AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAwBd24FgAAAAAQJi/dRodGwAAAAAAAAAAAAAAAAAwVQAAAP//TUvU9g==") r0 = open(&(0x7f0000002000)='./bus\x00', 0x143142, 0x0) write$UHID_INPUT(r0, &(0x7f0000002040)={0x8, {"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", 0x1000}}, 0x1006) r1 = syz_open_dev$evdev(&(0x7f00000000c0), 0x0, 0x862b01) write$char_usb(r1, &(0x7f0000000040)="e2", 0x1770) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000051d80)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000051f80)={0x5, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r3}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r3}, {r2}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r2}], 0x0, "2df52d27cb58b1"}) ioctl$BTRFS_IOC_INO_LOOKUP(r1, 0xd0009412, &(0x7f00000044c0)={r2, 0x100}) ftruncate(r0, 0x7) r4 = openat(0xffffffffffffff9c, &(0x7f0000004400)='./bus\x00', 0x1c1002, 0x0) write$binfmt_misc(r4, &(0x7f0000000180)={'syz1'}, 0x4) 16:34:48 executing program 5: r0 = request_key(0x0, 0x0, 0x0, 0xfffffffffffffffd) r1 = add_key$keyring(0x0, &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000740)=@filename='./file0\x00', &(0x7f0000000780)='./file0\x00', &(0x7f0000000840)='gadgetfs\x00', 0x10, &(0x7f0000000880)='keyring\x00') perf_event_open(&(0x7f00000007c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x12c00, 0x0, 0xe5e}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) writev(0xffffffffffffffff, 0x0, 0x0) r2 = add_key(&(0x7f0000000240)='big_key\x00', &(0x7f0000000280)={'syz', 0x3}, &(0x7f0000019a40)="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", 0x5bd, 0xfffffffffffffffd) keyctl$read(0xb, r2, &(0x7f0000000a40)=""/102400, 0x19000) keyctl$search(0xa, r2, &(0x7f00000008c0)='keyring\x00', &(0x7f0000000900)={'syz', 0x1}, 0xfffffffffffffffd) request_key(&(0x7f00000006c0)='dns_resolver\x00', &(0x7f0000000700)={'syz', 0x3}, &(0x7f0000000940)='\x00', 0xfffffffffffffffd) r3 = add_key(&(0x7f0000000380)='id_resolver\x00', &(0x7f0000000400)={'syz', 0x3}, &(0x7f0000000440)="e09e6dda135ac7c467011f", 0xb, r0) keyctl$search(0xa, r1, 0x0, &(0x7f0000000340)={'syz', 0x1}, r3) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000140)='cpuset\x00', 0x0, 0x0) add_key$keyring(&(0x7f0000000100), &(0x7f0000000180)={'syz', 0x0}, 0x0, 0x0, r0) r4 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r5 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) request_key(&(0x7f0000000580)='logon\x00', &(0x7f00000005c0)={'syz', 0x0}, &(0x7f0000000600)='\x1f-)\x00', 0xfffffffffffffff9) add_key$fscrypt_provisioning(&(0x7f0000000480), &(0x7f00000004c0)={'syz', 0x0}, &(0x7f0000000640)=ANY=[], 0x48, r0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = openat$cgroup_int(r4, &(0x7f00000001c0)='cpuset.sched_load_balance\x00', 0x2, 0x0) dup3(r7, r4, 0x0) add_key$keyring(&(0x7f0000000540), &(0x7f0000000640)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffc) r8 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000980), 0x200000, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r5, 0x81f8943c, &(0x7f000001a000)={0x0, ""/256, 0x0, 0x0, 0x0, 0x0, ""/16, ""/16, ""/16, 0x0}) ioctl$BTRFS_IOC_SUBVOL_CREATE_V2(r6, 0x50009418, &(0x7f000001a200)={{r8}, r9, 0x2, @inherit={0x58, &(0x7f00000009c0)={0x1, 0x2, 0x8, 0x7, {0x14, 0x1000, 0x5, 0x7, 0x4}, [0xffff, 0x3]}}, @subvolid=0x4}) writev(r4, &(0x7f0000000300)=[{&(0x7f00000000c0)='0', 0x1}, {&(0x7f00000003c0)='7', 0x1}], 0x2) [ 2004.584295] hfs: invalid gid -1 [ 2004.626418] hfs: unable to parse mount options [ 2004.661641] new mount options do not match the existing superblock, will be ignored [ 2004.675858] hfs: uid requires an argument [ 2004.695150] hfs: unable to parse mount options 16:34:48 executing program 1: syz_mount_image$hfs(&(0x7f0000000240), &(0x7f0000000380)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x3, &(0x7f0000000780)=ANY=[@ANYBLOB='quiet,gid=', @ANYRESHEX, @ANYBLOB="2c2a7270653d7614866b2c75693df589299908000000450000005d38ff0c0071446a0c48dba349ba347528523876dc8d7918ecea1024ba9669ff19a9ab5e27062b1dae8d8c0eb880008164ed9d8093fdc35f282dee56df9531b6e0c94b43c314af69146a70075499da5e7f927d3c672787e3d33a6071ff2c1483a1a7cfb34131bfee72f86068d0966d", @ANYRESHEX, @ANYBLOB=',codepage=ascii,rootcontext=sysadm_u,\x00'], 0x1, 0x235, &(0x7f0000000000)="$eJzs3U9rE0EYx/HfTKJGW+r2jwgeqwVP0upFvAiSF+FJ1CZCMVTQCupJPIsvwLtvwRfhSXwDevLkC8htZZ6dNNuYzaa1ydD2+4GEbXeenWc6u515AqUCcGY9aP/8cud3eDmpoYake5KX1JKakq7oauv17t7OXq/bmXShhkWEl1MR6f5ps73bHRca4iwiysJXTS2Wv4fZyPM8/5U6CSRnT/8YXroQn04735p7ZrPxPnUCibm++nqjpdR5AADSiuu/j+v8Yty/ey9txGX/VK3//dQJJFZa/63Kyl2Y38t2aljvWQkXzvtBlXiUvs6ruLMObDBdXVVpufiLz3Z63VvbL3odrw+6H5Wardl7p7h1B2qyXR9Tm05w9LEv2BjOhTHcrsh/9Xh7rOe+ue/ukcv0WZ39/V8zd2GabKaykZkq8t+svqKNMitaVYxy2Tq5FnuIakbZGl+RaHBHLevgBwRZXZ4WtTISVYxuqyZqdSRKxZzWRK2N9jW8m6sjZ819cg/duv7oq9ql/b8PP+0NTfNkhjbWMt4ZE8fTtJbZFIn5Qw0D/+ejnuqull69fff8Sa/XfckBBxxwsH+Q+hcU5mE46akzQSJh3+WK+q9Ur2xaiRTesgn79Lzu4qUrblXUBiv2fulQFdxCdQU3bc11/aZ0Y/oes5jnKeHa+qHHfP4PAAAAAAAAAAAAAAAAAABw0szjzwlSjxEAAAAAAAAAAAAAAAAAAAAAgJOO//8LnF1/AwAA//8U8oIW") 16:34:48 executing program 2: r0 = request_key(0x0, 0x0, 0x0, 0xfffffffffffffffd) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) perf_event_open(&(0x7f00000007c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0xe5e}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) keyctl$read(0xb, 0x0, &(0x7f0000000a40)=""/102400, 0x19000) keyctl$search(0xa, 0x0, &(0x7f00000008c0)='keyring\x00', &(0x7f0000000900)={'syz', 0x1}, 0xfffffffffffffffd) request_key(&(0x7f00000006c0)='dns_resolver\x00', &(0x7f0000000700)={'syz', 0x3}, &(0x7f0000000940)='\x00', 0xfffffffffffffffd) r1 = add_key(0x0, &(0x7f0000000400)={'syz', 0x3}, &(0x7f0000000440), 0x0, r0) keyctl$search(0xa, 0x0, 0x0, &(0x7f0000000340)={'syz', 0x1}, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000140)='cpuset\x00', 0x0, 0x0) add_key$keyring(&(0x7f0000000100), 0x0, 0x0, 0x0, r0) r2 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) request_key(0x0, &(0x7f00000005c0)={'syz', 0x0}, 0x0, 0xfffffffffffffff9) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = openat$cgroup_int(r2, &(0x7f00000001c0)='cpuset.sched_load_balance\x00', 0x2, 0x0) dup3(r4, r2, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x200000, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f000001a000)={0x0, ""/256, 0x0, 0x0, 0x0, 0x0, ""/16, ""/16, ""/16, 0x0}) ioctl$BTRFS_IOC_SUBVOL_CREATE_V2(r3, 0x50009418, &(0x7f000001a200)={{}, r5, 0x2, @inherit={0x58, &(0x7f00000009c0)={0x1, 0x2, 0x8, 0x0, {0x0, 0x0, 0x0, 0x0, 0x4}, [0x0, 0x0]}}, @subvolid}) ioctl$BTRFS_IOC_BALANCE(r3, 0x5000940c, 0x0) keyctl$search(0xa, r1, &(0x7f0000000200)='keyring\x00', &(0x7f0000000500)={'syz', 0x0}, 0x0) writev(r2, &(0x7f0000000300)=[{&(0x7f00000000c0)='0', 0x1}, {&(0x7f00000003c0)='7', 0x1}], 0x2) 16:34:48 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async, rerun: 64) r0 = socket(0x10, 0x2, 0x0) (rerun: 64) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000140)={0x0, 0x0}, &(0x7f0000cab000)=0x6e) syz_mount_image$hfs(&(0x7f0000000240), &(0x7f0000000380)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x3, &(0x7f0000000280)=ANY=[@ANYBLOB="71756965742c706172743d3078303030303030303030303031303030312c747970653d7614866b2c7569643d", @ANYRESHEX=r1, @ANYBLOB="2c633192ed5bf7173f3194697463696927d66b697463646d5ff52c00a58a82fdc98b9d58ab83dfc43a9837b20c3fbc821a859c05975b7d9101000000000000000000000d01000000000000000200"], 0x1, 0x235, &(0x7f0000000000)="$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") [ 2004.781481] new mount options do not match the existing superblock, will be ignored 16:34:49 executing program 4: r0 = request_key(0x0, 0x0, 0x0, 0xfffffffffffffffd) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) r1 = add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000780)='./file0\x00', &(0x7f0000000840)='gadgetfs\x00', 0x0, &(0x7f0000000880)='keyring\x00') perf_event_open(&(0x7f00000007c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x12c00, 0x0, 0xe5e}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) writev(0xffffffffffffffff, 0x0, 0x0) keyctl$read(0xb, 0x0, &(0x7f0000000a40)=""/102400, 0x19000) keyctl$search(0xa, 0x0, 0x0, 0x0, 0xfffffffffffffffd) request_key(&(0x7f00000006c0)='dns_resolver\x00', &(0x7f0000000700)={'syz', 0x3}, &(0x7f0000000940)='\x00', 0xfffffffffffffffd) r2 = add_key(0x0, &(0x7f0000000400)={'syz', 0x3}, &(0x7f0000000440)="e09e6dda135ac7c467011f", 0xb, r0) keyctl$search(0xa, r1, 0x0, &(0x7f0000000340)={'syz', 0x1}, r2) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000140)='cpuset\x00', 0x0, 0x0) add_key$keyring(&(0x7f0000000100), &(0x7f0000000180)={'syz', 0x0}, 0x0, 0x0, r0) r3 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r4 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) open(&(0x7f00000002c0)='./file0\x00', 0x98d00, 0x8) request_key(&(0x7f0000000580)='logon\x00', &(0x7f00000005c0)={'syz', 0x0}, &(0x7f0000000600)='\x1f-)\x00', 0xfffffffffffffff9) write$rfkill(r4, &(0x7f0000000040)={0x0, 0x0, 0x3}, 0x8) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = openat$cgroup_int(r3, &(0x7f00000001c0)='cpuset.sched_load_balance\x00', 0x2, 0x0) dup3(r6, r3, 0x0) r7 = add_key$keyring(&(0x7f0000000540), &(0x7f0000000640)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffc) r8 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000980), 0x200000, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r4, 0x81f8943c, &(0x7f000001a000)={0x0, ""/256, 0x0, 0x0, 0x0, 0x0, ""/16, ""/16, ""/16, 0x0}) ioctl$BTRFS_IOC_SUBVOL_CREATE_V2(r5, 0x50009418, &(0x7f000001a200)={{r8}, r9, 0x2, @inherit={0x58, &(0x7f00000009c0)={0x1, 0x2, 0x8, 0x7, {0x14, 0x1000, 0x5, 0x7, 0x4}, [0xffff, 0x3]}}, @subvolid=0x4}) ioctl$BTRFS_IOC_BALANCE(r5, 0x5000940c, 0x0) keyctl$search(0xa, r2, &(0x7f0000000200)='keyring\x00', &(0x7f0000000500)={'syz', 0x0}, r7) writev(r3, &(0x7f0000000300)=[{&(0x7f00000000c0)='0', 0x1}, {&(0x7f00000003c0)='7', 0x1}], 0x2) 16:34:49 executing program 5: r0 = request_key(0x0, 0x0, 0x0, 0xfffffffffffffffd) r1 = add_key$keyring(0x0, &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000740)=@filename='./file0\x00', &(0x7f0000000780)='./file0\x00', &(0x7f0000000840)='gadgetfs\x00', 0x10, &(0x7f0000000880)='keyring\x00') perf_event_open(&(0x7f00000007c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x12c00, 0x0, 0xe5e}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) writev(0xffffffffffffffff, 0x0, 0x0) r2 = add_key(&(0x7f0000000240)='big_key\x00', &(0x7f0000000280)={'syz', 0x3}, &(0x7f0000019a40)="4195738ac28ccd83aa93c4ecacdaca3d34104be4cc5531c4091facf7f777321e84e49e039122a2d1cf7fea6a02aac8944c27ba038156bc10c0f7a6b26fbf382f67959d856600881f0e692c60f12ace775aab8d775dc2586454918a0db1811f5e8086f1a9805166c870b8387d380d5115af5841dad21f629e05f4b51e362c46b58a7dc2855c5189bff60d02c05ba67c297aa0ad05b93b1ee2fffae13fe5764d4e2a214e15093841b1551d518a669fa94e8918bfdd6573d5c0275a9b91ddb843775f78574891e03697f6ca290be6599b671093898a82e7905ed7c7fd8e8b422ebf12e5b543885596fc5c305d497407ffe73bd543f79c983f0807ae7e13fb5053fd7a07dddf8ec739418b59d67219f008f540161cec3bfd1b3097aad497248b221d572a9eb1bad6d921fcdcfdfacf8d1e392635168747056ec8a3fc45b3027293a517d50ea789294f132f2392919dc81ba5eb02e27e116cc300000000b6c0e39688425a3cb17d35f4b1eec0a37193f233c6655c6f40c09b4ea04c8880a431a8274127d56c3c8cab73a5fcf2b604b83658344e323eeedb0b283b0b3616236e904a42fed9fc8f4c131b047bfd5d7586e6a28032a4584fd5933472ce49dfdc99976166bb37eb1679b22249a222ffab17948dd6cc6f23f42ecd32a980ab8fc7c7d2da1a91f1db1187066c144bcbdb46240b7ef7ed28da4a358295b6104e4c60b09654e79f766e19e44174e94fa41d358d3dd901c060a06a388727be1092a37c0015695b1363ed018e724947983aa6b5974daf6388547cdacbd44a1282c3b9130cbf9536c29a523980b9e4328d1a7c0de8b636d7dfdee36434125948b1d802d5d143645c3a5f8da50adeef6e4f715361908a20cb998d3e0907aef9fdd19bb79be8c510b8aa04600163636c1d1f36f3834ffa3c7369e1d8ed9348bc339da2a525c4f165c0caebb7a4ee632a37a43897084e3c07a5ed8b505a51a4777095060b0ff6a6442206244dd9a13b5ba52b07c718e9eaad10befd12be35dc50283d584035d75e4917548ff58045b88d29b6826ceb6d44fb54ba3ef7944da6e86c0f2d0bc0bd725aa9193b3de4837634ead361d9b2ff5ae4de005f53d48cba029b43eb35fbedd0b5397918a9324b6e1f1d88399d8ad69b7d79e89ded6fe81fd1200f95c831f8c60dc1483e97052f61d0a643df0c2e1b0ba7d00b0692efd1bfc1ece10c2e785e3cb3b0dfbdbd722b6e53e5a2884b1cc5d939a572564bc8a2260e8718230878edb3a877f5c585f4373ef8e0e1cff5dacf96862906ff37eec18ba706d22b101965eaf5f5e29f544977896117e25ceb572f3443eddf9651c2ac69c911b21fd69e59ee57ebe4c549ff2a3dcd904656663039789f022a6caa7f76640e75efdba82dabacf8c0112bd4e62a3a9e69a9824c1af45cf86b307d9749937dd08b6ef49860cda5da7bb886f92db7cd43a869aa646a6da291a75ff28c4d728b1377b8e80233b33e724a60c0a015ec75cd86af04a4bd43964d8f7ba781a99d0cd7ff7e189fc91801655cb1b60e6bc3af747655341deceadbed3d76bdfae92389cc87c417e0f58f3fbcc56ff347467a20773146a81090ff42bbb5383d74108028f5fa532c647746054c312e2e4c085f58d93bec6da7c2bfd99fc59c1631cc71110acc2bf352b994e2a246be3cc1d240fa0c60eb04b92a9673d2ac2bba7f322ddbbd74712b0ec459050586523bd0b0505174a701206e47f2bb7fe20caf5ed73d33447b89432802e7d4606512e217aedf78c871e10cfbdf202efbf3fd8495b6be18cde726dc1fefc01921e9d1f15c8301376c33b5a698d0f7d5f317835d74857e121fe820d93f6b757c9938ec81f9b19a4b0d4ed35d1309fbcb285cf7717e9e27aaaba9d7d742fcfd786eacd993fb119e1d52908ca7ce2135046fa95805704c6258fd1b5fc1434af7ab99609820d73627080d43bcaeeb42ce423e17aa4df3a6994ead3133e2ecfbc6fa308c6b71b78cbab273641970b49e15d0dbe7aea716eaf6cf40f90d0d7d3d8bf1d165d25d5f6f6376416b9dd13731c5c2fdadee8e48c76430cccb21d8e6c659", 0x5bd, 0xfffffffffffffffd) keyctl$read(0xb, r2, &(0x7f0000000a40)=""/102400, 0x19000) keyctl$search(0xa, r2, &(0x7f00000008c0)='keyring\x00', &(0x7f0000000900)={'syz', 0x1}, 0xfffffffffffffffd) request_key(&(0x7f00000006c0)='dns_resolver\x00', &(0x7f0000000700)={'syz', 0x3}, &(0x7f0000000940)='\x00', 0xfffffffffffffffd) r3 = add_key(&(0x7f0000000380)='id_resolver\x00', &(0x7f0000000400)={'syz', 0x3}, &(0x7f0000000440)="e09e6dda135ac7c467011f", 0xb, r0) keyctl$search(0xa, r1, 0x0, &(0x7f0000000340)={'syz', 0x1}, r3) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000140)='cpuset\x00', 0x0, 0x0) add_key$keyring(&(0x7f0000000100), &(0x7f0000000180)={'syz', 0x0}, 0x0, 0x0, r0) r4 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r5 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) request_key(&(0x7f0000000580)='logon\x00', &(0x7f00000005c0)={'syz', 0x0}, &(0x7f0000000600)='\x1f-)\x00', 0xfffffffffffffff9) add_key$fscrypt_provisioning(&(0x7f0000000480), &(0x7f00000004c0)={'syz', 0x0}, &(0x7f0000000640)=ANY=[], 0x48, r0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = openat$cgroup_int(r4, &(0x7f00000001c0)='cpuset.sched_load_balance\x00', 0x2, 0x0) dup3(r7, r4, 0x0) add_key$keyring(&(0x7f0000000540), &(0x7f0000000640)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffc) r8 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000980), 0x200000, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r5, 0x81f8943c, &(0x7f000001a000)={0x0, ""/256, 0x0, 0x0, 0x0, 0x0, ""/16, ""/16, ""/16, 0x0}) ioctl$BTRFS_IOC_SUBVOL_CREATE_V2(r6, 0x50009418, &(0x7f000001a200)={{r8}, r9, 0x2, @inherit={0x58, &(0x7f00000009c0)={0x1, 0x2, 0x8, 0x7, {0x14, 0x1000, 0x5, 0x7, 0x4}, [0xffff, 0x3]}}, @subvolid=0x4}) writev(r4, &(0x7f0000000300)=[{&(0x7f00000000c0)='0', 0x1}, {&(0x7f00000003c0)='7', 0x1}], 0x2) [ 2004.936265] new mount options do not match the existing superblock, will be ignored [ 2004.979781] hfs: invalid gid -1 [ 2004.995162] hfs: unable to parse mount options [ 2005.025282] hfs: uid requires an argument 16:34:49 executing program 2: r0 = request_key(0x0, 0x0, 0x0, 0xfffffffffffffffd) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) perf_event_open(&(0x7f00000007c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0xe5e}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) keyctl$read(0xb, 0x0, &(0x7f0000000a40)=""/102400, 0x19000) keyctl$search(0xa, 0x0, &(0x7f00000008c0)='keyring\x00', &(0x7f0000000900)={'syz', 0x1}, 0xfffffffffffffffd) request_key(&(0x7f00000006c0)='dns_resolver\x00', &(0x7f0000000700)={'syz', 0x3}, &(0x7f0000000940)='\x00', 0xfffffffffffffffd) r1 = add_key(0x0, &(0x7f0000000400)={'syz', 0x3}, &(0x7f0000000440), 0x0, r0) keyctl$search(0xa, 0x0, 0x0, &(0x7f0000000340)={'syz', 0x1}, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000140)='cpuset\x00', 0x0, 0x0) add_key$keyring(&(0x7f0000000100), 0x0, 0x0, 0x0, r0) r2 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) request_key(0x0, &(0x7f00000005c0)={'syz', 0x0}, 0x0, 0xfffffffffffffff9) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = openat$cgroup_int(r2, &(0x7f00000001c0)='cpuset.sched_load_balance\x00', 0x2, 0x0) dup3(r4, r2, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x200000, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f000001a000)={0x0, ""/256, 0x0, 0x0, 0x0, 0x0, ""/16, ""/16, ""/16, 0x0}) ioctl$BTRFS_IOC_SUBVOL_CREATE_V2(r3, 0x50009418, &(0x7f000001a200)={{}, r5, 0x2, @inherit={0x58, &(0x7f00000009c0)={0x1, 0x2, 0x8, 0x0, {0x0, 0x0, 0x0, 0x0, 0x4}, [0x0, 0x0]}}, @subvolid}) ioctl$BTRFS_IOC_BALANCE(r3, 0x5000940c, 0x0) keyctl$search(0xa, r1, &(0x7f0000000200)='keyring\x00', &(0x7f0000000500)={'syz', 0x0}, 0x0) writev(r2, &(0x7f0000000300)=[{&(0x7f00000000c0)='0', 0x1}, {&(0x7f00000003c0)='7', 0x1}], 0x2) 16:34:49 executing program 1: syz_mount_image$hfs(&(0x7f0000000240), &(0x7f0000000380)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x3, &(0x7f0000000780)=ANY=[@ANYBLOB='quiet,gid=', @ANYRESHEX, @ANYBLOB="2c2a7270653d7614866b2c75693df589299908000000450000005d38ff0c0071446a0c48dba349ba347528523876dc8d7918ecea1024ba9669ff19a9ab5e27062b1dae8d8c0eb880008164ed9d8093fdc35f282dee56df9531b6e0c94b43c314af69146a70075499da5e7f927d3c672787e3d33a6071ff2c1483a1a7cfb34131bfee72f86068d0966d", @ANYRESHEX, @ANYBLOB=',codepage=ascii,rootcontext=sysadm_u,\x00'], 0x1, 0x235, &(0x7f0000000000)="$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") [ 2005.045957] hfs: unable to parse mount options [ 2005.082079] new mount options do not match the existing superblock, will be ignored 16:34:49 executing program 5: r0 = request_key(0x0, 0x0, 0x0, 0xfffffffffffffffd) r1 = add_key$keyring(0x0, &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000740)=@filename='./file0\x00', &(0x7f0000000780)='./file0\x00', &(0x7f0000000840)='gadgetfs\x00', 0x10, &(0x7f0000000880)='keyring\x00') perf_event_open(&(0x7f00000007c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x12c00, 0x0, 0xe5e}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) writev(0xffffffffffffffff, 0x0, 0x0) r2 = add_key(&(0x7f0000000240)='big_key\x00', &(0x7f0000000280)={'syz', 0x3}, &(0x7f0000019a40)="4195738ac28ccd83aa93c4ecacdaca3d34104be4cc5531c4091facf7f777321e84e49e039122a2d1cf7fea6a02aac8944c27ba038156bc10c0f7a6b26fbf382f67959d856600881f0e692c60f12ace775aab8d775dc2586454918a0db1811f5e8086f1a9805166c870b8387d380d5115af5841dad21f629e05f4b51e362c46b58a7dc2855c5189bff60d02c05ba67c297aa0ad05b93b1ee2fffae13fe5764d4e2a214e15093841b1551d518a669fa94e8918bfdd6573d5c0275a9b91ddb843775f78574891e03697f6ca290be6599b671093898a82e7905ed7c7fd8e8b422ebf12e5b543885596fc5c305d497407ffe73bd543f79c983f0807ae7e13fb5053fd7a07dddf8ec739418b59d67219f008f540161cec3bfd1b3097aad497248b221d572a9eb1bad6d921fcdcfdfacf8d1e392635168747056ec8a3fc45b3027293a517d50ea789294f132f2392919dc81ba5eb02e27e116cc300000000b6c0e39688425a3cb17d35f4b1eec0a37193f233c6655c6f40c09b4ea04c8880a431a8274127d56c3c8cab73a5fcf2b604b83658344e323eeedb0b283b0b3616236e904a42fed9fc8f4c131b047bfd5d7586e6a28032a4584fd5933472ce49dfdc99976166bb37eb1679b22249a222ffab17948dd6cc6f23f42ecd32a980ab8fc7c7d2da1a91f1db1187066c144bcbdb46240b7ef7ed28da4a358295b6104e4c60b09654e79f766e19e44174e94fa41d358d3dd901c060a06a388727be1092a37c0015695b1363ed018e724947983aa6b5974daf6388547cdacbd44a1282c3b9130cbf9536c29a523980b9e4328d1a7c0de8b636d7dfdee36434125948b1d802d5d143645c3a5f8da50adeef6e4f715361908a20cb998d3e0907aef9fdd19bb79be8c510b8aa04600163636c1d1f36f3834ffa3c7369e1d8ed9348bc339da2a525c4f165c0caebb7a4ee632a37a43897084e3c07a5ed8b505a51a4777095060b0ff6a6442206244dd9a13b5ba52b07c718e9eaad10befd12be35dc50283d584035d75e4917548ff58045b88d29b6826ceb6d44fb54ba3ef7944da6e86c0f2d0bc0bd725aa9193b3de4837634ead361d9b2ff5ae4de005f53d48cba029b43eb35fbedd0b5397918a9324b6e1f1d88399d8ad69b7d79e89ded6fe81fd1200f95c831f8c60dc1483e97052f61d0a643df0c2e1b0ba7d00b0692efd1bfc1ece10c2e785e3cb3b0dfbdbd722b6e53e5a2884b1cc5d939a572564bc8a2260e8718230878edb3a877f5c585f4373ef8e0e1cff5dacf96862906ff37eec18ba706d22b101965eaf5f5e29f544977896117e25ceb572f3443eddf9651c2ac69c911b21fd69e59ee57ebe4c549ff2a3dcd904656663039789f022a6caa7f76640e75efdba82dabacf8c0112bd4e62a3a9e69a9824c1af45cf86b307d9749937dd08b6ef49860cda5da7bb886f92db7cd43a869aa646a6da291a75ff28c4d728b1377b8e80233b33e724a60c0a015ec75cd86af04a4bd43964d8f7ba781a99d0cd7ff7e189fc91801655cb1b60e6bc3af747655341deceadbed3d76bdfae92389cc87c417e0f58f3fbcc56ff347467a20773146a81090ff42bbb5383d74108028f5fa532c647746054c312e2e4c085f58d93bec6da7c2bfd99fc59c1631cc71110acc2bf352b994e2a246be3cc1d240fa0c60eb04b92a9673d2ac2bba7f322ddbbd74712b0ec459050586523bd0b0505174a701206e47f2bb7fe20caf5ed73d33447b89432802e7d4606512e217aedf78c871e10cfbdf202efbf3fd8495b6be18cde726dc1fefc01921e9d1f15c8301376c33b5a698d0f7d5f317835d74857e121fe820d93f6b757c9938ec81f9b19a4b0d4ed35d1309fbcb285cf7717e9e27aaaba9d7d742fcfd786eacd993fb119e1d52908ca7ce2135046fa95805704c6258fd1b5fc1434af7ab99609820d73627080d43bcaeeb42ce423e17aa4df3a6994ead3133e2ecfbc6fa308c6b71b78cbab273641970b49e15d0dbe7aea716eaf6cf40f90d0d7d3d8bf1d165d25d5f6f6376416b9dd13731c5c2fdadee8e48c76430cccb21d8e6c659", 0x5bd, 0xfffffffffffffffd) keyctl$read(0xb, r2, &(0x7f0000000a40)=""/102400, 0x19000) keyctl$search(0xa, r2, &(0x7f00000008c0)='keyring\x00', &(0x7f0000000900)={'syz', 0x1}, 0xfffffffffffffffd) request_key(&(0x7f00000006c0)='dns_resolver\x00', &(0x7f0000000700)={'syz', 0x3}, &(0x7f0000000940)='\x00', 0xfffffffffffffffd) r3 = add_key(&(0x7f0000000380)='id_resolver\x00', &(0x7f0000000400)={'syz', 0x3}, &(0x7f0000000440)="e09e6dda135ac7c467011f", 0xb, r0) keyctl$search(0xa, r1, 0x0, &(0x7f0000000340)={'syz', 0x1}, r3) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000140)='cpuset\x00', 0x0, 0x0) add_key$keyring(&(0x7f0000000100), &(0x7f0000000180)={'syz', 0x0}, 0x0, 0x0, r0) r4 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r5 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) request_key(&(0x7f0000000580)='logon\x00', &(0x7f00000005c0)={'syz', 0x0}, &(0x7f0000000600)='\x1f-)\x00', 0xfffffffffffffff9) add_key$fscrypt_provisioning(&(0x7f0000000480), &(0x7f00000004c0)={'syz', 0x0}, &(0x7f0000000640)=ANY=[], 0x48, r0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = openat$cgroup_int(r4, &(0x7f00000001c0)='cpuset.sched_load_balance\x00', 0x2, 0x0) dup3(r7, r4, 0x0) add_key$keyring(&(0x7f0000000540), &(0x7f0000000640)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffc) r8 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000980), 0x200000, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r5, 0x81f8943c, &(0x7f000001a000)={0x0, ""/256, 0x0, 0x0, 0x0, 0x0, ""/16, ""/16, ""/16, 0x0}) ioctl$BTRFS_IOC_SUBVOL_CREATE_V2(r6, 0x50009418, &(0x7f000001a200)={{r8}, r9, 0x2, @inherit={0x58, &(0x7f00000009c0)={0x1, 0x2, 0x8, 0x7, {0x14, 0x1000, 0x5, 0x7, 0x4}, [0xffff, 0x3]}}, @subvolid=0x4}) writev(r4, &(0x7f0000000300)=[{&(0x7f00000000c0)='0', 0x1}, {&(0x7f00000003c0)='7', 0x1}], 0x2) 16:34:49 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000140)={0x0, 0x0}, &(0x7f0000cab000)=0x6e) syz_mount_image$hfs(&(0x7f0000000240), &(0x7f0000000380)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x3, &(0x7f0000000280)=ANY=[@ANYBLOB="71756965742c706172743d3078303030303030303030303031303030312c747970653d7614866b2c7569643d", @ANYRESHEX=r1, @ANYBLOB="2c633192ed5bf7173f3194697463696927d66b697463646d5ff52c00a58a82fdc98b9d58ab83dfc43a9837b20c3fbc821a859c05975b7d9101000000000000000000000d01000000000000000200"], 0x1, 0x235, &(0x7f0000000000)="$eJzs3c9qE1EUx/HfvYkabanTPyK4rBZcSVs34kaQPIQrUZsIxVBBK6grcS0+gHtfwYdwJb6Arlz5ANmN3DM3zTRmMmk1ubT9fiBh2rln5pzOTO89gVIBOLPut398vv0rvJzUUEPSXclLaklNSVd0tfVqb393v9ftTDpQwyLCy6mIdH+N2dnrjgsNcRYRZeGrphbL38Ns5Hme/0ydBJKzp38ML12IT6ftb809s9l4lzqBxFxffb3WUuo8AABpxfnfx3l+Ma7fvZc24rR/qub/fuoEEivN/9Zl5S5c38u2a9jvWQsX9vtBl3icc51XcWcdWmC6uq7ScvEXn+72urd2nvc6Xu91LyoNW7P3TnHrDtRkuz6mN53g+LUvWA3nQg3bFfmv/t8z1nNf3Tf30GX6pM7B+q+Zu3CZ7EplI1eqyH+z+ohWZVaMqqhy2U5yLZ4hqqmyNb4j0eCOWtbhDwiyujwtamUkqqhuqyZqdWzUdk3U2mjU8G6ujpw199E9cOv6rS9ql9b/Pvy0NzTNkxnG2Mh4Z0ysp2kjsykS80cqA//mg57ojpZevnn77HGv133BBhtssHGwkfoXFOZheNFTZ4JEwrrLFf1fqV/ZtBYpvGUT1ul53cFLR9yq6A1W7P3SkTq4heoObtqe6/pN6cb0Z8xinqeEa+u7HvH5PwAAAAAAAAAAAAAAAAAAwEkzjz8nSF0jAAAAAAAAAAAAAAAAAAAAAAAnHf//Fzi7/gQAAP//6oSCGA==") perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) socket(0x10, 0x2, 0x0) (async) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000140), &(0x7f0000cab000)=0x6e) (async) syz_mount_image$hfs(&(0x7f0000000240), &(0x7f0000000380)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x3, &(0x7f0000000280)=ANY=[@ANYBLOB="71756965742c706172743d3078303030303030303030303031303030312c747970653d7614866b2c7569643d", @ANYRESHEX=r1, @ANYBLOB="2c633192ed5bf7173f3194697463696927d66b697463646d5ff52c00a58a82fdc98b9d58ab83dfc43a9837b20c3fbc821a859c05975b7d9101000000000000000000000d01000000000000000200"], 0x1, 0x235, &(0x7f0000000000)="$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") (async) [ 2005.240578] new mount options do not match the existing superblock, will be ignored 16:34:49 executing program 4: r0 = request_key(0x0, 0x0, 0x0, 0xfffffffffffffffd) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) r1 = add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000780)='./file0\x00', &(0x7f0000000840)='gadgetfs\x00', 0x0, &(0x7f0000000880)='keyring\x00') perf_event_open(&(0x7f00000007c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x12c00, 0x0, 0xe5e}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) writev(0xffffffffffffffff, 0x0, 0x0) keyctl$read(0xb, 0x0, &(0x7f0000000a40)=""/102400, 0x19000) keyctl$search(0xa, 0x0, 0x0, 0x0, 0xfffffffffffffffd) request_key(&(0x7f00000006c0)='dns_resolver\x00', &(0x7f0000000700)={'syz', 0x3}, &(0x7f0000000940)='\x00', 0xfffffffffffffffd) r2 = add_key(&(0x7f0000000380)='id_resolver\x00', 0x0, &(0x7f0000000440)="e09e6dda135ac7c467011f", 0xb, r0) keyctl$search(0xa, r1, 0x0, &(0x7f0000000340)={'syz', 0x1}, r2) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000140)='cpuset\x00', 0x0, 0x0) add_key$keyring(&(0x7f0000000100), &(0x7f0000000180)={'syz', 0x0}, 0x0, 0x0, r0) r3 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r4 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) open(&(0x7f00000002c0)='./file0\x00', 0x98d00, 0x8) request_key(&(0x7f0000000580)='logon\x00', &(0x7f00000005c0)={'syz', 0x0}, &(0x7f0000000600)='\x1f-)\x00', 0xfffffffffffffff9) write$rfkill(r4, &(0x7f0000000040)={0x0, 0x0, 0x3}, 0x8) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = openat$cgroup_int(r3, &(0x7f00000001c0)='cpuset.sched_load_balance\x00', 0x2, 0x0) dup3(r6, r3, 0x0) r7 = add_key$keyring(&(0x7f0000000540), &(0x7f0000000640)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffc) r8 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000980), 0x200000, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r4, 0x81f8943c, &(0x7f000001a000)={0x0, ""/256, 0x0, 0x0, 0x0, 0x0, ""/16, ""/16, ""/16, 0x0}) ioctl$BTRFS_IOC_SUBVOL_CREATE_V2(r5, 0x50009418, &(0x7f000001a200)={{r8}, r9, 0x2, @inherit={0x58, &(0x7f00000009c0)={0x1, 0x2, 0x8, 0x7, {0x14, 0x1000, 0x5, 0x7, 0x4}, [0xffff, 0x3]}}, @subvolid=0x4}) ioctl$BTRFS_IOC_BALANCE(r5, 0x5000940c, 0x0) keyctl$search(0xa, r2, &(0x7f0000000200)='keyring\x00', &(0x7f0000000500)={'syz', 0x0}, r7) writev(r3, &(0x7f0000000300)=[{&(0x7f00000000c0)='0', 0x1}, {&(0x7f00000003c0)='7', 0x1}], 0x2) [ 2005.332597] hfs: invalid gid -1 [ 2005.342331] hfs: uid requires an argument [ 2005.394458] new mount options do not match the existing superblock, will be ignored [ 2005.436841] hfs: unable to parse mount options [ 2005.451626] hfs: unable to parse mount options 16:34:49 executing program 0: r0 = request_key(0x0, 0x0, 0x0, 0xfffffffffffffffd) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) r1 = add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000780)='./file0\x00', &(0x7f0000000840)='gadgetfs\x00', 0x0, &(0x7f0000000880)='keyring\x00') perf_event_open(&(0x7f00000007c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x12c00, 0x0, 0xe5e}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) writev(0xffffffffffffffff, 0x0, 0x0) keyctl$read(0xb, 0x0, &(0x7f0000000a40)=""/102400, 0x19000) keyctl$search(0xa, 0x0, 0x0, 0x0, 0xfffffffffffffffd) request_key(&(0x7f00000006c0)='dns_resolver\x00', &(0x7f0000000700)={'syz', 0x3}, &(0x7f0000000940)='\x00', 0xfffffffffffffffd) r2 = add_key(0x0, &(0x7f0000000400)={'syz', 0x3}, &(0x7f0000000440)="e09e6dda135ac7c467011f", 0xb, r0) keyctl$search(0xa, r1, 0x0, &(0x7f0000000340)={'syz', 0x1}, r2) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000140)='cpuset\x00', 0x0, 0x0) add_key$keyring(&(0x7f0000000100), &(0x7f0000000180)={'syz', 0x0}, 0x0, 0x0, r0) r3 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r4 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) open(&(0x7f00000002c0)='./file0\x00', 0x98d00, 0x8) request_key(&(0x7f0000000580)='logon\x00', &(0x7f00000005c0)={'syz', 0x0}, &(0x7f0000000600)='\x1f-)\x00', 0xfffffffffffffff9) write$rfkill(r4, &(0x7f0000000040)={0x0, 0x0, 0x3}, 0x8) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = openat$cgroup_int(r3, &(0x7f00000001c0)='cpuset.sched_load_balance\x00', 0x2, 0x0) dup3(r6, r3, 0x0) r7 = add_key$keyring(&(0x7f0000000540), &(0x7f0000000640)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffc) r8 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000980), 0x200000, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r4, 0x81f8943c, &(0x7f000001a000)={0x0, ""/256, 0x0, 0x0, 0x0, 0x0, ""/16, ""/16, ""/16, 0x0}) ioctl$BTRFS_IOC_SUBVOL_CREATE_V2(r5, 0x50009418, &(0x7f000001a200)={{r8}, r9, 0x2, @inherit={0x58, &(0x7f00000009c0)={0x1, 0x2, 0x8, 0x7, {0x14, 0x1000, 0x5, 0x7, 0x4}, [0xffff, 0x3]}}, @subvolid=0x4}) ioctl$BTRFS_IOC_BALANCE(r5, 0x5000940c, 0x0) keyctl$search(0xa, r2, &(0x7f0000000200)='keyring\x00', &(0x7f0000000500)={'syz', 0x0}, r7) writev(r3, &(0x7f0000000300)=[{&(0x7f00000000c0)='0', 0x1}, {&(0x7f00000003c0)='7', 0x1}], 0x2) 16:34:49 executing program 2: r0 = request_key(0x0, 0x0, 0x0, 0xfffffffffffffffd) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) perf_event_open(&(0x7f00000007c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0xe5e}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) keyctl$read(0xb, 0x0, &(0x7f0000000a40)=""/102400, 0x19000) keyctl$search(0xa, 0x0, &(0x7f00000008c0)='keyring\x00', &(0x7f0000000900)={'syz', 0x1}, 0xfffffffffffffffd) request_key(&(0x7f00000006c0)='dns_resolver\x00', &(0x7f0000000700)={'syz', 0x3}, &(0x7f0000000940)='\x00', 0xfffffffffffffffd) r1 = add_key(0x0, &(0x7f0000000400)={'syz', 0x3}, &(0x7f0000000440), 0x0, r0) keyctl$search(0xa, 0x0, 0x0, &(0x7f0000000340)={'syz', 0x1}, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000140)='cpuset\x00', 0x0, 0x0) add_key$keyring(&(0x7f0000000100), 0x0, 0x0, 0x0, r0) r2 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) request_key(0x0, &(0x7f00000005c0)={'syz', 0x0}, 0x0, 0xfffffffffffffff9) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = openat$cgroup_int(r2, &(0x7f00000001c0)='cpuset.sched_load_balance\x00', 0x2, 0x0) dup3(r4, r2, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x200000, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f000001a000)={0x0, ""/256, 0x0, 0x0, 0x0, 0x0, ""/16, ""/16, ""/16, 0x0}) ioctl$BTRFS_IOC_SUBVOL_CREATE_V2(r3, 0x50009418, &(0x7f000001a200)={{}, r5, 0x2, @inherit={0x58, &(0x7f00000009c0)={0x1, 0x2, 0x8, 0x0, {0x0, 0x0, 0x0, 0x0, 0x4}, [0x0, 0x0]}}, @subvolid}) ioctl$BTRFS_IOC_BALANCE(r3, 0x5000940c, 0x0) keyctl$search(0xa, r1, &(0x7f0000000200)='keyring\x00', &(0x7f0000000500)={'syz', 0x0}, 0x0) writev(r2, &(0x7f0000000300)=[{&(0x7f00000000c0)='0', 0x1}, {&(0x7f00000003c0)='7', 0x1}], 0x2) 16:34:49 executing program 1: syz_mount_image$hfs(&(0x7f0000000240), &(0x7f0000000380)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x3, &(0x7f0000000780)=ANY=[@ANYBLOB='quiet,gid=', @ANYRESHEX, @ANYBLOB="2c2a7270653d7614866b2c75693df589299908000000450000005d38ff0c0071446a0c48dba349ba347528523876dc8d7918ecea1024ba9669ff19a9ab5e27062b1dae8d8c0eb880008164ed9d8093fdc35f282dee56df9531b6e0c94b43c314af69146a70075499da5e7f927d3c672787e3d33a6071ff2c1483a1a7cfb34131bfee72f86068d0966d", @ANYRESHEX, @ANYBLOB=',codepage=ascii,rootcontext=sysadm_u,\x00'], 0x1, 0x235, &(0x7f0000000000)="$eJzs3U9rE0EYx/HfTKJGW+r2jwgeqwVP0upFvAiSF+FJ1CZCMVTQCupJPIsvwLtvwRfhSXwDevLkC8htZZ6dNNuYzaa1ydD2+4GEbXeenWc6u515AqUCcGY9aP/8cud3eDmpoYake5KX1JKakq7oauv17t7OXq/bmXShhkWEl1MR6f5ps73bHRca4iwiysJXTS2Wv4fZyPM8/5U6CSRnT/8YXroQn04735p7ZrPxPnUCibm++nqjpdR5AADSiuu/j+v8Yty/ey9txGX/VK3//dQJJFZa/63Kyl2Y38t2aljvWQkXzvtBlXiUvs6ruLMObDBdXVVpufiLz3Z63VvbL3odrw+6H5Wardl7p7h1B2qyXR9Tm05w9LEv2BjOhTHcrsh/9Xh7rOe+ue/ukcv0WZ39/V8zd2GabKaykZkq8t+svqKNMitaVYxy2Tq5FnuIakbZGl+RaHBHLevgBwRZXZ4WtTISVYxuqyZqdSTKFXNaE7U22tfwbq6OnDX3yT106/qjr2qX9v8+/LQ3NM2TGdpYy3hnTBxP01pmUyTmDzUM/J+Peqq7Wnr19t3zJ71e9yUHHHDAwf5B6l9QmIfhpKfOBImEfZcr6r9SvbJpJVJ4yybs0/O6i5euuFVRG6zY+6VDVXAL1RXctDXX9ZvSjel7zGKep4Rr64ce8/k/AAAAAAAAAAAAAAAAAADASTOPPydIPUYAAAAAAAAAAAAAAAAAAAAAAE46/v8vcHb9DQAA//9/u4IX") 16:34:49 executing program 3: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000140)={0x0, 0x0}, &(0x7f0000cab000)=0x6e) syz_mount_image$hfs(&(0x7f0000000240), &(0x7f0000000380)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x3, &(0x7f0000000400)={[{}, {@part={'part', 0x3d, 0x10001}}, {@type={'type', 0x3d, "7614866b"}}, {@uid={'uid', 0x3d, r2}}, {@codepage={'codepage', 0x3d, 'ascii'}}], [{@rootcontext={'rootcontext', 0x3d, 'sysadm_u'}}]}, 0x1, 0x235, &(0x7f0000000000)="$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") ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, &(0x7f00000002c0)={{0x1, 0x1, 0x18, r0, {0x7fff}}, '\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00'}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000340)={&(0x7f0000000280)='rpc_call_rpcerror\x00', r3}, 0x10) r4 = gettid() process_vm_writev(r4, &(0x7f0000000000)=[{&(0x7f0000000080)=""/259, 0x103}], 0x1, &(0x7f0000000040)=[{&(0x7f0000217f28)=""/231, 0xe7}], 0x1, 0x0) r5 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./bus\x00', 0x0, 0x0) r6 = openat(0xffffffffffffff9c, &(0x7f0000004400)='./bus\x00', 0x1c1002, 0x0) write$binfmt_misc(r6, &(0x7f0000000180)={'syz1'}, 0x4) sendfile(r6, r5, 0x0, 0x1ffff) perf_event_open(&(0x7f00000004c0)={0x4, 0x80, 0xfd, 0x4, 0x8, 0x2, 0x0, 0x1, 0x1110, 0x809e5605515f5155, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, @perf_bp={&(0x7f0000000480), 0x3}, 0x812c0, 0x1, 0x9, 0xb, 0x8, 0x0, 0xffff, 0x0, 0x7, 0x0, 0x1}, r4, 0x7, r6, 0x2) 16:34:49 executing program 5: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) r0 = add_key$keyring(0x0, &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000740)=@filename='./file0\x00', &(0x7f0000000780)='./file0\x00', &(0x7f0000000840)='gadgetfs\x00', 0x10, &(0x7f0000000880)='keyring\x00') perf_event_open(&(0x7f00000007c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x12c00, 0x0, 0xe5e}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) writev(0xffffffffffffffff, 0x0, 0x0) r1 = add_key(&(0x7f0000000240)='big_key\x00', &(0x7f0000000280)={'syz', 0x3}, &(0x7f0000019a40)="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", 0x5bd, 0xfffffffffffffffd) keyctl$read(0xb, r1, &(0x7f0000000a40)=""/102400, 0x19000) keyctl$search(0xa, r1, &(0x7f00000008c0)='keyring\x00', &(0x7f0000000900)={'syz', 0x1}, 0xfffffffffffffffd) request_key(&(0x7f00000006c0)='dns_resolver\x00', &(0x7f0000000700)={'syz', 0x3}, &(0x7f0000000940)='\x00', 0xfffffffffffffffd) r2 = add_key(&(0x7f0000000380)='id_resolver\x00', &(0x7f0000000400)={'syz', 0x3}, &(0x7f0000000440)="e09e6dda135ac7c467011f", 0xb, 0x0) keyctl$search(0xa, r0, 0x0, &(0x7f0000000340)={'syz', 0x1}, r2) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000140)='cpuset\x00', 0x0, 0x0) add_key$keyring(&(0x7f0000000100), &(0x7f0000000180)={'syz', 0x0}, 0x0, 0x0, 0x0) r3 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r4 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) request_key(&(0x7f0000000580)='logon\x00', &(0x7f00000005c0)={'syz', 0x0}, &(0x7f0000000600)='\x1f-)\x00', 0xfffffffffffffff9) add_key$fscrypt_provisioning(&(0x7f0000000480), &(0x7f00000004c0)={'syz', 0x0}, &(0x7f0000000640)=ANY=[], 0x48, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = openat$cgroup_int(r3, &(0x7f00000001c0)='cpuset.sched_load_balance\x00', 0x2, 0x0) dup3(r6, r3, 0x0) add_key$keyring(&(0x7f0000000540), &(0x7f0000000640)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffc) r7 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000980), 0x200000, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r4, 0x81f8943c, &(0x7f000001a000)={0x0, ""/256, 0x0, 0x0, 0x0, 0x0, ""/16, ""/16, ""/16, 0x0}) ioctl$BTRFS_IOC_SUBVOL_CREATE_V2(r5, 0x50009418, &(0x7f000001a200)={{r7}, r8, 0x2, @inherit={0x58, &(0x7f00000009c0)={0x1, 0x2, 0x8, 0x7, {0x14, 0x1000, 0x5, 0x7, 0x4}, [0xffff, 0x3]}}, @subvolid=0x4}) writev(r3, &(0x7f0000000300)=[{&(0x7f00000000c0)='0', 0x1}, {&(0x7f00000003c0)='7', 0x1}], 0x2) 16:34:49 executing program 4: r0 = request_key(0x0, 0x0, 0x0, 0xfffffffffffffffd) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) r1 = add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000780)='./file0\x00', &(0x7f0000000840)='gadgetfs\x00', 0x0, &(0x7f0000000880)='keyring\x00') perf_event_open(&(0x7f00000007c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x12c00, 0x0, 0xe5e}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) writev(0xffffffffffffffff, 0x0, 0x0) keyctl$read(0xb, 0x0, &(0x7f0000000a40)=""/102400, 0x19000) keyctl$search(0xa, 0x0, 0x0, 0x0, 0xfffffffffffffffd) request_key(&(0x7f00000006c0)='dns_resolver\x00', &(0x7f0000000700)={'syz', 0x3}, &(0x7f0000000940)='\x00', 0xfffffffffffffffd) r2 = add_key(&(0x7f0000000380)='id_resolver\x00', 0x0, &(0x7f0000000440)="e09e6dda135ac7c467011f", 0xb, r0) keyctl$search(0xa, r1, 0x0, &(0x7f0000000340)={'syz', 0x1}, r2) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000140)='cpuset\x00', 0x0, 0x0) add_key$keyring(&(0x7f0000000100), &(0x7f0000000180)={'syz', 0x0}, 0x0, 0x0, r0) r3 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r4 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) open(&(0x7f00000002c0)='./file0\x00', 0x98d00, 0x8) request_key(&(0x7f0000000580)='logon\x00', &(0x7f00000005c0)={'syz', 0x0}, &(0x7f0000000600)='\x1f-)\x00', 0xfffffffffffffff9) write$rfkill(r4, &(0x7f0000000040)={0x0, 0x0, 0x3}, 0x8) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = openat$cgroup_int(r3, &(0x7f00000001c0)='cpuset.sched_load_balance\x00', 0x2, 0x0) dup3(r6, r3, 0x0) r7 = add_key$keyring(&(0x7f0000000540), &(0x7f0000000640)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffc) r8 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000980), 0x200000, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r4, 0x81f8943c, &(0x7f000001a000)={0x0, ""/256, 0x0, 0x0, 0x0, 0x0, ""/16, ""/16, ""/16, 0x0}) ioctl$BTRFS_IOC_SUBVOL_CREATE_V2(r5, 0x50009418, &(0x7f000001a200)={{r8}, r9, 0x2, @inherit={0x58, &(0x7f00000009c0)={0x1, 0x2, 0x8, 0x7, {0x14, 0x1000, 0x5, 0x7, 0x4}, [0xffff, 0x3]}}, @subvolid=0x4}) ioctl$BTRFS_IOC_BALANCE(r5, 0x5000940c, 0x0) keyctl$search(0xa, r2, &(0x7f0000000200)='keyring\x00', &(0x7f0000000500)={'syz', 0x0}, r7) writev(r3, &(0x7f0000000300)=[{&(0x7f00000000c0)='0', 0x1}, {&(0x7f00000003c0)='7', 0x1}], 0x2) [ 2005.698378] new mount options do not match the existing superblock, will be ignored [ 2005.737311] hfs: uid requires an argument [ 2005.782573] hfs: invalid gid -1 [ 2005.793352] hfs: unable to parse mount options [ 2005.810247] new mount options do not match the existing superblock, will be ignored [ 2005.823446] new mount options do not match the existing superblock, will be ignored 16:34:49 executing program 2: r0 = request_key(0x0, 0x0, 0x0, 0xfffffffffffffffd) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) perf_event_open(&(0x7f00000007c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0xe5e}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) keyctl$read(0xb, 0x0, &(0x7f0000000a40)=""/102400, 0x19000) keyctl$search(0xa, 0x0, &(0x7f00000008c0)='keyring\x00', &(0x7f0000000900)={'syz', 0x1}, 0xfffffffffffffffd) request_key(&(0x7f00000006c0)='dns_resolver\x00', &(0x7f0000000700)={'syz', 0x3}, &(0x7f0000000940)='\x00', 0xfffffffffffffffd) r1 = add_key(0x0, &(0x7f0000000400)={'syz', 0x3}, &(0x7f0000000440), 0x0, r0) keyctl$search(0xa, 0x0, 0x0, &(0x7f0000000340)={'syz', 0x1}, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000140)='cpuset\x00', 0x0, 0x0) add_key$keyring(&(0x7f0000000100), 0x0, 0x0, 0x0, r0) r2 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) request_key(0x0, &(0x7f00000005c0)={'syz', 0x0}, 0x0, 0xfffffffffffffff9) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = openat$cgroup_int(r2, &(0x7f00000001c0)='cpuset.sched_load_balance\x00', 0x2, 0x0) dup3(r4, r2, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x200000, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f000001a000)={0x0, ""/256, 0x0, 0x0, 0x0, 0x0, ""/16, ""/16, ""/16, 0x0}) ioctl$BTRFS_IOC_SUBVOL_CREATE_V2(r3, 0x50009418, &(0x7f000001a200)={{}, r5, 0x2, @inherit={0x58, &(0x7f00000009c0)={0x1, 0x2, 0x8, 0x0, {0x0, 0x0, 0x0, 0x0, 0x4}, [0x0, 0x0]}}, @subvolid=0x4}) ioctl$BTRFS_IOC_BALANCE(0xffffffffffffffff, 0x5000940c, 0x0) keyctl$search(0xa, r1, &(0x7f0000000200)='keyring\x00', &(0x7f0000000500)={'syz', 0x0}, 0x0) writev(r2, &(0x7f0000000300)=[{&(0x7f00000000c0)='0', 0x1}, {&(0x7f00000003c0)='7', 0x1}], 0x2) [ 2005.831719] hfs: unable to parse mount options 16:34:50 executing program 5: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) r0 = add_key$keyring(0x0, &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000740)=@filename='./file0\x00', &(0x7f0000000780)='./file0\x00', &(0x7f0000000840)='gadgetfs\x00', 0x10, &(0x7f0000000880)='keyring\x00') perf_event_open(&(0x7f00000007c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x12c00, 0x0, 0xe5e}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) writev(0xffffffffffffffff, 0x0, 0x0) r1 = add_key(&(0x7f0000000240)='big_key\x00', &(0x7f0000000280)={'syz', 0x3}, &(0x7f0000019a40)="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", 0x5bd, 0xfffffffffffffffd) keyctl$read(0xb, r1, &(0x7f0000000a40)=""/102400, 0x19000) keyctl$search(0xa, r1, &(0x7f00000008c0)='keyring\x00', &(0x7f0000000900)={'syz', 0x1}, 0xfffffffffffffffd) request_key(&(0x7f00000006c0)='dns_resolver\x00', &(0x7f0000000700)={'syz', 0x3}, &(0x7f0000000940)='\x00', 0xfffffffffffffffd) r2 = add_key(&(0x7f0000000380)='id_resolver\x00', &(0x7f0000000400)={'syz', 0x3}, &(0x7f0000000440)="e09e6dda135ac7c467011f", 0xb, 0x0) keyctl$search(0xa, r0, 0x0, &(0x7f0000000340)={'syz', 0x1}, r2) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000140)='cpuset\x00', 0x0, 0x0) add_key$keyring(&(0x7f0000000100), &(0x7f0000000180)={'syz', 0x0}, 0x0, 0x0, 0x0) r3 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r4 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) request_key(&(0x7f0000000580)='logon\x00', &(0x7f00000005c0)={'syz', 0x0}, &(0x7f0000000600)='\x1f-)\x00', 0xfffffffffffffff9) add_key$fscrypt_provisioning(&(0x7f0000000480), &(0x7f00000004c0)={'syz', 0x0}, &(0x7f0000000640)=ANY=[], 0x48, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = openat$cgroup_int(r3, &(0x7f00000001c0)='cpuset.sched_load_balance\x00', 0x2, 0x0) dup3(r6, r3, 0x0) add_key$keyring(&(0x7f0000000540), &(0x7f0000000640)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffc) r7 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000980), 0x200000, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r4, 0x81f8943c, &(0x7f000001a000)={0x0, ""/256, 0x0, 0x0, 0x0, 0x0, ""/16, ""/16, ""/16, 0x0}) ioctl$BTRFS_IOC_SUBVOL_CREATE_V2(r5, 0x50009418, &(0x7f000001a200)={{r7}, r8, 0x2, @inherit={0x58, &(0x7f00000009c0)={0x1, 0x2, 0x8, 0x7, {0x14, 0x1000, 0x5, 0x7, 0x4}, [0xffff, 0x3]}}, @subvolid=0x4}) writev(r3, &(0x7f0000000300)=[{&(0x7f00000000c0)='0', 0x1}, {&(0x7f00000003c0)='7', 0x1}], 0x2) [ 2005.861674] new mount options do not match the existing superblock, will be ignored 16:34:50 executing program 1: syz_mount_image$hfs(&(0x7f0000000240), &(0x7f0000000380)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x3, &(0x7f0000000780)=ANY=[@ANYBLOB='quiet,gid=', @ANYRESHEX, @ANYBLOB="2c2a7270653d7614866b2c75693df589299908000000450000005d38ff0c0071446a0c48dba349ba347528523876dc8d7918ecea1024ba9669ff19a9ab5e27062b1dae8d8c0eb880008164ed9d8093fdc35f282dee56df9531b6e0c94b43c314af69146a70075499da5e7f927d3c672787e3d33a6071ff2c1483a1a7cfb34131bfee72f86068d0966d", @ANYRESHEX, @ANYBLOB=',codepage=ascii,rootcontext=sysadm_u,\x00'], 0x1, 0x235, &(0x7f0000000000)="$eJzs3U9rE0EYx/HfTKJGW+r2jwgeqwVP0upFvAiSF+FJ1CZCMVTQCupJPIsvwLtvwRfhSXwDevLkC8htZZ6dNNuYzaa1ydD2+4GEbXeenWc6u515AqUCcGY9aP/8cud3eDmpoYake5KX1JKakq7oauv17t7OXq/bmXShhkWEl1MR6f5ps73bHRca4iwiysJXTS2Wv4fZyPM8/5U6CSRnT/8YXroQn04735p7ZrPxPnUCibm++nqjpdR5AADSiuu/j+v8Yty/ey9txGX/VK3//dQJJFZa/63Kyl2Y38t2aljvWQkXzvtBlXiUvs6ruLMObDBdXVVpufiLz3Z63VvbL3odrw+6H5Wardl7p7h1B2qyXR9Tm05w9LEv2BjOhTHcrsh/9Xh7rOe+ue/ukcv0WZ39/V8zd2GabKaykZkq8t+svqKNMitaVYxy2Tq5FnuIakbZGl+RaHBHLevgBwRZXZ4WtTISVYxuqyZqdSSqUcxpTdTaaF/Du7k6ctbcJ/fQreuPvqpd2v/78NPe0DRPZmhjLeOdMXE8TWuZTZGYP9Qw8H8+6qnuaunV23fPn/R63ZcccMABB/sHqX9BYR6Gk546EyQS9l2uqP9K9cqmlUjhLZuwT8/rLl664lZFbbBi75cOVcEtVFdw09Zc129KN6bvMYt5nhKurR96zOf/AAAAAAAAAAAAAAAAAAAAJ808/pwg9RgBAAAAAAAAAAAAAAAAAAAAADjp+P+/wNn1NwAA//9VXIIZ") 16:34:50 executing program 3: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000140)={0x0, 0x0}, &(0x7f0000cab000)=0x6e) syz_mount_image$hfs(&(0x7f0000000240), &(0x7f0000000380)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x3, &(0x7f0000000400)={[{}, {@part={'part', 0x3d, 0x10001}}, {@type={'type', 0x3d, "7614866b"}}, {@uid={'uid', 0x3d, r2}}, {@codepage={'codepage', 0x3d, 'ascii'}}], [{@rootcontext={'rootcontext', 0x3d, 'sysadm_u'}}]}, 0x1, 0x235, &(0x7f0000000000)="$eJzs3c9qE1EUx/HfvYkabanTPyK4rBZcSVs34kaQPIQrUZsIxVBBK6grcS0+gHtfwYdwJb6Arlz5ANmN3DM3zTRmMmk1ubT9fiBh2rln5pzOTO89gVIBOLPut398vv0rvJzUUEPSXclLaklNSVd0tfVqb393v9ftTDpQwyLCy6mIdH+N2dnrjgsNcRYRZeGrphbL38Ns5Hme/0ydBJKzp38ML12IT6ftb809s9l4lzqBxFxffb3WUuo8AABpxfnfx3l+Ma7fvZc24rR/qub/fuoEEivN/9Zl5S5c38u2a9jvWQsX9vtBl3icc51XcWcdWmC6uq7ScvEXn+72urd2nvc6Xu91LyoNW7P3TnHrDtRkuz6mN53g+LUvWA3nQg3bFfmv/t8z1nNf3Tf30GX6pM7B+q+Zu3CZ7EplI1eqyH+z+ohWZVaMqqhy2U5yLZ4hqqmyNb4j0eCOWtbhDwiyujwtamUkqqhuqyZqdWzUdk3U2mjU8G6ujpw199E9cOv6rS9ql9b/Pvy0NzTNkxnG2Mh4Z0ysp2kjsykS80cqA//mg57ojpZevnn77HGv133BBhtssHGwkfoXFOZheNFTZ4JEwrrLFf1fqV/ZtBYpvGUT1ul53cFLR9yq6A1W7P3SkTq4heoObtqe6/pN6cb0Z8xinqeEa+u7HvH5PwAAAAAAAAAAAAAAAAAAwEkzjz8nSF0jAAAAAAAAAAAAAAAAAAAAAAAnHf//Fzi7/gQAAP//6oSCGA==") ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, &(0x7f00000002c0)={{0x1, 0x1, 0x18, r0, {0x7fff}}, '\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00'}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000340)={&(0x7f0000000280)='rpc_call_rpcerror\x00', r3}, 0x10) r4 = gettid() process_vm_writev(r4, &(0x7f0000000000)=[{&(0x7f0000000080)=""/259, 0x103}], 0x1, &(0x7f0000000040)=[{&(0x7f0000217f28)=""/231, 0xe7}], 0x1, 0x0) r5 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./bus\x00', 0x0, 0x0) r6 = openat(0xffffffffffffff9c, &(0x7f0000004400)='./bus\x00', 0x1c1002, 0x0) write$binfmt_misc(r6, &(0x7f0000000180)={'syz1'}, 0x4) sendfile(r6, r5, 0x0, 0x1ffff) perf_event_open(&(0x7f00000004c0)={0x4, 0x80, 0xfd, 0x4, 0x8, 0x2, 0x0, 0x1, 0x1110, 0x809e5605515f5155, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, @perf_bp={&(0x7f0000000480), 0x3}, 0x812c0, 0x1, 0x9, 0xb, 0x8, 0x0, 0xffff, 0x0, 0x7, 0x0, 0x1}, r4, 0x7, r6, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) socket(0x10, 0x2, 0x0) (async) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000140), &(0x7f0000cab000)=0x6e) (async) syz_mount_image$hfs(&(0x7f0000000240), &(0x7f0000000380)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x3, &(0x7f0000000400)={[{}, {@part={'part', 0x3d, 0x10001}}, {@type={'type', 0x3d, "7614866b"}}, {@uid={'uid', 0x3d, r2}}, {@codepage={'codepage', 0x3d, 'ascii'}}], [{@rootcontext={'rootcontext', 0x3d, 'sysadm_u'}}]}, 0x1, 0x235, &(0x7f0000000000)="$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") (async) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, &(0x7f00000002c0)={{0x1, 0x1, 0x18, r0, {0x7fff}}, '\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00'}) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000340)={&(0x7f0000000280)='rpc_call_rpcerror\x00', r3}, 0x10) (async) gettid() (async) process_vm_writev(r4, &(0x7f0000000000)=[{&(0x7f0000000080)=""/259, 0x103}], 0x1, &(0x7f0000000040)=[{&(0x7f0000217f28)=""/231, 0xe7}], 0x1, 0x0) (async) openat(0xffffffffffffff9c, &(0x7f0000000000)='./bus\x00', 0x0, 0x0) (async) openat(0xffffffffffffff9c, &(0x7f0000004400)='./bus\x00', 0x1c1002, 0x0) (async) write$binfmt_misc(r6, &(0x7f0000000180)={'syz1'}, 0x4) (async) sendfile(r6, r5, 0x0, 0x1ffff) (async) perf_event_open(&(0x7f00000004c0)={0x4, 0x80, 0xfd, 0x4, 0x8, 0x2, 0x0, 0x1, 0x1110, 0x809e5605515f5155, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, @perf_bp={&(0x7f0000000480), 0x3}, 0x812c0, 0x1, 0x9, 0xb, 0x8, 0x0, 0xffff, 0x0, 0x7, 0x0, 0x1}, r4, 0x7, r6, 0x2) (async) 16:34:50 executing program 4: r0 = request_key(0x0, 0x0, 0x0, 0xfffffffffffffffd) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) r1 = add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000780)='./file0\x00', &(0x7f0000000840)='gadgetfs\x00', 0x0, &(0x7f0000000880)='keyring\x00') perf_event_open(&(0x7f00000007c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x12c00, 0x0, 0xe5e}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) writev(0xffffffffffffffff, 0x0, 0x0) keyctl$read(0xb, 0x0, &(0x7f0000000a40)=""/102400, 0x19000) keyctl$search(0xa, 0x0, 0x0, 0x0, 0xfffffffffffffffd) request_key(&(0x7f00000006c0)='dns_resolver\x00', &(0x7f0000000700)={'syz', 0x3}, &(0x7f0000000940)='\x00', 0xfffffffffffffffd) r2 = add_key(&(0x7f0000000380)='id_resolver\x00', 0x0, &(0x7f0000000440)="e09e6dda135ac7c467011f", 0xb, r0) keyctl$search(0xa, r1, 0x0, &(0x7f0000000340)={'syz', 0x1}, r2) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000140)='cpuset\x00', 0x0, 0x0) add_key$keyring(&(0x7f0000000100), &(0x7f0000000180)={'syz', 0x0}, 0x0, 0x0, r0) r3 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r4 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) open(&(0x7f00000002c0)='./file0\x00', 0x98d00, 0x8) request_key(&(0x7f0000000580)='logon\x00', &(0x7f00000005c0)={'syz', 0x0}, &(0x7f0000000600)='\x1f-)\x00', 0xfffffffffffffff9) write$rfkill(r4, &(0x7f0000000040)={0x0, 0x0, 0x3}, 0x8) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = openat$cgroup_int(r3, &(0x7f00000001c0)='cpuset.sched_load_balance\x00', 0x2, 0x0) dup3(r6, r3, 0x0) r7 = add_key$keyring(&(0x7f0000000540), &(0x7f0000000640)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffc) r8 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000980), 0x200000, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r4, 0x81f8943c, &(0x7f000001a000)={0x0, ""/256, 0x0, 0x0, 0x0, 0x0, ""/16, ""/16, ""/16, 0x0}) ioctl$BTRFS_IOC_SUBVOL_CREATE_V2(r5, 0x50009418, &(0x7f000001a200)={{r8}, r9, 0x2, @inherit={0x58, &(0x7f00000009c0)={0x1, 0x2, 0x8, 0x7, {0x14, 0x1000, 0x5, 0x7, 0x4}, [0xffff, 0x3]}}, @subvolid=0x4}) ioctl$BTRFS_IOC_BALANCE(r5, 0x5000940c, 0x0) keyctl$search(0xa, r2, &(0x7f0000000200)='keyring\x00', &(0x7f0000000500)={'syz', 0x0}, r7) writev(r3, &(0x7f0000000300)=[{&(0x7f00000000c0)='0', 0x1}, {&(0x7f00000003c0)='7', 0x1}], 0x2) 16:34:50 executing program 0: r0 = request_key(0x0, 0x0, 0x0, 0xfffffffffffffffd) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) r1 = add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000780)='./file0\x00', &(0x7f0000000840)='gadgetfs\x00', 0x0, &(0x7f0000000880)='keyring\x00') perf_event_open(&(0x7f00000007c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x12c00, 0x0, 0xe5e}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) writev(0xffffffffffffffff, 0x0, 0x0) keyctl$read(0xb, 0x0, &(0x7f0000000a40)=""/102400, 0x19000) keyctl$search(0xa, 0x0, 0x0, 0x0, 0xfffffffffffffffd) request_key(&(0x7f00000006c0)='dns_resolver\x00', &(0x7f0000000700)={'syz', 0x3}, &(0x7f0000000940)='\x00', 0xfffffffffffffffd) r2 = add_key(&(0x7f0000000380)='id_resolver\x00', 0x0, &(0x7f0000000440)="e09e6dda135ac7c467011f", 0xb, r0) keyctl$search(0xa, r1, 0x0, &(0x7f0000000340)={'syz', 0x1}, r2) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000140)='cpuset\x00', 0x0, 0x0) add_key$keyring(&(0x7f0000000100), &(0x7f0000000180)={'syz', 0x0}, 0x0, 0x0, r0) r3 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r4 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) open(&(0x7f00000002c0)='./file0\x00', 0x98d00, 0x8) request_key(&(0x7f0000000580)='logon\x00', &(0x7f00000005c0)={'syz', 0x0}, &(0x7f0000000600)='\x1f-)\x00', 0xfffffffffffffff9) write$rfkill(r4, &(0x7f0000000040)={0x0, 0x0, 0x3}, 0x8) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = openat$cgroup_int(r3, &(0x7f00000001c0)='cpuset.sched_load_balance\x00', 0x2, 0x0) dup3(r6, r3, 0x0) r7 = add_key$keyring(&(0x7f0000000540), &(0x7f0000000640)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffc) r8 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000980), 0x200000, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r4, 0x81f8943c, &(0x7f000001a000)={0x0, ""/256, 0x0, 0x0, 0x0, 0x0, ""/16, ""/16, ""/16, 0x0}) ioctl$BTRFS_IOC_SUBVOL_CREATE_V2(r5, 0x50009418, &(0x7f000001a200)={{r8}, r9, 0x2, @inherit={0x58, &(0x7f00000009c0)={0x1, 0x2, 0x8, 0x7, {0x14, 0x1000, 0x5, 0x7, 0x4}, [0xffff, 0x3]}}, @subvolid=0x4}) ioctl$BTRFS_IOC_BALANCE(r5, 0x5000940c, 0x0) keyctl$search(0xa, r2, &(0x7f0000000200)='keyring\x00', &(0x7f0000000500)={'syz', 0x0}, r7) writev(r3, &(0x7f0000000300)=[{&(0x7f00000000c0)='0', 0x1}, {&(0x7f00000003c0)='7', 0x1}], 0x2) [ 2006.101241] hfs: uid requires an argument [ 2006.106457] hfs: invalid gid -1 [ 2006.114288] hfs: unable to parse mount options [ 2006.123936] hfs: unable to parse mount options [ 2006.126793] new mount options do not match the existing superblock, will be ignored [ 2006.149856] new mount options do not match the existing superblock, will be ignored 16:34:50 executing program 5: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) r0 = add_key$keyring(0x0, &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000740)=@filename='./file0\x00', &(0x7f0000000780)='./file0\x00', &(0x7f0000000840)='gadgetfs\x00', 0x10, &(0x7f0000000880)='keyring\x00') perf_event_open(&(0x7f00000007c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x12c00, 0x0, 0xe5e}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) writev(0xffffffffffffffff, 0x0, 0x0) r1 = add_key(&(0x7f0000000240)='big_key\x00', &(0x7f0000000280)={'syz', 0x3}, &(0x7f0000019a40)="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", 0x5bd, 0xfffffffffffffffd) keyctl$read(0xb, r1, &(0x7f0000000a40)=""/102400, 0x19000) keyctl$search(0xa, r1, &(0x7f00000008c0)='keyring\x00', &(0x7f0000000900)={'syz', 0x1}, 0xfffffffffffffffd) request_key(&(0x7f00000006c0)='dns_resolver\x00', &(0x7f0000000700)={'syz', 0x3}, &(0x7f0000000940)='\x00', 0xfffffffffffffffd) r2 = add_key(&(0x7f0000000380)='id_resolver\x00', &(0x7f0000000400)={'syz', 0x3}, &(0x7f0000000440)="e09e6dda135ac7c467011f", 0xb, 0x0) keyctl$search(0xa, r0, 0x0, &(0x7f0000000340)={'syz', 0x1}, r2) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000140)='cpuset\x00', 0x0, 0x0) add_key$keyring(&(0x7f0000000100), &(0x7f0000000180)={'syz', 0x0}, 0x0, 0x0, 0x0) r3 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r4 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) request_key(&(0x7f0000000580)='logon\x00', &(0x7f00000005c0)={'syz', 0x0}, &(0x7f0000000600)='\x1f-)\x00', 0xfffffffffffffff9) add_key$fscrypt_provisioning(&(0x7f0000000480), &(0x7f00000004c0)={'syz', 0x0}, &(0x7f0000000640)=ANY=[], 0x48, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = openat$cgroup_int(r3, &(0x7f00000001c0)='cpuset.sched_load_balance\x00', 0x2, 0x0) dup3(r6, r3, 0x0) add_key$keyring(&(0x7f0000000540), &(0x7f0000000640)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffc) r7 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000980), 0x200000, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r4, 0x81f8943c, &(0x7f000001a000)={0x0, ""/256, 0x0, 0x0, 0x0, 0x0, ""/16, ""/16, ""/16, 0x0}) ioctl$BTRFS_IOC_SUBVOL_CREATE_V2(r5, 0x50009418, &(0x7f000001a200)={{r7}, r8, 0x2, @inherit={0x58, &(0x7f00000009c0)={0x1, 0x2, 0x8, 0x7, {0x14, 0x1000, 0x5, 0x7, 0x4}, [0xffff, 0x3]}}, @subvolid=0x4}) writev(r3, &(0x7f0000000300)=[{&(0x7f00000000c0)='0', 0x1}, {&(0x7f00000003c0)='7', 0x1}], 0x2) 16:34:50 executing program 2: r0 = request_key(0x0, 0x0, 0x0, 0xfffffffffffffffd) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) perf_event_open(&(0x7f00000007c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0xe5e}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) keyctl$read(0xb, 0x0, &(0x7f0000000a40)=""/102400, 0x19000) keyctl$search(0xa, 0x0, &(0x7f00000008c0)='keyring\x00', &(0x7f0000000900)={'syz', 0x1}, 0xfffffffffffffffd) request_key(&(0x7f00000006c0)='dns_resolver\x00', &(0x7f0000000700)={'syz', 0x3}, &(0x7f0000000940)='\x00', 0xfffffffffffffffd) r1 = add_key(0x0, &(0x7f0000000400)={'syz', 0x3}, &(0x7f0000000440), 0x0, r0) keyctl$search(0xa, 0x0, 0x0, &(0x7f0000000340)={'syz', 0x1}, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000140)='cpuset\x00', 0x0, 0x0) add_key$keyring(&(0x7f0000000100), 0x0, 0x0, 0x0, r0) r2 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) request_key(0x0, &(0x7f00000005c0)={'syz', 0x0}, 0x0, 0xfffffffffffffff9) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = openat$cgroup_int(r2, &(0x7f00000001c0)='cpuset.sched_load_balance\x00', 0x2, 0x0) dup3(r4, r2, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x200000, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f000001a000)={0x0, ""/256, 0x0, 0x0, 0x0, 0x0, ""/16, ""/16, ""/16, 0x0}) ioctl$BTRFS_IOC_SUBVOL_CREATE_V2(r3, 0x50009418, &(0x7f000001a200)={{}, r5, 0x2, @inherit={0x58, &(0x7f00000009c0)={0x1, 0x2, 0x8, 0x0, {0x0, 0x0, 0x0, 0x0, 0x4}, [0x0, 0x0]}}, @subvolid=0x4}) ioctl$BTRFS_IOC_BALANCE(0xffffffffffffffff, 0x5000940c, 0x0) keyctl$search(0xa, r1, &(0x7f0000000200)='keyring\x00', &(0x7f0000000500)={'syz', 0x0}, 0x0) writev(r2, &(0x7f0000000300)=[{&(0x7f00000000c0)='0', 0x1}, {&(0x7f00000003c0)='7', 0x1}], 0x2) [ 2006.210294] new mount options do not match the existing superblock, will be ignored 16:34:50 executing program 1: syz_mount_image$hfs(&(0x7f0000000240), &(0x7f0000000380)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x3, &(0x7f0000000780)=ANY=[@ANYBLOB='quiet,gid=', @ANYRESHEX, @ANYBLOB="2c2a7270653d7614866b2c75693df589299908000000450000005d38ff0c0071446a0c48dba349ba347528523876dc8d7918ecea1024ba9669ff19a9ab5e27062b1dae8d8c0eb880008164ed9d8093fdc35f282dee56df9531b6e0c94b43c314af69146a70075499da5e7f927d3c672787e3d33a6071ff2c1483a1a7cfb34131bfee72f86068d0966d", @ANYRESHEX, @ANYBLOB=',codepage=ascii,rootcontext=sysadm_u,\x00'], 0x1, 0x235, &(0x7f0000000000)="$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") [ 2006.269515] new mount options do not match the existing superblock, will be ignored 16:34:50 executing program 0: r0 = request_key(0x0, 0x0, 0x0, 0xfffffffffffffffd) r1 = add_key$keyring(0x0, &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000740)=@filename='./file0\x00', &(0x7f0000000780)='./file0\x00', &(0x7f0000000840)='gadgetfs\x00', 0x10, &(0x7f0000000880)='keyring\x00') perf_event_open(&(0x7f00000007c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x12c00, 0x0, 0xe5e}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) writev(0xffffffffffffffff, 0x0, 0x0) r2 = add_key(&(0x7f0000000240)='big_key\x00', &(0x7f0000000280)={'syz', 0x3}, &(0x7f0000019a40)="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", 0x5bd, 0xfffffffffffffffd) keyctl$read(0xb, r2, &(0x7f0000000a40)=""/102400, 0x19000) keyctl$search(0xa, r2, &(0x7f00000008c0)='keyring\x00', &(0x7f0000000900)={'syz', 0x1}, 0xfffffffffffffffd) request_key(&(0x7f00000006c0)='dns_resolver\x00', &(0x7f0000000700)={'syz', 0x3}, &(0x7f0000000940)='\x00', 0xfffffffffffffffd) r3 = add_key(&(0x7f0000000380)='id_resolver\x00', &(0x7f0000000400)={'syz', 0x3}, &(0x7f0000000440)="e09e6dda135ac7c467011f", 0xb, r0) keyctl$search(0xa, r1, 0x0, &(0x7f0000000340)={'syz', 0x1}, r3) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000140)='cpuset\x00', 0x0, 0x0) add_key$keyring(&(0x7f0000000100), &(0x7f0000000180)={'syz', 0x0}, 0x0, 0x0, r0) r4 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r5 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) request_key(&(0x7f0000000580)='logon\x00', &(0x7f00000005c0)={'syz', 0x0}, &(0x7f0000000600)='\x1f-)\x00', 0xfffffffffffffff9) add_key$fscrypt_provisioning(&(0x7f0000000480), &(0x7f00000004c0)={'syz', 0x0}, &(0x7f0000000640)=ANY=[], 0x48, r0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = openat$cgroup_int(r4, &(0x7f00000001c0)='cpuset.sched_load_balance\x00', 0x2, 0x0) dup3(r7, r4, 0x0) add_key$keyring(&(0x7f0000000540), &(0x7f0000000640)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffc) r8 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000980), 0x200000, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r5, 0x81f8943c, &(0x7f000001a000)={0x0, ""/256, 0x0, 0x0, 0x0, 0x0, ""/16, ""/16, ""/16, 0x0}) ioctl$BTRFS_IOC_SUBVOL_CREATE_V2(r6, 0x50009418, &(0x7f000001a200)={{r8}, r9, 0x2, @inherit={0x58, &(0x7f00000009c0)={0x1, 0x2, 0x8, 0x7, {0x14, 0x1000, 0x5, 0x7, 0x4}, [0xffff, 0x3]}}, @subvolid=0x4}) writev(r4, &(0x7f0000000300)=[{&(0x7f00000000c0)='0', 0x1}, {&(0x7f00000003c0)='7', 0x1}], 0x2) 16:34:50 executing program 3: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) r1 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000140)={0x0, 0x0}, &(0x7f0000cab000)=0x6e) syz_mount_image$hfs(&(0x7f0000000240), &(0x7f0000000380)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x3, &(0x7f0000000400)={[{}, {@part={'part', 0x3d, 0x10001}}, {@type={'type', 0x3d, "7614866b"}}, {@uid={'uid', 0x3d, r2}}, {@codepage={'codepage', 0x3d, 'ascii'}}], [{@rootcontext={'rootcontext', 0x3d, 'sysadm_u'}}]}, 0x1, 0x235, &(0x7f0000000000)="$eJzs3c9qE1EUx/HfvYkabanTPyK4rBZcSVs34kaQPIQrUZsIxVBBK6grcS0+gHtfwYdwJb6Arlz5ANmN3DM3zTRmMmk1ubT9fiBh2rln5pzOTO89gVIBOLPut398vv0rvJzUUEPSXclLaklNSVd0tfVqb393v9ftTDpQwyLCy6mIdH+N2dnrjgsNcRYRZeGrphbL38Ns5Hme/0ydBJKzp38ML12IT6ftb809s9l4lzqBxFxffb3WUuo8AABpxfnfx3l+Ma7fvZc24rR/qub/fuoEEivN/9Zl5S5c38u2a9jvWQsX9vtBl3icc51XcWcdWmC6uq7ScvEXn+72urd2nvc6Xu91LyoNW7P3TnHrDtRkuz6mN53g+LUvWA3nQg3bFfmv/t8z1nNf3Tf30GX6pM7B+q+Zu3CZ7EplI1eqyH+z+ohWZVaMqqhy2U5yLZ4hqqmyNb4j0eCOWtbhDwiyujwtamUkqqhuqyZqdWzUdk3U2mjU8G6ujpw199E9cOv6rS9ql9b/Pvy0NzTNkxnG2Mh4Z0ysp2kjsykS80cqA//mg57ojpZevnn77HGv133BBhtssHGwkfoXFOZheNFTZ4JEwrrLFf1fqV/ZtBYpvGUT1ul53cFLR9yq6A1W7P3SkTq4heoObtqe6/pN6cb0Z8xinqeEa+u7HvH5PwAAAAAAAAAAAAAAAAAAwEkzjz8nSF0jAAAAAAAAAAAAAAAAAAAAAAAnHf//Fzi7/gQAAP//6oSCGA==") (async) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, &(0x7f00000002c0)={{0x1, 0x1, 0x18, r0, {0x7fff}}, '\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00'}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000340)={&(0x7f0000000280)='rpc_call_rpcerror\x00', r3}, 0x10) (async) r4 = gettid() process_vm_writev(r4, &(0x7f0000000000)=[{&(0x7f0000000080)=""/259, 0x103}], 0x1, &(0x7f0000000040)=[{&(0x7f0000217f28)=""/231, 0xe7}], 0x1, 0x0) (async) r5 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./bus\x00', 0x0, 0x0) (async) r6 = openat(0xffffffffffffff9c, &(0x7f0000004400)='./bus\x00', 0x1c1002, 0x0) write$binfmt_misc(r6, &(0x7f0000000180)={'syz1'}, 0x4) (async) sendfile(r6, r5, 0x0, 0x1ffff) (async) perf_event_open(&(0x7f00000004c0)={0x4, 0x80, 0xfd, 0x4, 0x8, 0x2, 0x0, 0x1, 0x1110, 0x809e5605515f5155, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, @perf_bp={&(0x7f0000000480), 0x3}, 0x812c0, 0x1, 0x9, 0xb, 0x8, 0x0, 0xffff, 0x0, 0x7, 0x0, 0x1}, r4, 0x7, r6, 0x2) 16:34:50 executing program 4: r0 = request_key(0x0, 0x0, 0x0, 0xfffffffffffffffd) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) r1 = add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000780)='./file0\x00', &(0x7f0000000840)='gadgetfs\x00', 0x0, &(0x7f0000000880)='keyring\x00') perf_event_open(&(0x7f00000007c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x12c00, 0x0, 0xe5e}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) writev(0xffffffffffffffff, 0x0, 0x0) keyctl$read(0xb, 0x0, &(0x7f0000000a40)=""/102400, 0x19000) keyctl$search(0xa, 0x0, 0x0, 0x0, 0xfffffffffffffffd) request_key(&(0x7f00000006c0)='dns_resolver\x00', &(0x7f0000000700)={'syz', 0x3}, &(0x7f0000000940)='\x00', 0xfffffffffffffffd) r2 = add_key(&(0x7f0000000380)='id_resolver\x00', 0x0, 0x0, 0x0, r0) keyctl$search(0xa, r1, 0x0, &(0x7f0000000340)={'syz', 0x1}, r2) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000140)='cpuset\x00', 0x0, 0x0) add_key$keyring(&(0x7f0000000100), &(0x7f0000000180)={'syz', 0x0}, 0x0, 0x0, r0) r3 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r4 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) open(&(0x7f00000002c0)='./file0\x00', 0x98d00, 0x8) request_key(&(0x7f0000000580)='logon\x00', &(0x7f00000005c0)={'syz', 0x0}, &(0x7f0000000600)='\x1f-)\x00', 0xfffffffffffffff9) write$rfkill(r4, &(0x7f0000000040)={0x0, 0x0, 0x3}, 0x8) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = openat$cgroup_int(r3, &(0x7f00000001c0)='cpuset.sched_load_balance\x00', 0x2, 0x0) dup3(r6, r3, 0x0) r7 = add_key$keyring(&(0x7f0000000540), &(0x7f0000000640)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffc) r8 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000980), 0x200000, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r4, 0x81f8943c, &(0x7f000001a000)={0x0, ""/256, 0x0, 0x0, 0x0, 0x0, ""/16, ""/16, ""/16, 0x0}) ioctl$BTRFS_IOC_SUBVOL_CREATE_V2(r5, 0x50009418, &(0x7f000001a200)={{r8}, r9, 0x2, @inherit={0x58, &(0x7f00000009c0)={0x1, 0x2, 0x8, 0x7, {0x14, 0x1000, 0x5, 0x7, 0x4}, [0xffff, 0x3]}}, @subvolid=0x4}) ioctl$BTRFS_IOC_BALANCE(r5, 0x5000940c, 0x0) keyctl$search(0xa, r2, &(0x7f0000000200)='keyring\x00', &(0x7f0000000500)={'syz', 0x0}, r7) writev(r3, &(0x7f0000000300)=[{&(0x7f00000000c0)='0', 0x1}, {&(0x7f00000003c0)='7', 0x1}], 0x2) [ 2006.477998] new mount options do not match the existing superblock, will be ignored [ 2006.494383] new mount options do not match the existing superblock, will be ignored [ 2006.527860] hfs: invalid gid -1 [ 2006.537677] hfs: uid requires an argument [ 2006.551308] hfs: unable to parse mount options [ 2006.564495] hfs: unable to parse mount options 16:34:50 executing program 2: r0 = request_key(0x0, 0x0, 0x0, 0xfffffffffffffffd) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) perf_event_open(&(0x7f00000007c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0xe5e}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) keyctl$read(0xb, 0x0, &(0x7f0000000a40)=""/102400, 0x19000) keyctl$search(0xa, 0x0, &(0x7f00000008c0)='keyring\x00', &(0x7f0000000900)={'syz', 0x1}, 0xfffffffffffffffd) request_key(&(0x7f00000006c0)='dns_resolver\x00', &(0x7f0000000700)={'syz', 0x3}, &(0x7f0000000940)='\x00', 0xfffffffffffffffd) r1 = add_key(0x0, &(0x7f0000000400)={'syz', 0x3}, &(0x7f0000000440), 0x0, r0) keyctl$search(0xa, 0x0, 0x0, &(0x7f0000000340)={'syz', 0x1}, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000140)='cpuset\x00', 0x0, 0x0) add_key$keyring(&(0x7f0000000100), 0x0, 0x0, 0x0, r0) r2 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) request_key(0x0, &(0x7f00000005c0)={'syz', 0x0}, 0x0, 0xfffffffffffffff9) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = openat$cgroup_int(r2, &(0x7f00000001c0)='cpuset.sched_load_balance\x00', 0x2, 0x0) dup3(r4, r2, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x200000, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f000001a000)={0x0, ""/256, 0x0, 0x0, 0x0, 0x0, ""/16, ""/16, ""/16, 0x0}) ioctl$BTRFS_IOC_SUBVOL_CREATE_V2(r3, 0x50009418, &(0x7f000001a200)={{}, r5, 0x2, @inherit={0x58, &(0x7f00000009c0)={0x1, 0x2, 0x8, 0x0, {0x0, 0x0, 0x0, 0x0, 0x4}, [0x0, 0x0]}}, @subvolid=0x4}) ioctl$BTRFS_IOC_BALANCE(0xffffffffffffffff, 0x5000940c, 0x0) keyctl$search(0xa, r1, &(0x7f0000000200)='keyring\x00', &(0x7f0000000500)={'syz', 0x0}, 0x0) writev(r2, &(0x7f0000000300)=[{&(0x7f00000000c0)='0', 0x1}, {&(0x7f00000003c0)='7', 0x1}], 0x2) 16:34:50 executing program 1: syz_mount_image$hfs(&(0x7f0000000240), &(0x7f0000000380)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x3, &(0x7f0000000780)=ANY=[@ANYBLOB='quiet,gid=', @ANYRESHEX, @ANYBLOB="2c2a7270653d7614866b2c75693df589299908000000450000005d38ff0c0071446a0c48dba349ba347528523876dc8d7918ecea1024ba9669ff19a9ab5e27062b1dae8d8c0eb880008164ed9d8093fdc35f282dee56df9531b6e0c94b43c314af69146a70075499da5e7f927d3c672787e3d33a6071ff2c1483a1a7cfb34131bfee72f86068d0966d", @ANYRESHEX, @ANYBLOB=',codepage=ascii,rootcontext=sysadm_u,\x00'], 0x1, 0x235, &(0x7f0000000000)="$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") 16:34:50 executing program 0: r0 = request_key(0x0, 0x0, 0x0, 0xfffffffffffffffd) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) r1 = add_key$keyring(0x0, &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000740)=@filename='./file0\x00', &(0x7f0000000780)='./file0\x00', &(0x7f0000000840)='gadgetfs\x00', 0x10, &(0x7f0000000880)='keyring\x00') perf_event_open(&(0x7f00000007c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x12c00, 0x0, 0xe5e}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) writev(0xffffffffffffffff, 0x0, 0x0) r2 = add_key(&(0x7f0000000240)='big_key\x00', &(0x7f0000000280)={'syz', 0x3}, &(0x7f0000019a40)="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", 0x5bd, 0xfffffffffffffffd) keyctl$read(0xb, r2, &(0x7f0000000a40)=""/102400, 0x19000) keyctl$search(0xa, r2, &(0x7f00000008c0)='keyring\x00', &(0x7f0000000900)={'syz', 0x1}, 0xfffffffffffffffd) request_key(&(0x7f00000006c0)='dns_resolver\x00', &(0x7f0000000700)={'syz', 0x3}, &(0x7f0000000940)='\x00', 0xfffffffffffffffd) r3 = add_key(&(0x7f0000000380)='id_resolver\x00', &(0x7f0000000400)={'syz', 0x3}, &(0x7f0000000440)="e09e6dda135ac7c467011f", 0xb, r0) keyctl$search(0xa, r1, 0x0, &(0x7f0000000340)={'syz', 0x1}, r3) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000140)='cpuset\x00', 0x0, 0x0) add_key$keyring(&(0x7f0000000100), &(0x7f0000000180)={'syz', 0x0}, 0x0, 0x0, r0) r4 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r5 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) open(&(0x7f00000002c0)='./file0\x00', 0x98d00, 0x8) request_key(&(0x7f0000000580)='logon\x00', &(0x7f00000005c0)={'syz', 0x0}, &(0x7f0000000600)='\x1f-)\x00', 0xfffffffffffffff9) add_key$fscrypt_provisioning(&(0x7f0000000480), &(0x7f00000004c0)={'syz', 0x0}, &(0x7f0000000640)=ANY=[], 0x48, r0) write$rfkill(r5, &(0x7f0000000040)={0x0, 0x0, 0x3}, 0x8) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = openat$cgroup_int(r4, &(0x7f00000001c0)='cpuset.sched_load_balance\x00', 0x2, 0x0) dup3(r7, r4, 0x0) r8 = add_key$keyring(&(0x7f0000000540), &(0x7f0000000640)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffc) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r5, 0x81f8943c, &(0x7f000001a000)={0x0, ""/256, 0x0, 0x0, 0x0, 0x0, ""/16, ""/16, ""/16, 0x0}) ioctl$BTRFS_IOC_SUBVOL_CREATE_V2(r6, 0x50009418, &(0x7f000001a200)={{}, r9, 0x2, @inherit={0x58, &(0x7f00000009c0)={0x1, 0x2, 0x8, 0x7, {0x14, 0x1000, 0x5, 0x7, 0x4}, [0xffff, 0x3]}}, @subvolid=0x4}) ioctl$BTRFS_IOC_BALANCE(r6, 0x5000940c, 0x0) keyctl$search(0xa, r3, &(0x7f0000000200)='keyring\x00', &(0x7f0000000500)={'syz', 0x0}, r8) writev(r4, &(0x7f0000000300)=[{&(0x7f00000000c0)='0', 0x1}, {&(0x7f00000003c0)='7', 0x1}], 0x2) [ 2006.658680] new mount options do not match the existing superblock, will be ignored 16:34:50 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000140)={0x0, 0x0}, &(0x7f0000cab000)=0x6e) syz_mount_image$hfs(&(0x7f0000000240), &(0x7f0000000380)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x3, &(0x7f0000000400)=ANY=[@ANYBLOB="71756965742c706172743d3078303030303030303030303031303030312c747970653d7614866b2c7569643d", @ANYRESHEX=r1, @ANYBLOB=',codepage=Zscii,rootcontext=sysadm_u,\x00'], 0x1, 0x235, &(0x7f0000000000)="$eJzs3c9qE1EUx/HfvYkabanTPyK4rBZcSVs34kaQPIQrUZsIxVBBK6grcS0+gHtfwYdwJb6Arlz5ANmN3DM3zTRmMmk1ubT9fiBh2rln5pzOTO89gVIBOLPut398vv0rvJzUUEPSXclLaklNSVd0tfVqb393v9ftTDpQwyLCy6mIdH+N2dnrjgsNcRYRZeGrphbL38Ns5Hme/0ydBJKzp38ML12IT6ftb809s9l4lzqBxFxffb3WUuo8AABpxfnfx3l+Ma7fvZc24rR/qub/fuoEEivN/9Zl5S5c38u2a9jvWQsX9vtBl3icc51XcWcdWmC6uq7ScvEXn+72urd2nvc6Xu91LyoNW7P3TnHrDtRkuz6mN53g+LUvWA3nQg3bFfmv/t8z1nNf3Tf30GX6pM7B+q+Zu3CZ7EplI1eqyH+z+ohWZVaMqqhy2U5yLZ4hqqmyNb4j0eCOWtbhDwiyujwtamUkqqhuqyZqdWzUdk3U2mjU8G6ujpw199E9cOv6rS9ql9b/Pvy0NzTNkxnG2Mh4Z0ysp2kjsykS80cqA//mg57ojpZevnn77HGv133BBhtssHGwkfoXFOZheNFTZ4JEwrrLFf1fqV/ZtBYpvGUT1ul53cFLR9yq6A1W7P3SkTq4heoObtqe6/pN6cb0Z8xinqeEa+u7HvH5PwAAAAAAAAAAAAAAAAAAwEkzjz8nSF0jAAAAAAAAAAAAAAAAAAAAAAAnHf//Fzi7/gQAAP//6oSCGA==") 16:34:50 executing program 5: r0 = request_key(0x0, 0x0, 0x0, 0xfffffffffffffffd) mkdir(0x0, 0x0) r1 = add_key$keyring(0x0, &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000740)=@filename='./file0\x00', &(0x7f0000000780)='./file0\x00', &(0x7f0000000840)='gadgetfs\x00', 0x10, &(0x7f0000000880)='keyring\x00') perf_event_open(&(0x7f00000007c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x12c00, 0x0, 0xe5e}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) writev(0xffffffffffffffff, 0x0, 0x0) r2 = add_key(&(0x7f0000000240)='big_key\x00', &(0x7f0000000280)={'syz', 0x3}, &(0x7f0000019a40)="4195738ac28ccd83aa93c4ecacdaca3d34104be4cc5531c4091facf7f777321e84e49e039122a2d1cf7fea6a02aac8944c27ba038156bc10c0f7a6b26fbf382f67959d856600881f0e692c60f12ace775aab8d775dc2586454918a0db1811f5e8086f1a9805166c870b8387d380d5115af5841dad21f629e05f4b51e362c46b58a7dc2855c5189bff60d02c05ba67c297aa0ad05b93b1ee2fffae13fe5764d4e2a214e15093841b1551d518a669fa94e8918bfdd6573d5c0275a9b91ddb843775f78574891e03697f6ca290be6599b671093898a82e7905ed7c7fd8e8b422ebf12e5b543885596fc5c305d497407ffe73bd543f79c983f0807ae7e13fb5053fd7a07dddf8ec739418b59d67219f008f540161cec3bfd1b3097aad497248b221d572a9eb1bad6d921fcdcfdfacf8d1e392635168747056ec8a3fc45b3027293a517d50ea789294f132f2392919dc81ba5eb02e27e116cc300000000b6c0e39688425a3cb17d35f4b1eec0a37193f233c6655c6f40c09b4ea04c8880a431a8274127d56c3c8cab73a5fcf2b604b83658344e323eeedb0b283b0b3616236e904a42fed9fc8f4c131b047bfd5d7586e6a28032a4584fd5933472ce49dfdc99976166bb37eb1679b22249a222ffab17948dd6cc6f23f42ecd32a980ab8fc7c7d2da1a91f1db1187066c144bcbdb46240b7ef7ed28da4a358295b6104e4c60b09654e79f766e19e44174e94fa41d358d3dd901c060a06a388727be1092a37c0015695b1363ed018e724947983aa6b5974daf6388547cdacbd44a1282c3b9130cbf9536c29a523980b9e4328d1a7c0de8b636d7dfdee36434125948b1d802d5d143645c3a5f8da50adeef6e4f715361908a20cb998d3e0907aef9fdd19bb79be8c510b8aa04600163636c1d1f36f3834ffa3c7369e1d8ed9348bc339da2a525c4f165c0caebb7a4ee632a37a43897084e3c07a5ed8b505a51a4777095060b0ff6a6442206244dd9a13b5ba52b07c718e9eaad10befd12be35dc50283d584035d75e4917548ff58045b88d29b6826ceb6d44fb54ba3ef7944da6e86c0f2d0bc0bd725aa9193b3de4837634ead361d9b2ff5ae4de005f53d48cba029b43eb35fbedd0b5397918a9324b6e1f1d88399d8ad69b7d79e89ded6fe81fd1200f95c831f8c60dc1483e97052f61d0a643df0c2e1b0ba7d00b0692efd1bfc1ece10c2e785e3cb3b0dfbdbd722b6e53e5a2884b1cc5d939a572564bc8a2260e8718230878edb3a877f5c585f4373ef8e0e1cff5dacf96862906ff37eec18ba706d22b101965eaf5f5e29f544977896117e25ceb572f3443eddf9651c2ac69c911b21fd69e59ee57ebe4c549ff2a3dcd904656663039789f022a6caa7f76640e75efdba82dabacf8c0112bd4e62a3a9e69a9824c1af45cf86b307d9749937dd08b6ef49860cda5da7bb886f92db7cd43a869aa646a6da291a75ff28c4d728b1377b8e80233b33e724a60c0a015ec75cd86af04a4bd43964d8f7ba781a99d0cd7ff7e189fc91801655cb1b60e6bc3af747655341deceadbed3d76bdfae92389cc87c417e0f58f3fbcc56ff347467a20773146a81090ff42bbb5383d74108028f5fa532c647746054c312e2e4c085f58d93bec6da7c2bfd99fc59c1631cc71110acc2bf352b994e2a246be3cc1d240fa0c60eb04b92a9673d2ac2bba7f322ddbbd74712b0ec459050586523bd0b0505174a701206e47f2bb7fe20caf5ed73d33447b89432802e7d4606512e217aedf78c871e10cfbdf202efbf3fd8495b6be18cde726dc1fefc01921e9d1f15c8301376c33b5a698d0f7d5f317835d74857e121fe820d93f6b757c9938ec81f9b19a4b0d4ed35d1309fbcb285cf7717e9e27aaaba9d7d742fcfd786eacd993fb119e1d52908ca7ce2135046fa95805704c6258fd1b5fc1434af7ab99609820d73627080d43bcaeeb42ce423e17aa4df3a6994ead3133e2ecfbc6fa308c6b71b78cbab273641970b49e15d0dbe7aea716eaf6cf40f90d0d7d3d8bf1d165d25d5f6f6376416b9dd13731c5c2fdadee8e48c76430cccb21d8e6c659", 0x5bd, 0xfffffffffffffffd) keyctl$read(0xb, r2, &(0x7f0000000a40)=""/102400, 0x19000) keyctl$search(0xa, r2, &(0x7f00000008c0)='keyring\x00', &(0x7f0000000900)={'syz', 0x1}, 0xfffffffffffffffd) request_key(&(0x7f00000006c0)='dns_resolver\x00', &(0x7f0000000700)={'syz', 0x3}, &(0x7f0000000940)='\x00', 0xfffffffffffffffd) r3 = add_key(&(0x7f0000000380)='id_resolver\x00', &(0x7f0000000400)={'syz', 0x3}, &(0x7f0000000440)="e09e6dda135ac7c467011f", 0xb, r0) keyctl$search(0xa, r1, 0x0, &(0x7f0000000340)={'syz', 0x1}, r3) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000140)='cpuset\x00', 0x0, 0x0) add_key$keyring(&(0x7f0000000100), &(0x7f0000000180)={'syz', 0x0}, 0x0, 0x0, r0) r4 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r5 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) request_key(&(0x7f0000000580)='logon\x00', &(0x7f00000005c0)={'syz', 0x0}, &(0x7f0000000600)='\x1f-)\x00', 0xfffffffffffffff9) add_key$fscrypt_provisioning(&(0x7f0000000480), &(0x7f00000004c0)={'syz', 0x0}, &(0x7f0000000640)=ANY=[], 0x48, r0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = openat$cgroup_int(r4, &(0x7f00000001c0)='cpuset.sched_load_balance\x00', 0x2, 0x0) dup3(r7, r4, 0x0) add_key$keyring(&(0x7f0000000540), &(0x7f0000000640)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffc) r8 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000980), 0x200000, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r5, 0x81f8943c, &(0x7f000001a000)={0x0, ""/256, 0x0, 0x0, 0x0, 0x0, ""/16, ""/16, ""/16, 0x0}) ioctl$BTRFS_IOC_SUBVOL_CREATE_V2(r6, 0x50009418, &(0x7f000001a200)={{r8}, r9, 0x2, @inherit={0x58, &(0x7f00000009c0)={0x1, 0x2, 0x8, 0x7, {0x14, 0x1000, 0x5, 0x7, 0x4}, [0xffff, 0x3]}}, @subvolid=0x4}) writev(r4, &(0x7f0000000300)=[{&(0x7f00000000c0)='0', 0x1}, {&(0x7f00000003c0)='7', 0x1}], 0x2) 16:34:50 executing program 4: r0 = request_key(0x0, 0x0, 0x0, 0xfffffffffffffffd) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) r1 = add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000780)='./file0\x00', &(0x7f0000000840)='gadgetfs\x00', 0x0, &(0x7f0000000880)='keyring\x00') perf_event_open(&(0x7f00000007c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x12c00, 0x0, 0xe5e}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) writev(0xffffffffffffffff, 0x0, 0x0) keyctl$read(0xb, 0x0, &(0x7f0000000a40)=""/102400, 0x19000) keyctl$search(0xa, 0x0, 0x0, 0x0, 0xfffffffffffffffd) request_key(&(0x7f00000006c0)='dns_resolver\x00', &(0x7f0000000700)={'syz', 0x3}, &(0x7f0000000940)='\x00', 0xfffffffffffffffd) r2 = add_key(&(0x7f0000000380)='id_resolver\x00', 0x0, 0x0, 0x0, r0) keyctl$search(0xa, r1, 0x0, &(0x7f0000000340)={'syz', 0x1}, r2) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000140)='cpuset\x00', 0x0, 0x0) add_key$keyring(&(0x7f0000000100), &(0x7f0000000180)={'syz', 0x0}, 0x0, 0x0, r0) r3 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r4 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) open(&(0x7f00000002c0)='./file0\x00', 0x98d00, 0x8) request_key(&(0x7f0000000580)='logon\x00', &(0x7f00000005c0)={'syz', 0x0}, &(0x7f0000000600)='\x1f-)\x00', 0xfffffffffffffff9) write$rfkill(r4, &(0x7f0000000040)={0x0, 0x0, 0x3}, 0x8) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = openat$cgroup_int(r3, &(0x7f00000001c0)='cpuset.sched_load_balance\x00', 0x2, 0x0) dup3(r6, r3, 0x0) r7 = add_key$keyring(&(0x7f0000000540), &(0x7f0000000640)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffc) r8 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000980), 0x200000, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r4, 0x81f8943c, &(0x7f000001a000)={0x0, ""/256, 0x0, 0x0, 0x0, 0x0, ""/16, ""/16, ""/16, 0x0}) ioctl$BTRFS_IOC_SUBVOL_CREATE_V2(r5, 0x50009418, &(0x7f000001a200)={{r8}, r9, 0x2, @inherit={0x58, &(0x7f00000009c0)={0x1, 0x2, 0x8, 0x7, {0x14, 0x1000, 0x5, 0x7, 0x4}, [0xffff, 0x3]}}, @subvolid=0x4}) ioctl$BTRFS_IOC_BALANCE(r5, 0x5000940c, 0x0) keyctl$search(0xa, r2, &(0x7f0000000200)='keyring\x00', &(0x7f0000000500)={'syz', 0x0}, r7) writev(r3, &(0x7f0000000300)=[{&(0x7f00000000c0)='0', 0x1}, {&(0x7f00000003c0)='7', 0x1}], 0x2) [ 2006.829743] new mount options do not match the existing superblock, will be ignored [ 2006.862772] hfs: uid requires an argument [ 2006.867760] hfs: invalid gid -1 [ 2006.871192] hfs: unable to parse mount options [ 2006.880805] new mount options do not match the existing superblock, will be ignored [ 2006.890859] hfs: unable to parse mount options 16:34:51 executing program 1: syz_mount_image$hfs(&(0x7f0000000240), &(0x7f0000000380)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x3, &(0x7f0000000780)=ANY=[@ANYBLOB='quiet,gid=', @ANYRESHEX, @ANYBLOB="2c2a7270653d7614866b2c75693df589299908000000450000005d38ff0c0071446a0c48dba349ba347528523876dc8d7918ecea1024ba9669ff19a9ab5e27062b1dae8d8c0eb880008164ed9d8093fdc35f282dee56df9531b6e0c94b43c314af69146a70075499da5e7f927d3c672787e3d33a6071ff2c1483a1a7cfb34131bfee72f86068d0966d", @ANYRESHEX, @ANYBLOB=',codepage=ascii,rootcontext=sysadm_u,\x00'], 0x1, 0x235, &(0x7f0000000000)="$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") 16:34:51 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000140)={0x0, 0x0}, &(0x7f0000cab000)=0x6e) syz_mount_image$hfs(&(0x7f0000000240), &(0x7f0000000380)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x3, &(0x7f0000000400)=ANY=[@ANYBLOB="71756965742c706172743d3078303030303030303030303031303030312c747970653d7614866b2c7569643d", @ANYRESHEX=r1, @ANYBLOB=',codepage=Zscii,rootcontext=sysadm_u,\x00'], 0x1, 0x235, &(0x7f0000000000)="$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") 16:34:51 executing program 2: r0 = request_key(0x0, 0x0, 0x0, 0xfffffffffffffffd) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) perf_event_open(&(0x7f00000007c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0xe5e}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) keyctl$read(0xb, 0x0, &(0x7f0000000a40)=""/102400, 0x19000) keyctl$search(0xa, 0x0, &(0x7f00000008c0)='keyring\x00', &(0x7f0000000900)={'syz', 0x1}, 0xfffffffffffffffd) request_key(&(0x7f00000006c0)='dns_resolver\x00', &(0x7f0000000700)={'syz', 0x3}, &(0x7f0000000940)='\x00', 0xfffffffffffffffd) add_key(0x0, &(0x7f0000000400)={'syz', 0x3}, &(0x7f0000000440), 0x0, r0) keyctl$search(0xa, 0x0, 0x0, &(0x7f0000000340)={'syz', 0x1}, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000140)='cpuset\x00', 0x0, 0x0) add_key$keyring(&(0x7f0000000100), 0x0, 0x0, 0x0, r0) r1 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) request_key(0x0, &(0x7f00000005c0)={'syz', 0x0}, 0x0, 0xfffffffffffffff9) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = openat$cgroup_int(r1, &(0x7f00000001c0)='cpuset.sched_load_balance\x00', 0x2, 0x0) dup3(r3, r1, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x200000, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f000001a000)={0x0, ""/256, 0x0, 0x0, 0x0, 0x0, ""/16, ""/16, ""/16, 0x0}) ioctl$BTRFS_IOC_SUBVOL_CREATE_V2(r2, 0x50009418, &(0x7f000001a200)={{}, r4, 0x2, @inherit={0x58, &(0x7f00000009c0)={0x1, 0x2, 0x8, 0x0, {0x0, 0x0, 0x0, 0x0, 0x4}, [0x0, 0x0]}}, @subvolid=0x4}) ioctl$BTRFS_IOC_BALANCE(0xffffffffffffffff, 0x5000940c, 0x0) keyctl$search(0xa, 0x0, &(0x7f0000000200)='keyring\x00', &(0x7f0000000500)={'syz', 0x0}, 0x0) writev(r1, &(0x7f0000000300)=[{&(0x7f00000000c0)='0', 0x1}, {&(0x7f00000003c0)='7', 0x1}], 0x2) 16:34:51 executing program 5: r0 = request_key(0x0, 0x0, 0x0, 0xfffffffffffffffd) mkdir(0x0, 0x0) r1 = add_key$keyring(0x0, &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000740)=@filename='./file0\x00', &(0x7f0000000780)='./file0\x00', &(0x7f0000000840)='gadgetfs\x00', 0x10, &(0x7f0000000880)='keyring\x00') perf_event_open(&(0x7f00000007c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x12c00, 0x0, 0xe5e}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) writev(0xffffffffffffffff, 0x0, 0x0) r2 = add_key(&(0x7f0000000240)='big_key\x00', &(0x7f0000000280)={'syz', 0x3}, &(0x7f0000019a40)="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", 0x5bd, 0xfffffffffffffffd) keyctl$read(0xb, r2, &(0x7f0000000a40)=""/102400, 0x19000) keyctl$search(0xa, r2, &(0x7f00000008c0)='keyring\x00', &(0x7f0000000900)={'syz', 0x1}, 0xfffffffffffffffd) request_key(&(0x7f00000006c0)='dns_resolver\x00', &(0x7f0000000700)={'syz', 0x3}, &(0x7f0000000940)='\x00', 0xfffffffffffffffd) r3 = add_key(&(0x7f0000000380)='id_resolver\x00', &(0x7f0000000400)={'syz', 0x3}, &(0x7f0000000440)="e09e6dda135ac7c467011f", 0xb, r0) keyctl$search(0xa, r1, 0x0, &(0x7f0000000340)={'syz', 0x1}, r3) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000140)='cpuset\x00', 0x0, 0x0) add_key$keyring(&(0x7f0000000100), &(0x7f0000000180)={'syz', 0x0}, 0x0, 0x0, r0) r4 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r5 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) request_key(&(0x7f0000000580)='logon\x00', &(0x7f00000005c0)={'syz', 0x0}, &(0x7f0000000600)='\x1f-)\x00', 0xfffffffffffffff9) add_key$fscrypt_provisioning(&(0x7f0000000480), &(0x7f00000004c0)={'syz', 0x0}, &(0x7f0000000640)=ANY=[], 0x48, r0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = openat$cgroup_int(r4, &(0x7f00000001c0)='cpuset.sched_load_balance\x00', 0x2, 0x0) dup3(r7, r4, 0x0) add_key$keyring(&(0x7f0000000540), &(0x7f0000000640)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffc) r8 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000980), 0x200000, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r5, 0x81f8943c, &(0x7f000001a000)={0x0, ""/256, 0x0, 0x0, 0x0, 0x0, ""/16, ""/16, ""/16, 0x0}) ioctl$BTRFS_IOC_SUBVOL_CREATE_V2(r6, 0x50009418, &(0x7f000001a200)={{r8}, r9, 0x2, @inherit={0x58, &(0x7f00000009c0)={0x1, 0x2, 0x8, 0x7, {0x14, 0x1000, 0x5, 0x7, 0x4}, [0xffff, 0x3]}}, @subvolid=0x4}) writev(r4, &(0x7f0000000300)=[{&(0x7f00000000c0)='0', 0x1}, {&(0x7f00000003c0)='7', 0x1}], 0x2) [ 2007.026979] new mount options do not match the existing superblock, will be ignored 16:34:51 executing program 4: r0 = request_key(0x0, 0x0, 0x0, 0xfffffffffffffffd) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) r1 = add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000780)='./file0\x00', &(0x7f0000000840)='gadgetfs\x00', 0x0, &(0x7f0000000880)='keyring\x00') perf_event_open(&(0x7f00000007c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x12c00, 0x0, 0xe5e}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) writev(0xffffffffffffffff, 0x0, 0x0) keyctl$read(0xb, 0x0, &(0x7f0000000a40)=""/102400, 0x19000) keyctl$search(0xa, 0x0, 0x0, 0x0, 0xfffffffffffffffd) request_key(&(0x7f00000006c0)='dns_resolver\x00', &(0x7f0000000700)={'syz', 0x3}, &(0x7f0000000940)='\x00', 0xfffffffffffffffd) r2 = add_key(&(0x7f0000000380)='id_resolver\x00', 0x0, 0x0, 0x0, r0) keyctl$search(0xa, r1, 0x0, &(0x7f0000000340)={'syz', 0x1}, r2) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000140)='cpuset\x00', 0x0, 0x0) add_key$keyring(&(0x7f0000000100), &(0x7f0000000180)={'syz', 0x0}, 0x0, 0x0, r0) r3 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r4 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) open(&(0x7f00000002c0)='./file0\x00', 0x98d00, 0x8) request_key(&(0x7f0000000580)='logon\x00', &(0x7f00000005c0)={'syz', 0x0}, &(0x7f0000000600)='\x1f-)\x00', 0xfffffffffffffff9) write$rfkill(r4, &(0x7f0000000040)={0x0, 0x0, 0x3}, 0x8) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = openat$cgroup_int(r3, &(0x7f00000001c0)='cpuset.sched_load_balance\x00', 0x2, 0x0) dup3(r6, r3, 0x0) r7 = add_key$keyring(&(0x7f0000000540), &(0x7f0000000640)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffc) r8 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000980), 0x200000, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r4, 0x81f8943c, &(0x7f000001a000)={0x0, ""/256, 0x0, 0x0, 0x0, 0x0, ""/16, ""/16, ""/16, 0x0}) ioctl$BTRFS_IOC_SUBVOL_CREATE_V2(r5, 0x50009418, &(0x7f000001a200)={{r8}, r9, 0x2, @inherit={0x58, &(0x7f00000009c0)={0x1, 0x2, 0x8, 0x7, {0x14, 0x1000, 0x5, 0x7, 0x4}, [0xffff, 0x3]}}, @subvolid=0x4}) ioctl$BTRFS_IOC_BALANCE(r5, 0x5000940c, 0x0) keyctl$search(0xa, r2, &(0x7f0000000200)='keyring\x00', &(0x7f0000000500)={'syz', 0x0}, r7) writev(r3, &(0x7f0000000300)=[{&(0x7f00000000c0)='0', 0x1}, {&(0x7f00000003c0)='7', 0x1}], 0x2) 16:34:51 executing program 0: r0 = request_key(0x0, 0x0, 0x0, 0xfffffffffffffffd) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) r1 = add_key$keyring(0x0, &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000740)=@filename='./file0\x00', &(0x7f0000000780)='./file0\x00', &(0x7f0000000840)='gadgetfs\x00', 0x10, &(0x7f0000000880)='keyring\x00') perf_event_open(&(0x7f00000007c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x12c00, 0x0, 0xe5e}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) writev(0xffffffffffffffff, 0x0, 0x0) r2 = add_key(&(0x7f0000000240)='big_key\x00', &(0x7f0000000280)={'syz', 0x3}, &(0x7f0000019a40)="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", 0x5bd, 0xfffffffffffffffd) keyctl$read(0xb, r2, &(0x7f0000000a40)=""/102400, 0x19000) keyctl$search(0xa, r2, &(0x7f00000008c0)='keyring\x00', &(0x7f0000000900)={'syz', 0x1}, 0xfffffffffffffffd) request_key(&(0x7f00000006c0)='dns_resolver\x00', &(0x7f0000000700)={'syz', 0x3}, &(0x7f0000000940)='\x00', 0xfffffffffffffffd) r3 = add_key(&(0x7f0000000380)='id_resolver\x00', &(0x7f0000000400)={'syz', 0x3}, &(0x7f0000000440)="e09e6dda135ac7c467011f", 0xb, r0) keyctl$search(0xa, r1, 0x0, &(0x7f0000000340)={'syz', 0x1}, r3) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000140)='cpuset\x00', 0x0, 0x0) add_key$keyring(&(0x7f0000000100), &(0x7f0000000180)={'syz', 0x0}, 0x0, 0x0, r0) r4 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r5 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) open(&(0x7f00000002c0)='./file0\x00', 0x98d00, 0x8) request_key(&(0x7f0000000580)='logon\x00', &(0x7f00000005c0)={'syz', 0x0}, &(0x7f0000000600)='\x1f-)\x00', 0xfffffffffffffff9) add_key$fscrypt_provisioning(&(0x7f0000000480), &(0x7f00000004c0)={'syz', 0x0}, &(0x7f0000000640)=ANY=[], 0x48, r0) write$rfkill(r5, &(0x7f0000000040)={0x0, 0x0, 0x3}, 0x8) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = openat$cgroup_int(r4, &(0x7f00000001c0)='cpuset.sched_load_balance\x00', 0x2, 0x0) dup3(r7, r4, 0x0) r8 = add_key$keyring(&(0x7f0000000540), &(0x7f0000000640)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffc) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r5, 0x81f8943c, &(0x7f000001a000)={0x0, ""/256, 0x0, 0x0, 0x0, 0x0, ""/16, ""/16, ""/16, 0x0}) ioctl$BTRFS_IOC_SUBVOL_CREATE_V2(r6, 0x50009418, &(0x7f000001a200)={{}, r9, 0x2, @inherit={0x58, &(0x7f00000009c0)={0x1, 0x2, 0x8, 0x7, {0x14, 0x1000, 0x5, 0x7, 0x4}, [0xffff, 0x3]}}, @subvolid=0x4}) ioctl$BTRFS_IOC_BALANCE(r6, 0x5000940c, 0x0) keyctl$search(0xa, r3, &(0x7f0000000200)='keyring\x00', &(0x7f0000000500)={'syz', 0x0}, r8) writev(r4, &(0x7f0000000300)=[{&(0x7f00000000c0)='0', 0x1}, {&(0x7f00000003c0)='7', 0x1}], 0x2) [ 2007.129321] hfs: invalid gid -1 [ 2007.150323] new mount options do not match the existing superblock, will be ignored [ 2007.161764] hfs: unable to parse mount options 16:34:51 executing program 1: syz_mount_image$hfs(&(0x7f0000000240), &(0x7f0000000380)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x3, &(0x7f0000000780)=ANY=[@ANYBLOB='quiet,gid=', @ANYRESHEX, @ANYBLOB="2c2a7270653d7614866b2c75693df589299908000000450000005d38ff0c0071446a0c48dba349ba347528523876dc8d7918ecea1024ba9669ff19a9ab5e27062b1dae8d8c0eb880008164ed9d8093fdc35f282dee56df9531b6e0c94b43c314af69146a70075499da5e7f927d3c672787e3d33a6071ff2c1483a1a7cfb34131bfee72f86068d0966d", @ANYRESHEX, @ANYBLOB=',codepage=ascii,rootcontext=sysadm_u,\x00'], 0x1, 0x235, &(0x7f0000000000)="$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") [ 2007.246820] hfs: uid requires an argument [ 2007.272495] hfs: unable to parse mount options 16:34:51 executing program 5: r0 = request_key(0x0, 0x0, 0x0, 0xfffffffffffffffd) mkdir(0x0, 0x0) r1 = add_key$keyring(0x0, &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000740)=@filename='./file0\x00', &(0x7f0000000780)='./file0\x00', &(0x7f0000000840)='gadgetfs\x00', 0x10, &(0x7f0000000880)='keyring\x00') perf_event_open(&(0x7f00000007c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x12c00, 0x0, 0xe5e}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) writev(0xffffffffffffffff, 0x0, 0x0) r2 = add_key(&(0x7f0000000240)='big_key\x00', &(0x7f0000000280)={'syz', 0x3}, &(0x7f0000019a40)="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", 0x5bd, 0xfffffffffffffffd) keyctl$read(0xb, r2, &(0x7f0000000a40)=""/102400, 0x19000) keyctl$search(0xa, r2, &(0x7f00000008c0)='keyring\x00', &(0x7f0000000900)={'syz', 0x1}, 0xfffffffffffffffd) request_key(&(0x7f00000006c0)='dns_resolver\x00', &(0x7f0000000700)={'syz', 0x3}, &(0x7f0000000940)='\x00', 0xfffffffffffffffd) r3 = add_key(&(0x7f0000000380)='id_resolver\x00', &(0x7f0000000400)={'syz', 0x3}, &(0x7f0000000440)="e09e6dda135ac7c467011f", 0xb, r0) keyctl$search(0xa, r1, 0x0, &(0x7f0000000340)={'syz', 0x1}, r3) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000140)='cpuset\x00', 0x0, 0x0) add_key$keyring(&(0x7f0000000100), &(0x7f0000000180)={'syz', 0x0}, 0x0, 0x0, r0) r4 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r5 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) request_key(&(0x7f0000000580)='logon\x00', &(0x7f00000005c0)={'syz', 0x0}, &(0x7f0000000600)='\x1f-)\x00', 0xfffffffffffffff9) add_key$fscrypt_provisioning(&(0x7f0000000480), &(0x7f00000004c0)={'syz', 0x0}, &(0x7f0000000640)=ANY=[], 0x48, r0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = openat$cgroup_int(r4, &(0x7f00000001c0)='cpuset.sched_load_balance\x00', 0x2, 0x0) dup3(r7, r4, 0x0) add_key$keyring(&(0x7f0000000540), &(0x7f0000000640)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffc) r8 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000980), 0x200000, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r5, 0x81f8943c, &(0x7f000001a000)={0x0, ""/256, 0x0, 0x0, 0x0, 0x0, ""/16, ""/16, ""/16, 0x0}) ioctl$BTRFS_IOC_SUBVOL_CREATE_V2(r6, 0x50009418, &(0x7f000001a200)={{r8}, r9, 0x2, @inherit={0x58, &(0x7f00000009c0)={0x1, 0x2, 0x8, 0x7, {0x14, 0x1000, 0x5, 0x7, 0x4}, [0xffff, 0x3]}}, @subvolid=0x4}) writev(r4, &(0x7f0000000300)=[{&(0x7f00000000c0)='0', 0x1}, {&(0x7f00000003c0)='7', 0x1}], 0x2) 16:34:51 executing program 2: r0 = request_key(0x0, 0x0, 0x0, 0xfffffffffffffffd) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) perf_event_open(&(0x7f00000007c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0xe5e}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) keyctl$read(0xb, 0x0, &(0x7f0000000a40)=""/102400, 0x19000) keyctl$search(0xa, 0x0, &(0x7f00000008c0)='keyring\x00', &(0x7f0000000900)={'syz', 0x1}, 0xfffffffffffffffd) request_key(&(0x7f00000006c0)='dns_resolver\x00', &(0x7f0000000700)={'syz', 0x3}, &(0x7f0000000940)='\x00', 0xfffffffffffffffd) add_key(0x0, &(0x7f0000000400)={'syz', 0x3}, &(0x7f0000000440), 0x0, r0) keyctl$search(0xa, 0x0, 0x0, &(0x7f0000000340)={'syz', 0x1}, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000140)='cpuset\x00', 0x0, 0x0) add_key$keyring(&(0x7f0000000100), 0x0, 0x0, 0x0, r0) r1 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) request_key(0x0, &(0x7f00000005c0)={'syz', 0x0}, 0x0, 0xfffffffffffffff9) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = openat$cgroup_int(r1, &(0x7f00000001c0)='cpuset.sched_load_balance\x00', 0x2, 0x0) dup3(r3, r1, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x200000, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f000001a000)={0x0, ""/256, 0x0, 0x0, 0x0, 0x0, ""/16, ""/16, ""/16, 0x0}) ioctl$BTRFS_IOC_SUBVOL_CREATE_V2(r2, 0x50009418, &(0x7f000001a200)={{}, r4, 0x2, @inherit={0x58, &(0x7f00000009c0)={0x1, 0x2, 0x8, 0x0, {0x0, 0x0, 0x0, 0x0, 0x4}, [0x0, 0x0]}}, @subvolid=0x4}) ioctl$BTRFS_IOC_BALANCE(0xffffffffffffffff, 0x5000940c, 0x0) keyctl$search(0xa, 0x0, &(0x7f0000000200)='keyring\x00', &(0x7f0000000500)={'syz', 0x0}, 0x0) writev(r1, &(0x7f0000000300)=[{&(0x7f00000000c0)='0', 0x1}, {&(0x7f00000003c0)='7', 0x1}], 0x2) [ 2007.309538] new mount options do not match the existing superblock, will be ignored 16:34:51 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000140)={0x0, 0x0}, &(0x7f0000cab000)=0x6e) syz_mount_image$hfs(&(0x7f0000000240), &(0x7f0000000380)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x3, &(0x7f0000000400)=ANY=[@ANYBLOB="71756965742c706172743d3078303030303030303030303031303030312c747970653d7614866b2c7569643d", @ANYRESHEX=r1, @ANYBLOB=',codepage=Zscii,rootcontext=sysadm_u,\x00'], 0x1, 0x235, &(0x7f0000000000)="$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") [ 2007.383143] hfs: invalid gid -1 16:34:51 executing program 4: r0 = request_key(0x0, 0x0, 0x0, 0xfffffffffffffffd) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) r1 = add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000780)='./file0\x00', &(0x7f0000000840)='gadgetfs\x00', 0x0, &(0x7f0000000880)='keyring\x00') perf_event_open(&(0x7f00000007c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x12c00, 0x0, 0xe5e}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) writev(0xffffffffffffffff, 0x0, 0x0) keyctl$read(0xb, 0x0, &(0x7f0000000a40)=""/102400, 0x19000) keyctl$search(0xa, 0x0, 0x0, 0x0, 0xfffffffffffffffd) request_key(&(0x7f00000006c0)='dns_resolver\x00', &(0x7f0000000700)={'syz', 0x3}, &(0x7f0000000940)='\x00', 0xfffffffffffffffd) r2 = add_key(&(0x7f0000000380)='id_resolver\x00', 0x0, &(0x7f0000000440), 0x0, r0) keyctl$search(0xa, r1, 0x0, &(0x7f0000000340)={'syz', 0x1}, r2) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000140)='cpuset\x00', 0x0, 0x0) add_key$keyring(&(0x7f0000000100), &(0x7f0000000180)={'syz', 0x0}, 0x0, 0x0, r0) r3 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r4 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) open(&(0x7f00000002c0)='./file0\x00', 0x98d00, 0x8) request_key(&(0x7f0000000580)='logon\x00', &(0x7f00000005c0)={'syz', 0x0}, &(0x7f0000000600)='\x1f-)\x00', 0xfffffffffffffff9) write$rfkill(r4, &(0x7f0000000040)={0x0, 0x0, 0x3}, 0x8) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = openat$cgroup_int(r3, &(0x7f00000001c0)='cpuset.sched_load_balance\x00', 0x2, 0x0) dup3(r6, r3, 0x0) r7 = add_key$keyring(&(0x7f0000000540), &(0x7f0000000640)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffc) r8 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000980), 0x200000, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r4, 0x81f8943c, &(0x7f000001a000)={0x0, ""/256, 0x0, 0x0, 0x0, 0x0, ""/16, ""/16, ""/16, 0x0}) ioctl$BTRFS_IOC_SUBVOL_CREATE_V2(r5, 0x50009418, &(0x7f000001a200)={{r8}, r9, 0x2, @inherit={0x58, &(0x7f00000009c0)={0x1, 0x2, 0x8, 0x7, {0x14, 0x1000, 0x5, 0x7, 0x4}, [0xffff, 0x3]}}, @subvolid=0x4}) ioctl$BTRFS_IOC_BALANCE(r5, 0x5000940c, 0x0) keyctl$search(0xa, r2, &(0x7f0000000200)='keyring\x00', &(0x7f0000000500)={'syz', 0x0}, r7) writev(r3, &(0x7f0000000300)=[{&(0x7f00000000c0)='0', 0x1}, {&(0x7f00000003c0)='7', 0x1}], 0x2) [ 2007.406731] hfs: unable to parse mount options 16:34:51 executing program 1: syz_mount_image$hfs(&(0x7f0000000240), &(0x7f0000000380)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x3, &(0x7f0000000780)=ANY=[@ANYBLOB='quiet,gid=', @ANYRESHEX, @ANYBLOB="2c2a7270653d7614866b2c75693df589299908000000450000005d38ff0c0071446a0c48dba349ba347528523876dc8d7918ecea1024ba9669ff19a9ab5e27062b1dae8d8c0eb880008164ed9d8093fdc35f282dee56df9531b6e0c94b43c314af69146a70075499da5e7f927d3c672787e3d33a6071ff2c1483a1a7cfb34131bfee72f86068d0966d", @ANYRESHEX, @ANYBLOB=',codepage=ascii,rootcontext=sysadm_u,\x00'], 0x1, 0x235, &(0x7f0000000000)="$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") [ 2007.439914] new mount options do not match the existing superblock, will be ignored [ 2007.570391] hfs: uid requires an argument [ 2007.605956] hfs: unable to parse mount options [ 2007.614307] new mount options do not match the existing superblock, will be ignored [ 2007.629735] new mount options do not match the existing superblock, will be ignored 16:34:51 executing program 3: getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000280), 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000140)={0x0, 0x0}, &(0x7f0000cab000)=0x6e) syz_mount_image$hfs(&(0x7f0000000240), &(0x7f0000000380)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x3, &(0x7f0000000400)=ANY=[@ANYBLOB="71756965742c706172743d3078303030303030303030303031303030312c747970653d7614866b2c7569643d", @ANYRESHEX=r1, @ANYBLOB="2c637f6465706167653d61736369692c7361646d5f752c00"], 0x1, 0x235, &(0x7f0000000000)="$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") 16:34:51 executing program 2: r0 = request_key(0x0, 0x0, 0x0, 0xfffffffffffffffd) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) perf_event_open(&(0x7f00000007c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0xe5e}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) keyctl$read(0xb, 0x0, &(0x7f0000000a40)=""/102400, 0x19000) keyctl$search(0xa, 0x0, &(0x7f00000008c0)='keyring\x00', &(0x7f0000000900)={'syz', 0x1}, 0xfffffffffffffffd) request_key(&(0x7f00000006c0)='dns_resolver\x00', &(0x7f0000000700)={'syz', 0x3}, &(0x7f0000000940)='\x00', 0xfffffffffffffffd) add_key(0x0, &(0x7f0000000400)={'syz', 0x3}, &(0x7f0000000440), 0x0, r0) keyctl$search(0xa, 0x0, 0x0, &(0x7f0000000340)={'syz', 0x1}, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000140)='cpuset\x00', 0x0, 0x0) add_key$keyring(&(0x7f0000000100), 0x0, 0x0, 0x0, r0) r1 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) request_key(0x0, &(0x7f00000005c0)={'syz', 0x0}, 0x0, 0xfffffffffffffff9) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = openat$cgroup_int(r1, &(0x7f00000001c0)='cpuset.sched_load_balance\x00', 0x2, 0x0) dup3(r3, r1, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x200000, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f000001a000)={0x0, ""/256, 0x0, 0x0, 0x0, 0x0, ""/16, ""/16, ""/16, 0x0}) ioctl$BTRFS_IOC_SUBVOL_CREATE_V2(r2, 0x50009418, &(0x7f000001a200)={{}, r4, 0x2, @inherit={0x58, &(0x7f00000009c0)={0x1, 0x2, 0x8, 0x0, {0x0, 0x0, 0x0, 0x0, 0x4}, [0x0, 0x0]}}, @subvolid=0x4}) ioctl$BTRFS_IOC_BALANCE(0xffffffffffffffff, 0x5000940c, 0x0) keyctl$search(0xa, 0x0, &(0x7f0000000200)='keyring\x00', &(0x7f0000000500)={'syz', 0x0}, 0x0) writev(r1, &(0x7f0000000300)=[{&(0x7f00000000c0)='0', 0x1}, {&(0x7f00000003c0)='7', 0x1}], 0x2) 16:34:51 executing program 0: r0 = request_key(0x0, 0x0, 0x0, 0xfffffffffffffffd) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) r1 = add_key$keyring(0x0, &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000740)=@filename='./file0\x00', &(0x7f0000000780)='./file0\x00', &(0x7f0000000840)='gadgetfs\x00', 0x10, &(0x7f0000000880)='keyring\x00') perf_event_open(&(0x7f00000007c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x12c00, 0x0, 0xe5e}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) writev(0xffffffffffffffff, 0x0, 0x0) r2 = add_key(&(0x7f0000000240)='big_key\x00', &(0x7f0000000280)={'syz', 0x3}, &(0x7f0000019a40)="4195738ac28ccd83aa93c4ecacdaca3d34104be4cc5531c4091facf7f777321e84e49e039122a2d1cf7fea6a02aac8944c27ba038156bc10c0f7a6b26fbf382f67959d856600881f0e692c60f12ace775aab8d775dc2586454918a0db1811f5e8086f1a9805166c870b8387d380d5115af5841dad21f629e05f4b51e362c46b58a7dc2855c5189bff60d02c05ba67c297aa0ad05b93b1ee2fffae13fe5764d4e2a214e15093841b1551d518a669fa94e8918bfdd6573d5c0275a9b91ddb843775f78574891e03697f6ca290be6599b671093898a82e7905ed7c7fd8e8b422ebf12e5b543885596fc5c305d497407ffe73bd543f79c983f0807ae7e13fb5053fd7a07dddf8ec739418b59d67219f008f540161cec3bfd1b3097aad497248b221d572a9eb1bad6d921fcdcfdfacf8d1e392635168747056ec8a3fc45b3027293a517d50ea789294f132f2392919dc81ba5eb02e27e116cc300000000b6c0e39688425a3cb17d35f4b1eec0a37193f233c6655c6f40c09b4ea04c8880a431a8274127d56c3c8cab73a5fcf2b604b83658344e323eeedb0b283b0b3616236e904a42fed9fc8f4c131b047bfd5d7586e6a28032a4584fd5933472ce49dfdc99976166bb37eb1679b22249a222ffab17948dd6cc6f23f42ecd32a980ab8fc7c7d2da1a91f1db1187066c144bcbdb46240b7ef7ed28da4a358295b6104e4c60b09654e79f766e19e44174e94fa41d358d3dd901c060a06a388727be1092a37c0015695b1363ed018e724947983aa6b5974daf6388547cdacbd44a1282c3b9130cbf9536c29a523980b9e4328d1a7c0de8b636d7dfdee36434125948b1d802d5d143645c3a5f8da50adeef6e4f715361908a20cb998d3e0907aef9fdd19bb79be8c510b8aa04600163636c1d1f36f3834ffa3c7369e1d8ed9348bc339da2a525c4f165c0caebb7a4ee632a37a43897084e3c07a5ed8b505a51a4777095060b0ff6a6442206244dd9a13b5ba52b07c718e9eaad10befd12be35dc50283d584035d75e4917548ff58045b88d29b6826ceb6d44fb54ba3ef7944da6e86c0f2d0bc0bd725aa9193b3de4837634ead361d9b2ff5ae4de005f53d48cba029b43eb35fbedd0b5397918a9324b6e1f1d88399d8ad69b7d79e89ded6fe81fd1200f95c831f8c60dc1483e97052f61d0a643df0c2e1b0ba7d00b0692efd1bfc1ece10c2e785e3cb3b0dfbdbd722b6e53e5a2884b1cc5d939a572564bc8a2260e8718230878edb3a877f5c585f4373ef8e0e1cff5dacf96862906ff37eec18ba706d22b101965eaf5f5e29f544977896117e25ceb572f3443eddf9651c2ac69c911b21fd69e59ee57ebe4c549ff2a3dcd904656663039789f022a6caa7f76640e75efdba82dabacf8c0112bd4e62a3a9e69a9824c1af45cf86b307d9749937dd08b6ef49860cda5da7bb886f92db7cd43a869aa646a6da291a75ff28c4d728b1377b8e80233b33e724a60c0a015ec75cd86af04a4bd43964d8f7ba781a99d0cd7ff7e189fc91801655cb1b60e6bc3af747655341deceadbed3d76bdfae92389cc87c417e0f58f3fbcc56ff347467a20773146a81090ff42bbb5383d74108028f5fa532c647746054c312e2e4c085f58d93bec6da7c2bfd99fc59c1631cc71110acc2bf352b994e2a246be3cc1d240fa0c60eb04b92a9673d2ac2bba7f322ddbbd74712b0ec459050586523bd0b0505174a701206e47f2bb7fe20caf5ed73d33447b89432802e7d4606512e217aedf78c871e10cfbdf202efbf3fd8495b6be18cde726dc1fefc01921e9d1f15c8301376c33b5a698d0f7d5f317835d74857e121fe820d93f6b757c9938ec81f9b19a4b0d4ed35d1309fbcb285cf7717e9e27aaaba9d7d742fcfd786eacd993fb119e1d52908ca7ce2135046fa95805704c6258fd1b5fc1434af7ab99609820d73627080d43bcaeeb42ce423e17aa4df3a6994ead3133e2ecfbc6fa308c6b71b78cbab273641970b49e15d0dbe7aea716eaf6cf40f90d0d7d3d8bf1d165d25d5f6f6376416b9dd13731c5c2fdadee8e48c76430cccb21d8e6c659", 0x5bd, 0xfffffffffffffffd) keyctl$read(0xb, r2, &(0x7f0000000a40)=""/102400, 0x19000) keyctl$search(0xa, r2, &(0x7f00000008c0)='keyring\x00', &(0x7f0000000900)={'syz', 0x1}, 0xfffffffffffffffd) request_key(&(0x7f00000006c0)='dns_resolver\x00', &(0x7f0000000700)={'syz', 0x3}, &(0x7f0000000940)='\x00', 0xfffffffffffffffd) r3 = add_key(&(0x7f0000000380)='id_resolver\x00', &(0x7f0000000400)={'syz', 0x3}, &(0x7f0000000440)="e09e6dda135ac7c467011f", 0xb, r0) keyctl$search(0xa, r1, 0x0, &(0x7f0000000340)={'syz', 0x1}, r3) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000140)='cpuset\x00', 0x0, 0x0) add_key$keyring(&(0x7f0000000100), &(0x7f0000000180)={'syz', 0x0}, 0x0, 0x0, r0) r4 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r5 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) open(&(0x7f00000002c0)='./file0\x00', 0x98d00, 0x8) request_key(&(0x7f0000000580)='logon\x00', &(0x7f00000005c0)={'syz', 0x0}, &(0x7f0000000600)='\x1f-)\x00', 0xfffffffffffffff9) add_key$fscrypt_provisioning(&(0x7f0000000480), &(0x7f00000004c0)={'syz', 0x0}, &(0x7f0000000640)=ANY=[], 0x48, r0) write$rfkill(r5, &(0x7f0000000040)={0x0, 0x0, 0x3}, 0x8) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = openat$cgroup_int(r4, &(0x7f00000001c0)='cpuset.sched_load_balance\x00', 0x2, 0x0) dup3(r7, r4, 0x0) r8 = add_key$keyring(&(0x7f0000000540), &(0x7f0000000640)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffc) r9 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000980), 0x200000, 0x0) ioctl$BTRFS_IOC_SUBVOL_CREATE_V2(r6, 0x50009418, &(0x7f000001a200)={{r9}, 0x0, 0x2, @inherit={0x58, &(0x7f00000009c0)={0x1, 0x2, 0x8, 0x7, {0x14, 0x1000, 0x5, 0x7, 0x4}, [0xffff, 0x3]}}, @subvolid=0x4}) ioctl$BTRFS_IOC_BALANCE(r6, 0x5000940c, 0x0) keyctl$search(0xa, r3, &(0x7f0000000200)='keyring\x00', &(0x7f0000000500)={'syz', 0x0}, r8) writev(r4, &(0x7f0000000300)=[{&(0x7f00000000c0)='0', 0x1}, {&(0x7f00000003c0)='7', 0x1}], 0x2) 16:34:51 executing program 5: r0 = request_key(0x0, 0x0, 0x0, 0xfffffffffffffffd) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) r1 = add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000740)=@filename='./file0\x00', &(0x7f0000000780)='./file0\x00', &(0x7f0000000840)='gadgetfs\x00', 0x10, &(0x7f0000000880)='keyring\x00') perf_event_open(&(0x7f00000007c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x12c00, 0x0, 0xe5e}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) writev(0xffffffffffffffff, 0x0, 0x0) r2 = add_key(&(0x7f0000000240)='big_key\x00', &(0x7f0000000280)={'syz', 0x3}, &(0x7f0000019a40)="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", 0x5bd, 0xfffffffffffffffd) keyctl$read(0xb, r2, &(0x7f0000000a40)=""/102400, 0x19000) keyctl$search(0xa, r2, &(0x7f00000008c0)='keyring\x00', &(0x7f0000000900)={'syz', 0x1}, 0xfffffffffffffffd) request_key(&(0x7f00000006c0)='dns_resolver\x00', &(0x7f0000000700)={'syz', 0x3}, &(0x7f0000000940)='\x00', 0xfffffffffffffffd) r3 = add_key(&(0x7f0000000380)='id_resolver\x00', &(0x7f0000000400)={'syz', 0x3}, &(0x7f0000000440)="e09e6dda135ac7c467011f", 0xb, r0) keyctl$search(0xa, r1, 0x0, &(0x7f0000000340)={'syz', 0x1}, r3) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000140)='cpuset\x00', 0x0, 0x0) add_key$keyring(&(0x7f0000000100), &(0x7f0000000180)={'syz', 0x0}, 0x0, 0x0, r0) r4 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r5 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) request_key(&(0x7f0000000580)='logon\x00', &(0x7f00000005c0)={'syz', 0x0}, &(0x7f0000000600)='\x1f-)\x00', 0xfffffffffffffff9) add_key$fscrypt_provisioning(&(0x7f0000000480), &(0x7f00000004c0)={'syz', 0x0}, &(0x7f0000000640)=ANY=[], 0x48, r0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = openat$cgroup_int(r4, &(0x7f00000001c0)='cpuset.sched_load_balance\x00', 0x2, 0x0) dup3(r7, r4, 0x0) add_key$keyring(&(0x7f0000000540), &(0x7f0000000640)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffc) r8 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000980), 0x200000, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r5, 0x81f8943c, &(0x7f000001a000)={0x0, ""/256, 0x0, 0x0, 0x0, 0x0, ""/16, ""/16, ""/16, 0x0}) ioctl$BTRFS_IOC_SUBVOL_CREATE_V2(r6, 0x50009418, &(0x7f000001a200)={{r8}, r9, 0x2, @inherit={0x58, &(0x7f00000009c0)={0x1, 0x2, 0x8, 0x7, {0x14, 0x1000, 0x5, 0x7, 0x4}, [0xffff, 0x3]}}, @subvolid=0x4}) writev(r4, &(0x7f0000000300)=[{&(0x7f00000000c0)='0', 0x1}, {&(0x7f00000003c0)='7', 0x1}], 0x2) [ 2007.678790] hfs: invalid gid -1 [ 2007.682093] hfs: unable to parse mount options 16:34:51 executing program 1: syz_mount_image$hfs(&(0x7f0000000240), &(0x7f0000000380)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x3, &(0x7f0000000780)=ANY=[@ANYBLOB='quiet,gid=', @ANYRESHEX, @ANYBLOB="2c2a7270653d7614866b2c75693df589299908000000450000005d38ff0c0071446a0c48dba349ba347528523876dc8d7918ecea1024ba9669ff19a9ab5e27062b1dae8d8c0eb880008164ed9d8093fdc35f282dee56df9531b6e0c94b43c314af69146a70075499da5e7f927d3c672787e3d33a6071ff2c1483a1a7cfb34131bfee72f86068d0966d", @ANYRESHEX, @ANYBLOB=',codepage=ascii,rootcontext=sysadm_u,\x00'], 0x1, 0x235, &(0x7f0000000000)="$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") 16:34:51 executing program 4: r0 = request_key(0x0, 0x0, 0x0, 0xfffffffffffffffd) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) r1 = add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000780)='./file0\x00', &(0x7f0000000840)='gadgetfs\x00', 0x0, &(0x7f0000000880)='keyring\x00') perf_event_open(&(0x7f00000007c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x12c00, 0x0, 0xe5e}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) writev(0xffffffffffffffff, 0x0, 0x0) keyctl$read(0xb, 0x0, &(0x7f0000000a40)=""/102400, 0x19000) keyctl$search(0xa, 0x0, 0x0, 0x0, 0xfffffffffffffffd) request_key(&(0x7f00000006c0)='dns_resolver\x00', &(0x7f0000000700)={'syz', 0x3}, &(0x7f0000000940)='\x00', 0xfffffffffffffffd) r2 = add_key(&(0x7f0000000380)='id_resolver\x00', 0x0, &(0x7f0000000440), 0x0, 0x0) keyctl$search(0xa, r1, 0x0, &(0x7f0000000340)={'syz', 0x1}, r2) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000140)='cpuset\x00', 0x0, 0x0) add_key$keyring(&(0x7f0000000100), &(0x7f0000000180)={'syz', 0x0}, 0x0, 0x0, r0) r3 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r4 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) open(&(0x7f00000002c0)='./file0\x00', 0x98d00, 0x8) request_key(&(0x7f0000000580)='logon\x00', &(0x7f00000005c0)={'syz', 0x0}, &(0x7f0000000600)='\x1f-)\x00', 0xfffffffffffffff9) write$rfkill(r4, &(0x7f0000000040)={0x0, 0x0, 0x3}, 0x8) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = openat$cgroup_int(r3, &(0x7f00000001c0)='cpuset.sched_load_balance\x00', 0x2, 0x0) dup3(r6, r3, 0x0) r7 = add_key$keyring(&(0x7f0000000540), &(0x7f0000000640)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffc) r8 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000980), 0x200000, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r4, 0x81f8943c, &(0x7f000001a000)={0x0, ""/256, 0x0, 0x0, 0x0, 0x0, ""/16, ""/16, ""/16, 0x0}) ioctl$BTRFS_IOC_SUBVOL_CREATE_V2(r5, 0x50009418, &(0x7f000001a200)={{r8}, r9, 0x2, @inherit={0x58, &(0x7f00000009c0)={0x1, 0x2, 0x8, 0x7, {0x14, 0x1000, 0x5, 0x7, 0x4}, [0xffff, 0x3]}}, @subvolid=0x4}) ioctl$BTRFS_IOC_BALANCE(r5, 0x5000940c, 0x0) keyctl$search(0xa, r2, &(0x7f0000000200)='keyring\x00', &(0x7f0000000500)={'syz', 0x0}, r7) writev(r3, &(0x7f0000000300)=[{&(0x7f00000000c0)='0', 0x1}, {&(0x7f00000003c0)='7', 0x1}], 0x2) [ 2007.840690] new mount options do not match the existing superblock, will be ignored [ 2007.861593] new mount options do not match the existing superblock, will be ignored [ 2007.888852] hfs: uid requires an argument [ 2007.930803] hfs: unable to parse mount options [ 2007.943993] new mount options do not match the existing superblock, will be ignored 16:34:52 executing program 5: r0 = request_key(0x0, 0x0, 0x0, 0xfffffffffffffffd) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) r1 = add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000740)=@filename='./file0\x00', &(0x7f0000000780)='./file0\x00', &(0x7f0000000840)='gadgetfs\x00', 0x10, &(0x7f0000000880)='keyring\x00') perf_event_open(&(0x7f00000007c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x12c00, 0x0, 0xe5e}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) writev(0xffffffffffffffff, 0x0, 0x0) r2 = add_key(&(0x7f0000000240)='big_key\x00', &(0x7f0000000280)={'syz', 0x3}, &(0x7f0000019a40)="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", 0x5bd, 0xfffffffffffffffd) keyctl$read(0xb, r2, &(0x7f0000000a40)=""/102400, 0x19000) keyctl$search(0xa, r2, &(0x7f00000008c0)='keyring\x00', &(0x7f0000000900)={'syz', 0x1}, 0xfffffffffffffffd) request_key(&(0x7f00000006c0)='dns_resolver\x00', &(0x7f0000000700)={'syz', 0x3}, &(0x7f0000000940)='\x00', 0xfffffffffffffffd) r3 = add_key(&(0x7f0000000380)='id_resolver\x00', &(0x7f0000000400)={'syz', 0x3}, &(0x7f0000000440)="e09e6dda135ac7c467011f", 0xb, r0) keyctl$search(0xa, r1, 0x0, &(0x7f0000000340)={'syz', 0x1}, r3) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000140)='cpuset\x00', 0x0, 0x0) add_key$keyring(&(0x7f0000000100), &(0x7f0000000180)={'syz', 0x0}, 0x0, 0x0, r0) r4 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r5 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) request_key(&(0x7f0000000580)='logon\x00', &(0x7f00000005c0)={'syz', 0x0}, &(0x7f0000000600)='\x1f-)\x00', 0xfffffffffffffff9) add_key$fscrypt_provisioning(&(0x7f0000000480), &(0x7f00000004c0)={'syz', 0x0}, &(0x7f0000000640)=ANY=[], 0x48, r0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = openat$cgroup_int(r4, &(0x7f00000001c0)='cpuset.sched_load_balance\x00', 0x2, 0x0) dup3(r7, r4, 0x0) add_key$keyring(&(0x7f0000000540), &(0x7f0000000640)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffc) r8 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000980), 0x200000, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r5, 0x81f8943c, &(0x7f000001a000)={0x0, ""/256, 0x0, 0x0, 0x0, 0x0, ""/16, ""/16, ""/16, 0x0}) ioctl$BTRFS_IOC_SUBVOL_CREATE_V2(r6, 0x50009418, &(0x7f000001a200)={{r8}, r9, 0x2, @inherit={0x58, &(0x7f00000009c0)={0x1, 0x2, 0x8, 0x7, {0x14, 0x1000, 0x5, 0x7, 0x4}, [0xffff, 0x3]}}, @subvolid=0x4}) writev(r4, &(0x7f0000000300)=[{&(0x7f00000000c0)='0', 0x1}, {&(0x7f00000003c0)='7', 0x1}], 0x2) 16:34:52 executing program 2: r0 = request_key(0x0, 0x0, 0x0, 0xfffffffffffffffd) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) perf_event_open(&(0x7f00000007c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0xe5e}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) keyctl$read(0xb, 0x0, &(0x7f0000000a40)=""/102400, 0x19000) keyctl$search(0xa, 0x0, &(0x7f00000008c0)='keyring\x00', &(0x7f0000000900)={'syz', 0x1}, 0xfffffffffffffffd) request_key(&(0x7f00000006c0)='dns_resolver\x00', &(0x7f0000000700)={'syz', 0x3}, &(0x7f0000000940)='\x00', 0xfffffffffffffffd) add_key(0x0, &(0x7f0000000400)={'syz', 0x3}, &(0x7f0000000440), 0x0, r0) keyctl$search(0xa, 0x0, 0x0, &(0x7f0000000340)={'syz', 0x1}, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000140)='cpuset\x00', 0x0, 0x0) add_key$keyring(&(0x7f0000000100), 0x0, 0x0, 0x0, r0) r1 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) request_key(0x0, &(0x7f00000005c0)={'syz', 0x0}, 0x0, 0xfffffffffffffff9) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = openat$cgroup_int(r1, &(0x7f00000001c0)='cpuset.sched_load_balance\x00', 0x2, 0x0) dup3(r3, r1, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x200000, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f000001a000)={0x0, ""/256, 0x0, 0x0, 0x0, 0x0, ""/16, ""/16, ""/16, 0x0}) ioctl$BTRFS_IOC_SUBVOL_CREATE_V2(r2, 0x50009418, &(0x7f000001a200)={{}, r4, 0x2, @inherit={0x58, &(0x7f00000009c0)={0x1, 0x2, 0x8, 0x0, {0x0, 0x0, 0x0, 0x0, 0x4}, [0x0, 0x0]}}, @subvolid=0x4}) ioctl$BTRFS_IOC_BALANCE(0xffffffffffffffff, 0x5000940c, 0x0) keyctl$search(0xa, 0x0, 0x0, &(0x7f0000000500)={'syz', 0x0}, 0x0) writev(r1, &(0x7f0000000300)=[{&(0x7f00000000c0)='0', 0x1}, {&(0x7f00000003c0)='7', 0x1}], 0x2) [ 2007.973152] new mount options do not match the existing superblock, will be ignored 16:34:52 executing program 3: getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000280), 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000140)={0x0, 0x0}, &(0x7f0000cab000)=0x6e) syz_mount_image$hfs(&(0x7f0000000240), &(0x7f0000000380)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x3, &(0x7f0000000400)=ANY=[@ANYBLOB="71756965742c706172743d3078303030303030303030303031303030312c747970653d7614866b2c7569643d", @ANYRESHEX=r1, @ANYBLOB="2c637f6465706167653d61736369692c7361646d5f752c00"], 0x1, 0x235, &(0x7f0000000000)="$eJzs3c9qE1EUx/HfvYkabanTPyK4rBZcSVs34kaQPIQrUZsIxVBBK6grcS0+gHtfwYdwJb6Arlz5ANmN3DM3zTRmMmk1ubT9fiBh2rln5pzOTO89gVIBOLPut398vv0rvJzUUEPSXclLaklNSVd0tfVqb393v9ftTDpQwyLCy6mIdH+N2dnrjgsNcRYRZeGrphbL38Ns5Hme/0ydBJKzp38ML12IT6ftb809s9l4lzqBxFxffb3WUuo8AABpxfnfx3l+Ma7fvZc24rR/qub/fuoEEivN/9Zl5S5c38u2a9jvWQsX9vtBl3icc51XcWcdWmC6uq7ScvEXn+72urd2nvc6Xu91LyoNW7P3TnHrDtRkuz6mN53g+LUvWA3nQg3bFfmv/t8z1nNf3Tf30GX6pM7B+q+Zu3CZ7EplI1eqyH+z+ohWZVaMqqhy2U5yLZ4hqqmyNb4j0eCOWtbhDwiyujwtamUkqqhuqyZqdWzUdk3U2mjU8G6ujpw199E9cOv6rS9ql9b/Pvy0NzTNkxnG2Mh4Z0ysp2kjsykS80cqA//mg57ojpZevnn77HGv133BBhtssHGwkfoXFOZheNFTZ4JEwrrLFf1fqV/ZtBYpvGUT1ul53cFLR9yq6A1W7P3SkTq4heoObtqe6/pN6cb0Z8xinqeEa+u7HvH5PwAAAAAAAAAAAAAAAAAAwEkzjz8nSF0jAAAAAAAAAAAAAAAAAAAAAAAnHf//Fzi7/gQAAP//6oSCGA==") getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000280), 0x10) (async) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) socket(0x10, 0x2, 0x0) (async) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000140), &(0x7f0000cab000)=0x6e) (async) syz_mount_image$hfs(&(0x7f0000000240), &(0x7f0000000380)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x3, &(0x7f0000000400)=ANY=[@ANYBLOB="71756965742c706172743d3078303030303030303030303031303030312c747970653d7614866b2c7569643d", @ANYRESHEX=r1, @ANYBLOB="2c637f6465706167653d61736369692c7361646d5f752c00"], 0x1, 0x235, &(0x7f0000000000)="$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") (async) [ 2008.059093] hfs: invalid gid -1 [ 2008.067545] hfs: unable to parse mount options 16:34:52 executing program 4: r0 = request_key(0x0, 0x0, 0x0, 0xfffffffffffffffd) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) r1 = add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000780)='./file0\x00', &(0x7f0000000840)='gadgetfs\x00', 0x0, &(0x7f0000000880)='keyring\x00') perf_event_open(&(0x7f00000007c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x12c00, 0x0, 0xe5e}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) writev(0xffffffffffffffff, 0x0, 0x0) keyctl$read(0xb, 0x0, &(0x7f0000000a40)=""/102400, 0x19000) keyctl$search(0xa, 0x0, 0x0, 0x0, 0xfffffffffffffffd) request_key(&(0x7f00000006c0)='dns_resolver\x00', &(0x7f0000000700)={'syz', 0x3}, &(0x7f0000000940)='\x00', 0xfffffffffffffffd) r2 = add_key(&(0x7f0000000380)='id_resolver\x00', 0x0, &(0x7f0000000440), 0x0, 0x0) keyctl$search(0xa, r1, 0x0, &(0x7f0000000340)={'syz', 0x1}, r2) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000140)='cpuset\x00', 0x0, 0x0) add_key$keyring(&(0x7f0000000100), &(0x7f0000000180)={'syz', 0x0}, 0x0, 0x0, r0) r3 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r4 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) open(&(0x7f00000002c0)='./file0\x00', 0x98d00, 0x8) request_key(&(0x7f0000000580)='logon\x00', &(0x7f00000005c0)={'syz', 0x0}, &(0x7f0000000600)='\x1f-)\x00', 0xfffffffffffffff9) write$rfkill(r4, &(0x7f0000000040)={0x0, 0x0, 0x3}, 0x8) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = openat$cgroup_int(r3, &(0x7f00000001c0)='cpuset.sched_load_balance\x00', 0x2, 0x0) dup3(r6, r3, 0x0) r7 = add_key$keyring(&(0x7f0000000540), &(0x7f0000000640)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffc) r8 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000980), 0x200000, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r4, 0x81f8943c, &(0x7f000001a000)={0x0, ""/256, 0x0, 0x0, 0x0, 0x0, ""/16, ""/16, ""/16, 0x0}) ioctl$BTRFS_IOC_SUBVOL_CREATE_V2(r5, 0x50009418, &(0x7f000001a200)={{r8}, r9, 0x2, @inherit={0x58, &(0x7f00000009c0)={0x1, 0x2, 0x8, 0x7, {0x14, 0x1000, 0x5, 0x7, 0x4}, [0xffff, 0x3]}}, @subvolid=0x4}) ioctl$BTRFS_IOC_BALANCE(r5, 0x5000940c, 0x0) keyctl$search(0xa, r2, &(0x7f0000000200)='keyring\x00', &(0x7f0000000500)={'syz', 0x0}, r7) writev(r3, &(0x7f0000000300)=[{&(0x7f00000000c0)='0', 0x1}, {&(0x7f00000003c0)='7', 0x1}], 0x2) 16:34:52 executing program 1: syz_mount_image$hfs(&(0x7f0000000240), &(0x7f0000000380)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x3, &(0x7f0000000780)=ANY=[@ANYBLOB='quiet,gid=', @ANYRESHEX, @ANYBLOB="2c2a7270653d7614866b2c75693df589299908000000450000005d38ff0c0071446a0c48dba349ba347528523876dc8d7918ecea1024ba9669ff19a9ab5e27062b1dae8d8c0eb880008164ed9d8093fdc35f282dee56df9531b6e0c94b43c314af69146a70075499da5e7f927d3c672787e3d33a6071ff2c1483a1a7cfb34131bfee72f86068d0966d", @ANYRESHEX, @ANYBLOB=',codepage=ascii,rootcontext=sysadm_u,\x00'], 0x1, 0x235, &(0x7f0000000000)="$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") 16:34:52 executing program 0: r0 = request_key(0x0, 0x0, 0x0, 0xfffffffffffffffd) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) r1 = add_key$keyring(0x0, &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000740)=@filename='./file0\x00', &(0x7f0000000780)='./file0\x00', &(0x7f0000000840)='gadgetfs\x00', 0x10, &(0x7f0000000880)='keyring\x00') perf_event_open(&(0x7f00000007c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x12c00, 0x0, 0xe5e}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) writev(0xffffffffffffffff, 0x0, 0x0) r2 = add_key(&(0x7f0000000240)='big_key\x00', &(0x7f0000000280)={'syz', 0x3}, &(0x7f0000019a40)="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", 0x5bd, 0xfffffffffffffffd) keyctl$read(0xb, r2, &(0x7f0000000a40)=""/102400, 0x19000) keyctl$search(0xa, r2, &(0x7f00000008c0)='keyring\x00', &(0x7f0000000900)={'syz', 0x1}, 0xfffffffffffffffd) request_key(&(0x7f00000006c0)='dns_resolver\x00', &(0x7f0000000700)={'syz', 0x3}, &(0x7f0000000940)='\x00', 0xfffffffffffffffd) r3 = add_key(&(0x7f0000000380)='id_resolver\x00', &(0x7f0000000400)={'syz', 0x3}, &(0x7f0000000440)="e09e6dda135ac7c467011f", 0xb, r0) keyctl$search(0xa, r1, 0x0, &(0x7f0000000340)={'syz', 0x1}, r3) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000140)='cpuset\x00', 0x0, 0x0) add_key$keyring(&(0x7f0000000100), &(0x7f0000000180)={'syz', 0x0}, 0x0, 0x0, r0) r4 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r5 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) open(&(0x7f00000002c0)='./file0\x00', 0x98d00, 0x8) request_key(&(0x7f0000000580)='logon\x00', &(0x7f00000005c0)={'syz', 0x0}, &(0x7f0000000600)='\x1f-)\x00', 0xfffffffffffffff9) add_key$fscrypt_provisioning(&(0x7f0000000480), &(0x7f00000004c0)={'syz', 0x0}, &(0x7f0000000640)=ANY=[], 0x48, r0) write$rfkill(r5, &(0x7f0000000040)={0x0, 0x0, 0x3}, 0x8) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = openat$cgroup_int(r4, &(0x7f00000001c0)='cpuset.sched_load_balance\x00', 0x2, 0x0) dup3(r7, r4, 0x0) add_key$keyring(&(0x7f0000000540), &(0x7f0000000640)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffc) r8 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000980), 0x200000, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r5, 0x81f8943c, &(0x7f000001a000)={0x0, ""/256, 0x0, 0x0, 0x0, 0x0, ""/16, ""/16, ""/16, 0x0}) ioctl$BTRFS_IOC_SUBVOL_CREATE_V2(r6, 0x50009418, &(0x7f000001a200)={{r8}, r9, 0x2, @inherit={0x58, &(0x7f00000009c0)={0x1, 0x2, 0x8, 0x7, {0x14, 0x1000, 0x5, 0x7, 0x4}, [0xffff, 0x3]}}, @subvolid=0x4}) writev(r4, &(0x7f0000000300)=[{&(0x7f00000000c0)='0', 0x1}, {&(0x7f00000003c0)='7', 0x1}], 0x2) [ 2008.218998] new mount options do not match the existing superblock, will be ignored [ 2008.232763] hfs: uid requires an argument [ 2008.247576] hfs: unable to parse mount options [ 2008.268550] new mount options do not match the existing superblock, will be ignored [ 2008.307767] new mount options do not match the existing superblock, will be ignored 16:34:52 executing program 3: getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000280), 0x10) (async) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000140)={0x0, 0x0}, &(0x7f0000cab000)=0x6e) syz_mount_image$hfs(&(0x7f0000000240), &(0x7f0000000380)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x3, &(0x7f0000000400)=ANY=[@ANYBLOB="71756965742c706172743d3078303030303030303030303031303030312c747970653d7614866b2c7569643d", @ANYRESHEX=r1, @ANYBLOB="2c637f6465706167653d61736369692c7361646d5f752c00"], 0x1, 0x235, &(0x7f0000000000)="$eJzs3c9qE1EUx/HfvYkabanTPyK4rBZcSVs34kaQPIQrUZsIxVBBK6grcS0+gHtfwYdwJb6Arlz5ANmN3DM3zTRmMmk1ubT9fiBh2rln5pzOTO89gVIBOLPut398vv0rvJzUUEPSXclLaklNSVd0tfVqb393v9ftTDpQwyLCy6mIdH+N2dnrjgsNcRYRZeGrphbL38Ns5Hme/0ydBJKzp38ML12IT6ftb809s9l4lzqBxFxffb3WUuo8AABpxfnfx3l+Ma7fvZc24rR/qub/fuoEEivN/9Zl5S5c38u2a9jvWQsX9vtBl3icc51XcWcdWmC6uq7ScvEXn+72urd2nvc6Xu91LyoNW7P3TnHrDtRkuz6mN53g+LUvWA3nQg3bFfmv/t8z1nNf3Tf30GX6pM7B+q+Zu3CZ7EplI1eqyH+z+ohWZVaMqqhy2U5yLZ4hqqmyNb4j0eCOWtbhDwiyujwtamUkqqhuqyZqdWzUdk3U2mjU8G6ujpw199E9cOv6rS9ql9b/Pvy0NzTNkxnG2Mh4Z0ysp2kjsykS80cqA//mg57ojpZevnn77HGv133BBhtssHGwkfoXFOZheNFTZ4JEwrrLFf1fqV/ZtBYpvGUT1ul53cFLR9yq6A1W7P3SkTq4heoObtqe6/pN6cb0Z8xinqeEa+u7HvH5PwAAAAAAAAAAAAAAAAAAwEkzjz8nSF0jAAAAAAAAAAAAAAAAAAAAAAAnHf//Fzi7/gQAAP//6oSCGA==") [ 2008.333696] hfs: invalid gid -1 [ 2008.350258] hfs: unable to parse mount options 16:34:52 executing program 5: r0 = request_key(0x0, 0x0, 0x0, 0xfffffffffffffffd) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) r1 = add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000740)=@filename='./file0\x00', &(0x7f0000000780)='./file0\x00', &(0x7f0000000840)='gadgetfs\x00', 0x10, &(0x7f0000000880)='keyring\x00') perf_event_open(&(0x7f00000007c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x12c00, 0x0, 0xe5e}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) writev(0xffffffffffffffff, 0x0, 0x0) r2 = add_key(&(0x7f0000000240)='big_key\x00', &(0x7f0000000280)={'syz', 0x3}, &(0x7f0000019a40)="4195738ac28ccd83aa93c4ecacdaca3d34104be4cc5531c4091facf7f777321e84e49e039122a2d1cf7fea6a02aac8944c27ba038156bc10c0f7a6b26fbf382f67959d856600881f0e692c60f12ace775aab8d775dc2586454918a0db1811f5e8086f1a9805166c870b8387d380d5115af5841dad21f629e05f4b51e362c46b58a7dc2855c5189bff60d02c05ba67c297aa0ad05b93b1ee2fffae13fe5764d4e2a214e15093841b1551d518a669fa94e8918bfdd6573d5c0275a9b91ddb843775f78574891e03697f6ca290be6599b671093898a82e7905ed7c7fd8e8b422ebf12e5b543885596fc5c305d497407ffe73bd543f79c983f0807ae7e13fb5053fd7a07dddf8ec739418b59d67219f008f540161cec3bfd1b3097aad497248b221d572a9eb1bad6d921fcdcfdfacf8d1e392635168747056ec8a3fc45b3027293a517d50ea789294f132f2392919dc81ba5eb02e27e116cc300000000b6c0e39688425a3cb17d35f4b1eec0a37193f233c6655c6f40c09b4ea04c8880a431a8274127d56c3c8cab73a5fcf2b604b83658344e323eeedb0b283b0b3616236e904a42fed9fc8f4c131b047bfd5d7586e6a28032a4584fd5933472ce49dfdc99976166bb37eb1679b22249a222ffab17948dd6cc6f23f42ecd32a980ab8fc7c7d2da1a91f1db1187066c144bcbdb46240b7ef7ed28da4a358295b6104e4c60b09654e79f766e19e44174e94fa41d358d3dd901c060a06a388727be1092a37c0015695b1363ed018e724947983aa6b5974daf6388547cdacbd44a1282c3b9130cbf9536c29a523980b9e4328d1a7c0de8b636d7dfdee36434125948b1d802d5d143645c3a5f8da50adeef6e4f715361908a20cb998d3e0907aef9fdd19bb79be8c510b8aa04600163636c1d1f36f3834ffa3c7369e1d8ed9348bc339da2a525c4f165c0caebb7a4ee632a37a43897084e3c07a5ed8b505a51a4777095060b0ff6a6442206244dd9a13b5ba52b07c718e9eaad10befd12be35dc50283d584035d75e4917548ff58045b88d29b6826ceb6d44fb54ba3ef7944da6e86c0f2d0bc0bd725aa9193b3de4837634ead361d9b2ff5ae4de005f53d48cba029b43eb35fbedd0b5397918a9324b6e1f1d88399d8ad69b7d79e89ded6fe81fd1200f95c831f8c60dc1483e97052f61d0a643df0c2e1b0ba7d00b0692efd1bfc1ece10c2e785e3cb3b0dfbdbd722b6e53e5a2884b1cc5d939a572564bc8a2260e8718230878edb3a877f5c585f4373ef8e0e1cff5dacf96862906ff37eec18ba706d22b101965eaf5f5e29f544977896117e25ceb572f3443eddf9651c2ac69c911b21fd69e59ee57ebe4c549ff2a3dcd904656663039789f022a6caa7f76640e75efdba82dabacf8c0112bd4e62a3a9e69a9824c1af45cf86b307d9749937dd08b6ef49860cda5da7bb886f92db7cd43a869aa646a6da291a75ff28c4d728b1377b8e80233b33e724a60c0a015ec75cd86af04a4bd43964d8f7ba781a99d0cd7ff7e189fc91801655cb1b60e6bc3af747655341deceadbed3d76bdfae92389cc87c417e0f58f3fbcc56ff347467a20773146a81090ff42bbb5383d74108028f5fa532c647746054c312e2e4c085f58d93bec6da7c2bfd99fc59c1631cc71110acc2bf352b994e2a246be3cc1d240fa0c60eb04b92a9673d2ac2bba7f322ddbbd74712b0ec459050586523bd0b0505174a701206e47f2bb7fe20caf5ed73d33447b89432802e7d4606512e217aedf78c871e10cfbdf202efbf3fd8495b6be18cde726dc1fefc01921e9d1f15c8301376c33b5a698d0f7d5f317835d74857e121fe820d93f6b757c9938ec81f9b19a4b0d4ed35d1309fbcb285cf7717e9e27aaaba9d7d742fcfd786eacd993fb119e1d52908ca7ce2135046fa95805704c6258fd1b5fc1434af7ab99609820d73627080d43bcaeeb42ce423e17aa4df3a6994ead3133e2ecfbc6fa308c6b71b78cbab273641970b49e15d0dbe7aea716eaf6cf40f90d0d7d3d8bf1d165d25d5f6f6376416b9dd13731c5c2fdadee8e48c76430cccb21d8e6c659", 0x5bd, 0xfffffffffffffffd) keyctl$read(0xb, r2, &(0x7f0000000a40)=""/102400, 0x19000) keyctl$search(0xa, r2, &(0x7f00000008c0)='keyring\x00', &(0x7f0000000900)={'syz', 0x1}, 0xfffffffffffffffd) request_key(&(0x7f00000006c0)='dns_resolver\x00', &(0x7f0000000700)={'syz', 0x3}, &(0x7f0000000940)='\x00', 0xfffffffffffffffd) r3 = add_key(&(0x7f0000000380)='id_resolver\x00', &(0x7f0000000400)={'syz', 0x3}, &(0x7f0000000440)="e09e6dda135ac7c467011f", 0xb, r0) keyctl$search(0xa, r1, 0x0, &(0x7f0000000340)={'syz', 0x1}, r3) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000140)='cpuset\x00', 0x0, 0x0) add_key$keyring(&(0x7f0000000100), &(0x7f0000000180)={'syz', 0x0}, 0x0, 0x0, r0) r4 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r5 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) request_key(&(0x7f0000000580)='logon\x00', &(0x7f00000005c0)={'syz', 0x0}, &(0x7f0000000600)='\x1f-)\x00', 0xfffffffffffffff9) add_key$fscrypt_provisioning(&(0x7f0000000480), &(0x7f00000004c0)={'syz', 0x0}, &(0x7f0000000640)=ANY=[], 0x48, r0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = openat$cgroup_int(r4, &(0x7f00000001c0)='cpuset.sched_load_balance\x00', 0x2, 0x0) dup3(r7, r4, 0x0) add_key$keyring(&(0x7f0000000540), &(0x7f0000000640)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffc) r8 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000980), 0x200000, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r5, 0x81f8943c, &(0x7f000001a000)={0x0, ""/256, 0x0, 0x0, 0x0, 0x0, ""/16, ""/16, ""/16, 0x0}) ioctl$BTRFS_IOC_SUBVOL_CREATE_V2(r6, 0x50009418, &(0x7f000001a200)={{r8}, r9, 0x2, @inherit={0x58, &(0x7f00000009c0)={0x1, 0x2, 0x8, 0x7, {0x14, 0x1000, 0x5, 0x7, 0x4}, [0xffff, 0x3]}}, @subvolid=0x4}) writev(r4, &(0x7f0000000300)=[{&(0x7f00000000c0)='0', 0x1}, {&(0x7f00000003c0)='7', 0x1}], 0x2) 16:34:52 executing program 2: r0 = request_key(0x0, 0x0, 0x0, 0xfffffffffffffffd) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) perf_event_open(&(0x7f00000007c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0xe5e}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) keyctl$read(0xb, 0x0, &(0x7f0000000a40)=""/102400, 0x19000) keyctl$search(0xa, 0x0, &(0x7f00000008c0)='keyring\x00', &(0x7f0000000900)={'syz', 0x1}, 0xfffffffffffffffd) request_key(&(0x7f00000006c0)='dns_resolver\x00', &(0x7f0000000700)={'syz', 0x3}, &(0x7f0000000940)='\x00', 0xfffffffffffffffd) add_key(0x0, &(0x7f0000000400)={'syz', 0x3}, &(0x7f0000000440), 0x0, r0) keyctl$search(0xa, 0x0, 0x0, &(0x7f0000000340)={'syz', 0x1}, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000140)='cpuset\x00', 0x0, 0x0) add_key$keyring(&(0x7f0000000100), 0x0, 0x0, 0x0, r0) r1 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) request_key(0x0, &(0x7f00000005c0)={'syz', 0x0}, 0x0, 0xfffffffffffffff9) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = openat$cgroup_int(r1, &(0x7f00000001c0)='cpuset.sched_load_balance\x00', 0x2, 0x0) dup3(r3, r1, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x200000, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f000001a000)={0x0, ""/256, 0x0, 0x0, 0x0, 0x0, ""/16, ""/16, ""/16, 0x0}) ioctl$BTRFS_IOC_SUBVOL_CREATE_V2(r2, 0x50009418, &(0x7f000001a200)={{}, r4, 0x2, @inherit={0x58, &(0x7f00000009c0)={0x1, 0x2, 0x8, 0x0, {0x0, 0x0, 0x0, 0x0, 0x4}, [0x0, 0x0]}}, @subvolid=0x4}) ioctl$BTRFS_IOC_BALANCE(0xffffffffffffffff, 0x5000940c, 0x0) keyctl$search(0xa, 0x0, 0x0, &(0x7f0000000500)={'syz', 0x0}, 0x0) writev(r1, &(0x7f0000000300)=[{&(0x7f00000000c0)='0', 0x1}, {&(0x7f00000003c0)='7', 0x1}], 0x2) 16:34:52 executing program 1: syz_mount_image$hfs(&(0x7f0000000240), &(0x7f0000000380)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x3, &(0x7f0000000780)=ANY=[@ANYBLOB='quiet,gid=', @ANYRESHEX, @ANYBLOB="2c2a7270653d7614866b2c75693df589299908000000450000005d38ff0c0071446a0c48dba349ba347528523876dc8d7918ecea1024ba9669ff19a9ab5e27062b1dae8d8c0eb880008164ed9d8093fdc35f282dee56df9531b6e0c94b43c314af69146a70075499da5e7f927d3c672787e3d33a6071ff2c1483a1a7cfb34131bfee72f86068d0966d", @ANYRESHEX, @ANYBLOB=',codepage=ascii,rootcontext=sysadm_u,\x00'], 0x1, 0x235, &(0x7f0000000000)="$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") [ 2008.471848] hfs: uid requires an argument [ 2008.480627] hfs: unable to parse mount options [ 2008.509811] new mount options do not match the existing superblock, will be ignored 16:34:52 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x8000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000140)={0x0, 0x0}, &(0x7f0000cab000)=0x6e) syz_mount_image$hfs(&(0x7f0000000240), &(0x7f0000000380)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x3, &(0x7f0000000400)={[{}, {@part={'part', 0x3d, 0x10001}}, {@type={'type', 0x3d, "7614866b"}}, {@uid={'uid', 0x3d, r1}}, {@codepage={'codepage', 0x3d, 'ascii'}}], [{@rootcontext={'rootcontext', 0x3d, 'sysadm_u'}}]}, 0x1, 0x235, &(0x7f0000000000)="$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") 16:34:52 executing program 1: syz_mount_image$hfs(&(0x7f0000000240), &(0x7f0000000380)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x3, &(0x7f0000000780)=ANY=[@ANYBLOB='quiet,gid=', @ANYRESHEX, @ANYBLOB="2c2a7270653d7614866b2c75693df589299908000000450000005d38ff0c0071446a0c48dba349ba347528523876dc8d7918ecea1024ba9669ff19a9ab5e27062b1dae8d8c0eb880008164ed9d8093fdc35f282dee56df9531b6e0c94b43c314af69146a70075499da5e7f927d3c672787e3d33a6071ff2c1483a1a7cfb34131bfee72f86068d0966d", @ANYRESHEX, @ANYBLOB=',codepage=ascii,rootcontext=sysadm_u,\x00'], 0x1, 0x235, &(0x7f0000000000)="$eJzs3U9rE0EYx/HfTKJGW+r2jwgeWwuepNWLeBEkL8KTqE2EYqigFdSTeBZfgHffgi/Ck/gG9OTJF5Dbyjw7abYxm02rydD2+4GEbXeenWc6u515AqUCcGbdb//4fPtXeDmpoYaku5KX1JKakq7oauvV3v7ufq/bmXShhkWEl1MR6f5qs7PXHRca4iwiysJXTS2Wv4fZyPM8/5k6CSRnT/8YXroQn04735p7ZrPxLnUCibm++nqtpdR5AADSiuu/j+v8Yty/ey9txmX/VK3//dQJJFZa/63Kyl2Y38t2aljvWQkXzvtBlXicvs6ruLMObTBdXVVpufiLT3d73Zs7z3sdr/e6F5Wardl7p7h1B2qyXR9Tm05w/LEv2BjOhTHcqsh/9f/2WM99dd/cQ5fpkzoH+79m7sI02UxlIzNV5L9VfUUbZVa0qhjlsnVyLfYQ1YyyNb4i0eCOWtbhDwiyujwtamUkqhjddk3U6kjURjGnNVFro30N7+bqyFlzH90Dt67f+qJ2af/vw097U9M8maGNtYx3xsTxNK1lNkVi/kjDwL/5oCe6o6WXb94+e9zrdV9wwAEHHBwcpP4FhXkYTnrqTJBI2He5ov4r1StbViKFt2zCPj2vu3jpitsVtcGKvV86UgW3UF3BTVtzbdyQrk/fYxbzPCVcW9/1iM//AQAAAAAAAAAAAAAAAAAATpp5/DlB6jECAAAAAAAAAAAAAAAAAAAAAHDS8f9/gbPrTwAAAP//rz+COQ==") 16:34:52 executing program 4: r0 = request_key(0x0, 0x0, 0x0, 0xfffffffffffffffd) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) r1 = add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000780)='./file0\x00', &(0x7f0000000840)='gadgetfs\x00', 0x0, &(0x7f0000000880)='keyring\x00') perf_event_open(&(0x7f00000007c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x12c00, 0x0, 0xe5e}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) writev(0xffffffffffffffff, 0x0, 0x0) keyctl$read(0xb, 0x0, &(0x7f0000000a40)=""/102400, 0x19000) keyctl$search(0xa, 0x0, 0x0, 0x0, 0xfffffffffffffffd) request_key(&(0x7f00000006c0)='dns_resolver\x00', &(0x7f0000000700)={'syz', 0x3}, &(0x7f0000000940)='\x00', 0xfffffffffffffffd) r2 = add_key(&(0x7f0000000380)='id_resolver\x00', 0x0, &(0x7f0000000440), 0x0, 0x0) keyctl$search(0xa, r1, 0x0, &(0x7f0000000340)={'syz', 0x1}, r2) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000140)='cpuset\x00', 0x0, 0x0) add_key$keyring(&(0x7f0000000100), &(0x7f0000000180)={'syz', 0x0}, 0x0, 0x0, r0) r3 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r4 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) open(&(0x7f00000002c0)='./file0\x00', 0x98d00, 0x8) request_key(&(0x7f0000000580)='logon\x00', &(0x7f00000005c0)={'syz', 0x0}, &(0x7f0000000600)='\x1f-)\x00', 0xfffffffffffffff9) write$rfkill(r4, &(0x7f0000000040)={0x0, 0x0, 0x3}, 0x8) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = openat$cgroup_int(r3, &(0x7f00000001c0)='cpuset.sched_load_balance\x00', 0x2, 0x0) dup3(r6, r3, 0x0) r7 = add_key$keyring(&(0x7f0000000540), &(0x7f0000000640)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffc) r8 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000980), 0x200000, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r4, 0x81f8943c, &(0x7f000001a000)={0x0, ""/256, 0x0, 0x0, 0x0, 0x0, ""/16, ""/16, ""/16, 0x0}) ioctl$BTRFS_IOC_SUBVOL_CREATE_V2(r5, 0x50009418, &(0x7f000001a200)={{r8}, r9, 0x2, @inherit={0x58, &(0x7f00000009c0)={0x1, 0x2, 0x8, 0x7, {0x14, 0x1000, 0x5, 0x7, 0x4}, [0xffff, 0x3]}}, @subvolid=0x4}) ioctl$BTRFS_IOC_BALANCE(r5, 0x5000940c, 0x0) keyctl$search(0xa, r2, &(0x7f0000000200)='keyring\x00', &(0x7f0000000500)={'syz', 0x0}, r7) writev(r3, &(0x7f0000000300)=[{&(0x7f00000000c0)='0', 0x1}, {&(0x7f00000003c0)='7', 0x1}], 0x2) [ 2008.528487] hfs: invalid gid -1 [ 2008.528495] hfs: unable to parse mount options [ 2008.602184] new mount options do not match the existing superblock, will be ignored 16:34:52 executing program 0: r0 = request_key(0x0, 0x0, 0x0, 0xfffffffffffffffd) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) r1 = add_key$keyring(0x0, &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000740)=@filename='./file0\x00', &(0x7f0000000780)='./file0\x00', &(0x7f0000000840)='gadgetfs\x00', 0x10, &(0x7f0000000880)='keyring\x00') perf_event_open(&(0x7f00000007c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x12c00, 0x0, 0xe5e}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) writev(0xffffffffffffffff, 0x0, 0x0) r2 = add_key(&(0x7f0000000240)='big_key\x00', &(0x7f0000000280)={'syz', 0x3}, &(0x7f0000019a40)="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", 0x5bd, 0xfffffffffffffffd) keyctl$read(0xb, r2, &(0x7f0000000a40)=""/102400, 0x19000) keyctl$search(0xa, r2, &(0x7f00000008c0)='keyring\x00', &(0x7f0000000900)={'syz', 0x1}, 0xfffffffffffffffd) request_key(&(0x7f00000006c0)='dns_resolver\x00', &(0x7f0000000700)={'syz', 0x3}, &(0x7f0000000940)='\x00', 0xfffffffffffffffd) r3 = add_key(&(0x7f0000000380)='id_resolver\x00', &(0x7f0000000400)={'syz', 0x3}, &(0x7f0000000440)="e09e6dda135ac7c467011f", 0xb, r0) keyctl$search(0xa, r1, 0x0, &(0x7f0000000340)={'syz', 0x1}, r3) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000140)='cpuset\x00', 0x0, 0x0) add_key$keyring(&(0x7f0000000100), &(0x7f0000000180)={'syz', 0x0}, 0x0, 0x0, r0) r4 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r5 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) open(&(0x7f00000002c0)='./file0\x00', 0x98d00, 0x8) request_key(&(0x7f0000000580)='logon\x00', &(0x7f00000005c0)={'syz', 0x0}, &(0x7f0000000600)='\x1f-)\x00', 0xfffffffffffffff9) add_key$fscrypt_provisioning(&(0x7f0000000480), &(0x7f00000004c0)={'syz', 0x0}, &(0x7f0000000640)=ANY=[], 0x48, r0) write$rfkill(r5, &(0x7f0000000040)={0x0, 0x0, 0x3}, 0x8) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = openat$cgroup_int(r4, &(0x7f00000001c0)='cpuset.sched_load_balance\x00', 0x2, 0x0) dup3(r7, r4, 0x0) add_key$keyring(&(0x7f0000000540), &(0x7f0000000640)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffc) r8 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000980), 0x200000, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r5, 0x81f8943c, &(0x7f000001a000)={0x0, ""/256, 0x0, 0x0, 0x0, 0x0, ""/16, ""/16, ""/16, 0x0}) ioctl$BTRFS_IOC_SUBVOL_CREATE_V2(r6, 0x50009418, &(0x7f000001a200)={{r8}, r9, 0x2, @inherit={0x58, &(0x7f00000009c0)={0x1, 0x2, 0x8, 0x7, {0x14, 0x1000, 0x5, 0x7, 0x4}, [0xffff, 0x3]}}, @subvolid=0x4}) writev(r4, &(0x7f0000000300)=[{&(0x7f00000000c0)='0', 0x1}, {&(0x7f00000003c0)='7', 0x1}], 0x2) 16:34:52 executing program 5: r0 = request_key(0x0, 0x0, 0x0, 0xfffffffffffffffd) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) r1 = add_key$keyring(0x0, &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000780)='./file0\x00', &(0x7f0000000840)='gadgetfs\x00', 0x10, &(0x7f0000000880)='keyring\x00') perf_event_open(&(0x7f00000007c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x12c00, 0x0, 0xe5e}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) writev(0xffffffffffffffff, 0x0, 0x0) r2 = add_key(&(0x7f0000000240)='big_key\x00', &(0x7f0000000280)={'syz', 0x3}, &(0x7f0000019a40)="4195738ac28ccd83aa93c4ecacdaca3d34104be4cc5531c4091facf7f777321e84e49e039122a2d1cf7fea6a02aac8944c27ba038156bc10c0f7a6b26fbf382f67959d856600881f0e692c60f12ace775aab8d775dc2586454918a0db1811f5e8086f1a9805166c870b8387d380d5115af5841dad21f629e05f4b51e362c46b58a7dc2855c5189bff60d02c05ba67c297aa0ad05b93b1ee2fffae13fe5764d4e2a214e15093841b1551d518a669fa94e8918bfdd6573d5c0275a9b91ddb843775f78574891e03697f6ca290be6599b671093898a82e7905ed7c7fd8e8b422ebf12e5b543885596fc5c305d497407ffe73bd543f79c983f0807ae7e13fb5053fd7a07dddf8ec739418b59d67219f008f540161cec3bfd1b3097aad497248b221d572a9eb1bad6d921fcdcfdfacf8d1e392635168747056ec8a3fc45b3027293a517d50ea789294f132f2392919dc81ba5eb02e27e116cc300000000b6c0e39688425a3cb17d35f4b1eec0a37193f233c6655c6f40c09b4ea04c8880a431a8274127d56c3c8cab73a5fcf2b604b83658344e323eeedb0b283b0b3616236e904a42fed9fc8f4c131b047bfd5d7586e6a28032a4584fd5933472ce49dfdc99976166bb37eb1679b22249a222ffab17948dd6cc6f23f42ecd32a980ab8fc7c7d2da1a91f1db1187066c144bcbdb46240b7ef7ed28da4a358295b6104e4c60b09654e79f766e19e44174e94fa41d358d3dd901c060a06a388727be1092a37c0015695b1363ed018e724947983aa6b5974daf6388547cdacbd44a1282c3b9130cbf9536c29a523980b9e4328d1a7c0de8b636d7dfdee36434125948b1d802d5d143645c3a5f8da50adeef6e4f715361908a20cb998d3e0907aef9fdd19bb79be8c510b8aa04600163636c1d1f36f3834ffa3c7369e1d8ed9348bc339da2a525c4f165c0caebb7a4ee632a37a43897084e3c07a5ed8b505a51a4777095060b0ff6a6442206244dd9a13b5ba52b07c718e9eaad10befd12be35dc50283d584035d75e4917548ff58045b88d29b6826ceb6d44fb54ba3ef7944da6e86c0f2d0bc0bd725aa9193b3de4837634ead361d9b2ff5ae4de005f53d48cba029b43eb35fbedd0b5397918a9324b6e1f1d88399d8ad69b7d79e89ded6fe81fd1200f95c831f8c60dc1483e97052f61d0a643df0c2e1b0ba7d00b0692efd1bfc1ece10c2e785e3cb3b0dfbdbd722b6e53e5a2884b1cc5d939a572564bc8a2260e8718230878edb3a877f5c585f4373ef8e0e1cff5dacf96862906ff37eec18ba706d22b101965eaf5f5e29f544977896117e25ceb572f3443eddf9651c2ac69c911b21fd69e59ee57ebe4c549ff2a3dcd904656663039789f022a6caa7f76640e75efdba82dabacf8c0112bd4e62a3a9e69a9824c1af45cf86b307d9749937dd08b6ef49860cda5da7bb886f92db7cd43a869aa646a6da291a75ff28c4d728b1377b8e80233b33e724a60c0a015ec75cd86af04a4bd43964d8f7ba781a99d0cd7ff7e189fc91801655cb1b60e6bc3af747655341deceadbed3d76bdfae92389cc87c417e0f58f3fbcc56ff347467a20773146a81090ff42bbb5383d74108028f5fa532c647746054c312e2e4c085f58d93bec6da7c2bfd99fc59c1631cc71110acc2bf352b994e2a246be3cc1d240fa0c60eb04b92a9673d2ac2bba7f322ddbbd74712b0ec459050586523bd0b0505174a701206e47f2bb7fe20caf5ed73d33447b89432802e7d4606512e217aedf78c871e10cfbdf202efbf3fd8495b6be18cde726dc1fefc01921e9d1f15c8301376c33b5a698d0f7d5f317835d74857e121fe820d93f6b757c9938ec81f9b19a4b0d4ed35d1309fbcb285cf7717e9e27aaaba9d7d742fcfd786eacd993fb119e1d52908ca7ce2135046fa95805704c6258fd1b5fc1434af7ab99609820d73627080d43bcaeeb42ce423e17aa4df3a6994ead3133e2ecfbc6fa308c6b71b78cbab273641970b49e15d0dbe7aea716eaf6cf40f90d0d7d3d8bf1d165d25d5f6f6376416b9dd13731c5c2fdadee8e48c76430cccb21d8e6c659", 0x5bd, 0xfffffffffffffffd) keyctl$read(0xb, r2, &(0x7f0000000a40)=""/102400, 0x19000) keyctl$search(0xa, r2, &(0x7f00000008c0)='keyring\x00', &(0x7f0000000900)={'syz', 0x1}, 0xfffffffffffffffd) request_key(&(0x7f00000006c0)='dns_resolver\x00', &(0x7f0000000700)={'syz', 0x3}, &(0x7f0000000940)='\x00', 0xfffffffffffffffd) r3 = add_key(&(0x7f0000000380)='id_resolver\x00', &(0x7f0000000400)={'syz', 0x3}, &(0x7f0000000440)="e09e6dda135ac7c467011f", 0xb, r0) keyctl$search(0xa, r1, 0x0, &(0x7f0000000340)={'syz', 0x1}, r3) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000140)='cpuset\x00', 0x0, 0x0) add_key$keyring(&(0x7f0000000100), &(0x7f0000000180)={'syz', 0x0}, 0x0, 0x0, r0) r4 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r5 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) request_key(&(0x7f0000000580)='logon\x00', &(0x7f00000005c0)={'syz', 0x0}, &(0x7f0000000600)='\x1f-)\x00', 0xfffffffffffffff9) add_key$fscrypt_provisioning(&(0x7f0000000480), &(0x7f00000004c0)={'syz', 0x0}, &(0x7f0000000640)=ANY=[], 0x48, r0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = openat$cgroup_int(r4, &(0x7f00000001c0)='cpuset.sched_load_balance\x00', 0x2, 0x0) dup3(r7, r4, 0x0) add_key$keyring(&(0x7f0000000540), &(0x7f0000000640)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffc) r8 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000980), 0x200000, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r5, 0x81f8943c, &(0x7f000001a000)={0x0, ""/256, 0x0, 0x0, 0x0, 0x0, ""/16, ""/16, ""/16, 0x0}) ioctl$BTRFS_IOC_SUBVOL_CREATE_V2(r6, 0x50009418, &(0x7f000001a200)={{r8}, r9, 0x2, @inherit={0x58, &(0x7f00000009c0)={0x1, 0x2, 0x8, 0x7, {0x14, 0x1000, 0x5, 0x7, 0x4}, [0xffff, 0x3]}}, @subvolid=0x4}) writev(r4, &(0x7f0000000300)=[{&(0x7f00000000c0)='0', 0x1}, {&(0x7f00000003c0)='7', 0x1}], 0x2) [ 2008.648690] new mount options do not match the existing superblock, will be ignored [ 2008.671998] hfs: invalid gid -1 [ 2008.684927] hfs: unable to parse mount options 16:34:52 executing program 1: syz_mount_image$hfs(&(0x7f0000000240), &(0x7f0000000380)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x3, &(0x7f0000000780)=ANY=[@ANYBLOB='quiet,gid=', @ANYRESHEX, @ANYBLOB="2c2a7270653d7614866b2c75693df589299908000000450000005d38ff0c0071446a0c48dba349ba347528523876dc8d7918ecea1024ba9669ff19a9ab5e27062b1dae8d8c0eb880008164ed9d8093fdc35f282dee56df9531b6e0c94b43c314af69146a70075499da5e7f927d3c672787e3d33a6071ff2c1483a1a7cfb34131bfee72f86068d0966d", @ANYRESHEX, @ANYBLOB=',codepage=ascii,rootcontext=sysadm_u,\x00'], 0x1, 0x235, &(0x7f0000000000)="$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") 16:34:52 executing program 2: r0 = request_key(0x0, 0x0, 0x0, 0xfffffffffffffffd) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) perf_event_open(&(0x7f00000007c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0xe5e}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) keyctl$read(0xb, 0x0, &(0x7f0000000a40)=""/102400, 0x19000) keyctl$search(0xa, 0x0, &(0x7f00000008c0)='keyring\x00', &(0x7f0000000900)={'syz', 0x1}, 0xfffffffffffffffd) request_key(&(0x7f00000006c0)='dns_resolver\x00', &(0x7f0000000700)={'syz', 0x3}, &(0x7f0000000940)='\x00', 0xfffffffffffffffd) add_key(0x0, &(0x7f0000000400)={'syz', 0x3}, &(0x7f0000000440), 0x0, r0) keyctl$search(0xa, 0x0, 0x0, &(0x7f0000000340)={'syz', 0x1}, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000140)='cpuset\x00', 0x0, 0x0) add_key$keyring(&(0x7f0000000100), 0x0, 0x0, 0x0, r0) r1 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) request_key(0x0, &(0x7f00000005c0)={'syz', 0x0}, 0x0, 0xfffffffffffffff9) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = openat$cgroup_int(r1, &(0x7f00000001c0)='cpuset.sched_load_balance\x00', 0x2, 0x0) dup3(r3, r1, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x200000, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f000001a000)={0x0, ""/256, 0x0, 0x0, 0x0, 0x0, ""/16, ""/16, ""/16, 0x0}) ioctl$BTRFS_IOC_SUBVOL_CREATE_V2(r2, 0x50009418, &(0x7f000001a200)={{}, r4, 0x2, @inherit={0x58, &(0x7f00000009c0)={0x1, 0x2, 0x8, 0x0, {0x0, 0x0, 0x0, 0x0, 0x4}, [0x0, 0x0]}}, @subvolid=0x4}) ioctl$BTRFS_IOC_BALANCE(0xffffffffffffffff, 0x5000940c, 0x0) keyctl$search(0xa, 0x0, 0x0, &(0x7f0000000500)={'syz', 0x0}, 0x0) writev(r1, &(0x7f0000000300)=[{&(0x7f00000000c0)='0', 0x1}, {&(0x7f00000003c0)='7', 0x1}], 0x2) [ 2008.736367] hfs: uid requires an argument [ 2008.740535] hfs: unable to parse mount options 16:34:52 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x8000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000140)={0x0, 0x0}, &(0x7f0000cab000)=0x6e) syz_mount_image$hfs(&(0x7f0000000240), &(0x7f0000000380)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x3, &(0x7f0000000400)={[{}, {@part={'part', 0x3d, 0x10001}}, {@type={'type', 0x3d, "7614866b"}}, {@uid={'uid', 0x3d, r1}}, {@codepage={'codepage', 0x3d, 'ascii'}}], [{@rootcontext={'rootcontext', 0x3d, 'sysadm_u'}}]}, 0x1, 0x235, &(0x7f0000000000)="$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") [ 2008.801807] new mount options do not match the existing superblock, will be ignored [ 2008.906407] new mount options do not match the existing superblock, will be ignored [ 2008.994069] hfs: invalid gid -1 [ 2009.001121] new mount options do not match the existing superblock, will be ignored [ 2009.084278] hfs: unable to parse mount options 16:34:53 executing program 4: r0 = request_key(0x0, 0x0, 0x0, 0xfffffffffffffffd) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000780)='./file0\x00', &(0x7f0000000840)='gadgetfs\x00', 0x0, &(0x7f0000000880)='keyring\x00') perf_event_open(&(0x7f00000007c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x12c00, 0x0, 0xe5e}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) writev(0xffffffffffffffff, 0x0, 0x0) keyctl$read(0xb, 0x0, &(0x7f0000000a40)=""/102400, 0x19000) keyctl$search(0xa, 0x0, 0x0, 0x0, 0xfffffffffffffffd) request_key(&(0x7f00000006c0)='dns_resolver\x00', &(0x7f0000000700)={'syz', 0x3}, &(0x7f0000000940)='\x00', 0xfffffffffffffffd) r1 = add_key(&(0x7f0000000380)='id_resolver\x00', 0x0, &(0x7f0000000440), 0x0, r0) keyctl$search(0xa, 0x0, 0x0, &(0x7f0000000340)={'syz', 0x1}, r1) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000140)='cpuset\x00', 0x0, 0x0) add_key$keyring(&(0x7f0000000100), &(0x7f0000000180)={'syz', 0x0}, 0x0, 0x0, r0) r2 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r3 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) open(&(0x7f00000002c0)='./file0\x00', 0x98d00, 0x8) request_key(&(0x7f0000000580)='logon\x00', &(0x7f00000005c0)={'syz', 0x0}, &(0x7f0000000600)='\x1f-)\x00', 0xfffffffffffffff9) write$rfkill(r3, &(0x7f0000000040)={0x0, 0x0, 0x3}, 0x8) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = openat$cgroup_int(r2, &(0x7f00000001c0)='cpuset.sched_load_balance\x00', 0x2, 0x0) dup3(r5, r2, 0x0) r6 = add_key$keyring(&(0x7f0000000540), &(0x7f0000000640)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffc) r7 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000980), 0x200000, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r3, 0x81f8943c, &(0x7f000001a000)={0x0, ""/256, 0x0, 0x0, 0x0, 0x0, ""/16, ""/16, ""/16, 0x0}) ioctl$BTRFS_IOC_SUBVOL_CREATE_V2(r4, 0x50009418, &(0x7f000001a200)={{r7}, r8, 0x2, @inherit={0x58, &(0x7f00000009c0)={0x1, 0x2, 0x8, 0x7, {0x14, 0x1000, 0x5, 0x7, 0x4}, [0xffff, 0x3]}}, @subvolid=0x4}) ioctl$BTRFS_IOC_BALANCE(r4, 0x5000940c, 0x0) keyctl$search(0xa, r1, &(0x7f0000000200)='keyring\x00', &(0x7f0000000500)={'syz', 0x0}, r6) writev(r2, &(0x7f0000000300)=[{&(0x7f00000000c0)='0', 0x1}, {&(0x7f00000003c0)='7', 0x1}], 0x2) 16:34:53 executing program 2: r0 = request_key(0x0, 0x0, 0x0, 0xfffffffffffffffd) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) perf_event_open(&(0x7f00000007c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0xe5e}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) keyctl$read(0xb, 0x0, &(0x7f0000000a40)=""/102400, 0x19000) keyctl$search(0xa, 0x0, &(0x7f00000008c0)='keyring\x00', &(0x7f0000000900)={'syz', 0x1}, 0xfffffffffffffffd) request_key(&(0x7f00000006c0)='dns_resolver\x00', &(0x7f0000000700)={'syz', 0x3}, &(0x7f0000000940)='\x00', 0xfffffffffffffffd) add_key(0x0, &(0x7f0000000400)={'syz', 0x3}, &(0x7f0000000440), 0x0, r0) keyctl$search(0xa, 0x0, 0x0, &(0x7f0000000340)={'syz', 0x1}, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000140)='cpuset\x00', 0x0, 0x0) add_key$keyring(&(0x7f0000000100), 0x0, 0x0, 0x0, r0) r1 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) request_key(0x0, &(0x7f00000005c0)={'syz', 0x0}, 0x0, 0xfffffffffffffff9) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = openat$cgroup_int(r1, &(0x7f00000001c0)='cpuset.sched_load_balance\x00', 0x2, 0x0) dup3(r3, r1, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x200000, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f000001a000)={0x0, ""/256, 0x0, 0x0, 0x0, 0x0, ""/16, ""/16, ""/16, 0x0}) ioctl$BTRFS_IOC_SUBVOL_CREATE_V2(r2, 0x50009418, &(0x7f000001a200)={{}, r4, 0x2, @inherit={0x58, &(0x7f00000009c0)={0x1, 0x2, 0x8, 0x0, {0x0, 0x0, 0x0, 0x0, 0x4}, [0x0, 0x0]}}, @subvolid=0x4}) ioctl$BTRFS_IOC_BALANCE(0xffffffffffffffff, 0x5000940c, 0x0) keyctl$search(0xa, 0x0, &(0x7f0000000200)='keyring\x00', 0x0, 0x0) writev(r1, &(0x7f0000000300)=[{&(0x7f00000000c0)='0', 0x1}, {&(0x7f00000003c0)='7', 0x1}], 0x2) 16:34:53 executing program 1: syz_mount_image$hfs(&(0x7f0000000240), &(0x7f0000000380)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x3, &(0x7f0000000780)=ANY=[@ANYBLOB='quiet,gid=', @ANYRESHEX, @ANYBLOB="2c2a7270653d7614866b2c75693df589299908000000450000005d38ff0c0071446a0c48dba349ba347528523876dc8d7918ecea1024ba9669ff19a9ab5e27062b1dae8d8c0eb880008164ed9d8093fdc35f282dee56df9531b6e0c94b43c314af69146a70075499da5e7f927d3c672787e3d33a6071ff2c1483a1a7cfb34131bfee72f86068d0966d", @ANYRESHEX, @ANYBLOB=',codepage=ascii,rootcontext=sysadm_u,\x00'], 0x1, 0x235, &(0x7f0000000000)="$eJzs3U9rE0EYx/HfTKJGW+r2jwgeqwVP0upFvBQkL8KTqE2EYqigFdSTeBZfgHffgi/Ck/gG9OTJF5Dbyjw7abYxm02rydD2+4GEbXeenWc6u515AqUCcGbdb//4fOdXeDmpoYake5KX1JKakq7oauvV3v7ufq/bmXShhkWEl1MR6f5qs7PXHRca4iwiysJXTS2Wv4fZyPM8/5k6CSRnT/8YXroQn04735p7ZrPxLnUCibm++nqtpdR5AADSiuu/j+v8Yty/ey9txGX/VK3//dQJJFZa/63Kyl2Y38t2aljvWQkXzvtBlXicvs6ruLMObTBdXVVpufiLT3d73Vs7z3sdr/fajkrN1uy9U9y6AzXZro+pTSc4/tgXbAznwhhuV+S/+n97rOe+um/uocv0SZ2D/V8zd2GabKaykZkq8t+svqKNMitaVYxy2Tq5FnuIakbZGl+RaHBHLevwBwRZXZ4WtTISVYxuqyZqdSRqu5jTmqi10b6Gd3N15Ky5j+6BW9dvfVG7tP/34ae9oWmezNDGWsY7Y+J4mtYymyIxf6Rh4N980BPd1dLLN2+fPe71ui844IADDg4OUv+CwjwMJz11Jkgk7LtcUf+V6pVNK5HCWzZhn57XXbx0xa2K2mDF3i8dqYJbqK7gpq25rt+UbkzfYxbzPCVcW9/1iM//AQAAAAAAAAAAAAAAAAAATpp5/DlB6jECAAAAAAAAAAAAAAAAAAAAAHDS8f9/gbPrTwAAAP//Xe+CVQ==") [ 2009.111300] new mount options do not match the existing superblock, will be ignored 16:34:53 executing program 0: r0 = request_key(0x0, 0x0, 0x0, 0xfffffffffffffffd) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) r1 = add_key$keyring(0x0, &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000740)=@filename='./file0\x00', &(0x7f0000000780)='./file0\x00', &(0x7f0000000840)='gadgetfs\x00', 0x10, &(0x7f0000000880)='keyring\x00') perf_event_open(&(0x7f00000007c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x12c00, 0x0, 0xe5e}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) writev(0xffffffffffffffff, 0x0, 0x0) r2 = add_key(&(0x7f0000000240)='big_key\x00', &(0x7f0000000280)={'syz', 0x3}, &(0x7f0000019a40)="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", 0x5bd, 0xfffffffffffffffd) keyctl$read(0xb, r2, &(0x7f0000000a40)=""/102400, 0x19000) keyctl$search(0xa, r2, &(0x7f00000008c0)='keyring\x00', &(0x7f0000000900)={'syz', 0x1}, 0xfffffffffffffffd) request_key(&(0x7f00000006c0)='dns_resolver\x00', &(0x7f0000000700)={'syz', 0x3}, &(0x7f0000000940)='\x00', 0xfffffffffffffffd) r3 = add_key(&(0x7f0000000380)='id_resolver\x00', &(0x7f0000000400)={'syz', 0x3}, &(0x7f0000000440)="e09e6dda135ac7c467011f", 0xb, r0) keyctl$search(0xa, r1, 0x0, &(0x7f0000000340)={'syz', 0x1}, r3) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000140)='cpuset\x00', 0x0, 0x0) add_key$keyring(&(0x7f0000000100), &(0x7f0000000180)={'syz', 0x0}, 0x0, 0x0, r0) r4 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r5 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) open(&(0x7f00000002c0)='./file0\x00', 0x98d00, 0x8) request_key(&(0x7f0000000580)='logon\x00', &(0x7f00000005c0)={'syz', 0x0}, &(0x7f0000000600)='\x1f-)\x00', 0xfffffffffffffff9) add_key$fscrypt_provisioning(&(0x7f0000000480), &(0x7f00000004c0)={'syz', 0x0}, &(0x7f0000000640)=ANY=[], 0x48, r0) write$rfkill(r5, &(0x7f0000000040)={0x0, 0x0, 0x3}, 0x8) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = openat$cgroup_int(r4, &(0x7f00000001c0)='cpuset.sched_load_balance\x00', 0x2, 0x0) dup3(r7, r4, 0x0) r8 = add_key$keyring(&(0x7f0000000540), &(0x7f0000000640)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffc) r9 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000980), 0x200000, 0x0) ioctl$BTRFS_IOC_SUBVOL_CREATE_V2(r6, 0x50009418, &(0x7f000001a200)={{r9}, 0x0, 0x2, @inherit={0x58, &(0x7f00000009c0)={0x1, 0x2, 0x8, 0x7, {0x14, 0x1000, 0x5, 0x7, 0x4}, [0xffff, 0x3]}}, @subvolid=0x4}) ioctl$BTRFS_IOC_BALANCE(r6, 0x5000940c, 0x0) keyctl$search(0xa, r3, &(0x7f0000000200)='keyring\x00', &(0x7f0000000500)={'syz', 0x0}, r8) writev(r4, &(0x7f0000000300)=[{&(0x7f00000000c0)='0', 0x1}, {&(0x7f00000003c0)='7', 0x1}], 0x2) 16:34:53 executing program 5: r0 = request_key(0x0, 0x0, 0x0, 0xfffffffffffffffd) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) r1 = add_key$keyring(0x0, &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000780)='./file0\x00', &(0x7f0000000840)='gadgetfs\x00', 0x10, &(0x7f0000000880)='keyring\x00') perf_event_open(&(0x7f00000007c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x12c00, 0x0, 0xe5e}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) writev(0xffffffffffffffff, 0x0, 0x0) r2 = add_key(&(0x7f0000000240)='big_key\x00', &(0x7f0000000280)={'syz', 0x3}, &(0x7f0000019a40)="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", 0x5bd, 0xfffffffffffffffd) keyctl$read(0xb, r2, &(0x7f0000000a40)=""/102400, 0x19000) keyctl$search(0xa, r2, &(0x7f00000008c0)='keyring\x00', &(0x7f0000000900)={'syz', 0x1}, 0xfffffffffffffffd) request_key(&(0x7f00000006c0)='dns_resolver\x00', &(0x7f0000000700)={'syz', 0x3}, &(0x7f0000000940)='\x00', 0xfffffffffffffffd) r3 = add_key(&(0x7f0000000380)='id_resolver\x00', &(0x7f0000000400)={'syz', 0x3}, &(0x7f0000000440)="e09e6dda135ac7c467011f", 0xb, r0) keyctl$search(0xa, r1, 0x0, &(0x7f0000000340)={'syz', 0x1}, r3) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000140)='cpuset\x00', 0x0, 0x0) add_key$keyring(&(0x7f0000000100), &(0x7f0000000180)={'syz', 0x0}, 0x0, 0x0, r0) r4 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r5 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) request_key(&(0x7f0000000580)='logon\x00', &(0x7f00000005c0)={'syz', 0x0}, &(0x7f0000000600)='\x1f-)\x00', 0xfffffffffffffff9) add_key$fscrypt_provisioning(&(0x7f0000000480), &(0x7f00000004c0)={'syz', 0x0}, &(0x7f0000000640)=ANY=[], 0x48, r0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = openat$cgroup_int(r4, &(0x7f00000001c0)='cpuset.sched_load_balance\x00', 0x2, 0x0) dup3(r7, r4, 0x0) add_key$keyring(&(0x7f0000000540), &(0x7f0000000640)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffc) r8 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000980), 0x200000, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r5, 0x81f8943c, &(0x7f000001a000)={0x0, ""/256, 0x0, 0x0, 0x0, 0x0, ""/16, ""/16, ""/16, 0x0}) ioctl$BTRFS_IOC_SUBVOL_CREATE_V2(r6, 0x50009418, &(0x7f000001a200)={{r8}, r9, 0x2, @inherit={0x58, &(0x7f00000009c0)={0x1, 0x2, 0x8, 0x7, {0x14, 0x1000, 0x5, 0x7, 0x4}, [0xffff, 0x3]}}, @subvolid=0x4}) writev(r4, &(0x7f0000000300)=[{&(0x7f00000000c0)='0', 0x1}, {&(0x7f00000003c0)='7', 0x1}], 0x2) 16:34:53 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x8000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000140)={0x0, 0x0}, &(0x7f0000cab000)=0x6e) syz_mount_image$hfs(&(0x7f0000000240), &(0x7f0000000380)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x3, &(0x7f0000000400)={[{}, {@part={'part', 0x3d, 0x10001}}, {@type={'type', 0x3d, "7614866b"}}, {@uid={'uid', 0x3d, r1}}, {@codepage={'codepage', 0x3d, 'ascii'}}], [{@rootcontext={'rootcontext', 0x3d, 'sysadm_u'}}]}, 0x1, 0x235, &(0x7f0000000000)="$eJzs3c9qE1EUx/HfvYkabanTPyK4rBZcSVs34kaQPIQrUZsIxVBBK6grcS0+gHtfwYdwJb6Arlz5ANmN3DM3zTRmMmk1ubT9fiBh2rln5pzOTO89gVIBOLPut398vv0rvJzUUEPSXclLaklNSVd0tfVqb393v9ftTDpQwyLCy6mIdH+N2dnrjgsNcRYRZeGrphbL38Ns5Hme/0ydBJKzp38ML12IT6ftb809s9l4lzqBxFxffb3WUuo8AABpxfnfx3l+Ma7fvZc24rR/qub/fuoEEivN/9Zl5S5c38u2a9jvWQsX9vtBl3icc51XcWcdWmC6uq7ScvEXn+72urd2nvc6Xu91LyoNW7P3TnHrDtRkuz6mN53g+LUvWA3nQg3bFfmv/t8z1nNf3Tf30GX6pM7B+q+Zu3CZ7EplI1eqyH+z+ohWZVaMqqhy2U5yLZ4hqqmyNb4j0eCOWtbhDwiyujwtamUkqqhuqyZqdWzUdk3U2mjU8G6ujpw199E9cOv6rS9ql9b/Pvy0NzTNkxnG2Mh4Z0ysp2kjsykS80cqA//mg57ojpZevnn77HGv133BBhtssHGwkfoXFOZheNFTZ4JEwrrLFf1fqV/ZtBYpvGUT1ul53cFLR9yq6A1W7P3SkTq4heoObtqe6/pN6cb0Z8xinqeEa+u7HvH5PwAAAAAAAAAAAAAAAAAAwEkzjz8nSF0jAAAAAAAAAAAAAAAAAAAAAAAnHf//Fzi7/gQAAP//6oSCGA==") [ 2009.158983] hfs: uid requires an argument [ 2009.165775] hfs: unable to parse mount options [ 2009.283162] new mount options do not match the existing superblock, will be ignored [ 2009.301436] hfs: invalid gid -1 [ 2009.371329] hfs: unable to parse mount options [ 2009.387992] hfs: uid requires an argument [ 2009.415587] new mount options do not match the existing superblock, will be ignored 16:34:53 executing program 1: syz_mount_image$hfs(&(0x7f0000000240), &(0x7f0000000380)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x3, &(0x7f0000000780)=ANY=[@ANYBLOB='quiet,gid=', @ANYRESHEX, @ANYBLOB="2c2a7270653d7614866b2c75693df589299908000000450000005d38ff0c0071446a0c48dba349ba347528523876dc8d7918ecea1024ba9669ff19a9ab5e27062b1dae8d8c0eb880008164ed9d8093fdc35f282dee56df9531b6e0c94b43c314af69146a70075499da5e7f927d3c672787e3d33a6071ff2c1483a1a7cfb34131bfee72f86068d0966d", @ANYRESHEX, @ANYBLOB=',codepage=ascii,rootcontext=sysadm_u,\x00'], 0x1, 0x235, &(0x7f0000000000)="$eJzs3U9rE0EYx/HfTKJGW+r2jwgeqwVP0upFvCiSF+FJ1CZCMVTQCupJPIsvwLtvwRfhSXwDevLkC8htZZ6dNNuYzabVZGj7/UDCtjvPzjOd3c48gVIBOLXut398vvUrvJzUUEPSHclLaklNSZd0ufVqd29nr9ftTLpQwyLCy6mIdH+12d7tjgsNcRYRZeGrphbL38Ns5Hme/0ydBJKzp38ML52LT6edb809s9l4lzqBxFxffb3WUuo8AABpxfXfx3V+Me7fvZc24rJ/otb/fuoEEiut/1Zl5S7M70U7Naz3rIQL5/2gSjxKX2dV3FkHNpiurqq0XPz5pzu97o3t572O13vdjUrN1uy9U9y6AzXZro+pTSc4+tgXbAxnwhhuVuS/+n97rOe+um/uocv0SZ39/V8zd2GabKaykZkq8t+svqKNMitaVYxy2Tq5EnuIakbZGl+RaHBHLevgBwRZXZ4WtTISVYxuqyZqdSTqXjGnNVFro30N7+bqyFlzH90Dt67f+qJ2af/vw097Q9M8maGNtYx3xsTxNK1lNkVi/lDDwL/5oCe6raWXb94+e9zrdV9wwAEHHOwfpP4FhXkYTnrqTJBI2He5ov4r1SubViKFt2zCPj2vu3jpilsVtcGKvV84VAW3UF3BTVtzXb0uXZu+xyzmeUK4tr7rEZ//AwAAAAAAAAAAAAAAAAAAHDfz+HOC1GMEAAAAAAAAAAAAAAAAAAAAAOC44///AqfXnwAAAP//yLiCVg==") 16:34:53 executing program 4: r0 = request_key(0x0, 0x0, 0x0, 0xfffffffffffffffd) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000780)='./file0\x00', &(0x7f0000000840)='gadgetfs\x00', 0x0, &(0x7f0000000880)='keyring\x00') perf_event_open(&(0x7f00000007c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x12c00, 0x0, 0xe5e}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) writev(0xffffffffffffffff, 0x0, 0x0) keyctl$read(0xb, 0x0, &(0x7f0000000a40)=""/102400, 0x19000) keyctl$search(0xa, 0x0, 0x0, 0x0, 0xfffffffffffffffd) request_key(&(0x7f00000006c0)='dns_resolver\x00', &(0x7f0000000700)={'syz', 0x3}, &(0x7f0000000940)='\x00', 0xfffffffffffffffd) r1 = add_key(&(0x7f0000000380)='id_resolver\x00', 0x0, &(0x7f0000000440), 0x0, r0) keyctl$search(0xa, 0x0, 0x0, &(0x7f0000000340)={'syz', 0x1}, r1) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000140)='cpuset\x00', 0x0, 0x0) add_key$keyring(&(0x7f0000000100), &(0x7f0000000180)={'syz', 0x0}, 0x0, 0x0, r0) r2 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r3 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) open(&(0x7f00000002c0)='./file0\x00', 0x98d00, 0x8) request_key(&(0x7f0000000580)='logon\x00', &(0x7f00000005c0)={'syz', 0x0}, &(0x7f0000000600)='\x1f-)\x00', 0xfffffffffffffff9) write$rfkill(r3, &(0x7f0000000040)={0x0, 0x0, 0x3}, 0x8) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = openat$cgroup_int(r2, &(0x7f00000001c0)='cpuset.sched_load_balance\x00', 0x2, 0x0) dup3(r5, r2, 0x0) r6 = add_key$keyring(&(0x7f0000000540), &(0x7f0000000640)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffc) r7 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000980), 0x200000, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r3, 0x81f8943c, &(0x7f000001a000)={0x0, ""/256, 0x0, 0x0, 0x0, 0x0, ""/16, ""/16, ""/16, 0x0}) ioctl$BTRFS_IOC_SUBVOL_CREATE_V2(r4, 0x50009418, &(0x7f000001a200)={{r7}, r8, 0x2, @inherit={0x58, &(0x7f00000009c0)={0x1, 0x2, 0x8, 0x7, {0x14, 0x1000, 0x5, 0x7, 0x4}, [0xffff, 0x3]}}, @subvolid=0x4}) ioctl$BTRFS_IOC_BALANCE(r4, 0x5000940c, 0x0) keyctl$search(0xa, r1, &(0x7f0000000200)='keyring\x00', &(0x7f0000000500)={'syz', 0x0}, r6) writev(r2, &(0x7f0000000300)=[{&(0x7f00000000c0)='0', 0x1}, {&(0x7f00000003c0)='7', 0x1}], 0x2) [ 2009.464617] hfs: unable to parse mount options [ 2009.470532] new mount options do not match the existing superblock, will be ignored 16:34:53 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000340), 0x4}, 0x9458, 0x5, 0x0, 0x2, 0x388f7d41}, 0x0, 0x1, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000140)={0x0, 0x0}, &(0x7f0000cab000)=0x6e) syz_mount_image$hfs(&(0x7f0000000240), &(0x7f0000000380)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x3, &(0x7f0000000400)={[{}, {@part={'part', 0x3d, 0x10001}}, {@type={'type', 0x3d, "7614866b"}}, {@uid={'uid', 0x3d, r1}}, {@codepage={'codepage', 0x3d, 'ascii'}}], [{@rootcontext={'rootcontext', 0x3d, 'sysadm_u'}}]}, 0x1, 0x235, &(0x7f0000000000)="$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") r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./bus\x00', 0x0, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000004400)='./bus\x00', 0x1c1002, 0x0) write$binfmt_misc(r3, &(0x7f0000000180)={'syz1'}, 0x4) r4 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./bus\x00', 0x0, 0x0) r5 = openat(0xffffffffffffff9c, &(0x7f0000004400)='./bus\x00', 0x1c1002, 0x0) write$binfmt_misc(r5, &(0x7f0000000180)={'syz1'}, 0x4) sendfile(r5, r4, 0x0, 0x1ffff) r6 = syz_genetlink_get_family_id$nl80211(&(0x7f00000004c0), r2) sendmsg$NL80211_CMD_CRIT_PROTOCOL_STOP(r4, &(0x7f0000000580)={&(0x7f0000000480)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000540)={&(0x7f0000000500)={0x14, r6, 0x200, 0x70bd25, 0x25dfdbfc, {{}, {@void, @void}}, ["", "", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0xc0c0}, 0x5) sendfile(r3, r2, 0x0, 0x1ffff) getsockname$packet(r3, &(0x7f00000002c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000300)=0x14) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000280)) [ 2009.518316] new mount options do not match the existing superblock, will be ignored 16:34:53 executing program 2: r0 = request_key(0x0, 0x0, 0x0, 0xfffffffffffffffd) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) perf_event_open(&(0x7f00000007c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0xe5e}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) keyctl$read(0xb, 0x0, &(0x7f0000000a40)=""/102400, 0x19000) keyctl$search(0xa, 0x0, &(0x7f00000008c0)='keyring\x00', &(0x7f0000000900)={'syz', 0x1}, 0xfffffffffffffffd) request_key(&(0x7f00000006c0)='dns_resolver\x00', &(0x7f0000000700)={'syz', 0x3}, &(0x7f0000000940)='\x00', 0xfffffffffffffffd) add_key(0x0, &(0x7f0000000400)={'syz', 0x3}, &(0x7f0000000440), 0x0, r0) keyctl$search(0xa, 0x0, 0x0, &(0x7f0000000340)={'syz', 0x1}, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000140)='cpuset\x00', 0x0, 0x0) add_key$keyring(&(0x7f0000000100), 0x0, 0x0, 0x0, r0) r1 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) request_key(0x0, &(0x7f00000005c0)={'syz', 0x0}, 0x0, 0xfffffffffffffff9) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = openat$cgroup_int(r1, &(0x7f00000001c0)='cpuset.sched_load_balance\x00', 0x2, 0x0) dup3(r3, r1, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x200000, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f000001a000)={0x0, ""/256, 0x0, 0x0, 0x0, 0x0, ""/16, ""/16, ""/16, 0x0}) ioctl$BTRFS_IOC_SUBVOL_CREATE_V2(r2, 0x50009418, &(0x7f000001a200)={{}, r4, 0x2, @inherit={0x58, &(0x7f00000009c0)={0x1, 0x2, 0x8, 0x0, {0x0, 0x0, 0x0, 0x0, 0x4}, [0x0, 0x0]}}, @subvolid=0x4}) ioctl$BTRFS_IOC_BALANCE(0xffffffffffffffff, 0x5000940c, 0x0) keyctl$search(0xa, 0x0, &(0x7f0000000200)='keyring\x00', 0x0, 0x0) writev(r1, &(0x7f0000000300)=[{&(0x7f00000000c0)='0', 0x1}, {&(0x7f00000003c0)='7', 0x1}], 0x2) 16:34:53 executing program 0: r0 = request_key(0x0, 0x0, 0x0, 0xfffffffffffffffd) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) r1 = add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000740)=@filename='./file0\x00', &(0x7f0000000780)='./file0\x00', &(0x7f0000000840)='gadgetfs\x00', 0x0, &(0x7f0000000880)='keyring\x00') perf_event_open(&(0x7f00000007c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x12c00, 0x0, 0xe5e}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) writev(0xffffffffffffffff, 0x0, 0x0) r2 = add_key(0x0, &(0x7f0000000280)={'syz', 0x3}, &(0x7f0000019a40)="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", 0x5bd, 0xfffffffffffffffd) keyctl$read(0xb, r2, &(0x7f0000000a40)=""/102400, 0x19000) keyctl$search(0xa, r2, &(0x7f00000008c0)='keyring\x00', &(0x7f0000000900)={'syz', 0x1}, 0xfffffffffffffffd) request_key(&(0x7f00000006c0)='dns_resolver\x00', &(0x7f0000000700)={'syz', 0x3}, 0x0, 0xfffffffffffffffd) r3 = add_key(&(0x7f0000000380)='id_resolver\x00', &(0x7f0000000400)={'syz', 0x3}, &(0x7f0000000440)="e09e6dda135ac7c467011f", 0xb, r0) keyctl$search(0xa, r1, 0x0, &(0x7f0000000340)={'syz', 0x1}, r3) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000140)='cpuset\x00', 0x0, 0x0) add_key$keyring(&(0x7f0000000100), &(0x7f0000000180)={'syz', 0x0}, 0x0, 0x0, r0) r4 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r5 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) open(&(0x7f00000002c0)='./file0\x00', 0x98d00, 0x8) request_key(&(0x7f0000000580)='logon\x00', 0x0, &(0x7f0000000600)='\x1f-)\x00', 0xfffffffffffffff9) add_key$fscrypt_provisioning(&(0x7f0000000480), &(0x7f00000004c0)={'syz', 0x0}, &(0x7f0000000640)=ANY=[], 0x48, r0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = openat$cgroup_int(r4, &(0x7f00000001c0)='cpuset.sched_load_balance\x00', 0x2, 0x0) dup3(r7, r4, 0x0) r8 = add_key$keyring(&(0x7f0000000540), &(0x7f0000000640)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffc) r9 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000980), 0x200000, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r5, 0x81f8943c, &(0x7f000001a000)={0x0, ""/256, 0x0, 0x0, 0x0, 0x0, ""/16, ""/16, ""/16, 0x0}) ioctl$BTRFS_IOC_SUBVOL_CREATE_V2(r6, 0x50009418, &(0x7f000001a200)={{r9}, r10, 0x2, @inherit={0x58, &(0x7f00000009c0)={0x1, 0x2, 0x8, 0x7, {0x14, 0x1000, 0x5, 0x7}, [0xffff, 0x0]}}, @subvolid=0x4}) keyctl$search(0xa, r3, 0x0, &(0x7f0000000500)={'syz', 0x0}, r8) writev(r4, &(0x7f0000000300)=[{&(0x7f00000000c0)='0', 0x1}, {&(0x7f00000003c0)='7', 0x1}], 0x2) (fail_nth: 1) 16:34:53 executing program 5: r0 = request_key(0x0, 0x0, 0x0, 0xfffffffffffffffd) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) r1 = add_key$keyring(0x0, &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000780)='./file0\x00', &(0x7f0000000840)='gadgetfs\x00', 0x10, &(0x7f0000000880)='keyring\x00') perf_event_open(&(0x7f00000007c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x12c00, 0x0, 0xe5e}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) writev(0xffffffffffffffff, 0x0, 0x0) r2 = add_key(&(0x7f0000000240)='big_key\x00', &(0x7f0000000280)={'syz', 0x3}, &(0x7f0000019a40)="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", 0x5bd, 0xfffffffffffffffd) keyctl$read(0xb, r2, &(0x7f0000000a40)=""/102400, 0x19000) keyctl$search(0xa, r2, &(0x7f00000008c0)='keyring\x00', &(0x7f0000000900)={'syz', 0x1}, 0xfffffffffffffffd) request_key(&(0x7f00000006c0)='dns_resolver\x00', &(0x7f0000000700)={'syz', 0x3}, &(0x7f0000000940)='\x00', 0xfffffffffffffffd) r3 = add_key(&(0x7f0000000380)='id_resolver\x00', &(0x7f0000000400)={'syz', 0x3}, &(0x7f0000000440)="e09e6dda135ac7c467011f", 0xb, r0) keyctl$search(0xa, r1, 0x0, &(0x7f0000000340)={'syz', 0x1}, r3) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000140)='cpuset\x00', 0x0, 0x0) add_key$keyring(&(0x7f0000000100), &(0x7f0000000180)={'syz', 0x0}, 0x0, 0x0, r0) r4 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r5 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) request_key(&(0x7f0000000580)='logon\x00', &(0x7f00000005c0)={'syz', 0x0}, &(0x7f0000000600)='\x1f-)\x00', 0xfffffffffffffff9) add_key$fscrypt_provisioning(&(0x7f0000000480), &(0x7f00000004c0)={'syz', 0x0}, &(0x7f0000000640)=ANY=[], 0x48, r0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = openat$cgroup_int(r4, &(0x7f00000001c0)='cpuset.sched_load_balance\x00', 0x2, 0x0) dup3(r7, r4, 0x0) add_key$keyring(&(0x7f0000000540), &(0x7f0000000640)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffc) r8 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000980), 0x200000, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r5, 0x81f8943c, &(0x7f000001a000)={0x0, ""/256, 0x0, 0x0, 0x0, 0x0, ""/16, ""/16, ""/16, 0x0}) ioctl$BTRFS_IOC_SUBVOL_CREATE_V2(r6, 0x50009418, &(0x7f000001a200)={{r8}, r9, 0x2, @inherit={0x58, &(0x7f00000009c0)={0x1, 0x2, 0x8, 0x7, {0x14, 0x1000, 0x5, 0x7, 0x4}, [0xffff, 0x3]}}, @subvolid=0x4}) writev(r4, &(0x7f0000000300)=[{&(0x7f00000000c0)='0', 0x1}, {&(0x7f00000003c0)='7', 0x1}], 0x2) [ 2009.692042] new mount options do not match the existing superblock, will be ignored [ 2009.696330] hfs: invalid gid -1 [ 2009.733937] hfs: unable to parse mount options 16:34:53 executing program 1: syz_mount_image$hfs(&(0x7f0000000240), &(0x7f0000000380)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x3, &(0x7f0000000780)=ANY=[@ANYBLOB='quiet,gid=', @ANYRESHEX, @ANYBLOB="2c2a7270653d7614866b2c75693df589299908000000450000005d38ff0c0071446a0c48dba349ba347528523876dc8d7918ecea1024ba9669ff19a9ab5e27062b1dae8d8c0eb880008164ed9d8093fdc35f282dee56df9531b6e0c94b43c314af69146a70075499da5e7f927d3c672787e3d33a6071ff2c1483a1a7cfb34131bfee72f86068d0966d", @ANYRESHEX, @ANYBLOB=',codepage=ascii,rootcontext=sysadm_u,\x00'], 0x1, 0x235, &(0x7f0000000000)="$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") [ 2009.781325] new mount options do not match the existing superblock, will be ignored [ 2009.821024] new mount options do not match the existing superblock, will be ignored 16:34:54 executing program 2: r0 = request_key(0x0, 0x0, 0x0, 0xfffffffffffffffd) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) perf_event_open(&(0x7f00000007c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0xe5e}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) keyctl$read(0xb, 0x0, &(0x7f0000000a40)=""/102400, 0x19000) keyctl$search(0xa, 0x0, &(0x7f00000008c0)='keyring\x00', &(0x7f0000000900)={'syz', 0x1}, 0xfffffffffffffffd) request_key(&(0x7f00000006c0)='dns_resolver\x00', &(0x7f0000000700)={'syz', 0x3}, &(0x7f0000000940)='\x00', 0xfffffffffffffffd) add_key(0x0, &(0x7f0000000400)={'syz', 0x3}, &(0x7f0000000440), 0x0, r0) keyctl$search(0xa, 0x0, 0x0, &(0x7f0000000340)={'syz', 0x1}, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000140)='cpuset\x00', 0x0, 0x0) add_key$keyring(&(0x7f0000000100), 0x0, 0x0, 0x0, r0) r1 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) request_key(0x0, &(0x7f00000005c0)={'syz', 0x0}, 0x0, 0xfffffffffffffff9) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = openat$cgroup_int(r1, &(0x7f00000001c0)='cpuset.sched_load_balance\x00', 0x2, 0x0) dup3(r3, r1, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x200000, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f000001a000)={0x0, ""/256, 0x0, 0x0, 0x0, 0x0, ""/16, ""/16, ""/16, 0x0}) ioctl$BTRFS_IOC_SUBVOL_CREATE_V2(r2, 0x50009418, &(0x7f000001a200)={{}, r4, 0x2, @inherit={0x58, &(0x7f00000009c0)={0x1, 0x2, 0x8, 0x0, {0x0, 0x0, 0x0, 0x0, 0x4}, [0x0, 0x0]}}, @subvolid=0x4}) ioctl$BTRFS_IOC_BALANCE(0xffffffffffffffff, 0x5000940c, 0x0) keyctl$search(0xa, 0x0, &(0x7f0000000200)='keyring\x00', 0x0, 0x0) writev(r1, &(0x7f0000000300)=[{&(0x7f00000000c0)='0', 0x1}, {&(0x7f00000003c0)='7', 0x1}], 0x2) 16:34:54 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000340), 0x4}, 0x9458, 0x5, 0x0, 0x2, 0x388f7d41}, 0x0, 0x1, 0xffffffffffffffff, 0x0) (async) r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000140)={0x0, 0x0}, &(0x7f0000cab000)=0x6e) syz_mount_image$hfs(&(0x7f0000000240), &(0x7f0000000380)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x3, &(0x7f0000000400)={[{}, {@part={'part', 0x3d, 0x10001}}, {@type={'type', 0x3d, "7614866b"}}, {@uid={'uid', 0x3d, r1}}, {@codepage={'codepage', 0x3d, 'ascii'}}], [{@rootcontext={'rootcontext', 0x3d, 'sysadm_u'}}]}, 0x1, 0x235, &(0x7f0000000000)="$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") (async) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./bus\x00', 0x0, 0x0) (async) r3 = openat(0xffffffffffffff9c, &(0x7f0000004400)='./bus\x00', 0x1c1002, 0x0) write$binfmt_misc(r3, &(0x7f0000000180)={'syz1'}, 0x4) r4 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./bus\x00', 0x0, 0x0) r5 = openat(0xffffffffffffff9c, &(0x7f0000004400)='./bus\x00', 0x1c1002, 0x0) write$binfmt_misc(r5, &(0x7f0000000180)={'syz1'}, 0x4) (async) sendfile(r5, r4, 0x0, 0x1ffff) (async) r6 = syz_genetlink_get_family_id$nl80211(&(0x7f00000004c0), r2) sendmsg$NL80211_CMD_CRIT_PROTOCOL_STOP(r4, &(0x7f0000000580)={&(0x7f0000000480)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000540)={&(0x7f0000000500)={0x14, r6, 0x200, 0x70bd25, 0x25dfdbfc, {{}, {@void, @void}}, ["", "", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0xc0c0}, 0x5) sendfile(r3, r2, 0x0, 0x1ffff) getsockname$packet(r3, &(0x7f00000002c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000300)=0x14) (async) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000280)) [ 2009.838461] hfs: uid requires an argument [ 2009.847865] new mount options do not match the existing superblock, will be ignored [ 2009.873230] hfs: unable to parse mount options 16:34:54 executing program 0: r0 = request_key(0x0, 0x0, 0x0, 0xfffffffffffffffd) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) r1 = add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000740)=@filename='./file0\x00', &(0x7f0000000780)='./file0\x00', &(0x7f0000000840)='gadgetfs\x00', 0x0, &(0x7f0000000880)='keyring\x00') perf_event_open(&(0x7f00000007c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x12c00, 0x0, 0xe5e}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) writev(0xffffffffffffffff, 0x0, 0x0) r2 = add_key(0x0, &(0x7f0000000280)={'syz', 0x3}, &(0x7f0000019a40)="4195738ac28ccd83aa93c4ecacdaca3d34104be4cc5531c4091facf7f777321e84e49e039122a2d1cf7fea6a02aac8944c27ba038156bc10c0f7a6b26fbf382f67959d856600881f0e692c60f12ace775aab8d775dc2586454918a0db1811f5e8086f1a9805166c870b8387d380d5115af5841dad21f629e05f4b51e362c46b58a7dc2855c5189bff60d02c05ba67c297aa0ad05b93b1ee2fffae13fe5764d4e2a214e15093841b1551d518a669fa94e8918bfdd6573d5c0275a9b91ddb843775f78574891e03697f6ca290be6599b671093898a82e7905ed7c7fd8e8b422ebf12e5b543885596fc5c305d497407ffe73bd543f79c983f0807ae7e13fb5053fd7a07dddf8ec739418b59d67219f008f540161cec3bfd1b3097aad497248b221d572a9eb1bad6d921fcdcfdfacf8d1e392635168747056ec8a3fc45b3027293a517d50ea789294f132f2392919dc81ba5eb02e27e116cc300000000b6c0e39688425a3cb17d35f4b1eec0a37193f233c6655c6f40c09b4ea04c8880a431a8274127d56c3c8cab73a5fcf2b604b83658344e323eeedb0b283b0b3616236e904a42fed9fc8f4c131b047bfd5d7586e6a28032a4584fd5933472ce49dfdc99976166bb37eb1679b22249a222ffab17948dd6cc6f23f42ecd32a980ab8fc7c7d2da1a91f1db1187066c144bcbdb46240b7ef7ed28da4a358295b6104e4c60b09654e79f766e19e44174e94fa41d358d3dd901c060a06a388727be1092a37c0015695b1363ed018e724947983aa6b5974daf6388547cdacbd44a1282c3b9130cbf9536c29a523980b9e4328d1a7c0de8b636d7dfdee36434125948b1d802d5d143645c3a5f8da50adeef6e4f715361908a20cb998d3e0907aef9fdd19bb79be8c510b8aa04600163636c1d1f36f3834ffa3c7369e1d8ed9348bc339da2a525c4f165c0caebb7a4ee632a37a43897084e3c07a5ed8b505a51a4777095060b0ff6a6442206244dd9a13b5ba52b07c718e9eaad10befd12be35dc50283d584035d75e4917548ff58045b88d29b6826ceb6d44fb54ba3ef7944da6e86c0f2d0bc0bd725aa9193b3de4837634ead361d9b2ff5ae4de005f53d48cba029b43eb35fbedd0b5397918a9324b6e1f1d88399d8ad69b7d79e89ded6fe81fd1200f95c831f8c60dc1483e97052f61d0a643df0c2e1b0ba7d00b0692efd1bfc1ece10c2e785e3cb3b0dfbdbd722b6e53e5a2884b1cc5d939a572564bc8a2260e8718230878edb3a877f5c585f4373ef8e0e1cff5dacf96862906ff37eec18ba706d22b101965eaf5f5e29f544977896117e25ceb572f3443eddf9651c2ac69c911b21fd69e59ee57ebe4c549ff2a3dcd904656663039789f022a6caa7f76640e75efdba82dabacf8c0112bd4e62a3a9e69a9824c1af45cf86b307d9749937dd08b6ef49860cda5da7bb886f92db7cd43a869aa646a6da291a75ff28c4d728b1377b8e80233b33e724a60c0a015ec75cd86af04a4bd43964d8f7ba781a99d0cd7ff7e189fc91801655cb1b60e6bc3af747655341deceadbed3d76bdfae92389cc87c417e0f58f3fbcc56ff347467a20773146a81090ff42bbb5383d74108028f5fa532c647746054c312e2e4c085f58d93bec6da7c2bfd99fc59c1631cc71110acc2bf352b994e2a246be3cc1d240fa0c60eb04b92a9673d2ac2bba7f322ddbbd74712b0ec459050586523bd0b0505174a701206e47f2bb7fe20caf5ed73d33447b89432802e7d4606512e217aedf78c871e10cfbdf202efbf3fd8495b6be18cde726dc1fefc01921e9d1f15c8301376c33b5a698d0f7d5f317835d74857e121fe820d93f6b757c9938ec81f9b19a4b0d4ed35d1309fbcb285cf7717e9e27aaaba9d7d742fcfd786eacd993fb119e1d52908ca7ce2135046fa95805704c6258fd1b5fc1434af7ab99609820d73627080d43bcaeeb42ce423e17aa4df3a6994ead3133e2ecfbc6fa308c6b71b78cbab273641970b49e15d0dbe7aea716eaf6cf40f90d0d7d3d8bf1d165d25d5f6f6376416b9dd13731c5c2fdadee8e48c76430cccb21d8e6c659", 0x5bd, 0xfffffffffffffffd) keyctl$read(0xb, r2, &(0x7f0000000a40)=""/102400, 0x19000) keyctl$search(0xa, r2, &(0x7f00000008c0)='keyring\x00', &(0x7f0000000900)={'syz', 0x1}, 0xfffffffffffffffd) request_key(&(0x7f00000006c0)='dns_resolver\x00', &(0x7f0000000700)={'syz', 0x3}, 0x0, 0xfffffffffffffffd) r3 = add_key(&(0x7f0000000380)='id_resolver\x00', &(0x7f0000000400)={'syz', 0x3}, &(0x7f0000000440)="e09e6dda135ac7c467011f", 0xb, r0) keyctl$search(0xa, r1, 0x0, &(0x7f0000000340)={'syz', 0x1}, r3) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000140)='cpuset\x00', 0x0, 0x0) add_key$keyring(&(0x7f0000000100), &(0x7f0000000180)={'syz', 0x0}, 0x0, 0x0, r0) r4 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r5 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) open(&(0x7f00000002c0)='./file0\x00', 0x98d00, 0x8) request_key(&(0x7f0000000580)='logon\x00', 0x0, &(0x7f0000000600)='\x1f-)\x00', 0xfffffffffffffff9) add_key$fscrypt_provisioning(&(0x7f0000000480), &(0x7f00000004c0)={'syz', 0x0}, &(0x7f0000000640)=ANY=[], 0x48, r0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = openat$cgroup_int(r4, &(0x7f00000001c0)='cpuset.sched_load_balance\x00', 0x2, 0x0) dup3(r7, r4, 0x0) r8 = add_key$keyring(&(0x7f0000000540), &(0x7f0000000640)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffc) r9 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000980), 0x200000, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r5, 0x81f8943c, &(0x7f000001a000)={0x0, ""/256, 0x0, 0x0, 0x0, 0x0, ""/16, ""/16, ""/16, 0x0}) ioctl$BTRFS_IOC_SUBVOL_CREATE_V2(r6, 0x50009418, &(0x7f000001a200)={{r9}, r10, 0x2, @inherit={0x58, &(0x7f00000009c0)={0x1, 0x2, 0x8, 0x7, {0x14, 0x1000, 0x5, 0x7}, [0xffff, 0x0]}}, @subvolid=0x4}) keyctl$search(0xa, r3, 0x0, &(0x7f0000000500)={'syz', 0x0}, r8) writev(r4, &(0x7f0000000300)=[{&(0x7f00000000c0)='0', 0x1}, {&(0x7f00000003c0)='7', 0x1}], 0x2) 16:34:54 executing program 4: r0 = request_key(0x0, 0x0, 0x0, 0xfffffffffffffffd) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000780)='./file0\x00', &(0x7f0000000840)='gadgetfs\x00', 0x0, &(0x7f0000000880)='keyring\x00') perf_event_open(&(0x7f00000007c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x12c00, 0x0, 0xe5e}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) writev(0xffffffffffffffff, 0x0, 0x0) keyctl$read(0xb, 0x0, &(0x7f0000000a40)=""/102400, 0x19000) keyctl$search(0xa, 0x0, 0x0, 0x0, 0xfffffffffffffffd) request_key(&(0x7f00000006c0)='dns_resolver\x00', &(0x7f0000000700)={'syz', 0x3}, &(0x7f0000000940)='\x00', 0xfffffffffffffffd) r1 = add_key(&(0x7f0000000380)='id_resolver\x00', 0x0, &(0x7f0000000440), 0x0, r0) keyctl$search(0xa, 0x0, 0x0, &(0x7f0000000340)={'syz', 0x1}, r1) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000140)='cpuset\x00', 0x0, 0x0) add_key$keyring(&(0x7f0000000100), &(0x7f0000000180)={'syz', 0x0}, 0x0, 0x0, r0) r2 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r3 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) open(&(0x7f00000002c0)='./file0\x00', 0x98d00, 0x8) request_key(&(0x7f0000000580)='logon\x00', &(0x7f00000005c0)={'syz', 0x0}, &(0x7f0000000600)='\x1f-)\x00', 0xfffffffffffffff9) write$rfkill(r3, &(0x7f0000000040)={0x0, 0x0, 0x3}, 0x8) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = openat$cgroup_int(r2, &(0x7f00000001c0)='cpuset.sched_load_balance\x00', 0x2, 0x0) dup3(r5, r2, 0x0) r6 = add_key$keyring(&(0x7f0000000540), &(0x7f0000000640)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffc) r7 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000980), 0x200000, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r3, 0x81f8943c, &(0x7f000001a000)={0x0, ""/256, 0x0, 0x0, 0x0, 0x0, ""/16, ""/16, ""/16, 0x0}) ioctl$BTRFS_IOC_SUBVOL_CREATE_V2(r4, 0x50009418, &(0x7f000001a200)={{r7}, r8, 0x2, @inherit={0x58, &(0x7f00000009c0)={0x1, 0x2, 0x8, 0x7, {0x14, 0x1000, 0x5, 0x7, 0x4}, [0xffff, 0x3]}}, @subvolid=0x4}) ioctl$BTRFS_IOC_BALANCE(r4, 0x5000940c, 0x0) keyctl$search(0xa, r1, &(0x7f0000000200)='keyring\x00', &(0x7f0000000500)={'syz', 0x0}, r6) writev(r2, &(0x7f0000000300)=[{&(0x7f00000000c0)='0', 0x1}, {&(0x7f00000003c0)='7', 0x1}], 0x2) 16:34:54 executing program 5: r0 = request_key(0x0, 0x0, 0x0, 0xfffffffffffffffd) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) r1 = add_key$keyring(0x0, &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000740)=@filename='./file0\x00', 0x0, &(0x7f0000000840)='gadgetfs\x00', 0x10, &(0x7f0000000880)='keyring\x00') perf_event_open(&(0x7f00000007c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x12c00, 0x0, 0xe5e}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) writev(0xffffffffffffffff, 0x0, 0x0) r2 = add_key(&(0x7f0000000240)='big_key\x00', &(0x7f0000000280)={'syz', 0x3}, &(0x7f0000019a40)="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", 0x5bd, 0xfffffffffffffffd) keyctl$read(0xb, r2, &(0x7f0000000a40)=""/102400, 0x19000) keyctl$search(0xa, r2, &(0x7f00000008c0)='keyring\x00', &(0x7f0000000900)={'syz', 0x1}, 0xfffffffffffffffd) request_key(&(0x7f00000006c0)='dns_resolver\x00', &(0x7f0000000700)={'syz', 0x3}, &(0x7f0000000940)='\x00', 0xfffffffffffffffd) r3 = add_key(&(0x7f0000000380)='id_resolver\x00', &(0x7f0000000400)={'syz', 0x3}, &(0x7f0000000440)="e09e6dda135ac7c467011f", 0xb, r0) keyctl$search(0xa, r1, 0x0, &(0x7f0000000340)={'syz', 0x1}, r3) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000140)='cpuset\x00', 0x0, 0x0) add_key$keyring(&(0x7f0000000100), &(0x7f0000000180)={'syz', 0x0}, 0x0, 0x0, r0) r4 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r5 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) request_key(&(0x7f0000000580)='logon\x00', &(0x7f00000005c0)={'syz', 0x0}, &(0x7f0000000600)='\x1f-)\x00', 0xfffffffffffffff9) add_key$fscrypt_provisioning(&(0x7f0000000480), &(0x7f00000004c0)={'syz', 0x0}, &(0x7f0000000640)=ANY=[], 0x48, r0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = openat$cgroup_int(r4, &(0x7f00000001c0)='cpuset.sched_load_balance\x00', 0x2, 0x0) dup3(r7, r4, 0x0) add_key$keyring(&(0x7f0000000540), &(0x7f0000000640)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffc) r8 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000980), 0x200000, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r5, 0x81f8943c, &(0x7f000001a000)={0x0, ""/256, 0x0, 0x0, 0x0, 0x0, ""/16, ""/16, ""/16, 0x0}) ioctl$BTRFS_IOC_SUBVOL_CREATE_V2(r6, 0x50009418, &(0x7f000001a200)={{r8}, r9, 0x2, @inherit={0x58, &(0x7f00000009c0)={0x1, 0x2, 0x8, 0x7, {0x14, 0x1000, 0x5, 0x7, 0x4}, [0xffff, 0x3]}}, @subvolid=0x4}) writev(r4, &(0x7f0000000300)=[{&(0x7f00000000c0)='0', 0x1}, {&(0x7f00000003c0)='7', 0x1}], 0x2) [ 2010.012691] new mount options do not match the existing superblock, will be ignored [ 2010.056645] hfs: invalid gid -1 [ 2010.059950] hfs: unable to parse mount options 16:34:54 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000340), 0x4}, 0x9458, 0x5, 0x0, 0x2, 0x388f7d41}, 0x0, 0x1, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000140)={0x0, 0x0}, &(0x7f0000cab000)=0x6e) syz_mount_image$hfs(&(0x7f0000000240), &(0x7f0000000380)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x3, &(0x7f0000000400)={[{}, {@part={'part', 0x3d, 0x10001}}, {@type={'type', 0x3d, "7614866b"}}, {@uid={'uid', 0x3d, r1}}, {@codepage={'codepage', 0x3d, 'ascii'}}], [{@rootcontext={'rootcontext', 0x3d, 'sysadm_u'}}]}, 0x1, 0x235, &(0x7f0000000000)="$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") r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./bus\x00', 0x0, 0x0) (async, rerun: 32) r3 = openat(0xffffffffffffff9c, &(0x7f0000004400)='./bus\x00', 0x1c1002, 0x0) (rerun: 32) write$binfmt_misc(r3, &(0x7f0000000180)={'syz1'}, 0x4) (async, rerun: 32) r4 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./bus\x00', 0x0, 0x0) (async, rerun: 32) r5 = openat(0xffffffffffffff9c, &(0x7f0000004400)='./bus\x00', 0x1c1002, 0x0) write$binfmt_misc(r5, &(0x7f0000000180)={'syz1'}, 0x4) sendfile(r5, r4, 0x0, 0x1ffff) (async) r6 = syz_genetlink_get_family_id$nl80211(&(0x7f00000004c0), r2) sendmsg$NL80211_CMD_CRIT_PROTOCOL_STOP(r4, &(0x7f0000000580)={&(0x7f0000000480)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000540)={&(0x7f0000000500)={0x14, r6, 0x200, 0x70bd25, 0x25dfdbfc, {{}, {@void, @void}}, ["", "", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0xc0c0}, 0x5) sendfile(r3, r2, 0x0, 0x1ffff) getsockname$packet(r3, &(0x7f00000002c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000300)=0x14) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000280)) 16:34:54 executing program 1: syz_mount_image$hfs(&(0x7f0000000240), &(0x7f0000000380)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x3, &(0x7f0000000780)=ANY=[@ANYBLOB='quiet,gid=', @ANYRESHEX, @ANYBLOB="2c2a7270653d7614866b2c75693df589299908000000450000005d38ff0c0071446a0c48dba349ba347528523876dc8d7918ecea1024ba9669ff19a9ab5e27062b1dae8d8c0eb880008164ed9d8093fdc35f282dee56df9531b6e0c94b43c314af69146a70075499da5e7f927d3c672787e3d33a6071ff2c1483a1a7cfb34131bfee72f86068d0966d", @ANYRESHEX, @ANYBLOB=',codepage=ascii,rootcontext=sysadm_u,\x00'], 0x1, 0x235, &(0x7f0000000000)="$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") 16:34:54 executing program 0: r0 = request_key(0x0, 0x0, 0x0, 0xfffffffffffffffd) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) r1 = add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000740)=@filename='./file0\x00', &(0x7f0000000780)='./file0\x00', &(0x7f0000000840)='gadgetfs\x00', 0x0, &(0x7f0000000880)='keyring\x00') perf_event_open(&(0x7f00000007c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x12c00, 0x0, 0xe5e}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) writev(0xffffffffffffffff, 0x0, 0x0) r2 = add_key(0x0, &(0x7f0000000280)={'syz', 0x3}, &(0x7f0000019a40)="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", 0x5bd, 0xfffffffffffffffd) keyctl$read(0xb, r2, &(0x7f0000000a40)=""/102400, 0x19000) keyctl$search(0xa, r2, &(0x7f00000008c0)='keyring\x00', &(0x7f0000000900)={'syz', 0x1}, 0xfffffffffffffffd) request_key(&(0x7f00000006c0)='dns_resolver\x00', &(0x7f0000000700)={'syz', 0x3}, 0x0, 0xfffffffffffffffd) r3 = add_key(&(0x7f0000000380)='id_resolver\x00', &(0x7f0000000400)={'syz', 0x3}, &(0x7f0000000440)="e09e6dda135ac7c467011f", 0xb, r0) keyctl$search(0xa, r1, 0x0, &(0x7f0000000340)={'syz', 0x1}, r3) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000140)='cpuset\x00', 0x0, 0x0) add_key$keyring(&(0x7f0000000100), &(0x7f0000000180)={'syz', 0x0}, 0x0, 0x0, r0) r4 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r5 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) open(&(0x7f00000002c0)='./file0\x00', 0x98d00, 0x8) request_key(&(0x7f0000000580)='logon\x00', 0x0, &(0x7f0000000600)='\x1f-)\x00', 0xfffffffffffffff9) add_key$fscrypt_provisioning(&(0x7f0000000480), &(0x7f00000004c0)={'syz', 0x0}, &(0x7f0000000640)=ANY=[], 0x48, r0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = openat$cgroup_int(r4, &(0x7f00000001c0)='cpuset.sched_load_balance\x00', 0x2, 0x0) dup3(r7, r4, 0x0) r8 = add_key$keyring(&(0x7f0000000540), &(0x7f0000000640)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffc) r9 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000980), 0x200000, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r5, 0x81f8943c, &(0x7f000001a000)={0x0, ""/256, 0x0, 0x0, 0x0, 0x0, ""/16, ""/16, ""/16, 0x0}) ioctl$BTRFS_IOC_SUBVOL_CREATE_V2(r6, 0x50009418, &(0x7f000001a200)={{r9}, r10, 0x2, @inherit={0x58, &(0x7f00000009c0)={0x1, 0x2, 0x8, 0x7, {0x14, 0x1000, 0x5, 0x7}, [0xffff, 0x0]}}, @subvolid=0x4}) keyctl$search(0xa, r3, 0x0, &(0x7f0000000500)={'syz', 0x0}, r8) writev(r4, &(0x7f0000000300)=[{&(0x7f00000000c0)='+', 0x1}, {&(0x7f00000003c0)='7', 0x1}], 0x2) [ 2010.204249] new mount options do not match the existing superblock, will be ignored [ 2010.223701] new mount options do not match the existing superblock, will be ignored [ 2010.238669] new mount options do not match the existing superblock, will be ignored 16:34:54 executing program 1: syz_mount_image$hfs(&(0x7f0000000240), &(0x7f0000000380)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x3, &(0x7f0000000780)=ANY=[@ANYBLOB='quiet,gid=', @ANYRESHEX, @ANYBLOB="2c2a7270653d7614866b2c75693df589299908000000450000005d38ff0c0071446a0c48dba349ba347528523876dc8d7918ecea1024ba9669ff19a9ab5e27062b1dae8d8c0eb880008164ed9d8093fdc35f282dee56df9531b6e0c94b43c314af69146a70075499da5e7f927d3c672787e3d33a6071ff2c1483a1a7cfb34131bfee72f86068d0966d", @ANYRESHEX, @ANYBLOB=',codepage=ascii,rootcontext=sysadm_u,\x00'], 0x1, 0x235, &(0x7f0000000000)="$eJzs3U9rE0EYx/HfTKJGW+r2jwgeqwVP0upFvAiSF+FJ1CZCcamgFdSL4ll8Ad59C74IT+Ib0JMnX0BOjszspNnGbDatTYY23w8kbLvz7DzT2e3MEygVgLl1r/3j861f/mWkhhqS7khWUktqSrqky62Xu3s7e3m3M+5CjRDhX0ZFpPmnzfZud1SojwsRUea/amqx/D1Mh3PO/UydBJILT/8IVjoXn85wvjXzzKbjXeoEEjM99fRKS6nzAACkFdd/G9f5xbh/t1baiMv+qVr/e6kTSKy0/ocqyxk/vxfDqUG9F0o4f972q8Sj9HVWxZ11YINp6qrKkIs9/2Qn797YfpZ3rN7rblRqthbeO8Wt21eT7fqI2nSMo499IYzhjB/DzYr8V4+3x3rmq/lmHphMn9TZ3/81nfHTFGYqG5qpIv/N6iuGUWZFq4pRLodOrsQeoppRtkZXJOrfUcs6+AFBVpdniFoZiipGt1UTtVqOeuvcn2JOa6LWhvsa3M3VkdNmPpr7Zl2/9UXt0v7f+p/2hiZ5Mn2b0DLeGWPH0wwtswkSs4caBv7PBz3WbS29eP3m6aM87z7ngAMOONg/SP0LCrMwmPTUmSARv+8yRf1Xqlc2Q4nk37Ix+3RXd/HSFbcqaoOV8H7hUBXcQnUFN2nNdfW6dG3yHrOY5ylh2vquh3z+DwAAAAAAAAAAAAAAAAAAcNLM4s8JUo8RAAAAAAAAAAAAAAAAAAAAAICTjv//C8yvvwEAAP//2LyFkQ==") 16:34:54 executing program 4: r0 = request_key(0x0, 0x0, 0x0, 0xfffffffffffffffd) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) r1 = add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000780)='./file0\x00', &(0x7f0000000840)='gadgetfs\x00', 0x0, &(0x7f0000000880)='keyring\x00') perf_event_open(&(0x7f00000007c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x12c00, 0x0, 0xe5e}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) writev(0xffffffffffffffff, 0x0, 0x0) keyctl$read(0xb, 0x0, &(0x7f0000000a40)=""/102400, 0x19000) keyctl$search(0xa, 0x0, 0x0, 0x0, 0xfffffffffffffffd) request_key(&(0x7f00000006c0)='dns_resolver\x00', &(0x7f0000000700)={'syz', 0x3}, &(0x7f0000000940)='\x00', 0xfffffffffffffffd) r2 = add_key(&(0x7f0000000380)='id_resolver\x00', 0x0, &(0x7f0000000440), 0x0, r0) keyctl$search(0xa, r1, 0x0, 0x0, r2) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000140)='cpuset\x00', 0x0, 0x0) add_key$keyring(&(0x7f0000000100), &(0x7f0000000180)={'syz', 0x0}, 0x0, 0x0, r0) r3 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r4 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) open(&(0x7f00000002c0)='./file0\x00', 0x98d00, 0x8) request_key(&(0x7f0000000580)='logon\x00', &(0x7f00000005c0)={'syz', 0x0}, &(0x7f0000000600)='\x1f-)\x00', 0xfffffffffffffff9) write$rfkill(r4, &(0x7f0000000040)={0x0, 0x0, 0x3}, 0x8) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = openat$cgroup_int(r3, &(0x7f00000001c0)='cpuset.sched_load_balance\x00', 0x2, 0x0) dup3(r6, r3, 0x0) r7 = add_key$keyring(&(0x7f0000000540), &(0x7f0000000640)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffc) r8 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000980), 0x200000, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r4, 0x81f8943c, &(0x7f000001a000)={0x0, ""/256, 0x0, 0x0, 0x0, 0x0, ""/16, ""/16, ""/16, 0x0}) ioctl$BTRFS_IOC_SUBVOL_CREATE_V2(r5, 0x50009418, &(0x7f000001a200)={{r8}, r9, 0x2, @inherit={0x58, &(0x7f00000009c0)={0x1, 0x2, 0x8, 0x7, {0x14, 0x1000, 0x5, 0x7, 0x4}, [0xffff, 0x3]}}, @subvolid=0x4}) ioctl$BTRFS_IOC_BALANCE(r5, 0x5000940c, 0x0) keyctl$search(0xa, r2, &(0x7f0000000200)='keyring\x00', &(0x7f0000000500)={'syz', 0x0}, r7) writev(r3, &(0x7f0000000300)=[{&(0x7f00000000c0)='0', 0x1}, {&(0x7f00000003c0)='7', 0x1}], 0x2) [ 2010.446716] wlan1: No active IBSS STAs - trying to scan for other IBSS networks with same SSID (merge) [ 2010.468202] new mount options do not match the existing superblock, will be ignored [ 2010.494844] hfs: uid requires an argument [ 2010.567429] hfs: unable to parse mount options 16:34:54 executing program 2: r0 = request_key(0x0, 0x0, 0x0, 0xfffffffffffffffd) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) perf_event_open(&(0x7f00000007c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0xe5e}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) keyctl$read(0xb, 0x0, &(0x7f0000000a40)=""/102400, 0x19000) keyctl$search(0xa, 0x0, &(0x7f00000008c0)='keyring\x00', &(0x7f0000000900)={'syz', 0x1}, 0xfffffffffffffffd) request_key(&(0x7f00000006c0)='dns_resolver\x00', &(0x7f0000000700)={'syz', 0x3}, &(0x7f0000000940)='\x00', 0xfffffffffffffffd) add_key(0x0, &(0x7f0000000400)={'syz', 0x3}, &(0x7f0000000440), 0x0, r0) keyctl$search(0xa, 0x0, 0x0, &(0x7f0000000340)={'syz', 0x1}, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000140)='cpuset\x00', 0x0, 0x0) add_key$keyring(&(0x7f0000000100), 0x0, 0x0, 0x0, r0) r1 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) request_key(0x0, &(0x7f00000005c0)={'syz', 0x0}, 0x0, 0xfffffffffffffff9) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = openat$cgroup_int(r1, &(0x7f00000001c0)='cpuset.sched_load_balance\x00', 0x2, 0x0) dup3(r3, r1, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x200000, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f000001a000)={0x0, ""/256, 0x0, 0x0, 0x0, 0x0, ""/16, ""/16, ""/16, 0x0}) ioctl$BTRFS_IOC_SUBVOL_CREATE_V2(r2, 0x50009418, &(0x7f000001a200)={{}, r4, 0x2, @inherit={0x58, &(0x7f00000009c0)={0x1, 0x2, 0x8, 0x0, {0x0, 0x0, 0x0, 0x0, 0x4}, [0x0, 0x0]}}, @subvolid=0x4}) ioctl$BTRFS_IOC_BALANCE(0xffffffffffffffff, 0x5000940c, 0x0) keyctl$search(0xa, 0x0, &(0x7f0000000200)='keyring\x00', &(0x7f0000000500)={'syz', 0x0}, 0x0) writev(0xffffffffffffffff, &(0x7f0000000300)=[{&(0x7f00000000c0)='0', 0x1}, {&(0x7f00000003c0)='7', 0x1}], 0x2) 16:34:54 executing program 0: r0 = request_key(0x0, 0x0, 0x0, 0xfffffffffffffffd) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) r1 = add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000740)=@filename='./file0\x00', &(0x7f0000000780)='./file0\x00', &(0x7f0000000840)='gadgetfs\x00', 0x0, &(0x7f0000000880)='keyring\x00') perf_event_open(&(0x7f00000007c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x12c00, 0x0, 0xe5e}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) writev(0xffffffffffffffff, 0x0, 0x0) r2 = add_key(0x0, &(0x7f0000000280)={'syz', 0x3}, &(0x7f0000019a40)="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", 0x5bd, 0xfffffffffffffffd) keyctl$read(0xb, r2, &(0x7f0000000a40)=""/102400, 0x19000) keyctl$search(0xa, r2, &(0x7f00000008c0)='keyring\x00', &(0x7f0000000900)={'syz', 0x1}, 0xfffffffffffffffd) request_key(&(0x7f00000006c0)='dns_resolver\x00', &(0x7f0000000700)={'syz', 0x3}, 0x0, 0xfffffffffffffffd) r3 = add_key(&(0x7f0000000380)='id_resolver\x00', &(0x7f0000000400)={'syz', 0x3}, &(0x7f0000000440)="e09e6dda135ac7c467011f", 0xb, r0) keyctl$search(0xa, r1, 0x0, &(0x7f0000000340)={'syz', 0x1}, r3) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000140)='cpuset\x00', 0x0, 0x0) add_key$keyring(&(0x7f0000000100), &(0x7f0000000180)={'syz', 0x0}, 0x0, 0x0, r0) r4 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r5 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) open(&(0x7f00000002c0)='./file0\x00', 0x98d00, 0x8) request_key(&(0x7f0000000580)='logon\x00', 0x0, &(0x7f0000000600)='\x1f-)\x00', 0xfffffffffffffff9) add_key$fscrypt_provisioning(&(0x7f0000000480), &(0x7f00000004c0)={'syz', 0x0}, &(0x7f0000000640)=ANY=[], 0x48, r0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = openat$cgroup_int(r4, &(0x7f00000001c0)='cpuset.sched_load_balance\x00', 0x2, 0x0) dup3(r7, r4, 0x0) r8 = add_key$keyring(&(0x7f0000000540), &(0x7f0000000640)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffc) r9 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000980), 0x200000, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r5, 0x81f8943c, &(0x7f000001a000)={0x0, ""/256, 0x0, 0x0, 0x0, 0x0, ""/16, ""/16, ""/16, 0x0}) ioctl$BTRFS_IOC_SUBVOL_CREATE_V2(r6, 0x50009418, &(0x7f000001a200)={{r9}, r10, 0x2, @inherit={0x58, &(0x7f00000009c0)={0x1, 0x2, 0x8, 0x7, {0x14, 0x1000, 0x5, 0x7}, [0xffff, 0x0]}}, @subvolid=0x4}) keyctl$search(0xa, r3, 0x0, &(0x7f0000000500)={'syz', 0x0}, r8) writev(r4, &(0x7f0000000300)=[{&(0x7f00000000c0)='0', 0x2}, {&(0x7f00000003c0)='7', 0x1}], 0x2) 16:34:54 executing program 5: r0 = request_key(0x0, 0x0, 0x0, 0xfffffffffffffffd) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) r1 = add_key$keyring(0x0, &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000740)=@filename='./file0\x00', 0x0, &(0x7f0000000840)='gadgetfs\x00', 0x10, &(0x7f0000000880)='keyring\x00') perf_event_open(&(0x7f00000007c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x12c00, 0x0, 0xe5e}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) writev(0xffffffffffffffff, 0x0, 0x0) r2 = add_key(&(0x7f0000000240)='big_key\x00', &(0x7f0000000280)={'syz', 0x3}, &(0x7f0000019a40)="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", 0x5bd, 0xfffffffffffffffd) keyctl$read(0xb, r2, &(0x7f0000000a40)=""/102400, 0x19000) keyctl$search(0xa, r2, &(0x7f00000008c0)='keyring\x00', &(0x7f0000000900)={'syz', 0x1}, 0xfffffffffffffffd) request_key(&(0x7f00000006c0)='dns_resolver\x00', &(0x7f0000000700)={'syz', 0x3}, &(0x7f0000000940)='\x00', 0xfffffffffffffffd) r3 = add_key(&(0x7f0000000380)='id_resolver\x00', &(0x7f0000000400)={'syz', 0x3}, &(0x7f0000000440)="e09e6dda135ac7c467011f", 0xb, r0) keyctl$search(0xa, r1, 0x0, &(0x7f0000000340)={'syz', 0x1}, r3) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000140)='cpuset\x00', 0x0, 0x0) add_key$keyring(&(0x7f0000000100), &(0x7f0000000180)={'syz', 0x0}, 0x0, 0x0, r0) r4 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r5 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) request_key(&(0x7f0000000580)='logon\x00', &(0x7f00000005c0)={'syz', 0x0}, &(0x7f0000000600)='\x1f-)\x00', 0xfffffffffffffff9) add_key$fscrypt_provisioning(&(0x7f0000000480), &(0x7f00000004c0)={'syz', 0x0}, &(0x7f0000000640)=ANY=[], 0x48, r0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = openat$cgroup_int(r4, &(0x7f00000001c0)='cpuset.sched_load_balance\x00', 0x2, 0x0) dup3(r7, r4, 0x0) add_key$keyring(&(0x7f0000000540), &(0x7f0000000640)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffc) r8 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000980), 0x200000, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r5, 0x81f8943c, &(0x7f000001a000)={0x0, ""/256, 0x0, 0x0, 0x0, 0x0, ""/16, ""/16, ""/16, 0x0}) ioctl$BTRFS_IOC_SUBVOL_CREATE_V2(r6, 0x50009418, &(0x7f000001a200)={{r8}, r9, 0x2, @inherit={0x58, &(0x7f00000009c0)={0x1, 0x2, 0x8, 0x7, {0x14, 0x1000, 0x5, 0x7, 0x4}, [0xffff, 0x3]}}, @subvolid=0x4}) writev(r4, &(0x7f0000000300)=[{&(0x7f00000000c0)='0', 0x1}, {&(0x7f00000003c0)='7', 0x1}], 0x2) 16:34:54 executing program 1: syz_mount_image$hfs(&(0x7f0000000240), &(0x7f0000000380)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x3, &(0x7f0000000780)=ANY=[@ANYBLOB='quiet,gid=', @ANYRESHEX, @ANYBLOB="2c2a7270653d7614866b2c75693df589299908000000450000005d38ff0c0071446a0c48dba349ba347528523876dc8d7918ecea1024ba9669ff19a9ab5e27062b1dae8d8c0eb880008164ed9d8093fdc35f282dee56df9531b6e0c94b43c314af69146a70075499da5e7f927d3c672787e3d33a6071ff2c1483a1a7cfb34131bfee72f86068d0966d", @ANYRESHEX, @ANYBLOB=',codepage=ascii,rootcontext=sysadm_u,\x00'], 0x1, 0x235, &(0x7f0000000000)="$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") [ 2010.668257] new mount options do not match the existing superblock, will be ignored 16:34:54 executing program 3: getsockopt$IP6T_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x29, 0x45, &(0x7f0000000540)={'ipvs\x00'}, &(0x7f0000000580)=0x1e) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000140)={0x0, 0x0}, &(0x7f0000cab000)=0x6e) syz_mount_image$hfs(&(0x7f0000000240), &(0x7f0000000380)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x3, &(0x7f00000005c0)=ANY=[@ANYBLOB="71756965742c706172743d30eec16f78303030303032303030303031303030312c747970653d7614866b2c7469643da5fc0ef0244be7e173e7f3c7862ce4e13a09a092882f56e2f9962914bc7354917e3d65bb46751697187dd3098c96045051ad9103d1a5c41db7165207db017030c87b96622d78e21c07be5c7fa14b7edf6ddd1bc6263aa793c74ee6bf0cf9924647325176a8fe64e22600"/163, @ANYRESHEX=r1, @ANYBLOB=',codepage=ascii,rootcontext=sysadm_u,\x00'], 0x1, 0x235, &(0x7f0000000000)="$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") r2 = accept$ax25(r0, &(0x7f0000000400)={{0x3, @rose}, [@null, @netrom, @remote, @netrom, @bcast, @netrom, @rose, @rose]}, &(0x7f0000000480)=0x48) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f00000004c0), &(0x7f0000000500)=0xc) [ 2010.760183] new mount options do not match the existing superblock, will be ignored [ 2010.815256] hfs: invalid gid -1 16:34:54 executing program 4: r0 = request_key(0x0, 0x0, 0x0, 0xfffffffffffffffd) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) r1 = add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000780)='./file0\x00', &(0x7f0000000840)='gadgetfs\x00', 0x0, &(0x7f0000000880)='keyring\x00') perf_event_open(&(0x7f00000007c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x12c00, 0x0, 0xe5e}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) writev(0xffffffffffffffff, 0x0, 0x0) keyctl$read(0xb, 0x0, &(0x7f0000000a40)=""/102400, 0x19000) keyctl$search(0xa, 0x0, 0x0, 0x0, 0xfffffffffffffffd) request_key(&(0x7f00000006c0)='dns_resolver\x00', &(0x7f0000000700)={'syz', 0x3}, &(0x7f0000000940)='\x00', 0xfffffffffffffffd) r2 = add_key(&(0x7f0000000380)='id_resolver\x00', 0x0, &(0x7f0000000440), 0x0, r0) keyctl$search(0xa, r1, 0x0, 0x0, r2) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000140)='cpuset\x00', 0x0, 0x0) add_key$keyring(&(0x7f0000000100), &(0x7f0000000180)={'syz', 0x0}, 0x0, 0x0, r0) r3 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r4 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) open(&(0x7f00000002c0)='./file0\x00', 0x98d00, 0x8) request_key(&(0x7f0000000580)='logon\x00', &(0x7f00000005c0)={'syz', 0x0}, &(0x7f0000000600)='\x1f-)\x00', 0xfffffffffffffff9) write$rfkill(r4, &(0x7f0000000040)={0x0, 0x0, 0x3}, 0x8) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = openat$cgroup_int(r3, &(0x7f00000001c0)='cpuset.sched_load_balance\x00', 0x2, 0x0) dup3(r6, r3, 0x0) r7 = add_key$keyring(&(0x7f0000000540), &(0x7f0000000640)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffc) r8 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000980), 0x200000, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r4, 0x81f8943c, &(0x7f000001a000)={0x0, ""/256, 0x0, 0x0, 0x0, 0x0, ""/16, ""/16, ""/16, 0x0}) ioctl$BTRFS_IOC_SUBVOL_CREATE_V2(r5, 0x50009418, &(0x7f000001a200)={{r8}, r9, 0x2, @inherit={0x58, &(0x7f00000009c0)={0x1, 0x2, 0x8, 0x7, {0x14, 0x1000, 0x5, 0x7, 0x4}, [0xffff, 0x3]}}, @subvolid=0x4}) ioctl$BTRFS_IOC_BALANCE(r5, 0x5000940c, 0x0) keyctl$search(0xa, r2, &(0x7f0000000200)='keyring\x00', &(0x7f0000000500)={'syz', 0x0}, r7) writev(r3, &(0x7f0000000300)=[{&(0x7f00000000c0)='0', 0x1}, {&(0x7f00000003c0)='7', 0x1}], 0x2) 16:34:55 executing program 0: r0 = request_key(0x0, 0x0, 0x0, 0xfffffffffffffffd) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) r1 = add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000740)=@filename='./file0\x00', &(0x7f0000000780)='./file0\x00', &(0x7f0000000840)='gadgetfs\x00', 0x0, &(0x7f0000000880)='keyring\x00') perf_event_open(&(0x7f00000007c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x12c00, 0x0, 0xe5e}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) writev(0xffffffffffffffff, 0x0, 0x0) r2 = add_key(0x0, &(0x7f0000000280)={'syz', 0x3}, &(0x7f0000019a40)="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", 0x5bd, 0xfffffffffffffffd) keyctl$read(0xb, r2, &(0x7f0000000a40)=""/102400, 0x19000) keyctl$search(0xa, r2, &(0x7f00000008c0)='keyring\x00', &(0x7f0000000900)={'syz', 0x1}, 0xfffffffffffffffd) request_key(&(0x7f00000006c0)='dns_resolver\x00', &(0x7f0000000700)={'syz', 0x3}, 0x0, 0xfffffffffffffffd) r3 = add_key(&(0x7f0000000380)='id_resolver\x00', &(0x7f0000000400)={'syz', 0x3}, &(0x7f0000000440)="e09e6dda135ac7c467011f", 0xb, r0) keyctl$search(0xa, r1, 0x0, &(0x7f0000000340)={'syz', 0x1}, r3) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000140)='cpuset\x00', 0x0, 0x0) add_key$keyring(&(0x7f0000000100), &(0x7f0000000180)={'syz', 0x0}, 0x0, 0x0, r0) r4 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r5 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) open(&(0x7f00000002c0)='./file0\x00', 0x98d00, 0x8) request_key(&(0x7f0000000580)='logon\x00', 0x0, &(0x7f0000000600)='\x1f-)\x00', 0xfffffffffffffff9) add_key$fscrypt_provisioning(&(0x7f0000000480), &(0x7f00000004c0)={'syz', 0x0}, &(0x7f0000000640)=ANY=[], 0x48, r0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = openat$cgroup_int(r4, &(0x7f00000001c0)='cpuset.sched_load_balance\x00', 0x2, 0x0) dup3(r7, r4, 0x0) r8 = add_key$keyring(&(0x7f0000000540), &(0x7f0000000640)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffc) r9 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000980), 0x200000, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r5, 0x81f8943c, &(0x7f000001a000)={0x0, ""/256, 0x0, 0x0, 0x0, 0x0, ""/16, ""/16, ""/16, 0x0}) ioctl$BTRFS_IOC_SUBVOL_CREATE_V2(r6, 0x50009418, &(0x7f000001a200)={{r9}, r10, 0x2, @inherit={0x58, &(0x7f00000009c0)={0x1, 0x2, 0x8, 0x7, {0x14, 0x1000, 0x5, 0x7}, [0xffff, 0x0]}}, @subvolid=0x4}) keyctl$search(0xa, r3, 0x0, &(0x7f0000000500)={'syz', 0x0}, r8) writev(r4, &(0x7f0000000300)=[{&(0x7f00000000c0)='0', 0x4}, {&(0x7f00000003c0)='7', 0x1}], 0x2) 16:34:55 executing program 2: r0 = request_key(0x0, 0x0, 0x0, 0xfffffffffffffffd) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) perf_event_open(&(0x7f00000007c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0xe5e}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) keyctl$read(0xb, 0x0, &(0x7f0000000a40)=""/102400, 0x19000) keyctl$search(0xa, 0x0, &(0x7f00000008c0)='keyring\x00', &(0x7f0000000900)={'syz', 0x1}, 0xfffffffffffffffd) request_key(&(0x7f00000006c0)='dns_resolver\x00', &(0x7f0000000700)={'syz', 0x3}, &(0x7f0000000940)='\x00', 0xfffffffffffffffd) add_key(0x0, &(0x7f0000000400)={'syz', 0x3}, &(0x7f0000000440), 0x0, r0) keyctl$search(0xa, 0x0, 0x0, &(0x7f0000000340)={'syz', 0x1}, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000140)='cpuset\x00', 0x0, 0x0) add_key$keyring(&(0x7f0000000100), 0x0, 0x0, 0x0, r0) r1 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) request_key(0x0, &(0x7f00000005c0)={'syz', 0x0}, 0x0, 0xfffffffffffffff9) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = openat$cgroup_int(r1, &(0x7f00000001c0)='cpuset.sched_load_balance\x00', 0x2, 0x0) dup3(r3, r1, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x200000, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f000001a000)={0x0, ""/256, 0x0, 0x0, 0x0, 0x0, ""/16, ""/16, ""/16, 0x0}) ioctl$BTRFS_IOC_SUBVOL_CREATE_V2(r2, 0x50009418, &(0x7f000001a200)={{}, r4, 0x2, @inherit={0x58, &(0x7f00000009c0)={0x1, 0x2, 0x8, 0x0, {0x0, 0x0, 0x0, 0x0, 0x4}, [0x0, 0x0]}}, @subvolid=0x4}) ioctl$BTRFS_IOC_BALANCE(0xffffffffffffffff, 0x5000940c, 0x0) keyctl$search(0xa, 0x0, &(0x7f0000000200)='keyring\x00', &(0x7f0000000500)={'syz', 0x0}, 0x0) writev(0xffffffffffffffff, &(0x7f0000000300)=[{&(0x7f00000000c0)='0', 0x1}, {&(0x7f00000003c0)='7', 0x1}], 0x2) [ 2010.845103] hfs: unable to parse mount options [ 2010.856270] new mount options do not match the existing superblock, will be ignored [ 2010.877549] new mount options do not match the existing superblock, will be ignored 16:34:55 executing program 1: syz_mount_image$hfs(&(0x7f0000000240), &(0x7f0000000380)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x3, &(0x7f0000000780)=ANY=[@ANYBLOB='quiet,gid=', @ANYRESHEX, @ANYBLOB="2c2a7270653d7614866b2c75693df589299908000000450000005d38ff0c0071446a0c48dba349ba347528523876dc8d7918ecea1024ba9669ff19a9ab5e27062b1dae8d8c0eb880008164ed9d8093fdc35f282dee56df9531b6e0c94b43c314af69146a70075499da5e7f927d3c672787e3d33a6071ff2c1483a1a7cfb34131bfee72f86068d0966d", @ANYRESHEX, @ANYBLOB=',codepage=ascii,rootcontext=sysadm_u,\x00'], 0x1, 0x235, &(0x7f0000000000)="$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") [ 2010.923059] new mount options do not match the existing superblock, will be ignored [ 2010.944328] hfs: unable to parse mount options 16:34:55 executing program 5: r0 = request_key(0x0, 0x0, 0x0, 0xfffffffffffffffd) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) r1 = add_key$keyring(0x0, &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000740)=@filename='./file0\x00', 0x0, &(0x7f0000000840)='gadgetfs\x00', 0x10, &(0x7f0000000880)='keyring\x00') perf_event_open(&(0x7f00000007c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x12c00, 0x0, 0xe5e}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) writev(0xffffffffffffffff, 0x0, 0x0) r2 = add_key(&(0x7f0000000240)='big_key\x00', &(0x7f0000000280)={'syz', 0x3}, &(0x7f0000019a40)="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", 0x5bd, 0xfffffffffffffffd) keyctl$read(0xb, r2, &(0x7f0000000a40)=""/102400, 0x19000) keyctl$search(0xa, r2, &(0x7f00000008c0)='keyring\x00', &(0x7f0000000900)={'syz', 0x1}, 0xfffffffffffffffd) request_key(&(0x7f00000006c0)='dns_resolver\x00', &(0x7f0000000700)={'syz', 0x3}, &(0x7f0000000940)='\x00', 0xfffffffffffffffd) r3 = add_key(&(0x7f0000000380)='id_resolver\x00', &(0x7f0000000400)={'syz', 0x3}, &(0x7f0000000440)="e09e6dda135ac7c467011f", 0xb, r0) keyctl$search(0xa, r1, 0x0, &(0x7f0000000340)={'syz', 0x1}, r3) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000140)='cpuset\x00', 0x0, 0x0) add_key$keyring(&(0x7f0000000100), &(0x7f0000000180)={'syz', 0x0}, 0x0, 0x0, r0) r4 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r5 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) request_key(&(0x7f0000000580)='logon\x00', &(0x7f00000005c0)={'syz', 0x0}, &(0x7f0000000600)='\x1f-)\x00', 0xfffffffffffffff9) add_key$fscrypt_provisioning(&(0x7f0000000480), &(0x7f00000004c0)={'syz', 0x0}, &(0x7f0000000640)=ANY=[], 0x48, r0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = openat$cgroup_int(r4, &(0x7f00000001c0)='cpuset.sched_load_balance\x00', 0x2, 0x0) dup3(r7, r4, 0x0) add_key$keyring(&(0x7f0000000540), &(0x7f0000000640)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffc) r8 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000980), 0x200000, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r5, 0x81f8943c, &(0x7f000001a000)={0x0, ""/256, 0x0, 0x0, 0x0, 0x0, ""/16, ""/16, ""/16, 0x0}) ioctl$BTRFS_IOC_SUBVOL_CREATE_V2(r6, 0x50009418, &(0x7f000001a200)={{r8}, r9, 0x2, @inherit={0x58, &(0x7f00000009c0)={0x1, 0x2, 0x8, 0x7, {0x14, 0x1000, 0x5, 0x7, 0x4}, [0xffff, 0x3]}}, @subvolid=0x4}) writev(r4, &(0x7f0000000300)=[{&(0x7f00000000c0)='0', 0x1}, {&(0x7f00000003c0)='7', 0x1}], 0x2) 16:34:55 executing program 3: getsockopt$IP6T_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x29, 0x45, &(0x7f0000000540)={'ipvs\x00'}, &(0x7f0000000580)=0x1e) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000140)={0x0, 0x0}, &(0x7f0000cab000)=0x6e) syz_mount_image$hfs(&(0x7f0000000240), &(0x7f0000000380)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x3, &(0x7f00000005c0)=ANY=[@ANYBLOB="71756965742c706172743d30eec16f78303030303032303030303031303030312c747970653d7614866b2c7469643da5fc0ef0244be7e173e7f3c7862ce4e13a09a092882f56e2f9962914bc7354917e3d65bb46751697187dd3098c96045051ad9103d1a5c41db7165207db017030c87b96622d78e21c07be5c7fa14b7edf6ddd1bc6263aa793c74ee6bf0cf9924647325176a8fe64e22600"/163, @ANYRESHEX=r1, @ANYBLOB=',codepage=ascii,rootcontext=sysadm_u,\x00'], 0x1, 0x235, &(0x7f0000000000)="$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") r2 = accept$ax25(r0, &(0x7f0000000400)={{0x3, @rose}, [@null, @netrom, @remote, @netrom, @bcast, @netrom, @rose, @rose]}, &(0x7f0000000480)=0x48) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f00000004c0), &(0x7f0000000500)=0xc) getsockopt$IP6T_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x29, 0x45, &(0x7f0000000540)={'ipvs\x00'}, &(0x7f0000000580)=0x1e) (async) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) socket(0x10, 0x2, 0x0) (async) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000140), &(0x7f0000cab000)=0x6e) (async) syz_mount_image$hfs(&(0x7f0000000240), &(0x7f0000000380)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x3, &(0x7f00000005c0)=ANY=[@ANYBLOB="71756965742c706172743d30eec16f78303030303032303030303031303030312c747970653d7614866b2c7469643da5fc0ef0244be7e173e7f3c7862ce4e13a09a092882f56e2f9962914bc7354917e3d65bb46751697187dd3098c96045051ad9103d1a5c41db7165207db017030c87b96622d78e21c07be5c7fa14b7edf6ddd1bc6263aa793c74ee6bf0cf9924647325176a8fe64e22600"/163, @ANYRESHEX=r1, @ANYBLOB=',codepage=ascii,rootcontext=sysadm_u,\x00'], 0x1, 0x235, &(0x7f0000000000)="$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") (async) accept$ax25(r0, &(0x7f0000000400)={{0x3, @rose}, [@null, @netrom, @remote, @netrom, @bcast, @netrom, @rose, @rose]}, &(0x7f0000000480)=0x48) (async) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f00000004c0), &(0x7f0000000500)=0xc) (async) 16:34:55 executing program 4: r0 = request_key(0x0, 0x0, 0x0, 0xfffffffffffffffd) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) r1 = add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000780)='./file0\x00', &(0x7f0000000840)='gadgetfs\x00', 0x0, &(0x7f0000000880)='keyring\x00') perf_event_open(&(0x7f00000007c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x12c00, 0x0, 0xe5e}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) writev(0xffffffffffffffff, 0x0, 0x0) keyctl$read(0xb, 0x0, &(0x7f0000000a40)=""/102400, 0x19000) keyctl$search(0xa, 0x0, 0x0, 0x0, 0xfffffffffffffffd) request_key(&(0x7f00000006c0)='dns_resolver\x00', &(0x7f0000000700)={'syz', 0x3}, &(0x7f0000000940)='\x00', 0xfffffffffffffffd) r2 = add_key(&(0x7f0000000380)='id_resolver\x00', 0x0, &(0x7f0000000440), 0x0, r0) keyctl$search(0xa, r1, 0x0, 0x0, r2) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000140)='cpuset\x00', 0x0, 0x0) add_key$keyring(&(0x7f0000000100), &(0x7f0000000180)={'syz', 0x0}, 0x0, 0x0, r0) r3 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r4 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) open(&(0x7f00000002c0)='./file0\x00', 0x98d00, 0x8) request_key(&(0x7f0000000580)='logon\x00', &(0x7f00000005c0)={'syz', 0x0}, &(0x7f0000000600)='\x1f-)\x00', 0xfffffffffffffff9) write$rfkill(r4, &(0x7f0000000040)={0x0, 0x0, 0x3}, 0x8) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = openat$cgroup_int(r3, &(0x7f00000001c0)='cpuset.sched_load_balance\x00', 0x2, 0x0) dup3(r6, r3, 0x0) r7 = add_key$keyring(&(0x7f0000000540), &(0x7f0000000640)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffc) r8 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000980), 0x200000, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r4, 0x81f8943c, &(0x7f000001a000)={0x0, ""/256, 0x0, 0x0, 0x0, 0x0, ""/16, ""/16, ""/16, 0x0}) ioctl$BTRFS_IOC_SUBVOL_CREATE_V2(r5, 0x50009418, &(0x7f000001a200)={{r8}, r9, 0x2, @inherit={0x58, &(0x7f00000009c0)={0x1, 0x2, 0x8, 0x7, {0x14, 0x1000, 0x5, 0x7, 0x4}, [0xffff, 0x3]}}, @subvolid=0x4}) ioctl$BTRFS_IOC_BALANCE(r5, 0x5000940c, 0x0) keyctl$search(0xa, r2, &(0x7f0000000200)='keyring\x00', &(0x7f0000000500)={'syz', 0x0}, r7) writev(r3, &(0x7f0000000300)=[{&(0x7f00000000c0)='0', 0x1}, {&(0x7f00000003c0)='7', 0x1}], 0x2) [ 2011.090179] new mount options do not match the existing superblock, will be ignored [ 2011.141490] hfs: invalid gid -1 [ 2011.149611] hfs: unable to parse mount options 16:34:55 executing program 0: r0 = request_key(0x0, 0x0, 0x0, 0xfffffffffffffffd) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) r1 = add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000740)=@filename='./file0\x00', &(0x7f0000000780)='./file0\x00', &(0x7f0000000840)='gadgetfs\x00', 0x0, &(0x7f0000000880)='keyring\x00') perf_event_open(&(0x7f00000007c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x12c00, 0x0, 0xe5e}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) writev(0xffffffffffffffff, 0x0, 0x0) r2 = add_key(0x0, &(0x7f0000000280)={'syz', 0x3}, &(0x7f0000019a40)="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", 0x5bd, 0xfffffffffffffffd) keyctl$read(0xb, r2, &(0x7f0000000a40)=""/102400, 0x19000) keyctl$search(0xa, r2, &(0x7f00000008c0)='keyring\x00', &(0x7f0000000900)={'syz', 0x1}, 0xfffffffffffffffd) request_key(&(0x7f00000006c0)='dns_resolver\x00', &(0x7f0000000700)={'syz', 0x3}, 0x0, 0xfffffffffffffffd) r3 = add_key(&(0x7f0000000380)='id_resolver\x00', &(0x7f0000000400)={'syz', 0x3}, &(0x7f0000000440)="e09e6dda135ac7c467011f", 0xb, r0) keyctl$search(0xa, r1, 0x0, &(0x7f0000000340)={'syz', 0x1}, r3) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000140)='cpuset\x00', 0x0, 0x0) add_key$keyring(&(0x7f0000000100), &(0x7f0000000180)={'syz', 0x0}, 0x0, 0x0, r0) r4 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r5 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) open(&(0x7f00000002c0)='./file0\x00', 0x98d00, 0x8) request_key(&(0x7f0000000580)='logon\x00', 0x0, &(0x7f0000000600)='\x1f-)\x00', 0xfffffffffffffff9) add_key$fscrypt_provisioning(&(0x7f0000000480), &(0x7f00000004c0)={'syz', 0x0}, &(0x7f0000000640)=ANY=[], 0x48, r0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = openat$cgroup_int(r4, &(0x7f00000001c0)='cpuset.sched_load_balance\x00', 0x2, 0x0) dup3(r7, r4, 0x0) r8 = add_key$keyring(&(0x7f0000000540), &(0x7f0000000640)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffc) r9 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000980), 0x200000, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r5, 0x81f8943c, &(0x7f000001a000)={0x0, ""/256, 0x0, 0x0, 0x0, 0x0, ""/16, ""/16, ""/16, 0x0}) ioctl$BTRFS_IOC_SUBVOL_CREATE_V2(r6, 0x50009418, &(0x7f000001a200)={{r9}, r10, 0x2, @inherit={0x58, &(0x7f00000009c0)={0x1, 0x2, 0x8, 0x7, {0x14, 0x1000, 0x5, 0x7}, [0xffff, 0x0]}}, @subvolid=0x4}) keyctl$search(0xa, r3, 0x0, &(0x7f0000000500)={'syz', 0x0}, r8) writev(r4, &(0x7f0000000300)=[{&(0x7f00000000c0)='0', 0x5}, {&(0x7f00000003c0)='7', 0x1}], 0x2) 16:34:55 executing program 2: r0 = request_key(0x0, 0x0, 0x0, 0xfffffffffffffffd) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) perf_event_open(&(0x7f00000007c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0xe5e}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) keyctl$read(0xb, 0x0, &(0x7f0000000a40)=""/102400, 0x19000) keyctl$search(0xa, 0x0, &(0x7f00000008c0)='keyring\x00', &(0x7f0000000900)={'syz', 0x1}, 0xfffffffffffffffd) request_key(&(0x7f00000006c0)='dns_resolver\x00', &(0x7f0000000700)={'syz', 0x3}, &(0x7f0000000940)='\x00', 0xfffffffffffffffd) add_key(0x0, &(0x7f0000000400)={'syz', 0x3}, &(0x7f0000000440), 0x0, r0) keyctl$search(0xa, 0x0, 0x0, &(0x7f0000000340)={'syz', 0x1}, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000140)='cpuset\x00', 0x0, 0x0) add_key$keyring(&(0x7f0000000100), 0x0, 0x0, 0x0, r0) r1 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) request_key(0x0, &(0x7f00000005c0)={'syz', 0x0}, 0x0, 0xfffffffffffffff9) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = openat$cgroup_int(r1, &(0x7f00000001c0)='cpuset.sched_load_balance\x00', 0x2, 0x0) dup3(r3, r1, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x200000, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f000001a000)={0x0, ""/256, 0x0, 0x0, 0x0, 0x0, ""/16, ""/16, ""/16, 0x0}) ioctl$BTRFS_IOC_SUBVOL_CREATE_V2(r2, 0x50009418, &(0x7f000001a200)={{}, r4, 0x2, @inherit={0x58, &(0x7f00000009c0)={0x1, 0x2, 0x8, 0x0, {0x0, 0x0, 0x0, 0x0, 0x4}, [0x0, 0x0]}}, @subvolid=0x4}) ioctl$BTRFS_IOC_BALANCE(0xffffffffffffffff, 0x5000940c, 0x0) keyctl$search(0xa, 0x0, &(0x7f0000000200)='keyring\x00', &(0x7f0000000500)={'syz', 0x0}, 0x0) writev(0xffffffffffffffff, &(0x7f0000000300)=[{&(0x7f00000000c0)='0', 0x1}, {&(0x7f00000003c0)='7', 0x1}], 0x2) 16:34:55 executing program 1: syz_mount_image$hfs(&(0x7f0000000240), &(0x7f0000000380)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x3, &(0x7f0000000780)=ANY=[@ANYBLOB='quiet,gid=', @ANYRESHEX, @ANYBLOB="2c2a7270653d7614866b2c75693df589299908000000450000005d38ff0c0071446a0c48dba349ba347528523876dc8d7918ecea1024ba9669ff19a9ab5e27062b1dae8d8c0eb880008164ed9d8093fdc35f282dee56df9531b6e0c94b43c314af69146a70075499da5e7f927d3c672787e3d33a6071ff2c1483a1a7cfb34131bfee72f86068d0966d", @ANYRESHEX, @ANYBLOB=',codepage=ascii,rootcontext=sysadm_u,\x00'], 0x1, 0x235, &(0x7f0000000000)="$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") [ 2011.182085] new mount options do not match the existing superblock, will be ignored [ 2011.203952] new mount options do not match the existing superblock, will be ignored [ 2011.214288] hfs: unable to parse mount options 16:34:55 executing program 3: getsockopt$IP6T_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x29, 0x45, &(0x7f0000000540)={'ipvs\x00'}, &(0x7f0000000580)=0x1e) (async) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000140)={0x0, 0x0}, &(0x7f0000cab000)=0x6e) syz_mount_image$hfs(&(0x7f0000000240), &(0x7f0000000380)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x3, &(0x7f00000005c0)=ANY=[@ANYBLOB="71756965742c706172743d30eec16f78303030303032303030303031303030312c747970653d7614866b2c7469643da5fc0ef0244be7e173e7f3c7862ce4e13a09a092882f56e2f9962914bc7354917e3d65bb46751697187dd3098c96045051ad9103d1a5c41db7165207db017030c87b96622d78e21c07be5c7fa14b7edf6ddd1bc6263aa793c74ee6bf0cf9924647325176a8fe64e22600"/163, @ANYRESHEX=r1, @ANYBLOB=',codepage=ascii,rootcontext=sysadm_u,\x00'], 0x1, 0x235, &(0x7f0000000000)="$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") (async) r2 = accept$ax25(r0, &(0x7f0000000400)={{0x3, @rose}, [@null, @netrom, @remote, @netrom, @bcast, @netrom, @rose, @rose]}, &(0x7f0000000480)=0x48) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f00000004c0), &(0x7f0000000500)=0xc) [ 2011.306073] new mount options do not match the existing superblock, will be ignored 16:34:55 executing program 5: r0 = request_key(0x0, 0x0, 0x0, 0xfffffffffffffffd) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) r1 = add_key$keyring(0x0, &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000740)=@filename='./file0\x00', &(0x7f0000000780)='./file0\x00', 0x0, 0x10, &(0x7f0000000880)='keyring\x00') perf_event_open(&(0x7f00000007c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x12c00, 0x0, 0xe5e}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) writev(0xffffffffffffffff, 0x0, 0x0) r2 = add_key(&(0x7f0000000240)='big_key\x00', &(0x7f0000000280)={'syz', 0x3}, &(0x7f0000019a40)="4195738ac28ccd83aa93c4ecacdaca3d34104be4cc5531c4091facf7f777321e84e49e039122a2d1cf7fea6a02aac8944c27ba038156bc10c0f7a6b26fbf382f67959d856600881f0e692c60f12ace775aab8d775dc2586454918a0db1811f5e8086f1a9805166c870b8387d380d5115af5841dad21f629e05f4b51e362c46b58a7dc2855c5189bff60d02c05ba67c297aa0ad05b93b1ee2fffae13fe5764d4e2a214e15093841b1551d518a669fa94e8918bfdd6573d5c0275a9b91ddb843775f78574891e03697f6ca290be6599b671093898a82e7905ed7c7fd8e8b422ebf12e5b543885596fc5c305d497407ffe73bd543f79c983f0807ae7e13fb5053fd7a07dddf8ec739418b59d67219f008f540161cec3bfd1b3097aad497248b221d572a9eb1bad6d921fcdcfdfacf8d1e392635168747056ec8a3fc45b3027293a517d50ea789294f132f2392919dc81ba5eb02e27e116cc300000000b6c0e39688425a3cb17d35f4b1eec0a37193f233c6655c6f40c09b4ea04c8880a431a8274127d56c3c8cab73a5fcf2b604b83658344e323eeedb0b283b0b3616236e904a42fed9fc8f4c131b047bfd5d7586e6a28032a4584fd5933472ce49dfdc99976166bb37eb1679b22249a222ffab17948dd6cc6f23f42ecd32a980ab8fc7c7d2da1a91f1db1187066c144bcbdb46240b7ef7ed28da4a358295b6104e4c60b09654e79f766e19e44174e94fa41d358d3dd901c060a06a388727be1092a37c0015695b1363ed018e724947983aa6b5974daf6388547cdacbd44a1282c3b9130cbf9536c29a523980b9e4328d1a7c0de8b636d7dfdee36434125948b1d802d5d143645c3a5f8da50adeef6e4f715361908a20cb998d3e0907aef9fdd19bb79be8c510b8aa04600163636c1d1f36f3834ffa3c7369e1d8ed9348bc339da2a525c4f165c0caebb7a4ee632a37a43897084e3c07a5ed8b505a51a4777095060b0ff6a6442206244dd9a13b5ba52b07c718e9eaad10befd12be35dc50283d584035d75e4917548ff58045b88d29b6826ceb6d44fb54ba3ef7944da6e86c0f2d0bc0bd725aa9193b3de4837634ead361d9b2ff5ae4de005f53d48cba029b43eb35fbedd0b5397918a9324b6e1f1d88399d8ad69b7d79e89ded6fe81fd1200f95c831f8c60dc1483e97052f61d0a643df0c2e1b0ba7d00b0692efd1bfc1ece10c2e785e3cb3b0dfbdbd722b6e53e5a2884b1cc5d939a572564bc8a2260e8718230878edb3a877f5c585f4373ef8e0e1cff5dacf96862906ff37eec18ba706d22b101965eaf5f5e29f544977896117e25ceb572f3443eddf9651c2ac69c911b21fd69e59ee57ebe4c549ff2a3dcd904656663039789f022a6caa7f76640e75efdba82dabacf8c0112bd4e62a3a9e69a9824c1af45cf86b307d9749937dd08b6ef49860cda5da7bb886f92db7cd43a869aa646a6da291a75ff28c4d728b1377b8e80233b33e724a60c0a015ec75cd86af04a4bd43964d8f7ba781a99d0cd7ff7e189fc91801655cb1b60e6bc3af747655341deceadbed3d76bdfae92389cc87c417e0f58f3fbcc56ff347467a20773146a81090ff42bbb5383d74108028f5fa532c647746054c312e2e4c085f58d93bec6da7c2bfd99fc59c1631cc71110acc2bf352b994e2a246be3cc1d240fa0c60eb04b92a9673d2ac2bba7f322ddbbd74712b0ec459050586523bd0b0505174a701206e47f2bb7fe20caf5ed73d33447b89432802e7d4606512e217aedf78c871e10cfbdf202efbf3fd8495b6be18cde726dc1fefc01921e9d1f15c8301376c33b5a698d0f7d5f317835d74857e121fe820d93f6b757c9938ec81f9b19a4b0d4ed35d1309fbcb285cf7717e9e27aaaba9d7d742fcfd786eacd993fb119e1d52908ca7ce2135046fa95805704c6258fd1b5fc1434af7ab99609820d73627080d43bcaeeb42ce423e17aa4df3a6994ead3133e2ecfbc6fa308c6b71b78cbab273641970b49e15d0dbe7aea716eaf6cf40f90d0d7d3d8bf1d165d25d5f6f6376416b9dd13731c5c2fdadee8e48c76430cccb21d8e6c659", 0x5bd, 0xfffffffffffffffd) keyctl$read(0xb, r2, &(0x7f0000000a40)=""/102400, 0x19000) keyctl$search(0xa, r2, &(0x7f00000008c0)='keyring\x00', &(0x7f0000000900)={'syz', 0x1}, 0xfffffffffffffffd) request_key(&(0x7f00000006c0)='dns_resolver\x00', &(0x7f0000000700)={'syz', 0x3}, &(0x7f0000000940)='\x00', 0xfffffffffffffffd) r3 = add_key(&(0x7f0000000380)='id_resolver\x00', &(0x7f0000000400)={'syz', 0x3}, &(0x7f0000000440)="e09e6dda135ac7c467011f", 0xb, r0) keyctl$search(0xa, r1, 0x0, &(0x7f0000000340)={'syz', 0x1}, r3) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000140)='cpuset\x00', 0x0, 0x0) add_key$keyring(&(0x7f0000000100), &(0x7f0000000180)={'syz', 0x0}, 0x0, 0x0, r0) r4 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r5 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) request_key(&(0x7f0000000580)='logon\x00', &(0x7f00000005c0)={'syz', 0x0}, &(0x7f0000000600)='\x1f-)\x00', 0xfffffffffffffff9) add_key$fscrypt_provisioning(&(0x7f0000000480), &(0x7f00000004c0)={'syz', 0x0}, &(0x7f0000000640)=ANY=[], 0x48, r0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = openat$cgroup_int(r4, &(0x7f00000001c0)='cpuset.sched_load_balance\x00', 0x2, 0x0) dup3(r7, r4, 0x0) add_key$keyring(&(0x7f0000000540), &(0x7f0000000640)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffc) r8 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000980), 0x200000, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r5, 0x81f8943c, &(0x7f000001a000)={0x0, ""/256, 0x0, 0x0, 0x0, 0x0, ""/16, ""/16, ""/16, 0x0}) ioctl$BTRFS_IOC_SUBVOL_CREATE_V2(r6, 0x50009418, &(0x7f000001a200)={{r8}, r9, 0x2, @inherit={0x58, &(0x7f00000009c0)={0x1, 0x2, 0x8, 0x7, {0x14, 0x1000, 0x5, 0x7, 0x4}, [0xffff, 0x3]}}, @subvolid=0x4}) writev(r4, &(0x7f0000000300)=[{&(0x7f00000000c0)='0', 0x1}, {&(0x7f00000003c0)='7', 0x1}], 0x2) [ 2011.455807] hfs: unable to parse mount options [ 2011.459329] new mount options do not match the existing superblock, will be ignored [ 2011.459547] hfs: invalid gid -1 16:34:55 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./bus\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000004400)='./bus\x00', 0x1c1002, 0x0) write$binfmt_misc(r1, &(0x7f0000000180)={'syz1'}, 0x4) sendfile(r1, r0, 0x0, 0x1ffff) perf_event_open(&(0x7f0000000400)={0x2, 0x80, 0x4, 0x7f, 0x0, 0x7, 0x0, 0x3, 0x90, 0x9, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x4, 0x1, @perf_bp={&(0x7f0000000280), 0x4}, 0x820, 0x3, 0xfffffffb, 0x9, 0x4, 0x8, 0x3, 0x0, 0x800, 0x0, 0x10000}, 0x0, 0xffffffffffffffff, r1, 0xa) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000140)={0x0, 0x0}, &(0x7f0000cab000)=0x6e) syz_mount_image$hfs(&(0x7f0000000240), &(0x7f0000000380)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x3, &(0x7f0000000300)={[{}, {@part={'part', 0x3d, 0x10001}}, {@type={'type', 0x3d, "7614866b"}}, {@uid={'uid', 0x3d, r2}}, {@iocharset={'iocharset', 0x3d, 'macromanian'}}, {}], [{@rootcontext={'rootcontext', 0x3d, 'sysadm_u'}}]}, 0x1, 0x235, &(0x7f0000000000)="$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") 16:34:55 executing program 4: r0 = request_key(0x0, 0x0, 0x0, 0xfffffffffffffffd) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) r1 = add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000780)='./file0\x00', &(0x7f0000000840)='gadgetfs\x00', 0x0, &(0x7f0000000880)='keyring\x00') perf_event_open(&(0x7f00000007c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x12c00, 0x0, 0xe5e}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) writev(0xffffffffffffffff, 0x0, 0x0) keyctl$read(0xb, 0x0, &(0x7f0000000a40)=""/102400, 0x19000) keyctl$search(0xa, 0x0, 0x0, 0x0, 0xfffffffffffffffd) request_key(&(0x7f00000006c0)='dns_resolver\x00', &(0x7f0000000700)={'syz', 0x3}, &(0x7f0000000940)='\x00', 0xfffffffffffffffd) r2 = add_key(&(0x7f0000000380)='id_resolver\x00', 0x0, &(0x7f0000000440), 0x0, r0) keyctl$search(0xa, r1, 0x0, &(0x7f0000000340)={'syz', 0x1}, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000140)='cpuset\x00', 0x0, 0x0) add_key$keyring(&(0x7f0000000100), &(0x7f0000000180)={'syz', 0x0}, 0x0, 0x0, r0) r3 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r4 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) open(&(0x7f00000002c0)='./file0\x00', 0x98d00, 0x8) request_key(&(0x7f0000000580)='logon\x00', &(0x7f00000005c0)={'syz', 0x0}, &(0x7f0000000600)='\x1f-)\x00', 0xfffffffffffffff9) write$rfkill(r4, &(0x7f0000000040)={0x0, 0x0, 0x3}, 0x8) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = openat$cgroup_int(r3, &(0x7f00000001c0)='cpuset.sched_load_balance\x00', 0x2, 0x0) dup3(r6, r3, 0x0) r7 = add_key$keyring(&(0x7f0000000540), &(0x7f0000000640)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffc) r8 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000980), 0x200000, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r4, 0x81f8943c, &(0x7f000001a000)={0x0, ""/256, 0x0, 0x0, 0x0, 0x0, ""/16, ""/16, ""/16, 0x0}) ioctl$BTRFS_IOC_SUBVOL_CREATE_V2(r5, 0x50009418, &(0x7f000001a200)={{r8}, r9, 0x2, @inherit={0x58, &(0x7f00000009c0)={0x1, 0x2, 0x8, 0x7, {0x14, 0x1000, 0x5, 0x7, 0x4}, [0xffff, 0x3]}}, @subvolid=0x4}) ioctl$BTRFS_IOC_BALANCE(r5, 0x5000940c, 0x0) keyctl$search(0xa, r2, &(0x7f0000000200)='keyring\x00', &(0x7f0000000500)={'syz', 0x0}, r7) writev(r3, &(0x7f0000000300)=[{&(0x7f00000000c0)='0', 0x1}, {&(0x7f00000003c0)='7', 0x1}], 0x2) [ 2011.567459] new mount options do not match the existing superblock, will be ignored [ 2011.576075] hfs: unable to parse mount options [ 2011.602859] hfs: unable to parse mount options 16:34:55 executing program 0: r0 = request_key(0x0, 0x0, 0x0, 0xfffffffffffffffd) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) r1 = add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000740)=@filename='./file0\x00', &(0x7f0000000780)='./file0\x00', &(0x7f0000000840)='gadgetfs\x00', 0x0, &(0x7f0000000880)='keyring\x00') perf_event_open(&(0x7f00000007c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x12c00, 0x0, 0xe5e}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) writev(0xffffffffffffffff, 0x0, 0x0) r2 = add_key(0x0, &(0x7f0000000280)={'syz', 0x3}, &(0x7f0000019a40)="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", 0x5bd, 0xfffffffffffffffd) keyctl$read(0xb, r2, &(0x7f0000000a40)=""/102400, 0x19000) keyctl$search(0xa, r2, &(0x7f00000008c0)='keyring\x00', &(0x7f0000000900)={'syz', 0x1}, 0xfffffffffffffffd) request_key(&(0x7f00000006c0)='dns_resolver\x00', &(0x7f0000000700)={'syz', 0x3}, 0x0, 0xfffffffffffffffd) r3 = add_key(&(0x7f0000000380)='id_resolver\x00', &(0x7f0000000400)={'syz', 0x3}, &(0x7f0000000440)="e09e6dda135ac7c467011f", 0xb, r0) keyctl$search(0xa, r1, 0x0, &(0x7f0000000340)={'syz', 0x1}, r3) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000140)='cpuset\x00', 0x0, 0x0) add_key$keyring(&(0x7f0000000100), &(0x7f0000000180)={'syz', 0x0}, 0x0, 0x0, r0) r4 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r5 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) open(&(0x7f00000002c0)='./file0\x00', 0x98d00, 0x8) request_key(&(0x7f0000000580)='logon\x00', 0x0, &(0x7f0000000600)='\x1f-)\x00', 0xfffffffffffffff9) add_key$fscrypt_provisioning(&(0x7f0000000480), &(0x7f00000004c0)={'syz', 0x0}, &(0x7f0000000640)=ANY=[], 0x48, r0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = openat$cgroup_int(r4, &(0x7f00000001c0)='cpuset.sched_load_balance\x00', 0x2, 0x0) dup3(r7, r4, 0x0) r8 = add_key$keyring(&(0x7f0000000540), &(0x7f0000000640)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffc) r9 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000980), 0x200000, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r5, 0x81f8943c, &(0x7f000001a000)={0x0, ""/256, 0x0, 0x0, 0x0, 0x0, ""/16, ""/16, ""/16, 0x0}) ioctl$BTRFS_IOC_SUBVOL_CREATE_V2(r6, 0x50009418, &(0x7f000001a200)={{r9}, r10, 0x2, @inherit={0x58, &(0x7f00000009c0)={0x1, 0x2, 0x8, 0x7, {0x14, 0x1000, 0x5, 0x7}, [0xffff, 0x0]}}, @subvolid=0x4}) keyctl$search(0xa, r3, 0x0, &(0x7f0000000500)={'syz', 0x0}, r8) writev(r4, &(0x7f0000000300)=[{&(0x7f00000000c0)='0', 0x7}, {&(0x7f00000003c0)='7', 0x1}], 0x2) 16:34:55 executing program 5: r0 = request_key(0x0, 0x0, 0x0, 0xfffffffffffffffd) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) r1 = add_key$keyring(0x0, &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000740)=@filename='./file0\x00', &(0x7f0000000780)='./file0\x00', 0x0, 0x10, &(0x7f0000000880)='keyring\x00') perf_event_open(&(0x7f00000007c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x12c00, 0x0, 0xe5e}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) writev(0xffffffffffffffff, 0x0, 0x0) r2 = add_key(&(0x7f0000000240)='big_key\x00', &(0x7f0000000280)={'syz', 0x3}, &(0x7f0000019a40)="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", 0x5bd, 0xfffffffffffffffd) keyctl$read(0xb, r2, &(0x7f0000000a40)=""/102400, 0x19000) keyctl$search(0xa, r2, &(0x7f00000008c0)='keyring\x00', &(0x7f0000000900)={'syz', 0x1}, 0xfffffffffffffffd) request_key(&(0x7f00000006c0)='dns_resolver\x00', &(0x7f0000000700)={'syz', 0x3}, &(0x7f0000000940)='\x00', 0xfffffffffffffffd) r3 = add_key(&(0x7f0000000380)='id_resolver\x00', &(0x7f0000000400)={'syz', 0x3}, &(0x7f0000000440)="e09e6dda135ac7c467011f", 0xb, r0) keyctl$search(0xa, r1, 0x0, &(0x7f0000000340)={'syz', 0x1}, r3) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000140)='cpuset\x00', 0x0, 0x0) add_key$keyring(&(0x7f0000000100), &(0x7f0000000180)={'syz', 0x0}, 0x0, 0x0, r0) r4 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r5 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) request_key(&(0x7f0000000580)='logon\x00', &(0x7f00000005c0)={'syz', 0x0}, &(0x7f0000000600)='\x1f-)\x00', 0xfffffffffffffff9) add_key$fscrypt_provisioning(&(0x7f0000000480), &(0x7f00000004c0)={'syz', 0x0}, &(0x7f0000000640)=ANY=[], 0x48, r0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = openat$cgroup_int(r4, &(0x7f00000001c0)='cpuset.sched_load_balance\x00', 0x2, 0x0) dup3(r7, r4, 0x0) add_key$keyring(&(0x7f0000000540), &(0x7f0000000640)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffc) r8 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000980), 0x200000, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r5, 0x81f8943c, &(0x7f000001a000)={0x0, ""/256, 0x0, 0x0, 0x0, 0x0, ""/16, ""/16, ""/16, 0x0}) ioctl$BTRFS_IOC_SUBVOL_CREATE_V2(r6, 0x50009418, &(0x7f000001a200)={{r8}, r9, 0x2, @inherit={0x58, &(0x7f00000009c0)={0x1, 0x2, 0x8, 0x7, {0x14, 0x1000, 0x5, 0x7, 0x4}, [0xffff, 0x3]}}, @subvolid=0x4}) writev(r4, &(0x7f0000000300)=[{&(0x7f00000000c0)='0', 0x1}, {&(0x7f00000003c0)='7', 0x1}], 0x2) 16:34:55 executing program 1: syz_mount_image$hfs(&(0x7f0000000240), &(0x7f0000000380)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x3, &(0x7f0000000780)=ANY=[@ANYBLOB='quiet,gid=', @ANYRESHEX, @ANYBLOB="2c2a7270653d7614866b2c75693df589299908000000450000005d38ff0c0071446a0c48dba349ba347528523876dc8d7918ecea1024ba9669ff19a9ab5e27062b1dae8d8c0eb880008164ed9d8093fdc35f282dee56df9531b6e0c94b43c314af69146a70075499da5e7f927d3c672787e3d33a6071ff2c1483a1a7cfb34131bfee72f86068d0966d", @ANYRESHEX, @ANYBLOB=',codepage=ascii,rootcontext=sysadm_u,\x00'], 0x1, 0x235, &(0x7f0000000000)="$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") [ 2011.622802] new mount options do not match the existing superblock, will be ignored 16:34:55 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async, rerun: 64) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./bus\x00', 0x0, 0x0) (async, rerun: 64) r1 = openat(0xffffffffffffff9c, &(0x7f0000004400)='./bus\x00', 0x1c1002, 0x0) write$binfmt_misc(r1, &(0x7f0000000180)={'syz1'}, 0x4) (async) sendfile(r1, r0, 0x0, 0x1ffff) perf_event_open(&(0x7f0000000400)={0x2, 0x80, 0x4, 0x7f, 0x0, 0x7, 0x0, 0x3, 0x90, 0x9, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x4, 0x1, @perf_bp={&(0x7f0000000280), 0x4}, 0x820, 0x3, 0xfffffffb, 0x9, 0x4, 0x8, 0x3, 0x0, 0x800, 0x0, 0x10000}, 0x0, 0xffffffffffffffff, r1, 0xa) (async, rerun: 32) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000140)={0x0, 0x0}, &(0x7f0000cab000)=0x6e) (rerun: 32) syz_mount_image$hfs(&(0x7f0000000240), &(0x7f0000000380)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x3, &(0x7f0000000300)={[{}, {@part={'part', 0x3d, 0x10001}}, {@type={'type', 0x3d, "7614866b"}}, {@uid={'uid', 0x3d, r2}}, {@iocharset={'iocharset', 0x3d, 'macromanian'}}, {}], [{@rootcontext={'rootcontext', 0x3d, 'sysadm_u'}}]}, 0x1, 0x235, &(0x7f0000000000)="$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") [ 2011.678719] new mount options do not match the existing superblock, will be ignored 16:34:55 executing program 2: r0 = request_key(0x0, 0x0, 0x0, 0xfffffffffffffffd) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) perf_event_open(&(0x7f00000007c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0xe5e}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) keyctl$read(0xb, 0x0, &(0x7f0000000a40)=""/102400, 0x19000) keyctl$search(0xa, 0x0, &(0x7f00000008c0)='keyring\x00', &(0x7f0000000900)={'syz', 0x1}, 0xfffffffffffffffd) request_key(&(0x7f00000006c0)='dns_resolver\x00', &(0x7f0000000700)={'syz', 0x3}, &(0x7f0000000940)='\x00', 0xfffffffffffffffd) add_key(0x0, &(0x7f0000000400)={'syz', 0x3}, &(0x7f0000000440), 0x0, r0) keyctl$search(0xa, 0x0, 0x0, &(0x7f0000000340)={'syz', 0x1}, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000140)='cpuset\x00', 0x0, 0x0) add_key$keyring(&(0x7f0000000100), 0x0, 0x0, 0x0, r0) r1 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) request_key(0x0, &(0x7f00000005c0)={'syz', 0x0}, 0x0, 0xfffffffffffffff9) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = openat$cgroup_int(r1, &(0x7f00000001c0)='cpuset.sched_load_balance\x00', 0x2, 0x0) dup3(r3, r1, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x200000, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f000001a000)={0x0, ""/256, 0x0, 0x0, 0x0, 0x0, ""/16, ""/16, ""/16, 0x0}) ioctl$BTRFS_IOC_SUBVOL_CREATE_V2(r2, 0x50009418, &(0x7f000001a200)={{}, r4, 0x2, @inherit={0x58, &(0x7f00000009c0)={0x1, 0x2, 0x8, 0x0, {0x0, 0x0, 0x0, 0x0, 0x4}, [0x0, 0x0]}}, @subvolid=0x4}) ioctl$BTRFS_IOC_BALANCE(0xffffffffffffffff, 0x5000940c, 0x0) keyctl$search(0xa, 0x0, &(0x7f0000000200)='keyring\x00', &(0x7f0000000500)={'syz', 0x0}, 0x0) writev(r1, 0x0, 0x0) 16:34:56 executing program 0: r0 = request_key(0x0, 0x0, 0x0, 0xfffffffffffffffd) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) r1 = add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000740)=@filename='./file0\x00', &(0x7f0000000780)='./file0\x00', &(0x7f0000000840)='gadgetfs\x00', 0x0, &(0x7f0000000880)='keyring\x00') perf_event_open(&(0x7f00000007c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x12c00, 0x0, 0xe5e}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) writev(0xffffffffffffffff, 0x0, 0x0) r2 = add_key(0x0, &(0x7f0000000280)={'syz', 0x3}, &(0x7f0000019a40)="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", 0x5bd, 0xfffffffffffffffd) keyctl$read(0xb, r2, &(0x7f0000000a40)=""/102400, 0x19000) keyctl$search(0xa, r2, &(0x7f00000008c0)='keyring\x00', &(0x7f0000000900)={'syz', 0x1}, 0xfffffffffffffffd) request_key(&(0x7f00000006c0)='dns_resolver\x00', &(0x7f0000000700)={'syz', 0x3}, 0x0, 0xfffffffffffffffd) r3 = add_key(&(0x7f0000000380)='id_resolver\x00', &(0x7f0000000400)={'syz', 0x3}, &(0x7f0000000440)="e09e6dda135ac7c467011f", 0xb, r0) keyctl$search(0xa, r1, 0x0, &(0x7f0000000340)={'syz', 0x1}, r3) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000140)='cpuset\x00', 0x0, 0x0) add_key$keyring(&(0x7f0000000100), &(0x7f0000000180)={'syz', 0x0}, 0x0, 0x0, r0) r4 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r5 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) open(&(0x7f00000002c0)='./file0\x00', 0x98d00, 0x8) request_key(&(0x7f0000000580)='logon\x00', 0x0, &(0x7f0000000600)='\x1f-)\x00', 0xfffffffffffffff9) add_key$fscrypt_provisioning(&(0x7f0000000480), &(0x7f00000004c0)={'syz', 0x0}, &(0x7f0000000640)=ANY=[], 0x48, r0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = openat$cgroup_int(r4, &(0x7f00000001c0)='cpuset.sched_load_balance\x00', 0x2, 0x0) dup3(r7, r4, 0x0) r8 = add_key$keyring(&(0x7f0000000540), &(0x7f0000000640)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffc) r9 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000980), 0x200000, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r5, 0x81f8943c, &(0x7f000001a000)={0x0, ""/256, 0x0, 0x0, 0x0, 0x0, ""/16, ""/16, ""/16, 0x0}) ioctl$BTRFS_IOC_SUBVOL_CREATE_V2(r6, 0x50009418, &(0x7f000001a200)={{r9}, r10, 0x2, @inherit={0x58, &(0x7f00000009c0)={0x1, 0x2, 0x8, 0x7, {0x14, 0x1000, 0x5, 0x7}, [0xffff, 0x0]}}, @subvolid=0x4}) keyctl$search(0xa, r3, 0x0, &(0x7f0000000500)={'syz', 0x0}, r8) writev(r4, &(0x7f0000000300)=[{&(0x7f00000000c0)='0', 0x8}, {&(0x7f00000003c0)='7', 0x1}], 0x2) [ 2011.867273] new mount options do not match the existing superblock, will be ignored [ 2011.882217] hfs: invalid gid -1 [ 2011.888930] hfs: unable to parse mount options 16:34:56 executing program 1: syz_mount_image$hfs(&(0x7f0000000240), &(0x7f0000000380)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x3, &(0x7f0000000780)=ANY=[@ANYBLOB='quiet,gid=', @ANYRESHEX, @ANYBLOB="2c2a7270653d7614866b2c75693df589299908000000450000005d38ff0c0071446a0c48dba349ba347528523876dc8d7918ecea1024ba9669ff19a9ab5e27062b1dae8d8c0eb880008164ed9d8093fdc35f282dee56df9531b6e0c94b43c314af69146a70075499da5e7f927d3c672787e3d33a6071ff2c1483a1a7cfb34131bfee72f86068d0966d", @ANYRESHEX, @ANYBLOB=',codepage=ascii,rootcontext=sysadm_u,\x00'], 0x1, 0x235, &(0x7f0000000000)="$eJzs3U9rE0EYx/HfTKJGW+r2jwgeqwVP0upFvAiSF+FJ1CZCMVTQCupJPIsvwLtvwRfhSXwDevLkC8htZZ6dNNuYzaa1ydD2+4GEbXeenWc6u515AqUCcGY9aP/8cud3eDmpoYake5KX1JKakq7oauv17t7OXq/bmXShhkWEl1MR6f5ps73bHRca4iwiysJXTS2Wv4fZyPM8/5U6CSRnT/8YXroQn04735p7ZrPxPnUCibm++nqjpdR5AADSiuu/j+v8Yty/ey9txGX/VK3//dQJJFZa/63Kyl2Y38t2aljvWQkXzvtBlXiUvs6ruLMObDBdXVVpufiLz3Z63VvbL3odrw+6H5Wardl7p7h1B2qyXR9Tm05w9LEv2BjOhTHcrsh/9Xh7rOe+ue/ukcv0WZ39/V8zd2GabKaykZkq8t+svqKNMitaVYxy2Tq5FnuIakbZGl+RaHBHLevgBwRZXZ4WtTISVYxuqyZqdSSqUcxpTdTaaF/Du7k6ctbcJ/fQreuPvqpd2v/78NPe0DRPZmhjLeOdMXE8TWuZTZGYP9Qw8H8+6qnuaunV23fPn/R63ZcccMABB/sHqX9BYR6Gk546EyQS9l2uqP9K9cqmlUjhLZuwT8/rLl664lZFbbBi75cOVcEtVFdw09Zc129KN6bvMYt5nhKurR96zOf/AAAAAAAAAAAAAAAAAAAAJ808/pwg9RgBAAAAAAAAAAAAAAAAAAAAADjp+P+/wNn1NwAA//9VXIIZ") [ 2011.965564] hfs: unable to parse mount options 16:34:56 executing program 4: r0 = request_key(0x0, 0x0, 0x0, 0xfffffffffffffffd) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) r1 = add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000780)='./file0\x00', &(0x7f0000000840)='gadgetfs\x00', 0x0, &(0x7f0000000880)='keyring\x00') perf_event_open(&(0x7f00000007c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x12c00, 0x0, 0xe5e}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) writev(0xffffffffffffffff, 0x0, 0x0) keyctl$read(0xb, 0x0, &(0x7f0000000a40)=""/102400, 0x19000) keyctl$search(0xa, 0x0, 0x0, 0x0, 0xfffffffffffffffd) request_key(&(0x7f00000006c0)='dns_resolver\x00', &(0x7f0000000700)={'syz', 0x3}, &(0x7f0000000940)='\x00', 0xfffffffffffffffd) r2 = add_key(&(0x7f0000000380)='id_resolver\x00', 0x0, &(0x7f0000000440), 0x0, r0) keyctl$search(0xa, r1, 0x0, &(0x7f0000000340)={'syz', 0x1}, 0x0) mount(0x0, 0x0, &(0x7f0000000140)='cpuset\x00', 0x0, 0x0) add_key$keyring(&(0x7f0000000100), &(0x7f0000000180)={'syz', 0x0}, 0x0, 0x0, r0) r3 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r4 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) open(&(0x7f00000002c0)='./file0\x00', 0x98d00, 0x8) request_key(&(0x7f0000000580)='logon\x00', &(0x7f00000005c0)={'syz', 0x0}, &(0x7f0000000600)='\x1f-)\x00', 0xfffffffffffffff9) write$rfkill(r4, &(0x7f0000000040)={0x0, 0x0, 0x3}, 0x8) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = openat$cgroup_int(r3, &(0x7f00000001c0)='cpuset.sched_load_balance\x00', 0x2, 0x0) dup3(r6, r3, 0x0) r7 = add_key$keyring(&(0x7f0000000540), &(0x7f0000000640)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffc) r8 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000980), 0x200000, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r4, 0x81f8943c, &(0x7f000001a000)={0x0, ""/256, 0x0, 0x0, 0x0, 0x0, ""/16, ""/16, ""/16, 0x0}) ioctl$BTRFS_IOC_SUBVOL_CREATE_V2(r5, 0x50009418, &(0x7f000001a200)={{r8}, r9, 0x2, @inherit={0x58, &(0x7f00000009c0)={0x1, 0x2, 0x8, 0x7, {0x14, 0x1000, 0x5, 0x7, 0x4}, [0xffff, 0x3]}}, @subvolid=0x4}) ioctl$BTRFS_IOC_BALANCE(r5, 0x5000940c, 0x0) keyctl$search(0xa, r2, &(0x7f0000000200)='keyring\x00', &(0x7f0000000500)={'syz', 0x0}, r7) writev(r3, &(0x7f0000000300)=[{&(0x7f00000000c0)='0', 0x1}, {&(0x7f00000003c0)='7', 0x1}], 0x2) 16:34:56 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./bus\x00', 0x0, 0x0) (async) r1 = openat(0xffffffffffffff9c, &(0x7f0000004400)='./bus\x00', 0x1c1002, 0x0) write$binfmt_misc(r1, &(0x7f0000000180)={'syz1'}, 0x4) (async) sendfile(r1, r0, 0x0, 0x1ffff) (async) perf_event_open(&(0x7f0000000400)={0x2, 0x80, 0x4, 0x7f, 0x0, 0x7, 0x0, 0x3, 0x90, 0x9, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x4, 0x1, @perf_bp={&(0x7f0000000280), 0x4}, 0x820, 0x3, 0xfffffffb, 0x9, 0x4, 0x8, 0x3, 0x0, 0x800, 0x0, 0x10000}, 0x0, 0xffffffffffffffff, r1, 0xa) (async) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000140)={0x0, 0x0}, &(0x7f0000cab000)=0x6e) syz_mount_image$hfs(&(0x7f0000000240), &(0x7f0000000380)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x3, &(0x7f0000000300)={[{}, {@part={'part', 0x3d, 0x10001}}, {@type={'type', 0x3d, "7614866b"}}, {@uid={'uid', 0x3d, r2}}, {@iocharset={'iocharset', 0x3d, 'macromanian'}}, {}], [{@rootcontext={'rootcontext', 0x3d, 'sysadm_u'}}]}, 0x1, 0x235, &(0x7f0000000000)="$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") 16:34:56 executing program 2: r0 = request_key(0x0, 0x0, 0x0, 0xfffffffffffffffd) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) perf_event_open(&(0x7f00000007c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0xe5e}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) keyctl$read(0xb, 0x0, &(0x7f0000000a40)=""/102400, 0x19000) keyctl$search(0xa, 0x0, &(0x7f00000008c0)='keyring\x00', &(0x7f0000000900)={'syz', 0x1}, 0xfffffffffffffffd) request_key(&(0x7f00000006c0)='dns_resolver\x00', &(0x7f0000000700)={'syz', 0x3}, &(0x7f0000000940)='\x00', 0xfffffffffffffffd) add_key(0x0, &(0x7f0000000400)={'syz', 0x3}, &(0x7f0000000440), 0x0, r0) keyctl$search(0xa, 0x0, 0x0, &(0x7f0000000340)={'syz', 0x1}, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000140)='cpuset\x00', 0x0, 0x0) add_key$keyring(&(0x7f0000000100), 0x0, 0x0, 0x0, r0) r1 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) request_key(0x0, &(0x7f00000005c0)={'syz', 0x0}, 0x0, 0xfffffffffffffff9) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = openat$cgroup_int(r1, &(0x7f00000001c0)='cpuset.sched_load_balance\x00', 0x2, 0x0) dup3(r3, r1, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x200000, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f000001a000)={0x0, ""/256, 0x0, 0x0, 0x0, 0x0, ""/16, ""/16, ""/16, 0x0}) ioctl$BTRFS_IOC_SUBVOL_CREATE_V2(r2, 0x50009418, &(0x7f000001a200)={{}, r4, 0x2, @inherit={0x58, &(0x7f00000009c0)={0x1, 0x2, 0x8, 0x0, {0x0, 0x0, 0x0, 0x0, 0x4}, [0x0, 0x0]}}, @subvolid=0x4}) ioctl$BTRFS_IOC_BALANCE(0xffffffffffffffff, 0x5000940c, 0x0) keyctl$search(0xa, 0x0, &(0x7f0000000200)='keyring\x00', &(0x7f0000000500)={'syz', 0x0}, 0x0) writev(r1, 0x0, 0x0) [ 2012.046395] new mount options do not match the existing superblock, will be ignored 16:34:56 executing program 5: r0 = request_key(0x0, 0x0, 0x0, 0xfffffffffffffffd) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) r1 = add_key$keyring(0x0, &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000740)=@filename='./file0\x00', &(0x7f0000000780)='./file0\x00', 0x0, 0x10, &(0x7f0000000880)='keyring\x00') perf_event_open(&(0x7f00000007c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x12c00, 0x0, 0xe5e}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) writev(0xffffffffffffffff, 0x0, 0x0) r2 = add_key(&(0x7f0000000240)='big_key\x00', &(0x7f0000000280)={'syz', 0x3}, &(0x7f0000019a40)="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", 0x5bd, 0xfffffffffffffffd) keyctl$read(0xb, r2, &(0x7f0000000a40)=""/102400, 0x19000) keyctl$search(0xa, r2, &(0x7f00000008c0)='keyring\x00', &(0x7f0000000900)={'syz', 0x1}, 0xfffffffffffffffd) request_key(&(0x7f00000006c0)='dns_resolver\x00', &(0x7f0000000700)={'syz', 0x3}, &(0x7f0000000940)='\x00', 0xfffffffffffffffd) r3 = add_key(&(0x7f0000000380)='id_resolver\x00', &(0x7f0000000400)={'syz', 0x3}, &(0x7f0000000440)="e09e6dda135ac7c467011f", 0xb, r0) keyctl$search(0xa, r1, 0x0, &(0x7f0000000340)={'syz', 0x1}, r3) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000140)='cpuset\x00', 0x0, 0x0) add_key$keyring(&(0x7f0000000100), &(0x7f0000000180)={'syz', 0x0}, 0x0, 0x0, r0) r4 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r5 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) request_key(&(0x7f0000000580)='logon\x00', &(0x7f00000005c0)={'syz', 0x0}, &(0x7f0000000600)='\x1f-)\x00', 0xfffffffffffffff9) add_key$fscrypt_provisioning(&(0x7f0000000480), &(0x7f00000004c0)={'syz', 0x0}, &(0x7f0000000640)=ANY=[], 0x48, r0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = openat$cgroup_int(r4, &(0x7f00000001c0)='cpuset.sched_load_balance\x00', 0x2, 0x0) dup3(r7, r4, 0x0) add_key$keyring(&(0x7f0000000540), &(0x7f0000000640)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffc) r8 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000980), 0x200000, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r5, 0x81f8943c, &(0x7f000001a000)={0x0, ""/256, 0x0, 0x0, 0x0, 0x0, ""/16, ""/16, ""/16, 0x0}) ioctl$BTRFS_IOC_SUBVOL_CREATE_V2(r6, 0x50009418, &(0x7f000001a200)={{r8}, r9, 0x2, @inherit={0x58, &(0x7f00000009c0)={0x1, 0x2, 0x8, 0x7, {0x14, 0x1000, 0x5, 0x7, 0x4}, [0xffff, 0x3]}}, @subvolid=0x4}) writev(r4, &(0x7f0000000300)=[{&(0x7f00000000c0)='0', 0x1}, {&(0x7f00000003c0)='7', 0x1}], 0x2) [ 2012.111343] new mount options do not match the existing superblock, will be ignored [ 2012.152121] hfs: invalid gid -1 [ 2012.205966] hfs: unable to parse mount options [ 2012.225050] hfs: unable to parse mount options 16:34:56 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x2, 0x0) r1 = accept4$x25(r0, &(0x7f0000000280), &(0x7f00000002c0)=0x12, 0x80800) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000300)={0x0, 0x0}, &(0x7f0000cab000)=0xc) syz_mount_image$hfs(&(0x7f0000000240), &(0x7f0000000380)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x3, &(0x7f0000000400)={[{}, {@part={'part', 0x3d, 0x10001}}, {@type={'type', 0x3d, "7614866b"}}, {@uid={'uid', 0x3d, r2}}, {@codepage={'codepage', 0x3d, 'ascii'}}], [{@rootcontext={'rootcontext', 0x3d, 'sysadm_u'}}]}, 0x1, 0x235, &(0x7f0000000000)="$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") 16:34:56 executing program 2: r0 = request_key(0x0, 0x0, 0x0, 0xfffffffffffffffd) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) perf_event_open(&(0x7f00000007c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0xe5e}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) keyctl$read(0xb, 0x0, &(0x7f0000000a40)=""/102400, 0x19000) keyctl$search(0xa, 0x0, &(0x7f00000008c0)='keyring\x00', &(0x7f0000000900)={'syz', 0x1}, 0xfffffffffffffffd) request_key(&(0x7f00000006c0)='dns_resolver\x00', &(0x7f0000000700)={'syz', 0x3}, &(0x7f0000000940)='\x00', 0xfffffffffffffffd) add_key(0x0, &(0x7f0000000400)={'syz', 0x3}, &(0x7f0000000440), 0x0, r0) keyctl$search(0xa, 0x0, 0x0, &(0x7f0000000340)={'syz', 0x1}, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000140)='cpuset\x00', 0x0, 0x0) add_key$keyring(&(0x7f0000000100), 0x0, 0x0, 0x0, r0) r1 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) request_key(0x0, &(0x7f00000005c0)={'syz', 0x0}, 0x0, 0xfffffffffffffff9) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = openat$cgroup_int(r1, &(0x7f00000001c0)='cpuset.sched_load_balance\x00', 0x2, 0x0) dup3(r3, r1, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x200000, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f000001a000)={0x0, ""/256, 0x0, 0x0, 0x0, 0x0, ""/16, ""/16, ""/16, 0x0}) ioctl$BTRFS_IOC_SUBVOL_CREATE_V2(r2, 0x50009418, &(0x7f000001a200)={{}, r4, 0x2, @inherit={0x58, &(0x7f00000009c0)={0x1, 0x2, 0x8, 0x0, {0x0, 0x0, 0x0, 0x0, 0x4}, [0x0, 0x0]}}, @subvolid=0x4}) ioctl$BTRFS_IOC_BALANCE(0xffffffffffffffff, 0x5000940c, 0x0) keyctl$search(0xa, 0x0, &(0x7f0000000200)='keyring\x00', &(0x7f0000000500)={'syz', 0x0}, 0x0) writev(r1, 0x0, 0x0) [ 2012.256514] new mount options do not match the existing superblock, will be ignored 16:34:56 executing program 1: syz_mount_image$hfs(&(0x7f0000000240), &(0x7f0000000380)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x3, &(0x7f0000000780)=ANY=[@ANYBLOB='quiet,gid=', @ANYRESHEX, @ANYBLOB="2c2a7270653d7614866b2c75693df589299908000000450000005d38ff0c0071446a0c48dba349ba347528523876dc8d7918ecea1024ba9669ff19a9ab5e27062b1dae8d8c0eb880008164ed9d8093fdc35f282dee56df9531b6e0c94b43c314af69146a70075499da5e7f927d3c672787e3d33a6071ff2c1483a1a7cfb34131bfee72f86068d0966d", @ANYRESHEX, @ANYBLOB=',codepage=ascii,rootcontext=sysadm_u,\x00'], 0x1, 0x235, &(0x7f0000000000)="$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") 16:34:56 executing program 4: r0 = request_key(0x0, 0x0, 0x0, 0xfffffffffffffffd) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) r1 = add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000780)='./file0\x00', &(0x7f0000000840)='gadgetfs\x00', 0x0, &(0x7f0000000880)='keyring\x00') perf_event_open(&(0x7f00000007c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x12c00, 0x0, 0xe5e}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) writev(0xffffffffffffffff, 0x0, 0x0) keyctl$read(0xb, 0x0, &(0x7f0000000a40)=""/102400, 0x19000) keyctl$search(0xa, 0x0, 0x0, 0x0, 0xfffffffffffffffd) request_key(&(0x7f00000006c0)='dns_resolver\x00', &(0x7f0000000700)={'syz', 0x3}, &(0x7f0000000940)='\x00', 0xfffffffffffffffd) r2 = add_key(&(0x7f0000000380)='id_resolver\x00', 0x0, &(0x7f0000000440), 0x0, r0) keyctl$search(0xa, r1, 0x0, &(0x7f0000000340)={'syz', 0x1}, 0x0) mount(0x0, 0x0, &(0x7f0000000140)='cpuset\x00', 0x0, 0x0) add_key$keyring(&(0x7f0000000100), &(0x7f0000000180)={'syz', 0x0}, 0x0, 0x0, r0) r3 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r4 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) open(&(0x7f00000002c0)='./file0\x00', 0x98d00, 0x8) request_key(&(0x7f0000000580)='logon\x00', &(0x7f00000005c0)={'syz', 0x0}, &(0x7f0000000600)='\x1f-)\x00', 0xfffffffffffffff9) write$rfkill(r4, &(0x7f0000000040)={0x0, 0x0, 0x3}, 0x8) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = openat$cgroup_int(r3, &(0x7f00000001c0)='cpuset.sched_load_balance\x00', 0x2, 0x0) dup3(r6, r3, 0x0) r7 = add_key$keyring(&(0x7f0000000540), &(0x7f0000000640)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffc) r8 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000980), 0x200000, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r4, 0x81f8943c, &(0x7f000001a000)={0x0, ""/256, 0x0, 0x0, 0x0, 0x0, ""/16, ""/16, ""/16, 0x0}) ioctl$BTRFS_IOC_SUBVOL_CREATE_V2(r5, 0x50009418, &(0x7f000001a200)={{r8}, r9, 0x2, @inherit={0x58, &(0x7f00000009c0)={0x1, 0x2, 0x8, 0x7, {0x14, 0x1000, 0x5, 0x7, 0x4}, [0xffff, 0x3]}}, @subvolid=0x4}) ioctl$BTRFS_IOC_BALANCE(r5, 0x5000940c, 0x0) keyctl$search(0xa, r2, &(0x7f0000000200)='keyring\x00', &(0x7f0000000500)={'syz', 0x0}, r7) writev(r3, &(0x7f0000000300)=[{&(0x7f00000000c0)='0', 0x1}, {&(0x7f00000003c0)='7', 0x1}], 0x2) 16:34:56 executing program 0: r0 = request_key(0x0, 0x0, 0x0, 0xfffffffffffffffd) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) r1 = add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000740)=@filename='./file0\x00', &(0x7f0000000780)='./file0\x00', &(0x7f0000000840)='gadgetfs\x00', 0x0, &(0x7f0000000880)='keyring\x00') perf_event_open(&(0x7f00000007c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x12c00, 0x0, 0xe5e}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) writev(0xffffffffffffffff, 0x0, 0x0) r2 = add_key(0x0, &(0x7f0000000280)={'syz', 0x3}, &(0x7f0000019a40)="4195738ac28ccd83aa93c4ecacdaca3d34104be4cc5531c4091facf7f777321e84e49e039122a2d1cf7fea6a02aac8944c27ba038156bc10c0f7a6b26fbf382f67959d856600881f0e692c60f12ace775aab8d775dc2586454918a0db1811f5e8086f1a9805166c870b8387d380d5115af5841dad21f629e05f4b51e362c46b58a7dc2855c5189bff60d02c05ba67c297aa0ad05b93b1ee2fffae13fe5764d4e2a214e15093841b1551d518a669fa94e8918bfdd6573d5c0275a9b91ddb843775f78574891e03697f6ca290be6599b671093898a82e7905ed7c7fd8e8b422ebf12e5b543885596fc5c305d497407ffe73bd543f79c983f0807ae7e13fb5053fd7a07dddf8ec739418b59d67219f008f540161cec3bfd1b3097aad497248b221d572a9eb1bad6d921fcdcfdfacf8d1e392635168747056ec8a3fc45b3027293a517d50ea789294f132f2392919dc81ba5eb02e27e116cc300000000b6c0e39688425a3cb17d35f4b1eec0a37193f233c6655c6f40c09b4ea04c8880a431a8274127d56c3c8cab73a5fcf2b604b83658344e323eeedb0b283b0b3616236e904a42fed9fc8f4c131b047bfd5d7586e6a28032a4584fd5933472ce49dfdc99976166bb37eb1679b22249a222ffab17948dd6cc6f23f42ecd32a980ab8fc7c7d2da1a91f1db1187066c144bcbdb46240b7ef7ed28da4a358295b6104e4c60b09654e79f766e19e44174e94fa41d358d3dd901c060a06a388727be1092a37c0015695b1363ed018e724947983aa6b5974daf6388547cdacbd44a1282c3b9130cbf9536c29a523980b9e4328d1a7c0de8b636d7dfdee36434125948b1d802d5d143645c3a5f8da50adeef6e4f715361908a20cb998d3e0907aef9fdd19bb79be8c510b8aa04600163636c1d1f36f3834ffa3c7369e1d8ed9348bc339da2a525c4f165c0caebb7a4ee632a37a43897084e3c07a5ed8b505a51a4777095060b0ff6a6442206244dd9a13b5ba52b07c718e9eaad10befd12be35dc50283d584035d75e4917548ff58045b88d29b6826ceb6d44fb54ba3ef7944da6e86c0f2d0bc0bd725aa9193b3de4837634ead361d9b2ff5ae4de005f53d48cba029b43eb35fbedd0b5397918a9324b6e1f1d88399d8ad69b7d79e89ded6fe81fd1200f95c831f8c60dc1483e97052f61d0a643df0c2e1b0ba7d00b0692efd1bfc1ece10c2e785e3cb3b0dfbdbd722b6e53e5a2884b1cc5d939a572564bc8a2260e8718230878edb3a877f5c585f4373ef8e0e1cff5dacf96862906ff37eec18ba706d22b101965eaf5f5e29f544977896117e25ceb572f3443eddf9651c2ac69c911b21fd69e59ee57ebe4c549ff2a3dcd904656663039789f022a6caa7f76640e75efdba82dabacf8c0112bd4e62a3a9e69a9824c1af45cf86b307d9749937dd08b6ef49860cda5da7bb886f92db7cd43a869aa646a6da291a75ff28c4d728b1377b8e80233b33e724a60c0a015ec75cd86af04a4bd43964d8f7ba781a99d0cd7ff7e189fc91801655cb1b60e6bc3af747655341deceadbed3d76bdfae92389cc87c417e0f58f3fbcc56ff347467a20773146a81090ff42bbb5383d74108028f5fa532c647746054c312e2e4c085f58d93bec6da7c2bfd99fc59c1631cc71110acc2bf352b994e2a246be3cc1d240fa0c60eb04b92a9673d2ac2bba7f322ddbbd74712b0ec459050586523bd0b0505174a701206e47f2bb7fe20caf5ed73d33447b89432802e7d4606512e217aedf78c871e10cfbdf202efbf3fd8495b6be18cde726dc1fefc01921e9d1f15c8301376c33b5a698d0f7d5f317835d74857e121fe820d93f6b757c9938ec81f9b19a4b0d4ed35d1309fbcb285cf7717e9e27aaaba9d7d742fcfd786eacd993fb119e1d52908ca7ce2135046fa95805704c6258fd1b5fc1434af7ab99609820d73627080d43bcaeeb42ce423e17aa4df3a6994ead3133e2ecfbc6fa308c6b71b78cbab273641970b49e15d0dbe7aea716eaf6cf40f90d0d7d3d8bf1d165d25d5f6f6376416b9dd13731c5c2fdadee8e48c76430cccb21d8e6c659", 0x5bd, 0xfffffffffffffffd) keyctl$read(0xb, r2, &(0x7f0000000a40)=""/102400, 0x19000) keyctl$search(0xa, r2, &(0x7f00000008c0)='keyring\x00', &(0x7f0000000900)={'syz', 0x1}, 0xfffffffffffffffd) request_key(&(0x7f00000006c0)='dns_resolver\x00', &(0x7f0000000700)={'syz', 0x3}, 0x0, 0xfffffffffffffffd) r3 = add_key(&(0x7f0000000380)='id_resolver\x00', &(0x7f0000000400)={'syz', 0x3}, &(0x7f0000000440)="e09e6dda135ac7c467011f", 0xb, r0) keyctl$search(0xa, r1, 0x0, &(0x7f0000000340)={'syz', 0x1}, r3) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000140)='cpuset\x00', 0x0, 0x0) add_key$keyring(&(0x7f0000000100), &(0x7f0000000180)={'syz', 0x0}, 0x0, 0x0, r0) r4 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r5 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) open(&(0x7f00000002c0)='./file0\x00', 0x98d00, 0x8) request_key(&(0x7f0000000580)='logon\x00', 0x0, &(0x7f0000000600)='\x1f-)\x00', 0xfffffffffffffff9) add_key$fscrypt_provisioning(&(0x7f0000000480), &(0x7f00000004c0)={'syz', 0x0}, &(0x7f0000000640)=ANY=[], 0x48, r0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = openat$cgroup_int(r4, &(0x7f00000001c0)='cpuset.sched_load_balance\x00', 0x2, 0x0) dup3(r7, r4, 0x0) r8 = add_key$keyring(&(0x7f0000000540), &(0x7f0000000640)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffc) r9 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000980), 0x200000, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r5, 0x81f8943c, &(0x7f000001a000)={0x0, ""/256, 0x0, 0x0, 0x0, 0x0, ""/16, ""/16, ""/16, 0x0}) ioctl$BTRFS_IOC_SUBVOL_CREATE_V2(r6, 0x50009418, &(0x7f000001a200)={{r9}, r10, 0x2, @inherit={0x58, &(0x7f00000009c0)={0x1, 0x2, 0x8, 0x7, {0x14, 0x1000, 0x5, 0x7}, [0xffff, 0x0]}}, @subvolid=0x4}) keyctl$search(0xa, r3, 0x0, &(0x7f0000000500)={'syz', 0x0}, r8) writev(r4, &(0x7f0000000300)=[{&(0x7f00000000c0)='0', 0xa}, {&(0x7f00000003c0)='7', 0x1}], 0x2) [ 2012.394620] new mount options do not match the existing superblock, will be ignored [ 2012.457340] hfs: invalid gid -1 16:34:56 executing program 5: r0 = request_key(0x0, 0x0, 0x0, 0xfffffffffffffffd) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) r1 = add_key$keyring(0x0, &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000740)=@filename='./file0\x00', &(0x7f0000000780)='./file0\x00', &(0x7f0000000840)='gadgetfs\x00', 0x0, &(0x7f0000000880)='keyring\x00') perf_event_open(&(0x7f00000007c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x12c00, 0x0, 0xe5e}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) writev(0xffffffffffffffff, 0x0, 0x0) r2 = add_key(&(0x7f0000000240)='big_key\x00', &(0x7f0000000280)={'syz', 0x3}, &(0x7f0000019a40)="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", 0x5bd, 0xfffffffffffffffd) keyctl$read(0xb, r2, &(0x7f0000000a40)=""/102400, 0x19000) keyctl$search(0xa, r2, &(0x7f00000008c0)='keyring\x00', &(0x7f0000000900)={'syz', 0x1}, 0xfffffffffffffffd) request_key(&(0x7f00000006c0)='dns_resolver\x00', &(0x7f0000000700)={'syz', 0x3}, &(0x7f0000000940)='\x00', 0xfffffffffffffffd) r3 = add_key(&(0x7f0000000380)='id_resolver\x00', &(0x7f0000000400)={'syz', 0x3}, &(0x7f0000000440)="e09e6dda135ac7c467011f", 0xb, r0) keyctl$search(0xa, r1, 0x0, &(0x7f0000000340)={'syz', 0x1}, r3) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000140)='cpuset\x00', 0x0, 0x0) add_key$keyring(&(0x7f0000000100), &(0x7f0000000180)={'syz', 0x0}, 0x0, 0x0, r0) r4 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r5 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) request_key(&(0x7f0000000580)='logon\x00', &(0x7f00000005c0)={'syz', 0x0}, &(0x7f0000000600)='\x1f-)\x00', 0xfffffffffffffff9) add_key$fscrypt_provisioning(&(0x7f0000000480), &(0x7f00000004c0)={'syz', 0x0}, &(0x7f0000000640)=ANY=[], 0x48, r0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = openat$cgroup_int(r4, &(0x7f00000001c0)='cpuset.sched_load_balance\x00', 0x2, 0x0) dup3(r7, r4, 0x0) add_key$keyring(&(0x7f0000000540), &(0x7f0000000640)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffc) r8 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000980), 0x200000, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r5, 0x81f8943c, &(0x7f000001a000)={0x0, ""/256, 0x0, 0x0, 0x0, 0x0, ""/16, ""/16, ""/16, 0x0}) ioctl$BTRFS_IOC_SUBVOL_CREATE_V2(r6, 0x50009418, &(0x7f000001a200)={{r8}, r9, 0x2, @inherit={0x58, &(0x7f00000009c0)={0x1, 0x2, 0x8, 0x7, {0x14, 0x1000, 0x5, 0x7, 0x4}, [0xffff, 0x3]}}, @subvolid=0x4}) writev(r4, &(0x7f0000000300)=[{&(0x7f00000000c0)='0', 0x1}, {&(0x7f00000003c0)='7', 0x1}], 0x2) [ 2012.484732] hfs: unable to parse mount options [ 2012.501833] hfs: unable to parse mount options [ 2012.521057] new mount options do not match the existing superblock, will be ignored 16:34:56 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x2, 0x0) r1 = accept4$x25(r0, &(0x7f0000000280), &(0x7f00000002c0)=0x12, 0x80800) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000300)={0x0, 0x0}, &(0x7f0000cab000)=0xc) syz_mount_image$hfs(&(0x7f0000000240), &(0x7f0000000380)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x3, &(0x7f0000000400)={[{}, {@part={'part', 0x3d, 0x10001}}, {@type={'type', 0x3d, "7614866b"}}, {@uid={'uid', 0x3d, r2}}, {@codepage={'codepage', 0x3d, 'ascii'}}], [{@rootcontext={'rootcontext', 0x3d, 'sysadm_u'}}]}, 0x1, 0x235, &(0x7f0000000000)="$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") 16:34:56 executing program 1: syz_mount_image$hfs(&(0x7f0000000240), &(0x7f0000000380)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x3, &(0x7f0000000780)=ANY=[@ANYBLOB='quiet,gid=', @ANYRESHEX, @ANYBLOB="2c2a7270653d7614866b2c75693df589299908000000450000005d38ff0c0071446a0c48dba349ba347528523876dc8d7918ecea1024ba9669ff19a9ab5e27062b1dae8d8c0eb880008164ed9d8093fdc35f282dee56df9531b6e0c94b43c314af69146a70075499da5e7f927d3c672787e3d33a6071ff2c1483a1a7cfb34131bfee72f86068d0966d", @ANYRESHEX, @ANYBLOB=',codepage=ascii,rootcontext=sysadm_u,\x00'], 0x1, 0x235, &(0x7f0000000000)="$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") 16:34:56 executing program 2: r0 = request_key(0x0, 0x0, 0x0, 0xfffffffffffffffd) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) perf_event_open(&(0x7f00000007c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0xe5e}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) keyctl$read(0xb, 0x0, &(0x7f0000000a40)=""/102400, 0x19000) keyctl$search(0xa, 0x0, &(0x7f00000008c0)='keyring\x00', &(0x7f0000000900)={'syz', 0x1}, 0xfffffffffffffffd) request_key(&(0x7f00000006c0)='dns_resolver\x00', &(0x7f0000000700)={'syz', 0x3}, &(0x7f0000000940)='\x00', 0xfffffffffffffffd) add_key(0x0, &(0x7f0000000400)={'syz', 0x3}, &(0x7f0000000440), 0x0, r0) keyctl$search(0xa, 0x0, 0x0, &(0x7f0000000340)={'syz', 0x1}, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000140)='cpuset\x00', 0x0, 0x0) add_key$keyring(&(0x7f0000000100), 0x0, 0x0, 0x0, r0) r1 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) request_key(0x0, &(0x7f00000005c0)={'syz', 0x0}, 0x0, 0xfffffffffffffff9) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = openat$cgroup_int(r1, &(0x7f00000001c0)='cpuset.sched_load_balance\x00', 0x2, 0x0) dup3(r3, r1, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x200000, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f000001a000)={0x0, ""/256, 0x0, 0x0, 0x0, 0x0, ""/16, ""/16, ""/16, 0x0}) ioctl$BTRFS_IOC_SUBVOL_CREATE_V2(r2, 0x50009418, &(0x7f000001a200)={{}, r4, 0x2, @inherit={0x58, &(0x7f00000009c0)={0x1, 0x2, 0x8, 0x0, {0x0, 0x0, 0x0, 0x0, 0x4}, [0x0, 0x0]}}, @subvolid=0x4}) ioctl$BTRFS_IOC_BALANCE(0xffffffffffffffff, 0x5000940c, 0x0) keyctl$search(0xa, 0x0, &(0x7f0000000200)='keyring\x00', &(0x7f0000000500)={'syz', 0x0}, 0x0) writev(r1, &(0x7f0000000300)=[{&(0x7f00000000c0)='0', 0x1}], 0x1) 16:34:56 executing program 4: r0 = request_key(0x0, 0x0, 0x0, 0xfffffffffffffffd) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) r1 = add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000780)='./file0\x00', &(0x7f0000000840)='gadgetfs\x00', 0x0, &(0x7f0000000880)='keyring\x00') perf_event_open(&(0x7f00000007c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x12c00, 0x0, 0xe5e}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) writev(0xffffffffffffffff, 0x0, 0x0) keyctl$read(0xb, 0x0, &(0x7f0000000a40)=""/102400, 0x19000) keyctl$search(0xa, 0x0, 0x0, 0x0, 0xfffffffffffffffd) request_key(&(0x7f00000006c0)='dns_resolver\x00', &(0x7f0000000700)={'syz', 0x3}, &(0x7f0000000940)='\x00', 0xfffffffffffffffd) r2 = add_key(&(0x7f0000000380)='id_resolver\x00', 0x0, &(0x7f0000000440), 0x0, r0) keyctl$search(0xa, r1, 0x0, &(0x7f0000000340)={'syz', 0x1}, 0x0) mount(0x0, 0x0, &(0x7f0000000140)='cpuset\x00', 0x0, 0x0) add_key$keyring(&(0x7f0000000100), &(0x7f0000000180)={'syz', 0x0}, 0x0, 0x0, r0) r3 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r4 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) open(&(0x7f00000002c0)='./file0\x00', 0x98d00, 0x8) request_key(&(0x7f0000000580)='logon\x00', &(0x7f00000005c0)={'syz', 0x0}, &(0x7f0000000600)='\x1f-)\x00', 0xfffffffffffffff9) write$rfkill(r4, &(0x7f0000000040)={0x0, 0x0, 0x3}, 0x8) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = openat$cgroup_int(r3, &(0x7f00000001c0)='cpuset.sched_load_balance\x00', 0x2, 0x0) dup3(r6, r3, 0x0) r7 = add_key$keyring(&(0x7f0000000540), &(0x7f0000000640)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffc) r8 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000980), 0x200000, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r4, 0x81f8943c, &(0x7f000001a000)={0x0, ""/256, 0x0, 0x0, 0x0, 0x0, ""/16, ""/16, ""/16, 0x0}) ioctl$BTRFS_IOC_SUBVOL_CREATE_V2(r5, 0x50009418, &(0x7f000001a200)={{r8}, r9, 0x2, @inherit={0x58, &(0x7f00000009c0)={0x1, 0x2, 0x8, 0x7, {0x14, 0x1000, 0x5, 0x7, 0x4}, [0xffff, 0x3]}}, @subvolid=0x4}) ioctl$BTRFS_IOC_BALANCE(r5, 0x5000940c, 0x0) keyctl$search(0xa, r2, &(0x7f0000000200)='keyring\x00', &(0x7f0000000500)={'syz', 0x0}, r7) writev(r3, &(0x7f0000000300)=[{&(0x7f00000000c0)='0', 0x1}, {&(0x7f00000003c0)='7', 0x1}], 0x2) [ 2012.701289] new mount options do not match the existing superblock, will be ignored [ 2012.771764] hfs: unable to parse mount options [ 2012.784664] hfs: invalid gid -1 [ 2012.795066] new mount options do not match the existing superblock, will be ignored [ 2012.806549] hfs: unable to parse mount options 16:34:56 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x2, 0x0) r1 = accept4$x25(r0, &(0x7f0000000280), &(0x7f00000002c0)=0x12, 0x80800) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000300)={0x0, 0x0}, &(0x7f0000cab000)=0xc) syz_mount_image$hfs(&(0x7f0000000240), &(0x7f0000000380)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x3, &(0x7f0000000400)={[{}, {@part={'part', 0x3d, 0x10001}}, {@type={'type', 0x3d, "7614866b"}}, {@uid={'uid', 0x3d, r2}}, {@codepage={'codepage', 0x3d, 'ascii'}}], [{@rootcontext={'rootcontext', 0x3d, 'sysadm_u'}}]}, 0x1, 0x235, &(0x7f0000000000)="$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") perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) socket(0x10, 0x2, 0x0) (async) accept4$x25(r0, &(0x7f0000000280), &(0x7f00000002c0)=0x12, 0x80800) (async) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000300), &(0x7f0000cab000)=0xc) (async) syz_mount_image$hfs(&(0x7f0000000240), &(0x7f0000000380)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x3, &(0x7f0000000400)={[{}, {@part={'part', 0x3d, 0x10001}}, {@type={'type', 0x3d, "7614866b"}}, {@uid={'uid', 0x3d, r2}}, {@codepage={'codepage', 0x3d, 'ascii'}}], [{@rootcontext={'rootcontext', 0x3d, 'sysadm_u'}}]}, 0x1, 0x235, &(0x7f0000000000)="$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") (async) 16:34:57 executing program 1: syz_mount_image$hfs(&(0x7f0000000240), &(0x7f0000000380)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x3, &(0x7f0000000780)=ANY=[@ANYBLOB='quiet,gid=', @ANYRESHEX, @ANYBLOB="2c2a7270653d7614866b2c75693df589299908000000450000005d38ff0c0071446a0c48dba349ba347528523876dc8d7918ecea1024ba9669ff19a9ab5e27062b1dae8d8c0eb880008164ed9d8093fdc35f282dee56df9531b6e0c94b43c314af69146a70075499da5e7f927d3c672787e3d33a6071ff2c1483a1a7cfb34131bfee72f86068d0966d", @ANYRESHEX, @ANYBLOB=',codepage=ascii,rootcontext=sysadm_u,\x00'], 0x1, 0x235, &(0x7f0000000000)="$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") [ 2012.895557] new mount options do not match the existing superblock, will be ignored 16:34:57 executing program 0: r0 = request_key(0x0, 0x0, 0x0, 0xfffffffffffffffd) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) r1 = add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000740)=@filename='./file0\x00', &(0x7f0000000780)='./file0\x00', &(0x7f0000000840)='gadgetfs\x00', 0x0, &(0x7f0000000880)='keyring\x00') perf_event_open(&(0x7f00000007c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x12c00, 0x0, 0xe5e}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) writev(0xffffffffffffffff, 0x0, 0x0) r2 = add_key(0x0, &(0x7f0000000280)={'syz', 0x3}, &(0x7f0000019a40)="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", 0x5bd, 0xfffffffffffffffd) keyctl$read(0xb, r2, &(0x7f0000000a40)=""/102400, 0x19000) keyctl$search(0xa, r2, &(0x7f00000008c0)='keyring\x00', &(0x7f0000000900)={'syz', 0x1}, 0xfffffffffffffffd) request_key(&(0x7f00000006c0)='dns_resolver\x00', &(0x7f0000000700)={'syz', 0x3}, 0x0, 0xfffffffffffffffd) r3 = add_key(&(0x7f0000000380)='id_resolver\x00', &(0x7f0000000400)={'syz', 0x3}, &(0x7f0000000440)="e09e6dda135ac7c467011f", 0xb, r0) keyctl$search(0xa, r1, 0x0, &(0x7f0000000340)={'syz', 0x1}, r3) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000140)='cpuset\x00', 0x0, 0x0) add_key$keyring(&(0x7f0000000100), &(0x7f0000000180)={'syz', 0x0}, 0x0, 0x0, r0) r4 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r5 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) open(&(0x7f00000002c0)='./file0\x00', 0x98d00, 0x8) request_key(&(0x7f0000000580)='logon\x00', 0x0, &(0x7f0000000600)='\x1f-)\x00', 0xfffffffffffffff9) add_key$fscrypt_provisioning(&(0x7f0000000480), &(0x7f00000004c0)={'syz', 0x0}, &(0x7f0000000640)=ANY=[], 0x48, r0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = openat$cgroup_int(r4, &(0x7f00000001c0)='cpuset.sched_load_balance\x00', 0x2, 0x0) dup3(r7, r4, 0x0) r8 = add_key$keyring(&(0x7f0000000540), &(0x7f0000000640)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffc) r9 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000980), 0x200000, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r5, 0x81f8943c, &(0x7f000001a000)={0x0, ""/256, 0x0, 0x0, 0x0, 0x0, ""/16, ""/16, ""/16, 0x0}) ioctl$BTRFS_IOC_SUBVOL_CREATE_V2(r6, 0x50009418, &(0x7f000001a200)={{r9}, r10, 0x2, @inherit={0x58, &(0x7f00000009c0)={0x1, 0x2, 0x8, 0x7, {0x14, 0x1000, 0x5, 0x7}, [0xffff, 0x0]}}, @subvolid=0x4}) keyctl$search(0xa, r3, 0x0, &(0x7f0000000500)={'syz', 0x0}, r8) writev(r4, &(0x7f0000000300)=[{&(0x7f00000000c0)='0', 0x14}, {&(0x7f00000003c0)='7', 0x1}], 0x2) 16:34:57 executing program 5: r0 = request_key(0x0, 0x0, 0x0, 0xfffffffffffffffd) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) r1 = add_key$keyring(0x0, &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000740)=@filename='./file0\x00', &(0x7f0000000780)='./file0\x00', &(0x7f0000000840)='gadgetfs\x00', 0x0, &(0x7f0000000880)='keyring\x00') perf_event_open(&(0x7f00000007c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x12c00, 0x0, 0xe5e}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) writev(0xffffffffffffffff, 0x0, 0x0) r2 = add_key(&(0x7f0000000240)='big_key\x00', &(0x7f0000000280)={'syz', 0x3}, &(0x7f0000019a40)="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", 0x5bd, 0xfffffffffffffffd) keyctl$read(0xb, r2, &(0x7f0000000a40)=""/102400, 0x19000) keyctl$search(0xa, r2, &(0x7f00000008c0)='keyring\x00', &(0x7f0000000900)={'syz', 0x1}, 0xfffffffffffffffd) request_key(&(0x7f00000006c0)='dns_resolver\x00', &(0x7f0000000700)={'syz', 0x3}, &(0x7f0000000940)='\x00', 0xfffffffffffffffd) r3 = add_key(&(0x7f0000000380)='id_resolver\x00', &(0x7f0000000400)={'syz', 0x3}, &(0x7f0000000440)="e09e6dda135ac7c467011f", 0xb, r0) keyctl$search(0xa, r1, 0x0, &(0x7f0000000340)={'syz', 0x1}, r3) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000140)='cpuset\x00', 0x0, 0x0) add_key$keyring(&(0x7f0000000100), &(0x7f0000000180)={'syz', 0x0}, 0x0, 0x0, r0) r4 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r5 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) request_key(&(0x7f0000000580)='logon\x00', &(0x7f00000005c0)={'syz', 0x0}, &(0x7f0000000600)='\x1f-)\x00', 0xfffffffffffffff9) add_key$fscrypt_provisioning(&(0x7f0000000480), &(0x7f00000004c0)={'syz', 0x0}, &(0x7f0000000640)=ANY=[], 0x48, r0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = openat$cgroup_int(r4, &(0x7f00000001c0)='cpuset.sched_load_balance\x00', 0x2, 0x0) dup3(r7, r4, 0x0) add_key$keyring(&(0x7f0000000540), &(0x7f0000000640)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffc) r8 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000980), 0x200000, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r5, 0x81f8943c, &(0x7f000001a000)={0x0, ""/256, 0x0, 0x0, 0x0, 0x0, ""/16, ""/16, ""/16, 0x0}) ioctl$BTRFS_IOC_SUBVOL_CREATE_V2(r6, 0x50009418, &(0x7f000001a200)={{r8}, r9, 0x2, @inherit={0x58, &(0x7f00000009c0)={0x1, 0x2, 0x8, 0x7, {0x14, 0x1000, 0x5, 0x7, 0x4}, [0xffff, 0x3]}}, @subvolid=0x4}) writev(r4, &(0x7f0000000300)=[{&(0x7f00000000c0)='0', 0x1}, {&(0x7f00000003c0)='7', 0x1}], 0x2) 16:34:57 executing program 2: r0 = request_key(0x0, 0x0, 0x0, 0xfffffffffffffffd) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) perf_event_open(&(0x7f00000007c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0xe5e}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) keyctl$read(0xb, 0x0, &(0x7f0000000a40)=""/102400, 0x19000) keyctl$search(0xa, 0x0, &(0x7f00000008c0)='keyring\x00', &(0x7f0000000900)={'syz', 0x1}, 0xfffffffffffffffd) request_key(&(0x7f00000006c0)='dns_resolver\x00', &(0x7f0000000700)={'syz', 0x3}, &(0x7f0000000940)='\x00', 0xfffffffffffffffd) add_key(0x0, &(0x7f0000000400)={'syz', 0x3}, &(0x7f0000000440), 0x0, r0) keyctl$search(0xa, 0x0, 0x0, &(0x7f0000000340)={'syz', 0x1}, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000140)='cpuset\x00', 0x0, 0x0) add_key$keyring(&(0x7f0000000100), 0x0, 0x0, 0x0, r0) r1 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) request_key(0x0, &(0x7f00000005c0)={'syz', 0x0}, 0x0, 0xfffffffffffffff9) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = openat$cgroup_int(r1, &(0x7f00000001c0)='cpuset.sched_load_balance\x00', 0x2, 0x0) dup3(r3, r1, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x200000, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f000001a000)={0x0, ""/256, 0x0, 0x0, 0x0, 0x0, ""/16, ""/16, ""/16, 0x0}) ioctl$BTRFS_IOC_SUBVOL_CREATE_V2(r2, 0x50009418, &(0x7f000001a200)={{}, r4, 0x2, @inherit={0x58, &(0x7f00000009c0)={0x1, 0x2, 0x8, 0x0, {0x0, 0x0, 0x0, 0x0, 0x4}, [0x0, 0x0]}}, @subvolid=0x4}) ioctl$BTRFS_IOC_BALANCE(0xffffffffffffffff, 0x5000940c, 0x0) keyctl$search(0xa, 0x0, &(0x7f0000000200)='keyring\x00', &(0x7f0000000500)={'syz', 0x0}, 0x0) writev(r1, &(0x7f0000000300)=[{&(0x7f00000000c0)='0', 0x1}], 0x1) 16:34:57 executing program 4: r0 = request_key(0x0, 0x0, 0x0, 0xfffffffffffffffd) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) r1 = add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000780)='./file0\x00', &(0x7f0000000840)='gadgetfs\x00', 0x0, &(0x7f0000000880)='keyring\x00') perf_event_open(&(0x7f00000007c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x12c00, 0x0, 0xe5e}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) writev(0xffffffffffffffff, 0x0, 0x0) keyctl$read(0xb, 0x0, &(0x7f0000000a40)=""/102400, 0x19000) keyctl$search(0xa, 0x0, 0x0, 0x0, 0xfffffffffffffffd) request_key(&(0x7f00000006c0)='dns_resolver\x00', &(0x7f0000000700)={'syz', 0x3}, &(0x7f0000000940)='\x00', 0xfffffffffffffffd) r2 = add_key(&(0x7f0000000380)='id_resolver\x00', 0x0, &(0x7f0000000440), 0x0, r0) keyctl$search(0xa, r1, 0x0, &(0x7f0000000340)={'syz', 0x1}, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000100), &(0x7f0000000180)={'syz', 0x0}, 0x0, 0x0, r0) r3 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r4 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) open(&(0x7f00000002c0)='./file0\x00', 0x98d00, 0x8) request_key(&(0x7f0000000580)='logon\x00', &(0x7f00000005c0)={'syz', 0x0}, &(0x7f0000000600)='\x1f-)\x00', 0xfffffffffffffff9) write$rfkill(r4, &(0x7f0000000040)={0x0, 0x0, 0x3}, 0x8) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = openat$cgroup_int(r3, &(0x7f00000001c0)='cpuset.sched_load_balance\x00', 0x2, 0x0) dup3(r6, r3, 0x0) r7 = add_key$keyring(&(0x7f0000000540), &(0x7f0000000640)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffc) r8 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000980), 0x200000, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r4, 0x81f8943c, &(0x7f000001a000)={0x0, ""/256, 0x0, 0x0, 0x0, 0x0, ""/16, ""/16, ""/16, 0x0}) ioctl$BTRFS_IOC_SUBVOL_CREATE_V2(r5, 0x50009418, &(0x7f000001a200)={{r8}, r9, 0x2, @inherit={0x58, &(0x7f00000009c0)={0x1, 0x2, 0x8, 0x7, {0x14, 0x1000, 0x5, 0x7, 0x4}, [0xffff, 0x3]}}, @subvolid=0x4}) ioctl$BTRFS_IOC_BALANCE(r5, 0x5000940c, 0x0) keyctl$search(0xa, r2, &(0x7f0000000200)='keyring\x00', &(0x7f0000000500)={'syz', 0x0}, r7) writev(r3, &(0x7f0000000300)=[{&(0x7f00000000c0)='0', 0x1}, {&(0x7f00000003c0)='7', 0x1}], 0x2) [ 2013.127519] hfs: unable to parse mount options [ 2013.168967] hfs: invalid gid -1 [ 2013.199584] new mount options do not match the existing superblock, will be ignored [ 2013.221007] hfs: unable to parse mount options 16:34:57 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = gettid() process_vm_writev(r0, &(0x7f0000000000)=[{&(0x7f0000000080)=""/259, 0x103}], 0x1, &(0x7f0000000040)=[{&(0x7f0000217f28)=""/231, 0xe7}], 0x1, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x2, 0xa4, 0x8, 0x2, 0x0, 0x5, 0x11000, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x2, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x5, 0x1, @perf_config_ext={0x72, 0x1}, 0x0, 0xffffffffffffffff, 0x5b5f6838, 0x2, 0x0, 0x3, 0x89, 0x0, 0x200, 0x0, 0x1}, r0, 0x2, 0xffffffffffffffff, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000003980)={0x0, 0x0}) r2 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c47, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x1, 0x0, 0x0, 0x0, 0x8000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000240)={0x0, 0x0}) perf_event_open(&(0x7f00000001c0)={0x0, 0x80, 0x0, 0x4, 0x0, 0x9, 0x0, 0x2, 0x5c10, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x2, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x3, 0x1, @perf_bp={&(0x7f0000000040)}, 0x8c104, 0xff, 0x8, 0x9, 0x0, 0x1, 0xa5d0}, r3, 0x80, r2, 0x0) perf_event_open(&(0x7f0000003900)={0x4, 0x80, 0x5, 0x8, 0x9, 0x32, 0x0, 0x7fff, 0x8040, 0x2, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x3, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x10000, 0x1, @perf_config_ext={0x8, 0x3}, 0x10, 0x9, 0x4, 0x0, 0x5, 0x2, 0x9, 0x0, 0x2, 0x0, 0x1000}, r1, 0x5, r2, 0xa) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000140)={0x0, 0x0}, &(0x7f0000cab000)=0x6e) r5 = syz_open_dev$evdev(&(0x7f00000000c0), 0x0, 0x862b01) write$char_usb(r5, &(0x7f0000000040)="e2", 0x1770) preadv(r5, &(0x7f0000000300)=[{&(0x7f0000000480)=""/211, 0xd3}, {&(0x7f0000000580)=""/4096, 0x1000}, {&(0x7f0000001580)=""/151, 0x97}, {&(0x7f0000001640)=""/4096, 0x1000}, {&(0x7f0000002640)=""/224, 0xe0}, {&(0x7f0000002740)=""/182, 0xb6}, {&(0x7f0000002800)=""/4096, 0x1000}, {&(0x7f0000003800)=""/216, 0xd8}], 0x8, 0x7ff, 0x8ef2) syz_mount_image$hfs(&(0x7f0000000240), &(0x7f0000000380)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x3, &(0x7f0000000400)={[{}, {@part={'part', 0x3d, 0x10001}}, {@type={'type', 0x3d, "7614866b"}}, {@uid={'uid', 0x3d, r4}}, {@codepage={'codepage', 0x3d, 'ascii'}}], [{@rootcontext={'rootcontext', 0x3d, 'sysadm_u'}}]}, 0x1, 0x235, &(0x7f0000000000)="$eJzs3c9qE1EUx/HfvYkabanTPyK4rBZcSVs34kaQPIQrUZsIxVBBK6grcS0+gHtfwYdwJb6Arlz5ANmN3DM3zTRmMmk1ubT9fiBh2rln5pzOTO89gVIBOLPut398vv0rvJzUUEPSXclLaklNSVd0tfVqb393v9ftTDpQwyLCy6mIdH+N2dnrjgsNcRYRZeGrphbL38Ns5Hme/0ydBJKzp38ML12IT6ftb809s9l4lzqBxFxffb3WUuo8AABpxfnfx3l+Ma7fvZc24rR/qub/fuoEEivN/9Zl5S5c38u2a9jvWQsX9vtBl3icc51XcWcdWmC6uq7ScvEXn+72urd2nvc6Xu91LyoNW7P3TnHrDtRkuz6mN53g+LUvWA3nQg3bFfmv/t8z1nNf3Tf30GX6pM7B+q+Zu3CZ7EplI1eqyH+z+ohWZVaMqqhy2U5yLZ4hqqmyNb4j0eCOWtbhDwiyujwtamUkqqhuqyZqdWzUdk3U2mjU8G6ujpw199E9cOv6rS9ql9b/Pvy0NzTNkxnG2Mh4Z0ysp2kjsykS80cqA//mg57ojpZevnn77HGv133BBhtssHGwkfoXFOZheNFTZ4JEwrrLFf1fqV/ZtBYpvGUT1ul53cFLR9yq6A1W7P3SkTq4heoObtqe6/pN6cb0Z8xinqeEa+u7HvH5PwAAAAAAAAAAAAAAAAAAwEkzjz8nSF0jAAAAAAAAAAAAAAAAAAAAAAAnHf//Fzi7/gQAAP//6oSCGA==") 16:34:57 executing program 4: r0 = request_key(0x0, 0x0, 0x0, 0xfffffffffffffffd) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) r1 = add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000780)='./file0\x00', &(0x7f0000000840)='gadgetfs\x00', 0x0, &(0x7f0000000880)='keyring\x00') perf_event_open(&(0x7f00000007c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x12c00, 0x0, 0xe5e}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) writev(0xffffffffffffffff, 0x0, 0x0) keyctl$read(0xb, 0x0, &(0x7f0000000a40)=""/102400, 0x19000) keyctl$search(0xa, 0x0, 0x0, 0x0, 0xfffffffffffffffd) request_key(&(0x7f00000006c0)='dns_resolver\x00', &(0x7f0000000700)={'syz', 0x3}, &(0x7f0000000940)='\x00', 0xfffffffffffffffd) r2 = add_key(&(0x7f0000000380)='id_resolver\x00', 0x0, &(0x7f0000000440), 0x0, r0) keyctl$search(0xa, r1, 0x0, &(0x7f0000000340)={'syz', 0x1}, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000100), &(0x7f0000000180)={'syz', 0x0}, 0x0, 0x0, r0) r3 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r4 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) open(&(0x7f00000002c0)='./file0\x00', 0x98d00, 0x8) request_key(&(0x7f0000000580)='logon\x00', &(0x7f00000005c0)={'syz', 0x0}, &(0x7f0000000600)='\x1f-)\x00', 0xfffffffffffffff9) write$rfkill(r4, &(0x7f0000000040)={0x0, 0x0, 0x3}, 0x8) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = openat$cgroup_int(r3, &(0x7f00000001c0)='cpuset.sched_load_balance\x00', 0x2, 0x0) dup3(r6, r3, 0x0) r7 = add_key$keyring(&(0x7f0000000540), &(0x7f0000000640)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffc) r8 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000980), 0x200000, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r4, 0x81f8943c, &(0x7f000001a000)={0x0, ""/256, 0x0, 0x0, 0x0, 0x0, ""/16, ""/16, ""/16, 0x0}) ioctl$BTRFS_IOC_SUBVOL_CREATE_V2(r5, 0x50009418, &(0x7f000001a200)={{r8}, r9, 0x2, @inherit={0x58, &(0x7f00000009c0)={0x1, 0x2, 0x8, 0x7, {0x14, 0x1000, 0x5, 0x7, 0x4}, [0xffff, 0x3]}}, @subvolid=0x4}) ioctl$BTRFS_IOC_BALANCE(r5, 0x5000940c, 0x0) keyctl$search(0xa, r2, &(0x7f0000000200)='keyring\x00', &(0x7f0000000500)={'syz', 0x0}, r7) writev(r3, &(0x7f0000000300)=[{&(0x7f00000000c0)='0', 0x1}, {&(0x7f00000003c0)='7', 0x1}], 0x2) 16:34:57 executing program 2: r0 = request_key(0x0, 0x0, 0x0, 0xfffffffffffffffd) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) perf_event_open(&(0x7f00000007c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0xe5e}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) keyctl$read(0xb, 0x0, &(0x7f0000000a40)=""/102400, 0x19000) keyctl$search(0xa, 0x0, &(0x7f00000008c0)='keyring\x00', &(0x7f0000000900)={'syz', 0x1}, 0xfffffffffffffffd) request_key(&(0x7f00000006c0)='dns_resolver\x00', &(0x7f0000000700)={'syz', 0x3}, &(0x7f0000000940)='\x00', 0xfffffffffffffffd) add_key(0x0, &(0x7f0000000400)={'syz', 0x3}, &(0x7f0000000440), 0x0, r0) keyctl$search(0xa, 0x0, 0x0, &(0x7f0000000340)={'syz', 0x1}, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000140)='cpuset\x00', 0x0, 0x0) add_key$keyring(&(0x7f0000000100), 0x0, 0x0, 0x0, r0) r1 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) request_key(0x0, &(0x7f00000005c0)={'syz', 0x0}, 0x0, 0xfffffffffffffff9) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = openat$cgroup_int(r1, &(0x7f00000001c0)='cpuset.sched_load_balance\x00', 0x2, 0x0) dup3(r3, r1, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x200000, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f000001a000)={0x0, ""/256, 0x0, 0x0, 0x0, 0x0, ""/16, ""/16, ""/16, 0x0}) ioctl$BTRFS_IOC_SUBVOL_CREATE_V2(r2, 0x50009418, &(0x7f000001a200)={{}, r4, 0x2, @inherit={0x58, &(0x7f00000009c0)={0x1, 0x2, 0x8, 0x0, {0x0, 0x0, 0x0, 0x0, 0x4}, [0x0, 0x0]}}, @subvolid=0x4}) ioctl$BTRFS_IOC_BALANCE(0xffffffffffffffff, 0x5000940c, 0x0) keyctl$search(0xa, 0x0, &(0x7f0000000200)='keyring\x00', &(0x7f0000000500)={'syz', 0x0}, 0x0) writev(r1, &(0x7f0000000300)=[{&(0x7f00000000c0)='0', 0x1}], 0x1) [ 2013.300590] new mount options do not match the existing superblock, will be ignored [ 2013.322197] new mount options do not match the existing superblock, will be ignored 16:34:57 executing program 1: syz_mount_image$hfs(&(0x7f0000000240), &(0x7f0000000380)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x3, &(0x7f0000000780)=ANY=[@ANYBLOB='quiet,gid=', @ANYRESHEX, @ANYBLOB="2c2a7270653d7614866b2c75693df589299908000000450000005d38ff0c0071446a0c48dba349ba347528523876dc8d7918ecea1024ba9669ff19a9ab5e27062b1dae8d8c0eb880008164ed9d8093fdc35f282dee56df9531b6e0c94b43c314af69146a70075499da5e7f927d3c672787e3d33a6071ff2c1483a1a7cfb34131bfee72f86068d0966d", @ANYRESHEX, @ANYBLOB=',codepage=ascii,rootcontext=sysadm_u,\x00'], 0x1, 0x235, &(0x7f0000000000)="$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") 16:34:57 executing program 0: r0 = request_key(0x0, 0x0, 0x0, 0xfffffffffffffffd) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) r1 = add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000740)=@filename='./file0\x00', &(0x7f0000000780)='./file0\x00', &(0x7f0000000840)='gadgetfs\x00', 0x0, &(0x7f0000000880)='keyring\x00') perf_event_open(&(0x7f00000007c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x12c00, 0x0, 0xe5e}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) writev(0xffffffffffffffff, 0x0, 0x0) r2 = add_key(0x0, &(0x7f0000000280)={'syz', 0x3}, &(0x7f0000019a40)="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", 0x5bd, 0xfffffffffffffffd) keyctl$read(0xb, r2, &(0x7f0000000a40)=""/102400, 0x19000) keyctl$search(0xa, r2, &(0x7f00000008c0)='keyring\x00', &(0x7f0000000900)={'syz', 0x1}, 0xfffffffffffffffd) request_key(&(0x7f00000006c0)='dns_resolver\x00', &(0x7f0000000700)={'syz', 0x3}, 0x0, 0xfffffffffffffffd) r3 = add_key(&(0x7f0000000380)='id_resolver\x00', &(0x7f0000000400)={'syz', 0x3}, &(0x7f0000000440)="e09e6dda135ac7c467011f", 0xb, r0) keyctl$search(0xa, r1, 0x0, &(0x7f0000000340)={'syz', 0x1}, r3) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000140)='cpuset\x00', 0x0, 0x0) add_key$keyring(&(0x7f0000000100), &(0x7f0000000180)={'syz', 0x0}, 0x0, 0x0, r0) r4 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r5 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) open(&(0x7f00000002c0)='./file0\x00', 0x98d00, 0x8) request_key(&(0x7f0000000580)='logon\x00', 0x0, &(0x7f0000000600)='\x1f-)\x00', 0xfffffffffffffff9) add_key$fscrypt_provisioning(&(0x7f0000000480), &(0x7f00000004c0)={'syz', 0x0}, &(0x7f0000000640)=ANY=[], 0x48, r0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = openat$cgroup_int(r4, &(0x7f00000001c0)='cpuset.sched_load_balance\x00', 0x2, 0x0) dup3(r7, r4, 0x0) r8 = add_key$keyring(&(0x7f0000000540), &(0x7f0000000640)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffc) r9 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000980), 0x200000, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r5, 0x81f8943c, &(0x7f000001a000)={0x0, ""/256, 0x0, 0x0, 0x0, 0x0, ""/16, ""/16, ""/16, 0x0}) ioctl$BTRFS_IOC_SUBVOL_CREATE_V2(r6, 0x50009418, &(0x7f000001a200)={{r9}, r10, 0x2, @inherit={0x58, &(0x7f00000009c0)={0x1, 0x2, 0x8, 0x7, {0x14, 0x1000, 0x5, 0x7}, [0xffff, 0x0]}}, @subvolid=0x4}) keyctl$search(0xa, r3, 0x0, &(0x7f0000000500)={'syz', 0x0}, r8) writev(r4, &(0x7f0000000300)=[{&(0x7f00000000c0)='0', 0xb900}, {&(0x7f00000003c0)='7', 0x1}], 0x2) 16:34:57 executing program 5: r0 = request_key(0x0, 0x0, 0x0, 0xfffffffffffffffd) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) r1 = add_key$keyring(0x0, &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000740)=@filename='./file0\x00', &(0x7f0000000780)='./file0\x00', &(0x7f0000000840)='gadgetfs\x00', 0x0, &(0x7f0000000880)='keyring\x00') perf_event_open(&(0x7f00000007c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x12c00, 0x0, 0xe5e}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) writev(0xffffffffffffffff, 0x0, 0x0) r2 = add_key(&(0x7f0000000240)='big_key\x00', &(0x7f0000000280)={'syz', 0x3}, &(0x7f0000019a40)="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", 0x5bd, 0xfffffffffffffffd) keyctl$read(0xb, r2, &(0x7f0000000a40)=""/102400, 0x19000) keyctl$search(0xa, r2, &(0x7f00000008c0)='keyring\x00', &(0x7f0000000900)={'syz', 0x1}, 0xfffffffffffffffd) request_key(&(0x7f00000006c0)='dns_resolver\x00', &(0x7f0000000700)={'syz', 0x3}, &(0x7f0000000940)='\x00', 0xfffffffffffffffd) r3 = add_key(&(0x7f0000000380)='id_resolver\x00', &(0x7f0000000400)={'syz', 0x3}, &(0x7f0000000440)="e09e6dda135ac7c467011f", 0xb, r0) keyctl$search(0xa, r1, 0x0, &(0x7f0000000340)={'syz', 0x1}, r3) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000140)='cpuset\x00', 0x0, 0x0) add_key$keyring(&(0x7f0000000100), &(0x7f0000000180)={'syz', 0x0}, 0x0, 0x0, r0) r4 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r5 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) request_key(&(0x7f0000000580)='logon\x00', &(0x7f00000005c0)={'syz', 0x0}, &(0x7f0000000600)='\x1f-)\x00', 0xfffffffffffffff9) add_key$fscrypt_provisioning(&(0x7f0000000480), &(0x7f00000004c0)={'syz', 0x0}, &(0x7f0000000640)=ANY=[], 0x48, r0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = openat$cgroup_int(r4, &(0x7f00000001c0)='cpuset.sched_load_balance\x00', 0x2, 0x0) dup3(r7, r4, 0x0) add_key$keyring(&(0x7f0000000540), &(0x7f0000000640)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffc) r8 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000980), 0x200000, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r5, 0x81f8943c, &(0x7f000001a000)={0x0, ""/256, 0x0, 0x0, 0x0, 0x0, ""/16, ""/16, ""/16, 0x0}) ioctl$BTRFS_IOC_SUBVOL_CREATE_V2(r6, 0x50009418, &(0x7f000001a200)={{r8}, r9, 0x2, @inherit={0x58, &(0x7f00000009c0)={0x1, 0x2, 0x8, 0x7, {0x14, 0x1000, 0x5, 0x7, 0x4}, [0xffff, 0x3]}}, @subvolid=0x4}) writev(r4, &(0x7f0000000300)=[{&(0x7f00000000c0)='0', 0x1}, {&(0x7f00000003c0)='7', 0x1}], 0x2) [ 2013.557289] hfs: invalid gid -1 [ 2013.560605] hfs: unable to parse mount options 16:34:57 executing program 4: r0 = request_key(0x0, 0x0, 0x0, 0xfffffffffffffffd) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) r1 = add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000780)='./file0\x00', &(0x7f0000000840)='gadgetfs\x00', 0x0, &(0x7f0000000880)='keyring\x00') perf_event_open(&(0x7f00000007c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x12c00, 0x0, 0xe5e}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) writev(0xffffffffffffffff, 0x0, 0x0) keyctl$read(0xb, 0x0, &(0x7f0000000a40)=""/102400, 0x19000) keyctl$search(0xa, 0x0, 0x0, 0x0, 0xfffffffffffffffd) request_key(&(0x7f00000006c0)='dns_resolver\x00', &(0x7f0000000700)={'syz', 0x3}, &(0x7f0000000940)='\x00', 0xfffffffffffffffd) r2 = add_key(&(0x7f0000000380)='id_resolver\x00', 0x0, &(0x7f0000000440), 0x0, r0) keyctl$search(0xa, r1, 0x0, &(0x7f0000000340)={'syz', 0x1}, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000100), &(0x7f0000000180)={'syz', 0x0}, 0x0, 0x0, r0) r3 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r4 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) open(&(0x7f00000002c0)='./file0\x00', 0x98d00, 0x8) request_key(&(0x7f0000000580)='logon\x00', &(0x7f00000005c0)={'syz', 0x0}, &(0x7f0000000600)='\x1f-)\x00', 0xfffffffffffffff9) write$rfkill(r4, &(0x7f0000000040)={0x0, 0x0, 0x3}, 0x8) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = openat$cgroup_int(r3, &(0x7f00000001c0)='cpuset.sched_load_balance\x00', 0x2, 0x0) dup3(r6, r3, 0x0) r7 = add_key$keyring(&(0x7f0000000540), &(0x7f0000000640)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffc) r8 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000980), 0x200000, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r4, 0x81f8943c, &(0x7f000001a000)={0x0, ""/256, 0x0, 0x0, 0x0, 0x0, ""/16, ""/16, ""/16, 0x0}) ioctl$BTRFS_IOC_SUBVOL_CREATE_V2(r5, 0x50009418, &(0x7f000001a200)={{r8}, r9, 0x2, @inherit={0x58, &(0x7f00000009c0)={0x1, 0x2, 0x8, 0x7, {0x14, 0x1000, 0x5, 0x7, 0x4}, [0xffff, 0x3]}}, @subvolid=0x4}) ioctl$BTRFS_IOC_BALANCE(r5, 0x5000940c, 0x0) keyctl$search(0xa, r2, &(0x7f0000000200)='keyring\x00', &(0x7f0000000500)={'syz', 0x0}, r7) writev(r3, &(0x7f0000000300)=[{&(0x7f00000000c0)='0', 0x1}, {&(0x7f00000003c0)='7', 0x1}], 0x2) 16:34:57 executing program 1: syz_mount_image$hfs(&(0x7f0000000240), &(0x7f0000000380)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x3, &(0x7f0000000780)=ANY=[@ANYBLOB='quiet,gid=', @ANYRESHEX, @ANYBLOB="2c2a7270653d7614866b2c75693df589299908000000450000005d38ff0c0071446a0c48dba349ba347528523876dc8d7918ecea1024ba9669ff19a9ab5e27062b1dae8d8c0eb880008164ed9d8093fdc35f282dee56df9531b6e0c94b43c314af69146a70075499da5e7f927d3c672787e3d33a6071ff2c1483a1a7cfb34131bfee72f86068d0966d", @ANYRESHEX, @ANYBLOB=',codepage=ascii,rootcontext=sysadm_u,\x00'], 0x1, 0x235, &(0x7f0000000000)="$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") [ 2013.637510] new mount options do not match the existing superblock, will be ignored 16:34:57 executing program 2: r0 = request_key(0x0, 0x0, 0x0, 0xfffffffffffffffd) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) perf_event_open(&(0x7f00000007c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0xe5e}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) keyctl$read(0xb, 0x0, &(0x7f0000000a40)=""/102400, 0x19000) keyctl$search(0xa, 0x0, &(0x7f00000008c0)='keyring\x00', &(0x7f0000000900)={'syz', 0x1}, 0xfffffffffffffffd) request_key(&(0x7f00000006c0)='dns_resolver\x00', &(0x7f0000000700)={'syz', 0x3}, &(0x7f0000000940)='\x00', 0xfffffffffffffffd) add_key(0x0, &(0x7f0000000400)={'syz', 0x3}, &(0x7f0000000440), 0x0, r0) keyctl$search(0xa, 0x0, 0x0, &(0x7f0000000340)={'syz', 0x1}, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000140)='cpuset\x00', 0x0, 0x0) add_key$keyring(&(0x7f0000000100), 0x0, 0x0, 0x0, r0) r1 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) request_key(0x0, &(0x7f00000005c0)={'syz', 0x0}, 0x0, 0xfffffffffffffff9) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = openat$cgroup_int(r1, &(0x7f00000001c0)='cpuset.sched_load_balance\x00', 0x2, 0x0) dup3(r3, r1, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x200000, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f000001a000)={0x0, ""/256, 0x0, 0x0, 0x0, 0x0, ""/16, ""/16, ""/16, 0x0}) ioctl$BTRFS_IOC_SUBVOL_CREATE_V2(r2, 0x50009418, &(0x7f000001a200)={{}, r4, 0x2, @inherit={0x58, &(0x7f00000009c0)={0x1, 0x2, 0x8, 0x0, {0x0, 0x0, 0x0, 0x0, 0x4}, [0x0, 0x0]}}, @subvolid=0x4}) ioctl$BTRFS_IOC_BALANCE(0xffffffffffffffff, 0x5000940c, 0x0) keyctl$search(0xa, 0x0, &(0x7f0000000200)='keyring\x00', &(0x7f0000000500)={'syz', 0x0}, 0x0) writev(r1, &(0x7f0000000300)=[{&(0x7f00000000c0)='0', 0x1}, {0x0}], 0x2) [ 2013.705032] new mount options do not match the existing superblock, will be ignored [ 2013.833728] hfs: invalid gid -1 [ 2013.855836] hfs: unable to parse mount options [ 2013.865011] hfs: unable to parse mount options [ 2013.890697] new mount options do not match the existing superblock, will be ignored 16:34:58 executing program 4: r0 = request_key(0x0, 0x0, 0x0, 0xfffffffffffffffd) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) r1 = add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000780)='./file0\x00', &(0x7f0000000840)='gadgetfs\x00', 0x0, &(0x7f0000000880)='keyring\x00') perf_event_open(&(0x7f00000007c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x12c00, 0x0, 0xe5e}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) writev(0xffffffffffffffff, 0x0, 0x0) keyctl$read(0xb, 0x0, &(0x7f0000000a40)=""/102400, 0x19000) keyctl$search(0xa, 0x0, 0x0, 0x0, 0xfffffffffffffffd) request_key(&(0x7f00000006c0)='dns_resolver\x00', &(0x7f0000000700)={'syz', 0x3}, &(0x7f0000000940)='\x00', 0xfffffffffffffffd) r2 = add_key(&(0x7f0000000380)='id_resolver\x00', 0x0, &(0x7f0000000440), 0x0, r0) keyctl$search(0xa, r1, 0x0, &(0x7f0000000340)={'syz', 0x1}, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000140)='cpuset\x00', 0x0, 0x0) add_key$keyring(0x0, &(0x7f0000000180)={'syz', 0x0}, 0x0, 0x0, r0) r3 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r4 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) open(&(0x7f00000002c0)='./file0\x00', 0x98d00, 0x8) request_key(&(0x7f0000000580)='logon\x00', &(0x7f00000005c0)={'syz', 0x0}, &(0x7f0000000600)='\x1f-)\x00', 0xfffffffffffffff9) write$rfkill(r4, &(0x7f0000000040)={0x0, 0x0, 0x3}, 0x8) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = openat$cgroup_int(r3, &(0x7f00000001c0)='cpuset.sched_load_balance\x00', 0x2, 0x0) dup3(r6, r3, 0x0) r7 = add_key$keyring(&(0x7f0000000540), &(0x7f0000000640)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffc) r8 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000980), 0x200000, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r4, 0x81f8943c, &(0x7f000001a000)={0x0, ""/256, 0x0, 0x0, 0x0, 0x0, ""/16, ""/16, ""/16, 0x0}) ioctl$BTRFS_IOC_SUBVOL_CREATE_V2(r5, 0x50009418, &(0x7f000001a200)={{r8}, r9, 0x2, @inherit={0x58, &(0x7f00000009c0)={0x1, 0x2, 0x8, 0x7, {0x14, 0x1000, 0x5, 0x7, 0x4}, [0xffff, 0x3]}}, @subvolid=0x4}) ioctl$BTRFS_IOC_BALANCE(r5, 0x5000940c, 0x0) keyctl$search(0xa, r2, &(0x7f0000000200)='keyring\x00', &(0x7f0000000500)={'syz', 0x0}, r7) writev(r3, &(0x7f0000000300)=[{&(0x7f00000000c0)='0', 0x1}, {&(0x7f00000003c0)='7', 0x1}], 0x2) 16:34:58 executing program 0: r0 = request_key(0x0, 0x0, 0x0, 0xfffffffffffffffd) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) r1 = add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000740)=@filename='./file0\x00', &(0x7f0000000780)='./file0\x00', &(0x7f0000000840)='gadgetfs\x00', 0x0, &(0x7f0000000880)='keyring\x00') perf_event_open(&(0x7f00000007c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x12c00, 0x0, 0xe5e}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) writev(0xffffffffffffffff, 0x0, 0x0) r2 = add_key(0x0, &(0x7f0000000280)={'syz', 0x3}, &(0x7f0000019a40)="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", 0x5bd, 0xfffffffffffffffd) keyctl$read(0xb, r2, &(0x7f0000000a40)=""/102400, 0x19000) keyctl$search(0xa, r2, &(0x7f00000008c0)='keyring\x00', &(0x7f0000000900)={'syz', 0x1}, 0xfffffffffffffffd) request_key(&(0x7f00000006c0)='dns_resolver\x00', &(0x7f0000000700)={'syz', 0x3}, 0x0, 0xfffffffffffffffd) r3 = add_key(&(0x7f0000000380)='id_resolver\x00', &(0x7f0000000400)={'syz', 0x3}, &(0x7f0000000440)="e09e6dda135ac7c467011f", 0xb, r0) keyctl$search(0xa, r1, 0x0, &(0x7f0000000340)={'syz', 0x1}, r3) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000140)='cpuset\x00', 0x0, 0x0) add_key$keyring(&(0x7f0000000100), &(0x7f0000000180)={'syz', 0x0}, 0x0, 0x0, r0) r4 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r5 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) open(&(0x7f00000002c0)='./file0\x00', 0x98d00, 0x8) request_key(&(0x7f0000000580)='logon\x00', 0x0, &(0x7f0000000600)='\x1f-)\x00', 0xfffffffffffffff9) add_key$fscrypt_provisioning(&(0x7f0000000480), &(0x7f00000004c0)={'syz', 0x0}, &(0x7f0000000640)=ANY=[], 0x48, r0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = openat$cgroup_int(r4, &(0x7f00000001c0)='cpuset.sched_load_balance\x00', 0x2, 0x0) dup3(r7, r4, 0x0) r8 = add_key$keyring(&(0x7f0000000540), &(0x7f0000000640)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffc) r9 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000980), 0x200000, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r5, 0x81f8943c, &(0x7f000001a000)={0x0, ""/256, 0x0, 0x0, 0x0, 0x0, ""/16, ""/16, ""/16, 0x0}) ioctl$BTRFS_IOC_SUBVOL_CREATE_V2(r6, 0x50009418, &(0x7f000001a200)={{r9}, r10, 0x2, @inherit={0x58, &(0x7f00000009c0)={0x1, 0x2, 0x8, 0x7, {0x14, 0x1000, 0x5, 0x7}, [0xffff, 0x0]}}, @subvolid=0x4}) keyctl$search(0xa, r3, 0x0, &(0x7f0000000500)={'syz', 0x0}, r8) writev(r4, &(0x7f0000000300)=[{&(0x7f00000000c0)='0', 0xba00}, {&(0x7f00000003c0)='7', 0x1}], 0x2) [ 2013.903822] new mount options do not match the existing superblock, will be ignored 16:34:58 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = gettid() process_vm_writev(r0, &(0x7f0000000000)=[{&(0x7f0000000080)=""/259, 0x103}], 0x1, &(0x7f0000000040)=[{&(0x7f0000217f28)=""/231, 0xe7}], 0x1, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x2, 0xa4, 0x8, 0x2, 0x0, 0x5, 0x11000, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x2, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x5, 0x1, @perf_config_ext={0x72, 0x1}, 0x0, 0xffffffffffffffff, 0x5b5f6838, 0x2, 0x0, 0x3, 0x89, 0x0, 0x200, 0x0, 0x1}, r0, 0x2, 0xffffffffffffffff, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000003980)={0x0, 0x0}) r2 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c47, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x1, 0x0, 0x0, 0x0, 0x8000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000240)={0x0, 0x0}) perf_event_open(&(0x7f00000001c0)={0x0, 0x80, 0x0, 0x4, 0x0, 0x9, 0x0, 0x2, 0x5c10, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x2, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x3, 0x1, @perf_bp={&(0x7f0000000040)}, 0x8c104, 0xff, 0x8, 0x9, 0x0, 0x1, 0xa5d0}, r3, 0x80, r2, 0x0) perf_event_open(&(0x7f0000003900)={0x4, 0x80, 0x5, 0x8, 0x9, 0x32, 0x0, 0x7fff, 0x8040, 0x2, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x3, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x10000, 0x1, @perf_config_ext={0x8, 0x3}, 0x10, 0x9, 0x4, 0x0, 0x5, 0x2, 0x9, 0x0, 0x2, 0x0, 0x1000}, r1, 0x5, r2, 0xa) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000140)={0x0, 0x0}, &(0x7f0000cab000)=0x6e) r5 = syz_open_dev$evdev(&(0x7f00000000c0), 0x0, 0x862b01) write$char_usb(r5, &(0x7f0000000040)="e2", 0x1770) preadv(r5, &(0x7f0000000300)=[{&(0x7f0000000480)=""/211, 0xd3}, {&(0x7f0000000580)=""/4096, 0x1000}, {&(0x7f0000001580)=""/151, 0x97}, {&(0x7f0000001640)=""/4096, 0x1000}, {&(0x7f0000002640)=""/224, 0xe0}, {&(0x7f0000002740)=""/182, 0xb6}, {&(0x7f0000002800)=""/4096, 0x1000}, {&(0x7f0000003800)=""/216, 0xd8}], 0x8, 0x7ff, 0x8ef2) syz_mount_image$hfs(&(0x7f0000000240), &(0x7f0000000380)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x3, &(0x7f0000000400)={[{}, {@part={'part', 0x3d, 0x10001}}, {@type={'type', 0x3d, "7614866b"}}, {@uid={'uid', 0x3d, r4}}, {@codepage={'codepage', 0x3d, 'ascii'}}], [{@rootcontext={'rootcontext', 0x3d, 'sysadm_u'}}]}, 0x1, 0x235, &(0x7f0000000000)="$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") perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) gettid() (async) process_vm_writev(r0, &(0x7f0000000000)=[{&(0x7f0000000080)=""/259, 0x103}], 0x1, &(0x7f0000000040)=[{&(0x7f0000217f28)=""/231, 0xe7}], 0x1, 0x0) (async) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x2, 0xa4, 0x8, 0x2, 0x0, 0x5, 0x11000, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x2, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x5, 0x1, @perf_config_ext={0x72, 0x1}, 0x0, 0xffffffffffffffff, 0x5b5f6838, 0x2, 0x0, 0x3, 0x89, 0x0, 0x200, 0x0, 0x1}, r0, 0x2, 0xffffffffffffffff, 0x0) (async) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000003980)) (async) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c47, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x1, 0x0, 0x0, 0x0, 0x8000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000240)) (async) perf_event_open(&(0x7f00000001c0)={0x0, 0x80, 0x0, 0x4, 0x0, 0x9, 0x0, 0x2, 0x5c10, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x2, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x3, 0x1, @perf_bp={&(0x7f0000000040)}, 0x8c104, 0xff, 0x8, 0x9, 0x0, 0x1, 0xa5d0}, r3, 0x80, r2, 0x0) (async) perf_event_open(&(0x7f0000003900)={0x4, 0x80, 0x5, 0x8, 0x9, 0x32, 0x0, 0x7fff, 0x8040, 0x2, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x3, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x10000, 0x1, @perf_config_ext={0x8, 0x3}, 0x10, 0x9, 0x4, 0x0, 0x5, 0x2, 0x9, 0x0, 0x2, 0x0, 0x1000}, r1, 0x5, r2, 0xa) (async) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000140), &(0x7f0000cab000)=0x6e) (async) syz_open_dev$evdev(&(0x7f00000000c0), 0x0, 0x862b01) (async) write$char_usb(r5, &(0x7f0000000040)="e2", 0x1770) (async) preadv(r5, &(0x7f0000000300)=[{&(0x7f0000000480)=""/211, 0xd3}, {&(0x7f0000000580)=""/4096, 0x1000}, {&(0x7f0000001580)=""/151, 0x97}, {&(0x7f0000001640)=""/4096, 0x1000}, {&(0x7f0000002640)=""/224, 0xe0}, {&(0x7f0000002740)=""/182, 0xb6}, {&(0x7f0000002800)=""/4096, 0x1000}, {&(0x7f0000003800)=""/216, 0xd8}], 0x8, 0x7ff, 0x8ef2) (async) syz_mount_image$hfs(&(0x7f0000000240), &(0x7f0000000380)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x3, &(0x7f0000000400)={[{}, {@part={'part', 0x3d, 0x10001}}, {@type={'type', 0x3d, "7614866b"}}, {@uid={'uid', 0x3d, r4}}, {@codepage={'codepage', 0x3d, 'ascii'}}], [{@rootcontext={'rootcontext', 0x3d, 'sysadm_u'}}]}, 0x1, 0x235, &(0x7f0000000000)="$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") (async) 16:34:58 executing program 1: syz_mount_image$hfs(&(0x7f0000000240), &(0x7f0000000380)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x3, &(0x7f0000000780)=ANY=[@ANYBLOB='quiet,gid=', @ANYRESHEX, @ANYBLOB="2c2a7270653d7614866b2c75693df589299908000000450000005d38ff0c0071446a0c48dba349ba347528523876dc8d7918ecea1024ba9669ff19a9ab5e27062b1dae8d8c0eb880008164ed9d8093fdc35f282dee56df9531b6e0c94b43c314af69146a70075499da5e7f927d3c672787e3d33a6071ff2c1483a1a7cfb34131bfee72f86068d0966d", @ANYRESHEX, @ANYBLOB=',codepage=ascii,rootcontext=sysadm_u,\x00'], 0x1, 0x235, &(0x7f0000000000)="$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") 16:34:58 executing program 5: r0 = request_key(0x0, 0x0, 0x0, 0xfffffffffffffffd) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) r1 = add_key$keyring(0x0, &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000740)=@filename='./file0\x00', &(0x7f0000000780)='./file0\x00', &(0x7f0000000840)='gadgetfs\x00', 0x10, 0x0) perf_event_open(&(0x7f00000007c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x12c00, 0x0, 0xe5e}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) writev(0xffffffffffffffff, 0x0, 0x0) r2 = add_key(&(0x7f0000000240)='big_key\x00', &(0x7f0000000280)={'syz', 0x3}, &(0x7f0000019a40)="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", 0x5bd, 0xfffffffffffffffd) keyctl$read(0xb, r2, &(0x7f0000000a40)=""/102400, 0x19000) keyctl$search(0xa, r2, &(0x7f00000008c0)='keyring\x00', &(0x7f0000000900)={'syz', 0x1}, 0xfffffffffffffffd) request_key(&(0x7f00000006c0)='dns_resolver\x00', &(0x7f0000000700)={'syz', 0x3}, &(0x7f0000000940)='\x00', 0xfffffffffffffffd) r3 = add_key(&(0x7f0000000380)='id_resolver\x00', &(0x7f0000000400)={'syz', 0x3}, &(0x7f0000000440)="e09e6dda135ac7c467011f", 0xb, r0) keyctl$search(0xa, r1, 0x0, &(0x7f0000000340)={'syz', 0x1}, r3) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000140)='cpuset\x00', 0x0, 0x0) add_key$keyring(&(0x7f0000000100), &(0x7f0000000180)={'syz', 0x0}, 0x0, 0x0, r0) r4 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r5 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) request_key(&(0x7f0000000580)='logon\x00', &(0x7f00000005c0)={'syz', 0x0}, &(0x7f0000000600)='\x1f-)\x00', 0xfffffffffffffff9) add_key$fscrypt_provisioning(&(0x7f0000000480), &(0x7f00000004c0)={'syz', 0x0}, &(0x7f0000000640)=ANY=[], 0x48, r0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = openat$cgroup_int(r4, &(0x7f00000001c0)='cpuset.sched_load_balance\x00', 0x2, 0x0) dup3(r7, r4, 0x0) add_key$keyring(&(0x7f0000000540), &(0x7f0000000640)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffc) r8 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000980), 0x200000, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r5, 0x81f8943c, &(0x7f000001a000)={0x0, ""/256, 0x0, 0x0, 0x0, 0x0, ""/16, ""/16, ""/16, 0x0}) ioctl$BTRFS_IOC_SUBVOL_CREATE_V2(r6, 0x50009418, &(0x7f000001a200)={{r8}, r9, 0x2, @inherit={0x58, &(0x7f00000009c0)={0x1, 0x2, 0x8, 0x7, {0x14, 0x1000, 0x5, 0x7, 0x4}, [0xffff, 0x3]}}, @subvolid=0x4}) writev(r4, &(0x7f0000000300)=[{&(0x7f00000000c0)='0', 0x1}, {&(0x7f00000003c0)='7', 0x1}], 0x2) 16:34:58 executing program 2: r0 = request_key(0x0, 0x0, 0x0, 0xfffffffffffffffd) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) perf_event_open(&(0x7f00000007c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0xe5e}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) keyctl$read(0xb, 0x0, &(0x7f0000000a40)=""/102400, 0x19000) keyctl$search(0xa, 0x0, &(0x7f00000008c0)='keyring\x00', &(0x7f0000000900)={'syz', 0x1}, 0xfffffffffffffffd) request_key(&(0x7f00000006c0)='dns_resolver\x00', &(0x7f0000000700)={'syz', 0x3}, &(0x7f0000000940)='\x00', 0xfffffffffffffffd) add_key(0x0, &(0x7f0000000400)={'syz', 0x3}, &(0x7f0000000440), 0x0, r0) keyctl$search(0xa, 0x0, 0x0, &(0x7f0000000340)={'syz', 0x1}, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000140)='cpuset\x00', 0x0, 0x0) add_key$keyring(&(0x7f0000000100), 0x0, 0x0, 0x0, r0) r1 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) request_key(0x0, &(0x7f00000005c0)={'syz', 0x0}, 0x0, 0xfffffffffffffff9) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = openat$cgroup_int(r1, &(0x7f00000001c0)='cpuset.sched_load_balance\x00', 0x2, 0x0) dup3(r3, r1, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x200000, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f000001a000)={0x0, ""/256, 0x0, 0x0, 0x0, 0x0, ""/16, ""/16, ""/16, 0x0}) ioctl$BTRFS_IOC_SUBVOL_CREATE_V2(r2, 0x50009418, &(0x7f000001a200)={{}, r4, 0x2, @inherit={0x58, &(0x7f00000009c0)={0x1, 0x2, 0x8, 0x0, {0x0, 0x0, 0x0, 0x0, 0x4}, [0x0, 0x0]}}, @subvolid=0x4}) ioctl$BTRFS_IOC_BALANCE(0xffffffffffffffff, 0x5000940c, 0x0) keyctl$search(0xa, 0x0, &(0x7f0000000200)='keyring\x00', &(0x7f0000000500)={'syz', 0x0}, 0x0) writev(r1, &(0x7f0000000300)=[{&(0x7f00000000c0)='0', 0x1}, {0x0}], 0x2) [ 2014.025728] new mount options do not match the existing superblock, will be ignored 16:34:58 executing program 0: r0 = request_key(0x0, 0x0, 0x0, 0xfffffffffffffffd) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) r1 = add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000740)=@filename='./file0\x00', &(0x7f0000000780)='./file0\x00', &(0x7f0000000840)='gadgetfs\x00', 0x0, &(0x7f0000000880)='keyring\x00') perf_event_open(&(0x7f00000007c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x12c00, 0x0, 0xe5e}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) writev(0xffffffffffffffff, 0x0, 0x0) r2 = add_key(0x0, &(0x7f0000000280)={'syz', 0x3}, &(0x7f0000019a40)="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", 0x5bd, 0xfffffffffffffffd) keyctl$read(0xb, r2, &(0x7f0000000a40)=""/102400, 0x19000) keyctl$search(0xa, r2, &(0x7f00000008c0)='keyring\x00', &(0x7f0000000900)={'syz', 0x1}, 0xfffffffffffffffd) request_key(&(0x7f00000006c0)='dns_resolver\x00', &(0x7f0000000700)={'syz', 0x3}, 0x0, 0xfffffffffffffffd) r3 = add_key(&(0x7f0000000380)='id_resolver\x00', &(0x7f0000000400)={'syz', 0x3}, &(0x7f0000000440)="e09e6dda135ac7c467011f", 0xb, r0) keyctl$search(0xa, r1, 0x0, &(0x7f0000000340)={'syz', 0x1}, r3) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000140)='cpuset\x00', 0x0, 0x0) add_key$keyring(&(0x7f0000000100), &(0x7f0000000180)={'syz', 0x0}, 0x0, 0x0, r0) r4 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r5 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) open(&(0x7f00000002c0)='./file0\x00', 0x98d00, 0x8) request_key(&(0x7f0000000580)='logon\x00', 0x0, &(0x7f0000000600)='\x1f-)\x00', 0xfffffffffffffff9) add_key$fscrypt_provisioning(&(0x7f0000000480), &(0x7f00000004c0)={'syz', 0x0}, &(0x7f0000000640)=ANY=[], 0x48, r0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = openat$cgroup_int(r4, &(0x7f00000001c0)='cpuset.sched_load_balance\x00', 0x2, 0x0) dup3(r7, r4, 0x0) r8 = add_key$keyring(&(0x7f0000000540), &(0x7f0000000640)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffc) r9 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000980), 0x200000, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r5, 0x81f8943c, &(0x7f000001a000)={0x0, ""/256, 0x0, 0x0, 0x0, 0x0, ""/16, ""/16, ""/16, 0x0}) ioctl$BTRFS_IOC_SUBVOL_CREATE_V2(r6, 0x50009418, &(0x7f000001a200)={{r9}, r10, 0x2, @inherit={0x58, &(0x7f00000009c0)={0x1, 0x2, 0x8, 0x7, {0x14, 0x1000, 0x5, 0x7}, [0xffff, 0x0]}}, @subvolid=0x4}) keyctl$search(0xa, r3, 0x0, &(0x7f0000000500)={'syz', 0x0}, r8) writev(r4, &(0x7f0000000300)=[{&(0x7f00000000c0)='0', 0xbb00}, {&(0x7f00000003c0)='7', 0x1}], 0x2) [ 2014.123651] hfs: invalid gid -1 [ 2014.140113] new mount options do not match the existing superblock, will be ignored [ 2014.196222] hfs: unable to parse mount options 16:34:58 executing program 1: syz_mount_image$hfs(&(0x7f0000000240), &(0x7f0000000380)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x3, &(0x7f0000000780)=ANY=[@ANYBLOB='quiet,gid=', @ANYRESHEX, @ANYBLOB="2c2a7270653d7614866b2c75693df589299908000000450000005d38ff0c0071446a0c48dba349ba347528523876dc8d7918ecea1024ba9669ff19a9ab5e27062b1dae8d8c0eb880008164ed9d8093fdc35f282dee56df9531b6e0c94b43c314af69146a70075499da5e7f927d3c672787e3d33a6071ff2c1483a1a7cfb34131bfee72f86068d0966d", @ANYRESHEX, @ANYBLOB=',codepage=ascii,rootcontext=sysadm_u,\x00'], 0x1, 0x235, &(0x7f0000000000)="$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") [ 2014.313461] new mount options do not match the existing superblock, will be ignored [ 2014.353120] new mount options do not match the existing superblock, will be ignored 16:34:58 executing program 2: r0 = request_key(0x0, 0x0, 0x0, 0xfffffffffffffffd) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) perf_event_open(&(0x7f00000007c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0xe5e}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) keyctl$read(0xb, 0x0, &(0x7f0000000a40)=""/102400, 0x19000) keyctl$search(0xa, 0x0, &(0x7f00000008c0)='keyring\x00', &(0x7f0000000900)={'syz', 0x1}, 0xfffffffffffffffd) request_key(&(0x7f00000006c0)='dns_resolver\x00', &(0x7f0000000700)={'syz', 0x3}, &(0x7f0000000940)='\x00', 0xfffffffffffffffd) add_key(0x0, &(0x7f0000000400)={'syz', 0x3}, &(0x7f0000000440), 0x0, r0) keyctl$search(0xa, 0x0, 0x0, &(0x7f0000000340)={'syz', 0x1}, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000140)='cpuset\x00', 0x0, 0x0) add_key$keyring(&(0x7f0000000100), 0x0, 0x0, 0x0, r0) r1 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) request_key(0x0, &(0x7f00000005c0)={'syz', 0x0}, 0x0, 0xfffffffffffffff9) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = openat$cgroup_int(r1, &(0x7f00000001c0)='cpuset.sched_load_balance\x00', 0x2, 0x0) dup3(r3, r1, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x200000, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f000001a000)={0x0, ""/256, 0x0, 0x0, 0x0, 0x0, ""/16, ""/16, ""/16, 0x0}) ioctl$BTRFS_IOC_SUBVOL_CREATE_V2(r2, 0x50009418, &(0x7f000001a200)={{}, r4, 0x2, @inherit={0x58, &(0x7f00000009c0)={0x1, 0x2, 0x8, 0x0, {0x0, 0x0, 0x0, 0x0, 0x4}, [0x0, 0x0]}}, @subvolid=0x4}) ioctl$BTRFS_IOC_BALANCE(0xffffffffffffffff, 0x5000940c, 0x0) keyctl$search(0xa, 0x0, &(0x7f0000000200)='keyring\x00', &(0x7f0000000500)={'syz', 0x0}, 0x0) writev(r1, &(0x7f0000000300)=[{&(0x7f00000000c0)='0', 0x1}, {0x0}], 0x2) 16:34:58 executing program 4: r0 = request_key(0x0, 0x0, 0x0, 0xfffffffffffffffd) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) r1 = add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000780)='./file0\x00', &(0x7f0000000840)='gadgetfs\x00', 0x0, &(0x7f0000000880)='keyring\x00') perf_event_open(&(0x7f00000007c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x12c00, 0x0, 0xe5e}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) writev(0xffffffffffffffff, 0x0, 0x0) keyctl$read(0xb, 0x0, &(0x7f0000000a40)=""/102400, 0x19000) keyctl$search(0xa, 0x0, 0x0, 0x0, 0xfffffffffffffffd) request_key(&(0x7f00000006c0)='dns_resolver\x00', &(0x7f0000000700)={'syz', 0x3}, &(0x7f0000000940)='\x00', 0xfffffffffffffffd) r2 = add_key(&(0x7f0000000380)='id_resolver\x00', 0x0, &(0x7f0000000440), 0x0, r0) keyctl$search(0xa, r1, 0x0, &(0x7f0000000340)={'syz', 0x1}, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000140)='cpuset\x00', 0x0, 0x0) add_key$keyring(0x0, &(0x7f0000000180)={'syz', 0x0}, 0x0, 0x0, r0) r3 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r4 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) open(&(0x7f00000002c0)='./file0\x00', 0x98d00, 0x8) request_key(&(0x7f0000000580)='logon\x00', &(0x7f00000005c0)={'syz', 0x0}, &(0x7f0000000600)='\x1f-)\x00', 0xfffffffffffffff9) write$rfkill(r4, &(0x7f0000000040)={0x0, 0x0, 0x3}, 0x8) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = openat$cgroup_int(r3, &(0x7f00000001c0)='cpuset.sched_load_balance\x00', 0x2, 0x0) dup3(r6, r3, 0x0) r7 = add_key$keyring(&(0x7f0000000540), &(0x7f0000000640)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffc) r8 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000980), 0x200000, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r4, 0x81f8943c, &(0x7f000001a000)={0x0, ""/256, 0x0, 0x0, 0x0, 0x0, ""/16, ""/16, ""/16, 0x0}) ioctl$BTRFS_IOC_SUBVOL_CREATE_V2(r5, 0x50009418, &(0x7f000001a200)={{r8}, r9, 0x2, @inherit={0x58, &(0x7f00000009c0)={0x1, 0x2, 0x8, 0x7, {0x14, 0x1000, 0x5, 0x7, 0x4}, [0xffff, 0x3]}}, @subvolid=0x4}) ioctl$BTRFS_IOC_BALANCE(r5, 0x5000940c, 0x0) keyctl$search(0xa, r2, &(0x7f0000000200)='keyring\x00', &(0x7f0000000500)={'syz', 0x0}, r7) writev(r3, &(0x7f0000000300)=[{&(0x7f00000000c0)='0', 0x1}, {&(0x7f00000003c0)='7', 0x1}], 0x2) 16:34:58 executing program 5: r0 = request_key(0x0, 0x0, 0x0, 0xfffffffffffffffd) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) r1 = add_key$keyring(0x0, &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000740)=@filename='./file0\x00', &(0x7f0000000780)='./file0\x00', &(0x7f0000000840)='gadgetfs\x00', 0x10, 0x0) perf_event_open(&(0x7f00000007c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x12c00, 0x0, 0xe5e}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) writev(0xffffffffffffffff, 0x0, 0x0) r2 = add_key(&(0x7f0000000240)='big_key\x00', &(0x7f0000000280)={'syz', 0x3}, &(0x7f0000019a40)="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", 0x5bd, 0xfffffffffffffffd) keyctl$read(0xb, r2, &(0x7f0000000a40)=""/102400, 0x19000) keyctl$search(0xa, r2, &(0x7f00000008c0)='keyring\x00', &(0x7f0000000900)={'syz', 0x1}, 0xfffffffffffffffd) request_key(&(0x7f00000006c0)='dns_resolver\x00', &(0x7f0000000700)={'syz', 0x3}, &(0x7f0000000940)='\x00', 0xfffffffffffffffd) r3 = add_key(&(0x7f0000000380)='id_resolver\x00', &(0x7f0000000400)={'syz', 0x3}, &(0x7f0000000440)="e09e6dda135ac7c467011f", 0xb, r0) keyctl$search(0xa, r1, 0x0, &(0x7f0000000340)={'syz', 0x1}, r3) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000140)='cpuset\x00', 0x0, 0x0) add_key$keyring(&(0x7f0000000100), &(0x7f0000000180)={'syz', 0x0}, 0x0, 0x0, r0) r4 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r5 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) request_key(&(0x7f0000000580)='logon\x00', &(0x7f00000005c0)={'syz', 0x0}, &(0x7f0000000600)='\x1f-)\x00', 0xfffffffffffffff9) add_key$fscrypt_provisioning(&(0x7f0000000480), &(0x7f00000004c0)={'syz', 0x0}, &(0x7f0000000640)=ANY=[], 0x48, r0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = openat$cgroup_int(r4, &(0x7f00000001c0)='cpuset.sched_load_balance\x00', 0x2, 0x0) dup3(r7, r4, 0x0) add_key$keyring(&(0x7f0000000540), &(0x7f0000000640)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffc) r8 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000980), 0x200000, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r5, 0x81f8943c, &(0x7f000001a000)={0x0, ""/256, 0x0, 0x0, 0x0, 0x0, ""/16, ""/16, ""/16, 0x0}) ioctl$BTRFS_IOC_SUBVOL_CREATE_V2(r6, 0x50009418, &(0x7f000001a200)={{r8}, r9, 0x2, @inherit={0x58, &(0x7f00000009c0)={0x1, 0x2, 0x8, 0x7, {0x14, 0x1000, 0x5, 0x7, 0x4}, [0xffff, 0x3]}}, @subvolid=0x4}) writev(r4, &(0x7f0000000300)=[{&(0x7f00000000c0)='0', 0x1}, {&(0x7f00000003c0)='7', 0x1}], 0x2) [ 2014.474717] new mount options do not match the existing superblock, will be ignored [ 2014.495729] hfs: invalid gid -1 [ 2014.528469] hfs: unable to parse mount options [ 2014.569944] hfs: unable to parse mount options 16:34:58 executing program 0: r0 = request_key(0x0, 0x0, 0x0, 0xfffffffffffffffd) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) r1 = add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000740)=@filename='./file0\x00', &(0x7f0000000780)='./file0\x00', &(0x7f0000000840)='gadgetfs\x00', 0x0, &(0x7f0000000880)='keyring\x00') perf_event_open(&(0x7f00000007c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x12c00, 0x0, 0xe5e}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) writev(0xffffffffffffffff, 0x0, 0x0) r2 = add_key(0x0, &(0x7f0000000280)={'syz', 0x3}, &(0x7f0000019a40)="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", 0x5bd, 0xfffffffffffffffd) keyctl$read(0xb, r2, &(0x7f0000000a40)=""/102400, 0x19000) keyctl$search(0xa, r2, &(0x7f00000008c0)='keyring\x00', &(0x7f0000000900)={'syz', 0x1}, 0xfffffffffffffffd) request_key(&(0x7f00000006c0)='dns_resolver\x00', &(0x7f0000000700)={'syz', 0x3}, 0x0, 0xfffffffffffffffd) r3 = add_key(&(0x7f0000000380)='id_resolver\x00', &(0x7f0000000400)={'syz', 0x3}, &(0x7f0000000440)="e09e6dda135ac7c467011f", 0xb, r0) keyctl$search(0xa, r1, 0x0, &(0x7f0000000340)={'syz', 0x1}, r3) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000140)='cpuset\x00', 0x0, 0x0) add_key$keyring(&(0x7f0000000100), &(0x7f0000000180)={'syz', 0x0}, 0x0, 0x0, r0) r4 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r5 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) open(&(0x7f00000002c0)='./file0\x00', 0x98d00, 0x8) request_key(&(0x7f0000000580)='logon\x00', 0x0, &(0x7f0000000600)='\x1f-)\x00', 0xfffffffffffffff9) add_key$fscrypt_provisioning(&(0x7f0000000480), &(0x7f00000004c0)={'syz', 0x0}, &(0x7f0000000640)=ANY=[], 0x48, r0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = openat$cgroup_int(r4, &(0x7f00000001c0)='cpuset.sched_load_balance\x00', 0x2, 0x0) dup3(r7, r4, 0x0) r8 = add_key$keyring(&(0x7f0000000540), &(0x7f0000000640)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffc) r9 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000980), 0x200000, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r5, 0x81f8943c, &(0x7f000001a000)={0x0, ""/256, 0x0, 0x0, 0x0, 0x0, ""/16, ""/16, ""/16, 0x0}) ioctl$BTRFS_IOC_SUBVOL_CREATE_V2(r6, 0x50009418, &(0x7f000001a200)={{r9}, r10, 0x2, @inherit={0x58, &(0x7f00000009c0)={0x1, 0x2, 0x8, 0x7, {0x14, 0x1000, 0x5, 0x7}, [0xffff, 0x0]}}, @subvolid=0x4}) keyctl$search(0xa, r3, 0x0, &(0x7f0000000500)={'syz', 0x0}, r8) writev(r4, &(0x7f0000000300)=[{&(0x7f00000000c0)='0', 0xbc00}, {&(0x7f00000003c0)='7', 0x1}], 0x2) 16:34:58 executing program 1: syz_mount_image$hfs(&(0x7f0000000240), &(0x7f0000000380)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x3, &(0x7f0000000780)=ANY=[@ANYBLOB='quiet,gid=', @ANYRESHEX, @ANYBLOB="2c2a7270653d7614866b2c75693df589299908000000450000005d38ff0c0071446a0c48dba349ba347528523876dc8d7918ecea1024ba9669ff19a9ab5e27062b1dae8d8c0eb880008164ed9d8093fdc35f282dee56df9531b6e0c94b43c314af69146a70075499da5e7f927d3c672787e3d33a6071ff2c1483a1a7cfb34131bfee72f86068d0966d", @ANYRESHEX, @ANYBLOB=',codepage=ascii,rootcontext=sysadm_u,\x00'], 0x1, 0x235, &(0x7f0000000000)="$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") [ 2014.619112] new mount options do not match the existing superblock, will be ignored [ 2014.695972] new mount options do not match the existing superblock, will be ignored 16:34:58 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = gettid() process_vm_writev(r0, &(0x7f0000000000)=[{&(0x7f0000000080)=""/259, 0x103}], 0x1, &(0x7f0000000040)=[{&(0x7f0000217f28)=""/231, 0xe7}], 0x1, 0x0) (async, rerun: 64) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x2, 0xa4, 0x8, 0x2, 0x0, 0x5, 0x11000, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x2, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x5, 0x1, @perf_config_ext={0x72, 0x1}, 0x0, 0xffffffffffffffff, 0x5b5f6838, 0x2, 0x0, 0x3, 0x89, 0x0, 0x200, 0x0, 0x1}, r0, 0x2, 0xffffffffffffffff, 0x0) (rerun: 64) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000003980)={0x0, 0x0}) (async, rerun: 32) r2 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c47, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x1, 0x0, 0x0, 0x0, 0x8000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (rerun: 32) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000240)={0x0, 0x0}) perf_event_open(&(0x7f00000001c0)={0x0, 0x80, 0x0, 0x4, 0x0, 0x9, 0x0, 0x2, 0x5c10, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x2, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x3, 0x1, @perf_bp={&(0x7f0000000040)}, 0x8c104, 0xff, 0x8, 0x9, 0x0, 0x1, 0xa5d0}, r3, 0x80, r2, 0x0) (async) perf_event_open(&(0x7f0000003900)={0x4, 0x80, 0x5, 0x8, 0x9, 0x32, 0x0, 0x7fff, 0x8040, 0x2, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x3, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x10000, 0x1, @perf_config_ext={0x8, 0x3}, 0x10, 0x9, 0x4, 0x0, 0x5, 0x2, 0x9, 0x0, 0x2, 0x0, 0x1000}, r1, 0x5, r2, 0xa) (async) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000140)={0x0, 0x0}, &(0x7f0000cab000)=0x6e) r5 = syz_open_dev$evdev(&(0x7f00000000c0), 0x0, 0x862b01) write$char_usb(r5, &(0x7f0000000040)="e2", 0x1770) (async) preadv(r5, &(0x7f0000000300)=[{&(0x7f0000000480)=""/211, 0xd3}, {&(0x7f0000000580)=""/4096, 0x1000}, {&(0x7f0000001580)=""/151, 0x97}, {&(0x7f0000001640)=""/4096, 0x1000}, {&(0x7f0000002640)=""/224, 0xe0}, {&(0x7f0000002740)=""/182, 0xb6}, {&(0x7f0000002800)=""/4096, 0x1000}, {&(0x7f0000003800)=""/216, 0xd8}], 0x8, 0x7ff, 0x8ef2) syz_mount_image$hfs(&(0x7f0000000240), &(0x7f0000000380)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x3, &(0x7f0000000400)={[{}, {@part={'part', 0x3d, 0x10001}}, {@type={'type', 0x3d, "7614866b"}}, {@uid={'uid', 0x3d, r4}}, {@codepage={'codepage', 0x3d, 'ascii'}}], [{@rootcontext={'rootcontext', 0x3d, 'sysadm_u'}}]}, 0x1, 0x235, &(0x7f0000000000)="$eJzs3c9qE1EUx/HfvYkabanTPyK4rBZcSVs34kaQPIQrUZsIxVBBK6grcS0+gHtfwYdwJb6Arlz5ANmN3DM3zTRmMmk1ubT9fiBh2rln5pzOTO89gVIBOLPut398vv0rvJzUUEPSXclLaklNSVd0tfVqb393v9ftTDpQwyLCy6mIdH+N2dnrjgsNcRYRZeGrphbL38Ns5Hme/0ydBJKzp38ML12IT6ftb809s9l4lzqBxFxffb3WUuo8AABpxfnfx3l+Ma7fvZc24rR/qub/fuoEEivN/9Zl5S5c38u2a9jvWQsX9vtBl3icc51XcWcdWmC6uq7ScvEXn+72urd2nvc6Xu91LyoNW7P3TnHrDtRkuz6mN53g+LUvWA3nQg3bFfmv/t8z1nNf3Tf30GX6pM7B+q+Zu3CZ7EplI1eqyH+z+ohWZVaMqqhy2U5yLZ4hqqmyNb4j0eCOWtbhDwiyujwtamUkqqhuqyZqdWzUdk3U2mjU8G6ujpw199E9cOv6rS9ql9b/Pvy0NzTNkxnG2Mh4Z0ysp2kjsykS80cqA//mg57ojpZevnn77HGv133BBhtssHGwkfoXFOZheNFTZ4JEwrrLFf1fqV/ZtBYpvGUT1ul53cFLR9yq6A1W7P3SkTq4heoObtqe6/pN6cb0Z8xinqeEa+u7HvH5PwAAAAAAAAAAAAAAAAAAwEkzjz8nSF0jAAAAAAAAAAAAAAAAAAAAAAAnHf//Fzi7/gQAAP//6oSCGA==") 16:34:58 executing program 2: r0 = request_key(0x0, 0x0, 0x0, 0xfffffffffffffffd) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) perf_event_open(&(0x7f00000007c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0xe5e}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) keyctl$read(0xb, 0x0, &(0x7f0000000a40)=""/102400, 0x19000) keyctl$search(0xa, 0x0, &(0x7f00000008c0)='keyring\x00', &(0x7f0000000900)={'syz', 0x1}, 0xfffffffffffffffd) request_key(&(0x7f00000006c0)='dns_resolver\x00', &(0x7f0000000700)={'syz', 0x3}, &(0x7f0000000940)='\x00', 0xfffffffffffffffd) add_key(0x0, &(0x7f0000000400)={'syz', 0x3}, &(0x7f0000000440), 0x0, r0) keyctl$search(0xa, 0x0, 0x0, &(0x7f0000000340)={'syz', 0x1}, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000140)='cpuset\x00', 0x0, 0x0) add_key$keyring(&(0x7f0000000100), 0x0, 0x0, 0x0, r0) r1 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) request_key(0x0, &(0x7f00000005c0)={'syz', 0x0}, 0x0, 0xfffffffffffffff9) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = openat$cgroup_int(r1, &(0x7f00000001c0)='cpuset.sched_load_balance\x00', 0x2, 0x0) dup3(r3, r1, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x200000, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f000001a000)={0x0, ""/256, 0x0, 0x0, 0x0, 0x0, ""/16, ""/16, ""/16, 0x0}) ioctl$BTRFS_IOC_SUBVOL_CREATE_V2(r2, 0x50009418, &(0x7f000001a200)={{}, r4, 0x2, @inherit={0x58, &(0x7f00000009c0)={0x1, 0x2, 0x8, 0x0, {0x0, 0x0, 0x0, 0x0, 0x4}, [0x0, 0x0]}}, @subvolid=0x4}) ioctl$BTRFS_IOC_BALANCE(0xffffffffffffffff, 0x5000940c, 0x0) keyctl$search(0xa, 0x0, &(0x7f0000000200)='keyring\x00', &(0x7f0000000500)={'syz', 0x0}, 0x0) writev(r1, &(0x7f0000000300)=[{&(0x7f00000000c0)='0', 0x1}, {&(0x7f00000003c0)}], 0x2) [ 2014.771504] new mount options do not match the existing superblock, will be ignored [ 2014.786989] hfs: invalid gid -1 [ 2014.800026] hfs: unable to parse mount options 16:34:59 executing program 4: r0 = request_key(0x0, 0x0, 0x0, 0xfffffffffffffffd) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) r1 = add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000780)='./file0\x00', &(0x7f0000000840)='gadgetfs\x00', 0x0, &(0x7f0000000880)='keyring\x00') perf_event_open(&(0x7f00000007c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x12c00, 0x0, 0xe5e}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) writev(0xffffffffffffffff, 0x0, 0x0) keyctl$read(0xb, 0x0, &(0x7f0000000a40)=""/102400, 0x19000) keyctl$search(0xa, 0x0, 0x0, 0x0, 0xfffffffffffffffd) request_key(&(0x7f00000006c0)='dns_resolver\x00', &(0x7f0000000700)={'syz', 0x3}, &(0x7f0000000940)='\x00', 0xfffffffffffffffd) r2 = add_key(&(0x7f0000000380)='id_resolver\x00', 0x0, &(0x7f0000000440), 0x0, r0) keyctl$search(0xa, r1, 0x0, &(0x7f0000000340)={'syz', 0x1}, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000140)='cpuset\x00', 0x0, 0x0) add_key$keyring(0x0, &(0x7f0000000180)={'syz', 0x0}, 0x0, 0x0, r0) r3 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r4 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) open(&(0x7f00000002c0)='./file0\x00', 0x98d00, 0x8) request_key(&(0x7f0000000580)='logon\x00', &(0x7f00000005c0)={'syz', 0x0}, &(0x7f0000000600)='\x1f-)\x00', 0xfffffffffffffff9) write$rfkill(r4, &(0x7f0000000040)={0x0, 0x0, 0x3}, 0x8) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = openat$cgroup_int(r3, &(0x7f00000001c0)='cpuset.sched_load_balance\x00', 0x2, 0x0) dup3(r6, r3, 0x0) r7 = add_key$keyring(&(0x7f0000000540), &(0x7f0000000640)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffc) r8 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000980), 0x200000, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r4, 0x81f8943c, &(0x7f000001a000)={0x0, ""/256, 0x0, 0x0, 0x0, 0x0, ""/16, ""/16, ""/16, 0x0}) ioctl$BTRFS_IOC_SUBVOL_CREATE_V2(r5, 0x50009418, &(0x7f000001a200)={{r8}, r9, 0x2, @inherit={0x58, &(0x7f00000009c0)={0x1, 0x2, 0x8, 0x7, {0x14, 0x1000, 0x5, 0x7, 0x4}, [0xffff, 0x3]}}, @subvolid=0x4}) ioctl$BTRFS_IOC_BALANCE(r5, 0x5000940c, 0x0) keyctl$search(0xa, r2, &(0x7f0000000200)='keyring\x00', &(0x7f0000000500)={'syz', 0x0}, r7) writev(r3, &(0x7f0000000300)=[{&(0x7f00000000c0)='0', 0x1}, {&(0x7f00000003c0)='7', 0x1}], 0x2) 16:34:59 executing program 1: syz_mount_image$hfs(&(0x7f0000000240), &(0x7f0000000380)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x3, &(0x7f0000000780)=ANY=[@ANYBLOB='quiet,gid=', @ANYRESHEX, @ANYBLOB="2c2a7270653d7614866b2c75693df589299908000000450000005d38ff0c0071446a0c48dba349ba347528523876dc8d7918ecea1024ba9669ff19a9ab5e27062b1dae8d8c0eb880008164ed9d8093fdc35f282dee56df9531b6e0c94b43c314af69146a70075499da5e7f927d3c672787e3d33a6071ff2c1483a1a7cfb34131bfee72f86068d0966d", @ANYRESHEX, @ANYBLOB=',codepage=ascii,rootcontext=sysadm_u,\x00'], 0x1, 0x235, &(0x7f0000000000)="$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") 16:34:59 executing program 0: r0 = request_key(0x0, 0x0, 0x0, 0xfffffffffffffffd) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) r1 = add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000740)=@filename='./file0\x00', &(0x7f0000000780)='./file0\x00', &(0x7f0000000840)='gadgetfs\x00', 0x0, &(0x7f0000000880)='keyring\x00') perf_event_open(&(0x7f00000007c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x12c00, 0x0, 0xe5e}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) writev(0xffffffffffffffff, 0x0, 0x0) r2 = add_key(0x0, &(0x7f0000000280)={'syz', 0x3}, &(0x7f0000019a40)="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", 0x5bd, 0xfffffffffffffffd) keyctl$read(0xb, r2, &(0x7f0000000a40)=""/102400, 0x19000) keyctl$search(0xa, r2, &(0x7f00000008c0)='keyring\x00', &(0x7f0000000900)={'syz', 0x1}, 0xfffffffffffffffd) request_key(&(0x7f00000006c0)='dns_resolver\x00', &(0x7f0000000700)={'syz', 0x3}, 0x0, 0xfffffffffffffffd) r3 = add_key(&(0x7f0000000380)='id_resolver\x00', &(0x7f0000000400)={'syz', 0x3}, &(0x7f0000000440)="e09e6dda135ac7c467011f", 0xb, r0) keyctl$search(0xa, r1, 0x0, &(0x7f0000000340)={'syz', 0x1}, r3) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000140)='cpuset\x00', 0x0, 0x0) add_key$keyring(&(0x7f0000000100), &(0x7f0000000180)={'syz', 0x0}, 0x0, 0x0, r0) r4 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r5 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) open(&(0x7f00000002c0)='./file0\x00', 0x98d00, 0x8) request_key(&(0x7f0000000580)='logon\x00', 0x0, &(0x7f0000000600)='\x1f-)\x00', 0xfffffffffffffff9) add_key$fscrypt_provisioning(&(0x7f0000000480), &(0x7f00000004c0)={'syz', 0x0}, &(0x7f0000000640)=ANY=[], 0x48, r0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = openat$cgroup_int(r4, &(0x7f00000001c0)='cpuset.sched_load_balance\x00', 0x2, 0x0) dup3(r7, r4, 0x0) r8 = add_key$keyring(&(0x7f0000000540), &(0x7f0000000640)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffc) r9 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000980), 0x200000, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r5, 0x81f8943c, &(0x7f000001a000)={0x0, ""/256, 0x0, 0x0, 0x0, 0x0, ""/16, ""/16, ""/16, 0x0}) ioctl$BTRFS_IOC_SUBVOL_CREATE_V2(r6, 0x50009418, &(0x7f000001a200)={{r9}, r10, 0x2, @inherit={0x58, &(0x7f00000009c0)={0x1, 0x2, 0x8, 0x7, {0x14, 0x1000, 0x5, 0x7}, [0xffff, 0x0]}}, @subvolid=0x4}) keyctl$search(0xa, r3, 0x0, &(0x7f0000000500)={'syz', 0x0}, r8) writev(r4, &(0x7f0000000300)=[{&(0x7f00000000c0)='0', 0xbd00}, {&(0x7f00000003c0)='7', 0x1}], 0x2) [ 2014.846038] new mount options do not match the existing superblock, will be ignored 16:34:59 executing program 5: r0 = request_key(0x0, 0x0, 0x0, 0xfffffffffffffffd) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) r1 = add_key$keyring(0x0, &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000740)=@filename='./file0\x00', &(0x7f0000000780)='./file0\x00', &(0x7f0000000840)='gadgetfs\x00', 0x10, 0x0) perf_event_open(&(0x7f00000007c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x12c00, 0x0, 0xe5e}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) writev(0xffffffffffffffff, 0x0, 0x0) r2 = add_key(&(0x7f0000000240)='big_key\x00', &(0x7f0000000280)={'syz', 0x3}, &(0x7f0000019a40)="4195738ac28ccd83aa93c4ecacdaca3d34104be4cc5531c4091facf7f777321e84e49e039122a2d1cf7fea6a02aac8944c27ba038156bc10c0f7a6b26fbf382f67959d856600881f0e692c60f12ace775aab8d775dc2586454918a0db1811f5e8086f1a9805166c870b8387d380d5115af5841dad21f629e05f4b51e362c46b58a7dc2855c5189bff60d02c05ba67c297aa0ad05b93b1ee2fffae13fe5764d4e2a214e15093841b1551d518a669fa94e8918bfdd6573d5c0275a9b91ddb843775f78574891e03697f6ca290be6599b671093898a82e7905ed7c7fd8e8b422ebf12e5b543885596fc5c305d497407ffe73bd543f79c983f0807ae7e13fb5053fd7a07dddf8ec739418b59d67219f008f540161cec3bfd1b3097aad497248b221d572a9eb1bad6d921fcdcfdfacf8d1e392635168747056ec8a3fc45b3027293a517d50ea789294f132f2392919dc81ba5eb02e27e116cc300000000b6c0e39688425a3cb17d35f4b1eec0a37193f233c6655c6f40c09b4ea04c8880a431a8274127d56c3c8cab73a5fcf2b604b83658344e323eeedb0b283b0b3616236e904a42fed9fc8f4c131b047bfd5d7586e6a28032a4584fd5933472ce49dfdc99976166bb37eb1679b22249a222ffab17948dd6cc6f23f42ecd32a980ab8fc7c7d2da1a91f1db1187066c144bcbdb46240b7ef7ed28da4a358295b6104e4c60b09654e79f766e19e44174e94fa41d358d3dd901c060a06a388727be1092a37c0015695b1363ed018e724947983aa6b5974daf6388547cdacbd44a1282c3b9130cbf9536c29a523980b9e4328d1a7c0de8b636d7dfdee36434125948b1d802d5d143645c3a5f8da50adeef6e4f715361908a20cb998d3e0907aef9fdd19bb79be8c510b8aa04600163636c1d1f36f3834ffa3c7369e1d8ed9348bc339da2a525c4f165c0caebb7a4ee632a37a43897084e3c07a5ed8b505a51a4777095060b0ff6a6442206244dd9a13b5ba52b07c718e9eaad10befd12be35dc50283d584035d75e4917548ff58045b88d29b6826ceb6d44fb54ba3ef7944da6e86c0f2d0bc0bd725aa9193b3de4837634ead361d9b2ff5ae4de005f53d48cba029b43eb35fbedd0b5397918a9324b6e1f1d88399d8ad69b7d79e89ded6fe81fd1200f95c831f8c60dc1483e97052f61d0a643df0c2e1b0ba7d00b0692efd1bfc1ece10c2e785e3cb3b0dfbdbd722b6e53e5a2884b1cc5d939a572564bc8a2260e8718230878edb3a877f5c585f4373ef8e0e1cff5dacf96862906ff37eec18ba706d22b101965eaf5f5e29f544977896117e25ceb572f3443eddf9651c2ac69c911b21fd69e59ee57ebe4c549ff2a3dcd904656663039789f022a6caa7f76640e75efdba82dabacf8c0112bd4e62a3a9e69a9824c1af45cf86b307d9749937dd08b6ef49860cda5da7bb886f92db7cd43a869aa646a6da291a75ff28c4d728b1377b8e80233b33e724a60c0a015ec75cd86af04a4bd43964d8f7ba781a99d0cd7ff7e189fc91801655cb1b60e6bc3af747655341deceadbed3d76bdfae92389cc87c417e0f58f3fbcc56ff347467a20773146a81090ff42bbb5383d74108028f5fa532c647746054c312e2e4c085f58d93bec6da7c2bfd99fc59c1631cc71110acc2bf352b994e2a246be3cc1d240fa0c60eb04b92a9673d2ac2bba7f322ddbbd74712b0ec459050586523bd0b0505174a701206e47f2bb7fe20caf5ed73d33447b89432802e7d4606512e217aedf78c871e10cfbdf202efbf3fd8495b6be18cde726dc1fefc01921e9d1f15c8301376c33b5a698d0f7d5f317835d74857e121fe820d93f6b757c9938ec81f9b19a4b0d4ed35d1309fbcb285cf7717e9e27aaaba9d7d742fcfd786eacd993fb119e1d52908ca7ce2135046fa95805704c6258fd1b5fc1434af7ab99609820d73627080d43bcaeeb42ce423e17aa4df3a6994ead3133e2ecfbc6fa308c6b71b78cbab273641970b49e15d0dbe7aea716eaf6cf40f90d0d7d3d8bf1d165d25d5f6f6376416b9dd13731c5c2fdadee8e48c76430cccb21d8e6c659", 0x5bd, 0xfffffffffffffffd) keyctl$read(0xb, r2, &(0x7f0000000a40)=""/102400, 0x19000) keyctl$search(0xa, r2, &(0x7f00000008c0)='keyring\x00', &(0x7f0000000900)={'syz', 0x1}, 0xfffffffffffffffd) request_key(&(0x7f00000006c0)='dns_resolver\x00', &(0x7f0000000700)={'syz', 0x3}, &(0x7f0000000940)='\x00', 0xfffffffffffffffd) r3 = add_key(&(0x7f0000000380)='id_resolver\x00', &(0x7f0000000400)={'syz', 0x3}, &(0x7f0000000440)="e09e6dda135ac7c467011f", 0xb, r0) keyctl$search(0xa, r1, 0x0, &(0x7f0000000340)={'syz', 0x1}, r3) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000140)='cpuset\x00', 0x0, 0x0) add_key$keyring(&(0x7f0000000100), &(0x7f0000000180)={'syz', 0x0}, 0x0, 0x0, r0) r4 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r5 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) request_key(&(0x7f0000000580)='logon\x00', &(0x7f00000005c0)={'syz', 0x0}, &(0x7f0000000600)='\x1f-)\x00', 0xfffffffffffffff9) add_key$fscrypt_provisioning(&(0x7f0000000480), &(0x7f00000004c0)={'syz', 0x0}, &(0x7f0000000640)=ANY=[], 0x48, r0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = openat$cgroup_int(r4, &(0x7f00000001c0)='cpuset.sched_load_balance\x00', 0x2, 0x0) dup3(r7, r4, 0x0) add_key$keyring(&(0x7f0000000540), &(0x7f0000000640)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffc) r8 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000980), 0x200000, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r5, 0x81f8943c, &(0x7f000001a000)={0x0, ""/256, 0x0, 0x0, 0x0, 0x0, ""/16, ""/16, ""/16, 0x0}) ioctl$BTRFS_IOC_SUBVOL_CREATE_V2(r6, 0x50009418, &(0x7f000001a200)={{r8}, r9, 0x2, @inherit={0x58, &(0x7f00000009c0)={0x1, 0x2, 0x8, 0x7, {0x14, 0x1000, 0x5, 0x7, 0x4}, [0xffff, 0x3]}}, @subvolid=0x4}) writev(r4, &(0x7f0000000300)=[{&(0x7f00000000c0)='0', 0x1}, {&(0x7f00000003c0)='7', 0x1}], 0x2) [ 2014.954843] new mount options do not match the existing superblock, will be ignored [ 2015.014821] hfs: invalid gid -1 [ 2015.018192] hfs: unable to parse mount options [ 2015.053930] new mount options do not match the existing superblock, will be ignored [ 2015.072112] hfs: unable to parse mount options 16:34:59 executing program 2: r0 = request_key(0x0, 0x0, 0x0, 0xfffffffffffffffd) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) perf_event_open(&(0x7f00000007c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0xe5e}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) keyctl$read(0xb, 0x0, &(0x7f0000000a40)=""/102400, 0x19000) keyctl$search(0xa, 0x0, &(0x7f00000008c0)='keyring\x00', &(0x7f0000000900)={'syz', 0x1}, 0xfffffffffffffffd) request_key(&(0x7f00000006c0)='dns_resolver\x00', &(0x7f0000000700)={'syz', 0x3}, &(0x7f0000000940)='\x00', 0xfffffffffffffffd) add_key(0x0, &(0x7f0000000400)={'syz', 0x3}, &(0x7f0000000440), 0x0, r0) keyctl$search(0xa, 0x0, 0x0, &(0x7f0000000340)={'syz', 0x1}, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000140)='cpuset\x00', 0x0, 0x0) add_key$keyring(&(0x7f0000000100), 0x0, 0x0, 0x0, r0) r1 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) request_key(0x0, &(0x7f00000005c0)={'syz', 0x0}, 0x0, 0xfffffffffffffff9) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = openat$cgroup_int(r1, &(0x7f00000001c0)='cpuset.sched_load_balance\x00', 0x2, 0x0) dup3(r3, r1, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x200000, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f000001a000)={0x0, ""/256, 0x0, 0x0, 0x0, 0x0, ""/16, ""/16, ""/16, 0x0}) ioctl$BTRFS_IOC_SUBVOL_CREATE_V2(r2, 0x50009418, &(0x7f000001a200)={{}, r4, 0x2, @inherit={0x58, &(0x7f00000009c0)={0x1, 0x2, 0x8, 0x0, {0x0, 0x0, 0x0, 0x0, 0x4}, [0x0, 0x0]}}, @subvolid=0x4}) ioctl$BTRFS_IOC_BALANCE(0xffffffffffffffff, 0x5000940c, 0x0) keyctl$search(0xa, 0x0, &(0x7f0000000200)='keyring\x00', &(0x7f0000000500)={'syz', 0x0}, 0x0) writev(r1, &(0x7f0000000300)=[{&(0x7f00000003c0)}], 0x1) 16:34:59 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000140)={0x0, 0x0}, &(0x7f0000cab000)=0x6e) syz_mount_image$hfs(&(0x7f0000000240), &(0x7f0000000380)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x3, &(0x7f0000000280)={[{}, {@part={'part', 0x3d, 0x10001}}, {@type={'type', 0x3d, "7614866b"}}, {@uid={'uid', 0x3d, r1}}, {@session={'session', 0x3d, 0xff}}], [{@rootcontext={'rootcontext', 0x3d, 'user_u'}}]}, 0x1, 0x235, &(0x7f0000000000)="$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") 16:34:59 executing program 1: syz_mount_image$hfs(&(0x7f0000000240), &(0x7f0000000380)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x3, &(0x7f0000000780)=ANY=[@ANYBLOB='quiet,gid=', @ANYRESHEX, @ANYBLOB="2c2a7270653d7614866b2c75693df589299908000000450000005d38ff0c0071446a0c48dba349ba347528523876dc8d7918ecea1024ba9669ff19a9ab5e27062b1dae8d8c0eb880008164ed9d8093fdc35f282dee56df9531b6e0c94b43c314af69146a70075499da5e7f927d3c672787e3d33a6071ff2c1483a1a7cfb34131bfee72f86068d0966d", @ANYRESHEX, @ANYBLOB=',codepage=ascii,rootcontext=sysadm_u,\x00'], 0x1, 0x235, &(0x7f0000000000)="$eJzs3U9rE0EYx/HfTKJGW+r2jwgeqwVP0taLeBEkL8KTqE2EYqigFdSTeBZfgHffgi/Ck/gG9OTJF5Dbyjw7abYxm02rydD2+4GEbXeenWc6u515AqUCcGbdb//4fPtXeDmpoYaku5KX1JKakq7oauvV3v7ufq/bmXShhkWEl1MR6f5qs7PXHRca4iwiysJXTS2Wv4fZyPM8/5k6CSRnT/8YXroQn04735p7ZrPxLnUCibm++nqtpdR5AADSiuu/j+v8Yty/ey9txGX/VK3//dQJJFZa/63Kyl2Y38t2aljvWQkXzvtBlXicvs6ruLMObTBdXVVpufiLT3d73Vs7z3sdr/e6F5Wardl7p7h1B2qyXR9Tm05w/LEv2BjOhTFsV+S/+n97rOe+um/uocv0SZ2D/V8zd2GabKaykZkq8t+svqKNMitaVYxy2Tq5FnuIakbZGl+RaHBHLevwBwRZXZ4WtTISVYxuqyZqdSRqu5jTmqi10b6Gd3N15Ky5j+6BW9dvfVG7tP/34ae9oWmezNDGWsY7Y+J4mtYymyIxf6Rh4N980BPd0dLLN2+fPe71ui844IADDg4OUv+CwjwMJz11Jkgk7LtcUf+V6pVNK5HCWzZhn57XXbx0xa2K2mDF3i8dqYJbqK7gpq25rt+UbkzfYxbzPCVcW9/1iM//AQAAAAAAAAAAAAAAAAAATpp5/DlB6jECAAAAAAAAAAAAAAAAAAAAAHDS8f9/gbPrTwAAAP//8WCCSA==") 16:34:59 executing program 0: r0 = request_key(0x0, 0x0, 0x0, 0xfffffffffffffffd) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) r1 = add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000740)=@filename='./file0\x00', &(0x7f0000000780)='./file0\x00', &(0x7f0000000840)='gadgetfs\x00', 0x0, &(0x7f0000000880)='keyring\x00') perf_event_open(&(0x7f00000007c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x12c00, 0x0, 0xe5e}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) writev(0xffffffffffffffff, 0x0, 0x0) r2 = add_key(0x0, &(0x7f0000000280)={'syz', 0x3}, &(0x7f0000019a40)="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", 0x5bd, 0xfffffffffffffffd) keyctl$read(0xb, r2, &(0x7f0000000a40)=""/102400, 0x19000) keyctl$search(0xa, r2, &(0x7f00000008c0)='keyring\x00', &(0x7f0000000900)={'syz', 0x1}, 0xfffffffffffffffd) request_key(&(0x7f00000006c0)='dns_resolver\x00', &(0x7f0000000700)={'syz', 0x3}, 0x0, 0xfffffffffffffffd) r3 = add_key(&(0x7f0000000380)='id_resolver\x00', &(0x7f0000000400)={'syz', 0x3}, &(0x7f0000000440)="e09e6dda135ac7c467011f", 0xb, r0) keyctl$search(0xa, r1, 0x0, &(0x7f0000000340)={'syz', 0x1}, r3) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000140)='cpuset\x00', 0x0, 0x0) add_key$keyring(&(0x7f0000000100), &(0x7f0000000180)={'syz', 0x0}, 0x0, 0x0, r0) r4 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r5 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) open(&(0x7f00000002c0)='./file0\x00', 0x98d00, 0x8) request_key(&(0x7f0000000580)='logon\x00', 0x0, &(0x7f0000000600)='\x1f-)\x00', 0xfffffffffffffff9) add_key$fscrypt_provisioning(&(0x7f0000000480), &(0x7f00000004c0)={'syz', 0x0}, &(0x7f0000000640)=ANY=[], 0x48, r0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = openat$cgroup_int(r4, &(0x7f00000001c0)='cpuset.sched_load_balance\x00', 0x2, 0x0) dup3(r7, r4, 0x0) r8 = add_key$keyring(&(0x7f0000000540), &(0x7f0000000640)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffc) r9 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000980), 0x200000, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r5, 0x81f8943c, &(0x7f000001a000)={0x0, ""/256, 0x0, 0x0, 0x0, 0x0, ""/16, ""/16, ""/16, 0x0}) ioctl$BTRFS_IOC_SUBVOL_CREATE_V2(r6, 0x50009418, &(0x7f000001a200)={{r9}, r10, 0x2, @inherit={0x58, &(0x7f00000009c0)={0x1, 0x2, 0x8, 0x7, {0x14, 0x1000, 0x5, 0x7}, [0xffff, 0x0]}}, @subvolid=0x4}) keyctl$search(0xa, r3, 0x0, &(0x7f0000000500)={'syz', 0x0}, r8) writev(r4, &(0x7f0000000300)=[{&(0x7f00000000c0)='0', 0xbe00}, {&(0x7f00000003c0)='7', 0x1}], 0x2) [ 2015.135748] new mount options do not match the existing superblock, will be ignored [ 2015.145952] new mount options do not match the existing superblock, will be ignored 16:34:59 executing program 4: r0 = request_key(0x0, 0x0, 0x0, 0xfffffffffffffffd) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) r1 = add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000780)='./file0\x00', &(0x7f0000000840)='gadgetfs\x00', 0x0, &(0x7f0000000880)='keyring\x00') perf_event_open(&(0x7f00000007c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x12c00, 0x0, 0xe5e}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) writev(0xffffffffffffffff, 0x0, 0x0) keyctl$read(0xb, 0x0, &(0x7f0000000a40)=""/102400, 0x19000) keyctl$search(0xa, 0x0, 0x0, 0x0, 0xfffffffffffffffd) request_key(&(0x7f00000006c0)='dns_resolver\x00', &(0x7f0000000700)={'syz', 0x3}, &(0x7f0000000940)='\x00', 0xfffffffffffffffd) r2 = add_key(&(0x7f0000000380)='id_resolver\x00', 0x0, &(0x7f0000000440), 0x0, r0) keyctl$search(0xa, r1, 0x0, &(0x7f0000000340)={'syz', 0x1}, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000140)='cpuset\x00', 0x0, 0x0) add_key$keyring(&(0x7f0000000100), 0x0, 0x0, 0x0, r0) r3 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r4 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) open(&(0x7f00000002c0)='./file0\x00', 0x98d00, 0x8) request_key(&(0x7f0000000580)='logon\x00', &(0x7f00000005c0)={'syz', 0x0}, &(0x7f0000000600)='\x1f-)\x00', 0xfffffffffffffff9) write$rfkill(r4, &(0x7f0000000040)={0x0, 0x0, 0x3}, 0x8) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = openat$cgroup_int(r3, &(0x7f00000001c0)='cpuset.sched_load_balance\x00', 0x2, 0x0) dup3(r6, r3, 0x0) r7 = add_key$keyring(&(0x7f0000000540), &(0x7f0000000640)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffc) r8 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000980), 0x200000, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r4, 0x81f8943c, &(0x7f000001a000)={0x0, ""/256, 0x0, 0x0, 0x0, 0x0, ""/16, ""/16, ""/16, 0x0}) ioctl$BTRFS_IOC_SUBVOL_CREATE_V2(r5, 0x50009418, &(0x7f000001a200)={{r8}, r9, 0x2, @inherit={0x58, &(0x7f00000009c0)={0x1, 0x2, 0x8, 0x7, {0x14, 0x1000, 0x5, 0x7, 0x4}, [0xffff, 0x3]}}, @subvolid=0x4}) ioctl$BTRFS_IOC_BALANCE(r5, 0x5000940c, 0x0) keyctl$search(0xa, r2, &(0x7f0000000200)='keyring\x00', &(0x7f0000000500)={'syz', 0x0}, r7) writev(r3, &(0x7f0000000300)=[{&(0x7f00000000c0)='0', 0x1}, {&(0x7f00000003c0)='7', 0x1}], 0x2) 16:34:59 executing program 5: r0 = request_key(0x0, 0x0, 0x0, 0xfffffffffffffffd) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) r1 = add_key$keyring(0x0, &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000740)=@filename='./file0\x00', &(0x7f0000000780)='./file0\x00', &(0x7f0000000840)='gadgetfs\x00', 0x10, &(0x7f0000000880)='keyring\x00') perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) writev(0xffffffffffffffff, 0x0, 0x0) r2 = add_key(&(0x7f0000000240)='big_key\x00', &(0x7f0000000280)={'syz', 0x3}, &(0x7f0000019a40)="4195738ac28ccd83aa93c4ecacdaca3d34104be4cc5531c4091facf7f777321e84e49e039122a2d1cf7fea6a02aac8944c27ba038156bc10c0f7a6b26fbf382f67959d856600881f0e692c60f12ace775aab8d775dc2586454918a0db1811f5e8086f1a9805166c870b8387d380d5115af5841dad21f629e05f4b51e362c46b58a7dc2855c5189bff60d02c05ba67c297aa0ad05b93b1ee2fffae13fe5764d4e2a214e15093841b1551d518a669fa94e8918bfdd6573d5c0275a9b91ddb843775f78574891e03697f6ca290be6599b671093898a82e7905ed7c7fd8e8b422ebf12e5b543885596fc5c305d497407ffe73bd543f79c983f0807ae7e13fb5053fd7a07dddf8ec739418b59d67219f008f540161cec3bfd1b3097aad497248b221d572a9eb1bad6d921fcdcfdfacf8d1e392635168747056ec8a3fc45b3027293a517d50ea789294f132f2392919dc81ba5eb02e27e116cc300000000b6c0e39688425a3cb17d35f4b1eec0a37193f233c6655c6f40c09b4ea04c8880a431a8274127d56c3c8cab73a5fcf2b604b83658344e323eeedb0b283b0b3616236e904a42fed9fc8f4c131b047bfd5d7586e6a28032a4584fd5933472ce49dfdc99976166bb37eb1679b22249a222ffab17948dd6cc6f23f42ecd32a980ab8fc7c7d2da1a91f1db1187066c144bcbdb46240b7ef7ed28da4a358295b6104e4c60b09654e79f766e19e44174e94fa41d358d3dd901c060a06a388727be1092a37c0015695b1363ed018e724947983aa6b5974daf6388547cdacbd44a1282c3b9130cbf9536c29a523980b9e4328d1a7c0de8b636d7dfdee36434125948b1d802d5d143645c3a5f8da50adeef6e4f715361908a20cb998d3e0907aef9fdd19bb79be8c510b8aa04600163636c1d1f36f3834ffa3c7369e1d8ed9348bc339da2a525c4f165c0caebb7a4ee632a37a43897084e3c07a5ed8b505a51a4777095060b0ff6a6442206244dd9a13b5ba52b07c718e9eaad10befd12be35dc50283d584035d75e4917548ff58045b88d29b6826ceb6d44fb54ba3ef7944da6e86c0f2d0bc0bd725aa9193b3de4837634ead361d9b2ff5ae4de005f53d48cba029b43eb35fbedd0b5397918a9324b6e1f1d88399d8ad69b7d79e89ded6fe81fd1200f95c831f8c60dc1483e97052f61d0a643df0c2e1b0ba7d00b0692efd1bfc1ece10c2e785e3cb3b0dfbdbd722b6e53e5a2884b1cc5d939a572564bc8a2260e8718230878edb3a877f5c585f4373ef8e0e1cff5dacf96862906ff37eec18ba706d22b101965eaf5f5e29f544977896117e25ceb572f3443eddf9651c2ac69c911b21fd69e59ee57ebe4c549ff2a3dcd904656663039789f022a6caa7f76640e75efdba82dabacf8c0112bd4e62a3a9e69a9824c1af45cf86b307d9749937dd08b6ef49860cda5da7bb886f92db7cd43a869aa646a6da291a75ff28c4d728b1377b8e80233b33e724a60c0a015ec75cd86af04a4bd43964d8f7ba781a99d0cd7ff7e189fc91801655cb1b60e6bc3af747655341deceadbed3d76bdfae92389cc87c417e0f58f3fbcc56ff347467a20773146a81090ff42bbb5383d74108028f5fa532c647746054c312e2e4c085f58d93bec6da7c2bfd99fc59c1631cc71110acc2bf352b994e2a246be3cc1d240fa0c60eb04b92a9673d2ac2bba7f322ddbbd74712b0ec459050586523bd0b0505174a701206e47f2bb7fe20caf5ed73d33447b89432802e7d4606512e217aedf78c871e10cfbdf202efbf3fd8495b6be18cde726dc1fefc01921e9d1f15c8301376c33b5a698d0f7d5f317835d74857e121fe820d93f6b757c9938ec81f9b19a4b0d4ed35d1309fbcb285cf7717e9e27aaaba9d7d742fcfd786eacd993fb119e1d52908ca7ce2135046fa95805704c6258fd1b5fc1434af7ab99609820d73627080d43bcaeeb42ce423e17aa4df3a6994ead3133e2ecfbc6fa308c6b71b78cbab273641970b49e15d0dbe7aea716eaf6cf40f90d0d7d3d8bf1d165d25d5f6f6376416b9dd13731c5c2fdadee8e48c76430cccb21d8e6c659", 0x5bd, 0xfffffffffffffffd) keyctl$read(0xb, r2, &(0x7f0000000a40)=""/102400, 0x19000) keyctl$search(0xa, r2, &(0x7f00000008c0)='keyring\x00', &(0x7f0000000900)={'syz', 0x1}, 0xfffffffffffffffd) request_key(&(0x7f00000006c0)='dns_resolver\x00', &(0x7f0000000700)={'syz', 0x3}, &(0x7f0000000940)='\x00', 0xfffffffffffffffd) r3 = add_key(&(0x7f0000000380)='id_resolver\x00', &(0x7f0000000400)={'syz', 0x3}, &(0x7f0000000440)="e09e6dda135ac7c467011f", 0xb, r0) keyctl$search(0xa, r1, 0x0, &(0x7f0000000340)={'syz', 0x1}, r3) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000140)='cpuset\x00', 0x0, 0x0) add_key$keyring(&(0x7f0000000100), &(0x7f0000000180)={'syz', 0x0}, 0x0, 0x0, r0) r4 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r5 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) request_key(&(0x7f0000000580)='logon\x00', &(0x7f00000005c0)={'syz', 0x0}, &(0x7f0000000600)='\x1f-)\x00', 0xfffffffffffffff9) add_key$fscrypt_provisioning(&(0x7f0000000480), &(0x7f00000004c0)={'syz', 0x0}, &(0x7f0000000640)=ANY=[], 0x48, r0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = openat$cgroup_int(r4, &(0x7f00000001c0)='cpuset.sched_load_balance\x00', 0x2, 0x0) dup3(r7, r4, 0x0) add_key$keyring(&(0x7f0000000540), &(0x7f0000000640)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffc) r8 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000980), 0x200000, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r5, 0x81f8943c, &(0x7f000001a000)={0x0, ""/256, 0x0, 0x0, 0x0, 0x0, ""/16, ""/16, ""/16, 0x0}) ioctl$BTRFS_IOC_SUBVOL_CREATE_V2(r6, 0x50009418, &(0x7f000001a200)={{r8}, r9, 0x2, @inherit={0x58, &(0x7f00000009c0)={0x1, 0x2, 0x8, 0x7, {0x14, 0x1000, 0x5, 0x7, 0x4}, [0xffff, 0x3]}}, @subvolid=0x4}) writev(r4, &(0x7f0000000300)=[{&(0x7f00000000c0)='0', 0x1}, {&(0x7f00000003c0)='7', 0x1}], 0x2) [ 2015.300691] new mount options do not match the existing superblock, will be ignored [ 2015.316260] new mount options do not match the existing superblock, will be ignored [ 2015.327226] new mount options do not match the existing superblock, will be ignored [ 2015.346545] hfs: invalid gid -1 [ 2015.349855] hfs: unable to parse mount options [ 2015.356276] hfs: uid requires an argument [ 2015.369885] hfs: unable to parse mount options [ 2015.377515] new mount options do not match the existing superblock, will be ignored 16:34:59 executing program 5: r0 = request_key(0x0, 0x0, 0x0, 0xfffffffffffffffd) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) r1 = add_key$keyring(0x0, &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000740)=@filename='./file0\x00', &(0x7f0000000780)='./file0\x00', &(0x7f0000000840)='gadgetfs\x00', 0x10, &(0x7f0000000880)='keyring\x00') perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) writev(0xffffffffffffffff, 0x0, 0x0) r2 = add_key(&(0x7f0000000240)='big_key\x00', &(0x7f0000000280)={'syz', 0x3}, &(0x7f0000019a40)="4195738ac28ccd83aa93c4ecacdaca3d34104be4cc5531c4091facf7f777321e84e49e039122a2d1cf7fea6a02aac8944c27ba038156bc10c0f7a6b26fbf382f67959d856600881f0e692c60f12ace775aab8d775dc2586454918a0db1811f5e8086f1a9805166c870b8387d380d5115af5841dad21f629e05f4b51e362c46b58a7dc2855c5189bff60d02c05ba67c297aa0ad05b93b1ee2fffae13fe5764d4e2a214e15093841b1551d518a669fa94e8918bfdd6573d5c0275a9b91ddb843775f78574891e03697f6ca290be6599b671093898a82e7905ed7c7fd8e8b422ebf12e5b543885596fc5c305d497407ffe73bd543f79c983f0807ae7e13fb5053fd7a07dddf8ec739418b59d67219f008f540161cec3bfd1b3097aad497248b221d572a9eb1bad6d921fcdcfdfacf8d1e392635168747056ec8a3fc45b3027293a517d50ea789294f132f2392919dc81ba5eb02e27e116cc300000000b6c0e39688425a3cb17d35f4b1eec0a37193f233c6655c6f40c09b4ea04c8880a431a8274127d56c3c8cab73a5fcf2b604b83658344e323eeedb0b283b0b3616236e904a42fed9fc8f4c131b047bfd5d7586e6a28032a4584fd5933472ce49dfdc99976166bb37eb1679b22249a222ffab17948dd6cc6f23f42ecd32a980ab8fc7c7d2da1a91f1db1187066c144bcbdb46240b7ef7ed28da4a358295b6104e4c60b09654e79f766e19e44174e94fa41d358d3dd901c060a06a388727be1092a37c0015695b1363ed018e724947983aa6b5974daf6388547cdacbd44a1282c3b9130cbf9536c29a523980b9e4328d1a7c0de8b636d7dfdee36434125948b1d802d5d143645c3a5f8da50adeef6e4f715361908a20cb998d3e0907aef9fdd19bb79be8c510b8aa04600163636c1d1f36f3834ffa3c7369e1d8ed9348bc339da2a525c4f165c0caebb7a4ee632a37a43897084e3c07a5ed8b505a51a4777095060b0ff6a6442206244dd9a13b5ba52b07c718e9eaad10befd12be35dc50283d584035d75e4917548ff58045b88d29b6826ceb6d44fb54ba3ef7944da6e86c0f2d0bc0bd725aa9193b3de4837634ead361d9b2ff5ae4de005f53d48cba029b43eb35fbedd0b5397918a9324b6e1f1d88399d8ad69b7d79e89ded6fe81fd1200f95c831f8c60dc1483e97052f61d0a643df0c2e1b0ba7d00b0692efd1bfc1ece10c2e785e3cb3b0dfbdbd722b6e53e5a2884b1cc5d939a572564bc8a2260e8718230878edb3a877f5c585f4373ef8e0e1cff5dacf96862906ff37eec18ba706d22b101965eaf5f5e29f544977896117e25ceb572f3443eddf9651c2ac69c911b21fd69e59ee57ebe4c549ff2a3dcd904656663039789f022a6caa7f76640e75efdba82dabacf8c0112bd4e62a3a9e69a9824c1af45cf86b307d9749937dd08b6ef49860cda5da7bb886f92db7cd43a869aa646a6da291a75ff28c4d728b1377b8e80233b33e724a60c0a015ec75cd86af04a4bd43964d8f7ba781a99d0cd7ff7e189fc91801655cb1b60e6bc3af747655341deceadbed3d76bdfae92389cc87c417e0f58f3fbcc56ff347467a20773146a81090ff42bbb5383d74108028f5fa532c647746054c312e2e4c085f58d93bec6da7c2bfd99fc59c1631cc71110acc2bf352b994e2a246be3cc1d240fa0c60eb04b92a9673d2ac2bba7f322ddbbd74712b0ec459050586523bd0b0505174a701206e47f2bb7fe20caf5ed73d33447b89432802e7d4606512e217aedf78c871e10cfbdf202efbf3fd8495b6be18cde726dc1fefc01921e9d1f15c8301376c33b5a698d0f7d5f317835d74857e121fe820d93f6b757c9938ec81f9b19a4b0d4ed35d1309fbcb285cf7717e9e27aaaba9d7d742fcfd786eacd993fb119e1d52908ca7ce2135046fa95805704c6258fd1b5fc1434af7ab99609820d73627080d43bcaeeb42ce423e17aa4df3a6994ead3133e2ecfbc6fa308c6b71b78cbab273641970b49e15d0dbe7aea716eaf6cf40f90d0d7d3d8bf1d165d25d5f6f6376416b9dd13731c5c2fdadee8e48c76430cccb21d8e6c659", 0x5bd, 0xfffffffffffffffd) keyctl$read(0xb, r2, &(0x7f0000000a40)=""/102400, 0x19000) keyctl$search(0xa, r2, &(0x7f00000008c0)='keyring\x00', &(0x7f0000000900)={'syz', 0x1}, 0xfffffffffffffffd) request_key(&(0x7f00000006c0)='dns_resolver\x00', &(0x7f0000000700)={'syz', 0x3}, &(0x7f0000000940)='\x00', 0xfffffffffffffffd) r3 = add_key(&(0x7f0000000380)='id_resolver\x00', &(0x7f0000000400)={'syz', 0x3}, &(0x7f0000000440)="e09e6dda135ac7c467011f", 0xb, r0) keyctl$search(0xa, r1, 0x0, &(0x7f0000000340)={'syz', 0x1}, r3) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000140)='cpuset\x00', 0x0, 0x0) add_key$keyring(&(0x7f0000000100), &(0x7f0000000180)={'syz', 0x0}, 0x0, 0x0, r0) r4 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r5 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) request_key(&(0x7f0000000580)='logon\x00', &(0x7f00000005c0)={'syz', 0x0}, &(0x7f0000000600)='\x1f-)\x00', 0xfffffffffffffff9) add_key$fscrypt_provisioning(&(0x7f0000000480), &(0x7f00000004c0)={'syz', 0x0}, &(0x7f0000000640)=ANY=[], 0x48, r0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = openat$cgroup_int(r4, &(0x7f00000001c0)='cpuset.sched_load_balance\x00', 0x2, 0x0) dup3(r7, r4, 0x0) add_key$keyring(&(0x7f0000000540), &(0x7f0000000640)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffc) r8 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000980), 0x200000, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r5, 0x81f8943c, &(0x7f000001a000)={0x0, ""/256, 0x0, 0x0, 0x0, 0x0, ""/16, ""/16, ""/16, 0x0}) ioctl$BTRFS_IOC_SUBVOL_CREATE_V2(r6, 0x50009418, &(0x7f000001a200)={{r8}, r9, 0x2, @inherit={0x58, &(0x7f00000009c0)={0x1, 0x2, 0x8, 0x7, {0x14, 0x1000, 0x5, 0x7, 0x4}, [0xffff, 0x3]}}, @subvolid=0x4}) writev(r4, &(0x7f0000000300)=[{&(0x7f00000000c0)='0', 0x1}, {&(0x7f00000003c0)='7', 0x1}], 0x2) 16:34:59 executing program 4: r0 = request_key(0x0, 0x0, 0x0, 0xfffffffffffffffd) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) r1 = add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000780)='./file0\x00', &(0x7f0000000840)='gadgetfs\x00', 0x0, &(0x7f0000000880)='keyring\x00') perf_event_open(&(0x7f00000007c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x12c00, 0x0, 0xe5e}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) writev(0xffffffffffffffff, 0x0, 0x0) keyctl$read(0xb, 0x0, &(0x7f0000000a40)=""/102400, 0x19000) keyctl$search(0xa, 0x0, 0x0, 0x0, 0xfffffffffffffffd) request_key(&(0x7f00000006c0)='dns_resolver\x00', &(0x7f0000000700)={'syz', 0x3}, &(0x7f0000000940)='\x00', 0xfffffffffffffffd) r2 = add_key(&(0x7f0000000380)='id_resolver\x00', 0x0, &(0x7f0000000440), 0x0, r0) keyctl$search(0xa, r1, 0x0, &(0x7f0000000340)={'syz', 0x1}, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000140)='cpuset\x00', 0x0, 0x0) add_key$keyring(&(0x7f0000000100), 0x0, 0x0, 0x0, r0) r3 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r4 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) open(&(0x7f00000002c0)='./file0\x00', 0x98d00, 0x8) request_key(&(0x7f0000000580)='logon\x00', &(0x7f00000005c0)={'syz', 0x0}, &(0x7f0000000600)='\x1f-)\x00', 0xfffffffffffffff9) write$rfkill(r4, &(0x7f0000000040)={0x0, 0x0, 0x3}, 0x8) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = openat$cgroup_int(r3, &(0x7f00000001c0)='cpuset.sched_load_balance\x00', 0x2, 0x0) dup3(r6, r3, 0x0) r7 = add_key$keyring(&(0x7f0000000540), &(0x7f0000000640)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffc) r8 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000980), 0x200000, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r4, 0x81f8943c, &(0x7f000001a000)={0x0, ""/256, 0x0, 0x0, 0x0, 0x0, ""/16, ""/16, ""/16, 0x0}) ioctl$BTRFS_IOC_SUBVOL_CREATE_V2(r5, 0x50009418, &(0x7f000001a200)={{r8}, r9, 0x2, @inherit={0x58, &(0x7f00000009c0)={0x1, 0x2, 0x8, 0x7, {0x14, 0x1000, 0x5, 0x7, 0x4}, [0xffff, 0x3]}}, @subvolid=0x4}) ioctl$BTRFS_IOC_BALANCE(r5, 0x5000940c, 0x0) keyctl$search(0xa, r2, &(0x7f0000000200)='keyring\x00', &(0x7f0000000500)={'syz', 0x0}, r7) writev(r3, &(0x7f0000000300)=[{&(0x7f00000000c0)='0', 0x1}, {&(0x7f00000003c0)='7', 0x1}], 0x2) 16:34:59 executing program 1: syz_mount_image$hfs(&(0x7f0000000240), &(0x7f0000000380)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x3, &(0x7f0000000780)=ANY=[@ANYBLOB='quiet,gid=', @ANYRESHEX, @ANYBLOB="2c2a7270653d7614866b2c75693df589299908000000450000005d38ff0c0071446a0c48dba349ba347528523876dc8d7918ecea1024ba9669ff19a9ab5e27062b1dae8d8c0eb880008164ed9d8093fdc35f282dee56df9531b6e0c94b43c314af69146a70075499da5e7f927d3c672787e3d33a6071ff2c1483a1a7cfb34131bfee72f86068d0966d", @ANYRESHEX, @ANYBLOB=',codepage=ascii,rootcontext=sysadm_u,\x00'], 0x1, 0x235, &(0x7f0000000000)="$eJzs3U9rE0EYx/HfTKJGW+r2jwgeqwVP0upFvBQkL8KTqE2EYqigFdSTeBZfgHffgi/Ck/gG9OTJF5Dbyjw7abYxm02rydD2+4GEbXeenWc6u515AqUCcGbdb//4fOdXeDmpoYake5KX1JKakq7oauvV3v7ufq/bmXShhkWEl1MR6f5qs7PXHRca4iwiysJXTS2Wv4fZyPM8/5k6CSRnT/8YXroQn04735p7ZrPxLnUCibm++nqtpdR5AADSiuu/j+v8Yty/ey9txGX/VK3//dQJJFZa/63Kyl2Y38t2aljvWQkXzvtBlXicvs6ruLMObTBdXVVpufiLT3d73Vs7z3sdr/fajkrN1uy9U9y6AzXZro+pTSc4/tgXbAznwhhuV+S/+n97rOe+um/uocv0SZ2D/V8zd2GabKaykZkq8t+svqKNMitaVYxy2Tq5FnuIakbZGl+RaHBHLevwBwRZXZ4WtTISVYxuqyZqdSRqu5jTmqi10b6Gd3N15Ky5j+6BW9dvfVG7tP/34ae9oWmezNDGWsY7Y+J4mtYymyIxf6Rh4N980BPd1dLLN2+fPe71ui844IADDg4OUv+CwjwMJz11Jkgk7LtcUf+V6pVNK5HCWzZhn57XXbx0xa2K2mDF3i8dqYJbqK7gpq25rt+UbkzfYxbzPCVcW9/1iM//AQAAAAAAAAAAAAAAAAAATpp5/DlB6jECAAAAAAAAAAAAAAAAAAAAAHDS8f9/gbPrTwAAAP//Xe+CVQ==") 16:34:59 executing program 0: r0 = request_key(0x0, 0x0, 0x0, 0xfffffffffffffffd) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) r1 = add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000740)=@filename='./file0\x00', &(0x7f0000000780)='./file0\x00', &(0x7f0000000840)='gadgetfs\x00', 0x0, &(0x7f0000000880)='keyring\x00') perf_event_open(&(0x7f00000007c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x12c00, 0x0, 0xe5e}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) writev(0xffffffffffffffff, 0x0, 0x0) r2 = add_key(0x0, &(0x7f0000000280)={'syz', 0x3}, &(0x7f0000019a40)="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", 0x5bd, 0xfffffffffffffffd) keyctl$read(0xb, r2, &(0x7f0000000a40)=""/102400, 0x19000) keyctl$search(0xa, r2, &(0x7f00000008c0)='keyring\x00', &(0x7f0000000900)={'syz', 0x1}, 0xfffffffffffffffd) request_key(&(0x7f00000006c0)='dns_resolver\x00', &(0x7f0000000700)={'syz', 0x3}, 0x0, 0xfffffffffffffffd) r3 = add_key(&(0x7f0000000380)='id_resolver\x00', &(0x7f0000000400)={'syz', 0x3}, &(0x7f0000000440)="e09e6dda135ac7c467011f", 0xb, r0) keyctl$search(0xa, r1, 0x0, &(0x7f0000000340)={'syz', 0x1}, r3) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000140)='cpuset\x00', 0x0, 0x0) add_key$keyring(&(0x7f0000000100), &(0x7f0000000180)={'syz', 0x0}, 0x0, 0x0, r0) r4 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r5 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) open(&(0x7f00000002c0)='./file0\x00', 0x98d00, 0x8) request_key(&(0x7f0000000580)='logon\x00', 0x0, &(0x7f0000000600)='\x1f-)\x00', 0xfffffffffffffff9) add_key$fscrypt_provisioning(&(0x7f0000000480), &(0x7f00000004c0)={'syz', 0x0}, &(0x7f0000000640)=ANY=[], 0x48, r0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = openat$cgroup_int(r4, &(0x7f00000001c0)='cpuset.sched_load_balance\x00', 0x2, 0x0) dup3(r7, r4, 0x0) r8 = add_key$keyring(&(0x7f0000000540), &(0x7f0000000640)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffc) r9 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000980), 0x200000, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r5, 0x81f8943c, &(0x7f000001a000)={0x0, ""/256, 0x0, 0x0, 0x0, 0x0, ""/16, ""/16, ""/16, 0x0}) ioctl$BTRFS_IOC_SUBVOL_CREATE_V2(r6, 0x50009418, &(0x7f000001a200)={{r9}, r10, 0x2, @inherit={0x58, &(0x7f00000009c0)={0x1, 0x2, 0x8, 0x7, {0x14, 0x1000, 0x5, 0x7}, [0xffff, 0x0]}}, @subvolid=0x4}) keyctl$search(0xa, r3, 0x0, &(0x7f0000000500)={'syz', 0x0}, r8) writev(r4, &(0x7f0000000300)=[{&(0x7f00000000c0)='0', 0xbf00}, {&(0x7f00000003c0)='7', 0x1}], 0x2) 16:34:59 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000140)={0x0, 0x0}, &(0x7f0000cab000)=0x6e) syz_mount_image$hfs(&(0x7f0000000240), &(0x7f0000000380)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x3, &(0x7f0000000280)={[{}, {@part={'part', 0x3d, 0x10001}}, {@type={'type', 0x3d, "7614866b"}}, {@uid={'uid', 0x3d, r1}}, {@session={'session', 0x3d, 0xff}}], [{@rootcontext={'rootcontext', 0x3d, 'user_u'}}]}, 0x1, 0x235, &(0x7f0000000000)="$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") perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) socket(0x10, 0x2, 0x0) (async) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000140), &(0x7f0000cab000)=0x6e) (async) syz_mount_image$hfs(&(0x7f0000000240), &(0x7f0000000380)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x3, &(0x7f0000000280)={[{}, {@part={'part', 0x3d, 0x10001}}, {@type={'type', 0x3d, "7614866b"}}, {@uid={'uid', 0x3d, r1}}, {@session={'session', 0x3d, 0xff}}], [{@rootcontext={'rootcontext', 0x3d, 'user_u'}}]}, 0x1, 0x235, &(0x7f0000000000)="$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") (async) 16:34:59 executing program 2: r0 = request_key(0x0, 0x0, 0x0, 0xfffffffffffffffd) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) perf_event_open(&(0x7f00000007c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0xe5e}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) keyctl$read(0xb, 0x0, &(0x7f0000000a40)=""/102400, 0x19000) keyctl$search(0xa, 0x0, &(0x7f00000008c0)='keyring\x00', &(0x7f0000000900)={'syz', 0x1}, 0xfffffffffffffffd) request_key(&(0x7f00000006c0)='dns_resolver\x00', &(0x7f0000000700)={'syz', 0x3}, &(0x7f0000000940)='\x00', 0xfffffffffffffffd) add_key(0x0, &(0x7f0000000400)={'syz', 0x3}, &(0x7f0000000440), 0x0, r0) keyctl$search(0xa, 0x0, 0x0, &(0x7f0000000340)={'syz', 0x1}, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000140)='cpuset\x00', 0x0, 0x0) add_key$keyring(&(0x7f0000000100), 0x0, 0x0, 0x0, r0) r1 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) request_key(0x0, &(0x7f00000005c0)={'syz', 0x0}, 0x0, 0xfffffffffffffff9) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = openat$cgroup_int(r1, &(0x7f00000001c0)='cpuset.sched_load_balance\x00', 0x2, 0x0) dup3(r3, r1, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x200000, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f000001a000)={0x0, ""/256, 0x0, 0x0, 0x0, 0x0, ""/16, ""/16, ""/16, 0x0}) ioctl$BTRFS_IOC_SUBVOL_CREATE_V2(r2, 0x50009418, &(0x7f000001a200)={{}, r4, 0x2, @inherit={0x58, &(0x7f00000009c0)={0x1, 0x2, 0x8, 0x0, {0x0, 0x0, 0x0, 0x0, 0x4}, [0x0, 0x0]}}, @subvolid=0x4}) ioctl$BTRFS_IOC_BALANCE(0xffffffffffffffff, 0x5000940c, 0x0) keyctl$search(0xa, 0x0, &(0x7f0000000200)='keyring\x00', &(0x7f0000000500)={'syz', 0x0}, 0x0) writev(r1, &(0x7f0000000300)=[{&(0x7f00000003c0)}], 0x1) [ 2015.535959] new mount options do not match the existing superblock, will be ignored 16:34:59 executing program 5: r0 = request_key(0x0, 0x0, 0x0, 0xfffffffffffffffd) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) r1 = add_key$keyring(0x0, &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000740)=@filename='./file0\x00', &(0x7f0000000780)='./file0\x00', &(0x7f0000000840)='gadgetfs\x00', 0x10, &(0x7f0000000880)='keyring\x00') perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) writev(0xffffffffffffffff, 0x0, 0x0) r2 = add_key(&(0x7f0000000240)='big_key\x00', &(0x7f0000000280)={'syz', 0x3}, &(0x7f0000019a40)="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", 0x5bd, 0xfffffffffffffffd) keyctl$read(0xb, r2, &(0x7f0000000a40)=""/102400, 0x19000) keyctl$search(0xa, r2, &(0x7f00000008c0)='keyring\x00', &(0x7f0000000900)={'syz', 0x1}, 0xfffffffffffffffd) request_key(&(0x7f00000006c0)='dns_resolver\x00', &(0x7f0000000700)={'syz', 0x3}, &(0x7f0000000940)='\x00', 0xfffffffffffffffd) r3 = add_key(&(0x7f0000000380)='id_resolver\x00', &(0x7f0000000400)={'syz', 0x3}, &(0x7f0000000440)="e09e6dda135ac7c467011f", 0xb, r0) keyctl$search(0xa, r1, 0x0, &(0x7f0000000340)={'syz', 0x1}, r3) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000140)='cpuset\x00', 0x0, 0x0) add_key$keyring(&(0x7f0000000100), &(0x7f0000000180)={'syz', 0x0}, 0x0, 0x0, r0) r4 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r5 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) request_key(&(0x7f0000000580)='logon\x00', &(0x7f00000005c0)={'syz', 0x0}, &(0x7f0000000600)='\x1f-)\x00', 0xfffffffffffffff9) add_key$fscrypt_provisioning(&(0x7f0000000480), &(0x7f00000004c0)={'syz', 0x0}, &(0x7f0000000640)=ANY=[], 0x48, r0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = openat$cgroup_int(r4, &(0x7f00000001c0)='cpuset.sched_load_balance\x00', 0x2, 0x0) dup3(r7, r4, 0x0) add_key$keyring(&(0x7f0000000540), &(0x7f0000000640)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffc) r8 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000980), 0x200000, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r5, 0x81f8943c, &(0x7f000001a000)={0x0, ""/256, 0x0, 0x0, 0x0, 0x0, ""/16, ""/16, ""/16, 0x0}) ioctl$BTRFS_IOC_SUBVOL_CREATE_V2(r6, 0x50009418, &(0x7f000001a200)={{r8}, r9, 0x2, @inherit={0x58, &(0x7f00000009c0)={0x1, 0x2, 0x8, 0x7, {0x14, 0x1000, 0x5, 0x7, 0x4}, [0xffff, 0x3]}}, @subvolid=0x4}) writev(r4, &(0x7f0000000300)=[{&(0x7f00000000c0)='0', 0x1}, {&(0x7f00000003c0)='7', 0x1}], 0x2) [ 2015.607616] new mount options do not match the existing superblock, will be ignored [ 2015.640370] hfs: invalid gid -1 [ 2015.649594] new mount options do not match the existing superblock, will be ignored 16:34:59 executing program 0: r0 = request_key(0x0, 0x0, 0x0, 0xfffffffffffffffd) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) r1 = add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000740)=@filename='./file0\x00', &(0x7f0000000780)='./file0\x00', &(0x7f0000000840)='gadgetfs\x00', 0x0, &(0x7f0000000880)='keyring\x00') perf_event_open(&(0x7f00000007c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x12c00, 0x0, 0xe5e}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) writev(0xffffffffffffffff, 0x0, 0x0) r2 = add_key(0x0, &(0x7f0000000280)={'syz', 0x3}, &(0x7f0000019a40)="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", 0x5bd, 0xfffffffffffffffd) keyctl$read(0xb, r2, &(0x7f0000000a40)=""/102400, 0x19000) keyctl$search(0xa, r2, &(0x7f00000008c0)='keyring\x00', &(0x7f0000000900)={'syz', 0x1}, 0xfffffffffffffffd) request_key(&(0x7f00000006c0)='dns_resolver\x00', &(0x7f0000000700)={'syz', 0x3}, 0x0, 0xfffffffffffffffd) r3 = add_key(&(0x7f0000000380)='id_resolver\x00', &(0x7f0000000400)={'syz', 0x3}, &(0x7f0000000440)="e09e6dda135ac7c467011f", 0xb, r0) keyctl$search(0xa, r1, 0x0, &(0x7f0000000340)={'syz', 0x1}, r3) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000140)='cpuset\x00', 0x0, 0x0) add_key$keyring(&(0x7f0000000100), &(0x7f0000000180)={'syz', 0x0}, 0x0, 0x0, r0) r4 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r5 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) open(&(0x7f00000002c0)='./file0\x00', 0x98d00, 0x8) request_key(&(0x7f0000000580)='logon\x00', 0x0, &(0x7f0000000600)='\x1f-)\x00', 0xfffffffffffffff9) add_key$fscrypt_provisioning(&(0x7f0000000480), &(0x7f00000004c0)={'syz', 0x0}, &(0x7f0000000640)=ANY=[], 0x48, r0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = openat$cgroup_int(r4, &(0x7f00000001c0)='cpuset.sched_load_balance\x00', 0x2, 0x0) dup3(r7, r4, 0x0) r8 = add_key$keyring(&(0x7f0000000540), &(0x7f0000000640)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffc) r9 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000980), 0x200000, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r5, 0x81f8943c, &(0x7f000001a000)={0x0, ""/256, 0x0, 0x0, 0x0, 0x0, ""/16, ""/16, ""/16, 0x0}) ioctl$BTRFS_IOC_SUBVOL_CREATE_V2(r6, 0x50009418, &(0x7f000001a200)={{r9}, r10, 0x2, @inherit={0x58, &(0x7f00000009c0)={0x1, 0x2, 0x8, 0x7, {0x14, 0x1000, 0x5, 0x7}, [0xffff, 0x0]}}, @subvolid=0x4}) keyctl$search(0xa, r3, 0x0, &(0x7f0000000500)={'syz', 0x0}, r8) writev(r4, &(0x7f0000000300)=[{&(0x7f00000000c0)='0', 0xc000}, {&(0x7f00000003c0)='7', 0x1}], 0x2) [ 2015.660336] hfs: unable to parse mount options [ 2015.667231] new mount options do not match the existing superblock, will be ignored [ 2015.676394] hfs: uid requires an argument [ 2015.680733] hfs: unable to parse mount options 16:34:59 executing program 1: syz_mount_image$hfs(&(0x7f0000000240), &(0x7f0000000380)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x3, &(0x7f0000000780)=ANY=[@ANYBLOB='quiet,gid=', @ANYRESHEX, @ANYBLOB="2c2a7270653d7614866b2c75693df589299908000000450000005d38ff0c0071446a0c48dba349ba347528523876dc8d7918ecea1024ba9669ff19a9ab5e27062b1dae8d8c0eb880008164ed9d8093fdc35f282dee56df9531b6e0c94b43c314af69146a70075499da5e7f927d3c672787e3d33a6071ff2c1483a1a7cfb34131bfee72f86068d0966d", @ANYRESHEX, @ANYBLOB=',codepage=ascii,rootcontext=sysadm_u,\x00'], 0x1, 0x235, &(0x7f0000000000)="$eJzs3U9rE0EYx/HfTKJGW+r2jwgeqwVP0upFvCiSF+FJ1CZCMVTQCupJPIsvwLtvwRfhSXwDevLkC8htZZ6dNNuYzabVZGj7/UDCtjvPzjOd3c48gVIBOLXut398vvUrvJzUUEPSHclLaklNSZd0ufVqd29nr9ftTLpQwyLCy6mIdH+12d7tjgsNcRYRZeGrphbL38Ns5Hme/0ydBJKzp38ML52LT6edb809s9l4lzqBxFxffb3WUuo8AABpxfXfx3V+Me7fvZc24rJ/otb/fuoEEiut/1Zl5S7M70U7Naz3rIQL5/2gSjxKX2dV3FkHNpiurqq0XPz5pzu97o3t572O13vdjUrN1uy9U9y6AzXZro+pTSc4+tgXbAxnwhhuVuS/+n97rOe+um/uocv0SZ39/V8zd2GabKaykZkq8t+svqKNMitaVYxy2Tq5EnuIakbZGl+RaHBHLevgBwRZXZ4WtTISVYxuqyZqdSTqXjGnNVFro30N7+bqyFlzH90Dt67f+qJ2af/vw097Q9M8maGNtYx3xsTxNK1lNkVi/lDDwL/5oCe6raWXb94+e9zrdV9wwAEHHOwfpP4FhXkYTnrqTJBI2He5ov4r1SubViKFt2zCPj2vu3jpilsVtcGKvV84VAW3UF3BTVtzXb0uXZu+xyzmeUK4tr7rEZ//AwAAAAAAAAAAAAAAAAAAHDfz+HOC1GMEAAAAAAAAAAAAAAAAAAAAAOC44///AqfXnwAAAP//yLiCVg==") 16:34:59 executing program 4: r0 = request_key(0x0, 0x0, 0x0, 0xfffffffffffffffd) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) r1 = add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000780)='./file0\x00', &(0x7f0000000840)='gadgetfs\x00', 0x0, &(0x7f0000000880)='keyring\x00') perf_event_open(&(0x7f00000007c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x12c00, 0x0, 0xe5e}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) writev(0xffffffffffffffff, 0x0, 0x0) keyctl$read(0xb, 0x0, &(0x7f0000000a40)=""/102400, 0x19000) keyctl$search(0xa, 0x0, 0x0, 0x0, 0xfffffffffffffffd) request_key(&(0x7f00000006c0)='dns_resolver\x00', &(0x7f0000000700)={'syz', 0x3}, &(0x7f0000000940)='\x00', 0xfffffffffffffffd) r2 = add_key(&(0x7f0000000380)='id_resolver\x00', 0x0, &(0x7f0000000440), 0x0, r0) keyctl$search(0xa, r1, 0x0, &(0x7f0000000340)={'syz', 0x1}, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000140)='cpuset\x00', 0x0, 0x0) add_key$keyring(&(0x7f0000000100), 0x0, 0x0, 0x0, r0) r3 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r4 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) open(&(0x7f00000002c0)='./file0\x00', 0x98d00, 0x8) request_key(&(0x7f0000000580)='logon\x00', &(0x7f00000005c0)={'syz', 0x0}, &(0x7f0000000600)='\x1f-)\x00', 0xfffffffffffffff9) write$rfkill(r4, &(0x7f0000000040)={0x0, 0x0, 0x3}, 0x8) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = openat$cgroup_int(r3, &(0x7f00000001c0)='cpuset.sched_load_balance\x00', 0x2, 0x0) dup3(r6, r3, 0x0) r7 = add_key$keyring(&(0x7f0000000540), &(0x7f0000000640)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffc) r8 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000980), 0x200000, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r4, 0x81f8943c, &(0x7f000001a000)={0x0, ""/256, 0x0, 0x0, 0x0, 0x0, ""/16, ""/16, ""/16, 0x0}) ioctl$BTRFS_IOC_SUBVOL_CREATE_V2(r5, 0x50009418, &(0x7f000001a200)={{r8}, r9, 0x2, @inherit={0x58, &(0x7f00000009c0)={0x1, 0x2, 0x8, 0x7, {0x14, 0x1000, 0x5, 0x7, 0x4}, [0xffff, 0x3]}}, @subvolid=0x4}) ioctl$BTRFS_IOC_BALANCE(r5, 0x5000940c, 0x0) keyctl$search(0xa, r2, &(0x7f0000000200)='keyring\x00', &(0x7f0000000500)={'syz', 0x0}, r7) writev(r3, &(0x7f0000000300)=[{&(0x7f00000000c0)='0', 0x1}, {&(0x7f00000003c0)='7', 0x1}], 0x2) 16:34:59 executing program 2: r0 = request_key(0x0, 0x0, 0x0, 0xfffffffffffffffd) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) perf_event_open(&(0x7f00000007c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0xe5e}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) keyctl$read(0xb, 0x0, &(0x7f0000000a40)=""/102400, 0x19000) keyctl$search(0xa, 0x0, &(0x7f00000008c0)='keyring\x00', &(0x7f0000000900)={'syz', 0x1}, 0xfffffffffffffffd) request_key(&(0x7f00000006c0)='dns_resolver\x00', &(0x7f0000000700)={'syz', 0x3}, &(0x7f0000000940)='\x00', 0xfffffffffffffffd) add_key(0x0, &(0x7f0000000400)={'syz', 0x3}, &(0x7f0000000440), 0x0, r0) keyctl$search(0xa, 0x0, 0x0, &(0x7f0000000340)={'syz', 0x1}, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000140)='cpuset\x00', 0x0, 0x0) add_key$keyring(&(0x7f0000000100), 0x0, 0x0, 0x0, r0) r1 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) request_key(0x0, &(0x7f00000005c0)={'syz', 0x0}, 0x0, 0xfffffffffffffff9) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = openat$cgroup_int(r1, &(0x7f00000001c0)='cpuset.sched_load_balance\x00', 0x2, 0x0) dup3(r3, r1, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x200000, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f000001a000)={0x0, ""/256, 0x0, 0x0, 0x0, 0x0, ""/16, ""/16, ""/16, 0x0}) ioctl$BTRFS_IOC_SUBVOL_CREATE_V2(r2, 0x50009418, &(0x7f000001a200)={{}, r4, 0x2, @inherit={0x58, &(0x7f00000009c0)={0x1, 0x2, 0x8, 0x0, {0x0, 0x0, 0x0, 0x0, 0x4}, [0x0, 0x0]}}, @subvolid=0x4}) ioctl$BTRFS_IOC_BALANCE(0xffffffffffffffff, 0x5000940c, 0x0) keyctl$search(0xa, 0x0, &(0x7f0000000200)='keyring\x00', &(0x7f0000000500)={'syz', 0x0}, 0x0) writev(r1, &(0x7f0000000300)=[{&(0x7f00000003c0)}], 0x1) 16:34:59 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000140)={0x0, 0x0}, &(0x7f0000cab000)=0x6e) syz_mount_image$hfs(&(0x7f0000000240), &(0x7f0000000380)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x3, &(0x7f0000000280)={[{}, {@part={'part', 0x3d, 0x10001}}, {@type={'type', 0x3d, "7614866b"}}, {@uid={'uid', 0x3d, r1}}, {@session={'session', 0x3d, 0xff}}], [{@rootcontext={'rootcontext', 0x3d, 'user_u'}}]}, 0x1, 0x235, &(0x7f0000000000)="$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") [ 2015.787578] new mount options do not match the existing superblock, will be ignored [ 2015.825692] new mount options do not match the existing superblock, will be ignored [ 2015.831270] hfs: invalid gid -1 16:35:00 executing program 5: r0 = request_key(0x0, 0x0, 0x0, 0xfffffffffffffffd) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) r1 = add_key$keyring(0x0, &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000740)=@filename='./file0\x00', &(0x7f0000000780)='./file0\x00', &(0x7f0000000840)='gadgetfs\x00', 0x10, &(0x7f0000000880)='keyring\x00') perf_event_open(&(0x7f00000007c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x12c00, 0x0, 0xe5e}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) writev(0xffffffffffffffff, 0x0, 0x0) r2 = add_key(&(0x7f0000000240)='big_key\x00', &(0x7f0000000280)={'syz', 0x3}, &(0x7f0000019a40)="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", 0x5bd, 0xfffffffffffffffd) keyctl$read(0xb, r2, &(0x7f0000000a40)=""/102400, 0x19000) keyctl$search(0xa, r2, &(0x7f00000008c0)='keyring\x00', &(0x7f0000000900)={'syz', 0x1}, 0xfffffffffffffffd) request_key(&(0x7f00000006c0)='dns_resolver\x00', &(0x7f0000000700)={'syz', 0x3}, &(0x7f0000000940)='\x00', 0xfffffffffffffffd) r3 = add_key(&(0x7f0000000380)='id_resolver\x00', &(0x7f0000000400)={'syz', 0x3}, &(0x7f0000000440)="e09e6dda135ac7c467011f", 0xb, r0) keyctl$search(0xa, r1, 0x0, &(0x7f0000000340)={'syz', 0x1}, r3) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000140)='cpuset\x00', 0x0, 0x0) add_key$keyring(&(0x7f0000000100), &(0x7f0000000180)={'syz', 0x0}, 0x0, 0x0, r0) r4 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r5 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) request_key(&(0x7f0000000580)='logon\x00', &(0x7f00000005c0)={'syz', 0x0}, &(0x7f0000000600)='\x1f-)\x00', 0xfffffffffffffff9) add_key$fscrypt_provisioning(&(0x7f0000000480), &(0x7f00000004c0)={'syz', 0x0}, &(0x7f0000000640)=ANY=[], 0x48, r0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = openat$cgroup_int(r4, &(0x7f00000001c0)='cpuset.sched_load_balance\x00', 0x2, 0x0) dup3(r7, r4, 0x0) add_key$keyring(&(0x7f0000000540), &(0x7f0000000640)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffc) r8 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000980), 0x200000, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r5, 0x81f8943c, &(0x7f000001a000)={0x0, ""/256, 0x0, 0x0, 0x0, 0x0, ""/16, ""/16, ""/16, 0x0}) ioctl$BTRFS_IOC_SUBVOL_CREATE_V2(r6, 0x50009418, &(0x7f000001a200)={{r8}, r9, 0x2, @inherit={0x58, &(0x7f00000009c0)={0x1, 0x2, 0x8, 0x7, {0x14, 0x1000, 0x5, 0x7, 0x4}, [0xffff, 0x3]}}, @subvolid=0x4}) writev(r4, &(0x7f0000000300)=[{&(0x7f00000000c0)='0', 0x1}, {&(0x7f00000003c0)='7', 0x1}], 0x2) [ 2015.853663] new mount options do not match the existing superblock, will be ignored [ 2015.867181] hfs: unable to parse mount options [ 2015.893424] new mount options do not match the existing superblock, will be ignored 16:35:00 executing program 1: syz_mount_image$hfs(&(0x7f0000000240), &(0x7f0000000380)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x3, &(0x7f0000000780)=ANY=[@ANYBLOB='quiet,gid=', @ANYRESHEX, @ANYBLOB="2c2a7270653d7614866b2c75693df589299908000000450000005d38ff0c0071446a0c48dba349ba347528523876dc8d7918ecea1024ba9669ff19a9ab5e27062b1dae8d8c0eb880008164ed9d8093fdc35f282dee56df9531b6e0c94b43c314af69146a70075499da5e7f927d3c672787e3d33a6071ff2c1483a1a7cfb34131bfee72f86068d0966d", @ANYRESHEX, @ANYBLOB=',codepage=ascii,rootcontext=sysadm_u,\x00'], 0x1, 0x235, &(0x7f0000000000)="$eJzs3U9rE0EYx/HfTKJGW+r2jwgeqwVP0upFvAiSF+HJf02EYqigFdSTeBZfgHffgi/Ck/gG9OTJF5Dbyjw7abYxm02rydD2+4GEbXeenWc6u515AqUCcGrda//4fOtXeDmpoYakO5KX1JKaki7pcuvV7t7OXq/bmXShhkWEl1MR6f5qs73bHRca4iwiysJXTS2Wv4fZyPM8/5k6CSRnT/8YXjoXn04735p7ZrPxLnUCibm++nqtpdR5AADSiuu/j+v8Yty/ey9txGX/RK3//dQJJFZa/63Kyl2Y34t2aljvWQkXzvtBlXiUvs6quLMObDBdXVVpufjzT3d63Rvbz3sdr/e6G5Wardl7p7h1B2qyXR9Tm05w9LEv2BjOhDHcrMh/9f/2WM99dd/cA5fpkzr7+79m7sI02UxlIzNV5L9ZfUUbZVa0qhjlsnVyJfYQ1YyyNb4i0eCOWtbBDwiyujwtamUkqhjdVk3U6kjUw2JOa6LWRvsa3s3VkbPmPrr7bl2/9UXt0v7fh5/2hqZ5MkMbaxnvjInjaVrLbIrE/KGGgX/zQU90W0sv37x99rjX677ggAMOONg/SP0LCvMwnPTUmSCRsO9yRf1Xqlc2rUQKb9mEfXped/HSFbcqaoMVe79wqApuobqCm7bmunpdujZ9j1nM84RwbX3XIz7/BwAAAAAAAAAAAAAAAAAAOG7m8ecEqccIAAAAAAAAAAAAAAAAAAAAAMBxx///BU6vPwEAAP//t9KCdQ==") [ 2015.928591] hfs: uid requires an argument [ 2015.945232] hfs: unable to parse mount options 16:35:00 executing program 3: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket(0x10, 0x2, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000280)='quiet') getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000140)={0x0, 0x0}, &(0x7f0000cab000)=0x6e) syz_mount_image$hfs(&(0x7f0000000240), &(0x7f0000000380)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x3, &(0x7f0000000400)={[{}, {@part={'part', 0x3d, 0x10000}}, {@type={'type', 0x3d, "7614866b"}}, {@uid={'uid', 0x3d, r2}}, {@codepage={'codepage', 0x3d, 'ascii'}}], [{@rootcontext={'rootcontext', 0x3d, 'sysadm_u'}}]}, 0x1, 0x235, &(0x7f0000000000)="$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") 16:35:00 executing program 2: r0 = request_key(0x0, 0x0, 0x0, 0xfffffffffffffffd) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) perf_event_open(&(0x7f00000007c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0xe5e}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) keyctl$read(0xb, 0x0, &(0x7f0000000a40)=""/102400, 0x19000) keyctl$search(0xa, 0x0, &(0x7f00000008c0)='keyring\x00', &(0x7f0000000900)={'syz', 0x1}, 0xfffffffffffffffd) request_key(&(0x7f00000006c0)='dns_resolver\x00', &(0x7f0000000700)={'syz', 0x3}, &(0x7f0000000940)='\x00', 0xfffffffffffffffd) add_key(0x0, &(0x7f0000000400)={'syz', 0x3}, &(0x7f0000000440), 0x0, r0) keyctl$search(0xa, 0x0, 0x0, &(0x7f0000000340)={'syz', 0x1}, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000140)='cpuset\x00', 0x0, 0x0) add_key$keyring(&(0x7f0000000100), 0x0, 0x0, 0x0, r0) r1 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) request_key(0x0, &(0x7f00000005c0)={'syz', 0x0}, 0x0, 0xfffffffffffffff9) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = openat$cgroup_int(r1, &(0x7f00000001c0)='cpuset.sched_load_balance\x00', 0x2, 0x0) dup3(r3, r1, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x200000, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f000001a000)={0x0, ""/256, 0x0, 0x0, 0x0, 0x0, ""/16, ""/16, ""/16, 0x0}) ioctl$BTRFS_IOC_SUBVOL_CREATE_V2(r2, 0x50009418, &(0x7f000001a200)={{}, r4, 0x2, @inherit={0x58, &(0x7f00000009c0)={0x1, 0x2, 0x8, 0x0, {0x0, 0x0, 0x0, 0x0, 0x4}, [0x0, 0x0]}}, @subvolid=0x4}) ioctl$BTRFS_IOC_BALANCE(0xffffffffffffffff, 0x5000940c, 0x0) keyctl$search(0xa, 0x0, &(0x7f0000000200)='keyring\x00', &(0x7f0000000500)={'syz', 0x0}, 0x0) writev(r1, &(0x7f0000000300)=[{0x0}, {&(0x7f00000003c0)}], 0x2) 16:35:00 executing program 0: r0 = request_key(0x0, 0x0, 0x0, 0xfffffffffffffffd) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) r1 = add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000740)=@filename='./file0\x00', &(0x7f0000000780)='./file0\x00', &(0x7f0000000840)='gadgetfs\x00', 0x0, &(0x7f0000000880)='keyring\x00') perf_event_open(&(0x7f00000007c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x12c00, 0x0, 0xe5e}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) writev(0xffffffffffffffff, 0x0, 0x0) r2 = add_key(0x0, &(0x7f0000000280)={'syz', 0x3}, &(0x7f0000019a40)="4195738ac28ccd83aa93c4ecacdaca3d34104be4cc5531c4091facf7f777321e84e49e039122a2d1cf7fea6a02aac8944c27ba038156bc10c0f7a6b26fbf382f67959d856600881f0e692c60f12ace775aab8d775dc2586454918a0db1811f5e8086f1a9805166c870b8387d380d5115af5841dad21f629e05f4b51e362c46b58a7dc2855c5189bff60d02c05ba67c297aa0ad05b93b1ee2fffae13fe5764d4e2a214e15093841b1551d518a669fa94e8918bfdd6573d5c0275a9b91ddb843775f78574891e03697f6ca290be6599b671093898a82e7905ed7c7fd8e8b422ebf12e5b543885596fc5c305d497407ffe73bd543f79c983f0807ae7e13fb5053fd7a07dddf8ec739418b59d67219f008f540161cec3bfd1b3097aad497248b221d572a9eb1bad6d921fcdcfdfacf8d1e392635168747056ec8a3fc45b3027293a517d50ea789294f132f2392919dc81ba5eb02e27e116cc300000000b6c0e39688425a3cb17d35f4b1eec0a37193f233c6655c6f40c09b4ea04c8880a431a8274127d56c3c8cab73a5fcf2b604b83658344e323eeedb0b283b0b3616236e904a42fed9fc8f4c131b047bfd5d7586e6a28032a4584fd5933472ce49dfdc99976166bb37eb1679b22249a222ffab17948dd6cc6f23f42ecd32a980ab8fc7c7d2da1a91f1db1187066c144bcbdb46240b7ef7ed28da4a358295b6104e4c60b09654e79f766e19e44174e94fa41d358d3dd901c060a06a388727be1092a37c0015695b1363ed018e724947983aa6b5974daf6388547cdacbd44a1282c3b9130cbf9536c29a523980b9e4328d1a7c0de8b636d7dfdee36434125948b1d802d5d143645c3a5f8da50adeef6e4f715361908a20cb998d3e0907aef9fdd19bb79be8c510b8aa04600163636c1d1f36f3834ffa3c7369e1d8ed9348bc339da2a525c4f165c0caebb7a4ee632a37a43897084e3c07a5ed8b505a51a4777095060b0ff6a6442206244dd9a13b5ba52b07c718e9eaad10befd12be35dc50283d584035d75e4917548ff58045b88d29b6826ceb6d44fb54ba3ef7944da6e86c0f2d0bc0bd725aa9193b3de4837634ead361d9b2ff5ae4de005f53d48cba029b43eb35fbedd0b5397918a9324b6e1f1d88399d8ad69b7d79e89ded6fe81fd1200f95c831f8c60dc1483e97052f61d0a643df0c2e1b0ba7d00b0692efd1bfc1ece10c2e785e3cb3b0dfbdbd722b6e53e5a2884b1cc5d939a572564bc8a2260e8718230878edb3a877f5c585f4373ef8e0e1cff5dacf96862906ff37eec18ba706d22b101965eaf5f5e29f544977896117e25ceb572f3443eddf9651c2ac69c911b21fd69e59ee57ebe4c549ff2a3dcd904656663039789f022a6caa7f76640e75efdba82dabacf8c0112bd4e62a3a9e69a9824c1af45cf86b307d9749937dd08b6ef49860cda5da7bb886f92db7cd43a869aa646a6da291a75ff28c4d728b1377b8e80233b33e724a60c0a015ec75cd86af04a4bd43964d8f7ba781a99d0cd7ff7e189fc91801655cb1b60e6bc3af747655341deceadbed3d76bdfae92389cc87c417e0f58f3fbcc56ff347467a20773146a81090ff42bbb5383d74108028f5fa532c647746054c312e2e4c085f58d93bec6da7c2bfd99fc59c1631cc71110acc2bf352b994e2a246be3cc1d240fa0c60eb04b92a9673d2ac2bba7f322ddbbd74712b0ec459050586523bd0b0505174a701206e47f2bb7fe20caf5ed73d33447b89432802e7d4606512e217aedf78c871e10cfbdf202efbf3fd8495b6be18cde726dc1fefc01921e9d1f15c8301376c33b5a698d0f7d5f317835d74857e121fe820d93f6b757c9938ec81f9b19a4b0d4ed35d1309fbcb285cf7717e9e27aaaba9d7d742fcfd786eacd993fb119e1d52908ca7ce2135046fa95805704c6258fd1b5fc1434af7ab99609820d73627080d43bcaeeb42ce423e17aa4df3a6994ead3133e2ecfbc6fa308c6b71b78cbab273641970b49e15d0dbe7aea716eaf6cf40f90d0d7d3d8bf1d165d25d5f6f6376416b9dd13731c5c2fdadee8e48c76430cccb21d8e6c659", 0x5bd, 0xfffffffffffffffd) keyctl$read(0xb, r2, &(0x7f0000000a40)=""/102400, 0x19000) keyctl$search(0xa, r2, &(0x7f00000008c0)='keyring\x00', &(0x7f0000000900)={'syz', 0x1}, 0xfffffffffffffffd) request_key(&(0x7f00000006c0)='dns_resolver\x00', &(0x7f0000000700)={'syz', 0x3}, 0x0, 0xfffffffffffffffd) r3 = add_key(&(0x7f0000000380)='id_resolver\x00', &(0x7f0000000400)={'syz', 0x3}, &(0x7f0000000440)="e09e6dda135ac7c467011f", 0xb, r0) keyctl$search(0xa, r1, 0x0, &(0x7f0000000340)={'syz', 0x1}, r3) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000140)='cpuset\x00', 0x0, 0x0) add_key$keyring(&(0x7f0000000100), &(0x7f0000000180)={'syz', 0x0}, 0x0, 0x0, r0) r4 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r5 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) open(&(0x7f00000002c0)='./file0\x00', 0x98d00, 0x8) request_key(&(0x7f0000000580)='logon\x00', 0x0, &(0x7f0000000600)='\x1f-)\x00', 0xfffffffffffffff9) add_key$fscrypt_provisioning(&(0x7f0000000480), &(0x7f00000004c0)={'syz', 0x0}, &(0x7f0000000640)=ANY=[], 0x48, r0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = openat$cgroup_int(r4, &(0x7f00000001c0)='cpuset.sched_load_balance\x00', 0x2, 0x0) dup3(r7, r4, 0x0) r8 = add_key$keyring(&(0x7f0000000540), &(0x7f0000000640)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffc) r9 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000980), 0x200000, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r5, 0x81f8943c, &(0x7f000001a000)={0x0, ""/256, 0x0, 0x0, 0x0, 0x0, ""/16, ""/16, ""/16, 0x0}) ioctl$BTRFS_IOC_SUBVOL_CREATE_V2(r6, 0x50009418, &(0x7f000001a200)={{r9}, r10, 0x2, @inherit={0x58, &(0x7f00000009c0)={0x1, 0x2, 0x8, 0x7, {0x14, 0x1000, 0x5, 0x7}, [0xffff, 0x0]}}, @subvolid=0x4}) keyctl$search(0xa, r3, 0x0, &(0x7f0000000500)={'syz', 0x0}, r8) writev(r4, &(0x7f0000000300)=[{&(0x7f00000000c0)='0', 0xc100}, {&(0x7f00000003c0)='7', 0x1}], 0x2) 16:35:00 executing program 4: r0 = request_key(0x0, 0x0, 0x0, 0xfffffffffffffffd) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) r1 = add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000780)='./file0\x00', &(0x7f0000000840)='gadgetfs\x00', 0x0, &(0x7f0000000880)='keyring\x00') perf_event_open(&(0x7f00000007c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x12c00, 0x0, 0xe5e}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) writev(0xffffffffffffffff, 0x0, 0x0) keyctl$read(0xb, 0x0, &(0x7f0000000a40)=""/102400, 0x19000) keyctl$search(0xa, 0x0, 0x0, 0x0, 0xfffffffffffffffd) request_key(&(0x7f00000006c0)='dns_resolver\x00', &(0x7f0000000700)={'syz', 0x3}, &(0x7f0000000940)='\x00', 0xfffffffffffffffd) r2 = add_key(&(0x7f0000000380)='id_resolver\x00', 0x0, &(0x7f0000000440), 0x0, r0) keyctl$search(0xa, r1, 0x0, &(0x7f0000000340)={'syz', 0x1}, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000140)='cpuset\x00', 0x0, 0x0) add_key$keyring(&(0x7f0000000100), &(0x7f0000000180)={'syz', 0x0}, 0x0, 0x0, 0x0) r3 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r4 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) open(&(0x7f00000002c0)='./file0\x00', 0x98d00, 0x8) request_key(&(0x7f0000000580)='logon\x00', &(0x7f00000005c0)={'syz', 0x0}, &(0x7f0000000600)='\x1f-)\x00', 0xfffffffffffffff9) write$rfkill(r4, &(0x7f0000000040)={0x0, 0x0, 0x3}, 0x8) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = openat$cgroup_int(r3, &(0x7f00000001c0)='cpuset.sched_load_balance\x00', 0x2, 0x0) dup3(r6, r3, 0x0) r7 = add_key$keyring(&(0x7f0000000540), &(0x7f0000000640)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffc) r8 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000980), 0x200000, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r4, 0x81f8943c, &(0x7f000001a000)={0x0, ""/256, 0x0, 0x0, 0x0, 0x0, ""/16, ""/16, ""/16, 0x0}) ioctl$BTRFS_IOC_SUBVOL_CREATE_V2(r5, 0x50009418, &(0x7f000001a200)={{r8}, r9, 0x2, @inherit={0x58, &(0x7f00000009c0)={0x1, 0x2, 0x8, 0x7, {0x14, 0x1000, 0x5, 0x7, 0x4}, [0xffff, 0x3]}}, @subvolid=0x4}) ioctl$BTRFS_IOC_BALANCE(r5, 0x5000940c, 0x0) keyctl$search(0xa, r2, &(0x7f0000000200)='keyring\x00', &(0x7f0000000500)={'syz', 0x0}, r7) writev(r3, &(0x7f0000000300)=[{&(0x7f00000000c0)='0', 0x1}, {&(0x7f00000003c0)='7', 0x1}], 0x2) [ 2016.056397] new mount options do not match the existing superblock, will be ignored [ 2016.056699] hfs: invalid gid -1 [ 2016.077857] hfs: uid requires an argument [ 2016.082022] hfs: unable to parse mount options 16:35:00 executing program 5: r0 = request_key(0x0, 0x0, 0x0, 0xfffffffffffffffd) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) r1 = add_key$keyring(0x0, &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000740)=@filename='./file0\x00', &(0x7f0000000780)='./file0\x00', &(0x7f0000000840)='gadgetfs\x00', 0x10, &(0x7f0000000880)='keyring\x00') perf_event_open(&(0x7f00000007c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x12c00, 0x0, 0xe5e}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) writev(0xffffffffffffffff, 0x0, 0x0) r2 = add_key(&(0x7f0000000240)='big_key\x00', &(0x7f0000000280)={'syz', 0x3}, &(0x7f0000019a40)="4195738ac28ccd83aa93c4ecacdaca3d34104be4cc5531c4091facf7f777321e84e49e039122a2d1cf7fea6a02aac8944c27ba038156bc10c0f7a6b26fbf382f67959d856600881f0e692c60f12ace775aab8d775dc2586454918a0db1811f5e8086f1a9805166c870b8387d380d5115af5841dad21f629e05f4b51e362c46b58a7dc2855c5189bff60d02c05ba67c297aa0ad05b93b1ee2fffae13fe5764d4e2a214e15093841b1551d518a669fa94e8918bfdd6573d5c0275a9b91ddb843775f78574891e03697f6ca290be6599b671093898a82e7905ed7c7fd8e8b422ebf12e5b543885596fc5c305d497407ffe73bd543f79c983f0807ae7e13fb5053fd7a07dddf8ec739418b59d67219f008f540161cec3bfd1b3097aad497248b221d572a9eb1bad6d921fcdcfdfacf8d1e392635168747056ec8a3fc45b3027293a517d50ea789294f132f2392919dc81ba5eb02e27e116cc300000000b6c0e39688425a3cb17d35f4b1eec0a37193f233c6655c6f40c09b4ea04c8880a431a8274127d56c3c8cab73a5fcf2b604b83658344e323eeedb0b283b0b3616236e904a42fed9fc8f4c131b047bfd5d7586e6a28032a4584fd5933472ce49dfdc99976166bb37eb1679b22249a222ffab17948dd6cc6f23f42ecd32a980ab8fc7c7d2da1a91f1db1187066c144bcbdb46240b7ef7ed28da4a358295b6104e4c60b09654e79f766e19e44174e94fa41d358d3dd901c060a06a388727be1092a37c0015695b1363ed018e724947983aa6b5974daf6388547cdacbd44a1282c3b9130cbf9536c29a523980b9e4328d1a7c0de8b636d7dfdee36434125948b1d802d5d143645c3a5f8da50adeef6e4f715361908a20cb998d3e0907aef9fdd19bb79be8c510b8aa04600163636c1d1f36f3834ffa3c7369e1d8ed9348bc339da2a525c4f165c0caebb7a4ee632a37a43897084e3c07a5ed8b505a51a4777095060b0ff6a6442206244dd9a13b5ba52b07c718e9eaad10befd12be35dc50283d584035d75e4917548ff58045b88d29b6826ceb6d44fb54ba3ef7944da6e86c0f2d0bc0bd725aa9193b3de4837634ead361d9b2ff5ae4de005f53d48cba029b43eb35fbedd0b5397918a9324b6e1f1d88399d8ad69b7d79e89ded6fe81fd1200f95c831f8c60dc1483e97052f61d0a643df0c2e1b0ba7d00b0692efd1bfc1ece10c2e785e3cb3b0dfbdbd722b6e53e5a2884b1cc5d939a572564bc8a2260e8718230878edb3a877f5c585f4373ef8e0e1cff5dacf96862906ff37eec18ba706d22b101965eaf5f5e29f544977896117e25ceb572f3443eddf9651c2ac69c911b21fd69e59ee57ebe4c549ff2a3dcd904656663039789f022a6caa7f76640e75efdba82dabacf8c0112bd4e62a3a9e69a9824c1af45cf86b307d9749937dd08b6ef49860cda5da7bb886f92db7cd43a869aa646a6da291a75ff28c4d728b1377b8e80233b33e724a60c0a015ec75cd86af04a4bd43964d8f7ba781a99d0cd7ff7e189fc91801655cb1b60e6bc3af747655341deceadbed3d76bdfae92389cc87c417e0f58f3fbcc56ff347467a20773146a81090ff42bbb5383d74108028f5fa532c647746054c312e2e4c085f58d93bec6da7c2bfd99fc59c1631cc71110acc2bf352b994e2a246be3cc1d240fa0c60eb04b92a9673d2ac2bba7f322ddbbd74712b0ec459050586523bd0b0505174a701206e47f2bb7fe20caf5ed73d33447b89432802e7d4606512e217aedf78c871e10cfbdf202efbf3fd8495b6be18cde726dc1fefc01921e9d1f15c8301376c33b5a698d0f7d5f317835d74857e121fe820d93f6b757c9938ec81f9b19a4b0d4ed35d1309fbcb285cf7717e9e27aaaba9d7d742fcfd786eacd993fb119e1d52908ca7ce2135046fa95805704c6258fd1b5fc1434af7ab99609820d73627080d43bcaeeb42ce423e17aa4df3a6994ead3133e2ecfbc6fa308c6b71b78cbab273641970b49e15d0dbe7aea716eaf6cf40f90d0d7d3d8bf1d165d25d5f6f6376416b9dd13731c5c2fdadee8e48c76430cccb21d8e6c659", 0x5bd, 0xfffffffffffffffd) keyctl$read(0xb, r2, &(0x7f0000000a40)=""/102400, 0x19000) keyctl$search(0xa, r2, &(0x7f00000008c0)='keyring\x00', &(0x7f0000000900)={'syz', 0x1}, 0xfffffffffffffffd) request_key(&(0x7f00000006c0)='dns_resolver\x00', &(0x7f0000000700)={'syz', 0x3}, &(0x7f0000000940)='\x00', 0xfffffffffffffffd) r3 = add_key(&(0x7f0000000380)='id_resolver\x00', &(0x7f0000000400)={'syz', 0x3}, &(0x7f0000000440)="e09e6dda135ac7c467011f", 0xb, r0) keyctl$search(0xa, r1, 0x0, &(0x7f0000000340)={'syz', 0x1}, r3) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000140)='cpuset\x00', 0x0, 0x0) add_key$keyring(&(0x7f0000000100), &(0x7f0000000180)={'syz', 0x0}, 0x0, 0x0, r0) r4 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r5 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) request_key(&(0x7f0000000580)='logon\x00', &(0x7f00000005c0)={'syz', 0x0}, &(0x7f0000000600)='\x1f-)\x00', 0xfffffffffffffff9) add_key$fscrypt_provisioning(&(0x7f0000000480), &(0x7f00000004c0)={'syz', 0x0}, &(0x7f0000000640)=ANY=[], 0x48, r0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = openat$cgroup_int(r4, &(0x7f00000001c0)='cpuset.sched_load_balance\x00', 0x2, 0x0) dup3(r7, r4, 0x0) add_key$keyring(&(0x7f0000000540), &(0x7f0000000640)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffc) r8 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000980), 0x200000, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r5, 0x81f8943c, &(0x7f000001a000)={0x0, ""/256, 0x0, 0x0, 0x0, 0x0, ""/16, ""/16, ""/16, 0x0}) ioctl$BTRFS_IOC_SUBVOL_CREATE_V2(r6, 0x50009418, &(0x7f000001a200)={{r8}, r9, 0x2, @inherit={0x58, &(0x7f00000009c0)={0x1, 0x2, 0x8, 0x7, {0x14, 0x1000, 0x5, 0x7, 0x4}, [0xffff, 0x3]}}, @subvolid=0x4}) writev(r4, &(0x7f0000000300)=[{&(0x7f00000000c0)='0', 0x1}, {&(0x7f00000003c0)='7', 0x1}], 0x2) 16:35:00 executing program 3: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) r1 = socket(0x10, 0x2, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000280)='quiet') (async) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000140)={0x0, 0x0}, &(0x7f0000cab000)=0x6e) syz_mount_image$hfs(&(0x7f0000000240), &(0x7f0000000380)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x3, &(0x7f0000000400)={[{}, {@part={'part', 0x3d, 0x10000}}, {@type={'type', 0x3d, "7614866b"}}, {@uid={'uid', 0x3d, r2}}, {@codepage={'codepage', 0x3d, 'ascii'}}], [{@rootcontext={'rootcontext', 0x3d, 'sysadm_u'}}]}, 0x1, 0x235, &(0x7f0000000000)="$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") [ 2016.121870] new mount options do not match the existing superblock, will be ignored [ 2016.142252] hfs: unable to parse mount options [ 2016.158642] new mount options do not match the existing superblock, will be ignored 16:35:00 executing program 2: r0 = request_key(0x0, 0x0, 0x0, 0xfffffffffffffffd) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) perf_event_open(&(0x7f00000007c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0xe5e}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) keyctl$read(0xb, 0x0, &(0x7f0000000a40)=""/102400, 0x19000) keyctl$search(0xa, 0x0, &(0x7f00000008c0)='keyring\x00', &(0x7f0000000900)={'syz', 0x1}, 0xfffffffffffffffd) request_key(&(0x7f00000006c0)='dns_resolver\x00', &(0x7f0000000700)={'syz', 0x3}, &(0x7f0000000940)='\x00', 0xfffffffffffffffd) add_key(0x0, &(0x7f0000000400)={'syz', 0x3}, &(0x7f0000000440), 0x0, r0) keyctl$search(0xa, 0x0, 0x0, &(0x7f0000000340)={'syz', 0x1}, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000140)='cpuset\x00', 0x0, 0x0) add_key$keyring(&(0x7f0000000100), 0x0, 0x0, 0x0, r0) r1 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) request_key(0x0, &(0x7f00000005c0)={'syz', 0x0}, 0x0, 0xfffffffffffffff9) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = openat$cgroup_int(r1, &(0x7f00000001c0)='cpuset.sched_load_balance\x00', 0x2, 0x0) dup3(r3, r1, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x200000, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f000001a000)={0x0, ""/256, 0x0, 0x0, 0x0, 0x0, ""/16, ""/16, ""/16, 0x0}) ioctl$BTRFS_IOC_SUBVOL_CREATE_V2(r2, 0x50009418, &(0x7f000001a200)={{}, r4, 0x2, @inherit={0x58, &(0x7f00000009c0)={0x1, 0x2, 0x8, 0x0, {0x0, 0x0, 0x0, 0x0, 0x4}, [0x0, 0x0]}}, @subvolid=0x4}) ioctl$BTRFS_IOC_BALANCE(0xffffffffffffffff, 0x5000940c, 0x0) keyctl$search(0xa, 0x0, &(0x7f0000000200)='keyring\x00', &(0x7f0000000500)={'syz', 0x0}, 0x0) writev(r1, &(0x7f0000000300)=[{0x0}, {&(0x7f00000003c0)}], 0x2) 16:35:00 executing program 1: syz_mount_image$hfs(&(0x7f0000000240), &(0x7f0000000380)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x3, &(0x7f0000000780)=ANY=[@ANYBLOB='quiet,gid=', @ANYRESHEX, @ANYBLOB="2c2a7270653d7614866b2c75693df589299908000000450000005d38ff0c0071446a0c48dba349ba347528523876dc8d7918ecea1024ba9669ff19a9ab5e27062b1dae8d8c0eb880008164ed9d8093fdc35f282dee56df9531b6e0c94b43c314af69146a70075499da5e7f927d3c672787e3d33a6071ff2c1483a1a7cfb34131bfee72f86068d0966d", @ANYRESHEX, @ANYBLOB=',codepage=ascii,rootcontext=sysadm_u,\x00'], 0x1, 0x235, &(0x7f0000000000)="$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") 16:35:00 executing program 0: r0 = request_key(0x0, 0x0, 0x0, 0xfffffffffffffffd) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) r1 = add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000740)=@filename='./file0\x00', &(0x7f0000000780)='./file0\x00', &(0x7f0000000840)='gadgetfs\x00', 0x0, &(0x7f0000000880)='keyring\x00') perf_event_open(&(0x7f00000007c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x12c00, 0x0, 0xe5e}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) writev(0xffffffffffffffff, 0x0, 0x0) r2 = add_key(0x0, &(0x7f0000000280)={'syz', 0x3}, &(0x7f0000019a40)="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", 0x5bd, 0xfffffffffffffffd) keyctl$read(0xb, r2, &(0x7f0000000a40)=""/102400, 0x19000) keyctl$search(0xa, r2, &(0x7f00000008c0)='keyring\x00', &(0x7f0000000900)={'syz', 0x1}, 0xfffffffffffffffd) request_key(&(0x7f00000006c0)='dns_resolver\x00', &(0x7f0000000700)={'syz', 0x3}, 0x0, 0xfffffffffffffffd) r3 = add_key(&(0x7f0000000380)='id_resolver\x00', &(0x7f0000000400)={'syz', 0x3}, &(0x7f0000000440)="e09e6dda135ac7c467011f", 0xb, r0) keyctl$search(0xa, r1, 0x0, &(0x7f0000000340)={'syz', 0x1}, r3) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000140)='cpuset\x00', 0x0, 0x0) add_key$keyring(&(0x7f0000000100), &(0x7f0000000180)={'syz', 0x0}, 0x0, 0x0, r0) r4 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r5 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) open(&(0x7f00000002c0)='./file0\x00', 0x98d00, 0x8) request_key(&(0x7f0000000580)='logon\x00', 0x0, &(0x7f0000000600)='\x1f-)\x00', 0xfffffffffffffff9) add_key$fscrypt_provisioning(&(0x7f0000000480), &(0x7f00000004c0)={'syz', 0x0}, &(0x7f0000000640)=ANY=[], 0x48, r0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = openat$cgroup_int(r4, &(0x7f00000001c0)='cpuset.sched_load_balance\x00', 0x2, 0x0) dup3(r7, r4, 0x0) r8 = add_key$keyring(&(0x7f0000000540), &(0x7f0000000640)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffc) r9 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000980), 0x200000, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r5, 0x81f8943c, &(0x7f000001a000)={0x0, ""/256, 0x0, 0x0, 0x0, 0x0, ""/16, ""/16, ""/16, 0x0}) ioctl$BTRFS_IOC_SUBVOL_CREATE_V2(r6, 0x50009418, &(0x7f000001a200)={{r9}, r10, 0x2, @inherit={0x58, &(0x7f00000009c0)={0x1, 0x2, 0x8, 0x7, {0x14, 0x1000, 0x5, 0x7}, [0xffff, 0x0]}}, @subvolid=0x4}) keyctl$search(0xa, r3, 0x0, &(0x7f0000000500)={'syz', 0x0}, r8) writev(r4, &(0x7f0000000300)=[{&(0x7f00000000c0)='0', 0xc200}, {&(0x7f00000003c0)='7', 0x1}], 0x2) [ 2016.254119] new mount options do not match the existing superblock, will be ignored [ 2016.276469] new mount options do not match the existing superblock, will be ignored [ 2016.289712] hfs: uid requires an argument 16:35:00 executing program 1: syz_mount_image$hfs(&(0x7f0000000240), &(0x7f0000000380)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x3, &(0x7f0000000780)=ANY=[@ANYBLOB='quiet,gid=', @ANYRESHEX, @ANYBLOB="2c2a7270653d7614866b2c75693df589299908000000450000005d38ff0c0071446a0c48dba349ba347528523876dc8d7918ecea1024ba9669ff19a9ab5e27062b1dae8d8c0eb880008164ed9d8093fdc35f282dee56df9531b6e0c94b43c314af69146a70075499da5e7f927d3c672787e3d33a6071ff2c1483a1a7cfb34131bfee72f86068d0966d", @ANYRESHEX, @ANYBLOB=',codepage=ascii,rootcontext=sysadm_u,\x00'], 0x1, 0x235, &(0x7f0000000000)="$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") [ 2016.306556] hfs: unable to parse mount options 16:35:00 executing program 5: r0 = request_key(0x0, 0x0, 0x0, 0xfffffffffffffffd) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) r1 = add_key$keyring(0x0, &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000740)=@filename='./file0\x00', &(0x7f0000000780)='./file0\x00', &(0x7f0000000840)='gadgetfs\x00', 0x10, &(0x7f0000000880)='keyring\x00') perf_event_open(&(0x7f00000007c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x12c00, 0x0, 0xe5e}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) writev(0xffffffffffffffff, 0x0, 0x0) r2 = add_key(&(0x7f0000000240)='big_key\x00', &(0x7f0000000280)={'syz', 0x3}, &(0x7f0000019a40)="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", 0x5bd, 0xfffffffffffffffd) keyctl$read(0xb, r2, &(0x7f0000000a40)=""/102400, 0x19000) keyctl$search(0xa, r2, &(0x7f00000008c0)='keyring\x00', &(0x7f0000000900)={'syz', 0x1}, 0xfffffffffffffffd) request_key(&(0x7f00000006c0)='dns_resolver\x00', &(0x7f0000000700)={'syz', 0x3}, &(0x7f0000000940)='\x00', 0xfffffffffffffffd) r3 = add_key(&(0x7f0000000380)='id_resolver\x00', &(0x7f0000000400)={'syz', 0x3}, &(0x7f0000000440)="e09e6dda135ac7c467011f", 0xb, r0) keyctl$search(0xa, r1, 0x0, &(0x7f0000000340)={'syz', 0x1}, r3) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000140)='cpuset\x00', 0x0, 0x0) add_key$keyring(&(0x7f0000000100), &(0x7f0000000180)={'syz', 0x0}, 0x0, 0x0, r0) r4 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r5 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) request_key(&(0x7f0000000580)='logon\x00', &(0x7f00000005c0)={'syz', 0x0}, &(0x7f0000000600)='\x1f-)\x00', 0xfffffffffffffff9) add_key$fscrypt_provisioning(&(0x7f0000000480), &(0x7f00000004c0)={'syz', 0x0}, &(0x7f0000000640)=ANY=[], 0x48, r0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = openat$cgroup_int(r4, &(0x7f00000001c0)='cpuset.sched_load_balance\x00', 0x2, 0x0) dup3(r7, r4, 0x0) add_key$keyring(&(0x7f0000000540), &(0x7f0000000640)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffc) r8 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000980), 0x200000, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r5, 0x81f8943c, &(0x7f000001a000)={0x0, ""/256, 0x0, 0x0, 0x0, 0x0, ""/16, ""/16, ""/16, 0x0}) ioctl$BTRFS_IOC_SUBVOL_CREATE_V2(r6, 0x50009418, &(0x7f000001a200)={{r8}, r9, 0x2, @inherit={0x58, &(0x7f00000009c0)={0x1, 0x2, 0x8, 0x7, {0x14, 0x1000, 0x5, 0x7, 0x4}, [0xffff, 0x3]}}, @subvolid=0x4}) writev(r4, &(0x7f0000000300)=[{&(0x7f00000000c0)='0', 0x1}, {&(0x7f00000003c0)='7', 0x1}], 0x2) 16:35:00 executing program 3: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) r1 = socket(0x10, 0x2, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000280)='quiet') (async) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000140)={0x0, 0x0}, &(0x7f0000cab000)=0x6e) syz_mount_image$hfs(&(0x7f0000000240), &(0x7f0000000380)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x3, &(0x7f0000000400)={[{}, {@part={'part', 0x3d, 0x10000}}, {@type={'type', 0x3d, "7614866b"}}, {@uid={'uid', 0x3d, r2}}, {@codepage={'codepage', 0x3d, 'ascii'}}], [{@rootcontext={'rootcontext', 0x3d, 'sysadm_u'}}]}, 0x1, 0x235, &(0x7f0000000000)="$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") [ 2016.347355] new mount options do not match the existing superblock, will be ignored 16:35:00 executing program 1: syz_mount_image$hfs(&(0x7f0000000240), &(0x7f0000000380)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x3, &(0x7f0000000780)=ANY=[@ANYBLOB='quiet,gid=', @ANYRESHEX, @ANYBLOB="2c2a7270653d7614866b2c75693df589299908000000450000005d38ff0c0071446a0c48dba349ba347528523876dc8d7918ecea1024ba9669ff19a9ab5e27062b1dae8d8c0eb880008164ed9d8093fdc35f282dee56df9531b6e0c94b43c314af69146a70075499da5e7f927d3c672787e3d33a6071ff2c1483a1a7cfb34131bfee72f86068d0966d", @ANYRESHEX, @ANYBLOB=',codepage=ascii,rootcontext=sysadm_u,\x00'], 0x1, 0x235, &(0x7f0000000000)="$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") 16:35:00 executing program 4: r0 = request_key(0x0, 0x0, 0x0, 0xfffffffffffffffd) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) r1 = add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000780)='./file0\x00', &(0x7f0000000840)='gadgetfs\x00', 0x0, &(0x7f0000000880)='keyring\x00') perf_event_open(&(0x7f00000007c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x12c00, 0x0, 0xe5e}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) writev(0xffffffffffffffff, 0x0, 0x0) keyctl$read(0xb, 0x0, &(0x7f0000000a40)=""/102400, 0x19000) keyctl$search(0xa, 0x0, 0x0, 0x0, 0xfffffffffffffffd) request_key(&(0x7f00000006c0)='dns_resolver\x00', &(0x7f0000000700)={'syz', 0x3}, &(0x7f0000000940)='\x00', 0xfffffffffffffffd) r2 = add_key(&(0x7f0000000380)='id_resolver\x00', 0x0, &(0x7f0000000440), 0x0, r0) keyctl$search(0xa, r1, 0x0, &(0x7f0000000340)={'syz', 0x1}, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000140)='cpuset\x00', 0x0, 0x0) add_key$keyring(&(0x7f0000000100), &(0x7f0000000180)={'syz', 0x0}, 0x0, 0x0, 0x0) r3 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r4 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) open(&(0x7f00000002c0)='./file0\x00', 0x98d00, 0x8) request_key(&(0x7f0000000580)='logon\x00', &(0x7f00000005c0)={'syz', 0x0}, &(0x7f0000000600)='\x1f-)\x00', 0xfffffffffffffff9) write$rfkill(r4, &(0x7f0000000040)={0x0, 0x0, 0x3}, 0x8) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = openat$cgroup_int(r3, &(0x7f00000001c0)='cpuset.sched_load_balance\x00', 0x2, 0x0) dup3(r6, r3, 0x0) r7 = add_key$keyring(&(0x7f0000000540), &(0x7f0000000640)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffc) r8 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000980), 0x200000, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r4, 0x81f8943c, &(0x7f000001a000)={0x0, ""/256, 0x0, 0x0, 0x0, 0x0, ""/16, ""/16, ""/16, 0x0}) ioctl$BTRFS_IOC_SUBVOL_CREATE_V2(r5, 0x50009418, &(0x7f000001a200)={{r8}, r9, 0x2, @inherit={0x58, &(0x7f00000009c0)={0x1, 0x2, 0x8, 0x7, {0x14, 0x1000, 0x5, 0x7, 0x4}, [0xffff, 0x3]}}, @subvolid=0x4}) ioctl$BTRFS_IOC_BALANCE(r5, 0x5000940c, 0x0) keyctl$search(0xa, r2, &(0x7f0000000200)='keyring\x00', &(0x7f0000000500)={'syz', 0x0}, r7) writev(r3, &(0x7f0000000300)=[{&(0x7f00000000c0)='0', 0x1}, {&(0x7f00000003c0)='7', 0x1}], 0x2) [ 2016.430609] new mount options do not match the existing superblock, will be ignored [ 2016.446003] hfs: uid requires an argument [ 2016.450171] hfs: unable to parse mount options 16:35:00 executing program 2: r0 = request_key(0x0, 0x0, 0x0, 0xfffffffffffffffd) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) perf_event_open(&(0x7f00000007c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0xe5e}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) keyctl$read(0xb, 0x0, &(0x7f0000000a40)=""/102400, 0x19000) keyctl$search(0xa, 0x0, &(0x7f00000008c0)='keyring\x00', &(0x7f0000000900)={'syz', 0x1}, 0xfffffffffffffffd) request_key(&(0x7f00000006c0)='dns_resolver\x00', &(0x7f0000000700)={'syz', 0x3}, &(0x7f0000000940)='\x00', 0xfffffffffffffffd) add_key(0x0, &(0x7f0000000400)={'syz', 0x3}, &(0x7f0000000440), 0x0, r0) keyctl$search(0xa, 0x0, 0x0, &(0x7f0000000340)={'syz', 0x1}, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000140)='cpuset\x00', 0x0, 0x0) add_key$keyring(&(0x7f0000000100), 0x0, 0x0, 0x0, r0) r1 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) request_key(0x0, &(0x7f00000005c0)={'syz', 0x0}, 0x0, 0xfffffffffffffff9) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = openat$cgroup_int(r1, &(0x7f00000001c0)='cpuset.sched_load_balance\x00', 0x2, 0x0) dup3(r3, r1, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x200000, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f000001a000)={0x0, ""/256, 0x0, 0x0, 0x0, 0x0, ""/16, ""/16, ""/16, 0x0}) ioctl$BTRFS_IOC_SUBVOL_CREATE_V2(r2, 0x50009418, &(0x7f000001a200)={{}, r4, 0x2, @inherit={0x58, &(0x7f00000009c0)={0x1, 0x2, 0x8, 0x0, {0x0, 0x0, 0x0, 0x0, 0x4}, [0x0, 0x0]}}, @subvolid=0x4}) ioctl$BTRFS_IOC_BALANCE(0xffffffffffffffff, 0x5000940c, 0x0) keyctl$search(0xa, 0x0, &(0x7f0000000200)='keyring\x00', &(0x7f0000000500)={'syz', 0x0}, 0x0) writev(r1, &(0x7f0000000300)=[{0x0}, {&(0x7f00000003c0)}], 0x2) 16:35:00 executing program 0: r0 = request_key(0x0, 0x0, 0x0, 0xfffffffffffffffd) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) r1 = add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000740)=@filename='./file0\x00', &(0x7f0000000780)='./file0\x00', &(0x7f0000000840)='gadgetfs\x00', 0x0, &(0x7f0000000880)='keyring\x00') perf_event_open(&(0x7f00000007c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x12c00, 0x0, 0xe5e}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) writev(0xffffffffffffffff, 0x0, 0x0) r2 = add_key(0x0, &(0x7f0000000280)={'syz', 0x3}, &(0x7f0000019a40)="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", 0x5bd, 0xfffffffffffffffd) keyctl$read(0xb, r2, &(0x7f0000000a40)=""/102400, 0x19000) keyctl$search(0xa, r2, &(0x7f00000008c0)='keyring\x00', &(0x7f0000000900)={'syz', 0x1}, 0xfffffffffffffffd) request_key(&(0x7f00000006c0)='dns_resolver\x00', &(0x7f0000000700)={'syz', 0x3}, 0x0, 0xfffffffffffffffd) r3 = add_key(&(0x7f0000000380)='id_resolver\x00', &(0x7f0000000400)={'syz', 0x3}, &(0x7f0000000440)="e09e6dda135ac7c467011f", 0xb, r0) keyctl$search(0xa, r1, 0x0, &(0x7f0000000340)={'syz', 0x1}, r3) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000140)='cpuset\x00', 0x0, 0x0) add_key$keyring(&(0x7f0000000100), &(0x7f0000000180)={'syz', 0x0}, 0x0, 0x0, r0) r4 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r5 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) open(&(0x7f00000002c0)='./file0\x00', 0x98d00, 0x8) request_key(&(0x7f0000000580)='logon\x00', 0x0, &(0x7f0000000600)='\x1f-)\x00', 0xfffffffffffffff9) add_key$fscrypt_provisioning(&(0x7f0000000480), &(0x7f00000004c0)={'syz', 0x0}, &(0x7f0000000640)=ANY=[], 0x48, r0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = openat$cgroup_int(r4, &(0x7f00000001c0)='cpuset.sched_load_balance\x00', 0x2, 0x0) dup3(r7, r4, 0x0) r8 = add_key$keyring(&(0x7f0000000540), &(0x7f0000000640)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffc) r9 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000980), 0x200000, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r5, 0x81f8943c, &(0x7f000001a000)={0x0, ""/256, 0x0, 0x0, 0x0, 0x0, ""/16, ""/16, ""/16, 0x0}) ioctl$BTRFS_IOC_SUBVOL_CREATE_V2(r6, 0x50009418, &(0x7f000001a200)={{r9}, r10, 0x2, @inherit={0x58, &(0x7f00000009c0)={0x1, 0x2, 0x8, 0x7, {0x14, 0x1000, 0x5, 0x7}, [0xffff, 0x0]}}, @subvolid=0x4}) keyctl$search(0xa, r3, 0x0, &(0x7f0000000500)={'syz', 0x0}, r8) writev(r4, &(0x7f0000000300)=[{&(0x7f00000000c0)='0', 0xc300}, {&(0x7f00000003c0)='7', 0x1}], 0x2) 16:35:00 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x2, 0x0) socket(0x2b, 0x2, 0x3) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000140)={0x0, 0x0}, &(0x7f0000cab000)=0x6e) syz_mount_image$hfs(&(0x7f0000000240), &(0x7f0000000380)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x3, &(0x7f0000000400)={[{}, {@part={'part', 0x3d, 0x10001}}, {@type={'type', 0x3d, "7614866b"}}, {@uid={'uid', 0x3d, r1}}, {@codepage={'codepage', 0x3d, 'ascii'}}], [{@rootcontext={'rootcontext', 0x3d, 'sysadm_u'}}]}, 0x1, 0x235, &(0x7f0000000000)="$eJzs3c9qE1EUx/HfvYkabanTPyK4rBZcSVs34kaQPIQrUZsIxVBBK6grcS0+gHtfwYdwJb6Arlz5ANmN3DM3zTRmMmk1ubT9fiBh2rln5pzOTO89gVIBOLPut398vv0rvJzUUEPSXclLaklNSVd0tfVqb393v9ftTDpQwyLCy6mIdH+N2dnrjgsNcRYRZeGrphbL38Ns5Hme/0ydBJKzp38ML12IT6ftb809s9l4lzqBxFxffb3WUuo8AABpxfnfx3l+Ma7fvZc24rR/qub/fuoEEivN/9Zl5S5c38u2a9jvWQsX9vtBl3icc51XcWcdWmC6uq7ScvEXn+72urd2nvc6Xu91LyoNW7P3TnHrDtRkuz6mN53g+LUvWA3nQg3bFfmv/t8z1nNf3Tf30GX6pM7B+q+Zu3CZ7EplI1eqyH+z+ohWZVaMqqhy2U5yLZ4hqqmyNb4j0eCOWtbhDwiyujwtamUkqqhuqyZqdWzUdk3U2mjU8G6ujpw199E9cOv6rS9ql9b/Pvy0NzTNkxnG2Mh4Z0ysp2kjsykS80cqA//mg57ojpZevnn77HGv133BBhtssHGwkfoXFOZheNFTZ4JEwrrLFf1fqV/ZtBYpvGUT1ul53cFLR9yq6A1W7P3SkTq4heoObtqe6/pN6cb0Z8xinqeEa+u7HvH5PwAAAAAAAAAAAAAAAAAAwEkzjz8nSF0jAAAAAAAAAAAAAAAAAAAAAAAnHf//Fzi7/gQAAP//6oSCGA==") [ 2016.481441] new mount options do not match the existing superblock, will be ignored 16:35:00 executing program 5: r0 = request_key(0x0, 0x0, 0x0, 0xfffffffffffffffd) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) r1 = add_key$keyring(0x0, &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000740)=@filename='./file0\x00', &(0x7f0000000780)='./file0\x00', &(0x7f0000000840)='gadgetfs\x00', 0x10, &(0x7f0000000880)='keyring\x00') perf_event_open(&(0x7f00000007c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x12c00, 0x0, 0xe5e}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) writev(0xffffffffffffffff, 0x0, 0x0) r2 = add_key(&(0x7f0000000240)='big_key\x00', &(0x7f0000000280)={'syz', 0x3}, &(0x7f0000019a40)="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", 0x5bd, 0xfffffffffffffffd) keyctl$read(0xb, r2, &(0x7f0000000a40)=""/102400, 0x19000) keyctl$search(0xa, r2, &(0x7f00000008c0)='keyring\x00', &(0x7f0000000900)={'syz', 0x1}, 0xfffffffffffffffd) request_key(&(0x7f00000006c0)='dns_resolver\x00', &(0x7f0000000700)={'syz', 0x3}, &(0x7f0000000940)='\x00', 0xfffffffffffffffd) r3 = add_key(&(0x7f0000000380)='id_resolver\x00', &(0x7f0000000400)={'syz', 0x3}, &(0x7f0000000440)="e09e6dda135ac7c467011f", 0xb, r0) keyctl$search(0xa, r1, 0x0, &(0x7f0000000340)={'syz', 0x1}, r3) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000140)='cpuset\x00', 0x0, 0x0) add_key$keyring(&(0x7f0000000100), &(0x7f0000000180)={'syz', 0x0}, 0x0, 0x0, r0) r4 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r5 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) request_key(&(0x7f0000000580)='logon\x00', &(0x7f00000005c0)={'syz', 0x0}, &(0x7f0000000600)='\x1f-)\x00', 0xfffffffffffffff9) add_key$fscrypt_provisioning(&(0x7f0000000480), &(0x7f00000004c0)={'syz', 0x0}, &(0x7f0000000640)=ANY=[], 0x48, r0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = openat$cgroup_int(r4, &(0x7f00000001c0)='cpuset.sched_load_balance\x00', 0x2, 0x0) dup3(r7, r4, 0x0) add_key$keyring(&(0x7f0000000540), &(0x7f0000000640)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffc) r8 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000980), 0x200000, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r5, 0x81f8943c, &(0x7f000001a000)={0x0, ""/256, 0x0, 0x0, 0x0, 0x0, ""/16, ""/16, ""/16, 0x0}) ioctl$BTRFS_IOC_SUBVOL_CREATE_V2(r6, 0x50009418, &(0x7f000001a200)={{r8}, r9, 0x2, @inherit={0x58, &(0x7f00000009c0)={0x1, 0x2, 0x8, 0x7, {0x14, 0x1000, 0x5, 0x7, 0x4}, [0xffff, 0x3]}}, @subvolid=0x4}) writev(r4, &(0x7f0000000300)=[{&(0x7f00000000c0)='0', 0x1}, {&(0x7f00000003c0)='7', 0x1}], 0x2) [ 2016.554738] hfs: invalid gid -1 [ 2016.567257] hfs: unable to parse mount options 16:35:00 executing program 1: syz_mount_image$hfs(&(0x7f0000000240), &(0x7f0000000380)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x3, &(0x7f0000000780)=ANY=[@ANYBLOB='quiet,gid=', @ANYRESHEX, @ANYBLOB="2c2a7270653d7614866b2c75693df589299908000000450000005d38ff0c0071446a0c48dba349ba347528523876dc8d7918ecea1024ba9669ff19a9ab5e27062b1dae8d8c0eb880008164ed9d8093fdc35f282dee56df9531b6e0c94b43c314af69146a70075499da5e7f927d3c672787e3d33a6071ff2c1483a1a7cfb34131bfee72f86068d0966d", @ANYRESHEX, @ANYBLOB=',codepage=ascii,rootcontext=sysadm_u,\x00'], 0x1, 0x235, &(0x7f0000000000)="$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") [ 2016.630606] new mount options do not match the existing superblock, will be ignored [ 2016.641003] new mount options do not match the existing superblock, will be ignored [ 2016.659814] new mount options do not match the existing superblock, will be ignored 16:35:00 executing program 2: r0 = request_key(0x0, 0x0, 0x0, 0xfffffffffffffffd) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) perf_event_open(&(0x7f00000007c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0xe5e}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) keyctl$read(0xb, 0x0, &(0x7f0000000a40)=""/102400, 0x19000) keyctl$search(0xa, 0x0, &(0x7f00000008c0)='keyring\x00', &(0x7f0000000900)={'syz', 0x1}, 0xfffffffffffffffd) request_key(&(0x7f00000006c0)='dns_resolver\x00', &(0x7f0000000700)={'syz', 0x3}, &(0x7f0000000940)='\x00', 0xfffffffffffffffd) add_key(0x0, &(0x7f0000000400)={'syz', 0x3}, &(0x7f0000000440), 0x0, r0) keyctl$search(0xa, 0x0, 0x0, &(0x7f0000000340)={'syz', 0x1}, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000140)='cpuset\x00', 0x0, 0x0) add_key$keyring(&(0x7f0000000100), 0x0, 0x0, 0x0, r0) r1 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) request_key(0x0, &(0x7f00000005c0)={'syz', 0x0}, 0x0, 0xfffffffffffffff9) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = openat$cgroup_int(r1, &(0x7f00000001c0)='cpuset.sched_load_balance\x00', 0x2, 0x0) dup3(r3, r1, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x200000, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f000001a000)={0x0, ""/256, 0x0, 0x0, 0x0, 0x0, ""/16, ""/16, ""/16, 0x0}) ioctl$BTRFS_IOC_SUBVOL_CREATE_V2(r2, 0x50009418, &(0x7f000001a200)={{}, r4, 0x2, @inherit={0x58, &(0x7f00000009c0)={0x1, 0x2, 0x8, 0x0, {0x0, 0x0, 0x0, 0x0, 0x4}, [0x0, 0x0]}}, @subvolid=0x4}) ioctl$BTRFS_IOC_BALANCE(0xffffffffffffffff, 0x5000940c, 0x0) keyctl$search(0xa, 0x0, &(0x7f0000000200)='keyring\x00', &(0x7f0000000500)={'syz', 0x0}, 0x0) writev(r1, &(0x7f0000000300)=[{&(0x7f00000000c0)}, {&(0x7f00000003c0)}], 0x2) [ 2016.689737] hfs: uid requires an argument [ 2016.717671] hfs: unable to parse mount options 16:35:00 executing program 4: r0 = request_key(0x0, 0x0, 0x0, 0xfffffffffffffffd) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) r1 = add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000780)='./file0\x00', &(0x7f0000000840)='gadgetfs\x00', 0x0, &(0x7f0000000880)='keyring\x00') perf_event_open(&(0x7f00000007c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x12c00, 0x0, 0xe5e}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) writev(0xffffffffffffffff, 0x0, 0x0) keyctl$read(0xb, 0x0, &(0x7f0000000a40)=""/102400, 0x19000) keyctl$search(0xa, 0x0, 0x0, 0x0, 0xfffffffffffffffd) request_key(&(0x7f00000006c0)='dns_resolver\x00', &(0x7f0000000700)={'syz', 0x3}, &(0x7f0000000940)='\x00', 0xfffffffffffffffd) r2 = add_key(&(0x7f0000000380)='id_resolver\x00', 0x0, &(0x7f0000000440), 0x0, r0) keyctl$search(0xa, r1, 0x0, &(0x7f0000000340)={'syz', 0x1}, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000140)='cpuset\x00', 0x0, 0x0) add_key$keyring(&(0x7f0000000100), &(0x7f0000000180)={'syz', 0x0}, 0x0, 0x0, 0x0) r3 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r4 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) open(&(0x7f00000002c0)='./file0\x00', 0x98d00, 0x8) request_key(&(0x7f0000000580)='logon\x00', &(0x7f00000005c0)={'syz', 0x0}, &(0x7f0000000600)='\x1f-)\x00', 0xfffffffffffffff9) write$rfkill(r4, &(0x7f0000000040)={0x0, 0x0, 0x3}, 0x8) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = openat$cgroup_int(r3, &(0x7f00000001c0)='cpuset.sched_load_balance\x00', 0x2, 0x0) dup3(r6, r3, 0x0) r7 = add_key$keyring(&(0x7f0000000540), &(0x7f0000000640)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffc) r8 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000980), 0x200000, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r4, 0x81f8943c, &(0x7f000001a000)={0x0, ""/256, 0x0, 0x0, 0x0, 0x0, ""/16, ""/16, ""/16, 0x0}) ioctl$BTRFS_IOC_SUBVOL_CREATE_V2(r5, 0x50009418, &(0x7f000001a200)={{r8}, r9, 0x2, @inherit={0x58, &(0x7f00000009c0)={0x1, 0x2, 0x8, 0x7, {0x14, 0x1000, 0x5, 0x7, 0x4}, [0xffff, 0x3]}}, @subvolid=0x4}) ioctl$BTRFS_IOC_BALANCE(r5, 0x5000940c, 0x0) keyctl$search(0xa, r2, &(0x7f0000000200)='keyring\x00', &(0x7f0000000500)={'syz', 0x0}, r7) writev(r3, &(0x7f0000000300)=[{&(0x7f00000000c0)='0', 0x1}, {&(0x7f00000003c0)='7', 0x1}], 0x2) 16:35:00 executing program 5: r0 = request_key(0x0, 0x0, 0x0, 0xfffffffffffffffd) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) r1 = add_key$keyring(0x0, &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000740)=@filename='./file0\x00', &(0x7f0000000780)='./file0\x00', &(0x7f0000000840)='gadgetfs\x00', 0x10, &(0x7f0000000880)='keyring\x00') perf_event_open(&(0x7f00000007c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x12c00, 0x0, 0xe5e}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) writev(0xffffffffffffffff, 0x0, 0x0) r2 = add_key(&(0x7f0000000240)='big_key\x00', &(0x7f0000000280)={'syz', 0x3}, &(0x7f0000019a40)="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", 0x5bd, 0xfffffffffffffffd) keyctl$read(0xb, r2, &(0x7f0000000a40)=""/102400, 0x19000) keyctl$search(0xa, r2, &(0x7f00000008c0)='keyring\x00', &(0x7f0000000900)={'syz', 0x1}, 0xfffffffffffffffd) request_key(&(0x7f00000006c0)='dns_resolver\x00', &(0x7f0000000700)={'syz', 0x3}, &(0x7f0000000940)='\x00', 0xfffffffffffffffd) r3 = add_key(&(0x7f0000000380)='id_resolver\x00', &(0x7f0000000400)={'syz', 0x3}, &(0x7f0000000440)="e09e6dda135ac7c467011f", 0xb, r0) keyctl$search(0xa, r1, 0x0, &(0x7f0000000340)={'syz', 0x1}, r3) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000140)='cpuset\x00', 0x0, 0x0) add_key$keyring(&(0x7f0000000100), &(0x7f0000000180)={'syz', 0x0}, 0x0, 0x0, r0) r4 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r5 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) request_key(&(0x7f0000000580)='logon\x00', &(0x7f00000005c0)={'syz', 0x0}, &(0x7f0000000600)='\x1f-)\x00', 0xfffffffffffffff9) add_key$fscrypt_provisioning(&(0x7f0000000480), &(0x7f00000004c0)={'syz', 0x0}, &(0x7f0000000640)=ANY=[], 0x48, r0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = openat$cgroup_int(r4, &(0x7f00000001c0)='cpuset.sched_load_balance\x00', 0x2, 0x0) dup3(r7, r4, 0x0) add_key$keyring(&(0x7f0000000540), &(0x7f0000000640)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffc) r8 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000980), 0x200000, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r5, 0x81f8943c, &(0x7f000001a000)={0x0, ""/256, 0x0, 0x0, 0x0, 0x0, ""/16, ""/16, ""/16, 0x0}) ioctl$BTRFS_IOC_SUBVOL_CREATE_V2(r6, 0x50009418, &(0x7f000001a200)={{r8}, r9, 0x2, @inherit={0x58, &(0x7f00000009c0)={0x1, 0x2, 0x8, 0x7, {0x14, 0x1000, 0x5, 0x7, 0x4}, [0xffff, 0x3]}}, @subvolid=0x4}) writev(r4, &(0x7f0000000300)=[{&(0x7f00000000c0)='0', 0x1}, {&(0x7f00000003c0)='7', 0x1}], 0x2) [ 2016.740828] new mount options do not match the existing superblock, will be ignored 16:35:00 executing program 0: r0 = request_key(0x0, 0x0, 0x0, 0xfffffffffffffffd) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) r1 = add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000740)=@filename='./file0\x00', &(0x7f0000000780)='./file0\x00', &(0x7f0000000840)='gadgetfs\x00', 0x0, &(0x7f0000000880)='keyring\x00') perf_event_open(&(0x7f00000007c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x12c00, 0x0, 0xe5e}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) writev(0xffffffffffffffff, 0x0, 0x0) r2 = add_key(0x0, &(0x7f0000000280)={'syz', 0x3}, &(0x7f0000019a40)="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", 0x5bd, 0xfffffffffffffffd) keyctl$read(0xb, r2, &(0x7f0000000a40)=""/102400, 0x19000) keyctl$search(0xa, r2, &(0x7f00000008c0)='keyring\x00', &(0x7f0000000900)={'syz', 0x1}, 0xfffffffffffffffd) request_key(&(0x7f00000006c0)='dns_resolver\x00', &(0x7f0000000700)={'syz', 0x3}, 0x0, 0xfffffffffffffffd) r3 = add_key(&(0x7f0000000380)='id_resolver\x00', &(0x7f0000000400)={'syz', 0x3}, &(0x7f0000000440)="e09e6dda135ac7c467011f", 0xb, r0) keyctl$search(0xa, r1, 0x0, &(0x7f0000000340)={'syz', 0x1}, r3) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000140)='cpuset\x00', 0x0, 0x0) add_key$keyring(&(0x7f0000000100), &(0x7f0000000180)={'syz', 0x0}, 0x0, 0x0, r0) r4 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r5 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) open(&(0x7f00000002c0)='./file0\x00', 0x98d00, 0x8) request_key(&(0x7f0000000580)='logon\x00', 0x0, &(0x7f0000000600)='\x1f-)\x00', 0xfffffffffffffff9) add_key$fscrypt_provisioning(&(0x7f0000000480), &(0x7f00000004c0)={'syz', 0x0}, &(0x7f0000000640)=ANY=[], 0x48, r0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = openat$cgroup_int(r4, &(0x7f00000001c0)='cpuset.sched_load_balance\x00', 0x2, 0x0) dup3(r7, r4, 0x0) r8 = add_key$keyring(&(0x7f0000000540), &(0x7f0000000640)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffc) r9 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000980), 0x200000, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r5, 0x81f8943c, &(0x7f000001a000)={0x0, ""/256, 0x0, 0x0, 0x0, 0x0, ""/16, ""/16, ""/16, 0x0}) ioctl$BTRFS_IOC_SUBVOL_CREATE_V2(r6, 0x50009418, &(0x7f000001a200)={{r9}, r10, 0x2, @inherit={0x58, &(0x7f00000009c0)={0x1, 0x2, 0x8, 0x7, {0x14, 0x1000, 0x5, 0x7}, [0xffff, 0x0]}}, @subvolid=0x4}) keyctl$search(0xa, r3, 0x0, &(0x7f0000000500)={'syz', 0x0}, r8) writev(r4, &(0x7f0000000300)=[{&(0x7f00000000c0)='0', 0xc400}, {&(0x7f00000003c0)='7', 0x1}], 0x2) 16:35:00 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x2, 0x0) socket(0x2b, 0x2, 0x3) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000140)={0x0, 0x0}, &(0x7f0000cab000)=0x6e) syz_mount_image$hfs(&(0x7f0000000240), &(0x7f0000000380)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x3, &(0x7f0000000400)={[{}, {@part={'part', 0x3d, 0x10001}}, {@type={'type', 0x3d, "7614866b"}}, {@uid={'uid', 0x3d, r1}}, {@codepage={'codepage', 0x3d, 'ascii'}}], [{@rootcontext={'rootcontext', 0x3d, 'sysadm_u'}}]}, 0x1, 0x235, &(0x7f0000000000)="$eJzs3c9qE1EUx/HfvYkabanTPyK4rBZcSVs34kaQPIQrUZsIxVBBK6grcS0+gHtfwYdwJb6Arlz5ANmN3DM3zTRmMmk1ubT9fiBh2rln5pzOTO89gVIBOLPut398vv0rvJzUUEPSXclLaklNSVd0tfVqb393v9ftTDpQwyLCy6mIdH+N2dnrjgsNcRYRZeGrphbL38Ns5Hme/0ydBJKzp38ML12IT6ftb809s9l4lzqBxFxffb3WUuo8AABpxfnfx3l+Ma7fvZc24rR/qub/fuoEEivN/9Zl5S5c38u2a9jvWQsX9vtBl3icc51XcWcdWmC6uq7ScvEXn+72urd2nvc6Xu91LyoNW7P3TnHrDtRkuz6mN53g+LUvWA3nQg3bFfmv/t8z1nNf3Tf30GX6pM7B+q+Zu3CZ7EplI1eqyH+z+ohWZVaMqqhy2U5yLZ4hqqmyNb4j0eCOWtbhDwiyujwtamUkqqhuqyZqdWzUdk3U2mjU8G6ujpw199E9cOv6rS9ql9b/Pvy0NzTNkxnG2Mh4Z0ysp2kjsykS80cqA//mg57ojpZevnn77HGv133BBhtssHGwkfoXFOZheNFTZ4JEwrrLFf1fqV/ZtBYpvGUT1ul53cFLR9yq6A1W7P3SkTq4heoObtqe6/pN6cb0Z8xinqeEa+u7HvH5PwAAAAAAAAAAAAAAAAAAwEkzjz8nSF0jAAAAAAAAAAAAAAAAAAAAAAAnHf//Fzi7/gQAAP//6oSCGA==") perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) socket(0x10, 0x2, 0x0) (async) socket(0x2b, 0x2, 0x3) (async) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000140), &(0x7f0000cab000)=0x6e) (async) syz_mount_image$hfs(&(0x7f0000000240), &(0x7f0000000380)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x3, &(0x7f0000000400)={[{}, {@part={'part', 0x3d, 0x10001}}, {@type={'type', 0x3d, "7614866b"}}, {@uid={'uid', 0x3d, r1}}, {@codepage={'codepage', 0x3d, 'ascii'}}], [{@rootcontext={'rootcontext', 0x3d, 'sysadm_u'}}]}, 0x1, 0x235, &(0x7f0000000000)="$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") (async) 16:35:01 executing program 2: r0 = request_key(0x0, 0x0, 0x0, 0xfffffffffffffffd) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) perf_event_open(&(0x7f00000007c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0xe5e}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) keyctl$read(0xb, 0x0, &(0x7f0000000a40)=""/102400, 0x19000) keyctl$search(0xa, 0x0, &(0x7f00000008c0)='keyring\x00', &(0x7f0000000900)={'syz', 0x1}, 0xfffffffffffffffd) request_key(&(0x7f00000006c0)='dns_resolver\x00', &(0x7f0000000700)={'syz', 0x3}, &(0x7f0000000940)='\x00', 0xfffffffffffffffd) add_key(0x0, &(0x7f0000000400)={'syz', 0x3}, &(0x7f0000000440), 0x0, r0) keyctl$search(0xa, 0x0, 0x0, &(0x7f0000000340)={'syz', 0x1}, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000140)='cpuset\x00', 0x0, 0x0) add_key$keyring(&(0x7f0000000100), 0x0, 0x0, 0x0, r0) r1 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) request_key(0x0, &(0x7f00000005c0)={'syz', 0x0}, 0x0, 0xfffffffffffffff9) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = openat$cgroup_int(r1, &(0x7f00000001c0)='cpuset.sched_load_balance\x00', 0x2, 0x0) dup3(r3, r1, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x200000, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f000001a000)={0x0, ""/256, 0x0, 0x0, 0x0, 0x0, ""/16, ""/16, ""/16, 0x0}) ioctl$BTRFS_IOC_SUBVOL_CREATE_V2(r2, 0x50009418, &(0x7f000001a200)={{}, r4, 0x2, @inherit={0x58, &(0x7f00000009c0)={0x1, 0x2, 0x8, 0x0, {0x0, 0x0, 0x0, 0x0, 0x4}, [0x0, 0x0]}}, @subvolid=0x4}) ioctl$BTRFS_IOC_BALANCE(0xffffffffffffffff, 0x5000940c, 0x0) keyctl$search(0xa, 0x0, &(0x7f0000000200)='keyring\x00', &(0x7f0000000500)={'syz', 0x0}, 0x0) writev(r1, &(0x7f0000000300)=[{&(0x7f00000000c0)}, {&(0x7f00000003c0)}], 0x2) [ 2016.819173] hfs: invalid gid -1 [ 2016.825677] new mount options do not match the existing superblock, will be ignored [ 2016.836683] hfs: unable to parse mount options 16:35:01 executing program 1: syz_mount_image$hfs(&(0x7f0000000240), &(0x7f0000000380)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x3, &(0x7f0000000780)=ANY=[@ANYBLOB='quiet,gid=', @ANYRESHEX, @ANYBLOB="2c2a7270653d7614866b2c75693df589299908000000450000005d38ff0c0071446a0c48dba349ba347528523876dc8d7918ecea1024ba9669ff19a9ab5e27062b1dae8d8c0eb880008164ed9d8093fdc35f282dee56df9531b6e0c94b43c314af69146a70075499da5e7f927d3c672787e3d33a6071ff2c1483a1a7cfb34131bfee72f86068d0966d", @ANYRESHEX, @ANYBLOB=',codepage=ascii,rootcontext=sysadm_u,\x00'], 0x1, 0x235, &(0x7f0000000000)="$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") [ 2016.879467] new mount options do not match the existing superblock, will be ignored [ 2016.900634] new mount options do not match the existing superblock, will be ignored 16:35:01 executing program 5: r0 = request_key(0x0, 0x0, 0x0, 0xfffffffffffffffd) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) r1 = add_key$keyring(0x0, &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000740)=@filename='./file0\x00', &(0x7f0000000780)='./file0\x00', &(0x7f0000000840)='gadgetfs\x00', 0x10, &(0x7f0000000880)='keyring\x00') perf_event_open(&(0x7f00000007c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x12c00, 0x0, 0xe5e}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) writev(0xffffffffffffffff, 0x0, 0x0) r2 = add_key(&(0x7f0000000240)='big_key\x00', &(0x7f0000000280)={'syz', 0x3}, &(0x7f0000019a40)="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", 0x5bd, 0xfffffffffffffffd) keyctl$read(0xb, r2, &(0x7f0000000a40)=""/102400, 0x19000) keyctl$search(0xa, r2, &(0x7f00000008c0)='keyring\x00', &(0x7f0000000900)={'syz', 0x1}, 0xfffffffffffffffd) request_key(&(0x7f00000006c0)='dns_resolver\x00', &(0x7f0000000700)={'syz', 0x3}, &(0x7f0000000940)='\x00', 0xfffffffffffffffd) r3 = add_key(&(0x7f0000000380)='id_resolver\x00', &(0x7f0000000400)={'syz', 0x3}, &(0x7f0000000440)="e09e6dda135ac7c467011f", 0xb, r0) keyctl$search(0xa, r1, 0x0, &(0x7f0000000340)={'syz', 0x1}, r3) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000140)='cpuset\x00', 0x0, 0x0) add_key$keyring(&(0x7f0000000100), &(0x7f0000000180)={'syz', 0x0}, 0x0, 0x0, r0) r4 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r5 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) request_key(&(0x7f0000000580)='logon\x00', &(0x7f00000005c0)={'syz', 0x0}, &(0x7f0000000600)='\x1f-)\x00', 0xfffffffffffffff9) add_key$fscrypt_provisioning(&(0x7f0000000480), &(0x7f00000004c0)={'syz', 0x0}, &(0x7f0000000640)=ANY=[], 0x48, r0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = openat$cgroup_int(r4, &(0x7f00000001c0)='cpuset.sched_load_balance\x00', 0x2, 0x0) dup3(r7, r4, 0x0) add_key$keyring(&(0x7f0000000540), &(0x7f0000000640)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffc) r8 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000980), 0x200000, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r5, 0x81f8943c, &(0x7f000001a000)={0x0, ""/256, 0x0, 0x0, 0x0, 0x0, ""/16, ""/16, ""/16, 0x0}) ioctl$BTRFS_IOC_SUBVOL_CREATE_V2(r6, 0x50009418, &(0x7f000001a200)={{r8}, r9, 0x2, @inherit={0x58, &(0x7f00000009c0)={0x1, 0x2, 0x8, 0x7, {0x14, 0x1000, 0x5, 0x7, 0x4}, [0xffff, 0x3]}}, @subvolid=0x4}) writev(r4, &(0x7f0000000300)=[{&(0x7f00000000c0)='0', 0x1}, {&(0x7f00000003c0)='7', 0x1}], 0x2) [ 2016.956899] new mount options do not match the existing superblock, will be ignored [ 2016.970452] hfs: uid requires an argument [ 2017.002598] hfs: unable to parse mount options 16:35:01 executing program 0: r0 = request_key(0x0, 0x0, 0x0, 0xfffffffffffffffd) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) r1 = add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000740)=@filename='./file0\x00', &(0x7f0000000780)='./file0\x00', &(0x7f0000000840)='gadgetfs\x00', 0x0, &(0x7f0000000880)='keyring\x00') perf_event_open(&(0x7f00000007c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x12c00, 0x0, 0xe5e}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) writev(0xffffffffffffffff, 0x0, 0x0) r2 = add_key(0x0, &(0x7f0000000280)={'syz', 0x3}, &(0x7f0000019a40)="4195738ac28ccd83aa93c4ecacdaca3d34104be4cc5531c4091facf7f777321e84e49e039122a2d1cf7fea6a02aac8944c27ba038156bc10c0f7a6b26fbf382f67959d856600881f0e692c60f12ace775aab8d775dc2586454918a0db1811f5e8086f1a9805166c870b8387d380d5115af5841dad21f629e05f4b51e362c46b58a7dc2855c5189bff60d02c05ba67c297aa0ad05b93b1ee2fffae13fe5764d4e2a214e15093841b1551d518a669fa94e8918bfdd6573d5c0275a9b91ddb843775f78574891e03697f6ca290be6599b671093898a82e7905ed7c7fd8e8b422ebf12e5b543885596fc5c305d497407ffe73bd543f79c983f0807ae7e13fb5053fd7a07dddf8ec739418b59d67219f008f540161cec3bfd1b3097aad497248b221d572a9eb1bad6d921fcdcfdfacf8d1e392635168747056ec8a3fc45b3027293a517d50ea789294f132f2392919dc81ba5eb02e27e116cc300000000b6c0e39688425a3cb17d35f4b1eec0a37193f233c6655c6f40c09b4ea04c8880a431a8274127d56c3c8cab73a5fcf2b604b83658344e323eeedb0b283b0b3616236e904a42fed9fc8f4c131b047bfd5d7586e6a28032a4584fd5933472ce49dfdc99976166bb37eb1679b22249a222ffab17948dd6cc6f23f42ecd32a980ab8fc7c7d2da1a91f1db1187066c144bcbdb46240b7ef7ed28da4a358295b6104e4c60b09654e79f766e19e44174e94fa41d358d3dd901c060a06a388727be1092a37c0015695b1363ed018e724947983aa6b5974daf6388547cdacbd44a1282c3b9130cbf9536c29a523980b9e4328d1a7c0de8b636d7dfdee36434125948b1d802d5d143645c3a5f8da50adeef6e4f715361908a20cb998d3e0907aef9fdd19bb79be8c510b8aa04600163636c1d1f36f3834ffa3c7369e1d8ed9348bc339da2a525c4f165c0caebb7a4ee632a37a43897084e3c07a5ed8b505a51a4777095060b0ff6a6442206244dd9a13b5ba52b07c718e9eaad10befd12be35dc50283d584035d75e4917548ff58045b88d29b6826ceb6d44fb54ba3ef7944da6e86c0f2d0bc0bd725aa9193b3de4837634ead361d9b2ff5ae4de005f53d48cba029b43eb35fbedd0b5397918a9324b6e1f1d88399d8ad69b7d79e89ded6fe81fd1200f95c831f8c60dc1483e97052f61d0a643df0c2e1b0ba7d00b0692efd1bfc1ece10c2e785e3cb3b0dfbdbd722b6e53e5a2884b1cc5d939a572564bc8a2260e8718230878edb3a877f5c585f4373ef8e0e1cff5dacf96862906ff37eec18ba706d22b101965eaf5f5e29f544977896117e25ceb572f3443eddf9651c2ac69c911b21fd69e59ee57ebe4c549ff2a3dcd904656663039789f022a6caa7f76640e75efdba82dabacf8c0112bd4e62a3a9e69a9824c1af45cf86b307d9749937dd08b6ef49860cda5da7bb886f92db7cd43a869aa646a6da291a75ff28c4d728b1377b8e80233b33e724a60c0a015ec75cd86af04a4bd43964d8f7ba781a99d0cd7ff7e189fc91801655cb1b60e6bc3af747655341deceadbed3d76bdfae92389cc87c417e0f58f3fbcc56ff347467a20773146a81090ff42bbb5383d74108028f5fa532c647746054c312e2e4c085f58d93bec6da7c2bfd99fc59c1631cc71110acc2bf352b994e2a246be3cc1d240fa0c60eb04b92a9673d2ac2bba7f322ddbbd74712b0ec459050586523bd0b0505174a701206e47f2bb7fe20caf5ed73d33447b89432802e7d4606512e217aedf78c871e10cfbdf202efbf3fd8495b6be18cde726dc1fefc01921e9d1f15c8301376c33b5a698d0f7d5f317835d74857e121fe820d93f6b757c9938ec81f9b19a4b0d4ed35d1309fbcb285cf7717e9e27aaaba9d7d742fcfd786eacd993fb119e1d52908ca7ce2135046fa95805704c6258fd1b5fc1434af7ab99609820d73627080d43bcaeeb42ce423e17aa4df3a6994ead3133e2ecfbc6fa308c6b71b78cbab273641970b49e15d0dbe7aea716eaf6cf40f90d0d7d3d8bf1d165d25d5f6f6376416b9dd13731c5c2fdadee8e48c76430cccb21d8e6c659", 0x5bd, 0xfffffffffffffffd) keyctl$read(0xb, r2, &(0x7f0000000a40)=""/102400, 0x19000) keyctl$search(0xa, r2, &(0x7f00000008c0)='keyring\x00', &(0x7f0000000900)={'syz', 0x1}, 0xfffffffffffffffd) request_key(&(0x7f00000006c0)='dns_resolver\x00', &(0x7f0000000700)={'syz', 0x3}, 0x0, 0xfffffffffffffffd) r3 = add_key(&(0x7f0000000380)='id_resolver\x00', &(0x7f0000000400)={'syz', 0x3}, &(0x7f0000000440)="e09e6dda135ac7c467011f", 0xb, r0) keyctl$search(0xa, r1, 0x0, &(0x7f0000000340)={'syz', 0x1}, r3) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000140)='cpuset\x00', 0x0, 0x0) add_key$keyring(&(0x7f0000000100), &(0x7f0000000180)={'syz', 0x0}, 0x0, 0x0, r0) r4 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r5 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) open(&(0x7f00000002c0)='./file0\x00', 0x98d00, 0x8) request_key(&(0x7f0000000580)='logon\x00', 0x0, &(0x7f0000000600)='\x1f-)\x00', 0xfffffffffffffff9) add_key$fscrypt_provisioning(&(0x7f0000000480), &(0x7f00000004c0)={'syz', 0x0}, &(0x7f0000000640)=ANY=[], 0x48, r0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = openat$cgroup_int(r4, &(0x7f00000001c0)='cpuset.sched_load_balance\x00', 0x2, 0x0) dup3(r7, r4, 0x0) r8 = add_key$keyring(&(0x7f0000000540), &(0x7f0000000640)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffc) r9 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000980), 0x200000, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r5, 0x81f8943c, &(0x7f000001a000)={0x0, ""/256, 0x0, 0x0, 0x0, 0x0, ""/16, ""/16, ""/16, 0x0}) ioctl$BTRFS_IOC_SUBVOL_CREATE_V2(r6, 0x50009418, &(0x7f000001a200)={{r9}, r10, 0x2, @inherit={0x58, &(0x7f00000009c0)={0x1, 0x2, 0x8, 0x7, {0x14, 0x1000, 0x5, 0x7}, [0xffff, 0x0]}}, @subvolid=0x4}) keyctl$search(0xa, r3, 0x0, &(0x7f0000000500)={'syz', 0x0}, r8) writev(r4, &(0x7f0000000300)=[{&(0x7f00000000c0)='0', 0xc500}, {&(0x7f00000003c0)='7', 0x1}], 0x2) [ 2017.065330] new mount options do not match the existing superblock, will be ignored [ 2017.100569] new mount options do not match the existing superblock, will be ignored [ 2017.104281] hfs: invalid gid -1 16:35:01 executing program 2: r0 = request_key(0x0, 0x0, 0x0, 0xfffffffffffffffd) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) perf_event_open(&(0x7f00000007c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0xe5e}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) keyctl$read(0xb, 0x0, &(0x7f0000000a40)=""/102400, 0x19000) keyctl$search(0xa, 0x0, &(0x7f00000008c0)='keyring\x00', &(0x7f0000000900)={'syz', 0x1}, 0xfffffffffffffffd) request_key(&(0x7f00000006c0)='dns_resolver\x00', &(0x7f0000000700)={'syz', 0x3}, &(0x7f0000000940)='\x00', 0xfffffffffffffffd) add_key(0x0, &(0x7f0000000400)={'syz', 0x3}, &(0x7f0000000440), 0x0, r0) keyctl$search(0xa, 0x0, 0x0, &(0x7f0000000340)={'syz', 0x1}, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000140)='cpuset\x00', 0x0, 0x0) add_key$keyring(&(0x7f0000000100), 0x0, 0x0, 0x0, r0) r1 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) request_key(0x0, &(0x7f00000005c0)={'syz', 0x0}, 0x0, 0xfffffffffffffff9) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = openat$cgroup_int(r1, &(0x7f00000001c0)='cpuset.sched_load_balance\x00', 0x2, 0x0) dup3(r3, r1, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x200000, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f000001a000)={0x0, ""/256, 0x0, 0x0, 0x0, 0x0, ""/16, ""/16, ""/16, 0x0}) ioctl$BTRFS_IOC_SUBVOL_CREATE_V2(r2, 0x50009418, &(0x7f000001a200)={{}, r4, 0x2, @inherit={0x58, &(0x7f00000009c0)={0x1, 0x2, 0x8, 0x0, {0x0, 0x0, 0x0, 0x0, 0x4}, [0x0, 0x0]}}, @subvolid=0x4}) ioctl$BTRFS_IOC_BALANCE(0xffffffffffffffff, 0x5000940c, 0x0) keyctl$search(0xa, 0x0, &(0x7f0000000200)='keyring\x00', &(0x7f0000000500)={'syz', 0x0}, 0x0) writev(r1, &(0x7f0000000300)=[{&(0x7f00000000c0)}, {&(0x7f00000003c0)}], 0x2) [ 2017.143389] hfs: unable to parse mount options 16:35:01 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x2, 0x0) socket(0x2b, 0x2, 0x3) (async) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000140)={0x0, 0x0}, &(0x7f0000cab000)=0x6e) syz_mount_image$hfs(&(0x7f0000000240), &(0x7f0000000380)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x3, &(0x7f0000000400)={[{}, {@part={'part', 0x3d, 0x10001}}, {@type={'type', 0x3d, "7614866b"}}, {@uid={'uid', 0x3d, r1}}, {@codepage={'codepage', 0x3d, 'ascii'}}], [{@rootcontext={'rootcontext', 0x3d, 'sysadm_u'}}]}, 0x1, 0x235, &(0x7f0000000000)="$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") 16:35:01 executing program 4: r0 = request_key(0x0, 0x0, 0x0, 0xfffffffffffffffd) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) r1 = add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000780)='./file0\x00', &(0x7f0000000840)='gadgetfs\x00', 0x0, &(0x7f0000000880)='keyring\x00') perf_event_open(&(0x7f00000007c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x12c00, 0x0, 0xe5e}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) writev(0xffffffffffffffff, 0x0, 0x0) keyctl$read(0xb, 0x0, &(0x7f0000000a40)=""/102400, 0x19000) keyctl$search(0xa, 0x0, 0x0, 0x0, 0xfffffffffffffffd) request_key(&(0x7f00000006c0)='dns_resolver\x00', &(0x7f0000000700)={'syz', 0x3}, &(0x7f0000000940)='\x00', 0xfffffffffffffffd) r2 = add_key(&(0x7f0000000380)='id_resolver\x00', 0x0, &(0x7f0000000440), 0x0, r0) keyctl$search(0xa, r1, 0x0, &(0x7f0000000340)={'syz', 0x1}, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000140)='cpuset\x00', 0x0, 0x0) add_key$keyring(&(0x7f0000000100), &(0x7f0000000180)={'syz', 0x0}, 0x0, 0x0, r0) r3 = open(0x0, 0x0, 0x0) r4 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) open(&(0x7f00000002c0)='./file0\x00', 0x98d00, 0x8) request_key(&(0x7f0000000580)='logon\x00', &(0x7f00000005c0)={'syz', 0x0}, &(0x7f0000000600)='\x1f-)\x00', 0xfffffffffffffff9) write$rfkill(r4, &(0x7f0000000040)={0x0, 0x0, 0x3}, 0x8) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = openat$cgroup_int(r3, &(0x7f00000001c0)='cpuset.sched_load_balance\x00', 0x2, 0x0) dup3(r6, r3, 0x0) r7 = add_key$keyring(&(0x7f0000000540), &(0x7f0000000640)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffc) r8 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000980), 0x200000, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r4, 0x81f8943c, &(0x7f000001a000)={0x0, ""/256, 0x0, 0x0, 0x0, 0x0, ""/16, ""/16, ""/16, 0x0}) ioctl$BTRFS_IOC_SUBVOL_CREATE_V2(r5, 0x50009418, &(0x7f000001a200)={{r8}, r9, 0x2, @inherit={0x58, &(0x7f00000009c0)={0x1, 0x2, 0x8, 0x7, {0x14, 0x1000, 0x5, 0x7, 0x4}, [0xffff, 0x3]}}, @subvolid=0x4}) ioctl$BTRFS_IOC_BALANCE(r5, 0x5000940c, 0x0) keyctl$search(0xa, r2, &(0x7f0000000200)='keyring\x00', &(0x7f0000000500)={'syz', 0x0}, r7) writev(r3, &(0x7f0000000300)=[{&(0x7f00000000c0)='0', 0x1}, {&(0x7f00000003c0)='7', 0x1}], 0x2) [ 2017.170462] new mount options do not match the existing superblock, will be ignored 16:35:01 executing program 5: r0 = request_key(0x0, 0x0, 0x0, 0xfffffffffffffffd) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) r1 = add_key$keyring(0x0, &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000740)=@filename='./file0\x00', &(0x7f0000000780)='./file0\x00', &(0x7f0000000840)='gadgetfs\x00', 0x10, &(0x7f0000000880)='keyring\x00') perf_event_open(&(0x7f00000007c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x12c00, 0x0, 0xe5e}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) writev(0xffffffffffffffff, 0x0, 0x0) r2 = add_key(&(0x7f0000000240)='big_key\x00', &(0x7f0000000280)={'syz', 0x3}, &(0x7f0000019a40)="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", 0x5bd, 0xfffffffffffffffd) keyctl$read(0xb, r2, &(0x7f0000000a40)=""/102400, 0x19000) keyctl$search(0xa, r2, &(0x7f00000008c0)='keyring\x00', &(0x7f0000000900)={'syz', 0x1}, 0xfffffffffffffffd) request_key(&(0x7f00000006c0)='dns_resolver\x00', &(0x7f0000000700)={'syz', 0x3}, &(0x7f0000000940)='\x00', 0xfffffffffffffffd) r3 = add_key(&(0x7f0000000380)='id_resolver\x00', &(0x7f0000000400)={'syz', 0x3}, &(0x7f0000000440)="e09e6dda135ac7c467011f", 0xb, r0) keyctl$search(0xa, r1, 0x0, &(0x7f0000000340)={'syz', 0x1}, r3) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000140)='cpuset\x00', 0x0, 0x0) add_key$keyring(&(0x7f0000000100), &(0x7f0000000180)={'syz', 0x0}, 0x0, 0x0, r0) r4 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r5 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) request_key(&(0x7f0000000580)='logon\x00', &(0x7f00000005c0)={'syz', 0x0}, &(0x7f0000000600)='\x1f-)\x00', 0xfffffffffffffff9) add_key$fscrypt_provisioning(&(0x7f0000000480), &(0x7f00000004c0)={'syz', 0x0}, &(0x7f0000000640)=ANY=[], 0x48, r0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = openat$cgroup_int(r4, &(0x7f00000001c0)='cpuset.sched_load_balance\x00', 0x2, 0x0) dup3(r7, r4, 0x0) add_key$keyring(&(0x7f0000000540), &(0x7f0000000640)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffc) r8 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000980), 0x200000, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r5, 0x81f8943c, &(0x7f000001a000)={0x0, ""/256, 0x0, 0x0, 0x0, 0x0, ""/16, ""/16, ""/16, 0x0}) ioctl$BTRFS_IOC_SUBVOL_CREATE_V2(r6, 0x50009418, &(0x7f000001a200)={{r8}, r9, 0x2, @inherit={0x58, &(0x7f00000009c0)={0x1, 0x2, 0x8, 0x7, {0x14, 0x1000, 0x5, 0x7, 0x4}, [0xffff, 0x3]}}, @subvolid=0x4}) writev(r4, &(0x7f0000000300)=[{&(0x7f00000000c0)='0', 0x1}, {&(0x7f00000003c0)='7', 0x1}], 0x2) 16:35:01 executing program 1: syz_mount_image$hfs(&(0x7f0000000240), &(0x7f0000000380)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x3, &(0x7f0000000780)=ANY=[@ANYBLOB='quiet,gid=', @ANYRESHEX, @ANYBLOB="2c2a7270653d7614866b2c75693df589299908000000450000005d38ff0c0071446a0c48dba349ba347528523876dc8d7918ecea1024ba9669ff19a9ab5e27062b1dae8d8c0eb880008164ed9d8093fdc35f282dee56df9531b6e0c94b43c314af69146a70075499da5e7f927d3c672787e3d33a6071ff2c1483a1a7cfb34131bfee72f86068d0966d", @ANYRESHEX, @ANYBLOB=',codepage=ascii,rootcontext=sysadm_u,\x00'], 0x1, 0x235, &(0x7f0000000000)="$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") [ 2017.217529] new mount options do not match the existing superblock, will be ignored [ 2017.264862] hfs: uid requires an argument [ 2017.269166] hfs: unable to parse mount options 16:35:01 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x8, 0x0, 0x0, 0x9, 0x21102, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x1c62, 0x0, 0x0, 0x9, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000140)={0x0, 0x0}, &(0x7f0000cab000)=0x6e) getsockopt$CAN_RAW_JOIN_FILTERS(r0, 0x65, 0x6, &(0x7f0000000280), &(0x7f00000002c0)=0x4) syz_mount_image$hfs(&(0x7f0000000240), &(0x7f0000000380)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x3, &(0x7f0000000400)={[{}, {@part={'part', 0x3d, 0x10001}}, {@type={'type', 0x3d, "7614866b"}}, {@uid={'uid', 0x3d, r1}}, {@codepage={'codepage', 0x3d, 'ascii'}}], [{@rootcontext={'rootcontext', 0x3d, 'sysadm_u'}}]}, 0x1, 0x235, &(0x7f0000000000)="$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") 16:35:01 executing program 0: r0 = request_key(0x0, 0x0, 0x0, 0xfffffffffffffffd) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) r1 = add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000740)=@filename='./file0\x00', &(0x7f0000000780)='./file0\x00', &(0x7f0000000840)='gadgetfs\x00', 0x0, &(0x7f0000000880)='keyring\x00') perf_event_open(&(0x7f00000007c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x12c00, 0x0, 0xe5e}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) writev(0xffffffffffffffff, 0x0, 0x0) r2 = add_key(0x0, &(0x7f0000000280)={'syz', 0x3}, &(0x7f0000019a40)="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", 0x5bd, 0xfffffffffffffffd) keyctl$read(0xb, r2, &(0x7f0000000a40)=""/102400, 0x19000) keyctl$search(0xa, r2, &(0x7f00000008c0)='keyring\x00', &(0x7f0000000900)={'syz', 0x1}, 0xfffffffffffffffd) request_key(&(0x7f00000006c0)='dns_resolver\x00', &(0x7f0000000700)={'syz', 0x3}, 0x0, 0xfffffffffffffffd) r3 = add_key(&(0x7f0000000380)='id_resolver\x00', &(0x7f0000000400)={'syz', 0x3}, &(0x7f0000000440)="e09e6dda135ac7c467011f", 0xb, r0) keyctl$search(0xa, r1, 0x0, &(0x7f0000000340)={'syz', 0x1}, r3) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000140)='cpuset\x00', 0x0, 0x0) add_key$keyring(&(0x7f0000000100), &(0x7f0000000180)={'syz', 0x0}, 0x0, 0x0, r0) r4 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r5 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) open(&(0x7f00000002c0)='./file0\x00', 0x98d00, 0x8) request_key(&(0x7f0000000580)='logon\x00', 0x0, &(0x7f0000000600)='\x1f-)\x00', 0xfffffffffffffff9) add_key$fscrypt_provisioning(&(0x7f0000000480), &(0x7f00000004c0)={'syz', 0x0}, &(0x7f0000000640)=ANY=[], 0x48, r0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = openat$cgroup_int(r4, &(0x7f00000001c0)='cpuset.sched_load_balance\x00', 0x2, 0x0) dup3(r7, r4, 0x0) r8 = add_key$keyring(&(0x7f0000000540), &(0x7f0000000640)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffc) r9 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000980), 0x200000, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r5, 0x81f8943c, &(0x7f000001a000)={0x0, ""/256, 0x0, 0x0, 0x0, 0x0, ""/16, ""/16, ""/16, 0x0}) ioctl$BTRFS_IOC_SUBVOL_CREATE_V2(r6, 0x50009418, &(0x7f000001a200)={{r9}, r10, 0x2, @inherit={0x58, &(0x7f00000009c0)={0x1, 0x2, 0x8, 0x7, {0x14, 0x1000, 0x5, 0x7}, [0xffff, 0x0]}}, @subvolid=0x4}) keyctl$search(0xa, r3, 0x0, &(0x7f0000000500)={'syz', 0x0}, r8) writev(r4, &(0x7f0000000300)=[{&(0x7f00000000c0)='0', 0xc600}, {&(0x7f00000003c0)='7', 0x1}], 0x2) 16:35:01 executing program 2: r0 = request_key(0x0, 0x0, 0x0, 0xfffffffffffffffd) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) perf_event_open(&(0x7f00000007c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0xe5e}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) keyctl$read(0xb, 0x0, &(0x7f0000000a40)=""/102400, 0x19000) keyctl$search(0xa, 0x0, &(0x7f00000008c0)='keyring\x00', &(0x7f0000000900)={'syz', 0x1}, 0xfffffffffffffffd) request_key(&(0x7f00000006c0)='dns_resolver\x00', &(0x7f0000000700)={'syz', 0x3}, &(0x7f0000000940)='\x00', 0xfffffffffffffffd) add_key(0x0, &(0x7f0000000400)={'syz', 0x3}, &(0x7f0000000440), 0x0, r0) keyctl$search(0xa, 0x0, 0x0, &(0x7f0000000340)={'syz', 0x1}, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000140)='cpuset\x00', 0x0, 0x0) add_key$keyring(&(0x7f0000000100), 0x0, 0x0, 0x0, r0) r1 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) request_key(0x0, &(0x7f00000005c0)={'syz', 0x0}, 0x0, 0xfffffffffffffff9) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = openat$cgroup_int(r1, &(0x7f00000001c0)='cpuset.sched_load_balance\x00', 0x2, 0x0) dup3(r3, r1, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x200000, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f000001a000)={0x0, ""/256, 0x0, 0x0, 0x0, 0x0, ""/16, ""/16, ""/16, 0x0}) ioctl$BTRFS_IOC_SUBVOL_CREATE_V2(r2, 0x50009418, &(0x7f000001a200)={{}, r4, 0x2, @inherit={0x58, &(0x7f00000009c0)={0x1, 0x2, 0x8, 0x0, {0x0, 0x0, 0x0, 0x0, 0x4}, [0x0, 0x0]}}, @subvolid=0x4}) ioctl$BTRFS_IOC_BALANCE(0xffffffffffffffff, 0x5000940c, 0x0) keyctl$search(0xa, 0x0, &(0x7f0000000200)='keyring\x00', &(0x7f0000000500)={'syz', 0x0}, 0x0) writev(r1, &(0x7f0000000300)=[{0x0}, {&(0x7f00000003c0)}], 0x2) [ 2017.364596] hfs: invalid gid -1 [ 2017.394177] hfs: unable to parse mount options [ 2017.395977] new mount options do not match the existing superblock, will be ignored 16:35:01 executing program 1: syz_mount_image$hfs(&(0x7f0000000240), &(0x7f0000000380)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x3, &(0x7f0000000780)=ANY=[@ANYBLOB='quiet,gid=', @ANYRESHEX, @ANYBLOB="2c2a7270653d7614866b2c75693df589299908000000450000005d38ff0c0071446a0c48dba349ba347528523876dc8d7918ecea1024ba9669ff19a9ab5e27062b1dae8d8c0eb880008164ed9d8093fdc35f282dee56df9531b6e0c94b43c314af69146a70075499da5e7f927d3c672787e3d33a6071ff2c1483a1a7cfb34131bfee72f86068d0966d", @ANYRESHEX, @ANYBLOB=',codepage=ascii,rootcontext=sysadm_u,\x00'], 0x1, 0x235, &(0x7f0000000000)="$eJzs3c9qE1EUx/HfvYkabanTPyK4rBZcSVs34kaQPIQrUZsIxVBBK6grcS0+gHtfwYdwJb6Arlz5ANmN3DM3zTRmMmk1ubT9fiBh2rln5pzOnc49gVIBOLPut398vv0rvJzUUEPSXclLaklNSVd0tfVqb393v9ftTDpQwyLCy6mIdH+N2dnrjgsNcRYRZeGrphbL38Ns5Hme/0ydBJKzu38ML12Id6ftb809s9l4lzqBxFxffb3WUuo8AABpxee/j8/5xbh+917aiI/9U/X876dOILHS89+6rNyF63vZdg37PWvhwn4/6BKPc67zKmbWoQWmq+sqLRd/8elur3tr53mv4/Ve96LSsDV77xRTd6Am2/UxvekEx699wWo4F2rYrsh/9f+esZ776r65hy7TJ3UO1n/N3IXLZFcqG7lSRf6b1Ue0KrNiVEWVy3aSa/EMUU2VrfEdiQYzalmHPyDI6vK0qJWRqKK6rZqo1bFR29VRNnvXRqOGs7k6ctbcR/fAreu3vqhdWv/78NPe0DR3ZhhjI+PMmFhP00ZmUyTmj1QG/s0HPdEdLb188/bZ416v+4INNthg42Aj9S8ozMPwoqfOBImEdZcr+r9Sv7JpLVJ4yyas0/O6g5eOuFXRG6zY+6UjdXAL1R3ctD3X9ZvSjenPmMU8TwnX1nc94vN/AAAAAAAAAAAAAAAAAACAk2Yef06QukYAAAAAAAAAAAAAAAAAAAAAAE46/v8vcHb9CQAA//+qqIIh") [ 2017.463950] new mount options do not match the existing superblock, will be ignored [ 2017.474431] new mount options do not match the existing superblock, will be ignored 16:35:01 executing program 5: r0 = request_key(0x0, 0x0, 0x0, 0xfffffffffffffffd) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) r1 = add_key$keyring(0x0, &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000740)=@filename='./file0\x00', &(0x7f0000000780)='./file0\x00', &(0x7f0000000840)='gadgetfs\x00', 0x10, &(0x7f0000000880)='keyring\x00') perf_event_open(&(0x7f00000007c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x12c00, 0x0, 0xe5e}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) writev(0xffffffffffffffff, 0x0, 0x0) r2 = add_key(&(0x7f0000000240)='big_key\x00', &(0x7f0000000280)={'syz', 0x3}, &(0x7f0000019a40)="4195738ac28ccd83aa93c4ecacdaca3d34104be4cc5531c4091facf7f777321e84e49e039122a2d1cf7fea6a02aac8944c27ba038156bc10c0f7a6b26fbf382f67959d856600881f0e692c60f12ace775aab8d775dc2586454918a0db1811f5e8086f1a9805166c870b8387d380d5115af5841dad21f629e05f4b51e362c46b58a7dc2855c5189bff60d02c05ba67c297aa0ad05b93b1ee2fffae13fe5764d4e2a214e15093841b1551d518a669fa94e8918bfdd6573d5c0275a9b91ddb843775f78574891e03697f6ca290be6599b671093898a82e7905ed7c7fd8e8b422ebf12e5b543885596fc5c305d497407ffe73bd543f79c983f0807ae7e13fb5053fd7a07dddf8ec739418b59d67219f008f540161cec3bfd1b3097aad497248b221d572a9eb1bad6d921fcdcfdfacf8d1e392635168747056ec8a3fc45b3027293a517d50ea789294f132f2392919dc81ba5eb02e27e116cc300000000b6c0e39688425a3cb17d35f4b1eec0a37193f233c6655c6f40c09b4ea04c8880a431a8274127d56c3c8cab73a5fcf2b604b83658344e323eeedb0b283b0b3616236e904a42fed9fc8f4c131b047bfd5d7586e6a28032a4584fd5933472ce49dfdc99976166bb37eb1679b22249a222ffab17948dd6cc6f23f42ecd32a980ab8fc7c7d2da1a91f1db1187066c144bcbdb46240b7ef7ed28da4a358295b6104e4c60b09654e79f766e19e44174e94fa41d358d3dd901c060a06a388727be1092a37c0015695b1363ed018e724947983aa6b5974daf6388547cdacbd44a1282c3b9130cbf9536c29a523980b9e4328d1a7c0de8b636d7dfdee36434125948b1d802d5d143645c3a5f8da50adeef6e4f715361908a20cb998d3e0907aef9fdd19bb79be8c510b8aa04600163636c1d1f36f3834ffa3c7369e1d8ed9348bc339da2a525c4f165c0caebb7a4ee632a37a43897084e3c07a5ed8b505a51a4777095060b0ff6a6442206244dd9a13b5ba52b07c718e9eaad10befd12be35dc50283d584035d75e4917548ff58045b88d29b6826ceb6d44fb54ba3ef7944da6e86c0f2d0bc0bd725aa9193b3de4837634ead361d9b2ff5ae4de005f53d48cba029b43eb35fbedd0b5397918a9324b6e1f1d88399d8ad69b7d79e89ded6fe81fd1200f95c831f8c60dc1483e97052f61d0a643df0c2e1b0ba7d00b0692efd1bfc1ece10c2e785e3cb3b0dfbdbd722b6e53e5a2884b1cc5d939a572564bc8a2260e8718230878edb3a877f5c585f4373ef8e0e1cff5dacf96862906ff37eec18ba706d22b101965eaf5f5e29f544977896117e25ceb572f3443eddf9651c2ac69c911b21fd69e59ee57ebe4c549ff2a3dcd904656663039789f022a6caa7f76640e75efdba82dabacf8c0112bd4e62a3a9e69a9824c1af45cf86b307d9749937dd08b6ef49860cda5da7bb886f92db7cd43a869aa646a6da291a75ff28c4d728b1377b8e80233b33e724a60c0a015ec75cd86af04a4bd43964d8f7ba781a99d0cd7ff7e189fc91801655cb1b60e6bc3af747655341deceadbed3d76bdfae92389cc87c417e0f58f3fbcc56ff347467a20773146a81090ff42bbb5383d74108028f5fa532c647746054c312e2e4c085f58d93bec6da7c2bfd99fc59c1631cc71110acc2bf352b994e2a246be3cc1d240fa0c60eb04b92a9673d2ac2bba7f322ddbbd74712b0ec459050586523bd0b0505174a701206e47f2bb7fe20caf5ed73d33447b89432802e7d4606512e217aedf78c871e10cfbdf202efbf3fd8495b6be18cde726dc1fefc01921e9d1f15c8301376c33b5a698d0f7d5f317835d74857e121fe820d93f6b757c9938ec81f9b19a4b0d4ed35d1309fbcb285cf7717e9e27aaaba9d7d742fcfd786eacd993fb119e1d52908ca7ce2135046fa95805704c6258fd1b5fc1434af7ab99609820d73627080d43bcaeeb42ce423e17aa4df3a6994ead3133e2ecfbc6fa308c6b71b78cbab273641970b49e15d0dbe7aea716eaf6cf40f90d0d7d3d8bf1d165d25d5f6f6376416b9dd13731c5c2fdadee8e48c76430cccb21d8e6c659", 0x5bd, 0xfffffffffffffffd) keyctl$read(0xb, r2, &(0x7f0000000a40)=""/102400, 0x19000) keyctl$search(0xa, r2, &(0x7f00000008c0)='keyring\x00', &(0x7f0000000900)={'syz', 0x1}, 0xfffffffffffffffd) request_key(&(0x7f00000006c0)='dns_resolver\x00', &(0x7f0000000700)={'syz', 0x3}, &(0x7f0000000940)='\x00', 0xfffffffffffffffd) r3 = add_key(&(0x7f0000000380)='id_resolver\x00', &(0x7f0000000400)={'syz', 0x3}, &(0x7f0000000440)="e09e6dda135ac7c467011f", 0xb, r0) keyctl$search(0xa, r1, 0x0, &(0x7f0000000340)={'syz', 0x1}, r3) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000140)='cpuset\x00', 0x0, 0x0) add_key$keyring(&(0x7f0000000100), &(0x7f0000000180)={'syz', 0x0}, 0x0, 0x0, r0) r4 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r5 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) request_key(&(0x7f0000000580)='logon\x00', &(0x7f00000005c0)={'syz', 0x0}, &(0x7f0000000600)='\x1f-)\x00', 0xfffffffffffffff9) add_key$fscrypt_provisioning(&(0x7f0000000480), &(0x7f00000004c0)={'syz', 0x0}, &(0x7f0000000640)=ANY=[], 0x48, r0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = openat$cgroup_int(r4, &(0x7f00000001c0)='cpuset.sched_load_balance\x00', 0x2, 0x0) dup3(r7, r4, 0x0) add_key$keyring(&(0x7f0000000540), &(0x7f0000000640)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffc) r8 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000980), 0x200000, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r5, 0x81f8943c, &(0x7f000001a000)={0x0, ""/256, 0x0, 0x0, 0x0, 0x0, ""/16, ""/16, ""/16, 0x0}) ioctl$BTRFS_IOC_SUBVOL_CREATE_V2(r6, 0x50009418, &(0x7f000001a200)={{r8}, r9, 0x2, @inherit={0x58, &(0x7f00000009c0)={0x1, 0x2, 0x8, 0x7, {0x14, 0x1000, 0x5, 0x7, 0x4}, [0xffff, 0x3]}}, @subvolid=0x4}) writev(r4, &(0x7f0000000300)=[{&(0x7f00000000c0)='0', 0x1}, {&(0x7f00000003c0)='7', 0x1}], 0x2) [ 2017.584304] new mount options do not match the existing superblock, will be ignored [ 2017.614506] hfs: uid requires an argument 16:35:01 executing program 0: r0 = request_key(0x0, 0x0, 0x0, 0xfffffffffffffffd) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) r1 = add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000740)=@filename='./file0\x00', &(0x7f0000000780)='./file0\x00', &(0x7f0000000840)='gadgetfs\x00', 0x0, &(0x7f0000000880)='keyring\x00') perf_event_open(&(0x7f00000007c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x12c00, 0x0, 0xe5e}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) writev(0xffffffffffffffff, 0x0, 0x0) r2 = add_key(0x0, &(0x7f0000000280)={'syz', 0x3}, &(0x7f0000019a40)="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", 0x5bd, 0xfffffffffffffffd) keyctl$read(0xb, r2, &(0x7f0000000a40)=""/102400, 0x19000) keyctl$search(0xa, r2, &(0x7f00000008c0)='keyring\x00', &(0x7f0000000900)={'syz', 0x1}, 0xfffffffffffffffd) request_key(&(0x7f00000006c0)='dns_resolver\x00', &(0x7f0000000700)={'syz', 0x3}, 0x0, 0xfffffffffffffffd) r3 = add_key(&(0x7f0000000380)='id_resolver\x00', &(0x7f0000000400)={'syz', 0x3}, &(0x7f0000000440)="e09e6dda135ac7c467011f", 0xb, r0) keyctl$search(0xa, r1, 0x0, &(0x7f0000000340)={'syz', 0x1}, r3) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000140)='cpuset\x00', 0x0, 0x0) add_key$keyring(&(0x7f0000000100), &(0x7f0000000180)={'syz', 0x0}, 0x0, 0x0, r0) r4 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r5 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) open(&(0x7f00000002c0)='./file0\x00', 0x98d00, 0x8) request_key(&(0x7f0000000580)='logon\x00', 0x0, &(0x7f0000000600)='\x1f-)\x00', 0xfffffffffffffff9) add_key$fscrypt_provisioning(&(0x7f0000000480), &(0x7f00000004c0)={'syz', 0x0}, &(0x7f0000000640)=ANY=[], 0x48, r0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = openat$cgroup_int(r4, &(0x7f00000001c0)='cpuset.sched_load_balance\x00', 0x2, 0x0) dup3(r7, r4, 0x0) r8 = add_key$keyring(&(0x7f0000000540), &(0x7f0000000640)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffc) r9 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000980), 0x200000, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r5, 0x81f8943c, &(0x7f000001a000)={0x0, ""/256, 0x0, 0x0, 0x0, 0x0, ""/16, ""/16, ""/16, 0x0}) ioctl$BTRFS_IOC_SUBVOL_CREATE_V2(r6, 0x50009418, &(0x7f000001a200)={{r9}, r10, 0x2, @inherit={0x58, &(0x7f00000009c0)={0x1, 0x2, 0x8, 0x7, {0x14, 0x1000, 0x5, 0x7}, [0xffff, 0x0]}}, @subvolid=0x4}) keyctl$search(0xa, r3, 0x0, &(0x7f0000000500)={'syz', 0x0}, r8) writev(r4, &(0x7f0000000300)=[{&(0x7f00000000c0)='0', 0xc700}, {&(0x7f00000003c0)='7', 0x1}], 0x2) 16:35:01 executing program 4: r0 = request_key(0x0, 0x0, 0x0, 0xfffffffffffffffd) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) r1 = add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000780)='./file0\x00', &(0x7f0000000840)='gadgetfs\x00', 0x0, &(0x7f0000000880)='keyring\x00') perf_event_open(&(0x7f00000007c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x12c00, 0x0, 0xe5e}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) writev(0xffffffffffffffff, 0x0, 0x0) keyctl$read(0xb, 0x0, &(0x7f0000000a40)=""/102400, 0x19000) keyctl$search(0xa, 0x0, 0x0, 0x0, 0xfffffffffffffffd) request_key(&(0x7f00000006c0)='dns_resolver\x00', &(0x7f0000000700)={'syz', 0x3}, &(0x7f0000000940)='\x00', 0xfffffffffffffffd) r2 = add_key(&(0x7f0000000380)='id_resolver\x00', 0x0, &(0x7f0000000440), 0x0, r0) keyctl$search(0xa, r1, 0x0, &(0x7f0000000340)={'syz', 0x1}, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000140)='cpuset\x00', 0x0, 0x0) add_key$keyring(&(0x7f0000000100), &(0x7f0000000180)={'syz', 0x0}, 0x0, 0x0, r0) r3 = open(0x0, 0x0, 0x0) r4 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) open(&(0x7f00000002c0)='./file0\x00', 0x98d00, 0x8) request_key(&(0x7f0000000580)='logon\x00', &(0x7f00000005c0)={'syz', 0x0}, &(0x7f0000000600)='\x1f-)\x00', 0xfffffffffffffff9) write$rfkill(r4, &(0x7f0000000040)={0x0, 0x0, 0x3}, 0x8) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = openat$cgroup_int(r3, &(0x7f00000001c0)='cpuset.sched_load_balance\x00', 0x2, 0x0) dup3(r6, r3, 0x0) r7 = add_key$keyring(&(0x7f0000000540), &(0x7f0000000640)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffc) r8 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000980), 0x200000, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r4, 0x81f8943c, &(0x7f000001a000)={0x0, ""/256, 0x0, 0x0, 0x0, 0x0, ""/16, ""/16, ""/16, 0x0}) ioctl$BTRFS_IOC_SUBVOL_CREATE_V2(r5, 0x50009418, &(0x7f000001a200)={{r8}, r9, 0x2, @inherit={0x58, &(0x7f00000009c0)={0x1, 0x2, 0x8, 0x7, {0x14, 0x1000, 0x5, 0x7, 0x4}, [0xffff, 0x3]}}, @subvolid=0x4}) ioctl$BTRFS_IOC_BALANCE(r5, 0x5000940c, 0x0) keyctl$search(0xa, r2, &(0x7f0000000200)='keyring\x00', &(0x7f0000000500)={'syz', 0x0}, r7) writev(r3, &(0x7f0000000300)=[{&(0x7f00000000c0)='0', 0x1}, {&(0x7f00000003c0)='7', 0x1}], 0x2) [ 2017.652405] hfs: unable to parse mount options 16:35:01 executing program 2: r0 = request_key(0x0, 0x0, 0x0, 0xfffffffffffffffd) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) perf_event_open(&(0x7f00000007c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0xe5e}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) keyctl$read(0xb, 0x0, &(0x7f0000000a40)=""/102400, 0x19000) keyctl$search(0xa, 0x0, &(0x7f00000008c0)='keyring\x00', &(0x7f0000000900)={'syz', 0x1}, 0xfffffffffffffffd) request_key(&(0x7f00000006c0)='dns_resolver\x00', &(0x7f0000000700)={'syz', 0x3}, &(0x7f0000000940)='\x00', 0xfffffffffffffffd) add_key(0x0, &(0x7f0000000400)={'syz', 0x3}, &(0x7f0000000440), 0x0, r0) keyctl$search(0xa, 0x0, 0x0, &(0x7f0000000340)={'syz', 0x1}, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000140)='cpuset\x00', 0x0, 0x0) add_key$keyring(&(0x7f0000000100), 0x0, 0x0, 0x0, r0) r1 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) request_key(0x0, &(0x7f00000005c0)={'syz', 0x0}, 0x0, 0xfffffffffffffff9) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = openat$cgroup_int(r1, &(0x7f00000001c0)='cpuset.sched_load_balance\x00', 0x2, 0x0) dup3(r3, r1, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x200000, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f000001a000)={0x0, ""/256, 0x0, 0x0, 0x0, 0x0, ""/16, ""/16, ""/16, 0x0}) ioctl$BTRFS_IOC_SUBVOL_CREATE_V2(r2, 0x50009418, &(0x7f000001a200)={{}, r4, 0x2, @inherit={0x58, &(0x7f00000009c0)={0x1, 0x2, 0x8, 0x0, {0x0, 0x0, 0x0, 0x0, 0x4}, [0x0, 0x0]}}, @subvolid=0x4}) ioctl$BTRFS_IOC_BALANCE(0xffffffffffffffff, 0x5000940c, 0x0) keyctl$search(0xa, 0x0, &(0x7f0000000200)='keyring\x00', &(0x7f0000000500)={'syz', 0x0}, 0x0) writev(r1, &(0x7f0000000300)=[{0x0}, {&(0x7f00000003c0)}], 0x2) 16:35:01 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x8, 0x0, 0x0, 0x9, 0x21102, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x1c62, 0x0, 0x0, 0x9, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000140)={0x0, 0x0}, &(0x7f0000cab000)=0x6e) getsockopt$CAN_RAW_JOIN_FILTERS(r0, 0x65, 0x6, &(0x7f0000000280), &(0x7f00000002c0)=0x4) syz_mount_image$hfs(&(0x7f0000000240), &(0x7f0000000380)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x3, &(0x7f0000000400)={[{}, {@part={'part', 0x3d, 0x10001}}, {@type={'type', 0x3d, "7614866b"}}, {@uid={'uid', 0x3d, r1}}, {@codepage={'codepage', 0x3d, 'ascii'}}], [{@rootcontext={'rootcontext', 0x3d, 'sysadm_u'}}]}, 0x1, 0x235, &(0x7f0000000000)="$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") perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x8, 0x0, 0x0, 0x9, 0x21102, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x1c62, 0x0, 0x0, 0x9, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) socket(0x10, 0x2, 0x0) (async) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000140), &(0x7f0000cab000)=0x6e) (async) getsockopt$CAN_RAW_JOIN_FILTERS(r0, 0x65, 0x6, &(0x7f0000000280), &(0x7f00000002c0)=0x4) (async) syz_mount_image$hfs(&(0x7f0000000240), &(0x7f0000000380)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x3, &(0x7f0000000400)={[{}, {@part={'part', 0x3d, 0x10001}}, {@type={'type', 0x3d, "7614866b"}}, {@uid={'uid', 0x3d, r1}}, {@codepage={'codepage', 0x3d, 'ascii'}}], [{@rootcontext={'rootcontext', 0x3d, 'sysadm_u'}}]}, 0x1, 0x235, &(0x7f0000000000)="$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") (async) [ 2017.764129] hfs: invalid gid -1 [ 2017.767437] hfs: unable to parse mount options [ 2017.768479] new mount options do not match the existing superblock, will be ignored 16:35:01 executing program 1: syz_mount_image$hfs(&(0x7f0000000240), &(0x7f0000000380)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x3, &(0x7f0000000780)=ANY=[@ANYBLOB='quiet,gid=', @ANYRESHEX, @ANYBLOB="2c2a7270653d7614866b2c75693df589299908000000450000005d38ff0c0071446a0c48dba349ba347528523876dc8d7918ecea1024ba9669ff19a9ab5e27062b1dae8d8c0eb880008164ed9d8093fdc35f282dee56df9531b6e0c94b43c314af69146a70075499da5e7f927d3c672787e3d33a6071ff2c1483a1a7cfb34131bfee72f86068d0966d", @ANYRESHEX, @ANYBLOB=',codepage=ascii,rootcontext=sysadm_u,\x00'], 0x1, 0x235, &(0x7f0000000000)="$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") [ 2017.821427] hfs: uid requires an argument [ 2017.826119] hfs: unable to parse mount options [ 2017.833487] new mount options do not match the existing superblock, will be ignored [ 2017.846764] new mount options do not match the existing superblock, will be ignored 16:35:02 executing program 4: r0 = request_key(0x0, 0x0, 0x0, 0xfffffffffffffffd) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) r1 = add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000780)='./file0\x00', &(0x7f0000000840)='gadgetfs\x00', 0x0, &(0x7f0000000880)='keyring\x00') perf_event_open(&(0x7f00000007c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x12c00, 0x0, 0xe5e}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) writev(0xffffffffffffffff, 0x0, 0x0) keyctl$read(0xb, 0x0, &(0x7f0000000a40)=""/102400, 0x19000) keyctl$search(0xa, 0x0, 0x0, 0x0, 0xfffffffffffffffd) request_key(&(0x7f00000006c0)='dns_resolver\x00', &(0x7f0000000700)={'syz', 0x3}, &(0x7f0000000940)='\x00', 0xfffffffffffffffd) r2 = add_key(&(0x7f0000000380)='id_resolver\x00', 0x0, &(0x7f0000000440), 0x0, r0) keyctl$search(0xa, r1, 0x0, &(0x7f0000000340)={'syz', 0x1}, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000140)='cpuset\x00', 0x0, 0x0) add_key$keyring(&(0x7f0000000100), &(0x7f0000000180)={'syz', 0x0}, 0x0, 0x0, r0) r3 = open(0x0, 0x0, 0x0) r4 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) open(&(0x7f00000002c0)='./file0\x00', 0x98d00, 0x8) request_key(&(0x7f0000000580)='logon\x00', &(0x7f00000005c0)={'syz', 0x0}, &(0x7f0000000600)='\x1f-)\x00', 0xfffffffffffffff9) write$rfkill(r4, &(0x7f0000000040)={0x0, 0x0, 0x3}, 0x8) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = openat$cgroup_int(r3, &(0x7f00000001c0)='cpuset.sched_load_balance\x00', 0x2, 0x0) dup3(r6, r3, 0x0) r7 = add_key$keyring(&(0x7f0000000540), &(0x7f0000000640)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffc) r8 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000980), 0x200000, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r4, 0x81f8943c, &(0x7f000001a000)={0x0, ""/256, 0x0, 0x0, 0x0, 0x0, ""/16, ""/16, ""/16, 0x0}) ioctl$BTRFS_IOC_SUBVOL_CREATE_V2(r5, 0x50009418, &(0x7f000001a200)={{r8}, r9, 0x2, @inherit={0x58, &(0x7f00000009c0)={0x1, 0x2, 0x8, 0x7, {0x14, 0x1000, 0x5, 0x7, 0x4}, [0xffff, 0x3]}}, @subvolid=0x4}) ioctl$BTRFS_IOC_BALANCE(r5, 0x5000940c, 0x0) keyctl$search(0xa, r2, &(0x7f0000000200)='keyring\x00', &(0x7f0000000500)={'syz', 0x0}, r7) writev(r3, &(0x7f0000000300)=[{&(0x7f00000000c0)='0', 0x1}, {&(0x7f00000003c0)='7', 0x1}], 0x2) 16:35:02 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x8, 0x0, 0x0, 0x9, 0x21102, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x1c62, 0x0, 0x0, 0x9, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000140)={0x0, 0x0}, &(0x7f0000cab000)=0x6e) getsockopt$CAN_RAW_JOIN_FILTERS(r0, 0x65, 0x6, &(0x7f0000000280), &(0x7f00000002c0)=0x4) syz_mount_image$hfs(&(0x7f0000000240), &(0x7f0000000380)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x3, &(0x7f0000000400)={[{}, {@part={'part', 0x3d, 0x10001}}, {@type={'type', 0x3d, "7614866b"}}, {@uid={'uid', 0x3d, r1}}, {@codepage={'codepage', 0x3d, 'ascii'}}], [{@rootcontext={'rootcontext', 0x3d, 'sysadm_u'}}]}, 0x1, 0x235, &(0x7f0000000000)="$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") perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x8, 0x0, 0x0, 0x9, 0x21102, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x1c62, 0x0, 0x0, 0x9, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) socket(0x10, 0x2, 0x0) (async) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000140), &(0x7f0000cab000)=0x6e) (async) getsockopt$CAN_RAW_JOIN_FILTERS(r0, 0x65, 0x6, &(0x7f0000000280), &(0x7f00000002c0)=0x4) (async) syz_mount_image$hfs(&(0x7f0000000240), &(0x7f0000000380)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x3, &(0x7f0000000400)={[{}, {@part={'part', 0x3d, 0x10001}}, {@type={'type', 0x3d, "7614866b"}}, {@uid={'uid', 0x3d, r1}}, {@codepage={'codepage', 0x3d, 'ascii'}}], [{@rootcontext={'rootcontext', 0x3d, 'sysadm_u'}}]}, 0x1, 0x235, &(0x7f0000000000)="$eJzs3c9qE1EUx/HfvYkabanTPyK4rBZcSVs34kaQPIQrUZsIxVBBK6grcS0+gHtfwYdwJb6Arlz5ANmN3DM3zTRmMmk1ubT9fiBh2rln5pzOTO89gVIBOLPut398vv0rvJzUUEPSXclLaklNSVd0tfVqb393v9ftTDpQwyLCy6mIdH+N2dnrjgsNcRYRZeGrphbL38Ns5Hme/0ydBJKzp38ML12IT6ftb809s9l4lzqBxFxffb3WUuo8AABpxfnfx3l+Ma7fvZc24rR/qub/fuoEEivN/9Zl5S5c38u2a9jvWQsX9vtBl3icc51XcWcdWmC6uq7ScvEXn+72urd2nvc6Xu91LyoNW7P3TnHrDtRkuz6mN53g+LUvWA3nQg3bFfmv/t8z1nNf3Tf30GX6pM7B+q+Zu3CZ7EplI1eqyH+z+ohWZVaMqqhy2U5yLZ4hqqmyNb4j0eCOWtbhDwiyujwtamUkqqhuqyZqdWzUdk3U2mjU8G6ujpw199E9cOv6rS9ql9b/Pvy0NzTNkxnG2Mh4Z0ysp2kjsykS80cqA//mg57ojpZevnn77HGv133BBhtssHGwkfoXFOZheNFTZ4JEwrrLFf1fqV/ZtBYpvGUT1ul53cFLR9yq6A1W7P3SkTq4heoObtqe6/pN6cb0Z8xinqeEa+u7HvH5PwAAAAAAAAAAAAAAAAAAwEkzjz8nSF0jAAAAAAAAAAAAAAAAAAAAAAAnHf//Fzi7/gQAAP//6oSCGA==") (async) 16:35:02 executing program 0: r0 = request_key(0x0, 0x0, 0x0, 0xfffffffffffffffd) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) r1 = add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000740)=@filename='./file0\x00', &(0x7f0000000780)='./file0\x00', &(0x7f0000000840)='gadgetfs\x00', 0x0, &(0x7f0000000880)='keyring\x00') perf_event_open(&(0x7f00000007c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x12c00, 0x0, 0xe5e}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) writev(0xffffffffffffffff, 0x0, 0x0) r2 = add_key(0x0, &(0x7f0000000280)={'syz', 0x3}, &(0x7f0000019a40)="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", 0x5bd, 0xfffffffffffffffd) keyctl$read(0xb, r2, &(0x7f0000000a40)=""/102400, 0x19000) keyctl$search(0xa, r2, &(0x7f00000008c0)='keyring\x00', &(0x7f0000000900)={'syz', 0x1}, 0xfffffffffffffffd) request_key(&(0x7f00000006c0)='dns_resolver\x00', &(0x7f0000000700)={'syz', 0x3}, 0x0, 0xfffffffffffffffd) r3 = add_key(&(0x7f0000000380)='id_resolver\x00', &(0x7f0000000400)={'syz', 0x3}, &(0x7f0000000440)="e09e6dda135ac7c467011f", 0xb, r0) keyctl$search(0xa, r1, 0x0, &(0x7f0000000340)={'syz', 0x1}, r3) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000140)='cpuset\x00', 0x0, 0x0) add_key$keyring(&(0x7f0000000100), &(0x7f0000000180)={'syz', 0x0}, 0x0, 0x0, r0) r4 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r5 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) open(&(0x7f00000002c0)='./file0\x00', 0x98d00, 0x8) request_key(&(0x7f0000000580)='logon\x00', 0x0, &(0x7f0000000600)='\x1f-)\x00', 0xfffffffffffffff9) add_key$fscrypt_provisioning(&(0x7f0000000480), &(0x7f00000004c0)={'syz', 0x0}, &(0x7f0000000640)=ANY=[], 0x48, r0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = openat$cgroup_int(r4, &(0x7f00000001c0)='cpuset.sched_load_balance\x00', 0x2, 0x0) dup3(r7, r4, 0x0) r8 = add_key$keyring(&(0x7f0000000540), &(0x7f0000000640)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffc) r9 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000980), 0x200000, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r5, 0x81f8943c, &(0x7f000001a000)={0x0, ""/256, 0x0, 0x0, 0x0, 0x0, ""/16, ""/16, ""/16, 0x0}) ioctl$BTRFS_IOC_SUBVOL_CREATE_V2(r6, 0x50009418, &(0x7f000001a200)={{r9}, r10, 0x2, @inherit={0x58, &(0x7f00000009c0)={0x1, 0x2, 0x8, 0x7, {0x14, 0x1000, 0x5, 0x7}, [0xffff, 0x0]}}, @subvolid=0x4}) keyctl$search(0xa, r3, 0x0, &(0x7f0000000500)={'syz', 0x0}, r8) writev(r4, &(0x7f0000000300)=[{&(0x7f00000000c0)='0', 0xc800}, {&(0x7f00000003c0)='7', 0x1}], 0x2) [ 2017.884878] new mount options do not match the existing superblock, will be ignored [ 2017.912685] hfs: invalid gid -1 [ 2017.930360] hfs: unable to parse mount options 16:35:02 executing program 5: r0 = request_key(0x0, 0x0, 0x0, 0xfffffffffffffffd) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) r1 = add_key$keyring(0x0, &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000740)=@filename='./file0\x00', &(0x7f0000000780)='./file0\x00', &(0x7f0000000840)='gadgetfs\x00', 0x10, &(0x7f0000000880)='keyring\x00') perf_event_open(&(0x7f00000007c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x12c00, 0x0, 0xe5e}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) writev(0xffffffffffffffff, 0x0, 0x0) r2 = add_key(&(0x7f0000000240)='big_key\x00', &(0x7f0000000280)={'syz', 0x3}, &(0x7f0000019a40)="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", 0x5bd, 0xfffffffffffffffd) keyctl$read(0xb, r2, &(0x7f0000000a40)=""/102400, 0x19000) keyctl$search(0xa, r2, &(0x7f00000008c0)='keyring\x00', &(0x7f0000000900)={'syz', 0x1}, 0xfffffffffffffffd) request_key(&(0x7f00000006c0)='dns_resolver\x00', &(0x7f0000000700)={'syz', 0x3}, &(0x7f0000000940)='\x00', 0xfffffffffffffffd) r3 = add_key(&(0x7f0000000380)='id_resolver\x00', &(0x7f0000000400)={'syz', 0x3}, &(0x7f0000000440)="e09e6dda135ac7c467011f", 0xb, r0) keyctl$search(0xa, r1, 0x0, &(0x7f0000000340)={'syz', 0x1}, r3) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000140)='cpuset\x00', 0x0, 0x0) add_key$keyring(&(0x7f0000000100), &(0x7f0000000180)={'syz', 0x0}, 0x0, 0x0, r0) r4 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r5 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) request_key(&(0x7f0000000580)='logon\x00', &(0x7f00000005c0)={'syz', 0x0}, &(0x7f0000000600)='\x1f-)\x00', 0xfffffffffffffff9) add_key$fscrypt_provisioning(&(0x7f0000000480), &(0x7f00000004c0)={'syz', 0x0}, &(0x7f0000000640)=ANY=[], 0x48, r0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = openat$cgroup_int(r4, &(0x7f00000001c0)='cpuset.sched_load_balance\x00', 0x2, 0x0) dup3(r7, r4, 0x0) add_key$keyring(&(0x7f0000000540), &(0x7f0000000640)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffc) r8 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000980), 0x200000, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r5, 0x81f8943c, &(0x7f000001a000)={0x0, ""/256, 0x0, 0x0, 0x0, 0x0, ""/16, ""/16, ""/16, 0x0}) ioctl$BTRFS_IOC_SUBVOL_CREATE_V2(r6, 0x50009418, &(0x7f000001a200)={{r8}, r9, 0x2, @inherit={0x58, &(0x7f00000009c0)={0x1, 0x2, 0x8, 0x7, {0x14, 0x1000, 0x5, 0x7, 0x4}, [0xffff, 0x3]}}, @subvolid=0x4}) writev(r4, &(0x7f0000000300)=[{&(0x7f00000000c0)='0', 0x1}, {&(0x7f00000003c0)='7', 0x1}], 0x2) 16:35:02 executing program 2: r0 = request_key(0x0, 0x0, 0x0, 0xfffffffffffffffd) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) r1 = add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000740)=@filename='./file0\x00', &(0x7f0000000780)='./file0\x00', &(0x7f0000000840)='gadgetfs\x00', 0x0, &(0x7f0000000880)='keyring\x00') perf_event_open(&(0x7f00000007c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x12c00, 0x0, 0xe5e}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) writev(0xffffffffffffffff, 0x0, 0x0) r2 = add_key(0x0, &(0x7f0000000280)={'syz', 0x3}, &(0x7f0000019a40)="4195738ac28ccd83aa93c4ecacdaca3d34104be4cc5531c4091facf7f777321e84e49e039122a2d1cf7fea6a02aac8944c27ba038156bc10c0f7a6b26fbf382f67959d856600881f0e692c60f12ace775aab8d775dc2586454918a0db1811f5e8086f1a9805166c870b8387d380d5115af5841dad21f629e05f4b51e362c46b58a7dc2855c5189bff60d02c05ba67c297aa0ad05b93b1ee2fffae13fe5764d4e2a214e15093841b1551d518a669fa94e8918bfdd6573d5c0275a9b91ddb843775f78574891e03697f6ca290be6599b671093898a82e7905ed7c7fd8e8b422ebf12e5b543885596fc5c305d497407ffe73bd543f79c983f0807ae7e13fb5053fd7a07dddf8ec739418b59d67219f008f540161cec3bfd1b3097aad497248b221d572a9eb1bad6d921fcdcfdfacf8d1e392635168747056ec8a3fc45b3027293a517d50ea789294f132f2392919dc81ba5eb02e27e116cc300000000b6c0e39688425a3cb17d35f4b1eec0a37193f233c6655c6f40c09b4ea04c8880a431a8274127d56c3c8cab73a5fcf2b604b83658344e323eeedb0b283b0b3616236e904a42fed9fc8f4c131b047bfd5d7586e6a28032a4584fd5933472ce49dfdc99976166bb37eb1679b22249a222ffab17948dd6cc6f23f42ecd32a980ab8fc7c7d2da1a91f1db1187066c144bcbdb46240b7ef7ed28da4a358295b6104e4c60b09654e79f766e19e44174e94fa41d358d3dd901c060a06a388727be1092a37c0015695b1363ed018e724947983aa6b5974daf6388547cdacbd44a1282c3b9130cbf9536c29a523980b9e4328d1a7c0de8b636d7dfdee36434125948b1d802d5d143645c3a5f8da50adeef6e4f715361908a20cb998d3e0907aef9fdd19bb79be8c510b8aa04600163636c1d1f36f3834ffa3c7369e1d8ed9348bc339da2a525c4f165c0caebb7a4ee632a37a43897084e3c07a5ed8b505a51a4777095060b0ff6a6442206244dd9a13b5ba52b07c718e9eaad10befd12be35dc50283d584035d75e4917548ff58045b88d29b6826ceb6d44fb54ba3ef7944da6e86c0f2d0bc0bd725aa9193b3de4837634ead361d9b2ff5ae4de005f53d48cba029b43eb35fbedd0b5397918a9324b6e1f1d88399d8ad69b7d79e89ded6fe81fd1200f95c831f8c60dc1483e97052f61d0a643df0c2e1b0ba7d00b0692efd1bfc1ece10c2e785e3cb3b0dfbdbd722b6e53e5a2884b1cc5d939a572564bc8a2260e8718230878edb3a877f5c585f4373ef8e0e1cff5dacf96862906ff37eec18ba706d22b101965eaf5f5e29f544977896117e25ceb572f3443eddf9651c2ac69c911b21fd69e59ee57ebe4c549ff2a3dcd904656663039789f022a6caa7f76640e75efdba82dabacf8c0112bd4e62a3a9e69a9824c1af45cf86b307d9749937dd08b6ef49860cda5da7bb886f92db7cd43a869aa646a6da291a75ff28c4d728b1377b8e80233b33e724a60c0a015ec75cd86af04a4bd43964d8f7ba781a99d0cd7ff7e189fc91801655cb1b60e6bc3af747655341deceadbed3d76bdfae92389cc87c417e0f58f3fbcc56ff347467a20773146a81090ff42bbb5383d74108028f5fa532c647746054c312e2e4c085f58d93bec6da7c2bfd99fc59c1631cc71110acc2bf352b994e2a246be3cc1d240fa0c60eb04b92a9673d2ac2bba7f322ddbbd74712b0ec459050586523bd0b0505174a701206e47f2bb7fe20caf5ed73d33447b89432802e7d4606512e217aedf78c871e10cfbdf202efbf3fd8495b6be18cde726dc1fefc01921e9d1f15c8301376c33b5a698d0f7d5f317835d74857e121fe820d93f6b757c9938ec81f9b19a4b0d4ed35d1309fbcb285cf7717e9e27aaaba9d7d742fcfd786eacd993fb119e1d52908ca7ce2135046fa95805704c6258fd1b5fc1434af7ab99609820d73627080d43bcaeeb42ce423e17aa4df3a6994ead3133e2ecfbc6fa308c6b71b78cbab273641970b49e15d0dbe7aea716eaf6cf40f90d0d7d3d8bf1d165d25d5f6f6376416b9dd13731c5c2fdadee8e48c76430cccb21d8e6c659", 0x5bd, 0xfffffffffffffffd) keyctl$read(0xb, r2, &(0x7f0000000a40)=""/102400, 0x19000) keyctl$search(0xa, r2, &(0x7f00000008c0)='keyring\x00', &(0x7f0000000900)={'syz', 0x1}, 0xfffffffffffffffd) request_key(&(0x7f00000006c0)='dns_resolver\x00', &(0x7f0000000700)={'syz', 0x3}, 0x0, 0xfffffffffffffffd) r3 = add_key(&(0x7f0000000380)='id_resolver\x00', &(0x7f0000000400)={'syz', 0x3}, &(0x7f0000000440)="e09e6dda135ac7c467011f", 0xb, r0) keyctl$search(0xa, r1, 0x0, &(0x7f0000000340)={'syz', 0x1}, r3) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000140)='cpuset\x00', 0x0, 0x0) add_key$keyring(&(0x7f0000000100), &(0x7f0000000180)={'syz', 0x0}, 0x0, 0x0, r0) r4 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r5 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) open(&(0x7f00000002c0)='./file0\x00', 0x98d00, 0x8) request_key(&(0x7f0000000580)='logon\x00', 0x0, &(0x7f0000000600)='\x1f-)\x00', 0xfffffffffffffff9) add_key$fscrypt_provisioning(&(0x7f0000000480), &(0x7f00000004c0)={'syz', 0x0}, &(0x7f0000000640)=ANY=[], 0x48, r0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = openat$cgroup_int(r4, &(0x7f00000001c0)='cpuset.sched_load_balance\x00', 0x2, 0x0) dup3(r7, r4, 0x0) r8 = add_key$keyring(&(0x7f0000000540), &(0x7f0000000640)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffc) r9 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000980), 0x200000, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r5, 0x81f8943c, &(0x7f000001a000)={0x0, ""/256, 0x0, 0x0, 0x0, 0x0, ""/16, ""/16, ""/16, 0x0}) ioctl$BTRFS_IOC_SUBVOL_CREATE_V2(r6, 0x50009418, &(0x7f000001a200)={{r9}, r10, 0x2, @inherit={0x58, &(0x7f00000009c0)={0x1, 0x2, 0x8, 0x7, {0x14, 0x1000, 0x5, 0x7}, [0xffff, 0x0]}}, @subvolid=0x4}) keyctl$search(0xa, r3, 0x0, &(0x7f0000000500)={'syz', 0x0}, r8) writev(r4, &(0x7f0000000300)=[{&(0x7f00000000c0)='0', 0xc600}, {&(0x7f00000003c0)='7', 0x1}], 0x2) 16:35:02 executing program 1: syz_mount_image$hfs(&(0x7f0000000240), &(0x7f0000000380)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x3, &(0x7f0000000780)=ANY=[@ANYBLOB='quiet,gid=', @ANYRESHEX, @ANYBLOB="2c2a7270653d7614866b2c75693df589299908000000450000005d38ff0c0071446a0c48dba349ba347528523876dc8d7918ecea1024ba9669ff19a9ab5e27062b1dae8d8c0eb880008164ed9d8093fdc35f282dee56df9531b6e0c94b43c314af69146a70075499da5e7f927d3c672787e3d33a6071ff2c1483a1a7cfb34131bfee72f86068d0966d", @ANYRESHEX, @ANYBLOB=',codepage=ascii,rootcontext=sysadm_u,\x00'], 0x1, 0x235, &(0x7f0000000000)="$eJzs3c9qE1EUx/HfvYkabanTPyK4rBZcSVs34kaQPIQrUZsIxVBBK6grcS0+gHtfwYdwJb6Arlz5ANmN3DM3zaRmMmk1ubT9fiDDtLln5pzOTO89gVIBOLPut398vv0rvJzUUEPSXclLaklNSVd0tfVqb393v9ftTDpQwyLCy6mIdH+N2dnrjgsNcRYRZeGrphbL38Ns5Hme/0ydBJKzp38ML12IT6e935p7ZrPxLnUCibm++nqtpdR5AADSivO/j/P8Yly/ey9txGn/VM3//dQJJFaa/63Lyl24vpftrWG/Zy1ceN8PusTjnOu8ijtrZIHp6rpKy8VffLrb697aed7reL3Xvag0bM22neLWHajJdn1MbzrB8WtfsBrOhRq2K/Jf/b9nrOe+um/uocv0SZ2D9V8zd+Ey2ZXKDl2pIv/N6iNalVkxqqLKZTvJtXiGqKbK1viORIM7almjHxBkdXla1MqhqKK6rZqo1bFR29VRa3EzGjW8m6sjZ819dA/cun7ri9ql9b8PP+0NTfNkhjE2Mt4ZE+tp2shsisT8kcrAv/mgJ7qjpZdv3j573Ot1X7DDDjvsHOyk/gWFeRhe9NSZIJGw7nJF/1fqVzatRQqbbMI6Pa87eOmIWxW9wYptLx2pg1uo7uCm7bmu35RuTH/GLOZ5Sri2vusRn/8DAAAAAAAAAAAAAAAAAACcNPP4c4LUNQIAAAAAAAAAAAAAAAAAAAAAcNLx/3+Bs+tPAAAA///ADoIm") [ 2017.992106] new mount options do not match the existing superblock, will be ignored [ 2018.035838] hfs: uid requires an argument [ 2018.045734] hfs: unable to parse mount options [ 2018.051987] new mount options do not match the existing superblock, will be ignored 16:35:02 executing program 4: r0 = request_key(0x0, 0x0, 0x0, 0xfffffffffffffffd) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) r1 = add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000780)='./file0\x00', &(0x7f0000000840)='gadgetfs\x00', 0x0, &(0x7f0000000880)='keyring\x00') perf_event_open(&(0x7f00000007c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x12c00, 0x0, 0xe5e}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) writev(0xffffffffffffffff, 0x0, 0x0) keyctl$read(0xb, 0x0, &(0x7f0000000a40)=""/102400, 0x19000) keyctl$search(0xa, 0x0, 0x0, 0x0, 0xfffffffffffffffd) request_key(&(0x7f00000006c0)='dns_resolver\x00', &(0x7f0000000700)={'syz', 0x3}, &(0x7f0000000940)='\x00', 0xfffffffffffffffd) r2 = add_key(&(0x7f0000000380)='id_resolver\x00', 0x0, &(0x7f0000000440), 0x0, r0) keyctl$search(0xa, r1, 0x0, &(0x7f0000000340)={'syz', 0x1}, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000140)='cpuset\x00', 0x0, 0x0) add_key$keyring(&(0x7f0000000100), &(0x7f0000000180)={'syz', 0x0}, 0x0, 0x0, r0) r3 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r4 = openat$rfkill(0xffffffffffffff9c, 0x0, 0x2, 0x0) open(&(0x7f00000002c0)='./file0\x00', 0x98d00, 0x8) request_key(&(0x7f0000000580)='logon\x00', &(0x7f00000005c0)={'syz', 0x0}, &(0x7f0000000600)='\x1f-)\x00', 0xfffffffffffffff9) write$rfkill(r4, &(0x7f0000000040)={0x0, 0x0, 0x3}, 0x8) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = openat$cgroup_int(r3, &(0x7f00000001c0)='cpuset.sched_load_balance\x00', 0x2, 0x0) dup3(r6, r3, 0x0) r7 = add_key$keyring(&(0x7f0000000540), &(0x7f0000000640)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffc) r8 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000980), 0x200000, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r4, 0x81f8943c, &(0x7f000001a000)={0x0, ""/256, 0x0, 0x0, 0x0, 0x0, ""/16, ""/16, ""/16, 0x0}) ioctl$BTRFS_IOC_SUBVOL_CREATE_V2(r5, 0x50009418, &(0x7f000001a200)={{r8}, r9, 0x2, @inherit={0x58, &(0x7f00000009c0)={0x1, 0x2, 0x8, 0x7, {0x14, 0x1000, 0x5, 0x7, 0x4}, [0xffff, 0x3]}}, @subvolid=0x4}) ioctl$BTRFS_IOC_BALANCE(r5, 0x5000940c, 0x0) keyctl$search(0xa, r2, &(0x7f0000000200)='keyring\x00', &(0x7f0000000500)={'syz', 0x0}, r7) writev(r3, &(0x7f0000000300)=[{&(0x7f00000000c0)='0', 0x1}, {&(0x7f00000003c0)='7', 0x1}], 0x2) [ 2018.110106] new mount options do not match the existing superblock, will be ignored [ 2018.121491] hfs: invalid gid -1 [ 2018.125005] hfs: unable to parse mount options 16:35:02 executing program 0: r0 = request_key(0x0, 0x0, 0x0, 0xfffffffffffffffd) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) r1 = add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000740)=@filename='./file0\x00', &(0x7f0000000780)='./file0\x00', &(0x7f0000000840)='gadgetfs\x00', 0x0, &(0x7f0000000880)='keyring\x00') perf_event_open(&(0x7f00000007c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x12c00, 0x0, 0xe5e}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) writev(0xffffffffffffffff, 0x0, 0x0) r2 = add_key(0x0, &(0x7f0000000280)={'syz', 0x3}, &(0x7f0000019a40)="4195738ac28ccd83aa93c4ecacdaca3d34104be4cc5531c4091facf7f777321e84e49e039122a2d1cf7fea6a02aac8944c27ba038156bc10c0f7a6b26fbf382f67959d856600881f0e692c60f12ace775aab8d775dc2586454918a0db1811f5e8086f1a9805166c870b8387d380d5115af5841dad21f629e05f4b51e362c46b58a7dc2855c5189bff60d02c05ba67c297aa0ad05b93b1ee2fffae13fe5764d4e2a214e15093841b1551d518a669fa94e8918bfdd6573d5c0275a9b91ddb843775f78574891e03697f6ca290be6599b671093898a82e7905ed7c7fd8e8b422ebf12e5b543885596fc5c305d497407ffe73bd543f79c983f0807ae7e13fb5053fd7a07dddf8ec739418b59d67219f008f540161cec3bfd1b3097aad497248b221d572a9eb1bad6d921fcdcfdfacf8d1e392635168747056ec8a3fc45b3027293a517d50ea789294f132f2392919dc81ba5eb02e27e116cc300000000b6c0e39688425a3cb17d35f4b1eec0a37193f233c6655c6f40c09b4ea04c8880a431a8274127d56c3c8cab73a5fcf2b604b83658344e323eeedb0b283b0b3616236e904a42fed9fc8f4c131b047bfd5d7586e6a28032a4584fd5933472ce49dfdc99976166bb37eb1679b22249a222ffab17948dd6cc6f23f42ecd32a980ab8fc7c7d2da1a91f1db1187066c144bcbdb46240b7ef7ed28da4a358295b6104e4c60b09654e79f766e19e44174e94fa41d358d3dd901c060a06a388727be1092a37c0015695b1363ed018e724947983aa6b5974daf6388547cdacbd44a1282c3b9130cbf9536c29a523980b9e4328d1a7c0de8b636d7dfdee36434125948b1d802d5d143645c3a5f8da50adeef6e4f715361908a20cb998d3e0907aef9fdd19bb79be8c510b8aa04600163636c1d1f36f3834ffa3c7369e1d8ed9348bc339da2a525c4f165c0caebb7a4ee632a37a43897084e3c07a5ed8b505a51a4777095060b0ff6a6442206244dd9a13b5ba52b07c718e9eaad10befd12be35dc50283d584035d75e4917548ff58045b88d29b6826ceb6d44fb54ba3ef7944da6e86c0f2d0bc0bd725aa9193b3de4837634ead361d9b2ff5ae4de005f53d48cba029b43eb35fbedd0b5397918a9324b6e1f1d88399d8ad69b7d79e89ded6fe81fd1200f95c831f8c60dc1483e97052f61d0a643df0c2e1b0ba7d00b0692efd1bfc1ece10c2e785e3cb3b0dfbdbd722b6e53e5a2884b1cc5d939a572564bc8a2260e8718230878edb3a877f5c585f4373ef8e0e1cff5dacf96862906ff37eec18ba706d22b101965eaf5f5e29f544977896117e25ceb572f3443eddf9651c2ac69c911b21fd69e59ee57ebe4c549ff2a3dcd904656663039789f022a6caa7f76640e75efdba82dabacf8c0112bd4e62a3a9e69a9824c1af45cf86b307d9749937dd08b6ef49860cda5da7bb886f92db7cd43a869aa646a6da291a75ff28c4d728b1377b8e80233b33e724a60c0a015ec75cd86af04a4bd43964d8f7ba781a99d0cd7ff7e189fc91801655cb1b60e6bc3af747655341deceadbed3d76bdfae92389cc87c417e0f58f3fbcc56ff347467a20773146a81090ff42bbb5383d74108028f5fa532c647746054c312e2e4c085f58d93bec6da7c2bfd99fc59c1631cc71110acc2bf352b994e2a246be3cc1d240fa0c60eb04b92a9673d2ac2bba7f322ddbbd74712b0ec459050586523bd0b0505174a701206e47f2bb7fe20caf5ed73d33447b89432802e7d4606512e217aedf78c871e10cfbdf202efbf3fd8495b6be18cde726dc1fefc01921e9d1f15c8301376c33b5a698d0f7d5f317835d74857e121fe820d93f6b757c9938ec81f9b19a4b0d4ed35d1309fbcb285cf7717e9e27aaaba9d7d742fcfd786eacd993fb119e1d52908ca7ce2135046fa95805704c6258fd1b5fc1434af7ab99609820d73627080d43bcaeeb42ce423e17aa4df3a6994ead3133e2ecfbc6fa308c6b71b78cbab273641970b49e15d0dbe7aea716eaf6cf40f90d0d7d3d8bf1d165d25d5f6f6376416b9dd13731c5c2fdadee8e48c76430cccb21d8e6c659", 0x5bd, 0xfffffffffffffffd) keyctl$read(0xb, r2, &(0x7f0000000a40)=""/102400, 0x19000) keyctl$search(0xa, r2, &(0x7f00000008c0)='keyring\x00', &(0x7f0000000900)={'syz', 0x1}, 0xfffffffffffffffd) request_key(&(0x7f00000006c0)='dns_resolver\x00', &(0x7f0000000700)={'syz', 0x3}, 0x0, 0xfffffffffffffffd) r3 = add_key(&(0x7f0000000380)='id_resolver\x00', &(0x7f0000000400)={'syz', 0x3}, &(0x7f0000000440)="e09e6dda135ac7c467011f", 0xb, r0) keyctl$search(0xa, r1, 0x0, &(0x7f0000000340)={'syz', 0x1}, r3) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000140)='cpuset\x00', 0x0, 0x0) add_key$keyring(&(0x7f0000000100), &(0x7f0000000180)={'syz', 0x0}, 0x0, 0x0, r0) r4 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r5 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) open(&(0x7f00000002c0)='./file0\x00', 0x98d00, 0x8) request_key(&(0x7f0000000580)='logon\x00', 0x0, &(0x7f0000000600)='\x1f-)\x00', 0xfffffffffffffff9) add_key$fscrypt_provisioning(&(0x7f0000000480), &(0x7f00000004c0)={'syz', 0x0}, &(0x7f0000000640)=ANY=[], 0x48, r0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = openat$cgroup_int(r4, &(0x7f00000001c0)='cpuset.sched_load_balance\x00', 0x2, 0x0) dup3(r7, r4, 0x0) r8 = add_key$keyring(&(0x7f0000000540), &(0x7f0000000640)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffc) r9 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000980), 0x200000, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r5, 0x81f8943c, &(0x7f000001a000)={0x0, ""/256, 0x0, 0x0, 0x0, 0x0, ""/16, ""/16, ""/16, 0x0}) ioctl$BTRFS_IOC_SUBVOL_CREATE_V2(r6, 0x50009418, &(0x7f000001a200)={{r9}, r10, 0x2, @inherit={0x58, &(0x7f00000009c0)={0x1, 0x2, 0x8, 0x7, {0x14, 0x1000, 0x5, 0x7}, [0xffff, 0x0]}}, @subvolid=0x4}) keyctl$search(0xa, r3, 0x0, &(0x7f0000000500)={'syz', 0x0}, r8) writev(r4, &(0x7f0000000300)=[{&(0x7f00000000c0)='0', 0xc900}, {&(0x7f00000003c0)='7', 0x1}], 0x2) 16:35:02 executing program 1: syz_mount_image$hfs(&(0x7f0000000240), &(0x7f0000000380)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x3, &(0x7f0000000780)=ANY=[@ANYBLOB='quiet,gid=', @ANYRESHEX, @ANYBLOB="2c2a7270653d7614866b2c75693df589299908000000450000005d38ff0c0071446a0c48dba349ba347528523876dc8d7918ecea1024ba9669ff19a9ab5e27062b1dae8d8c0eb880008164ed9d8093fdc35f282dee56df9531b6e0c94b43c314af69146a70075499da5e7f927d3c672787e3d33a6071ff2c1483a1a7cfb34131bfee72f86068d0966d", @ANYRESHEX, @ANYBLOB=',codepage=ascii,rootcontext=sysadm_u,\x00'], 0x1, 0x235, &(0x7f0000000000)="$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") 16:35:02 executing program 2: r0 = request_key(0x0, 0x0, 0x0, 0xfffffffffffffffd) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) r1 = add_key$keyring(0x0, &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000740)=@filename='./file0\x00', &(0x7f0000000780)='./file0\x00', &(0x7f0000000840)='gadgetfs\x00', 0x0, &(0x7f0000000880)='keyring\x00') perf_event_open(&(0x7f00000007c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x12c00, 0x0, 0xe5e}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) writev(0xffffffffffffffff, 0x0, 0x0) r2 = add_key(&(0x7f0000000240)='big_key\x00', &(0x7f0000000280)={'syz', 0x3}, &(0x7f0000019a40)="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", 0x5bd, 0xfffffffffffffffd) keyctl$read(0xb, r2, &(0x7f0000000a40)=""/102400, 0x19000) keyctl$search(0xa, r2, &(0x7f00000008c0)='keyring\x00', &(0x7f0000000900)={'syz', 0x1}, 0xfffffffffffffffd) request_key(&(0x7f00000006c0)='dns_resolver\x00', &(0x7f0000000700)={'syz', 0x3}, &(0x7f0000000940)='\x00', 0xfffffffffffffffd) r3 = add_key(&(0x7f0000000380)='id_resolver\x00', &(0x7f0000000400)={'syz', 0x3}, &(0x7f0000000440)="e09e6dda135ac7c467011f", 0xb, r0) keyctl$search(0xa, r1, 0x0, &(0x7f0000000340)={'syz', 0x1}, r3) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000140)='cpuset\x00', 0x0, 0x0) add_key$keyring(&(0x7f0000000100), &(0x7f0000000180)={'syz', 0x0}, 0x0, 0x0, r0) r4 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r5 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) request_key(&(0x7f0000000580)='logon\x00', &(0x7f00000005c0)={'syz', 0x0}, &(0x7f0000000600)='\x1f-)\x00', 0xfffffffffffffff9) add_key$fscrypt_provisioning(&(0x7f0000000480), &(0x7f00000004c0)={'syz', 0x0}, &(0x7f0000000640)=ANY=[], 0x48, r0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = openat$cgroup_int(r4, &(0x7f00000001c0)='cpuset.sched_load_balance\x00', 0x2, 0x0) dup3(r7, r4, 0x0) add_key$keyring(&(0x7f0000000540), &(0x7f0000000640)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffc) r8 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000980), 0x200000, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r5, 0x81f8943c, &(0x7f000001a000)={0x0, ""/256, 0x0, 0x0, 0x0, 0x0, ""/16, ""/16, ""/16, 0x0}) ioctl$BTRFS_IOC_SUBVOL_CREATE_V2(r6, 0x50009418, &(0x7f000001a200)={{r8}, r9, 0x2, @inherit={0x58, &(0x7f00000009c0)={0x1, 0x2, 0x8, 0x7, {0x14, 0x1000, 0x5, 0x7, 0x4}, [0xffff, 0x3]}}, @subvolid=0x4}) writev(r4, &(0x7f0000000300)=[{&(0x7f00000000c0)='0', 0x1}, {&(0x7f00000003c0)='7', 0x1}], 0x2) [ 2018.265868] hfs: invalid gid -1 [ 2018.273582] new mount options do not match the existing superblock, will be ignored [ 2018.294836] new mount options do not match the existing superblock, will be ignored [ 2018.298194] hfs: unable to parse mount options [ 2018.303584] new mount options do not match the existing superblock, will be ignored 16:35:02 executing program 4: r0 = request_key(0x0, 0x0, 0x0, 0xfffffffffffffffd) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) r1 = add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000780)='./file0\x00', &(0x7f0000000840)='gadgetfs\x00', 0x0, &(0x7f0000000880)='keyring\x00') perf_event_open(&(0x7f00000007c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x12c00, 0x0, 0xe5e}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) writev(0xffffffffffffffff, 0x0, 0x0) keyctl$read(0xb, 0x0, &(0x7f0000000a40)=""/102400, 0x19000) keyctl$search(0xa, 0x0, 0x0, 0x0, 0xfffffffffffffffd) request_key(&(0x7f00000006c0)='dns_resolver\x00', &(0x7f0000000700)={'syz', 0x3}, &(0x7f0000000940)='\x00', 0xfffffffffffffffd) r2 = add_key(&(0x7f0000000380)='id_resolver\x00', 0x0, &(0x7f0000000440), 0x0, r0) keyctl$search(0xa, r1, 0x0, &(0x7f0000000340)={'syz', 0x1}, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000140)='cpuset\x00', 0x0, 0x0) add_key$keyring(&(0x7f0000000100), &(0x7f0000000180)={'syz', 0x0}, 0x0, 0x0, r0) r3 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r4 = openat$rfkill(0xffffffffffffff9c, 0x0, 0x2, 0x0) open(&(0x7f00000002c0)='./file0\x00', 0x98d00, 0x8) request_key(&(0x7f0000000580)='logon\x00', &(0x7f00000005c0)={'syz', 0x0}, &(0x7f0000000600)='\x1f-)\x00', 0xfffffffffffffff9) write$rfkill(r4, &(0x7f0000000040)={0x0, 0x0, 0x3}, 0x8) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = openat$cgroup_int(r3, &(0x7f00000001c0)='cpuset.sched_load_balance\x00', 0x2, 0x0) dup3(r6, r3, 0x0) r7 = add_key$keyring(&(0x7f0000000540), &(0x7f0000000640)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffc) r8 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000980), 0x200000, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r4, 0x81f8943c, &(0x7f000001a000)={0x0, ""/256, 0x0, 0x0, 0x0, 0x0, ""/16, ""/16, ""/16, 0x0}) ioctl$BTRFS_IOC_SUBVOL_CREATE_V2(r5, 0x50009418, &(0x7f000001a200)={{r8}, r9, 0x2, @inherit={0x58, &(0x7f00000009c0)={0x1, 0x2, 0x8, 0x7, {0x14, 0x1000, 0x5, 0x7, 0x4}, [0xffff, 0x3]}}, @subvolid=0x4}) ioctl$BTRFS_IOC_BALANCE(r5, 0x5000940c, 0x0) keyctl$search(0xa, r2, &(0x7f0000000200)='keyring\x00', &(0x7f0000000500)={'syz', 0x0}, r7) writev(r3, &(0x7f0000000300)=[{&(0x7f00000000c0)='0', 0x1}, {&(0x7f00000003c0)='7', 0x1}], 0x2) 16:35:02 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000140)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0x6e) syz_mount_image$hfs(&(0x7f0000000240), &(0x7f0000000380)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x3, &(0x7f0000000400)={[{}, {@part={'part', 0x3d, 0x10001}}, {@type={'type', 0x3d, "7614866b"}}, {@uid={'uid', 0x3d, r2}}, {@codepage={'codepage', 0x3d, 'ascii'}}], [{@rootcontext={'rootcontext', 0x3d, 'sysadm_u'}}]}, 0x1, 0x235, &(0x7f0000000000)="$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") ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000002680)={{0x1, 0x1, 0x18, r0, {r2, r3}}, '\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00'}) getresgid(&(0x7f0000000100), &(0x7f0000000140)=0x0, &(0x7f00000001c0)) setgroups(0x2, &(0x7f0000000200)=[0x0, r5]) stat(&(0x7f0000000780)='./bus/file0\x00', &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0}) r7 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./bus\x00', 0x0, 0x0) r8 = openat(0xffffffffffffff9c, &(0x7f0000004400)='./bus\x00', 0x1c1002, 0x0) write$binfmt_misc(r8, &(0x7f0000000180)={'syz1'}, 0x4) sendfile(r8, r7, 0x0, 0x1ffff) r9 = syz_open_dev$evdev(&(0x7f00000000c0), 0x0, 0x862b01) write$char_usb(r9, &(0x7f0000000040)="e2", 0x1770) mount$9p_fd(0x0, &(0x7f0000003080)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f0000003100), 0x0, &(0x7f0000003140)={'trans=fd,', {'rfdno', 0x3d, r8}, 0x2c, {'wfdno', 0x3d, r9}, 0x2c, {[{@cache_fscache}, {@debug={'debug', 0x3d, 0x1000}}, {@aname}, {@afid={'afid', 0x3d, 0x9}}, {@access_uid={'access', 0x3d, r2}}], [{@rootcontext={'rootcontext', 0x3d, 'staff_u'}}, {@appraise_type}]}}) syz_fuse_handle_req(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000002d00)={&(0x7f0000002380)={0x50, 0x0, 0x8, {0x7, 0x21, 0x0, 0x2000011}}, 0x0, 0x0, 0x0, 0x0, &(0x7f00000024c0)={0x28, 0xfffffffffffffff5, 0xfff}, 0x0, &(0x7f0000002580)={0x18}, &(0x7f00000025c0)=ANY=[@ANYBLOB], &(0x7f0000002600)={0x20, 0x0, 0x28, {0x0, 0x14}}, &(0x7f00000026c0)={0x78, 0xfffffffffffffffe, 0x1, {0x0, 0x4, 0x0, {0x1, 0x7, 0x4799, 0x0, 0x0, 0x7ff, 0x3f, 0xfffe, 0x1, 0x0, 0x1, 0x0, 0x0, 0x4}}}, &(0x7f0000002740)={0x90, 0xfffffffffffffff5, 0x0, {0x0, 0x0, 0x3ff, 0x0, 0xffffff27, 0x404afb3e, {0x6, 0x0, 0x1, 0x6, 0x100000000, 0x0, 0x0, 0x0, 0x32, 0x0, 0xb5, 0xee00, 0x0, 0x0, 0x8}}}, 0x0, &(0x7f0000002d80)={0x2c0, 0x0, 0x4, [{{0x0, 0x0, 0x9, 0x0, 0x0, 0x0, {0x0, 0x8, 0x0, 0x0, 0x0, 0x3, 0x0, 0x2, 0x0, 0xc000, 0x0, 0xee00, 0x0, 0x0, 0x9}}, {0x0, 0xa65b, 0x28, 0x3, '^-%{{[#!]#-#&e*!-]$$.\xa9\xa6\x19\xb6\xd2(\xf3l`\xb1\xe0\xc90\xa7@/f::'}}, {{0x0, 0x3, 0x0, 0x1, 0x3ff, 0x0, {0x0, 0x0, 0x9, 0x8, 0x0, 0x219, 0x0, 0x0, 0x80000000, 0x0, 0xffff, 0xee01, 0xee01, 0x6, 0x4}}, {0x3, 0x8, 0x1, 0x0, '\''}}, {{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, {0x4, 0x20, 0x0, 0xffffffffffff8004, 0x3, 0x40, 0xfffffffe, 0xffffffff, 0x3, 0x1000, 0x7, r6, 0x0, 0x3}}, {0x3, 0x0, 0x1e, 0x80000000, '}.}##)%M\'/}}^\\.#*.{/\xfd&^@*$+((['}}, {{0x5, 0x0, 0x0, 0x1, 0x3f, 0x3, {0x6, 0x0, 0x1, 0x5, 0x0, 0x24f, 0x0, 0x0, 0x0, 0x4000, 0x0, 0x0, 0xee01, 0x1}}}]}, &(0x7f0000002c00)={0xa0, 0x0, 0x100000000, {{0x1, 0x0, 0x0, 0x1f, 0x193de2d0, 0x2, {0x0, 0x40, 0x0, 0x319, 0x0, 0xf182, 0x5, 0x0, 0x5, 0x0, 0x7, 0xee01}}, {0x0, 0x2}}}, 0x0}) getresgid(&(0x7f0000000100), &(0x7f0000000140)=0x0, &(0x7f00000001c0)) setgroups(0x2, &(0x7f0000000200)=[0x0, r10]) newfstatat(0xffffffffffffff9c, &(0x7f0000002940)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f00000029c0)={0x0, 0x0, 0x0, 0x0, 0x0}, 0x800) getresgid(&(0x7f0000000100), &(0x7f0000000140)=0x0, &(0x7f00000001c0)) setgroups(0x2, &(0x7f0000000200)=[0x0, r12]) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000002d00)={{{@in=@private, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in6=@ipv4={""/10, ""/2, @local}}}, &(0x7f0000002e00)=0xe8) newfstatat(0xffffffffffffff9c, &(0x7f0000002e40)='./file0\x00', &(0x7f0000002e80)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x0) syz_fuse_handle_req(0xffffffffffffffff, &(0x7f0000000480)="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", 0x2000, &(0x7f0000003000)={&(0x7f0000000280)={0x50, 0x0, 0x2, {0x7, 0x26, 0x0, 0x200800, 0x9, 0x1, 0x10001, 0x1000}}, &(0x7f0000000300)={0x18, 0xfffffffffffffffe, 0x7, {0x8000000000000001}}, &(0x7f0000000340)={0x18, 0x0, 0x81, {0x1}}, &(0x7f0000002480)={0x18, 0x0, 0x9, {0x7}}, &(0x7f00000024c0)={0x18, 0x0, 0x689, {0xff}}, &(0x7f0000002500)={0x28, 0x0, 0xff, {{0x5, 0x793, 0x2, r1}}}, &(0x7f0000002540)={0x60, 0x0, 0xec9, {{0x9, 0x0, 0x5, 0x2, 0x6, 0x2, 0xac, 0x7fe}}}, &(0x7f00000025c0)={0x18, 0x0, 0x8, {0x8}}, &(0x7f0000002600)={0x13, 0xfffffffffffffffe, 0x2, {'.-\x00'}}, &(0x7f0000002640)={0x20, 0xfffffffffffffff5, 0x1, {0x0, 0x9}}, &(0x7f0000002700)={0x78, 0xfffffffffffffffe, 0xfffffffffffffff7, {0x8, 0xd9, 0x0, {0x0, 0x5, 0x7, 0x37, 0x3ff, 0x9, 0x2, 0x6, 0x7, 0x2000, 0x4, r2, r4, 0x10000}}}, &(0x7f0000002780)={0x90, 0xffffffffffffffda, 0xffffffffffff0000, {0x0, 0x0, 0x34f4, 0x7, 0x4, 0x9, {0x4, 0x400, 0x5, 0x2, 0x9, 0x400, 0x10000, 0x6, 0x1fc, 0x8000, 0x5, r2, r5, 0x1, 0x1000}}}, &(0x7f0000002840)={0xd0, 0xfffffffffffffff5, 0xffff0, [{0x3, 0x3, 0x4, 0x6, 'part'}, {0x2, 0xe592, 0x5, 0x1, 'ascii'}, {0x6, 0xffffffffffff8000, 0x5, 0x4, 'quiet'}, {0x1, 0x7, 0x5, 0x1, 'ascii'}, {0x1, 0x0, 0x1, 0x9, '*'}, {0x6, 0x3, 0x7, 0x8, '..%/$//'}]}, &(0x7f0000002a40)={0x290, 0xfffffffffffffff5, 0x1f, [{{0x4, 0x2, 0xae4, 0x8, 0xa00, 0x9, {0x2, 0xb8, 0x1, 0x8, 0x2, 0x5, 0x1, 0x599b, 0x6, 0x2000, 0x0, r6, r3, 0x100, 0x5}}, {0x6, 0x800, 0x1, 0xffff, '!'}}, {{0x6, 0x0, 0x100000000, 0x8, 0x9, 0x3, {0x5, 0xb9, 0x401, 0x7, 0x2, 0x80, 0x1, 0x40, 0x9, 0x6000, 0x5, r2, r10, 0xff, 0x1}}, {0x0, 0x0, 0x5, 0x3, 'quiet'}}, {{0x2, 0x2, 0x3, 0x68e, 0x7, 0x80000000, {0x5, 0x8, 0x7fffffffffffffff, 0x6, 0x1f, 0x7, 0x9, 0xef, 0x9, 0xc000, 0x80000000, r2, r3, 0x80000001, 0x10001}}, {0x2, 0x2672, 0x7, 0xfffffffe, '/-$-b(#'}}, {{0x2, 0x1, 0x7, 0x9, 0x2, 0x1, {0x1, 0x6, 0x9, 0xfa3b, 0x10000, 0x3, 0x7, 0x3, 0x6, 0x8000, 0x7, r11, r12, 0x8000, 0x800}}, {0x4, 0x7fff, 0x5, 0x1ff, 'quiet'}}]}, &(0x7f0000002f00)={0xa0, 0xfffffffffffffff5, 0x80000000, {{0x0, 0x0, 0x9, 0xffffffffceffec3e, 0x8, 0x6, {0x5, 0x5, 0x100000001, 0x7fff, 0x8, 0x8e, 0x1, 0x340f, 0x8c13, 0x4000, 0x4, r13, r14, 0x88c8, 0xff}}, {0x0, 0x12}}}, &(0x7f0000002fc0)={0x20, 0x0, 0x4d, {0x1ff, 0x4, 0x3}}}) 16:35:02 executing program 1: syz_mount_image$hfs(&(0x7f0000000240), &(0x7f0000000380)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x3, &(0x7f0000000780)=ANY=[@ANYBLOB='quiet,gid=', @ANYRESHEX, @ANYBLOB="2c2a7270653d7614866b2c75693df589299908000000450000005d38ff0c0071446a0c48dba349ba347528523876dc8d7918ecea1024ba9669ff19a9ab5e27062b1dae8d8c0eb880008164ed9d8093fdc35f282dee56df9531b6e0c94b43c314af69146a70075499da5e7f927d3c672787e3d33a6071ff2c1483a1a7cfb34131bfee72f86068d0966d", @ANYRESHEX, @ANYBLOB=',codepage=ascii,rootcontext=sysadm_u,\x00'], 0x1, 0x235, &(0x7f0000000000)="$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") 16:35:02 executing program 5: r0 = request_key(0x0, 0x0, 0x0, 0xfffffffffffffffd) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) r1 = add_key$keyring(0x0, &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000740)=@filename='./file0\x00', &(0x7f0000000780)='./file0\x00', &(0x7f0000000840)='gadgetfs\x00', 0x10, &(0x7f0000000880)='keyring\x00') perf_event_open(&(0x7f00000007c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x12c00, 0x0, 0xe5e}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) writev(0xffffffffffffffff, 0x0, 0x0) r2 = add_key(&(0x7f0000000240)='big_key\x00', &(0x7f0000000280)={'syz', 0x3}, &(0x7f0000019a40)="4195738ac28ccd83aa93c4ecacdaca3d34104be4cc5531c4091facf7f777321e84e49e039122a2d1cf7fea6a02aac8944c27ba038156bc10c0f7a6b26fbf382f67959d856600881f0e692c60f12ace775aab8d775dc2586454918a0db1811f5e8086f1a9805166c870b8387d380d5115af5841dad21f629e05f4b51e362c46b58a7dc2855c5189bff60d02c05ba67c297aa0ad05b93b1ee2fffae13fe5764d4e2a214e15093841b1551d518a669fa94e8918bfdd6573d5c0275a9b91ddb843775f78574891e03697f6ca290be6599b671093898a82e7905ed7c7fd8e8b422ebf12e5b543885596fc5c305d497407ffe73bd543f79c983f0807ae7e13fb5053fd7a07dddf8ec739418b59d67219f008f540161cec3bfd1b3097aad497248b221d572a9eb1bad6d921fcdcfdfacf8d1e392635168747056ec8a3fc45b3027293a517d50ea789294f132f2392919dc81ba5eb02e27e116cc300000000b6c0e39688425a3cb17d35f4b1eec0a37193f233c6655c6f40c09b4ea04c8880a431a8274127d56c3c8cab73a5fcf2b604b83658344e323eeedb0b283b0b3616236e904a42fed9fc8f4c131b047bfd5d7586e6a28032a4584fd5933472ce49dfdc99976166bb37eb1679b22249a222ffab17948dd6cc6f23f42ecd32a980ab8fc7c7d2da1a91f1db1187066c144bcbdb46240b7ef7ed28da4a358295b6104e4c60b09654e79f766e19e44174e94fa41d358d3dd901c060a06a388727be1092a37c0015695b1363ed018e724947983aa6b5974daf6388547cdacbd44a1282c3b9130cbf9536c29a523980b9e4328d1a7c0de8b636d7dfdee36434125948b1d802d5d143645c3a5f8da50adeef6e4f715361908a20cb998d3e0907aef9fdd19bb79be8c510b8aa04600163636c1d1f36f3834ffa3c7369e1d8ed9348bc339da2a525c4f165c0caebb7a4ee632a37a43897084e3c07a5ed8b505a51a4777095060b0ff6a6442206244dd9a13b5ba52b07c718e9eaad10befd12be35dc50283d584035d75e4917548ff58045b88d29b6826ceb6d44fb54ba3ef7944da6e86c0f2d0bc0bd725aa9193b3de4837634ead361d9b2ff5ae4de005f53d48cba029b43eb35fbedd0b5397918a9324b6e1f1d88399d8ad69b7d79e89ded6fe81fd1200f95c831f8c60dc1483e97052f61d0a643df0c2e1b0ba7d00b0692efd1bfc1ece10c2e785e3cb3b0dfbdbd722b6e53e5a2884b1cc5d939a572564bc8a2260e8718230878edb3a877f5c585f4373ef8e0e1cff5dacf96862906ff37eec18ba706d22b101965eaf5f5e29f544977896117e25ceb572f3443eddf9651c2ac69c911b21fd69e59ee57ebe4c549ff2a3dcd904656663039789f022a6caa7f76640e75efdba82dabacf8c0112bd4e62a3a9e69a9824c1af45cf86b307d9749937dd08b6ef49860cda5da7bb886f92db7cd43a869aa646a6da291a75ff28c4d728b1377b8e80233b33e724a60c0a015ec75cd86af04a4bd43964d8f7ba781a99d0cd7ff7e189fc91801655cb1b60e6bc3af747655341deceadbed3d76bdfae92389cc87c417e0f58f3fbcc56ff347467a20773146a81090ff42bbb5383d74108028f5fa532c647746054c312e2e4c085f58d93bec6da7c2bfd99fc59c1631cc71110acc2bf352b994e2a246be3cc1d240fa0c60eb04b92a9673d2ac2bba7f322ddbbd74712b0ec459050586523bd0b0505174a701206e47f2bb7fe20caf5ed73d33447b89432802e7d4606512e217aedf78c871e10cfbdf202efbf3fd8495b6be18cde726dc1fefc01921e9d1f15c8301376c33b5a698d0f7d5f317835d74857e121fe820d93f6b757c9938ec81f9b19a4b0d4ed35d1309fbcb285cf7717e9e27aaaba9d7d742fcfd786eacd993fb119e1d52908ca7ce2135046fa95805704c6258fd1b5fc1434af7ab99609820d73627080d43bcaeeb42ce423e17aa4df3a6994ead3133e2ecfbc6fa308c6b71b78cbab273641970b49e15d0dbe7aea716eaf6cf40f90d0d7d3d8bf1d165d25d5f6f6376416b9dd13731c5c2fdadee8e48c76430cccb21d8e6c659", 0x5bd, 0xfffffffffffffffd) keyctl$read(0xb, r2, &(0x7f0000000a40)=""/102400, 0x19000) keyctl$search(0xa, r2, &(0x7f00000008c0)='keyring\x00', &(0x7f0000000900)={'syz', 0x1}, 0xfffffffffffffffd) request_key(&(0x7f00000006c0)='dns_resolver\x00', &(0x7f0000000700)={'syz', 0x3}, &(0x7f0000000940)='\x00', 0xfffffffffffffffd) r3 = add_key(&(0x7f0000000380)='id_resolver\x00', &(0x7f0000000400)={'syz', 0x3}, &(0x7f0000000440)="e09e6dda135ac7c467011f", 0xb, r0) keyctl$search(0xa, r1, 0x0, &(0x7f0000000340)={'syz', 0x1}, r3) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000140)='cpuset\x00', 0x0, 0x0) add_key$keyring(&(0x7f0000000100), &(0x7f0000000180)={'syz', 0x0}, 0x0, 0x0, r0) r4 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r5 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) request_key(&(0x7f0000000580)='logon\x00', &(0x7f00000005c0)={'syz', 0x0}, &(0x7f0000000600)='\x1f-)\x00', 0xfffffffffffffff9) add_key$fscrypt_provisioning(&(0x7f0000000480), &(0x7f00000004c0)={'syz', 0x0}, &(0x7f0000000640)=ANY=[], 0x48, r0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = openat$cgroup_int(r4, &(0x7f00000001c0)='cpuset.sched_load_balance\x00', 0x2, 0x0) dup3(r7, r4, 0x0) add_key$keyring(&(0x7f0000000540), &(0x7f0000000640)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffc) r8 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000980), 0x200000, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r5, 0x81f8943c, &(0x7f000001a000)={0x0, ""/256, 0x0, 0x0, 0x0, 0x0, ""/16, ""/16, ""/16, 0x0}) ioctl$BTRFS_IOC_SUBVOL_CREATE_V2(r6, 0x50009418, &(0x7f000001a200)={{r8}, r9, 0x2, @inherit={0x58, &(0x7f00000009c0)={0x1, 0x2, 0x8, 0x7, {0x14, 0x1000, 0x5, 0x7, 0x4}, [0xffff, 0x3]}}, @subvolid=0x4}) writev(r4, &(0x7f0000000300)=[{&(0x7f00000000c0)='0', 0x1}, {&(0x7f00000003c0)='7', 0x1}], 0x2) 16:35:02 executing program 0: r0 = request_key(0x0, 0x0, 0x0, 0xfffffffffffffffd) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) r1 = add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000740)=@filename='./file0\x00', &(0x7f0000000780)='./file0\x00', &(0x7f0000000840)='gadgetfs\x00', 0x0, &(0x7f0000000880)='keyring\x00') perf_event_open(&(0x7f00000007c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x12c00, 0x0, 0xe5e}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) writev(0xffffffffffffffff, 0x0, 0x0) r2 = add_key(0x0, &(0x7f0000000280)={'syz', 0x3}, &(0x7f0000019a40)="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", 0x5bd, 0xfffffffffffffffd) keyctl$read(0xb, r2, &(0x7f0000000a40)=""/102400, 0x19000) keyctl$search(0xa, r2, &(0x7f00000008c0)='keyring\x00', &(0x7f0000000900)={'syz', 0x1}, 0xfffffffffffffffd) request_key(&(0x7f00000006c0)='dns_resolver\x00', &(0x7f0000000700)={'syz', 0x3}, 0x0, 0xfffffffffffffffd) r3 = add_key(&(0x7f0000000380)='id_resolver\x00', &(0x7f0000000400)={'syz', 0x3}, &(0x7f0000000440)="e09e6dda135ac7c467011f", 0xb, r0) keyctl$search(0xa, r1, 0x0, &(0x7f0000000340)={'syz', 0x1}, r3) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000140)='cpuset\x00', 0x0, 0x0) add_key$keyring(&(0x7f0000000100), &(0x7f0000000180)={'syz', 0x0}, 0x0, 0x0, r0) r4 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r5 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) open(&(0x7f00000002c0)='./file0\x00', 0x98d00, 0x8) request_key(&(0x7f0000000580)='logon\x00', 0x0, &(0x7f0000000600)='\x1f-)\x00', 0xfffffffffffffff9) add_key$fscrypt_provisioning(&(0x7f0000000480), &(0x7f00000004c0)={'syz', 0x0}, &(0x7f0000000640)=ANY=[], 0x48, r0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = openat$cgroup_int(r4, &(0x7f00000001c0)='cpuset.sched_load_balance\x00', 0x2, 0x0) dup3(r7, r4, 0x0) r8 = add_key$keyring(&(0x7f0000000540), &(0x7f0000000640)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffc) r9 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000980), 0x200000, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r5, 0x81f8943c, &(0x7f000001a000)={0x0, ""/256, 0x0, 0x0, 0x0, 0x0, ""/16, ""/16, ""/16, 0x0}) ioctl$BTRFS_IOC_SUBVOL_CREATE_V2(r6, 0x50009418, &(0x7f000001a200)={{r9}, r10, 0x2, @inherit={0x58, &(0x7f00000009c0)={0x1, 0x2, 0x8, 0x7, {0x14, 0x1000, 0x5, 0x7}, [0xffff, 0x0]}}, @subvolid=0x4}) keyctl$search(0xa, r3, 0x0, &(0x7f0000000500)={'syz', 0x0}, r8) writev(r4, &(0x7f0000000300)=[{&(0x7f00000000c0)='0', 0xca00}, {&(0x7f00000003c0)='7', 0x1}], 0x2) [ 2018.445856] new mount options do not match the existing superblock, will be ignored [ 2018.502116] new mount options do not match the existing superblock, will be ignored [ 2018.527064] new mount options do not match the existing superblock, will be ignored [ 2018.549010] hfs: invalid gid -1 [ 2018.552693] hfs: uid requires an argument [ 2018.557113] hfs: unable to parse mount options [ 2018.595867] hfs: unable to parse mount options 16:35:02 executing program 2: r0 = request_key(0x0, 0x0, 0x0, 0xfffffffffffffffd) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) r1 = add_key$keyring(0x0, &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000740)=@filename='./file0\x00', &(0x7f0000000780)='./file0\x00', &(0x7f0000000840)='gadgetfs\x00', 0x10, &(0x7f0000000880)='keyring\x00') perf_event_open(&(0x7f00000007c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x12c00, 0x0, 0xe5e}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) writev(0xffffffffffffffff, 0x0, 0x0) r2 = add_key(&(0x7f0000000240)='big_key\x00', &(0x7f0000000280)={'syz', 0x3}, &(0x7f0000019a40)="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", 0x5bd, 0xfffffffffffffffd) keyctl$read(0xb, r2, &(0x7f0000000a40)=""/102400, 0x19000) keyctl$search(0xa, r2, &(0x7f00000008c0)='keyring\x00', &(0x7f0000000900)={'syz', 0x1}, 0xfffffffffffffffd) request_key(&(0x7f00000006c0)='dns_resolver\x00', &(0x7f0000000700)={'syz', 0x3}, &(0x7f0000000940)='\x00', 0xfffffffffffffffd) r3 = add_key(&(0x7f0000000380)='id_resolver\x00', &(0x7f0000000400)={'syz', 0x3}, &(0x7f0000000440)="e09e6dda135ac7c467011f", 0xb, r0) keyctl$search(0xa, r1, 0x0, &(0x7f0000000340)={'syz', 0x1}, r3) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000140)='cpuset\x00', 0x0, 0x0) add_key$keyring(&(0x7f0000000100), &(0x7f0000000180)={'syz', 0x0}, 0x0, 0x0, r0) r4 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r5 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) request_key(&(0x7f0000000580)='logon\x00', &(0x7f00000005c0)={'syz', 0x0}, &(0x7f0000000600)='\x1f-)\x00', 0xfffffffffffffff9) add_key$fscrypt_provisioning(&(0x7f0000000480), &(0x7f00000004c0)={'syz', 0x0}, &(0x7f0000000640)=ANY=[], 0x48, r0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = openat$cgroup_int(r4, &(0x7f00000001c0)='cpuset.sched_load_balance\x00', 0x2, 0x0) dup3(r7, r4, 0x0) add_key$keyring(&(0x7f0000000540), &(0x7f0000000640)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffc) r8 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000980), 0x200000, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r5, 0x81f8943c, &(0x7f000001a000)={0x0, ""/256, 0x0, 0x0, 0x0, 0x0, ""/16, ""/16, ""/16, 0x0}) ioctl$BTRFS_IOC_SUBVOL_CREATE_V2(r6, 0x50009418, &(0x7f000001a200)={{r8}, r9, 0x2, @inherit={0x58, &(0x7f00000009c0)={0x1, 0x2, 0x8, 0x7, {0x14, 0x1000, 0x5, 0x7, 0x4}, [0xffff, 0x3]}}, @subvolid=0x4}) writev(r4, &(0x7f0000000300)=[{&(0x7f00000000c0)='0', 0x1}, {&(0x7f00000003c0)='7', 0x1}], 0x2) 16:35:02 executing program 1: syz_mount_image$hfs(&(0x7f0000000240), &(0x7f0000000380)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x3, &(0x7f0000000780)=ANY=[@ANYBLOB='quiet,gid=', @ANYRESHEX, @ANYBLOB="2c2a7270653d7614866b2c75693df589299908000000450000005d38ff0c0071446a0c48dba349ba347528523876dc8d7918ecea1024ba9669ff19a9ab5e27062b1dae8d8c0eb880008164ed9d8093fdc35f282dee56df9531b6e0c94b43c314af69146a70075499da5e7f927d3c672787e3d33a6071ff2c1483a1a7cfb34131bfee72f86068d0966d", @ANYRESHEX, @ANYBLOB=',codepage=ascii,rootcontext=sysadm_u,\x00'], 0x1, 0x235, &(0x7f0000000000)="$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") 16:35:02 executing program 5: r0 = request_key(0x0, 0x0, 0x0, 0xfffffffffffffffd) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) r1 = add_key$keyring(0x0, &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000740)=@filename='./file0\x00', &(0x7f0000000780)='./file0\x00', &(0x7f0000000840)='gadgetfs\x00', 0x10, &(0x7f0000000880)='keyring\x00') perf_event_open(&(0x7f00000007c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x12c00, 0x0, 0xe5e}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) writev(0xffffffffffffffff, 0x0, 0x0) r2 = add_key(&(0x7f0000000240)='big_key\x00', &(0x7f0000000280)={'syz', 0x3}, &(0x7f0000019a40)="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", 0x5bd, 0xfffffffffffffffd) keyctl$read(0xb, r2, &(0x7f0000000a40)=""/102400, 0x19000) keyctl$search(0xa, r2, &(0x7f00000008c0)='keyring\x00', &(0x7f0000000900)={'syz', 0x1}, 0xfffffffffffffffd) request_key(&(0x7f00000006c0)='dns_resolver\x00', &(0x7f0000000700)={'syz', 0x3}, &(0x7f0000000940)='\x00', 0xfffffffffffffffd) r3 = add_key(&(0x7f0000000380)='id_resolver\x00', &(0x7f0000000400)={'syz', 0x3}, &(0x7f0000000440)="e09e6dda135ac7c467011f", 0xb, r0) keyctl$search(0xa, r1, 0x0, &(0x7f0000000340)={'syz', 0x1}, r3) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000140)='cpuset\x00', 0x0, 0x0) add_key$keyring(&(0x7f0000000100), &(0x7f0000000180)={'syz', 0x0}, 0x0, 0x0, r0) r4 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r5 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) request_key(&(0x7f0000000580)='logon\x00', &(0x7f00000005c0)={'syz', 0x0}, &(0x7f0000000600)='\x1f-)\x00', 0xfffffffffffffff9) add_key$fscrypt_provisioning(&(0x7f0000000480), &(0x7f00000004c0)={'syz', 0x0}, &(0x7f0000000640)=ANY=[], 0x48, r0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = openat$cgroup_int(r4, &(0x7f00000001c0)='cpuset.sched_load_balance\x00', 0x2, 0x0) dup3(r7, r4, 0x0) add_key$keyring(&(0x7f0000000540), &(0x7f0000000640)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffc) r8 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000980), 0x200000, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r5, 0x81f8943c, &(0x7f000001a000)={0x0, ""/256, 0x0, 0x0, 0x0, 0x0, ""/16, ""/16, ""/16, 0x0}) ioctl$BTRFS_IOC_SUBVOL_CREATE_V2(r6, 0x50009418, &(0x7f000001a200)={{r8}, r9, 0x2, @inherit={0x58, &(0x7f00000009c0)={0x1, 0x2, 0x8, 0x7, {0x14, 0x1000, 0x5, 0x7, 0x4}, [0xffff, 0x3]}}, @subvolid=0x4}) writev(r4, &(0x7f0000000300)=[{&(0x7f00000000c0)='0', 0x1}, {&(0x7f00000003c0)='7', 0x1}], 0x2) [ 2018.624166] new mount options do not match the existing superblock, will be ignored 16:35:02 executing program 0: r0 = request_key(0x0, 0x0, 0x0, 0xfffffffffffffffd) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) r1 = add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000740)=@filename='./file0\x00', &(0x7f0000000780)='./file0\x00', &(0x7f0000000840)='gadgetfs\x00', 0x0, &(0x7f0000000880)='keyring\x00') perf_event_open(&(0x7f00000007c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x12c00, 0x0, 0xe5e}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) writev(0xffffffffffffffff, 0x0, 0x0) r2 = add_key(0x0, &(0x7f0000000280)={'syz', 0x3}, &(0x7f0000019a40)="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", 0x5bd, 0xfffffffffffffffd) keyctl$read(0xb, r2, &(0x7f0000000a40)=""/102400, 0x19000) keyctl$search(0xa, r2, &(0x7f00000008c0)='keyring\x00', &(0x7f0000000900)={'syz', 0x1}, 0xfffffffffffffffd) request_key(&(0x7f00000006c0)='dns_resolver\x00', &(0x7f0000000700)={'syz', 0x3}, 0x0, 0xfffffffffffffffd) r3 = add_key(&(0x7f0000000380)='id_resolver\x00', &(0x7f0000000400)={'syz', 0x3}, &(0x7f0000000440)="e09e6dda135ac7c467011f", 0xb, r0) keyctl$search(0xa, r1, 0x0, &(0x7f0000000340)={'syz', 0x1}, r3) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000140)='cpuset\x00', 0x0, 0x0) add_key$keyring(&(0x7f0000000100), &(0x7f0000000180)={'syz', 0x0}, 0x0, 0x0, r0) r4 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r5 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) open(&(0x7f00000002c0)='./file0\x00', 0x98d00, 0x8) request_key(&(0x7f0000000580)='logon\x00', 0x0, &(0x7f0000000600)='\x1f-)\x00', 0xfffffffffffffff9) add_key$fscrypt_provisioning(&(0x7f0000000480), &(0x7f00000004c0)={'syz', 0x0}, &(0x7f0000000640)=ANY=[], 0x48, r0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = openat$cgroup_int(r4, &(0x7f00000001c0)='cpuset.sched_load_balance\x00', 0x2, 0x0) dup3(r7, r4, 0x0) r8 = add_key$keyring(&(0x7f0000000540), &(0x7f0000000640)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffc) r9 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000980), 0x200000, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r5, 0x81f8943c, &(0x7f000001a000)={0x0, ""/256, 0x0, 0x0, 0x0, 0x0, ""/16, ""/16, ""/16, 0x0}) ioctl$BTRFS_IOC_SUBVOL_CREATE_V2(r6, 0x50009418, &(0x7f000001a200)={{r9}, r10, 0x2, @inherit={0x58, &(0x7f00000009c0)={0x1, 0x2, 0x8, 0x7, {0x14, 0x1000, 0x5, 0x7}, [0xffff, 0x0]}}, @subvolid=0x4}) keyctl$search(0xa, r3, 0x0, &(0x7f0000000500)={'syz', 0x0}, r8) writev(r4, &(0x7f0000000300)=[{&(0x7f00000000c0)='0', 0xcb00}, {&(0x7f00000003c0)='7', 0x1}], 0x2) [ 2018.718407] 9pnet: Insufficient options for proto=fd 16:35:02 executing program 4: r0 = request_key(0x0, 0x0, 0x0, 0xfffffffffffffffd) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) r1 = add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000780)='./file0\x00', &(0x7f0000000840)='gadgetfs\x00', 0x0, &(0x7f0000000880)='keyring\x00') perf_event_open(&(0x7f00000007c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x12c00, 0x0, 0xe5e}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) writev(0xffffffffffffffff, 0x0, 0x0) keyctl$read(0xb, 0x0, &(0x7f0000000a40)=""/102400, 0x19000) keyctl$search(0xa, 0x0, 0x0, 0x0, 0xfffffffffffffffd) request_key(&(0x7f00000006c0)='dns_resolver\x00', &(0x7f0000000700)={'syz', 0x3}, &(0x7f0000000940)='\x00', 0xfffffffffffffffd) r2 = add_key(&(0x7f0000000380)='id_resolver\x00', 0x0, &(0x7f0000000440), 0x0, r0) keyctl$search(0xa, r1, 0x0, &(0x7f0000000340)={'syz', 0x1}, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000140)='cpuset\x00', 0x0, 0x0) add_key$keyring(&(0x7f0000000100), &(0x7f0000000180)={'syz', 0x0}, 0x0, 0x0, r0) r3 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r4 = openat$rfkill(0xffffffffffffff9c, 0x0, 0x2, 0x0) open(&(0x7f00000002c0)='./file0\x00', 0x98d00, 0x8) request_key(&(0x7f0000000580)='logon\x00', &(0x7f00000005c0)={'syz', 0x0}, &(0x7f0000000600)='\x1f-)\x00', 0xfffffffffffffff9) write$rfkill(r4, &(0x7f0000000040)={0x0, 0x0, 0x3}, 0x8) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = openat$cgroup_int(r3, &(0x7f00000001c0)='cpuset.sched_load_balance\x00', 0x2, 0x0) dup3(r6, r3, 0x0) r7 = add_key$keyring(&(0x7f0000000540), &(0x7f0000000640)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffc) r8 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000980), 0x200000, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r4, 0x81f8943c, &(0x7f000001a000)={0x0, ""/256, 0x0, 0x0, 0x0, 0x0, ""/16, ""/16, ""/16, 0x0}) ioctl$BTRFS_IOC_SUBVOL_CREATE_V2(r5, 0x50009418, &(0x7f000001a200)={{r8}, r9, 0x2, @inherit={0x58, &(0x7f00000009c0)={0x1, 0x2, 0x8, 0x7, {0x14, 0x1000, 0x5, 0x7, 0x4}, [0xffff, 0x3]}}, @subvolid=0x4}) ioctl$BTRFS_IOC_BALANCE(r5, 0x5000940c, 0x0) keyctl$search(0xa, r2, &(0x7f0000000200)='keyring\x00', &(0x7f0000000500)={'syz', 0x0}, r7) writev(r3, &(0x7f0000000300)=[{&(0x7f00000000c0)='0', 0x1}, {&(0x7f00000003c0)='7', 0x1}], 0x2) 16:35:02 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000140)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0x6e) syz_mount_image$hfs(&(0x7f0000000240), &(0x7f0000000380)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x3, &(0x7f0000000400)={[{}, {@part={'part', 0x3d, 0x10001}}, {@type={'type', 0x3d, "7614866b"}}, {@uid={'uid', 0x3d, r2}}, {@codepage={'codepage', 0x3d, 'ascii'}}], [{@rootcontext={'rootcontext', 0x3d, 'sysadm_u'}}]}, 0x1, 0x235, &(0x7f0000000000)="$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") (async) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000002680)={{0x1, 0x1, 0x18, r0, {r2, r3}}, '\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00'}) getresgid(&(0x7f0000000100), &(0x7f0000000140)=0x0, &(0x7f00000001c0)) setgroups(0x2, &(0x7f0000000200)=[0x0, r5]) stat(&(0x7f0000000780)='./bus/file0\x00', &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0}) (async) r7 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./bus\x00', 0x0, 0x0) (async) r8 = openat(0xffffffffffffff9c, &(0x7f0000004400)='./bus\x00', 0x1c1002, 0x0) write$binfmt_misc(r8, &(0x7f0000000180)={'syz1'}, 0x4) (async) sendfile(r8, r7, 0x0, 0x1ffff) (async) r9 = syz_open_dev$evdev(&(0x7f00000000c0), 0x0, 0x862b01) write$char_usb(r9, &(0x7f0000000040)="e2", 0x1770) (async) mount$9p_fd(0x0, &(0x7f0000003080)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f0000003100), 0x0, &(0x7f0000003140)={'trans=fd,', {'rfdno', 0x3d, r8}, 0x2c, {'wfdno', 0x3d, r9}, 0x2c, {[{@cache_fscache}, {@debug={'debug', 0x3d, 0x1000}}, {@aname}, {@afid={'afid', 0x3d, 0x9}}, {@access_uid={'access', 0x3d, r2}}], [{@rootcontext={'rootcontext', 0x3d, 'staff_u'}}, {@appraise_type}]}}) syz_fuse_handle_req(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000002d00)={&(0x7f0000002380)={0x50, 0x0, 0x8, {0x7, 0x21, 0x0, 0x2000011}}, 0x0, 0x0, 0x0, 0x0, &(0x7f00000024c0)={0x28, 0xfffffffffffffff5, 0xfff}, 0x0, &(0x7f0000002580)={0x18}, &(0x7f00000025c0)=ANY=[@ANYBLOB], &(0x7f0000002600)={0x20, 0x0, 0x28, {0x0, 0x14}}, &(0x7f00000026c0)={0x78, 0xfffffffffffffffe, 0x1, {0x0, 0x4, 0x0, {0x1, 0x7, 0x4799, 0x0, 0x0, 0x7ff, 0x3f, 0xfffe, 0x1, 0x0, 0x1, 0x0, 0x0, 0x4}}}, &(0x7f0000002740)={0x90, 0xfffffffffffffff5, 0x0, {0x0, 0x0, 0x3ff, 0x0, 0xffffff27, 0x404afb3e, {0x6, 0x0, 0x1, 0x6, 0x100000000, 0x0, 0x0, 0x0, 0x32, 0x0, 0xb5, 0xee00, 0x0, 0x0, 0x8}}}, 0x0, &(0x7f0000002d80)={0x2c0, 0x0, 0x4, [{{0x0, 0x0, 0x9, 0x0, 0x0, 0x0, {0x0, 0x8, 0x0, 0x0, 0x0, 0x3, 0x0, 0x2, 0x0, 0xc000, 0x0, 0xee00, 0x0, 0x0, 0x9}}, {0x0, 0xa65b, 0x28, 0x3, '^-%{{[#!]#-#&e*!-]$$.\xa9\xa6\x19\xb6\xd2(\xf3l`\xb1\xe0\xc90\xa7@/f::'}}, {{0x0, 0x3, 0x0, 0x1, 0x3ff, 0x0, {0x0, 0x0, 0x9, 0x8, 0x0, 0x219, 0x0, 0x0, 0x80000000, 0x0, 0xffff, 0xee01, 0xee01, 0x6, 0x4}}, {0x3, 0x8, 0x1, 0x0, '\''}}, {{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, {0x4, 0x20, 0x0, 0xffffffffffff8004, 0x3, 0x40, 0xfffffffe, 0xffffffff, 0x3, 0x1000, 0x7, r6, 0x0, 0x3}}, {0x3, 0x0, 0x1e, 0x80000000, '}.}##)%M\'/}}^\\.#*.{/\xfd&^@*$+((['}}, {{0x5, 0x0, 0x0, 0x1, 0x3f, 0x3, {0x6, 0x0, 0x1, 0x5, 0x0, 0x24f, 0x0, 0x0, 0x0, 0x4000, 0x0, 0x0, 0xee01, 0x1}}}]}, &(0x7f0000002c00)={0xa0, 0x0, 0x100000000, {{0x1, 0x0, 0x0, 0x1f, 0x193de2d0, 0x2, {0x0, 0x40, 0x0, 0x319, 0x0, 0xf182, 0x5, 0x0, 0x5, 0x0, 0x7, 0xee01}}, {0x0, 0x2}}}, 0x0}) (async) getresgid(&(0x7f0000000100), &(0x7f0000000140)=0x0, &(0x7f00000001c0)) setgroups(0x2, &(0x7f0000000200)=[0x0, r10]) (async) newfstatat(0xffffffffffffff9c, &(0x7f0000002940)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f00000029c0)={0x0, 0x0, 0x0, 0x0, 0x0}, 0x800) (async) getresgid(&(0x7f0000000100), &(0x7f0000000140)=0x0, &(0x7f00000001c0)) setgroups(0x2, &(0x7f0000000200)=[0x0, r12]) (async) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000002d00)={{{@in=@private, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in6=@ipv4={""/10, ""/2, @local}}}, &(0x7f0000002e00)=0xe8) (async) newfstatat(0xffffffffffffff9c, &(0x7f0000002e40)='./file0\x00', &(0x7f0000002e80)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x0) syz_fuse_handle_req(0xffffffffffffffff, &(0x7f0000000480)="1f3d060690619755e4058176f8696f31e93c45cba0ceb9cfd0b71c442d9f58d6f40a673d75d78a83a235cbbca2a9b265723b22221775a34892c4a79b4a326e306684a7e7514de18d914cd8eab024d46c05e9791217cbe9b3f325cccdc964e3544e5fd6c2a70a0b3566c43049b75fc38bc0deeff6cae1cdc883bd2329a89cf561818cb15efd85bc066904df637bcd0fc9ad2d23437fb17957d9286e5acca4450f97af88ca9c726b4c5d50a1b281aa5981e5d17ca3ec9fd04877e2effd607e4f84dd83a94cd624b22356d89a0135bf77572960ed66f268e571e52d5a25ce2e292eb21e74cff724c25fed0859f707618edd78267cba9a62bf8044837a56d28143a6cd5cdd897ab9c7441748d75286c5834b257cab1a0a454145af207a53ae5b7c357cd61e817d10d4d044182e5319b021e043942e73a0f3abaeb68c4956f1f0f3234b5f13497d10258eece1e3df8c14826f6dbf10dae80093989b1dbb492e4599ce9f01bb50319726fc34118c14c806855797c69dd344c20aa49aa282c1b8f5273531be4cb45ef599c7c07ac8dda27c13f06797327dd646a18de0aea8ad0fa0bc51ae667627b34293d51b854b3a31106863b73224427e7d88c51ffaa35c3c15f48b3d7b11d4b95172cd8b2f7d6e5d2c174a7e386610af8a8825e29985f25998b81c3ca7272995f620659d3b8299dba02d3d35b84bf5dbd3e09f16a60a76bc8255c4e03b776b42e46a4854caa3c604ac011331acd43d7a3649d1d579dc946acf6ef583dd2c8e19cda9d0bdf0a6c8a93e29b0463f03566660be17902cc8f78115b72890d5e5e0d178bee6a8e7b77d470657dae425acd230a4229b014fb87a594390a2ad74c5a03c7f56789e1d93b4b29d76830be4cc5c1eeb67f6b45055b9b421dc7a61ff0412abcf45acda665f256b6b5b997153e1632a023d2b8b6715131011ac79750f7e84cbb8d333d9b99959d2e30dc13a27788df39cf687fbe753159f1565b7c38ef4cb4c89b3ee894f445bbc00a0b4692d72dbb5871af58aae59260b538d99d72f9663966b91f22ac2fd01bf6862654a60eaa6db0f4df98d0c964e3d20afc5ecbd83e76747203eefb8588c2115033b965cde630a122de22a43c803445430de96dbf9aa622c59a0a9707a1154e127975570441ff7ff3e8ffd181675f6d36cdccebb0efa7a28bfab20e923d05910f3304e0d907f4390f90369233d8aff8bac2536c1af268cf8e83ae3d9a13f3fdd8eb51f588fd0e57ec505981971410f2fd3f35929654a6cf3bbac0ee2a46f6ad601200e8f72a405567efb3823bd51165f8ea7f9849d5e745090290d6e47a22792811a3985e967855f506f509402c79e6bb2acc3f577aa2419992b9987fc1b1b256cfc7e6162398e562d4d910c10fc51e336d173b5e2d0d04e4eda6f538cfba21e44f53109ad6da938f871a1d36f0da17bb910cbc0879ee96ee4697fd947c75fa68467f711000165f00c3f38931595a116a041b6a73198b57de0b911a8b2252f5c9eae17fceca835eb523b3a2f62d3aa0cfe633f7c9ada151764dcca7fb2f2152410a29419b0eace5bc7d6522b60e052afd5d46bc678d264aed94dce0ce94236019eded10aff295dd5cabeb3bf6d0b0eaed312934ce7a89e8f4e83f63fe11b8039df1a325d7fccab2a0a4cd8d6da268522fe92f6f370441cc43d26e3f0a104586d3973cca657ce0396eb9179c6e9a1e5b8352e8ffe2625e7dbd7ee8ce348b56515eebd90905196958b0f4e7bef41b03cf89fcefb82740d09d30208b4f0317b67ac7da82555180cd30e7ada4285669c0d4f98b905b08e78257c6cd12b3a2c41f0ae3df337444d7b3bdff5df51d2efe6ddc45e48f6ecdc4c8a18df968e7deed19642cb0a6f2983e71fcf726b676acfbd79bdf575ddae5f8214c6de7dfd3730223c0d7148c42a2375e96311f2e861cef013c4e9fd6017011831ef99b78eaab781f556ea6b31492983e49290049196102d9666e035bacbb56156b776732e2ed1c1ed35452883d76bdea7dc1f4b9c0cb4d8eeec15aed54157faf46ad62b36fca7333678524da08673b3d416c7a649207aa08f05936f357ccde3c6ecd1ce6b1a05297e736e55871ecf0ca4ade07008fe2558e4390848e6f6dabe8a51381e30205eac873e18ad5d6e267a6387cf3a2b714247daf553772dc2b38d5c6338884989278e2f8e6ad13fef1713d776ecbc662e02caada35a00e9afee7294d50a8e674dee0a0c49c1dca958266ba2b86670a29f793fb5cc133ebf51fa54356eaae1bef36672dcbdb3277f8b1c09ba0d387f506d44d19df61d3d084bc90de4cdcc91cc2f292e96972ce10e601966093d2ed24ba44059979698a11362e1df01c54ba1ac44bc3f893414f831a674eb4da9f2b1a291027ccdec9985a51db181f60cb8eacb4effc9fcff8faac7862b2655bc40285696dcf9e20c4dbd131958d861ad6395b33362b0a22ee3657a34a52ab991aa858dd82614d7518601a16ec66d9bf230d7b0e91aa591c3533ba565c285e9959d10f50b47e4ce85d00fa1cdb2433ea0adb22bcc769ab51368201e8490b72348f5b14e322a0c4764bcf9d06515ffefaf6579a0afe368df9b61eb903b4684fea423867da9fe2b03ac17bc5e1d652f3ea5c01a61d41be0eb33753993d85dcd62b048ec67259073c17477b8d70d03428626df64ba7caf3580dbe9558256c704ecd9ad1d63bb1606f2f4df22ceebaca37fe8d3bd4f3975d79c62a007ca974900af7330b20c7c0235fd7fa9f2a6912888b22b26f0e9d3b33e893f345dafc9929ae407fea14b993e128ee6fdefc2c99e5c16ef74cfd30e18d250cc777e073d9d3d6af2b2f52cc460f81782639e303096fce13004d9b35f9a144a1d7a09d90c4d6e4abb3dcde464c10892a771287cfd60b7f0bfc0d30d9c3e7d5c20d37095158187590547f7d2a56d05a048839d9ceb6757a3f51660cb545ba980b5b943179f72b9acd01f6d77c508c8a1e8e447e16bf9d0d636c254a7dc5585691c5a752b8497c9b60de0ec8ca31cf5d63faba2fc4765ba319a3892758fb4bf012b45b6a7ef21dab872e34592bd475cd9dbdbd30571c85cdaf768146b52c62350b4d1897af4564f5be558765dc9792ba4b0a16058c5eb7f6f5955efa672eedef2b0a6297dc39ae395eaab765e2ea55134a67d3da978d67668b198cad174c8d5aabac80b4fdb30a79a44c2bf731468af69e96e8be1e81c9e02b5935f39e803ea2d2b7a9544a41be3a5d4e1a76bb5db6700e3a220268b8d437a02a5091ce32ebd08215139aea824b57430e7166aea96218aaadee689edede335bd9bfb2a35560f3483aefdd2421621e94e7aa439f26832fb06b65bb2de0d0eabdda7cf56916b9a8bf52389ada4f1e2657346b75feec0230b3a2bfb43ddc8d66a64c00bb8023ed1093f5fc9268dff8902264b87c4a09bfb24be25161cbcee108a1eeb83f5762527f83ac76c0e4cf5c601fd7ee6bd697ec9cf68712fa7e02395f51c00ba4a78a9645e19e93539b6924d2fb746bc1537e5b0536a687e368105210a744f65f30e64252c1efcff94717dc35015cffc85e77bbbca8add96f7fc7eaf8f6e0212f9e9eb04120af039222ae9cc1133689fdb3c1d016ad71e21266d2dcd0ecbc5cb7b1ff464a7344152e9b926724b79a4f0a35af5bca4051013024d043aa5e8ffba2482bce6ed0229e524262b57d5e7b3c7bf8b2e6d929722de2e683ef751ed282e03d306b24f75109067ff4d57c9e9aa8b34189afe41fd1ea0870e5be1a1264754549e6c1d44deaac011c46521dbb25c93b12608de1a8cddfcb48ee5a27f198717db20491cb1de013cb58e759be0a98c6349fd3ec70fdd82a8d7071dcbfcc35125c313efe7e629dd9cb43faadaa3d5088c5d666d80a409bbe67d9f70c3e8684abc4bcaf6e7dc99200f6d585cbd94eebae1223b6b3d0108f101705ccd57bab92a3a4f4b0bcb6f9b13588a4e4cda95e8e45fdb72148fb4b46b49fe0daa582666220f12ca1b10b110009ce4c151c2b8b94224f92070280b2472ebcac0308f23e44475656b30a0776c1160ee33f59f7e67a873cf8d3225cf5c8d0ace41c42e0d6846edafc3755c990c2c6683494be4cc339593e3df3b0796f296361cf543c85a6ef2c66f62d5a3209236cc48abc3cf12893cb23eeabff6c822c534aefea79adf77ad87c807363c62c88aaf3ecaafcef1f9bdc00a435344236739b41bc39c20788879e3f5b598cabd3366304dc9e9823f437bb1148336fa221125217a7c15143f63e0c18f9c3877bf03d2e2737c2873ea33ef0e5ce7c51ba501af3dcc5c68e6dc7f72af5848626377c874004d6623ce55389fe8a4cd15db33e0cabb38aee341f695a22fd885d772a99eeaa4ff915bd9106c233746f87a6e7a1a8e371de9e25b37071f36325d459d470724065c488381a4f2e1ca5de026fa2a5503085c6de2840d817aa15cba914430c095b034b70dd66176082129cdc5df33b72d53d4b0165ab091fe10b2d844e23bd84480f043678f42ff5f9521651f7aa830a6391a4de569b811446134fbd1adf8f108e95bda567c81923f6d12f774c8d484a7b8177dc201bc1a27c19310f6a3ba33f8a1b3681b66092313adfb90b4d9c7dbd3ed3ea9aa8ba98797cf4f80a17bd8cdd236e5df9ef1c69bf691e8977b53049cff8771581fa78c724bca2fa60376f9a73d65cc41f7499068e3bcad96107241fa714c086a311f92a75e62fb93b5fb04117c7ffae2898616fe22009646057b7c65846743705543425a286f023ddf56079b2afc8f79a7764af1e941719d9a46a5390994632a9f3d3acf2d311568ac95953ead8e56a847776df1e15514704a45f99b0994bede10333d83861beb44dd76f0335311142573cf14f2b6f73023004f07aec30f4020d28b748674c400510597e7ba91956c0fec64d1618513ee6621a00986fbd62a200863e5c77fee3188530dd501eb2b0263618e3451ae0ba1cf178c95516a1596f73176d4fcea8310d133d46cfea81c990279bd15e539d6ba0e77699d9d0181358d797e697423bf991ed3de1c8f4c3e52212711a14a32550e82eb27de335b592869626fd1094bd9714661cda5a72abe16f2ed71630e5872e6328ed70d2a33f7fb10f7c8e9f7c0b19dcebdc57f4e47f7e36ce33f7732698456c8598557b6d8f658f86083f6bca1418ad401120f1a3956fa86f8f476d9b7d1fe2b43e07660f9e63d39e93e0d0f20badbebe2f3e3e33f092519b8209f60bbcd1366b257907f6b71faf781abd63329e85476c048572bb52057c3a1777e5550d1a5264c2feceac2ed024f94f9e54b03e1cd80ab51619e37308d38f669daeee9a9bbf66886c50254bfdb19be1120326261e3e5b15364d9d15b58fe87737533910be8304bdc051338c2697e6b31ce59476ed18bbb705aa5875d5b8b0afb10a8e135b60de7a763c34864bb1422e32bc90bc6660525a55bd7d40fc244cf6c93e5b74769262029a879956867c17d96f9fadea7f287ad66a4e06118d69a01bd64df89a8491822c2627fd6b95003146fb2c3fd982b5a3e522d951ba5384f41f0ecda784fd89a46420c806741c12ca68b9bd43cb365b32748f1f3dff3c9c6c0003d2f0fb600e1675f58674a83797a5dfb7bc8cfbd0af3bcb9f2ba7cfaeaa16ecb9cbf759b86efbd668160bf184af601dc46ab86663a51bce26d9a7819964ac701ebc7a1175117c6a4ec6b33f50f9e6b33ed6009d5ed986d59ba181469e54fe8d204d7299384e435b90228e8117c2a89fbf9e9f8925dedc8329696a8a5d155e23d92546c36d4f22cc4f6557cb17d63eff0c2909613be0a1bbda94eee4ac81da35635dad4ad967e92bbf6c5ec6a07f3baa4687d68c8189dfa8c2850952e6ae07e927c33d098b669f04b04a66196a650186a31879f22c71cf63e51aebd28da7714b5bae4190b1b16821d8588ef430e9abf13fa38b3ea953968ecea373e7d33ae9e0999f44722e6f38b347324eadb04c08fa9f8fde1ac85bda6e6ada05f2eef5dbad52de44d268563781470cbb1d4f24b2565873e00ff6f8702cc81bbb7ba9e43eb77b5fd7d85917d3132426680b5537f89d4100b817c03340ba9872c74580fc7be0b94a82d1d3ba0f0fed925890f6066fabf052ebf7e0a452c8ce5b7493fd41da107514abb9db9a91db41d5983abf5664fc88995353ab780438d632d860ae974cdc9dfac39520a2790e0bffd0eca63862fc489973bb89247d2f795c72044688e672fd7fa8950f9647affa06113feadd6124decc4a1a22371d94bf18b03bd22b14b291213bd5530aec45a029912793cfc5a407fc6ab7f1041bbddf55998b188de0753f8b17f1d10b5631066809fa63eb1459704779c39aa945a3014d53dc175057df48981a62ac5a78008668459b03104cd6c982a7d7880c4b6a5aa8b70e924343b113f008ed99ab6ca0e4ce8fd78e645ce874cf2b1e239b9c62325225a497c1380c70320c2815e6a936311d2afeed36cc339d363663810f859e2b8552074b1cf31977e7ac9466dc7abaeeca5cf9336d6fae7b3d8b0f5ef758b8a4e967319f5bc673a8f2aad87527d2430f8972395a855a8ba29e98127eb77804bf9d466f3194c58339bb32bbf9cc701d51f7dd99c6ff28a6019d08ce63ec19611954806e4548f13a5a158fa76945036d0a06e3d812111a10eb9a9267c5f4c6b6da8f1e4db96e053901a537341fea3fcb2a2e2c4a0a542826fd0617a97bb0a428b61fbaf0a87bc44c2cad51052a39adf5ed6766ce4128e70ae7c28a46d47bce6d1b723ac332746b98751b136998e02e23c2e99cf7f84e447354af3eb231202a3b4468b663127844e687b931597d5c4ed394810fe5e090bbd78c4e5cc483f0451410471009f4b8d42f01e208aec9c880dc9ad6a2913c0d734b9d57f7a39ce6f942c6aa35f6ed7214eb0e5305d427220a8cef1cf4cc6997f90784611a7b1bb5d27ac5c6def325d66603c635706bdc7db755a7183e4c759140b5d625b313505c954e68c68bdaeba10fadbabd46d45905b76b46b19f3fb4ba3579c3bd693b2f6d7dd9afe267827f6eeda80bbf3fc30a3f02c2b6bb7bc4861c6a4dd28550c0589d19a917ac3272d2e0c725a695ab273fb360ae2ec74fa5ce09a0930866c7734c47de5d1eada338e955eb783c23a7ed51b0b16e86bca9de9308286394dfd3147da4adfd896c64a575d8c3740e7c911fbd975120935e531a5e36c1c53e017cdbf2b30f4020e85d17464860046fa6b0f92efbf0db7c55d2132a319f9db1a9c980ab1532eb7551d544e47fbe874ba645814ef987ee015681c45b3a6a89ba2961297fb3943cef14c18c8d91a4694980993051b4fc1387e0b5bc29f20a034a0ca9016b620be2eaf91f895978bab8ad82ba19ffdb178418b5cfcf484b4f8adb35bc95cbb1be6c44ade33e9b8b2dee7c7e95de52f1b07d63121bc207c9ea804693c1ae8a7243c2600d2aad694b9f93f905315a9cd8ba6b90f5460961fb96d8b2af640f03492489f2bf3594eebf33fab8981e30b84fb4d863f285b549f366d702de8b6de218779bfda4fa534c98413a08dc03e30ead7fd82ba5a66f099e0fb08a16261cd061c017304e4efb962272ee728f06a705a0b8fcb797a6ae302d5357c6f9ed8564ed591c5db729149785da04b8d5135270d948f5c50249cd9328f313367a5876b17924dc56c7c9943ca020e242eb72de85be9728bdeefab21d497920b796551d30a6d91c5aa7faba750e110bf542ab62c9fc3ea6b98d8a5b86ccb45810a52646f0f91dde2e5eacbd316d264dedd119d3c7d63e9d89396a4cd68482a24f96e9a194356c8634321531987dddb0c5c6ffae1c41d7eada9e49904eaa0175c9ac2891a7222713222cd021ba71a94185f983bd04caa47b3b91eefa4f243907b811c33dae362964cadb74f52437ab728642a195acf4db3e576969806fa6e613bf699c6c80184687746e18895fd0b3a656253d55d0310feede8ff41d0536c58b553a0242fee40dc7aa5ad09ff41b958f7b6ee73f46264befc8f795bc2ccfe96ee48be980f71ed6c26239b7cfa6569cf19fc79a161e12a9b82aa9e217cb0e655ee3cfc76591850eb8111af6310a8d4de8c7688f7409318255723ccb24ec049bd2b5bed356880cd7a4089ed27ecb45540ffe5626754078e72f34a01307f79be6d0774f0a89975c131da25ac5f7ee7aedcc32d8c74b669058f476f9fe3f23928117bd6ec86b002824b2e3fa279318f952bef873c6287cbeb63fd8f1ec186cfa0c7487428f5f6ec336f9191ec08a756d12b5764df0262f6eb38c76d69d8cbf0eb7f21657e12c17f0b74b3b7206c2dc0f4adf28f0b429453a73e78cba678a84e6b97645ba3440af04bb02ae0414e2cc39317e13637aca82a3cc71ca20102a936ae2a85e06dcc947cdb23984c35ad2547e09f23af87ee82e76e7026808a8c16da6171717b5e46a77de29ea0669a5783a4dfce7edfa66dd164a81b65fc7c9366e5dd514e2b4ede451624dd01c9b5162aab61954a7c911443fc0f2acb6526c6597ce588a7a56dce7ee65453de6fe445fb8188e39cbfa2d80482e74c10cad0cd34167ab956287e607f23fbcb39c61a4734d44ae766a68d192573edeee407e45ae6fcd5173542ecab7219a9ce48e85af2d759347ea45a1265725ad60b032836ba70ef81f624c6fef946b9be4f7ce9c1835fa9cbf8db915f60d7defeb81d97512556cdd85048b51926b5b6c5d96045cec11fc2e383f6fd977490b537ff6a49cfe54170530e98fe6a118f0ac18874d4f1534524eed78eb0f9c89be22fc09a2ee43ca793a91b95bc764fef064fe6b6070920892214c7d4c551bb4ab87ccf869fa76aabeffc94211f03d55b114122c112057bd51f3dd5073c9e4341aad4216d7a2577e3294250dd0915a0863168354e67e1202bc34cff852146ceafa882d7fe7c9161f5e2d7771f9836fbf1546e695ebf2ee07509f40730de1fbff3974952ee067969087e91764353dcf599f3ee2d77d12ed10e3b3cd4fc98a940b3008b9d194a19d96c96c73cf39503abda338cb031af88b5a11fcc4423b13ab4634b4805be1ccdb4bc87ba47cec8170f6259292cf8bf1182b4ecf8c7d88417a0f2a01ac2697f065491bf892cf81ff28e60c325c9905651763c129baa727800cd077b4388f6deacbd4431a30f3c0dc2ba47a756e278bb9a11fd9c419baaa1ff0ba39744c7b25d7fb16ff4b9792277095cac9668a6b0c7eed42e3e06decb59cbac0097d85dc4c214aeb28449c3b5750933bf1ccd6d6ea3284abec3c965ff64f89787f4a18eb6d9f3f7fb8c35bd7be368ed4c9146233e99d41506d4b05656c60507609970d365da5394c5535a42327ebd65d618744a1ca41ca3146913dcf3d4681ff1a81eba929d97874df4c4e47a6a66282708546a0dfd8f145bf47963fb966d072dc2809c7b017dbccb1cd9226da211b9d75e1782ccd9630188076f21ee5be13d8350470d33dc1af87f89032e0ac43089b99c6e63aac372ddaec63e2e870a8464e836cf29f1c711c266bd08c07170714786c6cac072b7620c6610297fa09b6d99984660747ac9e0f1dfd5ec8950c3c7b4c26871a50d801f9f735378af76baeb9912e395d2f080ac2f45824c9fdc356a5bb7c1204d32b61659d2a15bd873ae3da516eedd679c52dfd0dd67de5e2276b3e89ed7da5896bffa7d190f530982cc9fb2a5c961cdc3e6037f040269d2765a9c6118a1bb31e66b5628b40329627ed1c2fe0fab3ae2c4411bffcd56baf0e50875ee515ade6c2274bec34a99f44906c03916d0a9df52e79e5f84f7336c99fc31925f5c9b2bde5ca9e2f3c5bf2309018d62045121b0068845426b7f1a7eb275ca517a31717ebfdf61ae2933bb5e00c6b305e389453987adc49dde74750231c38ab55f9875e700d97a7db3e132022c71ab24d593cecb89dc3f6b1f932157f747b7aad0f3c17258338c4b94ddd89dc50e6864ba55dc2bda2513d5b05ffd8070cf69484b5d37ad262941f7e941e12dbf18dd0272d6fb4a162cdf735a8b76b097e53668844c6cd156223764dc6c1f0389ff2281577fe39f8cb616716972d28976808c294b480e701294b1bb32be0be0342b41079cf9f1ff80f4fa1a09adfec6ded78805811bdd18a885ec8bdac396bcba54dda0fde3f3e89546166bb9507f576f2c6eae85a817cd1debbbb46559a78ac25f0238f2f9cd6f91b9af3ea8471f025688bef2381dc56bccaaa5e957d592f67187ddea43234f2c105c76e9fb1ef8a0d96a2cdb2cebdeaf47853dd8f9d3edd9fec73192e32118116302563648cfba5570cf8265fc33aa5098624040f4260342465328f52d203bcfa6354e84ca1ee106a7893ef11d56c43fd69d97f183779d2b077b54ce31822d609fed3a035da74aa19e2f8a248938a0bbbdce8eebda6ab4f5503352cf01cbace04c1f032844b159a8544dc7d643c0f088ac0dd5b6e4bdea8200316b263b2fdde1609241e000b40babbd6a969cbf5e193e31360a54edaa08d63a8d142d1b6ff945b4fb65bd6941a2f5de3008c53ed4bd4c7f55409385c9a489da3ccb20544f09e49003ef3bb868c27a001dfb635193b5fe55fc10d8f2ab708181274abd02e457a8300ec5a5b7ae8f82dc7afccc3b9d02bc4e851a3934951241a699a343acd6ca3196e5e4c2d02d3f87d52f5991ef7f4df76e0ce44afb08f2c356fd3286b61de4b0d9dea5acbf0fa4b5b710a4a3269f9efaae08e377b8867de1cc5a8f217b628f4bed9a3b7565f87acfef9231b466a7692d39196aeee590aa761249545fb757042998fc39ad7ffcc2ac3d08de22c3c33d0514d86b98061c4e1eb7bcb2812c20eccaadc0e28515e13d5b526a7ab78373dc030ba18a2a22e2e1cac39a6d0973baa9306b10aa65df635aa0bb70f6997987414f68eb60412988442bf500b15f4421744a0296c6a90557531a096665176963bf1c7941bf21fac449f7a64225985d429235f350171985f0724e59092ccbd9dffd002d1d9a9f684d6a49d7b91af9af2f86970264f0d489b4ec816e154729ebc3a3e81d529a4a1b77b702e6d8684c8abceedeb11d4b8d911b0a494b15f06ba47c89b15b7ec8fc815205163c95fbe8c675cbaf5725f1df95b027574cf936bc0d5912d7d12a73344953d27897202414d57fb8cd2f904fb3bd9fe61a4694af519261a89d8cd93d2ed3823f09ff66fe0b43fe93e43a625d36b7e822f6a8f6adcfd8f060c26845b265fdb30d44d6a738ab3ab1d47bf146a5e7d16c837ffa4ebef642137666fef9fb85d09459abd30e40f76426688d6f6b14a4f382319879bcd7f52034aa2157d74cab66f0da534c758ca14646441fafba22bfd6057006613cdee4f77781c46cfda404c38dc7addc6d37473bd225b1fb92da04e10a43497adf7f59ce6d7b05ed42f7759d2d3dc6be3a359c78f5a833ec0c8e52b2def2b720e23cbadf40bb44dbc1f53d39019d8c7095d3f34ffb24babf20237faa11d4e29039613785c9321934715f2674a7f2cef0f03ce392d78aa8bdb5ed436289daa8a8f1b21393237727d914da4bbbb0633c18781b656f7712827c3185fc3d7838f61aa40924abe2f941ec1eda15bd34c9ef5037172832673c4d5da3ba185e77", 0x2000, &(0x7f0000003000)={&(0x7f0000000280)={0x50, 0x0, 0x2, {0x7, 0x26, 0x0, 0x200800, 0x9, 0x1, 0x10001, 0x1000}}, &(0x7f0000000300)={0x18, 0xfffffffffffffffe, 0x7, {0x8000000000000001}}, &(0x7f0000000340)={0x18, 0x0, 0x81, {0x1}}, &(0x7f0000002480)={0x18, 0x0, 0x9, {0x7}}, &(0x7f00000024c0)={0x18, 0x0, 0x689, {0xff}}, &(0x7f0000002500)={0x28, 0x0, 0xff, {{0x5, 0x793, 0x2, r1}}}, &(0x7f0000002540)={0x60, 0x0, 0xec9, {{0x9, 0x0, 0x5, 0x2, 0x6, 0x2, 0xac, 0x7fe}}}, &(0x7f00000025c0)={0x18, 0x0, 0x8, {0x8}}, &(0x7f0000002600)={0x13, 0xfffffffffffffffe, 0x2, {'.-\x00'}}, &(0x7f0000002640)={0x20, 0xfffffffffffffff5, 0x1, {0x0, 0x9}}, &(0x7f0000002700)={0x78, 0xfffffffffffffffe, 0xfffffffffffffff7, {0x8, 0xd9, 0x0, {0x0, 0x5, 0x7, 0x37, 0x3ff, 0x9, 0x2, 0x6, 0x7, 0x2000, 0x4, r2, r4, 0x10000}}}, &(0x7f0000002780)={0x90, 0xffffffffffffffda, 0xffffffffffff0000, {0x0, 0x0, 0x34f4, 0x7, 0x4, 0x9, {0x4, 0x400, 0x5, 0x2, 0x9, 0x400, 0x10000, 0x6, 0x1fc, 0x8000, 0x5, r2, r5, 0x1, 0x1000}}}, &(0x7f0000002840)={0xd0, 0xfffffffffffffff5, 0xffff0, [{0x3, 0x3, 0x4, 0x6, 'part'}, {0x2, 0xe592, 0x5, 0x1, 'ascii'}, {0x6, 0xffffffffffff8000, 0x5, 0x4, 'quiet'}, {0x1, 0x7, 0x5, 0x1, 'ascii'}, {0x1, 0x0, 0x1, 0x9, '*'}, {0x6, 0x3, 0x7, 0x8, '..%/$//'}]}, &(0x7f0000002a40)={0x290, 0xfffffffffffffff5, 0x1f, [{{0x4, 0x2, 0xae4, 0x8, 0xa00, 0x9, {0x2, 0xb8, 0x1, 0x8, 0x2, 0x5, 0x1, 0x599b, 0x6, 0x2000, 0x0, r6, r3, 0x100, 0x5}}, {0x6, 0x800, 0x1, 0xffff, '!'}}, {{0x6, 0x0, 0x100000000, 0x8, 0x9, 0x3, {0x5, 0xb9, 0x401, 0x7, 0x2, 0x80, 0x1, 0x40, 0x9, 0x6000, 0x5, r2, r10, 0xff, 0x1}}, {0x0, 0x0, 0x5, 0x3, 'quiet'}}, {{0x2, 0x2, 0x3, 0x68e, 0x7, 0x80000000, {0x5, 0x8, 0x7fffffffffffffff, 0x6, 0x1f, 0x7, 0x9, 0xef, 0x9, 0xc000, 0x80000000, r2, r3, 0x80000001, 0x10001}}, {0x2, 0x2672, 0x7, 0xfffffffe, '/-$-b(#'}}, {{0x2, 0x1, 0x7, 0x9, 0x2, 0x1, {0x1, 0x6, 0x9, 0xfa3b, 0x10000, 0x3, 0x7, 0x3, 0x6, 0x8000, 0x7, r11, r12, 0x8000, 0x800}}, {0x4, 0x7fff, 0x5, 0x1ff, 'quiet'}}]}, &(0x7f0000002f00)={0xa0, 0xfffffffffffffff5, 0x80000000, {{0x0, 0x0, 0x9, 0xffffffffceffec3e, 0x8, 0x6, {0x5, 0x5, 0x100000001, 0x7fff, 0x8, 0x8e, 0x1, 0x340f, 0x8c13, 0x4000, 0x4, r13, r14, 0x88c8, 0xff}}, {0x0, 0x12}}}, &(0x7f0000002fc0)={0x20, 0x0, 0x4d, {0x1ff, 0x4, 0x3}}}) [ 2018.807518] hfs: invalid gid -1 [ 2018.810920] hfs: unable to parse mount options 16:35:03 executing program 1: syz_mount_image$hfs(&(0x7f0000000240), &(0x7f0000000380)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x3, &(0x7f0000000780)=ANY=[@ANYBLOB='quiet,gid=', @ANYRESHEX, @ANYBLOB="2c2a7270653d7614866b2c75693df589299908000000450000005d38ff0c0071446a0c48dba349ba347528523876dc8d7918ecea1024ba9669ff19a9ab5e27062b1dae8d8c0eb880008164ed9d8093fdc35f282dee56df9531b6e0c94b43c314af69146a70075499da5e7f927d3c672787e3d33a6071ff2c1483a1a7cfb34131bfee72f86068d0966d", @ANYRESHEX, @ANYBLOB=',codepage=ascii,rootcontext=sysadm_u,\x00'], 0x1, 0x235, &(0x7f0000000000)="$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") [ 2018.875831] new mount options do not match the existing superblock, will be ignored [ 2018.932245] new mount options do not match the existing superblock, will be ignored [ 2018.946875] new mount options do not match the existing superblock, will be ignored [ 2018.962016] new mount options do not match the existing superblock, will be ignored 16:35:03 executing program 0: r0 = request_key(0x0, 0x0, 0x0, 0xfffffffffffffffd) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) r1 = add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000740)=@filename='./file0\x00', &(0x7f0000000780)='./file0\x00', &(0x7f0000000840)='gadgetfs\x00', 0x0, &(0x7f0000000880)='keyring\x00') perf_event_open(&(0x7f00000007c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x12c00, 0x0, 0xe5e}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) writev(0xffffffffffffffff, 0x0, 0x0) r2 = add_key(0x0, &(0x7f0000000280)={'syz', 0x3}, &(0x7f0000019a40)="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", 0x5bd, 0xfffffffffffffffd) keyctl$read(0xb, r2, &(0x7f0000000a40)=""/102400, 0x19000) keyctl$search(0xa, r2, &(0x7f00000008c0)='keyring\x00', &(0x7f0000000900)={'syz', 0x1}, 0xfffffffffffffffd) request_key(&(0x7f00000006c0)='dns_resolver\x00', &(0x7f0000000700)={'syz', 0x3}, 0x0, 0xfffffffffffffffd) r3 = add_key(&(0x7f0000000380)='id_resolver\x00', &(0x7f0000000400)={'syz', 0x3}, &(0x7f0000000440)="e09e6dda135ac7c467011f", 0xb, r0) keyctl$search(0xa, r1, 0x0, &(0x7f0000000340)={'syz', 0x1}, r3) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000140)='cpuset\x00', 0x0, 0x0) add_key$keyring(&(0x7f0000000100), &(0x7f0000000180)={'syz', 0x0}, 0x0, 0x0, r0) r4 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r5 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) open(&(0x7f00000002c0)='./file0\x00', 0x98d00, 0x8) request_key(&(0x7f0000000580)='logon\x00', 0x0, &(0x7f0000000600)='\x1f-)\x00', 0xfffffffffffffff9) add_key$fscrypt_provisioning(&(0x7f0000000480), &(0x7f00000004c0)={'syz', 0x0}, &(0x7f0000000640)=ANY=[], 0x48, r0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = openat$cgroup_int(r4, &(0x7f00000001c0)='cpuset.sched_load_balance\x00', 0x2, 0x0) dup3(r7, r4, 0x0) r8 = add_key$keyring(&(0x7f0000000540), &(0x7f0000000640)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffc) r9 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000980), 0x200000, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r5, 0x81f8943c, &(0x7f000001a000)={0x0, ""/256, 0x0, 0x0, 0x0, 0x0, ""/16, ""/16, ""/16, 0x0}) ioctl$BTRFS_IOC_SUBVOL_CREATE_V2(r6, 0x50009418, &(0x7f000001a200)={{r9}, r10, 0x2, @inherit={0x58, &(0x7f00000009c0)={0x1, 0x2, 0x8, 0x7, {0x14, 0x1000, 0x5, 0x7}, [0xffff, 0x0]}}, @subvolid=0x4}) keyctl$search(0xa, r3, 0x0, &(0x7f0000000500)={'syz', 0x0}, r8) writev(r4, &(0x7f0000000300)=[{&(0x7f00000000c0)='0', 0xcc00}, {&(0x7f00000003c0)='7', 0x1}], 0x2) [ 2018.986618] 9pnet: Insufficient options for proto=fd 16:35:03 executing program 5: r0 = request_key(0x0, 0x0, 0x0, 0xfffffffffffffffd) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) r1 = add_key$keyring(0x0, &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000740)=@filename='./file0\x00', &(0x7f0000000780)='./file0\x00', &(0x7f0000000840)='gadgetfs\x00', 0x10, &(0x7f0000000880)='keyring\x00') perf_event_open(&(0x7f00000007c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x12c00, 0x0, 0xe5e}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) writev(0xffffffffffffffff, 0x0, 0x0) r2 = add_key(&(0x7f0000000240)='big_key\x00', &(0x7f0000000280)={'syz', 0x3}, &(0x7f0000019a40)="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", 0x5bd, 0xfffffffffffffffd) keyctl$read(0xb, r2, &(0x7f0000000a40)=""/102400, 0x19000) keyctl$search(0xa, r2, &(0x7f00000008c0)='keyring\x00', &(0x7f0000000900)={'syz', 0x1}, 0xfffffffffffffffd) request_key(&(0x7f00000006c0)='dns_resolver\x00', &(0x7f0000000700)={'syz', 0x3}, &(0x7f0000000940)='\x00', 0xfffffffffffffffd) r3 = add_key(&(0x7f0000000380)='id_resolver\x00', &(0x7f0000000400)={'syz', 0x3}, &(0x7f0000000440)="e09e6dda135ac7c467011f", 0xb, r0) keyctl$search(0xa, r1, 0x0, &(0x7f0000000340)={'syz', 0x1}, r3) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000140)='cpuset\x00', 0x0, 0x0) add_key$keyring(&(0x7f0000000100), &(0x7f0000000180)={'syz', 0x0}, 0x0, 0x0, r0) r4 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r5 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) request_key(&(0x7f0000000580)='logon\x00', &(0x7f00000005c0)={'syz', 0x0}, &(0x7f0000000600)='\x1f-)\x00', 0xfffffffffffffff9) add_key$fscrypt_provisioning(&(0x7f0000000480), &(0x7f00000004c0)={'syz', 0x0}, &(0x7f0000000640)=ANY=[], 0x48, r0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = openat$cgroup_int(r4, &(0x7f00000001c0)='cpuset.sched_load_balance\x00', 0x2, 0x0) dup3(r7, r4, 0x0) add_key$keyring(&(0x7f0000000540), &(0x7f0000000640)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffc) r8 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000980), 0x200000, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r5, 0x81f8943c, &(0x7f000001a000)={0x0, ""/256, 0x0, 0x0, 0x0, 0x0, ""/16, ""/16, ""/16, 0x0}) ioctl$BTRFS_IOC_SUBVOL_CREATE_V2(r6, 0x50009418, &(0x7f000001a200)={{r8}, r9, 0x2, @inherit={0x58, &(0x7f00000009c0)={0x1, 0x2, 0x8, 0x7, {0x14, 0x1000, 0x5, 0x7, 0x4}, [0xffff, 0x3]}}, @subvolid=0x4}) writev(r4, &(0x7f0000000300)=[{&(0x7f00000000c0)='0', 0x1}, {&(0x7f00000003c0)='7', 0x1}], 0x2) 16:35:03 executing program 2: r0 = request_key(0x0, 0x0, 0x0, 0xfffffffffffffffd) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) r1 = add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000780)='./file0\x00', &(0x7f0000000840)='gadgetfs\x00', 0x0, &(0x7f0000000880)='keyring\x00') perf_event_open(&(0x7f00000007c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x12c00, 0x0, 0xe5e}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) writev(0xffffffffffffffff, 0x0, 0x0) keyctl$read(0xb, 0x0, &(0x7f0000000a40)=""/102400, 0x19000) keyctl$search(0xa, 0x0, 0x0, 0x0, 0xfffffffffffffffd) request_key(&(0x7f00000006c0)='dns_resolver\x00', &(0x7f0000000700)={'syz', 0x3}, &(0x7f0000000940)='\x00', 0xfffffffffffffffd) r2 = add_key(&(0x7f0000000380)='id_resolver\x00', 0x0, &(0x7f0000000440), 0x0, r0) keyctl$search(0xa, r1, 0x0, 0x0, r2) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000140)='cpuset\x00', 0x0, 0x0) add_key$keyring(&(0x7f0000000100), &(0x7f0000000180)={'syz', 0x0}, 0x0, 0x0, r0) r3 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r4 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) open(&(0x7f00000002c0)='./file0\x00', 0x98d00, 0x8) request_key(&(0x7f0000000580)='logon\x00', &(0x7f00000005c0)={'syz', 0x0}, &(0x7f0000000600)='\x1f-)\x00', 0xfffffffffffffff9) write$rfkill(r4, &(0x7f0000000040)={0x0, 0x0, 0x3}, 0x8) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = openat$cgroup_int(r3, &(0x7f00000001c0)='cpuset.sched_load_balance\x00', 0x2, 0x0) dup3(r6, r3, 0x0) r7 = add_key$keyring(&(0x7f0000000540), &(0x7f0000000640)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffc) r8 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000980), 0x200000, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r4, 0x81f8943c, &(0x7f000001a000)={0x0, ""/256, 0x0, 0x0, 0x0, 0x0, ""/16, ""/16, ""/16, 0x0}) ioctl$BTRFS_IOC_SUBVOL_CREATE_V2(r5, 0x50009418, &(0x7f000001a200)={{r8}, r9, 0x2, @inherit={0x58, &(0x7f00000009c0)={0x1, 0x2, 0x8, 0x7, {0x14, 0x1000, 0x5, 0x7, 0x4}, [0xffff, 0x3]}}, @subvolid=0x4}) ioctl$BTRFS_IOC_BALANCE(r5, 0x5000940c, 0x0) keyctl$search(0xa, r2, &(0x7f0000000200)='keyring\x00', &(0x7f0000000500)={'syz', 0x0}, r7) writev(r3, &(0x7f0000000300)=[{&(0x7f00000000c0)='0', 0x1}, {&(0x7f00000003c0)='7', 0x1}], 0x2) 16:35:03 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000140)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0x6e) syz_mount_image$hfs(&(0x7f0000000240), &(0x7f0000000380)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x3, &(0x7f0000000400)={[{}, {@part={'part', 0x3d, 0x10001}}, {@type={'type', 0x3d, "7614866b"}}, {@uid={'uid', 0x3d, r2}}, {@codepage={'codepage', 0x3d, 'ascii'}}], [{@rootcontext={'rootcontext', 0x3d, 'sysadm_u'}}]}, 0x1, 0x235, &(0x7f0000000000)="$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") ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000002680)={{0x1, 0x1, 0x18, r0, {r2, r3}}, '\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00'}) (async) getresgid(&(0x7f0000000100), &(0x7f0000000140)=0x0, &(0x7f00000001c0)) setgroups(0x2, &(0x7f0000000200)=[0x0, r5]) stat(&(0x7f0000000780)='./bus/file0\x00', &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0}) r7 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./bus\x00', 0x0, 0x0) (async) r8 = openat(0xffffffffffffff9c, &(0x7f0000004400)='./bus\x00', 0x1c1002, 0x0) write$binfmt_misc(r8, &(0x7f0000000180)={'syz1'}, 0x4) sendfile(r8, r7, 0x0, 0x1ffff) (async) r9 = syz_open_dev$evdev(&(0x7f00000000c0), 0x0, 0x862b01) write$char_usb(r9, &(0x7f0000000040)="e2", 0x1770) mount$9p_fd(0x0, &(0x7f0000003080)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f0000003100), 0x0, &(0x7f0000003140)={'trans=fd,', {'rfdno', 0x3d, r8}, 0x2c, {'wfdno', 0x3d, r9}, 0x2c, {[{@cache_fscache}, {@debug={'debug', 0x3d, 0x1000}}, {@aname}, {@afid={'afid', 0x3d, 0x9}}, {@access_uid={'access', 0x3d, r2}}], [{@rootcontext={'rootcontext', 0x3d, 'staff_u'}}, {@appraise_type}]}}) syz_fuse_handle_req(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000002d00)={&(0x7f0000002380)={0x50, 0x0, 0x8, {0x7, 0x21, 0x0, 0x2000011}}, 0x0, 0x0, 0x0, 0x0, &(0x7f00000024c0)={0x28, 0xfffffffffffffff5, 0xfff}, 0x0, &(0x7f0000002580)={0x18}, &(0x7f00000025c0)=ANY=[@ANYBLOB], &(0x7f0000002600)={0x20, 0x0, 0x28, {0x0, 0x14}}, &(0x7f00000026c0)={0x78, 0xfffffffffffffffe, 0x1, {0x0, 0x4, 0x0, {0x1, 0x7, 0x4799, 0x0, 0x0, 0x7ff, 0x3f, 0xfffe, 0x1, 0x0, 0x1, 0x0, 0x0, 0x4}}}, &(0x7f0000002740)={0x90, 0xfffffffffffffff5, 0x0, {0x0, 0x0, 0x3ff, 0x0, 0xffffff27, 0x404afb3e, {0x6, 0x0, 0x1, 0x6, 0x100000000, 0x0, 0x0, 0x0, 0x32, 0x0, 0xb5, 0xee00, 0x0, 0x0, 0x8}}}, 0x0, &(0x7f0000002d80)={0x2c0, 0x0, 0x4, [{{0x0, 0x0, 0x9, 0x0, 0x0, 0x0, {0x0, 0x8, 0x0, 0x0, 0x0, 0x3, 0x0, 0x2, 0x0, 0xc000, 0x0, 0xee00, 0x0, 0x0, 0x9}}, {0x0, 0xa65b, 0x28, 0x3, '^-%{{[#!]#-#&e*!-]$$.\xa9\xa6\x19\xb6\xd2(\xf3l`\xb1\xe0\xc90\xa7@/f::'}}, {{0x0, 0x3, 0x0, 0x1, 0x3ff, 0x0, {0x0, 0x0, 0x9, 0x8, 0x0, 0x219, 0x0, 0x0, 0x80000000, 0x0, 0xffff, 0xee01, 0xee01, 0x6, 0x4}}, {0x3, 0x8, 0x1, 0x0, '\''}}, {{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, {0x4, 0x20, 0x0, 0xffffffffffff8004, 0x3, 0x40, 0xfffffffe, 0xffffffff, 0x3, 0x1000, 0x7, r6, 0x0, 0x3}}, {0x3, 0x0, 0x1e, 0x80000000, '}.}##)%M\'/}}^\\.#*.{/\xfd&^@*$+((['}}, {{0x5, 0x0, 0x0, 0x1, 0x3f, 0x3, {0x6, 0x0, 0x1, 0x5, 0x0, 0x24f, 0x0, 0x0, 0x0, 0x4000, 0x0, 0x0, 0xee01, 0x1}}}]}, &(0x7f0000002c00)={0xa0, 0x0, 0x100000000, {{0x1, 0x0, 0x0, 0x1f, 0x193de2d0, 0x2, {0x0, 0x40, 0x0, 0x319, 0x0, 0xf182, 0x5, 0x0, 0x5, 0x0, 0x7, 0xee01}}, {0x0, 0x2}}}, 0x0}) (async) getresgid(&(0x7f0000000100), &(0x7f0000000140)=0x0, &(0x7f00000001c0)) setgroups(0x2, &(0x7f0000000200)=[0x0, r10]) (async) newfstatat(0xffffffffffffff9c, &(0x7f0000002940)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f00000029c0)={0x0, 0x0, 0x0, 0x0, 0x0}, 0x800) getresgid(&(0x7f0000000100), &(0x7f0000000140)=0x0, &(0x7f00000001c0)) setgroups(0x2, &(0x7f0000000200)=[0x0, r12]) (async) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000002d00)={{{@in=@private, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in6=@ipv4={""/10, ""/2, @local}}}, &(0x7f0000002e00)=0xe8) (async) newfstatat(0xffffffffffffff9c, &(0x7f0000002e40)='./file0\x00', &(0x7f0000002e80)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x0) syz_fuse_handle_req(0xffffffffffffffff, &(0x7f0000000480)="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", 0x2000, &(0x7f0000003000)={&(0x7f0000000280)={0x50, 0x0, 0x2, {0x7, 0x26, 0x0, 0x200800, 0x9, 0x1, 0x10001, 0x1000}}, &(0x7f0000000300)={0x18, 0xfffffffffffffffe, 0x7, {0x8000000000000001}}, &(0x7f0000000340)={0x18, 0x0, 0x81, {0x1}}, &(0x7f0000002480)={0x18, 0x0, 0x9, {0x7}}, &(0x7f00000024c0)={0x18, 0x0, 0x689, {0xff}}, &(0x7f0000002500)={0x28, 0x0, 0xff, {{0x5, 0x793, 0x2, r1}}}, &(0x7f0000002540)={0x60, 0x0, 0xec9, {{0x9, 0x0, 0x5, 0x2, 0x6, 0x2, 0xac, 0x7fe}}}, &(0x7f00000025c0)={0x18, 0x0, 0x8, {0x8}}, &(0x7f0000002600)={0x13, 0xfffffffffffffffe, 0x2, {'.-\x00'}}, &(0x7f0000002640)={0x20, 0xfffffffffffffff5, 0x1, {0x0, 0x9}}, &(0x7f0000002700)={0x78, 0xfffffffffffffffe, 0xfffffffffffffff7, {0x8, 0xd9, 0x0, {0x0, 0x5, 0x7, 0x37, 0x3ff, 0x9, 0x2, 0x6, 0x7, 0x2000, 0x4, r2, r4, 0x10000}}}, &(0x7f0000002780)={0x90, 0xffffffffffffffda, 0xffffffffffff0000, {0x0, 0x0, 0x34f4, 0x7, 0x4, 0x9, {0x4, 0x400, 0x5, 0x2, 0x9, 0x400, 0x10000, 0x6, 0x1fc, 0x8000, 0x5, r2, r5, 0x1, 0x1000}}}, &(0x7f0000002840)={0xd0, 0xfffffffffffffff5, 0xffff0, [{0x3, 0x3, 0x4, 0x6, 'part'}, {0x2, 0xe592, 0x5, 0x1, 'ascii'}, {0x6, 0xffffffffffff8000, 0x5, 0x4, 'quiet'}, {0x1, 0x7, 0x5, 0x1, 'ascii'}, {0x1, 0x0, 0x1, 0x9, '*'}, {0x6, 0x3, 0x7, 0x8, '..%/$//'}]}, &(0x7f0000002a40)={0x290, 0xfffffffffffffff5, 0x1f, [{{0x4, 0x2, 0xae4, 0x8, 0xa00, 0x9, {0x2, 0xb8, 0x1, 0x8, 0x2, 0x5, 0x1, 0x599b, 0x6, 0x2000, 0x0, r6, r3, 0x100, 0x5}}, {0x6, 0x800, 0x1, 0xffff, '!'}}, {{0x6, 0x0, 0x100000000, 0x8, 0x9, 0x3, {0x5, 0xb9, 0x401, 0x7, 0x2, 0x80, 0x1, 0x40, 0x9, 0x6000, 0x5, r2, r10, 0xff, 0x1}}, {0x0, 0x0, 0x5, 0x3, 'quiet'}}, {{0x2, 0x2, 0x3, 0x68e, 0x7, 0x80000000, {0x5, 0x8, 0x7fffffffffffffff, 0x6, 0x1f, 0x7, 0x9, 0xef, 0x9, 0xc000, 0x80000000, r2, r3, 0x80000001, 0x10001}}, {0x2, 0x2672, 0x7, 0xfffffffe, '/-$-b(#'}}, {{0x2, 0x1, 0x7, 0x9, 0x2, 0x1, {0x1, 0x6, 0x9, 0xfa3b, 0x10000, 0x3, 0x7, 0x3, 0x6, 0x8000, 0x7, r11, r12, 0x8000, 0x800}}, {0x4, 0x7fff, 0x5, 0x1ff, 'quiet'}}]}, &(0x7f0000002f00)={0xa0, 0xfffffffffffffff5, 0x80000000, {{0x0, 0x0, 0x9, 0xffffffffceffec3e, 0x8, 0x6, {0x5, 0x5, 0x100000001, 0x7fff, 0x8, 0x8e, 0x1, 0x340f, 0x8c13, 0x4000, 0x4, r13, r14, 0x88c8, 0xff}}, {0x0, 0x12}}}, &(0x7f0000002fc0)={0x20, 0x0, 0x4d, {0x1ff, 0x4, 0x3}}}) [ 2019.068760] hfs: uid requires an argument [ 2019.075289] hfs: invalid gid -1 [ 2019.080395] hfs: unable to parse mount options [ 2019.096396] hfs: unable to parse mount options 16:35:03 executing program 4: r0 = request_key(0x0, 0x0, 0x0, 0xfffffffffffffffd) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) r1 = add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000780)='./file0\x00', &(0x7f0000000840)='gadgetfs\x00', 0x0, &(0x7f0000000880)='keyring\x00') perf_event_open(&(0x7f00000007c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x12c00, 0x0, 0xe5e}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) writev(0xffffffffffffffff, 0x0, 0x0) keyctl$read(0xb, 0x0, &(0x7f0000000a40)=""/102400, 0x19000) keyctl$search(0xa, 0x0, 0x0, 0x0, 0xfffffffffffffffd) request_key(&(0x7f00000006c0)='dns_resolver\x00', &(0x7f0000000700)={'syz', 0x3}, &(0x7f0000000940)='\x00', 0xfffffffffffffffd) r2 = add_key(&(0x7f0000000380)='id_resolver\x00', 0x0, &(0x7f0000000440), 0x0, r0) keyctl$search(0xa, r1, 0x0, &(0x7f0000000340)={'syz', 0x1}, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000140)='cpuset\x00', 0x0, 0x0) add_key$keyring(&(0x7f0000000100), &(0x7f0000000180)={'syz', 0x0}, 0x0, 0x0, r0) r3 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r4 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) open(&(0x7f00000002c0)='./file0\x00', 0x98d00, 0x8) request_key(&(0x7f0000000580)='logon\x00', &(0x7f00000005c0)={'syz', 0x0}, &(0x7f0000000600)='\x1f-)\x00', 0xfffffffffffffff9) write$rfkill(r4, &(0x7f0000000040)={0x0, 0x0, 0x3}, 0x8) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = openat$cgroup_int(r3, &(0x7f00000001c0)='cpuset.sched_load_balance\x00', 0x2, 0x0) dup3(r6, r3, 0x0) r7 = add_key$keyring(&(0x7f0000000540), &(0x7f0000000640)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffc) r8 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000980), 0x200000, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r4, 0x81f8943c, &(0x7f000001a000)={0x0, ""/256, 0x0, 0x0, 0x0, 0x0, ""/16, ""/16, ""/16, 0x0}) ioctl$BTRFS_IOC_SUBVOL_CREATE_V2(r5, 0x50009418, &(0x7f000001a200)={{r8}, r9, 0x2, @inherit={0x58, &(0x7f00000009c0)={0x1, 0x2, 0x8, 0x7, {0x14, 0x1000, 0x5, 0x7, 0x4}, [0xffff, 0x3]}}, @subvolid=0x4}) ioctl$BTRFS_IOC_BALANCE(r5, 0x5000940c, 0x0) keyctl$search(0xa, r2, &(0x7f0000000200)='keyring\x00', &(0x7f0000000500)={'syz', 0x0}, r7) writev(r3, &(0x7f0000000300)=[{&(0x7f00000000c0)='0', 0x1}, {&(0x7f00000003c0)='7', 0x1}], 0x2) [ 2019.119510] new mount options do not match the existing superblock, will be ignored 16:35:03 executing program 0: r0 = request_key(0x0, 0x0, 0x0, 0xfffffffffffffffd) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) r1 = add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000740)=@filename='./file0\x00', &(0x7f0000000780)='./file0\x00', &(0x7f0000000840)='gadgetfs\x00', 0x0, &(0x7f0000000880)='keyring\x00') perf_event_open(&(0x7f00000007c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x12c00, 0x0, 0xe5e}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) writev(0xffffffffffffffff, 0x0, 0x0) r2 = add_key(0x0, &(0x7f0000000280)={'syz', 0x3}, &(0x7f0000019a40)="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", 0x5bd, 0xfffffffffffffffd) keyctl$read(0xb, r2, &(0x7f0000000a40)=""/102400, 0x19000) keyctl$search(0xa, r2, &(0x7f00000008c0)='keyring\x00', &(0x7f0000000900)={'syz', 0x1}, 0xfffffffffffffffd) request_key(&(0x7f00000006c0)='dns_resolver\x00', &(0x7f0000000700)={'syz', 0x3}, 0x0, 0xfffffffffffffffd) r3 = add_key(&(0x7f0000000380)='id_resolver\x00', &(0x7f0000000400)={'syz', 0x3}, &(0x7f0000000440)="e09e6dda135ac7c467011f", 0xb, r0) keyctl$search(0xa, r1, 0x0, &(0x7f0000000340)={'syz', 0x1}, r3) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000140)='cpuset\x00', 0x0, 0x0) add_key$keyring(&(0x7f0000000100), &(0x7f0000000180)={'syz', 0x0}, 0x0, 0x0, r0) r4 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r5 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) open(&(0x7f00000002c0)='./file0\x00', 0x98d00, 0x8) request_key(&(0x7f0000000580)='logon\x00', 0x0, &(0x7f0000000600)='\x1f-)\x00', 0xfffffffffffffff9) add_key$fscrypt_provisioning(&(0x7f0000000480), &(0x7f00000004c0)={'syz', 0x0}, &(0x7f0000000640)=ANY=[], 0x48, r0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = openat$cgroup_int(r4, &(0x7f00000001c0)='cpuset.sched_load_balance\x00', 0x2, 0x0) dup3(r7, r4, 0x0) r8 = add_key$keyring(&(0x7f0000000540), &(0x7f0000000640)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffc) r9 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000980), 0x200000, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r5, 0x81f8943c, &(0x7f000001a000)={0x0, ""/256, 0x0, 0x0, 0x0, 0x0, ""/16, ""/16, ""/16, 0x0}) ioctl$BTRFS_IOC_SUBVOL_CREATE_V2(r6, 0x50009418, &(0x7f000001a200)={{r9}, r10, 0x2, @inherit={0x58, &(0x7f00000009c0)={0x1, 0x2, 0x8, 0x7, {0x14, 0x1000, 0x5, 0x7}, [0xffff, 0x0]}}, @subvolid=0x4}) keyctl$search(0xa, r3, 0x0, &(0x7f0000000500)={'syz', 0x0}, r8) writev(r4, &(0x7f0000000300)=[{&(0x7f00000000c0)='0', 0xcd00}, {&(0x7f00000003c0)='7', 0x1}], 0x2) 16:35:03 executing program 1: syz_mount_image$hfs(&(0x7f0000000240), &(0x7f0000000380)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x3, &(0x7f0000000780)=ANY=[@ANYBLOB='quiet,gid=', @ANYRESHEX, @ANYBLOB="2c2a7270653d7614866b2c75693df589299908000000450000005d38ff0c0071446a0c48dba349ba347528523876dc8d7918ecea1024ba9669ff19a9ab5e27062b1dae8d8c0eb880008164ed9d8093fdc35f282dee56df9531b6e0c94b43c314af69146a70075499da5e7f927d3c672787e3d33a6071ff2c1483a1a7cfb34131bfee72f86068d0966d", @ANYRESHEX, @ANYBLOB=',codepage=ascii,rootcontext=sysadm_u,\x00'], 0x1, 0x235, &(0x7f0000000000)="$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") [ 2019.204978] new mount options do not match the existing superblock, will be ignored [ 2019.223034] new mount options do not match the existing superblock, will be ignored 16:35:03 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000140)={0x0, 0x0}, &(0x7f0000cab000)=0x6e) syz_mount_image$hfs(&(0x7f0000000240), &(0x7f0000000380)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x3, &(0x7f0000000480)=ANY=[@ANYBLOB="71756965742c706172743d3078303030303030303030303031303030312c747970653d7614866b2c7569643d", @ANYRESHEX=r1, @ANYBLOB="2c636f6465706167653d61736369692c726f6f74636f6e746578743d73797361646d5f752c009828c0e0f966f5026d621d247ff1605dcd9c1b4f2218a111f2df750a3456f9396d20602ac293ba8eed5fe06900b7db0004a472ffd0566fbaaf915cf37b716113d973b6670e66fbddafcae1b6aef50c873fb40beb1ec8a8aa0432fee17e2c1a43352e8509313f812d3ab44cb17f659e16ee885b2bdedafa4765d1e508ea558c5d155e4a77bfe1bf33513e665e788476898bd45b4d412e810703ab0c7dccbc3baf3dc490d83a1957903e09d0115298c03f42e31aa8da7c229f09"], 0x1, 0x235, &(0x7f0000000000)="$eJzs3c9qE1EUx/HfvYkabanTPyK4rBZcSVs34kaQPIQrUZsIxVBBK6grcS0+gHtfwYdwJb6Arlz5ANmN3DM3zTRmMmk1ubT9fiBh2rln5pzOTO89gVIBOLPut398vv0rvJzUUEPSXclLaklNSVd0tfVqb393v9ftTDpQwyLCy6mIdH+N2dnrjgsNcRYRZeGrphbL38Ns5Hme/0ydBJKzp38ML12IT6ftb809s9l4lzqBxFxffb3WUuo8AABpxfnfx3l+Ma7fvZc24rR/qub/fuoEEivN/9Zl5S5c38u2a9jvWQsX9vtBl3icc51XcWcdWmC6uq7ScvEXn+72urd2nvc6Xu91LyoNW7P3TnHrDtRkuz6mN53g+LUvWA3nQg3bFfmv/t8z1nNf3Tf30GX6pM7B+q+Zu3CZ7EplI1eqyH+z+ohWZVaMqqhy2U5yLZ4hqqmyNb4j0eCOWtbhDwiyujwtamUkqqhuqyZqdWzUdk3U2mjU8G6ujpw199E9cOv6rS9ql9b/Pvy0NzTNkxnG2Mh4Z0ysp2kjsykS80cqA//mg57ojpZevnn77HGv133BBhtssHGwkfoXFOZheNFTZ4JEwrrLFf1fqV/ZtBYpvGUT1ul53cFLR9yq6A1W7P3SkTq4heoObtqe6/pN6cb0Z8xinqeEa+u7HvH5PwAAAAAAAAAAAAAAAAAAwEkzjz8nSF0jAAAAAAAAAAAAAAAAAAAAAAAnHf//Fzi7/gQAAP//6oSCGA==") [ 2019.271435] hfs: uid requires an argument [ 2019.283485] hfs: unable to parse mount options [ 2019.297313] 9pnet: Insufficient options for proto=fd 16:35:03 executing program 5: r0 = request_key(0x0, 0x0, 0x0, 0xfffffffffffffffd) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) r1 = add_key$keyring(0x0, &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000740)=@filename='./file0\x00', &(0x7f0000000780)='./file0\x00', &(0x7f0000000840)='gadgetfs\x00', 0x10, &(0x7f0000000880)='keyring\x00') perf_event_open(&(0x7f00000007c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0xe5e}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) writev(0xffffffffffffffff, 0x0, 0x0) r2 = add_key(&(0x7f0000000240)='big_key\x00', &(0x7f0000000280)={'syz', 0x3}, &(0x7f0000019a40)="4195738ac28ccd83aa93c4ecacdaca3d34104be4cc5531c4091facf7f777321e84e49e039122a2d1cf7fea6a02aac8944c27ba038156bc10c0f7a6b26fbf382f67959d856600881f0e692c60f12ace775aab8d775dc2586454918a0db1811f5e8086f1a9805166c870b8387d380d5115af5841dad21f629e05f4b51e362c46b58a7dc2855c5189bff60d02c05ba67c297aa0ad05b93b1ee2fffae13fe5764d4e2a214e15093841b1551d518a669fa94e8918bfdd6573d5c0275a9b91ddb843775f78574891e03697f6ca290be6599b671093898a82e7905ed7c7fd8e8b422ebf12e5b543885596fc5c305d497407ffe73bd543f79c983f0807ae7e13fb5053fd7a07dddf8ec739418b59d67219f008f540161cec3bfd1b3097aad497248b221d572a9eb1bad6d921fcdcfdfacf8d1e392635168747056ec8a3fc45b3027293a517d50ea789294f132f2392919dc81ba5eb02e27e116cc300000000b6c0e39688425a3cb17d35f4b1eec0a37193f233c6655c6f40c09b4ea04c8880a431a8274127d56c3c8cab73a5fcf2b604b83658344e323eeedb0b283b0b3616236e904a42fed9fc8f4c131b047bfd5d7586e6a28032a4584fd5933472ce49dfdc99976166bb37eb1679b22249a222ffab17948dd6cc6f23f42ecd32a980ab8fc7c7d2da1a91f1db1187066c144bcbdb46240b7ef7ed28da4a358295b6104e4c60b09654e79f766e19e44174e94fa41d358d3dd901c060a06a388727be1092a37c0015695b1363ed018e724947983aa6b5974daf6388547cdacbd44a1282c3b9130cbf9536c29a523980b9e4328d1a7c0de8b636d7dfdee36434125948b1d802d5d143645c3a5f8da50adeef6e4f715361908a20cb998d3e0907aef9fdd19bb79be8c510b8aa04600163636c1d1f36f3834ffa3c7369e1d8ed9348bc339da2a525c4f165c0caebb7a4ee632a37a43897084e3c07a5ed8b505a51a4777095060b0ff6a6442206244dd9a13b5ba52b07c718e9eaad10befd12be35dc50283d584035d75e4917548ff58045b88d29b6826ceb6d44fb54ba3ef7944da6e86c0f2d0bc0bd725aa9193b3de4837634ead361d9b2ff5ae4de005f53d48cba029b43eb35fbedd0b5397918a9324b6e1f1d88399d8ad69b7d79e89ded6fe81fd1200f95c831f8c60dc1483e97052f61d0a643df0c2e1b0ba7d00b0692efd1bfc1ece10c2e785e3cb3b0dfbdbd722b6e53e5a2884b1cc5d939a572564bc8a2260e8718230878edb3a877f5c585f4373ef8e0e1cff5dacf96862906ff37eec18ba706d22b101965eaf5f5e29f544977896117e25ceb572f3443eddf9651c2ac69c911b21fd69e59ee57ebe4c549ff2a3dcd904656663039789f022a6caa7f76640e75efdba82dabacf8c0112bd4e62a3a9e69a9824c1af45cf86b307d9749937dd08b6ef49860cda5da7bb886f92db7cd43a869aa646a6da291a75ff28c4d728b1377b8e80233b33e724a60c0a015ec75cd86af04a4bd43964d8f7ba781a99d0cd7ff7e189fc91801655cb1b60e6bc3af747655341deceadbed3d76bdfae92389cc87c417e0f58f3fbcc56ff347467a20773146a81090ff42bbb5383d74108028f5fa532c647746054c312e2e4c085f58d93bec6da7c2bfd99fc59c1631cc71110acc2bf352b994e2a246be3cc1d240fa0c60eb04b92a9673d2ac2bba7f322ddbbd74712b0ec459050586523bd0b0505174a701206e47f2bb7fe20caf5ed73d33447b89432802e7d4606512e217aedf78c871e10cfbdf202efbf3fd8495b6be18cde726dc1fefc01921e9d1f15c8301376c33b5a698d0f7d5f317835d74857e121fe820d93f6b757c9938ec81f9b19a4b0d4ed35d1309fbcb285cf7717e9e27aaaba9d7d742fcfd786eacd993fb119e1d52908ca7ce2135046fa95805704c6258fd1b5fc1434af7ab99609820d73627080d43bcaeeb42ce423e17aa4df3a6994ead3133e2ecfbc6fa308c6b71b78cbab273641970b49e15d0dbe7aea716eaf6cf40f90d0d7d3d8bf1d165d25d5f6f6376416b9dd13731c5c2fdadee8e48c76430cccb21d8e6c659", 0x5bd, 0xfffffffffffffffd) keyctl$read(0xb, r2, &(0x7f0000000a40)=""/102400, 0x19000) keyctl$search(0xa, r2, &(0x7f00000008c0)='keyring\x00', &(0x7f0000000900)={'syz', 0x1}, 0xfffffffffffffffd) request_key(&(0x7f00000006c0)='dns_resolver\x00', &(0x7f0000000700)={'syz', 0x3}, &(0x7f0000000940)='\x00', 0xfffffffffffffffd) r3 = add_key(&(0x7f0000000380)='id_resolver\x00', &(0x7f0000000400)={'syz', 0x3}, &(0x7f0000000440)="e09e6dda135ac7c467011f", 0xb, r0) keyctl$search(0xa, r1, 0x0, &(0x7f0000000340)={'syz', 0x1}, r3) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000140)='cpuset\x00', 0x0, 0x0) add_key$keyring(&(0x7f0000000100), &(0x7f0000000180)={'syz', 0x0}, 0x0, 0x0, r0) r4 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r5 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) request_key(&(0x7f0000000580)='logon\x00', &(0x7f00000005c0)={'syz', 0x0}, &(0x7f0000000600)='\x1f-)\x00', 0xfffffffffffffff9) add_key$fscrypt_provisioning(&(0x7f0000000480), &(0x7f00000004c0)={'syz', 0x0}, &(0x7f0000000640)=ANY=[], 0x48, r0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = openat$cgroup_int(r4, &(0x7f00000001c0)='cpuset.sched_load_balance\x00', 0x2, 0x0) dup3(r7, r4, 0x0) add_key$keyring(&(0x7f0000000540), &(0x7f0000000640)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffc) r8 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000980), 0x200000, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r5, 0x81f8943c, &(0x7f000001a000)={0x0, ""/256, 0x0, 0x0, 0x0, 0x0, ""/16, ""/16, ""/16, 0x0}) ioctl$BTRFS_IOC_SUBVOL_CREATE_V2(r6, 0x50009418, &(0x7f000001a200)={{r8}, r9, 0x2, @inherit={0x58, &(0x7f00000009c0)={0x1, 0x2, 0x8, 0x7, {0x14, 0x1000, 0x5, 0x7, 0x4}, [0xffff, 0x3]}}, @subvolid=0x4}) writev(r4, &(0x7f0000000300)=[{&(0x7f00000000c0)='0', 0x1}, {&(0x7f00000003c0)='7', 0x1}], 0x2) [ 2019.410426] new mount options do not match the existing superblock, will be ignored 16:35:03 executing program 2: r0 = request_key(0x0, 0x0, 0x0, 0xfffffffffffffffd) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) r1 = add_key$keyring(0x0, &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000740)=@filename='./file0\x00', &(0x7f0000000780)='./file0\x00', &(0x7f0000000840)='gadgetfs\x00', 0x10, &(0x7f0000000880)='keyring\x00') perf_event_open(&(0x7f00000007c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x12c00, 0x0, 0xe5e}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) writev(0xffffffffffffffff, 0x0, 0x0) r2 = add_key(&(0x7f0000000240)='big_key\x00', &(0x7f0000000280)={'syz', 0x3}, &(0x7f0000019a40)="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", 0x5bd, 0xfffffffffffffffd) keyctl$read(0xb, r2, &(0x7f0000000a40)=""/102400, 0x19000) keyctl$search(0xa, r2, &(0x7f00000008c0)='keyring\x00', &(0x7f0000000900)={'syz', 0x1}, 0xfffffffffffffffd) request_key(&(0x7f00000006c0)='dns_resolver\x00', &(0x7f0000000700)={'syz', 0x3}, &(0x7f0000000940)='\x00', 0xfffffffffffffffd) r3 = add_key(&(0x7f0000000380)='id_resolver\x00', &(0x7f0000000400)={'syz', 0x3}, &(0x7f0000000440)="e09e6dda135ac7c467011f", 0xb, r0) keyctl$search(0xa, r1, 0x0, &(0x7f0000000340)={'syz', 0x1}, r3) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000140)='cpuset\x00', 0x0, 0x0) add_key$keyring(&(0x7f0000000100), &(0x7f0000000180)={'syz', 0x0}, 0x0, 0x0, r0) r4 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r5 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) request_key(&(0x7f0000000580)='logon\x00', &(0x7f00000005c0)={'syz', 0x0}, &(0x7f0000000600)='\x1f-)\x00', 0xfffffffffffffff9) add_key$fscrypt_provisioning(&(0x7f0000000480), &(0x7f00000004c0)={'syz', 0x0}, &(0x7f0000000640)=ANY=[], 0x48, r0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = openat$cgroup_int(r4, &(0x7f00000001c0)='cpuset.sched_load_balance\x00', 0x2, 0x0) dup3(r7, r4, 0x0) add_key$keyring(&(0x7f0000000540), &(0x7f0000000640)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffc) r8 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000980), 0x200000, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r5, 0x81f8943c, &(0x7f000001a000)={0x0, ""/256, 0x0, 0x0, 0x0, 0x0, ""/16, ""/16, ""/16, 0x0}) ioctl$BTRFS_IOC_SUBVOL_CREATE_V2(r6, 0x50009418, &(0x7f000001a200)={{r8}, r9, 0x2, @inherit={0x58, &(0x7f00000009c0)={0x1, 0x2, 0x8, 0x7, {0x14, 0x1000, 0x5, 0x7, 0x4}, [0xffff, 0x3]}}, @subvolid=0x4}) writev(r4, &(0x7f0000000300)=[{&(0x7f00000000c0)='0', 0x1}, {&(0x7f00000003c0)='7', 0x1}], 0x2) [ 2019.464949] new mount options do not match the existing superblock, will be ignored 16:35:03 executing program 4: r0 = request_key(0x0, 0x0, 0x0, 0xfffffffffffffffd) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) r1 = add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000780)='./file0\x00', &(0x7f0000000840)='gadgetfs\x00', 0x0, &(0x7f0000000880)='keyring\x00') perf_event_open(&(0x7f00000007c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x12c00, 0x0, 0xe5e}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) writev(0xffffffffffffffff, 0x0, 0x0) keyctl$read(0xb, 0x0, &(0x7f0000000a40)=""/102400, 0x19000) keyctl$search(0xa, 0x0, 0x0, 0x0, 0xfffffffffffffffd) request_key(&(0x7f00000006c0)='dns_resolver\x00', &(0x7f0000000700)={'syz', 0x3}, &(0x7f0000000940)='\x00', 0xfffffffffffffffd) r2 = add_key(&(0x7f0000000380)='id_resolver\x00', 0x0, &(0x7f0000000440), 0x0, r0) keyctl$search(0xa, r1, 0x0, &(0x7f0000000340)={'syz', 0x1}, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000140)='cpuset\x00', 0x0, 0x0) add_key$keyring(&(0x7f0000000100), &(0x7f0000000180)={'syz', 0x0}, 0x0, 0x0, r0) r3 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r4 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) open(&(0x7f00000002c0)='./file0\x00', 0x98d00, 0x8) request_key(&(0x7f0000000580)='logon\x00', &(0x7f00000005c0)={'syz', 0x0}, &(0x7f0000000600)='\x1f-)\x00', 0xfffffffffffffff9) write$rfkill(r4, &(0x7f0000000040)={0x0, 0x0, 0x3}, 0x8) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = openat$cgroup_int(r3, &(0x7f00000001c0)='cpuset.sched_load_balance\x00', 0x2, 0x0) dup3(r6, r3, 0x0) r7 = add_key$keyring(&(0x7f0000000540), &(0x7f0000000640)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffc) r8 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000980), 0x200000, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r4, 0x81f8943c, &(0x7f000001a000)={0x0, ""/256, 0x0, 0x0, 0x0, 0x0, ""/16, ""/16, ""/16, 0x0}) ioctl$BTRFS_IOC_SUBVOL_CREATE_V2(r5, 0x50009418, &(0x7f000001a200)={{r8}, r9, 0x2, @inherit={0x58, &(0x7f00000009c0)={0x1, 0x2, 0x8, 0x7, {0x14, 0x1000, 0x5, 0x7, 0x4}, [0xffff, 0x3]}}, @subvolid=0x4}) ioctl$BTRFS_IOC_BALANCE(r5, 0x5000940c, 0x0) keyctl$search(0xa, r2, &(0x7f0000000200)='keyring\x00', &(0x7f0000000500)={'syz', 0x0}, r7) writev(r3, &(0x7f0000000300)=[{&(0x7f00000000c0)='0', 0x1}, {&(0x7f00000003c0)='7', 0x1}], 0x2) [ 2019.594003] hfs: invalid gid -1 [ 2019.598202] hfs: unable to parse mount options [ 2019.605782] hfs: uid requires an argument 16:35:03 executing program 1: syz_mount_image$hfs(&(0x7f0000000240), &(0x7f0000000380)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x3, &(0x7f0000000780)=ANY=[@ANYBLOB='quiet,gid=', @ANYRESHEX, @ANYBLOB="2c2a7270653d7614866b2c75693df589299908000000450000005d38ff0c0071446a0c48dba349ba347528523876dc8d7918ecea1024ba9669ff19a9ab5e27062b1dae8d8c0eb880008164ed9d8093fdc35f282dee56df9531b6e0c94b43c314af69146a70075499da5e7f927d3c672787e3d33a6071ff2c1483a1a7cfb34131bfee72f86068d0966d", @ANYRESHEX, @ANYBLOB=',codepage=ascii,rootcontext=sysadm_u,\x00'], 0x1, 0x235, &(0x7f0000000000)="$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") 16:35:03 executing program 0: r0 = request_key(0x0, 0x0, 0x0, 0xfffffffffffffffd) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) r1 = add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000740)=@filename='./file0\x00', &(0x7f0000000780)='./file0\x00', &(0x7f0000000840)='gadgetfs\x00', 0x0, &(0x7f0000000880)='keyring\x00') perf_event_open(&(0x7f00000007c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x12c00, 0x0, 0xe5e}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) writev(0xffffffffffffffff, 0x0, 0x0) r2 = add_key(0x0, &(0x7f0000000280)={'syz', 0x3}, &(0x7f0000019a40)="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", 0x5bd, 0xfffffffffffffffd) keyctl$read(0xb, r2, &(0x7f0000000a40)=""/102400, 0x19000) keyctl$search(0xa, r2, &(0x7f00000008c0)='keyring\x00', &(0x7f0000000900)={'syz', 0x1}, 0xfffffffffffffffd) request_key(&(0x7f00000006c0)='dns_resolver\x00', &(0x7f0000000700)={'syz', 0x3}, 0x0, 0xfffffffffffffffd) r3 = add_key(&(0x7f0000000380)='id_resolver\x00', &(0x7f0000000400)={'syz', 0x3}, &(0x7f0000000440)="e09e6dda135ac7c467011f", 0xb, r0) keyctl$search(0xa, r1, 0x0, &(0x7f0000000340)={'syz', 0x1}, r3) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000140)='cpuset\x00', 0x0, 0x0) add_key$keyring(&(0x7f0000000100), &(0x7f0000000180)={'syz', 0x0}, 0x0, 0x0, r0) r4 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r5 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) open(&(0x7f00000002c0)='./file0\x00', 0x98d00, 0x8) request_key(&(0x7f0000000580)='logon\x00', 0x0, &(0x7f0000000600)='\x1f-)\x00', 0xfffffffffffffff9) add_key$fscrypt_provisioning(&(0x7f0000000480), &(0x7f00000004c0)={'syz', 0x0}, &(0x7f0000000640)=ANY=[], 0x48, r0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = openat$cgroup_int(r4, &(0x7f00000001c0)='cpuset.sched_load_balance\x00', 0x2, 0x0) dup3(r7, r4, 0x0) r8 = add_key$keyring(&(0x7f0000000540), &(0x7f0000000640)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffc) r9 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000980), 0x200000, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r5, 0x81f8943c, &(0x7f000001a000)={0x0, ""/256, 0x0, 0x0, 0x0, 0x0, ""/16, ""/16, ""/16, 0x0}) ioctl$BTRFS_IOC_SUBVOL_CREATE_V2(r6, 0x50009418, &(0x7f000001a200)={{r9}, r10, 0x2, @inherit={0x58, &(0x7f00000009c0)={0x1, 0x2, 0x8, 0x7, {0x14, 0x1000, 0x5, 0x7}, [0xffff, 0x0]}}, @subvolid=0x4}) keyctl$search(0xa, r3, 0x0, &(0x7f0000000500)={'syz', 0x0}, r8) writev(r4, &(0x7f0000000300)=[{&(0x7f00000000c0)='0', 0xce00}, {&(0x7f00000003c0)='7', 0x1}], 0x2) [ 2019.639132] hfs: unable to parse mount options [ 2019.648834] new mount options do not match the existing superblock, will be ignored 16:35:03 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000140)={0x0, 0x0}, &(0x7f0000cab000)=0x6e) syz_mount_image$hfs(&(0x7f0000000240), &(0x7f0000000380)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x3, &(0x7f0000000480)=ANY=[@ANYBLOB="71756965742c706172743d3078303030303030303030303031303030312c747970653d7614866b2c7569643d", @ANYRESHEX=r1, @ANYBLOB="2c636f6465706167653d61736369692c726f6f74636f6e746578743d73797361646d5f752c009828c0e0f966f5026d621d247ff1605dcd9c1b4f2218a111f2df750a3456f9396d20602ac293ba8eed5fe06900b7db0004a472ffd0566fbaaf915cf37b716113d973b6670e66fbddafcae1b6aef50c873fb40beb1ec8a8aa0432fee17e2c1a43352e8509313f812d3ab44cb17f659e16ee885b2bdedafa4765d1e508ea558c5d155e4a77bfe1bf33513e665e788476898bd45b4d412e810703ab0c7dccbc3baf3dc490d83a1957903e09d0115298c03f42e31aa8da7c229f09"], 0x1, 0x235, &(0x7f0000000000)="$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") [ 2019.716435] new mount options do not match the existing superblock, will be ignored [ 2019.742526] new mount options do not match the existing superblock, will be ignored 16:35:03 executing program 5: r0 = request_key(0x0, 0x0, 0x0, 0xfffffffffffffffd) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) r1 = add_key$keyring(0x0, &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000740)=@filename='./file0\x00', &(0x7f0000000780)='./file0\x00', &(0x7f0000000840)='gadgetfs\x00', 0x10, &(0x7f0000000880)='keyring\x00') perf_event_open(&(0x7f00000007c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0xe5e}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) writev(0xffffffffffffffff, 0x0, 0x0) r2 = add_key(&(0x7f0000000240)='big_key\x00', &(0x7f0000000280)={'syz', 0x3}, &(0x7f0000019a40)="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", 0x5bd, 0xfffffffffffffffd) keyctl$read(0xb, r2, &(0x7f0000000a40)=""/102400, 0x19000) keyctl$search(0xa, r2, &(0x7f00000008c0)='keyring\x00', &(0x7f0000000900)={'syz', 0x1}, 0xfffffffffffffffd) request_key(&(0x7f00000006c0)='dns_resolver\x00', &(0x7f0000000700)={'syz', 0x3}, &(0x7f0000000940)='\x00', 0xfffffffffffffffd) r3 = add_key(&(0x7f0000000380)='id_resolver\x00', &(0x7f0000000400)={'syz', 0x3}, &(0x7f0000000440)="e09e6dda135ac7c467011f", 0xb, r0) keyctl$search(0xa, r1, 0x0, &(0x7f0000000340)={'syz', 0x1}, r3) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000140)='cpuset\x00', 0x0, 0x0) add_key$keyring(&(0x7f0000000100), &(0x7f0000000180)={'syz', 0x0}, 0x0, 0x0, r0) r4 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r5 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) request_key(&(0x7f0000000580)='logon\x00', &(0x7f00000005c0)={'syz', 0x0}, &(0x7f0000000600)='\x1f-)\x00', 0xfffffffffffffff9) add_key$fscrypt_provisioning(&(0x7f0000000480), &(0x7f00000004c0)={'syz', 0x0}, &(0x7f0000000640)=ANY=[], 0x48, r0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = openat$cgroup_int(r4, &(0x7f00000001c0)='cpuset.sched_load_balance\x00', 0x2, 0x0) dup3(r7, r4, 0x0) add_key$keyring(&(0x7f0000000540), &(0x7f0000000640)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffc) r8 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000980), 0x200000, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r5, 0x81f8943c, &(0x7f000001a000)={0x0, ""/256, 0x0, 0x0, 0x0, 0x0, ""/16, ""/16, ""/16, 0x0}) ioctl$BTRFS_IOC_SUBVOL_CREATE_V2(r6, 0x50009418, &(0x7f000001a200)={{r8}, r9, 0x2, @inherit={0x58, &(0x7f00000009c0)={0x1, 0x2, 0x8, 0x7, {0x14, 0x1000, 0x5, 0x7, 0x4}, [0xffff, 0x3]}}, @subvolid=0x4}) writev(r4, &(0x7f0000000300)=[{&(0x7f00000000c0)='0', 0x1}, {&(0x7f00000003c0)='7', 0x1}], 0x2) 16:35:03 executing program 2: r0 = request_key(0x0, 0x0, 0x0, 0xfffffffffffffffd) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) perf_event_open(&(0x7f00000007c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0xe5e}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) keyctl$read(0xb, 0x0, &(0x7f0000000a40)=""/102400, 0x19000) keyctl$search(0xa, 0x0, &(0x7f00000008c0)='keyring\x00', &(0x7f0000000900)={'syz', 0x1}, 0xfffffffffffffffd) request_key(&(0x7f00000006c0)='dns_resolver\x00', &(0x7f0000000700)={'syz', 0x3}, &(0x7f0000000940)='\x00', 0xfffffffffffffffd) add_key(0x0, &(0x7f0000000400)={'syz', 0x3}, &(0x7f0000000440), 0x0, r0) keyctl$search(0xa, 0x0, 0x0, &(0x7f0000000340)={'syz', 0x1}, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000140)='cpuset\x00', 0x0, 0x0) add_key$keyring(&(0x7f0000000100), 0x0, 0x0, 0x0, r0) r1 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) request_key(0x0, &(0x7f00000005c0)={'syz', 0x0}, 0x0, 0xfffffffffffffff9) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = openat$cgroup_int(r1, &(0x7f00000001c0)='cpuset.sched_load_balance\x00', 0x2, 0x0) dup3(r3, r1, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x200000, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f000001a000)={0x0, ""/256, 0x0, 0x0, 0x0, 0x0, ""/16, ""/16, ""/16, 0x0}) ioctl$BTRFS_IOC_SUBVOL_CREATE_V2(r2, 0x50009418, &(0x7f000001a200)={{}, r4, 0x2, @inherit={0x58, &(0x7f00000009c0)={0x1, 0x2, 0x8, 0x0, {0x0, 0x0, 0x0, 0x0, 0x4}, [0x0, 0x0]}}, @subvolid=0x4}) ioctl$BTRFS_IOC_BALANCE(0xffffffffffffffff, 0x5000940c, 0x0) keyctl$search(0xa, 0x0, &(0x7f0000000200)='keyring\x00', &(0x7f0000000500)={'syz', 0x0}, 0x0) writev(r1, &(0x7f0000000300)=[{&(0x7f00000000c0)='0', 0x1}, {&(0x7f00000003c0)}], 0x2) (fail_nth: 1) [ 2019.845859] new mount options do not match the existing superblock, will be ignored [ 2019.865264] hfs: uid requires an argument [ 2019.869438] hfs: unable to parse mount options 16:35:04 executing program 1: syz_mount_image$hfs(&(0x7f0000000240), &(0x7f0000000380)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x3, &(0x7f0000000780)=ANY=[@ANYBLOB='quiet,gid=', @ANYRESHEX, @ANYBLOB="2c2a7270653d7614866b2c75693df589299908000000450000005d38ff0c0071446a0c48dba349ba347528523876dc8d7918ecea1024ba9669ff19a9ab5e27062b1dae8d8c0eb880008164ed9d8093fdc35f282dee56df9531b6e0c94b43c314af69146a70075499da5e7f927d3c672787e3d33a6071ff2c1483a1a7cfb34131bfee72f86068d0966d", @ANYRESHEX, @ANYBLOB=',codepage=ascii,rootcontext=sysadm_u,\x00'], 0x1, 0x235, &(0x7f0000000000)="$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") 16:35:04 executing program 4: r0 = request_key(0x0, 0x0, 0x0, 0xfffffffffffffffd) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) r1 = add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000780)='./file0\x00', &(0x7f0000000840)='gadgetfs\x00', 0x0, &(0x7f0000000880)='keyring\x00') perf_event_open(&(0x7f00000007c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x12c00, 0x0, 0xe5e}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) writev(0xffffffffffffffff, 0x0, 0x0) keyctl$read(0xb, 0x0, &(0x7f0000000a40)=""/102400, 0x19000) keyctl$search(0xa, 0x0, 0x0, 0x0, 0xfffffffffffffffd) request_key(&(0x7f00000006c0)='dns_resolver\x00', &(0x7f0000000700)={'syz', 0x3}, &(0x7f0000000940)='\x00', 0xfffffffffffffffd) r2 = add_key(&(0x7f0000000380)='id_resolver\x00', 0x0, &(0x7f0000000440), 0x0, r0) keyctl$search(0xa, r1, 0x0, &(0x7f0000000340)={'syz', 0x1}, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000140)='cpuset\x00', 0x0, 0x0) add_key$keyring(&(0x7f0000000100), &(0x7f0000000180)={'syz', 0x0}, 0x0, 0x0, r0) r3 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r4 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) open(&(0x7f00000002c0)='./file0\x00', 0x98d00, 0x8) request_key(&(0x7f0000000580)='logon\x00', &(0x7f00000005c0)={'syz', 0x0}, &(0x7f0000000600)='\x1f-)\x00', 0xfffffffffffffff9) write$rfkill(r4, &(0x7f0000000040)={0x0, 0x0, 0x3}, 0x8) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = openat$cgroup_int(r3, &(0x7f00000001c0)='cpuset.sched_load_balance\x00', 0x2, 0x0) dup3(r6, r3, 0x0) r7 = add_key$keyring(&(0x7f0000000540), &(0x7f0000000640)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffc) r8 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000980), 0x200000, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r4, 0x81f8943c, &(0x7f000001a000)={0x0, ""/256, 0x0, 0x0, 0x0, 0x0, ""/16, ""/16, ""/16, 0x0}) ioctl$BTRFS_IOC_SUBVOL_CREATE_V2(r5, 0x50009418, &(0x7f000001a200)={{r8}, r9, 0x2, @inherit={0x58, &(0x7f00000009c0)={0x1, 0x2, 0x8, 0x7, {0x14, 0x1000, 0x5, 0x7, 0x4}, [0xffff, 0x3]}}, @subvolid=0x4}) ioctl$BTRFS_IOC_BALANCE(r5, 0x5000940c, 0x0) keyctl$search(0xa, r2, &(0x7f0000000200)='keyring\x00', &(0x7f0000000500)={'syz', 0x0}, r7) writev(r3, &(0x7f0000000300)=[{&(0x7f00000000c0)='0', 0x1}, {&(0x7f00000003c0)='7', 0x1}], 0x2) 16:35:04 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000140)={0x0, 0x0}, &(0x7f0000cab000)=0x6e) syz_mount_image$hfs(&(0x7f0000000240), &(0x7f0000000380)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x3, &(0x7f0000000480)=ANY=[@ANYBLOB="71756965742c706172743d3078303030303030303030303031303030312c747970653d7614866b2c7569643d", @ANYRESHEX=r1, @ANYBLOB="2c636f6465706167653d61736369692c726f6f74636f6e746578743d73797361646d5f752c009828c0e0f966f5026d621d247ff1605dcd9c1b4f2218a111f2df750a3456f9396d20602ac293ba8eed5fe06900b7db0004a472ffd0566fbaaf915cf37b716113d973b6670e66fbddafcae1b6aef50c873fb40beb1ec8a8aa0432fee17e2c1a43352e8509313f812d3ab44cb17f659e16ee885b2bdedafa4765d1e508ea558c5d155e4a77bfe1bf33513e665e788476898bd45b4d412e810703ab0c7dccbc3baf3dc490d83a1957903e09d0115298c03f42e31aa8da7c229f09"], 0x1, 0x235, &(0x7f0000000000)="$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") 16:35:04 executing program 0: r0 = request_key(0x0, 0x0, 0x0, 0xfffffffffffffffd) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) r1 = add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000740)=@filename='./file0\x00', &(0x7f0000000780)='./file0\x00', &(0x7f0000000840)='gadgetfs\x00', 0x0, &(0x7f0000000880)='keyring\x00') perf_event_open(&(0x7f00000007c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x12c00, 0x0, 0xe5e}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) writev(0xffffffffffffffff, 0x0, 0x0) r2 = add_key(0x0, &(0x7f0000000280)={'syz', 0x3}, &(0x7f0000019a40)="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", 0x5bd, 0xfffffffffffffffd) keyctl$read(0xb, r2, &(0x7f0000000a40)=""/102400, 0x19000) keyctl$search(0xa, r2, &(0x7f00000008c0)='keyring\x00', &(0x7f0000000900)={'syz', 0x1}, 0xfffffffffffffffd) request_key(&(0x7f00000006c0)='dns_resolver\x00', &(0x7f0000000700)={'syz', 0x3}, 0x0, 0xfffffffffffffffd) r3 = add_key(&(0x7f0000000380)='id_resolver\x00', &(0x7f0000000400)={'syz', 0x3}, &(0x7f0000000440)="e09e6dda135ac7c467011f", 0xb, r0) keyctl$search(0xa, r1, 0x0, &(0x7f0000000340)={'syz', 0x1}, r3) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000140)='cpuset\x00', 0x0, 0x0) add_key$keyring(&(0x7f0000000100), &(0x7f0000000180)={'syz', 0x0}, 0x0, 0x0, r0) r4 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r5 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) open(&(0x7f00000002c0)='./file0\x00', 0x98d00, 0x8) request_key(&(0x7f0000000580)='logon\x00', 0x0, &(0x7f0000000600)='\x1f-)\x00', 0xfffffffffffffff9) add_key$fscrypt_provisioning(&(0x7f0000000480), &(0x7f00000004c0)={'syz', 0x0}, &(0x7f0000000640)=ANY=[], 0x48, r0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = openat$cgroup_int(r4, &(0x7f00000001c0)='cpuset.sched_load_balance\x00', 0x2, 0x0) dup3(r7, r4, 0x0) r8 = add_key$keyring(&(0x7f0000000540), &(0x7f0000000640)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffc) r9 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000980), 0x200000, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r5, 0x81f8943c, &(0x7f000001a000)={0x0, ""/256, 0x0, 0x0, 0x0, 0x0, ""/16, ""/16, ""/16, 0x0}) ioctl$BTRFS_IOC_SUBVOL_CREATE_V2(r6, 0x50009418, &(0x7f000001a200)={{r9}, r10, 0x2, @inherit={0x58, &(0x7f00000009c0)={0x1, 0x2, 0x8, 0x7, {0x14, 0x1000, 0x5, 0x7}, [0xffff, 0x0]}}, @subvolid=0x4}) keyctl$search(0xa, r3, 0x0, &(0x7f0000000500)={'syz', 0x0}, r8) writev(r4, &(0x7f0000000300)=[{&(0x7f00000000c0)='0', 0xcf00}, {&(0x7f00000003c0)='7', 0x1}], 0x2) [ 2019.999208] new mount options do not match the existing superblock, will be ignored [ 2020.027984] new mount options do not match the existing superblock, will be ignored 16:35:04 executing program 5: r0 = request_key(0x0, 0x0, 0x0, 0xfffffffffffffffd) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) r1 = add_key$keyring(0x0, &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000740)=@filename='./file0\x00', &(0x7f0000000780)='./file0\x00', &(0x7f0000000840)='gadgetfs\x00', 0x10, &(0x7f0000000880)='keyring\x00') perf_event_open(&(0x7f00000007c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0xe5e}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) writev(0xffffffffffffffff, 0x0, 0x0) r2 = add_key(&(0x7f0000000240)='big_key\x00', &(0x7f0000000280)={'syz', 0x3}, &(0x7f0000019a40)="4195738ac28ccd83aa93c4ecacdaca3d34104be4cc5531c4091facf7f777321e84e49e039122a2d1cf7fea6a02aac8944c27ba038156bc10c0f7a6b26fbf382f67959d856600881f0e692c60f12ace775aab8d775dc2586454918a0db1811f5e8086f1a9805166c870b8387d380d5115af5841dad21f629e05f4b51e362c46b58a7dc2855c5189bff60d02c05ba67c297aa0ad05b93b1ee2fffae13fe5764d4e2a214e15093841b1551d518a669fa94e8918bfdd6573d5c0275a9b91ddb843775f78574891e03697f6ca290be6599b671093898a82e7905ed7c7fd8e8b422ebf12e5b543885596fc5c305d497407ffe73bd543f79c983f0807ae7e13fb5053fd7a07dddf8ec739418b59d67219f008f540161cec3bfd1b3097aad497248b221d572a9eb1bad6d921fcdcfdfacf8d1e392635168747056ec8a3fc45b3027293a517d50ea789294f132f2392919dc81ba5eb02e27e116cc300000000b6c0e39688425a3cb17d35f4b1eec0a37193f233c6655c6f40c09b4ea04c8880a431a8274127d56c3c8cab73a5fcf2b604b83658344e323eeedb0b283b0b3616236e904a42fed9fc8f4c131b047bfd5d7586e6a28032a4584fd5933472ce49dfdc99976166bb37eb1679b22249a222ffab17948dd6cc6f23f42ecd32a980ab8fc7c7d2da1a91f1db1187066c144bcbdb46240b7ef7ed28da4a358295b6104e4c60b09654e79f766e19e44174e94fa41d358d3dd901c060a06a388727be1092a37c0015695b1363ed018e724947983aa6b5974daf6388547cdacbd44a1282c3b9130cbf9536c29a523980b9e4328d1a7c0de8b636d7dfdee36434125948b1d802d5d143645c3a5f8da50adeef6e4f715361908a20cb998d3e0907aef9fdd19bb79be8c510b8aa04600163636c1d1f36f3834ffa3c7369e1d8ed9348bc339da2a525c4f165c0caebb7a4ee632a37a43897084e3c07a5ed8b505a51a4777095060b0ff6a6442206244dd9a13b5ba52b07c718e9eaad10befd12be35dc50283d584035d75e4917548ff58045b88d29b6826ceb6d44fb54ba3ef7944da6e86c0f2d0bc0bd725aa9193b3de4837634ead361d9b2ff5ae4de005f53d48cba029b43eb35fbedd0b5397918a9324b6e1f1d88399d8ad69b7d79e89ded6fe81fd1200f95c831f8c60dc1483e97052f61d0a643df0c2e1b0ba7d00b0692efd1bfc1ece10c2e785e3cb3b0dfbdbd722b6e53e5a2884b1cc5d939a572564bc8a2260e8718230878edb3a877f5c585f4373ef8e0e1cff5dacf96862906ff37eec18ba706d22b101965eaf5f5e29f544977896117e25ceb572f3443eddf9651c2ac69c911b21fd69e59ee57ebe4c549ff2a3dcd904656663039789f022a6caa7f76640e75efdba82dabacf8c0112bd4e62a3a9e69a9824c1af45cf86b307d9749937dd08b6ef49860cda5da7bb886f92db7cd43a869aa646a6da291a75ff28c4d728b1377b8e80233b33e724a60c0a015ec75cd86af04a4bd43964d8f7ba781a99d0cd7ff7e189fc91801655cb1b60e6bc3af747655341deceadbed3d76bdfae92389cc87c417e0f58f3fbcc56ff347467a20773146a81090ff42bbb5383d74108028f5fa532c647746054c312e2e4c085f58d93bec6da7c2bfd99fc59c1631cc71110acc2bf352b994e2a246be3cc1d240fa0c60eb04b92a9673d2ac2bba7f322ddbbd74712b0ec459050586523bd0b0505174a701206e47f2bb7fe20caf5ed73d33447b89432802e7d4606512e217aedf78c871e10cfbdf202efbf3fd8495b6be18cde726dc1fefc01921e9d1f15c8301376c33b5a698d0f7d5f317835d74857e121fe820d93f6b757c9938ec81f9b19a4b0d4ed35d1309fbcb285cf7717e9e27aaaba9d7d742fcfd786eacd993fb119e1d52908ca7ce2135046fa95805704c6258fd1b5fc1434af7ab99609820d73627080d43bcaeeb42ce423e17aa4df3a6994ead3133e2ecfbc6fa308c6b71b78cbab273641970b49e15d0dbe7aea716eaf6cf40f90d0d7d3d8bf1d165d25d5f6f6376416b9dd13731c5c2fdadee8e48c76430cccb21d8e6c659", 0x5bd, 0xfffffffffffffffd) keyctl$read(0xb, r2, &(0x7f0000000a40)=""/102400, 0x19000) keyctl$search(0xa, r2, &(0x7f00000008c0)='keyring\x00', &(0x7f0000000900)={'syz', 0x1}, 0xfffffffffffffffd) request_key(&(0x7f00000006c0)='dns_resolver\x00', &(0x7f0000000700)={'syz', 0x3}, &(0x7f0000000940)='\x00', 0xfffffffffffffffd) r3 = add_key(&(0x7f0000000380)='id_resolver\x00', &(0x7f0000000400)={'syz', 0x3}, &(0x7f0000000440)="e09e6dda135ac7c467011f", 0xb, r0) keyctl$search(0xa, r1, 0x0, &(0x7f0000000340)={'syz', 0x1}, r3) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000140)='cpuset\x00', 0x0, 0x0) add_key$keyring(&(0x7f0000000100), &(0x7f0000000180)={'syz', 0x0}, 0x0, 0x0, r0) r4 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r5 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) request_key(&(0x7f0000000580)='logon\x00', &(0x7f00000005c0)={'syz', 0x0}, &(0x7f0000000600)='\x1f-)\x00', 0xfffffffffffffff9) add_key$fscrypt_provisioning(&(0x7f0000000480), &(0x7f00000004c0)={'syz', 0x0}, &(0x7f0000000640)=ANY=[], 0x48, r0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = openat$cgroup_int(r4, &(0x7f00000001c0)='cpuset.sched_load_balance\x00', 0x2, 0x0) dup3(r7, r4, 0x0) add_key$keyring(&(0x7f0000000540), &(0x7f0000000640)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffc) r8 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000980), 0x200000, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r5, 0x81f8943c, &(0x7f000001a000)={0x0, ""/256, 0x0, 0x0, 0x0, 0x0, ""/16, ""/16, ""/16, 0x0}) ioctl$BTRFS_IOC_SUBVOL_CREATE_V2(r6, 0x50009418, &(0x7f000001a200)={{r8}, r9, 0x2, @inherit={0x58, &(0x7f00000009c0)={0x1, 0x2, 0x8, 0x7, {0x14, 0x1000, 0x5, 0x7, 0x4}, [0xffff, 0x3]}}, @subvolid=0x4}) writev(r4, &(0x7f0000000300)=[{&(0x7f00000000c0)='0', 0x1}, {&(0x7f00000003c0)='7', 0x1}], 0x2) [ 2020.053314] hfs: uid requires an argument [ 2020.068409] hfs: unable to parse mount options 16:35:04 executing program 2: r0 = request_key(0x0, 0x0, 0x0, 0xfffffffffffffffd) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) perf_event_open(&(0x7f00000007c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0xe5e}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) keyctl$read(0xb, 0x0, &(0x7f0000000a40)=""/102400, 0x19000) keyctl$search(0xa, 0x0, &(0x7f00000008c0)='keyring\x00', &(0x7f0000000900)={'syz', 0x1}, 0xfffffffffffffffd) request_key(&(0x7f00000006c0)='dns_resolver\x00', &(0x7f0000000700)={'syz', 0x3}, &(0x7f0000000940)='\x00', 0xfffffffffffffffd) add_key(0x0, &(0x7f0000000400)={'syz', 0x3}, &(0x7f0000000440), 0x0, r0) keyctl$search(0xa, 0x0, 0x0, &(0x7f0000000340)={'syz', 0x1}, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000140)='cpuset\x00', 0x0, 0x0) add_key$keyring(&(0x7f0000000100), 0x0, 0x0, 0x0, r0) r1 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) request_key(0x0, &(0x7f00000005c0)={'syz', 0x0}, 0x0, 0xfffffffffffffff9) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = openat$cgroup_int(r1, &(0x7f00000001c0)='cpuset.sched_load_balance\x00', 0x2, 0x0) dup3(r3, r1, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x200000, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f000001a000)={0x0, ""/256, 0x0, 0x0, 0x0, 0x0, ""/16, ""/16, ""/16, 0x0}) ioctl$BTRFS_IOC_SUBVOL_CREATE_V2(r2, 0x50009418, &(0x7f000001a200)={{}, r4, 0x2, @inherit={0x58, &(0x7f00000009c0)={0x1, 0x2, 0x8, 0x0, {0x0, 0x0, 0x0, 0x0, 0x4}, [0x0, 0x0]}}, @subvolid=0x4}) ioctl$BTRFS_IOC_BALANCE(0xffffffffffffffff, 0x5000940c, 0x0) keyctl$search(0xa, 0x0, &(0x7f0000000200)='keyring\x00', &(0x7f0000000500)={'syz', 0x0}, 0x0) writev(r1, &(0x7f0000000300)=[{&(0x7f00000000c0)='0', 0x1}, {&(0x7f00000003c0)}], 0x2) 16:35:04 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000140)={0x0, 0x0}, &(0x7f0000cab000)=0x6e) syz_mount_image$hfs(&(0x7f0000000240), &(0x7f0000000380)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x3, &(0x7f0000000400)=ANY=[@ANYBLOB="71756965742c706172743d3078303030303030303030303031303030312c747970653d7614866b2c7569643d", @ANYRESHEX=r1, @ANYBLOB="2c636f64657079070000000000000000726f6f74636f6e746578743d737973aa1e29e0752c00"], 0x1, 0x235, &(0x7f0000000000)="$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") [ 2020.095488] new mount options do not match the existing superblock, will be ignored [ 2020.096049] hfs: invalid gid -1 [ 2020.115993] hfs: unable to parse mount options [ 2020.157153] new mount options do not match the existing superblock, will be ignored 16:35:04 executing program 1: syz_mount_image$hfs(&(0x7f0000000240), &(0x7f0000000380)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x3, &(0x7f0000000780)=ANY=[@ANYBLOB='quiet,gid=', @ANYRESHEX, @ANYBLOB="2c2a7270653d7614866b2c75693df589299908000000450000005d38ff0c0071446a0c48dba349ba347528523876dc8d7918ecea1024ba9669ff19a9ab5e27062b1dae8d8c0eb880008164ed9d8093fdc35f282dee56df9531b6e0c94b43c314af69146a70075499da5e7f927d3c672787e3d33a6071ff2c1483a1a7cfb34131bfee72f86068d0966d", @ANYRESHEX, @ANYBLOB=',codepage=ascii,rootcontext=sysadm_u,\x00'], 0x1, 0x235, &(0x7f0000000000)="$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") 16:35:04 executing program 4: r0 = request_key(0x0, 0x0, 0x0, 0xfffffffffffffffd) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) r1 = add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000780)='./file0\x00', &(0x7f0000000840)='gadgetfs\x00', 0x0, &(0x7f0000000880)='keyring\x00') perf_event_open(&(0x7f00000007c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x12c00, 0x0, 0xe5e}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) writev(0xffffffffffffffff, 0x0, 0x0) keyctl$read(0xb, 0x0, &(0x7f0000000a40)=""/102400, 0x19000) keyctl$search(0xa, 0x0, 0x0, 0x0, 0xfffffffffffffffd) request_key(&(0x7f00000006c0)='dns_resolver\x00', &(0x7f0000000700)={'syz', 0x3}, &(0x7f0000000940)='\x00', 0xfffffffffffffffd) r2 = add_key(&(0x7f0000000380)='id_resolver\x00', 0x0, &(0x7f0000000440), 0x0, r0) keyctl$search(0xa, r1, 0x0, &(0x7f0000000340)={'syz', 0x1}, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000140)='cpuset\x00', 0x0, 0x0) add_key$keyring(&(0x7f0000000100), &(0x7f0000000180)={'syz', 0x0}, 0x0, 0x0, r0) r3 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r4 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) open(0x0, 0x98d00, 0x8) request_key(&(0x7f0000000580)='logon\x00', &(0x7f00000005c0)={'syz', 0x0}, &(0x7f0000000600)='\x1f-)\x00', 0xfffffffffffffff9) write$rfkill(r4, &(0x7f0000000040)={0x0, 0x0, 0x3}, 0x8) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = openat$cgroup_int(r3, &(0x7f00000001c0)='cpuset.sched_load_balance\x00', 0x2, 0x0) dup3(r6, r3, 0x0) r7 = add_key$keyring(&(0x7f0000000540), &(0x7f0000000640)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffc) r8 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000980), 0x200000, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r4, 0x81f8943c, &(0x7f000001a000)={0x0, ""/256, 0x0, 0x0, 0x0, 0x0, ""/16, ""/16, ""/16, 0x0}) ioctl$BTRFS_IOC_SUBVOL_CREATE_V2(r5, 0x50009418, &(0x7f000001a200)={{r8}, r9, 0x2, @inherit={0x58, &(0x7f00000009c0)={0x1, 0x2, 0x8, 0x7, {0x14, 0x1000, 0x5, 0x7, 0x4}, [0xffff, 0x3]}}, @subvolid=0x4}) ioctl$BTRFS_IOC_BALANCE(r5, 0x5000940c, 0x0) keyctl$search(0xa, r2, &(0x7f0000000200)='keyring\x00', &(0x7f0000000500)={'syz', 0x0}, r7) writev(r3, &(0x7f0000000300)=[{&(0x7f00000000c0)='0', 0x1}, {&(0x7f00000003c0)='7', 0x1}], 0x2) [ 2020.207195] new mount options do not match the existing superblock, will be ignored 16:35:04 executing program 0: r0 = request_key(0x0, 0x0, 0x0, 0xfffffffffffffffd) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) r1 = add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000740)=@filename='./file0\x00', &(0x7f0000000780)='./file0\x00', &(0x7f0000000840)='gadgetfs\x00', 0x0, &(0x7f0000000880)='keyring\x00') perf_event_open(&(0x7f00000007c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x12c00, 0x0, 0xe5e}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) writev(0xffffffffffffffff, 0x0, 0x0) r2 = add_key(0x0, &(0x7f0000000280)={'syz', 0x3}, &(0x7f0000019a40)="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", 0x5bd, 0xfffffffffffffffd) keyctl$read(0xb, r2, &(0x7f0000000a40)=""/102400, 0x19000) keyctl$search(0xa, r2, &(0x7f00000008c0)='keyring\x00', &(0x7f0000000900)={'syz', 0x1}, 0xfffffffffffffffd) request_key(&(0x7f00000006c0)='dns_resolver\x00', &(0x7f0000000700)={'syz', 0x3}, 0x0, 0xfffffffffffffffd) r3 = add_key(&(0x7f0000000380)='id_resolver\x00', &(0x7f0000000400)={'syz', 0x3}, &(0x7f0000000440)="e09e6dda135ac7c467011f", 0xb, r0) keyctl$search(0xa, r1, 0x0, &(0x7f0000000340)={'syz', 0x1}, r3) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000140)='cpuset\x00', 0x0, 0x0) add_key$keyring(&(0x7f0000000100), &(0x7f0000000180)={'syz', 0x0}, 0x0, 0x0, r0) r4 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r5 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) open(&(0x7f00000002c0)='./file0\x00', 0x98d00, 0x8) request_key(&(0x7f0000000580)='logon\x00', 0x0, &(0x7f0000000600)='\x1f-)\x00', 0xfffffffffffffff9) add_key$fscrypt_provisioning(&(0x7f0000000480), &(0x7f00000004c0)={'syz', 0x0}, &(0x7f0000000640)=ANY=[], 0x48, r0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = openat$cgroup_int(r4, &(0x7f00000001c0)='cpuset.sched_load_balance\x00', 0x2, 0x0) dup3(r7, r4, 0x0) r8 = add_key$keyring(&(0x7f0000000540), &(0x7f0000000640)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffc) r9 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000980), 0x200000, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r5, 0x81f8943c, &(0x7f000001a000)={0x0, ""/256, 0x0, 0x0, 0x0, 0x0, ""/16, ""/16, ""/16, 0x0}) ioctl$BTRFS_IOC_SUBVOL_CREATE_V2(r6, 0x50009418, &(0x7f000001a200)={{r9}, r10, 0x2, @inherit={0x58, &(0x7f00000009c0)={0x1, 0x2, 0x8, 0x7, {0x14, 0x1000, 0x5, 0x7}, [0xffff, 0x0]}}, @subvolid=0x4}) keyctl$search(0xa, r3, 0x0, &(0x7f0000000500)={'syz', 0x0}, r8) writev(r4, &(0x7f0000000300)=[{&(0x7f00000000c0)='0', 0xd000}, {&(0x7f00000003c0)='7', 0x1}], 0x2) [ 2020.279589] hfs: uid requires an argument 16:35:04 executing program 2: r0 = request_key(0x0, 0x0, 0x0, 0xfffffffffffffffd) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) perf_event_open(&(0x7f00000007c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0xe5e}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) keyctl$read(0xb, 0x0, &(0x7f0000000a40)=""/102400, 0x19000) keyctl$search(0xa, 0x0, &(0x7f00000008c0)='keyring\x00', &(0x7f0000000900)={'syz', 0x1}, 0xfffffffffffffffd) request_key(&(0x7f00000006c0)='dns_resolver\x00', &(0x7f0000000700)={'syz', 0x3}, &(0x7f0000000940)='\x00', 0xfffffffffffffffd) add_key(0x0, &(0x7f0000000400)={'syz', 0x3}, &(0x7f0000000440), 0x0, r0) keyctl$search(0xa, 0x0, 0x0, &(0x7f0000000340)={'syz', 0x1}, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000140)='cpuset\x00', 0x0, 0x0) add_key$keyring(&(0x7f0000000100), 0x0, 0x0, 0x0, r0) r1 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) request_key(0x0, &(0x7f00000005c0)={'syz', 0x0}, 0x0, 0xfffffffffffffff9) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = openat$cgroup_int(r1, &(0x7f00000001c0)='cpuset.sched_load_balance\x00', 0x2, 0x0) dup3(r3, r1, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x200000, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f000001a000)={0x0, ""/256, 0x0, 0x0, 0x0, 0x0, ""/16, ""/16, ""/16, 0x0}) ioctl$BTRFS_IOC_SUBVOL_CREATE_V2(r2, 0x50009418, &(0x7f000001a200)={{}, r4, 0x2, @inherit={0x58, &(0x7f00000009c0)={0x1, 0x2, 0x8, 0x0, {0x0, 0x0, 0x0, 0x0, 0x4}, [0x0, 0x0]}}, @subvolid=0x4}) ioctl$BTRFS_IOC_BALANCE(0xffffffffffffffff, 0x5000940c, 0x0) keyctl$search(0xa, 0x0, &(0x7f0000000200)='keyring\x00', &(0x7f0000000500)={'syz', 0x0}, 0x0) writev(r1, &(0x7f0000000300)=[{&(0x7f00000000c0)='0', 0x2}, {&(0x7f00000003c0)}], 0x2) 16:35:04 executing program 1: syz_mount_image$hfs(&(0x7f0000000240), &(0x7f0000000380)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x3, &(0x7f0000000780)=ANY=[@ANYBLOB='quiet,gid=', @ANYRESHEX, @ANYBLOB="2c2a7270653d7614866b2c75693df589299908000000450000005d38ff0c0071446a0c48dba349ba347528523876dc8d7918ecea1024ba9669ff19a9ab5e27062b1dae8d8c0eb880008164ed9d8093fdc35f282dee56df9531b6e0c94b43c314af69146a70075499da5e7f927d3c672787e3d33a6071ff2c1483a1a7cfb34131bfee72f86068d0966d", @ANYRESHEX, @ANYBLOB=',codepage=ascii,rootcontext=sysadm_u,\x00'], 0x1, 0x235, &(0x7f0000000000)="$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") [ 2020.337585] new mount options do not match the existing superblock, will be ignored [ 2020.338664] hfs: unable to parse mount options 16:35:04 executing program 5: r0 = request_key(0x0, 0x0, 0x0, 0xfffffffffffffffd) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) r1 = add_key$keyring(0x0, &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000740)=@filename='./file0\x00', &(0x7f0000000780)='./file0\x00', &(0x7f0000000840)='gadgetfs\x00', 0x10, &(0x7f0000000880)='keyring\x00') perf_event_open(&(0x7f00000007c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x12c00}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) writev(0xffffffffffffffff, 0x0, 0x0) r2 = add_key(&(0x7f0000000240)='big_key\x00', &(0x7f0000000280)={'syz', 0x3}, &(0x7f0000019a40)="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", 0x5bd, 0xfffffffffffffffd) keyctl$read(0xb, r2, &(0x7f0000000a40)=""/102400, 0x19000) keyctl$search(0xa, r2, &(0x7f00000008c0)='keyring\x00', &(0x7f0000000900)={'syz', 0x1}, 0xfffffffffffffffd) request_key(&(0x7f00000006c0)='dns_resolver\x00', &(0x7f0000000700)={'syz', 0x3}, &(0x7f0000000940)='\x00', 0xfffffffffffffffd) r3 = add_key(&(0x7f0000000380)='id_resolver\x00', &(0x7f0000000400)={'syz', 0x3}, &(0x7f0000000440)="e09e6dda135ac7c467011f", 0xb, r0) keyctl$search(0xa, r1, 0x0, &(0x7f0000000340)={'syz', 0x1}, r3) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000140)='cpuset\x00', 0x0, 0x0) add_key$keyring(&(0x7f0000000100), &(0x7f0000000180)={'syz', 0x0}, 0x0, 0x0, r0) r4 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r5 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) request_key(&(0x7f0000000580)='logon\x00', &(0x7f00000005c0)={'syz', 0x0}, &(0x7f0000000600)='\x1f-)\x00', 0xfffffffffffffff9) add_key$fscrypt_provisioning(&(0x7f0000000480), &(0x7f00000004c0)={'syz', 0x0}, &(0x7f0000000640)=ANY=[], 0x48, r0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = openat$cgroup_int(r4, &(0x7f00000001c0)='cpuset.sched_load_balance\x00', 0x2, 0x0) dup3(r7, r4, 0x0) add_key$keyring(&(0x7f0000000540), &(0x7f0000000640)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffc) r8 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000980), 0x200000, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r5, 0x81f8943c, &(0x7f000001a000)={0x0, ""/256, 0x0, 0x0, 0x0, 0x0, ""/16, ""/16, ""/16, 0x0}) ioctl$BTRFS_IOC_SUBVOL_CREATE_V2(r6, 0x50009418, &(0x7f000001a200)={{r8}, r9, 0x2, @inherit={0x58, &(0x7f00000009c0)={0x1, 0x2, 0x8, 0x7, {0x14, 0x1000, 0x5, 0x7, 0x4}, [0xffff, 0x3]}}, @subvolid=0x4}) writev(r4, &(0x7f0000000300)=[{&(0x7f00000000c0)='0', 0x1}, {&(0x7f00000003c0)='7', 0x1}], 0x2) [ 2020.393084] new mount options do not match the existing superblock, will be ignored [ 2020.429354] new mount options do not match the existing superblock, will be ignored 16:35:04 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000140)={0x0, 0x0}, &(0x7f0000cab000)=0x6e) syz_mount_image$hfs(&(0x7f0000000240), &(0x7f0000000380)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x3, &(0x7f0000000400)=ANY=[@ANYBLOB="71756965742c706172743d3078303030303030303030303031303030312c747970653d7614866b2c7569643d", @ANYRESHEX=r1, @ANYBLOB="2c636f64657079070000000000000000726f6f74636f6e746578743d737973aa1e29e0752c00"], 0x1, 0x235, &(0x7f0000000000)="$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") [ 2020.443940] new mount options do not match the existing superblock, will be ignored [ 2020.459020] hfs: invalid gid -1 [ 2020.463277] hfs: unable to parse mount options 16:35:04 executing program 2: r0 = request_key(0x0, 0x0, 0x0, 0xfffffffffffffffd) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) perf_event_open(&(0x7f00000007c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0xe5e}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) keyctl$read(0xb, 0x0, &(0x7f0000000a40)=""/102400, 0x19000) keyctl$search(0xa, 0x0, &(0x7f00000008c0)='keyring\x00', &(0x7f0000000900)={'syz', 0x1}, 0xfffffffffffffffd) request_key(&(0x7f00000006c0)='dns_resolver\x00', &(0x7f0000000700)={'syz', 0x3}, &(0x7f0000000940)='\x00', 0xfffffffffffffffd) add_key(0x0, &(0x7f0000000400)={'syz', 0x3}, &(0x7f0000000440), 0x0, r0) keyctl$search(0xa, 0x0, 0x0, &(0x7f0000000340)={'syz', 0x1}, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000140)='cpuset\x00', 0x0, 0x0) add_key$keyring(&(0x7f0000000100), 0x0, 0x0, 0x0, r0) r1 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) request_key(0x0, &(0x7f00000005c0)={'syz', 0x0}, 0x0, 0xfffffffffffffff9) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = openat$cgroup_int(r1, &(0x7f00000001c0)='cpuset.sched_load_balance\x00', 0x2, 0x0) dup3(r3, r1, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x200000, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f000001a000)={0x0, ""/256, 0x0, 0x0, 0x0, 0x0, ""/16, ""/16, ""/16, 0x0}) ioctl$BTRFS_IOC_SUBVOL_CREATE_V2(r2, 0x50009418, &(0x7f000001a200)={{}, r4, 0x2, @inherit={0x58, &(0x7f00000009c0)={0x1, 0x2, 0x8, 0x0, {0x0, 0x0, 0x0, 0x0, 0x4}, [0x0, 0x0]}}, @subvolid=0x4}) ioctl$BTRFS_IOC_BALANCE(0xffffffffffffffff, 0x5000940c, 0x0) keyctl$search(0xa, 0x0, &(0x7f0000000200)='keyring\x00', &(0x7f0000000500)={'syz', 0x0}, 0x0) writev(r1, &(0x7f0000000300)=[{&(0x7f00000000c0)='0', 0x200000c1}, {&(0x7f00000003c0)}], 0x2) 16:35:04 executing program 4: r0 = request_key(0x0, 0x0, 0x0, 0xfffffffffffffffd) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) r1 = add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000780)='./file0\x00', &(0x7f0000000840)='gadgetfs\x00', 0x0, &(0x7f0000000880)='keyring\x00') perf_event_open(&(0x7f00000007c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x12c00, 0x0, 0xe5e}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) writev(0xffffffffffffffff, 0x0, 0x0) keyctl$read(0xb, 0x0, &(0x7f0000000a40)=""/102400, 0x19000) keyctl$search(0xa, 0x0, 0x0, 0x0, 0xfffffffffffffffd) request_key(&(0x7f00000006c0)='dns_resolver\x00', &(0x7f0000000700)={'syz', 0x3}, &(0x7f0000000940)='\x00', 0xfffffffffffffffd) r2 = add_key(&(0x7f0000000380)='id_resolver\x00', 0x0, &(0x7f0000000440), 0x0, r0) keyctl$search(0xa, r1, 0x0, &(0x7f0000000340)={'syz', 0x1}, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000140)='cpuset\x00', 0x0, 0x0) add_key$keyring(&(0x7f0000000100), &(0x7f0000000180)={'syz', 0x0}, 0x0, 0x0, r0) r3 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r4 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) open(0x0, 0x98d00, 0x8) request_key(&(0x7f0000000580)='logon\x00', &(0x7f00000005c0)={'syz', 0x0}, &(0x7f0000000600)='\x1f-)\x00', 0xfffffffffffffff9) write$rfkill(r4, &(0x7f0000000040)={0x0, 0x0, 0x3}, 0x8) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = openat$cgroup_int(r3, &(0x7f00000001c0)='cpuset.sched_load_balance\x00', 0x2, 0x0) dup3(r6, r3, 0x0) r7 = add_key$keyring(&(0x7f0000000540), &(0x7f0000000640)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffc) r8 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000980), 0x200000, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r4, 0x81f8943c, &(0x7f000001a000)={0x0, ""/256, 0x0, 0x0, 0x0, 0x0, ""/16, ""/16, ""/16, 0x0}) ioctl$BTRFS_IOC_SUBVOL_CREATE_V2(r5, 0x50009418, &(0x7f000001a200)={{r8}, r9, 0x2, @inherit={0x58, &(0x7f00000009c0)={0x1, 0x2, 0x8, 0x7, {0x14, 0x1000, 0x5, 0x7, 0x4}, [0xffff, 0x3]}}, @subvolid=0x4}) ioctl$BTRFS_IOC_BALANCE(r5, 0x5000940c, 0x0) keyctl$search(0xa, r2, &(0x7f0000000200)='keyring\x00', &(0x7f0000000500)={'syz', 0x0}, r7) writev(r3, &(0x7f0000000300)=[{&(0x7f00000000c0)='0', 0x1}, {&(0x7f00000003c0)='7', 0x1}], 0x2) 16:35:04 executing program 0: r0 = request_key(0x0, 0x0, 0x0, 0xfffffffffffffffd) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) r1 = add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000740)=@filename='./file0\x00', &(0x7f0000000780)='./file0\x00', &(0x7f0000000840)='gadgetfs\x00', 0x0, &(0x7f0000000880)='keyring\x00') perf_event_open(&(0x7f00000007c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x12c00, 0x0, 0xe5e}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) writev(0xffffffffffffffff, 0x0, 0x0) r2 = add_key(0x0, &(0x7f0000000280)={'syz', 0x3}, &(0x7f0000019a40)="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", 0x5bd, 0xfffffffffffffffd) keyctl$read(0xb, r2, &(0x7f0000000a40)=""/102400, 0x19000) keyctl$search(0xa, r2, &(0x7f00000008c0)='keyring\x00', &(0x7f0000000900)={'syz', 0x1}, 0xfffffffffffffffd) request_key(&(0x7f00000006c0)='dns_resolver\x00', &(0x7f0000000700)={'syz', 0x3}, 0x0, 0xfffffffffffffffd) r3 = add_key(&(0x7f0000000380)='id_resolver\x00', &(0x7f0000000400)={'syz', 0x3}, &(0x7f0000000440)="e09e6dda135ac7c467011f", 0xb, r0) keyctl$search(0xa, r1, 0x0, &(0x7f0000000340)={'syz', 0x1}, r3) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000140)='cpuset\x00', 0x0, 0x0) add_key$keyring(&(0x7f0000000100), &(0x7f0000000180)={'syz', 0x0}, 0x0, 0x0, r0) r4 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r5 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) open(&(0x7f00000002c0)='./file0\x00', 0x98d00, 0x8) request_key(&(0x7f0000000580)='logon\x00', 0x0, &(0x7f0000000600)='\x1f-)\x00', 0xfffffffffffffff9) add_key$fscrypt_provisioning(&(0x7f0000000480), &(0x7f00000004c0)={'syz', 0x0}, &(0x7f0000000640)=ANY=[], 0x48, r0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = openat$cgroup_int(r4, &(0x7f00000001c0)='cpuset.sched_load_balance\x00', 0x2, 0x0) dup3(r7, r4, 0x0) r8 = add_key$keyring(&(0x7f0000000540), &(0x7f0000000640)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffc) r9 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000980), 0x200000, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r5, 0x81f8943c, &(0x7f000001a000)={0x0, ""/256, 0x0, 0x0, 0x0, 0x0, ""/16, ""/16, ""/16, 0x0}) ioctl$BTRFS_IOC_SUBVOL_CREATE_V2(r6, 0x50009418, &(0x7f000001a200)={{r9}, r10, 0x2, @inherit={0x58, &(0x7f00000009c0)={0x1, 0x2, 0x8, 0x7, {0x14, 0x1000, 0x5, 0x7}, [0xffff, 0x0]}}, @subvolid=0x4}) keyctl$search(0xa, r3, 0x0, &(0x7f0000000500)={'syz', 0x0}, r8) writev(r4, &(0x7f0000000300)=[{&(0x7f00000000c0)='0', 0xd100}, {&(0x7f00000003c0)='7', 0x1}], 0x2) 16:35:04 executing program 1: syz_mount_image$hfs(&(0x7f0000000240), &(0x7f0000000380)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x3, &(0x7f0000000780)=ANY=[@ANYBLOB='quiet,gid=', @ANYRESHEX, @ANYBLOB="2c2a7270653d7614866b2c75693df589299908000000450000005d38ff0c0071446a0c48dba349ba347528523876dc8d7918ecea1024ba9669ff19a9ab5e27062b1dae8d8c0eb880008164ed9d8093fdc35f282dee56df9531b6e0c94b43c314af69146a70075499da5e7f927d3c672787e3d33a6071ff2c1483a1a7cfb34131bfee72f86068d0966d", @ANYRESHEX, @ANYBLOB=',codepage=ascii,rootcontext=sysadm_u,\x00'], 0x1, 0x235, &(0x7f0000000000)="$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") [ 2020.566327] hfs: uid requires an argument [ 2020.607946] hfs: unable to parse mount options [ 2020.614670] new mount options do not match the existing superblock, will be ignored [ 2020.631935] new mount options do not match the existing superblock, will be ignored [ 2020.642781] new mount options do not match the existing superblock, will be ignored [ 2020.664587] new mount options do not match the existing superblock, will be ignored [ 2020.684208] INFO: task syz-executor.5:16047 blocked for more than 140 seconds. [ 2020.691598] Not tainted 4.19.211-syzkaller #0 16:35:04 executing program 2: r0 = request_key(0x0, 0x0, 0x0, 0xfffffffffffffffd) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) perf_event_open(&(0x7f00000007c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0xe5e}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) keyctl$read(0xb, 0x0, &(0x7f0000000a40)=""/102400, 0x19000) keyctl$search(0xa, 0x0, &(0x7f00000008c0)='keyring\x00', &(0x7f0000000900)={'syz', 0x1}, 0xfffffffffffffffd) request_key(&(0x7f00000006c0)='dns_resolver\x00', &(0x7f0000000700)={'syz', 0x3}, &(0x7f0000000940)='\x00', 0xfffffffffffffffd) add_key(0x0, &(0x7f0000000400)={'syz', 0x3}, &(0x7f0000000440), 0x0, r0) keyctl$search(0xa, 0x0, 0x0, &(0x7f0000000340)={'syz', 0x1}, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000140)='cpuset\x00', 0x0, 0x0) add_key$keyring(&(0x7f0000000100), 0x0, 0x0, 0x0, r0) r1 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) request_key(0x0, &(0x7f00000005c0)={'syz', 0x0}, 0x0, 0xfffffffffffffff9) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = openat$cgroup_int(r1, &(0x7f00000001c0)='cpuset.sched_load_balance\x00', 0x2, 0x0) dup3(r3, r1, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x200000, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f000001a000)={0x0, ""/256, 0x0, 0x0, 0x0, 0x0, ""/16, ""/16, ""/16, 0x0}) ioctl$BTRFS_IOC_SUBVOL_CREATE_V2(r2, 0x50009418, &(0x7f000001a200)={{}, r4, 0x2, @inherit={0x58, &(0x7f00000009c0)={0x1, 0x2, 0x8, 0x0, {0x0, 0x0, 0x0, 0x0, 0x4}, [0x0, 0x0]}}, @subvolid=0x4}) ioctl$BTRFS_IOC_BALANCE(0xffffffffffffffff, 0x5000940c, 0x0) keyctl$search(0xa, 0x0, &(0x7f0000000200)='keyring\x00', &(0x7f0000000500)={'syz', 0x0}, 0x0) writev(r1, &(0x7f0000000300)=[{&(0x7f00000000c0)='0', 0x7ffff000}, {&(0x7f00000003c0)}], 0x2) 16:35:04 executing program 5: r0 = request_key(0x0, 0x0, 0x0, 0xfffffffffffffffd) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) r1 = add_key$keyring(0x0, &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000740)=@filename='./file0\x00', &(0x7f0000000780)='./file0\x00', &(0x7f0000000840)='gadgetfs\x00', 0x10, &(0x7f0000000880)='keyring\x00') perf_event_open(&(0x7f00000007c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x12c00}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) writev(0xffffffffffffffff, 0x0, 0x0) r2 = add_key(&(0x7f0000000240)='big_key\x00', &(0x7f0000000280)={'syz', 0x3}, &(0x7f0000019a40)="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", 0x5bd, 0xfffffffffffffffd) keyctl$read(0xb, r2, &(0x7f0000000a40)=""/102400, 0x19000) keyctl$search(0xa, r2, &(0x7f00000008c0)='keyring\x00', &(0x7f0000000900)={'syz', 0x1}, 0xfffffffffffffffd) request_key(&(0x7f00000006c0)='dns_resolver\x00', &(0x7f0000000700)={'syz', 0x3}, &(0x7f0000000940)='\x00', 0xfffffffffffffffd) r3 = add_key(&(0x7f0000000380)='id_resolver\x00', &(0x7f0000000400)={'syz', 0x3}, &(0x7f0000000440)="e09e6dda135ac7c467011f", 0xb, r0) keyctl$search(0xa, r1, 0x0, &(0x7f0000000340)={'syz', 0x1}, r3) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000140)='cpuset\x00', 0x0, 0x0) add_key$keyring(&(0x7f0000000100), &(0x7f0000000180)={'syz', 0x0}, 0x0, 0x0, r0) r4 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r5 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) request_key(&(0x7f0000000580)='logon\x00', &(0x7f00000005c0)={'syz', 0x0}, &(0x7f0000000600)='\x1f-)\x00', 0xfffffffffffffff9) add_key$fscrypt_provisioning(&(0x7f0000000480), &(0x7f00000004c0)={'syz', 0x0}, &(0x7f0000000640)=ANY=[], 0x48, r0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = openat$cgroup_int(r4, &(0x7f00000001c0)='cpuset.sched_load_balance\x00', 0x2, 0x0) dup3(r7, r4, 0x0) add_key$keyring(&(0x7f0000000540), &(0x7f0000000640)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffc) r8 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000980), 0x200000, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r5, 0x81f8943c, &(0x7f000001a000)={0x0, ""/256, 0x0, 0x0, 0x0, 0x0, ""/16, ""/16, ""/16, 0x0}) ioctl$BTRFS_IOC_SUBVOL_CREATE_V2(r6, 0x50009418, &(0x7f000001a200)={{r8}, r9, 0x2, @inherit={0x58, &(0x7f00000009c0)={0x1, 0x2, 0x8, 0x7, {0x14, 0x1000, 0x5, 0x7, 0x4}, [0xffff, 0x3]}}, @subvolid=0x4}) writev(r4, &(0x7f0000000300)=[{&(0x7f00000000c0)='0', 0x1}, {&(0x7f00000003c0)='7', 0x1}], 0x2) 16:35:04 executing program 4: r0 = request_key(0x0, 0x0, 0x0, 0xfffffffffffffffd) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) r1 = add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000780)='./file0\x00', &(0x7f0000000840)='gadgetfs\x00', 0x0, &(0x7f0000000880)='keyring\x00') perf_event_open(&(0x7f00000007c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x12c00, 0x0, 0xe5e}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) writev(0xffffffffffffffff, 0x0, 0x0) keyctl$read(0xb, 0x0, &(0x7f0000000a40)=""/102400, 0x19000) keyctl$search(0xa, 0x0, 0x0, 0x0, 0xfffffffffffffffd) request_key(&(0x7f00000006c0)='dns_resolver\x00', &(0x7f0000000700)={'syz', 0x3}, &(0x7f0000000940)='\x00', 0xfffffffffffffffd) r2 = add_key(&(0x7f0000000380)='id_resolver\x00', 0x0, &(0x7f0000000440), 0x0, r0) keyctl$search(0xa, r1, 0x0, &(0x7f0000000340)={'syz', 0x1}, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000140)='cpuset\x00', 0x0, 0x0) add_key$keyring(&(0x7f0000000100), &(0x7f0000000180)={'syz', 0x0}, 0x0, 0x0, r0) r3 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r4 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) open(0x0, 0x98d00, 0x8) request_key(&(0x7f0000000580)='logon\x00', &(0x7f00000005c0)={'syz', 0x0}, &(0x7f0000000600)='\x1f-)\x00', 0xfffffffffffffff9) write$rfkill(r4, &(0x7f0000000040)={0x0, 0x0, 0x3}, 0x8) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = openat$cgroup_int(r3, &(0x7f00000001c0)='cpuset.sched_load_balance\x00', 0x2, 0x0) dup3(r6, r3, 0x0) r7 = add_key$keyring(&(0x7f0000000540), &(0x7f0000000640)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffc) r8 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000980), 0x200000, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r4, 0x81f8943c, &(0x7f000001a000)={0x0, ""/256, 0x0, 0x0, 0x0, 0x0, ""/16, ""/16, ""/16, 0x0}) ioctl$BTRFS_IOC_SUBVOL_CREATE_V2(r5, 0x50009418, &(0x7f000001a200)={{r8}, r9, 0x2, @inherit={0x58, &(0x7f00000009c0)={0x1, 0x2, 0x8, 0x7, {0x14, 0x1000, 0x5, 0x7, 0x4}, [0xffff, 0x3]}}, @subvolid=0x4}) ioctl$BTRFS_IOC_BALANCE(r5, 0x5000940c, 0x0) keyctl$search(0xa, r2, &(0x7f0000000200)='keyring\x00', &(0x7f0000000500)={'syz', 0x0}, r7) writev(r3, &(0x7f0000000300)=[{&(0x7f00000000c0)='0', 0x1}, {&(0x7f00000003c0)='7', 0x1}], 0x2) [ 2020.721114] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 2020.733374] syz-executor.5 D29920 16047 8140 0x00000004 [ 2020.741995] Call Trace: [ 2020.747060] hfs: invalid gid -1 [ 2020.750359] hfs: unable to parse mount options [ 2020.759969] __schedule+0x887/0x2040 [ 2020.766454] ? io_schedule_timeout+0x140/0x140 16:35:04 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000140)={0x0, 0x0}, &(0x7f0000cab000)=0x6e) syz_mount_image$hfs(&(0x7f0000000240), &(0x7f0000000380)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x3, &(0x7f0000000400)=ANY=[@ANYBLOB="71756965742c706172743d3078303030303030303030303031303030312c747970653d7614866b2c7569643d", @ANYRESHEX=r1, @ANYBLOB="2c636f64657079070000000000000000726f6f74636f6e746578743d737973aa1e29e0752c00"], 0x1, 0x235, &(0x7f0000000000)="$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") perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) socket(0x10, 0x2, 0x0) (async) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000140), &(0x7f0000cab000)=0x6e) (async) syz_mount_image$hfs(&(0x7f0000000240), &(0x7f0000000380)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x3, &(0x7f0000000400)=ANY=[@ANYBLOB="71756965742c706172743d3078303030303030303030303031303030312c747970653d7614866b2c7569643d", @ANYRESHEX=r1, @ANYBLOB="2c636f64657079070000000000000000726f6f74636f6e746578743d737973aa1e29e0752c00"], 0x1, 0x235, &(0x7f0000000000)="$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") (async) 16:35:04 executing program 0: r0 = request_key(0x0, 0x0, 0x0, 0xfffffffffffffffd) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) r1 = add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000740)=@filename='./file0\x00', &(0x7f0000000780)='./file0\x00', &(0x7f0000000840)='gadgetfs\x00', 0x0, &(0x7f0000000880)='keyring\x00') perf_event_open(&(0x7f00000007c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x12c00, 0x0, 0xe5e}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) writev(0xffffffffffffffff, 0x0, 0x0) r2 = add_key(0x0, &(0x7f0000000280)={'syz', 0x3}, &(0x7f0000019a40)="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", 0x5bd, 0xfffffffffffffffd) keyctl$read(0xb, r2, &(0x7f0000000a40)=""/102400, 0x19000) keyctl$search(0xa, r2, &(0x7f00000008c0)='keyring\x00', &(0x7f0000000900)={'syz', 0x1}, 0xfffffffffffffffd) request_key(&(0x7f00000006c0)='dns_resolver\x00', &(0x7f0000000700)={'syz', 0x3}, 0x0, 0xfffffffffffffffd) r3 = add_key(&(0x7f0000000380)='id_resolver\x00', &(0x7f0000000400)={'syz', 0x3}, &(0x7f0000000440)="e09e6dda135ac7c467011f", 0xb, r0) keyctl$search(0xa, r1, 0x0, &(0x7f0000000340)={'syz', 0x1}, r3) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000140)='cpuset\x00', 0x0, 0x0) add_key$keyring(&(0x7f0000000100), &(0x7f0000000180)={'syz', 0x0}, 0x0, 0x0, r0) r4 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r5 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) open(&(0x7f00000002c0)='./file0\x00', 0x98d00, 0x8) request_key(&(0x7f0000000580)='logon\x00', 0x0, &(0x7f0000000600)='\x1f-)\x00', 0xfffffffffffffff9) add_key$fscrypt_provisioning(&(0x7f0000000480), &(0x7f00000004c0)={'syz', 0x0}, &(0x7f0000000640)=ANY=[], 0x48, r0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = openat$cgroup_int(r4, &(0x7f00000001c0)='cpuset.sched_load_balance\x00', 0x2, 0x0) dup3(r7, r4, 0x0) r8 = add_key$keyring(&(0x7f0000000540), &(0x7f0000000640)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffc) r9 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000980), 0x200000, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r5, 0x81f8943c, &(0x7f000001a000)={0x0, ""/256, 0x0, 0x0, 0x0, 0x0, ""/16, ""/16, ""/16, 0x0}) ioctl$BTRFS_IOC_SUBVOL_CREATE_V2(r6, 0x50009418, &(0x7f000001a200)={{r9}, r10, 0x2, @inherit={0x58, &(0x7f00000009c0)={0x1, 0x2, 0x8, 0x7, {0x14, 0x1000, 0x5, 0x7}, [0xffff, 0x0]}}, @subvolid=0x4}) keyctl$search(0xa, r3, 0x0, &(0x7f0000000500)={'syz', 0x0}, r8) writev(r4, &(0x7f0000000300)=[{&(0x7f00000000c0)='0', 0xd200}, {&(0x7f00000003c0)='7', 0x1}], 0x2) [ 2020.773235] ? mark_held_locks+0xa6/0xf0 [ 2020.778601] ? rwsem_down_read_failed+0x20a/0x390 [ 2020.787745] schedule+0x8d/0x1b0 [ 2020.791182] rwsem_down_read_failed+0x20a/0x390 [ 2020.801182] ? rt_mutex_futex_unlock+0xf0/0xf0 [ 2020.806535] ? rcu_nmi_exit+0xb3/0x180 [ 2020.810538] call_rwsem_down_read_failed+0x14/0x30 [ 2020.816580] down_read+0x44/0x80 16:35:04 executing program 1: syz_mount_image$hfs(&(0x7f0000000240), &(0x7f0000000380)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x3, &(0x7f0000000780)=ANY=[@ANYBLOB='quiet,gid=', @ANYRESHEX, @ANYBLOB="2c2a7270653d7614866b2c75693df589299908000000450000005d38ff0c0071446a0c48dba349ba347528523876dc8d7918ecea1024ba9669ff19a9ab5e27062b1dae8d8c0eb880008164ed9d8093fdc35f282dee56df9531b6e0c94b43c314af69146a70075499da5e7f927d3c672787e3d33a6071ff2c1483a1a7cfb34131bfee72f86068d0966d", @ANYRESHEX, @ANYBLOB=',codepage=ascii,rootcontext=sysadm_u,\x00'], 0x1, 0x235, &(0x7f0000000000)="$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") [ 2020.820440] ? iterate_supers+0xdb/0x290 [ 2020.836029] iterate_supers+0xdb/0x290 [ 2020.840001] ? __ia32_sys_tee+0xf0/0xf0 [ 2020.844497] ksys_sync+0x86/0x150 [ 2020.847973] ? vfs_fsync+0x1f0/0x1f0 [ 2020.851692] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 2020.857914] ? trace_hardirqs_off_caller+0x6e/0x210 [ 2020.883202] ? do_syscall_64+0x21/0x620 [ 2020.892613] hfs: uid requires an argument [ 2020.899038] hfs: unable to parse mount options [ 2020.910374] __ia32_sys_sync+0xa/0x10 [ 2020.915295] do_syscall_64+0xf9/0x620 [ 2020.919481] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2020.929794] RIP: 0033:0x7fafcb80a0c9 [ 2020.934012] Code: Bad RIP value. [ 2020.937383] RSP: 002b:00007fafc9d7c168 EFLAGS: 00000246 ORIG_RAX: 00000000000000a2 [ 2020.944872] hfs: invalid gid -1 [ 2020.945197] RAX: ffffffffffffffda RBX: 00007fafcb929f80 RCX: 00007fafcb80a0c9 [ 2020.961786] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 2020.965068] hfs: unable to parse mount options 16:35:05 executing program 3: getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(0xffffffffffffffff, 0x84, 0x6c, &(0x7f0000000280)={0x0, 0x3e, "23bb5db575ca3d616b8240c8d4bb9547fef8bb0b27bc026111aa738eebf87c3a0077025a76e167e4ca8fee2d3aae08a6376c7e34cba7472c66c7bcdaa37e"}, &(0x7f0000000400)=0x46) setsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(0xffffffffffffffff, 0x84, 0x75, &(0x7f0000000440)={r0, 0x7}, 0x8) perf_event_open(&(0x7f000001d000)={0x5, 0x80, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x6450, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000140)={0x0, 0x0}, &(0x7f0000cab000)=0x6e) syz_mount_image$hfs(&(0x7f0000000240), &(0x7f0000000380)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x3, &(0x7f0000000300)={[{}, {@part={'part', 0x3d, 0x10001}}, {@type={'type', 0x3d, "7614866b"}}, {@uid={'uid', 0x3d, r2}}, {@umask={'umask', 0x3d, 0x7fffffffffffffff}}], [{@rootcontext={'rootcontext', 0x3d, 'unconfined_u'}}]}, 0x1, 0x235, &(0x7f0000000000)="$eJzs3c9qE1EUx/HfvYkabanTPyK4rBZcSVs34kaQPIQrUZsIxVBBK6grcS0+gHtfwYdwJb6Arlz5ANmN3DM3zTRmMmk1ubT9fiBh2rln5pzOTO89gVIBOLPut398vv0rvJzUUEPSXclLaklNSVd0tfVqb393v9ftTDpQwyLCy6mIdH+N2dnrjgsNcRYRZeGrphbL38Ns5Hme/0ydBJKzp38ML12IT6ftb809s9l4lzqBxFxffb3WUuo8AABpxfnfx3l+Ma7fvZc24rR/qub/fuoEEivN/9Zl5S5c38u2a9jvWQsX9vtBl3icc51XcWcdWmC6uq7ScvEXn+72urd2nvc6Xu91LyoNW7P3TnHrDtRkuz6mN53g+LUvWA3nQg3bFfmv/t8z1nNf3Tf30GX6pM7B+q+Zu3CZ7EplI1eqyH+z+ohWZVaMqqhy2U5yLZ4hqqmyNb4j0eCOWtbhDwiyujwtamUkqqhuqyZqdWzUdk3U2mjU8G6ujpw199E9cOv6rS9ql9b/Pvy0NzTNkxnG2Mh4Z0ysp2kjsykS80cqA//mg57ojpZevnn77HGv133BBhtssHGwkfoXFOZheNFTZ4JEwrrLFf1fqV/ZtBYpvGUT1ul53cFLR9yq6A1W7P3SkTq4heoObtqe6/pN6cb0Z8xinqeEa+u7HvH5PwAAAAAAAAAAAAAAAAAAwEkzjz8nSF0jAAAAAAAAAAAAAAAAAAAAAAAnHf//Fzi7/gQAAP//6oSCGA==") [ 2020.981316] RBP: 00007fafcb865ae9 R08: 0000000000000000 R09: 0000000000000000 [ 2020.989002] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 2020.996386] R13: 00007fff6bb89eaf R14: 00007fafc9d7c300 R15: 0000000000022000 [ 2021.021869] [ 2021.021869] Showing all locks held in the system: 16:35:05 executing program 1: syz_mount_image$hfs(&(0x7f0000000240), &(0x7f0000000380)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x3, &(0x7f0000000780)=ANY=[@ANYBLOB='quiet,gid=', @ANYRESHEX, @ANYBLOB="2c2a7270653d7614866b2c75693df589299908000000450000005d38ff0c0071446a0c48dba349ba347528523876dc8d7918ecea1024ba9669ff19a9ab5e27062b1dae8d8c0eb880008164ed9d8093fdc35f282dee56df9531b6e0c94b43c314af69146a70075499da5e7f927d3c672787e3d33a6071ff2c1483a1a7cfb34131bfee72f86068d0966d", @ANYRESHEX, @ANYBLOB=',codepage=ascii,rootcontext=sysadm_u,\x00'], 0x1, 0x235, &(0x7f0000000000)="$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") [ 2021.063302] 1 lock held by khungtaskd/1570: [ 2021.082412] new mount options do not match the existing superblock, will be ignored [ 2021.086367] #0: 000000000f29a81d (rcu_read_lock){....}, at: debug_show_all_locks+0x53/0x265 [ 2021.136983] 1 lock held by systemd-udevd/4696: [ 2021.138963] hfs: uid requires an argument [ 2021.146358] 1 lock held by in:imklog/7781: [ 2021.151664] hfs: invalid gid -1 [ 2021.155290] #0: 000000001dfb533b (&f->f_pos_lock){+.+.}, at: __fdget_pos+0x26f/0x310 [ 2021.173026] new mount options do not match the existing superblock, will be ignored 16:35:05 executing program 0: r0 = request_key(0x0, 0x0, 0x0, 0xfffffffffffffffd) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) r1 = add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000740)=@filename='./file0\x00', &(0x7f0000000780)='./file0\x00', &(0x7f0000000840)='gadgetfs\x00', 0x0, &(0x7f0000000880)='keyring\x00') perf_event_open(&(0x7f00000007c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x12c00, 0x0, 0xe5e}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) writev(0xffffffffffffffff, 0x0, 0x0) r2 = add_key(0x0, &(0x7f0000000280)={'syz', 0x3}, &(0x7f0000019a40)="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", 0x5bd, 0xfffffffffffffffd) keyctl$read(0xb, r2, &(0x7f0000000a40)=""/102400, 0x19000) keyctl$search(0xa, r2, &(0x7f00000008c0)='keyring\x00', &(0x7f0000000900)={'syz', 0x1}, 0xfffffffffffffffd) request_key(&(0x7f00000006c0)='dns_resolver\x00', &(0x7f0000000700)={'syz', 0x3}, 0x0, 0xfffffffffffffffd) r3 = add_key(&(0x7f0000000380)='id_resolver\x00', &(0x7f0000000400)={'syz', 0x3}, &(0x7f0000000440)="e09e6dda135ac7c467011f", 0xb, r0) keyctl$search(0xa, r1, 0x0, &(0x7f0000000340)={'syz', 0x1}, r3) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000140)='cpuset\x00', 0x0, 0x0) add_key$keyring(&(0x7f0000000100), &(0x7f0000000180)={'syz', 0x0}, 0x0, 0x0, r0) r4 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r5 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) open(&(0x7f00000002c0)='./file0\x00', 0x98d00, 0x8) request_key(&(0x7f0000000580)='logon\x00', 0x0, &(0x7f0000000600)='\x1f-)\x00', 0xfffffffffffffff9) add_key$fscrypt_provisioning(&(0x7f0000000480), &(0x7f00000004c0)={'syz', 0x0}, &(0x7f0000000640)=ANY=[], 0x48, r0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = openat$cgroup_int(r4, &(0x7f00000001c0)='cpuset.sched_load_balance\x00', 0x2, 0x0) dup3(r7, r4, 0x0) r8 = add_key$keyring(&(0x7f0000000540), &(0x7f0000000640)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffc) r9 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000980), 0x200000, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r5, 0x81f8943c, &(0x7f000001a000)={0x0, ""/256, 0x0, 0x0, 0x0, 0x0, ""/16, ""/16, ""/16, 0x0}) ioctl$BTRFS_IOC_SUBVOL_CREATE_V2(r6, 0x50009418, &(0x7f000001a200)={{r9}, r10, 0x2, @inherit={0x58, &(0x7f00000009c0)={0x1, 0x2, 0x8, 0x7, {0x14, 0x1000, 0x5, 0x7}, [0xffff, 0x0]}}, @subvolid=0x4}) keyctl$search(0xa, r3, 0x0, &(0x7f0000000500)={'syz', 0x0}, r8) writev(r4, &(0x7f0000000300)=[{&(0x7f00000000c0)='0', 0xd300}, {&(0x7f00000003c0)='7', 0x1}], 0x2) [ 2021.190739] hfs: unable to parse mount options [ 2021.202416] new mount options do not match the existing superblock, will be ignored [ 2021.203177] hfs: unable to parse mount options 16:35:05 executing program 2: r0 = request_key(0x0, 0x0, 0x0, 0xfffffffffffffffd) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) perf_event_open(&(0x7f00000007c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0xe5e}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) keyctl$read(0xb, 0x0, &(0x7f0000000a40)=""/102400, 0x19000) keyctl$search(0xa, 0x0, &(0x7f00000008c0)='keyring\x00', &(0x7f0000000900)={'syz', 0x1}, 0xfffffffffffffffd) request_key(&(0x7f00000006c0)='dns_resolver\x00', &(0x7f0000000700)={'syz', 0x3}, &(0x7f0000000940)='\x00', 0xfffffffffffffffd) add_key(0x0, &(0x7f0000000400)={'syz', 0x3}, &(0x7f0000000440), 0x0, r0) keyctl$search(0xa, 0x0, 0x0, &(0x7f0000000340)={'syz', 0x1}, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000140)='cpuset\x00', 0x0, 0x0) add_key$keyring(&(0x7f0000000100), 0x0, 0x0, 0x0, r0) r1 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) request_key(0x0, &(0x7f00000005c0)={'syz', 0x0}, 0x0, 0xfffffffffffffff9) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = openat$cgroup_int(r1, &(0x7f00000001c0)='cpuset.sched_load_balance\x00', 0x2, 0x0) dup3(r3, r1, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x200000, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f000001a000)={0x0, ""/256, 0x0, 0x0, 0x0, 0x0, ""/16, ""/16, ""/16, 0x0}) ioctl$BTRFS_IOC_SUBVOL_CREATE_V2(r2, 0x50009418, &(0x7f000001a200)={{}, r4, 0x2, @inherit={0x58, &(0x7f00000009c0)={0x1, 0x2, 0x8, 0x0, {0x0, 0x0, 0x0, 0x0, 0x4}, [0x0, 0x0]}}, @subvolid=0x4}) ioctl$BTRFS_IOC_BALANCE(0xffffffffffffffff, 0x5000940c, 0x0) keyctl$search(0xa, 0x0, &(0x7f0000000200)='keyring\x00', &(0x7f0000000500)={'syz', 0x0}, 0x0) writev(r1, &(0x7f0000000300)=[{&(0x7f00000000c0)='0', 0x1}, {&(0x7f00000003c0), 0x200003c0}], 0x2) 16:35:05 executing program 5: r0 = request_key(0x0, 0x0, 0x0, 0xfffffffffffffffd) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) r1 = add_key$keyring(0x0, &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000740)=@filename='./file0\x00', &(0x7f0000000780)='./file0\x00', &(0x7f0000000840)='gadgetfs\x00', 0x10, &(0x7f0000000880)='keyring\x00') perf_event_open(&(0x7f00000007c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x12c00}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) writev(0xffffffffffffffff, 0x0, 0x0) r2 = add_key(&(0x7f0000000240)='big_key\x00', &(0x7f0000000280)={'syz', 0x3}, &(0x7f0000019a40)="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", 0x5bd, 0xfffffffffffffffd) keyctl$read(0xb, r2, &(0x7f0000000a40)=""/102400, 0x19000) keyctl$search(0xa, r2, &(0x7f00000008c0)='keyring\x00', &(0x7f0000000900)={'syz', 0x1}, 0xfffffffffffffffd) request_key(&(0x7f00000006c0)='dns_resolver\x00', &(0x7f0000000700)={'syz', 0x3}, &(0x7f0000000940)='\x00', 0xfffffffffffffffd) r3 = add_key(&(0x7f0000000380)='id_resolver\x00', &(0x7f0000000400)={'syz', 0x3}, &(0x7f0000000440)="e09e6dda135ac7c467011f", 0xb, r0) keyctl$search(0xa, r1, 0x0, &(0x7f0000000340)={'syz', 0x1}, r3) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000140)='cpuset\x00', 0x0, 0x0) add_key$keyring(&(0x7f0000000100), &(0x7f0000000180)={'syz', 0x0}, 0x0, 0x0, r0) r4 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r5 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) request_key(&(0x7f0000000580)='logon\x00', &(0x7f00000005c0)={'syz', 0x0}, &(0x7f0000000600)='\x1f-)\x00', 0xfffffffffffffff9) add_key$fscrypt_provisioning(&(0x7f0000000480), &(0x7f00000004c0)={'syz', 0x0}, &(0x7f0000000640)=ANY=[], 0x48, r0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = openat$cgroup_int(r4, &(0x7f00000001c0)='cpuset.sched_load_balance\x00', 0x2, 0x0) dup3(r7, r4, 0x0) add_key$keyring(&(0x7f0000000540), &(0x7f0000000640)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffc) r8 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000980), 0x200000, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r5, 0x81f8943c, &(0x7f000001a000)={0x0, ""/256, 0x0, 0x0, 0x0, 0x0, ""/16, ""/16, ""/16, 0x0}) ioctl$BTRFS_IOC_SUBVOL_CREATE_V2(r6, 0x50009418, &(0x7f000001a200)={{r8}, r9, 0x2, @inherit={0x58, &(0x7f00000009c0)={0x1, 0x2, 0x8, 0x7, {0x14, 0x1000, 0x5, 0x7, 0x4}, [0xffff, 0x3]}}, @subvolid=0x4}) writev(r4, &(0x7f0000000300)=[{&(0x7f00000000c0)='0', 0x1}, {&(0x7f00000003c0)='7', 0x1}], 0x2) [ 2021.237993] new mount options do not match the existing superblock, will be ignored [ 2021.256827] 2 locks held by kworker/u4:5/8821: [ 2021.262396] 3 locks held by kworker/1:2/11393: 16:35:05 executing program 1: syz_mount_image$hfs(&(0x7f0000000240), &(0x7f0000000380)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x3, &(0x7f0000000780)=ANY=[@ANYBLOB='quiet,gid=', @ANYRESHEX, @ANYBLOB="2c2a7270653d7614866b2c75693df589299908000000450000005d38ff0c0071446a0c48dba349ba347528523876dc8d7918ecea1024ba9669ff19a9ab5e27062b1dae8d8c0eb880008164ed9d8093fdc35f282dee56df9531b6e0c94b43c314af69146a70075499da5e7f927d3c672787e3d33a6071ff2c1483a1a7cfb34131bfee72f86068d0966d", @ANYRESHEX, @ANYBLOB=',codepage=ascii,rootcontext=sysadm_u,\x00'], 0x1, 0x235, &(0x7f0000000000)="$eJzs3c9q1FAUx/HfvR11tKWmf0RwWS24krZuxI0g8xCuRO2MUBwqaAV1Ja7FB3DvK/gQrsQX0JUrH2B2kXtyp03HZDKtzlzafj8wIW3uSc5pkuaeQKkAnFn3Oz8+3/4VPk6a05yku5KX1JZakq7oavvV7t7OXr/XHbejOYsIH6ci0v01Znu3VxUa4iwiysJXLS2Uv4fpyPM8/5k6CSRnd38FL12Id6dtb888s+l4lzqBxNxAA73WYuo8AABpxee/j8/5hTh/915aj4/9U/X8H6ROILHS89+6rNyF83vZNh30e9bChe1+2CUe51jnVVxZhyaYrqmrtFz8xac7/d6t7ef9rtd73YtKw1Zt2S0u3aGGbNcqetMxjl/7vNVwLtSwVZP/yv89YjP31X1zD12mT+ruz/9auQunyc5UNnKmivw36vdoVWbFqJoql+wg1+IRooYq29UdiYZX1JIOvyDImvK0qOWRqKK6zYaolcqorYao1ZGXIKWruT5y2txH98Ct6be+qFOa//vw017XJHdmGGMj45Uxtp6WjcwmSMwfqQz8mw96ojtafPnm7bPH/X7vBSussMLK/krqX1CYhYOTnjoTJBLmXa7o/0r9yobNXMMiGzNPz5t2XtrjZk1vsGzLS0fq4ObrO7hJe67rN6Ubkx8xi3meEq6j73rE+38AAAAAAAAAAAAAAAAAAICTZhZ/TpC6RgAAAAAAAAAAAAAAAAAAAAAATjr+/y9wdv0JAAD//6qVghU=") [ 2021.290413] #0: 00000000218556c6 ((wq_completion)"events"){+.+.}, at: process_one_work+0x767/0x1570 [ 2021.301431] #1: 000000007eba3768 (key_gc_work){+.+.}, at: process_one_work+0x79c/0x1570 [ 2021.310103] #2: 000000002daa78f5 (rcu_preempt_state.exp_mutex){+.+.}, at: _synchronize_rcu_expedited+0x4dc/0x6f0 [ 2021.321506] 4 locks held by kworker/u4:0/21175: [ 2021.326655] #0: 000000004e840e4f (&rq->lock){-.-.}, at: __schedule+0x1f9/0x2040 16:35:05 executing program 3: getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(0xffffffffffffffff, 0x84, 0x6c, &(0x7f0000000280)={0x0, 0x3e, "23bb5db575ca3d616b8240c8d4bb9547fef8bb0b27bc026111aa738eebf87c3a0077025a76e167e4ca8fee2d3aae08a6376c7e34cba7472c66c7bcdaa37e"}, &(0x7f0000000400)=0x46) setsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(0xffffffffffffffff, 0x84, 0x75, &(0x7f0000000440)={r0, 0x7}, 0x8) (async) perf_event_open(&(0x7f000001d000)={0x5, 0x80, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x6450, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) r1 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000140)={0x0, 0x0}, &(0x7f0000cab000)=0x6e) syz_mount_image$hfs(&(0x7f0000000240), &(0x7f0000000380)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x3, &(0x7f0000000300)={[{}, {@part={'part', 0x3d, 0x10001}}, {@type={'type', 0x3d, "7614866b"}}, {@uid={'uid', 0x3d, r2}}, {@umask={'umask', 0x3d, 0x7fffffffffffffff}}], [{@rootcontext={'rootcontext', 0x3d, 'unconfined_u'}}]}, 0x1, 0x235, &(0x7f0000000000)="$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") [ 2021.334355] #1: 000000000f29a81d (rcu_read_lock){....}, at: update_curr+0x2c3/0x870 [ 2021.342451] #2: 000000001a1967c0 (&wdev->mtx){+.+.}, at: ieee80211_ibss_work+0x85/0xe10 [ 2021.351551] #3: 000000000f29a81d (rcu_read_lock){....}, at: update_curr+0x2c3/0x870 [ 2021.373757] 2 locks held by kworker/1:4/18417: [ 2021.378393] #0: 00000000f610076c ((wq_completion)"rcu_gp"){+.+.}, at: process_one_work+0x767/0x1570 [ 2021.387841] #1: 00000000f68d681f ((work_completion)(&rew.rew_work)){+.+.}, at: process_one_work+0x79c/0x1570 [ 2021.398223] 1 lock held by syz-executor.0/12036: [ 2021.403045] #0: 0000000023972783 (&type->s_umount_key#50/1){+.+.}, at: sget_userns+0x20b/0xcd0 16:35:05 executing program 4: r0 = request_key(0x0, 0x0, 0x0, 0xfffffffffffffffd) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) r1 = add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000780)='./file0\x00', &(0x7f0000000840)='gadgetfs\x00', 0x0, &(0x7f0000000880)='keyring\x00') perf_event_open(&(0x7f00000007c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x12c00, 0x0, 0xe5e}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) writev(0xffffffffffffffff, 0x0, 0x0) keyctl$read(0xb, 0x0, &(0x7f0000000a40)=""/102400, 0x19000) keyctl$search(0xa, 0x0, 0x0, 0x0, 0xfffffffffffffffd) request_key(&(0x7f00000006c0)='dns_resolver\x00', &(0x7f0000000700)={'syz', 0x3}, &(0x7f0000000940)='\x00', 0xfffffffffffffffd) r2 = add_key(&(0x7f0000000380)='id_resolver\x00', 0x0, &(0x7f0000000440), 0x0, r0) keyctl$search(0xa, r1, 0x0, &(0x7f0000000340)={'syz', 0x1}, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000140)='cpuset\x00', 0x0, 0x0) add_key$keyring(&(0x7f0000000100), &(0x7f0000000180)={'syz', 0x0}, 0x0, 0x0, r0) r3 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r4 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) open(0x0, 0x0, 0x8) request_key(&(0x7f0000000580)='logon\x00', &(0x7f00000005c0)={'syz', 0x0}, &(0x7f0000000600)='\x1f-)\x00', 0xfffffffffffffff9) write$rfkill(r4, &(0x7f0000000040)={0x0, 0x0, 0x3}, 0x8) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = openat$cgroup_int(r3, &(0x7f00000001c0)='cpuset.sched_load_balance\x00', 0x2, 0x0) dup3(r6, r3, 0x0) r7 = add_key$keyring(&(0x7f0000000540), &(0x7f0000000640)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffc) r8 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000980), 0x200000, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r4, 0x81f8943c, &(0x7f000001a000)={0x0, ""/256, 0x0, 0x0, 0x0, 0x0, ""/16, ""/16, ""/16, 0x0}) ioctl$BTRFS_IOC_SUBVOL_CREATE_V2(r5, 0x50009418, &(0x7f000001a200)={{r8}, r9, 0x2, @inherit={0x58, &(0x7f00000009c0)={0x1, 0x2, 0x8, 0x7, {0x14, 0x1000, 0x5, 0x7, 0x4}, [0xffff, 0x3]}}, @subvolid=0x4}) ioctl$BTRFS_IOC_BALANCE(r5, 0x5000940c, 0x0) keyctl$search(0xa, r2, &(0x7f0000000200)='keyring\x00', &(0x7f0000000500)={'syz', 0x0}, r7) writev(r3, &(0x7f0000000300)=[{&(0x7f00000000c0)='0', 0x1}, {&(0x7f00000003c0)='7', 0x1}], 0x2) [ 2021.435830] 1 lock held by syz-executor.0/12123: [ 2021.441231] #0: 000000002daa78f5 (rcu_preempt_state.exp_mutex){+.+.}, at: _synchronize_rcu_expedited+0x256/0x6f0 [ 2021.442619] hfs: invalid gid -1 [ 2021.453992] 1 lock held by syz-executor.5/16047: [ 2021.462659] hfs: uid requires an argument [ 2021.462953] #0: 0000000023972783 (&type->s_umount_key#52){++++}, at: iterate_supers+0xdb/0x290 [ 2021.476014] hfs: unable to parse mount options 16:35:05 executing program 3: getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(0xffffffffffffffff, 0x84, 0x6c, &(0x7f0000000280)={0x0, 0x3e, "23bb5db575ca3d616b8240c8d4bb9547fef8bb0b27bc026111aa738eebf87c3a0077025a76e167e4ca8fee2d3aae08a6376c7e34cba7472c66c7bcdaa37e"}, &(0x7f0000000400)=0x46) setsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(0xffffffffffffffff, 0x84, 0x75, &(0x7f0000000440)={r0, 0x7}, 0x8) (async) perf_event_open(&(0x7f000001d000)={0x5, 0x80, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x6450, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) r1 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000140)={0x0, 0x0}, &(0x7f0000cab000)=0x6e) syz_mount_image$hfs(&(0x7f0000000240), &(0x7f0000000380)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x3, &(0x7f0000000300)={[{}, {@part={'part', 0x3d, 0x10001}}, {@type={'type', 0x3d, "7614866b"}}, {@uid={'uid', 0x3d, r2}}, {@umask={'umask', 0x3d, 0x7fffffffffffffff}}], [{@rootcontext={'rootcontext', 0x3d, 'unconfined_u'}}]}, 0x1, 0x235, &(0x7f0000000000)="$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") [ 2021.485155] 1 lock held by syz-executor.1/23657: [ 2021.490009] hfs: unable to parse mount options [ 2021.496031] 1 lock held by syz-executor.3/23661: [ 2021.521177] #0: 000000004e840e4f (&rq->lock){-.-.}, at: __schedule+0x1f9/0x2040 [ 2021.538811] 2 locks held by syz-executor.3/23666: [ 2021.544593] #0: 00000000276d2aad (&rq->lock){-.-.}, at: __schedule+0x1f9/0x2040 [ 2021.552229] #1: 000000000f29a81d (rcu_read_lock){....}, at: update_curr+0x2c3/0x870 [ 2021.560980] 1 lock held by syz-executor.3/23668: [ 2021.566626] #0: 00000000c08acd02 (&bdev->bd_mutex){+.+.}, at: __blkdev_get+0x1d0/0x1480 [ 2021.575963] [ 2021.577925] ============================================= [ 2021.577925] [ 2021.586938] NMI backtrace for cpu 1 [ 2021.590630] CPU: 1 PID: 1570 Comm: khungtaskd Not tainted 4.19.211-syzkaller #0 [ 2021.598075] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/26/2022 [ 2021.607423] Call Trace: [ 2021.610002] dump_stack+0x1fc/0x2ef [ 2021.613628] nmi_cpu_backtrace.cold+0x63/0xa2 [ 2021.618119] ? lapic_can_unplug_cpu+0x80/0x80 [ 2021.622608] nmi_trigger_cpumask_backtrace+0x1a6/0x1f0 [ 2021.627884] watchdog+0x991/0xe60 [ 2021.631333] ? reset_hung_task_detector+0x30/0x30 [ 2021.636163] kthread+0x33f/0x460 [ 2021.639516] ? kthread_park+0x180/0x180 [ 2021.643486] ret_from_fork+0x24/0x30 [ 2021.648012] Sending NMI from CPU 1 to CPUs 0: [ 2021.653056] NMI backtrace for cpu 0 [ 2021.653062] CPU: 0 PID: 23672 Comm: syz-executor.0 Not tainted 4.19.211-syzkaller #0 [ 2021.653068] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/26/2022 [ 2021.653073] RIP: 0010:debug_check_no_obj_freed+0x101/0x490 [ 2021.653084] Code: 00 00 49 bc 00 02 00 00 00 00 ad de 4c 89 c0 31 ed 48 c1 e8 03 42 80 3c 38 00 0f 85 dd 00 00 00 49 8d 78 18 83 c5 01 4d 8b 30 <48> 89 f8 48 c1 e8 03 42 80 3c 38 00 0f 85 65 02 00 00 4d 8b 48 18 [ 2021.653088] RSP: 0018:ffff888027f0f998 EFLAGS: 00000002 [ 2021.653096] RAX: 1ffff11013a02596 RBX: 0000000000000000 RCX: ffffffff814bdebb [ 2021.653101] RDX: 1ffffffff1a89c1b RSI: 0000000000000004 RDI: ffff88809d012cc8 [ 2021.653106] RBP: 0000000000000001 R08: ffff88809d012cb0 R09: fffffbfff1a89c19 [ 2021.653111] R10: ffffffff8d44e0cb R11: 0000000000000000 R12: dead000000000200 16:35:05 executing program 0: r0 = request_key(0x0, 0x0, 0x0, 0xfffffffffffffffd) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) r1 = add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000740)=@filename='./file0\x00', &(0x7f0000000780)='./file0\x00', &(0x7f0000000840)='gadgetfs\x00', 0x0, &(0x7f0000000880)='keyring\x00') perf_event_open(&(0x7f00000007c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x12c00, 0x0, 0xe5e}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) writev(0xffffffffffffffff, 0x0, 0x0) r2 = add_key(0x0, &(0x7f0000000280)={'syz', 0x3}, &(0x7f0000019a40)="4195738ac28ccd83aa93c4ecacdaca3d34104be4cc5531c4091facf7f777321e84e49e039122a2d1cf7fea6a02aac8944c27ba038156bc10c0f7a6b26fbf382f67959d856600881f0e692c60f12ace775aab8d775dc2586454918a0db1811f5e8086f1a9805166c870b8387d380d5115af5841dad21f629e05f4b51e362c46b58a7dc2855c5189bff60d02c05ba67c297aa0ad05b93b1ee2fffae13fe5764d4e2a214e15093841b1551d518a669fa94e8918bfdd6573d5c0275a9b91ddb843775f78574891e03697f6ca290be6599b671093898a82e7905ed7c7fd8e8b422ebf12e5b543885596fc5c305d497407ffe73bd543f79c983f0807ae7e13fb5053fd7a07dddf8ec739418b59d67219f008f540161cec3bfd1b3097aad497248b221d572a9eb1bad6d921fcdcfdfacf8d1e392635168747056ec8a3fc45b3027293a517d50ea789294f132f2392919dc81ba5eb02e27e116cc300000000b6c0e39688425a3cb17d35f4b1eec0a37193f233c6655c6f40c09b4ea04c8880a431a8274127d56c3c8cab73a5fcf2b604b83658344e323eeedb0b283b0b3616236e904a42fed9fc8f4c131b047bfd5d7586e6a28032a4584fd5933472ce49dfdc99976166bb37eb1679b22249a222ffab17948dd6cc6f23f42ecd32a980ab8fc7c7d2da1a91f1db1187066c144bcbdb46240b7ef7ed28da4a358295b6104e4c60b09654e79f766e19e44174e94fa41d358d3dd901c060a06a388727be1092a37c0015695b1363ed018e724947983aa6b5974daf6388547cdacbd44a1282c3b9130cbf9536c29a523980b9e4328d1a7c0de8b636d7dfdee36434125948b1d802d5d143645c3a5f8da50adeef6e4f715361908a20cb998d3e0907aef9fdd19bb79be8c510b8aa04600163636c1d1f36f3834ffa3c7369e1d8ed9348bc339da2a525c4f165c0caebb7a4ee632a37a43897084e3c07a5ed8b505a51a4777095060b0ff6a6442206244dd9a13b5ba52b07c718e9eaad10befd12be35dc50283d584035d75e4917548ff58045b88d29b6826ceb6d44fb54ba3ef7944da6e86c0f2d0bc0bd725aa9193b3de4837634ead361d9b2ff5ae4de005f53d48cba029b43eb35fbedd0b5397918a9324b6e1f1d88399d8ad69b7d79e89ded6fe81fd1200f95c831f8c60dc1483e97052f61d0a643df0c2e1b0ba7d00b0692efd1bfc1ece10c2e785e3cb3b0dfbdbd722b6e53e5a2884b1cc5d939a572564bc8a2260e8718230878edb3a877f5c585f4373ef8e0e1cff5dacf96862906ff37eec18ba706d22b101965eaf5f5e29f544977896117e25ceb572f3443eddf9651c2ac69c911b21fd69e59ee57ebe4c549ff2a3dcd904656663039789f022a6caa7f76640e75efdba82dabacf8c0112bd4e62a3a9e69a9824c1af45cf86b307d9749937dd08b6ef49860cda5da7bb886f92db7cd43a869aa646a6da291a75ff28c4d728b1377b8e80233b33e724a60c0a015ec75cd86af04a4bd43964d8f7ba781a99d0cd7ff7e189fc91801655cb1b60e6bc3af747655341deceadbed3d76bdfae92389cc87c417e0f58f3fbcc56ff347467a20773146a81090ff42bbb5383d74108028f5fa532c647746054c312e2e4c085f58d93bec6da7c2bfd99fc59c1631cc71110acc2bf352b994e2a246be3cc1d240fa0c60eb04b92a9673d2ac2bba7f322ddbbd74712b0ec459050586523bd0b0505174a701206e47f2bb7fe20caf5ed73d33447b89432802e7d4606512e217aedf78c871e10cfbdf202efbf3fd8495b6be18cde726dc1fefc01921e9d1f15c8301376c33b5a698d0f7d5f317835d74857e121fe820d93f6b757c9938ec81f9b19a4b0d4ed35d1309fbcb285cf7717e9e27aaaba9d7d742fcfd786eacd993fb119e1d52908ca7ce2135046fa95805704c6258fd1b5fc1434af7ab99609820d73627080d43bcaeeb42ce423e17aa4df3a6994ead3133e2ecfbc6fa308c6b71b78cbab273641970b49e15d0dbe7aea716eaf6cf40f90d0d7d3d8bf1d165d25d5f6f6376416b9dd13731c5c2fdadee8e48c76430cccb21d8e6c659", 0x5bd, 0xfffffffffffffffd) keyctl$read(0xb, r2, &(0x7f0000000a40)=""/102400, 0x19000) keyctl$search(0xa, r2, &(0x7f00000008c0)='keyring\x00', &(0x7f0000000900)={'syz', 0x1}, 0xfffffffffffffffd) request_key(&(0x7f00000006c0)='dns_resolver\x00', &(0x7f0000000700)={'syz', 0x3}, 0x0, 0xfffffffffffffffd) r3 = add_key(&(0x7f0000000380)='id_resolver\x00', &(0x7f0000000400)={'syz', 0x3}, &(0x7f0000000440)="e09e6dda135ac7c467011f", 0xb, r0) keyctl$search(0xa, r1, 0x0, &(0x7f0000000340)={'syz', 0x1}, r3) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000140)='cpuset\x00', 0x0, 0x0) add_key$keyring(&(0x7f0000000100), &(0x7f0000000180)={'syz', 0x0}, 0x0, 0x0, r0) r4 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r5 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) open(&(0x7f00000002c0)='./file0\x00', 0x98d00, 0x8) request_key(&(0x7f0000000580)='logon\x00', 0x0, &(0x7f0000000600)='\x1f-)\x00', 0xfffffffffffffff9) add_key$fscrypt_provisioning(&(0x7f0000000480), &(0x7f00000004c0)={'syz', 0x0}, &(0x7f0000000640)=ANY=[], 0x48, r0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = openat$cgroup_int(r4, &(0x7f00000001c0)='cpuset.sched_load_balance\x00', 0x2, 0x0) dup3(r7, r4, 0x0) r8 = add_key$keyring(&(0x7f0000000540), &(0x7f0000000640)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffc) r9 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000980), 0x200000, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r5, 0x81f8943c, &(0x7f000001a000)={0x0, ""/256, 0x0, 0x0, 0x0, 0x0, ""/16, ""/16, ""/16, 0x0}) ioctl$BTRFS_IOC_SUBVOL_CREATE_V2(r6, 0x50009418, &(0x7f000001a200)={{r9}, r10, 0x2, @inherit={0x58, &(0x7f00000009c0)={0x1, 0x2, 0x8, 0x7, {0x14, 0x1000, 0x5, 0x7}, [0xffff, 0x0]}}, @subvolid=0x4}) keyctl$search(0xa, r3, 0x0, &(0x7f0000000500)={'syz', 0x0}, r8) writev(r4, &(0x7f0000000300)=[{&(0x7f00000000c0)='0', 0xd400}, {&(0x7f00000003c0)='7', 0x1}], 0x2) [ 2021.653116] R13: ffff888036c14000 R14: ffff8880939600e0 R15: dffffc0000000000 [ 2021.653121] FS: 0000555556b00400(0000) GS:ffff8880ba000000(0000) knlGS:0000000000000000 [ 2021.653126] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 2021.653131] CR2: 00007ffce93d1040 CR3: 000000009b75a000 CR4: 00000000003406f0 [ 2021.653136] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 2021.653142] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000600 [ 2021.653145] Call Trace: [ 2021.653148] __free_pages_ok+0x22d/0xd30 [ 2021.653151] slabs_destroy+0x90/0xd0 [ 2021.653155] ___cache_free+0x295/0x3a0 [ 2021.653158] qlist_free_all+0x79/0x140 [ 2021.653162] quarantine_reduce+0x1a9/0x230 [ 2021.653165] kasan_kmalloc+0xa2/0x160 [ 2021.653169] ? mark_held_locks+0xf0/0xf0 [ 2021.653172] ? tun_get+0x16d/0x290 [ 2021.653176] ? gfp_pfmemalloc_allowed+0x150/0x150 [ 2021.653179] ? wake_up_q+0xe0/0xe0 [ 2021.653183] ? cache_alloc_refill+0x2f8/0x340 [ 2021.653186] ? lock_downgrade+0x720/0x720 [ 2021.653190] ? do_raw_spin_lock+0xcb/0x220 [ 2021.653194] ? do_raw_spin_unlock+0x171/0x230 [ 2021.653197] ? _raw_spin_unlock+0x29/0x40 [ 2021.653208] ? cache_alloc_refill+0x2f8/0x340 [ 2021.653211] ? kmem_cache_alloc+0x2b1/0x370 [ 2021.653215] kmem_cache_alloc+0x110/0x370 [ 2021.653218] getname_flags+0xce/0x590 [ 2021.653221] ? vfs_read+0x15c/0x3c0 [ 2021.653224] do_symlinkat+0x86/0x2c0 [ 2021.653228] ? ksys_read+0x1c8/0x2a0 [ 2021.653231] ? __ia32_sys_unlink+0x50/0x50 [ 2021.653236] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 2021.653240] ? trace_hardirqs_off_caller+0x6e/0x210 [ 2021.653243] ? do_syscall_64+0x21/0x620 [ 2021.653246] do_syscall_64+0xf9/0x620 [ 2021.653250] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2021.653254] RIP: 0033:0x7f57810d0a07 [ 2021.653264] Code: 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 0a 01 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 2021.653268] RSP: 002b:00007ffce93d0f78 EFLAGS: 00000202 ORIG_RAX: 000000000000010a [ 2021.653277] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f57810d0a07 [ 2021.653282] RDX: 00007f578112cb8a RSI: 00000000ffffff9c RDI: 00007f578112b713 [ 2021.653287] RBP: 0000000000000000 R08: 0000000000000000 R09: 00007ffce93d09f0 [ 2021.653292] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000000000001 [ 2021.653297] R13: 0000000000000000 R14: 0000000000000001 R15: 00007ffce93d1040 [ 2021.681431] Kernel panic - not syncing: hung_task: blocked tasks [ 2021.729831] new mount options do not match the existing superblock, will be ignored [ 2021.733061] CPU: 1 PID: 1570 Comm: khungtaskd Not tainted 4.19.211-syzkaller #0 [ 2021.733070] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/26/2022 [ 2021.733075] Call Trace: [ 2021.733096] dump_stack+0x1fc/0x2ef [ 2021.733115] panic+0x26a/0x50e [ 2022.001151] ? __warn_printk+0xf3/0xf3 [ 2022.005063] ? lapic_can_unplug_cpu+0x80/0x80 [ 2022.009562] ? ___preempt_schedule+0x16/0x18 [ 2022.014025] ? watchdog+0x991/0xe60 [ 2022.017630] ? nmi_trigger_cpumask_backtrace+0x15e/0x1f0 [ 2022.023061] watchdog+0x9a2/0xe60 [ 2022.026500] ? reset_hung_task_detector+0x30/0x30 [ 2022.031325] kthread+0x33f/0x460 [ 2022.034671] ? kthread_park+0x180/0x180 [ 2022.038630] ret_from_fork+0x24/0x30 [ 2022.042504] Kernel Offset: disabled [ 2022.046117] Rebooting in 86400 seconds..