(0x7f0000000040)='./file0\x00', 0x0, 0x6000, &(0x7f00000003c0), 0x0, &(0x7f0000000580)={[{@session={'session'}}]}) 03:11:12 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000040)="153f6234488dd25d766070") socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup2(r2, r2) sendmsg$netlink(r3, &(0x7f0000028fc8)={0x0, 0x0, &(0x7f0000019000), 0x0, &(0x7f0000000040)=[@rights={0x18, 0x1, 0x1, [r1]}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000000b80)=[{{&(0x7f0000000200)=@l2, 0x80, &(0x7f00000005c0), 0x0, &(0x7f0000000600)=""/84, 0x54}}, {{&(0x7f0000000680)=@l2={0x1f, 0x0, {}, 0x0, 0x0}, 0x80, &(0x7f0000000a40), 0x0, &(0x7f0000000ac0)=""/147, 0x93}}], 0x4000000000002ce, 0x62, 0x0) 03:11:12 executing program 1: r0 = syz_open_dev$sndtimer(&(0x7f0000000280)='/dev/snd/timer\x00', 0x0, 0x0) r1 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/checkreqprot\x00', 0x4100, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000080)=0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000140)={{0x5, 0x6, 0x1c00, 0x5, 'syz0\x00'}, 0x5, 0x30, 0x401, r2, 0x5, 0x6, 'syz0\x00', &(0x7f00000000c0)=['/dev/snd/timer\x00', '/dev/snd/timer\x00', '/dev/snd/timer\x00', 'trusted\'em1,securitycgroup+cpuset\x00', '[keyring,\x00'], 0x59, [], [0x800, 0x0, 0x6, 0x2]}) ioctl$SNDRV_TIMER_IOCTL_SELECT(r0, 0x40345410, &(0x7f0000000040)={{0x0, 0x2}}) ioctl$SNDRV_TIMER_IOCTL_CONTINUE(r0, 0x54a2) ioctl$SNDRV_TIMER_IOCTL_PAUSE(r0, 0x54a3) [ 960.770772] hfs: unable to parse mount options 03:11:12 executing program 3: socket$packet(0x11, 0xa, 0x300) syz_emit_ethernet(0x4e, &(0x7f0000000080)={@local, @broadcast, [{}], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x0, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2f]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, &(0x7f00000002c0)) 03:11:12 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x6b6b6b, &(0x7f00000003c0), 0x0, &(0x7f0000000580)={[{@session={'session'}}]}) 03:11:12 executing program 1: r0 = syz_open_dev$sndtimer(&(0x7f0000000280)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r0, 0x40345410, &(0x7f0000000040)={{0x0, 0x2}}) ioctl$SNDRV_TIMER_IOCTL_CONTINUE(r0, 0x54a2) socketpair(0x1, 0x5054f169049de660, 0x9, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$BLKBSZSET(r1, 0x40081271, &(0x7f0000000140)=0x8) ioctl$KDDELIO(r1, 0x4b35, 0x1) ioctl$SNDRV_TIMER_IOCTL_PAUSE(r0, 0x54a3) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(r1, 0x84, 0x7b, &(0x7f00000001c0)={0x0, 0xffffffff}, &(0x7f0000000200)=0x8) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(r1, 0x84, 0x7c, &(0x7f0000000240)={r3, 0x7, 0x2}, &(0x7f00000002c0)=0x8) fsetxattr$trusted_overlay_upper(r1, &(0x7f0000000080)='trusted.overlay.upper\x00', &(0x7f00000000c0)={0x0, 0xfb, 0x4a, 0x4, 0xffffffffffffffff, "5ad25ee3018a1cdcb0a1864f64dc26b9", "69fd1e6d9f08aaa6cc0c6741f4a87234c653546731a6a85bae65150e2a7a72a2a2e2c3d5e5a8bf0b9b29613dcc0724f51fcb4b7e12"}, 0x4a, 0x1) ioctl$TIOCGWINSZ(r2, 0x5413, &(0x7f0000000180)) 03:11:12 executing program 3: socket$packet(0x11, 0xa, 0x300) syz_emit_ethernet(0x4e, &(0x7f0000000080)={@local, @broadcast, [{}], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x0, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2c000000]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, &(0x7f00000002c0)) 03:11:12 executing program 5: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r0) r1 = creat(&(0x7f0000000700)='./bus\x00', 0x0) fcntl$setstatus(r1, 0x4, 0x6100) truncate(&(0x7f00000002c0)='./bus\x00', 0x4a00) r2 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000180)='cpuset.sched_load_balance\x00', 0x2, 0x0) lseek(r1, 0x0, 0x2) write$P9_RVERSION(0xffffffffffffffff, &(0x7f0000000140)={0x15, 0x65, 0xffff, 0x0, 0x8, '9P2000.u'}, 0x15) sendfile(r1, r2, &(0x7f0000000040), 0x8000fffffffe) getsockopt$EBT_SO_GET_INIT_INFO(0xffffffffffffffff, 0x0, 0x82, &(0x7f0000000080)={'nat\x00'}, &(0x7f0000000240)=0x50) truncate(&(0x7f0000000100)='./bus\x00', 0x0) 03:11:12 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000040)="153f6234488dd25d766070") socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup2(r2, r2) sendmsg$netlink(r3, &(0x7f0000028fc8)={0x0, 0x0, &(0x7f0000019000), 0x0, &(0x7f0000000040)=[@rights={0x18, 0x1, 0x1, [r1]}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000000b80)=[{{&(0x7f0000000200)=@l2, 0x80, &(0x7f00000005c0), 0x0, &(0x7f0000000600)=""/84, 0x54}}, {{&(0x7f0000000680)=@l2={0x1f, 0x0, {}, 0x0, 0x0}, 0x80, &(0x7f0000000a40), 0x0, &(0x7f0000000ac0)=""/147, 0x93}}], 0x4000000000002ce, 0x62, 0x0) [ 961.261299] hfs: unable to parse mount options 03:11:12 executing program 1: r0 = syz_open_dev$sndtimer(&(0x7f0000000280)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000000000)=0x0) r2 = dup(r0) rt_sigqueueinfo(r1, 0x26, &(0x7f0000000100)={0x28, 0x7, 0x1, 0x1}) ioctl$SNDRV_TIMER_IOCTL_SELECT(r0, 0x40345410, &(0x7f0000000180)={{0x0, 0x2}}) ioctl$SIOCSIFHWADDR(r2, 0x8924, &(0x7f0000000140)={'team_slave_0\x00', @local}) ioctl$SNDRV_TIMER_IOCTL_CONTINUE(r0, 0x54a2) write$binfmt_misc(r0, &(0x7f0000000080)={'syz0', "1d9d4dd9683f113b8064073a6f60c5c81cd679181c61f295480f5a6e83269056a48a6e95e88e57df5f542b972906d46794f48c517880534c44f798ec56740ba5c36ca71811504b4382664e825b579f77bfe257ffd94eae13ae7a2d6fdb0f2c98d8040c02f872c5"}, 0x6b) ioctl$SNDRV_TIMER_IOCTL_PAUSE(r0, 0x54a3) 03:11:12 executing program 3: socket$packet(0x11, 0xa, 0x300) syz_emit_ethernet(0x4e, &(0x7f0000000080)={@local, @broadcast, [{}], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x0, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf0]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, &(0x7f00000002c0)) 03:11:12 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000380)='/dev/ptmx\x00', 0x0, 0x0) read(r0, &(0x7f0000000500)=""/11, 0xa) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000180)) r1 = syz_open_dev$vcsa(&(0x7f0000000100)='/dev/vcsa#\x00', 0x0, 0x0) dup2(r0, r1) clone(0x2102001fff, 0x0, 0xfffffffffffffffe, &(0x7f0000000280), 0xffffffffffffffff) ioctl$BLKPG(r1, 0x1269, &(0x7f00000001c0)) 03:11:12 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x2c, &(0x7f00000003c0), 0x0, &(0x7f0000000580)={[{@session={'session'}}]}) [ 961.476494] hfs: unable to parse mount options [ 961.627569] hfs: unable to parse mount options 03:11:13 executing program 1: r0 = syz_open_dev$sndtimer(&(0x7f0000000280)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r0, 0x40345410, &(0x7f0000000040)={{0x0, 0x2}}) ioctl$SNDRV_TIMER_IOCTL_CONTINUE(r0, 0x54a2) 03:11:13 executing program 5: 03:11:13 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000040)="153f6234488dd25d766070") socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup2(r2, r2) sendmsg$netlink(r3, &(0x7f0000028fc8)={0x0, 0x0, &(0x7f0000019000), 0x0, &(0x7f0000000040)=[@rights={0x18, 0x1, 0x1, [r1]}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000000b80)=[{{&(0x7f0000000200)=@l2, 0x80, &(0x7f00000005c0), 0x0, &(0x7f0000000600)=""/84, 0x54}}, {{&(0x7f0000000680)=@l2={0x1f, 0x0, {}, 0x0, 0x0}, 0x80, &(0x7f0000000a40), 0x0, &(0x7f0000000ac0)=""/147, 0x93}}], 0x4000000000002ce, 0x62, 0x0) [ 961.731415] hfs: unable to parse mount options 03:11:13 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x68000000, &(0x7f00000003c0), 0x0, &(0x7f0000000580)={[{@session={'session'}}]}) 03:11:13 executing program 3: socket$packet(0x11, 0xa, 0x300) syz_emit_ethernet(0x4e, &(0x7f0000000080)={@local, @broadcast, [{}], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x0, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x89ffffff00000000]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, &(0x7f00000002c0)) 03:11:13 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0xffffff8c, &(0x7f00000003c0), 0x0, &(0x7f0000000580)={[{@session={'session'}}]}) 03:11:13 executing program 5: 03:11:13 executing program 1: r0 = syz_open_dev$sndtimer(&(0x7f0000000280)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_CONTINUE(r0, 0x54a2) ioctl$SNDRV_TIMER_IOCTL_PAUSE(r0, 0x54a3) 03:11:13 executing program 3: socket$packet(0x11, 0xa, 0x300) syz_emit_ethernet(0x4e, &(0x7f0000000080)={@local, @broadcast, [{}], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x0, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x806000000000000]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, &(0x7f00000002c0)) 03:11:13 executing program 1: r0 = syz_open_dev$sndtimer(&(0x7f0000000280)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r0, 0x40345410, &(0x7f0000000040)={{0x0, 0x2}}) ioctl$SNDRV_TIMER_IOCTL_CONTINUE(r0, 0x54a2) ioctl$SNDRV_TIMER_IOCTL_PAUSE(r0, 0x54a3) 03:11:13 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000040)="153f6234488dd25d766070") socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup2(r2, r2) sendmsg$netlink(r3, &(0x7f0000028fc8)={0x0, 0x0, &(0x7f0000019000), 0x0, &(0x7f0000000040)=[@rights={0x18, 0x1, 0x1, [r1]}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000000b80)=[{{&(0x7f0000000200)=@l2, 0x80, &(0x7f00000005c0), 0x0, &(0x7f0000000600)=""/84, 0x54}}, {{&(0x7f0000000680)=@l2={0x1f, 0x0, {}, 0x0, 0x0}, 0x80, &(0x7f0000000a40), 0x0, &(0x7f0000000ac0)=""/147, 0x93}}], 0x4000000000002ce, 0x62, 0x0) 03:11:13 executing program 5: [ 962.315880] hfs: unable to parse mount options 03:11:13 executing program 3: socket$packet(0x11, 0xa, 0x300) syz_emit_ethernet(0x4e, &(0x7f0000000080)={@local, @broadcast, [{}], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x0, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5000000]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, &(0x7f00000002c0)) [ 962.437423] hfs: unable to parse mount options 03:11:13 executing program 1: r0 = syz_open_dev$sndtimer(0x0, 0x0, 0x10000000113000) ioctl$SNDRV_TIMER_IOCTL_SELECT(r0, 0x40345410, &(0x7f0000000040)={{0x0, 0x2}}) ioctl$SNDRV_TIMER_IOCTL_CONTINUE(r0, 0x54a2) ioctl$SNDRV_TIMER_IOCTL_PAUSE(r0, 0x54a3) r1 = accept4$inet(0xffffffffffffff9c, &(0x7f0000000000)={0x2, 0x0, @multicast2}, &(0x7f0000000080)=0x10, 0x800) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(0xffffffffffffff9c, 0x84, 0x70, &(0x7f00000000c0)={0x0, @in6={{0xa, 0x4e22, 0x1, @empty, 0x5c}}, [0x68, 0x1, 0x10001, 0x28, 0x3, 0xfffffffffffffff9, 0x1, 0x67, 0x10000, 0x401, 0x7, 0x6, 0x3, 0x5, 0xf49b]}, &(0x7f00000001c0)=0x100) getsockopt$inet_sctp_SCTP_RESET_STREAMS(r1, 0x84, 0x77, &(0x7f0000000200)=ANY=[@ANYRES32=r2, @ANYBLOB="240001001300"], &(0x7f0000000240)=0xa) 03:11:14 executing program 5: 03:11:14 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x3f000000, &(0x7f00000003c0), 0x0, &(0x7f0000000580)={[{@session={'session'}}]}) 03:11:14 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1000000000000000, &(0x7f00000003c0), 0x0, &(0x7f0000000580)={[{@session={'session'}}]}) 03:11:14 executing program 3: socket$packet(0x11, 0xa, 0x300) syz_emit_ethernet(0x4e, &(0x7f0000000080)={@local, @broadcast, [{}], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x0, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2f00]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, &(0x7f00000002c0)) 03:11:14 executing program 1: r0 = syz_open_dev$sndtimer(&(0x7f0000000280)='/dev/snd/timer\x00', 0x0, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000100)='/proc/self/net/pfkey\x00', 0x200000, 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r0, 0x40345410, &(0x7f0000000040)={{0x0, 0x2}}) r1 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x0, 0x0) epoll_wait(r1, &(0x7f0000000080)=[{}, {}, {}, {}, {}, {}, {}, {}], 0x8, 0x9) ioctl$SNDRV_TIMER_IOCTL_CONTINUE(r0, 0x54a2) ioctl$SNDRV_TIMER_IOCTL_PAUSE(r0, 0x54a3) 03:11:14 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000040)="153f6234488dd25d766070") socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup2(r2, r2) sendmsg$netlink(r3, &(0x7f0000028fc8)={0x0, 0x0, &(0x7f0000019000), 0x0, &(0x7f0000000040)=[@rights={0x18, 0x1, 0x1, [r1]}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000000b80)=[{{&(0x7f0000000200)=@l2, 0x80, &(0x7f00000005c0), 0x0, &(0x7f0000000600)=""/84, 0x54}}, {{&(0x7f0000000680)=@l2={0x1f, 0x0, {}, 0x0, 0x0}, 0x80, &(0x7f0000000a40), 0x0, &(0x7f0000000ac0)=""/147, 0x93}}], 0x4000000000002ce, 0x62, 0x0) 03:11:14 executing program 5: 03:11:14 executing program 3: socket$packet(0x11, 0xa, 0x300) syz_emit_ethernet(0x4e, &(0x7f0000000080)={@local, @broadcast, [{}], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x0, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400000000000000]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, &(0x7f00000002c0)) 03:11:14 executing program 1: r0 = syz_open_dev$audion(&(0x7f0000000000)='/dev/audio#\x00', 0x1000, 0x400000) r1 = syz_open_dev$sndtimer(&(0x7f0000000280)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r1, 0x40345410, &(0x7f0000000040)={{0x0, 0x2}}) ioctl$SNDRV_TIMER_IOCTL_CONTINUE(r1, 0x54a2) ioctl$BINDER_SET_MAX_THREADS(r0, 0x40046205, 0x20) ioctl$SNDRV_TIMER_IOCTL_PAUSE(r1, 0x54a3) 03:11:14 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000040)="153f6234488dd25d766070") socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup2(r2, r2) sendmsg$netlink(r3, &(0x7f0000028fc8)={0x0, 0x0, &(0x7f0000019000), 0x0, &(0x7f0000000040)=[@rights={0x18, 0x1, 0x1, [r1]}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000000b80)=[{{&(0x7f0000000200)=@l2, 0x80, &(0x7f00000005c0), 0x0, &(0x7f0000000600)=""/84, 0x54}}, {{&(0x7f0000000680)=@l2={0x1f, 0x0, {}, 0x0, 0x0}, 0x80, &(0x7f0000000a40), 0x0, &(0x7f0000000ac0)=""/147, 0x93}}], 0x4000000000002ce, 0x62, 0x0) [ 963.040617] hfs: unable to parse mount options 03:11:14 executing program 5: [ 963.161311] hfs: unable to parse mount options 03:11:14 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x600, &(0x7f00000003c0), 0x0, &(0x7f0000000580)={[{@session={'session'}}]}) 03:11:14 executing program 1: r0 = syz_open_dev$sndtimer(&(0x7f0000000280)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r0, 0x40345410, &(0x7f0000000040)={{0x0, 0x2}}) ioctl$SNDRV_TIMER_IOCTL_CONTINUE(r0, 0x54a2) 03:11:14 executing program 5: 03:11:14 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x770c, &(0x7f00000003c0), 0x0, &(0x7f0000000580)={[{@session={'session'}}]}) 03:11:14 executing program 3: socket$packet(0x11, 0xa, 0x300) syz_emit_ethernet(0x4e, &(0x7f0000000080)={@local, @broadcast, [{}], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x0, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x500000000000000]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, &(0x7f00000002c0)) 03:11:14 executing program 1: r0 = syz_open_dev$sndtimer(&(0x7f0000000280)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r0, 0x40345410, &(0x7f0000000040)={{0x0, 0x2}}) r1 = syz_open_dev$dmmidi(&(0x7f0000000000)='/dev/dmmidi#\x00', 0x3, 0x101000) ioctl$IOC_PR_RESERVE(r1, 0x401070c9, &(0x7f0000000080)={0x0, 0x100, 0x1}) ioctl$SNDRV_TIMER_IOCTL_CONTINUE(r0, 0x54a2) ioctl$SNDRV_TIMER_IOCTL_PAUSE(r0, 0x54a3) 03:11:14 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000040)="153f6234488dd25d766070") socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup2(r2, r2) sendmsg$netlink(r3, &(0x7f0000028fc8)={0x0, 0x0, &(0x7f0000019000), 0x0, &(0x7f0000000040)=[@rights={0x18, 0x1, 0x1, [r1]}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000000b80)=[{{&(0x7f0000000200)=@l2, 0x80, &(0x7f00000005c0), 0x0, &(0x7f0000000600)=""/84, 0x54}}, {{&(0x7f0000000680)=@l2={0x1f, 0x0, {}, 0x0, 0x0}, 0x80, &(0x7f0000000a40), 0x0, &(0x7f0000000ac0)=""/147, 0x93}}], 0x4000000000002ce, 0x62, 0x0) [ 963.521656] hfs: unable to parse mount options 03:11:15 executing program 1: r0 = syz_open_dev$sndtimer(&(0x7f0000000280)='/dev/snd/timer\x00', 0x0, 0x0) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x40400, 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r0, 0x40345410, &(0x7f0000000040)={{0x0, 0x2}}) sendfile(r0, r0, &(0x7f0000000000), 0x50) ioctl$SNDRV_TIMER_IOCTL_START(r1, 0x54a0) ioctl$SNDRV_TIMER_IOCTL_CONTINUE(r0, 0x54a2) ioctl$SNDRV_TIMER_IOCTL_PAUSE(r0, 0x54a3) 03:11:15 executing program 5: 03:11:15 executing program 3: socket$packet(0x11, 0xa, 0x300) syz_emit_ethernet(0x4e, &(0x7f0000000080)={@local, @broadcast, [{}], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x0, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x88480000]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, &(0x7f00000002c0)) 03:11:15 executing program 5: 03:11:15 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x770c, &(0x7f00000003c0), 0x0, &(0x7f0000000580)={[{@session={'session'}}]}) 03:11:15 executing program 1: r0 = syz_open_dev$sndtimer(&(0x7f0000000280)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r0, 0x40345410, &(0x7f0000000040)={{0x0, 0x2}}) r1 = getpid() syz_open_procfs(r1, &(0x7f0000000000)='net/fib_trie\x00') ioctl$SNDRV_TIMER_IOCTL_CONTINUE(r0, 0x54a2) ioctl$SNDRV_TIMER_IOCTL_PAUSE(r0, 0x54a3) [ 963.866046] hfs: unable to parse mount options 03:11:15 executing program 3: socket$packet(0x11, 0xa, 0x300) syz_emit_ethernet(0x4e, &(0x7f0000000080)={@local, @broadcast, [{}], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x0, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, &(0x7f00000002c0)) 03:11:15 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000040)="153f6234488dd25d766070") socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup2(r2, r2) sendmsg$netlink(r3, &(0x7f0000028fc8)={0x0, 0x0, &(0x7f0000019000), 0x0, &(0x7f0000000040)=[@rights={0x18, 0x1, 0x1, [r1]}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000000b80)=[{{&(0x7f0000000200)=@l2, 0x80, &(0x7f00000005c0), 0x0, &(0x7f0000000600)=""/84, 0x54}}, {{&(0x7f0000000680)=@l2, 0x2ce, &(0x7f0000000a40), 0x0, &(0x7f0000000ac0)=""/147, 0x93}}], 0x4000000000002ce, 0x62, 0x0) 03:11:15 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0xf6ffffff, &(0x7f00000003c0), 0x0, &(0x7f0000000580)={[{@session={'session'}}]}) 03:11:15 executing program 5: 03:11:15 executing program 1: r0 = syz_open_dev$sndtimer(&(0x7f0000000280)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r0, 0x40345410, &(0x7f0000000040)={{0x0, 0x2}}) ioctl$SNDRV_TIMER_IOCTL_CONTINUE(r0, 0x54a2) ioctl$SNDRV_TIMER_IOCTL_PAUSE(r0, 0x54a3) eventfd(0x20) ioctl$SNDRV_TIMER_IOCTL_STATUS(r0, 0x80605414, &(0x7f0000000100)=""/49) [ 964.139200] hfs: unable to parse mount options 03:11:15 executing program 3: socket$packet(0x11, 0xa, 0x300) syz_emit_ethernet(0x4e, &(0x7f0000000080)={@local, @broadcast, [{}], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x0, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x86ddffff]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, &(0x7f00000002c0)) 03:11:15 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x300000000000000, &(0x7f00000003c0), 0x0, &(0x7f0000000580)={[{@session={'session'}}]}) 03:11:15 executing program 5: 03:11:15 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000040)="153f6234488dd25d766070") socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup2(r2, r2) sendmsg$netlink(r3, &(0x7f0000028fc8)={0x0, 0x0, &(0x7f0000019000), 0x0, &(0x7f0000000040)=[@rights={0x18, 0x1, 0x1, [r1]}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000000b80)=[{{&(0x7f0000000200)=@l2, 0x80, &(0x7f00000005c0), 0x0, &(0x7f0000000600)=""/84, 0x54}}, {{&(0x7f0000000680)=@l2, 0x80, &(0x7f0000000a40), 0x0, &(0x7f0000000ac0)=""/147, 0x93}}], 0x4000000000002ce, 0x62, 0x0) 03:11:15 executing program 1: r0 = syz_open_dev$sndtimer(&(0x7f0000000280)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r0, 0x40345410, &(0x7f0000000040)={{0x0, 0x2}}) ioctl$SNDRV_TIMER_IOCTL_CONTINUE(r0, 0x54a2) ioctl$SNDRV_TIMER_IOCTL_PAUSE(r0, 0x54a3) r1 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dsp\x00', 0x400002, 0x0) ioctl$sock_proto_private(r1, 0x5, &(0x7f0000000080)="027d4bde0e9c3ece24") [ 964.488130] hfs: unable to parse mount options 03:11:15 executing program 3: socket$packet(0x11, 0xa, 0x300) syz_emit_ethernet(0x4e, &(0x7f0000000080)={@local, @broadcast, [{}], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x0, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, &(0x7f00000002c0)) 03:11:16 executing program 5: 03:11:16 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0xc0ed0000, &(0x7f00000003c0), 0x0, &(0x7f0000000580)={[{@session={'session'}}]}) [ 964.638060] hfs: unable to parse mount options 03:11:16 executing program 1: r0 = syz_open_dev$sndtimer(&(0x7f0000000280)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r0, 0x40345410, &(0x7f0000000040)={{0x0, 0x2}}) ioctl$SNDRV_TIMER_IOCTL_CONTINUE(r0, 0x54a2) ioctl$SNDRV_TIMER_IOCTL_PAUSE(r0, 0x54a3) 03:11:16 executing program 3: socket$packet(0x11, 0xa, 0x300) syz_emit_ethernet(0x4e, &(0x7f0000000080)={@local, @broadcast, [{}], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x0, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, &(0x7f00000002c0)) 03:11:16 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x2000000000000000, &(0x7f00000003c0), 0x0, &(0x7f0000000580)={[{@session={'session'}}]}) 03:11:16 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000040)="153f6234488dd25d766070") socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup2(r2, r2) sendmsg$netlink(r3, &(0x7f0000028fc8)={0x0, 0x0, &(0x7f0000019000), 0x0, &(0x7f0000000040)=[@rights={0x18, 0x1, 0x1, [r1]}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000000b80)=[{{&(0x7f0000000200)=@l2, 0x80, &(0x7f00000005c0), 0x0, &(0x7f0000000600)=""/84, 0x54}}, {{&(0x7f0000000680)=@l2, 0x80, &(0x7f0000000a40), 0x0, &(0x7f0000000ac0)=""/147, 0x93}}], 0x4000000000002ce, 0x62, 0x0) 03:11:16 executing program 1: r0 = syz_open_dev$sndtimer(&(0x7f0000000280)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_CONTINUE(r0, 0x54a2) ioctl$SNDRV_TIMER_IOCTL_PAUSE(r0, 0x54a3) 03:11:16 executing program 5: socket$nl_xfrm(0x10, 0x3, 0x6) socketpair(0x0, 0x0, 0x0, &(0x7f0000000080)) unlinkat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) mount$bpf(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB='rootconot,rootcontext=ro']) 03:11:16 executing program 3: socket$packet(0x11, 0xa, 0x300) syz_emit_ethernet(0x4e, &(0x7f0000000080)={@local, @broadcast, [{}], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x0, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8847000000000000]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, &(0x7f00000002c0)) 03:11:16 executing program 1: r0 = syz_open_dev$sndtimer(&(0x7f0000000280)='/dev/snd/timer\x00', 0x0, 0x0) r1 = syz_open_dev$sndpcmc(&(0x7f00000001c0)='/dev/snd/pcmC#D#c\x00', 0x3, 0x101000) ioctl$DRM_IOCTL_SET_VERSION(r1, 0xc0106407, &(0x7f0000000200)={0xfffffffffffffff8, 0x5, 0x1, 0x100000000}) ioctl$SNDRV_TIMER_IOCTL_SELECT(r0, 0x40345410, &(0x7f0000000040)={{0x0, 0x2}}) ioctl$SNDRV_TIMER_IOCTL_CONTINUE(r0, 0x54a2) ioctl$SNDRV_TIMER_IOCTL_PAUSE(r0, 0x54a3) r2 = openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/mls\x00', 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000080)={0xffffffffffffffff}, 0x111, 0x100b}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r2, &(0x7f0000000100)={0x3, 0x40, 0xfa00, {{0xa, 0x4e24, 0x40, @empty, 0x9}, {0xa, 0x4e20, 0x8, @dev={0xfe, 0x80, [], 0x1c}, 0xbab}, r3, 0x5}}, 0x48) ioctl$DRM_IOCTL_GET_MAGIC(r2, 0x80046402, &(0x7f0000000180)=0x40) [ 965.081227] hfs: unable to parse mount options [ 965.136401] SELinux: security_context_str_to_sid(ro) failed for (dev bpf, type bpf) errno=-22 03:11:16 executing program 5: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$dri(&(0x7f0000000100)='/dev/dri/card#\x00', 0x0, 0x0) [ 965.177961] SELinux: security_context_str_to_sid(ro) failed for (dev bpf, type bpf) errno=-22 03:11:16 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000040)="153f6234488dd25d766070") socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup2(r2, r2) sendmsg$netlink(r3, &(0x7f0000028fc8)={0x0, 0x0, &(0x7f0000019000), 0x0, &(0x7f0000000040)=[@rights={0x18, 0x1, 0x1, [r1]}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000000b80)=[{{&(0x7f0000000200)=@l2, 0x80, &(0x7f00000005c0), 0x0, &(0x7f0000000600)=""/84, 0x54}}, {{&(0x7f0000000680)=@l2, 0x80, &(0x7f0000000a40), 0x0, &(0x7f0000000ac0)=""/147, 0x93}}], 0x4000000000002ce, 0x62, 0x0) [ 965.253919] hfs: unable to parse mount options 03:11:16 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x22, &(0x7f00000003c0), 0x0, &(0x7f0000000580)={[{@session={'session'}}]}) 03:11:16 executing program 1: r0 = syz_open_dev$sndtimer(&(0x7f0000000280)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r0, 0x40345410, &(0x7f0000000040)={{0x4, 0x1, 0x1}}) ioctl$SNDRV_TIMER_IOCTL_CONTINUE(r0, 0x54a2) ioctl$SNDRV_TIMER_IOCTL_PARAMS(r0, 0x40505412, &(0x7f0000000080)={0x5, 0xfffffffffffffffc, 0x6, 0x0, 0x1f}) ioctl$SNDRV_TIMER_IOCTL_PAUSE(r0, 0x54a3) r1 = openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/status\x00', 0x0, 0x0) r2 = syz_genetlink_get_family_id$nbd(&(0x7f0000000180)='nbd\x00') r3 = openat$rfkill(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/rfkill\x00', 0x200, 0x0) r4 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/policy\x00', 0x0, 0x0) sendmsg$NBD_CMD_CONNECT(r1, &(0x7f0000000300)={&(0x7f0000000140), 0xc, &(0x7f00000002c0)={&(0x7f0000000240)={0x30, r2, 0x0, 0x70bd28, 0x25dfdbfc, {}, [@NBD_ATTR_SOCKETS={0x1c, 0x7, [{0x8, 0x1, r3}, {0x8, 0x1, r4}, {0x8, 0x1, r0}]}]}, 0x30}, 0x1, 0x0, 0x0, 0x40000}, 0x0) syz_open_dev$sndtimer(&(0x7f0000000000)='/dev/snd/timer\x00', 0x0, 0x4000) 03:11:16 executing program 3: socket$packet(0x11, 0xa, 0x300) syz_emit_ethernet(0x4e, &(0x7f0000000080)={@local, @broadcast, [{}], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x0, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8060000]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, &(0x7f00000002c0)) [ 965.423549] hfs: unable to parse mount options 03:11:16 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0xffffff7f, &(0x7f00000003c0), 0x0, &(0x7f0000000580)={[{@session={'session'}}]}) 03:11:16 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000040)="153f6234488dd25d766070") r1 = syz_open_dev$evdev(&(0x7f0000000180)='/dev/input/event#\x00', 0x0, 0x2) write$evdev(r1, &(0x7f0000057fa0)=[{}, {}], 0x84159e8a) ioctl$EVIOCGSND(r1, 0x40044581, &(0x7f00000001c0)=""/146) clone(0x0, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x8031, 0xffffffffffffffff, 0x0) 03:11:17 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0xffffff97, &(0x7f00000003c0), 0x0, &(0x7f0000000580)={[{@session={'session'}}]}) 03:11:17 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000040)="153f6234488dd25d766070") socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup2(r2, r2) sendmsg$netlink(r3, &(0x7f0000028fc8)={0x0, 0x0, &(0x7f0000019000), 0x0, &(0x7f0000000040)=[@rights={0x18, 0x1, 0x1, [r1]}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000000b80)=[{{&(0x7f0000000200)=@l2, 0x80, &(0x7f00000005c0), 0x0, &(0x7f0000000600)=""/84, 0x54}}, {{&(0x7f0000000680)=@l2, 0x80, &(0x7f0000000a40), 0x0, &(0x7f0000000ac0)=""/147, 0x93}}], 0x4000000000002ce, 0x62, 0x0) 03:11:17 executing program 1: r0 = syz_open_dev$sndtimer(&(0x7f0000000080)='/dev/snd/timer\x00', 0x0, 0x3ffffe) ioctl$SNDRV_TIMER_IOCTL_SELECT(r0, 0x40345410, &(0x7f0000000040)={{0x0, 0x2, 0x0, 0x0, 0xfffffffffffffffd}}) ioctl$SNDRV_TIMER_IOCTL_CONTINUE(r0, 0x54a2) fcntl$setpipe(r0, 0x407, 0x5) ioctl$SNDRV_TIMER_IOCTL_PAUSE(r0, 0x54a3) 03:11:17 executing program 3: socket$packet(0x11, 0xa, 0x300) syz_emit_ethernet(0x4e, &(0x7f0000000080)={@local, @broadcast, [{}], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x0, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x88470000]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, &(0x7f00000002c0)) 03:11:17 executing program 1: r0 = syz_open_dev$sndtimer(&(0x7f0000000280)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r0, 0x40345410, &(0x7f0000000040)={{0x0, 0x2}}) ioctl$SNDRV_TIMER_IOCTL_CONTINUE(r0, 0x54a2) ioctl$SNDRV_TIMER_IOCTL_PAUSE(r0, 0x54a3) [ 965.863476] hfs: unable to parse mount options 03:11:17 executing program 5: perf_event_open(&(0x7f0000c86f88)={0x2, 0x70, 0x910, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6(0xa, 0x202000000802, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x20, &(0x7f0000f68000)={@dev, 0x800, 0x0, 0xff, 0x8001}, 0x20) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x20, &(0x7f0000000040)={@ipv4={[], [], @loopback}, 0x800, 0x2, 0x0, 0x0, 0xfffffffffffffffc}, 0x20) [ 965.927754] hfs: unable to parse mount options 03:11:17 executing program 3: socket$packet(0x11, 0xa, 0x300) syz_emit_ethernet(0x4e, &(0x7f0000000080)={@local, @broadcast, [{}], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x0, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2c]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, &(0x7f00000002c0)) 03:11:17 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000040)="153f6234488dd25d766070") socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup2(r2, r2) sendmsg$netlink(r3, &(0x7f0000028fc8)={0x0, 0x0, &(0x7f0000019000), 0x0, &(0x7f0000000040)=[@rights={0x18, 0x1, 0x1, [r1]}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000000b80)=[{{&(0x7f0000000200)=@l2, 0x80, &(0x7f00000005c0), 0x0, &(0x7f0000000600)=""/84, 0x54}}, {{&(0x7f0000000680)=@l2, 0x80, &(0x7f0000000a40), 0x0, &(0x7f0000000ac0)=""/147, 0x93}}], 0x4000000000002ce, 0x62, 0x0) 03:11:17 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0xedc0, &(0x7f00000003c0), 0x0, &(0x7f0000000580)={[{@session={'session'}}]}) 03:11:17 executing program 1: socket$inet6_tcp(0xa, 0x1, 0x0) r0 = syz_open_dev$sndtimer(&(0x7f0000000280)='/dev/snd/timer\x00', 0x0, 0x0) r1 = fcntl$getown(r0, 0x9) r2 = openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/status\x00', 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffff9c, 0x0, 0x1, &(0x7f00000000c0)='\x00', 0x0}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000140)={r1, r2, 0x0, 0x10, &(0x7f0000000080)='keyring)md5sum:\x00', r3}, 0x30) ioctl$SNDRV_TIMER_IOCTL_SELECT(r0, 0x40345410, &(0x7f0000000040)={{0x0, 0x2}}) ioctl$SNDRV_TIMER_IOCTL_CONTINUE(r0, 0x54a2) ioctl$SNDRV_TIMER_IOCTL_PAUSE(r2, 0x54a3) 03:11:17 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0xfdffffff00000000, &(0x7f00000003c0), 0x0, &(0x7f0000000580)={[{@session={'session'}}]}) 03:11:17 executing program 5: getegid() perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x40000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$l2tp(0x18, 0x1, 0x1) dup(0xffffffffffffffff) ioctl$TIOCEXCL(0xffffffffffffffff, 0x540c) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(0xffffffffffffffff, 0xc1105517, &(0x7f00000001c0)={{0x6, 0x1, 0x100, 0x0, 'syz1\x00'}, 0x0, 0x100, 0x1, 0x0, 0x3, 0x5, 'syz0\x00', &(0x7f0000000100)=[',\x00', ')\x00', ',\x00'], 0x6, [], [0x0, 0x0, 0xffffffffffffffe8]}) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000004c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000480)={0xffffffffffffffff}, 0x0, 0x2}}, 0x1f) write$RDMA_USER_CM_CMD_RESOLVE_IP(0xffffffffffffffff, &(0x7f0000000500)={0x3, 0x40, 0xfa00, {{0xa, 0x4e23, 0x0, @mcast2, 0x100}, {0xa, 0x4e23, 0x9, @ipv4={[], [], @local}}, r0}}, 0x48) socket$packet(0x11, 0x0, 0x300) setsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(0xffffffffffffffff, 0x84, 0x75, &(0x7f0000000340), 0x8) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) r1 = socket(0x10, 0x2, 0xf) r2 = syz_open_procfs(0x0, &(0x7f0000000440)="2f65786500000000000409004bddd9de91be10eebf000ee9a90f7980584303d01f0549a89d78dc4af89ed554fa07424adee901d2da75af1f02acc7edbcd7a071fb35331ce39c5ad3657818feb0279188b92b2e6b035cde4c66c6b00081bd106f6adfe58108a8be89d3695670374e304c071de17635f3034de8c2372e07000000000000007d656f") ioctl$TIOCMGET(r2, 0x5415, &(0x7f0000000080)) sendfile(r1, r2, &(0x7f0000000000), 0x80000002) setpriority(0x0, 0x0, 0x80000001) 03:11:17 executing program 3: socket$packet(0x11, 0xa, 0x300) syz_emit_ethernet(0x4e, &(0x7f0000000080)={@local, @broadcast, [{}], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x0, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x29]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, &(0x7f00000002c0)) 03:11:17 executing program 1: r0 = dup2(0xffffffffffffffff, 0xffffffffffffff9c) setsockopt$inet_tcp_TLS_TX(r0, 0x6, 0x1, &(0x7f0000000000), 0x4) r1 = syz_open_dev$sndtimer(&(0x7f0000000280)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r1, 0x40345410, &(0x7f0000000040)={{0xfffffffffffffffc, 0x2, 0x0, 0x1}}) r2 = getpid() getpgid(r2) clock_gettime(0x0, &(0x7f0000000080)={0x0, 0x0}) clock_gettime(0x2, &(0x7f00000000c0)={0x0, 0x0}) write$evdev(r0, &(0x7f0000000100)=[{{0x77359400}, 0x17, 0x1, 0xee44}, {{}, 0x16, 0x800, 0x101}, {{r3, r4/1000+10000}, 0x17, 0xe, 0xfff}, {{r5, r6/1000+10000}, 0x15, 0x8, 0x259}], 0x60) sendmsg$key(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000180)=ANY=[@ANYBLOB="0212070f0d00000028bd7000ffdbdf2505001a00fe8000000000000000000000000000bbff01000000000000000035d11d8e6956030000000000010d3f0004010014000100000005001a00ac2914aa000000000000000000000000ac1414aa000000000000000000"], 0x68}}, 0x0) ioctl$SNDRV_TIMER_IOCTL_CONTINUE(r1, 0x54a2) ioctl$SNDRV_TIMER_IOCTL_PAUSE(r1, 0x54a3) 03:11:17 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000040)="153f6234488dd25d766070") socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup2(r2, r2) sendmsg$netlink(r3, &(0x7f0000028fc8)={0x0, 0x0, &(0x7f0000019000), 0x0, &(0x7f0000000040)=[@rights={0x18, 0x1, 0x1, [r1]}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000000b80)=[{{&(0x7f0000000200)=@l2, 0x80, &(0x7f00000005c0), 0x0, &(0x7f0000000600)=""/84, 0x54}}, {{&(0x7f0000000680)=@l2, 0x80, &(0x7f0000000a40), 0x0, &(0x7f0000000ac0)=""/147, 0x93}}], 0x4000000000002ce, 0x62, 0x0) 03:11:18 executing program 1: r0 = syz_open_dev$sndtimer(&(0x7f0000000280)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r0, 0x40345410, &(0x7f0000000040)={{0x0, 0x2}}) ioctl$SNDRV_TIMER_IOCTL_CONTINUE(r0, 0x54a2) r1 = request_key(&(0x7f0000000080)='big_key\x00', &(0x7f00000000c0)={'syz', 0x0}, &(0x7f0000000100)='trustedsecurity#0\x00', 0xfffffffffffffffa) r2 = request_key(&(0x7f0000000140)='trusted\x00', &(0x7f0000000180)={'syz', 0x1}, &(0x7f00000001c0)='selfsecurity,!\x00', 0x0) keyctl$negate(0xd, r1, 0x7fff, r2) ioctl$SNDRV_TIMER_IOCTL_PAUSE(r0, 0x54a3) openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x20000, 0x0) 03:11:18 executing program 3: socket$packet(0x11, 0xa, 0x300) syz_emit_ethernet(0x4e, &(0x7f0000000080)={@local, @broadcast, [{}], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x0, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, &(0x7f00000002c0)) [ 966.577884] hfs: unable to parse mount options [ 966.618769] hfs: unable to parse mount options 03:11:18 executing program 1: r0 = syz_open_dev$sndtimer(&(0x7f0000000280)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r0, 0x40345410, &(0x7f0000000040)={{0x0, 0x2}}) ioctl$SNDRV_TIMER_IOCTL_CONTINUE(r0, 0x54a2) ioctl$SNDRV_TIMER_IOCTL_PAUSE(r0, 0x54a3) r1 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhci\x00', 0x1, 0x0) getsockopt$inet_sctp6_SCTP_ADAPTATION_LAYER(r1, 0x84, 0x7, &(0x7f0000000080), &(0x7f00000000c0)=0x4) ioctl$UI_SET_FFBIT(r1, 0x4004556b, 0x7e) ioctl$DRM_IOCTL_INFO_BUFS(r1, 0xc0106418, &(0x7f0000000140)={0x3, 0x1, 0x4, 0xffffffff, 0x5, 0x68}) 03:11:18 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x4c000000, &(0x7f00000003c0), 0x0, &(0x7f0000000580)={[{@session={'session'}}]}) 03:11:18 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000040)="153f6234488dd25d766070") socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup2(r2, r2) sendmsg$netlink(r3, &(0x7f0000028fc8)={0x0, 0x0, &(0x7f0000019000), 0x0, &(0x7f0000000040)=[@rights={0x18, 0x1, 0x1, [r1]}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000000b80)=[{{&(0x7f0000000200)=@l2, 0x80, &(0x7f00000005c0), 0x0, &(0x7f0000000600)=""/84, 0x54}}, {{&(0x7f0000000680)=@l2, 0x80, &(0x7f0000000a40), 0x0, &(0x7f0000000ac0)=""/147, 0x93}}], 0x4000000000002ce, 0x62, 0x0) 03:11:18 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1f00000000000000, &(0x7f00000003c0), 0x0, &(0x7f0000000580)={[{@session={'session'}}]}) 03:11:18 executing program 3: socket$packet(0x11, 0xa, 0x300) syz_emit_ethernet(0x4e, &(0x7f0000000080)={@local, @broadcast, [{}], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x0, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc000000]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, &(0x7f00000002c0)) 03:11:18 executing program 1: r0 = syz_open_dev$sndtimer(&(0x7f0000000280)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r0, 0x40345410, &(0x7f0000000040)={{0x0, 0x2}}) ioctl$SNDRV_TIMER_IOCTL_PARAMS(r0, 0x40505412, &(0x7f0000000080)={0x2, 0x53, 0x100000001, 0x0, 0xf}) ioctl$SNDRV_TIMER_IOCTL_CONTINUE(r0, 0x54a2) ioctl$SNDRV_TIMER_IOCTL_PAUSE(r0, 0x54a3) [ 967.376340] hfs: unable to parse mount options 03:11:18 executing program 5 (fault-call:4 fault-nth:0): r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e23}, 0x1c) listen(r0, 0x18) r1 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f0000000000)=[@in={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0xc}}, @in={0x2, 0x4e23, @local}], 0x20) 03:11:18 executing program 3: socket$packet(0x11, 0xa, 0x300) syz_emit_ethernet(0x4e, &(0x7f0000000080)={@local, @broadcast, [{}], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x0, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x88a8ffff]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, &(0x7f00000002c0)) 03:11:18 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000040)="153f6234488dd25d766070") socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup2(r2, r2) sendmsg$netlink(r3, &(0x7f0000028fc8)={0x0, 0x0, &(0x7f0000019000), 0x0, &(0x7f0000000040)=[@rights={0x18, 0x1, 0x1, [r1]}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000000b80)=[{{&(0x7f0000000200)=@l2, 0x80, &(0x7f00000005c0), 0x0, &(0x7f0000000600)=""/84, 0x54}}, {{&(0x7f0000000680)=@l2, 0x80, &(0x7f0000000a40), 0x0, &(0x7f0000000ac0)=""/147, 0x93}}], 0x4000000000002ce, 0x62, 0x0) 03:11:18 executing program 1: r0 = syz_open_dev$sndtimer(&(0x7f0000000280)='/dev/snd/timer\x00', 0x0, 0x0) r1 = add_key$keyring(&(0x7f0000000400)='keyring\x00', &(0x7f0000000440)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$search(0xa, r1, &(0x7f00000000c0)='asymmetric\x00', &(0x7f0000000100)={'syz'}, 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r0, 0x40345410, &(0x7f0000000040)={{0x0, 0x2}}) ioctl$SNDRV_TIMER_IOCTL_CONTINUE(r0, 0x54a2) ioctl$SNDRV_TIMER_IOCTL_PAUSE(r0, 0x54a3) 03:11:19 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x300, &(0x7f00000003c0), 0x0, &(0x7f0000000580)={[{@session={'session'}}]}) [ 967.578276] hfs: unable to parse mount options [ 967.587245] FAULT_INJECTION: forcing a failure. [ 967.587245] name failslab, interval 1, probability 0, space 0, times 0 [ 967.645034] CPU: 0 PID: 22668 Comm: syz-executor5 Not tainted 4.19.0-rc8+ #64 [ 967.652358] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 967.661741] Call Trace: [ 967.664379] dump_stack+0x1c4/0x2b4 [ 967.668054] ? dump_stack_print_info.cold.2+0x52/0x52 [ 967.673290] should_fail.cold.4+0xa/0x17 [ 967.677392] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 967.682521] ? print_usage_bug+0xc0/0xc0 [ 967.686608] ? print_usage_bug+0xc0/0xc0 [ 967.690693] ? graph_lock+0x170/0x170 03:11:19 executing program 3: socket$packet(0x11, 0xa, 0x300) syz_emit_ethernet(0x4e, &(0x7f0000000080)={@local, @broadcast, [{}], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x0, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4305000000000000]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, &(0x7f00000002c0)) [ 967.694570] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 967.700141] ? check_preemption_disabled+0x48/0x200 [ 967.705175] ? graph_lock+0x170/0x170 [ 967.708996] ? debug_smp_processor_id+0x1c/0x20 [ 967.713694] ? find_held_lock+0x36/0x1c0 [ 967.717786] ? __lock_is_held+0xb5/0x140 [ 967.721892] ? ___might_sleep+0x1ed/0x300 [ 967.726076] ? arch_local_save_flags+0x40/0x40 [ 967.730678] ? find_held_lock+0x36/0x1c0 [ 967.734760] __should_failslab+0x124/0x180 [ 967.739016] should_failslab+0x9/0x14 [ 967.742852] kmem_cache_alloc_node_trace+0x270/0x740 [ 967.747990] ? __local_bh_enable_ip+0x160/0x260 [ 967.752673] ? lockdep_hardirqs_on+0x421/0x5c0 [ 967.752704] __kmalloc_node+0x33/0x70 [ 967.752728] kvmalloc_node+0x65/0xf0 [ 967.752748] vmemdup_user+0x2d/0xa0 [ 967.752773] __sctp_setsockopt_connectx+0x4a/0x190 [ 967.752794] ? __sanitizer_cov_trace_switch+0x53/0x90 [ 967.778672] sctp_setsockopt+0x188b/0x6da0 [ 967.782936] ? sctp_setsockopt_paddr_thresholds+0x560/0x560 [ 967.788678] ? mark_held_locks+0x130/0x130 03:11:19 executing program 1: r0 = syz_open_dev$sndtimer(&(0x7f0000000280)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r0, 0x40345410, &(0x7f0000000040)={{0x0, 0x2}}) ioctl$SNDRV_TIMER_IOCTL_CONTINUE(r0, 0x54a2) ioctl$SNDRV_TIMER_IOCTL_CONTINUE(r0, 0x54a2) ioctl$SNDRV_TIMER_IOCTL_PAUSE(r0, 0x54a3) [ 967.792937] ? mark_held_locks+0x130/0x130 [ 967.797184] ? __lock_acquire+0x7ec/0x4ec0 [ 967.801478] ? check_preemption_disabled+0x48/0x200 [ 967.806517] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 967.812071] ? check_preemption_disabled+0x48/0x200 [ 967.817107] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 967.822669] ? check_preemption_disabled+0x48/0x200 [ 967.827709] ? debug_smp_processor_id+0x1c/0x20 [ 967.827729] ? perf_trace_lock+0x14d/0x7a0 [ 967.827746] ? perf_trace_lock_acquire+0x15b/0x800 03:11:19 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x2c00000000000000, &(0x7f00000003c0), 0x0, &(0x7f0000000580)={[{@session={'session'}}]}) [ 967.827763] ? perf_trace_lock_acquire+0x15b/0x800 [ 967.827776] ? zap_class+0x640/0x640 [ 967.827796] ? zap_class+0x640/0x640 [ 967.836718] ? perf_trace_lock+0x7a0/0x7a0 [ 967.836744] ? graph_lock+0x170/0x170 [ 967.836760] ? graph_lock+0x170/0x170 [ 967.836776] ? perf_trace_lock_acquire+0x15b/0x800 [ 967.836799] ? zap_class+0x640/0x640 [ 967.836816] ? perf_trace_lock+0x7a0/0x7a0 [ 967.836838] ? find_held_lock+0x36/0x1c0 [ 967.836863] ? avc_has_perm+0x469/0x7e0 [ 967.886855] ? lock_downgrade+0x900/0x900 [ 967.891023] ? check_preemption_disabled+0x48/0x200 [ 967.896067] ? rcu_read_unlock_special.part.39+0x11f0/0x11f0 [ 967.901882] ? kasan_check_read+0x11/0x20 [ 967.906059] ? rcu_dynticks_curr_cpu_in_eqs+0x9f/0x160 [ 967.911374] ? rcu_bh_qs+0xc0/0xc0 [ 967.914962] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 967.920516] ? avc_has_perm+0x55f/0x7e0 [ 967.924530] ? avc_has_perm_noaudit+0x630/0x630 [ 967.929256] ? __f_unlock_pos+0x19/0x20 [ 967.933254] ? lock_downgrade+0x900/0x900 [ 967.937422] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 967.943009] ? sock_has_perm+0x2bc/0x3e0 [ 967.947086] ? selinux_secmark_relabel_packet+0xe0/0xe0 [ 967.952485] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 967.958055] ? selinux_netlbl_socket_setsockopt+0xf1/0x520 [ 967.963699] ? selinux_netlbl_sock_rcv_skb+0x6f0/0x6f0 [ 967.969022] sock_common_setsockopt+0x9a/0xe0 [ 967.973542] __sys_setsockopt+0x1ba/0x3c0 [ 967.977708] ? kernel_accept+0x310/0x310 [ 967.981784] ? lockdep_hardirqs_on+0x421/0x5c0 [ 967.986392] ? trace_hardirqs_on+0xbd/0x310 [ 967.990738] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 967.996622] ? __bpf_trace_preemptirq_template+0x30/0x30 [ 968.002098] __x64_sys_setsockopt+0xbe/0x150 [ 968.006537] do_syscall_64+0x1b9/0x820 [ 968.010437] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 968.015822] ? syscall_return_slowpath+0x5e0/0x5e0 [ 968.020784] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 968.025656] ? trace_hardirqs_on_caller+0x310/0x310 [ 968.030693] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 968.035724] ? prepare_exit_to_usermode+0x291/0x3b0 [ 968.040769] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 968.045738] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 968.050948] RIP: 0033:0x457569 [ 968.054158] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 968.073069] RSP: 002b:00007f29ab10ec78 EFLAGS: 00000246 ORIG_RAX: 0000000000000036 [ 968.073089] RAX: ffffffffffffffda RBX: 00007f29ab10ec90 RCX: 0000000000457569 [ 968.073098] RDX: 000000000000006b RSI: 0000000000000084 RDI: 0000000000000004 03:11:19 executing program 1: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x3, 0x4, 0x4, 0x1, 0x0, 0x1}, 0xe) r1 = accept4(0xffffffffffffffff, &(0x7f0000000c80)=@pptp={0x18, 0x2, {0x0, @multicast1}}, &(0x7f0000000d00)=0x80, 0x80000) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(0xffffffffffffff9c, 0x84, 0x71, &(0x7f0000000d40)={0x0, 0xffffffffffff0001}, &(0x7f0000000d80)=0x8) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r1, 0x84, 0x6, &(0x7f0000000dc0)={r2, @in6={{0xa, 0x4e21, 0x6b, @ipv4, 0x6}}}, &(0x7f0000000e80)=0x84) setsockopt$sock_int(r1, 0x1, 0x3c, &(0x7f0000000ac0)=0x38c, 0x4) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000040), 0xc, &(0x7f0000000080)={&(0x7f0000000240)=ANY=[]}}, 0x0) clone(0x2102001ffa, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) socketpair(0x1f, 0x0, 0x4, &(0x7f0000000b00)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SNDRV_RAWMIDI_IOCTL_INFO(r3, 0x810c5701, &(0x7f0000000b40)) r4 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f00000009c0)=0x0) kcmp$KCMP_EPOLL_TFD(r5, 0x0, 0x7, r0, &(0x7f0000000640)={0xffffffffffffffff, r4, 0x80}) r6 = socket$rds(0x15, 0x5, 0x0) bind$rds(r6, &(0x7f0000000180)={0x2, 0x0, @loopback}, 0x10) ioctl$TIOCEXCL(0xffffffffffffffff, 0x540c) sendmsg$rds(r6, &(0x7f0000001600)={&(0x7f0000000000)={0x2, 0x0, @remote, [0x0, 0x700]}, 0x10, &(0x7f0000000100), 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="480000000000000014010000010000000000000000000000", @ANYPTR=&(0x7f0000000040)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00'], @ANYBLOB="8903080000000000", @ANYPTR=&(0x7f00000006c0)=ANY=[@ANYPTR=&(0x7f0000000a00)=ANY=[@ANYBLOB="0000000000000000000000000000000000000000000000000000000000000000000000000cd91e040000000041fb26ac2c2f34a94faf60f92140245577160f08f591546c5ec1afa9873d21fde4f34cbaddea6264bffabed05657233f459a79f0bea7a4f3123a3d28f562e0a1d0b499ae4fbe8a947f0ae8b1b2bd87c8fec359ede59f4d0c1b36165bfcc21794656627ff58"], @ANYBLOB=',\x00\x00\x00\x00\x00\x00\x00', @ANYPTR=&(0x7f00000001c0)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00'], @ANYBLOB='C\x00\x00\x00\x00\x00\x00\x00', @ANYPTR=&(0x7f0000000240)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00'], @ANYBLOB="c600000000000000", @ANYPTR=&(0x7f0000000140)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00'], @ANYBLOB="0f00000000000000", @ANYPTR=&(0x7f0000000340)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00'], @ANYBLOB="ffff070000000000", @ANYPTR=&(0x7f0000000380)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00'], @ANYBLOB='*\x00\x00\x00\x00\x00\x00\x00', @ANYPTR=&(0x7f00000003c0)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00'], @ANYBLOB='M\x00\x00\x00\x00\x00\x00\x00', @ANYPTR=&(0x7f0000000440)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00'], @ANYBLOB="f400000000000000", @ANYPTR=&(0x7f0000000540)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00'], @ANYBLOB="db00000000000000"], @ANYBLOB='\t\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00'], 0x48}, 0x0) getsockopt$netlink(0xffffffffffffffff, 0x10e, 0x0, &(0x7f00000012c0)=""/80, &(0x7f0000000180)=0x50) lsetxattr(&(0x7f0000000000)='./file0\x00', &(0x7f00000001c0)=ANY=[@ANYBLOB="73656393726974792e23d200"], &(0x7f0000000240)='\x00', 0x1, 0x0) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000140)={0xffffffffffffffff, &(0x7f0000000040)}, 0x10) syz_mount_image$minix(&(0x7f0000000680)='minix\x00', &(0x7f0000000800)='./file0\x00', 0x3, 0x1, &(0x7f0000000940)=[{&(0x7f0000000880)="b3dbd42bb4c289244c3d981b8b25b6e2e20b260377a8ce7dc95b23f9575c4d3bc3bb61165adcd4905c2a389782f183275fa2a80fb70c685237032155fe0b5b05030072a8fa856de822a97931acc6de901a54a31e397e34557abce1610cb63dba3f3b3daa626b0720c0e86e18f608b5bd4e58f26b48e20e756c8f5426b110fa040c401906b0e45865db3f35b84cbf8c", 0x8f}], 0x80, 0x0) syz_open_dev$usbmon(&(0x7f0000000980)='/dev/usbmon#\x00', 0x1, 0x0) [ 968.073108] RBP: 000000000072bf00 R08: 0000000000000020 R09: 0000000000000000 [ 968.073118] R10: 0000000020000000 R11: 0000000000000246 R12: 00007f29ab10f6d4 [ 968.073128] R13: 00000000004ca7a8 R14: 00000000004d6810 R15: 0000000000000005 03:11:19 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000040)="153f6234488dd25d766070") socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup2(r2, r2) sendmsg$netlink(r3, &(0x7f0000028fc8)={0x0, 0x0, &(0x7f0000019000), 0x0, &(0x7f0000000040)=[@rights={0x18, 0x1, 0x1, [r1]}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000000b80)=[{{&(0x7f0000000200)=@l2, 0x80, &(0x7f00000005c0), 0x0, &(0x7f0000000600)=""/84, 0x54}}, {{&(0x7f0000000680)=@l2, 0x80, &(0x7f0000000a40), 0x0, &(0x7f0000000ac0)=""/147, 0x93}}], 0x4000000000002ce, 0x62, 0x0) [ 968.142822] hfs: unable to parse mount options 03:11:19 executing program 1: r0 = syz_open_dev$adsp(&(0x7f0000000040)='/dev/adsp#\x00', 0x0, 0x1fe) epoll_pwait(0xffffffffffffffff, &(0x7f0000000080), 0x0, 0x0, &(0x7f00000000c0)={0xfffffffffffff1d8}, 0x8) fchdir(r0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000bc0)={0x0}, &(0x7f0000000c00)=0xc) ioctl$sock_inet6_SIOCSIFADDR(r1, 0x89a1, &(0x7f0000000080)={@local={0xfe, 0x80, [0x0, 0x3ef, 0x1f00000000000000, 0x3f00000000000000, 0x0, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}, 0x0, r2}) ioctl$sock_inet6_SIOCADDRT(r1, 0x89a0, &(0x7f0000000100)={@local, @empty, @loopback, 0x3}) getsockopt$inet_sctp_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, &(0x7f0000000740)=ANY=[@ANYBLOB], &(0x7f00000002c0)=0x1) r3 = syz_open_dev$vcsa(&(0x7f0000000100)='/dev/vcsa#\x00', 0x0, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) r4 = openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x801, 0x0) setsockopt$inet_sctp6_SCTP_ADAPTATION_LAYER(r4, 0x84, 0x7, &(0x7f0000000080)={0x2}, 0x4) ioctl$sock_inet6_udp_SIOCOUTQ(r3, 0x5411, &(0x7f0000000180)) r5 = syz_open_dev$usb(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x63, 0x2000) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x5) ioctl$RTC_AIE_OFF(r0, 0x7002) restart_syscall() 03:11:19 executing program 3: socket$packet(0x11, 0xa, 0x300) syz_emit_ethernet(0x4e, &(0x7f0000000080)={@local, @broadcast, [{}], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x0, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000000000]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, &(0x7f00000002c0)) [ 968.183774] rdma_op 000000009a4b1b8e conn xmit_rdma (null) [ 968.274307] hfs: unable to parse mount options 03:11:20 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e23}, 0x1c) listen(r0, 0x18) r1 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f0000000000)=[@in={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0xc}}, @in={0x2, 0x4e23, @local}], 0x20) 03:11:20 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x40000000, &(0x7f00000003c0), 0x0, &(0x7f0000000580)={[{@session={'session'}}]}) 03:11:20 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x40000, &(0x7f00000003c0), 0x0, &(0x7f0000000580)={[{@session={'session'}}]}) 03:11:20 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000040)="153f6234488dd25d766070") socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup2(r2, r2) sendmsg$netlink(r3, &(0x7f0000028fc8)={0x0, 0x0, &(0x7f0000019000), 0x0, &(0x7f0000000040)=[@rights={0x18, 0x1, 0x1, [r1]}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000000b80)=[{{&(0x7f0000000200)=@l2, 0x80, &(0x7f00000005c0), 0x0, &(0x7f0000000600)=""/84, 0x54}}, {{&(0x7f0000000680)=@l2, 0x80, &(0x7f0000000a40), 0x0, &(0x7f0000000ac0)=""/147, 0x93}}], 0x4000000000002ce, 0x62, 0x0) 03:11:20 executing program 3: socket$packet(0x11, 0xa, 0x300) syz_emit_ethernet(0x4e, &(0x7f0000000080)={@local, @broadcast, [{}], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x0, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800e000000000000]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, &(0x7f00000002c0)) 03:11:20 executing program 3: socket$packet(0x11, 0xa, 0x300) syz_emit_ethernet(0x4e, &(0x7f0000000080)={@local, @broadcast, [{}], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x0, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf0]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, &(0x7f00000002c0)) 03:11:20 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e23}, 0x1c) listen(r0, 0x18) r1 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x29, 0x6b, &(0x7f0000000000)=[@in={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0xc}}, @in={0x2, 0x4e23, @local}], 0x20) [ 969.043666] hfs: unable to parse mount options 03:11:20 executing program 3: socket$packet(0x11, 0xa, 0x300) syz_emit_ethernet(0x4e, &(0x7f0000000080)={@local, @broadcast, [{}], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x0, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffca88]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, &(0x7f00000002c0)) 03:11:20 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000040)="153f6234488dd25d766070") socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup2(r2, r2) sendmsg$netlink(r3, &(0x7f0000028fc8)={0x0, 0x0, &(0x7f0000019000), 0x0, &(0x7f0000000040)=[@rights={0x18, 0x1, 0x1, [r1]}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000000b80)=[{{&(0x7f0000000200)=@l2, 0x80, &(0x7f00000005c0), 0x0, &(0x7f0000000600)=""/84, 0x54}}, {{&(0x7f0000000680)=@l2, 0x80, &(0x7f0000000a40), 0x0, &(0x7f0000000ac0)=""/147, 0x93}}], 0x4000000000002ce, 0x62, 0x0) [ 969.067622] hfs: unable to parse mount options 03:11:20 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000480)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f00000000c0)=[@textreal={0x8, &(0x7f0000000080)="baa100b000eef36cba2100ec66b9800000c00f326635001000000f30bad104ecc80080d267d9f8f30f1bb429000f20c06635200000000f22c067f3af", 0x3c}], 0x1, 0x0, &(0x7f0000000600), 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) sched_setaffinity(0x0, 0x8, &(0x7f0000000140)=0x40000000000009) r3 = perf_event_open(&(0x7f00000002c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x44b}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff], 0x1f000}) ioctl$KVM_RUN(r2, 0xae80, 0x0) write$P9_RCLUNK(0xffffffffffffffff, &(0x7f0000000040)={0x8f}, 0x1a7) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r3, 0x40042409, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(0xffffffffffffffff, 0xc4c85512, &(0x7f00000004c0)={{0x0, 0x0, 0x0, 0x2, 'syz1\x00', 0x8}, 0x0, [0x401, 0x0, 0x0, 0x0, 0x0, 0x1, 0x7, 0x0, 0x0, 0x80, 0x1, 0xffffffffffff05ae, 0x0, 0x0, 0x1, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0xffff, 0x0, 0x0, 0x0, 0x800, 0x2, 0x0, 0x0, 0x7, 0x0, 0x4, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0xa735, 0x80, 0x0, 0x400, 0x101, 0x0, 0x2, 0x0, 0x1, 0x4, 0x10000, 0x0, 0x400, 0x0, 0x0, 0x0, 0x0, 0x329c, 0x3, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x7d, 0x7bd, 0x0, 0x0, 0x10001, 0x0, 0x0, 0x1b7, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x400, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x7, 0x7ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffff7fff], {0x77359400}}) 03:11:20 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x4, &(0x7f00000003c0), 0x0, &(0x7f0000000580)={[{@session={'session'}}]}) 03:11:20 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x6c00, &(0x7f00000003c0), 0x0, &(0x7f0000000580)={[{@session={'session'}}]}) 03:11:20 executing program 3: socket$packet(0x11, 0xa, 0x300) syz_emit_ethernet(0x4e, &(0x7f0000000080)={@local, @broadcast, [{}], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x0, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x88480000]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, &(0x7f00000002c0)) 03:11:20 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e23}, 0x1c) listen(r0, 0x18) r1 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x6, 0x6b, &(0x7f0000000000)=[@in={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0xc}}, @in={0x2, 0x4e23, @local}], 0x20) [ 969.386003] hfs: invalid session number or type of track [ 969.411567] hfs: can't find a HFS filesystem on dev loop4 03:11:20 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000040)="153f6234488dd25d766070") socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup2(r2, r2) sendmsg$netlink(r3, &(0x7f0000028fc8)={0x0, 0x0, &(0x7f0000019000), 0x0, &(0x7f0000000040)=[@rights={0x18, 0x1, 0x1, [r1]}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000000b80)=[{{&(0x7f0000000200)=@l2, 0x80, &(0x7f00000005c0), 0x0, &(0x7f0000000600)=""/84, 0x54}}, {{&(0x7f0000000680)=@l2, 0x80, &(0x7f0000000a40), 0x0, &(0x7f0000000ac0)=""/147, 0x93}}], 0x4000000000002ce, 0x62, 0x0) [ 969.505653] hfs: invalid session number or type of track [ 969.523145] hfs: can't find a HFS filesystem on dev loop4 03:11:21 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x40000000, &(0x7f00000003c0), 0x0, &(0x7f0000000580)={[{@session={'session'}}]}) 03:11:21 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e23}, 0x1c) listen(r0, 0x18) r1 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x5, &(0x7f0000000000)=[@in={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0xc}}, @in={0x2, 0x4e23, @local}], 0x20) [ 969.630663] hfs: unable to parse mount options 03:11:21 executing program 1: unshare(0x24020400) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f00000000c0)={0xffffffffffffffff}) setsockopt$inet_sctp_SCTP_AUTOCLOSE(r1, 0x84, 0x4, &(0x7f0000000100)=0x4, 0x4) r2 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r3 = eventfd(0x0) ioctl$KVM_IOEVENTFD(r2, 0x4040ae79, &(0x7f0000000040)={0x4, &(0x7f0000000140), 0x0, r3}) 03:11:21 executing program 3: socket$packet(0x11, 0xa, 0x300) syz_emit_ethernet(0x4e, &(0x7f0000000080)={@local, @broadcast, [{}], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x0, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2b00]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, &(0x7f00000002c0)) 03:11:21 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x4c00, &(0x7f00000003c0), 0x0, &(0x7f0000000580)={[{@session={'session'}}]}) 03:11:21 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000040)="153f6234488dd25d766070") socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup2(r2, r2) sendmsg$netlink(r3, &(0x7f0000028fc8)={0x0, 0x0, &(0x7f0000019000), 0x0, &(0x7f0000000040)=[@rights={0x18, 0x1, 0x1, [r1]}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000000b80)=[{{&(0x7f0000000200)=@l2, 0x80, &(0x7f00000005c0), 0x0, &(0x7f0000000600)=""/84, 0x54}}, {{&(0x7f0000000680)=@l2, 0x80, &(0x7f0000000a40), 0x0, &(0x7f0000000ac0)=""/147, 0x93}}], 0x4000000000002ce, 0x62, 0x0) 03:11:21 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e23}, 0x1c) listen(r0, 0x18) r1 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x72, &(0x7f0000000000)=[@in={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0xc}}, @in={0x2, 0x4e23, @local}], 0x20) 03:11:21 executing program 1: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000240)='/dev/uhid\x00', 0x0, 0x0) read(r0, &(0x7f00000002c0)=""/169, 0x3) mprotect(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x4) execve(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)=[&(0x7f0000000040)='/dev/uhid\x00'], &(0x7f0000000180)=[&(0x7f00000000c0)='/dev/uhid\x00', &(0x7f0000000100)='cpuset\x00', &(0x7f0000000140)='em1\x00']) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x89e2, &(0x7f00000001c0)={0xffffffffffffffff}) sendto(r1, &(0x7f0000000380)="115c654668082a9b1a47483cce67464b5634d030320f6e6767d18079865aadbfbdeed8f0a1a66af7a09d87d4706707c18a8be9274100d41ef6c46361e6724a6a1dd3613469d79ea8bd59a2827783f529a1687e7a1982d4e141c906c032e5760f2d6a1cdba90a4b0b7b8927826f798369061cf71d13d0c61f38f0d676c8", 0x7d, 0x80, &(0x7f0000000400)=@nfc={0x27, 0x1, 0x2, 0x7}, 0x80) bind$bt_sco(r1, &(0x7f0000000200)={0x1f, {0x0, 0x10001, 0xd9, 0x7, 0x9, 0x6cb}}, 0x8) connect$unix(r1, &(0x7f0000000480)=@file={0x0, './file0\x00'}, 0x6e) 03:11:21 executing program 3: socket$packet(0x11, 0xa, 0x300) syz_emit_ethernet(0x4e, &(0x7f0000000080)={@local, @broadcast, [{}], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x0, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x689]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, &(0x7f00000002c0)) [ 970.066839] hfs: unable to parse mount options 03:11:21 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e23}, 0x1c) listen(r0, 0x18) r1 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x8, &(0x7f0000000000)=[@in={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0xc}}, @in={0x2, 0x4e23, @local}], 0x20) 03:11:21 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0xf403, &(0x7f00000003c0), 0x0, &(0x7f0000000580)={[{@session={'session'}}]}) 03:11:21 executing program 1: ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000000)=0x0) sched_getattr(r0, &(0x7f0000000040), 0x30, 0x0) socketpair$inet(0x2, 0x1, 0xc14, &(0x7f0000000080)) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000100)='/dev/rtc0\x00', 0x2200, 0x0) ioctl$TUNGETVNETHDRSZ(r1, 0x800454d7, &(0x7f0000000140)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = epoll_create1(0x0) r5 = gettid() epoll_ctl$EPOLL_CTL_ADD(r4, 0x1, r2, &(0x7f0000000240)) kcmp$KCMP_EPOLL_TFD(r5, r5, 0x7, r3, &(0x7f00000000c0)={r4, r2, 0x3f00}) gettid() timer_create(0x0, &(0x7f0000066000), &(0x7f00009b1ffc)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x989680}, {0x0, 0x9}}, &(0x7f0000040000)) tkill(0x0, 0x0) [ 970.223613] hfs: unable to parse mount options 03:11:21 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000040)="153f6234488dd25d766070") socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup2(r2, r2) sendmsg$netlink(r3, &(0x7f0000028fc8)={0x0, 0x0, &(0x7f0000019000), 0x0, &(0x7f0000000040)=[@rights={0x18, 0x1, 0x1, [r1]}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000000b80)=[{{&(0x7f0000000200)=@l2, 0x80, &(0x7f00000005c0), 0x0, &(0x7f0000000600)=""/84, 0x54}}, {{&(0x7f0000000680)=@l2, 0x80, &(0x7f0000000a40), 0x0, &(0x7f0000000ac0)=""/147, 0x93}}], 0x4000000000002ce, 0x62, 0x0) 03:11:21 executing program 3: socket$packet(0x11, 0xa, 0x300) syz_emit_ethernet(0x4e, &(0x7f0000000080)={@local, @broadcast, [{}], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x0, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, &(0x7f00000002c0)) 03:11:21 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x60, &(0x7f00000003c0), 0x0, &(0x7f0000000580)={[{@session={'session'}}]}) 03:11:21 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e23}, 0x1c) listen(r0, 0x18) r1 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0xa, &(0x7f0000000000)=[@in={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0xc}}, @in={0x2, 0x4e23, @local}], 0x20) 03:11:21 executing program 1: exit(0x0) r0 = creat(&(0x7f0000000500)='./bus\x00', 0x0) socketpair$inet_sctp(0x2, 0x1, 0x84, &(0x7f0000000600)) fcntl$setstatus(r0, 0x4, 0x6100) r1 = creat(&(0x7f0000000700)='./bus\x00', 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fallocate(r1, 0x0, 0x0, 0x1000f4) ioctl$RTC_VL_READ(0xffffffffffffffff, 0x80047013, &(0x7f00000004c0)) mount$overlay(0x0, &(0x7f00000000c0)='./bus\x00', &(0x7f0000000140)='overlay\x00', 0x0, &(0x7f0000000580)=ANY=[@ANYBLOB='workdir=./buS,nfs_export=off,s']) r2 = open(&(0x7f0000000180)='./bus\x00', 0x0, 0x0) sendfile(r1, 0xffffffffffffffff, &(0x7f0000d83ff8)=0x3301c, 0x0) r3 = open(&(0x7f0000000180)='./bus\x00', 0x0, 0x0) write$P9_RWSTAT(0xffffffffffffffff, &(0x7f0000000280)={0x7, 0x7f, 0x2}, 0x7) ioctl$DRM_IOCTL_NEW_CTX(0xffffffffffffffff, 0x40086425, &(0x7f00000005c0)) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_INFO(r3, 0xc08c5335, &(0x7f00000002c0)={0x5, 0x0, 0x0, 'queue0\x00', 0x1}) sendfile(r0, r3, &(0x7f0000d83ff8)=0x2400, 0x8000fffffffe) preadv(0xffffffffffffffff, &(0x7f00000000c0)=[{&(0x7f00000002c0)=""/4096, 0x1000}], 0x1, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TEMPO(r2, 0x402c5342, &(0x7f00000001c0)={0x1, 0x1, 0x8, {}, 0x1, 0x9}) 03:11:22 executing program 3: socket$packet(0x11, 0xa, 0x300) syz_emit_ethernet(0x4e, &(0x7f0000000080)={@local, @broadcast, [{}], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x0, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, &(0x7f00000002c0)) [ 970.557149] hfs: unable to parse mount options [ 970.575291] hfs: unable to parse mount options 03:11:22 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000040)="153f6234488dd25d766070") socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup2(r2, r2) sendmsg$netlink(r3, &(0x7f0000028fc8)={0x0, 0x0, &(0x7f0000019000), 0x0, &(0x7f0000000040)=[@rights={0x18, 0x1, 0x1, [r1]}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000000b80)=[{{&(0x7f0000000200)=@l2, 0x80, &(0x7f00000005c0), 0x0, &(0x7f0000000600)=""/84, 0x54}}, {{&(0x7f0000000680)=@l2, 0x80, &(0x7f0000000a40), 0x0, &(0x7f0000000ac0)=""/147, 0x93}}], 0x4000000000002ce, 0x62, 0x0) [ 970.678927] hfs: unable to parse mount options 03:11:22 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x97ffffff, &(0x7f00000003c0), 0x0, &(0x7f0000000580)={[{@session={'session'}}]}) [ 970.766472] overlayfs: unrecognized mount option "s" or missing value 03:11:22 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e23}, 0x1c) listen(r0, 0x18) r1 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x77, &(0x7f0000000000)=[@in={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0xc}}, @in={0x2, 0x4e23, @local}], 0x20) 03:11:22 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0xfffffdfd, &(0x7f00000003c0), 0x0, &(0x7f0000000580)={[{@session={'session'}}]}) [ 970.799400] audit: type=1804 audit(1539659482.235:149): pid=22865 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor1" name="/root/syzkaller-testdir440219986/syzkaller.HCCNbN/1753/bus" dev="sda1" ino=18757 res=1 03:11:22 executing program 3: socket$packet(0x11, 0xa, 0x300) syz_emit_ethernet(0x4e, &(0x7f0000000080)={@local, @broadcast, [{}], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x0, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8847000000000000]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, &(0x7f00000002c0)) [ 970.998206] audit: type=1804 audit(1539659482.265:150): pid=22860 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor1" name="/root/syzkaller-testdir440219986/syzkaller.HCCNbN/1753/bus" dev="sda1" ino=18757 res=1 03:11:22 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000040)="153f6234488dd25d766070") socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup2(r2, r2) sendmsg$netlink(r3, &(0x7f0000028fc8)={0x0, 0x0, &(0x7f0000019000), 0x0, &(0x7f0000000040)=[@rights={0x18, 0x1, 0x1, [r1]}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000000b80)=[{{&(0x7f0000000200)=@l2, 0x80, &(0x7f00000005c0), 0x0, &(0x7f0000000600)=""/84, 0x54}}, {{&(0x7f0000000680)=@l2, 0x80, &(0x7f0000000a40), 0x0, &(0x7f0000000ac0)=""/147, 0x93}}], 0x4000000000002ce, 0x62, 0x0) 03:11:22 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e23}, 0x1c) listen(r0, 0x18) r1 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x13, &(0x7f0000000000)=[@in={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0xc}}, @in={0x2, 0x4e23, @local}], 0x20) [ 971.160310] hfs: unable to parse mount options 03:11:22 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x6c, &(0x7f00000003c0), 0x0, &(0x7f0000000580)={[{@session={'session'}}]}) 03:11:22 executing program 3: socket$packet(0x11, 0xa, 0x300) syz_emit_ethernet(0x4e, &(0x7f0000000080)={@local, @broadcast, [{}], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x0, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffff000]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, &(0x7f00000002c0)) 03:11:22 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e23}, 0x1c) listen(r0, 0x18) r1 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x9, &(0x7f0000000000)=[@in={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0xc}}, @in={0x2, 0x4e23, @local}], 0x20) [ 971.398602] hfs: unable to parse mount options [ 971.414907] hfs: unable to parse mount options [ 971.436911] syz-executor1 (22860) used greatest stack depth: 11840 bytes left [ 971.483258] audit: type=1804 audit(1539659482.915:151): pid=22865 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=ToMToU comm="syz-executor1" name="/root/syzkaller-testdir440219986/syzkaller.HCCNbN/1753/bus" dev="sda1" ino=18757 res=1 [ 971.493170] overlayfs: unrecognized mount option "s" or missing value [ 971.536814] hfs: unable to parse mount options [ 971.605042] audit: type=1804 audit(1539659482.915:152): pid=22906 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=ToMToU comm="syz-executor1" name="/root/syzkaller-testdir440219986/syzkaller.HCCNbN/1753/bus" dev="sda1" ino=18757 res=1 03:11:23 executing program 1: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={&(0x7f0000000280), 0xc, &(0x7f00000001c0)={&(0x7f0000000140)=@getrule={0x14, 0x22, 0x401}, 0x5c}}, 0x0) sendmsg$nl_xfrm(r0, &(0x7f0000000100)={&(0x7f0000000000), 0xc, &(0x7f0000000180)={&(0x7f0000000540)=@polexpire={0xc0, 0x1b, 0x1, 0x0, 0x0, {{{@in=@multicast2, @in6=@local}, {}, {}, 0x0, 0x6e6bba}}}, 0xc0}, 0x8}, 0x0) socket(0x1b, 0x2, 0x7fff) 03:11:23 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x6, &(0x7f00000003c0), 0x0, &(0x7f0000000580)={[{@session={'session'}}]}) 03:11:23 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e23}, 0x1c) listen(r0, 0x18) r1 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x21, &(0x7f0000000000)=[@in={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0xc}}, @in={0x2, 0x4e23, @local}], 0x20) 03:11:23 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000040)="153f6234488dd25d766070") socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup2(r2, r2) sendmsg$netlink(r3, &(0x7f0000028fc8)={0x0, 0x0, &(0x7f0000019000), 0x0, &(0x7f0000000040)=[@rights={0x18, 0x1, 0x1, [r1]}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000000b80)=[{{&(0x7f0000000200)=@l2, 0x80, &(0x7f00000005c0), 0x0, &(0x7f0000000600)=""/84, 0x54}}, {{&(0x7f0000000680)=@l2, 0x80, &(0x7f0000000a40), 0x0, &(0x7f0000000ac0)=""/147, 0x93}}], 0x4000000000002ce, 0x62, 0x0) 03:11:23 executing program 3: socket$packet(0x11, 0xa, 0x300) syz_emit_ethernet(0x4e, &(0x7f0000000080)={@local, @broadcast, [{}], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x0, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c000000]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, &(0x7f00000002c0)) 03:11:23 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1000000000000000, &(0x7f00000003c0), 0x0, &(0x7f0000000580)={[{@session={'session'}}]}) [ 971.711696] audit: type=1804 audit(1539659482.975:153): pid=22865 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor1" name="/root/syzkaller-testdir440219986/syzkaller.HCCNbN/1753/bus" dev="sda1" ino=18757 res=1 [ 971.804185] audit: type=1804 audit(1539659482.985:154): pid=22865 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor1" name="/root/syzkaller-testdir440219986/syzkaller.HCCNbN/1753/bus" dev="sda1" ino=18757 res=1 [ 971.859796] netlink: 4 bytes leftover after parsing attributes in process `syz-executor1'. 03:11:23 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e23}, 0x1c) listen(r0, 0x18) r1 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x79, &(0x7f0000000000)=[@in={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0xc}}, @in={0x2, 0x4e23, @local}], 0x20) 03:11:23 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000040)="153f6234488dd25d766070") socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup2(r2, r2) sendmsg$netlink(r3, &(0x7f0000028fc8)={0x0, 0x0, &(0x7f0000019000), 0x0, &(0x7f0000000040)=[@rights={0x18, 0x1, 0x1, [r1]}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000000b80)=[{{&(0x7f0000000200)=@l2, 0x80, &(0x7f00000005c0), 0x0, &(0x7f0000000600)=""/84, 0x54}}, {{&(0x7f0000000680)=@l2, 0x80, &(0x7f0000000a40), 0x0, &(0x7f0000000ac0)=""/147, 0x93}}], 0x4000000000002ce, 0x62, 0x0) [ 971.903692] hfs: invalid session number or type of track [ 971.942010] hfs: can't find a HFS filesystem on dev loop4 03:11:23 executing program 3: socket$packet(0x11, 0xa, 0x300) syz_emit_ethernet(0x4e, &(0x7f0000000080)={@local, @broadcast, [{}], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x0, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf000]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, &(0x7f00000002c0)) 03:11:23 executing program 1: mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x4, 0x31, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sndpcmc(&(0x7f0000000040)='/dev/snd/pcmC#D#c\x00', 0x4, 0x0) ioctl$TUNSETTXFILTER(r0, 0x400454d1, &(0x7f0000000080)={0x1, 0x2, [@dev={[], 0x13}, @dev={[], 0xd}]}) futex(&(0x7f0000000ffc), 0x84, 0x0, &(0x7f0000fd3ff0)={0xffff, 0x4}, &(0x7f0000000ffc), 0x0) [ 972.060491] hfs: invalid session number or type of track [ 972.097724] hfs: can't find a HFS filesystem on dev loop4 03:11:23 executing program 1: syz_mount_image$ntfs(&(0x7f0000000180)='ntfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000780), 0x8000, &(0x7f0000000000)=ANY=[@ANYBLOB="0266e651e3d4d6af10e631163b46da3ac9e1f66d638e5d70b3c4e6ec603867bcbd00f3f9380288d5499bbe732146d4712749833be70a13e6de2a31e63fa0a71d15fae20117d696979b08710f035bef87ee2a6df1243fff19f54df566b207058f6031376d88"]) r0 = syz_open_dev$admmidi(&(0x7f0000000080)='/dev/admmidi#\x00', 0x81, 0x80) ioctl$sock_inet_SIOCGIFDSTADDR(r0, 0x8917, &(0x7f00000000c0)={'bpq0\x00', {0x2, 0x4e20, @rand_addr=0xbd2}}) setsockopt$l2tp_PPPOL2TP_SO_SENDSEQ(r0, 0x111, 0x3, 0x0, 0x4) r1 = shmget(0x1, 0x1000, 0x0, &(0x7f0000fff000/0x1000)=nil) shmat(r1, &(0x7f0000ffd000/0x3000)=nil, 0x1000) 03:11:23 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e23}, 0x1c) listen(r0, 0x18) r1 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x64, &(0x7f0000000000)=[@in={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0xc}}, @in={0x2, 0x4e23, @local}], 0x20) 03:11:23 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0xfffffff6, &(0x7f00000003c0), 0x0, &(0x7f0000000580)={[{@session={'session'}}]}) [ 972.175297] hfs: unable to parse mount options 03:11:23 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000040)="153f6234488dd25d766070") socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup2(r2, r2) sendmsg$netlink(r3, &(0x7f0000028fc8)={0x0, 0x0, &(0x7f0000019000), 0x0, &(0x7f0000000040)=[@rights={0x18, 0x1, 0x1, [r1]}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000000b80)=[{{&(0x7f0000000200)=@l2, 0x80, &(0x7f00000005c0), 0x0, &(0x7f0000000600)=""/84, 0x54}}, {{&(0x7f0000000680)=@l2, 0x80, &(0x7f0000000a40), 0x0, &(0x7f0000000ac0)=""/147, 0x93}}], 0x4000000000002ce, 0x62, 0x0) 03:11:23 executing program 3: socket$packet(0x11, 0xa, 0x300) syz_emit_ethernet(0x4e, &(0x7f0000000080)={@local, @broadcast, [{}], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x0, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, &(0x7f00000002c0)) 03:11:23 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0xedc000000000, &(0x7f00000003c0), 0x0, &(0x7f0000000580)={[{@session={'session'}}]}) [ 972.387345] ntfs: (device loop1): parse_options(): Unrecognized mount option fæQãÔÖ¯æ1;FÚ:ÉáömcŽ]p³Äæì`8g¼½. 03:11:23 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e23}, 0x1c) listen(r0, 0x18) r1 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x18, &(0x7f0000000000)=[@in={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0xc}}, @in={0x2, 0x4e23, @local}], 0x20) 03:11:24 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000040)="153f6234488dd25d766070") socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup2(r2, r2) sendmsg$netlink(r3, &(0x7f0000028fc8)={0x0, 0x0, &(0x7f0000019000), 0x0, &(0x7f0000000040)=[@rights={0x18, 0x1, 0x1, [r1]}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000000b80)=[{{&(0x7f0000000200)=@l2, 0x80, &(0x7f00000005c0), 0x0, &(0x7f0000000600)=""/84, 0x54}}, {{&(0x7f0000000680)=@l2, 0x80, &(0x7f0000000a40), 0x0, &(0x7f0000000ac0)=""/147, 0x93}}], 0x4000000000002ce, 0x62, 0x0) [ 972.512697] ntfs: (device loop1): parse_options(): Unrecognized mount option fæQãÔÖ¯æ1;FÚ:ÉáömcŽ]p³Äæì`8g¼½. 03:11:24 executing program 3: socket$packet(0x11, 0xa, 0x300) syz_emit_ethernet(0x4e, &(0x7f0000000080)={@local, @broadcast, [{}], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x0, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffff000]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, &(0x7f00000002c0)) 03:11:24 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000001000)={0x26, 'skcipher\x00', 0x0, 0x0, 'rfc3686(cbc(des3_ede))\x00'}, 0xfffffffffffffd20) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000412ff8)="3665a1ab415b7ac7", 0x8) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000440)=[{&(0x7f0000000200)="9da2ba99b8118e9b989e", 0xa}], 0x1, &(0x7f0000000080)}, 0x0) 03:11:24 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e23}, 0x1c) listen(r0, 0x18) r1 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6, &(0x7f0000000000)=[@in={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0xc}}, @in={0x2, 0x4e23, @local}], 0x20) [ 972.710899] hfs: unable to parse mount options 03:11:24 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x3f6, &(0x7f00000003c0), 0x0, &(0x7f0000000580)={[{@session={'session'}}]}) [ 972.859884] hfs: unable to parse mount options 03:11:24 executing program 3: socket$packet(0x11, 0xa, 0x300) syz_emit_ethernet(0x4e, &(0x7f0000000080)={@local, @broadcast, [{}], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x0, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x86ddffff00000000]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, &(0x7f00000002c0)) 03:11:24 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000280)='/dev/kvm\x00', 0x0, 0x0) r1 = syz_open_dev$usb(&(0x7f0000000080)='/dev/bus/usb/00#/00#\x00', 0xf6, 0x60000) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000002c0)={{{@in6, @in, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in6=@mcast1}}, &(0x7f00000000c0)=0xe8) ioctl$sock_inet6_SIOCADDRT(r1, 0x890b, &(0x7f00000001c0)={@mcast2, @mcast1, @remote, 0x2, 0x9, 0xfffffffffffffff7, 0x400, 0xab, 0x0, r2}) r3 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r3, 0x4020ae46, &(0x7f0000000400)={0x0, 0x2, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) syz_kvm_setup_cpu$x86(r3, r4, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000180)=[@text64={0x40, &(0x7f0000000140)="420fb507b805000000b98de92d630f01c1f2430f3566b869008ec0f0814b00ec480000470f017a00f3f7e4470f017cc0423e26460f21f6410f01df", 0x3b}], 0x1, 0x0, &(0x7f0000000000), 0x15f) ioctl$KVM_RUN(r4, 0xae80, 0x0) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) ioctl$KVM_RUN(r4, 0xae80, 0x0) ioctl$FS_IOC_GETFLAGS(r3, 0x80086601, &(0x7f0000000040)) 03:11:24 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e23}, 0x1c) listen(r0, 0x18) r1 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0xc, &(0x7f0000000000)=[@in={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0xc}}, @in={0x2, 0x4e23, @local}], 0x20) 03:11:24 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000040)="153f6234488dd25d766070") socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup2(r2, r2) sendmsg$netlink(r3, &(0x7f0000028fc8)={0x0, 0x0, &(0x7f0000019000), 0x0, &(0x7f0000000040)=[@rights={0x18, 0x1, 0x1, [r1]}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000000b80)=[{{&(0x7f0000000200)=@l2, 0x80, &(0x7f00000005c0), 0x0, &(0x7f0000000600)=""/84, 0x54}}, {{&(0x7f0000000680)=@l2, 0x80, &(0x7f0000000a40), 0x0, &(0x7f0000000ac0)=""/147, 0x93}}], 0x4000000000002ce, 0x62, 0x0) [ 973.054956] hfs: unable to parse mount options 03:11:24 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0xffffff8c, &(0x7f00000003c0), 0x0, &(0x7f0000000580)={[{@session={'session'}}]}) 03:11:24 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000040)="153f6234488dd25d766070") socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup2(r2, r2) sendmsg$netlink(r3, &(0x7f0000028fc8)={0x0, 0x0, &(0x7f0000019000), 0x0, &(0x7f0000000040)=[@rights={0x18, 0x1, 0x1, [r1]}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000000b80)=[{{&(0x7f0000000200)=@l2, 0x80, &(0x7f00000005c0), 0x0, &(0x7f0000000600)=""/84, 0x54}}, {{&(0x7f0000000680)=@l2, 0x80, &(0x7f0000000a40), 0x0, &(0x7f0000000ac0)=""/147, 0x93}}], 0x4000000000002ce, 0x62, 0x0) 03:11:24 executing program 3: socket$packet(0x11, 0xa, 0x300) syz_emit_ethernet(0x4e, &(0x7f0000000080)={@local, @broadcast, [{}], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x0, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400300]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, &(0x7f00000002c0)) 03:11:24 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e23}, 0x1c) listen(r0, 0x18) r1 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x22, &(0x7f0000000000)=[@in={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0xc}}, @in={0x2, 0x4e23, @local}], 0x20) 03:11:24 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x100000000000000, &(0x7f00000003c0), 0x0, &(0x7f0000000580)={[{@session={'session'}}]}) 03:11:24 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e23}, 0x1c) listen(r0, 0x18) r1 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x65, &(0x7f0000000000)=[@in={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0xc}}, @in={0x2, 0x4e23, @local}], 0x20) [ 973.428858] hfs: unable to parse mount options 03:11:24 executing program 3: socket$packet(0x11, 0xa, 0x300) syz_emit_ethernet(0x4e, &(0x7f0000000080)={@local, @broadcast, [{}], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x0, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8035]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, &(0x7f00000002c0)) 03:11:25 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000040)="153f6234488dd25d766070") socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup2(r2, r2) sendmsg$netlink(r3, &(0x7f0000028fc8)={0x0, 0x0, &(0x7f0000019000), 0x0, &(0x7f0000000040)=[@rights={0x18, 0x1, 0x1, [r1]}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000000b80)=[{{&(0x7f0000000200)=@l2, 0x80, &(0x7f00000005c0), 0x0, &(0x7f0000000600)=""/84, 0x54}}, {{&(0x7f0000000680)=@l2, 0x80, &(0x7f0000000a40), 0x0, &(0x7f0000000ac0)=""/147, 0x93}}], 0x4000000000002ce, 0x62, 0x0) 03:11:25 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x6c00000000000000, &(0x7f00000003c0), 0x0, &(0x7f0000000580)={[{@session={'session'}}]}) [ 973.626966] hfs: unable to parse mount options 03:11:25 executing program 1: r0 = socket$inet(0x2, 0xa, 0x9) r1 = semget(0x1, 0x1, 0x4) semctl$SETVAL(r1, 0x2, 0x10, &(0x7f0000000180)=0xffffffffffffffee) r2 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000340)='/selinux/policy\x00', 0x0, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(r2, 0x29, 0x45, &(0x7f0000000380)={'ah\x00'}, &(0x7f00000003c0)=0x1e) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x505000, 0x0) socket$inet(0x2, 0xf, 0x1000) r3 = syz_open_dev$vcsa(&(0x7f0000000080)='/dev/vcsa#\x00', 0xb9, 0x50000) getsockname$llc(r3, &(0x7f00000000c0)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @broadcast}, &(0x7f0000000100)=0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x7, 0x6, 0xfffffffffffffffc}, 0x2c) fadvise64(r0, 0x0, 0x1c3, 0x3) r4 = add_key$user(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x0}, &(0x7f0000000240)="365488e2d832a299d07ae9fe3e6751f7ffcf640d40d9509d20b185051c98a89013dd17a355f2e6f6d05694782d574605b2457913f7577e80e396d688f7bd037657c0e60b189df5c4aa908fc5cffafaf8858cff2359fed9dca55d640b531d73fa2b5dded22406bc44e536401cd002b6036dc573530366d866192222c45fafc194daa815553b613cb38dc48f581b50571576110be9198c5f57fa79fdd00381aac4ec730a013176c9c9ac21b5f501a6f1689283eecdbd8e526855dc26e744ab028060ad10b905885b3abaea2271f7a3a539e62b933a25b807d5b5d11bf284ea81a021f8041dd07e", 0xe6, 0xfffffffffffffffa) keyctl$revoke(0x3, r4) getsockopt$inet_mreqsrc(r0, 0x0, 0x28, &(0x7f0000000000)={@dev, @local, @broadcast}, &(0x7f0000000040)=0xc) ioctl$RTC_EPOCH_SET(r3, 0x4008700e, 0x0) 03:11:25 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e23}, 0x1c) listen(r0, 0x18) r1 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x75, &(0x7f0000000000)=[@in={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0xc}}, @in={0x2, 0x4e23, @local}], 0x20) 03:11:25 executing program 3: socket$packet(0x11, 0xa, 0x300) syz_emit_ethernet(0x4e, &(0x7f0000000080)={@local, @broadcast, [{}], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x0, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, &(0x7f00000002c0)) 03:11:25 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x4800000000000000, &(0x7f00000003c0), 0x0, &(0x7f0000000580)={[{@session={'session'}}]}) 03:11:25 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000040)="153f6234488dd25d766070") socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup2(r2, r2) sendmsg$netlink(r3, &(0x7f0000028fc8)={0x0, 0x0, &(0x7f0000019000), 0x0, &(0x7f0000000040)=[@rights={0x18, 0x1, 0x1, [r1]}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000000b80)=[{{&(0x7f0000000200)=@l2, 0x80, &(0x7f00000005c0), 0x0, &(0x7f0000000600)=""/84, 0x54}}, {{&(0x7f0000000680)=@l2, 0x80, &(0x7f0000000a40), 0x0, &(0x7f0000000ac0)=""/147, 0x93}}], 0x4000000000002ce, 0x62, 0x0) 03:11:25 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e23}, 0x1c) listen(r0, 0x18) r1 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x7c, &(0x7f0000000000)=[@in={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0xc}}, @in={0x2, 0x4e23, @local}], 0x20) [ 973.957636] hfs: unable to parse mount options 03:11:25 executing program 3: socket$packet(0x11, 0xa, 0x300) syz_emit_ethernet(0x4e, &(0x7f0000000080)={@local, @broadcast, [{}], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x0, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, &(0x7f00000002c0)) 03:11:25 executing program 1: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x101000, 0x0) write$selinux_validatetrans(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="73797374656d5f753a735f696e697472635f657865635f573a73302073797374656d5f753a6f626a6563745f6e3a7379736c6f6764e65dafeb23b60616caec0c154b3b5f696e697472635f657865635f743a7330203030303030303030303030303030303634383735202f757369622f74457c00f1318d9ed62f6d69737369bc3ebe9c0d7f48656f6c2d3500"], 0x91) write$FUSE_OPEN(r0, &(0x7f0000000080)={0x20, 0xffffffffffffffda, 0x3, {0x0, 0x4}}, 0x20) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f0000000180)={0x40, 0x7, 0xfffffffffffff000, 0x8, 0x1d}, 0x14) userfaultfd(0x0) mremap(&(0x7f000090a000/0x3000)=nil, 0x3000, 0x2000, 0x0, &(0x7f0000ffc000/0x2000)=nil) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x3, 0x4, 0x4000000004, 0x40000000000b368, 0x0, 0xffffffffffffffff, 0x0, [0x305f, 0xa]}, 0x101) 03:11:25 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0xffff1f00, &(0x7f00000003c0), 0x0, &(0x7f0000000580)={[{@session={'session'}}]}) 03:11:25 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e23}, 0x1c) listen(r0, 0x18) r1 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x12, &(0x7f0000000000)=[@in={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0xc}}, @in={0x2, 0x4e23, @local}], 0x20) 03:11:25 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000040)="153f6234488dd25d766070") socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup2(r2, r2) sendmsg$netlink(r3, &(0x7f0000028fc8)={0x0, 0x0, &(0x7f0000019000), 0x0, &(0x7f0000000040)=[@rights={0x18, 0x1, 0x1, [r1]}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000000b80)=[{{&(0x7f0000000200)=@l2, 0x80, &(0x7f00000005c0), 0x0, &(0x7f0000000600)=""/84, 0x54}}, {{&(0x7f0000000680)=@l2, 0x80, &(0x7f0000000a40), 0x0, &(0x7f0000000ac0)=""/147, 0x93}}], 0x4000000000002ce, 0x62, 0x0) [ 974.264376] hfs: unable to parse mount options 03:11:25 executing program 3: socket$packet(0x11, 0xa, 0x300) syz_emit_ethernet(0x4e, &(0x7f0000000080)={@local, @broadcast, [{}], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x0, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8060000]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, &(0x7f00000002c0)) 03:11:25 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_PIT2(r1, 0x4040ae77, &(0x7f00000002c0)) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$KDADDIO(r3, 0x4b34, 0x0) write$USERIO_CMD_SEND_INTERRUPT(r2, &(0x7f0000000100), 0x2) ioctl$TCSETSW(r3, 0x5403, &(0x7f0000000180)={0x8000, 0x8, 0x20, 0x2, 0x101, 0xfffffffffffffffc, 0x3, 0x20, 0x81, 0x5, 0x100000001, 0x9}) ioctl$KVM_PPC_GET_PVINFO(r2, 0x4080aea1, &(0x7f00000003c0)=""/174) ioctl$TIOCMBIS(r3, 0x5416, &(0x7f0000000140)=0xac) ioctl$KVM_SET_PIT2(r1, 0xae71, &(0x7f0000000080)={[{0x0, 0x0, 0x1ff}]}) ioctl$int_in(r1, 0x0, &(0x7f0000000000)) 03:11:25 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e23}, 0x1c) listen(r0, 0x18) r1 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x7b, &(0x7f0000000000)=[@in={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0xc}}, @in={0x2, 0x4e23, @local}], 0x20) 03:11:25 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0xf4030000, &(0x7f00000003c0), 0x0, &(0x7f0000000580)={[{@session={'session'}}]}) [ 974.513319] hfs: unable to parse mount options 03:11:26 executing program 3: socket$packet(0x11, 0xa, 0x300) syz_emit_ethernet(0x4e, &(0x7f0000000080)={@local, @broadcast, [{}], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x0, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, &(0x7f00000002c0)) 03:11:26 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000040)="153f6234488dd25d766070") socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup2(r2, r2) sendmsg$netlink(r3, &(0x7f0000028fc8)={0x0, 0x0, &(0x7f0000019000), 0x0, &(0x7f0000000040)=[@rights={0x18, 0x1, 0x1, [r1]}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000000b80)=[{{&(0x7f0000000200)=@l2, 0x80, &(0x7f00000005c0), 0x0, &(0x7f0000000600)=""/84, 0x54}}, {{&(0x7f0000000680)=@l2, 0x80, &(0x7f0000000a40), 0x0, &(0x7f0000000ac0)=""/147, 0x93}}], 0x4000000000002ce, 0x62, 0x0) 03:11:26 executing program 1: r0 = socket$inet6(0xa, 0x6, 0x0) listen(r0, 0x0) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r1) socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet(0x10, 0x3, 0x4) sendmsg(r2, &(0x7f0000000180)={0x0, 0x0, &(0x7f000000d000)=[{&(0x7f00000001c0)="4c0000001300ff09fffd956fa283b70000ffff1c000000000000683540150024001d001fc41180b598bc593ab6821148a730de33a49868c62b2ca654a6613b6aabf35d4c1cbc882b07988100", 0x4c}], 0x1}, 0x0) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x30, &(0x7f0000000240)={0x7, {{0xa, 0x4e22, 0x2, @local}}, 0x0, 0x8, [{{0xa, 0x4e20, 0xfffffffffffffffa, @remote, 0x5b0}}, {{0xa, 0x4e21, 0x7, @empty, 0x1}}, {{0xa, 0x4e20, 0x200, @mcast1, 0x2}}, {{0xa, 0x4e23, 0x3, @empty, 0x4}}, {{0xa, 0x4e20, 0x1ff, @dev={0xfe, 0x80, [], 0x20}, 0x3}}, {{0xa, 0x4e20, 0x4, @remote, 0xff}}, {{0xa, 0x4e20, 0x1, @mcast2, 0x2000000}}, {{0xa, 0x4e23, 0x100, @local, 0x7fff}}]}, 0x490) 03:11:26 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e23}, 0x1c) listen(r0, 0x18) r1 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x15, &(0x7f0000000000)=[@in={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0xc}}, @in={0x2, 0x4e23, @local}], 0x20) 03:11:26 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x2200, &(0x7f00000003c0), 0x0, &(0x7f0000000580)={[{@session={'session'}}]}) 03:11:26 executing program 3: socket$packet(0x11, 0xa, 0x300) syz_emit_ethernet(0x4e, &(0x7f0000000080)={@local, @broadcast, [{}], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x0, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000000000]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, &(0x7f00000002c0)) [ 974.872939] hfs: unable to parse mount options 03:11:26 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e23}, 0x1c) listen(r0, 0x18) r1 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x4, &(0x7f0000000000)=[@in={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0xc}}, @in={0x2, 0x4e23, @local}], 0x20) 03:11:26 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000040)="153f6234488dd25d766070") socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup2(r2, r2) sendmsg$netlink(r3, &(0x7f0000028fc8)={0x0, 0x0, &(0x7f0000019000), 0x0, &(0x7f0000000040)=[@rights={0x18, 0x1, 0x1, [r1]}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000000b80)=[{{&(0x7f0000000200)=@l2, 0x80, &(0x7f00000005c0), 0x0, &(0x7f0000000600)=""/84, 0x54}}, {{&(0x7f0000000680)=@l2, 0x80, &(0x7f0000000a40), 0x0, &(0x7f0000000ac0)=""/147, 0x93}}], 0x4000000000002ce, 0x62, 0x0) 03:11:26 executing program 3: socket$packet(0x11, 0xa, 0x300) syz_emit_ethernet(0x4e, &(0x7f0000000080)={@local, @broadcast, [{}], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x0, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2b]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, &(0x7f00000002c0)) 03:11:26 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0xf703, &(0x7f00000003c0), 0x0, &(0x7f0000000580)={[{@session={'session'}}]}) [ 975.079144] hfs: unable to parse mount options 03:11:26 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e23}, 0x1c) listen(r0, 0x18) r1 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x17, &(0x7f0000000000)=[@in={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0xc}}, @in={0x2, 0x4e23, @local}], 0x20) 03:11:26 executing program 1: r0 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_UMEM_REG(r0, 0x11b, 0x4, &(0x7f0000000040)={&(0x7f0000000000)=""/2, 0x2000, 0x800}, 0x18) ioctl(r0, 0x575f, &(0x7f0000000080)="ee85166519a483e83e664b2bb2f9bcf3f4bee5c43388bf07f42b1d96da5f0a6bd3319596a2c63b6c954fd7eff65e71c97124a3ab85f0a5ffde417cc4cd87dc6dffea24091985dcffc81cf9950e30f425875d9b83ee4dc317371fef77004e82ef412827ff2734ce59d88bf9fd762daea1e483c75e9e8f2279eec75bc148da00f2d6447eeee8fae796567ea7bf0292ac81b8066296b9f4") mmap$xdp(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x80000012, r0, 0x40100000000) 03:11:26 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0xe00, &(0x7f00000003c0), 0x0, &(0x7f0000000580)={[{@session={'session'}}]}) 03:11:26 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e23}, 0x1c) listen(r0, 0x18) r1 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6e, &(0x7f0000000000)=[@in={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0xc}}, @in={0x2, 0x4e23, @local}], 0x20) 03:11:26 executing program 3: socket$packet(0x11, 0xa, 0x300) syz_emit_ethernet(0x4e, &(0x7f0000000080)={@local, @broadcast, [{}], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x0, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc00000000000000]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, &(0x7f00000002c0)) 03:11:26 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000040)="153f6234488dd25d766070") socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup2(r2, r2) sendmsg$netlink(r3, &(0x7f0000028fc8)={0x0, 0x0, &(0x7f0000019000), 0x0, &(0x7f0000000040)=[@rights={0x18, 0x1, 0x1, [r1]}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000000b80)=[{{&(0x7f0000000200)=@l2, 0x80, &(0x7f00000005c0), 0x0, &(0x7f0000000600)=""/84, 0x54}}, {{&(0x7f0000000680)=@l2, 0x80, &(0x7f0000000a40), 0x0, &(0x7f0000000ac0)=""/147, 0x93}}], 0x4000000000002ce, 0x62, 0x0) [ 975.393209] audit: type=1400 audit(1539659486.825:155): avc: denied { map } for pid=23197 comm="syz-executor1" path="socket:[187262]" dev="sockfs" ino=187262 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=socket permissive=1 03:11:26 executing program 1: r0 = socket$inet6(0xa, 0x3, 0x6) fdatasync(r0) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x8, 0x1, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000080), &(0x7f00000001c0)=0xc) getpgrp(0xffffffffffffffff) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f00000002c0)={0x0}, &(0x7f0000000300)=0xc) r4 = syz_open_procfs(r3, &(0x7f0000000340)="6e65ffff08006900") r5 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r5, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r6 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r5, 0x6) setsockopt(r6, 0x10d, 0x800000000d, &(0x7f00001c9fff)="03", 0x1) connect$inet(r6, &(0x7f0000e5c000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) r7 = accept(r5, 0x0, &(0x7f0000000100)=0x3e3) sendmsg$alg(r4, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f00000004c0)="0127e86cf5975957905d87e7f3d2c197a57cd15f7e67423c08c72e09fa3fc6df5659ccf7e002fc43d0405c595e39bc9cc9c547313ba14fd31268021d93ba8a2850ce8414d42f0e79d12a808559f8596e8a6ab3a64055bfed6a3b2ebe1e55ef306ff445004fecc1560626b66e9ace2ce7c29e5d0c82397561e1164a9c5ef430503b5e82bc81a33c30ea53aaae27583b21234023fea599ad37eab6aa70f5ff2a185b775c48ef88c9b6c7dd0938cb10adaca0d01c79ece0c45e782c660551fd2f9a7ef7a53cd593be64d74b1edca1ef8bdaffc20a18b852dfc86b3cd008b8679b88f07400a56b40aa2210819df647181cf0281f6ca668d850be36e5a9", 0x1e4}, {&(0x7f0000000380)="dfe3811fd9044bf2ae23b5c863e6766cfb7b9ec8635502446e484defcf515818766d1c9622d03dc0e4060a90a49c09e464cff8dc36ccc0fcfb9251003582e1bcd4", 0x41}, {&(0x7f0000000200)="885f685b90c6d361eaf15ebbe28a4f849ddded5f290b", 0x16}, {&(0x7f0000000700)="2269ddbfb80c1a8c2d9507b08135443c209462d3dd1969dbdb57ce93805998d23826a131c2a1b7ef6bff03474bfdc1e7ce2af142838da34968f741791b66369a20f8b03ae00bc8dcd40360f3d580e7dcbdbd6fed2a1713653bb7bfac514d8f21e52e30866d61c0dd46f7d0a7ba652a0e8e7b16a70489156ff78f5a84d301afd77a8f12e10e22b9e2602c0100454b33958680b9ef7cc2fea54c584d09c91e83b040ddb0463a2016ec9e2a3e13c3c51b232845272ca32aa65ae11176b4b2a6086cdd1d1f67c957ebce2fa95e850592035d29a75238a75aa34b", 0xd8}], 0x4, &(0x7f0000000440), 0x5f}, 0x800) connect$inet6(0xffffffffffffffff, &(0x7f0000000140)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f00000000c0)='tls\x00', 0x385) setsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000040)={0x0, 0x2710}, 0x10) r8 = syz_open_dev$adsp(&(0x7f0000000240)='/dev/adsp#\x00', 0x0, 0x40000) fcntl$getown(r1, 0x9) getpgid(0xffffffffffffffff) lstat(&(0x7f00000005c0)='./file1\x00', &(0x7f0000002240)) fcntl$getownex(r0, 0x10, &(0x7f0000000400)) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000940), &(0x7f00000022c0)=0xc) ioctl$TIOCGPGRP(r8, 0x540f, &(0x7f0000002300)) fcntl$getown(r2, 0x9) getgroups(0x3, &(0x7f00000023c0)=[0xee00, 0xee00, 0xffffffffffffffff]) getpgrp(0xffffffffffffffff) lstat(&(0x7f0000002400)='./file0\x00', &(0x7f0000002440)) fcntl$getownex(r2, 0x10, &(0x7f00000024c0)) getegid() ioctl$TIOCGSID(r8, 0x5429, &(0x7f0000002500)) sendmmsg(r6, &(0x7f0000005700)=[{{&(0x7f0000003900)=@pptp={0x18, 0x2, {0x0, @rand_addr}}, 0x80, &(0x7f0000003b80), 0x3a5, &(0x7f0000003bc0)}}], 0x3a6, 0x0) sendfile(r7, r4, &(0x7f0000000180), 0x10000014e) [ 975.499881] hfs: unable to parse mount options [ 975.562395] hfs: unable to parse mount options 03:11:27 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e23}, 0x1c) listen(r0, 0x18) r1 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x71, &(0x7f0000000000)=[@in={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0xc}}, @in={0x2, 0x4e23, @local}], 0x20) 03:11:27 executing program 3: socket$packet(0x11, 0xa, 0x300) syz_emit_ethernet(0x4e, &(0x7f0000000080)={@local, @broadcast, [{}], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x0, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80350000]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, &(0x7f00000002c0)) 03:11:27 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0xf7030000, &(0x7f00000003c0), 0x0, &(0x7f0000000580)={[{@session={'session'}}]}) 03:11:27 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x400000000000000, &(0x7f00000003c0), 0x0, &(0x7f0000000580)={[{@session={'session'}}]}) 03:11:27 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000040)="153f6234488dd25d766070") socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup2(r2, r2) sendmsg$netlink(r3, &(0x7f0000028fc8)={0x0, 0x0, &(0x7f0000019000), 0x0, &(0x7f0000000040)=[@rights={0x18, 0x1, 0x1, [r1]}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000000b80)=[{{&(0x7f0000000200)=@l2, 0x80, &(0x7f00000005c0), 0x0, &(0x7f0000000600)=""/84, 0x54}}, {{&(0x7f0000000680)=@l2, 0x80, &(0x7f0000000a40), 0x6, &(0x7f0000000ac0)=""/147, 0x93}}], 0x4000000000002ce, 0x62, 0x0) 03:11:27 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e23}, 0x1c) listen(r0, 0x18) r1 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x14, &(0x7f0000000000)=[@in={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0xc}}, @in={0x2, 0x4e23, @local}], 0x20) 03:11:27 executing program 3: socket$packet(0x11, 0xa, 0x300) syz_emit_ethernet(0x4e, &(0x7f0000000080)={@local, @broadcast, [{}], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x0, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x88640000]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, &(0x7f00000002c0)) 03:11:27 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e23}, 0x1c) listen(r0, 0x18) r1 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x78, &(0x7f0000000000)=[@in={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0xc}}, @in={0x2, 0x4e23, @local}], 0x20) [ 976.033272] hfs: unable to parse mount options 03:11:27 executing program 3: socket$packet(0x11, 0xa, 0x300) syz_emit_ethernet(0x4e, &(0x7f0000000080)={@local, @broadcast, [{}], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x0, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x806]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, &(0x7f00000002c0)) 03:11:27 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000040)="153f6234488dd25d766070") socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup2(r2, r2) sendmsg$netlink(r3, &(0x7f0000028fc8)={0x0, 0x0, &(0x7f0000019000), 0x0, &(0x7f0000000040)=[@rights={0x18, 0x1, 0x1, [r1]}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000000b80)=[{{&(0x7f0000000200)=@l2, 0x80, &(0x7f00000005c0), 0x0, &(0x7f0000000600)=""/84, 0x54}}, {{&(0x7f0000000680)=@l2, 0x80, &(0x7f0000000a40), 0x4000000000000, &(0x7f0000000ac0)=""/147, 0x93}}], 0x4000000000002ce, 0x62, 0x0) 03:11:27 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x74000000, &(0x7f00000003c0), 0x0, &(0x7f0000000580)={[{@session={'session'}}]}) [ 976.200896] hfs: unable to parse mount options [ 976.217326] dccp_close: ABORT with 1061 bytes unread 03:11:27 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e23}, 0x1c) listen(r0, 0x18) r1 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0xb, &(0x7f0000000000)=[@in={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0xc}}, @in={0x2, 0x4e23, @local}], 0x20) 03:11:27 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000480)='/dev/ptmx\x00', 0x1, 0x0) write(r2, &(0x7f0000c34fff), 0xffffff0b) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, &(0x7f0000000300)=ANY=[]) ioctl$PIO_CMAP(r0, 0x4b71, &(0x7f0000000040)={0x400, 0x5e, 0x5, 0x6, 0x0, 0x3}) ioctl$TCSETS(r2, 0x541a, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f}) r3 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/avc/cache_stats\x00', 0x0, 0x0) connect$inet(r3, &(0x7f0000000200)={0x2, 0x4e23}, 0x10) r4 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000400)='/selinux/avc/cache_stats\x00', 0x0, 0x0) r5 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) ioctl$PIO_FONTRESET(r2, 0x4b6d, 0x0) openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) getuid() ioctl$TIOCGLCKTRMIOS(r2, 0x5456, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}) ioctl$KVM_REGISTER_COALESCED_MMIO(r1, 0x4010ae67, &(0x7f0000000080)={0x101004, 0x102000}) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000840)={0x0, @remote, @rand_addr}, &(0x7f0000000100)=0xc) setsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, &(0x7f0000000340)={0x0, @in={{0x2, 0x0, @dev}}}, 0x90) sync_file_range(r5, 0x0, 0x0, 0x0) setsockopt$ARPT_SO_SET_REPLACE(r4, 0x0, 0x60, &(0x7f00000008c0)=ANY=[@ANYBLOB="66696c74657200000000000000000000000000000000000000000000000000000700000004000000a8040000800200004001000040010000c0030000c0030000c003000004000000", @ANYPTR=&(0x7f00000004c0)=ANY=[@ANYBLOB="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"], @ANYBLOB="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"], 0x4f8) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r1, 0x84, 0x66, &(0x7f0000000240)={0x0, 0x5}, &(0x7f0000000280)=0x8) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(r4, 0x84, 0x66, &(0x7f0000000300)={r6, 0x6}, &(0x7f0000000440)=0x8) fcntl$F_GET_RW_HINT(r2, 0x40b, &(0x7f0000000000)) 03:11:27 executing program 3: socket$packet(0x11, 0xa, 0x300) syz_emit_ethernet(0x4e, &(0x7f0000000080)={@local, @broadcast, [{}], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x0, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x89ffffff00000000]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, &(0x7f00000002c0)) 03:11:27 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000040)="153f6234488dd25d766070") socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup2(r2, r2) sendmsg$netlink(r3, &(0x7f0000028fc8)={0x0, 0x0, &(0x7f0000019000), 0x0, &(0x7f0000000040)=[@rights={0x18, 0x1, 0x1, [r1]}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000000b80)=[{{&(0x7f0000000200)=@l2, 0x80, &(0x7f00000005c0), 0x0, &(0x7f0000000600)=""/84, 0x54}}, {{&(0x7f0000000680)=@l2, 0x80, &(0x7f0000000a40), 0x900, &(0x7f0000000ac0)=""/147, 0x93}}], 0x4000000000002ce, 0x62, 0x0) 03:11:27 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x60000000, &(0x7f00000003c0), 0x0, &(0x7f0000000580)={[{@session={'session'}}]}) 03:11:27 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e23}, 0x1c) listen(r0, 0x18) r1 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x19, &(0x7f0000000000)=[@in={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0xc}}, @in={0x2, 0x4e23, @local}], 0x20) 03:11:28 executing program 3: socket$packet(0x11, 0xa, 0x300) syz_emit_ethernet(0x4e, &(0x7f0000000080)={@local, @broadcast, [{}], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x0, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x60]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, &(0x7f00000002c0)) 03:11:28 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e23}, 0x1c) listen(r0, 0x18) r1 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x11, &(0x7f0000000000)=[@in={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0xc}}, @in={0x2, 0x4e23, @local}], 0x20) 03:11:28 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000040)="153f6234488dd25d766070") socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup2(r2, r2) sendmsg$netlink(r3, &(0x7f0000028fc8)={0x0, 0x0, &(0x7f0000019000), 0x0, &(0x7f0000000040)=[@rights={0x18, 0x1, 0x1, [r1]}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000000b80)=[{{&(0x7f0000000200)=@l2, 0x80, &(0x7f00000005c0), 0x0, &(0x7f0000000600)=""/84, 0x54}}, {{&(0x7f0000000680)=@l2, 0x80, &(0x7f0000000a40), 0x600000000000000, &(0x7f0000000ac0)=""/147, 0x93}}], 0x4000000000002ce, 0x62, 0x0) [ 976.729068] hfs: unable to parse mount options [ 976.753736] hfs: unable to parse mount options 03:11:28 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e23}, 0x1c) listen(r0, 0x18) r1 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x24, &(0x7f0000000000)=[@in={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0xc}}, @in={0x2, 0x4e23, @local}], 0x20) 03:11:28 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000040)="153f6234488dd25d766070") socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup2(r2, r2) sendmsg$netlink(r3, &(0x7f0000028fc8)={0x0, 0x0, &(0x7f0000019000), 0x0, &(0x7f0000000040)=[@rights={0x18, 0x1, 0x1, [r1]}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000000b80)=[{{&(0x7f0000000200)=@l2, 0x80, &(0x7f00000005c0), 0x0, &(0x7f0000000600)=""/84, 0x54}}, {{&(0x7f0000000680)=@l2, 0x80, &(0x7f0000000a40), 0x6b6b6b00000000, &(0x7f0000000ac0)=""/147, 0x93}}], 0x4000000000002ce, 0x62, 0x0) 03:11:28 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x9000000, &(0x7f00000003c0), 0x0, &(0x7f0000000580)={[{@session={'session'}}]}) 03:11:28 executing program 3: socket$packet(0x11, 0xa, 0x300) syz_emit_ethernet(0x4e, &(0x7f0000000080)={@local, @broadcast, [{}], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x0, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x86ddffff]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, &(0x7f00000002c0)) [ 977.182791] hfs: unable to parse mount options 03:11:28 executing program 1: r0 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rfkill\x00', 0x200000, 0x0) ioctl$KVM_SET_PIT(r0, 0x8048ae66, &(0x7f0000000080)={[{0x1f, 0xffffffff7fffffff, 0x9, 0x240, 0xc3, 0x7, 0x200000, 0xffffffffffffffff, 0xf609, 0x0, 0x3, 0x7fff}, {0x100, 0x8, 0x7, 0x400, 0xfffffffffffffffe, 0x2, 0x10001, 0x40, 0x200, 0x4, 0x5f, 0x8, 0x8000}, {0x7, 0x1, 0x7d895b32, 0x0, 0x8, 0xc4, 0x3, 0x1, 0x9, 0xffffffffffffff80, 0x4c8, 0xfffffffffffffeff, 0x101}], 0x98}) request_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f0000000680)={'syz', 0x1}, &(0x7f0000000480)='}\x00', 0x0) 03:11:28 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x2000, &(0x7f00000003c0), 0x0, &(0x7f0000000580)={[{@session={'session'}}]}) 03:11:28 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000040)="153f6234488dd25d766070") socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup2(r2, r2) sendmsg$netlink(r3, &(0x7f0000028fc8)={0x0, 0x0, &(0x7f0000019000), 0x0, &(0x7f0000000040)=[@rights={0x18, 0x1, 0x1, [r1]}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000000b80)=[{{&(0x7f0000000200)=@l2, 0x80, &(0x7f00000005c0), 0x0, &(0x7f0000000600)=""/84, 0x54}}, {{&(0x7f0000000680)=@l2, 0x80, &(0x7f0000000a40), 0x6b6b6b, &(0x7f0000000ac0)=""/147, 0x93}}], 0x4000000000002ce, 0x62, 0x0) 03:11:28 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e23}, 0x1c) listen(r0, 0x18) r1 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x23, &(0x7f0000000000)=[@in={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0xc}}, @in={0x2, 0x4e23, @local}], 0x20) 03:11:28 executing program 3: socket$packet(0x11, 0xa, 0x300) syz_emit_ethernet(0x4e, &(0x7f0000000080)={@local, @broadcast, [{}], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x0, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x500]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, &(0x7f00000002c0)) 03:11:28 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0xffffff7f00000000, &(0x7f00000003c0), 0x0, &(0x7f0000000580)={[{@session={'session'}}]}) 03:11:28 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000040)="153f6234488dd25d766070") socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup2(r2, r2) sendmsg$netlink(r3, &(0x7f0000028fc8)={0x0, 0x0, &(0x7f0000019000), 0x0, &(0x7f0000000040)=[@rights={0x18, 0x1, 0x1, [r1]}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000000b80)=[{{&(0x7f0000000200)=@l2, 0x80, &(0x7f00000005c0), 0x0, &(0x7f0000000600)=""/84, 0x54}}, {{&(0x7f0000000680)=@l2, 0x80, &(0x7f0000000a40), 0x9000000, &(0x7f0000000ac0)=""/147, 0x93}}], 0x4000000000002ce, 0x62, 0x0) 03:11:28 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e23}, 0x1c) listen(r0, 0x18) r1 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0xd, &(0x7f0000000000)=[@in={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0xc}}, @in={0x2, 0x4e23, @local}], 0x20) 03:11:29 executing program 3: socket$packet(0x11, 0xa, 0x300) syz_emit_ethernet(0x4e, &(0x7f0000000080)={@local, @broadcast, [{}], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x0, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2c00]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, &(0x7f00000002c0)) 03:11:29 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000180)="153f6234488dd25d766070") getsockopt$inet6_int(r0, 0x29, 0x38, &(0x7f0000000100), &(0x7f0000000000)=0xfeea) syz_open_dev$midi(&(0x7f00000000c0)='/dev/midi#\x00', 0x0, 0x42000) r2 = add_key$user(&(0x7f0000000080)='user\x00', &(0x7f0000000300)={'syz', 0x3}, &(0x7f0000000140)="5b450b5d175f92ced9", 0x9, 0xfffffffffffffff9) r3 = add_key(&(0x7f00000001c0)='cifs.idmap\x00', &(0x7f0000000200)={'syz', 0x3}, &(0x7f0000000240)="1b81d84eb65486764e674fb9329b432d145b05ed79dd0b7fc097c39748d27211a18e34af9ba4cf2648d6c0abb10b37015f10e562a6a8b56f182581696b67dc9ece69e558c2d9857af35ace7c4d5cbade37dfd6cdfbf2020ab2691ed7b353a3de906849d2bd59f6bea6949d285e28fdbab1418b7d840a1f0b26df5be3ec183922653917435df8ea74", 0x88, 0xfffffffffffffffe) keyctl$link(0x8, r2, r3) [ 977.564230] hfs: unable to parse mount options [ 977.619456] hfs: unable to parse mount options 03:11:29 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000040)="153f6234488dd25d766070") socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup2(r2, r2) sendmsg$netlink(r3, &(0x7f0000028fc8)={0x0, 0x0, &(0x7f0000019000), 0x0, &(0x7f0000000040)=[@rights={0x18, 0x1, 0x1, [r1]}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000000b80)=[{{&(0x7f0000000200)=@l2, 0x80, &(0x7f00000005c0), 0x0, &(0x7f0000000600)=""/84, 0x54}}, {{&(0x7f0000000680)=@l2, 0x80, &(0x7f0000000a40), 0x4, &(0x7f0000000ac0)=""/147, 0x93}}], 0x4000000000002ce, 0x62, 0x0) 03:11:29 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e23}, 0x1c) listen(r0, 0x18) r1 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x1e, &(0x7f0000000000)=[@in={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0xc}}, @in={0x2, 0x4e23, @local}], 0x20) 03:11:29 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x7a00, &(0x7f00000003c0), 0x0, &(0x7f0000000580)={[{@session={'session'}}]}) 03:11:29 executing program 3: socket$packet(0x11, 0xa, 0x300) syz_emit_ethernet(0x4e, &(0x7f0000000080)={@local, @broadcast, [{}], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x0, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffa888]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, &(0x7f00000002c0)) 03:11:29 executing program 1: socket$packet(0x11, 0xa, 0x300) syz_emit_ethernet(0x4e, &(0x7f0000000080)={@local, @broadcast, [{}], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x0, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2c00]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, &(0x7f00000002c0)) 03:11:29 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x2200000000000000, &(0x7f00000003c0), 0x0, &(0x7f0000000580)={[{@session={'session'}}]}) 03:11:29 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e23}, 0x1c) listen(r0, 0x18) r1 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x7, &(0x7f0000000000)=[@in={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0xc}}, @in={0x2, 0x4e23, @local}], 0x20) 03:11:29 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000040)="153f6234488dd25d766070") socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup2(r2, r2) sendmsg$netlink(r3, &(0x7f0000028fc8)={0x0, 0x0, &(0x7f0000019000), 0x0, &(0x7f0000000040)=[@rights={0x18, 0x1, 0x1, [r1]}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000000b80)=[{{&(0x7f0000000200)=@l2, 0x80, &(0x7f00000005c0), 0x0, &(0x7f0000000600)=""/84, 0x54}}, {{&(0x7f0000000680)=@l2, 0x80, &(0x7f0000000a40), 0x9, &(0x7f0000000ac0)=""/147, 0x93}}], 0x4000000000002ce, 0x62, 0x0) 03:11:29 executing program 3: socket$packet(0x11, 0xa, 0x300) syz_emit_ethernet(0x4e, &(0x7f0000000080)={@local, @broadcast, [{}], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x0, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8906000000000000]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, &(0x7f00000002c0)) 03:11:29 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = memfd_create(&(0x7f0000000000)=':\'vboxnet1(user\x00', 0x2) write$cgroup_int(r1, &(0x7f0000000100)=0x101, 0x12) sendmsg$nl_generic(r0, &(0x7f00000000c0)={&(0x7f0000000040)={0x10, 0x34000, 0x200000000000000}, 0xc, &(0x7f0000000080)={&(0x7f0000000140)={0x20, 0x29, 0x82d, 0x0, 0x0, {0x1}, [@typed={0xc, 0x0, @u64=0x5}]}, 0x20}}, 0x0) 03:11:29 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e23}, 0x1c) listen(r0, 0x18) r1 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x10, &(0x7f0000000000)=[@in={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0xc}}, @in={0x2, 0x4e23, @local}], 0x20) [ 978.200436] hfs: unable to parse mount options [ 978.237024] hfs: unable to parse mount options 03:11:29 executing program 3: socket$packet(0x11, 0xa, 0x300) syz_emit_ethernet(0x4e, &(0x7f0000000080)={@local, @broadcast, [{}], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x0, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc00]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, &(0x7f00000002c0)) 03:11:29 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) set_mempolicy(0x4002, &(0x7f0000000000)=0x6, 0x9) mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x3, 0x5c831, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x4) syz_open_procfs(0x0, &(0x7f00000002c0)='net/udplite6\x00') 03:11:29 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0xe, &(0x7f00000003c0), 0x0, &(0x7f0000000580)={[{@session={'session'}}]}) 03:11:29 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0xf403000000000000, &(0x7f00000003c0), 0x0, &(0x7f0000000580)={[{@session={'session'}}]}) 03:11:29 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000040)="153f6234488dd25d766070") socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup2(r2, r2) sendmsg$netlink(r3, &(0x7f0000028fc8)={0x0, 0x0, &(0x7f0000019000), 0x0, &(0x7f0000000040)=[@rights={0x18, 0x1, 0x1, [r1]}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000000b80)=[{{&(0x7f0000000200)=@l2, 0x80, &(0x7f00000005c0), 0x0, &(0x7f0000000600)=""/84, 0x54}}, {{&(0x7f0000000680)=@l2, 0x80, &(0x7f0000000a40), 0x700000000000000, &(0x7f0000000ac0)=""/147, 0x93}}], 0x4000000000002ce, 0x62, 0x0) 03:11:29 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e23}, 0x1c) listen(r0, 0x18) r1 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x16, &(0x7f0000000000)=[@in={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0xc}}, @in={0x2, 0x4e23, @local}], 0x20) 03:11:30 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) close(r0) socket$xdp(0x2c, 0x3, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffff9c, 0x89e2, &(0x7f0000000040)={r0}) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x11, 0x4, 0x4, 0xf59}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000100)={r1, &(0x7f00000001c0), &(0x7f0000000040)}, 0x20) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x20000, 0x0) ioctl$LOOP_CTL_GET_FREE(r2, 0x4c82) 03:11:30 executing program 3: socket$packet(0x11, 0xa, 0x300) syz_emit_ethernet(0x4e, &(0x7f0000000080)={@local, @broadcast, [{}], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x0, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4788]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, &(0x7f00000002c0)) [ 978.515728] audit: type=1400 audit(1539659489.945:156): avc: denied { map } for pid=23424 comm="syz-executor1" path=2F616E6F6E5F6875676570616765202864656C6574656429 dev="hugetlbfs" ino=188636 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:object_r:hugetlbfs_t:s0 tclass=file permissive=1 [ 978.633980] hfs: invalid session number or type of track [ 978.640125] hfs: can't find a HFS filesystem on dev loop2 03:11:30 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e23}, 0x1c) listen(r0, 0x18) r1 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x7d, &(0x7f0000000000)=[@in={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0xc}}, @in={0x2, 0x4e23, @local}], 0x20) 03:11:30 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000040)="153f6234488dd25d766070") socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup2(r2, r2) sendmsg$netlink(r3, &(0x7f0000028fc8)={0x0, 0x0, &(0x7f0000019000), 0x0, &(0x7f0000000040)=[@rights={0x18, 0x1, 0x1, [r1]}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000000b80)=[{{&(0x7f0000000200)=@l2, 0x80, &(0x7f00000005c0), 0x0, &(0x7f0000000600)=""/84, 0x54}}, {{&(0x7f0000000680)=@l2, 0x80, &(0x7f0000000a40), 0x8000000, &(0x7f0000000ac0)=""/147, 0x93}}], 0x4000000000002ce, 0x62, 0x0) [ 978.719576] hfs: invalid session number or type of track [ 978.737677] hfs: can't find a HFS filesystem on dev loop2 03:11:30 executing program 1: r0 = socket$rds(0x15, 0x5, 0x0) clone(0x8000, 0x0, 0xfffffffffffffffe, &(0x7f00000001c0), 0xffffffffffffffff) syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x4, 0x2000) sched_setscheduler(0x0, 0x5, &(0x7f0000000140)=0x6) ptrace$setopts(0xffffffffffffffff, 0x0, 0x0, 0x8) setsockopt$SO_RDS_MSG_RXPATH_LATENCY(r0, 0x114, 0x7, &(0x7f0000000200)=ANY=[@ANYBLOB="94fedf14c420249dbee2b4774fa349b67310a5510746c0a33388ba1a6264d78f91ce8e262f5d09aed68b490917854421e4d95aca1b35b6e274c10b46d3b48dc6ca235a88cfacfe25ce68e0589aa90eb184a0c2f2cbf94c4ea7b17b01e9dedccfe2871c6aa790cc5047f94c7a84cb21dae035ec5512cd32c507fe53c52bf0777fcb7fecbef46ac64a82fa7d4514ec8ff4e9a000000000"], 0x1) 03:11:30 executing program 3: socket$packet(0x11, 0xa, 0x300) syz_emit_ethernet(0x4e, &(0x7f0000000080)={@local, @broadcast, [{}], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x0, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000000000]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, &(0x7f00000002c0)) 03:11:30 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x6800, &(0x7f00000003c0), 0x0, &(0x7f0000000580)={[{@session={'session'}}]}) 03:11:30 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000040)="153f6234488dd25d766070") socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup2(r2, r2) sendmsg$netlink(r3, &(0x7f0000028fc8)={0x0, 0x0, &(0x7f0000019000), 0x0, &(0x7f0000000040)=[@rights={0x18, 0x1, 0x1, [r1]}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000000b80)=[{{&(0x7f0000000200)=@l2, 0x80, &(0x7f00000005c0), 0x0, &(0x7f0000000600)=""/84, 0x54}}, {{&(0x7f0000000680)=@l2, 0x80, &(0x7f0000000a40), 0x3f000000, &(0x7f0000000ac0)=""/147, 0x93}}], 0x4000000000002ce, 0x62, 0x0) 03:11:30 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e23}, 0x1c) listen(r0, 0x18) r1 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x3, &(0x7f0000000000)=[@in={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0xc}}, @in={0x2, 0x4e23, @local}], 0x20) [ 978.955287] hfs: unable to parse mount options 03:11:30 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x6000000000000000, &(0x7f00000003c0), 0x0, &(0x7f0000000580)={[{@session={'session'}}]}) 03:11:30 executing program 3: socket$packet(0x11, 0xa, 0x300) syz_emit_ethernet(0x4e, &(0x7f0000000080)={@local, @broadcast, [{}], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x0, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8100000000000000]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, &(0x7f00000002c0)) 03:11:30 executing program 1: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000700)='./bus\x00', 0x0) fcntl$setstatus(r0, 0x4, 0x6102) ftruncate(r0, 0x8200) lseek(r0, 0x0, 0x2) write$binfmt_misc(r0, &(0x7f0000000180)=ANY=[@ANYBLOB='\x00\x00'], 0x2) r1 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) r2 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) write$UHID_DESTROY(0xffffffffffffffff, &(0x7f0000000140), 0x4) fcntl$setstatus(r0, 0x4, 0x0) getsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r0, 0x84, 0x13, &(0x7f00000000c0)={0x0, 0xffffffffffffa78d}, &(0x7f0000000200)=0x8) sendfile(r0, r2, &(0x7f0000002780), 0x8000fffffffe) poll(&(0x7f0000000100)=[{r0, 0x9010}, {0xffffffffffffff9c, 0x2000}, {r0, 0x2}], 0x3, 0x3) ftruncate(r1, 0x0) 03:11:30 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e23}, 0x1c) listen(r0, 0x18) r1 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x76, &(0x7f0000000000)=[@in={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0xc}}, @in={0x2, 0x4e23, @local}], 0x20) 03:11:30 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000040)="153f6234488dd25d766070") socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup2(r2, r2) sendmsg$netlink(r3, &(0x7f0000028fc8)={0x0, 0x0, &(0x7f0000019000), 0x0, &(0x7f0000000040)=[@rights={0x18, 0x1, 0x1, [r1]}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000000b80)=[{{&(0x7f0000000200)=@l2, 0x80, &(0x7f00000005c0), 0x0, &(0x7f0000000600)=""/84, 0x54}}, {{&(0x7f0000000680)=@l2, 0x80, &(0x7f0000000a40), 0x40000, &(0x7f0000000ac0)=""/147, 0x93}}], 0x4000000000002ce, 0x62, 0x0) [ 979.326267] hfs: unable to parse mount options 03:11:30 executing program 3: socket$packet(0x11, 0xa, 0x300) syz_emit_ethernet(0x4e, &(0x7f0000000080)={@local, @broadcast, [{}], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x0, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8864000000000000]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, &(0x7f00000002c0)) [ 979.349619] audit: type=1804 audit(1539659490.785:157): pid=23495 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor1" name="/root/syzkaller-testdir440219986/syzkaller.HCCNbN/1773/bus" dev="sda1" ino=17523 res=1 [ 979.464219] hfs: unable to parse mount options 03:11:30 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e23}, 0x1c) listen(r0, 0x18) r1 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x2, &(0x7f0000000000)=[@in={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0xc}}, @in={0x2, 0x4e23, @local}], 0x20) [ 979.502549] audit: type=1804 audit(1539659490.895:158): pid=23495 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=ToMToU comm="syz-executor1" name="/root/syzkaller-testdir440219986/syzkaller.HCCNbN/1773/bus" dev="sda1" ino=17523 res=1 03:11:31 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0xffffffffffffffff, &(0x7f00000003c0), 0x0, &(0x7f0000000580)={[{@session={'session'}}]}) 03:11:31 executing program 1: perf_event_open(&(0x7f000001d000)={0x800000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$dspn(&(0x7f0000000140)='/dev/dsp#\x00', 0x1, 0x2) ioctl$int_in(r0, 0x800000c004500a, &(0x7f0000000040)=0x80000002) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f00000000c0)={0xffffffffffffffd3, 0x2, 0x100000040000000}, 0xfffffefd) r1 = shmget(0x0, 0x2000, 0x34, &(0x7f0000001000/0x2000)=nil) shmctl$SHM_UNLOCK(r1, 0xc) mmap(&(0x7f0000001000/0x2000)=nil, 0x2000, 0x0, 0x32, 0xffffffffffffffff, 0x0) setpgid(0x0, 0x0) getgroups(0x2, &(0x7f0000008080)=[0xffffffffffffffff, 0x0]) 03:11:31 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0xf5030000, &(0x7f00000003c0), 0x0, &(0x7f0000000580)={[{@session={'session'}}]}) 03:11:31 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000040)="153f6234488dd25d766070") socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup2(r2, r2) sendmsg$netlink(r3, &(0x7f0000028fc8)={0x0, 0x0, &(0x7f0000019000), 0x0, &(0x7f0000000040)=[@rights={0x18, 0x1, 0x1, [r1]}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000000b80)=[{{&(0x7f0000000200)=@l2, 0x80, &(0x7f00000005c0), 0x0, &(0x7f0000000600)=""/84, 0x54}}, {{&(0x7f0000000680)=@l2, 0x80, &(0x7f0000000a40), 0x1000000000000, &(0x7f0000000ac0)=""/147, 0x93}}], 0x4000000000002ce, 0x62, 0x0) 03:11:31 executing program 3: socket$packet(0x11, 0xa, 0x300) syz_emit_ethernet(0x4e, &(0x7f0000000080)={@local, @broadcast, [{}], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x0, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x88a8ffff00000000]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, &(0x7f00000002c0)) [ 979.611841] audit: type=1804 audit(1539659490.925:159): pid=23504 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=ToMToU comm="syz-executor1" name="/root/syzkaller-testdir440219986/syzkaller.HCCNbN/1773/bus" dev="sda1" ino=17523 res=1 03:11:31 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e23}, 0x1c) listen(r0, 0x18) r1 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f0000000000)=[@in={0xa, 0x4e23, @dev={0xac, 0x14, 0x14, 0xc}}, @in={0x2, 0x4e23, @local}], 0x20) [ 979.812278] audit: type=1804 audit(1539659490.925:160): pid=23495 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor1" name="/root/syzkaller-testdir440219986/syzkaller.HCCNbN/1773/bus" dev="sda1" ino=17523 res=1 03:11:31 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000040)="153f6234488dd25d766070") socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup2(r2, r2) sendmsg$netlink(r3, &(0x7f0000028fc8)={0x0, 0x0, &(0x7f0000019000), 0x0, &(0x7f0000000040)=[@rights={0x18, 0x1, 0x1, [r1]}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000000b80)=[{{&(0x7f0000000200)=@l2, 0x80, &(0x7f00000005c0), 0x0, &(0x7f0000000600)=""/84, 0x54}}, {{&(0x7f0000000680)=@l2, 0x80, &(0x7f0000000a40), 0x8000000000000000, &(0x7f0000000ac0)=""/147, 0x93}}], 0x4000000000002ce, 0x62, 0x0) [ 979.893551] hfs: unable to parse mount options 03:11:31 executing program 3: socket$packet(0x11, 0xa, 0x300) syz_emit_ethernet(0x4e, &(0x7f0000000080)={@local, @broadcast, [{}], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x0, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x88a8ffff]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, &(0x7f00000002c0)) 03:11:31 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x4, &(0x7f00000003c0), 0x0, &(0x7f0000000580)={[{@session={'session'}}]}) [ 980.046407] hfs: unable to parse mount options 03:11:31 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000040)="153f6234488dd25d766070") socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup2(r2, r2) sendmsg$netlink(r3, &(0x7f0000028fc8)={0x0, 0x0, &(0x7f0000019000), 0x0, &(0x7f0000000040)=[@rights={0x18, 0x1, 0x1, [r1]}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000000b80)=[{{&(0x7f0000000200)=@l2, 0x80, &(0x7f00000005c0), 0x0, &(0x7f0000000600)=""/84, 0x54}}, {{&(0x7f0000000680)=@l2, 0x80, &(0x7f0000000a40), 0x800000000000000, &(0x7f0000000ac0)=""/147, 0x93}}], 0x4000000000002ce, 0x62, 0x0) 03:11:31 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e23}, 0x1c) listen(r0, 0x18) r1 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f0000000000)=[@in={0xffe0, 0x4e23, @dev={0xac, 0x14, 0x14, 0xc}}, @in={0x2, 0x4e23, @local}], 0x20) 03:11:31 executing program 3: socket$packet(0x11, 0xa, 0x300) syz_emit_ethernet(0x4e, &(0x7f0000000080)={@local, @broadcast, [{}], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x0, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x89ffffff]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, &(0x7f00000002c0)) [ 980.143646] hfs: invalid session number or type of track [ 980.165584] hfs: can't find a HFS filesystem on dev loop2 03:11:31 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0xfdffffff, &(0x7f00000003c0), 0x0, &(0x7f0000000580)={[{@session={'session'}}]}) [ 980.263630] hfs: invalid session number or type of track [ 980.281575] hfs: can't find a HFS filesystem on dev loop2 [ 980.407873] hfs: unable to parse mount options 03:11:32 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x6) write$binfmt_elf64(r0, &(0x7f00000001c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x7, 0x80, 0x0, 0xca9, 0x3, 0x3, 0x4, 0x35, 0x40, 0x264, 0x5, 0x5f8, 0x38, 0x1, 0xe63, 0x2, 0x337a6fb4}, [{0x0, 0xffff, 0x6, 0x2, 0x5, 0x7, 0x7, 0xfffffffffffffffd}], "5796c26fe4e004487523059d381a475b1d1d4c18b6f84786ccae11930cc37c6d172bb09233e855e9531790b7d4ca389e3f5dd1b8e8338f7ffdbc5113100bb4cc6bd0bcb6a04379db94898ea45f1b94c03f0f3fa9b3b85e2b8e4b405f6504239ed33e6376d80a66406bf28277a49e3011", [[], [], [], [], [], [], [], [], []]}, 0x9e8) ioctl$KDADDIO(r0, 0x4b34, 0x7f) r1 = socket(0xa, 0x2, 0x0) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000000080)={0x2, &(0x7f0000000040)=[{0x64, 0x0, 0x0, 0x1}, {0x6}]}, 0x10) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000000bc0)={{{@in6=@mcast2, @in=@remote}}, {{@in6=@remote}, 0x0, @in6=@mcast2}}, &(0x7f0000000000)=0xe8) 03:11:32 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000040)="153f6234488dd25d766070") socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup2(r2, r2) sendmsg$netlink(r3, &(0x7f0000028fc8)={0x0, 0x0, &(0x7f0000019000), 0x0, &(0x7f0000000040)=[@rights={0x18, 0x1, 0x1, [r1]}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000000b80)=[{{&(0x7f0000000200)=@l2, 0x80, &(0x7f00000005c0), 0x0, &(0x7f0000000600)=""/84, 0x54}}, {{&(0x7f0000000680)=@l2, 0x80, &(0x7f0000000a40), 0x7000000, &(0x7f0000000ac0)=""/147, 0x93}}], 0x4000000000002ce, 0x62, 0x0) 03:11:32 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x600000000000000, &(0x7f00000003c0), 0x0, &(0x7f0000000580)={[{@session={'session'}}]}) 03:11:32 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e23}, 0x1c) listen(r0, 0x18) r1 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f0000000000)=[@in={0x10, 0x4e23, @dev={0xac, 0x14, 0x14, 0xc}}, @in={0x2, 0x4e23, @local}], 0x20) 03:11:32 executing program 3: socket$packet(0x11, 0xa, 0x300) syz_emit_ethernet(0x4e, &(0x7f0000000080)={@local, @broadcast, [{}], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x0, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, &(0x7f00000002c0)) 03:11:32 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x500, &(0x7f00000003c0), 0x0, &(0x7f0000000580)={[{@session={'session'}}]}) [ 980.918117] hfs: unable to parse mount options 03:11:32 executing program 3: socket$packet(0x11, 0xa, 0x300) syz_emit_ethernet(0x4e, &(0x7f0000000080)={@local, @broadcast, [{}], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x0, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x300000000000000]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, &(0x7f00000002c0)) 03:11:32 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e23}, 0x1c) listen(r0, 0x18) r1 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f0000000000)=[@in={0x14, 0x4e23, @dev={0xac, 0x14, 0x14, 0xc}}, @in={0x2, 0x4e23, @local}], 0x20) 03:11:32 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000040)="153f6234488dd25d766070") socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup2(r2, r2) sendmsg$netlink(r3, &(0x7f0000028fc8)={0x0, 0x0, &(0x7f0000019000), 0x0, &(0x7f0000000040)=[@rights={0x18, 0x1, 0x1, [r1]}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000000b80)=[{{&(0x7f0000000200)=@l2, 0x80, &(0x7f00000005c0), 0x0, &(0x7f0000000600)=""/84, 0x54}}, {{&(0x7f0000000680)=@l2, 0x80, &(0x7f0000000a40), 0x700, &(0x7f0000000ac0)=""/147, 0x93}}], 0x4000000000002ce, 0x62, 0x0) 03:11:32 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0xe00, &(0x7f00000003c0), 0x0, &(0x7f0000000580)={[{@session={'session'}}]}) [ 981.112534] hfs: unable to parse mount options 03:11:32 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e23}, 0x1c) listen(r0, 0x18) r1 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f0000000000)=[@in={0xf, 0x4e23, @dev={0xac, 0x14, 0x14, 0xc}}, @in={0x2, 0x4e23, @local}], 0x20) 03:11:32 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x6000, &(0x7f00000003c0), 0x0, &(0x7f0000000580)={[{@session={'session'}}]}) 03:11:32 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) modify_ldt$write2(0x11, &(0x7f0000000040)={0xa4d, 0x0, 0xffffffffffffffff, 0x0, 0x1, 0x9, 0x80, 0x8, 0x400, 0x101}, 0x10) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_LAPIC(r2, 0x4400ae8f, &(0x7f0000000a40)={"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"}) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_SET_MP_STATE(r2, 0x4004ae99, &(0x7f00000000c0)=0xf) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_ASSIGN_SET_INTX_MASK(r1, 0x4040aea4, &(0x7f0000000000)={0x8, 0x0, 0x2, 0x4, 0x8}) 03:11:32 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000040)="153f6234488dd25d766070") socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup2(r2, r2) sendmsg$netlink(r3, &(0x7f0000028fc8)={0x0, 0x0, &(0x7f0000019000), 0x0, &(0x7f0000000040)=[@rights={0x18, 0x1, 0x1, [r1]}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000000b80)=[{{&(0x7f0000000200)=@l2, 0x80, &(0x7f00000005c0), 0x0, &(0x7f0000000600)=""/84, 0x54}}, {{&(0x7f0000000680)=@l2, 0x80, &(0x7f0000000a40), 0x3f00, &(0x7f0000000ac0)=""/147, 0x93}}], 0x4000000000002ce, 0x62, 0x0) 03:11:32 executing program 3: socket$packet(0x11, 0xa, 0x300) syz_emit_ethernet(0x4e, &(0x7f0000000080)={@local, @broadcast, [{}], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x0, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40030000000000]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, &(0x7f00000002c0)) 03:11:32 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e23}, 0x1c) listen(r0, 0x18) r1 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f0000000000)=[@in={0xffffffffffffffe0, 0x4e23, @dev={0xac, 0x14, 0x14, 0xc}}, @in={0x2, 0x4e23, @local}], 0x20) [ 981.426677] hfs: unable to parse mount options 03:11:33 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x770c000000000000, &(0x7f00000003c0), 0x0, &(0x7f0000000580)={[{@session={'session'}}]}) [ 981.591065] hfs: unable to parse mount options 03:11:33 executing program 3: socket$packet(0x11, 0xa, 0x300) syz_emit_ethernet(0x4e, &(0x7f0000000080)={@local, @broadcast, [{}], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x0, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, &(0x7f00000002c0)) 03:11:33 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000040)="153f6234488dd25d766070") socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup2(r2, r2) sendmsg$netlink(r3, &(0x7f0000028fc8)={0x0, 0x0, &(0x7f0000019000), 0x0, &(0x7f0000000040)=[@rights={0x18, 0x1, 0x1, [r1]}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000000b80)=[{{&(0x7f0000000200)=@l2, 0x80, &(0x7f00000005c0), 0x0, &(0x7f0000000600)=""/84, 0x54}}, {{&(0x7f0000000680)=@l2, 0x80, &(0x7f0000000a40), 0x6b6b6b00, &(0x7f0000000ac0)=""/147, 0x93}}], 0x4000000000002ce, 0x62, 0x0) 03:11:33 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x700000000000000, &(0x7f00000003c0), 0x0, &(0x7f0000000580)={[{@session={'session'}}]}) 03:11:33 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e23}, 0x1c) listen(r0, 0x18) r1 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f0000000000)=[@in={0x9, 0x4e23, @dev={0xac, 0x14, 0x14, 0xc}}, @in={0x2, 0x4e23, @local}], 0x20) 03:11:33 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000740)='/dev/vhci\x00', 0x8000, 0x0) getsockname$inet6(r0, &(0x7f0000000780)={0xa, 0x0, 0x0, @mcast2}, &(0x7f00000007c0)=0x1c) r1 = openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000440)='/selinux/status\x00', 0x0, 0x0) ioctl$KVM_SET_FPU(r1, 0x41a0ae8d, &(0x7f0000000480)={[], 0x3, 0x0, 0x10000, 0x0, 0x3ff, 0x10002, 0x0, [], 0x7ff}) getsockopt$inet_sctp6_SCTP_MAXSEG(r1, 0x84, 0xd, &(0x7f0000000680)=@assoc_id=0x0, &(0x7f00000006c0)=0x4) setsockopt$inet_sctp6_SCTP_MAXSEG(r1, 0x84, 0xd, &(0x7f0000000700)=@assoc_id=r2, 0x4) r3 = socket(0x1e, 0x0, 0x0) r4 = socket$inet(0x10, 0x3, 0xc) getsockopt$inet6_IPV6_XFRM_POLICY(r3, 0x29, 0x23, &(0x7f0000000800)={{{@in6=@remote, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}, 0x0, @in=@dev}}, &(0x7f0000000900)=0xe8) r6 = syz_open_dev$dmmidi(&(0x7f0000000100)='/dev/dmmidi#\x00', 0x6, 0x10000) setsockopt$inet6_dccp_int(r6, 0x21, 0x0, &(0x7f0000000300)=0x67, 0x4) select(0x40, &(0x7f00000001c0)={0x200, 0x6, 0x4, 0x10001, 0x6, 0x0, 0x7, 0x3ff}, &(0x7f0000000200)={0x200, 0x0, 0x7, 0x0, 0x7, 0x0, 0x0, 0x10000}, &(0x7f0000000240)={0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x20, 0xfffffffffffffff9}, &(0x7f0000000280)={0x77359400}) ioctl$BINDER_SET_CONTEXT_MGR(r6, 0x40046207, 0x0) sendmsg(r4, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000000)="24000000070a07031dfffd946fa2830020200a0009000100001d85680c1baba20400ff7e", 0x24}], 0x1}, 0x0) ioctl$sock_inet6_tcp_SIOCINQ(r1, 0x541b, &(0x7f0000000640)) setsockopt$inet6_mreq(r0, 0x29, 0x1d, &(0x7f0000000940)={@ipv4={[], [], @local}, r5}, 0x14) ioctl$UI_DEV_CREATE(r1, 0x5501) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(0xffffffffffffffff, 0x6, 0x23, &(0x7f0000000140)={&(0x7f0000ffc000/0x4000)=nil, 0x4000}, &(0x7f0000000180)=0x10) getrandom(&(0x7f0000000040)=""/153, 0x344, 0x3) ioctl$sock_inet_SIOCSIFPFLAGS(r4, 0x8934, &(0x7f00000002c0)={'dummy0\x00', 0x3}) ioctl$LOOP_SET_STATUS64(r6, 0x4c04, &(0x7f0000000340)={0x0, 0x0, 0x0, 0xcc68, 0x5, 0x0, 0x0, 0x13, 0x10, "a1e4919de1b77e981c904070a59b8445bbd2074cf82d9fc4bcc31d3296c52e697b4a76a4754c55f65b74a14da50158a389baea70a605bd7385acaf2e045d59fd", "ba008c889ba0fa0e1a2abeeb2bcd46dd077d69a163fe8ee1bd3718556b8d599db6717ac6a2f27abe2fbf611792b0daa40da5b337b25a5ea4c70376401c637ec7", "ea99bc93512cf76403f9bb865cbd563e60a1f276ae4b110972f64d9592f1db85", [0x9, 0x2]}) socket$inet6_sctp(0xa, 0x5, 0x84) 03:11:33 executing program 3: socket$packet(0x11, 0xa, 0x300) syz_emit_ethernet(0x4e, &(0x7f0000000080)={@local, @broadcast, [{}], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x0, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8847]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, &(0x7f00000002c0)) 03:11:33 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000040)="153f6234488dd25d766070") socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup2(r2, r2) sendmsg$netlink(r3, &(0x7f0000028fc8)={0x0, 0x0, &(0x7f0000019000), 0x0, &(0x7f0000000040)=[@rights={0x18, 0x1, 0x1, [r1]}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000000b80)=[{{&(0x7f0000000200)=@l2, 0x80, &(0x7f00000005c0), 0x0, &(0x7f0000000600)=""/84, 0x54}}, {{&(0x7f0000000680)=@l2, 0x80, &(0x7f0000000a40), 0x900000000000000, &(0x7f0000000ac0)=""/147, 0x93}}], 0x4000000000002ce, 0x62, 0x0) 03:11:33 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e23}, 0x1c) listen(r0, 0x18) r1 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f0000000000)=[@in={0xe0, 0x4e23, @dev={0xac, 0x14, 0x14, 0xc}}, @in={0x2, 0x4e23, @local}], 0x20) 03:11:33 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000740)='/dev/vhci\x00', 0x8000, 0x0) getsockname$inet6(r0, &(0x7f0000000780)={0xa, 0x0, 0x0, @mcast2}, &(0x7f00000007c0)=0x1c) r1 = openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000440)='/selinux/status\x00', 0x0, 0x0) ioctl$KVM_SET_FPU(r1, 0x41a0ae8d, &(0x7f0000000480)={[], 0x3, 0x0, 0x10000, 0x0, 0x3ff, 0x10002, 0x0, [], 0x7ff}) getsockopt$inet_sctp6_SCTP_MAXSEG(r1, 0x84, 0xd, &(0x7f0000000680)=@assoc_id=0x0, &(0x7f00000006c0)=0x4) setsockopt$inet_sctp6_SCTP_MAXSEG(r1, 0x84, 0xd, &(0x7f0000000700)=@assoc_id=r2, 0x4) r3 = socket(0x1e, 0x0, 0x0) r4 = socket$inet(0x10, 0x3, 0xc) getsockopt$inet6_IPV6_XFRM_POLICY(r3, 0x29, 0x23, &(0x7f0000000800)={{{@in6=@remote, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}, 0x0, @in=@dev}}, &(0x7f0000000900)=0xe8) r6 = syz_open_dev$dmmidi(&(0x7f0000000100)='/dev/dmmidi#\x00', 0x6, 0x10000) setsockopt$inet6_dccp_int(r6, 0x21, 0x0, &(0x7f0000000300)=0x67, 0x4) select(0x40, &(0x7f00000001c0)={0x200, 0x6, 0x4, 0x10001, 0x6, 0x0, 0x7, 0x3ff}, &(0x7f0000000200)={0x200, 0x0, 0x7, 0x0, 0x7, 0x0, 0x0, 0x10000}, &(0x7f0000000240)={0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x20, 0xfffffffffffffff9}, &(0x7f0000000280)={0x77359400}) ioctl$BINDER_SET_CONTEXT_MGR(r6, 0x40046207, 0x0) sendmsg(r4, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000000)="24000000070a07031dfffd946fa2830020200a0009000100001d85680c1baba20400ff7e", 0x24}], 0x1}, 0x0) ioctl$sock_inet6_tcp_SIOCINQ(r1, 0x541b, &(0x7f0000000640)) setsockopt$inet6_mreq(r0, 0x29, 0x1d, &(0x7f0000000940)={@ipv4={[], [], @local}, r5}, 0x14) ioctl$UI_DEV_CREATE(r1, 0x5501) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(0xffffffffffffffff, 0x6, 0x23, &(0x7f0000000140)={&(0x7f0000ffc000/0x4000)=nil, 0x4000}, &(0x7f0000000180)=0x10) getrandom(&(0x7f0000000040)=""/153, 0x344, 0x3) ioctl$sock_inet_SIOCSIFPFLAGS(r4, 0x8934, &(0x7f00000002c0)={'dummy0\x00', 0x3}) ioctl$LOOP_SET_STATUS64(r6, 0x4c04, &(0x7f0000000340)={0x0, 0x0, 0x0, 0xcc68, 0x5, 0x0, 0x0, 0x13, 0x10, "a1e4919de1b77e981c904070a59b8445bbd2074cf82d9fc4bcc31d3296c52e697b4a76a4754c55f65b74a14da50158a389baea70a605bd7385acaf2e045d59fd", "ba008c889ba0fa0e1a2abeeb2bcd46dd077d69a163fe8ee1bd3718556b8d599db6717ac6a2f27abe2fbf611792b0daa40da5b337b25a5ea4c70376401c637ec7", "ea99bc93512cf76403f9bb865cbd563e60a1f276ae4b110972f64d9592f1db85", [0x9, 0x2]}) socket$inet6_sctp(0xa, 0x5, 0x84) 03:11:33 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000040)="153f6234488dd25d766070") socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup2(r2, r2) sendmsg$netlink(r3, &(0x7f0000028fc8)={0x0, 0x0, &(0x7f0000019000), 0x0, &(0x7f0000000040)=[@rights={0x18, 0x1, 0x1, [r1]}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000000b80)=[{{&(0x7f0000000200)=@l2, 0x80, &(0x7f00000005c0), 0x0, &(0x7f0000000600)=""/84, 0x54}}, {{&(0x7f0000000680)=@l2, 0x80, &(0x7f0000000a40), 0x600, &(0x7f0000000ac0)=""/147, 0x93}}], 0x4000000000002ce, 0x62, 0x0) [ 982.162103] hfs: unable to parse mount options 03:11:33 executing program 3: socket$packet(0x11, 0xa, 0x300) syz_emit_ethernet(0x4e, &(0x7f0000000080)={@local, @broadcast, [{}], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x0, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8864]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, &(0x7f00000002c0)) [ 982.257164] hfs: unable to parse mount options 03:11:33 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x3000000, &(0x7f00000003c0), 0x0, &(0x7f0000000580)={[{@session={'session'}}]}) 03:11:33 executing program 1: syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x32, 0x0, @local={0xfe, 0x80, [0x0, 0xf5ffffff00000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfeffffff]}, @local={0xfe, 0x80, [0x8864]}, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, &(0x7f0000000000)) 03:11:33 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x7400000000000000, &(0x7f00000003c0), 0x0, &(0x7f0000000580)={[{@session={'session'}}]}) 03:11:33 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000040)="153f6234488dd25d766070") socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup2(r2, r2) sendmsg$netlink(r3, &(0x7f0000028fc8)={0x0, 0x0, &(0x7f0000019000), 0x0, &(0x7f0000000040)=[@rights={0x18, 0x1, 0x1, [r1]}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000000b80)=[{{&(0x7f0000000200)=@l2, 0x80, &(0x7f00000005c0), 0x0, &(0x7f0000000600)=""/84, 0x54}}, {{&(0x7f0000000680)=@l2, 0x80, &(0x7f0000000a40), 0x4000000, &(0x7f0000000ac0)=""/147, 0x93}}], 0x4000000000002ce, 0x62, 0x0) 03:11:33 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e23}, 0x1c) listen(r0, 0x18) r1 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f0000000000)=[@in={0x8, 0x4e23, @dev={0xac, 0x14, 0x14, 0xc}}, @in={0x2, 0x4e23, @local}], 0x20) 03:11:34 executing program 3: socket$packet(0x11, 0xa, 0x300) syz_emit_ethernet(0x4e, &(0x7f0000000080)={@local, @broadcast, [{}], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x0, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2f00000000000000]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, &(0x7f00000002c0)) 03:11:34 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'tgr128\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) r2 = open(&(0x7f00004b8ff8)='./file0\x00', 0x28042, 0x0) sendmmsg$inet_sctp(r2, &(0x7f0000000240)=[{&(0x7f0000000080)=@in6={0xa, 0x4e23, 0xcbd, @dev={0xfe, 0x80, [], 0x1b}, 0x3f}, 0x1c, &(0x7f00000001c0)=[{&(0x7f00000000c0)="4ec89135885abc690f98ca7fe8deb094e535d155294b2c741b572b25a0f6d90c621dbf71ca265e68b0819b2b44ed0eee9267f72a3aefa03c12916734a4c9b17bd6ad569898af231696e1d1a0d911867c", 0x50}, {&(0x7f0000000140)="0db1b59e8be77b049cc9c60103389f1f023e88fc0daad0abf2bea88ee5445b03651f77e40d4ae904b70c504065fe1bd7592c8840d881684048b635a0ee798715501476543967e4aa2508baecd13a61608c94be660641271c65fc423742d6421eaa9e53d81032", 0x66}], 0x2, &(0x7f0000000200)}], 0x1, 0x0) fallocate(r2, 0x0, 0x0, 0x73e0) sendfile(r1, r2, &(0x7f00007ed000), 0xc1) [ 982.693470] hfs: unable to parse mount options 03:11:34 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000040)="153f6234488dd25d766070") socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup2(r2, r2) sendmsg$netlink(r3, &(0x7f0000028fc8)={0x0, 0x0, &(0x7f0000019000), 0x0, &(0x7f0000000040)=[@rights={0x18, 0x1, 0x1, [r1]}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000000b80)=[{{&(0x7f0000000200)=@l2, 0x80, &(0x7f00000005c0), 0x0, &(0x7f0000000600)=""/84, 0x54}}, {{&(0x7f0000000680)=@l2, 0x80, &(0x7f0000000a40), 0x8, &(0x7f0000000ac0)=""/147, 0x93}}], 0x4000000000002ce, 0x62, 0x0) 03:11:34 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e23}, 0x1c) listen(r0, 0x18) r1 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f0000000000)=[@in={0xb, 0x4e23, @dev={0xac, 0x14, 0x14, 0xc}}, @in={0x2, 0x4e23, @local}], 0x20) 03:11:34 executing program 3: socket$packet(0x11, 0xa, 0x300) syz_emit_ethernet(0x4e, &(0x7f0000000080)={@local, @broadcast, [{}], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x0, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x608]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, &(0x7f00000002c0)) 03:11:34 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x2c00, &(0x7f00000003c0), 0x0, &(0x7f0000000580)={[{@session={'session'}}]}) 03:11:34 executing program 1: r0 = epoll_create1(0x0) r1 = creat(&(0x7f0000001740)='./file0\x00', 0x10) ioctl$sock_inet_tcp_SIOCOUTQ(r1, 0x5411, &(0x7f0000001780)) epoll_create1(0x0) close(r0) mkdir(&(0x7f0000000180)='./file1\x00', 0x0) mount$9p_xen(&(0x7f0000000380)="2f005b37dfa5b433c070c3f613bcbc395ccb42723153977e90e32731299dee0c4a3db1740f27ae61cac1bd8388d6f229bd48d1d5d9be79db4ee9002d40f841195854f2f2ac3b4c4a0d70e3626bbbaf99f3a8638c3ff99487a0b5fe7c8aa3e24061957627d2075f8cee184c3f3adbfb9567e950ce46881c16e2a7ade170a364bc000000000200000000", &(0x7f0000000200)='./file1\x00', &(0x7f00000002c0)='9p\x00', 0x0, &(0x7f0000000540)=ANY=[]) r2 = creat(&(0x7f0000000700)='./bus\x00', 0x0) r3 = creat(&(0x7f0000000700)='./bus\x00', 0x0) recvfrom(r2, &(0x7f0000000740)=""/4096, 0x1000, 0x60, &(0x7f0000000240)=@ethernet={0x1, @remote}, 0x80) recvmsg$kcm(r2, &(0x7f0000001b40)={&(0x7f00000018c0)=@ethernet={0x0, @local}, 0x80, &(0x7f0000001940)=[{&(0x7f00000019c0)=""/78, 0x4e}], 0x1, &(0x7f0000001a40)=""/234, 0xea, 0xffffffffffff7fff}, 0x40000100) r4 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet6_tcp_SIOCOUTQNSD(r2, 0x894b, &(0x7f0000000580)) getpeername$packet(r3, &(0x7f0000000300)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000500)=0x14) setsockopt$packet_add_memb(r2, 0x107, 0x1, &(0x7f0000000540)={r5, 0x1, 0x6, @remote}, 0x10) fallocate(r3, 0x0, 0x0, 0x1000f4) ioctl$EVIOCGPROP(r4, 0x80404509, &(0x7f0000000600)=""/254) r6 = open(&(0x7f0000000180)='./bus\x00', 0x4002, 0x0) listxattr(&(0x7f00000000c0)='./bus\x00', &(0x7f0000000440)=""/185, 0xb9) sendfile(r3, r6, &(0x7f0000d83ff8), 0x8000fffffffe) r7 = open(&(0x7f0000000180)='./bus\x00', 0x0, 0x0) io_setup(0xa4, &(0x7f00000005c0)) setsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r7, 0x84, 0x13, &(0x7f00000001c0)=0xff, 0x4) sendfile(r3, r2, &(0x7f0000000340), 0x6) r8 = getpgid(0x0) perf_event_open(&(0x7f0000001b80)={0x1, 0x70, 0x367, 0x6ac, 0x6e5e, 0xffffffffffffd721, 0x0, 0x5, 0x80d00, 0x1, 0x4, 0x8, 0xffffffff, 0xec1, 0x2, 0x9, 0x20, 0x3, 0x1200000000, 0x9, 0x6, 0x0, 0x1000, 0x100000000, 0x10000, 0x4, 0x1, 0x101, 0x101, 0x101, 0x9a0, 0x100000000, 0x2, 0x9, 0x0, 0x5, 0x1, 0x0, 0x0, 0x6, 0x7, @perf_config_ext={0x0, 0x526}, 0x20000, 0x0, 0x81, 0x3, 0x0, 0x7}, r8, 0x2, r6, 0x8) syz_open_dev$dmmidi(&(0x7f0000000140)='/dev/dmmidi#\x00', 0x763, 0x2201) ioctl$EVIOCGRAB(r3, 0x40044590, &(0x7f0000000100)=0x8) [ 982.914178] hfs: unable to parse mount options 03:11:34 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e23}, 0x1c) listen(r0, 0x18) r1 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f0000000000)=[@in={0x5, 0x4e23, @dev={0xac, 0x14, 0x14, 0xc}}, @in={0x2, 0x4e23, @local}], 0x20) 03:11:34 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000040)="153f6234488dd25d766070") socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup2(r2, r2) sendmsg$netlink(r3, &(0x7f0000028fc8)={0x0, 0x0, &(0x7f0000019000), 0x0, &(0x7f0000000040)=[@rights={0x18, 0x1, 0x1, [r1]}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000000b80)=[{{&(0x7f0000000200)=@l2, 0x80, &(0x7f00000005c0), 0x0, &(0x7f0000000600)=""/84, 0x54}}, {{&(0x7f0000000680)=@l2, 0x80, &(0x7f0000000a40), 0x3f00000000000000, &(0x7f0000000ac0)=""/147, 0x93}}], 0x4000000000002ce, 0x62, 0x0) [ 983.101287] 9pnet_virtio: no channels available for device / 03:11:34 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x20000000, &(0x7f00000003c0), 0x0, &(0x7f0000000580)={[{@session={'session'}}]}) 03:11:34 executing program 3: socket$packet(0x11, 0xa, 0x300) syz_emit_ethernet(0x4e, &(0x7f0000000080)={@local, @broadcast, [{}], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x0, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf0ffffffffffff]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, &(0x7f00000002c0)) [ 983.195619] audit: type=1800 audit(1539659494.625:161): pid=23779 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed(directio) comm="syz-executor1" name="bus" dev="sda1" ino=17704 res=0 [ 983.293222] hfs: unable to parse mount options 03:11:34 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e23}, 0x1c) listen(r0, 0x18) r1 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f0000000000)=[@in={0x4, 0x4e23, @dev={0xac, 0x14, 0x14, 0xc}}, @in={0x2, 0x4e23, @local}], 0x20) 03:11:34 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000040)="153f6234488dd25d766070") socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup2(r2, r2) sendmsg$netlink(r3, &(0x7f0000028fc8)={0x0, 0x0, &(0x7f0000019000), 0x0, &(0x7f0000000040)=[@rights={0x18, 0x1, 0x1, [r1]}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000000b80)=[{{&(0x7f0000000200)=@l2, 0x80, &(0x7f00000005c0), 0x0, &(0x7f0000000600)=""/84, 0x54}}, {{&(0x7f0000000680)=@l2, 0x80, &(0x7f0000000a40), 0x6000000, &(0x7f0000000ac0)=""/147, 0x93}}], 0x4000000000002ce, 0x62, 0x0) [ 983.376546] audit: type=1804 audit(1539659494.735:162): pid=23783 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor1" name="/root/syzkaller-testdir440219986/syzkaller.HCCNbN/1781/bus" dev="sda1" ino=17704 res=1 [ 983.463759] hfs: unable to parse mount options 03:11:34 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000040)="153f6234488dd25d766070") socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup2(r2, r2) sendmsg$netlink(r3, &(0x7f0000028fc8)={0x0, 0x0, &(0x7f0000019000), 0x0, &(0x7f0000000040)=[@rights={0x18, 0x1, 0x1, [r1]}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000000b80)=[{{&(0x7f0000000200)=@l2, 0x80, &(0x7f00000005c0), 0x0, &(0x7f0000000600)=""/84, 0x54}}, {{&(0x7f0000000680)=@l2, 0x80, &(0x7f0000000a40), 0x7, &(0x7f0000000ac0)=""/147, 0x93}}], 0x4000000000002ce, 0x62, 0x0) 03:11:35 executing program 3: socket$packet(0x11, 0xa, 0x300) syz_emit_ethernet(0x4e, &(0x7f0000000080)={@local, @broadcast, [{}], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x0, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x806000000000000]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, &(0x7f00000002c0)) 03:11:35 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x300, &(0x7f00000003c0), 0x0, &(0x7f0000000580)={[{@session={'session'}}]}) 03:11:35 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e23}, 0x1c) listen(r0, 0x18) r1 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f0000000000)=[@in={0xc, 0x4e23, @dev={0xac, 0x14, 0x14, 0xc}}, @in={0x2, 0x4e23, @local}], 0x20) 03:11:35 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0xf6ffffff, &(0x7f00000003c0), 0x0, &(0x7f0000000580)={[{@session={'session'}}]}) [ 983.859409] 9pnet_virtio: no channels available for device / [ 983.866018] hfs: unable to parse mount options [ 983.891158] audit: type=1804 audit(1539659495.315:163): pid=23783 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=ToMToU comm="syz-executor1" name="/root/syzkaller-testdir440219986/syzkaller.HCCNbN/1781/bus" dev="sda1" ino=17704 res=1 [ 983.970091] hfs: unable to parse mount options 03:11:35 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) rt_sigaction(0x2b, 0x0, &(0x7f0000000600)={&(0x7f0000000580)="65f0fe410040dde2f3ad79058fe830875daf2dc4a16e59942d91300000263e66660f38257900c481f557d2f3446fc4a259ac45fe", {}, 0x0, &(0x7f00000005c0)="c4e141db616b42de39c46135685b6ff30f52b0ab1ef7e426660f38156baf2e67420f1854b5d2f3dbecc462b2f57f07f30f11423e8fa858cc2a76"}, 0x8, &(0x7f0000000640)) 03:11:35 executing program 3: socket$packet(0x11, 0xa, 0x300) syz_emit_ethernet(0x4e, &(0x7f0000000080)={@local, @broadcast, [{}], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x0, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6000000]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, &(0x7f00000002c0)) 03:11:35 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x2000, &(0x7f00000003c0), 0x0, &(0x7f0000000580)={[{@session={'session'}}]}) 03:11:35 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000040)="153f6234488dd25d766070") socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup2(r2, r2) sendmsg$netlink(r3, &(0x7f0000028fc8)={0x0, 0x0, &(0x7f0000019000), 0x0, &(0x7f0000000040)=[@rights={0x18, 0x1, 0x1, [r1]}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000000b80)=[{{&(0x7f0000000200)=@l2, 0x80, &(0x7f00000005c0), 0x0, &(0x7f0000000600)=""/84, 0x54}}, {{&(0x7f0000000680)=@l2, 0x80, &(0x7f0000000a40), 0x400000000000000, &(0x7f0000000ac0)=""/147, 0x93}}], 0x4000000000002ce, 0x62, 0x0) 03:11:35 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e23}, 0x1c) listen(r0, 0x18) r1 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f0000000000)=[@in={0x6, 0x4e23, @dev={0xac, 0x14, 0x14, 0xc}}, @in={0x2, 0x4e23, @local}], 0x20) [ 984.074948] audit: type=1804 audit(1539659495.365:164): pid=23799 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=ToMToU comm="syz-executor1" name="/root/syzkaller-testdir440219986/syzkaller.HCCNbN/1781/bus" dev="sda1" ino=17704 res=1 03:11:35 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1f00, &(0x7f00000003c0), 0x0, &(0x7f0000000580)={[{@session={'session'}}]}) 03:11:35 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000040)="153f6234488dd25d766070") socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup2(r2, r2) sendmsg$netlink(r3, &(0x7f0000028fc8)={0x0, 0x0, &(0x7f0000019000), 0x0, &(0x7f0000000040)=[@rights={0x18, 0x1, 0x1, [r1]}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000000b80)=[{{&(0x7f0000000200)=@l2, 0x80, &(0x7f00000005c0), 0x0, &(0x7f0000000600)=""/84, 0x54}}, {{&(0x7f0000000680)=@l2, 0x80, &(0x7f0000000a40), 0x0, &(0x7f0000000ac0)=""/147, 0x10}}], 0x4000000000002ce, 0x62, 0x0) 03:11:35 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e23}, 0x1c) listen(r0, 0x18) r1 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f0000000000)=[@in={0xe, 0x4e23, @dev={0xac, 0x14, 0x14, 0xc}}, @in={0x2, 0x4e23, @local}], 0x20) 03:11:35 executing program 3: socket$packet(0x11, 0xa, 0x300) syz_emit_ethernet(0x4e, &(0x7f0000000080)={@local, @broadcast, [{}], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x0, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2900]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, &(0x7f00000002c0)) [ 984.259842] audit: type=1804 audit(1539659495.365:165): pid=23779 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=ToMToU comm="syz-executor1" name="/root/syzkaller-testdir440219986/syzkaller.HCCNbN/1781/bus" dev="sda1" ino=17704 res=1 03:11:35 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000000)={'bond0\x00', &(0x7f0000000040)=@ethtool_link_settings={0x4c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}}) r1 = semget(0x3, 0x7, 0x4) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000100)='IPVS\x00') sendmsg$IPVS_CMD_SET_DEST(r0, &(0x7f0000000300)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000580)=ANY=[@ANYBLOB="5401020800fe987bddfae3041a61d2d92a51e77abf9ca68614a11196bfd5c33b387c5bea1d1598b8faccda165bf8bc715ee38dc33a02ad4b118f81763c9a643746dd51807c7d0a930bc07a6aa2ff9478e62de18e24f498c40bd5eb3bd6613ca39afb5634266f7b6ed7a7eb181e0eb7621bb01f6037c0e8bb1fca98535ea919e7adeccb7afda9700ad3304dfbde1d82e87093a6044fc067559afc3edf7625e3480d545de96f7c348847a4789d310d6b73aca114ff5f", @ANYRES16=r2, @ANYBLOB="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"], 0x154}}, 0x80) semctl$GETVAL(r1, 0x3, 0xc, &(0x7f0000000080)=""/22) [ 984.363080] audit: type=1804 audit(1539659495.385:166): pid=23799 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor1" name="/root/syzkaller-testdir440219986/syzkaller.HCCNbN/1781/bus" dev="sda1" ino=17704 res=1 [ 984.454834] hfs: unable to parse mount options [ 984.493734] hfs: unable to parse mount options 03:11:35 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e23}, 0x1c) listen(r0, 0x18) r1 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f0000000000)=[@in={0xffffffe0, 0x4e23, @dev={0xac, 0x14, 0x14, 0xc}}, @in={0x2, 0x4e23, @local}], 0x20) 03:11:36 executing program 3: socket$packet(0x11, 0xa, 0x300) syz_emit_ethernet(0x4e, &(0x7f0000000080)={@local, @broadcast, [{}], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x0, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffff89]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, &(0x7f00000002c0)) 03:11:36 executing program 1: r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhci\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_GPARAMS(r0, 0x40485404, &(0x7f0000000040)={{0x1, 0x3, 0x7, 0x2, 0x9}, 0x2be7, 0x40}) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(r0, 0xc0505405, &(0x7f00000000c0)={{0x3, 0x1, 0x10000, 0x2, 0x4}, 0xff, 0x3f, 0x63}) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000140)={0x40, @tick=0x6, 0xffffffff7fffffff, {}, 0x8, 0x2, 0x6}) ioctl$EVIOCSKEYCODE_V2(r0, 0x40284504, &(0x7f00000001c0)={0x7, 0x9, 0x9, 0x2, "4ed1b0d7eb623097fa74c77cb2f8ded4967154d9e2bd32d5218141b3bf9b5a68"}) getsockopt$bt_BT_SNDMTU(r0, 0x112, 0xc, &(0x7f0000000200)=0x80000001, &(0x7f0000000240)=0x2) setsockopt$bt_BT_CHANNEL_POLICY(r0, 0x112, 0xa, &(0x7f0000000280)=0x6, 0x4) recvfrom$llc(r0, &(0x7f00000002c0)=""/55, 0x37, 0x61, &(0x7f0000000300)={0x1a, 0x118, 0x101, 0xfffffffffffffff7, 0x3, 0xe0, @broadcast}, 0x10) ioctl$DRM_IOCTL_GET_CAP(r0, 0xc010640c, &(0x7f0000000340)={0x4}) r1 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000380)='/dev/ashmem\x00', 0x8000, 0x0) ioctl$EVIOCSKEYCODE_V2(r0, 0x40284504, &(0x7f00000003c0)={0x6, 0xd, 0x1000, 0xa91, "80d19739e758e467dd9f46b68a421e0bef4c9070c7a176d11962c4c1b7e8647a"}) ioctl$KVM_IRQ_LINE_STATUS(r1, 0xc008ae67, &(0x7f0000000400)={0x8, 0x65}) ioctl$KVM_ARM_SET_DEVICE_ADDR(r0, 0x4010aeab, &(0x7f0000000440)={0x9, 0x1}) ioctl$SNDRV_TIMER_IOCTL_STATUS(r1, 0x80605414, &(0x7f0000000480)=""/32) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r0, 0x84, 0x10, &(0x7f00000004c0)=@sack_info={0x0, 0xfff, 0x200}, &(0x7f0000000500)=0xc) getsockopt$inet_sctp_SCTP_CONTEXT(r0, 0x84, 0x11, &(0x7f0000000540)={r2, 0x5}, &(0x7f0000000580)=0x8) setxattr$security_selinux(&(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='security.selinux\x00', &(0x7f0000000640)='system_u:object_r:dbusd_etc_t:s0\x00', 0x21, 0x1) ioctl$SNDRV_TIMER_IOCTL_STATUS(r0, 0x80605414, &(0x7f0000000680)=""/8) r4 = fcntl$getown(r1, 0x9) write$cgroup_pid(r0, &(0x7f00000006c0)=r4, 0x12) ioctl$KVM_GET_NR_MMU_PAGES(r0, 0xae45, 0x7ff) setsockopt$inet6_dccp_buf(r0, 0x21, 0xf, &(0x7f0000000700)="b18d5dc64b59ab7e1ba81d79f3836fdeaa461040d0e7b700fe0f441fb5716cff6bbe4f50512306b08dd70a56e6e6dfaebabaa6d62cb5369eeebd624990f14fcfbd7622ec2fd7b6e3d9e48adfff085880da3b04ad24ad9a27dc6182edbc84cef47e384de7b8931267d00b767b0e8cdc9196b9fd56195f6af347ffaca6aff246da18b11e8a5242ce8f2793fccac3", 0x8d) io_setup(0x1, &(0x7f00000007c0)=0x0) io_destroy(r5) ioctl$DRM_IOCTL_WAIT_VBLANK(r0, 0xc018643a, &(0x7f0000000800)={0x0, 0x8, 0x38}) ioctl$SNDRV_SEQ_IOCTL_DELETE_QUEUE(r0, 0x408c5333, &(0x7f0000000840)={0x7f, 0x8, 0x7, 'queue0\x00', 0xeb0}) ioctl$BLKZEROOUT(r0, 0x127f, &(0x7f0000000900)={0x800, 0x5}) getsockopt$inet_sctp_SCTP_STATUS(r0, 0x84, 0xe, &(0x7f0000000940)={r3, 0x7fffffff, 0x2, 0x3, 0x7, 0xf05, 0xfe5a, 0xf06, {r2, @in={{0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0xb}}}, 0x0, 0x0, 0x10001, 0x0, 0xaba}}, &(0x7f0000000a00)=0xb0) syz_mount_image$ext4(&(0x7f0000000a40)='ext3\x00', &(0x7f0000000a80)='./file0\x00', 0x2, 0x1, &(0x7f0000000b00)=[{&(0x7f0000000ac0)="e6e47ce8b6d40180e4f8e4a159d3dd246e52b005ad021fd8d493b340d599aa6bf3e7091cad7af70895b08073953f2955009134d9e181a2da271c", 0x3a, 0xffffffff}], 0x4, &(0x7f0000000b40)={[{@nogrpid='nogrpid'}, {@mblk_io_submit='mblk_io_submit'}, {@usrjquota_path={'usrjquota', 0x3d, './file0'}}, {@bsdgroups='bsdgroups'}], [{@obj_user={'obj_user', 0x3d, '/dev/ashmem\x00'}}, {@smackfsfloor={'smackfsfloor'}}]}) ioctl$KVM_SET_MP_STATE(r0, 0x4004ae99, &(0x7f0000000bc0)) 03:11:36 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x7400, &(0x7f00000003c0), 0x0, &(0x7f0000000580)={[{@session={'session'}}]}) 03:11:36 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x600, &(0x7f00000003c0), 0x0, &(0x7f0000000580)={[{@session={'session'}}]}) 03:11:36 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000040)="153f6234488dd25d766070") socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup2(r2, r2) sendmsg$netlink(r3, &(0x7f0000028fc8)={0x0, 0x0, &(0x7f0000019000), 0x0, &(0x7f0000000040)=[@rights={0x18, 0x1, 0x1, [r1]}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000000b80)=[{{&(0x7f0000000200)=@l2, 0x80, &(0x7f00000005c0), 0x0, &(0x7f0000000600)=""/84, 0x54}}, {{&(0x7f0000000680)=@l2, 0x80, &(0x7f0000000a40), 0x0, &(0x7f0000000ac0)=""/147, 0x2ce}}], 0x4000000000002ce, 0x62, 0x0) 03:11:36 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e23}, 0x1c) listen(r0, 0x18) r1 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f0000000000)=[@in={0x7, 0x4e23, @dev={0xac, 0x14, 0x14, 0xc}}, @in={0x2, 0x4e23, @local}], 0x20) [ 984.832661] EXT4-fs (loop1): VFS: Can't find ext4 filesystem 03:11:36 executing program 3: socket$packet(0x11, 0xa, 0x300) syz_emit_ethernet(0x4e, &(0x7f0000000080)={@local, @broadcast, [{}], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x0, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x600]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, &(0x7f00000002c0)) [ 984.921618] EXT4-fs (loop1): VFS: Can't find ext4 filesystem [ 984.971025] hfs: unable to parse mount options 03:11:36 executing program 1: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000b4508a)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_NAME(r0, 0x41007701, &(0x7f00000001c0)='\x00') r1 = socket$inet6_udp(0xa, 0x2, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) connect$inet6(r1, &(0x7f00000000c0)={0xa, 0x0, 0x0, @dev, 0x4}, 0x1c) ioctl$TCSETS(0xffffffffffffffff, 0x5402, &(0x7f0000000280)={0x7fea88a1, 0xfffffffffffffff9, 0x7, 0x2, 0x1, 0xec, 0x8000, 0x1, 0x6, 0xe3c, 0xffffffffffff0000, 0x2}) connect$l2tp(0xffffffffffffffff, &(0x7f0000000180)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast2}, 0x4}}, 0x26) sendmmsg(r1, &(0x7f0000005fc0), 0x8000000000000fc, 0x0) getpeername$inet6(r1, &(0x7f0000000000)={0xa, 0x0, 0x0, @dev}, &(0x7f0000000100)=0x1c) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) add_key(&(0x7f0000000200)='rxrpc\x00', &(0x7f00000002c0), &(0x7f0000000300), 0x0, 0x0) r3 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nullb0\x00', 0x4000000004002, 0x0) connect$l2tp(0xffffffffffffffff, &(0x7f0000000300)=@pppol2tpv3={0x18, 0x1, {0x0, r0, {0x2, 0x0, @broadcast}, 0x4}}, 0x2e) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000e, 0x13, r3, 0x0) io_setup(0x3, &(0x7f0000000240)) write$binfmt_misc(r3, &(0x7f0000000500)=ANY=[@ANYBLOB="73797a3117da1a456b4b53cbd4b49e85096363871044bf1090c544503920bf08c065cd4685e8ad26a01060512f45cf480800000000000000db2e458b6c7095b1a5f8edbbd78cdc67700e7b7906f67c330e18446500387a9af1355b51116657451d530f957889b26dee6516f03629db428f3c6c5be1d607f39670b1ebdf7eca32e84a27b464a0b7d311c404ae550e583f9b74bea3d30c5e90f7e32b7a9a20845364fd6412"], 0x1200e) ioctl$KDGETMODE(0xffffffffffffffff, 0x4b3b, &(0x7f0000000140)) modify_ldt$read(0x0, &(0x7f0000000380)=""/190, 0xbe) fcntl$setflags(r2, 0x2, 0x1) setsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f0000000680)={{{@in=@multicast1, @in6=@loopback, 0x4e23, 0xffff, 0x0, 0x7ff, 0xa, 0x20, 0x20}, {0x8, 0x7bfb, 0x9, 0x401, 0x3, 0x48ec00000000, 0x0, 0x918}, {0xffffffff, 0x1, 0x7f, 0x7fffffff}, 0x5, 0xbe52, 0x0, 0x1, 0x1}, {{@in=@dev={0xac, 0x14, 0x14, 0x16}, 0x4d5}, 0xa, @in6=@dev={0xfe, 0x80, [], 0x20}, 0x3506, 0x7, 0x3, 0xe, 0x458, 0x1, 0x7}}, 0xe8) 03:11:36 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e23}, 0x1c) listen(r0, 0x18) r1 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f0000000000)=[@in={0x3, 0x4e23, @dev={0xac, 0x14, 0x14, 0xc}}, @in={0x2, 0x4e23, @local}], 0x20) 03:11:36 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000040)="153f6234488dd25d766070") socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup2(r2, r2) sendmsg$netlink(r3, &(0x7f0000028fc8)={0x0, 0x0, &(0x7f0000019000), 0x0, &(0x7f0000000040)=[@rights={0x18, 0x1, 0x1, [r1]}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000000b80)=[{{&(0x7f0000000200)=@l2, 0x80, &(0x7f00000005c0), 0x0, &(0x7f0000000600)=""/84, 0x54}}, {{&(0x7f0000000680)=@l2, 0x80, &(0x7f0000000a40), 0x0, &(0x7f0000000ac0)=""/147, 0x18}}], 0x4000000000002ce, 0x62, 0x0) [ 985.124495] hfs: unable to parse mount options 03:11:36 executing program 3: socket$packet(0x11, 0xa, 0x300) syz_emit_ethernet(0x4e, &(0x7f0000000080)={@local, @broadcast, [{}], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x0, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8848]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, &(0x7f00000002c0)) 03:11:36 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0xffff1f00, &(0x7f00000003c0), 0x0, &(0x7f0000000580)={[{@session={'session'}}]}) 03:11:36 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e23}, 0x1c) listen(r0, 0x18) r1 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f0000000000)=[@in={0x2, 0x4e23, @dev={0xa, 0x14, 0x14, 0xc}}, @in={0x2, 0x4e23, @local}], 0x20) 03:11:36 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x5, &(0x7f00000003c0), 0x0, &(0x7f0000000580)={[{@session={'session'}}]}) 03:11:36 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000040)="153f6234488dd25d766070") socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup2(r2, r2) sendmsg$netlink(r3, &(0x7f0000028fc8)={0x0, 0x0, &(0x7f0000019000), 0x0, &(0x7f0000000040)=[@rights={0x18, 0x1, 0x1, [r1]}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000000b80)=[{{&(0x7f0000000200)=@l2, 0x80, &(0x7f00000005c0), 0x0, &(0x7f0000000600)=""/84, 0x54}}, {{&(0x7f0000000680)=@l2, 0x80, &(0x7f0000000a40), 0x0, &(0x7f0000000ac0)=""/147, 0x93, 0x800000000000000}}], 0x4000000000002ce, 0x62, 0x0) [ 985.507275] hfs: invalid session number or type of track 03:11:37 executing program 3: socket$packet(0x11, 0xa, 0x300) syz_emit_ethernet(0x4e, &(0x7f0000000080)={@local, @broadcast, [{}], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x0, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, &(0x7f00000002c0)) [ 985.550943] hfs: can't find a HFS filesystem on dev loop2 [ 985.659842] hfs: invalid session number or type of track [ 985.706441] hfs: can't find a HFS filesystem on dev loop2 03:11:37 executing program 1: r0 = socket$inet6(0xa, 0x3, 0x800000000000004) r1 = syz_open_dev$dmmidi(&(0x7f00000000c0)='/dev/dmmidi#\x00', 0x2, 0x200080) r2 = syz_genetlink_get_family_id$team(&(0x7f0000000140)='team\x00') getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000180)={0x0, @broadcast, @remote}, &(0x7f00000001c0)=0xc) ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x8933, &(0x7f0000000340)={'vcan0\x00', r3}) getsockopt$inet_mreqn(r0, 0x0, 0x20, &(0x7f00000002c0)={@multicast2, @broadcast, 0x0}, &(0x7f0000000300)=0xc) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000240)={'rose0\x00', r5}) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x24, &(0x7f0000000380)={@loopback, @broadcast, 0x0}, &(0x7f00000003c0)=0xc) r8 = accept4$packet(0xffffffffffffff9c, &(0x7f0000000400)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000440)=0x14, 0x80800) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000480)={'ip6tnl0\x00', 0x0}) getsockopt$inet_mreqn(0xffffffffffffff9c, 0x0, 0x23, &(0x7f00000004c0)={@remote, @dev, 0x0}, &(0x7f0000000500)=0xc) getsockname$packet(0xffffffffffffffff, &(0x7f0000000540)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000580)=0x14) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f00000005c0)={{{@in=@dev, @in=@rand_addr, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6}, 0x0, @in=@dev}}, &(0x7f00000006c0)=0xe8) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000001b80)={'vlan0\x00', 0x0}) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000001bc0)={'team0\x00', 0x0}) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000001d80)={'veth1_to_team\x00', 0x0}) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000001dc0)={'vcan0\x00', 0x0}) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000002440)={{{@in=@rand_addr, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@local}, 0x0, @in6=@mcast1}}, &(0x7f0000002540)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(r8, 0x8933, &(0x7f0000000780)={'team0\x00', r9}) getsockopt$inet6_mreq(r0, 0x29, 0x14, &(0x7f0000006c80)={@dev, 0x0}, &(0x7f0000006cc0)=0x14) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000006e40)={{{@in6=@ipv4={[], [], @rand_addr}, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={[], [], @loopback}}, 0x0, @in=@multicast1}}, &(0x7f0000006f40)=0xe8) sendmsg$TEAM_CMD_OPTIONS_SET(r1, &(0x7f00000079c0)={&(0x7f0000000100), 0xc, &(0x7f0000007980)={&(0x7f0000006f80)=ANY=[@ANYBLOB="c8090000", @ANYRES16=r2, @ANYBLOB="01002abd7000fbdbdf250100000008000100", @ANYRES32=r3, @ANYBLOB="740102003c00010024000100656e61626c65640000000000000000000000000000000000000000000000000008000300060000000400040008000600", @ANYRES32=r4, @ANYBLOB="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", @ANYRES32=r5, @ANYBLOB="4001020040000100240001006c625f686173685f737461747300000000000000000000000000000000000000080003000b0000000800040006000000080007000000000038000100240001006d636173745f72656a6f696e5f636f756e7400000000000000000000000000000800030003000000080004000010000040000100240001006c625f706f72745f737461747300000000000000000000000000000000000000080003000b000000080004000080000008000600", @ANYRES32=r6, @ANYBLOB="4c000100240001006c625f74785f6d6574686f64000000000000000000000000000000000000000008000300050000001c000400686173685f746f5f706f72745f6d617070696e67000000003800010024000100616374697665706f727400000000000000000000000000000000000000000000080003000300000008000400", @ANYRES32=r7, @ANYBLOB="08000100", @ANYRES32=r9, @ANYBLOB="1402020038000100240001006d636173745f72656a6f696e5f696e74657276616c00000000000000000000000800030003000000080004000000000038000100240001006d636173745f72656a6f696e5f636f756e7400000000000000000000000000000800030003000000080004000100008038000100240001006c625f73746174735f726566726573685f696e74657276616c00000000000000080003000300000008000400000800003c00010024000100757365725f6c696e6b75705f656e61626c65640000000000000000000000000008000300060000000400040008000600", @ANYRES32=r10, @ANYBLOB="3c00010024000100656e61626c65640000000000000000000000000000000000000000000000000008000300060000000400040008000600", @ANYRES32=r11, @ANYBLOB="40000100240001006c625f686173685f737461747300000000000000000000000000000000000000080003000b000000080004005a080000080007000000000038000100240001006c625f73746174735f726566726573685f696e74657276616c000000000000000800030003000000080004000800000040000100240001006c625f686173685f737461747300000000000000000000000000000000000000080003000b0000000800040005000000080007000000000038000100240001006e6f746966795f70656572735f636f756e7400000000000000000000000000000800030003000000080004000af8ffff08000100", @ANYRES32=r12, @ANYBLOB="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", @ANYRES32=r13, @ANYBLOB="e80002003c00010024000100656e61626c65640000000000000000000000000000000000000000000000000008000300060000000400040008000600", @ANYRES32=r14, @ANYBLOB="3c00010024000100656e61626c65640000000000000000000000000000000000000000000000000008000300060000000400040008000600", @ANYRES32=r15, @ANYBLOB="6c000100240001006270665f686173685f66756e630000000000000012df3c9ec4aec1274cfc0500000000000000000000000000080003000b0000003c000400080079f40500000001000100060000000100a628060000000100209664f58a230000811a42010000c19e050006000000", @ANYRES32=r16, @ANYBLOB="780002003c00010024000100757365725f6c696e6b757000000000000000000000000000000000000000000008000300060000000400040008000600", @ANYRES32=r17, @ANYBLOB="38000100240001006e6f746966795f70656572735f696e74657276616c000000000000000000000008000300030000000800040041e9000008000100", @ANYRES32=r18, @ANYBLOB="2802020038000100240001006d636173745f72656a6f696e5f636f756e7400000000000000000000000000000800030003000000080004000101000038000100240001006e6f746966795f70656572735f636f756e740000000000000000000000000000080003000300000008000400010000003c000100240001006c625f74785f6d6574686f64000000000000000000000000000000000000000008000300050000000c00040068617368000000003c00010024000100757365725f6c696e6b757000000000000000000000000000000000000000000008000300060000000400040008000600", @ANYRES32=r19, @ANYBLOB="38000100240001006d636173745f72656a6f696e5f696e74657276616c00000000000000000000000800030003000000080004008000000040000100240001006c625f706f72745f737461747300000000000000000000000000000000000000080003000b000000080004000200000008000600", @ANYRES32=r20, @ANYBLOB="4c000100240001006270665f686173685f66756e6300000000000000000000000000000000000000080003000b0000001c00040009000507010100000500ff037f000000f90400000000000038000100240001006e6f746966795f70656572735f696e74657276616c00000000000000000000000800030003000000080004000900000040000100240001006c625f706f72745f737461747300000000000000000000000000000000000000080003000b00000008000400ff7f000008000600", @ANYRES32=r21], 0x9c8}, 0x1, 0x0, 0x0, 0x4000}, 0x40) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r22 = socket$inet6(0xa, 0x5, 0x0) bind$inet6(r22, &(0x7f0000d1a000)={0xa, 0x4e20, 0x0, @ipv4={[], [], @remote}}, 0x1c) r23 = socket$inet6(0xa, 0x5, 0x0) bind$inet6(r23, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @ipv4={[], [], @loopback}}, 0x1c) listen(r23, 0x404) listen(r22, 0x8000000000000009) close(r22) getsockopt$sock_cred(r23, 0x1, 0x11, &(0x7f0000000000), &(0x7f0000000080)=0xc) 03:11:37 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1f00000000000000, &(0x7f00000003c0), 0x0, &(0x7f0000000580)={[{@session={'session'}}]}) 03:11:37 executing program 3: socket$packet(0x11, 0xa, 0x300) syz_emit_ethernet(0x4e, &(0x7f0000000080)={@local, @broadcast, [{}], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x0, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2c00000000000000]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, &(0x7f00000002c0)) 03:11:37 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000040)="153f6234488dd25d766070") socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup2(r2, r2) sendmsg$netlink(r3, &(0x7f0000028fc8)={0x0, 0x0, &(0x7f0000019000), 0x0, &(0x7f0000000040)=[@rights={0x18, 0x1, 0x1, [r1]}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000000b80)=[{{&(0x7f0000000200)=@l2, 0x80, &(0x7f00000005c0), 0x0, &(0x7f0000000600)=""/84, 0x54}}, {{&(0x7f0000000680)=@l2, 0x80, &(0x7f0000000a40), 0x0, &(0x7f0000000ac0)=""/147, 0x93, 0x700000000000000}}], 0x4000000000002ce, 0x62, 0x0) [ 985.876865] hfs: unable to parse mount options 03:11:37 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x60, &(0x7f00000003c0), 0x0, &(0x7f0000000580)={[{@session={'session'}}]}) 03:11:37 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000040)="153f6234488dd25d766070") socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup2(r2, r2) sendmsg$netlink(r3, &(0x7f0000028fc8)={0x0, 0x0, &(0x7f0000019000), 0x0, &(0x7f0000000040)=[@rights={0x18, 0x1, 0x1, [r1]}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000000b80)=[{{&(0x7f0000000200)=@l2, 0x80, &(0x7f00000005c0), 0x0, &(0x7f0000000600)=""/84, 0x54}}, {{&(0x7f0000000680)=@l2, 0x80, &(0x7f0000000a40), 0x0, &(0x7f0000000ac0)=""/147, 0x93, 0x6000000}}], 0x4000000000002ce, 0x62, 0x0) [ 986.176085] hfs: unable to parse mount options [ 986.201291] hfs: unable to parse mount options 03:11:37 executing program 3: socket$packet(0x11, 0xa, 0x300) syz_emit_ethernet(0x4e, &(0x7f0000000080)={@local, @broadcast, [{}], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x0, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2c000000]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, &(0x7f00000002c0)) 03:11:37 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0xe000000000000, &(0x7f00000003c0), 0x0, &(0x7f0000000580)={[{@session={'session'}}]}) 03:11:37 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e23}, 0x1c) listen(r0, 0x18) r1 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f0000000000)=[@in={0x2, 0x4e23, @dev={0xac, 0x2c0, 0x14, 0xc}}, @in={0x2, 0x4e23, @local}], 0x20) 03:11:37 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10) sendto$inet(r0, &(0x7f0000000000), 0xffffffffffffff5c, 0x200007fe, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000180)="766574683100000000ffffffffffef00", 0x10) r1 = dup2(r0, r0) sendmsg$IPVS_CMD_GET_CONFIG(r1, &(0x7f00000001c0)={&(0x7f00000000c0), 0xc, &(0x7f0000000140)={&(0x7f0000000600)=ANY=[@ANYBLOB], 0x1}}, 0x44801) openat$null(0xffffffffffffff9c, &(0x7f0000000340)='/dev/null\x00', 0x200, 0x0) ioctl$PPPIOCGCHAN(0xffffffffffffffff, 0x80047437, &(0x7f0000000300)) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000380), 0xfdf5) sendto$inet(r0, &(0x7f0000000000), 0x0, 0xc0, &(0x7f0000000240)={0x2, 0x500000000000000, @empty=0xffffffffffffffff, [0x0, 0x3e8]}, 0x10) getsockopt$inet_sctp_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x14, &(0x7f0000000040)=@assoc_value={0x0}, &(0x7f0000000100)=0x8) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000000400)={0x3, &(0x7f00000003c0)=[{0x8, 0x0, 0x1ff}, {0x0, 0x10000, 0xffff, 0x3}, {0x2, 0x0, 0x5, 0x8}]}, 0x10) setsockopt$inet_sctp6_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, &(0x7f0000000200)={r2, 0x0, 0x0, 0xffff, 0x0, 0x2}, 0x14) 03:11:37 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x770c0000, &(0x7f00000003c0), 0x0, &(0x7f0000000580)={[{@session={'session'}}]}) 03:11:37 executing program 3: socket$packet(0x11, 0xa, 0x300) syz_emit_ethernet(0x4e, &(0x7f0000000080)={@local, @broadcast, [{}], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x0, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd000000]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, &(0x7f00000002c0)) 03:11:37 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000040)="153f6234488dd25d766070") socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup2(r2, r2) sendmsg$netlink(r3, &(0x7f0000028fc8)={0x0, 0x0, &(0x7f0000019000), 0x0, &(0x7f0000000040)=[@rights={0x18, 0x1, 0x1, [r1]}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000000b80)=[{{&(0x7f0000000200)=@l2, 0x80, &(0x7f00000005c0), 0x0, &(0x7f0000000600)=""/84, 0x54}}, {{&(0x7f0000000680)=@l2, 0x80, &(0x7f0000000a40), 0x0, &(0x7f0000000ac0)=""/147, 0x93, 0x3f00}}], 0x4000000000002ce, 0x62, 0x0) 03:11:38 executing program 1: socket$inet6(0xa, 0x3, 0x0) accept(0xffffffffffffffff, &(0x7f0000000000)=@nfc_llcp, &(0x7f0000000080)=0x80) clone(0x802182001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000140), 0xffffffffffffffff) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rtc0\x00', 0x0, 0x0) ioctl$TIOCSTI(r0, 0x5412, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000002c0)={0x0}, &(0x7f0000000300)=0xc) ioctl$DRM_IOCTL_FREE_BUFS(0xffffffffffffffff, 0x4010641a, &(0x7f0000000400)={0x3, &(0x7f00000003c0)=[0x0, 0x0, 0x7]}) perf_event_open(&(0x7f0000000240)={0x5, 0x70, 0xfffffffffffffffe, 0x0, 0x4, 0x6, 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe4c4, 0xd3, 0x81, 0xfffffffffffffbff, 0x0, 0x0, 0x1d5b, 0x0, 0x0, 0x5, 0x3, 0x0, 0x7, 0x101, 0x0, 0x50f1, 0x5, 0xf8, 0x1, 0x6991, 0x80000000000, 0x0, 0x0, 0x4, 0x0, 0x20, 0x0, @perf_bp={&(0x7f0000000200), 0x6}, 0x100, 0x0, 0xec, 0x7, 0xb7, 0xfffffffffffffff9}, r1, 0x10, r0, 0x1) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x3, 0x24, &(0x7f0000000440)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00'}, 0x48) exit(0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000100), 0x1c) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000140)={'syz1'}, 0x4) [ 986.602462] hfs: unable to parse mount options 03:11:38 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x700000000000000, &(0x7f00000003c0), 0x0, &(0x7f0000000580)={[{@session={'session'}}]}) 03:11:38 executing program 1: pipe2$9p(&(0x7f0000000100)={0xffffffffffffffff}, 0x0) r1 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) write$sndseq(r1, &(0x7f0000000140)=[{0x6, 0x2, 0x6, 0x1, @time={0x77359400}, {0x0, 0xf6}, {0x7fff, 0x2}, @control={0x10000, 0x1ff, 0x5}}, {0x0, 0x10001, 0xffffffffffff7fff, 0xa5b1, @tick=0x100000000000000, {0x9, 0x10000}, {0x5, 0x4c}, @queue={0x86, {0x1, 0x9}}}, {0x256bec5f, 0x100000001, 0x64e, 0x1000, @time, {0x5, 0x6}, {0x6c0cada7, 0x6}, @control={0x6, 0x0, 0x5b}}], 0x90) mkdir(&(0x7f0000000040)='./file0\x00', 0x4) r2 = memfd_create(&(0x7f0000000080)='em0{\x00', 0x0) ioctl$sock_bt_bnep_BNEPGETCONNLIST(r2, 0x800442d2, &(0x7f0000000240)={0x2, &(0x7f0000000200)=[{0x0, 0x0, 0x0, @dev}, {0x0, 0x0, 0x0, @random}]}) getsockopt$inet_sctp6_SCTP_MAXSEG(r2, 0x84, 0xd, &(0x7f0000000280)=@assoc_id=0x0, &(0x7f00000002c0)=0x4) getsockopt$inet_sctp_SCTP_GET_PEER_ADDRS(r1, 0x84, 0x6c, &(0x7f0000000300)={r3, 0xb, "a7ae0d364fea2b75729740"}, &(0x7f0000000340)=0x13) mount$9p_fd(0x0, &(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='9p\x00', 0x0, &(0x7f00000009c0)={'trans=fd,', {'rfdno', 0x3d, r2}, 0x2c, {'wfdno', 0x3d, r0}}) write$P9_RREADDIR(r2, &(0x7f0000000000)=ANY=[@ANYBLOB="220300002900000000f800"], 0xb) 03:11:38 executing program 3: socket$packet(0x11, 0xa, 0x300) syz_emit_ethernet(0x4e, &(0x7f0000000080)={@local, @broadcast, [{}], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x0, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, &(0x7f00000002c0)) [ 986.897165] hfs: unable to parse mount options 03:11:38 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000040)="153f6234488dd25d766070") socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup2(r2, r2) sendmsg$netlink(r3, &(0x7f0000028fc8)={0x0, 0x0, &(0x7f0000019000), 0x0, &(0x7f0000000040)=[@rights={0x18, 0x1, 0x1, [r1]}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000000b80)=[{{&(0x7f0000000200)=@l2, 0x80, &(0x7f00000005c0), 0x0, &(0x7f0000000600)=""/84, 0x54}}, {{&(0x7f0000000680)=@l2, 0x80, &(0x7f0000000a40), 0x0, &(0x7f0000000ac0)=""/147, 0x93, 0x900}}], 0x4000000000002ce, 0x62, 0x0) [ 986.944403] hfs: unable to parse mount options 03:11:38 executing program 3: socket$packet(0x11, 0xa, 0x300) syz_emit_ethernet(0x4e, &(0x7f0000000080)={@local, @broadcast, [{}], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x0, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8906]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, &(0x7f00000002c0)) 03:11:38 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0xf6ffffff00000000, &(0x7f00000003c0), 0x0, &(0x7f0000000580)={[{@session={'session'}}]}) [ 987.290201] hfs: unable to parse mount options 03:11:38 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e23}, 0x1c) listen(r0, 0x18) r1 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f0000000000)=[@in={0x2, 0x4e23, @dev={0xac, 0x3, 0x14, 0xc}}, @in={0x2, 0x4e23, @local}], 0x20) 03:11:38 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x3f00, &(0x7f00000003c0), 0x0, &(0x7f0000000580)={[{@session={'session'}}]}) 03:11:38 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000040)="153f6234488dd25d766070") socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup2(r2, r2) sendmsg$netlink(r3, &(0x7f0000028fc8)={0x0, 0x0, &(0x7f0000019000), 0x0, &(0x7f0000000040)=[@rights={0x18, 0x1, 0x1, [r1]}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000000b80)=[{{&(0x7f0000000200)=@l2, 0x80, &(0x7f00000005c0), 0x0, &(0x7f0000000600)=""/84, 0x54}}, {{&(0x7f0000000680)=@l2, 0x80, &(0x7f0000000a40), 0x0, &(0x7f0000000ac0)=""/147, 0x93, 0x600}}], 0x4000000000002ce, 0x62, 0x0) 03:11:38 executing program 3: socket$packet(0x11, 0xa, 0x300) syz_emit_ethernet(0x4e, &(0x7f0000000080)={@local, @broadcast, [{}], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x0, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4305]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, &(0x7f00000002c0)) 03:11:38 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x97ffffff00000000, &(0x7f00000003c0), 0x0, &(0x7f0000000580)={[{@session={'session'}}]}) 03:11:39 executing program 3: socket$packet(0x11, 0xa, 0x300) syz_emit_ethernet(0x4e, &(0x7f0000000080)={@local, @broadcast, [{}], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x0, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6488]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, &(0x7f00000002c0)) [ 987.629555] hfs: unable to parse mount options 03:11:39 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000040)="153f6234488dd25d766070") socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup2(r2, r2) sendmsg$netlink(r3, &(0x7f0000028fc8)={0x0, 0x0, &(0x7f0000019000), 0x0, &(0x7f0000000040)=[@rights={0x18, 0x1, 0x1, [r1]}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000000b80)=[{{&(0x7f0000000200)=@l2, 0x80, &(0x7f00000005c0), 0x0, &(0x7f0000000600)=""/84, 0x54}}, {{&(0x7f0000000680)=@l2, 0x80, &(0x7f0000000a40), 0x0, &(0x7f0000000ac0)=""/147, 0x93, 0x9}}], 0x4000000000002ce, 0x62, 0x0) [ 987.677426] hfs: unable to parse mount options 03:11:39 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) pipe2(&(0x7f0000000080)={0xffffffffffffffff}, 0x80800) r2 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r2, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) r3 = socket(0xa, 0x1, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(r3, 0x0, 0x2a, &(0x7f0000000200)={0x2, {{0x2, 0x0, @multicast2}}}, 0x149) setsockopt$sock_int(r2, 0x1, 0x5, &(0x7f0000000040), 0x4) setsockopt$inet6_IPV6_ADDRFORM(r1, 0x29, 0x1, &(0x7f0000000140), 0x4) sendmsg$nfc_llcp(r3, &(0x7f00000001c0)={&(0x7f00000000c0)={0x27, 0x1, 0x2, 0x7, 0x6, 0x80000001, "50b68332d281ddf64197b2c87a8ddca95c6a7bff5485866b177ff971e469c5ce24dc34e0c4ac14d1e70fe9e6a3935b863970a37fdf31f88cd6b3aebd16076d", 0x34}, 0x60, &(0x7f0000000140), 0x0, 0x0, 0x0, 0x810}, 0x20000000) 03:11:39 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x10, &(0x7f00000003c0), 0x0, &(0x7f0000000580)={[{@session={'session'}}]}) 03:11:39 executing program 3: socket$packet(0x11, 0xa, 0x300) syz_emit_ethernet(0x4e, &(0x7f0000000080)={@local, @broadcast, [{}], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x0, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x600000000000000]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, &(0x7f00000002c0)) 03:11:39 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x400000000000000, &(0x7f00000003c0), 0x0, &(0x7f0000000580)={[{@session={'session'}}]}) [ 987.936578] hfs: invalid session number or type of track [ 987.955365] hfs: can't find a HFS filesystem on dev loop2 03:11:39 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000300)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_ENABLE_CAP(0xffffffffffffffff, 0x4068aea3, &(0x7f0000000240)) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000080)=[@text16={0x10, &(0x7f0000000180)="2e65f32efe0a6766c7442400008000006766c7442402000000006766c744240600000000670f011c24b866000f00d066b88044a2b20f23c80f21f866350400d0000f23f80f0766b80500000066b9080000000f01c10f0766b8010000000f01c10f01dfb835008ee0", 0x68}], 0xaaaaaaaaaaaabb3, 0x0, &(0x7f00000003c0), 0x25d) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x4, &(0x7f00000005c0)=[{&(0x7f00000000c0)="1a41defd176962709c0d3dd75eacfcd9e052a41fc2fd41e7154620e2b07fc6a3de6c200b1cb650f1a3306d6632145d8f8b64", 0x32, 0xfffffffffffffff7}, {&(0x7f0000000340)="1a5f1eb906d49c7848c49457e6f00f0dacdf93c7142aad3dbe1799f366f4bbb38c44d4aec7e4df153b890aaaa3621723df08dd76363e3aa352c8f74392f1bbba146e698279f9b2e9539229f440a95ede52b93d4a3203ca6b0fb1420031be6718781aca84542eec75f8c95cbe5b5a3fa755f5b8e0b32690506c91333b7a8d02e007859b83e3614331af2b435bfe20fcf11b411b02d2193de2fdaa525d2764263a7278bb843bb09a44607ed84a796ceeedb8563c3086481bf086", 0xb9, 0x1000}, {&(0x7f0000000480)="4c67aab31deff88aa9a5aa0194b046fc2d41e2bad76d30f2ba71066355c8ac3f5b5652ffae52dd322808976220dff12b667dfaa6b6d493a7635bc1d0c9f2dc76bcbb7af2d6a7735dab2808bbc5224ccaa2635b1ae3f7918cfb0bc856690cdfcb0ac348e44d5a3941ce4e9de6ad0b3d33181b428af702635b2807298d60c23f870e4982deec48d9a2b222b80489fc3b88efb8e881be68ce92903d9b2790455f4c66fccb56387c22e026b24d", 0xab, 0x3}, {&(0x7f0000000140)="ee0595c8c0887c709755d5a89e40f3432deb4636a7eb59ab", 0x18, 0x20}], 0x80000, &(0x7f0000000640)={[{@nointegrity='nointegrity'}, {@nodiscard='nodiscard'}, {@quota='quota'}, {@umask={'umask'}}, {@usrquota='usrquota'}, {@usrquota='usrquota'}], [{@fsuuid={'fsuuid', 0x3d, {[0x32, 0x7d, 0x75, 0x0, 0x39, 0x62, 0x7e, 0x32], 0x2d, [0x77, 0x64, 0x77], 0x2d, [0x65, 0x7f, 0x31, 0x7f], 0x2d, [0x67, 0x37, 0x3f, 0x7d], 0x2d, [0x37, 0x32, 0x35, 0x34, 0x33, 0x36, 0x37, 0x62]}}}, {@subj_type={'subj_type', 0x3d, 'em0\\!vboxnet1em1+'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '/dev/kvm\x00'}}, {@smackfstransmute={'smackfstransmute', 0x3d, '/dev/kvm\x00'}}, {@fsuuid={'fsuuid', 0x3d, {[0x75, 0x7b, 0x61, 0x35, 0x79, 0x37, 0x64, 0x62], 0x2d, [0x32, 0x7f, 0x39, 0x77], 0x2d, [0x63, 0x36, 0x31, 0x36], 0x2d, [0x31, 0x31, 0x66, 0x7f], 0x2d, [0x0, 0x32, 0x32, 0x65, 0x33, 0x31, 0x77, 0x31]}}}]}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000440)=[@text64={0x40, &(0x7f0000000100)="460f300f07c483614804ee08440f20c03506000000440f22c0c402f93473230f09f20f013cb9b805000000b9c00000000f01d90fc728c4c1f9e79f2e000000", 0x3f}], 0x1, 0x0, &(0x7f0000000400), 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) clone(0x0, &(0x7f0000000480), &(0x7f0000744000), &(0x7f0000000540), &(0x7f0000000180)) execve(&(0x7f0000000580)='./file0\x00', &(0x7f0000000440), &(0x7f0000000400)) [ 988.012185] hfs: invalid session number or type of track [ 988.079164] hfs: can't find a HFS filesystem on dev loop2 [ 988.249197] hfs: unable to parse mount options 03:11:39 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e23}, 0x1c) listen(r0, 0x18) r1 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f0000000000)=[@in={0x2, 0x4e23, @dev={0xac, 0xe0, 0x14, 0xc}}, @in={0x2, 0x4e23, @local}], 0x20) 03:11:39 executing program 3: socket$packet(0x11, 0xa, 0x300) syz_emit_ethernet(0x4e, &(0x7f0000000080)={@local, @broadcast, [{}], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x0, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2f00]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, &(0x7f00000002c0)) 03:11:39 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000040)="153f6234488dd25d766070") socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup2(r2, r2) sendmsg$netlink(r3, &(0x7f0000028fc8)={0x0, 0x0, &(0x7f0000019000), 0x0, &(0x7f0000000040)=[@rights={0x18, 0x1, 0x1, [r1]}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000000b80)=[{{&(0x7f0000000200)=@l2, 0x80, &(0x7f00000005c0), 0x0, &(0x7f0000000600)=""/84, 0x54}}, {{&(0x7f0000000680)=@l2, 0x80, &(0x7f0000000a40), 0x0, &(0x7f0000000ac0)=""/147, 0x93, 0x700}}], 0x4000000000002ce, 0x62, 0x0) 03:11:39 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x4c, &(0x7f00000003c0), 0x0, &(0x7f0000000580)={[{@session={'session'}}]}) 03:11:39 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x3f000000, &(0x7f00000003c0), 0x0, &(0x7f0000000580)={[{@session={'session'}}]}) [ 988.527153] hfs: unable to parse mount options 03:11:40 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x5, 0x0) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000200)='/dev/zero\x00', 0x0, 0x0) stat(&(0x7f0000000380)='./file0\x00', &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$TIOCGPGRP(r0, 0x540f, &(0x7f0000000540)=0x0) r4 = gettid() getresuid(&(0x7f0000000600)=0x0, &(0x7f0000000640), &(0x7f0000000680)) stat(&(0x7f0000001f00)='./file0\x00', &(0x7f0000001f40)={0x0, 0x0, 0x0, 0x0, 0x0}) fstat(r0, &(0x7f0000002280)={0x0, 0x0, 0x0, 0x0, 0x0}) sendmsg$netlink(r1, &(0x7f0000003e00)={&(0x7f0000000340)=@proc={0x10, 0x0, 0x25dfdbfb, 0x2000}, 0xc, &(0x7f0000003d00)=[{&(0x7f0000000700)={0x1518, 0x2a, 0xef5062758a2ac0d7, 0x70bd26, 0x25dfdbfb, "", [@nested={0x124, 0x8d, [@generic="a06ce38cb5af1afbc1d02d10e63f94c9064b7a1424a203d67156921ef9536bae8475f58abf70dbd24ac3be9a44e52e165eafb6b6a1c041aecf6c1f0a6effbd9d10707c8b93286fb1cd97b614082fb65d5f74d3cd38620971735414c48d69afc320f5d07f2c7bd25bad", @typed={0xb4, 0x73, @binary="683cb1c1e8f127298fcba8a4a1bd0952b79296c347685255d5b4ee58bcff725d3bd73aa12bff36a7da9ab66e9c56b20bf20ed6524de2d0ad4dde7f453071a84b042772e7b2f63a8f25b142996ac13ae3e52e1b321309c6134d1fd13cd01fadc1a38d084174cb2a7bd36c5f7b16517fa9a81b981489f0844679cdb190c20b4583356f28c4cfc1341d80f571eeca4b13f69f837425075578e6ac3d7d4fc07c52d027705626a20991bdfe4b408012a8c832"}]}, @generic="72c51964deac2b727f4beb68d12fba6685d01ebea934d18e7e17efe226a2cf0ed97abf0e4e9568f4e452146c3271348886eb16313e9a538036528597674dc977713f24a02201b240486ee4170dddff3ef5cb276c019a2bd92b9e4749b3c582e1c668e5afca86e90d9e3126b7107f1a7b0df1f19d8f7ac8c96880359369f1f6abc748348690f86f1b4c6b6a71825dbd41f625fc5c", @nested={0x1280, 0x0, [@generic="575f85e04a7d48126a7ee555aa3aea6bda5cf422802e9aa9107a77b238a3d5926a33ab0ee6f264291ab097598305038bd2250f8e9f23d37bd036f2d768819d71b185d01464af9ec927347d3ad48a10b9e5e6d64c84f142b2f7f0151f7303debdb21f024f52d5218c0bd5712acbea998a527eae74480ebd016872f54718d21675486547f2f2043bf66f83c91eb75d28388e26f44681942d38075d84bff7f9e8204e8447", @generic="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", @typed={0x4, 0x84}, @generic="e9fbf72892fd262bad59afd887a6fd5b062bf5fdb1f553563eaf2e9e3081d8ced4d164554b74cc77d5694978c4a59381c7aecc4a4c29bd46460c545afa2189aed52210ce6604e479a2e5fa74627326dad5ccb0d2ac5501d935fe1e905cb72de98c34c28091b587cbd5327e310f", @generic="b3406e5c7592eea944d1a208e2310590b1b14329b36be7e99cd7e77ee4b43ed138571dd8d3f448b6a14f3ee752ca8a133e100fcca864123a96abf208cc6f354799ad2e18819dde447345e2fa982ebdc72c950eba74386808a045129dea910480cef32c6541e0c19eac9edfb0af8bc56975258dcfc1c09f57f2453c94d1693a1b32cb24940dc8301fcbbcc99674a92076ed807bcd6a1c3c0d02c7b383924d2c4bf02b204807abecef55425ffaaaacea89a8b8798c2a41a5cf9ffbd121c238f43daa550eaf0ad4d08cef5abfde2e202150e2a8114958d172ac04796098098a408800fa23f8cf5bb6f75d3889b5a4031bd1de30ee63a9d4da42ec3697670217", @typed={0x8, 0x2f, @u32=0xfff}, @typed={0x8, 0x87, @uid=r2}, @typed={0x8, 0x1b, @pid=r3}, @typed={0x8, 0x42, @pid=r4}, @generic="02cea390849d0ce0682d99a21b12908d2bc664aba17cb0386fa01b1b7e582be8e8870fadc7b8b08dcb34e70bac8439eb3380a36d3bf42b4b44f5701e5cf150c7c9da2ddc787c7e81"]}, @typed={0x8, 0x32, @u32=0x6}, @generic="bbb4f749e78ba64498d86941fca6d9aaa4bd3db4e772a294422fc18588b03fd4c06d0c448f3a17cf9a4cfa8f8b361b1cd6c67ae751beddb4242499916f438022a10a1c38057d72b21e47834c386561e85cf72a84f822b6f6f68664510c11105ca25f21fdd42d9f58fc2b19f21ad5c7e9dbe6ebe1d85c081433ad9626438c302500a2d40bbc4428bda11b2b441f8a7936e5ce9d34d74b088b86415097ee987824fc715e2104847814d95b2c75104d6cd90cb8f5793ac893842b5c5ad08a1177942ba1ce53ffeaa0"]}, 0x1518}, {&(0x7f0000000580)={0x34, 0x29, 0x822, 0x70bd2c, 0x25dfdbff, "", [@typed={0x14, 0x4a, @ipv6=@dev={0xfe, 0x80, [], 0x14}}, @generic="28708ad80b1d7568e828b022afb7d0"]}, 0x34}, {&(0x7f00000005c0)={0x18, 0x25, 0x128, 0x70bd28, 0x25dfdbfb, "", [@typed={0x8, 0x44, @ipv4=@dev={0xac, 0x14, 0x14, 0xe}}]}, 0x18}, {&(0x7f0000001c40)={0x1bc, 0x21, 0x300, 0x70bd27, 0x25dfdbff, "", [@typed={0x8, 0x1b, @uid=r5}, @nested={0x110, 0x29, [@generic, @generic="41f08766dde5c09cf0e522bb514751847c1c059dfa2f4e1fa5a4b89404776ecf9758cf1b63417d9f8920a33d7b40ce508f0f682d4cef1c47630d785084f01c2dfc36db30c944e8576e3c0b7f98a18791c92f92cd763f8a2016cd689c72993372acacf5b363a1a88987a549e246737a3096a7169c886c631599548c12662940aae3042e3701c3dd24ef909d237b262f05f6", @typed={0x8, 0x27, @u32=0xfffffffffffffffd}, @typed={0xc, 0x77, @str='GPLppp0\x00'}, @generic="61f121bf4b0c27a45aa97e288c7baafaac8cd84fec70c04c6808355391ed90e81dbe574afa0467fa9acd74de3a61df295b178166586d47f1d9669c6c535cd0c847d66c91a46b6458f0dc7c2a527097148d30f32df85c564ade586ec65900e2ffce3c8a02"]}, @nested={0x94, 0x8f, [@generic="b8bb41b39a570b06a1f1fba1f2c8ba0ec611eaa6ceac9a30ffdfdb62cb24bcafc02a77080e6238d5622b6adcfd05583ff06476da0f9afb6c31803a75924e0e57506f916bce3fa0479f8140366749f7b4803aa5f13f781f1d6ddeb7d19c341a202b75e499d926e6c0661f1e1fb9e5ac97b2635e1daeaf0008324f1cf58305e0b44867223681d3901d15ae031be61d"]}]}, 0x1bc}, {&(0x7f0000001e00)={0x100, 0x41, 0x400, 0x70bd25, 0x25dfdbfe, "", [@generic="5e14e04b257326aabc7916400bcc75276257a7d8360752f7bfc7b881293ac422df08c1e1814416c2f8843d1d7ccb2d4d6d04d09cb8bc77a70d8442f61065a0e66d3828765262af60bfa00cc9cb7420cef2d6ad12ec90887453023e5de31ca7e68cff9b1403b5b699e3f79709e570a8f7c54d7fb356ed460be33c41851590bef6421cd19fd0d54044fc1ded8dbe1dd52413cbf5bdb6be79d1bff2af54ab517fbdb11073f8354b16f010cebf191218c1b7447a5f1b5c99aead0760ac9c486d1a912cfce69e3644563b4c1bf0c1dc61f74bb58ceaba7fa1d3d7adbeb298ae2a88f2424c4e3b2c90aee175c793128f74734f"]}, 0x100}, {&(0x7f0000001fc0)={0x20, 0x28, 0x408, 0x70bd2b, 0x25dfdbff, "", [@typed={0x8, 0x8f, @uid=r6}, @typed={0x8, 0x27, @u32=0x5}]}, 0x20}, {&(0x7f0000002000)={0x190, 0x29, 0x400, 0x70bd27, 0x25dfdbfd, "", [@generic="87b6404e50882a8722bf1bd35ad047df616fc2d5332c9a7464830053d3f0757aa0220af5b3bfdee051014c6329a6708fd217987c7a50cfb609bdb7529866b0f73f9c9a44df1dbbc9491f55771fff5c02131ade5b49ec3e0c66933357081b7a992646b7e2d888cedf24026786f014901b3c7510782c1d5b5d72e5239f8f35bb", @typed={0xc, 0x85, @str='proc\x00'}, @nested={0xf4, 0x5f, [@generic="1dbbf3c182ed95dbaed0e549bfbf4792c919648f45b0b9a0d429b6bddcadd7f84cd8db1b801ca4698cc1649e42542abbd9cccd59c34eaeb1bebd8fd9b593414ebdfb542a7b42410014900d16c3654d6ada19ea1e5ef9afbc09955858d7aa5374ece22607d0eee546eae8a892fdf5ebdb4fd913a13779a904a53273ba649193f7fd4921727a32074e32582f898eb555d43887620915b472ba91621a8e32d13ba90d9e6e5133c65e2c067a241dbe70603556ef2aef7b0fb912a79f5c3a50a8e830ea18122b2531ecec8b886ee09aa6cf5bb44c2032f31c1e2f50bf2aaf79e26e3e881cc8b505a46a7d", @typed={0x4, 0x22, @binary}, @typed={0x4, 0x38}]}]}, 0x190}, {&(0x7f00000021c0)={0xbc, 0x11, 0x128, 0x70bd2b, 0x25dfdbff, "", [@generic, @generic="534f8131176a79f64413dd04d8", @generic="e8bfc80d808f03318bb2258159447ece5084956b4e8b4d426bd6af3ea178b76ed1aff506d5a9d5f4c2de2ae67bb991ee21a12b3deb0fa48247b62e3c5debd35b888bcf455024066c598afaed6147b6e8499efb", @generic="6ae76d14a6f2d3966698954161feb8c626e82ab561fb488d5f178f16da838a77d0e0d93485f803fb5e0c95120a9cdc9daef349eae34559730b8e40c9e7eeacc37a300aef05eb6c", @typed={0x4, 0x1c}]}, 0xbc}, {&(0x7f0000002300)={0x16d0, 0x2e, 0x411, 0x70bd2b, 0x25dfdbfb, "", [@typed={0x8, 0x71, @str='\x00'}, @typed={0xc, 0x3b, @u64=0x9}, @nested={0x27c, 0x5f, [@generic="80b93cd7b8f762bc074ef37f7c49c85ffa5d35c5d66929367d930dbd1fb698f2015ff4bfb472638480d1e19c6acd2cce00671a95355f27ca70c08f0e921ca2943fc695f167bedb42b92c2c7332c24b58e91a99e69dce1f9149bd798f3ce849ef6e87a44fc245265753b1b0f667a6072ed598b988b9a46969d16d15d766ac264f77c11d1490c343a0805a413d1b21246f335b34cb45ccbb5b8dc8f2e0a4f77ebb9c99d189894223fe85", @typed={0x14, 0x60, @ipv6=@mcast2}, @typed={0x8, 0x1b, @uid=r7}, @typed={0xf0, 0x10, @binary="e7afaa02d05eaf27b2b8baa23ab7b9188342febfbe2bd4c237cf5f33cde589163b33561394957f08023c8a999cda9f24c88cf7b4112a0fce25923dde640a5158fa9caa1641132a710cf35efdde9120adb50e68b0f3d25176edc1144e615c4442293f280c3bd84e21d1df1fb2cf9fc8091ab792f09e3a94cda53bb2ee84bb8348479f6751bc3f3921a88d39c681447c7053938f2bb0ac236a4adccd78fcb05670fd8ad6da746aa8b0972f7e46ec3c727c60e5fbf49053a70a4a2584a916a22c24219712d66fed2a1c39eb305fbd4c615b4200b613fbfaf8b8789c4e682fc6c40bc1a03de3133c105fcc"}, @typed={0x8, 0x94, @ipv4=@remote}, @typed={0xc, 0x50, @u64=0x7}, @typed={0x8, 0x43, @fd=r0}, @generic="f660b88f84365657b22210c450b4455496b5313648a9a1712d35435da0fdb5d336dab66360029981ec056f4ed7f6e9384131fda72b93c7cb03f28d2afc30bebf2fc7535f6a5616921dcd82269c92d856f24b4076a559c68e111c0ee7597b3d47d0b00ce9a57917b659bf7ef072e313ccad30721470e03a6c0aec534ffc152d3c3c851f585eb378468815280a828ee13fdaa5186af955e72ab77808fc8310efb2b665bc3e48"]}, @nested={0x50, 0x58, [@generic="d997f51b5b1c5ac4689a58b8a04babe2f3ba12ffd0b2b1a65648ac1df3aa15357cf4299d85328d43b63208d836b21f354bb0106283096b90c110c29b", @typed={0x4, 0x1f}, @typed={0x8, 0x8b, @ipv4=@dev={0xac, 0x14, 0x14, 0x13}}, @typed={0x4, 0x20}]}, @generic="b4bcce", @nested={0x13d4, 0x60, [@generic="ff525391133a572674312891b51312e78b092a927e81c024989306fae6d58681ab87af531d9da7a7de72552fc9063d45d5872561544cf0da3549ff34d12d88c5e17c42b53f04548303061f7d3bf920b89549188c4c833895392827269bef09929d2a32b306668536d82f359972dee9537b7425e814ae8ef4e80ec95ecba75d18798c565ee05532dbf58dc97a218d1abc59b2e669eb3ac3569029e6ba95b12869a34c463c5ccef329922263bb10ecd34fe481739e372786881084544e3256f78e93ff80d5e6098f32d686ebd7edb11c27f08e09879edf5a65d31766061ed5faefda7e8f4987ec703efe738812f0fb7b", @generic="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", @generic="921fdaf469df2b50fe443bc49752c31b1aef93046327f7a39e6872879aee7c6494291e03b7de2cb4f0292b3a453e18b6be1c26dfc657b8b35964249f0bb2f206e7a86273558a26", @generic="f124e4af2c5cc84df5908dc3bf345dca361e69405e630a56a64a89964ae4c7e4fe51fc325a105bd12f79c238af6062f81d3628a4712e52769f9037a95dfe98db3a9074e89e83cf1a4400196d74bfdf676392ee4ad13efc046504b244d72334938650ad1e9af6691625d7f0ab29e9075b6d3cb28f7c2353d7704db54d211cf1cc35b6fd95593fefa650c2efcee3a87e84f3f61dabf05d9cd718b00e6bea3a6ad94951937487fceeee64e6f674b482b88ff0b7ea94856042f3c6b606324a1a42a90934884be2e28ecf7ba8e793724db4b9542798e636448fb927ba8aec", @typed={0xc, 0x90, @u64=0x3}, @generic="b39fc816dc566c2fa6bf46bb063a2b2bd01a5f82fa9afa8c7095302f4ee494899a99edcced9f53ac2845b67ca09306c4a17457216e69c5fc51cfeed939c62c25f00696997b59f05515c95e929816031b4957125e1a2e495834d07aaec35595e1361f5d8ad8f047800a2fb771079322cde2b66bed844b4ea06c15d6ab0de6585043b6de6ac9ab6b26d913a88137121fe591512a722a22d7b76044624ef61220df0270abbb9da9f8b42167521917583c581b420b35f8", @generic="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"]}, @typed={0x8, 0x93, @ipv4=@multicast1}]}, 0x16d0}, {&(0x7f0000003a00)={0x2c4, 0x41, 0x2e, 0x70bd2b, 0x25dfdbfd, "", [@typed={0x8, 0x63, @u32=0xfff}, @typed={0x28, 0x6a, @str='!ppp0procsystemvmnet0-proclocgroup\x00'}, @typed={0x8, 0x54, @u32=0x55f}, @typed={0x8, 0x37, @fd=r0}, @nested={0xe8, 0x93, [@generic="0a64497ad49b81addea41d090a14169eb1ca2375205c862c14002e3be27e0c8b6904065482afba47c9eb302abf06382457745d57bb35ee978d2efc8a52edaff0be8f61d7d3f25deba9ab780667f5130cd8d435faf99db6e2eef71b719ae623520ddc24634f70ab7adbec6aad25a17b5877b132a27e9393f02b69930748e900386ccf7e971b73f49019e96db3aaa016feb2e17de60c3c95847000028185385763a8e355b889b94b7305df4a6473c5afd90f53da58dc61edb1e83f587ccfeeec093029c212d5757d8518edc90662fc754eb5aaee4ddcb7c3e9", @typed={0x4, 0x5e, @str}, @typed={0x8, 0x47, @fd=r0}]}, @generic="db84987d8aad0a49f5eff92371d97e50ed5374a83a15e382e1d394115666d5540b61f111e82334911d4a62161466eb077159687e6fb989521adf78781602a710a974465a4b7298055f5a6422d00395a3476ef11d1c5c49eadd4f187b46af7a20cc9951b5591050f1a4ddeffacf0af183f7437c814f2a9a5e7537e0291b2e6737e1a4e3e4544670b80874d20e41fd615ace1b56d70af4b6a7900f", @generic="0ce264a7bb96248d962c1bd2abb0b20a59f96ec3de8a74d539a9fb120ec10f2daacaf1e54ad8a426646184b7e7cfc46e8ddf184cd4aef6096f", @generic="4d8dbc8539a48a76c16ef940504958d43dde0c15e2553ffaef61295d7b03d6889f3628bcd0b27e1b0a5ad2239b877f110803ed22c3e6faa2a13b35de9ffc15ecd23db405fd8f04e982c00a2ec8f18f83613ae963dc61fe24d3b6d4c4415e49f0d7ce1e2b5bf78eba2601c26befc68745a7365a50b5ba5c63e6b5410e8855d09980c3e55085c9c944b830a1a4697f721eb7ac51535113c39ba135d26238b46efbaef1059980d415f9179f02ad632ac89958b6edb585336d8c63"]}, 0x2c4}], 0xa, &(0x7f0000003dc0)=[@rights={0x20, 0x1, 0x1, [r0, r0, r0]}], 0x20, 0x1}, 0x48040) readv(r0, &(0x7f00000002c0)=[{&(0x7f0000cd8000)=""/1, 0x168fc9d8}], 0x1) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)) r8 = openat$ashmem(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ashmem\x00', 0x1, 0x0) openat$rfkill(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rfkill\x00', 0xc82, 0x0) r9 = openat(r8, &(0x7f0000000240)='./file0\x00', 0x0, 0x2) write$P9_RREAD(r9, &(0x7f0000000540)=ANY=[], 0x0) socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r10 = socket$alg(0x26, 0x5, 0x0) bind$alg(r10, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) r11 = accept4(r10, 0x0, &(0x7f0000000000), 0x0) setsockopt$ALG_SET_KEY(r10, 0x117, 0x1, &(0x7f0000000100)="c7da5f1a", 0x4) r12 = syz_open_procfs(0x0, &(0x7f0000000080)='pagemap\x00') sendfile(r11, r12, &(0x7f0000000040)=0x7300, 0x10000000000443) writev(r11, &(0x7f00000006c0)=[{&(0x7f0000000600), 0x60020}], 0x1) read(r11, &(0x7f00000003c0)=""/72, 0x100000104) sendmsg$xdp(r11, &(0x7f0000000300)={&(0x7f0000000140), 0x10, &(0x7f0000000280)=[{&(0x7f0000000180)="9d", 0x1}], 0x1}, 0x0) openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x2000, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400204) [ 988.614382] hfs: unable to parse mount options 03:11:40 executing program 3: socket$packet(0x11, 0xa, 0x300) syz_emit_ethernet(0x4e, &(0x7f0000000080)={@local, @broadcast, [{}], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x0, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, &(0x7f00000002c0)) 03:11:40 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x40000, &(0x7f00000003c0), 0x0, &(0x7f0000000580)={[{@session={'session'}}]}) 03:11:40 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000040)="153f6234488dd25d766070") socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup2(r2, r2) sendmsg$netlink(r3, &(0x7f0000028fc8)={0x0, 0x0, &(0x7f0000019000), 0x0, &(0x7f0000000040)=[@rights={0x18, 0x1, 0x1, [r1]}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000000b80)=[{{&(0x7f0000000200)=@l2, 0x80, &(0x7f00000005c0), 0x0, &(0x7f0000000600)=""/84, 0x54}}, {{&(0x7f0000000680)=@l2, 0x80, &(0x7f0000000a40), 0x0, &(0x7f0000000ac0)=""/147, 0x93, 0x6b6b6b00}}], 0x4000000000002ce, 0x62, 0x0) [ 988.879799] hfs: unable to parse mount options 03:11:40 executing program 3: socket$packet(0x11, 0xa, 0x300) syz_emit_ethernet(0x4e, &(0x7f0000000080)={@local, @broadcast, [{}], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x0, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x34000]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, &(0x7f00000002c0)) 03:11:40 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000040)="153f6234488dd25d766070") socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup2(r2, r2) sendmsg$netlink(r3, &(0x7f0000028fc8)={0x0, 0x0, &(0x7f0000019000), 0x0, &(0x7f0000000040)=[@rights={0x18, 0x1, 0x1, [r1]}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000000b80)=[{{&(0x7f0000000200)=@l2, 0x80, &(0x7f00000005c0), 0x0, &(0x7f0000000600)=""/84, 0x54}}, {{&(0x7f0000000680)=@l2, 0x80, &(0x7f0000000a40), 0x0, &(0x7f0000000ac0)=""/147, 0x93, 0x4000000000000}}], 0x4000000000002ce, 0x62, 0x0) 03:11:40 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x4000000, &(0x7f00000003c0), 0x0, &(0x7f0000000580)={[{@session={'session'}}]}) [ 989.139647] hfs: unable to parse mount options [ 989.331199] hfs: unable to parse mount options 03:11:40 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e23}, 0x1c) listen(r0, 0x18) r1 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f0000000000)=[@in={0x2, 0x4e23, @dev={0xac, 0xffe0, 0x14, 0xc}}, @in={0x2, 0x4e23, @local}], 0x20) 03:11:40 executing program 3: socket$packet(0x11, 0xa, 0x300) syz_emit_ethernet(0x4e, &(0x7f0000000080)={@local, @broadcast, [{}], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x0, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x89060000]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, &(0x7f00000002c0)) 03:11:40 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000040)="153f6234488dd25d766070") socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup2(r2, r2) sendmsg$netlink(r3, &(0x7f0000028fc8)={0x0, 0x0, &(0x7f0000019000), 0x0, &(0x7f0000000040)=[@rights={0x18, 0x1, 0x1, [r1]}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000000b80)=[{{&(0x7f0000000200)=@l2, 0x80, &(0x7f00000005c0), 0x0, &(0x7f0000000600)=""/84, 0x54}}, {{&(0x7f0000000680)=@l2, 0x80, &(0x7f0000000a40), 0x0, &(0x7f0000000ac0)=""/147, 0x93, 0x8000000000000000}}], 0x4000000000002ce, 0x62, 0x0) 03:11:40 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x48, &(0x7f00000003c0), 0x0, &(0x7f0000000580)={[{@session={'session'}}]}) 03:11:40 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x20000000, &(0x7f00000003c0), 0x0, &(0x7f0000000580)={[{@session={'session'}}]}) [ 989.563705] hfs: unable to parse mount options [ 989.665766] hfs: unable to parse mount options 03:11:41 executing program 1: r0 = syz_open_dev$binder(&(0x7f0000001000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r0, 0x40046207, 0x0) r1 = syz_open_dev$binder(&(0x7f0000000180)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000012000)={0x8, 0x0, &(0x7f0000005fd4)=[@acquire], 0x0, 0x0, &(0x7f0000012fc7)}) close(r0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000008fd0)={0x8, 0x0, &(0x7f000000dff8)=[@release={0x400c630e}], 0x0, 0x0, &(0x7f0000000f4d)}) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f000000dfd0)={0x4, 0x0, &(0x7f0000000080)=[@enter_looper], 0xaf14113f02c18c41, 0x0, &(0x7f0000000680)}) dup(r1) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000040)={0x10, 0x0, &(0x7f00000000c0)=[@clear_death], 0x0, 0x0, &(0x7f00000001c0)}) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f00000005c0)={0xc, 0x0, &(0x7f0000000000)=[@dead_binder_done], 0x0, 0xfffffdfd, &(0x7f0000000540)}) socket$vsock_dgram(0x28, 0x2, 0x0) 03:11:41 executing program 3: socket$packet(0x11, 0xa, 0x300) syz_emit_ethernet(0x4e, &(0x7f0000000080)={@local, @broadcast, [{}], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x0, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2c]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, &(0x7f00000002c0)) 03:11:41 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000040)="153f6234488dd25d766070") socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup2(r2, r2) sendmsg$netlink(r3, &(0x7f0000028fc8)={0x0, 0x0, &(0x7f0000019000), 0x0, &(0x7f0000000040)=[@rights={0x18, 0x1, 0x1, [r1]}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000000b80)=[{{&(0x7f0000000200)=@l2, 0x80, &(0x7f00000005c0), 0x0, &(0x7f0000000600)=""/84, 0x54}}, {{&(0x7f0000000680)=@l2, 0x80, &(0x7f0000000a40), 0x0, &(0x7f0000000ac0)=""/147, 0x93, 0x3f000000}}], 0x4000000000002ce, 0x62, 0x0) 03:11:41 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x68, &(0x7f00000003c0), 0x0, &(0x7f0000000580)={[{@session={'session'}}]}) [ 989.796587] hfs: unable to parse mount options 03:11:41 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000040)="153f6234488dd25d766070") socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup2(r2, r2) sendmsg$netlink(r3, &(0x7f0000028fc8)={0x0, 0x0, &(0x7f0000019000), 0x0, &(0x7f0000000040)=[@rights={0x18, 0x1, 0x1, [r1]}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000000b80)=[{{&(0x7f0000000200)=@l2, 0x80, &(0x7f00000005c0), 0x0, &(0x7f0000000600)=""/84, 0x54}}, {{&(0x7f0000000680)=@l2, 0x80, &(0x7f0000000a40), 0x0, &(0x7f0000000ac0)=""/147, 0x93, 0x6}}], 0x4000000000002ce, 0x62, 0x0) [ 989.902975] hfs: unable to parse mount options 03:11:41 executing program 3: socket$packet(0x11, 0xa, 0x300) syz_emit_ethernet(0x4e, &(0x7f0000000080)={@local, @broadcast, [{}], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x0, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x60000000]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, &(0x7f00000002c0)) 03:11:41 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0xffffff7f, &(0x7f00000003c0), 0x0, &(0x7f0000000580)={[{@session={'session'}}]}) [ 989.988782] hfs: unable to parse mount options [ 990.044407] binder: 24255:24257 BC_CLEAR_DEATH_NOTIFICATION invalid ref 0 [ 990.056257] binder: 24255:24257 BC_DEAD_BINDER_DONE 0000000000000000 not found [ 990.199152] hfs: unable to parse mount options 03:11:41 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e23}, 0x1c) listen(r0, 0x18) r1 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f0000000000)=[@in={0x2, 0x4e23, @dev={0xac, 0x14c, 0x14, 0xc}}, @in={0x2, 0x4e23, @local}], 0x20) 03:11:41 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x4000000, &(0x7f00000003c0), 0x0, &(0x7f0000000580)={[{@session={'session'}}]}) 03:11:41 executing program 3: socket$packet(0x11, 0xa, 0x300) syz_emit_ethernet(0x4e, &(0x7f0000000080)={@local, @broadcast, [{}], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x0, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc000000]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, &(0x7f00000002c0)) 03:11:41 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000040)="153f6234488dd25d766070") socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup2(r2, r2) sendmsg$netlink(r3, &(0x7f0000028fc8)={0x0, 0x0, &(0x7f0000019000), 0x0, &(0x7f0000000040)=[@rights={0x18, 0x1, 0x1, [r1]}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000000b80)=[{{&(0x7f0000000200)=@l2, 0x80, &(0x7f00000005c0), 0x0, &(0x7f0000000600)=""/84, 0x54}}, {{&(0x7f0000000680)=@l2, 0x80, &(0x7f0000000a40), 0x0, &(0x7f0000000ac0)=""/147, 0x93, 0x900000000000000}}], 0x4000000000002ce, 0x62, 0x0) 03:11:41 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x68, &(0x7f00000003c0), 0x0, &(0x7f0000000580)={[{@session={'session'}}]}) [ 990.433044] hfs: unable to parse mount options [ 990.561728] hfs: unable to parse mount options 03:11:42 executing program 1: r0 = semget$private(0x0, 0x20000000102, 0x0) semop(r0, &(0x7f0000000100)=[{0x0, 0xfffffffffffefffc}], 0x1) semop(r0, &(0x7f00000001c0)=[{0x3, 0x0, 0xfffffffffffffffd}, {0x0, 0xffffffff, 0xfffffffffffffffc}], 0x2a7) semtimedop(r0, &(0x7f0000000040)=[{0x1, 0x9}], 0x1, &(0x7f00000000c0)) 03:11:42 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x8cffffff00000000, &(0x7f00000003c0), 0x0, &(0x7f0000000580)={[{@session={'session'}}]}) 03:11:42 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000040)="153f6234488dd25d766070") socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup2(r2, r2) sendmsg$netlink(r3, &(0x7f0000028fc8)={0x0, 0x0, &(0x7f0000019000), 0x0, &(0x7f0000000040)=[@rights={0x18, 0x1, 0x1, [r1]}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000000b80)=[{{&(0x7f0000000200)=@l2, 0x80, &(0x7f00000005c0), 0x0, &(0x7f0000000600)=""/84, 0x54}}, {{&(0x7f0000000680)=@l2, 0x80, &(0x7f0000000a40), 0x0, &(0x7f0000000ac0)=""/147, 0x93, 0x4000000}}], 0x4000000000002ce, 0x62, 0x0) 03:11:42 executing program 3: socket$packet(0x11, 0xa, 0x300) syz_emit_ethernet(0x4e, &(0x7f0000000080)={@local, @broadcast, [{}], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x0, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x29000000]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, &(0x7f00000002c0)) 03:11:42 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x2, &(0x7f00000003c0), 0x0, &(0x7f0000000580)={[{@session={'session'}}]}) [ 990.747748] binder: BINDER_SET_CONTEXT_MGR already set [ 990.753616] binder: 24255:24257 ioctl 40046207 0 returned -16 [ 990.760414] binder: 24255:24308 unknown command 536872576 [ 990.766921] binder: 24255:24310 BC_CLEAR_DEATH_NOTIFICATION death notification not active [ 990.776392] binder: 24255:24308 ioctl c0306201 20008fd0 returned -22 [ 990.783045] binder: 24255:24257 BC_DEAD_BINDER_DONE 0000000000000000 not found [ 990.877348] hfs: invalid session number or type of track [ 990.897088] hfs: can't find a HFS filesystem on dev loop2 03:11:42 executing program 3: socket$packet(0x11, 0xa, 0x300) syz_emit_ethernet(0x4e, &(0x7f0000000080)={@local, @broadcast, [{}], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x0, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c00]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, &(0x7f00000002c0)) [ 990.992771] hfs: invalid session number or type of track [ 991.011576] hfs: can't find a HFS filesystem on dev loop2 03:11:42 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000040)="153f6234488dd25d766070") socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup2(r2, r2) sendmsg$netlink(r3, &(0x7f0000028fc8)={0x0, 0x0, &(0x7f0000019000), 0x0, &(0x7f0000000040)=[@rights={0x18, 0x1, 0x1, [r1]}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000000b80)=[{{&(0x7f0000000200)=@l2, 0x80, &(0x7f00000005c0), 0x0, &(0x7f0000000600)=""/84, 0x54}}, {{&(0x7f0000000680)=@l2, 0x80, &(0x7f0000000a40), 0x0, &(0x7f0000000ac0)=""/147, 0x93, 0x40000}}], 0x4000000000002ce, 0x62, 0x0) [ 991.091886] hfs: unable to parse mount options 03:11:42 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e23}, 0x1c) listen(r0, 0x18) r1 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f0000000000)=[@in={0x2, 0x4e23, @dev={0xac, 0xffffffffffffffe0, 0x14, 0xc}}, @in={0x2, 0x4e23, @local}], 0x20) 03:11:42 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x200000000000000, &(0x7f00000003c0), 0x0, &(0x7f0000000580)={[{@session={'session'}}]}) 03:11:42 executing program 3: socket$packet(0x11, 0xa, 0x300) syz_emit_ethernet(0x4e, &(0x7f0000000080)={@local, @broadcast, [{}], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x0, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x543]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, &(0x7f00000002c0)) 03:11:42 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000040)="153f6234488dd25d766070") socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup2(r2, r2) sendmsg$netlink(r3, &(0x7f0000028fc8)={0x0, 0x0, &(0x7f0000019000), 0x0, &(0x7f0000000040)=[@rights={0x18, 0x1, 0x1, [r1]}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000000b80)=[{{&(0x7f0000000200)=@l2, 0x80, &(0x7f00000005c0), 0x0, &(0x7f0000000600)=""/84, 0x54}}, {{&(0x7f0000000680)=@l2, 0x80, &(0x7f0000000a40), 0x0, &(0x7f0000000ac0)=""/147, 0x93, 0x8}}], 0x4000000000002ce, 0x62, 0x0) 03:11:42 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x6b6b6b, &(0x7f00000003c0), 0x0, &(0x7f0000000580)={[{@session={'session'}}]}) [ 991.501979] hfs: unable to parse mount options [ 991.541784] hfs: unable to parse mount options 03:11:43 executing program 1: r0 = socket$inet6(0xa, 0x5, 0x0) r1 = syz_open_dev$amidi(&(0x7f0000000000)='/dev/amidi#\x00', 0x8, 0x400) ioctl$KVM_GET_EMULATED_CPUID(r1, 0xc008ae09, &(0x7f0000000040)=""/90) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") 03:11:43 executing program 3: socket$packet(0x11, 0xa, 0x300) syz_emit_ethernet(0x4e, &(0x7f0000000080)={@local, @broadcast, [{}], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x0, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x88caffff]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, &(0x7f00000002c0)) 03:11:43 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000040)="153f6234488dd25d766070") socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup2(r2, r2) sendmsg$netlink(r3, &(0x7f0000028fc8)={0x0, 0x0, &(0x7f0000019000), 0x0, &(0x7f0000000040)=[@rights={0x18, 0x1, 0x1, [r1]}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000000b80)=[{{&(0x7f0000000200)=@l2, 0x80, &(0x7f00000005c0), 0x0, &(0x7f0000000600)=""/84, 0x54}}, {{&(0x7f0000000680)=@l2, 0x80, &(0x7f0000000a40), 0x0, &(0x7f0000000ac0)=""/147, 0x93, 0x3f00000000000000}}], 0x4000000000002ce, 0x62, 0x0) 03:11:43 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0xffff1f0000000000, &(0x7f00000003c0), 0x0, &(0x7f0000000580)={[{@session={'session'}}]}) 03:11:43 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x700, &(0x7f00000003c0), 0x0, &(0x7f0000000580)={[{@session={'session'}}]}) 03:11:43 executing program 1: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rt_sigaction(0x0, &(0x7f0000000000)={&(0x7f0000000000), {}, 0x48000002}, &(0x7f0000000080)={&(0x7f0000000200)="c403517d1cc92c"}, 0x8, &(0x7f00000003c0)) r0 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000280)) remap_file_pages(&(0x7f0000ff4000/0x1000)=nil, 0x1000, 0x0, 0x0, 0x0) socket$inet6(0xa, 0x0, 0xffff) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000280)) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KDADDIO(r0, 0x4b34, 0x7) recvmmsg(0xffffffffffffffff, &(0x7f0000002b80)=[{{&(0x7f0000000100)=@hci, 0x80, &(0x7f0000000180)}}], 0x1, 0x0, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='attr/keycreate\x00') mmap(&(0x7f0000ff2000/0x3000)=nil, 0x3000, 0x8, 0x810, r0, 0x0) pwritev(r1, &(0x7f0000001400), 0x2a6, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000080)=@in6={0xa, 0x0, 0x0, @mcast2}, 0x80, &(0x7f0000000000), 0x0, &(0x7f0000000880)}, 0x0) ioctl$RTC_IRQP_READ(0xffffffffffffffff, 0x8008700b, &(0x7f0000000100)) socket$inet6(0xa, 0x0, 0x0) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000280)) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vhost-vsock\x00', 0x2, 0x0) [ 991.899660] hfs: unable to parse mount options 03:11:43 executing program 3: socket$packet(0x11, 0xa, 0x300) syz_emit_ethernet(0x4e, &(0x7f0000000080)={@local, @broadcast, [{}], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x0, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6000000000000000]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, &(0x7f00000002c0)) [ 991.986843] hfs: unable to parse mount options [ 992.065910] audit: type=1400 audit(1539659503.505:167): avc: denied { map } for pid=24396 comm="syz-executor1" path="/root/syzkaller-testdir440219986/syzkaller.HCCNbN/1796/file0" dev="sda1" ino=17704 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:object_r:user_home_t:s0 tclass=file permissive=1 [ 992.194729] audit: type=1400 audit(1539659503.545:168): avc: denied { create } for pid=24396 comm="syz-executor1" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:unlabeled_t:s0 tclass=key permissive=1 03:11:43 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e23}, 0x1c) listen(r0, 0x18) r1 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f0000000000)=[@in={0x2, 0x4e23, @dev={0xac, 0x18, 0x14, 0xc}}, @in={0x2, 0x4e23, @local}], 0x20) 03:11:43 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000040)="153f6234488dd25d766070") socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup2(r2, r2) sendmsg$netlink(r3, &(0x7f0000028fc8)={0x0, 0x0, &(0x7f0000019000), 0x0, &(0x7f0000000040)=[@rights={0x18, 0x1, 0x1, [r1]}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000000b80)=[{{&(0x7f0000000200)=@l2, 0x80, &(0x7f00000005c0), 0x0, &(0x7f0000000600)=""/84, 0x54}}, {{&(0x7f0000000680)=@l2, 0x80, &(0x7f0000000a40), 0x0, &(0x7f0000000ac0)=""/147, 0x93, 0x600000000000000}}], 0x4000000000002ce, 0x62, 0x0) 03:11:43 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x7a00, &(0x7f00000003c0), 0x0, &(0x7f0000000580)={[{@session={'session'}}]}) 03:11:43 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x4000000000000, &(0x7f00000003c0), 0x0, &(0x7f0000000580)={[{@session={'session'}}]}) 03:11:43 executing program 3: socket$packet(0x11, 0xa, 0x300) syz_emit_ethernet(0x4e, &(0x7f0000000080)={@local, @broadcast, [{}], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x0, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, &(0x7f00000002c0)) 03:11:43 executing program 1: r0 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/enforce\x00', 0x420942, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(r0, 0x84, 0x1e, &(0x7f00000000c0)=0x1, 0x4) ioctl$sock_bt_hidp_HIDPCONNDEL(0xffffffffffffffff, 0x400448c9, &(0x7f00000002c0)={{0x5, 0x0, 0x59a}, 0x48f3c70e}) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x26e1, 0x0) writev(r1, &(0x7f00000000c0), 0x1000000000000278) r2 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r2, 0x8912, &(0x7f0000000040)="0a5cc80700315f85715070") 03:11:43 executing program 3: socket$packet(0x11, 0xa, 0x300) syz_emit_ethernet(0x4e, &(0x7f0000000080)={@local, @broadcast, [{}], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x0, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4888]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, &(0x7f00000002c0)) 03:11:44 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000040)="153f6234488dd25d766070") socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup2(r2, r2) sendmsg$netlink(r3, &(0x7f0000028fc8)={0x0, 0x0, &(0x7f0000019000), 0x0, &(0x7f0000000040)=[@rights={0x18, 0x1, 0x1, [r1]}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000000b80)=[{{&(0x7f0000000200)=@l2, 0x80, &(0x7f00000005c0), 0x0, &(0x7f0000000600)=""/84, 0x54}}, {{&(0x7f0000000680)=@l2, 0x80, &(0x7f0000000a40), 0x0, &(0x7f0000000ac0)=""/147, 0x93, 0x1000000000000}}], 0x4000000000002ce, 0x62, 0x0) [ 992.559804] hfs: unable to parse mount options [ 992.660656] hfs: unable to parse mount options 03:11:44 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = socket$inet6(0xa, 0x80003, 0x1) ioctl(r2, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") unshare(0x4000400) ioctl$KVM_SET_PIT(r1, 0xc048ae65, &(0x7f0000000400)) 03:11:44 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x74000000, &(0x7f00000003c0), 0x0, &(0x7f0000000580)={[{@session={'session'}}]}) 03:11:44 executing program 3: socket$packet(0x11, 0xa, 0x300) syz_emit_ethernet(0x4e, &(0x7f0000000080)={@local, @broadcast, [{}], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x0, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2b00000000000000]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, &(0x7f00000002c0)) 03:11:44 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x6c00, &(0x7f00000003c0), 0x0, &(0x7f0000000580)={[{@session={'session'}}]}) [ 992.963350] hfs: unable to parse mount options 03:11:44 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e23}, 0x1c) listen(r0, 0x18) r1 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f0000000000)=[@in={0x2, 0x4e23, @dev={0xac, 0xc0, 0x14, 0xc}}, @in={0x2, 0x4e23, @local}], 0x20) 03:11:44 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000040)="153f6234488dd25d766070") socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup2(r2, r2) sendmsg$netlink(r3, &(0x7f0000028fc8)={0x0, 0x0, &(0x7f0000019000), 0x0, &(0x7f0000000040)=[@rights={0x18, 0x1, 0x1, [r1]}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000000b80)=[{{&(0x7f0000000200)=@l2, 0x80, &(0x7f00000005c0), 0x0, &(0x7f0000000600)=""/84, 0x54}}, {{&(0x7f0000000680)=@l2, 0x80, &(0x7f0000000a40), 0x0, &(0x7f0000000ac0)=""/147, 0x93, 0x9000000}}], 0x4000000000002ce, 0x62, 0x0) 03:11:44 executing program 3: socket$packet(0x11, 0xa, 0x300) syz_emit_ethernet(0x4e, &(0x7f0000000080)={@local, @broadcast, [{}], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x0, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800e0000]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, &(0x7f00000002c0)) [ 993.163808] hfs: unable to parse mount options 03:11:44 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000d80)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) read(r0, &(0x7f0000000100)=""/11, 0x3bd) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x101c02, 0x0) ioctl$VT_RELDISP(r2, 0x5605) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000200)=0x3) r3 = epoll_create1(0x0) r4 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r3, 0x1, r0, &(0x7f0000000040)) r5 = syz_open_pts(r0, 0x0) close(r3) dup2(r4, r5) 03:11:44 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x2c00, &(0x7f00000003c0), 0x0, &(0x7f0000000580)={[{@session={'session'}}]}) 03:11:44 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x7, &(0x7f00000003c0), 0x0, &(0x7f0000000580)={[{@session={'session'}}]}) 03:11:44 executing program 3: socket$packet(0x11, 0xa, 0x300) syz_emit_ethernet(0x4e, &(0x7f0000000080)={@local, @broadcast, [{}], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x0, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5000000]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, &(0x7f00000002c0)) 03:11:44 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000040)="153f6234488dd25d766070") socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup2(r2, r2) sendmsg$netlink(r3, &(0x7f0000028fc8)={0x0, 0x0, &(0x7f0000019000), 0x0, &(0x7f0000000040)=[@rights={0x18, 0x1, 0x1, [r1]}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000000b80)=[{{&(0x7f0000000200)=@l2, 0x80, &(0x7f00000005c0), 0x0, &(0x7f0000000600)=""/84, 0x54}}, {{&(0x7f0000000680)=@l2, 0x80, &(0x7f0000000a40), 0x0, &(0x7f0000000ac0)=""/147, 0x93, 0x7}}], 0x4000000000002ce, 0x62, 0x0) [ 993.449060] hfs: unable to parse mount options 03:11:44 executing program 3: socket$packet(0x11, 0xa, 0x300) syz_emit_ethernet(0x4e, &(0x7f0000000080)={@local, @broadcast, [{}], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x0, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800e]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, &(0x7f00000002c0)) [ 993.473873] hfs: invalid session number or type of track [ 993.496518] hfs: can't find a HFS filesystem on dev loop4 03:11:45 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f00000003c0), 0x600000000000000, &(0x7f0000000580)={[{@session={'session'}}]}) 03:11:45 executing program 1: r0 = socket$inet_smc(0x2b, 0x1, 0x0) lseek(r0, 0x0, 0x3) r1 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) getsockopt$inet_sctp_SCTP_GET_PEER_ADDRS(r1, 0x84, 0x6c, &(0x7f0000000440)=ANY=[@ANYRES32=0x0, @ANYBLOB="b9000000b9483c40a64a649401750c98e3e898a31f78466361c09d1386b8388ed99f8bf874f173938d58813ead2ae9f6c15d0e79fceef645a5fb625bfbfc50ebd671fb76d822a2678be7f2361d3042dfeb2ebe1efd47a8324fd333a8186fc2809c2bdf1927caf3dc60775f54e1b9a9877bf0606312416d702401fe81befcedde6b2182aab9f9c39813cd286694bd12be2c3bd0d79181715d454cd7212ba0b7af9db29501c0b40a135f923fb8ce23947316cdf0a2c65f3d12000000000056120959500f4d9ef6156a371c912a"], &(0x7f0000000000)=0xc1) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r1, 0x84, 0x6, &(0x7f0000000600)={r2, @in6={{0xa, 0x4e23, 0x800, @remote, 0xf4}}}, &(0x7f0000000140)=0x53a) ioctl$EVIOCGPROP(r1, 0x80404509, &(0x7f0000000100)=""/16) ioctl$EVIOCGSND(r1, 0x8040451a, &(0x7f00000001c0)=""/98) ioctl$KVM_SET_ONE_REG(0xffffffffffffffff, 0x4010aeac, &(0x7f0000000040)={0x1, 0x2}) fstatfs(0xffffffffffffffff, &(0x7f0000000180)=""/13) r3 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r3, &(0x7f00000002c0)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000280)={0x2, 0x18, 0x0, 0x0, 0x2, 0x0, 0x0, 0xfffffffffffffffc}, 0x10}}, 0x0) [ 993.585990] hfs: invalid session number or type of track [ 993.612891] hfs: can't find a HFS filesystem on dev loop4 03:11:45 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0xf703000000000000, &(0x7f00000003c0), 0x0, &(0x7f0000000580)={[{@session={'session'}}]}) [ 993.994915] hfs: unable to parse mount options 03:11:45 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e23}, 0x1c) listen(r0, 0x18) r1 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f0000000000)=[@in={0x2, 0x4e23, @dev={0xac, 0x328, 0x14, 0xc}}, @in={0x2, 0x4e23, @local}], 0x20) 03:11:45 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000040)="153f6234488dd25d766070") socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup2(r2, r2) sendmsg$netlink(r3, &(0x7f0000028fc8)={0x0, 0x0, &(0x7f0000019000), 0x0, &(0x7f0000000040)=[@rights={0x18, 0x1, 0x1, [r1]}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000000b80)=[{{&(0x7f0000000200)=@l2, 0x80, &(0x7f00000005c0), 0x0, &(0x7f0000000600)=""/84, 0x54}}, {{&(0x7f0000000680)=@l2, 0x80, &(0x7f0000000a40), 0x0, &(0x7f0000000ac0)=""/147, 0x93, 0x4}}], 0x4000000000002ce, 0x62, 0x0) 03:11:45 executing program 3: socket$packet(0x11, 0xa, 0x300) syz_emit_ethernet(0x4e, &(0x7f0000000080)={@local, @broadcast, [{}], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x0, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffdd86]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, &(0x7f00000002c0)) 03:11:45 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00003e0000)='/dev/ptmx\x00', 0x0, 0x0) r1 = syz_open_pts(r0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000100)=0x1) r2 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x280, 0x0) ioctl$KVM_GET_XSAVE(r2, 0x9000aea4, &(0x7f0000000140)) ioctl$TCSETS(r1, 0x5412, &(0x7f0000000040)) 03:11:45 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f00000003c0), 0xe, &(0x7f0000000580)={[{@session={'session'}}]}) [ 994.080122] hfs: unable to parse mount options 03:11:45 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x48000000, &(0x7f00000003c0), 0x0, &(0x7f0000000580)={[{@session={'session'}}]}) 03:11:45 executing program 1: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x1012, r0, 0x0) write$P9_RWALK(r0, &(0x7f0000000080)=ANY=[@ANYBLOB="64c5"], 0x2) write$binfmt_misc(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB='sqQ'], 0x3) perf_event_open(&(0x7f0000000180)={0x6, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TIOCSWINSZ(r0, 0x5414, &(0x7f0000000140)={0x7ffffffc, 0x0, 0x5, 0x5}) [ 994.194433] hfs: invalid session number or type of track [ 994.216480] hfs: can't find a HFS filesystem on dev loop2 03:11:45 executing program 3: socket$packet(0x11, 0xa, 0x300) syz_emit_ethernet(0x4e, &(0x7f0000000080)={@local, @broadcast, [{}], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x0, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2900000000000000]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, &(0x7f00000002c0)) [ 994.300176] hfs: invalid session number or type of track [ 994.322448] hfs: can't find a HFS filesystem on dev loop2 03:11:45 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000040)="153f6234488dd25d766070") socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup2(r2, r2) sendmsg$netlink(r3, &(0x7f0000028fc8)={0x0, 0x0, &(0x7f0000019000), 0x0, &(0x7f0000000040)=[@rights={0x18, 0x1, 0x1, [r1]}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000000b80)=[{{&(0x7f0000000200)=@l2, 0x80, &(0x7f00000005c0), 0x0, &(0x7f0000000600)=""/84, 0x54}}, {{&(0x7f0000000680)=@l2, 0x80, &(0x7f0000000a40), 0x0, &(0x7f0000000ac0)=""/147, 0x93, 0x400000000000000}}], 0x4000000000002ce, 0x62, 0x0) 03:11:45 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f00000003c0), 0x8cffffff00000000, &(0x7f0000000580)={[{@session={'session'}}]}) [ 994.458887] hfs: unable to parse mount options 03:11:45 executing program 3: socket$packet(0x11, 0xa, 0x300) syz_emit_ethernet(0x4e, &(0x7f0000000080)={@local, @broadcast, [{}], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x0, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c00000000000000]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, &(0x7f00000002c0)) 03:11:46 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x230400, 0x0) bind$inet(r0, &(0x7f0000deb000)={0x2, 0x3, @broadcast}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f00006dc000)=[{0x6, 0x0, 0x0, 0xa1}]}, 0x10) sendto$inet(r0, &(0x7f00000001c0), 0x0, 0x200007ff, &(0x7f0000deaff0)={0x2, 0x3, @loopback}, 0x10) sendto$inet(r0, &(0x7f00000002c0)="20d6dac772b6f65cc7c3fc9bf8d917fbd5bd28cd6ad9243ec3c3fc41fe4295b32b630b3e888a8d0eb1abd9d081c0c6655507c293ed17dcc8e25f2cb85d0e732ff34d9f574cdd31597a5e3a688fff4a8f31474711e4b8f7ab05068770f885c03286fadc1d0fd02098bd981aaf152f2da86443cc605a5cb9a63475b63d354cb1f158bd", 0x82, 0x800000000001, &(0x7f0000000140)={0x2, 0x0, @dev}, 0x10) write$binfmt_elf32(r0, &(0x7f00000005c0)=ANY=[], 0x7cd) recvfrom$llc(r1, &(0x7f0000000380)=""/123, 0x7b, 0x60, &(0x7f0000000100)={0x1a, 0x0, 0x2f, 0x0, 0xffffffffffffff01, 0x0, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x1}}, 0x10) sendto$inet(r0, &(0x7f0000000580)="89", 0x1, 0x0, &(0x7f0000000000)={0x2, 0x0, @multicast2}, 0x10) recvfrom(r0, &(0x7f0000000480)=""/239, 0xfffffffffffffe21, 0x0, 0x0, 0x0) recvfrom(r0, &(0x7f0000000180)=""/251, 0xfb, 0x0, &(0x7f0000000080)=@pppol2tp, 0x80) close(r0) 03:11:46 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e23}, 0x1c) listen(r0, 0x18) r1 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f0000000000)=[@in={0x2, 0x4e23, @dev={0xac, 0xffffffe0, 0x14, 0xc}}, @in={0x2, 0x4e23, @local}], 0x20) 03:11:46 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000040)="153f6234488dd25d766070") socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup2(r2, r2) sendmsg$netlink(r3, &(0x7f0000028fc8)={0x0, 0x0, &(0x7f0000019000), 0x0, &(0x7f0000000040)=[@rights={0x18, 0x1, 0x1, [r1]}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000000b80)=[{{&(0x7f0000000200)=@l2, 0x80, &(0x7f00000005c0), 0x0, &(0x7f0000000600)=""/84, 0x54}}, {{&(0x7f0000000680)=@l2, 0x80, &(0x7f0000000a40), 0x0, &(0x7f0000000ac0)=""/147, 0x93, 0x6b6b6b00000000}}], 0x4000000000002ce, 0x62, 0x0) 03:11:46 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0xe, &(0x7f00000003c0), 0x0, &(0x7f0000000580)={[{@session={'session'}}]}) 03:11:46 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f00000003c0), 0x6b6b6b, &(0x7f0000000580)={[{@session={'session'}}]}) 03:11:46 executing program 3: socket$packet(0x11, 0xa, 0x300) syz_emit_ethernet(0x4e, &(0x7f0000000080)={@local, @broadcast, [{}], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x0, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2b000000]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, &(0x7f00000002c0)) 03:11:46 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x230400, 0x0) bind$inet(r0, &(0x7f0000deb000)={0x2, 0x3, @broadcast}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f00006dc000)=[{0x6, 0x0, 0x0, 0xa1}]}, 0x10) sendto$inet(r0, &(0x7f00000001c0), 0x0, 0x200007ff, &(0x7f0000deaff0)={0x2, 0x3, @loopback}, 0x10) sendto$inet(r0, &(0x7f00000002c0)="20d6dac772b6f65cc7c3fc9bf8d917fbd5bd28cd6ad9243ec3c3fc41fe4295b32b630b3e888a8d0eb1abd9d081c0c6655507c293ed17dcc8e25f2cb85d0e732ff34d9f574cdd31597a5e3a688fff4a8f31474711e4b8f7ab05068770f885c03286fadc1d0fd02098bd981aaf152f2da86443cc605a5cb9a63475b63d354cb1f158bd", 0x82, 0x800000000001, &(0x7f0000000140)={0x2, 0x0, @dev}, 0x10) write$binfmt_elf32(r0, &(0x7f00000005c0)=ANY=[], 0x7cd) recvfrom$llc(r1, &(0x7f0000000380)=""/123, 0x7b, 0x60, &(0x7f0000000100)={0x1a, 0x0, 0x2f, 0x0, 0xffffffffffffff01, 0x0, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x1}}, 0x10) sendto$inet(r0, &(0x7f0000000580)="89", 0x1, 0x0, &(0x7f0000000000)={0x2, 0x0, @multicast2}, 0x10) recvfrom(r0, &(0x7f0000000480)=""/239, 0xfffffffffffffe21, 0x0, 0x0, 0x0) recvfrom(r0, &(0x7f0000000180)=""/251, 0xfb, 0x0, &(0x7f0000000080)=@pppol2tp, 0x80) close(r0) [ 995.061038] hfs: invalid session number or type of track [ 995.089066] hfs: can't find a HFS filesystem on dev loop4 03:11:46 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000040)="153f6234488dd25d766070") socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup2(r2, r2) sendmsg$netlink(r3, &(0x7f0000028fc8)={0x0, 0x0, &(0x7f0000019000), 0x0, &(0x7f0000000040)=[@rights={0x18, 0x1, 0x1, [r1]}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000000b80)=[{{&(0x7f0000000200)=@l2, 0x80, &(0x7f00000005c0), 0x0, &(0x7f0000000600)=""/84, 0x54}}, {{&(0x7f0000000680)=@l2, 0x80, &(0x7f0000000a40), 0x0, &(0x7f0000000ac0)=""/147, 0x93, 0x7000000}}], 0x4000000000002ce, 0x62, 0x0) 03:11:46 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f00000003c0), 0x4000000000000, &(0x7f0000000580)={[{@session={'session'}}]}) 03:11:46 executing program 3: socket$packet(0x11, 0xa, 0x300) syz_emit_ethernet(0x4e, &(0x7f0000000080)={@local, @broadcast, [{}], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x0, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6000]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, &(0x7f00000002c0)) [ 995.202759] hfs: invalid session number or type of track [ 995.221048] hfs: can't find a HFS filesystem on dev loop4 03:11:46 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x74, &(0x7f00000003c0), 0x0, &(0x7f0000000580)={[{@session={'session'}}]}) [ 995.364182] hfs: unable to parse mount options 03:11:46 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f00000003c0), 0x1f00, &(0x7f0000000580)={[{@session={'session'}}]}) 03:11:46 executing program 3: socket$packet(0x11, 0xa, 0x300) syz_emit_ethernet(0x4e, &(0x7f0000000080)={@local, @broadcast, [{}], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x0, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x300]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, &(0x7f00000002c0)) 03:11:47 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e23}, 0x1c) listen(r0, 0x18) r1 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f0000000000)=[@in={0x2, 0x4e23, @dev={0xac, 0x14, 0x3, 0xc}}, @in={0x2, 0x4e23, @local}], 0x20) 03:11:47 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000040)="153f6234488dd25d766070") socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup2(r2, r2) sendmsg$netlink(r3, &(0x7f0000028fc8)={0x0, 0x0, &(0x7f0000019000), 0x0, &(0x7f0000000040)=[@rights={0x18, 0x1, 0x1, [r1]}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000000b80)=[{{&(0x7f0000000200)=@l2, 0x80, &(0x7f00000005c0), 0x0, &(0x7f0000000600)=""/84, 0x54}}, {{&(0x7f0000000680)=@l2, 0x80, &(0x7f0000000a40), 0x0, &(0x7f0000000ac0)=""/147, 0x93, 0x8000000}}], 0x4000000000002ce, 0x62, 0x0) 03:11:47 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0xf603000000000000, &(0x7f00000003c0), 0x0, &(0x7f0000000580)={[{@session={'session'}}]}) 03:11:47 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x230400, 0x0) bind$inet(r0, &(0x7f0000deb000)={0x2, 0x3, @broadcast}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f00006dc000)=[{0x6, 0x0, 0x0, 0xa1}]}, 0x10) sendto$inet(r0, &(0x7f00000001c0), 0x0, 0x200007ff, &(0x7f0000deaff0)={0x2, 0x3, @loopback}, 0x10) sendto$inet(r0, &(0x7f00000002c0)="20d6dac772b6f65cc7c3fc9bf8d917fbd5bd28cd6ad9243ec3c3fc41fe4295b32b630b3e888a8d0eb1abd9d081c0c6655507c293ed17dcc8e25f2cb85d0e732ff34d9f574cdd31597a5e3a688fff4a8f31474711e4b8f7ab05068770f885c03286fadc1d0fd02098bd981aaf152f2da86443cc605a5cb9a63475b63d354cb1f158bd", 0x82, 0x800000000001, &(0x7f0000000140)={0x2, 0x0, @dev}, 0x10) write$binfmt_elf32(r0, &(0x7f00000005c0)=ANY=[], 0x7cd) recvfrom$llc(r1, &(0x7f0000000380)=""/123, 0x7b, 0x60, &(0x7f0000000100)={0x1a, 0x0, 0x2f, 0x0, 0xffffffffffffff01, 0x0, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x1}}, 0x10) sendto$inet(r0, &(0x7f0000000580)="89", 0x1, 0x0, &(0x7f0000000000)={0x2, 0x0, @multicast2}, 0x10) recvfrom(r0, &(0x7f0000000480)=""/239, 0xfffffffffffffe21, 0x0, 0x0, 0x0) recvfrom(r0, &(0x7f0000000180)=""/251, 0xfb, 0x0, &(0x7f0000000080)=@pppol2tp, 0x80) close(r0) 03:11:47 executing program 3: socket$packet(0x11, 0xa, 0x300) syz_emit_ethernet(0x4e, &(0x7f0000000080)={@local, @broadcast, [{}], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x0, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd00]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, &(0x7f00000002c0)) 03:11:47 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f00000003c0), 0x770c0000, &(0x7f0000000580)={[{@session={'session'}}]}) 03:11:47 executing program 3: socket$packet(0x11, 0xa, 0x300) syz_emit_ethernet(0x4e, &(0x7f0000000080)={@local, @broadcast, [{}], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x0, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe80]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, &(0x7f00000002c0)) 03:11:47 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f00000003c0), 0xf6ffffff, &(0x7f0000000580)={[{@session={'session'}}]}) 03:11:47 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000040)="153f6234488dd25d766070") socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup2(r2, r2) sendmsg$netlink(r3, &(0x7f0000028fc8)={0x0, 0x0, &(0x7f0000019000), 0x0, &(0x7f0000000040)=[@rights={0x18, 0x1, 0x1, [r1]}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000000b80)=[{{&(0x7f0000000200)=@l2, 0x80, &(0x7f00000005c0), 0x0, &(0x7f0000000600)=""/84, 0x54}}, {{&(0x7f0000000680)=@l2, 0x80, &(0x7f0000000a40), 0x0, &(0x7f0000000ac0)=""/147, 0x93, 0x6b6b6b}}], 0x4000000000002ce, 0x62, 0x0) [ 996.205490] hfs: unable to parse mount options 03:11:47 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x230400, 0x0) bind$inet(r0, &(0x7f0000deb000)={0x2, 0x3, @broadcast}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f00006dc000)=[{0x6, 0x0, 0x0, 0xa1}]}, 0x10) sendto$inet(r0, &(0x7f00000001c0), 0x0, 0x200007ff, &(0x7f0000deaff0)={0x2, 0x3, @loopback}, 0x10) sendto$inet(r0, &(0x7f00000002c0)="20d6dac772b6f65cc7c3fc9bf8d917fbd5bd28cd6ad9243ec3c3fc41fe4295b32b630b3e888a8d0eb1abd9d081c0c6655507c293ed17dcc8e25f2cb85d0e732ff34d9f574cdd31597a5e3a688fff4a8f31474711e4b8f7ab05068770f885c03286fadc1d0fd02098bd981aaf152f2da86443cc605a5cb9a63475b63d354cb1f158bd", 0x82, 0x800000000001, &(0x7f0000000140)={0x2, 0x0, @dev}, 0x10) write$binfmt_elf32(r0, &(0x7f00000005c0)=ANY=[], 0x7cd) recvfrom$llc(r1, &(0x7f0000000380)=""/123, 0x7b, 0x60, &(0x7f0000000100)={0x1a, 0x0, 0x2f, 0x0, 0xffffffffffffff01, 0x0, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x1}}, 0x10) sendto$inet(r0, &(0x7f0000000580)="89", 0x1, 0x0, &(0x7f0000000000)={0x2, 0x0, @multicast2}, 0x10) recvfrom(r0, &(0x7f0000000480)=""/239, 0xfffffffffffffe21, 0x0, 0x0, 0x0) recvfrom(r0, &(0x7f0000000180)=""/251, 0xfb, 0x0, &(0x7f0000000080)=@pppol2tp, 0x80) close(r0) 03:11:47 executing program 3: socket$packet(0x11, 0xa, 0x300) syz_emit_ethernet(0x4e, &(0x7f0000000080)={@local, @broadcast, [{}], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x0, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x500000000000000]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, &(0x7f00000002c0)) 03:11:47 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f00000003c0), 0x4c00, &(0x7f0000000580)={[{@session={'session'}}]}) [ 996.477261] hfs: invalid session number or type of track [ 996.483393] hfs: can't find a HFS filesystem on dev loop2 [ 996.562217] hfs: invalid session number or type of track [ 996.575605] hfs: can't find a HFS filesystem on dev loop2 03:11:48 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e23}, 0x1c) listen(r0, 0x18) r1 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f0000000000)=[@in={0x2, 0x4e23, @dev={0xac, 0x14, 0xc0, 0xc}}, @in={0x2, 0x4e23, @local}], 0x20) 03:11:48 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0xffffffffffffffff, &(0x7f00000003c0), 0x0, &(0x7f0000000580)={[{@session={'session'}}]}) 03:11:48 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000040)="153f6234488dd25d766070") socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup2(r2, r2) sendmsg$netlink(r3, &(0x7f0000028fc8)={0x0, 0x0, &(0x7f0000019000), 0x0, &(0x7f0000000040)=[@rights={0x18, 0x1, 0x1, [r1]}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000000b80)=[{{&(0x7f0000000200)=@l2, 0x80, &(0x7f00000005c0), 0x0, &(0x7f0000000600)=""/84, 0x54}}, {{&(0x7f0000000680)=@l2, 0x80, &(0x7f0000000a40), 0x0, &(0x7f0000000ac0)=""/147, 0x93, 0x0}}], 0x4000000000002ce, 0x62, 0x0) 03:11:48 executing program 3: socket$packet(0x11, 0xa, 0x300) syz_emit_ethernet(0x4e, &(0x7f0000000080)={@local, @broadcast, [{}], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x0, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400000000000000]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, &(0x7f00000002c0)) 03:11:48 executing program 1: mkdir(&(0x7f00000005c0)='./file0\x00', 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) mount$bpf(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='bpf\x00', 0x0, &(0x7f0000000680)=ANY=[@ANYBLOB="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"]) 03:11:48 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f00000003c0), 0x3f00, &(0x7f0000000580)={[{@session={'session'}}]}) 03:11:48 executing program 1: r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(0x0, r1, 0x0) socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_ifreq(r0, 0x8b35, &(0x7f0000000180)={'veth0_to_team\x00', @ifru_ivalue}) [ 996.891862] SELinux: security_context_str_to_sid(ser_u) failed for (dev bpf, type bpf) errno=-22 [ 996.910425] SELinux: security_context_str_to_sid(ser_u) failed for (dev bpf, type bpf) errno=-22 03:11:48 executing program 3: socket$packet(0x11, 0xa, 0x300) syz_emit_ethernet(0x4e, &(0x7f0000000080)={@local, @broadcast, [{}], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x0, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x43050000]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, &(0x7f00000002c0)) 03:11:48 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f00000003c0), 0x68, &(0x7f0000000580)={[{@session={'session'}}]}) 03:11:48 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000040)="153f6234488dd25d766070") socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup2(r2, r2) sendmsg$netlink(r3, &(0x7f0000028fc8)={0x0, 0x0, &(0x7f0000019000), 0x0, &(0x7f0000000040)=[@rights={0x18, 0x1, 0x1, [r1]}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000000b80)=[{{&(0x7f0000000200)=@l2, 0x80, &(0x7f00000005c0), 0x0, &(0x7f0000000600)=""/84, 0x54}}, {{&(0x7f0000000680)=@l2, 0x80, &(0x7f0000000a40), 0x0, &(0x7f0000000ac0)=""/147, 0x93, 0x0}}], 0x4000000000002ce, 0x62, 0x0) 03:11:48 executing program 1: socket$vsock_stream(0x28, 0x1, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fchmod(0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x2000000096011300, 0x3ef, 0x0, 0x3f00000000000000, 0x0, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) r1 = accept4(r0, &(0x7f00000003c0)=@generic, &(0x7f0000000300)=0x80, 0x800) getsockopt$inet_tcp_int(r1, 0x6, 0x17, &(0x7f0000000440), &(0x7f0000000480)=0x4) ioctl$sock_inet6_SIOCADDRT(r0, 0x89a0, &(0x7f0000000100)={@local={0xfe, 0x80, [0xd25e010000000000]}, @empty, @loopback, 0x3}) socket$vsock_stream(0x28, 0x1, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cpuacct.usage_user\x00', 0x0, 0x0) ioctl$sock_inet_SIOCRTMSG(0xffffffffffffffff, 0x890d, &(0x7f0000000340)={0x0, {0x2, 0x4e23, @rand_addr=0x1f}, {0x2, 0x4e24, @local}, {0x2, 0x0, @local}, 0x24, 0x0, 0x0, 0xfffffffffffffffa, 0x0, 0x0, 0x4, 0x7, 0x1}) setsockopt$IP_VS_SO_SET_EDIT(r2, 0x0, 0x483, &(0x7f00000002c0)={0x7e, @loopback, 0x4e22, 0x1, 'wrr\x00', 0x0, 0x10001, 0x3}, 0x2c) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000001c0), 0x4) ioctl$KVM_ENABLE_CAP_CPU(0xffffffffffffffff, 0x4068aea3, &(0x7f0000000580)={0x7b, 0x0, [0x7]}) ioctl$EXT4_IOC_ALLOC_DA_BLKS(0xffffffffffffffff, 0x660c) connect$l2tp(r2, &(0x7f0000000000)=@pppol2tpin6={0x18, 0x1, {0x0, r0, 0x1, 0x0, 0x3, 0x4, {0xa, 0x4e24, 0xfff, @ipv4={[], [], @remote}, 0x1f}}}, 0x32) setxattr$trusted_overlay_origin(&(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='trusted.overlay.origin\x00', &(0x7f0000000240)='y\x00', 0x2, 0x1) mkdirat(r2, &(0x7f0000000280)='./bus\x00', 0x10) stat(&(0x7f0000000500)='./file0\x00', &(0x7f0000000600)) syz_open_dev$vcsa(&(0x7f0000000100)='/dev/vcsa#\x00', 0x3, 0x0) openat$ipvs(0xffffffffffffff9c, &(0x7f00000004c0)='/proc/sys/net/ipv4/vs/sync_threshold\x00', 0x2, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) ioctl$LOOP_CLR_FD(r2, 0x4c01) mount(&(0x7f0000000680)=ANY=[@ANYBLOB="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"], &(0x7f0000000840)='./bus\x00', &(0x7f0000000880)='dax\x00', 0x0, &(0x7f00000008c0)='sysv\x00') [ 997.139946] hfs: unable to parse mount options 03:11:48 executing program 3: socket$packet(0x11, 0xa, 0x300) syz_emit_ethernet(0x4e, &(0x7f0000000080)={@local, @broadcast, [{}], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x0, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8100]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, &(0x7f00000002c0)) 03:11:49 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e23}, 0x1c) listen(r0, 0x18) r1 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f0000000000)=[@in={0x2, 0x4e23, @dev={0xac, 0x14, 0xe0, 0xc}}, @in={0x2, 0x4e23, @local}], 0x20) 03:11:49 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x3, &(0x7f00000003c0), 0x0, &(0x7f0000000580)={[{@session={'session'}}]}) 03:11:49 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f00000003c0), 0x7, &(0x7f0000000580)={[{@session={'session'}}]}) 03:11:49 executing program 3: socket$packet(0x11, 0xa, 0x300) syz_emit_ethernet(0x4e, &(0x7f0000000080)={@local, @broadcast, [{}], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x0, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd00000000000000]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, &(0x7f00000002c0)) 03:11:49 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000040)="153f6234488dd25d766070") socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup2(r2, r2) sendmsg$netlink(r3, &(0x7f0000028fc8)={0x0, 0x0, &(0x7f0000019000), 0x0, &(0x7f0000000040)=[@rights={0x18, 0x1, 0x1, [r1]}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000000b80)=[{{&(0x7f0000000200)=@l2, 0x80, &(0x7f00000005c0), 0x0, &(0x7f0000000600)=""/84, 0x54}}, {{&(0x7f0000000680)=@l2, 0x80, &(0x7f0000000a40), 0x0, &(0x7f0000000ac0)=""/147, 0x93, 0x0}}], 0x4000000000002ce, 0x62, 0x0) 03:11:49 executing program 1: r0 = socket$inet6(0xa, 0x11000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e23}, 0x1c) listen(r1, 0xffefffefffffff82) r2 = syz_open_dev$usbmon(&(0x7f0000000240)='/dev/usbmon#\x00', 0x1, 0x42000) r3 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000440)='IPVS\x00') sendmsg$IPVS_CMD_GET_SERVICE(r2, &(0x7f0000000580)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000540)={&(0x7f0000000480)={0xb8, r3, 0x2, 0x70bd2c, 0x25dfdbff, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x81}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x7ff}, @IPVS_CMD_ATTR_DAEMON={0x3c, 0x3, [@IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @local}, @IPVS_DAEMON_ATTR_MCAST_PORT={0x8, 0x7, 0x4e22}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3, 0x2}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'sit0\x00'}]}, @IPVS_CMD_ATTR_SERVICE={0x58, 0x1, [@IPVS_SVC_ATTR_SCHED_NAME={0x8, 0x6, 'sed\x00'}, @IPVS_SVC_ATTR_PROTOCOL={0x8}, @IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8, 0x7e}, @IPVS_SVC_ATTR_AF={0x8, 0x1, 0xa}, @IPVS_SVC_ATTR_SCHED_NAME={0x8, 0x6, 'fo\x00'}, @IPVS_SVC_ATTR_PORT={0x8, 0x4, 0x4e22}, @IPVS_SVC_ATTR_SCHED_NAME={0x8, 0x6, 'sh\x00'}, @IPVS_SVC_ATTR_PE_NAME={0x8, 0xb, 'sip\x00'}, @IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv4=@multicast2}]}]}, 0xb8}, 0x1, 0x0, 0x0, 0x80}, 0x400c000) r4 = socket$inet6_sctp(0xa, 0x1, 0x84) sendto$inet6(r4, &(0x7f0000000000)="f8", 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r5 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000100)='/dev/hwrng\x00', 0x200000, 0x0) connect$llc(r5, &(0x7f0000000200)={0x1a, 0x337, 0x786ac66d, 0x8, 0xff, 0x100000001, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}}, 0x10) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r4, 0x84, 0x9, &(0x7f0000000140)={0x0, @in6, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x11}, 0x98) r6 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000080)='/dev/qat_adf_ctl\x00', 0x0, 0x0) ioctl$sock_bt_bnep_BNEPGETCONNLIST(r6, 0x800442d2, &(0x7f00000000c0)={0xa, &(0x7f00000002c0)=[{0x0, 0x0, 0x0, @broadcast}, {0x0, 0x0, 0x0, @link_local}, {0x0, 0x0, 0x0, @dev}, {0x0, 0x0, 0x0, @random}, {0x0, 0x0, 0x0, @local}, {0x0, 0x0, 0x0, @remote}, {0x0, 0x0, 0x0, @remote}, {0x0, 0x0, 0x0, @dev}, {0x0, 0x0, 0x0, @broadcast}, {0x0, 0x0, 0x0, @link_local}]}) [ 997.792814] hfs: invalid session number or type of track [ 997.805899] hfs: can't find a HFS filesystem on dev loop2 [ 997.808143] hfs: invalid session number or type of track [ 997.855784] hfs: can't find a HFS filesystem on dev loop4 03:11:49 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000040)="153f6234488dd25d766070") socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup2(r2, r2) sendmsg$netlink(r3, &(0x7f0000028fc8)={0x0, 0x0, &(0x7f0000019000), 0x0, &(0x7f0000000040)=[@rights={0x18, 0x1, 0x1, [r1]}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000000b80)=[{{&(0x7f0000000200)=@l2, 0x80, &(0x7f00000005c0), 0x0, &(0x7f0000000600)=""/84, 0x54}}, {{&(0x7f0000000680)=@l2, 0x80, &(0x7f0000000a40), 0x0, &(0x7f0000000ac0)=""/147, 0x93, 0x0}}], 0x4000000000002ce, 0x62, 0x0) [ 997.902149] hfs: invalid session number or type of track [ 997.912190] hfs: can't find a HFS filesystem on dev loop2 03:11:49 executing program 3: socket$packet(0x11, 0xa, 0x300) syz_emit_ethernet(0x4e, &(0x7f0000000080)={@local, @broadcast, [{}], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x0, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3580]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, &(0x7f00000002c0)) [ 997.971730] QAT: Invalid ioctl 03:11:49 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f00000003c0), 0xfdffffff00000000, &(0x7f0000000580)={[{@session={'session'}}]}) [ 998.052261] QAT: Invalid ioctl 03:11:49 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0xc77, &(0x7f00000003c0), 0x0, &(0x7f0000000580)={[{@session={'session'}}]}) 03:11:49 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = fcntl$dupfd(r1, 0x406, r0) write$UHID_GET_REPORT_REPLY(r2, &(0x7f0000000140)={0xa, 0x8, 0x694c0b8b}, 0x5c2) r3 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r3, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x9, 0x7, 0x0, 0x0, 0x0, [@sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2}]}, 0x38}}, 0x0) finit_module(r3, &(0x7f0000000040)='mime_type*\x00', 0x1) 03:11:49 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000040)="153f6234488dd25d766070") socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup2(r2, r2) sendmsg$netlink(r3, &(0x7f0000028fc8)={0x0, 0x0, &(0x7f0000019000), 0x0, &(0x7f0000000040)=[@rights={0x18, 0x1, 0x1, [r1]}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000000b80)=[{{&(0x7f0000000200)=@l2, 0x80, &(0x7f00000005c0), 0x0, &(0x7f0000000600)=""/84, 0x54}}, {{&(0x7f0000000680)=@l2, 0x80, &(0x7f0000000a40), 0x0, &(0x7f0000000ac0)=""/147, 0x93, 0x0}}], 0x4000000000002ce, 0x62, 0x0) [ 998.376064] hfs: unable to parse mount options 03:11:50 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e23}, 0x1c) listen(r0, 0x18) r1 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f0000000000)=[@in={0x2, 0x4e23, @dev={0xac, 0x14, 0x2c0, 0xc}}, @in={0x2, 0x4e23, @local}], 0x20) 03:11:50 executing program 3: socket$packet(0x11, 0xa, 0x300) syz_emit_ethernet(0x4e, &(0x7f0000000080)={@local, @broadcast, [{}], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x0, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800000000000000]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, &(0x7f00000002c0)) 03:11:50 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f00000003c0), 0x7a00000000000000, &(0x7f0000000580)={[{@session={'session'}}]}) 03:11:50 executing program 1: r0 = socket$inet_smc(0x2b, 0x1, 0x0) listen(r0, 0x0) shutdown(r0, 0x2) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0xfffffffffffffffc, 0x31, 0xffffffffffffffff, 0x0) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x400000, 0x0) ioctl$KVM_SET_CPUID(r1, 0x4008ae8a, &(0x7f0000000100)=ANY=[@ANYBLOB="0200000000000000010000c0060063eee7a0c2699abcc16b1f000001000000ac0000000300000000000000010000c007000000ff01000000000100fbffffff00000000e6a31a24a0a4db849c44d7d6ce29868e39c6a18faa79c56d1fa2ab79d93fe54f3c"]) setsockopt$inet_tcp_TLS_TX(r0, 0x6, 0x1, &(0x7f0000000000), 0x4) 03:11:50 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0xffff1f0000000000, &(0x7f00000003c0), 0x0, &(0x7f0000000580)={[{@session={'session'}}]}) 03:11:50 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000040)="153f6234488dd25d766070") socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup2(r2, r2) sendmsg$netlink(r3, &(0x7f0000028fc8)={0x0, 0x0, &(0x7f0000019000), 0x0, &(0x7f0000000040)=[@rights={0x18, 0x1, 0x1, [r1]}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000000b80)=[{{&(0x7f0000000200)=@l2, 0x80, &(0x7f00000005c0), 0x0, &(0x7f0000000600)=""/84, 0x54}}, {{&(0x7f0000000680)=@l2, 0x80, &(0x7f0000000a40), 0x0, &(0x7f0000000ac0)=""/147, 0x93, 0x0}}], 0x4000000000002ce, 0x62, 0x0) 03:11:50 executing program 3: socket$packet(0x11, 0xa, 0x300) syz_emit_ethernet(0x4e, &(0x7f0000000080)={@local, @broadcast, [{}], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x0, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3000000]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, &(0x7f00000002c0)) 03:11:50 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_inet_SIOCSIFNETMASK(r0, 0x891c, &(0x7f0000000980)={'veth0_to_bond\x00', {0x2, 0x4e20, @multicast1}}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000400)=""/148, 0x94}], 0x1, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000280)='net/ip6_tables_targets\x00') bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={0x0, r1, 0x0, 0x1d, &(0x7f0000000080)='}selfwlan0{.:Fmime_type\'\'(!.\x00', 0xffffffffffffffff}, 0x30) capset(&(0x7f0000000100)={0x399f1736, r2}, &(0x7f0000000140)={0x8, 0xffffffffffffffff, 0x10000, 0x4, 0x100, 0xfffffffffffffffa}) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f, 0xa}}, 0x2e3) write$RDMA_USER_CM_CMD_CONNECT(r1, &(0x7f00000002c0)={0x6, 0x118, 0xfa00, {{0x5, 0xfffffffffffffab0, "0c3be7bf9ca8bc31990317b2c1a94fc65f75799b2b5315a6bbafca4b508dc6cf277649058e2a94f2b16765809fa090b7a7c75b23a37c01d698d06f5b710d48538643c7d48e6e9d4359cd3df003a1e09e7b63413dffc5e9c6f35ba66c3645641c4bf7193eea8ad89db42da4c2e3e700e3de08c741e2f9ecc3dc2297a546f797d2a4042753e3d35189e826ca3068a4d1c9a84fc5ac7167686329350a8a821372fe5228b6a2848e079b77fd2324896fc1fe8e48581e58fbadc31bc035428f3bff3a686ecd128c25544160448a893b60aa1dda49c847e078a28d32c07e4cabf8f236a55d13e966fc7643c553f74ed2adc2b079504381a4c15654cbed27879a599de1", 0xae, 0xa2b, 0x3, 0xfff, 0xffffffff, 0x6}, r3}}, 0x120) ioctl$KVM_SMI(r0, 0xaeb7) getsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r1, 0x84, 0x1e, &(0x7f0000000180), &(0x7f00000001c0)=0x4) ioctl$KVM_DEASSIGN_PCI_DEVICE(r1, 0x4040ae72, &(0x7f0000000240)={0x8, 0x0, 0x5, 0x6, 0x10001}) 03:11:50 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f00000003c0), 0x2c, &(0x7f0000000580)={[{@session={'session'}}]}) 03:11:50 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000040)="153f6234488dd25d766070") socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup2(r2, r2) sendmsg$netlink(r3, &(0x7f0000028fc8)={0x0, 0x0, &(0x7f0000019000), 0x0, &(0x7f0000000040)=[@rights={0x18, 0x1, 0x1, [r1]}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000000b80)=[{{&(0x7f0000000200)=@l2, 0x80, &(0x7f00000005c0), 0x0, &(0x7f0000000600)=""/84, 0x54}}, {{&(0x7f0000000680)=@l2, 0x80, &(0x7f0000000a40), 0x0, &(0x7f0000000ac0)=""/147, 0x93, 0x0}}], 0x4000000000002ce, 0x62, 0x0) [ 998.919328] hfs: unable to parse mount options 03:11:50 executing program 1: r0 = syz_open_dev$usb(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x203, 0x0) mmap(&(0x7f0000000000/0xd000)=nil, 0xd000, 0x0, 0x20011, r0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x2f, &(0x7f00000015c0)={0x6f75, {{0x2, 0x0, @loopback}}}, 0xff52) mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x0, 0x5c831, 0xffffffffffffffff, 0x0) ioctl$KVM_TRANSLATE(0xffffffffffffffff, 0xc018ae85, &(0x7f0000000100)) preadv(0xffffffffffffffff, &(0x7f0000001380), 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000000280)='net/if_inet6\x00') splice(0xffffffffffffffff, &(0x7f0000002800), 0xffffffffffffffff, &(0x7f0000002840), 0x0, 0x4) ioctl$DRM_IOCTL_VERSION(0xffffffffffffffff, 0xc0406400, &(0x7f0000000040)={0x0, 0x0, 0x0, 0xf7, &(0x7f0000000180)=""/247, 0x1000, &(0x7f0000000480)=""/4096, 0x6c, &(0x7f00000002c0)=""/108}) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000000)=ANY=[], &(0x7f0000000080)) 03:11:50 executing program 3: socket$packet(0x11, 0xa, 0x300) syz_emit_ethernet(0x4e, &(0x7f0000000080)={@local, @broadcast, [{}], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x0, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x29]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, &(0x7f00000002c0)) 03:11:50 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f00000003c0), 0x40000000, &(0x7f0000000580)={[{@session={'session'}}]}) 03:11:50 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0xf503000000000000, &(0x7f00000003c0), 0x0, &(0x7f0000000580)={[{@session={'session'}}]}) 03:11:50 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000040)="153f6234488dd25d766070") socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup2(r2, r2) sendmsg$netlink(r3, &(0x7f0000028fc8)={0x0, 0x0, &(0x7f0000019000), 0x0, &(0x7f0000000040)=[@rights={0x18, 0x1, 0x1, [r1]}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000000b80)=[{{&(0x7f0000000200)=@l2, 0x80, &(0x7f00000005c0), 0x0, &(0x7f0000000600)=""/84, 0x54}}, {{&(0x7f0000000680)=@l2, 0x80, &(0x7f0000000a40), 0x0, &(0x7f0000000ac0)=""/147, 0x93, 0x0}}], 0x4000000000002ce, 0x62, 0x0) 03:11:50 executing program 1: r0 = syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x0) r1 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$VHOST_SET_VRING_ADDR(r1, 0x4028af11, &(0x7f0000000240)={0x0, 0x1, &(0x7f0000000040)=""/25, &(0x7f00000000c0)=""/181, &(0x7f0000000180)=""/147, 0xd000}) r2 = syz_open_procfs(0x0, &(0x7f0000000780)='net/ip_tables_names\x00') ioctl$LOOP_CHANGE_FD(r0, 0x4c06, r2) 03:11:50 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e23}, 0x1c) listen(r0, 0x18) r1 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f0000000000)=[@in={0x2, 0x4e23, @dev={0xac, 0x14, 0xffffffffffffffe0, 0xc}}, @in={0x2, 0x4e23, @local}], 0x20) 03:11:50 executing program 3: socket$packet(0x11, 0xa, 0x300) syz_emit_ethernet(0x4e, &(0x7f0000000080)={@local, @broadcast, [{}], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x0, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x88470000]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, &(0x7f00000002c0)) [ 999.505421] hfs: invalid session number or type of track [ 999.532549] hfs: can't find a HFS filesystem on dev loop2 03:11:51 executing program 1: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f00000001c0)=""/246) msgsnd(0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='-'], 0x1, 0x0) ioctl$EVIOCGREP(r0, 0x40047451, &(0x7f0000000000)=""/174) getsockopt$inet_sctp_SCTP_CONTEXT(r0, 0x84, 0x11, &(0x7f00000000c0)={0x0, 0x9}, &(0x7f0000000100)=0x8) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r0, 0x84, 0x18, &(0x7f0000000140)={r1, 0xbbc}, &(0x7f0000000180)=0x8) 03:11:51 executing program 3: socket$packet(0x11, 0xa, 0x300) syz_emit_ethernet(0x4e, &(0x7f0000000080)={@local, @broadcast, [{}], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x0, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8035000000000000]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, &(0x7f00000002c0)) [ 999.639564] hfs: invalid session number or type of track [ 999.665168] hfs: can't find a HFS filesystem on dev loop2 03:11:51 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000040)="153f6234488dd25d766070") socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup2(r2, r2) sendmsg$netlink(r3, &(0x7f0000028fc8)={0x0, 0x0, &(0x7f0000019000), 0x0, &(0x7f0000000040)=[@rights={0x18, 0x1, 0x1, [r1]}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000000b80)=[{{&(0x7f0000000200)=@l2, 0x80, &(0x7f00000005c0), 0x0, &(0x7f0000000600)=""/84, 0x54}}, {{&(0x7f0000000680)=@l2, 0x80, &(0x7f0000000a40), 0x0, &(0x7f0000000ac0)=""/147, 0x93, 0x0}}], 0x4000000000002ce, 0x62, 0x0) [ 999.713146] hfs: unable to parse mount options 03:11:51 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f00000003c0), 0x100000000000000, &(0x7f0000000580)={[{@session={'session'}}]}) 03:11:51 executing program 1: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockopt$sock_linger(r0, 0x1, 0xd, &(0x7f0000000080), &(0x7f00000001c0)=0x8) r1 = socket$inet6(0xa, 0x3, 0x1f) ioctl(r1, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") syz_emit_ethernet(0x3a, &(0x7f0000000140)=ANY=[@ANYBLOB="aa3b91b5db2482aaaaaaaaaa0180c200000008004900002c0000000000009078ac2314bbac1414aa830befac2314bbe0000001890300000000009078ffffffff4aff9056cc13fab6"], &(0x7f00000002c0)) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='net/tcp6\x00') getsockopt$inet_sctp_SCTP_AUTO_ASCONF(r2, 0x84, 0x1e, &(0x7f00000000c0), &(0x7f0000000100)=0x4) ioctl$DRM_IOCTL_RM_MAP(r2, 0x4028641b, &(0x7f0000000040)={0x0, 0x9264, 0x1, 0x10, &(0x7f0000fff000/0x1000)=nil, 0x2}) 03:11:51 executing program 3: socket$packet(0x11, 0xa, 0x300) syz_emit_ethernet(0x4e, &(0x7f0000000080)={@local, @broadcast, [{}], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x0, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf0ffff]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, &(0x7f00000002c0)) 03:11:51 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x2000000, &(0x7f00000003c0), 0x0, &(0x7f0000000580)={[{@session={'session'}}]}) 03:11:51 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000040)="153f6234488dd25d766070") socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup2(r2, r2) sendmsg$netlink(r3, &(0x7f0000028fc8)={0x0, 0x0, &(0x7f0000019000), 0x0, &(0x7f0000000040)=[@rights={0x18, 0x1, 0x1, [r1]}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000000b80)=[{{&(0x7f0000000200)=@l2, 0x80, &(0x7f00000005c0), 0x0, &(0x7f0000000600)=""/84, 0x54}}, {{&(0x7f0000000680)=@l2, 0x80, &(0x7f0000000a40), 0x0, &(0x7f0000000ac0)=""/147, 0x93, 0x0}}], 0x4000000000002ce, 0x62, 0x0) 03:11:51 executing program 1: r0 = fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffff9c) r1 = epoll_create(0x8000) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000001400)={0x0, 0x3f, 0xfff, 0x9, 0x8, 0xffffffffffffff9c, 0x2}, 0x2c) r3 = fcntl$dupfd(0xffffffffffffff9c, 0x406, 0xffffffffffffffff) socketpair$packet(0x11, 0x2, 0x300, &(0x7f0000001440)={0xffffffffffffffff}) r5 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000001480)='/proc/self/net/pfkey\x00', 0x4000, 0x0) r6 = socket$bt_hidp(0x1f, 0x3, 0x6) r7 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000001500)={&(0x7f00000014c0)='./file0\x00', 0x0, 0x10}, 0x10) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000001540)={0xffffffffffffffff}) r9 = openat$dsp(0xffffffffffffff9c, &(0x7f0000001580)='/dev/dsp\x00', 0x840c0, 0x0) r10 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001840)={&(0x7f00000015c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc0, 0xd8, 0xffffffffffff7fff, {"911078ecc49c9d0fceff3c3b5406cfdb74849645e08baa6d4f55c937c1ee0fecda520f3d2ad5d1fccc7b5900070a2fc25572741fd0e786d9c33cc007633e502182790fce7c1f1b5200d85a655a3434eea37bdd38cef5dc7033d443d7dce15fadf52e60dd7e2180951d2804e4a74c4a45f5e66a4a2fc0ee0494f92e76c14a92fd5dd5cd44bfcb389fd86b5f48a9d6bf32c892f8c5f38999177dcb5d30faeafdab0d1984642f5204e06ac22a81fa089146434335e5c03ccb49deb43cc12123"}}, {0x0, "fe548d1dc3619be5151a28b4c90aa4592da4844e69ee5575058ac8ceb8cbcbd409b0c74a16f291e81386e7a81279bd1897ce6dab777b333ec0512bf89609dd1138ca77c2e83f5968204cab6be6602c5ac14adcdaffab8e138d63f3b833bee7999c8643fa3dfd69d5ecef72a87d6fa7ca019ae9c3bb8d1202976e208042bcdf76b1c33336c3f26272a9154b7243bc20f88151c8fa5617d9cb3251c89600d0dd471ae22d476d74b8bf68832c55f214327d29353f16a9108e4d3210d3e1d0"}}, &(0x7f0000001780)=""/185, 0x197, 0xb9}, 0x20) sendmsg$unix(r0, &(0x7f00000018c0)={&(0x7f0000000200)=@abs={0x1, 0x0, 0x4e20}, 0x6e, &(0x7f00000013c0)=[{&(0x7f0000000280)="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", 0x1000}, {&(0x7f0000001280)="9f1c1b8fa8e487feaf2deb956e98e76c818c80683c64d323fcbdb6be3602f686042f3a4f918fed29063674ddaaf3303bfb73a55566fb0087c36cb5aee7d2c616", 0x40}, {&(0x7f00000012c0)="82ab6ae7ee918d6b8570288c40ff0593736481c06f83b3d349d4ee999e5b03b8cc6213e7f2757d95f47bf76ae1c9c112be64f71ddd2b7ea01cdf46adb9ba14bf97b47e623d319aa2a52741b5d447ee6ec1c2a3227bebcf520fb13c58e1a75fce4eea879bbab0e050f03c9a76a8132b3eb16934a5c2e3f84f58121b37501d7c3f11b5cc926ccd9cf2abddeb22dd6e531ef74ee06fc7baeb0add70d61b72f56d1b8b43940a1472f925439ade4048edca04692722803d77b81e0b1557d49a9516ed94b51bfa1c211c28922dfed0845c44773269a944cb3278355c3e00081c1f268ab7cbf13366af8590b5a2f26c3168", 0xee}], 0x3, &(0x7f0000001880)=[@rights={0x38, 0x1, 0x1, [r1, r2, r3, r4, r5, r6, r7, r8, r9, r10]}], 0x38, 0x2000c000}, 0x800) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_cred(r12, 0x1, 0x11, &(0x7f0000000040)={0x0}, &(0x7f00000000c0)=0xc) r14 = syz_open_procfs(r13, &(0x7f0000000100)="7374617475730042236739c16d17f90dc22322c94f133520785e91ea85ae107cc3819819c263540b1de1ba201e6de4b75a50115091eed530aa482e36594601ceb5d169c5baf41b35d8a5a09a82496613d86023865b57ef269f90d304969f687df53b611b40a44291b5a882208fbb835e54a41310a3b481d5bdbb0981742909a63b7cd1a18d405e5b011bfbe5a4d5bf299447e4c0dd4b63a367211c0078238b509d614100d33a5584aa3b3cb9b99e6e5f84719294d41b27117c47fb4f2b2be475eb25d5f69b6d10cf8422cade570c087b03f6b1818bc97077db23") setgroups(0x0, &(0x7f0000000280)) sendfile(r11, r14, &(0x7f0000000080), 0x71c) [ 1000.218236] hfs: unable to parse mount options 03:11:51 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e23}, 0x1c) listen(r0, 0x18) r1 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f0000000000)=[@in={0x2, 0x4e23, @dev={0xac, 0x14, 0xffffffe0, 0xc}}, @in={0x2, 0x4e23, @local}], 0x20) 03:11:51 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f00000003c0), 0x3f00000000000000, &(0x7f0000000580)={[{@session={'session'}}]}) 03:11:51 executing program 3: socket$packet(0x11, 0xa, 0x300) syz_emit_ethernet(0x4e, &(0x7f0000000080)={@local, @broadcast, [{}], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x0, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2f000000]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, &(0x7f00000002c0)) 03:11:51 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000040)="153f6234488dd25d766070") socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup2(r2, r2) sendmsg$netlink(r3, &(0x7f0000028fc8)={0x0, 0x0, &(0x7f0000019000), 0x0, &(0x7f0000000040)=[@rights={0x18, 0x1, 0x1, [r1]}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000000b80)=[{{&(0x7f0000000200)=@l2, 0x80, &(0x7f00000005c0), 0x0, &(0x7f0000000600)=""/84, 0x54}}, {{&(0x7f0000000680)=@l2, 0x80, &(0x7f0000000a40), 0x0, &(0x7f0000000ac0)=""/147, 0x93, 0x0}}], 0x4000000000002ce, 0x62, 0x0) 03:11:51 executing program 1: r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/sys/net/ipv4/vs/drop_packet\x00', 0x2, 0x0) ioctl$RNDADDENTROPY(r0, 0x40085203, &(0x7f0000000240)={0xfb, 0x64, "e4890c590ff7c74b6ba5d0cba7353b0dedc8d746d51f9844983f9b68f449cce41ad16260b9ecb7a89a232ea0f9b9a0e5bed3ab2278112dfce513da67d0d27bb1361929043bd196bdd19e13bf8a3b5e968f7e24de076e79a4feb1288e480b54f20b80a135"}) setxattr$security_evm(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='security.evm\x00', &(0x7f0000000140)=ANY=[@ANYBLOB="02e774c611cfa7144fc2cf"], 0xb, 0x0) syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000040)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000ffffffff000034fb8fb9e4bf48b6ad26c597eb4f5c1900000000000000040400000000000d880000000000000d890000000000000d8a000000010000100000000001000000000000035ab4240200040000040000000000000000000000000c090a020c", 0x7d}], 0x0, &(0x7f0000000080)) 03:11:51 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x68000000, &(0x7f00000003c0), 0x0, &(0x7f0000000580)={[{@session={'session'}}]}) 03:11:51 executing program 3: socket$packet(0x11, 0xa, 0x300) syz_emit_ethernet(0x4e, &(0x7f0000000080)={@local, @broadcast, [{}], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x0, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, &(0x7f00000002c0)) 03:11:52 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f00000003c0), 0x7000000, &(0x7f0000000580)={[{@session={'session'}}]}) 03:11:52 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000040)="153f6234488dd25d766070") socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup2(r2, r2) sendmsg$netlink(r3, &(0x7f0000028fc8)={0x0, 0x0, &(0x7f0000019000), 0x0, &(0x7f0000000040)=[@rights={0x18, 0x1, 0x1, [r1]}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000000b80)=[{{&(0x7f0000000200)=@l2, 0x80, &(0x7f00000005c0), 0x0, &(0x7f0000000600)=""/84, 0x54}}, {{&(0x7f0000000680)=@l2, 0x80, &(0x7f0000000a40), 0x0, &(0x7f0000000ac0)=""/147, 0x93, 0x0}}], 0x4000000000002ce, 0x62, 0x0) [ 1000.643273] XFS (loop1): Mounting V4 Filesystem [ 1000.654062] hfs: invalid session number or type of track [ 1000.662849] hfs: can't find a HFS filesystem on dev loop2 [ 1000.681122] XFS (loop1): totally zeroed log [ 1000.695700] XFS (loop1): Failed to read root inode 0x400000000000d88, error 22 03:11:52 executing program 3: socket$packet(0x11, 0xa, 0x300) syz_emit_ethernet(0x4e, &(0x7f0000000080)={@local, @broadcast, [{}], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x0, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81000000]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, &(0x7f00000002c0)) [ 1000.742240] hfs: invalid session number or type of track [ 1000.758523] hfs: unable to parse mount options [ 1000.763650] hfs: can't find a HFS filesystem on dev loop2 03:11:52 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000040)="153f6234488dd25d766070") socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup2(r2, r2) sendmsg$netlink(r3, &(0x7f0000028fc8)={0x0, 0x0, &(0x7f0000019000), 0x0, &(0x7f0000000040)=[@rights={0x18, 0x1, 0x1, [r1]}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000000b80)=[{{&(0x7f0000000200)=@l2, 0x80, &(0x7f00000005c0), 0x0, &(0x7f0000000600)=""/84, 0x54}}, {{&(0x7f0000000680)=@l2, 0x80, &(0x7f0000000a40), 0x0, &(0x7f0000000ac0)=""/147, 0x93, 0x0}}], 0x4000000000002ce, 0x62, 0x0) 03:11:52 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f00000003c0), 0x8cffffff, &(0x7f0000000580)={[{@session={'session'}}]}) 03:11:52 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e23}, 0x1c) listen(r0, 0x18) r1 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f0000000000)=[@in={0x2, 0x4e23, @dev={0xac, 0x14, 0xffe0, 0xc}}, @in={0x2, 0x4e23, @local}], 0x20) 03:11:52 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) bpf$BPF_PROG_QUERY(0x10, &(0x7f00000000c0)={r0, 0x0, 0x1, 0x9, &(0x7f0000000080)=[0x0, 0x0, 0x0, 0x0], 0x4}, 0x20) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000240)='/dev/hwrng\x00', 0x240, 0x0) setsockopt$SO_VM_SOCKETS_BUFFER_SIZE(r1, 0x28, 0x0, &(0x7f0000000280)=0x614, 0x8) setsockopt$sock_linger(r0, 0x1, 0xd, &(0x7f0000000100)={0x0, 0xffffffffffffffff}, 0x8) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000180)='/proc/self/net/pfkey\x00', 0x140, 0x0) setsockopt$packet_buf(r2, 0x107, 0x16, &(0x7f00000001c0)="9df50ac04e314d8964da0ca3f3a55622713ecf834c7d126866c98664a6b00039823cea4df19c22e348c4ce83a995b2ae2f45e725fa3bce8fd8b082dc91169bc3a79405f32e9e65c51463c01465d09c06753f977f06b1e868f765d885b7d5acd9b4bb21e4c9b4bf1d25f434788b9f9e93487166411d", 0x75) syz_open_pts(r1, 0x410000) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000140)='/dev/loop-control\x00', 0x101003, 0x0) 03:11:52 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x48, &(0x7f00000003c0), 0x0, &(0x7f0000000580)={[{@session={'session'}}]}) 03:11:52 executing program 3: socket$packet(0x11, 0xa, 0x300) syz_emit_ethernet(0x4e, &(0x7f0000000080)={@local, @broadcast, [{}], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x0, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, &(0x7f00000002c0)) 03:11:52 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000040)="153f6234488dd25d766070") socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup2(r2, r2) sendmsg$netlink(r3, &(0x7f0000028fc8)={0x0, 0x0, &(0x7f0000019000), 0x0, &(0x7f0000000040)=[@rights={0x18, 0x1, 0x1, [r1]}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000000b80)=[{{&(0x7f0000000200)=@l2, 0x80, &(0x7f00000005c0), 0x0, &(0x7f0000000600)=""/84, 0x54}}, {{&(0x7f0000000680)=@l2, 0x80, &(0x7f0000000a40), 0x0, &(0x7f0000000ac0)=""/147, 0x93, 0x0}}], 0x4000000000002ce, 0x62, 0x0) 03:11:52 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f00000003c0), 0xffffffffffffffff, &(0x7f0000000580)={[{@session={'session'}}]}) [ 1001.272069] hfs: unable to parse mount options 03:11:52 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)) socketpair$inet_sctp(0x2, 0x5, 0x84, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$inet_MCAST_LEAVE_GROUP(r0, 0x0, 0x2d, &(0x7f0000000140)={0x8, {{0x2, 0x4e24, @rand_addr=0x3}}}, 0x88) r1 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) poll(&(0x7f0000000100)=[{r2, 0x0, 0x800000000000000}], 0x1, 0xfffffffffffffffa) ioctl$TCSETS(r2, 0x40045431, &(0x7f00003b9fdc)) r3 = syz_open_pts(r2, 0x0) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, &(0x7f0000040000)) r4 = dup3(r3, r2, 0x0) ioctl$TIOCCONS(r4, 0x541d) tkill(r1, 0x1040000000019) 03:11:52 executing program 3: socket$packet(0x11, 0xa, 0x300) syz_emit_ethernet(0x4e, &(0x7f0000000080)={@local, @broadcast, [{}], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x0, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8848000000000000]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, &(0x7f00000002c0)) [ 1001.389405] hfs: unable to parse mount options 03:11:52 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f00000003c0), 0x1000000, &(0x7f0000000580)={[{@session={'session'}}]}) 03:11:52 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000040)="153f6234488dd25d766070") socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup2(r2, r2) sendmsg$netlink(r3, &(0x7f0000028fc8)={0x0, 0x0, &(0x7f0000019000), 0x0, &(0x7f0000000040)=[@rights={0x18, 0x1, 0x1, [r1]}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000000b80)=[{{&(0x7f0000000200)=@l2, 0x80, &(0x7f00000005c0), 0x0, &(0x7f0000000600)=""/84, 0x54}}, {{&(0x7f0000000680)=@l2, 0x80, &(0x7f0000000a40), 0x0, &(0x7f0000000ac0)=""/147, 0x93, 0x0}}], 0x4000000000002ce, 0x62, 0x0) 03:11:52 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x2200, &(0x7f00000003c0), 0x0, &(0x7f0000000580)={[{@session={'session'}}]}) [ 1001.561322] hfs: invalid session number or type of track 03:11:53 executing program 1: mremap(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x2000, 0x2, &(0x7f0000ffc000/0x2000)=nil) ioctl(0xffffffffffffffff, 0x3ff, &(0x7f0000000440)="155d") r0 = memfd_create(&(0x7f0000000040)='/GPL\x00', 0x1) mmap$binder(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x0, 0x128010, r0, 0x0) r1 = syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x0, 0x0) ioctl$TIOCLINUX5(r1, 0x541c, &(0x7f0000000080)={0x5, 0x0, 0x0, 0x8}) r2 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) connect$l2tp(0xffffffffffffffff, &(0x7f0000000180)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast2}}}, 0x26) getsockopt$IP6T_SO_GET_REVISION_MATCH(r2, 0x29, 0x44, &(0x7f0000000000)={'ipvs\x00'}, &(0x7f00000001c0)=0x1e) ioctl$LOOP_SET_FD(r1, 0x4c00, 0xffffffffffffffff) r3 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ppp\x00', 0x0, 0x0) mkdir(&(0x7f0000000200)='./file0\x00', 0x21) clone(0x4000002102001ffb, 0x0, 0xfffffffffffffffe, &(0x7f00000000c0), 0xffffffffffffffff) ioctl$TIOCGSID(r1, 0x5429, &(0x7f0000000240)=0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_INFO(r3, 0xc1105511, &(0x7f00000002c0)={{0x1, 0x2, 0x100000000, 0x9, '\x00', 0x7fff}, 0x5, 0x14, 0x7fffffff, r4, 0x6, 0x7, 'syz1\x00', &(0x7f0000000140)=['/dev/ppp\x00', '*\x00', '\x00', 'asymmetric\x00', 'self:\x00', '/dev/ppp\x00'], 0x26, [], [0x3f, 0x5, 0x6, 0x2]}) request_key(&(0x7f000000aff5)='asymmetric\x00', &(0x7f0000001ffb), &(0x7f0000001fee)='RVid:De\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x0) [ 1001.601712] hfs: can't find a HFS filesystem on dev loop2 [ 1001.709847] hfs: invalid session number or type of track [ 1001.737242] hfs: can't find a HFS filesystem on dev loop2 [ 1001.849584] hfs: unable to parse mount options 03:11:53 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e23}, 0x1c) listen(r0, 0x18) r1 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f0000000000)=[@in={0x2, 0x4e23, @dev={0xac, 0x14, 0x18, 0xc}}, @in={0x2, 0x4e23, @local}], 0x20) 03:11:53 executing program 3: socket$packet(0x11, 0xa, 0x300) syz_emit_ethernet(0x4e, &(0x7f0000000080)={@local, @broadcast, [{}], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x0, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x88caffff00000000]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, &(0x7f00000002c0)) 03:11:53 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000040)="153f6234488dd25d766070") socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup2(r2, r2) sendmsg$netlink(r3, &(0x7f0000028fc8)={0x0, 0x0, &(0x7f0000019000), 0x0, &(0x7f0000000040)=[@rights={0x18, 0x1, 0x1, [r1]}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000000b80)=[{{&(0x7f0000000200)=@l2, 0x80, &(0x7f00000005c0), 0x0, &(0x7f0000000600)=""/84, 0x54}}, {{&(0x7f0000000680)=@l2, 0x80, &(0x7f0000000a40), 0x0, &(0x7f0000000ac0)=""/147, 0x93, 0x0}}], 0x4000000000002ce, 0x62, 0x0) 03:11:53 executing program 1: mremap(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x2000, 0x2, &(0x7f0000ffc000/0x2000)=nil) ioctl(0xffffffffffffffff, 0x3ff, &(0x7f0000000440)="155d") r0 = memfd_create(&(0x7f0000000040)='/GPL\x00', 0x1) mmap$binder(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x0, 0x128010, r0, 0x0) r1 = syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x0, 0x0) ioctl$TIOCLINUX5(r1, 0x541c, &(0x7f0000000080)={0x5, 0x0, 0x0, 0x8}) r2 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) connect$l2tp(0xffffffffffffffff, &(0x7f0000000180)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast2}}}, 0x26) getsockopt$IP6T_SO_GET_REVISION_MATCH(r2, 0x29, 0x44, &(0x7f0000000000)={'ipvs\x00'}, &(0x7f00000001c0)=0x1e) ioctl$LOOP_SET_FD(r1, 0x4c00, 0xffffffffffffffff) r3 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ppp\x00', 0x0, 0x0) mkdir(&(0x7f0000000200)='./file0\x00', 0x21) clone(0x4000002102001ffb, 0x0, 0xfffffffffffffffe, &(0x7f00000000c0), 0xffffffffffffffff) ioctl$TIOCGSID(r1, 0x5429, &(0x7f0000000240)=0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_INFO(r3, 0xc1105511, &(0x7f00000002c0)={{0x1, 0x2, 0x100000000, 0x9, '\x00', 0x7fff}, 0x5, 0x14, 0x7fffffff, r4, 0x6, 0x7, 'syz1\x00', &(0x7f0000000140)=['/dev/ppp\x00', '*\x00', '\x00', 'asymmetric\x00', 'self:\x00', '/dev/ppp\x00'], 0x26, [], [0x3f, 0x5, 0x6, 0x2]}) request_key(&(0x7f000000aff5)='asymmetric\x00', &(0x7f0000001ffb), &(0x7f0000001fee)='RVid:De\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x0) 03:11:53 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f00000003c0), 0xfdffffff, &(0x7f0000000580)={[{@session={'session'}}]}) 03:11:53 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x3f4, &(0x7f00000003c0), 0x0, &(0x7f0000000580)={[{@session={'session'}}]}) [ 1002.260931] hfs: unable to parse mount options 03:11:53 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f00000003c0), 0x900000000000000, &(0x7f0000000580)={[{@session={'session'}}]}) 03:11:53 executing program 3: socket$packet(0x11, 0xa, 0x300) syz_emit_ethernet(0x4e, &(0x7f0000000080)={@local, @broadcast, [{}], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x0, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, &(0x7f00000002c0)) 03:11:53 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000040)="153f6234488dd25d766070") socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup2(r2, r2) sendmsg$netlink(r3, &(0x7f0000028fc8)={0x0, 0x0, &(0x7f0000019000), 0x0, &(0x7f0000000040)=[@rights={0x18, 0x1, 0x1, [r1]}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000000b80)=[{{&(0x7f0000000200)=@l2, 0x80, &(0x7f00000005c0), 0x0, &(0x7f0000000600)=""/84, 0x54}}, {{&(0x7f0000000680)=@l2, 0x80, &(0x7f0000000a40), 0x0, &(0x7f0000000ac0)=""/147, 0x93, 0x0}}], 0x4000000000002ce, 0x62, 0x0) 03:11:53 executing program 1: r0 = perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r1 = accept$inet(0xffffffffffffffff, &(0x7f0000000b80), &(0x7f0000000bc0)=0x10) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000c00)={{{@in=@multicast2, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}, 0x0, @in6}}, &(0x7f0000000d00)=0xe8) lstat(&(0x7f0000000d40)='./file0\x00', &(0x7f0000000d80)={0x0, 0x0, 0x0, 0x0, 0x0}) setsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000000e00)={{{@in6=@mcast2, @in6=@ipv4={[], [], @local}, 0x4e23, 0x6, 0x4e22, 0x0, 0x2, 0xa0, 0x80, 0xbb, r2, r3}, {0x9, 0x2, 0xffffffff, 0xffff, 0x2, 0x7fff, 0x8, 0x3}, {0x7, 0x3ff, 0x5, 0x9f}, 0x9, 0x6e6bb0, 0x1, 0x1, 0x3, 0x3}, {{@in=@broadcast, 0x4d3, 0x2b}, 0xa, @in=@local, 0x3504, 0x3, 0x3, 0x7, 0xfffffffffffffffe, 0x3f, 0x9}}, 0xe8) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x8, &(0x7f00000003c0)=ANY=[@ANYBLOB="26d2dc438e7bcdd8ee3f2267627a09dd67e3de2a10e47ab2722d6081671e00f7996496e6427101a9aa801840", @ANYRESHEX, @ANYBLOB=',rootmode=00000000000000000000000,user_id=', @ANYRESDEC=0x0, @ANYRESDEC=r0, @ANYRESDEC=0x0, @ANYBLOB=',\x00']) mount$9p_fd(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)='9p\x00', 0x0, &(0x7f00000002c0)={',rans=fd,', {'rfdno'}, 0x2c, {'wfdno'}}) r4 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vhost-vsock\x00', 0x2, 0x0) r5 = syz_open_dev$midi(&(0x7f00000001c0)='/dev/midi#\x00', 0x7, 0x0) mkdirat(r5, &(0x7f0000000280)='./file0\x00', 0x80) pwritev(r4, &(0x7f0000000ac0)=[{&(0x7f0000000300)="194693336d45116737f2d0674b37cfe9cba4b16f2e433b3741f9db172e250dafc1e31f8002deb08007750e62b752c9acaa864f0b8d3298d1bc49e67f46ab9dce36804f336d3176eece20586f5e9836cd3becdc5161237aef0e008900959bbf8e910efac0005202e0933bcfcb006b0e2f52a781fb6efe5dff18c5ab674901132f28936247a6ebbc710e77818c654343", 0x8f}, {&(0x7f0000000480)="14311520026c4955ae747f9073ae4cff2fd489d9eb753d079e8347e3c9dd7e4fea7a714981aa6c3eb453862876dfd97a6d581ec290ea2c9ada24c65aecd6d5a373195107263b", 0x46}, {&(0x7f0000000500)="a60d755285c3bb9e67df08abab51af4700438f7748a1c47fc0dc8806bf85b8a36c2a0ea246b3139a285cf5da0cedc3fa5c3dcb7ca6be1e7a18d84c84f64326891f618b2be74fcde8d7a0537dc5cb6534c35b51d2a9f2ccd92c648b16929f43b444928916f566ca4a2bb73dfc9e38ef96564b77221198b0c5fffb1ca87269f4cd82e7b60cb9d18b22e2e6181ba0b3b387b3a81c7cb0dbfe205e600031f843027ff3f8711aaea921fd8d8d8bb0e8bed730d19bcf5f83d3f6f658d1c7c354ef46772ef530d6776827", 0xc7}, {&(0x7f0000000140)="606419e9f6537dbcd0de2265165f7fb3480cf6211f110cf9f6a4a7e9dcc8de16222ffacb6fada9c3c2acb41fafe18a", 0x2f}, {&(0x7f0000000600)="f50351369603a9ad33b1847ca9cdcdb55905e2238995132b9f0668ff912c5a0be5b9fc46a8ed8ff72b6f73a1c34e5755deadc4da0acea51780ae96f2c538406f8c7e1a247cc45ccb744023b4605a4a4d2da1c4", 0x53}, {&(0x7f0000000680)="5baf47f26e3b8b412d8569713485fac130ee84096cc3351100bf2670115bbdaa56e71635ec78da64476df6691f033cdaf7063b582ce332450d83e0653a5c19bab7a0d85d83fa5026214f5c9a8fcab6d9b5cc3e93fa7e233d1081396e51653645c11ec435f82c8abf265c6c32a456777c389e9503222a648a47b5917548b6d6c62cfd12634478115da94f721972f7e9197b5f6f315fd75fd1b528a032f0ea11770725f74e6bd736dd732147bf77d6f6aad7f2d54782f688764eb3626d84dd9cd94632b179c5b592c9d039feafb456a31909c1789e363c896b17d049ec587f8e8bb66c757a59ee120cd002c11c621861334585f1fa1cee1087", 0xf8}, {&(0x7f0000000780)="26593eebd6b032a118b33c066880850396686a4c3f4be0730391d51a94edd8d619b934c98939788f48892ca0bd17bf45de137e86cb4c9d9a2ad015d4d03f535ab9647c4008579dc559d244bc7fc904c606ef59bda5e69eefa5465a9ba4a4e71bc2cf532607ab5ebe0a6d27e3ae54a3207c2295f7c05cb7848e7f24e3c8bcc4945cc8fba1ee9e4a3646c822258032ba1f8642cb9d8cd3e6ce9e85275e", 0x9c}, {&(0x7f0000000840)="0226a0269f05952c3a6d51bd376003ae6ba2b1e4e38391b6cf194cf865c28d5ce01ef04872c60a5ac5cb3edac74f39a2a3a9e5b2d3ccb0be9ad92affe4f22ee923f502321374f72c278e", 0x4a}, {&(0x7f00000008c0)="d1770ef268fe647985305d5551423704343bcace30ca0bdc23dff9a5a0dca78052dbbe2fed5df0419483e4e326945d0ad31dda8be5b9f2005f6beae7db022201759fd292d35f6221588164e802e94c7bf813f66c09b91e4d2be2cc4b301c954e1540cbd274dee0409cd4cbdde80d329e06ccf7a58b46b95218542d915de0d29bc8290d594f47c91456f530682bcda239e36d7a1331d7df404da773ed71075a882a35b22eb45f05d698f5daa26229fb673304122059e25c85542cab435298d54e8079d5e492f057ff54d1d3c035ec74fb48e13c1cbd07e82aa5a256ebc745d6b88c1ffa8e847467c5aa659f5de8f5a264", 0xf0}, {&(0x7f00000009c0)="18ec5fbb7900c9c321df513c5d8e41a10296ecec4b8fd3665d86655d87a6fa1740e25310dc81ab28acc02979147856838a4507c0b6b316b5412797641dce063d2bb3cbf9c988c6355ea9db2726da0d1c893f3c5d0c0921e3891e188c8d1946e9bfea52eeeed8c4f7de41f1fc584cfad513cf221a5192b0d4c7681f2c1d1741dcf22bb2c9b6f1cf75e49124149a1f8bd08d0ef592f89df9c7302232fb6688a10026128410534dcf8479f1576e6051a2b25927b05dab8deb429dbd86dc2ac77e8f6c9230a00d2d35ba3374a6", 0xcb}], 0xa, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x80000, 0x0) 03:11:53 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x22000000, &(0x7f00000003c0), 0x0, &(0x7f0000000580)={[{@session={'session'}}]}) 03:11:54 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000040)="153f6234488dd25d766070") socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup2(r2, r2) sendmsg$netlink(r3, &(0x7f0000028fc8)={0x0, 0x0, &(0x7f0000019000), 0x0, &(0x7f0000000040)=[@rights={0x18, 0x1, 0x1, [r1]}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000000b80)=[{{&(0x7f0000000200)=@l2, 0x80, &(0x7f00000005c0), 0x0, &(0x7f0000000600)=""/84, 0x54}}, {{&(0x7f0000000680)=@l2, 0x80, &(0x7f0000000a40), 0x0, &(0x7f0000000ac0)=""/147, 0x93, 0x0}}], 0x4000000000002ce, 0x62, 0x0) [ 1002.679834] hfs: unable to parse mount options 03:11:54 executing program 3: socket$packet(0x11, 0xa, 0x300) syz_emit_ethernet(0x4e, &(0x7f0000000080)={@local, @broadcast, [{}], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x0, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2f]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, &(0x7f00000002c0)) 03:11:54 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e23}, 0x1c) listen(r0, 0x18) r1 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f0000000000)=[@in={0x2, 0x4e23, @dev={0xac, 0x14, 0x328, 0xc}}, @in={0x2, 0x4e23, @local}], 0x20) 03:11:54 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x80001, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_ENABLE_CAP(r1, 0x4068aea3, &(0x7f0000000340)={0x8f, 0x0, [0x2]}) poll(&(0x7f0000000040)=[{r0, 0x80}, {r0, 0xa001}, {r0, 0x301}], 0x3, 0x100) 03:11:54 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000040)="153f6234488dd25d766070") socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup2(r2, r2) sendmsg$netlink(r3, &(0x7f0000028fc8)={0x0, 0x0, &(0x7f0000019000), 0x0, &(0x7f0000000040)=[@rights={0x18, 0x1, 0x1, [r1]}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000000b80)=[{{&(0x7f0000000200)=@l2, 0x80, &(0x7f00000005c0), 0x0, &(0x7f0000000600)=""/84, 0x54}}, {{&(0x7f0000000680)=@l2, 0x80, &(0x7f0000000a40), 0x0, &(0x7f0000000ac0)=""/147, 0x93, 0x0}}], 0x4000000000002ce, 0x62, 0x0) 03:11:54 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0xfdfdffff, &(0x7f00000003c0), 0x0, &(0x7f0000000580)={[{@session={'session'}}]}) 03:11:54 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f00000003c0), 0x6000000, &(0x7f0000000580)={[{@session={'session'}}]}) [ 1003.042150] hfs: invalid session number or type of track [ 1003.070383] hfs: can't find a HFS filesystem on dev loop2 03:11:54 executing program 3: socket$packet(0x11, 0xa, 0x300) syz_emit_ethernet(0x4e, &(0x7f0000000080)={@local, @broadcast, [{}], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x0, 0x0, @local, @local={0xfe, 0x80, [0x2900000000000000]}, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, &(0x7f00000002c0)) [ 1003.146872] hfs: invalid session number or type of track [ 1003.160160] hfs: can't find a HFS filesystem on dev loop2 03:11:54 executing program 1: r0 = syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0x1, 0x2) write$P9_RMKNOD(r0, &(0x7f0000000080)={0x1c4}, 0xfffffea1) ioctl$int_in(r0, 0x80000000005008, &(0x7f00000000c0)) 03:11:54 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000040)="153f6234488dd25d766070") socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup2(r2, r2) sendmsg$netlink(r3, &(0x7f0000028fc8)={0x0, 0x0, &(0x7f0000019000), 0x0, &(0x7f0000000040)=[@rights={0x18, 0x1, 0x1, [r1]}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000000b80)=[{{&(0x7f0000000200)=@l2, 0x80, &(0x7f00000005c0), 0x0, &(0x7f0000000600)=""/84, 0x54}}, {{&(0x7f0000000680)=@l2, 0x80, &(0x7f0000000a40), 0x0, &(0x7f0000000ac0)=""/147, 0x93, 0x0}}], 0x4000000000002ce, 0x62, 0x0) [ 1003.235784] hfs: unable to parse mount options 03:11:54 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f00000003c0), 0x300, &(0x7f0000000580)={[{@session={'session'}}]}) 03:11:54 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x5, &(0x7f00000003c0), 0x0, &(0x7f0000000580)={[{@session={'session'}}]}) 03:11:54 executing program 3: socket$packet(0x11, 0xa, 0x300) syz_emit_ethernet(0x4e, &(0x7f0000000080)={@local, @broadcast, [{}], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x0, 0x0, @local, @local={0xfe, 0x80, [0x8906000000000000]}, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, &(0x7f00000002c0)) [ 1003.428802] hfs: invalid session number or type of track [ 1003.460628] hfs: can't find a HFS filesystem on dev loop2 [ 1003.477145] hfs: invalid session number or type of track [ 1003.512391] hfs: can't find a HFS filesystem on dev loop4 [ 1003.546285] hfs: invalid session number or type of track 03:11:55 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000040)="153f6234488dd25d766070") socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup2(r2, r2) sendmsg$netlink(r3, &(0x7f0000028fc8)={0x0, 0x0, &(0x7f0000019000), 0x0, &(0x7f0000000040)=[@rights={0x18, 0x1, 0x1, [r1]}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000000b80)=[{{&(0x7f0000000200)=@l2, 0x80, &(0x7f00000005c0), 0x0, &(0x7f0000000600)=""/84, 0x54}}, {{&(0x7f0000000680)=@l2, 0x80, &(0x7f0000000a40), 0x0, &(0x7f0000000ac0)=""/147, 0x93, 0x0}}], 0x4000000000002ce, 0x62, 0x0) [ 1003.568180] hfs: can't find a HFS filesystem on dev loop2 [ 1003.636635] hfs: invalid session number or type of track [ 1003.655944] hfs: can't find a HFS filesystem on dev loop4 03:11:55 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e23}, 0x1c) listen(r0, 0x18) r1 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f0000000000)=[@in={0x2, 0x4e23, @dev={0xac, 0x14, 0x14c, 0xc}}, @in={0x2, 0x4e23, @local}], 0x20) 03:11:55 executing program 3: socket$packet(0x11, 0xa, 0x300) syz_emit_ethernet(0x4e, &(0x7f0000000080)={@local, @broadcast, [{}], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x0, 0x0, @local, @local={0xfe, 0x80, [0x800e000000000000]}, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, &(0x7f00000002c0)) 03:11:55 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f00000003c0), 0x4000, &(0x7f0000000580)={[{@session={'session'}}]}) 03:11:55 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x10000000, &(0x7f00000003c0), 0x0, &(0x7f0000000580)={[{@session={'session'}}]}) 03:11:55 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000040)="153f6234488dd25d766070") socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup2(r2, r2) sendmsg$netlink(r3, &(0x7f0000028fc8)={0x0, 0x0, &(0x7f0000019000), 0x0, &(0x7f0000000040)=[@rights={0x18, 0x1, 0x1, [r1]}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000000b80)=[{{&(0x7f0000000200)=@l2, 0x80, &(0x7f00000005c0), 0x0, &(0x7f0000000600)=""/84, 0x54}}, {{&(0x7f0000000680)=@l2, 0x80, &(0x7f0000000a40), 0x0, &(0x7f0000000ac0)=""/147, 0x93, 0x0}}], 0x4000000000002ce, 0x62, 0x0) [ 1004.015130] hfs: invalid session number or type of track [ 1004.020850] hfs: can't find a HFS filesystem on dev loop2 03:11:55 executing program 3: socket$packet(0x11, 0xa, 0x300) syz_emit_ethernet(0x4e, &(0x7f0000000080)={@local, @broadcast, [{}], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x0, 0x0, @local, @local={0xfe, 0x80, [0xf0ffff]}, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, &(0x7f00000002c0)) [ 1004.077136] hfs: invalid session number or type of track [ 1004.102942] hfs: can't find a HFS filesystem on dev loop2 03:11:55 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000140)={0x1, &(0x7f0000000480)=[{0x10000000000006, 0x0, 0x0, 0x5}]}, 0x10) r1 = socket$inet6(0xa, 0x400000000001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet6(r1, &(0x7f0000000180)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r1, &(0x7f0000e77fff), 0xfffffffffffffe64, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) getsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r1, 0x84, 0x13, &(0x7f0000000000)={0x0, 0x1300000000}, &(0x7f0000000040)=0x8) getsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r1, 0x84, 0x13, &(0x7f0000000080)={0x0}, &(0x7f00000000c0)=0x8) getsockopt$inet_sctp6_SCTP_STATUS(r1, 0x84, 0xe, &(0x7f0000000200)={r2, 0x9, 0x800, 0x5, 0x3f, 0x1, 0x400, 0x3, {r3, @in={{0x2, 0x4e21, @remote}}, 0x0, 0x200, 0x10001, 0x100000000, 0x1f}}, &(0x7f0000000300)=0xb0) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(0xffffffffffffffff, 0x84, 0x6d, &(0x7f00000001c0)=ANY=[@ANYRES32=0x0, @ANYBLOB="00f52630"], &(0x7f00000002c0)=0x8) 03:11:55 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000040)="153f6234488dd25d766070") socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup2(r2, r2) sendmsg$netlink(r3, &(0x7f0000028fc8)={0x0, 0x0, &(0x7f0000019000), 0x0, &(0x7f0000000040)=[@rights={0x18, 0x1, 0x1, [r1]}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000000b80)=[{{&(0x7f0000000200)=@l2, 0x80, &(0x7f00000005c0), 0x0, &(0x7f0000000600)=""/84, 0x54}}, {{&(0x7f0000000680)=@l2, 0x80, &(0x7f0000000a40), 0x0, &(0x7f0000000ac0)=""/147, 0x93, 0x0}}], 0x4000000000002ce, 0x62, 0x0) [ 1004.176875] hfs: unable to parse mount options 03:11:55 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f00000003c0), 0x48, &(0x7f0000000580)={[{@session={'session'}}]}) 03:11:55 executing program 3: socket$packet(0x11, 0xa, 0x300) syz_emit_ethernet(0x4e, &(0x7f0000000080)={@local, @broadcast, [{}], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x0, 0x0, @local, @local={0xfe, 0x80, [0x3000000]}, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, &(0x7f00000002c0)) 03:11:55 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x7a, &(0x7f00000003c0), 0x0, &(0x7f0000000580)={[{@session={'session'}}]}) [ 1004.386603] hfs: invalid session number or type of track 03:11:55 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000040)="153f6234488dd25d766070") socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup2(r2, r2) sendmsg$netlink(r3, &(0x7f0000028fc8)={0x0, 0x0, &(0x7f0000019000), 0x0, &(0x7f0000000040)=[@rights={0x18, 0x1, 0x1, [r1]}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000000b80)=[{{&(0x7f0000000200)=@l2, 0x80, &(0x7f00000005c0), 0x0, &(0x7f0000000600)=""/84, 0x54}}, {{&(0x7f0000000680)=@l2, 0x80, &(0x7f0000000a40), 0x0, &(0x7f0000000ac0)=""/147, 0x93, 0x0}}], 0x4000000000002ce, 0x62, 0x0) [ 1004.451667] hfs: can't find a HFS filesystem on dev loop2 [ 1004.567876] hfs: invalid session number or type of track [ 1004.596457] hfs: can't find a HFS filesystem on dev loop2 [ 1004.613755] hfs: unable to parse mount options 03:11:56 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e23}, 0x1c) listen(r0, 0x18) r1 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f0000000000)=[@in={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0xffffffe0}}, @in={0x2, 0x4e23, @local}], 0x20) 03:11:56 executing program 3: socket$packet(0x11, 0xa, 0x300) syz_emit_ethernet(0x4e, &(0x7f0000000080)={@local, @broadcast, [{}], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x0, 0x0, @local, @local={0xfe, 0x80, [0x8060000]}, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, &(0x7f00000002c0)) 03:11:56 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000040)="153f6234488dd25d766070") socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup2(r2, r2) sendmsg$netlink(r3, &(0x7f0000028fc8)={0x0, 0x0, &(0x7f0000019000), 0x0, &(0x7f0000000040)=[@rights={0x18, 0x1, 0x1, [r1]}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000000b80)=[{{&(0x7f0000000200)=@l2, 0x80, &(0x7f00000005c0), 0x0, &(0x7f0000000600)=""/84, 0x54}}, {{&(0x7f0000000680)=@l2, 0x80, &(0x7f0000000a40), 0x0, &(0x7f0000000ac0)=""/147, 0x93, 0x0}}], 0x4000000000002ce, 0x62, 0x0) 03:11:56 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f00000003c0), 0x60, &(0x7f0000000580)={[{@session={'session'}}]}) 03:11:56 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000140)={0x1, &(0x7f0000000480)=[{0x10000000000006, 0x0, 0x0, 0x5}]}, 0x10) r1 = socket$inet6(0xa, 0x400000000001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet6(r1, &(0x7f0000000180)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r1, &(0x7f0000e77fff), 0xfffffffffffffe64, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) getsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r1, 0x84, 0x13, &(0x7f0000000000)={0x0, 0x1300000000}, &(0x7f0000000040)=0x8) getsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r1, 0x84, 0x13, &(0x7f0000000080)={0x0}, &(0x7f00000000c0)=0x8) getsockopt$inet_sctp6_SCTP_STATUS(r1, 0x84, 0xe, &(0x7f0000000200)={r2, 0x9, 0x800, 0x5, 0x3f, 0x1, 0x400, 0x3, {r3, @in={{0x2, 0x4e21, @remote}}, 0x0, 0x200, 0x10001, 0x100000000, 0x1f}}, &(0x7f0000000300)=0xb0) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(0xffffffffffffffff, 0x84, 0x6d, &(0x7f00000001c0)=ANY=[@ANYRES32=0x0, @ANYBLOB="00f52630"], &(0x7f00000002c0)=0x8) 03:11:56 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0xffffffff00000000, &(0x7f00000003c0), 0x0, &(0x7f0000000580)={[{@session={'session'}}]}) 03:11:56 executing program 3: socket$packet(0x11, 0xa, 0x300) syz_emit_ethernet(0x4e, &(0x7f0000000080)={@local, @broadcast, [{}], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x0, 0x0, @local, @local={0xfe, 0x80, [0xf000]}, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, &(0x7f00000002c0)) 03:11:56 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000040)="153f6234488dd25d766070") socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup2(r2, r2) sendmsg$netlink(r3, &(0x7f0000028fc8)={0x0, 0x0, &(0x7f0000019000), 0x0, &(0x7f0000000040)=[@rights={0x18, 0x1, 0x1, [r1]}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000000b80)=[{{&(0x7f0000000200)=@l2, 0x80, &(0x7f00000005c0), 0x0, &(0x7f0000000600)=""/84, 0x54}}, {{&(0x7f0000000680)=@l2, 0x80, &(0x7f0000000a40), 0x0, &(0x7f0000000ac0)=""/147, 0x93, 0x0}}], 0x4000000000002ce, 0x62, 0x0) 03:11:56 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f00000003c0), 0xe00, &(0x7f0000000580)={[{@session={'session'}}]}) 03:11:56 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e23}, 0x1c) listen(r0, 0x18) r1 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f0000000000)=[@in={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x19}}, @in={0x2, 0x4e23, @local}], 0x20) 03:11:56 executing program 3: socket$packet(0x11, 0xa, 0x300) syz_emit_ethernet(0x4e, &(0x7f0000000080)={@local, @broadcast, [{}], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x0, 0x0, @local, @local={0xfe, 0x80, [0xf0]}, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, &(0x7f00000002c0)) 03:11:56 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000140)={0x1, &(0x7f0000000480)=[{0x10000000000006, 0x0, 0x0, 0x5}]}, 0x10) r1 = socket$inet6(0xa, 0x400000000001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet6(r1, &(0x7f0000000180)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r1, &(0x7f0000e77fff), 0xfffffffffffffe64, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) getsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r1, 0x84, 0x13, &(0x7f0000000000)={0x0, 0x1300000000}, &(0x7f0000000040)=0x8) getsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r1, 0x84, 0x13, &(0x7f0000000080)={0x0}, &(0x7f00000000c0)=0x8) getsockopt$inet_sctp6_SCTP_STATUS(r1, 0x84, 0xe, &(0x7f0000000200)={r2, 0x9, 0x800, 0x5, 0x3f, 0x1, 0x400, 0x3, {r3, @in={{0x2, 0x4e21, @remote}}, 0x0, 0x200, 0x10001, 0x100000000, 0x1f}}, &(0x7f0000000300)=0xb0) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(0xffffffffffffffff, 0x84, 0x6d, &(0x7f00000001c0)=ANY=[@ANYRES32=0x0, @ANYBLOB="00f52630"], &(0x7f00000002c0)=0x8) [ 1005.347434] hfs: invalid session number or type of track [ 1005.353175] hfs: can't find a HFS filesystem on dev loop2 [ 1005.382698] hfs: unable to parse mount options [ 1005.418937] hfs: invalid session number or type of track [ 1005.424415] hfs: can't find a HFS filesystem on dev loop2 03:11:57 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f00000003c0), 0x4, &(0x7f0000000580)={[{@session={'session'}}]}) 03:11:57 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x2000000000000000, &(0x7f00000003c0), 0x0, &(0x7f0000000580)={[{@session={'session'}}]}) 03:11:57 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000040)="153f6234488dd25d766070") socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup2(r2, r2) sendmsg$netlink(r3, &(0x7f0000028fc8)={0x0, 0x0, &(0x7f0000019000), 0x0, &(0x7f0000000040)=[@rights={0x18, 0x1, 0x1, [r1]}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000000b80)=[{{&(0x7f0000000200)=@l2, 0x80, &(0x7f00000005c0), 0x0, &(0x7f0000000600)=""/84, 0x54}}, {{&(0x7f0000000680)=@l2, 0x80, &(0x7f0000000a40), 0x0, &(0x7f0000000ac0)=""/147, 0x93, 0x0}}], 0x4000000000002ce, 0x62, 0x0) 03:11:57 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e23}, 0x1c) listen(r0, 0x18) r1 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f0000000000)=[@in={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x3d}}, @in={0x2, 0x4e23, @local}], 0x20) 03:11:57 executing program 3: socket$packet(0x11, 0xa, 0x300) syz_emit_ethernet(0x4e, &(0x7f0000000080)={@local, @broadcast, [{}], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x0, 0x0, @local, @local={0xfe, 0x80, [0x88caffff00000000]}, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, &(0x7f00000002c0)) [ 1005.709600] hfs: invalid session number or type of track [ 1005.782378] hfs: can't find a HFS filesystem on dev loop2 [ 1005.918679] hfs: invalid session number or type of track [ 1005.945136] hfs: can't find a HFS filesystem on dev loop2 03:11:57 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e23}, 0x1c) listen(r0, 0x18) r1 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f0000000000)=[@in={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x37}}, @in={0x2, 0x4e23, @local}], 0x20) 03:11:57 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000040)="153f6234488dd25d766070") socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup2(r2, r2) sendmsg$netlink(r3, &(0x7f0000028fc8)={0x0, 0x0, &(0x7f0000019000), 0x0, &(0x7f0000000040)=[@rights={0x18, 0x1, 0x1, [r1]}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000000b80)=[{{&(0x7f0000000200)=@l2, 0x80, &(0x7f00000005c0), 0x0, &(0x7f0000000600)=""/84, 0x54}}, {{&(0x7f0000000680)=@l2, 0x80, &(0x7f0000000a40), 0x0, &(0x7f0000000ac0)=""/147, 0x93, 0x0}}], 0x4000000000002ce, 0x62, 0x0) 03:11:57 executing program 3: socket$packet(0x11, 0xa, 0x300) syz_emit_ethernet(0x4e, &(0x7f0000000080)={@local, @broadcast, [{}], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x0, 0x0, @local, @local={0xfe, 0x80, [0x2f00]}, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, &(0x7f00000002c0)) 03:11:57 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r2 = userfaultfd(0x0) r3 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000080)='/dev/qat_adf_ctl\x00', 0x40000, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r3, 0x84, 0x6e, &(0x7f0000000180)=[@in6={0xa, 0x4e21, 0x2a112792, @loopback, 0x2}, @in={0x2, 0x4e23, @loopback}, @in={0x2, 0x4e21, @broadcast}, @in6={0xa, 0x4e20, 0x35c2, @remote, 0x7f}, @in={0x2, 0x4e23, @remote}, @in={0x2, 0x800, @remote}, @in={0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0x21}}, @in={0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0xd}}], 0x98) ioctl$UFFDIO_API(r2, 0xc018aa3f, &(0x7f0000003fe8)) ioctl$UFFDIO_REGISTER(r2, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r4 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r4, 0x84, 0x21, &(0x7f0000013e95), 0x4) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r3, 0x84, 0x66, &(0x7f0000000280)={0x0, 0x8}, &(0x7f00000002c0)=0x8) setsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(r3, 0x84, 0xa, &(0x7f0000000300)={0x2, 0x8, 0x8, 0x4, 0x5, 0x1, 0x81, 0x20, r5}, 0x20) setsockopt$inet_sctp6_SCTP_INITMSG(r4, 0x84, 0x2, &(0x7f0000000000)={0x0, 0x0, 0x0, 0xff0f}, 0x8) connect$llc(r0, &(0x7f0000000040)={0x1a, 0x337, 0x8, 0x6, 0xffff, 0xff, @broadcast}, 0x10) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r3, 0x84, 0x77, &(0x7f0000000340)={r5, 0x6, 0x5, [0xf6e, 0x7, 0x7fff, 0x1, 0x7]}, 0x12) socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$sock_SIOCGSKNS(r4, 0x894c, &(0x7f00000000c0)=0x4) close(r4) exit(0xff) r6 = pkey_alloc(0x0, 0x1) pkey_mprotect(&(0x7f0000013000/0x4000)=nil, 0x4000, 0x2000008, r6) r7 = add_key$user(&(0x7f0000000380)='user\x00', &(0x7f00000003c0)={'syz', 0x3}, &(0x7f0000000400)="e90ce3cddaa2ec9ec3c6a71e7e2897d26b1c6bf6a90132cee2e5c0a3f841f86a3e927dbdc02e57ba45f09d22ac8d857089ecd816e006e0ec8943df640370b0bb9c0d9837ccdfeda156a01cf2ae6c9ea35b9d7009f55059fb834d951682dd3f2d0d6fb6a9d5afc73e6e2dc311bffd788495b82357a91d981b7bf8b7fd992a4565078b135f42e0d7a4a2ff11fe8016bf8a68bc2c4a50e7665f6d1d8f7e5634da186f63a8c684e7d983ca593145bea5fd", 0xaf, 0xfffffffffffffffc) r8 = add_key(&(0x7f00000004c0)='encrypted\x00', &(0x7f0000000500)={'syz', 0x3}, &(0x7f0000000540)="a7c59af7bec670b4e512541b4f15a7f29759c53c3c12efafe9b1b41f007070f322bbcdba0c3d051e157732cd38eec30535c5a05470b58a1f30", 0x39, 0xfffffffffffffff9) keyctl$link(0x8, r7, r8) close(r2) ioctl$TIOCGPGRP(r3, 0x540f, &(0x7f0000000100)=0x0) sched_setparam(r9, &(0x7f0000000240)=0x3) 03:11:57 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f00000003c0), 0x1000000000000000, &(0x7f0000000580)={[{@session={'session'}}]}) [ 1006.076703] hfs: unable to parse mount options 03:11:57 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e23}, 0x1c) listen(r0, 0x18) r1 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f0000000000)=[@in={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0xffe0}}, @in={0x2, 0x4e23, @local}], 0x20) 03:11:57 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0xedc0, &(0x7f00000003c0), 0x0, &(0x7f0000000580)={[{@session={'session'}}]}) 03:11:57 executing program 3: socket$packet(0x11, 0xa, 0x300) syz_emit_ethernet(0x4e, &(0x7f0000000080)={@local, @broadcast, [{}], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x0, 0x0, @local, @local={0xfe, 0x80, [0x800e]}, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, &(0x7f00000002c0)) [ 1006.404820] QAT: Invalid ioctl 03:11:57 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f00000003c0), 0xfdfdffff00000000, &(0x7f0000000580)={[{@session={'session'}}]}) 03:11:57 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000040)="153f6234488dd25d766070") socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup2(r2, r2) sendmsg$netlink(r3, &(0x7f0000028fc8)={0x0, 0x0, &(0x7f0000019000), 0x0, &(0x7f0000000040)=[@rights={0x18, 0x1, 0x1, [r1]}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000000b80)=[{{&(0x7f0000000200)=@l2, 0x80, &(0x7f00000005c0), 0x0, &(0x7f0000000600)=""/84, 0x54}}, {{&(0x7f0000000680)=@l2, 0x80, &(0x7f0000000a40), 0x0, &(0x7f0000000ac0)=""/147, 0x93}, 0x800000000000000}], 0x4000000000002ce, 0x62, 0x0) [ 1006.520489] hfs: unable to parse mount options 03:11:58 executing program 3: socket$packet(0x11, 0xa, 0x300) syz_emit_ethernet(0x4e, &(0x7f0000000080)={@local, @broadcast, [{}], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x0, 0x0, @local, @local={0xfe, 0x80, [0x88a8ffff]}, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, &(0x7f00000002c0)) 03:11:58 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e23}, 0x1c) listen(r0, 0x18) r1 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f0000000000)=[@in={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x3}}, @in={0x2, 0x4e23, @local}], 0x20) 03:11:58 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f00000003c0), 0x600, &(0x7f0000000580)={[{@session={'session'}}]}) 03:11:58 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x3f7, &(0x7f00000003c0), 0x0, &(0x7f0000000580)={[{@session={'session'}}]}) 03:11:58 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000040)="153f6234488dd25d766070") socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup2(r2, r2) sendmsg$netlink(r3, &(0x7f0000028fc8)={0x0, 0x0, &(0x7f0000019000), 0x0, &(0x7f0000000040)=[@rights={0x18, 0x1, 0x1, [r1]}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000000b80)=[{{&(0x7f0000000200)=@l2, 0x80, &(0x7f00000005c0), 0x0, &(0x7f0000000600)=""/84, 0x54}}, {{&(0x7f0000000680)=@l2, 0x80, &(0x7f0000000a40), 0x0, &(0x7f0000000ac0)=""/147, 0x93}, 0x6000000}], 0x4000000000002ce, 0x62, 0x0) [ 1006.832974] hfs: invalid session number or type of track [ 1006.861846] hfs: can't find a HFS filesystem on dev loop2 [ 1006.897056] hfs: unable to parse mount options [ 1006.971620] hfs: invalid session number or type of track [ 1006.994618] hfs: can't find a HFS filesystem on dev loop2 [ 1007.028754] QAT: Invalid ioctl 03:11:58 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) r1 = syz_open_dev$usb(&(0x7f0000000080)='/dev/bus/usb/00#/00#\x00', 0xfffffffffffffffe, 0x2001) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETQUEUE(r2, 0x400454d9, &(0x7f00000000c0)) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(r1, 0xc0505405, &(0x7f0000000100)={{0x2, 0x1, 0x1000000020000, 0x10002, 0x200}, 0x20}) syz_genetlink_get_family_id$ipvs(&(0x7f0000000440)='IPVS\x00') ioctl$RTC_PLL_GET(0xffffffffffffffff, 0x80207011, &(0x7f0000000480)) getsockopt$bt_BT_SNDMTU(0xffffffffffffffff, 0x112, 0xc, &(0x7f00000005c0)=0x3, &(0x7f0000000640)=0x2) 03:11:58 executing program 3: socket$packet(0x11, 0xa, 0x300) syz_emit_ethernet(0x4e, &(0x7f0000000080)={@local, @broadcast, [{}], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x0, 0x0, @local, @local={0xfe, 0x80, [0x8906]}, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, &(0x7f00000002c0)) 03:11:58 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000040)="153f6234488dd25d766070") socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup2(r2, r2) sendmsg$netlink(r3, &(0x7f0000028fc8)={0x0, 0x0, &(0x7f0000019000), 0x0, &(0x7f0000000040)=[@rights={0x18, 0x1, 0x1, [r1]}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000000b80)=[{{&(0x7f0000000200)=@l2, 0x80, &(0x7f00000005c0), 0x0, &(0x7f0000000600)=""/84, 0x54}}, {{&(0x7f0000000680)=@l2, 0x80, &(0x7f0000000a40), 0x0, &(0x7f0000000ac0)=""/147, 0x93}, 0x8}], 0x4000000000002ce, 0x62, 0x0) 03:11:58 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e23}, 0x1c) listen(r0, 0x18) r1 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f0000000000)=[@in={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0xffffffffffffffe0}}, @in={0x2, 0x4e23, @local}], 0x20) 03:11:58 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0xfcfdffff00000000, &(0x7f00000003c0), 0x0, &(0x7f0000000580)={[{@session={'session'}}]}) 03:11:58 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f00000003c0), 0x1fffff, &(0x7f0000000580)={[{@session={'session'}}]}) 03:11:58 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000040)="153f6234488dd25d766070") socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup2(r2, r2) sendmsg$netlink(r3, &(0x7f0000028fc8)={0x0, 0x0, &(0x7f0000019000), 0x0, &(0x7f0000000040)=[@rights={0x18, 0x1, 0x1, [r1]}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000000b80)=[{{&(0x7f0000000200)=@l2, 0x80, &(0x7f00000005c0), 0x0, &(0x7f0000000600)=""/84, 0x54}}, {{&(0x7f0000000680)=@l2, 0x80, &(0x7f0000000a40), 0x0, &(0x7f0000000ac0)=""/147, 0x93}, 0x6b6b6b00}], 0x4000000000002ce, 0x62, 0x0) 03:11:58 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e23}, 0x1c) listen(r0, 0x18) r1 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f0000000000)=[@in={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0xf}}, @in={0x2, 0x4e23, @local}], 0x20) 03:11:58 executing program 3: socket$packet(0x11, 0xa, 0x300) syz_emit_ethernet(0x4e, &(0x7f0000000080)={@local, @broadcast, [{}], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x0, 0x0, @local, @local={0xfe, 0x80, [0x3]}, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, &(0x7f00000002c0)) 03:11:58 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000040)="153f6234488dd25d766070") socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup2(r2, r2) sendmsg$netlink(r3, &(0x7f0000028fc8)={0x0, 0x0, &(0x7f0000019000), 0x0, &(0x7f0000000040)=[@rights={0x18, 0x1, 0x1, [r1]}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000000b80)=[{{&(0x7f0000000200)=@l2, 0x80, &(0x7f00000005c0), 0x0, &(0x7f0000000600)=""/84, 0x54}}, {{&(0x7f0000000680)=@l2, 0x80, &(0x7f0000000a40), 0x0, &(0x7f0000000ac0)=""/147, 0x93}, 0x4000000000000}], 0x4000000000002ce, 0x62, 0x0) 03:11:58 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e23}, 0x1c) listen(r0, 0x18) r1 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f0000000000)=[@in={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x3b}}, @in={0x2, 0x4e23, @local}], 0x20) 03:11:59 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) r1 = syz_open_dev$usb(&(0x7f0000000080)='/dev/bus/usb/00#/00#\x00', 0xfffffffffffffffe, 0x2001) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETQUEUE(r2, 0x400454d9, &(0x7f00000000c0)) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(r1, 0xc0505405, &(0x7f0000000100)={{0x2, 0x1, 0x1000000020000, 0x10002, 0x200}, 0x20}) syz_genetlink_get_family_id$ipvs(&(0x7f0000000440)='IPVS\x00') ioctl$RTC_PLL_GET(0xffffffffffffffff, 0x80207011, &(0x7f0000000480)) getsockopt$bt_BT_SNDMTU(0xffffffffffffffff, 0x112, 0xc, &(0x7f00000005c0)=0x3, &(0x7f0000000640)=0x2) 03:11:59 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000040)="153f6234488dd25d766070") socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup2(r2, r2) sendmsg$netlink(r3, &(0x7f0000028fc8)={0x0, 0x0, &(0x7f0000019000), 0x0, &(0x7f0000000040)=[@rights={0x18, 0x1, 0x1, [r1]}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000000b80)=[{{&(0x7f0000000200)=@l2, 0x80, &(0x7f00000005c0), 0x0, &(0x7f0000000600)=""/84, 0x54}}, {{&(0x7f0000000680)=@l2, 0x80, &(0x7f0000000a40), 0x0, &(0x7f0000000ac0)=""/147, 0x93}, 0x600000000000000}], 0x4000000000002ce, 0x62, 0x0) [ 1007.620051] hfs: unable to parse mount options 03:11:59 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f00000003c0), 0x22000000, &(0x7f0000000580)={[{@session={'session'}}]}) 03:11:59 executing program 3: socket$packet(0x11, 0xa, 0x300) syz_emit_ethernet(0x4e, &(0x7f0000000080)={@local, @broadcast, [{}], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x0, 0x0, @local, @local={0xfe, 0x80, [0x34000]}, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, &(0x7f00000002c0)) 03:11:59 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0xf503, &(0x7f00000003c0), 0x0, &(0x7f0000000580)={[{@session={'session'}}]}) 03:11:59 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000040)="153f6234488dd25d766070") socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup2(r2, r2) sendmsg$netlink(r3, &(0x7f0000028fc8)={0x0, 0x0, &(0x7f0000019000), 0x0, &(0x7f0000000040)=[@rights={0x18, 0x1, 0x1, [r1]}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000000b80)=[{{&(0x7f0000000200)=@l2, 0x80, &(0x7f00000005c0), 0x0, &(0x7f0000000600)=""/84, 0x54}}, {{&(0x7f0000000680)=@l2, 0x80, &(0x7f0000000a40), 0x0, &(0x7f0000000ac0)=""/147, 0x93}, 0x4}], 0x4000000000002ce, 0x62, 0x0) 03:11:59 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e23}, 0x1c) listen(r0, 0x18) r1 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f0000000000)=[@in={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x7}}, @in={0x2, 0x4e23, @local}], 0x20) 03:11:59 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000040)="153f6234488dd25d766070") socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup2(r2, r2) sendmsg$netlink(r3, &(0x7f0000028fc8)={0x0, 0x0, &(0x7f0000019000), 0x0, &(0x7f0000000040)=[@rights={0x18, 0x1, 0x1, [r1]}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000000b80)=[{{&(0x7f0000000200)=@l2, 0x80, &(0x7f00000005c0), 0x0, &(0x7f0000000600)=""/84, 0x54}}, {{&(0x7f0000000680)=@l2, 0x80, &(0x7f0000000a40), 0x0, &(0x7f0000000ac0)=""/147, 0x93}, 0x1000000000000}], 0x4000000000002ce, 0x62, 0x0) [ 1008.024054] hfs: invalid session number or type of track [ 1008.037554] hfs: can't find a HFS filesystem on dev loop2 03:11:59 executing program 3: socket$packet(0x11, 0xa, 0x300) syz_emit_ethernet(0x4e, &(0x7f0000000080)={@local, @broadcast, [{}], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x0, 0x0, @local, @local={0xfe, 0x80, [0x4888]}, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, &(0x7f00000002c0)) [ 1008.127427] hfs: invalid session number or type of track [ 1008.152698] hfs: can't find a HFS filesystem on dev loop2 03:11:59 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f00000003c0), 0x6800, &(0x7f0000000580)={[{@session={'session'}}]}) 03:11:59 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e23}, 0x1c) listen(r0, 0x18) r1 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f0000000000)=[@in={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x25}}, @in={0x2, 0x4e23, @local}], 0x20) 03:11:59 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) r1 = syz_open_dev$usb(&(0x7f0000000080)='/dev/bus/usb/00#/00#\x00', 0xfffffffffffffffe, 0x2001) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETQUEUE(r2, 0x400454d9, &(0x7f00000000c0)) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(r1, 0xc0505405, &(0x7f0000000100)={{0x2, 0x1, 0x1000000020000, 0x10002, 0x200}, 0x20}) syz_genetlink_get_family_id$ipvs(&(0x7f0000000440)='IPVS\x00') ioctl$RTC_PLL_GET(0xffffffffffffffff, 0x80207011, &(0x7f0000000480)) getsockopt$bt_BT_SNDMTU(0xffffffffffffffff, 0x112, 0xc, &(0x7f00000005c0)=0x3, &(0x7f0000000640)=0x2) [ 1008.293550] hfs: unable to parse mount options 03:11:59 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000040)="153f6234488dd25d766070") socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup2(r2, r2) sendmsg$netlink(r3, &(0x7f0000028fc8)={0x0, 0x0, &(0x7f0000019000), 0x0, &(0x7f0000000040)=[@rights={0x18, 0x1, 0x1, [r1]}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000000b80)=[{{&(0x7f0000000200)=@l2, 0x80, &(0x7f00000005c0), 0x0, &(0x7f0000000600)=""/84, 0x54}}, {{&(0x7f0000000680)=@l2, 0x80, &(0x7f0000000a40), 0x0, &(0x7f0000000ac0)=""/147, 0x93}, 0x3f00000000000000}], 0x4000000000002ce, 0x62, 0x0) 03:11:59 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x4000000000000, &(0x7f00000003c0), 0x0, &(0x7f0000000580)={[{@session={'session'}}]}) 03:11:59 executing program 3: socket$packet(0x11, 0xa, 0x300) syz_emit_ethernet(0x4e, &(0x7f0000000080)={@local, @broadcast, [{}], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x0, 0x0, @local, @local={0xfe, 0x80, [0xffffdd86]}, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, &(0x7f00000002c0)) 03:12:00 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e23}, 0x1c) listen(r0, 0x18) r1 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f0000000000)=[@in={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x15}}, @in={0x2, 0x4e23, @local}], 0x20) 03:12:00 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f00000003c0), 0x3f000000, &(0x7f0000000580)={[{@session={'session'}}]}) 03:12:00 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000040)="153f6234488dd25d766070") socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup2(r2, r2) sendmsg$netlink(r3, &(0x7f0000028fc8)={0x0, 0x0, &(0x7f0000019000), 0x0, &(0x7f0000000040)=[@rights={0x18, 0x1, 0x1, [r1]}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000000b80)=[{{&(0x7f0000000200)=@l2, 0x80, &(0x7f00000005c0), 0x0, &(0x7f0000000600)=""/84, 0x54}}, {{&(0x7f0000000680)=@l2, 0x80, &(0x7f0000000a40), 0x0, &(0x7f0000000ac0)=""/147, 0x93}, 0x900}], 0x4000000000002ce, 0x62, 0x0) [ 1008.728397] hfs: invalid session number or type of track [ 1008.745766] hfs: can't find a HFS filesystem on dev loop2 03:12:00 executing program 3: socket$packet(0x11, 0xa, 0x300) syz_emit_ethernet(0x4e, &(0x7f0000000080)={@local, @broadcast, [{}], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x0, 0x0, @local, @local={0xfe, 0x80, [0x3c00000000000000]}, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, &(0x7f00000002c0)) [ 1008.925976] hfs: invalid session number or type of track [ 1008.978162] hfs: can't find a HFS filesystem on dev loop2 03:12:00 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) r1 = syz_open_dev$usb(&(0x7f0000000080)='/dev/bus/usb/00#/00#\x00', 0xfffffffffffffffe, 0x2001) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETQUEUE(r2, 0x400454d9, &(0x7f00000000c0)) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(r1, 0xc0505405, &(0x7f0000000100)={{0x2, 0x1, 0x1000000020000, 0x10002, 0x200}, 0x20}) syz_genetlink_get_family_id$ipvs(&(0x7f0000000440)='IPVS\x00') ioctl$RTC_PLL_GET(0xffffffffffffffff, 0x80207011, &(0x7f0000000480)) getsockopt$bt_BT_SNDMTU(0xffffffffffffffff, 0x112, 0xc, &(0x7f00000005c0)=0x3, &(0x7f0000000640)=0x2) 03:12:00 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f00000003c0), 0x700, &(0x7f0000000580)={[{@session={'session'}}]}) 03:12:00 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e23}, 0x1c) listen(r0, 0x18) r1 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f0000000000)=[@in={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0xa}}, @in={0x2, 0x4e23, @local}], 0x20) [ 1009.069399] hfs: unable to parse mount options 03:12:00 executing program 3: socket$packet(0x11, 0xa, 0x300) syz_emit_ethernet(0x4e, &(0x7f0000000080)={@local, @broadcast, [{}], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x0, 0x0, @local, @local={0xfe, 0x80, [0x2f000000]}, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, &(0x7f00000002c0)) 03:12:00 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000040)="153f6234488dd25d766070") socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup2(r2, r2) sendmsg$netlink(r3, &(0x7f0000028fc8)={0x0, 0x0, &(0x7f0000019000), 0x0, &(0x7f0000000040)=[@rights={0x18, 0x1, 0x1, [r1]}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000000b80)=[{{&(0x7f0000000200)=@l2, 0x80, &(0x7f00000005c0), 0x0, &(0x7f0000000600)=""/84, 0x54}}, {{&(0x7f0000000680)=@l2, 0x80, &(0x7f0000000a40), 0x0, &(0x7f0000000ac0)=""/147, 0x93}, 0x6}], 0x4000000000002ce, 0x62, 0x0) 03:12:00 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x7a00000000000000, &(0x7f00000003c0), 0x0, &(0x7f0000000580)={[{@session={'session'}}]}) 03:12:00 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e23}, 0x1c) listen(r0, 0x18) r1 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f0000000000)=[@in={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x6}}, @in={0x2, 0x4e23, @local}], 0x20) 03:12:00 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000040)="153f6234488dd25d766070") socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup2(r2, r2) sendmsg$netlink(r3, &(0x7f0000028fc8)={0x0, 0x0, &(0x7f0000019000), 0x0, &(0x7f0000000040)=[@rights={0x18, 0x1, 0x1, [r1]}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000000b80)=[{{&(0x7f0000000200)=@l2, 0x80, &(0x7f00000005c0), 0x0, &(0x7f0000000600)=""/84, 0x54}}, {{&(0x7f0000000680)=@l2, 0x80, &(0x7f0000000a40), 0x0, &(0x7f0000000ac0)=""/147, 0x93}, 0x7}], 0x4000000000002ce, 0x62, 0x0) [ 1009.436654] hfs: invalid session number or type of track [ 1009.442572] hfs: can't find a HFS filesystem on dev loop2 [ 1009.522294] hfs: invalid session number or type of track [ 1009.562193] hfs: can't find a HFS filesystem on dev loop2 03:12:01 executing program 3: socket$packet(0x11, 0xa, 0x300) syz_emit_ethernet(0x4e, &(0x7f0000000080)={@local, @broadcast, [{}], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x0, 0x0, @local, @local={0xfe, 0x80, [0x3580]}, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, &(0x7f00000002c0)) 03:12:01 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) r1 = syz_open_dev$usb(&(0x7f0000000080)='/dev/bus/usb/00#/00#\x00', 0xfffffffffffffffe, 0x2001) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETQUEUE(r2, 0x400454d9, &(0x7f00000000c0)) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(r1, 0xc0505405, &(0x7f0000000100)={{0x2, 0x1, 0x1000000020000, 0x10002, 0x200}, 0x20}) syz_genetlink_get_family_id$ipvs(&(0x7f0000000440)='IPVS\x00') ioctl$RTC_PLL_GET(0xffffffffffffffff, 0x80207011, &(0x7f0000000480)) 03:12:01 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f00000003c0), 0x5, &(0x7f0000000580)={[{@session={'session'}}]}) 03:12:01 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e23}, 0x1c) listen(r0, 0x18) r1 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f0000000000)=[@in={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x13}}, @in={0x2, 0x4e23, @local}], 0x20) [ 1009.666350] hfs: unable to parse mount options 03:12:01 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000040)="153f6234488dd25d766070") socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup2(r2, r2) sendmsg$netlink(r3, &(0x7f0000028fc8)={0x0, 0x0, &(0x7f0000019000), 0x0, &(0x7f0000000040)=[@rights={0x18, 0x1, 0x1, [r1]}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000000b80)=[{{&(0x7f0000000200)=@l2, 0x80, &(0x7f00000005c0), 0x0, &(0x7f0000000600)=""/84, 0x54}}, {{&(0x7f0000000680)=@l2, 0x80, &(0x7f0000000a40), 0x0, &(0x7f0000000ac0)=""/147, 0x93}, 0x9}], 0x4000000000002ce, 0x62, 0x0) 03:12:01 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x7000000, &(0x7f00000003c0), 0x0, &(0x7f0000000580)={[{@session={'session'}}]}) 03:12:01 executing program 3: socket$packet(0x11, 0xa, 0x300) syz_emit_ethernet(0x4e, &(0x7f0000000080)={@local, @broadcast, [{}], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x0, 0x0, @local, @local={0xfe, 0x80, [0xfffffffffffff000]}, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, &(0x7f00000002c0)) 03:12:01 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000040)="153f6234488dd25d766070") socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup2(r2, r2) sendmsg$netlink(r3, &(0x7f0000028fc8)={0x0, 0x0, &(0x7f0000019000), 0x0, &(0x7f0000000040)=[@rights={0x18, 0x1, 0x1, [r1]}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000000b80)=[{{&(0x7f0000000200)=@l2, 0x80, &(0x7f00000005c0), 0x0, &(0x7f0000000600)=""/84, 0x54}}, {{&(0x7f0000000680)=@l2, 0x80, &(0x7f0000000a40), 0x0, &(0x7f0000000ac0)=""/147, 0x93}, 0x6b6b6b00000000}], 0x4000000000002ce, 0x62, 0x0) 03:12:01 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e23}, 0x1c) listen(r0, 0x18) r1 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f0000000000)=[@in={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x3a}}, @in={0x2, 0x4e23, @local}], 0x20) 03:12:01 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000040)="153f6234488dd25d766070") socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup2(r2, r2) sendmsg$netlink(r3, &(0x7f0000028fc8)={0x0, 0x0, &(0x7f0000019000), 0x0, &(0x7f0000000040)=[@rights={0x18, 0x1, 0x1, [r1]}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000000b80)=[{{&(0x7f0000000200)=@l2, 0x80, &(0x7f00000005c0), 0x0, &(0x7f0000000600)=""/84, 0x54}}, {{&(0x7f0000000680)=@l2, 0x80, &(0x7f0000000a40), 0x0, &(0x7f0000000ac0)=""/147, 0x93}, 0x7000000}], 0x4000000000002ce, 0x62, 0x0) [ 1010.068787] hfs: invalid session number or type of track [ 1010.083433] hfs: can't find a HFS filesystem on dev loop2 03:12:01 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) r1 = syz_open_dev$usb(&(0x7f0000000080)='/dev/bus/usb/00#/00#\x00', 0xfffffffffffffffe, 0x2001) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETQUEUE(r2, 0x400454d9, &(0x7f00000000c0)) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(r1, 0xc0505405, &(0x7f0000000100)={{0x2, 0x1, 0x1000000020000, 0x10002, 0x200}, 0x20}) syz_genetlink_get_family_id$ipvs(&(0x7f0000000440)='IPVS\x00') 03:12:01 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000040)="153f6234488dd25d766070") socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup2(r2, r2) sendmsg$netlink(r3, &(0x7f0000028fc8)={0x0, 0x0, &(0x7f0000019000), 0x0, &(0x7f0000000040)=[@rights={0x18, 0x1, 0x1, [r1]}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000000b80)=[{{&(0x7f0000000200)=@l2, 0x80, &(0x7f00000005c0), 0x0, &(0x7f0000000600)=""/84, 0x54}}, {{&(0x7f0000000680)=@l2, 0x80, &(0x7f0000000a40), 0x0, &(0x7f0000000ac0)=""/147, 0x93}, 0x4000000}], 0x4000000000002ce, 0x62, 0x0) [ 1010.198277] hfs: invalid session number or type of track [ 1010.212857] hfs: can't find a HFS filesystem on dev loop2 03:12:01 executing program 3: socket$packet(0x11, 0xa, 0x300) syz_emit_ethernet(0x4e, &(0x7f0000000080)={@local, @broadcast, [{}], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x0, 0x0, @local, @local={0xfe, 0x80, [0xffffff89]}, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, &(0x7f00000002c0)) 03:12:01 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e23}, 0x1c) listen(r0, 0x18) r1 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f0000000000)=[@in={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x2a}}, @in={0x2, 0x4e23, @local}], 0x20) 03:12:01 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f00000003c0), 0x74, &(0x7f0000000580)={[{@session={'session'}}]}) 03:12:01 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000040)="153f6234488dd25d766070") socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup2(r2, r2) sendmsg$netlink(r3, &(0x7f0000028fc8)={0x0, 0x0, &(0x7f0000019000), 0x0, &(0x7f0000000040)=[@rights={0x18, 0x1, 0x1, [r1]}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000000b80)=[{{&(0x7f0000000200)=@l2, 0x80, &(0x7f00000005c0), 0x0, &(0x7f0000000600)=""/84, 0x54}}, {{&(0x7f0000000680)=@l2, 0x80, &(0x7f0000000a40), 0x0, &(0x7f0000000ac0)=""/147, 0x93}, 0x600}], 0x4000000000002ce, 0x62, 0x0) 03:12:01 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000040)="153f6234488dd25d766070") socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup2(r2, r2) sendmsg$netlink(r3, &(0x7f0000028fc8)={0x0, 0x0, &(0x7f0000019000), 0x0, &(0x7f0000000040)=[@rights={0x18, 0x1, 0x1, [r1]}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000000b80)=[{{&(0x7f0000000200)=@l2, 0x80, &(0x7f00000005c0), 0x0, &(0x7f0000000600)=""/84, 0x54}}, {{&(0x7f0000000680)=@l2, 0x80, &(0x7f0000000a40), 0x0, &(0x7f0000000ac0)=""/147, 0x93}, 0x400000000000000}], 0x4000000000002ce, 0x62, 0x0) [ 1010.487526] hfs: unable to parse mount options 03:12:02 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x60000000, &(0x7f00000003c0), 0x0, &(0x7f0000000580)={[{@session={'session'}}]}) 03:12:02 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000040)="153f6234488dd25d766070") socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup2(r2, r2) sendmsg$netlink(r3, &(0x7f0000028fc8)={0x0, 0x0, &(0x7f0000019000), 0x0, &(0x7f0000000040)=[@rights={0x18, 0x1, 0x1, [r1]}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000000b80)=[{{&(0x7f0000000200)=@l2, 0x80, &(0x7f00000005c0), 0x0, &(0x7f0000000600)=""/84, 0x54}}, {{&(0x7f0000000680)=@l2, 0x80, &(0x7f0000000a40), 0x0, &(0x7f0000000ac0)=""/147, 0x93}, 0x900000000000000}], 0x4000000000002ce, 0x62, 0x0) 03:12:02 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) r1 = syz_open_dev$usb(&(0x7f0000000080)='/dev/bus/usb/00#/00#\x00', 0xfffffffffffffffe, 0x2001) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETQUEUE(r2, 0x400454d9, &(0x7f00000000c0)) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(r1, 0xc0505405, &(0x7f0000000100)={{0x2, 0x1, 0x1000000020000, 0x10002, 0x200}, 0x20}) 03:12:02 executing program 3: socket$packet(0x11, 0xa, 0x300) syz_emit_ethernet(0x4e, &(0x7f0000000080)={@local, @broadcast, [{}], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x0, 0x0, @local, @local={0xfe, 0x80, [0x400000000000000]}, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, &(0x7f00000002c0)) 03:12:02 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f00000003c0), 0xfffffdfc, &(0x7f0000000580)={[{@session={'session'}}]}) 03:12:02 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e23}, 0x1c) listen(r0, 0x18) r1 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f0000000000)=[@in={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0xd}}, @in={0x2, 0x4e23, @local}], 0x20) 03:12:02 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000040)="153f6234488dd25d766070") socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup2(r2, r2) sendmsg$netlink(r3, &(0x7f0000028fc8)={0x0, 0x0, &(0x7f0000019000), 0x0, &(0x7f0000000040)=[@rights={0x18, 0x1, 0x1, [r1]}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000000b80)=[{{&(0x7f0000000200)=@l2, 0x80, &(0x7f00000005c0), 0x0, &(0x7f0000000600)=""/84, 0x54}}, {{&(0x7f0000000680)=@l2, 0x80, &(0x7f0000000a40), 0x0, &(0x7f0000000ac0)=""/147, 0x93}, 0x6b6b6b}], 0x4000000000002ce, 0x62, 0x0) 03:12:02 executing program 3: socket$packet(0x11, 0xa, 0x300) syz_emit_ethernet(0x4e, &(0x7f0000000080)={@local, @broadcast, [{}], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x0, 0x0, @local, @local={0xfe, 0x80, [0x80350000]}, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, &(0x7f00000002c0)) [ 1011.068701] hfs: unable to parse mount options 03:12:02 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000040)="153f6234488dd25d766070") socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup2(r2, r2) sendmsg$netlink(r3, &(0x7f0000028fc8)={0x0, 0x0, &(0x7f0000019000), 0x0, &(0x7f0000000040)=[@rights={0x18, 0x1, 0x1, [r1]}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000000b80)=[{{&(0x7f0000000200)=@l2, 0x80, &(0x7f00000005c0), 0x0, &(0x7f0000000600)=""/84, 0x54}}, {{&(0x7f0000000680)=@l2, 0x80, &(0x7f0000000a40), 0x0, &(0x7f0000000ac0)=""/147, 0x93}, 0x700000000000000}], 0x4000000000002ce, 0x62, 0x0) 03:12:02 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) syz_open_dev$usb(&(0x7f0000000080)='/dev/bus/usb/00#/00#\x00', 0xfffffffffffffffe, 0x2001) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETQUEUE(r1, 0x400454d9, &(0x7f00000000c0)) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) 03:12:02 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0xe0000, &(0x7f00000003c0), 0x0, &(0x7f0000000580)={[{@session={'session'}}]}) 03:12:02 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f00000003c0), 0x6800000000000000, &(0x7f0000000580)={[{@session={'session'}}]}) 03:12:02 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e23}, 0x1c) listen(r0, 0x18) r1 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f0000000000)=[@in={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x34}}, @in={0x2, 0x4e23, @local}], 0x20) 03:12:02 executing program 3: socket$packet(0x11, 0xa, 0x300) syz_emit_ethernet(0x4e, &(0x7f0000000080)={@local, @broadcast, [{}], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x0, 0x0, @local, @local={0xfe, 0x80, [0x800e0000]}, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, &(0x7f00000002c0)) 03:12:02 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000040)="153f6234488dd25d766070") socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup2(r2, r2) sendmsg$netlink(r3, &(0x7f0000028fc8)={0x0, 0x0, &(0x7f0000019000), 0x0, &(0x7f0000000040)=[@rights={0x18, 0x1, 0x1, [r1]}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000000b80)=[{{&(0x7f0000000200)=@l2, 0x80, &(0x7f00000005c0), 0x0, &(0x7f0000000600)=""/84, 0x54}}, {{&(0x7f0000000680)=@l2, 0x80, &(0x7f0000000a40), 0x0, &(0x7f0000000ac0)=""/147, 0x93}, 0x8000000}], 0x4000000000002ce, 0x62, 0x0) [ 1011.698185] hfs: unable to parse mount options 03:12:03 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) syz_open_dev$usb(&(0x7f0000000080)='/dev/bus/usb/00#/00#\x00', 0xfffffffffffffffe, 0x2001) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETQUEUE(r1, 0x400454d9, &(0x7f00000000c0)) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) 03:12:03 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e23}, 0x1c) listen(r0, 0x18) r1 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f0000000000)=[@in={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x2c}}, @in={0x2, 0x4e23, @local}], 0x20) 03:12:03 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f00000003c0), 0x97ffffff, &(0x7f0000000580)={[{@session={'session'}}]}) 03:12:03 executing program 3: socket$packet(0x11, 0xa, 0x300) syz_emit_ethernet(0x4e, &(0x7f0000000080)={@local, @broadcast, [{}], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x0, 0x0, @local, @local={0xfe, 0x80, [0x2c00]}, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, &(0x7f00000002c0)) 03:12:03 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000040)="153f6234488dd25d766070") socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup2(r2, r2) sendmsg$netlink(r3, &(0x7f0000028fc8)={0x0, 0x0, &(0x7f0000019000), 0x0, &(0x7f0000000040)=[@rights={0x18, 0x1, 0x1, [r1]}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000000b80)=[{{&(0x7f0000000200)=@l2, 0x80, &(0x7f00000005c0), 0x0, &(0x7f0000000600)=""/84, 0x54}}, {{&(0x7f0000000680)=@l2, 0x80, &(0x7f0000000a40), 0x0, &(0x7f0000000ac0)=""/147, 0x93}, 0x9000000}], 0x4000000000002ce, 0x62, 0x0) 03:12:03 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x7400, &(0x7f00000003c0), 0x0, &(0x7f0000000580)={[{@session={'session'}}]}) 03:12:03 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e23}, 0x1c) listen(r0, 0x18) r1 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f0000000000)=[@in={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x41}}, @in={0x2, 0x4e23, @local}], 0x20) 03:12:03 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000040)="153f6234488dd25d766070") socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup2(r2, r2) sendmsg$netlink(r3, &(0x7f0000028fc8)={0x0, 0x0, &(0x7f0000019000), 0x0, &(0x7f0000000040)=[@rights={0x18, 0x1, 0x1, [r1]}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000000b80)=[{{&(0x7f0000000200)=@l2, 0x80, &(0x7f00000005c0), 0x0, &(0x7f0000000600)=""/84, 0x54}}, {{&(0x7f0000000680)=@l2, 0x80, &(0x7f0000000a40), 0x0, &(0x7f0000000ac0)=""/147, 0x93}, 0x3f00}], 0x4000000000002ce, 0x62, 0x0) 03:12:03 executing program 3: socket$packet(0x11, 0xa, 0x300) syz_emit_ethernet(0x4e, &(0x7f0000000080)={@local, @broadcast, [{}], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x0, 0x0, @local, @local={0xfe, 0x80, [0xffffa888]}, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, &(0x7f00000002c0)) 03:12:03 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) syz_open_dev$usb(&(0x7f0000000080)='/dev/bus/usb/00#/00#\x00', 0xfffffffffffffffe, 0x2001) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) 03:12:03 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f00000003c0), 0x3, &(0x7f0000000580)={[{@session={'session'}}]}) [ 1012.299071] hfs: unable to parse mount options 03:12:03 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000040)="153f6234488dd25d766070") socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup2(r2, r2) sendmsg$netlink(r3, &(0x7f0000028fc8)={0x0, 0x0, &(0x7f0000019000), 0x0, &(0x7f0000000040)=[@rights={0x18, 0x1, 0x1, [r1]}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000000b80)=[{{&(0x7f0000000200)=@l2, 0x80, &(0x7f00000005c0), 0x0, &(0x7f0000000600)=""/84, 0x54}}, {{&(0x7f0000000680)=@l2, 0x80, &(0x7f0000000a40), 0x0, &(0x7f0000000ac0)=""/147, 0x93}, 0x8000000000000000}], 0x4000000000002ce, 0x62, 0x0) 03:12:03 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0xfffffffd, &(0x7f00000003c0), 0x0, &(0x7f0000000580)={[{@session={'session'}}]}) 03:12:03 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e23}, 0x1c) listen(r0, 0x18) r1 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f0000000000)=[@in={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x10}}, @in={0x2, 0x4e23, @local}], 0x20) 03:12:04 executing program 3: socket$packet(0x11, 0xa, 0x300) syz_emit_ethernet(0x4e, &(0x7f0000000080)={@local, @broadcast, [{}], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x0, 0x0, @local, @local={0xfe, 0x80, [0xfffff000]}, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, &(0x7f00000002c0)) 03:12:04 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000040)="153f6234488dd25d766070") socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup2(r2, r2) sendmsg$netlink(r3, &(0x7f0000028fc8)={0x0, 0x0, &(0x7f0000019000), 0x0, &(0x7f0000000040)=[@rights={0x18, 0x1, 0x1, [r1]}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000000b80)=[{{&(0x7f0000000200)=@l2, 0x80, &(0x7f00000005c0), 0x0, &(0x7f0000000600)=""/84, 0x54}}, {{&(0x7f0000000680)=@l2, 0x80, &(0x7f0000000a40), 0x0, &(0x7f0000000ac0)=""/147, 0x93}, 0x3f000000}], 0x4000000000002ce, 0x62, 0x0) [ 1012.624840] hfs: invalid session number or type of track [ 1012.638737] hfs: can't find a HFS filesystem on dev loop2 03:12:04 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000040)="153f6234488dd25d766070") socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup2(r2, r2) sendmsg$netlink(r3, &(0x7f0000028fc8)={0x0, 0x0, &(0x7f0000019000), 0x0, &(0x7f0000000040)=[@rights={0x18, 0x1, 0x1, [r1]}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000000b80)=[{{&(0x7f0000000200)=@l2, 0x80, &(0x7f00000005c0), 0x0, &(0x7f0000000600)=""/84, 0x54}}, {{&(0x7f0000000680)=@l2, 0x80, &(0x7f0000000a40), 0x0, &(0x7f0000000ac0)=""/147, 0x93}, 0x40000}], 0x4000000000002ce, 0x62, 0x0) [ 1012.792964] hfs: invalid session number or type of track 03:12:04 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) syz_open_dev$usb(&(0x7f0000000080)='/dev/bus/usb/00#/00#\x00', 0xfffffffffffffffe, 0x2001) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) [ 1012.839082] hfs: can't find a HFS filesystem on dev loop2 03:12:04 executing program 3: socket$packet(0x11, 0xa, 0x300) syz_emit_ethernet(0x4e, &(0x7f0000000080)={@local, @broadcast, [{}], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x0, 0x0, @local, @local={0xfe, 0x80, [0x89060000]}, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, &(0x7f00000002c0)) [ 1012.893676] hfs: unable to parse mount options 03:12:04 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e23}, 0x1c) listen(r0, 0x18) r1 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f0000000000)=[@in={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x4}}, @in={0x2, 0x4e23, @local}], 0x20) 03:12:04 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f00000003c0), 0xc77, &(0x7f0000000580)={[{@session={'session'}}]}) 03:12:04 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000040)="153f6234488dd25d766070") socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup2(r2, r2) sendmsg$netlink(r3, &(0x7f0000028fc8)={0x0, 0x0, &(0x7f0000019000), 0x0, &(0x7f0000000040)=[@rights={0x18, 0x1, 0x1, [r1]}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000000b80)=[{{&(0x7f0000000200)=@l2, 0x80, &(0x7f00000005c0), 0x0, &(0x7f0000000600)=""/84, 0x54}}, {{&(0x7f0000000680)=@l2, 0x80, &(0x7f0000000a40), 0x0, &(0x7f0000000ac0)=""/147, 0x93}, 0x700}], 0x4000000000002ce, 0x62, 0x0) 03:12:04 executing program 3: socket$packet(0x11, 0xa, 0x300) syz_emit_ethernet(0x4e, &(0x7f0000000080)={@local, @broadcast, [{}], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x0, 0x0, @local, @local={0xfe, 0x80, [0x88caffff]}, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, &(0x7f00000002c0)) 03:12:04 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000040)="153f6234488dd25d766070") socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup2(r2, r2) sendmsg$netlink(r3, &(0x7f0000028fc8)={0x0, 0x0, &(0x7f0000019000), 0x0, &(0x7f0000000040)=[@rights={0x18, 0x1, 0x1, [r1]}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000000b80)=[{{&(0x7f0000000200)=@l2, 0x80, &(0x7f00000005c0), 0x0, &(0x7f0000000600)=""/84, 0x54}}, {{&(0x7f0000000680)=@l2, 0x80, &(0x7f0000000a40), 0x0, &(0x7f0000000ac0)=""/147, 0x93}, 0x0}], 0x4000000000002ce, 0x62, 0x0) 03:12:04 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x2, &(0x7f00000003c0), 0x0, &(0x7f0000000580)={[{@session={'session'}}]}) 03:12:04 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000040)="153f6234488dd25d766070") socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup2(r2, r2) sendmsg$netlink(r3, &(0x7f0000028fc8)={0x0, 0x0, &(0x7f0000019000), 0x0, &(0x7f0000000040)=[@rights={0x18, 0x1, 0x1, [r1]}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000000b80)=[{{&(0x7f0000000200)=@l2, 0x80, &(0x7f00000005c0), 0x0, &(0x7f0000000600)=""/84, 0x54}}, {{&(0x7f0000000680)=@l2, 0x80, &(0x7f0000000a40), 0x0, &(0x7f0000000ac0)=""/147, 0x93}, 0x0}], 0x4000000000002ce, 0x62, 0x0) 03:12:04 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) syz_open_dev$usb(&(0x7f0000000080)='/dev/bus/usb/00#/00#\x00', 0xfffffffffffffffe, 0x2001) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) 03:12:04 executing program 3: socket$packet(0x11, 0xa, 0x300) syz_emit_ethernet(0x4e, &(0x7f0000000080)={@local, @broadcast, [{}], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x0, 0x0, @local, @local={0xfe, 0x80, [0x8100]}, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, &(0x7f00000002c0)) 03:12:04 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e23}, 0x1c) listen(r0, 0x18) r1 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f0000000000)=[@in={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0xe}}, @in={0x2, 0x4e23, @local}], 0x20) 03:12:04 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f00000003c0), 0x9000000, &(0x7f0000000580)={[{@session={'session'}}]}) [ 1013.493245] hfs: invalid session number or type of track [ 1013.535902] hfs: can't find a HFS filesystem on dev loop4 03:12:05 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000040)="153f6234488dd25d766070") socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup2(r2, r2) sendmsg$netlink(r3, &(0x7f0000028fc8)={0x0, 0x0, &(0x7f0000019000), 0x0, &(0x7f0000000040)=[@rights={0x18, 0x1, 0x1, [r1]}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000000b80)=[{{&(0x7f0000000200)=@l2, 0x80, &(0x7f00000005c0), 0x0, &(0x7f0000000600)=""/84, 0x54}}, {{&(0x7f0000000680)=@l2, 0x80, &(0x7f0000000a40), 0x0, &(0x7f0000000ac0)=""/147, 0x93}, 0x0}], 0x4000000000002ce, 0x62, 0x0) 03:12:05 executing program 3: socket$packet(0x11, 0xa, 0x300) syz_emit_ethernet(0x4e, &(0x7f0000000080)={@local, @broadcast, [{}], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x0, 0x0, @local, @local={0xfe, 0x80, [0x4]}, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, &(0x7f00000002c0)) 03:12:05 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e23}, 0x1c) listen(r0, 0x18) r1 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f0000000000)=[@in={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0xe0}}, @in={0x2, 0x4e23, @local}], 0x20) [ 1013.875965] hfs: invalid session number or type of track [ 1013.881766] hfs: can't find a HFS filesystem on dev loop4 [ 1013.883887] hfs: invalid session number or type of track [ 1013.894710] hfs: can't find a HFS filesystem on dev loop2 03:12:05 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) syz_open_dev$usb(&(0x7f0000000080)='/dev/bus/usb/00#/00#\x00', 0xfffffffffffffffe, 0x2001) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) 03:12:05 executing program 3: socket$packet(0x11, 0xa, 0x300) syz_emit_ethernet(0x4e, &(0x7f0000000080)={@local, @broadcast, [{}], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x0, 0x0, @local, @local={0xfe, 0x80, [0x8035000000000000]}, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, &(0x7f00000002c0)) 03:12:05 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x600000000000000, &(0x7f00000003c0), 0x0, &(0x7f0000000580)={[{@session={'session'}}]}) [ 1014.029314] hfs: invalid session number or type of track [ 1014.087737] hfs: can't find a HFS filesystem on dev loop2 03:12:05 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e23}, 0x1c) listen(r0, 0x18) r1 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f0000000000)=[@in={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x3e}}, @in={0x2, 0x4e23, @local}], 0x20) 03:12:05 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000040)="153f6234488dd25d766070") socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup2(r2, r2) sendmsg$netlink(r3, &(0x7f0000028fc8)={0x0, 0x0, &(0x7f0000019000), 0x0, &(0x7f0000000040)=[@rights={0x18, 0x1, 0x1, [r1]}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000000b80)=[{{&(0x7f0000000200)=@l2, 0x80, &(0x7f00000005c0), 0x0, &(0x7f0000000600)=""/84, 0x54}}, {{&(0x7f0000000680)=@l2, 0x80, &(0x7f0000000a40), 0x0, &(0x7f0000000ac0)=""/147, 0x93}, 0x0}], 0x4000000000002ce, 0x62, 0x0) 03:12:05 executing program 3: socket$packet(0x11, 0xa, 0x300) syz_emit_ethernet(0x4e, &(0x7f0000000080)={@local, @broadcast, [{}], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x0, 0x0, @local, @local={0xfe, 0x80, [0x100000000000000]}, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, &(0x7f00000002c0)) 03:12:05 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000040)="153f6234488dd25d766070") socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup2(r2, r2) sendmsg$netlink(r3, &(0x7f0000028fc8)={0x0, 0x0, &(0x7f0000019000), 0x0, &(0x7f0000000040)=[@rights={0x18, 0x1, 0x1, [r1]}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000000b80)=[{{&(0x7f0000000200)=@l2, 0x80, &(0x7f00000005c0), 0x0, &(0x7f0000000600)=""/84, 0x54}}, {{&(0x7f0000000680)=@l2, 0x80, &(0x7f0000000a40), 0x0, &(0x7f0000000ac0)=""/147, 0x93}, 0x0}], 0x4000000000002ce, 0x62, 0x0) 03:12:05 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f00000003c0), 0x48000000, &(0x7f0000000580)={[{@session={'session'}}]}) 03:12:05 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) syz_open_dev$usb(&(0x7f0000000080)='/dev/bus/usb/00#/00#\x00', 0xfffffffffffffffe, 0x2001) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) [ 1014.383878] hfs: unable to parse mount options 03:12:06 executing program 3: socket$packet(0x11, 0xa, 0x300) syz_emit_ethernet(0x4e, &(0x7f0000000080)={@local, @broadcast, [{}], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x0, 0x0, @local, @local={0xfe, 0x80, [0x6000]}, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, &(0x7f00000002c0)) [ 1014.569328] hfs: invalid session number or type of track 03:12:06 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x3f00000000000000, &(0x7f00000003c0), 0x0, &(0x7f0000000580)={[{@session={'session'}}]}) 03:12:06 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000040)="153f6234488dd25d766070") socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup2(r2, r2) sendmsg$netlink(r3, &(0x7f0000028fc8)={0x0, 0x0, &(0x7f0000019000), 0x0, &(0x7f0000000040)=[@rights={0x18, 0x1, 0x1, [r1]}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000000b80)=[{{&(0x7f0000000200)=@l2, 0x80, &(0x7f00000005c0), 0x0, &(0x7f0000000600)=""/84, 0x54}}, {{&(0x7f0000000680)=@l2, 0x80, &(0x7f0000000a40), 0x0, &(0x7f0000000ac0)=""/147, 0x93}, 0x0}], 0x4000000000002ce, 0x62, 0x0) 03:12:06 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e23}, 0x1c) listen(r0, 0x18) r1 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f0000000000)=[@in={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x26}}, @in={0x2, 0x4e23, @local}], 0x20) [ 1014.667862] hfs: can't find a HFS filesystem on dev loop2 03:12:06 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000040)="153f6234488dd25d766070") socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup2(r2, r2) sendmsg$netlink(r3, &(0x7f0000028fc8)={0x0, 0x0, &(0x7f0000019000), 0x0, &(0x7f0000000040)=[@rights={0x18, 0x1, 0x1, [r1]}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000000b80)=[{{&(0x7f0000000200)=@l2, 0x80, &(0x7f00000005c0), 0x0, &(0x7f0000000600)=""/84, 0x54}}, {{&(0x7f0000000680)=@l2, 0x80, &(0x7f0000000a40), 0x0, &(0x7f0000000ac0)=""/147, 0x93}, 0x0}], 0x4000000000002ce, 0x62, 0x0) 03:12:06 executing program 3: socket$packet(0x11, 0xa, 0x300) syz_emit_ethernet(0x4e, &(0x7f0000000080)={@local, @broadcast, [{}], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x0, 0x0, @local, @local={0xfe, 0x80, [0xc]}, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, &(0x7f00000002c0)) 03:12:06 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000040)="153f6234488dd25d766070") socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup2(r2, r2) sendmsg$netlink(r3, &(0x7f0000028fc8)={0x0, 0x0, &(0x7f0000019000), 0x0, &(0x7f0000000040)=[@rights={0x18, 0x1, 0x1, [r1]}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000000b80)=[{{&(0x7f0000000200)=@l2, 0x80, &(0x7f00000005c0), 0x0, &(0x7f0000000600)=""/84, 0x54}}, {{&(0x7f0000000680)=@l2, 0x80, &(0x7f0000000a40), 0x0, &(0x7f0000000ac0)=""/147, 0x93}, 0x0}], 0x4000000000002ce, 0x62, 0x0) [ 1014.911579] hfs: invalid session number or type of track [ 1014.926305] hfs: can't find a HFS filesystem on dev loop2 03:12:06 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) 03:12:06 executing program 3: socket$packet(0x11, 0xa, 0x300) syz_emit_ethernet(0x4e, &(0x7f0000000080)={@local, @broadcast, [{}], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x0, 0x0, @local, @local={0xfe, 0x80, [0x8864]}, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, &(0x7f00000002c0)) 03:12:06 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e23}, 0x1c) listen(r0, 0x18) r1 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f0000000000)=[@in={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x2}}, @in={0x2, 0x4e23, @local}], 0x20) 03:12:06 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f00000003c0), 0xffffff8c, &(0x7f0000000580)={[{@session={'session'}}]}) 03:12:06 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000040)="153f6234488dd25d766070") socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup2(r2, r2) sendmsg$netlink(r3, &(0x7f0000028fc8)={0x0, 0x0, &(0x7f0000019000), 0x0, &(0x7f0000000040)=[@rights={0x18, 0x1, 0x1, [r1]}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000000b80)=[{{&(0x7f0000000200)=@l2, 0x80, &(0x7f00000005c0), 0x0, &(0x7f0000000600)=""/84, 0x54}}, {{&(0x7f0000000680)=@l2, 0x80, &(0x7f0000000a40), 0x0, &(0x7f0000000ac0)=""/147, 0x93}, 0x0}], 0x4000000000002ce, 0x62, 0x0) 03:12:06 executing program 3: socket$packet(0x11, 0xa, 0x300) syz_emit_ethernet(0x4e, &(0x7f0000000080)={@local, @broadcast, [{}], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x0, 0x0, @local, @local={0xfe, 0x80, [0x608]}, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, &(0x7f00000002c0)) [ 1015.375165] hfs: unable to parse mount options 03:12:06 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x900000000000000, &(0x7f00000003c0), 0x0, &(0x7f0000000580)={[{@session={'session'}}]}) 03:12:06 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e23}, 0x1c) listen(r0, 0x18) r1 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f0000000000)=[@in={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x5}}, @in={0x2, 0x4e23, @local}], 0x20) 03:12:06 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000040)="153f6234488dd25d766070") socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup2(r2, r2) sendmsg$netlink(r3, &(0x7f0000028fc8)={0x0, 0x0, &(0x7f0000019000), 0x0, &(0x7f0000000040)=[@rights={0x18, 0x1, 0x1, [r1]}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000000b80)=[{{&(0x7f0000000200)=@l2, 0x80, &(0x7f00000005c0), 0x0, &(0x7f0000000600)=""/84, 0x54}}, {{&(0x7f0000000680)=@l2, 0x80, &(0x7f0000000a40), 0x0, &(0x7f0000000ac0)=""/147, 0x93}, 0x0}], 0x4000000000002ce, 0x62, 0x0) 03:12:06 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) 03:12:07 executing program 3: socket$packet(0x11, 0xa, 0x300) syz_emit_ethernet(0x4e, &(0x7f0000000080)={@local, @broadcast, [{}], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x0, 0x0, @local, @local={0xfe, 0x80, [0x5]}, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, &(0x7f00000002c0)) 03:12:07 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e23}, 0x1c) listen(r0, 0x18) r1 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f0000000000)=[@in={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1c}}, @in={0x2, 0x4e23, @local}], 0x20) 03:12:07 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f00000003c0), 0xfffffffd, &(0x7f0000000580)={[{@session={'session'}}]}) 03:12:07 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000040)="153f6234488dd25d766070") socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup2(r2, r2) sendmsg$netlink(r3, &(0x7f0000028fc8)={0x0, 0x0, &(0x7f0000019000), 0x0, &(0x7f0000000040)=[@rights={0x18, 0x1, 0x1, [r1]}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000000b80)=[{{&(0x7f0000000200)=@l2, 0x80, &(0x7f00000005c0), 0x0, &(0x7f0000000600)=""/84, 0x54}}, {{&(0x7f0000000680)=@l2, 0x80, &(0x7f0000000a40), 0x0, &(0x7f0000000ac0)=""/147, 0x93}, 0x0}], 0x4000000000002ce, 0x62, 0x0) [ 1015.856614] hfs: unable to parse mount options 03:12:07 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) 03:12:07 executing program 3: socket$packet(0x11, 0xa, 0x300) syz_emit_ethernet(0x4e, &(0x7f0000000080)={@local, @broadcast, [{}], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x0, 0x0, @local, @local={0xfe, 0x80, [0xc000000]}, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, &(0x7f00000002c0)) 03:12:07 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x8cffffff, &(0x7f00000003c0), 0x0, &(0x7f0000000580)={[{@session={'session'}}]}) 03:12:07 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) 03:12:07 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e23}, 0x1c) listen(r0, 0x18) r1 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f0000000000)=[@in={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x23}}, @in={0x2, 0x4e23, @local}], 0x20) 03:12:07 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f00000003c0), 0x6000000000000000, &(0x7f0000000580)={[{@session={'session'}}]}) 03:12:07 executing program 3: socket$packet(0x11, 0xa, 0x300) syz_emit_ethernet(0x4e, &(0x7f0000000080)={@local, @broadcast, [{}], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x0, 0x0, @local, @local={0xfe, 0x80, [0x600000000000000]}, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, &(0x7f00000002c0)) 03:12:07 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000040)="153f6234488dd25d766070") socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup2(r2, r2) sendmsg$netlink(r3, &(0x7f0000028fc8)={0x0, 0x0, &(0x7f0000019000), 0x0, &(0x7f0000000040)=[@rights={0x18, 0x1, 0x1, [r1]}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000000b80)=[{{&(0x7f0000000200)=@l2, 0x80, &(0x7f00000005c0), 0x0, &(0x7f0000000600)=""/84, 0x54}}, {{&(0x7f0000000680)=@l2, 0x80, &(0x7f0000000a40), 0x0, &(0x7f0000000ac0)=""/147, 0x93}, 0x0}], 0x4000000000002ce, 0x62, 0x0) 03:12:07 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e23}, 0x1c) listen(r0, 0x18) r1 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f0000000000)=[@in={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x8}}, @in={0x2, 0x4e23, @local}], 0x20) 03:12:07 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000040)="153f6234488dd25d766070") socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup2(r2, r2) sendmsg$netlink(r3, &(0x7f0000028fc8)={0x0, 0x0, &(0x7f0000019000), 0x0, &(0x7f0000000040)=[@rights={0x18, 0x1, 0x1, [r1]}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000000b80)=[{{&(0x7f0000000200)=@l2, 0x80, &(0x7f00000005c0), 0x0, &(0x7f0000000600)=""/84, 0x54}}, {{&(0x7f0000000680)=@l2, 0x80, &(0x7f0000000a40), 0x0, &(0x7f0000000ac0)=""/147, 0x93}, 0x0}], 0x4000000000002ce, 0x62, 0x0) 03:12:07 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000040)="153f6234488dd25d766070") socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup2(r2, r2) sendmsg$netlink(r3, &(0x7f0000028fc8)={0x0, 0x0, &(0x7f0000019000), 0x0, &(0x7f0000000040)=[@rights={0x18, 0x1, 0x1, [r1]}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000000b80)=[{{&(0x7f0000000200)=@l2, 0x80, &(0x7f00000005c0), 0x0, &(0x7f0000000600)=""/84, 0x54}}, {{&(0x7f0000000680)=@l2, 0x80, &(0x7f0000000a40), 0x0, &(0x7f0000000ac0)=""/147, 0x93}, 0x0}], 0x4000000000002ce, 0x62, 0x0) 03:12:08 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000040)="153f6234488dd25d766070") socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup2(r2, r2) sendmsg$netlink(r3, &(0x7f0000028fc8)={0x0, 0x0, &(0x7f0000019000), 0x0, &(0x7f0000000040)=[@rights={0x18, 0x1, 0x1, [r1]}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000000b80)=[{{&(0x7f0000000200)=@l2, 0x80, &(0x7f00000005c0), 0x0, &(0x7f0000000600)=""/84, 0x54}}, {{&(0x7f0000000680)=@l2, 0x80, &(0x7f0000000a40), 0x0, &(0x7f0000000ac0)=""/147, 0x93}, 0x0}], 0x4000000000002ce, 0x62, 0x0) [ 1016.654495] hfs: unable to parse mount options 03:12:08 executing program 3: socket$packet(0x11, 0xa, 0x300) syz_emit_ethernet(0x4e, &(0x7f0000000080)={@local, @broadcast, [{}], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x0, 0x0, @local, @local={0xfe, 0x80, [0x3c00]}, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, &(0x7f00000002c0)) 03:12:08 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0x0) 03:12:08 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x6800, &(0x7f00000003c0), 0x0, &(0x7f0000000580)={[{@session={'session'}}]}) 03:12:08 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f00000003c0), 0x6c000000, &(0x7f0000000580)={[{@session={'session'}}]}) 03:12:08 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000040)="153f6234488dd25d766070") socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup2(r2, r2) sendmsg$netlink(r3, &(0x7f0000028fc8)={0x0, 0x0, &(0x7f0000019000), 0x0, &(0x7f0000000040)=[@rights={0x18, 0x1, 0x1, [r1]}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000000b80)=[{{&(0x7f0000000200)=@l2, 0x80, &(0x7f00000005c0), 0x0, &(0x7f0000000600)=""/84, 0x54}}, {{&(0x7f0000000680)=@l2, 0x80, &(0x7f0000000a40), 0x0, &(0x7f0000000ac0)=""/147, 0x93}, 0x0}], 0x4000000000002ce, 0x62, 0x0) 03:12:08 executing program 3: socket$packet(0x11, 0xa, 0x300) syz_emit_ethernet(0x4e, &(0x7f0000000080)={@local, @broadcast, [{}], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x0, 0x0, @local, @local={0xfe, 0x80, [0x2b]}, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, &(0x7f00000002c0)) 03:12:08 executing program 1: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) 03:12:08 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e23}, 0x1c) listen(r0, 0x18) r1 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f0000000000)=[@in={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x32}}, @in={0x2, 0x4e23, @local}], 0x20) [ 1017.058495] hfs: invalid session number or type of track [ 1017.109665] hfs: can't find a HFS filesystem on dev loop2 03:12:08 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000040)="153f6234488dd25d766070") socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup2(r2, r2) sendmsg$netlink(r3, &(0x7f0000028fc8)={0x0, 0x0, &(0x7f0000019000), 0x0, &(0x7f0000000040)=[@rights={0x18, 0x1, 0x1, [r1]}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000000b80)=[{{&(0x7f0000000200)=@l2, 0x80, &(0x7f00000005c0), 0x0, &(0x7f0000000600)=""/84, 0x54}}, {{&(0x7f0000000680)=@l2, 0x80, &(0x7f0000000a40), 0x0, &(0x7f0000000ac0)=""/147, 0x93}, 0x0}], 0x4000000000002ce, 0x62, 0x0) 03:12:08 executing program 3: socket$packet(0x11, 0xa, 0x300) syz_emit_ethernet(0x4e, &(0x7f0000000080)={@local, @broadcast, [{}], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x0, 0x0, @local, @local={0xfe, 0x80, [0x8847000000000000]}, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, &(0x7f00000002c0)) [ 1017.324108] hfs: unable to parse mount options 03:12:08 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000040)="153f6234488dd25d766070") socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup2(r2, r2) sendmsg$netlink(r3, &(0x7f0000028fc8)={0x0, 0x0, &(0x7f0000019000), 0x0, &(0x7f0000000040)=[@rights={0x18, 0x1, 0x1, [r1]}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000000b80)=[{{&(0x7f0000000200)=@l2, 0x80, &(0x7f00000005c0), 0x0, &(0x7f0000000600)=""/84, 0x54}}, {{&(0x7f0000000680)=@l2, 0x80, &(0x7f0000000a40), 0x0, &(0x7f0000000ac0)=""/147, 0x93}, 0x0}], 0x4000000000002ce, 0x62, 0x0) 03:12:08 executing program 1: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) 03:12:08 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f00000003c0), 0x4000000000000000, &(0x7f0000000580)={[{@session={'session'}}]}) 03:12:08 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e23}, 0x1c) listen(r0, 0x18) r1 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f0000000000)=[@in={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x30}}, @in={0x2, 0x4e23, @local}], 0x20) 03:12:08 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0xfffffdfc, &(0x7f00000003c0), 0x0, &(0x7f0000000580)={[{@session={'session'}}]}) 03:12:09 executing program 1: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) 03:12:09 executing program 3: socket$packet(0x11, 0xa, 0x300) syz_emit_ethernet(0x4e, &(0x7f0000000080)={@local, @broadcast, [{}], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x0, 0x0, @local, @local={0xfe, 0x80, [0x500]}, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, &(0x7f00000002c0)) 03:12:09 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e23}, 0x1c) listen(r0, 0x18) r1 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f0000000000)=[@in={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x9}}, @in={0x2, 0x4e23, @local}], 0x20) 03:12:09 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f00000003c0), 0xf6ffffff00000000, &(0x7f0000000580)={[{@session={'session'}}]}) 03:12:09 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000040)="153f6234488dd25d766070") socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup2(r2, r2) sendmsg$netlink(r3, &(0x7f0000028fc8)={0x0, 0x0, &(0x7f0000019000), 0x0, &(0x7f0000000040)=[@rights={0x18, 0x1, 0x1, [r1]}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000000b80)=[{{&(0x7f0000000200)=@l2, 0x80, &(0x7f00000005c0), 0x0, &(0x7f0000000600)=""/84, 0x54}}, {{&(0x7f0000000680)=@l2, 0x80, &(0x7f0000000a40), 0x0, &(0x7f0000000ac0)=""/147, 0x93}, 0x0}], 0x4000000000002ce, 0x62, 0x0) 03:12:09 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000040)="153f6234488dd25d766070") socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup2(r2, r2) sendmsg$netlink(r3, &(0x7f0000028fc8)={0x0, 0x0, &(0x7f0000019000), 0x0, &(0x7f0000000040)=[@rights={0x18, 0x1, 0x1, [r1]}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000000b80)=[{{&(0x7f0000000200)=@l2, 0x80, &(0x7f00000005c0), 0x0, &(0x7f0000000600)=""/84, 0x54}}, {{&(0x7f0000000680)=@l2, 0x80, &(0x7f0000000a40), 0x0, &(0x7f0000000ac0)=""/147, 0x93}, 0x0}], 0x4000000000002ce, 0x62, 0x0) 03:12:09 executing program 3: socket$packet(0x11, 0xa, 0x300) syz_emit_ethernet(0x4e, &(0x7f0000000080)={@local, @broadcast, [{}], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x0, 0x0, @local, @local={0xfe, 0x80, [0x8035]}, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, &(0x7f00000002c0)) [ 1017.912356] hfs: unable to parse mount options 03:12:09 executing program 1: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) 03:12:09 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x4c, &(0x7f00000003c0), 0x0, &(0x7f0000000580)={[{@session={'session'}}]}) 03:12:09 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e23}, 0x1c) listen(r0, 0x18) r1 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f0000000000)=[@in={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x18}}, @in={0x2, 0x4e23, @local}], 0x20) [ 1018.169753] hfs: unable to parse mount options 03:12:09 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f00000003c0), 0x400000000000000, &(0x7f0000000580)={[{@session={'session'}}]}) 03:12:09 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000040)="153f6234488dd25d766070") socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup2(r2, r2) sendmsg$netlink(r3, &(0x7f0000028fc8)={0x0, 0x0, &(0x7f0000019000), 0x0, &(0x7f0000000040)=[@rights={0x18, 0x1, 0x1, [r1]}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000000b80)=[{{&(0x7f0000000200)=@l2, 0x80, &(0x7f00000005c0), 0x0, &(0x7f0000000600)=""/84, 0x54}}, {{&(0x7f0000000680)=@l2, 0x80, &(0x7f0000000a40), 0x0, &(0x7f0000000ac0)=""/147, 0x93}, 0x0}], 0x4000000000002ce, 0x62, 0x0) 03:12:09 executing program 3: socket$packet(0x11, 0xa, 0x300) syz_emit_ethernet(0x4e, &(0x7f0000000080)={@local, @broadcast, [{}], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x0, 0x0, @local, @local={0xfe, 0x80, [0xd]}, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, &(0x7f00000002c0)) 03:12:09 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1000000000, &(0x7f00000003c0), 0x0, &(0x7f0000000580)={[{@session={'session'}}]}) 03:12:09 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000040)="153f6234488dd25d766070") socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup2(r2, r2) sendmsg$netlink(r3, &(0x7f0000028fc8)={0x0, 0x0, &(0x7f0000019000), 0x0, &(0x7f0000000040)=[@rights={0x18, 0x1, 0x1, [r1]}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000000b80)=[{{&(0x7f0000000200)=@l2, 0x80, &(0x7f00000005c0), 0x0, &(0x7f0000000600)=""/84, 0x54}}, {{&(0x7f0000000680)=@l2, 0x80, &(0x7f0000000a40), 0x0, &(0x7f0000000ac0)=""/147, 0x93}, 0x0}], 0x4000000000002ce, 0x62, 0x0) 03:12:09 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e23}, 0x1c) listen(r0, 0x18) r1 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f0000000000)=[@in={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x36}}, @in={0x2, 0x4e23, @local}], 0x20) 03:12:09 executing program 1: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) 03:12:10 executing program 3: socket$packet(0x11, 0xa, 0x300) syz_emit_ethernet(0x4e, &(0x7f0000000080)={@local, @broadcast, [{}], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x0, 0x0, @local, @local={0xfe, 0x80, [0x800000000000000]}, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, &(0x7f00000002c0)) 03:12:10 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000040)="153f6234488dd25d766070") socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup2(r2, r2) sendmsg$netlink(r3, &(0x7f0000028fc8)={0x0, 0x0, &(0x7f0000019000), 0x0, &(0x7f0000000040)=[@rights={0x18, 0x1, 0x1, [r1]}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000000b80)=[{{&(0x7f0000000200)=@l2, 0x80, &(0x7f00000005c0), 0x0, &(0x7f0000000600)=""/84, 0x54}}, {{&(0x7f0000000680)=@l2, 0x80, &(0x7f0000000a40), 0x0, &(0x7f0000000ac0)=""/147, 0x93}, 0x0}], 0x4000000000002ce, 0x62, 0x0) 03:12:10 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f00000003c0), 0x1f00000000000000, &(0x7f0000000580)={[{@session={'session'}}]}) 03:12:10 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e23}, 0x1c) listen(r0, 0x18) r1 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f0000000000)=[@in={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x22}}, @in={0x2, 0x4e23, @local}], 0x20) 03:12:10 executing program 3: socket$packet(0x11, 0xa, 0x300) syz_emit_ethernet(0x4e, &(0x7f0000000080)={@local, @broadcast, [{}], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x0, 0x0, @local, @local={0xfe, 0x80, [0x29000000]}, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, &(0x7f00000002c0)) [ 1018.854490] hfs: unable to parse mount options 03:12:10 executing program 1: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) 03:12:10 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1000000, &(0x7f00000003c0), 0x0, &(0x7f0000000580)={[{@session={'session'}}]}) 03:12:10 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e23}, 0x1c) listen(r0, 0x18) r1 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f0000000000)=[@in={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x11}}, @in={0x2, 0x4e23, @local}], 0x20) 03:12:10 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000040)="153f6234488dd25d766070") socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup2(r2, r2) sendmsg$netlink(r3, &(0x7f0000028fc8)={0x0, 0x0, &(0x7f0000019000), 0x0, &(0x7f0000000040)=[@rights={0x18, 0x1, 0x1, [r1]}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000000b80)=[{{&(0x7f0000000200)=@l2, 0x80, &(0x7f00000005c0), 0x0, &(0x7f0000000600)=""/84, 0x54}}, {{&(0x7f0000000680)=@l2, 0x80, &(0x7f0000000a40), 0x0, &(0x7f0000000ac0)=""/147, 0x93}, 0x0}], 0x4000000000002ce, 0x62, 0x0) 03:12:10 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000040)="153f6234488dd25d766070") socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup2(r2, r2) sendmsg$netlink(r3, &(0x7f0000028fc8)={0x0, 0x0, &(0x7f0000019000), 0x0, &(0x7f0000000040)=[@rights={0x18, 0x1, 0x1, [r1]}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000000b80)=[{{&(0x7f0000000200)=@l2, 0x80, &(0x7f00000005c0), 0x0, &(0x7f0000000600)=""/84, 0x54}}, {{&(0x7f0000000680)=@l2, 0x80, &(0x7f0000000a40), 0x0, &(0x7f0000000ac0)=""/147, 0x93}, 0x0}], 0x4000000000002ce, 0x62, 0x0) 03:12:10 executing program 3: socket$packet(0x11, 0xa, 0x300) syz_emit_ethernet(0x4e, &(0x7f0000000080)={@local, @broadcast, [{}], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x0, 0x0, @local, @local={0xfe, 0x80, [0x4000000]}, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, &(0x7f00000002c0)) 03:12:10 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f00000003c0), 0x10000000, &(0x7f0000000580)={[{@session={'session'}}]}) 03:12:10 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000040)="153f6234488dd25d766070") socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup2(r2, r2) sendmsg$netlink(r3, &(0x7f0000028fc8)={0x0, 0x0, &(0x7f0000019000), 0x0, &(0x7f0000000040)=[@rights={0x18, 0x1, 0x1, [r1]}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000000b80)=[{{&(0x7f0000000200)=@l2, 0x80, &(0x7f00000005c0), 0x0, &(0x7f0000000600)=""/84, 0x54}}, {{&(0x7f0000000680)=@l2, 0x80, &(0x7f0000000a40), 0x0, &(0x7f0000000ac0)=""/147, 0x93}, 0x0}], 0x4000000000002ce, 0x62, 0x0) 03:12:10 executing program 1: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) [ 1019.388229] hfs: invalid session number or type of track 03:12:10 executing program 3: socket$packet(0x11, 0xa, 0x300) syz_emit_ethernet(0x4e, &(0x7f0000000080)={@local, @broadcast, [{}], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x0, 0x0, @local, @local={0xfe, 0x80, [0xffffca88]}, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, &(0x7f00000002c0)) [ 1019.432827] hfs: can't find a HFS filesystem on dev loop2 [ 1019.475709] hfs: unable to parse mount options 03:12:10 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e23}, 0x1c) listen(r0, 0x18) r1 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f0000000000)=[@in={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x31}}, @in={0x2, 0x4e23, @local}], 0x20) 03:12:11 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000040)="153f6234488dd25d766070") socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup2(r2, r2) sendmsg$netlink(r3, &(0x7f0000028fc8)={0x0, 0x0, &(0x7f0000019000), 0x0, &(0x7f0000000040)=[@rights={0x18, 0x1, 0x1, [r1]}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000000b80)=[{{&(0x7f0000000200)=@l2, 0x80, &(0x7f00000005c0), 0x0, &(0x7f0000000600)=""/84, 0x54}}, {{&(0x7f0000000680)=@l2, 0x80, &(0x7f0000000a40), 0x0, &(0x7f0000000ac0)=""/147, 0x93}, 0x0}], 0x4000000000002ce, 0x62, 0x0) [ 1019.510853] hfs: invalid session number or type of track [ 1019.533625] hfs: can't find a HFS filesystem on dev loop2 03:12:11 executing program 3: socket$packet(0x11, 0xa, 0x300) syz_emit_ethernet(0x4e, &(0x7f0000000080)={@local, @broadcast, [{}], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x0, 0x0, @local, @local={0xfe, 0x80, [0x60]}, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, &(0x7f00000002c0)) 03:12:11 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1fffff, &(0x7f00000003c0), 0x0, &(0x7f0000000580)={[{@session={'session'}}]}) 03:12:11 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000040)="153f6234488dd25d766070") socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup2(r2, r2) sendmsg$netlink(r3, &(0x7f0000028fc8)={0x0, 0x0, &(0x7f0000019000), 0x0, &(0x7f0000000040)=[@rights={0x18, 0x1, 0x1, [r1]}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000000b80)=[{{&(0x7f0000000200)=@l2, 0x80, &(0x7f00000005c0), 0x0, &(0x7f0000000600)=""/84, 0x54}}, {{&(0x7f0000000680)=@l2, 0x80, &(0x7f0000000a40), 0x0, &(0x7f0000000ac0)=""/147, 0x93}, 0x0}], 0x4000000000002ce, 0x62, 0x0) 03:12:11 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f00000003c0), 0xfffffff6, &(0x7f0000000580)={[{@session={'session'}}]}) 03:12:11 executing program 1: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) 03:12:11 executing program 3: socket$packet(0x11, 0xa, 0x300) syz_emit_ethernet(0x4e, &(0x7f0000000080)={@local, @broadcast, [{}], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x0, 0x0, @local, @local={0xfe, 0x80, [0x2f00000000000000]}, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, &(0x7f00000002c0)) 03:12:11 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e23}, 0x1c) listen(r0, 0x18) r1 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f0000000000)=[@in={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1d}}, @in={0x2, 0x4e23, @local}], 0x20) 03:12:11 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000040)="153f6234488dd25d766070") socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup2(r2, r2) sendmsg$netlink(r3, &(0x7f0000028fc8)={0x0, 0x0, &(0x7f0000019000), 0x0, &(0x7f0000000040)=[@rights={0x18, 0x1, 0x1, [r1]}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000000b80)=[{{&(0x7f0000000200)=@l2, 0x80, &(0x7f00000005c0), 0x0, &(0x7f0000000600)=""/84, 0x54}}, {{&(0x7f0000000680)=@l2, 0x80, &(0x7f0000000a40), 0x0, &(0x7f0000000ac0)=""/147, 0x93}}], 0x40000000000016c, 0x62, 0x0) 03:12:11 executing program 3: socket$packet(0x11, 0xa, 0x300) syz_emit_ethernet(0x4e, &(0x7f0000000080)={@local, @broadcast, [{}], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x0, 0x0, @local, @local={0xfe, 0x80, [0x43050000]}, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, &(0x7f00000002c0)) 03:12:11 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f00000003c0), 0x6c00000000000000, &(0x7f0000000580)={[{@session={'session'}}]}) 03:12:11 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e23}, 0x1c) listen(r0, 0x18) r1 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f0000000000)=[@in={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x2f}}, @in={0x2, 0x4e23, @local}], 0x20) 03:12:11 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000040)="153f6234488dd25d766070") socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup2(r2, r2) sendmsg$netlink(r3, &(0x7f0000028fc8)={0x0, 0x0, &(0x7f0000019000), 0x0, &(0x7f0000000040)=[@rights={0x18, 0x1, 0x1, [r1]}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000000b80)=[{{&(0x7f0000000200)=@l2, 0x80, &(0x7f00000005c0), 0x0, &(0x7f0000000600)=""/84, 0x54}}, {{&(0x7f0000000680)=@l2, 0x80, &(0x7f0000000a40), 0x0, &(0x7f0000000ac0)=""/147, 0x93}}], 0x400000000000009, 0x62, 0x0) [ 1020.197079] hfs: unable to parse mount options 03:12:11 executing program 1: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) 03:12:11 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x6c00000000000000, &(0x7f00000003c0), 0x0, &(0x7f0000000580)={[{@session={'session'}}]}) 03:12:11 executing program 3: socket$packet(0x11, 0xa, 0x300) syz_emit_ethernet(0x4e, &(0x7f0000000080)={@local, @broadcast, [{}], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x0, 0x0, @local, @local={0xfe, 0x80, [0xd00]}, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, &(0x7f00000002c0)) 03:12:11 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000040)="153f6234488dd25d766070") socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup2(r2, r2) sendmsg$netlink(r3, &(0x7f0000028fc8)={0x0, 0x0, &(0x7f0000019000), 0x0, &(0x7f0000000040)=[@rights={0x18, 0x1, 0x1, [r1]}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000000b80)=[{{&(0x7f0000000200)=@l2, 0x80, &(0x7f00000005c0), 0x0, &(0x7f0000000600)=""/84, 0x54}}, {{&(0x7f0000000680)=@l2, 0x80, &(0x7f0000000a40), 0x0, &(0x7f0000000ac0)=""/147, 0x93}}], 0x40000000000013d, 0x62, 0x0) 03:12:11 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f00000003c0), 0x1000000000, &(0x7f0000000580)={[{@session={'session'}}]}) 03:12:12 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e23}, 0x1c) listen(r0, 0x18) r1 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f0000000000)=[@in={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x35}}, @in={0x2, 0x4e23, @local}], 0x20) 03:12:12 executing program 3: socket$packet(0x11, 0xa, 0x300) syz_emit_ethernet(0x4e, &(0x7f0000000080)={@local, @broadcast, [{}], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x0, 0x0, @local, @local={0xfe, 0x80, [0x600]}, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, &(0x7f00000002c0)) 03:12:12 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000040)="153f6234488dd25d766070") socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup2(r2, r2) sendmsg$netlink(r3, &(0x7f0000028fc8)={0x0, 0x0, &(0x7f0000019000), 0x0, &(0x7f0000000040)=[@rights={0x18, 0x1, 0x1, [r1]}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000000b80)=[{{&(0x7f0000000200)=@l2, 0x80, &(0x7f00000005c0), 0x0, &(0x7f0000000600)=""/84, 0x54}}, {{&(0x7f0000000680)=@l2, 0x80, &(0x7f0000000a40), 0x0, &(0x7f0000000ac0)=""/147, 0x93}}], 0x400000000000002, 0x62, 0x0) [ 1020.671070] hfs: unable to parse mount options 03:12:12 executing program 1: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0x0) 03:12:12 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f00000003c0), 0xfdfdffff, &(0x7f0000000580)={[{@session={'session'}}]}) 03:12:12 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000040)="153f6234488dd25d766070") socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup2(r2, r2) sendmsg$netlink(r3, &(0x7f0000028fc8)={0x0, 0x0, &(0x7f0000019000), 0x0, &(0x7f0000000040)=[@rights={0x18, 0x1, 0x1, [r1]}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000000b80)=[{{&(0x7f0000000200)=@l2, 0x80, &(0x7f00000005c0), 0x0, &(0x7f0000000600)=""/84, 0x54}}, {{&(0x7f0000000680)=@l2, 0x80, &(0x7f0000000a40), 0x0, &(0x7f0000000ac0)=""/147, 0x93}}], 0x400000000000021, 0x62, 0x0) 03:12:12 executing program 3: socket$packet(0x11, 0xa, 0x300) syz_emit_ethernet(0x4e, &(0x7f0000000080)={@local, @broadcast, [{}], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x0, 0x0, @local, @local={0xfe, 0x80, [0x2c]}, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, &(0x7f00000002c0)) 03:12:12 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x4c000000, &(0x7f00000003c0), 0x0, &(0x7f0000000580)={[{@session={'session'}}]}) 03:12:12 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e23}, 0x1c) listen(r0, 0x18) r1 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f0000000000)=[@in={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x3c}}, @in={0x2, 0x4e23, @local}], 0x20) 03:12:12 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000040)="153f6234488dd25d766070") socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup2(r2, r2) sendmsg$netlink(r3, &(0x7f0000028fc8)={0x0, 0x0, &(0x7f0000019000), 0x0, &(0x7f0000000040)=[@rights={0x18, 0x1, 0x1, [r1]}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000000b80)=[{{&(0x7f0000000200)=@l2, 0x80, &(0x7f00000005c0), 0x0, &(0x7f0000000600)=""/84, 0x54}}, {{&(0x7f0000000680)=@l2, 0x80, &(0x7f0000000a40), 0x0, &(0x7f0000000ac0)=""/147, 0x93}}], 0x400000000000105, 0x62, 0x0) 03:12:12 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000040)="153f6234488dd25d766070") socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup2(r2, r2) sendmsg$netlink(r3, &(0x7f0000028fc8)={0x0, 0x0, &(0x7f0000019000), 0x0, &(0x7f0000000040)=[@rights={0x18, 0x1, 0x1, [r1]}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000000b80)=[{{&(0x7f0000000200)=@l2, 0x80, &(0x7f00000005c0), 0x0, &(0x7f0000000600)=""/84, 0x54}}, {{&(0x7f0000000680)=@l2, 0x80, &(0x7f0000000a40), 0x0, &(0x7f0000000ac0)=""/147, 0x93}}], 0x400000000000116, 0x62, 0x0) 03:12:12 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f00000003c0), 0x4000000, &(0x7f0000000580)={[{@session={'session'}}]}) 03:12:12 executing program 1: r0 = syz_open_dev$binder(&(0x7f0000001000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) dup(0xffffffffffffffff) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f00000005c0)={0xc, 0x0, &(0x7f0000000000)=[@dead_binder_done], 0x0, 0xfffffdfd, &(0x7f0000000540)}) 03:12:12 executing program 3: socket$packet(0x11, 0xa, 0x300) syz_emit_ethernet(0x4e, &(0x7f0000000080)={@local, @broadcast, [{}], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x0, 0x0, @local, @local={0xfe, 0x80, [0x8100000000000000]}, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, &(0x7f00000002c0)) 03:12:12 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e23}, 0x1c) listen(r0, 0x18) r1 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f0000000000)=[@in={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x16}}, @in={0x2, 0x4e23, @local}], 0x20) 03:12:12 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000040)="153f6234488dd25d766070") socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup2(r2, r2) sendmsg$netlink(r3, &(0x7f0000028fc8)={0x0, 0x0, &(0x7f0000019000), 0x0, &(0x7f0000000040)=[@rights={0x18, 0x1, 0x1, [r1]}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000000b80)=[{{&(0x7f0000000200)=@l2, 0x80, &(0x7f00000005c0), 0x0, &(0x7f0000000600)=""/84, 0x54}}, {{&(0x7f0000000680)=@l2, 0x80, &(0x7f0000000a40), 0x0, &(0x7f0000000ac0)=""/147, 0x93}}], 0x400000000000037, 0x62, 0x0) [ 1021.297176] hfs: invalid session number or type of track [ 1021.312909] binder: 26502:26508 BC_DEAD_BINDER_DONE 0000000000000000 not found [ 1021.331882] hfs: can't find a HFS filesystem on dev loop2 [ 1021.368164] binder: 26502:26512 BC_DEAD_BINDER_DONE 0000000000000000 not found [ 1021.389563] hfs: unable to parse mount options [ 1021.415614] hfs: invalid session number or type of track [ 1021.450230] hfs: can't find a HFS filesystem on dev loop2 03:12:12 executing program 1: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000140)={0xa, 0xffffffffffffffff, 0x0, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x18}}}, 0x1c) sendmmsg(r0, &(0x7f00000002c0), 0x4cc, 0xffe0) setsockopt$inet_mreqsrc(0xffffffffffffffff, 0x0, 0x25, &(0x7f0000000040)={@local, @empty, @dev={0xac, 0x14, 0x14, 0x14}}, 0xc) 03:12:13 executing program 3: socket$packet(0x11, 0xa, 0x300) syz_emit_ethernet(0x4e, &(0x7f0000000080)={@local, @broadcast, [{}], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x0, 0x0, @local, @local={0xfe, 0x80, [0x2900]}, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, &(0x7f00000002c0)) 03:12:13 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f00000003c0), 0x7a00, &(0x7f0000000580)={[{@session={'session'}}]}) 03:12:13 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1f00, &(0x7f00000003c0), 0x0, &(0x7f0000000580)={[{@session={'session'}}]}) 03:12:13 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000040)="153f6234488dd25d766070") socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup2(r2, r2) sendmsg$netlink(r3, &(0x7f0000028fc8)={0x0, 0x0, &(0x7f0000019000), 0x0, &(0x7f0000000040)=[@rights={0x18, 0x1, 0x1, [r1]}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000000b80)=[{{&(0x7f0000000200)=@l2, 0x80, &(0x7f00000005c0), 0x0, &(0x7f0000000600)=""/84, 0x54}}, {{&(0x7f0000000680)=@l2, 0x80, &(0x7f0000000a40), 0x0, &(0x7f0000000ac0)=""/147, 0x93}}], 0x4000000000000ec, 0x62, 0x0) 03:12:13 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e23}, 0x1c) listen(r0, 0x18) r1 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f0000000000)=[@in={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x2b}}, @in={0x2, 0x4e23, @local}], 0x20) 03:12:13 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917}, 0x0) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) r1 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r1) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7ffffffffffb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000733000)={0x5, 0x0, 0x7, 0x9}, 0x2c) r3 = bpf$MAP_CREATE(0x0, &(0x7f00004f9fe4)={0xc, 0x4, 0x0, 0x100000001, 0x0, r2}, 0x2c) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000180)={r3, &(0x7f0000000040), &(0x7f0000000100)=""/108}, 0x18) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) r4 = syz_open_dev$usb(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x1, 0x420000) getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f0000000080)={0x2, 0x1ff, 0x4, 0x1, 0xfffffffffffffffc, 0x3, 0x4, 0xb2, 0x0}, &(0x7f00000000c0)=0x20) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7ffffffffffb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x36232f9d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r6, &(0x7f0000000680)={&(0x7f0000000040), 0xc, &(0x7f0000000640)={&(0x7f0000000500)=ANY=[@ANYBLOB="0000000000000000280012000c00010069703667726500001800020014000d0000000000000000000000000000000001"], 0x1}}, 0x0) r7 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETQUEUE(r7, 0x400454d9, &(0x7f00000000c0)={'\x00', 0x400}) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r4, 0x84, 0x6, &(0x7f00000002c0)={r5, @in={{0x2, 0x4e20, @broadcast}}}, &(0x7f00000001c0)=0x84) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) 03:12:13 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f00000003c0), 0x4800, &(0x7f0000000580)={[{@session={'session'}}]}) 03:12:13 executing program 3: socket$packet(0x11, 0xa, 0x300) syz_emit_ethernet(0x4e, &(0x7f0000000080)={@local, @broadcast, [{}], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x0, 0x0, @local, @local={0xfe, 0x80, [0x3c]}, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, &(0x7f00000002c0)) 03:12:13 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000040)="153f6234488dd25d766070") socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup2(r2, r2) sendmsg$netlink(r3, &(0x7f0000028fc8)={0x0, 0x0, &(0x7f0000019000), 0x0, &(0x7f0000000040)=[@rights={0x18, 0x1, 0x1, [r1]}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000000b80)=[{{&(0x7f0000000200)=@l2, 0x80, &(0x7f00000005c0), 0x0, &(0x7f0000000600)=""/84, 0x54}}, {{&(0x7f0000000680)=@l2, 0x80, &(0x7f0000000a40), 0x0, &(0x7f0000000ac0)=""/147, 0x93}}], 0x4000000000000e8, 0x62, 0x0) 03:12:13 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e23}, 0x1c) listen(r0, 0x18) r1 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f0000000000)=[@in={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1a}}, @in={0x2, 0x4e23, @local}], 0x20) 03:12:13 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000040)="153f6234488dd25d766070") socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup2(r2, r2) sendmsg$netlink(r3, &(0x7f0000028fc8)={0x0, 0x0, &(0x7f0000019000), 0x0, &(0x7f0000000040)=[@rights={0x18, 0x1, 0x1, [r1]}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000000b80)=[{{&(0x7f0000000200)=@l2, 0x80, &(0x7f00000005c0), 0x0, &(0x7f0000000600)=""/84, 0x54}}, {{&(0x7f0000000680)=@l2, 0x80, &(0x7f0000000a40), 0x0, &(0x7f0000000ac0)=""/147, 0x93}}], 0x40000000000010a, 0x62, 0x0) 03:12:13 executing program 3: socket$packet(0x11, 0xa, 0x300) syz_emit_ethernet(0x4e, &(0x7f0000000080)={@local, @broadcast, [{}], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x0, 0x0, @local, @local={0xfe, 0x80, [0x4305000000000000]}, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, &(0x7f00000002c0)) 03:12:13 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000040)="153f6234488dd25d766070") socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup2(r2, r2) sendmsg$netlink(r3, &(0x7f0000028fc8)={0x0, 0x0, &(0x7f0000019000), 0x0, &(0x7f0000000040)=[@rights={0x18, 0x1, 0x1, [r1]}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000000b80)=[{{&(0x7f0000000200)=@l2, 0x80, &(0x7f00000005c0), 0x0, &(0x7f0000000600)=""/84, 0x54}}, {{&(0x7f0000000680)=@l2, 0x80, &(0x7f0000000a40), 0x0, &(0x7f0000000ac0)=""/147, 0x93}}], 0x4000000000000f5, 0x62, 0x0) 03:12:13 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000040)="153f6234488dd25d766070") socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup2(r2, r2) sendmsg$netlink(r3, &(0x7f0000028fc8)={0x0, 0x0, &(0x7f0000019000), 0x0, &(0x7f0000000040)=[@rights={0x18, 0x1, 0x1, [r1]}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000000b80)=[{{&(0x7f0000000200)=@l2, 0x80, &(0x7f00000005c0), 0x0, &(0x7f0000000600)=""/84, 0x54}}, {{&(0x7f0000000680)=@l2, 0x80, &(0x7f0000000a40), 0x0, &(0x7f0000000ac0)=""/147, 0x93}}], 0x40000000000013e, 0x62, 0x0) [ 1022.220758] hfs: invalid session number or type of track [ 1022.255250] hfs: can't find a HFS filesystem on dev loop2 [ 1022.353106] hfs: unable to parse mount options 03:12:13 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x4c00, &(0x7f00000003c0), 0x0, &(0x7f0000000580)={[{@session={'session'}}]}) 03:12:13 executing program 3: socket$packet(0x11, 0xa, 0x300) syz_emit_ethernet(0x4e, &(0x7f0000000080)={@local, @broadcast, [{}], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x0, 0x0, @local, @local={0xfe, 0x80, [0x8864000000000000]}, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, &(0x7f00000002c0)) 03:12:13 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e23}, 0x1c) listen(r0, 0x18) r1 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f0000000000)=[@in={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x2e}}, @in={0x2, 0x4e23, @local}], 0x20) 03:12:13 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917}, 0x0) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) r1 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r1) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7ffffffffffb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000733000)={0x5, 0x0, 0x7, 0x9}, 0x2c) r3 = bpf$MAP_CREATE(0x0, &(0x7f00004f9fe4)={0xc, 0x4, 0x0, 0x100000001, 0x0, r2}, 0x2c) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000180)={r3, &(0x7f0000000040), &(0x7f0000000100)=""/108}, 0x18) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) r4 = syz_open_dev$usb(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x1, 0x420000) getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f0000000080)={0x2, 0x1ff, 0x4, 0x1, 0xfffffffffffffffc, 0x3, 0x4, 0xb2, 0x0}, &(0x7f00000000c0)=0x20) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7ffffffffffb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x36232f9d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r6, &(0x7f0000000680)={&(0x7f0000000040), 0xc, &(0x7f0000000640)={&(0x7f0000000500)=ANY=[@ANYBLOB="0000000000000000280012000c00010069703667726500001800020014000d0000000000000000000000000000000001"], 0x1}}, 0x0) r7 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETQUEUE(r7, 0x400454d9, &(0x7f00000000c0)={'\x00', 0x400}) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r4, 0x84, 0x6, &(0x7f00000002c0)={r5, @in={{0x2, 0x4e20, @broadcast}}}, &(0x7f00000001c0)=0x84) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) 03:12:13 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f00000003c0), 0x6, &(0x7f0000000580)={[{@session={'session'}}]}) 03:12:13 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000040)="153f6234488dd25d766070") socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup2(r2, r2) sendmsg$netlink(r3, &(0x7f0000028fc8)={0x0, 0x0, &(0x7f0000019000), 0x0, &(0x7f0000000040)=[@rights={0x18, 0x1, 0x1, [r1]}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000000b80)=[{{&(0x7f0000000200)=@l2, 0x80, &(0x7f00000005c0), 0x0, &(0x7f0000000600)=""/84, 0x54}}, {{&(0x7f0000000680)=@l2, 0x80, &(0x7f0000000a40), 0x0, &(0x7f0000000ac0)=""/147, 0x93}}], 0x400000000000050, 0x62, 0x0) [ 1022.604615] hfs: invalid session number or type of track [ 1022.624276] hfs: can't find a HFS filesystem on dev loop2 03:12:14 executing program 3: socket$packet(0x11, 0xa, 0x300) syz_emit_ethernet(0x4e, &(0x7f0000000080)={@local, @broadcast, [{}], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x0, 0x0, @local, @local={0xfe, 0x80, [0x4000000000000000]}, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, &(0x7f00000002c0)) 03:12:14 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917}, 0x0) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) r1 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r1) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7ffffffffffb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000733000)={0x5, 0x0, 0x7, 0x9}, 0x2c) r3 = bpf$MAP_CREATE(0x0, &(0x7f00004f9fe4)={0xc, 0x4, 0x0, 0x100000001, 0x0, r2}, 0x2c) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000180)={r3, &(0x7f0000000040), &(0x7f0000000100)=""/108}, 0x18) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) r4 = syz_open_dev$usb(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x1, 0x420000) getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f0000000080)={0x2, 0x1ff, 0x4, 0x1, 0xfffffffffffffffc, 0x3, 0x4, 0xb2, 0x0}, &(0x7f00000000c0)=0x20) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7ffffffffffb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x36232f9d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r6, &(0x7f0000000680)={&(0x7f0000000040), 0xc, &(0x7f0000000640)={&(0x7f0000000500)=ANY=[@ANYBLOB="0000000000000000280012000c00010069703667726500001800020014000d0000000000000000000000000000000001"], 0x1}}, 0x0) r7 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETQUEUE(r7, 0x400454d9, &(0x7f00000000c0)={'\x00', 0x400}) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r4, 0x84, 0x6, &(0x7f00000002c0)={r5, @in={{0x2, 0x4e20, @broadcast}}}, &(0x7f00000001c0)=0x84) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) 03:12:14 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e23}, 0x1c) listen(r0, 0x18) r1 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f0000000000)=[@in={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x12}}, @in={0x2, 0x4e23, @local}], 0x20) [ 1022.732702] hfs: invalid session number or type of track [ 1022.751785] hfs: can't find a HFS filesystem on dev loop2 03:12:14 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f00000003c0), 0x10, &(0x7f0000000580)={[{@session={'session'}}]}) 03:12:14 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000040)="153f6234488dd25d766070") socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup2(r2, r2) sendmsg$netlink(r3, &(0x7f0000028fc8)={0x0, 0x0, &(0x7f0000019000), 0x0, &(0x7f0000000040)=[@rights={0x18, 0x1, 0x1, [r1]}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000000b80)=[{{&(0x7f0000000200)=@l2, 0x80, &(0x7f00000005c0), 0x0, &(0x7f0000000600)=""/84, 0x54}}, {{&(0x7f0000000680)=@l2, 0x80, &(0x7f0000000a40), 0x0, &(0x7f0000000ac0)=""/147, 0x93}}], 0x4000000000000f0, 0x62, 0x0) 03:12:14 executing program 3: socket$packet(0x11, 0xa, 0x300) syz_emit_ethernet(0x4e, &(0x7f0000000080)={@local, @broadcast, [{}], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x0, 0x0, @local, @local={0xfe, 0x80, [0x89ffffff00000000]}, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, &(0x7f00000002c0)) 03:12:14 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x9, &(0x7f00000003c0), 0x0, &(0x7f0000000580)={[{@session={'session'}}]}) 03:12:14 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000040)="153f6234488dd25d766070") socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup2(r2, r2) sendmsg$netlink(r3, &(0x7f0000028fc8)={0x0, 0x0, &(0x7f0000019000), 0x0, &(0x7f0000000040)=[@rights={0x18, 0x1, 0x1, [r1]}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000000b80)=[{{&(0x7f0000000200)=@l2, 0x80, &(0x7f00000005c0), 0x0, &(0x7f0000000600)=""/84, 0x54}}, {{&(0x7f0000000680)=@l2, 0x80, &(0x7f0000000a40), 0x0, &(0x7f0000000ac0)=""/147, 0x93}}], 0x400000000000109, 0x62, 0x0) 03:12:14 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x500000000000000, &(0x7f00000003c0), 0x0, &(0x7f0000000580)={[{@session={'session'}}]}) 03:12:14 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e23}, 0x1c) listen(r0, 0x18) r1 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f0000000000)=[@in={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x38}}, @in={0x2, 0x4e23, @local}], 0x20) 03:12:14 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000040)="153f6234488dd25d766070") socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup2(r2, r2) sendmsg$netlink(r3, &(0x7f0000028fc8)={0x0, 0x0, &(0x7f0000019000), 0x0, &(0x7f0000000040)=[@rights={0x18, 0x1, 0x1, [r1]}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000000b80)=[{{&(0x7f0000000200)=@l2, 0x80, &(0x7f00000005c0), 0x0, &(0x7f0000000600)=""/84, 0x54}}, {{&(0x7f0000000680)=@l2, 0x80, &(0x7f0000000a40), 0x0, &(0x7f0000000ac0)=""/147, 0x93}}], 0x40000000000016b, 0x62, 0x0) 03:12:14 executing program 3: socket$packet(0x11, 0xa, 0x300) syz_emit_ethernet(0x4e, &(0x7f0000000080)={@local, @broadcast, [{}], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x0, 0x0, @local, @local={0xfe, 0x80, [0xf0ffffffffffff]}, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, &(0x7f00000002c0)) [ 1023.232799] hfs: invalid session number or type of track 03:12:14 executing program 3: socket$packet(0x11, 0xa, 0x300) syz_emit_ethernet(0x4e, &(0x7f0000000080)={@local, @broadcast, [{}], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x0, 0x0, @local, @local={0xfe, 0x80, [0x5000000]}, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, &(0x7f00000002c0)) 03:12:14 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount(&(0x7f0000000200)=ANY=[], &(0x7f00000001c0)='./file0\x00', &(0x7f0000000040)='ramfs\x00', 0x0, &(0x7f000000a000)) chdir(&(0x7f0000000000)='./file0\x00') r1 = creat(&(0x7f00000001c0)='./file0\x00', 0xfffffffffffffffd) write$cgroup_type(r1, &(0x7f00000009c0)='threaded\x00', 0xd4b9afd) [ 1023.278828] hfs: can't find a HFS filesystem on dev loop2 03:12:14 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e23}, 0x1c) listen(r0, 0x18) r1 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f0000000000)=[@in={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x42}}, @in={0x2, 0x4e23, @local}], 0x20) [ 1023.380216] hfs: invalid session number or type of track [ 1023.408079] hfs: can't find a HFS filesystem on dev loop2 03:12:14 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f00000003c0), 0x770c000000000000, &(0x7f0000000580)={[{@session={'session'}}]}) 03:12:14 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000040)="153f6234488dd25d766070") socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup2(r2, r2) sendmsg$netlink(r3, &(0x7f0000028fc8)={0x0, 0x0, &(0x7f0000019000), 0x0, &(0x7f0000000040)=[@rights={0x18, 0x1, 0x1, [r1]}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000000b80)=[{{&(0x7f0000000200)=@l2, 0x80, &(0x7f00000005c0), 0x0, &(0x7f0000000600)=""/84, 0x54}}, {{&(0x7f0000000680)=@l2, 0x80, &(0x7f0000000a40), 0x0, &(0x7f0000000ac0)=""/147, 0x93}}], 0x400000000000007, 0x62, 0x0) 03:12:14 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x4000000000000000, &(0x7f00000003c0), 0x0, &(0x7f0000000580)={[{@session={'session'}}]}) 03:12:14 executing program 3: socket$packet(0x11, 0xa, 0x300) syz_emit_ethernet(0x4e, &(0x7f0000000080)={@local, @broadcast, [{}], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x0, 0x0, @local, @local={0xfe, 0x80, [0x86ddffff]}, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, &(0x7f00000002c0)) 03:12:15 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e23}, 0x1c) listen(r0, 0x18) r1 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f0000000000)=[@in={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x17}}, @in={0x2, 0x4e23, @local}], 0x20) 03:12:15 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000040)="153f6234488dd25d766070") socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup2(r2, r2) sendmsg$netlink(r3, &(0x7f0000028fc8)={0x0, 0x0, &(0x7f0000019000), 0x0, &(0x7f0000000040)=[@rights={0x18, 0x1, 0x1, [r1]}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000000b80)=[{{&(0x7f0000000200)=@l2, 0x80, &(0x7f00000005c0), 0x0, &(0x7f0000000600)=""/84, 0x54}}, {{&(0x7f0000000680)=@l2, 0x80, &(0x7f0000000a40), 0x0, &(0x7f0000000ac0)=""/147, 0x93}}], 0x4000000000000bc, 0x62, 0x0) 03:12:15 executing program 3: socket$packet(0x11, 0xa, 0x300) syz_emit_ethernet(0x4e, &(0x7f0000000080)={@local, @broadcast, [{}], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x0, 0x0, @local, @local={0xfe, 0x80, [0x8848000000000000]}, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, &(0x7f00000002c0)) 03:12:15 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f00000003c0), 0xffff1f0000000000, &(0x7f0000000580)={[{@session={'session'}}]}) 03:12:15 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e23}, 0x1c) listen(r0, 0x18) r1 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f0000000000)=[@in={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x33}}, @in={0x2, 0x4e23, @local}], 0x20) 03:12:15 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000040)="153f6234488dd25d766070") socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup2(r2, r2) sendmsg$netlink(r3, &(0x7f0000028fc8)={0x0, 0x0, &(0x7f0000019000), 0x0, &(0x7f0000000040)=[@rights={0x18, 0x1, 0x1, [r1]}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000000b80)=[{{&(0x7f0000000200)=@l2, 0x80, &(0x7f00000005c0), 0x0, &(0x7f0000000600)=""/84, 0x54}}, {{&(0x7f0000000680)=@l2, 0x80, &(0x7f0000000a40), 0x0, &(0x7f0000000ac0)=""/147, 0x93}}], 0x400000000000164, 0x62, 0x0) 03:12:15 executing program 1: r0 = socket(0x10, 0x2, 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/udplite\x00') sendfile(r0, r1, &(0x7f0000000100), 0x80000001) 03:12:15 executing program 3: socket$packet(0x11, 0xa, 0x300) syz_emit_ethernet(0x4e, &(0x7f0000000080)={@local, @broadcast, [{}], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x0, 0x0, @local, @local={0xfe, 0x80, [0x3c000000]}, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, &(0x7f00000002c0)) 03:12:15 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x300000000000000, &(0x7f00000003c0), 0x0, &(0x7f0000000580)={[{@session={'session'}}]}) 03:12:15 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f00000003c0), 0x2000, &(0x7f0000000580)={[{@session={'session'}}]}) 03:12:15 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e23}, 0x1c) listen(r0, 0x18) r1 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f0000000000)=[@in={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x21}}, @in={0x2, 0x4e23, @local}], 0x20) 03:12:15 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000040)="153f6234488dd25d766070") socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup2(r2, r2) sendmsg$netlink(r3, &(0x7f0000028fc8)={0x0, 0x0, &(0x7f0000019000), 0x0, &(0x7f0000000040)=[@rights={0x18, 0x1, 0x1, [r1]}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000000b80)=[{{&(0x7f0000000200)=@l2, 0x80, &(0x7f00000005c0), 0x0, &(0x7f0000000600)=""/84, 0x54}}, {{&(0x7f0000000680)=@l2, 0x80, &(0x7f0000000a40), 0x0, &(0x7f0000000ac0)=""/147, 0x93}}], 0x400000000000078, 0x62, 0x0) [ 1024.279249] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=8224 sclass=netlink_route_socket pig=26728 comm=syz-executor1 03:12:15 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000040)="153f6234488dd25d766070") socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup2(r2, r2) sendmsg$netlink(r3, &(0x7f0000028fc8)={0x0, 0x0, &(0x7f0000019000), 0x0, &(0x7f0000000040)=[@rights={0x18, 0x1, 0x1, [r1]}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000000b80)=[{{&(0x7f0000000200)=@l2, 0x80, &(0x7f00000005c0), 0x0, &(0x7f0000000600)=""/84, 0x54}}, {{&(0x7f0000000680)=@l2, 0x80, &(0x7f0000000a40), 0x0, &(0x7f0000000ac0)=""/147, 0x93}}], 0x4000000000000a7, 0x62, 0x0) [ 1024.330867] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=8224 sclass=netlink_route_socket pig=26733 comm=syz-executor1 03:12:15 executing program 3: socket$packet(0x11, 0xa, 0x300) syz_emit_ethernet(0x4e, &(0x7f0000000080)={@local, @broadcast, [{}], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x0, 0x0, @local, @local={0xfe, 0x80, [0x88640000]}, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, &(0x7f00000002c0)) 03:12:15 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqn(r0, 0x0, 0x27, &(0x7f0000000000)={@multicast1, @local}, 0xc) mprotect(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x2) getsockopt$inet_buf(r0, 0x0, 0x29, &(0x7f0000000000)=""/145, &(0x7f0000695ffc)=0x24b) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f00000000c0), 0x10) 03:12:15 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f00000003c0), 0x60000000, &(0x7f0000000580)={[{@session={'session'}}]}) 03:12:15 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e23}, 0x1c) listen(r0, 0x18) r1 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f0000000000)=[@in={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x2d}}, @in={0x2, 0x4e23, @local}], 0x20) 03:12:15 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000040)="153f6234488dd25d766070") socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup2(r2, r2) sendmsg$netlink(r3, &(0x7f0000028fc8)={0x0, 0x0, &(0x7f0000019000), 0x0, &(0x7f0000000040)=[@rights={0x18, 0x1, 0x1, [r1]}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000000b80)=[{{&(0x7f0000000200)=@l2, 0x80, &(0x7f00000005c0), 0x0, &(0x7f0000000600)=""/84, 0x54}}, {{&(0x7f0000000680)=@l2, 0x80, &(0x7f0000000a40), 0x0, &(0x7f0000000ac0)=""/147, 0x93}}], 0x400000000000024, 0x62, 0x0) [ 1024.505450] hfs: invalid session number or type of track [ 1024.533163] hfs: can't find a HFS filesystem on dev loop2 03:12:16 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0xf603, &(0x7f00000003c0), 0x0, &(0x7f0000000580)={[{@session={'session'}}]}) 03:12:16 executing program 1: socket$packet(0x11, 0xa, 0x300) syz_emit_ethernet(0x4e, &(0x7f0000000080)={@local, @broadcast, [{}], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x0, 0x0, @local, @local={0xfe, 0x80, [0x8864000000000000]}, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, &(0x7f00000002c0)) 03:12:16 executing program 3: socket$packet(0x11, 0xa, 0x300) syz_emit_ethernet(0x4e, &(0x7f0000000080)={@local, @broadcast, [{}], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x0, 0x0, @local, @local={0xfe, 0x80, [0x8847]}, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, &(0x7f00000002c0)) 03:12:16 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e23}, 0x1c) listen(r0, 0x18) r1 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f0000000000)=[@in={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x29}}, @in={0x2, 0x4e23, @local}], 0x20) [ 1024.638693] hfs: invalid session number or type of track [ 1024.679099] hfs: can't find a HFS filesystem on dev loop2 03:12:16 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000040)="153f6234488dd25d766070") socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup2(r2, r2) sendmsg$netlink(r3, &(0x7f0000028fc8)={0x0, 0x0, &(0x7f0000019000), 0x0, &(0x7f0000000040)=[@rights={0x18, 0x1, 0x1, [r1]}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000000b80)=[{{&(0x7f0000000200)=@l2, 0x80, &(0x7f00000005c0), 0x0, &(0x7f0000000600)=""/84, 0x54}}, {{&(0x7f0000000680)=@l2, 0x80, &(0x7f0000000a40), 0x0, &(0x7f0000000ac0)=""/147, 0x93}}], 0x40000000000014f, 0x62, 0x0) 03:12:16 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) 03:12:16 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f00000003c0), 0x2, &(0x7f0000000580)={[{@session={'session'}}]}) 03:12:16 executing program 3: socket$packet(0x11, 0xa, 0x300) syz_emit_ethernet(0x4e, &(0x7f0000000080)={@local, @broadcast, [{}], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x0, 0x0, @local, @local={0xfe, 0x80, [0x4788]}, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, &(0x7f00000002c0)) 03:12:16 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e23}, 0x1c) listen(r0, 0x18) r1 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f0000000000)=[@in={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0xb}}, @in={0x2, 0x4e23, @local}], 0x20) 03:12:16 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0xfffffdfd, &(0x7f00000003c0), 0x0, &(0x7f0000000580)={[{@session={'session'}}]}) 03:12:16 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000040)="153f6234488dd25d766070") socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup2(r2, r2) sendmsg$netlink(r3, &(0x7f0000028fc8)={0x0, 0x0, &(0x7f0000019000), 0x0, &(0x7f0000000040)=[@rights={0x18, 0x1, 0x1, [r1]}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000000b80)=[{{&(0x7f0000000200)=@l2, 0x80, &(0x7f00000005c0), 0x0, &(0x7f0000000600)=""/84, 0x54}}, {{&(0x7f0000000680)=@l2, 0x80, &(0x7f0000000a40), 0x0, &(0x7f0000000ac0)=""/147, 0x93}}], 0x400000000000137, 0x62, 0x0) 03:12:16 executing program 3: socket$packet(0x11, 0xa, 0x300) syz_emit_ethernet(0x4e, &(0x7f0000000080)={@local, @broadcast, [{}], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x0, 0x0, @local, @local={0xfe, 0x80, [0x29]}, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, &(0x7f00000002c0)) 03:12:16 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000040)="153f6234488dd25d766070") socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup2(r2, r2) sendmsg$netlink(r3, &(0x7f0000028fc8)={0x0, 0x0, &(0x7f0000019000), 0x0, &(0x7f0000000040)=[@rights={0x18, 0x1, 0x1, [r1]}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000000b80)=[{{&(0x7f0000000200)=@l2, 0x80, &(0x7f00000005c0), 0x0, &(0x7f0000000600)=""/84, 0x54}}, {{&(0x7f0000000680)=@l2, 0x80, &(0x7f0000000a40), 0x0, &(0x7f0000000ac0)=""/147, 0x93}}], 0x40000000000005b, 0x62, 0x0) [ 1025.158547] hfs: invalid session number or type of track [ 1025.164082] hfs: can't find a HFS filesystem on dev loop2 03:12:16 executing program 3: socket$packet(0x11, 0xa, 0x300) syz_emit_ethernet(0x4e, &(0x7f0000000080)={@local, @broadcast, [{}], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x0, 0x0, @local, @local={0xfe, 0x80, [0x2c00000000000000]}, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, &(0x7f00000002c0)) [ 1025.211657] hfs: invalid session number or type of track [ 1025.234320] hfs: can't find a HFS filesystem on dev loop2 03:12:16 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) 03:12:16 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000040)="153f6234488dd25d766070") socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup2(r2, r2) sendmsg$netlink(r3, &(0x7f0000028fc8)={0x0, 0x0, &(0x7f0000019000), 0x0, &(0x7f0000000040)=[@rights={0x18, 0x1, 0x1, [r1]}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000000b80)=[{{&(0x7f0000000200)=@l2, 0x80, &(0x7f00000005c0), 0x0, &(0x7f0000000600)=""/84, 0x54}}, {{&(0x7f0000000680)=@l2, 0x80, &(0x7f0000000a40), 0x0, &(0x7f0000000ac0)=""/147, 0x93}}], 0x40000000000001c, 0x62, 0x0) 03:12:16 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f00000003c0), 0x2c00000000000000, &(0x7f0000000580)={[{@session={'session'}}]}) 03:12:16 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x2c000000, &(0x7f00000003c0), 0x0, &(0x7f0000000580)={[{@session={'session'}}]}) 03:12:16 executing program 3: socket$packet(0x11, 0xa, 0x300) syz_emit_ethernet(0x4e, &(0x7f0000000080)={@local, @broadcast, [{}], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x0, 0x0, @local, @local={0xfe, 0x80, [0x300000000000000]}, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, &(0x7f00000002c0)) 03:12:16 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e23}, 0x1c) listen(r0, 0x18) r1 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f0000000000)=[@in={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, @in={0x2, 0x4e23, @local}], 0x20) 03:12:16 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000040)="153f6234488dd25d766070") socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup2(r2, r2) sendmsg$netlink(r3, &(0x7f0000028fc8)={0x0, 0x0, &(0x7f0000019000), 0x0, &(0x7f0000000040)=[@rights={0x18, 0x1, 0x1, [r1]}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000000b80)=[{{&(0x7f0000000200)=@l2, 0x80, &(0x7f00000005c0), 0x0, &(0x7f0000000600)=""/84, 0x54}}, {{&(0x7f0000000680)=@l2, 0x80, &(0x7f0000000a40), 0x0, &(0x7f0000000ac0)=""/147, 0x93}}], 0x4000000000000e0, 0x62, 0x0) 03:12:17 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000040)="153f6234488dd25d766070") socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup2(r2, r2) sendmsg$netlink(r3, &(0x7f0000028fc8)={0x0, 0x0, &(0x7f0000019000), 0x0, &(0x7f0000000040)=[@rights={0x18, 0x1, 0x1, [r1]}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000000b80)=[{{&(0x7f0000000200)=@l2, 0x80, &(0x7f00000005c0), 0x0, &(0x7f0000000600)=""/84, 0x54}}, {{&(0x7f0000000680)=@l2, 0x80, &(0x7f0000000a40), 0x0, &(0x7f0000000ac0)=""/147, 0x93}}], 0x40000000000001a, 0x62, 0x0) 03:12:17 executing program 3: socket$packet(0x11, 0xa, 0x300) syz_emit_ethernet(0x4e, &(0x7f0000000080)={@local, @broadcast, [{}], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x0, 0x0, @local, @local={0xfe, 0x80, [0x6000000]}, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, &(0x7f00000002c0)) 03:12:17 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0xf6030000, &(0x7f00000003c0), 0x0, &(0x7f0000000580)={[{@session={'session'}}]}) 03:12:17 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000040)="153f6234488dd25d766070") socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup2(r2, r2) sendmsg$netlink(r3, &(0x7f0000028fc8)={0x0, 0x0, &(0x7f0000019000), 0x0, &(0x7f0000000040)=[@rights={0x18, 0x1, 0x1, [r1]}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000000b80)=[{{&(0x7f0000000200)=@l2, 0x80, &(0x7f00000005c0), 0x0, &(0x7f0000000600)=""/84, 0x54}}, {{&(0x7f0000000680)=@l2, 0x80, &(0x7f0000000a40), 0x0, &(0x7f0000000ac0)=""/147, 0x93}}], 0x4000000000000a4, 0x62, 0x0) 03:12:17 executing program 3: socket$packet(0x11, 0xa, 0x300) syz_emit_ethernet(0x4e, &(0x7f0000000080)={@local, @broadcast, [{}], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x0, 0x0, @local, @local={0xfe, 0x80, [0x88480000]}, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, &(0x7f00000002c0)) 03:12:17 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) syz_open_dev$usb(&(0x7f0000000080)='/dev/bus/usb/00#/00#\x00', 0xfffffffffffffffe, 0x2001) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) 03:12:17 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000040)="153f6234488dd25d766070") socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup2(r2, r2) sendmsg$netlink(r3, &(0x7f0000028fc8)={0x0, 0x0, &(0x7f0000019000), 0x0, &(0x7f0000000040)=[@rights={0x18, 0x1, 0x1, [r1]}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000000b80)=[{{&(0x7f0000000200)=@l2, 0x80, &(0x7f00000005c0), 0x0, &(0x7f0000000600)=""/84, 0x54}}, {{&(0x7f0000000680)=@l2, 0x80, &(0x7f0000000a40), 0x0, &(0x7f0000000ac0)=""/147, 0x93}}], 0x400000000000004, 0x62, 0x0) 03:12:17 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f00000003c0), 0x97ffffff00000000, &(0x7f0000000580)={[{@session={'session'}}]}) 03:12:17 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x770c0000, &(0x7f00000003c0), 0x0, &(0x7f0000000580)={[{@session={'session'}}]}) 03:12:17 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e23}, 0x1c) listen(r0, 0x18) r1 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f0000000000)=[@in={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x24}}, @in={0x2, 0x4e23, @local}], 0x20) 03:12:17 executing program 3: socket$packet(0x11, 0xa, 0x300) syz_emit_ethernet(0x4e, &(0x7f0000000080)={@local, @broadcast, [{}], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x0, 0x0, @local, @local={0xfe, 0x80, [0x4000]}, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, &(0x7f00000002c0)) 03:12:17 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000040)="153f6234488dd25d766070") socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup2(r2, r2) sendmsg$netlink(r3, &(0x7f0000028fc8)={0x0, 0x0, &(0x7f0000019000), 0x0, &(0x7f0000000040)=[@rights={0x18, 0x1, 0x1, [r1]}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000000b80)=[{{&(0x7f0000000200)=@l2, 0x80, &(0x7f00000005c0), 0x0, &(0x7f0000000600)=""/84, 0x54}}, {{&(0x7f0000000680)=@l2, 0x80, &(0x7f0000000a40), 0x0, &(0x7f0000000ac0)=""/147, 0x93}}], 0x40000000000002e, 0x62, 0x0) 03:12:17 executing program 3: socket$packet(0x11, 0xa, 0x300) syz_emit_ethernet(0x4e, &(0x7f0000000080)={@local, @broadcast, [{}], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x0, 0x0, @local, @local={0xfe, 0x80, [0x8]}, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, &(0x7f00000002c0)) 03:12:17 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x4800, &(0x7f00000003c0), 0x0, &(0x7f0000000580)={[{@session={'session'}}]}) 03:12:17 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e23}, 0x1c) listen(r0, 0x18) r1 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f0000000000)=[@in={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x27}}, @in={0x2, 0x4e23, @local}], 0x20) 03:12:17 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f00000003c0), 0x500000000000000, &(0x7f0000000580)={[{@session={'session'}}]}) 03:12:17 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000040)="153f6234488dd25d766070") socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup2(r2, r2) sendmsg$netlink(r3, &(0x7f0000028fc8)={0x0, 0x0, &(0x7f0000019000), 0x0, &(0x7f0000000040)=[@rights={0x18, 0x1, 0x1, [r1]}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000000b80)=[{{&(0x7f0000000200)=@l2, 0x80, &(0x7f00000005c0), 0x0, &(0x7f0000000600)=""/84, 0x54}}, {{&(0x7f0000000680)=@l2, 0x80, &(0x7f0000000a40), 0x0, &(0x7f0000000ac0)=""/147, 0x93}}], 0x40000000000003e, 0x62, 0x0) 03:12:17 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) syz_open_dev$usb(&(0x7f0000000080)='/dev/bus/usb/00#/00#\x00', 0xfffffffffffffffe, 0x2001) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) 03:12:17 executing program 3: socket$packet(0x11, 0xa, 0x300) syz_emit_ethernet(0x4e, &(0x7f0000000080)={@local, @broadcast, [{}], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x0, 0x0, @local, @local={0xfe, 0x80, [0x2f]}, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, &(0x7f00000002c0)) 03:12:18 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e23}, 0x1c) listen(r0, 0x18) r1 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f0000000000)=[@in={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x39}}, @in={0x2, 0x4e23, @local}], 0x20) 03:12:18 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000040)="153f6234488dd25d766070") socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup2(r2, r2) sendmsg$netlink(r3, &(0x7f0000028fc8)={0x0, 0x0, &(0x7f0000019000), 0x0, &(0x7f0000000040)=[@rights={0x18, 0x1, 0x1, [r1]}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000000b80)=[{{&(0x7f0000000200)=@l2, 0x80, &(0x7f00000005c0), 0x0, &(0x7f0000000600)=""/84, 0x54}}, {{&(0x7f0000000680)=@l2, 0x80, &(0x7f0000000a40), 0x0, &(0x7f0000000ac0)=""/147, 0x93}}], 0x400000000000045, 0x62, 0x0) 03:12:18 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000040)="153f6234488dd25d766070") socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup2(r2, r2) sendmsg$netlink(r3, &(0x7f0000028fc8)={0x0, 0x0, &(0x7f0000019000), 0x0, &(0x7f0000000040)=[@rights={0x18, 0x1, 0x1, [r1]}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000000b80)=[{{&(0x7f0000000200)=@l2, 0x80, &(0x7f00000005c0), 0x0, &(0x7f0000000600)=""/84, 0x54}}, {{&(0x7f0000000680)=@l2, 0x80, &(0x7f0000000a40), 0x0, &(0x7f0000000ac0)=""/147, 0x93}}], 0x400000000000097, 0x62, 0x0) 03:12:18 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x10, &(0x7f00000003c0), 0x0, &(0x7f0000000580)={[{@session={'session'}}]}) 03:12:18 executing program 3: socket$packet(0x11, 0xa, 0x300) syz_emit_ethernet(0x4e, &(0x7f0000000080)={@local, @broadcast, [{}], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x0, 0x0, @local, @local={0xfe, 0x80, [0xd00000000000000]}, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, &(0x7f00000002c0)) 03:12:18 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000040)="153f6234488dd25d766070") socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup2(r2, r2) sendmsg$netlink(r3, &(0x7f0000028fc8)={0x0, 0x0, &(0x7f0000019000), 0x0, &(0x7f0000000040)=[@rights={0x18, 0x1, 0x1, [r1]}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000000b80)=[{{&(0x7f0000000200)=@l2, 0x80, &(0x7f00000005c0), 0x0, &(0x7f0000000600)=""/84, 0x54}}, {{&(0x7f0000000680)=@l2, 0x80, &(0x7f0000000a40), 0x0, &(0x7f0000000ac0)=""/147, 0x93}}], 0x400000000000066, 0x62, 0x0) 03:12:18 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f00000003c0), 0x7400000000000000, &(0x7f0000000580)={[{@session={'session'}}]}) 03:12:18 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x3f5, &(0x7f00000003c0), 0x0, &(0x7f0000000580)={[{@session={'session'}}]}) 03:12:18 executing program 3: socket$packet(0x11, 0xa, 0x300) syz_emit_ethernet(0x4e, &(0x7f0000000080)={@local, @broadcast, [{}], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x0, 0x0, @local, @local={0xfe, 0x80, [0x2000000]}, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, &(0x7f00000002c0)) 03:12:18 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) syz_open_dev$usb(&(0x7f0000000080)='/dev/bus/usb/00#/00#\x00', 0xfffffffffffffffe, 0x2001) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETQUEUE(r1, 0x400454d9, &(0x7f00000000c0)) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) 03:12:18 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000040)="153f6234488dd25d766070") socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup2(r2, r2) sendmsg$netlink(r3, &(0x7f0000028fc8)={0x0, 0x0, &(0x7f0000019000), 0x0, &(0x7f0000000040)=[@rights={0x18, 0x1, 0x1, [r1]}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000000b80)=[{{&(0x7f0000000200)=@l2, 0x80, &(0x7f00000005c0), 0x0, &(0x7f0000000600)=""/84, 0x54}}, {{&(0x7f0000000680)=@l2, 0x80, &(0x7f0000000a40), 0x0, &(0x7f0000000ac0)=""/147, 0x93}}], 0x4000000000000dd, 0x62, 0x0) 03:12:18 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e23}, 0x1c) listen(r0, 0x18) r1 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f0000000000)=[@in={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1b}}, @in={0x2, 0x4e23, @local}], 0x20) 03:12:18 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x4c00000000000000, &(0x7f00000003c0), 0x0, &(0x7f0000000580)={[{@session={'session'}}]}) 03:12:18 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f00000003c0), 0x4c00000000000000, &(0x7f0000000580)={[{@session={'session'}}]}) 03:12:18 executing program 3: socket$packet(0x11, 0xa, 0x300) syz_emit_ethernet(0x4e, &(0x7f0000000080)={@local, @broadcast, [{}], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x0, 0x0, @local, @local={0xfe, 0x80, [0x6]}, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, &(0x7f00000002c0)) 03:12:18 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000040)="153f6234488dd25d766070") socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup2(r2, r2) sendmsg$netlink(r3, &(0x7f0000028fc8)={0x0, 0x0, &(0x7f0000019000), 0x0, &(0x7f0000000040)=[@rights={0x18, 0x1, 0x1, [r1]}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000000b80)=[{{&(0x7f0000000200)=@l2, 0x80, &(0x7f00000005c0), 0x0, &(0x7f0000000600)=""/84, 0x54}}, {{&(0x7f0000000680)=@l2, 0x80, &(0x7f0000000a40), 0x0, &(0x7f0000000ac0)=""/147, 0x93}}], 0x400000000000159, 0x62, 0x0) 03:12:18 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000040)="153f6234488dd25d766070") socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup2(r2, r2) sendmsg$netlink(r3, &(0x7f0000028fc8)={0x0, 0x0, &(0x7f0000019000), 0x0, &(0x7f0000000040)=[@rights={0x18, 0x1, 0x1, [r1]}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000000b80)=[{{&(0x7f0000000200)=@l2, 0x80, &(0x7f00000005c0), 0x0, &(0x7f0000000600)=""/84, 0x54}}, {{&(0x7f0000000680)=@l2, 0x80, &(0x7f0000000a40), 0x0, &(0x7f0000000ac0)=""/147, 0x93}}], 0x400000000000171, 0x62, 0x0) 03:12:18 executing program 3: socket$packet(0x11, 0xa, 0x300) syz_emit_ethernet(0x4e, &(0x7f0000000080)={@local, @broadcast, [{}], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x0, 0x0, @local, @local={0xfe, 0x80, [0x81000000]}, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, &(0x7f00000002c0)) 03:12:18 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x900, &(0x7f00000003c0), 0x0, &(0x7f0000000580)={[{@session={'session'}}]}) 03:12:18 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e23}, 0x1c) listen(r0, 0x18) r1 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f0000000000)=[@in={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x28}}, @in={0x2, 0x4e23, @local}], 0x20) 03:12:18 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000040)="153f6234488dd25d766070") socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup2(r2, r2) sendmsg$netlink(r3, &(0x7f0000028fc8)={0x0, 0x0, &(0x7f0000019000), 0x0, &(0x7f0000000040)=[@rights={0x18, 0x1, 0x1, [r1]}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000000b80)=[{{&(0x7f0000000200)=@l2, 0x80, &(0x7f00000005c0), 0x0, &(0x7f0000000600)=""/84, 0x54}}, {{&(0x7f0000000680)=@l2, 0x80, &(0x7f0000000a40), 0x0, &(0x7f0000000ac0)=""/147, 0x93}}], 0x400000000000048, 0x62, 0x0) 03:12:18 executing program 1 (fault-call:3 fault-nth:0): r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) 03:12:19 executing program 3: socket$packet(0x11, 0xa, 0x300) syz_emit_ethernet(0x4e, &(0x7f0000000080)={@local, @broadcast, [{}], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x0, 0x0, @local, @local={0xfe, 0x80, [0xe80]}, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, &(0x7f00000002c0)) 03:12:19 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f00000003c0), 0x68000000, &(0x7f0000000580)={[{@session={'session'}}]}) 03:12:19 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e23}, 0x1c) listen(r0, 0x18) r1 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f0000000000)=[@in={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x14}}, @in={0x2, 0x4e23, @local}], 0x20) 03:12:19 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x6b6b6b00, &(0x7f00000003c0), 0x0, &(0x7f0000000580)={[{@session={'session'}}]}) 03:12:19 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000040)="153f6234488dd25d766070") socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup2(r2, r2) sendmsg$netlink(r3, &(0x7f0000028fc8)={0x0, 0x0, &(0x7f0000019000), 0x0, &(0x7f0000000040)=[@rights={0x18, 0x1, 0x1, [r1]}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000000b80)=[{{&(0x7f0000000200)=@l2, 0x80, &(0x7f00000005c0), 0x0, &(0x7f0000000600)=""/84, 0x54}}, {{&(0x7f0000000680)=@l2, 0x80, &(0x7f0000000a40), 0x0, &(0x7f0000000ac0)=""/147, 0x93}}], 0x400000000000026, 0x62, 0x0) 03:12:19 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000040)="153f6234488dd25d766070") socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup2(r2, r2) sendmsg$netlink(r3, &(0x7f0000028fc8)={0x0, 0x0, &(0x7f0000019000), 0x0, &(0x7f0000000040)=[@rights={0x18, 0x1, 0x1, [r1]}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000000b80)=[{{&(0x7f0000000200)=@l2, 0x80, &(0x7f00000005c0), 0x0, &(0x7f0000000600)=""/84, 0x54}}, {{&(0x7f0000000680)=@l2, 0x80, &(0x7f0000000a40), 0x0, &(0x7f0000000ac0)=""/147, 0x93}}], 0x400000000000108, 0x62, 0x0) [ 1027.795771] FAULT_INJECTION: forcing a failure. [ 1027.795771] name failslab, interval 1, probability 0, space 0, times 0 [ 1027.846987] CPU: 0 PID: 26978 Comm: syz-executor1 Not tainted 4.19.0-rc8+ #64 [ 1027.854330] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1027.863724] Call Trace: [ 1027.866373] dump_stack+0x1c4/0x2b4 [ 1027.870051] ? dump_stack_print_info.cold.2+0x52/0x52 [ 1027.875313] should_fail.cold.4+0xa/0x17 [ 1027.879427] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 1027.884563] ? _raw_spin_unlock+0x2c/0x50 [ 1027.888754] ? __mutex_lock+0x85e/0x1700 [ 1027.892856] ? graph_lock+0x170/0x170 [ 1027.896690] ? graph_lock+0x170/0x170 [ 1027.900528] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1027.906103] ? radix_tree_descend+0x13c/0x2e0 [ 1027.910651] ? find_held_lock+0x36/0x1c0 [ 1027.914757] ? __lock_is_held+0xb5/0x140 [ 1027.918871] ? ___might_sleep+0x1ed/0x300 [ 1027.923048] ? arch_local_save_flags+0x40/0x40 [ 1027.927665] ? __radix_tree_insert+0x8f0/0x8f0 [ 1027.932281] ? avc_has_extended_perms+0xab2/0x15a0 [ 1027.937261] __should_failslab+0x124/0x180 [ 1027.941536] should_failslab+0x9/0x14 03:12:19 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000040)="153f6234488dd25d766070") socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup2(r2, r2) sendmsg$netlink(r3, &(0x7f0000028fc8)={0x0, 0x0, &(0x7f0000019000), 0x0, &(0x7f0000000040)=[@rights={0x18, 0x1, 0x1, [r1]}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000000b80)=[{{&(0x7f0000000200)=@l2, 0x80, &(0x7f00000005c0), 0x0, &(0x7f0000000600)=""/84, 0x54}}, {{&(0x7f0000000680)=@l2, 0x80, &(0x7f0000000a40), 0x0, &(0x7f0000000ac0)=""/147, 0x93}}], 0x40000000000011c, 0x62, 0x0) [ 1027.945385] kmem_cache_alloc_trace+0x2d7/0x750 [ 1027.950129] loop_add+0xa3/0xa30 [ 1027.953531] ? loop_lookup+0x105/0x230 [ 1027.957454] ? loop_queue_rq+0x690/0x690 [ 1027.961570] loop_control_ioctl+0x199/0x530 [ 1027.965939] ? loop_add+0xa30/0xa30 [ 1027.969605] ? arch_local_save_flags+0x40/0x40 [ 1027.974229] ? __mutex_unlock_slowpath+0x197/0x8c0 [ 1027.979199] ? loop_add+0xa30/0xa30 [ 1027.982880] do_vfs_ioctl+0x1de/0x1720 [ 1027.986816] ? ioctl_preallocate+0x300/0x300 [ 1027.991259] ? selinux_file_mprotect+0x620/0x620 03:12:19 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000040)="153f6234488dd25d766070") socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup2(r2, r2) sendmsg$netlink(r3, &(0x7f0000028fc8)={0x0, 0x0, &(0x7f0000019000), 0x0, &(0x7f0000000040)=[@rights={0x18, 0x1, 0x1, [r1]}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000000b80)=[{{&(0x7f0000000200)=@l2, 0x80, &(0x7f00000005c0), 0x0, &(0x7f0000000600)=""/84, 0x54}}, {{&(0x7f0000000680)=@l2, 0x80, &(0x7f0000000a40), 0x0, &(0x7f0000000ac0)=""/147, 0x93}}], 0x400000000000099, 0x62, 0x0) 03:12:19 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000040)="153f6234488dd25d766070") socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup2(r2, r2) sendmsg$netlink(r3, &(0x7f0000028fc8)={0x0, 0x0, &(0x7f0000019000), 0x0, &(0x7f0000000040)=[@rights={0x18, 0x1, 0x1, [r1]}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000000b80)=[{{&(0x7f0000000200)=@l2, 0x80, &(0x7f00000005c0), 0x0, &(0x7f0000000600)=""/84, 0x54}}, {{&(0x7f0000000680)=@l2, 0x80, &(0x7f0000000a40), 0x0, &(0x7f0000000ac0)=""/147, 0x93}}], 0x40000000000003d, 0x62, 0x0) [ 1027.996578] ? __sb_end_write+0xd9/0x110 [ 1028.000680] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1028.006244] ? fput+0x130/0x1a0 [ 1028.009557] ? do_syscall_64+0x9a/0x820 [ 1028.013574] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1028.019146] ? security_file_ioctl+0x94/0xc0 [ 1028.023601] ksys_ioctl+0xa9/0xd0 [ 1028.027101] __x64_sys_ioctl+0x73/0xb0 [ 1028.031027] do_syscall_64+0x1b9/0x820 [ 1028.034950] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 1028.040355] ? syscall_return_slowpath+0x5e0/0x5e0 03:12:19 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000040)="153f6234488dd25d766070") socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup2(r2, r2) sendmsg$netlink(r3, &(0x7f0000028fc8)={0x0, 0x0, &(0x7f0000019000), 0x0, &(0x7f0000000040)=[@rights={0x18, 0x1, 0x1, [r1]}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000000b80)=[{{&(0x7f0000000200)=@l2, 0x80, &(0x7f00000005c0), 0x0, &(0x7f0000000600)=""/84, 0x54}}, {{&(0x7f0000000680)=@l2, 0x80, &(0x7f0000000a40), 0x0, &(0x7f0000000ac0)=""/147, 0x93}}], 0x4000000000000b4, 0x62, 0x0) [ 1028.045332] ? trace_hardirqs_on_caller+0x310/0x310 [ 1028.050401] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 1028.055454] ? recalc_sigpending_tsk+0x180/0x180 [ 1028.060244] ? kasan_check_write+0x14/0x20 [ 1028.065273] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1028.070194] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1028.075414] RIP: 0033:0x457569 [ 1028.078635] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 03:12:19 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000040)="153f6234488dd25d766070") socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup2(r2, r2) sendmsg$netlink(r3, &(0x7f0000028fc8)={0x0, 0x0, &(0x7f0000019000), 0x0, &(0x7f0000000040)=[@rights={0x18, 0x1, 0x1, [r1]}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000000b80)=[{{&(0x7f0000000200)=@l2, 0x80, &(0x7f00000005c0), 0x0, &(0x7f0000000600)=""/84, 0x54}}, {{&(0x7f0000000680)=@l2, 0x80, &(0x7f0000000a40), 0x0, &(0x7f0000000ac0)=""/147, 0x93}}], 0x40000000000008b, 0x62, 0x0) [ 1028.097561] RSP: 002b:00007fe27d1eac78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1028.105456] RAX: ffffffffffffffda RBX: 00007fe27d1eac90 RCX: 0000000000457569 [ 1028.112761] RDX: 0000000000000000 RSI: 0000000000004c80 RDI: 0000000000000003 [ 1028.120055] RBP: 000000000072bfa0 R08: 0000000000000000 R09: 0000000000000000 [ 1028.127343] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fe27d1eb6d4 [ 1028.134633] R13: 00000000004c039f R14: 00000000004d0540 R15: 0000000000000005 03:12:19 executing program 1 (fault-call:3 fault-nth:1): r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) 03:12:19 executing program 3: socket$packet(0x11, 0xa, 0x300) syz_emit_ethernet(0x4e, &(0x7f0000000080)={@local, @broadcast, [{}], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x0, 0x0, @local, @local={0xfe, 0x80, [0xc00]}, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, &(0x7f00000002c0)) [ 1028.160645] hfs: invalid session number or type of track [ 1028.179693] hfs: can't find a HFS filesystem on dev loop2 [ 1028.237574] hfs: invalid session number or type of track [ 1028.240186] FAULT_INJECTION: forcing a failure. [ 1028.240186] name failslab, interval 1, probability 0, space 0, times 0 [ 1028.245335] hfs: can't find a HFS filesystem on dev loop2 [ 1028.255362] CPU: 1 PID: 27019 Comm: syz-executor1 Not tainted 4.19.0-rc8+ #64 [ 1028.267226] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1028.276564] Call Trace: [ 1028.279151] dump_stack+0x1c4/0x2b4 [ 1028.282801] ? dump_stack_print_info.cold.2+0x52/0x52 [ 1028.288010] should_fail.cold.4+0xa/0x17 [ 1028.292080] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 1028.297195] ? graph_lock+0x170/0x170 [ 1028.300994] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1028.306551] ? graph_lock+0x170/0x170 [ 1028.310403] ? find_held_lock+0x36/0x1c0 [ 1028.314497] ? __lock_is_held+0xb5/0x140 [ 1028.318585] ? ___might_sleep+0x1ed/0x300 [ 1028.322732] ? arch_local_save_flags+0x40/0x40 [ 1028.327319] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1028.332846] ? node_tag_clear+0xc2/0x1c0 [ 1028.336918] __should_failslab+0x124/0x180 [ 1028.341157] should_failslab+0x9/0x14 [ 1028.344982] kmem_cache_alloc_node_trace+0x270/0x740 [ 1028.350093] ? __fprop_inc_percpu_max+0x2d0/0x2d0 [ 1028.354974] __kmalloc_node+0x33/0x70 [ 1028.358789] blk_mq_alloc_tag_set+0x385/0xad0 [ 1028.363285] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1028.368837] ? blk_mq_update_nr_hw_queues+0xe50/0xe50 [ 1028.374052] loop_add+0x2c9/0xa30 [ 1028.377528] ? loop_queue_rq+0x690/0x690 [ 1028.381605] loop_control_ioctl+0x199/0x530 [ 1028.385940] ? loop_add+0xa30/0xa30 [ 1028.389582] ? arch_local_save_flags+0x40/0x40 [ 1028.394182] ? __mutex_unlock_slowpath+0x197/0x8c0 [ 1028.399126] ? loop_add+0xa30/0xa30 [ 1028.402746] do_vfs_ioctl+0x1de/0x1720 [ 1028.406654] ? ioctl_preallocate+0x300/0x300 [ 1028.411092] ? selinux_file_mprotect+0x620/0x620 [ 1028.415859] ? __sb_end_write+0xd9/0x110 [ 1028.419938] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1028.425495] ? fput+0x130/0x1a0 [ 1028.428781] ? do_syscall_64+0x9a/0x820 [ 1028.432749] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1028.438305] ? security_file_ioctl+0x94/0xc0 [ 1028.442717] ksys_ioctl+0xa9/0xd0 [ 1028.446181] __x64_sys_ioctl+0x73/0xb0 [ 1028.450075] do_syscall_64+0x1b9/0x820 [ 1028.453974] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 1028.459356] ? syscall_return_slowpath+0x5e0/0x5e0 [ 1028.464293] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1028.469132] ? trace_hardirqs_on_caller+0x310/0x310 [ 1028.474153] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 1028.479172] ? prepare_exit_to_usermode+0x291/0x3b0 [ 1028.484196] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1028.489052] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1028.494245] RIP: 0033:0x457569 [ 1028.497452] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1028.516345] RSP: 002b:00007fe27d20bc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1028.524048] RAX: ffffffffffffffda RBX: 00007fe27d20bc90 RCX: 0000000000457569 [ 1028.531304] RDX: 0000000000000000 RSI: 0000000000004c80 RDI: 0000000000000003 [ 1028.538562] RBP: 000000000072bf00 R08: 0000000000000000 R09: 0000000000000000 [ 1028.545819] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fe27d20c6d4 [ 1028.553077] R13: 00000000004c039f R14: 00000000004d0540 R15: 0000000000000005 03:12:20 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f00000003c0), 0x900, &(0x7f0000000580)={[{@session={'session'}}]}) 03:12:20 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x200000000000000, &(0x7f00000003c0), 0x0, &(0x7f0000000580)={[{@session={'session'}}]}) 03:12:20 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e23}, 0x1c) listen(r0, 0x18) r1 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f0000000000)=[@in={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0xc}, [0xe803000000000000]}, @in={0x2, 0x4e23, @local}], 0x20) 03:12:20 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000040)="153f6234488dd25d766070") socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup2(r2, r2) sendmsg$netlink(r3, &(0x7f0000028fc8)={0x0, 0x0, &(0x7f0000019000), 0x0, &(0x7f0000000040)=[@rights={0x18, 0x1, 0x1, [r1]}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000000b80)=[{{&(0x7f0000000200)=@l2, 0x80, &(0x7f00000005c0), 0x0, &(0x7f0000000600)=""/84, 0x54}}, {{&(0x7f0000000680)=@l2, 0x80, &(0x7f0000000a40), 0x0, &(0x7f0000000ac0)=""/147, 0x93}}], 0x40000000000000e, 0x62, 0x0) 03:12:20 executing program 1 (fault-call:3 fault-nth:2): r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) 03:12:20 executing program 3: socket$packet(0x11, 0xa, 0x300) syz_emit_ethernet(0x4e, &(0x7f0000000080)={@local, @broadcast, [{}], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x0, 0x0, @local, @local={0xfe, 0x80, [0x543]}, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, &(0x7f00000002c0)) 03:12:20 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000040)="153f6234488dd25d766070") socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup2(r2, r2) sendmsg$netlink(r3, &(0x7f0000028fc8)={0x0, 0x0, &(0x7f0000019000), 0x0, &(0x7f0000000040)=[@rights={0x18, 0x1, 0x1, [r1]}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000000b80)=[{{&(0x7f0000000200)=@l2, 0x80, &(0x7f00000005c0), 0x0, &(0x7f0000000600)=""/84, 0x54}}, {{&(0x7f0000000680)=@l2, 0x80, &(0x7f0000000a40), 0x0, &(0x7f0000000ac0)=""/147, 0x93}}], 0x400000000000102, 0x62, 0x0) [ 1028.693566] FAULT_INJECTION: forcing a failure. [ 1028.693566] name failslab, interval 1, probability 0, space 0, times 0 [ 1028.751182] CPU: 1 PID: 27030 Comm: syz-executor1 Not tainted 4.19.0-rc8+ #64 [ 1028.758511] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1028.767873] Call Trace: [ 1028.770530] dump_stack+0x1c4/0x2b4 [ 1028.774185] ? dump_stack_print_info.cold.2+0x52/0x52 [ 1028.779439] should_fail.cold.4+0xa/0x17 [ 1028.783550] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 1028.788680] ? unwind_get_return_address+0x61/0xa0 [ 1028.793623] ? __save_stack_trace+0x8d/0xf0 [ 1028.797969] ? graph_lock+0x170/0x170 [ 1028.801796] ? graph_lock+0x170/0x170 [ 1028.805624] ? save_stack+0xa9/0xd0 [ 1028.809275] ? find_held_lock+0x36/0x1c0 [ 1028.813354] ? __lock_is_held+0xb5/0x140 [ 1028.817444] ? ___might_sleep+0x1ed/0x300 [ 1028.821611] ? arch_local_save_flags+0x40/0x40 [ 1028.826230] __should_failslab+0x124/0x180 [ 1028.830583] should_failslab+0x9/0x14 [ 1028.834404] kmem_cache_alloc_node_trace+0x270/0x740 [ 1028.839548] ? kasan_unpoison_shadow+0x35/0x50 [ 1028.844158] __kmalloc_node+0x33/0x70 [ 1028.847986] blk_mq_alloc_tag_set+0x41c/0xad0 [ 1028.852512] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1028.858085] ? blk_mq_update_nr_hw_queues+0xe50/0xe50 [ 1028.863338] loop_add+0x2c9/0xa30 [ 1028.866824] ? loop_queue_rq+0x690/0x690 [ 1028.870917] loop_control_ioctl+0x199/0x530 [ 1028.875272] ? loop_add+0xa30/0xa30 [ 1028.878953] ? arch_local_save_flags+0x40/0x40 [ 1028.883570] ? __mutex_unlock_slowpath+0x197/0x8c0 [ 1028.888539] ? loop_add+0xa30/0xa30 [ 1028.892187] do_vfs_ioctl+0x1de/0x1720 [ 1028.896112] ? ioctl_preallocate+0x300/0x300 03:12:20 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000040)="153f6234488dd25d766070") socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup2(r2, r2) sendmsg$netlink(r3, &(0x7f0000028fc8)={0x0, 0x0, &(0x7f0000019000), 0x0, &(0x7f0000000040)=[@rights={0x18, 0x1, 0x1, [r1]}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000000b80)=[{{&(0x7f0000000200)=@l2, 0x80, &(0x7f00000005c0), 0x0, &(0x7f0000000600)=""/84, 0x54}}, {{&(0x7f0000000680)=@l2, 0x80, &(0x7f0000000a40), 0x0, &(0x7f0000000ac0)=""/147, 0x93}}], 0x4000000000000a0, 0x62, 0x0) 03:12:20 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0xfcfdffff, &(0x7f00000003c0), 0x0, &(0x7f0000000580)={[{@session={'session'}}]}) 03:12:20 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e23}, 0x1c) listen(r0, 0x18) r1 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f0000000000)=[@in={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0xc}, [0xfc000000]}, @in={0x2, 0x4e23, @local}], 0x20) [ 1028.900548] ? selinux_file_mprotect+0x620/0x620 [ 1028.905334] ? __sb_end_write+0xd9/0x110 [ 1028.909426] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1028.915004] ? fput+0x130/0x1a0 [ 1028.918308] ? do_syscall_64+0x9a/0x820 [ 1028.922309] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1028.927864] ? security_file_ioctl+0x94/0xc0 [ 1028.932296] ksys_ioctl+0xa9/0xd0 [ 1028.935785] __x64_sys_ioctl+0x73/0xb0 [ 1028.939730] do_syscall_64+0x1b9/0x820 [ 1028.943650] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 1028.949132] ? syscall_return_slowpath+0x5e0/0x5e0 [ 1028.954079] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1028.958957] ? trace_hardirqs_on_caller+0x310/0x310 [ 1028.963990] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 1028.969037] ? prepare_exit_to_usermode+0x291/0x3b0 [ 1028.974099] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1028.978987] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1028.984198] RIP: 0033:0x457569 03:12:20 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x5000000, &(0x7f00000003c0), 0x0, &(0x7f0000000580)={[{@session={'session'}}]}) [ 1028.987416] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1029.006329] RSP: 002b:00007fe27d20bc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1029.014058] RAX: ffffffffffffffda RBX: 00007fe27d20bc90 RCX: 0000000000457569 [ 1029.021383] RDX: 0000000000000000 RSI: 0000000000004c80 RDI: 0000000000000003 [ 1029.028673] RBP: 000000000072bf00 R08: 0000000000000000 R09: 0000000000000000 [ 1029.035976] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fe27d20c6d4 [ 1029.043268] R13: 00000000004c039f R14: 00000000004d0540 R15: 0000000000000005 03:12:20 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000040)="153f6234488dd25d766070") socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup2(r2, r2) sendmsg$netlink(r3, &(0x7f0000028fc8)={0x0, 0x0, &(0x7f0000019000), 0x0, &(0x7f0000000040)=[@rights={0x18, 0x1, 0x1, [r1]}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000000b80)=[{{&(0x7f0000000200)=@l2, 0x80, &(0x7f00000005c0), 0x0, &(0x7f0000000600)=""/84, 0x54}}, {{&(0x7f0000000680)=@l2, 0x80, &(0x7f0000000a40), 0x0, &(0x7f0000000ac0)=""/147, 0x93}}], 0x400000000000098, 0x62, 0x0) [ 1029.143525] hfs: invalid session number or type of track [ 1029.155182] hfs: can't find a HFS filesystem on dev loop2 [ 1029.229202] hfs: invalid session number or type of track [ 1029.238043] hfs: can't find a HFS filesystem on dev loop2 03:12:20 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f00000003c0), 0xe000000000000, &(0x7f0000000580)={[{@session={'session'}}]}) 03:12:20 executing program 3: socket$packet(0x11, 0xa, 0x300) syz_emit_ethernet(0x4e, &(0x7f0000000080)={@local, @broadcast, [{}], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x0, 0x0, @local, @local={0xfe, 0x80, [0xd000000]}, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, &(0x7f00000002c0)) 03:12:20 executing program 1 (fault-call:3 fault-nth:3): r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) 03:12:20 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x3f00, &(0x7f00000003c0), 0x0, &(0x7f0000000580)={[{@session={'session'}}]}) 03:12:20 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000040)="153f6234488dd25d766070") socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup2(r2, r2) sendmsg$netlink(r3, &(0x7f0000028fc8)={0x0, 0x0, &(0x7f0000019000), 0x0, &(0x7f0000000040)=[@rights={0x18, 0x1, 0x1, [r1]}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000000b80)=[{{&(0x7f0000000200)=@l2, 0x80, &(0x7f00000005c0), 0x0, &(0x7f0000000600)=""/84, 0x54}}, {{&(0x7f0000000680)=@l2, 0x80, &(0x7f0000000a40), 0x0, &(0x7f0000000ac0)=""/147, 0x93}}], 0x4000000000000d8, 0x62, 0x0) 03:12:20 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e23}, 0x1c) listen(r0, 0x18) r1 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f0000000000)=[@in={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0xc}, [0xe4ffffff]}, @in={0x2, 0x4e23, @local}], 0x20) 03:12:20 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000040)="153f6234488dd25d766070") socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup2(r2, r2) sendmsg$netlink(r3, &(0x7f0000028fc8)={0x0, 0x0, &(0x7f0000019000), 0x0, &(0x7f0000000040)=[@rights={0x18, 0x1, 0x1, [r1]}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000000b80)=[{{&(0x7f0000000200)=@l2, 0x80, &(0x7f00000005c0), 0x0, &(0x7f0000000600)=""/84, 0x54}}, {{&(0x7f0000000680)=@l2, 0x80, &(0x7f0000000a40), 0x0, &(0x7f0000000ac0)=""/147, 0x93}}], 0x400000000000008, 0x62, 0x0) [ 1029.362350] FAULT_INJECTION: forcing a failure. [ 1029.362350] name failslab, interval 1, probability 0, space 0, times 0 [ 1029.399300] CPU: 0 PID: 27070 Comm: syz-executor1 Not tainted 4.19.0-rc8+ #64 [ 1029.406650] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1029.416034] Call Trace: [ 1029.418698] dump_stack+0x1c4/0x2b4 [ 1029.422401] ? dump_stack_print_info.cold.2+0x52/0x52 [ 1029.427670] should_fail.cold.4+0xa/0x17 [ 1029.431787] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 1029.436949] ? graph_lock+0x170/0x170 [ 1029.440791] ? kernel_text_address+0x79/0xf0 [ 1029.445233] ? __kernel_text_address+0xd/0x40 [ 1029.449784] ? graph_lock+0x170/0x170 [ 1029.453639] ? __save_stack_trace+0x8d/0xf0 [ 1029.458013] ? find_held_lock+0x36/0x1c0 [ 1029.462117] ? __lock_is_held+0xb5/0x140 [ 1029.466244] ? ___might_sleep+0x1ed/0x300 [ 1029.470484] ? arch_local_save_flags+0x40/0x40 [ 1029.475117] ? check_preemption_disabled+0x48/0x200 [ 1029.480156] ? check_preemption_disabled+0x48/0x200 [ 1029.485215] __should_failslab+0x124/0x180 [ 1029.489488] should_failslab+0x9/0x14 [ 1029.493324] kmem_cache_alloc_node_trace+0x270/0x740 [ 1029.498476] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1029.504046] ? find_next_bit+0x104/0x130 [ 1029.508162] blk_mq_init_tags+0x79/0x2b0 03:12:20 executing program 3: socket$packet(0x11, 0xa, 0x300) syz_emit_ethernet(0x4e, &(0x7f0000000080)={@local, @broadcast, [{}], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x0, 0x0, @local, @local={0xfe, 0x80, [0x40000000]}, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, &(0x7f00000002c0)) [ 1029.512264] blk_mq_alloc_rq_map+0x9f/0x220 [ 1029.516624] __blk_mq_alloc_rq_map+0xb1/0x2e0 [ 1029.521166] blk_mq_alloc_tag_set+0x627/0xad0 [ 1029.525708] ? blk_mq_update_nr_hw_queues+0xe50/0xe50 [ 1029.531033] loop_add+0x2c9/0xa30 [ 1029.534531] ? loop_queue_rq+0x690/0x690 [ 1029.538665] loop_control_ioctl+0x199/0x530 [ 1029.543043] ? loop_add+0xa30/0xa30 [ 1029.546705] ? arch_local_save_flags+0x40/0x40 [ 1029.551342] ? __mutex_unlock_slowpath+0x197/0x8c0 [ 1029.556346] ? loop_add+0xa30/0xa30 03:12:21 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e23}, 0x1c) listen(r0, 0x18) r1 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f0000000000)=[@in={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0xc}, [0xe8030000]}, @in={0x2, 0x4e23, @local}], 0x20) [ 1029.560016] do_vfs_ioctl+0x1de/0x1720 [ 1029.563962] ? ioctl_preallocate+0x300/0x300 [ 1029.568424] ? selinux_file_mprotect+0x620/0x620 [ 1029.573230] ? __sb_end_write+0xd9/0x110 [ 1029.577338] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1029.582902] ? fput+0x130/0x1a0 [ 1029.586220] ? do_syscall_64+0x9a/0x820 [ 1029.590240] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1029.595807] ? security_file_ioctl+0x94/0xc0 [ 1029.600256] ksys_ioctl+0xa9/0xd0 [ 1029.603753] __x64_sys_ioctl+0x73/0xb0 [ 1029.607696] do_syscall_64+0x1b9/0x820 03:12:21 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000040)="153f6234488dd25d766070") socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup2(r2, r2) sendmsg$netlink(r3, &(0x7f0000028fc8)={0x0, 0x0, &(0x7f0000019000), 0x0, &(0x7f0000000040)=[@rights={0x18, 0x1, 0x1, [r1]}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000000b80)=[{{&(0x7f0000000200)=@l2, 0x80, &(0x7f00000005c0), 0x0, &(0x7f0000000600)=""/84, 0x54}}, {{&(0x7f0000000680)=@l2, 0x80, &(0x7f0000000a40), 0x0, &(0x7f0000000ac0)=""/147, 0x93}}], 0x4000000000000d2, 0x62, 0x0) [ 1029.611613] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 1029.617025] ? syscall_return_slowpath+0x5e0/0x5e0 [ 1029.621996] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1029.626873] ? trace_hardirqs_on_caller+0x310/0x310 [ 1029.631922] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 1029.637003] ? prepare_exit_to_usermode+0x291/0x3b0 [ 1029.642065] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1029.646979] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1029.652213] RIP: 0033:0x457569 03:12:21 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000040)="153f6234488dd25d766070") socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup2(r2, r2) sendmsg$netlink(r3, &(0x7f0000028fc8)={0x0, 0x0, &(0x7f0000019000), 0x0, &(0x7f0000000040)=[@rights={0x18, 0x1, 0x1, [r1]}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000000b80)=[{{&(0x7f0000000200)=@l2, 0x80, &(0x7f00000005c0), 0x0, &(0x7f0000000600)=""/84, 0x54}}, {{&(0x7f0000000680)=@l2, 0x80, &(0x7f0000000a40), 0x0, &(0x7f0000000ac0)=""/147, 0x93}}], 0x4000000000000a3, 0x62, 0x0) [ 1029.655447] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1029.674397] RSP: 002b:00007fe27d20bc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1029.682149] RAX: ffffffffffffffda RBX: 00007fe27d20bc90 RCX: 0000000000457569 [ 1029.689437] RDX: 0000000000000000 RSI: 0000000000004c80 RDI: 0000000000000003 [ 1029.696737] RBP: 000000000072bf00 R08: 0000000000000000 R09: 0000000000000000 [ 1029.704031] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fe27d20c6d4 [ 1029.711323] R13: 00000000004c039f R14: 00000000004d0540 R15: 0000000000000005 [ 1029.723872] blk-mq: reduced tag depth (128 -> 64) 03:12:21 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000040)="153f6234488dd25d766070") socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup2(r2, r2) sendmsg$netlink(r3, &(0x7f0000028fc8)={0x0, 0x0, &(0x7f0000019000), 0x0, &(0x7f0000000040)=[@rights={0x18, 0x1, 0x1, [r1]}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000000b80)=[{{&(0x7f0000000200)=@l2, 0x80, &(0x7f00000005c0), 0x0, &(0x7f0000000600)=""/84, 0x54}}, {{&(0x7f0000000680)=@l2, 0x80, &(0x7f0000000a40), 0x0, &(0x7f0000000ac0)=""/147, 0x93}}], 0x40000000000012b, 0x62, 0x0) 03:12:21 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f00000003c0), 0x5000000, &(0x7f0000000580)={[{@session={'session'}}]}) 03:12:21 executing program 1 (fault-call:3 fault-nth:4): r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) 03:12:21 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0xedc000000000, &(0x7f00000003c0), 0x0, &(0x7f0000000580)={[{@session={'session'}}]}) 03:12:21 executing program 3: socket$packet(0x11, 0xa, 0x300) syz_emit_ethernet(0x4e, &(0x7f0000000080)={@local, @broadcast, [{}], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x0, 0x0, @local, @local={0xfe, 0x80, [0x8000000]}, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, &(0x7f00000002c0)) 03:12:21 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000040)="153f6234488dd25d766070") socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup2(r2, r2) sendmsg$netlink(r3, &(0x7f0000028fc8)={0x0, 0x0, &(0x7f0000019000), 0x0, &(0x7f0000000040)=[@rights={0x18, 0x1, 0x1, [r1]}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000000b80)=[{{&(0x7f0000000200)=@l2, 0x80, &(0x7f00000005c0), 0x0, &(0x7f0000000600)=""/84, 0x54}}, {{&(0x7f0000000680)=@l2, 0x80, &(0x7f0000000a40), 0x0, &(0x7f0000000ac0)=""/147, 0x93}}], 0x400000000000147, 0x62, 0x0) 03:12:21 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e23}, 0x1c) listen(r0, 0x18) r1 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f0000000000)=[@in={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0xc}, [0x3e8]}, @in={0x2, 0x4e23, @local}], 0x20) 03:12:21 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000040)="153f6234488dd25d766070") socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup2(r2, r2) sendmsg$netlink(r3, &(0x7f0000028fc8)={0x0, 0x0, &(0x7f0000019000), 0x0, &(0x7f0000000040)=[@rights={0x18, 0x1, 0x1, [r1]}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000000b80)=[{{&(0x7f0000000200)=@l2, 0x80, &(0x7f00000005c0), 0x0, &(0x7f0000000600)=""/84, 0x54}}, {{&(0x7f0000000680)=@l2, 0x80, &(0x7f0000000a40), 0x0, &(0x7f0000000ac0)=""/147, 0x93}}], 0x40000000000016f, 0x62, 0x0) [ 1030.112312] FAULT_INJECTION: forcing a failure. [ 1030.112312] name failslab, interval 1, probability 0, space 0, times 0 03:12:21 executing program 3: socket$packet(0x11, 0xa, 0x300) syz_emit_ethernet(0x4e, &(0x7f0000000080)={@local, @broadcast, [{}], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x0, 0x0, @local, @local={0xfe, 0x80, [0x4305]}, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, &(0x7f00000002c0)) [ 1030.156063] CPU: 1 PID: 27114 Comm: syz-executor1 Not tainted 4.19.0-rc8+ #64 [ 1030.163391] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1030.172763] Call Trace: [ 1030.175378] dump_stack+0x1c4/0x2b4 [ 1030.179041] ? dump_stack_print_info.cold.2+0x52/0x52 [ 1030.184276] should_fail.cold.4+0xa/0x17 [ 1030.188369] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 1030.193508] ? rcu_read_unlock_special.part.39+0x11f0/0x11f0 [ 1030.199333] ? rcu_dynticks_curr_cpu_in_eqs+0x9f/0x160 [ 1030.204633] ? graph_lock+0x170/0x170 [ 1030.208447] ? rcu_bh_qs+0xc0/0xc0 [ 1030.212013] ? unwind_dump+0x190/0x190 [ 1030.215917] ? graph_lock+0x170/0x170 [ 1030.219756] ? is_bpf_text_address+0xd3/0x170 [ 1030.224284] ? find_held_lock+0x36/0x1c0 [ 1030.228365] ? __lock_is_held+0xb5/0x140 [ 1030.232442] ? ___might_sleep+0x1ed/0x300 [ 1030.236616] ? arch_local_save_flags+0x40/0x40 [ 1030.241227] ? save_stack+0x43/0xd0 [ 1030.244858] ? kasan_kmalloc+0xc7/0xe0 [ 1030.248737] ? kmem_cache_alloc_node_trace+0x14c/0x740 [ 1030.254028] ? blk_mq_init_tags+0x79/0x2b0 [ 1030.258268] ? blk_mq_alloc_tag_set+0x627/0xad0 [ 1030.262939] ? loop_add+0x2c9/0xa30 [ 1030.266586] __should_failslab+0x124/0x180 [ 1030.270826] should_failslab+0x9/0x14 [ 1030.274623] kmem_cache_alloc_node_trace+0x270/0x740 [ 1030.279738] __kmalloc_node+0x33/0x70 [ 1030.283781] sbitmap_init_node+0x288/0x440 [ 1030.288053] sbitmap_queue_init_node+0xb2/0x850 [ 1030.292742] ? __lock_is_held+0xb5/0x140 [ 1030.296798] ? sbitmap_init_node+0x440/0x440 [ 1030.301208] ? blk_mq_init_tags+0x79/0x2b0 [ 1030.305507] ? rcu_read_lock_sched_held+0x108/0x120 [ 1030.310530] ? kmem_cache_alloc_node_trace+0x34b/0x740 [ 1030.315823] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1030.321366] ? find_next_bit+0x104/0x130 [ 1030.325450] blk_mq_init_tags+0x116/0x2b0 [ 1030.329619] blk_mq_alloc_rq_map+0x9f/0x220 [ 1030.333945] __blk_mq_alloc_rq_map+0xb1/0x2e0 [ 1030.338460] blk_mq_alloc_tag_set+0x627/0xad0 [ 1030.342975] ? blk_mq_update_nr_hw_queues+0xe50/0xe50 [ 1030.348166] loop_add+0x2c9/0xa30 [ 1030.351629] ? loop_queue_rq+0x690/0x690 [ 1030.355730] loop_control_ioctl+0x199/0x530 [ 1030.360082] ? loop_add+0xa30/0xa30 [ 1030.363724] ? arch_local_save_flags+0x40/0x40 [ 1030.368331] ? __mutex_unlock_slowpath+0x197/0x8c0 [ 1030.373271] ? loop_add+0xa30/0xa30 [ 1030.376890] do_vfs_ioctl+0x1de/0x1720 [ 1030.380797] ? ioctl_preallocate+0x300/0x300 [ 1030.385233] ? selinux_file_mprotect+0x620/0x620 [ 1030.390032] ? __sb_end_write+0xd9/0x110 [ 1030.394107] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1030.399653] ? fput+0x130/0x1a0 [ 1030.402964] ? do_syscall_64+0x9a/0x820 [ 1030.406945] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1030.412496] ? security_file_ioctl+0x94/0xc0 [ 1030.416903] ksys_ioctl+0xa9/0xd0 [ 1030.420359] __x64_sys_ioctl+0x73/0xb0 [ 1030.424267] do_syscall_64+0x1b9/0x820 [ 1030.428163] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 1030.433556] ? syscall_return_slowpath+0x5e0/0x5e0 [ 1030.438505] ? trace_hardirqs_on_caller+0x310/0x310 [ 1030.443525] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 1030.448546] ? recalc_sigpending_tsk+0x180/0x180 [ 1030.453307] ? kasan_check_write+0x14/0x20 [ 1030.457552] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1030.462411] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1030.467629] RIP: 0033:0x457569 [ 1030.470830] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1030.489729] RSP: 002b:00007fe27d1eac78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1030.497454] RAX: ffffffffffffffda RBX: 00007fe27d1eac90 RCX: 0000000000457569 03:12:21 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0xfdfdffff00000000, &(0x7f00000003c0), 0x0, &(0x7f0000000580)={[{@session={'session'}}]}) 03:12:21 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000040)="153f6234488dd25d766070") socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup2(r2, r2) sendmsg$netlink(r3, &(0x7f0000028fc8)={0x0, 0x0, &(0x7f0000019000), 0x0, &(0x7f0000000040)=[@rights={0x18, 0x1, 0x1, [r1]}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000000b80)=[{{&(0x7f0000000200)=@l2, 0x80, &(0x7f00000005c0), 0x0, &(0x7f0000000600)=""/84, 0x54}}, {{&(0x7f0000000680)=@l2, 0x80, &(0x7f0000000a40), 0x0, &(0x7f0000000ac0)=""/147, 0x93}}], 0x40000000000006a, 0x62, 0x0) [ 1030.504728] RDX: 0000000000000000 RSI: 0000000000004c80 RDI: 0000000000000003 [ 1030.512021] RBP: 000000000072bfa0 R08: 0000000000000000 R09: 0000000000000000 [ 1030.519289] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fe27d1eb6d4 [ 1030.526566] R13: 00000000004c039f R14: 00000000004d0540 R15: 0000000000000005 [ 1030.575087] blk-mq: reduced tag depth (128 -> 64) 03:12:22 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e23}, 0x1c) listen(r0, 0x18) r1 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f0000000000)=[@in={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0xc}, [0x7]}, @in={0x2, 0x4e23, @local}], 0x20) [ 1030.627379] hfs: invalid session number or type of track [ 1030.632868] hfs: can't find a HFS filesystem on dev loop2 03:12:22 executing program 3: socket$packet(0x11, 0xa, 0x300) syz_emit_ethernet(0x4e, &(0x7f0000000080)={@local, @broadcast, [{}], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x0, 0x0, @local, @local={0xfe, 0x80, [0x200000000000000]}, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, &(0x7f00000002c0)) [ 1030.743830] hfs: invalid session number or type of track [ 1030.757360] hfs: can't find a HFS filesystem on dev loop2 03:12:22 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f00000003c0), 0x4c000000, &(0x7f0000000580)={[{@session={'session'}}]}) 03:12:22 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000040)="153f6234488dd25d766070") socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup2(r2, r2) sendmsg$netlink(r3, &(0x7f0000028fc8)={0x0, 0x0, &(0x7f0000019000), 0x0, &(0x7f0000000040)=[@rights={0x18, 0x1, 0x1, [r1]}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000000b80)=[{{&(0x7f0000000200)=@l2, 0x80, &(0x7f00000005c0), 0x0, &(0x7f0000000600)=""/84, 0x54}}, {{&(0x7f0000000680)=@l2, 0x80, &(0x7f0000000a40), 0x0, &(0x7f0000000ac0)=""/147, 0x93}}], 0x40000000000015a, 0x62, 0x0) 03:12:22 executing program 1 (fault-call:3 fault-nth:5): r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) 03:12:22 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e23}, 0x1c) listen(r0, 0x18) r1 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f0000000000)=[@in={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0xc}, [0xf5ffffff00000000]}, @in={0x2, 0x4e23, @local}], 0x20) 03:12:22 executing program 3: socket$packet(0x11, 0xa, 0x300) syz_emit_ethernet(0x4e, &(0x7f0000000080)={@local, @broadcast, [{}], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x0, 0x0, @local, @local={0xfe, 0x80, [0x806]}, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, &(0x7f00000002c0)) 03:12:22 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x7400000000000000, &(0x7f00000003c0), 0x0, &(0x7f0000000580)={[{@session={'session'}}]}) 03:12:22 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000040)="153f6234488dd25d766070") socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup2(r2, r2) sendmsg$netlink(r3, &(0x7f0000028fc8)={0x0, 0x0, &(0x7f0000019000), 0x0, &(0x7f0000000040)=[@rights={0x18, 0x1, 0x1, [r1]}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000000b80)=[{{&(0x7f0000000200)=@l2, 0x80, &(0x7f00000005c0), 0x0, &(0x7f0000000600)=""/84, 0x54}}, {{&(0x7f0000000680)=@l2, 0x80, &(0x7f0000000a40), 0x0, &(0x7f0000000ac0)=""/147, 0x93}}], 0x400000000000046, 0x62, 0x0) 03:12:22 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e23}, 0x1c) listen(r0, 0x18) r1 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f0000000000)=[@in={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0xc}, [0xfffc]}, @in={0x2, 0x4e23, @local}], 0x20) 03:12:22 executing program 3: socket$packet(0x11, 0xa, 0x300) syz_emit_ethernet(0x4e, &(0x7f0000000080)={@local, @broadcast, [{}], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x0, 0x0, @local, @local={0xfe, 0x80, [0x8848]}, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, &(0x7f00000002c0)) [ 1031.050740] FAULT_INJECTION: forcing a failure. [ 1031.050740] name failslab, interval 1, probability 0, space 0, times 0 [ 1031.089839] CPU: 0 PID: 27158 Comm: syz-executor1 Not tainted 4.19.0-rc8+ #64 [ 1031.097171] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1031.106555] Call Trace: [ 1031.109192] dump_stack+0x1c4/0x2b4 [ 1031.112879] ? dump_stack_print_info.cold.2+0x52/0x52 [ 1031.118157] should_fail.cold.4+0xa/0x17 [ 1031.122257] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 1031.127501] ? graph_lock+0x170/0x170 [ 1031.131340] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1031.136946] ? graph_lock+0x170/0x170 [ 1031.140822] ? find_held_lock+0x36/0x1c0 [ 1031.144953] ? __lock_is_held+0xb5/0x140 [ 1031.149082] ? ___might_sleep+0x1ed/0x300 [ 1031.153281] ? arch_local_save_flags+0x40/0x40 [ 1031.157912] ? __kmalloc_node+0x33/0x70 [ 1031.161962] ? __kmalloc_node+0x33/0x70 [ 1031.166013] __should_failslab+0x124/0x180 [ 1031.170283] should_failslab+0x9/0x14 [ 1031.174120] kmem_cache_alloc_node_trace+0x270/0x740 [ 1031.179274] ? check_preemption_disabled+0x48/0x200 [ 1031.184324] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 1031.189371] ? find_next_bit+0x104/0x130 [ 1031.193573] sbitmap_queue_init_node+0x332/0x850 [ 1031.198368] ? __lock_is_held+0xb5/0x140 [ 1031.202490] ? sbitmap_init_node+0x440/0x440 [ 1031.206940] ? blk_mq_init_tags+0x79/0x2b0 [ 1031.211212] ? rcu_read_lock_sched_held+0x108/0x120 [ 1031.216257] ? kmem_cache_alloc_node_trace+0x34b/0x740 [ 1031.221623] ? find_next_bit+0x104/0x130 [ 1031.225735] blk_mq_init_tags+0x116/0x2b0 [ 1031.229948] blk_mq_alloc_rq_map+0x9f/0x220 [ 1031.234321] __blk_mq_alloc_rq_map+0xb1/0x2e0 [ 1031.238879] blk_mq_alloc_tag_set+0x627/0xad0 [ 1031.243457] ? blk_mq_update_nr_hw_queues+0xe50/0xe50 [ 1031.248700] loop_add+0x2c9/0xa30 [ 1031.252196] ? loop_queue_rq+0x690/0x690 [ 1031.256319] loop_control_ioctl+0x199/0x530 [ 1031.260677] ? loop_add+0xa30/0xa30 [ 1031.264353] ? arch_local_save_flags+0x40/0x40 [ 1031.269004] ? __mutex_unlock_slowpath+0x197/0x8c0 [ 1031.273999] ? loop_add+0xa30/0xa30 [ 1031.277669] do_vfs_ioctl+0x1de/0x1720 [ 1031.281599] ? ioctl_preallocate+0x300/0x300 [ 1031.286048] ? selinux_file_mprotect+0x620/0x620 [ 1031.290854] ? __sb_end_write+0xd9/0x110 [ 1031.294974] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 03:12:22 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000040)="153f6234488dd25d766070") socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup2(r2, r2) sendmsg$netlink(r3, &(0x7f0000028fc8)={0x0, 0x0, &(0x7f0000019000), 0x0, &(0x7f0000000040)=[@rights={0x18, 0x1, 0x1, [r1]}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000000b80)=[{{&(0x7f0000000200)=@l2, 0x80, &(0x7f00000005c0), 0x0, &(0x7f0000000600)=""/84, 0x54}}, {{&(0x7f0000000680)=@l2, 0x80, &(0x7f0000000a40), 0x0, &(0x7f0000000ac0)=""/147, 0x93}}], 0x4000000000000bd, 0x62, 0x0) 03:12:22 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000040)="153f6234488dd25d766070") socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup2(r2, r2) sendmsg$netlink(r3, &(0x7f0000028fc8)={0x0, 0x0, &(0x7f0000019000), 0x0, &(0x7f0000000040)=[@rights={0x18, 0x1, 0x1, [r1]}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000000b80)=[{{&(0x7f0000000200)=@l2, 0x80, &(0x7f00000005c0), 0x0, &(0x7f0000000600)=""/84, 0x54}}, {{&(0x7f0000000680)=@l2, 0x80, &(0x7f0000000a40), 0x0, &(0x7f0000000ac0)=""/147, 0x93}}], 0x4000000000000ea, 0x62, 0x0) [ 1031.300539] ? fput+0x130/0x1a0 [ 1031.303851] ? do_syscall_64+0x9a/0x820 [ 1031.307880] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1031.313487] ? security_file_ioctl+0x94/0xc0 [ 1031.317947] ksys_ioctl+0xa9/0xd0 [ 1031.321476] __x64_sys_ioctl+0x73/0xb0 [ 1031.325403] do_syscall_64+0x1b9/0x820 [ 1031.329322] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 1031.334728] ? syscall_return_slowpath+0x5e0/0x5e0 [ 1031.339702] ? trace_hardirqs_on_caller+0x310/0x310 [ 1031.344749] ? prepare_exit_to_usermode+0x3b0/0x3b0 03:12:22 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x6b6b6b00000000, &(0x7f00000003c0), 0x0, &(0x7f0000000580)={[{@session={'session'}}]}) [ 1031.349789] ? recalc_sigpending_tsk+0x180/0x180 [ 1031.354588] ? kasan_check_write+0x14/0x20 [ 1031.358880] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1031.363804] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1031.369019] RIP: 0033:0x457569 [ 1031.372239] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1031.391163] RSP: 002b:00007fe27d1eac78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1031.398912] RAX: ffffffffffffffda RBX: 00007fe27d1eac90 RCX: 0000000000457569 [ 1031.406228] RDX: 0000000000000000 RSI: 0000000000004c80 RDI: 0000000000000003 [ 1031.413553] RBP: 000000000072bfa0 R08: 0000000000000000 R09: 0000000000000000 [ 1031.420847] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fe27d1eb6d4 [ 1031.428146] R13: 00000000004c039f R14: 00000000004d0540 R15: 0000000000000005 [ 1031.442327] blk-mq: reduced tag depth (128 -> 64) [ 1031.476133] hfs: invalid session number or type of track [ 1031.481614] hfs: can't find a HFS filesystem on dev loop2 [ 1031.570834] hfs: invalid session number or type of track [ 1031.601479] hfs: can't find a HFS filesystem on dev loop2 03:12:23 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f00000003c0), 0x2000000, &(0x7f0000000580)={[{@session={'session'}}]}) 03:12:23 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000040)="153f6234488dd25d766070") socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup2(r2, r2) sendmsg$netlink(r3, &(0x7f0000028fc8)={0x0, 0x0, &(0x7f0000019000), 0x0, &(0x7f0000000040)=[@rights={0x18, 0x1, 0x1, [r1]}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000000b80)=[{{&(0x7f0000000200)=@l2, 0x80, &(0x7f00000005c0), 0x0, &(0x7f0000000600)=""/84, 0x54}}, {{&(0x7f0000000680)=@l2, 0x80, &(0x7f0000000a40), 0x0, &(0x7f0000000ac0)=""/147, 0x93}}], 0x400000000000065, 0x62, 0x0) 03:12:23 executing program 3: socket$packet(0x11, 0xa, 0x300) syz_emit_ethernet(0x4e, &(0x7f0000000080)={@local, @broadcast, [{}], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x0, 0x0, @local, @local={0xfe, 0x80, [0x689]}, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, &(0x7f00000002c0)) 03:12:23 executing program 1 (fault-call:3 fault-nth:6): r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) 03:12:23 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1f000000, &(0x7f00000003c0), 0x0, &(0x7f0000000580)={[{@session={'session'}}]}) 03:12:23 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e23}, 0x1c) listen(r0, 0x18) r1 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f0000000000)=[@in={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0xc}, [0xec030000]}, @in={0x2, 0x4e23, @local}], 0x20) 03:12:23 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000040)="153f6234488dd25d766070") socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup2(r2, r2) sendmsg$netlink(r3, &(0x7f0000028fc8)={0x0, 0x0, &(0x7f0000019000), 0x0, &(0x7f0000000040)=[@rights={0x18, 0x1, 0x1, [r1]}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000000b80)=[{{&(0x7f0000000200)=@l2, 0x80, &(0x7f00000005c0), 0x0, &(0x7f0000000600)=""/84, 0x54}}, {{&(0x7f0000000680)=@l2, 0x80, &(0x7f0000000a40), 0x0, &(0x7f0000000ac0)=""/147, 0x93}}], 0x400000000000110, 0x62, 0x0) 03:12:23 executing program 3: socket$packet(0x11, 0xa, 0x300) syz_emit_ethernet(0x4e, &(0x7f0000000080)={@local, @broadcast, [{}], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x0, 0x0, @local, @local={0xfe, 0x80, [0x86ddffff00000000]}, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, &(0x7f00000002c0)) 03:12:23 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e23}, 0x1c) listen(r0, 0x18) r1 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f0000000000)=[@in={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0xc}, [0x28040000]}, @in={0x2, 0x4e23, @local}], 0x20) [ 1031.829815] FAULT_INJECTION: forcing a failure. [ 1031.829815] name failslab, interval 1, probability 0, space 0, times 0 [ 1031.862032] CPU: 1 PID: 27200 Comm: syz-executor1 Not tainted 4.19.0-rc8+ #64 [ 1031.869335] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 03:12:23 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000040)="153f6234488dd25d766070") socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup2(r2, r2) sendmsg$netlink(r3, &(0x7f0000028fc8)={0x0, 0x0, &(0x7f0000019000), 0x0, &(0x7f0000000040)=[@rights={0x18, 0x1, 0x1, [r1]}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000000b80)=[{{&(0x7f0000000200)=@l2, 0x80, &(0x7f00000005c0), 0x0, &(0x7f0000000600)=""/84, 0x54}}, {{&(0x7f0000000680)=@l2, 0x80, &(0x7f0000000a40), 0x0, &(0x7f0000000ac0)=""/147, 0x93}}], 0x4000000000000a1, 0x62, 0x0) [ 1031.878697] Call Trace: [ 1031.881308] dump_stack+0x1c4/0x2b4 [ 1031.884970] ? dump_stack_print_info.cold.2+0x52/0x52 [ 1031.890204] should_fail.cold.4+0xa/0x17 [ 1031.894323] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 1031.899491] ? graph_lock+0x170/0x170 [ 1031.903316] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1031.908896] ? graph_lock+0x170/0x170 [ 1031.912740] ? find_held_lock+0x36/0x1c0 [ 1031.916825] ? __lock_is_held+0xb5/0x140 [ 1031.920919] ? ___might_sleep+0x1ed/0x300 [ 1031.925105] ? arch_local_save_flags+0x40/0x40 [ 1031.929716] ? __lockdep_init_map+0x105/0x590 [ 1031.934258] __should_failslab+0x124/0x180 [ 1031.938518] should_failslab+0x9/0x14 [ 1031.942343] kmem_cache_alloc_node_trace+0x270/0x740 [ 1031.947464] ? init_wait_entry+0x1c0/0x1c0 [ 1031.951725] ? check_preemption_disabled+0x48/0x200 [ 1031.956761] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 1031.961835] sbitmap_queue_init_node+0x332/0x850 [ 1031.966617] ? __lock_is_held+0xb5/0x140 [ 1031.970702] ? sbitmap_init_node+0x440/0x440 [ 1031.975128] ? blk_mq_init_tags+0x79/0x2b0 [ 1031.979395] ? rcu_read_lock_sched_held+0x108/0x120 [ 1031.984433] ? kmem_cache_alloc_node_trace+0x34b/0x740 [ 1031.989726] ? find_next_bit+0x104/0x130 [ 1031.993782] blk_mq_init_tags+0x177/0x2b0 [ 1031.998074] blk_mq_alloc_rq_map+0x9f/0x220 [ 1032.002411] __blk_mq_alloc_rq_map+0xb1/0x2e0 [ 1032.006913] blk_mq_alloc_tag_set+0x627/0xad0 [ 1032.011419] ? blk_mq_update_nr_hw_queues+0xe50/0xe50 [ 1032.016608] loop_add+0x2c9/0xa30 [ 1032.020063] ? loop_queue_rq+0x690/0x690 [ 1032.024147] loop_control_ioctl+0x199/0x530 [ 1032.028490] ? loop_add+0xa30/0xa30 [ 1032.032111] ? arch_local_save_flags+0x40/0x40 [ 1032.036688] ? __mutex_unlock_slowpath+0x197/0x8c0 [ 1032.041627] ? loop_add+0xa30/0xa30 [ 1032.045263] do_vfs_ioctl+0x1de/0x1720 [ 1032.049148] ? ioctl_preallocate+0x300/0x300 [ 1032.053550] ? selinux_file_mprotect+0x620/0x620 [ 1032.058305] ? __sb_end_write+0xd9/0x110 [ 1032.062407] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1032.067945] ? fput+0x130/0x1a0 [ 1032.071246] ? do_syscall_64+0x9a/0x820 [ 1032.075223] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1032.080754] ? security_file_ioctl+0x94/0xc0 [ 1032.085174] ksys_ioctl+0xa9/0xd0 [ 1032.088650] __x64_sys_ioctl+0x73/0xb0 [ 1032.092544] do_syscall_64+0x1b9/0x820 [ 1032.096431] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 1032.101788] ? syscall_return_slowpath+0x5e0/0x5e0 [ 1032.106722] ? trace_hardirqs_on_caller+0x310/0x310 [ 1032.111740] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 1032.116750] ? recalc_sigpending_tsk+0x180/0x180 [ 1032.121510] ? kasan_check_write+0x14/0x20 [ 1032.125741] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1032.130583] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1032.135773] RIP: 0033:0x457569 [ 1032.138961] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1032.157867] RSP: 002b:00007fe27d1eac78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1032.165624] RAX: ffffffffffffffda RBX: 00007fe27d1eac90 RCX: 0000000000457569 [ 1032.172882] RDX: 0000000000000000 RSI: 0000000000004c80 RDI: 0000000000000003 03:12:23 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x7a000000, &(0x7f00000003c0), 0x0, &(0x7f0000000580)={[{@session={'session'}}]}) [ 1032.180142] RBP: 000000000072bfa0 R08: 0000000000000000 R09: 0000000000000000 [ 1032.187413] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fe27d1eb6d4 [ 1032.194671] R13: 00000000004c039f R14: 00000000004d0540 R15: 0000000000000005 [ 1032.207427] blk-mq: reduced tag depth (128 -> 64) 03:12:23 executing program 3: socket$packet(0x11, 0xa, 0x300) syz_emit_ethernet(0x4e, &(0x7f0000000080)={@local, @broadcast, [{}], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x0, 0x0, @local, @local={0xfe, 0x80, [0x2b00000000000000]}, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, &(0x7f00000002c0)) [ 1032.244339] hfs: invalid session number or type of track [ 1032.271473] hfs: can't find a HFS filesystem on dev loop2 [ 1032.388783] hfs: invalid session number or type of track [ 1032.402292] hfs: can't find a HFS filesystem on dev loop2 03:12:23 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f00000003c0), 0x6c00, &(0x7f0000000580)={[{@session={'session'}}]}) 03:12:23 executing program 1 (fault-call:3 fault-nth:7): r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) 03:12:23 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000040)="153f6234488dd25d766070") socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup2(r2, r2) sendmsg$netlink(r3, &(0x7f0000028fc8)={0x0, 0x0, &(0x7f0000019000), 0x0, &(0x7f0000000040)=[@rights={0x18, 0x1, 0x1, [r1]}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000000b80)=[{{&(0x7f0000000200)=@l2, 0x80, &(0x7f00000005c0), 0x0, &(0x7f0000000600)=""/84, 0x54}}, {{&(0x7f0000000680)=@l2, 0x80, &(0x7f0000000a40), 0x0, &(0x7f0000000ac0)=""/147, 0x93}}], 0x40000000000006c, 0x62, 0x0) 03:12:23 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e23}, 0x1c) listen(r0, 0x18) r1 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f0000000000)=[@in={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0xc}, [0x9]}, @in={0x2, 0x4e23, @local}], 0x20) 03:12:24 executing program 3: socket$packet(0x11, 0xa, 0x300) syz_emit_ethernet(0x4e, &(0x7f0000000080)={@local, @broadcast, [{}], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x0, 0x0, @local, @local={0xfe, 0x80, [0x2c000000]}, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, &(0x7f00000002c0)) 03:12:24 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x6000000, &(0x7f00000003c0), 0x0, &(0x7f0000000580)={[{@session={'session'}}]}) 03:12:24 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e23}, 0x1c) listen(r0, 0x18) r1 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f0000000000)=[@in={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0xc}, [0x3f00000000000000]}, @in={0x2, 0x4e23, @local}], 0x20) 03:12:24 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000040)="153f6234488dd25d766070") socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup2(r2, r2) sendmsg$netlink(r3, &(0x7f0000028fc8)={0x0, 0x0, &(0x7f0000019000), 0x0, &(0x7f0000000040)=[@rights={0x18, 0x1, 0x1, [r1]}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000000b80)=[{{&(0x7f0000000200)=@l2, 0x80, &(0x7f00000005c0), 0x0, &(0x7f0000000600)=""/84, 0x54}}, {{&(0x7f0000000680)=@l2, 0x80, &(0x7f0000000a40), 0x0, &(0x7f0000000ac0)=""/147, 0x93}}], 0x400000000000151, 0x62, 0x0) [ 1032.688791] FAULT_INJECTION: forcing a failure. [ 1032.688791] name failslab, interval 1, probability 0, space 0, times 0 [ 1032.702544] CPU: 0 PID: 27241 Comm: syz-executor1 Not tainted 4.19.0-rc8+ #64 [ 1032.709856] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1032.709869] Call Trace: [ 1032.709903] dump_stack+0x1c4/0x2b4 [ 1032.709952] ? dump_stack_print_info.cold.2+0x52/0x52 [ 1032.709999] ? __blk_mq_alloc_rq_map+0xb1/0x2e0 [ 1032.730818] ? blk_mq_alloc_tag_set+0x627/0xad0 [ 1032.730840] ? loop_add+0x2c9/0xa30 [ 1032.730860] ? loop_control_ioctl+0x199/0x530 [ 1032.730883] ? ksys_ioctl+0xa9/0xd0 [ 1032.730920] should_fail.cold.4+0xa/0x17 [ 1032.730962] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 1032.740401] ? graph_lock+0x170/0x170 [ 1032.740434] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1032.740459] ? check_preemption_disabled+0x48/0x200 [ 1032.740478] ? check_preemption_disabled+0x48/0x200 [ 1032.740503] ? graph_lock+0x170/0x170 [ 1032.740538] ? __lock_is_held+0xb5/0x140 [ 1032.740557] ? __lockdep_init_map+0x105/0x590 [ 1032.748696] ? __lock_is_held+0xb5/0x140 [ 1032.748745] ? ___might_sleep+0x1ed/0x300 [ 1032.756440] ? arch_local_save_flags+0x40/0x40 [ 1032.756462] ? sbitmap_queue_init_node+0xce/0x850 [ 1032.756491] ? __lock_is_held+0xb5/0x140 [ 1032.756537] __should_failslab+0x124/0x180 [ 1032.756571] should_failslab+0x9/0x14 [ 1032.765523] kmem_cache_alloc_node_trace+0x270/0x740 [ 1032.765546] ? find_next_bit+0x104/0x130 [ 1032.765591] __kmalloc_node+0x33/0x70 [ 1032.765620] blk_mq_alloc_rq_map+0xcc/0x220 [ 1032.765649] __blk_mq_alloc_rq_map+0xb1/0x2e0 [ 1032.765687] blk_mq_alloc_tag_set+0x627/0xad0 [ 1032.776268] ? blk_mq_update_nr_hw_queues+0xe50/0xe50 [ 1032.776318] loop_add+0x2c9/0xa30 [ 1032.776348] ? loop_queue_rq+0x690/0x690 [ 1032.776413] loop_control_ioctl+0x199/0x530 [ 1032.785247] ? loop_add+0xa30/0xa30 [ 1032.785270] ? arch_local_save_flags+0x40/0x40 [ 1032.785307] ? __mutex_unlock_slowpath+0x197/0x8c0 [ 1032.785343] ? loop_add+0xa30/0xa30 [ 1032.785368] do_vfs_ioctl+0x1de/0x1720 03:12:24 executing program 3: socket$packet(0x11, 0xa, 0x300) syz_emit_ethernet(0x4e, &(0x7f0000000080)={@local, @broadcast, [{}], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x0, 0x0, @local, @local={0xfe, 0x80, [0x2b000000]}, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, &(0x7f00000002c0)) 03:12:24 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000040)="153f6234488dd25d766070") socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup2(r2, r2) sendmsg$netlink(r3, &(0x7f0000028fc8)={0x0, 0x0, &(0x7f0000019000), 0x0, &(0x7f0000000040)=[@rights={0x18, 0x1, 0x1, [r1]}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000000b80)=[{{&(0x7f0000000200)=@l2, 0x80, &(0x7f00000005c0), 0x0, &(0x7f0000000600)=""/84, 0x54}}, {{&(0x7f0000000680)=@l2, 0x80, &(0x7f0000000a40), 0x0, &(0x7f0000000ac0)=""/147, 0x93}}], 0x400000000000138, 0x62, 0x0) 03:12:24 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x4000, &(0x7f00000003c0), 0x0, &(0x7f0000000580)={[{@session={'session'}}]}) [ 1032.785409] ? ioctl_preallocate+0x300/0x300 [ 1032.794006] ? selinux_file_mprotect+0x620/0x620 [ 1032.794039] ? __sb_end_write+0xd9/0x110 [ 1032.794070] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1032.794087] ? fput+0x130/0x1a0 [ 1032.794139] ? do_syscall_64+0x9a/0x820 [ 1032.802355] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1032.802379] ? security_file_ioctl+0x94/0xc0 [ 1032.802412] ksys_ioctl+0xa9/0xd0 [ 1032.802443] __x64_sys_ioctl+0x73/0xb0 [ 1032.811884] do_syscall_64+0x1b9/0x820 [ 1032.811907] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 1032.811945] ? syscall_return_slowpath+0x5e0/0x5e0 [ 1032.811982] ? trace_hardirqs_on_caller+0x310/0x310 [ 1032.812005] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 1032.820312] ? recalc_sigpending_tsk+0x180/0x180 [ 1032.820335] ? kasan_check_write+0x14/0x20 [ 1032.820371] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1032.820410] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1032.820429] RIP: 0033:0x457569 [ 1032.829328] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1032.829358] RSP: 002b:00007fe27d1eac78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1032.829393] RAX: ffffffffffffffda RBX: 00007fe27d1eac90 RCX: 0000000000457569 [ 1032.829417] RDX: 0000000000000000 RSI: 0000000000004c80 RDI: 0000000000000003 [ 1032.829430] RBP: 000000000072bfa0 R08: 0000000000000000 R09: 0000000000000000 [ 1032.829443] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fe27d1eb6d4 [ 1032.829454] R13: 00000000004c039f R14: 00000000004d0540 R15: 0000000000000005 [ 1032.910464] blk-mq: reduced tag depth (128 -> 64) 03:12:24 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000040)="153f6234488dd25d766070") socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup2(r2, r2) sendmsg$netlink(r3, &(0x7f0000028fc8)={0x0, 0x0, &(0x7f0000019000), 0x0, &(0x7f0000000040)=[@rights={0x18, 0x1, 0x1, [r1]}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000000b80)=[{{&(0x7f0000000200)=@l2, 0x80, &(0x7f00000005c0), 0x0, &(0x7f0000000600)=""/84, 0x54}}, {{&(0x7f0000000680)=@l2, 0x80, &(0x7f0000000a40), 0x0, &(0x7f0000000ac0)=""/147, 0x93}}], 0x40000000000014e, 0x62, 0x0) 03:12:24 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f00000003c0), 0x4c, &(0x7f0000000580)={[{@session={'session'}}]}) 03:12:24 executing program 3: socket$packet(0x11, 0xa, 0x300) syz_emit_ethernet(0x4e, &(0x7f0000000080)={@local, @broadcast, [{}], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x0, 0x0, @local, @local={0xfe, 0x80, [0x806000000000000]}, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, &(0x7f00000002c0)) 03:12:24 executing program 1 (fault-call:3 fault-nth:8): r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) 03:12:24 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f00000003c0), 0x1f00, &(0x7f0000000580)={[{@session={'session'}}]}) 03:12:24 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e23}, 0x1c) listen(r0, 0x18) r1 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f0000000000)=[@in={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0xc}, [0x4000000000000000]}, @in={0x2, 0x4e23, @local}], 0x20) 03:12:24 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000040)="153f6234488dd25d766070") socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup2(r2, r2) sendmsg$netlink(r3, &(0x7f0000028fc8)={0x0, 0x0, &(0x7f0000019000), 0x0, &(0x7f0000000040)=[@rights={0x18, 0x1, 0x1, [r1]}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000000b80)=[{{&(0x7f0000000200)=@l2, 0x80, &(0x7f00000005c0), 0x0, &(0x7f0000000600)=""/84, 0x54}}, {{&(0x7f0000000680)=@l2, 0x80, &(0x7f0000000a40), 0x0, &(0x7f0000000ac0)=""/147, 0x93}}], 0x4000000000000fb, 0x62, 0x0) [ 1033.355341] FAULT_INJECTION: forcing a failure. [ 1033.355341] name failslab, interval 1, probability 0, space 0, times 0 [ 1033.382877] CPU: 0 PID: 27276 Comm: syz-executor1 Not tainted 4.19.0-rc8+ #64 [ 1033.390204] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1033.399583] Call Trace: [ 1033.399621] dump_stack+0x1c4/0x2b4 [ 1033.399660] ? dump_stack_print_info.cold.2+0x52/0x52 [ 1033.399718] should_fail.cold.4+0xa/0x17 [ 1033.411159] ? kernel_text_address+0x79/0xf0 [ 1033.411192] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 1033.411212] ? unwind_get_return_address+0x61/0xa0 [ 1033.411245] ? __save_stack_trace+0x8d/0xf0 [ 1033.419737] ? graph_lock+0x170/0x170 [ 1033.419766] ? save_stack+0xa9/0xd0 [ 1033.419792] ? save_stack+0x43/0xd0 [ 1033.429841] ? kasan_kmalloc+0xc7/0xe0 [ 1033.429862] ? __kmalloc_node+0x47/0x70 [ 1033.429883] ? blk_mq_alloc_rq_map+0xcc/0x220 [ 1033.429901] ? __blk_mq_alloc_rq_map+0xb1/0x2e0 [ 1033.429924] ? blk_mq_alloc_tag_set+0x627/0xad0 [ 1033.438058] ? loop_add+0x2c9/0xa30 [ 1033.438092] ? __lock_is_held+0xb5/0x140 [ 1033.438109] ? graph_lock+0x170/0x170 [ 1033.438157] ? ___might_sleep+0x1ed/0x300 [ 1033.438182] ? arch_local_save_flags+0x40/0x40 [ 1033.445466] ? __lock_is_held+0xb5/0x140 [ 1033.445519] __should_failslab+0x124/0x180 [ 1033.445561] should_failslab+0x9/0x14 [ 1033.445583] kmem_cache_alloc_node_trace+0x270/0x740 03:12:24 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f00000003c0), 0x48, &(0x7f0000000580)={[{@session={'session'}}]}) [ 1033.445607] ? kasan_unpoison_shadow+0x35/0x50 [ 1033.445646] __kmalloc_node+0x33/0x70 [ 1033.453517] blk_mq_alloc_rq_map+0x10d/0x220 [ 1033.453549] __blk_mq_alloc_rq_map+0xb1/0x2e0 [ 1033.453583] blk_mq_alloc_tag_set+0x627/0xad0 [ 1033.453619] ? blk_mq_update_nr_hw_queues+0xe50/0xe50 [ 1033.462790] loop_add+0x2c9/0xa30 [ 1033.462821] ? loop_queue_rq+0x690/0x690 [ 1033.462865] loop_control_ioctl+0x199/0x530 [ 1033.471137] ? loop_add+0xa30/0xa30 [ 1033.471161] ? arch_local_save_flags+0x40/0x40 03:12:25 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000040)="153f6234488dd25d766070") socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup2(r2, r2) sendmsg$netlink(r3, &(0x7f0000028fc8)={0x0, 0x0, &(0x7f0000019000), 0x0, &(0x7f0000000040)=[@rights={0x18, 0x1, 0x1, [r1]}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000000b80)=[{{&(0x7f0000000200)=@l2, 0x80, &(0x7f00000005c0), 0x0, &(0x7f0000000600)=""/84, 0x54}}, {{&(0x7f0000000680)=@l2, 0x80, &(0x7f0000000a40), 0x0, &(0x7f0000000ac0)=""/147, 0x93}}], 0x4000000000000f2, 0x62, 0x0) [ 1033.471198] ? __mutex_unlock_slowpath+0x197/0x8c0 [ 1033.471231] ? loop_add+0xa30/0xa30 [ 1033.483254] do_vfs_ioctl+0x1de/0x1720 [ 1033.483293] ? ioctl_preallocate+0x300/0x300 [ 1033.483330] ? selinux_file_mprotect+0x620/0x620 [ 1033.492009] ? __sb_end_write+0xd9/0x110 [ 1033.492043] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1033.492060] ? fput+0x130/0x1a0 [ 1033.492084] ? do_syscall_64+0x9a/0x820 [ 1033.590810] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1033.596389] ? security_file_ioctl+0x94/0xc0 [ 1033.600864] ksys_ioctl+0xa9/0xd0 03:12:25 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000040)="153f6234488dd25d766070") socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup2(r2, r2) sendmsg$netlink(r3, &(0x7f0000028fc8)={0x0, 0x0, &(0x7f0000019000), 0x0, &(0x7f0000000040)=[@rights={0x18, 0x1, 0x1, [r1]}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000000b80)=[{{&(0x7f0000000200)=@l2, 0x80, &(0x7f00000005c0), 0x0, &(0x7f0000000600)=""/84, 0x54}}, {{&(0x7f0000000680)=@l2, 0x80, &(0x7f0000000a40), 0x0, &(0x7f0000000ac0)=""/147, 0x93}}], 0x4000000000000e2, 0x62, 0x0) [ 1033.604361] __x64_sys_ioctl+0x73/0xb0 [ 1033.608287] do_syscall_64+0x1b9/0x820 [ 1033.612202] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 1033.617596] ? syscall_return_slowpath+0x5e0/0x5e0 [ 1033.622560] ? trace_hardirqs_on_caller+0x310/0x310 [ 1033.627636] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 1033.632706] ? recalc_sigpending_tsk+0x180/0x180 [ 1033.637495] ? kasan_check_write+0x14/0x20 [ 1033.641780] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1033.646692] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1033.651911] RIP: 0033:0x457569 03:12:25 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000040)="153f6234488dd25d766070") socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup2(r2, r2) sendmsg$netlink(r3, &(0x7f0000028fc8)={0x0, 0x0, &(0x7f0000019000), 0x0, &(0x7f0000000040)=[@rights={0x18, 0x1, 0x1, [r1]}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000000b80)=[{{&(0x7f0000000200)=@l2, 0x80, &(0x7f00000005c0), 0x0, &(0x7f0000000600)=""/84, 0x54}}, {{&(0x7f0000000680)=@l2, 0x80, &(0x7f0000000a40), 0x0, &(0x7f0000000ac0)=""/147, 0x93}}], 0x400000000000167, 0x62, 0x0) [ 1033.655146] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1033.674073] RSP: 002b:00007fe27d1eac78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1033.681821] RAX: ffffffffffffffda RBX: 00007fe27d1eac90 RCX: 0000000000457569 [ 1033.689112] RDX: 0000000000000000 RSI: 0000000000004c80 RDI: 0000000000000003 [ 1033.696408] RBP: 000000000072bfa0 R08: 0000000000000000 R09: 0000000000000000 03:12:25 executing program 3: socket$packet(0x11, 0xa, 0x300) syz_emit_ethernet(0x4e, &(0x7f0000000080)={@local, @broadcast, [{}], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x0, 0x0, @local, @local={0xfe, 0x80, [0x400300]}, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, &(0x7f00000002c0)) 03:12:25 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f00000003c0), 0xe00, &(0x7f0000000580)={[{@session={'session'}}]}) [ 1033.703711] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fe27d1eb6d4 [ 1033.711012] R13: 00000000004c039f R14: 00000000004d0540 R15: 0000000000000005 [ 1033.731943] blk-mq: reduced tag depth (128 -> 64) [ 1033.806414] hfs: invalid session number or type of track [ 1033.811954] hfs: can't find a HFS filesystem on dev loop2 [ 1033.911607] hfs: invalid session number or type of track [ 1033.922755] hfs: can't find a HFS filesystem on dev loop2 03:12:25 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f00000003c0), 0x7a, &(0x7f0000000580)={[{@session={'session'}}]}) 03:12:25 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000040)="153f6234488dd25d766070") socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup2(r2, r2) sendmsg$netlink(r3, &(0x7f0000028fc8)={0x0, 0x0, &(0x7f0000019000), 0x0, &(0x7f0000000040)=[@rights={0x18, 0x1, 0x1, [r1]}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000000b80)=[{{&(0x7f0000000200)=@l2, 0x80, &(0x7f00000005c0), 0x0, &(0x7f0000000600)=""/84, 0x54}}, {{&(0x7f0000000680)=@l2, 0x80, &(0x7f0000000a40), 0x0, &(0x7f0000000ac0)=""/147, 0x93}}], 0x40000000000003a, 0x62, 0x0) 03:12:25 executing program 1 (fault-call:3 fault-nth:9): r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) 03:12:25 executing program 3: socket$packet(0x11, 0xa, 0x300) syz_emit_ethernet(0x4e, &(0x7f0000000080)={@local, @broadcast, [{}], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x0, 0x0, @local, @local={0xfe, 0x80, [0x500000000000000]}, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, &(0x7f00000002c0)) 03:12:25 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e23}, 0x1c) listen(r0, 0x18) r1 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f0000000000)=[@in={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0xc}, [0x2000]}, @in={0x2, 0x4e23, @local}], 0x20) 03:12:25 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f00000003c0), 0x9000000, &(0x7f0000000580)={[{@session={'session'}}]}) 03:12:25 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f00000003c0), 0x40000000, &(0x7f0000000580)={[{@session={'session'}}]}) 03:12:25 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000040)="153f6234488dd25d766070") socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup2(r2, r2) sendmsg$netlink(r3, &(0x7f0000028fc8)={0x0, 0x0, &(0x7f0000019000), 0x0, &(0x7f0000000040)=[@rights={0x18, 0x1, 0x1, [r1]}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000000b80)=[{{&(0x7f0000000200)=@l2, 0x80, &(0x7f00000005c0), 0x0, &(0x7f0000000600)=""/84, 0x54}}, {{&(0x7f0000000680)=@l2, 0x80, &(0x7f0000000a40), 0x0, &(0x7f0000000ac0)=""/147, 0x93}}], 0x400000000000022, 0x62, 0x0) 03:12:25 executing program 3: socket$packet(0x11, 0xa, 0x300) syz_emit_ethernet(0x4e, &(0x7f0000000080)={@local, @broadcast, [{}], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x0, 0x0, @local, @local={0xfe, 0x80, [0x6000000000000000]}, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, &(0x7f00000002c0)) [ 1034.158551] FAULT_INJECTION: forcing a failure. [ 1034.158551] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1034.197487] CPU: 0 PID: 27326 Comm: syz-executor1 Not tainted 4.19.0-rc8+ #64 03:12:25 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000040)="153f6234488dd25d766070") socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup2(r2, r2) sendmsg$netlink(r3, &(0x7f0000028fc8)={0x0, 0x0, &(0x7f0000019000), 0x0, &(0x7f0000000040)=[@rights={0x18, 0x1, 0x1, [r1]}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000000b80)=[{{&(0x7f0000000200)=@l2, 0x80, &(0x7f00000005c0), 0x0, &(0x7f0000000600)=""/84, 0x54}}, {{&(0x7f0000000680)=@l2, 0x80, &(0x7f0000000a40), 0x0, &(0x7f0000000ac0)=""/147, 0x93}}], 0x400000000000062, 0x62, 0x0) [ 1034.204829] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1034.214206] Call Trace: [ 1034.216836] dump_stack+0x1c4/0x2b4 [ 1034.220520] ? dump_stack_print_info.cold.2+0x52/0x52 [ 1034.225764] ? perf_trace_lock+0x7a0/0x7a0 [ 1034.230048] ? rcu_read_unlock_special.part.39+0x11f0/0x11f0 [ 1034.235944] should_fail.cold.4+0xa/0x17 [ 1034.240055] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 1034.245207] ? graph_lock+0x170/0x170 [ 1034.249044] ? find_held_lock+0x36/0x1c0 [ 1034.253175] ? is_bpf_text_address+0xac/0x170 03:12:25 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000040)="153f6234488dd25d766070") socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup2(r2, r2) sendmsg$netlink(r3, &(0x7f0000028fc8)={0x0, 0x0, &(0x7f0000019000), 0x0, &(0x7f0000000040)=[@rights={0x18, 0x1, 0x1, [r1]}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000000b80)=[{{&(0x7f0000000200)=@l2, 0x80, &(0x7f00000005c0), 0x0, &(0x7f0000000600)=""/84, 0x54}}, {{&(0x7f0000000680)=@l2, 0x80, &(0x7f0000000a40), 0x0, &(0x7f0000000ac0)=""/147, 0x93}}], 0x400000000000172, 0x62, 0x0) [ 1034.257749] ? __lock_is_held+0xb5/0x140 [ 1034.261856] ? rcu_bh_qs+0xc0/0xc0 [ 1034.265430] ? ___might_sleep+0x1ed/0x300 [ 1034.269609] ? arch_local_save_flags+0x40/0x40 [ 1034.274245] ? is_bpf_text_address+0xd3/0x170 [ 1034.278805] ? __might_sleep+0x95/0x190 [ 1034.282824] __alloc_pages_nodemask+0x34b/0xde0 [ 1034.287538] ? __alloc_pages_slowpath+0x2d80/0x2d80 [ 1034.292596] ? save_stack+0xa9/0xd0 [ 1034.296255] ? save_stack+0x43/0xd0 [ 1034.299908] ? kasan_kmalloc+0xc7/0xe0 [ 1034.303844] ? __kmalloc_node+0x47/0x70 [ 1034.307860] ? blk_mq_alloc_rq_map+0x10d/0x220 [ 1034.312469] ? __blk_mq_alloc_rq_map+0xb1/0x2e0 [ 1034.317176] ? __x64_sys_ioctl+0x73/0xb0 [ 1034.321270] ? do_syscall_64+0x1b9/0x820 [ 1034.325373] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1034.330767] ? graph_lock+0x170/0x170 [ 1034.334600] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1034.340181] ? find_next_bit+0x104/0x130 [ 1034.344279] ? __cpu_to_node+0x7d/0xa0 [ 1034.348203] ? blk_mq_hw_queue_to_node+0xcc/0x110 [ 1034.353099] blk_mq_alloc_rqs+0x31c/0x980 03:12:25 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000040)="153f6234488dd25d766070") socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup2(r2, r2) sendmsg$netlink(r3, &(0x7f0000028fc8)={0x0, 0x0, &(0x7f0000019000), 0x0, &(0x7f0000000040)=[@rights={0x18, 0x1, 0x1, [r1]}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000000b80)=[{{&(0x7f0000000200)=@l2, 0x80, &(0x7f00000005c0), 0x0, &(0x7f0000000600)=""/84, 0x54}}, {{&(0x7f0000000680)=@l2, 0x80, &(0x7f0000000a40), 0x0, &(0x7f0000000ac0)=""/147, 0x93}}], 0x40000000000008f, 0x62, 0x0) [ 1034.357302] ? blk_mq_alloc_rq_map+0x220/0x220 [ 1034.361913] ? kmem_cache_alloc_node_trace+0x34b/0x740 [ 1034.367242] ? kasan_unpoison_shadow+0x35/0x50 [ 1034.371906] ? __kmalloc_node+0x47/0x70 [ 1034.375947] __blk_mq_alloc_rq_map+0x15f/0x2e0 [ 1034.380574] blk_mq_alloc_tag_set+0x627/0xad0 [ 1034.385129] ? blk_mq_update_nr_hw_queues+0xe50/0xe50 [ 1034.390377] loop_add+0x2c9/0xa30 [ 1034.393874] ? loop_queue_rq+0x690/0x690 [ 1034.398023] loop_control_ioctl+0x199/0x530 [ 1034.402381] ? loop_add+0xa30/0xa30 [ 1034.406058] ? arch_local_save_flags+0x40/0x40 [ 1034.410698] ? __mutex_unlock_slowpath+0x197/0x8c0 [ 1034.415673] ? loop_add+0xa30/0xa30 [ 1034.419344] do_vfs_ioctl+0x1de/0x1720 [ 1034.423290] ? ioctl_preallocate+0x300/0x300 [ 1034.427755] ? selinux_file_mprotect+0x620/0x620 [ 1034.432556] ? __sb_end_write+0xd9/0x110 [ 1034.436637] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1034.442206] ? fput+0x130/0x1a0 [ 1034.445517] ? do_syscall_64+0x9a/0x820 [ 1034.449515] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1034.455072] ? security_file_ioctl+0x94/0xc0 [ 1034.459519] ksys_ioctl+0xa9/0xd0 [ 1034.463027] __x64_sys_ioctl+0x73/0xb0 [ 1034.466947] do_syscall_64+0x1b9/0x820 [ 1034.470848] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 1034.476217] ? syscall_return_slowpath+0x5e0/0x5e0 [ 1034.481172] ? trace_hardirqs_on_caller+0x310/0x310 [ 1034.486224] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 1034.491260] ? recalc_sigpending_tsk+0x180/0x180 [ 1034.496017] ? kasan_check_write+0x14/0x20 [ 1034.500284] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1034.505153] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1034.510353] RIP: 0033:0x457569 [ 1034.513558] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1034.532483] RSP: 002b:00007fe27d1eac78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1034.540196] RAX: ffffffffffffffda RBX: 00007fe27d1eac90 RCX: 0000000000457569 [ 1034.547481] RDX: 0000000000000000 RSI: 0000000000004c80 RDI: 0000000000000003 [ 1034.554777] RBP: 000000000072bfa0 R08: 0000000000000000 R09: 0000000000000000 [ 1034.562066] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fe27d1eb6d4 [ 1034.569358] R13: 00000000004c039f R14: 00000000004d0540 R15: 0000000000000005 03:12:26 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f00000003c0), 0x6b6b6b00, &(0x7f0000000580)={[{@session={'session'}}]}) 03:12:26 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000040)="153f6234488dd25d766070") socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup2(r2, r2) sendmsg$netlink(r3, &(0x7f0000028fc8)={0x0, 0x0, &(0x7f0000019000), 0x0, &(0x7f0000000040)=[@rights={0x18, 0x1, 0x1, [r1]}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000000b80)=[{{&(0x7f0000000200)=@l2, 0x80, &(0x7f00000005c0), 0x0, &(0x7f0000000600)=""/84, 0x54}}, {{&(0x7f0000000680)=@l2, 0x80, &(0x7f0000000a40), 0x0, &(0x7f0000000ac0)=""/147, 0x93}}], 0x400000000000120, 0x62, 0x0) 03:12:26 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f00000003c0), 0x300, &(0x7f0000000580)={[{@session={'session'}}]}) 03:12:26 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e23}, 0x1c) listen(r0, 0x18) r1 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f0000000000)=[@in={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0xc}, [0x500000000000000]}, @in={0x2, 0x4e23, @local}], 0x20) 03:12:26 executing program 1 (fault-call:3 fault-nth:10): r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) 03:12:26 executing program 3: socket$packet(0x11, 0xa, 0x300) syz_emit_ethernet(0x4e, &(0x7f0000000080)={@local, @broadcast, [{}], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x0, 0x0, @local, @local={0xfe, 0x80, [0xc00000000000000]}, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, &(0x7f00000002c0)) 03:12:26 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f00000003c0), 0x400000000000000, &(0x7f0000000580)={[{@session={'session'}}]}) 03:12:26 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000040)="153f6234488dd25d766070") socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup2(r2, r2) sendmsg$netlink(r3, &(0x7f0000028fc8)={0x0, 0x0, &(0x7f0000019000), 0x0, &(0x7f0000000040)=[@rights={0x18, 0x1, 0x1, [r1]}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000000b80)=[{{&(0x7f0000000200)=@l2, 0x80, &(0x7f00000005c0), 0x0, &(0x7f0000000600)=""/84, 0x54}}, {{&(0x7f0000000680)=@l2, 0x80, &(0x7f0000000a40), 0x0, &(0x7f0000000ac0)=""/147, 0x93}}], 0x4000000000000c7, 0x62, 0x0) 03:12:26 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e23}, 0x1c) listen(r0, 0x18) r1 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f0000000000)=[@in={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0xc}, [0xf9030000]}, @in={0x2, 0x4e23, @local}], 0x20) 03:12:26 executing program 3: socket$packet(0x11, 0xa, 0x300) syz_emit_ethernet(0x4e, &(0x7f0000000080)={@local, @broadcast, [{}], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x0, 0x0, @local, @local={0xfe, 0x80, [0x1000000]}, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, &(0x7f00000002c0)) [ 1034.888368] FAULT_INJECTION: forcing a failure. [ 1034.888368] name failslab, interval 1, probability 0, space 0, times 0 [ 1034.915310] CPU: 1 PID: 27374 Comm: syz-executor1 Not tainted 4.19.0-rc8+ #64 [ 1034.922636] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1034.932009] Call Trace: [ 1034.934625] dump_stack+0x1c4/0x2b4 [ 1034.938278] ? dump_stack_print_info.cold.2+0x52/0x52 [ 1034.943556] should_fail.cold.4+0xa/0x17 [ 1034.947644] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 1034.952790] ? graph_lock+0x170/0x170 [ 1034.956640] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1034.961417] ? graph_lock+0x170/0x170 [ 1034.965236] ? retint_kernel+0x2d/0x2d [ 1034.969141] ? trace_hardirqs_on_caller+0xc0/0x310 [ 1034.974100] ? find_held_lock+0x36/0x1c0 [ 1034.978180] ? __lock_is_held+0xb5/0x140 [ 1034.982262] ? ___might_sleep+0x1ed/0x300 [ 1034.986416] ? arch_local_save_flags+0x40/0x40 [ 1034.991013] __should_failslab+0x124/0x180 [ 1034.995243] should_failslab+0x9/0x14 [ 1034.999062] kmem_cache_alloc_node+0x26e/0x730 [ 1035.003653] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 1035.008682] blk_alloc_queue_node+0xed/0xe90 [ 1035.013119] ? blk_init_allocated_queue+0x640/0x640 [ 1035.018138] ? __mutex_init+0x1f7/0x290 [ 1035.022125] ? __ia32_sys_membarrier+0x150/0x150 [ 1035.026915] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1035.032485] ? __blk_mq_alloc_rq_map+0x17d/0x2e0 [ 1035.037239] ? blk_mq_alloc_tag_set+0x50e/0xad0 [ 1035.041906] ? blk_mq_update_nr_hw_queues+0xe50/0xe50 [ 1035.047098] blk_mq_init_queue+0x4b/0xb0 [ 1035.051174] loop_add+0x34c/0xa30 [ 1035.054674] ? loop_queue_rq+0x690/0x690 [ 1035.058781] loop_control_ioctl+0x199/0x530 [ 1035.063108] ? loop_add+0xa30/0xa30 [ 1035.066782] ? arch_local_save_flags+0x40/0x40 [ 1035.071402] ? __mutex_unlock_slowpath+0x197/0x8c0 [ 1035.076358] ? loop_add+0xa30/0xa30 [ 1035.079989] do_vfs_ioctl+0x1de/0x1720 [ 1035.083898] ? ioctl_preallocate+0x300/0x300 [ 1035.088311] ? selinux_file_mprotect+0x620/0x620 [ 1035.093065] ? __sb_end_write+0xd9/0x110 [ 1035.097137] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1035.102712] ? fput+0x130/0x1a0 [ 1035.105998] ? do_syscall_64+0x9a/0x820 [ 1035.109975] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1035.115509] ? security_file_ioctl+0x94/0xc0 [ 1035.119947] ksys_ioctl+0xa9/0xd0 [ 1035.123397] __x64_sys_ioctl+0x73/0xb0 [ 1035.127279] do_syscall_64+0x1b9/0x820 [ 1035.131173] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 1035.136554] ? syscall_return_slowpath+0x5e0/0x5e0 [ 1035.141508] ? trace_hardirqs_on_caller+0x310/0x310 [ 1035.146544] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 1035.151551] ? recalc_sigpending_tsk+0x180/0x180 [ 1035.156299] ? kasan_check_write+0x14/0x20 [ 1035.160540] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1035.165407] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1035.170609] RIP: 0033:0x457569 03:12:26 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000040)="153f6234488dd25d766070") socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup2(r2, r2) sendmsg$netlink(r3, &(0x7f0000028fc8)={0x0, 0x0, &(0x7f0000019000), 0x0, &(0x7f0000000040)=[@rights={0x18, 0x1, 0x1, [r1]}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000000b80)=[{{&(0x7f0000000200)=@l2, 0x80, &(0x7f00000005c0), 0x0, &(0x7f0000000600)=""/84, 0x54}}, {{&(0x7f0000000680)=@l2, 0x80, &(0x7f0000000a40), 0x0, &(0x7f0000000ac0)=""/147, 0x93}}], 0x4000000000000ac, 0x62, 0x0) 03:12:26 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f00000003c0), 0x48000000, &(0x7f0000000580)={[{@session={'session'}}]}) [ 1035.173835] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1035.192737] RSP: 002b:00007fe27d1eac78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1035.200455] RAX: ffffffffffffffda RBX: 00007fe27d1eac90 RCX: 0000000000457569 [ 1035.207748] RDX: 0000000000000000 RSI: 0000000000004c80 RDI: 0000000000000003 [ 1035.215029] RBP: 000000000072bfa0 R08: 0000000000000000 R09: 0000000000000000 [ 1035.222297] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fe27d1eb6d4 [ 1035.229583] R13: 00000000004c039f R14: 00000000004d0540 R15: 0000000000000005 03:12:26 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f00000003c0), 0x74000000, &(0x7f0000000580)={[{@session={'session'}}]}) 03:12:26 executing program 1 (fault-call:3 fault-nth:11): r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) 03:12:26 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000040)="153f6234488dd25d766070") socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup2(r2, r2) sendmsg$netlink(r3, &(0x7f0000028fc8)={0x0, 0x0, &(0x7f0000019000), 0x0, &(0x7f0000000040)=[@rights={0x18, 0x1, 0x1, [r1]}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000000b80)=[{{&(0x7f0000000200)=@l2, 0x80, &(0x7f00000005c0), 0x0, &(0x7f0000000600)=""/84, 0x54}}, {{&(0x7f0000000680)=@l2, 0x80, &(0x7f0000000a40), 0x0, &(0x7f0000000ac0)=""/147, 0x93}}], 0x400000000000041, 0x62, 0x0) 03:12:26 executing program 3: socket$packet(0x11, 0xa, 0x300) syz_emit_ethernet(0x4e, &(0x7f0000000080)={@local, @broadcast, [{}], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x0, 0x0, @local, @local={0xfe, 0x80, [0x60000000]}, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, &(0x7f00000002c0)) 03:12:26 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f00000003c0), 0x8cffffff, &(0x7f0000000580)={[{@session={'session'}}]}) 03:12:26 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e23}, 0x1c) listen(r0, 0x18) r1 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f0000000000)=[@in={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0xc}, [0x20000000]}, @in={0x2, 0x4e23, @local}], 0x20) [ 1035.495164] FAULT_INJECTION: forcing a failure. [ 1035.495164] name failslab, interval 1, probability 0, space 0, times 0 [ 1035.527061] CPU: 0 PID: 27404 Comm: syz-executor1 Not tainted 4.19.0-rc8+ #64 [ 1035.534415] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1035.543797] Call Trace: [ 1035.546430] dump_stack+0x1c4/0x2b4 [ 1035.550117] ? dump_stack_print_info.cold.2+0x52/0x52 [ 1035.555403] should_fail.cold.4+0xa/0x17 [ 1035.559512] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 1035.564662] ? graph_lock+0x170/0x170 [ 1035.568488] ? __mutex_lock+0x85e/0x1700 [ 1035.572572] ? _raw_spin_unlock_irqrestore+0x82/0xd0 [ 1035.577734] ? _raw_spin_unlock_irqrestore+0x82/0xd0 [ 1035.582865] ? graph_lock+0x170/0x170 [ 1035.586694] ? kasan_check_read+0x11/0x20 [ 1035.590895] ? find_held_lock+0x36/0x1c0 03:12:27 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f00000003c0), 0x4c000000, &(0x7f0000000580)={[{@session={'session'}}]}) 03:12:27 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e23}, 0x1c) listen(r0, 0x18) r1 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f0000000000)=[@in={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0xc}, [0xfec0000000000000]}, @in={0x2, 0x4e23, @local}], 0x20) [ 1035.595026] ? __lock_is_held+0xb5/0x140 [ 1035.599148] ? ___might_sleep+0x1ed/0x300 [ 1035.603335] ? arch_local_save_flags+0x40/0x40 [ 1035.607988] __should_failslab+0x124/0x180 [ 1035.612265] should_failslab+0x9/0x14 [ 1035.616101] kmem_cache_alloc_node_trace+0x270/0x740 [ 1035.621253] ? lockdep_init_map+0x9/0x10 [ 1035.625345] ? __init_waitqueue_head+0x9e/0x150 [ 1035.630049] ? init_wait_entry+0x1c0/0x1c0 [ 1035.634323] __kmalloc_node+0x33/0x70 [ 1035.638157] ? mempool_alloc_slab+0x60/0x60 03:12:27 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000040)="153f6234488dd25d766070") socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup2(r2, r2) sendmsg$netlink(r3, &(0x7f0000028fc8)={0x0, 0x0, &(0x7f0000019000), 0x0, &(0x7f0000000040)=[@rights={0x18, 0x1, 0x1, [r1]}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000000b80)=[{{&(0x7f0000000200)=@l2, 0x80, &(0x7f00000005c0), 0x0, &(0x7f0000000600)=""/84, 0x54}}, {{&(0x7f0000000680)=@l2, 0x80, &(0x7f0000000a40), 0x0, &(0x7f0000000ac0)=""/147, 0x93}}], 0x400000000000112, 0x62, 0x0) [ 1035.642510] mempool_init_node+0x131/0x550 [ 1035.646787] ? mempool_free+0x370/0x370 [ 1035.650791] ? mempool_alloc_slab+0x60/0x60 [ 1035.655149] mempool_init+0x3d/0x50 [ 1035.658857] bioset_init+0x3d4/0x840 [ 1035.662614] ? bioset_exit+0x370/0x370 [ 1035.666540] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 1035.671615] blk_alloc_queue_node+0x280/0xe90 [ 1035.676159] ? blk_init_allocated_queue+0x640/0x640 [ 1035.681211] ? __mutex_init+0x1f7/0x290 [ 1035.685265] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1035.690836] ? __blk_mq_alloc_rq_map+0x17d/0x2e0 03:12:27 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000040)="153f6234488dd25d766070") socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup2(r2, r2) sendmsg$netlink(r3, &(0x7f0000028fc8)={0x0, 0x0, &(0x7f0000019000), 0x0, &(0x7f0000000040)=[@rights={0x18, 0x1, 0x1, [r1]}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000000b80)=[{{&(0x7f0000000200)=@l2, 0x80, &(0x7f00000005c0), 0x0, &(0x7f0000000600)=""/84, 0x54}}, {{&(0x7f0000000680)=@l2, 0x80, &(0x7f0000000a40), 0x0, &(0x7f0000000ac0)=""/147, 0x93}}], 0x400000000000128, 0x62, 0x0) [ 1035.695637] ? blk_mq_alloc_tag_set+0x50e/0xad0 [ 1035.700375] ? blk_mq_update_nr_hw_queues+0xe50/0xe50 [ 1035.705617] blk_mq_init_queue+0x4b/0xb0 [ 1035.709714] loop_add+0x34c/0xa30 [ 1035.713237] ? loop_queue_rq+0x690/0x690 [ 1035.717413] loop_control_ioctl+0x199/0x530 [ 1035.721773] ? loop_add+0xa30/0xa30 [ 1035.725437] ? arch_local_save_flags+0x40/0x40 [ 1035.730066] ? __mutex_unlock_slowpath+0x197/0x8c0 [ 1035.735042] ? loop_add+0xa30/0xa30 [ 1035.738706] do_vfs_ioctl+0x1de/0x1720 [ 1035.742645] ? ioctl_preallocate+0x300/0x300 [ 1035.747089] ? selinux_file_mprotect+0x620/0x620 [ 1035.751897] ? __sb_end_write+0xd9/0x110 [ 1035.756030] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1035.761622] ? fput+0x130/0x1a0 [ 1035.764946] ? do_syscall_64+0x9a/0x820 [ 1035.768985] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1035.774549] ? security_file_ioctl+0x94/0xc0 [ 1035.779027] ksys_ioctl+0xa9/0xd0 [ 1035.782518] __x64_sys_ioctl+0x73/0xb0 [ 1035.786449] do_syscall_64+0x1b9/0x820 [ 1035.790361] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe 03:12:27 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000040)="153f6234488dd25d766070") socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup2(r2, r2) sendmsg$netlink(r3, &(0x7f0000028fc8)={0x0, 0x0, &(0x7f0000019000), 0x0, &(0x7f0000000040)=[@rights={0x18, 0x1, 0x1, [r1]}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000000b80)=[{{&(0x7f0000000200)=@l2, 0x80, &(0x7f00000005c0), 0x0, &(0x7f0000000600)=""/84, 0x54}}, {{&(0x7f0000000680)=@l2, 0x80, &(0x7f0000000a40), 0x0, &(0x7f0000000ac0)=""/147, 0x93}}], 0x400000000000016, 0x62, 0x0) 03:12:27 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f00000003c0), 0xf703, &(0x7f0000000580)={[{@session={'session'}}]}) [ 1035.795760] ? syscall_return_slowpath+0x5e0/0x5e0 [ 1035.800717] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1035.805615] ? trace_hardirqs_on_caller+0x310/0x310 [ 1035.810670] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 1035.815726] ? prepare_exit_to_usermode+0x291/0x3b0 [ 1035.820792] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1035.825688] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1035.830903] RIP: 0033:0x457569 [ 1035.834138] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1035.853066] RSP: 002b:00007fe27d20bc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1035.860807] RAX: ffffffffffffffda RBX: 00007fe27d20bc90 RCX: 0000000000457569 [ 1035.868125] RDX: 0000000000000000 RSI: 0000000000004c80 RDI: 0000000000000003 [ 1035.875417] RBP: 000000000072bf00 R08: 0000000000000000 R09: 0000000000000000 [ 1035.882712] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fe27d20c6d4 [ 1035.890031] R13: 00000000004c039f R14: 00000000004d0540 R15: 0000000000000005 [ 1035.921577] hfs: invalid session number or type of track [ 1035.962940] hfs: can't find a HFS filesystem on dev loop2 [ 1036.055877] hfs: invalid session number or type of track [ 1036.062361] hfs: can't find a HFS filesystem on dev loop2 03:12:27 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f00000003c0), 0x2c00, &(0x7f0000000580)={[{@session={'session'}}]}) 03:12:27 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000040)="153f6234488dd25d766070") socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup2(r2, r2) sendmsg$netlink(r3, &(0x7f0000028fc8)={0x0, 0x0, &(0x7f0000019000), 0x0, &(0x7f0000000040)=[@rights={0x18, 0x1, 0x1, [r1]}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000000b80)=[{{&(0x7f0000000200)=@l2, 0x80, &(0x7f00000005c0), 0x0, &(0x7f0000000600)=""/84, 0x54}}, {{&(0x7f0000000680)=@l2, 0x80, &(0x7f0000000a40), 0x0, &(0x7f0000000ac0)=""/147, 0x93}}], 0x400000000000052, 0x62, 0x0) 03:12:27 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f00000003c0), 0x22, &(0x7f0000000580)={[{@session={'session'}}]}) 03:12:27 executing program 3: socket$packet(0x11, 0xa, 0x300) syz_emit_ethernet(0x4e, &(0x7f0000000080)={@local, @broadcast, [{}], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x0, 0x0, @local, @local={0xfe, 0x80, [0x88470000]}, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, &(0x7f00000002c0)) 03:12:27 executing program 1 (fault-call:3 fault-nth:12): r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) 03:12:27 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e23}, 0x1c) listen(r0, 0x18) r1 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f0000000000)=[@in={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0xc}, [0x6100000000000000]}, @in={0x2, 0x4e23, @local}], 0x20) [ 1036.168554] FAULT_INJECTION: forcing a failure. [ 1036.168554] name failslab, interval 1, probability 0, space 0, times 0 [ 1036.180377] CPU: 1 PID: 27452 Comm: syz-executor1 Not tainted 4.19.0-rc8+ #64 [ 1036.187667] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1036.187675] Call Trace: [ 1036.187707] dump_stack+0x1c4/0x2b4 [ 1036.187735] ? dump_stack_print_info.cold.2+0x52/0x52 [ 1036.208512] should_fail.cold.4+0xa/0x17 [ 1036.212597] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 1036.217725] ? __save_stack_trace+0x8d/0xf0 [ 1036.222076] ? graph_lock+0x170/0x170 [ 1036.225895] ? graph_lock+0x170/0x170 [ 1036.225913] ? save_stack+0xa9/0xd0 [ 1036.225951] ? save_stack+0x43/0xd0 [ 1036.225972] ? __kmalloc_node+0x47/0x70 [ 1036.225994] ? find_held_lock+0x36/0x1c0 [ 1036.226040] ? __lock_is_held+0xb5/0x140 [ 1036.249191] ? ___might_sleep+0x1ed/0x300 [ 1036.253374] ? arch_local_save_flags+0x40/0x40 [ 1036.257976] ? __lock_is_held+0xb5/0x140 [ 1036.262074] __should_failslab+0x124/0x180 [ 1036.266335] should_failslab+0x9/0x14 [ 1036.270155] kmem_cache_alloc+0x2be/0x730 [ 1036.274325] ? kasan_kmalloc+0xc7/0xe0 [ 1036.278241] ? mempool_free+0x370/0x370 [ 1036.282230] mempool_alloc_slab+0x44/0x60 [ 1036.286396] mempool_init_node+0x2d2/0x550 [ 1036.290657] ? mempool_free+0x370/0x370 [ 1036.294642] ? mempool_alloc_slab+0x60/0x60 [ 1036.298984] mempool_init+0x3d/0x50 [ 1036.302691] bioset_init+0x3d4/0x840 [ 1036.306402] ? bioset_exit+0x370/0x370 [ 1036.310378] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 1036.315387] blk_alloc_queue_node+0x280/0xe90 [ 1036.319880] ? blk_init_allocated_queue+0x640/0x640 [ 1036.324910] ? __mutex_init+0x1f7/0x290 [ 1036.328915] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1036.334456] ? __blk_mq_alloc_rq_map+0x17d/0x2e0 [ 1036.339216] ? blk_mq_alloc_tag_set+0x50e/0xad0 [ 1036.343895] ? blk_mq_update_nr_hw_queues+0xe50/0xe50 [ 1036.349108] blk_mq_init_queue+0x4b/0xb0 [ 1036.353165] loop_add+0x34c/0xa30 [ 1036.356650] ? loop_queue_rq+0x690/0x690 [ 1036.360715] loop_control_ioctl+0x199/0x530 [ 1036.365057] ? loop_add+0xa30/0xa30 [ 1036.368731] ? arch_local_save_flags+0x40/0x40 [ 1036.373327] ? __mutex_unlock_slowpath+0x197/0x8c0 [ 1036.378266] ? loop_add+0xa30/0xa30 [ 1036.381896] do_vfs_ioctl+0x1de/0x1720 [ 1036.385805] ? ioctl_preallocate+0x300/0x300 [ 1036.390228] ? selinux_file_mprotect+0x620/0x620 [ 1036.395000] ? __sb_end_write+0xd9/0x110 [ 1036.399058] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1036.404607] ? fput+0x130/0x1a0 [ 1036.407925] ? do_syscall_64+0x9a/0x820 [ 1036.411924] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1036.417487] ? security_file_ioctl+0x94/0xc0 [ 1036.421911] ksys_ioctl+0xa9/0xd0 [ 1036.425389] __x64_sys_ioctl+0x73/0xb0 [ 1036.429299] do_syscall_64+0x1b9/0x820 [ 1036.433188] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 1036.438544] ? syscall_return_slowpath+0x5e0/0x5e0 [ 1036.443465] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1036.448308] ? trace_hardirqs_on_caller+0x310/0x310 [ 1036.453347] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 1036.458366] ? prepare_exit_to_usermode+0x291/0x3b0 [ 1036.463450] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1036.468306] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1036.473487] RIP: 0033:0x457569 [ 1036.476687] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1036.495582] RSP: 002b:00007fe27d20bc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1036.503297] RAX: ffffffffffffffda RBX: 00007fe27d20bc90 RCX: 0000000000457569 [ 1036.510558] RDX: 0000000000000000 RSI: 0000000000004c80 RDI: 0000000000000003 03:12:27 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f00000003c0), 0xf7030000, &(0x7f0000000580)={[{@session={'session'}}]}) 03:12:28 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e23}, 0x1c) listen(r0, 0x18) r1 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f0000000000)=[@in={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0xc}, [0xffffff7f]}, @in={0x2, 0x4e23, @local}], 0x20) 03:12:28 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000040)="153f6234488dd25d766070") socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup2(r2, r2) sendmsg$netlink(r3, &(0x7f0000028fc8)={0x0, 0x0, &(0x7f0000019000), 0x0, &(0x7f0000000040)=[@rights={0x18, 0x1, 0x1, [r1]}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000000b80)=[{{&(0x7f0000000200)=@l2, 0x80, &(0x7f00000005c0), 0x0, &(0x7f0000000600)=""/84, 0x54}}, {{&(0x7f0000000680)=@l2, 0x80, &(0x7f0000000a40), 0x0, &(0x7f0000000ac0)=""/147, 0x93}}], 0x400000000000011, 0x62, 0x0) [ 1036.517814] RBP: 000000000072bf00 R08: 0000000000000000 R09: 0000000000000000 [ 1036.525103] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fe27d20c6d4 [ 1036.532374] R13: 00000000004c039f R14: 00000000004d0540 R15: 0000000000000005 03:12:28 executing program 3: socket$packet(0x11, 0xa, 0x300) syz_emit_ethernet(0x4e, &(0x7f0000000080)={@local, @broadcast, [{}], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x0, 0x0, @local, @local={0xfe, 0x80, [0x2]}, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, &(0x7f00000002c0)) 03:12:28 executing program 1 (fault-call:3 fault-nth:13): r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) 03:12:28 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000040)="153f6234488dd25d766070") socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup2(r2, r2) sendmsg$netlink(r3, &(0x7f0000028fc8)={0x0, 0x0, &(0x7f0000019000), 0x0, &(0x7f0000000040)=[@rights={0x18, 0x1, 0x1, [r1]}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000000b80)=[{{&(0x7f0000000200)=@l2, 0x80, &(0x7f00000005c0), 0x0, &(0x7f0000000600)=""/84, 0x54}}, {{&(0x7f0000000680)=@l2, 0x80, &(0x7f0000000a40), 0x0, &(0x7f0000000ac0)=""/147, 0x93}}], 0x4000000000000ae, 0x62, 0x0) 03:12:28 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f00000003c0), 0x22, &(0x7f0000000580)={[{@session={'session'}}]}) 03:12:28 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f00000003c0), 0xf6030000, &(0x7f0000000580)={[{@session={'session'}}]}) [ 1036.775407] FAULT_INJECTION: forcing a failure. [ 1036.775407] name failslab, interval 1, probability 0, space 0, times 0 [ 1036.790801] CPU: 0 PID: 27478 Comm: syz-executor1 Not tainted 4.19.0-rc8+ #64 [ 1036.798115] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1036.807495] Call Trace: [ 1036.810139] dump_stack+0x1c4/0x2b4 [ 1036.813815] ? dump_stack_print_info.cold.2+0x52/0x52 [ 1036.819075] should_fail.cold.4+0xa/0x17 03:12:28 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e23}, 0x1c) listen(r0, 0x18) r1 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f0000000000)=[@in={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0xc}, [0x14c]}, @in={0x2, 0x4e23, @local}], 0x20) 03:12:28 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000040)="153f6234488dd25d766070") socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup2(r2, r2) sendmsg$netlink(r3, &(0x7f0000028fc8)={0x0, 0x0, &(0x7f0000019000), 0x0, &(0x7f0000000040)=[@rights={0x18, 0x1, 0x1, [r1]}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000000b80)=[{{&(0x7f0000000200)=@l2, 0x80, &(0x7f00000005c0), 0x0, &(0x7f0000000600)=""/84, 0x54}}, {{&(0x7f0000000680)=@l2, 0x80, &(0x7f0000000a40), 0x0, &(0x7f0000000ac0)=""/147, 0x93}}], 0x400000000000060, 0x62, 0x0) [ 1036.823179] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 1036.828314] ? __save_stack_trace+0x8d/0xf0 [ 1036.832678] ? graph_lock+0x170/0x170 [ 1036.836512] ? graph_lock+0x170/0x170 [ 1036.840369] ? save_stack+0xa9/0xd0 [ 1036.844035] ? save_stack+0x43/0xd0 [ 1036.847698] ? __kmalloc_node+0x47/0x70 [ 1036.851747] ? find_held_lock+0x36/0x1c0 [ 1036.855869] ? __lock_is_held+0xb5/0x140 [ 1036.859995] ? ___might_sleep+0x1ed/0x300 [ 1036.864192] ? arch_local_save_flags+0x40/0x40 [ 1036.868801] ? __lock_is_held+0xb5/0x140 03:12:28 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f00000003c0), 0x4c, &(0x7f0000000580)={[{@session={'session'}}]}) [ 1036.872924] __should_failslab+0x124/0x180 [ 1036.877215] should_failslab+0x9/0x14 [ 1036.881055] kmem_cache_alloc+0x2be/0x730 [ 1036.885230] ? kasan_kmalloc+0xc7/0xe0 [ 1036.889162] ? mempool_free+0x370/0x370 [ 1036.893252] mempool_alloc_slab+0x44/0x60 [ 1036.897424] mempool_init_node+0x2d2/0x550 [ 1036.901711] ? mempool_free+0x370/0x370 [ 1036.905730] ? mempool_alloc_slab+0x60/0x60 [ 1036.910120] mempool_init+0x3d/0x50 [ 1036.913818] bioset_init+0x3d4/0x840 [ 1036.917591] ? bioset_exit+0x370/0x370 [ 1036.921535] blk_alloc_queue_node+0x280/0xe90 03:12:28 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f00000003c0), 0x60, &(0x7f0000000580)={[{@session={'session'}}]}) [ 1036.926099] ? blk_init_allocated_queue+0x640/0x640 [ 1036.931149] ? __mutex_init+0x1f7/0x290 [ 1036.935213] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1036.940784] ? __blk_mq_alloc_rq_map+0x17d/0x2e0 [ 1036.945584] ? blk_mq_alloc_tag_set+0x50e/0xad0 [ 1036.950312] ? blk_mq_update_nr_hw_queues+0xe50/0xe50 [ 1036.955587] blk_mq_init_queue+0x4b/0xb0 [ 1036.959683] loop_add+0x34c/0xa30 [ 1036.963173] ? loop_queue_rq+0x690/0x690 [ 1036.967287] loop_control_ioctl+0x199/0x530 [ 1036.971644] ? loop_add+0xa30/0xa30 03:12:28 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000040)="153f6234488dd25d766070") socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup2(r2, r2) sendmsg$netlink(r3, &(0x7f0000028fc8)={0x0, 0x0, &(0x7f0000019000), 0x0, &(0x7f0000000040)=[@rights={0x18, 0x1, 0x1, [r1]}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000000b80)=[{{&(0x7f0000000200)=@l2, 0x80, &(0x7f00000005c0), 0x0, &(0x7f0000000600)=""/84, 0x54}}, {{&(0x7f0000000680)=@l2, 0x80, &(0x7f0000000a40), 0x0, &(0x7f0000000ac0)=""/147, 0x93}}], 0x40000000000005a, 0x62, 0x0) [ 1036.975304] ? arch_local_save_flags+0x40/0x40 [ 1036.979990] ? __mutex_unlock_slowpath+0x197/0x8c0 [ 1036.984994] ? loop_add+0xa30/0xa30 [ 1036.988654] do_vfs_ioctl+0x1de/0x1720 [ 1036.992618] ? ioctl_preallocate+0x300/0x300 [ 1036.997531] ? selinux_file_mprotect+0x620/0x620 [ 1037.002334] ? __sb_end_write+0xd9/0x110 [ 1037.006440] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1037.012025] ? fput+0x130/0x1a0 [ 1037.015356] ? do_syscall_64+0x9a/0x820 [ 1037.019393] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 03:12:28 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f00000003c0), 0x4800, &(0x7f0000000580)={[{@session={'session'}}]}) [ 1037.024989] ? security_file_ioctl+0x94/0xc0 [ 1037.029445] ksys_ioctl+0xa9/0xd0 [ 1037.032950] __x64_sys_ioctl+0x73/0xb0 [ 1037.036886] do_syscall_64+0x1b9/0x820 [ 1037.040842] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 1037.046249] ? syscall_return_slowpath+0x5e0/0x5e0 [ 1037.051207] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1037.056093] ? trace_hardirqs_on_caller+0x310/0x310 [ 1037.061149] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 1037.066216] ? prepare_exit_to_usermode+0x291/0x3b0 [ 1037.071276] ? trace_hardirqs_off_thunk+0x1a/0x1c 03:12:28 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000040)="153f6234488dd25d766070") socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup2(r2, r2) sendmsg$netlink(r3, &(0x7f0000028fc8)={0x0, 0x0, &(0x7f0000019000), 0x0, &(0x7f0000000040)=[@rights={0x18, 0x1, 0x1, [r1]}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000000b80)=[{{&(0x7f0000000200)=@l2, 0x80, &(0x7f00000005c0), 0x0, &(0x7f0000000600)=""/84, 0x54}}, {{&(0x7f0000000680)=@l2, 0x80, &(0x7f0000000a40), 0x0, &(0x7f0000000ac0)=""/147, 0x93}}], 0x400000000000025, 0x62, 0x0) [ 1037.076172] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1037.081385] RIP: 0033:0x457569 [ 1037.084603] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1037.103544] RSP: 002b:00007fe27d20bc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1037.111310] RAX: ffffffffffffffda RBX: 00007fe27d20bc90 RCX: 0000000000457569 [ 1037.118618] RDX: 0000000000000000 RSI: 0000000000004c80 RDI: 0000000000000003 [ 1037.125914] RBP: 000000000072bf00 R08: 0000000000000000 R09: 0000000000000000 [ 1037.133249] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fe27d20c6d4 [ 1037.140538] R13: 00000000004c039f R14: 00000000004d0540 R15: 0000000000000005 03:12:28 executing program 3: socket$packet(0x11, 0xa, 0x300) syz_emit_ethernet(0x4e, &(0x7f0000000080)={@local, @broadcast, [{}], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x0, 0x0, @local, @local={0xfe, 0x80, [0x88a8ffff00000000]}, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, &(0x7f00000002c0)) 03:12:28 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f00000003c0), 0x700000000000000, &(0x7f0000000580)={[{@session={'session'}}]}) 03:12:28 executing program 1 (fault-call:3 fault-nth:14): r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) 03:12:28 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f00000003c0), 0xffffffff00000000, &(0x7f0000000580)={[{@session={'session'}}]}) 03:12:28 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000040)="153f6234488dd25d766070") socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup2(r2, r2) sendmsg$netlink(r3, &(0x7f0000028fc8)={0x0, 0x0, &(0x7f0000019000), 0x0, &(0x7f0000000040)=[@rights={0x18, 0x1, 0x1, [r1]}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000000b80)=[{{&(0x7f0000000200)=@l2, 0x80, &(0x7f00000005c0), 0x0, &(0x7f0000000600)=""/84, 0x54}}, {{&(0x7f0000000680)=@l2, 0x80, &(0x7f0000000a40), 0x0, &(0x7f0000000ac0)=""/147, 0x93}}], 0x4000000000000d6, 0x62, 0x0) 03:12:28 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e23}, 0x1c) listen(r0, 0x18) r1 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f0000000000)=[@in={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0xc}, [0x2001001000000000]}, @in={0x2, 0x4e23, @local}], 0x20) [ 1037.324336] FAULT_INJECTION: forcing a failure. [ 1037.324336] name failslab, interval 1, probability 0, space 0, times 0 [ 1037.363830] CPU: 0 PID: 27518 Comm: syz-executor1 Not tainted 4.19.0-rc8+ #64 03:12:28 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f00000003c0), 0x7a00000000000000, &(0x7f0000000580)={[{@session={'session'}}]}) [ 1037.371165] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1037.380545] Call Trace: [ 1037.383180] dump_stack+0x1c4/0x2b4 [ 1037.386865] ? dump_stack_print_info.cold.2+0x52/0x52 [ 1037.392124] should_fail.cold.4+0xa/0x17 [ 1037.396231] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 1037.401394] ? graph_lock+0x170/0x170 [ 1037.405230] ? save_stack+0x43/0xd0 [ 1037.408884] ? kasan_kmalloc+0xc7/0xe0 [ 1037.412843] ? kasan_slab_alloc+0x12/0x20 [ 1037.417030] ? graph_lock+0x170/0x170 [ 1037.420858] ? mempool_init+0x3d/0x50 03:12:28 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000040)="153f6234488dd25d766070") socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup2(r2, r2) sendmsg$netlink(r3, &(0x7f0000028fc8)={0x0, 0x0, &(0x7f0000019000), 0x0, &(0x7f0000000040)=[@rights={0x18, 0x1, 0x1, [r1]}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000000b80)=[{{&(0x7f0000000200)=@l2, 0x80, &(0x7f00000005c0), 0x0, &(0x7f0000000600)=""/84, 0x54}}, {{&(0x7f0000000680)=@l2, 0x80, &(0x7f0000000a40), 0x0, &(0x7f0000000ac0)=""/147, 0x93}}], 0x400000000000096, 0x62, 0x0) [ 1037.424685] ? bioset_init+0x3d4/0x840 [ 1037.428593] ? blk_alloc_queue_node+0x280/0xe90 [ 1037.433311] ? blk_mq_init_queue+0x4b/0xb0 [ 1037.437574] ? loop_add+0x34c/0xa30 [ 1037.441225] ? loop_control_ioctl+0x199/0x530 [ 1037.445745] ? ksys_ioctl+0xa9/0xd0 [ 1037.449428] ? find_held_lock+0x36/0x1c0 [ 1037.453560] ? __lock_is_held+0xb5/0x140 [ 1037.457674] ? ___might_sleep+0x1ed/0x300 [ 1037.461860] ? arch_local_save_flags+0x40/0x40 [ 1037.466496] __should_failslab+0x124/0x180 [ 1037.470769] should_failslab+0x9/0x14 03:12:28 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f00000003c0), 0x1000000000, &(0x7f0000000580)={[{@session={'session'}}]}) [ 1037.474603] kmem_cache_alloc_node_trace+0x270/0x740 [ 1037.479735] ? lockdep_init_map+0x9/0x10 [ 1037.483829] ? __init_waitqueue_head+0x9e/0x150 [ 1037.488535] ? init_wait_entry+0x1c0/0x1c0 [ 1037.492815] __kmalloc_node+0x33/0x70 [ 1037.496681] ? mempool_alloc_slab+0x60/0x60 [ 1037.501033] mempool_init_node+0x131/0x550 [ 1037.505317] ? mempool_free+0x370/0x370 [ 1037.509320] ? mempool_alloc_slab+0x60/0x60 [ 1037.513674] mempool_init+0x3d/0x50 [ 1037.517349] bioset_init+0x646/0x840 [ 1037.521108] ? bioset_exit+0x370/0x370 03:12:29 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000040)="153f6234488dd25d766070") socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup2(r2, r2) sendmsg$netlink(r3, &(0x7f0000028fc8)={0x0, 0x0, &(0x7f0000019000), 0x0, &(0x7f0000000040)=[@rights={0x18, 0x1, 0x1, [r1]}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000000b80)=[{{&(0x7f0000000200)=@l2, 0x80, &(0x7f00000005c0), 0x0, &(0x7f0000000600)=""/84, 0x54}}, {{&(0x7f0000000680)=@l2, 0x80, &(0x7f0000000a40), 0x0, &(0x7f0000000ac0)=""/147, 0x93}}], 0x40000000000009c, 0x62, 0x0) [ 1037.525038] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 1037.530096] blk_alloc_queue_node+0x280/0xe90 [ 1037.534640] ? blk_init_allocated_queue+0x640/0x640 [ 1037.539711] ? __mutex_init+0x1f7/0x290 [ 1037.543787] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1037.549360] ? __blk_mq_alloc_rq_map+0x17d/0x2e0 [ 1037.554158] ? blk_mq_alloc_tag_set+0x50e/0xad0 [ 1037.558874] ? blk_mq_update_nr_hw_queues+0xe50/0xe50 [ 1037.564106] blk_mq_init_queue+0x4b/0xb0 [ 1037.568199] loop_add+0x34c/0xa30 03:12:29 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f00000003c0), 0x1000000000000000, &(0x7f0000000580)={[{@session={'session'}}]}) [ 1037.571687] ? loop_queue_rq+0x690/0x690 [ 1037.575800] loop_control_ioctl+0x199/0x530 [ 1037.580160] ? loop_add+0xa30/0xa30 [ 1037.583818] ? arch_local_save_flags+0x40/0x40 [ 1037.588441] ? __mutex_unlock_slowpath+0x197/0x8c0 [ 1037.593409] ? loop_add+0xa30/0xa30 [ 1037.597075] do_vfs_ioctl+0x1de/0x1720 [ 1037.601023] ? ioctl_preallocate+0x300/0x300 [ 1037.605470] ? selinux_file_mprotect+0x620/0x620 [ 1037.610273] ? __sb_end_write+0xd9/0x110 [ 1037.614390] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1037.619966] ? fput+0x130/0x1a0 [ 1037.623281] ? do_syscall_64+0x9a/0x820 [ 1037.627321] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1037.632899] ? security_file_ioctl+0x94/0xc0 [ 1037.637385] ksys_ioctl+0xa9/0xd0 [ 1037.640903] __x64_sys_ioctl+0x73/0xb0 [ 1037.644838] do_syscall_64+0x1b9/0x820 [ 1037.648755] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 1037.654168] ? syscall_return_slowpath+0x5e0/0x5e0 [ 1037.659125] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1037.664021] ? trace_hardirqs_on_caller+0x310/0x310 [ 1037.669068] ? prepare_exit_to_usermode+0x3b0/0x3b0 03:12:29 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000040)="153f6234488dd25d766070") socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup2(r2, r2) sendmsg$netlink(r3, &(0x7f0000028fc8)={0x0, 0x0, &(0x7f0000019000), 0x0, &(0x7f0000000040)=[@rights={0x18, 0x1, 0x1, [r1]}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000000b80)=[{{&(0x7f0000000200)=@l2, 0x80, &(0x7f00000005c0), 0x0, &(0x7f0000000600)=""/84, 0x54}}, {{&(0x7f0000000680)=@l2, 0x80, &(0x7f0000000a40), 0x0, &(0x7f0000000ac0)=""/147, 0x93}}], 0x4000000000000de, 0x62, 0x0) [ 1037.674119] ? prepare_exit_to_usermode+0x291/0x3b0 [ 1037.679177] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1037.684075] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1037.689292] RIP: 0033:0x457569 [ 1037.692527] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1037.711451] RSP: 002b:00007fe27d20bc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1037.719200] RAX: ffffffffffffffda RBX: 00007fe27d20bc90 RCX: 0000000000457569 [ 1037.726518] RDX: 0000000000000000 RSI: 0000000000004c80 RDI: 0000000000000003 [ 1037.733821] RBP: 000000000072bf00 R08: 0000000000000000 R09: 0000000000000000 [ 1037.741147] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fe27d20c6d4 [ 1037.748444] R13: 00000000004c039f R14: 00000000004d0540 R15: 0000000000000005 03:12:29 executing program 3: socket$packet(0x11, 0xa, 0x300) syz_emit_ethernet(0x4e, &(0x7f0000000080)={@local, @broadcast, [{}], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x0, 0x0, @local, @local={0xfe, 0x80, [0x6488]}, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, &(0x7f00000002c0)) 03:12:29 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f00000003c0), 0x2000000000000000, &(0x7f0000000580)={[{@session={'session'}}]}) 03:12:29 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000040)="153f6234488dd25d766070") socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup2(r2, r2) sendmsg$netlink(r3, &(0x7f0000028fc8)={0x0, 0x0, &(0x7f0000019000), 0x0, &(0x7f0000000040)=[@rights={0x18, 0x1, 0x1, [r1]}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000000b80)=[{{&(0x7f0000000200)=@l2, 0x80, &(0x7f00000005c0), 0x0, &(0x7f0000000600)=""/84, 0x54}}, {{&(0x7f0000000680)=@l2, 0x80, &(0x7f0000000a40), 0x0, &(0x7f0000000ac0)=""/147, 0x93}}], 0x4000000000000ad, 0x62, 0x0) 03:12:29 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f00000003c0), 0x4800000000000000, &(0x7f0000000580)={[{@session={'session'}}]}) 03:12:29 executing program 1 (fault-call:3 fault-nth:15): r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) 03:12:29 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e23}, 0x1c) listen(r0, 0x18) r1 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f0000000000)=[@in={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0xc}, [0x1000000000000]}, @in={0x2, 0x4e23, @local}], 0x20) 03:12:29 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000040)="153f6234488dd25d766070") socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup2(r2, r2) sendmsg$netlink(r3, &(0x7f0000028fc8)={0x0, 0x0, &(0x7f0000019000), 0x0, &(0x7f0000000040)=[@rights={0x18, 0x1, 0x1, [r1]}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000000b80)=[{{&(0x7f0000000200)=@l2, 0x80, &(0x7f00000005c0), 0x0, &(0x7f0000000600)=""/84, 0x54}}, {{&(0x7f0000000680)=@l2, 0x80, &(0x7f0000000a40), 0x0, &(0x7f0000000ac0)=""/147, 0x93}}], 0x400000000000061, 0x62, 0x0) 03:12:29 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f00000003c0), 0x6c00000000000000, &(0x7f0000000580)={[{@session={'session'}}]}) [ 1038.032422] FAULT_INJECTION: forcing a failure. [ 1038.032422] name failslab, interval 1, probability 0, space 0, times 0 [ 1038.054218] CPU: 0 PID: 27567 Comm: syz-executor1 Not tainted 4.19.0-rc8+ #64 [ 1038.062305] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1038.071690] Call Trace: [ 1038.074338] dump_stack+0x1c4/0x2b4 [ 1038.078057] ? dump_stack_print_info.cold.2+0x52/0x52 [ 1038.083318] should_fail.cold.4+0xa/0x17 [ 1038.087435] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 1038.092612] ? graph_lock+0x170/0x170 [ 1038.096461] ? save_stack+0x43/0xd0 [ 1038.100110] ? kasan_kmalloc+0xc7/0xe0 [ 1038.104132] ? kasan_slab_alloc+0x12/0x20 [ 1038.108314] ? graph_lock+0x170/0x170 [ 1038.112156] ? mempool_init+0x3d/0x50 [ 1038.116010] ? bioset_init+0x3d4/0x840 [ 1038.119924] ? blk_alloc_queue_node+0x280/0xe90 [ 1038.124638] ? blk_mq_init_queue+0x4b/0xb0 [ 1038.128897] ? loop_add+0x34c/0xa30 03:12:29 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f00000003c0), 0x6800000000000000, &(0x7f0000000580)={[{@session={'session'}}]}) [ 1038.132558] ? loop_control_ioctl+0x199/0x530 [ 1038.137083] ? ksys_ioctl+0xa9/0xd0 [ 1038.140743] ? find_held_lock+0x36/0x1c0 [ 1038.144847] ? __lock_is_held+0xb5/0x140 [ 1038.148983] ? ___might_sleep+0x1ed/0x300 [ 1038.153168] ? arch_local_save_flags+0x40/0x40 [ 1038.157807] __should_failslab+0x124/0x180 [ 1038.162077] should_failslab+0x9/0x14 [ 1038.165910] kmem_cache_alloc_node_trace+0x270/0x740 [ 1038.171059] ? lockdep_init_map+0x9/0x10 [ 1038.175152] ? __init_waitqueue_head+0x9e/0x150 03:12:29 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f00000003c0), 0xffffff97, &(0x7f0000000580)={[{@session={'session'}}]}) [ 1038.179875] ? init_wait_entry+0x1c0/0x1c0 [ 1038.184160] __kmalloc_node+0x33/0x70 [ 1038.188006] ? mempool_alloc_slab+0x60/0x60 [ 1038.192360] mempool_init_node+0x131/0x550 [ 1038.196638] ? mempool_free+0x370/0x370 [ 1038.200655] ? mempool_alloc_slab+0x60/0x60 [ 1038.205018] mempool_init+0x3d/0x50 [ 1038.208709] bioset_init+0x646/0x840 [ 1038.212467] ? bioset_exit+0x370/0x370 [ 1038.216422] blk_alloc_queue_node+0x280/0xe90 [ 1038.220967] ? blk_init_allocated_queue+0x640/0x640 [ 1038.226039] ? __mutex_init+0x1f7/0x290 [ 1038.230096] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1038.235706] ? __blk_mq_alloc_rq_map+0x17d/0x2e0 [ 1038.240496] ? blk_mq_alloc_tag_set+0x50e/0xad0 [ 1038.245214] ? blk_mq_update_nr_hw_queues+0xe50/0xe50 [ 1038.250485] blk_mq_init_queue+0x4b/0xb0 [ 1038.254580] loop_add+0x34c/0xa30 [ 1038.258076] ? loop_queue_rq+0x690/0x690 [ 1038.262202] loop_control_ioctl+0x199/0x530 [ 1038.266562] ? loop_add+0xa30/0xa30 [ 1038.270220] ? arch_local_save_flags+0x40/0x40 [ 1038.274845] ? __mutex_unlock_slowpath+0x197/0x8c0 [ 1038.279815] ? loop_add+0xa30/0xa30 03:12:29 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f00000003c0), 0x6c, &(0x7f0000000580)={[{@session={'session'}}]}) [ 1038.283502] do_vfs_ioctl+0x1de/0x1720 [ 1038.287430] ? ioctl_preallocate+0x300/0x300 [ 1038.291878] ? selinux_file_mprotect+0x620/0x620 [ 1038.296675] ? __sb_end_write+0xd9/0x110 [ 1038.300771] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1038.306333] ? fput+0x130/0x1a0 [ 1038.309643] ? do_syscall_64+0x9a/0x820 [ 1038.313656] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1038.319232] ? security_file_ioctl+0x94/0xc0 [ 1038.323677] ksys_ioctl+0xa9/0xd0 [ 1038.327211] __x64_sys_ioctl+0x73/0xb0 [ 1038.331135] do_syscall_64+0x1b9/0x820 [ 1038.335049] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 1038.340452] ? syscall_return_slowpath+0x5e0/0x5e0 [ 1038.345438] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1038.350322] ? trace_hardirqs_on_caller+0x310/0x310 [ 1038.355373] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 1038.360425] ? prepare_exit_to_usermode+0x291/0x3b0 [ 1038.365484] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1038.370376] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1038.375597] RIP: 0033:0x457569 03:12:29 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f00000003c0), 0xc0ed0000, &(0x7f0000000580)={[{@session={'session'}}]}) [ 1038.378812] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1038.397738] RSP: 002b:00007fe27d20bc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1038.405481] RAX: ffffffffffffffda RBX: 00007fe27d20bc90 RCX: 0000000000457569 [ 1038.412772] RDX: 0000000000000000 RSI: 0000000000004c80 RDI: 0000000000000003 [ 1038.420064] RBP: 000000000072bf00 R08: 0000000000000000 R09: 0000000000000000 03:12:29 executing program 3: socket$packet(0x11, 0xa, 0x300) syz_emit_ethernet(0x4e, &(0x7f0000000080)={@local, @broadcast, [{}], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x0, 0x0, @local, @local={0xfe, 0x80, [0x40030000000000]}, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, &(0x7f00000002c0)) 03:12:29 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e23}, 0x1c) listen(r0, 0x18) r1 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f0000000000)=[@in={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0xc}, [0x4000000]}, @in={0x2, 0x4e23, @local}], 0x20) [ 1038.427377] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fe27d20c6d4 [ 1038.434668] R13: 00000000004c039f R14: 00000000004d0540 R15: 0000000000000005 03:12:30 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f00000003c0), 0x60000000, &(0x7f0000000580)={[{@session={'session'}}]}) 03:12:30 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f00000003c0), 0x200000000000000, &(0x7f0000000580)={[{@session={'session'}}]}) 03:12:30 executing program 1 (fault-call:3 fault-nth:16): r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) 03:12:30 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000040)="153f6234488dd25d766070") socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup2(r2, r2) sendmsg$netlink(r3, &(0x7f0000028fc8)={0x0, 0x0, &(0x7f0000019000), 0x0, &(0x7f0000000040)=[@rights={0x18, 0x1, 0x1, [r1]}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000000b80)=[{{&(0x7f0000000200)=@l2, 0x80, &(0x7f00000005c0), 0x0, &(0x7f0000000600)=""/84, 0x54}}, {{&(0x7f0000000680)=@l2, 0x80, &(0x7f0000000a40), 0x0, &(0x7f0000000ac0)=""/147, 0x93}}], 0x400000000000119, 0x62, 0x0) 03:12:30 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f00000003c0), 0x6, &(0x7f0000000580)={[{@session={'session'}}]}) 03:12:30 executing program 3: socket$packet(0x11, 0xa, 0x300) syz_emit_ethernet(0x4e, &(0x7f0000000080)={@local, @broadcast, [{}], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x0, 0x0, @local, @local={0xfe, 0x80, [0x89ffffff]}, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, &(0x7f00000002c0)) [ 1038.669157] FAULT_INJECTION: forcing a failure. [ 1038.669157] name failslab, interval 1, probability 0, space 0, times 0 03:12:30 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000040)="153f6234488dd25d766070") socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup2(r2, r2) sendmsg$netlink(r3, &(0x7f0000028fc8)={0x0, 0x0, &(0x7f0000019000), 0x0, &(0x7f0000000040)=[@rights={0x18, 0x1, 0x1, [r1]}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000000b80)=[{{&(0x7f0000000200)=@l2, 0x80, &(0x7f00000005c0), 0x0, &(0x7f0000000600)=""/84, 0x54}}, {{&(0x7f0000000680)=@l2, 0x80, &(0x7f0000000a40), 0x0, &(0x7f0000000ac0)=""/147, 0x93}}], 0x400000000000155, 0x62, 0x0) [ 1038.728239] CPU: 0 PID: 27609 Comm: syz-executor1 Not tainted 4.19.0-rc8+ #64 [ 1038.735584] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1038.744987] Call Trace: [ 1038.747627] dump_stack+0x1c4/0x2b4 [ 1038.751304] ? dump_stack_print_info.cold.2+0x52/0x52 [ 1038.756575] should_fail.cold.4+0xa/0x17 [ 1038.760688] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 1038.765823] ? __save_stack_trace+0x8d/0xf0 [ 1038.770199] ? graph_lock+0x170/0x170 [ 1038.774034] ? graph_lock+0x170/0x170 03:12:30 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e23}, 0x1c) listen(r0, 0x18) r1 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f0000000000)=[@in={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0xc}, [0xe0000000]}, @in={0x2, 0x4e23, @local}], 0x20) [ 1038.777859] ? save_stack+0xa9/0xd0 [ 1038.781503] ? save_stack+0x43/0xd0 [ 1038.785155] ? __kmalloc_node+0x47/0x70 [ 1038.789162] ? find_held_lock+0x36/0x1c0 [ 1038.793366] ? __lock_is_held+0xb5/0x140 [ 1038.797484] ? ___might_sleep+0x1ed/0x300 [ 1038.801665] ? arch_local_save_flags+0x40/0x40 [ 1038.806295] ? __lock_is_held+0xb5/0x140 [ 1038.810418] __should_failslab+0x124/0x180 [ 1038.814695] should_failslab+0x9/0x14 [ 1038.818531] kmem_cache_alloc+0x2be/0x730 [ 1038.822709] ? kasan_kmalloc+0xc7/0xe0 03:12:30 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000040)="153f6234488dd25d766070") socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup2(r2, r2) sendmsg$netlink(r3, &(0x7f0000028fc8)={0x0, 0x0, &(0x7f0000019000), 0x0, &(0x7f0000000040)=[@rights={0x18, 0x1, 0x1, [r1]}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000000b80)=[{{&(0x7f0000000200)=@l2, 0x80, &(0x7f00000005c0), 0x0, &(0x7f0000000600)=""/84, 0x54}}, {{&(0x7f0000000680)=@l2, 0x80, &(0x7f0000000a40), 0x0, &(0x7f0000000ac0)=""/147, 0x93}}], 0x4000000000000ee, 0x62, 0x0) [ 1038.826645] ? mempool_free+0x370/0x370 [ 1038.830653] mempool_alloc_slab+0x44/0x60 [ 1038.834841] mempool_init_node+0x2d2/0x550 [ 1038.839129] ? mempool_free+0x370/0x370 [ 1038.843143] ? mempool_alloc_slab+0x60/0x60 [ 1038.847491] mempool_init+0x3d/0x50 [ 1038.851160] bioset_init+0x646/0x840 [ 1038.854913] ? bioset_exit+0x370/0x370 [ 1038.858858] blk_alloc_queue_node+0x280/0xe90 [ 1038.863410] ? blk_init_allocated_queue+0x640/0x640 [ 1038.868462] ? __mutex_init+0x1f7/0x290 [ 1038.872508] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1038.878082] ? __blk_mq_alloc_rq_map+0x17d/0x2e0 [ 1038.882901] ? blk_mq_alloc_tag_set+0x50e/0xad0 [ 1038.887622] ? blk_mq_update_nr_hw_queues+0xe50/0xe50 [ 1038.892866] blk_mq_init_queue+0x4b/0xb0 [ 1038.896970] loop_add+0x34c/0xa30 [ 1038.900505] ? loop_queue_rq+0x690/0x690 [ 1038.904618] loop_control_ioctl+0x199/0x530 [ 1038.908989] ? loop_add+0xa30/0xa30 [ 1038.912682] ? arch_local_save_flags+0x40/0x40 [ 1038.917304] ? __mutex_unlock_slowpath+0x197/0x8c0 [ 1038.922293] ? loop_add+0xa30/0xa30 03:12:30 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000040)="153f6234488dd25d766070") socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup2(r2, r2) sendmsg$netlink(r3, &(0x7f0000028fc8)={0x0, 0x0, &(0x7f0000019000), 0x0, &(0x7f0000000040)=[@rights={0x18, 0x1, 0x1, [r1]}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000000b80)=[{{&(0x7f0000000200)=@l2, 0x80, &(0x7f00000005c0), 0x0, &(0x7f0000000600)=""/84, 0x54}}, {{&(0x7f0000000680)=@l2, 0x80, &(0x7f0000000a40), 0x0, &(0x7f0000000ac0)=""/147, 0x93}}], 0x4000000000000b1, 0x62, 0x0) [ 1038.925981] do_vfs_ioctl+0x1de/0x1720 [ 1038.929919] ? ioctl_preallocate+0x300/0x300 [ 1038.934386] ? selinux_file_mprotect+0x620/0x620 [ 1038.939184] ? __sb_end_write+0xd9/0x110 [ 1038.943284] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1038.948863] ? fput+0x130/0x1a0 [ 1038.952178] ? do_syscall_64+0x9a/0x820 [ 1038.956195] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1038.961794] ? security_file_ioctl+0x94/0xc0 [ 1038.966241] ksys_ioctl+0xa9/0xd0 [ 1038.969754] __x64_sys_ioctl+0x73/0xb0 [ 1038.973687] do_syscall_64+0x1b9/0x820 03:12:30 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000040)="153f6234488dd25d766070") socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup2(r2, r2) sendmsg$netlink(r3, &(0x7f0000028fc8)={0x0, 0x0, &(0x7f0000019000), 0x0, &(0x7f0000000040)=[@rights={0x18, 0x1, 0x1, [r1]}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000000b80)=[{{&(0x7f0000000200)=@l2, 0x80, &(0x7f00000005c0), 0x0, &(0x7f0000000600)=""/84, 0x54}}, {{&(0x7f0000000680)=@l2, 0x80, &(0x7f0000000a40), 0x0, &(0x7f0000000ac0)=""/147, 0x93}}], 0x400000000000018, 0x62, 0x0) [ 1038.977603] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 1038.983014] ? syscall_return_slowpath+0x5e0/0x5e0 [ 1038.987989] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1038.992877] ? trace_hardirqs_on_caller+0x310/0x310 [ 1038.998372] ? prepare_exit_to_usermode+0x291/0x3b0 [ 1039.003448] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1039.008352] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1039.013584] RIP: 0033:0x457569 03:12:30 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000040)="153f6234488dd25d766070") socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup2(r2, r2) sendmsg$netlink(r3, &(0x7f0000028fc8)={0x0, 0x0, &(0x7f0000019000), 0x0, &(0x7f0000000040)=[@rights={0x18, 0x1, 0x1, [r1]}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000000b80)=[{{&(0x7f0000000200)=@l2, 0x80, &(0x7f00000005c0), 0x0, &(0x7f0000000600)=""/84, 0x54}}, {{&(0x7f0000000680)=@l2, 0x80, &(0x7f0000000a40), 0x0, &(0x7f0000000ac0)=""/147, 0x93}}], 0x4000000000000db, 0x62, 0x0) [ 1039.016806] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1039.035729] RSP: 002b:00007fe27d20bc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1039.043476] RAX: ffffffffffffffda RBX: 00007fe27d20bc90 RCX: 0000000000457569 [ 1039.050780] RDX: 0000000000000000 RSI: 0000000000004c80 RDI: 0000000000000003 [ 1039.058078] RBP: 000000000072bf00 R08: 0000000000000000 R09: 0000000000000000 [ 1039.065381] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fe27d20c6d4 [ 1039.072677] R13: 00000000004c039f R14: 00000000004d0540 R15: 0000000000000005 03:12:30 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f00000003c0), 0x3f00000000000000, &(0x7f0000000580)={[{@session={'session'}}]}) 03:12:30 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f00000003c0), 0xffffff7f, &(0x7f0000000580)={[{@session={'session'}}]}) 03:12:30 executing program 1 (fault-call:3 fault-nth:17): r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) 03:12:30 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000040)="153f6234488dd25d766070") socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup2(r2, r2) sendmsg$netlink(r3, &(0x7f0000028fc8)={0x0, 0x0, &(0x7f0000019000), 0x0, &(0x7f0000000040)=[@rights={0x18, 0x1, 0x1, [r1]}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000000b80)=[{{&(0x7f0000000200)=@l2, 0x80, &(0x7f00000005c0), 0x0, &(0x7f0000000600)=""/84, 0x54}}, {{&(0x7f0000000680)=@l2, 0x80, &(0x7f0000000a40), 0x0, &(0x7f0000000ac0)=""/147, 0x93}}], 0x400000000000149, 0x62, 0x0) 03:12:30 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f00000003c0), 0x5000000, &(0x7f0000000580)={[{@session={'session'}}]}) 03:12:30 executing program 3: socket$packet(0x11, 0xa, 0x300) syz_emit_ethernet(0x4e, &(0x7f0000000080)={@local, @broadcast, [{}], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x0, 0x0, @local, @local={0xfe, 0x80, [0x300]}, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, &(0x7f00000002c0)) 03:12:30 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e23}, 0x1c) listen(r0, 0x18) r1 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f0000000000)=[@in={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0xc}, [0xfcff]}, @in={0x2, 0x4e23, @local}], 0x20) [ 1039.346354] FAULT_INJECTION: forcing a failure. [ 1039.346354] name failslab, interval 1, probability 0, space 0, times 0 [ 1039.382809] CPU: 0 PID: 27655 Comm: syz-executor1 Not tainted 4.19.0-rc8+ #64 [ 1039.390146] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1039.399531] Call Trace: [ 1039.402171] dump_stack+0x1c4/0x2b4 [ 1039.405870] ? dump_stack_print_info.cold.2+0x52/0x52 [ 1039.411124] should_fail.cold.4+0xa/0x17 [ 1039.415226] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 1039.420382] ? save_stack+0xa9/0xd0 [ 1039.424045] ? graph_lock+0x170/0x170 [ 1039.427885] ? kasan_slab_alloc+0x12/0x20 [ 1039.432077] ? kmem_cache_alloc+0x12e/0x730 [ 1039.436449] ? mempool_alloc_slab+0x44/0x60 [ 1039.440822] ? mempool_init_node+0x2d2/0x550 03:12:30 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f00000003c0), 0x7000000, &(0x7f0000000580)={[{@session={'session'}}]}) [ 1039.445256] ? mempool_init+0x3d/0x50 [ 1039.449081] ? graph_lock+0x170/0x170 [ 1039.452907] ? loop_add+0x34c/0xa30 [ 1039.456604] ? loop_control_ioctl+0x199/0x530 [ 1039.461121] ? do_vfs_ioctl+0x1de/0x1720 [ 1039.465218] ? ksys_ioctl+0xa9/0xd0 [ 1039.468867] ? __x64_sys_ioctl+0x73/0xb0 [ 1039.472966] ? do_syscall_64+0x1b9/0x820 [ 1039.477085] ? find_held_lock+0x36/0x1c0 [ 1039.481186] ? __lock_is_held+0xb5/0x140 [ 1039.485308] ? ___might_sleep+0x1ed/0x300 [ 1039.489491] ? arch_local_save_flags+0x40/0x40 03:12:30 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000040)="153f6234488dd25d766070") socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup2(r2, r2) sendmsg$netlink(r3, &(0x7f0000028fc8)={0x0, 0x0, &(0x7f0000019000), 0x0, &(0x7f0000000040)=[@rights={0x18, 0x1, 0x1, [r1]}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000000b80)=[{{&(0x7f0000000200)=@l2, 0x80, &(0x7f00000005c0), 0x0, &(0x7f0000000600)=""/84, 0x54}}, {{&(0x7f0000000680)=@l2, 0x80, &(0x7f0000000a40), 0x0, &(0x7f0000000ac0)=""/147, 0x93}}], 0x400000000000043, 0x62, 0x0) [ 1039.494139] __should_failslab+0x124/0x180 [ 1039.498419] should_failslab+0x9/0x14 [ 1039.502254] kmem_cache_alloc+0x2be/0x730 [ 1039.506441] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1039.512013] ? __phys_addr+0xa6/0x120 [ 1039.515856] ? mempool_init+0x3d/0x50 [ 1039.519728] ? mempool_free+0x370/0x370 [ 1039.523751] mempool_alloc_slab+0x44/0x60 [ 1039.527926] mempool_init_node+0x2d2/0x550 [ 1039.532222] ? mempool_free+0x370/0x370 [ 1039.536231] ? mempool_alloc_slab+0x60/0x60 [ 1039.540595] mempool_init+0x3d/0x50 03:12:31 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f00000003c0), 0x2c, &(0x7f0000000580)={[{@session={'session'}}]}) [ 1039.544267] bioset_init+0x646/0x840 [ 1039.548032] ? bioset_exit+0x370/0x370 [ 1039.551997] blk_alloc_queue_node+0x280/0xe90 [ 1039.556537] ? blk_init_allocated_queue+0x640/0x640 [ 1039.561597] ? __mutex_init+0x1f7/0x290 [ 1039.565643] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1039.571218] ? __blk_mq_alloc_rq_map+0x17d/0x2e0 [ 1039.576025] ? blk_mq_alloc_tag_set+0x50e/0xad0 [ 1039.580744] ? blk_mq_update_nr_hw_queues+0xe50/0xe50 [ 1039.585990] blk_mq_init_queue+0x4b/0xb0 [ 1039.590104] loop_add+0x34c/0xa30 [ 1039.593599] ? loop_queue_rq+0x690/0x690 [ 1039.597716] loop_control_ioctl+0x199/0x530 [ 1039.602073] ? loop_add+0xa30/0xa30 [ 1039.605750] ? arch_local_save_flags+0x40/0x40 [ 1039.610378] ? __mutex_unlock_slowpath+0x197/0x8c0 [ 1039.615365] ? loop_add+0xa30/0xa30 [ 1039.619051] do_vfs_ioctl+0x1de/0x1720 [ 1039.623013] ? ioctl_preallocate+0x300/0x300 [ 1039.627494] ? selinux_file_mprotect+0x620/0x620 [ 1039.632307] ? __sb_end_write+0xd9/0x110 [ 1039.636415] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1039.642010] ? fput+0x130/0x1a0 03:12:31 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f00000003c0), 0x3f5, &(0x7f0000000580)={[{@session={'session'}}]}) [ 1039.645323] ? do_syscall_64+0x9a/0x820 [ 1039.649341] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1039.654920] ? security_file_ioctl+0x94/0xc0 [ 1039.659431] ksys_ioctl+0xa9/0xd0 [ 1039.662926] __x64_sys_ioctl+0x73/0xb0 [ 1039.666879] do_syscall_64+0x1b9/0x820 [ 1039.670819] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 1039.676215] ? syscall_return_slowpath+0x5e0/0x5e0 [ 1039.681197] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1039.686077] ? trace_hardirqs_on_caller+0x310/0x310 [ 1039.691125] ? prepare_exit_to_usermode+0x3b0/0x3b0 03:12:31 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000040)="153f6234488dd25d766070") socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup2(r2, r2) sendmsg$netlink(r3, &(0x7f0000028fc8)={0x0, 0x0, &(0x7f0000019000), 0x0, &(0x7f0000000040)=[@rights={0x18, 0x1, 0x1, [r1]}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000000b80)=[{{&(0x7f0000000200)=@l2, 0x80, &(0x7f00000005c0), 0x0, &(0x7f0000000600)=""/84, 0x54}}, {{&(0x7f0000000680)=@l2, 0x80, &(0x7f0000000a40), 0x0, &(0x7f0000000ac0)=""/147, 0x93}}], 0x400000000000158, 0x62, 0x0) [ 1039.696177] ? prepare_exit_to_usermode+0x291/0x3b0 [ 1039.701240] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1039.706132] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1039.711348] RIP: 0033:0x457569 [ 1039.714565] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1039.733519] RSP: 002b:00007fe27d20bc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1039.741264] RAX: ffffffffffffffda RBX: 00007fe27d20bc90 RCX: 0000000000457569 03:12:31 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e23}, 0x1c) listen(r0, 0x18) r1 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f0000000000)=[@in={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0xc}, [0x2c01]}, @in={0x2, 0x4e23, @local}], 0x20) [ 1039.748557] RDX: 0000000000000000 RSI: 0000000000004c80 RDI: 0000000000000003 [ 1039.755846] RBP: 000000000072bf00 R08: 0000000000000000 R09: 0000000000000000 [ 1039.763137] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fe27d20c6d4 [ 1039.770432] R13: 00000000004c039f R14: 00000000004d0540 R15: 0000000000000005 03:12:31 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f00000003c0), 0x300000000000000, &(0x7f0000000580)={[{@session={'session'}}]}) 03:12:31 executing program 3: socket$packet(0x11, 0xa, 0x300) syz_emit_ethernet(0x4e, &(0x7f0000000080)={@local, @broadcast, [{}], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x0, 0x0, @local, @local={0xfe, 0x80, [0x2b00]}, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, &(0x7f00000002c0)) 03:12:31 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f00000003c0), 0xffffff8c, &(0x7f0000000580)={[{@session={'session'}}]}) 03:12:31 executing program 1 (fault-call:3 fault-nth:18): r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) 03:12:31 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e23}, 0x1c) listen(r0, 0x18) r1 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f0000000000)=[@in={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0xc}, [0x2]}, @in={0x2, 0x4e23, @local}], 0x20) 03:12:31 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000040)="153f6234488dd25d766070") socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup2(r2, r2) sendmsg$netlink(r3, &(0x7f0000028fc8)={0x0, 0x0, &(0x7f0000019000), 0x0, &(0x7f0000000040)=[@rights={0x18, 0x1, 0x1, [r1]}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000000b80)=[{{&(0x7f0000000200)=@l2, 0x80, &(0x7f00000005c0), 0x0, &(0x7f0000000600)=""/84, 0x54}}, {{&(0x7f0000000680)=@l2, 0x80, &(0x7f0000000a40), 0x0, &(0x7f0000000ac0)=""/147, 0x93}}], 0x40000000000007b, 0x62, 0x0) 03:12:31 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f00000003c0), 0x6000000000000000, &(0x7f0000000580)={[{@session={'session'}}]}) [ 1040.026873] FAULT_INJECTION: forcing a failure. [ 1040.026873] name failslab, interval 1, probability 0, space 0, times 0 [ 1040.086431] CPU: 1 PID: 27701 Comm: syz-executor1 Not tainted 4.19.0-rc8+ #64 [ 1040.093785] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1040.103535] Call Trace: [ 1040.106154] dump_stack+0x1c4/0x2b4 [ 1040.109826] ? dump_stack_print_info.cold.2+0x52/0x52 [ 1040.115056] should_fail.cold.4+0xa/0x17 [ 1040.119143] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 1040.124263] ? debug_smp_processor_id+0x1c/0x20 [ 1040.128953] ? perf_trace_lock_acquire+0x15b/0x800 03:12:31 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e23}, 0x1c) listen(r0, 0x18) r1 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f0000000000)=[@in={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0xc}, [0xe000000000000000]}, @in={0x2, 0x4e23, @local}], 0x20) [ 1040.133902] ? kasan_check_write+0x14/0x20 [ 1040.138177] ? graph_lock+0x170/0x170 [ 1040.142002] ? perf_trace_lock+0x7a0/0x7a0 [ 1040.146256] ? graph_lock+0x170/0x170 [ 1040.150074] ? trace_hardirqs_on+0xbd/0x310 [ 1040.154412] ? kasan_check_read+0x11/0x20 [ 1040.158588] ? __debug_object_init+0x57d/0x1290 [ 1040.163274] ? graph_lock+0x170/0x170 [ 1040.167169] ? find_held_lock+0x36/0x1c0 [ 1040.171258] ? __lock_is_held+0xb5/0x140 [ 1040.175347] ? ___might_sleep+0x1ed/0x300 [ 1040.179538] ? arch_local_save_flags+0x40/0x40 [ 1040.184147] ? _raw_spin_unlock_irqrestore+0x82/0xd0 [ 1040.189257] __should_failslab+0x124/0x180 [ 1040.193501] should_failslab+0x9/0x14 [ 1040.197326] kmem_cache_alloc_trace+0x2d7/0x750 [ 1040.202002] ? kasan_check_write+0x14/0x20 [ 1040.206231] ? do_raw_spin_lock+0xc1/0x200 [ 1040.210461] wb_congested_get_create+0x1d2/0x460 [ 1040.215232] ? wb_wakeup_delayed+0xf0/0xf0 [ 1040.219487] ? __lockdep_init_map+0x105/0x590 [ 1040.223978] wb_init+0x636/0x9e0 [ 1040.227352] ? bdi_put+0x180/0x180 [ 1040.230911] ? kmem_cache_alloc_node_trace+0x14c/0x740 [ 1040.236194] ? __lockdep_init_map+0x105/0x590 [ 1040.240681] ? loop_add+0x34c/0xa30 [ 1040.244308] ? lockdep_init_map+0x9/0x10 [ 1040.248360] ? debug_mutex_init+0x2d/0x60 [ 1040.252531] ? __ia32_sys_membarrier+0x150/0x150 [ 1040.257297] ? __lockdep_init_map+0x105/0x590 [ 1040.261790] ? __init_waitqueue_head+0x9e/0x150 [ 1040.266449] ? init_wait_entry+0x1c0/0x1c0 [ 1040.270686] bdi_init+0x375/0x540 [ 1040.274131] ? wb_init+0x9e0/0x9e0 [ 1040.277666] ? bdi_alloc_node+0x67/0xe0 [ 1040.281644] ? bdi_alloc_node+0x67/0xe0 [ 1040.285630] ? rcu_read_lock_sched_held+0x108/0x120 [ 1040.290662] ? kmem_cache_alloc_node_trace+0x34b/0x740 [ 1040.295963] ? bioset_exit+0x370/0x370 [ 1040.299874] bdi_alloc_node+0x81/0xe0 [ 1040.303666] blk_alloc_queue_node+0x2b0/0xe90 [ 1040.308174] ? blk_init_allocated_queue+0x640/0x640 [ 1040.313197] ? __mutex_init+0x1f7/0x290 [ 1040.317187] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1040.322727] ? __blk_mq_alloc_rq_map+0x17d/0x2e0 [ 1040.327493] ? blk_mq_alloc_tag_set+0x50e/0xad0 [ 1040.332161] ? blk_mq_update_nr_hw_queues+0xe50/0xe50 [ 1040.337364] blk_mq_init_queue+0x4b/0xb0 [ 1040.341465] loop_add+0x34c/0xa30 [ 1040.344941] ? loop_queue_rq+0x690/0x690 [ 1040.349007] loop_control_ioctl+0x199/0x530 [ 1040.353322] ? loop_add+0xa30/0xa30 [ 1040.356991] ? arch_local_save_flags+0x40/0x40 [ 1040.361572] ? __mutex_unlock_slowpath+0x197/0x8c0 [ 1040.366500] ? loop_add+0xa30/0xa30 [ 1040.370120] do_vfs_ioctl+0x1de/0x1720 [ 1040.374010] ? ioctl_preallocate+0x300/0x300 [ 1040.378416] ? selinux_file_mprotect+0x620/0x620 [ 1040.383164] ? __sb_end_write+0xd9/0x110 [ 1040.387231] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1040.392771] ? fput+0x130/0x1a0 [ 1040.396059] ? do_syscall_64+0x9a/0x820 [ 1040.400050] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1040.405593] ? security_file_ioctl+0x94/0xc0 [ 1040.409995] ksys_ioctl+0xa9/0xd0 [ 1040.413443] __x64_sys_ioctl+0x73/0xb0 [ 1040.417333] do_syscall_64+0x1b9/0x820 [ 1040.421218] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 1040.426582] ? syscall_return_slowpath+0x5e0/0x5e0 [ 1040.431501] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1040.436334] ? trace_hardirqs_on_caller+0x310/0x310 [ 1040.441340] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 1040.446367] ? prepare_exit_to_usermode+0x291/0x3b0 [ 1040.451381] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1040.456228] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1040.461426] RIP: 0033:0x457569 [ 1040.464623] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 03:12:31 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000040)="153f6234488dd25d766070") socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup2(r2, r2) sendmsg$netlink(r3, &(0x7f0000028fc8)={0x0, 0x0, &(0x7f0000019000), 0x0, &(0x7f0000000040)=[@rights={0x18, 0x1, 0x1, [r1]}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000000b80)=[{{&(0x7f0000000200)=@l2, 0x80, &(0x7f00000005c0), 0x0, &(0x7f0000000600)=""/84, 0x54}}, {{&(0x7f0000000680)=@l2, 0x80, &(0x7f0000000a40), 0x0, &(0x7f0000000ac0)=""/147, 0x93}}], 0x4000000000000da, 0x62, 0x0) 03:12:31 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f00000003c0), 0xfdfdffff, &(0x7f0000000580)={[{@session={'session'}}]}) [ 1040.483512] RSP: 002b:00007fe27d20bc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1040.491219] RAX: ffffffffffffffda RBX: 00007fe27d20bc90 RCX: 0000000000457569 [ 1040.498497] RDX: 0000000000000000 RSI: 0000000000004c80 RDI: 0000000000000003 [ 1040.505769] RBP: 000000000072bf00 R08: 0000000000000000 R09: 0000000000000000 [ 1040.513041] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fe27d20c6d4 [ 1040.520313] R13: 00000000004c039f R14: 00000000004d0540 R15: 0000000000000005 03:12:32 executing program 3: socket$packet(0x11, 0xa, 0x300) syz_emit_ethernet(0x4e, &(0x7f0000000080)={@local, @broadcast, [{}], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x0, 0x0, @local, @local={0xfe, 0x80, [0x0, 0x34000]}, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, &(0x7f00000002c0)) 03:12:32 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e23}, 0x1c) listen(r0, 0x18) r1 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f0000000000)=[@in={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0xc}, [0x400000000000000]}, @in={0x2, 0x4e23, @local}], 0x20) 03:12:32 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f00000003c0), 0xffff1f00, &(0x7f0000000580)={[{@session={'session'}}]}) 03:12:32 executing program 1 (fault-call:3 fault-nth:19): r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) 03:12:32 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f00000003c0), 0x6b6b6b, &(0x7f0000000580)={[{@session={'session'}}]}) 03:12:32 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000040)="153f6234488dd25d766070") socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup2(r2, r2) sendmsg$netlink(r3, &(0x7f0000028fc8)={0x0, 0x0, &(0x7f0000019000), 0x0, &(0x7f0000000040)=[@rights={0x18, 0x1, 0x1, [r1]}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000000b80)=[{{&(0x7f0000000200)=@l2, 0x80, &(0x7f00000005c0), 0x0, &(0x7f0000000600)=""/84, 0x54}}, {{&(0x7f0000000680)=@l2, 0x80, &(0x7f0000000a40), 0x0, &(0x7f0000000ac0)=""/147, 0x93}}], 0x4000000000000c4, 0x62, 0x0) [ 1040.807581] FAULT_INJECTION: forcing a failure. [ 1040.807581] name failslab, interval 1, probability 0, space 0, times 0 03:12:32 executing program 3: socket$packet(0x11, 0xa, 0x300) syz_emit_ethernet(0x4e, &(0x7f0000000080)={@local, @broadcast, [{}], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x0, 0x0, @local, @local={0xfe, 0x80, [0x0, 0x608]}, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, &(0x7f00000002c0)) [ 1040.853265] CPU: 1 PID: 27732 Comm: syz-executor1 Not tainted 4.19.0-rc8+ #64 [ 1040.860601] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1040.869967] Call Trace: [ 1040.872592] dump_stack+0x1c4/0x2b4 [ 1040.876265] ? dump_stack_print_info.cold.2+0x52/0x52 [ 1040.881509] should_fail.cold.4+0xa/0x17 [ 1040.885602] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 1040.890782] ? lockdep_init_map+0x9/0x10 [ 1040.894867] ? __raw_spin_lock_init+0x2d/0x100 [ 1040.899492] ? graph_lock+0x170/0x170 [ 1040.903319] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1040.908897] ? wb_init+0x6f2/0x9e0 [ 1040.912462] ? graph_lock+0x170/0x170 [ 1040.916293] ? bdi_put+0x180/0x180 [ 1040.919861] ? find_held_lock+0x36/0x1c0 [ 1040.923954] ? __lock_is_held+0xb5/0x140 [ 1040.928048] ? ___might_sleep+0x1ed/0x300 [ 1040.932218] ? arch_local_save_flags+0x40/0x40 [ 1040.936819] ? init_wait_entry+0x1c0/0x1c0 [ 1040.941091] __should_failslab+0x124/0x180 [ 1040.945369] should_failslab+0x9/0x14 [ 1040.949209] kmem_cache_alloc_trace+0x2d7/0x750 03:12:32 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e23}, 0x1c) listen(r0, 0x18) r1 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f0000000000)=[@in={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0xc}, [0xfeffffff]}, @in={0x2, 0x4e23, @local}], 0x20) [ 1040.953908] ? bdi_alloc_node+0x67/0xe0 [ 1040.957982] ? bdi_alloc_node+0x67/0xe0 [ 1040.961989] blk_alloc_queue_stats+0x90/0x1c0 [ 1040.966509] ? blk_stat_enable_accounting+0xe0/0xe0 [ 1040.971546] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1040.977105] blk_alloc_queue_node+0x2f3/0xe90 [ 1040.981635] ? blk_init_allocated_queue+0x640/0x640 [ 1040.986676] ? __mutex_init+0x1f7/0x290 [ 1040.990687] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1040.996260] ? __blk_mq_alloc_rq_map+0x17d/0x2e0 [ 1041.001063] ? blk_mq_alloc_tag_set+0x50e/0xad0 [ 1041.005759] ? blk_mq_update_nr_hw_queues+0xe50/0xe50 [ 1041.010978] blk_mq_init_queue+0x4b/0xb0 [ 1041.015062] loop_add+0x34c/0xa30 [ 1041.018506] ? loop_queue_rq+0x690/0x690 [ 1041.022583] loop_control_ioctl+0x199/0x530 [ 1041.026917] ? loop_add+0xa30/0xa30 [ 1041.030569] ? arch_local_save_flags+0x40/0x40 [ 1041.035186] ? __mutex_unlock_slowpath+0x197/0x8c0 [ 1041.040123] ? loop_add+0xa30/0xa30 [ 1041.043763] do_vfs_ioctl+0x1de/0x1720 [ 1041.047675] ? ioctl_preallocate+0x300/0x300 [ 1041.052094] ? selinux_file_mprotect+0x620/0x620 [ 1041.056844] ? __sb_end_write+0xd9/0x110 [ 1041.060928] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1041.066485] ? fput+0x130/0x1a0 [ 1041.069768] ? do_syscall_64+0x9a/0x820 [ 1041.073765] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1041.079308] ? security_file_ioctl+0x94/0xc0 [ 1041.083750] ksys_ioctl+0xa9/0xd0 [ 1041.087197] __x64_sys_ioctl+0x73/0xb0 [ 1041.091080] do_syscall_64+0x1b9/0x820 [ 1041.094978] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 1041.100348] ? syscall_return_slowpath+0x5e0/0x5e0 [ 1041.105266] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1041.110104] ? trace_hardirqs_on_caller+0x310/0x310 [ 1041.115115] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 1041.120123] ? prepare_exit_to_usermode+0x291/0x3b0 [ 1041.125149] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1041.130022] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1041.135223] RIP: 0033:0x457569 03:12:32 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f00000003c0), 0x2c00, &(0x7f0000000580)={[{@session={'session'}}]}) 03:12:32 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000040)="153f6234488dd25d766070") socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup2(r2, r2) sendmsg$netlink(r3, &(0x7f0000028fc8)={0x0, 0x0, &(0x7f0000019000), 0x0, &(0x7f0000000040)=[@rights={0x18, 0x1, 0x1, [r1]}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000000b80)=[{{&(0x7f0000000200)=@l2, 0x80, &(0x7f00000005c0), 0x0, &(0x7f0000000600)=""/84, 0x54}}, {{&(0x7f0000000680)=@l2, 0x80, &(0x7f0000000a40), 0x0, &(0x7f0000000ac0)=""/147, 0x93}}], 0x4000000000000f9, 0x62, 0x0) [ 1041.138421] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1041.157311] RSP: 002b:00007fe27d20bc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1041.165028] RAX: ffffffffffffffda RBX: 00007fe27d20bc90 RCX: 0000000000457569 [ 1041.172322] RDX: 0000000000000000 RSI: 0000000000004c80 RDI: 0000000000000003 [ 1041.179632] RBP: 000000000072bf00 R08: 0000000000000000 R09: 0000000000000000 [ 1041.186918] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fe27d20c6d4 [ 1041.194184] R13: 00000000004c039f R14: 00000000004d0540 R15: 0000000000000005 03:12:32 executing program 1 (fault-call:3 fault-nth:20): r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) 03:12:32 executing program 3: socket$packet(0x11, 0xa, 0x300) syz_emit_ethernet(0x4e, &(0x7f0000000080)={@local, @broadcast, [{}], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x0, 0x0, @local, @local={0xfe, 0x80, [0x0, 0x100000000000000]}, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, &(0x7f00000002c0)) 03:12:32 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f00000003c0), 0x900, &(0x7f0000000580)={[{@session={'session'}}]}) 03:12:32 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f00000003c0), 0xe0000, &(0x7f0000000580)={[{@session={'session'}}]}) 03:12:32 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e23}, 0x1c) listen(r0, 0x18) r1 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f0000000000)=[@in={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0xc}, [0xfc]}, @in={0x2, 0x4e23, @local}], 0x20) [ 1041.407677] FAULT_INJECTION: forcing a failure. [ 1041.407677] name failslab, interval 1, probability 0, space 0, times 0 [ 1041.423661] CPU: 1 PID: 27758 Comm: syz-executor1 Not tainted 4.19.0-rc8+ #64 [ 1041.430975] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1041.440348] Call Trace: [ 1041.442980] dump_stack+0x1c4/0x2b4 [ 1041.446647] ? dump_stack_print_info.cold.2+0x52/0x52 [ 1041.451905] should_fail.cold.4+0xa/0x17 03:12:32 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f00000003c0), 0x10, &(0x7f0000000580)={[{@session={'session'}}]}) [ 1041.456005] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 1041.461125] ? kasan_check_write+0x14/0x20 [ 1041.465381] ? __mutex_unlock_slowpath+0x197/0x8c0 [ 1041.470360] ? graph_lock+0x170/0x170 [ 1041.474187] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1041.479758] ? graph_lock+0x170/0x170 [ 1041.483587] ? find_held_lock+0x36/0x1c0 [ 1041.487709] ? __lock_is_held+0xb5/0x140 [ 1041.491800] ? ___might_sleep+0x1ed/0x300 [ 1041.495992] ? arch_local_save_flags+0x40/0x40 [ 1041.500604] ? pcpu_balance_workfn+0x16f0/0x16f0 03:12:33 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f00000003c0), 0x7a, &(0x7f0000000580)={[{@session={'session'}}]}) [ 1041.505389] __should_failslab+0x124/0x180 [ 1041.509672] should_failslab+0x9/0x14 [ 1041.513514] kmem_cache_alloc_node_trace+0x270/0x740 [ 1041.518635] ? debug_object_free+0x690/0x690 [ 1041.523061] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1041.528636] ? check_preemption_disabled+0x48/0x200 [ 1041.533675] blkg_alloc+0x124/0x800 [ 1041.537337] ? blkcg_reset_stats+0x3e0/0x3e0 [ 1041.541787] ? lockdep_init_map+0x9/0x10 [ 1041.545864] ? debug_mutex_init+0x2d/0x60 [ 1041.550036] ? __mutex_init+0x1f7/0x290 [ 1041.554024] ? __lockdep_init_map+0x105/0x590 [ 1041.558574] ? kasan_check_write+0x14/0x20 [ 1041.562861] ? percpu_ref_init+0x1fd/0x290 [ 1041.567112] ? blk_delay_queue+0x1a0/0x1a0 [ 1041.571374] ? percpu_ref_noop_confirm_switch+0x10/0x10 [ 1041.576797] blkcg_init_queue+0x27/0x560 [ 1041.580911] blk_alloc_queue_node+0x949/0xe90 [ 1041.585439] ? blk_init_allocated_queue+0x640/0x640 [ 1041.590492] ? __mutex_init+0x1f7/0x290 [ 1041.594540] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1041.600097] ? __blk_mq_alloc_rq_map+0x17d/0x2e0 03:12:33 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f00000003c0), 0x4800000000000000, &(0x7f0000000580)={[{@session={'session'}}]}) [ 1041.604888] ? blk_mq_update_nr_hw_queues+0xe50/0xe50 [ 1041.610106] blk_mq_init_queue+0x4b/0xb0 [ 1041.614186] loop_add+0x34c/0xa30 [ 1041.617666] ? loop_queue_rq+0x690/0x690 [ 1041.621762] loop_control_ioctl+0x199/0x530 [ 1041.626117] ? loop_add+0xa30/0xa30 [ 1041.629766] ? arch_local_save_flags+0x40/0x40 [ 1041.634378] ? __mutex_unlock_slowpath+0x197/0x8c0 [ 1041.639332] ? loop_add+0xa30/0xa30 [ 1041.642985] do_vfs_ioctl+0x1de/0x1720 [ 1041.646921] ? ioctl_preallocate+0x300/0x300 [ 1041.651362] ? selinux_file_mprotect+0x620/0x620 [ 1041.656141] ? __sb_end_write+0xd9/0x110 [ 1041.660229] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1041.665766] ? fput+0x130/0x1a0 [ 1041.669056] ? do_syscall_64+0x9a/0x820 [ 1041.673048] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1041.678618] ? security_file_ioctl+0x94/0xc0 [ 1041.683048] ksys_ioctl+0xa9/0xd0 [ 1041.686526] __x64_sys_ioctl+0x73/0xb0 [ 1041.690432] do_syscall_64+0x1b9/0x820 [ 1041.694355] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 1041.699755] ? syscall_return_slowpath+0x5e0/0x5e0 [ 1041.704728] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1041.709613] ? trace_hardirqs_on_caller+0x310/0x310 [ 1041.714662] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 1041.719699] ? prepare_exit_to_usermode+0x291/0x3b0 [ 1041.724737] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1041.729601] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1041.734802] RIP: 0033:0x457569 [ 1041.737990] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 03:12:33 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000040)="153f6234488dd25d766070") socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup2(r2, r2) sendmsg$netlink(r3, &(0x7f0000028fc8)={0x0, 0x0, &(0x7f0000019000), 0x0, &(0x7f0000000040)=[@rights={0x18, 0x1, 0x1, [r1]}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000000b80)=[{{&(0x7f0000000200)=@l2, 0x80, &(0x7f00000005c0), 0x0, &(0x7f0000000600)=""/84, 0x54}}, {{&(0x7f0000000680)=@l2, 0x80, &(0x7f0000000a40), 0x0, &(0x7f0000000ac0)=""/147, 0x93}}], 0x4000000000000e6, 0x62, 0x0) [ 1041.756890] RSP: 002b:00007fe27d20bc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1041.764596] RAX: ffffffffffffffda RBX: 00007fe27d20bc90 RCX: 0000000000457569 [ 1041.771877] RDX: 0000000000000000 RSI: 0000000000004c80 RDI: 0000000000000003 [ 1041.779132] RBP: 000000000072bf00 R08: 0000000000000000 R09: 0000000000000000 [ 1041.786391] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fe27d20c6d4 [ 1041.793647] R13: 00000000004c039f R14: 00000000004d0540 R15: 0000000000000005 03:12:33 executing program 3: socket$packet(0x11, 0xa, 0x300) syz_emit_ethernet(0x4e, &(0x7f0000000080)={@local, @broadcast, [{}], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x0, 0x0, @local, @local={0xfe, 0x80, [0x0, 0x2b]}, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, &(0x7f00000002c0)) 03:12:33 executing program 1 (fault-call:3 fault-nth:21): r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) 03:12:33 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f00000003c0), 0xf4030000, &(0x7f0000000580)={[{@session={'session'}}]}) 03:12:33 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000040)="153f6234488dd25d766070") socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup2(r2, r2) sendmsg$netlink(r3, &(0x7f0000028fc8)={0x0, 0x0, &(0x7f0000019000), 0x0, &(0x7f0000000040)=[@rights={0x18, 0x1, 0x1, [r1]}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000000b80)=[{{&(0x7f0000000200)=@l2, 0x80, &(0x7f00000005c0), 0x0, &(0x7f0000000600)=""/84, 0x54}}, {{&(0x7f0000000680)=@l2, 0x80, &(0x7f0000000a40), 0x0, &(0x7f0000000ac0)=""/147, 0x93}}], 0x40000000000009e, 0x62, 0x0) [ 1041.994126] FAULT_INJECTION: forcing a failure. [ 1041.994126] name failslab, interval 1, probability 0, space 0, times 0 03:12:33 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f00000003c0), 0x7a00, &(0x7f0000000580)={[{@session={'session'}}]}) [ 1042.047301] CPU: 1 PID: 27789 Comm: syz-executor1 Not tainted 4.19.0-rc8+ #64 [ 1042.054635] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1042.064005] Call Trace: [ 1042.066654] dump_stack+0x1c4/0x2b4 [ 1042.070339] ? dump_stack_print_info.cold.2+0x52/0x52 [ 1042.075595] should_fail.cold.4+0xa/0x17 [ 1042.079720] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 1042.084860] ? kasan_check_write+0x14/0x20 [ 1042.089115] ? __mutex_unlock_slowpath+0x197/0x8c0 03:12:33 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e23}, 0x1c) listen(r0, 0x18) r1 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f0000000000)=[@in={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0xc}, [0x3]}, @in={0x2, 0x4e23, @local}], 0x20) [ 1042.094097] ? graph_lock+0x170/0x170 [ 1042.097921] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1042.103506] ? graph_lock+0x170/0x170 [ 1042.107338] ? find_held_lock+0x36/0x1c0 [ 1042.111438] ? __lock_is_held+0xb5/0x140 [ 1042.115536] ? ___might_sleep+0x1ed/0x300 [ 1042.120165] ? arch_local_save_flags+0x40/0x40 [ 1042.124791] ? pcpu_balance_workfn+0x16f0/0x16f0 [ 1042.129573] __should_failslab+0x124/0x180 [ 1042.133840] should_failslab+0x9/0x14 [ 1042.137662] kmem_cache_alloc_node_trace+0x270/0x740 [ 1042.142787] ? debug_object_free+0x690/0x690 [ 1042.147213] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1042.152771] ? check_preemption_disabled+0x48/0x200 [ 1042.157815] blkg_alloc+0x124/0x800 [ 1042.161491] ? blkcg_reset_stats+0x3e0/0x3e0 [ 1042.165910] ? lockdep_init_map+0x9/0x10 [ 1042.169999] ? debug_mutex_init+0x2d/0x60 [ 1042.174163] ? __mutex_init+0x1f7/0x290 [ 1042.178144] ? __lockdep_init_map+0x105/0x590 [ 1042.182683] ? kasan_check_write+0x14/0x20 [ 1042.186928] ? percpu_ref_init+0x1fd/0x290 [ 1042.191170] ? blk_delay_queue+0x1a0/0x1a0 [ 1042.195411] ? percpu_ref_noop_confirm_switch+0x10/0x10 [ 1042.200825] blkcg_init_queue+0x27/0x560 [ 1042.204881] blk_alloc_queue_node+0x949/0xe90 [ 1042.209398] ? blk_init_allocated_queue+0x640/0x640 [ 1042.214438] ? __mutex_init+0x1f7/0x290 [ 1042.218464] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1042.224054] ? __blk_mq_alloc_rq_map+0x17d/0x2e0 [ 1042.228843] ? blk_mq_update_nr_hw_queues+0xe50/0xe50 [ 1042.234083] blk_mq_init_queue+0x4b/0xb0 [ 1042.238170] loop_add+0x34c/0xa30 [ 1042.241635] ? loop_queue_rq+0x690/0x690 [ 1042.245713] loop_control_ioctl+0x199/0x530 [ 1042.250044] ? loop_add+0xa30/0xa30 [ 1042.253681] ? arch_local_save_flags+0x40/0x40 [ 1042.258259] ? __mutex_unlock_slowpath+0x197/0x8c0 [ 1042.263217] ? loop_add+0xa30/0xa30 [ 1042.266851] do_vfs_ioctl+0x1de/0x1720 [ 1042.270735] ? ioctl_preallocate+0x300/0x300 [ 1042.275141] ? selinux_file_mprotect+0x620/0x620 [ 1042.279925] ? __sb_end_write+0xd9/0x110 [ 1042.283994] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1042.289554] ? fput+0x130/0x1a0 [ 1042.292841] ? do_syscall_64+0x9a/0x820 [ 1042.296826] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1042.302368] ? security_file_ioctl+0x94/0xc0 [ 1042.306783] ksys_ioctl+0xa9/0xd0 [ 1042.310259] __x64_sys_ioctl+0x73/0xb0 [ 1042.314166] do_syscall_64+0x1b9/0x820 [ 1042.318074] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 1042.323444] ? syscall_return_slowpath+0x5e0/0x5e0 [ 1042.328370] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1042.333231] ? trace_hardirqs_on_caller+0x310/0x310 [ 1042.338265] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 1042.343275] ? prepare_exit_to_usermode+0x291/0x3b0 [ 1042.348289] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1042.353146] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1042.358340] RIP: 0033:0x457569 [ 1042.361532] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1042.380437] RSP: 002b:00007fe27d20bc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1042.388152] RAX: ffffffffffffffda RBX: 00007fe27d20bc90 RCX: 0000000000457569 [ 1042.395421] RDX: 0000000000000000 RSI: 0000000000004c80 RDI: 0000000000000003 [ 1042.402679] RBP: 000000000072bf00 R08: 0000000000000000 R09: 0000000000000000 [ 1042.409944] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fe27d20c6d4 [ 1042.417216] R13: 00000000004c039f R14: 00000000004d0540 R15: 0000000000000005 03:12:33 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f00000003c0), 0x2200, &(0x7f0000000580)={[{@session={'session'}}]}) 03:12:33 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000040)="153f6234488dd25d766070") socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup2(r2, r2) sendmsg$netlink(r3, &(0x7f0000028fc8)={0x0, 0x0, &(0x7f0000019000), 0x0, &(0x7f0000000040)=[@rights={0x18, 0x1, 0x1, [r1]}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000000b80)=[{{&(0x7f0000000200)=@l2, 0x80, &(0x7f00000005c0), 0x0, &(0x7f0000000600)=""/84, 0x54}}, {{&(0x7f0000000680)=@l2, 0x80, &(0x7f0000000a40), 0x0, &(0x7f0000000ac0)=""/147, 0x93}}], 0x40000000000001d, 0x62, 0x0) 03:12:33 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f00000003c0), 0x4000, &(0x7f0000000580)={[{@session={'session'}}]}) 03:12:33 executing program 1 (fault-call:3 fault-nth:22): r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) 03:12:33 executing program 3: socket$packet(0x11, 0xa, 0x300) syz_emit_ethernet(0x4e, &(0x7f0000000080)={@local, @broadcast, [{}], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x0, 0x0, @local, @local={0xfe, 0x80, [0x0, 0x806000000000000]}, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, &(0x7f00000002c0)) 03:12:34 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f00000003c0), 0xf6ffffff00000000, &(0x7f0000000580)={[{@session={'session'}}]}) 03:12:34 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000040)="153f6234488dd25d766070") socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup2(r2, r2) sendmsg$netlink(r3, &(0x7f0000028fc8)={0x0, 0x0, &(0x7f0000019000), 0x0, &(0x7f0000000040)=[@rights={0x18, 0x1, 0x1, [r1]}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000000b80)=[{{&(0x7f0000000200)=@l2, 0x80, &(0x7f00000005c0), 0x0, &(0x7f0000000600)=""/84, 0x54}}, {{&(0x7f0000000680)=@l2, 0x80, &(0x7f0000000a40), 0x0, &(0x7f0000000ac0)=""/147, 0x93}}], 0x4000000000000fa, 0x62, 0x0) [ 1042.639398] FAULT_INJECTION: forcing a failure. [ 1042.639398] name failslab, interval 1, probability 0, space 0, times 0 [ 1042.657357] CPU: 1 PID: 27823 Comm: syz-executor1 Not tainted 4.19.0-rc8+ #64 [ 1042.664668] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1042.674036] Call Trace: [ 1042.676682] dump_stack+0x1c4/0x2b4 [ 1042.680343] ? dump_stack_print_info.cold.2+0x52/0x52 [ 1042.685593] should_fail.cold.4+0xa/0x17 [ 1042.689704] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 1042.694855] ? perf_trace_lock_acquire+0x501/0x800 [ 1042.699845] ? graph_lock+0x170/0x170 [ 1042.703682] ? graph_lock+0x170/0x170 [ 1042.707521] ? find_held_lock+0x36/0x1c0 [ 1042.711650] ? __lock_is_held+0xb5/0x140 [ 1042.715749] ? ___might_sleep+0x1ed/0x300 [ 1042.719916] ? arch_local_save_flags+0x40/0x40 [ 1042.724544] ? mark_held_locks+0xc7/0x130 [ 1042.728725] ? _raw_spin_unlock_irq+0x27/0x80 [ 1042.733246] __should_failslab+0x124/0x180 03:12:34 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000040)="153f6234488dd25d766070") socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup2(r2, r2) sendmsg$netlink(r3, &(0x7f0000028fc8)={0x0, 0x0, &(0x7f0000019000), 0x0, &(0x7f0000000040)=[@rights={0x18, 0x1, 0x1, [r1]}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000000b80)=[{{&(0x7f0000000200)=@l2, 0x80, &(0x7f00000005c0), 0x0, &(0x7f0000000600)=""/84, 0x54}}, {{&(0x7f0000000680)=@l2, 0x80, &(0x7f0000000a40), 0x0, &(0x7f0000000ac0)=""/147, 0x93}}], 0x400000000000055, 0x62, 0x0) [ 1042.737539] should_failslab+0x9/0x14 [ 1042.741381] kmem_cache_alloc_node_trace+0x270/0x740 [ 1042.746503] ? __lock_is_held+0xb5/0x140 [ 1042.750595] iolatency_pd_alloc+0x75/0x130 [ 1042.754843] ? blk_queue_bypass_start+0x196/0x2c0 [ 1042.759699] ? iolatency_set_limit+0x620/0x620 [ 1042.764302] blkcg_activate_policy+0xf4/0x580 [ 1042.768846] ? rcu_read_unlock_special.part.39+0x11f0/0x11f0 [ 1042.774682] ? rcu_dynticks_curr_cpu_in_eqs+0x9f/0x160 [ 1042.780006] blk_iolatency_init+0x130/0x2d0 [ 1042.784372] blkcg_init_queue+0x1e3/0x560 [ 1042.788557] blk_alloc_queue_node+0x949/0xe90 [ 1042.793077] ? blk_init_allocated_queue+0x640/0x640 [ 1042.798110] ? __mutex_init+0x1f7/0x290 [ 1042.802143] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1042.807699] ? __blk_mq_alloc_rq_map+0x17d/0x2e0 [ 1042.812498] ? blk_mq_update_nr_hw_queues+0xe50/0xe50 [ 1042.817719] blk_mq_init_queue+0x4b/0xb0 [ 1042.821821] loop_add+0x34c/0xa30 [ 1042.825297] ? loop_queue_rq+0x690/0x690 [ 1042.829387] loop_control_ioctl+0x199/0x530 [ 1042.833726] ? loop_add+0xa30/0xa30 03:12:34 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000040)="153f6234488dd25d766070") socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup2(r2, r2) sendmsg$netlink(r3, &(0x7f0000028fc8)={0x0, 0x0, &(0x7f0000019000), 0x0, &(0x7f0000000040)=[@rights={0x18, 0x1, 0x1, [r1]}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000000b80)=[{{&(0x7f0000000200)=@l2, 0x80, &(0x7f00000005c0), 0x0, &(0x7f0000000600)=""/84, 0x54}}, {{&(0x7f0000000680)=@l2, 0x80, &(0x7f0000000a40), 0x0, &(0x7f0000000ac0)=""/147, 0x93}}], 0x400000000000091, 0x62, 0x0) [ 1042.837402] ? arch_local_save_flags+0x40/0x40 [ 1042.842013] ? __mutex_unlock_slowpath+0x197/0x8c0 [ 1042.846981] ? loop_add+0xa30/0xa30 [ 1042.850633] do_vfs_ioctl+0x1de/0x1720 [ 1042.854548] ? ioctl_preallocate+0x300/0x300 [ 1042.858996] ? selinux_file_mprotect+0x620/0x620 [ 1042.863792] ? __sb_end_write+0xd9/0x110 [ 1042.867880] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1042.873433] ? fput+0x130/0x1a0 [ 1042.876740] ? do_syscall_64+0x9a/0x820 [ 1042.880754] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1042.886343] ? security_file_ioctl+0x94/0xc0 03:12:34 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000040)="153f6234488dd25d766070") socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup2(r2, r2) sendmsg$netlink(r3, &(0x7f0000028fc8)={0x0, 0x0, &(0x7f0000019000), 0x0, &(0x7f0000000040)=[@rights={0x18, 0x1, 0x1, [r1]}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000000b80)=[{{&(0x7f0000000200)=@l2, 0x80, &(0x7f00000005c0), 0x0, &(0x7f0000000600)=""/84, 0x54}}, {{&(0x7f0000000680)=@l2, 0x80, &(0x7f0000000a40), 0x0, &(0x7f0000000ac0)=""/147, 0x93}}], 0x400000000000039, 0x62, 0x0) [ 1042.890780] ksys_ioctl+0xa9/0xd0 [ 1042.894262] __x64_sys_ioctl+0x73/0xb0 [ 1042.898171] do_syscall_64+0x1b9/0x820 [ 1042.902188] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 1042.907583] ? syscall_return_slowpath+0x5e0/0x5e0 [ 1042.912532] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1042.917423] ? trace_hardirqs_on_caller+0x310/0x310 [ 1042.922460] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 1042.927505] ? prepare_exit_to_usermode+0x291/0x3b0 [ 1042.932547] ? trace_hardirqs_off_thunk+0x1a/0x1c 03:12:34 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000040)="153f6234488dd25d766070") socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup2(r2, r2) sendmsg$netlink(r3, &(0x7f0000028fc8)={0x0, 0x0, &(0x7f0000019000), 0x0, &(0x7f0000000040)=[@rights={0x18, 0x1, 0x1, [r1]}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000000b80)=[{{&(0x7f0000000200)=@l2, 0x80, &(0x7f00000005c0), 0x0, &(0x7f0000000600)=""/84, 0x54}}, {{&(0x7f0000000680)=@l2, 0x80, &(0x7f0000000a40), 0x0, &(0x7f0000000ac0)=""/147, 0x93}}], 0x4000000000000a5, 0x62, 0x0) [ 1042.937431] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1042.942636] RIP: 0033:0x457569 [ 1042.945866] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1042.964826] RSP: 002b:00007fe27d20bc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1042.972553] RAX: ffffffffffffffda RBX: 00007fe27d20bc90 RCX: 0000000000457569 [ 1042.979830] RDX: 0000000000000000 RSI: 0000000000004c80 RDI: 0000000000000003 03:12:34 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e23}, 0x1c) listen(r0, 0x18) r1 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f0000000000)=[@in={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0xc}, [0x2c01000000000000]}, @in={0x2, 0x4e23, @local}], 0x20) [ 1042.987112] RBP: 000000000072bf00 R08: 0000000000000000 R09: 0000000000000000 [ 1042.994391] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fe27d20c6d4 [ 1043.001671] R13: 00000000004c039f R14: 00000000004d0540 R15: 0000000000000005 03:12:34 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f00000003c0), 0xedc0, &(0x7f0000000580)={[{@session={'session'}}]}) 03:12:34 executing program 1 (fault-call:3 fault-nth:23): r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) 03:12:34 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000040)="153f6234488dd25d766070") socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup2(r2, r2) sendmsg$netlink(r3, &(0x7f0000028fc8)={0x0, 0x0, &(0x7f0000019000), 0x0, &(0x7f0000000040)=[@rights={0x18, 0x1, 0x1, [r1]}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000000b80)=[{{&(0x7f0000000200)=@l2, 0x80, &(0x7f00000005c0), 0x0, &(0x7f0000000600)=""/84, 0x54}}, {{&(0x7f0000000680)=@l2, 0x80, &(0x7f0000000a40), 0x0, &(0x7f0000000ac0)=""/147, 0x93}}], 0x400000000000142, 0x62, 0x0) 03:12:34 executing program 3: socket$packet(0x11, 0xa, 0x300) syz_emit_ethernet(0x4e, &(0x7f0000000080)={@local, @broadcast, [{}], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x0, 0x0, @local, @local={0xfe, 0x80, [0x0, 0xfffff000]}, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, &(0x7f00000002c0)) 03:12:34 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f00000003c0), 0x900000000000000, &(0x7f0000000580)={[{@session={'session'}}]}) [ 1043.208682] FAULT_INJECTION: forcing a failure. [ 1043.208682] name failslab, interval 1, probability 0, space 0, times 0 [ 1043.220456] CPU: 0 PID: 27855 Comm: syz-executor1 Not tainted 4.19.0-rc8+ #64 [ 1043.227774] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1043.237150] Call Trace: [ 1043.239780] dump_stack+0x1c4/0x2b4 [ 1043.243477] ? dump_stack_print_info.cold.2+0x52/0x52 [ 1043.248731] ? mark_held_locks+0x130/0x130 [ 1043.253047] should_fail.cold.4+0xa/0x17 03:12:34 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e23}, 0x1c) listen(r0, 0x18) r1 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f0000000000)=[@in={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0xc}, [0x23000000]}, @in={0x2, 0x4e23, @local}], 0x20) 03:12:34 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f00000003c0), 0xfdffffff00000000, &(0x7f0000000580)={[{@session={'session'}}]}) [ 1043.257150] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 1043.262373] ? graph_lock+0x170/0x170 [ 1043.266229] ? check_preemption_disabled+0x48/0x200 [ 1043.271273] ? check_preemption_disabled+0x48/0x200 [ 1043.276344] ? lock_acquire+0x1ed/0x520 [ 1043.280375] __should_failslab+0x124/0x180 [ 1043.284684] should_failslab+0x9/0x14 [ 1043.288523] kmem_cache_alloc_node_trace+0x5a/0x740 [ 1043.293571] ? blkcg_activate_policy+0x12c/0x580 [ 1043.298362] ? trace_hardirqs_on+0x310/0x310 [ 1043.302819] iolatency_pd_alloc+0x75/0x130 [ 1043.307099] ? iolatency_set_limit+0x620/0x620 [ 1043.311716] blkcg_activate_policy+0x221/0x580 [ 1043.316353] blk_iolatency_init+0x130/0x2d0 [ 1043.320730] blkcg_init_queue+0x1e3/0x560 [ 1043.324915] blk_alloc_queue_node+0x949/0xe90 [ 1043.329473] ? blk_init_allocated_queue+0x640/0x640 [ 1043.334527] ? __mutex_init+0x1f7/0x290 [ 1043.338591] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1043.344157] ? __blk_mq_alloc_rq_map+0x17d/0x2e0 [ 1043.349012] ? blk_mq_update_nr_hw_queues+0xe50/0xe50 [ 1043.354275] blk_mq_init_queue+0x4b/0xb0 03:12:34 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f00000003c0), 0x2c00000000000000, &(0x7f0000000580)={[{@session={'session'}}]}) [ 1043.358373] loop_add+0x34c/0xa30 [ 1043.361878] ? loop_queue_rq+0x690/0x690 [ 1043.366020] loop_control_ioctl+0x199/0x530 [ 1043.370377] ? loop_add+0xa30/0xa30 [ 1043.374047] ? arch_local_save_flags+0x40/0x40 [ 1043.378668] ? __mutex_unlock_slowpath+0x197/0x8c0 [ 1043.383655] ? loop_add+0xa30/0xa30 [ 1043.387339] do_vfs_ioctl+0x1de/0x1720 [ 1043.391284] ? ioctl_preallocate+0x300/0x300 [ 1043.395747] ? selinux_file_mprotect+0x620/0x620 [ 1043.400542] ? __sb_end_write+0xd9/0x110 [ 1043.404643] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 03:12:34 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f00000003c0), 0x2000000, &(0x7f0000000580)={[{@session={'session'}}]}) [ 1043.410211] ? fput+0x130/0x1a0 [ 1043.413529] ? do_syscall_64+0x9a/0x820 [ 1043.417548] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1043.423112] ? security_file_ioctl+0x94/0xc0 [ 1043.427569] ksys_ioctl+0xa9/0xd0 [ 1043.431064] __x64_sys_ioctl+0x73/0xb0 [ 1043.435012] do_syscall_64+0x1b9/0x820 [ 1043.438946] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 1043.444358] ? syscall_return_slowpath+0x5e0/0x5e0 [ 1043.449319] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1043.454202] ? trace_hardirqs_on_caller+0x310/0x310 03:12:34 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f00000003c0), 0xf703000000000000, &(0x7f0000000580)={[{@session={'session'}}]}) [ 1043.459251] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 1043.464303] ? prepare_exit_to_usermode+0x291/0x3b0 [ 1043.469361] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1043.474262] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1043.479474] RIP: 0033:0x457569 [ 1043.482693] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1043.501618] RSP: 002b:00007fe27d20bc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 03:12:34 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f00000003c0), 0x300000000000000, &(0x7f0000000580)={[{@session={'session'}}]}) 03:12:34 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000040)="153f6234488dd25d766070") socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup2(r2, r2) sendmsg$netlink(r3, &(0x7f0000028fc8)={0x0, 0x0, &(0x7f0000019000), 0x0, &(0x7f0000000040)=[@rights={0x18, 0x1, 0x1, [r1]}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000000b80)=[{{&(0x7f0000000200)=@l2, 0x80, &(0x7f00000005c0), 0x0, &(0x7f0000000600)=""/84, 0x54}}, {{&(0x7f0000000680)=@l2, 0x80, &(0x7f0000000a40), 0x0, &(0x7f0000000ac0)=""/147, 0x93}}], 0x4000000000000b8, 0x62, 0x0) [ 1043.509359] RAX: ffffffffffffffda RBX: 00007fe27d20bc90 RCX: 0000000000457569 [ 1043.516651] RDX: 0000000000000000 RSI: 0000000000004c80 RDI: 0000000000000003 [ 1043.523964] RBP: 000000000072bf00 R08: 0000000000000000 R09: 0000000000000000 [ 1043.531264] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fe27d20c6d4 [ 1043.538554] R13: 00000000004c039f R14: 00000000004d0540 R15: 0000000000000005 03:12:35 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f00000003c0), 0x770c, &(0x7f0000000580)={[{@session={'session'}}]}) 03:12:35 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000040)="153f6234488dd25d766070") socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup2(r2, r2) sendmsg$netlink(r3, &(0x7f0000028fc8)={0x0, 0x0, &(0x7f0000019000), 0x0, &(0x7f0000000040)=[@rights={0x18, 0x1, 0x1, [r1]}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000000b80)=[{{&(0x7f0000000200)=@l2, 0x80, &(0x7f00000005c0), 0x0, &(0x7f0000000600)=""/84, 0x54}}, {{&(0x7f0000000680)=@l2, 0x80, &(0x7f0000000a40), 0x0, &(0x7f0000000ac0)=""/147, 0x93}}], 0x400000000000122, 0x62, 0x0) 03:12:35 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f00000003c0), 0x6800, &(0x7f0000000580)={[{@session={'session'}}]}) 03:12:35 executing program 3: socket$packet(0x11, 0xa, 0x300) syz_emit_ethernet(0x4e, &(0x7f0000000080)={@local, @broadcast, [{}], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x0, 0x0, @local, @local={0xfe, 0x80, [0x0, 0x3c000000]}, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, &(0x7f00000002c0)) 03:12:35 executing program 1 (fault-call:3 fault-nth:24): r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) 03:12:35 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e23}, 0x1c) listen(r0, 0x18) r1 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f0000000000)=[@in={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0xc}, [0x2804]}, @in={0x2, 0x4e23, @local}], 0x20) 03:12:35 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000040)="153f6234488dd25d766070") socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup2(r2, r2) sendmsg$netlink(r3, &(0x7f0000028fc8)={0x0, 0x0, &(0x7f0000019000), 0x0, &(0x7f0000000040)=[@rights={0x18, 0x1, 0x1, [r1]}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000000b80)=[{{&(0x7f0000000200)=@l2, 0x80, &(0x7f00000005c0), 0x0, &(0x7f0000000600)=""/84, 0x54}}, {{&(0x7f0000000680)=@l2, 0x80, &(0x7f0000000a40), 0x0, &(0x7f0000000ac0)=""/147, 0x93}}], 0x40000000000007d, 0x62, 0x0) 03:12:35 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f00000003c0), 0x10000000, &(0x7f0000000580)={[{@session={'session'}}]}) [ 1043.909137] FAULT_INJECTION: forcing a failure. [ 1043.909137] name failslab, interval 1, probability 0, space 0, times 0 [ 1043.935091] CPU: 1 PID: 27905 Comm: syz-executor1 Not tainted 4.19.0-rc8+ #64 [ 1043.942419] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1043.951791] Call Trace: [ 1043.954415] dump_stack+0x1c4/0x2b4 [ 1043.958094] ? dump_stack_print_info.cold.2+0x52/0x52 [ 1043.963326] should_fail.cold.4+0xa/0x17 [ 1043.967420] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 1043.972562] ? debug_smp_processor_id+0x1c/0x20 [ 1043.977253] ? perf_trace_lock_acquire+0x15b/0x800 [ 1043.982204] ? graph_lock+0x170/0x170 [ 1043.986033] ? graph_lock+0x170/0x170 [ 1043.989863] ? find_held_lock+0x36/0x1c0 [ 1043.993974] ? __lock_is_held+0xb5/0x140 [ 1043.998215] ? ___might_sleep+0x1ed/0x300 [ 1044.002386] ? arch_local_save_flags+0x40/0x40 [ 1044.006989] ? mark_held_locks+0xc7/0x130 [ 1044.011161] ? _raw_spin_unlock_irq+0x27/0x80 [ 1044.015705] __should_failslab+0x124/0x180 [ 1044.019972] should_failslab+0x9/0x14 [ 1044.023810] kmem_cache_alloc_node_trace+0x270/0x740 [ 1044.028930] ? __lock_is_held+0xb5/0x140 [ 1044.033048] iolatency_pd_alloc+0x75/0x130 [ 1044.037319] ? blk_queue_bypass_start+0x196/0x2c0 [ 1044.042153] ? iolatency_set_limit+0x620/0x620 [ 1044.046759] blkcg_activate_policy+0xf4/0x580 [ 1044.051282] ? rcu_read_unlock_special.part.39+0x11f0/0x11f0 [ 1044.057088] ? rcu_dynticks_curr_cpu_in_eqs+0x9f/0x160 [ 1044.062359] blk_iolatency_init+0x130/0x2d0 [ 1044.066692] blkcg_init_queue+0x1e3/0x560 [ 1044.070860] blk_alloc_queue_node+0x949/0xe90 [ 1044.075381] ? blk_init_allocated_queue+0x640/0x640 [ 1044.080449] ? __mutex_init+0x1f7/0x290 [ 1044.084527] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1044.090082] ? __blk_mq_alloc_rq_map+0x17d/0x2e0 [ 1044.094873] ? blk_mq_update_nr_hw_queues+0xe50/0xe50 [ 1044.100090] blk_mq_init_queue+0x4b/0xb0 [ 1044.104594] loop_add+0x34c/0xa30 [ 1044.108067] ? loop_queue_rq+0x690/0x690 [ 1044.112154] loop_control_ioctl+0x199/0x530 [ 1044.116492] ? loop_add+0xa30/0xa30 [ 1044.120114] ? arch_local_save_flags+0x40/0x40 [ 1044.124691] ? __mutex_unlock_slowpath+0x197/0x8c0 [ 1044.129645] ? loop_add+0xa30/0xa30 [ 1044.133303] do_vfs_ioctl+0x1de/0x1720 [ 1044.137212] ? ioctl_preallocate+0x300/0x300 [ 1044.141620] ? selinux_file_mprotect+0x620/0x620 [ 1044.146373] ? __sb_end_write+0xd9/0x110 [ 1044.150429] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1044.155976] ? fput+0x130/0x1a0 [ 1044.159288] ? do_syscall_64+0x9a/0x820 [ 1044.163286] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1044.168830] ? security_file_ioctl+0x94/0xc0 [ 1044.173245] ksys_ioctl+0xa9/0xd0 [ 1044.176720] __x64_sys_ioctl+0x73/0xb0 [ 1044.180630] do_syscall_64+0x1b9/0x820 [ 1044.184533] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 1044.189908] ? syscall_return_slowpath+0x5e0/0x5e0 [ 1044.194838] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1044.199690] ? trace_hardirqs_on_caller+0x310/0x310 [ 1044.204727] ? prepare_exit_to_usermode+0x291/0x3b0 [ 1044.209792] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1044.214659] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1044.219866] RIP: 0033:0x457569 [ 1044.223064] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1044.241973] RSP: 002b:00007fe27d1eac78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1044.249681] RAX: ffffffffffffffda RBX: 00007fe27d1eac90 RCX: 0000000000457569 03:12:35 executing program 3: socket$packet(0x11, 0xa, 0x300) syz_emit_ethernet(0x4e, &(0x7f0000000080)={@local, @broadcast, [{}], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x0, 0x0, @local, @local={0xfe, 0x80, [0x0, 0x88a8ffff00000000]}, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, &(0x7f00000002c0)) 03:12:35 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f00000003c0), 0xfffffdfd, &(0x7f0000000580)={[{@session={'session'}}]}) 03:12:35 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000040)="153f6234488dd25d766070") socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup2(r2, r2) sendmsg$netlink(r3, &(0x7f0000028fc8)={0x0, 0x0, &(0x7f0000019000), 0x0, &(0x7f0000000040)=[@rights={0x18, 0x1, 0x1, [r1]}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000000b80)=[{{&(0x7f0000000200)=@l2, 0x80, &(0x7f00000005c0), 0x0, &(0x7f0000000600)=""/84, 0x54}}, {{&(0x7f0000000680)=@l2, 0x80, &(0x7f0000000a40), 0x0, &(0x7f0000000ac0)=""/147, 0x93}}], 0x400000000000094, 0x62, 0x0) 03:12:35 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f00000003c0), 0x200000000000000, &(0x7f0000000580)={[{@session={'session'}}]}) [ 1044.256972] RDX: 0000000000000000 RSI: 0000000000004c80 RDI: 0000000000000003 [ 1044.264243] RBP: 000000000072bfa0 R08: 0000000000000000 R09: 0000000000000000 [ 1044.271504] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fe27d1eb6d4 [ 1044.278774] R13: 00000000004c039f R14: 00000000004d0540 R15: 0000000000000005 03:12:35 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f00000003c0), 0xc0ed0000, &(0x7f0000000580)={[{@session={'session'}}]}) 03:12:35 executing program 1 (fault-call:3 fault-nth:25): r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) 03:12:35 executing program 3: socket$packet(0x11, 0xa, 0x300) syz_emit_ethernet(0x4e, &(0x7f0000000080)={@local, @broadcast, [{}], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x0, 0x0, @local, @local={0xfe, 0x80, [0x0, 0x8848]}, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, &(0x7f00000002c0)) 03:12:35 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000040)="153f6234488dd25d766070") socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup2(r2, r2) sendmsg$netlink(r3, &(0x7f0000028fc8)={0x0, 0x0, &(0x7f0000019000), 0x0, &(0x7f0000000040)=[@rights={0x18, 0x1, 0x1, [r1]}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000000b80)=[{{&(0x7f0000000200)=@l2, 0x80, &(0x7f00000005c0), 0x0, &(0x7f0000000600)=""/84, 0x54}}, {{&(0x7f0000000680)=@l2, 0x80, &(0x7f0000000a40), 0x0, &(0x7f0000000ac0)=""/147, 0x93}}], 0x400000000000104, 0x62, 0x0) 03:12:35 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e23}, 0x1c) listen(r0, 0x18) r1 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f0000000000)=[@in={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0xc}, [0x10]}, @in={0x2, 0x4e23, @local}], 0x20) 03:12:36 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f00000003c0), 0xffffffffffffffff, &(0x7f0000000580)={[{@session={'session'}}]}) 03:12:36 executing program 3: socket$packet(0x11, 0xa, 0x300) syz_emit_ethernet(0x4e, &(0x7f0000000080)={@local, @broadcast, [{}], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x0, 0x0, @local, @local={0xfe, 0x80, [0x0, 0x88470000]}, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, &(0x7f00000002c0)) [ 1044.579721] FAULT_INJECTION: forcing a failure. [ 1044.579721] name failslab, interval 1, probability 0, space 0, times 0 [ 1044.635634] CPU: 1 PID: 27939 Comm: syz-executor1 Not tainted 4.19.0-rc8+ #64 [ 1044.642962] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1044.652334] Call Trace: [ 1044.654980] dump_stack+0x1c4/0x2b4 [ 1044.658670] ? dump_stack_print_info.cold.2+0x52/0x52 [ 1044.663912] should_fail.cold.4+0xa/0x17 [ 1044.668013] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 1044.673144] ? graph_lock+0x170/0x170 [ 1044.676986] ? __debug_object_init+0x57d/0x1290 [ 1044.681674] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1044.687238] ? graph_lock+0x170/0x170 [ 1044.691077] ? debug_smp_processor_id+0x1c/0x20 [ 1044.695775] ? perf_trace_lock_acquire+0x15b/0x800 [ 1044.700720] ? find_held_lock+0x36/0x1c0 [ 1044.704790] ? __lock_is_held+0xb5/0x140 [ 1044.708885] ? ___might_sleep+0x1ed/0x300 [ 1044.713059] ? arch_local_save_flags+0x40/0x40 [ 1044.717678] __should_failslab+0x124/0x180 [ 1044.721926] should_failslab+0x9/0x14 [ 1044.725742] kmem_cache_alloc_node_trace+0x270/0x740 [ 1044.730864] ? _raw_spin_unlock_irq+0x27/0x80 [ 1044.735375] ? _raw_spin_unlock_irq+0x27/0x80 [ 1044.739895] throtl_pd_alloc+0xdd/0x980 [ 1044.743906] ? blk_throtl_dispatch_work_fn+0x4a0/0x4a0 [ 1044.749216] ? __lock_is_held+0xb5/0x140 [ 1044.753308] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1044.758897] ? blk_throtl_dispatch_work_fn+0x4a0/0x4a0 [ 1044.764224] blkcg_activate_policy+0xf4/0x580 [ 1044.768733] blk_throtl_init+0x3d3/0x630 [ 1044.772790] ? blk_throtl_drain+0x810/0x810 [ 1044.777121] ? blk_iolatency_init+0x1d0/0x2d0 [ 1044.781668] blkcg_init_queue+0x205/0x560 [ 1044.785836] blk_alloc_queue_node+0x949/0xe90 [ 1044.790377] ? blk_init_allocated_queue+0x640/0x640 [ 1044.795421] ? __mutex_init+0x1f7/0x290 [ 1044.799511] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1044.805046] ? __blk_mq_alloc_rq_map+0x17d/0x2e0 [ 1044.809845] ? blk_mq_update_nr_hw_queues+0xe50/0xe50 [ 1044.815043] blk_mq_init_queue+0x4b/0xb0 [ 1044.819112] loop_add+0x34c/0xa30 [ 1044.822566] ? loop_queue_rq+0x690/0x690 [ 1044.826647] loop_control_ioctl+0x199/0x530 [ 1044.830990] ? loop_add+0xa30/0xa30 [ 1044.834637] ? arch_local_save_flags+0x40/0x40 [ 1044.839241] ? __mutex_unlock_slowpath+0x197/0x8c0 [ 1044.844195] ? loop_add+0xa30/0xa30 [ 1044.847829] do_vfs_ioctl+0x1de/0x1720 [ 1044.851725] ? ioctl_preallocate+0x300/0x300 [ 1044.856175] ? selinux_file_mprotect+0x620/0x620 [ 1044.860967] ? __sb_end_write+0xd9/0x110 [ 1044.865076] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1044.870620] ? fput+0x130/0x1a0 [ 1044.873917] ? do_syscall_64+0x9a/0x820 [ 1044.877949] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1044.883530] ? security_file_ioctl+0x94/0xc0 [ 1044.887973] ksys_ioctl+0xa9/0xd0 [ 1044.891437] __x64_sys_ioctl+0x73/0xb0 [ 1044.895332] do_syscall_64+0x1b9/0x820 [ 1044.899245] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 1044.904642] ? syscall_return_slowpath+0x5e0/0x5e0 [ 1044.909563] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1044.914408] ? trace_hardirqs_on_caller+0x310/0x310 [ 1044.919453] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 1044.924496] ? prepare_exit_to_usermode+0x291/0x3b0 [ 1044.929541] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1044.934397] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1044.939592] RIP: 0033:0x457569 [ 1044.942800] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1044.961711] RSP: 002b:00007fe27d20bc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1044.969430] RAX: ffffffffffffffda RBX: 00007fe27d20bc90 RCX: 0000000000457569 [ 1044.976708] RDX: 0000000000000000 RSI: 0000000000004c80 RDI: 0000000000000003 03:12:36 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f00000003c0), 0x6b6b6b00000000, &(0x7f0000000580)={[{@session={'session'}}]}) [ 1044.984013] RBP: 000000000072bf00 R08: 0000000000000000 R09: 0000000000000000 [ 1044.991298] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fe27d20c6d4 [ 1044.998581] R13: 00000000004c039f R14: 00000000004d0540 R15: 0000000000000005 03:12:36 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000040)="153f6234488dd25d766070") socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup2(r2, r2) sendmsg$netlink(r3, &(0x7f0000028fc8)={0x0, 0x0, &(0x7f0000019000), 0x0, &(0x7f0000000040)=[@rights={0x18, 0x1, 0x1, [r1]}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000000b80)=[{{&(0x7f0000000200)=@l2, 0x80, &(0x7f00000005c0), 0x0, &(0x7f0000000600)=""/84, 0x54}}, {{&(0x7f0000000680)=@l2, 0x80, &(0x7f0000000a40), 0x0, &(0x7f0000000ac0)=""/147, 0x93}}], 0x40000000000006f, 0x62, 0x0) [ 1045.050923] hfs: invalid session number or type of track [ 1045.058702] hfs: can't find a HFS filesystem on dev loop2 03:12:36 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e23}, 0x1c) listen(r0, 0x18) r1 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f0000000000)=[@in={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0xc}, [0x10000000000000]}, @in={0x2, 0x4e23, @local}], 0x20) 03:12:36 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f00000003c0), 0xedc000000000, &(0x7f0000000580)={[{@session={'session'}}]}) 03:12:36 executing program 3: socket$packet(0x11, 0xa, 0x300) syz_emit_ethernet(0x4e, &(0x7f0000000080)={@local, @broadcast, [{}], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x0, 0x0, @local, @local={0xfe, 0x80, [0x0, 0xffffca88]}, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, &(0x7f00000002c0)) [ 1045.176214] hfs: invalid session number or type of track [ 1045.201199] hfs: can't find a HFS filesystem on dev loop2 03:12:36 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f00000003c0), 0x2000000000000000, &(0x7f0000000580)={[{@session={'session'}}]}) 03:12:36 executing program 1 (fault-call:3 fault-nth:26): r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) 03:12:36 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000040)="153f6234488dd25d766070") socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup2(r2, r2) sendmsg$netlink(r3, &(0x7f0000028fc8)={0x0, 0x0, &(0x7f0000019000), 0x0, &(0x7f0000000040)=[@rights={0x18, 0x1, 0x1, [r1]}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000000b80)=[{{&(0x7f0000000200)=@l2, 0x80, &(0x7f00000005c0), 0x0, &(0x7f0000000600)=""/84, 0x54}}, {{&(0x7f0000000680)=@l2, 0x80, &(0x7f0000000a40), 0x0, &(0x7f0000000ac0)=""/147, 0x93}}], 0x40000000000016e, 0x62, 0x0) 03:12:36 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f00000003c0), 0x4000000000000, &(0x7f0000000580)={[{@session={'session'}}]}) [ 1045.390295] FAULT_INJECTION: forcing a failure. [ 1045.390295] name failslab, interval 1, probability 0, space 0, times 0 [ 1045.401550] CPU: 1 PID: 27983 Comm: syz-executor1 Not tainted 4.19.0-rc8+ #64 [ 1045.408831] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1045.418188] Call Trace: [ 1045.420791] dump_stack+0x1c4/0x2b4 [ 1045.424442] ? dump_stack_print_info.cold.2+0x52/0x52 [ 1045.429742] ? debug_object_free+0x690/0x690 [ 1045.434178] ? __kernel_text_address+0xd/0x40 [ 1045.438701] ? unwind_get_return_address+0x61/0xa0 [ 1045.443660] should_fail.cold.4+0xa/0x17 [ 1045.447771] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 1045.452893] ? graph_lock+0x170/0x170 [ 1045.456736] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1045.462291] ? check_preemption_disabled+0x48/0x200 [ 1045.467324] ? check_preemption_disabled+0x48/0x200 [ 1045.472374] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1045.477916] ? check_preemption_disabled+0x48/0x200 [ 1045.482944] ? debug_smp_processor_id+0x1c/0x20 [ 1045.487638] ? perf_trace_lock_acquire+0x15b/0x800 [ 1045.492560] ? __lockdep_init_map+0x105/0x590 [ 1045.497064] ? perf_trace_lock+0x7a0/0x7a0 [ 1045.501309] ? init_timer_on_stack_key+0xe0/0xe0 [ 1045.506061] ? __lock_is_held+0xb5/0x140 [ 1045.510137] __should_failslab+0x124/0x180 [ 1045.514394] should_failslab+0x9/0x14 [ 1045.518202] kmem_cache_alloc_node_trace+0x5a/0x740 [ 1045.523212] ? lock_acquire+0x1ed/0x520 [ 1045.527191] ? blkcg_activate_policy+0x12c/0x580 [ 1045.531993] throtl_pd_alloc+0xdd/0x980 [ 1045.535977] ? blk_throtl_dispatch_work_fn+0x4a0/0x4a0 [ 1045.541260] ? blkcg_activate_policy+0x12c/0x580 [ 1045.546019] ? trace_hardirqs_on+0x310/0x310 [ 1045.550450] ? kasan_check_write+0x14/0x20 [ 1045.554708] ? do_raw_spin_lock+0xc1/0x200 [ 1045.558973] ? blk_throtl_dispatch_work_fn+0x4a0/0x4a0 [ 1045.564280] blkcg_activate_policy+0x221/0x580 [ 1045.568888] blk_throtl_init+0x3d3/0x630 [ 1045.572980] ? blk_throtl_drain+0x810/0x810 [ 1045.577308] ? blk_iolatency_init+0x1d0/0x2d0 [ 1045.581801] blkcg_init_queue+0x205/0x560 [ 1045.585955] blk_alloc_queue_node+0x949/0xe90 [ 1045.590461] ? blk_init_allocated_queue+0x640/0x640 [ 1045.595497] ? __mutex_init+0x1f7/0x290 [ 1045.599526] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1045.605071] ? __blk_mq_alloc_rq_map+0x17d/0x2e0 [ 1045.609827] ? blk_mq_update_nr_hw_queues+0xe50/0xe50 [ 1045.615022] blk_mq_init_queue+0x4b/0xb0 [ 1045.619095] loop_add+0x34c/0xa30 [ 1045.622559] ? loop_queue_rq+0x690/0x690 [ 1045.626658] loop_control_ioctl+0x199/0x530 [ 1045.630999] ? loop_add+0xa30/0xa30 [ 1045.634637] ? arch_local_save_flags+0x40/0x40 [ 1045.639246] ? __mutex_unlock_slowpath+0x197/0x8c0 [ 1045.644214] ? loop_add+0xa30/0xa30 [ 1045.647885] do_vfs_ioctl+0x1de/0x1720 [ 1045.651798] ? ioctl_preallocate+0x300/0x300 [ 1045.656234] ? selinux_file_mprotect+0x620/0x620 [ 1045.661012] ? __sb_end_write+0xd9/0x110 [ 1045.665083] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1045.670638] ? fput+0x130/0x1a0 [ 1045.673920] ? do_syscall_64+0x9a/0x820 [ 1045.677918] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1045.683493] ? security_file_ioctl+0x94/0xc0 [ 1045.687923] ksys_ioctl+0xa9/0xd0 [ 1045.691425] __x64_sys_ioctl+0x73/0xb0 [ 1045.695323] do_syscall_64+0x1b9/0x820 [ 1045.699202] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 1045.704568] ? syscall_return_slowpath+0x5e0/0x5e0 [ 1045.709524] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1045.714399] ? trace_hardirqs_on_caller+0x310/0x310 [ 1045.719455] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 1045.724489] ? prepare_exit_to_usermode+0x291/0x3b0 [ 1045.729530] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1045.734370] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1045.739567] RIP: 0033:0x457569 [ 1045.742760] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1045.761657] RSP: 002b:00007fe27d20bc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1045.769366] RAX: ffffffffffffffda RBX: 00007fe27d20bc90 RCX: 0000000000457569 [ 1045.776642] RDX: 0000000000000000 RSI: 0000000000004c80 RDI: 0000000000000003 [ 1045.783925] RBP: 000000000072bf00 R08: 0000000000000000 R09: 0000000000000000 03:12:36 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e23}, 0x1c) listen(r0, 0x18) r1 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f0000000000)=[@in={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0xc}, [0x8000000]}, @in={0x2, 0x4e23, @local}], 0x20) 03:12:36 executing program 3: socket$packet(0x11, 0xa, 0x300) syz_emit_ethernet(0x4e, &(0x7f0000000080)={@local, @broadcast, [{}], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x0, 0x0, @local, @local={0xfe, 0x80, [0x0, 0x4]}, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, &(0x7f00000002c0)) 03:12:37 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000040)="153f6234488dd25d766070") socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup2(r2, r2) sendmsg$netlink(r3, &(0x7f0000028fc8)={0x0, 0x0, &(0x7f0000019000), 0x0, &(0x7f0000000040)=[@rights={0x18, 0x1, 0x1, [r1]}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000000b80)=[{{&(0x7f0000000200)=@l2, 0x80, &(0x7f00000005c0), 0x0, &(0x7f0000000600)=""/84, 0x54}}, {{&(0x7f0000000680)=@l2, 0x80, &(0x7f0000000a40), 0x0, &(0x7f0000000ac0)=""/147, 0x93}}], 0x400000000000017, 0x62, 0x0) [ 1045.791235] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fe27d20c6d4 [ 1045.798519] R13: 00000000004c039f R14: 00000000004d0540 R15: 0000000000000005 03:12:37 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f00000003c0), 0x4000000000000000, &(0x7f0000000580)={[{@session={'session'}}]}) 03:12:37 executing program 1 (fault-call:3 fault-nth:27): r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) 03:12:37 executing program 3: socket$packet(0x11, 0xa, 0x300) syz_emit_ethernet(0x4e, &(0x7f0000000080)={@local, @broadcast, [{}], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x0, 0x0, @local, @local={0xfe, 0x80, [0x0, 0xf0ffffffffffff]}, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, &(0x7f00000002c0)) 03:12:37 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000040)="153f6234488dd25d766070") socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup2(r2, r2) sendmsg$netlink(r3, &(0x7f0000028fc8)={0x0, 0x0, &(0x7f0000019000), 0x0, &(0x7f0000000040)=[@rights={0x18, 0x1, 0x1, [r1]}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000000b80)=[{{&(0x7f0000000200)=@l2, 0x80, &(0x7f00000005c0), 0x0, &(0x7f0000000600)=""/84, 0x54}}, {{&(0x7f0000000680)=@l2, 0x80, &(0x7f0000000a40), 0x0, &(0x7f0000000ac0)=""/147, 0x93}}], 0x40000000000002c, 0x62, 0x0) 03:12:37 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f00000003c0), 0x700000000000000, &(0x7f0000000580)={[{@session={'session'}}]}) 03:12:37 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f00000003c0), 0xf603, &(0x7f0000000580)={[{@session={'session'}}]}) 03:12:37 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e23}, 0x1c) listen(r0, 0x18) r1 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f0000000000)=[@in={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0xc}, [0x40000000]}, @in={0x2, 0x4e23, @local}], 0x20) 03:12:37 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000040)="153f6234488dd25d766070") socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup2(r2, r2) sendmsg$netlink(r3, &(0x7f0000028fc8)={0x0, 0x0, &(0x7f0000019000), 0x0, &(0x7f0000000040)=[@rights={0x18, 0x1, 0x1, [r1]}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000000b80)=[{{&(0x7f0000000200)=@l2, 0x80, &(0x7f00000005c0), 0x0, &(0x7f0000000600)=""/84, 0x54}}, {{&(0x7f0000000680)=@l2, 0x80, &(0x7f0000000a40), 0x0, &(0x7f0000000ac0)=""/147, 0x93}}], 0x400000000000057, 0x62, 0x0) [ 1046.138465] FAULT_INJECTION: forcing a failure. [ 1046.138465] name failslab, interval 1, probability 0, space 0, times 0 [ 1046.168823] CPU: 1 PID: 28016 Comm: syz-executor1 Not tainted 4.19.0-rc8+ #64 [ 1046.176140] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1046.185506] Call Trace: [ 1046.188120] dump_stack+0x1c4/0x2b4 [ 1046.191796] ? dump_stack_print_info.cold.2+0x52/0x52 [ 1046.197039] should_fail.cold.4+0xa/0x17 [ 1046.201137] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 1046.206268] ? ksys_ioctl+0xa9/0xd0 [ 1046.209913] ? do_syscall_64+0x1b9/0x820 [ 1046.214004] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1046.219385] ? do_raw_spin_unlock+0xa7/0x2f0 [ 1046.223822] ? graph_lock+0x170/0x170 [ 1046.227663] ? kasan_check_write+0x14/0x20 [ 1046.231916] ? graph_lock+0x170/0x170 [ 1046.235781] ? find_held_lock+0x36/0x1c0 [ 1046.239869] ? __lock_is_held+0xb5/0x140 [ 1046.243977] ? ___might_sleep+0x1ed/0x300 [ 1046.248152] ? arch_local_save_flags+0x40/0x40 [ 1046.252762] ? blkcg_activate_policy+0x3db/0x580 [ 1046.257545] __should_failslab+0x124/0x180 [ 1046.261829] should_failslab+0x9/0x14 [ 1046.265650] kmem_cache_alloc_trace+0x2d7/0x750 [ 1046.270342] ? blk_throtl_init+0x3e7/0x630 [ 1046.274593] ? blk_throtl_drain+0x810/0x810 [ 1046.278932] ? blk_mq_can_queue+0x50/0x50 [ 1046.283117] ? plug_ctx_cmp+0x110/0x110 [ 1046.287118] blk_stat_alloc_callback+0x5b/0x280 [ 1046.291829] blk_mq_init_allocated_queue+0x12c/0x1680 [ 1046.297045] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1046.302602] ? blk_alloc_queue_node+0x95f/0xe90 [ 1046.307296] ? blk_mq_map_swqueue+0xa70/0xa70 [ 1046.311807] ? __mutex_init+0x1f7/0x290 [ 1046.315827] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1046.321386] ? __blk_mq_alloc_rq_map+0x17d/0x2e0 [ 1046.326185] ? blk_mq_update_nr_hw_queues+0xe50/0xe50 [ 1046.331405] blk_mq_init_queue+0x63/0xb0 [ 1046.335499] loop_add+0x34c/0xa30 [ 1046.339001] ? loop_queue_rq+0x690/0x690 [ 1046.343099] loop_control_ioctl+0x199/0x530 [ 1046.347442] ? loop_add+0xa30/0xa30 [ 1046.351105] ? arch_local_save_flags+0x40/0x40 [ 1046.355724] ? __mutex_unlock_slowpath+0x197/0x8c0 [ 1046.360690] ? loop_add+0xa30/0xa30 [ 1046.364363] do_vfs_ioctl+0x1de/0x1720 [ 1046.368301] ? ioctl_preallocate+0x300/0x300 [ 1046.372744] ? selinux_file_mprotect+0x620/0x620 [ 1046.377530] ? __sb_end_write+0xd9/0x110 [ 1046.381616] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1046.387165] ? fput+0x130/0x1a0 [ 1046.390469] ? do_syscall_64+0x9a/0x820 [ 1046.394470] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1046.400041] ? security_file_ioctl+0x94/0xc0 [ 1046.404490] ksys_ioctl+0xa9/0xd0 [ 1046.407976] __x64_sys_ioctl+0x73/0xb0 [ 1046.411881] do_syscall_64+0x1b9/0x820 [ 1046.415791] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 1046.421175] ? syscall_return_slowpath+0x5e0/0x5e0 [ 1046.426127] ? trace_hardirqs_on_caller+0x310/0x310 [ 1046.431166] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 1046.436204] ? recalc_sigpending_tsk+0x180/0x180 [ 1046.440989] ? kasan_check_write+0x14/0x20 [ 1046.445255] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1046.450124] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1046.455337] RIP: 0033:0x457569 [ 1046.458540] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1046.477463] RSP: 002b:00007fe27d1eac78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 03:12:37 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000040)="153f6234488dd25d766070") socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup2(r2, r2) sendmsg$netlink(r3, &(0x7f0000028fc8)={0x0, 0x0, &(0x7f0000019000), 0x0, &(0x7f0000000040)=[@rights={0x18, 0x1, 0x1, [r1]}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000000b80)=[{{&(0x7f0000000200)=@l2, 0x80, &(0x7f00000005c0), 0x0, &(0x7f0000000600)=""/84, 0x54}}, {{&(0x7f0000000680)=@l2, 0x80, &(0x7f0000000a40), 0x0, &(0x7f0000000ac0)=""/147, 0x93}}], 0x40000000000006b, 0x62, 0x0) 03:12:37 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000040)="153f6234488dd25d766070") socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup2(r2, r2) sendmsg$netlink(r3, &(0x7f0000028fc8)={0x0, 0x0, &(0x7f0000019000), 0x0, &(0x7f0000000040)=[@rights={0x18, 0x1, 0x1, [r1]}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000000b80)=[{{&(0x7f0000000200)=@l2, 0x80, &(0x7f00000005c0), 0x0, &(0x7f0000000600)=""/84, 0x54}}, {{&(0x7f0000000680)=@l2, 0x80, &(0x7f0000000a40), 0x0, &(0x7f0000000ac0)=""/147, 0x93}}], 0x400000000000038, 0x62, 0x0) 03:12:37 executing program 3: socket$packet(0x11, 0xa, 0x300) syz_emit_ethernet(0x4e, &(0x7f0000000080)={@local, @broadcast, [{}], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x0, 0x0, @local, @local={0xfe, 0x80, [0x0, 0xf0ffff]}, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, &(0x7f00000002c0)) 03:12:37 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f00000003c0), 0xe, &(0x7f0000000580)={[{@session={'session'}}]}) 03:12:37 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f00000003c0), 0xfffffff6, &(0x7f0000000580)={[{@session={'session'}}]}) [ 1046.485179] RAX: ffffffffffffffda RBX: 00007fe27d1eac90 RCX: 0000000000457569 [ 1046.492466] RDX: 0000000000000000 RSI: 0000000000004c80 RDI: 0000000000000003 [ 1046.499757] RBP: 000000000072bfa0 R08: 0000000000000000 R09: 0000000000000000 [ 1046.507029] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fe27d1eb6d4 [ 1046.514301] R13: 00000000004c039f R14: 00000000004d0540 R15: 0000000000000005 03:12:38 executing program 1 (fault-call:3 fault-nth:28): r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) 03:12:38 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f00000003c0), 0xc77, &(0x7f0000000580)={[{@session={'session'}}]}) 03:12:38 executing program 3: socket$packet(0x11, 0xa, 0x300) syz_emit_ethernet(0x4e, &(0x7f0000000080)={@local, @broadcast, [{}], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x0, 0x0, @local, @local={0xfe, 0x80, [0x0, 0x2b000000]}, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, &(0x7f00000002c0)) 03:12:38 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f00000003c0), 0xffffff7f00000000, &(0x7f0000000580)={[{@session={'session'}}]}) 03:12:38 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000040)="153f6234488dd25d766070") socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup2(r2, r2) sendmsg$netlink(r3, &(0x7f0000028fc8)={0x0, 0x0, &(0x7f0000019000), 0x0, &(0x7f0000000040)=[@rights={0x18, 0x1, 0x1, [r1]}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000000b80)=[{{&(0x7f0000000200)=@l2, 0x80, &(0x7f00000005c0), 0x0, &(0x7f0000000600)=""/84, 0x54}}, {{&(0x7f0000000680)=@l2, 0x80, &(0x7f0000000a40), 0x0, &(0x7f0000000ac0)=""/147, 0x93}}], 0x40000000000002d, 0x62, 0x0) [ 1046.718057] FAULT_INJECTION: forcing a failure. [ 1046.718057] name failslab, interval 1, probability 0, space 0, times 0 [ 1046.761457] CPU: 1 PID: 28058 Comm: syz-executor1 Not tainted 4.19.0-rc8+ #64 [ 1046.768778] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1046.778141] Call Trace: [ 1046.780754] dump_stack+0x1c4/0x2b4 [ 1046.784423] ? dump_stack_print_info.cold.2+0x52/0x52 [ 1046.789659] should_fail.cold.4+0xa/0x17 [ 1046.793750] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 1046.798875] ? ksys_ioctl+0xa9/0xd0 [ 1046.802523] ? do_syscall_64+0x1b9/0x820 [ 1046.806602] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1046.812008] ? do_raw_spin_unlock+0xa7/0x2f0 [ 1046.816437] ? graph_lock+0x170/0x170 [ 1046.820263] ? kasan_check_write+0x14/0x20 [ 1046.824515] ? graph_lock+0x170/0x170 [ 1046.828350] ? find_held_lock+0x36/0x1c0 [ 1046.832434] ? __lock_is_held+0xb5/0x140 [ 1046.836608] ? ___might_sleep+0x1ed/0x300 [ 1046.840775] ? arch_local_save_flags+0x40/0x40 [ 1046.845397] ? blkcg_activate_policy+0x3db/0x580 [ 1046.850182] __should_failslab+0x124/0x180 [ 1046.854440] should_failslab+0x9/0x14 [ 1046.858277] kmem_cache_alloc_trace+0x2d7/0x750 [ 1046.862987] ? blk_throtl_init+0x3e7/0x630 [ 1046.867238] ? blk_throtl_drain+0x810/0x810 [ 1046.871575] ? blk_mq_can_queue+0x50/0x50 [ 1046.875744] ? plug_ctx_cmp+0x110/0x110 [ 1046.879740] blk_stat_alloc_callback+0x5b/0x280 [ 1046.884430] blk_mq_init_allocated_queue+0x12c/0x1680 [ 1046.889641] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1046.895194] ? blk_alloc_queue_node+0x95f/0xe90 [ 1046.899896] ? blk_mq_map_swqueue+0xa70/0xa70 [ 1046.904420] ? __mutex_init+0x1f7/0x290 [ 1046.908453] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1046.914017] ? __blk_mq_alloc_rq_map+0x17d/0x2e0 [ 1046.918837] ? blk_mq_update_nr_hw_queues+0xe50/0xe50 [ 1046.924069] blk_mq_init_queue+0x63/0xb0 [ 1046.928163] loop_add+0x34c/0xa30 [ 1046.931636] ? loop_queue_rq+0x690/0x690 [ 1046.935724] loop_control_ioctl+0x199/0x530 [ 1046.940064] ? loop_add+0xa30/0xa30 [ 1046.943734] ? arch_local_save_flags+0x40/0x40 [ 1046.948340] ? __mutex_unlock_slowpath+0x197/0x8c0 [ 1046.953318] ? loop_add+0xa30/0xa30 [ 1046.957002] do_vfs_ioctl+0x1de/0x1720 [ 1046.960915] ? ioctl_preallocate+0x300/0x300 [ 1046.965363] ? selinux_file_mprotect+0x620/0x620 [ 1046.970144] ? __sb_end_write+0xd9/0x110 [ 1046.974226] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1046.979775] ? fput+0x130/0x1a0 [ 1046.983075] ? do_syscall_64+0x9a/0x820 [ 1046.987073] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1046.992630] ? security_file_ioctl+0x94/0xc0 [ 1046.997063] ksys_ioctl+0xa9/0xd0 [ 1047.000542] __x64_sys_ioctl+0x73/0xb0 [ 1047.004465] do_syscall_64+0x1b9/0x820 [ 1047.008391] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 1047.013779] ? syscall_return_slowpath+0x5e0/0x5e0 [ 1047.018726] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1047.023588] ? trace_hardirqs_on_caller+0x310/0x310 [ 1047.028622] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 1047.033655] ? prepare_exit_to_usermode+0x291/0x3b0 [ 1047.038702] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1047.043570] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1047.048785] RIP: 0033:0x457569 03:12:38 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e23}, 0x1c) listen(r0, 0x18) r1 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f0000000000)=[@in={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0xc}, [0x328]}, @in={0x2, 0x4e23, @local}], 0x20) 03:12:38 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f00000003c0), 0xffffffff00000000, &(0x7f0000000580)={[{@session={'session'}}]}) 03:12:38 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f00000003c0), 0x22000000, &(0x7f0000000580)={[{@session={'session'}}]}) 03:12:38 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f00000003c0), 0xf403, &(0x7f0000000580)={[{@session={'session'}}]}) 03:12:38 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f00000003c0), 0xfcfdffff00000000, &(0x7f0000000580)={[{@session={'session'}}]}) 03:12:38 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f00000003c0), 0x97ffffff00000000, &(0x7f0000000580)={[{@session={'session'}}]}) 03:12:38 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f00000003c0), 0x600000000000000, &(0x7f0000000580)={[{@session={'session'}}]}) [ 1047.052019] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1047.071019] RSP: 002b:00007fe27d20bc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1047.078748] RAX: ffffffffffffffda RBX: 00007fe27d20bc90 RCX: 0000000000457569 [ 1047.086027] RDX: 0000000000000000 RSI: 0000000000004c80 RDI: 0000000000000003 [ 1047.093310] RBP: 000000000072bf00 R08: 0000000000000000 R09: 0000000000000000 [ 1047.100588] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fe27d20c6d4 [ 1047.107868] R13: 00000000004c039f R14: 00000000004d0540 R15: 0000000000000005 03:12:38 executing program 1 (fault-call:3 fault-nth:29): r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) 03:12:38 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f00000003c0), 0x500, &(0x7f0000000580)={[{@session={'session'}}]}) 03:12:38 executing program 3: socket$packet(0x11, 0xa, 0x300) syz_emit_ethernet(0x4e, &(0x7f0000000080)={@local, @broadcast, [{}], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x0, 0x0, @local, @local={0xfe, 0x80, [0x0, 0x6]}, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, &(0x7f00000002c0)) [ 1047.329993] FAULT_INJECTION: forcing a failure. [ 1047.329993] name failslab, interval 1, probability 0, space 0, times 0 [ 1047.341246] CPU: 0 PID: 28105 Comm: syz-executor1 Not tainted 4.19.0-rc8+ #64 [ 1047.348548] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1047.357912] Call Trace: [ 1047.360539] dump_stack+0x1c4/0x2b4 [ 1047.364196] ? dump_stack_print_info.cold.2+0x52/0x52 [ 1047.369410] ? debug_object_free+0x690/0x690 [ 1047.373828] ? __kernel_text_address+0xd/0x40 [ 1047.378332] should_fail.cold.4+0xa/0x17 [ 1047.382396] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 1047.387508] ? perf_tp_event+0xc20/0xc20 [ 1047.391568] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1047.397112] ? check_preemption_disabled+0x48/0x200 [ 1047.402129] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1047.407662] ? check_preemption_disabled+0x48/0x200 [ 1047.412710] ? memset+0x31/0x40 [ 1047.416022] ? perf_trace_lock_acquire+0x501/0x800 [ 1047.420990] ? perf_trace_lock+0x7a0/0x7a0 [ 1047.425250] ? init_timer_on_stack_key+0xe0/0xe0 [ 1047.430029] ? __lock_is_held+0xb5/0x140 [ 1047.434094] __should_failslab+0x124/0x180 [ 1047.438356] should_failslab+0x9/0x14 [ 1047.442167] kmem_cache_alloc_node_trace+0x5a/0x740 [ 1047.447186] ? lock_acquire+0x1ed/0x520 [ 1047.451161] ? blkcg_activate_policy+0x12c/0x580 [ 1047.455921] throtl_pd_alloc+0xdd/0x980 [ 1047.459945] ? blk_throtl_dispatch_work_fn+0x4a0/0x4a0 [ 1047.465225] ? blkcg_activate_policy+0x12c/0x580 [ 1047.469991] ? trace_hardirqs_on+0x310/0x310 [ 1047.474400] ? kasan_check_write+0x14/0x20 [ 1047.478636] ? do_raw_spin_lock+0xc1/0x200 [ 1047.482890] ? blk_throtl_dispatch_work_fn+0x4a0/0x4a0 [ 1047.488179] blkcg_activate_policy+0x221/0x580 [ 1047.492774] blk_throtl_init+0x3d3/0x630 [ 1047.496838] ? blk_throtl_drain+0x810/0x810 [ 1047.501164] ? blk_iolatency_init+0x1d0/0x2d0 [ 1047.505664] blkcg_init_queue+0x205/0x560 [ 1047.509810] blk_alloc_queue_node+0x949/0xe90 [ 1047.514307] ? blk_init_allocated_queue+0x640/0x640 [ 1047.519319] ? __mutex_init+0x1f7/0x290 [ 1047.523317] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1047.528851] ? __blk_mq_alloc_rq_map+0x17d/0x2e0 [ 1047.533633] ? blk_mq_update_nr_hw_queues+0xe50/0xe50 [ 1047.538843] blk_mq_init_queue+0x4b/0xb0 [ 1047.542919] loop_add+0x34c/0xa30 [ 1047.546383] ? loop_queue_rq+0x690/0x690 [ 1047.550454] loop_control_ioctl+0x199/0x530 [ 1047.554816] ? loop_add+0xa30/0xa30 [ 1047.558497] ? arch_local_save_flags+0x40/0x40 [ 1047.563098] ? __mutex_unlock_slowpath+0x197/0x8c0 [ 1047.568075] ? loop_add+0xa30/0xa30 [ 1047.571701] do_vfs_ioctl+0x1de/0x1720 [ 1047.575606] ? ioctl_preallocate+0x300/0x300 [ 1047.580016] ? selinux_file_mprotect+0x620/0x620 [ 1047.584793] ? __sb_end_write+0xd9/0x110 [ 1047.588868] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1047.594422] ? fput+0x130/0x1a0 [ 1047.597699] ? do_syscall_64+0x9a/0x820 [ 1047.601690] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1047.607252] ? security_file_ioctl+0x94/0xc0 [ 1047.611683] ksys_ioctl+0xa9/0xd0 [ 1047.615153] __x64_sys_ioctl+0x73/0xb0 [ 1047.619054] do_syscall_64+0x1b9/0x820 [ 1047.622963] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 1047.628336] ? syscall_return_slowpath+0x5e0/0x5e0 [ 1047.633262] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1047.638109] ? trace_hardirqs_on_caller+0x310/0x310 [ 1047.643134] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 1047.648146] ? prepare_exit_to_usermode+0x291/0x3b0 [ 1047.653167] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1047.658041] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1047.663268] RIP: 0033:0x457569 03:12:39 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f00000003c0), 0x6b6b6b00000000, &(0x7f0000000580)={[{@session={'session'}}]}) 03:12:39 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000040)="153f6234488dd25d766070") socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup2(r2, r2) sendmsg$netlink(r3, &(0x7f0000028fc8)={0x0, 0x0, &(0x7f0000019000), 0x0, &(0x7f0000000040)=[@rights={0x18, 0x1, 0x1, [r1]}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000000b80)=[{{&(0x7f0000000200)=@l2, 0x80, &(0x7f00000005c0), 0x0, &(0x7f0000000600)=""/84, 0x54}}, {{&(0x7f0000000680)=@l2, 0x80, &(0x7f0000000a40), 0x0, &(0x7f0000000ac0)=""/147, 0x93}}], 0x4000000000000e5, 0x62, 0x0) 03:12:39 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e23}, 0x1c) listen(r0, 0x18) r1 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f0000000000)=[@in={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0xc}, [0x1804000000000000]}, @in={0x2, 0x4e23, @local}], 0x20) 03:12:39 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f00000003c0), 0x2200, &(0x7f0000000580)={[{@session={'session'}}]}) [ 1047.666467] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1047.685388] RSP: 002b:00007fe27d20bc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1047.693136] RAX: ffffffffffffffda RBX: 00007fe27d20bc90 RCX: 0000000000457569 [ 1047.700402] RDX: 0000000000000000 RSI: 0000000000004c80 RDI: 0000000000000003 [ 1047.707661] RBP: 000000000072bf00 R08: 0000000000000000 R09: 0000000000000000 [ 1047.714925] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fe27d20c6d4 [ 1047.722199] R13: 00000000004c039f R14: 00000000004d0540 R15: 0000000000000005 03:12:39 executing program 1 (fault-call:3 fault-nth:30): r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) 03:12:39 executing program 3: socket$packet(0x11, 0xa, 0x300) syz_emit_ethernet(0x4e, &(0x7f0000000080)={@local, @broadcast, [{}], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x0, 0x0, @local, @local={0xfe, 0x80, [0x0, 0x5000000]}, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, &(0x7f00000002c0)) 03:12:39 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f00000003c0), 0x5, &(0x7f0000000580)={[{@session={'session'}}]}) 03:12:39 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000040)="153f6234488dd25d766070") socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup2(r2, r2) sendmsg$netlink(r3, &(0x7f0000028fc8)={0x0, 0x0, &(0x7f0000019000), 0x0, &(0x7f0000000040)=[@rights={0x18, 0x1, 0x1, [r1]}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000000b80)=[{{&(0x7f0000000200)=@l2, 0x80, &(0x7f00000005c0), 0x0, &(0x7f0000000600)=""/84, 0x54}}, {{&(0x7f0000000680)=@l2, 0x80, &(0x7f0000000a40), 0x0, &(0x7f0000000ac0)=""/147, 0x93}}], 0x40000000000012a, 0x62, 0x0) 03:12:39 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e23}, 0x1c) listen(r0, 0x18) r1 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f0000000000)=[@in={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0xc}, [0xa00000000000000]}, @in={0x2, 0x4e23, @local}], 0x20) 03:12:39 executing program 3: socket$packet(0x11, 0xa, 0x300) syz_emit_ethernet(0x4e, &(0x7f0000000080)={@local, @broadcast, [{}], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x0, 0x0, @local, @local={0xfe, 0x80, [0x0, 0x86ddffff]}, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, &(0x7f00000002c0)) 03:12:39 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000040)="153f6234488dd25d766070") socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup2(r2, r2) sendmsg$netlink(r3, &(0x7f0000028fc8)={0x0, 0x0, &(0x7f0000019000), 0x0, &(0x7f0000000040)=[@rights={0x18, 0x1, 0x1, [r1]}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000000b80)=[{{&(0x7f0000000200)=@l2, 0x80, &(0x7f00000005c0), 0x0, &(0x7f0000000600)=""/84, 0x54}}, {{&(0x7f0000000680)=@l2, 0x80, &(0x7f0000000a40), 0x0, &(0x7f0000000ac0)=""/147, 0x93}}], 0x40000000000002a, 0x62, 0x0) 03:12:39 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f00000003c0), 0xffff1f0000000000, &(0x7f0000000580)={[{@session={'session'}}]}) 03:12:39 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f00000003c0), 0xfcfdffff, &(0x7f0000000580)={[{@session={'session'}}]}) [ 1048.072619] FAULT_INJECTION: forcing a failure. [ 1048.072619] name failslab, interval 1, probability 0, space 0, times 0 [ 1048.117107] CPU: 1 PID: 28134 Comm: syz-executor1 Not tainted 4.19.0-rc8+ #64 [ 1048.124445] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1048.133790] Call Trace: [ 1048.136405] dump_stack+0x1c4/0x2b4 [ 1048.140072] ? dump_stack_print_info.cold.2+0x52/0x52 [ 1048.145293] should_fail.cold.4+0xa/0x17 [ 1048.149380] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 1048.154503] ? ksys_ioctl+0xa9/0xd0 [ 1048.158169] ? do_syscall_64+0x1b9/0x820 [ 1048.162250] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe 03:12:39 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f00000003c0), 0x3000000, &(0x7f0000000580)={[{@session={'session'}}]}) [ 1048.167634] ? do_raw_spin_unlock+0xa7/0x2f0 [ 1048.172067] ? graph_lock+0x170/0x170 [ 1048.175892] ? graph_lock+0x170/0x170 [ 1048.179735] ? find_held_lock+0x36/0x1c0 [ 1048.183834] ? __lock_is_held+0xb5/0x140 [ 1048.187927] ? ___might_sleep+0x1ed/0x300 [ 1048.192121] ? arch_local_save_flags+0x40/0x40 [ 1048.196731] ? blkcg_activate_policy+0x3db/0x580 [ 1048.201521] __should_failslab+0x124/0x180 [ 1048.205781] should_failslab+0x9/0x14 [ 1048.209602] kmem_cache_alloc_trace+0x2d7/0x750 03:12:39 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f00000003c0), 0x1fffff, &(0x7f0000000580)={[{@session={'session'}}]}) [ 1048.214282] ? blk_throtl_init+0x3e7/0x630 [ 1048.218535] ? blk_throtl_drain+0x810/0x810 [ 1048.222875] ? blk_mq_can_queue+0x50/0x50 [ 1048.227037] ? plug_ctx_cmp+0x110/0x110 [ 1048.231030] blk_stat_alloc_callback+0x5b/0x280 [ 1048.235728] blk_mq_init_allocated_queue+0x12c/0x1680 [ 1048.240950] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1048.246510] ? blk_alloc_queue_node+0x95f/0xe90 [ 1048.251198] ? blk_mq_map_swqueue+0xa70/0xa70 [ 1048.255711] ? __mutex_init+0x1f7/0x290 [ 1048.259737] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 03:12:39 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f00000003c0), 0x3f000000, &(0x7f0000000580)={[{@session={'session'}}]}) [ 1048.265287] ? __blk_mq_alloc_rq_map+0x17d/0x2e0 [ 1048.270076] ? blk_mq_update_nr_hw_queues+0xe50/0xe50 [ 1048.275290] blk_mq_init_queue+0x63/0xb0 [ 1048.279376] loop_add+0x34c/0xa30 [ 1048.282855] ? loop_queue_rq+0x690/0x690 [ 1048.286969] loop_control_ioctl+0x199/0x530 [ 1048.291332] ? loop_add+0xa30/0xa30 [ 1048.295028] ? arch_local_save_flags+0x40/0x40 [ 1048.299642] ? __mutex_unlock_slowpath+0x197/0x8c0 [ 1048.304624] ? loop_add+0xa30/0xa30 [ 1048.308293] do_vfs_ioctl+0x1de/0x1720 [ 1048.312200] ? ioctl_preallocate+0x300/0x300 [ 1048.316634] ? selinux_file_mprotect+0x620/0x620 [ 1048.321411] ? __sb_end_write+0xd9/0x110 [ 1048.325500] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1048.331054] ? fput+0x130/0x1a0 [ 1048.334339] ? do_syscall_64+0x9a/0x820 [ 1048.338320] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1048.343878] ? security_file_ioctl+0x94/0xc0 [ 1048.348308] ksys_ioctl+0xa9/0xd0 [ 1048.351786] __x64_sys_ioctl+0x73/0xb0 [ 1048.355687] do_syscall_64+0x1b9/0x820 [ 1048.359595] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 1048.364959] ? syscall_return_slowpath+0x5e0/0x5e0 [ 1048.369918] ? trace_hardirqs_on_caller+0x310/0x310 [ 1048.374931] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 1048.379969] ? recalc_sigpending_tsk+0x180/0x180 [ 1048.384717] ? kasan_check_write+0x14/0x20 [ 1048.388954] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1048.393797] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1048.398984] RIP: 0033:0x457569 [ 1048.402177] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1048.421067] RSP: 002b:00007fe27d1eac78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1048.428772] RAX: ffffffffffffffda RBX: 00007fe27d1eac90 RCX: 0000000000457569 [ 1048.436052] RDX: 0000000000000000 RSI: 0000000000004c80 RDI: 0000000000000003 [ 1048.443367] RBP: 000000000072bfa0 R08: 0000000000000000 R09: 0000000000000000 [ 1048.450660] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fe27d1eb6d4 [ 1048.457933] R13: 00000000004c039f R14: 00000000004d0540 R15: 0000000000000005 03:12:40 executing program 1 (fault-call:3 fault-nth:31): r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) 03:12:40 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f00000003c0), 0x2000, &(0x7f0000000580)={[{@session={'session'}}]}) 03:12:40 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000040)="153f6234488dd25d766070") socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup2(r2, r2) sendmsg$netlink(r3, &(0x7f0000028fc8)={0x0, 0x0, &(0x7f0000019000), 0x0, &(0x7f0000000040)=[@rights={0x18, 0x1, 0x1, [r1]}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000000b80)=[{{&(0x7f0000000200)=@l2, 0x80, &(0x7f00000005c0), 0x0, &(0x7f0000000600)=""/84, 0x54}}, {{&(0x7f0000000680)=@l2, 0x80, &(0x7f0000000a40), 0x0, &(0x7f0000000ac0)=""/147, 0x93}}], 0x400000000000145, 0x62, 0x0) 03:12:40 executing program 3: socket$packet(0x11, 0xa, 0x300) syz_emit_ethernet(0x4e, &(0x7f0000000080)={@local, @broadcast, [{}], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x0, 0x0, @local, @local={0xfe, 0x80, [0x0, 0xd00]}, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, &(0x7f00000002c0)) [ 1048.755787] FAULT_INJECTION: forcing a failure. [ 1048.755787] name failslab, interval 1, probability 0, space 0, times 0 [ 1048.769538] CPU: 0 PID: 28176 Comm: syz-executor1 Not tainted 4.19.0-rc8+ #64 [ 1048.776847] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1048.786236] Call Trace: [ 1048.788871] dump_stack+0x1c4/0x2b4 [ 1048.792555] ? dump_stack_print_info.cold.2+0x52/0x52 [ 1048.797822] should_fail.cold.4+0xa/0x17 [ 1048.801935] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 1048.807110] ? graph_lock+0x170/0x170 [ 1048.810949] ? save_stack+0x43/0xd0 [ 1048.814608] ? kasan_kmalloc+0xc7/0xe0 [ 1048.818543] ? kmem_cache_alloc_trace+0x152/0x750 [ 1048.823413] ? blk_stat_alloc_callback+0x5b/0x280 [ 1048.828299] ? graph_lock+0x170/0x170 [ 1048.832116] ? loop_control_ioctl+0x199/0x530 [ 1048.836610] ? do_vfs_ioctl+0x1de/0x1720 [ 1048.840666] ? ksys_ioctl+0xa9/0xd0 [ 1048.844305] ? __x64_sys_ioctl+0x73/0xb0 [ 1048.848365] ? do_syscall_64+0x1b9/0x820 [ 1048.852423] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1048.857791] ? find_held_lock+0x36/0x1c0 [ 1048.861854] ? __lock_is_held+0xb5/0x140 [ 1048.865970] ? ___might_sleep+0x1ed/0x300 [ 1048.870141] ? arch_local_save_flags+0x40/0x40 [ 1048.874739] __should_failslab+0x124/0x180 [ 1048.879017] should_failslab+0x9/0x14 [ 1048.882817] __kmalloc+0x2d4/0x760 [ 1048.886354] ? kmem_cache_alloc_trace+0x353/0x750 [ 1048.891196] ? blk_throtl_init+0x3e7/0x630 [ 1048.895432] ? blk_stat_alloc_callback+0x84/0x280 [ 1048.900278] ? blk_mq_can_queue+0x50/0x50 [ 1048.904446] ? plug_ctx_cmp+0x110/0x110 [ 1048.908442] blk_stat_alloc_callback+0x84/0x280 [ 1048.913144] blk_mq_init_allocated_queue+0x12c/0x1680 [ 1048.918346] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1048.923897] ? blk_alloc_queue_node+0x95f/0xe90 [ 1048.928623] ? blk_mq_map_swqueue+0xa70/0xa70 [ 1048.933118] ? __mutex_init+0x1f7/0x290 [ 1048.937116] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1048.942651] ? __blk_mq_alloc_rq_map+0x17d/0x2e0 [ 1048.947433] ? blk_mq_update_nr_hw_queues+0xe50/0xe50 [ 1048.952657] blk_mq_init_queue+0x63/0xb0 [ 1048.956743] loop_add+0x34c/0xa30 [ 1048.960213] ? loop_queue_rq+0x690/0x690 [ 1048.964313] loop_control_ioctl+0x199/0x530 [ 1048.968635] ? loop_add+0xa30/0xa30 [ 1048.972258] ? arch_local_save_flags+0x40/0x40 [ 1048.976863] ? __mutex_unlock_slowpath+0x197/0x8c0 [ 1048.981817] ? loop_add+0xa30/0xa30 [ 1048.985467] do_vfs_ioctl+0x1de/0x1720 [ 1048.989377] ? ioctl_preallocate+0x300/0x300 [ 1048.993813] ? selinux_file_mprotect+0x620/0x620 [ 1048.998573] ? __sb_end_write+0xd9/0x110 [ 1049.002651] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1049.008201] ? fput+0x130/0x1a0 [ 1049.011476] ? do_syscall_64+0x9a/0x820 [ 1049.015455] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1049.021016] ? security_file_ioctl+0x94/0xc0 [ 1049.025438] ksys_ioctl+0xa9/0xd0 [ 1049.028893] __x64_sys_ioctl+0x73/0xb0 [ 1049.032791] do_syscall_64+0x1b9/0x820 [ 1049.036677] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 1049.042039] ? syscall_return_slowpath+0x5e0/0x5e0 [ 1049.046986] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1049.051848] ? trace_hardirqs_on_caller+0x310/0x310 [ 1049.056860] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 1049.061872] ? prepare_exit_to_usermode+0x291/0x3b0 [ 1049.066887] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1049.071751] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1049.076965] RIP: 0033:0x457569 [ 1049.080173] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1049.099094] RSP: 002b:00007fe27d20bc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 03:12:40 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e23}, 0x1c) listen(r0, 0x18) r1 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f0000000000)=[@in={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0xc}, [0x1f4]}, @in={0x2, 0x4e23, @local}], 0x20) 03:12:40 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f00000003c0), 0x6c000000, &(0x7f0000000580)={[{@session={'session'}}]}) 03:12:40 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000040)="153f6234488dd25d766070") socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup2(r2, r2) sendmsg$netlink(r3, &(0x7f0000028fc8)={0x0, 0x0, &(0x7f0000019000), 0x0, &(0x7f0000000040)=[@rights={0x18, 0x1, 0x1, [r1]}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000000b80)=[{{&(0x7f0000000200)=@l2, 0x80, &(0x7f00000005c0), 0x0, &(0x7f0000000600)=""/84, 0x54}}, {{&(0x7f0000000680)=@l2, 0x80, &(0x7f0000000a40), 0x0, &(0x7f0000000ac0)=""/147, 0x93}}], 0x40000000000003b, 0x62, 0x0) [ 1049.106838] RAX: ffffffffffffffda RBX: 00007fe27d20bc90 RCX: 0000000000457569 [ 1049.114115] RDX: 0000000000000000 RSI: 0000000000004c80 RDI: 0000000000000003 [ 1049.121443] RBP: 000000000072bf00 R08: 0000000000000000 R09: 0000000000000000 [ 1049.128744] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fe27d20c6d4 [ 1049.136005] R13: 00000000004c039f R14: 00000000004d0540 R15: 0000000000000005 03:12:40 executing program 3: socket$packet(0x11, 0xa, 0x300) syz_emit_ethernet(0x4e, &(0x7f0000000080)={@local, @broadcast, [{}], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x0, 0x0, @local, @local={0xfe, 0x80, [0x0, 0x40000000]}, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, &(0x7f00000002c0)) 03:12:40 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f00000003c0), 0x20000000, &(0x7f0000000580)={[{@session={'session'}}]}) 03:12:40 executing program 1 (fault-call:3 fault-nth:32): r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) 03:12:40 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000040)="153f6234488dd25d766070") socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup2(r2, r2) sendmsg$netlink(r3, &(0x7f0000028fc8)={0x0, 0x0, &(0x7f0000019000), 0x0, &(0x7f0000000040)=[@rights={0x18, 0x1, 0x1, [r1]}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000000b80)=[{{&(0x7f0000000200)=@l2, 0x80, &(0x7f00000005c0), 0x0, &(0x7f0000000600)=""/84, 0x54}}, {{&(0x7f0000000680)=@l2, 0x80, &(0x7f0000000a40), 0x0, &(0x7f0000000ac0)=""/147, 0x93}}], 0x400000000000118, 0x62, 0x0) 03:12:40 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f00000003c0), 0x6c00, &(0x7f0000000580)={[{@session={'session'}}]}) [ 1049.398881] FAULT_INJECTION: forcing a failure. [ 1049.398881] name failslab, interval 1, probability 0, space 0, times 0 [ 1049.432106] CPU: 1 PID: 28206 Comm: syz-executor1 Not tainted 4.19.0-rc8+ #64 [ 1049.439453] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 03:12:40 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000040)="153f6234488dd25d766070") socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup2(r2, r2) sendmsg$netlink(r3, &(0x7f0000028fc8)={0x0, 0x0, &(0x7f0000019000), 0x0, &(0x7f0000000040)=[@rights={0x18, 0x1, 0x1, [r1]}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000000b80)=[{{&(0x7f0000000200)=@l2, 0x80, &(0x7f00000005c0), 0x0, &(0x7f0000000600)=""/84, 0x54}}, {{&(0x7f0000000680)=@l2, 0x80, &(0x7f0000000a40), 0x0, &(0x7f0000000ac0)=""/147, 0x93}}], 0x400000000000125, 0x62, 0x0) [ 1049.448870] Call Trace: [ 1049.451498] dump_stack+0x1c4/0x2b4 [ 1049.455162] ? dump_stack_print_info.cold.2+0x52/0x52 [ 1049.460411] should_fail.cold.4+0xa/0x17 [ 1049.464534] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 1049.469655] ? kernel_text_address+0x79/0xf0 [ 1049.474097] ? __kernel_text_address+0xd/0x40 [ 1049.478618] ? graph_lock+0x170/0x170 [ 1049.482449] ? __save_stack_trace+0x8d/0xf0 [ 1049.486795] ? graph_lock+0x170/0x170 [ 1049.490628] ? find_held_lock+0x36/0x1c0 [ 1049.494718] ? __lock_is_held+0xb5/0x140 03:12:40 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f00000003c0), 0x4c00000000000000, &(0x7f0000000580)={[{@session={'session'}}]}) [ 1049.498814] ? ___might_sleep+0x1ed/0x300 [ 1049.502988] ? arch_local_save_flags+0x40/0x40 [ 1049.507609] __should_failslab+0x124/0x180 [ 1049.511869] should_failslab+0x9/0x14 [ 1049.515691] kmem_cache_alloc_node_trace+0x270/0x740 [ 1049.520824] ? __kmalloc_node+0x33/0x70 [ 1049.524840] ? __kmalloc_node+0x33/0x70 [ 1049.528840] ? rcu_read_lock_sched_held+0x108/0x120 [ 1049.533883] __kmalloc_node+0x33/0x70 [ 1049.537736] sbitmap_init_node+0x288/0x440 [ 1049.542017] blk_mq_realloc_hw_ctxs+0x777/0x1360 [ 1049.546811] ? blk_mq_free_map_and_requests+0x160/0x160 [ 1049.552201] ? __lock_is_held+0xb5/0x140 [ 1049.556295] ? __kmalloc_node+0x33/0x70 [ 1049.560287] ? __kmalloc_node+0x33/0x70 [ 1049.564289] ? rcu_read_lock_sched_held+0x108/0x120 [ 1049.569328] ? kmem_cache_alloc_node_trace+0x34b/0x740 [ 1049.574621] ? kasan_unpoison_shadow+0x35/0x50 [ 1049.579224] ? kasan_kmalloc+0xc7/0xe0 [ 1049.583159] blk_mq_init_allocated_queue+0x2bb/0x1680 [ 1049.588414] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1049.593979] ? blk_alloc_queue_node+0x95f/0xe90 03:12:41 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f00000003c0), 0x8cffffff00000000, &(0x7f0000000580)={[{@session={'session'}}]}) [ 1049.598668] ? blk_mq_map_swqueue+0xa70/0xa70 [ 1049.603181] ? __mutex_init+0x1f7/0x290 [ 1049.607182] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1049.612590] ? blk_mq_alloc_rq_map+0x115/0x220 [ 1049.617220] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1049.622779] ? __blk_mq_alloc_rq_map+0x17d/0x2e0 [ 1049.627571] ? blk_mq_update_nr_hw_queues+0xe50/0xe50 [ 1049.632788] blk_mq_init_queue+0x63/0xb0 [ 1049.636870] loop_add+0x34c/0xa30 [ 1049.640345] ? loop_queue_rq+0x690/0x690 [ 1049.644467] loop_control_ioctl+0x199/0x530 03:12:41 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000040)="153f6234488dd25d766070") socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup2(r2, r2) sendmsg$netlink(r3, &(0x7f0000028fc8)={0x0, 0x0, &(0x7f0000019000), 0x0, &(0x7f0000000040)=[@rights={0x18, 0x1, 0x1, [r1]}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000000b80)=[{{&(0x7f0000000200)=@l2, 0x80, &(0x7f00000005c0), 0x0, &(0x7f0000000600)=""/84, 0x54}}, {{&(0x7f0000000680)=@l2, 0x80, &(0x7f0000000a40), 0x0, &(0x7f0000000ac0)=""/147, 0x93}}], 0x40000000000004c, 0x62, 0x0) [ 1049.648817] ? loop_add+0xa30/0xa30 [ 1049.652466] ? arch_local_save_flags+0x40/0x40 [ 1049.657089] ? __mutex_unlock_slowpath+0x197/0x8c0 [ 1049.662070] ? loop_add+0xa30/0xa30 [ 1049.665732] do_vfs_ioctl+0x1de/0x1720 [ 1049.669683] ? ioctl_preallocate+0x300/0x300 [ 1049.674121] ? selinux_file_mprotect+0x620/0x620 [ 1049.678906] ? __sb_end_write+0xd9/0x110 [ 1049.683003] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1049.688561] ? fput+0x130/0x1a0 [ 1049.691862] ? do_syscall_64+0x9a/0x820 [ 1049.695860] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1049.701413] ? security_file_ioctl+0x94/0xc0 [ 1049.705858] ksys_ioctl+0xa9/0xd0 [ 1049.709333] __x64_sys_ioctl+0x73/0xb0 [ 1049.713240] do_syscall_64+0x1b9/0x820 [ 1049.717148] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 1049.722530] ? syscall_return_slowpath+0x5e0/0x5e0 [ 1049.727473] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1049.732343] ? trace_hardirqs_on_caller+0x310/0x310 [ 1049.737379] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 1049.742428] ? prepare_exit_to_usermode+0x291/0x3b0 [ 1049.747519] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1049.752391] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1049.757598] RIP: 0033:0x457569 [ 1049.760834] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1049.779755] RSP: 002b:00007fe27d20bc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1049.787472] RAX: ffffffffffffffda RBX: 00007fe27d20bc90 RCX: 0000000000457569 03:12:41 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000040)="153f6234488dd25d766070") socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup2(r2, r2) sendmsg$netlink(r3, &(0x7f0000028fc8)={0x0, 0x0, &(0x7f0000019000), 0x0, &(0x7f0000000040)=[@rights={0x18, 0x1, 0x1, [r1]}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000000b80)=[{{&(0x7f0000000200)=@l2, 0x80, &(0x7f00000005c0), 0x0, &(0x7f0000000600)=""/84, 0x54}}, {{&(0x7f0000000680)=@l2, 0x80, &(0x7f0000000a40), 0x0, &(0x7f0000000ac0)=""/147, 0x93}}], 0x4000000000000d7, 0x62, 0x0) 03:12:41 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f00000003c0), 0x500000000000000, &(0x7f0000000580)={[{@session={'session'}}]}) 03:12:41 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e23}, 0x1c) listen(r0, 0x18) r1 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f0000000000)=[@in={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0xc}, [0xffffffe4]}, @in={0x2, 0x4e23, @local}], 0x20) [ 1049.794747] RDX: 0000000000000000 RSI: 0000000000004c80 RDI: 0000000000000003 [ 1049.802038] RBP: 000000000072bf00 R08: 0000000000000000 R09: 0000000000000000 [ 1049.809295] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fe27d20c6d4 [ 1049.816566] R13: 00000000004c039f R14: 00000000004d0540 R15: 0000000000000005 03:12:41 executing program 3: socket$packet(0x11, 0xa, 0x300) syz_emit_ethernet(0x4e, &(0x7f0000000080)={@local, @broadcast, [{}], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x0, 0x0, @local, @local={0xfe, 0x80, [0x0, 0x60000000]}, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, &(0x7f00000002c0)) [ 1049.862478] hfs: invalid session number or type of track [ 1049.907376] hfs: can't find a HFS filesystem on dev loop2 [ 1049.981425] hfs: invalid session number or type of track [ 1049.995175] hfs: can't find a HFS filesystem on dev loop2 03:12:41 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f00000003c0), 0x7400, &(0x7f0000000580)={[{@session={'session'}}]}) 03:12:41 executing program 1 (fault-call:3 fault-nth:33): r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) 03:12:41 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000040)="153f6234488dd25d766070") socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup2(r2, r2) sendmsg$netlink(r3, &(0x7f0000028fc8)={0x0, 0x0, &(0x7f0000019000), 0x0, &(0x7f0000000040)=[@rights={0x18, 0x1, 0x1, [r1]}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000000b80)=[{{&(0x7f0000000200)=@l2, 0x80, &(0x7f00000005c0), 0x0, &(0x7f0000000600)=""/84, 0x54}}, {{&(0x7f0000000680)=@l2, 0x80, &(0x7f0000000a40), 0x0, &(0x7f0000000ac0)=""/147, 0x93}}], 0x400000000000054, 0x62, 0x0) 03:12:41 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f00000003c0), 0xf603000000000000, &(0x7f0000000580)={[{@session={'session'}}]}) 03:12:41 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e23}, 0x1c) listen(r0, 0x18) r1 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f0000000000)=[@in={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0xc}, [0x2803]}, @in={0x2, 0x4e23, @local}], 0x20) 03:12:41 executing program 3: socket$packet(0x11, 0xa, 0x300) syz_emit_ethernet(0x4e, &(0x7f0000000080)={@local, @broadcast, [{}], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x0, 0x0, @local, @local={0xfe, 0x80, [0x0, 0x6000000000000000]}, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, &(0x7f00000002c0)) [ 1050.170071] FAULT_INJECTION: forcing a failure. [ 1050.170071] name failslab, interval 1, probability 0, space 0, times 0 [ 1050.203003] CPU: 1 PID: 28253 Comm: syz-executor1 Not tainted 4.19.0-rc8+ #64 [ 1050.210307] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1050.219671] Call Trace: [ 1050.222291] dump_stack+0x1c4/0x2b4 [ 1050.225964] ? dump_stack_print_info.cold.2+0x52/0x52 [ 1050.231202] should_fail.cold.4+0xa/0x17 [ 1050.235285] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 1050.240410] ? graph_lock+0x170/0x170 [ 1050.244233] ? kernel_text_address+0x79/0xf0 [ 1050.248656] ? graph_lock+0x170/0x170 [ 1050.252486] ? unwind_get_return_address+0x61/0xa0 [ 1050.257464] ? find_held_lock+0x36/0x1c0 [ 1050.261554] ? __lock_is_held+0xb5/0x140 [ 1050.265644] ? ___might_sleep+0x1ed/0x300 [ 1050.269798] ? arch_local_save_flags+0x40/0x40 [ 1050.274385] ? graph_lock+0x170/0x170 [ 1050.278208] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1050.283762] __should_failslab+0x124/0x180 [ 1050.288037] should_failslab+0x9/0x14 [ 1050.291858] kmem_cache_alloc_node_trace+0x270/0x740 [ 1050.296962] ? __lock_is_held+0xb5/0x140 [ 1050.301051] blk_alloc_flush_queue+0xcd/0x3e0 [ 1050.305577] ? blk_insert_flush+0xb00/0xb00 [ 1050.309914] ? kasan_unpoison_shadow+0x35/0x50 [ 1050.314516] ? kasan_kmalloc+0xc7/0xe0 [ 1050.318476] ? __lockdep_init_map+0x105/0x590 [ 1050.323001] blk_mq_realloc_hw_ctxs+0x9b2/0x1360 [ 1050.327781] ? blk_mq_free_map_and_requests+0x160/0x160 [ 1050.333175] ? __lock_is_held+0xb5/0x140 [ 1050.337263] ? __kmalloc_node+0x33/0x70 [ 1050.341254] ? __kmalloc_node+0x33/0x70 [ 1050.345249] ? rcu_read_lock_sched_held+0x108/0x120 [ 1050.350291] ? kmem_cache_alloc_node_trace+0x34b/0x740 [ 1050.355587] ? kasan_unpoison_shadow+0x35/0x50 [ 1050.360178] ? kasan_kmalloc+0xc7/0xe0 [ 1050.364095] blk_mq_init_allocated_queue+0x2bb/0x1680 [ 1050.369301] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1050.374845] ? blk_alloc_queue_node+0x95f/0xe90 [ 1050.379533] ? blk_mq_map_swqueue+0xa70/0xa70 [ 1050.384032] ? __mutex_init+0x1f7/0x290 [ 1050.388029] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1050.393574] ? __blk_mq_alloc_rq_map+0x17d/0x2e0 [ 1050.398361] ? blk_mq_update_nr_hw_queues+0xe50/0xe50 [ 1050.403589] blk_mq_init_queue+0x63/0xb0 [ 1050.407670] loop_add+0x34c/0xa30 [ 1050.411145] ? loop_queue_rq+0x690/0x690 [ 1050.415243] loop_control_ioctl+0x199/0x530 [ 1050.419566] ? loop_add+0xa30/0xa30 [ 1050.423209] ? arch_local_save_flags+0x40/0x40 [ 1050.427818] ? __mutex_unlock_slowpath+0x197/0x8c0 [ 1050.432772] ? loop_add+0xa30/0xa30 [ 1050.436457] do_vfs_ioctl+0x1de/0x1720 [ 1050.440377] ? ioctl_preallocate+0x300/0x300 [ 1050.444842] ? selinux_file_mprotect+0x620/0x620 [ 1050.449608] ? __sb_end_write+0xd9/0x110 [ 1050.453682] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1050.459249] ? fput+0x130/0x1a0 [ 1050.462533] ? do_syscall_64+0x9a/0x820 [ 1050.466533] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1050.472095] ? security_file_ioctl+0x94/0xc0 [ 1050.476530] ksys_ioctl+0xa9/0xd0 [ 1050.480030] __x64_sys_ioctl+0x73/0xb0 [ 1050.483934] do_syscall_64+0x1b9/0x820 [ 1050.487852] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 1050.493257] ? syscall_return_slowpath+0x5e0/0x5e0 [ 1050.498207] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1050.503077] ? trace_hardirqs_on_caller+0x310/0x310 [ 1050.508109] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 1050.513147] ? prepare_exit_to_usermode+0x291/0x3b0 [ 1050.518295] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1050.523170] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1050.528374] RIP: 0033:0x457569 [ 1050.531584] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1050.550501] RSP: 002b:00007fe27d20bc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1050.558230] RAX: ffffffffffffffda RBX: 00007fe27d20bc90 RCX: 0000000000457569 03:12:42 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000040)="153f6234488dd25d766070") socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup2(r2, r2) sendmsg$netlink(r3, &(0x7f0000028fc8)={0x0, 0x0, &(0x7f0000019000), 0x0, &(0x7f0000000040)=[@rights={0x18, 0x1, 0x1, [r1]}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000000b80)=[{{&(0x7f0000000200)=@l2, 0x80, &(0x7f00000005c0), 0x0, &(0x7f0000000600)=""/84, 0x54}}, {{&(0x7f0000000680)=@l2, 0x80, &(0x7f0000000a40), 0x0, &(0x7f0000000ac0)=""/147, 0x93}}], 0x400000000000136, 0x62, 0x0) [ 1050.565510] RDX: 0000000000000000 RSI: 0000000000004c80 RDI: 0000000000000003 [ 1050.572791] RBP: 000000000072bf00 R08: 0000000000000000 R09: 0000000000000000 [ 1050.580072] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fe27d20c6d4 [ 1050.587354] R13: 00000000004c039f R14: 00000000004d0540 R15: 0000000000000005 03:12:42 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e23}, 0x1c) listen(r0, 0x18) r1 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f0000000000)=[@in={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0xc}, [0xf401000000000000]}, @in={0x2, 0x4e23, @local}], 0x20) 03:12:42 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f00000003c0), 0x3f4, &(0x7f0000000580)={[{@session={'session'}}]}) 03:12:42 executing program 3: socket$packet(0x11, 0xa, 0x300) syz_emit_ethernet(0x4e, &(0x7f0000000080)={@local, @broadcast, [{}], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x0, 0x0, @local, @local={0xfe, 0x80, [0x0, 0x40030000000000]}, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, &(0x7f00000002c0)) 03:12:42 executing program 1 (fault-call:3 fault-nth:34): r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) 03:12:42 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e23}, 0x1c) listen(r0, 0x18) r1 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f0000000000)=[@in={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0xc}, [0x3f000000]}, @in={0x2, 0x4e23, @local}], 0x20) 03:12:42 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f00000003c0), 0x9, &(0x7f0000000580)={[{@session={'session'}}]}) 03:12:42 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000040)="153f6234488dd25d766070") socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup2(r2, r2) sendmsg$netlink(r3, &(0x7f0000028fc8)={0x0, 0x0, &(0x7f0000019000), 0x0, &(0x7f0000000040)=[@rights={0x18, 0x1, 0x1, [r1]}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000000b80)=[{{&(0x7f0000000200)=@l2, 0x80, &(0x7f00000005c0), 0x0, &(0x7f0000000600)=""/84, 0x54}}, {{&(0x7f0000000680)=@l2, 0x80, &(0x7f0000000a40), 0x0, &(0x7f0000000ac0)=""/147, 0x93}}], 0x40000000000005e, 0x62, 0x0) 03:12:42 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f00000003c0), 0x2, &(0x7f0000000580)={[{@session={'session'}}]}) 03:12:42 executing program 3: socket$packet(0x11, 0xa, 0x300) syz_emit_ethernet(0x4e, &(0x7f0000000080)={@local, @broadcast, [{}], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x0, 0x0, @local, @local={0xfe, 0x80, [0x0, 0x3c00]}, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, &(0x7f00000002c0)) [ 1050.855382] FAULT_INJECTION: forcing a failure. [ 1050.855382] name failslab, interval 1, probability 0, space 0, times 0 [ 1050.900221] CPU: 0 PID: 28284 Comm: syz-executor1 Not tainted 4.19.0-rc8+ #64 [ 1050.907578] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1050.916974] Call Trace: [ 1050.919615] dump_stack+0x1c4/0x2b4 [ 1050.923307] ? dump_stack_print_info.cold.2+0x52/0x52 [ 1050.928572] should_fail.cold.4+0xa/0x17 [ 1050.932679] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 1050.937819] ? kernel_text_address+0x79/0xf0 [ 1050.942256] ? __kernel_text_address+0xd/0x40 [ 1050.946799] ? graph_lock+0x170/0x170 [ 1050.950638] ? __save_stack_trace+0x8d/0xf0 [ 1050.955004] ? graph_lock+0x170/0x170 [ 1050.958856] ? find_held_lock+0x36/0x1c0 [ 1050.962965] ? __lock_is_held+0xb5/0x140 [ 1050.967091] ? ___might_sleep+0x1ed/0x300 [ 1050.971288] ? arch_local_save_flags+0x40/0x40 [ 1050.975923] __should_failslab+0x124/0x180 [ 1050.980208] should_failslab+0x9/0x14 [ 1050.984039] kmem_cache_alloc_node_trace+0x270/0x740 [ 1050.989177] ? __kmalloc_node+0x33/0x70 [ 1050.993177] ? __kmalloc_node+0x33/0x70 [ 1050.997667] ? rcu_read_lock_sched_held+0x108/0x120 [ 1051.002723] __kmalloc_node+0x33/0x70 [ 1051.006569] sbitmap_init_node+0x288/0x440 [ 1051.010844] blk_mq_realloc_hw_ctxs+0x777/0x1360 [ 1051.015655] ? blk_mq_free_map_and_requests+0x160/0x160 [ 1051.021052] ? __lock_is_held+0xb5/0x140 [ 1051.025175] ? __kmalloc_node+0x33/0x70 [ 1051.029198] ? __kmalloc_node+0x33/0x70 [ 1051.033217] ? rcu_read_lock_sched_held+0x108/0x120 [ 1051.038276] ? kmem_cache_alloc_node_trace+0x34b/0x740 [ 1051.043597] ? kasan_unpoison_shadow+0x35/0x50 03:12:42 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000040)="153f6234488dd25d766070") socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup2(r2, r2) sendmsg$netlink(r3, &(0x7f0000028fc8)={0x0, 0x0, &(0x7f0000019000), 0x0, &(0x7f0000000040)=[@rights={0x18, 0x1, 0x1, [r1]}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000000b80)=[{{&(0x7f0000000200)=@l2, 0x80, &(0x7f00000005c0), 0x0, &(0x7f0000000600)=""/84, 0x54}}, {{&(0x7f0000000680)=@l2, 0x80, &(0x7f0000000a40), 0x0, &(0x7f0000000ac0)=""/147, 0x93}}], 0x4000000000000c8, 0x62, 0x0) 03:12:42 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f00000003c0), 0x2200000000000000, &(0x7f0000000580)={[{@session={'session'}}]}) [ 1051.048229] ? kasan_kmalloc+0xc7/0xe0 [ 1051.052169] blk_mq_init_allocated_queue+0x2bb/0x1680 [ 1051.057392] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1051.062969] ? blk_alloc_queue_node+0x95f/0xe90 [ 1051.067688] ? blk_mq_map_swqueue+0xa70/0xa70 [ 1051.072219] ? __mutex_init+0x1f7/0x290 [ 1051.076274] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1051.081855] ? __blk_mq_alloc_rq_map+0x17d/0x2e0 [ 1051.086687] ? blk_mq_update_nr_hw_queues+0xe50/0xe50 [ 1051.091920] blk_mq_init_queue+0x63/0xb0 [ 1051.096070] loop_add+0x34c/0xa30 03:12:42 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000040)="153f6234488dd25d766070") socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup2(r2, r2) sendmsg$netlink(r3, &(0x7f0000028fc8)={0x0, 0x0, &(0x7f0000019000), 0x0, &(0x7f0000000040)=[@rights={0x18, 0x1, 0x1, [r1]}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000000b80)=[{{&(0x7f0000000200)=@l2, 0x80, &(0x7f00000005c0), 0x0, &(0x7f0000000600)=""/84, 0x54}}, {{&(0x7f0000000680)=@l2, 0x80, &(0x7f0000000a40), 0x0, &(0x7f0000000ac0)=""/147, 0x93}}], 0x40000000000014c, 0x62, 0x0) [ 1051.099558] ? loop_queue_rq+0x690/0x690 [ 1051.103676] loop_control_ioctl+0x199/0x530 [ 1051.108037] ? loop_add+0xa30/0xa30 [ 1051.111697] ? arch_local_save_flags+0x40/0x40 [ 1051.116346] ? __mutex_unlock_slowpath+0x197/0x8c0 [ 1051.121345] ? loop_add+0xa30/0xa30 [ 1051.125007] do_vfs_ioctl+0x1de/0x1720 [ 1051.128959] ? ioctl_preallocate+0x300/0x300 [ 1051.133423] ? selinux_file_mprotect+0x620/0x620 [ 1051.138237] ? __sb_end_write+0xd9/0x110 [ 1051.142343] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1051.147910] ? fput+0x130/0x1a0 03:12:42 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f00000003c0), 0xffffff7f, &(0x7f0000000580)={[{@session={'session'}}]}) [ 1051.151239] ? do_syscall_64+0x9a/0x820 [ 1051.155271] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1051.160838] ? security_file_ioctl+0x94/0xc0 [ 1051.165301] ksys_ioctl+0xa9/0xd0 [ 1051.168829] __x64_sys_ioctl+0x73/0xb0 [ 1051.172781] do_syscall_64+0x1b9/0x820 [ 1051.176719] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 1051.182109] ? syscall_return_slowpath+0x5e0/0x5e0 [ 1051.187062] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1051.191949] ? trace_hardirqs_on_caller+0x310/0x310 [ 1051.197013] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 1051.202078] ? prepare_exit_to_usermode+0x291/0x3b0 [ 1051.207133] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1051.212033] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1051.217254] RIP: 0033:0x457569 [ 1051.220472] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1051.239409] RSP: 002b:00007fe27d20bc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 03:12:42 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f00000003c0), 0x770c, &(0x7f0000000580)={[{@session={'session'}}]}) 03:12:42 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e23}, 0x1c) listen(r0, 0x18) r1 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f0000000000)=[@in={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0xc}, [0xe000000]}, @in={0x2, 0x4e23, @local}], 0x20) [ 1051.247162] RAX: ffffffffffffffda RBX: 00007fe27d20bc90 RCX: 0000000000457569 [ 1051.254462] RDX: 0000000000000000 RSI: 0000000000004c80 RDI: 0000000000000003 [ 1051.261801] RBP: 000000000072bf00 R08: 0000000000000000 R09: 0000000000000000 [ 1051.269105] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fe27d20c6d4 [ 1051.276394] R13: 00000000004c039f R14: 00000000004d0540 R15: 0000000000000005 03:12:42 executing program 1 (fault-call:3 fault-nth:35): r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) 03:12:42 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000040)="153f6234488dd25d766070") socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup2(r2, r2) sendmsg$netlink(r3, &(0x7f0000028fc8)={0x0, 0x0, &(0x7f0000019000), 0x0, &(0x7f0000000040)=[@rights={0x18, 0x1, 0x1, [r1]}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000000b80)=[{{&(0x7f0000000200)=@l2, 0x80, &(0x7f00000005c0), 0x0, &(0x7f0000000600)=""/84, 0x54}}, {{&(0x7f0000000680)=@l2, 0x80, &(0x7f0000000a40), 0x0, &(0x7f0000000ac0)=""/147, 0x93}}], 0x400000000000014, 0x62, 0x0) [ 1051.435382] hfs: invalid session number or type of track [ 1051.451693] hfs: can't find a HFS filesystem on dev loop2 [ 1051.480338] FAULT_INJECTION: forcing a failure. [ 1051.480338] name failslab, interval 1, probability 0, space 0, times 0 [ 1051.509654] CPU: 1 PID: 28324 Comm: syz-executor1 Not tainted 4.19.0-rc8+ #64 [ 1051.516977] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1051.526332] Call Trace: [ 1051.528930] dump_stack+0x1c4/0x2b4 [ 1051.532604] ? dump_stack_print_info.cold.2+0x52/0x52 [ 1051.537831] should_fail.cold.4+0xa/0x17 [ 1051.541911] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 1051.547048] ? graph_lock+0x170/0x170 [ 1051.550864] ? save_stack+0xa9/0xd0 [ 1051.554497] ? graph_lock+0x170/0x170 [ 1051.558316] ? kmem_cache_alloc_node_trace+0x14c/0x740 [ 1051.563584] ? blk_alloc_flush_queue+0xcd/0x3e0 [ 1051.568248] ? blk_mq_realloc_hw_ctxs+0x9b2/0x1360 [ 1051.573169] ? blk_mq_init_allocated_queue+0x2bb/0x1680 [ 1051.578524] ? blk_mq_init_queue+0x63/0xb0 [ 1051.582752] ? loop_add+0x34c/0xa30 [ 1051.586369] ? do_vfs_ioctl+0x1de/0x1720 [ 1051.590425] ? find_held_lock+0x36/0x1c0 [ 1051.594485] ? __lock_is_held+0xb5/0x140 [ 1051.598551] ? ___might_sleep+0x1ed/0x300 [ 1051.602693] ? arch_local_save_flags+0x40/0x40 [ 1051.607283] __should_failslab+0x124/0x180 [ 1051.611514] should_failslab+0x9/0x14 [ 1051.615325] kmem_cache_alloc_node_trace+0x270/0x740 [ 1051.620434] ? rcu_read_lock_sched_held+0x108/0x120 [ 1051.625441] ? kmem_cache_alloc_node_trace+0x34b/0x740 [ 1051.630723] __kmalloc_node+0x33/0x70 [ 1051.634532] blk_alloc_flush_queue+0x180/0x3e0 [ 1051.639121] ? blk_insert_flush+0xb00/0xb00 [ 1051.643454] ? kasan_unpoison_shadow+0x35/0x50 [ 1051.648028] ? kasan_kmalloc+0xc7/0xe0 [ 1051.651922] ? __lockdep_init_map+0x105/0x590 [ 1051.656449] blk_mq_realloc_hw_ctxs+0x9b2/0x1360 [ 1051.661204] ? blk_mq_free_map_and_requests+0x160/0x160 [ 1051.666560] ? __lock_is_held+0xb5/0x140 [ 1051.670637] ? __kmalloc_node+0x33/0x70 [ 1051.674613] ? __kmalloc_node+0x33/0x70 [ 1051.678594] ? rcu_read_lock_sched_held+0x108/0x120 [ 1051.683599] ? kmem_cache_alloc_node_trace+0x34b/0x740 [ 1051.688881] ? kasan_unpoison_shadow+0x35/0x50 [ 1051.693493] ? kasan_kmalloc+0xc7/0xe0 [ 1051.697399] blk_mq_init_allocated_queue+0x2bb/0x1680 [ 1051.702584] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1051.708112] ? blk_alloc_queue_node+0x95f/0xe90 [ 1051.712777] ? blk_mq_map_swqueue+0xa70/0xa70 [ 1051.717267] ? __mutex_init+0x1f7/0x290 [ 1051.721262] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1051.726802] ? __blk_mq_alloc_rq_map+0x17d/0x2e0 [ 1051.731592] ? blk_mq_update_nr_hw_queues+0xe50/0xe50 [ 1051.736797] blk_mq_init_queue+0x63/0xb0 [ 1051.740866] loop_add+0x34c/0xa30 [ 1051.744311] ? loop_queue_rq+0x690/0x690 [ 1051.748369] loop_control_ioctl+0x199/0x530 [ 1051.752684] ? loop_add+0xa30/0xa30 [ 1051.756303] ? arch_local_save_flags+0x40/0x40 [ 1051.760881] ? __mutex_unlock_slowpath+0x197/0x8c0 [ 1051.765806] ? loop_add+0xa30/0xa30 [ 1051.769434] do_vfs_ioctl+0x1de/0x1720 [ 1051.773336] ? ioctl_preallocate+0x300/0x300 [ 1051.777754] ? selinux_file_mprotect+0x620/0x620 [ 1051.782534] ? __sb_end_write+0xd9/0x110 [ 1051.786606] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1051.792135] ? fput+0x130/0x1a0 [ 1051.795435] ? do_syscall_64+0x9a/0x820 [ 1051.799412] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1051.804949] ? security_file_ioctl+0x94/0xc0 [ 1051.809362] ksys_ioctl+0xa9/0xd0 [ 1051.812809] __x64_sys_ioctl+0x73/0xb0 [ 1051.816693] do_syscall_64+0x1b9/0x820 [ 1051.820581] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 1051.825954] ? syscall_return_slowpath+0x5e0/0x5e0 [ 1051.830894] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1051.835743] ? trace_hardirqs_on_caller+0x310/0x310 [ 1051.840778] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 1051.845788] ? prepare_exit_to_usermode+0x291/0x3b0 [ 1051.850800] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1051.855640] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1051.860834] RIP: 0033:0x457569 [ 1051.864029] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1051.882919] RSP: 002b:00007fe27d20bc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1051.890628] RAX: ffffffffffffffda RBX: 00007fe27d20bc90 RCX: 0000000000457569 [ 1051.897885] RDX: 0000000000000000 RSI: 0000000000004c80 RDI: 0000000000000003 [ 1051.905140] RBP: 000000000072bf00 R08: 0000000000000000 R09: 0000000000000000 [ 1051.912394] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fe27d20c6d4 [ 1051.919662] R13: 00000000004c039f R14: 00000000004d0540 R15: 0000000000000005 [ 1051.973047] hfs: invalid session number or type of track [ 1051.980373] hfs: can't find a HFS filesystem on dev loop2 03:12:43 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f00000003c0), 0x6c, &(0x7f0000000580)={[{@session={'session'}}]}) 03:12:43 executing program 3: socket$packet(0x11, 0xa, 0x300) syz_emit_ethernet(0x4e, &(0x7f0000000080)={@local, @broadcast, [{}], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x0, 0x0, @local, @local={0xfe, 0x80, [0x0, 0x6488]}, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, &(0x7f00000002c0)) 03:12:43 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f00000003c0), 0xfffffdfc, &(0x7f0000000580)={[{@session={'session'}}]}) 03:12:43 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e23}, 0x1c) listen(r0, 0x18) r1 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f0000000000)=[@in={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0xc}, [0x600]}, @in={0x2, 0x4e23, @local}], 0x20) 03:12:43 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000040)="153f6234488dd25d766070") socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup2(r2, r2) sendmsg$netlink(r3, &(0x7f0000028fc8)={0x0, 0x0, &(0x7f0000019000), 0x0, &(0x7f0000000040)=[@rights={0x18, 0x1, 0x1, [r1]}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000000b80)=[{{&(0x7f0000000200)=@l2, 0x80, &(0x7f00000005c0), 0x0, &(0x7f0000000600)=""/84, 0x54}}, {{&(0x7f0000000680)=@l2, 0x80, &(0x7f0000000a40), 0x0, &(0x7f0000000ac0)=""/147, 0x93}}], 0x400000000000135, 0x62, 0x0) 03:12:43 executing program 1 (fault-call:3 fault-nth:36): r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) [ 1052.102447] FAULT_INJECTION: forcing a failure. [ 1052.102447] name failslab, interval 1, probability 0, space 0, times 0 [ 1052.119301] CPU: 1 PID: 28343 Comm: syz-executor1 Not tainted 4.19.0-rc8+ #64 [ 1052.126624] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1052.135996] Call Trace: [ 1052.136053] dump_stack+0x1c4/0x2b4 [ 1052.136081] ? dump_stack_print_info.cold.2+0x52/0x52 [ 1052.136121] should_fail.cold.4+0xa/0x17 [ 1052.151602] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 1052.156742] ? graph_lock+0x170/0x170 [ 1052.160566] ? __mutex_lock+0x85e/0x1700 [ 1052.164656] ? graph_lock+0x170/0x170 [ 1052.168490] ? debug_smp_processor_id+0x1c/0x20 [ 1052.173185] ? find_held_lock+0x36/0x1c0 [ 1052.177270] ? __lock_is_held+0xb5/0x140 [ 1052.181371] ? ___might_sleep+0x1ed/0x300 [ 1052.185549] ? arch_local_save_flags+0x40/0x40 [ 1052.190149] ? graph_lock+0x170/0x170 [ 1052.194011] __should_failslab+0x124/0x180 [ 1052.198275] should_failslab+0x9/0x14 03:12:43 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f00000003c0), 0x68000000, &(0x7f0000000580)={[{@session={'session'}}]}) 03:12:43 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e23}, 0x1c) listen(r0, 0x18) r1 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f0000000000)=[@in={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0xc}, [0xfc00]}, @in={0x2, 0x4e23, @local}], 0x20) [ 1052.202121] kmem_cache_alloc_node_trace+0x270/0x740 [ 1052.207247] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1052.212795] ? find_next_bit+0x104/0x130 [ 1052.216887] blk_mq_init_tags+0x79/0x2b0 [ 1052.220980] blk_mq_alloc_rq_map+0x9f/0x220 [ 1052.225319] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1052.230882] blk_mq_init_sched+0x21d/0x770 [ 1052.235144] elevator_init_mq+0xd7/0x160 [ 1052.239222] blk_mq_init_allocated_queue+0x1074/0x1680 [ 1052.244550] ? blk_mq_map_swqueue+0xa70/0xa70 [ 1052.249062] ? __mutex_init+0x1f7/0x290 [ 1052.253069] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1052.258642] ? __blk_mq_alloc_rq_map+0x17d/0x2e0 [ 1052.263395] ? blk_mq_update_nr_hw_queues+0xe50/0xe50 [ 1052.268592] blk_mq_init_queue+0x63/0xb0 [ 1052.272660] loop_add+0x34c/0xa30 [ 1052.276112] ? loop_queue_rq+0x690/0x690 [ 1052.280188] loop_control_ioctl+0x199/0x530 [ 1052.284526] ? loop_add+0xa30/0xa30 [ 1052.288161] ? arch_local_save_flags+0x40/0x40 [ 1052.292750] ? __mutex_unlock_slowpath+0x197/0x8c0 [ 1052.297677] ? loop_add+0xa30/0xa30 [ 1052.301299] do_vfs_ioctl+0x1de/0x1720 [ 1052.305183] ? ioctl_preallocate+0x300/0x300 [ 1052.309597] ? selinux_file_mprotect+0x620/0x620 [ 1052.314415] ? __sb_end_write+0xd9/0x110 [ 1052.318494] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1052.324034] ? fput+0x130/0x1a0 [ 1052.327348] ? do_syscall_64+0x9a/0x820 [ 1052.331350] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1052.336890] ? security_file_ioctl+0x94/0xc0 [ 1052.341307] ksys_ioctl+0xa9/0xd0 [ 1052.344770] __x64_sys_ioctl+0x73/0xb0 [ 1052.348649] do_syscall_64+0x1b9/0x820 [ 1052.352528] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 1052.357902] ? syscall_return_slowpath+0x5e0/0x5e0 [ 1052.362829] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1052.367676] ? trace_hardirqs_on_caller+0x310/0x310 [ 1052.372701] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 1052.377709] ? prepare_exit_to_usermode+0x291/0x3b0 [ 1052.382718] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1052.387569] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1052.392750] RIP: 0033:0x457569 [ 1052.395958] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1052.415028] RSP: 002b:00007fe27d20bc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1052.422729] RAX: ffffffffffffffda RBX: 00007fe27d20bc90 RCX: 0000000000457569 [ 1052.430004] RDX: 0000000000000000 RSI: 0000000000004c80 RDI: 0000000000000003 [ 1052.437286] RBP: 000000000072bf00 R08: 0000000000000000 R09: 0000000000000000 [ 1052.444567] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fe27d20c6d4 03:12:43 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000040)="153f6234488dd25d766070") socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup2(r2, r2) sendmsg$netlink(r3, &(0x7f0000028fc8)={0x0, 0x0, &(0x7f0000019000), 0x0, &(0x7f0000000040)=[@rights={0x18, 0x1, 0x1, [r1]}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000000b80)=[{{&(0x7f0000000200)=@l2, 0x80, &(0x7f00000005c0), 0x0, &(0x7f0000000600)=""/84, 0x54}}, {{&(0x7f0000000680)=@l2, 0x80, &(0x7f0000000a40), 0x0, &(0x7f0000000ac0)=""/147, 0x93}}], 0x4000000000000f3, 0x62, 0x0) [ 1052.451845] R13: 00000000004c039f R14: 00000000004d0540 R15: 0000000000000005 03:12:44 executing program 3: socket$packet(0x11, 0xa, 0x300) syz_emit_ethernet(0x4e, &(0x7f0000000080)={@local, @broadcast, [{}], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x0, 0x0, @local, @local={0xfe, 0x80, [0x0, 0xfffffffffffff000]}, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, &(0x7f00000002c0)) 03:12:44 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000040)="153f6234488dd25d766070") socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup2(r2, r2) sendmsg$netlink(r3, &(0x7f0000028fc8)={0x0, 0x0, &(0x7f0000019000), 0x0, &(0x7f0000000040)=[@rights={0x18, 0x1, 0x1, [r1]}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000000b80)=[{{&(0x7f0000000200)=@l2, 0x80, &(0x7f00000005c0), 0x0, &(0x7f0000000600)=""/84, 0x54}}, {{&(0x7f0000000680)=@l2, 0x80, &(0x7f0000000a40), 0x0, &(0x7f0000000ac0)=""/147, 0x93}}], 0x40000000000015d, 0x62, 0x0) 03:12:44 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f00000003c0), 0xe0000, &(0x7f0000000580)={[{@session={'session'}}]}) 03:12:44 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f00000003c0), 0x1f000000, &(0x7f0000000580)={[{@session={'session'}}]}) 03:12:44 executing program 1 (fault-call:3 fault-nth:37): r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) 03:12:44 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e23}, 0x1c) listen(r0, 0x18) r1 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f0000000000)=[@in={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0xc}, [0x61]}, @in={0x2, 0x4e23, @local}], 0x20) 03:12:44 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f00000003c0), 0x20000000, &(0x7f0000000580)={[{@session={'session'}}]}) 03:12:44 executing program 3: socket$packet(0x11, 0xa, 0x300) syz_emit_ethernet(0x4e, &(0x7f0000000080)={@local, @broadcast, [{}], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x0, 0x0, @local, @local={0xfe, 0x80, [0x0, 0x2c00000000000000]}, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, &(0x7f00000002c0)) 03:12:44 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000040)="153f6234488dd25d766070") socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup2(r2, r2) sendmsg$netlink(r3, &(0x7f0000028fc8)={0x0, 0x0, &(0x7f0000019000), 0x0, &(0x7f0000000040)=[@rights={0x18, 0x1, 0x1, [r1]}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000000b80)=[{{&(0x7f0000000200)=@l2, 0x80, &(0x7f00000005c0), 0x0, &(0x7f0000000600)=""/84, 0x54}}, {{&(0x7f0000000680)=@l2, 0x80, &(0x7f0000000a40), 0x0, &(0x7f0000000ac0)=""/147, 0x93}}], 0x400000000000090, 0x62, 0x0) [ 1052.859895] FAULT_INJECTION: forcing a failure. [ 1052.859895] name failslab, interval 1, probability 0, space 0, times 0 03:12:44 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f00000003c0), 0x6000000, &(0x7f0000000580)={[{@session={'session'}}]}) [ 1052.924690] CPU: 1 PID: 28386 Comm: syz-executor1 Not tainted 4.19.0-rc8+ #64 [ 1052.932036] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1052.941405] Call Trace: [ 1052.944020] dump_stack+0x1c4/0x2b4 [ 1052.947704] ? dump_stack_print_info.cold.2+0x52/0x52 [ 1052.952927] should_fail.cold.4+0xa/0x17 [ 1052.957116] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 1052.962253] ? rcu_read_unlock_special.part.39+0x11f0/0x11f0 [ 1052.968074] ? rcu_dynticks_curr_cpu_in_eqs+0x9f/0x160 03:12:44 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e23}, 0x1c) listen(r0, 0x18) r1 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f0000000000)=[@in={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0xc}, [0xe]}, @in={0x2, 0x4e23, @local}], 0x20) [ 1052.973376] ? graph_lock+0x170/0x170 [ 1052.977210] ? rcu_bh_qs+0xc0/0xc0 [ 1052.980765] ? unwind_dump+0x190/0x190 [ 1052.984669] ? graph_lock+0x170/0x170 [ 1052.988500] ? is_bpf_text_address+0xd3/0x170 [ 1052.993023] ? find_held_lock+0x36/0x1c0 [ 1052.997110] ? __lock_is_held+0xb5/0x140 [ 1053.001204] ? ___might_sleep+0x1ed/0x300 [ 1053.005391] ? arch_local_save_flags+0x40/0x40 [ 1053.010000] ? save_stack+0x43/0xd0 [ 1053.013652] ? kasan_kmalloc+0xc7/0xe0 [ 1053.017552] ? kmem_cache_alloc_node_trace+0x14c/0x740 03:12:44 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f00000003c0), 0x3, &(0x7f0000000580)={[{@session={'session'}}]}) [ 1053.022859] ? blk_mq_init_tags+0x79/0x2b0 [ 1053.027113] ? elevator_init_mq+0xd7/0x160 [ 1053.031372] ? blk_mq_init_allocated_queue+0x1074/0x1680 [ 1053.036855] __should_failslab+0x124/0x180 [ 1053.041120] should_failslab+0x9/0x14 [ 1053.044951] kmem_cache_alloc_node_trace+0x270/0x740 [ 1053.050114] __kmalloc_node+0x33/0x70 [ 1053.053961] sbitmap_init_node+0x288/0x440 [ 1053.058211] sbitmap_queue_init_node+0xb2/0x850 [ 1053.062892] ? __lock_is_held+0xb5/0x140 [ 1053.066957] ? sbitmap_init_node+0x440/0x440 [ 1053.071372] ? blk_mq_init_tags+0x79/0x2b0 [ 1053.075618] ? rcu_read_lock_sched_held+0x108/0x120 [ 1053.080639] ? kmem_cache_alloc_node_trace+0x34b/0x740 [ 1053.085934] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1053.091493] ? find_next_bit+0x104/0x130 [ 1053.095564] blk_mq_init_tags+0x116/0x2b0 [ 1053.099709] blk_mq_alloc_rq_map+0x9f/0x220 [ 1053.104130] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1053.109685] blk_mq_init_sched+0x21d/0x770 [ 1053.113951] elevator_init_mq+0xd7/0x160 [ 1053.118019] blk_mq_init_allocated_queue+0x1074/0x1680 [ 1053.123324] ? blk_mq_map_swqueue+0xa70/0xa70 [ 1053.127829] ? __mutex_init+0x1f7/0x290 [ 1053.131846] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1053.137405] ? __blk_mq_alloc_rq_map+0x17d/0x2e0 [ 1053.142193] ? blk_mq_update_nr_hw_queues+0xe50/0xe50 [ 1053.147404] blk_mq_init_queue+0x63/0xb0 [ 1053.151476] loop_add+0x34c/0xa30 [ 1053.154928] ? loop_queue_rq+0x690/0x690 [ 1053.158999] loop_control_ioctl+0x199/0x530 [ 1053.163337] ? loop_add+0xa30/0xa30 [ 1053.167014] ? arch_local_save_flags+0x40/0x40 [ 1053.171620] ? __mutex_unlock_slowpath+0x197/0x8c0 [ 1053.176558] ? loop_add+0xa30/0xa30 [ 1053.180211] do_vfs_ioctl+0x1de/0x1720 [ 1053.184130] ? ioctl_preallocate+0x300/0x300 [ 1053.188556] ? selinux_file_mprotect+0x620/0x620 [ 1053.193323] ? __sb_end_write+0xd9/0x110 [ 1053.197408] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1053.202965] ? fput+0x130/0x1a0 [ 1053.206253] ? do_syscall_64+0x9a/0x820 [ 1053.210247] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1053.215793] ? security_file_ioctl+0x94/0xc0 [ 1053.220208] ksys_ioctl+0xa9/0xd0 [ 1053.223707] __x64_sys_ioctl+0x73/0xb0 [ 1053.227589] do_syscall_64+0x1b9/0x820 [ 1053.231469] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 1053.236847] ? syscall_return_slowpath+0x5e0/0x5e0 [ 1053.241793] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1053.246662] ? trace_hardirqs_on_caller+0x310/0x310 [ 1053.251686] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 1053.256734] ? prepare_exit_to_usermode+0x291/0x3b0 [ 1053.261779] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1053.266637] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1053.271812] RIP: 0033:0x457569 [ 1053.274996] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1053.293886] RSP: 002b:00007fe27d20bc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1053.301611] RAX: ffffffffffffffda RBX: 00007fe27d20bc90 RCX: 0000000000457569 [ 1053.308891] RDX: 0000000000000000 RSI: 0000000000004c80 RDI: 0000000000000003 [ 1053.316146] RBP: 000000000072bf00 R08: 0000000000000000 R09: 0000000000000000 03:12:44 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000040)="153f6234488dd25d766070") socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup2(r2, r2) sendmsg$netlink(r3, &(0x7f0000028fc8)={0x0, 0x0, &(0x7f0000019000), 0x0, &(0x7f0000000040)=[@rights={0x18, 0x1, 0x1, [r1]}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000000b80)=[{{&(0x7f0000000200)=@l2, 0x80, &(0x7f00000005c0), 0x0, &(0x7f0000000600)=""/84, 0x54}}, {{&(0x7f0000000680)=@l2, 0x80, &(0x7f0000000a40), 0x0, &(0x7f0000000ac0)=""/147, 0x93}}], 0x4000000000000e4, 0x62, 0x0) [ 1053.323401] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fe27d20c6d4 [ 1053.330670] R13: 00000000004c039f R14: 00000000004d0540 R15: 0000000000000005 03:12:44 executing program 3: socket$packet(0x11, 0xa, 0x300) syz_emit_ethernet(0x4e, &(0x7f0000000080)={@local, @broadcast, [{}], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x0, 0x0, @local, @local={0xfe, 0x80, [0x0, 0x8906]}, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, &(0x7f00000002c0)) [ 1053.374285] hfs: invalid session number or type of track [ 1053.402418] hfs: can't find a HFS filesystem on dev loop2 03:12:44 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f00000003c0), 0x7400000000000000, &(0x7f0000000580)={[{@session={'session'}}]}) [ 1053.502951] hfs: invalid session number or type of track [ 1053.509793] hfs: can't find a HFS filesystem on dev loop2 03:12:45 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f00000003c0), 0x3000000, &(0x7f0000000580)={[{@session={'session'}}]}) 03:12:45 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000040)="153f6234488dd25d766070") socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup2(r2, r2) sendmsg$netlink(r3, &(0x7f0000028fc8)={0x0, 0x0, &(0x7f0000019000), 0x0, &(0x7f0000000040)=[@rights={0x18, 0x1, 0x1, [r1]}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000000b80)=[{{&(0x7f0000000200)=@l2, 0x80, &(0x7f00000005c0), 0x0, &(0x7f0000000600)=""/84, 0x54}}, {{&(0x7f0000000680)=@l2, 0x80, &(0x7f0000000a40), 0x0, &(0x7f0000000ac0)=""/147, 0x93}}], 0x400000000000042, 0x62, 0x0) 03:12:45 executing program 1 (fault-call:3 fault-nth:38): r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) 03:12:45 executing program 3: socket$packet(0x11, 0xa, 0x300) syz_emit_ethernet(0x4e, &(0x7f0000000080)={@local, @broadcast, [{}], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x0, 0x0, @local, @local={0xfe, 0x80, [0x0, 0x3580]}, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, &(0x7f00000002c0)) 03:12:45 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e23}, 0x1c) listen(r0, 0x18) r1 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f0000000000)=[@in={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0xc}, [0xffff1f0000000000]}, @in={0x2, 0x4e23, @local}], 0x20) 03:12:45 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f00000003c0), 0xfcfdffff, &(0x7f0000000580)={[{@session={'session'}}]}) [ 1053.692512] FAULT_INJECTION: forcing a failure. [ 1053.692512] name failslab, interval 1, probability 0, space 0, times 0 [ 1053.738205] CPU: 0 PID: 28434 Comm: syz-executor1 Not tainted 4.19.0-rc8+ #64 [ 1053.745535] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1053.754911] Call Trace: [ 1053.757550] dump_stack+0x1c4/0x2b4 [ 1053.761226] ? dump_stack_print_info.cold.2+0x52/0x52 [ 1053.766479] should_fail.cold.4+0xa/0x17 [ 1053.770580] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 1053.775801] ? graph_lock+0x170/0x170 [ 1053.779630] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1053.785243] ? graph_lock+0x170/0x170 [ 1053.789096] ? find_held_lock+0x36/0x1c0 [ 1053.793204] ? __lock_is_held+0xb5/0x140 [ 1053.797317] ? ___might_sleep+0x1ed/0x300 [ 1053.801488] ? arch_local_save_flags+0x40/0x40 [ 1053.806106] ? __kmalloc_node+0x33/0x70 [ 1053.810110] ? __kmalloc_node+0x33/0x70 [ 1053.814142] __should_failslab+0x124/0x180 [ 1053.818429] should_failslab+0x9/0x14 [ 1053.822259] kmem_cache_alloc_node_trace+0x270/0x740 [ 1053.827422] ? check_preemption_disabled+0x48/0x200 [ 1053.832464] ? __sanitizer_cov_trace_cmp8+0x18/0x20 03:12:45 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000040)="153f6234488dd25d766070") socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup2(r2, r2) sendmsg$netlink(r3, &(0x7f0000028fc8)={0x0, 0x0, &(0x7f0000019000), 0x0, &(0x7f0000000040)=[@rights={0x18, 0x1, 0x1, [r1]}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000000b80)=[{{&(0x7f0000000200)=@l2, 0x80, &(0x7f00000005c0), 0x0, &(0x7f0000000600)=""/84, 0x54}}, {{&(0x7f0000000680)=@l2, 0x80, &(0x7f0000000a40), 0x0, &(0x7f0000000ac0)=""/147, 0x93}}], 0x4000000000000d9, 0x62, 0x0) 03:12:45 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000040)="153f6234488dd25d766070") socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup2(r2, r2) sendmsg$netlink(r3, &(0x7f0000028fc8)={0x0, 0x0, &(0x7f0000019000), 0x0, &(0x7f0000000040)=[@rights={0x18, 0x1, 0x1, [r1]}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000000b80)=[{{&(0x7f0000000200)=@l2, 0x80, &(0x7f00000005c0), 0x0, &(0x7f0000000600)=""/84, 0x54}}, {{&(0x7f0000000680)=@l2, 0x80, &(0x7f0000000a40), 0x0, &(0x7f0000000ac0)=""/147, 0x93}}], 0x400000000000044, 0x62, 0x0) 03:12:45 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000040)="153f6234488dd25d766070") socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup2(r2, r2) sendmsg$netlink(r3, &(0x7f0000028fc8)={0x0, 0x0, &(0x7f0000019000), 0x0, &(0x7f0000000040)=[@rights={0x18, 0x1, 0x1, [r1]}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000000b80)=[{{&(0x7f0000000200)=@l2, 0x80, &(0x7f00000005c0), 0x0, &(0x7f0000000600)=""/84, 0x54}}, {{&(0x7f0000000680)=@l2, 0x80, &(0x7f0000000a40), 0x0, &(0x7f0000000ac0)=""/147, 0x93}}], 0x4000000000000fe, 0x62, 0x0) [ 1053.837502] ? find_next_bit+0x104/0x130 [ 1053.841604] sbitmap_queue_init_node+0x332/0x850 [ 1053.846393] ? __lock_is_held+0xb5/0x140 [ 1053.850500] ? sbitmap_init_node+0x440/0x440 [ 1053.854959] ? blk_mq_init_tags+0x79/0x2b0 [ 1053.859257] ? rcu_read_lock_sched_held+0x108/0x120 [ 1053.864314] ? kmem_cache_alloc_node_trace+0x34b/0x740 [ 1053.869618] ? find_next_bit+0x104/0x130 [ 1053.873748] blk_mq_init_tags+0x116/0x2b0 [ 1053.877936] blk_mq_alloc_rq_map+0x9f/0x220 [ 1053.882312] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1053.887888] blk_mq_init_sched+0x21d/0x770 [ 1053.892181] elevator_init_mq+0xd7/0x160 [ 1053.896388] blk_mq_init_allocated_queue+0x1074/0x1680 [ 1053.901708] ? blk_mq_map_swqueue+0xa70/0xa70 [ 1053.906231] ? __mutex_init+0x1f7/0x290 [ 1053.910279] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1053.915847] ? __blk_mq_alloc_rq_map+0x17d/0x2e0 [ 1053.920707] ? blk_mq_update_nr_hw_queues+0xe50/0xe50 [ 1053.925958] blk_mq_init_queue+0x63/0xb0 [ 1053.930078] loop_add+0x34c/0xa30 [ 1053.933595] ? loop_queue_rq+0x690/0x690 03:12:45 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000040)="153f6234488dd25d766070") socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup2(r2, r2) sendmsg$netlink(r3, &(0x7f0000028fc8)={0x0, 0x0, &(0x7f0000019000), 0x0, &(0x7f0000000040)=[@rights={0x18, 0x1, 0x1, [r1]}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000000b80)=[{{&(0x7f0000000200)=@l2, 0x80, &(0x7f00000005c0), 0x0, &(0x7f0000000600)=""/84, 0x54}}, {{&(0x7f0000000680)=@l2, 0x80, &(0x7f0000000a40), 0x0, &(0x7f0000000ac0)=""/147, 0x93}}], 0x400000000000012, 0x62, 0x0) [ 1053.937714] loop_control_ioctl+0x199/0x530 [ 1053.942069] ? loop_add+0xa30/0xa30 [ 1053.945728] ? arch_local_save_flags+0x40/0x40 [ 1053.950345] ? __mutex_unlock_slowpath+0x197/0x8c0 [ 1053.955311] ? loop_add+0xa30/0xa30 [ 1053.959026] do_vfs_ioctl+0x1de/0x1720 [ 1053.962998] ? ioctl_preallocate+0x300/0x300 [ 1053.967487] ? selinux_file_mprotect+0x620/0x620 [ 1053.972284] ? __sb_end_write+0xd9/0x110 [ 1053.976386] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1053.981961] ? fput+0x130/0x1a0 [ 1053.985276] ? do_syscall_64+0x9a/0x820 [ 1053.989314] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1053.994892] ? security_file_ioctl+0x94/0xc0 [ 1053.999841] ksys_ioctl+0xa9/0xd0 [ 1054.003339] __x64_sys_ioctl+0x73/0xb0 [ 1054.007261] do_syscall_64+0x1b9/0x820 [ 1054.011181] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 1054.016584] ? syscall_return_slowpath+0x5e0/0x5e0 [ 1054.021543] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1054.026416] ? trace_hardirqs_on_caller+0x310/0x310 [ 1054.031458] ? prepare_exit_to_usermode+0x3b0/0x3b0 03:12:45 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000040)="153f6234488dd25d766070") socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup2(r2, r2) sendmsg$netlink(r3, &(0x7f0000028fc8)={0x0, 0x0, &(0x7f0000019000), 0x0, &(0x7f0000000040)=[@rights={0x18, 0x1, 0x1, [r1]}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000000b80)=[{{&(0x7f0000000200)=@l2, 0x80, &(0x7f00000005c0), 0x0, &(0x7f0000000600)=""/84, 0x54}}, {{&(0x7f0000000680)=@l2, 0x80, &(0x7f0000000a40), 0x0, &(0x7f0000000ac0)=""/147, 0x93}}], 0x4000000000000c3, 0x62, 0x0) [ 1054.036500] ? prepare_exit_to_usermode+0x291/0x3b0 [ 1054.041559] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1054.046450] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1054.051667] RIP: 0033:0x457569 [ 1054.054882] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1054.074770] RSP: 002b:00007fe27d20bc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1054.082513] RAX: ffffffffffffffda RBX: 00007fe27d20bc90 RCX: 0000000000457569 03:12:45 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e23}, 0x1c) listen(r0, 0x18) r1 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f0000000000)=[@in={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0xc}, [0x4000]}, @in={0x2, 0x4e23, @local}], 0x20) [ 1054.089805] RDX: 0000000000000000 RSI: 0000000000004c80 RDI: 0000000000000003 [ 1054.097123] RBP: 000000000072bf00 R08: 0000000000000000 R09: 0000000000000000 [ 1054.104576] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fe27d20c6d4 [ 1054.111873] R13: 00000000004c039f R14: 00000000004d0540 R15: 0000000000000005 [ 1054.177210] hfs: invalid session number or type of track [ 1054.182713] hfs: can't find a HFS filesystem on dev loop2 [ 1054.263769] hfs: invalid session number or type of track [ 1054.275431] hfs: can't find a HFS filesystem on dev loop2 03:12:45 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f00000003c0), 0xfffffdfd, &(0x7f0000000580)={[{@session={'session'}}]}) 03:12:45 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f00000003c0), 0xf5030000, &(0x7f0000000580)={[{@session={'session'}}]}) 03:12:45 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000040)="153f6234488dd25d766070") socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup2(r2, r2) sendmsg$netlink(r3, &(0x7f0000028fc8)={0x0, 0x0, &(0x7f0000019000), 0x0, &(0x7f0000000040)=[@rights={0x18, 0x1, 0x1, [r1]}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000000b80)=[{{&(0x7f0000000200)=@l2, 0x80, &(0x7f00000005c0), 0x0, &(0x7f0000000600)=""/84, 0x54}}, {{&(0x7f0000000680)=@l2, 0x80, &(0x7f0000000a40), 0x0, &(0x7f0000000ac0)=""/147, 0x93}}], 0x400000000000067, 0x62, 0x0) 03:12:45 executing program 3: socket$packet(0x11, 0xa, 0x300) syz_emit_ethernet(0x4e, &(0x7f0000000080)={@local, @broadcast, [{}], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x0, 0x0, @local, @local={0xfe, 0x80, [0x0, 0x4305000000000000]}, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, &(0x7f00000002c0)) 03:12:45 executing program 1 (fault-call:3 fault-nth:39): r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) 03:12:45 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e23}, 0x1c) listen(r0, 0x18) r1 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f0000000000)=[@in={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0xc}, [0xf401]}, @in={0x2, 0x4e23, @local}], 0x20) [ 1054.416763] FAULT_INJECTION: forcing a failure. [ 1054.416763] name failslab, interval 1, probability 0, space 0, times 0 [ 1054.453137] CPU: 0 PID: 28484 Comm: syz-executor1 Not tainted 4.19.0-rc8+ #64 03:12:45 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000040)="153f6234488dd25d766070") socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup2(r2, r2) sendmsg$netlink(r3, &(0x7f0000028fc8)={0x0, 0x0, &(0x7f0000019000), 0x0, &(0x7f0000000040)=[@rights={0x18, 0x1, 0x1, [r1]}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000000b80)=[{{&(0x7f0000000200)=@l2, 0x80, &(0x7f00000005c0), 0x0, &(0x7f0000000600)=""/84, 0x54}}, {{&(0x7f0000000680)=@l2, 0x80, &(0x7f0000000a40), 0x0, &(0x7f0000000ac0)=""/147, 0x93}}], 0x400000000000140, 0x62, 0x0) [ 1054.460466] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1054.469841] Call Trace: [ 1054.472478] dump_stack+0x1c4/0x2b4 [ 1054.476158] ? dump_stack_print_info.cold.2+0x52/0x52 [ 1054.481384] ? blk_mq_init_sched+0x21d/0x770 [ 1054.485823] ? elevator_init_mq+0xd7/0x160 [ 1054.490086] ? blk_mq_init_allocated_queue+0x1074/0x1680 [ 1054.495566] ? blk_mq_init_queue+0x63/0xb0 [ 1054.499853] ? loop_control_ioctl+0x199/0x530 [ 1054.504409] should_fail.cold.4+0xa/0x17 [ 1054.508507] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 1054.513651] ? graph_lock+0x170/0x170 03:12:46 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000040)="153f6234488dd25d766070") socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup2(r2, r2) sendmsg$netlink(r3, &(0x7f0000028fc8)={0x0, 0x0, &(0x7f0000019000), 0x0, &(0x7f0000000040)=[@rights={0x18, 0x1, 0x1, [r1]}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000000b80)=[{{&(0x7f0000000200)=@l2, 0x80, &(0x7f00000005c0), 0x0, &(0x7f0000000600)=""/84, 0x54}}, {{&(0x7f0000000680)=@l2, 0x80, &(0x7f0000000a40), 0x0, &(0x7f0000000ac0)=""/147, 0x93}}], 0x4000000000000b6, 0x62, 0x0) [ 1054.517503] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1054.523203] ? check_preemption_disabled+0x48/0x200 [ 1054.528254] ? check_preemption_disabled+0x48/0x200 [ 1054.533310] ? graph_lock+0x170/0x170 [ 1054.537154] ? __lock_is_held+0xb5/0x140 [ 1054.541241] ? __lockdep_init_map+0x105/0x590 [ 1054.545808] ? __lock_is_held+0xb5/0x140 [ 1054.549924] ? ___might_sleep+0x1ed/0x300 [ 1054.554121] ? arch_local_save_flags+0x40/0x40 [ 1054.558746] ? sbitmap_queue_init_node+0xce/0x850 [ 1054.563615] ? __lock_is_held+0xb5/0x140 [ 1054.567730] __should_failslab+0x124/0x180 [ 1054.572014] should_failslab+0x9/0x14 [ 1054.575849] kmem_cache_alloc_node_trace+0x270/0x740 [ 1054.581033] ? find_next_bit+0x104/0x130 [ 1054.585150] __kmalloc_node+0x33/0x70 [ 1054.588987] blk_mq_alloc_rq_map+0xcc/0x220 [ 1054.593332] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1054.598913] blk_mq_init_sched+0x21d/0x770 [ 1054.603230] elevator_init_mq+0xd7/0x160 [ 1054.607331] blk_mq_init_allocated_queue+0x1074/0x1680 [ 1054.612636] ? blk_mq_map_swqueue+0xa70/0xa70 03:12:46 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000040)="153f6234488dd25d766070") socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup2(r2, r2) sendmsg$netlink(r3, &(0x7f0000028fc8)={0x0, 0x0, &(0x7f0000019000), 0x0, &(0x7f0000000040)=[@rights={0x18, 0x1, 0x1, [r1]}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000000b80)=[{{&(0x7f0000000200)=@l2, 0x80, &(0x7f00000005c0), 0x0, &(0x7f0000000600)=""/84, 0x54}}, {{&(0x7f0000000680)=@l2, 0x80, &(0x7f0000000a40), 0x0, &(0x7f0000000ac0)=""/147, 0x93}}], 0x4000000000000bb, 0x62, 0x0) [ 1054.617149] ? __mutex_init+0x1f7/0x290 [ 1054.621198] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1054.626777] ? __blk_mq_alloc_rq_map+0x17d/0x2e0 [ 1054.631593] ? blk_mq_update_nr_hw_queues+0xe50/0xe50 [ 1054.636825] blk_mq_init_queue+0x63/0xb0 [ 1054.640926] loop_add+0x34c/0xa30 [ 1054.644455] ? loop_queue_rq+0x690/0x690 [ 1054.648586] loop_control_ioctl+0x199/0x530 [ 1054.652939] ? loop_add+0xa30/0xa30 [ 1054.656616] ? arch_local_save_flags+0x40/0x40 [ 1054.661249] ? __mutex_unlock_slowpath+0x197/0x8c0 [ 1054.666230] ? loop_add+0xa30/0xa30 [ 1054.669893] do_vfs_ioctl+0x1de/0x1720 [ 1054.673835] ? ioctl_preallocate+0x300/0x300 [ 1054.678298] ? selinux_file_mprotect+0x620/0x620 [ 1054.683100] ? __sb_end_write+0xd9/0x110 [ 1054.687203] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1054.692797] ? fput+0x130/0x1a0 [ 1054.696099] ? do_syscall_64+0x9a/0x820 [ 1054.700098] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1054.705675] ? security_file_ioctl+0x94/0xc0 [ 1054.710126] ksys_ioctl+0xa9/0xd0 [ 1054.713625] __x64_sys_ioctl+0x73/0xb0 03:12:46 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000040)="153f6234488dd25d766070") socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup2(r2, r2) sendmsg$netlink(r3, &(0x7f0000028fc8)={0x0, 0x0, &(0x7f0000019000), 0x0, &(0x7f0000000040)=[@rights={0x18, 0x1, 0x1, [r1]}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000000b80)=[{{&(0x7f0000000200)=@l2, 0x80, &(0x7f00000005c0), 0x0, &(0x7f0000000600)=""/84, 0x54}}, {{&(0x7f0000000680)=@l2, 0x80, &(0x7f0000000a40), 0x0, &(0x7f0000000ac0)=""/147, 0x93}}], 0x400000000000103, 0x62, 0x0) [ 1054.717549] do_syscall_64+0x1b9/0x820 [ 1054.721462] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 1054.726857] ? syscall_return_slowpath+0x5e0/0x5e0 [ 1054.731811] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1054.736687] ? trace_hardirqs_on_caller+0x310/0x310 [ 1054.741741] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 1054.746792] ? prepare_exit_to_usermode+0x291/0x3b0 [ 1054.751864] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1054.756752] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1054.761989] RIP: 0033:0x457569 [ 1054.765196] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1054.784116] RSP: 002b:00007fe27d20bc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1054.791864] RAX: ffffffffffffffda RBX: 00007fe27d20bc90 RCX: 0000000000457569 [ 1054.799145] RDX: 0000000000000000 RSI: 0000000000004c80 RDI: 0000000000000003 [ 1054.806434] RBP: 000000000072bf00 R08: 0000000000000000 R09: 0000000000000000 03:12:46 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f00000003c0), 0x6000, &(0x7f0000000580)={[{@session={'session'}}]}) 03:12:46 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000040)="153f6234488dd25d766070") socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup2(r2, r2) sendmsg$netlink(r3, &(0x7f0000028fc8)={0x0, 0x0, &(0x7f0000019000), 0x0, &(0x7f0000000040)=[@rights={0x18, 0x1, 0x1, [r1]}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000000b80)=[{{&(0x7f0000000200)=@l2, 0x80, &(0x7f00000005c0), 0x0, &(0x7f0000000600)=""/84, 0x54}}, {{&(0x7f0000000680)=@l2, 0x80, &(0x7f0000000a40), 0x0, &(0x7f0000000ac0)=""/147, 0x93}}], 0x4000000000000a9, 0x62, 0x0) [ 1054.813726] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fe27d20c6d4 [ 1054.821014] R13: 00000000004c039f R14: 00000000004d0540 R15: 0000000000000005 03:12:46 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f00000003c0), 0x2200000000000000, &(0x7f0000000580)={[{@session={'session'}}]}) 03:12:46 executing program 3: socket$packet(0x11, 0xa, 0x300) syz_emit_ethernet(0x4e, &(0x7f0000000080)={@local, @broadcast, [{}], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x0, 0x0, @local, @local={0xfe, 0x80, [0x0, 0x81000000]}, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, &(0x7f00000002c0)) 03:12:46 executing program 1 (fault-call:3 fault-nth:40): r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) 03:12:46 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e23}, 0x1c) listen(r0, 0x18) r1 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f0000000000)=[@in={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0xc}, [0x3f00]}, @in={0x2, 0x4e23, @local}], 0x20) 03:12:46 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f00000003c0), 0x4, &(0x7f0000000580)={[{@session={'session'}}]}) 03:12:46 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000040)="153f6234488dd25d766070") socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup2(r2, r2) sendmsg$netlink(r3, &(0x7f0000028fc8)={0x0, 0x0, &(0x7f0000019000), 0x0, &(0x7f0000000040)=[@rights={0x18, 0x1, 0x1, [r1]}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000000b80)=[{{&(0x7f0000000200)=@l2, 0x80, &(0x7f00000005c0), 0x0, &(0x7f0000000600)=""/84, 0x54}}, {{&(0x7f0000000680)=@l2, 0x80, &(0x7f0000000a40), 0x0, &(0x7f0000000ac0)=""/147, 0x93}}], 0x4000000000000cf, 0x62, 0x0) [ 1055.078963] FAULT_INJECTION: forcing a failure. [ 1055.078963] name failslab, interval 1, probability 0, space 0, times 0 03:12:46 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e23}, 0x1c) listen(r0, 0x18) r1 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f0000000000)=[@in={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0xc}, [0x700000000000000]}, @in={0x2, 0x4e23, @local}], 0x20) [ 1055.123471] CPU: 0 PID: 28525 Comm: syz-executor1 Not tainted 4.19.0-rc8+ #64 [ 1055.130825] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1055.140219] Call Trace: [ 1055.142851] dump_stack+0x1c4/0x2b4 [ 1055.146533] ? dump_stack_print_info.cold.2+0x52/0x52 [ 1055.151788] should_fail.cold.4+0xa/0x17 [ 1055.155875] ? kernel_text_address+0x79/0xf0 [ 1055.160330] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 1055.165474] ? unwind_get_return_address+0x61/0xa0 03:12:46 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000040)="153f6234488dd25d766070") socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup2(r2, r2) sendmsg$netlink(r3, &(0x7f0000028fc8)={0x0, 0x0, &(0x7f0000019000), 0x0, &(0x7f0000000040)=[@rights={0x18, 0x1, 0x1, [r1]}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000000b80)=[{{&(0x7f0000000200)=@l2, 0x80, &(0x7f00000005c0), 0x0, &(0x7f0000000600)=""/84, 0x54}}, {{&(0x7f0000000680)=@l2, 0x80, &(0x7f0000000a40), 0x0, &(0x7f0000000ac0)=""/147, 0x93}}], 0x400000000000162, 0x62, 0x0) [ 1055.170437] ? __save_stack_trace+0x8d/0xf0 [ 1055.174808] ? graph_lock+0x170/0x170 [ 1055.178649] ? save_stack+0xa9/0xd0 [ 1055.182303] ? save_stack+0x43/0xd0 [ 1055.185967] ? kasan_kmalloc+0xc7/0xe0 [ 1055.189891] ? __kmalloc_node+0x47/0x70 [ 1055.193915] ? blk_mq_alloc_rq_map+0xcc/0x220 [ 1055.198444] ? blk_mq_init_sched+0x21d/0x770 [ 1055.202878] ? elevator_init_mq+0xd7/0x160 [ 1055.207165] ? blk_mq_init_allocated_queue+0x1074/0x1680 [ 1055.212680] ? __lock_is_held+0xb5/0x140 [ 1055.216811] ? ___might_sleep+0x1ed/0x300 03:12:46 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000040)="153f6234488dd25d766070") socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup2(r2, r2) sendmsg$netlink(r3, &(0x7f0000028fc8)={0x0, 0x0, &(0x7f0000019000), 0x0, &(0x7f0000000040)=[@rights={0x18, 0x1, 0x1, [r1]}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000000b80)=[{{&(0x7f0000000200)=@l2, 0x80, &(0x7f00000005c0), 0x0, &(0x7f0000000600)=""/84, 0x54}}, {{&(0x7f0000000680)=@l2, 0x80, &(0x7f0000000a40), 0x0, &(0x7f0000000ac0)=""/147, 0x93}}], 0x400000000000121, 0x62, 0x0) [ 1055.221023] ? arch_local_save_flags+0x40/0x40 [ 1055.225643] ? __lock_is_held+0xb5/0x140 [ 1055.229753] __should_failslab+0x124/0x180 [ 1055.234069] should_failslab+0x9/0x14 [ 1055.237901] kmem_cache_alloc_node_trace+0x270/0x740 [ 1055.243043] ? kasan_unpoison_shadow+0x35/0x50 [ 1055.247692] __kmalloc_node+0x33/0x70 [ 1055.251554] blk_mq_alloc_rq_map+0x10d/0x220 [ 1055.256000] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1055.261585] blk_mq_init_sched+0x21d/0x770 [ 1055.265868] elevator_init_mq+0xd7/0x160 03:12:46 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000040)="153f6234488dd25d766070") socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup2(r2, r2) sendmsg$netlink(r3, &(0x7f0000028fc8)={0x0, 0x0, &(0x7f0000019000), 0x0, &(0x7f0000000040)=[@rights={0x18, 0x1, 0x1, [r1]}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000000b80)=[{{&(0x7f0000000200)=@l2, 0x80, &(0x7f00000005c0), 0x0, &(0x7f0000000600)=""/84, 0x54}}, {{&(0x7f0000000680)=@l2, 0x80, &(0x7f0000000a40), 0x0, &(0x7f0000000ac0)=""/147, 0x93}}], 0x40000000000015b, 0x62, 0x0) [ 1055.269974] blk_mq_init_allocated_queue+0x1074/0x1680 [ 1055.275325] ? blk_mq_map_swqueue+0xa70/0xa70 [ 1055.279857] ? __mutex_init+0x1f7/0x290 [ 1055.283919] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1055.289509] ? __blk_mq_alloc_rq_map+0x17d/0x2e0 [ 1055.294327] ? blk_mq_update_nr_hw_queues+0xe50/0xe50 [ 1055.299568] blk_mq_init_queue+0x63/0xb0 [ 1055.303674] loop_add+0x34c/0xa30 [ 1055.307180] ? loop_queue_rq+0x690/0x690 [ 1055.311307] loop_control_ioctl+0x199/0x530 [ 1055.315689] ? loop_add+0xa30/0xa30 [ 1055.319357] ? arch_local_save_flags+0x40/0x40 03:12:46 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000040)="153f6234488dd25d766070") socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup2(r2, r2) sendmsg$netlink(r3, &(0x7f0000028fc8)={0x0, 0x0, &(0x7f0000019000), 0x0, &(0x7f0000000040)=[@rights={0x18, 0x1, 0x1, [r1]}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000000b80)=[{{&(0x7f0000000200)=@l2, 0x80, &(0x7f00000005c0), 0x0, &(0x7f0000000600)=""/84, 0x54}}, {{&(0x7f0000000680)=@l2, 0x80, &(0x7f0000000a40), 0x0, &(0x7f0000000ac0)=""/147, 0x93}}], 0x4000000000000e3, 0x62, 0x0) [ 1055.324004] ? __mutex_unlock_slowpath+0x197/0x8c0 [ 1055.329009] ? loop_add+0xa30/0xa30 [ 1055.332675] do_vfs_ioctl+0x1de/0x1720 [ 1055.336611] ? ioctl_preallocate+0x300/0x300 [ 1055.341065] ? selinux_file_mprotect+0x620/0x620 [ 1055.345869] ? __sb_end_write+0xd9/0x110 [ 1055.349981] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1055.355557] ? fput+0x130/0x1a0 [ 1055.358866] ? do_syscall_64+0x9a/0x820 [ 1055.362886] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1055.368456] ? security_file_ioctl+0x94/0xc0 [ 1055.372899] ksys_ioctl+0xa9/0xd0 [ 1055.376390] __x64_sys_ioctl+0x73/0xb0 [ 1055.380311] do_syscall_64+0x1b9/0x820 [ 1055.384231] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 1055.389631] ? syscall_return_slowpath+0x5e0/0x5e0 [ 1055.394590] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1055.399469] ? trace_hardirqs_on_caller+0x310/0x310 [ 1055.404515] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 1055.409565] ? prepare_exit_to_usermode+0x291/0x3b0 [ 1055.414624] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1055.419518] entry_SYSCALL_64_after_hwframe+0x49/0xbe 03:12:46 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000040)="153f6234488dd25d766070") socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup2(r2, r2) sendmsg$netlink(r3, &(0x7f0000028fc8)={0x0, 0x0, &(0x7f0000019000), 0x0, &(0x7f0000000040)=[@rights={0x18, 0x1, 0x1, [r1]}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000000b80)=[{{&(0x7f0000000200)=@l2, 0x80, &(0x7f00000005c0), 0x0, &(0x7f0000000600)=""/84, 0x54}}, {{&(0x7f0000000680)=@l2, 0x80, &(0x7f0000000a40), 0x0, &(0x7f0000000ac0)=""/147, 0x93}}], 0x4000000000000ef, 0x62, 0x0) [ 1055.424737] RIP: 0033:0x457569 [ 1055.427968] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1055.446905] RSP: 002b:00007fe27d20bc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1055.454658] RAX: ffffffffffffffda RBX: 00007fe27d20bc90 RCX: 0000000000457569 [ 1055.461958] RDX: 0000000000000000 RSI: 0000000000004c80 RDI: 0000000000000003 [ 1055.469264] RBP: 000000000072bf00 R08: 0000000000000000 R09: 0000000000000000 [ 1055.476562] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fe27d20c6d4 [ 1055.483858] R13: 00000000004c039f R14: 00000000004d0540 R15: 0000000000000005 03:12:47 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f00000003c0), 0x7a000000, &(0x7f0000000580)={[{@session={'session'}}]}) 03:12:47 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f00000003c0), 0x68, &(0x7f0000000580)={[{@session={'session'}}]}) 03:12:47 executing program 1 (fault-call:3 fault-nth:41): r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) 03:12:47 executing program 3: socket$packet(0x11, 0xa, 0x300) syz_emit_ethernet(0x4e, &(0x7f0000000080)={@local, @broadcast, [{}], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x0, 0x0, @local, @local={0xfe, 0x80, [0x0, 0x88480000]}, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, &(0x7f00000002c0)) 03:12:47 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000040)="153f6234488dd25d766070") socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup2(r2, r2) sendmsg$netlink(r3, &(0x7f0000028fc8)={0x0, 0x0, &(0x7f0000019000), 0x0, &(0x7f0000000040)=[@rights={0x18, 0x1, 0x1, [r1]}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000000b80)=[{{&(0x7f0000000200)=@l2, 0x80, &(0x7f00000005c0), 0x0, &(0x7f0000000600)=""/84, 0x54}}, {{&(0x7f0000000680)=@l2, 0x80, &(0x7f0000000a40), 0x0, &(0x7f0000000ac0)=""/147, 0x93}}], 0x400000000000126, 0x62, 0x0) 03:12:47 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e23}, 0x1c) listen(r0, 0x18) r1 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f0000000000)=[@in={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0xc}, [0x1000000000000000]}, @in={0x2, 0x4e23, @local}], 0x20) 03:12:47 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f00000003c0), 0xf503000000000000, &(0x7f0000000580)={[{@session={'session'}}]}) [ 1055.713454] FAULT_INJECTION: forcing a failure. [ 1055.713454] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1055.783015] CPU: 0 PID: 28568 Comm: syz-executor1 Not tainted 4.19.0-rc8+ #64 [ 1055.790360] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1055.799767] Call Trace: [ 1055.802398] dump_stack+0x1c4/0x2b4 [ 1055.806083] ? dump_stack_print_info.cold.2+0x52/0x52 [ 1055.811325] ? perf_trace_lock+0x7a0/0x7a0 [ 1055.815604] ? rcu_read_unlock_special.part.39+0x11f0/0x11f0 [ 1055.821444] should_fail.cold.4+0xa/0x17 [ 1055.825544] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 1055.830690] ? graph_lock+0x170/0x170 [ 1055.834520] ? find_held_lock+0x36/0x1c0 [ 1055.838689] ? is_bpf_text_address+0xac/0x170 [ 1055.843235] ? __lock_is_held+0xb5/0x140 [ 1055.847370] ? rcu_bh_qs+0xc0/0xc0 [ 1055.850956] ? ___might_sleep+0x1ed/0x300 [ 1055.855152] ? arch_local_save_flags+0x40/0x40 [ 1055.859775] ? is_bpf_text_address+0xd3/0x170 [ 1055.864315] ? __might_sleep+0x95/0x190 [ 1055.868365] __alloc_pages_nodemask+0x34b/0xde0 [ 1055.873074] ? __alloc_pages_slowpath+0x2d80/0x2d80 [ 1055.878130] ? save_stack+0xa9/0xd0 03:12:47 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000040)="153f6234488dd25d766070") socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup2(r2, r2) sendmsg$netlink(r3, &(0x7f0000028fc8)={0x0, 0x0, &(0x7f0000019000), 0x0, &(0x7f0000000040)=[@rights={0x18, 0x1, 0x1, [r1]}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000000b80)=[{{&(0x7f0000000200)=@l2, 0x80, &(0x7f00000005c0), 0x0, &(0x7f0000000600)=""/84, 0x54}}, {{&(0x7f0000000680)=@l2, 0x80, &(0x7f0000000a40), 0x0, &(0x7f0000000ac0)=""/147, 0x93}}], 0x400000000000073, 0x62, 0x0) [ 1055.881786] ? save_stack+0x43/0xd0 [ 1055.885443] ? kasan_kmalloc+0xc7/0xe0 [ 1055.889358] ? __kmalloc_node+0x47/0x70 [ 1055.893365] ? blk_mq_alloc_rq_map+0x10d/0x220 [ 1055.898004] ? blk_mq_init_sched+0x21d/0x770 [ 1055.902452] ? do_vfs_ioctl+0x1de/0x1720 [ 1055.906556] ? ksys_ioctl+0xa9/0xd0 [ 1055.910211] ? __x64_sys_ioctl+0x73/0xb0 [ 1055.914327] ? do_syscall_64+0x1b9/0x820 [ 1055.918424] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1055.923826] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1055.929412] ? find_next_bit+0x104/0x130 03:12:47 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000040)="153f6234488dd25d766070") socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup2(r2, r2) sendmsg$netlink(r3, &(0x7f0000028fc8)={0x0, 0x0, &(0x7f0000019000), 0x0, &(0x7f0000000040)=[@rights={0x18, 0x1, 0x1, [r1]}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000000b80)=[{{&(0x7f0000000200)=@l2, 0x80, &(0x7f00000005c0), 0x0, &(0x7f0000000600)=""/84, 0x54}}, {{&(0x7f0000000680)=@l2, 0x80, &(0x7f0000000a40), 0x0, &(0x7f0000000ac0)=""/147, 0x93}}], 0x400000000000029, 0x62, 0x0) [ 1055.933509] ? __cpu_to_node+0x7d/0xa0 [ 1055.937430] ? blk_mq_hw_queue_to_node+0xcc/0x110 [ 1055.942339] blk_mq_alloc_rqs+0x31c/0x980 [ 1055.946546] ? blk_mq_alloc_rq_map+0x220/0x220 [ 1055.951163] ? kmem_cache_alloc_node_trace+0x34b/0x740 [ 1055.956472] ? kasan_unpoison_shadow+0x35/0x50 [ 1055.961107] ? __kmalloc_node+0x47/0x70 [ 1055.965141] blk_mq_init_sched+0x279/0x770 [ 1055.969437] elevator_init_mq+0xd7/0x160 [ 1055.973538] blk_mq_init_allocated_queue+0x1074/0x1680 [ 1055.978861] ? blk_mq_map_swqueue+0xa70/0xa70 03:12:47 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000040)="153f6234488dd25d766070") socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup2(r2, r2) sendmsg$netlink(r3, &(0x7f0000028fc8)={0x0, 0x0, &(0x7f0000019000), 0x0, &(0x7f0000000040)=[@rights={0x18, 0x1, 0x1, [r1]}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000000b80)=[{{&(0x7f0000000200)=@l2, 0x80, &(0x7f00000005c0), 0x0, &(0x7f0000000600)=""/84, 0x54}}, {{&(0x7f0000000680)=@l2, 0x80, &(0x7f0000000a40), 0x0, &(0x7f0000000ac0)=""/147, 0x93}}], 0x400000000000075, 0x62, 0x0) [ 1055.983424] ? __mutex_init+0x1f7/0x290 [ 1055.987486] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1055.993053] ? __blk_mq_alloc_rq_map+0x17d/0x2e0 [ 1055.998327] ? blk_mq_update_nr_hw_queues+0xe50/0xe50 [ 1056.003585] blk_mq_init_queue+0x63/0xb0 [ 1056.007688] loop_add+0x34c/0xa30 [ 1056.011185] ? loop_queue_rq+0x690/0x690 [ 1056.015302] loop_control_ioctl+0x199/0x530 [ 1056.019656] ? loop_add+0xa30/0xa30 [ 1056.023314] ? arch_local_save_flags+0x40/0x40 [ 1056.027938] ? __mutex_unlock_slowpath+0x197/0x8c0 [ 1056.032935] ? loop_add+0xa30/0xa30 [ 1056.036610] do_vfs_ioctl+0x1de/0x1720 [ 1056.040504] ? ioctl_preallocate+0x300/0x300 [ 1056.044932] ? selinux_file_mprotect+0x620/0x620 [ 1056.049721] ? __sb_end_write+0xd9/0x110 [ 1056.053789] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1056.059365] ? fput+0x130/0x1a0 [ 1056.062686] ? do_syscall_64+0x9a/0x820 [ 1056.066684] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1056.072257] ? security_file_ioctl+0x94/0xc0 [ 1056.076713] ksys_ioctl+0xa9/0xd0 [ 1056.080188] __x64_sys_ioctl+0x73/0xb0 03:12:47 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000040)="153f6234488dd25d766070") socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup2(r2, r2) sendmsg$netlink(r3, &(0x7f0000028fc8)={0x0, 0x0, &(0x7f0000019000), 0x0, &(0x7f0000000040)=[@rights={0x18, 0x1, 0x1, [r1]}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000000b80)=[{{&(0x7f0000000200)=@l2, 0x80, &(0x7f00000005c0), 0x0, &(0x7f0000000600)=""/84, 0x54}}, {{&(0x7f0000000680)=@l2, 0x80, &(0x7f0000000a40), 0x0, &(0x7f0000000ac0)=""/147, 0x93}}], 0x40000000000007e, 0x62, 0x0) [ 1056.084105] do_syscall_64+0x1b9/0x820 [ 1056.088024] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 1056.093428] ? syscall_return_slowpath+0x5e0/0x5e0 [ 1056.098419] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1056.103446] ? trace_hardirqs_on_caller+0x310/0x310 [ 1056.108478] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 1056.113543] ? prepare_exit_to_usermode+0x291/0x3b0 [ 1056.118612] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1056.123527] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1056.128755] RIP: 0033:0x457569 [ 1056.131990] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1056.150917] RSP: 002b:00007fe27d20bc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1056.158648] RAX: ffffffffffffffda RBX: 00007fe27d20bc90 RCX: 0000000000457569 [ 1056.165939] RDX: 0000000000000000 RSI: 0000000000004c80 RDI: 0000000000000003 [ 1056.173248] RBP: 000000000072bf00 R08: 0000000000000000 R09: 0000000000000000 03:12:47 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000040)="153f6234488dd25d766070") socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup2(r2, r2) sendmsg$netlink(r3, &(0x7f0000028fc8)={0x0, 0x0, &(0x7f0000019000), 0x0, &(0x7f0000000040)=[@rights={0x18, 0x1, 0x1, [r1]}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000000b80)=[{{&(0x7f0000000200)=@l2, 0x80, &(0x7f00000005c0), 0x0, &(0x7f0000000600)=""/84, 0x54}}, {{&(0x7f0000000680)=@l2, 0x80, &(0x7f0000000a40), 0x0, &(0x7f0000000ac0)=""/147, 0x93}}], 0x400000000000032, 0x62, 0x0) [ 1056.180536] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fe27d20c6d4 [ 1056.187827] R13: 00000000004c039f R14: 00000000004d0540 R15: 0000000000000005 [ 1056.241935] hfs: invalid session number or type of track [ 1056.261987] hfs: can't find a HFS filesystem on dev loop2 [ 1056.325122] hfs: invalid session number or type of track [ 1056.330629] hfs: can't find a HFS filesystem on dev loop2 03:12:47 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f00000003c0), 0x40000, &(0x7f0000000580)={[{@session={'session'}}]}) 03:12:47 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e23}, 0x1c) listen(r0, 0x18) r1 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f0000000000)=[@in={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0xc}, [0xa00]}, @in={0x2, 0x4e23, @local}], 0x20) 03:12:47 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f00000003c0), 0x74, &(0x7f0000000580)={[{@session={'session'}}]}) 03:12:47 executing program 3: socket$packet(0x11, 0xa, 0x300) syz_emit_ethernet(0x4e, &(0x7f0000000080)={@local, @broadcast, [{}], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x0, 0x0, @local, @local={0xfe, 0x80, [0x0, 0x3]}, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, &(0x7f00000002c0)) 03:12:47 executing program 1 (fault-call:3 fault-nth:42): r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) 03:12:47 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000040)="153f6234488dd25d766070") socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup2(r2, r2) sendmsg$netlink(r3, &(0x7f0000028fc8)={0x0, 0x0, &(0x7f0000019000), 0x0, &(0x7f0000000040)=[@rights={0x18, 0x1, 0x1, [r1]}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000000b80)=[{{&(0x7f0000000200)=@l2, 0x80, &(0x7f00000005c0), 0x0, &(0x7f0000000600)=""/84, 0x54}}, {{&(0x7f0000000680)=@l2, 0x80, &(0x7f0000000a40), 0x0, &(0x7f0000000ac0)=""/147, 0x93}}], 0x40000000000013b, 0x62, 0x0) 03:12:47 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f00000003c0), 0xfdfdffff00000000, &(0x7f0000000580)={[{@session={'session'}}]}) 03:12:47 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000040)="153f6234488dd25d766070") socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup2(r2, r2) sendmsg$netlink(r3, &(0x7f0000028fc8)={0x0, 0x0, &(0x7f0000019000), 0x0, &(0x7f0000000040)=[@rights={0x18, 0x1, 0x1, [r1]}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000000b80)=[{{&(0x7f0000000200)=@l2, 0x80, &(0x7f00000005c0), 0x0, &(0x7f0000000600)=""/84, 0x54}}, {{&(0x7f0000000680)=@l2, 0x80, &(0x7f0000000a40), 0x0, &(0x7f0000000ac0)=""/147, 0x93}}], 0x400000000000036, 0x62, 0x0) 03:12:48 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f00000003c0), 0x770c0000, &(0x7f0000000580)={[{@session={'session'}}]}) 03:12:48 executing program 3: socket$packet(0x11, 0xa, 0x300) syz_emit_ethernet(0x4e, &(0x7f0000000080)={@local, @broadcast, [{}], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x0, 0x0, @local, @local={0xfe, 0x80, [0x0, 0x5]}, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, &(0x7f00000002c0)) [ 1056.551131] FAULT_INJECTION: forcing a failure. [ 1056.551131] name failslab, interval 1, probability 0, space 0, times 0 [ 1056.592108] CPU: 1 PID: 28618 Comm: syz-executor1 Not tainted 4.19.0-rc8+ #64 [ 1056.599425] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1056.608788] Call Trace: [ 1056.611401] dump_stack+0x1c4/0x2b4 [ 1056.615082] ? dump_stack_print_info.cold.2+0x52/0x52 [ 1056.620305] ? blk_mq_init_sched+0x21d/0x770 [ 1056.624747] ? elevator_init_mq+0xd7/0x160 [ 1056.629000] ? blk_mq_init_allocated_queue+0x1074/0x1680 [ 1056.634463] ? blk_mq_init_queue+0x63/0xb0 [ 1056.638726] ? loop_control_ioctl+0x199/0x530 [ 1056.643252] should_fail.cold.4+0xa/0x17 [ 1056.647342] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 1056.652470] ? graph_lock+0x170/0x170 [ 1056.656300] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1056.661862] ? check_preemption_disabled+0x48/0x200 [ 1056.666894] ? check_preemption_disabled+0x48/0x200 [ 1056.671925] ? graph_lock+0x170/0x170 [ 1056.675754] ? __lock_is_held+0xb5/0x140 [ 1056.679863] ? __lockdep_init_map+0x105/0x590 [ 1056.684380] ? __lock_is_held+0xb5/0x140 [ 1056.688476] ? ___might_sleep+0x1ed/0x300 [ 1056.692680] ? arch_local_save_flags+0x40/0x40 [ 1056.697306] ? sbitmap_queue_init_node+0xce/0x850 [ 1056.702165] ? __lock_is_held+0xb5/0x140 [ 1056.706254] __should_failslab+0x124/0x180 [ 1056.710530] should_failslab+0x9/0x14 [ 1056.714376] kmem_cache_alloc_node_trace+0x270/0x740 [ 1056.719500] ? find_next_bit+0x104/0x130 [ 1056.723587] __kmalloc_node+0x33/0x70 [ 1056.727414] blk_mq_alloc_rq_map+0xcc/0x220 [ 1056.731754] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1056.737337] blk_mq_init_sched+0x21d/0x770 03:12:48 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f00000003c0), 0x100000000000000, &(0x7f0000000580)={[{@session={'session'}}]}) 03:12:48 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e23}, 0x1c) listen(r0, 0x18) r1 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f0000000000)=[@in={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0xc}, [0x900000000000000]}, @in={0x2, 0x4e23, @local}], 0x20) [ 1056.741608] elevator_init_mq+0xd7/0x160 [ 1056.745693] blk_mq_init_allocated_queue+0x1074/0x1680 [ 1056.751006] ? blk_mq_map_swqueue+0xa70/0xa70 [ 1056.755528] ? __mutex_init+0x1f7/0x290 [ 1056.759561] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1056.765138] ? __blk_mq_alloc_rq_map+0x17d/0x2e0 [ 1056.769932] ? blk_mq_update_nr_hw_queues+0xe50/0xe50 [ 1056.775157] blk_mq_init_queue+0x63/0xb0 [ 1056.779249] loop_add+0x34c/0xa30 [ 1056.782728] ? loop_queue_rq+0x690/0x690 [ 1056.786803] loop_control_ioctl+0x199/0x530 [ 1056.791128] ? loop_add+0xa30/0xa30 [ 1056.794755] ? arch_local_save_flags+0x40/0x40 [ 1056.799351] ? __mutex_unlock_slowpath+0x197/0x8c0 [ 1056.804277] ? loop_add+0xa30/0xa30 [ 1056.807905] do_vfs_ioctl+0x1de/0x1720 [ 1056.811789] ? ioctl_preallocate+0x300/0x300 [ 1056.816193] ? selinux_file_mprotect+0x620/0x620 [ 1056.820973] ? __sb_end_write+0xd9/0x110 [ 1056.825037] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1056.830584] ? fput+0x130/0x1a0 [ 1056.833894] ? do_syscall_64+0x9a/0x820 [ 1056.837895] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1056.843450] ? security_file_ioctl+0x94/0xc0 [ 1056.847874] ksys_ioctl+0xa9/0xd0 [ 1056.851335] __x64_sys_ioctl+0x73/0xb0 [ 1056.855219] do_syscall_64+0x1b9/0x820 [ 1056.859114] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 1056.864481] ? syscall_return_slowpath+0x5e0/0x5e0 [ 1056.869479] ? trace_hardirqs_on_caller+0x310/0x310 [ 1056.874545] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 1056.879571] ? recalc_sigpending_tsk+0x180/0x180 [ 1056.884337] ? kasan_check_write+0x14/0x20 [ 1056.888589] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1056.893457] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1056.898659] RIP: 0033:0x457569 [ 1056.901856] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1056.920762] RSP: 002b:00007fe27d1eac78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1056.928479] RAX: ffffffffffffffda RBX: 00007fe27d1eac90 RCX: 0000000000457569 [ 1056.935770] RDX: 0000000000000000 RSI: 0000000000004c80 RDI: 0000000000000003 [ 1056.943061] RBP: 000000000072bfa0 R08: 0000000000000000 R09: 0000000000000000 [ 1056.950338] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fe27d1eb6d4 [ 1056.957705] R13: 00000000004c039f R14: 00000000004d0540 R15: 0000000000000005 03:12:48 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f00000003c0), 0xffffff97, &(0x7f0000000580)={[{@session={'session'}}]}) 03:12:48 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f00000003c0), 0x770c000000000000, &(0x7f0000000580)={[{@session={'session'}}]}) 03:12:48 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000040)="153f6234488dd25d766070") socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup2(r2, r2) sendmsg$netlink(r3, &(0x7f0000028fc8)={0x0, 0x0, &(0x7f0000019000), 0x0, &(0x7f0000000040)=[@rights={0x18, 0x1, 0x1, [r1]}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000000b80)=[{{&(0x7f0000000200)=@l2, 0x80, &(0x7f00000005c0), 0x0, &(0x7f0000000600)=""/84, 0x54}}, {{&(0x7f0000000680)=@l2, 0x80, &(0x7f0000000a40), 0x0, &(0x7f0000000ac0)=""/147, 0x93}}], 0x40000000000014d, 0x62, 0x0) 03:12:48 executing program 1 (fault-call:3 fault-nth:43): r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) 03:12:48 executing program 3: socket$packet(0x11, 0xa, 0x300) syz_emit_ethernet(0x4e, &(0x7f0000000080)={@local, @broadcast, [{}], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x0, 0x0, @local, @local={0xfe, 0x80, [0x0, 0x88640000]}, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, &(0x7f00000002c0)) [ 1057.166020] FAULT_INJECTION: forcing a failure. [ 1057.166020] name failslab, interval 1, probability 0, space 0, times 0 [ 1057.202142] CPU: 0 PID: 28653 Comm: syz-executor1 Not tainted 4.19.0-rc8+ #64 03:12:48 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000040)="153f6234488dd25d766070") socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup2(r2, r2) sendmsg$netlink(r3, &(0x7f0000028fc8)={0x0, 0x0, &(0x7f0000019000), 0x0, &(0x7f0000000040)=[@rights={0x18, 0x1, 0x1, [r1]}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000000b80)=[{{&(0x7f0000000200)=@l2, 0x80, &(0x7f00000005c0), 0x0, &(0x7f0000000600)=""/84, 0x54}}, {{&(0x7f0000000680)=@l2, 0x80, &(0x7f0000000a40), 0x0, &(0x7f0000000ac0)=""/147, 0x93}}], 0x400000000000030, 0x62, 0x0) [ 1057.209486] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1057.218869] Call Trace: [ 1057.221504] dump_stack+0x1c4/0x2b4 [ 1057.225181] ? dump_stack_print_info.cold.2+0x52/0x52 [ 1057.230448] should_fail.cold.4+0xa/0x17 [ 1057.234552] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 1057.239707] ? __sched_text_start+0x8/0x8 [ 1057.243905] ? graph_lock+0x170/0x170 [ 1057.247758] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1057.252551] ? graph_lock+0x170/0x170 [ 1057.256383] ? retint_kernel+0x2d/0x2d [ 1057.260299] ? trace_hardirqs_on_caller+0xc0/0x310 03:12:48 executing program 3: socket$packet(0x11, 0xa, 0x300) syz_emit_ethernet(0x4e, &(0x7f0000000080)={@local, @broadcast, [{}], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x0, 0x0, @local, @local={0xfe, 0x80, [0x0, 0x4000000]}, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, &(0x7f00000002c0)) 03:12:48 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000040)="153f6234488dd25d766070") socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup2(r2, r2) sendmsg$netlink(r3, &(0x7f0000028fc8)={0x0, 0x0, &(0x7f0000019000), 0x0, &(0x7f0000000040)=[@rights={0x18, 0x1, 0x1, [r1]}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000000b80)=[{{&(0x7f0000000200)=@l2, 0x80, &(0x7f00000005c0), 0x0, &(0x7f0000000600)=""/84, 0x54}}, {{&(0x7f0000000680)=@l2, 0x80, &(0x7f0000000a40), 0x0, &(0x7f0000000ac0)=""/147, 0x93}}], 0x4000000000000fd, 0x62, 0x0) [ 1057.265279] ? find_held_lock+0x36/0x1c0 [ 1057.269394] ? __lock_is_held+0xb5/0x140 [ 1057.273527] ? ___might_sleep+0x1ed/0x300 [ 1057.277736] ? arch_local_save_flags+0x40/0x40 [ 1057.282376] __should_failslab+0x124/0x180 [ 1057.286647] should_failslab+0x9/0x14 [ 1057.290490] kmem_cache_alloc_node_trace+0x270/0x740 [ 1057.295630] ? blk_mq_hw_queue_to_node+0xcc/0x110 [ 1057.300545] elevator_alloc+0x82/0x200 [ 1057.304482] dd_init_queue+0x9f/0x600 [ 1057.308322] ? dd_exit_queue+0x250/0x250 [ 1057.312421] ? kasan_unpoison_shadow+0x35/0x50 [ 1057.317063] ? __kmalloc_node+0x47/0x70 [ 1057.321089] blk_mq_init_sched+0x3b3/0x770 [ 1057.325388] elevator_init_mq+0xd7/0x160 [ 1057.329495] blk_mq_init_allocated_queue+0x1074/0x1680 [ 1057.334834] ? blk_mq_map_swqueue+0xa70/0xa70 [ 1057.339366] ? __mutex_init+0x1f7/0x290 [ 1057.343413] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1057.348992] ? __blk_mq_alloc_rq_map+0x17d/0x2e0 [ 1057.353817] ? blk_mq_update_nr_hw_queues+0xe50/0xe50 [ 1057.359068] blk_mq_init_queue+0x63/0xb0 [ 1057.363173] loop_add+0x34c/0xa30 03:12:48 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000040)="153f6234488dd25d766070") socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup2(r2, r2) sendmsg$netlink(r3, &(0x7f0000028fc8)={0x0, 0x0, &(0x7f0000019000), 0x0, &(0x7f0000000040)=[@rights={0x18, 0x1, 0x1, [r1]}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000000b80)=[{{&(0x7f0000000200)=@l2, 0x80, &(0x7f00000005c0), 0x0, &(0x7f0000000600)=""/84, 0x54}}, {{&(0x7f0000000680)=@l2, 0x80, &(0x7f0000000a40), 0x0, &(0x7f0000000ac0)=""/147, 0x93}}], 0x4000000000000b2, 0x62, 0x0) [ 1057.366669] ? loop_queue_rq+0x690/0x690 [ 1057.370789] loop_control_ioctl+0x199/0x530 [ 1057.375147] ? loop_add+0xa30/0xa30 [ 1057.378808] ? arch_local_save_flags+0x40/0x40 [ 1057.383435] ? __mutex_unlock_slowpath+0x197/0x8c0 [ 1057.388415] ? loop_add+0xa30/0xa30 [ 1057.392082] do_vfs_ioctl+0x1de/0x1720 [ 1057.396024] ? ioctl_preallocate+0x300/0x300 [ 1057.400493] ? selinux_file_mprotect+0x620/0x620 [ 1057.405291] ? __sb_end_write+0xd9/0x110 [ 1057.409397] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 03:12:48 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000040)="153f6234488dd25d766070") socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup2(r2, r2) sendmsg$netlink(r3, &(0x7f0000028fc8)={0x0, 0x0, &(0x7f0000019000), 0x0, &(0x7f0000000040)=[@rights={0x18, 0x1, 0x1, [r1]}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000000b80)=[{{&(0x7f0000000200)=@l2, 0x80, &(0x7f00000005c0), 0x0, &(0x7f0000000600)=""/84, 0x54}}, {{&(0x7f0000000680)=@l2, 0x80, &(0x7f0000000a40), 0x0, &(0x7f0000000ac0)=""/147, 0x93}}], 0x40000000000006e, 0x62, 0x0) [ 1057.414970] ? fput+0x130/0x1a0 [ 1057.418294] ? do_syscall_64+0x9a/0x820 [ 1057.422306] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1057.427868] ? security_file_ioctl+0x94/0xc0 [ 1057.432315] ksys_ioctl+0xa9/0xd0 [ 1057.435813] __x64_sys_ioctl+0x73/0xb0 [ 1057.439759] do_syscall_64+0x1b9/0x820 [ 1057.443703] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 1057.449100] ? syscall_return_slowpath+0x5e0/0x5e0 [ 1057.454056] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1057.458936] ? trace_hardirqs_on_caller+0x310/0x310 03:12:48 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000040)="153f6234488dd25d766070") socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup2(r2, r2) sendmsg$netlink(r3, &(0x7f0000028fc8)={0x0, 0x0, &(0x7f0000019000), 0x0, &(0x7f0000000040)=[@rights={0x18, 0x1, 0x1, [r1]}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000000b80)=[{{&(0x7f0000000200)=@l2, 0x80, &(0x7f00000005c0), 0x0, &(0x7f0000000600)=""/84, 0x54}}, {{&(0x7f0000000680)=@l2, 0x80, &(0x7f0000000a40), 0x0, &(0x7f0000000ac0)=""/147, 0x93}}], 0x40000000000012d, 0x62, 0x0) [ 1057.464018] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 1057.469074] ? prepare_exit_to_usermode+0x291/0x3b0 [ 1057.474142] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1057.479048] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1057.484269] RIP: 0033:0x457569 [ 1057.487492] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1057.506418] RSP: 002b:00007fe27d20bc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 03:12:49 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e23}, 0x1c) listen(r0, 0x18) r1 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f0000000000)=[@in={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0xc}, [0xfe80000000000000]}, @in={0x2, 0x4e23, @local}], 0x20) [ 1057.514164] RAX: ffffffffffffffda RBX: 00007fe27d20bc90 RCX: 0000000000457569 [ 1057.521456] RDX: 0000000000000000 RSI: 0000000000004c80 RDI: 0000000000000003 [ 1057.528753] RBP: 000000000072bf00 R08: 0000000000000000 R09: 0000000000000000 [ 1057.536027] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fe27d20c6d4 [ 1057.543294] R13: 00000000004c039f R14: 00000000004d0540 R15: 0000000000000005 03:12:49 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f00000003c0), 0xfcfdffff00000000, &(0x7f0000000580)={[{@session={'session'}}]}) 03:12:49 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000040)="153f6234488dd25d766070") socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup2(r2, r2) sendmsg$netlink(r3, &(0x7f0000028fc8)={0x0, 0x0, &(0x7f0000019000), 0x0, &(0x7f0000000040)=[@rights={0x18, 0x1, 0x1, [r1]}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000000b80)=[{{&(0x7f0000000200)=@l2, 0x80, &(0x7f00000005c0), 0x0, &(0x7f0000000600)=""/84, 0x54}}, {{&(0x7f0000000680)=@l2, 0x80, &(0x7f0000000a40), 0x0, &(0x7f0000000ac0)=""/147, 0x93}}], 0x40000000000005c, 0x62, 0x0) 03:12:49 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f00000003c0), 0x74000000, &(0x7f0000000580)={[{@session={'session'}}]}) 03:12:49 executing program 1 (fault-call:3 fault-nth:44): r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) 03:12:49 executing program 3: socket$packet(0x11, 0xa, 0x300) syz_emit_ethernet(0x4e, &(0x7f0000000080)={@local, @broadcast, [{}], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x0, 0x0, @local, @local={0xfe, 0x80, [0x0, 0x89ffffff]}, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, &(0x7f00000002c0)) 03:12:49 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f00000003c0), 0x1000000, &(0x7f0000000580)={[{@session={'session'}}]}) [ 1057.732217] FAULT_INJECTION: forcing a failure. [ 1057.732217] name fail_page_alloc, interval 1, probability 0, space 0, times 0 03:12:49 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000040)="153f6234488dd25d766070") socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup2(r2, r2) sendmsg$netlink(r3, &(0x7f0000028fc8)={0x0, 0x0, &(0x7f0000019000), 0x0, &(0x7f0000000040)=[@rights={0x18, 0x1, 0x1, [r1]}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000000b80)=[{{&(0x7f0000000200)=@l2, 0x80, &(0x7f00000005c0), 0x0, &(0x7f0000000600)=""/84, 0x54}}, {{&(0x7f0000000680)=@l2, 0x80, &(0x7f0000000a40), 0x0, &(0x7f0000000ac0)=""/147, 0x93}}], 0x400000000000130, 0x62, 0x0) [ 1057.775850] CPU: 0 PID: 28698 Comm: syz-executor1 Not tainted 4.19.0-rc8+ #64 [ 1057.783221] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1057.792607] Call Trace: [ 1057.795243] dump_stack+0x1c4/0x2b4 [ 1057.798958] ? dump_stack_print_info.cold.2+0x52/0x52 [ 1057.804198] ? perf_trace_lock+0x7a0/0x7a0 [ 1057.808473] ? rcu_read_unlock_special.part.39+0x11f0/0x11f0 [ 1057.814317] should_fail.cold.4+0xa/0x17 [ 1057.818415] ? fault_create_debugfs_attr+0x1f0/0x1f0 03:12:49 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f00000003c0), 0x7400, &(0x7f0000000580)={[{@session={'session'}}]}) [ 1057.823591] ? graph_lock+0x170/0x170 [ 1057.827425] ? find_held_lock+0x36/0x1c0 [ 1057.831546] ? is_bpf_text_address+0xac/0x170 [ 1057.836082] ? __lock_is_held+0xb5/0x140 [ 1057.840213] ? rcu_bh_qs+0xc0/0xc0 [ 1057.843785] ? ___might_sleep+0x1ed/0x300 [ 1057.847991] ? arch_local_save_flags+0x40/0x40 [ 1057.852619] ? is_bpf_text_address+0xd3/0x170 [ 1057.857162] ? __might_sleep+0x95/0x190 [ 1057.861180] __alloc_pages_nodemask+0x34b/0xde0 [ 1057.865899] ? __alloc_pages_slowpath+0x2d80/0x2d80 [ 1057.870995] ? save_stack+0xa9/0xd0 03:12:49 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f00000003c0), 0x1f000000, &(0x7f0000000580)={[{@session={'session'}}]}) [ 1057.874659] ? save_stack+0x43/0xd0 [ 1057.878315] ? kasan_kmalloc+0xc7/0xe0 [ 1057.882226] ? __kmalloc_node+0x47/0x70 [ 1057.886243] ? blk_mq_alloc_rq_map+0x10d/0x220 [ 1057.890859] ? blk_mq_init_sched+0x21d/0x770 [ 1057.895302] ? do_vfs_ioctl+0x1de/0x1720 [ 1057.899398] ? ksys_ioctl+0xa9/0xd0 [ 1057.903058] ? __x64_sys_ioctl+0x73/0xb0 [ 1057.907151] ? do_syscall_64+0x1b9/0x820 [ 1057.911250] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1057.916658] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1057.922231] ? find_next_bit+0x104/0x130 03:12:49 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000040)="153f6234488dd25d766070") socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup2(r2, r2) sendmsg$netlink(r3, &(0x7f0000028fc8)={0x0, 0x0, &(0x7f0000019000), 0x0, &(0x7f0000000040)=[@rights={0x18, 0x1, 0x1, [r1]}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000000b80)=[{{&(0x7f0000000200)=@l2, 0x80, &(0x7f00000005c0), 0x0, &(0x7f0000000600)=""/84, 0x54}}, {{&(0x7f0000000680)=@l2, 0x80, &(0x7f0000000a40), 0x0, &(0x7f0000000ac0)=""/147, 0x93}}], 0x400000000000053, 0x62, 0x0) [ 1057.926381] ? __cpu_to_node+0x7d/0xa0 [ 1057.930334] ? blk_mq_hw_queue_to_node+0xcc/0x110 [ 1057.935223] blk_mq_alloc_rqs+0x31c/0x980 [ 1057.939440] ? blk_mq_alloc_rq_map+0x220/0x220 [ 1057.944062] ? kmem_cache_alloc_node_trace+0x34b/0x740 [ 1057.949363] ? kasan_unpoison_shadow+0x35/0x50 [ 1057.954013] ? __kmalloc_node+0x47/0x70 [ 1057.958045] blk_mq_init_sched+0x279/0x770 [ 1057.962355] elevator_init_mq+0xd7/0x160 [ 1057.966457] blk_mq_init_allocated_queue+0x1074/0x1680 [ 1057.971796] ? blk_mq_map_swqueue+0xa70/0xa70 03:12:49 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000040)="153f6234488dd25d766070") socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup2(r2, r2) sendmsg$netlink(r3, &(0x7f0000028fc8)={0x0, 0x0, &(0x7f0000019000), 0x0, &(0x7f0000000040)=[@rights={0x18, 0x1, 0x1, [r1]}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000000b80)=[{{&(0x7f0000000200)=@l2, 0x80, &(0x7f00000005c0), 0x0, &(0x7f0000000600)=""/84, 0x54}}, {{&(0x7f0000000680)=@l2, 0x80, &(0x7f0000000a40), 0x0, &(0x7f0000000ac0)=""/147, 0x93}}], 0x40000000000014a, 0x62, 0x0) [ 1057.976326] ? __mutex_init+0x1f7/0x290 [ 1057.980381] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1057.985965] ? __blk_mq_alloc_rq_map+0x17d/0x2e0 [ 1057.990812] ? blk_mq_update_nr_hw_queues+0xe50/0xe50 [ 1057.996497] blk_mq_init_queue+0x63/0xb0 [ 1058.000600] loop_add+0x34c/0xa30 [ 1058.004092] ? loop_queue_rq+0x690/0x690 [ 1058.008214] loop_control_ioctl+0x199/0x530 [ 1058.012568] ? loop_add+0xa30/0xa30 [ 1058.016229] ? arch_local_save_flags+0x40/0x40 [ 1058.020846] ? __mutex_unlock_slowpath+0x197/0x8c0 [ 1058.025818] ? loop_add+0xa30/0xa30 [ 1058.029498] do_vfs_ioctl+0x1de/0x1720 [ 1058.033444] ? ioctl_preallocate+0x300/0x300 [ 1058.037895] ? selinux_file_mprotect+0x620/0x620 [ 1058.042733] ? __sb_end_write+0xd9/0x110 [ 1058.046837] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1058.052403] ? fput+0x130/0x1a0 [ 1058.055716] ? do_syscall_64+0x9a/0x820 [ 1058.059732] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1058.065303] ? security_file_ioctl+0x94/0xc0 [ 1058.069753] ksys_ioctl+0xa9/0xd0 [ 1058.073254] __x64_sys_ioctl+0x73/0xb0 [ 1058.077185] do_syscall_64+0x1b9/0x820 [ 1058.081106] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 1058.086497] ? syscall_return_slowpath+0x5e0/0x5e0 [ 1058.091448] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1058.096341] ? trace_hardirqs_on_caller+0x310/0x310 [ 1058.101385] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 1058.106577] ? prepare_exit_to_usermode+0x291/0x3b0 [ 1058.111654] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1058.116586] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1058.121817] RIP: 0033:0x457569 [ 1058.125051] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1058.143971] RSP: 002b:00007fe27d20bc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1058.151703] RAX: ffffffffffffffda RBX: 00007fe27d20bc90 RCX: 0000000000457569 [ 1058.158989] RDX: 0000000000000000 RSI: 0000000000004c80 RDI: 0000000000000003 [ 1058.166288] RBP: 000000000072bf00 R08: 0000000000000000 R09: 0000000000000000 03:12:49 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e23}, 0x1c) listen(r0, 0x18) r1 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f0000000000)=[@in={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0xc}, [0x10000000]}, @in={0x2, 0x4e23, @local}], 0x20) [ 1058.173551] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fe27d20c6d4 [ 1058.180814] R13: 00000000004c039f R14: 00000000004d0540 R15: 0000000000000005 03:12:49 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f00000003c0), 0x500, &(0x7f0000000580)={[{@session={'session'}}]}) 03:12:49 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000040)="153f6234488dd25d766070") socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup2(r2, r2) sendmsg$netlink(r3, &(0x7f0000028fc8)={0x0, 0x0, &(0x7f0000019000), 0x0, &(0x7f0000000040)=[@rights={0x18, 0x1, 0x1, [r1]}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000000b80)=[{{&(0x7f0000000200)=@l2, 0x80, &(0x7f00000005c0), 0x0, &(0x7f0000000600)=""/84, 0x54}}, {{&(0x7f0000000680)=@l2, 0x80, &(0x7f0000000a40), 0x0, &(0x7f0000000ac0)=""/147, 0x93}}], 0x400000000000049, 0x62, 0x0) 03:12:49 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f00000003c0), 0x2c000000, &(0x7f0000000580)={[{@session={'session'}}]}) 03:12:49 executing program 1 (fault-call:3 fault-nth:45): r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) 03:12:49 executing program 3: socket$packet(0x11, 0xa, 0x300) syz_emit_ethernet(0x4e, &(0x7f0000000080)={@local, @broadcast, [{}], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x0, 0x0, @local, @local={0xfe, 0x80, [0x0, 0x89060000]}, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, &(0x7f00000002c0)) 03:12:49 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e23}, 0x1c) listen(r0, 0x18) r1 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f0000000000)=[@in={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0xc}, [0x900]}, @in={0x2, 0x4e23, @local}], 0x20) 03:12:49 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000040)="153f6234488dd25d766070") socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup2(r2, r2) sendmsg$netlink(r3, &(0x7f0000028fc8)={0x0, 0x0, &(0x7f0000019000), 0x0, &(0x7f0000000040)=[@rights={0x18, 0x1, 0x1, [r1]}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000000b80)=[{{&(0x7f0000000200)=@l2, 0x80, &(0x7f00000005c0), 0x0, &(0x7f0000000600)=""/84, 0x54}}, {{&(0x7f0000000680)=@l2, 0x80, &(0x7f0000000a40), 0x0, &(0x7f0000000ac0)=""/147, 0x93}}], 0x400000000000154, 0x62, 0x0) 03:12:49 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f00000003c0), 0xf6ffffff, &(0x7f0000000580)={[{@session={'session'}}]}) 03:12:49 executing program 3: socket$packet(0x11, 0xa, 0x300) syz_emit_ethernet(0x4e, &(0x7f0000000080)={@local, @broadcast, [{}], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x0, 0x0, @local, @local={0xfe, 0x80, [0x0, 0x2f00]}, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, &(0x7f00000002c0)) [ 1058.486296] FAULT_INJECTION: forcing a failure. [ 1058.486296] name failslab, interval 1, probability 0, space 0, times 0 [ 1058.547467] CPU: 1 PID: 28744 Comm: syz-executor1 Not tainted 4.19.0-rc8+ #64 [ 1058.554815] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1058.564182] Call Trace: [ 1058.566804] dump_stack+0x1c4/0x2b4 [ 1058.570464] ? dump_stack_print_info.cold.2+0x52/0x52 [ 1058.575729] should_fail.cold.4+0xa/0x17 [ 1058.579818] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 1058.584954] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1058.590549] ? check_preemption_disabled+0x48/0x200 [ 1058.595596] ? graph_lock+0x170/0x170 [ 1058.599418] ? debug_smp_processor_id+0x1c/0x20 [ 1058.604107] ? graph_lock+0x170/0x170 [ 1058.607923] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 1058.612979] ? blk_mq_init_sched+0x36a/0x770 [ 1058.617421] ? find_held_lock+0x36/0x1c0 [ 1058.621507] ? __lock_is_held+0xb5/0x140 [ 1058.625610] ? ___might_sleep+0x1ed/0x300 [ 1058.629804] ? arch_local_save_flags+0x40/0x40 [ 1058.634405] ? find_held_lock+0x36/0x1c0 [ 1058.638502] __should_failslab+0x124/0x180 [ 1058.642762] should_failslab+0x9/0x14 03:12:49 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000040)="153f6234488dd25d766070") socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup2(r2, r2) sendmsg$netlink(r3, &(0x7f0000028fc8)={0x0, 0x0, &(0x7f0000019000), 0x0, &(0x7f0000000040)=[@rights={0x18, 0x1, 0x1, [r1]}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000000b80)=[{{&(0x7f0000000200)=@l2, 0x80, &(0x7f00000005c0), 0x0, &(0x7f0000000600)=""/84, 0x54}}, {{&(0x7f0000000680)=@l2, 0x80, &(0x7f0000000a40), 0x0, &(0x7f0000000ac0)=""/147, 0x93}}], 0x4000000000000f1, 0x62, 0x0) 03:12:50 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000040)="153f6234488dd25d766070") socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup2(r2, r2) sendmsg$netlink(r3, &(0x7f0000028fc8)={0x0, 0x0, &(0x7f0000019000), 0x0, &(0x7f0000000040)=[@rights={0x18, 0x1, 0x1, [r1]}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000000b80)=[{{&(0x7f0000000200)=@l2, 0x80, &(0x7f00000005c0), 0x0, &(0x7f0000000600)=""/84, 0x54}}, {{&(0x7f0000000680)=@l2, 0x80, &(0x7f0000000a40), 0x0, &(0x7f0000000ac0)=""/147, 0x93}}], 0x400000000000006, 0x62, 0x0) 03:12:50 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f00000003c0), 0x700, &(0x7f0000000580)={[{@session={'session'}}]}) [ 1058.646588] kmem_cache_alloc_node_trace+0x270/0x740 [ 1058.651717] ? lockdep_hardirqs_on+0x421/0x5c0 [ 1058.656333] ? trace_hardirqs_on+0xbd/0x310 [ 1058.660673] ? kasan_check_read+0x11/0x20 [ 1058.664850] __alloc_disk_node+0xc9/0x510 [ 1058.669018] ? disk_expand_part_tbl+0x3d0/0x3d0 [ 1058.673731] ? _raw_spin_unlock_irqrestore+0x6d/0xd0 [ 1058.678861] ? blk_queue_flag_set+0xf6/0x160 [ 1058.683299] loop_add+0x42f/0xa30 [ 1058.686784] ? loop_queue_rq+0x690/0x690 [ 1058.690875] loop_control_ioctl+0x199/0x530 [ 1058.695217] ? loop_add+0xa30/0xa30 [ 1058.698868] ? arch_local_save_flags+0x40/0x40 [ 1058.703481] ? __mutex_unlock_slowpath+0x197/0x8c0 [ 1058.708479] ? loop_add+0xa30/0xa30 [ 1058.712147] do_vfs_ioctl+0x1de/0x1720 [ 1058.716067] ? ioctl_preallocate+0x300/0x300 [ 1058.720522] ? selinux_file_mprotect+0x620/0x620 [ 1058.725319] ? __sb_end_write+0xd9/0x110 [ 1058.729422] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1058.734989] ? fput+0x130/0x1a0 [ 1058.738298] ? do_syscall_64+0x9a/0x820 [ 1058.742303] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1058.747851] ? security_file_ioctl+0x94/0xc0 [ 1058.752272] ksys_ioctl+0xa9/0xd0 [ 1058.755747] __x64_sys_ioctl+0x73/0xb0 [ 1058.759655] do_syscall_64+0x1b9/0x820 [ 1058.763576] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 1058.768958] ? syscall_return_slowpath+0x5e0/0x5e0 [ 1058.773916] ? trace_hardirqs_on_caller+0x310/0x310 [ 1058.778962] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 1058.784004] ? recalc_sigpending_tsk+0x180/0x180 [ 1058.788781] ? kasan_check_write+0x14/0x20 [ 1058.793059] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1058.797930] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1058.803150] RIP: 0033:0x457569 [ 1058.806356] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1058.825248] RSP: 002b:00007fe27d1eac78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1058.832985] RAX: ffffffffffffffda RBX: 00007fe27d1eac90 RCX: 0000000000457569 [ 1058.840264] RDX: 0000000000000000 RSI: 0000000000004c80 RDI: 0000000000000003 [ 1058.847539] RBP: 000000000072bfa0 R08: 0000000000000000 R09: 0000000000000000 [ 1058.854803] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fe27d1eb6d4 [ 1058.862084] R13: 00000000004c039f R14: 00000000004d0540 R15: 0000000000000005 [ 1058.879474] hfs: invalid session number or type of track [ 1058.898189] hfs: can't find a HFS filesystem on dev loop2 [ 1058.992468] hfs: invalid session number or type of track [ 1059.011452] hfs: can't find a HFS filesystem on dev loop2 03:12:50 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f00000003c0), 0xedc000000000, &(0x7f0000000580)={[{@session={'session'}}]}) 03:12:50 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000040)="153f6234488dd25d766070") socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup2(r2, r2) sendmsg$netlink(r3, &(0x7f0000028fc8)={0x0, 0x0, &(0x7f0000019000), 0x0, &(0x7f0000000040)=[@rights={0x18, 0x1, 0x1, [r1]}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000000b80)=[{{&(0x7f0000000200)=@l2, 0x80, &(0x7f00000005c0), 0x0, &(0x7f0000000600)=""/84, 0x54}}, {{&(0x7f0000000680)=@l2, 0x80, &(0x7f0000000a40), 0x0, &(0x7f0000000ac0)=""/147, 0x93}}], 0x400000000000064, 0x62, 0x0) 03:12:50 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f00000003c0), 0x3f00, &(0x7f0000000580)={[{@session={'session'}}]}) 03:12:50 executing program 1 (fault-call:3 fault-nth:46): r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) 03:12:50 executing program 3: socket$packet(0x11, 0xa, 0x300) syz_emit_ethernet(0x4e, &(0x7f0000000080)={@local, @broadcast, [{}], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x0, 0x0, @local, @local={0xfe, 0x80, [0x0, 0xc00]}, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, &(0x7f00000002c0)) 03:12:50 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e23}, 0x1c) listen(r0, 0x18) r1 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f0000000000)=[@in={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0xc}, [0x1804]}, @in={0x2, 0x4e23, @local}], 0x20) [ 1059.131110] FAULT_INJECTION: forcing a failure. [ 1059.131110] name failslab, interval 1, probability 0, space 0, times 0 [ 1059.171738] CPU: 0 PID: 28788 Comm: syz-executor1 Not tainted 4.19.0-rc8+ #64 [ 1059.179073] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1059.179086] Call Trace: [ 1059.179121] dump_stack+0x1c4/0x2b4 [ 1059.179157] ? dump_stack_print_info.cold.2+0x52/0x52 [ 1059.179213] should_fail.cold.4+0xa/0x17 [ 1059.204043] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 1059.209184] ? graph_lock+0x170/0x170 [ 1059.213018] ? wait_for_completion+0x8a0/0x8a0 [ 1059.217634] ? graph_lock+0x170/0x170 [ 1059.221477] ? check_preemption_disabled+0x48/0x200 [ 1059.226517] ? check_preemption_disabled+0x48/0x200 [ 1059.226545] ? graph_lock+0x170/0x170 [ 1059.226594] ? find_held_lock+0x36/0x1c0 [ 1059.239488] ? __lock_is_held+0xb5/0x140 [ 1059.243610] ? ___might_sleep+0x1ed/0x300 [ 1059.247800] ? arch_local_save_flags+0x40/0x40 [ 1059.252462] ? pcpu_balance_workfn+0x16f0/0x16f0 [ 1059.257277] __should_failslab+0x124/0x180 [ 1059.261562] should_failslab+0x9/0x14 [ 1059.265410] kmem_cache_alloc_node_trace+0x270/0x740 03:12:50 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e23}, 0x1c) listen(r0, 0x18) r1 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f0000000000)=[@in={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0xc}, [0x6]}, @in={0x2, 0x4e23, @local}], 0x20) [ 1059.270567] ? lockdep_init_map+0x9/0x10 [ 1059.274691] __kmalloc_node+0x33/0x70 [ 1059.278531] disk_expand_part_tbl+0x24b/0x3d0 [ 1059.283063] ? blk_free_devt+0x60/0x60 [ 1059.286998] ? trace_hardirqs_on+0xbd/0x310 [ 1059.291357] __alloc_disk_node+0x177/0x510 [ 1059.295611] ? disk_expand_part_tbl+0x3d0/0x3d0 [ 1059.300309] ? _raw_spin_unlock_irqrestore+0x6d/0xd0 [ 1059.305414] ? blk_queue_flag_set+0xf6/0x160 [ 1059.309854] loop_add+0x42f/0xa30 [ 1059.313312] ? loop_queue_rq+0x690/0x690 [ 1059.317389] loop_control_ioctl+0x199/0x530 [ 1059.321726] ? loop_add+0xa30/0xa30 [ 1059.325353] ? arch_local_save_flags+0x40/0x40 [ 1059.329975] ? __mutex_unlock_slowpath+0x197/0x8c0 [ 1059.334918] ? loop_add+0xa30/0xa30 [ 1059.338570] do_vfs_ioctl+0x1de/0x1720 [ 1059.342480] ? ioctl_preallocate+0x300/0x300 [ 1059.346911] ? selinux_file_mprotect+0x620/0x620 [ 1059.351726] ? __sb_end_write+0xd9/0x110 [ 1059.355812] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1059.361345] ? fput+0x130/0x1a0 [ 1059.364639] ? do_syscall_64+0x9a/0x820 [ 1059.368654] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1059.374208] ? security_file_ioctl+0x94/0xc0 [ 1059.378619] ksys_ioctl+0xa9/0xd0 [ 1059.382084] __x64_sys_ioctl+0x73/0xb0 [ 1059.386002] do_syscall_64+0x1b9/0x820 [ 1059.389902] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 1059.395270] ? syscall_return_slowpath+0x5e0/0x5e0 [ 1059.400222] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1059.405087] ? trace_hardirqs_on_caller+0x310/0x310 [ 1059.410123] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 1059.415161] ? prepare_exit_to_usermode+0x291/0x3b0 [ 1059.420200] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1059.425052] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1059.430240] RIP: 0033:0x457569 [ 1059.433449] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1059.452373] RSP: 002b:00007fe27d20bc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1059.460098] RAX: ffffffffffffffda RBX: 00007fe27d20bc90 RCX: 0000000000457569 03:12:50 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000040)="153f6234488dd25d766070") socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup2(r2, r2) sendmsg$netlink(r3, &(0x7f0000028fc8)={0x0, 0x0, &(0x7f0000019000), 0x0, &(0x7f0000000040)=[@rights={0x18, 0x1, 0x1, [r1]}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000000b80)=[{{&(0x7f0000000200)=@l2, 0x80, &(0x7f00000005c0), 0x0, &(0x7f0000000600)=""/84, 0x54}}, {{&(0x7f0000000680)=@l2, 0x80, &(0x7f0000000a40), 0x0, &(0x7f0000000ac0)=""/147, 0x93}}], 0x4000000000000ab, 0x62, 0x0) 03:12:50 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f00000003c0), 0x1f00000000000000, &(0x7f0000000580)={[{@session={'session'}}]}) [ 1059.467386] RDX: 0000000000000000 RSI: 0000000000004c80 RDI: 0000000000000003 [ 1059.474678] RBP: 000000000072bf00 R08: 0000000000000000 R09: 0000000000000000 [ 1059.481962] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fe27d20c6d4 [ 1059.489234] R13: 00000000004c039f R14: 00000000004d0540 R15: 0000000000000005 03:12:51 executing program 1 (fault-call:3 fault-nth:47): r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) 03:12:51 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f00000003c0), 0x2c000000, &(0x7f0000000580)={[{@session={'session'}}]}) 03:12:51 executing program 3: socket$packet(0x11, 0xa, 0x300) syz_emit_ethernet(0x4e, &(0x7f0000000080)={@local, @broadcast, [{}], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x0, 0x0, @local, @local={0xfe, 0x80, [0x0, 0x689]}, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, &(0x7f00000002c0)) 03:12:51 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f00000003c0), 0xe000000000000, &(0x7f0000000580)={[{@session={'session'}}]}) [ 1059.676277] FAULT_INJECTION: forcing a failure. [ 1059.676277] name failslab, interval 1, probability 0, space 0, times 0 [ 1059.714265] CPU: 0 PID: 28813 Comm: syz-executor1 Not tainted 4.19.0-rc8+ #64 03:12:51 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e23}, 0x1c) listen(r0, 0x18) r1 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f0000000000)=[@in={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0xc}, [0xffffff7f00000000]}, @in={0x2, 0x4e23, @local}], 0x20) [ 1059.721631] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1059.731026] Call Trace: [ 1059.733674] dump_stack+0x1c4/0x2b4 [ 1059.737352] ? dump_stack_print_info.cold.2+0x52/0x52 [ 1059.742636] should_fail.cold.4+0xa/0x17 [ 1059.746747] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 1059.751870] ? save_stack+0x43/0xd0 [ 1059.755511] ? kasan_kmalloc+0xc7/0xe0 [ 1059.759428] ? kmem_cache_alloc_node_trace+0x14c/0x740 [ 1059.764735] ? elevator_alloc+0x82/0x200 [ 1059.768830] ? graph_lock+0x170/0x170 [ 1059.772648] ? blk_mq_init_queue+0x63/0xb0 03:12:51 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f00000003c0), 0xffffff7f00000000, &(0x7f0000000580)={[{@session={'session'}}]}) [ 1059.776934] ? loop_add+0x34c/0xa30 [ 1059.780627] ? loop_control_ioctl+0x199/0x530 [ 1059.785154] ? do_vfs_ioctl+0x1de/0x1720 [ 1059.789242] ? ksys_ioctl+0xa9/0xd0 [ 1059.792926] ? graph_lock+0x170/0x170 [ 1059.796789] ? find_held_lock+0x36/0x1c0 [ 1059.800884] ? find_held_lock+0x36/0x1c0 [ 1059.805004] ? __lock_is_held+0xb5/0x140 [ 1059.809140] ? ___might_sleep+0x1ed/0x300 [ 1059.813338] ? arch_local_save_flags+0x40/0x40 [ 1059.817957] ? __ia32_sys_membarrier+0x150/0x150 [ 1059.822747] ? kasan_check_write+0x14/0x20 03:12:51 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f00000003c0), 0x600, &(0x7f0000000580)={[{@session={'session'}}]}) [ 1059.827033] ? kobject_init+0x23d/0x2f0 [ 1059.831060] __should_failslab+0x124/0x180 [ 1059.835330] should_failslab+0x9/0x14 [ 1059.839162] kmem_cache_alloc_node_trace+0x270/0x740 [ 1059.844303] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1059.849894] dd_init_queue+0x111/0x600 [ 1059.853831] ? dd_exit_queue+0x250/0x250 [ 1059.857931] ? kasan_unpoison_shadow+0x35/0x50 [ 1059.862616] ? __kmalloc_node+0x47/0x70 [ 1059.866658] blk_mq_init_sched+0x3b3/0x770 [ 1059.870933] elevator_init_mq+0xd7/0x160 03:12:51 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f00000003c0), 0x40000, &(0x7f0000000580)={[{@session={'session'}}]}) [ 1059.875033] blk_mq_init_allocated_queue+0x1074/0x1680 [ 1059.880365] ? blk_mq_map_swqueue+0xa70/0xa70 [ 1059.884909] ? __mutex_init+0x1f7/0x290 [ 1059.888984] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1059.894552] ? __blk_mq_alloc_rq_map+0x17d/0x2e0 [ 1059.899363] ? blk_mq_update_nr_hw_queues+0xe50/0xe50 [ 1059.904606] blk_mq_init_queue+0x63/0xb0 [ 1059.908705] loop_add+0x34c/0xa30 [ 1059.912201] ? loop_queue_rq+0x690/0x690 [ 1059.916318] loop_control_ioctl+0x199/0x530 [ 1059.920691] ? loop_add+0xa30/0xa30 03:12:51 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f00000003c0), 0x7a000000, &(0x7f0000000580)={[{@session={'session'}}]}) [ 1059.924338] ? arch_local_save_flags+0x40/0x40 [ 1059.928964] ? __mutex_unlock_slowpath+0x197/0x8c0 [ 1059.933968] ? loop_add+0xa30/0xa30 [ 1059.937641] do_vfs_ioctl+0x1de/0x1720 [ 1059.941604] ? ioctl_preallocate+0x300/0x300 [ 1059.946052] ? selinux_file_mprotect+0x620/0x620 [ 1059.950826] ? __sb_end_write+0xd9/0x110 [ 1059.954910] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1059.960499] ? fput+0x130/0x1a0 [ 1059.963834] ? do_syscall_64+0x9a/0x820 [ 1059.967853] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1059.973432] ? security_file_ioctl+0x94/0xc0 03:12:51 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f00000003c0), 0xfdffffff, &(0x7f0000000580)={[{@session={'session'}}]}) [ 1059.977869] ksys_ioctl+0xa9/0xd0 [ 1059.981364] __x64_sys_ioctl+0x73/0xb0 [ 1059.985289] do_syscall_64+0x1b9/0x820 [ 1059.989211] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 1059.994611] ? syscall_return_slowpath+0x5e0/0x5e0 [ 1060.000031] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1060.004915] ? trace_hardirqs_on_caller+0x310/0x310 [ 1060.010012] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 1060.015075] ? prepare_exit_to_usermode+0x291/0x3b0 [ 1060.020132] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1060.025031] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1060.030238] RIP: 0033:0x457569 [ 1060.033440] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1060.052361] RSP: 002b:00007fe27d20bc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1060.060149] RAX: ffffffffffffffda RBX: 00007fe27d20bc90 RCX: 0000000000457569 [ 1060.067432] RDX: 0000000000000000 RSI: 0000000000004c80 RDI: 0000000000000003 03:12:51 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000040)="153f6234488dd25d766070") socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup2(r2, r2) sendmsg$netlink(r3, &(0x7f0000028fc8)={0x0, 0x0, &(0x7f0000019000), 0x0, &(0x7f0000000040)=[@rights={0x18, 0x1, 0x1, [r1]}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000000b80)=[{{&(0x7f0000000200)=@l2, 0x80, &(0x7f00000005c0), 0x0, &(0x7f0000000600)=""/84, 0x54}}, {{&(0x7f0000000680)=@l2, 0x80, &(0x7f0000000a40), 0x0, &(0x7f0000000ac0)=""/147, 0x93}}], 0x400000000000079, 0x62, 0x0) 03:12:51 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f00000003c0), 0x3f6, &(0x7f0000000580)={[{@session={'session'}}]}) [ 1060.074729] RBP: 000000000072bf00 R08: 0000000000000000 R09: 0000000000000000 [ 1060.081998] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fe27d20c6d4 [ 1060.089262] R13: 00000000004c039f R14: 00000000004d0540 R15: 0000000000000005 [ 1060.114399] hfs: invalid session number or type of track [ 1060.122282] hfs: can't find a HFS filesystem on dev loop2 03:12:51 executing program 1 (fault-call:3 fault-nth:48): r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) [ 1060.224436] hfs: invalid session number or type of track [ 1060.230344] hfs: can't find a HFS filesystem on dev loop2 03:12:51 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f00000003c0), 0x6000, &(0x7f0000000580)={[{@session={'session'}}]}) 03:12:51 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f00000003c0), 0xf403000000000000, &(0x7f0000000580)={[{@session={'session'}}]}) 03:12:51 executing program 3: socket$packet(0x11, 0xa, 0x300) syz_emit_ethernet(0x4e, &(0x7f0000000080)={@local, @broadcast, [{}], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x0, 0x0, @local, @local={0xfe, 0x80, [0x0, 0x8906000000000000]}, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, &(0x7f00000002c0)) [ 1060.296832] FAULT_INJECTION: forcing a failure. [ 1060.296832] name failslab, interval 1, probability 0, space 0, times 0 [ 1060.318712] CPU: 1 PID: 28854 Comm: syz-executor1 Not tainted 4.19.0-rc8+ #64 [ 1060.326020] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1060.335389] Call Trace: [ 1060.338011] dump_stack+0x1c4/0x2b4 [ 1060.341670] ? dump_stack_print_info.cold.2+0x52/0x52 [ 1060.346900] should_fail.cold.4+0xa/0x17 [ 1060.350989] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 1060.356121] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1060.361684] ? check_preemption_disabled+0x48/0x200 [ 1060.366724] ? graph_lock+0x170/0x170 [ 1060.370549] ? debug_smp_processor_id+0x1c/0x20 [ 1060.375245] ? graph_lock+0x170/0x170 [ 1060.379060] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 1060.384095] ? blk_mq_init_sched+0x36a/0x770 [ 1060.388533] ? find_held_lock+0x36/0x1c0 [ 1060.392617] ? __lock_is_held+0xb5/0x140 [ 1060.396721] ? ___might_sleep+0x1ed/0x300 [ 1060.400889] ? arch_local_save_flags+0x40/0x40 [ 1060.405476] ? find_held_lock+0x36/0x1c0 [ 1060.409569] __should_failslab+0x124/0x180 [ 1060.413812] should_failslab+0x9/0x14 [ 1060.417612] kmem_cache_alloc_node_trace+0x270/0x740 [ 1060.422714] ? lockdep_hardirqs_on+0x421/0x5c0 [ 1060.427300] ? trace_hardirqs_on+0xbd/0x310 [ 1060.431621] ? kasan_check_read+0x11/0x20 [ 1060.435767] __alloc_disk_node+0xc9/0x510 [ 1060.439907] ? disk_expand_part_tbl+0x3d0/0x3d0 [ 1060.444570] ? _raw_spin_unlock_irqrestore+0x6d/0xd0 [ 1060.449697] ? blk_queue_flag_set+0xf6/0x160 [ 1060.454108] loop_add+0x42f/0xa30 [ 1060.457557] ? loop_queue_rq+0x690/0x690 [ 1060.461615] loop_control_ioctl+0x199/0x530 [ 1060.465939] ? loop_add+0xa30/0xa30 [ 1060.469586] ? arch_local_save_flags+0x40/0x40 [ 1060.474178] ? __mutex_unlock_slowpath+0x197/0x8c0 [ 1060.479120] ? loop_add+0xa30/0xa30 [ 1060.482746] do_vfs_ioctl+0x1de/0x1720 [ 1060.486642] ? ioctl_preallocate+0x300/0x300 [ 1060.491069] ? selinux_file_mprotect+0x620/0x620 [ 1060.495822] ? __sb_end_write+0xd9/0x110 [ 1060.499896] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1060.505424] ? fput+0x130/0x1a0 [ 1060.508701] ? do_syscall_64+0x9a/0x820 [ 1060.512683] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1060.518212] ? security_file_ioctl+0x94/0xc0 [ 1060.522627] ksys_ioctl+0xa9/0xd0 [ 1060.526106] __x64_sys_ioctl+0x73/0xb0 [ 1060.530003] do_syscall_64+0x1b9/0x820 [ 1060.533886] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 1060.539242] ? syscall_return_slowpath+0x5e0/0x5e0 [ 1060.544167] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1060.549006] ? trace_hardirqs_on_caller+0x310/0x310 [ 1060.554035] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 1060.559055] ? prepare_exit_to_usermode+0x291/0x3b0 [ 1060.564081] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1060.568916] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1060.574091] RIP: 0033:0x457569 [ 1060.577280] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 03:12:52 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e23}, 0x1c) listen(r0, 0x18) r1 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f0000000000)=[@in={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0xc}, [0x100000000000000]}, @in={0x2, 0x4e23, @local}], 0x20) 03:12:52 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000040)="153f6234488dd25d766070") socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup2(r2, r2) sendmsg$netlink(r3, &(0x7f0000028fc8)={0x0, 0x0, &(0x7f0000019000), 0x0, &(0x7f0000000040)=[@rights={0x18, 0x1, 0x1, [r1]}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000000b80)=[{{&(0x7f0000000200)=@l2, 0x80, &(0x7f00000005c0), 0x0, &(0x7f0000000600)=""/84, 0x54}}, {{&(0x7f0000000680)=@l2, 0x80, &(0x7f0000000a40), 0x0, &(0x7f0000000ac0)=""/147, 0x93}}], 0x4000000000000cc, 0x62, 0x0) 03:12:52 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f00000003c0), 0xf503, &(0x7f0000000580)={[{@session={'session'}}]}) [ 1060.596170] RSP: 002b:00007fe27d20bc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1060.603876] RAX: ffffffffffffffda RBX: 00007fe27d20bc90 RCX: 0000000000457569 [ 1060.611138] RDX: 0000000000000000 RSI: 0000000000004c80 RDI: 0000000000000003 [ 1060.618393] RBP: 000000000072bf00 R08: 0000000000000000 R09: 0000000000000000 [ 1060.625651] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fe27d20c6d4 [ 1060.632917] R13: 00000000004c039f R14: 00000000004d0540 R15: 0000000000000005 03:12:52 executing program 1 (fault-call:3 fault-nth:49): r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) 03:12:52 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000040)="153f6234488dd25d766070") socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup2(r2, r2) sendmsg$netlink(r3, &(0x7f0000028fc8)={0x0, 0x0, &(0x7f0000019000), 0x0, &(0x7f0000000040)=[@rights={0x18, 0x1, 0x1, [r1]}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000000b80)=[{{&(0x7f0000000200)=@l2, 0x80, &(0x7f00000005c0), 0x0, &(0x7f0000000600)=""/84, 0x54}}, {{&(0x7f0000000680)=@l2, 0x80, &(0x7f0000000a40), 0x0, &(0x7f0000000ac0)=""/147, 0x93}}], 0x40000000000008e, 0x62, 0x0) 03:12:52 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f00000003c0), 0x97ffffff, &(0x7f0000000580)={[{@session={'session'}}]}) 03:12:52 executing program 3: socket$packet(0x11, 0xa, 0x300) syz_emit_ethernet(0x4e, &(0x7f0000000080)={@local, @broadcast, [{}], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x0, 0x0, @local, @local={0xfe, 0x80, [0x0, 0x8864000000000000]}, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, &(0x7f00000002c0)) [ 1060.816771] FAULT_INJECTION: forcing a failure. [ 1060.816771] name failslab, interval 1, probability 0, space 0, times 0 [ 1060.836870] CPU: 1 PID: 28883 Comm: syz-executor1 Not tainted 4.19.0-rc8+ #64 [ 1060.844185] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1060.853552] Call Trace: [ 1060.856172] dump_stack+0x1c4/0x2b4 [ 1060.859829] ? dump_stack_print_info.cold.2+0x52/0x52 [ 1060.865075] should_fail.cold.4+0xa/0x17 [ 1060.869159] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 1060.874287] ? graph_lock+0x170/0x170 [ 1060.878115] ? __lockdep_init_map+0x105/0x590 [ 1060.882636] ? lockdep_init_map+0x9/0x10 [ 1060.886722] ? graph_lock+0x170/0x170 [ 1060.890555] ? find_held_lock+0x36/0x1c0 [ 1060.894652] ? __lock_is_held+0xb5/0x140 [ 1060.898752] ? ___might_sleep+0x1ed/0x300 [ 1060.902919] ? arch_local_save_flags+0x40/0x40 [ 1060.907530] ? device_pm_sleep_init+0xf0/0x210 [ 1060.912166] __should_failslab+0x124/0x180 03:12:52 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000040)="153f6234488dd25d766070") socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup2(r2, r2) sendmsg$netlink(r3, &(0x7f0000028fc8)={0x0, 0x0, &(0x7f0000019000), 0x0, &(0x7f0000000040)=[@rights={0x18, 0x1, 0x1, [r1]}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000000b80)=[{{&(0x7f0000000200)=@l2, 0x80, &(0x7f00000005c0), 0x0, &(0x7f0000000600)=""/84, 0x54}}, {{&(0x7f0000000680)=@l2, 0x80, &(0x7f0000000a40), 0x0, &(0x7f0000000ac0)=""/147, 0x93}}], 0x400000000000165, 0x62, 0x0) [ 1060.916440] should_failslab+0x9/0x14 [ 1060.920259] __kmalloc_track_caller+0x2d0/0x750 [ 1060.924942] ? pointer+0x990/0x990 [ 1060.928530] ? kvasprintf_const+0x67/0x190 [ 1060.932791] kvasprintf+0xb5/0x150 [ 1060.936350] ? bust_spinlocks+0xe0/0xe0 [ 1060.940360] ? device_create_groups_vargs+0xa7/0x270 [ 1060.945502] ? rcu_read_lock_sched_held+0x108/0x120 [ 1060.950547] kvasprintf_const+0x67/0x190 [ 1060.954627] kobject_set_name_vargs+0x5b/0x150 [ 1060.959232] device_create_groups_vargs+0x1cd/0x270 [ 1060.964273] device_create_vargs+0x46/0x60 [ 1060.968540] bdi_register_va.part.10+0xc3/0x9c0 [ 1060.973223] ? __lockdep_init_map+0x105/0x590 [ 1060.977734] ? cgwb_kill+0x640/0x640 [ 1060.981469] ? lockdep_init_map+0x9/0x10 [ 1060.985558] ? __init_waitqueue_head+0x9e/0x150 [ 1060.990232] ? init_wait_entry+0x1c0/0x1c0 [ 1060.994479] ? __lockdep_init_map+0x105/0x590 [ 1060.998986] ? pm_runtime_init+0x459/0x560 [ 1061.003229] ? update_pm_runtime_accounting+0x1b0/0x1b0 [ 1061.008622] bdi_register+0x111/0x130 [ 1061.012447] ? bdi_register_va+0x80/0x80 [ 1061.016515] bdi_register_owner+0x5e/0x100 [ 1061.020770] __device_add_disk+0xf25/0x1360 [ 1061.025129] ? blk_alloc_devt+0x2e0/0x2e0 [ 1061.029288] ? vsnprintf+0x20d/0x1b60 [ 1061.033116] ? pointer+0x990/0x990 [ 1061.036645] ? __mutex_init+0x1f7/0x290 [ 1061.040613] ? __ia32_sys_membarrier+0x150/0x150 [ 1061.045369] ? sprintf+0xb0/0xe0 [ 1061.048736] ? scnprintf+0x130/0x130 [ 1061.052461] ? __lockdep_init_map+0x105/0x590 [ 1061.056982] device_add_disk+0x22/0x30 [ 1061.060898] loop_add+0x741/0xa30 [ 1061.064372] ? loop_queue_rq+0x690/0x690 [ 1061.068499] loop_control_ioctl+0x199/0x530 [ 1061.072834] ? loop_add+0xa30/0xa30 [ 1061.076453] ? arch_local_save_flags+0x40/0x40 [ 1061.081047] ? __mutex_unlock_slowpath+0x197/0x8c0 [ 1061.086001] ? loop_add+0xa30/0xa30 [ 1061.089664] do_vfs_ioctl+0x1de/0x1720 [ 1061.093580] ? ioctl_preallocate+0x300/0x300 [ 1061.098025] ? selinux_file_mprotect+0x620/0x620 [ 1061.102777] ? __sb_end_write+0xd9/0x110 [ 1061.106833] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1061.112371] ? fput+0x130/0x1a0 [ 1061.115665] ? do_syscall_64+0x9a/0x820 [ 1061.119664] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1061.125203] ? security_file_ioctl+0x94/0xc0 [ 1061.129630] ksys_ioctl+0xa9/0xd0 [ 1061.133094] __x64_sys_ioctl+0x73/0xb0 [ 1061.136992] do_syscall_64+0x1b9/0x820 [ 1061.140895] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 1061.146287] ? syscall_return_slowpath+0x5e0/0x5e0 [ 1061.151225] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1061.156100] ? trace_hardirqs_on_caller+0x310/0x310 [ 1061.161146] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 1061.166179] ? prepare_exit_to_usermode+0x291/0x3b0 [ 1061.171221] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1061.176101] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1061.181296] RIP: 0033:0x457569 [ 1061.184501] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1061.203415] RSP: 002b:00007fe27d20bc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1061.211140] RAX: ffffffffffffffda RBX: 00007fe27d20bc90 RCX: 0000000000457569 03:12:52 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e23}, 0x1c) listen(r0, 0x18) r1 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f0000000000)=[@in={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0xc}, [0xfffffff5]}, @in={0x2, 0x4e23, @local}], 0x20) [ 1061.218416] RDX: 0000000000000000 RSI: 0000000000004c80 RDI: 0000000000000003 [ 1061.225691] RBP: 000000000072bf00 R08: 0000000000000000 R09: 0000000000000000 [ 1061.232970] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fe27d20c6d4 [ 1061.240247] R13: 00000000004c039f R14: 00000000004d0540 R15: 0000000000000005 [ 1061.255287] WARNING: CPU: 0 PID: 28883 at block/genhd.c:697 __device_add_disk+0x1068/0x1360 [ 1061.263807] Kernel panic - not syncing: panic_on_warn set ... [ 1061.263807] [ 1061.271210] CPU: 0 PID: 28883 Comm: syz-executor1 Not tainted 4.19.0-rc8+ #64 [ 1061.278500] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1061.287887] Call Trace: [ 1061.290505] dump_stack+0x1c4/0x2b4 [ 1061.294147] ? dump_stack_print_info.cold.2+0x52/0x52 [ 1061.299347] panic+0x238/0x4e7 [ 1061.302571] ? add_taint.cold.5+0x16/0x16 [ 1061.306721] ? __warn.cold.8+0x148/0x1ba [ 1061.310802] ? __device_add_disk+0x1068/0x1360 [ 1061.315384] __warn.cold.8+0x163/0x1ba [ 1061.319284] ? rcu_bh_qs+0xc0/0xc0 [ 1061.322823] ? __device_add_disk+0x1068/0x1360 [ 1061.327415] report_bug+0x254/0x2d0 [ 1061.331061] do_error_trap+0x1fc/0x4d0 [ 1061.334955] ? init_wait_entry+0x1c0/0x1c0 [ 1061.339211] ? math_error+0x3f0/0x3f0 [ 1061.343013] ? __lockdep_init_map+0x105/0x590 [ 1061.347521] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1061.352373] ? trace_hardirqs_on_caller+0x310/0x310 [ 1061.357388] ? pm_runtime_init+0x459/0x560 [ 1061.361620] ? update_pm_runtime_accounting+0x1b0/0x1b0 [ 1061.367013] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1061.371871] do_invalid_op+0x1b/0x20 [ 1061.375596] invalid_op+0x14/0x20 [ 1061.379044] RIP: 0010:__device_add_disk+0x1068/0x1360 [ 1061.384229] Code: ff ff 48 89 df e8 28 cb 47 fe e9 cb f0 ff ff e8 9e cb 47 fe e9 85 f4 ff ff e8 04 5b 04 fe 0f 0b e9 54 fb ff ff e8 f8 5a 04 fe <0f> 0b e9 cb fe ff ff 4c 89 f7 e8 79 cb 47 fe e9 0e f1 ff ff e8 2f [ 1061.403123] RSP: 0018:ffff880180bdf880 EFLAGS: 00010246 [ 1061.408482] RAX: 0000000000040000 RBX: ffff88017ffd0480 RCX: ffffc90003ef0000 [ 1061.415748] RDX: 0000000000040000 RSI: ffffffff837a4e58 RDI: 0000000000000005 [ 1061.423016] RBP: ffff880180bdfa50 R08: ffff88017a908280 R09: 1ffffffff1273955 [ 1061.430290] R10: ffffed003b5c4732 R11: ffff8801dae23993 R12: 00000000fffffff4 [ 1061.437555] R13: ffff880180bdfa28 R14: ffff88017ffd09f0 R15: ffff88017ffd0484 [ 1061.444845] ? __device_add_disk+0x1068/0x1360 [ 1061.449439] ? blk_alloc_devt+0x2e0/0x2e0 [ 1061.453597] ? vsnprintf+0x20d/0x1b60 [ 1061.457425] ? pointer+0x990/0x990 [ 1061.460967] ? __mutex_init+0x1f7/0x290 [ 1061.464957] ? __ia32_sys_membarrier+0x150/0x150 [ 1061.469745] ? sprintf+0xb0/0xe0 [ 1061.473120] ? scnprintf+0x130/0x130 [ 1061.476836] ? __lockdep_init_map+0x105/0x590 [ 1061.481340] device_add_disk+0x22/0x30 [ 1061.485225] loop_add+0x741/0xa30 [ 1061.488696] ? loop_queue_rq+0x690/0x690 [ 1061.492770] loop_control_ioctl+0x199/0x530 [ 1061.497108] ? loop_add+0xa30/0xa30 [ 1061.500748] ? arch_local_save_flags+0x40/0x40 [ 1061.505334] ? __mutex_unlock_slowpath+0x197/0x8c0 [ 1061.510273] ? loop_add+0xa30/0xa30 [ 1061.513896] do_vfs_ioctl+0x1de/0x1720 [ 1061.517800] ? ioctl_preallocate+0x300/0x300 [ 1061.522210] ? selinux_file_mprotect+0x620/0x620 [ 1061.526996] ? __sb_end_write+0xd9/0x110 [ 1061.531068] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1061.536599] ? fput+0x130/0x1a0 [ 1061.539873] ? do_syscall_64+0x9a/0x820 [ 1061.543847] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1061.549381] ? security_file_ioctl+0x94/0xc0 [ 1061.553805] ksys_ioctl+0xa9/0xd0 [ 1061.557259] __x64_sys_ioctl+0x73/0xb0 [ 1061.561144] do_syscall_64+0x1b9/0x820 [ 1061.565027] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 1061.570389] ? syscall_return_slowpath+0x5e0/0x5e0 [ 1061.575328] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1061.580171] ? trace_hardirqs_on_caller+0x310/0x310 [ 1061.585182] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 1061.590212] ? prepare_exit_to_usermode+0x291/0x3b0 [ 1061.595234] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1061.600081] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1061.605315] RIP: 0033:0x457569 [ 1061.608533] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1061.627446] RSP: 002b:00007fe27d20bc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1061.635173] RAX: ffffffffffffffda RBX: 00007fe27d20bc90 RCX: 0000000000457569 [ 1061.642451] RDX: 0000000000000000 RSI: 0000000000004c80 RDI: 0000000000000003 [ 1061.649727] RBP: 000000000072bf00 R08: 0000000000000000 R09: 0000000000000000 [ 1061.657009] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fe27d20c6d4 [ 1061.664304] R13: 00000000004c039f R14: 00000000004d0540 R15: 0000000000000005 [ 1061.673036] Kernel Offset: disabled [ 1061.676869] Rebooting in 86400 seconds.. serialport: VM disconnected.