0x5e0 [ 1526.082134] ? syscall_return_slowpath+0x31d/0x5e0 [ 1526.087104] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe [ 1526.092918] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1526.097777] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1526.102971] RIP: 0033:0x455a79 [ 1526.106173] Code: 1d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1526.125579] RSP: 002b:00007f420d477c68 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1526.133395] RAX: ffffffffffffffda RBX: 00007f420d4786d4 RCX: 0000000000455a79 [ 1526.140680] RDX: 0000000000000000 RSI: 0000000000004c80 RDI: 0000000000000015 [ 1526.147955] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 1526.155243] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000016 [ 1526.162549] R13: 00000000004bdfb1 R14: 00000000004ccab0 R15: 0000000000000028 03:54:48 executing program 2: r0 = syz_open_dev$sndseq(&(0x7f0000dcc000)='/dev/snd/seq\x00', 0x0, 0x2) read(r0, &(0x7f0000fb6000)=""/28, 0x3f0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000418f50)={{0x80}, "0a4ceaa05d9a00000000000000039b3fd4cec307e8ef3d13eb790ec9c65abaf90d229db692542e5b78f8b29e0a27800f0000000000000009fb42f376589701a4", 0xa9824f69d1376637, 0x10800a}) r1 = syz_open_dev$amidi(&(0x7f0000000000)='/dev/amidi#\x00', 0x80, 0x0) getsockopt$inet_sctp_SCTP_CONTEXT(0xffffffffffffffff, 0x84, 0x11, &(0x7f0000000040)={0x0, 0xfffffffffffffffd}, &(0x7f0000000080)=0x8) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(r1, 0x84, 0x6c, &(0x7f0000000100)={r2, 0xfd, "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"}, &(0x7f0000000380)=0x105) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000240)={0xbf}) write$binfmt_script(r0, &(0x7f0000000000)=ANY=[], 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f00000002c0)={{}, 'port0\x00'}) openat$sequencer2(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer2\x00', 0x0, 0x0) 03:54:48 executing program 4: r0 = socket(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0xb900}, 0xc, &(0x7f0000000900)={&(0x7f0000000040)={0x14, 0x1e, 0x201}, 0x14}, 0x1}, 0x0) 03:54:48 executing program 3: ioctl$BLKDISCARD(0xffffffffffffffff, 0x1277, &(0x7f0000000180)) r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140)='/dev/snapshot\x00', 0x0, 0x0) fcntl$addseals(0xffffffffffffffff, 0x409, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(serpent)\x00'}, 0x58) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f0000000000), &(0x7f00000000c0)=0x8) ioctl$EVIOCGLED(0xffffffffffffffff, 0x80404519, &(0x7f0000000580)=""/236) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x3c, 0x0) ioctl$EVIOCGKEYCODE_V2(0xffffffffffffffff, 0x80284504, &(0x7f00000003c0)=""/188) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c82, 0x0) 03:54:48 executing program 1: r0 = socket(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x82}, 0xc, &(0x7f0000000900)={&(0x7f0000000040)={0x14, 0x1e, 0x201}, 0x14}, 0x1}, 0x0) 03:54:48 executing program 0 (fault-call:10 fault-nth:41): r0 = syz_open_dev$vcsa(&(0x7f0000000100)='/dev/vcsa#\x00', 0x5, 0x101000) ioctl$BLKDISCARD(r0, 0x1277, &(0x7f0000000180)=0x5f) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140)='/dev/snapshot\x00', 0x0, 0x0) connect$nfc_llcp(r1, &(0x7f0000000300)={0x27, 0x0, 0x0, 0x6, 0x0, 0x0, "f44825e9da257dcd22512d531f545cf0bce08002f76d5e9bd3d1dcb3f649bf7ba49078f877ce09f903ed489ab0bbf0f088675b47312412edd6bd577062eb34", 0x1c}, 0x60) fcntl$addseals(0xffffffffffffffff, 0x409, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EVIOCGLED(r1, 0x80404519, &(0x7f0000000580)=""/236) ioctl$FS_IOC_SETFSLABEL(r2, 0x41009432, &(0x7f0000000480)="64098ceb11469210e1fa92c76a76762b420a730851d9c9ce1d2745bac5fca8796f1aba309faf35268b4d45ac04ac0ec6f2cebf8f0ac8391dd8cef0da84895505ef6fc4062016210998b92c121630e66d984a620a4a40b4b63bebedc75ae3e140c654a4f80fec3a6af81841856baae4ad83438f32d9e08e5219c8b832403b86aa723d75cb839059d9d094ba7a3510a5acd071b9c1f441886fb396511cb44257e86695b1b4b84218118e0045593d869765e8f850cc6a534e5f114b22d73ba2a903943a32cebbff720180ba6531e240d9a3759e2287b1a64f950a5b1e402580731d395128e3b81fd4c76b233a384200aa015eb779ce7140613e374a38caa9d18b34") r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x3c, 0x0) ioctl$EVIOCGKEYCODE_V2(0xffffffffffffffff, 0x80284504, &(0x7f00000003c0)=""/188) ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x0) 03:54:48 executing program 6: 03:54:48 executing program 7: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f000000d000)={0xa, 0x4e20}, 0x1c) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}, 0xb}, 0x1c) syz_emit_ethernet(0x3e, &(0x7f00000001c0)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @random="e829f650db0f", [], {@ipv6={0x86dd, {0x0, 0x6, "50a09c", 0x8, 0xffffff11, 0x0, @remote={0xfe, 0x80, [], 0xbb}, @local={0xfe, 0x80, [], 0xaa}, {[], @udp={0x0, 0x4e20, 0x8}}}}}}, &(0x7f0000000040)) syz_emit_ethernet(0x3e, &(0x7f0000000000)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], {@ipv6={0x86dd, {0x0, 0x6, "50a09c", 0x8, 0xffffff11, 0x0, @remote={0xfe, 0x80, [], 0xbb}, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80ffffff00000000], 0xaa}, {[], @udp={0x300, 0x4e20, 0x8}}}}}}, &(0x7f0000000040)) 03:54:48 executing program 5: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer2\x00', 0x0, 0x0) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000040)="025cc83d6d345f8f762070") ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r0, 0x40085112, &(0x7f0000b18000)={{0xffffff93}, {0xffffffa0}, 0x0, 0x0, 0x0, [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff030000]}) 03:54:48 executing program 5: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer2\x00', 0x0, 0x0) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000040)="025cc83d6d345f8f762070") ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r0, 0x40085112, &(0x7f0000b18000)={{0xffffff93}, {0xffffffa0}, 0x0, 0x0, 0x0, [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff03]}) 03:54:48 executing program 6: 03:54:48 executing program 1: r0 = socket(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x22010000}, 0xc, &(0x7f0000000900)={&(0x7f0000000040)={0x14, 0x1e, 0x201}, 0x14}, 0x1}, 0x0) 03:54:48 executing program 4: r0 = socket(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x13a}, 0xc, &(0x7f0000000900)={&(0x7f0000000040)={0x14, 0x1e, 0x201}, 0x14}, 0x1}, 0x0) 03:54:48 executing program 3: ioctl$BLKDISCARD(0xffffffffffffffff, 0x1277, &(0x7f0000000180)) r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140)='/dev/snapshot\x00', 0x0, 0x0) fcntl$addseals(0xffffffffffffffff, 0x409, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f0000000000), &(0x7f00000000c0)=0x8) ioctl$EVIOCGLED(0xffffffffffffffff, 0x80404519, &(0x7f0000000580)=""/236) setsockopt$inet6_MCAST_JOIN_GROUP(r0, 0x29, 0x2a, &(0x7f0000000300)={0x1fb3, {{0xa, 0x4e21, 0xa9, @ipv4={[], [0xff, 0xff]}, 0xd0eb}}}, 0x88) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x3c, 0x0) ioctl$EVIOCGKEYCODE_V2(0xffffffffffffffff, 0x80284504, &(0x7f00000001c0)=""/188) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c82, 0x0) r2 = syz_open_dev$usbmon(&(0x7f0000000040)='/dev/usbmon#\x00', 0x5, 0x10000) ioctl$SG_SET_RESERVED_SIZE(r2, 0x2275, &(0x7f0000000080)=0x80) 03:54:48 executing program 7: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f000000d000)={0xa, 0x4e20}, 0x1c) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}, 0xb}, 0x1c) syz_emit_ethernet(0x3e, &(0x7f00000001c0)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @random="e829f650db0f", [], {@ipv6={0x86dd, {0x0, 0x6, "50a09c", 0x8, 0xffffff11, 0x0, @remote={0xfe, 0x80, [], 0xbb}, @local={0xfe, 0x80, [], 0xaa}, {[], @udp={0x0, 0x4e20, 0x8}}}}}}, &(0x7f0000000040)) syz_emit_ethernet(0x3e, &(0x7f0000000000)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], {@ipv6={0x86dd, {0x0, 0x6, "50a09c", 0x8, 0xffffff11, 0x0, @remote={0xfe, 0x80, [], 0xbb}, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x543], 0xaa}, {[], @udp={0x300, 0x4e20, 0x8}}}}}}, &(0x7f0000000040)) [ 1526.765443] FAULT_INJECTION: forcing a failure. [ 1526.765443] name failslab, interval 1, probability 0, space 0, times 0 [ 1526.777442] CPU: 1 PID: 7064 Comm: syz-executor0 Not tainted 4.18.0-rc4+ #144 [ 1526.784736] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1526.794127] Call Trace: [ 1526.796885] dump_stack+0x1c9/0x2b4 [ 1526.800542] ? dump_stack_print_info.cold.2+0x52/0x52 [ 1526.805773] ? should_fail+0x9c5/0xbed [ 1526.809689] should_fail.cold.4+0xa/0x1a [ 1526.813775] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 1526.818904] ? blk_mq_init_allocated_queue+0xf34/0x15a0 [ 1526.824301] ? blk_mq_init_queue+0x63/0xb0 [ 1526.828586] ? loop_add+0x33d/0x9d0 [ 1526.832260] ? loop_control_ioctl+0x199/0x540 [ 1526.836795] ? do_vfs_ioctl+0x1de/0x1720 [ 1526.840886] ? ksys_ioctl+0xa9/0xd0 [ 1526.844547] ? __x64_sys_ioctl+0x73/0xb0 [ 1526.848627] ? graph_lock+0x170/0x170 [ 1526.852464] ? find_held_lock+0x36/0x1c0 [ 1526.856590] ? __lock_is_held+0xb5/0x140 [ 1526.860686] ? check_same_owner+0x340/0x340 [ 1526.865050] ? __ia32_sys_membarrier+0x150/0x150 [ 1526.869823] ? kasan_check_write+0x14/0x20 [ 1526.874083] ? rcu_note_context_switch+0x730/0x730 [ 1526.879039] __should_failslab+0x124/0x180 [ 1526.883301] should_failslab+0x9/0x14 [ 1526.887208] kmem_cache_alloc_node_trace+0x26f/0x770 [ 1526.892339] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1526.897900] dd_init_queue+0x111/0x600 [ 1526.901822] ? dd_exit_queue+0x250/0x250 [ 1526.905921] ? __kmalloc_node+0x47/0x70 [ 1526.909919] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1526.915481] ? blk_mq_sched_alloc_tags.isra.13+0xee/0x160 [ 1526.921043] blk_mq_init_sched+0x27b/0x5a0 [ 1526.925304] elevator_init_mq+0xd7/0x160 [ 1526.929380] blk_mq_init_allocated_queue+0xf34/0x15a0 [ 1526.934592] ? blk_mq_map_swqueue+0xae0/0xae0 [ 1526.939101] ? __mutex_init+0x1f7/0x290 [ 1526.943096] ? mark_held_locks+0xc9/0x160 [ 1526.947259] ? retint_kernel+0x10/0x10 [ 1526.951156] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 1526.956180] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1526.960962] ? retint_kernel+0x10/0x10 [ 1526.964873] blk_mq_init_queue+0x63/0xb0 [ 1526.968965] loop_add+0x33d/0x9d0 [ 1526.972425] ? loop_lookup+0x105/0x230 [ 1526.976336] ? loop_queue_rq+0x660/0x660 [ 1526.980416] loop_control_ioctl+0x199/0x540 [ 1526.984742] ? loop_add+0x9d0/0x9d0 [ 1526.988382] ? retint_kernel+0x10/0x10 [ 1526.992283] ? do_vfs_ioctl+0x123/0x1720 [ 1526.996365] ? loop_add+0x9d0/0x9d0 [ 1527.000007] do_vfs_ioctl+0x1de/0x1720 [ 1527.003904] ? __lock_is_held+0xb5/0x140 [ 1527.007969] ? ioctl_preallocate+0x300/0x300 [ 1527.012389] ? __fget_light+0x2f7/0x440 [ 1527.016370] ? fget_raw+0x20/0x20 [ 1527.019836] ? __sb_end_write+0xac/0xe0 [ 1527.023831] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1527.029461] ? fput+0x130/0x1a0 [ 1527.032860] ? ksys_write+0x1ae/0x260 [ 1527.036759] ? security_file_ioctl+0x94/0xc0 [ 1527.041174] ksys_ioctl+0xa9/0xd0 [ 1527.044639] __x64_sys_ioctl+0x73/0xb0 [ 1527.048534] do_syscall_64+0x1b9/0x820 [ 1527.052425] ? syscall_slow_exit_work+0x500/0x500 [ 1527.057288] ? syscall_return_slowpath+0x5e0/0x5e0 [ 1527.062250] ? syscall_return_slowpath+0x31d/0x5e0 [ 1527.067191] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1527.072756] ? retint_user+0x18/0x18 [ 1527.076496] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1527.081354] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1527.086556] RIP: 0033:0x455a79 [ 1527.089753] Code: 1d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1527.109134] RSP: 002b:00007f420d477c68 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1527.116852] RAX: ffffffffffffffda RBX: 00007f420d4786d4 RCX: 0000000000455a79 [ 1527.124139] RDX: 0000000000000000 RSI: 0000000000004c80 RDI: 0000000000000016 [ 1527.131410] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 1527.139528] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000017 [ 1527.146800] R13: 00000000004bdfb1 R14: 00000000004ccab0 R15: 0000000000000029 03:54:48 executing program 1: r0 = socket(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0xbf000000}, 0xc, &(0x7f0000000900)={&(0x7f0000000040)={0x14, 0x1e, 0x201}, 0x14}, 0x1}, 0x0) 03:54:48 executing program 3: ioctl$BLKDISCARD(0xffffffffffffffff, 0x1277, &(0x7f0000000180)) r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140)='/dev/snapshot\x00', 0x0, 0x0) fcntl$addseals(0xffffffffffffffff, 0x409, 0x0) r1 = getpid() perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7ff, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x7, 0x0, @perf_bp={&(0x7f0000abe000)}, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x1}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f0000000000), &(0x7f00000000c0)=0x8) ioctl$EVIOCGLED(0xffffffffffffffff, 0x80404519, &(0x7f0000000580)=""/236) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x0, 0x100f}}, 0x20) write$RDMA_USER_CM_CMD_MIGRATE_ID(r0, &(0x7f00000001c0)={0x12, 0x10, 0xfa00, {&(0x7f0000000040), r2, r0}}, 0x18) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x3c, 0x0) ioctl$EVIOCGKEYCODE_V2(0xffffffffffffffff, 0x80284504, &(0x7f00000003c0)=""/188) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c82, 0x0) 03:54:49 executing program 2: r0 = syz_open_dev$sndseq(&(0x7f0000dcc000)='/dev/snd/seq\x00', 0x0, 0x2) read(r0, &(0x7f0000fb6000)=""/28, 0x3f0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000418f50)={{0x80}, "0a4ceaa05d9a00000000000000039b3fd4cec307e8ef3d13eb790ec9c65abaf90d229db692542e5b78f8b29e0a27800f0000000000000009fb42f376589701a4", 0xa9824f69d1376637, 0x10800a}) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000240)={0xbf}) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000000)) write$binfmt_script(r0, &(0x7f0000000000)=ANY=[], 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f00000002c0)={{}, 'port0\x00'}) openat$sequencer2(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer2\x00', 0x0, 0x0) 03:54:49 executing program 6: 03:54:49 executing program 4: r0 = socket(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8f00000000000000}, 0xc, &(0x7f0000000900)={&(0x7f0000000040)={0x14, 0x1e, 0x201}, 0x14}, 0x1}, 0x0) 03:54:49 executing program 7: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f000000d000)={0xa, 0x4e20}, 0x1c) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}, 0xb}, 0x1c) syz_emit_ethernet(0x3e, &(0x7f00000001c0)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @random="e829f650db0f", [], {@ipv6={0x86dd, {0x0, 0x6, "50a09c", 0x8, 0xffffff11, 0x0, @remote={0xfe, 0x80, [], 0xbb}, @local={0xfe, 0x80, [], 0xaa}, {[], @udp={0x0, 0x4e20, 0x8}}}}}}, &(0x7f0000000040)) syz_emit_ethernet(0x3e, &(0x7f0000000000)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], {@ipv6={0x86dd, {0x0, 0x6, "50a09c", 0x8, 0xffffff11, 0x0, @remote={0xfe, 0x80, [], 0xbb}, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8847], 0xaa}, {[], @udp={0x300, 0x4e20, 0x8}}}}}}, &(0x7f0000000040)) 03:54:49 executing program 5: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer2\x00', 0x0, 0x0) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000040)="025cc83d6d345f8f762070") ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r0, 0x40085112, &(0x7f0000b18000)={{0xffffff93}, {0xffffffa0}, 0x0, 0x0, 0x0, [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f00]}) 03:54:49 executing program 0 (fault-call:10 fault-nth:42): r0 = syz_open_dev$vcsa(&(0x7f0000000100)='/dev/vcsa#\x00', 0x5, 0x101000) ioctl$BLKDISCARD(r0, 0x1277, &(0x7f0000000180)=0x5f) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140)='/dev/snapshot\x00', 0x0, 0x0) connect$nfc_llcp(r1, &(0x7f0000000300)={0x27, 0x0, 0x0, 0x6, 0x0, 0x0, "f44825e9da257dcd22512d531f545cf0bce08002f76d5e9bd3d1dcb3f649bf7ba49078f877ce09f903ed489ab0bbf0f088675b47312412edd6bd577062eb34", 0x1c}, 0x60) fcntl$addseals(0xffffffffffffffff, 0x409, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EVIOCGLED(r1, 0x80404519, &(0x7f0000000580)=""/236) ioctl$FS_IOC_SETFSLABEL(r2, 0x41009432, &(0x7f0000000480)="64098ceb11469210e1fa92c76a76762b420a730851d9c9ce1d2745bac5fca8796f1aba309faf35268b4d45ac04ac0ec6f2cebf8f0ac8391dd8cef0da84895505ef6fc4062016210998b92c121630e66d984a620a4a40b4b63bebedc75ae3e140c654a4f80fec3a6af81841856baae4ad83438f32d9e08e5219c8b832403b86aa723d75cb839059d9d094ba7a3510a5acd071b9c1f441886fb396511cb44257e86695b1b4b84218118e0045593d869765e8f850cc6a534e5f114b22d73ba2a903943a32cebbff720180ba6531e240d9a3759e2287b1a64f950a5b1e402580731d395128e3b81fd4c76b233a384200aa015eb779ce7140613e374a38caa9d18b34") r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x3c, 0x0) ioctl$EVIOCGKEYCODE_V2(0xffffffffffffffff, 0x80284504, &(0x7f00000003c0)=""/188) ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x0) 03:54:49 executing program 1: r0 = socket(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0xaa01}, 0xc, &(0x7f0000000900)={&(0x7f0000000040)={0x14, 0x1e, 0x201}, 0x14}, 0x1}, 0x0) 03:54:49 executing program 3: ioctl$BLKDISCARD(0xffffffffffffffff, 0x1277, &(0x7f0000000180)) r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140)='/dev/snapshot\x00', 0x0, 0x0) fcntl$addseals(r0, 0x409, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f0000000000)={0x0}, &(0x7f00000000c0)=0x8) ioctl$EVIOCGLED(0xffffffffffffffff, 0x80404519, &(0x7f0000000580)=""/236) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x3c, 0x0) ioctl$EVIOCGKEYCODE_V2(0xffffffffffffffff, 0x80284504, &(0x7f00000003c0)=""/188) setsockopt$inet_sctp6_SCTP_DELAYED_SACK(r0, 0x84, 0x10, &(0x7f0000000040)=@sack_info={r1, 0x55f7}, 0xc) setsockopt$bt_hci_HCI_DATA_DIR(r0, 0x0, 0x1, &(0x7f0000000080), 0x4) ioctl$SNDRV_TIMER_IOCTL_CONTINUE(r0, 0x54a2) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c82, 0x0) 03:54:49 executing program 6: 03:54:49 executing program 4: r0 = socket(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1001}, 0xc, &(0x7f0000000900)={&(0x7f0000000040)={0x14, 0x1e, 0x201}, 0x14}, 0x1}, 0x0) 03:54:49 executing program 5: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer2\x00', 0x0, 0x0) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000040)="025cc83d6d345f8f762070") ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r0, 0x40085112, &(0x7f0000b18000)={{0xffffff93}, {0xffffffa0}, 0x0, 0x0, 0x0, [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5]}) 03:54:49 executing program 1: r0 = socket(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x2900000000000000}, 0xc, &(0x7f0000000900)={&(0x7f0000000040)={0x14, 0x1e, 0x201}, 0x14}, 0x1}, 0x0) 03:54:49 executing program 7: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f000000d000)={0xa, 0x4e20}, 0x1c) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}, 0xb}, 0x1c) syz_emit_ethernet(0x3e, &(0x7f00000001c0)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @random="e829f650db0f", [], {@ipv6={0x86dd, {0x0, 0x6, "50a09c", 0x8, 0xffffff11, 0x0, @remote={0xfe, 0x80, [], 0xbb}, @local={0xfe, 0x80, [], 0xaa}, {[], @udp={0x0, 0x4e20, 0x8}}}}}}, &(0x7f0000000040)) syz_emit_ethernet(0x3e, &(0x7f0000000000)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], {@ipv6={0x86dd, {0x0, 0x6, "50a09c", 0x8, 0xffffff11, 0x0, @remote={0xfe, 0x80, [], 0xbb}, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x689], 0xaa}, {[], @udp={0x300, 0x4e20, 0x8}}}}}}, &(0x7f0000000040)) 03:54:49 executing program 3: ioctl$BLKDISCARD(0xffffffffffffffff, 0x1277, &(0x7f0000000180)) r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140)='/dev/snapshot\x00', 0x0, 0x0) fcntl$addseals(r0, 0x409, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f0000000000), &(0x7f00000000c0)=0x8) ioctl$EVIOCGLED(0xffffffffffffffff, 0x80404519, &(0x7f0000000580)=""/236) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x3c, 0x0) socketpair$inet_sctp(0x2, 0x5, 0x84, &(0x7f0000000080)) ioctl$EVIOCGKEYCODE_V2(0xffffffffffffffff, 0x80284504, &(0x7f00000003c0)=""/188) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$SG_GET_KEEP_ORPHAN(r0, 0x2288, &(0x7f0000000040)) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c82, 0x0) [ 1527.918522] FAULT_INJECTION: forcing a failure. [ 1527.918522] name failslab, interval 1, probability 0, space 0, times 0 [ 1527.931068] CPU: 0 PID: 7105 Comm: syz-executor0 Not tainted 4.18.0-rc4+ #144 [ 1527.938349] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1527.947708] Call Trace: [ 1527.950307] dump_stack+0x1c9/0x2b4 [ 1527.953945] ? dump_stack_print_info.cold.2+0x52/0x52 [ 1527.959155] ? finish_task_switch+0x1d3/0x870 [ 1527.963656] ? finish_task_switch+0x18a/0x870 [ 1527.968594] should_fail.cold.4+0xa/0x1a [ 1527.972664] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 1527.977787] ? __schedule+0x884/0x1ed0 [ 1527.981688] ? __sched_text_start+0x8/0x8 [ 1527.985838] ? find_held_lock+0x36/0x1c0 [ 1527.989911] ? __lock_is_held+0xb5/0x140 [ 1527.993990] ? check_same_owner+0x340/0x340 [ 1527.998321] __should_failslab+0x124/0x180 [ 1528.002565] should_failslab+0x9/0x14 [ 1528.006369] kmem_cache_alloc_node_trace+0x26f/0x770 [ 1528.011475] ? loop_info64_from_compat+0x940/0x940 [ 1528.016407] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 1528.021427] ? blk_mq_alloc_rqs+0x7bc/0x9c0 [ 1528.025759] elevator_alloc+0x82/0x200 [ 1528.029659] dd_init_queue+0x9f/0x600 [ 1528.033469] ? dd_exit_queue+0x250/0x250 [ 1528.037543] ? __kmalloc_node+0x47/0x70 [ 1528.041528] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1528.047076] ? blk_mq_sched_alloc_tags.isra.13+0xee/0x160 [ 1528.052630] blk_mq_init_sched+0x27b/0x5a0 [ 1528.056895] elevator_init_mq+0xd7/0x160 [ 1528.060969] blk_mq_init_allocated_queue+0xf34/0x15a0 [ 1528.066170] ? mark_held_locks+0x21/0x160 [ 1528.070331] ? blk_mq_map_swqueue+0xae0/0xae0 [ 1528.074833] ? retint_kernel+0x10/0x10 [ 1528.078733] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 1528.083768] ? retint_kernel+0x10/0x10 [ 1528.087693] ? blk_mq_alloc_tag_set+0x7ec/0xad0 [ 1528.092377] ? blk_mq_update_nr_hw_queues+0x510/0x510 [ 1528.097584] blk_mq_init_queue+0x63/0xb0 [ 1528.101656] loop_add+0x33d/0x9d0 [ 1528.105111] ? loop_lookup+0x105/0x230 [ 1528.109002] ? loop_queue_rq+0x660/0x660 [ 1528.113071] loop_control_ioctl+0x199/0x540 [ 1528.117409] ? loop_add+0x9d0/0x9d0 [ 1528.121043] ? expand_files.part.8+0x9c0/0x9c0 [ 1528.125635] ? kasan_check_write+0x14/0x20 [ 1528.129876] ? __mutex_unlock_slowpath+0x197/0x8c0 [ 1528.134819] ? loop_add+0x9d0/0x9d0 [ 1528.138450] do_vfs_ioctl+0x1de/0x1720 [ 1528.142346] ? retint_kernel+0x10/0x10 [ 1528.146235] ? ioctl_preallocate+0x300/0x300 [ 1528.150650] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1528.155592] ? retint_kernel+0x10/0x10 [ 1528.159490] ? security_file_ioctl+0x20/0xc0 [ 1528.163900] ? security_file_ioctl+0x27/0xc0 [ 1528.168312] ? security_file_ioctl+0x94/0xc0 [ 1528.172726] ksys_ioctl+0xa9/0xd0 [ 1528.176187] __x64_sys_ioctl+0x73/0xb0 [ 1528.180094] ? do_syscall_64+0xca/0x820 [ 1528.184073] do_syscall_64+0x1b9/0x820 [ 1528.187985] ? syscall_slow_exit_work+0x500/0x500 [ 1528.192830] ? syscall_return_slowpath+0x5e0/0x5e0 [ 1528.197764] ? syscall_return_slowpath+0x31d/0x5e0 [ 1528.202716] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1528.208283] ? retint_user+0x18/0x18 [ 1528.212004] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1528.216856] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1528.231163] RIP: 0033:0x455a79 [ 1528.234346] Code: 1d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1528.253729] RSP: 002b:00007f420d477c68 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1528.261452] RAX: ffffffffffffffda RBX: 00007f420d4786d4 RCX: 0000000000455a79 [ 1528.268723] RDX: 0000000000000000 RSI: 0000000000004c80 RDI: 0000000000000015 [ 1528.276007] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 1528.283277] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000016 [ 1528.290569] R13: 00000000004bdfb1 R14: 00000000004ccab0 R15: 000000000000002a 03:54:49 executing program 0 (fault-call:10 fault-nth:43): r0 = syz_open_dev$vcsa(&(0x7f0000000100)='/dev/vcsa#\x00', 0x5, 0x101000) ioctl$BLKDISCARD(r0, 0x1277, &(0x7f0000000180)=0x5f) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140)='/dev/snapshot\x00', 0x0, 0x0) connect$nfc_llcp(r1, &(0x7f0000000300)={0x27, 0x0, 0x0, 0x6, 0x0, 0x0, "f44825e9da257dcd22512d531f545cf0bce08002f76d5e9bd3d1dcb3f649bf7ba49078f877ce09f903ed489ab0bbf0f088675b47312412edd6bd577062eb34", 0x1c}, 0x60) fcntl$addseals(0xffffffffffffffff, 0x409, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EVIOCGLED(r1, 0x80404519, &(0x7f0000000580)=""/236) ioctl$FS_IOC_SETFSLABEL(r2, 0x41009432, &(0x7f0000000480)="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") r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x3c, 0x0) ioctl$EVIOCGKEYCODE_V2(0xffffffffffffffff, 0x80284504, &(0x7f00000003c0)=""/188) ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x0) 03:54:50 executing program 6: [ 1528.684067] FAULT_INJECTION: forcing a failure. [ 1528.684067] name failslab, interval 1, probability 0, space 0, times 0 [ 1528.696419] CPU: 1 PID: 7127 Comm: syz-executor0 Not tainted 4.18.0-rc4+ #144 [ 1528.703722] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1528.713081] Call Trace: [ 1528.715701] dump_stack+0x1c9/0x2b4 [ 1528.719363] ? dump_stack_print_info.cold.2+0x52/0x52 [ 1528.724596] should_fail.cold.4+0xa/0x1a [ 1528.728686] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 1528.733834] ? lock_downgrade+0x8f0/0x8f0 [ 1528.738016] ? graph_lock+0x170/0x170 [ 1528.741854] ? find_held_lock+0x36/0x1c0 [ 1528.745948] ? __lock_is_held+0xb5/0x140 [ 1528.750047] ? check_same_owner+0x340/0x340 [ 1528.754401] ? pcpu_balance_workfn+0x1700/0x1700 [ 1528.759312] ? rcu_note_context_switch+0x730/0x730 [ 1528.764316] __should_failslab+0x124/0x180 [ 1528.768583] should_failslab+0x9/0x14 [ 1528.772399] kmem_cache_alloc_node_trace+0x26f/0x770 [ 1528.777612] ? lockdep_init_map+0x9/0x10 [ 1528.781698] __kmalloc_node+0x33/0x70 [ 1528.785520] disk_expand_part_tbl+0x24b/0x3d0 [ 1528.790026] ? rcu_read_lock_sched_held+0x108/0x120 [ 1528.795053] ? blk_free_devt+0x60/0x60 [ 1528.798952] ? retint_kernel+0x10/0x10 [ 1528.802860] __alloc_disk_node+0x177/0x510 [ 1528.807133] ? disk_expand_part_tbl+0x3d0/0x3d0 [ 1528.811829] ? blk_queue_flag_set+0xf6/0x160 [ 1528.816279] loop_add+0x420/0x9d0 [ 1528.819752] ? loop_queue_rq+0x660/0x660 [ 1528.823831] loop_control_ioctl+0x199/0x540 [ 1528.828159] ? loop_add+0x9d0/0x9d0 [ 1528.831814] ? expand_files.part.8+0x9c0/0x9c0 [ 1528.836410] ? kasan_check_write+0x14/0x20 [ 1528.840677] ? __mutex_unlock_slowpath+0x197/0x8c0 [ 1528.845634] ? loop_add+0x9d0/0x9d0 [ 1528.849281] do_vfs_ioctl+0x1de/0x1720 [ 1528.853531] ? __lock_is_held+0xb5/0x140 [ 1528.857620] ? ioctl_preallocate+0x300/0x300 [ 1528.862037] ? __fget_light+0x2f7/0x440 [ 1528.866019] ? fget_raw+0x20/0x20 [ 1528.869753] ? __sb_end_write+0xac/0xe0 [ 1528.873742] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1528.879302] ? fput+0x130/0x1a0 [ 1528.882597] ? ksys_write+0x1ae/0x260 [ 1528.886527] ? security_file_ioctl+0x94/0xc0 [ 1528.891132] ksys_ioctl+0xa9/0xd0 [ 1528.894689] __x64_sys_ioctl+0x73/0xb0 [ 1528.898584] do_syscall_64+0x1b9/0x820 [ 1528.902679] ? syscall_slow_exit_work+0x500/0x500 [ 1528.907546] ? syscall_return_slowpath+0x5e0/0x5e0 [ 1528.912487] ? syscall_return_slowpath+0x31d/0x5e0 [ 1528.917432] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1528.922978] ? retint_user+0x18/0x18 [ 1528.926709] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1528.931567] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1528.936762] RIP: 0033:0x455a79 [ 1528.939946] Code: 1d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1528.959402] RSP: 002b:00007f420d477c68 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1528.967132] RAX: ffffffffffffffda RBX: 00007f420d4786d4 RCX: 0000000000455a79 [ 1528.974416] RDX: 0000000000000000 RSI: 0000000000004c80 RDI: 0000000000000016 03:54:50 executing program 2: r0 = syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x1, 0x40) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x43, &(0x7f0000000040)={'IDLETIMER\x00'}, &(0x7f0000000080)=0x1e) r1 = syz_open_dev$sndseq(&(0x7f0000dcc000)='/dev/snd/seq\x00', 0x0, 0x2) read(r1, &(0x7f0000fb6000)=""/28, 0x3f0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r1, 0xc0a85320, &(0x7f0000418f50)={{0x80}, "0a4ceaa05d9a00000000000000039b3fd4cec307e8ef3d13eb790ec9c65abaf90d229db692542e5b78f8b29e0a27800f0000000000000009fb42f376589701a4", 0xa9824f69d1376637, 0x10800a}) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r1, 0x4040534e, &(0x7f0000000240)={0xbf}) write$binfmt_script(r1, &(0x7f0000000000)=ANY=[], 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r1, 0xc0a85320, &(0x7f00000002c0)={{}, 'port0\x00'}) dup(r0) openat$sequencer2(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer2\x00', 0x0, 0x0) 03:54:50 executing program 4: r0 = socket(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8001000000000000}, 0xc, &(0x7f0000000900)={&(0x7f0000000040)={0x14, 0x1e, 0x201}, 0x14}, 0x1}, 0x0) 03:54:50 executing program 3: ioctl$BLKDISCARD(0xffffffffffffffff, 0x1277, &(0x7f0000000180)) r0 = syz_open_dev$audion(&(0x7f0000000040)='/dev/audio#\x00', 0x8, 0x589000) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000080)={0x0, 0x0}) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r0, 0xc1105518, &(0x7f0000000680)={{0x0, 0x2, 0x7f, 0xfffffffffffffffe, 'syz1\x00', 0xffffffff}, 0x2, 0x104, 0xc03, r1, 0x3, 0x5, 'syz0\x00', &(0x7f0000000100)=['/dev/snapshot\x00', 'em0[(\x00', '\x00'], 0x15, [], [0x8, 0x101, 0x5, 0xfff]}) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140)='/dev/snapshot\x00', 0x0, 0x0) fcntl$addseals(0xffffffffffffffff, 0x409, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}, 0x0, 0x0, 0xfffffffffffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f0000000000), &(0x7f00000000c0)=0x8) ioctl$EVIOCGLED(0xffffffffffffffff, 0x80404519, &(0x7f0000000580)=""/236) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x3c, 0x0) ioctl$EVIOCGKEYCODE_V2(0xffffffffffffffff, 0x80284504, &(0x7f00000003c0)=""/188) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c82, 0x0) 03:54:50 executing program 1: r0 = socket(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4f01000000000000}, 0xc, &(0x7f0000000900)={&(0x7f0000000040)={0x14, 0x1e, 0x201}, 0x14}, 0x1}, 0x0) 03:54:50 executing program 5: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer2\x00', 0x0, 0x0) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000040)="025cc83d6d345f8f762070") ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r0, 0x40085112, &(0x7f0000b18000)={{0xffffff93}, {0xffffffa0}, 0x0, 0x0, 0x0, [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfdfdffff00000000]}) 03:54:50 executing program 7: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f000000d000)={0xa, 0x4e20}, 0x1c) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}, 0xb}, 0x1c) syz_emit_ethernet(0x3e, &(0x7f00000001c0)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @random="e829f650db0f", [], {@ipv6={0x86dd, {0x0, 0x6, "50a09c", 0x8, 0xffffff11, 0x0, @remote={0xfe, 0x80, [], 0xbb}, @local={0xfe, 0x80, [], 0xaa}, {[], @udp={0x0, 0x4e20, 0x8}}}}}}, &(0x7f0000000040)) syz_emit_ethernet(0x3e, &(0x7f0000000000)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], {@ipv6={0x86dd, {0x0, 0x6, "50a09c", 0x8, 0xffffff11, 0x0, @remote={0xfe, 0x80, [], 0xbb}, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3580], 0xaa}, {[], @udp={0x300, 0x4e20, 0x8}}}}}}, &(0x7f0000000040)) 03:54:50 executing program 6: 03:54:50 executing program 0 (fault-call:10 fault-nth:44): r0 = syz_open_dev$vcsa(&(0x7f0000000100)='/dev/vcsa#\x00', 0x5, 0x101000) ioctl$BLKDISCARD(r0, 0x1277, &(0x7f0000000180)=0x5f) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140)='/dev/snapshot\x00', 0x0, 0x0) connect$nfc_llcp(r1, &(0x7f0000000300)={0x27, 0x0, 0x0, 0x6, 0x0, 0x0, "f44825e9da257dcd22512d531f545cf0bce08002f76d5e9bd3d1dcb3f649bf7ba49078f877ce09f903ed489ab0bbf0f088675b47312412edd6bd577062eb34", 0x1c}, 0x60) fcntl$addseals(0xffffffffffffffff, 0x409, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EVIOCGLED(r1, 0x80404519, &(0x7f0000000580)=""/236) ioctl$FS_IOC_SETFSLABEL(r2, 0x41009432, &(0x7f0000000480)="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") r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x3c, 0x0) ioctl$EVIOCGKEYCODE_V2(0xffffffffffffffff, 0x80284504, &(0x7f00000003c0)=""/188) ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x0) [ 1528.981891] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 1528.989172] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000017 [ 1528.996491] R13: 00000000004bdfb1 R14: 00000000004ccab0 R15: 000000000000002b 03:54:50 executing program 6: 03:54:50 executing program 1: r0 = socket(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4e000000}, 0xc, &(0x7f0000000900)={&(0x7f0000000040)={0x14, 0x1e, 0x201}, 0x14}, 0x1}, 0x0) 03:54:50 executing program 5: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer2\x00', 0x0, 0x0) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000040)="025cc83d6d345f8f762070") ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r0, 0x40085112, &(0x7f0000b18000)={{0xffffff93}, {0xffffffa0}, 0x0, 0x0, 0x0, [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f00000000000000]}) 03:54:50 executing program 4: r0 = socket(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0xaf01000000000000}, 0xc, &(0x7f0000000900)={&(0x7f0000000040)={0x14, 0x1e, 0x201}, 0x14}, 0x1}, 0x0) 03:54:50 executing program 7: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f000000d000)={0xa, 0x4e20}, 0x1c) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}, 0xb}, 0x1c) syz_emit_ethernet(0x3e, &(0x7f00000001c0)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @random="e829f650db0f", [], {@ipv6={0x86dd, {0x0, 0x6, "50a09c", 0x8, 0xffffff11, 0x0, @remote={0xfe, 0x80, [], 0xbb}, @local={0xfe, 0x80, [], 0xaa}, {[], @udp={0x0, 0x4e20, 0x8}}}}}}, &(0x7f0000000040)) syz_emit_ethernet(0x3e, &(0x7f0000000000)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], {@ipv6={0x86dd, {0x0, 0x6, "50a09c", 0x8, 0xffffff11, 0x0, @remote={0xfe, 0x80, [], 0xbb}, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x28000000], 0xaa}, {[], @udp={0x300, 0x4e20, 0x8}}}}}}, &(0x7f0000000040)) 03:54:50 executing program 3: ioctl$BLKDISCARD(0xffffffffffffffff, 0x1277, &(0x7f0000000180)) r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140)='/dev/snapshot\x00', 0x0, 0x0) fcntl$addseals(0xffffffffffffffff, 0x409, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f0000000000), &(0x7f00000000c0)=0x8) ioctl$EVIOCGLED(0xffffffffffffffff, 0x80404519, &(0x7f0000000580)=""/236) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x3c, 0x0) ioctl$EVIOCGKEYCODE_V2(0xffffffffffffffff, 0x80284504, &(0x7f00000003c0)=""/188) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c82, 0x0) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000080)='IPVS\x00') sendmsg$IPVS_CMD_SET_SERVICE(r0, &(0x7f0000000200)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000100)={0x1c, r2, 0x1, 0x70bd2d, 0x25dfdbfe, {0x2}, [@IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x6427197a}]}, 0x1c}, 0x1, 0x0, 0x0, 0x457288de3e2a2b57}, 0x1) 03:54:50 executing program 6: 03:54:50 executing program 1: r0 = socket(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0xa1010000}, 0xc, &(0x7f0000000900)={&(0x7f0000000040)={0x14, 0x1e, 0x201}, 0x14}, 0x1}, 0x0) [ 1529.418012] FAULT_INJECTION: forcing a failure. [ 1529.418012] name failslab, interval 1, probability 0, space 0, times 0 [ 1529.430432] CPU: 0 PID: 7156 Comm: syz-executor0 Not tainted 4.18.0-rc4+ #144 [ 1529.437715] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1529.447093] Call Trace: [ 1529.449713] dump_stack+0x1c9/0x2b4 [ 1529.453353] ? dump_stack_print_info.cold.2+0x52/0x52 [ 1529.458564] should_fail.cold.4+0xa/0x1a [ 1529.462634] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 1529.467781] ? __schedule+0x884/0x1ed0 [ 1529.471867] ? __sched_text_start+0x8/0x8 [ 1529.476027] ? __lock_is_held+0xb5/0x140 [ 1529.480092] ? retint_kernel+0x10/0x10 [ 1529.484009] ? check_same_owner+0x340/0x340 [ 1529.488336] ? retint_kernel+0x10/0x10 [ 1529.492240] __should_failslab+0x124/0x180 [ 1529.496502] should_failslab+0x9/0x14 [ 1529.500317] kmem_cache_alloc_trace+0x2cb/0x780 [ 1529.505005] rand_initialize_disk+0x43/0xc0 [ 1529.509340] __alloc_disk_node+0x2bc/0x510 [ 1529.513584] ? disk_expand_part_tbl+0x3d0/0x3d0 [ 1529.518263] ? blk_queue_flag_set+0xf6/0x160 [ 1529.522697] loop_add+0x420/0x9d0 [ 1529.526169] ? loop_queue_rq+0x660/0x660 [ 1529.530246] loop_control_ioctl+0x199/0x540 [ 1529.534577] ? loop_add+0x9d0/0x9d0 [ 1529.538218] ? expand_files.part.8+0x9c0/0x9c0 [ 1529.542827] ? kasan_check_write+0x14/0x20 [ 1529.547098] ? __mutex_unlock_slowpath+0x197/0x8c0 [ 1529.552043] ? loop_add+0x9d0/0x9d0 [ 1529.555694] do_vfs_ioctl+0x1de/0x1720 [ 1529.559602] ? __lock_is_held+0xb5/0x140 [ 1529.563683] ? ioctl_preallocate+0x300/0x300 [ 1529.568146] ? __fget_light+0x2f7/0x440 [ 1529.572127] ? fget_raw+0x20/0x20 [ 1529.575591] ? __sb_end_write+0xac/0xe0 [ 1529.579574] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1529.585116] ? fput+0x130/0x1a0 [ 1529.588405] ? ksys_write+0x1ae/0x260 [ 1529.592495] ? security_file_ioctl+0x94/0xc0 [ 1529.596918] ksys_ioctl+0xa9/0xd0 [ 1529.600386] __x64_sys_ioctl+0x73/0xb0 [ 1529.604283] do_syscall_64+0x1b9/0x820 [ 1529.608190] ? syscall_slow_exit_work+0x500/0x500 [ 1529.613040] ? syscall_return_slowpath+0x5e0/0x5e0 [ 1529.617977] ? syscall_return_slowpath+0x31d/0x5e0 [ 1529.622918] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe [ 1529.628294] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1529.633151] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1529.638345] RIP: 0033:0x455a79 [ 1529.641618] Code: 1d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1529.661471] RSP: 002b:00007f420d477c68 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1529.669198] RAX: ffffffffffffffda RBX: 00007f420d4786d4 RCX: 0000000000455a79 [ 1529.676471] RDX: 0000000000000000 RSI: 0000000000004c80 RDI: 0000000000000016 [ 1529.683760] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 1529.691043] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000017 [ 1529.698319] R13: 00000000004bdfb1 R14: 00000000004ccab0 R15: 000000000000002c 03:54:51 executing program 2: r0 = syz_open_dev$sndseq(&(0x7f0000dcc000)='/dev/snd/seq\x00', 0x0, 0x2) read(r0, &(0x7f0000fb6000)=""/28, 0x3f0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000418f50)={{0x80}, "0a4ceaa05d9a00000000000000039b3fd4cec307e8ef3d13eb790ec9c65abaf90d229db692542e5b78f8b29e0a27800f0000000000000009fb42f376589701a4", 0xa9824f69d1376637, 0x10800a}) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000000)={0xbf, @tick, 0x0, {}, 0x0, 0x0, 0x3}) write$binfmt_script(r0, &(0x7f0000000000)=ANY=[], 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f00000002c0)={{0x0, 0xffffffffffffffff}, 'port0\x00', 0x0, 0x0, 0x0, 0x0, 0x978}) openat$sequencer2(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer2\x00', 0x0, 0x0) 03:54:51 executing program 5: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer2\x00', 0x0, 0x0) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000040)="025cc83d6d345f8f762070") ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r0, 0x40085112, &(0x7f0000b18000)={{0xffffff93}, {0xffffffa0}, 0x0, 0x0, 0x0, [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4]}) 03:54:51 executing program 4: r0 = socket(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x38000000}, 0xc, &(0x7f0000000900)={&(0x7f0000000040)={0x14, 0x1e, 0x201}, 0x14}, 0x1}, 0x0) 03:54:51 executing program 7: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f000000d000)={0xa, 0x4e20}, 0x1c) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}, 0xb}, 0x1c) syz_emit_ethernet(0x3e, &(0x7f00000001c0)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @random="e829f650db0f", [], {@ipv6={0x86dd, {0x0, 0x6, "50a09c", 0x8, 0xffffff11, 0x0, @remote={0xfe, 0x80, [], 0xbb}, @local={0xfe, 0x80, [], 0xaa}, {[], @udp={0x0, 0x4e20, 0x8}}}}}}, &(0x7f0000000040)) syz_emit_ethernet(0x3e, &(0x7f0000000000)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], {@ipv6={0x86dd, {0x0, 0x6, "50a09c", 0x8, 0xffffff11, 0x0, @remote={0xfe, 0x80, [], 0xbb}, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x500000000000000], 0xaa}, {[], @udp={0x300, 0x4e20, 0x8}}}}}}, &(0x7f0000000040)) 03:54:51 executing program 3: ioctl$BLKDISCARD(0xffffffffffffffff, 0x1277, &(0x7f0000000180)) r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140)='/dev/snapshot\x00', 0x0, 0x0) fcntl$addseals(0xffffffffffffffff, 0x409, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f0000000000), &(0x7f00000000c0)=0x8) ioctl$EVIOCGLED(0xffffffffffffffff, 0x80404519, &(0x7f0000000580)=""/236) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x3c, 0x0) ioctl$EVIOCGKEYCODE_V2(0xffffffffffffffff, 0x80284504, &(0x7f00000003c0)=""/188) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) r2 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c82, 0x0) 03:54:51 executing program 0 (fault-call:10 fault-nth:45): r0 = syz_open_dev$vcsa(&(0x7f0000000100)='/dev/vcsa#\x00', 0x5, 0x101000) ioctl$BLKDISCARD(r0, 0x1277, &(0x7f0000000180)=0x5f) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140)='/dev/snapshot\x00', 0x0, 0x0) connect$nfc_llcp(r1, &(0x7f0000000300)={0x27, 0x0, 0x0, 0x6, 0x0, 0x0, "f44825e9da257dcd22512d531f545cf0bce08002f76d5e9bd3d1dcb3f649bf7ba49078f877ce09f903ed489ab0bbf0f088675b47312412edd6bd577062eb34", 0x1c}, 0x60) fcntl$addseals(0xffffffffffffffff, 0x409, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EVIOCGLED(r1, 0x80404519, &(0x7f0000000580)=""/236) ioctl$FS_IOC_SETFSLABEL(r2, 0x41009432, &(0x7f0000000480)="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") r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x3c, 0x0) ioctl$EVIOCGKEYCODE_V2(0xffffffffffffffff, 0x80284504, &(0x7f00000003c0)=""/188) ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x0) 03:54:51 executing program 6: 03:54:51 executing program 1: r0 = socket(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x15f}, 0xc, &(0x7f0000000900)={&(0x7f0000000040)={0x14, 0x1e, 0x201}, 0x14}, 0x1}, 0x0) 03:54:51 executing program 1: r0 = socket(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x162}, 0xc, &(0x7f0000000900)={&(0x7f0000000040)={0x14, 0x1e, 0x201}, 0x14}, 0x1}, 0x0) 03:54:51 executing program 6: 03:54:51 executing program 3: ioctl$BLKDISCARD(0xffffffffffffffff, 0x1277, &(0x7f0000000180)) r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000300)='/dev/snapshot\x00', 0x0, 0x0) ioctl$VHOST_SET_VRING_BUSYLOOP_TIMEOUT(r0, 0x4008af23, &(0x7f0000000140)={0x3, 0x80000000}) fcntl$addseals(0xffffffffffffffff, 0x409, 0x0) setsockopt$netlink_NETLINK_PKTINFO(r0, 0x10e, 0x3, &(0x7f0000000100)=0x6, 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f0000000000)={0x0}, &(0x7f00000000c0)=0x8) ioctl$EVIOCGLED(0xffffffffffffffff, 0x80404519, &(0x7f0000000580)=""/236) ioctl$EVIOCGLED(r0, 0x80404519, &(0x7f00000001c0)=""/231) getsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(r0, 0x84, 0x72, &(0x7f0000000040)={r1, 0x3b63}, &(0x7f0000000080)=0xc) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x3c, 0x0) ioctl$EVIOCGKEYCODE_V2(0xffffffffffffffff, 0x80284504, &(0x7f00000003c0)=""/188) ioctl$LOOP_CTL_GET_FREE(r2, 0x4c82) r3 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r3) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c82, 0x0) 03:54:51 executing program 4: r0 = socket(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x194}, 0xc, &(0x7f0000000900)={&(0x7f0000000040)={0x14, 0x1e, 0x201}, 0x14}, 0x1}, 0x0) 03:54:51 executing program 5: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer2\x00', 0x0, 0x0) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000040)="025cc83d6d345f8f762070") ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r0, 0x40085112, &(0x7f0000b18000)={{0xffffff93}, {0xffffffa0}, 0x0, 0x0, 0x0, [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8]}) 03:54:51 executing program 7: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f000000d000)={0xa, 0x4e20}, 0x1c) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}, 0xb}, 0x1c) syz_emit_ethernet(0x3e, &(0x7f00000001c0)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @random="e829f650db0f", [], {@ipv6={0x86dd, {0x0, 0x6, "50a09c", 0x8, 0xffffff11, 0x0, @remote={0xfe, 0x80, [], 0xbb}, @local={0xfe, 0x80, [], 0xaa}, {[], @udp={0x0, 0x4e20, 0x8}}}}}}, &(0x7f0000000040)) syz_emit_ethernet(0x3e, &(0x7f0000000000)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], {@ipv6={0x86dd, {0x0, 0x6, "50a09c", 0x8, 0xffffff11, 0x0, @remote={0xfe, 0x80, [], 0xbb}, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8847000000000000], 0xaa}, {[], @udp={0x300, 0x4e20, 0x8}}}}}}, &(0x7f0000000040)) [ 1530.430181] FAULT_INJECTION: forcing a failure. [ 1530.430181] name failslab, interval 1, probability 0, space 0, times 0 [ 1530.442067] CPU: 1 PID: 7190 Comm: syz-executor0 Not tainted 4.18.0-rc4+ #144 [ 1530.449368] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1530.458731] Call Trace: [ 1530.461338] dump_stack+0x1c9/0x2b4 [ 1530.464977] ? dump_stack_print_info.cold.2+0x52/0x52 [ 1530.470183] ? finish_task_switch+0x1d3/0x870 [ 1530.474720] ? finish_task_switch+0x18a/0x870 [ 1530.479256] should_fail.cold.4+0xa/0x1a [ 1530.483360] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 1530.488484] ? __schedule+0x884/0x1ed0 [ 1530.492555] ? do_raw_spin_trylock+0x1c0/0x1c0 [ 1530.497168] ? __sched_text_start+0x8/0x8 [ 1530.501331] ? find_held_lock+0x36/0x1c0 [ 1530.505500] ? __lock_is_held+0xb5/0x140 [ 1530.509620] ? check_same_owner+0x340/0x340 [ 1530.513958] ? __debug_object_init+0x581/0x12e0 [ 1530.518643] __should_failslab+0x124/0x180 [ 1530.522893] should_failslab+0x9/0x14 [ 1530.526728] kmem_cache_alloc_trace+0x2cb/0x780 [ 1530.531415] ? graph_lock+0x170/0x170 [ 1530.535236] device_create_groups_vargs+0xa7/0x270 [ 1530.540199] device_create_vargs+0x46/0x60 [ 1530.544457] bdi_register_va.part.11+0xc3/0x9c0 [ 1530.549139] ? __lockdep_init_map+0x105/0x590 [ 1530.553640] ? cgwb_kill+0x640/0x640 [ 1530.557362] ? lockdep_init_map+0x9/0x10 [ 1530.561430] ? __init_waitqueue_head+0x9e/0x150 [ 1530.566135] ? init_wait_entry+0x1c0/0x1c0 [ 1530.570382] ? __lockdep_init_map+0x105/0x590 [ 1530.574890] ? pm_runtime_init+0x459/0x560 [ 1530.579131] ? update_pm_runtime_accounting+0x1b0/0x1b0 [ 1530.584518] bdi_register+0x111/0x130 [ 1530.588353] ? bdi_register_va+0x80/0x80 [ 1530.592432] ? graph_lock+0x170/0x170 [ 1530.596253] bdi_register_owner+0x5e/0x100 [ 1530.600507] __device_add_disk+0xf27/0x1360 [ 1530.604850] ? blk_alloc_devt+0x2a0/0x2a0 [ 1530.609005] ? vsnprintf+0x20d/0x1b60 [ 1530.612817] ? pointer+0x950/0x950 [ 1530.616364] ? __mutex_init+0x1f7/0x290 [ 1530.620367] ? __ia32_sys_membarrier+0x150/0x150 [ 1530.625143] ? sprintf+0xb0/0xe0 [ 1530.628518] ? scnprintf+0x130/0x130 [ 1530.632263] ? __lockdep_init_map+0x105/0x590 [ 1530.636775] device_add_disk+0x22/0x30 [ 1530.640671] loop_add+0x71d/0x9d0 [ 1530.644130] ? loop_queue_rq+0x660/0x660 [ 1530.648205] loop_control_ioctl+0x199/0x540 [ 1530.652537] ? loop_add+0x9d0/0x9d0 [ 1530.656174] ? expand_files.part.8+0x9c0/0x9c0 [ 1530.660780] ? kasan_check_write+0x14/0x20 [ 1530.665029] ? __mutex_unlock_slowpath+0x197/0x8c0 [ 1530.669977] ? loop_add+0x9d0/0x9d0 [ 1530.673619] do_vfs_ioctl+0x1de/0x1720 [ 1530.677529] ? __lock_is_held+0xb5/0x140 [ 1530.681597] ? ioctl_preallocate+0x300/0x300 [ 1530.686020] ? __fget_light+0x2f7/0x440 [ 1530.690007] ? fget_raw+0x20/0x20 [ 1530.693486] ? __sb_end_write+0xac/0xe0 [ 1530.697476] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1530.703033] ? fput+0x130/0x1a0 [ 1530.706340] ? ksys_write+0x1ae/0x260 [ 1530.710177] ? security_file_ioctl+0x94/0xc0 [ 1530.714953] ksys_ioctl+0xa9/0xd0 [ 1530.718533] __x64_sys_ioctl+0x73/0xb0 [ 1530.722478] do_syscall_64+0x1b9/0x820 [ 1530.726391] ? syscall_slow_exit_work+0x500/0x500 [ 1530.731313] ? syscall_return_slowpath+0x5e0/0x5e0 [ 1530.736279] ? syscall_return_slowpath+0x31d/0x5e0 [ 1530.741242] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1530.746815] ? retint_user+0x18/0x18 [ 1530.750657] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1530.755733] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1530.760976] RIP: 0033:0x455a79 [ 1530.764256] Code: 1d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1530.783637] RSP: 002b:00007f420d477c68 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1530.791373] RAX: ffffffffffffffda RBX: 00007f420d4786d4 RCX: 0000000000455a79 [ 1530.798676] RDX: 0000000000000000 RSI: 0000000000004c80 RDI: 0000000000000015 [ 1530.805964] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 1530.813346] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000016 [ 1530.822104] R13: 00000000004bdfb1 R14: 00000000004ccab0 R15: 000000000000002d [ 1530.829885] WARNING: CPU: 1 PID: 7190 at block/genhd.c:697 __device_add_disk+0x106a/0x1360 [ 1530.838841] Kernel panic - not syncing: panic_on_warn set ... [ 1530.838841] [ 1530.846225] CPU: 1 PID: 7190 Comm: syz-executor0 Not tainted 4.18.0-rc4+ #144 [ 1530.853501] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1530.862853] Call Trace: [ 1530.865461] dump_stack+0x1c9/0x2b4 [ 1530.869101] ? dump_stack_print_info.cold.2+0x52/0x52 [ 1530.874312] panic+0x238/0x4e7 [ 1530.877515] ? add_taint.cold.5+0x16/0x16 [ 1530.881697] ? __warn.cold.8+0x148/0x1ba [ 1530.885815] ? __device_add_disk+0x106a/0x1360 [ 1530.890519] __warn.cold.8+0x163/0x1ba [ 1530.894436] ? __device_add_disk+0x106a/0x1360 [ 1530.899046] report_bug+0x252/0x2d0 [ 1530.902712] do_error_trap+0x1fc/0x4d0 [ 1530.906646] ? math_error+0x3e0/0x3e0 [ 1530.910467] ? retint_kernel+0x10/0x10 [ 1530.914396] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 1530.919436] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1530.924217] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1530.929102] do_invalid_op+0x1b/0x20 [ 1530.933464] invalid_op+0x14/0x20 [ 1530.936939] RIP: 0010:__device_add_disk+0x106a/0x1360 [ 1530.942136] Code: ff ff 48 89 df e8 a6 d3 6a fe e9 c9 f0 ff ff e8 1c d4 6a fe e9 83 f4 ff ff e8 42 f9 2c fe 0f 0b e9 52 fb ff ff e8 36 f9 2c fe <0f> 0b e9 cb fe ff ff 4c 89 f7 e8 f7 d3 6a fe e9 0c f1 ff ff e8 2d [ 1530.961498] RSP: 0018:ffff88018727f888 EFLAGS: 00010246 [ 1530.966884] RAX: 0000000000040000 RBX: ffff8801cdbd3680 RCX: ffffc90001e1c000 [ 1530.974438] RDX: 0000000000040000 RSI: ffffffff834f126a RDI: 0000000000000005 [ 1530.981724] RBP: ffff88018727fa58 R08: ffff88019bb2a580 R09: ffffed003b5e46d6 [ 1530.989116] R10: ffffed003b5e46d6 R11: ffff8801daf236b3 R12: 00000000fffffff4 [ 1530.996581] R13: ffff88018727fa30 R14: ffff8801cdbd3be0 R15: ffff8801cdbd3684 [ 1531.004337] ? __device_add_disk+0x106a/0x1360 [ 1531.008958] ? __device_add_disk+0x106a/0x1360 [ 1531.013664] ? blk_alloc_devt+0x2a0/0x2a0 [ 1531.017862] ? vsnprintf+0x20d/0x1b60 [ 1531.021725] ? pointer+0x950/0x950 [ 1531.025291] ? __mutex_init+0x1f7/0x290 03:54:52 executing program 1: r0 = socket(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x164}, 0xc, &(0x7f0000000900)={&(0x7f0000000040)={0x14, 0x1e, 0x201}, 0x14}, 0x1}, 0x0) [ 1531.029290] ? __ia32_sys_membarrier+0x150/0x150 [ 1531.034097] ? sprintf+0xb0/0xe0 [ 1531.037502] ? scnprintf+0x130/0x130 [ 1531.041335] ? __lockdep_init_map+0x105/0x590 [ 1531.045865] device_add_disk+0x22/0x30 [ 1531.049892] loop_add+0x71d/0x9d0 [ 1531.053371] ? loop_queue_rq+0x660/0x660 [ 1531.057474] loop_control_ioctl+0x199/0x540 [ 1531.061906] ? loop_add+0x9d0/0x9d0 [ 1531.065559] ? expand_files.part.8+0x9c0/0x9c0 [ 1531.070168] ? kasan_check_write+0x14/0x20 [ 1531.074455] ? __mutex_unlock_slowpath+0x197/0x8c0 [ 1531.079505] ? loop_add+0x9d0/0x9d0 [ 1531.083201] do_vfs_ioctl+0x1de/0x1720 [ 1531.087140] ? __lock_is_held+0xb5/0x140 [ 1531.091236] ? ioctl_preallocate+0x300/0x300 [ 1531.095671] ? __fget_light+0x2f7/0x440 [ 1531.099676] ? fget_raw+0x20/0x20 [ 1531.103162] ? __sb_end_write+0xac/0xe0 [ 1531.107177] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1531.112742] ? fput+0x130/0x1a0 [ 1531.116039] ? ksys_write+0x1ae/0x260 [ 1531.119854] ? security_file_ioctl+0x94/0xc0 [ 1531.124275] ksys_ioctl+0xa9/0xd0 [ 1531.127762] __x64_sys_ioctl+0x73/0xb0 [ 1531.131667] do_syscall_64+0x1b9/0x820 [ 1531.135592] ? syscall_slow_exit_work+0x500/0x500 [ 1531.141435] ? syscall_return_slowpath+0x5e0/0x5e0 [ 1531.146364] ? syscall_return_slowpath+0x31d/0x5e0 [ 1531.151288] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1531.156825] ? retint_user+0x18/0x18 [ 1531.160538] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1531.165382] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1531.170571] RIP: 0033:0x455a79 [ 1531.173746] Code: 1d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1531.193101] RSP: 002b:00007f420d477c68 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1531.200806] RAX: ffffffffffffffda RBX: 00007f420d4786d4 RCX: 0000000000455a79 [ 1531.208151] RDX: 0000000000000000 RSI: 0000000000004c80 RDI: 0000000000000015 [ 1531.215512] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 1531.222864] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000016 [ 1531.230914] R13: 00000000004bdfb1 R14: 00000000004ccab0 R15: 000000000000002d [ 1531.238994] Dumping ftrace buffer: [ 1531.242813] (ftrace buffer empty) [ 1531.246517] Kernel Offset: disabled [ 1531.250138] Rebooting in 86400 seconds..